text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
Generic second-order macroscopic traffic node model for general
multi-input multi-output road junctions via a dynamic system
approach
arXiv:1707.09346v1 [cs.SY] 28 Jul 2017
Matthew A. Wright and Roberto Horowitz
July 31, 2017
Abstract
This paper addresses an open problem in traffic modeling: the second-order macroscopic node problem. A
second-order macroscopic traffic model, in contrast to a first-order model, allows for variation of driving behavior
across subpopulations of vehicles in the flow. The second-order models are thus more descriptive (e.g., they have
been used to model variable mixtures of behaviorally-different traffic, like car/truck traffic, autonomous/humandriven traffic, etc.), but are much more complex. The second-order node problem is a particularly complex
problem, as it requires the resolution of discontinuities in traffic density and mixture characteristics, and solving
of throughflows for arbitrary numbers of input and output roads to a node (in other words, this is an arbitrarydimensional Riemann problem with two conserved quantities). We propose a solution to this problem by making
use of a recently-introduced dynamic system characterization of the first-order node model problem, which gives
insight and intuition as to the continuous-time dynamics implicit in first-order node models. We use this intuition
to extend the dynamic system node model to the second-order setting. We also extend the well-known “Generic
Class of Node Model” constraints to the second order and present a simple solution algorithm to the second-order
node problem. This node model has immediate applications in allowing modeling of behaviorally-complex traffic
flows of contemporary interest (like partially-autonomous-vehicle flows) in arbitrary road networks.
1
Introduction
The macroscopic approximation of vehicle traffic has proven a valuable tool for the study of traffic’s nonlinear
dynamics, and the design of methods for mitigating and controlling undesirable outcomes like congestion. This
macroscopic theory describes the dynamics of vehicles along roads with partial differential equations (PDEs) inspired
by fluid flow. The most basic macroscopic formulation is the so-called “kinematic wave” or “Lighthill-WhithamRichards” (LWR) due to [12, 14], which describes traffic with a one-dimensional conservation equation,
∂ρ ∂(ρv)
+
=0
∂t
∂z
(1)
where ρ(z, t) is the density of vehicles, t is time, z is the lineal direction along the road, and v(ρ) is the flow speed.
The total flow, ρv, is often expressed in terms of a flux function, f (ρ) = ρv (the flux function on a long straight road
is often called the fundamental diagram).
The LWR-type formulation (1) is a simple nonlinear model and cannot capture many characteristics of real
traffic flows. For example, a flux function f (·) of ρ only does not admit the oft-empirically-observed phenomenon
of accelerating and decelerating flows tracing a hysteresis loop in the (ρ, v) plane [20]. One extension of the LWR
model that can express a richer variety of dynamics is the so-called Aw-Rascle-Zhang (ARZ) [1, 20] family of models.
These models fit into the so-called “generic second order” 1 or “extended ARZ” class of traffic models [11], which can
be written as
∂ρ ∂(ρv)
+
=0
∂t
∂z
∂w
∂w
+v
=0
∂t
∂z
where v = V (ρ, w)
(2)
1 As seen in (2), the “second-order” model actually consists of two first-order partial differential equations (that is, they only contain
first derivatives). In a case of overloaded mathematical terminology, the name “second order” here comes from a system-theoretic view,
where a second-order system is one that has two state variables: in this case, ρ and w (or, equivalently, ρ and v).
1
where w(x, t) is a property or invariant that is conserved along trajectories [11].
The property w in (2) can be described as a characteristic of vehicles that determines their density-velocity
relationship. Members of the generic second order model (GSOM) family are differentiated by the choice of w and
its relationship on the ρ-v behavior. Examples of chosen w’s include the difference between vehicles’ speed and an
equilibrium speed [1], driver spacing [20], or the flow’s portion of autonomous vehicles [17]. An intuitive way of
describing the effect of the property w in (2) is that it parameterizes a family of flow models, f (ρ, w) = ρV (ρ, w),
with different flow models for different values of w [11, 5].
For application of macroscopic traffic simulation, road networks are often modeled as directed graphs. Edges
that represent individual roads are called links, and junctions where links meet are called nodes. Typically, the flow
model f (·) on links is called the “link model,” and the flow model at nodes is called the “node model.” Development
of accurate link and node models have been areas of much research activity in transportation engineering for many
years.
This paper focuses on node models for first- and second-order macroscopic models. The node model resolves the
discontinuities in ρ and/or w between links and determines a Neumann boundary For nodes with merges, diverges,
or both, this Riemann problem becomes multidimensional. Through this, the node model determines how the state
of an individual link affects and is affected by its connected links, their own connected links, and so on through the
network. As a result, it has recently been recognized that the specific node model used can have a very large role in
describing the network-scale congestion dynamics that emerge in complex and large networks (for more on this, see
the discussions in, e.g., the introduction sections of [16] and [8]).
In [18], we introduced a novel characterization of node models as dynamic systems. Traditional studies of node
models (see, e.g., [16, 6, 2, 15, 8, 19]) usually present the node model as an optimization problem (where the node
flows are found by solving this problem) or in algorithmic form (where an explicit set of steps are performed to
compute the flows across the node). In contrast, the dynamic system characterization describes the flows across
the node as themselves evolving over some period of time (in application, this means that the dynamic system
characterization presents time-varying dynamics that are said to occur during the simulation timesteps of the link
PDEs). The dynamic system characterization can be thought of as making explicit the time-varying behavior of
the flows at nodes of many algorithmic node models: it was shown in [18] that the dynamic system characterization
produces the same solutions as the algorithm introduced in [19], which also reduces to the one introduced in [16] as
a special case.
The dynamic system characterization has proven useful in imparting an intuition as to what physical processes
over time are implicit in these algorithmic node models (see the discussions referring to [18] in [19] for some examples).
In this paper, we develop a dynamic system characterization of a second-order node model, and use it to solve the
general node problem for second-order models.
This paper has several main contributions. The first is an extension of the dynamic system characterization of firstorder node models as introduced in [18] to a simple, closed-form solution algorithm. This represents the completion of
an argument began in Section 4.1 of that reference. The second contribution is the extension of the dynamic system
characterization to the generic second-order models. As we will see, the dynamic system characterization lends itself
to an intuitive incorporation of the second PDE in (2) that is not obvious in the traditional, optimization-problem
presentation of node models. The third contribution, and the principal contribution of this paper, parallels the first
by using the second-order dynamic system node model to derive an intuitive, closed-form algorithm for computing
node flows for second-order flow models for general, multi-input multi-output nodes. To the best of our knowledge,
this represents the first proposed generic (applicable to multi-input multi-output nodes) node model for second-order
traffic flow modeling2 .
The remainder of this paper is organized as follows. Section 2 reviews the first-order node flow problem, the
first-order dynamic system characterization introduced in [18], and presents the aforementioned closed-form solution
algorithm (contribution one in the above paragraph). Section 3 reviews the link discretization of the GSOM (2) as
presented in, e.g., [11, 5], which produces the inputs to our second-order node model, and the standard one-input
one-output second-order flow problem and its solution. Section 4 presents the extension of the second-order flow
problem to the multi-input multi-output case, the dynamic system characterization to the GSOM family (2) and
the solution algorithm for the general node problem (contributions two and three). Finally, Section 5 concludes and
notes some open problems.
2 A note on naming: as we will see in Section 2.1, we build off the so-called “generic class of first-order node models” to develop our
second-order node model. Given that the relevant second-order model used (2) is itself called the “generic second order model,” it might
be accurate to describe this paper’s results as the “genericization of the generic class of node models to the generic second-order model,”
but this description likely loses in comprehensibility what it might gain in accuracy.
2
2
First-order node model
In this Section, we review the general first-order node problem and a particular node model (and its solution algorithm). This node model will be extended to the second-order node problem in Section 3.
The traffic node problem is defined on a junction of M input links, indexed by i, and N output links, indexed by j.
We further define C classes (sometimes called “commodities”) of vehicle, indexed by c. The first-order node problem
c
takes as inputs the incoming links’ per-class demands Sic , split ratios βi,j
(which define the portion of vehicles of
class c in link i that wish to exit to link j), and outgoing links’ supplies Rj , and gives as outputs the set of flows from
c
c
c
i to j for class c, fi,j
. We denote as a shorthand the per-class directed demand Si,j
, βi,j
Sic . Nodes are generally
infinitesimally small and have no storage, so all the flow that enters the node must exit the node.
The rest of this Section is organized as follows. Section 2.1 defines our first-order node problem as an optimization
problem defined by explicit requirements, following the example set by [16]. Section 2.2 reviews the dynamic system
of [18] whose executions produce solutions to the node problem. Finally, Section 2.3 uses the dynamic system
formulation as a base to develop a node model solution algorithm. This algorithm represents the completion of an
argument began in [18].
2.1
“Generic Class of Node Model” requirements
The node problem’s history begins with the original formulation of macroscopic discretized first-order traffic flow
models [4]. There have been many developments in the node model theory since, but we reflect only some more
recent results.
We can divide the node model literature into pre- and post-[16] epochs. They drew from the literature several
earlier-proposed node model requirements to develop a set of conditions for first-order nodel models they call the
“generic class of first-order node models” (GCNM). These set of conditions give an excellent starting point for our
discussion of the mathematical technicalities of node models, and have been used as a starting point by many
subsequent papers, such as [6, 2, 15, 8, 19]. In the following list, we present the variant of first-order GCNM
requirements used in [19], which includes a modification of the first-in-first-out (FIFO) requirement (item 6 below)
to [19]’s “partial FIFO” requirement.
1. Applicability to general numbers of input links M and output links N . In the case of multi-class flow, this also
extends to general numbers of classes c.
P
c
.
2. Maximization of the total flow through the node. Mathematically, this may be expressed as max i,j,c fi,j
According to [16], this means that “each flow should be actively restricted by one of the constraints, otherwise
it would increase until it hits some constraint.” When a node model is formulated as a constrained optimization
problem, its solution will automatically satisfy this requirement. However, what this requirement really means
is that constraints should be stated correctly and not be overly simplified and, thus, overly restrictive for the
sake of convenient problem formulation. See the literature review in [16] for examples of node models that
inadvertently do not maximize node throughput by oversimplifying their requirements.
c
3. Non-negativity of all input-output flows. Mathematically, fi,j
≥ 0 for all i, j, c.
4. P
Flow conservation:
Total flow entering the node must be equal to total flow exiting the node. Mathematically,
P c
c
f
for
all c.
f
=
j i,j
i i,j
P c
P c
≤ Rj .
≤ Sic and i fi,j
5. Satisfaction of demand and supply constraints. Mathematically, j fi,j
6. Satisfaction of the (partial) first-in-first-out (FIFO) constraint: if a single destination j ′ for a given i is not
able to accept all demand from i to j ′ , then all other flows from i are constrained by the queue of j ′ -destined
c
is partially defined
vehicles that builds up in i. The degree to which this queue restricts the other flows fi,j
i
by the restriction intervals ηj ′ ,j = [y, z] ⊆ [0, 1]. This interval means that a queue in the i, j ′ movement
will block the portion of i, j-serving lanes in i with leftmost extent y and rightmost extent z (e.g., if i, j is a
through movement that uses two lanes and i, j ′ is a right-turn movement that uses the right of those two lanes,
then ηji ′ ,j = [1/2, 1].3 The traditional, full FIFO behavior, where any queue in i blocks all of i’s lanes, can be
recovered by setting all ηji ′ ,j = [0, 1] 4 .
3 Continuing this example, we will have η i
= [0, 1] since the only lane in i that serves movement i, j ′ (the right lane) will be blocked
j,j ′
by a queue for the through movement, which will queue on both lanes).
4 To help keep the meaning of η i
clear, we find it helpful to read it as “the restriction interval of j ′ onto j for i”
j ′ ,j
3
Another item that defines the partial first-in-first-out behavior is the amount of time that a restriction interval
ηji ′ ,j is active. That is, if j ′ is a low-supply link with relatively high demands and j ′′ is a high-supply link with
relatively low demands, it should be the case that ηji ′ ,j is active on a greater portion of the directed demand
c
Si,j
than ηj ′′ ,j . 5 We will see how this effect of time is captured in the dynamic system formulation of Section
2.2.
Finally, we require that we consider the cumulative effect of restriction intervals. Suppose that a movement i, j
has an active restriction from a queue for movement i, j ′ . Then, say that another downstream link j ′′ exhausts
its supply, and vehicles begin queueing for the movement i, j ′′ . Then, the new restriction on i, j (after this
second queue forms) is ηji ′ ,j ∪ ηji ′′ ,j .
This requirement is stated mathematically as
c
c
fi,j
≤ Si,j
[
fi,j ′
− A
ηji ′ ,j ×
Si,j , Si,j
S
i,j ′
′
(3)
j 6=j
c
where A(·) denotes the area of a two-dimensional object, × denotes a Cartesian product, fi,j
,
P c
Si,j , c Si,j .
P
c
fi,j , and
The formulation in (3) is complex in order to state it as an optimization constraint, and not as a consequence of
the time-varying queue formation intuition outlined in the third paragraph of this item. A major contribution
of the dynamic system approach to node modeling is the explicit encoding of this more intuitive description.
See [19, Sections 3.2-3.3] or [18, Section 3.2] for a much more in-depth discussion of this requirement.
7. Satisfaction of the invariance principle. If the flow from some input link i is restricted by the available output
supply, this input link enters a congested regime. This creates a queue in this input link and causes its demand
Si to jump to capacity Fi in an infinitesimal time, and therefore, a node model should yield solutions that are
invariant to replacing Si with Fi when flow from input link i is supply-constrained [9].
8. Supply restrictions on a flow from any given input link arePimposed on class P
components of this flow proporc
c
c
c
tionally to their per-class demands. Mathematically, fi,j
/( c fi,j
) = βi,j
Sic /( c βi,j
Sic ).
This assumes that the classes are mixed isotropically. This means that all vehicles attempting to take movement
i, j will be queued in roughly random order, and not, for example, having all vehicles of commodity c = 1 queued
in front of all vehicles of c = 2, in which case the c = 2 vehicles would be disproportionally affected by spillback.
We feel this is a reasonable assumption for situations where the demand at the node is dependent mainly on
the vehicles near the end of the link (e.g., in a small cell at the end).
In addition to the above numbered requirements, two other elements are needed to define a node model. The first
is a rule for the portioning of output link supplies Rj among the input links. Following [7], in [16] it was proposed to
allocate supply for incoming flows proportionally to input link capacities, which we will denote Fi . In this paper, we
allocate supply proportionally to the links’ “priorities” pi (in the spirit of [4, 13, 6, 19]). In the dynamic system view,
priorities represent the relative rate at which vehicles exit each link i to claim downstream space (one reasonable
formulation might be to follow the capacity-proportional example, pi = Fi , if, as in [16], it assumed that vehicles
exit a link at rate Fi ).
The second necessary element is a redistribution of “leftover supply.” Following the initial partitioning of supplies
Rj , if one or more of the supply-receiving input links does not fill its allocated supply, some rule must redistribute
the difference to other input links who may still fill it. This second element is meant to model the selfish behavior of
drivers to take any space available, and ties in closely with requirement 2 above. [16] referred to these two elements
collectively as a “supply constraint interaction rule” (SCIR). For some discussion of choices of SCIRs in recent papers,
see [19, Section 2.1].
In this paper, we consider a SCIR of the form [19]
X
X
fi,j <
Sic , Wi 6= ∅
(4a)
∀ i s.t.
j
c
5 This amount-of-time requirement is encoded in the right part of the Cartesian product in (3). This amount-of-time requirement
appears as a component of a Cartesian product in the two-dimensional rectangles that appear in [19, Section 3.2]. However, it is much
more intuitive to understand this as an explicit temporal property as it appears in the dynamic system characterization, so we will not
discuss [19, Section 3.2]’s derivation here.
4
pi,j
Rj ,
∀ i s.t. Wi 6= ∅, fi,j ≥ PM
i′ =1 pi′ ,j
X
c
c
where Wi = {j ∗ :
βi,j
∗ Si > 0,
∀j ∈ Wi
(4b)
c
pi′ ,j ∗ fi,j ∗ ≥ pi,j ∗ fi′ ,j ∗ ∀i′ 6= i}
where
P c
Si,j
(5)
pij = Pc c pi .
c Si
is the “oriented priority,” which distributes input
priority proportionally to the actual vehicles using that
P links’
c
(as before).
priority to claim downstream supply, and fi,j , c fi,j
The set Wi denotes all output links that restrict the flow from
P i. cThe cconditions for membership in Wi can be
read as “there is some nonzero demand for the movement i, j ∗ ( c βi,j
∗ Si > 0), and i claims at least its priorityproportional allocation of j ∗ ’s supply (pi′ ,j ∗ fi,j ∗ ≥ pi,j ∗ fi′ ,j ∗ ∀i′ 6= i).” Note that if a link j ∗ is in Wi ∩ Wi′ , then
pi′ ,j ∗ fi,j ∗ = pi,j ∗ fi′ ,j ∗ by construction.
Constraint (4a) says that if a link i is not able to fill its demand, then there is at least one output link in Wi that
restricts i, and that i’s movements claim at least as much as their oriented-priority-proportional allocation of supply.
Constraint (4b) captures the reallocation of “leftover” supply, which states that a link i that cannot fulfill all of its
demand to the links in Wi will continue to send vehicles after links i′ : j ∈
/ Wi′ have fulfilled their demands to the
j ∈ Wi .
This concludes the setup of our generic node model problem. A solution will have flows that are constrained by
at least one of the constraints outlined above. An algorithm to solve this problem and proof of optimality is given
in [19].
2.1.1
Other first-order node model requirements
Note that the list of first-order node requirements presented in Section 2.1 (which is the particular node problem of
interest for the remainder of this paper) is not an exhaustive list of all “reasonable” node model requirements. Since
the statement of the GCNM requirements in [16], several authors have proposed extensions or modifications (as we
have in the “partial FIFO” relaxation). Beyond what we have covered here, one of the most discussed are nodal
supply constraints. These supply constraints, as their name suggests, describe supply limitations at the node rather
than in one of the output links. They are meant to describe restrictions on traffic that occur due to interference
between flows in the junction (rather than vehicles being blocked in the input link), or the exhaustion of some “shared
resource” such as green light time at a signalized intersection. Each movement through the node may or may not
consume an amount of a node supply proportional to its throughflow.
The node supply constraints in the GCNM framework were originally proposed by in [16]. In [2] it was noted that
these node supplies may lead to non-unique solutions. Very recently, [8] revisited the node supply constraints (mostly
in the context of distribution of green time) to address [2]’s critique of non-uniqueness of solutions and proposed a
generalization of the flow-maximization objective that still enforces that drivers will take any available space they
can.
We do not explicitly include the node supply constraints in the dynamic system node models and resulting solution
algorithms in this paper. The path towards their inclusion in the first- and second-order cases is straightforward
but notationally cumbersome and somewhat beyond this paper’s scope of fusing the GCNM and second-order link
models.
2.2
Review of first-order node dynamic system
This Section reviews the node dynamic system characterization of node models presented in [18]. This dynamic
system is a hybrid system, which means that it contains both continuous and discrete states (also called discrete
modes). Here, the continuous states evolve in time according to differential equations, the differential equations
themselves change between discrete states, and the discrete state transitions are activated when conditions on the
continuous states are satisfied.
• Let there be N · M · C time-varying continuous states xci,j (t), each representing the number of vehicles of class
c that have taken movement i, j through the node. The continuous state space is denoted X.
• Let J be the set of all output links j. Let there be 2M discrete states qν , ν ∈ 2J (recall 2J refers to the power
set of J ), the index ν representing the set of downstream
links that have become congested. A downstream
P P
link j is said to “become congested” at time t if i c xcij (t) = Rj . The discrete state space is denoted Q.
5
• Init ⊆ Q × X defines the set of permissible initial states of the system at t = 0.
• Dom: Q → X denotes the domain of a discrete state, which is the space of permissible continuous states while
the discrete state is active.
• Φ : Q × X → Q × X is a reset relation, which defines the transitions between discrete states and the conditions
for those transitions.
• The hybrid system execution begins at time t = 0.
P
c
when i, j has a
• Each link is given a “time limit” Ti , ( c Sic )/pi . This is necessary to ensure that xci,j < Si,j
partial FIFO constraint active (which appears in the dynamic system as a flow rate attenuation).
Our hybrid system (Q, X, Init, ẋci,j , Dom, Φ) is
Q = {qν }, ν ∈ 2J
X =R
Init =
ẋci,j
=
(6a)
M·N ·C
(6b)
Q × {xci,j (t =
c
Si,j
P
p
ij
Sc
c i,j
·
∀i, j, c}
0) = 0
[
ηji ′ ,j
1−
′
j ∈ν,
c
∃ c: xci,j′ <Si,j
′
c
if xcij (t) < Sij
and t < Ti
0
otherwise
XX
x:
xci,j = Rj ∀j ∈ ν and
c
i
Dom(qν ) =
XX
/ν
xci,j ≤ Rj ∀j ∈
(6c)
(6d)
(6e)
c
i
Φ(qν , x) = (qν ′ , x) if
XX
xci,j ∗ = Rj ∗
(6f)
c
′
i
where ν = ν ∪ j ∗ .
When ẋcij = 0 for all i, j, c, the execution is complete and fijc = xcij .
It was shown in [18] that the hybrid system (6) produces the same solutions as [19]’s algorithm. In the following
Section, we show how to quickly compute executions of the hybrid system, which, since it is based on the continuoustime dynamics of (6), presents a more intuitive algorithm than the one in [19].
2.3
Execution of the first-order node dynamic system as a simple algorithm
Evaluating continuous-time or hybrid systems typically involves forward integration of the differential equation(s)
with fixed or varying step sizes. However, in the case of (6), evaluation can be performed in a much simpler manner.
This is due to the particular dynamics of the system - since the continuous-time dynamics and the condition for
discrete mode switching are very simple, the time that the next mode switch will occur can be found in closed form.
Equations (6e) and (6f) say that a mode switch where link j enters ν will occur when
XX
xcij = Rj .
(7)
i
c
Say we are currently at time t0 . Combining (7) with (6d), we can find the time that the mode switch occurs, which
we denote tj .
Z tj X X
XX
ẋcij dt.
(8)
Rj =
xcij (t0 ) +
i
t0
c
6
i
c
Solving the integral in (8),
Z
tj
t0
=
Z
XX
i
tj
t0
ẋci,j dt
c
XX
i
= (tj − t0 )
c
X
i
Then, plugging (9) into (8),
c
[
Si,j
i
pi,j P c 1 −
ηj ′ ,j dt
c Si,j
′
j ∈ν,
c
∃ c: xci,j′ <Si,j
′
[
i
ηj ′ ,j .
pij 1 −
(9)
j ′ ∈ν,
c
∃ c: xci,j′ <Si,j
′
P P
Rj − i c xci,j (t0 )
.
tj = t0 +
S i
P
1
−
η
p
j ′ ,j
i i,j
(10)
j ′ ∈ν,
c
∃ c: xci,j′ <Si,j
′
This value can be computed for each output link j. Then, the j with the smallest tj will be the first link to fill and
join ν. We had used j ∗ for this output link, so let tj ∗ , min tj . However, one of the input links may have its time
limit Ti expire. This would also change the dynamics, as it stops sending vehicles at that time.
Therefore, evaluation of the system trajectory beginning from t0 can be done by (i) evaluating (10) for each
output link, (ii) identifying t∗j , and (iii) checking whether any of the time limits Ti occur before tj ∗ . This is an
event-triggered simulation: it is only necessary to determine when the next event will occur. The equations for ẋcij
over [t0 , min({Ti }, tj ∗ )] can then be evaluated in closed form under qν .
Note that the ẋci,j ’s for an i may change to zero from nonzero without a change in the discrete state qν , if the
c
conditional of xci,j (t) < Si,j
in (6d) is broken. This can be understood as the i running out of vehicles that it is able
to send. This may happen if pi > Si for that i, and some (partial) FIFO constraint becomes active on i. In the
following algorithm, we introduce a new set, µ, that was not present in the dynamic system definition and contains
the i’s that either exhaust their supply or have their time limits expire (i.e., those i’s whose ẋci,j become zero without
j necessarily entering ν).
These steps are summarized in Algorithm 1. This algorithm represents the completion of an argument began in
[18].
3
3.1
Review of second-order flow modeling
Introduction
The formulation of the GSOM seen in (2) has been called the “advective form” [5]. In this form, the property w is
advected with the vehicles at speed v. That is, it is constant along trajectories. This form makes the statement that
the property w is a property of vehicles and is easy to understand conceptually.
However, to apply a discretization, it is useful to consider the total property ρw, and rewrite (2) in “conservative
form” [11, 5],
∂ρ ∂(ρv)
+
=0
∂t
∂z
∂(ρw) ∂(ρwv)
+
=0
∂t
∂z
where v = V (ρ, w).
(11)
We will review the relevant finite-volume discretization using the Godunov scheme of (11) [11] in the next Section.
For a deeper analysis on the physical properties of (11), see, e.g., [11].
We make one note on constraints imposed on the form of v(ρ, w) in (11). It has been stated [11, (19)] that, to
apply the Godunov discretization to (11), one is restricted to choices of V (ρ, w) for which there is a unique ρ for
every (v, w) and a unique w for every (v, ρ). That is, V (ρ, w) must be invertible in both its arguments.
7
Algorithm 1 First-order node model solution algorithm
c
Input: Sic , βi,j
, Rj , pi , ηji ′ ,j
c
Output: fi,j
c
c
Ti , Si,j
, fi,j
, pi,j , µ, ẋci,j , ν ← (Algorithm 2) {Setup and initialization}
t ← 0 {Begin main loop}
while ∃ i, j, c : ẋci,j 6= 0 do
for all i, j, c : i ∈
/ µ do
c
S i
Si,j
c
ẋi,j ← pi,j P S c · 1 −
ηj ′ ,j {Compute continuous-time dynamics}
c
i,j
j ′ ∈ν,
c
∃ c: xci,j′ <Si,j
′
end for
dt ← (Algorithm 3)
for all i, j, c do
c
c
fi,j
← fi,j
+ ẋci,j · dt {Integrate forward in time}
end for
c
c
for all i : ∀j, c, Si,j
− fi,j
= 0 do
µ ← µ ∪ i {Account for all emptied input links}
ẋci,j ← 0 ∀ j, c
end for
for all j : t + dt = tj do
ν ← ν ∪ j {Account for all filled output links}
end for
t ← t + dt
end while
c
return fi,j
Algorithm 2 Setup and initialization
for all i P
do
Ti ← ( c Sic )/pi
for all j do
for all c do
c
c
Si,j
← βi,j
Sic
c
fi,j ← 0
end for P
P
c
)/( c Sic )
pi,j ← pi · ( c Si,j
end for
end for
µ←∅
for all i : ∀c, Sic = 0 do
µ ←µ∪i
ẋci,j ← 0 ∀j, c
end for
ν←∅
for all j : Rj = 0 do
ν ←ν∪j
end for
c
c
return Ti , Si,j
, fi,j
, pi,j , µ, ẋci,j , ν
8
Algorithm 3 Computing the time to integrate forward, first-order case
for all j ∈
/ ν do P P
c
)/ẋci,j {Compute the filling time for every output link}
tj ← t + (Rj − i c fi,j
end for
for all i, j : i ∈
/ µ and j ∈
/ ν do
c
c
ti,j ← (Si,j
− fi,j
)/ẋci,j for any c {by construction (Section 2.1, item 8), all c’s fulfill their demands at the same
time.}
end for
dt ← min({ti,j }i∈µ,j
/
∈ν
/ , {tj }j ∈ν
/ , {Ti }i∈µ
/ )
return dt
3.2
Godunov discretization of the GSOM
The Godunov discretization of the first-order (LWR) model (1), first introduced as the Cell Transmission Model [3]
is well-known. The Godunov scheme discretizes a conservation law into small finite-volume cells. Each cell has a
constant value of the conserved quantity, and inter-cell fluxes are computed by solving Riemann problems at each
boundary. The Godunov scheme is a first-order method, so it is useful for simulating solutions to PDEs with no
second- or higher-order derivatives like the LWR formulation. In the CTM, the Riemann problem is stated in the
form of the demand and supply functions.
Since (11) is also a conservation law with no second- or higher-order derivatives, the Godunov scheme is applicable
as well [11]. However, due to the second PDE for ρw, an intermediate state arises in the Riemann problem and its
solution [1, 20, 10, 11]. This intermediate state has not always had a clear physical meaning, and this lack of
clarity likely inhibited the extension of the Godunov discretization to the multi-input multi-output node case. In
our following outline of the discretized one-input one-output flow problem, we make use of a physical interpretation
of the intermediate state due to [5].
A final note: in the first-order node model, we were able to ignore the first-order demand and supply functions
that generated the supplies Rj and per-class demands Sic . That is, we were agnostic to the method by which they
were computed (and to the input and output link densities), as they did not change during evaluation of the node
problem. As we will see shortly, this is not the case for the second-order flow problem (due to the intermediate state
and its interactions with the downstream link). Therefore, our explanation below makes use of the second-order
demand and supply functions S(ρ, w) and R(ρ, w), respectively.
3.2.1
Preliminaries
In this paper, we say that each vehicle class c has its own property value wc . The net (averaged over vehicle classes)
property of a link ℓ, denoted wℓ , is
P c c
w ρℓ
wℓ = c
(12)
ρℓ
P
where ρℓ , c ρcℓ is the total density of link ℓ.
In the second-order model, the fundamental diagram of a link is a function of both net density and net property
as defined above. This carries over to the demand and supply functions in the Godunov discretization [11, 5]. That
means that the supply and demand are defined at the link level with the net quantities ρℓ and wℓ . For an input link
i,
(
ρi vi
if ρi ≤ ρc (wi )
Si = S(ρi , wi ) =
(13)
F (wi ) if ρi > ρc (wi )
where ρc (wi ) is the critical density for property value wi and F (wi ) is the capacity for property value wi .
The demand from (13) is split among the classes and movements proportional to their densities and split ratios,
ρci
ρi
c
= βi,j
Sic .
Sic = Si
c
Si,j
The oriented priorities pi,j are computed according to (5), as before.
9
3.2.2
Computing supply
Solving for an output link’s supply is a much more complicated problem. We will begin our discussion with a review
of the one-input-one-output case [5, Sections 3.3, 3.4].
The supply R of the output link in this one-to-one case, where i is the input link and j is the output link, is
(
F (wi ) if ρM ≤ ρc (wi )
Rj = R(ρM , wi ) =
(14)
ρM vM if ρM > ρc (wi ).
We see that the supply of the downstream link is actually a function of the upstream link’s vehicles’ property, and
the density and speed of some “middle” state, M . The middle state is given by [5, (16)]
wM = wi
(
V (0, wi ) if V (0, wi ) < vj
vM =
vj
otherwise
ρM s.t. vM = V (ρM , wM )
(15a)
(15b)
(15c)
where vj = V (ρj , wj ) is the velocity of the downstream link’s vehicles and V (·) is the velocity function as given by
the fundamental diagram.
In [5], the intuition behind the meaning of the middle state is given as follows: the middle state vehicles are
actually those that are leaving the upstream link i and entering the downstream link j. As they leave i and enter
j, they clearly carry their own property (15a), but their velocity is upper-bounded by the velocity at which that the
downstream vehicles exit link j and free up the space that the i-to-j vehicles enter (15b). The middle density, ρM
(and therefore the downstream supply R), is then determined by both the upstream vehicles’ characteristics (i.e.,
wi ) and the downstream link’s flow characteristics (through vj ). In other words, the number of vehicles that can
fit into whatever space is freed up in the downstream link is a function of the drivers’ willingness to pack together
(defined by wi ). Since the meaning of supply Rj is “the number of vehicles that j can accept,” this means that Rj
is dependent on wi (15c).
Note that (15b) is also the equation by which congestion spills back from j to i: if j is highly congested, then vj
will be low. This then makes ρM large in (15c), which in turn leads to a small Rj in (14).
Now that we have reviewed the 1-to-1 case, we can consider how to generalize this to a multi-input-multi-output
node when we determine supply for several links.
4
4.1
Second-order node model
Multi-input-multi-output case
We saw that the reasoning behind the dependence of Rj on wi was that the spacing tendencies of i’s vehicles determine
the number of vehicles that can fit in j. Therefore, in generalizing to a multi-input-multi-output node, it makes sense
to define a link j’s “middle state” as being dependent on the vehicles actually entering link j. That is, if wj − , the w
just upstream of j, is the “middle state” of link j, then we say
P P
c
i
c wi ẋi,j
P
.
(16a)
wj − = P
c
i
c ẋi,j
The “j-upstream middle state” velocity and density, vj − and ρj − , are then
(
V (0, wj − ) if V (0, wj − ) < vj
vj − =
vj
otherwise
ρj − s.t. vj − = V (ρj − , wj − )
(16b)
(16c)
and the supply Rj is
Rj = R(ρj − , wj − ) =
(
F (wj − ) if ρj − ≤ ρc (wj − )
ρj − vj − if ρj − > ρc (wj − ).
(17)
Note that in (16a), we defined wj − as a function of ẋcij . Recall from the first-order node model that the ẋcij ’s
can change as (i) upstream links i exhaust their demand or (ii) downstream links j run out of supply. These two
10
events correspond to discrete state changes in our hybrid system. This, of course, carries over to the second-order
node model. This means that the j − quantities, and thus the supply Rj , change as ẋcij ’s change. Therefore, at each
discrete state transition, we need to determine the new supply for each output link j for the new mixture of vehicles
that will be entering j in the next discrete state.
We will explain how this is done through the following example. Suppose that at time t0 , we compute some
wj − , vj − , ρj − , and Rj with (16)-(17). Then, at time t1 , one of the ẋci,j for that j changes. At that point, we
recompute ρj and wj ,
ρcj (t1 ) = ρcj (t0 ) +
ρj (t1 ) =
wj (t1 ) =
X
c
P
1 X c
x (t1 )
Lj i ij
ρcj (t1 )
(18)
wc ρcj (t1 )
ρj (t1 )
c
where Lj is the length of j. Then, we recompute all the “middle state” variables and Rj using (16)-(17). Critically,
note that in this recomputation, the new vj at t1 is vj (t1 ) = V (ρj (t1 ), wj (t1 )). This means that vj − (t1 ) will also be
different than vj − (t0 ). This will carry through to create a Rj (t1 ) that is different from Rj (t0 ), and takes into account
both the vehicles that have moved into j between t0 and t1 , and the difference in properties wj − (t0 ) and wj − (t1 ).
Note that if wj − (t1 ) leads to significantly tighter packing (i.e., smaller inter-vehicle spacing) than wj − (t0 ), it is
conceivable that we will have Rj (t1 ) > Rj (t0 ) (especially if ρj (t0 ) is not that much smaller than ρj (t1 )).
Of course, the description above assumes isotropic mixing of all vehicle classes in the link j (recall we stated this
assumption for input links i in item (8) of the first-order GCNM requirements in Section 2.1).
Unlike supply, demand does not need to be recomputed since we assume the mixture of vehicles demanding each
movement remains the same (due to our isotropic mixture assumption)
In summary, we state the second-order generalization of the GCNM requirements as the same as the first-order
requirements P
stated in Section
P c2.1,c with the addition of a constraint enforcing the conservation of property via the
c
w , and the modification of the supply constraint such that the supply is computed
wc = j fi,j
second PDE: i fi,j
from the second-order fundamental diagram using the property of its incoming flows. This second point, where the
supply constraint is also dependent on the flow solution, only worsens the nonconvexity of the node problem. Indeed,
we are drifting away from a setting where the optimization-problem makes the most sense, and it may be more
helpful to understanding to consider the physical dynamics encoded by the solution methods.
In any case, we now have all the ingredients necessary to extend our first-order hybrid system node model to the
second-order formulation.
4.2
Dynamic system definition
We state the second-order node dynamic system as an extension to the first-order one presented in 2.2. Most of the
symbols remain the same. However, we make a few changes:
• Let µ ∈ 2I (where I is the set of all input links i) be the set of all exhausted input links (this set was introduced
in the first-order algorithm in Section 2.3). This is necessary to state the recalculations of supply according to
the steps in Section 4.1 when a link exhausts its demand and the net property of a j − changes.
• Paralleling j ∗ , let i∗ denote an exhausted input link. An input link is said to be exhausted at time t if
c
Si,j
− xci,j (t) = 0 ∀j, c.PNote that the formula for the time of demand exhaustion remains the same as in the
first-order case, Ti = ( c Sic )/pi .
• To accommodate recomputing of supply using (18), we will add more continuous states: the N ·M ·C quantities
x̄ci,j , which will denote the flow of movement i, j for class c for movement c since the last time that supplies
have been recalculated, and the M · C per-class densities of the output links, ρcj . This is necessary because,
following (16)-(18), the new supplies Rj for the new wj − will also take into account the vehicles xci,j , that have
already made the movement, so when determining when a link j is filled with its new supply we will need a
“fresh” counter of vehicles that have entered it.
• We assume we have the initial ρcj (0) for all j, c.
11
Our hybrid system (Q, X, Init, ẋci,j , x̄˙ ci,j , ρ̇cj , Dom, Φ) is
Q = {qµ,ν }, µ ∈ 2I , ν ∈ 2J
(19a)
X = RM·N ·C × RM·N ·C × RM·C
c
∀i, j, c;
xi,j (t = 0) = 0
∀i, j, c;
Init = Q × x̄ci,j (t = 0) = 0
c
ρj (t = 0) = ρcj (0)
∀j, c
c
Si,j
P
p
ij
c
c Si,j
[
if i ∈
/µ
i
c
ηj ′ ,j
· 1−
ẋi,j =
j ′ ∈ν,
c
∃ c: xci,j′ <Si,j
′
0
otherwise
x̄˙ ci,j = ẋci,j
X
ẋci,j
ρ̇cj =
(19b)
(19c)
(19d)
(19e)
(19f)
i
c
x : t ≥ Ti ∨ ∀j, c : xci,j = Si,j
c
t ≤ Ti , ∃j, c : xci,j ≤ Si,j
XX
q
x̄ci,j = Rj µ,ν
Dom(qµ,ν ) =
c
i
XX
q
x̄ci,j ≤ Rj µ,ν
i
c
′
(qµ,ν ′ , x )
Φ(qµ,ν , x) = (qµ′ ,ν , x′ )
∀i ∈ µ,
∀i ∈
/ µ,
∀j ∈ ν,
∀j ∈
/ ν
P P c
qµ,ν
if
i
c x̄i,j ∗ = Rj ∗
where ν ′ = ν ∪ j ∗
if t = Ti
c
∨ ∀j, c xci,j = Si,j
′
∗
where µ = µ ∪ i .
(19g)
(19h)
′c
c
c
c
where x′ = ({x′c
i,j }, {x̄i,j }, {ρj }) = ({xi,j }, {0}, ρj )
P c c
q
c w ρj
and Rj µ,ν from (16), (17), with wj = P
c
c ρj
When ẋcij = 0 for all i, j, c, the execution is complete and fijc = xcij .
Unsurprisingly, the second-order dynamic system is more complicated than the first-order one. The reader will
note that the discrete dynamics, as discussed before, are triggered by links j ∗ filling and links i∗ emptying. The filling
of a j ∗ and its entering into ν remains the same as the first-order system. The emptying or time-expiry of input
links, rather than being encoded in the continuous dynamics as was done in the first-order system’s (6d), is now in
the discrete dynamics in (19g),(19h). While it was possible to reduce the number of discrete states in the first-order
system by including i-emptying in the continuous dynamics, in the second order system, any change in the continuous
dynamics changes the output links’ wj − , so all continuous dynamics changes must trigger a recomputation of Rj ,
which, in (19), we do when µ or ν change.
Thankfully, although the second-order system seems much more complex than the first-order system, the secondorder solution algorithm is not that much more complicated than the solution method of the first-order system. We
will see why in the next Section.
4.3
Solution algorithm
Note that, just as in the first-order system, the second order system has constant continuous dynamics in each
discrete state. This means that, just as in the first-order case, we can easily compute the time that the next discrete
state transition occurs. Like in Section 2.3,
Pthis is the smallest of the tj ’s and Ti ’s. As we said, the input link “time
limits” remain the same as before, Ti = ( c Sic )/pi . The time that an output link runs out of supply and is filled
under the discrete state qµ,ν , if t0 is the time that the discrete state switched to qµ,ν and j’s supply was recomputed,
12
is similar to (10),
q
Rj µ,ν
tj = t0 + P P P
i
j
q
c
c ẋi,j
= t0 +
R µ,ν
j
S i
P
1
−
η
p
i,j
j ′ ,j
i∈µ
/
(20)
j ′ ∈ν,
c
∃ c: xci,j′ <Si,j
′
q
but differs in two key ways. First, the term for supply is the recomputed Rj µ,ν from (16), (17) (this also accounts
for why the numerator in (20) does not have a subtracted quantity as in (10), as that subtraction of already-filled
supply is accounted for in the recomputed supply. Second is that the denominator is summed over i ∈
/ µ rather than
all i, as the set µ is not in the definition of the first-order dynamic system as stated in Section 2.2.
We now state solution algorithm for the second-order dynamic system. It follows the same logic as the first-order
case: identifying the next Ti or tj to occur, finding the constant continuous-time dynamics that the system will
evolve under until that time, integrating forward in time, a new step of recomputing supply, and repeating.
Algorithm 4 Second-order node model solution algorithm
c
, pi , ηji ′ ,j , Rj {Rj is only the initial Rj and will be re-computed}
Input: Sic , ρcj , wc , βi,j
c
Output: fi,j
c
c
Ti , Si,j
, fi,j
, pi,j , µ, ẋci,j , ν, wi , x̄ci,j , ← (Algorithm 5)
t ← 0 {Begin main loop}
while ∃ i, j, c : ẋci,j 6= 0 do
for all i, j, c : i ∈
/ µ do
c
S i
Si,j
c
ηj ′ ,j {Compute continuous-time dynamics}
ẋi,j ← pi,j P S c · 1 −
c
i,j
j ′ ∈ν,
c
∃ c: xci,j′ <Si,j
′
end for
dt ← (Algorithm 6)
for all i, j, c do
c
c
fi,j
← fi,j
+ ẋci,j · dt
c
c
x̄i,j ← ẋi,j · dt
end for
ρj , wj ← (Algorithm 8)
c
c
for all i : ∀j, c, Si,j
− fi,j
= 0 do
µ ← µ ∪ i {Account for all emptied input links}
ẋci,j ← 0 ∀ j, c
end for
for all j : t + dt = tj do
ν ← ν ∪ j {Account for all filled output links}
end for
t ← t + dt
end while
c
return fi,j
Algorithm 5 Setup and initialization, second-order case
c
c
Ti , Si,j
, fi,j
, pi,j , µ, ẋci,j , ν ← (Algorithm 2)
for all iPdo c c
w ρ
wi = cρi i
end for
for all i, j, c do
x̄ci,j ← 0
end for
c
c
return Ti , Si,j
, fi,j
, pi,j , µ, ẋci,j , ν, wi , x̄ci,j
13
Algorithm 6 Computing the time to integrate forward, second-order case
for all j do
Rj ← (Algorithm 7)
end for
for all j ∈
/ ν do
tj ← t + Rj /ẋci,j {Compute the filling time for every output link}
end for
for all i, j : i ∈
/ µ and j ∈
/ ν do
c
c
ti,j ← (Si,j
− fi,j
)/ẋci,j for any c
end for
dt ← min({ti,j }i∈µ,j
/
∈ν
/ , {tj }j ∈ν
/ , {Ti }i∈µ
/ )
return dt
Algorithm 7 Second-order computation of supply
wj − =
P P
c
i P
c wi ẋi,j
P
c
i
c ẋi,j
if V (0, wj − ) < vj then
vj − = V (0, wj − )
else
vj − = vj
end if
ρj − s.t. vj − = V (ρj − , wj − )
if ρj − ≤ ρc (wj − ) then
Rj = R(ρj − , wj − )
else
Rj = F (wj − )
end if
return Rj
Algorithm 8 Recomputing the downstream links’ density and property
P
ρcj ← ρcj + L1j i xcij
P c
ρj ← Pc ρj
w c ρc
wj ← cρj j
return ρj , wj
14
4.4
Second-order extension of the GCNM requirements?
In solving the second-order node problem, the fact that the supply must be continually recalculated can be interpreted
as indicating that the use of the supply and demand quantities is not as natural as in the first-order case. We see
that demand S(ρ, w) and supply R(ρ, w) alone (i.e., not including the ρ and w) is not enough to solve the node
problem in the second-order case: the link ρ and w quantities are required. This is not unnatural: the node problem
is, after all, a Riemann problem to resolve discontinuities in ρ and w. In the first-order case, the node problem is
often stated in terms of supply and demand instead of the actual conserved quantity ρ because i) they have a more
intuitive physical meaning, and ii) since link densities are not needed beyond their use in S(ρ) and R(ρ) for the
first-order problem, beginning with S(ρ) and R(ρ) simplifies the problem by removing one step. However, we have
seen that using the beginning-with-supply-and-demand framework in the second-order case does not simplify the
problem along the lines of ii, as we still need to make use of ρ and w. Therefore, in the future it may make more
sense to state the second-order node problem as taking inputs of ρ and w for all links, rather than its inputs being
S(·) and R(·). That would remove the unintuitive nature of needing to “recompute supply.”
5
Conclusion
This paper presented a generalization of the widely-used “Generic Class of Node Model” macroscopic traffic junction
models to the so-called “General Second Order Model” flow model. This paper’s results allow the extension of
macroscopic modeling of variable-behavior flows (based on different mixtures of driving behavior) to complex general
networks. Many of these flows and networks had been only able to be modeled by microscopic models that consider
the behavioral variability on a per-car level, but macroscopic models that can capture the aggregate features as a
more granular model can greatly increase the scale of problems that we are able to study. As stated before, the
second-order flow models have been used to represent flows of great contemporary interest, such as mixtures of
human-driven and autonomous vehicles [17]. Researchers and practitioners will need to use every tool available to
understand and predict the system-level changes that will arise from the traffic demand changing not just in size,
but in characteristics.
Some immediate avenues for future refinement of second-order macroscopic models presented themselves during
this paper. As mentioned in Section 2.1.1, we do not address node supply constraints in this paper’s node models.
However, the immediate application of a general, multi-input-multi-output second-order node model, macroscopic
simulation of mixed-human-driven-and-autonomous traffic on complex networks, is of particular concern in scheduling
problems involving green light timing. Future work, then, should incorporate the node supply constraints into the
general second-order node problem so that they may be used in signal optimization and the still-developing potential
that connected and automated vehicles bring to traffic control.
References
[1] A. Aw and M. Rascle. Resurrection of ‘second order’ models of traffc flow. SIAM Journal on Applied Mathematics, 63(1):916–938, 2000.
[2] R. Corthout, G. Flötteröd, F. Viti, and C. M. Tampére. Non-unique flows in macroscopic first-order intersection
models. Transportation Research Part B: Methodological, 46(3):343–359, Mar. 2012.
[3] C. Daganzo. The cell transmission model: A dynamic representation of highway traffic consistent with the
hydrodynamic theory. Transportation Research Part B: Methodological, 28(4):269–287, 1994.
[4] C. Daganzo. The cell transmission model, Part II: Network traffic. Transportation Research Part B: Methodological, 29(2):79–93, 1995.
[5] S. Fan, Y. Sun, B. Piccoli, B. Seibold, and D. B. Work. A Collapsed Generalized Aw-Rascle-Zhang Model and
Its Model Accuracy. arXiv preprint arXiv:1702.03624, 2017.
[6] G. Flötteröd and J. Rohde. Operational macroscopic modeling of complex urban road intersections. Transportation Research Part B: Methodological, 45(6):903–922, July 2011.
[7] G. Gentile, L. Meschini, and N. Papola. Spillback congestion in dynamic traffic assignment: a macroscopic flow
model with time-varying bottlenecks. Transportation Research Part B: Methodological, 41(10):1114–1138, 2007.
15
[8] S. E. Jabari. Node modeling for congested urban road networks. Transportation Research Part B: Methodological,
91:229–249, Sept. 2016.
[9] J. Lebacque and M. Khoshyaran. First-order macroscopic traffic flow models: intersection modeling, network
modeling. In The 16th International Symposium on Transportation and Traffic Theory (ISTTT), pages 365–386,
2005.
[10] J.-P. Lebacque, S. Mammar, and H. Haj-Salem. The Aw–Rascle and Zhang’s model: Vacuum problems, existence
and regularity of the solutions of the Riemann problem. Transportation Research Part B: Methodological,
41(7):710–721, Aug. 2007.
[11] J.-P. Lebacque, S. Mammar, and H. H. Salem. Generic second order traffic flow modelling. In Transportation
and Traffic Theory 2007. Papers Selected for Presentation at ISTTT17, pages 755–776, 2007.
[12] M. Lighthill and G. Whitham. On kinematic waves I: Flow movement in long rivers. II: A theory of traffic flow
on long crowded roads. Proc. Royal Society of London, Part A, 229(1178):281–345, 1955.
[13] D. Ni and J. D. Leonard. A simplified kinematic wave model at a merge bottleneck. Applied Mathematical
Modelling, 29(11):1054–1072, Nov. 2005.
[14] P. Richards. Shock waves on the highway. Operations Research, 4(1):42–51, 1956.
[15] E.-S. Smits, M. C. Bliemer, A. J. Pel, and B. van Arem. A family of macroscopic node models. Transportation
Research Part B: Methodological, 74:20–39, Apr. 2015.
[16] C. M. J. Tampère, R. Corthout, D. Cattrysse, and L. H. Immers. A generic class of first order node models for
dynamic macroscopic simulation of traffic flows. Transportation Research, Part B, 45(1):289–309, 2011.
[17] R. Wang, Y. Li, and D. B. Work. Comparing traffic state estimators for mixed human and automated traffic
flows. Transportation Research Part C: Emerging Technologies, 78:95–110, May 2017.
[18] M. Wright, R. Horowitz, and A. A. Kurzhanskiy. A dynamic system characterization of road network node
models. In Proceedings of the 10th IFAC Symposium on Nonlinear Control Systems, volume 49, pages 1054–
1059, August 2016.
[19] M. A. Wright, G. Gomes, R. Horowitz, and A. A. Kurzhanskiy. On node and route choice models for highdimensional road networks. Submitted to Transportation Research Part B, 2016.
[20] H. M. Zhang. A non-equilibrium traffic model devoid of gas-like behavior. Transportation Research Part B:
Methodological, 36(3):275–290, 2002.
16
| 3cs.SY
|
From the Skin-Depth Equation to the Inverse RFEC
Sensor Model
arXiv:1609.04810v1 [cs.CE] 15 Sep 2016
Raphael Falque, Teresa Vidal-Calleja, Gamini Dissanayake, and Jaime Valls Miro
University of Technology Sydney, Australia
Emails: [email protected], [email protected],
[email protected], [email protected]
Abstract—In this paper, we tackle the direct and inverse
problems for the Remote-Field Eddy-Current (RFEC) technology.
The direct problem is the sensor model, where given the geometry
the measurements are obtained. Conversely, the inverse problem
is where the geometry needs to be estimated given the field
measurements. These problems are particularly important in
the field of Non-Destructive Testing (NDT) because they allow
assessing the quality of the structure monitored. We solve the
direct problem in a parametric fashion using Least Absolute
Shrinkage and Selection Operation (LASSO). The proposed
inverse model uses the parameters from the direct model to
recover the thickness using least squares producing the optimal
solution given the direct model. This study is restricted to the
2D axisymmetric scenario. Both, direct and inverse models, are
validated using a Finite Element Analysis (FEA) environment
with realistic pipe profiles.
Keywords: Remote Field Eddy Current (RFEC), direct
problem, inverse problem, Non Destructive Evaluation (NDE)
I. I NTRODUCTION
The Remote Field Eddy Current (RFEC) technology allows
in-line inspection of ferromagnetic pipelines. Tools based on
this technology are usually composed of an exciter coil and
one or several receivers. The exciter coil, driven by a lowfrequency alternative current, generates an electromagnetic
field that flows outside the pipe near the exciter coil and flows
back inward the pipe at a remote area as shown in Fig. 1(a).
The receivers are located in the remote part and record the
magnetic field. As shown in the figure the magnetic field
passes twice the pipe’s wall; this phenomenon is commonly
referred as the double through wall in the literature [1].
When the magnetic field flows through a ferromagnetic
medium (i.e. the pipe), the amplitude of the magnetic field
is attenuated, and the phase is delayed. Due to the double
through wall penetration, the magnetic field recorded by the
receiver has been modified by different areas of the pipe: when
it flows outward the pipe near the exciter coil and when it
flows backwards the pipe in the remote area. Hence inferring
the geometry of the pipe from the signal information is a
challenging task since a single measurement is correlated with
different areas of the geometry.
Inferring the pipe’s geometry from the tool signal corresponds to solving the inverse problem of the RFEC. This
problem has been studied in the literature for the 2D axisymmetrical case of a perfect pipe with a single crack. The
problem is then formulated as recovering the shape (size and
Fig. 1: Representation of the RFEC phenomenon. From the
global phenomenon (a), we propose a parametric direct model
that consider independently the flow of the magnetic field in
the air (b), and the local attenuation due to the magnetic field
flowing through the pipe thickness (c).
width) of the single defect [2–4]. These approaches solve the
problem using data-driven techniques and bypass the problem
of recovering the full pipe’s geometry. These solutions fit the
case of steel material, where most pipe bursts are due to cracks;
in the case of cast-iron pipes, the material is more sensitive to
corrosion. Hence the geometry of the pipe has a more organic
shape rather than a single isolated crack. Therefore, for castiron pipes recovering the full pipe’s geometry is critical.
Some other approaches from the literature consist of modifying the tool design. The use of several receivers located
at different axial locations from the exciter coil allows using
redundancy of the information provided by passing through
the same location to recover the full pipe’s geometry [5], [6].
However, this approach leads to longer tools and require more
electrical power to operate the multiple sensors and/or exciter
coils. Due to the in-line nature of the RFEC tools, the mobility
and the battery consumption have to be optimised.
Particularly for this work, to allow simple hardware design,
we consider the case of an elementary RFEC tool composed
of a single exciter coil and a single receiver. The aim of
this paper is to obtain an inverse sensor model of the RFEC
phenomenon which, given a set of continuous magnetic field
measurements, allows to recover the full pipe’s geometry for
a 2D axisymmetric scenario.
The remainder of the paper is organised as follows. In
Sec. II, we give conceptual ideas about the behaviour of the
magnetic field. We then propose a direct model solved using
Least Absolute Shrinkage and Selection Operation (LASSO).
From the direct model, we derive an inverse model formulated
in a least-square form. The dataset generated with Finite
Element Analysis (FEA) and the experimental results are given
in Sec. III. We finally discuss the performance and limitations
of the proposed model in Sec. IV.
II. M ODELLING OF THE RFEC PHENOMENON
The direct problem of the RFEC phenomenon consists
of mapping the pipe’s geometry to the sensor measurement
through a sensor model. Conversely, the inverse (or indirect)
problem consists of finding the model that maps the sensor
measurements into the pipe’s geometry. The main goal is to
solve the inverse problem, however, solving the direct problem
provides qualitative and quantitative information on the form
of the inverse model. Before to consider the direct and inverse
problem, we discuss some high-level insight of the RFEC
technology. Particular attention is dedicated to understanding
how the geometry near to the exciter coil impacts the sensor
measurements. Qualitative descriptions of the overall RFEC
phenomenon have been broadly studied and in depth descriptions are available in the literature [1], [7], [8].
A. Background information
As shown in [1], it is possible to consider a defect in the
pipe’s geometry as an anomalous source model. The defect
is then replaced by an independent source of magnetic field
superposed to the pipe (see Fig. 12 in [1]). Knowing that
the magnetic field gets attenuated while travelling through
a ferromagnetic medium, the idea is to replace the lack of
attenuation from the defect by a source of magnetic field
superposed to a perfect pipe. Following the same idea, one
could consider the pipe’s thickness as an attenuation of the
signal.
Let us consider a pipe with an organic geometry (i.e. a
corroded pipe), defined by a piecewise constant profile (as
shown in Fig. 1). Each piece is then considered as a local
source of attenuation. We then dissociate the global RFEC
phenomenon shown in Fig. 1(a) in two part: (i) the attenuation
due to the magnetic field flowing in the air, and (ii) the
local attenuation due to the magnetic field flowing through
the pipe (the former one is shown in Fig. 1(b) and the latter
in Fig. 1(c)).
The global attenuation of the magnetic field propagating in
the air (i), mostly due to field radiating from the coil, is a
constant term for a given excitation and global geometry. The
definition of this value is however complex since it involves
many parameters (e.g. dimensions and excitation of the coil,
diameter of the pipe, distance between the exciter and the
receiver).
The local interaction of the electromagnetic wave with the
pipe (ii) can be described as a plane wave propagating through
a homogeneous, isotropic, and conductive medium (i.e. the
pipe). This phenomenon can be described by deriving the skin
depth equation from the Maxwell equations and can be written
as follow;
s
s
ωµσ
ωµσ
t+ωt
−j
t
−
2
2 e
(1)
B(t) = B0 e
{z
},
|
{z
}|
phase contribution
amplitude
with B the magnetic field, B0 the initial value of the magnetic
field, ω the frequency, µ the magnetic permeability of the
medium, σ the electrical conductivity, and t the distance
travelled by the wave. The amplitude and the phase-lag are
usually the measurements recorded by the RFEC tools since
they have a log-linear or linear relationship with the thickness
of the conductive medium:
r
ωµσ
t
φlocal =
2
r
(2)
ωµσ
t
ln(B)local = ln(B0 ) −
2
In this paper, we model the direct and inverse problem
uniquely with the amplitude. However, a similar study could
be done with the phase-lag.
B. Direct problem
We now consider the direct problem, which consists of
finding a function h such that h : t −→ y, where y is
the sensor measurements and t a set of thickness values that
describe the pipe’s geometry around the RFEC tool.
Let us first consider the case of a single measurement. Using
the wave superposition principle, we can then add (i) and (ii)
as follow;
k
X
y = y0 −
wi ti + ,
(3)
i=1
with y0 the constant term described in (i), ti the ith thicknesses
of the pipe piece (the pipe’s geometry is approximated as a
piecewise constant profile a shown in Fig.
p 1(a)), and wi the
unknown parameters that embeds both − ωµσ
2 from (ii) and
a location weight. Since this approach is an approximation of
the actual phenomenon, we consider the noise contribution
that contains both the actual sensor noise and an unmodelled
non-linearity. Given enough independent measurements, the
optimal values for the weights can be found using a least
square formulation.
Let us now consider a set of m measurements where each
measurement is associated to k local average thicknesses that
are regularly spaced over the length of the tool. This can be
seen as moving the tool within the pipe simultaneously to
gathering pipe thickness information in a sliding window. The
sliding window approximates the geometry as a piecewiseconstant profile as describe in Fig. 1(a). We then formulate
Eq. (3) in a matrix form to combine the m set of measurement
and thickness values together,
y = T w + ,
(4)
The constant term y0 from Eq. (3) is unknown (it depends
on the excitation, the number of turn in the coil, the electromagnetic properties of the air and the distance between the
exciter and the sensor). It is, however, possible to estimate
y0 from the measurements, therefore, we include it into the
vector of the model parameters w which is defined as,
y0
w1
w = ... ,
(5)
wk−1
wk
T is the matrix that contains the local average thickness
information;
1 t11 t12 . . . t1k
1 t21 t22 . . . t2k
T = .
(6)
..
..
.. ,
..
..
.
.
.
.
1 tm1 tm2 . . . tmk
and y the vector with all the sensor measurements.
y1
y2
y = . .
..
(7)
ym
In order to select parameters ŵ that reflects the attenuation
of the magnetic field through its path, there is a need for an
optimisation method that sets the weights of the non-relevant
thicknesses to zero. It can be obtained by learning the model
parameters with LASSO [9]. Using this parameter selection
also allows avoiding over-fitting the irrelevant parameter that
would be performed by a closed form solution. More formally,
LASSO corresponds to the least square formulation with L1 regularisation as
min k T ŵ − y k2 +α k ŵ k1 ,
(8)
with α the regularisation parameter, which is learned with
an iterative process. Finally, the direct problem is solved by
estimating ŷ as
ŷ = |{z}
T ŵ ,
(9)
h(T )
with the proposed model h(T ).
C. Inverse problem
After estimating the parameters of the direct model (3), we
now consider the inverse problem. More formally, we want to
find the inverse function h−1 such that h−1 : y −→ t. Due
to the double-through wall phenomenon, h cannot be simply
inverted as the geometry under the exciter coil and the receiver
are convoluted in the measurements. Instead, having the direct
problem expressed as a linear model, allows formulating the
inverse problem in a closed form solution, which can be
obtained with least squares.
We consider here solving the inverse problem for a long
pipe section as one system (i.e. recovering the thickness of the
full pipe at the same time). To solve the optimisation problem
through least squares, the degree of freedom (which is equal
to the number of equations minus the number of parameters)
of the system has to be positive or null. As a rule of thumb,
to avoid over-fitting, the degree of freedom should be superior
to ten.
Let us consider the inspection of a long pipe section using
a RFEC tool. During the inspection, a set of m discrete
measurements are collected at regular intervals along the pipe.
We approximate the pipeline geometry as a piecewise-constant
profile with n steps of average thickness t. n is chosen to be
ten times smaller than m.
We then re-write Eq. (3) so it can be formulated as a global
optimisation problem, where all the sensor measurements y
are related to all the piecewise thicknesses ti as
y = W t̂ + y0 ,
(10)
with y and y0 defined in Eq. (3) and (7). t̂ is the set of the
all the thickness estimates for each value of the piecewiseconstant pipeline profile, defined as
t1
t2
t̂ = . .
(11)
..
tn
W is an m × n matrix that contains the relationship
between thickness values and sensor measurements and is
defined by the parameters learned from the direct model. In
practice, each line of W contains the weights w for the local
thickness values and is set to 0 for the others thickness values.
Since there are multiple measurements between the ith and
(i + 1)th values, spatial weights ai and bi are used to define
the influence of the piece proximity as:
a1 w1
..
.
aj w1
W =
0
.
..
0
b1 w1 + a¯1 w2
..
.
b1 wk
..
.
0
..
.
0
..
.
bj w1 + aj w2
aj+1 w1
..
.
...
..
.
...
...
..
.
bj wk
bj+1 wk−1 + aj+1 wk−1
..
.
0
bj+1 wk
..
.
0
0
..
.
...
..
.
...
...
..
.
0
...
0
0
0
...
0
..
.
0
,
0
...
am wk
(12)
Fig. 2: 3D representation of the 2D axisymmetric simulation.
(1) the air box, present all around the pipe, (2) the exciter coil
as a rectangular cross multi-turn copper coil, (3) the receiver,
simplified as a point measurement, and (4) the cast-iron pipe.
with ai and bi defined as follow,
bi
ai + bi
ai
b¯i ,
ai + bi
a¯i ,
(13)
(14)
where ai is the distance from the point measurement to the
centre of the ith step, and bi the distance from the point
measurement to the centre of the (i+1)th step. We then obtain
the thickness estimates t by solving the linear least squares in
closed form,
t̂ = (W t W )−1 W t (y − y0 ) .
|
{z
}
which is simplified to a point measurement (e.g. it could
simulate a hall effect sensor), and (4) the cast-iron pipe that has
its geometry defined from pipe segments extracted from the
decommissioned pipeline. A schematic of the global system
is shown in Fig. 2 with the thickness gains corresponding to
Bell and Spigot (B&S) joints that link pipe segments together.
All medium are approximated as homogeneous and
isotropic. The air and copper material properties are defined
using built-in materials from the COMSOL library. To get
a realistic 2D axisymmetric modelisation of the pipe, the
pipe’s magnetic properties are obtained by analysing a pipe
sample with a Superconducting QUantum Interference Device
(SQUID). We then have both the geometry and the material
properties that come from a real pipeline. The material properties used in the model are displayed in Tab. I. The conductivity
of the air is set to a non-zero value to avoid computational
singularities. The stability of the simulation has been validated
for different meshing sizes, air box sizes and other parameters.
The meshing size is defined according to the wavelength λ
of the magnetic field in each material (i.e. at least five times
smaller than the wavelength), with λ defined as:
λ= r
(15)
h−1 (y)
III. R ESULTS
FEA simulations with a 2D-axisymmetric geometry have
been used to validate the proposed methods in a controlled
environment. We look here at the performance of both the
direct and inverse model applied to a long pipe section with a
known geometry. Note that although the validation has been
done for a 2D-axisymmetric scenario, the proposed models
can be adapted for any RFEC axisymmetric tool.
A. FEA environment
This section describes how the data for validation was
obtained. In the context of our particular research project that
motivates this paper, we used data from a cast-iron pipeline,
which has been decommissioned and is currently dedicated for
research purposes. This particular pipeline was laid more than
hundred years ago, and some parts of the pipe are significantly
corroded. Some pipes section have been exhumed, grid-blasted
and analysed. The material properties of the cast-iron have
been measured, and the corrosion’s profile have been captured
with a laser scanner, using the process described in [10]. We
generated a 60 m long 1-D profile based on the geometry
of exhumed pipe segments. Once incorporated into a FEA
simulation environment, this realistic profile has provided
sufficient data for validation.
The FEA used here is done using COMSOL Multiphysics in
a 2D-axisymmetric scenario. The FEA geometry is composed
of four different components: (1) the air box defining the limits
of the FEA scenario, (2) the exciter coil, which is modelled
as a rectangular cross multi-turn copper coil, (3) the receiver
2π
.
ω.µ.σ
2
(16)
Using Eq.(16) with the magnetic properties of each material
we can define the minimum size for the meshing at each part
of the scenario. The minimum size of each element in the
meshing is given in Tab. I.
The pipeline’s inspection has been simulated using a parameter sweep for the position of the RFEC tool within the pipe
for the 60m length. The amplitude and the phase-lag of the
electromagnetic phase have been recorded for each position of
the parameter sweep.
B. Application of the direct model
We now consider the direct problem applied to a dataset
generated from the FEA environment described previously.
The aim here is to learn the parameters defined in Eq. (5).
As shown in Fig. 2, note that to make it more realistic the
simulated thickness profile contains B&S joints. The thickness
of the B&S joints are much larger than the other parts of the
pipe, hence, due to the linear nature of proposed model, these
data that relate to the B&S are expected to perform poorly. We
solve the direct model for three datasets: (a) the first dataset
include the complete set of data, (b) the data with a B&S joint
located near the receiver have been removed in the second
dataset, and (c) the data near both the exciter and receiver
have been removed in the third dataset.
TABLE I: Properties of each material
material
Air
Cast-Iron
Copper (coil)
µr
1
4.96
1
r
1
1
1
ρ [S/m]
10
1.12e7
5.99e7
l [m]
0.1
0.012
0.0115
(a)
(b)
(c)
Fig. 3: Due to the presence of the B&S joints inducing a sort of non-linearity in the data, the model described in Eq. (8) is
not longer valid. Therefore, we remove data where the B&S joint has an impact on the exciter coil (a), and where it has an
impact on the receivers (b). The model learned from the filtered data is shown in (c).
We compared the estimated ŷ and the actual sensor measurement y in Fig. 3 with each sub-figure dedicated to each
dataset. In Fig. 3(a), we set the colour information to reflect
the impact of the B&S joints located near the receiver (the
yellow points are more influenced by the B&S). In Fig. 3(a),
the blue points represent the estimation with the B&S located
on top of the receiver. The third dataset shown in Fig. 3(c)
shows a better regression.
Since the simulations are done in a controlled environment,
the locations of the B&S joints are known, thus removing these
particular data is a trivial task. In the case of an unknown
environment, one could classify the construction features of
the pipeline, which can be done using a Support Vector
Machine (SVM) classifier such as in [11]. An alternative
would consist of automating the data selection with methods
such as Peirce’s [12] or Chauvenet’s [13] criterion.
The parameter α from Eq. (8) is chosen using ten-fold crossvalidation. The estimated parameters w and measurements
Fig. 4: Evolution of the Mean Square Error (MSE) versus
the value of the α parameter (using cross-validation). The α
indicated in blue corresponds to the sparsest solution within
one standard error of the MSE (it is the chosen one).
of the goodness of fitting (Mean Square Error MSE and the
coefficient of determination R2 ) are available in Tab. II. As
expected, the constant is a positive term, and the attenuation
coefficients are negative terms. Moreover, we can see that the
geometry near to the receiver and near to the exciter coil have
a more important role which is reflected by higher weights.
C. Application of the inverse problem
After solving the direct problem, all the parameters required
for the inverse problem are known. We consider recovering the
60 metres of pipe thickness as a global problem and the full
geometry is recovered from the set of all the measurement
using the formulation established in Eq. (15).
The inverse problem relies on the parameters learnt for
the direct problem. In the case where all the parameters
from the RFEC tool and the magnetic properties of the
pipe specimen are known, it is possible to obtain direct and
inverse models through FEA simulation. Otherwise, multiple
thickness measurements have to be collected from the studied
pipe. These thickness measurements at specific locations are
needed to learn the parameters. In practice, collecting such
measurements is a feasible task considering the few parameters
that are present in the proposed model.
A zoom-in of the pipe profile reconstructed is shown in
Fig. 5. The estimation is shown in blue, and the ground
truth is shown in orange. The spikes in the ground-truth
correspond to the B&S joints. As predicted, the proposed
inverse model cannot recover these thicknesses due to the nonlinear behaviour of the magnetic field in these regions.
The estimation error for the thickness of the 60 metre-long
pipe is of 0.1mm for the MSE and 10.3mm for RMSE (with
the average thickness of the pipe being around 30mm). If
we remove the areas with the B&S joints, the RMSE falls
to 2.6mm.
TABLE II: Output of the Least Absolute Shrinkage and Selection Operation. The localised increase of thickness (e.g. B&S joints)
lead to the spread the weights. This is visible by comparing the lines of the table.
coef
dataset (a)
dataset (b)
dataset (c)
cst
y0
w1
w2
Exciter
w3
w4
-17.6
-26.0
-20.9
-5.7
-16.7
-22.4
-19.9
-3.3
-16.0
-48.3
-103.0
0
w19
w20
w21
w22
-5.7
-3.2
-0.2
-2.0
-2.7
-7.8
-10.3
-5.5
-1.9
-1.1
-1.6
0
-6.2
-41.5
0
0
0
0
0
-2.9
-11.2
IV. D ISCUSSION
In this paper, we tackle the direct and inverse problems for
a 2D-axisymmetric RFEC tool composed of a single exciter
coil and a single receiver. We have shown, using FEA, that
both direct and inverse model are accurate for recovering pipe
sections with organic geometry (which is often the case for
corroded cast-iron pipes). The FEA model used to generate the
dataset is based on a realistic geometry and material properties
obtained from old cast-iron pipes.
The proposed direct model is solved using LASSO. The
L1 -regularisation allows selecting automatically the important
thickness areas for the model while reducing the number of
parameters. This result into a simplistic model, with most
important thicknesses located next to the exciter coil and the
receiver. The inverse problem relies on the parameters from
the direct problem and is solved using least squares. For
training the proposed inverse model, thickness measurements
have to be collected from the pipe. In practice, collecting such
measurements is a feasible task considering the few parameters
of the proposed model.
The main limitation of the proposed method lies in the form
of the proposed model. The linear model allows solving the
inverse problem in a closed-form. The model gives accurate
results apart for the B&S joints. For these extremely thick
thicknesses, the magnetic field would flow through the path of
least resistance which cannot be captured by a linear model.
Furthermore, to the outstanding thicknesses, the magnetic
properties are considered constant for the full pipeline. In
practice, pipes can have a variation of magnetic properties;
this case is not studied here.
In future work, we are planning to apply this method for
a tool with a sensor array (3D case). It can be shown that
Thickness (mm)
50
estimation
ground-truth
40
30
20
10
0
36
38
40
42
44
Receiver
w23
w24
w5
46
48
50
52
distance (m)
Fig. 5: Thickness estimated in closed-form. The estimation is
shown in blue, and the ground-truth in orange.
w25
w26
w27
-19.6
-19.1
-8.6
-9.1
-24.5
-63.1
-2.5
0
-46.3
-36.9
-29.0
-3.9
Goodness of Fit
MSE
R2
0.296
0.5754
0.174
0.6391
0.016
0.8779
the attenuation from the exciter behaves as a circumferential
offset [14]. Therefore, it is possible to deconvolute the signal
in a similar fashion.
ACKNOWLEDGMENT
This publication is an outcome from the Critical Pipes
Project funded by Sydney Water Corporation, Water Research
Foundation of the USA, Melbourne Water, Water Corporation
(WA), UK Water Industry Research Ltd, South Australia Water
Corporation, South East Water, Hunter Water Corporation,
City West Water, Monash University, University of Technology
Sydney and University of Newcastle. The research partners are
Monash University (lead), University of Technology Sydney
and University of Newcastle.
R EFERENCES
[1] D. L. Atherton, “Remote field eddy current inspection,” IEEE Transactions on Magnetics, vol. 31, no. 6, pp. 4142–4147, 1995.
[2] M.-È. Davoust, L. Brusquet, and G. Fleury, “Robust estimation of flaw
dimensions using remote field eddy current inspection,” Measurement
Science and Technology, vol. 17, no. 11, pp. 3006–3014, nov 2006.
[3] M.-È. Davoust, L. Brusquet, and G. Fleury, “Robust Estimation of Hidden Corrosion Parameters Using an Eddy Current Technique,” Journal
of Nondestructive Evaluation, vol. 29, no. 3, pp. 155–167, jun 2010.
[4] A. Tao, W. Zhang, Z. Wang, and Q. Luo, “Design on forward modeling
of RFEC inspection for cracks,” Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering,
ISEEE 2014, vol. 1, pp. 579–584, 2014.
[5] E. Cardelli, N. Esposito, and M. Raugi, “Electromagnetic Analysis of
RFEC Differential Probes,” IEEE Transactions on Magnetics, vol. 29,
no. 2, pp. 1849–1852, 1993.
[6] A. Skarlatos, G. Pichenot, D. Lesselier, M. Lambert, and B. Duchêne,
“Electromagnetic Modeling of a Damaged Ferromagnetic Metal Tube
by a Volume Integral Equation Formulation,” IEEE Transactions on
Magnetics, vol. 44, no. 5, pp. 623–632, 2008.
[7] W. Lord, Y. S. Sun, S. Udpa, and S. Nath, “A Finite Element Study
of the Remote Field Eddy Current Phenomen,” IEEE Transactions on
Magnetics, vol. 24, no. 1, pp. 435–438, 1988.
[8] Y. S. Sun, D. Cooley, H. Han, S. Udpa, and W. Lord, “Efforts
towards gaining a better understanding of the remote field eddy current
phenomenon and expanding its applications,” IEEE Transactions on
Magnetics, vol. 32, no. 3, pp. 1589–1592, may 1996.
[9] R. Tibshirani, “Regression Selection and Shrinkage via the Lasso,”
Journal of the Royal Statistical Society, vol. 58, no. 1, pp. 267–288,
1996.
[10] B. Skinner, T. Vidal-calleja, J. Valls Miro, F. D. Bruijn, and R. Falque,
“3D Point Cloud Upsampling for Accurate Reconstruction of Dense
2.5D Thickness Maps 3D Point Cloud Acquisition,” in Australasian
Conference on Robotics and Automation (ACRA), 2014.
[11] T. Vidal-calleja, J. V. Miro, and F. Mart, “Automatic Detection and
Verification of Pipeline Construction Elements with Multi-modal data,”
in IROS, 2014.
[12] B. Peirce, “Criterion for the rejection of doubtful observations,” The
Astronomical Journal, vol. 2, no. 45, pp. 161–163, 1852.
[13] C. William, A Manual of Spherical and Practical Astronomy. Philadelphia, J. B. Lippincott {&} co.; London, Trubner {&} co., 1863.
[14] R. Falque, T. Vidal-calleja, J. Valls Miro, D. C. Lingnau, and D. E.
Russell, “Background Segmentation to Enhance Remote Field Eddy Current Signals,” in Australasian Conference on Robotics and Automation
(ACRA), 2014, pp. 1–9.
| 3cs.SY
|
arXiv:1509.03122v1 [math.AC] 10 Sep 2015
REDUCTION OF LOCAL UNIFORMIZATION TO THE CASE OF
RANK ONE VALUATIONS FOR RINGS WITH ZERO DIVISORS
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
Abstract. This is a continuation of a previous paper by the same authors.
In the former paper, it was proved that in order to obtain local uniformization
for valuations centered on local domains, it is enough to prove it for rank
one valuations. In this paper, we extend this result to the case of valuations
centered on rings which are not necessarily integral domains and may even
contain nilpotents.
1. Introduction
For an algebraic variety X over a field k, the problem of resolution of singularities is whether there exists a proper birational morphism X ′ −→ X such that X ′
is regular. The problem of local uniformization can be seen as the local version
of resolution of singularities for an algebraic variety. For a valuation ν of k(X)
having a center on X, the local uniformization problem asks whether there exists
a proper birational morphism X ′ −→ X such that the center of ν on X ′ is regular.
This problem was introduced by Zariski in the 1940’s as an important step to prove
resolution of singularities. Zariski’s approach consists in proving first that every
valuation having a center on the given algebraic variety admits local uniformization. Then one has to glue these local solutions to obtain a global resolution of all
singularities.
Zariski succeeded in proving local uniformization for valuations centered on algebraic varieties over a field of characteristic zero (see [11]). He used this to prove
resolution of singularities for algebraic surfaces and threefolds over a field of characteristic zero (see [12]). Abhyankar proved (see [1]) that local uniformization can
be obtained for valuations centered on algebraic surfaces in any characteristic and
used this fact to prove resolution of singularities for surfaces (see [2] and [4]). He
also proved local uniformization and resolution of singularities for threefolds over
fields of characteristic other than 2, 3 and 5 (see [3]). Very recently, Cossart and
Piltant proved resolution of singularities (and, in particular, local uniformization)
for threefolds over any field of positive characteristic, as well as in the arithmetic
case (see [5] and [6]). They proved it using the approach of Zariski. However, the
2010 Mathematics Subject Classification. Primary 14B05; Secondary 14E15, 13H05.
Key words and phrases. Local uniformization, resolution of singularities, reduced varieties.
During the realization of this project the first author was supported by a grant from the
program “Ciência sem Fronteiras” from the Brazilian government.
1
2
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
problem of local uniformization remains open for valuations centered on algebraic
varieties of dimension greater than three over fields of positive characteristic.
Since local uniformization is a local problem, we can work with local rings instead
of algebraic varieties. A valuation ν centered on a local integral domain R is said
to admit local unifomization if there exists a local local ring R(1) dominated by Oν
and dominating R such that R(1) is regular. Let N be the category of all noetherian
local domains and M ⊆ N be a subcategory of N which is closed under taking
homomorphic images and localizing any finitely generated birational extension at
a prime ideal. We want to know for which subcategories M with these properties,
all valuations centered on objects of M admit local uniformization. In Section
7.8 of [7], Grothendieck proved that any category of schemes, closed under passing
to subschemes and finite radical extensions, in which resolution of singularities
holds, is a subcategory of quasi-excellent schemes (it is known that the category
of quasi-excellent schemes is closed under all the operations mentioned above). He
conjectured (see Remark 7.9.6 of [7]) that resolution of singularities holds in this
most general possible context: that of quasi-excellent schemes. Translated into our
local situation, this conjecture says that the subcategory of N which optimizes local
uniformization is the category of all quasi-excellent local rings. This subcategory
has the properties above. For a discussion on quasi-excellent and excellent local
rings see Section 7.8 of [7]. However, this conjecture is widely open.
In most of the successful cases, including those mentioned above, local uniformization was first proved for rank one valuations. Then the general case was
reduce to this a priori weaker one. In [9], we prove that this reduction works under
very general assumptions. Namely, we consider a subcategory M of the category
of all noetherian local integral domains, closed under taking homomorphic images
and localizing any finitely generated birational extension at a prime ideal. The
main result of [9] is that if every rank one valuation centered on an object of M
admits local uniformization, then all the valuations centered on objects of M admit local uniformization. The main goal of this paper is to extend this result to
rings which are not necessarily integral domains and, in particular, may contain
nilpotent elements. The importance of non-integral and non-reduced schemes in
modern algebraic geometry is well known. Even if one were only interested in reduced schemes to start with, one is led to consider non-reduced ones as they are
produced by natural constructions, for example, in deformation theory. Therefore,
it appears desirable to study the problem of local uniformization for such schemes
and, in particular, to extend our earlier results on reducing the problem to the rank
one case to this more general context.
If R is not reduced we cannot expect, in general, to make R(1) be regular by
blowings up. The natural extension to this case is to require R(1) red to be regular
n+1
n
and I(1)
/I(1)
to be an R(1) red -free module for every n ∈ N (here I(1) denotes
the nilradical of R(1) ). For more precise definitions see Section 2. Let N be the
category of all noetherian local rings and M ⊆ N be a subcategory of N which
LOCAL UNIFORMIZATION FOR NON-DOMAINS
3
is closed under taking homomorphic images and localizing any finitely generated
birational extension at a prime ideal. Our main result is the following:
Theorem 1.1. Assume that for every noetherian local ring R in Ob(M), every rank
one valuation centered on R admits local uniformization. Then all the valuations
centered on objects of M admit local uniformization.
The proof of Theorem 1.1 consists of three main steps. The first step is to
prove that for every local ring R and every valuation ν centered on R, there exists
a local blowing up (see Definition 2.2) R −→ R(1) such that R(1) has only one
associated prime ideal. Then we consider a decomposition ν = ν1 ◦ ν2 of ν such
that rk(ν1 ) < rk(ν) and rk(ν2 ) < rk(ν). Using induction, we can assume that both
ν1 and ν2 admit local uniformization. The second main step consists in using this
to prove that there exists a local blowing up R(1) −→ R(2) such that R(2) red is
regular. The third and final step is to prove that there exists a further local blowing
n+1
n
up R(2) −→ R(3) such that R(3) red is regular and I(3)
/I(3)
is an R(3) red -free
module for every n ∈ N (here I(3) denotes the nilradical of R(3) ).
This paper is divided as follows. In Section 2 we present the basic definitions
and results that will be used in the sequel. Sections 3, 4 and 5 are dedicated to
prove the results related to the first, second and third steps, respectively. In the
last section we present a proof of our main theorem.
2. Preliminaries
Let R be a noetherian commutative ring with unity and Γ an ordered abelian
group. Set Γ∞ := Γ ∪ {∞} and extend the addition and order from Γ to Γ∞ as
usual.
Definition 2.1. A valuation ν on R is a mapping ν : R −→ Γ∞ with the following
properties:
(V1)
(V2)
(V3)
(V4)
ν(ab) = ν(a) + ν(b) for every a, b ∈ R;
ν(a + b) ≥ min{ν(a), ν(b)} for every a, b ∈ R;
ν(1) = 0 and ν(0) = ∞;
The support of ν, which is defined by supp(ν) := {a ∈ R | ν(a) = ∞}, is
a minimal prime ideal of R.
Take a multiplicative system S of R such that supp(ν) ⊆ R \ S. Then the
extension (which we call again ν) of ν to RS given by ν(a/s) := ν(a) − ν(s) is again
a valuation. Indeed, the three first axioms are easily checked. The minimality of
supp(ν) as a prime ideal of RS follows from the fact that the prime ideals of RS are
in a bijective correspondence to the prime ideals of R contained in R \ S. From now
on, we will freely make such extensions of ν to RS without mentioning it explicitly.
A valuation ν on R is said to have a center if ν(a) ≥ 0 for every a ∈ R. In this
case, the center of ν on R is defined by Cν (R) := {a ∈ R | ν(a) > 0}. Moreover, if
R is a local ring with unique maximal ideal m (in which case we say “the local ring
4
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
(R, m)”), then a valuation ν on R is said to be centered at R if ν(a) ≥ 0 for every
a ∈ R and ν(a) > 0 for every a ∈ m. We observe that if ν is a valuation having a
center on R, then ν is centered on RCν (R) . The value group of ν, denoted by νR,
is defined as the subgroup of Γ generated by {ν(a) | a ∈ R}. The rank of ν is the
number of proper convex subgroups of νR.
For an element b ∈ R \ supp(ν) we consider the canonical map Φ : R −→ Rb
given by Φ(a) = a/1. Let
J(b) := ker Φ =
∞
[
annR (bi ).
i=1
We have a natural embedding R/J(b) ⊆ Rb . Take a1 , . . . , ar ∈ R such that
ν(ai ) ≥ ν(b)
for each i, 1 ≤ i ≤ r.
Consider the subring R′ := R/J(b)[a1 /b, . . . , ar /b] of Rb . Then the restriction of ν
to R′ has a center Cν (R′ ) in R′ . We set R(1) := RC′ ν (R′ ) .
Definition 2.2. The canonical map R −→ R(1) will be called the local blowing
up of R with respect to ν along the ideal (b, a1 , · · · , ar ). For a valuation µ having
a center on R we will say that R −→ R(1) is µ-compatible if b ∈
/ Cµ (R) and
ai ∈ Cµ (R) for every i, 1 ≤ i ≤ r.
Lemma 2.3. The composition of finitely many local blowings up is again a local
blowing up. Moreover, if each of these local blowings up is µ-compatible, then their
composition is again µ-compatible.
Proof. It is enough to prove that for two local blowings up π : R −→ R(1) and
π ′ : R(1) −→ R(2) with respect to ν, there exists a local blowing up R −→ R(3)
with respect to ν such that R(3) ≃ R(2) . We write
R(1) = RC′ ν (R′ ) for R′ = R/J(b)[a1 /b, . . . , ar /b]
for some a1 , . . . , ar , b ∈ R and
R(2) = RCν (R′(1) ) for R′(1) = R(1) /J(β)[α1 /β, . . . , αs /β]
′(1)
for some α1 , . . . , αs , β ∈ R(1) . Then there exist ar+1 , . . . , ar+s , b′ ∈ R such that
αi /β = π(ar+i )/π(b′ ) for each i, 1 ≤ i ≤ s. Consider the local blowing up
R −→ R(3)
given by
R(3) = RC′′ ν (R′′ ) for R′′ = R/J(bb′ )[a1 b′ /bb′ , . . . , ar b′ /bb′ , ar+1 b/bb′ . . . , ar+s b/bb′].
It is straightforward to prove that R(2) ≃ R(3) .
In view of Lemma 2.3, we will freely use the fact that the composition of finitely
many local blowings up is itself a local blowing up without mentioning it explicitly.
For simplicity of notation, we denote the nilradical of R by I, i.e.,
I = Nil(R) := {a ∈ R | al = 0 for some l ∈ N}.
LOCAL UNIFORMIZATION FOR NON-DOMAINS
5
Definition 2.4. We say that Spec(R) is normally flat along Spec(Rred ) if
I n /I n+1 is an Rred -free module for every n ∈ N.
Since R is noetherian, there exists N ∈ N such that I n = (0) for every n > N .
Hence, the condition in Definition 2.4 is equivalent to the freeness of the finitely
many modules I/I 2 , . . . , I N /I N +1 = I N .
Definition 2.5. For a local ring R, a valuation ν centered on R is said to admit local uniformization if there exists a local blowing up R −→ R(1) with
respect to ν such that R(1) red is regular and Spec R(1) is normally flat along
Spec R(1) red .
Let ν = ν1 ◦ ν2 be a fixed decomposition of ν. For simplicity of notation, we
set p := Cν1 (R) and for a local blowing up R −→ R(1) we set p(1) := Cν1 R(1) .
We need to guarantee that the main structure of Rp and R/p are preserved under
ν1 -compatible local blowings up. More precisely, we have to prove the following:
Proposition 2.6. Let π : R −→ R(1) be a ν1 -compatible local blowing up. Then the
(1)
canonical maps Rp −→ Rp(1) and R/p −→ R(1) /p(1) induced by π are isomorphisms.
In order to prove Proposition 2.6 we need the following basic lemma.
Lemma 2.7. Let S be a multiplicative system of R contained in R \ Cν (R). Then
the canonical map Φ : RCν (R) −→ (RS )Cν (RS ) given by Φ(a/b) = (a/1)/(b/1) is an
isomorphism.
Proof. For an element (a/b)/(c/d) ∈ (RS )Cν (RS ) we have
ν(b) = ν(c) = ν(d) = 0.
Consequently, ν(bc) = 0 and ad/bc ∈ RCν (R) . Then
(a/b)/(c/d) = (ad/1)/(bc/1) = Φ(ad/bc).
Suppose that Φ(a/b) = 0. This means that there exists c/d ∈ RS \ Cν (RS ) such
that ac/d = 0 in RS . Thus, there exists s ∈ S such that sac = 0. Moreover, since
c/d ∈
/ Cν (RS ) we also have that c ∈
/ Cν (R). This and the fact that s ∈ S ⊆ R\Cν (R)
imply that sc ∈
/ Cν (R). Hence, a/b = 0 in RCν (R) which is what we wanted to
prove.
Proof of Proposition 2.6. Applying Lemma 2.7 to R (with S = {1, b, b2, . . .}) and
R′ (with S ′ = R′ \ Cν (R′ )) and the valuation ν1 , we obtain that the canonical maps
(1)
Rp −→ (Rb )Cν (Rb ) and RC′ ν (R′ ) −→ Rp(1) , respectively, are isomorphisms. Hence,
1
1
in order to prove the first assertion, it is enough to show that the canonical map
(Rb )Cν (Rb ) ←− RC′ ν (R′ ) is an isomorphism.
1
1
Since R′ ⊆ Rb and Cν1 (R′ ) = R′ ∩Cν1 (Rb ) we have that RC′ ν (R′ ) −→ (Rb )Cν (Rb )
1
1
is injective. On the other hand, any element (a/bn )/(c/bm ) in (Rb )Cν (Rb ) can be
1
written as (abm /1)/(cbn /1) which is the image of abm /cbn . Hence the map
RC′ ν
1 (R
′)
−→ (Rb )Cν
1 (Rb )
6
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
is surjective and consequently it is an isomorphism.
Set R0 = R/J(b) and consider the induced map R0 −→ R(1) . Since the canonical
map R −→ R0 is surjective, in order to prove the surjectivity of R −→ R(1) /p(1) ,
it is enough to show that R0 −→ R(1) /p(1) is surjective. For an element α ∈ R(1)
we write α = p/q where p = P (a1 /b, . . . , ar /b) and q = Q(a1 /b, . . . , ar /b) for some
P (X1 , . . . , Xr ), Q(X1 , . . . , Xr ) ∈ R0 [X1 , . . . , Xr ].
Set p0 = P (0, . . . , 0) and q0 = Q(0, . . . , 0). Then
p1 := p − p0 =
r
X
ai /b · Pi (a1 /b, · · · , ar /b)
r
X
ai /b · Qi (a1 /b, · · · , ar /b)
i=1
and
q1 := q − q0 =
i=1
for some Pi , Qi ∈ R0 [X1 , . . . , Xr ], 1 ≤ i ≤ r. Since ν1 (ai /b) > 0 we obtain that
ν1 (p1 ) > 0 and ν1 (q1 ) > 0. This implies that
(1)
ν1 (q0 ) =
0,
(2)
ν1 (q0 q) =
0
and
ν1 (q0 p1 − p0 q1 ) > 0.
(3)
Therefore,
p/q − p0 /q0 = (q0 p1 − p0 q1 )/q0 q ∈ p(1) .
It remains to prove that p0 /q0 ∈ R0 . Since ν1 (q1 ) > 0, also ν(q1 ) > 0. Hence,
ν(q0 ) = ν(q − q1 ) = 0 and consequently q0 is a unit in R0 . Therefore, p0 /q0 ∈ R0 .
To finish our proof it is enough to show that the kernel of R −→ R(1) /p(1) is p.
This follows immediately from the definition of p and p(1) as the centers of ν1 on
R and R(1) , respectively.
Lemmas 2.8 and 2.9 below are generalizations of Lemma 2.18 and Corollary 2.20
of [9], respectively. The proofs presented there can be adapted to our more general
case. We present sketches of the proofs for the convenience of the reader.
e(1) with respect to ν1 , there exists
Lemma 2.8. For each local blowing up Rp −→ R
e(1) ≃ R(1)
.
a local blowing up R −→ R(1) with respect to ν such that R
p(1)
e(1) given by
Proof. We consider the local blowing up Rp −→ R
e (1) = R
e′
R
C
e′ )
ν 1 (R
e ′ = Rp /J(β)[α1 /β, . . . , αr /β].
for R
Choose a1 , . . . , ar , b ∈ R such that for each i, 1 ≤ i ≤ r we have Φ(ai )/Φ(b) = αi /β
where Φ : R −→ Rp is the canonical map. If ν(ai ) < ν(b) for some i, 1 ≤ i ≤ r,
LOCAL UNIFORMIZATION FOR NON-DOMAINS
7
then we have ν1 (αi ) = ν1 (β). Choose i so as to minimize the value ν(ai ), in other
words, so that ν(ai ) ≤ ν(aj ) for all j ∈ {1, . . . , r}. Set
e′′ := Rp /J(αi ) α1 , . . . , αi−1 , β , αi+1 , . . . , αr .
R
αi
αi αi αi
αi
e′′
Then R(1) ≃ R
C
e′′ ) .
ν 1 (R
Hence, after a suitable permutation of the set {a1 , . . . , ar , b},
we may assume that ν(ai ) ≥ ν(b) for every i, 1 ≤ i ≤ r. Consider the local blowing
up
R(1) = RC′ ν (R′ ) for R′ = R/J(b)[a1 /b, . . . , ar /b]
(1)
e(1) .
with respect to ν. It is straightforward to prove that Rp(1) ≃ R
(1)
Lemma 2.9. For each local blowing up R/p −→ R
exists a local blowing up R −→ R
(1)
and Rp ≃ Rp(1) .
(1)
with respect to ν2 , there
(1)
with respect to ν such that R(1) /p(1) ≃ R
Proof. For an element a ∈ R we denote its image under the canonical map
R −→ R/p
by a. Then
R
(1)
′
′
= RCν2 (R′ ) with R = (R/p) /J(b)[a1 /b, . . . , ar /b]
for some a1 , . . . , ar , b ∈ R \ p. Since ν2 (ai ) ≥ ν2 (b) we have ν(ai ) ≥ ν(b) for every
i, 1 ≤ i ≤ r. Then we can consider the local blowing up
R(1) = RC′ ν (R′ ) with R′ = R/J(b)[a1 /b, . . . , ar /b]
with respect to ν. It is again straightforward to prove that R(1) /p(1) ≃ R
(1)
Rp ≃ Rp(1) .
(1)
and
3. Associated prime ideals of R
Let R be a local ring and ν a valuation centered on R. The main result of this
section is the following:
Proposition 3.1. There exists a local blowing up R −→ R(1) with respect to ν such
that Nil R(1) is the only associated prime of R(1) .
In order to prove Proposition 3.1, we need the following result.
Lemma 3.2. Let R′ = R/J(b)[a1 /b, . . . , ar /b] ⊆ Rb for some b, a1 , . . . , ar ∈ R with
ν(b) ≤ ν(ai ) for every i, 1 ≤ i ≤ r. Then for every c′ ∈ R′ the ideal annR′ (c′ ) can
be written as annR′ (c/1) for some c ∈ R. Moreover, if annR′ (c′ ) is prime, then
annR bN c is a prime ideal of R for some N ∈ N.
8
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
Proof. Choose c ∈ R such that c′ = c/bl for some l ∈ N. Fix a′ ∈ R′ and write
a′ = a/bm for some m ∈ N and a ∈ R. Then we have
a′ ∈ annR′ (c′ ) ⇐⇒ acbn = 0 for some n ∈ N ⇐⇒ a′ ∈ annR′ (c/1).
Now assume that annR′ (c′ ) is prime and set R0 := R/J(b). Then
annR0 (c/1) = annR′ (c′ ) ∩ R0
is also prime. Moreover,
π −1 (annR0 (c/1)) =
(4)
∞
[
annR (bn c),
n=1
where π : R −→ R/J(b) is the canonical epimorphism. Indeed,
a ∈ π −1 (annR0 (c/1)) ⇐⇒ ac/1 = 0 in Rb
⇐⇒ bn ac = 0 in R for some n ∈ N
∞
[
⇐⇒ a ∈
annR (bn c).
n=1
Since R is noetherian and
we have that
(5)
annR (bc) ⊆ annR b2 c ⊆ · · · ⊆ annR (bn c) ⊆ · · ·
∞
[
annR (bn c) for some N ∈ N.
annR bN c =
n=1
By (4) and (5) we conclude that annR bN c is a prime ideal of R.
Corollary 3.3. For a local blowing up R −→ R(1) , if Nil(R) is the only associated
prime ideal of R, then Nil R(1) is the only associated prime ideal of R(1) .
Proof. Let R(1) = RC′ ν (R′ ) for some R′ as in Lemma 3.2. Theorem 6.2 of [8] gives
us that Ass R(1) = Ass(R′ ) ∩ Spec R(1) . This and Lemma 3.2 guarantee that
|Ass R(1) | ≤ |Ass (R) | = 1. Consequently, R(1) has only one associated prime
ideal, say q. The primary decomposition theorem now gives us that q = Nil R(1) ,
which is what we wanted to prove.
We will use Corollary 3.3 throughout this paper without always mentioning it
explicitly.
Proof of Proposition 3.1. Since supp(ν) is a minimal prime ideal, there exists at
most one associated prime ideal of R contained in (hence equal to) supp(ν). We
will prove that if |Ass(R)| > 1, then there exists a local blowing up R −→ R(1)
such that |Ass R(1) | < |Ass(R)|.
Take an associated prime ideal q of R such that q 6⊆ supp(ν). Write
q = (b, a1 , . . . , ar )
LOCAL UNIFORMIZATION FOR NON-DOMAINS
9
with ν(b) ≤ ν(ai ) for every i, 1 ≤ i ≤ r. Blowing up R with respect to ν along q
gives us a local ring
R(1) = RC′ ν (R′ ) where R′ = R/J(b)[a1 /b, . . . , ar /b].
Observe that this is indeed a local blowing up because ν(b) ≤ ν(ai ) for every i and
q 6⊆ supp(ν) implies that b ∈
/ supp(ν). Since
Ass R(1) = Ass(R′ ) ∩ Spec R(1) (see Theorem 6.2 of [8]),
it remains to show that |Ass(R′ )| < |Ass(R)|.
By Lemma 3.2, we obtain that R′ has at most |Ass(R)| many associated prime
ideals. Moreover, for the chosen associated prime ideal q = annR (c) of R and
for every r ∈ N, the ideal annR′ (c/br ) is not prime in R′ . Indeed, since q =
(b, a1 , . . . , ar ) = annR (c) we have bc = 0 in R. This means that
c/1 = 0/1
in R and consequently annR′ (c/1) = R′ (which is not prime). Therefore
′
|Ass(R′ )| < |Ass(R)|.
Remark 3.4. If I is the only associated prime ideal of R, then for every b ∈
/ I
we have J(b) = (0). In this particular case, we can eliminate the ideal J(b) in the
definition of a local blowing up. We will use this throughout this paper without
mentioning it explicitly.
4. Making Rred regular
Let R be a local ring and ν a valuation centered on R. Assume that ν = ν1 ◦ ν2
and denote by p the center of ν1 on R. As usual, we denote by I the nilradical
of R and for a local blowing up R −→ R(1) we denote the nilradical of R(1) by
I(1) . Assume that I is the only associated prime ideal of R. The main goal of this
section is to prove the following proposition.
Proposition 4.1. Assume that (Rp )red and R/p are regular. Then there exists a
ν1 -compatible local blowing up R −→ R(1) such that R(1) red is regular. Moreover,
for every local blowing up R(1) −→ R(2) along an ideal (b, a1 , . . . , ar ) with b ∈
/ p(1)
(2)
and a1 , . . . , ar ∈ I(1) we have that R
is regular.
red
In order to prove Proposition 4.1 we will need a few lemmas.
Lemma 4.2. Assume that (Rp )red is regular. Then there exists
a ν1-compatible
2
(1)
(1)
(1)
(1)
local blowing up R −→ R such that the R /p -module p / p(1) + I(1) is
(1)
(1)
are elements
of p(1) whose images in
free. Moreover, if y1 , · · · , yr
2
2
p(1) / p(1) + I(1) form a basis of p(1) / p(1) + I(1) then their images in
(1)
(1)
.
form a regular system of parameters of Rp(1)
Rp(1)
red
red
10
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
Lemma 4.3. Let π : R −→ R(1) be a local blowing up along an ideal (b, a1 , . . . , ar )
with b ∈
/ p and a1 , . . . , ar ∈ I. If p/ p2 + I is a free R/p-module, then
2
(1)
(1)
+ I(1)
p /
p
is a free R(1) /p(1) -module.
Lemma 4.4. Take y1 , . . . , yr ∈ p and x1 , . . . , xt ∈ m \ p whose images form a
regular system of parameters of (Rp )red and R/p, respectively. If p/(p2 + I) is an
R/p-free module with basis y1 + (p2 + I), . . . , yr + (p2 + I), then Rred is regular.
Proof of Proposition 4.1, assuming Lemmas 4.2, 4.3 and 4.4. We apply Lemma 4.2
(1)
(1)
(1)
to obtain a ν1 -compatible local blowing up
y1 , . . . , yr ∈ R(1) such
R −→ R and
2
that their images in p(1) / p(1) + I(1) form an R(1) red - basis and their images
(1)
form a regular system of parameters. Moreover, by Proposition 2.6,
in Rp(1)
red
R(1) /p(1) is regular. Also, by Lemma 4.3 and Proposition 2.6, for every local blowing up R(1) −→ R(2) along an ideal (b, a1 , . . . , ar ) with b ∈
/ p(1) and a1 , . . . , ar ∈ I(1)
the hypotheses of Lemma 4.4 are satisfied for R(2) . Hence, we obtain that R(1) red
and R(2) red are regular.
We now proceed with the proofs of Lemmas 4.2, 4.3 and 4.4.
Lemma 4.5. Take generators y1 , . . . , yr , yr+1 , . . . , yr+s of p and b ∈
/ p. Let
π : R −→ R(1)
be the local blowing up along the ideal (b, y1 , . . . , yr ). Set
(1)
yi
(1)
= π(yi )/b for 1 ≤ i ≤ r and yr+k = π(yr+k ) for 1 ≤ k ≤ s.
(1)
(1)
Then p(1) is generated by y1 , . . . , yr+s .
(1)
Proof. Obviously yi ∈ p(1) for every i, 1 ≤ i ≤ r + s. Take an element p/q ∈ p(1) .
This implies that p = p(y1 /b, . . . , yr /b) for some p(X1 , . . . , Xr ) ∈ R[X1 , . . . , Xr ]
(see Remark 3.4). If we set p0 = p(0, . . . , 0), then
yr
y1
p = p0 + p1 + . . . + pr , for some p1 , . . . , pr ∈ R′ .
b
b
This implies that p0 ∈ p. Hence, there exist a1 , . . . , ar+s ∈ R such that p0 =
a1 y1 + . . . + ar+s yr+s . Thus
s
r
p X π(bai ) + pi (1) X π(ar+k ) (1)
(1)
(1)
=
yi +
yr+k ∈ y1 , . . . , yr+s R(1) .
q
q
q
i=1
k=1
This concludes our proof.
Proof of Lemma 4.2. Since (Rp )red is regular there are elements y1 , . . . , yr ∈ p such
that their images in (Rp )red form a regular system of parameters. The first step is
to reduce to the case when y1 , . . . , yr generate p.
LOCAL UNIFORMIZATION FOR NON-DOMAINS
11
Assume that y1 , . . . , yr do not generate p. Choose yr+1 , . . . , yr+s ∈ p such that
y1 , . . . , yr , yr+1 , . . . , yr+s generate p. For each k, 1 ≤ k ≤ s, we can find bk ∈ R \ p,
b1k , . . . , brk ∈ R and hk ∈ (y1 , . . . , yr )2 such that
bk yr+k + b1k y1 + . . . + brk yr + hk ∈ I.
Consider the local blowing up π : R −→ R(1) along (b1 , y1 , . . . , yr ). It follows that
(1)
(1)
(1)
π(b1 ) yr+1 + π(b11 )y1 + . . . + π(br1 )yr(1) + h1
∈ I(1)
and
(1)
(1)
(1)
π(bk )yr+k + π(b1 b1k )y1 + . . . + π(b1 brk )yr(1) + hk ∈ I(1) for 2 ≤ k ≤ s,
(1)
(1)
(1)
where yi = π(yi )/b1 for 1 ≤ i ≤ r and yr+k = π(yr+k ) and some hk ∈
2
(1)
(1)
y1 , . . . , yr
for 1 ≤ i ≤ s. Since I(1) is prime and π(b1 ) ∈
/ I(1) we obtain
that
(1)
(1)
(1)
yr+1 + π(b11 )y1 + . . . + π(br1 )yr(1) + h1 ∈ I(1) .
Consequently,
(1)
(1)
(1)
(1)
(1)
(1)
y1 , . . . , yr(1) , yr+1 , . . . , yr+s R(1) = y1 , . . . , yr(1) , yr+2 , . . . , yr+s R(1) .
We proceed inductively to obtain a ν1 -compatible local blowing up R −→ R(s) such
that
(s)
(s)
(s)
(s)
y1 , . . . , yr(s) , yr+1 , . . . , yr+s R(s) = y1 , . . . , yr(s) R(s) .
(s)
(s) (s)
(s)
By Lemma 4.5, we have p(s) = y1 , . . . , yr , yr+1 , . . . , yr+s R(s) and by Lemma
(s)
(s)
(s)
form a regular system of parameters.
2.6 the images of y1 , . . . , yr in Rp(s)
(s)
(s)
red
This means that y1 , . . . , yr generate p(s) . Thus we have reduced the problem to
the case when (y1 , . . . , yr ) generate p and will make this assumption from now on.
Now, the only non-trivial fact that remains to be checked is that the images of
y1 , . . . , yr in p/p2 + I are R/p-linearly independent. Take a1 , . . . , ar ∈ R such that
a1 y1 + . . . + ar yr ∈ p2 + I.
Since the images of y1 , . . . , yr in (Rp )red form a regular system of parameters, their
images in pRp /(p2 + I)Rp form an Rp /pRp -basis of pRp /(p2 + I)Rp . This implies
that a1 /1, . . . , ar /1 ∈ pRp and consequently a1 , . . . , ar ∈ p.
This completes the proof of the Lemma.
Proof of Lemma 4.3. Take y1 , . . . , ys ∈ p such that their images form an R/p-basis
of p/ p2 + I . We claim that
the images of π(y1 ), . . . , π(ys ) form an R(1) /p(1)
2
basis of p(1) / p(1) + I(1) . Take an element α ∈ p(1) . Then α = p/q where
p, q ∈ R′ := R[a1 /b, . . . , ar /b] with ν1 (p) > 0 and ν(q) = 0. Set p0 = p(0, . . . , 0)
and write
a1
ar
p = p0 + p1 + . . . + pr for some p1 , . . . , pr ∈ R′ .
b
b
12
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
This implies that p0 ∈ p. By our assumption, there exist c1 , . . . , cs ∈ p, g ∈ p2 and
h ∈ I such that
p0 = c1 y1 + . . . + cs yr + g + h.
Consequently,
α=
π(cs )
π(g) π(h) a1 p1
ar p r
π(c1 )
π(y1 ) + . . . +
π(ys ) +
+
+
+ ...+
.
q
q
q
q
b q
b q
Since a1 , . . . , ar , h ∈ I, we have that
ar p r
π(h) a1 p1
+
+ ...+
∈ I(1) .
q
b q
b q
2
This and the fact
π(g)/q
∈ p(1) imply that the images of π(y1 ), . . . , π(yr )
that
2
generate p(1) / p(1) + I(1) .
Now assume that there exists αi = (ai /bli )/(ci /bmi ) ∈ R(1) , 1 ≤ i ≤ r, such that
2
α1 π(y1 ) + . . . + αr π(yr ) ∈ p(1) + I(1) .
Then there exists n ∈ N such that
a1 bn y1 + . . . + ar bn yr ∈ p2 + I.
This implies that ai bn ∈ p for every i, 1 ≤ i ≤ r. Since b ∈
/ p, this implies that
(1)
a1 , . . . , ar ∈ p. Therefore, α1 , . . . , αr ∈ p , which concludes our proof.
Proof of Lemma 4.4. Set p′ = {a + I ∈ Rred | a ∈ p}. Since the images of the yi ’s
in p/(p2 + I) form a basis of p/(p2 + I), we conclude that (y1 , . . . , yr ) + p2 + I = p.
Applying Nakayama’s Lemma (corollary of Theorem 2.2 of [8]) we conclude that
(y1 , . . . , yr ) + I = p and consequently y1 + I, . . . , yr + I generate p′ .
Since the images of y1 , . . . , yr , x1 , . . . , xt in Rred generate m′ = {a + I ∈ Rred |
a ∈ m} we conclude that r + t ≥ dim Rred . Also, since r = dim (Rp )red = ht (p′ )
and t = dim (R/p) = ht(m/p) = ht (m′ /p′ ) we have
dim(Rred ) = ht (m′ ) ≥ ht (p′ ) + ht (m′ /p′ ) = r + t ≥ dim(Rred ).
Therefore, r + t = dim(Rred ) and hence Rred is regular.
5. Making I n /I n+1 free
Let R be a local ring and ν a valuation centered on R. Assume that
ν = ν1 ◦ ν2
and denote by p the center of ν1 on R. As usual, we set I = Nil(R) and Ip :=
(k)
(k)
Nil(Rp ). Also,
for
a
local
blowing
up
R
−→
R
we
set
I
=
Nil
R
and
(k)
(k)
Ip(k) := Nil Rp(k) . Assume that I is the only associated prime ideal of R. The
main goal of this section is to prove the following proposition.
LOCAL UNIFORMIZATION FOR NON-DOMAINS
13
Proposition 5.1. Assume that Ipn /Ipn+1 is an (Rp )red -free module for every n ∈ N.
Then there exists a local blowing up R −→ R(1) with respect to ν along an ideal
n+1
n
(b, a1 , . . . , ar ) with b ∈
/ p and a1 , . . . , ar ∈ I such that the R(1) red -module I(1)
/I(1)
is free for every n ∈ N.
In order to prove Proposition 5.1, we will need some preliminary results.
Lemma 5.2. Take elements y1 , . . . , yr+s ∈ I n such that their images in I n /I n+1
generate I n /I n+1 as an Rred -module. Consider the local blowing up π : R −→ R(1)
along the ideal (b, y1 , . . . , yr ) for some b ∈ R \ I. Set
(1)
yi
(1)
= π(yi )/b for 1 ≤ i ≤ r and yr+k = π(yr+k ) for 1 ≤ k ≤ s.
(1)
(1)
n+1
n
Then the images of y1 , . . . , yr+s in I(1)
/I(1)
form a set of generators of this
module.
n
Proof. Take an element p/q ∈ I(1)
. As in proof of the Lemma 4.5, we can write
p = p0 +
yr
y1
p1 + . . . + pr , for some p1 , . . . , pr ∈ R′
b
b
with p0 ∈ I n . This means that there exists a1 , . . . , ar+s ∈ R such that p0 − a1 y1 −
. . . − ar+s yr+s = y0 ∈ I n+1 . Consequently,
r+s
r
X
π(ai ) (1)
π(y0 )
p X π(bai ) + pi (1)
n+1
−
yi −
yi =
∈ I(1)
.
q i=1
q
q
q
i=r+1
This concludes our proof.
Lemma 5.3. Under the same assumptions as in the previous lemma, if the images of y1 , . . . , yr in I n /I n+1 are Rred -linearly independent, then the images of
(1)
(1)
n+1
n
a1 , . . . , ar in I(1)
/I(1)
are R(1) red -linearly independent.
Proof. Take elements α1 , . . . , αr ∈ R(1) such that
(6)
n+1
α1 y (1) + . . . + αr y (1) ∈ I(1)
.
We have to show that α1 , . . . , αr ∈ I(1) . For each i, 1 ≤ i ≤ r, we write αi =
(ai /bri )/(ci /bsi ) for some ai , ci ∈ R and ri , si ∈ N. Then equation (6) implies that
there exists l ∈ N and c ∈ R \ p such that
a1 bl cy1 + . . . + ar bl cyr ∈ I n+1 .
Since y1 + I n+1 , . . . , yr + I n+1 are Rred -linearly independent, this implies that
ai b l c ∈ I
for every i, 1 ≤ i ≤ r.
Since I is prime (this is a consequence of the fact that it is the only associated
prime ideal of R) and b, c ∈ R \ I, we obtain that a1 , . . . , ar ∈ I. Consequently,
α1 , . . . , αr ∈ I(1) , which concludes our proof.
14
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
Proof of Proposition 5.1. By assumption, we have that Ipn /Ipn+1 is (Rp )red -free for
every n ∈ N. Hence, by Proposition 2.6
for every ν1 -compatible local blowing up
(1)
n+1
(1)
n
-free for every n ∈ N. Therefore, it
R −→ R we have that Ip(1) /Ip(1) is Rp(1)
red
is enough to show that for a fixed n ∈ N, there exists a local blowing up R −→ R(1)
n+1
n
along an ideal (b, a1 , . . . , ar ) with b ∈
/ p and a1 , . . . , ar ∈ I such that I(1)
/I(1)
is
R(1) red -free.
Take elements y1 /b1 , . . . , yr /br ∈ Ipn , y1 , . . . , yr ∈ R and b1 , . . . , br ∈ R \ p such
that
y1 /b1 + Ipn+1 , . . . , yr /br + Ipn+1
form a basis of Ipn /Ipn+1 . We observe first that since I is prime and yi /bi ∈ Ipn , we
have yi ∈ I n for each i, 1 ≤ i ≤ r. We claim that if
y1 + I n+1 , . . . , yr + I n+1
generate I n /I n+1 as an Rred -module, then this module is free. Indeed, if there
exists ai + I ∈ Rred such that a1 y1 + . . . + ar yr ∈ I n+1 , then
a1 b1 /1 · y1 /b1 + . . . + ar br /1 · yr /br = (a1 y1 + . . . + ar yr )/1 ∈ Ipn+1 .
This implies that for each i, 1 ≤ i ≤ r, ai bi /1 ∈ Ip and consequently ai bi ci ∈ I
for some ci ∈ R \ p . Since I is prime and b1 c1 , . . . , br cr ∈ R \ I, we conclude that
a1 , . . . , ar ∈ I, which is what we wanted to prove.
If y1 + I n+1 , . . . , yr + I n+1 do not generate I n /I n+1 (as an Rred -module), then
we take yr+1 , . . . , yr+s ∈ I n such that y1 + I n+1 , . . . , yr+s + I n+1 generate I n /I n+1 .
For each k, 1 ≤ k ≤ s, since yr+k ∈ I n there exist bk ∈ R \ p, such that
bk yr+k − b1k y1 − . . . − brk yr ∈ I n+1 ,
(7)
for some b1k , . . . , brk ∈ R. Consider now the local blowing up along the ideal
(b1 , y1 , . . . , yr ). Set
(1)
yi
:= π(yi )/b1 ∈ R(1)
for each i, 1 ≤ i ≤ r
and
(1)
yr+k := π(yr+k ) ∈ R(1)
for each k, 1 ≤ k ≤ s.
From equation (7) we obtain that
(1)
(1)
n+1
yr+1 − π(b11 )y1 − . . . − π(br1 )yr(1) ∈ I(1)
,
and
(1)
(1)
n+1
π(bk )yr+k − π(b1 b1k )y1 − . . . − π(br brk )yr(1) ∈ I(1)
,
(1)
n+1
is generated in the R(1)
for every k, 2 ≤ k ≤ s. Consequently, yr+1 + I(1)
(1)
(1)
n+1
n+1
n+1
n
. Moreover,
, . . . , yr + I(1)
module I(1)
/I(1)
by y1 + I(1)
(1)
n+1
n
obtain that I(1) /I(1) is generated as an Rred -module by the
(1)
(1)
(1)
y1 , . . . , yr(1) , yr+2 , . . . , yr+s .
red
-
using Lemma 5.2, we
images of
LOCAL UNIFORMIZATION FOR NON-DOMAINS
15
(1)
(1)
n+1
n
Also, by Lemma 5.3, the images of y1 , . . . , yr in I(1)
/I(1)
are R(1) red -linearly
independent.
We proceed inductively to obtain a local blowing up R −→ R(s) such that the
(s)
(s)
n+1
n
/I(s)
is generated by the images of y1 , . . . , yr and the imR(s) red -module I(s)
(s)
(s)
n+1
n
/I(s)
are R(s) red -linearly independent.
ages of y1 , . . . , yr in I(s)
6. Proof of the main Theorem
In this section we present the proof of our main theorem.
Proof of Theorem 1.1. We will prove the assertion by induction on the rank. Since
all rank one valuations admit local uniformization by assumption, we fix n ∈ N and
will prove that if all valuations of rank smaller than n admit local uniformization,
then also valuations of rank n admit local uniformization.
Let ν be a valuation centered in the local ring R ∈ Ob(M) such that rk(ν) = n.
By Lemma 3.1, there exists a local blowing up R −→ R(1) with respect to ν such
that Nil R(1) is the only associated prime ideal of R(1) . Hence, replacing R by
R(1) , we may assume that the only associated prime ideal of R is Nil(R).
Decompose ν as ν = ν1 ◦ ν2 for valuations ν1 and ν2 with rank smaller than
n. By assumption, we know that ν1 and ν2 admit local uniformization. Since ν1
admits local uniformization, by use of Lemma 2.8, there exists a local
blowing
up
(1)
(1)
n+1
(1)
n
R −→ R with respect to ν such that Rp(1) is regular and Ip(1) /Ip(1) is Rp(1)
red
free for every n ∈ N. Replacing R by R(1) we may assume that (Rp )red is regular
and Ipn /Ipn+1 is (Rp )red -free for every n ∈ N.
Since ν2 admits local uniformization, we can use Lemma 2.9 to obtain
that
there
(1)
(1)
and
exists a local blowing up R −→ R with respect to ν such that Rp(1)
red
(1)
n+1
-free for every n ∈ N. Replacing
R(1) /p(1) are regular and Ipn(1) /Ip(1) is Rp(1)
red
R by R(1) we can assume that (Rp )red and R/p are regular and that Ipn /Ipn+1 is
(Rp )red -free for every n ∈ N.
Since (Rp )red and R/p are regular, we apply Proposition 4.1 to obtain a ν1
compatible local blowing up R −→ R(1) such that R(1) red is regular. Using
(1)
-module for every n ∈ N.
Proposition 2.6, we have that Ipn(1) /Ipn+1
Rp(1)
(1) is a free
red
By Proposition 5.1, there exists a p(1) -compatible local blowing up R(1) −→ R(2)
n+1
n
such that I(2)
/I(2)
is an R(2) red -free module for every n ∈ N. Moreover, since this
local blowing up is along an ideal (b, a1 , . . . , ar ) with b ∈
/ p(1) and a1 , . . . , ar ∈ I(1) ,
(2)
we conclude using Proposition 4.1 that R
is regular. This concludes our
red
proof.
References
[1] S. Abhyankar, Local uniformization on algebraic surfaces over ground fields of characteristic
p 6= 0, Ann. of Math. 63 (1956), 491–526.
[2] S. Abhyankar, On the valuations centered in a local domain, Amer. J. Math. 78 (1956),
321–348.
16
JOSNEI NOVACOSKI AND MARK SPIVAKOVSKY
[3] S. Abhyankar, Resolution of singularities of embedded algebraic surfaces, Pure and Applied
Mathematics 24, Academic Press, New York and London 1966.
[4] S. Abhyankar, Simultaneous resolution for algebraic surfaces, Amer. J. Math. 78 (1956),
761–790.
[5] V. Cossart and O. Piltant, Resolution of singularities of threefolds in positive characteristic.
I. Reduction to local uniformization on Artin-Schreier and purely inseparable coverings, J.
Algebra 320 no. 3 (2008), 1051–1082.
[6] V. Cossart and O. Piltant, Resolution of singularities of threefolds in positive characteristic.
II, J. Algebra 321 no. 7 (2009), 1836–1976.
[7] A. Grothendieck, Éléments de géométrie algébrique. IV. Étude locale des schémas et des
morphismes de schémas. II, Inst. Hautes Études Sci. Publ. Math. 24 (1965), 5–231.
[8] H. Matsumura, Commutative ring theory, Cambridge University Press, 1986.
[9] J. Novacoski and M. Spivakovsky, Reduction of local uniformization to the rank one case,
Proceedings of the Second International Conference on Valuation Theory, EMS Series of
Congress Reports (2014), 404–431.
[10] O. Zariski and P. Samuel, Commutative algebra, Vol. II, New York/Heidelberg/Berlin (1960).
[11] O. Zariski, Local uniformization theorem on algebraic varieties, Ann. of Math. 41 (1940),
852–896.
[12] O. Zariski, Reduction of singularities of algebraic three dimensional varieties, Ann. of Math.
45 (1944), 472 – 542.
Josnei Novacoski
CAPES Foundation
Ministry of Education of Brazil
Brası́lia/DF 70040-020
Brazil
E-mail address: [email protected]
Mark Spivakovsky
Institut de Mathématiques de Toulouse and CNRS
Université Paul Sabatier
118 route de Narbonne
F-31062 Toulouse cedex 9
France
E-mail address: [email protected]
| 0math.AC
|
arXiv:1502.02478v1 [cs.NE] 9 Feb 2015
Efficient batchwise dropout training using
submatrices
Ben Graham
[email protected]
Jeremy Reizenstein
[email protected]
Leigh Robinson
[email protected]
February 10, 2015
Abstract
Dropout is a popular technique for regularizing artificial neural networks. Dropout
networks are generally trained by minibatch gradient descent with a dropout mask
turning off some of the units—a different pattern of dropout is applied to every
sample in the minibatch. We explore a very simple alternative to the dropout mask.
Instead of masking dropped out units by setting them to zero, we perform matrix
multiplication using a submatrix of the weight matrix—unneeded hidden units are
never calculated. Performing dropout batchwise, so that one pattern of dropout is
used for each sample in a minibatch, we can substantially reduce training times.
Batchwise dropout can be used with fully-connected and convolutional neural networks.
1
Independent versus batchwise dropout
Dropout is a technique to regularize artificial neural networks—it prevents overfitting
[8]. A fully connected network with two hidden layers of 80 units each can learn to
classify the MNIST training set perfectly in about 20 training epochs—unfortunately
the test error is quite high, about 2%. Increasing the number of hidden units by a factor
of 10 and using dropout results in a lower test error, about 1.1%. The dropout network
takes longer to train in two senses: each training epoch takes several times longer,
and the number of training epochs needed increases too. We consider a technique for
speeding up training with dropout—it can substantially reduce the time needed per
epoch.
Consider a very simple `-layer fully connected neural network with dropout. To
train it with a minibatch of b samples, the forward pass is described by the equations:
xk+1 = [xk · dk ] × Wk
1
k = 0, . . . , ` − 1.
Here xk is a b × nk matrix of input/hidden/output units, dk is a b × nk dropout-mask
matrix of independent Bernoulli(1 − pk ) random variables, pk denotes the probability
of dropping out units in level k, and Wk is an nk × nk+1 matrix of weights connecting
level k with level k + 1. We are using · for (Hadamard) element-wise multiplication
and × for matrix multiplication. We have forgotten to include non-linear functions
(e.g. the rectifier function for the hidden units, and softmax for the output units) but for
the introduction we will keep the network as simple as possible.
The network can be trained using the backpropagation algorithm to calculate the
gradients of a cost function (e.g. negative log-likelihood) with respect to the Wk :
∂cost
∂cost
= [xk · dk ]T ×
∂Wk
∂xk+1
∂cost
∂cost
T
=
× Wk · dk .
∂xk
∂xk+1
With dropout training, we are trying to minimize the cost function averaged over an
ensemble of closely related networks. However, networks typically contain thousands
of hidden units, so the size of the ensemble is much larger than the number of training
samples that can possibly be ‘seen’ during training. This suggests that the independence of the rows of the dropout mask matrices dk might not be terribly important; the
success of dropout simply cannot depend on exploring a large fraction of the available
dropout masks. Some machine learning libraries such as Pylearn2 allow dropout to
be applied batchwise instead of independently1 . This is done by replacing dk with a
1×nk row matrix of independent Bernoulli(1−pk ) random variables, and then copying
it vertically b times to get the right shape.
To be practical, it is important that each training minibatch can be processed quickly.
A crude way of estimating the processing time is to count the number of floating point
multiplication operations needed (naively) to evaluate the × matrix multiplications
specified above:
`−1
X
k=0
b × nk × nk+1 + nk × b × nk+1 + b × nk+1 × nk .
|
{z
} |
{z
} |
{z
}
forwards
∂cost/∂W
backwards
However, when we take into account the effect of the dropout mask, we see that many
of these multiplications are unnecessary. The (i, j)-th element of the Wk weight matrix
effectively ‘drops-out’ of the calculations if unit i is dropped in level k, or if unit j is
dropped in level k + 1. Applying 50% dropout in levels k and k + 1 renders 75% of
the multiplications unnecessary.
If we apply dropout independently, then the parts of Wk that disappear are different for each sample. This makes it effectively impossible to take advantage of the
redundancy—it is slower to check if a multiplication is necessary than to just do the
multiplication. However, if we apply dropout batchwise, then it becomes easy to take
advantage of the redundancy. We can literally drop-out redundant parts of the calculations.
1 Pylearn2:
see function apply dropout in mlp.py
2
●
4000N
●
2000N
●
●
1000N
●
●
●
●
●
●
●
●
1000
3000
70
●
●
●
4000N
●
2000N
●
1000N
●
●
●
●
●
●
●
●
●
500N
●
●
100
300
●
0.1
500N
●
●
●
50
●
●
60
8000N
●
●
% Time Saving
●
●
●
●
●
40
●
●
●
8000N
30
30.0
10.0
3.0
1.0
●
●
●
●
0.3
Epoch training time, seconds
No dropout
Batchwise
●
100
300
Minibatch size
1000
3000
Minibatch size
Figure 1: Left: MNIST training time for three layer networks (log scales) on an
NVIDIA GeForce GTX 780 graphics card. Right: Percentage reduction in training
times moving from no dropout to batchwise dropout. The time saving for the 500N
network with minibatches of size 100 increases from 33% to 42% if you instead compare batchwise dropout with independent dropout.
The binary 1 × nk batchwise dropout matrices dk naturally define submatrices of
the weight and hidden-unit matrices. Let xdropout
:= xk [ : , dk ] denote the submatrix
k
of xk consisting of the level-k hidden units that survive dropout. Let Wkdropout :=
Wk [dk , dk+1 ] denote the submatrix of Wk consisting of weights that connect active
units in level k to active units in level k + 1. The network can then be trained using the
equations:
xdropout
= xdropout
× Wkdropout
k+1
k
∂cost
∂cost
= (xdropout
)T ×
k
dropout
∂Wk
∂xdropout
k+1
∂cost
∂cost
dropout T
=
× (Wk
)
∂xdropout
∂xdropout
k
k+1
The redundant multiplications have been eliminated. There is an additional benefit
in terms of memory needed to store the hidden units: xdropout
needs less space than
k
xk . In Section 2 we look at the performance improvement that can be achieved using
CUDA/CUBLAS code running on a GPU. Roughly speaking, processing a minibatch
with 50% batchwise dropout takes as long as training a 50% smaller network on the
same data. This explains the nearly overlapping pairs of lines in Figure 1.
We should emphasize that batchwise dropout only improves performance during
training; during testing the full Wk matrix is used as normal, scaled by a factor of
1 − pk . However, machine learning research is often constrained by long training times
and high costs of equipment. In Section 3 we show that all other things being equal,
batchwise dropout is similar to independent dropout, but faster. Moreover, with the
3
increase in speed, all other things do not have to be equal. With the same resources,
batchwise dropout can be used to
• increase the number of training epochs,
• increase the number of hidden units,
• increase the number of validation runs used to optimize “hyper-parameters”, or
• to train a number of independent copies of the network to form a committee.
These possibilities will often be useful as ways of improving generalization/reducing
test error.
In Section 4 we look at batchwise dropout for convolutional networks. Dropout
for convolutional networks is more complicated as weights are shared across spatial
locations. A minibatch passing up through a convolutional network might be represented at an intermediate hidden layer by an array of size 100 × 32 × 12 × 12: 100
samples, the output of 32 convolutional filters, at each of 12 × 12 spatial locations. It
is conventional to use a dropout mask with shape 100 × 32 × 12 × 12; we will call this
independent dropout. In contrast, if we want to apply batchwise dropout efficiently by
adapting the submatrix trick, then we will effectively be using a dropout mask with
shape 1 × 32 × 1 × 1. This looks like a significant change: we are modifying the
ensemble over which the average cost is optimized. During training, the error rates are
higher. However, testing the networks gives very similar error rates.
1.1
Fast dropout
We might have called batchwise dropout fast dropout but that name is already taken
[11]. Fast dropout is very different approach to solving the problem of training large
neural network quickly without overfitting. We discuss some of the differences of the
two techniques in the appendix.
2
Implementation
In theory, for n × n matrices, addition is an O(n2 ) operation, and multiplication is
O(n2.37... ) by the Coppersmith–Winograd algorithm. This suggests that the bulk of
our processing time should be spent doing matrix multiplication, and that a performance improvement of about 60% should be possible compared to networks using independent dropout, or no dropout at all. In practice, SGEMM functions use Strassen’s
algorithm or naive matrix multiplication, so performance improvement of up to 75%
should be possible.
We implemented batchwise dropout for fully-connected and convolutional neural
networks using CUDA/CUBLAS2 . We found that using the highly optimized cublasSgemm function to do the bulk of the work, with CUDA kernels used to form the submatrices Wkdropout and to update the Wk using ∂cost/∂Wkdropout , worked well. Better
2 Software
available at http://www2.warwick.ac.uk/fac/sci/statistics/staff/academic-research/graham/
4
performance may well be obtained by writing a SGEMM-like matrix multiplication
function that understands submatrices.
For large networks and minibatches, we found that batchwise dropout was substantially faster, see Figure 1. The approximate overlap of some of the lines on the left
indicates that 50% batchwise dropout reduces the training time in a similar manner to
halving the number of hidden units.
The graph on the right show the time saving obtained by using submatrices to implement dropout. Note that for consistency with the left hand side, the graph compares
batchwise dropout with dropout-free networks, not with networks using independent
dropout. The need to implement dropout masks for independent dropout means that
Figure 1 slightly undersells the performance benefits of batchwise dropout as an alternative to independent dropout.
For smaller networks, the performance improvement is lower—bandwidth issues
result in the GPU being under utilized. If you were implementing batchwise dropout
for CPUs, you would expect to see greater performance gains for smaller networks as
CPUs have a lower processing-power to bandwidth ratio.
2.1
Efficiency tweaks
If you have n = 2000 hidden units and you drop out p = 50% of them, then the
number of dropped units is approximately np = 1000, but with some small variation as
you
standard deviation is
p are really dealing with a Binomial(n, p) random variable—its
np(1 − p) = 22.4. The sizes of the submatrices Wkdropout and xdropout
are therefore
k
slightly random. In the interests of efficiency and simplicity, it is convenient to remove
this randomness. An alternative to dropping each unit independently with probability p
is to dropa subset of exactly np of the hidden units, uniformly at random from the set
n
of all np
such subsets. It is still the case that each unit is dropped out with probability
p. However, within a hidden layer we no longer have strict independence regarding
which units are dropped out. The probability of dropping out the first two hidden units
changes very slightly, from
p2 = 0.25
to
np np − 1
·
= 0.24987....
n n−1
Also, we used a modified form of NAG-momentum minibatch gradient descent [9].
After each minibatch, we only updated the elements of Wkdropout , not all the element
of Wk . With vk and vkdropout denoting the momentum matrix/submatrix corresponding
to Wk and Wkdropout , our update was
vkdropout ← µvkdropout − ε(1 − µ)∂cost/∂Wkdropout
Wkdropout ← Wkdropout + vkdropout .
The momentum still functions as an autoregressive process, smoothing out the gradients, we are just reducing the rate of decay µ by a factor of (1 − pk )(1 − pk+1 ).
5
3.5
3.0
1.0
1.5
2.0
2.5
Test
Train
0.5
0.0
% Errors after 1000 epochs
●
●
1
●
●
4
●
●
16
●
●
64
●
●
256
●
●
●
●
●
●
1024 4096
Number of dropout patterns used
Figure 2: Dropout networks trained using a restricted the number of dropout patterns
(each × is from an independent experiment). The blue line marks the test error for a
network with half as many hidden units trained without dropout.
3
Results for fully-connected networks
The fact that batchwise dropout takes less time per training epoch would count for
nothing if a much larger number of epochs was needed to train the network, or if a
large number of validation runs were needed to optimize the training process. We
have carried out a number of simple experiment to compare independent and batchwise
dropout. In many cases we could have produced better results by increasing the training
time, annealing the learning rate, using validation to adjust the learning process, etc.
We choose not to do this as the primary motivation for batchwise dropout is efficiency,
and excessive use of fine-tuning is not efficient.
For datasets, we used:
• The MNIST3 set of 28 × 28 pixel handwritten digits.
• The CIFAR-10 dataset of 32x32 pixel color pictures ([4]).
• An artificial dataset designed to be easy to overfit.
Following [8], for MNIST and CIFAR-10 we trained networks with 20% dropout in
the input layer, and 50% dropout in the hidden layers. For the artificial dataset we
increased the input-layer dropout to 50% as this reduced the test error. In some cases,
we have used relatively small networks so that we would have time to train a number
of independent copies of the networks. This was useful in order to see if the apparent
differences between batchwise and independent dropout are significant or just noise.
3 http://yann.lecun.com/exdb/mnist/
6
3.1
MNIST
Our first experiment explores the effect of dramatically restricting the number of dropout
patterns seen during training. Consider a network with three hidden layers of size 1000,
trained for 1000 epochs using minibatches of size 100. The number of distinct dropout
patterns, 23784 , is so large that we can assume that we will never generate the same
dropout mask twice. During independent dropout training we will see 60 million different dropout patterns, during batchwise dropout training we will see 100 times fewer
dropout patterns.
For both types of dropout, we trained 12 independent networks for 1000 epochs,
with batches of size 100. For batchwise dropout we got a mean test error of 1.04%
[range (0.92%,1.1%), s.d. 0.057%] and for independent dropout we got a mean test
errors of 1.03% [range (0.98%,1.08%), s.d. 0.033%]. The difference in the mean test
errors is not statistically significant.
To explore further the reduction in the number of dropout patterns seen, we changed
our code for (pseudo)randomly generating batchwise dropout patterns to restrict the
number of distinct dropout patterns used. We modified it to have period n minibatches,
with n = 1, 2, 4, 8, . . . ; see Figure 2. For n = 1 this corresponds to only ever using one dropout mask, so that 50% of the network’s 3000 hidden weights are never
actually trained (and 20% of the 784 input features are ignored). During training this
corresponds to training a dropout-free network with half as many hidden units—the test
error for such a network is marked by a blue line in Figure 2. The error during testing
is higher than the blue line because the untrained weights add noise to the network.
If n is less than thirteen, is it likely that some of the networks 3000 hidden units
are dropped out every time and so receive no training. If n is in the range thirteen to
fifty, then it is likely that every hidden unit receives some training, but some pairs of
hidden units in adjacent layers will not get the chance to interact during training, so
the corresponding connection weight is untrained. As the number of dropout masks
increases into the hundreds, we see that it is quickly a case of diminishing returns.
3.2
Artificial dataset
To test the effect of changing network size, we created an artificial dataset. It has 100
classes, each containing 1000 training samples and 100 test samples. Each class is defined using an independent random walk of length 1000 in the discrete cube {0, 1}1000 .
For each class we generated the random walk, and then used it to produce the training
and test samples by randomly picking points along the length of walk (giving binary sequences of length 1000) and then randomly flipping 40% of the bits. We trained three
layer networks with n ∈ {250, 500, 1000, 2000} hidden units per layer with minibatches of size 100. See Figure 3.
Looking at the training error against training epochs, independent dropout seems to
learn slightly faster. However, looking at the test errors over time, there does not seem
to be much difference between the two forms of dropout. Note that the x-axis is the
number of training epochs, not the training time. The batchwise dropout networks are
learning much faster in terms of real time.
7
10
50
Independent
Batchwise
6
250N
4
30
500N
% Test Error
40
35
250N
25
% Train Error
8
45
Independent
Batchwise
500N
2000N
0
100
1000N
2000N
2
20
1000N
200
0
Epoch
100
200
Epoch
Figure 3: Artificial dataset. 100 classes each corresponding to noisy observations of a
one dimensional manifold in {0, 1}1000 .
3.3
CIFAR-10 fully-connected
Learning CIFAR-10 using a fully connected network is rather difficult. We trained
three layer networks with n ∈ {125, 250, 500, 1000, 2000} hidden units per layer with
minibatches of size 1000. We augmented the training data with horizontal flips. See
Figure 4.
4
Convolutional networks
Dropout for convolutional networks is more complicated as weights are shared across
spatial locations. Suppose layer k has spatial size sk × sk with nk features per spatial
location, and if the k-th operation is a convolution with f × f filters. For a minibatch
of size b, the convolution involves arrays with sizes:
layer k : b × nk × sk × sk
weights Wk : nk+1 × nk × f × f
Dropout is normally applied using dropout masks with the same size as the layers. We
will call this independent dropout—independent decisions are mode at every spatial
location. In contrast, we define batchwise dropout to mean using a dropout mask with
shape 1 × nk × 1 × 1. Each minibatch, each convolutional filter is either on or off—
across all spatial locations.
These two forms of regularization seem to be doing quite different things. Consider a filter that detects the color red, and a picture with a red truck in it. If dropout is
applied independently, then by the law of averages the message “red” will be transmitted with very high probability, but with some loss of spatial information. In contrast,
8
60
Independent
Batchwise
50
50
Independent
Batchwise
30
45
250N
40
20
500N
% Test Error
40
125N
250N
1000N
500N
2000N
1000N
2000N
0
35
10
% Train Error
125N
0
500
1000
0
500
Epoch
1000
Epoch
Figure 4: Results for CIFAR-10 using fully-connected networks of different sizes.
with batchwise dropout there is a 50% chance we delete the entire filter output. Experimentally, the only substantial difference we could detect was that batchwise dropout
resulted in larger errors during training.
To implement batchwise dropout efficiently, notice that the 1 × nk × 1 × 1 dropout
masks corresponds to forming subarrays Wkdropout of the weight arrays Wk with size
(1 − pk+1 )nk+1 × (1 − pk )nk × f × f.
The forward-pass is then simply a regular convolutional operation using Wkdropout ; that
makes it possible, for example, to take advantage of the highly optimized cudnnConvolutionForward
function from the NVIDIA cuDNN package.
4.1
MNIST
For MNIST, we trained a LeNet-5 type CNN with two layers of 5 × 5 filters, two
layers of 2 × 2 max-pooling, and a fully connected layer [6]. There are three places for
applying 50% dropout:
50%
50%
50%
32C5 − MP2 − 64C5 − MP2 − 512N − 10N.
The test errors for the two dropout methods are similar, see Figure 5.
4.2
CIFAR-10 with varying dropout intensity
For a first experiment with CIFAR-10 we used a small convolutional network with
small filters. The network is a scaled down version of the network from [1]; there are
four places to apply dropout:
p
p
p
p
128C3 − MP2 − 256C2 − MP2 − 384C2 − MP2 − 512N − 10N.
9
0.7
0.6
0.4
0.5
% Test errror
0.8
Independent
Batchwise
50
100
150
200
Epochs
Figure 5: MNIST test errors, training repeated three times for both dropout methods.
The input layer is 24 × 24. We trained the network for 1000 epochs using randomly
chosen subsets of the training images, and reflected each image horizontally with probability one half. For testing we used the centers of the images.
In Figure 6 we show the effect of varying the dropout probability p. The training
errors are increasing with p, and the training errors are higher for batchwise dropout.
The test-error curves both seem to have local minima around p = 0.2. The batchwise
test error curve seems to be shifted slightly to the left of the independent one, suggesting that for any given value of p, batchwise dropout is a slightly stronger form of
regularization.
4.3
CIFAR-10 with many convolutional layers
We trained a deep convolutional network on CIFAR-10 without data augmentation.
Using the notation of [2], our network has the form
√
3
(64nC2 − F M P 2)12 − 832C2 − 896C1 − output,
i.e. it consists of 12 2 × 2 convolutions with 64n filters in the n-th layer, 12 layers
max-pooling, followed by two fully connected layers; the network has 12.6 million parameters. We used an increasing amount of dropout per layer, rising linearly from 0%
dropout after the third layer to 50% dropout after the 14th. Even though the amount
of dropout used in the middle layers is small, batchwise dropout took less than half as
long per epoch as independent dropout; this is because applying small amounts of independent dropout in large hidden-layers creates a bandwidth performance-bottleneck.
As the network’s max-pooling operation is stochastic, the test errors can be reduced
by repetition. Batchwise dropout resulted in a average test error of 7.70% (down to
5.78% with 12-fold testing). Independent dropout resulted in an average test error of
7.63% (reduced to 5.67% with 12-fold testing).
10
●
●
●
15
Independent
Testing
●
●
●
●
●
10
●
●
●
●
●
●
Batchwise
Training ●
5
% error
Batchwise
Testing
●
●
●
●
●
●
●
Independent
Training
●
0
●
●
●
0.0
0.1
0.2
0.3
0.4
p
Figure 6: CIFAR-10 results using a convolutional network with dropout probability
p ∈ (0, 0.4). Batchwise dropout produces a slightly lower minimum test error.
5
Conclusions and future work
We have implemented an efficient form of batchwise dropout. All other things being
equal, it seems to learn at roughly the same speed as independent dropout, but each
epoch is faster. Given a fixed computational budget, it will often allow you to train
better networks.
There are other potential uses for batchwise dropout that we have not explored yet:
• Restricted Boltzmann Machines can be trained by contrastive divergence [3] with
dropout [8]. Batchwise dropout could be used to increase the speed of training.
• When a fully connected network sits on top of a convolutional network, training the top and bottom of the network can be separated over different computational nodes [5]. The fully connected top-parts of the network typically contains
95% of the parameters—keeping the nodes synchronized is difficult due to the
large size of the matrices. With batchwise dropout, nodes could communicate
∂cost/∂Wkdropout instead of ∂cost/∂Wk and so reducing the bandwidth needed.
• Using independent dropout with recurrent neural networks can be too disruptive
to allow effective learning; one solution is to only apply dropout to some parts
of the network [12]. Batchwise dropout may provide a less damaging form of
dropout, as each unit will either be on or off for the whole time period.
• Dropout is normally only used during training. It is generally more accurate
use the whole network for testing purposes; this is equivalent to averaging over
the ensemble of dropout patterns. However, in a “real-time” setting, such as
11
analyzing successive frames from a video camera, it may be more efficient to
use dropout during testing, and then to average the output of the network over
time.
• Nested dropout [7] is a variant of regular dropout that extends some of the properties of PCA to deep networks. Batchwise nested dropout is particularly easy
to implement as the submatrices are regular enough to qualify as matrices in the
context of the SGEMM function (using the LDA argument).
• DropConnect is an alternative form of regularization to dropout [10]. Instead of
dropping hidden units, individual elements of the weight matrix are dropped out.
Using a modification similar to the one in Section 2.1, there are opportunities for
speeding up DropConnect training by approximately a factor of two.
References
[1] D. Ciresan, U. Meier, and J. Schmidhuber. Multi-column deep neural networks
for image classification. In Computer Vision and Pattern Recognition (CVPR),
2012 IEEE Conference on, pages 3642–3649, 2012.
[2] Ben Graham. Fractional max-pooling, 2014. http://arxiv.org/abs/1412.6071.
[3] Hinton and Salakhutdinov. Reducing the Dimensionality of Data with Neural
Networks. SCIENCE: Science, 313, 2006.
[4] Alex Krizhevsky. Learning Multiple Layers of Features from Tiny Images. Technical report, 2009.
[5] Alex Krizhevsky. One weird trick for parallelizing convolutional neural networks,
2014. http://arxiv.org/abs/1404.5997.
[6] Y. L. Le Cun, L. Bottou, Y. Bengio, and P. Haffner. Gradient-based learning applied to document recognition. Proceedings of IEEE, 86(11):2278–2324, November 1998.
[7] Oren Rippel, Michael A. Gelbart, and Ryan P. Adams. Learning ordered representations with nested dropout, 2014. http://arxiv.org/abs/1402.0915.
[8] Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. Dropout: A Simple Way to Prevent Neural Networks from
Overfitting. Journal of Machine Learning Research, 15:1929–1958, 2014.
[9] Ilya Sutskever, James Martens, George E. Dahl, and Geoffrey E. Hinton. On the
importance of initialization and momentum in deep learning. In ICML, volume 28
of JMLR Proceedings, pages 1139–1147. JMLR.org, 2013.
[10] Li Wan, Matthew Zeiler, Sixin Zhang, Yann Lecun, and Rob Fergus. Regularization of Neural Networks using DropConnect, 2013. JMLR W&CP 28 (3) :
1058–1066, 2013.
12
[11] Sida Wang and Christopher Manning. Fast dropout training. JMLR W & CP,
28(2):118–126, 2013.
[12] Wojciech Zaremba, Ilya Sutskever, and Oriol Vinyals. Recurrent neural network
regularization, 2014. http://arxiv.org/abs/1409.2329.
13
A
Fast dropout
We might have called batchwise dropout fast dropout but that name is already taken
[11]. Fast dropout is an alternative form of regularization that uses a probabilistic
modeling technique to imitate the effect of dropout; each hidden unit is replaced with
a Gaussian probability distribution. The fast relates to reducing the number of training
epochs needed compared to regular dropout (with reference to results in a preprint4
of [8]). Training a network 784-800-800-10 on the MNIST dataset with 20% input
dropout and 50% hidden-layer dropout, fast dropout converges to a test error of 1.29%
after 100 epochs of L-BFGS. This appears to be substantially better than the test error
obtained in the preprint after 100 epochs of regular dropout training.
However, this is a dangerous comparison to make. The authors of [8] used a
learning-rate scheme designed to produce optimal accuracy eventually, not after just
one hundred epochs. We tried using batchwise dropout with minibatches of size 100
and an annealed learning rate of 0.01e−0.01×epoch . We trained a network with two
hidden layers of 800 rectified linear units each. Training for 100 epochs resulted in a
test error of 1.22% (s.d. 0.03%). After 200 epochs the test error has reduced further
to 1.12% (s.d. 0.04%). Moreover, per epoch, batchwise-dropout is faster than regular
dropout while fast-dropout is slower. Assuming we can make comparisons across different programs5 , the 200 epochs of batchwise dropout training take less time than the
100 epoch of fast dropout training.
4 http://arxiv.org/abs/1207.0580
5 Using our software to implement the network, each batchwise dropout training epoch take 0.67 times
as long as independent dropout. In [11] a figures of 1.5 is given for the ratio between fast- and independentdropout when using minibatch SGD; when using L-BFGS to train fast-dropout networks the training time per
epoch will presumably be even more than 1.5 times longer, as L-BFGS use line-searches requiring additional
forward passes through the neural network.
14
| 9cs.NE
|
Matching while Learning
Ramesh Johari∗
Vijay Kamble†
Yash Kanoria‡
June 20, 2017
arXiv:1603.04549v2 [cs.LG] 18 Jun 2017
Abstract
We consider the problem faced by a service platform that needs to match supply with
demand, but also to learn attributes of new arrivals in order to match them better in the
future. We introduce a benchmark model with heterogeneous workers and jobs that arrive
over time. Job types are known to the platform, but worker types are unknown and must be
learned by observing match outcomes. Workers depart after performing a certain number
of jobs. The payoff from a match depends on the pair of types and the goal is to maximize
the steady-state rate of accumulation of payoff.
Our main contribution is a complete characterization of the structure of the optimal policy in the limit that each worker performs many jobs. The platform faces a trade-off for each
worker between myopically maximizing payoffs (exploitation) and learning the type of the
worker (exploration). This creates a multitude of multi-armed bandit problems, one for each
worker, coupled together by the constraint on availability of jobs of different types (capacity
constraints). We find that the platform should estimate a shadow price for each job type,
and use the payoffs adjusted by these prices, first, to determine its learning goals and then,
for each worker, (i) to balance learning with payoffs during the “exploration phase”, and (ii)
to myopically match after it has achieved its learning goals during the “exploitation phase."
Keywords: matching, learning, two-sided platform, multi-armed bandit, capacity constraints.
1
Introduction
This paper considers a central operational challenge faced by platforms that serve as matchmakers between supply and demand. Such platforms face a fundamental exploration-exploitation
trade-off: on the one hand, efficient operation involves making matches that generate the most
value (“exploitation”); on the other hand, the platform must continuously learn about newly
arriving participants, so that they can be efficiently matched (“exploration”). In this paper, we
develop a structurally simple and nearly optimal approach to resolving this trade-off.
In the model we consider, there are two groups of participants: workers and jobs. The
terminology is inspired by online labor markets (e.g., Upwork for remote work, Handy for housecleaning, Thumbtack and Taskrabbit for local tasks, etc.); however, our model can be viewed
as a stylized abstraction of many other matching platforms as well. Time is discrete, and new
workers and jobs arrive at the beginning of every time period. Workers depart after performing
∗
Stanford University ([email protected])
Stanford University ([email protected])
‡
Columbia Business School ([email protected])
†
1
a specified number of jobs. Each time a worker and job are matched, a (random) payoff is
generated and observed by the platform, where the payoff distribution depends on the worker
type and the job type.
As our emphasis is on the interaction between matching and learning, our model has several
features that focus our analysis in this paper. First, we assume that the platform centrally
controls matching: at the beginning of each time period, the platform matches each worker in
the system to an available job. Second, strategic considerations are not modeled; this remains an
interesting direction for future work. Finally, we focus on the goal of maximizing the steady-state
rate of payoff generation.1
We now describe the learning challenge faced by the platform. In most platforms, more is
known about one side of the platform than the other; accordingly, we assume job types are
known, while the type of a new worker is unknown. The platform learns about workers’ types
through the payoffs obtained when they are matched to jobs. However, because the supply of
jobs is limited, using jobs to learn can reduce immediate payoffs, as well as deplete the supply
of jobs available to the rest of the marketplace. Thus the presence of capacity constraints forces
us to carefully design both exploration and exploitation in the matching algorithm in order to
optimize the rate of payoff generation.
Our main contribution in this paper is the development of a matching policy that is nearly
payoff optimal. Our algorithm is divided into two phases in each worker’s lifetime: exploration
(identification of the worker type) and exploitation (optimal matching given the worker’s identified type). We refer to our policy as DEEM: Decentralized Explore-then-Exploit for Matching.
To develop intuition for our solution, consider a simple example with two types of jobs (“easy”
and “hard”) and two types of workers (“expert” and “novice”). Experts can do both types of tasks
well; but novices can only do easy tasks well. Suppose that there is a limited supply of easy jobs:
more than the mass of novices available, but less than the total mass of novices and experts. In
particular, to maximize payoff the platform must learn enough to match some experts to hard
jobs.
DEEM has several key features, each of which can be understood in the context of this
example. First, DEEM has a natural decentralization property: it determines the choice of
job type for a worker based only on that worker’s history. This decentralization is arguably
essential in large-scale online platforms, where matching is typically carried out on an individual
basis, rather than centrally. In order to accomplish this decentralization, it is essential for the
algorithm to account for the externality to the rest of the market when a worker is matched to a
given job. For example, if easy jobs are relatively scarce, then matching a worker to such a job
makes it unavailable to the rest of the market. Our approach is to “price” this externality: we
find shadow prices for the capacity constraints, and adjust per-match payoffs downward using
these prices.
Second, our algorithm design specifies learning goals that ensure an efficient balance between
exploration and exploitation. In particular, in our example, we note that there are two kinds of
errors possible while exploring: misclassifying a novice as an expert, and vice versa. Occasionally
mislabeling experts as novices is not catastrophic: some experts need to do easy jobs anyway,
and so the algorithm can account for such errors in the exploitation phase. Thus, relatively less
effort can be invested in minimizing this error type. However, mistakenly labeling novices as
experts can be catastrophic: in this case, novices will be matched to hard jobs in the exploitation
1
This is a reasonable proxy for the goal of a platform that, say, takes a fraction of the total surplus generated
through matches. More generally, we believe that this is a benchmark problem whose solution informs algorithmic
design for settings with other related objectives, such as revenue maximization.
2
phase, causing substantial loss of payoff; thus the probability of such errors must be kept very
small. A major contribution of our work is to precisely identify the correct learning goals in
the exploration phase, and to then design DEEM to meet these learning goals while maximizing
payoff generation.
Third, DEEM involves a carefully constructed exploitation phase to ensure that capacity
constraints are met while maximizing payoffs. A naive approach during the exploitation phase
would match a worker to any job type that yields the maximum externality-adjusted payoff
corresponding to his type label. It turns out that such an approach leads to significant violations
of capacity constraints, and hence poor performance. The reason is that in a generic capacitated
problem instance, one or more worker types are indifferent between multiple job types, and
suitable tie-breaking is necessary to achieve good performance. In our theoretical development,
we achieve this by modifying the solution to the static optimization problem with known worker
types, whereas our practical implementation of DEEM achieves appropriate tie-breaking via
simple but dynamically updated shadow prices.
Our main result (Theorem 5.1) shows that DEEM achieves essentially optimal regret as the
number of jobs N performed by each worker during their lifetime grows, where regret is the loss
in payoff accumulation rate relative to the maximum achievable with known worker types. In
our setting, a lower bound on the regret is (C log N/N )(1 + o(1)) for some C ∈ [0, ∞) that is a
function of system parameters. DEEM achieves this level of regret to leading order when C > 0,
while it achieves a regret of O(log log N/N ) if C = 0.
Situations where C > 0 are those in which there is an inherent tension between the goals
of learning and payoff maximization. To develop intuition, consider an expanded version of the
example above, where each worker can be either an expert or novice programmer, as well as an
expert or novice graphic designer. Suppose the supply of jobs is such that if worker types were
known, only expert graphic designers who are also novice programmers would be matched to
graphic design jobs.2 But if we are learning worker types, then expert graphic designers must
be matched to approximately O(log N ) programming jobs to learn whether they are novice
or expert programmers – and in turn, whether they should be matched to graphic design or
programming jobs, respectively. Thus O(log N/N ) average regret per period is incurred relative
to the optimal solution with known types. DEEM precisely minimizes the regret incurred while
these distinctions are made, thus achieving the lower bound on the regret.
Our theory is complemented by a practical heuristic that we call DEEM+ , which optimizes
performance for small values of N , and an implementation and simulation that demonstrates a
natural way of translating our work into practice. In particular, our simulations reveal substantial benefit from jointly managing capacity constraints and learning, as we do in DEEM and
DEEM+ .
The remainder of the paper is organized as follows. After discussing related work in Section 2,
we present our model and outline the optimization problem of interest to the platform in Section
3. In Section 4, we discuss the three key ideas above in the design of DEEM, and present its
formal definition. In Section 5, we present our main theorem, and discuss the optimal regret
scaling. In Section 6 we present a sketch of the proof of the main result. In Section 7, discuss
practical implementation of DEEM and present the heuristic DEEM+ . In Section 8, we use
simulations to compare the performance of DEEM and DEEM+ with well-known multi-armed
bandit algorithms. We conclude in Section 9. All proofs are in the appendices.
2
This would be the case, e.g., if programming jobs are both in high demand and more valuable (conditional
on successful completion) than graphic design jobs.
3
2
Related literature
A foundational model for investigating the exploration-exploitation tradeoff is the stochastic
multi-armed bandit (MAB) problem [9, 18, 23]. The goal is to find an adaptive expected-regretminimizing policy for choosing among arms with unknown payoff distributions (where regret
is measured against the expected payoff of the best arm) [4, 10, 28]. The closest work in this
literature to our paper is by Agrawal et al. [1]; in their model, they assume the joint vector
of arm distributions can only take on one of finitely many values. This introduces correlation
across different arms; depending on certain identifiability conditions, the optimal regret is either
Θ(1/N ) or Θ(log N/N ). In our model, the analog is that job types are arms, and for each worker
we solve a MAB problem to identify the true type of a worker, from among a finite set of possible
worker types.
Our work is also related to recent literature on MAB problems with capacity constraints; we
refer to these broadly as bandits with knapsacks. The formulation is the same as the classical
MAB problem, with the modification that every pull of an arm depletes a vector of resources
which are limited in supply [14]. The formulation subsumes several related problems in revenue
management under demand uncertainty [11, 16, 17, 34, 37], and budgeted dynamic procurement
[13, 36]; there have been a variety of extensions [2, 15], with recently a significant generalization
of the problem to a contextual bandit setting, with concave rewards and convex constraints
[3, 5]. There is considerable difference between our model and bandits with knapsacks. Bandits
with knapsacks consider a single MAB problem over a fixed time horizon. Our setting on the
other hand can be seen as a system with an ongoing arriving stream of MAB problems, one
per worker; these MAB problems are coupled together by the capacity constraints on arriving
jobs. Indeed, as noted in the introduction, a significant structural point for us is to solve these
problems in a decentralized manner, to ease their implementation in large-scale online platforms.
We conclude by discussing some other directions of work that are related to this paper.
There are a number of recent pieces of work that consider efficient matching in dynamic twosided matching markets [6, 7, 12, 20, 21, 24, 25, 27]; a related class of dynamic resource allocation
problems, online bipartite matching, is also well studied in the computer science community (see
[32] for a survey). Similar to the current paper, Fershtman and Pavan [22] also study matching
with learning, mediated by a central platform. Relative to our model, their work does not
have constraints on the number of matches per agent, while it does consider agent incentives.
Finally, a recent work [31] studies a pure learning problem in a setting similar to ours with
capacity constraints on each type of server/expert; while there are some similarities in the style
of analysis, that paper focuses exclusively on learning the exact type, rather than balancing
exploration and exploitation as we do in this paper.
3
The model and the optimization problem
In this section we first describe our model. In particular, we describe the primitives of our
platform (“workers” and “jobs”), and givea formal specification of the matching process we study.
We conclude by precisely defining the optimization problem of interest that we solve in this paper.
3.1
Preliminaries
Workers and jobs. For convenience we adopt the terminology of workers and jobs to describe
the two sides of the market. We assume a fixed set of job types J , and a fixed set of worker
4
types I.
A key point is that the model we consider is a continuum model, and so the evolution of the
system will be described by masses of workers and jobs.3 In particular, at each time step, a mass
ρ̂(i) > 0 of workers of type i and a mass µ(j) > 0 of jobs of type j arrive. In what follows, we
model the scenario where type uncertainty exists only for workers; i.e., the platform will know
the types of arriving jobs exactly, but will need to learn the types of arriving workers. We also
assume for now that the arrival rates of jobs and workers are known to the platform; later in
Section 7, we discuss how the platform might account for the possibility that these parameters
are unknown.
Matching and the payoff matrix. If a mass of workers of type i is matched to a mass
of jobs of type j, we assume that a fraction A(i, j) of this mass of matches generates a reward
of 1 (per unit mass), while a fraction 1 − A(i, j) generates a reward of zero (per unit mass).
This formal specification is meant to capture a large-system model in a setting where matches
between type i workers and type j jobs generate a Bernoulli(A(i, j)) payoff. We do not concern
ourselves with the division of payoffs between workers and employers in this paper; instead we
assume that the platform’s goal is to maximize the total rate of payoff generation.4 We call the
matrix A the payoff matrix; throughout, we assume that no two rows of A are identical.5
A key assumption in our work is that the platform knows the matrix A. In particular, we
are considering a platform that has enough aggregate information to understand compatibility
between different worker and job types; however, for any given worker newly arriving to the
platform, the platform does not know the worker’s type. Thus, from the perspective of the
platform, there will be uncertainty in payoffs in each period because although the platform
knows that a given mass of workers of type i exist in the platform, the identity of the workers
of type i is not known.
We define an “empty” job type κ, such that all worker types matched to κ generate zero
reward, i.e., A(i, κ) = 0 for all i. We view κ as representing the possibility that a worker
goes unmatched, and thus assume that an unbounded capacity of job type κ is available, i.e.,
µ(κ) = ∞.
Worker lifetimes. We imagine that each arriving worker lives in the system for N time
steps,6 and has the opportunity to be matched to a job in each time step (so each job takes one
unit of time to complete). We assume the platform knows N .
Note that we have ρ(i) = ρ̂(i)N as the total mass of workers of type i in the system at each
time step. For our theoretical analysis, we later consider a scaling regime where N → ∞, and
ρ̂(i) → 0, while ρ(i) remains fixed. In this regime, worker lifetimes grow to infinity, and arrival
rates scale down, but the total mass of workers of each type available in each time period remains
fixed.
Generalized imbalance. Throughout our technical development, we make a mild structural
assumption on the problem instance, defined by the tuple (ρ, µ, A). This is captured by the
following definition. We say that arrival rates ρ = (ρ(i))i∈I and µ = (µ(j))j∈J satisfy the
generalized imbalance condition if there is no pair of nonempty subsets of worker types and job
3
Formally, this can be seen as a continuum scaling of a discrete system; see, e.g., [19, 29, 30]
This would be the case, e.g., in a platform where the operator takes a fixed percentage of the total payoff
generated from a match.
5
This mild requirement simply ensures that it is possible, in principle, to distinguish between each pair of
worker types.
6
Our analysis and results generalize to random worker lifetimes that are i.i.d. across workers of different types,
with mean N and any distribution such that the lifetime exceeds N/polylog(n) with high probability.
4
5
types (I 0 , J 0 ), such that the total worker arrival rate of I 0 exactly matches the total job arrival
rate of J 0 . Formally,
X
X
ρ(i) 6=
µ(j) ∀I 0 ⊆ I, J 0 ⊆ J , I 0 6= φ .
i∈I 0
j∈J 0
The generalized imbalance condition holds generically.7 Note that this condition does not depend
on the matrix A.
Worker history. To define the state of the system and the resulting matching dynamics,
we need the notion of a worker history. A worker history is a tuple Hk = ((j1 , x1 ), . . . , (jk , xk )),
where jm is the job type this worker was matched to at her m-th time step in the system, for
1 ≤ m ≤ k; and xm ∈ {0, 1} is the corresponding reward obtained. Note that since workers live
for N jobs, the histories will have k = 0, . . . , N − 1. We let φ denote the empty history (for
k = 0).
3.2
System dynamics
Our goal is to model the following process. The operator observes, at any point in time, the
distribution of histories of workers in the platform, and also knows the job arrival rate µ. The
matching policy of the platform amounts to determining what mass of workers of each type of
history will be matched to which type of jobs. Ultimately, for this process to generate high
payoffs over time, the platform must choose jobs to learn worker types in order to optimize
payoffs.
With this intuition in mind, we now give a formal specification of our system dynamics.
System profile. A system profile ν is a joint measure over worker histories and worker types;
i.e., ν(Hk , i) is the mass of workers in the system with history Hk and type i. The evolution of
the system is a discrete-time dynamical system ν0 , ν1 , ν2 , . . ., where each νt is a system profile.8
Matching policy. To describe the dynamics we assume that the platform uses a matching
policy to match the entire mass of workers to jobs in each time step (we think of unmatched
workers as being matched to the empty job type κ). We assume that any mass of jobs left
unmatched in a given period disappears at the end of that period (our results do not depend on
this assumption).
Suppose that the system starts at time t = 0 with no workers in the system before this time.9
A matching policy π0 , π1 , . . . for the system specifies, at each time t, given a system profile νt ,
the mass of workers with each history that is matched to jobs of each type. In particular, let
πt (Hk , j|νt ) denote the fraction of workers
with history Hk matched to jobs of type j at time
P
t, given a system profile νt . (Thus j πt (Hk , j|νt ) = 1 for all t, Hk , and νt .) Note that the
matching policy acts on each worker’s history, not on the true type of each worker: this is because
the platform is assumed to not know worker types, except as learned through the history itself.
Dynamics. These features completely determine the evolution of the system profile {νt }.
Observe that νt (Hk , i)πt (Hk , j|νt ) is the total mass of workers of type i with history Hk who are
|I|+|J |
7
The set (ρ̂, µ) for which the condition holds is open and dense in R++
, where R++ are the strictly positive
real numbers.
8
The platform cannot directly observePthe system profile,
but can infer it. The platform observes the mass
of workers with each possible history
ν(H
,
i)
.
It
can then infer ν(Hk , i)’s individually by using
k
i∈I
Hk
knowledge of arrival rates ρ̂(i)’s, and the A matrix (which allows it to calculate the likelihood of seeing the
sequence of outcomes in Hk under the worker type i), together with Bayes’ rule.
9
In what follows we ultimately consider a steady-state analysis of the dynamical system, and initial conditions
will be irrelevant as long as the initial mass of workers is bounded.
6
matched to jobs of type j at time t, given policy πt and system profile νt . For all i, j, and t, we
have
νt+1 (φ, i) = ρ̂(i);
(1)
νt+1 ((Hk , (j, 1)), i) = νt (Hk , i)πt (Hk , j|νt )A(i, j),
k = 0, . . . , N − 2;
νt+1 ((Hk , (j, 0)), i) = νt (Hk , i)πt (Hk , j|νt )(1 − A(i, j)), k = 0, . . . , N − 2.
(2)
(3)
Decentralization through worker-history-only (WHO) policies. Note that, in general, policies may be time-varying, and may have complex dependence on the system profile νt .
We consider a much simpler class of policies that we call worker-history-only (WHO) policies.
These are policies where there exists a π such that
πt (Hk , j|νt ) = π(Hk , j).
In other words, in a WHO policy, the fraction of workers with history Hk who are matched to
jobs of type j does not depend on either time or on the full system profile. Thus WHO policies
are decentralized.
An obvious concern at this point is that a policy cannot allocate more jobs of type j than
there are. We formalize this capacity constraint in (8) below: in particular, a WHO policy does
not exceed the capacity of any job type in any period if and only if it satisfies (8).
Let ΠN denote the class of WHO policies, for a given N . In Section D.1 in Appendix D, we
establish that it suffices to restrict attention to policies in ΠN that satisfy (8).
Remark 1. For any feasible policy, there exists a WHO policy satisfying capacity constraints
that achieves a payoff accumulation rate arbitrarily close to that of the former policy. In particular, WHO policies satisfying capacity constraints suffice to achieve the highest possible payoff
accumulation rate.
Steady state of a WHO policy π. First, suppose that there are no capacity constraints,
and consider the system dynamics (1)–(3), assuming the system initially starts empty. The
dynamics (1)–(3) yields a unique steady state that can be inductively computed for k = 0, 1, . . .:
νπ (φ, i) = ρ̂(i);
(4)
νπ ((Hk , (j, 1)), i) = νπ (Hk , i)π(Hk , j)A(i, j), k = 0, . . . , N − 2;
(5)
νπ ((Hk , (j, 0)), i) = νπ (Hk , i)π(Hk , j)(1 − A(i, j)), k = 0, . . . , N − 2.
(6)
We refer to the measure νπ as the steady state induced by the policy π.
Routing matrix of a WHO policy π. If the system is in steady state, then at any time
period, π induces a steady-state fraction
P xπ (i, j) of the mass
P of workers of type i that are assigned
ν (H,i)π(H,j)
ν (H,i)π(H,j)
to type j jobs. We have xπ (i, j) = HPπ νπ (H,i)
= H π ρ(i)
. We call {xπ (i, j)}I×J
H
the routing matrix achieved by the policy π. This is a (row) stochastic matrix; i.e., each row
sums to 1. Observe that the mass of demand for jobs of type j from workers of type i in any
time
P period is ρ(i)xπ (i, j), and the total mass of demand for jobs of type j in any time period
is i∈I ρ(i)xπ (i, j).
Let X N = xπ : π ∈ ΠN ⊆ [0, 1]|I|×|J | be the set of routing matrices achievable (when
each worker does N jobs) by WHO policies. (Again, we note that capacity constraints are
ignored in the definition of X N .) In Appendix D, we show that X N is a convex polytope (see
Proposition D.4).
7
3.3
The optimization problem
Our paper focuses on maximization of the steady-state rate of payoff accumulation, subject to
the capacity constraints. This leads to the following optimization problem:
X
X
maximize W N (π) ,
ρ(i)
xπ (i, j)A(i, j)
(7)
i∈I
subject to
X
j∈J
ρ(i)xπ (i, j) ≤ µ(j)
∀j ∈ J ;
(8)
i∈I
xπ ∈ X N .
(9)
The objective is the steady-state rate of payoff accumulation per time period, expressed in terms
of the routing matrix induced by a (WHO) policy π. The constraint is the capacity constraint:
the system will be stable if and only if the total “demand” for jobs of type j is not greater than
the arrival rate of jobs of type j.
Since X N is a convex polytope, this is a linear program, albeit a complex one. The complexity
of this problem is hidden in the complexity of the set X N , which includes all possible routing
matrices that can be obtained using WHO policies. The remainder of our paper is devoted to
solving this problem and characterizing its value, by considering an asymptotic regime where
N → ∞.
3.4
The benchmark: Known worker types
We evaluate our performance relative to a natural benchmark: the maximal rate of payoff accumulation possible if worker types are perfectly known upon arrival. In this case, any stochastic
matrix is feasible as a routing matrix. Let D denote the set of all stochastic matrices:
X
|I|×|J |
D= x∈R
: x(i, j) ≥ 0;
x(i, j) = 1 .
(10)
j∈J
Note that any routing matrix in D is implementable by a simple policy under known worker
types: given a desired routing matrix x, route a fraction x(i, j) of workers of type i to jobs of
type j.
Thus, with known worker types, the maximal rate of payoff accumulation is given by the
solution to the following optimization problem:
X
X
maximize
ρ(i)
x(i, j)A(i, j)
(11)
i∈I
subject to
X
j∈J
ρ(i)x(i, j) ≤ µ(j)
∀j ∈ J ;
(12)
i∈I
x ∈ D.
(13)
We let V ∗ denote the maximal value of the preceding optimization problem, and let x∗ denote
the solution. This linear program is a special case of the “static planning problem” that arises
frequently in the operations literature (see, e.g. [8]). The problem can also be viewed as a
version of the assignment problem due to Shapley and Shubik [35], in which the resources are
divisible.
8
3.5
Regret
We evaluate the performance of a given policy in terms of its regret relative to V ∗ . In particular,
given N and a WHO policy π satisfying (8), we define the regret of π as V ∗ − W N (π).
We focus on the asymptotic regime where N → ∞, and try to find policies that have “small”
regret in this regime. This asymptotic regime allows us to identify structural aspects of policies
that perform well. In Appendix D (see Proposition D.3), we show that it is relatively “easy” to
design policies that achieve a vanishing regret (and even regret that is within a constant factor
of the smallest possible). The idea is straightforward: informally, when N is large, policies that
“explore” for a vanishing fraction of worker lifetimes will be able to learn the worker’s true type
sufficiently well to yield a rate of payoff accumulation such that regret converges to zero in the
limit.
For this reason, our analysis focuses on a more refined notion of asymptotic optimality. In
particular, we focus on developing policies that achieve a nearly optimal rate at which the regret
V ∗ − W N (πN ) approaches zero. This is formalized in Theorem 5.1 below.
3.6
A note on terminology
Note that, intuitively, WHO policies have the feature that decisions are taken on the basis of
the history of a given worker, not on the basis of the system profile as a whole. In the sequel, we
will typically refer to π(Hk , j) as “the probability that a worker of history Hk is matched to a job
of type j.” We use this terminology to make the presentation more intuitive, since the intention
is that our algorithms be implemented at the level of each individual worker’s history. However,
to formalize all our arguments, we emphasize that our proofs translate π(Hk , j) as the fraction
of workers of history Hk matched to a job type j; this correspondence applies throughout the
technical development.
4
Decentralized Explore-then-Exploit for Matching (DEEM): A
payoff-maximizing policy
In this section we present the design of a sequence of policies
∗ that achieves a nearly optimal rate of convergence of reπN
∗ ). We refer to our policy design as DEEM:
gret V ∗ − W N (πN
Decentralized Explore-then-Exploit for Matching. Our main
result, stated in the next section, is Theorem 5.1: there we
exactly quantify the regret performance of DEEM (an upper
bound on its regret), and characterize it as nearly optimal
(a lower bound on the regret of any feasible WHO policy).
To begin to understand the challenges involved, consider
the example in Figure 1. In this example, there are two types
of workers: “novice” and “expert,” with a mass of ρ = 0.5 of
each present in steady state. There are two types of jobs:
“easy” and “hard,” each arriving at rate 0.6.
Jobs
0.6
𝜇
0.6
Workers
Easy
Hard
0.5 Expert
0.9
0.8
0.9
0.1
𝜌
0.5 Novice
Figure 1: An example
We make several observations regarding this example that inform our subsequent work.
1. The benchmark. In this example, the optimal solution to the benchmark problem (11)–
9
(13) with known types routes all novices to easy jobs, a mass 0.1 of experts to easy jobs, and a
mass 0.4 of experts to hard jobs. Of course, our problem is that we do not know worker types
on arrival.
2. Capacity constraints affect an optimal WHO policy’s need to learn. If easy and hard jobs
are in infinite supply, then the WHO policy π that matches all workers to easy jobs is optimal.
However, with the finite supply of available easy jobs, some workers must do hard jobs. But
which workers?
Clearly, for payoff optimality, an optimal policy should aim to match experts to hard jobs.
But this is only possible if it first learns that a worker is an expert. Because of the structure of
A, the type of a worker can only be learnt by matching it to hard jobs; those who perform well
on these jobs are experts, and those who fail are novices.
3. Minimizing regret requires learning up front. Assigning workers of unknown type to hard
jobs necessarily incurs regret relative to the benchmark. Indeed, novices unknowingly matched
to hard jobs lead to a regret of 0.8 per unit mass of such workers in each period. Minimizing this
regret therefore requires that the algorithm not only learn worker types, but also do so relatively
early in their lifetime, so that workers identified as experts can be assigned many hard jobs.
In our work, this leads to a structure where we separate our policy into exploration and
exploitation phases: the policy first tries to learn a worker’s type, and then “exploits” by assigning
this worker to jobs while assuming that the learned type is correct. The exploration phase will
be of length O(log N ), which is short relative to the worker’s lifetime.
4. Some mistakes in the exploration phase are worse than others. There are two kinds of
mistakes that the policy can make while learning: it can mistakenly identify novices as experts,
and it can mistakenly identify experts and novices. These mistakes differ in their impact on
regret.
Suppose that at the end of the exploration phase, the algorithm misclassifies a novice as
an expert. This has a dire impact on regret: the novice is then assigned to hard jobs in the
exploitation phase, and as noted above, this incurs a regret of 0.8 per unit mass (of workers
misclassified this way) per unit time. Thus we must work hard in the exploration phase to avoid
such errors.
On the other hand, suppose that at the end of the exploration phase, the algorithm misclassifies an expert as a novice. This mistake is far less consequential: workers misclassified in this
way will be assigned to easy jobs. But a mass 0.1 of experts must be assigned to easy jobs even
in the benchmark solution with known types. Therefore, as long as this misclassified mass is not
too large, we can adjust for it in the exploitation phase.
This discussion highlights the need to precisely identify the learning goals of the algorithm:
to minimize regret, how strongly does each worker type need to be distinguished from others?
A major contribution of our work is to demonstrate an optimal construction of learning goals
for regret minimization. As noted above, the capacity constraints fundamentally influence the
learning goals of the algorithm.
In the remainder of the section, we describe key ideas behind the construction of our policy,
highlighted by the issues raised in the preceding example. We formally describe DEEM in
Section 4.4. We state our main theorem in Section 5.
10
4.1
Key idea 1: Use shadow prices as an “externality adjustment” to payoffs
We begin by first noticing an immediate difficulty that arises in using WHO policies in the
presence of capacity constraints. WHO policies are decentralized, i.e., they act only on the
history of the worker; as such, they cannot use aggregate state information about the system,
that conveys whether capacity constraints are being met or not. In order to solve (7)–(9),
therefore, we need to find a way to “adjust” for capacity constraints despite the fact that our
policy acts only at the level of worker histories.
Our key insight is to use shadow prices for the capacity constraints to adjust payoffs; we then
measure regret with respect to these adjusted payoffs. Recall that (7)–(9) is a linear program.
Let pN be the optimal shadow prices (dual variables) for the capacity constraints (8). Then by
standard duality results, it follows that the policy that is optimal for (7)–(9) is also optimal for
the following unconstrained optimization problem:
X
X
maximizexπ ∈X N
ρ(i)
xπ (i, j)(A(i, j) − pN (j)).
(14)
i∈I
j∈J
Thus one may attempt to account for capacity constraints using shadow prices10 pN (j).
The challenge here is that the set X N is quite complex, and thus characterizing the optimal
shadow prices of (7)–(9) is not a reasonable path forward. Instead, we use the optimal shadow
prices in the benchmark linear program with known types (11)–(13) to adjust payoffs; we then
measure regret with respect to these adjusted payoffs (the practical heuristic we implement uses
a different, instance-independent approach to estimate shadow prices; see Section 7).
We let p∗ denote the vector of optimal shadow prices for the capacity constraint (12) in the
problem with known types (11)–(13). Using the generalized imbalance condition, we show that
these prices are uniquely determined; see Proposition D.2 in Appendix D.
Although p∗ (j) 6= pN (j), for large N , the platform should be able to learn the type of a
worker type early in her lifetime, leading to small |p∗ (j) − pN (j)|. This motivates an analog of
(14):
X
X
maximizexπ ∈X N
ρ(i)
xπ (i, j)(A(i, j) − p∗ (j)).
(15)
i∈I
j∈J
We develop a near-optimal algorithm for problem (15), such that (1) constraints on job
capacities are not violated, and (2) complementary slackness conditions are satisfied, i.e., if
p∗ (j) > 0, then the job type j is fully utilized. We then show this leads to the upper bound in
the main result.
4.2
Key idea 2: Meet required learning goals while minimizing regret
As noted in our discussion of the example in Figure 1, we must carefully define the learning
goals of the algorithm: which worker types need to be distinguished from which others, and
with what level of confidence? A key contribution of our work is to formalize the learning goals
of our algorithm. In this section we define the learning goals of the algorithm, and outline the
exploration phase that meets these goals.
Let the set of optimal job types for worker type i be defined by J (i) = arg maxj∈J A(i, j) −
(A standard duality argument demonstrates that in any optimal solution of the benchmark
(11)–(13), a worker type i is assigned only to jobs in J (i).)
p∗ (j).
10
Further effort is needed to ensure the policy does not violate capacity constraints, and that complementary
slackness holds.
11
Recall that in the example in Figure 1, it is far more important not to misclassify a novice as
an expert than to misclassify an expert as a novice. We formalize this distinction through the
following definition.
Definition 1. We say that a type i needs to be strongly distinguished from a type i0 if J (i) \
J (i0 ) 6= ∅. For each worker type i, let Str(i) be the set of all types i0 from which i needs to be
strongly distinguished, i.e., Str(i) = {i0 : J (i) \ J (i0 ) 6= ∅}.
In words, this means that i needs to be strongly distinguished from i0 if it has at least one
optimal job type that is not optimal for i0 , whereas it needs to be only weakly distinguished
from i0 if all optimal job types for i are also optimal for i0 . This definition is most easily
understood through the example in Figure 1 and our subsequent discussion. In particular, note
that for that example, the benchmark shadow prices are p∗ (easy) = 0.1 and p∗ (hard) = 0, and
thus J (novice) = {easy}, while J (expert) = {easy, hard}. Thus experts need to be strongly
distinguished from novices, since hard jobs are optimal for experts but not for novices; on the
other hand, novices need to be only weakly distinguished from experts, since easy jobs are
optimal for experts as well.
In the exploration phase of our algorithm, our goal is to classify a worker’s type as quickly as
possible: the preceding definition is what we use to formalize the learning goals in this phase.
In particular, consider making an error where the true type is i0 , but we misclassify it as i. If
i0 is not in Str(i), any probability of an error of o(1) for such misclassification error is tolerable
as N grows large (as in the example in Figure 1). We choose Θ(1/ log N ) as the target error
probability for this kind of error. On the other hand, for any i0 ∈ Str(i), the optimal target error
probability is much smaller. In particular, the optimal target error probability can be shown
to be approximately 1/N : if we choose a larger target, we will incur a relatively large expected
regret during exploitation due to misclassification, if we choose a smaller target, the exploration
phase is unnecessarily long, and we thus incur a relatively large regret in the exploration phase.
With the learning goals defined, the exploration phase of DEEM operates in one of two
subphases: either “guessing” or “confirmation,” as follows. At every job allocation opportunity,
we check whether the posterior probability of the maximum a posteriori (MAP) estimate of the
worker type is sufficiently high. If this probability is low, we say the policy is in the “guessing”
subphase of the exploration phase, and a job type is chosen at random for the next match. On
the other hand, if it is high (in particular, greater than log N times the posterior probability
of any other worker type), then we say that the policy is in the “confirmation” subphase of the
exploration phase: in this regime, the policy works to confirm the MAP estimate. Specifically,
in the confirmation subphase, the policy focuses only on strongly distinguishing the MAP from
all other types in Str(i); the trade-off is that this must be done with minimum regret. We frame
this as an optimization problem (see (16) below): essentially, the goal is to find a distribution
over job types that minimizes the expected regret until the confirmation goals are met. In the
confirmation subphase, the policy allocates the worker to jobs according to this distribution,
until the type is confirmed.
We conclude by briefly explaining the role of the guessing phase in minimizing regret. Informally, guessing is necessary so that confirmation minimizes regret for the correct worker type
with high probability. In particular, suppose that there are two worker types i and i0 that have
the same optimal job types, i.e., J (i) = J (i0 ), and with A(i, j) = A(i0 , j) for all j ∈ J (i).
In this case, payoff maximization does not require distinguishing i from i0 . Nevertheless, it is
possible that the confirmation policies for i and i0 differ, without necessarily distinguishing i
from i0 . In this case, i first needs to be distinguished from i0 with probability of error o(1) to
achieve optimal regret to leading order. Concretely, if there is no guessing phase and the MAP is
12
i early in the worker’s lifetime, the policy will never discover its mistake and ultimately confirm
using the wrong policy, incurring an additional (leading order) regret of Θ(log N/N ).
4.3
Key idea 3: Optimally allocate in the exploitation phase while meeting
capacity constraints
When the algorithm completes the exploration phase, it enters the exploitation phase; in this
phase, the algorithm aims to match a worker to jobs that maximize the rate of payoff generation,
given the confirmed type label. A naive approach would match a worker labeled type i to any job
type in J (i), since these are the optimal job types for worker type i after externality adjustment.
This approach turns out to fail spectacularly and generically leads to Ω(1) regret (this occurs
for any set of fixed shadow prices). To see why, we need the following fact.
Fact 1. Under generalized imbalance, as long as there is at least one capacity constraint that
is binding in some optimal solution x∗ to the benchmark problem (11)–(13) with known types,
there is at least one worker i such that x∗ (i, ·) is supported on multiple job types.
This fact implies that appropriate tie-breaking between multiple optimal job types is necessary
during exploitation for one or more worker types in order to achieve vanishing regret.
In order to implement appropriate tie-breaking, suppose that we assign jobs during the exploitation phase using the routing matrix x∗ that solves the benchmark problem (11)–(13); in
this case, each worker with confirmed type i is matched to job type j with probability x∗ (i, j).
However, this naive approach needs further modification to overcome two issues. First, some
capacity is being used in the exploration phase and the effective routing matrix during the exploration phase does not match x∗ . Second, the exploration phase can end with an incorrectly
classified worker type.
Our policy in the exploitation phase chooses a routing matrix y ∗ that resembles x∗ , but
addresses the two concerns raised in the preceding paragraph. Crucially, the chosen y ∗ should
ensure that only job types in J (i) are assigned with positive probability, and satisfy the complementary slackness conditions. We show (in Proposition A.5, using Fact 1) that such a y ∗ indeed
exists for an N large enough under the generalized imbalance condition, and we show how to
compute it. Note that as y ∗ is a fixed routing matrix, it can be implemented in a decentralized
manner.
We comment here that y ∗ is largely a theoretical device used to obtain the provable regret
optimality of our policy. In our implementation of DEEM (see Section 7), we propose a far
simpler solution: we use dynamically updated shadow prices to automatically achieve appropriate
tie-breaking. The shadow prices respond in a “tâtonnement” manner based on the currently
available supply of different job types: the price of job type j rises when the available supply
falls. In particular, fluctuations in these shadow prices naturally lead to the necessary tiebreaking for efficient exploitation.
4.4
Formal definition of DEEM
∗ , based on the discussion above.
In this section we provide a formal definition of the policy πN
First, for each i define the maximal externality-adjusted utility U (i) = maxj∈J A(i, j)−p∗ (j).
13
Then choose α(i) such that:
αj U (i) − [A(i, j) − p∗ (j)]
P
,
mini0 ∈Str(i) j∈J αj KL(i, i0 |j)
P
α(i) ∈ A(i) = arg min
α∈∆(J )
j∈J
(16)
where KL(i, i0 |j) is the Kullback–Leibler divergence11 between the distributions Bernoulli(A(i, j))
and Bernoulli(A(i0 , j)), and ∆(J ) is the set of distributions over J . The idea is that sampling
job types from α(i) allows the policy to distinguish i simultaneously from all i0 ∈ Str(i), while
incurring the smallest possible externality-adjusted regret. In Appendix B, we show that (16)
can be written as a small linear program. If the optimization problem in (16) has multiple
solutions, we pick the one that has the largest denominator (and hence the largest numerator
as well), thus maximizing learning rate subject to optimality; i.e., we choose
X
α(i) ∈ arg max min
αj KL(i, i0 |j).
(17)
0
α∈A(i) i ∈Str(i) j∈J
We discuss details in the Appendix B.
For m = 1, · · · , N , let the job type chosen at opportunity m be jm and the outcome be
Xm . For any i ∈ I and j ∈ J , let l(X, i, j) = A(i, j)1{X=1} + (1 − A(i, j))1{X=0} . Define
Q
λ0 (i) = 1, and for k ≥ 1, let λk (i) = km=1 l(Xm , i, jm ) denote the likelihood of the observed
history until the k-th job under worker type i. Let MAPk = arg maxi∈I ρ̂(i)λk (i) be the MAP
estimate based on the history, and define Λk (i, i0 ) = ρ̂(i)λk (i)/ρ̂(i)λk (i0 ), i.e., the ratio of the
posterior probabilities of type i and i0 . For convenience, we refer to Λ0 (i, i0 ) as the prior odds of
i relative to i0 , and Λk (i, i0 ) as the posterior odds of i relative to i0 after k jobs.
DEEM is defined as follows.
1. Phase 1: Exploration. Suppose that i = MAPk .
(a) Guessing subphase. If mini0 6=i Λk (i, i0 ) < log N , choose the next job type uniformly at
random in J .
(b) Confirmation subphase to strongly distinguish i from types in Str(i). If we
have
mini0 6=i Λk (i, i0 ) ≥ log N but mini0 ∈Str(i) Λk (i, i0 ) < N , draw the next job type i.i.d. from the
distribution α(i).
(c) Exit condition for the exploration phase. If mini0 6=i Λk (i, i0 ) ≥ log N and
mini0 ∈Str(i) Λk (i, i0 ) ≥ N , then the worker is labeled as being of type i and the policy moves to
the exploitation phase. (The worker is never returned to the exploration phase.)
2. Phase 2: Exploitation. For every job opportunity, for a worker confirmed to be of
type i, choose a job in J (i) with probability y ∗ (i, j), where y ∗ is a routing matrix (specified in
Proposition A.5 in Appendix A) such that system capacity constraints are not violated in steady
state.
5
Main result
Our main result is the following theorem. In particular, we prove a lower bound on the regret of
∗ constructed in the preceding section (essentially)
any policy, and show the sequence of policies πN
achieves this lower bound.
The KL divergence between a Bernoulli(q) and a Bernoulli(q 0 ) distribution is defined as q log
1−q
q) log 1−q
0.
11
14
q
q0
+ (1 −
Theorem 5.1. Fix (ρ, µ, A) such that: (a) no two rows of A are identical; and (b) the generalized
imbalance condition holds. Then there is a constant C = C(ρ, µ, A) ∈ [0, ∞) such that
1. (Lower bound) For any N and any WHO policy π that is feasible for (7)–(9),
V ∗ − W N (xπ ) ≥
C log N
1 + o(1) and
N
(18)
∗ is feasible for (7)–(9) for each N , with:
2. (Upper bound) The sequence of policies πN
∗
V ∗ − W N (πN
)≤
log log N
C log N
1 + o(1) + O
.
N
N
(19)
The constant C that appears in the theorem depends on the primitives of the problem, i.e.,
(ρ, µ, A); it is defined as follows:
P
∗
X
j∈J αj U (i) − [A(i, j) − p (j)]
P
C(i) = min
;
C
=
ρ(i)C(i) .
(20)
mini0 ∈Str(i) j∈J αj KL(i, i0 |j)
α∈∆(J )
i∈I
(Note that C(i) captures the regret per unit mass of service opportunities from workers of type
i.) Informally, instances in which there is a conflict between exploration (i.e., learning worker
type) and exploitation (i.e., maximizing short-term payoffs) have larger values of C. The case
C = 0 corresponds to instances where the goals of learning and regret minimization are aligned;
i.e., learning does not require regret of Ω(log N/N ). In this case, our result establishes that our
chosen policies are nearly asymptotically optimal, to within O(log log N/N ). On the other hand,
the instances with C > 0 are those instances with a non-trivial tension between learning and
∗ )
short-term payoffs. For these instances, our result establishes that our chosen policies (πN
N ≥1
achieve asymptotically optimal regret upto leading order in N .
The constant C is best understood in terms of the definition
of α in the exploration phase (cf. (16)). Note
Jobs
𝜇
0.6
0.6
that for a fixed α, for workers of true type i, the smallest
Easy
Workers
Hard
0
value of the log posterior odds, mini0 ∈Str(i)
P log Λn (i, i ), 0increases at an expected rate of mini0 ∈Str(i) j∈J αj KL(i, i |j)
0.5 Expert
0.6
0.8
during confirmation. Thus, when N is large, the time
𝜌
taken to confirm i against worker
types in Str(i) is apP
proximately log N/(mini0 ∈Str(i) j∈J αj KL(i, i0 |j)). Hence,
0.6
0.1
0.5 Novice
the externality-adjusted regret incurred until confirmation is complete, per P
unit mass of workers of
type i, is approximately
j∈J αj U (i) − [A(i, j) −
P
Figure 2: An example where ∗
p (j)] log N/(mini0 ∈Str(i) j∈J αj KL(i, i0 |j)). Optimizing
Ω(log N/N ) regret is unavoidable.
over α results in an expected regret of nearly C(i) log N
that must be incurred until the strong distinguishing goals
are met for a unit mass of workers of type i. This translates to an expected regret of nearly
ρ̂(i)C(i) log N = ρ(i)C(i) log N/N owing to workers of type i per time unit. This reasoning
forms the basis of our lower bound, formalized in Proposition A.1 in Appendix A.
Now, a regret of Θ(log N/N ) is unavoidable when C(i) > 0 for some i. To develop some
intuition for this case, consider the same example as before, but with a modified payoff matrix
shown in Figure 2. It can be shown that in this case, a regret of Ω(log N/N ) is unavoidable
in the event that the true type of the worker is novice [1]. The problem is the following: to
distinguish novices from experts, the policy must allocate workers to hard jobs. But hard jobs
15
are strictly suboptimal for novices, and so if the true type of the worker is novice, some regret
is unavoidable.
In particular, to develop intuition for the magnitude of this regret, imagine a policy that
assigns workers hard jobs for the first k steps (leading to Θ(k) absolute regret per unit mass
of workers), and based on the realized payoffs, estimates the worker type (with confidence
1 − exp(−Θ(k))). If the worker is estimated to be a novice, the policy can choose to assign only
easy jobs to the worker. However, this means that there will be no further learning about the
worker type, and the expected contribution to absolute regret is about N times the probability
that the worker is truly an expert, i.e., N exp(−Θ(k)), per unit mass of workers. Combining,
we see the total absolute regret is at least Θ(k) + N exp(−Θ(k)) ≥ Θ(log N ) over the lifetime
of a unit mass of workers. (Here k = Θ(log N ) is needed to achieve Θ(log N ) absolute regret.)
We then divide by N to obtain the regret per unit mass of service opportunities by workers.
This discussion motivates the following definition.
Definition 2. Consider a worker type i. Suppose that there exists another type i0 such that
A(i, j) = A(i0 , j) for all j ∈ J (i) and J (i) ∩ J (i0 ) = φ. Then we say that the ordered pair (i, i0 )
is a difficult type pair.
A similar definition also appears in [1]; the modification here is that the sets J (i) are defined
with respect to externality-adjusted payoffs to account for capacity constraints.
The constant C(i) > 0 if and only if there is some other i0 such that (i, i0 ) is a difficult type
pair. In general, if: (1) none of the job types in J (i) allow us to distinguish between i and i0 ;
and (2) all the jobs in J (i) are strictly suboptimal for i0 , then any policy that achieves small
regret must distinguish between i and i0 and must assign the worker to jobs outside J (i) to
make this distinction. This leads to a regret of Ω(log N ) per unit mass of workers of type i (over
the lifetime of the workers).
On the other hand, if there is no difficult type pair, then there is no conflict between learning
and regret minimization. Here, one can show that C(i) = 0 for each i, and this value is attained
by some distribution α(i) that is supported on J (i). To see this note that if α is fully supported
on J (i) (i.e., αj > 0 for all j ∈ J (i)), then the numerator is 0; however if there is no type
i0 such that (i, i0 ) is a difficult type pair, then the denominator is strictly positive, and thus
C(i) = 0. In this case, C = 0 and our main result says that our algorithm achieves a regret of
O(log log N/N ) asymptotically.12 This regret basically results from the uniform sampling of the
job types during the guessing phase, which accounts for O(log log N/N ) fraction of the lifetime
of the worker.
6
Proof sketch
The proof of Theorem 5.1 can be found in Appendix A. Here we present a sketch. The critical
ingredient in the proof is the following relaxed optimization problem in which there are no
capacity constraints, but capacity violations are charged with non-negative prices p∗ from the
optimization problem (11) with known worker types.
hX
i
X
X
X
WpN∗ = max
ρ(i)
x(i, j)A(i, j) −
p∗ (j)
ρ(i)x(i, j) − µ(j) .
(21)
x∈X N
i∈I
j∈J
j∈J
12
i∈I
In fact, our proof demonstrates that this regret can be brought down to any O(fN /N ) such that fN = o(1)
by choosing a different threshold in the guessing phase.
16
Lower bound on regret. If C > 0 (i.e., if there is at least one difficult pair of worker
types; cf. Section 5), there is an upper bound on the performance of any policy in this problem,
expressed relative to V ∗ . This result follows directly from [1]:
WpN∗ ≤ V ∗ −
C log N
(1 + o(1)),
N
where C ≥ 0 is precisely the constant appearing in (20). By a standard duality argument,
we know that W N ≤ WpN∗ , and hence this bound holds for W N as well (see Proposition A.1),
yielding the lower bound on regret on our original problem (7).
∗ is feasible for problem
Upper bound on regret. There are two key steps in proving that πN
∗ ) ≥ V ∗ − C(log N/N )(1 + o(1)).
(7)–(9), and W N (πN
∗ , with an arbitrary exploitation-phase routing matrix
1. First, we show that our policy πN
supported on J (i) for each i ∈ I, achieves near optimal performance for the single multi-armed
bandit problem (21). Formally, if (with some abuse of notation) we let WpN∗ (π) denote the value
attained by a policy π in problem (21), i.e.,
WpN∗ (π) =
X
i∈I
ρ(i)
X
xπ (i, j)A(i, j) −
j∈J
X
j∈J
hX
i
ρ(i)xπ (i, j) − µ(j) ,
p∗ (j)
i∈I
then
∗
V ∗ − WpN∗ (πN
) = C(log N/N )(1 + o(1)) + O(log log N/N ).
∗ ) ≥ W N − o(log N/N ), i.e., π ∗ is
This is shown in13 Proposition A.2. Thus we have WpN∗ (πN
p∗
N
near-optimal in problem (21).
2. In the next part of the proof, we show that we can design a routing matrix y ∗ (that
∗ , such that the following conditions
depends on N ) for the exploitation phase of the policy πN
are satisfied:
P
∗ (i, j) − µ(j) = 0 for all j such that p∗ (j) > 0,
(a) (Complementary slackness) i∈I ρ(i)xπN
and,
P
∗ (i, j) − µ(j) ≤ 0 for all other j ∈ J .
(b) (Feasibility) i∈I ρ(i)xπN
∗ with this choice of y ∗ in the exploitation
This is shown in Proposition A.5. We deduce that πN
phase is feasible for problem (7)–(9) and the complementarity slackness property implies that
∗ ) = W N (π ∗ ), yielding our upper bound on regret.
W N (πN
p∗
N
∗ , the correct label of the worker
Construction of y ∗ . At the end of the exploration phase of πN
is learned with a confidence of at least (1 − o(1)). This fact, coupled with the generalized
imbalance condition (leading to flexibility in modifying x∗ ; cf. Fact 1), is sufficient to ensure an
appropriate and feasible choice of y ∗ = x∗ + o(1) will correct the deviations from x∗ in terms
of capacity utilizations of job types with p∗ (j) > 0 arising because of the (short) exploration
phase, and because of the infrequent cases in which exploitation is based on an incorrect worker
label coming out of the exploration phase.
13
[1] proves this result for a similar policy.
17
7
Practical considerations and a heuristic
Our theoretical analysis of DEEM focused on an asymptotic regime where N → ∞. In this
section, we focus on a number of practical considerations that arise when considering implementation of a policy like DEEM. First, we discuss a practical approach to managing capacity
constraints via dynamic queue-based shadow prices. Second, we discuss two modifications to the
algorithm that improve performance when N is finite, and suggest a modified heuristic that we
call DEEM+ . In the next section, we simulate both DEEM and DEEM+ , and evaluate their
performance.
7.1
Dynamic queue-based shadow prices
A key step in making DEEM practical is to use dynamic shadow prices based on supply-demand
imbalances in the market. In our mathematical model, we had assumed that the masses of new
workers and jobs arrive instantaneously at the beginning of each period, after which they are
instantaneously matched, and further, each job either gets matched immediately on arrival or
disappears at the end of the period. However, in real platforms, the arrivals, departures, and
matchings of workers and jobs occur sequentially in continuous time. In these settings, it is
common for platforms to maintain a “queue” of jobs of each type that grows when new jobs
arrive (in continuous time) and shrinks when existing jobs are matched. In this scenario, the
queue length at any time can be leveraged to compute an instantaneous shadow price for the
job type that can be utilized for externality adjustment of the payoffs.
A reasonable approach is to set the shadow price on each job type via a decreasing function
of the corresponding queue length. One natural way to do this is as follows: assume that in
practice, the arriving jobs accumulate in queues for the different types, each with a finite capacity
B (if the capacity is exceeded, jobs are lost). If the queue length of job type j at any instant
is q(j), we set the price of j at that instant to pq (j) = (B − q(j))/B (thus the price lies in
[0, 1]). Note that pq (j) changes every time a job is assigned to a worker, or a new job arrives,
because the queue length changes. We implement a discrete-time analog of this approach in our
simulated marketplace in the next section.
Computing the prices in this fashion obviates the need to explicitly compute y ∗ in the exploitation phase of our policy; instead the exploitation phase can be implemented by allocating
optimally for each worker given the current queue-based prices (still a fully decentralized solution). The natural fluctuation in these prices ensures appropriate tie-breaking in allocation
(cf. Fact 1).
These queue-based prices can be incorporated in the implementation of DEEM in the following way.
1. Modifying the exploration and exploitation phases. While computing α(i) for each
i ∈ I in the confirmation phase of DEEM, replace p∗ (j) by the instantaneous queue-based shadow
prices pq (j) in Eq. (16). Similarly, in the exploitation phase, instead of explicitly computing the
routing matrix y ∗ , use these prices to decide assignments in the following manner. Define the
sets J ∗ (i) as:
J ∗ (i) = arg max A(i, j) − pq (j).
j∈J
If an assignment has to be made in the exploitation phase for some worker who has already been
labeled as being of type i, then a job type j ∗ ∈ J ∗ (i) is chosen (note that typically, J ∗ (i) will
18
be a singleton).14
2. Price-smoothing for learning goals. The platform can also determine the strong
distinction requirements (see Definition 1), i.e., the set Str(i) for each i based on the sets J ∗ (i)
induced by the instantaneous prices defined above. But this approach suffers from the drawback
that random fluctuations of the shadow prices around their mean values can result in changes in
the sets J ∗ (i), and hence in the learning goals, which could be detrimental to the performance
of our policy. On the other hand these fluctuations are essential for appropriate tie-breaking
across multiple optimal job types in the exploitation phase.
Thus we propose the following modification: we utilize an average of recent prices within a
fixed recent window of time, and modify the definition of J ∗ (i) to incorporate a small tolerance
so that the set Str(i) remains unaffected by the fluctuations in the prices. To be precise, for a
window size W , let p̄q (i) be the unweighted average of the queue length based prices seen over
the past W epochs of changes in the price (again, note that pq (i) changes every time a job is
assigned to a worker, and also when new jobs arrive). Next, for a tolerance ε > 0, we define
Jε∗ (i) = {j ∈ J : A(i, j) − p̄q (j) ≥ max
[A(i, j 0 ) − p̄q (j 0 )] − ε}.
0
j
Then the set Str(i) for each i (see Definition 1), is defined based on Jε∗ (i).
7.2
Improving performance in the finite N regime
We propose two changes that improve performance in the finite N regime. First, recall that
if a worker type i has an optimal job type j that is not optimal for some worker type i0 , then
DEEM tries to achieve a probability 1/N of misclassifying a worker of type i0 as type i. For
small N , however, we can do better: the desired probability of error should explicitly depend
on how much regret type i0 incurs by performing job j – if this regret is very small, then it isn’t
worth trying to make this distinction with high precision.
In particular, for each i0 ∈ Str(i), define:
R(i, i0 ) ,
max
j∈J (i), j ∈J
/ (i0 )
U (i0 ) − [A(i0 , j) − p∗ (j)].
R(i, i0 ) is the highest regret incurred if type i0 is matched to a suboptimal job that is optimal
for type i. A reasonable approach is to aim for a probability of misclassification of i0 as i of
1/N R(i, i0 ) instead of 1/N , thus accounting for the fact that if R(i, i0 ) is small, then we can
tolerate a higher probability of error.
The second change we propose is to explicitly incorporate the posterior into the exploration
phase. Recall that in DEEM, we guess and then confirm in the exploration phase; and guessing
is not optimized, but rather involves exploration uniformly at random. When N is finite, we can
gain by instead leveraging the posterior at each round to appropriately allocate confirmation
effort across the different types, until the learning goals are met for some type i. In principle, this
approach can subsume the guessing and confirmation phases into a uniformly defined exploration
phase; the challenge is to precisely describe how the posterior is used to guide the exploration
phase.
14
In practice, we can continue to benefit from learning during the exploitation phase: instead of optimizing
the price-adjusted payoff for the confirmed worker label, we can optimize for the current MAP estimate, thus
accounting for the possibility that we may have confirmed incorrectly. Clearly, doing so can only improve
performance.
19
7.3
DEEM+ : A practical heuristic for finite N
In this subsection, we incorporate the two suggestions of the preceding subsection into a formal
heuristic we refer to as DEEM+ .
It will be convenient to define R(i, i0 ) = 1 for all i0 ∈
/ Str(i), and define Λ̂k (i, i0 ) as follows:
1. If i0 ∈ Str(i), then Λ̂k (i, i0 ) , Λk (i, i0 )/R(i, i0 ).
2. If i0 ∈
/ Str(i), then Λ̂k (i, i0 ) , Λk (i, i0 )/R(i, i0 ) if Λk (i, i0 )/R(i, i0 ) < log N , and Λ̂k (i, i0 ) , N
otherwise.
Next, after k matches, for each type i define:
Lk (i) , {i0 6= i : Λ̂k (i, i0 ) < N }.
Lk (i) is the set of types that i remains to be distinguished from after k opportunities. In case
the true worker type is i, effort should ideally be directed towards these distinctions in order to
speed up confirmation. Next, define the posterior probability of the worker being of type i after
opportunity k as:
ρ̂(i)λk (i)
gk (i) , P
.
0
0
i0 ∈I ρ̂(i )λk (i )
Then DEEM+ is defined as follows:
1. Phase 1: Exploration. DEEM+ is in this phase as long as there is no i such that
mini0 6=i Λ̂k (i, i0 ) ≥ N . After k allocations, choose a job from a distribution αk that satisfies:
P
P
∗ (j)]
g
(i)
α
U
(i)
−
[A(i,
j)
−
p
j
k
i
j∈J
P
αk ∈ A = arg min
, (22)
0
0
α∈∆(J ) mini∈I; i0 ∈Lk (i) (1/gk (i))
j∈J αj KL(i, i |j)/ (1 + log R(i, i )/ log N )
αk can be computed as a solution to a linear program as shown in Appendix B.
15
Exit from exploration. If at some opportunity k, there is a worker type i such that
0
mini0 ∈i
/ Λ̂k (i, i ) ≥ N , then label the worker as being of type i and enter the exploitation phase.
2. Phase 2: Exploitation. Exploitation is the same as defined in DEEM.
DEEM+ shares the same explore-then-exploit structure as DEEM, but with changes to the
exploration phase to optimize learning at finite N ; as we will see in our simulations, these
optimizations allow DEEM+ to substantially outperform DEEM at small N .
Although an exact analysis is beyond the scope of this work, we conjecture that DEEM+ inherits
the asymptotic performance bounds that hold for DEEM. Informally, consider the periods in
DEEM+ where Λ̂k (i, i0 ) < log N for the MAP estimate i, for some type i0 6= i; these periods are analogous to the guessing phase in DEEM. Similar to DEEM, one can argue that this
phase accounts for at most O(log log N/N ) fraction of the worker lifetime. The stages where
Λ̂k (i, i0 ) > log N for all i0 6= i but Λ̂k (i, i0 ) < N for some i0 are similarly analogous to the confirmation subphase of DEEM. Here we can informally argue that on the event that i is the true
type, the posterior distribution quickly concentrates sufficiently on i, and the policy defined by
15
The adjustment in the denominator precisely accounts for differences in regret incurred in making each
distinction.
20
(22) asymptotically achieves the same regret until confirmation (in the leading order term) as
the stationary randomized policy α(i) defined in DEEM. To see this, observe that as gk (i) → 1
for some i, the objective function in (22) converges to the objective function for computing α(i)
in (16), modulo the (1 + log R(i, i0 )/ log N ) factors that simply capture the fact that the learning
goals have been adjusted for small N .
Just like DEEM, DEEM+ can be analogously implemented using queue-based shadow prices
instead of p∗ (j) (with the sets Str(i) computed using smoothed prices).
8
Simulations
In this section, we simulate DEEM and DEEM+ in a market environment with queue-based
shadow prices. We compare performance of these policies against a greedy policy, as well as
benchmark MAB approaches. We consider instances with 3 types of workers and 3 types of
jobs. We assume that N = 30, and ρ(i) = 1 for each i (so that ρ̂(i) = 1/30). We generated
350 instances, where for each instance, independently: (1) µ(j) is sampled from a uniform
distribution on [0.5, 1.5]; and (2) each entry of the expected payoff matrix is sampled from a
uniform distribution on [0, 1].
Given an instance (ρ̂, N, µ, A), our simulated marketplace is described as follows.
Arrival process. Time is discrete, t = 1, 2, · · · , T, where we assume T = 150. At the
beginning of each time period t, Mt (i) number of workers of type i and Lt (j) jobs of type j
arrive, such that M1 (i), M2 (i), · · · and L1 (i), L2 (i), · · · are i.i.d. sequences. For a scaling constant
τ = 900, we assumed that Mt (i) = τ ρ̂(i) = 900 × (1/30) = 30 for all t (recall that ρ̂(i) = 1/30
for all i in all our instances), i.e., Mt (i) is deterministic. We generated Lt (j) from a binomial
distribution with mean τ µ(j) = 900µ(j).16 Each worker stays in the system for N periods and
then leaves. Each job requires one period to perform.
Queues. We assume that the arriving jobs accumulate in queues for the different types,
each with a finite buffer of capacity B, where we choose B = 10, 000. If the buffer capacity is
exceeded for some job type then the remaining jobs are lost.
Matching process. In the beginning of each period, once all the new workers and jobs
have arrived, the platform sequentially considers each worker in the platform,17 and generates
an assignment based on the history of the worker and the chosen policy. If a job of the required
type is unavailable, then the worker remains unmatched. For each worker-job match, a random
payoff is realized, drawn from the distribution specified by A, and the assignment-payoff tuple
is added to the history of the worker.
Queue-based prices. The platform maintains queue-based prices for the jobs in the following way: if the queue length of job type j at any instant is q(j), the price of j at that instant is
set to be pq (j) = (B − q(j))/B. The prices thus change when either (1) new jobs arrive at the
beginning of each period, or (2) a job gets matched to a worker.
A remark on the choice of instances. In all our test instances, all the entries of the
expected payoff matrix A are distinct. We conjecture that this would typically be the case in
many settings in practice – exact indistinguishability of different worker types using a particular
16
A binomial distribution has two parameters (n, p), where n is the number of trials, and p is the probability of
success at each trial; we chose n = 2700 and p = µ(j)/3 for generating each Lt (j). Note that since µ(j) ∈ [0.5, 1.5],
we have p < 1.
17
This consists of the new workers and all the workers who have arrived in the past N − 1 periods, or from the
beginning of time if t < N .
21
1.0
0.8
0.6
Policy
PA-UCB
PA-TS
DEEM
PA-Greedy
DEEM+
PA-UCB
DEEM
PA-TS
PA-Greedy
DEEM+
0.4
0.2
0.0
0.60
0.65
0.70
0.75 0.80 0.85
Performance ratio
0.90
0.95
1.00
Avg. Perf. Ratio (± std. error)
0.797 (± 0.007)
0.904 (± 0.005)
0.898 (± 0.005)
0.931 (± 0.003)
0.943 (± 0.003)
Table 1: Average performance ratios of
different policies across 350 instances,
along with standard errors.
Figure 3: The empirical CDF of the performance ratios of the different policies.
job type wouldn’t be commonly encountered. For such instances, as we discussed in section 5,
there is no conflict between learning and regret minimization in the confirmation subphase of
DEEM, and it incurs a regret of O(log log N/N ), where the leading order term results entirely
from the regret incurred due to uniform sampling of the job types while guessing. In fact, in
this case we can show that a “greedy” policy that maximizes the price-adjusted payoff for the
MAP estimate throughout the exploration phase and enters exploitation after strong distinction
requirements are met for some worker type, incurs a regret of O(1/N ).18 It would thus appear
that this price-adjusted greedy policy, which is attractive for its simplicity, would be a reasonable
solution in such cases. However our simulations show that when N is small, DEEM+ can lead to
significant gains over the price-adjusted greedy approach. We discuss this result further below.
8.1
Results
We implemented five policies: DEEM, DEEM+ , and price-adjusted versions of UCB [10],
Thompson sampling (TS) [4] and Greedy, and compared their performance. All algorithms
measure payoffs adjusted by the queue-based shadow prices; in this way, they all effectively
account for capacity constraints. We have already described this implementation for the DEEM
variants earlier. Price-adjusted Greedy (PA-Greedy) simply chooses the job type that maximizes
the instantaneous shadow price adjusted payoff for the MAP estimate throughout the lifetime of
the worker.19 UCB and TS are well known algorithms for the standard stochastic multi-armed
bandit problem and the details of their implementation in the presence of shadow prices, which
we will denote PA-UCB and PA-TS, can be found in Appendix C.
Figure 3 shows the cumulative distribution function – over the 350 instances – of the ratio
of the payoff generation rate attained by a policy and the optimal payoff generation rate if the
worker types are known, for the five candidate policies. The average of these ratios over the
sample space for each policy is given in Table 2. As one can observe, DEEM+ significantly outperforms PA-UCB, PA-Greedy, DEEM and PA-TS. PA-Greedy, PA-TS, DEEM and DEEM+ perform
considerably better than UCB on average, presumably benefiting from the knowledge of the ex18
Informally, since every job can make every possible distinction between worker types, the probability that
the true worker type is not identified as the MAP estimate at opportunity t decays as exp(−ηt), where η is an
instance dependent constant. Thus the total expected regret over the lifetime of a worker is bounded as O(1) in
expectation.
19
With queue-based shadow prices, tie-breaking during exploitation is rendered unnecessary. Moreover, we
allow the algorithm to continue to benefit from learning during exploitation by optimizing for the current MAP
estimate rather than for the confirmed type. Thus the distinction between exploration and exploitation disappears.
22
pected payoff matrix A. In contrast to PA-Greedy, both DEEM and PA-TS actively experiment
in order to learn quickly: DEEM experiments during its guessing phase where it uniformly samples job types, and PA-TS experiments due to sampling from the posterior (see Appendix C for
details), especially in the early stages when the posterior is not sufficiently concentrated. While
this experimentation is desirable, neither of them efficiently trade off between payoff maximization and learning, resulting in a degraded performance in comparison to PA-Greedy. On the
other hand PA-Greedy suffers from excessive exploitation, resulting in performance which, although better than DEEM and PA-TS, is still significantly worse than DEEM+ . We now focus
on this latter difference.
DEEM+ vs. PA-Greedy. We had discussed in our remark earlier that in instances without
exactly indistinguishable type pairs, PA-Greedy is expected to perform reasonably well. However
in our simulations we see that on an average across all instances, DEEM+ results in about 15%
reduction in regret as compared to PA-Greedy.
In order to gain intuition for this gain, observe that although exactly indistinguishable type
pairs are rarely encountered, it could frequently be the case that two type pairs i and i0 have
their expected payoffs A(i, j) and A(i0 , j) under some job type j close enough that practically
it would take too long to distinguish them with a reasonably small probability of error. This
results in approximately difficult type pairs – two types i and i0 that have different optimal job
types where none of the optimal job types for i is able to distinguish between i and i0 reasonably
quickly. In these situations, if at any point the MAP estimate under the greedy policy is i when
the true type is i0 , then exploiting for i may not allow the policy to recover from its bad estimate
within a reasonable number of jobs, thus incurring high regret. There is high probability of
encountering such a situation in the early stages of the algorithm when the confidence in the
MAP estimate is not sufficiently high.
This is where DEEM+ ’s approach of appropriately allocating confirmation efforts depending
on the posterior results in significant gains in performance over the greedy approach. In particular, there are situations where DEEM+ will appropriately prioritize learning and will actively
explore instead of simply choosing the optimal job type for the MAP estimate. For example,
suppose there are only two types i and i0 , where (i, i0 ) is close to being a difficult pair, i.e., the
learning rate offered by the optimal job type for i towards the (i, i0 ) distinction is close to 0. In
this case, even if the current MAP estimate is i with high confidence (although Λ̂k (i, i0 ) < N ,
so that we are still in the exploration phase), instead of choosing the optimal job type for i,
DEEM+ may choose some other job type that will quickly distinguish i from i0 .
Thus we expect DEEM+ to outperform PA-Greedy more significantly in situations where
there are approximately difficult type pairs. In order to verify that this is indeed the case, first,
we formally define a simple notion of approximate indistinguishability and difficulty. We say
that the type pair (i, i0 ) is ∆-indistinguishable using a job type j if KL(i, i0 |j) < ∆; otherwise
we say that it is ∆-distinguishable. We say that type pair (i, i0 ) is ∆-difficult if KL(i, i0 |j) < ∆
for all j ∈ J (i) and J (i) ∩ J (i0 ) = φ.
For ∆ ∈ {0.1, 0.4}, we picked those instances out of the 350 in which there is at least one pair
(i, i0 ) such that (1) (i, i0 ) is ∆-difficult, and (2) there is some j such that KL(i, i0 |j) > 0.5; i.e.,
instances with at least one ∆-difficult type pair, such that there exists a job type under which this
pair is 0.5-distinguishable. We will call such instances ∆-DBD (∆-difficult-but-distinguishable)
instances. These are precisely the instances where measured exploration in cases where the MAP
estimate is a worker type that forms a ∆-difficult type pair with some other type can lead to
significant gains in performance.20 Note that as ∆ increases, the set of instances that satisfy
20
Note that if KL(i, i0 |j) > 0.5, the job j can distinguish i from i0 with a misclassification error of 1/30 for
23
Sample
A
B
Number of instances
78
82
Avg. regret reduction
21%
12%
Table 2: DEEM+ ’s percentage reduction in regret relative to Greedy on average in sample A,
consisting of 0.1-DBD instances, and in sample B consisting of 0.4-DBD instances that aren’t
0.1-DBD.
these conditions grows progressively larger (a ∆-DBD instance is also a ∆0 -DBD instance for
∆0 > ∆).
We next considered two sets of samples: sample A is the set of 0.1-DBD instances, and
sample B is the set of 0.4-DBD instances that are not 0.1-DBD. Based on the discussion above,
we should expect a substantial reduction of regret in the 0.1-DBD instances, relative to those
0.4-DBD instances that are not 0.1-DBD. Indeed, consistent with our intuition, a one tailed two
sample t-test showed that the mean percentage reduction of regret in sample A is larger than
that in sample B with a p-value of 0.009. The sample average percentage reduction of regret in
the two samples is given in Table 2.
9
Conclusion
This work suggests a novel and practical algorithm for learning while matching, applicable across
a range of online matching platforms. Several directions of generalization remain open for future
work. First, while we consider a finite-type model, a richer model of types would admit a wider
range of applications; e.g., workers and jobs may be characterized by features in a vector-valued
space, with compatibility determined by the inner product between feature vectors. Second,
while our model includes only one-sided uncertainty, in general a market will include two-sided
uncertainty (i.e., both supply and demand will exhibit type uncertainty). We expect that a
similar approach using externality prices to first set learning objectives, and then achieve them
while incurring minimum regret, should be applicable even in these more general settings.
Third, recall that we assumed the expected surplus from a match between a worker type
and a job type (i.e., the A matrix) is known to the platform. This reflects a first order concern
of many platforms, where aggregate knowledge is available, but learning individual user types
quickly is challenging. Nevertheless, it may also be of interest to study how A can be efficiently
learned by the platform. This direction may be related to issues addressed by the literature on
(a single) multi-armed bandit under capacity constraints [2].
We conclude by noting that our model ignores strategic behavior by participants. A simple
extension might be to presume that workers are less likely to return after several bad experiences;
this would dramatically alter the model, forcing the policy to become more conservative. The
modeling and analysis of these and other strategic behaviors remain important challenges.
References
[1] Rajeev Agrawal, Demosthenis Teneketzis, and Venkatachalam Anantharam. Asymptotically
efficient adaptive allocation schemes for controlled iid processes: finite parameter space.
strong distinction, in at most about 7 jobs on average, which is reasonably quick.
24
Automatic Control, IEEE Transactions on, 34(3):258–267, 1989.
[2] Shipra Agrawal and Nikhil R Devanur. Bandits with concave rewards and convex knapsacks.
In Proceedings of the fifteenth ACM conference on Economics and computation, pages 989–
1006. ACM, 2014.
[3] Shipra Agrawal and Nikhil R Devanur. Linear contextual bandits with global constraints
and objective. arXiv preprint arXiv:1507.06738, 2015.
[4] Shipra Agrawal and Navin Goyal. Analysis of thompson sampling for the multi-armed
bandit problem. arXiv preprint arXiv:1111.1797, 2011.
[5] Shipra Agrawal, Nikhil R Devanur, and Lihong Li. Contextual bandits with global constraints and objective. arXiv preprint arXiv:1506.03374, 2015.
[6] Mohammad Akbarpour, Shengwu Li, and Shayan Oveis Gharan. Dynamic matching market
design. Available at SSRN 2394319, 2014.
[7] Ross Anderson, Itai Ashlagi, David Gamarnik, and Yash Kanoria. A dynamic model of
barter exchange. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on
Discrete Algorithms, pages 1925–1933. SIAM, 2015.
[8] Baris Ata and Sunil Kumar. Heavy traffic analysis of open processing networks with complete resource pooling: asymptotic optimality of discrete review policies. The Annals of
Applied Probability, 15(1A):331–391, 2005.
[9] J.-Y. Audibert and R. Munos. Introduction to bandits: Algorithms and theory. In ICML,
2011.
[10] Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. Finite-time analysis of the multiarmed
bandit problem. Machine learning, 47(2-3):235–256, 2002.
[11] Moshe Babaioff, Shaddin Dughmi, Robert Kleinberg, and Aleksandrs Slivkins. Dynamic
pricing with limited supply. ACM Transactions on Economics and Computation, 3(1):4,
2015.
[12] Mariagiovanna Baccara, SangMok Lee, and Leeat Yariv. Optimal dynamic matching. Available at SSRN 2641670, 2015.
[13] Ashwinkumar Badanidiyuru, Robert Kleinberg, and Yaron Singer. Learning on a budget:
posted price mechanisms for online procurement. In Proceedings of the 13th ACM Conference on Electronic Commerce, pages 128–145. ACM, 2012.
[14] Ashwinkumar Badanidiyuru, Robert Kleinberg, and Aleksandrs Slivkins. Bandits with
knapsacks. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on, pages 207–216. IEEE, 2013.
[15] Ashwinkumar Badanidiyuru, John Langford, and Aleksandrs Slivkins. Resourceful contextual bandits. In Proceedings of The 27th Conference on Learning Theory, pages 1109–1134,
2014.
[16] Omar Besbes and Assaf Zeevi. Dynamic pricing without knowing the demand function:
Risk bounds and near-optimal algorithms. Operations Research, 57(6):1407–1420, 2009.
25
[17] Omar Besbes and Assaf Zeevi. Blind network revenue management. Operations research,
60(6):1537–1550, 2012.
[18] Sébastien Bubeck and Nicolo Cesa-Bianchi. Regret analysis of stochastic and nonstochastic
multi-armed bandit problems. Machine Learning, 5(1):1–122, 2012.
[19] Jim G Dai. On positive harris recurrence of multiclass queueing networks: a unified approach via fluid limit models. The Annals of Applied Probability, pages 49–77, 1995.
[20] Ettore Damiano and Ricky Lam. Stability in dynamic matching markets. Games and
Economic Behavior, 52(1):34–53, 2005.
[21] Sanmay Das and Emir Kamenica. Two-sided bandits and the dating market. In Proceedings
of the 19th international joint conference on Artificial intelligence, pages 947–952. Morgan
Kaufmann Publishers Inc., 2005.
[22] Daniel Fershtman and Alessandro Pavan. Dynamic matching: experimentation and cross
subsidization. Technical report, Citeseer, 2015.
[23] John Gittins, Kevin Glazebrook, and Richard Weber. Multi-armed bandit allocation indices.
John Wiley & Sons, 2011.
[24] Ming Hu and Yun Zhou. Dynamic matching in a two-sided market. Available at SSRN,
2015.
[25] Sangram V Kadam and Maciej H Kotowski. Multi-period matching. Technical report,
Harvard University, John F. Kennedy School of Government, 2015.
[26] Emilie Kaufmann, Nathaniel Korda, and Rémi Munos. Thompson sampling: An asymptotically optimal finite-time analysis. In Algorithmic Learning Theory, pages 199–213. Springer,
2012.
[27] Morimitsu Kurino. Credibility, efficiency, and stability: A theory of dynamic matching
markets. 2005.
[28] Tze Leung Lai and Herbert Robbins. Asymptotically efficient adaptive allocation rules.
Advances in applied mathematics, 6(1):4–22, 1985.
[29] Constantinos Maglaras and Assaf Zeevi. Pricing and capacity sizing for systems with shared
resources: Approximate solutions and scaling relations. Management Science, 49(8):1018–
1038, 2003.
[30] Constantinos Maglaras and Assaf Zeevi. Pricing and design of differentiated services: Approximate analysis and structural insights. Operations Research, 53(2):242–262, 2005.
[31] Laurent Massoulie and Kuang Xu. On the capacity of information processing systems, 2016.
Unpublished.
[32] Aranyak Mehta. Online matching and ad allocation. Theoretical Computer Science, 8(4):
265–368, 2012.
[33] Daniel Russo and Benjamin Van Roy. Learning to optimize via posterior sampling. Mathematics of Operations Research, 39(4):1221–1243, 2014.
[34] Denis Sauré and Assaf Zeevi. Optimal dynamic assortment planning with demand learning.
Manufacturing & Service Operations Management, 15(3):387–404, 2013.
26
[35] Lloyd S Shapley and Martin Shubik. The assignment game i: The core. International
Journal of game theory, 1(1):111–130, 1971.
[36] Adish Singla and Andreas Krause. Truthful incentives in crowdsourcing tasks using regret
minimization mechanisms. In Proceedings of the 22nd international conference on World
Wide Web, pages 1167–1178. International World Wide Web Conferences Steering Committee, 2013.
[37] Zizhuo Wang, Shiming Deng, and Yinyu Ye. Close the gaps: A learning-while-doing algorithm for single-product revenue management problems. Operations Research, 62(2):
318–331, 2014.
Appendices
A
Proof of Theorem 5.1
For the rest of this section, let C be the quantity defined in (20). We present it again for the
convenience of the reader:
P
∗
X
j∈J αj U (i) − [A(i, j) − p (j)]
P
C(i) = min
;
C=
ρ(i)C(i) .
0
mini0 ∈Str(i) j∈J αj KL(i, i |j)
α∈∆(J )
i∈I
Recall problem 7. We will first show the following lower bound on the difference between V ∗
and W N , which follows directly from Agrawal et al. [1].
Proposition A.1.
lim sup
N →∞
N
V ∗ − W N ≥ C.
log N
Proof. Consider the following relaxed problem:
X
X
X
X
WpN∗ = max
ρ(i)
x(i, j)A(i, j) −
p∗ (j)[
ρ(i)x(i, j) − µ(j)].
x∈X N
i∈I
j∈J
j∈J
(23)
i∈I
By a standard duality argument, we know that WpN∗ ≥ W N . The optimal policy in this problem
is a solution to
X
maximizeπ∈ΠN
ρ(i)xπ (i, j)(A(i, j) − p∗ (j)) .
(24)
i∈I, j∈J
Then from Theorem 3.1 in Agrawal et al. [1], we know that
lim sup
N →∞
N
V ∗ − WpN∗ ≥ C.
log N
The result then follows from the fact that W N ≤ WpN∗ .
Let WpN∗ (π ∗ ) be the value attained by DEEM in optimization problem (21) (same as (23)),
assuming that the routing matrix y in the exploitation phase is such that y(i, .) is supported on
27
J (i). We will prove an upper bound on the difference between V ∗ and WpN∗ (π ∗ ). Note that the
difference in these values of the two problems is the same as the difference in
X
X
ρ(i)
xπ∗ (i, j)(A(i, j) − p∗ (j)),
i∈I
and
P
i∈I
j∈J
ρ(i)U (i). Following is the result.
Proposition A.2. Consider the sequence of policies (π ∗ (N ))N ≥1 such that the routing matrix
y used in the exploitation phase satisfies y(i, .) ∈ ∆(J (i)). Then,
lim sup
N →∞
N
V ∗ − WpN∗ (π ∗ ) ≤ C.
log N
Further, suppose that there are no difficult type pairs. Then,
lim sup
N →∞
N
V ∗ − WpN∗ (π ∗ ) ≤ K
log log N
where K = K(ρ, µ, A) ∈ [0, ∞) is some constant.
In order to prove this Proposition, we need the following result that follows from Theorem
4.1 in [1].
Lemma A.3. Let X1 , X2 , · · · be i.i.d. random variables where Xi is the outcome of choosing a
job type j ∈ J according to a distribution α ∈ ∆(J ). Suppose i ∈ I and B ⊆ I \ {i} are such
that
X
αj KL(i, i0 |j) > 0
j∈J
for each
i0
∈ B. Let
ΛB
k (i)
1.
lim sup
N →∞
= mini0 ∈B Λk (i, i0 ). Then,
Ei [inf{k ≥ 0|ΛB
1
k (i) ≥ f (N )}]
P
≤
,
log f (N )
mini0 ∈B j∈J αj KL(i, i0 |j)
2.
Pi0 (Λk (i, i0 ) ≥ a for some k ≤ N ) ≤
ρ̂(i)/ρ̂(i0 )
.
a
for any a > 0.
Next, we also need the following result.
Lemma A.4. Let X1j , X2j , · · · be i.i.d. random variables for each j = 1, · · · , K, such that
|Xij | ≤ M and E(Xij ) = mj > 0. Let a, b and k j be such that a < k j < b for each j. Let
P
Snj = k j + ni=1 Xij and let B ⊆ {1, · · · , K}. Let E be the event:
0
{Snj < a for some j 0 before Snj > b for all j ∈ B}.
Let T = inf{n : Snj < a for some j}. Then
E[T 1E ] ≤ G
for some 0 < G < ∞ that does not depend on a, b, or k j for any j.
28
0
Proof. Define k j − a , z j . If we define Ej = {Snj < a for some n} and Tj = inf{n : Snj < a},
PK
P
then we have E ⊆ ∪j Ej , and thus we have E[T 1E ] ≤ K
j=1 E[Tj 1Ej ]. Now we
j=1 E[T 1Ej ] ≤
have
E[Tj 1Ej ] =
≤
≤
=
≤
∞
X
n=1
∞
X
n=1
∞
X
n=1
∞
X
n=1
∞
X
n=1
nP(T = n)
n
X
nP(
Xij ≤ −zj )
i=1
n exp(
−(nmj + zj )2
)
4nM 2
n exp(−
zj2
nm2j
mj zj
−
−
)
4M 2
2M 2
4nM 2
n exp(−
nm2j
) = G(mj , M ) < ∞,
4M 2
where the second inequality results from the Hoeffding bound. Taking G =
proves the result.
PK
j
j=1 G(m , M )
Proof of Proposition A.2. Let X denote the type of the worker. Let R(i) denote the expected
total regret over the lifetime of a worker on the event {X = i}, defined as
X
R(i) = N max[A(i, j) − p∗ (j)] − N
xπ∗ (i, j)[A(i, j) − p∗ (j))].
j∈J
j∈J
Here N xπ∗ (i, j) is the expected total number of times a job of type j is allotted to a worker of
type i under the policy π ∗ (N ). We will refer to the above quantity as just regret. For the rest
of the proof, all the expectations are on the event {X = i}. The proof will utilize the fact that
the log of the ratio of the posteriors, log(Λk (i, i0 )), for any i and i0 is a random walk, such that
if αk is the probability distribution over job types chosen at opportunity k, then
log(Λk+1 (i, i0 )) − log(Λk (i, i0 )) = log(
p(Xk , i, jk )
),
p(Xk , i0 , jk )
p(Xk ,i,jk )
where the random variables {log( p(X
)}k are independent random variables with a finite
0
k ,i ,jk )
P
support (since Xk and jk take finite values), and with mean j αjk KL(i, i0 |j). (Note here that if
P k
0
0
0
j αj KL(i, i |j) = 0 then since KL(i, i |j) ≥ 0, it must be that KL(i, i |j) = 0 for all j such that
p(Xk ,i,jk )
αjk > 0, and in this case we must have A(i, j) = A(i, j 0 ) for all such j. Thus log( p(X
) = 0,
0
k ,i ,jk )
i.e., the if the drift of the random walk is 0 at some k then the random walk has stopped.) Recall
that log(Λ0 (i, i0 )) = log(ρ̂(i)/ρ̂(i0 )).
Our goal is to compute an upper bound on R(i). To do so we first compute the expected regret
incurred till the end of the exploration phase in our algorithm. Denote this by Re (i). Below,
we will find an upper bound on this regret assuming that the worker performs an unbounded
number of jobs. Clearly the same bound holds on the expected regret until the end of exploration
phase if the worker leaves after N jobs.
Our strategy is as follows: we will decompose the regret till the end of exploration into the
regret incurred till the first time one of the following two events occurs:
29
1. Event A: mini0 6=i log Λk (i, i0 ) ≥ log log N (or mini0 6=i Λk (i, i0 ) ≥ log N ) and
2. Event B: mini0 6=i log Λk (i, i0 ) ≤ − log log N (or mini0 6=i Λk (i, i0 ) ≤
1
log N ),
followed by the residual regret, which will depend on which event occurred first. Note that one
of these two events will occur with probability 1.
We will compute two different upper bounds, depending on two different regimes of initial
posterior distributions of the different types (note that the posterior probabilities of the different
types i under the observed history is a sufficient statistic at any opportunity under our policy).
First, suppose that R̄(i) is highest expected regret incurred over all possible starting posteriors
that a) do not satisfy the conditions of both A and B and b) such that mini0 6=i log Λ0 (i, i0 ) ≥
mini0 6=i log(ρ̂(i)/ρ̂(i0 )). Let L1 be the set of starting posteriors that satisfy these conditions.
Next, suppose that R̃(i) is the highest expected regret incurred, where the supremum is taken
over all possible starting posteriors that a) do not satisfy the conditions of both A and B and
b) such that mini0 6=i log Λn (i, i0 ) < log(ρ̂(i)/ρ̂(i0 )). Let L2 be the set of posteriors that satisfy
these conditions. Clearly, Re (i) ≤ R̄(i).
Let G(i) denote the maximum expected regret incurred by the algorithm till one of A or B
occurs, where the maximum is taken over all possible starting posteriors that do not satisfy the
conditions of both A and B, i.e., L1 ∪ L2 . For convenience, we denote A < B as the event that
A occurs before B and vice versa (similarly for any two events). Thus we have
R̄(i) ≤ G(i) + sup P(A < B|l1 )E(Residual regret|A, l1 )
l1 ∈L1
+ sup P(B < A|l1 )E(Residual regret|B, l1 )
l1 ∈L1
and
R̃(i) ≤ G(i) + sup P(A < B|l2 )E(Residual regret|A, l2 )
l2 ∈L2
+ sup P(B < A|l2 )E(Residual regret|B, l2 ).
l2 ∈L2
First, let us find a bound on G(i). This is easy, because, G(i) ≤ E(inf{k > 0 : mini6=i0 Λk (i, i0 ) ≥
log N }}) = O(log log N ) from Lemma A.3 (since if neither condition A, nor B is satisfied, then
the policy in the guessing phase, and thus all job types are utilized with positive probability, and
hence the condition in the Lemma of the requirement of a positive learning rate for each distinction is satisfied). Also, from the second statement in Lemma A.3, since the posteriors in L1 are
such that mini0 6=i Λn (i, i0 ) ≥ mini0 6=i ρ̂(i)/ρ̂(i0 ), we have that P(B < A|l1 ) ≤ P(B ever occurs) ≤
O(1)/ log N . Finally we have supl2 ∈L2 P(B < A|l2 ) = w < 1. We thus have
2
R̄(i) ≤ O(log log N ) + sup E(Residual regret|A, l1 ) +
l1 ∈L1
1
sup E(Residual regret|B, l1 ) and
log N l1 ∈L1
(25)
R̃(i) ≤ O(log log N ) + sup E(Residual regret|A, l2 ) + w sup E(Residual regret|B, l2 ).
l2 ∈L2
(26)
l2 ∈L2
Next, consider suplr ∈Lr E(Residual regret|A, lr ). This depends on which of the following two
events happens next:
1. Event A0 : mini0 6=i log Λk (i, i0 ) < log log N (or mini0 6=i Λk (i, i0 ) < log N ),
30
2. Event A00 : i gets confirmed, i.e., mini0 ∈Str(i) log Λk (i, i0 ) > log N (or mini0 ∈Str(i) Λk (i, i0 ) >
N ).
Again conditional on A, one of the two events will occur with probability 1. We have
sup E(Residual regret|A, lr ) = sup [E(Residual regret|A, A0 < A00 , lr )P(A0 < A00 |A, lr )
lr ∈Lr
lr ∈Lr
+ E(Residual regret|A, A0 > A00 , lr )P(A0 > A00 |A, lr )].
Now from Lemma A.4 it follows that
E(Residual regret|A, A0 < A00 , lr )P(A0 < A00 |A, lr )
= E(Residual regret I{A0 <A00 } |A, lr ) ≤ M + R̄(i)P(A0 < A00 |A, lr )
for some constant M that does not depend on lr or N . To see this, note that A0 < A00 is the event
that, starting from some values between log log N and log N , some random walk Λk (i, i0 ) for i0 6= i
crosses the lower threshold log log N before all the random walks Λk (i, i0 ) for each i0 ∈ Str(i)
cross the upper threshold log N . Now between these two thresholds, the job distribution αk
equals α(i) for all k. Hence the drift for any of the random walks Λk (i, i0 ) for each i0 ∈ Str(i)
is strictly positive and finite. Further, as we argued earlier, if the drift for any of these random
walks is 0, then that random walk has stopped, and such random walks can be ignored. Thus
the conditions of Lemma A.4 are satisfied, and hence E((Time till A0 ) I{A0 <A00 } |A, lr ) = G < ∞.
Since the regret per unit time is bounded, the deduction follows. Moving on, we have
E(Residual regret|A, A00 < A0 , lr )
≤ E(inf{k > 0 : min Λk (i, i0 ) ≥ N })
i0 ∈Str(i)
X
αj U (i) − [A(i, j) − p∗ (j)] .
j∈J
Thus we have
sup E(Residual regret|A, lr ) ≤ O(1) + sup P(A0 < A00 |A, lr )R̄(i)
lr ∈Lr
(27)
lr ∈Lr
+ (1 − P(A0 < A00 |A, lr ))E(inf{k > 0 : min Λk (i, i0 ) ≥ N })
i0 ∈Str(i)
X
αj U (i) − [A(i, j) − p∗ (j)] .
j∈J
(28)
Thus we have
sup E(Residual regret|A, lr ) ≤ O(1) + qk R̄(i)
(29)
lr ∈Lr
+ (1 − qk )E(inf{k > 0 : min Λk (i, i0 ) ≥ N })
i0 ∈Str(i)
X
αj U (i) − [A(i, j) − p∗ (j)] ,
(30)
j∈J
for some qk where qk < 1 since suplr ∈Lr P(A0 < A00 |A, lr ) < 1.
Next, consider suplr ∈Lr E(Residual regret|B, lr ). This depends on which of the following two
events occurs next:
1. Event B 0 : mini0 6=i log Λk (i, i0 ) ≥ − log log N (or mini0 6=i Λk (i, i0 ) ≥
1
log N ),
2. Event B 00 : Some i0 6= i gets confirmed, i.e., mini00 ∈Str(i0 ) log Λk (i0 , i00 ) > log N
(or mini00 ∈Str(i0 ) Λk (i0 , i00 ) > N ).
31
Again, conditional on B, one of the two events will occur with probability 1. Let K(i) be the
maximum expected regret incurred till either B or B 0 occurs given that B has occurred and
the starting likelihoods were in Lr . Note that if B 00 < B 0 then the exploration phase ends
and hence there is no residual regret (Although note that if i0 is such that i ∈ Str(i0 ), then
P(B 00 < B 0 |B, lr ) ≤ O(1)/N from the second statement in Lemma A.3.). Then we have
sup E(Residual regret|B, lr ) ≤ K(i) + sup P(B 0 < B 00 |B, lr )R̃(i).
lr ∈Lr
lr ∈Lr
Now we can show that if there is a type i0 such that i ∈ I \ Str(i0 ), then K(i) ≤ O(log N ),
where as if there is no such type, then K(i) = O(1). We first show this. Let T (i) be the
maximum expected time taken till either B or B 0 occurs given that B has occurred and the
starting likelihoods were in Lr . Clearly K(i) ≤ T (i) since the price adjusted payoffs lie in [0, 1].
Now, let T1 be the time spent after B has occurred, before B or B 0 occurs, while either a)
algorithm is in the guessing phase or b) the algorithm is in the confirmation phase for some
guessed type i0 such that α(i0 )j > 0 for some j such that KL(i, i0 |j) > 0. Under this case, we
will say that the algorithm is in state 1, and let 1k be the event that the algorithm is in state
2 at time k. Next let T2 be the time spent after B has occurred, before B or B 0 occurs, while
the algorithm is in the confirmation phase for some guessed type i0 such that α(i0 )j = 0 for all
j such that KL(i, i0 |j) > 0 (clearly this can happen only for i0 such that i ∈ I \ Str(i0 ); thus
if such an i0 doesn’t exist, then T2 = 0). Under this case, we will say that the algorithm is in
state 2, and let 2k be the event that the algorithm is in state 2 at time k. Now we clearly have
T (i) ≤ supr ∈Lr E(T1 |B, lr ) + supr ∈Lr E(T2 |B, lr ).
Let Γk (i) = mini0 6=i log Λk (i, i0 ). Then observe that E[(Γk+1 (i)−Γk (i))I1k |B, lr ] > m for some
m > 0 that depends only on the primitives of the problem and E[(Γk+1 (i) − Γk (i))I2k |B, lr ] = 0,
i.e, when the algorithm is in state 1, the drift in Γk (i) is strictly positive where as when the
algorithm is in state 2, then Γk (i) does not change.
Now consider E(T1 |B, lr ). Let k ∗ be the opportunity that B occurred for the first time. Then
clearly Γk∗ (i) = − log log N − ε, where ε ≥ 0 is bounded by some constant M depending only
on the problem instance. Thus P(T1 > t|B, lr ) ≤ P(Γk0 (i) − Γk∗ (i) ≤ ε|B, lr ) for some k 0 > k ∗
such that the algorithm has been in state 1 t times at opportunity k 0 . Thus our observation
above implies that P(T1 > t|B, lr ) ≤ exp(−ct) for some c > 0, by a standard application of a
concentration inequality. Thus E(T1 |B, lr ) = O(1).
Next consider E(T2 |B, lr ). Consider the successive returns of the algorithm to state 2. Conditional on the algorithm having entered state 2, the expected time spent in that state is bounded
by the expected time till the guessed type i0 is confirmed, which is O(log N ) from Lemma A.3,
and the conditional probability that i0 gets confirmed is some q > 0. Thus the total expected
number of returns to state 2 is bounded by 1/q. Thus E(T2 |B, lr ) = O(log N ) as well. Thus
K(i) ≤ O(log N ) and we have
sup E(Residual regret|B, lr ) ≤ O(log N ) + R̃(i).
lr ∈Lr
32
And thus we finally have
1
O(log(N ) + R̃(i)
log N
X
+ (1 − q1 )E(inf{k > 0 : min Λk (i, i0 ) ≥ N })
αj U (i) − [A(i, j) − p∗ (j)] ;
R̄(i) ≤ O(log log N ) + q1 R̄(i) +
i0 ∈Str(i)
(31)
j∈J
R̃(i) ≤ O(log log N ) + q2 R̄(i) + wO(log N ) + wR̃(i)
X
+ (1 − q2 )E(inf{k > 0 : min Λk (i, i0 ) ≥ N })
αj U (i) − [A(i, j) − p∗ (j)] .
i0 ∈Str(i)
(32)
j∈J
Combining the above two equations, we deduce that
1 − q1
O(log log N )
1 − q1 − q2 / log N
X
+ E[inf{k > 0 : min Λn (i, i0 ) ≥ N }]
αj U (i) − [A(i, j) − p∗ (j)]
Re (i) ≤ R̄(i) ≤
i0 ∈Str(i)
j∈J
= O(log log N )
+ (1 + o(1))E[inf{k > 0 : min Λn (i, i0 ) ≥ N }]
i0 ∈Str(i)
X
αj U (i) − [A(i, j) − p∗ (j)] . (33)
j∈J
Now, we observed earlier that P(i0 gets confirmed | {X = i}) ≤ 1/N if i0 ∈ Str(i). Thus the
regret in the exploitation phase is in the worst case of order O(N ) with probability 1/N and 0
otherwise. Thus the total expected regret in the exploitation phase is O(1). Thus
X
R(i) ≤ O(log log N )+(1+o(1))E[inf{k > 0 : min Λk (i, i0 ) ≥ N }]
αj U (i)−[A(i, j)−p∗ (j)] .
i0 ∈Str(i)
j∈J
Thus Lemma A.3 implies the result (note that if there are no difficult type pairs, then
[A(i, j) − p∗ (j)] = 0).
P
j∈J
αj U (i)−
Next, we prove that for a large enough N , one can choose a routing matrix y ∗ in the exploitation phase of DEEM that will ensure that matches optimize price-adjusted payoffs, and
such that the capacity and complementary slackness conditions are satisfied.
Proposition A.5. Suppose that the generalized imbalance condition is satisfied. Consider any
optimal routing matrix x∗ that is an optimal solution to problem (11). Then in the policy π ∗ (N )
for the N -job problem, for any N large enough, one can choose a routing matrix y ∗ such that
y ∗ (i, .) ∈ ∆(J (i)) and that satisfies:
1.
P
2.
P
i∈I
ρ(i)xπ∗ (i, j) = µ(j) for any j such that
i∈I
ρ(i)xπ∗ (i, j) < µ(j) for any other j.
P
i∈I
ρ(i)x∗ (i, j) = µ(j), and
We remark that the y ∗ we construct satisfies ky ∗ − x∗ k = o(1). In order to prove this
proposition, we will need the following Lemma.
Lemma A.6. Suppose that the generalized imbalance condition
P is satisfied. Consider any feasible
routing matrix [x(i, j)]I×J . Consider any job j such that i∈I ρ(i)x(i, j) = µ(j). Then there is
a path on the complete bipartite graph between worker types I and job types J with the following
properties:
33
• One end point is job j.
• The other end point is a job type whose capacity is under-utilized (it is permitted to be κ).
• For every job type on the path in between, they are operating at capacity/all jobs are being
served. (All worker types are fully utilized by definition, since we formally consider an
unassigned worker as being assigned to job type κ.)
• For every undirected edge on the path, there is a positive rate of jobs routed on that edge
in x.
Proof. Consider a bi-partite graph with jobs representing nodes on one side and workers on the
other. There is an edge between a job j 0 and a worker i if x(i, j) > 0. Consider the connected
component of job type j in this graph. Suppose it includes no job type that is underutilized.
Then the arrival rate of jobs from the set of workers in the connected component exactly matches
the total effective service rate of the sellers in connected component. But this is a contradiction
since generalized imbalance holds. Hence there exists an underutilized job type j 0 that can be
reached from j. Take any path from j to j 0 . Traverse it starting from j and terminate it the
first time it hits any underutilized job type.
Proof of Proposition A.5. Recall that for a given routing matrix [y(i, j)]I×J , xπ∗ (i, j), is the
resulting fraction of jobs of type j directed to worker type i. In the course of this proof, we will
suppress the subscript π ∗ . Clearly, there exist εi0 (i, j) for each i ∈ I, i0 ∈ I ∪ {0}, j ∈ J such
that we have
X
x(i, j) = ε0 (i, j) + (1 − εi (i, j))y(i, j) +
εi0 (i, j)y(i0 , j) .
(34)
i0 ∈I\{i}
The ε’s depend on the guessing and confirmation phases but not on y. (In particular, ε0 arises
from the overall routing contribution of the guessing and confirmation phases, and εi ’s arise
from the small likelihood that a worker who is confirmed as type i is actually some other type.)
A key fact that we will use is that all ε’s are uniformly bounded by o(1).
P
P
Let Jx∗ = {s : i∈I ρ(i)x∗ (i, j) = µ(j)} and Jπ∗ = {j : i∈I ρ(i)xπ∗ (i, j) = µ(j)}. Now we
want to find a y such that y(i, ·) ∈ ∆(J (i)) for all i ∈ I (call (i, j) a “permissible edge” in the
bipartite graph between workers and jobs if j ∈ J (i)), and such that:
• For each j ∈ Jx∗ we also have j ∈ Jπ∗ , i.e., Jx∗ ⊆ Jπ∗ .
• ky − x∗ k = o(1).
Note that the two P
bullets together willPimply the proposition, since kx−x∗ k = o(1) from Eq. (34),
and this leads to i∈I ρ(i)x(i, j) = i∈I ρ(i)x∗ (i, j) + o(1) < µ(j) for all j ∈ J \Jx∗ , for large
enough N .
The requirement in the first bullet can be written as a set of linear equations using Eq. (34).
Here we write y (and later also x∗ ) as a column vector with |I||J | elements:
By + ε̂ = (µ(j))j∈Jx∗ .
Here we have kε̂k = o(1) and matrix B can be written as B = B0 + Bε , where B0 has 1’s in
columns corresponding to dimensions (·, s) and 0’s everywhere else, and kBε k = o(1). Expressing
y as y = x + z, we are left with the following equation for z,
Bz = −(Bε x∗ + ε̂)
34
(35)
using the fact that B0 x∗ = (µ(j))j∈Jx∗ by definitions of B0 and Jx∗ . We will look for a solution
to this underdetermined set of equations with a specific structure: we want z to be a linear
combination of flows along |Jx∗ | paths coming from Lemma A.6, one path λj for each j ∈ Jx∗ .
Each λj can be written as a column vector with +1’s on the odd edges (including the edge
incident on j) and −1’s on the even edges. Let Λ = [λj ]j∈Jx∗ be the path matrix. Then z with
the desired structure can be expressed as Λη, where η is the vector of flows along each of the
paths. Now note that Bz = (B0 + Bε )Λη = (I + Bε Λ)η. Here we deduced B0 Λ = I from the
fact that λj is a path which has j as one end point, and a worker or else a job not in Jx∗ as the
other end point. Our system of equations reduces to
(I + Bε Λ)η = −(Bε x∗ + ε̂) ,
Since kBε k = o(1), the coefficient matrix is extremely well behaved being o(1) different from
the identity, and we deduce that this system of equations has a unique solution η ∗ that satisfies
kη ∗ k = o(1). This yields us z ∗ = Λη ∗ that is also of size o(1), and supported on permissible
edges since each of the paths is supported on permissible edges (Lemma A.6). Thus, we finally
obtain y ∗ = x∗ + z ∗ possessing all the desired properties. Notice that the (permissible) edges on
which y ∗ differs from x∗ had strictly positive values in x∗ by Lemma A.6, and hence this is also
the case in y ∗ for large enough N .
Finally, we show that with the choice of y ∗ constructed in Proposition A.5 in the exploitation
phase, the sequence of policies (π ∗ (N )) asymptotically achieve the required upper bound on
regret.
Proposition A.7. Suppose that the generalized imbalance condition is satisfied. Consider the
sequence of policies (π ∗ (N ))N ≥1 , with the routing matrix y ∗ proposed in Proposition A.5. Let
W N (π ∗ ) be the value attained by this policy in optimization problem (7). Then
lim sup
N →∞
N
V ∗ − W N (π ∗ ) ≤ C.
log N
Further, suppose that there are no difficult type pairs. Then,
lim sup
N →∞
N
V ∗ − W N (π ∗ ) ≤ K
log log N
where K = K(ρ, µ, A) ∈ (0, ∞) is some constant.
Proof. From Proposition A.5 it follows that the policy π ∗ is feasible in problem 7, and further
X
X
X
X
WpN∗ (π ∗ ) =
ρ(i)
xπ∗ (i, j)A(i, j) −
p∗ (j)[
ρ(i)xπ∗ (i, j) − µ(j)].
(36)
=
i∈I
j∈J
X
X
i∈I
ρ(i)
j∈J
xπ∗ (i, j)A(i, j),
i∈I
(37)
j∈J
P
∗
where the second equality follows from the fact that if p∗ (j) > 0, then i∈I ρ(i)x
P (i, j)−µ(j) = 0
by complementary slackness, and hence from Proposition A.5 we obtain that i∈I ρ(i)xπ∗ (i, j)−
µ(j) = 0 as well for these j. Thus we have a policy π ∗ that is feasible, and that gives a rate
WpN∗ (π ∗ ) of accumulation of payoff in problem (7). Thus the result follows from Proposition A.2.
35
B
Computation of the policy in the confirmation subphase
Denoting mini0 ∈Str(i)
lem is the same as:
P
j∈J
αj KL(i, i0 |j) as h (where h is non-negative), the optimization prob-
X αj
U (i) − [A(i, j) − p∗ (j)]
h
j∈J
X αj
s.t.
KL(i, i0 |j) ≥ 1 for all i0 ∈ Str(i),
h
min
j∈J
X αj
αj
1 1
= ,
≥ 0 and
≥ 0 for all j.
h
h h
h
j∈J
Now redefine
αj
h
, ᾱj and
1
h
, h̄ to obtain the linear program:
min
X
ᾱj U (i) − [A(i, j) − p∗ (j)]
j∈J
s.t.
X
ᾱj KL(i, i0 |j) ≥ 1 for all i0 ∈ Str(i),
j∈J
ᾱj ≥ 0 for all j,
P
P
where at any optimal solution ᾱ∗ , we have h̄∗ = j∈J ᾱj∗ , and thus α(i)j = ᾱj∗ / j∈J ᾱj∗ . Note
that a feasible solution exists to this linear program as long as KL(i, i0 |j) > 0 for some j for
each i0 . When there are multiple solutions, we choosePthe solution with the largest learning rate;
i.e., we choose a solution with the smallest h̄∗ , i.e., j∈J ᾱ∗ . One way to accomplish this is to
P
P
modify the objective to minimize j∈J ᾱj U (i) − [A(i, j) − p∗ (j)] + τ j∈J ᾱj for some small
τ > 0.
For small
can simply evaluate all the finite extreme points of the constrained
P problems, we
0 |j) ≥ 1 for all i0 ∈ Str(i); ᾱ ≥ 0 for all j}; i.e., all the extreme points
ᾱ
KL(i,
i
set {ᾱ :
j
j∈J j
such that ᾱj < ∞ for all j. This is sufficient because we can show that there always exists a
finite solution to the linear program. To see this, note that
ᾱj = ᾱjm ,
X
i0 ∈Str(i)
1
0
I
KL(i, i0 |j) {KL(i,i |j)>0}
is feasible and finite. Further, for any solution such that αj∗ > ᾱjm , αj∗ can be reduced to ᾱjm
without loss in objective while maintaining feasibility.
For the practical heuristic DEEM+ , αk can be computed as a solution to the following
optimization problem.
X
X αj
min
gk (i)
U (i) − [A(i, j) − p∗ (j)]
h
i
j∈J
X αj
s.t.
KL(i, i0 |j) ≥ gk (i) 1 + log R(i, i0 )/ log N for all i ∈ I, i0 ∈ Lk (i),
h
j∈J
X αj
αj
1 1
= ,
≥ 0 and
≥ 0 for all j.
h
h h
h
j∈J
We can again redefine
αj
h
, ᾱj and
1
h
, h̄ to obtain a linear program.
36
C
Practical implementation of other policies
1. PA-UCB: The upper confidence bound (UCB) algorithm is a popular multi-armed bandit algorithm [9, 10, 18], that embodies the well known approach of “optimism in the face of
uncertainty" to solving these problems. In its classical implementation, one keeps track of highprobability confidence intervals for the expected payoffs of each arm, and at each step chooses
an arm that has the highest upper confidence bound, i.e., the highest upper boundary of the
confidence interval. To be precise, if rj (t) is the average reward seen for some arm j, that has
been pulled nj times until time t, then the upper confidence bound for the mean reward for this
arm is given by:
q
uj (t) = rj (t) +
2 log t/nj .
The algorithm chooses arm j = arg maxj µj (t). In our context, the arms are the job types, and
if k jobs have already been allotted to a worker, and r̄j (k) is the average payoff obtained from
past assignments of job j, and nj is the number of these assignments, we will define
q
uj (k) = rj (k) + 2 log k/nj − pq (j),
where pq (j) is the current queue length based price for job j. The PA-UCB algorithm then
chooses job type j = arg maxj∈J µj to be assigned to the worker next. Note that this algorithm
does not require the knowledge of the instance primitives (ρ̂, N, µ, A).
2. Thompson sampling (PA-TS): Thompson sampling is another popular multi-armed
bandit algorithm [9, 18] employing a Bayesian approach to the problem of arm selection. The
description of the algorithm is simple: starting with a prior, at every step select an arm with a
probability equal to the posterior probability of that arm being optimal. These posterior probabilities are updated based on observations made at each step. One can incorporate information
about correlation between the rewards of the different arms in computing these posteriors, which
makes it a versatile algorithm that exploits the reward structure in multiple settings. It is known
to give asymptotically tight regret guarantees in many multi-armed bandit problems of interest
[4, 26, 33].
In our simulations, a price-adjusted version of TS is implemented as follows. The prior
probability of the worker being of type i is P ρ̂(i)
With this as the prior, depending on
0 .
i0 ρ̂(i )
each worker’s history, a posterior distribution of the type of the worker is computed using the
knowledge of the expected payoff matrix A. Then a worker type is sampled from this distribution.
Suppose this type is i, then a job type j ∗ = arg maxj A(i, j) − pq (j) is assigned to the worker.
In contrast to the PA-UCB algorithm, Thompson sampling does utilize the knowledge of the
expected payoff matrix A as well as the arrival rates ρ̂ (the latter to construct a starting prior,
and the former for the posterior updates).
D
D.1
Other proofs
Sufficiency of worker-history-only policies
We show that there is a worker-history-only (WHO) policy that achieves a rate of payoff accumulation that is arbitrarily close to the maximum possible. We will think of N as being fixed
throughout this section.
37
Suppose the system starts at time t = 1 with no workers already present before the period.21
Arrivals thereafter occur as described in Section 3. Consider any (arbitrary, time varying)
policy π and let xπ,t (i, j) denote the derived quantity representing the fraction of workers of
type i who are assigned jobs on type j in period t under π. Then the largest possible rate of
payoff accumulation under policy π over long horizons is
V (π) = limsupT →∞ VT (π)
where VT (π) =
1
T
T X
X
ρ(i)
t=1 i∈I
X
(38)
xπ,t (i, j)A(i, j) .
(39)
j∈J
Note that we have ignored the effect of less than ρ(i) workers of type i being present for the first
N periods, but this does not change the limiting value V . Also, note that randomization in π
cannot increase the achievable value of V , since one can always do as well by picking the most
favorable sample path.
Claim D.1. Fix any policy π and any ε > 0. Then there is a worker-history-only (WHO) policy
that achieves a steady state rate of payoff accumulation exceeding V (π) − ε.
Proof. We suppress dependence on π. By definition of V , we know that there exists an increasing
sequence of times T1 , T2 , . . . such that VTi > V − ε/2 for all i = 1, 2, . . .. We will construct a
suitable WHO policy by using a sufficiently large time in this sequence. Let νt (Hk ) be the
measure of workers in the system with history Hk just before the start of time t, and abusing
notation, let νt (Hk )j be the measure of such workers who are assigned to job type j at time t.
Since the policy cannot assign more jobs than have arrived in any period, we have
N X
X
νt (Hk )j ≤ µ(j)
for all t ≥ 1 .
(40)
k=1 Hk
Fix T , which we think of as a large member of the sequence above. The average measure of
workers with history Hk who are present is
T
1X
ν̄(Hk ) =
νt (Hk )
T
for all Hk and k = 1, 2, . . . , N .
(41)
t=1
The average measure of such workers who are assigned job j is similarly defined and denoted by
ν̄(Hk , j). We immediately have that
N X
X
ν̄(Hk )j ≤ µ(j) ,
(42)
k=1 Hk
by averaging Eq. (40) over times until T . Now, consider a worker with history Hk assigned a job
of type j. Using the known A matrix and arrival rates ρ, we can infer the posterior distribution
of the worker type based on Hk , and hence, the likelihood of the job of type j being successfully
completed. Let p(Hk , j) denote the probability of success. Then the distribution of Hk+1 for
the worker is simply given by
Hk+1 = Hk , j, Bernoulli(p(Hk , j)) .
21
The analysis would be very similar and produce the same results if the starting state is an arbitrary one with
a bounded mass of workers already present.
38
Barring the edge effect at time T caused by workers whose history was Hk at time T , this
allows us to uniquely determine ν̄(Hk+1 ) based on ν̄(Hk , j)’s. In particular, for any δ1 > 0, if
T ≥ maxi∈I ρ(i)/(N δ1 ) we have that
δ1
ν̄(Hk , (j, 1)) ≈ ν̄(Hk )j p(Hk , j)
δ1
ν̄(Hk , (j, 0)) ≈ ν̄(Hk )j 1 − p(Hk , j) .
(43)
δ
Here, a ≈ b represents the bound |a − b| ≤ δ. Note that we have
VT =
N X
X
ν̄(Hk )j p(Hk , j) .
(44)
k=1 Hk
We are now ready to define our WHO policy π. For every Hk such that ν̄(Hk ) ≥ δ2 , this
policy will attempt to assign a fraction ν̄(Hk )j /ν̄(Hk ) of workers with history Hk to jobs of type
j. Ignore capacity constraints for the present. (We will find that the capacity constraints will
be almost satisfied.) Leave the choice of δ2 for later; we will choose δ2 small and then choose
0 < δ1 < δ2 /N so as to achieve the desired value of δ3 below. Workers with rare histories, i.e.,
histories such that ν̄(Hk ) < δ2 , will not be assigned jobs under π. Note that the definition of
rare histories refers to frequency of occurrence under π. Then, this uniquely specifies π as well
as the steady state mix of workers before any time t. In particular, the steady state mass ν(Hk )
under π of workers with history Hk that are not rare is bounded as
(1 − δ1 /δ2 )k−1 ν̄(Hk ) ≤ ν(Hk ) ≤ (1 + δ1 /δ2 )k−1 ν̄(Hk )
(45)
using Eq. (43), and the fact that all subhistories of Hk are also not rare. It follows that
δ3
ν(Hk ) ≈ ν̄(Hk ) where δ3 = max(exp(N δ1 /δ2 ) − 1, δ2 ) ,
(46)
for all histories (including rare histories), using k ≤ N and ν(Hk ) ≤ 1. Violation of the j-capacity
constraint under π is given by
N X
N X
X
X
ν(Hk )j − µ(j) ≤
ν̄(Hk )j − µ(j) + 2N |J |N −1 δ3 = 2N |J |N −1 δ3
k=1 Hk
+
k=1 Hk
+
using Eq. (46) and Eq. (42), and the fact that there are k≤N (2|J |)N −1 ≤ 2N |J |N −1 possible
histories. It follows that the sum of capacity constraint violations across j ∈ J is bounded by
(2|J |)N δ3 . Pick an arbitrary set of workers to go unmatched to get rid of any capacity violations
(this can be done while remaining within the class of WHO policies). In worst case, this will
cause payoff loss of 1 for each period remaining in the worker’s lifetime. Thus, the loss caused
by the need to remedy capacity violations is bounded by δ4 = N (2|J |)N δ3 per period.
P
Ignoring capacity violations, the steady state rate of accumulation of payoff under π is
N X
X
k=1 Hk
δ5
ν(Hk )j p(Hk , j) ≈
N X
X
ν̄(Hk )j p(Hk , j) = VT (π)
k=1 Hk
where δ5 = 2N |J |N −1 δ3 < δ4 .
39
(47)
again using Eq. (46) and the fact that there are
P
k≤N (2|J |)
N −1
≤ 2N |J |N −1 possible histories.
Let V (π) denote the true steady state rate of accumulation of payoff under π when capacity
constraints are considered. Combining the above, we deduce that V (π) ≥ VT (π) − 2δ4 . The time
T will be chosen as a member of the sequence defined at the beginning of the proof, ensuring
VT (π) ≥ V (π) − ε/2; hence it will suffice to show V (π) ≥ VT (π) − ε/2. Hence, it suffices to have
δ4 = ε/4, which can achieved using δ3 = δ2 = ε/(4N (2|J |)N ) and δ1 = δ3 log(1 + δ3 )/N and T
a member of the sequence satisfying T ≥ maxi∈I ρ(i)/(N δ1 ). This yields the required bound of
V (π) ≥ V (π) − ε.
D.2
Uniqueness of prices under generalized imbalance
Proposition D.2. Under the generalized imbalance condition, the job shadow prices p∗ are
uniquely determined.
Proof of Proposition D.2. The dual to problem 11 can be written as
X
X
minimize
µ(j)p(j) +
ρ(i)v(i)
j∈J
i∈I
subject to
p(j) + v(i) ≥ A(i, j) ∀i ∈ I, j ∈ J ,
p(j) ≥ 0 ∀j ∈ J ,
v(i) ≥ 0 ∀i ∈ I .
The dual variables are (P, V ) where “job prices” P = (p(j))j∈J and “worker values” V =
(v(i))i∈I . We will prove the result by contradiction. Suppose there are multiple dual optima.
Let D be the set of dual optima. Let J 0 be the set of jobs such that the prices of those jobs
take multiple values in D. Formally,
J 0 = {j ∈ J : p(j) takes multiple values in D} .
(48)
Similarly, let I 0 be the set of workers such that the prices of those workers take multiple values
in D. Formally,
I 0 = {i ∈ I : v(i) takes multiple values in D} .
(49)
For each j ∈ J 0 , we immediately deduce that there exists a dual optimum with p(j) > 0, and
hence the capacity constraint of job type j is tight in all primal optima.PSimilarly, we deduce
that for each i ∈ I 0 , worker type i is assigned a job in all periods, i.e., j∈J x(i, j) = 1. By
assumption, we have
X
X
ρ(i) 6=
µ(j) .
i∈I 0
j∈J 0
Suppose the left hand side is larger than the right (the complementary case can be dealt with
similarly). Take any primal optimum x∗ . The jobs in J 0 do not have enough capacity to serve
all workers in I 0 , hence there must be some worker i ∈ I 0 and a job s ∈
/ J 0 such that x∗ (i, s) > 0.
0
Since s ∈
/ J , we must have that p(j) has a unique optimum value in D. Call this value p∗ (j).
Let the largest and smallest values of v(i) in D be v max (i) and v min (i). By complementary
slackness, we know that
v max (i) + p∗ (j) = A(i, j) = v min (i) + p∗ (j)
⇒ v max (i) = v min (i) .
40
But since i ∈ I 0 we must have v max (i) > v min (i). Thus we have obtained a contradiction.
The proof of the next proposition shows that a very simple “learn then exploit" strategy
achieves a regret of O(log N/N ). This follows from the fact that, under an identifiability condition, the sequence of sets (X N ) converges to the set D in an appropriately defined distance.
Proposition D.3. Suppose that no two rows in A are identical. Then supx∈D inf y∈X N kx−yk =
O logNN
Proof. It is clear that xN ⊆ D. We will find an inner approximation X̃ N to X N such that
X̃ N ⊆ X N , and X̃ N converges to D in an appropriate sense as N goes to infinity. To define this
approximation, suppose that in the learning problem corresponding to a fixed N , one starts off
with a exploration phase of a fixed length O(log N ), where each job j is presented to the worker
Os number of times (where Os = O(log N ), fixed a priori), so that after this phase, the type of
the worker becomes known with a probability of error at most O(1/N ). This will then allow us
to relate the problem to the problem in which the user type is known.
Suppose after this phase, the probability that a worker of type i is correctly identified is p(i)
and the probability that she is mis-identified as some other type i0 is p(i, i0 ). Note that since
no two rows in A are identical, p(i, i0 ) = O(1/N ) for all i 6= i0 . Let d(i, j) denote the expected
number of times a worker that has been identified as being of type i (correctly or incorrectly)
is directed towards job j after the exploration phase, i.e., from job Os + 1 till the N th job. Let
¯ j) = d(i, j)/N . Then we can see that, one can attain all x in the following set:
d(i,
X
N
¯ j) ≥ 0;
X̃
=
x ∈ R|I|×|J | : d(i,
x(ib, s) = 1;
(50)
j∈J
X
Os
0 ¯ 0
¯
x(i, j) =
+ p(i)d(i, j) +
p(i, i )d(i , s)
N
0
(51)
i 6=i
¯ j) ≤ 1, and since p(i, i0 ) ≤ O(1/N ), we can express the above set as:
Now since d(i,
X
¯ j) ≥ 0;
¯ j) + O log N
X̃ N =
x ∈ R|I|×|J | : d(i,
x(i, j) = 1; x(i, j) = d(i,
(52)
N
j∈J
This in turn is the same as:
log N X
N
|I|×|J |
X̃
=
x∈R
: x(i, j) ≥ O
;
x(i, j) = 1
N
(53)
j∈J
Note that by construction, X̃ N ⊆ xN . But we can now see that X̃ N converges to D in the sense
that
log N
sup inf kx − yk = O
,
N
x∈D y∈X̃ N
and hence,
log N
sup inf kx − yk = O
N
x∈D y∈X N
as well.
Proposition D.4. The set X N is a convex polytope.
41
Proof. For the purpose of this proof, let
X
N
= {N x : x ∈ X N }.
N
We will show that X is a polytope, from which the result will follow. We will prove this using
N
an induction argument. We will represent each point in X as a |I| × |J | matrix (x(i, j))|I|×|J | .
Let worker types in I be labeled as i1 , . . . , i|I| and let job types in J be labeled as j1 , . . . , j|J | .
Now clearly, X
0
= {(0)|I|×|J | } which is a convex polytope. We will show that if X
N
is
(N +1)
a convex polytope, then X
is one as well, and hence the result will follow. To do so, we
decompose the assignment problem with (N +1) jobs, into the first job and the remaining N jobs.
A policy in the (N + 1)- jobs problem is a choice of a randomization over the jobs in J for the
first job, and depending on whether a reward was obtained or not with the chosen job, a choice
N
of a point in X to be achieved for the remaining N jobs. Each such policy gives a point in the
(N +1)
N
X
. Suppose that η1 ∈ ∆(J ) is the randomization chosen for job 1, and let R(j, 1) ∈ X
N
and R(j, 0) ∈ X be the points chosen to be achieved from job 2 onwards depending on the job
j that was chosen, and whether a reward was obtained or not, i.e.. R(., .) is a mapping from
N
J × {0, 1} to the set X . Then this policy achieves the following point in the (N + 1)- jobs
problem:
η1 (j1 ) η1 (j2 ) . . . η1 (j|J | )
..
..
.. + X η (j) Diag[A(., j)]R(j, 1) + Diag[Ā(., j)]R(j, 0) ,
.
.
.
1
.
.
.
j∈J
η1 (j1 ) η1 (j2 ) . . . η1 (j|J | )
where
A(i1 , j)
0
...
0
A(i
,
j)
...
2
Diag[A(., j)] = .
.
..
..
..
.
0
0
...
and
1 − A(i1 , j)
0
...
0
1 − A(i2 , j) . . .
Diag[Ā(., j)] =
..
..
..
.
.
.
0
0
...
0
0
0
A(i|I| , j)
0
0
.
0
1 − A(i|I| , j)
And thus we have
(N +1)
X =
η1 (j1 ) η1 (j2 ) . . .
..
..
..
.
.
.
η1 (j1 ) η1 (j2 ) . . .
η1 (j|J | )
.. + X η (j) Diag[A(., j)]R(j, 1) + Diag[Ā(., j)]R(j, 0)
1
.
η1 (j|J | )
N
.
: η1 ∈ ∆(J ), R(., .) ∈ X
j∈J
Let 1s be the |I| × |J | matrix with ones along column corresponding to job type j and all
other entries 0. Then the set
N
,
J (s) = 1s + Diag[A(., j)]R(j, 1) + Diag[Ā(., j)]R(j, 0) : R(s, .) ∈ X
42
is a convex polytope, being a linear combination of two convex polytopes, followed by an affine
(N +1)
shift. It is easy to see that X
is just a convex combination of the polytopes J (s) for j ∈ J ,
(N +1)
is a convex polytope as well.
and hence X
43
| 8cs.DS
|
USING MATCHING TO DETECT INFEASIBILITY OF SOME INTEGER PROGRAMS
arXiv:1703.01532v1 [cs.DS] 4 Mar 2017
S.J. GISMONDI∗, E.R. SWART†
Abstract. A novel matching based heuristic algorithm designed to detect specially formulated infeasible {0, 1} IPs is
presented. The algorithm’s input is a set of nested doubly stochastic subsystems and a set E of instance defining variables set
at zero level. The algorithm deduces additional variables at zero level until either a constraint is violated (the IP is infeasible),
or no more variables can be deduced zero (the IP is undecided). All feasible IPs, and all infeasible IPs not detected infeasible
are undecided. We successfully apply the algorithm to a small set of specially formulated infeasible {0, 1} IP instances of the
Hamilton cycle decision problem. We show how to model both the graph and subgraph isomorphism decision problems for input
to the algorithm. Increased levels of nested doubly stochastic subsystems can be implemented dynamically. The algorithm is
designed for parallel processing, and for inclusion of techniques in addition to matching.
Key words. integer program, matching, permutations, decision problem
MSC Subject classifications. 05C45 68R10 90C05 90C10
1. Introduction. We present a novel matching based heuristic algorithm deigned to detect specially
formulated infeasible {0, 1} IPs. It either detects an infeasible IP or exits undecided. It does not solve an IP.
We call it the triple overlay matching based closure algorithm (the algorithm). Input to the algorithm is an
IP whose constraints are a set of nested doubly stochastic boolean subsystems [12] together with a set E of
instance defining variables set at zero level. The IP’s solution set is a subset of the set of n! nxn permutation
matrices P , written as n2 xn2 block permutation matrices Q each with block structure P . The algorithm is a
polynomial time search that deduces additional variables at zero level via matching until either a constraint
is violated in which case the IP is infeasible, or we can go no further in which case the IP is undecided. If
the IP is decided infeasible, a set of variables deduced to be at zero level can be used to test and display
a set of violated constraints. If the IP is undecided, additional variables deduced zero can be added to E,
and nothing more can be concluded. While some infeasible IPs may fail to be detected infeasible (not yet
found), feasible IPs can only fall in the undecided category.
In section 2 we present the generic IP required as input to the algorithm, and we view the set of all
solutions of the IP as an n2 xn2 block permutation matrix Q whose components are {0, 1} variables. Each
nxn block (u, i) is nxn permutation matrix P where block (u, i) contains pu,i in position (u, i). An instance
is modelled by setting certain variables of Q to zero level. In sections 3, 4 and 5, we present the algorithm,
an application / matching model of the Hamilton cycle decision problem (HCP), empirical results and two
conjectures. In section 6, we present generalizations of the algorithm, matching models for both the graph
and subgraph isomorphism decision problems, and other uses. We also propose more development. Its
success, effectiveness and practicality can then be evaluated in comparison to other algorithms. We invite
researchers to collaborate with us. Contact the corresponding author for FORTRAN code.
The ideas presented in this paper originated from a polyhedral model of cycles not in graphs [9]. At that
time we thought about how to recognize the Birkhoff polytope as an image of a solution set of a compact
formulation for non-Hamiltonian graphs. We’ve accomplished part of that goal in this paper. That is, the
convex hull of all excluded permutations for infeasible IPs is the Birkhoff polytope, and its easy to build
a compact formulation from E. In this paper, over 2,100 non-Hamiltonian graphs ranging from 10 - 104
vertices are correctly decided as infeasible IPs. None failed that are not reported. Although counterexamples
surely exist, we believe there is an insightful theory to be discovered that explains these early successes.
2. About Specially Constructed {0, 1} IPs and Terminology. Imagine a {0, 1} integer program
modelled such that P is a solution if and only if the integer program is feasible e.g. matching. Also imagine
an arbitrary set of instance defining constraints of the form pu,i + pv,j ≤ 1. It’s not obvious how to apply
matching to help in its solution. Now imagine that we create a compact formulation whose solution set is
isomorphic (i.e. equal under an orthogonal projection), where we convert each linear constraint into all of its
instantiated discrete states via creation of a set of discrete {0, 1} variables. Then it becomes easy to exploit
matching. Hence the algorithm.
∗ University
of Guelph, Canada, Email: [email protected] (Corresponding Author)
British Columbia, Canada, Email: [email protected]
Ted and I dedicate this paper to the late Pal Fischer (16/11/2016) - friend, colleague and mentor.
† Kelowna,
Code the IP above so that each of the instance defining constraints is a set of two distinct components
of P {pu,i , pv,j }, interchangeably playing the role of a {0, 1} variable for which {pu,i , pv,j } = 0 if and only if
pu,i = pv,j = 0, or pu,i = 1 and pv,j = 0, or pu,i = 0 and pv,j = 1. Create an instance of the IP by creating
an instance of exclusion set E whose elements are the set of these {pu,i , pv,j }. If there exists P satisfying
{pu,i , pv,j } = 0 for all {pu,i , pv,j } ∈ E, then P is a solution of the IP. Otherwise P satisfies {pu,i , pv,j } = 1
for at least one {pu,i , pv,j } ∈ E and P is excluded from the solution set of the IP. We view elements of E as
coding precisely the set of permutation matrices excluded from the solution set of the IP. That is, E excludes
the union of sets of (n − 2)! P , each set satisfying {pu,i , pv,j }=1, for each {pu,i , pv,j } ∈ E. An example of
the modelling technique needed to create E is presented in section 4, originally presented in [9]. We exclude
these permutation matrices by setting {pu,i , pv,j } = 0 for each {pu,i , pv,j } ∈ E.
The complement of exclusion set E, with respect to all {pu,i , pv,j } is called available set V . The IP is
feasible if and only if there exists P whose set of n(n−1)
distinct pairs of components {pu,i , pv,j } that satisfy
2
pu,i = pv,j = 1 and define P are in V . P is said to be covered by V if there exists a subset of n(n−1)
2
{pu,i , pv,j } ∈ V such that pu,i = pv,j = 1 defines P and each {pu,i , pv,j } participates in P ’s cover.
Definition 2.1. Clos(E) (closed exclusion set E) is the set of all {pu,i , pv,j } not participating in any
cover of any P .
Note that {pu,i , pv,j } ∈ E is code for the set of (n − 2)! permutation matrices for which pu,i = pv,j = 1.
Clearly if clos(E) is such that all n! permutation matrices are accounted, then there is no P covered by V
i.e. V is empty.
Definition 2.2. Open(V ) (open available set V ) is the complement of clos(E) w.r.t. all {pu,i , pv,j },
the set of all {pu,i , pv,j } participating in a cover of at least one P .
Theorem 2.1.
P The IP is infeasible if and only if open(V ) = ∅.
System 1: P i pu,i = 1, u = 1, 2, ..., n
u pu,i = 1, i = 1, 2, ..., n
F or
Pall u, i = 1, 2, ..., n
Pj6=i {pu,i , pv,j } = pu,i , v = 1, 2, ..., n, v 6= u.
v6=u {pu,i , pv,j } = pu,i , j = 1, 2, ..., n, j 6= i.
{pu,i , pv,j } ∈ E ⇒ Assign {pu,i , pv,j } = 0.
pu,i , {pu,i , pv,j } ∈ {0, 1}
Visualize system 1 in the form of n2 xn2 permutation matrix Q, n2 blocks of P . Block (u, i) contains
pu,i in position (u, i), the remaining entries in row u and column i being zero. The rest of the entries in
block (u, i) have the form {pu,i , pv,j }, v 6= u, j 6= i. It’s assumed variables in Q have been initialized by E.
Henceforth, we present the algorithm in terms of matrix Q. See Figure 2.1, an example of the general form
of matrix Q for n = 4. For E = ∅, the set of n! nxn permutation matrices each written as a Q matrix i.e. in
n2 xn2 block form, is the set of integer extrema of the solution set of system 1§ . See Figure 2.2, an example
of an integer solution to system 1 in matrix Q form, for n = 4.
p
11
0
0
0
0
p
21
0
0
0
0
p31
0
0
0
0
p41
0
p12
0
0
0
0
p13
0
0
0
0
p14
0
0
0
{p11 p22 } {p11 p23 } {p11 p24 } {p12 p21 } 0 {p12 p23 } {p12 p24 } {p13 p21 } {p13 p22 } 0 {p13 p24 } {p14 p21 } {p14 p22 } {p14 p23 } 0
{p11 p32 } {p11 p33 } {p11 p34 } {p12 p31 } 0 {p12 p33 } {p12 p34 } {p13 p31 } {p13 p32 } 0 {p13 p34 } {p14 p31 } {p14 p32 } {p14 p33 } 0
{p11 p42 } {p11 p43 } {p11 p44 } {p12 p41 } 0 {p12 p43 } {p12 p44 } {p13 p41 } {p13 p42 } 0 {p13 p44 } {p14 p41 } {p14 p42 } {p14 p43 } 0
{p21 p12 } {p21 p13 } {p21 p14 } {p22 p11 } 0 {p22 p13 } {p22 p14 } {p23 p11 } {p23 p12 } 0 {p23 p14 } {p24 p11 } {p24 p12 } {p24 p13 } 0
0
p22
0
0
0
0
p23
0
0
0
0
p24
0
0
0
{p21 p32 } {p21 p33 } {p21 p34 } {p22 p31 } 0 {p22 p33 } {p22 p34 } {p23 p31 } {p23 p32 } 0 {p23 p34 } {p24 p31 } {p24 p32 } {p24 p33 } 0
{p21 p42 } {p21 p43 } {p21 p44 } {p22 p41 } 0 {p42 p33 } {p22 p44 } {p23 p41 } {p23 p42 } 0 {p23 p44 } {p24 p41 } {p24 p42 } {p24 p43 } 0
{p31 p12 } {p31 p13 } {p31 p14 } {p32 p11 } 0 {p32 p13 } {p32 p14 } {p33 p11 } {p33 p12 } 0 {p33 p14 } {p34 p11 } {p34 p12 } {p34 p13 } 0
{p31 p22 } {p31 p23 } {p31 p24 } {p32 p21 } 0 {p32 p23 } {p32 p24 } {p33 p21 } {p33 p22 } 0 {p33 p24 } {p34 p21 } {p34 p22 } {p34 p23 } 0
0
0
0
0
p32
0
0
0
0
p33
0
0
0
0
p34
{p31 p42 } {p31 p43 } {p31 p44 } {p32 p41 } 0 {p32 p43 } {p32 p44 } {p33 p41 } {p33 p42 } 0 {p33 p44 } {p34 p41 } {p34 p42 } {p34 p43 } 0
{p41 p12 } {p41 p13 } {p41 p14 } {p42 p11 } 0 {p42 p13 } {p42 p14 } {p43 p11 } {p43 p12 } 0 {p43 p14 } {p44 p11 } {p44 p12 } {p44 p13 } 0
{p41 p22 } {p41 p23 } {p41 p24 } {p42 p21 } 0 {p42 p23 } {p42 p24 } {p43 p21 } {p43 p22 } 0 {p43 p24 } {p44 p21 } {p44 p22 } {p44 p23 } 0
{p41 p32 } {p41 p33 } {p41 p34 } {p42 p31 } 0 {p42 p33 } {p42 p34 } {p43 p31 } {p43 p32 } 0 {p43 p34 } {p44 p31 } {p44 p32 } {p44 p33 } 0
0
0
0
0
p42
0
0
0
0
p43
0
0
0
0
p44
Fig. 2.1. General Form of Matrix Q, n = 4.
§ An
integer solution of system 1 exists if and only if it’s an nxn permutation matrix in n2 xn2 block form [7].
2
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
Fig. 2.2. An Integer Solution to System 1 in Matrix Q Form, n = 4.
3. About Triple Overlay Matching Based Closure. We first present an overview of the algorithm,
followed by the formal algorithm. Let E be given. Encode Q and create V .
3.1. Overview of the Triple Overlay Matching Based Closure Algorithm. Rather that search
for the existence of P covered by V , we attempt to shrink V so that {pu,i , pv,j } ∈ V if and only if {pu,i , pv,j }
participates in a cover of at least one P . The algorithm deduces which {pu,i , pv,j } ∈ V do not participate in
any cover of any P , removes them from V , and adds them to E. Its success depends upon whether or not
it’s true that for infeasible IPs, when we initialize Q via E, it’s sufficient to deduce open(V ) = ∅¶ . While
it’s impossible for a feasible IP to yield open(V ) = ∅, infeasible IPs cause the algorithm to either deduce
infeasibility or exit undecided. We say undecided because although we deduce some of these {pu,i , pv,j } ∈ V
that do not participate in any cover of any P , it’s not known if we deduce all of these {pu,i , pv,j }. Brief
details about how the algorithm deduces variables at zero level in every solution of the IP now follow.
The algorithm systematically tests a set of necessary conditions assuming a feasible IP each time a qu,i,v,j
is set at unit level. That is, if pu,i = pv,j =1, blocks (u, i) and (v, j) are assumed to cover a match, a necessary
condition for the existence of a n2 xn2 block permutation matrix solution of the IP. But rather than test for
a match covered by these two blocks, we exhaust all choices of a third variable common to these blocks, set
at unit level, and test for the existence of a match covered by all three blocks. After exhausting all possible
choices of a third‡‡ variable, if no match exists, the given qu,i,v,j variable is deduced zero. Otherwise we
conclude nothing. In both cases we continue on to the next variable not yet deduced zero. Eventually no
more variables can be deduced zero, none of the constraints appear violated and the IP is undecided; or
enough of the variables are deduced zero such that a constraint is violated and the IP is infeasible.
3.2. The Triple Overlay Matching Based Closure Algorithm. Interchangeably associate matrix
Q with a {0, 1} matrix that has entries at zero level where matrix Q has entries at zero level, and unit entries
where matrix Q has pu,i or {pu,i , pv,j } entries. We’ll now reference {0, 1} variables qu,i,u,i and qu,i,v,j . A unit
entry in the uth row and ith column of non-empty block (u, i) represents variable pu,i . The remaining unit
entries in the v th row and j th column of block (u, i) with u 6= v and i 6= j can be regarded as representing
pv,j variables (which is what they really do represent in the case of a {0, 1} solution) and, they can also be
regarded as representing {pu,i , pv,j } variables. We think of this associated matrix in terms of patterns in Q
that cover n2 xn2 block permutation matrices, and then we’ll exploit matching.
Definition 3.1. Match(*) is a logical function. Input * is an nxn {0, 1} matrix. Row labels are viewed
as vertices 1 through n (set A), and column labels are viewed as vertices n + 1 through 2n (set B). Match(*)
¶ In earlier work [12], we create an equivalence class, the set of all possible V ’s none of which cover any P , whose class
representative is ∅.
‡‡ Hence the term triple overlay. Every variable not deduced zero participates in a match in an overlay of three blocks of
Q. There exists quadrupal, quintuple overlay through to exhaustion where the algorithm tests factorial numbers of n (n − 2 is
sufficient) overlays for a match.
3
returns TRUE if there exists a match between A and B. Otherwise Match(*) returns FALSE.
Definition 3.2. Overlay(*1 ,*2 ) is a binary AND function applied component-wise to two nxn {0, 1}
matrices. Its output is a {0, 1} matrix. We loosely use the terms double and triple overlay in place of
Overlay(*1 ,*2 ) and Overlay(Overlay(*1 ,*2 ),*3 ) etc.
Definition 3.3. Check RowsColumns Q is a routine that returns TRUE if a row or column in matrix Q is all 0, in which case the algorithm terminates and the graph is deduced infeasible. Otherwise
Check RowsColumns Q returns FALSE. In our FORTRAN implementation of the algorithm, before testing
for termination, we also implement Boolean closure within and between blocks in Q. This efficiently deduces
some of the non-zero components of Q to be at zero level and we note significant speed increases.
Note that Boolean closure in Check RowsColumns Q can be replaced by LP. Temporarily set a nonzero component of matrix Q to unit level and check for infeasibility subject to doubly stochastic constraints
of matrix Q. Infeasibility implies that the component can be set to zero level.
Whenever the algorithm exits undecided, then for every non-zero qu,i,v,j , there exists a match in a triple
overlay of blocks (u, i), (v, j) and at least one (w, k) block. The IP is then not deduced infeasible and we call
the corresponding matrix Q the non-empty triple overlay closure of the IP. Otherwise the algorithm exits
and the IP is deduced infeasible i.e. open(V ) is deduced to be empty.
Input: {open(V ) ← V , Q}
Output: {open(V ), decision}
if Check RowsColumns Q EXIT {open(V ), infeasible};
CONTINUE TRIPLE CLOSURE;
oldQ ← Q;
for u, i = 1, 2, ..., n; and qu,i,u,i 6= 0 do
if ˜Match(Q(u, i)) then
qu,i,u,i ← 0;
for v, j = 1, 2, ..., n; and u 6= v and i 6= j and qu,i,v,j 6= 0 do
qu,i,v,j ← 0; qv,j,u,i ← 0; open(V ) ← open(V )\{pu,i , pv,j }\{pv,j , pu,i };
end
if Check RowsColumns Q EXIT {open(V ), infeasible};
⇒ NEXT i ;
end
for v, j = 1, 2, ..., n; and u 6= v and i 6= j and Q(u, i)v,j 6= 0 do
if ˜Match(Overlay(Q(u, i), Q(v, j))) then
qu,i,v,j ← 0; qv,j,u,i ← 0; open(V ) ← open(V )\{pu,i , pv,j }\{pv,j , pu,i };
⇒ NEXT j ;
end
DoubleOverlay ← Overlay(Q(u, i), Q(v, j));
TRIPLE CLOSURE;
for w, k = 1, 2, ..., n; and u 6= w 6= v, i 6= k 6= j and DoubleOverlayw,k 6= 0 do
if ˜Match(Overlay(DoubleOverlay, Q(w, k))) then
DoubleOverlay w,k ← 0;
⇒ TRIPLE CLOSURE;
end
end
if ˜Match(DoubleOverlay) then
qu,i,v,j ← 0; qv,j,u,i ← 0; open(V ) ← open(V )\{pu,i , pv,j }\{pv,j , pu,i };
end
end
end
if oldQ 6= Q ⇒ CONTINUE TRIPLE CLOSURE;
EXIT {open(V ), undecided};
Algorithm 1: The Triple Overlay Matching Based Closure Algorithm
4
4. Application to the HCP. Let G be an n + 1 vertex graph also referenced by its adjacency matrix.
We model the HCP for simple, connected 3-regular graphs, as do others [5, 10, 3], called the 3HCP.
4.1. Background Information and Classification of 3-Regular Graphs. The 3HCP is a well
known decision problem and is NP-complete [6]. G is 3-colourable (edge) if G is Hamiltonian, and since
3-regular graphs are either 3 or 4-colourable, it follows that if G is 4-colourable then G is non-Hamiltonian.
These graphs were initially studied by Peter Tait in the 1880s (named Snarks by Martin Gardner in 1976).
Tait conjectured (1884) that every 3-connected, planar, 3-regular graph has a Hamilton cycle, later disproved
by Tutte in 1946 via construction of a 46 vertex counterexample. This was a significant conjecture, and had
it been true, it implied the famous 4-colour theorem. These ideas are summarized in the figure below.
All Simple, Connected, 3-Regular Graphs
Hamiltonian Graphs
3-Colourable
non-Hamiltonian Graphs
non-Snarks
3-Colourable
Tutte’s Counterexample
Snarks
4-Colourable
Fig. 4.1. Classification of Simple, Connected, 3-Regular Graphs
4.2. The Matching Model of the HCP. Regard paths of length n + 1 that start and stop at the
same vertex and pass through every vertex, as directed graphs on n + 1 vertices. For undirected graphs,
every cycle is accompanied by a counter-directed companion cycle. No matter that G is Hamiltonian or nonHamiltonian, assign vertex n + 1 as the origin and terminal vertex for all cycles, and assign each directed
Hamilton cycle to be in correspondence with each nxn permutation matrix P where pu,i = 1 if and only if
the ith arc in a cycle enters vertex u. We encode each cycle as a permutation of vertex labels. For example,
the path sequence {6,2,4,3,5,1,6} is code for the first arc enters vertex 2, the second arc enters vertex 4
and so on. Since pn+1,n+1 = 1 for all cycles by definition, it’s sufficient to code cycles as nxn permutation
matrices. Note that an arc is directed, and an edge is undirected i.e. the pair of arcs (u, i) & (i, u) is the
edge (u, i). Unless otherwise stated, all graphs are simple, connected and 3-regular.
We next encode graph instance G by examining G’s adjacency matrix, adding to E all pairs of components of P , {pu,i , pv,j } that encode paths of length j − i (j > i) from vertex u to vertex v in cycles not in G.
This encodes precisely the set of cycles not in G i.e. every cycle not in G uses at least one arc not in G.
See the algorithm (How to Initialize Exclusion Set E) below and recall that G is connected. For arc
(u, v) not in G we can assign {pu,i , pv,i+1 } ∈ E. But we also compute additional {pu,i , pv,i+m } whenever it’s
possible to account for no paths of length m in G, from vertex u to vertex v. We do this by implementing
Dijkstras algorithm with equally weighted arcs to find minimal length paths between all pairs of vertices,
coded to return m = n + 1 if no path exists. We account for all paths of length one not in G (arcs not in
G), and, all paths of length two not in G by temporarily deleting the arc between adjacent vertices.
Begin as follows. If u is adjacent to v then temporarily delete arc (u,v) and apply Dijkstras algorithm to
discover a minimal path of length m > 1, a simple ‘speed-up’. No paths of length k can exist, k = 1, ..., m − 1
and {pu,i , pv,i+k } are discovered that 1) for k = 1 and u not adjacent to v correspond with arcs in cycles not
in G, and 2) for k > 1 correspond with paths of length k in cycles not in G. Accounting for all arcs not in G
is sufficient to model precisely all cycles not in G, and we account for paths in cycles not in G to bolster E.
Two special cases arise. Case 1. Last arc in cycle: Recall that every n + 1th arc in a cycle enters vertex
n + 1 by definition. Therefore observe arcs (u,n + 1) not in G, temporarily deleted or otherwise, noting
how corresponding sets of cycles not in G can be encoded by permutation matrices for which the nth arc
in a cycle enters vertex u i.e. pu,n = 1. This is the case for k=1, and u not adjacent to v when Dijkstras
algorithm returns m = 2. If Dijkstras algorithm returns m = 3, then again for k=1 and if u is not adjacent
to v set pu,n = 1, and for k=2, no paths of length two exist and these sets of cycles not in G can be encoded
by permutation matrices for which the n − 1th arc in a cycle enters vertex u i.e. pu,n−1 = 1. Continuing in
5
this way, encode all possible n + 1 − k th arcs in cycles not in G, in paths of length k not in G, to enter vertex
u i.e. pu,n+1−k = 1, k = 1, 2, ..., m − 1. Case 2. First arc in cycle: Recall every first arc in every cycle exits
vertex n + 1. Observe and code all arcs (n + 1,v) in cycles not in G, in paths of length k not in G by coding
all possible k th arcs to enter vertex v i.e. pv,k =1, k = 1, 2, ..., m − 1.
For the general case, an exclusion set can be constructed by noting that a cycle not in G uses at least
one arc not in G e.g. (u, v). The complete set of permutation matrices corresponding to these cycles not
in G are characterized by {{pu,l , pv,l+1 }, l = 1, 2, ..., n − 1}, added to E. By indexing l, arc (u, v) can play
the role of (n-1) sequence positions in disjoint sets of cycles not in G. Considering all O(n2 ) arcs not in G,
each playing the role of all O(n) possible sequence positions, it’s possible to construct the set of permutation
matrices corresponding to the set of cycles not in G accounted by the union of O(n3 ) {pu,l , pv,l+1 }, added to
E. We generalize this idea via Dijkstras algorithm and account for some sets of paths of length k not in G.
Recall that G is strongly connected. But if an arc is temporarily deleted, it’s possible for no path to
exist between a given pair of vertices. This useful information indicates that an arc is essential under the
assumption of the existence of a Hamilton cycle that uses this arc. In case 1, this implies that a particular
pu,n is necessary, and by integrality must be at unit level in every assignment of variables, assuming the graph
is Hamiltonian (until deduced otherwise, if ever). Thus all other P ’s in the same row (and column) can be
set at zero level. This is accounted for when we initialize E. Recall that m = n + 1 in the case that Dijkstras
algorithm returns no minimal path. The k loop appends the necessary set of {pv,j , pu,n+1−k } to E effectively
setting variables in blocks (u,1,) through (u,n − 1) at zero level. When implemented in the algorithm, pu,n
must attain unit level via double stochastity, and this implies that the other P ’s in the same column are
deduced to be at zero level. Similarily for Case 2. In the general case, it’s also possible for no path to exist
between a given pair of vertices (u,v) (when an arc is temporarily deleted). Under the assumption of the
existence of a Hamilton cycle, this arc is essential and can play the role of sequence position 2 through n-1
and so in each case, all complementary row (and column) {pu,i , pv,j } are assigned to E. When implemented,
a single {pu,i , pv,j } variable remains in each row and therefore is equated with that block’s pu,i variable via
‘scaled’ double stochastity within the block i.e. rows and columns in the block sum to pu,i . Complementary
{pu,i , pv,j } variables in the corresponding column are therefore set 0 in each block. Thus essential arcs also
contribute to new information by adding their complementary row / column {pu,i , pv,j } to E.
Finally, encode E into matrix Q i.e. assign qu,i,v,j = 0 for each {pu,i , pv,j } ∈ E, and then create V .
6
Input: {Arc Adjacency matrix for G}
Output: {E}
E ← ∅;
Case 1: for u = 1, 2, ..., n do
Arc ← G(u, n + 1); G(u, n + 1) ← 0; m ← DijkstrasAlgorithm(G,u,n + 1);
for k = Arc + 1, Arc + 2, ..., m − 1 do
E ← E ∪ {pv,j , pu,n+1−k }, v = 1, 2, ..., n, v 6= u; j = 1, 2, ..., n, j 6= n + 1 − k;
end
G(u, n + 1) ← Arc;
end
Case 2: for v = 1, 2, ..., n do
Arc ← G(n + 1, v); G(n + 1, v) ← 0; m ← DijkstrasAlgorithm(G,n + 1,v);
for k = Arc + 1, Arc + 2, ..., m − 1 do
E ← E ∪ {pv,k , pu,i }, u = 1, 2, ..., n, u 6= v; i = 1, 2, ..., n, i 6= k;
end
G(n + 1, v) ← Arc;
end
General Case. for u = 1, 2, ..., n do
for v = 1, 2, ..., n; v 6= u do
Arc ← G(u, v); G(u, v) ← 0; m ← DijkstrasAlgorithm(G,u,v);
for k = Arc + 1, Arc + 2, ..., m − 1 do
E ← E ∪ {pu,l , pv,l+k }, l = 1, 2, ..., n − k;
end
G(u, v) ← Arc;
end
end
EXIT {E} ;
Algorithm 2: How to Initialize Exclusion Set E
5. Empirical Results and Two Conjectures. Table 5.1 below lists some details of 25 applications
(all 3-regular graphs) of the algorithm. Table 5.2 below lists some details of 20 applications (mostly 3regular graphs) of an earlier version of the matching based closure algorithm called the WCA∗∗ [12] (a
subset from over 2,100 applications). For both algorithms, all of the graphs are decided non-Hamiltonian
and no application of either algorithm to any other graphs failed that are not reported.
5.1. Empirical Results. In both tables, heading # pu,i (|V |) is the count of non-zero pu,i variables
and the size of initial available set V (the number of non-zero qu,i,v,j components in Q) after initializing E,
before implementing the algorithm. Note pu,i = qu,i,u,i . We only count qu,i,v,j i < j (distinct qu,i,v,j ).
In Table 5.2, heading |open(V )| ≤ refers to an upper bound on |open(V )| for 11 selected graphs, each
modified to include the cycle 1 − 2 − ... − n − (n + 1) − 1, simply to observe open(V ). Two of these graphs
are also hypohamiltonian. The count in parentheses is an upper bound on |open(V )| after removing a vertex
and re-running the WCA.
5.2. Two Conjectures.
2
2
distinct {pu,i , pv,j } ∈ E exists
Conjecture 5.1. Polynomial sized proof of membership of all n (n−1)
2
for all simple, connected, 3-regular, non-Hamiltonian graphs.
Conjecture 5.2. Triple overlay matching based closure deduces open(V ) = ∅ for all simple, connected,
3-regular, non-Hamiltonian graphs.
∗∗ The
WCA is a breadth-first closure, exhausting the middle v, j loop before returning to label CONTINUE TRIPLE
CLOSURE. It’s followed by triple closure, also applied breadth-first, exhausting the interior w, k loop before returning to label
TRIPLE CLOSURE. Many more applications of Boolean closure across all of Q at many more intermediate steps are also
implemented, unlike triple overlay matching based closure as we have presented (although these checks can also be included).
Block overlays are also restricted to be of the form Q(u, i) and Q(v, j), i < j. In this way we can solve problems in the 50-100
vertex range. The WCA is designed to be parallelized, and the FORTRAN code is written for distributed computing.
7
Table 5.1
Applications of the Triple Overlay Matching Based Closure Algorithm
Name of Graph
# Vertices (All 3-Regular Graphs)
# pu,i (|V |)
10
12, 20, 28
12
18, 26
18
22
24
26
26
26
28
30
57 (858)
87 (2,199), 271 (26,380), 567 (126,128)
87 (2,257)
223 (16,630), 495 (88,968)
219 (16,262)
345 (43,719)
419 (65,711)
≈ 500 (≈ 1, 000, 000)
497 (89,188)
505 (96,175), 509 (95,543)
583 (129,018)
691 (187,398)
Petersen Snark
3 Flower Snarks
Tietzs Snark
2 Blanusa Snarks
House of Graphs[1]
A Loupekine Snark
A Goldberg Snark
10 House of Graphs[1]
Jan Goedgebeur Snark
2 Celmins-Swart Snarks
House of Graphs[1]
A Double Star Snark
Table 5.2
Applications of A Matching Based Closure Algorithm (WCA) [12]
Name of Graph
Petersen Snark
Herschel Graph
A Kleetope
1
Matteo[4]††
1
Coxeter
House of Graphs #3337 Snark[1]
Zamfirescu Snark
1
Barnette-Bosk-Lederberg††
1
A Hypohamiltonian
1
Tutte††
A Grinberg Graph
1
Georges††
Szekeres Snark
Watkins Snark
1
Ellingham-Horton
Thomassen
Meredith
A Flower Snark
1
Horton††
A Goldberg Snark
# Vertices (Edges)
# pu,i (|V |)
|open(V )| ≤
10 (15)
11 (18)
14 (36)
20 (30)
28 (42)
34 (51)
36 (54)
38 (57)
45 (70)
46 (69)
46 (69)
50 (75)
50 (75)
50 (75)
54 (81)
60 (99)
70 (140)
76 (114)
96 (144)
104 (156)
57 (858)
No 2-Factor
147 (8,166)
275 (26,148)
597 (136,599)
897 (308,234)
983 (363,987)
1077 (440,318)
1,656 (1,109,738)
1,649 (1,060,064)
1,737 (1,204,722)
2037 (1,701,428?)
2045 (1,718,336)
2051(1,708,987)
2,315 (2,135,948)
3,105 (4,071,600)
4,221 (7,526,996)
4,851 (9,720,420)
8,205 (29,057,118)
9,339 (37,802,124)
792
1,980
5,809
27,093
135,453(1,241)2
335,697
7,749
96,834
296,668 (29,724)2
382,400
- Not run yet - Not run yet - Not run yet - Not run yet 1,045,041
- Not run yet - Not run yet - Not run yet - Not run yet - Not run yet -
1
Simple, connected, 3-regular, and 3-colourable.
2
Hypohamiltonian. Confirmed existence of non-empty open(V ) after removing a vertex and re-running the WCA.
†† Historical Note: Ignoring the planarity condition on Tait’s conjecture, the Matteo graph [4] is the smallest non-planar
counterexample, while the Barnette-Bosk-Lederberg graph [13] is the smallest planar, 3-colourable, 3-connected counterexample to Tait’s conjecture (Tutte’s graph is a larger counterexample). We also note that the Georges graph is the smallest
counterexample to Tutte’s conjecture, and Horton’s graph was the first counterexample to Tutte’s conjecture.
8
6. Discussion.
6.1. About Practical Generalizations of the Algorithm. The algorithm can be designed to invoke
arbitrary levels of overlay i.e. adaptive strategies that change the level of overlay if more depth is desired
/ needed to deduce variables at zero level. But in order to make use of increased overlay, it’s necessary to
add more variables to retain information about tests for matching. For example, if we create a quadrupal
overlay version of the algorithm, we then introduce {0, 1} {pu,i , pv,j , pw,k } variables and redefine system 1
and matrix Q in terms of triply nested Birkhoff polyhedra. See the discussion in [7] for a description of these
polyhedra as feasible regions of LP formulations (relaxed IPs). There exists a sequence of feasible regions in
correspondence with increasing levels of nested Birkhoff polyhedra whose end feasible region is the convex
hull of the set of integer extrema of system 1. See [2] for a discussion of facet-inducing inequalities.
The term closure has so far been reserved for deducing variables added to E by invoking the algorithm.
But other polynomial time techniques can be used to deduce variables at zero level. For example, prior to
matching, we could implement LP and maximize each variable in system 1, and if its maximum is less than
unit level, the variable can be set zero. In our implementation, we use Boolean closure. See [12] for more
details. We also note there exist entire conferences devoted to Matching Under Preferences [11]. Perhaps
many more innovative heuristics exist and can be included in the algorithm.
The algorithm is designed for parallel processing. Each qu,i,v,j variable not yet deduced zero can be
tested independent of the others by making a copy of matrix Q and implementing the algorithm. If an
independent process deduces a qu,i,v,j variable at zero level, simply update the corresponding qu,i,v,j variable
in each Q across all processes.
For some applications, there exist model specific dependencies between variables i.e. undirected HCP
implies {pu,i , pv,j } = 0 if and only if {pu,n+1−i , pv,n+1−j } = 0. In this way we account for companion cycles.
6.2. About Study of the Algorithm. Exclusion set E is the focus of study. We propose to classify
different E by the pattern that remains in matrix Q after exit from the algorithm (up to isomorphism) i.e.
Q covers the set of all possible solutions to the IP. It would be useful to know what kinds of E cause the
algorithm to generate Q as a minimal cover, since it then follows that the algorithm would decide feasibility
of the IP. Even if there exist classes of E for which infeasible IPs provably exit the algorithm infeasible, no
matter that Q is or is not a minimal cover, it still follows that the algorithm decides feasibility of the IP.
We plan to investigate counterexamples via the matching model for HCP. Graph C7-21 (not 3-regular)
fails an earlier version of the algorithm [12]. We will convert [3] C7-21 and study it as instance of 3HCP.
6.3. Two More Matching Model Applications for Input to the Algorithm. We now present two
more matching models as applications for the algorithm‡‡ . Q’s components no longer have the interpretation
as sequenced arcs in a cycle. Instead, let Q be an m2 xm2 block permutation matrix, whose blocks are mxm
permutation matrices P . We note from [7] that F is a subgraph of G if and only if there exists permutation
matrix P such that P T GP covers F (and we add) if and only if Q·g covers f, where f and g are column vectors
of adjacency matrices F and G formatted as {F (1, 1), F (1, 2), ..., F (1, m), F (2, 1), F (2, 2), ..., F (m, m)} and
{G(1, 1), G(1, 2), ..., G(1, m), G(2, 1), G(2, 2), ..., G(m, m)}.
We now model both the graph and subgraph isomorphism decision problems as matching models, the
single difference being that in the case of graph isomorphism, more information appears to be added to
E. First note that Q · g covers f means Q · g is required to place ones in the same positions as those of
f. So for each of these equations, a subset of row components sum to one implying that the complement
row components must therefore all be set at zero level. Add them to E. This completes the subgraph
isomorphism matching model and only part of the graph isomorphism model. For graph isomorphism, cover
means equality. The remaining equations to be satisfied are those for which Q · g is required to place zeroes
in the same positions as those of f. So for each of these equations, a subset of row components sum to zero
implying that these row components must therefore all be set at zero level. Add them to E. This completes
the graph isomorphism matching model.
6.4. Other Applications of the Algorithm. We originally intended for the algorithm to decide
feasibility of a matching model. When it decides infeasibility, the algorithm has served its purpose. Otherwise
it’s not known if the model is feasible or infeasible. We note that open(V ) is a refined cover of possible
solutions to the IP and we believe that this is useful. We propose that the algorithm can be developed as
‡‡ See
[8] for more information about these modelling techniques.
9
part of other search based algorithms, either to provide refined information prior to a search, or incorporated
and updated alongside a search based algorithm to provide more information during a search.
There is one last thought about an academic use for the algorithm. Suppose we are given a correctly
guessed infeasible IP, and the algorithm exits undecided. We can attribute the failure to E as lacking the
necessary / right kind of {pu,i , pv,j } that could induce closure. We could then theoretically augment E
with additional {pu,i , pv,j } until we deduce infeasibility, and discover extra information needed to generate
open(V ) = ∅. So for application, when the algorithm gets stuck and open(V ) 6= ∅, simply augment E with
additional {pu,i , pv,j } ∈ open(V ), and test if open(V ) becomes empty. While it might be difficult to guess
minimal sized sets of additional {pu,i , pv,j }, if they can be guessed, we will then have articulated what critical
information is needed to solve the problem. Of course it’s not known if these additional {pu,i , pv,j } can be
efficiently computed or validated as members in E. See conjecture 5.1.
7. Acknowledgements and Dedication. Thank you to: Adrian Lee for preparing and running some
of the examples presented in Tables 5.1 and 5.2; Nicholas Swart for testing and implementing 2000 31-vertex
non-Hamiltonian graphs in 2013; Catherine Bell for suggestions and contributions early on in this project.
We dedicate this paper to the late Pal Fischer (16/11/2016). For Ted, Pal was a colleague, co-author
and friend. For myself (Gismondi), Pal taught me analysis, an understanding of convex polyhedra, and later
became a colleague. Ted and I both already miss him very much.
REFERENCES
[1] G. Brinkmann, K. Coolsaet, J. Goedgebeur, and H. Melot, House of Graphs: a database of interesting graphs,
Discrete Applied Mathematics. Available at http://hog.grinvin.org, 161 (2013), pp. 311–314.
[2] M. Demers and S.J. Gismondi, Enumerating facets of Q0/1 , Util. Math., 77 (2008), pp. 125–134.
[3] V. Ejov, M. Haythorpe, and S. Rossomakhine, A Linear-size Conversion of HCP to 3HCP, Australasian Journal of
Combinatorics, 62 (2015), pp. 45–58.
[4] Mathematics Stack Exchange, graph6 string:
Sspp?wc g ?w?o???i???ag?bo?g. Retrieved May 7, 2016,
http://math.stackexchange.com/questions/367671/smallest-nonhamiltonian-3-connected-graph-with-chromatic-index-3,
(2016).
[5] J.A. Filar, M. Haythorpe, and S. Rossomakhine, A new heuristic for detecting non-hamiltonicity in cubic graphs,
Computers & Operations Research, 64 (2015), pp. 283–292.
[6] M.R. Gary, D.S. Johnson, and R.E. Tarjan, The planar hamilton circuit problem is np-complete, SIAM J. Comput.,
5 (1976), pp. 704–714.
[7] S.J. Gismondi, Subgraph isomorphism and the Hamilton tour decision problem using a linearized form of P GP t , Util.
Math., 76 (2008), pp. 229–248.
[8]
, Modelling decision problems via birkhoff polyhedra, Journal of Algorithms and Computation, 44 (2013), pp. 61–81.
[9] S.J. Gismondi and E.R. Swart, A model of the coNP-complete non-Hamilton tour decision problem, Math. Prog. Ser.
A, 100 (2004), pp. 471–483.
[10] M. Haythorpe, FHCP challenge set. Retrieved July 16, 2016, http://fhcp.edu.au/fhcpcs, (2015).
[11] Microsoft Research Lab. New England, Match-up 2017, Cambridge, MA, USA, https://www.microsoft.com/enus/research/event/match-up-2017/, (2017).
[12] E.R. Swart, S.J. Gismondi, N.R. Swart, C.E. Bell, and A. Lee, Deciding graph non-hamiltonicity via a closure
algorithm, Journal of Algorithms and Computation, 48 (2016), pp. 1–35.
[13] Wolfram
Math
World,
Barnette-bosk-lederberg
graph.
Retrieved
May
7,
2016,
http://mathworld.wolfram.com/Barnette-Bosak-LederbergGraph.html, (2016).
10
| 8cs.DS
|
arXiv:1706.05744v2 [cs.LG] 4 Nov 2017
Learning Hierarchical Information Flow
with Recurrent Neural Modules
Danijar Hafner ∗
Google Brain
[email protected]
Alex Irpan
Google Brain
[email protected]
James Davidson
Google Brain
[email protected]
Nicolas Heess
Google DeepMind
[email protected]
Abstract
We propose ThalNet, a deep learning model inspired by neocortical communication
via the thalamus. Our model consists of recurrent neural modules that send features
through a routing center, endowing the modules with the flexibility to share features
over multiple time steps. We show that our model learns to route information
hierarchically, processing input data by a chain of modules. We observe common
architectures, such as feed forward neural networks and skip connections, emerging
as special cases of our architecture, while novel connectivity patterns are learned
for the text8 compression task. Our model outperforms standard recurrent neural
networks on several sequential benchmarks.
1
Introduction
Deep learning models make use of modular building blocks such as fully connected layers, convolutional layers, and recurrent layers. Researchers often combine them in strictly layered or task-specific
ways. Instead of prescribing this connectivity a priori, our method learns how to route information as
part of learning to solve the task. We achieve this using recurrent modules that communicate via a
routing center that is inspired by the thalamus.
Warren McCulloch and Walter Pitts invented the perceptron in 1943 as the first mathematical model
of neural information processing [24], laying the groundwork for modern research on artificial neural
networks. Since then, researchers have continued looking for inspiration from neuroscience to identify
new deep learning architectures [11, 13, 18, 34].
While some of these efforts have been directed at learning biologically plausible mechanisms in an
attempt to explain brain behavior, our interest is to achieve a flexible learning model. In the neocortex,
communication between areas can be broadly classified into two pathways: Direct communication
and communication via the thalamus [31]. In our model, we borrow this latter notion of a centralized
routing system to connect specializing neural modules.
In our experiments, the presented model learns to form connection patterns that process input
hierarchically, including skip connections as known from ResNet [12], Highway networks [32], and
DenseNet [15] and feedback connections, which are known to both play an important role in the
neocortex and improve deep learning [7, 22]. The learned connectivity structure is adapted to the
task, allowing the model to trade-off computational width and depth. In this paper, we study these
properties with the goal of building an understanding of the interactions between recurrent neural
modules.
∗
Work done during an internship with Google Brain.
31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA.
x1
x2
x3
f1
f1
f1
f2
f2
x1
f1
f4
Φ
f3
Φ1
y4
y3
(a) Module f 1 receives the task input,
f 2 can be used for side computation, f 3
is trained on an auxiliary task, and f 4
produces the output for the main task.
f2
Φ2
f2
f3
f3
f3
y1
y2
y3
(b) Computation of 3 modules unrolled in time. One possible path of
hierarchical information flow is highlighted in green. We show that
our model learns hierarchical information flow, skip connections
and feedback connections in Section 4.
Figure 1: Several modules share their learned features via a routing center. Dashed lines are used for
dynamic reading only. We define both static and dynamic reading mechanisms in Section 2.2.
Section 2 defines our computational model. We point out two critical design axes, which we explore
experimentally in the supplementary material. In Section 3 we compare the performance of our model
on three sequential tasks, and show that it consistently outperforms multi-layer recurrent networks.
In Section 4, we apply the best performing design to a language modeling task, where we observe
that the model automatically learns hierarchical connectivity patterns.
2
Thalamus Gated Recurrent Modules
We find inspiration for our work in the neurological structure of the neocortex. Areas of the neocortex
communicate via two principal pathways: The cortico-cortico-pathway comprises direct connections
between nuclei, and the cortico-thalamo-cortico comprises connections relayed via the thalamus.
Inspired by this second pathway, we develop a sequential deep learning model in which modules
communicate via a routing center. We name the proposed model ThalNet.
2.1
Model Definition
Our system comprises a tuple of computation modules F = (f 1 , · · · , f I ) that route their respective
features into a shared center vector Φ. An example instance of our ThalNet model is shown in
Figure 1a. At every time step t, each module f i reads from the center vector via a context input cit
and an optional task input xit . The features φit = f i (cit , xit ) that each module produces are directed
into the center Φ.2 Output modules additionally produce task output from their feature vector as a
function oi (φi ) = y i .
All modules send their features to the routing center, where they are merged to a single feature vector
Φt = m(φ1t , · · · , φIt ). In our experiments, we simply implement m as the concatenation of all φi .
At the next time step, the center vector Φt is then read selectively by each module using a reading
mechanism to obtain the context input cit+1 = ri (Φt , φit ).3 This reading mechanism allows modules
to read individual features, allowing for complex and selective reuse of information between modules.
The initial center vector Φ0 is the zero vector.
2
In practice, we experiment with both feed forward and recurrent implementations of the modules f i . For
simplicity, we omit the hidden state used in recurrent modules in our notation.
3
The reading mechanism is conditioned on both Φt and φit separately as the merging does not preserve φit in
the general case.
2
y
φ1
φ2
φ3
φ4
Φ
×
x
f2
=
c
Figure 2: The ThalNet model from the perspective of a single module. In this example, the module
receives input xi and produces features to the center Φ and output y i . Its context input ci is determined
as a linear mapping of the center features from the previous time step. In practice, we apply weight
normalization to encourage interpretable weight matrices (analyzed in Section 4).
In summary, ThalNet is governed by the following equations:
Module features:
φit = f i (cit , xit )
(1)
Module output:
yti
=
(2)
Center features:
Φt
i
ct+1
=
Read context input:
=
i
o (φit )
m(φ1t , · · · , φIt )
ri (Φt , φit )
(3)
(4)
The choice of input and output modules depends on the task at hand. In a simple scenario (e.g., single
task), there is exactly one input module receiving task input, some number of side modules, and
exactly one output module producing predictions. The output modules get trained using appropriate
loss functions, with their gradients flowing backwards through the fully differentiable routing center
into all modules.
Modules can operate in parallel as reads target the center vector from the previous time step. An
unrolling of the multi-step process can be seen in Figure 1b. This figure illustrates the ability to
arbitrarily route between modules between time steps This suggest a sequential nature of our model,
even though application to static input is possible by allowing observing the input for multiple time
steps.
We hypothesize that modules will use the center to route information through a chain of modules
before producing the final output (see Section 4). For tasks that require producing an output at every
time step, we repeat input frames to allow the model to process through multiple modules first, before
producing an output. This is because communication between modules always spans a time step.4
2.2
Reading Mechanisms
We now discuss implementations of the reading mechanism ri (Φ, φi ) and modules f i (ci , xi ), as
defined in Section 2.1. We draw a distinction between static and dynamic reading mechanisms for
ThalNet. For static reading, ri (Φ) is conditioned on independent parameters. For dynamic reading,
ri (Φ, φi ) is conditioned on the current corresponding module state, allowing the model to adapt its
connectivity within a single sequence. We investigate the following reading mechanisms:
• Linear Mapping. In its simplest form, static reading consists of a fully connected layer
r(Φ, ·) = W Φ with weights W ∈ R|c|×|Φ| as illustrated in Figure 2. This approach
performs reasonably well, but can exhibit unstable learning dynamics and learns noisy
weight matrices that are hard to interpret. Regularizing weights using L1 or L2 penalties
does not help here since it can cause side modules to not get read from anymore.
• Weight Normalization. We found linear mappings with weight normalization [28] paW
rameterization to be effective. For this, the context input is computed as r(Φ, ·) = β |W
|Φ
with scaling factor β ∈ R, weights W ∈ R|c|×|Φ| , and the Euclidean matrix norm |W |.
4
Please refer to Graves [8] for a study of a similar approach.
3
Normalization results in interpretable weights since increasing one weight pushes other, less
important, weights closer to zero, as demonstrated in Section 4.
• Fast Softmax. To achieve dynamic routing, we condition the reading weight matrix on
the current module features φi . This can be seen as a form of fast weights, providing
a biologically plausible method for attention [2, 29]. We then apply softmax normalization to the computed weights so that each element of the context is computed as a
weighted average over center elements, rather than just a weighted sum. Specifically,
P|Φ|
r(Φ, φ)(j) = e(W φ+b)(j) / k=1 e(W φ+b)(jk) Φ with weights W ∈ R|φ|×|Φ|×|c| , and biases b ∈ R|Φ|×|c| . While this allows for a different connectivity pattern at each time step, it
introduces |φi + 1| × |Φ| × |ci | learned parameters per module.
• Fast Gaussian. As a compact parameterization for dynamic routing, we consider choosing each context element as a Gaussian weighted average of Φ, with only mean and variance vectors learned conditioned on φi . The context input is computed as r(Φ, φ)(j) =
f (1, 2, · · · , |Φ|)|(W φ + b)(j) , (U φ + d)(j) Φ with weights W, U ∈ R|c|×|φ| , biases
b, d ∈ R|c| , and the Gaussian density function f (x|µ, σ 2 ). The density is evaluated for each
index in Φ based on its distance from the mean. This reading mechanism only requires
|φi + 1| × 2 × |ci | parameters per module and thus makes dynamic reading more practical.
Reading mechanisms could also select between modules on a high level, instead of individual feature
elements. We do not explore this direction since it seems less biologically plausible. Moreover,
we demonstrate that such knowledge about feature boundaries is not necessary, and hierarchical
information flow emerges when using fine-grained routing (see Figure 4). Theoretically, this also
allows our model to perform a wider class of computations.
3
Performance Comparison
We investigate the properties and performance of our model on several benchmark tasks. First, we
compare reading mechanisms and module designs on a simple sequential task, to obtain a good
configuration for the later experiments. Please refer to the supplementary material for the precise
experiment description and results. We find that the weight normalized reading mechanism provides
best performance and stability during training. We will use ThalNet models with four modules of
configuration for all experiments in this section. To explore the performance of ThalNet, we now
conduct experiments on three sequential tasks of increasing difficulty:
• Sequential Permuted MNIST. We use images from the MNIST [21] data set, the pixels
of every image by a fixed random permutation, and show them to the model as a sequence
of rows. The model outputs its prediction of the handwritten digit at the last time step, so
that it must integrate and remember observed information from previous rows. This delayed
prediction combined with the permutation of pixels makes the task harder than the static
image classification task, with a multi-layer recurrent neural network achieving ~65 % test
error. We use the standard split of 60,000 training images and 10,000 testing images.
• Sequential CIFAR-10. In a similar spirit, we use the CIFAR-10 [19] data set and feed
images to the model row by row. We flatten the color channels of every row so that the
model observes a vector of 96 elements at every time step. The classification is given after
observing the last row of the image. This task is more difficult than the MNIST task, as
the image show more complex and often ambiguous objects. The data set contains 50,000
training images and 10,000 testing images.
• Text8 Language Modeling. This text corpus consisting of the first 108 bytes of the
English Wikipedia is commonly used as a language modeling benchmark for sequential
models. At every time step, the model observes one byte, usually corresponding to 1
character, encoded as a one-hot vector of length 256. The task it to predict the distribution
of the next character in the sequence. Performance is measured in bits per character (BPC)
PN
computed as − N1 i=1 log2 p(xi ). Following Cooijmans et al. [4], we train on the first
90% and evaluate performance on the following 5% of the corpus.
For the two image classification tasks, we compare variations of our model to a stacked Gated
Recurrent Unit (GRU) [3] network of 4 layers as baseline. The variations we compare are different
4
Sequential CIFAR-10 Testing
Sequential Permuted MNIST Testing
0.6
20
40
60
Epochs
80
0.45
ThalNet GRU-FF
ThalNet FF-GRU
ThalNet GRU
GRU Baseline
ThalNet FF-GRU-FF
ThalNet FF
0.40
0.35
100
Sequential Permuted MNIST Training
Bits per character (BPC)
ThalNet FF-GRU-FF
ThalNet FF-GRU
ThalNet FF
ThalNet GRU-FF
ThalNet GRU
GRU Baseline
20
40
60
Epochs
80
100
Sequential CIFAR-10 Training
1.0
0.8
0.7
ThalNet FF-GRU
ThalNet FF-GRU-FF
ThalNet GRU-FF
ThalNet FF
ThalNet GRU
GRU Baseline
0.6
0.5
20
40
60
Epochs
80
100
Accuracy (%)
0.9
0.55
0.50
GRU Baseline
ThalNet GRU
ThalNet FF-GRU
ThalNet GRU-FF
ThalNet FF-GRU-FF
ThalNet FF
0.45
0.40
20
40
60
Epochs
80
1.46
GRU (1 step)
GRU (2 steps)
ThalNet (2 steps)
1.44
1.42
1.40
10
20
30
Epochs
40
50
Text8 Language Modeling Training
0.60
100
Bits per character (BPC)
0.7
0.5
Accuracy (%)
Text8 Language Modeling Evaluation
0.50
0.8
Accuracy (%)
Accuracy (%)
0.9
1.45
1.40
1.35
1.30
1.25
1.20
ThalNet (2 steps)
GRU (1 step)
GRU (2 steps)
10
20
30
Epochs
40
50
Figure 3: Performance on the permuted sequential MNIST, sequential CIFAR, and text8 language
modeling tasks. The stacked GRU baseline reaches higher training accuracy on CIFAR, but fails to
generalize well. On both tasks, ThalNet clearly outperforms the baseline in testing accuracy. On
CIFAR, we see how recurrency within the modules speeds up training. The same pattern is shows for
the text8 experiment, where ThalNet using 12M parameters matches the performance of the baseline
with 14M parameters. The step number 1 or 2 refers to repeated inputs as discussed in Section 2. We
had to smooth the graphs using a running average since the models were evaluated on testing batches
on a rolling basis.
choices of feed-forward layers and GRU layers for implementing the modules f i (ci , xi ): We test with
two fully connected layers (FF), a GRU layer (GRU), fully connected followed by GRU (FF-GRU),
GRU followed by fully connected (GRU-FF), and a GRU sandwiched between fully connected layers
(FF-GRU-FF).5 For all models, we pick the largest layer sizes such that the number of parameters does
not exceed 50,000. Training is performed for 100 epochs on batches of size 50 using RMSProp [33]
with a learning rate of 10−3 .
For language modeling, we simulate ThalNet for 2 steps per token, as described in Section 2 to allow
the output module to read information about the current input before making its prediction. Note
that on this task, our model uses only half of its capacity directly, since its side modules can only
integrate longer-term dependencies from previous time steps. We run the baseline once without extra
steps and once with 2 steps per token, allowing it to apply its full capacity once and twice on each
token, respectively. This makes the comparison a bit difficult, but only by favouring the baseline.
This suggests that architectural modifications, such as explicit skip-connections between modules,
could further improve performance.
The Text8 task requires larger models. We train ThalNet with 4 modules of a size 400 feed forward
layer and a size 600 GRU layer each, totaling in 12 million model parameters. We compare to
a standard baseline in language modeling, a single GRU with 2000 units, totaling in 14 million
parameters. We train on batches of 100 sequences, each containing 200 bytes, using the Adam
optimizer [17] with a default learning rate of 10−3 . We scale down gradients exceeding a norm of 1.
Results for 50 epochs of training are shown in Figure 3. The training took about 8 days for ThalNet
with 2 steps per token, 6 days for the baseline with 2 steps per token, and 3 days for the baseline
without extra steps.
Figure 3 shows the training and testing and training curves for the three tasks described in this section.
ThalNet outperforms standard GRU networks in all three tasks. Interestingly, ThalNet experiences a
5
Note that the modules require some amount of local structure to allow them to specialize. Implementing the
modules as a single fully connected layer recovers a standard recurrent neural network with one large layer.
5
much smaller gap between training and testing performance than our baseline – a trend we observed
across all experimental results.
On the Text8 task, ThalNet scores 1.39 BPC using 12M parameters, while our GRU baseline scores
1.41 BPC using 14M parameters (lower is better). Our model thus slightly improves on the baseline
while using fewer parameters. This result places ThalNet in between the baseline and regularization
methods designed for language modeling, which can also be applied to our model. The baseline
performance is consistent with published results of LSTMs with similar number of parameters [20].
We hypothesize the information bottleneck at the reading mechanism acting as an implicit regularizer
that encourages generalization. Compared to using one large RNN that has a lot of freedom of
modeling the input-output mapping, ThalNet imposes local structure to how the input-output mapping
can be implemented. In particular, it encourages the model to decompose into several modules that
have stronger intra-connectivity than extra-connectivity. Thus, to some extend every module needs to
learn a self-contained computation.
4
Hierarchical Connectivity Patterns
Using its routing center, our model is able to learn its structure as part of learning to solve the
task. In this section, we explore the emergent connectivity patterns. We show that our model learns
to route features in hierarchical ways as hypothesized, including skip connections and feedback
connections. For this purpose, we choose the text8 corpus, a medium-scale language modeling
benchmark consisting of the first 108 bytes of Wikipedia, preprocessed for the Hutter Prize [23]. The
model observes one one-hot encoded byte per time step, and is trained to predict its future input at
the next time step.
We use comparably small models to be able to run experiments quickly, comparing ThalNet models
of 4 FF-GRU-FF modules with layer sizes 50, 100, 50 and 50, 200, 50. Both experiments use
weight normalized reading. Our focus here is on exploring learned connectivity patterns. We show
competitive results on the task using larger models in Section 3.
We simulate two sub time steps to allow for the output module to receive information of the current
input frame as discussed in Section 2. Models are trained for 50 epochs on batches of size 10
containing sequences of length 50 using RMSProp with a learning rate of 10−3 . In general, we
observe different random seeds converging to similar connectivity patterns with recurring elements.
4.1
Trained Reading Weights
Figure 4 shows trained reading weights for various reading mechanisms, along with their connectivity
graphs that were manually deduced.6 Each image represents a reading weight matrix for the modules
1 to 4 (top to bottom). Each pixel row shows the weight factors that get multiplied with Φ to produce
a single element of the context vector of that module. The weight matrices thus has dimensions of
|Φ| × |ci |. White pixels represent large magnitudes, suggesting focus on features at those positions.
The weight matrices of weight normalized reading clearly resemble the boundaries of the four
concatenated module features φ1 , · · · , φ4 in the center vector Φ, even though the model has no notion
of the origin and ordering of elements in the center vector.
A similar structure emerges with fast softmax reading. These weight matrices are sparser than
the weights from weight normalization. Over the course of a sequence, we observe some weights
staying constant while others change their magnitudes at each time step. This suggests that optimal
connectivity might include both static and dynamic elements. However, this reading mechanism
leads to less stable training. This problem could potentially alleviated by normalizing the fast weight
matrix.
With fast Gaussian reading, we see that the distributions occasionally tighten on specific features
in the first and last modules, the modules that receive input and emit output. The other modules
learn large variance parameters, effectively spanning all center features. This could potentially be
addressed by reading using mixtures of Gaussians for each context element instead. We generally
find that weight normalized and fast softmax reading select features with in a more targeted way.
6
Developing formal measurements for this deduction process seems beneficial in the future.
6
skip connection
skip connection
feedback
connection
x
1
2
3
4
y
x
skip connection
(a) Weight Normalization
1
2
3
4
y
feedback connection
(b) Fast Softmax
(c) Fast Gaussian
Figure 4: Reading weights learned by different reading mechanisms with 4 modules on the text8
language modeling task, alongside manually deducted connectivity graphs. We plot the weight
matrices that produce the context inputs to the four modules, top to bottom. The top images show
focus of the input modules, followed by side modules, and output modules at the bottom. Each pixel
row gets multiplied with the center vector Φ to produce one scalar element of the context input ci .
We visualize the magnitude of weights between the 5 % to the 95 % percentile. We do not include the
connectivity graph for Fast Gaussian reading as its reading weights are not clearly structured.
4.2
Commonly Learned Structures
The top row in Figure 4 shows manually deducted connectivity graphs between modules. Arrows
represent the main direction of information flow in the model. For example, the two incoming arrows
to module 4 in Figure 4a indicate that module 4 mainly attends to features produced by modules 1
and 3. We infer the connections from the larger weight magnitudes in the first and third quarters of
the reading weights for module 4 (bottom row).
A typical pattern that emerges during the experiments can be seen in the connectivity graphs of both
weight normalized and fast softmax reading (Figures 4a and 4b). Namely, the output module reads
features directly from the input module. This direction connection is established early on during
training, likely because this is the most direct gradient path from output to input. Later on, the side
modules develop useful features to support the input and output modules.
In another pattern, one module reads from all other modules and combines their information. In
Figure 4b, module 2 takes this role, reading from modules 1, 3, 4, and distributing these features via
the input module. In additional experiments with more than four modules, we observed this pattern to
emerge predominantly. This connection pattern provides a more efficient way of information sharing
than cross-connecting all modules.
Both connectivity graphs in Figure 4 include hierarchical computation paths through the modules.
They include learn skip connections, which are known to improve gradient flow from popular models
such as ResNet [12], Highway networks [32], and DenseNet [15]. Furthermore, the connectivity
graphs contain backward connections, creating feedback loops over two or more modules. Feedback
connections are known to play a critical role in the neocortex, which inspired our work [7].
5
Related Work
We describe a recurrent mixture of experts model, that learns to dynamically pass information between
the modules. Related approaches can be found in various recurrent and multi-task methods as outlined
in this section.
7
Modular Neural Networks. ThalNet consists of several recurrent modules that interact and exploit
each other. Modularity is a common property of existing neural models. [5] learn a matrix of
tasks and robot bodies to improve both multitask and transfer learning. [1] learn modules modules
specific to objects present in the scene, which are selected by an object classifier. These approaches
specify modules corresponding to a specific task or variable manually. In contrast, our model
automatically discovers and exploits the inherent modularity of the task and does not require a
one-to-one correspondence of modules to task variables.
The Column Bundle model [25] consists of a central column and several mini-columns around it.
While not applied to temporal data, we observe a structural similarity between our modules and the
mini-columns, in the case where weights are shared among layers of the mini-columns, which the
authors mention as a possibility.
Learned Computation Paths. We learn the connectivity between modules alongside the task.
There are various methods in the multi-task context that also connectivity between modules. Fernando
et al. [6] learn paths through multiple layers of experts using an evolutionary approach. Rusu et al. [27]
learn adapter connections to connect to fixed previously trained experts and exploit their information.
These approaches focus on feed-forward architectures. The recurrency in our approach allows for
complex and flexible computational paths. Moreover, we learn interpretable weight matrices that can
be examined directly without performing costly sensitivity analysis.
The Neural Programmer Interpreted presented by Reed and De Freitas [26] is related to our dynamic
gating mechanisms. In their work, a network recursively calls itself in a parameterized way to
perform tree-shaped computations. In comparison, our model allows for parallel computation
between modules and for unrestricted connectivity patterns between modules.
Memory Augmented RNNs. The center vector in our model can be interpreted as an external
memory, with multiple recurrent controllers operating on it. Preceding work proposes recurrent
neural networks operating on external memory structures. The Neural Turing Machine proposed by
Graves et al. [9], and follow-up work [10], investigate differentiable ways to address a memory for
reading and writing. In the ThalNet model, we use multiple recurrent controllers accessing the center
vector. Moreover, our center vector is recomputed at each time step, and thus should not be confused
with a persistent memory as is typical for model with external memory.
6
Conclusion
We presented ThalNet, a recurrent modular framework that learns to pass information between neural
modules in a hierarchical way. Experiments on sequential and permuted variants of MNIST and
CIFAR-10 are a promising sign of the viability of this approach. In these experiments, ThalNet
learns novel connectivity patterns that include hierarchical paths, skip connections, and feedback
connections.
In our current implementation, we assume the center features to be a vector. Introducing a matrix
shape for the center features would open up ways to integrate convolutional modules and similaritybased attention mechanisms for reading from the center. While matrix shaped features are easily
interpretable for visual input, it is less clear how this structure will be leveraged for other modalities.
A further direction of future work is to apply our paradigm to tasks with multiple modalities for
inputs and outputs. It seems natural to either have a separate input module for each modality, or to
have multiple output modules that can all share information through the center. We believe this could
be used to hint specialization into specific patterns and create more controllable connectivity patterns
between modules. Similarly, we an interesting direction is to explore the proposed model can be
leveraged to learn and remember a sequence of tasks.
We believe modular computation in neural networks will become more important as researchers
approach more complex tasks and employ deep learning to rich, multi-modal domains. Our work
provides a step in the direction of automatically organizing neural modules that leverage each other
in order to solve a wide range of tasks in a complex world.
8
References
[1] J. Andreas, M. Rohrbach, T. Darrell, and D. Klein. Neural module networks. In IEEE Conference
on Computer Vision and Pattern Recognition, pages 39–48, 2016.
[2] J. Ba, G. E. Hinton, V. Mnih, J. Z. Leibo, and C. Ionescu. Using fast weights to attend to the
recent past. In Advances in Neural Information Processing Systems, pages 4331–4339, 2016.
[3] K. Cho, B. van Merriënboer, D. Bahdanau, and Y. Bengio. On the properties of neural machine
translation: Encoder–decoder approaches. Syntax, Semantics and Structure in Statistical
Translation, page 103, 2014.
[4] T. Cooijmans, N. Ballas, C. Laurent, Ç. Gülçehre, and A. Courville. Recurrent batch normalization. arXiv preprint arXiv:1603.09025, 2016.
[5] C. Devin, A. Gupta, T. Darrell, P. Abbeel, and S. Levine. Learning modular neural network
policies for multi-task and multi-robot transfer. arXiv preprint arXiv:1609.07088, 2016.
[6] C. Fernando, D. Banarse, C. Blundell, Y. Zwols, D. Ha, A. A. Rusu, A. Pritzel, and D. Wierstra. Pathnet: Evolution channels gradient descent in super neural networks. arXiv preprint
arXiv:1701.08734, 2017.
[7] C. D. Gilbert and M. Sigman. Brain states: top-down influences in sensory processing. Neuron,
54(5):677–696, 2007.
[8] A. Graves. Adaptive computation time for recurrent neural networks.
arXiv:1603.08983, 2016.
arXiv preprint
[9] A. Graves, G. Wayne, and I. Danihelka. Neural turing machines. arXiv preprint arXiv:1410.5401,
2014.
[10] A. Graves, G. Wayne, M. Reynolds, T. Harley, I. Danihelka, A. Grabska-Barwińska, S. G.
Colmenarejo, E. Grefenstette, T. Ramalho, J. Agapiou, et al. Hybrid computing using a neural
network with dynamic external memory. Nature, 538(7626):471–476, 2016.
[11] J. Hawkins and D. George. Hierarchical temporal memory: Concepts, theory and terminology.
Technical report, Numenta, 2006.
[12] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In IEEE
Conference on Computer Vision and Pattern Recognition, pages 770–778, 2016.
[13] G. Hinton, A. Krizhevsky, and S. Wang. Transforming auto-encoders. Artificial Neural Networks
and Machine Learning (ICANN), pages 44–51, 2011.
[14] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural computation, 9(8):
1735–1780, 1997.
[15] G. Huang, Z. Liu, K. Q. Weinberger, and L. van der Maaten. Densely connected convolutional
networks. arXiv preprint arXiv:1608.06993, 2016.
[16] R. A. Jacobs, M. I. Jordan, and A. G. Barto. Task decomposition through competition in a
modular connectionist architecture: The what and where vision tasks. Cognitive Science, 15(2):
219–250, 1991.
[17] D. Kingma and J. Ba. Adam: A method for stochastic optimization. In International Conference
on Learning Representations, 2015.
[18] J. Kirkpatrick, R. Pascanu, N. Rabinowitz, J. Veness, G. Desjardins, A. A. Rusu, K. Milan,
J. Quan, T. Ramalho, A. Grabska-Barwinska, et al. Overcoming catastrophic forgetting in
neural networks. Proceedings of the National Academy of Sciences, page 201611835, 2017.
[19] A. Krizhevsky. Learning multiple layers of features from tiny images, 2009.
[20] D. Krueger, T. Maharaj, J. Kramár, M. Pezeshki, N. Ballas, N. R. Ke, A. Goyal, Y. Bengio,
H. Larochelle, A. Courville, et al. Zoneout: Regularizing rnns by randomly preserving hidden
activations. arXiv preprint arXiv:1606.01305, 2016.
9
[21] Y. LeCun and C. Cortes. The MNIST database of handwritten digits, 1998.
[22] T. P. Lillicrap, D. Cownden, D. B. Tweed, and C. J. Akerman. Random synaptic feedback
weights support error backpropagation for deep learning. Nature Communications, 7, 2016.
[23] M. Mahoney. About the test data. http://mattmahoney.net/dc/textdata, 2011.
[24] W. S. McCulloch and W. Pitts. A logical calculus of the ideas immanent in nervous activity.
The bulletin of mathematical biophysics, 5(4):115–133, 1943.
[25] T. Pham, T. Tran, and S. Venkatesh. One size fits many: Column bundle for multi-x learning.
arXiv preprint arXiv:1702.07021, 2017.
[26] S. Reed and N. De Freitas. Neural programmer-interpreters. In International Conference on
Learning Representations, 2015.
[27] A. A. Rusu, N. C. Rabinowitz, G. Desjardins, H. Soyer, J. Kirkpatrick, K. Kavukcuoglu,
R. Pascanu, and R. Hadsell. Progressive neural networks. arXiv preprint arXiv:1606.04671,
2016.
[28] T. Salimans and D. P. Kingma. Weight normalization: A simple reparameterization to accelerate
training of deep neural networks. In Advances in Neural Information Processing Systems, pages
901–901, 2016.
[29] J. Schmidhuber. Learning to control fast-weight memories: An alternative to dynamic recurrent
networks. Neural Computation, 4(1):131–139, 1992.
[30] N. Shazeer, A. Mirhoseini, K. Maziarz, A. Davis, Q. Le, G. Hinton, and J. Dean. Outrageously large neural networks: The sparsely-gated mixture-of-experts layer. arXiv preprint
arXiv:1701.06538, 2017.
[31] S. M. Sherman. Thalamus plays a central role in ongoing cortical functioning. Nature neuroscience, 16(4):533–541, 2016.
[32] R. K. Srivastava, K. Greff, and J. Schmidhuber.
arXiv:1505.00387, 2015.
Highway networks.
arXiv preprint
[33] T. Tieleman and G. Hinton. Lecture 6.5-rmsprop: Divide the gradient by a running average of
its recent magnitude. COURSERA: Neural networks for machine learning, 4(2), 2012.
[34] F. Zenke, B. Poole, and S. Ganguli. Improved multitask learning through synaptic intelligence.
arXiv preprint arXiv:1703.04200, 2017.
10
Supplementary Material for Learning Hierarchical
Information Flow with Recurrent Neural Modules
A
Module Designs and Reading Mechanisms
1.0
Sequential MNIST Testing
1.0
0.9
0.8
ThalNet FF-GRU
ThalNet FF-GRU-FF
ThalNet GRU-FF
GRU Baseline
ThalNet GRU
ThalNet FF
0.7
0.6
0.5
20
40
60
Epochs
80
Accuracy (%)
Accuracy (%)
0.9
Sequential MNIST Testing
0.8
0.7
0.6
0.5
100
(a) Module designs
ThalNet Weight Norm
ThalNet Linear
GRU Baseline
ThalNet Fast Softmax
20
40
60
Epochs
80
100
(b) Reading mechanisms
Figure 5: Test performance on the Sequential MNIST task grouped by module design (left) and
reading mechanism (right). Plots show the top, median, and bottom accuracy over the other design
choices. Recurrent modules train faster than pure fully connected modules and weight normalized
reading is both stable and performs best. FF-GRU-FF modules perform similarly to FF-GRU while
limiting the size of the center.
We use a sequential variant of MNIST [21] to compare the reading mechanisms described in Section 2.2, along with implementations of the module function. In Sequential MNIST, the model
observes handwritten digits of 28 × 28 pixels from top to bottom, one row per time step. The
prediction is given at the last time step, so that the model has to integrate and remember observed
information over the sequence. This makes the task more challenging than in the static setting with a
multi-layer recurrent network achieving ~7 % error on this task.
To implement the modules f i (ci , xi ) we test various combinations of fully connected and recurrent
layers of Gated Recurrent Units (GRU) [3]. Modules require some amount of local structure to
allow them to specialize.7 We test with two fully connected layers (FF), a GRU layer (GRU), fully
connected followed by GRU (FF-GRU), GRU followed by fully connected (GRU-FF), and a GRU
sandwiched between fully connected layers (FF-GRU-FF). In addition, we compare performance to
a stacked GRU baseline with 4 layers. For all models, we pick the largest layer sizes such that the
number of parameters does not exceed 50,000.
We train for 100 epochs on batches of size 50 using RMSProp [33] with a learning rate of 10−3 .
Figure 5 shows the test accuracy of module designs and reading mechanisms. ThalNet outperforms
the stacked GRU baseline in most configurations. We assume that the structure imposed by our model
acts as a regularizer. We perform a further performance comparison in Section 3.
Results for module designs are shown in Figure 5a in the appendix. We observe a benefit of recurrent
modules as they exhibit faster and more stable training than fully connected modules. This could
be explained by the fact that pure fully connected modules have to learn to use the routing center to
store information over time, which is a long feedback loop. Having a fully connected layer before the
recurrent layer also significantly improves performance. A fully connected layer after the GRU let us
produce compact feature vectors φi that scale better to large modules, although we find FF-GRU to
be beneficial in later experiments (Section 3).
7
Implementing the modules as a single fully connected layer recovers a standard recurrent neural network
with one large layer.
11
Results for the reading mechanisms area shown in Figure 5b. The reading mechanism only has
a small impact on the model performance. We find weight normalized reading to yield more
stable performance than linear or fast softmax reading. For all further experiments, we use weight
normalized reading due to both its stability and predictive performance. We do not include results for
fast Gaussian reading here, as it performed below the performance range of the other methods.
B
Interpretation as Recurrent Mixture of Experts
ThalNet can route information from the input to the output over multiple time steps. This enables it
to trade off shallow and deep computation paths. To understand this, we view ThalNet as a smooth
mixture of experts model [16], where the modules F = (f 1 , · · · , f I ) are the recurrent experts. Each
module outputs its features to the center vector Φt . A linear combination of Φt is read at the next time
step, which effectively performs a mixing of expert outputs. Compared to the recurrent mixture of
experts model presented by Shazeer et al. [30], our model can recurrently route information through
the mixture of multiple times, increasing the number of mixture compounds.
To highlight two extreme cases, the modules could read from identical locations in the center. In this
case, the model does a wide and shallow computation over 1 time step, analogous to Graves [8]. In
the other extreme, each module reads from a different module, recovering a hierarchy of recurrent
layers. This gives a deep but narrow computation stretched over multiple time steps. In between, there
exist a spectrum of complex patterns of information flow with differing and dynamic computation
depths. This is comparable to DenseNet [15], which also blends information from paths of different
computational depth, although in a purely feed-forward model.
Using state-less modules, our model could still leverage the recurrence between the modules and the
center to store information over time. However, this bounds the number of distinct computation steps
that ThalNet could apply to an input. Using recurrent modules, the computation steps can change
over time, increasing the flexibility of the model. Recurrent modules give a stronger prior for using
feedback and shows improved performance in our experiments.
C
Comparison to Long Short-Term Memory
When viewing the Equations 1 – 4 in the model definition (Section 2), one might think how our model
compares to Long Short-Term Memory (LSTM) [14]. However, there exists only a limited similarity
between the two models. Empirically, we observed that LSTMs performed similarly to our GRU
baselines when given the same parameter budget.
LSTM’s context vector ct is processed element-wise, while ThalNet’s routing center cross-connects
modules. LSTM’s hidden output ht is a better candidate for comparison with ThalNet’s center
features Φ, which allows us to relate the recurrent weight matrix of an LSTM layer to the linear
version of our reading mechanism.
We could relate each ThalNet module to a set of multiple LSTM units. However, LSTM units perform
separate scalar computations, while our modules can learn complex interactions between multiple
features at each time step. Alternatively, we could see LSTM units as very small ThalNet modules,
reading exactly four context elements each, namely for the input and the three gates. However, the
computational capacity and local structure of individual LSTM units is not comparable to that of the
ThalNet modules used in our work.
12
| 2cs.AI
|
Towards Efficient Abstractions for Concurrent
Consensus⋆
arXiv:1304.1913v2 [cs.PL] 7 May 2013
Carlo Spaccasassi⋆⋆ and Vasileios Koutavas⋆ ⋆ ⋆
Trinity College Dublin, Ireland
{spaccasc,Vasileios.Koutavas}@scss.tcd.ie
Abstract. Consensus is an often occurring problem in concurrent and
distributed programming. We present a programming language with simple semantics and build-in support for consensus in the form of communicating transactions. We motivate the need for such a construct with a
characteristic example of generalized consensus which can be naturally
encoded in our language. We then focus on the challenges in achieving
an implementation that can efficiently run such programs. We setup an
architecture to evaluate different implementation alternatives and use it
to experimentally evaluate runtime heuristics. This is the basis for a research project on realistic programming language support for consensus.
Keywords: Concurrent programming, consensus, communicating transactions
1
Introduction
Achieving consensus between concurrent processes is a ubiquitous problem in
multicore and distributed programming [8, 6]. Among the classic instances of
consensus is leader election and synchronous multi-process communication. Programming language support for consensus, however, has been limited. For example, CML’s first-class communication primitives provide a programming language abstraction to implement two-party consensus. However, they cannot be
used to abstractly implement consensus between three or more processes [11,
Thm. 6.1]—this needs to be implemented in a case-by-case basis.
Let us consider a hypothetical scenario of generalized consensus, which we
will call the Saturday Night Out (SNO) problem. In this scenario a number of
friends are seeking partners for various activities on Saturday night. Each has
a list of desired activities to attend in a certain order, and will only agree for
a night out if there is a partner for each activity. Alice, for example, is looking
for company to go out for dinner and then a movie (not necessarily with the
same person). To find partners for these events in this order she may attempt
to synchronize on the “handshake” channels dinner and movie:
⋆
⋆⋆
⋆⋆⋆
Student project paper (primarily the work of the first author).
Supported by MSR (MRL 2011-039)
Supported by SFI project SFI 06 IN.1 1898.
2
def
Alice = sync dinner; sync movie
Here sync is a two-party synchronization operator, similar to CSP synchronization. Bob, on the other hand, wants to go for dinner and then for dancing:
def
Bob = sync dinner; sync dancing
Alice and Bob can agree on dinner but they need partners for a movie and
dancing, respectively, to commit to the night out. Their agreement is tentative.
Let Carol be another friend in this group who is only interested in dancing:
def
Carol = sync dancing
Once Bob and Carol agree on dancing they are both happy to commit to going
out. However, Alice has no movie partner and she can still cancel her agreement
with Bob. If this happens, Bob and Carol need to be notified to cancel their
agreement and everyone starts over their search of partners. An implementation
of the SNO scenario between concurrent processes would need to have a specialized way of reversing the effect of this synchronization. Suppose David is also a
participant in this set of friends.
def
David = sync dancing; sync movie
After the partial agreement between Alice, Bob, and Carol is canceled, David
together with the first two can synchronize on dinner, dancing, and movie and
agree to go out (leaving Carol at home).
Notice that when Alice raised an objection to the agreement that was forming
between her, Bob, and Carol, all three participants were forced to restart. If,
however, Carol was taken out of the agreement (even after she and Bob were
happy to commit their plans), David would have been able to take Carol’s place
and the work of Alice and Bob until the point when Carol joined in would not
need to be repeated.
Programming SNO between an arbitrary number of processes (which can
form multiple agreement groups) in CML is complicated. Especially if we consider that the participants are allowed to perform arbitrary computations between synchronizations affecting control flow, and can communicate with other
parties not directly involved in the SNO. For example, Bob may want to go
dancing only if he can agree with the babysitter to stay late:
def
Bob = sync dinner; if babysitter() then sync dancing
In this case Bob’s computation has side-effects outside of the SNO group of processes. To implement this would require code for dealing with the SNO protocol
to be written in the Babysitter (or any other) process, breaking any potential
modular implementation.
This paper shows that communicating transactions, a recently proposed mechanism for automatic error recovery in CCS processes [13], is a useful mechanism
for modularly implementing the SNO and other generalized consensus scenarios.
Previous work on communicating transactions focused on behavioral theory with
3
A ::= unit bool int A × A A → A A chan
v ::= x () true false n (v, v) fun f (x) = e c
e ::= v (e, e) e e op e let x = e in e if e then e else e
send e e recv e newChanA spawn e
atomic J e ⊲k e K commit k
P ::= e P k P
νc.P
J P ⊲k P K co k
op ::= fst snd add sub mul leq
E ::= [] (E, e) (v, E) E e v E op E let x = E in e
if E then e1 else e2 send E e send v E recv E spawn E
where n ∈ N, x ∈ Var , c ∈ Chan, k ∈ K
Fig. 1. TCML syntax.
respect to safety and liveness [13, 2]. However, the effectiveness of this construct
in a pragmatic programming language has yet to be proven. One of the main
milestones to achieve on this direction is the invention of efficient runtime implementations of communicating transactions. Here we describe the challenges
and our first results in a recently started project to investigate this research
direction.
In particular, we equip a simple concurrent functional language with communicating transactions and use it to discuss the challenges in making an efficient
implementation of such languages (Sect. 2). We also use this language to give a
modular implementation of consensus scenarios such as the SNO example. The
simple operational semantics of this language allows for the communication of
SNO processes with arbitrary other processes (such as the Babysitter process)
without the need to add code for the SNO protocol in those processes. Moreover,
the more efficient, partially aborting strategy discussed above is captured in this
semantics.
Our semantics of this language is non-deterministic, allowing different runtime scheduling strategies of processes, some more efficient than others. To study
their relative efficiency we have developed a skeleton implementation of the language which allows us to plug in and evaluate such runtime strategies (Sect. 3).
We describe several such strategies (Sect. 4) and report the results of our evaluations (Sect. 5). Finally, we summarize related work in this area and the future
directions of this project (Sect. 6).
2
The TCML Language
We study TCML, a language combining a simply-typed λ-calculus with πcalculus and communicating transactions. For this language we use the abstract
syntax shown in Fig. 1 and the usual abbreviations from the λ- and π-calculus.
Values in TCML are either constants of base type (unit, bool, and int), pairs
of values (of type A × A), recursive functions (A → A), and channels carrying
values of type A (A chan). A simple type system (with appropriate progress
4
if true then e1 else e2
if false then e1 else e2
let x = v in e
op v
fun f (x) = e v2
֒→
֒→
֒→
֒→
֒→
e1
e2
e[v/x]
δ(op, v)
e[fun f (x) = e/f ][v2 /x]
Step
E[e]
Spawn
E[spawn v]
NewChan E[newChanA ]
Atomic
E[atomic J e1 ⊲k e2 K]
Commit E[commit k]
−→
−→
−→
−→
−→
E[e′ ]
v () k E[()]
νc.E[c]
J E[e1 ] ⊲k E[e2 ] K
co k k E[()]
If-True
If-False
Let
Op
App
if e ֒→ e′
if c 6∈ fc(E[()])
Fig. 2. Sequential reductions
and preservation theorems) can be found in an accompanying technical report
[12] and is omitted here.
Source TCML programs are expressions in the functional core of the language, ranged over by e, whereas running programs are processes derived from
the syntax of P . Besides standard lambda calculus expressions, the functional
core contains the constructs send c e and recv c to synchronously send and receive a value on channel c, respectively, and newChanA to create a new channel
of type chan A. The constructs spawn and atomic, when executed, respectively
spawn a new process and transaction; commit k commits transaction k—we will
shortly describe these constructs in detail.
A simple running process can be just an expression e. It can also be constructed by the parallel composition of P and Q (P k Q). We treat free channels
as in the π-calculus, considering them to be global. Thus if a channel c is free in
both P and Q, it can be used for communication between these processes. The
construct νc.P encodes π-calculus restriction of the scope of c to process P . We
use the Barendregt convention for bound variables and channels and identify
terms up to alpha conversion. Moreover, we write fc(P ) for the free channels in
process P .
We write J P1 ⊲k P2 K for the process encoding a communicating transaction.
This can be thought of as the process P1 , the default of the transaction, which
runs until the transaction commits. If, however, the transaction aborts then P1
is discarded and the entire transaction is replaced by its alternative process P2 .
Intuitively, P2 is the continuation of the transaction in the case of an abort.
As we will explain, commits are asynchronous, requiring the addition of process
co k to the language. The name k of the transaction is bound in P1 . Thus only
the default of the transaction can potentially spawn a co k. The meta-function
ftn(P ) gives us the free transaction names in P .
Processes with no free variables can reduce using transitions of the form
P −→ Q. These transitions for the functional part of the language are shown in
Fig. 2 and are defined in terms of reductions e ֒→ e′ (where e is a redex ) and
eager, left-to-right evaluation contexts E whose grammar is given in Fig. 1. Due
to a unique decomposition lemma, an expression e can be decomposed to an
evaluation context and a redex expression in only one way. Here we use e[u/x]
5
for the standard capture-avoiding substitution, and δ(op, v) for a meta-function
returning the result of the operator op on v, when this is defined.
Rule Step lifts functional reductions to process reductions. The rest of the
reduction rules of Fig. 2 deal with the concurrent and transactional side-effects
of expressions. Rule Spawn reduces a spawn v expression at evaluation position
to the unit value, creating a new process running the application v (). The type
system of the language guarantees that value v here is a thunk. With this rule
we can derive the reductions:
spawn(λ(). send c 1); recv c −→(λ(). send c 1) () k recv c
−→ send c 1 k recv c
The resulting processes of these reductions can then communicate on channel c.
As we previously mentioned, the free channel c can also be used to communicate
with any other parallel process. Rule NewChan gives processes the ability to
create new, locally scoped channels. Thus, the following expression will result in
an input and an output process that can only communicate with each other:
let x = newChanint in (spawn (λ(). send x 1); recv x)
−→ νc. (spawn (λ(). send c 1); recv c)
−→∗ νc. (send c 1 k recv c)
Rule Atomic starts a new transaction in the current (expression-only) process, engulfing the entire process in it, and storing the abort continuation in the
alternative of the transaction. Rule Commit spawns an asynchronous commit.
Transactions can be arbitrarily nested, thus we can write:
atomic J spawn(λ(). recv c; commit k) ⊲k () K;
atomic J recv d; commit l ⊲l () K
which reduces to
J(recv c; commit k) k J recv d; commit l ⊲l () K
⊲k (); atomic J recv d; commit l ⊲l () K K
This process will commit the k-transaction after an input on channel c and the
inner l-transaction after an input on d. As we will see, if the k transaction aborts
then the inner l-transaction will be discarded (even if it has performed the input
on d) and the resulting process (the alternative of k) will restart l:
(); atomic J recv d; commit l ⊲l () K
The effect of this abort will be the rollback of the communication on d reverting
the program to a consistent state.
Process and transactional reductions are handled by the rules of Fig. 3. The
first four rules (Sync, Eq, Par, and Chan) are direct adaptations of the reduction rules of the π-calculus, which allow parallel processes to communicate, and
propagate reductions over parallel and restriction. These rules use an omitted
6
E1 [recv c] k E2 [send c v] −→ E1 [v] k E2 [()]
Eq
P ≡ P ′ −→ Q′ ≡ Q
P −→ Q
Par
P1 −→ P1′
P1 k P2 −→ P1′ k P2
Chan
P −→ P ′
νc.P −→ νc.P ′
Emb
Step
P −→ P ′
J P ⊲k P2 K −→ J P ′ ⊲k P2 K
Sync
P1 k J P2 ⊲k P3 K −→ J P1 k P2 ⊲k P1 k P3 K
Abort
Co
P1 ≡ co k k P1′
J P1 ⊲k P2 K −→ P1′ /k
J P1 ⊲k P2 K −→ P2
Fig. 3. Concurrent and Transactional reductions (omitting symmetric rules).
structural equivalence (≡) to identify terms up to the reordering of parallel processes and the extrusion of the scope of restricted channels, in the spirit of the
π-calculus semantics. Rule Step propagates reductions of default processes over
their respective transactions. The remaining rules are taken from TransCCS [13].
Rule Emb encodes the embedding of a process P1 in a parallel transaction
J P1 ⊲k P2 K. This enables the communication of P1 with P2 , the default of
k. It also keeps the current continuation of P1 in the alternative of k in case
the k-transaction aborts. To illustrate the mechanics of the embed rule, let
us consider the above nested transaction running in parallel with the process
P = send d (); send c ():
J(recv c; commit k) k J recv d; commit l ⊲l () K
⊲k (); atomic J recv d; commit l ⊲l () K K
k P
After two embedding transitions we will have
J(recv c; commit k) k
J P k recv d; commit l ⊲l P k () K
⊲k
P k ...K
⊲k
P k ...K
Now P can communicate on d with the inner transaction:
J(recv c; commit k) k
J send c () k commit l ⊲l P k () K
Next, there are (at least) two options: either commit l spawns a co l process
which causes the commit of the l-transaction, or the input on d is embedded in
the l-transaction. Let us assume that the latter occurs:
J J(recv c; commit k) k send c () k commit l
⊲l (recv c; commit k) k P k () K
⊲k P k . . . K
−→∗ J J co k k co l ⊲l . . . K ⊲k . . . K
The transactions are now ready to commit from the inner-most to the outer-most
using rule Commit. Inner-to-outer commits are necessary to guarantee that all
transactions that have communicated have reached an agreement to commit.
7
This also has the important consequence of making the following three processes behaviorally indistinguishable:
J P1 ⊲k P2 K k J Q1 ⊲l Q2 K
J P1 k J Q1 ⊲l Q2 K ⊲k P2 k J Q1 ⊲l Q2 K K
J J P1 ⊲k P2 K k Q1 ⊲l J P1 ⊲k P2 K k Q2 K
Therefore, an implementation of TCML, when dealing with the first of the three
processes can pick any of the alternative, non-deterministic mutual embeddings
of the k and l transactions without affecting the observable outcomes of the
program. In fact, when one of the transactions has no possibility of committing
or when the two transactions never communicate, an implementation can decide
never to embed the two transactions in each-other. This is crucial in creating
implementations that will only embed processes (and other transactions) only
when necessary for communication, and pick the most efficient of the available embeddings. The development of implementations with efficient embedding
strategies is one of the main challenges of our project for scaling communicating
transactions to pragmatic programming languages.
Similarly, aborts are entirely non-deterministic (Abort) and are left to the
discretion of the underlying implementation. Thus in the above example any
transaction can abort at any stage, discarding part of the computation. In such
examples there is usually a multitude of transactions that can be aborted, and
in cases where a “forward” reduction is not possible (due to deadlock) aborts are
necessary. Making the TCML programmer in charge of aborts (as we do with
commits) is not desirable since the purpose of communicating transactions is
to lift the burden of manual error prediction and handling. Minimizing aborts,
and automatically picking the aborts that will undo the fewer computation steps
while still rewinding the program back enough to reach a successful outcome is
another major challenge in our project.
The SNO scenario can be simply implemented in TCML using restarting
transactions. A restarting transaction uses recursion to re-initiate an identical
transaction in the case of an abort:
atomicrec k J e K
def
=
fun r() = atomic J e ⊲k r () K
A transactional implementation of the SNO participants we discussed in the
introduction simply wraps their code in restating transactions:
let alice = atomicrec k J sync dinner; sync movie; commit k K in
let bob
= atomicrec k J sync dinner; sync dancing; commit k K in
let carol = atomicrec k J sync dancing; commit k K in
let david = atomicrec k J sync dancing; sync movie; commit k K in
spawn alice; spawn bob; spawn carol; spawn david
Here dinner, dancing, and movie are implementations of CSP synchronization channels and sync a function to synchronize on these channels. Compared
8
Transaction
trie
Sched.
Gath.
abort,
embed,
commit
side-effect notif.
& ack
e1
e2
...
en
Fig. 4. TCML runtime architecture.
to a potential ad-hoc implementation of SNO in CML the simplicity of the above
code is evident (the version of Bob communicating with the Babysitter is just as
simple). However, as we discuss in Sect. 5, this simplicity comes with a severe
performance penalty, at least for straightforward implementations of TCML.
In essence, the above code asks from the underlying transactional implementation to solve an NP-complete satisfiability problem. Leveraging existing useful
heuristics for such problems is something we intend to pursue in future work.
In the following sections we describe an implementation where these transactional scheduling decisions can be plugged in, and a number of heuristic transactional schedulers we have developed and evaluated. Our work shows that although more advanced heuristics bring measurable performance benefits, the
exponential number of runtime choices require the development of innovative
compilation and execution techniques to make communicating transactions a
realistic solution for programmers.
3
An Extensible Implementation Architecture
We have developed an interpreter for the TCML reduction semantics in Concurrent Haskell [7, 10] to which we can plug-in different decisions about the
non-deterministic transitions of our semantics. Here we briefly explain the runtime architecture of this interpreter, shown in Fig. 4.
The main Haskell threads are shown as round nodes in the figure. Each
concurrent functional expression ei is interpreted in its own thread according to
the sequential reduction rules in Fig. 2 of the previous section. Side-effects in
an expression will be generally handled by the interpreting thread, creating new
channels, spawning new threads, and starting new transactions.
Except for new channel creation, the evaluation of all other side-effects in
an expression will cause a notification (shown as dashed arrows in Fig. 2) to be
sent to the gatherer process (Gath.). This process is responsible for maintaining
a global view of the state of the running program in a Trie data-structure. This
data-structure essentially represents the transactional structure of the program;
i.e., the logical nesting of transactions and processes inside running transactions:
data TTrie = TTrie {
9
threads
children
:: Set ThreadID,
:: Map TransactionID TTrie, ... }
A TTrie node represents a transaction, or the top-level of the program. The
main information stored in such a node is the set of threads (threads) and transactions (children) running in that transactional level. Each child transaction
has its own associated TTrie node. An invariant of the data-structure is that
each thread and transaction identifier appears only once in it. For example the
complex program we saw on page 6:
J(recv c; commit k)tid1 k J(recv d; commit l)tid2 ⊲l () K
⊲k (); atomic J recv d; commit l ⊲l () K K
k P tidP
will have an associated trie:
TTrie{threads = {tidP },
children = {k 7→ TTrie{threads = {tid1 },
children = {l 7→ TTrie{threads = {tid2 },
children = ∅}}}}}
The last ingredient of the runtime implementation is the scheduler thread
(Sched. in Fig. 4). This makes decisions about the commit, embed and abort
transitions to be performed by the expression threads, based on the information
in the trie. Once such a decision is made by the scheduler, appropriate signals
(implemented using Haskell asynchronous exceptions [10]) are sent to the running
threads, shown as dotted lines in Fig. 4. Our implementation is parametric to the
precise algorithm that makes scheduler decisions, and in the following section
we describe a number of such algorithms we have tried and evaluated.
A scheduler signal received by a thread will cause the update of the local
transactional state of the thread, affecting the future execution of the thread.
The local state of a thread is an object of the TProcess data-type:
data TProcess = TP {
expr :: Expression,
ctx :: Context,
tr
:: [Alternative] }
data Alternative = A {
tname :: TransactionID,
pr
:: TProcess }
The local state maintains the expression (expr) and evaluation context (ctx)
currently interpreted by the thread and a list of alternative processes (represented by objects of the Alternative data-type). This list contains the continuations stored when the thread was embedded in transactions. The nesting of
transactions in this list mirrors the transactional nesting in the global trie and is
thus compatible with the transactional nesting of other expression threads. Let
us go back to the example of page 6:
J(recv c; commit k)tid1 k J(recv d; commit l)tid2 ⊲l () K
⊲k (); atomic J recv d; commit l ⊲l () K K
k P tidP
where P = send d (); send c (). When P is embedded in both k and l, the thread
evaluating P will have the local state object
10
TP{expr = P , tr = [A{tname = l, pr = P }, A{tname = k, pr = P }]}
recording the fact that the thread running P is part of the l-transaction,
which in turn is inside the k-transaction. If either of these transactions aborts
then the thread will rollback to P , and the list of alternatives will be appropriately updated (the aborted transaction will be removed).
Once a transactional reconfiguration is performed by a thread, an acknowledgment is sent back to the gatherer, who, as we discussed, is responsible for updating the global transactional structure in the trie. This closes a cycle of transactional reconfigurations initiated from the process (by starting a new transaction
or thread) or the scheduler (by issuing a commit, embed, or abort).
What we described so far is a simple architecture for an interpreter of TCML.
Various improvements are possible (e.g., addressing the message bottleneck in
the gatherer) but are beyond the scope of this paper. In the following section we
discuss various policies for the scheduler which we then evaluate experimentally.
4
Transactional Scheduling Policies
Our goal here is to investigate schedulers that make decisions on transactional
reconfiguration based only on runtime heuristics. We are currently working on
more advanced schedulers, including schedulers that take advantage of static
information extracted from the program, which we leave for future work.
An important consideration when designing a scheduler is adequacy [?, Chap.
13, Sec. 4]. For a given program, an adequate scheduler is able to produce all
outcomes that the non-deterministic operational semantics can produce for that
program. However, this does not mean that the scheduler should be able to
produce all traces of the non-deterministic semantics. Many of these traces will
simply abort and restart the same computations over and over again. Previous
work on the behavioral theory of communicating transactions has shown that all
program outcomes can be reached with traces that never restart a computation
[13]. Thus a goals of our schedulers is to minimize re-computations by minimizing
the number of aborts.
Moreover, as we discussed at the end of Sect. 2, many of the exponential
number of embeddings can be avoided without altering the observable behavior
of a program. This can be done by embedding a process inside a transaction
only when this embedding is necessary to enable communication between the
process and the transaction. We take advantage of this in a communicationdriven scheduler we describe in this section.
Even after reducing the number of possible non-deterministic choices faced
by the scheduler, in most cases we are still left with a multitude of alternative
transactional reconfiguration options. Some of these are more likely to lead to
efficient traces than other. However, to preserve adequacy we cannot exclude
any of these options since the scheduler has no way to foresee their outcomes.
In these cases we assign different, non-zero probabilities to the available choices,
based on heuristics. This leads to measurable performance improvements, without violating adequacy. Of course some program outcomes might be more likely
11
to appear than others. This approach is trading measurable fairness for performance improvement.
However, the probabilistic approach is theoretically fair. Every finite trace
leading to a program outcome has a non-zero probability. Diverging traces due
to sequential reductions also have non-zero probability to occur. The only traces
with zero probability are those in the reduction semantics that have an infinite
number of non-deterministic reductions. Intuitively, these are unfair traces that
abort and restart transactions ad infinitum, even if other options are possible.
Random Scheduler (R). The very first scheduler we consider is the random
scheduler, whose policy is to simply, at each point, select one of all the nondeterministic choices with equal probability, without excluding any of these
choices. With this scheduler any abort, embed, or commit actions are equally
likely to happen. Although this naive scheduler is not particularly efficient, as
one would expect, it is an obviously adequate and fair scheduler according to the
discussion above. If a reduction transition is available infinitely often, scheduler
R will eventually select it.
This scheduler leaves much room for improvement. Suppose that a transaction k is ready to commit:
J P k co k ⊲k Q K
Since R makes no distinction between the choices of committing and aborting
k, it will often unnecessarily abort k. All processes embedded in this transaction will have to roll back and re-execute; if k was a transaction that restarts,
the transaction will also re-execute. This results to a considerable performance
penalty. Similarly, scheduler R might preemptively abort a long-running transaction that could have have committed given enough time and embeddings (for
the purpose of communication).
Staged Scheduler (S). The staged scheduler partially addresses these issues by
prioritizing its available choices. Whenever a transaction is ready to commit,
scheduler S will always decide to send a commit signal to that transaction before aborting it or embedding another process in it. This does not violate adequacy; before continuing with the algorithm of S, let us examine the adequacy
of prioritizing commits over other transactional actions with an example.
Example 1 Consider the following program in which k is ready to commit.
J P k co k ⊲k Q K k R
If embedding R in k leads to a program outcome, then that outcome can also be
reached after committing k from the residual P k R.
Alternatively, a program outcome could be reachable by aborting k (from the
process Q k R). However, the co k was spawned from one of the previous states
of the program in the current trace. In that state, transaction k necessarily had
the form: J P ′ k E[commit k] ⊲k Q K. In that state the abort of k was enabled.
Therefore, the staged interpreter indeed allows a trace leading to the program
state Q k R from which the outcome in question is reachable.
⊓
⊔
12
If no commit is possible for a transaction, the staged interpreter prioritizes
embeds into that transaction over aborting the transaction. This is again an
adequate decision because the transactions that can take an abort reduction
before an embed step have an equivalent abort reduction after that step.
When no commit nor embed options are available for a transaction, the staged
interpreter lets the transaction run with probability 0.95, giving more chances to
make progress in the current trace, and with probability 0.05 it aborts it—these
numbers have been fine-tuned with a number of experiments.
The benefit of the heuristic implemented in this scheduler is that it minimizes
unnecessary aborts improving performance. Its drawback is that it does not abort
transactions often, thus program outcomes reachable only from transactional
alternatives are less likely to appear. Moreover, this scheduler does not avoid
unnecessary embeddings.
Communication-Driven Scheduler (CD). To avoid spurious embeddings, scheduler CD improves over R by performing an embed transition only if it is necessary
for an imminent communication. For example, in the following program state the
embedding of the right-hand-side process into k will never be chosen.
J E[recv c] ⊲k Q K k ((); send c v)
However, after that process reduces to an output, its embedding into k will be
enabled. Because of the equivalence
J P ⊲k Q K k R ≡cxt J P k R ⊲k Q k R K
which we previously discussed, this scheduler is adequate.
For the implementation of this scheduler we augment the information stored
in the trie data-structure (Sect. 3) with the channel which each thread is waiting
to communicate on (if any).
As we will see in Sect. 5, this heuristic significantly boosts performance because it greatly reduces the exponential number of embedding choices.
Delayed-Aborts Scheduler (DA). The final scheduler we report is DA, which adds
a minor improvement upon scheduler CD. This scheduler keeps a timer for each
running transaction k in the transaction trie. This timer is reset whenever a communication or transactional operation happens inside k. Transaction k will only
be considered for an abort when this timer expires. This strategy benefits longrunning transactions that perform multiple communications before committing.
The CD scheduler is obviously adequate because it only adds time delays.
5
Evaluation of the Interpreters
We now report the experimental evaluation of interpreters using the preceding
Scheduling policies. The interpreters were compiled with GHC 7.0.3, and the
experiments were performed on a Windows 7 machine with Intel R CoreTM i52520M 250 GHz processor and 8Gb of RAM. We run several versions of two
programs:
13
SNO Example
Committed ops/second
Three-Way Rendezvous
102
102
101
101
100
10−1
100
10−2
10−1
10−3
5
10
5
15
Number of concurrent processes
R
10
S
15
CD
20
TA
ID
Fig. 5. Experimental Results.
1. The three-way rendezvous (3WR) in which a number of processes compete
to synchronize on a channel with two other processes, forming groups of
three which then exchange values. This is a standard example of multi-party
agreement [11, 3, 5]. In the TCML implementation of this example each process nondeterministically chooses between being a leader or follower within a
communicating transaction. If a leader and two followers communicate, they
can all exchange values and commit; any other situation leads to deadlock
and eventually to an abort of some of the transactions involved.
2. The SNO example of the introduction, as implemented in Sect. 2, with multiple instances of the Alice, Bob, Carol, and David processes.
To test the scalability of our schedulers, we tested a number of versions of the
above programs, each with a different number of competing parallel processes.
Each process in these programs continuously performs 3WR or SNO cycles and
our interpreters are instrumented to measure the number of operations in a given
time, from which we compute the mean throughput of successful 3WR or SNO
operations. The results are shown in Fig. 5.
Each graph in the figure contains the mean throughput of operations (in
logarithmic scale) as a function of the number of competing concurrent TCML
processes. The graphs contain runs with each scheduler we discussed (random
R, staged S, communication-driven, CD, and communication-driven with timed
aborts TA) as well as with an ideal non-transactional program (ID). The ideal
program in the case of 3WR is similar to the TCML, non-abstract implementation [11]. The ideal version of the SNO is running a simpler instance of the
scenario, without any Carol processes—this instance has no deadlocks and therefore needs no error handling. Ideal programs give us a performance upper bound.
As predictable, the random scheduler (R)’s performance is the worst; in many
cases R could not perform any operations in the window of measurements (30sec).
The other schedulers perform better than R by an order of magnitude. Even
just prioritizing the transactional reconfiguration choices significantly cuts down
14
the exponential number of inefficient traces. However, none of the schedulers
scale to programs with more processes; their performance deteriorates exponentially. In fact, when we go from the communication-driven (CD) to the timedaborts (TA) scheduler we see worst throughput in larger process pools. This is
because with many competing processes there is more possibility to enter a path
to deadlock; in these cases the results suggest that it is better to abort early.
The upper bound in the performance, as shown by the throughput of ID is
one order of magnitude above that of the best interpreter, when there are few
concurrent processes, and (within the range of our experiments) two orders when
there are many concurrent processes. The performance of ID is increasing with
more processes due to better utilization of the processor cores.
It is clear that in order to achieve a pragmatic implementation of TCML
we need to address the exponential nature in consensus scenarios as the ones we
tested here. Our exploration of purely runtime heuristics shows that performance
can be improved, but we need to turn to a different approach to close the gap
between ideal ad-hoc implementations and abstract TCML implementations.
6
Conclusions and Future Work
Consensus is an often occurring problem in concurrent and distributed programming. The need for developing programming language support for consensus has
already been identified in previous work on transactional events (TE) [3], communicating memory transactions (CMT) [9], transactors [4] and cJoin [1]. These
approaches propose forms of restarting communicating transactions, similar to
those described in Sect. 2. TE, CMT and Transactors can be used to implement
the instance of the Saturday Night Out (SNO) example in this paper. TE extends
CML events with a transactional sequencing operator; transactional communication is resolved at runtime by search threads which exhaustively explore all possibilities of synchronization, avoiding runtime aborts. CMT extends STM with
asynchronous communication, maintaining a directed dependency graph mirroring communication between transactions; STM abort triggers cascading aborts
to transactions that have received values from aborting transactions. Transactors
extend actor semantics with fault-tolerance primitives, enabling the composition
of systems with consistent distributed state via distributed checkpointing. The
cJoin calculus extends the Join calculus with isolated transactions which can
be merged. Merging and aborting are managed by the programmer, offering a
manual alternative to TCML’s nondeterministic transactional operations. It is
unclear to us how to write a straightforward implementation of the SNO example in cJoin. Reference implementations have been developed for TE, CMT and
cJoin. The discovery of efficient implementations for communicating transactions
could be equally beneficial for all approaches. Stabilizers [14] add transactional
support for fault-tolerance in the presence of transient faults but do not directly
address concensus scenarios such as the SNO example.
This paper presented TCML, a simple functional language with build-in support for consensus via communicating transactions. This is a construct with a
15
robust behavioral theory supporting its use as a programming language abstraction for automatic error recovery [13, 2]. TCML has a simple operational
semantics and can simplify the programming of advanced consensus scenarios;
we introduced such an example (SNO) which has a natural encoding in TCML.
The usefulness of communicating transactions in real-world applications,
however, depends on the invention of efficient implementations. This paper described the obstacles we need to overcome and our first results in a recently
started project on developing such implementations. We gave a framework to
develop and evaluate current and future runtime schedulers of communicating
transactions and used it to examine schedulers which are based solely on runtime
heuristics. We have found that some heuristics improve upon the performance
of a naive randomized implementation but do not scale to programs with significant contention, where an exponential number of alternative computation paths
lead to necessary rollbacks. It is clear that purely dynamic strategies do not lead
to sustainable performance improvements.
In future work we intend to pursue a direction based on the extraction of
information from the source code which will guide the language runtime. This
information will include an abstract model of the communication behavior of
processes that can be used to predict with high probability their future communication pattern. A promising approach to achieve this is the development of
technology in type and effect systems and static analysis. Although the scheduling of communicating transactions is theoretically computationally expensive,
realistic performance in many programming scenarios could be achievable.
References
[1] Bruni, R., Melgratti, H., Montanari, U.: cjoin: Join with communicating transactions. To appear in MSCS
[2] De Vries, E., Koutavas, V., Hennessy, M.: Liveness of communicating transactions.
pp. 392–407. APLAS’10
[3] Donnelly, K., Fluet, M.: Transactional events. pp. 124–135. ICFP ’06
[4] Field, J., Varela, C.A.: Transactors: A programming model for maintaining globally consistent distributed state in unreliable environments. POPL ’05
[5] Harris, T., Marlow, S., Jones, S.P.L., Herlihy, M.: Composable memory transactions. Commun. ACM pp. 91–100 (2008)
[6] Herlihy, M., Shavit, N.: The art of multiprocessor programming. Kaufmann (2008)
[7] Jones, S.P.L., Gordon, A.D., Finne, S.: Concurrent haskell. POPL’96
[8] Kshemkalyani, A.D., Singhal, M.: Distributed Computing: Principles, Algorithms,
and Systems. Cambridge University Press (2008)
[9] Lesani, M., Palsberg, J.: Communicating memory transactions. PPoPP ’11
[10] Marlow, S., Jones, S.P.L., Moran, A., Reppy, J.H.: Asynchronous exceptions in
haskell. PLDI’01
[11] Reppy, J.H.: Concurrent programming in ML. Cambridge University Press (1999)
[12] Spaccasassi, C.: Transactional concurrent ml. Tech. Rep. TCD-CS-2013-01
[13] de Vries, E., Koutavas, V., Hennessy, M.: Communicating transactions. pp. 569–
583. CONCUR’10
[14] Ziarek, L., Schatz, P., Jagannathan, S.: Stabilizers: a modular checkpointing abstraction for concurrent functional programs. ICFP ’06
| 6cs.PL
|
Network of Recurrent Neural Networks
Chao-Ming Wang
arXiv:1710.03414v1 [cs.NE] 10 Oct 2017
School of Software, Beijing Jiaotong University, Beijing, China
[email protected]
Abstract
We describe a class of systems theory based neural networks
called “Network Of Recurrent neural networks” (NOR),
which introduces a new structure level to RNN related models. In NOR, RNNs are viewed as the high-level neurons and
are used to build the high-level layers. More specifically,
we propose several methodologies to design different NOR
topologies according to the theory of system evolution. Then
we carry experiments on three different tasks to evaluate our
implementations. Experimental results show our models outperform simple RNN remarkably under the same number of
parameters, and sometimes achieve even better results than
GRU and LSTM.
Introduction
In recent years, Recurrent Neural Networks (RNNs) (Elman
1990) have been widely used in Natural Language Processing (NLP). Traditionally, RNNs are directly used to build the
final models. In this paper, we propose a novel idea called
“Network Of Recurrent neural networks” (NOR) which utilizes existing basic RNN layers to make the structure design
of the higher-level layers. From a standpoint of systems theory (Von Bertalanffy 1968; Von Bertalanffy 1972), a recurrent neural network is a group or an organization made up of
a number of interacting parts, and it actually is viewed as a
complex system, or a complexity. Dialectically, every system
is relative: it is not only the system of its parts, but also the
part of a larger system. In NOR structures, RNN is viewed
as the high-level neuron, and several high-level neurons are
used to build the high-level layers rather than directly used
to construct the whole models.
Conventionally, there are three levels of structure in Deep
Neural Networks (DNNs): neurons, layers and whole nets
(or called models). From a perspective of systems theory,
at each level of such increasing complexity, novel features
that do not exist at lower levels emerge (Lehn 2002). For
example, at the neurons level, single neuron is simple and
its generalization capability is very poor. But when a certain number of such neurons are accumulated into a certain
elaborate structure by certain ingenious combinations, the
layers at the higher level begin to get the unprecedented ability of classification and feature learning. More importantly,
Copyright c 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
such new gained capability or property is deducible from
but not reducible to constituent neurons of lower levels. It’s
not a property of the simple superposition of all constituent
neurons, and the whole is greater than the sum of the parts.
In systems theory, such kind of phenomenon is known as
whole emergence (Wierzbicki 2015). Whole emergence often comes from the evolution of the system (Arthur and others 1993), in which a system develops from the lower level
to the higher level, from simplicity to complexity. In this
paper, the motivation of NOR structures is to introduce a
new structure level to RNN-related networks by transferring
traditional RNN from the system to the agent and from the
outer dimension to the inner dimension (Fromm 2004).
In 1993, W. Brian Arthur (Arthur and others 1993) has
identified three mechanisms by which complexity tends to
grow as systems evolve:
• Mechanism 1: increase in co-evolutionary diversity. The
agent in the system seem to be a new instance of agent
class, type or species. As a result, the system seems to
have new external agent types or capabilities.
• Mechanism 2: increase in structural sophistication. The
individual system steadily accumulates increasing numbers of new systems or parts. Thus, newly formed system
seems to have new internal subsystems or capabilities.
• Mechanism 3: increase by “capturing software”. The
system capture simpler elements and learns to “program”
these as “software” to be used as its own ends.
In this paper, with the guidance of first two mechanisms,
we introduce two methodologies to NOR structures design,
which are named as aggregation and specialization. Aggregation and specialization are natural operations for increasing complexity in complex systems (Fromm 2004). The former is related to Arthur’s second mechanism, in which traditional RNNs are aggregated and accumulated into a highlevel layer in accordance with a specific structure, and the
latter is related to Arthur’s first mechanism, in which the
RNN agent in a high-level layer is specialized as the RNN
agent that performs a specific function.
We make several implementations and carry out experiments on three different tasks, including sentiment classification, question type classification and named entity recognition. Experimental results show that our models outperform constitute simple RNN remarkably with the same num-
ber of parameters and achieve even better results than GRU
and LSTM sometimes.
Background
Systems Theory Systems Theory was originally proposed
by biologist Ludwig Von Bertalanffy (Von Bertalanffy 1968;
Von Bertalanffy 1972) for biological phenomena. In biology systems, there are several different levels which begin
with the smallest units of life and reach to the largest and
most extensive category: molecule, cell, tissue, organ, organ system, organization etc. Traditionally, a system could
be decomposed into its individual components so that each
component could be analyzed as an independent entity, and
components could be added in a linear fashion to describe
the totality of the system (Walonick 1993). However, Von
Bertalanffy argued that we cannot fully comprehend a phenomenon by simply breaking it down into elementary parts
and then reforming it. We instead need to apply a global and
systematic perspective to underline its functionality (Mele,
Pels, and Polese 2010), because a system is characterized
by the interactions of its components and the nonlinearity of
those interactions (Walonick 1993).
Whole Emergence In systems theory, the phenomenon
(i.e., the whole is irreducible to its parts) is known as emergence or whole emergence (Wierzbicki 2015). Emergence
can be qualitatively described as: the whole is greater than
the sum of the parts (Upton, Janeka, and Ferraro 2014). Or
it can also be quantitatively expressed as:
n
X
W >
pi
(1)
arbitrary sequences of inputs. Formally, given a sequence
of vectors {xt }t=1···T , the equation of Simple RNN (Elman
1990) is:
ht = f (W xt + U ht−1 )
(2)
where W and U are parameter matrices, and f denotes a
nonlinearity function such as tanh or ReLU. For simplicity,
the neuron biases are omitted from the equation.
Actually, RNNs can behave chaotically. There have
been some works analysing RNNs theoretically or experimentally from the perspective of systems theory. (Sontag
1997) provided an exposition of research regarding systemtheoretic aspects of RNNs with sigmoid activation functions.
(Bertschinger and Natschläger 2004) analyzed the computation at the edge of chaos in RNNs and calculated the critical
boundary in parameter space where the transition from ordered to chaotic dynamics takes place. (Pascanu, Mikolov,
and Bengio 2013) employed a dynamical systems perspective to understand the exploding gradients and vanishing gradients problems in RNNs. In this paper, we obtain methodologies from systems theory to conduct structure designs of
RNN related models.
Network of Recurrent Neural Networks
Overall Architecture
i
where W is the whole of the system and consists of n parts,
and {pi }i=1···n is the i-th part. In 1972, Philip W. Anderson
highlighted the idea of emergence in has article “More is
Different” (Anderson 1972) in which he stated that a change
of scale very often causes a qualitative change in the behavior of the system. For example, in human brains, when one
examines a single neuron, there is nothing that suggests conscious. But a collection of millions of neurons is clearly able
to produce wonderful consciousness.
The mechanisms behind the emergence of complexity
can be used to design neural network structures. One
of the widely accepted reasons is the repeated application
and combination of two complementary forces or operations: stretching and folding (in Physics term (Thompson
and Stewart 2002)), splitting and merging (in Computer Science term (Hannebauer 2002)), or specialization and cooperation (in Sociology term). Merging or aggregating of agents
means generally a number of (sub-)agents is aggregated or
conglomerated into a single agent. Splitting or specializing
means the agents are clearly separated from each other and
each agent is constrained to a certain class or role (Fromm
2004).
Recurrent Neural Networks at the Edge of Chaos Recurrent Neural Networks (RNNs) (Werbos 1988; Elman
1990) are a class of deep neural networks that possess internal short-term memory due to recurrent feed-back connections between units, which makes them be able to process
Figure 1: Overview of NOR structure.
As the high-level illustration shown in Figure 1, NOR architecture is a three-dimensional spatial-temporal structure.
We summarize NOR architecture as four components: I, M,
S and O, in which component I (input) and O (output) control the head and tail of NOR layer, component S (subnetworks) is in charge of the spatial extension and component
M (memories) is responsible for the temporal extension of
the whole structure. We describe each component as follows:
Component I: Component I controls the head of NOR architecture. It does data preprocessing tasks and distributes
processed input data to subnetworks. At each time-step
t, the form of upcoming input data xt may be various,
such as one single vector, or several vectors with the multigranularity information, even the feature vectors with noise.
One single vector may be the simplest situation, and the
common solution is copying this vector into n duplicates and
feed each of them into one single subnetwork in the component S. In this paper, the copying method meets our needs
(a) MA-NOR layer.
(b) Another MA-NOR layer.
(c) MS-NOR layer.
(d) SS-NOR layer.
Figure 2: The sectional views of NOR layers at one time-step. “I” means the component I, “O” means the component O, and
“R” means RNN neuron.
and we formalize it as:
{xit }i=1···n
= C(xt )
(3)
in which C means copy function, and xit will be fed into i-th
subnetwork.
Component M: Component M manages all memories
over the whole layer, not only internal but also external
memories (Weston, Chopra, and Bordes 2014). But in this
paper, component M only considers internal memory and do
not apply any extra processing to the individual memory of
each RNN neuron. That is:
mjt = I(ojt−1 )
(4)
where I means identity function, the superscript j is the
identifier of j-th RNN neuron 1 , mjt is the memory of jth RNN neuron at time-step t and ojt−1 is the transformation
output of j-th RNN neuron at time-step t − 12 .
Component S: Component S is made up of several different or same subnetworks. Interaction may exist in these
subnetworks. The responsibility of component S is to manage the logic of each subnetwork and handle the interaction
between them. Suppose component S has n in-degree and
m out-degree, i.e., component S receives n inputs and produces m outputs, the k-th output is generated by necessary
inputs and memories:
skt = f ([X, M ])
(5)
where skt is the k-th output at time-step t, X and M are
needed inputs and memories, and f is the nonlinear function
which can be one-layer RNN or two-layer RNN etc.
Component O: To form a layer we need a certain amount
of neurons. So one of the NOR properties is multiple RNNs.
A natural approach to integrate multiple RNN neurons’ signals is collecting all outputs first and then using a MLP layer
to measure the weights of each outputs. Traditional neuron
outputs a single real value, so the collection method is directly arranging them into a vector. But RNN neurons is different, for each of them outputs a vector not a value. A simple method is concatenating all vectors and then connecting
1
The notation of the “subnetwork” is different from the “neuron”, for one subnetwork may be composed of several neurons. We
use superscript i as the identifier of the subnetwork. So, the input
data of i-th subnetwork at time-step t is denoted as xit .
2
In this paper, we just use simple RNN (Elman 1990) applied
with ReLU activation as our basic RNN neuron. Thus the memory
at this time-step is just the output at last time-step.
the concatenated vector to the next MLP. Another is pooling
each RNN output vector into a real value, then arranging all
these real values into a vector, which seems same as traditional neurons. In this paper, the former solution is used and
formalized as:
st = [s1t ; s2t ; · · · ; sm
t ]
ot = r(WM LP ∗ st )
(6)
(7)
where st is the concatenated vector, WM LP is the weight of
MLP and r means the ReLU activation function of MLP.
Methodology I: Aggregation
Any operation with changing a boundary can cause a emergence of complexity. The natural boundary is the agent itself, and sudden emergence of complexity is possible at this
boundary if complexity is transfered from the agent to the
system or vice versa from the system to the agent. There
are two basic operations, aggregation and specialization, that
can be used to transfer complexity between different dimensions (Fromm 2004).
According to Arthur’s second mechanism, internal complexity can be increased by aggregation and composition of
sub-agents, which means a number of RNN agents is conglomerated into a single big system. In this way, aggregation
and composition transfer traditional RNN from the outer to
the inner dimension, from the system to the agent, for the
selected RNNs are accumulated to become a part of a larger
group.
For a concrete NOR layer, suppose it is composed of n
subnetworks, and i-th subnetwork is made up of k i RNN
neurons. Then, at the time-step t, given the input xt , the
operation flow is as follows:
1. Component I: copy xt into n duplications using equation
(3), then we get x1t , x2t , · · · , xnt .
2. Component M: deliver the memory of each RNN neuron from the last time-step to the current time-step using
1,k1
equation (4), then we get memories m1,1
in
t , · · · , mt
2,1
2,k2
first subnetwork and memories mt , · · · , mt
in second subnetwork, etc.
3. Component S: for each subnetwork i, take advantage of
i,ki
the input xit and memories mi,1
to get the nont , · · · , mt
linear transformation output:
i
i,k
sit = f ([xit , mi,1
t , · · · , mt ])
then, we get s1t , s2t , · · · , snt .
(8)
4. Component O: concatenate all outputs by equation (6)
and use a MLP function to determine how much signals
in each subnetwork to flow through the component O by
equation (7).
Obviously, the number, the type and the interaction of the
aggregated RNNs determine the internal structure or inner
complexity of the newly formed layer system. Thus, we propose three kinds of topologies of NOR aggregation method.
Multi-Agent In systems theory, the natural description of
complex system is the multi-agent system created by replication and adaptation. “Replication” means to copy and reproduce a new RNN agent, and “adaptation” means they are
not totally same and some changes on weights or somewhere
else by variation can increase the diversity of the system.
As shown in Figure 2(a), there is a NOR layer (called MANOR) composed of four parallel RNNs. Figure 3 shows this
layer being unrolled into a full network. Each subnetwork
of MA-NOR layer is a one-tier RNN, thus at time-step t, the
i-th subnetwork of component S in MA-NOR is calculated
as:
sit = oit = r(Wi xit + Ui mit )
(9)
where r means ReLU activation function, Wi and Ui are parameters of corresponding RNN neuron, oit is the nonlinear
transformation output and will be delivered to next time-step
to be used as mit+1 , and sit is the output of i-th subnetwork
which is equal to oit .
Figure 4: The unfolding of MS-NOR in three time-steps.
introduce new agent type to the system and can learn sequence dependencies in different timescales.
Figure 2(c) shows a NOR layer made up of four subnetworks, in which two of them are one-tier RNNs and the others are two-tier RNNs. Two kinds of timescale dependencies are learned in component S, which are formalized as
follows:
s1t =o1t = r(Wt1 x1t + Ut1 m1t )
(12)
s2t
(13)
s3t
s4t
=o2t = r(Wt2 x2t + Ut2 m2t )
ot3,1 = r(Wt3,1 x3t + Ut3,1 m3,1
t )
3,2 3,2
3,2 3,1
3,2
=ot = r(Wt ot + Ut mt )
ot4,1 = r(Wt4,1 x4t + Ut4,1 m4,1
t )
4,2
4,2 4,1
4,2 4,2
=ot = r(Wt ot + Ut mt )
(14)
(15)
(16)
(17)
Self-Similarity The above mentioned aggregation and
composition operation lead to big RNN agent-groups. While
in turn, they can also be combined to form even bigger
group. Such repeated aggregation and high accumulation
makes the fractal and self-similar structure come into being.
Figure 3: The unfolding of MA-NOR in three time-steps.
The nonlinear function in equation (5) of each subnetwork
may be more complex. For example, Figure 2(b) shows a
NOR layer made up of three two-tier RNNs. At time-step t,
the i-th subnetwork in component S is calculated as
i,1 i
i,1 i,1
oi,1
t = r(Wt xt + Ut mt )
sit
=oi,2
t
=
r(Wti,2 xit
+
Uti,2 mi,2
t )
(10)
(11)
Multi-Scale The combination of multiple RNNs in a
Multi-Agent NOR layer makes it somewhat like an ensemble. And empirically, diversity among the members of a
group of agents is deemed to be a key issue in ensemble
structure (Kuncheva and Whitaker 2003). One way to increase the diversity is to use the Multi-Scale topology which
Figure 5: The unfolding of SS-NOR in three time-steps.
As shown in Figure 2(d), we also use three paths. But
after each path first learns its own intermediate represen-
tation, the second layers gather all intermediate representations of three paths to learn high-level abstract features.
In this way, different paths do not learn and train independently. The connections among each other helps the model
easy to share informations. Thus, it becomes possible that
the whole model learns and trains to be an organic rather
than parallel independent structure. We formalize the cooperation of component S as follows:
o1,1
= r(Wt1,1 x1t + Ut1,1 m1,1
t
t )
s1t
s2t
s3t
o2,1
t
o3,1
t
1,2
=ot
=o2,2
t
=o3,2
t
=
=
=
=
=
r(Wt2,1 x2t + Ut2,1 m2,1
t )
3,1 3
3,1 3,1
r(Wt xt + Ut mt )
2,1 3,1
r(Wt1,2 [o1,1
t , ot , ot ] +
2,1 3,1
r(Wt2,2 [o1,1
t , ot , ot ] +
2,1 3,1
r(Wt3,2 [o1,1
t , ot , ot ] +
(18)
(19)
(20)
Ut1,2 m1,2
t )
2,2 2,2
Ut mt )
Ut3,2 m3,2
t )
(21)
Figure 6: Gate Specialization.
(22)
(23)
Methodology II: Specialization
We have mentioned that the emergence of complexity is usually connected to a transfer of complexity, a transfer at the
boundary of the system. Aggregation and composition transfer complexity from the system to the agent, and from the
outer dimension to the inner dimension. Another way to be
used to cross the agent boundary is the specialization or inheritance, which transfer complexity from the agent to the
system, and from the inner dimension to the outer dimension (Fromm 2004). Specialization is related to Arthur’s first
mechanism. It increases structural sophistication outside of
the agent by adding new agent forms. Through inheritance
and specialization objects become objects of a certain class
and agents become agents of a certain type, and the more
such an agent becomes a particular class or type, the more it
needs to delegate special tasks that it can not handle alone to
other agents (Fromm 2004).
The effect of specialization is the emergence of delegation
and division of labor in the newly formed groups. Thus, the
formalization of k-th output in Component S can be rewritten as the following:
skt = g(f1 ([X, M ]), f2 ([X, M ]), · · · , fL ([X, M ])) (24)
where fl is the l-th specialized agent function, g means the
cooperation of all specialized agents, and L is the number
of specialized agents. Equation (24) denotes the function f
in equation (5) is implemented by the separated operations
f1 , f2 , · · · , fL and g.
Gate-Specialization We see gate mechanism is one of the
specialization methods. As shown in Figure 6, a general
RNN agent is separated into two specialized RNN agents,
one is for gate duty and the other is for generalization duty.
A concrete Gate-NOR is shown in Figure7. In the original
Multi-Agent NOR layer, each RNN agent is specialized as
one generalization specific RNN and one gate specific RNN.
Figure 7: The sectional views of Gate-NOR layer at one
time-step.
We formalize it as:
o1t = σ(Wt1 x1t + Ut1 m1t )
(25)
o2t
s1t
o3t
o4t
s2t
(26)
=
=
=
=
=
r(Wt2 x2t + Ut2 m2t )
o1t o2t
σ(Wt3 x3t + Ut3 m3t )
r(Wt4 x4t + Ut4 m4t )
o3t o4t
where σ denotes the sigmoid activation and
element-wise multiplication.
(27)
(28)
(29)
(30)
denotes
Relationship with LSTM and GRU We see Long Shortterm Memory (LSTM) (Hochreiter and Schmidhuber 1997)
and Gated Recurrent Unit (GRU) (Chung et al. 2014) as two
special cases of Network of Recurrent neural networks. Take
LSTM for example, at time-step t, given input xt and previous memory cell ct−1 and hidden state ht−1 , the transition
equations of standard LSTM can be expressed as the following:
i = σ(Wi xt + Ui ht−1 )
f = σ(Wi xt + Uf ht−1 )
o = σ(Wo xt + Uo ht−1 )
g = tanh(Wg xt + Ug ht−1 )
ct = ct−1 f + g i
st = tanh(ct ) o
(31)
(32)
(33)
(34)
(35)
(36)
From the perspective of NOR (Network of Recurrent Neural
Networks), LSTM is made up of four RNNs, in which three
Task
Sentiment Classification
Question classification
Named Entity Recognition
# of Params.
200 k
400 k
800 k
100 k
200 k
400 k
200 k
400 k
800 k
IRNN
212
320
468
198
319
497
197
319
497
GRU
107
166
252
86
148
244
86
148
244
LSTM
88
139
213
68
119
199
67
119
199
MA-NOR
89
136
203
74
122
193
74
122
193
MS-NOR
66
100
149
54
88
139
54
88
139
SS-NOR
61
90
132
53
83
126
53
83
126
Gate-NOR
61
97
149
45
79
133
45
79
133
Table 1: Number of hidden neurons for RNN, GRU, LSTM MA-NOR, MS-NOR, SS-NOR and Gate-NOR for each network
size specified in terms of the number of parameters (weights).
of four (i.e., i, f , o RNNs) are specialized for gate tasks to
control how much of informations let through in different
parts. Moreover, there is only a shared memory ht−1 which
can be accessed by each RNN cell in LSTM.
While in turn, LSTM and GRU can also be combined to
form even bigger group.
Experiments
In order to evaluate the performance of the presented model
structures, we design experiments on the following tasks:
sentiment classification, question type classification and
named entity recognition. We compare all models under the
comparable parameter numbers to validate the capacity of
better utilizing the parametric space. In order to verify the
effectiveness and universality of the experiments, we conduct three comparative tests under total parameters of different orders of magnitude, see Table 1. Every experiment
is repeated 20 times with different random initializations and
then we report the mean results. It’s worthy noting that our
aim here is to compare the model performance under the
same hyper-parameter settings, not to achieve best performance for one single model.
(Le, Jaitly, and Hinton 2015) showed that when initializing the recurrent weight matrix to be the identity matrix
and biases to be zero, simple RNN composed of ReLU activation function (named as IRNN) can be comparable with
even outperform LSTM. In our experiments, all basic RNN
neurons are simple RNNs applied with ReLU function. We
also keep the number of the hidden units same over all RNN
neurons in a NOR model. Obviously, our baseline model is a
single giant simple RNN (Elman 1990) applied with ReLU
activation. At the same time, two improved RNNs (GRU
(Chung et al. 2014) and LSTM (Hochreiter and Schmidhuber 1997)) have been widely and successfully used in NLP
in recent years, so we also choose them as our baseline models.
The pre-trained 300-D Glove 6B vectors3 and 300-D
Google News vectors4 were obtained for the word embeddings. During training we fix all word embeddings and
learn only the other parameters in all models. The embeddings for out-of-vocabulary words are set to zero vectors.
We pad or crop the input sentences to a fixed length. The
3
4
https://nlp.stanford.edu/projects/glove/
https://code.google.com/archive/p/word2vec/
trainings are done through stochastic gradient optimizer descent over shuffled mini-batches with the optimizer Adam
(Kingma and Ba 2014). All models are regularized by using
dropout (Srivastava et al. 2014) method. At the same time,
in order to avoid overfitting, early stopping is applied to
prevent unnecessary computation when training. More details on hyper-parameters setting can be found in our codes,
which are publicly available at ‡.
Sentiment Classification
We evaluate our models on the task of sentiment classification on the popular Stanford Sentiment Treebank (SST)
benchmark (Socher et al. 2013), which consists of 11855
movie reviews and is split into train (8544), dev (1101) and
test (2210). SST provides detailed phrase-level annotation
and all sentences along with the phrases are annotated with
5 labels: very positive, positive, neural, negative, and very
negative. In our experiments, we only use the sentence-level
annotation. One of our goals is to avoid expensive phraselevel annotation, like (Qian, Huang, and Zhu 2016). Another is, in practice, phrase-level annotation is hard to provide.
All models use the same architecture: embedding layer →
dropout layer → RNN/NOR layer → RNN/NOR layer →
max-pooling layer → dropout Layer → softmax layer. The
first layer is the word embedding layer, next are two-layer
RNN/NOR layers as the non-linear feature transformation
layer. Then a max-pooling layer max-pools all transformed
feature vectors by selecting the max value in each position
to get sentence representation. Finally, a softmax layer is
used as output layer to get the final result. To benefit from
the regularization, two dropout layers with rate of 0.5 are
added after embedding layer and before softmax layer. The
initial learning rates of all models are set to 0.0002. We
use public available 300-D Glove 840B vectors to initialize
word embeddings. Three different network sizes are tested
for each architecture, such that the number of parameters
are roughly 200 k, 400 k and 800 k (see Table 1). We set
the minibatch size as 20. Finally, we use the Cross-Entropy
criterion as loss function.
The results of the experiments are shown in Table 2. It is
obvious that NOR models get superior performances compared with IRNN baseline, especially when the network size
is big enough. All models improve with network size grows.
Among all NOR models, Gate-NOR gets the best results.
Model
IRNN
GRU
LSTM
MA-NOR
MS-NOR
SS-NOR
Gate-NOR
200k Params
44.30
47.27
46.98
45.17
44.83
44.54
44.95
400k Params
44.43
47.35
47.19
45.24
45.51
45.21
45.80
800k Params
45.28
47.65
47.37
45.37
45.59
45.42
46.06
Table 2: Accuracy (%) comparison over different experiments on SST corpus.
However, we find that LSTM and GRU get much better results in three comparative tests.
2003) which consists of 14987 sentences in the training set,
3466 sentences in the validation set and 3684 sentences in
the test set.
Model
IRNN
GRU
LSTM
MA-NOR
MS-NOR
SS-NOR
Gate-NOR
200k Params
85.07
83.97
84.95
85.96
85.51
86.06
85.67
400k Params
85.52
84.13
85.70
86.17
86.10
86.20
85.89
800k Params
85.58
85.05
86.18
86.18
86.21
86.33
86.21
Table 4: F1 (%) comparison over different experiments on
CoNLL-2003 corpus.
Question Type Classification
Question classification is an important step in a question answering system which classifies a question into a specific
type. For this task, we use TREC (Li and Roth 2002) benchmark, which divides all questions into 6 categories: location,
human, entity, abbreviation, description and numeric. TERC
provides 5452 labeled questions in the training set and 500
questions in the test. We randomly select 10% of the training
data as the validation set.
Model
IRNN
GRU
LSTM
MA-NOR
MS-NOR
SS-NOR
Gate-NOR
100k Params
92.73
91.83
91.44
92.73
92.85
93.19
92.77
200k Params
93.22
92.54
92.46
93.56
93.79
93.62
93.35
400k Params
93.62
93.64
93.10
93.73
94.04
94.12
93.81
Table 3: Accuracy (%) comparison over different experiments on TREC corpus.
All network types use the same architecture: embedding
layer → dropout layer → RNN/NOR layer → max-pooling
layer → dropout layer → softmax layer. Dropout rates are
set to 0.5. Three hidden layer sizes are chosen such that the
total number of parameters for the whole model is roughly
100 k, 200 k, 400 k, see Table 1. All networks use a learning
rate of 0.0005 and are trained to minimize the Cross Entropy
Error.
Table 3 shows the accuracy of the different networks on
the question type classification task. Here again, NOR models get better results than baseline IRNN model. Among
all NOR models, SS-NOR also gets the best result. In this
dataset, we find the performances of LSTM and GRU are
even not comparable with IRNN, which proves the validity
of results in (Le, Jaitly, and Hinton 2015).
Named Entity Recognition
Named entity recognition (NER) is a classic NLP task which
tries to identity the proper names of persons, organizations,
locations, or other entities in the given text. We experiment
on CoNLL-2003 dataset (Tjong Kim Sang and De Meulder
Recently, popular NER models are based on bidirectional
LSTM (Bi-LSTM) combined with conditional random fields
(CRF), named as Bi-LSTM-CRF (Lample et al. 2016). The
Bi-LSTM-CRF networks can effectively use past and future features via a Bi-LSTM layer and sentence level tag
information via a CRF layer. In our experiments, we also
adapt this architecture by replacing LSTM with NORs or
other variation of RNNs. So the universal architecture of all
tested models is: embedding layer → dropout layer → BiRNN/Bi-NOR layer → CRF layer. Three hidden layer sizes
are chosen such that the total number of parameters for the
whole network is roughly 200 k, 400 k and 800 k, see Table 1. We apply 50% dropout after embedding layer. Initial
learning rate is set to 0.005 and every epoch it is reduced
by factor 0.95. The size of each minibatch is 20. We train
all networks for 25 epochs and early stop the training when
there are 5 epochs no improvement on validation set.
Our results are summarized in the Table 4. Not surprisingly, all NORs perform much better than giant single RNNReLU model. As we can see, GRU performs the worst, followed by IRNN. Compared to GRU and IRNN, LSTM performs very well, especially when network size grows up. At
the same time, all NOR models get superior performances
than IRNN, GRU and LSTM. Among them, SS-NOR model
get best results.
Conclusion
In conclusion, we introduced a novel kind of systems theory
based neural networks called “Network Of Recurrent neural network” (NOR) which views existing RNNs (for example, simple RNN, GRU, LSTM) as high-level neurons
and then utilizes RNN neurons to design higher-level layers.
Then we proposed several methodologies to design different NOR topologies according to the evolution of systems
theory (Arthur and others 1993). We conducted experiments
on three kinds of tasks (including sentiment classification,
question type classification and named entity recognition) to
evaluate our proposed models. Experimental results demonstrated that NOR models get superior performances compared with single giant RNN models, and sometimes their
performances even exceed GRU and LSTM.
References
[Anderson 1972] Anderson, P. W. 1972. More is different.
Science 177 4047:393–6.
[Arthur and others 1993] Arthur, W. B., et al. 1993. On the
evolution of complexity. Technical report.
[Bertschinger and Natschläger 2004] Bertschinger, N., and
Natschläger, T. 2004. Real-time computation at the edge
of chaos in recurrent neural networks. Neural computation
16(7):1413–1436.
[Chung et al. 2014] Chung, J.; Gulcehre, C.; Cho, K.; and
Bengio, Y. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint
arXiv:1412.3555.
[Elman 1990] Elman, J. L. 1990. Finding structure in time.
Cognitive science 14(2):179–211.
[Fromm 2004] Fromm, J. 2004. The emergence of complexity. Kassel university press Kassel.
[Hannebauer 2002] Hannebauer, M. 2002. Autonomous dynamic reconfiguration in multi-agent systems: improving
the quality and efficiency of collaborative problem solving.
Springer-Verlag.
[Hochreiter and Schmidhuber 1997] Hochreiter, S., and
Schmidhuber, J. 1997. Long short-term memory. Neural
computation 9(8):1735–1780.
[Kingma and Ba 2014] Kingma, D., and Ba, J. 2014. Adam:
A method for stochastic optimization. arXiv preprint
arXiv:1412.6980.
[Kuncheva and Whitaker 2003] Kuncheva, L. I., and
Whitaker, C. J. 2003. Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy.
Machine learning 51(2):181–207.
[Lample et al. 2016] Lample, G.; Ballesteros, M.; Subramanian, S.; Kawakami, K.; and Dyer, C. 2016. Neural architectures for named entity recognition. arXiv preprint
arXiv:1603.01360.
[Le, Jaitly, and Hinton 2015] Le, Q. V.; Jaitly, N.; and Hinton, G. E. 2015. A simple way to initialize recurrent networks of rectified linear units. arXiv preprint
arXiv:1504.00941.
[Lehn 2002] Lehn, J.-M. 2002. Toward complex matter:
supramolecular chemistry and self-organization. Proceedings of the National Academy of Sciences 99(8):4763–4768.
[Li and Roth 2002] Li, X., and Roth, D. 2002. Learning
question classifiers. In Proceedings of the 19th international
conference on Computational linguistics-Volume 1, 1–7. Association for Computational Linguistics.
[Mele, Pels, and Polese 2010] Mele, C.; Pels, J.; and Polese,
F. 2010. A brief review of systems theories and their managerial applications. Service Science 2(1-2):126–135.
[Pascanu, Mikolov, and Bengio 2013] Pascanu, R.; Mikolov,
T.; and Bengio, Y. 2013. On the difficulty of training recurrent neural networks. In ICML.
[Qian, Huang, and Zhu 2016] Qian, Q.; Huang, M.; and Zhu,
X. 2016. Linguistically regularized lstms for sentiment classification. arXiv preprint arXiv:1611.03949.
[Socher et al. 2013] Socher, R.; Perelygin, A.; Wu, J. Y.;
Chuang, J.; Manning, C. D.; Ng, A. Y.; Potts, C.; et al. 2013.
Recursive deep models for semantic compositionality over a
sentiment treebank. In Proceedings of the conference on empirical methods in natural language processing (EMNLP),
volume 1631, 1642. Citeseer.
[Sontag 1997] Sontag, E. 1997. Recurrent neural networks:
Some systems-theoretic aspects. In Dealing with Complexity: a Neural Network Approach. Citeseer.
[Srivastava et al. 2014] Srivastava, N.; Hinton, G. E.;
Krizhevsky, A.; Sutskever, I.; and Salakhutdinov, R.
2014. Dropout: a simple way to prevent neural networks
from overfitting. Journal of Machine Learning Research
15(1):1929–1958.
[Thompson and Stewart 2002] Thompson, J. M. T., and
Stewart, H. B. 2002. Nonlinear dynamics and chaos. John
Wiley & Sons.
[Tjong Kim Sang and De Meulder 2003] Tjong Kim Sang,
E. F., and De Meulder, F. 2003. Introduction to the
conll-2003 shared task: Language-independent named entity recognition. In Proceedings of the seventh conference
on Natural language learning at HLT-NAACL 2003-Volume
4, 142–147. Association for Computational Linguistics.
[Upton, Janeka, and Ferraro 2014] Upton, J.; Janeka, I.; and
Ferraro, N. 2014. The whole is more than the sum of
its parts: aristotle, metaphysical. Journal of Craniofacial
Surgery 25(1):59–63.
[Von Bertalanffy 1968] Von Bertalanffy, L. 1968. General
system theory. New York 41973(1968):40.
[Von Bertalanffy 1972] Von Bertalanffy, L. 1972. The history and status of general systems theory. Academy of Management Journal 15(4):407–426.
[Walonick 1993] Walonick, D. S.
1993.
General
systems theory.
Information on http://www. statpac.
org/walonick/systems-theory. htm.
[Werbos 1988] Werbos, P. J. 1988. Generalization of
backpropagation with application to a recurrent gas market
model. Neural Networks 1:339–356.
[Weston, Chopra, and Bordes 2014] Weston, J.; Chopra, S.;
and Bordes, A. 2014. Memory networks. arXiv preprint
arXiv:1410.3916.
[Wierzbicki 2015] Wierzbicki, A. P. 2015. Systems theory,
theory of chaos, emergence. In Technen: Elements of Recent
History of Information Technologies with Epistemological
Conclusions. Springer. 175–188.
| 9cs.NE
|
ON THE SECOND COHOMOLOGY OF NILPOTENT ORBITS IN
EXCEPTIONAL LIE ALGEBRAS
arXiv:1611.02587v1 [math.GR] 8 Nov 2016
PRALAY CHATTERJEE AND CHANDAN MAITY
Abstract. In [BC], the second de Rham cohomology groups of nilpotent orbits in all the complex
simple Lie algebras are described. In this paper we consider non-compact non-complex exceptional
Lie algebras, and compute the dimensions of the second cohomology groups for most of the nilpotent
orbits. For the rest of cases of nilpotent orbits, which are not covered in the above computations,
we obtain upper bounds for the dimensions of the second cohomology groups.
1. Introduction
Let G be a connected real simple Lie group with Lie algebra g. An element X ∈ g is called nilpotent if ad(X) : g → g is a nilpotent operator. Let OX := {Ad(g)X | g ∈ G} be the corresponding
nilpotent orbit under the adjoint action of G on g. Such nilpotent orbits form a rich class of homogeneous spaces, and they are studied at the interface of several disciplines in mathematics such
as Lie theory, symplectic geometry, representation theory, algebraic geometry. Various topological
aspects of such orbits have drawn attention over the years; see [CM], [M] and references therein
for an account. In [BC, Proposition 1.2] for a large class of semisimple Lie groups a criterion is
given for the exactness of the Kostant-Kirillov two form on arbitrary adjoint orbits which in turn
led the authors asking the natural question of describing the full second cohomology groups of
such orbits. Towards this, in [BC], the second cohomology groups of nilpotent orbits in all the
complex simple Lie algebras, under the adjoint actions of the corresponding complex groups, are
computed. In this paper we continue the program of studying the second cohomology groups of
nilpotent orbits which was initiated in [BC]. We compute the second cohomology groups for most
of the nilpotent orbits in non-compact non-complex exceptional Lie algebras, and for the rest of
the nilpotent orbits in non-compact non-complex exceptional Lie algebras we give upper bounds
of the dimensions of second cohomology groups; see Theorems 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9,
3.10, 3.11, 3.12, 3.13. In particular, our computations yield that the second cohomologies vanish
for all the nilpotent orbits in F4(−20) and E6(−26) .
2. Notation and background
In this section we fix some general notation, and mention a basic result which will be used in
this paper. A few specialized notation are defined as and when they occur later.
The center of a Lie algebra g is denoted by z(g). We denote Lie groups by capital letters, and
unless mentioned otherwise we denote their Lie algebras by the corresponding lower case German
letters. Sometimes, for convenience, the Lie algebra of a Lie group G is also denoted by Lie(G).
The connected component of a Lie group G containing the identity element is denoted by G◦ . For
a subgroup H of G and a subset S of g, the subgroup of H that fixes S point wise is called the
centralizer of S in H and is denoted by ZH (S). Similarly, for a Lie subalgebra h ⊂ g and a subset
2010 Mathematics Subject Classification. 57T15, 17B08.
Key words and phrases. Nilpotent orbits, Exceptional Lie algebras, Second cohomology.
1
2
P. CHATTERJEE AND C. MAITY
S ⊂ g, by zh (S) we will denote the subalgebra consisting elements of h that commute with every
element of S.
If G is a Lie group with Lie algebra g, then it is immediate that the coadjoint action of G◦
on z(k)∗ is trivial; in particular, one obtains a natural action of G/G◦ on z(k)∗ . We denote by
◦
[z(g)∗ ]G/G the space of fixed points of z(g)∗ under the action of G/G◦ .
For a real semisimple Lie group G, an element X ∈ g is called nilpotent if ad(X) : g → g is
a nilpotent operator. A nilpotent orbit is an orbit of a nilpotent element in g under the adjoint
representation of G; for a nilpotent element X ∈ g the corresponding nilpotent orbit Ad(G)X is
denoted by OX .
For a g be a Lie algebra over R a subset {X, H, Y } ⊂ g is said to be sl2 (R)-triple if X 6= 0,
[H, X] = 2X, [H, Y ] = −2Y and [X, Y ] = H. It is immediate that, if {X, H, Y } ⊂ g is a sl2 (R)triple then SpanR {X, H, Y } is a R-subalgebra of g which is isomorphic to the Lie algebra sl2 (R).
We now recall the well-known Jacobson-Morozov theorem (see [CM, Theorem 9.2.1]) which ensures
that if X ∈ g is a non-zero nilpotent element in a real semisimple Lie algebra g, then there exist
H, Y in g such that {X, H, Y } ⊂ g is a sl2 (R)-triple.
To facilitate the computations in §3 we need the following result.
Theorem 2.1. Let G be an algebraic group defined over R which is R-simple. Let X ∈ Lie G(R),
X 6= 0 be a nilpotent element, and OX be the orbit of X under the adjoint action of the identity
component G(R)◦ on Lie G(R). Let {X, H, Y } be a sl2 (R)-triple in Lie G(R). Let K be a maximal
compact subgroup in ZG(R)◦ (X, H, Y ), and M be a maximal compact subgroup in G(R)◦ containing
K. Then
◦
H 2 (OX , R) ≃ [(z(k) ∩ [m, m])∗ ]K/K .
In particular, dimR H 2 (OX , R) ≤ dimR z(k).
The above theorem follows from [CM, Lemma 3.7.3] and a description of the second cohomology
groups of homogeneous spaces which generalizes [BC, Theorem 3.3]. The details of the proof of
Theorem 2.1 and the generalization of [BC, Theorem 3.3], mentioned above, will appear elsewhere.
3. The second cohomology groups of nilpotent orbits
In this section we study the second cohomology of the nilpotent orbits in non-compact noncomplex exceptional Lie algebras over R. The results in this section depend on the results of [D1,
Tables VI-XV], [D2, Tables VII-VIII] and [K, Tables 1-12]. We refer to [CM, Chapter 9], [D1]
and [D2] for the generalities required in this section. We begin by recalling the parametrization of
nilpotent orbits in this set-up.
3.1. Parametrization of nilpotent orbits in exceptional Lie algebras
We follow the parametrization of nilpotent orbits in non-compact non-complex exceptional Lie
algebras as given in [D1, Tables VI-XV] and [D2, Tables VII-VIII]. We consider the nilpotent orbits
in g under the action of Int g, where g is a non-compact non-complex real exceptional Lie algebra.
We fix a semisimple algebraic group G defined over R such that g = Lie(G(R)). Here G(R) denotes
the associated real semisimple Lie group of the R-points of G. Let G(C) be the associated complex
semisimple Lie group consisting of the C-points of G. It is easy to see that orbits in g under the
action of Int g are the same as the orbits in g under the action of G(R)◦ . Thus in this set-up, for
a nilpotent element X ∈ g, we set OX := {Ad(g)X | g ∈ G(R)◦ }. Let g = m + p be a Cartan
decomposition and θ be the corresponding Cartan involution. Let gC be the Lie algebra of G(C).
Then gC can be identified with the complexification of g. Let mC , pC be the C-spans of m and p
in gC , respectively. Then gC = mC + pC . Let MC be the connected subgroup of G(C) with Lie
ON THE NILPOTENT ORBITS IN LIE ALGEBRAS
3
algebra mC . Recall that, if g is as above and g is different from both E6(−26) and E6(6) , then g is
of inner type, or equivalently, rank mC = rank gC . When g is of inner type, the nilpotent orbits
are parametrized by a finite sequence of integers of length l where l := rank mC = rank gC . When
g is not of inner type, that is, when g is either E6(−26) or E6(6) , then the nilpotent orbits are
parametrized by a finite sequence of integers of length 4.
Let X ′ ∈ g be a nonzero nilpotent element, and {X ′ , H ′ , Y ′ } ⊂ g be a sl2 (R)-triple. Then
e H,
e Ye } in g such that θ(H)
e = −H,
e
{X ′ , H ′ , Y ′ } is G(R)-conjugate to another sl2 (R)-triple {X,
e
e
e
e
e
e
e
e
e
e
θ(X) = −Y . Set E := (H − i(X + Y ))/2, F := (H + i(X + Y ))/2 and H := i(X − Y ). Then
{E, H, F } is a sl2 (R)-triple and E, F ∈ pC and H ∈ mC . The sl2 (R)-triple {E, H, F } is then called
a pC -Cayley triple associated to X ′ .
3.1.1. Parametrization in exceptional Lie algebras of inner type. We now recall from [D1, Column
2, Tables VI-XV] the parametrization of non-zero nilpotent orbits in g when g is an exceptional
Lie algebra of inner type. Let hC ⊂ mC be a Cartan subalgebra of mC such that hC ∩ m is a Cartan
subalgebra of m. As g is of inner type, hC is a Cartan subalgebra of gC . Set h := hC ∩ im. Let
R, R0 be the root systems of (gC , hC ), (mC , hC ), respectively. Let B := {α1 , . . . , αl } be a basis of
R. Let Be := B ∪ {α0 } where α0 is the negative of the highest root of (R, B). Then there exists
an unique basis of R0 , say B0 , such that B0 ⊂ Be . Let C0 be the closed Weyl chamber of R0 in
h corresponding to the basis B0 . Let l0 be the rank of [mC , mC ]. Then either l0 = l or l0 = l − 1.
If l0 = l we set B0′ := B0 . If l0 = l − 1 (in this case we have B0 ⊂ B) we set B0′ := B. Clearly,
#B0′ = l. We enumerate B0′ := {β1 , . . . , βl } as in [D1, 7, p. 506 and Table IV]. Let X ∈ g be
a nonzero nilpotent element, and {E, H, F } be a pC -Cayley triple (in gC ) associated to X. Then
Ad(MC )H ∩ C0 is a singleton set, say {H0 }. The element H0 is called the characteristic of the orbit
Ad(MC )E as it determines the orbit MC · E uniquely. Consider the map from the set of nilpotent
orbits in g to the set of integer sequences of length l, which assigns the sequence β1 (H0 ), . . . , βl (H0 )
to each nilpotent orbits OX . In view of the Kostant-Sekiguchi theorem (cf. [CM, Theorem 9.5.1]),
this gives a bijection between the set of nilpotent orbits in g and the set of finite sequences of the
form β1 (H0 ), . . . , βl (H0 ) as above. We use this parametrization while dealing with nilpotent orbits
in exceptional Lie algebras of inner type.
3.1.2. Parametrization in E6(−26) or E6(6) . We now recall from [D2, Column 1, Tables VII-VIII]
the parametrization of non-zero nilpotent orbits in g when g is either E6(−26) or E6(6) . We need a
piece of notation here : henceforth, for a Lie algebra a over C and an automorphism σ ∈ AutC a,
the Lie subalgebra consisting of the fixed points of σ in a, is denoted by aσ . Let now hC be a Cartan
subalgebra of gC (we point out the difference of our notation with that in [D2]; g and h of [D2, §1]
are denoted here by gC and hC , respectively).
Let g = E6(−26) . Let τ be the involution of gC as defined in [D2, p. 198 ] which keeps hC
invariant. Then the subalgebra gτC is of type F4 , and hτC is a Cartan subalgebra of gτC . Let G(C)τ
be the connected Lie subgroup of G(C) with Lie algebra gτC . Let {β1 , β2 , β3 , β4 } be the simple
roots of (gτC , hτC ) as defined in [D2, (1), p. 198]. Let X ∈ E6(−26) be a nonzero nilpotent element.
Let {E, H, F } be a pC -Cayley triple (in gC ) associated to X. Then H ∈ gτC and E, F ∈ g−τ
C . We
may further assume that H ∈ hτC . Then the finite sequence of integers β1 (H), β2 (H), β3 (H), β4 (H)
determine the orbit Ad(G(C)τ ) E uniquely; see [D2, p. 204].
Let g = E6(6) . Let τ ′ be the involution of gC as defined in [D2, p. 199 ] which keeps hC invariant.
′
′
′
′
Then the subalgebra gτC is of type C4 , and hτC is a Cartan subalgebra of gτC . Let G(C)τ be the
′
connected Lie subgroup of G(C) with Lie algebra gτC . Let {β0 , β1 , β2 , β3 } be the simple roots of
′
′
(gτC , hτC ) as defined in [D2, p. 199]. Let X ∈ E6(6) be a nonzero nilpotent element. Let {E, H, F }
′
−τ ′
. We may further
be a pC -Cayley triple (in gC ) associated to X. Then H ∈ gτC and E, F ∈ gC
4
P. CHATTERJEE AND C. MAITY
′
assume that H ∈ hτC . It then follows that the finite sequence of integers β0 (H), β1 (H), β2 (H), β3 (H)
′
determine the orbit Ad(G(C)τ ) E uniquely; see [D2, p. 204].
3.2. Nilpotent orbits of three types
For the sake of convenience of writing the proofs that appear in the later part §3, it will be
useful to divide the nilpotent orbits in the following three types. Let X ∈ g be a nonzero nilpotent
element, and {X, H, Y } be a sl2 (R)-triple in g. Let G be as in the beginning of §3.1. Let K be a
maximal compact subgroup in ZG(R)◦ (X, H, Y ), and M be a maximal compact subgroup in G(R)◦
containing K. A nonzero nilpotent orbit OX in g is said to be of
(1) type I if z(k) 6= 0, K/K ◦ = Id and m = [m, m];
(2) type II if either z(k) 6= 0, K/K ◦ 6= Id, m = [m, m]; or z(k) 6= 0, m 6= [m, m];
(3) type III if z(k) = 0.
In what follows we will use the next result repeatedly.
Corollary 3.1. Let g be a real simple non-compact exceptional Lie algebra. Let X ∈ g be a nonzero
nilpotent element.
(1) If the orbit OX is of type I, then dimR H 2 (OX , R) = dimR z(k).
(2) If the orbit OX is of type II, then dimR H 2 (OX , R) ≤ dimR z(k).
(3) If the orbit OX is of type III, then dimR H 2 (OX , R) = 0.
Proof. The proof of the corollary follows immediately from Theorem 2.1.
Let g be as above. In the proofs of our results in the following subsections we use the description
of a Levi factor of zg (X) for each nilpotent element X in g, as given in the last columns of [D1,
Tables VI-XV] and [D2, Tables VII-VIII]. This enables us compute the dimensions dimR z(k) easily.
We also use [K, Column 4, Tables 1-12] for the component groups for each nilpotent orbits in g.
3.3. Nilpotent orbits in the non-compact real form of G2
Recall that up to conjugation there is only one non-compact real form of G2 . We denote it by
G2(2) . There are only five nonzero nilpotent orbits in G2(2) ; see [D1, Table VI, p. 510]. Note that
in this case we have m = [m, m].
Theorem 3.2. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in G2(2) .
(1) If the parametrization of the orbit OX is given by either 1 1 or 1 3, then dimR H 2 (OX , R)
= 1.
(2) If the parametrization of the orbit OX is given by any of 2 2, 0 4, 4 8, then dimR H 2 (OX , R)
= 0.
Proof. From [D1, Column 7, Table VI, p. 510] we have dimR z(k) = 1 and from [K, Column 4,
Table 1, p. 247] we have K/K ◦ = Id for the nilpotent orbits as in (1). Thus these are of type I.
We refer to [D1, Column 7, Table VI, p. 510] for the orbits as given in (2). These orbits are of
type III as dimR z(k) = 0. In view of the Corollary 3.1 the conclusions follow.
3.4. Nilpotent orbits in non-compact real forms of F4
Recall that up to conjugation there are two non-compact real forms of F4 . They are denoted by
F4(4) and F4(−20) .
ON THE NILPOTENT ORBITS IN LIE ALGEBRAS
5
3.4.1. Nilpotent orbits in F4(4) . There are 26 nonzero nilpotent orbits in F4(4) ; see [D1, Table VII,
p. 510]. Note that in this case we have m = [m, m].
Theorem 3.3. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in F4(4) .
(1) Assume the parametrization of the orbit OX is given by any of the sequences :
001 1, 001 3, 110 2, 111 1, 131 3. Then dimR H 2 (OX , R) = 1.
(2) Assume the parametrization of the orbit OX is given by any of the sequences :
100 2, 200 0, 103 1, 111 3, 204 4. Then dimR H 2 (OX , R) ≤ 1.
(3) If the parametrization of the orbit OX is either 101 1 or 012 2, then dimR H 2 (OX , R) ≤ 2.
(4) If OX is not given by the parametrizations as in (1), (2), (3) above (# of such orbits are
14), then we have dimR H 2 (OX , R) = 0.
Proof. For the Lie algebra F4(4) , we can easily compute dimR z(k) from the last column of [D1,
Table VII, p. 510] and K/K ◦ from [K, Column 4, Table 2, pp. 247-248].
For the orbits OX , as in (1), we have dimR z(k) = 1 and K/K ◦ = Id. Hence these are of type I.
For the orbits OX , as in (2), we have dimR z(k) = 1 and K/K ◦ 6= Id; hence they are of type II. For
the orbits OX , as in (3), we have dimR z(k) = 2 and K/K ◦ 6= Id. Hence these are also of type II.
The rest of the 14 orbits, which are not given by the parametrizations in (1), (2), (3), are of type
III as z(k) = 0. Now the theorem follows from Corollary 3.1.
3.4.2. Nilpotent orbits in F4(−20) . There are two nonzero nilpotent orbits in F4(−20) ; see [D1, Table
VIII, p. 511].
Theorem 3.4. For all the nilpotent elements X in F4(−20) we have dimR H 2 (OX , R) = 0.
Proof. As the theorem follows trivially when X = 0 we assume that X 6= 0. We follow the
parametrization of nilpotent orbits as in §3.1.1. From the last column of [D1, Table VIII, p. 511]
we conclude that z(k) = 0. Hence the nonzero nilpotent orbits are of type III. Using Corollary 3.1
(3) we have dimR H 2 (OX , R) = 0.
3.5. Nilpotent orbits in non-compact real forms of E6
Recall that up to conjugation there are four non-compact real forms of E6 . They are denoted
by E6(6) , E6(2) , E6(−14) and E6(−26) .
3.5.1. Nilpotent orbits in E6(6) . There are 23 nonzero nilpotent orbits in E6(6) ; see [D2, Table VIII,
p. 205]. Note that in this case we have m = [m, m].
Theorem 3.5. Let the parametrization of the nilpotent orbits be as in §3.1.2. Let X be a nonzero
nilpotent element in E6(6) .
(1) If the parametrization of the orbit OX is given by either 1001 or 1101 or 1211, then
dimR H 2 (OX , R) = 1.
(2) Assume the parametrization of the orbit OX is given by any of the sequences :
0102, 0202, 1010, 2002, 1011. Then dimR H 2 (OX , R) ≤ 1.
(3) If OX is not given by the parametrizations as in (1), (2) above (# of such orbits are 15),
then we have dimR H 2 (OX , R) = 0.
Proof. For the Lie algebra E6(6) , we can easily compute dimR z(k) from the last column of [D2,
Table VIII, p. 205] and K/K ◦ from [K, Column 4, Table 4, p.253]. As pointed out in the 1st
paragraph of [K, p. 254], there is an error in row 5 of [D2, Table VIII, p. 205]. Thus when OX is
given by the parametrization 2000 it follows from [K, p. 254] that z(k) = 0.
6
P. CHATTERJEE AND C. MAITY
We have dimR z(k) = 1 and K/K ◦ = Id for the orbits given in (1). Thus these orbits are of type
I. For the orbits, as in (2), we have dimR z(k) = 1 and K/K ◦ = Z2 . Hence, the orbits in (2) are of
type II. For rest of the 15 nonzero nilpotent orbits, which are not given by the parametrizations of
(1), (2), are of type III as dimR z(k) = 0. Now the results follow from Corollary 3.1.
3.5.2. Nilpotent orbits in E6(2) . There are 37 nonzero nilpotent orbits in E6(2) ; see [D1, Table IX,
p. 511]. Note that in this case we have m = [m, m].
Theorem 3.6. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in E6(2) .
(1) Assume the parametrization of the orbit OX is given by any of the sequences :
00000 4, 00200 2, 02020 0, 00400 8, 22222 2, 04040 4, 44044 4, 44444 8.
Then dimR H 2 (OX , R) = 0.
(2) Assume the parametrization of the orbit OX is given by any of the sequences :
10001 2, 10101 1, 21001 1, 10012 1, 11011 2, 01210 2, 10301 1, 11111 3, 22022 0.
Then dimR H 2 (OX , R) = 2.
(3) If the parametrization of the orbit OX is given by either 20002 0 or 00400 0 or 02020 4,
then dimR H 2 (OX , R) ≤ 2.
(4) If the parametrization of the orbit OX is given by 20202 2, then dimR H 2 (OX , R) ≤ 1.
(5) If OX is not given by the parametrizations as in (1), (2), (3), (4) above (# of such orbits
are 16), then we have dimR H 2 (OX , R) = 1.
Proof. For the Lie algebra E6(2) , we can easily compute dimR z(k) from the last column of [D1,
Table IX, p. 511] and K/K ◦ from [K, Column 4, Table 5, pp. 255-256].
We have z(k) = 0 for the orbits, as given in (1), and these orbits are of type III. For the orbits,
as given in (2), we have dimR z(k) = 2 and K/K ◦ = Id. Thus the orbits in (2) are of type I. For the
orbits, as given in (3), we have dimR z(k) = 2 and K/K ◦ 6= Id, hence are of type II. For the orbits,
as given in (4), we have dimR z(k) = 1 and K/K ◦ = Z2 . Thus this orbit is of type II. For the rest
of 16 orbits, which are not given in any of (1), (2), (3), (4), we have dimR z(k) = 1 and K/K ◦ = Id.
Thus these orbits are of type I. Now the conclusions follow from Corollary 3.1.
3.5.3. Nilpotent orbits in E6(−14) . There are 12 nonzero nilpotent orbits in E6(−14) ; see [D1, Table
X, p. 512]. Note that in this case m ≃ so10 ⊕ R, and hence [m, m] 6= m.
Theorem 3.7. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in E6(−14) .
(1) If the parametrization of the orbit OX is given by 40000 − 2, then dimR H 2 (OX , R) = 0.
(2) If OX is not given by the above parametrization (# of such orbits are 11), then we have
dimR H 2 (OX , R) ≤ 1.
Proof. For the Lie algebra E6(−14) , we can easily compute dimR z(k) from the last column of
[D1, Table X, p. 512]. The orbit in (1) is of type III as z(k) = 0, and hence dimR H 2 (OX , R) = 0.
The other 11 orbits are of type II as dimR z(k) = 1 and m 6= [m, m]. Hence dimR H 2 (OX , R) ≤ 1.
3.5.4. Nilpotent orbits in E6(−26) . There are two nonzero nilpotent orbits in E6(−26) ; see [D2, Table
VII, p. 204].
Theorem 3.8. For all the nilpotent element X in E6(−26) we have dimR H 2 (OX , R) = 0.
ON THE NILPOTENT ORBITS IN LIE ALGEBRAS
7
Proof. As the theorem follows trivially when X = 0 we assume that X 6= 0. We follow the
parametrization of the nilpotent orbits as given in §3.1.2. The two nonzero nilpotent orbits in
E6(−26) are of type III as z(k) = 0; see last column of [D2, Table VII, p. 204]. Hence, by Corollary
3.1 (3) we conclude that dimR H 2 (OX , R) = 0.
3.6. Nilpotent orbits in non-compact real forms of E7
Recall that up to conjugation there are three non-compact real forms of E7 . They are denoted
by E7(7) , E7(−5) and E7(−25) .
3.6.1. Nilpotent orbits in E7(7) . There are 94 nonzero nilpotent orbits in E7(7) ; see [D1, Table XI,
pp. 513-514]. Note that in this case we have m = [m, m].
Theorem 3.9. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in E7(7) .
(1) If the parametrization of the orbit OX is given by 1011101, then dimR H 2 (OX , R) = 3.
(2) Assume the parametrization of the orbit OX is given by any of the sequences :
1001001, 1101011, 1111010, 0101111, 2200022, 3101021, 1201013, 1211121, 2204022.
Then dimR H 2 (OX , R) = 2.
(3) Assume the parametrization of the orbit OX is given by any of the sequences :
0100010, 1100100, 0010011, 3000100, 0010003, 0102010, 0200020, 2004002, 2103101,
1013012, 2020202, 1311111, 1111131, 1310301, 1030131, 2220222, 3013131, 1313103,
3113121, 1213113, 4220224, 3413131, 1313143, 4224224.
Then dimR H 2 (OX , R) = 1.
(4) Assume the parametrization of the orbit OX is given by any of the sequences :
2000002, 0101010, 2002002, 1110111, 2020020, 0200202, 1112111, 2022020, 0202202,
2202022, 0220220. Then dimR H 2 (OX , R) ≤ 1.
(5) Assume the parametrization of the orbit OX is given by any of the sequences :
2010001, 1000102, 0120101, 1010210, 1030010, 0100301, 3013010, 0103103.
Then dimR H 2 (OX , R) ≤ 2.
(6) If the parametrization of the orbit OX is given by either 1010101 or 0020200, then
dimR H 2 (OX , R) ≤ 3.
(7) If OX is not given by the parametrizations as in (1), (2), (3), (4), (5), (6) above (# of
such orbits are 39), then we have dimR H 2 (OX , R) = 0.
Proof. For the Lie algebra E7(7) , we can easily compute dimR z(k) from the last column of [D1,
Table XI, pp. 513-514] and K/K ◦ from [K, Column 4, Table 8, pp. 260-264].
The orbit OX , as given in (1), is of type I as dimR z(k) = 3 and K/K ◦ = Id. For the orbits, as
given in (2), we have dimR z(k) = 2 and K/K ◦ = Id. Hence these are also of type I. For the orbits,
as given in (3), we have dimR z(k) = 1 and K/K ◦ = Id; hence they are of type I. For the orbits,
as given in (4), we have dimR z(k) = 1 and K/K ◦ = Z2 . Thus these are of type II. For the orbits,
as given in (5), we have dimR z(k) = 2 and K/K ◦ = Z2 . Hence these are also of type II. For the
orbits, as given in (6), we have dimR z(k) = 3 and K/K ◦ 6= Id, hence they are of type II. Rest of
the 39 orbits, which are not given by the parametrizations in (1), (2), (3), (4), (5), (6), are of type
III as z(k) = 0. Now the results follow from Corollary 3.1.
3.6.2. Nilpotent orbits in E7(−5) . There are 37 nonzero nilpotent orbits in E7(−5) ; see [D1, Table
XII, p. 515]. Note that in this case m = [m, m].
8
P. CHATTERJEE AND C. MAITY
Theorem 3.10. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in E7(−5) .
(1) If the parametrization of the orbit OX is given by either 110001 1 or 000120 2, then
dimR H 2 (OX , R) = 2.
(2) Assume the parametrization of the orbit OX is given by any of the sequences :
000010 1, 010000 2, 000010 3, 010010 1, 200100 0, 010100 2, 000200 0, 010110 1,
010030 1, 010110 3, 201031 4, 010310 3. Then dimR H 2 (OX , R) = 1.
(3) If the parametrization of the orbit OX is given by either 020200 0 or 111110 1, then
dimR H 2 (OX , R) ≤ 2.
(4) Assume the parametrization of the orbit OX is given by any of the sequences :
020000 0, 201011 2, 040000 4, 040400 4. Then dimR H 2 (OX , R) ≤ 1.
(5) If OX is not given by the parametrizations as in (1), (2), (3), (4) above (# of such orbits
are 17), then we have dimR H 2 (OX , R) = 0.
Proof. For the Lie algebra E7(−5) , we can easily compute dimR z(k) from the last column of [D1,
Table XII, pp. 515] and K/K ◦ from [K, Column 4, Table 9, pp. 266-268].
For the orbit OX , as in (1), we have dimR z(k) = 2 and K/K ◦ = Id. Hence these orbits are of
type I. For the orbit OX , as in (2), we have dimR z(k) = 1 and K/K ◦ = Id. Hence these orbits are
also of type I. For the orbit OX , as in (3), we have dimR z(k) = 2 and K/K ◦ = Z2 , hence are of
type II. For the orbit OX , as in (4), we have dimR z(k) = 1 and K/K ◦ = Z2 . Hence these are also
of type II. Rest of the 17 orbits, which are not given by the parametrizations in (1), (2), (3), (4),
are of type III as z(k) = 0. Now the conclusions follow from Corollary 3.1.
3.6.3. Nilpotent orbits in E7(−25) . There are 22 nonzero nilpotent orbits in E7(−25) ; see [D1, Table
XIII, p. 516]. In this case we have m 6= [m, m].
Theorem 3.11. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in E7(−25) .
(1) Assume the parametrization of the orbit OX is given by any of the sequences :
000000 2, 000000 − 2, 000002 − 2, 200000 − 2, 200002 − 2, 400000 − 2, 000004 − 6,
200002 − 6, 400004 − 6, 400004 − 10. Then dimR H 2 (OX , R) = 0.
(2) If OX is not given by any of the above parametrization (# of such orbits are 12), then we
have dimR H 2 (OX , R) ≤ 1.
Proof. Note that the parametrization of nilpotent orbits in E7(−25) as in [K, Table 10] is different
from [D1, Table X III, p. 516]. As the component group for all orbits in E7(−25) is Id; see [K,
Column 4, Table 10, pp. 269-270], it does not depend on the parametrization. We refer to the last
column of [D1, Table X III] for the orbits as given in (1). These are type III as z(k) = 0. For rest
of the 12 orbits we have dimR z(k) = 1; see last column of [D1, Table X III]. As m 6= [m, m], these
are of type II. Now the results follow from Corollary 3.1.
3.7. Nilpotent orbits in non-compact real forms of E8
Recall that up to conjugation there are two non-compact real forms of E8 . They are denoted by
E8(8) and E8(−24) .
3.7.1. Nilpotent orbits in E8(8) . There are 115 nonzero nilpotent orbits in E8(8) ; see [D1, Table
XIV, pp. 517-519]. Note that in this case we have m = [m, m].
ON THE NILPOTENT ORBITS IN LIE ALGEBRAS
9
Theorem 3.12. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in E8(8) .
(1) Assume the parametrization of the orbit OX is given by any of the sequences :
10010011, 11110010, 10111011, 11110130. Then dimR H 2 (OX , R) = 2.
(2) Assume the parametrization of the orbit OX is given by any of the sequences :
01000010, 10001000, 30000001, 10010001, 01010010, 01000110, 10100100, 00100003,
11001030, 10110100, 21010100, 01020110, 30001030, 11010101, 11101011, 11010111,
11111101, 21031031, 31010211, 12111111, 13111101, 13111141, 13103041, 31131211,
13131043, 34131341. Then dimR H 2 (OX , R) = 1.
(3) If the parametrization of the orbit OX is given 00100101, then dimR H 2 (OX , R) ≤ 3.
(4) Assume the parametrization of the orbit OX is given by any of the sequences :
10001002, 10101001, 01200100, 02000200, 10101021, 10102100, 02020200, 01201031.
Then dimR H 2 (OX , R) ≤ 2.
(5) Assume the parametrization of the orbit OX is given by any of the sequences :
11000001, 20010000, 01000100, 11001010, 20100011, 01010100, 02020000, 20002000,
20100031, 10101011, 00200022, 11110110, 01011101, 01003001, 11101101, 11101121,
10300130, 04020200, 02002022, 00400040, 11121121, 30130130, 02022022, 40040040.
Then dimR H 2 (OX , R) ≤ 1.
(6) If OX is not given by the parametrizations as in (1), (2), (3), (4), (5) above (# of such
orbits are 52), then we have dimR H 2 (OX , R) = 0.
Proof. For the Lie algebra E8(8) , we can easily compute dimR z(k) from the last column of [D1,
Table XIV, pp. 517-519] and K/K ◦ from [K, Column 4, Table 11, pp. 271-275].
For the orbits OX , as given in (1), we have dimR z(k) = 2 and K/K ◦ = Id. Hence these orbits
are of type I. For the orbits OX , as given in (2), we have dimR z(k) = 1 and K/K ◦ = Id. Hence
these orbits are also of type I. For the orbit OX , as given in (3), we have dimR z(k) = 3 and
K/K ◦ 6= Id; hence they are of type II. For the orbits OX , as given in (4), we have dimR z(k) = 2
and K/K ◦ 6= Id. Thus these orbits are of type II. For the orbits OX , as given in (5), we have
dimR z(k) = 1 and K/K ◦ 6= Id. Hence these are of type II. Rest of the 52 orbits, which are
not given by the parametrizations of (1), (2), (3), (4), (5), are of type III as z(k) = 0. Now the
conclusions follow from Corollary 3.1.
3.7.2. Nilpotent orbits in E8(−24) . There are 36 nonzero nilpotent orbits in E8(−24) ; see [D1, Table
XV, p. 520]. Note that in this case we have m = [m, m].
Theorem 3.13. Let the parametrization of the nilpotent orbits be as in §3.1.1. Let X be a nonzero
nilpotent element in E8(−24) .
(1) Assume the parametrization of the orbit OX is given by any of the sequences :
0000001 1, 1000000 2, 0000001 3, 1000001 1, 1100000 1, 1000010 2, 0000012 2, 1000011 1,
1000011 3, 1000003 1, 0110001 2, 1010011 1, 1000031 3. Then dimR H 2 (OX , R) = 1.
(2) If the parametrization of the orbit OX is given by either 2000000 0 or 2000020 0, then
dimR H 2 (OX , R) ≤ 1.
(3) If OX is not given by the parametrizations as in (1), (2) above (# of such orbits are 21),
then we have dimR H 2 (OX , R) = 0.
Proof. For the Lie algebra E8(−24) , we can easily compute dimR z(k) from the last column of
[D1, Table XV, p. 520] and K/K ◦ from [K, Column 4, Table 12, pp. 277-278].
10
P. CHATTERJEE AND C. MAITY
For the orbits OX , as given in (1), we have dimR z(k) = 1 and K/K ◦ = Id, hence these are of
type I. For the orbits OX , as given in (2), we have dimR z(k) = 1 and K/K ◦ 6= Id. Hence these
orbits are of type II. Rest of the 21 orbits, which are not given by the parametrizations of (1), (2),
are of type III as z(k) = 0. Now the conclusions follow from Corollary 3.1.
Remark 3.14. Here we make some observations about the first cohomology groups of the nilpotent
orbits in non-compact non-complex real exceptional Lie algebras. To do this we begin by giving a
convenient description of the first cohomology groups of the nilpotent orbits. Following the set-up
of Theorem 2.1 it can be shown that
(
1 if k + [m, m] $ m
1
dimR H (OX , R) =
(3.1)
0 if k + [m, m] = m.
The proof of the above result will appear elsewhere. As a consequences of (3.1), for all the nilpotent
orbit OX in a simple Lie algebra g we have dimR H 1 (OX , R) ≤ 1. Recall that if g is a non-compact
non-complex real exceptional Lie algebra such that g 6≃ E6(−14) and g 6≃ E7(−25) then any maximal
compact subgroup of Int g is semisimple, and hence, using (3.1), it follows that dimR H 1 (OX , R) = 0
for all nilpotent orbit OX in g. We next assume g = E6(−14) or g = E7(−25) . Note that in both
the cases [m, m] $ m. We follow the parametrizations of the nilpotent orbits of g as given in [D1,
Tables X, XIII]; see §3.1.1 also. When g = E6(−14) we are able to conclude that dimR H 1 (OX , R) = 1
only for one orbit, namely, the orbit OX parametrized by 40000 − 2. In this case, from the last
column and row 9 of [D1, Table X, p. 512] one has k = [k, k]. Thus k + [m, m] $ m, and (3.1)
applies. For g = E7(−25) we obtain that dimR H 1 (OX , R) = 1 when OX is parametrized by any of
the following sequences : 000000 2, 000000 − 2, 000002 − 2, 200000 − 2, 200002 − 2, 400000 − 2,
000004 − 6, 200002 − 6, 400004 − 6, 400004 − 10. For the above orbits, from the last column of [D1,
Table XIII, p. 516] we have k = [k, k], and hence, using (3.1), analogous arguments apply.
References
[BC]
[CM]
[D1]
[D2]
[K]
[M]
I. Biswas and P. Chatterjee, On the exactness of Kostant-Kirillov form and the second cohomology of
nilpotent orbits, Internat. J. Math. 23 (2012), no. 8, 1250086, 25 pp.
D. H. Collingwood and W. M. McGovern, Nilpotent orbits in semisimple Lie algebras, Van Nostrand Reinhold Mathematics Series, Van Nostrand Reinhold Co., New York, 1993.
D.Z. Djokovic, Classification of Nilpotent Elements in Simple Exceptional Real Lie Algebras of Inner Type
and Description of Their Centralizers , J. Alg. 112 (1988), 503-524.
D.Z. Djokovic, Classification of Nilpotent Elements in Simple Exceptional Real Lie Algebras E6(6) and
E6(−26) and Description of Their Centralizers , J. Alg. 116 (1988), 196-207.
Donald King, The Component Groups of Nilpotents in Exceptional Simple Real Lie Algebras, Communications in Algebra, 20(1), 219-284 (1992).
W. M. McGovern, The adjoint representation and the adjoint action, in : Algebraic quotients. Torus actions
and cohomology. The adjoint representation and the adjoint action, 159–238, Encyclopaedia Math. Sci.,
131, Springer, Berlin, 2002.
The Institute of Mathematical Sciences, HBNI, C.I.T. Campus, Tharamani, Chennai 600113, India
E-mail address: [email protected]
The Institute of Mathematical Sciences, HBNI, C.I.T. Campus, Tharamani, Chennai 600113, India
E-mail address: [email protected]
| 4math.GR
|
arXiv:1709.05393v1 [math.AC] 15 Sep 2017
A Sheaf On The Second Spectrum Of A Module∗
Seçil Çeken and Mustafa Alkan
[email protected], [email protected]
Abstract
Let R be a commutative ring with identity and Specs (M ) denote the
set all second submodules of an R-module M . In this paper, we construct and study a sheaf of modules, denoted by O(N, M ), on Specs (M )
equipped with the dual Zariski topology of M , where N is an R-module.
We give a characterization of the sections of the sheaf O(N, M ) in terms
of the ideal transform module. We present some interrelations between
algebraic properties of N and the sections of O(N, M ). We obtain some
morphisms of sheaves induced by ring and module homomorphisms.
2010 Mathematics Subject Classification: 13C13, 13C99, 14A15,
14A05.
Keywords and phrases: Second submodule, dual Zariski topology,
sheaf of modules.
1
Introduction
Throughout this article all rings will be commutative rings with identity elements and all modules will be unital left modules. Unless otherwise stated R
will denote a ring. Given an R-module M , the annihilator of M (in R) is denoted by annR (M ) and for an ideal I of R, the annihilator of I in M is defined
as the set (0 :M I) := {m ∈ M : Im = 0}. Clearly, (0 :M I) is a submodule of
M.
Recall that a sheaf of rings (modules) F on a topological space X is an
assignment of a ring (module) F (U ) to each open subset U of X, together
with, for each inclusion of open subsets V ⊆ U , a morphism of rings (modules)
ρUV : F (U ) −→ F (V ) subject to the following conditions:
(i) F (∅) = 0.
(ii) ρUU = idF (U) .
(iii) If W ⊆ V ⊆ U , then ρUW = ρV W oρUV .
(iv) If U is an open subset of X and {Uα }α∈Λ is an open cover of U , and if
f ∈ F (U ) is an element such that ρUUα (f ) = 0 for all α ∈ Λ, then f = 0.
∗ This paper is submitted to Communications in Algebra on June 15th, 2017 for the referee
process.
1
(v) If U is an open subset of X and {Uα }α∈Λ is an open cover of U , and
if we have a collection elements fα ∈ F (Uα ) with the property that for all α,
β ∈ Λ, ρUα (Uα ∩Uβ ) (fα ) = ρUβ (Uα ∩Uβ ) (fβ ), then there is an element f ∈ F (U )
such that for all α, fα = ρUUα (f ).
If F is a sheaf on a topological space X, we refer to F (U ) as the sections of
F over the open subset U . We call the maps ρUV as the restriction maps (cf.
[19]).
The prime spectrum of a ring R, denoted by Spec(R), consists of all prime
ideals of R and it is non-empty. For each ideal I of R, the sets V (I) = {p ∈
Spec(R) : I ⊆ p}, where I is an ideal of R, satisfy the axioms for closed sets of
a topology on Spec(R), called the Zariski topology of R.
It is well-known that for any commutative ring R, there is a sheaf of rings
on Spec(R), denoted by OSpec(R) , defined as follows: For an open subset
F U ⊆
Spec(R), we define OSpec(R) (U ) to be the set of all functions s : U → p∈U Rp ,
such that s(p) ∈ Rp , for each p ∈ U , and such that for each p ∈ U , there is a
neighborhood V of p, contained in U , and elements a, f ∈ R, such that for each
q ∈ V , we have f 6∈ q and s(q) = fa in Rq (see [19]).
Let M be an R-module. A proper submodule N of M is said to be prime if
for any r ∈ R and m ∈ M with rm ∈ N , we have m ∈ N or r ∈ annR (M/N ) :=
(N : M ). If N is a prime submodule of M , then p = (N : M ) is a prime
ideal of R. In this case, N is called a p-prime submodule of M . The set of
all prime submodules of a module M is called the prime spectrum of M and
denoted by Spec(M ). For any submodule N of an R-module M , we have a set
V (N ) = {P ∈ Spec(M ) : (N : M ) ⊆ (P : M )}. Then the sets V (N ), where N is
a submodule of M satisfy the axioms for closed sets of a topology on Spec(M ),
called the Zariski topology of M . Several authors have investigated the prime
spectrum and the Zariski topology of a module over the last twenty years (see
for example [21], [22], [23], [24], [25]). Recently, some authors have investigated
a sheaf structure on the prime spectrum of a module which generalizes the sheaf
of rings OSpec(R) on the topological space Spec(R). In [26], the author obtained
an R-module OSpec(M) (U ) for each open subset U of Spec(M ) equipped with
the Zariski topology of M such that OSpec(M) is a sheaf of modules on Spec(M ).
In [20], the authors defined and studied a sheaf of modules which is denoted by
A(N, M ) on the topological space Spec(M ) equipped with the Zariski topology
of M , where M and N are two R-modules. In fact, both OSpec(M) and A(N, M )
are generalizations of the sheaf of rings OSpec(R) to modules. In [20], the authors
proved that if N = R, then A(R, M ) is a scheme on Spec(M ). This scheme
structure were investigated in [1].
Recently, a dual theory of prime submodules has been developed and extensively studied by many authors. The dual notion of prime submodules was first
introduced by S. Yassemi in [27]. A submodule N of an R-module M is said to
be a second submodule provided N 6= 0 and, for all r ∈ R, rN = 0 or rN = N .
If N is a second submodule of M , then p = annR (N ) is a prime ideal of R. In
this case, N is called a p-second submodule of M (cf. [27]). In recent years,
second submodules have attracted attention of various authors and they have
been studied in a number of papers (see for example [3], [4], [5], [7], [9], [12],
2
[13], [14], [15]).
The set of all second submodules of a module M is called the second spectrum
of M and denoted by Specs (M ). As in [11], for any submodule N of an Rmodule M we define V s∗ (N ) to be the set of all second submodules of M
contained in N . Clearly V s∗ (0) is the empty set and V s∗ (M ) is Specs (M ). Note
that for any family of submodules Ni (i ∈ I) of M , ∩i∈I V s∗ (Ni ) = V s∗ (∩i∈I Ni ).
Thus if Z s∗ (M ) denotes the collection of all subsets V s∗ (N ) of Specs (M ) where
N ≤ M , then Z s∗ (M ) contains the empty set and Specs (M ), and Z s∗ (M )
is closed under arbitrary intersections. But in general Z s∗ (M ) is not closed
under finite unions. A module M is called a cotop module if Z s∗ (M ) is closed
under finite unions. In this case Z s∗ (M ) is called the quasi-Zariski topology on
Specs (M ) (see [6]). Note that in [3] a cotop module was called a tops -module.
More information about the class of cotop modules can be found in [3] and [6].
Let M be an R-module and N be a submodule of M . We define the set
V s (N ) := {S ∈ Specs (M ) : annR (N ) ⊆ annR (S)}. In [11, Lemma 2], it
was shown that V s (N ) = V s ((0 :M annR (N ))) = V s∗ ((0 :M annR (N ))), in
particular, V s ((0 :M I)) = V s∗ ((0 :M I)) for every ideal I of R, and that the set
Z s (M ) = {V s (N ) : N ≤ M } satisfies the axioms for the closed sets. Thus there
exists a topology, say τ s , on Specs (M ) having Z s (M ) as the family of closed
subsets. This topology is called the dual Zariski topology of M (see [11, Lemma
2]). Dual Zariski topology, the second spectrum of modules, and related notions
have been investigated by some authors in recent years (see [2], [3], [6], [8], [11],
[16], [17] and [18]).
In this paper, we define and study a sheaf structure on the second spectrum
of a module. Let M be an R-module. In Section 2, we construct a sheaf,
denoted by O(N, M ), on Specs (M ) equipped with the dual Zariski topology of
M , where N is an R-module. Firstly, we find the stalk of the sheaf O(N, M )
(see Theorem 2.3). In Theorem 2.12, we give a characterization for the sections
of the sheaf O(N, M ) in terms of the ideal transform module. Let R be a
Noetherian ring and M be a faithful secondful R-module. We prove that if N is
a free, projective or flat R-module, then so is O(N, M )(Specs (M )) (see Theorem
2.18). In Section 3, we deal with a scheme structure on the second spectrum of
a module. In Theorem 3.2, we prove that O(R, M ) is a scheme when M is a
faithful secondful R-module and Specs (M ) is a T0 -space. Then we define two
morphisms of locally ringed spaces by using ring and module homomorphisms
(see Theorem 3.3 and Corollary 3.5).
2
A Sheaf Structure On The Second Spectrum
Of A Module
Throughout the rest of the paper M will be an R-module, X s will denote
Specs (M ) and we consider X s with the dual Zariski topology unless otherwise
stated. For every open subset U of X s , we set Supps (U ) = {annR (S) : S ∈ U }.
In this section, we construct a sheaf on X s and investigate some properties
3
of this sheaf.
s
Definition 2.1 Let N be an R-module. For every open subset U of
Q X we
define O(N, M )(U ) to be the set of all elements (β p )p∈Supps (U) ∈
Np
p∈Supps (U)
in which for each Q ∈ U , there is an open neighborhood W of Q with Q ∈ W ⊆ U
and there exist elements t ∈ R, m ∈ N such that for every S ∈ W , we have
t 6∈ p := annR (S) and β p = m
t ∈ Np .
Let U and V be open subsets of X s with ∅ 6= V ⊆ U and β = (β p )p∈Supps (U) ∈
O(N, M )(U ). Then it is clear that the restriction (β p )p∈Supps (V ) belongs to
O(N, M )(V ). Therefore, we have the restriction map ρUV : O(N, M )(U ) −→
O(N, M )(V ), ρUV (β) = (β p )p∈Supps (V ) for all β = (β p )p∈Supps (U) ∈ O(N, M )(U ).
We define ρU∅ : O(N, M )(U ) −→ O(N, M )(∅) = 0 to be the zero map. It is
clear from the local nature of the definition, O(N, M ) is a sheaf with the restriction maps defined above. We can define a map τ U
N : N −→ O(N, M )(U )
n
s
by τ U
)
for
all
n
∈
N
.
We
note
that
τU
(n)
=
(
N
N is an R-module
1 p∈Supp (U)
U
V
homomorphism. Clearly, ρUV o τ N = τ N .
Recall that for any r ∈ R, the set Dr := Spec(R)\V (Rr) is open in Spec(R)
and the family {Dr : r ∈ R} forms a base for the Zariski topology on Spec(R).
Let M be an R-module. For each r ∈ R, we define Yr := X s \V s ((0 :M r)). In
[11, Theorem 4], it was shown that the set B = {Yr : r ∈ R} forms a base for
the dual Zariski topology on X s .
Remark 2.2 Let r ∈ R and Q ∈ X s . Then, r 6∈ annR (Q) if and only if Q ∈ Yr .
Let Q ∈ Yr . Suppose that r ∈ annR (Q), then rQ = 0 and so Q ⊆ (0 :M r). This
implies that Q ∈ V s∗ ((0 :M r)) = V s ((0 :M r)), a contradiction. Conversely, let
r 6∈ annR (Q). Then Q 6⊆ (0 :M r) and so Q ∈ Yr . In the proof our results, we
will use this fact without any further comment.
Let F be a sheaf of modules (rings) on a topological space X and P ∈ X.
Recall that the stalk FP of F at P is defined to be the direct limit −lim
F (U )
−−→
P ∈U
of the modules (rings) F (U ) for all open subsets U of X containing P via the
restriction maps (see [19]). In the following theorem, we determine the stalk of
the sheaf O(N, M ) at a point S in X s .
Theorem 2.3 Let N be an R-module and S ∈ X s . Then, the stalk O(N, M )S
of the sheaf O(N, M ) at S is isomorphic to Np where p := annR (S).
Proof. Let S be a p-second submodule of M and m ∈ O(N, M )S = −lim
O(N, M )(U ).
−−→
P ∈U
Then there exists an open neighborhood U of S and β = (β p )p∈Supps (U) ∈
O(N, M )(U ) such that β represents m. We define φ : O(N, M )S −→ Np by
φ(m) = β p . Let V be another neighborhood of S and α = (αp )p∈Supps (V ) ∈
O(N, M )(V ) such that α also represents m. Then there exists an open set
W ⊆ U ∩ V such that S ∈ W and β |W = α|W . Since S ∈ W , we have αp = β p .
This shows that φ is a well-defined map. We claim that φ is an isomorphism.
4
Let x ∈ Np . Then x = at for some a ∈ N , t ∈ R\p. Since t 6∈ p = annR (S),
we have S ∈ Yt . Now we define β q = at in Nq for all Q ∈ Yt where t 6∈ q =
annR (Q). Then β = (β q )q∈Supps (Yt ) ∈ O(N, M )(Yt ). If m is the equivalence
class of β in O(N, M )S , then φ(m) = x. Hence φ is surjective.
Now let m ∈ O(N, M )S and φ(m) = 0. Let U be an open neeighborhood
of S and β = (β p )p∈Supps (U) ∈ O(N, M )(U ) is a representative of m. There
is an open neighborhood V ⊆ U of S and there are elements a ∈ N , t ∈ R
such that for all Q ∈ V , we have t 6∈ q := annR (Q) and β q = at ∈ Nq . Then
0 = φ(m) = β p = at in Np . So there is h ∈ R\p such that ha = 0. For all
a
Q ∈ Yth , we have β q = ha
ht = t = 0 in Nq where q = annR (Q). Thus β |Yth = 0.
Therefore, β = 0 in O(N, M )(Yth ). Consequently, m = 0. This shows that φ is
injective. Thus φ is an isomorphism.
A ringed space is a pair (X, OX ) consisting of a topological space X and a
sheaf of rings OX on X. The ringed space (X, OX ) is called a locally ringed
space if for each point P ∈ X, the stalk OX,P is a local ring (cf. [19]).
Corollary 2.4 (X s , O(R, M )) is a locally ringed space.
Example 2.5 Consider the Z-modules M = Q ⊕ Zp and N = Z, where p is a
prime number. Then Specs (M ) = {Q ⊕ 0, 0 ⊕ Zp }. By Theorem 2.3,
O(Z, Q ⊕ Zp )Q⊕0
≃
Z(0) = Q and
O(Z, Q ⊕ Zp )0⊕Zp
≃
ZpZ = Z(p) = {
a
∈ Q : a, b ∈ Z, b 6= 0, p ∤ b}.
b
Let M be an R-module. The map ψ s : Specs (M ) −→ Spec(R/annR (M ))
defined by ψ s (S) = annR (S)/annR (M ) is called the natural map of Specs (M ).
M is said to be secondful if the natural map ψ s is surjective (cf. [18]).
Let M be an R-module. The Zariski socle of a submodule N of M , denoted
by Z.soc(N ), is defined to be the sum of all members of V s (N ) and if V s (N ) = ∅,
then Z.soc(N ) is defined to be 0 (cf. [18]).
Lemma 2.6 Let R be a Noetherian ring and N be an R-module. Let M be
a secondful R-module and U = X s \V s (K) where K ≤ M . Then for each
β = (β p )p∈Supps (U) ∈ O(N, M )(U ), there exist r ∈ Z+ , s1 , ..., sr ∈ annR (K)
i
and m1 , ..., mr ∈ N such that U = ∪ri=1 Ysi and β p = m
si for all S ∈ Ysi ,
i = 1, ..., r where p = annR (S).
Proof. Since R is Noetherian, U is quasi-compact by [18, Corollary 4.4-(d)].
Thus there exist n ∈ Z+ , open subsets W1 , ..., Wn of U , t1 , ..., tn ∈ R, a1 , ..., an ∈
a
N such that U = ∪nj=1 Wj and for each j = 1, ..., n and S ∈ Wj we have β p = tjj
where tj 6∈ p := annR (S). Fix j ∈ {1, ..., n}. There is a submodule Hj of
M such that Wj = X s \V s (Hj ). Also we have V s (K) ⊆ V s (Hj ). Since R is
Noetherian, annR (Hj ) = Rbj1 + ... + Rbjnj for some bj1 , ..., bjnj ∈ R. This
implies that
Wj = X s \V s (Hj ) = X s \V s∗ ((0 :M annR (Hj )))
5
n
j
(0 :M Rbjf ))
= X s \V s∗ ((0 :M Rbj1 + ... + Rbjnj )) = X s \V s∗ (∩f =1
n
n
j
j
s
s∗
s∗
s
= X \ ∩f =1 V ((0 :M Rbjf )) = ∪f =1 (X \V ((0 :M Rbjf )))
nj
nj
nj
Ybjf .
Ybjf , i.e. Wj = ∪f =1
(X s \V s ((0 :M Rbjf ))) = ∪f =1
= ∪f =1
On the other hand, we have Z.soc(K) ⊆ Z.soc(Hj ) as V s (K) ⊆ V s (Hj ).
This implies p
that annR (Z.soc(H
p j )) ⊆ annR (Z.soc(K)). By [18, Theorem 3.5(e)], we get annR (Hj ) ⊆ annR (K). Since R is Noetherian, there exists
p
d ∈ Z+ such that ( annR (K))d ⊆ annR (K) and we have
q
p
annR (Hj )d ⊆ ( annR (Hj ))d ⊆ ( annR (K))d ⊆ annR (K)
It follows that bdjf ∈ annR (K) for each f ∈ {1, ..., nj }. Also, for each f ∈
{1, ..., nj } and for each S ∈ Ybjf , we have tj bdjf 6∈ annR (S). We conclude that
Ybjf = X s \V s ((0 :M bjf )) = X s \V s ((0 :M tj bdjf )) = Ytj bdjf
and we can write β annR (S) =
aj
tj
=
aj bd
jf
tj bd
jf
∈ NannR (S) . This completes the proof.
Let K be an R-module. For an ideal I of R, the I-torsion submodule of
K is defined to be ΓI (K) := ∪n≥1 (0 :K I n ) and K is said to be I-torsion if
K = ΓI (K) (cf. [10]).
Lemma 2.7 Let N be an R-module and U = X s \V s (K) where K ≤ M . Then
ΓannR (K) (O(N, M )(U )) = 0.
Proof. Let β = (β p )p∈Supps (U) ∈ ΓannR (K) (O(N, M )(U )). There exists n ∈ Z+
such that annR (K)n β = 0. Consider p ∈ Supps (U ). There exists a second
submodule Q ∈ U such that p = annR (Q). If annR (K)n ⊆ p, then annR (K) ⊆
p and so Q ∈ V s (K), a contradiction. Thus annR (K)n 6⊆ p. So there exists
t β
tp ∈ annR (K)n \p. Since tp β = 0, we have tp β p = 0 and β p = ptp p = 0 ∈ Np .
Hence, β = 0.
Theorem 2.8 Let R be a Noetherian ring, M be a faithful secondful R-module
and N be an R-module. Let U = X s \V s (K) where K ≤ M . Then ΓannR (K) (N ) =
U
ker(τ U
N ), and so ker(τ N ) is annR (K)-torsion.
Proof. By Lemma 2.7, we have τ U
N (ΓannR (K) (N )) ⊆ ΓannR (K) (O(N, M )(U )) =
0. So ΓannR (K) (N ) ⊆ ker(τ U
N ).
m
s
Suppose that m ∈ ker(τ U
N ). Then 1 = 0 ∈ Np for all p ∈ Supp (U ).
s
So, P
for each p ∈ Supp (U ), there is tp ∈ R\p such that tp m = 0. Put J =
Rtp . Then Jm = 0.
p∈Supps (U)
Let q ∈ V (J). We claim that annR (K) ⊆ q. Suppose on the contrary that
annR (K) 6⊆ q. Since M is faithful secondful, there is a second submodule S of
M such that q = annR (S). Therefore S ∈ U and q ∈ Supps (U ). This implies
that tq ∈ J ⊆ q. This contradicts the fact that tq ∈ R\q. Thus
√
p
T
T
p= J
annR (K) ⊆ annR (K) =
p⊆
p∈V (annR (K))
6
p∈V (J)
Since R is Noetherian, annR (K)n ⊆ J for some n ∈ Z+ . Hence annR (K)n m ⊆
Jm = 0. This shows that m ∈ ΓannR (K) (N ) and the result follows.
r
P
Lemma 2.9 Let r, n ∈ Z+ , s1 , ..., sr ∈ R. Then V s ((0 :M
r
P
i=1
Rsi )).
Rsni )) = V s ((0 :M
i=1
Proof. Let S ∈ V s ((0 :M
r
P
i=1
Rsni )). Then annR ((0 :M
r
P
Rsni )) = annR (∩ri=1 (0 :M
i=1
(Rsi )n =
Rsni ⊆ annR ((0 :M
Rsni )) ⊆ annR (S). For each i ∈ {1, ..., r}, we have
n
r
n
Rsi )) ⊆ annR (∩i=1 (0 :M Rsi )) ⊆ annR (S). Since annR (S) is a prime ideal,
r
P
Rsi ⊆ annR (S). It follows that S ⊆ (0 :M
we have Rsi ⊆ annR (S) and so
annR (S)) ⊆ (0 :M
V s ((0 :M
r
P
r
P
i=1
i=1
Rsi ). This shows that S ∈ V s∗ ((0 :M
i=1
For the other containment;
(0 :M
r
P
i=1
r
P
Rsi )) and hence V s ((0 :M
r
P
i=1
Rsni ) and hence V s ((0 :M
i=1
Rsni ⊆
r
P
i=1
Rsni )) ⊆ V s ((0 :M
r
P
r
P
r
P
Rsi )).
i=1
Rsi implies that (0 :M
i=1
Rsi )) ⊆ V s ((0 :M
r
P
i=1
Rsi )) =
i=1
r
P
i=1
Rsni )).
Rsi ) ⊆
Theorem 2.10 Let R be a Noetherian ring, M be a faithful secondful R-module,
N be an R-module and U = X s \V s (K) where K ≤ M . Let W be an open subset
of X s such that U ⊆ W . Then ker(ρW U ) = ΓannR (K) (O(N, M )(W )).
Proof. By Lemma 2.7, ρW U (ΓannR (K) (O(N, M )(W )) ⊆ ΓannR (K) (O(N, M )(U )) =
0. So ΓannR (K) (O(N, M )(W )) ⊆ ker(ρW U ).
There exists L ≤ M such that W = X s \V s (L). Let β = (β p )p∈Supps (W ) ∈
ker(ρW U ). By Lemma 2.6, there exist r ∈ Z+ , s1 , ..., sr ∈ annR (L) and
m1 , ..., mr ∈ N such that W = ∪ri=1 Ysi and for each i = 1, ..., r and each
i
S ∈ Ysi , we have β annR (S) = m
si . Since β ∈ ker(ρW U ), we have β p = 0 for all
p ∈ Supps (U ). Fix i ∈ {1, ..., r}. Set U ′ = U ∩ Ysi . Hence,
U ′ = (X s \V s (K)) ∩ (X s \V s ((0 :M si )) = X s \(V s (K) ∪ V s ((0 :M si ))) =
X s \V s (K + (0 :M si )).
s
′
U′
i
Then m
si = 0 ∈ Np for all p ∈ Supp (U ). This implies that τ N (mi ) = 0.
By Theorem 2.8, there exists hi ∈ Z+ such that annR (K + (0 :M si ))hi mi = 0.
Let h := max{h1 , ..., hr }. Now, let p ∈ Supps (W ). There exists i ∈ {1, ..., r}
such that p ∈ Supps (Ysi ). Let d ∈ annR (K)h . Since shi ∈ annR ((0 :M si ))h , we
have
dshi ∈ annR (K)h annR ((0 :M si ))h ⊆ (annR (K) ∩ annR ((0 :M si )))h =
annR (K + (0 :M si ))h .
Therefore, we conclude that dβ p =
h
h
dmi
si
=
dsh
i mi
sh+1
i
= 0 ∈ Np for all d ∈
annR (K) . This implies that annR (K) β = 0 and so β ∈ ΓannR (K) (O(N, M )(W )).
7
Theorem 2.11 Let R be a Noetherian ring, M be a faithful secondful R-module,
N be an R-module and U = X s \V s (K) where K ≤ M . Then the map τ U
N :
N −→ O(N, M )(U ) has an annR (K)-torsion cokernel.
Proof. Let β = (β p )p∈Supps (U) ∈ O(N, M )(U ). By Lemma 2.6, there exist
r
S
Ysi and for
r ∈ Z+ , s1 , ..., sr ∈ annR (K) and m1 , ..., mr ∈ N such that U =
i=1
i
each i = 1, ..., r and each S ∈ Ysi we have β annR (S) = m
si . Fix i ∈ {1, ..., r}.
si mi
Then for each S ∈ Ysi , si β annR (S) = si ∈ NannR (S) . This means that
Ys
ρUYsi (si β) = si ρUYsi (β) = τ N i (mi ) = ρUYsi (τ U
N (mi ))
Thus, si β − τ U
N (mi ) ∈ ker(ρUYsi ) = ΓannR ((0:M si )) (O(N, M )(U )) by Theorem
2.10. Hence there exists ni ∈ Z+ such that annR ((0 :M si ))ni (si β − τ U
N (mi )) =
(m
))
=
0.
Define
n
:=
max{n
,
...n
}
+
1.
Then
for all
0. Then sni i (si β − τ U
i
1
r
N
n−ni −1 ni U
i −1 ni +1
τ
(m
).
It
follows
that
i = 1, ..., r, we have sni β = sn−n
s
β
=
s
s
i
i
N
i
i
i
n−1
U
U
sni β = sin−1 τ U
(m
)
=
τ
(s
m
)
∈
τ
(N
).
By
Lemma
2.9,
we
have
i
i
N
N i
N
r
r
P
P
s
n
s
V ((0 :M
Rsi )) = V ((0 :M
Rsi ))
i=1
=V
s∗
=
=
=
s∗
i=1
r
P
((0 :M
Rsi ))
i=1
r
V (∩i=1 (0 :M Rsi ))
∩ri=1 V s∗ ((0 :M Rsi ))
∩ri=1 V s ((0 :M Rsi )).
It follows that r
P
X s \V s ((0 :M
Rsni )) = X s \ ∩ri=1 V s ((0 :M Rsi ))
i=1
= ∪ri=1 (X s \V s ((0 :M Rsi )))
= ∪ri=1 Ysi = U = X s \V s (K).
r
P
Rsni )) = V s (K). Since M is faithful secondful,
This means that V s ((0 :M
r
P
i=1
p
annR (K) ⊆
⊆ V (annR (K)). Hence annR (K) ⊆
we get that V (
i=1
s
r
P
Rsni . Since R is Noetherian, there exists h ∈ Z+ such that annR (K)h ⊆
i=1
r
r
P
P
h
n
n
Rsi . It follows that annR (K) β ⊆
Rsi β ⊆ τ U
N (N ). This completes
Rsni )
i=1
i=1
the proof.
Let K be an R-module and I be an ideal of R. Recall that the ideal transform
of K with respect to I is defined as DI (K) := −
lim
HomR (I n , K) (cf. [10]).
−→
n∈N
Theorem 2.12 Let R be a Noetherian ring, M be a faithful secondful R-module,
N be an R-module and U = X s \V s (K) where K ≤ M . Then, there is a unique
R-isomorphism
gK,N : O(N, M )(U ) −→ DannR (K) (N ) := −
lim
HomR (annR (K)n , N )
−→
n∈N
8
such that the diagram
N
τU
N
−→
ց
O(N, M )(U )
↓ gK,N
DannR (K) (N )
commutes.
Proof. By Theorems 2.8 and 2.11, both the kernel and cokernel of τ U
N are
annR (K)-torsion. Therefore, there is a unique R-homomorphism gK,N : O(N, M )(U ) −→
DannR (K) (N ) such that the given diagram commutes by [10, Corollary 2.2.13(ii)]. By Lemma 2.7, ΓannR (K) (O(N, M )(U )) = 0. So, gK,N is an isomorphism
by [10, Corollary 2.2.13-(iii)].
Corollary 2.13 Let R be a Noetherian ring, M be a faithful secondful Rmodule, N be an R-module and U = X s \V s (K) where K ≤ M . Then the
following hold.
(1) O(ΓannR (K) (N ), M )(U ) = 0
(2) O(N, M )(U ) ≃ O(N/ΓannR (K) (N ), M )(U )
(3) O(N, M )(U ) ≃ O(O(N, M )(U ), M )(U )
(4) If N is an annR (K)-torsion R-module, then O(N, M )(U ) = 0.
Proof. Parts (1), (2) and (3) follow from Theorem 2.12 and [10, Corollary
2.2.8]. Part (4) is an immediate consequence of part (1).
Example 2.14 Consider the Z-modules N = Z/9Z and M = (⊕p Zp )⊕Q where
p runs over all distinct prime numbers. Then M is a faithful secondful Z-module.
Let K = (0⊕Z3 ⊕0...)⊕0 and U = Specs (M )\V s (K). Then annR (K) = 3Z and
N is a 3Z-torsion Z-module. By Corollary 2.13-(4), O(Z/9Z, (⊕p Zp )⊕Q)(U ) =
0.
Corollary 2.15 Let R be a principal ideal domain, M be a faithful secondful
R-module, N be an R-module and U = X s \V s (K). Then there exists a ∈ R
such that O(N, M )(U ) ≃ Na , where Na is the localization of N with respect to
the multiplicative set {an : n ∈ N}.
Proof. Since R is a a principal ideal domain, there is an element a ∈ R such
that annR (K) = Ra. By Theorem 2.12 and [10, Theorem 2.2.16], we have
O(N, M )(U ) ≃ DannR (K) (N ) ≃ Na .
Theorem 2.16 Let M be a faithful secondful R-module and N be any Rmodule. For any element f ∈ R, the module O(N, M )(Yf ) is isomorphic to
the localized module Nf . In particular, O(N, M )(X s ) ≃ N .
Proof. We define the map φ : Nf −→ O(N, M )(Yf ) by φ( fam ) = ( fam )p∈Supps (Yf ) .
We claim that φ is an isomorphism. First, we show that φ is injective. Let
φ( fan ) = φ( fbm ). Then for every S ∈ Yf , fan = fbm in Np where p = annR (S).
Thus there exists h ∈ R\p such that h(f m a − f n b) = 0 in N . Let I = (0 :R
f m a − f n b). Then h ∈ I and h 6∈ p, so I 6⊆ p. This holds for any S ∈ Yf ,
9
so we deduce that Supps (Yf ) ⊆ Spec(R)\V (I). Since M is faithful secondful,
Df = Supps (Yf ) ⊆ Spec(R)\V
(I) and we get that V (I) ⊆ V (Rf ). This implies
√
√
that Rf ⊆ Rf ⊆ I. Therefore f l ∈ I for some l ∈ Z+ . Now we have
f l (f m a − f n b) = 0 which shows that fan = fbm in Nf . Thus φ is injective.
Let β = (β p )p∈Supps (Yf ) ∈ O(N, M )(Yf ). Then we can cover Yf with the
open subsets Vi on which β annR (S) is represented by agii with gi 6∈ annR (S) for
all S ∈ Vi , in other words Vi ⊆ Ygi . Since the open sets of the form Yr (r ∈ R)
form a base for the dual Zariski topology on X s , we may assume that Vi = Yhi
for some hi ∈ R. Since Yhi ⊆ Ygi , Dhi = ψ s (Yhi ) ⊆ ψ s (Ygi ) = Dg√
i by [6,
Proposition
4.1].
This
implies
that
V
(Rg
)
⊆
V
(Rh
)
and
so
Rh
⊆
Rhi ⊆
i
i
i
√
Rgi . Thus hsi ∈ Rgi for some s ∈ Z+ . So hsi = cgi for some c ∈ R and
bi
cai
cai
ai
s
gi = cgi = hsi . We see that β annR (S) is represented by ki (bi = cai , ki = hi )
on Yki and (since Yhi = Yhsi ) the Yki cover Yf . The open cover Yf = ∪Yki has
a finite subcover by [11, Theorem 4-(2)]. Suppose that Yf ⊆ Yk1 ∪ ... ∪ Ykn .For
b
1 ≤ i, j ≤ n, kbii and kjj both represent β annR (S) on Yki ∩ Ykj . By [6, Corollary
b
4.2], Yki ∩ Ykj = Yki kj , and by the injectivity of φ, we get that kbii = kjj in
Nki kj . Hence (ki kj )nij (kj bi − ki bj ) = 0 for some nij ∈ Z+ . Let m = max{nij :
1 ≤ i, j ≤ n}. Then kjm+1 (kim bi ) − kim+1 (kjm bj ) = 0. By replacing each ki by
kim+1 and bi by kim bi , we still see that β annR (S) is represented on Yki by kbii and
furthermore we have kj bi = ki bj for all i, j. Since Yf ⊆ Yk1 ∪ ... ∪ Ykn , by [6,
Proposition 4.1], we have
Df = ψ s (Yf ) ⊆ ∪ni=1 ψ s (Yki ) = ∪ni=1 Dki , i.e.,PSpec(R)\V (Rf ) ⊆ Spec(R)\∩ni=1
n
n
V (Rki ). This implies
pPn that ∩i=1 V (Rki ) = V ( i=1 Rki ) ⊆ V (Rf ) and+hence
√
are c1 , ..., cn ∈ R and t ∈ Z such
Rf ⊆ RfP⊆
i=1 Rki . So,
Pthere
n
n
that f t =
ci ki . Let a =
ci bi . Then for each j, we have kj a =
i=1
i=1
Pn
Pn
bj
a
t
i=1 ci ki bj = bj f . This implies that f t = kj on Ykj . Therei=1 ci kj bi =
fore, φ( fat ) = (β p )p∈Supps (Yf ) .
Proposition 2.17 Let K, L be R-modules and ϕ : K −→ L be an R-homomorphism.
Then ϕ induces a morphism of sheaves ϕ : O(K, M ) −→ O(L, M ). If ϕ is an
isomorphism of R-modules, then ϕ is an isomorphism of sheaves.
a
Proof. Let U be an open subset of X s and β = ( fpp )p∈Supps (U) ∈ O(K, M )(U ).
ϕ(ap )
∈ O(L, M )(U ). For each Q ∈ U , there is
We show that
fp
s
p∈Supp (U)
an open neighborhood W of Q with Q ∈ W ⊆ U and there exist elements
t ∈ R, m ∈ K such that for every S ∈ W , we have t 6∈ p := annR (S) and
ap
m
fp = t ∈ Kp . So there exists sp ∈ R\p such that sp (tap − fp m) = 0. It follows
that sp (tϕ(ap ) − fp ϕ(m)) = 0. This means that
ϕ(ap )
fp
and t 6∈ p := annR (S) for every S ∈ W . This shows
ϕ(m)
where ϕ(m) ∈
t
ϕ(ap )
that
fp
p∈Supps (U)
=
O(L, M )(U ). Thus the map ϕ(U ) : O(K, M )(U ) −→ O(L, M )(U ) defined by
ϕ(ap )
ap
.
ϕ(U ) ( )p∈Supps (U) =
fp
fp
p∈Supps (U)
10
L
∈
is well-defined. Clearly, ϕ(U ) is an R-homomorphism. Since
ap
ϕ (ap )
ρ′UV ϕ(U ) ( )p∈Supps (U)
= ρ′UV (
)p∈SuppU
fp
fp
ϕ (np )
)p∈SuppV
= (
fp
ap
= ϕ(V )ρUV ( )p∈Supps (U) ,
fp
the following diagram is commutative.
O(K, M )(U )
↓ ρUV
O(K, M )(V )
ϕ(U )
−−−→
O(L, M )(U )
↓ ρ′UV
ϕ(V ) O(L, M )(V )
−−−→
This shows that ϕ : O(K, M ) −→ O(L, M ) is a morphism of sheaves.
Now suppose
that ϕ is
We show that ϕ(U ) is injective.
anisomorphism.
ϕ(a )
ϕ(ap )
ap
s
= 0. Then fpp = 0 for every
)
=
Let ϕ(U ) ( fp p∈Supp (U)
fp
p∈Supps (U)
p ∈ Supps (U ). There exists tp ∈ R\p such that tp ϕ(ap ) = ϕ(tp ap ) = 0. Since
a
t a
ϕ is injective, tp ap = 0 for every p ∈ Supps (U ). It follows that fpp = tpp fpp = 0
a
for every p ∈ Supps (U ). This shows that ( fpp )p∈Supps (U) = 0 and so ϕ(U ) is
injective for every open subset U of X s .
b
∈ O(L, M )(U ).
Now we show that ϕ(U ) is surjective. Let tpp
s
p∈Supp (U)
s
There
exists ap ∈ K such that ϕ(ap ) = bp for each p ∈ Supp (U ). We show that
ap
∈ O(K, M )(U ). For each Q ∈ U , there is an open neighborhood
tp
p∈Supps (U)
W of Q with Q ∈ W ⊆ U and there exist elements t ∈ R, b ∈ L such that for
b
ϕ(a )
every S ∈ W , we have t ∈
6 annR (S) = p and tpp = tpp = bt . There exists
ϕ(a )
= tpp , where t 6∈ p = annR (S) for every
a ∈ K such that b = ϕ(a). So ϕ(a)
t
S ∈ W . There exists vp ∈ R\p such that vp (tp ϕ(a)−tϕ(ap )) = 0. It follows that
ϕ(vp tp a − vp tap ) = 0. Since ϕ is injective vp (tp a − tap ) = 0 for vp ∈ R\p. This
a
means that tpp = at where t 6∈ p = annR (S) for every S ∈ W . This shows that
bp
ap
ap
=
∈
O(K,
M
)(U
)
and
ϕ
.
tp
tp
tp
s
s
s
p∈Supp (U)
p∈Supp (U)
p∈Supp (U)
Thus ϕ(U ) is surjective for every open subset U of X s . Consequently, ϕ is an
isomorphism of sheaves.
Theorem 2.18 Let R be a Noetherian ring, M be a faithful secondful R-module
and N be an R-module. Then the following hold.
(1) If N is a free R-module, then O(N, M )(X s ) is a free R-module.
(2) If N is a projective R-module, then O(N, M )(X s ) is a projective Rmodule.
(3) If N is a flat R-module, then O(N, M )(X s ) is a flat R-module.
11
Proof. (1) We can write X s = X s \V s (0). Since N is a free R-module, N
is isomorphic to a direct sum of some copies of R, say N ≃ ⊕i∈Λ R for an
index set Λ. By Proposition 2.17, O(N, M )(X s ) ≃ O(⊕i∈Λ R, M )(X s ). By
Theorem 2.12, O(N, M )(X s ) ≃ DR (N ) and O(⊕i∈Λ R, M )(X s ) ≃ DR (⊕i∈Λ R).
DR commutes with direct sums by [10, 3.4.11. Corollary]. By using this fact,
Theorem 2.12 and Theorem 2.16, we get that O(N, M )(X s ) ≃ DR (⊕i∈Λ R) ≃
⊕i∈Λ DR (R) ≃ ⊕i∈Λ O(R, M )(X s ) ≃ ⊕i∈Λ R. This shows that O(N, M )(X s ) is
a free R-module.
(2) Since N is a projective R-module, there is a free R-module F and a
submodule L of F such that F ≃ N ⊕ L. By using Proposition 2.17 and
[10, 3.4.11. Corollary], we get that O(F, M )(X s ) ≃ O(N ⊕ L, M )(X s ) ≃
O(N, M )(X s ) ⊕ O(L, M )(X s ). By part (1), O(F, M )(X s ) is a free R-module.
O(N, M )(X s ) is a projective R-module as it is a direct summand of the free
R-module O(F, M )(X s ).
(3) Since every flat R-module is a direct limit of projective R-modules, N ≃
lim
P
for some projective R-modules Pi and a directed set Λ. By Proposition
−−→ i
i∈Λ
P ). DR
P , M )(X s ) ≃ DR (lim
2.17 and Theorem 2.12, O(N, M )(X s ) ≃ O(lim
−−→ i
−−→ i
i∈Λ
i∈Λ
commutes with direct limits by [10, 3.4.11. Corollary]. By using this fact,
Theorem 2.12 and Theorem 2.16, we get that O(N, M )(X s ) ≃ DR (lim
P) ≃
−−→ i
i∈Λ
lim
D (Pi ) ≃ lim
O(Pi , M )(X s ). By part (2), O(Pi , M )(X s ) is a projective and
−−→ R
−−→
i∈Λ
i∈Λ
hence a flat R-module for each i ∈ Λ. Since a direct limit of flat modules is flat,
O(N, M )(X s ) is a flat R-module.
3
A Scheme Structure On The Second Spectrum Of A Module
Recall that an affine scheme is a locally ringed space which is isomorphic to the
spectrum of some ring. A scheme is a locally ringed space (X, OX ) in which
every point has an open neighborhood U such that the topological space U ,
together with the restricted sheaf OX|U is an affine scheme. A scheme (X, OX )
is called locally Noetherian if it can be covered by open affine subsets of Spec(Ai )
where each Ai is a Noetherian ring. The scheme (X, OX ) is called Noetherian
if it is locally Noetherian and quasi-compact (cf. [19]).
A topological space X is said to be a T0 -space or a Kolmogorov space if for
every pair of distinct points x, y ∈ X, there exists open neighbourhoods U of x
and V of y such that either x ∈
/ V or y ∈
/ U . The following proposition, from
[6], gives some conditions for the dual Zariski topology of an R-module to be a
T0 -space.
Proposition 3.1 [6, Theorem 6.3] The following statements are equivalent for
an R-module M .
(1) The natural map ψ s : Specs (M ) −→ Spec(R/annR(M )) is injective.
(2) For any S1 , S2 ∈Specs (M ), if V s (S1 ) = V s (S2 ) then S1 = S2 .
12
(3) | Specsp (M ) |≤ 1 for every p ∈ Spec(R), where Specsp (M ) is the set of
all p-second submodules of M .
(4) (Specs (M ), τ s ) is a T0 -space.
Theorem 3.2 Let M be a faithful secondful R-module such that X s is a T0 space. Then (X s , O(R, M )) is a scheme. Moreover, if R is Noetherian, then
(X s , O(R, M )) is a Noetherian scheme.
Proof. Let g ∈ R. Since the natural map ψ sM : Specs (M ) −→ Spec(R) is
continuous by [6, Proposition 3.6], the restriction map ψ sM|Yg : Yg −→ ψ sM (Yg )
is also continuous. Since Yg is also a T0 -space, ψ sM|Yg is a bijection. Let E
be closed subset of Yg . Then E = Yg ∩ V s (N ) for some N ≤ M . Hence
ψ sM (E) = ψ sM (Yg ∩ V s (N )) = ψ sM (Yg ) ∩ ψ sM (V s (N )) = ψ sM (Yg ) ∩ V (annR (N ))
is a closed subset of ψ sM (Yg ). Therefore, ψ sM|Yg is a homeomorphism.
Since the sets of the form Yg (g ∈ R) form a base for the dual Zariski
topology, X s can be written as X s = ∪i∈I Ygi for some gi ∈ R. Since M
is faithful secondful and X s is a T0 -space, we have Ygi ≃ ψ sM (Ygi ) = Dgi ≃
Spec(Rgi ) for each i ∈ I. By Theorem 2.16, Ygi is an affine scheme for each
i ∈ I. This implies that (X s , O(R, M )) is a scheme.
For the last statement, we note that since R is Noetherian so is Rgi for each
i ∈ I. Hence (X s , O(R, M )) is a locally Noetherian scheme. By [11, Theorem
4], X s is quasi-compact. Therefore, (X s , O(R, M )) is a Noetherian scheme.
Theorem 3.3 Let M and N be R-modules and φ : M −→ N be a monomorphism. Then φ induces a morphism of locally ringed spaces
(f, f # ) : (Specs (N ), O(R, N )) −→ (Specs (M ), O(R, M )).
Proof. By [6, Proposition 3.14], the map f : Specs (M ) −→ Specs (N ) which
is defined by f (S) = φ(S) for every S ∈ Specs (M ), is continuous. Let U be
an open subset of Specs (N ) and β ∈ O(R, N )(U ). Suppose S ∈ f −1 (U ). Then
f (S) = φ(S) ∈ U . There exists an open neighborhood W of φ(S) with φ(S) ∈
W ⊆ U such that for each Q ∈ W , g 6∈ q = annR (Q) and β q = ag in Rq . Since
φ(S) = f (S) ∈ W , S ∈ f −1 (W ) ⊆ f −1 (U ). As f is continuous, f −1 (W ) is an
open neighborhood of S. We claim that for each Q′ ∈ f −1 (W ), g 6∈ annR (Q′ ).
Suppose on the contrary that g ∈ annR (Q′ ) for some Q′ ∈ f −1 (W ). Then
f (Q′ ) = φ(Q′ ) ∈ W . Since φ is a monomorphism, annR (Q′ ) = annR (φ(Q′ )).
So g ∈ annR (φ(Q′ )) for φ(Q′ ) ∈ W , a contradiction. Therefore for every open
subset U of Specs (N ), we can define the map
f # (U ) : O(R, N )(U ) −→ O(R, M )(f −1 (U ))
as follows. For every β ∈ O(R, N )(U ), f # (U )(β) ∈ O(R, M )(f −1 (U )) is defined
by f # (U )( β p p∈Supps (U) ) = (β annR (f (S) )S∈f −1 (U) . As we mentioned above
f # (U ) is a well-defined map an clearly it is a ring homomorphism. Now we show
that f # is a locally ringed morphism. Assume that U and V are open subsets
13
of Specs (N ) with V ⊆ U and β = β p p∈Supps (U) ∈ O(R, N )(U ). Consider the
diagram
O(R, N )(U ) f # (U ) O(R, M )(f −1 (U ))
−−−−→
↓ ρ′UV
↓ ρf −1 (U)f −1 (V )
#
O(R, N )(V ) f (V ) O(R, M )(f −1 (V )).
−−−−→
Then
ρf −1 (U)f −1 (V ) f # (U )( β p
p∈Supps (U)
) =
=
=
ρf −1 (U)f −1 (V ) ((β annR (f (S) )S∈f −1 (U) )
(β annR (f (S) )S∈f −1 (V ) = f # (V )((β p )p∈Supps (V ) )
f # (V )ρ′UV ( β p p∈Supps (U) ).
Therefore we get that ρf −1 (U)f −1 (V ) f # (U ) = f # (V )ρ′UV . Thus the above
diagram is commutative. This shows that f # : O(R, N ) −→ f∗ (O(R, M ))
is a morphism of sheaves. By Theorem 2.3, the map on the stalks, fS# :
O(R, N )f (S) −→ O(R, M )S is clearly the map of local rings RannR (f (S)) −→
RannR (S) which maps rs ∈ RannR (f (S)) to rs again. This implies that (f, f # ) :
(Specs (N ), O(R, N )) −→ (Specs (M ), O(R, M )) is a morphism of locally ringed
spaces.
Theorem 3.4 Let M , A be R-modules, φ : R −→ S be a ring homomorphism,
let N, B be S-modules and M be a secondful R-module such that Specs (M ) is
a T0 -space and annR (M ) ⊆ annR (N ). If δ : A −→ B is an R-homomorphism,
then φ induces a morphism of sheaves
h# : O(A, M ) −→ h∗ (O(B, N ))
Proof. Since annR (M ) ⊆ annR (N ), φ induces the homomorphism
Θ : R/annR (M ) −→ S/annS (N ), Θ(r + annR (M )) = φ(r) + annS (N ).
It is well-known that the maps
f : Spec(S) −→ Spec(R) defined by f (p) = φ−1 (p) and
d : Spec(S/annS (N )) −→ Spec(R/annR(M )) defined by d(p) = Θ−1 (p) and
ψ sN : Specs (N ) −→ Spec(S/annS (N )) defined by ψ sN (Q) = annS (Q)/annS (N )
for each Q ∈ Specs (N ) are continuous. Also, ψ sM : Specs (M ) −→ Spec(R/annR (M ))
is a homeomorphism by [6, Theorem 6.3]. Therefore the map h : Specs (N ) −→
Specs (M ) defined by h(Q) = (ψ sM )−1 dψ sN (Q) is continuous. Also, for each
Q ∈ Specs (N ), we get an R-homomorphism
φannS (Q) : Af (annS (Q))
a
s
−→ BannS (Q)
δ(r)
−→
φ(s)
Let U be an open subset of Specs (M ) and t = (tannR (P ) )P ∈U ∈ O(A, M )(U ).
Suppose that T ∈ h−1 (U ). Then h(T ) ∈ U and there exists an open neighborhood W of h(T ) with h(T ) ∈ W ⊆ U and elements r, g ∈ R such that
14
for each Q ∈ W , we have tannR (Q) = ag ∈ AannR (Q) where g 6∈ annR (Q),
hence g 6∈ annR (h(T )). By definition of h, annR (h(K)) = φ−1 (annS (K))
for every K ∈ h−1 (W ). So φ(g) 6∈ annS (K) for g 6∈ annR (h(K)). Thus
δ(a)
define a section O(B, N )(h−1 (U )). We can define
φannS (T ) ( ag ) = φ(g)
h# (U ) : O(A, M )(U ) −→ h∗ (O(B, N )(U )) = O(B, N )(h−1 (U ))
by h# (U )((tannR (P ) )P ∈U ) = φannS (T ) (tannR (h(T )) )
for each (tannR (P ) )P ∈U ∈
T ∈h−1 (U)
O(R, M )(U ). Assume that V ⊆ U . Consider the diagram
O(A, M )(U )
↓ ρUV
O(A, M )(V )
We see that
h# (U )
−−−−→
#
h (V )
−−−−→
O(B, N )(h−1 (U ))
↓ ρ′h−1 (U)h−1 (V )
O(B, N )(h−1 (V ))
φannS (T ) (tannR (h(T )) )
ρ′h−1 (U)h−1 (V ) h# (U )((tannR (P ) )P ∈U ) = ρ′h−1 (U)h−1 (V )
T ∈h−1 (U)
=
φannS (T ) (tannR (h(T )) )
−1
T ∈h
#
(V )
#
= h (V )((tannR (P ) )P ∈V ) = h (V )ρUV ((tannR (P ) )P ∈U )
and hence ρ′h−1 (U)h−1 (V ) h# (U ) = h# (V )ρUV for every open subset U of Specs (M ).
So the above diagram is commutative. It follows that h# : O(A, M ) −→
h∗ (O(B, N )) is a morphism of sheaves.
Corollary 3.5 Let φ : R −→ S be a ring homomorphism, let N be an Smodule and M be a secondful R-module such that Specs (M ) is a T0 -space and
annR (M ) ⊆ annR (N ). Then φ induces a morphism of locally ringed spaces
(h, h# ) : (Specs (N ), O(S, N )) −→ (Specs (M ), O(R, M ))
Proof. Taking A = R, B = S and δ = φ in Theorem 3.4, we get the morphism
of sheaves h# : O(R, M ) −→ h∗ (O(S, N )) which is defined as in the proof of
Theorem 3.4. By Theorem 2.3, the map on the stalks h#
T : O(R, M )h(T ) −→
O(S, N )T is clearly the local homomorphism
φannS (T ) : Rf (annS (T ))
r
s
−→ SannS (T )
φ(r)
−→
φ(s)
where f is the map defined in the proof of Theorem 3.4. This implies that
(h, h# ) : (Specs (N ), O(S, N )) −→ (Specs (M ), O(R, M ))
is a locally ringed spaces.
Acknowledgement
The authors would like to thank the Scientific Technological Research Council of Turkey (TUBITAK) for funding this work through the project 114F381.
The second author was supported by the Scientific Research Project Administration of Akdeniz University.
15
References
[1] A. Abbasi and D. Hassanzadeh-Lelekaami, A scheme over prime spectrum
of modules, Turkish J. Math. 37 (2013), 202–209.
[2] J. Y. Abuhlail, A dual Zariski topology for modules, Topology Appl. 158
(2011) 457–467.
[3] J.Y.Abuhlail, Zariski topologies for coprime and second submodules, Algebra Colloquium, 22 (1), (2015).
[4] H. Ansari-Toroghy, F. Farshadifar, On the dual notion of prime submodules, Algebra Colloq., 19 (1), (2012), 1109-1116.
[5] H. Ansari-Toroghy, F. Farshadifar, On the dual notion of prime submodules
II, Mediterr. J. Math., 9 (2), (2012), 327-336.
[6] H. Ansari-Toroghy and F. Farshadifar, The Zariski topology on the
second spectrum of a module, Algebra Colloquium, 671 (2014). DOI:
10.1142/S1005386714000625.
[7] H. Ansari-Toroghy, F. Farshadifar, On the dual notion of prime radicals of submodules, Asian-European J. Math, 6 (2), (2013), DOI:
10.1142/S1793557113500241.
[8] H. Ansari-Toroghy, S. Keyvani and F. Farshadifar, On the second spectrum
of a module (II), Bull. Malays. Math. Sci. Soc. 39 (3), (2016), 1089–1103.
[9] H. Ansari-Toroghy, S. S. Pourmortazavi, S. Keyvani, Strongly cotop modules, Journal of Algebra and Related Topics 3 (1), (2015), 13-29.
[10] M. P. Brodmann and R. Y. Sharp, Local cohomology: an algebraic introduction with geometric applications, Cambridge Univercity Press, 1998.
[11] S. Çeken and M. Alkan, Dual of Zariski topology for modules, Book Series:
AIP Conference Proceedings, 1389 (1), (2011), 357-360.
[12] S. Çeken, M. Alkan and P. F. Smith, Second modules over noncommutative
rings, Communications in Algebra, 41 (1), (2013), 83-98.
[13] S. Çeken, M. Alkan and P. F. Smith, The dual notion of the prime radical
of a module, Journal of Algebra, 392 (2013), 265–275.
[14] S. Çeken, M. Alkan, On graded second and coprimary modules and graded
secondary representations, Bull. Malays. Math. Sci. Soc. 38 (4), (2015),
1317–1330.
[15] S. Çeken, M. Alkan, On second submodules, Contemporary Mathematics
634, (2015), 67-77.
16
[16] S. Çeken, M. Alkan, On the second spectrum and the second classical
Zariski topology of a module, Journal of Algebra And Its Applications 14
(10), (2015), DOI: http://dx.doi.org/10.1142/S0219498815501509.
[17] S. Çeken, M.Alkan, Second Spectrum Of Modules And Spectral Spaces,
Bulletin of the Malaysian Mathematical Sciences Society, (2017), DOI:
10.1007/s40840-017-0473-0.
[18] F. Farshadifar, Modules with Noetherian second spectrum, Journal of Algebra and related topics, Vol. 1, No 1, (2013), pp 19-30.
[19] R. Hartshorne, Algebraic geometry, no. 52, Springer-Verlag New York Inc,
1977.
[20] D. Hassanzadeh-Lelekaami, H. Roshan-Shekalgourabi, Prime submodules
and a sheaf on the prime spectra of modules, Communications in Algebra
42 (7), (2014) 3063-3077.
[21] C. P. Lu, Spectra of modules, Comm. Algebra, 23 (10) (1995), 3741-3752.
[22] C.P. Lu, The Zariski topology on the prime spectrum of a module, Houston
J. Math. 25 (3) (1999) 417-432.
[23] C. P. Lu, A module whose prime spectrum has the surjective natural map,
Houston J. Math, 33 (1) (2007), 125-143.
[24] C.P. Lu, Modules with Noetherian spectrum, Comm. Algebra 38 (2010),
807-828.
[25] R. L. McCasland, M. E. Moore and P. F. Smith, On the spectrum of a
module over a commutative ring, Comm. Algebra 25 (1997), 79-103.
[26] Ü. Tekir, On the sheaf of modules, Comm. Algebra 33 (2005), no. 8, 2557–
2562.
[27] S. Yassemi, The dual notion of prime submodules, Arch. Math (Brno) 37
(2001), 273–278.
Seçil Çeken: Trakya University, Faculty of Sciences, Department of Mathematics, Edirne, Turkey.
Mustafa Alkan: Akdeniz University, Faculty of Sciences, Department of
Mathematics, Antalya, Turkey.
17
| 0math.AC
|
TOWARDS AUTOMATIC ABDOMINAL MULTI-ORGAN SEGMENTATION IN DUAL
ENERGY CT USING CASCADED 3D FULLY CONVOLUTIONAL NETWORK
Shuqing Chen1
Michael M. Lell5
Holger Roth2
Sabrina Dorn3
Matthias May4
Alexander Cavallaro4
Marc Kachelrieß3
Hirohisa Oda2
Kensaku Mori2
Andreas Maier1
arXiv:1710.05379v1 [cs.CV] 15 Oct 2017
1
Friedrich-Alexander University Erlangen-Nürnberg, Erlangen, Germany
2
Nagoya University, Nagoya , Japan
3
German Cancer Research Center (DKFZ), Heidelberg, Germany
4
Department of Radiology, University Hospital Erlangen, Erlangen, Germany
5
University Hospital Nürnberg, Paracelsus Medical University, Nürnberg, Germany
This work has been submitted to the IEEE for possible
publication. Copyright may be transferred without notice, after which this version may no longer be accessible.
ABSTRACT
Automatic multi-organ segmentation of the dual energy computed tomography (DECT) data can be beneficial for biomedical research and clinical applications. However, it is a challenging task. Recent advances in deep learning showed the
feasibility to use 3-D fully convolutional networks (FCN)
for voxel-wise dense predictions in single energy computed
tomography (SECT). In this paper, we proposed a 3D FCN
based method for automatic multi-organ segmentation in
DECT. The work was based on a cascaded FCN and a general model for the major organs trained on a large set of
SECT data. We preprocessed the DECT data by using linear
weighting and fine-tuned the model for the DECT data. The
method was evaluated using 42 torso DECT data acquired
with a clinical dual-source CT system. Four abdominal organs (liver, spleen, left and right kidneys) were evaluated.
Cross-validation was tested. Effect of the weight on the accuracy was researched. In all the tests, we achieved an average
Dice coefficient of 93% for the liver, 90% for the spleen, 91%
for the right kidney and 89% for the left kidney, respectively.
The results show our method is feasible and promising.
Index Terms— DECT, deep learning, multi-organ segmentation, U-Net
1. INTRODUCTION
The Hounsfield unit (HU) scale value depends on the inherent tissue properties, the x-ray spectrum for scanning and the
administered contrast media [1]. In a SECT image, materials having different elemental compositions can be represented by identical HU values [2]. Therefore, SECT has challenges such as limited material-specific information and beam
hardening as well as tissue characterization [1]. DECT has
been investigated to solve the challenges of SECT. In DECT,
two energy-specific image data sets are acquired at two different X-ray spectra, which are produced by different energies, simultaneously. The multi-organ segmentation in DECT
can be beneficial for biomedical research and clinical applications, such as material decomposition [3], organ-specific
context-sensitive enhanced reconstruction and display [4, 5],
and computation of bone mineral density [6]. We are aiming
at exploiting the prior anatomical information that is gained
through the multi-organ segmentation to provide an improved
context-sensitive DECT imaging [4, 5]. The novel technique
offers the possibility to present evermore complex information to the radiologists simultaneously and bears the potential
to improve the clinical routine in CT diagnosis.
Automatic multi-organ segmentation on DECT images is
a challenging task due to the inter-subject variance of human
abdomen, the complex 3-D intra-subject variance among organs, soft anatomy deformation, as well as different HU values for the same organ by different spectra. Recent researches
show the power of deep learning in medical image processing [7]. To solve the DECT segmentation problem, we use
the successful experience from multi-organ segmentation in
volumetric SECT images using deep learning [8, 9]. The proposed method is based on a cascaded 3D FCN, a two-stage,
coarse-to-fine approach [8]. The first stage is used to predict
the region of the interest (ROI) of the target organs, while the
second stage is learned to predict the final segmentation. No
organ-specific or energy-specific prior knowledge is required
in the proposed method. The cross-validation results showed
that the proposed method is promising to solve multi-organ
segmentation problem for DECT. To the best of our knowledge, this is the first study about multi-organ segmentation in
DECT images based on 3D FCNs.
2. MATERIALS AND METHODS
2.1. Network Architecture for DECT Prediction
DECT
As described by Krauss et al. [10], a mixed image display is
employed in clinical practice for the diagnose using DECT.
The mixed image is calculated by linear weighting of the images values of the two spectra:
Imix = α · Ilow + (1 − α) · Ihigh
(1)
where α is the weight of the dual energy composition, Imix
denotes the mixed image. Ilow and Ihigh are the images at low
and high kV, respectively.
We preprocessed the DECT images following Eq. 1
straightforwardly. Figure 1 illustrates the network architecture of the proposed method for the DECT multi-organ
segmentation. First of all, mixed image is calculated by combining the images at the low energy level and the high energy
level using Eq. 1. Then, a binary mask is generated by thresholding the skin contour of the mixed image. Subsequently,
the mixed image, the binary mask and the labeled image are
given into the network as multi-channel inputs. The network
consists of two stages. The first stage is applied to generate
the region of the interest (ROI) in order to reduce the search
space for the second stage. The prediction result of the first
stage is taken as the mask for the second stage. Each stage is
based on a standard 3D U-Net [11], which is a fully convolutional network including an analysis and a synthesis path. We
used the open-source implementation of two stages cascaded
network [8] developed by Roth et al. based on the 3D UNet [11] and the Caffe deep learning library [12]. A general
model was trained by Roth et al. [8] on a large set of SECT
images including some of the major organ labels. Our model
was trained by fine-tuning the general model with the mixed
DECT images. The difference between the network output
and the ground truth labels are compared using softmax with
weight voxel-wise cross-entropy loss [8, 11].
SECT
[9]
Avg.
SD
Min.
Max.
Avg.
SD
Min.
Max.
Liver
0.92
0.02
0.84
0.94
0.95
0.02
0.91
0.97
Spleen
0.84
0.08
0.62
0.95
0.90
0.06
0.75
0.95
r.Kidney
0.88
0.03
0.80
0.94
0.90
0.06
0.75
0.95
l.Kidney
0.87
0.03
0.78
0.93
0.88
0.05
0.78
0.94
Table 1:
Dice coefficients of cross-validation with
αtraining =0.6 and αtest =0.6. SD is abbreviated for standard
deviation. Notice that the methods used different data set, the
numbers are not directly comparable.
an inter-observer way. Training data, validation data, and test
data were selected randomly with the ratio 5:1:1, i.e. in each
test we used 6 images for validation, 6 images for test, and 30
images for training.
3. RESULTS
3.1. Performance Estimation with Cross-Validation
NVIDIA GeForce GTX 1080 Ti with 11 GB memory was
used for all of the experiments. The similarity between the
segmentation result and the ground truth was measured with
Dice metric by using the tool provided by VISCERAL [13].
First, the performance of the proposed method was estimated
by 8-folds cross-validation, using 0.6 as αtraining as well as
αtest . Fig. 2 shows one segmentation results in 3-D. Table1
summarizes the Dice coefficients of the segmentation results
and compares DECT results with the SECT results. The proposed method under the above weight condition yielded an
average Dice coefficient of 92% for the liver, 84% for the
spleen, 88% for the right kidney and 87% for the left kidney, respectively. Fig. 3 plots the distributions of the Dice
coefficients for different test scenarios and showed the high
robustness of the proposed method.
2.2. Experimental Setup
The proposed method was evaluated with 42 clinical torso
DECT images scanned by the department of radiology, university hospital Erlangen. All of the images were taken from
male and female adult patients who had different clinically
oriented indication justified by the radiologist. Ultravist 370
was given as contrast agent with body weight adapted volumes. The images were acquired at different X-ray tube voltage setting of 70 kV (560 mAs) and Sn 150 kV (140 mAs,
with Sn filter) using a Siemens SOMATOM Force CT system
with Stellar detector, an energy integrating detector. Each volume consists of 992-1290 slices of 512x512 pixels. The voxel
dimensions are [0.6895-0.959, 0.6895-0.959, 0.6] mm. Four
abdominal organs were tested, including liver, spleen, right
and left kidneys. Ground truth was generated by experts in
3.2. Study on the Weight α
We are aiming at exploiting the spectral information in the
DECT data. Since the α mixing results basically in pseudo
monochromatic images comparable to single energy scans,
the influence of the weight α on the accuracy was further researched. 0.3, 0.6 and 0.9 were chosen as αtraining and αtest
in this study. Fig. 4 illustrates the distributions of the Dice
coefficients with different weight combination for the testing
fold 1. Table 2 lists the average Dice coefficient. For all of
the cases, the liver had the highest accuracy (92%-93%), the
standard deviation of the dice coefficients (around 2%) was
fairly robust. The segmentation of the right kidney was usually more accurate than the left kidney. The best Dice values
per organ per training set are highlighted in Table 2. The test
Fig. 1: Cascaded network architecture for DECT multi-organ segmentation
Fig. 2: 3D rendering of one DECT segmentation with yellow
for liver, blue for spleen, green for right kidney and red for
left kidney
Fig. 4: Dice coefficients of target organs with alpha blending
for testing fold 1
with αtraining =0.9 and αtest =0.9 obtained the highest accuracy
for liver and right kidney. The test with weight combination
0.9-0.6 showed the best segmentation for spleen, the combination with 0.9-0.3 had the finest result for left kidney. The
αtest =0.9 generated better segmentation for liver, the αtest =0.6
worked better for spleen.
4. DISCUSSION AND CONCLUSION
Fig. 3: Dice coefficients of the target organs with αtraining =
0.6 and αtest = 0.6 for 8 different testing folds
We proposed a deep learning based method for automatic abdominal multi-organ segmentation in DECT. The evaluation
results show the feasibility of the proposed method. Compared to the results of the SECT images reported by Roth et
al. [9], our method is promising and robust (see Table 1). The
segmentation of liver and spleen was less accurate than the
SECT. The third testing fold had a large deviation. The reason could be that our image data were taken from patients
with different disease (liver tumor, spleen tumor, etc.). The
disease type is not considered by the data selection. Training
αtraining -αtest
0.3-0.3
0.3-0.6
0.3-0.9
0.6-0.3
0.6-0.6
0.6-0.9
0.9-0.3
0.9-0.6
0.9-0.9
Liver
0.924
0.925
0.926
0.909
0.922
0.912
0.930
0.932
0.933
Spleen
0.850
0.885
0.866
0.847
0.899
0.872
0.860
0.900
0.896
r.Kidney
0.900
0.891
0.872
0.844
0.895
0.843
0.898
0.904
0.905
l.Kidney
0.891
0.881
0.841
0.885
0.887
0.873
0.892
0.873
0.862
Table 2: Dice coefficients of different alpha for testing fold
1. Bold denotes the best organ results per training set.
and test with inconsistent symptoms could have an impact on
the accuracy.
The study on the weight can be divided into three groups
with different αtraining . α=0.9 is close to the low energy
images which have on average the best soft-tissue contrast,
αtraining =0.9 worked thus better in general. α=0.6 is close
to α=0.5 which is the optimal fusion of both images with
respect to signal-to-noise ratio (SNR), αtraining =0.6 had therefore usually the smallest deviation and showed the strongest
adaptability in the inter-group comparison. The intra-group
comparison showed that the cases with identical training and
test conditions had a higher probability to get the best segmentation result. This is expected because the mixed images
generated by the matched training and test conditions may
have the highest similarity. Furthermore, the comparison of
the case 0.3-0.9 (low-contrast model for high-contrast image)
with the case 0.9-0.3 (high-contrast model for low-contrast
image) showed that using a model trained on high-contrast
images for segmenting low-contrast test images works better. In addition, liver is well segmented in middle to high α
ranges. Spleen is segmented best at α=0.6. Kidneys work best
in matched training and test conditions. This suggests that
there is an optimal α for each organ for image segmentation.
The weight α for the mixed image calculation is currently a user-defined parameter in the preprocessing in our
approach. It can be used to augment the data for the training
in future. Also, the net could be modified with two image
inputs. Furthermore, more organs and more scans from different patients could be used.
ACKNOWLEDGMENTS This work was supported by
the German Research Foundation (DFG) through research
grant No. KA 1678/20, LE 2763/2-1 and MA 4898/5-1.
5. REFERENCES
[1] Dushyant Sahani, “Dual-energy CT: The technological
approaches,” Society of Computed Body Tomography
and Magnetic Resonance (SCBT-MR), 2012.
[2] Cynthia H. McCollough, Shuai Leng, Lifeng Yu, and
Joel G. Fletcher, “Dual- and multi-energy CT: Principles, technical approaches, and clinical applications,”
Radiology, vol. 276, no. 3, pp. 637–653, 2015.
[3] Stefan Kuchenbecker, Sebastian Faby, David Simons,
Michael Knaup, Heinz-Peter Schlemmer, Michael M.
Lell, and Marc Kachelriess, “Segmentation-assisted material decomposition in dual energy computed tomography (DECT),” in Radiological Society of North America
(RSNA), 2015.
[4] Sabrina Dorn, Shuqing Chen, Stefan Sawall, Andreas
Maier, Michael Lell, and Marc Kachelrieß, “Organspecific context-sensitive single and dual energy CT
(DECT) image reconstruction, display and analysis,” in
Radiological Society of North America, 2017.
[5] Sabrina Dorn, Shuqing Chen, Stefan Sawall, David Simons, Matthias May, Heinz-Peter Schlemmer, Andreas
Maier, Michael Lell, and Marc Kachelrieß, “Organspecific context-sensitive CT image reconstruction and
display,” in SPIE accepted, 2018.
[6] S Wesarg, M Kirschner, M Becker, M Erdt, K Kafchitsas, MF Khan, et al., “Dual-energy CT-based assessment of the trabecular bone in vertebrae,” Methods of
information in medicine, vol. 51, no. 5, pp. 398, 2012.
[7] Marc Aubreville, Miguel Goncalves, Christian Knipfer,
Nicolai Oetter, Tobias Würfl, Helmut Neumann, Florian Stelzle, Christopher Bohr, and Andreas K. Maier,
“Patch-based carcinoma detection on confocal laser endomicroscopy images - A cross-site robustness assessment,” CoRR, vol. abs/1707.08149, 2017.
[8] Holger R. Roth, Hirohisa Oda, Yuichiro Hayashi,
Masahiro Oda, Natsuki Shimizu, Michitaka Fujiwara,
Kazunari Misawa, and Kensaku Mori, “Hierarchical 3D
fully convolutional networks for multi-organ segmentation,” in arXiv preprint arXiv:1704.06382.
[9] Holger Roth, Ying Yang, Masahiro Oda, Hirohisa Oda,
Yuichiro Hayashi, Natsuki Shimizu, Takayuki Kitasaka,
Michitaka Fujiwara, Kazunari Misawa, and Kensaku
Mori, “Torso organ segmentation in CT using fine-tuned
3D fully convolutional networks,” in 36 (JAMIT), 2017.
[10] Bernhard Krauss, Bernhard Schmidt, and Thomas G.
Flohr, Dual Energy CT in Clinical Practice, chapter
Dual Source CT, Springer Berlin Heidelberg, 2011.
[11] Özgün Çiçek, Ahmed Abdulkadir, Soeren S. Lienkamp,
Thomas Brox, and Olaf Ronneberger, “3D U-Net:
Learning dense volumetric segmentation from sparse
annotation,” in Medical Image Computing and Computer Assisted Intervention (MICCAI), 2016.
[12] Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey
Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell, “Caffe: Convolutional architecture for fast feature embedding,” arXiv preprint
arXiv:1408.5093, 2014.
[13] Abdel Aziz Taha and Allan Hanbury, “Metrics for evaluating 3D medical image segmentation: analysis, selection, and tool,” BMC Medical Imaging, vol. 15, pp. 29,
August 2015.
| 1cs.CV
|
ON THE FREENESS OF RATIONAL CUSPIDAL PLANE CURVES
arXiv:1802.06688v2 [math.AG] 26 Feb 2018
ALEXANDRU DIMCA AND GABRIEL STICLARU
Abstract. We bring additional support to the conjecture saying that a rational
cuspidal plane curve is either free or nearly free. This conjecture was confirmed
for curves of even degree, and in this note we prove it for many odd degrees. In
particular, we show that this conjecture holds for the curves of degree at most 34.
1. Introduction
A plane rational cuspidal curve is a rational curve C : f = 0 in the complex
projective plane P2 , having only unibranch singularities. The study of these curves
has a long and fascinating history, some long standing conjectures, as the CoolidgeNagata conjecture being proved only recently, see [20], other conjectures, as the one
on the number of singularities of such a curve being bounded by 4, see [24], are still
open. The classification of such curves is not easy, there are a wealth of examples
even when additional strong restrictions are imposed, see [17, 18, 19, 22, 23, 27].
Free divisors, defined by a homological property of their Jacobian ideals, have
been introduced in a local analytic setting by K. Saito in [25], and then extended
to projective hypersurfaces, see [3, 29] and the references there. We have remarked
in [13] that many plane rational cuspidal curves are free. The remaining examples
of plane rational cuspidal curves in the available classification lists turned out to
satisfy a weaker homological property, which was chosen as the definition of a nearly
free curve, see [14]. Subsequently, a number of authors have establish interesting
properties of this class of curves, see [2, 21].
In view of the above remark, we have conjectured in [14, Conjecture 1.1] that any
plane rational cuspidal curve C is either free or nearly free. This conjecture was
proved in [14, Theorem 3.1] for curves C whose degree d is even, as well as for some
cases when d is odd, e.g. when d = pk , for a prime number p > 2. In this note we
take a closer look at the case d odd.
Let S = C[x, y, z] be the polynomial ring in three variables x, y, z with complex
coefficients, f ∈ S a reduced homogeneous polynomial of degree d ≥ 2, and let fx , fy
and fz be the partial derivatives of f with respect to x, y and z respectively. Consider
the graded S−submodule AR(f ) ⊂ S 3 of all relations involving the derivatives of f ,
namely
ρ = (a, b, c) ∈ AR(f )q
2010 Mathematics Subject Classification. Primary 14H45; Secondary 14B05, 14H50, 13D02,
32S35.
Key words and phrases. rational cuspidal curves, Jacobian syzygy, Tjurina number, free curves,
nearly free curves.
1
2
ALEXANDRU DIMCA AND GABRIEL STICLARU
if and only if afx + bfy + cfz = 0 and a, b, c are in Sq , the space of homogeneous
polynomials of degree q. The minimal degree of a Jacobian relation for the polynomial f ∈ Sd is the integer mdr(f ) defined to be the smallest integer m ≥ 0 such that
AR(f )m 6= 0. When mdr(f ) = 0, then C : f = 0 is a union of lines passing through
one point, and hence C is cuspidal only for d = 1.
We assume from now on in this note that mdr(f ) ≥ 1. It turns out that a rational
cuspidal curve C : f = 0 with mdr(f ) = 1 is nearly free. Indeed, this follows from
[8, Proposition 4.1]. To see this, note that the implication (1) ⇒ (2) there holds for
any d ≥ 2.
Assume from now on that d is odd, and let
(1.1)
d = pk11 · pk22 · · · pkmm
be the prime decomposition of d. We assume also that m ≥ 2, the case m = 1
of our conjecture being settled in [14, Corollary 3.2]. By changing the order of the
k
pj ’s if necessary, we can and do assume that pk11 > pj j , for any 2 ≤ j ≤ m. Set
e1 = d/pk11 . With these assumptions and notations, the main results of this note are
the following.
Theorem 1.1. Let C : f = 0 be a rational cuspidal curve of degree d = 2d′ + 1 an
odd number. Then mdr(f ) ≤ d′ and if equality holds, then C is either free or nearly
free.
Theorem 1.2. Let C : f = 0 be a rational cuspidal curve of degree d = 2d′ + 1, an
odd number as in (1.1). Then, if
d − e1
,
2
then C is either free or nearly free. In particular, the following hold.
i) If d = 3pk , with p a prime number, then C is either free or nearly free.
ii) d = 5pk , with p a prime number, pk > 3, then C is either free or nearly free,
unless mdr(f ) = d′ − 1.
mdr(f ) ≤ r0 :=
Remark 1.3. Note that, for d 6= 15, we have e1 ≤ d/7 and hence
d(1 − 71 )
d − e1
3d
r0 =
=
.
≥
2
2
7
Therefore, the only cases not covered by our results correspond to curves of odd
degree d, such that r = mdr(f ) satisfies
3d
d−3
+ 1 ≤ r0 + 1 ≤ r ≤ d ′ − 1 =
.
7
2
Corollary 1.4. A rational cuspidal curve C : f = 0 of degree d is either free or
nearly free, if one of the following holds.
(1) mdr(f ) ≤ 15, or
(2) d ≤ 90, unless we are in one of the following situations.
i) d = 35 and mdr(f ) = 16;
ON THE FREENESS OF RATIONAL CUSPIDAL PLANE CURVES
ii)
iii)
iv)
v)
vi)
vii)
d = 45
d = 55
d = 63
d = 65
d = 77
d = 85
and
and
and
and
and
and
3
mdr(f ) = 21;
mdr(f ) = 26;
mdr(f ) ∈ {29, 30};
mdr(f ) = 31.
mdr(f ) ∈ {36, 37}.
mdr(f ) = 41.
In the excluded situations, our results do not allow us to conclude.
The proof of our main results are based on a deep result by U. Walther, see [31,
Theorem 4.3] bringing into the picture the monodromy of the Milnor fiber F : f = 1
associated to the curve C : f = 0. A second ingredient is our results on the relations
between the Hodge filtration and pole order filtration on the cohomology group
H 1 (F, C), see [12, Theorem 1.2] and [16, Proposition 2.2].
The first author thanks AROMATH team at INRIA Sophia-Antipolis for excellent
working conditions, and in particular Laurent Busé for stimulating discussions.
2. Some facts about free and nearly free curves
Here we recall some basic notions on free and nearly free curves. We denote by
Jf the Jacobian ideal of f , i.e. the homogeneous ideal of S spanned by the partial
derivatives fx , fy , fz and let M(f ) = S/Jf be the corresponding graded ring, called
the Jacobian (or Milnor) algebra of f . Let If denote the saturation of the ideal Jf
with respect to the maximal ideal m = (x, y, z) in S and recall the relation with the
0-degree local cohomology
0
(M(f )).
N(f ) := If /Jf = Hm
It was shown in [9, Corollary 4.3] that the graded S-module N(f ) satisfies a Lefschetz
type property with respect to multiplication by generic linear forms. This implies in
particular the inequalities
(2.1)
0 ≤ n(f )0 ≤ n(f )1 ≤ ... ≤ n(f )[T /2] ≥ n(f )[T /2]+1 ≥ ... ≥ n(f )T ≥ 0,
where T = 3d − 6 and n(f )k = dim N(f )k for any integer k. If we set ν(f ) =
dim N(f )[T /2] , then C : f = 0 is a free curve if ν(f ) = 0. We say that C : f = 0
is a nearly free curve if ν(f ) = 1, see [2, 7, 8, 13, 14] for more details, equivalent
definitions and many examples.
Note that the curve C : f = 0 is free if and only if the graded S-module AR(f )
is free of rank 2, i.e. there is an isomorphism of graded S-modules
AR(f ) = S(−d1 ) ⊕ S(−d2 )
for some positive integers d1 ≤ d2 . When C is free, the integers d1 ≤ d2 are called
the exponents of C. They satisfy the relations
(2.2)
d1 + d2 = d − 1 and τ (C) = (d − 1)2 − d1 d2 ,
Pp
where τ (C) is the total Tjurina number of C, that is τ (C) =
i=1 τ (C, xi ), the
xi ’s being the singular points of C, and τ (C, xi ) denotes the Tjurina number of the
4
ALEXANDRU DIMCA AND GABRIEL STICLARU
isolated plane curve singularity (C, xi ), see for instance [10, 13]. In the case of a
nearly free curve, there are also the exponents d1 ≤ d2 , and this time they verify
(2.3)
d1 + d2 = d and τ (C) = (d − 1)2 − d1 (d2 − 1) − 1.
Both for a free and a nearly free curve C : f = 0, one has mdr(f ) = d1 , and hence
mdr(f ) ≤ (d − 1)/2 for a free curve C, and mdr(f ) ≤ d/2 for a nearly free curve
C. It follows that Theorem 1.1 gives a similar inequality for any rational cuspidal
curve. Our examples of rational cuspidal curves given in [11], which are also free or
nearly free, show that all the possible values of mdr(f ) do actually occur for any
fixed degree d. It follows that
If we set r = mdr(f ), then the curve C : f = 0 is free (resp. nearly free) if and
only if
(2.4)
τ (C) = τ (d, r) := (d − 1)2 − r(d − 1 − r)
(resp. τ (C) = τ (d, r) − 1), see [7].
Remark 2.1. If the equation f = 0 of the curve C is given explicitly, then one can
use a computer algebra software, for instance Singular [4], in order to compute the
integer mdr(f ). Such a computer algebra software can of course decide whether the
curve C is free or nearly free, see for instance the corresponding code on our website
http://math.unice.fr/~ dimca/singular.html
However, for large degrees d, it is much quicker to determine the integer mdr(f ).
3. The proofs
First we recall the setting used in the proof of [14, Theorem 3.1]. The key results
of U. Walther in [31, Theorem 4.3] yield the inequality
(3.1)
dim N(f )2d−2−j ≤ dim H 2 (F, C)λ ,
for j = 1, 2, ..., d, where F : f (x, y, z)−1 = 0 is the Milnor fiber in C3 associated to the
plane curve C, and the subscript λ indicates the eigenspace of the monodromy action
corresponding to the eigenvalue λ = exp(2πi(d + 1 − j)/d) = exp(−2πi(j − 1)/d).
Assume that C is a rational cuspidal curve of degree d. Denote by U the complement P2 \ C, and note that its topological Euler characteristic is given by E(U) =
E(P2 )−E(C) = 1. Since F is a cyclic d-fold covering of the complement U, it follows
that H m (F, C)1 = H m (U, C) = 0 for m = 1, 2. We have also
dim H 2 (F, C)λ − dim H 1 (F, C)λ + dim H 0 (F, C)λ = E(U) = 1,
see for instance [5, Prop. 1.21, Chapter 4] or [6, Cor. 5.1 and Remark 5.1]. For any
λ 6= 1, since clearly H 0 (F, C)λ = 0, we get
(3.2)
dim H 2 (F, C)λ = dim H 1 (F, C)λ + 1.
ON THE FREENESS OF RATIONAL CUSPIDAL PLANE CURVES
5
3.1. Proof of Theorem 1.1. Suppose now that d is odd, say d = 2d′ + 1. In
order to prove ν(f ) ≤ 1, in view of the inequality (3.1), it is enough to show that
dim H 2 (F, C)λ = 1, for λ = exp(2πid′ /(2d′ + 1)) which corresponds to j = d′ + 2.
The equation (3.2) tells us that this is equivalent to dim H 1 (F, C)λ = 0. Using [16,
Proposition 2.2], see also [15, Remark 4.4], it follows that
dim H 1 (F, C)λ = dim E21,0 (f )k + dim E21,0 (f )d−k ,
where k = j − 1 = d′ + 1. Here E21,0 (f )k and E21,0 (f )d−k denote some terms of the
second page of spectral sequences used to compute the monodromy action on the
Milnor fiber F , see [5, 12, 15, 26] for details. Note also that the weaker result in
[12, Theorem 1.2] is enough for this proof. By the construction of these spectral
sequences, it follows that, for q ≤ d, one has an identification
E21,0 (f )q = {(a, b, c) ∈ AR(f )q−2 : ax + by + cz = 0},
where ax is the partial derivative of a with respect to x and so on. It follows that
dim E21,0 (f )k + dim E21,0 (f )d−k ≤ dim AR(f )d′ −1 + dim AR(f )d′ −2 .
If mdr(f ) ≥ d′ , it follows that AR(f )d′ −1 = AR(f )d′ −2 = 0, and hence the curve C
is either free or nearly free. But this implies that mdr(f ) ≤ d′ , as explained in the
previous section.
3.2. Proof of Theorem 1.2. For the reader’s convenience, we divide this proof into
two steps.
Proposition 3.3. With the above notation, we have dim N(f )j ≤ 1, for any integer
j ≤ d − 3 + r0 and for any integer j ≥ 2d − 3 − r0 .
Proof. Let t1 = (pk11 − 1)/2 and note that
d
T
= .
2
2
We apply the inequality (3.1) with j = d + 1 − e1 t1 = d + 1 − r0 . It follows that
d − 3 + r0 = d − 3 + e1 t1 < d − 3 +
(3.3)
dim N(f )d−3−r0 ≤ dim H 2 (F, C)λ,
with
2πit1
.
λ = exp(2πir0 /d) = exp
pk11
Since this eigenvalue has order a prime power, it follows from Zariski’s Theorem,
see [1, Proposition 2.1], that H 1 (F, C)λ = 0. Using (3.2), we get dim N(f )j ≤ 1 for
j = d − 3 + r0 . The claim for j = 2d − 3 − r0 follows from the fact that the graded
module N(f ) enjoys a duality property: dim N(f )j = dim N(f )T −j , for any integer
j, see [28, 30]. The Lefschetz type property of the graded module N(f ), see (2.1),
completes the proof of this Proposition.
Proposition 3.4. A rational cuspidal curve C : f = 0 of degree d as in (1.1), and
such that r = mdr(f ) ≤ r0 , is either free or nearly free.
6
ALEXANDRU DIMCA AND GABRIEL STICLARU
Proof. We use the formulas (2.2) and (2.3) from [7] and get the following equality
dim AR(f )d−r−2 − dim N(f )2d−r−3 + dim AR(f )r−2 =
2d − r − 1
d−r
+ τ (C).
−
=3
2
2
For any curve C : f = 0, it is known that, if ρ1 ∈ AR(f )r , then the first relation
ρ ∈ AR(f )m which is not a multiple of ρ1 occurs in a degree m ≥ d − r − 1, see [29,
Lemma 1.1]. It follows that
(d − 2r)(d − 2r − 1)
d − 2r
=
dim AR(f )d−r−2 = dim Sd−2r−2 · ρ1 =
,
2
2
for any r such that 2r ≤ d. Using the obvious fact that AR(f )r−2 = 0, a direct
computation shows that
τ (C) = τ (d, r) − dim N(f )2d−r−3 .
Since r ≤ r0 , it follows that 2d − r − 3 ≥ 2d − r0 − 3, and hence dim N(f )2d−r−3 ≤ 1
by Proposition 3.3. The claim follows now using the characterization of free (resp.
nearly free) curves given above in (2.4).
It remains to prove the last claim in Theorem 1.2. If d = 3pk , we can assume
pk = 2p′ + 1 > 3 and then
d − e1
r0 =
= 3p′ .
2
On the other hand, d = 3pk = 6p′ + 3 = 2(3p′ + 1) + 1, and hence d′ = 3p′ + 1.
Since mdr(f ) ≤ d′ by Theorem 1.1, we get either mdr(f ) = d′ = 3p′ + 1, and then
we conclude by Theorem 1.1, or mdr(f ) ≤ d′ − 1 = 3p′ = r0 , and then we conclude
using Theorem 1.2.
3.5. Proof of Corollary 1.4. To prove the first claim, we have to consider the
minimal possible value of
d − e1
pk 1 − 1
= e1 1
,
2
2
when d is odd, but neither a prime power, nor of the form 3p, with p > 3 prime.
First, if p1 = 3, then k1 ≥ 2 and e1 ≥ 5, hence r0 ≥ 20. Otherwise, p1 ≥ 5, e1 ≥ 3,
but both cannot be equalites. It follows that the minimal values are obtained for
p1 = 52 and e1 = 3, or p1 = 7 and e1 = 5. In the first case we get r0 = 36, in the
second we get r0 = 15. To prove the second claim, just use Remark 1.3.
r0 =
References
[1] E. Artal Bartolo, A. Dimca, On fundamental groups of plane curve complements, Ann. Univ.
Ferrara 61(2015), 255-262. 3.2
[2] E. Artal Bartolo, L. Gorrochategui, I. Luengo, A. Melle-Hernández, On some conjectures
about free and nearly free divisors, in: Singularities and Computer Algebra, Festschrift for
Gert-Martin Greuel on the Occasion of his 70th Birthday, pp. 1–19, Springer (2017) 1, 2
[3] R.-O. Buchweitz, A. Conca, New free divisors from old, J. Commut. Algebra 5 (2013), no. 1,
17–47. 1
ON THE FREENESS OF RATIONAL CUSPIDAL PLANE CURVES
7
[4] W. Decker, G.-M. Greuel, G. Pfister and H. Schönemann. Singular 4-0-1 — A computer algebra system for polynomial computations, available at http://www.singular.uni-kl.de (2014).
2.1
[5] A. Dimca, Singularities and topology of hypersurfaces, Universitext, Springer-Verlag, New York,
1992. 3, 3.1
[6] A. Dimca, Hyperplane Arrangements: An Introduction, Universitext, Springer, 2017 3
[7] A. Dimca, Freeness versus maximal global Tjurina number for plane curves, Math. Proc.
Cambridge Phil. Soc. 163 (2017), 161–172. 2, 2, 3.2
[8] A. Dimca, On rational cuspidal plane curves, and the local cohomology of Jacobian rings,
arXiv:1707.05258. 1, 2
[9] A. Dimca, D. Popescu, Hilbert series and Lefschetz properties of dimension one almost complete
intersections, Comm. Algebra 44 (2016), 4467–4482. 2
[10] A. Dimca, E. Sernesi, Syzygies and logarithmic vector fields along plane curves, Journal de
l’École polytechnique-Mathématiques 1(2014), 247-267. 2
[11] A. Dimca, G. Sticlaru, On the exponents of free and nearly free projective plane curves, Rev.
Mat. Complut. 30(2017), 259–268. 2
[12] A. Dimca, G. Sticlaru, A computational approach to Milnor fiber cohomology, Forum Math.
29 (2017), 831– 846. 1, 3.1
[13] A. Dimca, G. Sticlaru, Free divisors and rational cuspidal plane curves, Math. Res. Lett.
24(2017), 1023–1042. 1, 2, 2
[14] A. Dimca, G. Sticlaru, Free and nearly free curves vs. rational cuspidal plane curves, Publ.
RIMS Kyoto Univ., 54:163–179 (2018). 1, 1, 2, 3
[15] A. Dimca, G. Sticlaru, Computing the monodromy and pole order filtration on Milnor fiber
cohomology of plane curves, arXiv: 1609.06818. 3.1
[16] A.Dimca, G. Sticlaru, Computing Milnor fiber monodromy for projective hypersurfaces,
arXiv:1703.07146. 1, 3.1
[17] J. Fernandez de Bobadilla, I. Luengo, A. Melle-Hernandez, A. Nemethi, Classification of rational unicuspidal projective curves whose singularities have one Puiseux pair, in: Real and
Complex Singularities Sao Carlos 2004, Trends in Mathematics, Birkhauser 2006, pp. 31-45. 1
[18] T. Fenske, Rational 1- and 2-cuspidal plane curves, Beiträge Algebra Geom., 40(1999), 309-329.
1
[19] H. Flenner, M. Zaidenberg, On a class of rational plane curves, Manuscripta Math. 89(1996),
439 - 459. 1
[20] M. Koras, K. Palka, The Coolidge–Nagata conjecture. Duke Math. J. 166 (2017), no. 16,
3085–3145. 1
[21] S. Marchesi, J. Vallès, Nearly free curves and arrangements: a vector bundle point of view,
arXiv:1712.04867. 1
[22] T. K. Moe, Rational Cuspidal Curves, arXiv:1511.02691 (139 pages, Master thesis, University
of Oslo, 2008) 1
[23] K. Palka, T. Pelka, Classification of planar rational cuspidal curves. I. C**-fibrations, Proc.
London Math. Soc. 115 (2017), 638–692. 1
[24] J. Piontkowski, On the number of cusps of rational cuspidal plane curves, Experiment. Math.,
16(2007), 251-255. 1
[25] K. Saito, Theory of logarithmic differential forms and logarithmic vector fields, J. Fac. Sci.
Univ. Tokyo Sect. IA Math. 27 (1980), no. 2, 265-291. 1
[26] M. Saito, Bernstein-Sato polynomials for projective hypersurfaces with weighted homogeneous
isolated singularities, arXiv:1609.04801. 3.1
[27] F. Sakai, K. Tono, Rational cuspidal curves of type (d,d-2) with one or two cusps, Osaka J.
Math. 37(2000), 405-415. 1
[28] E. Sernesi, The local cohomology of the jacobian ring, Documenta Mathematica, 19 (2014),
541-565. 3.2
8
ALEXANDRU DIMCA AND GABRIEL STICLARU
[29] A. Simis, S.O. Tohăneanu, Homology of homogeneous divisors, Israel J. Math. 200 (2014),
449-487. 1, 3.2
[30] D. van Straten, T. Warmt, Gorenstein duality for one-dimensional almost complete
intersections–with an application to non-isolated real singularities, Math. Proc.Cambridge Phil.
Soc.158(2015), 249–268. 3.2
[31] U. Walther, The Jacobian module, the Milnor fiber, and the D-module generated by f s , Invent.
Math. 207 (2017),1239–1287. 1, 3
Université Côte d’Azur, CNRS, LJAD and INRIA, France
E-mail address: [email protected]
Faculty of Mathematics and Informatics, Ovidius University Bd. Mamaia 124,
900527 Constanta, Romania
E-mail address: [email protected]
| 0math.AC
|
Proper affine actions: a sufficient
criterion
arXiv:1612.08942v1 [math.GR] 28 Dec 2016
Ilia Smilga
December 30, 2016
For a semisimple real Lie group G with an irreducible representation ρ on
a finite-dimensional real vector space V , we give a sufficient criterion on ρ
for existence of a group of affine transformations of V whose linear part is
Zariski-dense in ρ(G) and that is free, nonabelian and acts properly discontinuously on V . This new criterion is more general than the one given in
the author’s previous paper Proper affine actions in non-swinging representations (submitted; available at arXiv:1605.03833), insofar as it also deals
with “swinging” representations. We conjecture that it is actually a necessary
and sufficient criterion, applicable to all representations.
1 Introduction
1.1 Background and motivation
The present paper is part of a larger effort to understand discrete groups Γ of affine
transformations (subgroups of the affine group GLn (R) ⋉ Rn ) acting properly discontinuously on the affine space Rn . The case where Γ consists of isometries (in other words,
Γ ⊂ On (R) ⋉ Rn ) is well-understood: a classical theorem by Bieberbach says that such
a group always has an abelian subgroup of finite index.
We say that a group G acts properly discontinuously on a topological space X if for every compact K ⊂ X, the set {g ∈ G | gK ∩ K 6= ∅} is finite. We define a crystallographic
group to be a discrete group Γ ⊂ GLn (R) ⋉ Rn acting properly discontinuously and such
that the quotient space Rn /Γ is compact. In [Aus64], Auslander conjectured that any
crystallographic group is virtually solvable, that is, contains a solvable subgroup of finite
index. Later, Milnor [Mil77] asked whether this statement is actually true for any affine
group acting properly discontinuously. The answer turned out to be negative: Margulis
[Mar83, Mar87] gave a nonabelian free group of affine transformations with linear part
Zariski-dense in SO(2, 1), acting properly discontinuously on R3 . On the other hand,
Fried and Goldman [FG83] proved the Auslander conjecture in dimension 3 (the cases
n = 1 and 2 are easy). Recently, Abels, Margulis and Soifer [AMS] proved it in dimension
n ≤ 6. See [Abe01] for a survey of already known results.
1
Margulis’s breakthrough was soon followed by the construction of other counterexamples to Milnor’s conjecture. Most of these counterexamples have been free groups.
(Only recently, Danciger, Guéritaud and Kassel [DGK] found examples of affine groups
acting properly discontinuously that are neither virtually solvable nor virtually free.)
The author focuses on the case of free groups, asking the following question. Consider
a semisimple real Lie group G; for every representation ρ of G on a finite-dimensional
real vector space V , we may consider the affine group G ⋉ V . Does that affine group
contain a nonabelian free subgroup with linear part Zariski-dense in G and acting properly discontinuously on V ? (More precisely, for which values of G and V is the answer
positive?)
Here is a summary of previous work on this question:
• Margulis’s original work [Mar83, Mar87] gave a positive answer for G = SO+ (2, 1)
acting on V = R3 .
• Abels, Margulis and Soifer generalized this, giving [AMS02] a positive answer for
G = SO+ (2n + 2, 2n + 1) acting on V = R4n+3 (for every integer n ≥ 0).
• They showed later [AMS11] that for all other values of p and q, the answer for
G = SO+ (p, q) acting on V = Rp+q is negative.
• The author of this paper gave [Smi16] a positive answer for any noncompact
semisimple real Lie group G acting (by the adjoint representation) on its Lie algebra g.
• Recently, he gave [Smi] a simple algebraic criterion on G and V guaranteeing that
the answer is positive. However, this criterion included an additional assumption
about V (namely that the representation is “non-swinging”: see Definition 5.13.4),
which is not in fact necessary.
This paper gives a better sufficient condition on G and V for the answer to be positive.
This condition works for all representations, non-swinging and swinging. The author conjectures that the new condition is in fact necessary, thus giving a complete classification
of such counterexamples.
In order to state this condition, we need to introduce a few classical notations.
1.2 Basic notations
For the remainder of the paper, we fix a semisimple real Lie group G; let g be its Lie
algebra. Let us introduce a few classical objects related to g and G (defined for instance
in Knapp’s book [Kna96], though our terminology and notation differ slightly from his).
We choose in g:
• a Cartan involution θ. Then we have the corresponding Cartan decomposition
g = k ⊕ q, where we call k the space of fixed points of θ and q the space of fixed
points of −θ. We call K the maximal compact subgroup with Lie algebra k.
2
• a Cartan subspace a compatible with θ (that is, a maximal abelian subalgebra of g
among those contained in q). We set A := exp a.
• a system Σ+ of positive restricted roots in a∗ . Recall that a restricted root is a
nonzero element α ∈ a∗ such that the restricted root space
gα := {Y ∈ g | ∀X ∈ a, [X, Y ] = α(X)Y }
is nontrivial. They form a root system Σ; a system of positive roots Σ+ is a subset
of Σ contained in a half-space and such that Σ = Σ+ ⊔ −Σ+ . (Note that in contrast
to the situation with ordinary roots, the root system Σ need not be reduced; so in
addition to the usual types, it can also be of type BCn .)
We call Π be the set of simple restricted roots in Σ+ . We call
a++ := X ∈ a ∀α ∈ Σ+ , α(X) > 0
the (open) dominant Weyl chamber of a corresponding to Σ+ , and
a+ := X ∈ a ∀α ∈ Σ+ , α(X) ≥ 0 = a++
the closed dominant Weyl chamber.
Then we call:
• M the centralizer of a in K, m its Lie algebra.
• L the centralizer of a in G, l its Lie algebra. It is clear that l = a ⊕ m, and well
known (see e.g. [Kna96], Proposition 7.82a) that L = M A.
• n+ (resp. n− ) the sum of the restricted root spaces of Σ+ (resp. of −Σ+ ), and
N + := exp(n+ ) and N − := exp(n− ) the corresponding Lie groups.
• p+ := l ⊕ n+ and p− := l ⊕ n− the corresponding minimal parabolic subalgebras,
P + := LN + and P − := LN − the corresponding minimal parabolic subgroups.
• W := NG (A)/ZG (A) the restricted Weyl group.
• w0 the longest element of the Weyl group, that is, the unique element such that
w0 (Σ+ ) = Σ− . It is clearly an involution.
See Examples 2.3 and 2.4 in the author’s previous paper [Smi16] for working through
those definitions in the cases G = PSLn (R) and G = PSO+ (n, 1).
Finally, if ρ is a representation of G on a finite-dimensional real vector space V , we
call:
• the restricted weight space in V corresponding to a form λ ∈ a∗ the space
V λ := {v ∈ V | ∀X ∈ a, X · v = λ(X)v} ;
3
• a restricted weight of the representation ρ any form λ ∈ a∗ such that the corresponding weight space is nonzero.
Remark 1.1. The reader who is unfamiliar with the theory of noncompact semisimple
real Lie groups may focus on the case where G is split, i.e. its Cartan subspace a is
actually a Cartan subalgebra (just a maximal abelian subalgebra, without any additional
hypotheses). In that case the restricted roots are just roots, the restricted weights are just
weights, and the restricted Weyl group is just the usual Weyl group. Also the algebra m
vanishes and M is a discrete group.
The case where G is split does not actually require the full strength of this paper, in
particular because quasi-translations (see Section 7.2) then reduce to ordinary translations.
1.3 Statement of main result
Let ρ be any representation of G on a finite-dimensional real vector space V . Without
loss of generality, we may assume that G is connected and acts faithfully. We may then
identify the abstract group G with the linear group ρ(G) ⊂ GL(V ). Let VAff be the affine
space corresponding to V . The group of affine transformations of VAff whose linear part
lies in G may then be written G ⋉ V (where V stands for the group of translations). Here
is the main result of this paper.
Main Theorem. Suppose that ρ satisfies the following conditions:
(i) there exists a vector v ∈ V such that:
(a) ∀l ∈ L, l(v) = v, and
(b) w̃0 (v) 6= v, where w̃0 is any representative in G of w0 ∈ NG (A)/ZG (A);
Then there exists a subgroup Γ in the affine group G ⋉ V whose linear part is Zariskidense in G and that is free, nonabelian and acts properly discontinuously on the affine
space corresponding to V .
(Note that the choice of the representative w̃0 in (i)(b) does not matter, precisely
because by (i)(a) the vector v is fixed by L = ZG (A).)
Remark 1.2. It is sufficient to prove the theorem in the case where ρ is irreducible.
Indeed, we may decompose ρ into a direct sum of irreducible representations, and then
observe that:
• if some representation ρ1 ⊕ · · ·⊕ ρk has a vector (v1 , . . . , vk ) that satisfies conditions
(a) and (b), then at least one of the vectors vi must satisfy conditions (a) and (b);
• if V = V1 ⊕ V2 , and a subgroup Γ ⊂ G ⋉ V1 acts properly on V1 , then its image i(Γ)
by the canonical inclusion i : G ⋉ V1 → G ⋉ V still acts properly on V .
We shall start working with an arbitrary representation ρ, and gradually make stronger
and stronger hypotheses on it, introducing each one when we need it to make the construction work (so that it is at least partially motivated). Here is the complete list of
places where new assumptions on ρ are introduced:
4
• Assumption 5.5, which is a necessary condition for (i)(a);
• Assumption 7.12, which is (i)(a);
• Assumption 11.1, which is (i).
Here are a few examples. Items 1 and 2 show that all the previously-known examples do
fall under the scope of this theorem. Item 3 is the simplest previously-unknown example
that our paper brings to light:
Example 1.3.
1. For G = SO+ (2n + 2, 2n + 1), the standard representation (acting on V = R4n+3 )
satisfies these conditions (see Remark 3.9 and Examples 4.22.1.b and 10.2.1 in [Smi]
for details). So Theorem A from [AMS02] is a particular case of this theorem.
2. If the real semisimple Lie group G is noncompact, the adjoint representation satisfies these conditions (see Remark 3.9 and Examples 4.22.3 and 10.2.2 in [Smi] for
details). So the main theorem of [Smi16] is a particular case of this theorem.
3. Take G = SL3 (R) acting on V = S 3 R3 (see Example 3.7 in [Smi] for details). The
group is then split, so that l = a and the set of L-invariant vectors is precisely
the zero (restricted) weight space V 0 . The representation V has dimension 10; the
zero weight space has dimension 1: it is spanned by the vector e1 · e2 · e3 , where
(e1 , e2 , e3 ) is the canonical basis of R3 . A representative w˜0 ∈ SL3 (R) of w0 is given
by
0 0 −1
w̃0 = 0 1 0 .
1 0 0
Clearly this element acts nontrivially on the vector e1 · e2 · e3 .
Remark 1.4. When G is compact, no representation can satisfy these conditions: indeed
in that case L is the whole group G and condition (i)(a) fails. So for us, only noncompact
groups are interesting. This is not surprising: indeed, any compact group acting on a
vector space preserves a positive-definite quadratic form, and so falls under the scope of
Bieberbach’s theorem.
1.4 Strategy of the proof
A central pillar of this paper consists in the following “proposition template”:
Schema 1.5. Let g and h be two elements of “the appropriate group”, such that:
• both g and h are “regular”;
• the pair (g, h) has a “non-degenerate” geometry;
• both g and h have sufficient “contraction strength”.
5
In that case:
(i) the product gh is still “regular”;
(ii) its “attracting geometry” is close to that of g;
(iii) its “repelling geometry” is close to that of h;
(iv) its “contraction strength” is close to the product of those of g and h;
(v) its “asymptotic dynamics” is close to the sum of those of g and h.
We prove three different versions of this statement (with some slight variations, especially concerning asymptotic dynamics), all of which involve a different set of definitions
for the concepts in scare quotes (see Table 1):
• the “proximal” version is Proposition 3.5;
• the “linear” version is Proposition 4.22 (for the “main part”, i.e. points (i) to (iv) in
Schema 1.5) and Proposition 4.24 (for the asymptotic dynamics);
• the “affine” version is Proposition 8.4 (ii) and (iii) (for the main part) and Proposition 9.3 (for the asymptotic dynamics).
For the last two versions, the definitions in question also depend on a parameter fixed
once and for all (given in the second line of Table 1). To give a first intuition, very
roughly, the “geometry” of an element has to do with its eigenvectors, its “contraction
strength” has to do with its singular values, and its “asymptotic dynamics” has to do
with the moduli of its eigenvalues1 (the word “asymptotic” is explained by Gelfand’s
formula (7.13)).
Here is the relationship between these three results:
• The “proximal” version is used as a stepping stone to prove the other two versions. This result is not new: very similar lemmas were proved in [Ben96], [Ben97]
and [AMS02], and this exact statement was proved in the author’s previous papers [Smi16, Smi]. We briefly recall it in Section 3.
• The “linear” version is also used as a stepping stone to prove the affine version,
but not in a completely straightforward way. In fact, the main part of the linear
version, after being reformulated as Proposition 8.4 (i), is only involved in the proof
of the additivity of the Margulis invariant (i.e. the affine version for the asymptotic
dynamics). On the other hand, the linear version for the asymptotic dynamics
is already necessary to prove the main part of the affine version. It is a slight
generalization of a result by Benoist [Ben96]. We cover it in Section 4.
1
In the “affine” case, this is not exactly true: the translation part is also involved.
6
Group where g lives
Parameter
“Regularity”
attracting
“Geometry”:
Proximal case
Linear case
Affine case
GL (E)
(for some real
vector space E)
G
G⋉V
(none)
some subset ΠX
of simple restr.
roots (sec. 2.3)
some extreme,
generically
symmetric
X0 ∈ a+ (sec. 5)
Proximality
(Def. 3.1)
X-regularity
(Def. 4.1)
ρ-regularity
(Def. 6.12)
Egs ∈ P(E)
ygX,+ ∈ G/PX+
Ag , essentiallya ∈
G ⋉ V /PX+0 ⋉ V0≥
(Def. 3.2)
(Def. 4.3)
&
(Def. 7.5)
.
Egu ∈ P(E ∗ )
ygX,− ∈ G/PX−
Ag , essentiallya ∈
G ⋉ V /PX−0 ⋉ V0≤
“Non-degeneracy”
Def. 3.3
Def. 4.10
Def. 7.20
“Contr. strength”
s̃(g) (Def. 3.4)
~
sX (g) (Def. 4.13)
sX0 (g) (Def. 7.22)
repelling
possiblyb
“Asymp. dynamics”
a
b
c
the log
of the spectral
radius r(g)
(Def. 3.1)
roughlyc
the
Jordan
projection Jd(g)
(Def. 2.3)
roughlyc the
Jordan projection
Jd(g), AND the
Margulis
invariant M (g)
(Def. 7.19)
See the last point of Remark 7.15.
In the proximal case, there are at least two reasonable definitions of asymptotic dynamics. Another
|λ1 |
one would be the logarithm of the spectral gap |λ
, defined in the same place.
2|
Technically, the statement of Schema 1.5 only holds for a further projection of Jd(g), given by the
subset of coordinates αi (Jd(g)) for i 6∈ ΠX ; for the remaining coordinates we only get an inequality.
However Proposition 8.1 allows us to circumvent this problem. Also if ΠX0 = ∅, which is often the
case (see Example 5.14.3 and Remark 5.15.(ii)), this issue does not arise at all.
Table 1: Possible meanings of notions appearing in Schema 1.5, with references to the
corresponding definitions.
7
• The “affine” version is the key result of this paper. Just defining the affine concepts
keeps us busy for a long time (Sections 5–7), and proving the results also takes a
fair amount of work (Sections 8 and 9). Once we have it, it takes only five pages
to prove our Main Theorem.
The proof has a lot in common with the author’s previous papers [Smi16, Smi], and
ultimately builds upon an idea that was introduced in Margulis’s seminal paper [Mar83].
Let us now present a few highlights of what distinguishes this paper from the previous
works.
• The main difference lies in the treatment of the dynamical spaces. As long as
we only worked in “non-swinging” representations (see Definition 5.13.4), we could
associate to every element of G ⋉ V that is “regular” (in the appropriate sense) a
decomposition of V into three so-called dynamical subspaces
V = Vg> ⊕ Vg= ⊕ Vg< ,
all stable by g and on which g acts with eigenvalues respectively of modulus > 1,
of modulus 1 and of modulus < 1. In the general case, this is no longer possible: we need to enlarge the neutral subspace Vg= to an “approximately neutral”
subspace Vg≈ . The eigenvalues of g on that subspace are, in some rather weak
sense, “not too far” from 1, but will still grow exponentially (in the group we will
eventually construct). The decomposition now becomes
V = Vg≫ ⊕ Vg≈ ⊕ Vg≪ .
This forces us to completely change our point of view. We now define these “approximate dynamical spaces” in a purely algebraic way, by focusing on the dynamics
that g would have on them if it were conjugate to (the exponential of) some reference element X0 of the Weyl chamber a+ . For this reason, we actually call them
the ideal dynamical spaces (see Definition 7.5). Only by imposing an additional
condition on g (“asymptotic contraction”, see Definition 6.12) can we ensure that
the “ideal” dynamical spaces become indeed the “approximate” dynamical spaces.
• The linear version of Schema 1.5 never explicitly appeared in the author’s previous
papers: so far, we have been able to simply present the linear theory as a particular case of the affine theory. (Even Proposition 6.10 in [Smi], which seems almost
identical to Proposition 4.24 in the current paper, relies in fact on the affine versions of the properties). However this becomes untenable in the case of swinging
representations, as the relationship between affine contraction strength and linear
contraction strength becomes less straightforward (see Section 7.5). This led us
to develop the linear theory on its own; we think that Propositions 4.22 and 4.24
might have some interest independently of the remainder of the paper.
We must however point out that these results are not completely new. The particular case where ΠX = ∅ is due to Benoist [Ben96, Ben97]; the case where ΠX
8
is arbitrary is an easy generalization which also relies on the tools developed by
Benoist, and is well-known to experts in the field. It might seem at first sight that
the general case is actually mentioned explicitly in [Ben97], but this is not so: see
Remark 6.13 in [Smi].
• The central argument of the paper, namely the proof of Proposition 9.3, has been
completely overhauled. Though still highly technical, it is now much cleaner: it is
more symmetric, and the organization of the proof better reflects the separation
of the ideas it involves. Even if we forget the fact that it works in a more general
setting, it is definitely an improvement compared to the proof given in [Smi].
1.5 Plan of the paper
In Section 2, we give a few algebraic results and introduce some notations related to
metric properties and estimates. Most of these results are well-known.
In Section 3, we recall the definitions of the proximal versions of the key properties
and the proximal version of Schema 1.5. This is also well-known.
In Section 4, we define the linear versions of the key properties, then prove the linear version of Schema 1.5. This section clarifies and expands the results mentioned
in Section 6 of [Smi]. Ultimately, most of the definitions and ideas here are due to
Benoist [Ben96, Ben97].
In Section 5, we choose an element X0 ∈ a+ that will be used to define the affine
versions of the key properties. This generalizes Section 3 in [Smi].
In Section 6, we present some preliminary constructions involving X0 , and introduce
some (elementary) formalism that expresses affine spaces in terms of vector spaces. Part
of the material is borrowed from Sections 4.1 and 4.2 in [Smi].
In Section 7, we define the affine versions of the key properties. This generalizes
Sections 4.3–5.2 in [Smi], but introduces several new ideas.
In Section 8, we prove the main part of the affine version of Schema 1.5. This generalizes
Section 7 in [Smi].
Section 9 contains the key part of the proof. We prove the asymptotic dynamics part of
the affine version of Schema 1.5 — in other terms, approximate additivity of the Margulis
invariants. This generalizes Section 8 in [Smi] and Section 4 in [Smi16]; the proof is based
on the same idea, but has been considerably rewritten.
The very short Section 10 uses induction to extend the results of the two previous
sections to products of an arbitrary number of elements. It is a straightforward generalization of Section 9 in [Smi] and Section 5 in [Smi16]
Section 11 contains the proof of the Main Theorem. It is an almost straightforward
generalization of Section 10 in [Smi] and Section 6 in [Smi16].
1.6 Acknowledgments
I am very grateful to my Ph.D. advisor, Yves Benoist, who introduced me to this exciting
and fruitful subject, and gave invaluable help and guidance in my initial work on this
project.
9
I would also like to thank Bruno Le Floch for some interesting discussions, which in
particular helped me gain more insight about weights of representations.
2 Preliminaries
In Subsection 2.1, for any element g ∈ G, we give a formula for the eigenvalues and
singular values of the linear maps ρ(g) where ρ is an arbitrary representation of G. This
is nothing more than a reminder of Subsection 2.1 in [Smi].
In Subsection 2.2, we present some properties of restricted weights of a real finitedimensional representation of a real semisimple Lie group. This is mostly a reminder of
Subsection 2.2 in [Smi].
In Subsection 2.3, we give some basic results from the theory of parabolic subgroups
and subalgebras (not necessarily minimal). This is a development on Subsection 3.4
in [Smi].
In Subsection 2.4, we give some notation conventions related to metric properties and
estimates (mostly borrowed from the author’s earlier papers).
2.1 Eigenvalues in different representations
In this subsection, we express the eigenvalues and singular values of a given element g ∈ G
acting in a given representation ρ, exclusively in terms of the structure of g in the abstract
group G (respectively its Jordan decomposition and its Cartan decomposition). This is
just a reminder of Subsection 2.1 in [Smi]; the result itself was certainly well-known even
before that.
Proposition 2.1 (Jordan decomposition). Let g ∈ G. There exists a unique decomposition of g as a product g = gh ge gu , where:
• gh is conjugate in G to an element of A ( hyperbolic);
• ge is conjugate in G to an element of K ( elliptic);
• gu is conjugate in G to an element of N + ( unipotent);
• these three maps commute with each other.
Proof. This is well-known, and given for example in [Ebe96], Theorem 2.19.24. Note
however that the latter theorem uses representation-dependent definitions of a hyperbolic,
elliptic or unipotent element (applied to the case of the adjoint representation). To state
the theorem with the representation-agnostic definitions that we used, we need to apply
Proposition 2.19.18 and Theorem 2.19.16 from the same book.
Proposition 2.2 (Cartan decomposition). Let g ∈ G. Then there exists a decomposition
of g as a product g = k1 ak2 , with k1 , k2 ∈ K and a = exp(X) with X ∈ a+ . Moreover,
the element X is uniquely determined by g.
Proof. This is a classical result; see e.g. Theorem 7.39 in [Kna96].
10
Definition 2.3. For every element g ∈ G, we define:
• the Jordan projection of g (sometimes also known as the Lyapunov projection),
written Jd(g), to be the unique element of the closed dominant Weyl chamber a+
such that the hyperbolic part gh (from the Jordan decomposition g = gh ge gu given
above) is conjugate to exp(Jd(g));
• the Cartan projection of g, written Ct(g), to be the element X from the Cartan
decomposition given above.
To talk about singular values, we need to introduce a Euclidean structure. We are
going to use a special one.
Lemma 2.4. Let ρ∗ be some real representation of G on some space V∗ . There exists a
K-invariant positive-definite quadratic form B∗ on V∗ such that all the restricted weight
spaces are pairwise B∗ -orthogonal.
We want to reserve the plain notation ρ for the “default” representation, to be fixed
once and for all at the beginning of Section 5. We use the notation ρ∗ so as to encompass
both this representation ρ and the representations ρi defined in Proposition 2.12.
Proof. See Lemma 5.33.a) in [BQ] (for a more succinct proof) or Lemma 2.4 in [Smi] (for
a more detailed proof).
Example 2.5. If ρ∗ = Ad is the adjoint representation, then B∗ is the form Bθ given by
∀X, Y ∈ g,
Bθ (X, Y ) = −B(X, θY )
(see (6.13) in [Kna96]), where B is the Killing form and θ is the Cartan involution.
Recall that the singular values of a map g in a Euclidean space are defined as the square
roots of the eigenvalues of g∗ g, where g∗ is the adjoint map. The largest and smallest
singular values of g then give respectively the operator norm of g and the reciprocal of
the operator norm of g−1 .
Proposition 2.6. Let ρ∗ : G → GL(V∗ ) be any representation of G on some vector
space V∗ ; let λ1∗ , . . . , λd∗∗ be the list of all the restricted weights of ρ∗ , repeated according
to their multiplicities. Let g ∈ G; then:
(i) The list of the moduli of the eigenvalues of ρ∗ (g) is given by
i
eλ∗ (Jd(g))
.
1≤i≤d∗
(ii) The list of the singular values of ρ∗ (g), with respect to a K-invariant Euclidean
norm B∗ on V∗ that makes the restricted weight spaces of V∗ pairwise orthogonal
(such a norm exists by Lemma 2.4), is given by
i
eλ∗ (Ct(g))
.
1≤i≤d∗
Proof. This is also completely straightforward. See Proposition 2.6 in [Smi].
11
2.2 Properties of restricted weights
In this subsection, we introduce a few properties of restricted weights of real finitedimensional representations. (Proposition 2.7 is actually a general result about Coxeter
groups.) The corresponding theory for ordinary weights is well-known: see for example
Chapter V in [Kna96]. This is mostly a reminder of Subsection 2.2 from [Smi]; the only
addition is Lemma 2.15.
Let α1 , . . . , αr be an enumeration of the set Π of simple restricted roots generating Σ+ .
For every i, we set
(
2αi if 2αi is a restricted root
′
(2.1)
αi :=
αi
otherwise.
For every index i such that 1 ≤ i ≤ r, we define the i-th fundamental restricted weight ̟i
by the relationship
h̟i , α′j i
2
= δij
(2.2)
kα′j k2
for every j such that 1 ≤ j ≤ r.
By abuse of notation, we will often allow ourselves to write things such as “for all i in
some subset Π′ ⊂ Π, ̟i satisfies...” (tacitly identifying the set Π′ with the set of indices
of the simple restricted roots that are inside).
In the following proposition, for any subset Π′ ⊂ Π, we denote:
• by WΠ′ the Weyl subgroup of type Π′ :
WΠ′ := hsα iα∈Π′ ;
• by a+
Π′ the fundamental domain for the action of WΠ′ on a:
′
a+
Π′ := X ∈ a ∀α ∈ Π , α(X) ≥ 0 ,
(2.3)
(2.4)
which is a kind of prism whose base is the dominant Weyl chamber of WΠ′ .
Proposition 2.7. Take any Π′ ⊂ Π, and let us fix X ∈ a+
Π′ . Let Y ∈ a. Then the
following two conditions are equivalent:
(i) the vector Y is in a+
Π′ and satisfies the system of linear inequalities
(
∀i ∈ Π′ ,
̟i (Y ) ≤ ̟i (X),
′
∀i ∈ Π \ Π , ̟i (Y ) = ̟i (X);
′
(ii) the vector Y is in a+
Π′ and also in the convex hull of the orbit of X by WΠ .
Proof. For the particular case Π′ = Π, this is well known: see e.g. [Hal15], Proposition 8.44.
The general case can easily be reduced to this particular case: see [Smi], Proposition 2.7.
12
Proposition 2.8. Every restricted weight of every representation of g is a linear combination of fundamental restricted weights with integer coefficients.
Proof. This is a particular case of Proposition 5.8 in [BT65]. For a correction concerning
the proof, see also Remark 5.2 in [BT72].
Proposition 2.9. If ρ∗ is an irreducible representation of g, there is a unique restricted
weight λ∗ of ρ∗ , called its highest restricted weight, such that no element of the form
λ∗ + αi with 1 ≤ i ≤ r is a restricted weight of ρ∗ .
Remark 2.10. In contrast to the situation with non-restricted weights, the highest restricted weight is not always of multiplicity 1; nor is a representation uniquely determined
by its highest restricted weight.
Proof. The corresponding result for ordinary (non-restricted) weights is well-known: see
e.g. [Kna96], Theorem 5.5 (d).
For result for restricted weights can easily be deduced from the former: see Proposition 2.9 in [Smi].
Proposition 2.11. Let ρ∗ be an irreducible representation of g; let λ∗ be its highest
restricted weight. Let Λλ∗ be the restricted root lattice shifted by λ∗ :
Λλ∗ := {λ∗ + c1 α1 + · · · + cr αr | c1 , . . . , cr ∈ Z} .
Then the set of restricted weights of ρ∗ is exactly the intersection of the lattice Λλ∗ with
the convex hull of the orbit {w(λ∗ ) | w ∈ W } of λ∗ by the restricted Weyl group.
Proof. Once again, this follows from the corresponding result for non restricted weights
(see e.g. [Hal15], Theorem 10.1) by passing to the restriction. In the case of restricted
weights, one of the inclusions is stated in [Hel08], Proposition 4.22.
Proposition 2.12. For every index i such that 1 ≤ i ≤ r, there exists an irreducible
representation ρi of G on a space Vi whose highest restricted weight is equal to ni ̟i (for
some positive integer ni ) and has multiplicity 1.
Proof. This follows from the general Theorem 7.2 in [Tit71]. This is also stated as
Lemma 2.5.1 in [Ben97].
Example 2.13.
1. If G = SLn (R), we may take Vi = Λi Rn , so that ρi is the i-th exterior power of the
standard representation of G on Rn .
2. More generally, if G is split, then all restricted weight spaces correspond to ordinary
weight spaces, hence have dimension 1. So we may simply take every ni to be 1,
so that the ρi ’s are precisely the fundamental representations.
13
Lemma 2.14. Fix an index i such that 1 ≤ i ≤ r. Then all restricted weights of ρi other
than ni ̟i have the form
r
X
cj αj ,
ni ̟i − αi −
j=1
with cj ≥ 0 for every j.
Proof. This is the last remark in section 2.5 of [Ben97]. For a proof, see Lemma 2.13
in [Smi].
Lemma 2.15. Assume that the Lie algebra g is simple, and that its restricted root system
has a simply-laced diagram. Let ρ∗ be an irreducible representation of G; let Ω∗ be the
set of its restricted weights. Assume that we have
{0} ( Ω∗
(i.e. the representation has 0 as a restricted weight, and at least one nonzero restricted
weight). Then we have Σ ⊂ Ω∗ .
Note that the only case where 0 is the only restricted weight is when the image of G
by ρ is a compact group (for simple G, this means that either G itself is compact or ρ is
trivial.)
Proof. First let us show that Ω∗ contains at least one restricted root. By Proposition 2.11,
every restricted weight λ of ρ∗ may be written as a sum
λ = α(1) + · · · + α(l) ,
(2.5)
where α(1) , . . . , α(l) are some restricted roots. Define the level of λ to be the smallest
integer l for which such a decomposition is possible.
Let λ be an element of Ω∗ \ {0} whose level l is the smallest possible (it exists since
Ω∗ is not reduced to {0}), and consider its decomposition (2.5). Then for every i 6= l, we
have hα(i) , α(l) i ≥ 0: indeed otherwise, α(i) + α(l) would be a restricted root, so we could
combine them together to produce a decomposition of λ length l − 1. Hence we have
l
X
2hα(i) , α(l) i
2hα(l) , α(l) i
2hλ, α(l) i
=
≥
= 2,
hα(l) , α(l) i
hα(l) , α(l) i
hα(l) , α(l) i
i=1
which implies that
λ − α(l) ∈ Conv({λ, sα(l) λ}) ⊂ Conv(W λ).
From Proposition 2.11, it follows that λ − α(l) is still a restricted weight of ρ∗ ; but its
level is now l − 1. Since l is by assumption the smallest nonzero level, necessarily we have
l = 1, and λ is indeed a restricted root.
Now it is well-known (see Problem 2.11 in [Kna96]) that for a simple Lie algebra,
W acts transitively on the set of restricted roots having the same length as λ. Since
the restricted root system of g has a simply-laced diagram, all of the restricted roots
have the same length. Hence the orbit of λ by W is the whole set Σ; we conclude that
Σ ⊂ Ω∗ .
14
2.3 Parabolic subgroups and subalgebras
In this subsection we recall the well-known theory of parabolic subalgebras and subgroups. We begin by defining them, as well as the Levi subalgebra and subgroup of
a given type and the corresponding subset of Π and subgroup of W ; so far we follow
Subsection 3.4 in [Smi]. But now we go further, giving a few propositions relating these
different objects; in particular the generalized Bruhat decomposition (Lemma 2.23).
A parabolic subgroup (or subalgebra) is usually defined in terms of a subset Π′ of the
set Π of simple restricted roots. We find it more convenient however to use a slightly
different language. To every such subset corresponds a facet of the Weyl chamber, given
by intersecting the walls corresponding to elements of Π′ . We may exemplify this facet
by picking some element X in it that does not belong to any subfacet. Conversely, for
every X ∈ a+ , we define the corresponding subset
ΠX := {α ∈ Π | α(X) = 0} .
(2.6)
The parabolic subalgebras and subgroups of type ΠX can then be very conveniently
rewritten in terms of X, as follows.
Definition 2.16. For every X ∈ a+ , we define:
−
• p+
X and pX the parabolic subalgebras of type X, and lX the Levi subalgebra of
type X:
M
p+
gα ;
X := l ⊕
α(X)≥0
p−
X := l ⊕
M
gα ;
α(X)≤0
lX := l ⊕
M
gα .
α(X)=0
• PX+ and PX− the corresponding parabolic subgroups, and LX the Levi subgroup of
type X:
PX+ := NG (p+
X );
PX− := NG (p−
X );
LX := PX+ ∩ PX− .
The following statement is well-known:
Proposition 2.17. We have LX = ZG (X).
Proof. First note that by combining Propositions 7.83 (b), (e) and 7.82 (a) in [Kna96],
we get that LX = ZG (aX ), where
aX := {Y ∈ a | ∀α ∈ ΠX , α(Y ) = 0}
15
is the intersection of all walls of the Weyl chamber containing X. It remains to show
that
ZG (aX ) = ZG (X).
Clearly the Lie algebra of both groups is equal to lX ; hence their identity components
ZG (aX )e and ZG (X)e are also equal. But by combining Propositions 7.25 and 7.33
in [Kna96], it follows that ZG (X) = M ZG (X)e and similarly for ZG (aX ). The conclusion
follows.
An object closely related to these parabolic subgroups (see Corollary 2.24, the Bruhat
decomposition for parabolic subgroups) is the stabilizer of X in the Weyl group:
Definition 2.18. For any X ∈ a+ , we set
WX := {w ∈ W | wX = X} .
Remark 2.19. The group WX is also closely related to the set ΠX . Indeed, it follows
immediately that a simple restricted root α belongs to ΠX if and only if the corresponding
reflection sα belongs to WX . Conversely, it is well-known (Chevalley’s lemma, see e.g.
[Kna96], Proposition 2.72) that these reflections actually generate the group WX .
Thus WX is actually the same thing as WΠ′ (as defined before Proposition 2.7) where
we substitute Π′ = ΠX .
Example 2.20. To help understand the conventions we are taking, here are the extreme
cases:
1. If X lies in the open Weyl chamber a++ , then:
• PX+ = P + is the minimal parabolic subgroup; PX− = P − ; LX = L;
• ΠX = ∅;
• WX = {Id}.
2. If X = 0, then:
• PX+ = PX− = LX = G;
• ΠX = Π;
• WX = W .
The following result shows why WX is important.
Definition 2.21. Let Ω be a set of elements of a∗ . We say that Ξ is:
• a top-subset of Ω if
∀α ∈ Σ+ ,
(Ξ + α) ∩ Ω ⊂ Ξ;
• a bottom-subset of Ω if
∀α ∈ Σ+ ,
(Ξ − α) ∩ Ω ⊂ Ξ.
Example 2.22. In the set of restricted roots Σ, the positive restricted roots form a
top-subset and the negative restricted roots form a bottom-subset.
16
Lemma 2.23 (Generalized Bruhat decomposition). Let ρ∗ be some real representation
of G on some space V∗ ; let Ω∗ be the set of restricted weights of ρ∗ . For every subset
Ξ ⊂ Ω∗ , we set
M
V∗Ξ :=
V∗λ .
(2.7)
λ∈Ξ
Then we have:
(
StabG V∗Ξ = P + StabW (Ξ)P +
StabG V∗Ξ = P − StabW (Ξ)P −
if Ξ is a top-subset of Ω∗ ;
if Ξ is a bottom-subset of Ω∗ .
Proof. Assume that Ξ is a top-subset; the case of a bottom-subset is analogous.
The first step is to show that StabG (V∗Ξ ) contains P + . Indeed:
• The group L stabilizes every restricted weight space V∗λ . Indeed, take some λ ∈ a∗ ,
v ∈ V∗λ , l ∈ L, X ∈ a; then we have:
X · l(v) = l(Ad(l−1 )(X) · v) = l(X · v) = λ(X)l(v).
(2.8)
• For every α ∈ Σ+ and every λ ∈ Ξ, clearly we have
gα · V∗λ ⊂ V∗λ+α ⊂ V∗Ξ
by definition of a top-subset. Hence n+ stabilizes V∗Ξ .
• The statement follows as P + = L exp(n+ ).
Now take any element g ∈ G. Let us apply the Bruhat decomposition (see e.g. [Kna96],
Theorem 7.40): there exists an element w of the restricted Weyl group W such that we
may write
g = p1 w̃p2
where p1 , p2 are some elements of the minimal parabolic subgroup P + and w̃ ∈ NG (A)
is some representative of w ∈ W = NG (A)/ZG (A). From the statement that we just
proved, it follows that g stabilizes V∗Ξ iff w̃ does so. On the other hand, it is clear that
for every λ ∈ a∗ , we have
w̃V λ = V wλ
(2.9)
(the choice of the representative w̃ does not matter since as seen above (2.8), the kernel ZG (A) = L stabilizes V λ ). The conclusion follows.
The following particular case is well-known (see for example [Hum75], Theorem 29.3):
Corollary 2.24 (Bruhat decomposition for parabolic groups). We have the identities
PX+ = P + WX P + and PX− = P − WX P − .
Proof. Take ρ∗ to be the adjoint representation: then V∗ = g and Ω∗ = Σ ∪ {0}. Take
Ξ+ = {α ∈ Σ ∪ {0} | α(X) ≥ 0} ;
this is a top-subset. It is easy to show that we have StabW (Ξ+ ) = WX , and by defini+
tion gΞ = p+
X . Applying the lemma, the first identity follows. Applying the lemma to
the subset Ξ− defined analogously, the second identity follows.
17
2.4 Metric properties and estimates
In this subsection we mostly introduce some notational conventions. They were already
introduced in the beginning of Subsection 5.1 in [Smi] and the beginning of Subsection 2.6
in [Smi16].
For any linear map g acting on a Euclidean space E, we write kgk := supx6=0 kg(x)k
kxk its
operator norm.
Consider a Euclidean space E. We introduce on the projective space P(E) a metric
by setting, for every x, y ∈ P(E),
α(x, y) := arccos
|hx, yi|
∈ [0, π2 ],
kxkkyk
(2.10)
where x and y are any vectors representing respectively x and y (obviously, the value
does not depend on the choice of x and y). This measures the angle between the lines x
and y. For shortness’ sake, we will usually simply write α(x, y) with x and y some actual
vectors in E \ {0}.
For any vector subspace F ⊂ E and any radius ε > 0, we shall denote the εneighborhood of F in P(E) by:
BP (F, ε) := {x ∈ P(E) | α(x, P(F )) < ε} .
(2.11)
(You may think of it as a kind of “conical neighborhood”.)
Consider a metric space (M, δ); let X and Y be two subsets of M. We shall denote
the ordinary, minimum distance between X and Y by
(2.12)
δ(X, Y ) := inf inf δ(x, y),
x∈X y∈Y
as opposed to the Hausdorff distance, which we shall denote by
δ
Haus
(X, Y ) := max
sup δ {x}, Y , sup δ {y}, X
x∈X
y∈Y
!
.
(2.13)
Finally, we introduce the following notation. Let X and Y be two positive quantities,
and p1 , . . . , pk some parameters. Whenever we write
X .p1 ,...,pk Y,
we mean that there is a constant K, depending on nothing but p1 , . . . , pk , such that
X ≤ KY . (If we do not write any subscripts, this means of course that K is an “absolute”
constant — or at least, that it does not depend on any “local” parameters; we consider
the “global” parameters such as the choice of G and of the Euclidean norms to be fixed
once and for all.) Whenever we write
X ≍p1 ,...,pk Y,
we mean that X .p1 ,...,pk Y and Y .p1 ,...,pk X at the same time.
The following result will often be useful:
18
Lemma 2.25 ([Smi16]). Let C ≥ 1. Then any map φ ∈ GL(E) such that kφ±1 k ≤ C
induces a C 2 -Lipschitz continuous map on P(E).
Proof. See [Smi16], Lemma 2.20.
3 Proximal maps
In this section, we give the definitions of the proximal versions of the concepts from
Table 1 and state the proximal version of Schema 1.5, namely Proposition 3.5. It contains
no new results.
Let E be a Euclidean space.
Definition 3.1 (Proximal version of regularity). Let γ ∈ GL(E); let λ1 , . . . , λn be its
eigenvalues repeated according to multiplicity and ordered by nonincreasing modulus.
We define the spectral radius of γ as
r(γ) := |λ1 |
(3.1)
(we do not use “ρ(γ)” as it could be confused with the representation ρ). We say that
γ is proximal if we have
|λ2 | < |λ1 | =: r(γ),
i.e. if λ1 is the only eigenvalue with modulus r(γ) and has multiplicity 1. Equivalently,
|λ1 |
is greater than 1.
γ is proximal if and only if its spectral gap |λ
2|
Definition 3.2 (Proximal version of geometry). For every proximal map γ, we may
then decompose E into a direct sum of a line Eγs , called the attracting space of γ, and a
hyperplane Eγu , called the repelling space of γ, both stable by γ and such that:
(
γ|Eγs = λ1 Id;
for every eigenvalue λ of γ|Eγu , |λ| < |λ1 |.
Definition 3.3 (Proximal version of non-degeneracy). Consider a line E s and a hyperplane E u of E, transverse to each other. An optimal canonizing map for the pair (E s , E u )
is a map φ ∈ GL(E) satisfying
φ(E s ) ⊥ φ(E u )
and minimizing the quantity max kφk, kφ−1 k .
We define an optimal canonizing map for a proximal map γ ∈ GL(E) to be an optimal
canonizing map for the pair (Eγs , Eγu ).
Let C ≥ 1. We say that the pair formed by a line and a hyperplane (E s , E u ) (resp.
that a proximal map γ) is C-non-degenerate if it has an optimal canonizing map φ such
that φ±1 ≤ C. (This is equivalent to the angle between E s and E u being bounded
below by a constant that depends only on C.)
Now take γ1 , γ2 two proximal maps in GL(E). We say that the pair (γ1 , γ2 ) is C-nondegenerate if every one of the four possible pairs (Eγsi , Eγuj ) is C-non-degenerate.
19
Definition 3.4 (Proximal version of contraction strength). Let γ ∈ GL(E) be a proximal
map. We define the proximal contraction strength of γ by
s̃(γ) :=
γ|Eγu
γ|Eγs
=
γ|Eγu
r(γ)
(where r(γ) is the spectral radius of γ, equal to |λ1 | in the notations of the previous
definition). We say that γ is s̃-contracting if s̃(γ) ≤ s̃.
Proposition 3.5. For every C ≥ 1, there is a positive constant s̃3.5 (C) with the following
property. Take a C-non-degenerate pair of proximal maps γ1 , γ2 in GL(E), and suppose
that both γ1 and γ2 are s̃3.5 (C)-contracting. Then γ1 γ2 is proximal, and we have:
(i) α Eγs1 γ2 , Eγs1 .C s̃(γ1 );
(ii) s̃(γ1 γ2 ) .C s̃(γ1 )s̃(γ2 ).
(iii) r(γ1 γ2 ) ≍C kγ1 kkγ2 k.
(The constant s̃3.5 (C) is indexed by the number of the proposition, a scheme that we
will stick to throughout the paper.)
Similar results have appeared in the literature for a long time, see e.g. Lemma 5.7
in [AMS02], Proposition 6.4 in [Ben96] or Lemma 2.2.2 in [Ben97].
Proof. See Proposition 3.4 in [Smi16] for the proof of (i) and (ii), and Proposition 5.12
in [Smi] for the proof of (iii).
Remark 3.6. If we wanted to literally follow Schema 1.5 (taking “asymptotic dynamics”
to mean the logarithm of the spectral radius), we would need:
• to add a point (i’): α Eγu1 γ2 , Eγu2 .C s̃(γ2 );
• to replace (iii) by (iii’): r(γ1 γ2 ) ≍C r(γ1 )r(γ2 ).
However:
• The estimate (i’) will not be used in the sequel. It is nevertheless true: it follows
by considering the action of GL(E) on the dual space E ∗ and applying (i).
• The estimate (iii’) is on the contrary not strong enough for the applications we
need. It is also true; it follows by plugging the identity
r(γ) ≍C kγk
(valid for proximal, C-non-degenerate, s̃3.5 (C)-contracting γ; obtained from (iii)
by setting γ1 = γ2 = γ) into (iii) itself.
20
4 X-regular linear maps
In this section, we define the linear versions of the properties from Table 1 and state
the linear version of Schema 1.5. Most of the basic ideas, and several definitions, come
from [Ben97]; however, we use a slightly different point of view. Benoist relies most of
the time only on the proximal versions of the properties from Table 1, using the representations ρi as a proxy. We, on the other hand, clearly separate the linear versions from
the proximal versions, and establish the correspondences between linear and proximal
versions as theorems.
In Subsection 4.1, we give the definitions of these linear properties. All of them are
parametrized by some vector X ∈ a+ (or equivalently by some subset ΠX ⊂ Π; see the
discussion in the beginning of Subsection 2.3). When we will apply the linear case to the
affine case, this vector will be set to the vector X0 chosen in Section 5.
In Subsection 4.2, we examine what happens to these properties when we replace g by
its inverse g−1 .
In Subsection 4.3, we relate the linear properties with the proximal properties, and
then prove Propositions 4.22 and 4.24, which together comprise the linear version of
Schema 1.5.
4.1 Definitions
Let us fix some X ∈ a+ .
Definition 4.1 (Linear version of regularity). We say that an element g ∈ G is X-regular
if every root which does not vanish on X does not vanish on Jd(g) either:
∀α ∈ Π \ ΠX ,
α(Jd(g)) > 0.
Benoist calls such elements “elements of type θ”, where his θ is our set Π \ ΠX : see
Definition 3.2.2 in [Ben97].
Example 4.2.
1. If X ∈ a++ , then g ∈ G is X-regular if and only if Jd(g) ∈ a++ .
2. If X = 0, then the condition is vacuous: all elements of G are X-regular.
Elements g ∈ G such that Jd(g) ∈ a++ are often called R-regular or loxodromic. So
informally, being X-regular should be understood as being “partially R-regular”. (In fact,
technically we should probably say “X-R-regular” instead of “X-regular”.)
Definition 4.3 (Linear version of geometry). Let g ∈ G be an X-regular element. Let
g = gh ge gu be its Jordan decomposition, and let φ be any element of G realizing the
conjugacy
φgh φ−1 = exp(Jd(g))
(called a canonizing map for g). Then we define:
21
• the attracting X-flag of g, denoted by ygX,+ , to be the class of φ−1 in the flag variety
G/PX+ :
ygX,+ := φ−1 PX+ ∈ G/PX+ ;
• the repelling X-flag of g, denoted by ygX,− , to be the class of φ−1 in the flag variety
G/PX− :
ygX,− := φ−1 PX− ∈ G/PX− ;
• the X-geometry
of g to be the data of its attracting and repelling X-flags, i.e. the
X,+ X,−
.
pair yg , yg
Benoist defines the attracting and repelling flags in the last sentence of 3.4 in [Ben97].
Remark 4.4. Depending on context, sometimes it is the map φ itself that is more relevant
to consider, and sometimes it is its inverse. Indeed while φ is the map that “brings g
to the canonical position”, its inverse φ−1 is the map that “defines the geometry of g”,
starting from the canonical position. This is why the formulas above involve φ−1 .
We need to check that those definitions do not depend on the choice of φ. Indeed, φ−1
is unique up to multiplication on the right by an element of the centralizer of Jd(g). By
Proposition 2.17, the latter is equal to LJd(g) ; since g is X-regular, it is contained in LX ,
which in turn is contained both in PX+ and in PX− .
Definition 4.5. We say that a pair (y + , y − ) ∈ G/PX+ × G/PX− is transverse if the
intersection of y + and y − (seen as cosets in G) is nonempty, i.e. if there exists an element
φ ∈ G such that
(
y + = φPX+ ;
y − = φPX− .
In particular, the pair of flags giving the geometry of any X-regular element is transverse. (Compare this with the definition given in [Ben97] in 3.3, p. 14, l. -3.)2
Proposition 4.6. The map
ΦX : G/LX
// G/P + × G/P −
X
X
// φP + , φP −
X
X
φLX ✤
gives a canonical diffeomorphism between G/LX and the subset of G/PX+ × G/PX− formed
by transverse pairs.
From now on, we shall tacitly identify G/LX with the set of transverse pairs (which
is also known as the open G-orbit in G/PX+ × G/PX− ).
Proof. The group G acts smoothly on the manifold G/PX+ × G/PX− . The orbit of the
point (PX+ , PX− ) is precisely the set of transverse pairs, and its stabilizer is PX+ ∩ PX− =
LX .
2
By “l. -3” we mean “the third line from the end”.
22
Our map ΦX corresponds to Benoist’s “injection Zθ → Yθ × Yθ− ” introduced near the
end of 3.3 in [Ben97].
Definition 4.7. On every flag variety G/PX+ and on every flag variety G/PX− , we now
fix, once and for all, a distance coming from some Riemannian metric. All these distances
shall be denoted by δ.
Remark 4.8. Note that every flag variety G/PX+ (and G/PX− , which is isomorphic) is
compact. Indeed by the Iwasawa decomposition (see [Kna96], Theorem 6.46), the maximal compact subgroup K acts transitively on it. This means that any two Riemannian
metrics on a given flag variety are always Lipschitz-equivalent. It turns out that we will
only be interested in properties that are true up to a multiplicative constant; so the
choice of a Riemannian metric does not influence anything in the sequel.
We now introduce the notion of C-non-degeneracy, which is basically a quantitative
measure of transversality. Every transverse pair of flags is C-non-degenerate for some
constant C; but the smaller the constant gets, the “more strongly” the flags are transverse.
In [Ben97], this notion appears bundled together with contraction strength in the
concept of “(θ, ε)-proximality” (for a single element) or “(θ, ε)-Schottky-ness” (for a pair
or, more generally, a family of elements).
Definition 4.9. We fix, once and for all, a continuous proper map
ν : G → [0, +∞).
A typical example of such a map is given by
ν(g) = max kρ∗ (g)k, kρ∗ (g)−1 k ,
(4.1)
where ρ∗ can be any faithful representation of G and k • k can be any Euclidean norm on
the representation space. The specific choice of ν is not really important: see the remark
below. In practice, we will indeed find it convenient to use a very specific map ν of this
form: see (7.16).
The important property is that then the family of the preimages ν −1 ([0, C]), indexed
by C ∈ [0, +∞), is a nested family of compact sets whose union exhausts the set G.
Definition 4.10 (Linear version of non-degeneracy). Note that the last statement also
holds for the projections of these preimages onto G/LX . We may call these projections
−1
([0, C]), where we set
νX
// [0, +∞)
νX : G/LX
φLX ✤
// min ν(φ′ ).
φ′ ∈φLX
To justify that this is well-defined, notice that for every φ ∈ G, the intersection of the
coset φLX with ν −1 ([0, ν(φ)]) is compact (and nonempty), so the continuous map ν
reaches a minimum on it. Also, the map νX is still proper.
We say that an element φ ∈ G is an optimal representative of the coset φLX ∈ G/LX
if ν reaches its minimum at φ, i.e. if we have ν(φ) = νX (φLX ).
23
• We say that a transverse pair (y + , y − ) ∈ G/PX+ × G/PX− is C-non-degenerate if
νX (y + , y − ) ≤ C, or in other terms
−1
([0, C])
(y + , y − ) ∈ νX
(where we identify (y + , y − ) with a coset of G/LX by the map ΦX defined above).
• We say that an X-regular element g ∈ G is C-non-degenerate if its X-geometry is
C-non-degenerate, i.e. if
−1
ygX,+ , ygX,− ∈ νX
([0, C]).
• We say that a pair (g1 , g2 ) of X-regular elements of G is C-non-degenerate if we
have
−1
X,−
([0, C])
∈ νX
ygX,+
,
y
gj
i
for all four possible pairs (i, j) ∈ {1, 2} × {1, 2}.
Remark 4.11. Let us now explain why the choice of the function ν is not really important. Indeed, suppose we replace the function ν by another function ν ′ having the same
property. Then we will simply need to replace every constant C by some C ′ that depends
only on C.
Example 4.12. Take G = SO+ (n, 1). This group has real rank 1; so the closed Weyl
chamber a++ is a half-line, with only two facets: {0} and its interior a+ . Taking X = 0
makes everything trivial; so assume that X ∈ a+ . Let us identify G with the group of
isometries of the hyperbolic space Hn . In this case:
• An element g ∈ G is then X-regular if and only if it is loxodromic, i.e. fixes exactly
two points of the ideal boundary ∂ ∞ Hn .
• The flag variety G/PX+ canonically identifies with this ideal boundary ∂ ∞ Hn , and
so does the opposite flag variety G/PX− .
• The attracting flag ygX,+ (resp. repelling flag ygX,− ) of an X-regular element g corresponds to the attracting (resp. repelling) fixed point at infinity of the loxodromic
isometry g.
• Two flags (y + , y − ) ∈ G/PX+ × G/PX− are transverse if and only if the corresponding
points of ∂ ∞ Hn are distinct.
• One possible choice of the “non-degeneracy” function νX is as follows. Choose any
reference point x0 ∈ Hn , and let δ+ and δ− be half-lines starting at x0 and reaching
the ideal boundary at points corresponding to y + and y − respectively. Then we
may let νX (y + , y − ) be the reciprocal of the angle between δ+ and δ− .
• In that case, a pair (y + , y − ) is C-non-degenerate if and only if the corresponding
points of the ideal boundary are separated by an angle of at least C1 (when looking
from x0 ).
24
We finish this subsection by introducing the following notion.
Definition 4.13 (Linear version of contraction strength). We define the linear Xcontraction strength of an X-regular element g ∈ G to be the quantity
~sX (g) := exp − min α(Ct(g)) .
α∈Π\ΠX
It measures how far the Cartan projection of g is from the walls of the Weyl chamber,
except those containing X.
4.2 Impact of the group inverse
In this section, we examine what happens to the properties we just introduced when we
pass from an element g ∈ G to its inverse g −1 . Though slightly technical, the proof is
straightforward.
We start by observing that for every g ∈ G, we have
Jd(g−1 ) = −w0 (Jd(g))
(4.2)
Ct(g −1 ) = −w0 (Ct(g)).
(4.3)
and
(The map −w0 is Benoist’s “involution opposition” ı: compare these formulas with [Ben97],
section 2.4, p. 8, l. 10.)
The first identity immediately follows from the definitions of the Jordan projection and
of w0 . The second identity also follows from the definitions, using the well-known fact
that every element of the restricted Weyl group W (in particular w0 ) has a representative
in the maximal compact subgroup K (see [Kna96], formulas (7.84a) and (7.84b)).
Proposition 4.14.
(i) An element g ∈ G is X-regular if and only if its inverse g −1 is −w0 (X)-regular;
(ii) For every X-regular element g ∈ G, we have
−w (X),+
X,−
ι−
,
= yg−10
X yg
where ι±
X are the diffeomorphisms given by
±
ι±
X : G/PX
// G/P ∓
−w
φPX± ✤
// φw0 P ∓
−w
0 (X)
0 (X)
.
(iii) If a pair
(y + , y − ) ∈ G/PX+ × G/PX−
is C-non-degenerate, then the pair
−
+
+ +
−
(ι−
X (y ), ιX (y )) ∈ G/P−w0 (X) × G/P−w0 (X)
is C ′ -non-degenerate for some constant C ′ that depends only on C.
25
(iv) For every X-regular element g ∈ G, we have
~sX (g) = ~s−w0 (X) (g −1 ).
Remark 4.15. Starting from Section 5, we will only consider situations where X will be
symmetric, i.e. −w0 (X) = X (which simplifies the above formulas).
Proof.
(i) This is an immediate consequence of (4.2).
+
−1 −
(ii) To show that the map ι−
X is well-defined, note that we have w0 PX w0 = P−w0 (X)
(this easily follows from the definitions). It is obviously smooth. Hence the
−
map ι+
−w0 (X) is also smooth, and is clearly equal to the inverse of ιX . To show
the desired identity, note that (by (4.2)) if φ is a canonizing map for g, then w0 φ is
a canonizing map for g −1 . (Pay attention to the convention of φ versus φ−1 .)
(iii) The map φ 7→ φw0 descends to a diffeomorphism ιL
X that makes the diagram
G/LX
ΦX
G/PX+ × G/PX−
−
σ ◦ (ι+
X × ιX )
ιL
X
G/L−w0 (X)
Φ−w0 (X)
(4.4)
−
+
× G/P−w
G/P−w
0 (X)
0 (X)
commutative. Here ΦX is the embedding from Proposition 4.6, and σ denotes the
pair-switching map: (a, b) 7→ (b, a) (the crossing-over double arrow is meant to
−
suggest this graphically). So clearly the map σ ◦ (ι+
X × ιX ) preserves transversality
−1
L
([0, C]) to some
of pairs. Now for every C, the map ιX maps the preimage νX
compact subset of G/L−w0 (X) , which is in particular contained in the preimage
−1
([0, C ′ ]) for some C ′ .
ν−w
0 (X)
(iv) This is an immediate consequence of (4.3).
Remark 4.16.
• In point (i), since the choice of the metrics on the flag varieties was arbitrary,
we lose no generality in assuming that the diffeomorphisms ι±
X defined above are
actually isometries.
• In point (iii), if ν is chosen in a sufficiently natural way (for example as defined
by (7.16)), we may actually let C ′ = C.
26
4.3 Products of X-regular maps
In this subsection, we start by proving a few results that link linear properties to proximal
properties, via the representations ρi :
• Proposition 4.17.(i) for regularity;
• Lemma 4.21 for geometry;
• Proposition 4.19 for non-degeneracy;
• Proposition 4.17.(ii) for contraction strength.
Their proofs are adapted from Section 6 in [Smi].
We then prove the linear version of Schema 1.5. It consists of two parts:
• Proposition 4.22 is the “main” part. This result did not appear in the previous
paper.
• Proposition 4.24 is the “asymptotic dynamics” part. It gives the same conclusion
as Proposition 6.10 in [Smi], but uses the linear versions of the properties in its
hypotheses (which are the most natural here) rather than the affine versions.
Proposition 4.17.
(i) An element g ∈ G is X-regular if and only if for every i ∈ Π \ ΠX , the map ρi (g)
is proximal.
(ii) For every C ≥ 1, there is a constant ~s4.17 (C) with the following property. Let
g ∈ G be a C-non-degenerate X-regular map such that ~sX (g) ≤ ~s4.17 (C). Then
for every i ∈ Π \ ΠX , we have
s̃(ρi (g)) .C ~sX (g).
These two statements essentially correspond to the respective left halves of (6.6)
and (6.7) in [Smi]. The proof is also essentially the same.
Part (i) is given in Definition 3.2.2 in [Ben97].
Remark 4.18.
• Note that since all Euclidean norms on a finite-dimensional vector space are equivalent, this estimate makes sense even though we did not specify any norm on Vi .
In the course of the proof, we shall choose one that is convenient for us.
• Recall that “i ∈ Π \ ΠX ” is a notation shortcut for “i such that αi ∈ Π \ ΠX ”.
• ΠX should be thought of as a kind of “exceptional set”. In practice, it will often be
empty (see Remark 5.15 below).
Proof of Proposition 4.17.
27
(i) By Proposition 2.6 (i), the list of the moduli of the eigenvalues of ρi (g) is precisely
j
eλi (Jd(g))
,
1≤j≤di
where di is the dimension of Vi and (λji )1≤j≤di is the list of restricted weights of ρi
listed with multiplicity.
Up to reordering that list, we may suppose that λ1i = ni ̟i is the highest restricted
weight of ρi . We may also suppose that λ2i = ni ̟i − αi . Indeed we have
sαi (ni ̟i ) = sα′i (ni ̟i )
= ni ̟i − 2ni
h̟i , α′i i ′
α
hα′i , α′i i i
= ni ̟i − ni α′i
(4.5)
(recall that α′i is equal to 2αi if 2αi is a restricted root and to αi otherwise). But
by Proposition 2.11, sαi (ni ̟i ) is a restricted weight of ρi (because it is the image
of a restricted weight of ρi by an element of the Weyl group) and then ni ̟i − αi
is also a restricted weight of ρi (as a convex combination of two restricted weights
of ρi , that belongs to the restricted root lattice shifted by ni ̟i ).
Take any j > 2. Since by hypothesis, the restricted weight ni ̟i has multiplicity 1,
we have λji 6= λ1i . By Lemma 2.14, it follows that this restricted weight has the
form
λji
= ni ̟i − αi −
r
X
ci′ αi′ ,
i′ =1
with ci′ ≥ 0 for every index i′ .
Finally, since by definition Jd(g) ∈ a+ , for every index i′ we have αi′ (Jd(g)) ≥ 0.
It follows that for every j > 2, we have
λ1i (Jd(g)) ≥ λ2i (Jd(g)) ≥ λji (Jd(g)).
(4.6)
In other words, among the moduli of the eigenvalues of ρi (g), the largest is
exp λ1i (Jd(g)) = exp ni ̟i (Jd(g)) ,
and the second largest is
exp λ2i (Jd(g)) = exp ni ̟i (Jd(g)) − αi (Jd(g)) .
It follows that the spectral gap of ρi (g) is equal to
exp λ1i (Jd(g))
= exp(αi (Jd(g)));
exp λ2i (Jd(g))
the conclusion follows immediately.
28
(4.7)
(ii) Let ~s4.17 (C) be a constant small enough to satisfy all the constraints that will
appear in the course of the proof. Let us fix i ∈ Π \ ΠX , and let g ∈ G be a map
satisfying the hypotheses. Clearly it is enough to show that we have
s̃(ρi (g)) ≍C exp(αi (Ct(g)))−1
(4.8)
(indeed by definition, the right-hand side is smaller or equal than ~sX (g).)
We start with the following observation: for every C ≥ 1, the continuous map
φ 7→ max ρi (φ) , ρi (φ−1 )
(4.9)
is bounded above on the compact set ν −1 ([0, C]), by some constant Ci′ that depends
only on C (and on the choice of a norm on Vi , to be made soon). Let φ be an optimal
representative of the coset in G/LX giving the geometry of g, and let g′ = φgφ−1 ;
then we get
s̃(ρi (g)) ≍C s̃(ρi (g′ )).
(4.10)
Now let us choose, on the space Vi where the representation ρi acts, a K-invariant
Euclidean form Bi such that all the restricted weight spaces for ρi are pairwise
Bi -orthogonal (this is possible by Lemma 2.4 applied to ρi ). Then s̃(ρi (g′ )) is simply
the quotient of the two largest singular values of ρi (g ′ ). By Proposition 2.6 (ii)
(giving the singular values of an element of G in a given representation) and by a
calculation analogous to the previous point, we have
s̃(ρi (g′ )) = exp(αi (Ct(g)))−1 .
(4.11)
The desired estimate follows by combining (4.10) with (4.11).
Proposition 4.19. Let (g1 , g2 ) be a C-non-degenerate pair of X-regular elements of G.
Then for every i ∈ Π\ΠX , the pair (ρi (g1 ), ρi (g2 )) is a C ′ -non-degenerate pair of proximal
maps in GL(Vi ), where C ′ is some constant that depends only on C.
This is a straightforward generalization of Proposition 6.6 in [Smi]. Its proof relies on
the following two lemmas, which are analogous to Lemmas 6.7 and 6.9 in [Smi]. However,
the two lemmas that follow are now formulated more generally; the stronger statements
will be useful in order to prove Proposition 4.22.
Lemma 4.20. We have:
(i)
\
StabG
Vini ̟i
i∈Π\ΠX
(ii)
\
i∈Π\ΠX
StabG
M
!
λ6=ni ̟i
= PX+ ;
Viλ
!
= PX− .
Proof. For every i ∈ Π, let Ωi be the set of restricted weights of the representation ρi .
29
(i) We begin by noting that for every i, we have
!
StabG
Vini ̟i
= P + StabW (ni ̟i )P + = P + W̟i P + .
This follows from Lemma 2.23: indeed the singleton {ni ̟i } is clearly a top-subset
in Ωi . Corollary 2.24 then gives us that
!
StabG
Vini ̟i
+
= P̟
.
i
(4.12)
Now it is an easy exercise to show that for any X, Y, Z ∈ a+ , we have
+
+
PX+ ∩ PY+ = PZ+ ⇐⇒ p+
X ∩ pY = pZ
⇐⇒ WX ∩ WY = WZ
⇐⇒ ΠX ∩ ΠY = ΠZ .
(4.13)
Now obviously Π̟i = Π \ {αi }, and if we remove from Π all elements that are not
in ΠX , we are left with precisely ΠX . Thus
\
+
(4.14)
P̟
= PX+ ,
i
i∈Π\ΠX
and the conclusion follows.
(ii) Note that for every i, the complement Ωi \ {ni ̟i } is a bottom-subset of Ωi , and
has the same stabilizer in W as {ni ̟i }. We may then follow the same line of
reasoning.
In the following lemma, we identify the projective space P(Vi ) with the set of vector
lines in Vi and the projective space P(Vi∗ ) with the set of vector hyperplanes of Vi .
Lemma 4.21. There exist two smooth embeddings
Y
ΦsX : G/PX+ →
P(Vi ) and ΦuX : G/PX− →
i∈Π\ΠX
Y
P(Vi∗ )
i∈Π\ΠX
with the following properties:
(i) For every X-regular map g ∈ G, we have
ΦsX (ygX,+ ) = Eρsi (g)
;
i∈Π\ΠX
X,−
.
ΦuX (yg ) = Eρui (g)
i∈Π\ΠX
(ii) If (y + , y − ) ∈ G/PX+ × G/PX− is a transverse pair, then for every i ∈ Π \ ΠX , we
have ΦsX (y + )i 6∈ ΦuX (y − )i .
30
Our map ΦsX is the map jθ defined in the beginning of 3.4 in [Ben97]. Statement (ii)
appears a little further in the same text (together with its converse which is also true).
Proof. We define the maps ΦsX and ΦuX in the following way. For every φ ∈ G, we set
ΦsX (φPX+ ) = ρi (φ) (Vini ̟i )
;
i∈Π\Π
L
X
(4.15)
λ
.
ΦuX (φPX− ) = ρi (φ)
λ6=ni ̟i Vi
i∈Π\ΠX
These maps are well-defined and injective by Lemma 4.20, and obviously continuous.
They are by construction G-equivariant; hence to prove that they are smooth embeddings,
it is sufficient to prove that both of them have injective differential at the identity coset.
This also follows from Lemma 4.20 (by differentiating it).
To show property (i), we essentially use:
• the identities
(
Eρsi (exp(Jd(g))) = Vini ̟i ;
L
Eρui (exp(Jd(g))) = λ6=ni ̟i Viλ ,
(4.16)
which follow from the inequality (4.6) ranking the values of different restricted
weights of ρi evaluated at Jd(g);
• and the simple observation that any eigenspace of φgφ−1 is the image by φ of the
eigenspace of g with the same eigenvalue.
Property (ii) is obvious from the definitions.
Proof of Proposition 4.19. Let C ≥ 1. Then the set of C-non-degenerate transverse pairs
in G/PX+ × G/PX− is compact. On the other hand, the function
(y + , y − ) 7→ max α(ΦsX (y + )i , ΦuX (y − )i )
i∈Π\ΠX
is continuous, and (by Lemma 4.21 (ii)) takes positive values on that set. Hence it is
bounded below. So there is a constant C ′ ≥ 1, depending only on C, such that whenever
a transverse pair (y + , y − ) is C-non-degenerate, all pairs (ΦsX (y + )i , ΦuX (y − )i ) are C ′ -nondegenerate.
The conclusion then follows by Lemma 4.21 (i).
Proposition 4.22. For every C ≥ 1, there is a positive constant ~s4.22 (C) < 1 with the
following property. Take any C-non-degenerate pair (g, h) of X-regular maps; suppose
that we have ~sX (g) ≤ ~s4.22 (C) and ~sX (h) ≤ ~s4.22 (C). Then gh is still X-regular, and
we have:
X,+
δ ygh
, ygX,+ .C ~sX (g);
δ y X,− , y X,− . ~s (h).
C X
gh
h
31
Remark 4.23. We did not include the conclusion about contraction strength, namely that
~sX (gh) ≍C ~sX (g)~sX (h).
(4.17)
This statement is true (as we shall see in a moment), but will never be directly useful to
us.
Proof. Let us fix some constant ~s4.22 (C), small enough to satisfy all the constraints
that will appear in the course of the proof. Let (g, h) be a pair of maps satisfying the
hypotheses.
• By Proposition 4.17 (i), for every i ∈ Π\ΠX , the maps ρi (g) and ρi (h) are proximal.
• By Proposition 4.19, for every i ∈ Π \ ΠX , the pair (ρi (g)), (ρi (h)) is C ′ -nondegenerate (where C ′ depends only on C).
• If we choose ~s4.22 (C) ≤ ~s4.17 (C), it follows by Proposition 4.17 (ii) that for
every i ∈ Π \ ΠX , we have s̃(ρi (g)) .C ~sX (g) and s̃(ρi (h)) .C ~sX (h). If we
choose ~s4.22 (C) sufficiently small, then all the maps ρi (g) and ρi (h) are s̃3.5 (C ′ )contracting, i.e. sufficiently contracting to apply Proposition 3.5.
Thus we may apply Proposition 3.5. We obtain:
• that for every i ∈ Π\ΠX , the map ρi (gh) is proximal. Hence by Proposition 4.17 (i),
the element gh is X-regular.
• that moreover for every i ∈ Π \ ΠX , we have
α(Eρsi (gh) , Eρsi (g) ) .C s̃(ρi (g)) .C ~sX (g).
(4.18)
Q
Now let us endow the product i∈Π\ΠX P(Vi ) with the product distance δ given by
δ(y, y ′ ) := max α(yi , yi′ );
i∈Π\ΠX
then all the inequalities (4.18) may be combined together to yield
X,+
, ΦsX ygX,+ .C ~sX (g),
δ ΦsX ygh
(4.19)
(4.20)
where ΦsX is the map introduced in Lemma 4.21. Since ΦsX is a smooth embedding
of the compact manifold G/PX+ , it is in particular a bilipschitz map onto its image.
Hence we also have
X,+ X,+
.C ~sX (g).
δ ygh
, yg
This yields the first line of the conclusion. To get the second line, simply note that
by Proposition 4.14, if we replace X by −w0 (X), the pair (h−1 , g−1 ) satisfies the same
hypotheses as the pair (g, h). Applying what we did above to this pair, we get
X,−
− X,−
(y
)
.C ~sX (h);
(y
),
ι
δ ι−
X h
X gh
by Remark 4.16, the conclusion follows.
32
Proposition 4.24. For every C ≥ 1, there are positive constants ~s4.24 (C) and ε4.24 (C)
with the following property. Take any C-non-degenerate pair (g, h) of X-regular elements
of G such that ~sX (g) ≤ ~s4.24 (C) and ~sX (h) ≤ ~s4.24 (C). Then we have:
(i) ∀i ∈ Π,
̟i (Jd(gh) − Ct(g) − Ct(h)) ≤ 0;
(ii) ∀i ∈ Π \ ΠX0 ,
̟i (Jd(gh) − Ct(g) − Ct(h)) ≥ −ε4.24 (C).
Proof. The proof is completely analogous to the proof of Proposition 6.10 in [Smi].
See Figure 1 for a picture explaining both this proposition and the corollary below.
Let us also give a more palatable (though slightly weaker) reformulation.
Corollary 4.25. For every C ≥ 1, there exists a positive constant ε4.25 (C) with the
following property. For any pair (g, h) satisfying the hypotheses of the Proposition, we
have
Jd(gh) ∈ Conv WX · Ct′ (g, h) ,
(4.21)
where Conv denotes the convex hull and Ct′ (g, h) is some vector in a satisfying
k Ct′ (g, h) − Ct(g) − Ct(h)k ≤ ε4.25 (C).
(4.22)
Proof. The proof is the same as the proof of Corollary 6.12 in [Smi].
Note that we do not require that the vector Ct′ (g, h) lie in the closed dominant Weyl
chamber a+ (even though in practice, it is very close to the vector Ct(g) + Ct(h), which
does).
Remark 4.26. At first sight, one might think that by putting together Lemma 4.1
and 4.5.2 in [Ben97], we recover this result and even something stronger. However this is
not the case: in fact we recover only the particular case when ΠX = ∅. See Remark 6.13
in [Smi] for an explanation.
Remark 4.27.
• Though we shall not use it, an interesting particular case is g = h. We the obviously
have Jd(gh) = 2 Jd(g) and Ct(g)+Ct(h) = 2 Ct(g), so the statement simply reduces
to a relationship between the Jordan and Cartan projections on g.
• The Proposition, and its Corollary, also hold if we replace Jd(gh) by Ct(gh). This
immediately implies (4.17).
(Compare this to Remark 3.6, which involved a similar construction in the proximal
case.)
33
WX = {Id, sα1 }
ε4.24 (C)
X
sα1 · Ct′ (g, h)
α2
̟2
Jd(gh)
Ct(g) + Ct(h)
̟1
Ct′ (g, h)
α1
Figure 1: This picture represents the situation for G = SO+ (3, 2) acting on R5 , and X
chosen such that ΠX = {α1 } (or {1} with the usual abuse of notations). This
choice of X is not random: it satisfies the conditions that will be required
starting from Section 5. (This also corresponds to Example 3.5.3 in [Smi].)
The group WX is then generated by the single reflection sα1 . Proposition 4.24
states that Jd(gh) lies in the shaded trapezoid. Corollary 4.25 states that it
lies on the thick line segment. In any case it lies by definition in the dominant
open Weyl chamber a++ (the shaded sector).
34
5 Choice of a reference Jordan projection X0
For the remainder of the paper, we fix ρ an irreducible representation of G on a finitedimensional real vector space V . For the moment, ρ may be any representation; but in
the course of the paper, we shall gradually introduce several assumptions on ρ (namely
Assumptions 5.5, 7.12 and 11.1) that will ensure that ρ satisfies the hypotheses of the
Main Theorem.
<
We call Ω the set of restricted weights of ρ. For any X ∈ a, we call Ω>
X (resp. ΩX ,
≥
≤
Ω=
X , ΩX , ΩX ) the set of all restricted weights of ρ that take a positive (resp. negative,
zero, nonnegative, nonpositive) value on X:
Ω≥
X := {λ ∈ Ω | λ(X) ≥ 0}
Ω>
X := {λ ∈ Ω | λ(X) > 0}
Ω≤
X := {λ ∈ Ω | λ(X) ≤ 0}
Ω<
X := {λ ∈ Ω | λ(X) < 0}
Ω=
X := {λ ∈ Ω | λ(X) = 0} .
The goal of this section is to study these sets, and to choose a vector X0 ∈ a+ for which
the corresponding sets have some nice properties. This generalizes Section 3 in [Smi].
In fact, these sets are the only property of X0 that matters for us; in other terms, what
we really care about is the class of X0 with respect to the following equivalence relation:
<
<
>
Definition 5.1. We say that X and Y have the same type if Ω>
Y = ΩX and ΩY = ΩX .
Obviously this implies that the spaces Ω≥ , Ω≤ and Ω= coincide as well for X and Y .
This is an equivalence relation, which partitions a into finitely many equivalence classes.
Remark 5.2. Every such equivalence class is obviously a convex cone; taken together, the
equivalence classes decompose a into a cell complex.
Example 5.3. If ρ is the adjoint representation, two dominant vectors X, Y ∈ a+ have
the same type if and only if ΠX = ΠY . There is only one generic type, corresponding
to a++ .
See Example 3.5.3 in [Smi] for more details, and two other examples with pictures.
The motivation for the study of these five sets Ω?X is that they allow us to introduce
some “reference dynamical spaces” (see Subsection 6.1).
In Subsections 5.1 and 5.2, we define two properties that we want X0 to satisfy. Subsection 5.3 basically consists of examples, and may be safely skipped.
5.1 Generically symmetric vectors
We start by defining the property of being “generically symmetric”, which generalizes
generic and symmetric vectors as defined in Subsections 3.1 and 3.3 of [Smi]. One of the
goals is to ensure that the set Ω=
X is as small as possible.
Here is the first attempt: we say that an element X ∈ a is generic if
Ω=
X ⊂ {0}.
35
Remark 5.4. This is indeed the generic case: it happens as soon as X avoids a finite
collection of hyperplanes, namely the kernels of all nonzero restricted weights of ρ. In
fact, a vector is generic if and only if its equivalence class is open. If X is generic, its
equivalence class is just the connected component containing X in the set of generic vectors; otherwise, its equivalence class is always contained in some proper vector subspace
of a.
In fact, for generic X we actually have
Ω=
X = {0},
provided the following condition is met:
Assumption 5.5. From now on, we assume that 0 is a restricted weight of ρ:
0 ∈ Ω,
or equivalently
dim V 0 > 0.
Remark 5.6. By Proposition 2.11, this is the case if and only if the highest restricted
weight of ρ is a Z-linear combination of restricted roots.
We lose no generality in assuming this, because this assumption is necessary for condition (i)(a) of the Main Theorem (which is also Assumption 7.12, see below) to hold.
Indeed, any nonzero vector fixed by L is in particular fixed by A ⊂ L, which means that
it belongs to the zero restricted weight space.
Since we want to construct a group Γ with certain properties, it must in particular be
stable by inverse. The identity (4.2) encourages us to examine the action of −w0 on a.
Definition 5.7. We say that an element X ∈ a is symmetric if it is invariant by −w0 :
−w0 (X) = X.
Ideally, we would like our “reference” vector X0 to be both symmetric and generic.
Unfortunately, this is not always possible: indeed, every restricted weight that happens
to be invariant by w0 necessarily vanishes on every symmetric vector. Let
Ωw0 := {λ ∈ Ω | w0 λ = λ}
be the set of those restricted weights.
Definition 5.8. We say that an element X ∈ a is generically symmetric if it is symmetric
and we have
w0
Ω=
X =Ω .
In other terms, an element is generically symmetric if it is “as generic as possible” while
still being symmetric.
36
5.2 Extreme vectors
Besides WX , we are also interested in the group
Wρ,X := {w ∈ W | wX has the same type as X} ,
(5.1)
which is the stabilizer of X “up to type”. It obviously contains WX . The goal of this
subsection is to show that in every equivalence class, we can actually choose X in such
a way that both groups coincide. This generalizes Subsection 3.5 in [Smi].
Example 5.9. In Example 3.5.3 in [Smi] (G = SO+ (3, 2) acting on V = R5 ), the group
Wρ,X corresponding to any generic X is a two-element group. If we take X to be generic
not only with respect to ρ but also with respect to the adjoint representation (in other
terms if X is in an open Weyl chamber), then the group WX is trivial. If however we take
as X any element of the diagonal wall of the Weyl chamber, we have indeed WX = Wρ,X .
Definition 5.10. We call an element X ∈ a+ extreme if WX = Wρ,X , i.e. if it satisfies
the following property:
∀w ∈ W,
wX has the same type as X ⇐⇒ wX = X.
Remark 5.11. Here is an equivalent definition which is possibly more enlightening. It is
possible to show that a vector X ∈ a+ is extreme if and only if it lies in every wall of the
Weyl chamber that contains at least one vector of the same type as X. In other words,
a vector is extreme if it is in the “furthest possible corner” of its equivalence class in the
Weyl chamber a+ .
As this last statement will never be used in this paper, we have left out its proof.
Proposition 5.12. For every generically symmetric X ∈ a+ , there exists a generically
symmetric X ′ ∈ a+ that has the same type as X and that is extreme.
This is a straightforward generalization of Proposition 3.17 in [Smi]. The proof is
similar.
Proof. To construct an element that has the same type as X but has the whole group Wρ,X
as stabilizer, we simply average over the action of this group: we set
X
X′ =
wX.
(5.2)
w∈Wρ,X
(As multiplication by positive scalars does not change anything, we have written it as
a sum rather than an average for ease of manipulation.) Let us check that it has the
required properties.
• Let us show that X ′ is still symmetric. Since w0 belongs to the Weyl group, it
induces a permutation on Ω, hence we have:
>
>
<
w0 Ω>
X = Ωw0 X = Ω−X = ΩX ,
37
(5.3)
<
so that w0 swaps the sets Ω>
X and ΩX . Now by definition we have
<
Wρ,X = StabW (Ω>
X ) ∩ StabW (ΩX ),
(5.4)
hence w0 normalizes Wρ,X . Obviously the map X 7→ −X commutes with everything, so −w0 also normalizes Wρ,X . We conclude that
X
−w0 (X ′ ) =
−w0 (w(X))
w∈Wρ,X
=
X
w ′ ∈W
w′ (−w0 (X))
ρ,X
′
=X.
(5.5)
• By definition every wX for w ∈ Wρ,X has the same type as X; since the equivalence
class of X is a convex cone, their sum X ′ also has the same type as X.
=
w0
′
• In particular we have Ω=
X ′ = ΩX = Ω , so X is still generically symmetric.
• By construction whenever wX has the same type as X, we have wX ′ = X ′ ; conversely if w fixes X ′ , then wX has the same type as wX ′ = X ′ which has the same
type as X. So X ′ is extreme.
• It remains to show that X ′ ∈ a+ , i.e. that for every α ∈ Π, we have α(X ′ ) ≥ 0:
– If sα X ′ = X ′ , then obviously α(X ′ ) = 0.
– Otherwise, since X ′ is extreme, it follows that sα X ′ does not even have the
same type as X ′ . This means that there exists a restricted weight λ of ρ such
that
λ(X ′ ) ≥ 0 and sα (λ)(X ′ ) ≤ 0,
(5.6)
and (at least) one of the two inequalities is strict. In particular we have
λ − sα (λ) (X ′ ) 6= 0.
(5.7)
Since λ − sα (λ) is by definition a multiple of α, it follows that
α(X ′ ) 6= 0.
Now the same reasoning applies to any vector of the same type as X; hence α
never vanishes on the equivalence class of X. Since by hypothesis α(X) ≥ 0
and since the equivalence class is connected, we conclude that
α(X ′ ) > 0.
Note that in practice, the set ΠX for an extreme, generically symmetric X can take
only a very limited number of values: see Remark 3.19 in [Smi].
38
5.3 Simplifying assumptions
In this subsection, we discuss how the constructions of this paper may simplify in some
particular cases. These results will never be reused in the paper, which is why we do not
provide proofs. However, they can be helpful for a reader who is only interested in one
particular representation (which is likely to fit at least one of the cases outlined below).
Definition 5.13. We say that the representation ρ is:
1. limited if every restricted weight is a multiple of a restricted root:
Ω ⊂ Z · Σ := {nα | n ∈ Z, α ∈ Σ} ;
2. abundant if every restricted root is a restricted weight:
Ω ⊃ Σ ∪ {0};
3. awkward if it is neither limited nor abundant;
4. non-swinging if Ωw0 = {0}.
Example 5.14.
1. The adjoint representation is both limited and abundant, and always non-swinging.
2. The standard representation of SO(p + 1, p) on R2p+1 is limited, and non-swinging.
3. If G is simple, it seems that all but finitely many representations are abundant. If
additionally its restricted root system has a simply-laced diagram, then Lemma 2.15
says that all representations except the trivial one are abundant.
4. Among simple groups, it seems that awkward representations occur only when the
restricted root system is of type Cn or BCn , and only for n at least equal to 4.
For non-simple groups, this phenomenon is more common. See Example 6.20 for
specific examples.
5. Swinging representations occur only when −w0 is a nontrivial automorphism of the
Dynkin diagram. Among simple groups, this happens only if the restricted root
system is of type An (n ≥ 2), D2n+1 or E6 . The bad news is that for these groups,
most representations (all but finitely many) are swinging. The simplest example is
SL3 (R) acting on S 3 R3 (see Example 3.7 in [Smi]).
6. Thus no representation of a simple group is swinging and awkward at the same
time. (However this may happen for a non-simple group G1 × G2 : simply take the
tensor product of a swinging representation ρ1 of G1 and an awkward representation
ρ2 of G2 .)
All the subsequent constructions rely on the choice of a generically symmetric vector X0 ∈ a+ that is extreme; actually, only the type of X0 matters. Here is what we can
say about the choice of X0 (up to type) in these particular cases:
39
Remark 5.15.
(i) In a limited representation, there is only one type of generically symmetric vector.
So we can ignore the dependence on X0 .
(ii) In an abundant representation, every generically symmetric vector lies in particular
in a++ . In other terms we have ΠX0 = ∅, and we do not need the theory of nonminimal parabolic subgroups (as developed in section 2.3).
(iii) In both cases, we get that the type of X0 with respect to the adjoint representation
(i.e. the subset ΠX0 ) does not depend on the choice of X0 . In fact, in every nonawkward representation, for every generically symmetric and extreme X0 ∈ a+ , we
have the identity
ΠX0 = {α ∈ Π | α 6∈ Ω} .
(5.8)
(iv) Note that one of the inclusions, namely
ΠX0 ⊂ {α ∈ Π | α 6∈ Ω} ,
is obvious and holds in every representation. The other inclusion however may fail
in awkward representations, and the value of ΠX0 may then depend on the choice
of X0 : see Example 6.20.
(v) In a non-swinging representation, clearly the vector X0 is generically symmetric if
and only if it is generic and also symmetric.
6 Constructions related to X0
Definition 6.1. For the remainder of the paper, we fix some vector X0 in the closed
dominant Weyl chamber a+ that is generically symmetric and extreme.
In this section, we introduce some preliminary constructions associated to this vector X0 .
In Subsection 6.1, we introduce the “reference dynamical spaces” associated to X0 , and
find their stabilizers in G. This generalizes Subsection 4.1 in [Smi].
Subsection 6.2 consists entirely of definitions. We introduce some elementary formalism
that expresses affine spaces in terms of vector spaces, and use it to define the affine
reference dynamical spaces. We basically repeat Subsection 4.2 from [Smi].
In Subsection 6.3, we try to understand what “regularity” means in the affine context.
We introduce two different notions of regularity, and establish the relationships between
them. Previously we used only one of the two notions: see Definition 4.14 in [Smi].
Subsection 6.4 consists entirely of examples. It contains counterexamples to help understand why some statements of the previous subsection cannot be made stronger.
40
6.1 Reference dynamical spaces
Definition 6.2. We define the following subspaces of V :
L
• V0> := λ(X0 )>0 V λ , the reference expanding space;
• V0< :=
• V0= :=
• V0≥ :=
• V0≤ :=
L
L
λ(X0 )<0 V
λ,
the reference contracting space;
λ(X0 )=0 V
λ,
the reference neutral space;
λ,
the reference noncontracting space;
λ,
the reference nonexpanding space.
L
λ(X0 )≥0 V
L
λ(X0 )≤0 V
In other terms, V0≥ is the direct sum of all restricted weight spaces corresponding to
weights in Ω≥
X0 , and similarly for the other spaces.
These are precisely the dynamical spaces associated to the map exp(X0 ) (acting on V
by ρ), as defined in section 4.3 of [Smi]. See Example 4.3 in [Smi] for the case of the
adjoint representation and of G = SO+ (p, q) acting on the standard representation.
Remark 6.3. Note that by Assumption 5.5, zero is a restricted weight, so the space V0=
is always nontrivial.
Let us now determine the stabilizers in G of these subspaces.
Proposition 6.4. We have:
(i) StabG (V0≥ ) = StabG (V0> ) = PX+0 .
(ii) StabG (V0≤ ) = StabG (V0< ) = PX−0 .
This generalizes Proposition 4.4 in [Smi]; but now the proof is somewhat more involved.
Proof.
By Lemma 2.23 and Corollary 2.24, it is enough to show that
≤
>
<
StabW (Ω≥
X0 ) = StabW (ΩX0 ) = StabW (ΩX0 ) = StabW (ΩX0 ) = WX0 .
(6.1)
≤
>
<
Indeed since X0 ∈ a+ , clearly Ω≥
X0 and ΩX0 are top-subsets and ΩX0 and ΩX0 are
bottom-subsets of Ω.
Now obviously any subset of Ω and its complement always have the same stabilizer
by W (since Ω is stable by W ). On the other hand, we have
since X0 is extreme
WX0 = Wρ,X0
>
<
= StabW (ΩX0 ) ∩ StabW (ΩX0 )
by definition.
≥
<
>
So it is sufficient to show that Ω>
X0 and ΩX0 , or equivalently ΩX0 and ΩX0 , have the same
stabilizer in W . This is a consequence of Lemma 6.5 below.
41
Lemma 6.5. Every element w of the restricted Weyl group W such that
≥
wΩ>
X0 ⊂ Ω X0
(6.2)
≥
stabilizes every set of restricted weights Ξ such that Ω>
X0 ⊂ Ξ ⊂ Ω X0 .
In particular all such sets Ξ have the same stabilizer in W : indeed every w ∈ W that
≥
stabilizes Ω>
X0 , and every w ∈ W that stabilizes ΩX0 , satisfies in particular (6.2).
Proof. Let us decompose g as a sum of three pieces g = g1 ⊕ g2 ⊕ g3 , with respective
Cartan subspaces a1 , a2 and a3 , such that:
• every simple summand of g1 has a restricted root system with a nonempty, simplylaced diagram, and acts nontrivially on V ;
• the restriction of w0 to a2 is − Id;
• g3 acts trivially on V .
Then we also have the decompositions:
• Σ = Σ1 ∪ Σ2 ∪ Σ3 , where Σi is the restricted root system of gi ;
+
+
+
+
• Σ+ = Σ+
1 ∪ Σ2 ∪ Σ3 , where every Σi := Σi ∩ Σ is a system of positive restricted
roots for gi ;
• W = W1 × W2 × W3 , where Wi is the restricted Weyl group of gi .
We now prove the two contrasting statements (6.3) and (6.4).
≥
• On the one hand, we claim that for any w ∈ W such that wΩ>
X0 ⊂ ΩX0 , we have
w ∈ W2 × W3 .
(6.3)
Indeed, let us decompose w = w1 w2 w3 with wi ∈ Wi .
Applying Lemma 2.15 to every simple summand of g1 , we find that Σ1 ⊂ Ω. Since
w0 does not intersect Σ (it does not
X0 is generically symmetric, the set Ω=
1
X0 = Ω
even intersect Σ, as by definition w0 does not leave any restricted root invariant).
Since X0 is dominant, we deduce that
+
>
Ω≥
X0 ∩ Σ 1 = Ω X0 ∩ Σ 1 = Σ 1 .
It follows that
>
w(Σ+
1 ) = w(ΩX0 ∩ Σ1 )
= w(Ω>
X0 ) ∩ Σ 1
since W stabilizes Σ1
⊂ Ω≥
X0 ∩ Σ 1
=
by assumption
Σ+
1.
Thus w fixes Σ+
1 , which precisely means that w1 = Id as required.
42
• On the other hand, we claim that
w0
Ω=
⊂ a∗1
X0 = Ω
(6.4)
(the equality holds since X0 is generically symmetric). Indeed, take any λ ∈ Ωw0 ,
and let us decompose it as λ = λ1 +λ2 +λ3 with λi ∈ a∗i . The component λ3 vanishes
by definition of g3 . As for λ2 , we have by definition of g2 that w0 (λ2 ) = −λ2 , so
the component λ2 also vanishes.
Combining (6.3) with (6.4), we conclude that whenever an element w ∈ W satisfies
≥
=
wΩ>
X0 ⊂ ΩX0 , it actually fixes every element of ΩX0 . Now take such a w, and take any
element ξ ∈ Ξ. Since Ξ ⊂ Ω≥
X0 , we may distinguish two cases:
• Either ξ ∈ Ω=
X0 . Then it follows from the previous statement that w(ξ) = ξ ∈ Ξ.
=
• Or ξ ∈ Ω>
X0 . Then it follows from the previous statement that w(ξ) 6∈ ΩX0 . On the
≥
>
other hand we know that w(ξ) ∈ w(Ω>
X0 ) ⊂ ΩX0 . Thus w(ξ) ∈ ΩX0 ⊂ Ξ.
6.2 Extended affine space
Let VAff be an affine space whose underlying vector space is V .
Definition 6.6 (Extended affine space). We choose once and for all a point of VAff which
we take as an origin; we call R0 the one-dimensional vector space formally generated by
this point, and we set A := V ⊕ R0 the extended affine space corresponding to V . (We
hope that A, the extended affine space, and A, the group corresponding to the Cartan
space, occur in sufficiently different contexts that the reader will not confuse them.) Then
VAff is the affine hyperplane “at height 1” of this space, and V is the corresponding vector
hyperplane:
V = V × {0} ⊂ V × R0 ;
VAff = V × {1} ⊂ V × R0 .
Definition 6.7 (Linear and affine group). Any affine map g with linear part ℓ(g) and
translation vector v, defined on VAff by
g : x 7→ ℓ(g)(x) + v,
can be extended in a unique way to a linear map defined on A, given by the matrix
ℓ(g) v
.
0
1
From now on, we identify the abstract group G with the group ρ(G) ⊂ GL(V ), and
the corresponding affine group G ⋉ V with a subgroup of GL(A).
Definition 6.8 (Affine subspaces). We define an extended affine subspace of A to be a
vector subspace of A not contained in V . There is a one-to-one correspondence between
extended affine subspaces of A and affine subspaces of VAff of dimension one less. For
any extended affine subspace of A denoted by A1 (or A2 , A′ and so on), we denote by V1
(or V2 , V ′ and so on) the space A ∩ V (which is the linear part of the corresponding affine
space A ∩ VAff ).
43
Definition 6.9 (Translations). By abuse of terminology, elements of the normal subgroup V ⊳ G ⋉ V will still be called translations, even though we shall see them mostly
as endomorphisms of A (so that they are formally transvections). For any vector v ∈ V ,
we denote by τv the corresponding translation.
Definition 6.10 (Reference affine dynamical spaces). We now give a name for (the
vector extensions of) the affine subspaces of VAff parallel respectively to V0≥ , V0≤ and V0=
and passing through the origin: we set
≥
A≥
0 := V0 ⊕ R0 ,
the reference affine noncontracting space;
≤
≤
the reference affine nonexpanding space;
=
=
the reference affine neutral space.
A0 := V0 ⊕ R0 ,
A0 := V0 ⊕ R0 ,
These are obviously the affine dynamical spaces (in the sense of [Smi]) corresponding to
the map exp(X0 ), seen as an element of G ⋉ V by identifying G with the stabilizer of R0
in G ⋉ V .
We then have the decomposition
A≥
z }|0 {
A = V0> ⊕ A=
⊕ V <.
| 0 {z 0 }
A≤
0
(6.5)
<
This gives a hint for why we do not introduce the spaces “A>
0 ” or “A0 ”; see Remark 4.13
in [Smi] for a detailed explanation.
Definition 6.11 (Affine Jordan projection). Finally, we extend the notion of Jordan
projection to the whole group G ⋉ V , by setting
∀g ∈ G ⋉ V,
Jd(g) := Jd(ℓ(g)).
6.3 Conditions on the Jordan projection
In this subsection, we introduce two new notions of regularity of an element g ∈ G ⋉ V ,
given as conditions on its Jordan projection. We also determine the relationships between
them.
Definition 6.12 (Affine version of regularity). We say that an element g ∈ G ⋉ V is:
=
• ρ-regular if it is X0 -regular and we have Ω=
Jd(g) = ΩX0 , or in other terms:
(
∀α ∈ Π \ ΠX0 ,
∀λ ∈ Ω \ Ω=
X0 ,
α(Jd(g)) 6= 0
λ(Jd(g)) 6= 0;
(6.6)
λ< (Jd(g)) < λ≥ (Jd(g)).
(6.7)
• asymptotically contracting along X0 if
≥
≥
∀λ< ∈ Ω<
X0 , ∀λ ∈ ΩX0 ,
44
Of course both of these are really properties of Jd(g). By abuse of terminology, we say
that a vector Y ∈ a is respectively ρ-regular or asymptotically contracting along X0 if
Y itself satisfies respectively (6.6) or (6.7).
Remark 6.13. Rigorously we should talk about “(ρ, X0 )-regularity”, as the definition
depends on the choice of X0 . However the author feels that this dependence is not
significant enough to be constantly mentioned in this way. (See in particular point 3 in
the following example).
Example 6.14.
1. If the representation ρ is limited, all three properties of being X0 -regular, ρ-regular
and asymptotically contracting along X0 become equivalent. This includes the
standard representation of G = SO(p + 1, p) on R2p+1 : see Example 4.15.1 in [Smi].
2. If the representation ρ is limited and abundant at the same time (e.g. the adjoint
representation), all three properties actually reduce to ordinary R-regularity (since
X0 generic then means X0 ∈ a++ ).
3. If the representation ρ is non-awkward (either limited or abundant), the notion of
ρ-regularity does not depend on the choice of X0 : indeed ΠX0 is then uniquely
determined by (5.8), and ΩX0 = Ωw0 since X0 is by assumption generically symmetric.
4. In general (see Example 6.20), the notion of ρ-regularity does technically depend
on the choice of X0 .
5. If the representation ρ is non-swinging, it is possible to show that its set of restricted weights Ω is centrally symmetric (or, equivalently, invariant by −w0 ). (The
author must however admit that he knows no better proof of this fact than by complete enumeration of non-swinging representations.) It then follows that whenever
g is asymptotically contracting along X0 , so is g−1 ; and asymptotic contraction
along X0 is then equivalent to Jd(g) having the same type as X0 (in the sense of
Definition 5.1), which was the condition considered in [Smi].
6. In general, asymptotic contraction along X0 is a stronger condition than being of
type X0 . For a simple counterexample, take G = SL3 (R) acting on S 3 R3 (see [Smi],
Example 3.7). For a fancier counterexample, see Example 6.21.
Both of these new properties are “affine analogs” of X0 -regularity. However, they are
useful in slightly different contexts:
• The purpose of assuming that an element g ∈ G ⋉ V is ρ-regular is just to ensure that the affine ideal dynamical subspaces (introduced in section 7.1) are welldefined. This is a relatively weak property: Jd(g) is merely required to avoid a
finite collection of hyperplanes.
This is the property we will use the most often, and in particular the one that
makes the affine version of Schema 1.5 work.
45
• The purpose of assuming that an element g ∈ G ⋉ V is asymptotically contracting
along X0 is roughly to ensure that g acts “with the correct dynamics” on its ideal
dynamical subspaces. For more details, see the discussion following the definition
of the latter; for a motivation of the “asymptotically contracting” terminology, see
Proposition 7.23.(ii).
This property is not explicitly part of the hypotheses in Schema 1.5, since it is
implied by contraction strength (see Proposition 7.23.(i)) However, we will often
need it as an extra assumption in intermediate results. Actually, we will often need
to assume that both g and g −1 are asymptotically contracting.
The latter property is verified as soon as the Jordan projection of g points in a direction
that is, in a sense, “close enough” to that of X0 . More precisely:
Remark 6.15.
(i) The set
a′ρ,X0 := {Y ∈ a | Y and −w0 (Y ) are asymptotically contracting along X0 }
is a convex cone (i.e. stable by positive scaling and sum) and is open. (Indeed it is
an intersection of finitely many open vector half-spaces.)
(ii) The intersection a′ρ,X0 ∩ a+ contains X0 , and is in particular nonempty. (By the
identity (4.2), which obviously still holds in the affine case, this intersection is
precisely equal to
Jd(g) g ∈ G ⋉ V with both g and g −1 asymptotically contracting along X0 .)
(iii) Since a′ρ,X0 is open and meets the closed set a+ , it also meets its interior a++ . Thus
the intersection a′ρ,X0 ∩ a++ is a nonempty open convex cone. (The latter set might
not seem relevant at this point, but will be useful in the final proof of this paper.)
(Note the distinction between the set a′ρ,X0 introduced here and the set aρ,X0 defined
in (3.2) in [Smi], as the equivalence class of X0 . It is however true that in the non-swinging
case, the two sets coincide, as seen in Example 6.14.5.)
Here is the relationship between these two notions.
Proposition 6.16. Let g ∈ G ⋉ V . Then:
(i) if g is asymptotically contracting along X0 , then g is X0 -regular;
(ii) if both g and g−1 are asymptotically contracting along X0 , then g is ρ-regular.
Remark 6.17. As mentioned before (Example 6.14.5), if ρ is non-swinging, then we may
remove the assumption about g−1 . In general this is not true: see Example 6.21 for a
counterexample.
The proof relies on the following lemma. For the moment we only need the weak
version; the strong version will be useful later.
46
<
Lemma 6.18. For every i ∈ Π \ ΠX0 , there exists a pair of restricted weights (λ≥
i , λi )
≥
such that λi − λ<
i = αi , with:
≥
≥
<
(i) (weak version) λ<
i ∈ ΩX0 and λi ∈ ΩX0 ;
≥
<
>
(ii) (strong version) λ<
i ∈ ΩX0 and λi ∈ ΩX0 ∪ {0}.
Remark 6.19. As long as ρ is non-awkward, (5.8) provides a “super-strong version” of
this lemma: namely we can actually take λ≥
i = 0. In general this is not true: see
Example 6.20.
Proof.
(i) Let us reintroduce the decomposition g = g1 ⊕ g2 ⊕ g3 from the proof of Lemma 6.5,
together with the other notations that went along with it. We then have
Π = Π1 ⊔ Π2 ⊔ Π3 ,
where Π1,2,3 := Π ∩ Σ1,2,3 . Let i ∈ Π \ ΠX0 . We distinguish three cases:
• The case i ∈ Π3 never occurs: indeed for i ∈ Π3 , the symmetry sαi fixes Ω
pointwise, so we have i ∈ ΠX0 .
• If i ∈ Π1 , applying Lemma 2.15 to the simple summand of g1 containing αi ,
<
we find that αi ∈ Ω. Then we may simply take λ≥
i = 0 and λi = −αi .
• Finally suppose that i ∈ Π2 . Then by definition, we have sαi 6∈ WX0 ; by
Proposition 6.4, this means that sαi does not stabilize Ω≥
X0 . In other terms,
there exists a restricted weight λ of ρ such that
λ(X0 ) ≥ 0
and
(6.8)
sαi (λ)(X0 ) < 0
(compare this with (5.6), which was slightly weaker). Since λ is a restricted
weight, by Proposition 2.8, the number
nλ :=
hλ, αi i
2hαi , αi i
(6.9)
is an integer. We have, on the one hand:
nλ αi (X0 ) = (λ − sαi (λ)) (X0 ) > 0;
(6.10)
on the other hand, αi (X0 ) ≥ 0 (because X0 ∈ a+ ); hence nλ is positive.
By Proposition 2.11, every element of the sequence
λ, λ − αi , . . . , λ − nλ αi = sαi (λ)
is a restricted weight of ρ. Let λlast be the last element of this sequence that
≥
<
still lies in Ω≥
X0 ; then by construction λlast − αi ∈ ΩX0 . Taking λi = λlast
<
and λi = λlast − αi , we get the weak version.
47
(ii) The same proof works for the strong version, except in the last case (i ∈ Π2 ) if we
happen to have λlast 6∈ Ω>
X0 . But then since X0 is generically symmetric, we have
w0 . In particular, by (6.4), we have λ
∗
λlast ∈ Ω=
=
Ω
last ∈ a1 .
X0
Since λlast − αi is a restricted weight of ρ, by Proposition 2.11, the form −αi
is also a restricted weight of ρ (the latter is the average of the W1 -orbit of the
≥
former). By (6.10), we actually have −αi ∈ Ω<
X0 . Thus we may take λi = 0
and λ<
i = −αi .
Proof of Proposition 6.16.
<
(i) Let i ∈ Π \ ΠX0 , and let λ≥
i and λi be the restricted weights constructed in
Lemma 6.18 (the weak version suffices). Since g is asymptotically contracting
<
along X0 , we then have λ≥
i (Jd(g)) > λi (Jd(g)), hence αi (Jd(g)) > 0.
(ii) Suppose that both g and g−1 are asymptotically contracting along X0 . By the
previous point, we already know that g is X0 -regular. It remains to check that for
any λ 6∈ Ω=
X0 , we have λ(Jd(g)) 6= 0. We distinguish two cases:
• if λ ∈ Ω<
X0 , since g is asymptotically contracting along X0 , we have
λ(Jd(g)) < min λ≥ (Jd(g)) ≤ 0;
λ≥ ∈Ω≥
X
0
−1 is asymptotically contracting along X , we have
• if λ ∈ Ω>
0
X0 , since g
λ(Jd(g)) > max λ≤ (Jd(g)) ≥ 0.
λ≤ ∈Ω≤
X
0
Hence g is ρ-regular.
6.4 Counterexamples
Here we give three examples of “pathological” behavior, to explain why some constructions
of this paper cannot be simplified in general. All three of them are fairly far-fetched. For
the reader who wishes to focus on “non-pathological” behavior, it is probably safe to skip
this subsection.
Example 6.20. Here are two examples of awkward (i.e. neither limited nor abundant)
representations, with an explanation of how they provide a counterexample to (5.8)
and to the “super-strong version” of Lemma 6.18. (The first one is a development on
Example 3.5.4 in [Smi].)
1. Take G = PSp4 (R) (which is a split group). Hence its restricted root system
coincides with its ordinary root system, and is of type C4 . In the notations of
[Kna96], its simple (restricted) roots are e1 − e2 , e2 − e3 , e3 − e4 and 2e4 .
Take ρ to be the representation with highest weight e1 + e2 + e3 + e4 . It has:
48
• the 16 (restricted) weights of the form ±e1 ± e2 ± e3 ± e4 , with multiplicity 1;
• the 24 (restricted) weights of the form ±ei ± ej , with multiplicity 1;
• the zero (restricted) weight with multiplicity 2,
for a total dimension of 42.
For 1 ≤ i ≤ 3, we have αi = ei − ei+1 ∈ Ω and in particular −αi ∈ Ω<
X0 for any
≥
generic X0 , so obviously we may take λi = 0. For α4 = 2e4 on the other hand, we
have −α4 6∈ Ω so this is no longer the case. Now note that there are three different
types of generic elements; extreme representatives of each type are given by:
(a) X0 = (4, 2, 1, 0), with ΠX0 = {α4 };
(b) X0 = (5, 3, 2, 1), with ΠX0 = ∅;
(c) X0 = (4, 3, 2, 0), with ΠX0 = {α4 }.
In cases (a) and (c), the removal of ΠX0 excludes α4 from consideration. In case (b)
however, we have to deal with it. To wit, we then have:
Ω≥
X0 = {e1 + e2 + e3 + e4 ,
e1 + e2 + e3 − e4 ,
e1 + e2 − e3 + e4 ,
e1 + e2 − e3 − e4 ,
e1 − e2 + e3 + e4 ,
e1 − e2 + e3 − e4 ,
e1 − e2 − e3 + e4 ,
− e1 + e2 + e3 + e4 ,
ei ± ej for all i < j,
0},
and the only possible choice is
(
λ≥
4 = e1 − e2 − e3 + e4 ;
λ<
4 = e1 − e2 − e3 − e4 .
(6.11)
(6.12)
2. Take G = SO+ (3, 2) × SO+ (3, 2). Its root system (both ordinary and restricted) is
then of type B2 × B2 . Let us call
• ±e1 , ±e2 , ±e1 ± e2 the (restricted) roots of the first factor;
• ±f1 , ±f2 , ±f1 ± f2 the (restricted) roots of the second factor.
Let us order the (restricted) roots by the lexicographical order on each factor. This
gives a unique ordering of the combined root system. The simple (restricted) roots
of G are then e1 − e2 , e2 , f1 − f2 and f2 .
49
Take ρ to be the representation of G with highest weight e1 +f1 (which corresponds
to the standard action of G on R5 ⊗ R5 ). The set of its (restricted) weights is then
Ω = {−e1 , −e2 , 0, e2 , e1 } + {−f1 , −f2 , 0, f2 , f1 }
(6.13)
(where by A + B we mean {a + b | a ∈ A, b ∈ B}, i.e. the set Ω is of cardinal 25).
The set Ω contains the negative simple (restricted) roots −e2 and −f2 , but not
−e1 + e2 nor −f1 + f2 .
There are six different types of generic elements. Using on a the coordinate system
(e1 , e2 , f1 , f2 ), extreme representatives of three of the types are given by:
(a) X0 = (2, 2, 1, 1). Then ΠX0 = {e1 − e2 , f1 − f2 }: this is a “nice” case.
(b) X0 = (3, 1, 2, 2). Then ΠX0 = {f1 − f2 }, and we need to deal with e1 − e2 .
The two only possibilities are to take
(
λ≥
e1 −e2 = e1 − fi ;
(6.14)
<
λe1 −e2 = e2 − fi
for i = 1 or 2.
(c) X0 = (4, 2, 3, 1). Then ΠX0 = ∅, and we need to deal with both. We have to
take
(
λ≥
e1 −e2 = e1 − f1 ;
(6.15)
<
λe1 −e2 = e2 − f1
and
(
λ≥
f1 −f2 = −e2 + f1 ;
λ<
f1 −f2 = −e2 + f2 .
(6.16)
The three other types are obtained by exchanging e and f .
Example 6.21. Here is a counterexample to the statement of Remark 6.17: a representation ρ (necessarily swinging) and a choice of X0 such that not all elements that
asymptotic contraction along X0 does not, on its own, imply ρ-regularity. (We let the
reader check the details.)
Take G = PSL4 (R); its root system (both ordinary and restricted) is of type A3 ,
and the involution w0 maps (e1 , e2 , e3 , e4 ) to (e4 , e3 , e2 , e1 ) (in the notations of [Kna96],
appendix C).
Let ρ be a representation of G with highest weight
λ = 5̟2 + ̟3 = 4e1 − e2 − e3 − 2e2 ;
this is a representation of dimension 189, with 119 distinct (restricted) weights. Take
X0 = (10, 1, −1, −10);
this vector is generically symmetric and extreme with respect to ρ — in fact, we have
w0
Ω=
= {0, ±(e1 − e2 − e3 + e4 )}.
X0 = Ω
50
Then the vector
Y = (16, 2, −3, −15)
is asymptotically contracting along X0 , i.e.
≥
≥
∀λ< ∈ Ω<
X0 , ∀λ ∈ ΩX0 ,
λ< (Y ) < λ≥ (Y ).
However the (restricted) weight −e1 − e2 + 4e3 − 2e4 vanishes on Y , but not on X0 ; so
Y is not ρ-regular.
7 Properties of ρ-regular affine maps
The goal of this section is to define the affine versions of the remaining properties. It generalizes Subsections 4.3–5.2 in [Smi], but several constructions now become considerably
more complex.
In Subsection 7.1, we define the “ideal dynamical spaces” associated to a ρ-regular
map g ∈ G ⋉ V . The data of two of them is the affine version of the “geometry” of g, and
the remaining ones can be deduced from these two. This generalizes at the same time
Subsections 4.3 and 4.4 from [Smi], but using a different approach.
In Subsection 7.2, we study the action of a ρ-regular map on its affine ideally neutral
&
space Ag , which turns out to be a so-called quasi-translation. This generalizes Subsection 4.5 from [Smi] and Subsection 2.4 from [Smi16], with one small difference: see
Remark 7.9.
In Subsection 7.3, we introduce a groupoid of “canonical identifications” between all the
possible affine ideally neutral spaces. We then use them to define the “translation part” of
the asymptotic dynamics of g (the Margulis invariant). This is an almost straightforward
generalization of Subsection 4.6 from [Smi] and Subsection 2.5 from [Smi16].
In Subsection 7.4, we define and study the affine versions of non-degeneracy and contraction strength. We mostly follow the second half of Subsection 5.1 from [Smi] or of
Subsection 2.6 from [Smi16].
In Subsection 7.5, we study the relationships between affine and linear properties. This
generalizes Subsection 5.2 from [Smi] or Subsection 2.7 from [Smi16], but with a weaker
and more complicated statement.
7.1 Ideal dynamical spaces
The goal of this subsection is to define the ideal dynamical spaces associated to a ρ-regular
map g ∈ G ⋉ V (Definition 6.12). We start with the following particular case:
Definition 7.1. Take any element g ∈ G ⋉ V . We may then write it as
g = τv gh ge gu ,
where τv is a translation by some vector v ∈ V and gh ge gu is the Jordan decomposition
(see Proposition 2.1) of the linear part of g. We say that g is in canonical form if we
have:
51
(i) gh ∈ exp(a+ ) (i.e. gh = exp(Jd(g)));
(ii) v ∈ V0= .
If g is in canonical form, then we define its ideal dynamical spaces to be the reference
dynamical spaces introduced above. This is especially useful when g is X0 -regular, as
shown by the following property:
Proposition 7.2. If a map g ∈ G ⋉ V is in canonical form and is X0 -regular, then it
≤
≥
≤
>
=
=
stabilizes all eight reference dynamical spaces, namely A≥
0 , A0 , A0 , V0 , V0 , V0 , V0
and V0< .
Proof. First of all note that ℓ(g) commutes (by definition) with its hyperbolic part,
which is (because g is in canonical form) equal to exp(Jd(g)). Hence ℓ(g) belongs to the
centralizer of Jd(g), which is LJd(g) . Now since g is X0 -regular, we have LJd(g) ⊂ LX0 .
Finally from Proposition 6.4, it follows that the group LX0 (hence in particular ℓ(g))
stabilizes:
• the spaces V0≥ and V0> , as a subgroup of PX+0 ;
• the spaces V0≤ and V0< , as a subgroup of PX−0 ;
• the space V0= = V0≥ ∩ V0≤ , as a subgroup of both.
Now the action of the affine map g on the subspace V ⊂ V ⊕ R0 coincides with the action
of its linear part ℓ(g); so g also stabilizes these five subspaces. Finally we know (since
g is in canonical form) that v is contained in V0= , hence in V0≥ and in V0≤ ; hence g also
≥
≤
stabilizes A=
0 , A0 and A0 .
For a general g ∈ G ⋉ V , we define the ideal dynamical spaces to be the inverse images
of the reference dynamical spaces by a “canonizing” map φ such that the conjugate φgφ−1
is in canonical form. However, to ensure that the translation part of φ is well-defined,
we need g to be regular with respect to ρ. More precisely:
Proposition 7.3. Let g ∈ G ⋉ V be a ρ-regular map. Then:
(i) there exists a map φ ∈ G ⋉ V , called a canonizing map for g, such that φgφ−1 is
in canonical form;
(ii) any two such maps differ by left-multiplication by an element of LX0 ⋉ V0= .
The key point of the proof is the following lemma:
Lemma 7.4. If g ∈ G ⋉ V is in canonical form and is ρ-regular, then the linear map
ℓ(g) − Id induces an invertible linear map on the quotient space V /V0= .
52
Proof. The fact that the quotient map is well-defined follows from Proposition 7.2: indeed
ℓ(g), hence ℓ(g) − Id, stabilizes the subspace V0= .
Let us now show that the quotient map is invertible. All eigenvalues of the restriction of
the hyperbolic part exp(Jd(g)) to the subspace V0> ⊕ V0< are real and positive, and (since
g is ρ-regular) different from 1. Since the elliptic and unipotent parts of ℓ(g) commute
with the hyperbolic part of ℓ(g) and have all eigenvalues of modulus 1, it follows that
all eigenvalues of the restriction of ℓ(g) to V0> ⊕ V0< (this subspace is stable by ℓ(g) by
Proposition 7.2) are different from 1. In particular the restriction of ℓ(g) − Id to V0> ⊕ V0<
is invertible. The conclusion follows.
Proof of Proposition 7.3.
(i) Let φℓ ∈ G be a canonizing map for ℓ(g), which exists by Proposition 2.1. We then
have
′
φℓ gφ−1
ℓ = τv g ,
where g ′ ∈ G is in canonical form and v ∈ V .
We now claim that for a suitable choice of w ∈ V , the map φ := τw φℓ is a canonizing
map for g. Indeed we then have:
φgφ−1 = τw τv g′ τ−w = τv+w−g′ (w) g′ .
We already know that g′ ∈ G is in canonical form. On the other hand, by
Lemma 7.4 (here we need surjectivity of the quotient map), we may choose w ∈ V
in such a way that
v + w − g ′ (w) ∈ V0= ,
which finishes the proof.
(ii) Assume that g ∈ G ⋉ V is already in canonical form, so that
g = τv ℓ(g)
with v ∈ V0= and ℓ(g) ∈ G. It is enough to show that any φ ∈ G ⋉ V such that
φgφ−1 is still in canonical form is an element of LX0 ⋉ V0= . Indeed, let φ be such
a map; let us write
φ = τw ℓ(φ),
where w ∈ V is its translation part and ℓ(φ) ∈ G is its linear part. By Proposition 2.17, the fact that ℓ(φ) commutes with Jd(g) implies that ℓ(φ) ∈ LJd(g) ⊂ LX0 .
As for the translation part, if we have w − ℓ(g)(w) ∈ V0= , by Lemma 7.4 (here we
need injectivity of the quotient map), we have w ∈ V0= .
Definition 7.5 (Affine version of geometry). For any ρ-regular map g ∈ G ⋉ V , we
introduce the following eight spaces, called ideal dynamical spaces of g:
• Vg≫ := φ−1 (V0> ), the ideally expanding space associated to g;
53
• Vg≪ := φ−1 (V0< ), the ideally contracting space associated to g;
• Vg≈ := φ−1 (V0= ), the ideally neutral space associated to g;
&
• Vg := φ−1 (V0≥ ), the ideally noncontracting space associated to g;
.
• Vg := φ−1 (V0≤ ), the ideally nonexpanding space associated to g;
&
• Ag := φ−1 (A≥
0 ), the affine ideally noncontracting space associated to g;
• A.g := φ−1 (A≤
0 ), the affine ideally nonexpanding space associated to g;
−1
=
• A≈
g := φ (A0 ), the affine ideally neutral space associated to g,
where φ is any canonizing map of g.
Here is the idea behind this definition. Suppose first that the representation is nonswinging (so that X0 is actually generic), and that the Jordan projection of g is sufficiently
>
close to X0 . Then it actually has the same type as X0 , i.e. we have Ω>
Jd(g) = ΩX0 and
=
<
similarly for Ω , Ω . Whenever that happens, the ideal dynamical spaces of g coincide
with its actual dynamical spaces, as defined in section 4.3 of [Smi].
If X0 is not generic, this is no longer true as such. We still want to assume that Jd(g)
is sufficiently close to X0 ; but now, this can at best ensure that both g and g−1 are
asymptotically contracting along X0 . In that case, we only get that:
• the moduli of the eigenvalues of g|Vg≫ are “much larger” than 1;
• the moduli of the eigenvalues of g|Vg≪ are “much smaller” than 1;
might now differ from 1, but somehow remain
• the moduli of the eigenvalues of g|A≈
g
“not too far” from 1.
Let us finally check that this definition makes sense, and prove a few extra properties
along the way.
Proposition 7.6.
(i) The definitions above do not depend on the choice of φ;
&
&
.
.
(ii) the datum of Ag uniquely determines the spaces Vg and Vg≫ ;
(iii) the datum of Ag uniquely determines the spaces Vg and Vg≪ ;
&
(iv) the data of both Ag and A.g uniquely determine all eight ideal dynamical spaces.
&
.
The spaces Ag and Ag will play a crucial role, as they are the affine analogs of the
attracting and repelling flags ygX0 ,+ and ygX0 ,− defined in section 4.1: see Remark 7.15
below for an explanation.
54
Proof. An immediate corollary of Proposition 6.4 is that we have
≥
+
StabG⋉V (A≥
0 ) = PX0 ⋉ V0
StabG⋉V (V0≥ ) = PX+0 ⋉ V
StabG⋉V (V0> ) = PX+0 ⋉ V
≤
−
StabG⋉V (A≤
0 ) = PX0 ⋉ V0
StabG⋉V (V0≤ ) = PX−0 ⋉ V
StabG⋉V (V0< ) = PX−0 ⋉ V
=
StabG⋉V (A=
0 ) = L X 0 ⋉ V0
StabG⋉V (V0= ) = LX0 ⋉ V,
(7.1)
with the following relationships:
PX+0 ⋉ V0≥
⊂
PX+0 ⋉ V
=
PX+0 ⋉ V
PX−0 ⋉ V0≤
⊂
PX−0 ⋉ V
=
PX−0 ⋉ V
LX0 ⋉ V0=
⊂
LX0 ⋉ V.
The first two lines immediately imply (ii) and (iii).
For points (i) and (iv), note that all eight groups contain LX0 ⋉ V0= . Point (i) follows
by Proposition 7.3. Point (iv) follows using the identity
(PX+0 ⋉ V0≥ ) ∩ (PX−0 ⋉ V0≤ ) = LX0 ⋉ V0= .
7.2 Quasi-translations
Let us now investigate the action of a ρ-regular map g ∈ G ⋉ V on its affine ideally
neutral space A≈
g . The goal of this subsection is to prove that it is “almost” a translation
(Proposition 7.10).
We fix on V a Euclidean form B satisfying the conditions of Lemma 2.4 for the representation ρ.
Definition 7.7. We call quasi-translation any affine automorphism of A=
0 induced by an
element of L ⋉ V0= .
Let us explain and justify this terminology.
Proposition 7.8. Let V0t be the set of fixed points of L in V0= :
V0t := {v ∈ V0= | ∀l ∈ L, lv = v} .
Let V0a be the B-orthogonal complement of V0t in V0= . Then any quasi-translation is an
element of
GL(V0a ) ⋉ V0a × V0t .
In other words, quasi-translations are affine automorphisms of V0= that preserve the
directions of V0a and V0t and act only by translation on the V0t component. You may
think of a quasi-translation as a kind of “screw displacement”; the superscripts t and a
respectively stand for “translation” and “affine”.
Proof. We need to show that every element of L fixes V0t (pointwise) and leaves V0a
invariant (globally). The former is true by definition of V0t . For the latter, let us prove
it separately for elements of M and elements of A:
55
• By hypothesis, elements of M preserve the form B; since they leave invariant the
space V0t , they also leave invariant its B-orthogonal complement V0a .
• Let us introduce the notation
M
V0≎ :=
Vλ
(7.2)
λ∈Ω=
X \{0}
0
(the symbol “≎” is intended to represent the idea of “avoiding zero”), so that the
space V0= decomposes into the orthogonal sum
V0= = V 0 ⊕ V0≎ .
(7.3)
Then since V t ⊂ V 0 (obviously), similarly, we have an orthogonal sum
V0a = (V0a ∩ V 0 ) ⊕ V0≎ .
(7.4)
Now clearly V0≎ , being a sum of restricted weight spaces, is invariant by A. Moreover, every element of A actually fixes every element of V 0 , in particular leaves
invariant the subspace V0a ∩ V 0 . The conclusion follows.
Remark 7.9. Note that in contrast to the non-swinging case (Proposition 4.19 in [Smi]),
quasi-translations no longer have to act by isometries on V0a , as this space now comprises
the possibly nontrivial space V0≎ where A acts nontrivially.
This phenomenon is the reason why the reasoning we used in [Smi] to prove additivity
of Margulis invariants could not be reused here without major restructuring.
We now claim that any ρ-regular map acts on its affine ideally neutral space by quasitranslations:
Proposition 7.10. Let g ∈ G⋉V be a ρ-regular map, and let φ ∈ G⋉V be any canonizing
map for g. Then the restriction of the conjugate φgφ−1 to A=
0 is a quasi-translation.
Let us actually formulate an even more general result, which will have another application in the next subsection:
≤
=
Lemma 7.11. Any map f ∈ G ⋉ V stabilizing both A≥
0 and A0 acts on A0 by quasitranslation.
Proof.
−
=
• We begin by showing that any element of lX0 = p+
X0 ∩ pX0 acts on V0 in the same
way as some element of l. Recall that by definition
M
lX0 = l ⊕
gα
α(X0 )=0
and
V0= =
M
λ(X0 )=0
56
V λ.
Thus we want to show that for every restricted root α and restricted weight λ such
that α(X0 ) = λ(X0 ) = 0, we have gα · V λ = 0. It is sufficient to show that in
such a case, the sum λ + α is no longer a restricted weight. But otherwise, both λ
and λ + α would be elements of Ω=
X0 , hence they would both be fixed by w0 since
X0 is generically symmetric. This would mean that α is also fixed by w0 , which is
impossible.
• We now conclude in the same fashion as in the proof of Lemma 4.21 in [Smi], passing
±
±
from the two Lie algebras p±
X0 first to the identity components PX0 ,e of PX0 , then
to the whole groups PX±0 , then (using Proposition 6.4) to the stabilizers of A≥
0 and
≤
of A0 .
Proof of Proposition 7.10. The Proposition follows immediately by taking f = φgφ−1 .
≤
Indeed, by Proposition 7.2, the “canonized” map φgφ−1 stabilizes A≥
0 and A0 .
See Example 4.22 in [Smi] for specific examples of quasi-translations (in the nonswinging case).
We would like to treat quasi-translations a bit like translations; for this, we need to
have at least a nontrivial space V0t . So from now on, we impose the following condition
on ρ:
Assumption 7.12. The representation ρ is such that
dim V0t > 0.
This is precisely condition (i)(a) from the Main Theorem.
7.3 Canonical identifications and the Margulis invariant
The main goal of this subsection is to associate to every ρ-regular map g ∈ G ⋉ V a
vector in V0t , called its “Margulis invariant” (see Definition 7.19). The two Propositions
and the Lemma that lead up to this definition are important as well, and will be often
used subsequently.
Proposition 7.6 (iv) has shown us that the “geometry” of a ρ-regular map g (namely
the position of its ideal dynamical spaces) is entirely determined by the pair of spaces
≤
(A&g , A.g ) = φ(A≥
0 , A0 ).
In fact, such pairs of spaces play a crucial role. Let us begin with a definition; its
connection with the observation we just made will become clear after Proposition 7.14.
Definition 7.13.
• We define a parabolic space to be any subspace of V that is the image of either V0≥
or V0≤ (no matter which one, since X0 is symmetric) by some element of G.
57
• We define an affine parabolic space to be any subspace of A that is the image of A≥
0
by some element of G ⋉ V . Equivalently, a subspace A& ⊂ A is an affine parabolic
space iff it is not contained in V and its linear part V & = A& ∩ V is a parabolic
space.
• We say that two parabolic spaces (or two affine parabolic spaces) are transverse if
their intersection has the lowest possible dimension, or equivalently if their sum is
the whole space V (or A).
See Example 4.25 in [Smi].
Proposition 7.14. A pair of parabolic spaces (resp. of affine parabolic spaces) is trans≤
verse if and only if it may be sent to (V0≥ , V0≤ ) (resp. to (A≥
0 , A0 )) by some element of G
(resp. of G ⋉ V ).
&
In particular, for any ρ-regular map g ∈ G ⋉ V , the pair (Ag , A.g ) is by definition a
transverse pair of affine parabolic spaces.
This Proposition, as well as its proof, is very similar to Claim 2.8 in [Smi16] and to
Proposition 4.26 in [Smi].
Proof. Let us prove the linear version; the affine version follows immediately. Let (V1 , V2 )
be any pair of parabolic spaces. By definition, for i = 1, 2, we may write Vi = φi (V0≥ ) for
some φi ∈ G. Let us apply the Bruhat decomposition to the map φ−1
1 φ2 : we may write
φ−1
1 φ2 = p1 wp2 ,
(7.5)
where p1 , p2 belong to the minimal parabolic subgroup P + , and w is an element of the
restricted Weyl group W (or, technically, some representative thereof). Let φ := φ1 p1 =
−1
+ stabilizes V ≥ , we have
φ2 p−1
2 w ; since P
0
V1 = φ(V0≥ ) and V2 = φ(wV0≥ ).
(7.6)
Thus we have
V1 and V2 are transverse ⇐⇒ wV0≥ is transverse to V0≥
≥
⇐⇒ Ω≥
X0 ∪ wΩX0 = Ω
≥
⇐⇒ wΩ<
X0 ⊂ Ω X0
≥
⇐⇒ ww0 Ω>
X0 ⊂ Ω X0 .
(7.7)
By Lemma 6.5, this implies that ww0 stabilizes Ω>
X0 . Hence it stabilizes its comple≥
≤
ment Ω≤
,
which
means
that
wV
=
V
.
Thus
we
have
V1 = φ(V0≥ ) and V2 = φ(V0≤ ) as
0
0
X0
required.
Conversely, if those equalities hold, then V1 and V2 are obviously transverse.
Remark 7.15.
58
• It follows from Proposition 6.4 that the set of all parabolic spaces can be identified
with the flag variety G/PX+0 , by identifying every parabolic space φ(V0≥ ) with the
coset φPX+0 . For every X0 -regular element g ∈ G, this identification then matches
the ideally expanding space Vg≫ with the attracting flag ygX0 ,+ .
• Composing with the bijection ιX defined in Proposition 4.14, we may also identify
this set with the opposite flag variety G/PX−0 . For X0 -regular g ∈ G, this matches
the ideally contracting space Vg≪ with the repelling flag ygX0 ,− .
• Using the Bruhat decomposition of PX0 (see Corollary 2.24), we may then show
that two parabolic spaces V1 = φ1 (V0≥ ) and V2 = φ2 (V0≥ ) = φ2 ◦ w0 (V0≤ ) are
transverse if and only if the corresponding pair of cosets
(φ1 PX+0 , φ2 w0 PX−0 )
is transverse in the sense of Definition 4.5.
• Similarly, it follows from (7.1) that we can in principle identify the set of all affine
parabolic spaces with the “affine flag variety” G⋉ V /PX+0 ⋉ V0≥ . This would however
require very cumbersome notations.
In the linear case, it was natural to do it in order to make things representationindependent. In the affine case however, there is a “privileged” representation
anyway (namely ρ). We decided that translating everything into that “abstract”
language was not worth the trouble, but the reader may go through that exercise
if they wish so.
Consider a transverse pair of affine parabolic spaces. Their intersection may be seen
as a sort of “abstract affine neutral space”. We now introduce a family of “canonical
identifications” between those spaces. These identifications have however an inherent
ambiguity: they are only defined up to quasi-translation.
Proposition 7.16. Let (A1 , A2 ) be a pair of transverse affine parabolic spaces. Then any
≤
map φ ∈ G ⋉ V such that φ(A1 , A2 ) = (A≥
0 , A0 ) gives, by restriction, an identification of
=
the intersection A1 ∩ A2 with A0 , which is unique up to quasi-translation.
Here by φ(A1 , A2 ) we mean the pair (φ(A1 ), φ(A2 )). This generalizes Corollary 2.14
in [Smi16] and Proposition 4.28 in [Smi].
Remark 7.17. Note that if A1 ∩ A2 is obtained in another way as an intersection of
two affine parabolic spaces, the identification with A=
0 will, in general, no longer be the
same, not even up to quasi-translation: there could also be an element of the Weyl group
involved.
Proof. The existence of such a map φ follows from Proposition 7.14. Now let φ and φ′
be two such maps, and let f be the map such that
φ′ = f ◦ φ
59
(7.8)
≤
(i.e. f := φ′ ◦ φ−1 ). Then by construction f stabilizes both A≥
0 and A0 . It follows from
Lemma 7.11 that the restriction of f to A=
0 is a quasi-translation.
Let us now explain why we call these identifications “canonical”. The following lemma,
while seemingly technical, is actually crucial: it tells us that the identifications defined in
Proposition 7.16 commute (up to quasi-translation) with the projections that naturally
arise if we change one of the parabolic subspaces in the pair while fixing the other.
Lemma 7.18. Take any affine parabolic space A1 .
Let A2 and A′2 be any two affine parabolic spaces both transverse to A1 .
Let φ (resp. φ′ ) be an element of G ⋉ V that sends the pair (A1 , A2 ) (resp. (A1 , A′2 ))
≤
to (A≥
0 , A0 ); these two maps exist by Proposition 7.14.
Let W1 be inverse image of V0> by any map φ such that A1 = φ−1 (A≥
0 ) (this image is
unique by Proposition 6.4).
Let
ψ : A1 −−−−→ A1 ∩ A′2
be the projection parallel to W1 .
Then the map ψ defined by the commutative diagram
A=
0
ψ
φ′
φ
A1 ∩ A2
A=
0
ψ
A1 ∩ A′2
is a quasi-translation.
The space W1 is, in a sense, the “abstract linear expanding space” corresponding to the
“abstract affine noncontracting space” A1 : more precisely, for any ρ-regular map g ∈ G⋉V
&
such that Ag = A1 , we have Vg≫ = W1 .
≥
≤
>
>
=
The projection ψ is well-defined because A≥
0 = V0 ⊕ A0 = V0 ⊕ (A0 ∩ A0 ), and so
≥
A1 = φ′−1 (A0 ) = W1 ⊕ (A1 ∩ A′2 ).
This statement generalizes Lemma 2.18 in [Smi16] and Lemma 4.29 in [Smi].
Proof. The proof is exactly the same as the proof of Lemma 4.29 in [Smi].
Now let g be a ρ-regular map. We already know that it acts on its affine ideally neutral
space by quasi-translation; now the canonical identifications we have just introduced
allow us to compare the actions of different elements on their respective affine ideally
neutral spaces, as if they were both acting on the same space A=
0 . However there is
a catch: since the identifications are only canonical up to quasi-translation, we lose
information about what happens in V0a ; only the translation part along V0t remains.
Formally, we make the following definition. Let πt denote the projection from V0=
onto V0t parallel to V0a .
60
Definition 7.19. Let g ∈ G ⋉ V be a ρ-regular map. Take any point x in the affine
space A≈
g ∩ VAff and any map φ ∈ G that canonizes ℓ(g). Then we define the Margulis
invariant of g to be the vector
M (g) := πt (φ(g(x) − x)) ∈ V0t .
We call it the Margulis invariant of g.
This vector does not depend on the choice of x or φ: indeed, composing φ with a
quasi-translation does not change the V0t -component of the image. See Proposition 2.16
in [Smi16] for a detailed proof of this claim (for V = g).
Informally, the Margulis invariant gives the “translation part” of the asymptotic dynamics of an R-regular element g ∈ G ⋉ V (the “linear part” being given by Jd(g), just
as in the linear case). As such, it plays a central role in this paper.
7.4 Quantitative properties
In this subsection, we define and study the affine versions of non-degeneracy and contraction strength. We more or less follow the second half of Subsection 5.1 in [Smi], or
of Subsection 2.6 in [Smi16].
We endow the extended affine space A with a Euclidean norm (written simply k • k)
given by
∀(x, t) ∈ V ⊕ R0 = A,
k(x, t)k2 := B(x, x) + |t|2 ,
where B is the norm defined in Lemma 2.4. Then the subspaces V0> , V0< , V0≎ , V0a ∩ V 0 ,
V0t and R0 are pairwise orthogonal.
Definition 7.20 (Affine version of non-degeneracy). Take a pair of affine parabolic
spaces (A1 , A2 ). An optimal canonizing map for this pair is a map φ ∈ G ⋉ V satisfying
≤
φ(A1 , A2 ) = (A≥
0 , A0 )
and minimizing the quantity max kφk, kφ−1 k . By Proposition 7.14 and a compactness
argument, such a map exists iff A1 and A2 are transverse.
We define an optimal canonizing map for a ρ-regular map g ∈ G ⋉ V to be an optimal
canonizing map for the pair (A&g , A.g ).
Let C ≥ 1. We say that a pair of affine parabolic spaces (A1 , A2 ) (resp. a ρ-regular
map g) is C-non-degenerate if it has a canonizing map φ such that
kφk ≤ C
and
φ−1 ≤ C.
Now take g1 , g2 two ρ-regular maps in G ⋉ V . We say that the pair (g1 , g2 ) is C-non&
.
degenerate if every one of the four possible pairs (Agi , Agj ) is C-non-degenerate.
The point of this definition is that there are a lot of calculations in which, when we
treat a C-non-degenerate pair of spaces as if they were perpendicular, we err by no more
than a (multiplicative) constant depending on C.
61
Remark 7.21. The set of transverse pairs of extended affine spaces is characterized by two
open conditions: there is of course transversality of the spaces, but also the requirement
that each space not be contained in V . What we mean here by “degeneracy” is failure of
one of these two conditions. Thus the property of a pair (A1 , A2 ) being C-non-degenerate
actually encompasses two properties.
First, it implies that the spaces A1 and A2 are transverse in a quantitative way. More
precisely, this means that some continuous function that would vanish if the spaces were
not transversely is bounded below. An example of such a function is the smallest non
identically vanishing of the “principal angles” defined in the proof of Lemma 8.2 (iv).
Second, it implies that both A1 and A2 are “not too close” to the space V (in the same
sense). In purely affine terms, this means that the affine spaces A1 ∩ VAff and A2 ∩ VAff
contain points that are not too far from the origin.
Both conditions are necessary, and appeared in the previous literature (such as [Mar87]
and [AMS02]). However, they were initially treated separately. The idea of encompassing
both in the same concept of “C-non-degeneracy” seems to have been first introduced in
the author’s previous paper [Smi16].
Definition 7.22 (Affine version of contraction strength). Let s > 0. For a ρ-regular
map g ∈ G ⋉ V , we say that g is s-contracting along X0 if we have:
∀(x, y) ∈ Vg≪ × A&g ,
kg(y)k
kg(x)k
≤s
.
kxk
kyk
(7.9)
&
(Note that by definition the spaces Vg≪ and Ag always have the same dimensions as V0<
and A≥
0 respectively, hence they are nonzero.)
We define the affine contraction strength along X0 of g to be the smallest number
sX0 (g) such that g is sX0 (g)-contracting along X0 . In other words, we have
sX0 (g) = g|Vg≪
g−1
&
Ag
.
(7.10)
This notion is closely related to the notion of asymptotic contraction:
Proposition 7.23.
(i) If a map g ∈ G ⋉ V is ρ-regular and 1-contracting along X0 (i.e. such that
sX0 (g) < 1), then it is also asymptotically contracting along X0 .
(ii) If a map g ∈ G ⋉ V is ρ-regular and asymptotically contracting along X0 , then we
have
lim sX0 (gN ) = 0.
N →∞
Proof. Let g ∈ G ⋉ V be ρ-regular. We claim that it is asymptotically contracting
along X0 if and only if it satisfies the inequality
−1
(7.11)
r g|Vg≪ r g A& < 1
g
62
(where r(f ) denotes the spectral radius of f ). Indeed, as a porism of Proposition 2.6 (i),
we obtain that the spectrum of g|Vg≪ is
n
o
eλ(Jd(g)) λ ∈ Ω<
X0 ,
and the spectrum of g|A& is
g
n
o
eλ(Jd(g)) λ ∈ Ω≥
X0 ∪ {1}
(the “1” accounts for the affine extension). By Assumption 5.5, the eigenvalue 1 is already
contained in the spectrum of the linear part, so we may actually ignore the “∪{1}” part.
The claim follows.
The conclusion then follows from the well-known facts that for every linear map f , we
have
r(f ) ≤ kf k
(7.12)
(this gives (i)), and
log kf N k = N log r(f ) + O (log N )
(7.13)
N →∞
(also known as Gelfand’s formula; this gives (ii)).
7.5 Comparison of affine and linear properties
The goal of this subsection is to prove Proposition 7.26, that, for any ρ-regular element g ∈ G ⋉ V , relates the quantitative properties we just introduced to the corresponding properties of its linear part ℓ(g).
This is given by Lemma 2.25 in [Smi16] in the case of the adjoint representation, and
by Lemma 5.8 in [Smi] (which is a straightforward generalization) in the non-swinging
case. In the general case however, only points (i) and (ii) generalize in the obvious way.
The statement (iii) holds only in a weaker form: we now need to consider the linear
contraction strength of ℓ(g), but the affine contraction strength of g. This is basically
what forced us to develop the “purely linear theory” (section 4) in a systematic way,
rather than presenting it as a particular case of the “affine theory” as we did in the
previous papers.
In order to be able to compare the affine contraction strength with the linear one,
we begin by expressing the former in terms of the Cartan projection. The following is
a generalization of Lemma 6.5 in [Smi], formulated in a slightly more general way (the
original statement was essentially the same inequality without the absolute value.)
Proposition 7.24. For every C ≥ 1, there is a constant ε7.24 (C) with the following
property. Let g ∈ G be a C-non-degenerate ρ-regular map. Then we have
λ(Ct(g))
− log sX0 (g) − min λ(Ct(g)) − max
<
λ∈Ω≥
X
λ∈ΩX
0
≤ ε7.24 (C).
0
(Recall that ΩX0 is the set of restricted weights that take nonnegative values on X0 ,
and Ω<
X0 is its complement in Ω.)
≥
63
To make sense of this estimate, keep in mind that the quantity − log sX0 (g) is typically
positive. Also note that the “minimum” term is certainly nonpositive, as 0 ∈ Ω≥
X0 .
Proof. First of all let φ be an optimal canonizing map for g, and let g′ = φgφ−1 . Then
it is easy to see that we have
sX0 (g′ ) ≍C sX0 (g),
(7.14)
and the difference Ct(g′ ) − Ct(g) is bounded by a constant that depends only on C.
Hence we lose no generality in replacing g by g ′ . Clearly, it is enough to show that for g ′ ,
which is in canonical form, we have the equality:
min λ(Ct(g′ )) − max
λ(Ct(g′ )) = − log sX0 (g′ ).
<
λ∈Ω≥
X
0
λ∈ΩX
(7.15)
0
This is the straightforward generalization of (6.2) in [Smi], and is proved in exactly
the same fashion, mutatis mutandis.
As a stepping stone, we first need the “naïve” extension of point (ii) of Lemma 2.25
in [Smi16] or Lemma 5.8 in [Smi], giving a bound on the affine contraction strength of
the linear part of g (seen as an element of G ⋉ V by the usual embedding).
Lemma 7.25. For any ρ-regular map g ∈ G ⋉ V , we have sX0 (ℓ(g)) ≤ sX0 (g).
The proof is very similar to the one given in [Smi16].
Proof. We have
ℓ(g)−1
max g −1
max g −1
sX0 (ℓ(g)) = ℓ(g)|V ≪
ℓ(g)
= g|Vg≪
≤ g|Vg≪
= sX0 (g).
&
Aℓ(g)
&
Vg
&
Ag
,1
,1
To justify the last equality, note that if φ is a canonizing map for g, then the space
&
−1
0
Ag = φ−1 (A≥
0 ) contains the subspace φ (V ), which is nonzero by Assumption 5.5, is
−1
clearly g-invariant, and all eigenvalues of g restricted to that subspace have modulus 1;
hence g−1 A& ≥ g−1 φ−1 (V 0 ) ≥ 1.
g
We may now state and prove the appropriate generalization of Lemma 2.25 in [Smi16]
and Lemma 5.8 in [Smi], linking in all three points the purely linear properties with the
affine properties.
Proposition 7.26. For every C ≥ 1, there is a positive constant s7.26 (C) with the
following property. Let (g, h) be a C-non-degenerate pair of ρ-regular elements of G ⋉ V .
In this case:
64
(i) the pair (ℓ(g), ℓ(h)) is C ′ -non-degenerate (in the sense of Definition 4.10), for some
constant C ′ that depends only on C;
(ii) we have
~sX0 (ℓ(g)) .C sX0 (g);
(iii) moreover, if we assume that sX0 (g−1 ) ≤ s7.26 (C), then we actually have
~sX0 (ℓ(g)) g−1
.C sX0 (g).
A≈
g
Proof.
(i) By Remark 4.11, we lose no generality in specifying some particular form for the
map ν introduced in Definition 4.9. Let us define ν in a way which is consistent
with the definition of C-non-degeneracy in the affine case, namely using a particular
case of the formula (4.1):
ν(φ) := max(kρ(φ)k, kρ(φ)−1 k),
(7.16)
where ρ is our working representation, and k•k is the Euclidean norm we introduced
in the beginning of section 7.4 (or more precisely its restriction to V , which is just
the Euclidean norm introduced in Lemma 2.4). Clearly if φ is a canonizing map
for g, then ℓ(φ) is a canonizing map for ℓ(g). Since obviously for any φ ∈ G, we
have kℓ(φ)k ≤ kφk, the conclusion follows.
(ii) First note that by Lemma 7.25, we have
sX0 (ℓ(g)) ≤ sX0 (g).
(7.17)
Now apply Proposition 7.24: passing to the exponential, we have
!
sX0 (ℓ(g)) ≍C exp
max λ(Ct(ℓ(g))) exp − min λ(Ct(ℓ(g))) .
λ∈Ω<
X
λ∈Ω≥
X
0
0
(7.18)
<
Now the key point is Lemma 6.18 (i): for every i ∈ Π \ ΠX0 , we may find λ<
i ∈ Ω X0
≥
and λ≥
i ∈ ΩX0 whose difference is αi . It immediately follows that
exp
!
max λ(Ct(ℓ(g))) exp − min λ(Ct(ℓ(g))) ≥ ~sX0 (ℓ(g)).
λ∈Ω<
X
0
λ∈Ω≥
X
0
(7.19)
(iii) We proceed in two steps: we establish first (7.21) (which is straightforward), then
(7.26) (which relies on the strong version (ii) of Lemma 6.18 — in fact, this is the
only place where the strong version is needed).
65
• We have, by definition:
g−1
sX0 (g) = g|Vg≪
&
Ag
.
Let φ be an optimal canonizing map for g. Since g is C-non-degenerate (and
>
≫
=
the images φ(A≈
g ) and φ(Vg ), being respectively equal to A0 and V0 , are
orthogonal), it follows that
sX0 (g) ≍C g|Vg≪ max g−1 A≈ , g−1 V ≫ .
g
g
Clearly we have
g−1
sX0 (g−1 ) ≤ 1, we have
A≈
g
g−1
≥
g−1
φ−1 (V 0 )
= 1. On the other hand, since
≤ 1. It follows that
Vg≫
sX0 (g) ≍C
g−1
g|Vg≪
A≈
g
(7.20)
.
By methods similar to the proof of Proposition 7.24 (essentially by Proposition 2.6), we may rewrite this as
!
sX0 (g) ≍C exp
λ(Ct(ℓ(g)))
max
<
λ∈ΩX
g−1
A≈
g
.
(7.21)
0
• Note that, combining Proposition 7.24 with Lemma 7.25, we have
!
exp max λ(Ct(ℓ(g))) exp − min λ(Ct(ℓ(g))) .C sX0 (ℓ(g)−1 )
λ∈Ω≤
X
λ∈Ω>
X
0
0
≤ sX0 (g−1 ).
(7.22)
If we take s7.26 (C) equal to the inverse of the implicit constant in that inequality, we may assume that
>
>
∀λ≤ ∈ Ω≤
X0 , ∀λ ∈ ΩX0 ,
λ≤ (Ct(ℓ(g))) ≤ λ> (Ct(ℓ(g)));
(7.23)
in particular, since 0 ∈ Ω≤
X0 , we then have
∀λ ∈ Ω>
X0 ,
λ(Ct(ℓ(g))) ≥ 0.
(7.24)
Obviously this remains true for λ ∈ Ω>
X0 ∪ {0}. Now take some i ∈ Π \ ΠX0 ;
then we have
≥
−αi (Ct(ℓ(g)) = λ<
i (Ct(ℓ(g))) − λi (Ct(ℓ(g)))
≤ λ<
i (Ct(ℓ(g))),
66
(7.25)
>
<
<
where λ≥
i ∈ ΩX0 ∪ {0} and λi ∈ ΩX0 are the restricted weights introduced in
Lemma 6.18 (ii). This implies that
!
~sX0 (ℓ(g)) := exp
≤ exp
max
α∈Π\ΠX0
−α(Ct(ℓ(g)))
!
max λ(Ct(ℓ(g))) .
λ∈Ω<
X
0
(7.26)
Combining the two estimates, the conclusion follows.
8 Products of ρ-regular maps
The goal of this section is to prove Proposition 8.4, which is the “main part” of the affine
version of Schema 1.5. The general strategy is the same as in Section 7 in [Smi] or in
Section 3.2 in [Smi16]: we reduce the problem to Proposition 3.5, by considering the
action of G ⋉ V on a suitable exterior power Λp A (rather than on the spaces Vi as in
Section 4.3).
We start by proving the following result, whose role in [Smi] was played by Proposition 6.14. Even though the new version involves slightly different inequalities, the proof
is quite similar.
Proposition 8.1. For every C ≥ 1, there is a positive constant s8.1 (C) ≤ 1 with the
following property. Take any C-non-degenerate pair (g, h) of ρ-regular maps in G ⋉ V
such that sX0 (g) ≤ s8.1 (C) and sX0 (h) ≤ s8.1 (C). Then gh is asymptotically contracting
along X0 .
Proof. Let C ≥ 1, and let (g, h) be a C-non-degenerate pair of ρ-regular maps in G ⋉ V ,
such that
sX0 (g) ≤ s8.1 (C) and sX0 (h) ≤ s8.1 (C)
for some constant s8.1 (C) to be specified later.
The first thing to note is that since the property of being ρ-regular depends only on
the linear part, Lemma 7.25 and Proposition 7.26 (i) reduce the problem to the case
where g, h ∈ G.
Now Proposition 7.24 gives us
max λ(Ct(g)) − min λ(Ct(g)) ≤ log sX0 (g) + ε7.24 (C).
λ∈Ω<
X
λ∈Ω≥
X
0
(8.1)
0
Taking s8.1 (C) small enough, we may assume that
≥
≥
<
<
∀λ ∈ ΩX0 , ∀λ ∈ ΩX0 ,
(λ − λ )(Ct(g)) > max kλk ε4.25 (C).
≥
<
λ∈Ω
67
(8.2)
Of course a similar estimate holds for h:
≥
≥
<
<
∀λ ∈ ΩX0 , ∀λ ∈ ΩX0 ,
≥
<
(λ − λ )(Ct(h)) >
max kλk ε4.25 (C).
λ∈Ω
(8.3)
Let Ct′ (g, h) be the vector defined in Corollary 4.25. Then we deduce from (4.22) that
<
<
for every pair of restricted weights λ≥ ∈ Ω≥
X0 and λ ∈ ΩX0 , we have:
|(λ≥ − λ< )(Ct′ (g, h) − Ct(g) − Ct(h))| ≤ kλ≥ − λ< kk Ct′ (g, h) − Ct(g) − Ct(h)k
≤ 2 max kλk ε4.25 (C).
(8.4)
λ∈Ω
Adding together the three estimates (8.2), (8.3) and (8.4), we find that for every such
pair, we have
(λ≥ − λ< )(Ct′ (g, h)) > 0.
(8.5)
On the other hand, we have (4.21) which says that
Jd(gh) ∈ Conv(WX0 · Ct′ (g, h)).
Now take any w ∈ WX0 . From Proposition 6.4, it then follows that w−1 stabilizes
<
both Ω≥
X0 and ΩX0 ; hence we still have
(λ≥ − λ< )(w(Ct′ (g, h)) = (w−1 (λ≥ ) − w−1 (λ< ))(Ct′ (g, h))
(8.6)
> 0.
Thus the difference λ≥ −λ< takes positive values on every point of the orbit WX0 ·Ct′ (g, h);
hence it also takes positive values on every point of its convex hull. In particular, we
have
(λ≥ − λ< )(Jd(gh)) > 0.
(8.7)
We conclude that gh is indeed asymptotically contracting along X0 .
We now establish the correspondence between affine and proximal properties. We
introduce the integers:
≥
p := dim A≥
0 = dim V0 + 1;
q := dim V0< ;
(8.8)
d := dim A = dim V + 1 = q + p.
For every g ∈ G ⋉ V , we may define its exterior power Λp g : Λp A → Λp A. The Euclidean
structure of A induces in a canonical way a Euclidean structure on Λp A.
Lemma 8.2.
(i) Let g ∈ G ⋉ V be a map asymptotically contracting along X0 . Then Λp g is prox&
imal, and the attracting (resp. repelling) space of Λp g depends on nothing but Ag
≪
(resp. Vg ):
(
&
EΛs p g = Λp Ag
EΛup g = x ∈ Λp A x ∧ Λq Vg≪ = 0 .
68
(ii) For every C ≥ 1, whenever (g1 , g2 ) is a C-non-degenerate pair of ρ-regular maps
that are also asymptotically contracting along X0 , (Λp g1 , Λp g2 ) is a C p -non-degenerate
pair of proximal maps.
(iii) For every C ≥ 1, there is a constant s8.2 (C) < 1 with the following property.
For every C-non-degenerate ρ-regular map g ∈ G ⋉ V that is also asymptotically
contracting along X0 , we have
sX0 (g) .C s̃(Λp g).
(8.9)
If in addition sX0 (g) ≤ s8.2 (C), we have
sX0 (g) ≍C s̃(Λp g).
(8.10)
(Recall that s̃ and sX0 stand respectively for the proximal and affine contraction
strengths: see Definitions 7.22 and 3.4.)
(iv) For any two p-dimensional subspaces A1 and A2 of A, we have
αHaus (A1 , A2 ) ≍ α (Λp A1 , Λp A2 ) .
This is similar to Lemma 3.8 in [Smi16] and to Lemma 7.2 in [Smi]; but now, there is the
additional complication of needing to distinguish between ρ-regularity and asymptotic
contraction.
The proofs of points (ii) and (iii) however still remain very similar to the corresponding
proofs in [Smi16]. We chose to reproduce them here, in particular in order to correct a
small mistake: in [Smi16] we erroneously claimed that we could take s8.2 (C) = 1, which
stemmed from a confusion between g and its canonized version g ′ .
Proof.
(i) Let g ∈ G⋉V be a map asymptotically contracting along X0 . From Proposition 2.6
(as already noted in the proof of Proposition 7.23), it follows that
−1
r g|Vg≫ < r g−1 A&
,
(8.11)
g
i.e. every eigenvalue of g|Vg≫ is smaller in modulus than every eigenvalue of g|A& .
g
Let λ1 , . . . , λd be the eigenvalues of g (acting on A), counted with multiplicity and
ordered by nondecreasing modulus; we then have
−1
|λq | = r g|Vg≫ < r g−1 &
= |λq+1 |.
(8.12)
Ag
On the other hand, we know that the eigenvalues of Λp g counted with multiplicity
are exactly the products of the form λi1 · · · λip , where 1 ≤ i1 < · · · < ip ≤ d. As
the two largest of them (by modulus) are λq+1 · · · λd and λq λq+2 · · · λd , it follows
that Λp g is proximal.
As for the expression of E s and E u , it follows immediately by considering a basis
that trigonalizes g.
69
(ii) Take any pair (i, j) ∈ {1, 2}2 . Let φ be an optimal canonizing map for the pair
&
&
<
≪
(Agi , A.gj ). Then we have φ(Agi ) = A≥
0 and (by Proposition 7.6) φ(Vgj ) = V0 . In
≥
<
the Euclidean structure we have chosen, A0 is orthogonal to V0 ; hence Λp A≥
0 is
orthogonal to the hyperplane {x ∈ Λp A | x ∧ Λq V0< = 0}. By the previous point, it
follows that Λp φ is a canonizing map for the pair (EΛs p gi , EΛup gj ). As kΛp φk ≤ kφkp
and similarly for φ−1 , the conclusion follows.
(iii) Let C ≥ 1, and let g ∈ G ⋉ V be a C-non-degenerate ρ-regular map that is also
asymptotically contracting along X0 . Let φ be an optimal canonizing map for g,
and let g′ = φgφ−1 . Then it is clear that sX0 (g′ ) ≍C sX0 (g) and s̃(Λp g′ ) ≍C s̃(Λp g);
so it is sufficient to prove the statement for g ′ .
Let s1 ≤ . . . ≤ sp (resp. s′1 ≤ . . . ≤ s′q ) be the singular values of g′ restricted
&
<
≪
to Ag′ = A≥
0 (resp. to Vg = V0 ), so that
g′−1
A≥
0
= s−1
1 and
g ′ |V <
0
= s′q .
<
′
Since the spaces A≥
0 and V0 are stable by g and orthogonal, we get that the
singular values of g′ on the whole space A are
s′1 , . . . , s′q , s1 , . . . , sp
(note however that unless sX0 (g′ ) ≤ 1, this list may fail to be sorted in nondecreasing order.) On the other hand, we know that the singular values of Λp g′ are
products of p distinct singular values of g′ . Since EΛs p g′ is orthogonal to EΛup g′ , we
may once again analyze the singular values separately for each subspace. We know
that the singular value corresponding to E s is equal to s1 · · · sp ; we deduce that
k Λp g|E u k is equal to the maximum of the remaining singular values. In particular
it is larger than or equal to s′q · s2 · · · sp . On the other hand, if λ is the largest
eigenvalue of Λp g′ , then we have
|λ| = |λq+1 · · · λd | = det( g′
A≥
0
) = s1 · · · sp
(where λ1 , . . . , λd are the eigenvalues of g′ or equivalently of g, sorted by nondecreasing modulus). The second equality holds because g, hence g′ , is asymptotically
contracting along X0 , so that its eigenvalues are sorted in the “correct” order. It
follows that:
p ′
s̃(Λ g ) =
Λp g′ |E up
Λ g′
|λ|
s′q · s2 · · · sp
′
≥
= s′q s−1
1 = sX0 (g ),
s1 · · · sp
(8.13)
which is the first estimate we were looking for.
Now if we take s8.2 (C) small enough, we may suppose that sX0 (g′ ) ≤ 1. Then we
have s′q ≤ s1 , which means that the singular values of Λp g′ are indeed sorted in the
“correct” order. Hence s′q · s2 · · · sp is actually the largest singular value of Λp g′ |E u ,
and the inequality becomes an equality: s̃(Λp g′ ) = sX0 (g′ ). The second estimate
follows.
70
(iv) See Lemma 3.8 (iv) in [Smi16].
We also need the following technical lemma, which generalizes Lemma 3.9 in [Smi16]
and Lemma 7.3 in [Smi]:
Lemma 8.3. There is a constant ε > 0 with the following property. Let A1 , A2 be any
two affine parabolic spaces such that
(
αHaus (A1 , A≥
0) ≤ ε
≤
Haus
α
(A2 , A0 ) ≤ ε.
Then they form a 2-non-degenerate pair.
(Of course the constant 2 is arbitrary; we could replace it by any number larger than 1.)
Proof. The proof is exactly the same as the proof of Lemma 3.9 in [Smi16], mutatis
mutandis.
Proposition 8.4. For every C ≥ 1, there is a positive constant s8.4 (C) < 1 with the
following property. Take any C-non-degenerate pair (g, h) of ρ-regular maps in G ⋉ V ;
suppose that we have sX0 (g±1 ) ≤ s8.4 (C) and sX0 (h±1 ) ≤ s8.4 (C). Then gh is still
ρ-regular, 2C-non-degenerate, and we have:
&
&
αHaus Vgh
, Vg .C ~sX0 (ℓ(g))
;
(i)
αHaus V . , V . . ~s (ℓ(h))
C X0
gh
h
αHaus A&gh , A&g .C sX0 (g)
(ii)
αHaus A. , A. . s (h−1 )
C X0
gh
h
;
(iii) sX0 (gh) .C sX0 (g)sX0 (h).
Points (ii) and (iii) are a generalization of Proposition 3.6 in [Smi16] and Proposition 7.4 in [Smi]; the proof is very similar. Together they give the “main part” of the
affine version of Schema 1.5.
As for point (i), it generalizes Corollary 3.7 in [Smi16] and Corollary 7.5 in [Smi]. But
its statement is now stronger, as it involves the linear contraction strength. As such, it
can no longer be obtained as a corollary of the affine version; instead it must be proved
independently, using Proposition 4.22.
Remark 8.5. Note that point (ii) involves h−1 , but in point (i) we have simply written h
instead. In fact in the linear case, the distinction between h and h−1 becomes irrelevant,
as they both have the same linear contraction strength by Proposition 4.14 (iv). However
their affine contraction strengths can be different.
71
Proof of Proposition 8.4. Let us fix some constant s8.4 (C), small enough to satisfy all
the constraints that will appear in the course of the proof. Let (g, h) be a pair of maps
satisfying the hypotheses.
First of all note that if we assume that s8.4 (C) ≤ 1, then Proposition 7.23 (i) ensures
that g, h, g −1 and h−1 are all asymptotically contracting along X0 .
• Let us prove (i). By Proposition 6.16 (i), it follows that g and h, hence ℓ(g)
and ℓ(h), are X0 -regular. Proposition 7.26 (i) and (ii) then implies that the pair
(ℓ(g), ℓ(h)) satisfies the hypotheses of Proposition 4.22. Hence we have
X0 ,+
X0 ,+
δ yℓ(gh)
.C ~sX0 (ℓ(g));
, yℓ(g)
(8.14)
δ y X0 ,− , y X0 ,− . ~s (ℓ(h)).
C
X
0
ℓ(gh)
ℓ(h)
Now remember (Remark 7.15) that the attracting (resp. repelling) flag of a map g ∈
G carries the same information as its (linear) ideally expanding (resp. contracting)
space. Even more precisely, we may deduce from Proposition 6.4 that the orbital
map from G to the orbit of V0≥ in the (p−1)-dimensional Grassmanian of V descends
to a smooth embedding of the flag variety G/PX+0 . Since the flag variety is compact,
the embedding is in particular Lipschitz-continuous. The desired inequalities follow.
• If we take s8.4 (C) ≤ s8.1 (C), then Proposition 8.1 tells us that gh is asymptotically contracting along X0 . We may also apply Proposition 8.1 to the pair
(h−1 , g−1 ); hence (gh)−1 is also asymptotically contracting along X0 , and by Proposition 6.16 (ii), we deduce that gh is ρ-regular.
The remainder of the proof works exactly like the proof of Proposition 3.6 in [Smi16]
or of Proposition 7.4 in [Smi], namely by applying Proposition 3.5 to the maps
γ1 = Λp g and γ2 = Λp h. Let us check that γ1 and γ2 satisfy the required hypotheses:
– By Lemma 8.2 (i), γ1 and γ2 are proximal.
– By Lemma 8.2 (ii), the pair (γ1 , γ2 ) is C p -non-degenerate.
– If we choose s8.4 (C) ≤ s8.2 (C), it follows by Lemma 8.2 (iii) that s̃(γ1 ) .C
sX0 (g) and s̃(γ2 ) .C sX0 (h). If we choose s8.4 (C) sufficiently small, then γ1
and γ2 are s̃3.5 (C p )-contracting, i.e. sufficiently contracting to apply Proposition 3.5.
Thus we may apply Proposition 3.5. It remains to deduce from its conclusions the
conclusions of Proposition 8.4.
– From Proposition 3.5 (i), using Lemma 8.2 (i), (iii) and (iv), we get
&
αHaus Agh , A&g .C sX0 (g),
which shows the first line of Proposition 8.4 (ii).
– By applying Proposition 3.5 to γ2−1 γ1−1 instead of γ1 γ2 , we get in the same
way the second line of Proposition 8.4 (ii).
72
&
– Let φ be an optimal canonizing map for the pair (Ag , A.h ). By hypothesis, we
have φ±1 ≤ C. But if we take s8.4 (C) sufficiently small, the two inequalities
that we have just shown, together with Lemma 8.3, allow us to find a map φ′
with kφ′ k ≤ 2, kφ′ −1 k ≤ 2 and
≤
φ′ ◦ φ(A&gh , A.gh ) = (A≥
0 , A0 ).
It follows that the composition map gh is 2C-non-degenerate.
– The last inequality, namely Proposition 8.4 (iii), now is deduced from Proposition 3.5 (ii) by using Lemma 8.2 (iii).
9 Additivity of Margulis invariant
The goal of this section is to prove Propositions 9.1 and 9.3, which explain how the Margulis invariant behaves under group operations (respectively inverse and composition).
These two propositions are the key ingredients in the proof of the Main Theorem.
Proposition 9.1 is a generalization of Proposition 4.1 (i) in [Smi16]. The proof is
similar, and fairly straightforward. Compare it also with the results of section 4.2.
Proposition 9.3 is a generalization of Proposition 4.1 (ii) in [Smi16]; it gives the “asymptotic dynamics” part in the affine version of Schema 1.5. The proof takes up the majority
of this section.
To estimate M (gh), the idea is to introduce two vectors Mgh (g) and Mgh (h) such that
we have, by definition, M (gh) = Mgh (g) + Mgh (h). We then first find an intermediate
vector, called Mg,gh (g), that we prove to be close to M (g) (Lemma 9.7). Then we prove
that Mgh (g) is close to this intermediate vector (Lemma 9.10).
Proposition 9.1. For every ρ-regular map g ∈ G ⋉ V , we have
M (g−1 ) = −w0 (M (g)).
Remark 9.2. Note that M (g) is (by definition) an element of the space V0t , which (again
by definition) is the set of fixed points of L = ZG (A). From this, it is straightforward
to deduce that V0t is invariant by NG (A). Hence w0 induces a linear involution on V0t ,
which does not depend on the choice of a representative of w0 in G.
Proof. First of all note that if φ is a canonizing map for g, then w0 φ is a canonizing map
for g−1 . Indeed, assume that g = τv exp(Jd(g))ge gu is in canonical form; then we have
w0 (− Jd(g)) ∈ a+ (since by definition w0 exchanges the dominant Weyl chamber a+ and
its negative −a+ ), and w0 (−v) ∈ V0= (since X0 is symmetric, the action of w0 preserves
V0= ).
It remains to show that w0 , or more precisely any representative w̃0 ∈ NG (A) of w0 ,
commutes with πt . We use the well-known fact that the group W , that we defined as
the quotient NG (A)/ZG (A), is also equal to the quotient NK (A)/ZK (A) (see [Kna96],
formulas (7.84a) and (7.84b)); hence
w̃0 ∈ NG (A) = W ZG (A) = W ZK (A)A = NK (A)A ⊂ KA.
73
(9.1)
Now recall ((7.3), (7.4)) that we have an orthogonal decomposition
V0=
V0a
z
}|
{
= V0≎ ⊕ (V0a ∩ V 0 ) ⊕ V0t .
|
{z
}
V0
Let us show that all three components are invariant by w̃0 :
• For V0≎ this is obvious (since Ωw0 \ {0} is invariant by w0 ).
• For V0t this follows from Remark 9.2.
• This is obviously the case for V 0 . Now by definition the group A acts trivially
on V 0 , and by construction K acts on V 0 by orthogonal transformations (indeed
the Euclidean structure was chosen in accordance with Lemma 2.4); hence V0a ∩V 0 ,
which is the orthogonal complement of V0t in V 0 , is also invariant by w̃0 .
The desired formula now immediately follows from the definition of the Margulis invariant.
Proposition 9.3. For every C ≥ 1, there are positive constants s9.3 (C) ≤ 1 and ε9.3 (C)
with the following property. Let g, h ∈ G ⋉ V be a C-non-degenerate pair of ρ-regular
maps, with g±1 and h±1 all s9.3 (C)-contracting along X0 . Then gh is ρ-regular, and we
have:
kM (gh) − M (g) − M (h)k ≤ ε9.3 (C).
The basic idea of the proof is the same as in [Smi] (or [Smi16]). However, in the
proof of Lemma 8.6 in [Smi], a key point is that since the factors that are introduced to
construct Diagram 4, namely ℓ(ggh ) and ℓ(gg,gh ), are linear parts of quasi-translations,
they automatically have bounded norm. But in the general case, this last deduction fails:
see Remark 7.9. This issue forced us to completely reorganize the proof.
The new proof, though still technical, is more elegant. It is more symmetric: for
instance we got rid of the lopsided Diagram 4, and of the confusing series P1 , P2 , P2′
and P1′′ . It is also more structured, as it cleanly separates into:
• an “algebraic” part comprising Lemma 9.7, involving a combination of “canonical”
projections which are all bounded quasi-translations by Lemma 7.18;
• and an “analytic” part comprising Lemma 9.8, its Corollary 9.9 and Lemma 9.10,
involving projections between spaces which are “close to each other” (with the angle
controlled by the contraction strengths of g and h), hence which introduce only a
small error.
Proof. Let C ≥ 1. We choose some constant s9.3 (C) ≤ 1, small enough to satisfy all the
constraints that will appear in the course of the proof. For the remainder of this section,
we fix g, h ∈ G ⋉ V a C-non-degenerate pair of ρ-regular maps such that g ±1 and h±1
are s9.3 (C)-contracting along X0 .
The following remark will be used throughout this proof.
74
&
&
&
Remark 9.4. We may suppose that the pairs (Agh , A.gh ), (Ahg , A.hg ), (Ag , A.gh ) and
(A&hg , A.g ) are all 2C-non-degenerate. Indeed, recall that (by Proposition 8.4), we have
αHaus A&gh , A&g .C sX0 (g)
αHaus A. , A. . s (h−1 )
C X0
gh
h
and similar inequalities with g and h interchanged. On the other hand, by hypothe&
sis, (Ag , A.h ) is C-non-degenerate. If we choose s9.3 (C) sufficiently small, these four
statements then follow from Lemma 8.3.
Proof of Proposition 9.3, continued. If we take s9.3 (C) ≤ s8.4 (C), then Proposition 8.4
ensures that gh is ρ-regular.
≈
To estimate M (gh), we decompose the induced map gh : A≈
gh → Agh into a product of
several maps.
• We begin by decomposing the product gh into its factors. We have the commutative
diagram
gh
A≈
gh
A≈
hg
g
A≈
gh
h
(9.2)
≈
Indeed, since hg is the conjugate of gh by h and vice-versa, we have h(A≈
gh ) = Ahg
≈
≈
and g(Ahg ) = Agh .
≈
≈
≈
• Next we factor the map g : A≈
hg → Agh through the map g : Ag → Ag , which is
better known to us. We have the commutative diagram
A≈
gh
A≈
hg
g
πg
πg
A≈
g
g
(9.3)
A≈
g
≪
≫
where πg is the projection onto A≈
g parallel to Vg ⊕ Vg . (It commutes with g
≪
≫
≈
because Ag , Vg and Vg are all invariant by g.)
• Now we decompose again every diagonal arrow from the last diagram into two
factors. For any two ρ-regular maps u and v, we introduce the notation
&
.
A≈
u,v := Au ∩ Av .
≫
≈
We call P1 (resp. P2 ) the projection onto A≈
g,gh (resp. Ahg,g ), still parallel to Vg ⊕
≈
≪
≈
Vg . To justify this definition, we must check that Ag,gh (and similarly Ahg,g ) is
75
&
supplementary to Vg≫ ⊕ Vg≪ . Indeed, by Remark 9.4, A.gh is transverse to Ag ,
hence (by Proposition 7.14 and Proposition 7.6 (ii)) supplementary to Vg≫ ; thus
&
≈
≫
≪
≪
A&g = Vg≫ ⊕ A≈
g,gh and A = Vg ⊕ Ag = Vg ⊕ Vg ⊕ Ag,gh . Then we have the
commutative diagrams
A≈
gh
P1
A≈
g,gh
πg
A≈
g
(9.4a)
A≈
g
(9.4b)
πg
and
A≈
hg
P2
A≈
hg,g
πg
πg
• Finally (and this is new in comparison to [Smi]), we would like to replace P1 and P2
by some “better-behaved” projections.
≪
≫
– We define πg,gh to be the projection onto A≈
g,gh parallel to Vg ⊕Vgh . Obviously
≈
≈
it induces a bijection between Agh and Ag,gh .
≫
≪
– We define πhg,g to be the projection onto A≈
hg,g parallel to Vhg ⊕Vg . Obviously
≈
≈
it induces a bijection between Ahg and Ahg,g .
The reason they are “better-behaved” is that by Lemma 7.18, they actually commute with canonical identifications (see Remark 9.6 below for more details). We
then make the decompositions
−1
) ◦ πg,gh
P1 = (P1 ◦ πg,gh
(9.5a)
−1
P2 = (P2 ◦ πhg,g
) ◦ πhg,g .
(9.5b)
and
The last three steps can be repeated with h instead of g. The way to adapt the second
≈
≈
step is straightforward; for the third step, we factor πh : A≈
hg → Ah through Ah,hg and
≪
≈
≈
≈
πh : Agh → Ah through Agh,h ; for the fourth step, we project respectively along Vh≫ ⊕Vhg
≫
≪
and along Vgh ⊕ Vh .
Combining these four decompositions, we get the lower half of Diagram 2. (We left out
the expansion of h; we leave drawing the full diagram for especially brave readers.) Let
us now interpret all these maps as endomorphisms of A=
0 . To do this, we choose some
optimal canonizing maps
φg , φgh , φhg , φg,gh , φhg,g
&
&
respectively of g, of gh, of hg, of the pair (Ag , A.gh ) and of the pair (Ahg , A.g ). This
allows us to define ggh , hgh , gg,gh , g≈ , ∆1 , ∆2 , χ1 , χ2 , ψ1 , ψ2 to be the maps that make
the whole Diagram 2 commutative.
Now let us define
(
Mgh (g) := πt (ggh (x) − x)
(9.6)
Mgh (h) := πt (hgh (x) − x)
76
A=
0
A=
0
ggh
∆1
A=
0
∆2
=
=
A0
A0
gg,gh
χ1
χ2
A=
0
A=
0
ψ1
ψ2
A=
0
φgh
φgh
hgh
φg,gh
g≈
φg
A=
0
φhg,g
φg
A≈
gh
φhg
φhg
A≈
hg
g
A≈
hg
A≈
gh
πg,gh
πhg,g
P1
P2
A≈
hg,g
A≈
g,gh
πg
πg
A≈
g
g
Diagram 2
77
A≈
g
φgh
h
A≈
gh
=
=
=
:= A=
, where VAff,0
for any x ∈ VAff,0
0 ∩ VAff is the affine space parallel to V0 and
passing through the origin. Since gh is the conjugate of hg by g and vice-versa, the
elements of G ⋉ V (defined in an obvious way) whose restrictions to A=
0 are ggh and
≤
hgh stabilize the spaces A≥
g
and
h
are
thus quasiand
A
.
By
Lemma
7.11,
gh
gh
0
0
translations. It follows that these values Mgh (g) and Mgh (h) do not depend on the
choice of x. Compare this to the definition of a Margulis invariant (Definition 7.19): we
=
. It immediately follows that
have M (gh) = πt (ggh ◦ hgh (x) − x) for any x ∈ VAff,0
M (gh) = Mgh (g) + Mgh (h).
(9.7)
Thus it is enough to show that kMgh (g) − M (g)k .C 1 and kMgh (h) − M (h)k .C 1.
(Note that while the vectors Mgh (g) and Mgh (h) are elements of V0t , the maps ggh and
hgh are extended affine isometries acting on the whole subspace A=
0 .)
We shall prove the estimate for g; the proof of the estimate for h is analogous. We
proceed in two steps. First, we introduce the vector
Mg,gh (g) := πt (gg,gh (x) − x)
=
, and we show (Lemma 9.7) that it differs from Mgh (g) only by a
for any x ∈ VAff,0
bounded constant. Second, we show (Lemma 9.10) that it is very close to M (g). These
two lemmas together imply the conclusion.
Remark 9.5. In contrast to actual Margulis invariants, the values Mgh (g) and Mgh (h) do
depend on our choice of canonizing maps. Choosing other canonizing maps would force
us to subtract some constant from the former and add it to the latter.
Remark 9.6. The fourth decomposition step above, namely (9.5), is what makes the
whole proof much cleaner. In [Smi], we had a map called P1 , which was “almost a quasitranslation” (Lemma 8.9 in [Smi]). In the current proof, this map decomposes into two
pieces
P1 = χ1 ◦ ∆1 ,
(9.8)
that are much easier to deal with: χ1 is now a bounded quasi-translation just like ψ1 , and
thus falls in with the “algebraic” part; while ∆1 is now almost the identity (Lemma 9.8),
and thus stays in the “analytic” part.
Lemma 9.7. We have
kMg,gh (g) − M (g)k .C 1.
−1
Proof. By Lemma 7.18, the maps χ1 −1 , ψ1 , ψ2 and χ2 are quasi-translations. Let us
show that their norms are bounded by a constant that depends only on C; obviously this
implies the conclusion.
• Let us start with χ2 . By definition, we have:
χ2 = φhg,g ◦ πhg,g ◦ φ−1
hg
−1
◦
φ
◦
φ
= φhg,g ◦ πhg,g ◦ φ−1
hg,g
hg
hg,g
= π0 ◦ φhg,g ◦ φ−1
hg ,
78
(9.9)
>
<
where π0 is the projection onto A=
0 parallel to V0 ⊕ V0 . Now π0 is actually
an orthogonal projection, hence it has norm 1; and φhg,g ◦ φ−1
hg is bounded by
Remark 9.4.
• Similarly, we have
ψ2 = π0 ◦ φg ◦ φ−1
hg,g ,
which is bounded.
(9.10)
−1
≈
≈
≈
• To deal with ψ1 , note that πg : A≈
g,gh → Ag and πg,gh : Ag → Ag,gh are inverse
to each other. We deduce that
ψ1
−1
= φg,gh ◦ πg,gh ◦ φ−1
g
−1
= φg,gh ◦ πg,gh ◦ φ−1
g,gh ◦ φg,gh ◦ φg
= π0 ◦ φg,gh ◦ φ−1
,
g
(9.11)
and we conclude as previously.
• Similarly, we have
χ1 −1 = π0 ◦ φgh ◦ φ−1
g,gh ,
(9.12)
and we conclude in the same way.
Lemma 9.8. The estimates
(i) k∆1
−1
(ii) k∆2
−1
&
&
− Id k .C αHaus Agh , Ag ;
− Id k .C
αHaus
.
.
Ahg , Ag ,
hold, as soon as the respective right-hand sides are smaller than some constant depending
only on C.
Corollary 9.9. We have:
(i) k∆1
−1
(ii) k∆2
−1
− Id k .C sX0 (g);
− Id k .C sX0 (g−1 );
(iii) kℓ(∆1 )−1 − Id k .C ~sX0 (ℓ(g));
(iv) kℓ(∆2 )−1 − Id k .C ~sX0 (ℓ(g)).
In light of Remark 9.6, this corollary can be seen as a simpler version of Lemma 8.9
in [Smi]. Indeed the old P1 corresponds by (9.8) to the new χ1 ◦ ∆1 , while the old P1′′
corresponds to χ1 alone.
79
Proof. Points (i) and (ii) immediately follow from the Lemma combined with Proposition 8.4 (ii), provided that we take s9.3 (C) small enough.
For points (iii) and (iv), simply apply the Lemma to the pair (ℓ(g), ℓ(h)). (It is easy
to check that this pair still satisfies the hypotheses of Proposition 9.3.) We then get:
kℓ(∆1 )−1 − Id k .C αHaus V & , Vg& .C ~sX (ℓ(g));
0
gh
kℓ(∆2 )−1 − Id k .C αHaus V . , Vg. .C ~sX (ℓ(g)).
0
hg
In each case, the second inequality follows from Proposition 8.4 (i). The first inequality
is an application of the Lemma, which is licit (provided s9.3 (C) is small enough), since
Proposition 7.26 (ii) propagates the required upper bound to ~sX0 (ℓ(g)).
The proof of Lemma 9.8 might seem slightly technical, but there is an easy intuition
behind it. Essentially, the idea is that if you jump back and forth between two spaces
that almost coincide, going both times in directions whose angle with the two spaces is
not too shallow, then you can’t end up very far from your starting point.
Proof of Lemma 9.8.
(i) By Remark 9.4, we know that kφ±1
gh k ≤ 2C. Conjugating everything by this map,
it is thus sufficient to show that for every x ∈ A≈
gh , we have
P1−1 (πg,gh (x)) − x .C sX0 (g)kxk
(9.13)
≈
(where by P1−1 we mean the inverse of the bijection P1 : A≈
gh → Ag,gh ).
• Let us first estimate the quantity kπg,gh (x) − xk. To begin with, let us push
everything forward by the map φg,gh ; writing y = φg,gh (x), we have:
kφg,gh (πg,gh (x) − x)k
kπ0 (y) − yk
=
kφg,gh (x)k
kyk
= sin α(y, A=
0)
≤ α(y, A=
0 ).
By Remark 9.4, we know that kφ±1
g,gh k ≤ 2C; hence we may pull everything
back by φg,gh again:
We conclude that
kπg,gh (x) − xk
.C α(x, A≈
g,gh )
kxk
&
≤ α A≈
gh , Ag
&
≤ αHaus Agh , A&g .
&
kπg,gh (x) − xk .C αHaus Agh , A&g kxk.
80
(9.14)
(9.15)
• Let us now estimate the quantity P1−1 (πg,gh (x)) − πg,gh (x) . We introduce
the notation z = πg,gh (x), and we define ξ to be the unique linear automorphism of A satisfying
(
φg,gh (x) if x ∈ A&g
(9.16)
ξ(x) =
φg (x)
if x ∈ Vg≪
≈
(so that ξ −1 (V0> ) = Vg≫ and ξ −1 (V0< ) = Vg≈ but ξ −1 (A=
0 ) = Ag,gh ). From
±1
the inequalities kφ±1
g k ≤ C and kφg,gh k ≤ 2C, it is easy to deduce that both
−1
norms kξk and kξ k are bounded by a constant that depends only on C.
Now we obviously have ξ ◦ P1 ◦ ξ −1 = π0 , hence
kξ(P1−1 (z) − z)k
= tan α(ξ(P1−1 (z)), A=
0 ).
kξ(z)k
Now we have
−1
≈
α(ξ(P1−1 (z)), A=
0 ) .C α(P1 (z), Ag,gh )
&
.C αHaus Agh , A&g
since ξ and ξ −1 are bounded
since P1−1 (z) ∈ A≈
gh .
If the right-hand side is small enough, we may assume that α(ξ(z), A=
0 ) is
π
smaller than some fixed constant α0 (say α0 = 4 ). For every α ≤ α0 , we
obviously have
tan α .α0 α.
It follows that
kξ(P1−1 (z) − z)k
&
.C αHaus Agh , A&g .
kξ(z)k
(9.17)
Now since ξ and ξ −1 are bounded, we deduce that
kP1−1 (z) − zk .C αHaus A&gh , A&g kzk.
It remains to estimate kzk in terms of kxk. We have:
&
kzk ≤ kxk + kπg,gh (x) − xk .C kxk + αHaus Agh , A&g kxk
&
&
by (9.15). Taking αHaus Agh , Ag small enough, we may assume that kzk ≤
2kxk. We conclude that
&
(9.18)
P1−1 (πg,gh (x)) − πg,gh (x) .C αHaus Agh , A&g kxk.
Adding together (9.15) and (9.18), the desired inequality (9.13) follows.
(ii) The proof is completely analogous.
81
Lemma 9.10. We have
kMgh (g) − Mg,gh (g)k .C sX0 (g).
The proof is somewhat similar to the proof of the second half of Lemma 8.6 in [Smi].
Proof. Recall that
Mgh (g) = πt (ggh (x) − x),
=
where x can be any element of the affine space VAff,0
.
Let O be the “origin” of VAff , i.e. the intersection of the line R0 with the affine space VAff
=
(in other terms O = (0, 1) ∈ V ⊕ R0 ). By definition O is an element of VAff,0
. We then
have, for every extended affine map f ,
∀x ∈ VAff ,
f (x) = ℓ(f )(x − O) + f (O).
Let us take
x = ∆2
−1
−1
(9.19)
gg,gh −1 (O) .
◦ gg,gh ◦ ∆2 , we may then write
−1
Mgh (g) = πt ∆2 (x) − x + πt gg,gh ∆2 (x) − ∆2 (x) + πt ∆1
gg,gh ∆2 (x) − gg,gh ∆2 (x) .
−1
−1
gg,gh −1 (O)
= πt gg,gh −1 (O) − ∆2
+ πt O − gg,gh −1 (O) + πt ∆1 (O) − O .
{z
}
|
|
|
{z
}
{z
}
=: (II)
=: (I)
=: (III)
Since ggh = ∆1
The middle term (II) is then by definition equal to Mg,gh (g), so that
Mgh (g) − Mg,gh (g) = (I) + (III).
(9.20)
Now we have
k(III)k ≤ k∆1
≤ k∆1
= k∆1
−1
(O) − Ok
−1
−1
− Id kkOk
− Id k
by Corollary 9.8 (i).
.C sX0 (g)
(9.21)
It remains to estimate (I). We set
y := gg,gh −1 (O).
Let us calculate the norm of this vector:
kyk ≤
=
gg,gh −1
χ2 −1 ◦ ψ2
−1
◦ g≈ −1 ◦ ψ1 ◦ χ1
.C g≈ −1
=
φg ◦ g−1
.C
g−1
A≈
g
A≈
g
.
82
◦ φ−1
g
(9.22)
(To justify the third line, remember that we have seen in the proof of Lemma 9.7 that
−1
the four maps χ1 −1 , ψ1 , ψ2 and χ2 are all bounded.) Now we have:
−1
k(I)k = πt y − ∆2 (y)
−1
≤ ∆2 (y) − y
−1
−1
= ℓ(∆2 ) − Id (y − O) + ∆2 − Id (O)
≤ ℓ(∆2
−1
) − Id kyk + ∆2
.C ~sX0 (ℓ(g)) g−1
A≈
g
−1
− Id
by (9.19)
as kyk2 = ky − Ok2 + 1
by Corollary 9.8 (ii) and (iv) and (9.22)
+ sX0 (g)
by Proposition 7.26 (iii).
(9.23)
.C sX0 (g)
Joining together (9.21) and (9.23), the conclusion follows.
10 Margulis invariants of words
We have already studied how contraction strengths (Proposition 8.4) and Margulis invariants (Proposition 9.3) behave when we take the product of two mutually C-nondegenerate, sufficiently contracting ρ-regular maps. The goal of this section is to generalize these results to words of arbitrary length on a given set of generators. This is a
straightforward generalization of Section 9 in [Smi] and of Section 5 in [Smi16].
Definition 10.1. Take k generators g1 , . . . , gk . Consider a word g = giσ11 · · · giσll with
length l ≥ 1 on these generators and their inverses (for every m we have 1 ≤ im ≤ k
and σm = ±1). We say that g is reduced if for every m such that 1 ≤ m ≤ l − 1, we have
(im+1 , σm+1 ) 6= (im , −σm ). We say that g is cyclically reduced if it is reduced and also
satisfies (i1 , σ1 ) 6= (il , −σl ).
Proposition 10.2. For every C ≥ 1, there is a positive constant s10.2 (C) ≤ 1 with the
following property. Take any family of maps g1 , . . . , gk ∈ G ⋉ V satisfying the following
hypotheses:
(H1) Every gi is ρ-regular.
(H2) Any pair taken among the maps {g1 , . . . , gk , g1−1 , . . . , gk−1 } is C-non-degenerate, except of course if it has the form (gi , gi−1 ) for some i.
(H3) For every i, we have sX0 (gi ) ≤ s10.2 (C) and sX0 (gi−1 ) ≤ s10.2 (C).
Take any nonempty cyclically reduced word g = giσ11 · · · giσll (with 1 ≤ im ≤ k, σm = ±1
for every m). Then g is ρ-regular, 2C-non-degenerate, and we have
M (g) −
l
X
M (giσmm ) ≤ lε9.3 (2C)
m=1
(where ε9.3 (2C) is the constant introduced in Proposition 9.3).
83
The proof proceeds by induction, with Proposition 8.4 and Proposition 9.3 providing
the induction step.
Proof. The proof is exactly the same as the proof of Proposition 5.2 in [Smi16], mutatis
mutandis.
Let us just present one small improvement. The proof relies on the following lemma:
Lemma 10.3. Every cyclically reduced word g = giσ11 · · · giσll can be decomposed as a
product of two cyclically reduced subwords
g′ := giσ11 · · · giσmm
and
σ
m+1
g′′ := gim+1
· · · giσll ,
both nonempty (that is, 0 < m < l).
In [Smi16], this was proved by contradiction, in a somewhat obscure way. Let us
reformulate the proof so that it is constructive, and hopefully more comprehensible.
Proof. We may take m to be the smallest (positive) index such that
(im+1 , σm+1 ) 6= (il , −σl ).
Such an index always exists, and is at most equal to l − 1 (since the word is reduced).
Then the first subword is actually of the form
m−1
g′ = giσ11 giσll
,
and any word of this form is automatically cyclically reduced as soon as it is reduced.
As for g′′ , it is cyclically reduced by construction.
11 Construction of the group
Here we prove the Main Theorem. The reasoning is similar to that of Section 6 in [Smi16],
and almost identical to that of Section 10 in [Smi]. The main difference is the substitution
of a′ρ,X0 instead of aρ,X0 , which in particular requires us to invoke Proposition 6.16 (which
had no equivalent in [Smi]) in the final proof. Also, since we have now developed the
purely linear theory in a systematic way (Section 4), the relationship between linear
properties and affine properties becomes clearer (in particular in the second bullet point
of the final proof).
Let us recall the outline of the proof. We begin by showing (Lemma 11.2) that if we
take a group generated by a C-non-degenerate family of sufficiently contracting ρ-regular
maps that have suitable Margulis invariants, it satisfies all of the conclusions of the Main
Theorem, except Zariski-density. We then exhibit such a group that is also Zariski-dense
(and thus prove the Main Theorem).
The idea is to ensure that the Margulis invariants of all elements of the group lie
almost on the same half-line. Obviously if −w0 maps every element of V0t to its opposite,
Proposition 9.1 makes this impossible. So we now exclude this case:
84
Assumption 11.1. The representation ρ is such that the action of w0 on V0t is not
trivial.
This is precisely condition (i) from the Main Theorem. More precisely, V0t is the set of
all vectors that satisfy (i)(a), and what we say here is that some of them also satisfy (i)(b).
See Example 10.2 in [Smi] for examples of representations that do or do not satisfy this
condition.
Thanks to Assumption 11.1, we choose once and for all some nonzero vector v ∈ V0t
that is a fixed point of −w0 (which is possible since w0 is an involution). We also choose
a vector M0 collinear to v and such that kM0 k = 2ε9.3 (2C).
Lemma 11.2. Take any family g1 , . . . , gk ∈ G ⋉ V satisfying the hypotheses (H1), (H2)
and (H3) from Proposition 10.2, and also the additional condition
(H4) For every i, M (gi ) = M0 .
Then these maps generate a free group acting properly discontinuously on the affine
space VAff .
Proof. The proof is exactly the same as the proof of Lemma 6.1 in [Smi16], mutatis
mutandis. The constant denoted as µ(C) (or µ(2C)) in the earlier paper corresponds to
what we now call ε9.3 (C) (or respectively ε9.3 (2C)). The (orthogonal) projection
π̂z : ĝ → z ⊕ R0
parallel to d ⊕ n+ ⊕ n−
now becomes the (orthogonal) projection
π̂t : A → V0t ⊕ R0
parallel to V0a ⊕ V0> ⊕ V0< .
We may now finally prove the Main Theorem. We follow the same strategy as in the
proof of the Main Theorems of [Smi16] and of [Smi] (with a few additional tweaks).
Proof of Main Theorem. First note that Assumption 11.1 guarantees that ρ satisfies the
hypotheses of the Main Theorem. (The two other assumptions were “for free”: Assumption 7.12 is just the weaker condition (i)(a), and Assumption 5.5 is an even weaker
condition that follows from (i)(a).)
We find a positive constant C ≥ 1 and a family of maps g1 , . . . , gk ∈ G ⋉ V (with
k ≥ 2) that satisfy the conditions (H1) through (H4) and whose linear parts generate a
Zariski-dense subgroup of G, then we apply Lemma 11.2. We proceed in several stages.
• We begin by using a result of Benoist: we apply Lemma 4.3.a in [Ben97] to
– Γ = G;
– t = k + 1;
– Ω1 = · · · = Ωk = a′ρ,X0 ∩ a++ , as defined in Remark 6.15. (Point (iii) of that
remark assures that it is indeed a nonempty open convex cone.)
85
This gives us, for any k ≥ 2, a family of maps γ1 , . . . , γk ∈ G (which we shall see
as elements of G ⋉ V , by identifying G with the stabilizer of R0 ), such that:
(i) Every γi and every γi−1 is asymptotically contracting along X0 . In particular,
by Proposition 6.16 (ii), it is ρ-regular (this is (H1)).
(ii) For any two indices i, i′ and signs σ, σ ′ such that (i′ , σ ′ ) 6= (i, −σ), the pair
(yγXσ0 ,+ , y Xσ0′,− ) ∈ G/PX+0 × G/PX−0
i
γi′
is transverse.
(iii) Any single γi generates a Zariski-connected group.
(iv) All of the γi generate together a Zariski-dense subgroup of G.
Since in our case t is finite, Benoist’s item (v) is not relevant to us.
A comment about item (i): Benoist’s theorem only works with R-regular elements;
so it forces every γi to be not only ρ-regular, but actually R-regular (of which we
make no use).
A comment about item (ii): since we have taken Benoist’s Γ to be the whole
group G, we have θ = Π, so that YΓ is the full flag variety G/P + . So Benoist’s
theorem actually gives us the stronger property that the pair
X,−
+
× G/P −
(yγX,+
σ , y σ ′ ) ∈ G/P
i
γi′
(where X is some element of the open Weyl chamber a++ ) is transverse in the full
flag variety. Once again, we only need the weaker version.
• Using Remark 7.15, condition (ii) above may be restated in the following way: for
any two indices i, i′ and signs σ, σ ′ such that (i′ , σ ′ ) 6= (i, −σ), the pair of parabolic
spaces
&
(Vγ σ , V .σ′ )
i
γi′
is transverse. Clearly, every pair of transverse spaces is C-non-degenerate for some
finite C; and here we have a finite number of such pairs. Hence if we choose some
suitable value of C (which we fix for the rest of this proof), the hypothesis (H2)
follows.
• From condition (iii) (Zariski-connectedness), it follows that any algebraic group
containing some power γiN of some generator must actually contain the generator γi itself. This allows us to replace every γi by some power γiN without sacrificing condition (iv) (Zariski-density). Clearly, conditions (i), (ii) and (iii) are
then preserved as well. If we choose N large enough, we may suppose (thanks to
Proposition 7.23 (ii)) that the numbers sX0 (γi±1 ) are as small as we wish: this gives
us (H3). In fact, we shall suppose that for every i, we have sX0 (γi±1 ) ≤ sMain (C)
for an even smaller constant sMain (C), to be specified soon.
86
• To satisfy (H4), we replace the maps γi by the maps
gi := τφ−1 (M0 ) ◦ γi
(11.1)
i
(for 1 ≤ i ≤ k), where φi is a canonizing map for γi .
We need to check that this does not break the first three conditions. Indeed,
for every i, we have γi = ℓ(gi ); even better, since the affine map φi gi φ−1
has
i
by construction canonical form, gi has the same geometry as γi (meaning that
&
&
&
Agi = Aγi = Vγi ⊕ R0 and A.gi = A.γi = Vγ.i ⊕ R0 ). Hence the gi still satisfy the
hypotheses (H1) and (H2), but now we have M (gi ) = M0 (this is (H4)). As for
contraction strength along X0 , we have:
sX0 (gi ) = gi |Vg≪
i
= γi |Vγ≪
i
gi−1
&
Agi
(τφ−1 (M0 ) ◦ γi )−1
i
&
Ag
−1
≤ sX0 (γi ) φ−1
i ◦ τM0 ◦ φi
−1
k,
.C sMain (C)kτM
0
(11.2)
and similarly for gi−1 . Recall that kM0 k = 2ε9.3 (2C), hence the quantity
−1
k = kτ−M0 k
kτM0 k = kτM
0
depends only on C: in fact it is equal to the norm of the 2-by-2 matrix
It follows that if we choose
sMain (C) ≤ s10.2 (C)
1 2ε9.3 (2C)
0
1
−1
,
1 kM0 k
0 1
.
(11.3)
then the hypothesis (H3) is satisfied.
We conclude that the group generated by the elements g1 , . . . , gk acts properly
discontinuously (by Lemma 11.2), is free (by the same result), nonabelian (since
k ≥ 2), and has linear part Zariski-dense in G.
References
[Abe01] H. Abels. Properly discontinuous groups of affine transformations, a survey.
Geom. Dedicata, 87:309–333, 2001.
[AMS]
H. Abels, G.A. Margulis, and G.A. Soifer. The Auslander conjecture for dimension less than 7. Preprint, arXiv:1211.2525.
[AMS02] H. Abels, G.A. Margulis, and G.A. Soifer. On the Zariski closure of the linear
part of a properly discontinuous group of affine transformations. J. Differential
Geometry, 60:315–344, 2002.
87
[AMS11] H. Abels, G.A. Margulis, and G.A. Soifer. The linear part of an affine group
acting properly discontinuously and leaving a quadratic form invariant. Geom.
Dedicata, 153:1–46, 2011.
[Aus64]
L. Auslander. The structure of compact locally affine manifolds. Topology,
3:131–139, 1964.
[Ben96]
Y. Benoist. Actions propres sur les espaces homogènes réductifs. Annals of
Mathematics, 144:315–347, 1996.
[Ben97]
Y. Benoist. Propriétés asymptotiques des groupes linéaires. Geom. and funct.
anal., 7:1–47, 1997.
[BQ]
Y.
Benoist
and
J.-F.
Quint.
Random
walks
on
ductive groups.
Ergebnisse.
To appear;
available
http://www.math.u-psud.fr/~benoist/prepubli/15walk.pdf.
[BT65]
A. Borel and J. Tits. Groupes réductifs. Publications Mathématiques de l’IHÉS,
27:55–151, 1965.
[BT72]
A. Borel and J. Tits. Compléments à l’article “ Groupes réductifs ”. Publications
Mathématiques de l’IHÉS, 41:253–276, 1972.
[DGK]
J. Danciger, F. Guéritaud, and F. Kassel. Proper affine action of right-angled
Coxeter groups. In preparation.
[Ebe96]
P.B. Eberlein. Geometry of Nonpositively Curved Manifolds. University of
Chicago Press, 1996.
[FG83]
D. Fried and W.M. Goldman. Three-dimensional affine crystallographic groups.
Adv. in Math., 47:1–49, 1983.
[Hal15]
B.C. Hall. Lie Groups, Lie Algebras and Representations: An Elementary
Introduction. Springer International Publishing, second edition, 2015.
[Hel08]
S. Helgason. Geometric Analysis on Symmetric Spaces. Amer. Math. Soc.,
second edition, 2008.
reat
[Hum75] J. Humphreys. Linear Algebraic Groups. Springer-Verlag, 1975.
[Kna96] A.W. Knapp. Lie Groups Beyond an Introduction. Birkhaüser, 1996.
[Mar83] G.A. Margulis. Free properly discontinuous groups of affine transformations.
Dokl. Akad. Nauk SSSR, 272:937–940, 1983.
[Mar87] G.A. Margulis. Complete affine locally flat manifolds with a free fundamental
group. J. Soviet Math., 134:129–134, 1987.
[Mil77]
J. Milnor. On fundamental groups of complete affinely flat manifolds. Adv. in
Math., 25:178–187, 1977.
88
[Smi]
I. Smilga. Proper affine actions in non-swinging representations. Submitted;
available at arXiv:1605.03833.
[Smi16]
I. Smilga. Proper affine actions on semisimple Lie algebras. Annales de l’Institut
Fourier, 66(2):785–831, 2016.
[Tit71]
J. Tits. Représentations linéaires irréductibles d’un groupe réductif sur un
corps quelconque. Journ. Reine Angw. Math., 247:196–220, 1971.
89
| 4math.GR
|
Human-in-the-loop Artificial Intelligence
Fabio Massimo Zanzotto
University of Rome Tor Vergata
arXiv:1710.08191v1 [cs.AI] 23 Oct 2017
[email protected]
Abstract
Little by little, newspapers are revealing the bright future that Artificial Intelligence (AI) is building. Intelligent machines will help everywhere. However, this
bright future has a dark side: a dramatic job market contraction before its unpredictable transformation. Hence, in a near future, large numbers of job seekers
will need financial support while catching up with these novel unpredictable jobs.
This possible job market crisis has an antidote inside. In fact, the rise of AI is sustained by the biggest knowledge theft of the recent years. Learning AI machines are
extracting knowledge from unaware skilled or unskilled workers by analyzing their
interactions. By passionately doing their jobs, these workers are digging their own
graves.
In this paper, we propose Human-in-the-loop Artificial Intelligence (HIT-AI)
as a fairer paradigm for Artificial Intelligence systems. HIT-AI will reward aware
and unaware knowledge producers with a different scheme: decisions of AI systems
generating revenues will repay the legitimate owners of the knowledge used for taking
those decisions. As modern Robin Hoods, HIT-AI researchers should fight for a fairer
Artificial Intelligence that gives back what it steals.
1 Introduction
We are on the edge of a wonderful revolution: Artificial Intelligence (AI) is breathing life
into helpful machines, which will relieve us of our need to perform repetitive activities.
Self-driving cars [20, 23, 22] are taking their first steps in our urban environment and
their younger brothers, that is, assisted driving cars [28, 33, 13], are already a commercial
reality. Robots are vacuum cleaning and mopping the floors of our houses [34, 32, 15].
Chatbots1 [39, 37] have conquered our new window-on-the-world – our smartphones –
and, from there, they help with everyday tasks such as managing our agenda, answering
our factoid questions or being our learning companions [16, 4]. In medicine, computers
can already help in formulating diagnoses [2, 18, 10] by looking at data doctors generally
neglect. Artificial Intelligence is preparing a wonderful future where people are released
from the burden of repetitive jobs.
The bright Artificial Intelligence revolution has a dark side: a dramatic mass unemployment that will precede an unpredictable job market transformation. People and,
1
see http://houseofbots.com/
1
hence, governments are frightened. Nearly every week, newspapers all over the world
are reporting on possible futures where around one fifth of actual jobs will disappear.
Alarming reports foresee that more than one billion people will be unemployed worldwide [7]. By releasing people from repetitive jobs, intelligent machines will replace many
workers. Chatbots are slowly replacing call center agents. Self-driving trains are already
reducing the number of drivers in our trains. Self-driving cars are fighting to replace cab
drivers in our cities. Drones are expanding automation in managing delivery of goods
by drastically reducing the number of delivery people. And, these are only examples
as even more cognitive and artistic jobs are challenged. Intelligent machines may produce music jingles for commercials [5], write novels, produce news articles and so on.
Intelligent risk predictors may replace doctors [2, 18, 10]. Chatbots along with massive
open online courses may replace teachers and professors [11]. Coders risk being replaced
by machines too [25]. Nobody’s job is safe as we face this overwhelming progress of
Artificial Intelligence.
Surprisingly, the rise of Artificial Intelligence is supported by the unaware mass of
people who risk seeing their jobs replaced by machines. These people are giving away
their knowledge, which is used to train these wonderful machines. This is an enormous
and legal knowledge theft taking place in our modern era. Along with those aware
programmers and artificial intelligence researchers who set up the learning modules of
these artificial intelligent machines, an unaware mass of people is providing precious
training data by passionately doing their job or simply performing their activity on the
net. Answering an email, an interaction on a messaging service, leaving an opinion
on a hotel, and so on are all simple everyday activities people are doing. This data
is a goldmine for artificial intelligence machines. Learning systems transform these
interactions in knowledge for the artificial intelligence machines and the knowledge theft
is completed. By doing their normal everyday activity, people are digging the grave for
their own jobs.
As researchers in Artificial Intelligence, we have a tremendous responsibility: building
intelligent machines we can work with rather than intelligent machines that steal our
knowledge to do our jobs. We need to find ways to financially support job seekers as they
train to catch up with these novel unpredictable jobs. We need to prepare an antidote
as we spread this poison in the job market.
This paper propose Human-in-the-loop Artificial Intelligence (HIT-AI) as a novel
paradigm for a responsible Artificial Intelligence. This is a possible antidote to the poisoning of the job market. The idea is simple: giving the right value to the knowledge
producers. Human-in-the-loop AI is an umbrella for researchers in Artificial Intelligence
working with this underlying idea. Hence, HIT-AI promotes interpretable learning machines and, therefore, artificial intelligence systems with a clear knowledge lifecycle. For
HIT-AI systems, it will be clear whose the knowledge has been used in a specific deployment or in specific situations. This is a way to give the rightful credit and revenue to
the original knowledge producers. We need a fairer artificial intelligence.
The rest of the paper is organized as follows. Section 2 describes the enabling
paradigms of Human-in-the-loop AI. Section 3 sketches some simple proposals for a
2
better future. Then, Section 4 draws some conclusions.
2 Human-in-the-loop AI: Enabling Paradigms
2.1 Transferring Knowledge to Machines with Programming vs. with Learning from
Repeated Experience
Since the beginning of the digital era, programming is the preferred way to “teach” to
machines. Artificial non-ambiguous programming languages have been developed to have
a clear tool to tell machines what to do. According to this paradigm, whoever wants
to “teach” machines how to solve a new task or how to be useful has to master one of
these programming languages. These people, called programmers, have been teaching
machines for decades and have made these machines extremely useful. Nowadays, it
is difficult to think staying a single day without using the big network of machines
programmers have contributed to building.
As not all the tasks can be solved by programming, autonomous learning has been reinforced as an alternative way of controlling the “behavior” of machines. In autonomous
learning, machines are asked to learn from experience. With the paradigm of programming, we have asked machines to go to school before these machines have learned to walk
through trial and error. This is why machines have always been good in solving very
complex cognitive tasks but very poor in working with everyday simple problems. The
paradigm of autonomous learning has been introduced to solve this problem.
In these two paradigms, who should be paid for transferring knowledge to machines
and how should they be paid? In the programming paradigm, roles are clear: programmers are the “teachers” and machines are the “learners”. Hence, programmers could be
payed for their work. In the autonomous learning paradigm, the activity of programmers
is confined to the selection of the most appropriate learning model and of the examples
to show to these learning machines.
From the point of view of HIT-AI, programming is a fair paradigm as it keeps humans
in the loop although machines, which have been taught exactly what to do, can hardly be
called artificial intelligence. On the contrary, autonomous learning is an unfair model
of transferring knowledge as the real knowledge is extracted from data produced by
unaware people. Hence, little seems to be done by humans and machines seem to do the
whole job. Yet, knowledge is stolen without paying.
2.2 Explainable Artificial Intelligence and Explainable Machine Learning
Explaining the decisions of learning machines is a very hot topic nowadays: dedicated
workshops or specific sessions in major conferences are flourishing [1, 17]. In specific
areas of application, for example, medicine, thrust in intelligent machines cannot be
blind as final decisions can have a deep impact on humans. Hence, understanding why a
decision is taken become extremely important. However, what is exactly an explainable
machine learning model is still an open debate [21].
3
In HIT-AI, explainable machine learning can play a crucial role. In fact, seen from
another perspective, explaining machine learning decisions can keep humans in the loop
in two ways: 1) giving the last word to humans; and, 2) explaining what data sources
are responsible for the final decision. In the first case, the decision power is left in the
hand of very specialized professionals that use machines as advisers. This is a clear case
of human-in-the-loop AI. Yet, this is confined to highly specialized knowledge workers in
some specific area. The second case instead is fairly more important. In fact, machines
that take decisions or work on a task are constantly using knowledge extracted from
data. Spotting which data have been used for a specific decision or for a specific action
of the machine is very important in order to give credits to who has produced these
data. In general, data are produced by anyone and everyone, not only by knowledge
workers. Hence, understanding why a machine takes a decision may become a way to
keep everybody in the loop of artificial intelligence.
2.3 Convergence between Symbolic and Distributed Knowledge Representation
Explaining machine learning decisions is simpler in image analysis o, better, in all those
cases where the system representation is similar what is represented. In fact, for example,
neural networks interpreting images are generally interpreted by visualizing how subparts
represent salient subparts of target images. Both input images and subparts are tensors
of real numbers. Hence, these networks can be examined and understood.
However, large part of the knowledge is expressed with symbols. Both in natural
and artificial languages, combination of symbols are used to convey knowledge. In fact,
for natural languages, sounds are transformed in letters or ideograms and these symbols
are composed to produce words. Words then form sentences and sentences form texts,
discourses, dialogs, which ultimately convey knowledge, emotions, and so on. This
composition of symbols into words and of words in sentences follow rules that both the
hearer and the speaker know [6]. Hence, symbolic representations give a clear tool to
understand whose knowledge is used in specific machines.
In current Artificial Intelligence systems, symbols are fading away, erased by tensors
distributed representations. Distributed representations are pushing deep learning models
[19, 29] towards amazing results in many high-level tasks such as image recognition
[14, 31], image generation [12] and image captioning [36, 40], machine translation [3, 41],
syntactic parsing [35, 38] and even game playing at human level [30, 24].
There is a strict link between distributed representations and symbols, the first being
an approximation of the second [26, 27, 8, 9]. The representation of the input and the
output of these networks is not that different from their internal representation.
For HIT-AI, this strict link is a tremendous opportunity to track how symbolic
knowledge flows in the knowledge lifecycle. In this way, symbolic knowledge producers
can be rewarded for their unaware work.
4
3 Human-in-the-loop AI: a simple proposal for a better Future
A peasant of the late 19th century would have never imagined that after 100 years yoga
trainer, pet caretaker and ayurveda massage therapist – just to cite technology unrelated
jobs – are common jobs. It is also extremely likely that any wise politician of that period
had the same lack of imagination even though s/he had more time to spend to imagine
the future and less pressure on her/his job loss.
Today, we are in a situation similar to the end of the 19th century but we have
a complication: the speed of the AI revolution. As it was for the end-of-19th-century
peasants and politicians, we can hardly imagine what’s next on the job market. We
can see some trends but it is hard to exactly imagine what are the skills needed for
being part of the labor force of the future. Yet, the AI revolution is overwhelming and
risks elimination of many jobs in the near future. This may happen before our society
envisage a clear path for relocating workers. We urge a strategy for the immediate.
The Artificial Intelligence revolution is based on an enormous knowledge theft. Skilled
and unskilled workers do their own everyday jobs and leave important traces. These
traces are the training examples that machines can use to learn. Hence, Artificial Intelligence using machine learning is stealing these workers’ knowledge by learning from
their interactions. These unaware workers are basically digging the graves for their own
jobs.
The knowledge produced by workers and used by machines is going to produce revenues for machine owners for years. This is a major problem since only a very small
fraction of the population can benefit from this never-ending revenue source and the real
owners of the knowledge are not participating to this redistribution of wealth.
The model we propose with Human-in-the-loop Artificial Intelligence seeks to give
back part of the revenues to the unaware knowledge producers.
The key idea is that any profit-making interaction a machine does has to constantly
repay whoever has produced the original knowledge used to do that interaction. To
obtain repayment, we need to work on a major issue: determine a clear knowledge
lifecycle which performs a compete tracking of the knowledge from its initial production
to the final decision processes of the machine. Hence, we need to promote artificial intelligence models that are explainable and that track back to the initial training examples
that originated a decision. In this way, it is clear why the decision is made and who has
to be rewarded with a fraction of the profit that the decision is producing.
Managing ownership in the knowledge life-cycle poses big technological and moral
issues and it is certainly more complex than simply using knowledge while forgetting
what the source is. Each interaction has to be tracked and assigned to a specific individual. Hence, the issues are: first, a clear identification of people in the web is mandatory;
second, privacy can become an overwhelming legal issue.
Finally, to pursue HIT-AI as an ecosystem for fair artificial intelligence solutions, we
need to invest in the following enabling technologies and legal aspects:
• Explainable Artificial Intelligence which is a must because, in order to reword
knowledge producers, systems need to exactly know who is responsible for a specific
5
decision;
• Symbiotic Symbolic and Distributed Knowledge Representation Models which are
needed as a large part of knowledge is expressed with symbols;
• Trusted Technologies as the knowledge life-cycle should be clear and correctly
tracked;
• Virtual Identity Protocols and Mechanisms because systems need exactly who has
to be reworded;
• Privacy Preserving Protocols and Mechanisms as, although systems need to know
who should be rewarded and why, privacy should be preserved;
• Studying Extensions of Copyright to unaware knowledge production which can be
the legal solution to safeguard the unaware knowledge producers.
4 Conclusions
Job market contraction is the dark side of the shining future promised by Artificial
Intelligence (AI) systems. Unaware skilled and unskilled knowledge workers are digging
graves for their own jobs by passionately doing their normal, everyday work. Learning
AI are extracting knowledge from their interactions. This is a gigantic knowledge theft
of the modern era.
In this paper, we proposed Human-in-the-loop Artificial Intelligence (HIT-AI) as a
fairer AI approach. As modern Robin Hoods, HIT-AI researchers should fight for a fairer
Artificial Intelligence that gives back what it steals. As skilled and unskilled workers
are producing the knowledge which Artificial Intelligence is making profit on, we need
to give back a large part of this profit to its legitimate owners.
6
References
[1] David W. Aha, Trevor Darrell, Michael Pazzani, Darryn Reid, Claude Sammut, and
Peter Stone. Proceedings of the IJCAI 2017 Workshop on Explainable Artificial
Intelligence (XAI). August 2017.
[2] Peter C Austin, Jack V Tu, Jennifer E Ho, Daniel Levy, and Douglas S Lee. Using
methods from the data-mining and machine-learning literature for disease classification and prediction: a case study examining classification of heart failure subtypes.
Journal of clinical epidemiology, 66(4):398–407, 2013.
[3] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473,
2014.
[4] Roberta Beccaceci, Francesca Fallucchi, Cristina Giannone, Francesca Spagnoulo,
and Fabio Massimo Zanzotto. Education with” living artworks” in museums. In
CSEDU (1), pages 346–349, 2009.
[5] Jean-Pierre Briot, Gaëtan Hadjeres, and François Pachet. Deep learning techniques
for music generation-a survey. arXiv preprint arXiv:1709.01620, 2017.
[6] Naom Chomsky. Aspect of Syntax Theory. MIT Press, Cambridge, Massachussetts,
1957.
[7] Michael Chui, James Manyika, and Mehdi Miremadi. Where machines could replace
humans—and where they can’t (yet). McKinsey Quarterly, July 2016.
[8] Lorenzo Ferrone and Fabio Massimo Zanzotto. Towards syntax-aware compositional distributional semantic models. In Proceedings of COLING 2014, the 25th
International Conference on Computational Linguistics: Technical Papers, pages
721–730, Dublin, Ireland, August 2014. Dublin City University and Association for
Computational Linguistics.
[9] Lorenzo Ferrone, Fabio Massimo Zanzotto, and Xavier Carreras. Decoding distributed tree structures. In Statistical Language and Speech Processing - Third
International Conference, SLSP 2015, Budapest, Hungary, November 24-26, 2015,
Proceedings, pages 73–83, 2015.
[10] Patrizia Ferroni, Fabio Massimo Zanzotto, Noemi Scarpato, Silvia Riondino, Umberto Nanni, Mario Roselli, and Fiorella Guadagni. Risk assessment for venous
thromboembolism in chemotherapy-treated ambulatory cancer patients: a machine
learning approach. Medical Decision Making, 37(2):234–242, 2017.
[11] Chelsea Gohd. Your next teacher could be a robot, February 2017.
7
[12] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley,
Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In
Advances in Neural Information Processing Systems, pages 2672–2680, 2014.
[13] Andrew Gray, Mohammad Ali, Yiqi Gao, J Hedrick, and Francesco Borrelli. Semiautonomous vehicle control for road departure and obstacle avoidance. IFAC control
of transportation systems, pages 1–6, 2012.
[14] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Identity mappings in
deep residual networks. arXiv preprint arXiv:1603.05027, 2016.
[15] Eric C Huffman and Jonathon L Miner. Robotic sweeper cleaner with dusting pad,
March 18 2008. US Patent 7,346,428.
[16] Alice Kerly, Phil Hall, and Susan Bull. Bringing chatbots into education: Towards
natural language negotiation of open learner models. Knowledge-Based Systems,
20(2):177–185, 2007.
[17] B. Kim, D. M. Malioutov, K. R. Varshney, and A. Weller. Proceedings of the
2017 ICML Workshop on Human Interpretability in Machine Learning (WHI 2017).
ArXiv e-prints, August 2017.
[18] Konstantina Kourou, Themis P Exarchos, Konstantinos P Exarchos, Michalis V
Karamouzis, and Dimitrios I Fotiadis. Machine learning applications in cancer
prognosis and prediction. Computational and structural biotechnology journal, 13:8–
17, 2015.
[19] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton.
521(7553):436–444, 2015.
Deep learning.
Nature,
[20] Hod Lipson and Melba Kurman. Driverless: Intelligent Cars and the Road Ahead.
MIT Press, 2016.
[21] Zachary Chase Lipton.
abs/1606.03490, 2016.
The mythos of model interpretability.
CoRR,
[22] Todd Litman. Autonomous vehicle implementation predictions. Victoria Transport
Policy Institute, 28, 2014.
[23] Jerome M Lutin, Alain L Kornhauser, and Eva Lerner-Lam MASCE. The revolutionary development of self-driving vehicles and implications for the transportation engineering profession. Institute of Transportation Engineers. ITE Journal,
83(7):28, 2013.
[24] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Alex Graves, Ioannis
Antonoglou, Daan Wierstra, and Martin Riedmiller. Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602, 2013.
8
[25] Megan Murphy. Ginni rometty on the end of programming. Bloomberg Businessweek, September 2017.
[26] T. A. Plate. Distributed Representations and Nested Compositional Structure. PhD
thesis, 1994.
[27] T. A. Plate. Holographic reduced representations. IEEE Transactions on Neural
Networks, 6(3):623–641, 1995.
[28] G Revathi and VR Sarma Dhulipala. Smart parking systems and sensors: A survey. In Computing, Communication and Applications (ICCCA), 2012 International
Conference on, pages 1–5. IEEE, 2012.
[29] Jürgen Schmidhuber. Deep learning in neural networks: An overview. Neural
Networks, 61:85–117, 2015.
[30] David Silver, Aja Huang, Chris J Maddison, Arthur Guez, Laurent Sifre, George
Van Den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, et al. Mastering the game of go with deep neural networks and
tree search. Nature, 529(7587):484–489, 2016.
[31] Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for
large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014.
[32] Charles Taylor, Andrew Parker, Shek Lau, Eric Blair, Andrew Heninger, Eric Ng,
Enrico DiBernardo, Robert Witman, Michael Stout, et al. Robot vacuum cleaner,
June 30 2005. US Patent App. 11/171,031.
[33] Miroslav Trajkovic, Antonio J Colmenarez, Srinivas Gutta, and Karen I Trovato.
Computer vision based parking assistant, January 27 2004. US Patent 6,683,539.
[34] Iwan Ulrich, Francesco Mondada, and J-D Nicoud. Autonomous vacuum cleaner.
Robotics and autonomous systems, 19(3-4):233–245, 1997.
[35] Oriol Vinyals, L ukasz Kaiser, Terry Koo, Slav Petrov, Ilya Sutskever, and Geoffrey
Hinton. Grammar as a foreign language. In C. Cortes, N. D. Lawrence, D. D. Lee,
M. Sugiyama, and R. Garnett, editors, Advances in Neural Information Processing
Systems 28, pages 2755–2763. Curran Associates, Inc., 2015.
[36] Oriol Vinyals, Alexander Toshev, Samy Bengio, and Dumitru Erhan. Show and
tell: A neural image caption generator. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition, pages 3156–3164, 2015.
[37] Richard S. Wallace. The Anatomy of A.L.I.C.E., pages 181–210. Springer Netherlands, Dordrecht, 2009.
[38] David Weiss, Chris Alberti, Michael Collins, and Slav Petrov. Structured training
for neural network transition-based parsing. arXiv preprint arXiv:1506.06158, 2015.
9
[39] Joseph Weizenbaum. Eliza—a computer program for the study of natural language
communication between man and machine. Communications of the ACM, 9(1):36–
45, 1966.
[40] Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron Courville, Ruslan
Salakhutdinov, Richard S Zemel, and Yoshua Bengio. Show, attend and tell: Neural
image caption generation with visual attention. arXiv preprint arXiv:1502.03044,
2(3):5, 2015.
[41] Will Y Zou, Richard Socher, Daniel M Cer, and Christopher D Manning. Bilingual
word embeddings for phrase-based machine translation. In EMNLP, pages 1393–
1398, 2013.
10
| 2cs.AI
|
TEST IDEALS IN RINGS WITH FINITELY GENERATED
ANTI-CANONICAL ALGEBRAS
arXiv:1412.6453v4 [math.AG] 31 Mar 2016
ALBERTO CHIECCHIO, FLORIAN ENESCU, LANCE EDWARD MILLER, AND KARL SCHWEDE
Abstract. Many results are known about test ideals and F -singularities for Q-Gorenstein
rings. In this paper we generalize many of these results to the case when the symbolic Rees
algebra OX ⊕ OX (−KX ) ⊕ OX (−2KX ) ⊕ . . . is finitely generated (or more generally, in the
log setting for −KX − ∆). In particular, we show that the F -jumping numbers of τ (X, at )
are discrete and rational. We show that test ideals τ (X) can be described by alterations
as in Blickle-Schwede-Tucker (and hence show that splinters are strongly F -regular in this
setting – recovering a result of Singh). We demonstrate that multiplier ideals reduce to
test ideals under reduction modulo p when the symbolic Rees algebra is finitely generated.
We prove that Hartshorne-Speiser-Lyubeznik-Gabber type stabilization still holds. We
also show that test ideals satisfy global generation properties in this setting.
1. Introduction
Test ideals were introduced by Hochster and Huneke in their theory of tight closure
[HH90] within positive characteristic commutative algebra. After it was discovered that test
ideals were closely related to multiplier ideals [Smi00, Har01], a theory of test ideals of pairs
was developed analogous to the theory of multiplier ideals [HY03, Tak04]. However, unlike
multiplier ideals, test ideals were initially defined even without the hypothesis that KX
was Q-Cartier (see [DH09] for a similar theory of multiplier ideals). But the KX Q-Cartier
hypothesis is useful for test ideals, and indeed a number of central open questions are still
unknown without it. The goal of this paper is generalize results from the hypothesis that
KX is Q-Cartier to the setting where the local section ring R(−KX ) := OX ⊕ OX (−KX ) ⊕
OX (−2KX ) ⊕ . . . (also known as the symbolic Rees algebra) is finitely generated.
Most notably, perhaps the most important open problem within tight closure theory is the
question whether weak and strong F -regularity are equivalent or more generally, whether
splinters and strong F -regularity are equivalent (from the characteristic zero perspective,
splinters, weak and strong F -regularity are competing notions of singularities analogous
to KLT singularities that are all known to coincide in the Q-Gorenstein case). These are
known to be equivalent under the KX Q-Cartier hypothesis and under some other conditions
[Sin99, LS01, LS99, AM99]. Previously A. K. Singh announced a proof that splinters with
R(−KR ) finitely generated are strongly F -regular [Sin14]. We recover a new proof of this
result and in fact show something stronger. We prove that the (big) test ideal is equal to
the image of a multiplier-ideal-like construction involving alterations.
Theorem A (Theorem 5.6, Corollary 5.7). Suppose that X is a normal F -finite integral
scheme and that ∆ on X is an effective Q-divisor such that S = R(−KX − ∆) is finitely
generated. Then there exists an alteration π : Y −→ X from a normal Y , factoring through
2010 Mathematics Subject Classification. 14J17, 13A35, 14B05.
Key words and phrases. Anticanonical, test ideal, multiplier ideal.
The fourth named author was supported in part by the NSF FRG Grant DMS #1265261/1501115, NSF
CAREER Grant DMS #1252860/1501102 and a Sloan Fellowship.
1
2
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
X ′ = Proj S so that
τ (X, ∆) = Image π∗ OY (⌈KY − π ∗ (KX + ∆)⌉) −→ OX .
◦ If X is of finite type over a perfect field, one may take Y to be regular by [dJ96].
◦ Alternately, one may take π to be a finite map (in which case Y is almost certainly
not regular).
As a consequence we obtain that
\
τ (X, ∆) =
Image π∗ OY (⌈KY − π ∗ (KX + ∆)⌉) −→ OX
π:Y −
→X
where π runs over all alterations with Y −→ X factoring through X ′ . Alternately, one can
run π over all finite maps. If additionally X is of finite type over a perfect field, then one
can run π over all regular alterations factoring through X ′ .
Actually we prove a stronger theorem allowing for triples (X, ∆, at ) but we don’t include
it here to keep the statement simpler. Note that in characteristic zero, the same intersection
over regular alterations characterized multiplier ideals by [DH09] at least after observing
Remark 2.26.
Inspired by the analog with multiplier ideals [ELSV04], there has been a lot of interest
in showing that the jumping numbers of test ideals are rational and without limit points
[BMS08, BMS09, KLZ09, BSTZ10, Bli13, ST14b, KSSZ14]. At this point, we know that
the F -jumping numbers are discrete and rational for any F -finite scheme X with KX QCartier. We also know discreteness if R(−KX ) is finitely generated and X = Spec R is
the spectrum of a graded ring [KSSZ14]. On the other hand we know that the jumping
numbers of J (X, ∆, at ) are discrete and rational if R(−KX − ∆) is finitely generated (see
Remark 2.26). We prove the following:
Theorem B (Theorem 3.5, Proposition 4.7). Suppose that (R, ∆) is a pair such that
R(−KR − ∆) is finitely generated. Then for any ideal a ⊆ R the F -jumping numbers
of τ (R, ∆, at ) are rational and without limit points.
We prove the discreteness result in two ways. First pass to the local section ring /
symbolic Rees algebra, where the pullback of −KX − ∆ is Q-Cartier. We then show that
the test ideal of the symbolic Rees algebra restricts to the test ideal of the original scheme.
Alternately, in Section 4, we prove the discreteness result for projective varieties by utilizing
the theory developed by the first author and Urbinati [CU15]. In particular, we show a
global generation result for test ideals, Theorem 4.5, which immediately implies the test
ideal result.
Another setting where the Q-Gorenstein hypothesis is used is in the study of non-F -pure
ideals. Recall that if R is F -finite, normal and Q-Gorenstein with index not divisible by p,
then it follows from [HS77, Lyu97, Gab04] that the images of the evaluation-at-1 map
HomR (F∗e R, R) −
→R
stabilize for sufficiently large e. This stable image gives a canonical scheme structure to
the non-F -pure locus of a variety. We generalize this to the case that R(−KR ) is finitely
generated (which includes the case where the index of −KR is divisible by p).
Theorem C (Corollary 3.4, Theorem 3.9, Theorem 4.8). Suppose that R is an F -finite
normal domain and that B ≥ 0 is a Q-divisor with Weil-index not divisible by p. If the
anti-log-canonical algebra R(−KR −B) is finitely generated, then the image of the evaluation
at 1 map HomR (F∗e R((pe − 1)B), R) −→ R stabilizes for e sufficiently divisible.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
3
Again we give several different proofs of this fact utilizing different strategies as above.
Finally, we also show:
Theorem D (Theorem 6.4). Suppose that X is a normal quasi-projective variety over an
algebraically closed field of characteristic zero. Further suppose that ∆ ≥ 0 is a Q-divisor
such that R(−KX − ∆) is finitely generated and also suppose that a ⊆ OX is an ideal and
t ≥ 0 is a rational number. Then
J (X, ∆, at )p = τ (Xp , ∆p , atp )
for p ≫ 0.
This should be compared with [dFDTT15] where the analogous result is shown under the
hypothesis that KX + ∆ is numerically Q-Cartier. This numerically Q-Cartier condition is
somewhat orthogonal to the finite generation of R(−KX −∆). In particular, if R(−KX −∆)
is finitely generated and −KX − ∆ is numerically Q-Cartier then it is not difficult to see
that −KX − ∆ is Q-Cartier, see also [BdFFU15].
Remark 1.1. A previous version of this paper included an incorrect statement in Lemma 2.10.
This version, which also corrects the published version, fixes the statement by making it
weaker. Fortunately, we only needed the weaker statement in all our applications.
Acknowledgements: The authors would like to thank Tommaso de Fernex, Christopher
Hacon, Nobuo Hara, Mircea Mustaţă and Anurag K. Singh for several useful discussions. We
would also like to thank (Juan) Felipe Pérez for several useful comments on a previous draft
of this paper. Finally, we would like to thank the referee for numerous valuable comments
and for pointing out a mistake in a lemma (previously Lemma 2.15, now removed).
2. Preliminaries
In this section we recall the basic properties that we will need of test ideals, local section
rings1, as well as the theory of positivity for non-Q-Cartier divisors as developed by UrbinatiChiecchio [CU15]. We conclude by stating a finite generation result for local section rings of
threefolds in positive characteristic (as a consequence of recent breakthroughs in the MMP).
Setting 2.1. Throughout this paper, all rings will be assumed to be Noetherian, of equal
characteristic p > 0, and F -finite (which implies that they are excellent and have dualizing
complexes [Kun76, Gab04]). All schemes will be assumed to be Noetherian, F -finite, separated and have dualizing complexes. For us a variety is a separated integral scheme of finite
type over an F -finite field. For any scheme X, we use F : X −
→ X to denote the absolute
Frobenius morphism. We also make the following universal assumption:
q
q
(†)
F !ω ∼
=ω .
X
X
This holds for all schemes of essentially finite type over an F -finite field (or even of essentially
of finite type over an F -finite local ring).
Frequently we will also consider divisors on schemes X. Whenever we talk about divisors
∆ on X, we make the universal assumption that X is normal and integral. In particular,
whenever we consider a pair (R, ∆) or (X, ∆), then R or X is implicitly assumed to be
normal.
We make one remark on some nonstandard notation that we use. If R is a normal domain
and D is a Weil divisor on X = Spec R, then we use R(D) to denote the fractional ideal
H 0 (X, OX (D)) ⊆ K(R).
1Also called (divisorial) symbolic Rees algebras in the commutative algebra literature.
4
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
2.1. Test ideals and F -singularities. We now recall the definitions and basic properties
of test ideals. While test ideals were introduced in [HH90], we are technically talking about
the big/non-finitistic test ideal from [LS01, Hoc07]. The particular definition of the test
ideal presented here can be found in [BS13, Definition 9.3.8] among other places.
Definition 2.2 (Test ideals). Suppose that R is an F -finite normal domain, ∆ ≥ 0 is a
Q-divisor, a ⊆ R is a non-zero ideal sheaf and t ≥ 0 is a real number. The test ideal
τ (X, ∆, at )
is the unique smallest nonzero ideal J ⊆ R such that for every e > 0 and every
φ ∈ (F∗e a⌈p
e t⌉
) · HomR (F∗e R(⌈(pe − 1)∆⌉), R) ⊆ HomR (F∗e R, R)
we have that φ(F∗e J) ⊆ J.
If ∆ = 0 then we leave it out writing τ (X, at ). If a = R or t = 0 then we write τ (R, ∆).
It is not obvious that the test ideal exists. However,
Pit can
P be shown that there exists
c ∈ R such that for each 0 6= d ∈ R, we have that c ∈ e>0 φ φ(F∗e (dR)) where φ varies
e
over (F∗e a⌈t(p −1)⌉ ) · HomR (F∗e R(⌈(pe − 1)∆⌉), R), see [Sch11, Lemma 3.21]. This element
c is then called a (big) (R, ∆, at )-test element. We then immediately obtain the following
construction of the test ideal.
Lemma 2.3. With notation as in Definition 2.2, if c is a big (R, ∆, at )-test element, then
XX
τ (R, ∆, at ) =
φ(F∗e (cR))
e≥0 φ
e
φ ranges over elements of (F∗e a⌈t(p −1)⌉ )
e
also range φ over elements of (F∗e a⌈tp ⌉ )
· HomR (F∗e R(⌈(pe − 1)∆⌉), R).
where again
One may
· HomR (F∗e R(⌈(pe − 1)∆⌉), R). Alternately, one may replace e ≥ 0 with e ≫ 0.
Finally, we also have that for any sufficiently large Cartier divisor D ≥ 0 that
X
e
Tre F∗e a⌈tp ⌉ · OX (KX − pe (KX + ∆) − D) .
τ (R, ∆, at ) =
e≥e0
Proof. For the first statement, it is easy to see that c is contained in any ideal satisfying
e
the condition φ(F∗e J) ⊆ J for all φ ∈ (F∗e a⌈t(p −1)⌉ ) · HomR (F∗e R(⌈(pe − 1)∆⌉), R). Hence
so is the sum. Thus the sum is the smallest such ideal.
P
e
e
For the second statement replacing a⌈t(p −1)⌉ with a⌈tp ⌉ obviously we have the τ ⊇
containment. Notice that if c is a test element, then so is dc for any 0 6= d ∈ R. Hence
⌈t(pe −1)⌉ ⊆ a⌈tpe ⌉ for all e. The
one can form the
P original sum with cd for some d so that da
inclusion τ ⊆
follows.
For the e ≫ 0 statement, notice that if J is the sum for e ≫ 0, then we still have
φ(F∗e J) ⊆ J. The final characterization of the test ideal follows immediately from the fact
that
e
e
a⌈tp ⌉ · OX (KX − pe (KX + ∆) − divX (c)) = a⌈tp ⌉ · OX (−D) · H omOX (F∗e OX (⌊pe ∆⌋), OX ).
We notice that any difference coming from the fact that we round down instead of round
up can be absorbed into the difference between D and divX (c).
We also recall some properties of the test ideal for later use.
Lemma 2.4. Suppose that (R, ∆, at ) is as in Definition 2.2. Then:
(a) The formation of τ (R, ∆, at ) commutes with localization and so one can define
τ (X, ∆, at ) for schemes as well.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
5
(b) If s ≥ t, then τ (R, ∆, as ) ⊆ τ (R, ∆, at ).
(c) For any t ≥ 0, there exists an ε > 0 so that if s ∈ [t, t + ε), then τ (X, ∆, at ) =
τ (X, ∆, as ).
(d) If 0 6= f ∈ R and H = V (f ) is the corresponding Cartier divisor, then
f τ (X, ∆, at ) = τ (X, ∆, at ) ⊗ OX (−H) = τ (X, ∆ + H, at ).
Proof. Part (a) follows immediately from Lemma 2.3. Part (d) follows similarly (use the
projection formula). Part (b) is obvious also from Lemma 2.3.
For part (c), this is [BS13, Exercise 9.12]. Let us quickly sketch the proof since we
do not know of a reference where this is addressed in full generality. Choose c 6= 0 a
test element. P
It is P
easy to choose c that works for all all s ∈ [t, t + 1]. We then write
τ (R, ∆, at ) = e≥0 φ φ(F∗e (cdR)) for d some element in a. This sum is a finite sum, say
for e = 0 to e = m. Let ε = p1m . Then
τ (R, ∆, at ) =
m X
X
φ(F∗e (cdR)) =
e
ψ(F∗e (cda⌈tp ⌉ )) ⊆
ψ now runs over HomR (F∗e R(⌈(pe − 1)∆⌉), R).
then see that ⌈t(pe − 1)⌉ + 1 ≥ ⌈(t + ε)pe ⌉ for e
τ (R, ∆, at ) ⊆
m X
X
m X
X
ψ(F∗e (ca⌈tp
e ⌉+1
))
e=0 ψ
e=0 ψ
e=0 φ
where
We
m X
X
≤ m and so
e
ψ(F∗e (ca⌈(t+ε)p ⌉ )) ⊆ τ (R, ∆, at+ε ).
e=0 ψ
The other containment was handled in (b).
Finally, we make one more definition related to test ideals.
Definition 2.5. A triple (X, ∆, at ) as in Definition 2.2 is called strongly F -regular if
τ (R, ∆, at ) = R.
We briefly also recall some formalities of p−e -linear maps and connections with divisors.
Lemma 2.6. Suppose that X = Spec R is an F -finite normal scheme.
(a) There is a bijection between effective divisors ∆ such that (pe − 1)(KR + ∆) ∼ 0
and elements φ of HomR (F∗e R, R) modulo pre-multiplication by units. We use the
following notation for this correspondence:
φ →
7
∆φ ,
∆ →
7
φ∆ .
(b) If φ ∈ HomR (F∗e R, R) corresponds to a Q-divisor ∆φ , then the map
ψ( ) = φ(F∗e (d ·
(c)
))
corresponds to the divisor ∆ψ = ∆φ + pe1−1 div(d).
If φ ∈ HomR (F∗e R, R) and φn := φ ◦ (F∗e φ) ◦ . . .
(n−1)e
◦ (F∗
) : F∗ne R −→ R, then
∆ φn = ∆ φ .
(d) Using the bijection of (a), if ∆ ≥ 0 is any effective R-divisor, then the elements φ
of HomR (F∗e R(⌈(pe − 1)∆⌉) ⊆ HomR (F∗e R, R) (modulo multiplication by units) are
in bijection with divisors ∆φ with ∆φ ≥ ∆ and of course with (pe − 1)(KR + ∆) ∼ 0.
Proof. (a) is just [Sch09, Theorem 3.13]. (b) is a straightforward exercise, see [BS13, Exercise 4.11]. (c) is [Sch09, Theorem 3.11(e)]. (d) is also not difficult to check, see for instance
[ST14a, Definition 6.8].
6
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
2.2. Local section rings of divisors / symbolic Rees algebras. Suppose that X is an
F -finite normal integral Noetherian scheme and Γ is a Q-divisor on X. Then one can form
M
S = R(X, Γ) =
OX (⌊iΓ⌋).
i∈Z≥0
Additionally for any integer n > 0 we use S (n) := R(X, nΓ) to denote the nth Veronese
κ
subalgebra. Note that there is a canonical map OX −
→ S and dually a map Spec S −
→ X of
schemes (note S may not be Noetherian). If S (or equivalently Y = Spec S) is Noetherian,
µ
then we also have Proj S −
→ X. These maps are very well behaved outside of codimension
µ
≥ 2. We recall that the map Proj S −
→ X is called the Q-Cartierization of Γ. It is a small
f
projective morphism Y −
→ X such that the strict transform f∗−1 Γ is Q-Cartier and f -ample.
Moreover, such a map exists if and only if S is Noetherian, [KM98, Lem. 6.2]. When S is
finitely generated, both Spec S and Proj S are normal, see for instance [Dem88] and also
see [Wat81].
Lemma 2.7. Suppose that S is finitely generated and W ⊆ X is a closed subset of codimension ≥ 2. Then κ−1 W and µ−1 W are also codimension ≥ 2 in Spec S and Proj S
respectively. Additionally µ is an isomorphism outside a closed codimension ≥ 2 subset of
X and if Γ is integral, then κ is an A1 -bundle outside a set of codimension 2.
As a consequence, if D is any Q-divisor on X, then we have canonical pullbacks µ∗ D and
∗
κ D.
Proof. Since S is a symbolic Rees algebra (of a module of rank 1), the map µ : Proj S → X
is small, [KM98, Lem. 6.2]. The case for κ can be verified locally on X.
We begin under the assumption that Γ is integral. Let U = Spec R ⊆ X and S ′ = S U .
Suppose that κ−1 W has a codimension 1 component whose support is defined by a prime
height 1 ideal Q in S. By [GHNV90, Lemma 4.3], Q ∩ R is height zero or 1. But this is
impossible since it defines a subset of W , a set of codimension 2. For the case when Γ is
not integral, we observe that the result holds for the Veronese algebra S (n) = R(X, nΓ) for
sufficiently divisible n. But S is a finite S (n) algebra (see the proof of [GHNV90, Lemma
2.4]) and the result follows.
The fact that κ is a A1 bundle, at least outside a set of codimension 2, follows immediately
from the fact that in that case, Γ is an integral Cartier divisor and so the section ring S
looks locally like OX [t] outside a set of codimension 2.
Remark 2.8. When X is separated, the pullback µ∗ Γ coincides with the pullback of de Fernex
and Hacon, [DH09]; see Remark 2.12.
We will be very interested in proving that various section rings are finitely generated and
so recall:
Lemma 2.9. With notation as defined at the start of Section 2.2,
(a) S is finitely generated if and only if S (n) is finitely generated for some (equivalently
any) n > 0.
(b) Suppose that g : Y −→ X is a finite dominant map from another normal integral
Noetherian scheme Y . Let T = R(Y, g∗ Γ). Then T is finitely generated if S is
finitely generated.
Proof. Part (a) is exactly [GHNV90, Lemma 2.4] (although it can also be found in numerous
other sources). For (b) we do not know a good reference but we sketch a proof here. By
(a), we may assume that Γ is integral. It is also harmless to assume that X = Spec A is
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
7
affine and hence so is Y = Spec B. Then we can pass to the category of commutative rings
so that S and T are actually rings (and not sheaves of rings). In particular, we suppress all
g∗ notation that we might otherwise need. We have the diagram
A
/B
/T
S
First choose a single element c ∈ A so that S[c−1 ] ∼
= A[c−1 , t] and T [c−1 ] ∼
= B[c−1 , t]
−1
−1
(here we identify the ts). It follows that S[c ] ⊆ T [c ] is finite and hence integral and
K(S) −
→ K(T ) is a finite extension as well. Let T ′ to be the integral closure of S inside T .
We want to show that T = T ′ which will complete the proof.
Recall we already assumed that Γ is integral. Let W ⊆ X be a closed set of codimension
2 outside of which Γ is Cartier. Consider the functor H 0 (X \ W, ) applied to all of
the rings (or sheaves of rings) involved. As T is a direct sum of reflexive OY -modules,
H 0 (X \ W, T ) = H 0 (Y \ g−1 (W ), T ) is just the global sections of T by Hartog’s Lemma for
reflexive sheaves [Har94]. Thus H 0 (X \ W, T ) is identified with T since X and Y are affine.
On the other hand, κ−1 W is a codimension ≥ 2 subset of Spec S, outside of which T and
′
T obviously agree. Hence H 0 (X \ W, T ) = H 0 (X \ W, T ′ ) = H 0 (Spec S \ κ−1 W, T ′ ). But
T ′ is normal and so we also have that H 0 (Spec S \ κ−1 W, T ′ ) = T ′ . We have just shown
that T = T ′ as desired.
We also will need to understand the canonical divisors of Spec S and Proj S.
Lemma 2.10. Continuing with notation from the start of Section 2.2, assuming that S is
finitely generated, then KProj S ∼ µ∗ KX . If additionally, Γ is a Weil divisor then, locally
on the base, we have that KSpec S ∼ κ∗ KX + κ∗ Γ. In particular, if Γ = −KX − B, then
KSpec S ∼ κ∗ (−B) so that KSpec S + κ∗ B ∼ 0. Thus if Γ = −KX then S is quasiGorenstein.2
Proof. Recall that κ is an A1 -bundle outside a set of codimension 2 and hence κ∗ makes
sense. The computation of KSpec S can be found in [GHNV90, Theorem 4.5]. The initial
statement that KProj S = µ∗ KX is obvious since µ is small.
2.3. Positivity for non-Q-Cartier divisors. In this section we will recall some definitions
and results of [CU15]. Let us recall that, if f : Y → X is a morphism of schemes, a coherent
sheaf F on Y is relatively globally generated, or f -globally generated, if the natural map
f ∗ f∗ F → F is surjective. If Y is a normal scheme and D is a Weil divisor on Y , it
might be that, for example, OY (D) is f -globally generated, but OY (2D) is not. To account
for such pathologies we have to work asymptotically: we will say that a Q-divisor D is
relatively asymptotically globally generated, or f -agg, if OY (mD) is f -globally generated for
all positive m sufficiently divisible.
Let f : Y → X be a projective morphism of normal Noetherian schemes. A Q-Weil
divisor D on X is f -nef if, for every f -ample Q-Cartier Q-divisor A on Y , D + A is f -agg; if
X = Spec k, we will simply say that D is nef, [CU15, Def. 2.4]. The Q-divisor D is f -ample
if, for every ample Q-Cartier Q-divisor A on Y , there exists b > 0 such that bD − A is f -nef
and the algebra of local sections R(X, D) is finitely generated; if X = Spec k, we will say
that D is ample, [CU15, Def. 2.14]. Notice that when D is Q-Cartier, these notions coincide
with the usual ones of nefness and amplitude. We remark that amplitude for Weil divisors
2Also called 1-Gorenstein.
8
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
is given by two conditions: a positivity one – which is based on the fact that the regular
ample cone is the interior of the nef cone – and a technical one – on the finite generation
of the algebra of local sections. These two conditions are independent; in particular there
are examples of Weil divisors A satisfying the positivity condition, but with algebra of local
sections R(X, A) not finitely generated, [CU15, Example 2.20].
These notions of positivity behave very much like in the Q-Cartier world: for example,
if A is an ample Weil Q-divisor, and D is a globally generated Q-Cartier divisor, D + A is
ample, [CU15, Lem. 2.18(i)].
Lemma 2.11. Let E be a Q-divisor on a normal Noetherian projective scheme X over
a field k. If the algebra of local section R(X, E) is finitely generated then there exists a
Cartier divisor L such that L + E is an ample Weil divisor.
Proof. Notice that n(L + E) is ample for some/every n > 0, if and only if L + E is ample,
[CU15, Lem. 2.18(b)]. So, without loss of generality, we can assume that R(X, E) is
generated in degree 1 and that E is integral. Let H be an ample Cartier divisor. By
definition, there exists m > 0 such that OX (mH + E) is globally generated. There is a
surjection
OX (E)⊗n ։ OX (E)·n = OX (nE),
where the last equality is a consequence of the assumption on the finite generation of the
algebra of local sections. Thus, for each n > 0, OX (n(mH+E)) is globally generated, that is,
mH + E is asymptotically globally generated. Moreover, since H is Cartier, R(X, mH + E)
is also finitely generated. By [CU15, Lem. 2.18(i)], mH + E + H = (m + 1)H + E is
ample.
The main characterization of the above positivity is in terms of their Q-Cartierization.
Let X is a normal projective Noetherian scheme over an algebraically closed field k, and
µ
let D be a Q-divisor with S = R(X, D) finitely generated. Let Proj S −
→ X. Notice that
′
D ′ = µ−1
∗ D is Q-Cartier. Then D is nef/ample if and only if so is D , [CU15, Theorems 3.3
and 3.6].
Using this characterization, Urbinati and the first author proved Fujita vanishing for
locally free sheaves, [CU15, Cor. 4.2]. Let X be a normal projective Noetherian scheme
over an algebraically closed field k, let A be an ample Q-divisor on X and let F be a locally
free coherent sheaf on X. There exists an integer m(A, F ) such that
H i (X, F ⊗ OX (mA + D)) = 0
for all positive m divisible by m(A, F ), all nef Cartier divisors D, and all i > 0.
2.4. Pullback of Weil divisors. Let f : Y → X be a proper birational morphism of
normal Noetherian separated schemes. In [DH09], de Fernex and Hacon introduced a way
of pulling back a Weil divisor on X via f .
For any Weil divisor D on X, the ♮-pullback of D along f , denoted by f ♮ D, is the Weil
divisor on Y such that
(2.11.1)
OY (−f ♮ D) = (OX (−D) · OY )∨∨ ,
[DH09, Def 2.6]. The negative sign appearing is so that, when D is effective, we are pulling
back the ideal defining it as a subscheme. The pullback of D along f is
f ∗ D = lim inf
m
f ♮ (m!D)
f ♮ (mD)
= lim
m
m
m!
coefficient-wise.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
9
The above is well-defined, the infimum limit over m is a limit over m! and an R-divisor,
[DH09, Lem. 2.8 and Def. 2.9]. Moreover, the above definition of f ∗ coincides with the
usual one whenever D is Q-Cartier, [DH09, Prop. 2.10].
Remark 2.12. If f : Y → X is a small, projective birational morphism, then f ∗ D = f∗−1 D
This notion of pullback is not quite functorial, unfortunately. Let f : Y → X and
g : V → Y be two birational morphisms of normal Noetherian separated schemes, and
D be a Weil divisor on X. The divisor (f g)♮ (D) − g♮ f ♮ (D) is effective and g-exceptional.
Moreover, if OX (−D) · OY is an invertible sheaf, (f g)♮ (D) = g♮ f ♮ (D), [DH09, Lem. 2.7].
Lemma 2.13. Let X be a normal Noetherian scheme. Let D be a Weil divisor on X,
µ
such that S = R(X, D) is finitely generated; let X ′ = Proj S −
→ X and let D ′ := µ−1
∗ D.
′
′
′
Then OX (mD) · OX = OX (mD ) for all positive m sufficiently divisible. In particular
OX (mD) · OX ′ is reflexive for m sufficiently divisible.
Proof. Since D ′ is µ-ample, see [KM98, Lemma 6.2], OY ′ (mD ′ ) is µ-globally generated for
all positive m sufficiently divisible, that is, the natural map
µ∗ µ∗ OX ′ (mD ′ ) → OX ′ (mD ′ )
is surjective for positive m sufficiently divisible. Since µ is small, µ∗ OX ′ (mD ′ ) = OX (mD)
for all integers m (this is well-known, for a proof see [Chi14, Lemma 2.8]). Thus, for all
positive m sufficiently divisible, we have a surjection
µ∗ OX (mD) ։ OX ′ (mD ′ ).
Notice that OX ′ · OX (mD) is isomorphic to the quotient of µ∗ OX (mD) by its torsion,
[Har77, Caution II.7.12.2]. Since OX ′ (mD ′ ) is torsion free, the above surjection induces a
surjection
OX ′ · OX (mD) ։ OX ′ (mD ′ ).
On the other hand, since µ is small, for all integers m, OX ′ (mD ′ ) = OX ′ · OX (mD) ∨∨ ;
since OX ′ · OX (mD) is torsion-free, we have a natural inclusion
OX ′ · OX (mD) ֒→ OX ′ (mD ′ ).
Lemma 2.14. Let X be a normal Noetherian separated scheme. Let D be a Weil divisor
µ
on X, such that R(X, −D) is finitely generated, and let Proj R(X, −D) −
→ X. Let f :
g
µ
Y → X be any birational morphism factoring as Y −
→ Proj R(X, −D) −
→ X, with Y
a normal Noetherian separated scheme. Then, for any positive m sufficiently divisible,
f ♮ (mD) = g♮ µ♮ (mD) = g∗ µ♮ (mD). Therefore, f ∗ (D) = g∗ µ∗ (D).
Proof. This is an application of Lemma 2.13 which we now explain. Consider the following chain of equalities. The first and last equalities are by definition and the third is by
Lemma 2.13 since m is sufficiently divisible:
=
=
=
=
OY (−f ♮ mD)
OX (−mD) · OY
OX (−mD) · OX ′ · OY
OX ′ (−µ♮ mD) · OY
OY (−g ♮ µ♮ mD)
This proves the first statement. The final statement is a consequence of the fact that
1 ♮mD
= µ∗ (D) for m sufficiently divisible by our finite generation hypothesis.
mµ
10
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
g
f
→Y −
→X
Lemma 2.15. Suppose we have a composition of birational morphisms f ′ : Y ′ −
∗
′∗
between normal varieties and D is a Weil on X, then f D = g∗ f D.
Proof. To check the identity it suffices to show ordE (f ∗ D) = ordE (g∗ f ′∗ D) for each prime
divisor E on Y . The generic point of each prime divisor E on Y gives rise to a DVR
(AE , mE ). For any sufficiently divisible positive integer m, set νE (mD) the power of mE
agreeing with OX (−mD)AE ; so by definition ordE (f ∗ D) = lim νE (mD)/m. A similar calculation computes f ′∗ D on Y ′ . Finally, as g is birational g∗ f ′∗ D keeps the same coefficients
on divisors that are not contracted by g, thus, ordE (f ∗ D) = ordE (g∗ f ′∗ D) for each prime
divisor E on Y, as desired.
We define multiplier ideals in a way which is a slight generalization of the one of [DH09].
Definition 2.16. Let X be a normal quasi-projective variety
an algebraically closed
Q aover
k
field of characteristic zero, ∆ an R-Weil divisor, and I = Jk a formal R-linear product
of non-zero fractional ideal sheaves. The collection of the data of X, ∆ and I will be called
a triple,
Q and it will be denoted by (X, ∆, I). We say that the triple is effective if ∆ ≥ 0,
I = Jkak where all the Jk s are ideals and ak ≥ 0 for all k.
Remark 2.17. Notice that we do not assume that KX + ∆ is R-Cartier.
Remark 2.18. A triple is effective if and only if (X, ∆ + I) is an effective pair in the sense
of [DH09, Definition 4.3].
Definition 2.19. Let (X, ∆, I) be an effective triple, and let m be a positive integer. Let
f : Y → X be a log resolution Q
of the pair (X, OX (−m(KX + ∆)) + I), [DH09, Definition
4.1 and Theorem 4.2]. Let I = Jkak be a formal product, and OY · Jk = OX (−Gk ). We
define the sheaf
X
1
ak Gk ⌉).
Jm (X, ∆, I) := f∗ OY (⌈KY − f ♮ (m(KX + ∆)) −
m
Remark 2.20. The reason for this new notation is that our notation is slightly more general
than the one of [DH09]. In particular, de Fernex and Hacon did not include a boundary
divisor term.
This might cause some confusion since the reader might think one could absorb the divisor
∆ into the ideal I (indeed, what is a divisor but a formal combination of height 1 ideals).
Unfortunately, this does not yield the same object (and in particular, does not yield the
usual multiplier ideal even when KX + ∆ is Q-Cartier). The difference is that asymptotics
are already built into Q-Cartier KX + ∆ whereas no asymptotics are built into I in [DH09].
In particular, let I (∆) denote the formal product of ideals corresponding to ∆ in the
obvious way. Then in general, Jm (X, ∆, I) ⊇ Jm (X, I · I (∆)): we have
X
1
ak Gk ⌉)
Jm (X, I · I (∆)) = f∗ OY (⌈KY − f ♮ (mKX ) − f ♮ ∆ −
m
X
1
1
⊆ f∗ OY (⌈KY − f ♮ (mKX ) − f ♮ (m∆) −
ak Gk ⌉)
m
m
X
1
ak Gk ⌉)
⊆ f∗ OY (⌈KY − f ♮ (mKX + m∆) −
m
= Jm (X, ∆, I).
Here the first containment is [DH09, Lemma 2.8] and the second is a consequence of [DH09,
Remark 2.11].
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
11
Lemma 2.21. Let (X, ∆, I) be an effective triple. The sheaf Jm (X, ∆, I) is a (coherent)
sheaf of ideals on X, and its definition is independent of the choice of f .
Proof. The proof proceeds as in the proof of [DH09, 4.4].
Lemma 2.22. Let (X, ∆, I) be an effective triple. The set of ideal sheaves {Jm (X, ∆, I)}m≥1
has a unique maximal element.
Proof. For any positive integers m, q, Jm (X, ∆, I) ⊆ Jmq (X, ∆, I) by [DH09, Remark 3.3]
(by the previous lemma the two ideals can be computed on a common resolution). The
unique maximal ideal exists by Noetherianity.
Definition 2.23. Let (X, ∆, I) be an effective triple. We will call the unique maximal
element of {Jm (X, ∆, I)}m≥1 the multiplier ideal of the triple (X, ∆, I), and we will denote
it by J (X, ∆, I).
Remark 2.24. In the case when ∆ = 0 we write J (X, I) = J (X, 0, I) and then our definition
agrees with the one in [DH09].
Corollary 2.25. Working in characteristic zero, suppose R(−KX −∆) is finitely generated
and X ′ = Proj R(−KX − ∆) just as before. Let a be any ideal sheaf on X, then we have
J (X, ∆, at ) = µ∗ J (X ′ , µ∗ ∆, (a · OX ′ )t ).
Proof. Let π : ProjX R(X, D) = X ′ → X and ∆′ := π∗−1 ∆. It is enough to show that, for
every m satisfying the result of Lemma 2.13,
π∗ J ((X ′ , ∆′ ); tI · OX ′ ) = Jm (X, ∆, tI).
Q
Let f : Y → X be a log resolution of (X, m∆ + I) factoring through X ′ . Let I = Jkak
and let Jk · OY = O(−Gk ); since OY · I = OY · OX ′ · I, f is a log resolution of ((X ′ , ∆′ ); I).
Let g : Y → X ′ . Since (X ′ , ∆′ ) is a log pair, the multiplier ideal J ((X ′ , ∆′ ); tI · OX ′ ) is
X
tak Gk ⌉).
J ((X ′ , ∆′ ); tI · OX ′ ) = g∗ OY (⌈KY − g ∗ (KX ′ + ∆′ ) −
On the other hand, for each m ≥ 1, the multiplier ideal Jm (X, ∆; tI) is
X
1
Jm (X, ∆, tI) = f∗ OY (⌈KY − f ♮ (m(KX + ∆)) −
tak Gk ⌉).
m
For each m satisfying OX (m(−KX − ∆)) · OX ′ = OX ′ (m(−KX ′ − ∆′ )), by Lemma 2.14,
f ♮(m(KX + ∆)) = g ∗ π ♮ (m(KX + ∆)) = g ∗ (m(KX ′ + ∆′ )) = mg ∗ (KX ′ + ∆′ ).
Therefore, for each m satisfying OX (m(−KX − ∆)) · OX ′ = OX ′ (m(−KX ′ − ∆′ )),
X
1
tak Gk ⌉) =
Jm (X, ∆, tI) = f∗ OY (⌈KY − f ♮ (m(KX + ∆)) −
m
X
tak Gk ⌉) =
= f∗ OY (⌈KY − g∗ (KX ′ + ∆′ ) −
X
tak Gk ⌉) =
= π∗ g∗ OY (⌈KY − g∗ (KX ′ + ∆′ ) −
= π∗ J ((X ′ , ∆′ ); tI · OX ′ ).
Remark 2.26. With the assumptions of Corollary 2.25, it follows immediately that the
jumping numbers of J (X, ∆, at ) are rational and without limit points. Recall that the
12
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
jumping numbers are real numbers t0 ≥ 0 such that J (X, ∆, at0 −ε ) 6= J (X, ∆, at0 ) for any
ε > 0. It also follows that
\
TrY /X
J (X, ∆, at ) =
Image π∗ OY (⌈KY − π ∗ (KX + ∆) − tG⌉) −−−−→ OX
π:Y −
→X
where π runs over all alterations factoring through µ : X ′ −
→ X such that aOY = OY (−G)
is invertible.
2.5. Finite generation of local section rings for threefolds in characteristic p > 5.
Of course, one might ask how often it even happens that a section ring R(X, D) is finitely
generated. For (pseudo-)rational surface singularities of any characteristic, it is known that
D is always locally torsion in the divisor class group, see [Lip69, Theorem 17.4], and so
obviously R(D) is finitely generated. However, for threefolds, rational singularities are not
enough by an example of Cutkosky, [Cut88], even if they are additionally log canonical. Of
course, in characteristic zero, the finite generation of these section rings holds for KLT X of
any dimension by the minimal model program [Kol08, Theorem 92] (and of course is closely
linked with the existence of flips).
Using the recent breakthroughs on the minimal model program for threefolds in characteristic p > 5 [Bir13, Xu15, CTX13, HX15, BW14] one can prove finite generation of
R(X, D) in some important cases (again in dimension 3, characteristic p > 5). The proof
is essentially the same as it is in characteristic zero, see [Kol08, Exercises 108 and 109], but
we reproduce it here for the reader’s convenience.
Theorem 2.27. Let (X, ∆) be a KLT pair of dimension 3 with KX + ∆ Q-Cartier over an
algebraically closed field k of char p > 5. Then, for any Q-divisor D, the algebra R(X, D)
is finitely generated.
b−
Proof. Let φ : X
→ X be a small Q-factorialization of X, which exists by [Bir13, Theorem
b
b to be the strict transforms of ∆ and D on X.
b Then we notice that
1.6]. Set ∆ and D
b + (1/m)D
b is
b ∆
b + (1/m)D)
b is KLT for m ≫ 0. By [Bir13, Theorem 1.3], since K b + ∆
(X,
X
big over X, we see that
M
b + (1/m)D))
b
φ∗ OXb (n(KXb + ∆
n≥0
is finitely generated. Since φ is small, this implies that
M
OX (n(KX + ∆ + (1/m)D))
n≥0
is finitely generated as well (since the algebras are the same). However, by taking a high
Veronese, and recalling that KX + L
∆ is Q-Cartier (and so locally, contributes nothing to
finite generation) we conclude that n≥0 OX (nD) is finitely generated as desired.
Of course this also implies that strongly F -regular pairs have finitely generated local
section algebras since they are always KLT for an appropriate boundary by [SS10].
3. Stabilization, discreteness and rationality via Rees algebras
In this section we aim to prove discreteness and rationality of jumping numbers of test
ideals as well as Hartshorne-Speiser-Lyubeznik-Gabber-type stabilization results under the
hypothesis that the anti-canonical algebra S = R(−KR ) is finitely generated. We first
notice that we can extend p−e -linear maps on R to p−e -linear maps on S. Note that this
argument is substantially simpler than what the fourth author and K. Tucker did to obtain
similar results for finite maps in [ST14a].
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
13
Lemma 3.1. Suppose that R is an F -finite normal domain, D is a Weil divisor on Spec R
with associated algebra S := R(D). Then for any R-linear map φ : F∗e R −→ R we have an
induced S-linear map φS : F∗e S −→ S and a commutative diagram
F∗e R
φ
φS
/ R
_
_
F∗e S
/S
F∗e ρ
ρ
F∗e R
/R
φ
where ρ is the projection map onto degree zero S −→ R.
Proof. First note that we give F∗e S a Z[ p1e ]-graded structure so that our induced map φS
will be homogeneous. The idea is then simple, given an integer i ≥ 0, [F∗e S]i = F∗e R(ipe D).
We want to show that
φ(F∗e R(ipe D)) ⊆ R(iD).
(3.1.1)
But this is obvious since it holds in codimension 1 and all the sheaves are reflexive. Finally,
we simply have φS send [F∗e S]i/pe to zero if i is not divisible by pe . This completes the
proof.
In fact, it is not difficult to see that every homogeneous p−e -linear map on S comes from
R in this way.
Lemma 3.2. Suppose R is an F -finite normal domain, D a Weil divisor on Spec R, and
S = R(D), suppose we have a homogeneous map φS : F∗e S −→ S (again we give F∗e S the
Z[1/pe ]-grading). Then φS is induced from φS |R = φ : F∗e R −→ R as in Lemma 3.1.
Proof. Choose F∗e z ∈ [F∗e S]i = F∗e R(pe iD), invert an element u ∈ S0 = R to make D Cartier
e
and principal and then z = (f /um )y p where y generates R(iD)[u−1 ] and the element
f /um ∈ R[u−1 ] ⊆ S[u−1 ] is in degree zero in S[u−1 ]. We see that
e
ump z = f um(p
e −1)
e
y p ∈ F∗e R(pe iD).
e
e
e
e
Hence um φS (F∗e z) = φS (F∗e ump z) = φS (F∗e f um(p −1) y p ) = yφS (F∗e f um(p −1) ). The point
is that we can choose the same y regardless of the choice of z. Hence φS is completely
determined by φS |R .
Lemma 3.1 is key in the following proposition which lets us relate p−e -linear maps in
general on R and S.
Proposition 3.3. Suppose that R is an F -finite normal domain, D is a Weil divisor, and
the algebra S = R(D) is finitely generated (and in particular an F -finite Noetherian ring).
Further suppose that G is an effective Weil divisor on Spec R with pullback h∗ G = GS on
Spec S. Then we have a commutative diagram
HomS (F∗e S(GS ), S)
/ HomS (F e S, S)
∗
ES =eval@1
/S
γ
ν
HomR (F∗e R(G), R)
ρ
/ HomR (F e R, R)
∗
ER =eval@1
/ R.
14
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
Here the map ρ is projection onto the 0th coordinate [S]0 = R and γ is the map which
restricts φ ∈ HomS (F∗e S, S) to F∗e R = [F∗e S]0 and then projects onto [S]0 = R. Furthermore
the maps γ and ν are surjective.
Proof. We first handle the commutativity. Given ψ ∈ HomS (F∗e S, S), we see that ρ(ES (ψ)) =
ρ(ψ(1)). On the other hand ER (γ(ψ)) = ρ(ψ(1)) as well. Hence we have commutativity of
the right square. The commutativity of the left square is obvious since GS is pulled back
from Spec R
To see that γ is surjective, for any φ ∈ HomR (F∗e R, R) construct φS as in Lemma 3.1.
Obviously γ(φS ) = φ. Similarly, Lemma 3.1 implies the surjectivity of the map ν.
As an immediate corollary we obtain a stabilization result similar to Hartshorne-SpeiserLyubeznik-Gabber.
Corollary 3.4. Suppose that R is an F -finite normal domain and that B ≥ 0 is a Weil
divisor. If the anti-log-canonical algebra R(−KR − B) is finitely generated, then the image
of the evaluation-at-1 map HomR (F∗e R((pe − 1)B), R) −→ R stabilizes for e ≫ 0.
Proof. Set S = R(−KR − B) and consider the diagram of Proposition 3.3. Since KS + h∗ B
is Cartier, we see that the images of
eval@1
ESe : HomS (F∗e S((pe − 1)h∗ B), S) −−−−→ S
stabilize, see for instance [FST11]. But then since ν, as in Proposition 3.3, surjects, we see
that the image of
(3.4.1)
ν
eval@1
HomS (F∗e S((pe − 1)B), R) −
→ F∗e HomR (F∗e R((pe − 1)B), R) −−−−→ R
Ee
R
R. But the image of (3.4.1) is the
coincides with that of HomR (F∗e R((pe − 1)B), R) −−→
same as the image of
Ee
ρ
S
HomS (F∗e S((pe − 1)h∗ B), S) −−→
S−
→ R.
However the ESe have stable image as we have already observed and the result follows.
Later in Theorem 3.9, we will obtain the same result for Q-divisors whose Weil-index is
not divisible by p. For now though, we move on to discreteness and rationality of F -jumping
numbers, generalizing [KSSZ14, Theorem 6.4] from the case of a graded ring R.
Theorem 3.5. Suppose that R is a normal domain and ∆ ≥ 0 is an effective Q-divisor
such that R(−KR − ∆) is finitely generated. Then for any ideal a ⊆ R the F -jumping
numbers of τ (R, ∆, at ) are rational and without limit points.
Proof. First let R ⊆ R′ be a separable extension of normal F -finite domains corresponding
ν
→ X = Spec R such that ν ∗ ∆ is an integral divisor (this
to a map of schemes Spec R′ = X ′ −
is easy, the idea is to simply take roots of generators of DVRs, if one has to take a pth root,
′
use Artin-Schreyer type equations see [BST15, Lemma 4.5]). Let Tr : K(X
→ K(X)
) −
′
∗
′
t
be the trace map and then recall that Tr ν∗ τ (X , ν ∆ − Ramν , (aR ) ) = τ (X, ∆, at )
by the main result of [ST14a]. It immediately follows that if the F -jumping numbers of
test ideal τ (X ′ , ν ∗ ∆ − Ramν , at ) are discrete and rational, so are the F -jumping numbers
of τ (X, ∆, at ). Additionally, by adding a Cartier divisor H to ∆, we can assume that
ν ∗ ∆ − Ramν is effective since τ (X, ∆ + H, at ) = τ (X, ∆, at ) ⊗ OX (−H) by Lemma 2.4(d).
Finally, note that
−KR′ − ν ∗ ∆ + Ramν = ν ∗ (−KR − ∆)
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
15
and so R(−KR′ − ν ∗ ∆ + Ramν ) is finitely generated by Lemma 2.9. The upshot of this
entire paragraph is of course that we may now without loss of generality assume that ∆ is
an integral effective divisor.
Next choose c ∈ R that is a test element for both ((R, ∆) and S := R(−KR − ∆). The
choice of such a c is easy, simply choose a test element so that additionally −KR − ∆ is
Cartier on X \ V (c). Away from V (c), S looks locally like R[t] which will certainly be
strongly F -regular over wherever R is strongly F -regular [HH94]. Let H be the Cartier
divisor corresponding to c and consider the commutative diagram.
(F∗e (aS)⌈t(p
e
−1)⌉ )
· HomS (F∗e S(h∗ (pe − 1)∆ + h∗ H), S)
/
e
−1)⌉ )
eval@1
/
S
ρ
γ
ν
(F∗e a⌈t(p
HomS (F∗e S, S)
· HomR (F∗e R((pe − 1)∆ + H), R)
/
HomR (F∗e R, R)
eval@1
/
R.
The sum over e > 0 of the images of the bottom rows is equal to τ (R, ∆, at ) and the
sum over e > 0 of the images of the top row is equal to τ (S, h∗ ∆, (aS)t ). Since ν surjects by Proposition 3.3, we immediately see that ρ(τ (S, h∗ ∆, (aS)t )) = τ (R, ∆, at ). But
now observe that KS + h∗ ∆ ∼ 0 by Lemma 2.10. But then the F -jumping numbers of
τ (S, h∗ ∆, (aS)t ) are discrete and rational by [ST14b]. The result follows.
We immediately obtain the following using the aforementioned breakthroughs in the
MMP.
Corollary 3.6. Suppose that R is strongly F -regular, of dimension 3, and of finite type
over an algebraically closed field of characteristic p > 5. Then the F -jumping numbers
τ (R, ∆, at ) are rational and without limit points for any choice of Q-divisor ∆ and ideal a.
Proof. Since R is strongly F -regular, there exists a divisor Γ ≥ 0 so that KR + Γ is QCartier and so that (R, Γ) is KLT by [SS10]. The result then follows from Theorem 2.27
and Theorem 3.5.
Of course, we also obtain discreteness and rationality of F -jumping numbers τ (R, ∆, at )
for any R, a 3-dimensional ring of finite type over an algebraically closed field k of characteristic p > 5 such that there exists a Γ ≥ 0 so that (R, Γ) is KLT.
3.1. A more general Hartshorne-Speiser type result. In Corollary 3.4, we used a
compatibility of the formation of Rees algebras to prove that the images of HomR (F∗e R, R) −
→
R stabilize for large e if S := R(−KR ) is finitely generated. In this short section, we generalize this result to the case of Q-divisors, at least whose Weil-index is not divisible by p. As
an alternate strategy, one could try to prove compatibilities analogous to Proposition 3.3
for Rees algebras of Q-divisors. Unfortunately this gets quite messy. Instead we take a
different approach utilizing Proj S. We first prove the result for Q-Gorenstein varieties and
then we handle the finitely generated case via the small map µ : X ′ −
→ X.
We do restrict ourselves to the case where the Weil-index of KX + ∆ is not divisible by
p. We realize that the methods we discuss here can apply to more general situations but
there are then several potential competing definitions for what the stable image should be.
Proposition 3.7. Suppose that (R, ∆ ≥ 0) is a pair such that KR +∆ is Q-Cartier. Suppose
that the Weil index of KR + ∆ is not divisible by p and that (pe − 1)(KR + ∆) is an integral
Weil divisor. Then
E ne =eval@1
σne (R, ∆) := Image HomR (F∗ne R((pne − 1)∆), R) −−−−−−−−→ R
stabilizes for large n.
16
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
Proof. Fix m > 0 so that m(KR + ∆) is a Cartier divisor. The main idea is that module
HomR (F∗ne R((pne −1)∆), R) only takes on the values of finitely many sheaves, at least up to
twisting by line bundles (in particular, multiples of R(m(KR + ∆)). We also take advantage
of the fact that it is sufficient to show that the images stabilize partially up the chain.
Claim 3.8. Fix n0 > 0 and consider n ≥ n0 . Then
E ne =eval@1
HomR (F∗ne R((pne − 1)∆), R) −−−−−−−−→ R
factors through
E n0 e =eval@1
HomR (F∗n0 e R((pn0 e − 1)∆), R) −−−−−−−−→ R.
Hence it is sufficient to show that the images of HomR (F∗ne R((pne − 1)∆), R) in
HomR (F∗n0 e R((pn0 e − 1)∆), R)
stabilize.
Proof of claim. One simply notices that
p(n−n0 )e (pn0 e − 1)∆ ≤ (pne − 1)∆
ne
and hence (R((pne − 1)∆))1/p contains (R((pn0 e − 1)∆))1/p
ization occurs simply by restriction of scalars.
n0 e
. Thus the claimed factor
We continue on with the main proof. Note that pt (mod m) is eventually periodic. Then
choose a linear function θ(a) = ca+r, for c > 0, r ≥ 0, c, r ∈ Z, such that (pθ(a)e −1) (mod m)
is constant. Set
M = R(((1 − pre ) (mod m))(KR + ∆)) = R(((1 − pθ(0)e ) (mod m))(KR + ∆))
and note that for any a ≥ 0,
θ(a)e
∼
=
∼
=
∼
=
R((pθ(a)e − 1)∆), R)
HomR (F∗
θ(a)e
R((1 − pθ(a)e )(KR + ∆))
F∗
θ(a)e
θ(a)e
F∗
R(((1 − pθ(a)e ) (mod m))(KR + ∆)) ⊗ R(⌊ 1−pm ⌋m(KR + ∆))
θ(a)e
θ(a)e
M ⊗ R(⌊ 1−pm ⌋m(KR + ∆))
F∗
By inverting an element of R if necessary, we may assume that m(KR + ∆) ∼ 0. Thus
by utilizing this, we have maps
t
θ(a)e
a
. . . −→
F∗
ta−1
θ(a−1)e
M −−−→ F∗
t
θ(1)e
1
M−
→ ... −
→
F∗
t
θ(0)e
0
M−
→
F∗
M.
If these maps are Frobenius pushforwards of each other, i.e. F∗ce ta−1 = ta (or at least up
to a unit), then we can apply the standard Hartshorne-Speiser-Lyubeznik-Gabber theorem
θ(0)e
M . But this may be checked in
[Gab04] to conclude that the images stabilize in F∗
codimension 1 (since all sheaves are reflexive and so maps between them are determined in
codimension 1). However, after localizing to reduce to codimension 1, all the complicated
twisting we have done is irrelevant. Furthermore, in codimension 1, R is Gorenstein with
KR ∼ 0 and ∆ is Q-Cartier with index not divisible by p > 0 (since its Weil index was not
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
17
divisible by p > 0). Our chain of maps then just turns into
θ(a)e
HomR (F∗
/ HomR (F∗θ(a−1)e R((pθ(a−1)e − 1)∆), R) −
→ ...
O
R((pθ(a)e − 1)∆), R)
O
∼
∼
θ(a)e
F∗
ωR (−pθ(a)e (KR ) − (pθ(a)e − 1)∆)
O
Tr
/ F∗θ(a−1)e ωR (−pθ(a−1)e (KR ) − (pθ(a−1)e − 1)∆)
O
∼
(ca+r)e
F∗
∼
ωR (−(p(ca+r)e − 1)∆)
Tr
/ F∗(c(a−1)+r)e ωR (−(p(c(a−1)+r)e − 1)∆).
The bottom horizontal map is then obtained via
(ca+r)e
ωR (−(p(ca+r)e − 1)∆)
F∗
(ca+r)e
ωR (−pce (p(c(a−1)+r)e − 1)∆)
֒→ F∗
Tr
(c(a−1)+r)e
−→ F∗
ωR (−(p(c(a−1)+r)e − 1)∆).
Note the inclusion ֒→ can be identified with multiplication by a defining equation for
−pce (p(c(a−1)+r)e − 1)∆ + (p(ca+r)e − 1)∆ = (pce − 1)∆.
This is independent of a and so the maps in our chain are really the same, up to pushforward,
as claimed.
Note that this completes the proof. Even though we only proved stabilization of images
for a subset of ne > 0, these images are descending and our subset is infinite.
Now we are in a position to prove Corollary 3.4 in the more general situation.
Theorem 3.9. Suppose that R is an F -finite normal domain and that B ≥ 0 is a Q-divisor
with Weil-index not divisible by p. If the anti-log-canonical algebra R(−KR − B) is finitely
generated, then the image of the evaluation at 1 map HomR (F∗e R((pe − 1)B), R) −→ R
stabilizes for e sufficiently divisible.
Proof. For this proof, we will phrase our evaluation-at-1 maps in terms of the trace
F∗e R((1 − pe )(KR + B)) −
→ R.
We thus fix an e > 0 so that (pe − 1)(KR + B) is an integral Weil divisor.
Let µ : X ′ = Proj R(−KR − B) −
→ X = Spec R be as before. We observe that
∗
µ (−KR − B) is Q-Cartier and also still has Weil-index not divisible by p by Lemma 2.9.
Hence the images
(3.9.1)
... −
→
−
→
−
→
−
→
−
→
(n+1)e
OX ′ ((1 − p(n+1)e )(KX ′ + µ∗ B))
F∗
ne
F∗ OX ′ ((1 − pne )(KX ′ + µ∗ B))
...
F∗e OX ′ ((1 − pe )(KX ′ + µ∗ B))
OX ′
stabilize by Proposition 3.7. In fact, the same argument even shows that the images
even stabilize in any finite stage, such as in F∗ne OX ′ ((1 − pne )(KX ′ + µ∗ B)). However, the
terms and maps in this chain take on finitely many values up to twisting by (large) Cartier
multiples of −(KX ′ + µ∗ B) (as argued in Proposition 3.7). Our goal is to thus show that
these images stabilize after pushing forward by µ.
18
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
Claim 3.10. If one applies µ∗ to (3.9.1), obtaining
. . . −→ µ∗ F∗ne OX ′ ((1−pne )(KX ′ +µ∗ B)) −→ . . . −→ µ∗ F∗e OX ′ ((1−pe )(KX ′ +µ∗ B)) −→ µ∗ OX ′
then the chain of images in OX = µ∗ OX ′ still stabilizes.
Proof of claim. Choose d > 0 so that
(n+d)e
→ F∗ne OX ′ ((1−pne )(KX ′ +µ∗ B))
OX ′ ((1−p(n+d)e )(KX ′ +µ∗ B)) −
(3.10.1) Image F∗
is equal to the stable image, which we denote by F∗ne σne , for all n ≥ 0 (note by Proposition 3.7
there are finitely many conditions). Observe that there are only finitely many σne up to
twisting by (large) multiples of −(KX ′ +µ∗ B). The fact that −(KX ′ +µ∗ B) is ample implies
that there exists an n0 ≥ 0 so that for any n ≥ n0 ,
F∗ne µ∗ σne
(n+d)e
−
→ F∗ne µ∗ OX ′ ((1 − pne )(KX ′ + µ∗ B))
µ∗ OX ′ ((1 − p(n+d)e )(KX ′ + µ∗ B))
= Image F∗
(n+d)e
−
→ F∗ne µ∗ σne
µ∗ OX ′ ((1 − p(n+d)e )(KX ′ + µ∗ B))
= Image F∗
(n+2d)e
→ F∗ne µ∗ OX ′ ((1 − pne )(KX ′ + µ∗ B)) .
µ∗ OX ′ ((1 − p(n+2d)e )(KX ′ + µ∗ B)) −
= Image F∗
(n+2d)e
But the map F∗
factors through
(n+2d)e
F∗
→ F∗ne µ∗ OX ′ ((1−pne )(KX ′ +µ∗ B))
µ∗ OX ′ ((1−p(n+2d)e )(KX ′ +µ∗ B)) −
(n+d)e
→ F∗
µ∗ OX ′ ((1 − p(n+2d)e )(KX ′ + µ∗ B)) −
µ∗ OX ′ ((1 − p(n+d)e )(KX ′ + µ∗ B))
which has image µ∗ σ(n+d)e by our assumption that (3.10.1) is the stable image, applied
(n+d)e
to the choice of n = n + d. It follows that F∗
(n+c)e
n and so by composition, F∗
µ∗ σ(n+d)e −
→ F∗ne µ∗ σne surjects for all
µ∗ σ(n+c)e −
→ F∗ne µ∗ σne surjects for every n ≥ n0 and
(n+c)e
every c ≥ d (note n does not depend on c). Thus since F∗
(n+d+c)e
OX ′ ((1
µ∗ F∗
−
p(n+d+c)e )(KX ′
+
µ∗ B)),
µ∗ σ(n+c)e is the image of
we see that
(n+c)e
→ F∗ne µ∗ OX ′ ((1 − pne )(KX ′ + µ∗ B))
µ∗ OX ′ ((1 − p(n+c)e )(KX ′ + µ∗ B)) −
Image F∗
(n+c)e
→ F∗ne OX ′ ((1 − pne )(KX ′ + µ∗ B))
OX ′ ((1 − p(n+c)e )(KX ′ + µ∗ B)) −
= µ∗ Image F∗
= µ∗ σne
for all n ≥ n0 and all c ≥ 2d. This clearly proves the desired stabilization.
We return to the proof of theorem. But this is trivial once we observe that
F∗ne µ∗ OX ′ ((1 − pne )(KX ′ + µ∗ B)) = F∗ne OX ((1 − pne )(KX + B))
since µ is small. Hence the proof is complete.
4. Stabilization and discreteness via positivity
In the previous section we showed the discreteness and rationality of F -jumping numbers
via passing to the local section algebra (i.e. a symbolic Rees algebra) where we already
knew discreteness and rationality. In this section, we recover the same discreteness result in
the projective setting by using the methods of [CU15] which allow us to apply asymptotic
vanishing theorems to Weil divisors. Indeed we first prove global generation results for test
ideals by employing similar methods to [Mus13].
Setting 4.1. Let X be a normal projective variety of characteristic p > 0, ∆ ≥ 0 an
effective Weil Q-divisor, a an ideal sheaf on X and t ∈ Q. We make no assumptions about
KX + ∆ being Q-Cartier.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
19
Assume G is a line bundle such that there are global sections x1 , . . . , xm ∈ H 0 (X, a ⊗ G )
which globally generate a ⊗ G and then let Symc (x1 , . . . , xm ) denote the cth symmetric
power of the vector space hx1 , . . . , xm i. Observe that Symc (x1 , . . . , xl ) ⊆ H 0 (X, ac ⊗ G c )
globally generates ac ⊗ G c . Thus we have a surjection of sheaves
Symc (x1 , . . . , xt ) ⊗k G −c −
→ ac .
Lemma 4.2. If the Weil-index of ∆ is not divisible by p, and t = a/b, with p not dividing
b, then there is a Cartier divisor H and a finite set of integers e1 , . . . , es ≫ 0 such that
(pei − 1)∆ is integral, (pei − 1)t ∈ Z and τ (X, ∆, at ) equals
s
X
Image
i=1
e
F∗ i Symt(p
ei
−1)
(x1 , . . . , xm ) ⊗k G −t(p
F∗ei at(p
ei
−1)
ei
−1)
⊗ OX ((1 − pei )(KX + ∆) − H)
/
❢❢❢3
❢❢❢❢❢
❢
❢
❢
❢
❢
❢❢❢❢❢
❢❢❢❢❢ Trei
❢❢❢❢❢
OX
· OX ((1 − pei )(KX + ∆) − H)
.
At some level this result is obvious. The only technicalities involve showing that the
various rounding choices we make all give the same result in the end (since we can absorb
any differences into the test element – a local generator of H). We include a complete
proof but we invite the reader to skip over it if they are already familiar with this type of
argument.
Proof. The statement in the end is local and so trivializing G it suffices to show that
τ (X, ∆, at ) =
s
X
Trei F∗ei at(p
i=1
ei −1)
· OX ((1 − pei )(KX + ∆) − H) .
Pick an effective Cartier divisor H0 corresponding to the vanishing locus of a test element
so that for any integer e0 > 0
X
e
Tre F∗e a⌈tp ⌉ OX (⌈KX − pe (KX + ∆) − H⌉)
τ (X, ∆, at ) =
e≥e0
for all Cartier H ≥ H0 , c.f., [ST14b, Prop. 3.6], [BSTZ10, Def.-Prop. 3.3]. This equality also
holds for any Q-divisor H ≥ H0 as one can always pick a Cartier H ′ so that H ′ ≥ H ≥ H0
and one obtains inclusions
X
e
Tre F∗e a⌈tp ⌉ OX (⌈KX − pe (KX + ∆) − H0 ⌉)
τ (X, ∆, at ) =
e≥e0
⊃
X
Tre F∗e a⌈tp ⌉ OX (⌈KX − pe (KX + ∆) − H⌉)
X
Tre F∗e a⌈tp ⌉ OX (⌈KX − pe (KX + ∆) − H ′ ⌉) = τ (X, ∆, at ).
e
e≥e0
⊃
e
e≥e0
Next consider the claim which will allow us restrict to those e which are multiples of e0 .
Claim 4.3. For any Weil divisor H ≥ H0 , there exists a Cartier divisor G such that for
any integer 0 ≤ b ≤ e0 − 1 and for any integer m > 0 we have
e m+b
⌉ O (⌈K − pe0 m+b (K + ∆) − H − G⌉)
Tre0 m+b F∗e0 m+b a⌈tp 0
X
X
X
e
m
⊆ Tre0 m F∗e0 m a⌈tp 0 ⌉ OX (⌈KX − pe0 m (KX + ∆) − H⌉⌉).
20
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
Proof. To prove the claim, first note that by [Sch09, Lemma 4.6] (among many other places),
b
e
if d ∈ alp 0 ⊆ al(p −1) then
da⌈tp
e0 m+b ⌉
⊆ a⌈tp
e0 m ⌉+l(pb −1)
⊆ (a⌈tp
e0 m ⌉
b
)[p ] .
where again the l is an upper bound for the number of generators of a (note that d works
for any b ≤ e0 − 1). Set then G = div(d) + pe0 H and notice that
e m+b
⊆
⊆
⊆
⊆
⌉ O (⌈K − pe0 m+b (K + ∆) − H − G⌉)
Trb F∗b a⌈tp 0
X
X
X
e0 m+b ⌉
b b
⌈tp
Tr F∗ da
OX (⌈KX − pe0 m+b (KX + ∆)⌉) ⊗ OX (−pb H)
e m
b
Trb F∗b (a⌈tp 0 ⌉ )[p ] OX (⌈KX − pe0 m+b (KX + ∆)⌉) ⊗ OX (−pb H)
e m
a⌈tp 0 ⌉ OX (⌈KX − pe0 m (KX + ∆)⌉) ⊗ OX (−H)
e m
a⌈tp 0 ⌉ OX (⌈KX − pe0 m (KX + ∆) − H⌉)
Now applying Tre0 m F∗e0 m proves the claim.
Now we return to the proof of the lemma. The claim and our previous work implies that
for a sufficiently large Cartier divisor H ≥ H0 and G depending on H, we have that
P
e
τ (X, ∆, at ) =
Tre F e a⌈tp ⌉ O (⌈KX − pe (KX + ∆) − H − G⌉)
Pe≥e0 e e∗ ⌈tpe ⌉ X
OX (⌈KX − pe (KX + ∆) − H⌉)
⊆
Tr F∗ a
Pe0 |e
e
e e ⌈tp ⌉
OX (⌈KX − pe (KX + ∆) − H⌉)
⊆
e≥e0 Tr F∗ a
t
= τ (X, ∆, a )
P
e
and therefore that τ (X, ∆, at ) = e0 |e Tre F∗e a⌈tp ⌉ OX (⌈KX − pe (KX + ∆) − H⌉).
Pick a Cartier divisor H ′ so that H ′ ≥ H0 + ∆ + ⌈t⌉div(d) ≥ H0 where d ∈ a. We have
that
X
e
τ (X, ∆, at ) =
Tre F∗e a⌈tp ⌉ OX (⌈KX − pe (KX + ∆) − H ′ ⌉)
e0 |e
⊆
X
Tre F∗e a⌈t(p
e −1)⌉
OX (⌈KX − pe (KX + ∆) + ∆ − H ′ ⌉)
=
X
Tre F∗e a⌈t(p
e −1)⌉
OX (⌈(1 − pe )(KX + ∆) − H ′ ⌉)
⊆
X
Tre F∗e a⌈t(p
e −1)⌉
OX (⌈(1 − pe )(KX + ∆) − H0 − ∆ − ⌈t⌉div(d)⌉)
⊆
X
Tre F∗e a⌈t(p
e −1)⌉+⌈t⌉
⊆
X
Tre F∗e a⌈tp ⌉ OX (⌈KX − pe (KX + ∆) − H0 ⌉)
e0 |e
e0 |e
e0 |e
OX (⌈KX − pe (KX + ∆) − H0 ⌉)
e0 |e
e
e0 |e
⊆ τ (X, ∆, at ).
In particular
τ (X, ∆, at ) =
X
Tre F∗e a⌈t(p
e −1)⌉
OX (⌈(1 − pe )(KX + ∆) − H ′ ⌉).
e0 |e
Since the Weil-index of ∆ is not divisible by p, (1 − pe )(Kx + ∆ + tD) is an integral divisor
for e sufficiently divisible. Hence by choosing our e0 sufficiently divisible and noting that
our scheme is Noetherian and so the above sum is finite, we obtain our desired result.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
21
Remark 4.4. While it is certainly possible to generalize this to handle t ∈ R or to handle ∆
such that (pe − 1)(KX + ∆) is not integral, those generalizations are not the ones we need.
In particular we will need a power of KX + ∆ times a locally free sheaf.
Theorem 4.5. Suppose X is normal and projective, R(X, −KX − ∆) is finitely generated
and ∆ has Weil-index not divisible by p and fix t > 0. There exists a Cartier divisor3 L
such that
τ (X, ∆, aw ) ⊗ OX (L)
is globally generated when 0 ≤ w = a/b ≤ t, with p not dividing b.
Proof. Choose a line bundle G = OX (G) such that a ⊗ G is globally generated by sections
x1 , . . . , xm ∈ H 0 (X, a ⊗ G ). By Lemma 4.2 there is a Cartier divisor H and integers
e1 , . . . , es ≫ 0 such that the test ideal τ (X, ∆, aw ) is equal to
s
X
e
T ei
Image F∗ei Symc (x1 , . . . , xm ) ⊗k G −w(p i −1) ⊗ OX ((1 − pei )(KX + ∆) − H) −−→ OX
i=1
which is globally generated if each summand is. Fix now A a globally generated ample
Cartier divisor. We claim it suffices to find a Cartier divisor L1 , such that
F∗ei OX ((1 − pei )(KX + ∆ + wG) − H) ⊗ OX (L1 + (d + 1)A)
= F∗ei OX ((pei − 1)(L1 − ∆ − KX − wG) + L1 − H + pei (d + 1)A)
is globally generated (the equality in the displayed equation follows from the projection
formula). Indeed, assuming this global generation choose L = L1 + (d+ 1)A with d = dim X
and note that the image of a globally generated sheaf is still globally generated. We will
find a single L1 that works for all 0 ≤ w ≤ t.
Since R(X, −∆ − KX ) is finitely generated, we can use Lemma 2.11 to find a Cartier
divisor M so that (M − ∆ − KX ) is an ample Weil divisor. Moreover, we can find an ample
Cartier divisor N such that N − tG is ample. Notice that, for all 0 ≤ w ≤ t,
w
w
N + (N − tG) is ample.
N − wG = 1 −
t
t
This observation is what lets us replace tG with wG. Set L1 := M + N . By [CU15, Lem.
2.18(i)], L1 − KX − ∆ − wG = (M − KX − ∆) + (N − wG) is an ample Weil divisor.
Fix 0 ≤ w ≤ t. We now show that the Castelnuovo-Mumford regularity, with respect to
A, of
F∗e OX ((pe − 1)(L1 − ∆ − KX − wG) + L1 − H + pe (d + 1)A)
is zero for each e = ei ≫ 0, which guarantees by Mumford’s theorem [Laz04, Thm. 1.8.3]
the desired global generation. It suffices now to show that
(4.5.1) H i (X, OX (−iA)⊗OX F∗e OX ((pe −1)(L1 −∆−KX −wG)+L1 −H +pe(d+1)A)) = 0
which by the projection formula and the fact that F∗e doesn’t change the underlying sheaves
of Abelian groups, is the same as showing
H i (X, OX ((pe − 1)(L1 − ∆ − KX − wG) + L1 − H + pe (d + 1 − i)A)) = 0
for 0 < i ≤ d and d = dim X. Since we may assume that e ≫ 0, L1 − H + pe (d + 1 − i)A
is nef. Therefore because L1 − ∆ − KX − wG is ample Weil and L − H + pe (d + 1 − i)A is
nef and Cartier, we may apply the version of Fujita vanishing [CU15, Thm. 4.1] to obtain
the vanishing desired in (4.5.1). This completes the proof.
3See Remark 4.6 for a discussion of how to choose L effectively.
22
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
Remark 4.6. Indeed, it is not hard to choose L effectively. Summarizing the proof above,
fix an ample Cartier G so that a ⊗ OX (G) is globally generated, fix A to be a globally
generated ample Cartier divisor, and fix M Cartier so that M − ∆ − KX is ample and
choose an ample Cartier N so that N − tG is ample. Then we can take
L = (d + a)A + M + N.
We now turn to the promised results on discreteness and rationality.
Proposition 4.7. Suppose now that X is normal and projective and R(X, −KX − ∆) is
finitely generated. Then for any ideal sheaf a on X, the jumping numbers of τ (X, ∆, at ) are
without limit points.
Proof. First assume that ∆ has Weil-index not divisible by p. It follows from an appropriately generalized version of the argument of [BSTZ10, Lemma 3.23] that τ (X, ∆, at ) =
τ (X, ∆, at+ε ) for all 0 < ε ≪ 1. Hence for every real number t ∈ R≥0 , there is a rational number w = a/b with p not dividing p with τ (X, ∆, at ) = τ (X, ∆, aw ). Now
fix t0 > 0. It follows from Theorem 4.5 that there exists a Cartier divisor L such that
τ (X, ∆, aw ) ⊗ OX (L) is globally generated for every w < t0 with w = a/b and where p does
not divide b. But then by our previous discussion, we also see that τ (X, ∆, at ) ⊗ OX (L)
is globally generated for every t < t0 . The discreteness follows since now for 0 ≤ t < t0 ,
H 0 (X, τ (X, ∆, at ) ⊗ OX (L)) ⊆ H 0 (X, OX (L)) form a decreasing chain of subspaces of a
finite dimensional vector space H 0 (X, OX (L)), and of course by the global generation hypothesis, if H 0 (X, τ (X, ∆, at2 )⊗OX (L)) = H 0 (X, τ (X, ∆, at1 )⊗OX (L)) then τ (X, ∆, at2 ) =
τ (X, ∆, at1 ). This proves the result when ∆ has Weil-index not divisible by p.
→ OX (KX )
Next assume that pd ∆ has Weil-index divisible by p. Fix a map F∗d OX (KX ) −
inducing a map on the fraction fields T : F∗d K(X) −
→ K(X). As in [ST14a, Theorem 6.25],
this map induces a possibly non-effective Weil divisor RT ∼ (1 − pd )KX with
d
(4.7.1)
T τ (X, pd ∆ − RT , (a[p ] )t ) = τ (X, ∆, at )
Choose a Cartier divisor G so that pd ∆ − RT + pd G is effective and notice that it also has
Weil-index not divisible by p. Next observe that
−KX − pd ∆ + RT − pd G
∼ −KX − pd ∆ + (1 − pd )KX − pd G
= −pd (KX + ∆) − pd G
= F d∗ (−KX − ∆ − G)
and hence that R(X, −KX − pd ∆ + RT − pd G) is finitely generated (note that the −G is
Cartier and thus harmless so we are really taking the pd th Veronese of R(X, −KX − ∆).
d
Hence by what we have already shown, the F -jumping numbers of τ (X, pd ∆ − RT , (a[p ] )t )
have no limit points. Therefore by applying T via (4.7.1), we see that the F -jumping
numbers of τ (X, ∆ + G, at ) also have no limit points. But then by [BSTZ10, 3.26] the
F -jumping numbers of τ (X, ∆, at ) have no limit points proving the theorem.
4.1. Global generation and stabilization of σ. We now give another proof of Corollary 3.4
in the projective setting.
Theorem 4.8. Suppose that (X, ∆) is a projective pair such that R(X, −KX −∆) is finitely
generated and KX + ∆ has Weil-index not divisible by p. Then the images
Image F∗e OX ((1 − pe )(KX + ∆)) −→ OX
stabilize for e sufficiently large and divisible. We use σ(X, ∆) to denote this stable image.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
23
Proof. Choose a globally generated ample Cartier divisor A and a Cartier divisor L such
that L − KX − ∆ is an ample Weil divisor by 2.11. For each e such that (pe − 1)(KX + ∆)
is integral, set
σe (X, ∆) = Image F∗e OX ((1 − pe )(KX + ∆)) −
→ OX .
Then fixing d = dim X
σe (X, ∆) ⊗ OX (dA + L) = Image (F∗e OX (pe dA + L + (pe − 1)(L − KX − ∆)) −
→ OX ) .
We immediately notice that F∗e OX (pe dA + L + (pe − 1)(L − KX − ∆)) is 0-regular with
respect to A and hence its image σe (X, ∆) ⊗ OX (dA + L) is globally generated. As the
global generating sections all lie in H 0 (X, OX (dA + L)) which is finite dimensional, and
as the σe form a descending chain of ideals as e increases, we see that σe stabilizes for e
sufficiently large and divisible as claimed.
As an immediate corollary of the proof, we obtain:
Corollary 4.9. Suppose again that (X, ∆) is a projective pair of dimension d such that
R(X, −KX − ∆) is finitely generated and that KX + ∆ has Weil-index not divisible by p. If
L is a Cartier divisor such that L − KX − ∆ is an ample Weil divisor and if A is a globally
generated ample Cartier divisor, then σ(X, ∆) ⊗ OX (dA + L) is globally generated.
5. Alterations
In this section we give a description of the test ideal τ (X, ∆, at ) under the assumption that
R(−KX − ∆) is finitely generated. This generalizes [BST15] from the case that −KX − ∆ is
Q-Cartier. As a consequence we obtain a generalization of a result of A. K. Singh’s [Sin14]
4
, also compare with [Sin99].
Before starting in on this, let us fix notation and recall the following from Section 2.
Setting 5.1. Suppose that ∆ ≥ 0 is a Q-divisor on an F -finite normal scheme X, R(−KX −
µ
∆) is finitely generated with X ′ = Proj R(−KX − ∆) −
→ X. Suppose that a is an ideal
sheaf on X and t ≥ 0 is a real number.
We have already seen that we can pullback −KX − ∆ to X ′ by µ where it becomes a
Q-Cartier divisor, see Lemma 2.10. Suppose further that π : Y −
→ X is any alteration that
factors through X ′ as
Y
ψ
/ X′
µ
/ X.
?
π
Then we define π ∗ (KX + ∆) = ψ ∗ µ∗ (KX + ∆), or equivalently we define π ∗ is as in [DH09]
(even though π is not birational), see Section 2.4. Recall, of course, that if π : Y −
→ X
is a small alteration (meaning that the non-finite-to-1 locus of π has codimension ≥ 2 in
Y ), then this coincides with the obvious pullback operation. More generally, if π : Y −
→X
ξ
π
µ
→ X, and ξ is
→ Y −
→ X factors through both π and X ′ −
is any alteration and ρ : Y ′ −
∗
birational, then we define π (KX + ∆) to be ξ∗ ρ∗ (−KX − ∆).
In the next lemma and later in the section, we use the notion and notation of parameter
test modules τ (ωX , KX + ∆, at ) := τ (X, ∆, at ). For a concise introduction and more about
their relation to test ideals, please see [ST14b, Section 4].
4This result was announced years ago, but has not been distributed.
24
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
Lemma 5.2. Working in Setting 5.1, if m ∈ Z>0 is such that tm ∈ Z, that m∆ is integral,
and such that the m-th Veronese of the symbolic Rees algebra R(X, −KX − ∆) is generated
in degree 1, then
1
1
τ (X, ∆, at ) = τ (ωX , (OX (−m(KX + ∆))atm ) m ) = τ (X, −KX , (OX (−m(KX + ∆))atm ) m ).
Proof. We know by Lemma 2.3 that for any sufficiently large Cartier D ≥ 0 and any e0 ≥ 0
that
X
e
TreX F∗e a⌈tp ⌉ OX (⌈KX − pe (KX + ∆) − D⌉) .
τ (X, ∆, at ) =
e≥e0
Choose 0 <
D′
≤
D ′′
divisors such that D ′′ is Cartier and KX − D ′ is Cartier. Since
τ (X, ∆, at )
P
e
e ⌈tpe ⌉ · O (⌈K − pe (K + ∆) − D − D ′′ ⌉)
=
X
X
X
e≥e0 TrX F∗ a
P
e
e ⌈tpe ⌉ · O (⌈K − D ′ − pe (K + ∆) − D⌉)
⊆
X
X
X
e≥e0 TrX F∗ a
P
e
e a⌈tpe ⌉ · O (K − D ′ ) · O (⌈−pe (K + ∆) − D⌉)
=
Tr
F
X
X
X
X
X
e≥e0
∗
P
e⌉
e
⌈tp
e
e
a
·
O
(K
)
·
O
(⌈−p
(K
+
∆)
−
D⌉)
F
⊆
Tr
X
X
X
X
X
e≥e0
∗
P
e⌉
e
e
⌈tp
e
F
a
·
O
(⌈K
−
p
(K
+
∆)
−
D⌉)
⊆
Tr
X
X
X
∗
X
e≥e0
= τ (X, ∆, at )
P
e
we see that τ (X, ∆, at ) = e≥e0 TreX F∗e a⌈tp ⌉ · OX (KX ) · OX (⌈−pe (KX + ∆) − D⌉) .
This is already very close.
Claim 5.3. We can choose a Cartier D3 > 0 so that
⌈ 1 ·pe ⌉
e
OX (−D3 ) · a⌈tp ⌉ · OX (⌈−pe (KX + ∆)⌉) ⊆ (atm ) · OX (−m(KX + ∆)) m
for all e ≥ 0.
e
1
e
Proof of claim. Checking this assertion is easy, we can certainly knock a⌈tp ⌉ into (atm )⌈ m p ⌉
by multiplication by a Cartier divisor. Handling the other multiplication is a little tricke
ier. Likewise certainly we can multiply OX (⌈−pe (KX + ∆)⌉) into OX (−⌈ pm ⌉m(KX + ∆)).
But then notice that OX (−am(KX + ∆)) = OX (−m(KX + ∆))a by our finite generation
hypothesis. This proves the claim.
Returning to the proof, we see that
τ (X, ∆, at )
P
e
e a⌈tpe ⌉ · O (K ) · O (⌈−pe (K + ∆) − D − D ⌉)
F
=
Tr
X
X
X
X
3
X
e≥e0
∗
P
1 e
1 e
e
p ⌉
⌈m
p ⌉
e (O (K ) · (atm )⌈ m
F
⊆
Tr
·
O
(−m(K
+
∆))
·
O
(−D))
X
X
X
X
X
X
e≥e0
∗
P
1 e
1 e
p ⌉
⌈m
p ⌉
e
e (O (K − pe (K − K )) · (atm )⌈ m
·
O
(−m(K
+
∆))
·
O
(−D))
F
=
Tr
X
X
X
X
X
X
X
∗
X
e≥e0
1
= τ (X, −KX , (OX (−m(KX + ∆))atm ) m )
tm 1
= τ (ωX , (OX (−m(K
X + ∆))a ) m )
P
1 e
p ⌉
e
e (K + ∆) − D⌉)
e (atm )⌈ m
·
O
(⌈K
−
p
F
⊆
Tr
X
X
X
∗
X
e≥e0
= τ (X, ∆, at )
which proves the Lemma.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
25
Remark 5.4. It is tempting try to use Lemma 5.2 to give another proof of discreteness and
rationality of F -jumping numbers by appealing to [ST14b]. However, this doesn’t seem to
work. In particular in [ST14b] the authors did not prove discreteness and rationality of F jumping numbers for τ (X, ∆, bs at ) (as t-varies) – mixed test ideals were not handled. One
could probably easily recover discreteness of F -jumping numbers via the usual arguments
of gauge boundedness for Cartier algebras [Bli13] at least in the case when X is finite type
over a field. For additional reading on mixed test ideals (and their pathologies) we invite
the reader to look at [Pér13].
The really convenient thing about Lemma 5.2 for our purposes is the following.
Lemma 5.5. Using the notation of Lemma 5.2, suppose that π : Y −→ X is an alteration
from a normal Y where if we write b = OX (−m(KX + ∆)) then b · OY = OY (−TY ) is an
invertible sheaf. Then TY = mπ ∗ (KX + ∆) where π ∗ (KX + ∆) is defined as in the text
below Setting 5.1.
Proof. This is easy. Indeed, we already know that π factors through the normalized blowup
of b by the universal property of blowups. On the other hand OY (−mπ ∗ (KX + ∆)) =
b · OY .
As a result, we immediately obtain the following.
Theorem 5.6. Suppose that X is a normal F -finite integral scheme and that ∆ on X is an
effective Q-divisor such that S = R(−KX − ∆) is finitely generated. Suppose also that a is
an ideal sheaf and t ≥ 0 is a rational number. Then there exists an alteration π : Y −→ X
from a normal Y , factoring through X ′ = Proj S and with G = divY (a), so that
(5.6.1)
τ (X, ∆, at ) = Image π∗ OY (⌈KY − π ∗ (KX + ∆) − tG⌉) −→ OX .
This π may be taken independently of t ≥ 0 if desired. If a is locally principal (for instance
if a = OX ), then one may take π to be a small alteration if desired. Alternately, if X is
essentially of finite type over a perfect field, then one may take Y regular by [dJ96].
As a consequence we obtain that
\
τ (X, ∆, at ) =
Image π∗ OY (⌈KY − π ∗ (KX + ∆ + tG)⌉) −→ OX
π:Y −
→X
where π runs over all alterations with a · OY = OY (−G) is invertible (or all such regular
alterations if X is of finite type over a perfect field).
Proof. Most of the result follows immediately from [ST14b, Theorem A] combined with
Lemma 5.2 and Lemma 5.5. Indeed, simply choose m such that tm is an integer and the
condition of Lemma 5.2 is satisfied, then apply [ST14b, Theorem A] to find an alteration
1
tm m
such that the image of the above map is τ (X, −K
TX , (OX (−m(KX + ∆))a ) ). Consider
the alterations π that occur in the intersection π:Y −
→X . Following [ST14b, Theorem A]
might seem to require that we only consider π that factor through the normalized blowup
of a · OX (−m(KX + ∆)) (for m-sufficiently divisible). However, it is easy to see that other
Y ’s can be dominated by those that factor through this blowup and the further blowups
certainly have smaller images.
One also must handle the case of varying t which is not quite done in [ST14b, Theorem A]
in our generality (there the authors treated τ (X, ∆, at ), while here we need τ (X, −KX , bs at )).
However, the argument there essentially goes through verbatim (alternately, this is the same
argument as in [STZ12]).
The only remaining part of the statement that doesn’t follow immediately is the assertion
in the case when a is locally principal. However, in the proof of [ST14b, Theorem A], the
26
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
alteration needed can always be taken to be a finite cover of the normalized blowup of the
ideal (in this case, the normalized blowup of OX (−m(KX + ∆))atm which coincides with
the normalized blowup of OX (−m(KX + ∆))). This normalized blowup is of course X ′ in
our setting.
In the above proof, our constructed Y was definitely not finite over X. This is different
from [BST15] where the simplest constructed Y definitely was finite over X. Fortunately,
we can reduce to the case of a finite Y at least when a = OX .
Corollary 5.7. Suppose that X is a normal F -finite integral scheme and that ∆ on X is
an effective Q-divisor such that S = R(−KX − ∆) is finitely generated. Then there exists
a finite map φ : Y −→ X from a normal Y , factoring through X ′ = Proj S such that
τ (X, ∆) = Image φ∗ OY (⌈KY − φ∗ (KX + ∆)⌉) −→ OX .
Proof. Let π : Y ′ −
→ X be a small alteration satisfying (5.6.1) from Theorem 5.6. Additionα
φ
→Y −
→X
ally assume that π ∗ (KX + ∆) is integral (for simplicity of notation). Next let Y ′ −
be the Stein factorization of π. Since α : Y ′ −
→ Y is small, we see that
π∗ OY ′ (KY ′ − π ∗ (KX + ∆)) = φ∗ OY (KY − φ∗ (KX + ∆))
and the result follows.
Question 5.8. Can one limit oneself to separable alterations in Theorem 5.6? In particular,
is there always a separable alteration π : Y −
→ X with
τ (X, ∆) = Image π∗ OY (⌈KY − π ∗ (KX + ∆)⌉) −
→ OX ?
The analogous result is known if KX + ∆ is Q-Cartier by [BST15]. However in our proof,
π is definitely not separable because we rely on [ST14b, Theorem A], which uses Frobenius
to induce certain vanishing results. It is possible that this could be replaced by cohomology
killing arguments as in for instance [BST15, Bha12, HL07, HH92].
As a special case, we recover a result of Anurag K. Singh (that was announced years ago)
[Sin14].
Corollary 5.9 (Singh). Suppose that X is an F -finite splinter and R(−KX ) is finitely
generated. Then X is strongly F -regular.
Proof. Indeed, if X is a splinter then for any finite morphism φ : Y −
→ X, the evaluation-at1 map H omOX (φ∗ OY , OX ) −
→ OX surjects. However, H omOX (φ∗ OY , OX ) ∼
= φ∗ OY (KY −
φ∗ KX ) and the trace map to OX is identified with the evaluation-at-1 map. Hence using
Corollary 5.7 we see that τ (X) = τ (X, 0) = OX . Since for us τ (X) always denotes the big
test ideal, this proves that X is strongly F -regular.
It would be natural to try to use the above to show that splinters are strongly F -regular
for 3-dimensional varieties of characteristic p > 5, using the fact that such KLT varieties
satisfy finite generation of their anticanonical rings Theorem 2.27. The gap is the following:
Question 5.10. Suppose that R is a normal F -finite domain that is also a splinter. Does
there exist a Q-divisor ∆ ≥ 0 on Spec R such that KX +∆ is Q-Cartier and that (Spec R, ∆)
is KLT?
The analogous result on the existence of ∆ for strongly F -regular varieties was shown in
[SS10]. Of course, the fact that splinters are in fact derived splinters in characteristic p > 0
[Bha12] would likely be useful.
In particular, we do obtain the following.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
27
Corollary 5.11. Suppose that R is an F -finite three dimensional splinter which is also
KLT (for an appropriate ∆ ≥ 0) and that R is finite type over an algebraically closed field
of characteristic p > 5. Then R is strongly F -regular.
6. Reduction from characteristic zero
The goal of this section is to show that multiplier ideals J (X, ∆, at ) reduce to test
ideals τ (Xp , ∆p , atp ) after reduction to characteristic p ≫ 0 at least if R(−KX − ∆) is
finitely generated. We begin with some preliminaries on the reduction process.
Let X be a scheme of finite type over an algebraically closed field k of characteristic zero,
∆ a Q-divisor, and a ⊂ OX an ideal sheaf. One may choose a subring A ⊂ k which is
finitely generated over Z over which X, ∆, and a are all defined. Denote by XA , ∆A , and
aA ⊂ OXA the models of X, ∆, and a over A. For any closed point s ∈ Spec A we denote
the corresponding reductions Xs , ∆s , and as ⊂ OXs defined over the residue field k(s)
which is necessarily finite. In the simple case where A = Z, if XA = Spec Z[x1 , . . . , xn ]/I
for I = (f1 , . . . , fm ) and p ∈ Z is prime, the scheme Xp = Spec Fp [x1 , . . . , xn ]/(f1 mod
p, . . . , fm mod p).
Warning 6.1. In what follows, we abuse terminology in the following way. By p ≫ 0, we
actually mean the set of closed points of an open dense set U ⊆ Spec A. Furthermore, if we
start with X as above, by Xp for p ≫ 0 we actually mean some Xs for some closed point s
in the aforementioned U . This is a common abuse of notation and we do not expect it will
cause any confusion. It does substantially shorten statements of theorems.
Lemma 6.2. Suppose X is a normal quasi-projective variety over an algebraically closed
field k of characteristic zero. For any Q-divisor Γ so that R(X, Γ) is finitely generated we
have R(X, Γ)p ∼
= R(Xp , Γp ) for p ≫ 0.
In particular, if ∆ is a Q-divisor and R(X, −KX − ∆) is finitely generated, setting
X ′ = Proj R(X, −KX − ∆) and µ : X ′ −→ X we have
R(X, −KX − ∆)p = R(Xp , (−KX − ∆)p ) = R(Xp , −KXp − ∆p )
and so this ring is also finitely generated. This means (X ′ )p = (Xp )′ . We denote both by
Xp′ .
Proof. Note that R(X, Γ)p makes sense for p ≫ 0 as R(X, Γ) is finitely generated and
R(X, Γ)p is naturally finitely generated by the reduction of the generators of R(X, Γ). The
problem is that potentially
L the algebra R(X, Γ)p may not be the symbolic Rees algebra
(local section algebra) n≥0 OXp (nΓp ). Throughout this proof we will constantly need to
choose p ≫ 0 (or technically, restrict to a smaller open subset U of Spec A). First we record
a claim that is certainly well known to experts.
Claim 6.3. For any Weil divisor D and prime p ≫ 0, potentially depending on D, we
claim that OX (D)p ∼
= OXp (Dp ) as sheaves of OXp -modules.
Proof of claim. To see this we prove that OX (D)p is reflexive and agrees outside a codimension 2 subset with OXp (Dp ). Of course, since OX (D) is reflexive,
OX (D) −
→ H omX (H omX (OX (D), OX ), OX )
is an isomorphism. But this isomorphism is certainly preserved via reduction to characteristic p so (OX (D))p is reflexive at least for p ≫ 0. Choose a closed set Z ⊆ X of codimension
2, defined with no additional coefficients (other than the ones already needed to define D
and X) so that D|X\Z is Cartier. Note that Dp |Xp \Zp is Cartier and so OXp \Zp (Dp ) is
locally free and agrees with (OX\Z (D))p , the claim follows.
28
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
We return to the proof of the lemma. Next define X ′ to be the blowup of OX (mΓ) for some
m ≫ 0 sufficiently divisible. Then since µ : X ′ −
→ X is small, so is µp : Xp′ −
→ Xp , and note
′
that Xp is still the blowup of (OX (mΓ))p = OXp (mΓp ) by the claim. Since mΓ′ = mπ∗−1 Γ
was Cartier in characteristic zero, mΓ′p is Cartier after reduction to characteristic p ≫ 0
as well. Now Xp′ −
→ Xp is still small and notice that Γ′p is relatively ample (since Xp′ was
obtained by blowing up OXp (mΓp )). Hence
M
M
(µp )∗ OXp′ (nΓ′p ) =
OXp (nΓp )
n≥0
n≥0
is finitely generated and has Proj equal to Xp′ . The lemma follows immediately.
Armed with this lemma, the proof of the main theorem for this section is easy.
Theorem 6.4. Suppose that X is a normal quasi-projective variety over an algebraically
closed field of characteristic zero. Further suppose that ∆ ≥ 0 is a Q-divisor such that
R(−KX − ∆) is finitely generated and also suppose that a ⊆ OX is an ideal and t ≥ 0 is a
rational number. Then
J (X, ∆, at )p = τ (Xp , ∆p , atp )
for p ≫ 0.
1 ♮
π m(KX +∆)−tG⌉) for some sufficiently
Proof. We know that J (X, ∆, at ) = π∗ OXe (⌈KXe − m
divisible m and sufficiently large log resolution of singularities, by Definition 2.19 (here we
need that OX (−m(KX + ∆)) · OXe = OXe (−A) and a · OXe = OXe (−B) are invertible). We
rewrite this multiplier ideal as
1
1
π∗ OXe (⌈KXe − π ♮ m(KX + ∆) − tG⌉) = π∗ OXe (⌈KXe − π ♮ (KX − KX ) − A − tB⌉)
m
m
1
and observe it is equal to J (X, −KX , OX (−m(KX +∆)) m ·at ). Note that since R(−KX −∆)
e is independent of the choice of m (at least for m
is finitely generated, the choice of X
sufficiently divisible).
Since KX − KX is Cartier, we know that
1
1
J (X, −KX , OX (−m(KX + ∆)) m · at )p = τ (Xp , −KXp , OXp (−m(KXp + ∆p )) m )
for p ≫ 0 by [Tak04, HY03]. But Lemma 5.2 shows that τ (Xp , −KXp , OXp (−m(KXp +
1
∆p )) m ) = τ (Xp , ∆p , atp ). Combining these equalities proves the result.
Remark 6.5. Theorem 6.4 also implies that if Xp is strongly F -regular for all p ≫ 0 and
R(−KX ) is finitely generated, then X is KLT. Nobuo Hara gave a talk about this result at
the conference in honor of Mel Hochster’s 65th Birthday in 2008 but the result was never
published.
Corollary 6.6. Suppose X is a variety over an algebraically closed field of characteristic
zero that is KLT in the sense of [DH09]. Then for any Q-divisor ∆ ≥ 0 and any ideal sheaf
a and rational t ≥ 0, we have that
J (X, ∆, at )p = τ (Xp , ∆p , atp )
for p ≫ 0.
Proof. It follows from the minimal model program [BCHM10] and in particular, [Kol08,
Theorem 92] that R(−KX − ∆) is finitely generated, the result follows immediately from
Theorem 6.4.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
29
References
[AM99]
I. M. Aberbach and B. MacCrimmon: Some results on test elements, Proc. Edinburgh Math.
Soc. (2) 42 (1999), no. 3, 541–549. MR1721770 (2000i:13005)
[Bha12]
B. Bhatt: Derived splinters in positive characteristic, Compos. Math. 148 (2012), no. 6, 1757–
1786. 2999303
[Bir13]
C. Birkar: Existence of flips and minimal models for 3-folds in char p, arXiv:1311.3098, to
appear in Annales Scientifiques de l’ENS.
[BCHM10] C. Birkar, P. Cascini, C. D. Hacon, and J. McKernan: Existence of minimal models for
varieties of log general type, J. Amer. Math. Soc. 23 (2010), no. 2, 405–468. 2601039 (2011f:14023)
[BW14]
C. Birkar and J. Waldron: Existence of Mori fibre spaces for 3-folds in char p,
arXiv:1410.4511.
[Bli13]
M. Blickle: Test ideals via algebras of p−e -linear maps, J. Algebraic Geom. 22 (2013), no. 1,
49–83. 2993047
[BMS08]
M. Blickle, M. Mustaţǎ, and K. E. Smith: Discreteness and rationality of F -thresholds,
Michigan Math. J. 57 (2008), 43–61, Special volume in honor of Melvin Hochster. 2492440
(2010c:13003)
[BMS09]
M. Blickle, M. Mustaţă, and K. E. Smith: F -thresholds of hypersurfaces, Trans. Amer.
Math. Soc. 361 (2009), no. 12, 6549–6565. 2538604 (2011a:13006)
[BS13]
M. Blickle and K. Schwede: p−1 -linear maps in algebra and geometry, Commutative algebra,
Springer, New York, 2013, pp. 123–205. 3051373
[BSTZ10] M. Blickle, K. Schwede, S. Takagi, and W. Zhang: Discreteness and rationality of F jumping numbers on singular varieties, Math. Ann. 347 (2010), no. 4, 917–949. 2658149
[BST15]
M. Blickle, K. Schwede, and K. Tucker: F -singularities via alterations, Amer. J. Math.
137 (2015), no. 1, 61–109. 3318087
[BdFFU15] S. Boucksom, T. de Fernex, C. Favre, and S. Urbinati: Valuation spaces and multiplier
ideals on singular varieties, 29–51. 3380442
[CTX13]
P. Cascini, H. Tanaka, and C. Xu: On base point freeness in positive characteristic,
1305.3502.
[Chi14]
A. Chiecchio: About a minimal model program without flips, arXiv:1410.6230.
[CU15]
A. Chiecchio and S. Urbinati: Ample Weil divisors, J. Algebra 437 (2015), 202–221. 3351963
[Cut88]
S. Cutkosky: Weil divisors and symbolic algebras, Duke Math. J. 57 (1988), no. 1, 175–183.
952230 (89e:14003)
[dFDTT15] T. de Fernex, R. Docampo, S. Takagi, and K. Tucker: Comparing multiplier ideals to test
ideals on numerically Q-Gorenstein varieties, Bull. Lond. Math. Soc. 47 (2015), no. 2, 359–369.
3335128
[DH09]
T. De Fernex and C. Hacon: Singularities on normal varieties, Compos. Math. 145 (2009),
no. 2, 393–414.
[dJ96]
A. J. de Jong: Smoothness, semi-stability and alterations, Inst. Hautes Études Sci. Publ. Math.
(1996), no. 83, 51–93. 1423020 (98e:14011)
[Dem88]
M. Demazure: Anneaux gradués normaux, Introduction à la théorie des singularités, II,
Travaux en Cours, vol. 37, Hermann, Paris, 1988, pp. 35–68. MR1074589 (91k:14004)
[ELSV04] L. Ein, R. Lazarsfeld, K. E. Smith, and D. Varolin: Jumping coefficients of multiplier
ideals, Duke Math. J. 123 (2004), no. 3, 469–506. MR2068967 (2005k:14004)
[FST11]
O. Fujino, K. Schwede, and S. Takagi: Supplements to non-lc ideal sheaves, Higher Dimensional Algebraic Geometry, RIMS Kôkyûroku Bessatsu, B24, Res. Inst. Math. Sci. (RIMS),
Kyoto, 2011, pp. 1–47.
[Gab04]
O. Gabber: Notes on some t-structures, Geometric aspects of Dwork theory. Vol. I, II, Walter
de Gruyter GmbH & Co. KG, Berlin, 2004, pp. 711–734.
[GHNV90] S. Goto, M. Herrmann, K. Nishida, and O. Villamayor: On the structure of Noetherian
symbolic Rees algebras, Manuscripta Math. 67 (1990), no. 2, 197–225. 1042238 (91a:13006)
[HX15]
C. D. Hacon and C. Xu: On the three dimensional minimal model program in positive characteristic, J. Amer. Math. Soc. 28 (2015), no. 3, 711–744. 3327534
[Har01]
N. Hara: Geometric interpretation of tight closure and test ideals, Trans. Amer. Math. Soc.
353 (2001), no. 5, 1885–1906 (electronic). MR1813597 (2001m:13009)
[HY03]
N. Hara and K.-I. Yoshida: A generalization of tight closure and multiplier ideals, Trans.
Amer. Math. Soc. 355 (2003), no. 8, 3143–3174 (electronic). MR1974679 (2004i:13003)
30
[Har77]
[Har94]
[HS77]
[Hoc07]
[HH90]
[HH92]
[HH94]
[HL07]
[KLZ09]
[KSSZ14]
[Kol08]
[KM98]
[Kun76]
CHIECCHIO, ENESCU, MILLER, AND SCHWEDE
R. Hartshorne: Algebraic geometry, Springer-Verlag, New York, 1977, Graduate Texts in
Mathematics, No. 52. MR0463157 (57 #3116)
R. Hartshorne: Generalized divisors on Gorenstein schemes, Proceedings of Conference on
Algebraic Geometry and Ring Theory in honor of Michael Artin, Part III (Antwerp, 1992),
vol. 8, 1994, pp. 287–339. MR1291023 (95k:14008)
R. Hartshorne and R. Speiser: Local cohomological dimension in characteristic p, Ann. of
Math. (2) 105 (1977), no. 1, 45–79. MR0441962 (56 #353)
M. Hochster: Foundations of tight closure theory, lecture notes from a course taught on the
University of Michigan Fall 2007 (2007).
M. Hochster and C. Huneke: Tight closure, invariant theory, and the Briançon-Skoda theorem, J. Amer. Math. Soc. 3 (1990), no. 1, 31–116. MR1017784 (91g:13010)
M. Hochster and C. Huneke: Infinite integral extensions and big Cohen-Macaulay algebras,
Ann. of Math. (2) 135 (1992), no. 1, 53–89. 1147957 (92m:13023)
M. Hochster and C. Huneke: F -regularity, test elements, and smooth base change, Trans.
Amer. Math. Soc. 346 (1994), no. 1, 1–62. MR1273534 (95d:13007)
C. Huneke and G. Lyubeznik: Absolute integral closure in positive characteristic, Adv. Math.
210 (2007), no. 2, 498–504. 2303230 (2008d:13005)
M. Katzman, G. Lyubeznik, and W. Zhang: On the discreteness and rationality of F jumping coefficients, J. Algebra 322 (2009), no. 9, 3238–3247. 2567418 (2011c:13005)
M. Katzman, K. Schwede, A. K. Singh, and W. Zhang: Rings of Frobenius operators,
Math. Proc. Cambridge Philos. Soc. 157 (2014), no. 1, 151–167. 3211813
J. Kollár: Exercises in the birational geometry of algebraic varieties, arXiv:0809.2579.
J. Kollár and S. Mori: Birational geometry of algebraic varieties, Cambridge Tracts in Mathematics, vol. 134, Cambridge University Press, Cambridge, 1998, With the collaboration of C.
H. Clemens and A. Corti, Translated from the 1998 Japanese original. MR1658959 (2000b:14018)
E. Kunz: On Noetherian rings of characteristic p, Amer. J. Math. 98 (1976), no. 4, 999–1013.
MR0432625 (55 #5612)
[Laz04]
[Lip69]
[Lyu97]
[LS99]
[LS01]
R. Lazarsfeld: Positivity in algebraic geometry. I, Ergebnisse der Mathematik und ihrer
Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics
and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics], vol. 48, SpringerVerlag, Berlin, 2004, Classical setting: line bundles and linear series. MR2095471 (2005k:14001a)
J. Lipman: Rational singularities, with applications to algebraic surfaces and unique factorization, Inst. Hautes Études Sci. Publ. Math. (1969), no. 36, 195–279. MR0276239 (43 #1986)
G. Lyubeznik: F -modules: applications to local cohomology and D-modules in characteristic
p > 0, J. Reine Angew. Math. 491 (1997), 65–130. MR1476089 (99c:13005)
G. Lyubeznik and K. E. Smith: Strong and weak F -regularity are equivalent for graded rings,
Amer. J. Math. 121 (1999), no. 6, 1279–1290. MR1719806 (2000m:13006)
G. Lyubeznik and K. E. Smith: On the commutation of the test ideal with localization and
completion, Trans. Amer. Math. Soc. 353 (2001), no. 8, 3149–3180 (electronic). MR1828602
(2002f:13010)
[Mus13]
[Pér13]
[Sch09]
M. Mustaţă: The non-nef locus in positive characteristic, A celebration of algebraic geometry,
Clay Math. Proc., vol. 18, Amer. Math. Soc., Providence, RI, 2013, pp. 535–551. 3114955
F. Pérez: On the constancy regions for mixed test ideals, J. Algebra 396 (2013), 82–97. 3108073
K. Schwede: F -adjunction, Algebra Number Theory 3 (2009), no. 8, 907–950. 2587408
(2011b:14006)
[Sch11]
[SS10]
[ST14a]
[ST14b]
[STZ12]
K. Schwede: Test ideals in non-Q-Gorenstein rings, Trans. Amer. Math. Soc. 363 (2011),
no. 11, 5925–5941.
K. Schwede and K. E. Smith: Globally F -regular and log Fano varieties, Adv. Math. 224
(2010), no. 3, 863–894. 2628797 (2011e:14076)
K. Schwede and K. Tucker: On the behavior of test ideals under finite morphisms, J. Algebraic Geom. 23 (2014), no. 3, 399–443. 3205587
K. Schwede and K. Tucker: Test ideals of non-principal ideals: Computations, jumping
numbers, alterations and division theorems, J. Math. Pures Appl. (9) 102 (2014), no. 5, 891–
929. 3271293
K. Schwede, K. Tucker, and W. Zhang: Test ideals via a single alteration and discreteness
and rationality of f -jumping numbers, Math. Res. Lett. 19 (2012), no. 01, 191–197.
TEST IDEALS AND ANTI-CANONICAL ALGEBRAS
[Sin99]
[Sin14]
[Smi00]
[Tak04]
[Wat81]
[Xu15]
31
A. K. Singh: Q-Gorenstein splinter rings of characteristic p are F-regular, Math. Proc. Cambridge Philos. Soc. 127 (1999), no. 2, 201–205. 1735920 (2000j:13006)
A. K. Singh: Private communication.
K. E. Smith: The multiplier ideal is a universal test ideal, Comm. Algebra 28 (2000), no. 12,
5915–5929, Special issue in honor of Robin Hartshorne. MR1808611 (2002d:13008)
S. Takagi: An interpretation of multiplier ideals via tight closure, J. Algebraic Geom. 13 (2004),
no. 2, 393–415. MR2047704 (2005c:13002)
K. Watanabe: Some remarks concerning Demazure’s construction of normal graded rings,
Nagoya Math. J. 83 (1981), 203–211. 632654 (83g:13016)
C. Xu: On the base-point-free theorem of 3-folds in positive characteristic, J. Inst. Math. Jussieu
14 (2015), no. 3, 577–588. 3352529
TASIS in Dorado
E-mail address: [email protected]
Department of Mathematics and Statistics, Georgia State University, Atlanta GA 30303
USA
E-mail address: [email protected]
Department of Mathematical Sciences, University of Arkansas, Fayetteville, AR 72701
E-mail address: [email protected]
Department of Mathematics, University of Utah, 155 S 1400 E Room 233, Salt Lake City,
UT, 84112
E-mail address: [email protected]
| 0math.AC
|
arXiv:1602.04689v1 [math.GR] 15 Feb 2016
CHARACTER DEGREES OF SOME p-GROUPS
Avinoam Mann
It was shown by I.M.Isaacs [Is2], that any set of powers of a prime p which
includes 1, can occur as the set of character degrees of some p-group. It becomes
then of interest to see to what extent that remains true if we consider a particular
class of p-groups. Isaacs’ construction yields groups of nilpotency class 2. Here
we consider the other extreme. Recall that a group of order pn ≥ p3 is said to
be of maximal class, if its nilpotency class cl(G) is n − 1 (see [LGM] for the well
developed theory of these groups). Such a group has a non-abelian factor group of
order p3 , and therefore it has irreducible characters of degree p. It was suggested in
the last section of [Sl1], that there are further restrictions on the possible character
degrees set of a group of maximal class. The present note verifies that conjecture,
indeed under weaker assumptions than maximal class, for some results it suffices to
assume that the derived subgroup has index p2 . This last assumption has quite a
few consequences for the structure of the given group, and a secondary aim of this
note is to derive some of them (see Theorem 4 and Propositions 5 and 6. These
results are going to be applied in [Ma2]). About character degrees our results are:
Theorem 1. Let G be a p-group in which |G : G′ | = p2 . If G has an irreducible
p+1
character of degree > p, then it has such a character of degree at most p 2 .
We remark that 2-groups satisfying |G : G′ | = 4 are of maximal class, and their
character degrees are 1 and 2. For all odd primes, however, there exist groups
satisfying |G : G′ | = p2 which are not of maximal class, and which have irreducible
characters of degrees > p.
M.Slattery [Sl2] has constructed, for all primes p ≥ 5, groups of maximal class
p+1
whose character degrees are 1, p, p 2 , showing that the bound of Theorem 1 is best
possible. It is also easy to see that there exist 3-groups of that type.
Theorem 2. Let G be a p-group of maximal class. If G has irreducible characters
p+3
of degree higher than p2 , then it has such characters of degree at most p 2 .
Theorem 3. Let G be a p-group satisfying |G : G′ | = p2 . If |G| ≥ p6 , and
|γ3 (G) : γ4 (G)| > p (equivalently, if |G : γ4 (G)| = p5 ), then G has irreducible
characters of degree p2 .
For the proofs we first quote some of the theory of groups of maximal class, the
proofs of which can be found in [LGM] and in [Hu, III.14]. Let X be a p-group
of maximal class, of class c, say. We write Xi = γi (X) for the terms of the lower
central series, for 2 ≤ i ≤ c, and X1 = CX (X2 /X4 ). These notations will be
applied to each group of maximal class that we will encounter below, e.g. if that
group will be denoted by H, we will let Hi denote the corresponding subgroups
Typeset by AMS-TEX
1
2
AVINOAM MANN
of H, etc. Returning to X, we have X1 = CX (Xi /Xi+2 ), for 2 ≤ i < c − 1. We
call X1 the major centralizer of X. It is a regular p-group, therefore, if A, B ⊳ X1 ,
then [A, B p ] = [A, B]p (see [Hu, III.10] for the theory of regular p-groups). If
|X| ≥ pp+2 , then Xip = Xi+p−1 . This holds also for order pp+1 , except for one
group, the wreath product of two groups of order p, in which Xip = 1 for all i. If
|X| ≤ pp , then Xip = 1 for i ≥ 2. If X1 6= CX (Xc−1 ), then X is termed exceptional.
If X is metabelian, it is not exceptional. In a non-exceptional group, all maximal
subgroups different from X1 are of maximal class. Finally, X is of maximal class
iff it contains an element x ∈ X such that |CX (x)| = p2 .
Next, about groups with a derived subgroup of index p2 . Since all normal subgroups of index p2 contain the commutator subgroup, it follows that G′ is the only
normal subgroup of that index. The factor group G/G′ is elementary abelian, and if
x and y, say, are elements of G that are independent modulo G′ , then they generate
G, and the factor group G′ /γ3 (G) is generated by the image of [x, y]. Therefore
γ3 (G) has index p3 in G and it is the only normal subgroup of that index. Similarly,
γ3 (G)/γ4 (G) is generated by the images of [x, y, x] and [x, y, y], therefore γ4 (G) has
index either p4 or p5 , and in the first case it is the only normal subgroup of that
index.
Recall that d(X) denotes the minimal number of generators of the group X.
Theorem 4. Let G be a p-group such that |G| ≥ p3 and |G : G′ | = p2 , and let H
be a maximal subgroup of G. Then
(a) G/H ′ is of maximal class, and d(H) ≤ p.
(b) If d(H) < p − 1, then |Φ(H) : H ′ | ≤ p, hence |H : H ′ | equals either pd(H)+1
or pd(H) .
(c) If d(H) = p, then G/H ′ ∼
= Cp wrCp , and H/H ′ is elementary abelian of order
p
p .
(d) If |γ3 (G) : γ4 (G)| = p, then |γ4 (G) : γ5 (G)| = p, and all maximal subgroups
H of G, save one, satisfy H ′ = γ3 (G).
(e) If |γ3 (G) : γ4 (G)| = p2 , then H ′ 6= γ3 (G) and H ′ 6≤ γ4 (G). If K is another
maximal subgroup, then H ′ 6≤ K ′ , and in particular H ′ 6= K ′ .
(f ) If G contains a 2-generator maximal subgroup H, then either H is metacyclic,
or G contains at most one maximal subgroup K 6= H such that |K : K ′ | ≥ pp+1 .
(g) If γ3 (G) 6= 1, then Gp ≤ γ3 (G).
Note. The first claim in (a) was already pointed out in Exercise 1.4 of [Be].
Proof. For (a), we may as well assume that H ′ = 1. Then G = hH, xi for some
element x, and commutation with x induces on H an endomorphism with image
[G, H] = G′ and kernel Z(G). Since |H : G′ | = p, we have |Z(G)| = p. Moreover,
the same argument shows that all non-abelian quotients of G have centres of order
p, hence G is of maximal class.
If |H : H ′ | > pp−1 , then K := G/H ′ is a p-group of maximal class and order
at least pp+1 . Since L := H/H ′ is abelian, it is the major centralizer of K. It is
known that in such groups K p = γp (K), a subgroup of index pp , and that usually
Lp = K p , the only exception to this equality occurring when K = Cp wrCp , when
L is elementary abelian of order pp . In the other cases we have d(H) = d(L) =
logp |L : Φ(L)| = logp |L : Lp | = p − 1.
If |H : H ′ | ≤ pp−1 , then d(H) ≤ p − 1, and by the above, this is the only case in
which strict inequality is possible. Moreover, in that case |K| ≤ pp , and it is known
that groups of maximal class of these orders satisfy |K p | ≤ p, which proves (b).
CHARACTER DEGREES OF SOME p-GROUPS
3
When |γ3 (G) : γ4 (G)| = p, write C = CG (G′ /γ4 (G)). This is a maximal subgroup, and C ′ = [C, G′ ] ≤ γ4 (G). Let H be another maximal subgroup. By
Lemma 30 of [Ma1], |G′ : C ′ H ′ | ≤ p, i.e. |G : C ′ H ′ | ≤ p3 . But C ′ H ′ ≤ γ3 (G), and
|G : γ3 (G)| = p3 . Therefore C ′ H ′ = γ3 (G). Since C ′ ≤ γ4 (G), this is possible only
if H ′ = γ3 (G).
Since d(G) = 2, we have G′′ ≤ γ5 (G) [Hu, III.2.12(b)], and since |G : γ4 (G)| = p4 ,
an argument of R.Brandl implies that G/G′′ is of maximal class (see Theorem C of
[Ma1]), which shows that |γ4 (G) : γ5 (G)| = p.
If |γ3 (G) : γ4 (G)| = p2 , and H is a maximal subgroup, then H ′ 6≤ γ4 (G), because
G/H ′ is of maximal class. Let M and N be two subgroups lying properly between
γ3 (G) and γ4 (G), and let C = CG (G′ /M ) and D = CG (G′ /N ). Then M and N
are normal and C and D are maximal. If C = D, then C ′ = [C, G′ ] ≤ γ4 (G),
contradiction. Thus the p + 1 subgroups like M and N determine p + 1 distinct
maximal subgroups, i.e. each maximal subgroup is obtained in this way. Moreover,
C ′ ≤ M , thus C ′ 6= γ3 (G). But C ′ D′ = γ3 (G), therefore D′ 6≤ C ′ .
To prove (f) we suppose that G contains the 2-generator maximal subgroup H,
and two other maximal subgroups, K, and L, whose commutator factor groups
have orders at least pp+1 . If |H : H p | ≤ p2 , then H is either cyclic or metacyclic.
Thus we may assume that |H : H p | ≥ p3 . We write N := H p γ3 (H) (if p = 3
then N = H 3 ). Then |H : N | = p3 . On the other hand, since G/K ′ is a group of
maximal class of order at least pp+2 , its maximal subgroup H/K ′ is also of maximal
class and of order at least pp+1 , and this implies that |H : K ′ N | = p3 . Therefore
N = K ′ N , i.e. K ′ ≤ N . Similarly, L′ ≤ N , which leads to the contradiction
K ′ L′ ≤ N < γ3 (G).
Finally, if γ3 (G) 6= 1, let H = G/γ4 (G). Then Z(H) = γ3 (G)/γ4 (G), and
H/Z(H) is one of the two non-abelian groups of order p3 . But of these two, the
one of exponent p2 cannot be the central factor group of any group (is incapable),
therefore H/Z(H) has exponent p, which is our claim.
For p = 3 we have p − 1 = 2, hence
Proposition 5. Let G be a 3-group such that |G : G′ | = 9 and |G| ≥ 81. Then
G3 = γ3 (G) and that subgroup has index 27. All maximal subgroups of G have
at most three generators, and either one of them is metacyclic, or G contains a
maximal subgroup H such that |H : H ′ | ≤ 27. If |G : γ4 (G)| = 34 , then G is of
maximal class.
Proof. Most of this is either stated in Theorem 4, or was derived during the
proof of part (f) there. The last claim is the case p = 3 of the fact, that if in a
p-group G the factor group G/γp+1 (G) is of maximal class, then so is G [B1, 3.9].
Proposition 6. Let G be a p-group, of order p5 at least, in which |G : G′ | ≤ p3 .
Then all maximal subgroups of G, with at most one exception, have irreducible
characters of degree p. If an exceptional maximal subgroup exists, then all other
maximal subgroups M satisfy |M : M ′ | ≤ |G : G′ |.
Proof. Since |G : G′ | ≤ p3 , G has irreducible characters of degree p. By [Ma1,
Proposition 14(2)], if some maximal subgroup H does not have such characters,
and M is another maximal subgroup, then |G′ : M ′ | ≤ p. That means that |M :
M ′ | ≤ |G : G′ |, and this shows that M has irreducible characters of degree p. QED
An exceptional maximal subgroup may or may not exist. If G is a p-group of
maximal class, which is metabelian, but in which the subgroup G1 is not abelian,
4
AVINOAM MANN
then all irreducible characters of all maximal subgroups of G have degrees 1 or p.
On the other hand, in the groups of maximal class and order p2r (p > 3, 2r =
6, 8, ..., p + 1) constructed by N.Blackburn [B1, pp. 61-62, or Hu, III.14.24], or the
ones of order pp+2 constructed by Slattery in [Sl2] (p > 3), it is not difficult to show
that the maximal subgroups H (in [B1]) or E (in [Sl2]) have only irreducibles of
p−1
degrees 1 and pr−1 , or 1 and p 2 .
In the proofs of Theorems 1 to 3 we separate between groups of maximal class
and others.
Proof of Theorem 1 for groups of maximal class, and of Theorem 2. We
may assume that |G| ≥ pp+2 . By a famous result of Isaacs-Passman [Is1, 12.11],
a p-group G has characters of degrees 1 and p only, iff either |G : Z(G)| ≤ p3
or G contains an abelian maximal subgroup. For groups of maximal class the
first possibility means that |G| ≤ p4 , and then anyway G has an abelian maximal
subgroup. Moreover, if G has an abelian maximal subgroup, that subgroup must
be G1 . Thus the assumption that G has characters of degree deg(χ) > p means
that G′1 6= 1. Now [G1 , Gp ] = [G1 , Gp1 ] = [G1 , G1 ]p is properly contained in G′1 . In
H = G/[G1 , Gp ] we have H1′ 6= 1, therefore H has irreducibles of degree exceeding
p. But Hp ≤ Z(H1 ), and |H1 : Hp | = pp−1 , therefore the irreducible characters of
p−1
p+1
H1 have degrees at most p 2 , and those of H have degrees at most p 2 .
Next, let G have characters of degree deg(χ) > p2 . If |G| ≤ p8 , then |G : Z(G)| ≤
7
p , and all irreducibles of G have degree p3 at most. Thus to prove our claim we
may assume that |G| ≥ p9 . According to [Pa], a p-group X has only characters of
degree at most p2 , for p odd, iff one of the following four possibilities occur:
(i) G contains an abelian subgroup of index ≤ p2 ,
(ii) G contains a maximal subgroup H such that |H : Z(H)| ≤ p3 ,
(iii) |G : Z(G)| ≤ p5 ,
(iv) |G : Z(G)| = p6 , and if H ≥ Z(G) is a maximal subgroup of G, then
Z(H) = Z(G).
In a group of maximal class (iv) is impossible, because CG (Z2 (G)) is a maximal
subgroup, and (iii) means that |G| ≤ p6 . (ii) means that either G is an exceptional
group of order at most p6 , or that [G1 , G4 ] = 1, and (i) means that G′ is abelian.
Thus if G has an irreducible character of degree at least p3 , then G′′ 6= 1 6= [G1 , G4 ].
Note that by our assumption G8 6= 1, and then G/G7 is non-exceptional, which
implies that [G1 , G4 ] ≤ G6 . There are two indices i, j, such that G′′ = Gi and
[G1 , G4 ] = Gj . First assume that i > j, and let H = G/Gi+1 . Then H ′′ 6=
1 6= [H1 , H4 ]. The last inequality shows that H6 6= 1, therefore |H| ≥ p7 . Thus
H violates (i)-(iv), and it has an irreducible character of degree at least p3 . But
1 = (H ′′ )p = [H ′ , (H ′ )p ] = [H2 , Hp+1 ]. Thus Hp+1 ≤ Z(H ′ ), and again the
p−1
characters of H ′ have degrees at most p 2 and the characters of H have degrees at
p+3
most p 2 . If i ≤ j, we take H = G/Gj+1 , and obtain 1 = [H1 , H4 ]p = [H1 , Hp+3 ],
with |H1 : Hp+3 | = pp+2 , and proceed as before.
Proof of the rest of Theorem 1, and of Theorem 3. Since G is not of
maximal class, neither is G/γp+1 (G) [Bl, 3.9]. Let i ≥ 2 be the first index such that
|γi (G)/γi+1 (G)| > p. Thus 3 ≤ i ≤ p. Then |γi (G)/γi+1 (G)| = p2 . Theorem 4(a)
shows that if H is a maximal subgroup of G, then H ′ 6≤ γi+1 (G). The fact that G
has characters of degree > p implies that |G : Z(G)| > p3 , therefore γ3 (G) 6≤ Z(G),
i.e. γ4 (G) 6= 1. Assume first that i + 1 6= 4, and let K = G/γi+1 (G). Then in
CHARACTER DEGREES OF SOME p-GROUPS
5
K = G/γi+1 (G) no maximal subgroup is abelian, and the centre has index > p3 ,
therefore K has an irreducible character χ such that deg(χ) > p. On the other
p+1
hand, |K| = pi+2 ≤ pp+2 , therefore deg(χ) ≤ p 2 .
If i = 3, then γi+1 (G) = γ4 (G) 6= 1. Let N ⊳ G have index p in γi+1 (G), let
K = G/N , and proceed as before.
If |G : γ4 (G)| = p5 , then we saw in Theorem 4 that if C and D are two maximal
subgroups, then C ′ 6≤ D′ . This implies that C ′ 6≤ G′′ , and thus L := G/G′′ does
not have abelian maximal subgroups. And |L : Z(L)| > p3 , because [γ3 (G), G] =
γ4 (G) 6≤ G′′ , and γ3 (G) is the only normal subgroup of index p3 . It follows that
G/G′′ has irreducible characters of degree bigger that p, and that degree must be
p2 , because G′ /G′′ is an abelian subgroup of index p2 . QED
References
Be. Y.Berkovich, Groups of Prime Power Order, vol. 1, de Gruyter, Berlin
2008.
Bl. N.Blackburn, On a special class of p-groups, Acta Math. 100 (1958), 45-92.
Hu. B.Huppert, Endliche Gruppen I, Springer, Berlin 1967.
Is1. I.M.Isaacs, Character Theory of Finite Groups, Academic Press, San Diego
1976.
Is2. I.M.Isaacs, Sets of p-powers as irreducible character degrees, Proc. Amer.
Math. Soc. 96 (1986), 551-552.
LGM. C.R.Leedham-Green and S.McKay, The Structure of Groups of Prime
Power Order, Oxford University Press, Oxford 2002.
Ma1. A.Mann, Minimal characters of p-groups, J. Gp. Th. 2 (1999), 225-250.
Ma2. A.Mann, More on normally monomial p-groups, in preparation.
Pa. D.S.Passman, Groups whose irreducible representations have degrees dividing p2 , Pac. J. Math. 17 (1966), 475-496.
Sl1. M.C.Slattery, Character degrees of normally monomial maximal class 5groups, in Character Theory of Finite Groups (the Isaacs conference), Contemporary Mathematics 524, American Mathematical Society, Providence 2010.
Sl2. M.C.Slattery, Maximal class p-groups with large character degree gaps,
preprint.
| 4math.GR
|
PREPRINT VERSION
An agent-driven semantical identifier using radial basis neural
networks and reinforcement learning
C. Napoli, G. Pappalardo, and E. Tramontana
arXiv:1409.8484v1 [cs.NE] 30 Sep 2014
PUBLISHED ON: Proceedings of the XV Workshop ”Dagli Oggetti agli Agenti”
BIBITEX:
@inproceedings{Napoli2014Anagent
year={2014},
issn={1613-0073},
url={http://ceur-ws.org/Vol-1260/},
booktitle={Proceedings of the XV Workshop ”Dagli Oggetti agli Agenti”},
title={An agent-driven semantical identifier using radial basis neural networks and reinforcement learning},
publisher={CEUR-WS},
volume={1260},
author={Napoli, Christian and Pappalardo, Giuseppe and Tramontana, Emiliano},
}
Published version copyright c 2014
UPLOADED UNDER SELF-ARCHIVING POLICIES
An agent-driven semantical identifier using radial
basis neural networks and reinforcement learning
Christian Napoli, Giuseppe Pappalardo, and Emiliano Tramontana
Department of Mathematics and Informatics
University of Catania, Viale A. Doria 6, 95125 Catania, Italy
{napoli, pappalardo, tramontana}@dmi.unict.it
Abstract—Due to the huge availability of documents in digital
form, and the deception possibility raise bound to the essence of
digital documents and the way they are spread, the authorship
attribution problem has constantly increased its relevance. Nowadays, authorship attribution, for both information retrieval and
analysis, has gained great importance in the context of security,
trust and copyright preservation.
This work proposes an innovative multi-agent driven machine
learning technique that has been developed for authorship attribution. By means of a preprocessing for word-grouping and timeperiod related analysis of the common lexicon, we determine a
bias reference level for the recurrence frequency of the words
within analysed texts, and then train a Radial Basis Neural
Networks (RBPNN)-based classifier to identify the correct author.
The main advantage of the proposed approach lies in the generality of the semantic analysis, which can be applied to different
contexts and lexical domains, without requiring any modification.
Moreover, the proposed system is able to incorporate an external
input, meant to tune the classifier, and then self-adjust by means
of continuous learning reinforcement.
I.
I NTRODUCTION
Nowadays, the automatic attribution of a text to an author,
assisting both information retrieval and analysis, has become
an important issue, e.g. in the context of security, trust and
copyright preservation. This results from the availability of
documents in digital form, and the raising deception possibilities bound to the essence of the digital reproducible contents,
as well as the need for new mechanical methods that can
organise the constantly increasing amount of digital texts.
During the last decade only, the field of text classification
and attribution has undergone new developement due to the
novel availability of computational intelligence techniques,
such as natural language processing, advanced data mining
and information retrieval systems, machine learning and artificial intelligence techniques, agent oriented programming,
etc. Among such techniques, Computer Intelligence (CI) and
Evolutionary Computation (EC) methods have been largely
used for optimisation and positioning problems [1], [2]. In [3],
agent driven clustering has been used as an advanced solution
for some optimal management problems, whereas in [4] such
problems are solved for mechatronical module controls. Agent
driven artificial intelligence is often used in combination with
advanced data analysis techniques in order to create intelligent
control systems [5], [6] by means of multi resolution analysis [7]. CI and parallel analysis systems have been proposed
in order to support developers, as in [8], [9], [10], [11],
where such a classification and analysis was applied to assist
refactoring in large software systems [12], [13], [14], [15].
Moreover, CI and techniques like neural networks (NNs)
have been used in [16], [17] in order to model electrical
networks and the related controls starting by classification
strategies, as well as for other complex physical systems
by using several kinds of hybrid NN-based approaches [18],
[19], [20], [21]. All the said works use different forms of
agent-based modeling and clustering for recognition purposes,
and these methods efficiently perform very challenging tasks,
where other common computational methods failed or had
low efficiency or, simply, resulted as inapplicable due to
complicated model underlying the case study. In general,
agent-driven machine learning has been proven as a promising
field of research for the purpose of text classification, since
it allows building classification rules by means of automatic
learning, taking as a basis a set of known texts and trying to
generalise for unknown ones.
While machine learning and NNs are a very promising
field, the effectiveness of such approaches often lies on the
correct and precise preprocessing of data, i.e. the definition
of semantic categories, affinities and rules used to generate a
set of numbers characterising a text sample, to be successively
given as input to a classifier. Typical text classification, e.g.
by using NNs, takes advantage of topics recognition, however
results are seldom appropriate when it comes to classify people
belonging to the same social group or who are involved
in a similar business (e.g. the classification of: texts from
different scientists in the same field of research, the politicians
belonging to the same party, texts authored by different people
using the same technical jargon).
In our approach we devise a solution for extracting from the
analysed texts some characteristics that can express the style of
a specific author. Obtaining this kind of information abstraction
is crucial in order to create a precise and correct classification
system. On the other hand, while data abound in the context
of text analysis, a robust classifier should rely on input sets
that are compact enough to be apt to the training process.
Therefore, some data have to reflect averaged evaluations that
concern some anthropological aspects such as the historical
period, or the ethnicity, etc. This work satisfies the above
conditions of extracting compact data from texts since we
use a preprocessing tool for word-grouping and time-period
related analysis of the common lexicon. Such a tool computes
a bias reference system for the recurrence frequency of the
word used in the analysed texts. The main advantage of this
choice lies in the generality of the implemented semantical
REFERENCE
DATABASE
TEXT
DATABASE
TRAINING
SET
KNOWN
PREPROCESSING
BIASING
NEW
DATA
UNKNOWN
RBPNN
with
reinforcement
learning
LOCAL
EXTERNAL
TEXT
DATABASE
WORDNET
LEXICON
Fig. 1. A general schema of the data flow through the agents of the developed
system.
identifier, which can be then applied to different contexts and
lexical domains without requiring any modification. Moreover,
in order to have continuous updates or complete renewals of
the reference data, a statically trained NN would not suffice
to the purpose of the work. For these reasons, the developed
system is able to self-correct by means of continuous learning
reinforcement. The proposed architecture also diminishes the
human intervention over time thanks to its self-adaption properties. Our solution comprises three main collaborating agents:
the first for preprocessing, i.e. to extract meaningful data from
texts; the second for classification by means of a proper Radial
Basis NN (RBNN); and finally, one for adapting by means of
a feedforward NN.
The rest of this paper is as follows. Section II gives
the details of the implemented preprocessing agent based on
lexicon analysis. Section III describes the proposed classifier
agent based on RBNNs, our introduced modifications and
the structure of the reinforcement learning agent. Section IV
reports on the performed experiments and the related results.
Finally, Section V gives a background of the existing related
works, while Section VI draws our conclusions.
Algorithm 1: Find the group a word belongs to and count
occurrences
Start,
Import a speech into T ext,
Load dictionary into W ords,
Load group database into Groups,
thisW ord = Text.get();
while thisW ord do
thisGroup = Words.search(thisW ord);
if !thisGroup then
Load a different Lexicon;
if Lexicon.exist(thisW ord) then
W ords.update();
Groups.update();
end
else
break;
end
end
while Text.search(thisW ord) do
Groups.count(thisGroup);
end
thisW ord = Text.get();
end
Export W ords and Groups,
Stop.
The fundamental steps of the said analysis (see also Algorithm 1) are the followings:
1)
2)
3)
4)
5)
6)
II.
E XTRACTING SEMANTICS FROM LEXICON
Figure 1 shows the agents for our developed system: a
preprocessing agent extracts characteristics from given text
parts (see text database in the Figure), according to a known
set of words organised into groups (see reference database);
a RBPNN agent takes as input the extracted characteristics,
properly organised, and performs the identification on new
data, after appropriate training. An additional agent, dubbed
adaptive critic, shown in Figure 6, dynamically adapts the
behaviour of the RBPNN agent when new data are available.
Firstly, preprocessing agent analyses a text given as input
by counting the words that belong to a priori known groups of
mutually related words. Such groups contain words that pertain
to a given concern, and have been built ad-hoc and according
to the semantic relations between words, hence e.g. assisted
by the WordNet lexicon1 .
1 http://wordnet.princeton.edu
7)
8)
9)
import a single text file containing the speech;
import word groups from a predefined database, the
set containing all words from each group is called
dictionary;
compare each word on the text with words on the
dictionary;
if the word exists on the dictionary then the relevant
group is returned;
if the word has not been found then search the
available lexicon;
if the word exists on the lexicon then the related
group is identified;
if the word is unkown, then a new lexicon is loaded
and if the word is found then dictionary and groups
are updated;
search all the occurrences of the word in the text;
when an occurrence has been found, then remove it
from the text and increase the group counter.
Figure 2 shows the UML class diagram for the software
system performing the above analysis. Class Text holds a text
to be analysed; class Words represents the known dictionary,
i.e. all the known words, which are organised into groups given
by class Groups; class Lexicon holds several dictionaries.
III.
T HE RBPNN CLASSIFIER AGENT
For the work proposed here, we use a variation on Radial
Basis Neural Networks (RBNN). RBNNs have a topology similar to common FeedForward Neural Networks (FFNN) with
BackPropagation Training Algorithms (BPTA): the primary
Lexicon
Text
get()
exist()
get()
Words
search()
update()
Groups
Filter
service()
search()
count()
update()
FFNN
RBNN
PNN
Our RBPNN
Fig. 2. UML class diagram for handling groups and counting words belonging
to a group.
difference only lies in the activation function that, instead of
being a sigmoid function or a similar activation function, is a
statistical distribution or a statistically significant mathematical
function. The selection of transfer functions is indeed decisive
for the speed of convergence in approximation and classification problems [22]. The kinds of activation functions used
for Probabilistic Neural Networks (PNNs) have to meet some
important properties to preserve the generalisation abilities of
the ANNs. In addition, these functions have to preserve the
decision boundaries of the probabilistic neural networks. The
selected RBPNN architecture is shown in Figure 4 and takes
advantage from both the PNN topology and the Radial Basis
Neural Networks (RBNN) used in [23].
Each neuron performs a weighted sum of its inputs and
passes it through a transfer function f to produce an output.
This occurs for each neural layer in a FFNN. The network
can be perceived as a model connecting inputs and outputs,
with the weights and thresholds being free parameters of the
model, which are modified by the training algorithm. Such
networks can model functions of almost arbitrary complexity
with the number of layers and the number of units in each
layer determining the function complexity. A FFNN is capable
to generalise the model, and to separate the input space in
various classes (e.g. in a 2D variable space it is equivalent to
the separation of the different semi-planes). In any case, such
a FFNN can only create a general model of the entire variable
space, while can not insert single set of inputs into categories.
On the other hand, a RBNN is capable of clustering the inputs
by fitting each class by means of a radial basis function [24],
while the model is not general for the entire variable space, it
is capable to act on the single variables (e.g. in a 2D variable
space it locates closed subspaces, without any inference on the
remaining space outside such subspaces).
Another interesting topology is provided by PNNs, which
are mainly FFNNs also functioning as Bayesian networks
with Fisher Kernels [25]. By replacing the sigmoid activation
function often used in neural networks with an exponential
function, a PNN can compute nonlinear decision boundaries
approaching the Bayes optimal classification [26]. Moreover,
a PNN generates accurate predicted target probability scores
with a probabilistic meaning (e.g. in the 2D space it is
equivalent to attribute a probabilistic score to some chosen
points, which in Figure 3 are represented as the size of the
points).
Finally, in the presented approach we decided to combine
the advantages of both RBNN and PNN using the so called
Fig. 3. A comparison between results of several types of NNs, Our RBPNN
includes the maximum probability selector module
RBPNN. The RBPNN architecture, while preserving the capabilities of a PNN, due to its topology, then being capable
of statistical inference, is also capable of clustering since the
standard activation functions of a PNN are substituted by radial
basis functions still verifying the Fisher kernel conditions
required for a PNN (e.g. such an architecture in the 2D variable
space can both locate subspace of points and give to them a
probabilistic score). Figure 3 shows a representation of the
behaviour for each network topology presented above.
A. The RBPNN structure and topology
In a RBPNN both the input and the first hidden layer
exactly match the PNN architecture: the input neurones are
used as distribution units that supply the same input values
to all the neurones in the first hidden layer that, for historical
reasons, are called pattern units. In a PNN, each pattern unit
performs the dot product of the input pattern vector v by a
weight vector W(0) , and then performs a nonlinear operation
on the result. This nonlinear operation gives output x(1) that
is then provided to the following summation layer. While a
common sigmoid function is used for a standard FFNN with
BPTA, in a PNN the activation function is an exponential, such
that, for the j-esime neurone the output is
||W(0) · v||
(1)
(1)
xj ∝ exp
2σ 2
where σ represents the statistical distribution spread.
The given activation function can be modified or substituted
while the condition of Parzen (window function) is still satisfied for the estimator N̂ . In order to satisfy such a condition
some rules must be verified for the chosen window function in
order to obtain the expected estimate, which can be expressed
as a Parzen window estimate p(x) by means of the kernel K
of f in the d-dimensional space S d
n
P
x−xi
1
pn (x) = n1
K
d
hn
h
i=1
R
Sd
K(x)dx = 1
n
(2)
P1
Σ
υ
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Σ
.
.
.
.
.
.
P*
Pn
Σ
Fig. 4. A representation of a Radial Basis Probabilistic Neural Network with
maximum probability selector module
where hn ∈ N is called window width or bandwidth parameter
and corresponds to the width of the kernel. In general hn ∈ N
depends on the number of available sample data n for the
estimator pn (x). Since the estimator pn (x) converges in mean
square to the expected value p(x) if
lim hpn (x)i = p(x)
n→∞
(3)
lim var (pn (x))
n→∞
=
0
where hpn (x)i represents the mean estimator values and
var (pn (x)) the variance of the estimated output with respect
to the expected values, the Parzen condition states that such
convergence holds within the following conditions:
sup K(x) < ∞
x
lim xK(x)
=
0
lim hnd
=
0
|x|→∞
Fig. 5.
Setup values for the proposed RBPNN: NF is the number of
considered lexical groups, NS the number of analysed texts, and NG is the
number of people that can possibly be recognised as authors.
units work as in the neurones of a linear perceptron network.
The training for the output layer is performed as in a RBNN,
however since the number of summation units is very small
and in general remarkably less than in a RBNN, the training
is simplified and the speed greatly increased [27].
The output of the RBPNN (as shown in Figure 4) is given
to the maximum probability selector module, which effectively
acts as a one-neuron output layer. This selector receives as
input the probability score generated by the RBPNN and
attributes to one author only the analysed text, by selecting
the most probable author, i.e. the one having the maximum
input probability score. Note that the links to this selector are
weighted (with weights adjusted during the training), hence the
actual input is the product between the weight and the output
of the summation layer of the RBPNN.
(4)
n→∞
lim nhnd
n→∞
= ∞
In this case, while preserving the PNN topology, to obtain
the RBPNN capabilities, the activation function is substituted
with a radial basis function (RBF); an RBF still verifies all
the conditions stated before. It then follows the equivalence
between the W(0) vector of weights and the centroids vector of
a radial basis neural network, which, in this case, are computed
as the statistical centroids of all the input sets given to the
network.
We name f the chosen radial basis function, then the new
output of the first hidden layer for the j-esime neurone is
||v − W(0) ||
(1)
(5)
xj , f
β
where β is a parameter that is intended to control the distribution shape, quite similar to the σ used in (1).
The second hidden layer in a RBPNN is identical to a PNN,
it just computes weighted sums of the received values from the
preceding neurones. This second hidden layer is called indeed
summation layer: the output of the k-esime summation unit is
X
(2)
(1)
xk =
Wjk xj
(6)
j
where Wjk represents the weight matrix. Such weight matrix
consists of a weight value for each connection from the j-esime
pattern units to the k-esime summation unit. These summation
B. Layer size for a RBPNN
The devised topology enables us to distribute to different
layers of the network different parts of the classification task.
While the pattern layer is just a nonlinear processing layer, the
summation layer selectively sums the output of the first hidden
layer. The output layer fullfills the nonlinear mapping such as
classification, approximation and prediction. In fact, the first
hidden layer of the RBPNN has the responsibility to perform
the fundamental task expected from a neural network [28]. In
order to have a proper classification of the input dataset, i.e. of
analysed texts to be attributed to authors, the size of the input
layer should match the exact number NF of different lexical
groups given to the RBPNN, whereas the size of the pattern
units should match the number of samples, i.e. analysed texts,
NS . The number of the summation units in the second hidden
layer is equal to the number of output units, these should match
the number of people NG we are interested in for the correct
recognition of the speakers (Figure 5).
C. Reinforcement learning
In order to continuously update the reference database for
our system, a statically trained NN would not suffice for the
purpose of the work. Since the aim of the presented system is
having an expanding database of text samples for classification
and recognition purpose, the agent driven identification should
dynamically follow the changes in such a database. When
a new entry is made then the related feature set and biases
change, it implies that also the RBPNN should be properly
managed in order to ensure a continuous adaptive control for
reinforcement learning. Moreover, for the considered domain
it is desirable that a human supervisor supply suggestions, expecially when the system starts working. The human activities
are related to the supply of new entries into the text sample
database, and to the removal of misclassifications made by the
RBPNN.
We used a supervised control configuration (see Figure 6),
where the external control is provided by the actions and
choices of a human operator. While the RBPNN is trained with
a classical backpropagation learning algorithm, it is also embedded into an actor-critic reinforcement learning architecture,
which back propagates learning by evaluating the correctness
of the RBPNN-made choices with respect to the real word.
Let ξ be the error function, i.e. ξ = 0 for the results
supported by human verification, or the vectorial deviance for
the results not supported by a positive human response. This
assessment is made by an agent named Critic. We consider
the filtering step for the RBPNN output, to be both: Critic,
i.e. a human supervisor acknowledging or rejecting RBPNN
classifications; or Adaptive critic, i.e. an agent embedding a
NN that in the long run simulates the control activity made by
the human Critic, hence decreasing human control over time.
Adaptive critic needs to learn, and this learning is obtained by
a modified backpropagation algorithm using just ξ as error
function. Hence, Adaptive critic has been implemented by
a simple feedforward NN trained, by means of a traditional
gradient descent algorithm so that the weight modification
∆wij is
∆wij = −µ
∂ξ
∂ξ ∂ f˜i ∂ ũi
= −µ
∂wij
∂ f˜i ∂ ũi ∂wij
(7)
The f˜i is the activation of i-esime neuron, ũi is the i-esime
input to the neurone weighted as
X
ũi =
wij f˜j (ξi )
(8)
j
The result of the adaptive control determines whether to
continue the training of the RBPNN with new data, and
whether the last training results should be saved or discarded.
At runtime this process results in a continuous adaptive learning, hence avoiding the classical problem of NN polarisation
and overfitting. Figure 6 shows the developed learning system
reinforcement. According to the literature [29], [30], [31], [32],
straight lines represent the data flow, i.e. training data fed
to the RBPNN, then new data inserted by a supervisor, and
the output of the RBPNN sent to the Critic modules also
by means of a delay operator z −1 . Functional modifications
operated within the system are represented as slanting arrows,
i.e. the choices made by a human supervisor (Critic) modify
the Adaptive critic, which adjust the weight of its NN; the
combined output of Critic and Adaptive critic determines
whether the RBPNN should undergo more training epochs and
so modify its weights.
z -1
Critic
Features
DATA
RBPNN
Fig. 6. The adopted supervised learning model reinforcement. Slanting arrows
represent internal commands supplied in order to control or change the status
of the modules, straight arrows represent the data flow along the model, z −1
represents a time delay module which provides 1-step delayed outputs.
characteristics (see Section II), then such results have been
given to the classification agent. The total number of text
samples was 344, and we used 258 of them for training the
classification agent and 86 for validation. The text samples,
both for training and validation, were from different persons
that have given a speech (from A. Einstein to G. Lewis), as
shown in Figure 7.
Given the flexible structure of the implemented learning
model, the word groups are not fixed and can be modified,
added or removed over time by an external tuning activity. By
using the count of words in a group, instead of a word-by-word
counts, the multi-agent system realises a statistically driven
classifier that identifies the main semantic concerns regarding
the text samples, and then, attributes such concerns to the most
probable person.
The relevant information useful in order to recognise the
author of the speech is usually largely spread over a certain
number of word groups that could be indication of the cultural
extraction, heritage, field of study, professional category etc.
This implies that we can not exclude any word group, a priori,
while the RBPNN could learn to automatically enhance the
relevant information in order to classify the speeches.
Figure 7-left shows an example of the classifier performances for results generated by the RBPNN (before the filter
implemened by the probabilistic selector). Since the RBPNN
results have a probability between 0 and 1, then the shown
performance is 0 when a text was correctly attributed (or
not attributed) to a specific person. Figure 7-right shows the
performances of the system when including the probabilistic
selector. For this case, a boolean selection is involved, then
correct identifications are represented as 0, false positive
identifications as −1 (black marks), and missed identifications
as +1 (white marks).
For validation purposes, Figure 7-(left and right) shows
results according to e:
e = y − ỹ
IV.
E XPERIMENTAL SETUP
The proposed RBPNN architecture has been tested using
several text samples collected from public speeches of different
people both from the present and the past era. Each text sample
has been given to the preprocessing agent that extract some
Adaptive
critic
(9)
where e identifies the performance, ỹ the classification result,
and y the expected result. Lower e (negative values) identify
an excess of confidence in the attribution of a text to a person,
while greater e (positive values) identify a lack of confidence
in that sense.
Fig. 7. The obtained performance for our classification system before (left) and after (right) the maximum probability selector choice. The mean grey color
represents the correct classifications, while white color represents missed classification and black color false classifications.
The system was able to correctly attribute the text to the
proper author with only a 20% of missing assignments.
V.
R ELATED W ORKS
Several generative models can be used to characterise
datasets that determine properties and allow grouping data
into classes. Generative models are based on stochastic block
structures [33], or on ‘Infinite Hidden Relational Models’ [34],
and ‘Mixed Membership Stochastic Blockmodel’ [35]. The
main issue of class-based models is the type of relational
structure that such solutions are capable to describe. Since
the definition of a class is attribute-dependent, generally the
reported models risk to replicate the existing classes for each
new attribute added. E.g. such models would be unable to
efficiently organise similarities between the classes ‘cats’ and
‘dogs’ as child classes of the more general class ‘mammals’.
Such attribute-dependent classes would have to be replicated as
the classification generates two different classes of ‘mammals’:
the class ‘mammals as cats’ and the class ‘mammals as dogs’.
Consequently, in order to distinguish between the different
races of cats and dogs, it would be necessary to further
multiply the ‘mammals’ class for each one of the identified
race. Therefore, such models quickly lead to an explosion of
classes. In addition, we would either have to add another class
to handle each specific use or a mixed membership model, as
for crossbred species.
Another paradigm concerns the ’Non-Parametric Latent
Feature Relational Model’ [36], i.e. a Bayesian nonparametric
model in which each entity has boolean valued latent features
that influence the model’s relations. Such relations depend on
well-known covariant sets, which are neither explicit or known
in our case study at the moment of the initial analysis.
In [37], the authors propose a sequential forward feature
selection method to find the subset of features that are relevant
to a classification task. This approach uses novel estimation of
the conditional mutual information between candidate feature
and classes, given a subset of already selected features used as
a classifier independent criterion for evaluating feature subsets.
In [38], data from the charge-discharge simulation of
lithium-ions battery energy storage are used for classification
purposes with recurrent NNs and PNNs by means of a theoretical framework based on signal theory.
While showing the effectiveness of the neural network
based approaches, in our case study classification results are
given by means of a probability, hence the use of a RBPNN,
and an on-line training achieved by reinforcement learning.
VI.
C ONCLUSION
This work has presented a multi-agent system, in which an
agent analyses fragments of texts and another agent consisting
of a RBPNN classifier, performs probabilistic clustering. The
system has successfully managed to identify the most probable
author among a given list for the examined text samples. The
provided identification can be used in order to complement
and integrate a comprehensive verification system, or other
kinds of software systems trying to automatically identify
the author of a written text. The RBPNN classifier agent
is continuously trained by means of reinforcement learning
techniques in order to follow a potential correction provided by
an human supervisor, or an agent that learns about supervision.
The developed system was also able to cope with new data
that are continuously fed into the database, for the adaptation
abilities of its collaborating agents and their reasoning based
on NNs.
ACKNOWLEDGMENT
This work has been supported by project PRIME funded
within POR FESR Sicilia 2007-2013 framework and project
PRISMA PON04a2 A/F funded by the Italian Ministry of
University and Research within PON 2007-2013 framework.
R EFERENCES
[1]
C. Napoli, G. Pappalardo, E. Tramontana, Z. Marszałek, D. Połap,
and M. Woźniak, “Simplified firefly algorithm for 2d image key-points
search,” in IEEE Symposium Series on Computational Intelligence.
IEEE, 2014.
[2]
[3]
M. Gabryel, M. Woźniak, and R. K. Nowicki, “Creating learning sets
for control systems using an evolutionary method,” in Proceedings of
Artificial Intelligence and Soft Computing (ICAISC), ser. LNCS, vol.
7269. Springer, 2012, pp. 206–213.
F. Bonanno, G. Capizzi, A. Gagliano, and C. Napoli, “Optimal management of various renewable energy sources by a new forecasting
method,” in Proceedings of International Symposium on Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM). IEEE,
2012, pp. 934–940.
[20]
[21]
[4]
A. Nowak and M. Woźniak, “Analysis of the active module mechatronical systems,” in Proceedings of Mechanika - ICM. Kaunas, Lietuva:
Kaunas University of Technology Press, 2008, pp. 371–376.
[22]
[5]
C. Napoli, G. Pappalardo, and E. Tramontana, “A hybrid neuro–wavelet
predictor for qos control and stability,” in Proceedings of AI*IA:
Advances in Artificial Intelligence. Springer, 2013, pp. 527–538.
[23]
[6]
F. Bonanno, G. Capizzi, G. L. Sciuto, C. Napoli, G. Pappalardo, and
E. Tramontana, “A novel cloud-distributed toolbox for optimal energy
dispatch management from renewables in igss by using wrnn predictors
and gpu parallel solutions,” in Power Electronics, Electrical Drives,
Automation and Motion (SPEEDAM), 2014 International Symposium
on. IEEE, 2014, pp. 1077–1084.
[7]
A. Nowak and M. Woźniak, “Multiresolution derives analysis of module
mechatronical systems,” Mechanika, vol. 6, no. 74, pp. 45–51, 2008.
[8]
C. Napoli, G. Pappalardo, and E. Tramontana, “Using modularity metrics to assist move method refactoring of large systems,” in Proceedings
of International Conference on Complex, Intelligent, and Software
Intensive Systems (CISIS). IEEE, 2013, pp. 529–534.
[9]
G. Pappalardo and E. Tramontana, “Suggesting extract class refactoring
opportunities by measuring strength of method interactions,” in Proceedings of Asia Pacific Software Engineering Conference (APSEC).
IEEE, December 2013.
[10]
E. Tramontana, “Automatically characterising components with concerns and reducing tangling,” in Proceedings of Computer Software
and Applications Conference (COMPSAC) Workshop QUORS. IEEE,
July 2013. DOI: 10.1109/COMPSACW.2013.114, pp. 499–504.
[11]
C. Napoli, G. Papplardo, and E. Tramontana, “Improving files availability for bittorrent using a diffusion model,” in IEEE 23nd International
Workshop on Enabling Technologies: Infrastructure for Collaborative
Enterprises - WETICE 2014, June 2014, pp. 191–196.
[12]
R. Giunta, G. Pappalardo, and E. Tramontana, “Aspects and annotations
for controlling the roles application classes play for design patterns,” in
Proceedings of Asia Pacific Software Engineering Conference (APSEC).
IEEE, December 2011, pp. 306–314.
[13]
A. Calvagna and E. Tramontana, “Delivering dependable
reusable components by expressing and enforcing design
decisions,” in Proceedings of Computer Software and Applications
Conference (COMPSAC) Workshop QUORS.
IEEE, July 2013.
DOI: 10.1109/COMPSACW.2013.113, pp. 493–498.
[14]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
R. Giunta, G. Pappalardo, and E. Tramontana, “AODP: refactoring code
to provide advanced aspect-oriented modularization of design patterns,”
in Proceedings of Symposium on Applied Computing (SAC). ACM,
2012.
[34]
[15]
E. Tramontana, “Detecting extra relationships for design patterns roles,”
in Proceedings of AsianPlop, March 2014.
[35]
[16]
G. Capizzi, C. Napoli, and L. Paternò, “An innovative hybrid neurowavelet method for reconstruction of missing data in astronomical
photometric surveys,” in Proceedings of Artificial Intelligence and Soft
Computing (ICAISC). Springer, 2012, pp. 21–29.
[36]
[17]
F. Bonanno, G. Capizzi, G. L. Sciuto, C. Napoli, G. Pappalardo, and
E. Tramontana, “A cascade neural network architecture investigating
surface plasmon polaritons propagation for thin metals in openmp,” in
Proceedings of Artificial Intelligence and Soft Computing (ICAISC), ser.
LNCS, vol. 8467. Springer, 2014, pp. 22–33.
[18]
C. Napoli, F. Bonanno, and G. Capizzi, “Exploiting solar wind time
series correlation with magnetospheric response by using an hybrid
neuro-wavelet approach,” Proceedings of the International Astronomical
Union, vol. 6, no. S274, pp. 156–158, 2010.
[19]
G. Capizzi, F. Bonanno, and C. Napoli, “Hybrid neural networks
architectures for soc and voltage prediction of new generation batteries
[37]
[38]
storage,” in Proceedings of International Conference on Clean Electrical Power (ICCEP). IEEE, 2011, pp. 341–344.
C. Napoli, F. Bonanno, and G. Capizzi, “An hybrid neuro-wavelet
approach for long-term prediction of solar wind,” IAU Symposium, no.
274, pp. 247–249, 2010.
G. Capizzi, F. Bonanno, and C. Napoli, “A new approach for lead-acid
batteries modeling by local cosine,” in Power Electronics Electrical
Drives Automation and Motion (SPEEDAM), 2010 International Symposium on, June 2010, pp. 1074–1079.
W. Duch, “Towards comprehensive foundations of computational intelligence,” in Challenges for Computational Intelligence. Springer,
2007, pp. 261–316.
G. Capizzi, F. Bonanno, and C. Napoli, “Recurrent neural networkbased control strategy for battery energy storage in generation systems
with intermittent renewable energy sources,” in Proceedings of International Conference on Clean Electrical Power (ICCEP). IEEE, 2011,
pp. 336–340.
S. Haykin, Neural Networks - A comprehensive foundation. Prentice
Hall, 2004.
S. Mika, G. Ratsch, W. Jason, B. Scholkopft, and K.-R. Muller,
“Fisher discriminant analysis with kernels,” in Proceedings of the Signal
Processing Society Workshop. Neural networks for signal processing IX.
IEEE, 1999.
D. F. Specht, “Probabilistic neural networks,” Neural networks, vol. 3,
no. 1, pp. 109–108, 1990.
H. Deshuang and M. Songde, “A new radial basis probabilistic neural
network model,” in Proceedings of Conference on Signal Processing,
vol. 2. IEEE, 1996.
W. Zhao, D.-S. Huang, and L. Guo, “Optimizing radial basis probabilistic neural networks using recursive orthogonal least squares algorithms
combined with micro-genetic algorithms,” in Proceedings of Neural
Networks, vol. 3. IEEE, 2003.
D. V. Prokhorov, R. A. Santiago, and D. C. W. II, “Adaptive
critic designs: A case study for neurocontrol,” Neural Networks,
vol. 8, no. 9, pp. 1367 – 1372, 1995. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/0893608095000429
H. Javaherian, D. Liu, and O. Kovalenko, “Automotive engine torque
and air-fuel ratio control using dual heuristic dynamic programming,”
in Proceedings of International Joint Conference on Neural Networks
(IJCNN), 2006, pp. 518–525.
B. Widrow and M. Lehr, “30 years of adaptive neural networks:
perceptron, madaline, and backpropagation,” Proceedings of the IEEE,
vol. 78, no. 9, pp. 1415–1442, Sep 1990.
J.-W. Park, R. Harley, and G. Venayagamoorthy, “Adaptive-criticbased optimal neurocontrol for synchronous generators in a power
system using mlp/rbf neural networks,” IEEE Transactions on Industry
Applications, vol. 39, no. 5, pp. 1529–1540, Sept 2003.
K. Nowicki and T. A. B. Snijders, “Estimation and prediction for
stochastic blockstructures,” Journal of the American Statistical Association, vol. 96, no. 455, pp. 1077–1087, 2001.
Z. Xu, V. Tresp, K. Yu, and H. peter Kriegel, “Infinite hidden relational
models,” in In Proceedings of International Conference on Uncertainity
in Artificial Intelligence (UAI), 2006.
E. M. Airoldi, D. M. Blei, E. P. Xing, and S. E. Fienberg, “Mixed
membership stochastic block models,” in Advances in Neural Information Processing Systems (NIPS). Curran Associates, 2009.
K. Miller, T. Griffiths, and M. Jordan, “Nonparametric latent feature
models for link prediction,” in Advances in neural information processing systems (NIPS). Curran Associates, Inc., 2009, vol. 22, pp.
1276–1284.
J. Novovičová, P. Somol, M. Haindl, and P. Pudil, “Conditional mutual
information based feature selection for classification task,” in Progress
in Pattern Recognition, Image Analysis and Applications. Springer,
2007, pp. 417–426.
F. Bonanno, G. Capizzi, and C. Napoli, “Some remarks on the application of rnn and prnn for the charge-discharge simulation of advanced
lithium-ions battery energy storage,” in Proceedings of International
Symposium on Power Electronics, Electrical Drives, Automation and
Motion (SPEEDAM). IEEE, 2012, pp. 941–945.
| 9cs.NE
|
From Traces To Proofs: Proving Concurrent
Programs Safe
arXiv:1506.07635v3 [cs.PL] 28 Apr 2016
Chinmay Narayan∗, Subodh Sharma† , Shibashis Guha‡ and S.Arun-Kumar§
Department of Computer Science and Engineering,
Indian Institute of Technology Delhi
Email: ∗ [email protected], † [email protected], ‡ [email protected], § [email protected]
flagi = f alse, flagj = f alse, t = 0;
Abstract—Nondeterminism in scheduling is the cardinal reason
for difficulty in proving correctness of concurrent programs.
A powerful proof strategy was recently proposed [6] to show
the correctness of such programs. The approach captured dataflow dependencies among the instructions of an interleaved and
error-free execution of threads. These data-flow dependencies
were represented by an inductive data-flow graph (iDFG), which,
in a nutshell, denotes a set of executions of the concurrent
program that gave rise to the discovered data-flow dependencies.
The iDFGs were further transformed in to alternative finite
automatons (AFAs) in order to utilize efficient automata-theoretic
tools to solve the problem. In this paper, we give a novel and
efficient algorithm to directly construct AFAs that capture the
data-flow dependencies in a concurrent program execution. We
implemented the algorithm in a tool called ProofTraPar to
prove the correctness of finite state cyclic programs under the
sequentially consistent memory model. Our results are encouranging and compare favorably to existing state-of-the-art tools.
Pi
W hile(true){
1. flagi ∶=true;
2. t∶=j;
3. while(flag j = true & t = j);
4. //Critical Section
5. flagi ∶=false;
}
Pj
W hile(true){
6. flagj ∶=true;
7. t∶=i;
8. while(flagi = true & t = i);
9. //Critical Section
10. flagj ∶=false;
}
Fig. 1: Peterson’s algorithm for two processes Pi and Pj
shown to hold true on unbounded number of traces (trace is “a
sequence of events corresponding to an interleaved execution
of processes in the program”[9]) generated due to unbounded
number of unfoldings of the loops. Notice that events at control
locations 3 and 8 are data-dependent on events from control
locations 2, 6, 7 and 1, 2, 7, respectively. In any finite prefix
of a trace of Pi ∥Pj (interleaved execution of Pi and Pj ) up
to the events corresponding to control location 3 or 8, the
last instance of event at control location 2, lst2, and the last
instance of event at control location 7, lst7, can be ordered
in only one of the following two ways; either lst2 appears
before lst7 or lst2 appears after lst7. This has resulted in
partitioning of an unbounded set of traces to a set with mere
two traces.
When lst2 appears before lst7, then the final value of the
variable t is i, thus making the condition at control location 8
to be true. In the other case, when lst2 appears after lst7,
the final value of the variable t is j, thereby making the
condition at control location 3 evaluate to true. Hence, in
no trace both the conditions are false simultaneously. This
informal reasoning indicates that both processes can never
simultaneously enter in their critical sections. Thus, proof of
correctness for Peterson’s algorithm can be demonstrated by
picking two traces, as mentioned above, from the set of infinite
traces and proving them correct. In general, the intuition is that
a proof for a single trace of a program can result in pruning
of a large set of traces from consideration. To convert this
intuition to a feasible verification method, there is a need to
construct a formal structure from a proof of a trace σ such
that the semantics of this structure includes a set of all those
traces that have proof arguments equivalent to proof of σ.
Inductive Data Flow Graphs (iDFG) was proposed in [6] to
capture data-dependencies among the events of a trace and to
perform trace partitioning. All traces that have the same iDFG
I. I NTRODUCTION
The problem of checking whether or not a correctness
property (specification) is violated by the program (implementation) is already known to be challenging in a sequential
set-up, let alone when programs are implemented exploiting concurrency. The central reason for greater complexity
in verification of concurrent implementations is due to the
exponential increase in the number of executions. A concurrent
program with n threads and k instructions per thread can
have (nk)!/(k!)n executions under a sequentially consistent
(SC)[12] memory model. A common approach to address the
complexity due to the exponential number of executions is
trace partitioning.
In [6], a powerful proof strategy was presented which
utilized the notion of trace partitioning. Let us take Peterson’s
algorithm in Figure 1 to convey the central idea behind the
trace partitioning approach. In this algorithm, two processes,
Pi and Pj , coordinate to achieve an exclusive access to a
critical section (CS) using shared variables. A process Pi will
busy-wait if Pj has expressed interest to enter its CS and t is
j.
In order to prove the mutual exclusion (ME) property of
Peterson’s algorithm, we must consider the boolean conditions
of the while loops at control locations 3 and 8. the ME property
is established only when at most one of these conditions is
false under every execution of the program, i.e., ME must be
1
d
the lines of [6].
While [6] allowed the use of any sequential verification
method to construct a proof of a given trace, the paper
does not comment on the performance and the feasibility
of their approach due to the lack of an implementation.
The second contribution of this paper is an implementation in the form of a tool, ProofTraPar. We compare
our implementation against other state-of-the-art tools
in this domain, such as THREADER [10] and LazyCSeq [11] (winners in the concurrency category of the
software verification competitions held in 2013, 2014, and
2015). ProofTraPar, on average, performed an order
of magnitude better than THREADER and 3 times better
than Lazy-CSeq.
The paper is organized as follows: Section II covers the
notations, definitions and programming model used in this
paper; Section III presents our approach with the help of an
example to convey the overall idea and describes in detail
the algorithms for constructing the proposed alternating finite
automaton along with their correctness proofs. This section
ends with the overall verification algorithm with the proof
of its soundness and completeness for finite state concurrent
programs. Section IV presents the experimental results and
comparison with existing tools namely THREADER [10] and
Lazy-CSeq [11]. Section V presents the related work and
Section VI concludes with possible future directions.
w>3
●
init s0
true
r ∶= w + 1 s1
r>w
a. y ∶= w
b. r ∶= w + 1
c. t ∶= x − 1
(a)
w>3
y ∶= w s2
y>3
t ∶= x − 1 s3
y>3 ∧ t<x
∧ r>w
{abc, bac}
(b)
{abc, bac, acb, cab, bca, cba}
d
(d)
(c)
Fig. 2: Comparison with [6]
must have the same proof of correctness. In every iteration of
their approach, a trace is picked from the set of all traces that
is yet to be covered by the iDFG. An iDFG is constructed
from its proof. The process is repeated until all the traces are
either covered in the iDFG or a counter-example is found.
An intervening step is involved where the iDFG is converted
to an alternating finite automaton (AFA). While we explain
AFA in later sections, it suffices to understand at this stage
that the language accepted by this AFA and the set of traces
captured by the corresponding iDFG is the same. Their reason
for this conversion is to leverage the use of automata-theoretic
operations such as subtraction, complement etc., on the set of
traces.
Though the goal of paper [6] is verification of concurrent
programs which is the same as in this work, our work has some
crucial differences: (i) An AFA is constructed directly from the
proof of a trace without requiring the iDFG construction, (ii)
the verification procedure built on directly constructed AFA is
shown to be sound and complete (weakest-preconditions are
used to obtain the proof of correctness of a trace), (iii) to the
best of our knowledge, we provide the first implementation of
the proof strategy discussed in [6]. The example trace of Figure
2(a) highlights the key difference between iDFG to AFA conversion of [6] and the direct approach presented in this work.
Note that all three events a, b, and c are data independent,
hence every resulting trace after permuting the events in abc
also satisfies the same set of pre- and post-conditions. For a
Hoare triple {w > 3} abc {y > 3 ∧ t < x ∧ r > w} , Figure
2(b) shows the set of traces admitted by an AFA (obtained
from iDFG shown in Figure 2(d)) after the first iteration, as
computed by [6]. This set clearly does not represent every
permutation of abc; consequently, more iterations are required
to converge to an AFA that represents all traces admissible
under the same set of pre- and post-conditions. In contrast,
the AFA that is constructed directly by our approach from the
Hoare triple {w > 3} abc {y > 3 ∧ t < x ∧ r > w} , admits
the set of traces shown in Figure 2(c). Hence, on this example,
our strategy terminates in a single iteration.
To summarize, the contributions of this work are as follows:
●
II. P RELIMINARIES
A. Program Model
We consider shared-memory concurrent programs composed of a fixed number of deterministic sequential processes
and a finite set of shared variables SV. A concurrent program
is a quadruple P = (P, A, I, D) where P is a finite set of
processes, A = {Ap ∣ p ∈ P } is a set of automata, one for each
process specifying their behaviour, D is a finite set of constants
appearing in the syntax of processes and I is a function from
variables to their initial values. Each process p ∈ P has a
disjoint set of local variables LVp . Let Expp (BExpp ) denote
the set of expressions (boolean expressions), ranged over by
exp (φ) and constructed using shared variables, local variables,
D, and standard mathematical operators. Each specification
automaton Ap is a quadruple ⟨Qp , qpinit , δp , Assrnp ⟩ where Qp
is a finite set of control states, qpinit is the initial state, and
Assrnp ⊆ Qp ×BExpp is a relation specifying the assertions that
must hold at some control state. Each transition in δp is of the
form (q, opp , q ′ ) where opp ∈ {x∶=exp, assume(φ), lock(x)}.
Here x∶=exp evaluates exp in the current state and assigns
the value to x where x ∈ SV ∪ LVp . assume(φ) is a blocking
operation that suspends the execution if the boolean expression
φ evaluates to false otherwise it acts as nop. This instruction is
used to encode control path conditions of a program. lock(x),
where x ∈ SV, is a blocking operation that suspends the execution if the value of x is not equal to 0 otherwise it assigns 1 to
x. Operation unlock is achieved by assigning 0 to this shared
variable. Each of these operations are deterministic in nature,
we present a novel algorithm to directly construct an AFA
from a proof of a sequential trace of a finite state (possibly
cyclic) concurrent program. This construction is used to
give a sound and complete verification procedure along
2
p
a
qq
qb
b
qc
e
⎧
⎪
φ
⎪
⎪
⎪
⎪
⎪
⎪
⎪
φ[x/exp]
⎪
⎪
⎪
⎪
⎪
⎪
⎪φ ∧ φ′
wp(op, φ) = ⎨
⎪
⎪
wp(assume(x = 0), wp(x∶=1, φ))
⎪
⎪
⎪
⎪
⎪wp(op , wp(op , φ))
⎪
⎪
1
2
⎪
⎪
⎪ ′
⎪
⎪
⎪
⎩φ ⇒ φ
qp
qa
t
a.flag1 ∶=true
b. turn∶=2
A. assume(¬φ)
B. assume(φ)
c. res∶=1
d. ℓ1 ∶=res
e. flag1 ∶=false
q
B
qr
A
Q
P
qd
qs
c
r
qe
p. flag2 ∶=true
q. turn∶=1
P. assume(¬φ′ )
Q. assume(φ′ )
r. res∶=2
s. ℓ2 ∶=res
t.flag2 ∶=false
qu
def
def
AssrnP1 (qf ) = (ℓ1 = 1), AssrnP2 (qu ) = (ℓ2 = 2)
def
if op = x∶=exp
if op = assert(φ′ )
def
def
if op = lock(x)
def
if op = op1 .op2
if op = assume(φ′ )
def
of the operation op terminates and the resulting program state
s′ satisfies φ.
Given a formula φ, variable X and expression e, let
φ[X/e] denote the formula obtained after substituting all free
occurrences of X by e in φ. We assume an equality operator
over formulae that represents syntactic equality. Every formula
is assumed to be normalized in a conjunctive normal form
(CNF). We use true (false) to syntactically represent a logically
valid (unsatisfiable) formula. Weakest precondition axioms for
different program statements are shown in Figure 4. Here
empty sequence of statements is denote by skip. We have the
following properties about weakest preconditions.
Property 1: If wp(op, φ1 ) = ψ1 and wp(op, φ2 ) = ψ2 then,
● wp(op, φ1 ∧ φ2 ) = ψ1 ∧ ψ2 , and
● wp(op, φ1 ∨ φ2 ) = ψ1 ∨ ψ2 . Note that this property
holds only when S is a deterministic operation which is
true in our programming model.
Property 2: Let φ1 and φ2 be the formulas such that φ1
logically implies φ2 then for every operation op, the formula
wp(op, φ1 ) logically implies wp(op, φ2 ).
We say that a formula φ is stable with respect to a statement
S if wp(S, φ) is logically equivalent to φ. In this paper, we use
weakest preconditions to check the correctness of a trace with
respect to some safety assertion. A trace σ reaching up to a
safety assertion φ is safe if the execution of σ starting from the
initial state I either 1) blocks (does not terminate) because of
not satisfying some path conditions, or 2) terminates and the
resulting state satisfies φ. The following lemmas clearly define
the conditions, using weakest precondition axioms, for declaring a trace σ either safe or unsafe. Detailed proofs of these
are given in Appendix A and in B. Here σ[assume/assert]
denote the trace obtained by replacing every instruction of the
form assume(φ) by assert(φ) in σ.
Lemma 1: For a trace σ, an initial program state I and
a safety property φ, if wp(σ[assume/assert], ¬φ) ∧ I is
unsatisfiable then the execution of σ, starting from I, either
does not terminate or terminates in a state satisfying φ.
Lemma 2: For a trace σ, an initial program state I and
a safety property φ, if wp(σ[assume/assert], ¬φ) ∧ I is
satisfiable then the execution of σ, starting from I, terminates
in a state not satisfying φ.
s
qf
def
Fig. 4: Weakest precondition axioms
qt
d
def
if op = skip
′ def
φ = flag2 = true && turn = 2, φ = flag1 = true && turn = 1
Fig. 3: Specification of Peterson’s algorithm
i.e. execution of any two same operations from the same
states always give the same behaviour. In all examples of this
paper, we use symbolic labels to succinctly represent program
operations. For example, Figure 3 shows the specification of
two processes in Peterson’s algorithm. Labels {a, b, p, q⋯}
denote operations in the program. Variable res is introduced
to specify the mutual exclusion property as a safety property.
A process Pi sets this variable to i inside its critical section.
Assertions assert(res = i) is checked in Pi before leaving its
critical section. If these assertions hold in every execution of
these two processes then the mutual exclusion property holds.
These assertions are shown as AssrnP1 (qf ) and AssrnP2 (qu )
in Figure 3 and they need to be checked at state qf and qu
respectively. A tuple, say t, of n elements can be represented
as a function such that t[k] returns the k th element of this
tuple. Given a function f un, f un[a ← b] denotes another
function same as of f un except at a where it returns b.
a) Parallel Composition in the SC memory model:
Given a concurrent program P = (P, A, I, D) consisting of
n processes P = {p1 , ⋯, pn } we define an automaton A(P) =
(Q, q init , δ, Assrn) to represent the parallel composition of P
in the SC memory model. Here Q = Qp1 × ⋯ × Qpn is the set
of states ranged over by q, q init = (qpinit
, ⋯, qpinit
) is the initial
1
n
state, and transition relation δ models the interleaving semantics. Formally, (q, opj , q ′ ) ∈ δ iff there exists a j ∈ {1⋯n} such
that q[j] = qpj , q ′ = q[j ← qp′ j ] and (qpj , opj , qp′ j ) ∈ δpj . For a
state q, let T (q) = {Assrnpi (q[i]) ∣ i ∈ {1⋯n}}. If T (q) is not
empty then Assrn(q) is the conjunction of assertions in the
set T (q). Relation Assrn captures the assertions which need
to be checked in the interleaved traces of P . As our interest
lies in analyzing those traces which reach those control points
where assertions are specified, we mark all those states where
the relation Assrn is defined as accepting states. Every word
accepted by A(P) represents one SC execution leading to a
control location where at least one assertion is to be checked.
C. Alternating Finite Automata (AFA)
B. Weakest Precondition
Alternating finite automata [1], [3] are a generalization of
nondeterministic finite automata (NFA). An NFA is a five tuple
⟨S, Σ ∪ {ǫ}, δ, s0 , SF ⟩ with a set of states S, ranged over by s,
an initial state s0 , a set of accepting states SF and a transition
function δ ∶ S×Σ∪{ǫ} → P(S). For any state s of this NFA, the
Given an operation op ∈ OP(P ) and a postcondition
formula φ, the weakest precondition of op with respect to φ,
denoted by wp(op, φ), is the weakest formula ψ such that,
starting from any program state s that satisfies ψ, the execution
3
δ(s, op) =
set of words accepted by s is inductively defined as acc(s) =
{a.σ ∣ a ∈ Σ ∪ {ǫ}, σ ∈ Σ∗ , ∃s′ . s′ ∈ δ(s, a). σ ∈ acc(s′ )}
where ǫ ∈ acc(s) for all s ∈ SF . Here, the existential quantifier
represents the fact that there should exist at least one outgoing
transition from s along which a.σ gets accepted. An AFA is
a six tuple ⟨S∀ , S∃ , Σ ∪ {ǫ}, δ, s0 , SF ⟩ with Σ, s0 and SF ⊆ S
denoting the alphabet, initial state and the set of accepting
states respectively. S = S∀ ⋃ S∃ is the set of all states, ranged
over by s and δ ∶ S ×Σ∪{ǫ} → P(S) is the transition function.
The set of words accepted by a state of an AFA depends on
whether that state is an existential state (from the set S∃ ) or
a universal state (from the set S∀ ). For an existential state
s ∈ S∃ , the set of accepted words is inductively defined in
the same way as in NFA. For a universal state s ∈ S∀ the
set of accepted words are acc(s) = {a.σ ∣ a ∈ Σ ∪ {ǫ}, ∀s′ ∈
δ(s, a). σ ∈ acc(s′ )} with ǫ ∈ acc(s) for all s ∈ SF . Notice
the change in the quantifier from ∃ to ∀. In the diagrams of
AFA used in this paper, we annotate universal states with ∀
symbol and existential states with ∃ symbol. For a state s, let
succ(s, a) = {S ∣ (s, a, S) ∈ δ} be the set of a-successors of
s. For an automaton A, let L(A) be the language accepted by
the initial state of that automaton. For any σ ∈ Σ∗ ∣σ∣ denote
the length of σ and rev(σ) denote the reverse of σ.
1.AMap(s′ ) = wp(op[assume/assert], AMap(s)),
2.s is an existential state, and
3.RMap(s) = RMap(s′ ).op.σ ′′
where σ ′′ is the longest sequence s.t.
wp(σ ′′ [assume/assert], AMap(s)) = AMap(s)
(L ITERAL -A SSN)
{s}
if {
{s1 , ⋯, sk }
⎧
⎪
⎪
⎪
⎪
⎪
if ⎨
⎪
⎪
⎪
⎪
⎪
⎩
1.AMap(s) = wp(op[assume/assert], AMap(s)), and
2.s is an existential state
(L ITERAL -S ELF -A SSN)
{}
1.AMap(s) = ⋀k φk or AMap(s) = ⋁k φk ,
2.AMap(sk ) = φk ,
3.∀k, RMap(s) = RMap(sk ),
4.op = ǫ
(C OMPOUND -A SSN)
otherwise
Fig. 5: Transition function used in the Definition 1
1) (OP ǫ = OP ∪ {ǫ}) is the alphabet ranged over by op.
Here OP is the set of instructions used in program P .
Symbol ǫ acts as an identity element of concatenation
and wp(ǫ, φ) = φ.
2) S = S∀ ⋃ S∃ is the largest set of states, ranged over by
s s.t.
a) Every state is annotated with a formula and a prefix
of σ denoted by AMap(s) and RMap(s) respectively.
State s0 is the initial state such that AMap(s0 ) = φ,
RMap(s0 ) = σ.
b) s′ ∈ S iff either of the following two conditions
hold,
● ∃s
∈
S such that AMap(s′ ) is
wp(op[assume/assert], AMap(s)),
RMap(s) = RMap(s′ ).op.σ ′ and σ ′ is the largest
suffix of RMap(s) such that formula AMap(s) is
stable with respect to σ ′ [assume/assert].
● ∃s ∈ S such that AMap(s) = ⋀{φ1 , ⋯, φk } or
AMap(s) = ⋁{φ1 , ⋯, φk }, RMap(s) = RMap(s′ ),
AMap(s′ ) = φ′ and φ′ ∈ {φ1 , ⋯, φk }.
c) A state s ∈ S is an existential state (universal state)
iff AMap(s) is a literal (compound formula).
3) SF ⊆ S is a set of accepting states such that s ∈
SF iff wp(RMap(s)[assume/assert], AMap(s)) is same
as AMap(s), i.e. AMap(s) is stable with respect to
RMap(s)[assume/assert], and
4) Function δ ∶S ×OP ǫ →P(S) is defined in Figure 5.
Following Point 2b, any state added to S is either annotated
with a smaller RMap or a smaller formula compared to the
states already present in S. Further, every formula and trace
σ is of finite length. Hence the set of states S is finite. By
Point 2c of this construction, a state s where AMap(s) is a
compound formula, is always a universal state irrespective of
whether AMap(s) is a conjunction or a disjunction of clauses.
The reason behind this decision will be clear shortly when
we will use this AFA to inductively construct the weakest
precondition wp(σ[assume/assert], φ). Note that we assume
every formula is normalized in CNF.
Figure 7 shows an example trace σ = abApqPrcs of
Peterson’s algorithm. This trace is picked from the Peterson’s
III. O UR A PPROACH
The overall approach of this paper can be described in the
following steps: (i) Given a concurrent program P, construct
all its interleaved traces represented by automaton A(P), as
defined in Subsection II-A; (ii) Pick a trace σ and a safety
property, say φ, to prove for this trace; (iii) Prove σ correct
with respect to φ using Lemma 1 and Lemma 2 and generate
a set of traces which are also provably correct. Let us call this
set T r′ ; (iv) Remove set T r′ from the set of traces represented
by A(P) and repeat from Step (ii) until either all the traces
in P are proved correct or an erroneous trace is found.
Step (iii) of this procedure, correctness of σ, can be achieved
by checking the unsatisfiability of wp(σ[assume/assert],
¬φ) ∧ I. However, we are not only interested in checking the
correctness of σ but also in constructing a set of traces which
have a similar reasoning as of σ. Therefore, instead of computing wp(σ[assume/assert], ¬φ) directly from the weakest
precondition axioms of Figure 4, we construct an AFA from
σ and ¬φ. Step (iv) is then achieved by applying automatatheoretic operations such as complementation and subtraction
on this AFA. Notion of universal and existential states of
AFA helps us in finding a set of sufficient dependencies used
in the weakest precondition computation so that any other
trace satisfying those dependencies gets captured by AFA.
Subsequent subsections covers the construction, properties and
use of this AFA in detail.
A. Constructing the AFA from a Trace and a Formula
Definition 1: An
AFA
constructed
from
trace σ of a Program P and a formula φ
Âσ,φ = ⟨S∀ , S∃ , OPǫ , s0 , SF , δ, AMap, RMap⟩, where,
{s′ }
⎧
⎪
⎪
⎪
⎪
⎪
⎪
⎪
if ⎨
⎪
⎪
⎪
⎪
⎪
⎪
⎪
⎩
a
is
4
Σ ∖ {a, e, A, P}
Σ
abApqPrcs
∃
¬(ℓ2 = 2)
s0
s
Σ ∖ {s, A, P}
true ∃
s2
Σ ∖ {A, P}
abApqPr
P
flag1 = false
ǫ
abApq
flag1 = false
∨ turn = 2
s3
false ∃
s12
flag1 = false
s8
ǫ
Σ ∖ {a, e, A, P}
s4
Σ ∖ {c, r, A, P}
¬(res = 2) ∃
s1
c
abApqPrc
a
∃
abApq
flag1 = false∧
(flag2 = false
∨ turn = 1)
A
s7
Σ
abApq
s5 turn = 2 ∃
Σ ∖ {b, q, A, P}
q
ab
flag2 = false
s10
ǫ
ǫ
flag2 = false
∨ turn = 1
∀
∃
ab
∀
ab
s9
ǫ
ab
∀
ǫ
∃
Σ ∖ {p, t, A, P}
turn = 1 ∃ ab
Σ ∖ {b, q, A, P}
s11
b
false ∃ a
s13
Σ
false ∃ abAp
s6
Fig. 6: AFA of trace given in Figure 6(b) and φ = ¬(ℓ2 = 2)
a. flag1 ∶=true
b. turn∶=2
flag2 = false
A. assume(
)
∣∣ turn = 1
p. flag2 ∶=true
q. turn∶=1
flag1 = false
P. assume(
)
∣∣ turn = 2
r. res∶=2
c. res∶=1
s. ℓ2 ∶=res
Fig. 7: A trace from Peterson’s algorithm
HMap(s) =
specification in Figure 3. To prove σ correct with respect to the
def
safety formula φ = (ℓ2 = 2) we first construct Âσ,¬φ which
will later help us to derive wp(σ[assume/assert], ¬φ). This
AFA is shown in Figure 6. For a state s, AMap(s) is written
inside the rectangle representing that state and RMap(s) is
written inside an ellipse next to that state. We show here some
of the steps illustrating this construction.
1) By Definition 1, we have AMap(s0 ) = ¬(ℓ2 = 2) and
RMap(s0 ) = σ = abApqPrcs for initial state s0 .
2) In a transition δ(s, op) = {s′ } created by Rule
L ITERAL -A SSN the state s′ is annotated with the weakest precondition of an operation op, taken from RMap(s),
with respect to AMap(s). Operation op is picked in
such a way that AMap(s) is stable with respect to
every other operation present after op in RMap(s).
Such transitions capture the inductive construction of
the weakest precondition for a given φ and trace σ.
Transition δ(s0 , s) = {s1 } in Figure 6 is created by this
rule as wp(s[assume/assert], AMap(s0 )) = AMap(s1 ),
and RMap(s0 ) = RMap(s1 ).s.
3) In any transition created by Rule C OMPOUND -A SSN ,
say from s to s1 , ⋯, sk , the states s1 , ⋯sk are annotated
with the subformulae of AMap(s). For example, transitions δ(s3 , ǫ) = {s4 , s5 } and δ(s7 , ǫ) = {s8 , s9 }.
4) Transition δ(s8 , a) = {s12 } follows from the rule
L ITERAL -A SSN. Note that RMap(s12 ) is empty and
hence by Point 3 of Definition 1, s12 is an accepting
state. Following the same reasoning, states s6 , s10 and
s13 are also set as accepting states.
5) Rule L ITERAL -S ELF -A SSN adds a self transition at a
state s on a symbol op ∈ OP ǫ such that AMap(s) is stable with respect to op[assume/assert]. For example,
transitions δ(s0 , op) = {s0 } where op ∈ OP ǫ ∖ {s, A, P}.
The following lemma relates RMap(s) at any state to the set
of words accepted by s in this AFA.
Lemma 3: Given a σ ∈ L(A(P)) and φ, let Âσ,φ be the
AFA satisfying Definition 1. For every state s of this AFA,
the condition rev(RMap(s)) ∈ acc(s) holds.
A detailed proof of this lemma is given in Appendix C. This
lemma uses the reverse of RMap(s) in its statement because
if s ∈ SF
AMap(s)
⋀ HMap(sk )
k
⋁ HMap(sk )
k
HMap(s )
′
(BASE - CASE)
if δ(s, ǫ) = {s1 , ⋯, sk } and AMap(s) = ⋀ AMap(sk )
k
(C ONJ - CASE)
if δ(s, ǫ) = {s1 , ⋯, sk } and AMap(s) = ⋁ AMap(sk )
k
(D ISJ - CASE)
if (s, op, {s′ }) ∈ δ
(L IT- CASE)
Fig. 8: Rules for HMap construction
the weakest precondition of a sequence is constructed by
scanning it from the end. This can be seen in the transition
rule L ITERAL -A SSN. As a corollary, rev(σ) is also accepted
by this AFA because by Definition 1, RMap(s0 ) is σ.
B. Constructing the weakest precondition from Âσ,φ
After constructing Âσ,φ the rules given in Figure 8 are used
to inductively construct and assign a formula, HMap(s), to
every state s of Âσ,φ . Figure 9 shows the AFA of Figure
6 where states are annotated with formula HMap(s). This
formula is shown in the ellipse beside every state. For better
readability we do not show RMap(s) in this figure.
Following Rule BASE - CASE , HMap of s6 , s12 , and s13
are set to false whereas HMap(s10 ) is set to flag2 = false.
By Rule L IT- CASE, HMap of s5 , s8 and s11 are also set to
false. After applying Rule D ISJ - CASE for transition δ(s9 , ǫ) =
{s10 , s11 }, HMap(s9 ) is set to flag2 = false. Similarly, using
Rule C ONJ - CASE we get HMap(s7 ) as false. Finally, HMap(s0 )
is also set to false. HMap constructed inductively in this manner
satisfies the following property;
Lemma 4: Let  be an AFA constructed from a trace and a
post condition as in Definition 1 then for every state s of this
AFA and for every word σ accepted by state s, HMap(s) is logically equivalent to wp(rev(σ)[assume/assert], AMap(s)).
Here we present the proof outline. Detailed proof is given
in Appendix E. First consider the accepting states of Â.
For example, states s6 , s10 , s12 and s13 of Figure 9.
Following the definition of an accepting state and by the
self-loop adding transition rule L ITERAL -S ELF -A SSN, ev5
Σ ∖ {a, e, A, P}
false
Σ
¬(ℓ2 = 2) ∃
s0
s
¬(res = 2)
s1
c
false
true ∃
Σ ∖ {A, P}
flag1 = false
s8
ǫ
s2
∃
Σ ∖ {s, A, P}
false
flag2 = false
s10
ǫ
ǫ
flag2 = false
∨ turn = 1
∀
s7
Σ ∖ {c, r, A, P}
flag1 = false
∨ turn = 2
s3
s4 flag1 = false ∃
false
Σ ∖ {a, e, A, P}
ǫ
Σ
∀
ǫ
Σ ∖ {b, q, A, P}
flag2 = false
∀
flag2 = false
s9
false ∃ false
s13
Σ
false
s5 turn = 2 ∃
ǫ
∃
Σ ∖ {b, q, A, P}
turn = 1 ∃
s11
b
false
A
false
P
∃
flag1 = false∧
(flag2 = false
∨ turn = 1)
false
false
false
a
false ∃
s12
Σ ∖ {p, t, A, P}
q
false ∃ false
s6
Algorithm 1: Converting universal to existential states while
preserving Lemma 4
Data: Input AFA ⟨S∀ , S∃ , OP ∪ {ǫ}, s0 , SF , AMap, RMap⟩
Result: Modified AFA
1 Let s be a state in AFA such that s ∈ S∀ ,
δ(s, ǫ) = {s1 , ⋯, sk }, HMap(s) is unsatisfiable, and
AMap(s) = ⋀k AMap(sk );
2 Let Unsatcore(s) ⊆ P({s1 , ⋯, sk }) such that
{s′1 , ⋯, s′n } ∈ Unsatcore(s) iff {HMap(s′1 ), ⋯, HMap(s′n )}
is a minimal unsat core of ⋀k HMap(sk ) ;
3 Create an empty set U;
′
′
4 foreach {s1 , ⋯, sn } ∈ Unsatcore(s) do
5
create a new universal state su ∈ S∀ and add it to the
set U;
6
Set AMap(su ) = ⋀i AMap(s′i ) ;
7
Set HMap(su ) = ⋀i HMap(s′i );
8
Add a transition by setting δ(su , ǫ) = {s′1 , ⋯, s′n };
9 end
10 Remove transition δ(s, ǫ) = {s1 , ⋯, sk };
11 Convert s to an existential state;
12 Add a transition from s on ǫ by setting δ(s, ǫ) = U where U
is the set of universal states created one for each element
of Unsatcore(s);
Fig. 9: HMap construction for the running example
C. Enlarging the set of words accepted by Âσ,φ
ery word σ accepted by such an accepting state s satisfies
wp(rev(σ)[assume/assert], AMap(s)) = AMap(s). Therefore, setting HMap(s) as AMap(s) for these accepting states, as
done in Rule BASE - CASE completes the proof for accepting
states.
Converting Universal States to Existential States Figure
10 shows an example trace σ = abcde obtained from the
parallel composition of some program P . Figure 11 shows the
AFA constructed for σ and φ as S < t ∧ z < x. From Lemma
4 we get wp(σ, φ) as false. Note that the wp(σ, S < t) and
wp(σ, z < x) are unsatisfiable, i.e. we have two ways to derive
the unsatisfiability of wp(σ, φ); one is due to the operation d,
and the other is due to the operation a followed by operation
e. In this example, any word that enforces either of these
two ways will derive false as the weakest precondition. For
example, the sequence σ ′ = adcbe is not accepted by the
AFA of Figure 11 but the condition wp(rev(σ ′ ), ¬φ) = false
follows from wp(d, ¬φ) = false which is already captured in
the AFA of Figure 11. Note that states s1 and s2 in Figure
11 are annotated with unsatisfiable HMap assertion. It seems
sufficient to take any one of these branches to argue the
unsatisfiability of HMap(s0 ) because HMap(s0 ), by definition,
is a conjunction of HMap(s1 ) and HMap(s2 ). Therefore, if we
convert s0 , a universal state, to an existential state then the
modified AFA will accept adcbe. Let us look at Algorithm 1
to see the steps involved in this transformation. This algorithm
picks a universal state s such that AMap(s) is a conjunction
of clauses and only a subset of its successors are sufficient to
make HMap(s) unsatisfiable. State s0 of Figure 11 is one such
state. For each such minimal subsets of its successors, this
algorithm creates a universal state, as shown in Line 5 of this
algorithm. It is easy to see that HMap(su ) is also unsatisfiable.
Before adding δ(su , ǫ) = {s′1 , ⋯, s′n } transition in AFA this
algorithm sets AMap(su ) as ⋀i AMap(s′i ). By construction,
every word accepted by su must be accepted by s′1 , ⋯, s′n .
Each of these states s′1 , ⋯, s′n satisfy Lemma 4. Hence Lemma
4 continues to hold for these newly created universal states as
well. Now consider a newly created transition (s, ǫ, U) in Line
12. For any state s′′ ∈ U, AMap(s) logically implies AMap(s′′ )
because s′′ represents a subset of the original successors
Now consider a state s with transition δ(s, ǫ) = {s1 , ⋯, sk },
created using Rule C OMPOUND -A SSN , and let σ be a word
accepted by s. By construction, s must be a universal state
and hence σ must be accepted by each of s1 , ⋯, sk as well.
Using this lemma inductively on successor states s1 , ⋯, sk (induction on the formula size) we get wp(σ[assume/assert],
AMap(si )) = HMap(si ) for all i ∈ {1⋯k}. Now we
can apply Property 1 depending on whether AMap(s) is
a conjunction or a disjunction of AMap(sk ). By replacing
AMap(s) with ⋁k AMap(sk )(⋀k AMap(sk )) and HMap(s) with
⋁k HMap(sk )(⋀k HMap(sk )) completes the proof. Note that,
making s as a universal state when AMap(s) is either a
conjunction or a disjunction allowed us to use Property 1 in
this proof. Otherwise, if we make s an existential state when
AMap(s) is a disjunction of formulae then we can not prove
this lemma for states where HMap(s) is constructed using Rule
D ISJ - CASE.
This lemma serves two purposes. First, it checks the correctness of a trace σ w.r.t. a safety property for which this AFA
was constructed. If HMap(s0 ) ∧ I is unsatisfiable, as in our
Peterson’s example trace, then σ is declared as correct. Second,
it guarantees that every trace accepted by this AFA, that is
present in the set of all traces of P, is also safe and hence we
can skip proving their correctness altogether. Removing such
traces is equivalent to subtracting the language of this AFA
from the language representing the set of all traces. Then a
natural question to ask is if we can increase the set of accepted
words of this AFA while preserving Lemma 4.
6
Σ ∖ {a, e, A, P}, P
false
Σ
false
false
false
s1 S < t ∃ d
false ∃
ǫ
s3
a, b, c, e
a, b, c, d, e
false
S<t
∧ z<x
false
ǫ
z < x∃
e
s2
Y∶=x + 1
W∶=t
z∶=W
S∶=t + 1
z∶=Y
a, b, d a
a, b, c, d, e
Fig. 10: Example Trace
false
∀
s0
a.
b.
c.
d.
e.
¬(ℓ2 = 2) ∃
s0
s
Y < x ∃ false
s4
b, c, d, e
true ∃
s2
Σ ∖ {A, P}, A
false
false ∃
false
¬(res = 2) ∃
s1
c
P
Σ ∖ {c, r, A, P}
Fig. 11: AFA for σ given in Figure 10
δ(s, op) = δ(s, op) ∪ {s′ } iff
s4 flag1 = false ∃
ǫ
false
s3
false
s5
false ∃
s12
ǫ
Σ ∖ {a, e, A, P}
Σ ∖ {s, A, P}
flag1 = false
∨ turn = 2
a
false
false ∃
s6
∃
flag1 = false
su
ǫ
∀
flag1 = false∧
(flag2 = false
∨ turn = 1)
∀
Σ
A
flag1 = false
s8
ǫ
ǫ
q
false
s7
false
false
∃
false
turn = 2 ∃
s5
Σ ∖ {b, q, A, P}
Fig. 12: AFA of Figure 9 after Modification
Algorithm 2: Algorithm to check the safety assertions of
a concurrent program P
Input: A concurrent program P = {p1 , ⋯, pn } with safety
property map Assrn
Result: yes, if program is safe else a counterexample
1 Let A(P) bet the automaton that represents the set of all
the SC executions of P (as defined in Section II);
̂));
2 Set tmp ∶= L(A(P
3 while tmp is not empty do
4
Let σ ∈ tmp with φ as a safety assertion to be
checked;
5
Let Âσ,¬φ be the AFA constructed from σ and ¬φ ;
6
if I ∧ HMap(s0 ) is satisfiable then
7
σ is a valid counterexample violating φ;
8
return (σ);
9
else
10
Let Â′ be the AFA modified by proposed
transformations;
11
tmp ∶= tmp ∖ Rev, where
Rev = {rev(σ) ∣ σ ∈ L(Â′ )};
12
end
13 end
14 return (yes);
HMap(s) and HMap(s′ ) are unsatisfiable,
(s) is a literal, and
op[assume/assert]AMap(s) ⇒ AMap(s′ )
(RULE -U NSAT)
OR
HMap(s) and HMap(s′ ) are valid
(s) is a literal, and
(s′ ) ⇒ wp(op[assume/assert], AMap(s))
(RULE -VALID)
Fig. 13: Rules for adding more edges
of s, viz. s1 , ⋯, sk . As s is now an existential state, any
word accepted by s, say σ ′ , is accepted by at least one
state in U, say s′ . Using Lemma 4 on s′ , HMap(s′ ) is logically equivalent to wp(rev(σ ′ )[assume/assert], AMap(s′ )).
Using unsatisfiability of HMap(s) and HMap(s′ ) and the
monotonicity property of the weakest precondition, Property 2, we get that HMap(s) is logically equivalent to
wp(rev(σ ′ )[assume/assert], AMap(s)). This transformation
is formally proved correct in Appendix E.
Adding More transitions to Âσ,φ using the Monotonicity
Property of the Weakest Precondition We further modify
Âσ,φ by adding more transitions. For any two states s and
s′ such that AMap(s) and AMap(s′ ) are literals, both HMap(s)
and HMap(s′ ) are unsatisfiable, and there exists a symbol a
(can be ǫ as well) such that wp(a[assume/assert], AMap(s))
logically implies AMap(s′ ), an edge labeled a is added from s
to s′ . This transformation also preserves Lemma 4 following
the same monotonicity property, Property 2 used in the previous transformation. Similar argument holds when HMap(s)
and HMap(s′ ) are valid and AMap(s′ ) ⇒ wp(a, AMap(s)) holds.
The rules of adding edges are shown in Figure 13.
Figure 12 shows the AFA of Figure 9 modified by above
transformations. Rule RULE -U NSAT adds an edge from s4
to s8 on symbol ǫ because HMap(s4 ) and HMap(s8 ) are
unsatisfiable and wp(ǫ, AMap(s4 )) logically implies AMap(s8 ).
Same rule also adds a self loop at s8 on operation P and a
self loop at s2 on operation A. Transformation by Algorithm
1 removes the transition from s7 to s9 and all other states
reachable from s9 . Now consider a trace rev(abpqPArcs)
that is accepted by this modified AFA in Figure 12 but was
not accepted by the original AFA of Figure 9. Note that
wp(abpqPArcs, ¬(ℓ2 = 2)) is unsatisfiable and this is a direct
consequence of Lemma 4. Because of the transformations
presented in this sub-section we do not need to reason about
this trace separately. This transformation is formally proved
correct in Appendix F.
D. Putting All Things Together For Safety Verification
In Algorithm 2, all the above steps are combined to check
if all the SC executions of a concurrent program P satisfy the
safety properties specified as assertions. Proof of the following
theorem is given in Appendix G.
Theorem 1: Let P = (p1 , ⋯, pn ) be a finite state program (with or without loops) with associated assertion maps
Assrnpi . All assertions of this program hold iff Algorithm 2
returns yes. If the algorithm returns a word σ then at least
one assertion fails in the execution of σ.
7
Program
Peterson.safe
Dekker.safe
Lamport.safe
Szymanksi.safe
TimeVarMutex.safe
RWLock.safe (2R+2W)
RWLock.unsafe (2R+2W)
Qrcu.safe (2R+1W)
Qrcu.unsafe (2R+1W)
ProofTraPar
THREADER[10]
Lazy-CSeq[11]
0.3
1.1
2.4
3
0.76
8.8
3.8
20
13.8
3.2
1.7
47
12.8
8.56
140
153
–
76
3.1
4.2
5.1
4
4.2
6.7
0.7
41
1.1
handle larger number of interleavings. These optimizations
also selectively check a representative set of traces among the
set of all interleavings. POR based methods were traditionally
used in bug finding but recently they have been extended
efficiently, using abstraction and interpolants, for proving
programs correct [14]. The technique presented in this paper,
using AFA, can possibly be used to keep track of partial orders
in POR based methods. In [15], a formalism called concurrent
trace program (CTP) is defined to capture a set of interleavings
corresponding to a concurrent trace. CTP captures the partial
orders encoded in that trace. Corresponding to a CTP, a
formula φctp is defined such that φctp is satisfiable iff there is
a feasible linearization of the partial orders encoded in CTP
that violates the given property. Our AFA is also constructed
from a trace but unlike CTP it only captures those different
interleavings which guarantee the same proof outline. Recently
in [9], a formalism called HB-formula has been proposed
to capture the set of happens-before relations in a set of
executions. This relation is then used for multiple tasks such as
synchronization synthesis[2], bug summarization and predicate
refinement. Since the AFA constructed by our algorithm can
also be represented as a boolean formula (universal states
correspond to conjunction and existential states correspond
to disjunction) that encodes the ordering relations among the
participating events, it will be interesting to explore other
usages of this AFA along the lines of [9].
Fig. 14: Comparison with THREADER[10], and Lazy-CSeq [11] (Time in seconds)
IV. E XPERIMENTAL E VALUATION
We implemented our approach in a prototype tool,
ProofTraPar. This tool reads the input program written
in a custom format. In future, we plan to use off-the-shelf
parsers such as CIL or LLVM to remove this dependency.
Individual processes are represented using finite state automata. We use an automata library, libFAUDES [5] to carry
out operations on automata. As this library does not provide
operations on AFA, mainly complementation and intersection,
we implemented them in our tool. After constructing the AFA
from a trace we first remove ǫ transitions from this AFA.
This is followed by adding additional edges in AFA using
proposed transformations. Instead of reversing this AFA (as
in Line 11 of Algorithm 2) we subtract it with an NFA that
represents the reversed language of the set of all traces. This
avoids the need of reversing an AFA. Note that we do not
convert our AFA to NFA but rather carry out intersection and
complementation operations (needed for language subtraction
operation) directly on AFA. Our tool uses the Z3 [4] theorem
prover to check the validity of formulae during AFA construction. ProofTraPar can be accessed from the repository
https://github.com/chinuhub/ProofTraPar.git.
Figure 14 tabulates the result of verifying pthreadatomic category of SV-COMP benchmarks using our tool,
THREADER [10] and Lazy-CSeq [11]. These tools were
the winners in the concurrency category of the software
verification competition of 2013 (THREADER), 2014 and
2015 (Lazy-CSeq). Dash (–) denotes that the tool did not
finish the analysis within 15 minutes. Numbers in bold text
denote the best time of that experiment. Safe/Unsafe versions
of these programs are labeled with .safe/.unsafe. Except on
Reader-Writer Lock and on unsafe version of QRCU(Quick
Read Copy Update), our tool performed better than the other
two tools. On unsafe versions, our approach took more time
to find out an erroneous trace as compared to Lazy-CSeq
[11]. Context-bounded exploration by Lazy-CSeq [11] and the
presence of bugs at a shallow depth seem to be a possible reason behind this performance difference. Introducing priorities
while picking traces in order to make our approach efficient
in bug-finding is left open for future work.
VI. C ONCLUSION
AND
F UTURE W ORK
We presented a trace partitioning based approach for verifying safety properties of a concurrent program. To this
end, we introduced a novel construction of an alternating
finite automaton to capture the proof of correctness of a
trace in a program. We also presented an implementation of
our algorithm which compared competitively with existing
state-of-the-art tools. We plan to extend this approach for
parameterized programs and programs under relaxed memory
models. We also plan to investigate the use of interpolants
with weakest precondition axioms to incorporate abstraction
for handling infinite state programs.
R EFERENCES
[1] J.A. Brzozowski and L. L. Ernst. On equations for regular languages,
finite automata, and sequential networks. TCS, 10:19–35, 1980.
[2] P. Cerný, E.M. Clarke, T. A. Henzinger, A. Radhakrishna, L. Ryzhyk,
R. Samanta, and T. Tarrach. From non-preemptive to preemptive
scheduling using synchronization synthesis. In CAV, 2015.
[3] A. K. Chandra, D. C. Kozen, and L. J. Stockmeyer. Alternation. J.
ACM, 28(1):114–133, January 1981.
[4] L. De Moura and N. Bjørner. Z3: An efficient SMT solver. In TACAS,
pages 337–340. Springer-Verlag, 2008.
[5] Bernd Opitz et al. libfaudes-discrete event system library.
[6] A. Farzan, Z. Kincaid, and A. Podelski. Inductive data flow graphs. In
POPL, pages 129–142, 2013.
[7] C. Flanagan and P. Godefroid. Dynamic partial-order reduction for
model checking software. In POPL, pages 110–121, 2005.
[8] P. Godefroid. Partial-Order Methods for the Verification of Concurrent
Systems: An Approach to the State-Explosion Problem. Springer, 1996.
[9] A. Gupta, T. A. Henzinger, A. Radhakrishna, R. Samanta, and T. Tarrach.
Succinct representation of concurrent trace sets. In POPL, 2015.
[10] A. Gupta, C. Popeea, and A. Rybalchenko. Threader: A constraint-based
verifier for multi-threaded programs. In CAV, pages 412–417, 2011.
V. R ELATED W ORK
Verifying the safety properties of a concurrent program
is a well studied area. Automated verification tools which
use model checking based approaches employ optimizations
such as Partial Order Reductions (POR) [13], [8], [7] to
8
A PPENDIX
[11] O. Inverso, E. Tomasco, B. Fischer, S. La Torre, and G. Parlato. Bounded
model checking of multi-threaded C programs via lazy sequentialization.
In CAV, volume 8559 of LNCS, pages 585–602. Springer, 2014.
[12] L. Lamport. How to make a multiprocessor computer that correctly
executes multiprocess programs. IEEE Trans. Comput., September 1979.
[13] D. Peled. All from one, one for all: On model checking using
representatives. In CAV, pages 409–423. Springer-Verlag, 1993.
[14] B. Wachter, D. Kroening, and J. Ouaknine. Verifying multi-threaded
software with Impact. In FMCAD, pages 210–217. IEEE, 2013.
[15] C. Wang, S. Kundu, M. Ganai, and A. Gupta. Symbolic predictive
analysis for concurrent programs. In Ana Cavalcanti and DennisR.
Dams, editors, FM 2009: Formal Methods, volume 5850 of LNCS, pages
256–272. Springer Berlin Heidelberg, 2009.
A. Proof of Lemma 1
We prove it by induction on n.
1) Base case ∣σ∣ = 0: If ∣σ∣ = 0 then wp(σ[assume/assert],
¬φ) = ¬φ. If ¬φ ∧ I is unsatisfiable then I satisfies φ.
Hence proved.
2) Induction step, ∣σ∣ = n + 1: Let σ = σ ′ .a. If
wp(σ ′ .a[assume/assert], ¬φ) ∧ I is unsatisfiable then
following cases can happen based on a.
′
● a ∶ x ∶= E:- If wp(σ .a[assume/assert], ¬φ) ∧ I
is unsatisfiable then wp(σ ′ [assume/assert],
wp(a, ¬φ)) ∧ I is also unsatisfiable. By
substituting wp(a, ¬φ) with ¬φ[E/x] we get
that wp(σ ′ [assume/assert], ¬φ[E/x]) ∧ I is
unsatisfiable. Using IH on σ ′ it implies that after
executing σ ′ from I the resultant state either does
not terminate or terminates in a state satisfying
φ[E/x]. If σ ′ does not terminate then so does the
execuction of σ starting from I. If σ ′ terminates in
a state satisfying φ[E/x] then by the definition of
the weakest precondition, execution of a from this
state will satisfy φ. Hence proved.
● a
∶ assume(φ′ ):-If wp(σ ′ .a[assume/assert],
¬φ)
∧
I
is
unsatisfiable
then
wp(σ ′ [assume/assert], wp(a, ¬φ))
∧
I is
also unsatisfiable. By substituting wp(a, ¬φ) with
φ′ ∧ ¬φ we get that wp(σ ′ [assume/assert],
φ′ ∧ ¬φ) ∧ I is unsatisfiable. Using IH on σ ′ it
implies that after executing σ ′ from I the resultant
state either does not terminate or terminates in a
state satisfying ¬φ ∨ φ′ . If σ ′ does not terminate
then the execution of σ from I does not terminate
as well. If σ ′ terminates in a state satisfying ¬φ
then the execution of a blocks and hence the
execution of σ does not terminate. If σ ′ terminates
in a state satisfying φ′ but ¬φ does not hold then
φ ∧ φ′ must hold. Execution of assume(φ′ ) acts as
nop instruction and the resultant state satisfies φ.
hence proved.
● a ∶ lock(x):- As weakest precondition of lock(x)
is obtained from the weakest precondition of assignment and assume instruction hence the similar
reasoning works for this case.
B. Proof of Lemma 2
Proof: Let us prove it by induction on the length of σ.
1) Base case, ∣σ∣ = 0: When the length of σ is 0 and I ∧ ¬φ
is satisfiable then I does not satisfy φ. Hence proved.
2) Induction Step, ∣σ∣ = n + 1: Let σ = σ ′ .a. Following case
can happen based on the type of a.
● a
∶ x ∶= E:- If wp(σ[assume/assert],
¬φ) ∧ I is satisfiable then wp(σ ′ [assume/assert],
wp(a, ¬φ)) ∧ I is also satisfiable. By substituting wp(a, ¬φ) = ¬φ[E/x] we get that
1
●
●
wp(σ ′ [assume/assert], ¬φ[E/x]) ∧ I is satisfiable. By IH on σ ′ , execution of σ ′ from I terminates
in a state not satisfying φ[E/x]. By definition of
the weakest precondition, the state reached after
executing a from this state does not satisfy φ. Hence
proved.
a
∶
assume(φ′ ):-If wp(σ[assume/assert],
¬φ) ∧ I is satisfiable then wp(σ ′ [assume/assert],
wp(assume(φ′ )[assume/assert], ¬φ))
∧
I
is
also
satisfiable.
By
substituting
wp(assume(φ′ )[assume/assert], ¬φ) = φ′ ∧ ¬φ
we
get
that
wp(σ ′ [assume/assert],
′
¬(¬φ ∨ φ)) ∧ I is satisfiable. By IH on
σ ′ , execution of σ ′ from I terminates in a state
not satisfying ¬φ′ ∨ φ. In other words, φ′ and
¬φ holds in the state reached after executing σ ′
from I. Therefore, after executing assume(φ′ ), the
resultant state satisfies ¬φ and hence proved.
a ∶ lock(x):-Similar to the combination of above
two cases.
an accepting state. It should have a successor state
s′ such that (s, op, {s′ }) is a transition. By transition rule L ITERAL -A SSN RMap(s) = RMap(s′ ).op.σ ′′
such that wp(σ ′′ [assume/assert], AMap(s)) =
AMap(s). By transition rule L ITERAL -S ELF -A SSN,
s will have self loop transitions on all symbols in
σ ′′ (*). Applying IH on s′ gives that rev(RMap(s′ )) ∈
acc(s′ )(#). Because of the transition (s, op, {s′ }),
op.acc(s′ ) ⊆ acc(s). This along with (#) gives
us op.rev(RMap(s′ )) ∈ acc(s)(**). Rearranging this
and using (*) we get rev(RMap(s′ ).op.σ ′′ ) ∈ acc(s)
or equivalently rev(RMap(s)) ∈ acc(s). Hence
proved.
D. Proof of Lemma 4
Proof: We use induction for this proof. Same as in
the previous proof, let us use the following ordering on
the states of Â. For any two states s and s′ , s < s′ if
∣RMap(s)∣ < ∣RMap(s′ )∣ or if lengths are same then AMap(s)
is a sub formula of AMap(s′ ). Any two states which are not
related by this order, put them in any order to make < as a total
order. It is clear that the smallest state in this total order must
be one of the accepting state. Now we are ready to proceed
by induction using this total order.
● Base case, By definition of the accepting state in AFA
construction, Point 3 of Definition 1, and the self loop
transition rule, Rule L ITERAL -S ELF -A SSN, we know that
for every word σ ′ ∈ acc(s), wp(σ ′ [assume/assert],
AMap(s)) = AMap(s). Rule BASE - CASE of Figure 8 sets
HMap(s) same as AMap(s) for such states hence the
statement of this lemma follows for the accepting states.
● Induction step; we pick a state s such that one of the
following holds,
1) s is a universal state;By construction, there should
be states s1 , ⋯, sk such that (s, ǫ, {s1 , ⋯, sk }) is
a transition. Let σ be a word accepted by s then
by the definition of accepting set of words of a
universal states, σ must be accepted by each of
s1 , ⋯sk . By our induction ordering, s1 , ⋯, sk are
smaller than s and hence we apply IH on them to
get that wp(rev(σ)[assume/assert], AMap(si )) =
HMap(si ) for i ∈ {1⋯k}. Two cases arise based on
whether
– AMap(s) is a conjunction of AMap(si ) for
i ∈ {1⋯k}; Following Rule C ONJ - CASE
we set HMap(s)
=
⋀i HMap(si ) and
wp(rev(σ)[assume/assert], AMap(s))
=
HMap(s) then follows from the Property 1, using
conjunction, of the weakest precondition.
– AMap(s) is a disjunction of AMap(si ) for
i ∈ {1⋯k}; Following Rule C ONJ - CASE
we set HMap(s)
=
⋀i HMap(si ) and
wp(rev(σ)[assume/assert], AMap(s))
=
HMap(s) then follows from the Property 1, using
disjunction, of the weakest precondition.
C. Proof of Lemma 3
Proof: We use induction for this proof. Let us use the
following ordering on the states of Âσ φ. For any two states s
and s′ , s < s′ if ∣RMap(s)∣ < ∣RMap(s′ )∣ or if lengths are same
then AMap(s) is a sub formula of AMap(s′ ). Any two states
which are not related by this order, put them in any order to
make < as a total order. It is clear that the smallest state in
this total order must be one of the accepting state. Now we
are ready to proceed by induction using this total order.
● Base case; For every accepting state s ∈ SF , by Point 3
of Definition 1, the condition wp(op, AMap(s)) = AMap(s)
holds for every op ∈ EL(RMap(s)). Further, By transition
rule L ITERAL -S ELF -A SSN of this AFA, a self transition
must be there for all such op ∈ EL(RMap(s)) and hence
the condition rev(RMap(s)) ∈ acc(s) holds (because
these transitions can be taken in any order to construct
the required word).
● Induction step; Following possibilities exist for the state
s,
– s is a universal state; By construction, there should
be states s1 , ⋯, sk such that (s, ǫ, {s1 , ⋯, sk }) is a
transition. By our induction ordering, s1 , ⋯, sk are
smaller than s and hence we apply IH on them to
get that rev(RMap(si )) ∈ acc(si ) for i ∈ {1⋯k}.
However, by the transition rule C OMPOUND -A SSN ,
RMap(s) = RMap(s1 ) = ⋯ = RMap(sk ) and hence
rev(RMap(s) ∈ acc(si ) for i ∈ {1⋯k}. By the
definition of acc(s) for a universal state, acc(s) is
intersection of the sets acc(si ) for i ∈ {1⋯k} and
hence we get the required result, viz. rev(RMap(s)) ∈
acc(s).
– s is an existential state; If s is an accepting state then
Base case holds here. Consider the case when s is not
2
2) s is an existential state; If s is an accepting state then
the same argument as used in the Base case holds.
If s is not an accepting state then the only outgoing
transition from s is of the form (s, op, {s′ }), By
rule L ITERAL -A SSN(*). Now consider a word
σ ∈ acc(s). σ must be of the form σ ′′ .op.σ ′ where
wp(σ ′′ [assume/assert], AMap(s)) = AMap(s)(*)
(because of the self transitions constructed from
Rule L ITERAL -S ELF -A SSN) and σ ′ ∈ acc(s′ ).
Therefore, wp(rev(σ)[assume/assert], AMap(s))
=
=wp(rev(σ ′′ .op.σ ′ )[assume/assert], AMap(s))
=wp(rev(σ ′ ).op.rev(σ ′′ )[assume/assert],
AMap(s))
=wp(rev(σ ′ ).op[assume/assert], AMap(s)) (using
(*))
=wp(rev(σ ′ )[assume/assert],
wp(op[assume/assert], AMap(s))) (using weakest
precondition definition)
=wp(rev(σ ′ )[assume/assert], AMap(s′ )) (using
Transition rule L ITERAL -A SSN)
As σ ′ ∈ acc(s′ ) this is same as HMap(s′ ) by
applying IH on s′ . As HMap(s) is same as
HMap(s′ ), as done in Rule L IT- CASE, we prove
this case as well.
accepted by state s, HMap(s) is logically equivalent to
wp(rev(σ)[assume/assert], AMap(s)).
Proof: As a result of adding edges in this transformation,
we can not use the ordering among states as done for earlier
proofs. This is because, now a transition (s, op, S) does not
guarantee that the states in the set S are smaller then s and
hence it will not be possible to apply IH directly. Therefore
in this proof we apply induction on the length of σ ′ accepted
by some state s.
● Induction step; Let s ∈ Â and σ ∈ acc(s) such that
∣σ∣ = m + 1. Either s ∈ S∃ or s ∈ S∀ . If s ∈ S∃
and σ ∈ acc(s) then there exists a state s′ such that
(s, op, {s′ }) ∈ δ and σ ′ ∈ acc(s′ ), where σ = σ ′′ .op.σ ′
and wp(σ ′′ [assume/assert], AMap(s)) = AMap(s)(**).
Based on this transition (s, op, {s′ }) ∈ δ we have the
following sub-cases,
– (s, op, {s′ }) was added by the this transformation
virtue of one of the following conditions,
∗ HMap(s) and HMap(s′ ) are unsatisfiable and
wp(op[assume/assert], AMap(s)) ⇒ AMap(s′ )
(Rule RULE -U NSAT); By IH on σ ′ we have
wp(rev(σ ′ )[assume/assert], AMap(s′ ))
is
logically
equivalent
to
HMap(s′ ).
Using Property 2 (conjunction part) and
the
assumption
wp(op[assume/assert],
AMap(s))
⇒
AMap(s′ )
we
get
′
wp(rev(σ )[assume/assert], wp(op, AMap(s)))
is unsatisfiable and same as HMap(s).
Using
(**),
wp(rev(σ ′ )[assume/assert],
′′
wp(op.rev(σ ), AMap(s))) is unsatisfiable and
same as HMap(s). By replacing σ = σ ′′ .op.σ ′ we
get the required proof.
∗ HMap(s) and HMap(s′ ) are valid and
AMap(s′ ) ⇒ wp(op[assume/assert], AMap(s))
(Rule RULE -VALID); By IH on σ ′ we have
wp(rev(σ ′ )[assume/assert], AMap(s′ ))
is
logically equivalent to HMap(s′ ). Using property
2 (disjunction part) and the assumption
AMap(s′ )
⇒
wp(op[assume/assert],
AMap(s)) we get wp(rev[assume/assert](σ ′ ),
wp(op[assume/assert], AMap(s))) is valid and
same as HMap(s). Using (**) and or replacing
σ = σ ′′ .op.σ ′ we get the required result and hence
proved.
– If this transition was already in δ; we can use the
same reasoning as used in the proof of Lemma 4 to
show that wp(rev(σ)[assume/assert], AMap(s)) is
logically equivalent to HMap(s)
● If s ∈ S∀ then similar argument goes as in the proof
of Lemma 4 because no new transition gets added from
these states as a result of this transformation.
E. Proof of Correctness of Transformation-I
Lemma 5: Let  be an automaton constructed from a trace
and a post condition as defined in Definition 1 and further
modified by Algorithm 1 then for every state s of this AFA
and for every word σ accepted by state s, HMap(s) is logically
equivalent to wp(rev(σ)[assume/assert], AMap(s)).
Proof: Proof of this lemma is very similar to the proof
of Lemma 4 given in Appendix . Here we only highlight the
changes in the proof. Note that this transformation converts
some universal states to existential states. Let s be one such
state that was converted from universal to existential state. Let
(s, ǫ, {s1 , ⋯, sk }) was the original transition in the AFA which
got modified to (s, ǫ, {su1 , ⋯, sun } where sui are newly created universal states in Line 5 of Algorithm 1. By construction,
HMap(sui ) is unsatisfiable for each of these su1 , ⋯, sun (*). Let
σ be a word accepted by s after converting it to existential
state. By acceptance conditions, σ must be accepted by at least
one state, say sum in the set {su1 , ⋯, sun }. By IH on sum we
get wp(σ[assume/assert], AMap(sum )) = HMap(sum )(**).
Further, by construction AMap(s) implies AMap(sum ). This
fact, along with the monotonicity property of the weakest
precondition, Property 2, we get that wp(σ[assume/assert],
AMap(s)) is unsatisfiable and hence same as HMap(s).
F. Proof of Correctness of Transformation-II
Lemma 6: Let  be an
trace and a post condition
further modified by adding
for every state s of this
automaton constructed from a
as defined in Definition 1 and
edges as discussed above then
AFA and for every word σ
G. Proof of Theorem 1
Proof:
3
●
●
Let us first prove that this algorithm terminates for finite
state programs. For finite state programs the number of
possible assertions used in the construction of AFA are
finite and hence only a finite number of different AFA
are possible. It implies the termination of this algorithm.
Following Lemma 4 and the fact that AMap(s0 ) = ¬φ,
every word σ ′ accepted by this AFA, equivalently written
as σ ′ ∈ acc(s0 ), satisfies wp(rev(σ ′ )[assume/assert],
¬φ) = HMap(s0 )(*). By Lemma 3 and the fact that
RMap(s0 ) = σ we get rev(σ) ∈ acc(s0 )(**). Combining
(**) and (*), we get wp(rev(rev(σ))[assume/assert],
¬φ) = HMap(s0 ) or equivalently wp(σ[assume/assert],
¬φ) = HMap(s0 ).
– If I ∧ HMap(s0 ) is satisfiable (Line 6) then
I ∧ wp(σ[assume/assert], ¬φ) is satisfiable as
well. Following Lemma 2 we got a valid error trace
which is returned in Line 8.
– If I ∧ HMap(s0 ) is unsatisfiable then by Lemma 1
this trace is provably correct. Now we apply transformations of Section III-C on the AFA to increase the
set of words accepted by it. The final AFA is then
reversed and subtracted from the set of executions
seen so far. Lemma 4 ensures that for all such
words σ ′ the condition I ⇏ wp(σ ′ , ¬φ) holds and
therefore none of them violate φ starting from the
initial state. Therefore in every iteration only correct
set of executions are being removed from the set of
all executions. Therefore when this loop terminates
then all the executions have been proved as correct.
4
| 6cs.PL
|
NON-ASYMPTOTIC RESULTS FOR CORNISH-FISHER
EXPANSIONS
arXiv:1604.00539v1 [math.ST] 2 Apr 2016
V.V. ULYANOV, M. AOSHIMA, AND Y. FUJIKOSHI
Abstract. We get the computable error bounds for generalized
Cornish-Fisher expansions for quantiles of statistics provided that
the computable error bounds for Edgeworth-Chebyshev type expansions for distributions of these statistics are known. The results
are illustrated by examples.
1. Introduction and main results
In statistical inference it is of fundamental importance to obtain
the sampling distribution of statistics. However, we often encounter
situations, where the exact distribution cannot be obtained in closed
form, or even if it is obtained, it might be of little use because of its
complexity. One practical way of getting around the problem is to
provide reasonable approximations of the distribution function and its
quantiles, along with extra information on their possible errors. It can
be made with help of Edgeworth–Chebyshev and Cornish–Fisher type
expansions. Recently the interest for Cornish–Fisher type expansions
stirred up because of intensive study of VaR (Value at Risk) models
in financial mathematics and financial risk management (see, e.g. [14]
and [15]).
Mainly, it is studied the asymptotic behavior of the expansions mentioned above. It means that accuracy of approximation for distribution
of statistics or its quantiles is given as O(·), that is in the form of order
with respect to some parameter(s) (usually, w.r.t. n as a number of
observations and/or p as dimension of observations). In this paper we
construct non-asymptotic error bounds, in other words – computable
error bounds, for Cornish–Fisher type expansions, that is for an error of approximation we prove upper bounds with closed-form dependence on n and/or p and, perhaps, on some moment characteristics of
observations. We get these bounds under condition that similar nonasymptotic results are already known for accuracy of approximation of
distributions of statistics by Edgeworth–Chebyshev type expansions.
Let X be a univariate random variable with a continuous distribution
function F . For α : 0 < α < 1, there exists x such that F (x) = α,
Key words and phrases. computable bounds, non-asymptotic results, CornishFisher expansions.
This work was supported by RSCF grant No. 141100364.
1
2
V.V. ULYANOV, M. AOSHIMA, AND Y. FUJIKOSHI
which is called the (lower) 100α% point of F . If F is strictly increasing,
the inverse function F −1 (·) is well defined and the 100α% point is
uniquely determined. We also speak of “quantiles” without reference
to particular values of α meaning the values given by F −1 (·). Even
in the general case, when F (x) is not necessarily continuous nor is it
strictly increasing, we can define its inverse function by formula
F −1 (u) = inf{x; F (x) > u}.
This is a right-continuous nondecreasing function defined on the interval (0, 1) and F (x0 ) ≥ u0 if x0 = F −1 (u0 ).
Let Fn (x) be a sequence of distribution functions and let each Fn
admit the Edgeworth-Chebyshev type expansion (ECE) in the powers
of ǫ = n−1/2 or n−1 :
(1)
Fn (x) = Gk,n (x) + Rk (x) with Rk (x) = O(ǫk ) and
Gk,n (x) = G(x) + ǫa1 (x) + · · · + ǫk−1 ak−1 (x) g(x),
where g(x) is a density function of the limiting distribution function
G(x). An important approach to the problem of approximating the
quantiles of Fn is to use their asymptotic relation to those of G’s. Let
x and u be the corresponding quantiles of Fn and G, respectively. Then
we have
(2)
Fn (x) = G(u).
Write x(u) and u(x) to denote the solutions of (2) for x in terms of u
and u in terms of x, respectively [i.e. u(x) = G−1 (Fn (x)) and x(u) =
Fn−1 (G(u))]. Then we can use the ECE (1) to obtain formal solutions
x(u) and u(x) in the form
(3)
and
x(u) = u + ǫb1 (u) + ǫ2 b2 (u) + · · ·
(4)
u(x) = x + ǫc1 (x) + ǫ2 c2 (x) + · · · .
Cornish and Fisher in [3] and [6] obtained the first few terms of these
expansions when G is the standard normal distribution function (i.e.,
G = Φ). Both (3) and (4) are called the Cornish–Fisher expansions,
(CFE). Concerning CFE for random variables obeying limit laws from
the family of Pearson distributions see, e.g., [1]. Hill and Davis in [13]
gave a general algorithm for obtaining each term of CFE when G is an
analytic function.
Usually the CFE are applied in the following form with k = 1, 2 or
3:
(5)
xk (u) = u +
k−1
X
j=1
ǫj bj (u) + R̂k (u) with R̂k (u) = O(ǫk ).
NON-ASYMPTOTIC RESULTS FOR CORNISH-FISHER EXPANSIONS
3
It is known (see, e.g., [15]) how to find the explicit expressions for b1 (u)
and b2 (u) as soon as we have (1). By Taylor’s expansions for G, g, and
a1 , we obtain
b1 = −a1 (u),
(6)
1
b2 = {g ′(u)/g(u)}a21(u) − a2 (u) + a′1 (u)a1 (u),
2
provided that g and a1 are smooth enough functions.
In the following Theorems we show how xk (u) from (5) could be
expressed in terms of u. Moreover, we show what kind of bounds we
can get for R̂k (x) as soon as we have some bounds for Rk (x) from (1).
Theorem 1. Suppose that for the distribution function of a statistic
U we have
(7)
F (x) ≡ Pr{U ≤ x} = G(x) + R1 (x),
where for remainder term R1 (x) there exists a constant c1 such that
|R1 (x)| ≤ d1 ≡ c1 ǫ.
Let xα and uα be the upper 100α% points of F and G respectively, that
is
(8)
Pr{U ≤ xα } = G(uα ) = 1 − α.
Then for any α such that 1 − c1 ǫ > α > c1 ǫ > 0 we have
(i): uα+d1 ≤ xα ≤ uα−d1 .
(ii): |xα − uα | ≤ c1 ǫ/g(u(1) ), where g is the density function of
the limiting distribution G and
g(u(1) ) =
min
g(u).
u∈[uα+d1 ,uα−d1 ]
Theorem 2. In the notation of Theorem 1 we assume that
F (x) ≡ Pr{U ≤ x} = G(x) + ǫg(x)a(x) + R2 (x),
where for remainder term R2 (x) there exists a constant c2 such that
|R2 (x)| ≤ d2 ≡ c2 ǫ2 .
Let T = T (u) be a monotone increasing transform such that
Pr{T (U) ≤ x} = G(x) + R̃2 (x) with |R̃2 (x)| ≤ d˜2 ≡ c̃2 ǫ2 .
Let x̃α and uα be the upper 100α% points of Pr{T (U) ≤ x} and G,
respectively. Then for any α such that
we have
(9)
where
1 − c̃2 ǫ2 > α > c̃2 ǫ2 > 0,
|x̃α − uα | ≤ c̃2 ǫ2 /g(u(2) ),
g(u(2) ) =
min
u∈[uα+d̃ ,uα−d̃ ]
2
2
g(u).
4
V.V. ULYANOV, M. AOSHIMA, AND Y. FUJIKOSHI
Theorem 3. We use the notation of Theorem 2. Let b(x) be a function
inverse to T , i.e. b(T (x)) = x. Then xα = b(x̃α ) and for α such that
1 − c̃2 ǫ2 > α > c̃2 ǫ2 we have
|b′ (u∗ )| 2
(10)
|xα − b(uα )| ≤ c̃2
ǫ,
g(u(2) )
where
|b′ (u∗ )| =
max
u∈[uα+d̃ ,uα−d̃ ]
2
2
|b′ (u)|.
Moreover,
(11)
b(x) = x − ǫa(x) + O(ǫ2 ).
Remark 1. The main assumption of the Theorems is that for distributions of statistics and for distributions of transformed statistics we
have some approximations with computable error bounds. There are
not many papers with this kind of non-asymptotic results because it
requires technique which is different from the asymptotic results methods (cf., e.g., [10] and [20]). In series of papers [7], [8], [10], [11], [2],
[16], [18], [19] we got non-asymptotic results for wide class of statistics
including multivariate scale mixtures and MANOVA tests. We considered as well the case of high dimensions, that is the case when the
dimension of observations and sample size are comparable. The results
were included in the book [9]. See also [5].
Remark 2. The results of Theorems 1–3 could not be extended
to the whole range of α ∈ (0, 1). It follows from the fact that the
Cornish-Fisher expansion does not converge uniformly in 0 < α < 1.
See corresponding example in Section 2.5 of [12].
Remark 3. In Theorem 2 we required the existence of a monotone
increasing transform T (z) such that distribution of transformed statistic T (U) is approximated by some limit distribution G(x) in better way
than the distribution of original statistic U. We call this transformation T (z) the Bartlett type correction. See corresponding examples in
Section 3.
Remark 4. According to (10) and (11) the function b(uα ) in Theorem 3 could be considered as an ”asymptotic expansion” for xα up to
order O(ǫ2 ).
2. Proofs of main results
Proof of Theorem 1. By the mean value theorem,
|G(xα ) − G(uα )| ≥ |xα − uα | min g(uα + θ(xα − uα )).
0<θ<1
From (7) and the definition of xα and uα in (8), we get
|G(xα ) − G(uα )| = |G(xα ) − Pr{U ≤ xα }|
= |R1 (xα )| ≤ d1 .
NON-ASYMPTOTIC RESULTS FOR CORNISH-FISHER EXPANSIONS
5
Therefore,
(12)
|xα − uα | ≤
d1
.
min0<θ<1 g(uα + θ(xα − uα )
On the other hand, it follows from (7) that
G(xα ) = 1 − α − R1 (α)
≤ 1 − (α − d1 ) = G(uα−d1 ).
This implies that xα ≤ uα−d1 . Similarly, we have uα+d1 ≤ xα . Therefore, we proved Theorem 1 (i).
It follows from Theorem 1 (i) that
min
u∈[uα+d1 ,uα−d1 ]
g(u) ≤ min g(uα + θ(xα − uα )).
0<θ<1
Thus, using (12) we get statement of Theorem 1 (ii).
Proof of Theorem 2. It is easy to see that it is sufficient to apply Theorem 1 (ii) to the transformed statistic T (U).
Proof of Theorem 3.
we obtain
(13)
Using now (9) and the mean value theorem
x̃α − uα = b−1 (xα ) − b−1 (b(uα )) = (b−1 )′ (x∗ ) xα − b(uα ) ,
where x∗ is a point on the interval min{xα , b(uα )} , max{xα , b(uα )} .
By Theorem 1 (i) we have
uα+d˜2 ≤ x̃α ≤ uα−d˜2 .
Therefore, for xα = b(x̃α ) we get
(14)
min{b−1 (xα ), uα } , max{b−1 (xα ), uα } ⊆ uα+d˜2 , uα−d˜2 .
Since by properties of derivatives of inverse functions
(b−1 )′ (z) = 1/ b′ (b−1 (z)) = 1/b′ (y)
for z = b(y), the relations (13) and (14) imply (10).
Representation (11) for b(x) follows from (6) and (10).
3. Examples
In [17] we gave sufficient conditions for transformation T (x) to be
the Bartlett type correction (see Remark 3 above) for wide class of
statistics U allowing the following represantion
(15)
Pr{U ≤ x} = Gq (x) +
k
1 X
aj Gq+2j (x) + R2k ,
n j=0
where R2k = O(n−2 ) and Gq (x) is the distribution function of chisquared distribution with q degrees of freedom and coefficients aj ’s
P
satisfy the relation kj=0 aj = 0. Some examples of the statistic U are
6
V.V. ULYANOV, M. AOSHIMA, AND Y. FUJIKOSHI
as follows: for k = 1, the likelihood ratio test statistic; for k = 2, the
Lawley-Hotelling trace criterion and the Bartlett-Nanda-Pillai trace
criterion, which are test statistics for multivariate linear hypothesis
under normality; for k = 3, the score test statistic and Hotelling’s T 2 statistic under nonnormality. The results of [17] were extended in [4]
and [5].
In [10] we were interested in the null distribution of Hotelling’s generalized T02 statistic defined by
T02 = n trSh Se−1 ,
where Sh and Se are independently distributed as Wishart distributions
Wp (q, Ip ) and Wp (n, Ip ) with identity operator Ip in Rp , respectively.
In Theorem 4.1 (ii) in [10] we proved (15) for all n ≥ p with k = 3 and
computable error bound:
r
|Pr(T02 ≤ x) − Gr (x) −
{(q − p − 1)Gr (x)
4n
−2qGr+2 (x) + (q + p + 1)Gr+4 (x)}|
cp,q
≤ 2,
n
where r = pq and for constant cp,q we gave expicit formula with dependence on p and q.
Therefore, according to [17] we can take in this case the Bartlett
type correction T (z) as
s
2
z
a−1
a−1
+
T (z) =
+ ,
2b
2b
b
where
a=
1
p(q − p − 1),
2n
1
p(q + p + 1)(q + 2) −1.
2n
It is clear that T (z) is invertable and we can apply Theorem 3.
Other examples and numerical calculations and comparisons of approximation accuracy see in [4] and [5].
One more example is connected with sample correlation coefficient.
~ = (X1 , ..., Xn )T , and Y~ = (Y1 , ..., Yn )T be two vectors from an
Let X
n-dimensional normal distribution N(0, In ) with zero mean, identity
covariance matrix In and the sample correlation coefficient
Pn
Xk Y k
~
~
.
R = R(X, Y ) = pPn k=1 2 Pn
2
k=1 Yk
k=1 Xk
b=
In [2] it was proved for n ≥ 7 and N = n − 2.5:
√
Bn
x3 ϕ(x)
supx Pr
≤ 2,
N R ≤ x − Φ(x) −
4N
N
NON-ASYMPTOTIC RESULTS FOR CORNISH-FISHER EXPANSIONS
7
with Bn ≤ 2.2. It is easy to see that we can take T (z) as the Bartlett
type correction in the form T (z) = z + z 3 /(4N). Then the inverse
function b(z) = T −1 (z) is defined by formula
1/3
p
2
3
b(z) = 2 N z + (2Nz) + (4N/3)
1/3
p
− − 2 N z + (2Nz)2 + (4N/3)3
z3
3 z5
+
+ O(N −3 ).
4N
16 N 2
Now we can apply Theorem 3.
= z−
References
[1] L.N. Bol’shev, ”Asymptotically Pearson transformations”, Theor. Probab.
Appl., 8, 121–146 (1963).
[2] G. Christoph, V.V. Ulyanov, and Y. Fujikoshi, ”Accurate approximation of
correlation coefficients by short Edgeworth-Chebyshev expansion and its statistical applications”, Springer Proceedings in Mathematics and Statistics, 33,
239–260 (2013).
[3] E.A. Cornish and R.A. Fisher, ”Moments and cumulants in the specification
of distributions”, Rev. Inst. Internat. Statist., 4, 307–320 (1937).
[4] H. Enoki and M. Aoshima, ”Transformations with improved chi-squared approximations”, Proc. Symp., Res. Inst. Math. Sci., Kyoto Univ., 1380, 160–
181 (2004).
[5] H. Enoki and M. Aoshima, ”Transformations with improved asymptotic approximations and their accuracy”, SUT Journal of Mathematics, 42, no.1,
97–122 (2006).
[6] R.A. Fisher and E.A. Cornish, ”The percentile points of distributions having
known cumulants”, J. Amer. Statist. Assoc., 80, 915–922 (1946).
[7] Y. Fujikoshi, and V.V. Ulyanov, ”Error bounds for asymptotic expansions of
Wilks’ lambda distribution”, Journal of Multivariate Analysis, 97, no.9, 1941–
1957 (2006).
[8] Y. Fujikoshi, and V.V. Ulyanov, ”On accuracy of approximations for location
and scale mixtures”, Journal of Mathematical Sciences, 138, no.1, 5390–5395
(2006).
[9] Y. Fujikoshi, V.V. Ulyanov, and R. Shimizu, Multivariate Statistics : HighDimensional and Large-Sample Approximations, Wiley Series in Probability
and Statistics, John Wiley & Sons, Hoboken, N.J., (2010).
[10] Y. Fujikoshi, V.V. Ulyanov, and R. Shimizu, ”L1 -norm error bounds for asymptotic expansions of multivariate scale mixtures and their applications to
Hotelling’s generalized T02 ”, Journal of Multivariate Analysis, 96, no.1, 1–19
(2005).
[11] Y. Fujikoshi, V.V. Ulyanov, and R. Shimizu, ”Error bounds for asymptotic
expansions of the distribution of multivariate scale mixture”, Hiroshima Mathematical Journal, 35, no.3, 453–469 (2005).
[12] P. Hall, The Bootstrap and Edgeworth Expansion, Springer-Verlag, New York
(1992).
[13] G.W. Hill and A.W. Davis, ”Generalized asymptotic expansions of CornishFisher type”, Ann. Math. Statist., 39, 1264–1273 (1968).
[14] S. Jaschke, ”The Cornish-Fisher-expansion in the context of delta-gammanormal approximations”, J. Risk, 4, no.4, 33–52 (2002).
8
V.V. ULYANOV, M. AOSHIMA, AND Y. FUJIKOSHI
[15] V.V. Ulyanov, ”Cornish-Fisher Expansions”. In International Encyclopedia of
Statistical Science, Ed. M.Lovric, Springer-Verlag, Berlin–Heidelberg, 312–315
(2011).
[16] V.V. Ulyanov, G.Christoph, and Y. Fujikoshi, ”On approximations of transformed chi-squared distributions in statistical applications”, Siberian Mathematical Journal, 47, no.6, 1154–1166 (2006).
[17] V.V. Ulyanov and Y. Fujikoshi, ”On accuracy of improved χ2 -approximations”,
Georgian Mathematical Journal, 8, no.2, 401–414 (2001).
[18] V.V. Ulyanov, Y. Fujikoshi, and R. Shimizu, ”Nonuniform error bounds in asymptotic expansions for scale mixtures under mild moment conditions”, Journal of Mathematical Sciences, 93, no.4, 600–608 (1999).
[19] V.V. Ulyanov, H. Wakaki, and Y. Fujikoshi, ”Berry-Esseen bound for high dimensional asymptotic approximation of Wilks’ lambda distribution”, Statistics
and Probability Letters, 76, no.12, 1191–1200 (2006).
[20] H. Wakaki, Y. Fujikoshi, and V.V. Ulyanov ”Asymptotic Expansions of the
Distributions of MANOVA Test Statistics when the Dimension is Large”, Hiroshima Mathematical Journal, 44, no.3, 247–259 (2014).
V.V. Ulyanov, Faculty of Computational Mathematics and Cybernetics, Moscow State University, Moscow, 119991, Russia, and
National Research University Higher School of Economics (HSE),
Moscow, 101000, Russia
E-mail address: [email protected]
M. Aoshima, Institute of Mathematics, University of Tsukuba,
Tsukuba, Ibaraki 305-8571, Japan
E-mail address: [email protected]
Y. Fujikoshi, Department of Mathematics, Hiroshima University,
Higashi-Hiroshima, 739-8526, Japan
E-mail address: fujikoshi [email protected]
| 10math.ST
|
Distance-based Confidence Score for Neural Network Classifiers
arXiv:1709.09844v1 [cs.AI] 28 Sep 2017
Amit Mandelbaum
School of Computer Science and Engineering
Hebrew University of Jerusalem, Israel
1
Daphna Weinshall
School of Computer Science and Engineering
Hebrew University of Jerusalem, Israel
Abstract
scores are used as proxies, as for example the margin
in SVM classifiers.
The reliable measurement of confidence in
classifiers’ predictions is very important for
many applications, and is therefore an important part of classifier design. Yet, although deep learning has received tremendous attention in recent years, not much
progress has been made in quantifying the
prediction confidence of neural network classifiers. Bayesian models offer a mathematically
grounded framework to reason about model
uncertainty, but usually come with prohibitive
computational costs. In this paper we propose a simple, scalable method to achieve a
reliable confidence score, based on the data
embedding derived from the penultimate layer
of the network. We investigate two ways to
achieve desirable embeddings, by using either
a distance-based loss or Adversarial Training. We then test the benefits of our method
when used for classification error prediction,
weighting an ensemble of classifiers, and novelty detection. In all tasks we show significant
improvement over traditional, commonly used
confidence scores.
When trying to evaluate the confidence of neural network (NN) classifiers, a number of scores are commonly
used. One is the strength of the most activated output
unit followed by softmax normalization, or the closely
related ratio between the activities of the strongest
and second strongest units. Another is the (negative)
entropy of the output units, which is minimal when
all units are equally probable. Often, however, these
scores do not provide a reliable measure of confidence.
Introduction
Classification confidence scores are designed to measure the accuracy of the model when predicting class
assignment (rather than the uncertainty inherent in the
data). Most generative classification models are probabilistic in nature, and therefore provide such confidence
scores directly. Most discriminative models, on the
other hand, do not have direct access to the probability
of each prediction. Instead, related non-probabilistic
Why is it important to reliably measure prediction confidence? In various contexts such as medical diagnosis
and decision support systems, it is important to know
the prediction confidence in order to decide how to act
upon it. For example, if the confidence in a certain
prediction is too low, the involvement of a human expert in the decision process may be called for. Another
important aspect of real world applications is the ability to recognize samples that do not belong to any of
the known classes, which can also be improved with a
reliable confidence score. But even irrespective of the
application context, reliable prediction confidence can
be used to boost the classifier performance via such
methods as self-training or ensemble classification. In
this context a better confidence score can improve the
final performance of the classifier. The derivation of a
good confidence score should therefore be part of the
classifier’s design, as important as any other component
of classifiers’ design.
In order to derive a reliable confidence score for NN
classifiers, we focus our attention on an empirical observation concerning neural networks trained for classification, which have been shown to demonstrate in parallel
useful embedding properties. Specifically, a common
practice these days is to treat one of the upstream
layers of a pre-trained network as a representation (or
embedding) layer. This layer activation is then used for
representing similar objects and train simpler classifiers
(such as SVM, or shallower NNs) to perform different
tasks, related but not identical to the original task the
network had been trained on.
Distance-based Confidence Score for Neural Network Classifiers
In computer vision such embeddings are commonly
obtained by training a deep network on the recognition
of a very large database (typically ImageNet (Deng
et al., 2009)). These embeddings have been shown to
provide better semantic representations of images (as
compared to more traditional image features) in a number of related tasks, including the classification of small
datasets (Sharif Razavian et al., 2014), image annotation (Donahue et al., 2015) and structured predictions
(Hu et al., 2016). Given this semantic representation,
one can compute a natural multi-class probability distribution as described in Section 2.1, by estimating
local density in the embedding space. This estimated
density can be used to assign a confidence score to each
test point, using its likelihood to belong to the assigned
class.
We note, however, that the commonly used embedding
discussed above is associated with a network trained
for classification only, which may impede its suitability
to measure confidence reliably. In fact, when training neural networks, metric learning is often used to
achieve desirable embeddings (e.g., Weston et al. (2012);
Schroff et al. (2015); Hoffer & Ailon (2015); Tadmor
et al. (2016)). Since our goal is to improve the probabilistic interpretation of the embedding, which is essentially based on local point density estimation (or
the distance between points), we may wish to modify
the loss function and add a term which penalizes for
the violation of pairwise constraints as in Hadsell et al.
(2006). Our experiments show that the modified network indeed produces a better confidence score, with
comparable classification performance. Surprisingly,
while not directly designed for this purpose, we show
that networks which are trained with adversarial examples following the Adversarial Training paradigm
(Szegedy et al., 2013; Goodfellow et al., 2014), also
provide a suitable embedding for the new confidence
score.
Our first contribution, therefore, is a new prediction
confidence score which is based on local density estimation in the embedding space of the neural network.
This score can be computed for every network, but in
order for this score to achieve superior performance, it
is necessary to slightly change the training procedure.
In our second contribution we show that suitable embedding can be achieved by either augmenting the loss
function of the trained network with a term which penalizes for distance-based similarity loss (as in Eq. (2)
below), or by using Adversarial Training. The importance of the latter contribution is two fold: Firstly, we
are the first to show that the density of image embeddings is improved with indirect Adversarial Training
perturbations, in addition to the improved word embedding quality shown in Miyato et al. (2016) by direct
Adversarial Training perturbations. Secondly, we show
in Section 3 that Adversarial Training improves the
results while imposing a much lighter burden of hyperparameters to tune as compared to the distance-based
loss.
The new confidence score is evaluated in comparison
to other scores, using the following tasks: (i) Performance in the binary classification task of identifying
each class prediction as correct or incorrect (see Section 2.1). (ii) Training an ensemble of NN classifiers,
where each classifier’s prediction is weighted by the
new confidence score (see Section 2.4). (iii) Novelty
detection, where confidence is used to predict whether
a test point belongs to one of the known classes from
the train set (see Section 2.5).
The empirical evaluation of our method is described
in Section 3, using a few datasets and different network architectures which have been used in previous
work when using these specific datasets. Our method
achieves significant improvement in all 3 tasks. When
compared with a more recent method which had been
shown to improve traditional measures of classification
confidence - MC dropout (Gal & Ghahramani, 2015),
our distance-based score achieves better results while
also maintaining lower computational costs.
Prior Work
The Bayesian approach seeks to compute a posterior
distribution over the parameters of the neural network
which is used to estimate prediction uncertainty, as in
MacKay (1992) and Neal (2012). However, Bayesian
neural networks are not always practical to implement,
and the computational cost involved it typically high.
In accordance, in a method which is referred to below
as MC-Dropout, Gal & Ghahramani (2015) proposed
to use dropout during test time as a Bayesian approximation of the neural network, providing a cheap proxy
to Bayesian Neural Networks. Lakshminarayanan et al.
(2016) proposed to use Adversarial Training to improve
the uncertainty measure of the entropy score of the
neural network.
Still, the most basic and one of the most common
confidence scores for neural networks can be derived
from the strength of the most activated output unit, or
rather its normalized version (also called softmax output
or max margin). A confidence score that handles better
a situation where there is no one class which is most
probable, is the (negative) entropy of the normalized
network’s output. Zaragoza & d’Alché Buc (1998)
compared these scores, as well as some more complex
ones (e.g. Tibshirani (1996)), demonstrating somewhat
surprisingly the empirical superiority of the two most
basic methods described in the previous paragraph.
Amit Mandelbaum, Daphna Weinshall
Ensembles of models have been used to improve the
overall performance of the final classifier (see reviews
in Dietterich (2000) and Li et al. (2017)). There are
many ways to train an ensemble, such as boosting or
bagging. There are also many ways to integrate the
predictions of the classifiers in the ensemble, including
the average prediction or voting discussed by Bauer
& Kohavi (1999). Some ensemble methods use the
confidence score to either weight the predictions of the
different classifiers (average weighting) or for confidence
voting.
Novelty detection, where the task is to determine
whether a test point belongs to a known class label
or not, is another problem which becomes more relevant with the ever increasing availability of very large
datasets, see reviews in Markou & Singh (2003), Pimentel et al. (2014) and the recent work in Vinokurov
& Weinshall (2016). This task is also highly relevant
in real world applications, where the classifier is usually exposed to many samples which do not belong to
a known class. Note that novelty detection is quite
different from the learning of classes with no examples,
as in zero shot learning (Palatucci et al., 2009).
2
New Confidence Score
We propose next a new confidence score. We then
discuss how it can be used to boost classification performance with ensemble methods, or when dealing with
novelty detection.
2.1
New Confidence Score for Neural
Network Classifiers
Our confidence score is based on the estimation of local
density as induced by the network, when points are
represented using the effective embedding created by
the trained network in one of its upstream layers. Local
density at a point is estimated based on the Euclidean
distance in the embedded space between the point and
its k nearest neighbors in the training set.
Specifically, let f (x) denote the embedding of x as
defined by the trained neural network classifier. Let
A(x) = {xjtrain }kj=1 denote the set of k-nearest neighbors of x in the training set, based on the Euclidean
distance in the embedded space, and let {y j }kj=1 denote
the corresponding class labels of the points in A(x). A
probability space is constructed (as is customary) by
assuming that the likelihood that two points belong to
the same class is proportional to the exponential of the
negative Euclidean distance between them. In accordance, the local probability that a point x belongs to
class c is proportional to the probability that it belongs
to the same class as the subset of points in A(x) that
belong to class c.
Based on this local probability, the confidence score
D(x) for the assignment of point x to class ŷ is defined
as follows:
Pk
−||f (x)−f (xjtrain )||2
j=1,y j =ŷ e
D(x) = Pk
(1)
−||f (x)−f (xjtrain )||2
j=1 e
D(x) is a score between 0 to 1, which is monotonically
related to the local density of similarly labeled train
points in the neighborhood of x. Henceforth (1) is
referred to as Distance score.1 We note here that while
intuitively it might be beneficial to add a scaling factor
to the distance in (1), such as the mean distance, we
found it to have a deteriorating effect, in line with
related work such as Salakhutdinov & Hinton (2007).
Two ways to achieve effective embedding: As
mentioned is Section 1, in order to achieve an effective
embedding it helps to modify the training procedure of
the neural network classifier. The simplest modification
augments the network’s loss function during training
with an additional term. The resulting loss function is
a linear combination of two terms, one for classification
denoted Lclass (X, Y ), and another pairwise loss for
the embedding denoted Ldist (X, Y ). This is defined as
follows:
L(X, Y ) = Lclass (X, Y ) + αLdist (X, Y )
Ldist (X, Y ) =
1
P
P
X
(2)
Ldist (xp1 , xp2 )
p=1
where Ldist (xi , xj ) is defined as
(
||f (xi ) − f (xj )||2
if y i = y j
max{0, (m − ||f (xi ) − f (xj )||2 )} if y i 6= y j
A desirable embedding can also be achieved by Adversarial Training, using the fast gradient method suggested in Goodfellow et al. (2014). In this method,
given an input x with target y, and a neural network
with parameters θ, adversarial examples are generated
using:
x0 = x + sign(5x Lclass (θ, x, y))
(3)
In each step an adversarial example is generated for
each point x in the batch and the current parameters
of the network, and classification loss is minimized for
both the regular and adversarial examples. Although
originally designed to improve robustness, this method
1
Related measures of density, such as a count of the
"correct" neighbors or the inverse of the distance, behave
similarly and perform comparably.
Distance-based Confidence Score for Neural Network Classifiers
seems to improve the network’s embedding for the purpose of density estimation, possibly because along the
way it increases the distance between pairs of adjacent
points with different labels.
Implementation details: In (2) Ldist is defined by
all pairs of points, denoted (xp1 , xp2 ). For each training
minibatch, this set is sampled with no replacement from
the training points in the minibatch, with half as many
pairs as the size of the minibatch. In our experiments,
Lclass (X, Y ) is the regular cross entropy loss. We note
here that we also tried distance-based loss functions
which do not limit the distance between points of the
same class to be exactly 0 (such as those in Hoffer
& Ailon (2015) and Tadmor et al. (2016)). However,
those functions produced worse results, especially when
the dataset had many classes. Finally we note that we
have tried using the distance-based loss and adversarial
training together while training the network, but this
has also produced worse results.
2.2
Alternative confidence scores
Given a trained network, two measure are usually used
to evaluate classification confidence:
Max margin: the maximal activation, after normalization, in the output layer of the network.
Entropy: the (negative) entropy of the activations in
the output layer of the network.
As noted above, the empirical study in Zaragoza &
d’Alché Buc (1998) showed that these two measures
are typically as good as any other existing method for
the evaluation of classification confidence.
Two recent methods have been shown to improve the reliability of the confidence score based on Entropy: MCDropout (Gal & Ghahramani, 2015) and Adversarial
Training (Lakshminarayanan et al., 2016; Goodfellow
et al., 2014). In terms of computational cost, adversarial training can increase (and sometimes double) the
training time, due to the computation of additional
gradients and the addition of the adversarial examples
to the training set. MC-Dropout, on the other hand,
does not change the training time but increases the test
time by orders of magnitude (typically 100-fold). Both
methods are complementary to our approach, in that
they focus on modifications to the actual computation
of the network during either train or test time. After
all is done, they both evaluate confidence using the
Entropy score. As we show in our experiments, adversarial training combined with our proposed confidence
score improves the final results significantly.
2.3
Our method: computational analysis
Unlike the two methods described above, MC-Dropout
and Adversarial Training, our distance-based confidence score takes an existing network and computes
a new confidence score from the network’s embedding
and output activation. It can use any network, with
or without adversarial training or MC dropout. If the
loss function of the network is suitably augmented (see
discussion above), empirical results in Section 3 show
that our score always improves results over the Entropy
score of the given network.
Train and test computational complexity: Considering the distance-based loss, Tadmor et al. (2016)
showed that computing distances during the training
of neural networks have negligible effect on training
time. Alternatively, when using adversarial training,
additional computational cost is incurred as mentioned
above, while on the other hand fewer hyper parameters are left for tuning. During test time, our method
requires carrying over the embeddings of the training data and also the computation of the k nearest
neighbors for each sample.
Nearest neighbor classification has been studied extensively in the past 50 years, and consequently there are
many methods to perform either precise or approximate k-nn with reduced time and space complexity (see
Gunadi (2011) for a recent empirical comparison of the
main methods). In our experiments, while using either
Condensed Nearest Neighbours (Hart, 1968) or Density
Preserving Sampling (Budka & Gabrys, 2013), we were
able to reduce the memory requirements of the train set
to 5% of its original size without affecting performance.
At this point the additional storage required for the
nearest neighbor step was much smaller than the size
of the networks used for classification, and the increase
in space complexity became insignificant.
With regards to time complexity, recent studies have
shown how modern GPU’s can be used to speed up
nearest neighbor computation by orders of magnitude
(Garcia et al., 2008; Arefin et al., 2012). Hyvönen
et al. (2015) also showed that k-nn approximation with
99% recall can be accomplished 10-100 times faster as
compared to precise k-nn.
Combining such reductions in both space and time, we
note that even for a very large dataset, including for
example 1M images embedded in a 1K dimensional
space, the computation complexity of the k nearest
neighbors for each test sample requires at most 5M
floating-point operations. This is comparable and even
much faster than a single forward run of this test sample
through a modern, relatively small, ResNets (He et al.,
2016) with 2-30M parameters. Thus, our method scales
Amit Mandelbaum, Daphna Weinshall
well even for very large datasets.
2.4
Ensembles of Classifiers
There are many ways to define ensembles of classifiers,
and different ways to put them together. Here we focus
on ensembles which are obtained when using different
training parameters with a single training method. This
specifically means that we train several neural networks
using random initialization of the network parameters,
along with random shuffling of the train points.
Henceforth Regular Networks will refer to networks
that were trained only for classification with the regular cross-entropy loss, Distance Networks will refer
to networks that were trained with the loss function
defined in (2), and AT Networks will refer to networks
that were trained with adversarial examples as defined
in (3).
Ensemble methods differ in how they weigh the predictions of different classifiers in the ensemble. A number
of options are in common use (see Li et al. (2017)
for a recent review), and in accordance are used for
comparison in the experimental evaluation section: 1)
softmax average, 2) simple voting, 3) weighted softmax
average (where each softmax vector is multiplied by
its related prediction confidence score), 4) confidence
voting (where the most confident network gets n2 votes),
and 5) dictator voting (the decision of the most confident network prevails). We evaluate methods 3 − 5
with weights defined by either the Entropy score or the
Distance score defined in (1).
2.5
Novelty Detection
Novelty detection seeks to identify points in the test set
which belong to classes not present in the train set. To
evaluate performance in this task we train a network
with a known benchmark dataset, while augmenting
the test set with test points from another dataset that
includes different classes. Each confidence score is used
to differentiate between known and unknown samples.
This is a binary classification task, and therefore we
can evaluate performance using ROC curves.
3
Experimental Evaluation
2010) (32 × 32 version) and SVHN (Netzer et al., 2011).
In all cases, as is commonly done, the data was preprocessed using global contrast normalization and ZCA
whitening. No other method of data augmentation was
used for CIFAR-100 and SVHN, while for SVHN we
also did not use the additional 5̃00K labeled images2 .
For STL-10, on the other hand, cropping and flipping
were used for STL-10 to check the robustness of our
method to heavy data augmentation.
In our experiments, all networks used ELU (Clevert
et al., 2015) for non-linear activation. For CIFAR-100
and STL-10 we used the network suggested in Clevert
et al. (2015) with the following architecture:
C(192, 5) ⇒ P (2) ⇒ C(192, 1) ⇒ C(240, 3) ⇒
P (2) ⇒ C(240, 1) ⇒ C(260, 3) ⇒ P (2) ⇒
C(260, 1) ⇒ C(280, 2) ⇒ P (2) ⇒ C(280, 1) ⇒
C(300, 2) ⇒ P (2) ⇒ C(300, 1) ⇒ F C(100)
C(n, k) denotes a convolution layer with n kernels of
size k × k and stride 1. P (k) denotes a max-pooling
layer with window size k × k and stride 2, and F C(n)
denotes a fully connected layer with n output units. For
STL-10 the last layer was replaced by FC(10). During
training (only) we applied dropout (Srivastava et al.,
2014) before each max pooling layer (excluding the first)
and after the last convolution, with the corresponding
drop probabilities of [0.1, 0.2, 0.3, 0.4, 0.5].
With the SVHN dataset we used the following architecture:
C(32, 3) ⇒ C(32, 3) ⇒ C(32, 3) ⇒ P (2) ⇒
C(64, 3) ⇒ C(64, 3) ⇒ C(64, 3) ⇒ P (2) ⇒
C(128, 3) ⇒ C(128, 3) ⇒ C(128, 3) ⇒ P (2) ⇒
F C(128) ⇒ F C(10)
For the networks trained with distance loss, for each
batch, we randomly picked pairs of points so that at
least 20% of the batch included pairs of points from
the same class. The margin m in (2) was set to 25 in
all cases, and the parameter α in (2) was set to 0.2.
The rest of the training parameters can be found in the
supplementary material. For the distance score we observed that the number of k nearest neighbors could be
set to the maximum value, which is the number of samples in each class in the train data. We also observed
that smaller numbers (even k = 50) often worked as
2
In this section we empirically evaluate the benefits of
our proposed approach, comparing the performance
of the new confidence score with alternative existing
scores in the 3 different tasks described above.
3.1
Experimental Settings
For evaluation we used 3 data sets: CIFAR-100
(Krizhevsky & Hinton, 2009), STL-10 (Coates et al.,
Note that reported results denoted as "state-of-the-art"
for these datasets often involve heavy augmentation. In our
study, in order to be able to do the exhaustive comparisons
described below, we opted for the un-augmented scenario
as more flexible and yet informative enough for the purpose
of comparison between different methods. Therefore our
numerical results should be compared to empirical studies
which used similar un-augmented settings. We specifically
selected commonly used architectures that achieve good
performance, close to the results of modern ResNets, and
yet flexible enough for extensive evaluations.
Distance-based Confidence Score for Neural Network Classifiers
Table 1: AUC Results of Correct Classification.
Conf.
Score
Margin
Entropy
Distance
CIFAR-100
(Classifier acccuracy: 60%)
Reg.
Dist.
AT
MCD
0.828 0.834
0.844 0.836
0.833 0.837
0.851 0.833
0.789 0.853 0.843 0.726
STL-10
(Classifier acccuracy: 70.5%)
Reg.
Dist.
AT
MCD
0.804 0.775 0.812
0.804
0.806 0.786 0.816
0.810
0.798 0.824 0.863 0.671
SVHN
(Accuracy: 93.5%)
Reg.
Dist.
AT
0.904 0.896
0.909
0.916 0.907
0.918
0.916 0.925 0.925
Table 1, legend. Leftmost column: Margin and Entropy denote the commonly used confidence scores described in
Section 2.2. Distance denotes our proposed method described in Section 2.1. Second line: Reg. denotes networks trained
with the entropy loss, Dist. denotes networks trained with the distance loss defined in (2), AT denotes networks trained
with adversarial training as defined in (3), and MCD denotes MC-Dropout when applied to networks normally trained
with the entropy loss. Since the network trained for SVHN was trained without dropout,MCD was not applicable.
Table 2: AUC Results of Correct classification - Ensemble of 2 Networks.
Confidence
Score
Max margin
Entropy
Distance (1)
Distance (2)
CIFAR-100
Reg.
0.840
0.844
0.775
0.876
Dist.
0.846
0.839
0.863
0.872
AT
0.856
0.857
0.862
0.879
STL-10
Reg.
0.802
0.807
0.815
0.833
Dist.
0.792
0.798
0.834
0.832
SVHN
AT
0.814
0.816
0.866
0.859
Reg.
0.909
0.918
0.916
0.918
Dist.
0.901
0.912
0.924
0.929
AT
0.911
0.920
0.926
0.927
Table 2, legend. Notations are similar to those described in the legend of Table 1, with one distinction: Distance (1) now
denotes the regular architecture where the distance score is computed independently for each network in the pair using its
own embedding, while Distance (2) denotes the hybrid architecture where one network in the pair is fixed to be a Distance
network, and its embedding is used to compute the distance score for the prediction of the second network in the pair.
well. In general, the results reported below are not
sensitive to the specific values of the hyper-parameters
as listed above; we observed only minor changes when
changing the values of k, α and the margin m.
MC-Dropout: as proposed in Gal & Ghahramani (2015),
we used MC dropout in the following manner. We
trained each network as usual, but computed the predictions while using dropout during test. This was
repeated 100 times for each test example, and the
average activation was delivered as output.
Adversarial Training: we used (3) following Goodfellow
et al. (2014), fixing = 0.1 in all the experiments.
3.2
Error Prediction of Multi-class Labels
We first compare the performance of our confidence
score in the binary task of evaluating whether the network’s predicted classification label is correct or not.
While our results are independent of the actual accuracy, we note that the accuracy is comparable to those
achieved with ResNets when not using augmentation
for CIFAR-100 or when using only the regular training
data for SVHN (see Huang et al. (2016) for example).
Performance in this binary task is evaluated using ROC
curves computed separately for each confidence score.
Results on all three datasets can be seen in Table 1. In
all cases our proposed distance score, when computed
on a suitably trained network, achieves significant improvement over the alternative scores, even when those
are enhanced by using either Adversarial Training or
MC-Dropout.
To further test our distance score we evaluate performance over an ensemble of two networks. Results are
shown in Table 2. Here too, the distance score achieves
significant improvement over all other methods. We
also note that the difference between the distance score
computed over Distance networks and the entropy score
computed over adversarially trained networks, is now
much higher as compared to this difference when using
only one network. As we show in Section 3.3, adversarial training typically leads to a decreased performance
when using an ensemble of networks and relying only
on the entropy score (probably due to a decrease in variance among the classifiers). This observation further
supports the added value of our proposed confidence
score.
As a final note, we also used a hybrid architecture using
a matched pair of one classification network (of any
kind) and a second Distance network. The embedding
defined by the Distance network is used to compute
the distance score for the predictions of the first classification network. Surprisingly, this method achieves
Amit Mandelbaum, Daphna Weinshall
Figure 1: Accuracy when using an ensemble of networks with CIFAR-100 (top left), STL-10 (top right) and
SVNH (bottom). The X-axis denotes the number of networks in the ensemble. Absolute accuracy (marked on
the left Y -axis) is shown for the 2 most successful ensemble methods among all the methods we had evaluated
(blue and yellow solid lines, see text), and 2 methods which did not use our distance score including the best
performing method in this set (red dotted line, denoted baseline). Differences in accuracy between the two top
performers and the top baseline method are shown using a bar plot (marked on the right Y -axis), with standard
deviation of the difference over (at least) 5 repetitions.
the best results in both CIFAR-100 and SVHN while
being comparable to the best result in STL-10. This
method is used later in Section 3.3 to improve accuracy
when running an ensemble of networks. Further investigation of this phenomenon lies beyond of the scope
of the current study.
3.3
Ensemble Methods
In order to evaluate the improvement in performance
when using our confidence score to direct the integration of classifiers in an ensemble, we used a few common
ways to define the integration procedure, and a few
ways to construct the ensemble itself. In all comparisons the number of networks in the ensemble remained
fixed at n. Our experiments included the following
ensemble compositions: (a) n regular networks, (b) n
distance networks, (c) n AT (Adversarially Trained)
networks, and (d-f) n networks such that n2 networks
belong to one kind of networks (regular, distance or
AT ) and the remaining n2 networks belong to another
kind, spanning all 3 combinations.
As described in Section 2.4, the predictions of classifiers
in an ensemble can be integrated using different criteria.
In general we found that all the methods which did not
use our distance score (1), including methods which
used any of the other confidence score for prediction
weighting, performed less well than a simple average
of the softmax activation (method 1 in Section 2.4).
Otherwise the best performance was obtained when
using a weighted average (method 3 in Section 2.4)
with weights defined by our distance score (1). With
variants (d-f) we also checked two options of obtaining
the distance score: (i) Each network defined its own
confidence score; (ii) in light of the advantage demonstrated by hybrid networks as shown in Section 3.2
and for each pair of networks from different kinds, the
distance score for both was computed while using the
embedding of only one of networks in the pair. MCDropout was not used in this section due to its high
computational cost.
While our experiments included all variants and all
weighting options, only 4 cases are shown in the following description of the results in order to improve
Distance-based Confidence Score for Neural Network Classifiers
readability: 1) the combination achieving best performance; 2) the combination achieving best performance
when not using adversarial training (as AT entails
additional computational load at train time); 3) the
ensemble variant achieving best performance without
using the distance score (baseline), 4) ensemble average
when using adversarial training without distance score.
Additional results for most of the other conditions we
tested can be found in the supplementary material. To
gain a better statistical significance, each experiment
was repeated at least 5 times, with no overlap between
the networks.
CIFAR-100 and STL-10: Fig. 1 shows the ensemble accuracy for the methods mentioned above when
using these datasets. It can be clearly seen that weighting predictions based on the distance score from (1)
improves results significantly. The best results are
achieved when combining Distance Networks and Adversarial Networks, with significant improvement over
an ensemble of only one kind of networks (not shown
in the graph). Still, we note importantly that the distance score is used to weight both kind of networks.
Since Adversarial Training is not always applicable
due to its computational cost at train time, we show
that the combination of Distance networks and Regular
networks can also lead to significant improvement in
performance when using the distance score and the
hybrid architecture described in Section 3.2. Finally
we note that Adversarial networks alone achieve very
poor results when using the original ensemble average, further demonstrating the value of the distance
score in improving the performance of an ensemble of
Adversarial networks alone.
SVHN: Results for this dataset are also shown in Fig.1.
While not as significant as those in the other datasets
(partly due to the high initial accuracy), they are still
consistent with them, demonstrating again the power
and robustness of the distance score.
3.4
Novelty Detection
Finally, we compare the performance of the different
confidence scores in the task of novelty detection. In
this task the confidence score is used to decide another
binary classification problem: does the test example belong to the set of classes the networks had been trained
on, or rather to some unknown class? Performance in
this binary classification task is evaluated using the
corresponding ROC curve of each confidence score.
We used two contrived datasets to evaluate performance
in this task, following the experimental construction
suggested in Lakshminarayanan et al. (2016). In the
first experiment, we trained the network on the STL-10
dataset, and then tested it on both STL-10 and SVHN
test sets. In the second experiment we switched be-
tween the datasets (and changed the trained network)
making SVHN the known dataset and STL-10 the
novel one. The task requires to discriminate between
the known and the novel datasets. For comparison we
computed novelty, as one often does, with a one-class
SVM classifier while using the same embeddings. Novelty thus computed showed much poorer performance,
possibly because this dataset involves many classes
(one class SVM is typically used with a single class),
and therefore these results are not included here.
Table 3: AUC Results for Novelty Detection.
Confide.
Score
Max
Margin
Entropy
Distance
STL-10/SVHN
SVHN/STL-10
Reg.
Dist.
AT
Reg.
Dist.
AT
.808
.849
.860
.912
.922
.985
.810
.798
.857
.870
.870
.901
.917
.904
.933
.934
.992
.996
Table 3, legend. Left: STL-10 (known) and SVHN (novel).
Right: SVHN (known) and STL-10 (novel).
Results are shown in Table 3. Adversarial training,
which was designed to handle this sort of challenge,
is not surprisingly the best performer. Nevertheless,
we see that our proposed confidence score improves
the results even further, again demonstrating its added
value.
4
Conclusions
We proposed a new confidence score for multi-class
neural network classifiers. The method we proposed
to compute this score is scalable, simple to implement,
and can fit any kind of neural network. This method
is different from other commonly used methods as it is
based on measuring the point density in the effective
embedding space of the network, thus providing a more
coherent statistical measure for the distribution of the
network’s predictions.
We also showed that suitable embeddings can be
achieved by using either a distance-based loss or, somewhat unexpectedly, Adversarial Training. We demonstrated the superiority of the new score in a number
of tasks. Those tasks were evaluated using a number
of different datasets and with task-appropriate network architectures. In all tasks our proposed method
achieved the best results when compared to traditional
confidence scores.
References
Arefin, Ahmed Shamsul, Riveros, Carlos, Berretta,
Regina, and Moscato, Pablo. Gpu-fs-k nn: A soft-
Amit Mandelbaum, Daphna Weinshall
ware tool for fast and scalable k nn computation
using gpus. PloS one, 7(8):e44000, 2012.
Bauer, Eric and Kohavi, Ron. An empirical comparison
of voting classification algorithms: Bagging, boosting,
and variants. Machine learning, 36(1-2):105–139,
1999.
Budka, Marcin and Gabrys, Bogdan.
Densitypreserving sampling: robust and efficient alternative
to cross-validation for error estimation. IEEE transactions on neural networks and learning systems, 24
(1):22–34, 2013.
Clevert, Djork-Arné, Unterthiner, Thomas, and Hochreiter, Sepp. Fast and accurate deep network learning
by exponential linear units (elus). arXiv preprint
arXiv:1511.07289, 2015.
Coates, Adam, Lee, Honglak, and Ng, Andrew Y. An
analysis of single-layer networks in unsupervised feature learning. Ann Arbor, 1001(48109):2, 2010.
Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., and
Fei-Fei, L. ImageNet: A Large-Scale Hierarchical
Image Database. In CVPR09, 2009.
Dietterich, Thomas G. Ensemble methods in machine
learning. In International workshop on multiple classifier systems, pp. 1–15. Springer, 2000.
Donahue, Jeffrey, Anne Hendricks, Lisa, Guadarrama,
Sergio, Rohrbach, Marcus, Venugopalan, Subhashini,
Saenko, Kate, and Darrell, Trevor. Long-term recurrent convolutional networks for visual recognition
and description. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.
2625–2634, 2015.
Gal, Yarin and Ghahramani, Zoubin. Dropout as
a bayesian approximation: Representing model
uncertainty in deep learning.
arXiv preprint
arXiv:1506.02142, 2, 2015.
Garcia, Vincent, Debreuve, Eric, and Barlaud, Michel.
Fast k nearest neighbor search using gpu. In Computer Vision and Pattern Recognition Workshops,
2008. CVPRW’08. IEEE Computer Society Conference on, pp. 1–6. IEEE, 2008.
Goodfellow, Ian J, Shlens, Jonathon, and Szegedy,
Christian. Explaining and harnessing adversarial
examples. arXiv preprint arXiv:1412.6572, 2014.
Gunadi, Hendra. Comparing nearest neighbor algorithms in high-dimensional space. 2011.
Hadsell, Raia, Chopra, Sumit, and LeCun, Yann. Dimensionality reduction by learning an invariant mapping. In Computer vision and pattern recognition,
2006 IEEE computer society conference on, volume 2,
pp. 1735–1742. IEEE, 2006.
Hart, Peter. The condensed nearest neighbor rule
(corresp.). IEEE transactions on information theory,
14(3):515–516, 1968.
He, Kaiming, Zhang, Xiangyu, Ren, Shaoqing, and Sun,
Jian. Deep residual learning for image recognition.
In Proceedings of the IEEE conference on computer
vision and pattern recognition, pp. 770–778, 2016.
Hoffer, Elad and Ailon, Nir. Deep metric learning
using triplet network. In International Workshop
on Similarity-Based Pattern Recognition, pp. 84–92.
Springer, 2015.
Hu, Hexiang, Zhou, Guang-Tong, Deng, Zhiwei, Liao,
Zicheng, and Mori, Greg. Learning structured inference neural networks with label relations. In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pp. 2960–2968, 2016.
Huang, Gao, Sun, Yu, Liu, Zhuang, Sedra, Daniel, and
Weinberger, Kilian Q. Deep networks with stochastic
depth. In European Conference on Computer Vision,
pp. 646–661. Springer, 2016.
Hyvönen, Ville, Pitkänen, Teemu, Tasoulis, Sotiris,
Jääsaari, Elias, Tuomainen, Risto, Wang, Liang,
Corander, Jukka, and Roos, Teemu. Fast k-nn search.
arXiv preprint arXiv:1509.06957, 2015.
Krizhevsky, Alex and Hinton, Geoffrey. Learning multiple layers of features from tiny images. 2009.
Lakshminarayanan, Balaji, Pritzel, Alexander, and
Blundell, Charles. Simple and scalable predictive
uncertainty estimation using deep ensembles. arXiv
preprint arXiv:1612.01474, 2016.
Li, Hui, Wang, Xuesong, and Ding, Shifei. Research
and development of neural network ensembles: a
survey. Artificial Intelligence Review, pp. 1–25, 2017.
MacKay, David JC. Bayesian methods for adaptive
models. PhD thesis, California Institute of Technology, 1992.
Markou, Markos and Singh, Sameer. Novelty detection:
a review—part 2:: neural network based approaches.
83(12):2499–2521, 2003.
Miyato, Takeru, Dai, Andrew M, and Goodfellow, Ian.
Adversarial training methods for semi-supervised
text classification. arXiv preprint arXiv:1605.07725,
2016.
Neal, Radford M. Bayesian learning for neural networks, volume 118. Springer Science & Business
Media, 2012.
Netzer, Yuval, Wang, Tao, Coates, Adam, Bissacco,
Alessandro, Wu, Bo, and Ng, Andrew Y. Reading
digits in natural images with unsupervised feature
learning. In NIPS workshop on deep learning and
unsupervised feature learning, volume 2011, pp. 5,
2011.
Distance-based Confidence Score for Neural Network Classifiers
Palatucci, Mark, Pomerleau, Dean, Hinton, Geoffrey E,
and Mitchell, Tom M. Zero-shot learning with semantic output codes. In Advances in neural information
processing systems, pp. 1410–1418, 2009.
Pimentel, Marco AF, Clifton, David A, Clifton, Lei,
and Tarassenko, Lionel. A review of novelty detection.
Signal Processing, 99:215–249, 2014.
Salakhutdinov, Ruslan and Hinton, Geoffrey E. Learning a nonlinear embedding by preserving class neighbourhood structure. In AISTATS, volume 11, 2007.
Schroff, Florian, Kalenichenko, Dmitry, and Philbin,
James. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, pp. 815–823, 2015.
Sharif Razavian, Ali, Azizpour, Hossein, Sullivan,
Josephine, and Carlsson, Stefan. Cnn features offthe-shelf: an astounding baseline for recognition. In
Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition Workshops, pp. 806–
813, 2014.
Srivastava, Nitish, Hinton, Geoffrey E, Krizhevsky,
Alex, Sutskever, Ilya, and Salakhutdinov, Ruslan.
Dropout: a simple way to prevent neural networks
from overfitting. Journal of Machine Learning Research, 15(1):1929–1958, 2014.
Szegedy, Christian, Zaremba, Wojciech, Sutskever, Ilya,
Bruna, Joan, Erhan, Dumitru, Goodfellow, Ian, and
Fergus, Rob. Intriguing properties of neural networks.
arXiv preprint arXiv:1312.6199, 2013.
Tadmor, Oren, Rosenwein, Tal, Shalev-Shwartz, Shai,
Wexler, Yonatan, and Shashua, Amnon. Learning
a metric embedding for face recognition using the
multibatch method. In Advances In Neural Information Processing Systems, pp. 1388–1389, 2016.
Tibshirani, Robert. A comparison of some error estimates for neural network models. Neural Computation, 8(1):152–163, 1996.
Vinokurov, Nomi and Weinshall, Daphna. Novelty
detection in multiclass scenarios with incomplete
set of class labels. arXiv preprint arXiv:1604.06242,
2016.
Weston, Jason, Ratle, Frédéric, Mobahi, Hossein, and
Collobert, Ronan. Deep learning via semi-supervised
embedding. In Neural Networks: Tricks of the Trade,
pp. 639–655. Springer, 2012.
Zaragoza, Hugo and d’Alché Buc, Florence. Confidence
measures for neural network classifiers. In Proceedings of the Seventh Int. Conf. Information Processing
and Management of Uncertainty in Knowlegde Based
Systems, 1998.
| 2cs.AI
|
arXiv:1205.4691v2 [cs.LO] 22 May 2012
On the discriminating power of tests in resource
λ-calculus
January 20, 2018
Abstract
Since its discovery, differential linear logic (DLL) inspired numerous
domains. In denotational semantics, categorical models of DLL are now
commune, and the simplest one is Rel, the category of sets and relations.
In proof theory this naturally gave birth to differential proof nets that are
full and complete for DLL. In turn, these tools can naturally be translated
to their intuitionistic counterpart. By taking the co-Kleisly category associated to the ! comonad, Rel becomes MRel, a model of the λ-calculus that
contains a notion of differentiation. Proof nets can be used naturally to
extend the λ-calculus into the lambda calculus with resources, a calculus
that contains notions of linearity and differentiations. Of course MRel is
a model of the λ-calculus with resources, and it has been proved adequate,
but is it fully abstract?
That was a strong conjecture of Bucciarelli, Carraro, Ehrhard and
Manzonetto in [4]. However, in this paper we exhibit a counter-example.
Moreover, to give more intuition on the essence of the counter-example
and to look for more generality, we will use an extension of the resource
λ-calculus also introduced by Bucciarelli et al in [4] for which M∞ is fully
abstract, the tests.
1
Introduction
The first extension of the λ-calculus with resources, by Boudol in 1993 [1], was
introducing a special resource sensitive application that may involve multisets
of affine arguments (each one has to be used at most one time). This was a
natural way to export resource sensitiveness to the functional setting. However,
gathering no known and interesting properties (confluence, linearity...), it was
not fully explored.
Later on, Ehrhard and Regnier, working on functional interpretation of differential proof nets, discovered a calculus similar to Boudol’s one, named differential λ-calculus [10]. By adding to the λ-calculus a derivative operation
∂M
(N ), which syntactically corresponds to a linear substitution of x by N in
x
M , it recovers the resource-sensitiveness. This is done through the translation
1
(n)
(λx.M ) [N1 , ..., Nn ; N ! ] ≃ (λx. ∂ xM (N1,..., Nn)) N where Ni are the linear arguments and N is the non linear one. This more semantical view even allow
for the generalisation of the operation and recover excellent semantical properties (confluence, Taylor expansion...). We will adopt the syntax of [13] that
re-implements improvements from differential λ-calculus into Boudol’s calculus,
and we will call it ∂λ-calculus.
The category Rel of set and relations is known to model the linear logic,
and, despite its high degree of degeneration (Relop = Rel), it is a very natural
construction. Indeed, what appeared to be a degeneration is in reality a natural
choice that preserves all proofs, i.e. the interpretation function from proof to
MRel is injective up to isomorphism ([8]). But our principal interest for this
category is that it models the differential linear logic, and of known such category
it is the simplest and more natural.
As for every categorical model of linear logic, the interpretation of the ! induced a comonad. From that comonad we can construct the co-kleisly category.
In the case of Rel, this new category, MRel, corresponds to the category of sets
with, as morphisms from A to B, the relations from Mf (A) (the finite multisets
over A) to B. It is then a model of the λ-calculus and of the ∂λ-calculus. This
construction being the most natural we can do, MRel is, a priori, one of the
most natural models of the ∂λ-calculus (even if non well pointed [6]).
It is only natural, then, to question on the depth of the link among the
reflexive elements of MRel and the ∂λ-calculus. And more precisely among
MRel’s canonical reflexive element M∞ and the ∂λ-calculus. Until now we knew
that M∞ ([6]) was adequate for the λ-calculus, i.e. that two terms carrying the
same interpretations in MRel behave the same way in all contexts. But we did
not know anything about the counterpart, named full abstraction.
This question has been thoroughly studied, however, since M∞ has been
proved (resp. in [12], [5] and [4]) fully abstract not only for both of the principal
sub-calculi of ∂λ-calculus, namely the usual λ-calculus and Kfoury’s linear calculus of [11], but also for the extension with tests of [4] (denoted τ ∂λ-calculus).
Therefore Bucciarelli et al emit in [4] a strong conjecture of full abstraction for
the ∂λ-calculus.
However, and it is our purpose here, a counter example can be found. In
order to exhibit this counter example, we will take an unusual shortcut using
full abstraction result for τ ∂λ-calculus. Indeed, we will prove a slightly more
general theorem: the failure of full abstraction for ∂λ-calculus of any model that
is fully abstract for τ ∂λ-calculus. Due to this generalization we will not have to
introduce the full description of M∞ in the core of the article (it is available in
annexes).
Additionally to be considerably easier and more intuitive than the direct and
usual method, this way of proceeding is part of a larger study of full abstraction.
Indeed, we are looking for a mechanical way to tackle full abstraction problems
in two steps. First we extend the calculus with well chosen semantical objects
in order to reach the definability of compact elements. Then we study the full
abstraction question indirectly via the link between the operational equivalence
2
of the original calculus and of its artificial extension. This reduces our mix of
semantic and syntactic question to a purely syntactic one, allowing us to use
powerful syntactic constructions.
Tests where introduced in [2] to have a full abstraction theorem for Boudol
λ-calculus with resources. Later on, the principle was improved in [4], implementing semantic objects in the syntax in order to get full abstraction of M∞ ,
following an idea of [9]. This extension can, in our context, be compared to a
basic exception mechanism. The term τ̄ (Q) is raising the exception (or test)
Q, absorbing all its non resources-limited applications and the exception τ (M )
is catching any exception in M by annihilating all the head-λ-abstraction. The
most important here being the scope of the τ (M ) that act as an infinite application over M .
Notations: λx̄n will be used for λx1 , ..., xn (n is not specified when it can be
any integer) and I will denotes the identity λx.x.
2
2.1
Background
∂λ-calculus
As explained, this article is directly following [4]. For this reason we need to
introduce the ∂λ-calculus and then the tests. In the ∂λ-calculus , the notion of
linearity is capital. Any term in linear position will never suffer any duplication
or erasing regardless the reduction strategy. Linear subterms are subterms that
are either the first subterm of a lambda abstraction in linear position, the left
side of an application that is in linear position, or in the linear part of its
right side. The last case is the real improvement and asks for arguments to be
separated in linear and non linear arguments. Therefore, the right side of the
applications will be replaced by a new kind of expression different from terms,
the “bags”. Bags are multisets containing some linear (non banged) arguments
and exactly one non linear (banged) argument:
(terms) M, N ∶ λx.M ∣ M B ∣ M +N ∣ 0
(bags)
B, C ∶ [M1 , ..., Mn ; M ! ] ∣ B + C ∣ 0
This is the syntax of [4] modulo the macro M +N = (λx.x) [{M +N }! ].
For convenience, the finite sums will be denoted Σi Qi and the different 0’s are
just the neutral elements of the different sums. This demonic sum had to be
implemented since we want the calculus to be resource sensitive and confluent, thus there is no other choice than to considere the sum of all the possible
outcomes. Sums distribute with any linear context:
λx.(Σi Mi ) = Σi (λx .Mi )
(Σi Mi ) (Σj Nj ) = Σi,j (Mi Nj )
([(Σi1 ≤k1 Mi11 ), ..., (Σin ≤kn Minn ); M ! ]) = Σ(ij )j ≤(kj )j [Mii1 , ..., Minn ; M ! ]
In the application, each linear argument will replace one and only one occurrence
of the variable, thus the need of two kinds of substitutions, the usual one,
denoted {.}, and the linear one, denoted ⟨.⟩. This last will act like a derivation
(N ):
M ⟨N /x⟩ ∼ ∂M
∂x
3
x⟨N /x⟩ = N
x⟨N /y⟩ = 0
(λy.M )⟨N /x⟩ = λy.(M ⟨N /x⟩)
([M1 , ..., Mn ; M ! ])⟨N /x⟩ = (Σni=1 [M1 , .., Mi ⟨N /x⟩, ...Mn ; M ! ]) + [M1 , ..., Mn , M ⟨N /x⟩; M ! ]
(M P )⟨N /x⟩ = (M ⟨N /x⟩ P ) + (M P ⟨N /x⟩)
This enables us to describe the β-reduction:
(λx.M )[N1 , ..., Nn ; N ! ] → M ⟨N1 /x⟩⋯⟨Nn /x⟩{N ! /x}
(β)
In other words (λx.M )[N1 , ..., Nn ; N ! ] →
2.2
∂nM
(N1 , ..., Nn )(N )
∂nx
τ∂λ-calculus
In differential proof nets the 0-ary tensor and the 0-ary par can be added freely
in the sense that we still have a natural interpretation in MRel and M∞ . These
operations can be translated in our calculus as an exception mechanism. With
on one side a τ (Q) that “raises” the exception (or test) Q by burning its applicative context (whenever these applications do not have any linear component, otherwise it diverges). And with on the other side a τ̄ (M ) that “catch”
the exceptions in M by burning the abstraction context of M (whenever this
abstraction is dummy). The main difference with a usual exception system is
the divergence of the catch if no exception are raised.
We introduce a new operators and a new kind of expression that will play the
role of exception, the tests:
(terms) M, N ∶ τ̄ (Q)
(test)
ǫ ∣ Q∣R ∣ τ (M ) ∣ Q+R ∣ 0
Q, R ∶
New operator immediately imply new distribution rules for the sum and the
linear substitution:
τ (Σi Mi ) = Σi τ (Mi )
τ̄ (Σi Qi ) = Σi τ̄ (Qi )
∥j Σi Qi(j) = Σi ∥j Qi(j)
τ (M )⟨N /x⟩ = τ (M ⟨N /x⟩)
τ̄ (Q)⟨N /x⟩ = τ̄ (Q⟨N /x⟩)
(Q+R)⟨N /x⟩ = Q⟨N /x⟩+R⟨N /x⟩
(Q∣R)⟨N /x⟩ = Q⟨N /x⟩∣R⟨N /x⟩
Here is the corresponding operational semantics:
(γ)
τ [τ̄ (Q)]
(τ )
(τ̄1 )
τ (λx.M )
(τ̄ (Q)) [M ! ]
(τ̄2 )
(ǫ)
(τ̄ (Q)) [M1 , ..., Mn≥1 ; M ! ]
ǫ∣ǫ
→ Q
→ τ (M {0/x})
→ τ̄ (Q)
→ 0
→ ǫ
The intuition of τ̄ (Q) is an operator that take a test (a Boolean value), compute
it and returns an infinite λ-abstraction with no occurrence of the abstracted
variables. The test τ (M ) is taking a term and returns a successful test if the
term is converging in a context that consists of an infinite empty application.
4
2.3
Observational order and full abstraction
In order to ask for full abstraction, one has to specify a reduction strategy. A
natural choice would be the head reduction, but this would make (λx.x [0, 0]) a
normal form while no applicative instantiation of x allow the convergence of this
term. Therefore, the reduction strategy we are considering will not be headreduction, but the outer-head-reduction. This reduction will reduce subterms
in linear position after the subterms in head positions ([14]). The corresponding
normal forms are terms and tests of the form:
M + λx̄.y [N1,1 , ..., N1,k1 ; L!1 ] ⋯ [Nn,1 , ..., Nn,kn ; L!n ]
M + λx̄.τ̄ (Q)
Q + (∥τ (Ni ))
Where every N and Q must be in outer-head normal forms and can’t be a sum
(but the Li are of any kind).
Definition 1 M is observationally below N , if for all context CL.M, we have
CLN M which is outer-head-converging whenever CLM M is outer-head-converging.
They are observationally equivalent if moreover N is observationally below M
In the particular case of the τ∂λ-calculus , we can easily restrict contexts to
test-contexts, which is contexts whose output is a tests. This will be applied
systematically for simplification.
We will denote ≤τ ∂ and ≡τ ∂ the observational order and equivalence of the τ∂λcalculus and ≤∂ and ≡∂ those of the ∂λ-calculus .
Bucciarelli, Carraro, Ehrhard and Manzonetto were then able to prove a
strong theorem relating the model to the calculus:
Theorem 1 M∞ is fully abstract for the Λ-calculus with resources and tests:
for all closed terms M, N with resources ans tests,
JM K = JN K ⇔ M ≡τ ∂ N
3
The counter-example
In order to exhibit our counter-example we will use the following property:
Fact 1 Let B a calculus and A a super-calculus. Let M a model that is fully
abstract for A. M is fully abstract for B iff the operational equivalences of B
and A are equal on their domain intersection.
In our context it means that, in order to prove the non full abstraction for the
∂λ-calculus , it is sufficient to find two terms of the ∂λ-calculus that cannot be
separated by any context of the ∂λ-calculus but that are separated by a context
of the τ∂λ-calculus . This makes the research and the proof quite easier when
the terms of the ∂λ-calculus involved are complex but not the context of the
τ∂λ-calculus .
5
We are firstly exhibiting a term A of the ∂λ-calculus that is observationally above
the identity in the ∂λ-calculus ’, but not in the τ∂λ-calculus ’s observational order:
A = Θ [λuvw.w [I [v ! ]] , (λuvw.u [(v [w! ])! ])! ]
(1)
where Θ is the Turing fix point combinator:
(λgu.u[(g [(g [u! ])! ])! ]) [(λgu.u[(g [(g [u! ])! ])! ])! ]
This term seems quite complex, but, modulo η-equivalence, A reduces exactly to
any of the elements of the following sum, and thus can be think as an equivalent:
Σn≥1 Bn = Σn≥1 λūn w.w [I [u!1 ] [u!2 ] ⋯ [u!n ]]
(2)
This is due to the following property:
Lemma 1 If Ai = λx̄i+1 .A (x1 [x!2 ] ⋯ [x!i+1 ]) then A0 →η A and for all i,
Ai → Ai+1 + Bi+1
Proof. Simple reduction unfolding the Θ once.
◻
In absence of tests, this term has a comportment similar to ǫ0 in the sense that
it will converges in any applicative context provided that these applications do
not carry linear components. In particular it converges more often than the
identity:
Lemma 2 For all context CL.M of the ∂λ-calculus , if CLIM converges then CLAM
converges, i.e. I ≤∂ A
Proof. Let CL.M a context that converge on I
With the context lemma ([14]), and since neither I nor A has free variables, we
can assume that CL.M = L.M P1 ⋯ Pk , thus by lemma 1, we have A →∗ U + Bk
and
CLAM →∗ U ′ + λw.w [I P1 ⋯ Pk ] = U ′ + λw.w [CLM M]
converges.
◻
But in presence of real tests, its comportment appeared to be different that ǫ0
in the sense that it diverges under a τ̄ . In particular it is not observationally
above the identity in τ∂λ-calculus :
Lemma 3 In the τ∂λ-calculus , τ (A [ǫ!0 ]) diverges, while τ (I [ǫ!0 ]) converges,
i.e. I ≤/ τ ∂ A
Proof. For all i, τ (Ai [ǫ!0 ]) diverges since, by co-induction:
τ (Ai [ǫ0 ]) → τ ((Ai+1 + (λx̄i+1 y.y [I [x!1 ] ⋯ [x!i+1 ]])) [ǫ0 ])
=
→
τ (Ai+1 [ǫ0 ]) + τ ((λx̄i+1 y.y [I [x!1 ] ⋯ [x!i+1 ]]) [ǫ0 ])
τ (Ai+1 [ǫ0 ]) + τ (λx̄i y.y [ǫ0 [x!1 ] ⋯ [x!i+1 ]])
→∗
τ (Ai+1 [ǫ0 ]) + τ (0 [ǫ0 [0! ] ⋯ [0! ]])
The non outer-head convergence comes with the co-induction hypothesis for the
first term, and is trivial for the second.
◻
Hence, we have broken the conjecture concerning the equality between the observational and denotational orders. Let’s break the whole conjecture:
Theorem 2 M∞ is not fully abstract for the λ-calculus with resources
6
4
Further works
First a diligent reader will remark that we have a critical use of the demonic
sum which is very powerful in this calculus. And an even more diligent one will
remark that an arbitrary choice have been made concerning this sum: we could
differentiate terms and reduced of terms and remove sums from the original syntax (they just have to appear in reductions of terms). The choice we made here
corresponds to the one of [4] and carries an understandable counter-example.
But we claim that another equivalent counter-example arises for the case with
limited sum. This counter-example is, however, a little more complicated and
make it necessary to rework the material of [4] (even if everything works exactly
the same way).
Our counter-example can be translated to some related cases. In particular,
to prove non full abstraction of Scott’s D∞ for the λ-calculus with angelic and
demonic sums (conjectured in [7]). For this calculus the extension with tests
exists and is fully abstract for D∞ , this is a trivial modification of the tests
of [3] (using general demonic and angelic sums). In this framework the term
θ(λxy.x + y) plays exactly the role of A in our example with the same output.
In the end, from a unique object that is DLL, we exhibit two natural constructions, one in the semantical world, the other in the syntactical one, but
they appeared do not respect full abstraction. One would say that they are not
that natural and that more natural one may be found. But this would be to
easy, from the state of art we don’t known more natural construction. The misunderstanding comes with the concept of naturality, it seems that the syntactic
idea of “convergence” does not really correspond to the equivalent in semantical word. One being a lowest fix point and the second a largest one. This
difference appears when working with the demonic sum that allow to check the
convergence in unbounded applicative context.
Finally we presented tests as a general tool whose importance is above the
role we gave them here. This result is interesting and important as it presents
tests as useful tools to verify that full abstraction fails. But it remains a negative
result that does not justify alone any real interest for them. Further works will
then focus on presenting positive proofs of full abstractions that are using tests.
Following this way we already submitted a revisited proof of full abstraction of
the Scott’s D∞ for the usual λ-calculus [3].
References
[1] Gerard Boudol (1993): The lambda-calculus with multiplicities. INRIA
Research Report 2025.
[2] P. Boudol, P.-L. Curien & C. Lavatelli (1999): A semantics for lambda
calculi with resources. Mathematical Structures in Comput. Sci. (MSCS)
Vol. 9, pp. 437–482.
7
[3] Flavien Breuvart (2012): A new proof of the Hyland/Wadsworth full abstraction theorem. Submited.
[4] Antonio Bucciarelli, Alberto Carraro, Thomas Ehrhard & Giulio Manzonetto (2011): Full Abstraction for Resource Calculus with Tests. In
Marc Bezem, editor: Computer Science Logic (CSL’11) - 25th International
Workshop/20th Annual Conference of the EACSL, Leibniz International
Proceedings in Informatics (LIPIcs) 12, Schloss Dagstuhl–Leibniz-Zentrum
fuer Informatik, Dagstuhl, Germany, pp. 97–111.
[5] Antonio Bucciarelli, Alberto Carraro, Thomas Ehrhard & Giulio Manzonetto (2012): Full Abstraction for Resource Lambda Calculus with Tests,
throught Taylor expansion. Accepted.
[6] Antonio Bucciarelli, Thomas Ehrhard & Giulio Manzonetto (2007): Not
Enough Points Is Enough. In Jacques Duparc & Thomas A. Henzinger,
editors: CSL’07: Proceedings of 16th Computer Science Logic, Lecture
Notes in Computer Science 4646, Springer, pp. 268–282.
[7] Antonio Bucciarelli, Thomas Ehrhard & Giulio Manzonetto (2009): A
relational model of a parallel and non-deterministic lambda-calculus. In
Sergei N. Artëmov & Anil Nerode, editors: Logical Foundations of Computer Science, International Symposium, LFCS 2009, Lecture Notes in
Computer Science 5407, pp. 107–121.
[8] Daniel de Carvalho & Lorenzo Tortora de Falco (2010): The relational
model is injective for Multiplicative Exponential Linear Logic (without
weakenings). CoRR abs/1002.3131.
[9] T. Ehrhard & O. Laurent (2010): Interpreting a finitary pi-calculus in
differential interaction nets. Inf. Comput. 208(6), pp. 606–633.
[10] Thomas Ehrhard & Laurent Regnier (2004): The differential lambdacalculus. Theoretical Computer Science, Elsevier.
[11] A. J. Kfoury (2000): A linearization of the Lambda-calculus and
consequences.
J. Log. Comput. 10(3), pp. 411–436. Available at
http://dx.doi.org/10.1093/logcom/10.3.411.
[12] Giulio Manzonetto (2009): A general class of models of H⋆ . In: Mathematical Foundations of Computer Science (MFCS’09), Lecture Notes in
Computer Science 5734, Springer, pp. 574–586.
[13] M. Pagani & Tranquilli P. (2009): Parallel reduction in resource lambdacalculus. APLAS’09 5904 LNCS, pp. 226–242.
[14] Michele Pagani & Simona Ronchi Della Rocca (2010): Linearity, Nondeterminism and Solvability. Fundamenta Informaticae 103(1-4), pp. 173–
202. Available at http://dx.doi.org/10.3233/FI-2010-324.
8
A
A.1
The model M∞
Categorical model
The category Rel of sets and relations is known to be a model of linear logic
as it is a Seely category (we are giving the interpretation, but we will let the
comutative diagrams to the reader since their comutations are trivial or like):
It is monoidal with tensor functor given by A ⊗ B = A × B, f ⊗ g =
{((u, x), (v, y))∣(u, v) ∈ f, (x, y) ∈ g} and with the arbitrary unit 1 = {∗}. It
is symetric monoidal close with (A ⊸ B) = A × B if we take the evaluation
ev = {(((a, b), a), b)∣a ∈ A, b ∈ B} ∈ Rel((A ⊸ B) ⊗ A, B). So it is star autonomus with 1 as dualising object (for a trvial duality).
This give us the interpretation of multiplicatives: A⊗B ˘
= A`B = A ⊸ B = A×B
The category is cartesian, with catesian product
Ai = {(i, x)∣i ˘
∈ I, x ∈
si }, projections πi = {((i, a), a)∣a ∈ Ai } and product of morphisms
i fi =
{(b, (i, a))∣(b, a) ∈ fi }. The terminal object is ⊺ = ∅. ˘
This give us the interpretation of additives: ⊕i∈I Ai = i∈I Ai = {(i, a)∣i ∈ I, a ∈
Ai }
We can add a comonade (!, d, p) where the functor is define by !A = Mf (A),
!f = {([a1 , ..., ak ], [b1 , ..., bk )∣∀i ≤ k, (ai , bi ) ∈ f }, the deriliction by dA =
{([a], a)∣a ∈ A} and the digging by pA = {(m1 +⋯+mk , [m1 , ..., mk ])∣m1 , ..., mk ∈
MF (a)}.
This give us the interpretation of exponentials: !P =?P = Mf (P )
This is a Seely category and a model of linear logic since the isomorphismes
1 ≃ [] is trivial and !A⊗!B ≃!(A & B) is defined by ([a1 , ..., al ], [b1 , ..., br ]) ≃
[(1, a1 ), ..., (1, al ), (2, b1 ), ..., (2, br )].
But it can even be seen as a categorical model of differential linear logic. By
defining the co-dereliction natural transforamtion d¯A = {(a, [a])∣a ∈ A} ∈ A →
!A, we are fixing the contraction cA = {(l+r, (l, r))∣l, r ∈!A} the co-contraction
c̄A = {((l, r), l+r)∣l, r ∈!A}, the weakening wA = {([], ∗)} and the co-weakening
w̄A = {(∗, [])}. So that we can define the derivative ∂X = (id!X ⊗ dX ) ○ cX ∶!X →
!X ⊗X and the co-derivative ∂¯X = c̄X ○(id!X ⊗ d¯D ) ∶!X ⊗X →!X. This derivatives
are Taylor, i.e. if two morphisms f1 , f2 ∶!A → B are such that f1 ○ ∂¯A = f2 ○ ∂¯A
then f1 + (f2 ○ w̄X ○ wX ) = (f1 ○ w̄X ○ wX ) + f2 . Finally the exponential acept
anti-derivatives, since it is bi-comutative and JA = IdA + ∂¯A ∂A = IdA is an
isomorphism. For more detail about models of DLL see ??.
As for every categorical model of linear logic, the exponential is a comonade
and induced a coKleisly M Rel = Rel! whose objects are the set and whose
morphisms from P to Q are the relations between !P and Q. The identities are
the relations digP = {({x}, x)∣x ∈ P } and the composition f ○g = {(X, z)∣∃(Y, z) ∈
f, ∀y ∈ Y, (X, y) ∈ g}.
A.2
Algebraic model
In order to have an algebraic model of ∂λ-calculus we only need a reflexive
object, i.e. a triplet (M, app, abs) where M is an object of MRel, app ∶ (M →
9
(!M ⊸ M ) = (Mf (M ) × M )) and aps ∶ ((Mf (M ) × M ) → M ) such that
app ○ abs = Id. Such an object can a priory found by taking the lower fix
point of M ↦ M ⇒ M =?M ⊸ M = Mf (M ) × M . But this will just leads to
the trivial empty model. We will then resolve the more complicated fix point
M ↦ (?M )&N = N × Mf (M ) where the exponent represent an infinit tensor
product. The lower fix point will be called M∞ .
An other way to see the fixpoint is to say that M have to be equal to
the set of quazi everywhere empty lists of finite substets of itself. Its element
are the recursively defined as being either ∗, the list of empty elements, or
a∶∶α with a ∈ Mf (M∞ ) and α ∈ M∞ . The coresponding app and abs arise
imediatly from the functoriality: app = {(a∶∶α, (a, α))∣(a, α) ∈ M∞ } and abs =
{((a, α), a∶∶α)∣a, α ∈ M∞ }
In order to be understandable, we are presenting the interpretation of terms
via a type system with types living in M∞ . The usual presentation of the
interpretation can be recoverd from the type system:
JM Kx̄ = {(ā, α)∣x̄ ∶ ā ⊢ M ∶ α}
JQKx̄ = {ā∣x̄ ∶ ā ⊢ Q}
The type system is the following:
Γ, x ∶ v ⊢ M ∶ α
Γ⊢∆
Γ⊢M ∶α
Γ⊢N ∶α
x
∶
[α]
⊢
x
∶
α
Γ ⊢ M +N ∶ α
Γ ⊢ M +N ∶ α
x ∶ [], Γ ⊢ ∆
Γ ⊢ λx.M ∶ v∶∶α
⋀i≥n Γi ⊢ L ∶ βi
⋀j≤n Γj ⊢ Lj ∶ βj
Γ ⊢ M ∶ w∶∶α
Γ′ ⊢ B ∶ w
!
Γ + Γ′ ⊢ M B ∶ α
(Σn+m
r=1 Γr ) ⊢ [L1 , ..., Ln ; L ] ∶ [β1 , ..., βn+m ]
′
Γ⊢Q
Γ⊢Q
Γ ⊢R
Γ⊢M ∶∗
⊢ǫ
Γ ⊢ τ [M ]
Γ ⊢ τ̄ (Q) ∶ ∗
Γ + Γ′ ⊢ Q∣R
10
| 6cs.PL
|
arXiv:1603.02639v4 [math.MG] 8 Dec 2016
PLIABILITY, OR THE WHITNEY EXTENSION THEOREM FOR
CURVES IN CARNOT GROUPS
NICOLAS JUILLET AND MARIO SIGALOTTI
Abstract. The Whitney extension theorem is a classical result in analysis giving a necessary
and sufficient condition for a function defined on a closed set to be extendable to the whole
space with a given class of regularity. It has been adapted to several settings, among which
the one of Carnot groups. However, the target space has generally been assumed to be equal
to Rd for some d ≥ 1.
We focus here on the extendability problem for general ordered pairs (G1 , G2 ) (with G2
non-Abelian). We analyze in particular the case G1 = R and characterize the groups G2 for
which the Whitney extension property holds, in terms of a newly introduced notion that we
call pliability. Pliability happens to be related to rigidity as defined by Bryant an Hsu. We
exploit this relation in order to provide examples of non-pliable Carnot groups, that is, Carnot
groups so that the Whitney extension property does not hold. We use geometric control theory
results on the accessibility of control affine systems in order to test the pliability of a Carnot
group. In particular, we recover some recent results by Le Donne, Speight and Zimmermann
about Lusin approximation in Carnot groups of step 2 and Whitney extension in Heisenberg
groups. We extend such results to all pliable Carnot groups, and we show that the latter may
be of arbitrarily large step.
1. Introduction
Extending functions is a basic but fundamental tool in analysis. Fundamental is in particular
the extension theorem established by H. Whitney in 1934, which guarantees the existence of an
extension of a function defined on a closed set of a finite-dimensional vector space to a function
of class C k , provided that the minimal obstruction imposed by Taylor series is satisfied. The
Whitney extension theorem plays a significative part in the study of ideals of differentiable
functions (see [26]) and its variants are still an active research topic of classical analysis (see
for instance [11]).
Analysis on Carnot groups with a homogeneous distance like the Carnot–Carathéodory
distance, as presented in Folland and Stein’s monograph [13], is nowadays a classical topic too.
Carnot groups provide a generalization of finite-dimensional vector spaces that is both close to
the original model and radically different. This is why Carnot groups provide a wonderful field
of investigation in many branches of mathematics. Not only the setting is elegant and rich but
it is at the natural crossroad between different fields of mathematics, as for instance analysis
of PDEs or geometric control theory (see for instance [5] for a contemporary account). It is
2010 Mathematics Subject Classification. 22E25, 41A05, 53C17, 54C20, 58C25.
Key words and phrases. Whitney extension theorem, Carnot group, rigid curve, horizontal curve.
1
2
NICOLAS JUILLET AND MARIO SIGALOTTI
therefore natural to recast the Whitney extension theorem in the context of Carnot groups. As
far as we know, the first generalization of a Whitney extension theorem to Carnot groups can
be found in [14, 15], where De Giorgi’s result on sets of finite perimeter is adapted first to the
Heisenberg group and then to any Carnot group of step 2. This generalization is used in [19],
where the authors stress the difference between intrinsic regular hypersurfaces and classical C 1
hypersurfaces in the Heisenberg group. The recent paper [34] gives a final statement for the
Whitney extension theorem for scalar-valued functions on Carnot groups: The most natural
generalization that one can imagine holds in its full strength (for more details, see Section 2).
The study of the Whitney extension property for Carnot groups is however not closed. Following a suggestion by Serra Cassano in [29], one might consider maps between Carnot groups
instead of solely scalar-valued functions on Carnot groups. The new question presents richer
geometrical features and echoes classical topics of metric geometry. We think in particular of
the classification of Lipschitz embeddings for metric spaces and of the related question of the
extension of Lipschitz maps between metric spaces. We refer to [3, 36, 28, 4] for the corresponding results for the most usual Carnot groups: Abelian groups Rm or Heisenberg groups
Hn (of topological dimension 2n + 1). In view of Pansu–Rademacher theorem on Lipschitz
maps (see Theorem 2.1), the most directly related Whitney extension problem is the one for
1
CH
-maps, the so-called horizontal maps of class C 1 defined on Carnot groups. This is the
framework of our paper.
Simple pieces of argument show that the Whitney extension theorem does not generalize to
every ordered pair of Carnot groups. Basic facts in contact geometry suggest that the extension does not hold for (Rn+1 , Hn ), i.e., for maps from Rn+1 to Hn . It is actually known that
local algebraic constraints of first order make n the maximal dimension for a Legendrian submanifold in a contact manifold of dimension 2n + 1. In fact if the derivative of a differentiable
map has range in the kernel of the contact form, the range of the map has dimension at most
1
n. A map from Rn+1 to Hn is CH
if it is C 1 with horizontal derivatives, i.e., if its derivatives
1
take value in the kernel of the canonical contact form. In particular, a CH
-map defined on
n+1
R
is nowhere of maximal rank. Moreover, it is a consequence of the Pansu–Rademacher
theorem that a Lipschitz map from Rn+1 to Hn is derivable at almost every point with only
horizontal derivatives. Again n is their maximal rank. In order to contradict the extendability
of Lipschitz maps, it is enough to define a function on a subset whose topological constraints
force any possible extension to have maximal rank at some point. Let us sketch a concrete example that provides a constraint for the Lipschitz extension problem: It is known that Rn can
be isometrically embedded in Hn with the exponential map (for the Euclidean and Carnot–
Carathéodory distances). One can also consider two ‘parallel’ copies of Rn in Rn+1 mapped to
parallel images in Hn : the second is obtained from the first by a vertical translation. Aiming
for a contradiction, suppose that there exists an extending Lipschitz map F . It provides on
Rn × [0, 1] a Lipschitz homotopy between F (Rn × {0}) and F (Rn × {1}). Using the definition
of a Lipschitz map and some topology, the topological dimension of the range is at least n + 1
and its (n + 1)-Hausdorff measure is positive. This is not possible because of the dimensional
constraints explained above. See [3] for a more rigorous proof using a different set as a domain
for the function to be extended. The proof in [3] is formulated in terms of index theory and
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
3
purely (n + 1)-unrectifiability of Hn . The latter property means that the (n + 1)-Hausdorff
measure of the range of a Lipschitz map is zero. Probably this construction and some other
ideas from the works on the Lipschitz extension problem [3, 36, 28, 4] can be adapted to
the Whitney extension problem. It is not really our concern in the present article to list the
similarities between the two problems, but rather to exhibit a class of ordered pairs of Carnot
groups for which the validity of the Whitney extension problem depends on the geometry of
the groups. Note that a different type of counterexample to the Whitney extension theorem,
involving groups which are neither Euclidean spaces nor Heisenberg groups, has been obtained
by A. Khozhevnikov in [20]. It is described in Example 2.6.
Our work is motivated by F. Serra Cassano’s suggestion in his Paris’ lecture notes at the
Institut Henri Poincaré in 2014 [29]. He proposes — (i) to choose general Carnot groups G
1
as target space, (ii) to look at CH
curves only, i.e., C 1 maps from R to G with horizontal
derivatives. As we will see, the problem is very different from the Lipschitz extension problem
for (R, G) and from the Whitney extension problem for (G, R). Indeed, both such problems can
be solved for every G, while the answer to the extendibility question asked by Serra Cassano
depends on the choice of G. More precisely, we provide a geometric characterization of those
1
G for which the CH
-Whitney extension problem for (R, G) can always be solved. We say in
1
this case that the pair (R, G) has the CH
extension property. Examples of target non-Abelian
1
Carnot groups for which CH extendibility is possible have been identified by S. Zimmerman in
1
[39], where it is proved that for every n ∈ N the pair (R, Hn ) has the CH
extension property.
1
The main component of the characterization of Carnot groups G for which (R, G) has the CH
extension property is the notion of pliable horizontal vector. A horizontal vector X (identified
with a left-invariant vector field) is pliable if for every p ∈ G and every neighborhood Ω of
1
X in the horizontal layer of G, the support of all CH
curves with derivative in Ω starting
from p in the direction X form a neighborhood of the integral curve of X starting from p (for
details, see Definition 3.4 and Proposition 3.7). This notion is close but not equivalent to the
property of the integral curves of X not to be rigid in the sense introduced by Bryant and
Hsu in [9], as we illustrate by an example (Example 3.5). We say that a Carnot group G is
pliable if all its horizontal vectors are pliable. Since any rigid integral curve of a horizontal
vector X is not pliable, it is not hard to show that there exist non-pliable Carnot groups of
any dimension larger than 3 and of any step larger than 2 (see Example 3.3). On the other
hand, we give some criteria ensuring the pliability of a Carnot group, notably the fact that it
has step 2 (Theorem 6.5). We also prove the existence of pliable groups of any positive step
(Proposition 6.6).
Our main theorem is the following.
1
Theorem 1.1. The pair (R, G) has the CH
extension property if and only if G is pliable.
The paper is organized as follows: in Section 2 we recall some basic facts about Carnot
1
groups and we present the CH
-Whitney condition in the light of the Pansu–Rademacher Theorem. In Section 3 we introduce the notion of pliability, we discuss its relation with rigidity,
1
and we show that pliability of G is necessary for the CH
extension property to hold for (R, G)
(Theorem 3.8). The proof of this result goes by assuming that a non-pliable horizontal vector
4
NICOLAS JUILLET AND MARIO SIGALOTTI
1
exists and using it to provide an explicit construction of a CH
map defined on a closed subset
of R which cannot be extended on R. Section 4 is devoted to proving that pliability is also a
sufficient condition (Theorem 4.4). In Section 5 we use our result to extend some Lusin-like
theorem proved recently by G. Speight for Heisenberg groups [30] (see also [39] for an alternative proof). More precisely, it is proved in [22] that an absolutely continuous curve in a group
1
of step 2 coincides on a set of arbitrarily small complement with a CH
curve. We show that
this is the case for pliable Carnot groups (Proposition 5.2). Finally, in Section 6 we give some
criteria for testing the pliability of a Carnot group. We first show that the zero horizontal
vector is always pliable (Proposition 6.1). Then, by applying some results of control theory
providing criteria under which the endpoint mapping is open, we show that G is pliable if its
step is equal to 2.
2. Whitney condition in Carnot groups
A nilpotent Lie group G is said to be a Carnot group if it is stratified, in the sense that its
Lie algebra G admits a direct sum decomposition
G1 ⊕ · · · ⊕ Gs ,
called stratification, such that [Gi , Gj ] = Gi+j for every i, j ∈ N∗ with i + j ≤ s and [Gi , Gj ] =
{0} if i + j > s. We recall that [Gi , Gj ] denotes the linear space spanned by {[X, Y ] ∈ G |
X ∈ Gi , Y ∈ Gj }. The subspace G1 is called the horizontal layer and it is also denoted
by GH . We say that s is the step of G if Gs 6= {0}. The group product of two elements
x1 , x2 ∈ G is denoted by x1 · x2 . Given X ∈ G we write adX : G → G for the operator defined
by adX Y = [X, Y ].
The Lie algebra G can be identified with the family of left-invariant vector fields on G. The
exponential is the application that maps a vector X of G into the end-point at time 1 of the
integral curve of the vector field X starting from the identity of G, denoted by 0G . That is, if
γ(0) = 0G
γ̇(t) = X ◦ γ(t)
then γ(1) = exp(X). We also denote by etX : G → G the flow of the left-invariant vector field
X at time t. Notice that etX (p) = p · exp(tX). Integral curves of left-invariant vector fields
are said to be straight curves.
P
The Lie group G is diffeomorphic to RN with N = sk=1 dim(Gk ). A usual way to identify
G and RN through a global system of coordinates is to pull-back by exp the group structure
from G to G, where it can be expressed by the Baker–Campbell–Hausdorff formula. In this
way exp becomes a mapping of G = G onto itself that is simply the identity.
For any λ ∈ R we introduce the dilation ∆λ : G → G uniquely characterized by
∆λ ([X, Y ]) = [∆λ (X), ∆λ (Y )] for any X, Y ∈ G,
∆λ (X) = λX
for any X ∈ G1 .
Using the decomposition X = X1 + · · · + Xs with Xk ∈ Gk , it holds ∆λ (X) =
For any λ ∈ R we also define on G the dilation δλ = exp ◦∆λ ◦ exp−1 .
Ps
k=1
λk Xk .
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
5
Given an absolutely continuous curve γ : [a, b] → G, the velocity γ̇(t), which exists from
almost every t ∈ [a, b], is identified with the element of G whose associated left-invariant
vector field, evaluated at γ(t), is equal to γ̇(t). An absolutely continuous curve γ is said to
1
be horizontal if γ̇(t) ∈ GH for almost every t. For any interval I of R, we denote by CH
(I, G)
1
the space of all curves φ ∈ C (I, G) such that φ̇(t) ∈ GH for every t ∈ I.
Assume that the horizontal layer GH of the algebra is endowed with a quadratic norm
k · kGH . The Carnot–Carathéodory distance dG (p, q) between two points p, q ∈ G is then
defined as the minimal length of a horizontal curve connecting p and q, i.e.,
nZ b
dG (p, q) = inf
kγ̇(t)kGH dt |γ : [a, b] → G horizontal,
a
o
γ(a) = p, γ(b) = q .
Note that dG is left-invariant. It is known that dG provides the same topology as the usual
one on G. Moreover it is homogeneous, i.e., dG (δλ p, δλ q) = |λ|dG (p, q) for any λ ∈ R.
Observe that the Carnot–Carathéodory distance depends on the norm k · kGH considered
on GH . However all Carnot–Carathéodory distances are in fact metrically equivalent. They
are even equivalent with any left-invariant homogeneous distance [13] in a very similar way as
all norms on a finite-dimensional vector space are equivalent.
Notice that dG (p, ·) can be seen as the value function of the optimal control problem
m
X
γ̇ =
ui Xi (γ), (u1 , . . . , um ) ∈ Rm ,
i=1
γ(a) = p,
Z bp
u1 (t)2 + · · · + um (t)2 dt → min,
a
where X1 , . . . , Xm is a k · kGH -orthonormal basis of GH .
1
Finally, the space CH
([a, b], G) of horizontal curves of class C 1 can be endowed with a natural
1
C metric associated with (dG , k · kGH ) as follows: the distance between two curves γ1 and γ2
1
in CH
([a, b], G) is
!
max
sup dG (γ1 (t), γ2 (t)), sup kγ̇2 (t) − γ̇1 (t)kGH
t∈[a,b]
.
t∈[a,b]
In the following, we will write kγ̇2 − γ̇1 k∞,GH to denote the quantity supt∈[a,b] kγ̇2 (t) −
γ̇1 (t)kGH .
2.1. Whitney condition. A homogeneous homomorphism between two Carnot groups G1
and G2 is a group morphism L : G1 → G2 with L ◦ δλG1 = δλG2 ◦ L for any λ ∈ R. Moreover
L is a homogeneous homomorphism if and only if exp−1
G2 ◦L ◦ expG1 is a homogeneous Lie
algebra morphism. It is in particular a linear map on G1 identified with GG1 . The first layer
6
NICOLAS JUILLET AND MARIO SIGALOTTI
is mapped on the first layer so that a homogeneous homomorphism from R to G2 has the form
G2
L(t) = expG2 (tX), where X ∈ GH
.
Proposition 2.1 (Pansu–Rademacher Theorem). Let f be a locally Lipschitz map from an
open subset U of G1 into G2 . Then for almost every p ∈ U, there exists a homogeneous
homomorphism Lp such that
G2
G1 ∋ q 7→ δ1/r
(1)
f (p)−1 · f (p · δrG1 (q))
tends to Lp uniformly on every compact set K ⊂ G1 as r goes to zero.
Note that in Proposition 2.1 the map Lp is uniquely determined. It is called the Pansu
derivative of f at p and denoted by Dfp .
1
We denote by CH
(G1 , G2 ) the space of functions f such that (1) holds at every point p ∈ G1
and p 7→ Dfp is continuous for the usual topology. For G1 = R this coincides with the
1
definition of CH
(I, G2 ) given earlier. We have the following.
1
Proposition 2.2 (Taylor expansion). Let f ∈ CH
(G1 , G2 ) where G1 and G2 are Carnot
groups. Let K ⊂ G1 be compact. Then there exists a function ω from R+ to R+ with ω(t) =
o(t) at 0+ such that for any p, q ∈ K,
dG2 f (q), f (p) · Dfp (p−1 · q) ≤ ω(dG1 (p, q)),
where Dfp is the Pansu derivative.
Proof. This is a direct consequence the “mean value inequality” by Magnani contained in [25,
Theorem 1.2].
The above proposition hints at the suitable formulation of the C 1 -Whitney condition for
Carnot groups. This generalization already appeared in the literature in the paper [34] by
Vodop’yanov and Pupyshev.
1
Definition 2.3 (CH
-Whitney condition).
• Let K be a compact subset of G1 and consider f : K → G2 and a map L which associates with any p ∈ K a homogeneous group
1
homomorphism L(p). We say that the CH
-Whitney condition holds for (f, L) on K if
L is continuous and there exists a function ω from R+ to R+ with ω(t) = o(t) at 0+
such that for any p, q ∈ K,
(2)
dG2 f (q), f (p) · L(p)(p−1 · q) ≤ ω(dG1 (p, q)).
• Let K0 be a closed set of G1 , and f : K0 → G2 , and L such that K0 ∋ p 7→ L(p) is
1
continuous. We say that the CH
-Whitney condition holds for (f, L) on K0 if for any
compact set K ⊂ K0 it holds for the restriction of (f, L) to K.
1
Of course, according to Proposition 2.2, if f ∈ CH
(G1 , G2 ), then the restriction of (f, Df )
1
to any closed K0 satisfies the CH -Whitney condition on K0 .
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
7
In this paper we focus on the case G1 = R. The condition on a compact set K reads
rK,η → 0 as η → 0, where
(3)
rK,η =
dG2 (f (t), f (τ ) · exp[(t − τ )X(τ )])
,
|τ − t|
τ,t∈K, 0<|τ −t|<η
sup
2
because for every τ ∈ R one has [L(τ )](h) = exp(hX(τ )) for some X(τ ) ∈ GG
H and every
1
h ∈ R. With a slight abuse of terminology, we say that the CH -Whitney condition holds for
(f, X) on K.
In the classical setting the Whitney condition is equivalent to the existence of a C 1 map
f¯ : Rn1 → Rn2 such that f¯ and D f¯ have respectively restrictions f and L on K. This property
is usually known as the C 1 -Whitney extension theorem or simply Whitney extension theorem
(as for instance in [10]), even though the original theorem by Whitney is more general and in
particular includes higher order extensions [37, 38] and considers the extension f → f¯ as a
linear operator. This theorem is of broad use in analysis and is still the subject of dedicated
research. See for instance [8, 11, 12] and the references therein.
1
Definition 2.4. We say that the pair (G1 , G2 ) has the CH
extension property if for every
1
1
(f, L) satisfying the CH -Whitney condition on some closed set K0 there exists f¯ ∈ CH
(G1 , G2 )
¯
which extends f on G1 and such that D fp = L(p) for every p ∈ K0 .
1
We now state the CH
-extension theorem that Franchi, Serapioni, and Serra Cassano proved
in [15, Theorem 2.14]. It has been generalised by Vodop’yanov and Pupyshev in [34, 35] in a
form closer to the original Whitney’s result including higher order extensions and the linearity
of the operator f 7→ f¯.
Theorem 2.5 (Franchi, Serapioni, Serra Cassano). For any Carnot group G1 and any d ∈ N,
1
the pair (G1 , Rd ) has the CH
extension property.
The proof proposed by Franchi, Serapioni, and Serra Cassano is established for Carnot
groups of step two only, but is identical for general Carnot groups. It is inspired by the proof
in [10], that corresponds to the special case G1 = Rn1 for n1 ≥ 1.
Let us mention an example from the literature of non-extension with G1 6= R. This remarkable fact was explained to us by A. Kozhevnikov.
Example 2.6. If G1 and G2 are the ultrarigid Carnot groups of dimension 17 and 16 respectively, presented in [21] and analysed in Lemma A.2.1 of [20], one can construct an example
1
(f, L) satisfying the CH
-Whitney condition on some compact K without any possible exten1
¯
¯
sion (f , D f ) on G1 . For this, one exploits the rarity of CH
maps of maximal rank in ultrarigid
Carnot groups. The definition of ultrarigid from [21, Definition 3.1] is that all quasimorphisms
are Carnot similitudes, i.e., a composition of dilations and left-translations. We do not use
here directly the definition of ultrarigid groups but just the result stated in Lemma A.2.1 of
[20] for G1 and G2 . Concretely, let us set
K = {(p1 , . . . , p17 ) ∈ G1 | p2 = · · · = p16 = 0, p1 ∈ [−1, 1], p17 = p1 }.
8
NICOLAS JUILLET AND MARIO SIGALOTTI
Let the map f be constantly equal to 0 on K and L be the constant projection Λ : G1 ∋
(q1 , . . . , q17 ) 7→ (q1 , . . . , q16 ) ∈ G2 . Lemma A.2.1 in [20] applied at the point 0G1 implies that
the only possible extension of f is the projection L(0) = Λ. But this map vanishes only on
{p ∈ G1 | p1 = · · · = p16 = 0}, which does not contain K. It remains us to prove that
Whitney’s condition holds. In fact for two points p = (x, 0R15 , x) and q = (y, 0R15 , y) in K, we
look at the distance from f (x) = 0G2 to
f (p) · L(0)(p−1 · q) = L(0)((x, 0R15 , x)−1 · (y, 0R15 , y)) = (y − x, 0R15 )
on the one side and from p to q on the other side. The first one is |y −x|, up to a multiplicative
constant, and when |y − x| goes to zero the second one is c|y − x|1/3 for some constant c > 0.
1
This proves the CH
-Whitney condition for (f, L) on K.
In the present paper we provide examples of ordered pairs (G1 , G2 ) with G1 = R such that
1
the CH
extension property does or does not hold, depending on the geometry of G2 . We do
not address the problem of Whitney extensions for orders larger than 1. A preliminary step
for considering higher-order extensions would be to provide a suitable Taylor expansion for
m
CH
-functions from R to G2 , in the spirit of what recalled for m = 1 in Proposition 2.2.
1
extension property holds for some
Let us conclude the section by assuming that the CH
ordered pair (G1 , G2 ) of Carnot groups and by showing how to deduce it for other pairs. We
describe here below three such possible implications.
(1) Let S1 be a homogeneous subgroup of G1 that admits a complementary group K in the
sense of [29, Section 4.1.2]: both S1 and K are homogeneous Lie groups and the intersection is
reduced to {0}. Assume moreover that S1 is a Carnot group and K is normal, so that one can
define canonically a projection π : G1 → S1 that is a homogeneous homomorphism. Moreover
π is Lipschitz continuous (see [29, Proposition 4.13]). For the rest of the section, we say that
1
S1 is an appropriate Carnot subgroup of G1 . It can be easily proved that (S1 , G2 ) has the CH
1
extension property. In particular, according to [29, Example 4.6], for every k ≤ dim(GG
H )
k
k
1
the vector space R is an appropriate Carnot subgroup of G1 . Therefore (R , G2 ) has the CH
extension property.
(2) Assume now that S2 is an appropriate Carnot subgroup of G2 . Using the Lipschitz
1
continuity of the projection π : G2 → S2 , one easily deduces from the definition of CH
-Whitney
1
condition that (G1 , S2 ) has the CH extension property.
1
(3) Finally assume that (G1 , G′2 ) has the CH
extension property, where G′2 is a Carnot group.
Then one checks without difficulty that the same is true for (G1 , G2 × G′2 ).
As a consequence of Theorem 1.1, we can use these three implications to infer pliability
1
statements. Namely, a Carnot group G is pliable — i) if (G0 , G) has the CH
extension property
for some Carnot group G0 of positive dimension, ii) if G is the appropriate Carnot subgroup
of a pliable Carnot group, iii) if G is the product of two pliable Carnot groups.
1
3. Rigidity, Necessary condition for the CH
extension property
Let us first adapt to the case of horizontal curves on Carnot groups the notion of rigid curve
introduced by Bryant and Hsu in [9]. We will show in the following that the existence of rigid
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
9
1
curves in a Carnot group G can be used to identify obstructions to the validity of the CH
extension property for (R, G).
1
Definition 3.1 (Bryant, Hsu). Let γ ∈ CH
([a, b], G). We say that γ is rigid if there exists a
1
neighborhood V of γ in the space CH ([a, b], G) such that if β ∈ V and γ(a) = β(a), γ(b) = β(b)
then β is a reparametrization of γ.
A vector X ∈ GH is said to be rigid if the curve [0, 1] ∋ t 7→ exp(tX) is rigid.
A celebrated existence result of rigid curves for general sub-Riemannian manifolds has been
obtained by Bryant and Hsu in [9] and further improved in [23] and [2]. Examples of Carnot
groups with rigid curves have been illustrated in [16] and extended in [18], where it is shown
that, for any N ≥ 6 there exists a Carnot group of topological dimension N having rigid
curves. Nevertheless, such curves need not be straight. Actually, the construction proposed
in [18] produces curves which are necessarily not straight.
Following [2] (see also [27]), and focusing on rigid straight curves in Carnot groups, we
can formulate Theorem 3.2 below. In order to state it, let π : T ∗ G → G be the canonical
projection and recall that a curve p : I → T ∗ G is said to be an abnormal path if π ◦ p : I → G
is a horizontal curve, p(t) 6= 0 and p(t)X = 0 for every t ∈ I and X ∈ GH , and, moreover, for
every Y ∈ G and almost every t ∈ I,
d
p(t)Y = p(t)[Z(t), Y ],
dt
(4)
where Z(t) =
d
π
dt
◦ p(t) ∈ GH .
Theorem 3.2. Let X ∈ GH and assume that p : [0, 1] → T ∗ G is an abnormal path with
π ◦ p(t) = exp(tX).
If t 7→ exp(tX) is rigid, then p(t)[V, W ] = 0 for every V, W ∈ GH and every t ∈ [0, 1].
Moreover, denoting by Qp(t) the quadratic form Qp(t) (V ) = p(t)[V, [X, V ]] defined on {V ∈
GH | V ⊥ X}, we have that Qp(t) ≥ 0 for every t ∈ [0, 1].
Conversely, if p(t)[V, W ] = 0 for every V, W ∈ GH and every t ∈ [0, 1] and Qp(t) > 0 for
every t ∈ [0, 1] then t 7→ exp(tX) is rigid.
Example 3.3. An example of Carnot structure having rigid straight curves is the standard
Engel structure. In this case s = 3, dim G1 = 2, dim G2 = dim G3 = 1 and one can can pick
two generators X, Y of the horizontal distribution whose only nontrivial bracket relations are
[X, Y ] = W1 and [Y, W1 ] = W2 , where W1 and W2 span G2 and G3 respectively.
Let us illustrate how the existence of rigid straight curves can be deduced from Theorem 3.2
(one could also prove rigidity by direct computations of the same type as those of Example 3.5
below).
One immediately checks that p with p(t)X = p(t)Y = p(t)W1 = 0 and p(t)W2 = 1 is an
abnormal path such that π ◦ p(t) = exp(tX). The rigidity of t 7→ exp(tX) then follows from
Theorem 3.2, thanks to the relation Qp (Y ) = 1.
An extension of the previous construction can be used to exhibit, for every N ≥ 4, a Carnot
group of topological dimension N and step N − 1 having straight rigid curves. It suffices
10
NICOLAS JUILLET AND MARIO SIGALOTTI
to consider the N-dimensional Carnot group with Goursat distribution, that is, the group
such that dim G1 = 2, dim Gi = 1 for i = 2, . . . , N − 1, and there exist two generators
X, Y of G1 whose only nontrivial bracket relations are [X, Y ] = W1 and [Y, Wi ] = Wi+1 for
i = 1, . . . , N − 3, where Gi+1 = Span(Wi ) for i = 1, . . . , N − 2.
The following definition introduces the notion of pliable horizontal curve, in contrast to a
rigid one.
1
Definition 3.4. We say that a curve γ ∈ CH
([a, b], G) is pliable if for every neighborhood V
1
of γ in CH ([a, b], G) the set
{(β(b), β̇(b)) | β ∈ V, (β, β̇)(a) = (γ, γ̇)(a)}
is a neighborhood of (γ(b), γ̇(b)) in G × GH .
A vector X ∈ GH is said to be pliable if the curve [0, 1] ∋ t 7→ exp(tX) is pliable.
We say that G is pliable if every vector X ∈ GH is pliable.
By metric equivalence of all Carnot–Carathéodory distances, it follows that the pliability
of a horizontal vector does not depend on the norm k · kGH considered on GH .
1
Notice that, by definition of pliability, in every CH
neighborhood of a pliable curve γ :
[a, b] → G there exists a curve β with β(a) = γ(a), (β, β̇)(b) = (γ(b), W ), and W 6= γ̇(b). This
shows that pliable curves are not rigid. It should be noticed, however, that the converse is
not true in general, as will be discussed in Example 3.5. In this example we show that there
exist horizontal straight curves that are neither rigid nor pliable.
Example 3.5. We consider the 6-dimensional Carnot algebra G of step 3 that is spaned by
X, Y, Z, [X, Z], [Y, Z], [Y, [Y, Z]] where X, Y, Z is a basis of G1 and except from permutations
all brackets different from the ones above are zero.
According to [7, Chapter 4] there is a group structure on R6 with coordinates (x, y, z, z1 , z2 , z3 )
isomorphic to the corresponding Carnot group G such that the vectors of G1 are the leftinvariant vector fields
X = ∂x ,
Y = ∂y ,
Z = ∂z + x∂z1 + y∂z2 + y 2∂z3 .
Consider the straight curve [0, 1] ∋ t 7→ γ(t) = exp(tZ) ∈ G. First notice that γ is not
pliable, since for all horizontal curves in a small enough C 1 neighbourhood of γ the component
of the derivative along Z is positive, which implies that the coordinate z3 is nondecreasing.
No endpoint of a horizontal curve starting from 0G and belonging to a small enough C 1 neighbourhood of γ can have negative z3 component.
Let us now show that γ is not rigid either. Consider the solution β of
β̇(t) = Z(β(t)) + u(t)X(β(t)),
β(0) = 0G .
Notice that the y component of β is identically equal to zero. As a consequence, the same is
true
R t for the components
R t R τ z2 and z3 , while the x, z and z1 components of β(t) are, respectively,
u(τ )dτ , t, and 0 0 u(θ)dθdτ . In order to disprove the rigidity, it is then sufficient to take
0
R1
R1Rτ
a nontrivial continuous u : [0, 1] → R such that 0 u(τ )dτ = 0 = 0 0 u(θ)dθdτ .
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
11
Let us list some useful manipulations which transform horizontal curves into horizontal
curves. Let γ be a horizontal curve defined on [0, 1] and such that γ(0) = 0G .
(T1) For every λ > 0, the curve t ∈ [0, λ] 7→ δλ ◦ γ(λ−1 t) is horizontal and its velocity at
time t is γ̇(λ−1 t).
(T2) For every λ < 0, the curve t ∈ [0, |λ|] 7→ δλ ◦ γ(|λ|−1t) is horizontal and its velocity at
time t is −γ̇(|λ|−1 t).
(T3) The curve γ̄ defined by γ̄(t) = γ(1)−1 · γ(1 − t) is horizontal. It starts in 0G and finishes
in γ −1 (1). Its velocity at time t is −γ̇(1 − t).
(T4) If one composes the (commuting) transformations (T2) with λ = −1 and (T3), one
obtains a curve with derivative γ̇(1 − t) at time t.
(T5) It is possible to define the concatenation of two curves γ1 : [0, t1 ] → G and γ2 : [0, t2 ] →
G both starting from 0G as follows: the concatenated curve γ̃ : [0, t1 + t2 ] → G satisfies
γ̃(0) = 0G , has the same velocity as γ1 on [0, t1 ] and the velocity of γ2 (· − t1 ) on
[t1 , t1 + t2 ]. We have γ̃(t1 + t2 ) = γ1 (t1 ) · γ(t2 ) as a consequence of the invariance of
the the Lie algebra for the left-translation.
A consequence of (T1) and (T2) is that X ∈ GH \ {0} is rigid if and only if λX is rigid
for every λ ∈ R \ {0}. Similarly, X ∈ GH is pliable if and only if λX is pliable for every
λ ∈ R \ {0}.
Proposition 3.7 below gives a characterization of pliable horizontal vectors in terms of a
condition which is apriori easier to check than the one appearing in Definition 3.4. Before
proving the proposition, let us give a technical lemma. From now on, we write BG (x, r) to
denote the ball of center x and radius r in G for the distance dG and, similarly, BGH (x, r) to
denote the ball of center x and radius r in GH for the norm k · kGH .
Lemma 3.6. For any x ∈ G and 0 < r < R, there exists ε > 0 such that if y, z ∈ G and
ρ ≥ 0 satisfy dG (y, 0G ), dG (z, 0G ), ρ ≤ ε, then
BG (x, r) ⊂ y · δ1−ρ (BG (x, R)) · z.
Proof. Assume, by contradiction, that for every n ∈ N there exist xn ∈ BG (x, r), yn , zn ∈
BG (0G , 1/n) and ρn ∈ [0, 1/n] such that
xn 6∈ yn · δ1−ρn (BG (x, R)) · zn .
Equivalently,
δ(1−ρn )−1 (yn−1 · xn · zn−1 ) 6∈ BG (x, R).
However, lim supn→∞ dG (x, δ(1−ρn )−1 (yn−1 · xn · zn−1 )) ≤ r, leading to a contradiction.
Proposition 3.7. A vector V ∈ GH is pliable if and only if for every neighborhood V of the
1
curve [0, 1] ∋ t 7→ exp(tV ) in the space CH
([0, 1], G), the set
{β(1) | β ∈ V, (β, β̇)(0) = (0G , V )}
is a neighborhood of exp(V ).
12
NICOLAS JUILLET AND MARIO SIGALOTTI
1
Proof. Let F : CH
([0, 1], G) ∋ β 7→ (β, β̇)(1) ∈ G × GH and denote by π : G × GH → G the
canonical projection.
One direction of the equivalence being trivial, let us take ε > 0 and assume that π ◦ F (Uε )
is a neighbourhood of exp(V ) in G, where
1
Uε = {β ∈ CH
([0, 1], G) | (β, β̇)(0) = (0G , V ), kβ̇ − V k∞,GH < ε}.
We should prove that F (Uε ) is a neighborhood of (exp(V ), V ) in G × GH .
Step 1: As an intermediate step, we first prove that there exists η > 0 such that BG (exp(V ), η)×
{V } is contained in F (Uε ).
Let ρ be a real parameter in (0, 1). Using the transformations among horizontal curves
1
described earlier in this section, let us define a map Tρ : Uε → CH
([0, 1], G) associating with
a curve γ ∈ Uε the concatenation (transformation (T5)) of γ1 : t 7→ δρ ◦ γ(ρ−1 t) on [0, ρ]
obtained by transformation (T1) and a curve γ2 defined as follows. Consider γ2,1 : [0, 1 − ρ] ∋
t 7→ δ1−ρ ◦ γ((1 − ρ)−1 t) (again (T1)). The curve γ2 is defined from γ2,1 by
γ2 (t) = γ1 (ρ) · γ2,1 (1 − ρ)−1 · δ−1 ◦ γ2,1 ((1 − ρ) − t)
(see transformation (T4)). The derivative of Tρ (γ) at time t ∈ [0, ρ) is γ̇(ρ−1 t). Its derivative
at time ρ + t is γ̇(1 − (1 − ρ)−1 t) for t ∈ (0, 1 − ρ]. Hence Tρ (γ) is continuous and has derivative
1
γ̇(1) at limit times ρ− and ρ+ , i.e., is a well-defined map from Uε into CH
([0, 1], G). Moreover,
Tρ (γ) has the same derivative V = γ̇(0) at times 0 and 1 and its derivative at any time in
[0, 1] is in the set of the derivatives of γ. In particular, Tρ (Uε ) ⊂ Uε .
Notice now that, by construction, the endpoint Tρ (γ)(1) of the curve Tρ (γ) is a function of
γ(1) and ρ only. It is actually equal to
Fρ (x) = δρ (x) · δρ−1 (x)−1 ,
where x = γ(1) (see (T1) and (T4)) . Let x0 = exp(V ) and γ0 : t 7→ exp(tV ). We have
Fρ (x0 ) = x0 because Tρ (γ0 ) = γ0 , both curves having derivative constantly equal to V . We
prove now that for ρ close enough to 1, the differential of Fρ at x0 is invertible. Let us use
the coordinate identification of G with RN . For every y ∈ G, the limits of δρ (y) and δ1−ρ (y)
as ρ tends to 1 are y and 0G respectively, while Dδρ (y) and Dδρ−1 (y) converge to Id and
0 respectively. One can check (see, e.g., [7, Proposition 2.2.22]) that the inverse function
has derivative −Id at 0G . Finally the left and right translations are global diffeomorphisms.
Collecting these informations and applying the chain rule, we get that DFρ (x0 ) tends to an
invertible operator as ρ goes to 1. Hence for ρ great enough, Fρ (x0 ) is a local diffeomorphism.
We know by assumption on V that, for any ε > 0, the endpoints of the curves of Uε form a
neighborhood of x0 . We have shown that this is also the case if we replace Uε by Tρ (Uε ), for ρ
close to 1. The curves of Tρ (Uε ) are in Uε and have, moreover, derivative V at time 1. He have
thus proved that for every ε > 0 there exists η > 0 such that BG (x0 , η) × {V } is contained in
F (Uε ).
Step 2: Let us now prove that F (Uε ) is a neighborhood of (x0 , V ) in G × GH .
Let β be a curve in Uε with β̇(1) = V and consider for every W ∈ BGH (V, ε) and every ρ ∈
(0, 1) the curve αρ,W defined as follows: αρ,W = δ1−ρ ◦β((1−ρ)−1 t) on [0, 1−ρ] (transformation
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
13
(T1)) and α̇ρ,W is the linear interpolation between V and W on [1 − ρ, 1]. Notice that αρ,W is
in Uε .
Let u ∈ G be the endpoint at time ρ of the curve in G starting at 0G whose derivative is the
linear interpolation between V and W on [0, ρ]. Then (αρ,W , α̇ρ,W )(1) = (δ1−ρ (β(1)) · u, W )
and u depends only on V , ρ and W , and not on the curve β. Moreover, u tends to 0G as ρ
goes to 1, uniformly with respect to W ∈ BGH (V, ε). Lemma 3.6 implies that for ρ sufficiently
close to 1, for every W ∈ BGH (V, ε), it holds δ1−ρ (BG (x0 , η)) · u ⊃ BG (x0 , η/2). We proved
that BG (x0 , η/2) × BGH (V, ε) ⊂ F (Uε ), concluding the proof of the proposition.
The main result of this section is the following theorem, which constitutes the necessity
1
part of the characterization of CH
extendability stated in Theorem 1.1.
1
Theorem 3.8. Let G be a Carnot group. If (R, G) has the CH
extension property, then G is
pliable.
Proof. Suppose, by contradiction, that there exists V ∈ GH which is not pliable. We are going
1
to prove that (R, G) has not the CH
extension property.
Let γ(t) = exp(tV ) for t ∈ [0, 1]. Since V is not pliable, it follows from Proposition 3.7
1
that there exist a neighborhood V of γ in the space CH
([0, 1], G) and a sequence (xn )n≥1
converging to 0G such that for every n ≥ 1 no curve β in V satisfies (β(0), β̇(0)) = (0G , V )
and β(1) = γ(1) · xn . In particular, there exists a neighborhood Ω of V in GH such that for
1
every β ∈ CH
([0, 1], G) with (β(0), β̇(0)) = (0G , V ) and
β̇(t) ∈ Ω,
∀t ∈ [0, 1],
we have (β(1), β̇(1)) 6= (γ(1) · xn , V ) for every n ∈ N. Since limn→∞ xn = 0G , we can assume
without loss of generality that, for every n ≥ 1,
(5)
max{d(δρ (xn ) · exp(tV ), exp(tV )) | ρ ∈ [0, 1], t ∈ [−1, 1]} ≤ 2−n .
By homogeneity and left-invariance, we deduce that for every y ∈ G and every ρ > 0, for
every β ∈ C 1 ([0, ρ], G) with (β(0), β̇(0)) = (y, V ) and
β̇(t) ∈ Ω,
∀t ∈ [0, ρ],
we have (β(ρ), β̇(ρ)) 6= (y · γ(ρ) · δρ (xn ), V ) for every n ∈ N.
1
1
Define ρn = n1 − n+1
= n(n+1)
and x̃n = δρn (xn ) for every n ∈ N. It follows from (5) that
(6)
max{d(x̃n · exp(tV ), exp(tV )) | t ∈ [−1, 1]} ≤ 2−n ,
∀n ≥ 1.
We introduce the sequence defined recursively by y0 = 0G and
(7)
yn+1 = yn · γ(ρn ) · x̃n .
Notice that (yn )n≥1 is a Cauchy sequence and denote by y∞ its limit as n → ∞.
1
By construction, for every n ∈ N and every β ∈ CH
([0, ρn ], G) with (β(0), β̇(0)) = (yn , V )
and β̇(t) ∈ Ω for all t ∈ [0, ρn ], we have (β(ρn ), β̇(ρn )) 6= (yn+1 , V ). The proof that the (R, G)
14
NICOLAS JUILLET AND MARIO SIGALOTTI
1
1
has not the CH
extension property is then concluded if we show that the CH
-Whitney condition
holds for (f, X) on K, where
[
1
∞
{1},
K = ∪n=1 1 −
n
and f : K → G and X : K → GH are defined by
f (1 − n−1 ) = yn ,
X(1 − n−1 ) = V,
n ∈ N∗ ∪ {∞}.
For i, j ∈ N∗ ∪ {∞}, let
D(i, j) = dG (f (1 − i−1 ), f (1 − j −1 ) · exp[(j −1 − i−1 )X(1 − j −1 )])
= dG (yi , yj · exp[(j −1 − i−1 )V ]).
We have to prove that
D(i, j) = o(j −1 − i−1 )
as i, j → ∞, that is, for every ε > 0, there exists iε ∈ N∗ such that D(i, j) < ε|j −1 − i−1 | for
i, j ∈ N∗ ∪ {∞} with i, j > iε .
By triangular inequality we have
max(i,j)−1
D(i, j) ≤
X
dG (yk+1 · exp[((k + 1)−1 − i−1 )V ], yk · exp[(k −1 − i−1 )V ]).
k=min(i,j)
Notice that
dG (yk+1 · exp[((k + 1)−1 − i−1 )V ], yk · exp[(k −1 − i−1 )V ])
= dG (yk+1 · exp[((k + 1)−1 − i−1 )V ], [yk · γ(ρk )] · exp[((k + 1)−1 − i−1 )V ])
= dG (x̃k · exp[((k + 1)−1 − i−1 )V ], exp[((k + 1)−1 − i−1 )V ]),
where the last equality follows from (7) and the invariance of dG by left-multiplication. Thanks
to (6), one then concludes that
dG (yk+1 · exp[((k + 1)−1 − i−1 )V ], yk · exp[(k −1 − i−1 )V ]) ≤ 2−k .
Pmax(i,j)−1
Hence, D(i, j) ≤ k=min(i,j) 2−k = o(j −1 −i−1 ) and this concludes the proof of Theorem 3.8.
1
4. Sufficient condition for the CH
extension property
We have seen in the previous section that, differently from the classical case, for a general
Carnot group G the suitable Whitney condition for (f, X) on K is not sufficient for the
existence of an extension (f, f˙) of (f, X) on R. More precisely, it follows from Theorem 3.8
that if G has horizontal vectors which are not pliable, then there exist triples (K, f, X) such
1
1
that the CH
-Whitney condition holds for (f, X) on K but there is not a CH
-extension of (f, X).
1
In this next section we prove the converse to the result above, showing that the CH
extension
property holds when all horizontal vectors are pliable, i.e., when G is pliable.
We start by introducing the notion of locally uniformly pliable horizontal vector.
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
15
Definition 4.1. A horizontal vector X is called locally uniformly pliable if there exists a
neighborhood U of X in GH such that for every ε > 0, there exists η > 0 so that for every
W ∈U
1
{(γ, γ̇)(1) | γ ∈ CH
([0, 1], G), (γ, γ̇)(0) = (0G , W ), kγ̇ − W k∞,GH ≤ ε}
⊃ BG (exp(W ), η) × BGH (W, η).
Remark 4.2. As it happens for pliability, if X is locally uniformly pliable then, for every
λ ∈ R \ {0}, λX is locally uniformly pliable.
We are going to see in the following (Remark 6.2) that pliability and local uniform pliability
are not equivalent properties. The following proposition, however, establishes the equivalence
between pliability and local uniform pliability of all horizontal vectors.
Proposition 4.3. If G is pliable, then all horizontal vectors are locally uniformly pliable.
Proof. Assume that G is pliable. For every V ∈ GH and ε > 0 denote by η(V, ε) a positive
constant such that
1
{(γ, γ̇)(1) | γ ∈ CH
([0, 1], G), (γ, γ̇)(0) = (0G , V ), kγ̇ − V k∞,GH ≤ ε}
⊃ BG (exp(V ), η(V, ε)) × BGH (V, η(V, ε)).
We are going to show that there exists ν(V, ε) > 0 such that for every W ∈ BGH (V, ν(V, ε))
(8)
1
{(γ, γ̇)(1) | γ ∈CH
([0, 1], G), (γ, γ̇)(0) = (0G , W ), kγ̇ − W k∞,GH ≤ ε}
!
!
η V, 2ε
η V, 2ε
× BGH W,
.
⊃ BG exp(W ),
4
4
The proof of the local uniform pliability of any horizontal vector X is then concluded by
simple compactness arguments (taking any compact neighborhood U of X, using the notation
of Definition 4.1).
First fix ν̄(V, ε) > 0 in such a way that
exp(W ) ∈ BG (exp(V ), η(V, ε/2)/4)
for every W ∈ BGH (V, ν̄(V, ε)).
1
For every W ∈ GH , every ρ ∈ (0, 1), and every curve γ ∈ CH
([0, 1], G) such that (γ, γ̇)(0) =
1
(0G , V ), define γW,ρ ∈ CH ([0, 1], G) as follows: γW,ρ(0) = 0G , γ̇W,ρ(t) = (t/ρ)V + ((ρ − t)/ρ)W
for t ∈ [0, ρ], γ̇W,ρ(ρ + (1 − ρ)t) = γ̇(t) for t ∈ [0, 1]. In particular
γW,ρ(1) = γW,ρ(ρ) · δ1−ρ (γ(1)),
γ̇W,ρ (1) = γ̇(1),
and
If kV − W kGH
kγ̇W,ρ − W k∞,GH ≤ kγ̇ − V k∞,GH + kW − V kGH .
≤ ε/2, we then have
ε
kγ̇W,ρ − W k∞,GH ≤ ε ∀γ such that kγ̇ − V k∞,GH ≤ .
2
16
NICOLAS JUILLET AND MARIO SIGALOTTI
Since γW,ρ(ρ) depends on V, W , and ρ, but not on γ, we conclude that, for every W ∈
BGH (V, ε/2),
1
{(β,β̇)(1) | β ∈ CH
([0, 1], G), (β, β̇)(0) = (0G , W ), kβ̇ − W k∞,GH ≤ ε}
ε
ε
× BGH V, η V,
.
⊃ γW,ρ(ρ) · δ1−ρ BG exp(V ), η V,
2
2
Notice that dG (0G , γW,ρ(ρ)) ≤ ρ max(kV kGH , kW kGH ). Thanks to Lemma 3.6, for ρ sufficiently small,
!
ε
η V, 2ε
γW,ρ(ρ) · δ1−ρ BG exp(V ), η V,
⊃ BG exp(V ),
.
2
2
Now,
BG
η V, 2ε
exp(V ),
2
!
⊃ BG
whenever W ∈ BGH (V, ν̄(V, ε)).
Similarly,
ε
⊃ BGH
BGH V, η V,
2
η V, 2ε
exp(W ),
4
η V, 2ε
W,
4
!
!
,
provided that kV − W kGH ≤ 3η(V, ε/2)/4. The proof of (8) is concluded by taking ν(V, ε) =
min(ν̄(V, ε), ε/2, 3η(V, ε/2)/4).
We are now ready to prove the converse of Theorem 3.8, concluding the proof of Theorem 1.1.
1
Theorem 4.4. Let G be a pliable Carnot group. Then (R, G) has the CH
extension property.
Proof. By Proposition 4.3, we can assume that all vectors in GH are locally uniformly pliable.
Note moreover that it is enough to prove the extension for maps defined on compact sets K.
The generalisation to closed sets K0 is immediate because the source Carnot group is R. Let
1
(f, X) satisfy the CH
-Whitney condition on K where K is compact. We have to define f¯
on the complementary (open) set R \ K, which is the countable and disjoint union of open
intervals. For the unbounded components of R \ K, we simply define f¯ as the curve with
constant speed X(i) or X(j) where i = min(K) and j = max(K). For the finite components
(a, b) we proceed as follows. We consider y = δ1/(b−a) (f (a)−1 · f (b)). We let ε be the smallest
number such that
1
{(γ, γ̇)(1) | γ ∈ CH
([0, 1], G), (γ, γ̇)(0) = (0G , X(a)), kγ̇ − X(a)k∞,GH ≤ ε′ }
1
contains (y, X(b)) for every ε′ > ε. We consider an extension f¯ ∈ CH
of f on [a, b] such that
˙
˙
˙
1
f¯(a) = X(a), f¯(b) = X(b), and kf¯ − X(a)k∞,GH ≤ 2ε. By definition of the CH
-Whitney
+
+
condition, there exists a function ω : R → R tending to 0 at 0 such that R(a, b) =
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
17
dG (f (b), f (a)·exp[(b−a)X(a)]) is smaller than ω(b−a)(b−a) and kX(b)−X(a)kGH ≤ ω(b−a).
Since R(a, b) is equal to (b − a)dG (exp(X(a)), y), we can conclude that
(9)
dG (exp(X(a)), y) ≤ ω(b − a).
Using the corresponding estimates for R(b, a), we deduce that
(10)
dG (exp(−X(b)), y −1 ) ≤ ω(b − a).
1
By construction f¯ extends f and f¯˙ = X on the interior of K. We prove now that f¯ is CH
and
˙
1
¯
¯
that f = X on the boundary ∂K of K. It is clear that f is CH on R \ ∂K. In order to conclude
the proof we are left to pick x ∈ ∂K, let xn tend to x, and we must show that f¯(xn ) and f¯˙(xn )
tend to f (x) and X(x) respectively. As f and X are continuous on K, we can assume without
loss of generality that each xn is in R \ K. Assume for now that xn < x for every n. The
connected component (an , bn ) of R \ K containing xn is either constant for n large (in this case
x = bn ) or its length goes to zero as n → ∞. In the first case we simply notice that f¯|[an ,bn ] is
C 1 by construction. In the second case we can assume that an < xn < bn and bn − an goes to
zero. As f and X are continuous, f (an ) and X(an ) converge to f (x) and X(x) respectively.
Inequality (9) guarantees that dG (exp(X(an )), δ1/(bn −an ) [f (an )−1 · f (bn )]) ≤ ω(bn − an ) → 0 as
n → ∞ and the local uniform pliability of X(x) implies that kf¯˙|[an ,bn ] − X(an )k∞,GH goes to
zero as n → ∞. It follows that kf¯˙(xn ) − X(an )kGH and dG (f¯(xn ), f (an )) go to zero, proving
that f¯(xn ) and f¯˙(xn ) tend to f (x) and X(x) respectively. The situation where xn > x for
infinitely many n can be handled similarly replacing (9) by (10).
5. Application to the Lusin approximation of an absolutely continuous
curve
In a recent paper, E. Le Donne and G. Speight prove the following result ([22, Theorem
1.2]).
Proposition 5.1 (Le Donne–Speight). Let G be a Carnot group of step 2 and consider a
1
horizontal curve γ : [a, b] → G. For any ε > 0, there exist K ⊂ [a, b] and a CH
-curve
γ1 : [a, b] → G such that L([a, b] \ K) < ε and γ = γ1 on K.
In the case in which G is equal to the n-th Heisenberg group Hn , such result had already been
proved in [30, Theorem 2.2] (see also [39, Corollary 3.8]). In [30] G. Speight also identifies a
horizontal curve on the Engel group such that the statement of Proposition 5.1 is not satisfied
([30, Theorem 3.2]).
The name “Lusin approximation” for the property stated in Proposition 5.1 comes from
the use of the classical theorem of Lusin [24] in the proof. Let us sketch a proof when G is
replaced by a vector space Rn . The derivative γ̇ of an absolutely continuous curve γ is an
integrable function. Lusin’s theorem states that γ̇ coincides with a continuous vector-valued
function X : K → Rn on a set K of measure arbitrarily close to b − a. Thanks to the inner
continuity of the Lebesgue measure, one can assume that K is compact. Moreover K can be
18
NICOLAS JUILLET AND MARIO SIGALOTTI
chosen so that the Whitney condition is satisfied by (γ|K , X) on K. This is a consequence of
the mean value inequality
(11)
kγ(x + h) − γ(x) − hγ̇(x)k ≤ o(h),
where o(h) depends on x ∈ K. By usual arguments of measure theory, inequality (11) can
be made uniform with respect to x if one slightly reduces the measure of K. The (classical)
Whitney extension theorem provides a C 1 -curve γ1 defined on [a, b] with γ1 = γ and γ˙1 = X
on K.
The proof in [22] (and also in [30]) follows the same scheme as the one sketched above. We
show here below how the same scheme can be adapted to any pliable Carnot group. The fact
that all Carnot groups of step 2 are pliable and that not all pliable Carnot groups are of step
1 or 2 is proved in the next section (Theorem 6.5 and Proposition 6.6), so that our paper
actually provides a nontrivial generalization of Proposition 5.1. The novelty of our approach
with respect to those in [22, 30, 39] is to replace the classical Rademacher differentiablility
theorem for Lipschitz or absolutely continuous curves from R to Rn by the more adapted
Pansu–Rademacher theorem.
Proposition 5.2 (Lusin approximation of a horizontal curve). Let G be a pliable Carnot
group and γ : [a, b] → G be a horizontal curve. Then for any ε > 0 there exist K ⊂ [a, b] with
1
L([a, b] \ K) < ε and a curve γ1 : [a, b] → G of class CH
such that the curves γ and γ1 coincide
on K.
Proof. We are going to prove that for any ε > 0 there exists a compact set K ⊂ [a, b] with
L([a, b] \ K) < ε such the three following conditions are satisfied:
(1) γ̇(t) exists and it is a horizontal vector at every t ∈ K;
(2) γ̇|K is uniformly continuous;
(3) For every ε > 0 there exists η > 0 such that, for every t ∈ K and |h| ≤ η with
t + h ∈ [a, b], it holds dG (γ(t + h), γ(t) · exp(hγ̇(t))) ≤ ηε.
1
With these conditions the CH
-Whitney condition holds for (γ, γ̇|K ) on K. Since G is pliable,
1
according to Theorem 4.4 the CH
extension property holds for (R, G), yielding γ1 as in the
statement of Proposition 5.2.
Case 1: γ is Lipschitz continuous. Let γ be a Lipschitz curve from [a, b] to G. The Pansu–
Rademacher theorem (Proposition 2.1) states that there exists A ⊂ [a, b] of full measure such
that, for any t ∈ A, the curve γ admits a derivative at t and it holds
dG (γ(t + h), γ(t) · exp(hγ̇(t))) = o(h),
as h goes to zero. Let ε be positive. By Lusin’s theorem, one can restrict A to a compact set
K1 ⊂ A such that t 7→ γ̇(t) is uniformly continuous on K1 and L(A \ K1 ) < ε/2. Moreover by
classical arguments of measure theory, the functions h 7→ |h|−1 dG (γ(t + h), γ(t) · exp(hγ̇(t0 )))
can be bounded by a function that is o(1) as h goes to zero, uniformly in t on some compact
set K2 with L(A \ K2 ) < ε/2 . In other words for every ε > 0 there exists η such that for
t ∈ K2 and h ∈ [t − η, t + η] it holds
dG (γ(t + h), γ(t) · exp(hγ̇(t))) ≤ ε|h|.
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
19
With K = K1 ∩ K2 , the three conditions (1), (2), (3) listed above hold true.
Case 2: γ general horizontal curve. Let γ be absolutely continuous on [a, b]. It admits a
pathlength parametrisation, i.e., there exists a Lipschitz continuous curve ϕ : [0, T ] → G and
a function F : [a, b] → [0, T ], absolutely continuous and non-decreasing, such that γ = ϕ ◦ F .
Moreover ϕ̇ has norm 1 at almost every time. As F is absolutely continuous, for every ε > 0
there exists η such that, for any measurable K, the inequality L([0, T ] \ K) < η implies
L([a, b] \ F −1 (K)) < ε.
Let ε be positive and let η be a number corresponding to ε/2 in the previous sentence.
Applying to F the scheme of proof sketched after Proposition 5.1 for n = 1, there exists
a compact set KF ⊂ [a, b] with L([a, b] \ KF ) < ε/2 such that F is differentiable with a
continuous derivative on KF and the bound in the mean value inequality is uniform on KF .
For the Lipschitz curve ϕ and for every η > 0, Case 1 provides a compact set Kϕ ⊂ [0, T ]
with the listed properties with ε/2 in place ε.
Let K be the compact KF ∩ F −1 (Kϕ ) and note that L([a, b] \ K) < ε. For t ∈ K it holds
|F (t + h) − F (t) − hF ′ (t)| = o(h)
and
dG (ϕ(F (t) + H), ϕ(F (t)) · exp(H ϕ̇(F (t)))) = o(H),
as h and H go to zero, uniformly with respect to t ∈ K. We also know that t 7→ F ′ (t) and
t 7→ ϕ̇(F (t)) ∈ GH exist and are continuous on K. It is a simple exercise to compose the two
Taylor expansions and obtain the wanted conditions for γ = ϕ ◦ F . Note that the derivative
of γ on K is F ′ (t)ϕ̇(F (t)), which is continuous on K.
Remark 5.3. A set E ⊂ Rn is said 1-countably rectifiable if there exists a countable family
of Lipschitz curves fk : R → Rn such that
!
[
H1 E \ fk (R) = 0.
k
The usual Lusin approximation of curves in Rn permits one to replace Lipschitz by C 1 in
this classical definition of rectifiability. When Rn is replaced by a pliable Carnot group the two
definitions still make sense and, according to Proposition 5.2, are still equivalent. Rectifiability
in metric spaces and Carnot groups is a very active research topic in geometric measure theory
(see [22] for references).
6. Conditions ensuring pliability
The goal of this section is to identify conditions ensuring that G is pliable. Let us first focus
on the pliability of the zero vector.
Proposition 6.1. For every Carnot group G, the vector 0 ∈ G is pliable.
Proof. According to Proposition 3.7, we should prove that for every ε > 0 the set
1
{β(1) ∈ G | β ∈ CH
([0, 1], G), kβ̇k∞,GH < ε, (β, β̇)(0) = (0G , 0)}
20
NICOLAS JUILLET AND MARIO SIGALOTTI
is a neighborhood of 0G in G.
Recall that there exist k ∈ N, V1 , . . . , Vk ∈ GH and t1 , . . . , tk > 0 such that the map
φ : (τ1 , . . . , τk ) 7→ eτk Vk ◦ · · · ◦ eτ1 V1 (0G )
has rank equal to dim(G) at (τ1 , . . . , τk ) = (t1 , . . . , tk ) and satisfies φ(t1 , . . . , tk ) = 0G (see
[31]). Notice that for every ν > 0, the function
φν : (τ1 , . . . , τk ) 7→eντk Vk ◦ · · · ◦ eντ1 V1 (0G )
=e
ν 2 τk
ν
Vk
◦ · · · ◦ eν
2 τ1 V
ν 1
τ
τk
1
,...,
(0G ) = δν 2 φ
ν
ν
has also rank equal to dim(G) at (τ1 , . . . , τk ) = (νt1 , . . . , νtk ) and satisfies φν (νt1 , . . . , νtk ) =
0G . Hence, up to replacing tj by νtj and Vj by ν 2 Vj for j = 1, . . . , k and ν small enough, we
can assume that t1 + · · · + tk < 1 and kVj kGH < ε for j = 1, . . . , k.
Let O be a neighborhood of (t1 , . . . , tk ) such that for every (τ1 , . . . , τk ) ∈ O we have
τ1 , . . . , τk > 0 and τ1 + · · · + τk < 1. Notice that {φ(τ1 , . . . , τk ) | (τ1 , . . . , τk ) ∈ O} is a
neighborhood of 0G in G.
We complete the proof of the proposition by constructing, for every τ = (τ1 , . . . , τk ) ∈ O a
1
curve βτ ∈ CH
([0, 1], G) such that
(12)
kβ̇τ k∞,GH < ε,
(βτ , β̇τ )(0) = (0G , 0),
βτ (1) = φ(τ ).
1
For every X ∈ GH , p ∈ G and r > 0 let us exhibit a curve γ ∈ CH
([0, r], G) such that γ(0) =
γ(r) = p, γ̇(0) = 0, γ̇(r) = X, and kγ̇k∞,GH = kXkGH . The curve γ can be constructed by
imposing γ̇(r/2) = −X/2 and by extending γ̇ on [0, r/2] and [r/2, r] by convex interpolation. It
is also possible to reverse such a curve by transformation (T4) and connect on any segment [0, r]
1
the point-with-velocity (p, X) with the point-with-velocity (p, 0) by a CH
curve γ respecting
moreover kγ̇k∞,GH = kXkGH . Finally just concatenating (transformation (T5)) curves of
this type it is possible, for every r > 0, to connect (p, X) and (p, Y ) on [0, r] with a curve
1
γr,X,Y ∈ CH
([0, r], G) with kγ̇r,X,Y k∞,GH = max(kXkGH , kY kGH ).
P
We then construct βτ as follows: we fix r = (1 − kj=1 τj )/k, we impose βτ (0) = 0G and
we define β̇τ to be the concatenation of the following 2k continuous curves in GH : first take
γ̇r,0,V1 , then the constant equal to V1 for a time τ1 , then γ̇r,V1 ,V2 , then the constant equal to V2
for a time τ2 , and so on up to γ̇r,Vk−1 ,Vk and finally the constant equal to Vk for a time τk . By
1
construction, βτ ∈ CH
([0, 1], G) and satisfies (12).
Remark 6.2. Let us show that, as a consequence of the previous proposition, pliability and
local uniform pliability are not equivalent properties (albeit we know from Proposition 4.3
that pliability of all horizontal vectors is equivalent to local uniform pliability of all horizontal
vectors).
Recall that local uniform pliability of a horizontal vector X implies pliability of all horizontal
vectors in a neighborhood of X (cf. Definition 4.1). Therefore, if 0 is locally uniformly pliable
for a Carnot group G then every horizontal vector of G is pliable (Remark 4.2). Hence 0
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
21
cannot be locally uniformly pliable if G is not pliable. The remark is concluded by recalling
that non-pliable Carnot groups exist (see Examples 3.3 and 3.5).
Let G be a Carnot group and let X1 , . . . , Xm be an orthonormal basis of GH . Let us consider
the control system in G × Rm given by
m
X
γ̇ =
ui Xi (γ),
(13)
i=1
u̇ = v,
where both u = (u1 , . . . , um) and the control v = (v1 , . . . , vm ) vary in Rm .
Let us rewrite x = (γ, u),
Pm
ui Xi (γ)
0
i=1
,
Fi (x) =
for i = 1, . . . , m,
F0 (x) =
0
ei
where e1 , . . . , em denotes the canonical basis of Rm . System (13) can then be rewritten as
m
X
(14)
ẋ = F0 (x) +
vi Fi (x).
i=1
For every ū ∈ Rm , let Fū : L1 ([0, 1], Rm ) → G×Rm be the endpoint map at time 1 for system
(14) with initial condition (0G , ū). Notice that if x(·) = (γ(·), u(·)) is a solution of (14) with
1
m
1
initial condition
Pm (0G , ū) corresponding to a control v ∈ L ([0, 1], R ), then γ ∈ CH ([0, 1], G)
and kγ̇ − i=1 ūi Xi k∞,GH ≤ kvk1 .
We can then state the following criterium for pliability.
Proposition
6.3. If the map Fū : L1 ([0, 1], Rm ) → G × Rm is open at 0, then the horizontal
Pm
vector i=1 ūi Xi is pliable.
As a consequence, if the restriction of Fū to
L∞ ([0, 1], Rm ) is open at 0, when the L∞
P
m
topology is considered on L∞ ([0, 1], Rm ), then i=1 ūi Xi is pliable. We deduce the following
∗
property: if a straight
Pmcurve is not pliable, then it admits an abnormal lift in T G. Indeed, if
a horizontal vector i=1 ūi Xi is not pliable, then the differential of Fū |L∞ ([0,1],Rm ) at 0 must
be singular. Hence (see, for instance, [1, Section 20.3] or [33, Proposition 5.3.3]), there exist
pγ : [0, 1] → T ∗ G and pu : [0, 1] → (Rm )∗ with (pγ , pu ) 6= 0 such that
∂
(15)
ṗγ (t) = − H(γ(t), ū, pγ (t), pu (t), 0),
∂γ
∂
(16)
ṗu (t) = − H(γ(t), ū, pγ (t), pu (t), 0),
∂u
∂
0=
(17)
H(γ(t), ū, pγ (t), pu (t), 0),
∂v
P
for t ∈ [0, 1], where γ(t) = exp(t m
i=1 ūi Xi ) and
m
X
H(γ, u, pγ , pu , v) = pγ
ui Xi (γ) + pu v.
i=1
22
NICOLAS JUILLET AND MARIO SIGALOTTI
From (17) it follows that pu (t) = 0 for all t ∈ [0, 1]. Equation (16) then implies that
pγ (t)Xi (γ(t)) = 0 for every i = 1, . . . , m and every t ∈ [0, 1]. Moreover, pγ must be different from zero. Comparing (4) and (15), it follows that pγ is an abnormal path.
The control literature proposes several criteria for testing the openness at 0 of an endpoint
map of the type Fū |L∞ ([0,1],Rm ) . The test presented here below, taken from [6], generalizes
previous criteria obtained in [17] and [32].
Theorem 6.4 (Bianchini and Stefani [6, Corollary 1.2]). Let M be a C ∞ manifold and
V0 , V1 , . . . , Vm be C ∞ vector fields on M. Assume that the family of vector fields J = {adkV0 Vj |
k ≥ 0, j = 1, . . . , m} is Lie bracket generating. Denote by H the iterated brackets of elements
in J and recall that the length of an element of H is the sum of the number of times that
each of the elements V0 , . . . , Vm appears in its expression. Assume that every element of H
in whose expression each of the vector fields V1 , . . . , Vm appears an even number of times is
equal, at every q ∈ M, to the linear combination of elements of H of smaller length, evaluated
at q. Fix q0 ∈ M and a neighborhood Ω of 0 in P
Rm . Let U ⊂ L∞ ([0, 1], Ω) be the set of those
controls v such that the solution of q̇ = V0 (q) + m
i=1 vi Vi (q), q(0) = q0 , is defined up to time
1 and denote by Φ(v) the endpoint q(1) of such a solution. Then Φ(U) is a neighborhood of
eV0 (q0 ).
The following two results show how to apply Theorem 6.4 to guarantee that a Carnot group
1
G is pliable and, hence, that (R, G) has the CH
extension property.
1
Theorem 6.5. Let G be a Carnot group of step 2. Then G is pliable and (R, G) has the CH
extension property.
Proof.
6.4 in order to prove that for every horizontal vector
Pm We are going to apply Theorem
∞
u
X
the
endpoint
map
F
:
L
([0,
1], Rm) → G × Rm is open at zero.
u
i=1 i i
Notice that
Xi (γ)
[F0 , Fi ](γ, w) = −
,
i = 1, . . . , m,
0
and
Pm
w
[X
,
X
](γ)
j
i
j
j=1
[F0 , [F0 , Fi ]](γ, w) =
,
i = 1, . . . , m.
0
Moreover for every i, j = 1, . . . , m,
[Xi , Xj ](γ)
[[F0 , Fi ], Fj ] = 0, [[F0 , Fi ], [F0 , Fj ]](γ, w) =
,
0
and all other Lie bracket in and between elements of J = {adkF0 Fi | k ≥ 0, i = 1, . . . , m} is
zero since G is of step 2.
In particular all Lie brackets between elements of J in which each of the vector fields
F1 , . . . , Fm appears an even number of times is zero.
According to Theorem 6.4, we are left to prove that J is Lie bracket generating. This is
clearly true, since
Span{Fi (γ, w), [F0, Fi ](γ, w), [[F0 , Fi ], [F0 , Fj ]](γ, w) | i, j = 1, . . . , m}
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
is equal to T(γ,w) (G × Rm ) for every (γ, w) ∈ G × Rm .
23
We conclude the paper by showing how to construct pliable Carnot groups of arbitrarily
large step.
Proposition 6.6. For every s ≥ 1 there exists a pliable Carnot group of step s.
Proof. Fix s ≥ 1 and consider the free nilpotent stratified Lie algebra A of step s generated
by s elements Z1 , . . . , Zs .
For every i = 1, . . . , s, denote by Ii the ideal of A generated by Zi and by Ji the ideal [Ii , Ii ].
Then J = ⊕si=1 Ji is also an ideal of A.
Then the factor algebra G = A/J is nilpotent and inherits the stratification of A. Denote by
G the Carnot group generated by G. Let X1 , . . . , Xs be the elements of GH obtained by projecting Z1 , . . . , Zs . By construction, every bracket of X1 , . . . , Xs in G in which at least one of
the Xi ’s appears more than once is zero. Moreover, G has step s, since [X1 , [X2 , [ · · · , Xs ], · · · ]
is different from zero.
Let us now apply Theorem 6.4 in order to prove that for every X ∈ GH thePendpoint map
Fu : L∞ ([0, 1], Rs ) → G × Rs is open at zero, where u ∈ Rs is such that X = si=1 ui Xi .
Following the same computations as in the proof of Theorem 6.5,
k
adX Xi (γ)
k+1
adF0 Fi (γ, u) =
,
k ≥ 0, i = 1, . . . , s.
0
In particular the family J = {adkF0 Fi | k ≥ 0, i = 1, . . . , s} is Lie bracket generating.
Moreover, every Lie bracket of elements of Jb = {adk+1
F0 Fi | k ≥ 0, i = 1, . . . , s} in which at
least one of the elements F1 , . . . , Fs appears more than once is zero.
Consider now a Lie bracket W between h ≥ 2 elements of J . Let k1 , . . . , ks be the number
of times in which each of the elements F1 , . . . , Fs appears in W . Let us prove by induction
on h that W is the linear combination of brackets between elements of Jb in which each Fi
appears ki times, i = 1, . . . , s. Consider the case h = 2. Any bracket of the type [adkF0 Fi , Fj ],
k ≥ 0, i, j = 1, . . . , s, is the linear combination of brackets between elements of Jb in which
Fi and Fj appear once, as it can easily be proved by induction on k, thanks to the Jacobi
identity. The induction step on h also follows directly from the Jacobi identity.
We can therefore conclude that every Lie bracket of elements of J in which at least one of
the elements F1 , . . . , Fs appears more than once is zero. This implies in particular that the
hypotheses of Theorem 6.4 are satisfied, concluding the proof that G is pliable.
Acknowledgment. We warmly thank Frédéric Chapoton and Gwénaël Massuyeau for the
suggestions leading us to Proposition 6.6. We are also grateful to Artem Kozhevnikov, Dario
Prandi, Luca Rizzi and Andrei Agrachev for many stimulating discussions. This work has been
initiated during the IHP trimester “Geometry, analysis and dynamics on sub-Riemannian
manifolds” and we wish to thank the Institut Henri Poincaré and the Fondation Sciences
Mathématiques de Paris for the welcoming working conditions.
24
NICOLAS JUILLET AND MARIO SIGALOTTI
The second author has been supported by the European Research Council, ERC StG 2009
“GeCoMethods”, contract number 239748, by the Grant ANR-15-CE40-0018 of the ANR and
by the FMJH Program Gaspard Monge in optimization and operation research.
References
[1] A. A. Agrachev and Y. L. Sachkov. Control theory from the geometric viewpoint, volume 87 of Encyclopaedia of Mathematical Sciences. Springer-Verlag, Berlin, 2004. Control Theory and Optimization,
II.
[2] A. A. Agrachev and A. V. Sarychev. Abnormal sub-Riemannian geodesics: Morse index and rigidity. Ann.
Inst. H. Poincaré Anal. Non Linéaire, 13(6):635–690, 1996.
[3] Z. M. Balogh and K. S. Fässler. Rectifiability and Lipschitz extensions into the Heisenberg group. Math.
Z., 263(3):673–683, 2009.
[4] Z. M. Balogh, U. Lang, and P. Pansu. Lipschitz extensions of maps between Heisenberg groups. Ann.
Inst. Fourier (Grenoble), 66(4):1653–1665, 2016.
[5] D. Barilari, U. Boscain, and M. Sigalotti, editors. Dynamics, geometry and analysis on sub-Riemannian
manifolds, Volumes I-II. EMS Series of Lectures in Mathematics. European Mathematical Society (EMS),
Zürich, 2016.
[6] R. M. Bianchini and G. Stefani. Graded approximations and controllability along a trajectory. SIAM J.
Control Optim., 28(4):903–924, 1990.
[7] A. Bonfiglioli, E. Lanconelli, and F. Uguzzoni. Stratified Lie groups and potential theory for their subLaplacians. Springer Monographs in Mathematics. Springer, Berlin, 2007.
[8] Y. Brudnyi and P. Shvartsman. Generalizations of Whitney’s extension theorem. Int. Math. Res. Not.,
1994(3):129–139, 1994.
[9] R. L. Bryant and L. Hsu. Rigidity of integral curves of rank 2 distributions. Invent. Math., 114(2):435–461,
1993.
[10] L. C. Evans and R. F. Gariepy. Measure theory and fine properties of functions. Textbooks in Mathematics.
CRC Press, Boca Raton, FL, revised edition, 2015.
[11] C. L. Fefferman. A sharp form of Whitney’s extension theorem. Ann. of Math. (2), 161(1):509–577, 2005.
[12] C. L. Fefferman, A. Israel, and G. K. Luli. Sobolev extension by linear operators. J. Amer. Math. Soc.,
27(1):69–145, 2014.
[13] G. B. Folland and E. M. Stein. Hardy spaces on homogeneous groups, volume 28 of Mathematical Notes.
Princeton University Press, Princeton, N.J., 1982.
[14] B. Franchi, R. Serapioni, and F. Serra Cassano. Rectifiability and perimeter in the Heisenberg group.
Math. Ann., 321(3):479–531, 2001.
[15] B. Franchi, R. Serapioni, and F. Serra Cassano. On the structure of finite perimeter sets in step 2 Carnot
groups. J. Geom. Anal., 13(3):421–466, 2003.
[16] C. Golé and R. Karidi. A note on Carnot geodesics in nilpotent Lie groups. J. Dynam. Control Systems,
1(4):535–549, 1995.
[17] H. Hermes. Control systems which generate decomposable Lie algebras. J. Differential Equations,
44(2):166–187, 1982. Special issue dedicated to J. P. LaSalle.
[18] T. Huang and X. Yang. Extremals in some classes of Carnot groups. Sci. China Math., 55(3):633–646,
2012.
[19] B. Kirchheim and F. Serra Cassano. Rectifiability and parameterization of intrinsic regular surfaces in
the Heisenberg group. Ann. Sc. Norm. Super. Pisa Cl. Sci. (5), 3(4):871–896, 2004.
[20] A. Kozhevnikov. Metric properties of level sets of differentiable maps on Carnot groups. Doctoral thesis,
Université Paris Sud - Paris XI, May 2015.
WHITNEY THEOREM FOR CURVES IN CARNOT GROUPS
25
[21] E. Le Donne, A. Ottazzi, and B. Warhurst. Ultrarigid tangents of sub-Riemannian nilpotent groups. Ann.
Inst. Fourier (Grenoble), 64(6):2265–2282, 2014.
[22] E. Le Donne and G. Speight. Lusin approximation for horizontal curves in step 2 Carnot groups. Calc.
Var. Partial Differential Equations, 55(5):111, 2016.
[23] W. Liu and H. J. Sussman. Shortest paths for sub-Riemannian metrics on rank-two distributions. Mem.
Amer. Math. Soc., 118(564):x+104, 1995.
[24] N. Lusin. Sur les propriétés des fonctions mesurables. C. R. Acad. Sci., Paris, 154:1688–1690, 1912.
[25] V. Magnani. Towards differential calculus in stratified groups. J. Aust. Math. Soc., 95(1):76–128, 2013.
[26] B. Malgrange. Ideals of differentiable functions. Tata Institute of Fundamental Research Studies in Mathematics, No. 3. Tata Institute of Fundamental Research, Bombay; Oxford University Press, London,
1967.
[27] R. Montgomery. A survey of singular curves in sub-Riemannian geometry. J. Dynam. Control Systems,
1(1):49–90, 1995.
[28] S. Rigot and S. Wenger. Lipschitz non-extension theorems into jet space Carnot groups. Int. Math. Res.
Not. IMRN, (18):3633–3648, 2010.
[29] F. Serra Cassano. Some topics of geometric measure theory in Carnot groups. In Dynamics, geometry
and analysis on sub-Riemannian manifolds, Volume I, EMS Series of Lectures in Mathematics. European
Mathematical Society (EMS), Zürich, 2016.
[30] G. Speight. Lusin approximation and horizontal curves in Carnot groups. To appear in Revista Matematica
Iberoamericana.
[31] H. J. Sussmann. Some properties of vector field systems that are not altered by small perturbations. J.
Differential Equations, 20(2):292–315, 1976.
[32] H. J. Sussmann. A general theorem on local controllability. SIAM J. Control Optim., 25(1):158–194, 1987.
[33] E. Trélat. Contrôle optimal. Mathématiques Concrètes. [Concrete Mathematics]. Vuibert, Paris, 2005.
Théorie & applications. [Theory and applications].
[34] S. K. Vodop’yanov and I. M. Pupyshev. Whitney-type theorems on the extension of functions on Carnot
groups. Sibirsk. Mat. Zh., 47(4):731–752, 2006.
[35] S. K. Vodop’yanov and I. M. Pupyshev. Whitney-type theorems on the extension of functions on the
Carnot group. Dokl. Akad. Nauk, 406(5):586–590, 2006.
[36] S. Wenger and R. Young. Lipschitz extensions into jet space Carnot groups. Math. Res. Lett., 17(6):1137–
1149, 2010.
[37] H. Whitney. Analytic extensions of differentiable functions defined in closed sets. Trans. Amer. Math.
Soc., 36(1):63–89, 1934.
[38] H. Whitney. Differentiable functions defined in closed sets. I. Trans. Amer. Math. Soc., 36(2):369–387,
1934.
[39] S. Zimmerman. The Whitney extension theorem for C 1 , horizontal curves in Hn . J. Geom. Anal., to
appear.
Institut de Recherche Mathématique Avancée, UMR 7501, Université de Strasbourg et
CNRS, 7 rue René Descartes, 67 000 Strasbourg, France
E-mail address: [email protected]
Inria, team GECO & CMAP, École Polytechnique, CNRS, Université Paris-Saclay, Palaiseau,
France
E-mail address: [email protected]
| 4math.GR
|
arXiv:1310.2350v1 [cs.AI] 9 Oct 2013
The Generalized Traveling Salesman Problem
solved with Ant Algorithms
Camelia-M. Pintea, Petrică C. Pop, Camelia Chira
North University Baia Mare, Babes-Bolyai University, Romania
[email protected], pop [email protected], [email protected]
Abstract
A well known N P-hard problem called the Generalized Traveling Salesman
Problem (GTSP) is considered. In GTSP the nodes of a complete undirected
graph are partitioned into clusters. The objective is to find a minimum cost
tour passing through exactly one node from each cluster.
An exact exponential time algorithm and an effective meta-heuristic algorithm for the problem are presented. The meta-heuristic proposed is a
modified Ant Colony System (ACS) algorithm called Reinforcing Ant Colony
System (RACS) which introduces new correction rules in the ACS algorithm.
Computational results are reported for many standard test problems. The
proposed algorithm is competitive with the other already proposed heuristics
for the GTSP in both solution quality and computational time.
1
Introduction
Many combinatorial optimization problems are N P-hard, and the theory of N P-completeness
has reduced hopes that N P-hard problems can be solved within polynomial bounded computation times. Nevertheless, sub-optimal solutions are sometimes easy to find. Consequently, there is much interest in approximation and heuristic algorithms that can find near
optimal solutions within reasonable running time. Heuristic algorithms are typically among
the best strategies in terms of efficiency and solution quality for problems of realistic size
and complexity.
In contrast to individual heuristic algorithms that are designed to solve a specific
problem, meta-heuristics are strategic problem solving frameworks that can be adapted
to solve a wide variety of problems. Meta-heuristic algorithms are widely recognized as
one of the most practical approaches for combinatorial optimization problems. The most
representative meta-heuristics include genetic algorithms, simulated annealing, tabu search
and ant colony. Useful references regarding meta-heuristic methods can be found in [3].
The Generalized Traveling Salesman Problem (GTSP) has been introduced in [6] and
[7]. The GTSP has several applications to location and telecommunication problems. More
information on these problems and their applications can be found in [4, 5, 6].
Several approaches were considered for solving the GTSP: a branch-and-cut algorithm
for Symmetric GTSP is described and analyzed in [5], in [7] is given a Lagrangian-based
approach for Asymmetric GTSP, in [11] is described a random-key genetic algorithm for
the GTSP, in [10] it is proposed an efficient composite heuristic for the Symmetric GTSP
etc.
1
The aim of this paper is to provide an exact algorithm for the GTSP as well as
an effective meta-heuristic algorithm for the problem. The proposed meta-heuristic is
a modified version of Ant Colony System (ACS). Introduced in ([1, 2]), Ant System is
a heuristic algorithm inspired by the observation of real ant colonies. ACS is used to
solve hard combinatorial optimization problems including the Traveling Salesman Problem
(TSP).
2
Definition and complexity of the GTSP
Let G = (V, E) be an n-node undirected graph whose edges are associated with nonnegative costs. We will assume w.l.o.g. that G is a complete graph (if there is no edge
between two nodes, we can add it with an infinite cost).
Let V1 , ..., Vp be a partition of V into p subsets called clusters (i.e. V = V1 ∪V2 ∪...∪Vp
and Vl ∩ Vk = ∅ for all l, k ∈ {1, ..., p}). We denote the cost of an edge e = {i, j} ∈ E
by cij .
The generalized traveling salesman problem (GTSP) asks for finding a minimum-cost
tour H spanning a subset of nodes such that H contains exactly one node from each
cluster Vi , i ∈ {1, ..., p}. The problem involves two related decisions: choosing a node
subset S ⊆ V , such that |S ∩ Vk | = 1, for all k = 1, ..., p and finding a minimum cost
Hamiltonian cycle in the subgraph of G induced by S.
Such a cycle is called a Hamiltonian tour. The GTSP is called symmetric if and
only if the equality c(i, j) = c(j, i) holds for every i, j ∈ V , where c is the cost function
associated to the edges of G.
3
An exact algorithm for the GTSP
In this section, we present an algorithm that finds an exact solution to the GTSP.
Given a sequence (Vk1 , ..., Vkp ) in which the clusters are visited, we want to find the
best feasible Hamiltonian tour H ∗ (w.r.t cost minimization), visiting the clusters according
to the given sequence. This can be done in polynomial time by solving |Vk1 | shortest path
problems as described below.
We construct a layered network, denoted by LN, having p + 1 layers corresponding to
the clusters Vk1 , ..., Vkp and in addition we duplicate the cluster Vk1 . The layered network
contains all the nodes of G plus some extra nodes v ′ for each v ∈ Vk1 . There is an arc
(i, j) for each i ∈ Vkl and j ∈ Vkl+1 (l = 1, ..., p − 1), having the cost cij and an arc
(i, h), i, h ∈ Vkl , (l = 2, ..., p) having cost cih . Moreover, there is an arc (i, j ′ ) for each
i ∈ Vkp and j ′ ∈ Vk1 having cost cij ′ .
For any given v ∈ Vk1 , we consider paths from v to w′ , w′ ∈ Vk1 , that visits exactly
two nodes from each cluster Vk2 , ..., Vkp , hence it gives a feasible Hamiltonian tour.
Conversely, every Hamiltonian tour visiting the clusters according to the sequence
(Vk1 , ..., Vkp ) corresponds to a path in the layered network from a certain node v ∈ Vk1
to w′ ∈ Vk1 .
Therefore the best (w.r.t cost minimization) Hamiltonian tour H ∗ visiting the clusters
in a given sequence can be found by determining all the shortest paths from each v ∈ Vk1
to each w′ ∈ Vk1 with the property that visits exactly one node from cluster.
The overall time complexity is then |Vk1 |O(m + n log n), i.e. O(nm + nlogn) in
the worst case. We can reduce the time by choosing |Vk1 | as the cluster with minimum
cardinality.
2
It should be noted that the above procedure leads to an O((p − 1)!(nm + nlogn)) time
exact algorithm for the GTSP, obtained by trying all the (p−1)! possible cluster sequences.
Therefore we have established the following result: the above procedure provides an exact
solution to the GSTP in O((p − 1)!(nm + nlogn)) time, where n is the number of nodes,
m is the number of edges and p is the number of clusters in the input graph. Clearly, the
algorithm presented is an exponential time algorithm unless the number of clusters p is
fixed.
4
Ant Colony System
Ant System proposed in [1, 2] is a multi-agent approach used for various combinatorial optimization problems. The algorithms were inspired by the observation of real ant colonies.
An ant can find shortest paths between food sources and a nest. While walking from
food sources to the nest and vice versa, ants deposit on the ground a substance called
pheromone, forming a pheromone trail. Ants can smell pheromone and, when choosing
their way, they tend to choose paths marked by stronger pheromone concentrations. It
has been shown that this pheromone trail following behavior employed by a colony of ants
can lead to the emergence of shortest paths.
When an obstacle breaks the path ants try to get around the obstacle randomly choosing either way. If the two paths encircling the obstacle have the different length, more ants
pass the shorter route on their continuous pendulum motion between the nest points in particular time interval. While each ant keeps marking its way by pheromone the shorter route
attracts more pheromone concentrations and consequently more and more ants choose this
route. This feedback finally leads to a stage where the entire ant colony uses the shortest
path. There are many variations of the ant colony optimization applied on various classical
problems. Ant System make use of simple agents called ants which iterative construct candidate solution to a combinatorial optimization problem. The ants solution construction
is guided by pheromone trails and problem dependent heuristic information.
An individual ant constructs candidate solutions by starting with an empty solution and
then iterative adding solution components until a complete candidate solution is generated.
Each point at which an ant has to decide which solution component to add to its current
partial solution is called a choice point. After the solution construction is completed, the
ants give feedback on the solutions they have constructed by depositing pheromone on
solution components which they have used in their solution. Solution components which
are part of better solutions or are used by many ants will receive a higher amount of
pheromone and, hence, will more likely be used by the ants in future iterations of the
algorithm. To avoid the search getting stuck, typically before the pheromone trails get
reinforced, all pheromone trails are decreased by a factor.
Ant Colony System (ACS) was developed to improve Ant System, making it more
efficient and robust. Ant Colony System works as follows: m ants are initially positioned
on n nodes chosen according to some initialization rule, for example randomly. Each ant
builds a tour by repeatedly applying a stochastic greedy rule - the state transition rule.
While constructing its tour, an ant also modifies the amount of pheromone on the visited
edges by applying the local updating rule. Once all ants have terminated their tour, the
amount of pheromone on edges is modified again by applying the global updating rule.
As was the case in ant system, ants are guided, in building their tours by both heuristic
information and by pheromone information: an edge with a high amount of pheromone is
a very desirable choice. The pheromone updating rules are designed so that they tend to
give more pheromone to edges which should be visited by ants.
3
The ants solutions are not guaranteed to be optimal with respect to local changes and
hence may be further improved using local search methods. Based on this observation,
the best performance are obtained using hybrid algorithms combining probabilistic solution
construction by a colony of ants with local search algorithms as 2-3 opt, tabu-search etc.
In such hybrid algorithms, the ants can be seen as guiding the local search by constructing
promising initial solutions, because ants preferably use solution components which, earlier
in the search, have been contained in good locally optimal solutions.
5
Reinforcing Ant Colony System for GTSP
An Ant Colony System for the GTSP it is introduced. In order to enforces the construction
of a valid solution used in ACS a new algorithm called Reinforcing Ant Colony System
(RACS) it is elaborated with a new pheromone rule as in [8] and pheromone evaporation
technique as in [12].
Let Vk (y) denote the node y from the cluster Vk . The RACS algorithm for the GTSP
works as follows:
• Initially the ants are placed in the nodes of the graph, choosing randomly the clusters
and also a random node from the chosen cluster
• At iteration t + 1 every ant moves to a new node from an unvisited cluster and the
parameters controlling the algorithm are updated.
• Each edge is labeled by a trail intensity. Let τij (t) represent the trail intensity of the
edge (i, j) at time t. An ant decides which node is the next move with a probability
that is based on the distance to that node (i.e. cost of the edge) and the amount
of trail intensity on the connecting edge. The inverse of distance from a node to
the next node is known as the visibility, ηij = c1ij .
• At each time unit evaporation takes place. This is to stop the intensity trails
increasing unbounded. The rate evaporation is denoted by ρ, and its value is between
0 and 1. In order to stop ants visiting the same cluster in the same tour a tabu list
is maintained. This prevents ants visiting clusters they have previously visited. The
ant tabu list is cleared after each completed tour.
• To favor the selection of an edge that has a high pheromone value, τ , and high
visibility value, η a probability function pk iu is considered. J k i are the unvisited
neighbors of node i by ant k and u ∈ J k i , u = Vk (y), being the node y from the
unvisited cluster Vk . This probability function is defined as follows:
pk iu (t) =
[τiu (t)][ηiu (t)]β
,
Σo∈J k i [τio (t)][ηio (t)]β
(1)
where β is a parameter used for tuning the relative importance of edge cost in
selecting the next node. pk iu is the probability of choosing j = u, where u = Vk (y)
is the next node, if q > q0 (the current node is i). If q ≤ q0 the next node j is
chosen as follows:
j = argmaxu∈J k {τiu (t)[ηiu (t)]β },
(2)
i
where q is a random variable uniformly distributed over [0, 1] and q0 is a parameter
similar to the temperature in simulated annealing, 0 ≤ q0 ≤ 1.
4
• After each transition the trail intensity is updated using the correction rule from [8]:
τij (t + 1) = (1 − ρ)τij (t) + ρ
1
.
n · L+
(3)
where L+ is the cost of the best tour.
• In Ant Colony System only the ant that generate the best tour is allowed to globally
update the pheromone. The global update rule is applied to the edges belonging to
the best tour. The correction rule is
τij (t + 1) = (1 − ρ)τij (t) + ρ∆τij (t),
(4)
where ∆τij (t) is the inverse cost of the best tour.
• In order to avoid stagnation we used the pheromone evaporation technique introduced in [12]. When the pheromone trail is over an upper bound τmax , the
pheromone trail is re-initialized. The pheromone evaporation is used after the global
pheromone update rule.
The RACS algorithm computes for a given time timemax a sub-optimal solution, the
optimal solution if it is possible and can be stated as follows in the pseudo-code description.
6
Representation and computational results
A graphic representation of Reinforcing Ant Colony System for solving GTSP is show in
Fig. 2. At the beginning, the ants are in their nest and will start to search food in a specific
area. Assuming that each cluster has specific food and the ants are capable to recognize
this, they will choose each time a different cluster. The pheromone trails will guide the
ants to the shorter path, a solution of GTSP, as in Fig. 2.
To evaluate the performance of the proposed algorithm, the RACS was compared to the
basic ACS algorithm for GTSP and furthermore to other heuristics from literature: Nearest
Neighbor (NN), a composite heuristic GI 3 and a random key-Genetic Algorithm [10, 11].
The numerical experiments that compare RACS with other heuristics used problems from
TSP library [9]. TSPLIB provides optimal objective values for each of the problems. Several
problems with Euclidean distances have been considered. The exact algorithm proposed in
section 3, is clearly outperformed by heuristics including RACS, because his running time
is exponential, while heuristics including RACS are polynomial time algorithms and provide
good sub-optimal solution for reasonable sizes of the problem.
To divide the set of nodes into subsets we used the procedure proposed in [4]. This
procedure sets the number of clusters m = [n/5], identifies the m farthest nodes from each
other, called centers, and assigns each remaining node to its nearest center. Obviously,
some real world problems may have different cluster structures, but the solution procedure
presented in this paper is able to handle any cluster structure.
The initial value of all pheromone trails, τ0 = 1/(n · Lnn ), where Lnn is the result
of Nearest Neighbor, (NN) algorithm. In NN algorithm the rule is always to go next to
the nearest as-yet-unvisited location. The corresponding tour traverses the nodes in the
constructed order. For the pheromone evaporation phase, let denote the upper bound with
τmax = 1/((1 − ρ)Lnn ).
The decimal values can be treated as parameters and can be changed if it is necessary.
The parameters for the algorithm are critical as in all other ant systems.
5
Figure 1: Pseudo-code: the Reinforcing Ant Colony System (RACS).
6
Figure 2: A graphic representation of the Generalized Traveling Salesman Problem
(GTSP) solved with an ant-based heuristic called Reinforcing Ant Colony System (RACS)
is illustrated. The first picture shows an ant starting from the nest to find food, going once
through each cluster and returning to the nest; all the ways are initialized with the same
τ0 pheromone quantity; after several iterations performed by each ant from the nest, the
solution is visible. The second picture shows a solution of Generalized Traveling Salesman
Problem (GTSP) represented by the largest pheromone trail (thick lines); the pheromone
is evaporating on all the other trails (gray lines).
Currently there is no mathematical analysis developed to give the optimal parameter in
each situation. In the ACS and RACS algorithm the values of the parameters were chosen
as follows: β = 5, ρ = 0.5, q0 = 0.5.
In table from Figure 3 we compare the computational results for solving the GTSP
using the ACS and RACS algorithm with the computational results obtained using NN,
GI 3 and random key-Genetic Algorithm mentioned above.
The columns in table from Figure 3 are as follows: Problem- the name of the test
problem; the first digits give the number of clusters (nc)and the last ones give the number
of nodes (n); Opt.val.-the optimal objective value for the problem [11]; ACS, RACS,
NN, GI 3 , GA- the objective value returned by ACS, RACS, NN, GI 3 and random-key
Genetic Algorithm.
The best solutions are in Table 3 in the bold format. All the solutions of ACS
and RACS are the average of five successively run of the algorithm, for each problem.
Termination criteria for ACS and RACS is given by the timemax the maximal computing
time set by the user; in this case ten minutes.
Table 3 shows that Reinforcing Ant Colony System performed well finding the optimal
solution in many cases. The results of RACS are better than the results of ACS. The
RACS algorithm for the Generalized Traveling Salesman Problem can be improved if more
appropriate values for the parameters are used. Also, an efficient combination with other
algorithms can potentially improve the results.
7
Figure 3: Reinforcing Ant Colony System (RACS) versus ACS, NN, GI 3 and GA.
8
7
Conclusion
The basic idea of ACS is that of simulating the behavior of a set of agents that cooperate
to solve an optimization problem by means of simple communications. The algorithm
introduced to solve the Generalized Traveling Salesman Problem, called Reinforcing Ant
Colony System, is an ACS-based algorithm with new correction rules.
The computational results of the proposed RACS algorithm are good and competitive
in both solution quality and computational time with the existing heuristics from the
literature [10, 11]. The RACS results can be improved by considering better values for the
parameters or combining the RACS algorithm with other optimization algorithms. Some
disadvantages have also been identified and they refer the multiple parameters used for
the algorithm and the high hardware resources requirements.
References
[1] Colorni, A., Dorigo, F., Maniezzo, V.: “Distributed Optimization by Ant Colonies”;
Proc. of ECAL-91-Euro. Conf. on Artif. Life, Paris, France, Elsevier Publishing,
(1991), 134–142.
[2] Dorigo, M.: “Optimization, Learning and Natural Algorithms”; (in Italian) Ph.D
thesis, Dipart. di Elettronica, Politecnico di Milano, Italy, (1992).
[3] Glover, F.W., Kochenberger, G.A.: “Handbook of Metaheuristics”; Kluwer, (2002).
[4] Fischetti, M., Gonzales, J.J.S, Toth, P.: “A Branch-and-Cut Algorithm for the Symmetric Generalized Travelling Salesman Problem”; Oper. Res. 45, 3 (1997), 378-394.
[5] Fischetti, M., Gonzales, J.J.S, Toth, P.: “The Generalized Traveling Salesman and
Orienteering Problem”; Kluwer, (2002).
[6] Laporte, G., Nobert, Y.: “Generalized traveling salesman problem through n sets of
nodes: An integer programming approach”; INFOR 21, 1 (1983), 61–75.
[7] Noon, C.E., Bean, J.C.: “A Lagrangian based approach for the asymmetric generalized traveling salesman problem”; Oper. Res. 39 (1991), 623–632.
[8] Pintea, C-M., Dumitrescu, D.:“Improving ant systems using a local updating rule.“
Proceedings. IEEE Computer Society. International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) (2005) 295–299.
[9] Bixby, B., Reinelt, G.: “TSPLIB–a library of travelling salesman and related problem
instances”; (1995) http://nhse.cs.rice.edu/softlib/catalog/tsplib.html
[10] Renaud, J., Boctor, F.F.: “An efficient composite heuristic for the Symmetric Generalized Traveling Salesman Problem”; Euro. J. Oper.Res., 108, 3 (1998), 571–584.
[11] Snyder, L.V., Daskin, M.S.: “A Random-Key Genetic Algorithm for the Generalized
Traveling Salesman Problem”; INFORMS, San Antonio, TX (Nov.2000).
[12] Stützle, T., Hoos, H.H.: “The Max-Min Ant System and local search for the traveling
salesman problem”; Proc. Int. Conf. on Evol. Comp., IEEE Press, Piscataway, NJ,
(1997) 309–314.
9
| 9cs.NE
|
Notes on Pure Dataflow Matrix Machines
arXiv:1610.00831v1 [cs.PL] 4 Oct 2016
Programming with Self-referential Matrix Transformations
Michael Bukatin
Steve Matthews
Andrey Radul
HERE North America LLC
Burlington, Massachusetts, USA
[email protected]
Department of Computer Science
University of Warwick
Coventry, UK
[email protected]
Project Fluid
Cambridge, Massachusetts, USA
[email protected]
Abstract
the streams associated with all neuron outputs using the matrix controlling the DMM. This computation is linear and is potentially
quite global, as any neuron output in the net can contribute to any
neuron input in the net.
DMMs described in the literature are heavily typed. One normally defines a finite collection of allowed kinds of linear streams,
and a finite collection of allowed types of neurons. These two collections are called the DMM signature. One considers a particular
fixed signature. Then one assumes the address space accommodating a countable number of neurons of each type, and then a DMM
is determined by a countable-sized matrix of connectivity weights
(one normally assumes that only a finite number of those weights
are non-zero at any given moment of time).
In particular, DMMs can be equipped with powerful reflection
facilities. Include in the signature the kind of streams of matrices
shaped in such a fashion as to be capable of describing a DMM over
this signature. Then designate a particular neuron, Self, working
as an accumulator of matrices of this shape, and agree that the most
recent output of this neuron will be used at the “down movement”
of each step as the matrix controlling the calculations of all neuron
inputs from all neuron outputs.
Dataflow matrix machines are self-referential generalized recurrent
neural nets. The self-referential mechanism is provided via a stream
of matrices defining the connectivity and weights of the network
in question. A natural question is: what should play the role of
untyped lambda-calculus for this programming architecture? The
proposed answer is a discipline of programming with only one kind
of streams, namely the streams of appropriately shaped matrices.
This yields pure dataflow matrix machines which are networks
of transformers of streams of matrices capable of defining a pure
dataflow matrix machine.
Categories and Subject Descriptors
guages
General Terms
Keywords
software
D [3]: 2—Data-flow lan-
higher-order programming, dataflow
continuous deformation of software, self-referential
1. Introduction
The purpose of these notes is to contribute to the theoretical understanding of dataflow matrix machines.
Dataflow matrix machines (DMMs) arise in the context of synchronous dataflow programming with linear streams, i.e. streams
equipped with an operation of taking a linear combinations of several streams [2].
This is a new general-purpose programming architecture with
interesting properties. One of these properties is that large classes
of programs are parametrized by matrices of numbers. In this aspect
DMMs are similar to recurrent neural nets and, in fact, they can be
considered to be a very powerful generalization of recurrent neural
nets [3, 4].
Just like recurrent neural nets, DMMs are essentially “twostroke engines”. On the “up movement” the built-in neuron transformations compute the next elements of the streams associated
with the neuron outputs from the streams associated with neuron
inputs. This computation is local to the neuron in question and is
generally nonlinear. On the “down movement”, the next elements
of the streams associated with all neuron inputs are computed from
Pure Dataflow Matrix Machines - Version 1.0
1.1 One Kind of Streams
DMMs seem to be a powerful programming platform. In particular,
it is convenient to manually write general-purpose software as
DMMs. At the same time the options to automatically synthesize
DMMs by synthesizing the matrices in question are available.
However, DMMs are a bit too unwieldy for a theoretical investigation.
From the theoretical viewpoint, it is inconvenient that there are
many kinds of streams. It is also inconvenient that one needs to fix
a signature, and that the parametrization by matrices is valid only
for this fixed signature.
So a question naturally arises: What would be the equivalent of
untyped lambda-calculus for dataflow matrix machines?
One of the principles of untyped lambda-calculus: one data type
is enough, namely the type of programs. All data can be expressed
as programs.
The equivalent of this principle for DMMs would be to have
only one kind of streams: streams of matrices, where a matrix is so
shaped as to be able to define a DMM which would be a network
of transformers of streams of matrices (see Section 4 for details).
Instead of string rewriting, a number of streams of matrices are
unfolding in time in this approach.
So all data are to be expressed as countably-infinite matrices of
numbers under this approach (see Section 5), just like all data must
be expressed as lambda-terms in the untyped lambda-calculus.
1
2018/1/13
1.2 One Signature
order constructions continuous, in particular, in making spaces of
programs continuous. Denotationally, the continuous domains representing the meaning of programs are common. But operationally,
we tend to fall back onto discrete schemas.
Dataflow matrix machines are seeking to change that and to provide programming facilities using continuous programs and continuous deformations of programs on the level of operational semantics and of implementation. This can be done both for discrete time
and discrete index spaces (countably-sized matrices of computational elements), and, potentially, for continuous time and continuous index spaces for computational elements.
The oldest electronic continuous platform is electronic analog
computers. The analog program itself, however, is very discrete,
because this kind of machine has a number of single-contact sockets and for every pair of such sockets there is an option to connect
them via a patch cord, or not to connect them.
Among dataflow architectures oriented towards handling the
streams of continuous data one might mention LabVIEW [8] and
Pure Data (e.g. [5]). In both cases, the programs themselves are
quite discrete.
The computational platform which should be discussed in more
details in this context is recurrent neural networks. Turing universality of recurrent neural networks is known for at least 30
years [16, 18].
However, together with many other useful and elegant Turinguniversal computational systems, recurrent neural networks do not
constitute a convenient general-purpose programming platform, but
belong to the class of esoteric programming languages (see [3, 4]
for detailed discussion of that).
Interestingly enough, whether recurrent neural networks understood as programs are discrete or continuous depends on how one
approaches the representation of network topology. If one treats the
network connectivity as a graph, and thinks about this graph as a
discrete data structure, then recurrent neural networks themselves
are discrete.
If one states instead that the network connectivity is always the
complete graph, and that the topology is defined by some of the
weights being zeros, then recurrent neural networks themselves are
continuous.
The most frequent case is borderline. One considers a recurrent
neural net to be defined by the matrix of weights, and therefore to
be continuous, however there are auxiliary discrete structures, e.g.
the matrix of weights is often a sparse matrix, and so a dictionary
of nonzero weights comes into play. Also a language used in describing the network or its implementation comes into play as an
auxiliary discrete structure.
Dataflow matrix machines belong to this borderline case. In particular, the use of sparse matrices is inevitable, because the matrices in question are countable-sized matrices with finite number of
nonzero elements.
Choosing a fixed selection of types of neurons seems too difficult at
the moment. For the time being we would like to retain the ability
to add arbitrary types of neurons to our DMMs.
So instead of selecting a fixed canonical signature, we assume
that there is an underlying language allowing to describe countable
collection of neuron types in such a fashion that all neuron types of
interest can be expressed in that language.
Then assume that all neuron types described by all neuron
type expressions in the underlying language are in the signature.
Assume that our address space is structured in such a way as
to accommodate countable number of neurons for each type of
neurons (see Section 4). Since we have a countable collection
of expressions describing neuron types, our overall collection of
neurons is still countable, and the matrix describing the rules to
recompute neuron inputs from the neuron outputs is still countable.
So, now we have a parametrization by countable matrices of
numbers across all DMMs, and not just across DMMs with a
particular fixed signature.
1.3 Accumulators Revised
The notion of accumulator plays a key role in a number of DMM
constructions including the reflection facility Self.
The most standard version is a neuron performing an identity
transform of its vector input, x, to its vector output, y, of the same
kind. One sets the weight of the recurrent connection from y to x to
1, and then the neuron accumulates contributions of other neurons
connected to x with nonzero weights.
So, at each step the accumulator neuron in effect performs
v := v + ∆v operation. However, it is somewhat of abuse of the
system of kinds of streams to consider v and ∆v as belonging to
the same space, and we’ll see evidence that to do so is a suboptimal
convention later in the paper.
So, what we do, first of all, is that we equip the accumulator
neuron with another input, where ∆v is collected. Then the body
of the neuron computes the sum of v and ∆v, instead of just
performing the identity transform (see Section 6 for more details).
In the situations, where one has multiple kinds of linear streams,
one would often want to assign different kinds to v and to ∆v
(although in other situations one would still use the same kind for
the both of them, effectively considering ∆v to be 0 + ∆v).
1.4 Structure of the Paper
In Section 2 we discuss continuous models of computation and
their higher-order aspects. In Section 3 we juxtapose string rewriting with stream-based approaches to higher-order programming. In
Section 4 we discuss the language of indexes of the network matrix
and how to accommodate countable number of neuron types within
one signature. In Section 5 we discuss representation of constants
and vectors as matrices.
Section 6 provides two examples where it is natural to split the
accumulator input into v and ∆v. One such example comes from
the neuron Self controlling the network matrix. Another example
(Section 6.1) is more involved and requires us to revisit domain
theory in the context of linear models of computation. This is
a bitopological setting, more specifically, bi-continuous domains,
allowing for both monotonic and anti-monotonic inference, and
this is the setting where approximations spaces tend to become
embedded into vector spaces, which is where the connection with
linear models of computation comes into play.
3. Higher-order Programming: String Rewriting
vs. Stream-based Approach
There are several approaches to higher-order stream-based programming. The most popular approach starts with standard higherorder functional programming and focuses on integrating streambased programming into that standard paradigm. The theoretical
underpinning of this approach is lambda-calculus and string rewriting (e.g. [7]).
The dataflow community produced purely stream-based approaches to higher-order programming. One of those approaches
which should be mentioned is an approach based on multidimensional streams [19].
2. Continuous Models of Computation
The history of continuous models of computation is actually quite
long. Where the progress was more limited was in making higher-
Pure Dataflow Matrix Machines - Version 1.0
2
2018/1/13
For any field name Iti , the concatenation t+ @ +Iti + \ +s
is the name of the corresponding neuron input. For any field
name Otj , the concatenation t+ @ +Otj + % +s is the name of
the corresponding neuron output. For every such pair of indices,
(t1 + @ +It1 i + \ +s1 , t2 + @ +Ot2 j + % +s2 ), there is a matrix
element in our matrices under consideration.
To summarize: in this approach the class of pure dataflow matrix
machines is implicitly parametrized by a sufficiently universal language LT describing all types of neurons taken to be of potential
interest together with their associated built-in stream transformations.
For details of DMM functioning see Sections 3.3 and 3.4 of [3].
The approach which we adopt in this paper is based on the
notion of streams of programs. An early work which should be
mentioned in connection with this approach is [15]. An argument
in favor of this approach for programming with linear streams was
presented in Section 3 of [2].
Among recent papers exploring various aspects of the approach
based on the notion of streams of programs are [3, 4, 13]. One of
the goals of the present paper is to show that this approach can
play the role in synchronous dataflow programming with linear
streams comparable to the role played by untyped lambda-calculus
in functional programming.
4. DMM Address Space: Language of Indices
5. Constants and Vectors as Matrices
When one has a countable-sized matrix, it is often more convenient
to index its rows and columns by finite strings over a fixed finite
alphabet than by numbers. There is no principal difference, but
this choice discourages focusing on an arbitrary chosen order, and
encourages semantically meaningful names for the indices.
Here we explain how the construction promised in Section 1.2
works.
To implement the program outlined in Section 1.1 one needs to express the most important linear streams, such as streams of numbers
(scalars), streams of matrix rows and streams of matrix columns,
and other frequently used streams of vectors as streams of matrices. As indicated in [3, 4], one of the key uses of scalars and also
of matrix rows and columns is their use as multiplicative masks.
The ability to use scalars as multiplicative masks needs to be
preserved when those scalars are represented by matrices. For example, if we have a neuron which takes an input stream of scalars a
and an input stream of matrices M , and produces an output stream
of matrices a ∗ M , then we still need to be able to reproduce this
functionality when scalars a are represented by matrices of the
same shape as matrix M .
The most straightforward way to do this is to have a neuron which takes two input streams of matrices and performs their
element-wise multiplication (Hadamard product, sometimes also
called the Schur product). If we chose the Hadamard product as
our main bilinear operation on matrices, then the scalar x must be
represented by the matrix all elements of which are equal to x.
4.1 Neuron Types
Define the notion of a type of neurons following the outline presented in Section 3.1 of [3] for multiple kinds of linear streams. We
only have one kind of linear streams in the present paper, so the
definition is simplified. A neuron type consists of a non-negative
integer input arity M , a positive integer output arity N , and a transformation describing how to map M input streams of matrices into
N output streams of matrices.
Namely associate with the neuron type in question a transformation F taking as inputs M streams of length t − 1 and producing
as outputs N streams of length t for integer time t > 0. Require
the obvious prefix condition that when F is applied to streams of
length t > 0, the first t elements of the output streams of length
t + 1 are the elements which F produces when applied to the prefixes of length t − 1 of the input streams. The most typical situation
is when for t > 1 the t’s elements of the output streams are produced solely on the basis of elements number t − 1 of the input
streams, but our definition also allows neurons to accumulate unlimited history, if necessary.
5.1 Matrices Admitting Finite Descriptions
One particular feature of this approach is that we can no longer
limit ourselves by matrices containing finite number of non-zero
elements, but we also need at least some infinite matrices admitting
finite descriptions.
This means that one needs a convention of what should be done
in case of incorrect operations, such as taking a scalar product
of two infinite vectors of all ones (or adding a matrix consisting
of all ones to Self). It seems likely that the technically easiest
convention in such cases would be to output zeros (or to reset the
network matrix to all zeros).
On the other hand, it is of interest to consider and study the
limits of sequences of finitely describable matrices, and a network
might be computing such a limit when t → ∞.
4.2 Language LT
In this section we are going to use several alphabets. Assume that
the following special symbols don’t belong to any of the other
alphabets: Σ∗ = {\%@}.
Assume that there is a language LT over alphabet ΣT , such that
finite strings from LTT ⊂ LT describe all neuron types of interest.
Call a string t the name of the neuron type it defines (we are not
worried about uniqueness of names for a type here). Assume that
the input arity of the type in question is Mt and the output arity
of the type in question is Nt . That for every integer i such that
0 < i ≤ Mt associate field name Iti from LT and for every integer
j such that 0 < j ≤ Nt associate field name Otj from LT , so that
i1 6= i2 implies Iti1 6= Iti2 and j1 6= j2 implies Otj1 6= Otj2 .
Also assume that there is an alphabet Σ0 with more than one
letter in it and any finite string s over Σ0 is a valid simple name.
5.2 Representing Matrix Rows and Columns as Matrices
Streams of matrix rows and streams of matrix columns also play
important roles in [3, 4]. Represent element y of a row by the corresponding matrix column all elements of which equal y. Represent element z of a column by the corresponding matrix row all
elements of which equal z.
Hence, rows are represented by matrices with equal values
along each column, and columns are represented by matrices with
equal values along each row.
Given matrix row α, denote by (↑ α) its representation as a
matrix. Given matrix column β, denote by (β → ) its representation
as a matrix. Given scalar x, denote by (↑ x→ ) its representation as
a matrix.
Respecting the MATLAB convention to denote the Hadamard
product by .*, we denote the Hadamard product of two matrices
4.3 Language of Indices
The following convention describes the address space for a countable number of neurons for each of the countable number of neuron
types of interest. The indexes are expressed by strings over the alphabet Σ∗ ∪ ΣT ∪ Σ0 . For any name of neuron type t ∈ LTT and
for any simple name s, the concatenation t+ @ +s is a name of a
neuron.
Pure Dataflow Matrix Machines - Version 1.0
3
2018/1/13
˙ while omitting the infix for matrix multiplication, AT B
by A∗B,
or AB T .
Note that because matrix rows correspond to neuron inputs and
matrix columns correspond to neuron outputs, one should always
think about these matrices as rectangular, and not as square matrices, so the transposition is always needed when performing the
standard matrix multiplication on these matrices.
In [3] a standard matrix update operation generalized from
several natural examples is proposed. Given a row α, two columns
β and γ (with the constraint that both β and γ have finite number
of nonzero elements),
P the matrix is updated by the formula aij :=
aij + γi ∗ αj ∗ k βk akj .
In terms of matrix representations what gets added to the net˙ ↑ α)∗(
˙ ↑ (β T A)).
work matrix A is (γ → )∗(
In Section 4 of [4] matrix rows and columns are used for subgraph selection. Consider a subset of neurons, and take α to be a
row with values 1 at the positions corresponding to the neuron outputs of the subset in question and zeros elsewhere, and take β to be
a column with values 1 at the positions corresponding to the neuron inputs of the subset in question and zeros elsewhere. Denote
˙
the element-wise matrix maximum as A⊔B.
The overall connectivity of the subgraph in question is ex˙ → ))∗A,
˙ while the internal connecpressed by the matrix ((↑ α)⊔(β
˙ → )∗A.
˙
tivity of this subgraph is (↑ α)∗(β
6.1 Partial Inconsistency Landscape and Warmus Numbers
Another example of why it is natural to have separate inputs for
v and ∆v in an accumulator comes from considering a scheme of
computation with Warmus numbers.
We have to explain first what are Warmus numbers and why
considering them and a particular scheme of computation in question is natural in this context.
6.1.1 Partial Inconsistency and Vector Semantics
In the presence of partial inconsistency approximation spaces tends
to become embedded into vector spaces. One well-known example
of this phenomenon is that if one allows negative values for probabilities, then probabilistic powerdomain is embedded into the space
of signed measures which is a natural setting for denotational semantics of probabilistic programs [12].
6.1.2 Warmus Numbers
Another example involves algebraic extension of interval numbers
with respect to addition. Interval numbers don’t form a group with
respect to addition. However one can extend them with pseudosegments [b, a] with the contradictory property a < b. For example,
[3,2] is a pseudosegment expressing an interval number with the
contradictory constraint that x ≥ 3 and at the same time x ≤ 2.
The so extended space of interval numbers is a group and a 2D
vector space over reals.
The first discovery of this construction known to us was made
by Mieczysław Warmus [20]. Since then it was rediscovered many
times. For a rather extensive bibliography related to those rediscoveries see [17].
5.3 Other Vectors as Matrices.
The most straightforward way to represent other finite-dimensional
vectors or countable-dimensional vectors with finite number of
nonzero elements in this setup is to represent them as matrix rows
as well. This means reserving a finite or countable number of
appropriately typed neurons to represent coordinates.
For example, to describe vectors representing characters in the
“1-of-N ” encoding which is standard in neural nets [10] one would
need to reserve neurons to represent the letters of the alphabet in
question.
6.1.3 Partial Inconsistency Landscape
There are a number of common motives which appear multiple
times in various studies of partial inconsistency, in particular,
bilattices, bitopology, bicontinuous domains, facilities for nonmonotonic and anti-monotonic inference, order-reversing involutions, etc. Together, these motives serve as focal elements of the
field of study which has been named the partial inconsistency landscape in [2].
In particular, the following situation is typical in the context of
bitopological groups. The two topologies, T and T −1 , are group
dual of each other (that is, the group inverse induces a bijection between the respective systems of open sets), and the antimonotonic group inverse is an order-reversing involution, which
is a bicontinuous map from (X, T, T −1 ) to its bitopological dual,
(X, T −1 , T ) [1].
Because approximation domains tend to become embedded
into vector spaces in this context, the setting of bicontinuous domains [11] equipped with two Scott topologies which tend to be
group dual of each other seems to be natural for semantic studies
of computations with linear streams.
6. Accumulators Revised
Here we continue the line of thought started in Section 1.3.
We give a couple of examples illustrating why it is natural to
have separate inputs for v and ∆v in an accumulator.
The main example is the neuron Self itself, producing the matrix controlling the network on the output, and taking additive updates to that matrix on the input. This is a countable-sized matrix
with finite number of nonzero elements, so it has to be represented
as a sparse matrix, e.g. via a dictionary of nonzero elements. A
typical situation is that the additive update on each time step is
small compared to the matrix itself (more specifically, the update is
typically small in the sense that the number of affected matrix elements is small compared to the overall number of nonzero matrix
elements).
So it does not make much sense to actually copy the output of
Self to its input of Self and perform the additive update there,
which is what should be done if the non-optimized definition of an
accumulator with one input is to be taken literally.
What should be done instead is that additive updates should be
added together at an input of Self, and then on the “up movement”
the Self should add the sum of those updates to the matrix it
accumulates.
So instead of hiding this logic as “implementation details”, it
makes sense to split the inputs of Self into x (with the output of
Self connected to x with weight 1, nothing else connected to x
with non-zero weight, and the copying of the output of Self to x
being a no-op) and ∆x accumulating the additive updates to Self.
Pure Dataflow Matrix Machines - Version 1.0
6.1.4 Computing with Warmus Numbers
Section 4 of [2] provides a detailed overview of the partial inconsistency landscape, including the bitopological and bilattice properties of Warmus numbers. It turns out that Warmus numbers play a
fundamental role in mathematics of partial inconsistency. In particular, Section 4.14 of that paper proposes a schema of computation
via monotonic evolution punctuated by order-reversing involutive
steps.
Computations with Warmus extension of interval numbers via
monotonic evolution punctuated by involutive steps are a good example of why the accumulators should have the asymmetry between v and ∆v.
If an accumulator neuron is to accumulate a monotonically
evolving Warmus number by accepting additive updates to that
4
2018/1/13
number, then the ∆x cannot be an arbitrary Warmus number, but it
must be a pseudosegment [b, a], such that a ≤ 0 ≤ b (the case of
a = b = 0 is allowed). Given that there is a constraint of this kind,
it is natural to want to accumulate ∆x contributions at a separate
input on the “down movement”, and to let the accumulator enforce
the constraint on the “up movement” (e.g. by ignoring requests for
non-monotonic updates). Yet another input might be added to trigger involutive steps (an involutive step in this context transforms
[d, c] into [c, d]). Alternatively, requests for non-monotonic updates
might trigger the involutions. Normally, the involution would be
triggered only if the accumulated number is already a pseudosegment, in which case the involution is an anti-monotonic step.
[10] A. Karpathy. The unreasonable effectiveness of recurrent neural networks, 2015.
http://karpathy.github.io/2015/05/21/rnn-effectiveness/.
[11] K. Keimel. Bicontinuous domains and some old problems in domain
theory. Electronic Notes in Theoretical Computer Science, 257:35–54,
2009.
[12] D. Kozen. Semantics of probabilistic programs. Journal of Computer
and System Sciences, 22(3):328–350, 1981.
[13] N. Krishnaswami. Higher-order reactive programming without spacetime leaks. ACM SIGPLAN Notices, 48(9):221–232, 2013.
[14] J. Lawson. Stably compact spaces. Mathematical Structures in
Computer Science, 21(1):125–169, 2011.
[15] S. Matthews. Adding second order functions to Kahn data flow.
Technical Report Research Report 189, University of Warwick, 1991.
http://www.dcs.warwick.ac.uk/report/pdfs/cs-rr-189.pdf.
[16] J. Pollack. On connectionist models of natural language processing.
PhD thesis, University of Illinois at Urbana-Champaign, 1987.
Chapter 4 is available at
http://www.demo.cs.brandeis.edu/papers/neuring.pdf .
6.1.5 Open Problem: Bicontinuous Reflexive Domains
Despite impressive progress in studies of bicontinuity and bitopology in the context of partial inconsistency landscape [9, 11, 12, 14],
the issues related to reflexive domains and solutions of recursive
domain equation in the context of bicontinuous domains and vector semantics don’t seem to be well understood.
Given that dataflow matrix machines equipped with self-referential facilities work directly on the level of vector spaces, one would
hope that the gap between operational and denotational descriptions would be more narrow in this case than for more traditional
situations such as untyped lambda-calculus.
[17] E. Popova. The arithmetic on proper & improper intervals (a repository of literature on interval algebraic extensions), 1996-2013.
http://www.math.bas.bg/~ epopova/directed.html.
[18] H. Siegelmann and E. Sontag. On the computational power of neural
nets. Journal of Computer and System Sciences, 50:132–150, 1995.
[19] W. Wadge. Higher-order Lucid. In R. Jagannathan, editor, Proceedings of the 4th International Symposium on Lucid and Intensional Programming, pages 62–69, 1991.
http://www.cse.unsw.edu.au/~ plaice/archive/WWW/1991/U-ISLIP91-LucidHigher.pdf .
7. Conclusion
Dataflow matrix machines work with arbitrary linear streams. In
this paper, we focus on the case of pure dataflow matrix machines,
which work with the single kind of linear streams, namely the
streams of matrices defining the connectivity patterns and weights
in pure DMMs themselves.
This allows us to pinpoint the key difference between pure
DMMs and recurrent neural networks: instead of working with
streams of numbers, pure dataflow matrix machines work with
streams of programs, with programs being represented as network
connectivity matrices.
[20] M. Warmus. Calculus of approximations. Bull. Acad. Pol. Sci., Cl. III,
4(5):253–259, 1956.
http://www.cs.utep.edu/interval-comp/warmus.pdf.
[21] G. Zhou, J. Wu, C. Zhang, and Z. Zhou. Minimal Gated Unit for Recurrent Neural Networks, 2016. http://arxiv.org/abs/1603.09420
A. Monotonic Evolution by Additions: Warmus
Numbers vs. Conventional Interval Numbers
Consider a sequence x ⊑ (x + x1 ) ⊑ (x + x1 + x2 ) ⊑ . . . of
elements, which are monotonically increasing and are obtained by
additive corrections from previous elements of the sequence.
S. Andima, R. Kopperman, and P. Nickolas. An asymmetric Ellis
If these are conventional interval numbers, this situation is only
theorem. Topology and Its Applications, 155:146–160, 2007.
possible for the trivial case of 0 = x1 = x2 = . . . , as addition
M. Bukatin and S. Matthews. Linear models of computation and
cannot reduce the degree of imprecision (self-distance) for conprogram learning. In G. Gottlob et al., editors, GCAI 2015, EasyChair
ventional interval numbers. It is not possible to perform nontrivial
Proceedings in Computing, vol. 36, pages 66–78, 2015.
http://easychair.org/publications/download/Linear_Models_of_Computation_and_Program_Learning . monotonic evolution of conventional interval numbers by adding
other interval numbers to previous elements of the sequence in
M. Bukatin, S. Matthews, and A. Radul. Dataflow matrix machines as
question.
programmable, dynamically expandable, self-referential generalized
For Warmus numbers, monotonic evolution by additive correcrecurrent neural networks, 2016. http://arxiv.org/abs/1605.05296.
tions is possible, provided that every additive correction summand
M. Bukatin, S. Matthews, and A. Radul. Programming patterns in
xi = [ai , bi ] is a pseudo-segment anti-approximating zero:
dataflow matrix machines and generalized recurrent neural nets, 2016.
[0, 0] ⊑ [ai , bi ], that is bi ≤ 0 ≤ ai .
http://arxiv.org/abs/1606.09470 .
References
[1]
[2]
[3]
[4]
[5] A. Farnell. Designing Sound. MIT Press, 2010.
B. Rectifiers and Quasi-metrics
[6] Fluid: Project “Fluid” github repository,
https://github.com/anhinga/fluid
Rectified linear unit (ReLU) is a neuron with the activation function
f (x) = max(0, x).
In the recent years, ReLU became the most popular neuron in
the context of non-recurrent deep networks. Whether it is equally
good for recurrent networks remains to be seen.
The activation function max(0, x) is an integral of the Heaviside step function. Lack of smoothness at 0 does not seem to interfere with gradient methods used during neural net training.
Interestingly enough, the standard quasi-metrics on reals associated with upper and lower topologies on reals are closely related
to ReLU: q1 (x, y) = f (x − y) = q2 (y, x).
[7] N. Goodman, V. Mansinghka, D. Roy, K. Bonawitz, and J. Tenenbaum. Church: a language for generative models. In Proc. of Uncertainty in Artificial Intelligence, 2008.
http://danroy.org/papers/church_GooManRoyBonTen-UAI-2008.pdf .
[8] W. Johnston, J. Hanna, and R. Millar. Advances in dataflow programming languages. ACM Computing Surveys, 36:1–34, 2004.
[9] A. Jung and M. Moshier.
On the bitopological nature
of Stone duality.
Technical Report CSR-06-13, School
of Computer Science, University of Birmingham, 2006.
http://www.cs.bham.ac.uk/∼axj/pub/papers/Jung-Moshier-2006-On-the-bitopological-nature-of-Stone-duality.pdf.
Pure Dataflow Matrix Machines - Version 1.0
5
2018/1/13
C. Linear and Bilinear Neurons in LSTM and
Gated Recurrent Unit Networks
bers, but a vector of M matrices M × N . This is what accounts for
factoring M 2 × N 2 dimension out.
Various schemas of recurrent networks with gates and memory
were found to be useful in overcoming the problem of vanishing
gradients in the training of recurrent neural networks, starting with
LSTM in 1997 and now including a variety of other schemas.
For a convenient compact overview of LSTM, gated recurrent
units networks, and related schemas see Section 2 of [21].
The standard way to describe LSTM and gated recurrent unit
networks is to think about them as networks of sigmoid neurons
augmented with external memory and gating mechanisms.
However, it is long understood (and is used in the present paper) that neurons with linear activation functions can be used as
accumulators to implement memory.
It is also known for at least 30 years that bilinear neurons (such
as neurons multiplying two inputs, each of those inputs accumulating linear combinations of output signals of other neurons) can
be used to modulate signals via multiplicative masks (gates) and to
implement conditional constructions in this fashion [16] (see also
Section 1.3.2 of [4]).
Looking at the formulas for LTSM and gated recurrent unit networks in Table 1 of [21] one can observe that instead of thinking
about these networks as networks of sigmoid neurons augmented
with external memory and gating mechanisms, one can describe
them simply as recurrent neural networks built from sigmoid neurons, linear neurons, and bilinear neurons, without any external
mechanisms.
When LTSM and gated recurrent unit networks are built as
recurrent neural networks from sigmoid neurons, linear neurons,
and bilinear neurons, some weights are variable and subject to
training, and some weights are fixed as zeros or ones to establish a
particular network topology.
D.2 Software Prototypes
We prototyped lightweight pure DMMs in Processing 2.2.1 in the
Lightweight Pure DMMs directory of Project Fluid, which is our
open source project dedicated to experiments with the computational architectures based on linear streams [6].
For simplicity we used numbers to index rows and columns of
the matrices, instead of using semantically meaningful strings we
recommend to use as indices for non-lightweight work.
In particular, we demonstrated during those experiments that
it is enough to consider a set of several constant update matrices together with our self-referential network update mechanism
described in the present paper to create oscillations of network
weights and waves of network connectivity patterns.
D.2.1 The aug 26 16 experiment directory
Assume that the neuron Self adds matrices X 0 and X 1 on the
“up movement” to obtain matrix Y 0 . Assume that at the starting
0
0
0
moment t = 0, Y0,0
= 1, Y0,j
= 0 for all j 6= 0, Y1,1
= 1,
0
Y1,j = 0 for all j 6= 1.
1
Assume that Y 1 is a constant matrix, such that Y0,j
= 0 for all
1
1
j, Y1.1 = −2, Y1,j = 0 for all j 6= 1.
The network starts with a “down movement”. After the first
“down movement”, X 0 becomes a copy of Y 0 , X 1 becomes a
copy of Y 1 , and after the first “up movement” at the time t = 1
0
0
Y1,1
changes sign: Y1,1
= −1.
After the second “down movement”, X 1 becomes minus Y 1 ,
1
X1,1
= 2, and after the second “up movement” at the time t = 2
0
0
Y1,1 changes sign again: Y1,1
= 1, etc.
Here we have obtained a simple oscillation of a network weight,
0
Y1,1
(the network matrix is Y 0 at any given moment of time).
D. Lightweight Pure Dataflow Matrix Machines
D.2.2 The aug 27 16 experiment directory
Pure dataflow matrix machines are countable-sized networks with
a finite part of the network being active at any given moment of
time. They process streams of countable-sized matrices with finite
number of non-zero elements,
Sometimes it is convenient to consider the case of networks
of finite size, with fixed number of inputs, M , and fixed number
of outputs, N . If we still would like those networks to process
streams of matrices describing network weights and topology, those
matrices would be finite rectangular matrices M × N .
We call the resulting class of networks Lightweight Pure
DMMs. If we work with reals of limited precision and consider
fixed values of M and N , the resulting class is not Turing-universal,
as its memory space is finite. However, it is often useful to consider
this class for didactic purposes, as both theoretical constructions
and software prototypes tend to be simpler in this case, while many
computational effects can already be illustrated in this generality.
Here instead of Y 1 we take a collection of constant update matrices,
Y j1 , . . . Y jn . Just like in the previous example, make sure that the
first rows (indexed by 0) of those matrices are 0. For the second
j1
j1
rows (indexed by 1), take Y1,j
= −1, Y1,j
= 1,
1
2
j
j
j2
j2
n−1
= 1,
Y1,j2 = −1, Y1,j3 = 1, . . . , Y1,jn−1 = −1, Y1,jn−1
n
jn
jn
Y1,j
=
−1,
Y
=
1,
and
the
rest
of
the
elements
of the second
1,j1
n
rows of these matrices are 0.
Start at t = 0 with Y 0 matrix having the first row as before, and the second row containing the only non-zero element
0
Y1,j
= 1. Then one can easily see (or verify by downloading
1
and running under Processing 2.2.1 the open source software in
the Lightweight Pure DMMs/aug 27 16 experiment directory
of the Project Fluid [6]) that at the moment t = 1 the only non-zero
0
element in the second row of Y 0 is Y1,j
= 1, at the moment t = 2
2
0
the only non-zero element in the second row of Y 0 is Y1,j
= 1,
3
and so on until at the moment t = n this wave of network connec0
tivity pattern loops back to Y1,j
= 1, and then continues looping
1
indefinitely through these n states.
D.1 Dimension of the Network Operators
The network has N outputs, each of which is a matrix M × N ,
hence the overall dimension of the output space is M × N 2 .
The network has M inputs, each of which is a matrix M × N ,
hence the overall dimension of the input space is M 2 × N .
So, overall the dimension of space of all possible linear operators from outputs to inputs (which could potentially be used during
the “down movement”) is M 3 × N 3 . However, our model actually
uses matrices of the dimension M × N during the “down movement”, so only a subspace of dimension M × N of the overall
space of all possible linear operators of the dimension M 3 × N 3
is allowed. The matrix is applied not to a vector of numbers, but to
a vector of N matrices M × N , and yields not a vector of num-
Pure Dataflow Matrix Machines - Version 1.0
D.2.3 Final remarks
A. The actual implementation of Self in the prototype enforces
0
0
the constraint that Y0,0
= 1, Y0,j
= 0 for all j 6= 0.
B. By making the update matrices dynamically dependent upon
e.g. input symbols, one could embed an arbitrary deterministic
finite automaton into this control mechanism in this fashion.
6
2018/1/13
| 6cs.PL
|
Accepted as a workshop contribution at ICLR 2015
L EARNING L ONGER M EMORY IN
R ECURRENT N EURAL N ETWORKS
arXiv:1412.7753v2 [cs.NE] 16 Apr 2015
Tomas Mikolov, Armand Joulin, Sumit Chopra, Michael Mathieu & Marc’Aurelio Ranzato
Facebook Artificial Intelligence Research
770 Broadway
New York City, NY, 10003, USA
{tmikolov,ajoulin,spchopra,myrhev,ranzato}@fb.com
A BSTRACT
Recurrent neural network is a powerful model that learns temporal patterns in sequential data. For a long time, it was believed that recurrent networks are difficult
to train using simple optimizers, such as stochastic gradient descent, due to the
so-called vanishing gradient problem. In this paper, we show that learning longer
term patterns in real data, such as in natural language, is perfectly possible using
gradient descent. This is achieved by using a slight structural modification of the
simple recurrent neural network architecture. We encourage some of the hidden
units to change their state slowly by making part of the recurrent weight matrix
close to identity, thus forming a kind of longer term memory. We evaluate our
model on language modeling tasks on benchmark datasets, where we obtain similar performance to the much more complex Long Short Term Memory (LSTM)
networks (Hochreiter & Schmidhuber, 1997).
1
I NTRODUCTION
Models of sequential data, such as natural language, speech and video, are the core of many machine
learning applications. This has been widely studied in the past with approaches taking their roots in
a variety of fields (Goodman, 2001b; Young et al., 1997; Koehn et al., 2007). In particular, models
based on neural networks have been very successful recently, obtaining state-of-the-art performances
in automatic speech recognition (Dahl et al., 2012), language modeling (Mikolov, 2012) and video
classification (Simonyan & Zisserman, 2014). These models are mostly based on two families of
neural networks: feedforward neural networks and recurrent neural networks.
Feedforward architectures such as time-delayed neural networks usually represent time explicitly
with a fixed-length window of the recent history (Rumelhart et al., 1985). While this type of models
work well in practice, fixing the window size makes long-term dependency harder to learn and can
only be done at the cost of a linear increase of the number of parameters.
The recurrent architectures, on the other hand, represent time recursively. For example, in the simple
recurrent network (SRN) (Elman, 1990), the state of the hidden layer at a given time is conditioned
on its previous state. This recursion allows the model to store complex signals for arbitrarily long
time periods, as the state of the hidden layer can be seen as the memory of the model. In theory, this
architecture could even encode a “perfect” memory by simply copying the state of the hidden layer
over time.
While theoretically powerful, these recurrent models were widely considered to be hard to train due
to the so-called vanishing and exploding gradient problems (Hochreiter, 1998; Bengio et al., 1994).
Mikolov (2012) showed how to avoid the exploding gradient problem by using simple, yet efficient
strategy of gradient clipping. This allowed to efficiently train these models on large datasets by using
only simple tools such as stochastic gradient descent and back-propagation through time (Williams
& Zipser, 1995; Werbos, 1988).
Nevertheless, simple recurrent networks still suffer from the vanishing gradient problem: as gradients are propagated back through time, their magnitude will almost always exponentially shrink.
This makes memory of the SRNs focused only on short term patterns, practically ignoring longer
1
Accepted as a workshop contribution at ICLR 2015
term dependencies. There are two reasons why this happens. First, standard nonlinearities such as
the sigmoid function have a gradient which is close to zero almost everywhere. This problem has
been partially solved in deep networks by using the rectified linear units (ReLu) (Nair & Hinton,
2010). Second, as the gradient is backpropagated through time, its magnitude is multiplied over
and over by the recurrent matrix. If the eigenvalues of this matrix are small (i.e., less than one), the
gradient will converge to zero rapidly. Empirically, gradients are usually close to zero after 5 - 10
steps of backpropagation. This makes it hard for simple recurrent neural networks to learn any long
term patterns.
Many architectures were proposed to deal with the vanishing gradients. Among those, the long short
term memory (LSTM) recurrent neural network (Hochreiter & Schmidhuber, 1997) is a modified
version of simple recurrent network which has obtained promising results on hand writing recognition (Graves & Schmidhuber, 2009) and phoneme classification (Graves & Schmidhuber, 2005).
LSTM relies on a fairly sophisticated structure made of gates which control flow of information to
hidden neurons. This allows the network to potentially remember information for longer periods.
Another interesting direction which was considered is to exploit the structure of the Hessian matrix
with respect to the parameters to avoid vanishing gradients. This can be achieved by using secondorder methods designed for non-convex objective functions (see section 7 in LeCun et al. (1998)).
Unfortunately, there is no clear theoretical justification why using the Hessian matrix would help,
nor there is, to the best of our knowledge, any conclusive thorough empirical study on this topic.
In this paper, we propose a simple modification of the SRN to partially solve the vanishing gradient
problem. In Section 2, we demonstrate that by simply constraining a part of the recurrent matrix
to be close to identity, we can drive some hidden units, called context units to behave like a cache
model which can capture long term information similar to the topic of a text (Kuhn & De Mori,
1990). In Section 3, we show that our model can obtain competitive performance compared to the
state-of-the-art sequence prediction model, LSTM, on language modeling datasets.
2
2.1
M ODEL
S IMPLE RECURRENT NETWORK
yt
yt
R
U
ht
U
R
V
P
ht
A
A
st
↵
B
xt
xt
(a)
(b)
Figure 1: (a) Simple recurrent network. (b) Recurrent network with context features.
We consider sequential data that comes in the form of discrete tokens, such as characters or words.
We assume a fixed dictionary containing d tokens. Our goal is to design a model which is able to
predict the next token in the sequence given its past. In this section, we describe the simple recurrent
network (SRN) model popularized by Elman (1990), and which is the cornerstone of this work.
A SRN consists of an input layer, a hidden layer with a recurrent connection and an output layer
(see Figure 1-a). The recurrent connection allows the propagation through time of information
about the state of the hidden layer. Given a sequence of tokens, a SRN takes as input the one-hot
encoding xt of the current token and predicts the probability yt of next one. Between the current
token representation and the prediction, there is a hidden layer with m units which store additional
information about the previous tokens seen in the sequence. More precisely, at each time t, the state
2
Accepted as a workshop contribution at ICLR 2015
of the hidden layer ht is updated based on its previous state ht−1 and the encoding xt of the current
token, according to the following equation:
ht = σ (Axt + Rht−1 ) ,
(1)
where σ(x) = 1/(1 + exp(x)) is the sigmoid function applied coordinate wise, A is the d × m
token embedding matrix and R is the m × m matrix of recurrent weights. Given the state of these
hidden units, the network then outputs the probability vector yt of the next token, according to the
following equation:
yt = f (U ht ) ,
(2)
where f is the soft-max function and U is the m × d output matrix. In some cases, the size d of the
dictionary can be significant (e.g., more than 100K tokens for standard language modeling tasks)
and computing the normalization term of the soft-max function is often the bottle-neck of this type
of architecture. A common trick introduced in Goodman (2001a) is to replace the soft-max function
√
by a hierarchical soft-max. We use a simple hierarchy with two levels, by binning the tokens into d
clusters with same cumulative word frequency (Mikolov√et al., 2011). This reduces the complexity
of computing the soft-max from O(hd) to about O(h d), but at the cost of lower performance
(around 10% loss in perplexity). We will mention explicitly when we use this approximation in the
experiments.
The model is trained by using stochastic gradient descent method with back-propagation through
time (Rumelhart et al., 1985; Williams & Zipser, 1995; Werbos, 1988). We use gradient renormalization to avoid gradient explosion. In practice, this strategy is equivalent to gradient clipping since
gradient explosions happen very rarely when reasonable hyper-parameters are used. The details of
the implementation are given in the experiment section.
It is generally believed that using a strong nonlinearity is necessary to capture complex patterns
appearing in real-world data. In particular, the class of mapping that a neural network can learn
between the input space and the output space depends directly on these nonlinearities (along with
the number of hidden layers and their sizes). However, these nonlinearities also introduce the socalled vanishing gradient problem in recurrent networks. The vanishing gradient problem states
that as the gradients get propagated back in time, their magnitude quickly shrinks close to zero.
This makes learning longer term patterns difficult, resulting in models which fail to capture the
surrounding context. In the next section, we propose a simple extension of SRN to circumvent this
problem, yielding a model that can retain information about longer context.
2.2
C ONTEXT FEATURES
In this section, we propose an extension of SRN by adding a hidden layer specifically designed to
capture longer term dependencies. We design this layer following two observations: (1) the nonlinearity can cause gradients to vanish, (2) a fully connected hidden layer changes its state completely
at every time step.
SRN uses a fully connected recurrent matrix which allows complex patterns to be propagated
through time but suffers from the fact that the state of the hidden units changes rapidly at every
time step. On the other hand, using a recurrent matrix equal to identity and removing the nonlinearity would keep the state of the hidden layer constant, and every change of the state would have to
come from external inputs. This should allow to retain information for longer period of time. More
precisely, the rule would be:
st = st−1 + Bxt ,
(3)
where B is the d × s context embedding matrix. This solution leads to a model which cannot be
trained efficiently. Indeed, the gradient of the recurrent matrix would never vanish, which would
require propagation of the gradients up to the beginning of the training set.
Many variations around this type of memory have been studied in the past (see Mozer (1993) for
an overview of existing models). Most of these models are based on SRN with no off-diagonal
3
Accepted as a workshop contribution at ICLR 2015
recurrent connections between the hidden units. They differ in how the diagonal weights of the
recurrent matrix are constrained. Recently, Pachitariu & Sahani (2013) showed that this type of
architecture can achieve performance similar to a full SRN when the size of the dataset and of
the model are small. This type of architecture can potentially retain information about longer term
statistics, such as the topic of a text, but it does not scale well to larger datasets (Pachitariu & Sahani,
2013). Besides, it can been argued that purely linear SRNs with learned self-recurrent weights
will perform very similarly to a combination of cache models with different rates of information
decay (Kuhn & De Mori, 1990). Cache models compute probability of the next token given a bagof-words (unordered) representation of longer history. They are well known to perform strongly
on small datasets (Goodman, 2001b). Mikolov & Zweig (2012) show that using such contextual
features as additional inputs to the hidden layer leads to a significant improvement in performance
over the regular SRN. However in their work, the contextual features are pre-trained using standard
NLP techniques and not learned as part of the recurrent model.
In this work, we propose a model which learns the contextual features using stochastic gradient
descent. These features are the state of a hidden layer associated with a diagonal recurrent matrix
similar to the one presented in Mozer (1993). In other words, our model possesses both a fully connected recurrent matrix to produce a set of quickly changing hidden units, and a diagonal matrix that
that encourages the state of the context units to change slowly (see the detailed model in Figure 1b). The fast layer (called hidden layer in the rest of this paper) can learn representations similar to
n-gram models, while the slowly changing layer (called context layer) can learn topic information,
similar to cache models. More precisely, denoting by st the state of the p context units at time t, the
update rules of the model are:
st
ht
yt
= (1 − α)Bxt + αst−1 ,
= σ (P st + Axt + Rht−1 ) ,
= f (U ht + V st )
(4)
(5)
(6)
where α is a parameter in (0, 1) and P is a p×m matrix. Note that there is no nonlinearity applied to
the state of the context units. The contextual hidden units can be seen as an exponentially decaying
bag of words representation of the history. This exponential trace memory (as denoted by Mozer
(1993)) has been already proposed in the context of simple recurrent networks (Jordan, 1987; Mozer,
1989).
A close idea to our work is to use so-called ”leaky integration” neurons (Jaeger et al., 2007), which
also forces the neurons to change their state slowly, however without the structural constraint of
SCRN. It was evaluated on the same dataset as we use further (Penn Treebank) by Bengio et al.
(2013). Interestingly, the results we observed in our experiments show much bigger gains over
stronger baseline using our model, as will be shown later.
Alternative Model Interpretation. If we consider the context units as additional hidden units
(with no activation function), we can see our model as a SRN with a constrained recurrent matrix
M on both hidden and context units:
M=
R
0
P
αIp
,
(7)
where Ip is the identity matrix and M is a square matrix of size m + p, i.e., the sum of the number
of hidden and context units. This reformulation shows explicitly our structural modification of the
Elman SRN (Elman, 1990): we constrain a diagonal block of the recurrent matrix to be equal to a
reweighed identity, and keep an off-diagonal block equal to 0. For this reason, we call our model
Structurally Constrained Recurrent Network (SCRN).
Adaptive Context Features. Fixing the weight α to be constant in Eq. (4) forces the hidden units
to capture information on the same time scale. On the other hand, if we allow this weight to be
learned for each unit, we can potentially capture context from different time delays (Pachitariu &
Sahani, 2013). More precisely, we denote by Q the recurrent matrix of the contextual hidden layer,
and we consider the following update rule for the state of the contextual hidden layer st :
4
Accepted as a workshop contribution at ICLR 2015
st = (I − Q)Bxt + Qst−1 ,
(8)
where Q is a diagonal matrix with diagonal elements in (0, 1). We suppose that these diagonal
elements are obtained by applying a sigmoid transformation to a parameter vector β, i.e., diag(Q) =
σ(β). This parametrization naturally forces the diagonal weights to stay strictly between 0 and 1.
We study in the following section in what situations does learning of the weights help. Interestingly,
we show that learning of the self-recurrent weights does not seem to be important, as long as one
uses also the standard hidden layer in the model.
3
E XPERIMENTS
We evaluate our model on the language modeling task for two datasets. The first dataset is the Penn
Treebank Corpus, which consists of 930K words in the training set. The pre-processing of data and
division to training, validation and test parts are the same as in (Mikolov et al., 2011). The state-ofthe-art performance on this dataset has been achieved by Zaremba et al. (2014), using combination
of many big, regularized LSTM recurrent neural network language models. The LSTM networks
were first introduced to language modeling by Sundermeyer et al. (2012).
The second dataset, which is moderately sized, is called Text8. It is composed of a pre-processed
version of the first 100 million characters from Wikipedia dump. We did split it into training part
(first 99M characters) and development set (last 1M characters) that we use to report performance.
After that, we constructed the vocabulary and replaced all words that occur less than 5 times by
<UNK> token. The resulting vocabulary size is about 44K. To simplify reproducibility of our
results, we released both the SCRN code and the scripts which construct the datasets 1 .
In this section we compare the performance of our proposed model against standard SRNs, and
LSTM RNNs which are becoming the architecture of choice for modeling sequential data with
long-term dependencies.
3.1
I MPLEMENTATION D ETAILS .
We used Torch library and implemented our proposed model following the graph given in Figure
1-b. Note that following the alternative interpretation of our model with the recurrent matrix defined
in Eq. 8, our model could be simply implemented by modifying a standard SRN. We fix α at 0.95
unless stated otherwise. The number of backpropagation through time (BPTT) steps is set to 50 for
our model and was chosen by parameter search on the validation set. For normal SRN, we use just
10 BPTT steps because the gradients vanish faster. We do a stochastic gradient descent after every
5 forward steps. Our model is trained with a batch gradient descent of size 32, and a learning rate of
0.05. We divide the learning rate by 1.5 after each training epoch when the validation error does not
decrease.
3.2
R ESULTS ON P ENN T REEBANK C ORPUS .
We first report results on the Penn Treebank Corpus using both small and moderately sized models
(with respect to the number of hidden units). Table 1 shows that our structurally constrained recurrent network (SCRN) model can achieve performance comparable with LSTM models on small
datasets with relatively small numbers of parameters. It should be noted that the LSTM models have
significantly more parameters for the same size of hidden layer, making the comparison somewhat
unfair - with the input, forget and output gates, the LSTM has about 4x more parameters than SRN
with the same size of hidden layer.
Comparison to ”leaky neurons” is also in favor of SCRN: Bengio et al. (2013) report perplexity
reduction from 136 (SRN) to 129 (SRN + leaky neurons), while for the same dataset, we observed
much bigger improvement, going from perplexity 129 (SRN) down to 115 (SCRN).
Table 1 also shows that SCRN outperforms the SRN architecture even with much less parameters.
This can be seen by comparing performance of SCRN with 40 hidden and 10 contextual units (test
1
The SCRN code can be downloaded at http://github.com/facebook/SCRNNs
5
Accepted as a workshop contribution at ICLR 2015
perplexity 127) versus SRN with 300 hidden units (perplexity 129). This suggests that imposing
a structure on the recurrent matrix allows the learning algorithm to capture additional information.
To obtain further evidence that this additional information is of a longer term character, we did
further run experiments on the Text8 dataset that contains various topics, and thus the longer term
information affects the performance on this dataset much more.
Model
Ngram
Ngram + cache
SRN
SRN
SRN
LSTM
LSTM
LSTM
SCRN
SCRN
SCRN
SCRN
#hidden
50
100
300
50
100
300
40
90
100
300
#context
10
10
40
40
Validation Perplexity
153
137
133
129
120
123
133
124
120
120
Test Perplexity
141
125
144
129
129
123
115
119
127
119
115
115
Table 1: Results on Penn Treebank Corpus: n-gram baseline, simple recurrent nets (SRN), long
short term memory RNNs (LSTM) and structurally constrained recurrent nets (SCRN). Note that
LSTM models have 4x more parameters than SRNs for the same size of hidden layer.
3.2.1
L EARNING S ELF -R ECURRENT W EIGHTS .
We evaluate influence of learning the diagonal weights of the recurrent matrix for the contextual
layer. For the following experiments, we used a hierarchical soft-max with 100 frequency-based
classes on the Penn Treebank Corpus to speedup the experiments. In Table 2, we show that when
the size of the hidden layer is small, learning the diagonal weights is crucial. This result confirms
the findings in Pachitariu & Sahani (2013). However, as we increase the size of our model and use
sufficient number of hidden units, learning of the self-recurrent weights does not give any significant
improvement. This indicates that learning the weights of the contextual units allows these units to
be used as multi-scale representation of the history, i.e., some contextual units can specialize on the
very recent history (for example, for α close to 0, the contextual units would be part of a simple
bigram language model). With various learned self-recurrent weights, the model can be seen as a
combination of cache and bigram models. When the number of standard hidden units is enough to
capture short term patterns, learning the self-recurrent weights does not seem crucial anymore.
Keeping this observation in mind we fixed the diagonal weights when working with the Text8 corpus.
Model
SCRN
SCRN
SCRN
SCRN
SCRN
SCRN
#hidden
50
25
0
140
100
0
#context
0
25
50
0
40
140
Fixed weights
156
150
344
140
127
334
Adaptive weights
156
145
157
140
127
147
Table 2: Perplexity on the test set of Penn Treebank Corpus with and without learning the weights
of the contextual features. Note that in these experiments we used a hierarchical soft-max.
3.3
R ESULTS ON T EXT 8.
Our next experiment involves the Text8 corpus which is significantly larger than the Penn Treebank.
As this dataset contains various articles from Wikipedia, the longer term information (such as current
topic) plays bigger role than in the previous experiments. This is illustrated by the gains when cache
is added to the baseline 5-gram model: the perplexity drops from 309 to 229 (26% reduction).
6
Accepted as a workshop contribution at ICLR 2015
We report experiments with a range of model configurations, with different number of hidden units.
In Table 3, we show that increasing the capacity of standard SRNs by adding the contextual features
results in better performance. For example, when we add 40 contextual units to SRN with 100
hidden units, the perplexity drops from 245 to 189 (23% reduction). Such model is also much better
than SRN with 300 hidden units (perplexity 202).
Model
SCRN
SCRN
SCRN
#hidden
100
300
500
context = 0
245
202
184
context = 10
215
182
177
context = 20
201
172
166
context = 40
189
165
162
context = 80
184
164
161
Table 3: Structurally constrained recurrent nets: perplexity for various sizes of the contextual layer,
reported on the development set of Text8 dataset.
In Table 4, we see that when the number of hidden units is small, our model is better than LSTM.
Despite the LSTM model with 100 hidden units being larger, the SCRN with 100 hidden and 80
contextual features achieves better performance. On the other hand, as the size of the models increase, we see that the best LSTM model is slightly better than the best SCRN (perplexity 156 versus
161). As the perplexity gains for both LSTM and SCRN over SRN are much more significant than
in the Penn Treebank experiments, it seems likely that both models actually model the same kind of
patterns in language.
Model
SRN
SRN
SRN
LSTM
LSTM
LSTM
SCRN
SCRN
SCRN
#hidden
100
300
500
100
300
500
100
300
500
#context
80
80
80
Perplexity on development set
245
202
184
193
159
156
184
164
161
Table 4: Comparison of various recurrent network architectures, evaluated on the development set
of Text8.
4
C ONCLUSION
In this paper, we have shown that learning longer term patterns in real data using recurrent networks is perfectly doable using standard stochastic gradient descent, just by introducing structural
constraint on the recurrent weight matrix. The model can then be interpreted as having quickly
changing hidden layer that focuses on short term patterns, and slowly updating context layer that
retains longer term information.
Empirical comparison of SCRN to Long Short Term Memory (LSTM) recurrent network shows very
similar behavior in two language modeling tasks, with similar gains over simple recurrent network
when all models are tuned for the best accuracy. Moreover, SCRN shines in cases when the size
of models is constrained, and with similar number of parameters it often outperforms LSTM by a
large margin. This can be especially useful in cases when the amount of training data is practically
unlimited, and even models with thousands of hidden neurons severely underfit the training datasets.
We believe these findings will help researchers to better understand the problem of learning longer
term memory in sequential data. Our model greatly simplifies analysis and implementation of recurrent networks that are capable of learning longer term patterns. Further, we published the code
that allows to easily reproduce experiments described in this paper.
At the same time, it should be noted that none of the above models is capable of learning truly long
term memory, which has a different nature. For example, if we would want to build a model that can
7
Accepted as a workshop contribution at ICLR 2015
store arbitrarily long sequences of symbols and reproduce these later, it would become obvious that
this is not doable with models that have finite capacity. A possible solution is to use the recurrent
net as a controller of an external memory which has unlimited capacity. For example in (Joulin
& Mikolov, 2015), a stack-based memory is used for such task. However, a lot of research needs
to be done in this direction before we will develop models that can successfully learn to grow in
complexity and size when solving increasingly more difficult tasks.
R EFERENCES
Bengio, Yoshua, Simard, Patrice, and Frasconi, Paolo. Learning long-term dependencies with gradient descent is difficult. Neural Networks, IEEE Transactions on, 5(2):157–166, 1994.
Bengio, Yoshua, Boulanger-Lewandowski, Nicolas, and Pascanu, Razvan. Advances in optimizing
recurrent networks. In ICASSP, 2013.
Dahl, George E, Yu, Dong, Deng, Li, and Acero, Alex. Context-dependent pre-trained deep neural
networks for large-vocabulary speech recognition. Audio, Speech, and Language Processing,
IEEE Transactions on, 20(1):30–42, 2012.
Elman, Jeffrey L. Finding structure in time. Cognitive science, 14(2):179–211, 1990.
Goodman, Joshua. Classes for fast maximum entropy training. In Acoustics, Speech, and Signal
Processing, 2001. Proceedings.(ICASSP’01). 2001 IEEE International Conference on, volume 1,
pp. 561–564. IEEE, 2001a.
Goodman, Joshua T. A bit of progress in language modeling. Computer Speech & Language, 15(4):
403–434, 2001b.
Graves, Alex and Schmidhuber, Juergen. Offline handwriting recognition with multidimensional
recurrent neural networks. In Advances in Neural Information Processing Systems, pp. 545–552,
2009.
Graves, Alex and Schmidhuber, Jürgen. Framewise phoneme classification with bidirectional lstm
and other neural network architectures. Neural Networks, 18(5):602–610, 2005.
Hochreiter, Sepp. The vanishing gradient problem during learning recurrent neural nets and problem
solutions. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 6(02):
107–116, 1998.
Hochreiter, Sepp and Schmidhuber, Jürgen. Long short-term memory. Neural computation, 9(8):
1735–1780, 1997.
Jaeger, Herbert, Lukoševičius, Mantas, Popovici, Dan, and Siewert, Udo. Optimization and applications of echo state networks with leaky-integrator neurons. Neural Networks, 20(3):335–352,
2007.
Jordan, Michael I. Attractor dynamics and parallelism in a connectionist sequential machine. Proceedings of the Eighth Annual Conference of the Cognitive Science Society, pp. 531–546, 1987.
Joulin, Armand and Mikolov, Tomas. Inferring algorithmic patterns with stack-augmented recurrent
nets. arXiv preprint arXiv:1503.01007, 2015.
Koehn, Philipp, Hoang, Hieu, Birch, Alexandra, Callison-Burch, Chris, Federico, Marcello,
Bertoldi, Nicola, Cowan, Brooke, Shen, Wade, Moran, Christine, Zens, Richard, et al. Moses:
Open source toolkit for statistical machine translation. In Proceedings of the 45th Annual Meeting of the ACL on Interactive Poster and Demonstration Sessions, pp. 177–180. Association for
Computational Linguistics, 2007.
Kuhn, Roland and De Mori, Renato. A cache-based natural language model for speech recognition.
Pattern Analysis and Machine Intelligence, IEEE Transactions on, 12(6):570–583, 1990.
LeCun, Yann, Bottou, Leon, Orr, Genevieve, and Müller, Klaus. Efficient backprop. Neural Networks: Tricks of the Trade, pp. 546–546, 1998.
8
Accepted as a workshop contribution at ICLR 2015
Mikolov, Tomáš. Statistical language models based on neural networks. PhD thesis, Ph. D. thesis,
Brno University of Technology, 2012.
Mikolov, Tomas and Zweig, Geoffrey. Context dependent recurrent neural network language model.
In SLT, pp. 234–239, 2012.
Mikolov, Tomas, Kombrink, Stefan, Burget, Lukas, Cernocky, JH, and Khudanpur, Sanjeev. Extensions of recurrent neural network language model. In Acoustics, Speech and Signal Processing
(ICASSP), 2011 IEEE International Conference on, pp. 5528–5531. IEEE, 2011.
Mozer, Michael C. A focused back-propagation algorithm for temporal pattern recognition. Complex
systems, 3(4):349–381, 1989.
Mozer, Michael C. Neural net architectures for temporal sequence processing. In Santa Fe Institute
Studies in The Sciences of Complexity, volume 15, pp. 243–243. Addison-Wessley Publishing
CO, 1993.
Nair, Vinod and Hinton, Geoffrey E. Rectified linear units improve restricted boltzmann machines.
In Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 807–
814, 2010.
Pachitariu, Marius and Sahani, Maneesh. Regularization and nonlinearities for neural language
models: when are they needed? arXiv preprint arXiv:1301.5650, 2013.
Rumelhart, David E, Hinton, Geoffrey E, and Williams, Ronald J. Learning internal representations
by error propagation. Technical report, DTIC Document, 1985.
Simonyan, Karen and Zisserman, Andrew. Two-stream convolutional networks for action recognition in videos. In Advances in Neural Information Processing Systems, pp. 568–576, 2014.
Sundermeyer, Martin, Schlüter, Ralf, and Ney, Hermann. Lstm neural networks for language modeling. In INTERSPEECH, 2012.
Werbos, Paul J. Generalization of backpropagation with application to a recurrent gas market model.
Neural Networks, 1(4):339–356, 1988.
Williams, Ronald J and Zipser, David. Gradient-based learning algorithms for recurrent networks
and their computational complexity. Back-propagation: Theory, architectures and applications,
pp. 433–486, 1995.
Young, Steve, Evermann, Gunnar, Gales, Mark, Hain, Thomas, Kershaw, Dan, Liu, Xunying,
Moore, Gareth, Odell, Julian, Ollason, Dave, Povey, Dan, et al. The HTK book, volume 2. Entropic Cambridge Research Laboratory Cambridge, 1997.
Zaremba, Wojciech, Sutskever, Ilya, and Vinyals, Oriol. Recurrent neural network regularization.
arXiv preprint arXiv:1409.2329, 2014.
9
| 9cs.NE
|
Convex Regularization for High-Dimensional
arXiv:1512.01215v2 [math.ST] 13 Apr 2017
Multi-Response Tensor Regression
Garvesh Raskutti∗ , Ming Yuan† and Han Chen†
University of Wisconsin-Madison
Abstract
In this paper we present a general convex optimization approach for solving highdimensional multiple response tensor regression problems under low-dimensional structural assumptions. We consider using convex and weakly decomposable regularizers
assuming that the underlying tensor lies in an unknown low-dimensional subspace.
Within our framework, we derive general risk bounds of the resulting estimate under
fairly general dependence structure among covariates. Our framework leads to upper
bounds in terms of two very simple quantities, the Gaussian width of a convex set in
tensor space and the intrinsic dimension of the low-dimensional tensor subspace. To
the best of our knowledge, this is the first general framework that applies to multiple response problems. These general bounds provide useful upper bounds on rates
of convergence for a number of fundamental statistical models of interest including
multi-response regression, vector auto-regressive models, low-rank tensor models and
pairwise interaction models. Moreover, in many of these settings we prove that the
resulting estimates are minimax optimal. We also provide a numerical study that both
validates our theoretical guarantees and demonstrates the breadth of our framework.
∗
Departments of Statistics and Computer Science, and Optimization Group at Wisconsin Institute for
Discovery, University of Wisconsin-Madison, 1300 University Avenue, Madison, WI 53706. The research of
Garvesh Raskutti is supported in part by NSF Grant DMS-1407028
†
Morgridge Institute for Research and Department of Statistics, University of Wisconsin-Madison, 1300
University Avenue, Madison, WI 53706. The research of Ming Yuan and Han Chen was supported in part
by NSF FRG Grant DMS-1265202, and NIH Grant 1-U54AI117924-01.
1
1
Introduction
Many modern scientific problems involve solving high-dimensional statistical problems where
the sample size is small relative to the ambient dimension of the underlying parameter to be
estimated. Over the past few decades there has been a large amount of work on solving such
problems by imposing low-dimensional structure on the parameter of interest. In particular
sparsity, low-rankness and other low-dimensional subspace assumptions have been studied
extensively both in terms of the development of fast algorithms and theoretical guarantees.
See, e.g., Buhlmann and van de Geer (2011) and Hastie et al. (2015), for an overview.
Most of the prior work has focussed on scenarios in which the parameter of interest is
a vector or matrix. Increasingly common in practice, however, the parameter or object
to be estimated naturally has a higher order tensor structure. Examples include hyperspectral image analysis (Li and Li, 2010), multi-energy computed tomography (Semerci et al.,
2014), radar signal processing (Sidiropoulos and Nion, 2010), audio classification (Mesgarani
et al., 2006) and text mining (Cohen and Collins, 2012) among numerous others. It is much
less clear how the low dimensional structures inherent to these problems can be effectively
accounted for. The main purpose of this article is to fill in this void and provide a general
and unifying framework for doing so.
Consider a general tensor regression problem where covariate tensors X (i) ∈ Rd1 ×···×dM
and response tensors Y (i) ∈ RdM +1 ×···×dN are related through:
Y (i) = hX (i) , T i + (i) ,
i = 1, 2, . . . , n.
(1)
Here T ∈ Rd1 ×···×dN is an unknown parameter of interest, and (i) s are independent and
identically distributed noise tensors whose entries are independent and identically distributed
centred normal random variables with variance σ 2 . Further, for simplicity we assume the
covariates (X (i) )ni=1 are Gaussian, but with fairly general dependence assumptions. The
notation h·, ·i will refer throughout this paper to the standard inner product taken over
appropriate Euclidean spaces. Hence, for A ∈ Rd1 ×···×dM and B ∈ Rd1 ×···×dN :
hA, Bi =
d1
X
j1 =1
···
dM
X
Aj1 ,...,jM Bj1 ,...,jM ∈ R
jM =1
is the usual inner product if M = N ; and if M < N , then hA, Bi ∈ RdM +1 ×···×dN such that
2
its (jM +1 , . . . , jN ) entry is given by
(hA, Bi)jM +1 ,...,jN =
d1
X
j1 =1
···
dM
X
Aj1 ,...,jM Bj1 ,...,jM ,jM +1 ,...,jN .
jM =1
The goal of tensor regression is to estimate the coefficient tensor T based on observations
{(X (i) , Y (i) ) : 1 ≤ i ≤ n}. In addition to the canonical example of tensor regression with
Y a scalar response (i.e., M = N ), many other commonly encountered regression problems
are also special cases of the general tensor regression model (1). Multi-response regression
(see, e.g., Anderson, 1984), vector autoregressive model (see, e.g., Lütkepolhl, 2006), and
pairwise interaction tensor model (see, e.g., Rendle and Schmidt-Thieme, 2010) are some
of the notable examples. In this article, we provide a general treatment to these seemingly
different problems.
Our main focus here is on situations where the dimensionality dk s are large when compared with the sample size n. In many practical settings, the true regression coefficient tensor
T may have certain types of low-dimensional structure. Because of the high ambient dimension of a regression coefficient tensor, it is essential to account for such a low-dimensional
structure when estimating it. Sparsity and low-rankness are the most common examples of
such low dimensional structures. In the case of tensors, sparsity could occur at the entry-wise
level, fiber-wise level, or slice-wise level, depending on the context and leading to different
interpretations. There are also multiple ways in which low-rankness may be present when it
comes to higher order tensors, either at the original tensor level or at the matricized tensor
level.
In this article, we consider a general class of convex regularization techniques to exploit
either type of low-dimensional structure. In particular, we consider the standard convex
regularization framework:
(
Tb ∈
arg min
A∈Rd1 ×···×dN
)
n
1 X (i)
kY − hA, X (i) ik2F + λR(A) ,
2n i=1
(2)
where the regularizer R(·) is a norm on Rd1 ×···×dN , and λ > 0 is a tuning parameter. Hereafter, for a tensor A, kAkF = hA, Ai1/2 . We derive general risk bounds for a family of so-called
weakly decomposable regularizers under fairly general dependence structure among the covariates. These general upper bounds apply to a number of concrete statistical inference
3
problems including the aforementioned multi-response regression, high-dimensional vector
auto-regressive models, low-rank tensor models, and pairwise interaction tensors where we
show that they are typically optimal in the minimax sense.
In developing these general results, we make several contributions to a fast growing literature on high dimensional tensor estimation. First of all, we provide a unified and principled
approach to exploit the low dimensional structure in these tensor problems. In doing so, we
incorporate an extension of the notion of decomposability originally introduced by Negahban et al. (2012) for vector and matrix models to weak decomposability previously introduced
in van de Geer (2014) which allows us to handle more delicate tensor models such as the
nuclear norm regularization for low-rank tensor models. Moreover, we provide, for the regularized least squared estimate given by (2), a general risk bound under an easily interpretable
condition on the design tensor. The risk bound we derive is presented in terms of merely two
geometric quantities, the Gaussian width which depends on the choice of regularization and
the intrinsic dimension of the subspace that the tensor T lies in. We believe this is the first
general framework that applies to multiple responses and general dependence structure for
the covariate tensor X. Finally, our general results lead to novel upper bounds for several
important regression problems involving high-dimensional tensors: multi-response regression, multi-variate auto-regressive models and pairwise interaction models, for which we also
prove that the resulting estimates are minimiax rate optimal with appropriate choices of
regularizers.
Our framework incorporates both tensor structure and multiple responses which present
a number of challenges compared to previous approaches. These challenges manifest themselves both in terms of the choice of regularizer R and the technical challenges in the proof
of the main result. Firstly since the notion of low-dimensional is more generic for tensors
meaning there are a number of choices of convex regularizer R and these must satisfy a
form of weak decomposability and provide optimal rates. Multiple responses and the flexible
dependence structure among the covariates also present significant technical challenges for
proving restricted strong convexity, a key technical tool for establishing rates of convergence.
In particular, a one-sided uniform law (Lemma 12) is required instead of classical techniques
as developed in e.g. Negahban and Wainwright (2012); Raskutti et al. (2010) that only apply
4
to univariate responses.
The remainder of the paper is organized as follows: In Section 2 we introduce the general framework of using weakly decomposable regularizers for exploiting low-dimensional
structures in high dimensional tensor regression. In Section 3 we present a general upper
bound for weakly decomposable regularizers and discuss specific risk bounds for commonly
used sparsity or low-rankness regularizers for tensors. In Section 4 we apply our general
result to three specific statistical problems, namely, multi-response regression, multivariate
autoregressive model, and the pairwise interaction model. We show that in each of the three
examples appropriately chosen weakly decomposable regularizers leads to minimax optimal
estimation of the unknown parameters. Numerical experiments are presented in Section 5
to further demonstrate the merits and breadth of our approach. Proofs are provided in
Section 6.
2
Methodology
Recall that the regularized least-squares estimate is given by
)
(
n
X
1
kY (i) − hA, X (i) ik2F + λR(A) .
Tb = arg min
2n
d
×···×d
N
A∈R 1
i=1
For brevity, we assume implicitly hereafter that the minimizer on its left hand side is uniquely
defined. Our development here actually applies to the more general case where Tb can be
taken as an arbitrary element from the set of the minimizers. Of particularly interest here is
the so-called weakly decomposable convex regularizers, extending a similar concept introduced
by Negahban et al. (2012) for vectors and matrices.
Let A be an arbitrary linear subspace of Rd1 ×···×dN and A⊥ its orthogonal complement:
A⊥ := {A ∈ Rd1 ×···×dN | hA, Bi = 0 for all B ∈ A}.
We call a regularizer R(·) weakly decomposable with respect to a pair (A, B) where B ⊆ A
if there exist a constant 0 < cR ≤ 1 such that for any A ∈ A⊥ and B ∈ B,
R(A + B) ≥ R(A) + cR R(B).
5
(3)
In particular, if (3) holds for any B ∈ B = A, we say R(·) is weakly decomposable with
respect to A. A more general version of this concept was first introduced in van de Geer
(2014). Because R is a norm, by triangular inequality, we also have
R(A + B) ≤ R(A) + R(B).
Many of the commonly used regularizers for tensors are weakly decomposable, or decomposable for short. When cR = 1, our definition of decomposability naturally extends from
similar notion for vectors (N = 1) and matrices (N = 2) introduced by Negahban et al.
(2012). We also allow for more general choices of cR here to ensure a wider applicability. For
example as we shall see the popular tensor nuclear norm regularizer is decomposable with
respect to appropriate linear subspaces with cR = 1/2, but not decomposable if cR = 1.
We have now described a catalogue of commonly used regularizers for tensors and argue
that they are all decomposable with respect to appropriately chosen subspaces of Rd1 ×···×dN .
To fix ideas, we shall focus in what follows on estimating a third-order tensor T , that is
N = 3, although our discussion can be straightforwardly extended to higher-order tensors.
2.1
Sparsity regularizers
An obvious way to encourage entry-wise sparsity is to impose the vector `1 penalty on the
entries of A:
R(A) :=
d1 X
d2 X
d3
X
|Aj1 j2 j3 |,
(4)
j1 =1 j2 =1 j3 =1
following the same idea as the Lasso for linear regression (see, e.g., Tibshirani, 1996). This is
a canonical example of decomposable regularizers. For any fixed I ⊂ [d1 ] × [d2 ] × [d3 ] where
[d] = {1, 2, . . . , d}, write
A(I) = B(I) = A ∈ Rd1 ×d2 ×d3 : Aj1 j2 j3 = 0 for all (j1 , j2 , j3 ) ∈
/I .
It is clear that
A⊥ (I) = A ∈ Rd1 ×d2 ×d3 : Aj1 j2 j3 = 0 for all (j1 , j2 , j3 ) ∈ I ,
and R(A) defined by (4) is decomposable with respect to A with cR = 1.
6
(5)
In many applications, sparsity arises with a more structured fashion for tensors. For
example, a fiber or a slice of a tensor is likely to be zero simultaneously. Mode-1 fibers of a
tensor A ∈ Rd1 ×d2 ×d3 are the collection of d1 -dimensional vectors
A·j2 j3 = (A1j2 j3 , . . . , Ad1 j2 j3 )> : 1 ≤ j2 ≤ d2 , 1 ≤ j3 ≤ d3 .
Mode-2 and -3 fibers can be defined in the same fashion. To fix ideas, we focus on mode-1
fibers. Sparsity among mode-1 fibers can be exploited using the group-based `1 regularizer:
R(A) =
d3
d2 X
X
kA·j2 j3 k`2 ,
(6)
j2 =1 j3 =1
similar to the group Lasso (see, e.g., Yuan and Lin, 2006), where k · k`2 stands for the usual
vector `2 norm. Similar to the vector `1 regularizer, the group `1 -based regularizer is also
decomposable. For any fixed I ⊂ [d2 ] × [d3 ], write
A(I) = B(I) = A ∈ Rd1 ×d2 ×d3 : Aj1 j2 j3 = 0 for all (j2 , j3 ) ∈
/I .
(7)
It is clear that
A⊥ (I) = A ∈ Rd1 ×d2 ×d3 : Aj1 j2 j3 = 0 for all (j2 , j3 ) ∈ I ,
and R(A) defined by (6) is decomposable with respect to A with cR = 1. Note that in
defining the regularizer in (6), instead of vector `2 norm, other `q (q > 1) norms could also
be used. See, e.g., Turlach et al. (2005).
Sparsity could also occur at the slice level. The (1, 2) slices of a tensor A ∈ Rd1 ×d2 ×d3 are
the collection of d1 × d2 matrices
{A··j3 = (Aj1 j2 j3 )1≤j1 ≤d1 ,1≤j2 ≤d2 : 1 ≤ j3 ≤ d3 } .
Let k · k be an arbitrary norm on d1 × d2 matrices. Then the following group regularizer can
be considered:
R(A) =
d3
X
kA··j3 k.
(8)
j3 =1
Typical examples of the matrix norm that can be used in (8) include Frobenius norm and
nuclear norm among others. In the case when k · kF is used, R(·) is again a decomposable
regularizer with respect to
/I .
A(I) = B(I) = A ∈ Rd1 ×d2 ×d3 : Aj1 j2 j3 = 0 for all j3 ∈
7
(9)
for any I ⊂ [d3 ].
Now consider the case when we use the matrix nuclear norm k · k∗ in (8). Let P1j and
P2j , j = 1, . . . , d3 be two sequences of projection matrices on Rd1 and Rd2 respectively. Let
⊥
⊥
A··j P2j
= 0, j = 1, . . . , d3 ,
A(P1j , P2j : 1 ≤ j ≤ d3 ) = A ∈ Rd1 ×d2 ×d3 : P1j
(10)
and
B(P1j , P2j : 1 ≤ j ≤ d3 ) = A ∈ Rd1 ×d2 ×d3 : A··j = P1j A··j P2j , j = 1, . . . , d3 .
(11)
By pinching inequality (see, e.g., Bhatia, 1997), it can be derived that R(·) is decomposable
with respect to A(P1j , P2j : 1 ≤ j ≤ d3 ) and B(P1j , P2j : 1 ≤ j ≤ d3 ).
2.2
Low-rankness regularizers
In addition to sparsity, one may also consider tensors with low-rank. There are multiple
notions of rank for higher-order tensors. See, e.g., Koldar and Bader (2009), for a recent
review. In particular, the so-called CP rank is defined as the smallest number r of rank-one
tensors needed to represent a tensor A ∈ Rd1 ×d2 ×d3 :
A=
r
X
uk ⊗ vk ⊗ wk
(12)
k=1
where uk ∈ Rd1 , vk ∈ Rd2 and wk ∈ Rd3 . To encourage a low rank estimate, we can consider
the nuclear norm regularization. Following Yuan and Zhang (2014), we define the nuclear
norm of A through its dual norm. More specifically, let the spectral norm of A be given by
kAks =
hA, u ⊗ v ⊗ wi.
max
kuk`2 ,kvk`2 ,kwk`2 ≤1
Then its nuclear norm is defined as
kAk∗ = max hA, Bi.
kBks ≤1
We shall then consider the regularizer:
R(A) = kAk∗ .
We now show this is also a weakly decomposable regularizer.
8
(13)
Let Pk be a projection matrix in Rdk . Define
(P1 ⊗ P2 ⊗ P3 )A =
r
X
P1 uk ⊗ P2 vk ⊗ P3 wk .
k=1
Write
Q = P1 ⊗ P2 ⊗ P3 + P1⊥ ⊗ P2 ⊗ P3 + P1 ⊗ P2⊥ ⊗ P3 + P1 ⊗ P2 ⊗ P3⊥ ,
and
Q⊥ = P1⊥ ⊗ P2⊥ ⊗ P3⊥ + P1⊥ ⊗ P2⊥ ⊗ P3 + P1 ⊗ P2⊥ ⊗ P3⊥ + P1⊥ ⊗ P2 ⊗ P3⊥ ,
where Pk⊥ = I − Pk .
Lemma 1. For any A ∈ Rd1 ×d2 ×d3 and projection matrices Pk in Rdk , k = 1, 2, 3, we have
1
kAk∗ ≥ k(P1 ⊗ P2 ⊗ P3 )Ak∗ + kQ⊥ Ak∗ .
2
Lemma 1 is a direct consequence from the characterization of sub-differential for tensor
nuclear norm given by Yuan and Zhang (2014), and can be viewed as a tensor version of the
pinching inequality for matrices.
Write
A(P1 , P2 , P3 ) = A ∈ Rd1 ×d2 ×d3 : QA = A ,
(14)
B(P1 , P2 , P3 ) = A ∈ Rd1 ×d2 ×d3 : (P1 ⊗ P2 ⊗ P3 )A = A .
(15)
and
By Lemma 1, R(·) defined by (13) is weakly decomposable with respect to A(P1 , P2 , P3 )
and B(P1 , P2 , P3 ) with cR = 1/2. We note that a counterexample is also given by Yuan and
Zhang (2014) which shows that, for the tensor nuclear norm, we cannot take cR = 1.
Another popular way to define tensor rank is through the so-called Tucker decomposition.
Recall that the Tucker decomposition of a tensor A ∈ Rd1 ×d2 ×d3 is of the form:
Aj1 j2 j3 =
r1 X
r2 X
r3
X
Sk1 k2 k3 Uj1 k1 Vj2 k2 Wj3 k3
(16)
k1 =1 k2 =1 k3 =1
so that U , V and W are orthogonal matrices, and the so-called core tensor S = (Sk1 k2 k3 )k1 ,k2 ,k3
is such that any two slices of S are orthogonal. The triplet (r1 , r2 , r3 ) are referred to as
the Tucker ranks of A. It is not hard to see that if (12) holds, then the Tucker ranks
9
(r1 , r2 , r3 ) can be equivalently interpreted as the dimensionality of the linear spaces spanned
by {uk : 1 ≤ k ≤ r}, {vk : 1 ≤ k ≤ r}, and {wk : 1 ≤ k ≤ r} respectively. The following
relationship holds between CP rank and Tucker ranks:
max{r1 , r2 , r3 } ≤ r ≤ min{r1 r2 , r2 r3 , r1 r3 }.
A convenient way to encourage low Tucker ranks in a tensor is through matricization.
Let M1 (·) denote the mode-1 matricization of a tensor. That is M1 (A) is a d1 × (d2 d3 )
matrix whose column vectors are the the mode-1 fibers of A ∈ Rd1 ×d2 ×d3 . M2 (·) and M3 (·)
can also be defined in the same fashion. It is clear
rank(Mk (A)) = rk (A).
A natural way to encourage low-rankness is therefore through nuclear norm regularization:
3
1X
kMk (A)k∗ .
R(A) =
3 k=1
(17)
By the pinching inequality for matrices, R(·) defined by (17) is also decomposable with
respect to A(P1 , P2 , P3 ) and B(P1 , P2 , P3 ) with cR = 1.
3
Risk Bounds for Decomposable Regularizers
We now establish risk bounds for general decomposable regularizers. In particular, our
bounds are given in terms of the Gaussian width of a suitable set of tensors. Recall that the
Gaussian width of a set S ⊂ Rd1 ×d2 ×...×dN is given by
wG (S) := E suphA, Gi ,
A∈S
where G ∈ Rd1 ×d2 ×...×dN is a tensor whose entries are independent N (0, 1) random variables.
See, e.g. Gordon (1988) for more details on Gaussian width.
Note that the Gaussian width is a geometric measure of the volume of the set S and can
be related to other volumetric characterizations (see, e.g., Pisier, 1989).We also define the
unit ball for the norm-regularizer R(.) as follows:
BR (1) := {A ∈ Rd1 ×d2 ×...×dN | R(A) ≤ 1}.
10
We impose the mild assumption that kAkF ≤ R(A) which ensures that the regularizer R(·)
encourages low-dimensional structure.
Now we define a quantity that relates the size of the norm R(A) to the Frobenius norm
kAkF over the the low-dimensional subspace A. Following Negahban et al. (2012), for a
subspace A of Rd1 ×···×dN , define its compatibility constant s(A) as
s(A) :=
R2 (A)
,
2
A∈A/{0} kAkF
sup
which can be interpreted as a notion of intrinsic dimensionality of A.
Now we turn our attention to the covariate tensor. Denote by X (i) = vec(X (i) ) the
vectorized covariate from the ith sample. With slight abuse of notation, write
X = vec((X (1) )> , . . . , (X (n) )> ) ∈ Rn.d1 d2 ···dM
the concatenated covariates from all n samples. For convenience let DM = d1 d2 · · · dM .
Further for brevity we assume a Gaussian design so that
X ∼ N (0, Σ)
where
Σ = cov(X, X) ∈ RnDM ×nDM .
With more technical work our results may be extended beyond Gaussian designs. We note
that we do not require that the sample tensors X (i) be independent.
We shall assume that Σ has bounded eigenvalues which we later verify for a number of
statistical examples. Let λmin (·) and λmax (·) represent the smallest and largest eigenvalues
of a matrix, respectively. In what follows, we shall assume that
c2` ≤ λmin (Σ) ≤ λmax (Σ) ≤ c2u ,
(18)
for some constants 0 < c` ≤ cu < ∞.
Note that in particular if all covariates {X (i) : i = 1, . . . , n} are independent and identically distributed, then Σ has a block diagonal structure, and (18) boils down to similar
conditions on cov(X (i) , X (i) ). However (18) is more general and applicable to settings in
which the X (i) ’s may be dependent such as time-series models, which we shall discuss in
further detail in Section 4.
11
We are now in position to state our main result on the risk bounds in terms of both
Frobenius norm k · kF and the empirical norm k · kn where for a tensor A ∈ Rd1 ×···×dN , which
we define as:
n
kAk2n
1X
khA, X (i) ik2F .
:=
n i=1
The main reason we focus on random Gaussian design is so that we can prove a one-sided
uniform law that relates the empirical norm defined above to the Frobenius norm of a tensor in A (see Lemma 12). Lemma 12 is analogous to restricted strong convexity defined
in Negahban et al. (2012) but since we are dealing with multiple responses a more refined
technique is required to prove Lemma 12.
Theorem 1. Suppose that (1) holds for a tensor T from a linear subspace A0 ⊂ Rd1 ×···×dN
where (18) holds. Let Tb be defined by (2) where the regularizer R(·) is decomposable with
respect to A and A0 for some linear subspace A ⊇ A0 . If
λ≥
2σcu (3 + cR )
√
wG [BR (1)],
cR n
(19)
2
then there exists a constant c > 0 such that with probability at least 1 − exp{−cwG
[BR (1)]},
n
o 6(1 + c ) 9c2
R
u
max kTb − T k2n , kTb − T k2F ≤
s(A)λ2 ,
3 + cR c2`
(20)
when n is sufficiently large, assuming that the right hand side converges to zero as n increases.
As stated in Theorem 1, our upper bound boils down to bounding two quantities, s(A)
and wG [BR (1)] which are both purely geometric quantities. To provide some intuition,
wG [BR (1)] captures how large the R(·) norm is relative to the k · kF norm and s(A) captures
the low dimension of the subspace A.
Several technical remarks are in order. Note that wG [BR (1)] can be expressed as expectation of the dual norm of G. According to R (see, e.g., Rockafellar, 1970, for details), the
dual norm R∗ (·) is given by:
R∗ (B) :=
sup hA, Bi,
A∈BR (1)
where the supremum is taken over tensors of the same dimensions as B. It is straightforward
to see that wG [BR (1)] = E[R∗ (G)].
12
To the best of our knowledge, this is the first general result that applies to multiple
responses. As mentioned earlier, incorporating multiple responses presents a technical challenge (see Lemma 12) which is a one-sided uniform law analogous to restricted strong convexity. While Theorem 1 focusses on Gaussian design, results can be extended to random
sub-Gaussian design using more sophisticated techniques (see e.g., Mendelson, 2014; Zhou,
2009) or for fixed design by assuming covariates deterministically satisfy the condition in
Lemma 12. Since the focus of this paper is on general dependence structure, we assume
random Gaussian design.
One important practical challenge is that σ 2 , cu and c` are typically unknown and these
clearly influence the choice of λ. This is a common challenge for high-dimensional statistical
inference and we don’t address this issue in this paper. In practice, λ is typically chosen
through cross-validation. A more sophisticated choice of λ based on estimation of σ 2 and
other constants remains an open question. Another important and open question is for what
choices of A0 is the upper bound optimal (up to a constant). In Section 4 we provide specific
examples in which we provide minimax lower bounds which match the upper bounds up to
constant. However as we see for low-rank tensor regression for low-rank tensor regression
discussed in Section 3.2, we are not aware of a convex regularizer that matches the minimax
lower bound.
Now we develop upper bounds on both quantities in different scenarios. As in the previous
section, we shall focus on third order tensor in the rest of the section for the ease of exposition.
3.1
Sparsity regularizers
We first consider sparsity regularizers described in the previous section.
3.1.1
Entry-wise and fiber-wise sparsity
Recall that vectorized `1 regularizer:
R1 (A) =
d1 X
d2 X
d3
X
j1 =1 j2 =1 j3 =1
13
|Aj1 j2 j3 |,
could be used to exploit entry-wise sparsity. Clearly,
R∗1 (A) = max |Aj1 j2 j3 |.
j1 ,j2 ,j3
It can then be shown that:
Lemma 2. There exists a constant 0 < c < ∞ such that
p
wG [BR1 (1)] ≤ c log(d1 d2 d3 ).
Let
(
Θ1 (s) =
A ∈ Rd1 ×d2 ×d3 :
d3
d2 X
d1 X
X
(21)
)
I(Aj1 j2 j3 6= 0) ≤ s .
j1 =1 j2 =1 j3 =1
For an arbitrary A ∈ Θ1 (s), write
I(A) = {(j1 , j2 , j3 ) ∈ [d1 ] × [d2 ] × [d3 ] : Aj1 j2 j3 6= 0} .
Then R1 (·) is decomposable with respect to A(I(A)) as defined by (5). It is easy to verify
that for any A ∈ Θ1 (s),
s1 (A(I)) =
R21 (B)
≤ s.
2
B∈A(I(A))/{0} kBkF
sup
(22)
In light of (22) and (21), Theorem 1 implies that
n
o s log(d d d )
1 2 3
2
2
b
b
sup max kT1 − T kn , kT1 − T kF .
,
n
T ∈Θ1 (s)
with high probability by taking
r
λ
log(d1 d2 d3 )
,
n
where Tb1 is the regularized least squares estimate defined by (2) when using regularizer R1 (·).
A similar argument can also be applied to fiber-wise sparsity. To fix ideas, we consider
here only sparsity among mode-1 fibers. In this case, we use a group Lasso type of regularizer:
R2 (A) =
d2 X
d3
X
kA·j2 j3 k`2 .
j2 =1 j3 =1
Then
R∗2 (A) = max kA·j2 j3 k`2 .
j2 ,j3
14
Lemma 3. There exists a constant 0 < c < ∞ such that
wG [BR2 (1)] ≤ c
Let
p
(
Θ2 (s) =
A ∈ Rd1 ×d2 ×d3 :
max{d1 , log(d2 d3 )}.
d3
d2 X
X
(23)
)
I(A·j2 j3 6= 0) ≤ s .
j2 =1 j3 =1
Similar to the previous case, for an arbitrary A ∈ Θ1 (s), write
I(A) = {(j2 , j3 ) ∈ [d2 ] × [d3 ] : A·j2 j3 6= 0}.
Then R2 (·) is decomposable with respect to A(I(A)) as defined by (7). It is easy to verify
that for any A ∈ Θ2 (s),
s2 (A(I)) =
R22 (B)
≤ s.
2
B∈A(I(A))/{0} kBkF
sup
(24)
In light of (24) and (30), Theorem 1 implies that
n
o s max{d , log(d d )}
1
2 3
2
2
b
b
sup max kT2 − T kn , kT2 − T kF .
,
n
T ∈Θ2 (s)
with high probability by taking
r
λ
max{d1 , log(d2 d3 )}
,
n
where Tb2 is the regularized least squares estimate defined by (2) when using regularizer R2 (·).
Comparing with the rates for entry-wise and fiber-wise sparsity regularization, we can
see the benefit of using group Lasso type of regularizer R2 when sparsity is likely to occur
at the fiber level. More specifically, consider the case when there are a total of s1 nonzero
entries from s2 nonzero fibers. If an entry-wise `1 regularization is applied, we can achieve
the risk bound:
s1 log(d1 d2 d3 )
.
n
On the other hand, if fiber-wise group `1 regularization is applied, then the risk bound
kTb1 − T k2F .
becomes:
s2 max{d1 , log(d2 d3 )}
.
n
When nonzero entries are clustered in fibers, we may expect s1 s2 d1 . In this case, Tb2 enjoys
performance superior to that of Tb1 since s2 d1 log(d1 d2 d3 ) is larger than s2 max{d1 , log(d2 d3 )}.
kTb2 − T k2F .
15
3.1.2
Slice-wise sparsity and low-rank structure
Now we consider slice-wise sparsity and low-rank structure. Again, to fix ideas, we consider
here only sparsity among (1, 2) slices. As discussed in the previous section, two specific types
of regularizers could be employed:
R3 (A) =
d3
X
kA··j3 kF ,
j3 =1
and
R4 (A) =
d3
X
kA··j3 k∗ ,
j3 =1
where recall that k.k∗ denotes the nuclear norm of a matrix, that is the sum of all singular
values.
Note that
R∗3 (A) = max kA··j3 kF .
1≤j3 ≤d3
Then we have the following result:
Lemma 4. There exists a constant 0 < c < ∞ such that
wG [BR3 (1)] ≤ c
Let
p
max{d1 d2 , log(d3 )}.
(
Θ3 (s) =
A ∈ Rd1 ×d2 ×d3 :
d3
X
(25)
)
I(A··j3 6= 0) ≤ s .
j3 =1
For an arbitrary A ∈ Θ1 (s), write
I(A) = {j3 ∈ [d3 ] : A··j3 6= 0}.
Then R3 (·) is decomposable with respect to A(I(A)) as defined by (9). It is easy to verify
that for any A ∈ Θ3 (s),
s3 (A(I(A))) =
R23 (B)
≤ s.
2
B∈A(I(A))/{0} kBkF
sup
Based on (26) and (25), Theorem 1 implies that
n
o s max{d d , log(d )}
1 2
3
sup max kTb3 − T k2n , kTb3 − T k2F .
,
n
T ∈Θ3 (s)
16
(26)
with high probability by taking
r
λ
max{d1 d2 , log(d3 )}
,
n
where Tb3 is the regularized least squares estimate defined by (2) when using regularizer R3 (·).
Alternatively, for R4 (·),
R∗4 (A) = max kA··j3 ks ,
j3
we have the following:
Lemma 5. There exists a constant 0 < c < ∞ such that
wG [BR4 (1)] ≤ c
Now consider
p
max{d1 , d2 , log(d3 )}.
(
Θ4 (r) =
A ∈ Rd1 ×d2 ×d3 :
d3
X
(27)
)
rank(A··j3 ) ≤ r .
j3 =1
For an arbitrary A ∈ Θ4 (r), denote by P1j and P2j the projection onto the row and column
space of A··j respectively. It is clear that A ∈ B(P1j , P2j : 1 ≤ j ≤ d3 ) as defined by (11).
In addition, recall that R4 is decomposable with respect to B(P1j , P2j : 1 ≤ j ≤ d3 ) and
A(P1j , P2j : 1 ≤ j ≤ d3 ) as defined by (10). It is not hard to see that for any A ∈ Θ4 (r),
A(P1j , P2j : 1 ≤ j ≤ d3 ) ⊂ Θ4 (2r), from which we can derive that:
Lemma 6. For any A ∈ Θ4 (r),
s4 (A(P1j , P2j : 1 ≤ j ≤ d3 )) ≤
R24 (B)
≤ 2r.
2
B∈A/{0} kBkF
sup
(28)
In light of (28) and (27), Theorem 1 implies that
n
o r max{d , d , log(d )}
1 2
3
sup max kTb4 − T k2n , kTb4 − T k2F .
,
n
T ∈Θ4 (r)
with high probability by taking
r
λ
max{d1 , d2 , log(d3 )}
,
n
where Tb4 is the regularized least squares estimate defined by (2) when using regularizer R4 (·).
17
Comparing with the rates for estimates with regularizers R3 and R4 , we can see the
benefit of using R4 when the nonzero slices are likely to be of low-rank. In particular,
consider the case when there are s1 nonzero slices and each nonzero slice has rank up to r.
Then applying R3 leads to risk bound:
kTb3 − T k2F .
s1 max{d1 d2 , log(d3 )}
,
n
whereas applying R4 leads to:
kTb4 − T k2F .
s1 r max{d1 , d2 , log(d3 )}
.
n
It is clear that Tb4 is a better estimator when r d1 = d2 = d3 .
3.2
Low-rankness regularizers
We now consider regularizers that encourages low rank estimates. We begin with the tensor
nuclear norm regularization:
R5 (A) = kAk∗ .
Recall that R∗5 (A) = kAks .
Lemma 7. There exists a constant 0 < c < ∞ such that
p
wG [BR5 (1)] ≤ c (d1 + d2 + d3 ).
(29)
Now let
Θ5 (r) = A ∈ Rd1 ×d2 ×d3 : max{r1 (A), r2 (A), r3 (A)} ≤ r .
For an arbitrary A ∈ Θ5 (r), denote by P1 , P2 , P3 the projection onto the linear space spanned
by the mode-1, -2 and -3 fibers respectively. As we argued in the previous section, R5 (·) is
weakly decomposable with respect to A(P1 , P2 , P3 ) and B(P1 , P2 , P3 ), and A ∈ B(P1 , P2 , P3 )
where A(P1 , P2 , P3 ) and B(P1 , P2 , P3 ) are defined by (14) and (15) respectively.
Lemma 8. For any A ∈ Θ5 (r),
R25 (B)
s5 (A(P1 , P2 , P3 )) =
sup
≤ r2 .
2
B∈A(P1 ,P2 ,P3 )/{0} kBkF
18
Lemmas 7 and 8 show that
n
o r2 (d + d + d )
1
2
3
2
2
b
b
sup max kT5 − T kn , kT5 − T kF .
,
n
T ∈Θ5 (r)
with high probability by taking
r
λ
d1 + d2 + d3
,
n
where Tb5 is the regularized least squares estimate defined by (2) when using regularizer R5 (·).
Next we consider the low-rankness regularization via matricization:
R6 (A) =
1
(kM1 (A)k∗ + kM2 (A)k∗ + kM3 (A)k∗ ) .
3
It is not hard to see that
R∗6 (A) = 3 max {kM1 (A)ks , kM2 (A)ks , kM3 (A)ks } .
Lemma 9. There exists a constant 0 < c < ∞ such that
p
wG [BR6 (1)] ≤ c max{d1 d2 , d2 d3 , d1 d3 }.
(30)
On the other hand,
Lemma 10. For any A ∈ Θ5 (r),
s6 (A(P1 , P2 , P3 )) =
R26 (B)
≤ r.
2
B∈A(P1 ,P2 ,P3 )/{0} kBkF
sup
Lemmas 9 and 10 suggest that
n
o r max{d d , d d , d d }
1 2 2 3 1 3
sup max kTb6 − T k2n , kTb6 − T k2F .
,
n
T ∈Θ5 (r)
with high probability by taking
r
λ
max{d1 d2 , d2 d3 , d1 d3 }
.
n
where Tb6 is the regularized least squares estimate defined by (2) when using regularizer R6 (·).
19
Comparing with the rates for estimates with regularizers R5 and R6 , we can see the
benefit of using R5 . For any T ∈ Θ5 (r), If we apply regularizer R5 , then
kTb5 − T k2F .
r2 (d1 + d2 + d3 )
.
n
This is to be compared with the risk bound for matricized regularization:
kTb6 − T k2F .
r max{d1 d2 , d2 d3 , d1 d3 }
.
n
Obviously Tb5 always outperform Tb6 since r ≤ min{d1 , d2 , d3 }. The advantage of Tb5 is typically
rather significant since in general r min{d1 , d2 , d3 }. On the other hand, Tb6 is more
amenable for computation.
Both upper bounds on Frobenius error on Tb5 and Tb6 are novel results and complement
the existing results on tensor completion Gandy et al. (2011); Mu et al. (2014) and Yuan and
Zhang (2014). Neither Tb5 nor Tb6 is minimax optimal and remains an interesting question as
to whether there exists a convex regularization approach that is minimax optimal.
4
Specific Statistical Problems
In this section, we apply our results to several concrete examples where we are attempting to
estimate a tensor under certain sparse or low rank constraints, and show that the regularized
least squares estimate Tb is typically minimiax rate optimal with appropriate choices of
regularizers. In particular we focus on the multi-response aspect of the general framework
to provide novel upper bounds and matching minimax lower bounds.
4.1
Multi-Response regression with large p
The first example we consider is the multi-response regression model:
(i)
Yk
=
p
m
X
X
(i)
(i)
Xj` Tj`k + k ,
j=1 `=1
where 1 ≤ i ≤ n represents the index for each sample, 1 ≤ k ≤ m represents the index for
each response and 1 ≤ j ≤ p represents the index for each feature. For the multi-response
20
regression problem we have N = 3, M = 2, d1 = d2 = m which represents the total number
of responses and d3 = p, which represent the total number of parameters.
Since we are in the setting where p is large but only a small number s are relevant, we
define the subspace:
p
X
(
T1 =
A∈R
m×m×p
|
)
I(kA··j kF 6= 0) ≤ s .
j=1
Furthermore for each i we assume X (i) ∈ Rm×p where each entry of X (i) , [X (i) ]k,j , corresponds
to the j th feature for the k th response. For simplicity, we assume the X (i) ’s are independent
e ∈ Rmp×mp . The penalty function we are considering is:
Gaussian with covariance Σ
R(A) =
p
X
kA··j kF ,
(31)
j=1
and the corresponding dual function applied to the i.i.d. Gaussian tensor G is:
R∗ (G) = max kG..j kF .
1≤j≤p
Theorem 2. Under the multi-response regression model with T ∈ T1 and independent Gause ≤ λmax (Σ)
e ≤ c2 , if
sian design where c2 ≤ λmin (Σ)
u
`
r
λ ≥ 3σcu
such that
max{m2 , log p}
,
n
√
sλ converges to zero as n increases, then there exist some constants c1 , c2 > 0
such that with probability at least 1 − p−c1
n
o c c2
2
max kTb − T k2n , kTb − T k2F ≤ 2u sλ2 ,
c`
when n is sufficiently large, where Tb is the regularized least squares estimate defined by (2)
with regularizer given by (31). In addition,
c3 σ 2 s max{m2 , log p/s}
min max kTe − T k2F ≥
,
c2u n
Te T ∈T1
for some constant c3 > 0, with probability at least 1/2, where the minimum is taken over all
estimators Te based on data {(X (i) , Y (i) ) : 1 ≤ i ≤ n}.
21
Theorem 2 shows that when taking
r
λ
max{m2 , log p}
,
n
the regularized least squares estimate defined by (2) with regularizer given by (31) achieves
minimax optimal rate of convergence over the parameter space T1 .
Alternatively, there are settings where the effect of covariates on the multiple tasks may
be of low rank structure. In such a situation, we may consider
(
)
p
X
m×m×p
T2 = A ∈ R
|
rank(A..j ) ≤ r .
j=1
An appropriate penalty function in this case is:
R(A) =
p
X
kA..j k∗ ,
(32)
j=1
and the corresponding dual function applied to G is:
R∗ (G) = max kG..j ks .
1≤j≤p
Theorem 3. Under the multi-response regression model with T ∈ T2 and independent Gause ≤ λmax (Σ)
e ≤ c2u , if
sian design where c2 ≤ λmin (Σ)
`
r
λ ≥ 3σcu
such that
√
max{m, log p}
,
n
rλ converges to zero as n increases, then there exist some constants c1 , c2 > 0
such that with probability at least 1 − p−c1 ,
n
o c c2
2
max kTb − T k2n , kTb − T k2F ≤ 2u rλ2
c`
when n is sufficiently large, where Tb is the regularized least squares estimate defined by (2)
with regularizer given by (32). In addition,
c3 σ 2 r max{m, log(p/r)}
min max kTe − T k2F ≥
,
c2u n
Te T ∈T2
for some constant c3 > 0, with probability at least 1/2, where the minimum is taken over all
estimators Te based on data {(X (i) , Y (i) ) : 1 ≤ i ≤ n}.
22
Again Theorem 3 shows that by taking
r
max{m, log p}
λ
,
n
the regularized least squares estimate defined by (2) with regularizer given by (32) achieves
minimax optimal rate of convergence over the parameter space T2 . Comparing with optimal
rates for estimating a tensor from T1 , one can see the benefit and importance to take advantage of the extra low rankness if the true coefficient tensor is indeed from T2 . As far as
we are aware, these are the first results that provide upper bounds and matching minimax
lower bounds for high-dimensional multi-response regression with sparse or low-rank slices.
As pointed out earlier, the challenge in going from scalar to multiple response is proving
Lemma 12 which is an analog of restricted strong convexity.
4.2
Multivariate sparse auto-regressive models
Now we consider the setting of vector auto-regressive models. In this case, our generative
model is:
X
(t+p)
=
p
X
Aj X (t+p−j) + (t) ,
(33)
j=1
where 1 ≤ t ≤ n represents the time index, 1 ≤ j ≤ p represents the lag index, {X (t) }n+p
t=0
is an m-dimensional vector, (t) ∼ N (0, σ 2 Im×m ) represents the additive noise. Note that
the parameter tensor T is an m × m × p tensor so that T··j = Aj , and Tk`j represents the
co-efficient of the k th variable on the `th variable at lag j. This model is studied by Basu and
Michailidis (2015) where p is relatively small (to avoid introducing long-range dependence)
and m is large. Our main results allow more general structure and regularization schemes
than those considered in Basu and Michailidis (2015).
Since we assume the number of series m is large, and there are m2 possible interactions
between the series we assume there are only s m2 interactions in total.
(
)
m X
m
X
T3 = A ∈ Rm×m×p |
I(Ak`· 6= 0) ≤ s .
(34)
k=1 `=1
The penalty function we are considering is:
R(A) =
m X
m
X
k=1 `=1
23
kAk`· k`2 ,
(35)
and the corresponding dual function applied to G is:
R∗ (G) = max kGk,`,. k`2 .
1≤k,`≤m
The challenge in this setting is that the X’s are highly dependent and we use the results
developed in Basu and Michailidis (2015) to prove that (18) is satisfied.
Prior to presenting the main results, we introduce concepts developed in Basu and Michailidis (2015) that play a role in determining the constants c2u and c2` which relate to the stability of the auto-regressive processes. A p-variate Gaussian time series is defined by its
auto-covariance matrix function
ΓX (h) = Cov(X (t) , X (t+h) ),
for all t, h ∈ Z. Further, we define the spectral density function:
∞
1 X
ΓX (`)e−i`θ , θ ∈ [−π, π].
fX (θ) :=
2π `=−∞
To ensure the spectral density is bounded, we make the following assumption:
M(fX ) := ess sup Λmax (fX (θ)) < ∞.
θ
Further, we define the matrix polynomial
A(z) = Im×m −
p
X
Aj z j
j=1
where {Aj }pj=1 denote the back-shift matrices, and z represents any point on the complex
plane. Note that for a stable, invertible AR(p) process,
fX (θ) =
1 −1 −iθ −1 −iθ
A (e )A (e ).
2π
We also define the lower extremum of the spectral density:
m(fX ) := ess inf Λmin (fX (θ)).
θ
Note that m(fX ) and M(fX ) satisfy the following bounds:
m(fX ) ≥
1
2πµmax (A)
,
and
24
M(fX ) ≤
1
2πµmin (A)
,
where
µmin (A) := min Λmin (A(z)A(z))
|z|=1
and
µmax (A) := max Λmax (A(z)A(z)).
|z|=1
From a straightforward calculation, we have that for any fixed ∆:
1
µmax
k∆k2F ≤ E k∆k2n ≤
1
µmin
k∆k2`2 .
(36)
Hence c2u = 1/µmin and c2` = 1/µmax . Now we state our main result for auto-regressive
models.
Theorem 4. Under the vector auto-regressive model defined by (33) with T ∈ T3 , if
s
max{p, 2 log m}
λ ≥ 3σ
,
nµmin
√
such that sλ converges to zero as n increases, then there exist some constants c1 , c2 > 0
such that with probability at least 1 − m−c1 ,
n
o cµ
2 max
2
2
b
b
max kT − T kn , kT − T kF ≤
sλ2 ,
µmin
when n is sufficiently large, where Tb is the regularized least squares estimators defined by (2)
with regularizer given by (35). In addition,
√
2
2 s max{p, log(m/ s)}
e
min max kT − T kF ≥ c3 µmin σ
,
n
Te T ∈T3
for some constant c3 > 0, with probability at least 1/2, where the minimum is taken over all
estimators Te based on data {X (t) : t = 0, . . . , n + p}.
Theorem 4 provides, to our best knowledge, the only lower bound result for multivariate
time series. The upper bound is also novel and is different from Proposition 4.1 in Basu and
Michailidis (2015) since we impose sparsity only on the large m directions and not over the p
lags, whereas Basu and Michailidis (2015) impose sparsity through vectorization. Note that
Proposition 4.1 in Basu and Michailidis (2015) follows directly from Lemma 2 with d1 = p
and d2 = d3 = m. Using the sparsity regularizer Basu and Michailidis (2015) vectorize
the problem and prove restricted strong convexity whereas since we leave the problem as a
multi-response problem, we requried the more refined technique used for proving Lemma 12.
25
4.3
Pairwise interaction tensor models
Finally, we consider the tensor regression (1) where T follows a pairwise interaction model.
More specifically, (X (i) , Y (i) ), i = 1, 2, . . . , n are independent copies of a random couple
X ∈ Rd1 ×d2 ×d3 and Y ∈ R such that
Y = hX, T i +
and
(13)
(12)
(23)
Tj1 j2 j3 = Aj1 j2 + Aj1 j3 + Aj2 j3 .
Here A(k1 ,k2 ) ∈ Rdk1 ×dk2 such that
A(k1 ,k2 ) 1 = 0,
(A(k1 ,k2 ) )> 1 = 0.
and
The pairwise interaction was used originally by Rendle et al. (2009); Rendle and SchmidtThieme (2010) for personalized tag recommendation, and later analyzed in Chen et al. (2013).
Hoff (2003) briefly introduced a single index additive model (amongst other tensor models)
which is a sub-class of the pairwise interaction model. The regularizer we consider is:
R(A) = kA(12) k∗ + kA(13) k∗ + kA(23) k∗ .
(37)
It is not hard to see that R defined above is decomposable with respect to A(P1 , P2 , P3 ) for
any projection matrices.
Let
(12)
(13)
(23)
T4 = {A ∈ Rd1 ×d2 ×d3 : Aj1 j2 j3 = Aj1 j2 + Aj1 j3 + Aj2 j3 , A(k1 ,k2 ) ∈ Rdk1 ×dk2 ,
A(k1 ,k2 ) 1 = 0,
and
(A(k1 ,k2 ) )> 1 = 0
max rank(A(k1 ,k2 ) ) ≤ r}.
k1 ,k2
For simplicity, we assume i.i.d. Gaussian design so c2` = c2u = 1.
Theorem 5. Under the pairwise interaction model with T ∈ T4 , if
r
max{d1 , d2 , d3 }
λ ≥ 3σ
,
n
26
such that
√
rλ converges to zero as n increases, then there exist constants c1 , c2 > 0 such
that with probability at least 1 − min{d1 , d2 , d3 }−c1 ,
n
o
2
2
b
b
max kT − T kn , kT − T kF ≤ c2 rλ2 ,
when n is sufficiently large, where Tb is the regularized least squares estimate defined by (2)
with regularizer given by (37). In addition,
c3 σ 2 r max{d1 , d2 , d3 }
min max kTe − T k2F ≥
,
n
Te T ∈T4
for some constant c3 > 0, with probability at least 1/2, where the minimum is taken over all
estimate Te based on data {(X (i) , Y (i) ) : 1 ≤ i ≤ n}.
As in the other settings, Theorem 5 establishes the minimax optimality of the regularized
least squares estimate (2) when using an appropriate convex decomposable regularizer. Since
this is single response and the norm involves matricization, this result is a straightforward
extension to earlier results.
5
Numerical Experiments
In this section, we provide a series of numerical experiments that both support our theoretical results and display the flexibility of our general framework. In particular, we consider several different models including: third-order tensor regression with a scalar response
(Section 5.1); fourth-order tensor regression (Section 5.2); matrix-response regression with
both group sparsity and low-rankness regularizers (Section 5.3); multi-variate sparse autoregressive models (Section 5.4); and pairwise interaction models (Section 5.5). To perform
the simulations in a computationally tractable way, we adapt the block coordinate descent
approaches in multi-response case developed by Simon et al. (2013), and those developed by
Qin et al. (2013) for univariate response settings, to capture group sparsity and low-rankness
regularizers.
To fix ideas, in all numerical experiments, the covariate tensors X (i) s were independent
standard Gaussian ensembles (except for the multivariate auto-regressive models); and the
noise (i) s are i.i.d. random tensors with elements following N (0, σ 2 ) independently. As to
27
the choice of tuning parameter, we adopt grid search on λ to find the one with the least
estimation error (in terms of mean squared error) in all our numerical examples.
5.1
Third-order tensor regression
First we consider a third-order tensor regression model:
Y (i) = hB, X (i) i + (i)
where B ∈ Rd×d×d ,
Y (i) , (i) ∈ R,
X (i) ∈ Rd×d×d . The regression coefficient tensor B
was generated as follows: the first s slices B··1 , . . . B··s are i.i.d standard normal ensembles;
and the remaining slices B··s+1 , . . . B··d3 are set to be zero. Naturally, we consider here the
group-sparsity regularizer:
(
min
A∈Rd×d×d
n
d
X
1 X (i)
(i) 2
kY − hA, X ikF + λ
kA··j3 kF
2n i=1
j =1
)
.
3
Figure 1 shows the mean squared error of the estimate averaged over 50 runs (with standard
20
1.5
0.3
15
n
5000
10
4000
mse
4000
8
mse
mse
n
d
3000
1.0
4500
10
0.2
5000
12
0.5
5
0.1
0
0.0
8
10
12
d
14
16
3000
3500
4000
n
4500
5000
2
3
4
s
5
6
Figure 1: Mean squared error of the group-sparsity regularization for third order tensor
regression. The plot was based on 50 simulation runs and the error bars in each panel
represent ± one standard deviation.
deviation) versus d, n and s respectively. In the left and middle panels, we set s = 2,
whereas in the right panel, we fixed d = 16. As we can observe, the mean squared error
28
increases approximately according to d2 , s, and 1/n which agrees with the risk bound given
in Lemma 4.
We also considered a setting where B is slice-wise low-rank. More specifically, the s
nonzero slices B··1 , . . . B··s were random rank-r matrices. In this case, the slice-wise lowrankness regularizer can be employed:
)
(
d3
n
X
1 X (i)
kA··j3 k∗ .
kY − hA, X (i) ik2F + λ
min
2n i=1
A∈Rd1 ×d2 ×d3
j =1
3
The performance of the estimate, averaged over 50 simulation runs, is summarized by Figure
5
3
0.6
4
2
n
d
0.4
12
4000
4000
mse
3000
n
3
10
mse
mse
2000
4500
14
5000
2
1
0.2
1
0
8
10
12
d
14
16
3000
3500
4000
n
4500
5000
2
3
4
r
5
6
Figure 2: Mean squared error for third order tensor regression with low-rank slices tensor
coefficients. The plot was based on 50 simulation runs and the error bars in each panel
represent ± one standard deviation.
2 where in the left and middle panels r = 2, and in the right panel, d = 16. Once again, our
results are consistent with our theoretical results.
5.2
Fourth-order tensor regression
Although we have focused on third order tensors for brevity, our treatment applies to higher
order tensors as well. As an illustration, we now consider fourth order models where B ∈
Rd×d×d×d ,
Y (i) , (i) ∈ R,
X (i) ∈ Rd×d×d×d .
29
To generate low-rank fourth-order tensors, we impose low CP rank as follows: generate
four independent groups of r independent random vectors of unit length, {uk,1 }rk=1 , {uk,2 }rk=1 ,
{uk,3 }rk=1 and {uk,4 }rk=1 via performing an SVD of Gaussian random matrix two times and
keeping the r pairs of leading singular vectors, and then compute the outer-product yielding
P
a rank-r tensor B = rk=1 uk,1 ⊗ uk,2 ⊗ uk,3 ⊗ uk,4 .
We consider two different regularization schemes. First we impose low-rank structure
through mode-1 matricization:
(
min
A∈Rd×d×d×d
n
1 X (i)
kY − hA, X (i) ik2F + λkM1 (A)k∗
2n i=1
)
.
Secondly we use the square matricization as follows:
(
)
n
1 X (i)
kY − hA, X (i) ik2F + λkM12 (A)k∗ ,
min
2n i=1
A∈Rd×d×d×d
where M12 (·) reshape a fourth order tensor into a d2 × d2 matrix by collapsing its first two
indices, and last two indices respectively. Table 1 shows the average root-mean-square error
(RMSE, for short) for both approaches. As we can see, the 2-by-2 approach appears superior
to the 1-by-3 approach which is also predicted by the theory.
n
d
r
2000
7
2000
7
σ
SNR
RMSE (Mode-1 Matricization)
RMSE (Square Matricization)
5 10 3.0 (0.1)
0.53 (0.01)
0.51 (0.01)
3 10 1.5 (0.1)
0.58 (0.02)
0.49 (0.02)
4000 10 3 10 1.7 (0.1)
0.67 (0.01)
0.51 (0.02)
Table 1: Tensor regression with fourth order tensor covariates and scale response based on
matricization: RMSE were computed based on 50 simulations runs. Numbers in parentheses
are standard errors.
5.3
Matrix-response regression
Our general framework can handle matrix-responses in a seamless fashion. For demonstration, we consider here matrix-response regression with both group sparsity and low-rankness
regularizer. More specifically, the following model was considered:
Y (i) = hB, X (i) i + (i)
30
where B ∈ Rd×d×d ,
Y (i) , (i) ∈ Rd×d ,
X (i) ∈ Rd . As before, to impose group sparsity, the
first s slices of B were generated as Gaussian ensembles and the remaining slices were set to
zero.
For both the group sparsity and low-rankness regularizers, we used the matrix-version
algorithm for group-penalized multi-response regression in Simon et al. (2013). For each
block of the coordinate descent, the sub-problem with both `1 and nuclear norm penalty
have closed-form solutions.
6
6
7.5
5
4
n
2000
n
1000
20
mse
mse
4
d
1000
25
mse
5.0
2000
3
3000
2.5
3000
30
2
2
1
0.0
10
15
20
d
25
30
1000
1500
2000
n
2500
3000
2
4
6
s
8
10
Figure 3: Matrix response regression with sparse slices tensor coefficients. The plot was
based on 50 simulation runs and the error bars in each panel represent ± one standard
deviation.
Figure 3 shows the average (with standard deviation) mean squared error over 50 runs
versus the d, n and s parameter. (Here d1 = d2 = d3 = d). As we observe, the mean-squared
error increase approximately according to log d, s, and 1/n which supports our upper bound
in Theorem 2.
We also generated low-rank B in the same fashion as before. Figure 4 plots the average
(with standard deviation) mean squared error against d, n and r respectively. These results
are consistent with the main result in Theorem 3.
31
10.0
10.0
6
7.5
7.5
n
d
2000
25
5.0
3000
1000
mse
5.0
n
20
mse
mse
1000
2000
4
30
3000
2.5
2
2.5
0.0
10
15
20
d
25
30
1000
1500
2000
n
2500
3000
2
4
6
r
8
10
Figure 4: Matrix response regression with low-rank slices tensor coefficients. The plot was
based on 50 simulation runs and the error bars in each panel represent ± one standard
deviation.
5.4
Multivariate sparse auto-regressive models
Now we consider dependent covariates and responses through the multivariate auto-regressive
model. Recall that the generative model is:
X
(t+p)
=
p
X
B··j X (t+p−j) + (t) ,
j=1
(n+p)
where 1 ≤ t ≤ n represents the time index, 1 ≤ j ≤ p represents the lag index, {X (t) }t=0
is an m-dimensional vector, (t) ∼ σN (0, Im×m ) represents the additive noise.
We consider four different low-dimensional structures for B and we choose the entries of
B to be sufficiently small to ensure the time series is stable.
• Slice-wise sparsity: B··1 , . . . B··s are s non-zero slices of diagonal matrix, where diagonal
elements are constants ρ with ρ = 2. B··s+1 , . . . B··d3 are zero slices.
• Sparse low-rank slices: B··1 , . . . B··s are s non-zero slices, which are independent random
rank-r matrix (truncated matrix with i.i.d elements from N (0, τ 2 )). B··s+1 , . . . B··d3 are
zero slices. Here τ = 1/150 for m = 10 and τ = 1/500 for m = 20.
32
• Group Sparsity by lag (sparse normal slices):B··1 , . . . B··s are s non-zero slices, where
elements follow i.i.d N (0, τ 2 ) with τ = 0.05. B··s+1 , . . . B··d3 are zero slices.
• Group sparsity by coordinate (sparse normal fibers):
Bs1 s2 · is a vector of i.i.d normal elements following N (0, τ 2 ) (τ = 0.1) when (s1 , s2 ) ∈ S,
which is a random sample of size s from {1, . . . , m} × {1, . . . , m}, and zero otherwise.
Table 2 shows the average rmse for 50 runs of each case as a function of m, p, s and r.
In general, the smaller the n is, or the larger the m(or p) is, the harder it is to recover the
coefficient B. These findings are consistent with our theoretical developments.
5.5
Pairwise interaction tensor models
Finally we consider the so-called pairwise interaction tensor models as described in Section 4.3. To implement this regularization scheme we kept iterating among the matrix slices
A1,2 , A1,3 and A2,3 and updating one of the three at a time while assuming the other two
components are fixed. For the update of Ak1 ,k2 , we conducted an approximated projection
onto the zero-row-sum/zero-column-sum subspace after each generalized gradient descent
(soft thresholding) step.
(i+1)
(i)
Ak1 ,k2 = P̂ (P̂λη (Ak1 ,k2 − η∇f ))
where η is the step size for the gradient step, ∇f is the gradient of the least square objective
function, P̂λη is the singular space soft-thresholding operator with threshold λη, and P̂ is
the approximated projection operator that make any given matrix have zero row sums (by
shifting rows) and zero column sums (by shifting columns). We simulated independent
random low-rank matrix Ck1 ,k2 s and make them have zero column sums and row sums by
Bk1 ,k2 = P̂ (Ck1 ,k2 ).
Table 3 shows the average (with standard deviation) rmse under different r, d, n combinations under 50 runs. In general, the rmse in estimating the tensor coefficient increases as
s and d increases.
33
34
s diagonal slices
s diagonal slices
s rank-r slices
s rank-r slices
s Gaussian slices
s Gaussian slices
s Gaussian fibers
s Gaussian fibers
Vectorized
Sparsity
Low-rank
Slices
Group Sparsity
(by lag)
Group Sparsity
(by coordinate)
m
p
2000 20 20
2000 10 10
2000 20 20
2000 10 10
2000 20 20
2000 10 10
2000 20 20
2000 10 10
n
2
2
σ
s = 10
s = 10
s=5
s=5
0.02
0.02
0.2
0.2
s = 10, r = 5 0.05
s = 10, r = 5 0.05
s=5
s=5
s/r
1.2 (0.1)
0.93 (0.2)
0.42 (0.01)
0.42 (0.02)
1.2 (0.1)
1.0 (0.1)
2.9 (0.7)
5.5 (1.4)
SNR (sd)
0.72 (0.07)
0.35 (0.04)
0.64 (0.02)
0.40 (0.01)
0.82 (0.02)
0.37 (0.01)
0.25 (0.04)
0.43 (0.15)
rmse (sd )
simulations runs. Numbers in parentheses are standard errors.
Table 2: Multivariate auto-regressive model with various sparsity/low-rankness: RMSE were computed based on 50
coefficient tensor
Regularizer
n
d1
d2
d3
s
σ
RMSE
SNR
2000 40 40 40
5
10 0.54 (0.02)
2.4 (0.1)
2000 40 40 40
10 10 0.70 (0.01)
3.4 (0.1)
2000 20 20 20
5
10 0.39 (0.01)
1.7 (0.1)
2000 20 20 20
10 10 0.37 (0.01)
2.3 (0.1)
1000 20 20 20
5
10 0.58 (0.02)
1.6 (0.1)
1000 20 20 20
10 10 0.63 (0.02)
2.3 (0.1)
Table 3: Pairwise interaction model: RMSE were computed based on 50 simulations runs.
Numbers in parentheses are standard errors.
6
Proofs
In this section, we present the proofs to our main results. We begin with the proof of
Theorem 1.
6.1
Proof of Theorem 1
Our proof involves the following main steps:
• In the initial step, we use an argument similar to those developed in Negahban et al.
(2012) to exploit weak decomposability and properties of the empirical risk minimizer
and convex duals to upper bound kTb − T kn in terms of R(Tb − T ), and λ.
• Next, we use properties of Gaussian random variables and supremum of Gaussian
processes to express the lower bound on λ in terms of the Gaussian width E[R∗ (G)]
(Lemma 11 below).
• The final and most challenging step involves proving a one-sided uniform law relating
kTb − T kn to kTb − T kF (Lemma 12 below) which is analogous to restricted strong
convexity. The proof for Lemma 12 uses a novel truncation argument and is similar
in spirit to that of Lemma 4 in Raskutti et al. (2012). Lemma 12 is necessary to
incorporate multiple responses as existing results relating the k · kn to the population
35
k · kF norm (e.g., Dasgupta and Gupta, 2010; Raskutti et al., 2010; van de Geer, 2000)
only apply to univariate functions.
Throughout R(A) refers to the weakly decomposable regularizer over the tensor A. For a
tensor A, we shall write A0 and A⊥ as its projections onto A0 and A⊥ with respect to the
Frobenius norm, respectively.
Since Tb is the empirical minimizer,
n
n
1 X (i)
1 X (i)
kY − hX (i) , Tbik2F + λR(Tb) ≤
kY − hX (i) , T ik2F + λR(T ).
2n i=1
2n i=1
Substituting Y (i) = hX (i) , T i + (i) and ∆ = Tb − T ,
n
n
1 X
1 X (i)
(i)
2
khX , ∆ikF ≤
h ⊗ X (i) , ∆i + λ(R(T ) − R(Tb))
2n i=1
n i=1
!
n
X
1
≤ R∗
(i) ⊗ X (i) R(∆) + λ(R(T ) − R(Tb0 ) − cR R(Tb⊥ ))
n i=1
!
n
X
1
(i) ⊗ X (i) R(∆) + λ(R(∆0 ) − cR R(∆⊥ )),
≤ R∗
n i=1
where the second inequality follows from the decomposability and the last one follows from
triangular inequality.
Let G ∈ Rd1 ×d2 ×...×dN be an tensor where each entry is i.i.d. N (0, 1). Recall the definition
of Gaussian width:
wG [BR (1)] = E[R∗ (G)].
For simplicity let
ηR =
3 + cR
2cR
and recall that λ ≥ 2cu ηR n−1/2 E[R∗ (G)]. We have the following Lemma:
Lemma 11. If λ ≥ 2σcu ηR n−1/2 E[R∗ (G)], then
λ ≥ ηR R∗
!
n
1 X (i)
⊗ X (i) ,
n i=1
2
with probability at least 1 − exp{−ηR
E[R∗ (G)]2 /4}
36
The proof relies on Gaussian comparison inequalities and concentration inequalities.
Proof of Lemma 11. Recall that we have set:
λ≥
2σηR cu
√
E[R∗ (G)].
n
First we show that λ ≥ σcu ηR n−1/2 R∗ (G) with high probability using concentration of
Lipschitz functions for Gaussian random variables (see Theorem 7 in Appendix A). First we
prove that f (G) = R∗ (G) = supA∈BR (1) hG, Ai is a 1-Lipschitz function in terms of G. In
particular note that:
f (G) − f (G0 ) =
sup hG0 , Ai.
sup hG, Ai −
A:R(A)≤1
A:R(A)≤1
e := arg maxA:R(A)≤1 hG, Ai. Then
Let A
sup hG, Ai −
A:R(A)≤1
e − sup hG0 , Ai
sup hG0 , Ai = hG, Ai
R(A)≤1
A:R(A)≤1
e − hG0 , Ai
e
≤ hG, Ai
e
≤ hG − G0 , Ai
sup hG − G0 , Ai
≤
A:R(A)≤1
sup hG − G0 , Ai
≤
A:kAkF ≤1
0
≤ kG − G kF ,
where recall that kAkF ≤ R(A) which implies the second last inequality. Therefore f (G) is a
1-Lipschitz function with respect to the Frobenius norm. Therefore, by applying Theorem 7
in Appendix A,
(
P
)
sup hG, Ai − E[ sup hG, Ai] > wG (BR (1))
A∈BR (1)
A∈BR (1)
Therefore
ηR σcu
λ ≥ √ R∗ (G)
n
2
with probability at least 1 − 2 exp{−wG
[BR (1)]/2}.
37
1 2
≤ 2 exp − wG [BR (1)] .
2
To complete the proof, we use a Gaussian comparison inequality between the supremum
P
of the process cu n−1/2 hG, Ai and n−1 ni=1 h(i) ⊗ X (i) , Ai over the set BR (1). Recall that:
!
*
+
n
n
X
X
1
1
(i) ⊗ X (i) = sup
A,
(i) ⊗ X (i) .
R∗
n i=1
n
A∈BR (1)
i=1
Recall that each (i) ∈ RdM +1 ×dM +2 ×...×dN is an i.i.d. standard centered Gaussian tensor
with each entry having variance σ 2 and vec(X) ∈ Rnd1 d2 ···dM is a Gaussian vector covariance
Σ ∈ R(nDM )×(nDM ) . First we condition on all the (i) ’s, which are indepedendent of the
X (i) ’s. Further let {w(i) : i = 1, . . . , n} be i.i.d. standard normal Gaussian tensors where
w(i) ∈ Rd1 ×d2 ×...×dM . First we condition on all the (i) ’s, which are indepedendent of the X (i) ’s.
Assuming (18) and using a standard Gaussian comparison inequality due to Lemma 14 in
Appendix A proven earlier in Anderson (1955), if we condition on the (i) ’s we get
)
(
)
(
n
n
X
1
x
1 X (i)
h ⊗ X (i) , Ai > x ≤ P
sup
h(i) ⊗ w(i) , Ai >
,
P
sup
n
n
cu
A:R(A)≤1
A:R(A)≤1
i=1
i=1
since
Cov(vec(X)) = Σ c2u I(nDM )×(nDM ) .
Now we define the wj ∈ Rn as the standard random vector where 1 ≤ j ≤ DM and wj =
(1)
(n)
(wj , ..., wj ). Conditioning on the w(i) ’s and dealing with the randomness in the (i) ’s,
n
1 X (i)
kwj k`2 σ
√ √ hG, Ai,
h ⊗ w(i) , Ai ≤ max
1≤j≤DM
n i=1
n
n
where G ∈ Rd1 ×d2 ×...×dN is an i.i.d. standard normal tensor, since the (i) ’s are i.i.d. standard
normal. Now we upper bound
max
1≤j≤DM
kwj k`2
√ ,
n
using standard χ2 tail bounds. Since kwj k2`2 is a χ2 random variable with n degrees of
freedom, for each j,
P
kwj k2`2
≥ 4 ≤ exp(−n),
n
using χ2 tail bounds provided in Appendix A presented in Laurent and Massart (1998). Now
taking the union bound over DM ,
kwj k`2
√
P
max
≥ 2 ≤ exp(log DM − n),
1≤j≤DM
n
38
and provided n ≥ 2 log DM , it follows that with probability greater than 1 − exp(−n/2),
max1≤j≤DM
kwj k`2
√
n
≤ 2. Therefore, with probability at least 1 − exp(−n/2),
n
1 X (i)
2σ
h ⊗ w(i) , Ai ≤ √ hG, Ai.
n i=1
n
Now we apply Slepian’s lemma (Slepian, 1962) to complete the proof. Slepian’s lemma
is stated in Appendix A. Applying Slepian’s lemma (Lemma 15 in Appendix A),
)
(
(
)
n
2σ
1 X (i)
(i)
h ⊗ w , Ai > x ≤ P
sup √ hG, Ai > x ,
P
sup
n
R(A)≤1
R(A)≤1 n i=1
for all x > 0. Substituting x by x/cu means that
!
)
(
n
X
2σcu ∗
1
(i)
(i)
∗
h ⊗ w , Ai > x ≤ P √ R (G) > x ,
P R
n i=1
n
for any x > 0. This completes the proof.
In light of Lemma 11, for the remainder of the proof, we can condition on the event that
!
n
X
1
λ ≥ ηR R∗
(i) ⊗ X (i) .
n i=1
Under this event,
n
1 X
1
λR(∆) + λ(R(∆0 ) − cR R(∆⊥ ))
khX (i) , ∆ik2F ≤
2n i=1
ηR
1
1
≤
1+
λR(∆0 ) − cR −
λR(∆⊥ ).
ηR
ηR
Since
n
1 X
kh∆, X (i) ik2F ≥ 0,
2n i=1
we get
R(∆⊥ ) ≤
3
R(∆0 ).
cR
Hence we define the cone
C = ∆ | R(∆⊥ ) ≤ 3c−1
R R(∆0 ) ,
39
and know that ∆ ∈ C. Hence
n
1 X
3(1 + cR )
3(1 + cR ) p
khX (i) , ∆ik2F ≤
λR(∆0 ) ≤
s(A)λk∆kF .
2n i=1
3 + cR
3 + cR
Recall that
n
1X
khX (i) , ∆ik2F = k∆k2n .
n i=1
Thus,
k∆k2n ≤
6(1 + cR ) p
s(A)λk∆kF .
3 + cR
For convenience, in the remainder of this proof let
δn :=
6(1 + cR ) p
s(A)λ.
3 + cR
Now we split into three cases. (i) If k∆kn ≥ k∆kF , then
max{k∆kn , k∆kF } ≤ δn .
On the other hand if (ii) k∆kn ≤ k∆kF and k∆kF ≤
max{k∆kn , k∆kF } ≤
cu
δ ,
c` n
then
cu
δn .
c`
Hence the only case we need to consider is (iii) k∆kn ≤ k∆kF and k∆kF ≥ cu c−1
` δn . Now we
follow a similar proof technique to the proof for Theorem 1 in Raskutti et al. (2012).
Let us define the following set:
C(δn ) := ∆ ∈ Rd1 ×d2 ×···×dN | R(∆⊥ ) ≤ 3c−1
R R(∆0 ), k∆kn ≤ k∆kF .
Further, let us define the event:
1
cu
2
2
E(δn ) := k∆kn ≥ k∆kF | ∆ ∈ C(δn ), k∆kF ≥ δn .
4
c`
Let us define the alternative event:
1
cu
E 0 (δn ) := {k∆k2n ≥ k∆k2F | ∆ ∈ C(δn ), k∆kF = δn }.
4
c`
40
We claim that it suffices to show that E 0 (δn ) holds with probability at least 1 − exp(−cn)
for some constant c > 0. In particular, given an arbitrary non-zero ∆ ∈ C(δn ), consider the
re-scaled tensor
e = c u δn ∆ .
∆
c` k∆kF
e ∈ C(δn ) and k∆k
e F = cu c−1 δn by
Since ∆ ∈ C(δn ) and C(δn ) is star-shaped, we have ∆
`
construction. Consequently, it is sufficient to prove that E 0 (δn ) holds with high probability.
Lemma 12. Assume that for any c > 0, there exists an n such that
√
sλ ≤ c. Then there
exists a c̃ > 0 such that
P E 0 (δn ) ≥ 1 − exp(−c̃n).
Proof of Lemma 12. Denote by DN = d1 d2 · · · dN and DM = d1 d2 · · · dM . Now we define the
random variable
(
Zn (C(δn )) = sup
∆∈C(δn )
n
c2u 2 1 X
δ −
kh∆, X (i) ik2F
c2` n n i=1
then it suffices to show that
Zn (C(δn )) ≤
Recall that the norm
)
,
c2u δn2
.
2c2`
n
k∆k2n
1X
kh∆, X (i) ik2F .
=
n i=1
To expand this out, reacall [M ] = {1, 2, ..., M } and define an extension of the standard
matricization
˜ := M[M ] (∆) ∈ RDM ×DN /DM ,
∆
which groups together the first M modes. With a slight abuse of notation, it follows that
k∆k2n
n DN /DM
1X X ˜
h∆m , vec(X (i) )i2 ,
=
n i=1 m=1
˜ m ∈ RDM , and clearly vec(X (i) ) ∈ RDM . In order to complete the proof we make use
where ∆
of a truncation argument. For a constant τ > 0 to be chosen later, consider the truncated
quadratic function
φτ (u) = min{u2 , τ 2 },
41
and define
q
˜ m , vec(X)i) φτ (h∆
˜ m , vec(X)i)
∆m,τ (X) = sign h∆
where X ∈ Rd1 ×d2 ×...×dM is an input tensor. Further let
∆τ (X) = (∆1,τ (X), ∆2,τ (X), ..., ∆DN /DM ,τ (X))
and
k∆m,τ k2F = E[∆2m,τ (X)],
k∆τ k2F =
PDN /DM
m=1
k∆m,τ k2F , and similarly
n
k∆m,τ k2n
k∆τ k2n =
PDN /DM
m=1
1X 2
∆m,τ (X (i) ),
=
n i=1
k∆m,τ k2n . By construction, for any ∆ ∈ C(δn ), k∆k2n ≥ k∆τ k2n and hence
k∆k2n ≥ k∆τ k2F − sup |k∆τ k2n − k∆τ k2F |
∆∈C(δn )
The remainder of the proof consists of showing that for a suitable of τ ,
3
k∆τ k2F ≥ k∆k2F , for all ∆ ∈ C(δn )
4
and
c2
P Zn ≥ u2 δn2
4c`
2
≤ c1 e−c2 nδn ,
where Zn := sup∆∈C(δn ) |k∆τ k2n − k∆τ k2F |. By definition
˜ m , vec(X)i2 1[|∆
˜ m , vec(X)i| ≥ τ ]
k∆m k2F − k∆m,τ k2F ≤ E h∆
q
q
4
˜
˜ m , vec(X)i| ≥ τ ]
≤
E[h∆m , vec(X)i ] P[|∆
˜ m , vec(X)i4 ]
E[h∆
≤
,
τ2
where the second last inequality follows from the Cauchy-Schwartz inequality and the fi˜ m , vec(X)i is a Gaussian random
nal inequality follows from Markov’s inequality. Since h∆
variable,
˜ m , vec(X)i4 ] ≤ 3E[h∆
˜ m , vec(X)i2 ] = 3k∆m k2 .
E[h∆
F
42
Therefore
k∆m k2F
−
≤9
.
τ2
Setting τ 2 = 36, k∆m k2F − k∆m,τ k2F ≤ 14 k∆m k2F . Summing over m implies
k∆m k2F
k∆m,τ k2F
1
k∆k2F − k∆τ k2F ≤ k∆k2F ,
4
which implies k∆τ k2F ≥ 34 k∆k2F . Now to prove the high probability bound on Zn by first upper
bounding E[Zn ]. A standard symmetrization argument (see e.g., Pollard, 1984), shows that
/DM
n DN
X
X
1
(i)
˜ m , vec(X (i) )i) ,
φτ (h∆
EX [Zn ] ≤ 2EX,z sup
zm
n
∆∈C(δn )
i=1 m=1
(i)
(i)
(i)
where zm are i.i.d. Rademacher random variables (that is P (zm = +1) = P (zm = −1) =
˜ m , vec(X (i) )i) is a Lipschitz function with Lipschitz constant 2τ , the
1/2). Since φτ (h∆
Ledoux-Talagrand contrtaction inequality (Ledoux and Talagrand, 1991) implies that ,
DN /DM
n
1 X X (i)
˜ m , vec(X (i) )i)
EX [Zn ] ≤ 2EX,z sup
zm φτ (h∆
∆∈C(δn ) n i=1 m=1
/DM
n DN
X
X
1
(i) ˜
≤ 8τ EX,z sup
zm
h∆m , vec(X (i) )i .
n
∆∈C(δn )
i=1 m=1
Using standard comparisons between Rademacher and Guassian complexities (see, e.g.,
Lemma 4 of Bartlett and Mendelson, 2002), there exists a C > 0 such that
/DM
n DN
X
X
1
(i) ˜
zm
h∆m , vec(X (i) )i
EX,z sup
∆∈C(δn ) n i=1 m=1
DN /DM
n
1X X
(i) ˜
wm
h∆m , vec(X (i) )i ,
≤ CEX,w sup
∆∈C(δn ) n i=1 m=1
(i)
where wm s (1 ≤ i ≤ n and 1 ≤ m ≤ DN /DM ) are independent standard normal random
variables.
Next we upper bound the Gaussian complexity
Ew
!
n
1 X (i)
sup
hw ⊗ X (i) , ∆i .
∆∈C(δn ) n i=1
43
Clearly,
n
1 X (i)
hw ⊗ X (i) , ∆i ≤ R∗
n i=1
!
n
X
1
λ
R(∆).
w(i) ⊗ X (i) R(∆) ≤
n i=1
ηR
by the definition of λ and our earlier argument. Since ∆ ∈ C(δn ),
p
p
λ
λ(1 + 3c−1
λ(1 + 3c−1
cu (1 + 3c−1
R )
R )
R )
R(∆) ≤
R(∆0 ) ≤
δn s(A)λ.
s(A)k∆0 kF ≤
ηR
ηR
ηR
c` ηR
Therefore,
Ew
!
n
p
cu (1 + 3c−1
1 X (i)
R )
δn s(A)λ.
hw ⊗ X (i) , ∆i ≤
sup
c` ηR
∆∈C(δn ) n i=1
Since
we have
Ew
p
cu (1 + 3c−1
2cu
R )
s(A)λ =
δn ,
c` ηR
c`
!
n
X
1
cu 2
sup
hw(i) ⊗ X (i) , ∆i ≤
δ .
c` ηR n
∆∈C(δn ) n i=1
Finally we need a concentration bound to show that
c2u 2
2
P Zn ≥ 2 δn ≤ c1 e−c2 nδn .
4c`
In particular using Talagrand’s theorem for empirical processes (Talagrand, 1996). By construction φτ (.) ≤ τ 2 = 36 and
DN /DM
X
˜ m , vec(X)i) ≤
Var
φτ (h∆
DN /DM
X
m=1
˜ m , vec(X)i)]
E[φ4τ (h∆
m=1
DN /DM
≤ τ
2
X
˜ m k2` ≤
k∆
2
m=1
36c2u δn2
.
c2`
Consequently Talagrand’s inequality implies that
c2 nu2
P Zn ≥ E[Zn ] + u ≤ c1 exp − 2
.
3δn + 9u2
Since E[Zn ] ≤
cu
δ2 ,
c` ηR n
the claim follows by setting u =
cu
δ2 .
c` η R n
Finally we return to the main proof. On the event E(δn ), it now follows easily that,
max{k∆k2`2 , k∆k2n } ≤
This completes the proof for Theorem 1.
44
ηR c2u
s(A)λ2 .
c2`
6.2
Proof of other results in Section 3
In this section we present proofs for the other main results from Section 3, deferring the
more technical parts to the appendix.
Proof of Lemmas 2, 3 and 4. We prove these three lemmas together since the proofs follow
a very similar argument. First let S ⊂ {1, 2, 3} denote the directions in which sparsity is
Q
applied and DS = k∈S dk denote the total dimension in all these directions. For example,
in Lemma 2 S = {1, 2, 3} and DS = d1 d2 d3 , for Lemma 3, S = {2, 3} and DS = d2 d3 and for
Lemma 4, S = {1} and DS = d1 . Recall N = {1, 2, 3} and DN = d1 d2 d3 .
Note that R∗ (G) can be represented by the variational form:
R∗ (G) =
dS1 ×...×dS|S|
where u ∈ R
and v ∈ R
hG, u ⊗ vi,
sup
kvec(u)k`1 ≤1,kvkF ≤1
dS c ×...×dS c
1
N −|S|
. Now we express the supremum of this
Gaussian process as:
sup vec(u)> MS (G)vec(v),
(u,v)∈V
where recall MS is the matricization involving either slice or fiber S. The remainder of the
proof follows from Lemma 16 in Appendix B.
Proof of Lemma 5. Recall that
R∗ (G) := max kG..j3 ks .
1≤j3 ≤d3
For each 1 ≤ j3 ≤ d3 , Lemma 17 in Appendix B with N = 2 satisfies the concentration
inequality
E[kG..j3 ks ] ≤
p
6(d1 + d2 ).
Applying standard bounds on the maximum of functions of independent Gaussian random
variables,
E[ max kG..j3 ks ] ≤
p
1≤j3 ≤d3
This completes the proof.
45
6(d1 + d2 + log d3 ).
Proof of Lemma 6. Using the standard nuclear norm upper bound for a matrix in terms of
rank and Frobenius norm:
R24 (A)
d3
X
=
!2
kA··j3 k∗
j3 =1
d3 q
X
rank(A··j3 )kA··j3 kF
≤
!2
j3 =1
≤
d3
X
rank(A··j3 )
j3 =1
d3
X
kA··j3 k2F =
j3 =1
d3
X
rank(A··j3 )kAk2F ,
j3 =1
where the final inequality follows from the Cauchy-Schwarz inequality. Finally, note that for
any A ∈ Θ4 (r)/{0},
d3
X
rank(A··j3 ) ≤ r,
j3 =1
which completes the proof.
Proof of Lemma 7. Note that R∗ (G) = kGks , we can directly apply Lemma 17 with N = 3
from Appendix B.
Proof of Lemma 8. From Tucker decomposition (16), it is clear that for any A ∈ Θ5 (r), we
can find sets of vectors {uk : k = 1, . . . , r2 }, {vk : k = 1, . . . , r2 } and {wk : k = 1, . . . , r2 }
such that
2
A=
r
X
uk ⊗ vk ⊗ w k ,
k=1
and in addition,
>
>
u>
k uk0 = (vk vk0 )(wk wk0 ) = 0
for any k 6= k 0 . It is not hard to see that
2
kAk2F
=
r
X
kuk k2`2 kvk k2`2 kwk k2`2 .
k=1
46
On the other hand, as shown by Yuan and Zhang (2014),
2
kAk∗ =
r
X
(kuk k`2 kvk k`2 kwk k`2 ) .
k=1
The claim then follows from an application of Cauchy-Schwartz inequality.
Proof of Lemma 9. Recall that we are considering the regularizer
R∗6 (A) = 3 max {kM1 (A)ks , kM2 (A)ks , kM3 (A)ks } ,
and our goal is to upper bound
R∗6 (G) = 3 max kMk (G)ks .
1≤k≤3
Once again apply Lemma 17 in Appendix B with N = 2 for each matricization implies
p p p
E[R∗6 (G)] ≤ 4 max( d1 , d2 , d3 ).
Proof of Lemma 10. It is not hard to see that
1
(kM1 (A)k∗ + kM2 (A)k∗ + kM3 (A)k∗ )2
9
√
√
1 √
( r1 + r2 + r3 )2 kAk2F
≤
9
≤ max{r1 (A), r2 (A), r3 (A)}kAk2F ,
R6 (A)2 =
which completes the proof.
6.3
Proof of results in Section 4
In this section we prove the results in Section 4. First we provide a general minimax lower
result that we apply to our main results. Let T ⊂ Rd1 ×d2 ×···×dN be an arbitrary subspace of
order-N tensors.
47
Theorem 6. Assume that (18) holds and there exists a finite set {A1 , A2 , . . . , Am } ∈ T of
tensors such that log m ≥ 128nδ 2 , such that
2 −2 2
`2 2
2
`1
nσ 2 c−2
u δ ≤ kA − A kF ≤ 8nσ cu δ ,
for all `1 6= `2 ∈ [m] and all δ > 0. Then
2
min max kTe − T k2F ≥ cσ 2 c−2
u δ ,
Te
T ∈T
with probability at least 1/2 for some c > 0.
Proof. We use standard information-theoretic techniques developed in Ibragimov and Has’minskii
(1981) and extended in Yang and Barron (1999). Let {A1 , A2 , . . . , Am } be a set such that
2
kA`1 − A`2 k2F ≥ nσ 2 c−2
u δ
for all `1 6= `2 , and let m
e be a random variable uniformly distributed over the index set
[m] = {1, 2, . . . , m}.
Now we use a standard argument which allows us to provide a minimax lower bound in
terms of the probability of error in a multiple hypothesis testing problem (see, e.g., Yang
and Barron, 1999; Yu, 1996) then yields the lower bound.
2
σ 2 c−2
u δ
2
e
e
inf sup P kT − T kF ≥
≥ inf P(Te 6= Am
)
2
Te T ∈T
Te
where the infimum is taken over all estimators Te that are measurable functions of X and Y .
Let X = {X (i) : i = 1, . . . , n}, Y = {Y (i) : i = 1, . . . , n} and E = {(i) : i = 1, . . . , n}.
Using Fano’s inequality (see, e.g., Cover and Thomas, 1991), for any estimator Te, we have:
e
P[Te 6= Am
|X] ≥ 1 −
e
IX (Am
; Y ) + log 2
.
log m
Taking expectations over X on both sides, we have
e
P[Te 6= Am
]≥1−
e
EX [IX (Am
; Y )] + log 2
.
log m
For ` = 1, 2, . . . , m, let Q` denote the condition distribution of Y conditioned on X and
the event {T = A` }, and DKL (Q`1 ||Q`2 ) denote the Kullback-Leibler divergence between Q`1
48
and Q`2 . From the convexity of mutual information (see, e.g., Cover and Thomas, 1991), we
have the upper bound
IX (T ; Y ) ≤
1
m
X
m
2
DKL (Q`1 ||Q`2 ).
`1 ,`2 =1
Given our linear Gaussian observation model (1),
n
1 X
nkA`1 − A`2 k2n
(i) 2
(i)
`2
`1
,
X
i
=
,
X
i
−
hA
hA
.
2σ 2 i=1
2σ 2
DKL (Q`1 ||Q`2 ) =
Further if (18) holds, then
EX [IX (T ; Y )] ≤
n
2σ 2
X
m
2
EX [kA`1 − A`2 k2n ] ≤ c2u
`1 6=`2
n
2σ 2
X
m
2
kA`1 − A`2 k2F .
`1 6=`2
Based on our construction, there exists a set {A1 , A2 , . . . , Am } where each A` ∈ T such
that log m ≥ Cnδ 2 and
`1
`2
−1
c−1
u δ ≤ kA − A kF ≤ 8cu δ
for all `1 6= `2 ∈ {1, 2, . . . , m}. If (18) holds, then
EX kA`1 − A`2 k2n ≤ c2u kA`1 − A`2 k2F
and we can conclude that
EX [IX (T ; Y )] ≤ 32c2u σ −2 nδ 2 ,
and from the earlier bound due to Fano’s inequality, for and δ > 0 such that
1
32c2u σ 2 nδ 2 + log 2
≤ ,
log m
2
we are guaranteed that
n
o 1
e
P Te =
6 Am
≥ .
2
2
The proof is now completed because log m ≥ 128nδ and 32nδ 2 ≥ log 2.
Proof of Theorem 2. The proof for the upper bound follows directly from Lemma 4 with
d1 = d2 = m and d3 = p and noting that the overall covariance Σ ∈ R(nDM )×(nDM ) is
e since each of the samples is independent. Hence
block-structured with blocks Σ
c2` ≤ λmin (Σ) ≤ λmax (Σ) ≤ c2u .
49
To prove the lower bound, we use Theorem 6 and construct a suitable packing set for
T1 . The way we construct this packing is to construct two separate packing sets and select
the set with the higher packing number using a similar argument to that used in Raskutti
et al. (2012) which also uses two separate packing sets. The first packing set we consider
involves selecting the s-dimensional slice A..S where A ⊂ [j3 ] and S = {1, 2, ..., s}. Consider
2
vectorizing each slice so v = vec(A..S ) ∈ Rsm . Hence in order to apply Theorem 6, we define
2
the set T to be slices which is isomorphic to the vector space Rsm . Using Lemma 18 in
2
Appendix C, there exists a packing set {v 1 , v 2 , ..., v N } ∈ Rsm such that log N ≥ csm2 and
for all v `1 , v `2 where `1 6= `2 ,
δ2
≤ kv `1 − v `2 k2F ≤ δ 2
4
√
√
for any δ > 0. If we choose δ = c sm/ n, then Theorem 6 implies the lower bound
2
sm
,
min max kTe − T k2F ≥ cc−2
u
n
Te T ∈T1
with probability greater than 1/2.
The second packing set we construct is for the slice A11· ∈ Rp . Since in the third direction
only s of the p co-ordinates are non-zero, the packing number for any slice is analogous to
the packing number for s-sparse vectors with ambient dimension p. Letting v = A11· , we
need to construct a packing set for
{v ∈ Rp | kvk`0 ≤ s}.
Using Lemma 19 in Appendix C, there exists a discrete set {v 1 , v 2 , ..., v N } such that log N ≥
cs log(p/s) for some c > 0 and
δ2
≤ kv k − v ` k2`2 ≤ δ 2
8
for k 6= ` for any δ > 0. Setting δ 2 = sn−1 log(p/s),
s log(p/s)
min max kTe − T k2F ≥ cc−2
,
u
T
∈T
n
1
Te
with probability greater than 1/2.
Taking a maximum over lower bounds involving both packing sets completes the proof
of the lower bound in Theorem 2.
50
Proof of Theorem 3. The upper bound follows directly from Lemma 5 with d1 = d2 = m
and d3 = p and noting that the overall covariance Σ ∈ R(nDM )×(nDM ) is block-structured with
e since each of the samples is independent.
blocks Σ
To prove the lower bound, we use Theorem 6 and construct a suitable packing set for T2 .
Once again we construct two separate packings and choose the set that leads to the larger
minimax lower bound. For our first packing set, we construct a packing along one slice. Let
us assume A = (A··1 , ..., A··p ), where rank(A··1 ) ≤ r and
A··2 = · · · = A··p = 0.
If we let A··1 = M where M ∈ Rm×m then A = (M, 0, .., 0) ∈ Rm×m×p . Using Lemma 20 in
Appendix C, there exists a set {A1 , A2 , ..., AN } such that log N ≥ crm and
δ2
≤ kA`1 − A`2 k2F ≤ δ 2
4
p
for all `1 6= `2 and any δ > 0. Here we set δ = rm/n. Therefore using Theorem 6
min max kTe − T k2F ≥ cσ 2 c−2
u
Te
T ∈T2
rm
,
n
with probability greater than 1/2.
The second packing set for T2 involves a packing in the space of singular values since
p
X
rank(A··j ) ≤ r.
j=1
Let {σjk : k = 1, . . . , m} be the singular values of the matrix A··j . Under our rank constraint,
we have
p
m
X
X
I(σjk 6= 0) ≤ s.
j=1 k=1
mp
Let v ∈ R
where
v = vec((σjk )1≤j≤p,1≤k≤m ).
Note that
p
m
X
X
I(σjk 6= 0) ≤ r
j=1 k=1
51
implies kvk`0 ≤ r. Using Lemma 19, there exists a set {v 1 , v 2 , ..., v N }, such that log N ≥
cr log(mp/r) and for all `1 6= `2 ,
δ2
≤ kv `1 − v `2 k2`2 ≤ δ 2
4
for any δ > 0. If we set δ 2 = rn−1 log(mp/r). Therefore using Theorem 6,
r log(mp/r)
min max kTe − T k2F ≥ cσ 2 c−2
,
u
n
Te T ∈T2
with probability greater than 1/2. Hence taking a maximum over both bounds,
r max{m, log(p/r), log m}
r max{m, log(p/r)}
= cσ 2 c−2
,
min max kTe − T k2F ≥ cσ 2 c−2
u
u
n
n
Te T ∈T2
with probability greater than 1/2.
Proof of Theorem 4. The upper bound with
s
max{p, 2 log m}
λ≥3
µmin n
follows directly from Lemma 3 with d1 = p and d2 = d3 = m and (18) is satisfied with
c2u = 1/µmin and c2` = 1/µmax according to (36).
To prove the lower bound is similar to the proof for the lower bound in Theorem 2. Once
again we use Theorem 6 and construct a two suitable packing sets for T3 . The first packing
set we consider involves selecting an arbitrary subspace
Te := {A = (Aj1 ,j2 ,j3 )j1 ,j2 ,j3 | 1 ≤ j1 ≤
√
√
s, 1 ≤ j2 ≤ s, 1 ≤ j3 ≤ p}.
Now if we let v = vec(A), then v comes from an sp-dimensional vector space for any A ∈ Te .
Using Lemma 18 in Appendix C, there exists a packing set {v 1 , v 2 , ..., v N } ∈ Rsp such that
log N ≥ csp and for all v `1 , v `2 where `1 6= `2 ,
δ2
≤ kv `1 − v `2 k2F ≤ δ 2
4
for any δ > 0. If we choose δ =
p
sp/n, then Theorem 6 implies the lower bound
sp
,
min max kTe − T k2F ≥ cσ 2 c−2
u
n
Te T ∈T3
52
with probability greater than 1/2. Further c2u = 1/µmin .
The second packing set we construct is for the slice A1,j2 ,j3 for any 1 ≤ j2 , j3 ≤ m. Since
in the second and third direction only s of the co-ordinates are non-zero, we consider the
vector space
2
{v ∈ Rm | kvk`0 ≤ s}.
Once again using the standard standard hypercube construction in Lemma 19 in Appendix C,
there exists a discrete set {v 1 , v 2 , ..., v N } such that log N ≥ cs log(m2 /s) for some c > 0 and
δ2
≤ kv `1 − v `2 k2`2 ≤ δ 2
8
for `1 6= `2 for any δ > 0. Setting δ = sn−1 log(m2 /s) yields
√
2
2 −2 s log(m/ s)
e
min max kT − T kF ≥ cσ cu
,
n
Te T ∈T3
with probability greater than 1/2. Taking a maximum over lower bounds involving both
packing sets completes the proof of of our lower bound.
Proof of Theorem 5. The upper bound follows from a slight modification of the statement
in Lemma 5. In particular since R(A) = kA(12) k∗ + kA(13) k∗ + kA(23) k∗ , the dual norm is
R∗ (A) =
max
1≤k1 <k2 ≤3
kA(k1 k2 ) ks .
(38)
Hence, following the same technique as used in Lemma 5
r
r
max{d
,
d
max{d1 , d2 , d3 }
}
k1
k2
E[R∗ (G)] ≤ c max
=c
.
1≤k1 <k2 ≤3
n
n
(39)
It is also straightforward to see that s(T4 ) ≤ r.
To prove the lower bound, we construct three packing sets and select the one with the
largest packing number. Recall that
(12)
(13)
(23)
T4 = {A ∈ Rd1 ×d2 ×d3 : Aj1 j2 j3 = Aj1 j2 + Aj1 j3 + Aj2 j3 , A(k1 ,k2 ) ∈ Rdk1 ×dk2 ,
A(k1 ,k2 ) 1 = 0,
and
(A(k1 ,k2 ) )> 1 = 0
max rank(A(k1 ,k2 ) ) ≤ r}.
k1 ,k2
53
Therefore our three packings are for A(12) ∈ Rd1 ×d2 , A(13) ∈ Rd1 ×d3 , and A(23) ∈ Rd2 ×d3
assuming each has rank r. We focus on packing in A(12) ∈ Rd1 ×d2 since the approach is
similar in the other two cases. Using Lemma 17 from Appendix B in combination with
Theorem 6,
r min{d1 , d2 }
,
min max kTe − T k2F ≥ cσ 2 c−2
u
n
Te T ∈T4
with probability greater than 1/2. Repeating this process for packings in A(13) ∈ Rd1 ×d3 ,
and A(23) ∈ Rd2 ×d3 assuming each has rank r and taking a maximum over all three bounds
yields the overall minimax lower bound
r max{d1 , d2 , d3 }
,
min max kTe − T k2F ≥ cc−2
u
n
Te T ∈T4
with probability greater than 1/2.
References
A. Agarwal, S. Negahban, and M. J. Wainwright. Noisy matrix decomposition via convex
relaxation: Optimal rates in high dimensions. The Annals of Statistics, 27(2):1171–1197,
2012.
T. W. Anderson. The integral of a symmetric convex set and some probability inequalities.
Proc. of American Mathematical Society, 6:170–176, 1955.
T. W. Anderson. An Introduction to Multivariate Statistical Analysis. Wiley Series in
Probability and Mathematical Statistics. Wiley, New York, 1984.
P. Bartlett and S. Mendelson. Gaussian and Rademacher complexities: Risk bounds and
structural results. Journal of Machine Learning Research, 3:463–482, 2002.
S. Basu and G. Michailidis. Regularized estimation in sparse high-dimensional time series
models. Annals of Statistics, 43(4):1535–1567, 2015.
R. Bhatia. Matrix Analysis. Springer, New York, 1997.
P. Buhlmann and S. van de Geer. Statistical for High-Dimensional Data. Springer Series in
Statistics. Springer, New York, 2011.
54
S. Chen, M. R. Lyu, I. King, and Z. Xu. Exact and stable recovery of pairwise interaction
tensors. In Advances in Neural Information Processing Systems, 2013.
S. Cohen and M. Collins. Tensor decomposition for fast parsing with latent-variable pcfgs.
In Advances in Neural Information Processing Systems, 2012.
T.M. Cover and J.A. Thomas. Elements of Information Theory. John Wiley and Sons, New
York, 1991.
S. Dasgupta and A. Gupta. Empirical processes with a bounded ψ1 diameter. Geometric
and Functional Analysis, 20(4), 2010.
S. Gandy, B. Recht, and I. Yamada. Tensor completion and low-n rank tensor recovery via
convex optimization. Inverse Problems, 27, 2011.
Y. Gordon. On milmans inequality and random subspaces which escape through a mesh
in Rn . Geometric aspects of functional analysis, Israel Seminar 1986-87, Lecture Notes,
1317:84–106, 1988.
T. Hastie, R. Tibshirani, and M. Wainwright. Statistical Learning with Sparsity: The Lasso
and Generalizations. Monographs on Statistics and Applied Probability 143. CRC Press,
New York, 2015.
P. Hoff. Multilinear tensor regression for longitudinal relational data. Technical Report
TR-2003-08, Department of Statistics, University of Washington, 2003.
I. A. Ibragimov and R. Z. Has’minskii. Statistical Estimation: Asymptotic Theory. SpringerVerlag, New York, 1981.
T. G. Koldar and B. W. Bader. Tensor decompositions and applications. SIAM Review, 51:
455–500, 2009.
B. Laurent and P. Massart. Adaptive estimation of a quadratic functional by model selection.
The Annals of Statistics, 28(5):1303–1338, 1998.
M. Ledoux. The Concentration of Measure Phenomenon. Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2001.
55
M. Ledoux and M. Talagrand. Probability in Banach Spaces: Isoperimetry and Processes.
Springer-Verlag, New York, NY, 1991.
N. Li and B. Li. Tensor completion for on-board compression of hyperspectral images. In
17th IEEE International Conference on Image Processing (ICIP), pages 517–520, 2010.
H. Lütkepolhl. New introduction to multiple time series analysis. Springer, New York, 2006.
P. Massart. Concentration Inequalties and Model Selection. Ecole d’Eté de Probabilités,
Saint-Flour. Springer, New York, 2003.
Shahar Mendelson. Upper bounds on product and multiplier empirical processes. Technical
Report arXiv:1410.8003, Technion, I.I.T, 2014.
N. Mesgarani, M. Slaney, and S. Shamma. Content-based audio classification based on
multiscale spectro-temporal features. IEEE Transactions on Speech and Audio Processing,
14:920–930, 2006.
C. Mu, B. Huang, J. Wright, and D. Goldfarb. Square deal: Lower bounds and improved
relaxations for tensor recovery. In International Conference on Machine Learning, 2014.
S. Negahban and M. J. Wainwright. Estimation of (near) low-rank matrices with noise and
high-dimensional scaling. The Annals of Statistics, 39:1069–1097, 2011.
S. Negahban and M. J. Wainwright. Restricted strong convexity and weighted matrix completion. JMLR, 13:1665–1697, 2012.
S. Negahban, P. Ravikumar, M. J. Wainwright, and B. Yu. A unified framework for highdimensional analysis of m-estimators with decomposable regularizers. Statistical Science,
27(4):538–557, 2012.
G. Pisier. The Volume of Convex Bodies and Banach Space Geometry, volume 94 of Cambridge Tracts in Mathematics. Cambridge University Press, Cambridge, UK, 1989.
D. Pollard. Convergence of Stochastic Processes. Springer-Verlag, New York, 1984.
56
Z. Qin, K. Scheinberg, and D Goldfarb. Efficient block-coordinate descent algorithms for
the group lasso. Math. Program. Comput., 5:143–169, 2013.
G. Raskutti, M. J. Wainwright, and B. Yu. Restricted eigenvalue conditions for correlated
Gaussian designs. Journal of Machine Learning Research, 11:2241–2259, 2010.
G. Raskutti, M. J. Wainwright, and B. Yu. Minimax rates of estimation for high-dimensional
linear regression over `q -balls. IEEE Transactions of Information Theory, 57(10):6976–
6994, 2011.
G. Raskutti, M. J. Wainwright, and B. Yu. Minimax-optimal rates for sparse additive models
over kernel classes via convex programming. Journal of Machine Learning Research, 13:
398–427, 2012.
S. Rendle and L. Schmidt-Thieme. Pairwise interaction tensor factorization for personalized
tag recommendation. In ICDM, 2010.
S. Rendle, L. B. Marinho, A. Nanopoulos, and L. Schmidt-Thieme. Learning optimal ranking
with tensor factorization for tag recommendation. In SIGKDD, 2009.
G. Rockafellar. Convex Analysis. Princeton University Press, Princeton, 1970.
O. Semerci, N. Hao, M. Kilmer, and E. Miller. Tensor based formulation and nuclear norm
regularizatin for multienergy computed tomography. IEEE Transactions on Image Processing, 23:1678–1693, 2014.
N.D. Sidiropoulos and N. Nion. Tensor algebra and multi-dimensional harmonic retrieval in
signal processing for mimo radar. IEEE Transactions on Signal Processing, 58:5693–5705,
2010.
N. Simon, J. Friedman, and T. Hastie. A blockwise coordinate descent algorithm for penalized multiresponse and grouped multinomial regression. Technical report, Georgia Tech.,
November 2013.
D. Slepian. The one-sided barrier problem for gaussian noise. Bell System Tech. J, 41:
463–501, 1962.
57
M. Talagrand. New concentration inequalities in product spaces. Invent. Math., 126:503523,
1996.
R. Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society, Series B, 58(1):267–288, 1996.
B. Turlach, W.N. Venables, and S.J. Wright. Simultaneous variable selection. Technometrics,
27:349–363, 2005.
S. van de Geer. Empirical Processes in M-Estimation. Cambridge University Press, 2000.
S. van de Geer. Weakly decomposable regularization penalties and structured sparsity.
Scandivanian Journal of Statistics: Theory and Applications, 41:72–86, 2014.
Y. Yang and A. Barron. Information-theoretic determination of minimax rates of convergence. The Annals of Statistics, 27(5):1564–1599, 1999.
B. Yu. Assouad, Fano and Le Cam. Research Papers in Probability and Statistics: Festschrift
in Honor of Lucien Le Cam, pages 423–435, 1996.
M. Yuan and Y. Lin. Model selection and estimation in regression with grouped variables.
Journal of the Royal Statistical Society B, 68(1):49–67, 2006.
M. Yuan and C-H. Zhang. On tensor completion via nuclear norm minimization. Foundation
of Computational Mathematics, to appear, 2014.
Shuheng Zhou. Restricted eigenvalue conditions on subgaussian random matrices. Technical
Report arXiv:0912.4045, ETH Zurich, 2009.
A
Results for Gaussian random variables
In this section we provide some standard concentration bounds that we use throughout this
paper. First, we provide standard χ2 tail bounds. due to Laurent and Massart Laurent and
Massart (1998):
58
Lemma 13. Let Z be a centralized χ2 random variable with m degrees of freedom. Then for
all x ≥ 0,
√
P[Z − m ≥ 2 mx + 2x] ≤ exp(−x), and
√
P[Z − m ≤ −2 mx]
≤ exp(−x).
A.1
Gaussian comparison inequalities
The first result is a classical result from Anderson (1955).
Lemma 14 (Anderson’s comparison inequality). Let X and Y be zero-mean Gaussian random vectors with covariance ΣX and ΣY respectively. If ΣX − ΣY is positive semi-definite
then for any convex symmetric set C,
P(X ∈ C) ≤ P(Y ∈ C).
The following Lemma is Slepian’s inequality Slepian (1962) which allows to upper bound
the supremum of one Gaussian process by the supremum of another Gaussian process.
Lemma 15 (Slepian’s Lemma). Let {Gs , s ∈ S} and {Hs , s ∈ S} be two centered Gaussian
processes defined over the same index set S. Suppose that both processes are almost surely
bounded. For each s, t ∈ S, if E(Gs − Gt )2 ≤ E(Hs − Ht )2 , then E[sups∈S Gs ] ≤ E[sups∈S Hs ].
Further if E(G2s ) = E(Hs2 ) for all s ∈ S, then
P sup Gs > x ≤ P sup Hs > x ,
s∈S
s∈S
for all x > 0.
Finally, we require a standard result on the concentration of Lipschitz functions over
Gaussian random variables.
Theorem 7 (Theorem 3.8 from Massart (2003)). Let g ∼ N (0, Id×d ) be a d-dimensional
Gaussian random variable. Then for any function F : Rd → R such that |F (x) − F (y)| ≤
Lkx − yk`2 for all x, y ∈ Rd , we have
t2
P |F (g) − E[F (g)]| ≥ t ≤ 2 exp − 2 ,
2L
for all t > 0.
59
B
Suprema for i.i.d. Gaussian tensors
In this section we provide important results on suprema of i.i.d. Gaussian tensors over
different sets.
B.1
The group `2 -`∞ norm
Let G ∈ Rd1 ×d2 be an i.i.d. Gaussian matrix and define the set
V := {(u, v) ∈ Rd1 × Rd2 | kuk`2 ≤ 1 , kvk`1 ≤ 1}.
Using this notation, let us define the define the random quantity:
M (G, V ) := sup u> Gv.
(u,v)∈V
Then we have the following overall bound.
Lemma 16.
p
p
E[M (G, V )] ≤ 3( d1 + log d2 ).
Proof. Our proof user similar ideas to the proof of Theorem 1 in Raskutti et al. (2010). We
need to upper bound E[M (G, V )]. We are taking the supremum of the Gaussian process
u> Gv.
sup
kuk`2 ≤1, kvk`2 ≤1
eu,v over the set V and apply Slepian’s inWe now construct a second Gaussian process G
equality (see Lemma 15 in Appendix A.1) to upper bound
u> Gv
sup
kuk`2 ≤1, kvk`2 ≤1
eu,v . In particular, let us define the
by the supremum over our second Gaussian process. G
process as:
eu,v = g > u + h> v,
G
where the vectors (g, h) ∈ Rd1 × Rd2 are i.i.d. standard normals (also independent of each
other). It is straightforward to show that both u> Gv and g > u + h> v are zero-mean. Further
it is straightforward to show that
eu,v − G
eu0 ,v0 ) = ku − u0 k2 + kv − v 0 k2 .
Var(G
`2
`2
60
Now we show that
Var(u> Gv − u0> Gv 0 ) ≤ ku − u0 k2`2 + kv − v 0 k2`2 .
To this end, observe that
Var(u> Gv − u0> Gv 0 ) = kuv > − u0 v 0> k2F
= k(u − u0 )v > + u0 (v − v 0 )> k2F
= kvk2`2 ku − u0 k`22 + ku0 k2`2 kv − v 0 k2`2
+2(u> u0 − ku0 k`2 kuk`2 )(v > v 0 − kv 0 k`2 kvk`2 ).
First note that kvk2`2 ≤ kvk2`1 ≤ 1 for all v ∈ V and ku0 k2`2 ≤ 1. By the Cauchy-Schwarz
inequality, v > v 0 − kv 0 k`2 kvk`2 ≤ 0 and u> u0 − ku0 k`2 kuk`2 ≤ 0. Therefore
Var(u> Gv − u0> Gv 0 ) ≤ ku − u0 k`22 + kv − v 0 k2`2 .
Consequently using Lemma 15
E[M (G, V )] ≤ E[ sup g > u + sup h> v].
kuk`2 ≤1
kvk`1 ≤1
Therefore:
E[M (G, V )] ≤ E[ sup g > u + sup h> v]
kuk`2 ≤1
kvk`1 ≤1
= E[ sup g > u] + E[ sup h> v]
kuk`2 ≤1
kvk`1 ≤1
= E[kgk`2 ] + E[khk`∞ ].
By known results on Gaussian maxima (see e.g. Ledoux and Talagrand, 1991),
p
E[khk`∞ ] ≤ 3 log d2
and
E[kgk`2 ] ≤
p
p
3p
d1 + o( d1 ) ≤
Dj .
2
Therefore
E[M (G, V )] ≤
p
3p
d1 + 3 log d2 .
2
61
B.2
Spectral norm of tensors
Our proof is based on an extension of the proof techniques used for the proof of Proposition
1 in Negahban and Wainwright (2011).
Lemma 17. Let G ∈ Rd1 ×d2 ×···×dN be a random sample from an i.i.d. Gaussian tensor
ensemble. Then we have
E[kGks ] ≤ 4 log(4N )
N p
X
dk .
k=1
Proof. Recall the definition of kGks :
kGks =
hu1 ⊗ u2 ⊗ · · · ⊗ uN , Gi.
sup
(u1 ,u2 ,...,uN )∈S d1 −1 ×S d2 −1 ×···×S dN −1
Since each entry hu1 ⊗ u2 ⊗ · · · ⊗ uN , Gi is a zero-mean Gaussian random variable, kGks
is the supremum of a Gaussian process and therefore the concentration bound follows from
Theorem 7.1 in Ledoux (2001).
1
We use a standard covering argument to upper bound E[kGks ]. Let {u11 , u21 , . . . , uM
1 } be
a 1/2N covering number of the sphere S d1 −1 in terms of vector `2 -norm. Similarly for all
dk −1
k
. Therefore
2 ≤ k ≤ N , let {u1k , u2k , . . . , uM
k } be a 1/2N covering number of the sphere S
hu1 ⊗ u2 ⊗ · · · ⊗ uN −1 ⊗ uN , Gi
≤ hu1 ⊗ u2 ⊗ · · · ⊗ uN −1 ⊗ ujN , Gi + hu1 ⊗ u2 ⊗ · · · ⊗ uN −1 ⊗ (uN − ujN ), Gi.
Taking a supremum over both sides,
kGks ≤
max hu1 ⊗ u2 ⊗ · · · ⊗ uN −1 ⊗ ujN , Gi +
j=1,...,MN
1
kGks .
2N
Repeating this argument over all N directions,
kGks ≤ 2
max
j1 =1,2,...,M1 ,...,jN =1,2,...,MN
huj11 ⊗ uj22 ⊗ · · · ⊗ ujNN , Gi.
By construction, each variable huj11 ⊗uj22 ⊗· · ·⊗ujNN , Gi is a zero-mean Gaussian with variance
at most 1, so by standard bounds on Gaussian maxima,
p
p
p
E[kGks ] ≤ 4 log(M1 × M2 × · · · × MN ) ≤ 4[ log M1 + · · · + log MN ].
There exist a 1/2N -coverings of S dk −1 with log Mk ≤ dk log(4N ) which completes the proof.
62
C
Hypercube packing sets
In this section, we provide important results for the lower bound results. One key concept is
the so-called Hamming distance.The Hamming distance is between two vectors v ∈ Rd and
v 0 ∈ Rd is defined by:
0
dH (v, v ) =
d
X
I(vj 6= vj0 ).
j=1
Lemma 18. Let C = [−1, +1]d where d ≥ 6. Then there exists a discrete subset {v 1 , v 2 , ..., v m } ⊂
C, such that log m ≥ cd for some constant c > 0, and for all `1 6= `2 ,
δ2
≤ kv `1 − v `2 k2`2 ≤ δ 2 ,
4
for any δ > 0.
Proof. Let
d
δ
δ
v ∈ −√ , √
,
d d
`
i.e. a member of the d-dimensional hypercube re-scaled by
√
√
3δ/(2 d). Recall the definition
of Hamming distance provided above. In this case amounts to the places either vj or vj0 is
negative, but both or not negative. Then according to Lemma 4 in Yu (1996), there exists
a subset re-scaled of this hypercube v 1 , v 2 , ..., v m , such that
dH (v `1 , v `2 ) ≥
d
3
and log m ≥ cd. Clearly,
kv `1 − v `2 k2`2 =
3δ 2
δ2
dH (v `1 , v `2 ) ≥ .
4d
4
kv `1 − v `2 k2`2 ≤
3δ 2
3δ 2
×d≤
≤ δ2.
4d
4
Further,
This completes the proof.
Next we provide a hupercube packing set for the sparse subset of vectors. That is the set
V := {v ∈ Rd | kvk`0 ≤ s}.
This follows from Lemma 4 in Raskutti et al. (2011) which we state here for completeness.
63
Lemma 19. Let C = [−1, +1]d where d ≥ 6. Then there exists a discrete subset {v 1 , v 2 , ..., v m } ⊂
V ∩ C, such that log m ≥ cs log(d/s) for some c > 0, and for all `1 6= `2 ,
δ2
≤ kv `1 − v `2 k2`2 ≤ δ 2 ,
8
for any δ > 0.
Finally we present a packing set result from Lemma 6 in Agarwal et al. (2012) that packs
into the set of rank-r d1 × d2 matrices.
Lemma 20. Let min{d1 , d2 } ≥ 10, and let δ > 0. Then for each 1 ≤ r ≤ min{d1 , d2 },
there exists a set of d1 × d2 matrices {A1 , A2 , ..., Am } with rank-r with cardinality log m ≥
cr min{d1 , d2 } for some constant c > 0 such that
δ2
≤ kA`1 − A`2 k2F ≤ δ 2 ,
4
for all `1 6= `2 .
64
| 10math.ST
|
1
Stochastic Power System Simulation Using the
Adomian Decomposition Method
Nan Duan, Student Member, IEEE, and Kai Sun, Senior Member, IEEE
Abstract-- For dynamic security assessment considering
uncertainties in grid operations, this paper proposes an approach
for time-domain simulation of a power system having stochastic
loads. The proposed approach solves a stochastic differential
equation model of the power system in a semi-analytical way using
the Adomian decomposition method. The approach generates
semi-analytical solutions expressing both deterministic and
stochastic variables explicitly as symbolic variables so as to embed
stochastic processes directly into the solutions for efficient
simulation and analysis. The proposed approach is tested on the
New England 10-machine 39-bus system with different levels of
stochastic loads. The approach is also benchmarked with a
traditional stochastic simulation approach based on the EulerMaruyama method. The results show that the new approach has
better time performance and a comparable accuracy.
Index Terms—Adomian decomposition method, stochastic
differential equation, stochastic load, stochastic time-domain
simulation.
U
I. INTRODUCTION
NCERTAINTIES exist in operations of power grids [1]
Many factors such as random load consumptions and
unanticipated relay protection actions contribute to the
randomness of grid operations. It can be foreseen that a future
power grid will have more uncertainties and stochastic
behaviors in system operations due to the increasing
penetrations of responsive loads and intermittent renewable
generations. Thus, dynamic security assessment (DSA) of
power systems should be conducted in both deterministic and
stochastic manners. However, most of today’s power system
simulation software tools are still based on solvers of
deterministic differential-algebraic equations (DAEs) that do
not involve stochastic variables to model uncertainties in
system operating conditions.
In literature, there are three major approaches for the
modeling of a dynamic system having stochastic effects as
shown in Fig. 1: the master equation, the Fokker-Planck
equation [2][3] and Gillespie method [1][5]. The master
equation and the Fokker-Plank equation are widely applied in
the field of computational biology, which both focus on the
evolution of probability distribution; the Gillespie method
focuses on individual stochastic trajectories. The first two
approaches provide a more comprehensive understanding of
stochastic effects with a dynamic system but require solving
This work was supported by NSF grant ECCS-1610025.
Nan Duan and Kai Sun are with the department of EECS at the University
of Tennessee, Knoxville (e-mail: [email protected], [email protected]).
high dimensional partial differential equations, so they are
computationally difficult to be applied to simulations of
realistic power systems [6]. There have been works using the
Gillespie method for power system simulation [7]-[10].
Stochastic
Modeling
Master
Equation
Multiple runs
Gillespie
Algorithm
FokkerPlanck
Equation
Multiple runs
EulerMaruyama
method
Adomian
Decomposition
Method
Fig. 1. Stochastic modeling approaches.
In recent years, some researchers have contributed to power
system simulation in a less-deterministic manner. Reference [7]
proposed a systematic method to simulate the system behaviors
under the influence of stochastic perturbations on loads, bus
voltages and rotor speeds. This approach introduces stochastic
differential equations (SDEs) to represent stochastic
perturbations and solves the equations by Ito calculus, and then
a mean trajectory with the envelope on trajectory variations is
yielded by repeating simulations for many times. Papers [8][10] utilize a similar approach to study power system stability
under random effects. To analyze long term stability of a power
system with wind generation, a new SDE model is developed
in [11], which also applies the singular perturbation theory to
investigate the slow dynamics of the system with stochastic
wind generation. However, the time performance of such an
approach based on Euler-Maruyama method can hardly meet
the requirements for online power system simulation.
Especially, when the penetration of distributed energy
resources (DERs) reaches a high level, the distribution network
behaves in a more stochastic manner as seen from the
transmission network, and hence a large number of SDEs need
to be included in the power system model, which will
significantly influence the simulation speed. Also, the nature of
the Gillespie method requires a large number of simulations on
the same model to yield the mean trajectory as well as the
2
envelope on variations. Therefore, adding any extra SDE to the
existing set of SDEs will result in multiplying computing time
by a factor of hundreds or even thousands.
In our previous works [12]-[14], a new semi-analytical
approach for power system simulation has been proposed. That
approach applies the Adomain decomposition method (ADM)
to power system DAEs to derive a semi-analytical solution
(SAS) for each state variable as an explicit function of symbolic
variables including time, the initial system state and other
selected parameters on the system condition; then each function
is evaluated by plugging in values of its symbolic variables over
consecutive small time windows to make up a desired
simulation period so as to obtain the simulated trajectory of
each state variable. Since the form of every SAS is a summation
of finite terms for approximation, its evaluation can be fast and
parallelized among terms. Thus, compared to traditional
numerical integration based power system simulation, this
semi-analytical approach decomposes the computation into
offline derivation and online evaluation of an SAS and is better
fit for online power system simulation and a parallel computing
environment [14]. In fact, such a semi-analytical approach also
suggests a viable, alternative paradigm for fast stochastic
simulation. For example, early works by Adomian in the 1970s
utilized the ADM to solve nonlinear SDEs [15] by embedding
explicitly stochastic processes into the terms of an SAS.
For power system simulation in a stochastic manner, this
paper proposes an approach as an extension of the ADM based
approach proposed in [14]. Utilizing the semi-analytical nature
of an SAS yielded by the ADM, this new approach embeds a
stochastic model, e.g. a stochastic load model, into the SAS.
Evaluation of an SAS with the stochastic model whose
parameters are represented symbolically will not increase many
computational burdens compared to evaluation of an SAS for
deterministic simulation. Thus, an expected number of
simulation runs for one single case are achieved by evaluating
one SAS for the same number of times.
The rest of this paper is organized as follows: Section II
presents the SDE model of a power system that integrates
stochastic loads; Section III gives the ADM-based approach for
solving the power system SDEs for stochastic simulation;
Section IV uses a single-machine-infinite-bus (SMIB) system
to compare the fundamental difference between the ADMbased approach and the Euler-Maruyama approach in
mathematics; Section V introduces a criterion for defining the
stability of a general stochastic dynamical system, which is also
applied to power systems; Section VI validates the proposed
approach using the IEEE 10-machine 39-bus system with the
stochastic loads and compares the results and time performance
with those from the Euler-Maruyama approach; finally,
conclusions are drawn in Section VII.
II. POWER SYSTEM SDE MODEL WITH STOCHASTIC LOADS
A. Synchronous Generator Modeling
For a power system having K synchronous generators,
consider the 4th-order two-axis model (1) to model each
generator having saliency ignored [16]. All generators are
coupled through nonlinear algebraic equations (2) about the
network.
k k R
k R
R
k 2 H Pm k Pek D k
R
k
1
x dk x dk
i dk
E fdk e qk
e qk
T d0 k
1
iqk
e x qk x qk
e dk
dk
T
q0k
(1)
sin k e qk
cos k j ( e qk
sin k e dk
cos k )
E k e dk
def
I tk i R k ji Ik Y k* E
Pek e qk iqk e dk idk
(2)
iqk i Ik sin k i R k cos k , idk i R k sin k i Ik cos k
x dk
idk , e dk e dk
x qk
iqk
e qk e qk
In (1) and (2), ωR is the rated angular frequency; δk , ωk, Hk
and Dk are respectively the rotor angle, rotor speed, inertia and
damping coefficient of the machine k; Yk is the kth row of the
reduced admittance matrix Y; E is the column vector of all
generator’s electromotive forces (EMFs) and Ek is the kth
element; Pmk and Pek are the mechanical and electric powers;
Efdk is the internal field voltage;
,
, iqk, idk,
,
, xqk,
xdk, x’qk and x’dk are transient voltages, stator currents, opencircuit time constants, synchronous reactances and transient
reactances in q- and d-axes, respectively.
B. Stochastic Load Modeling
A stochastic model can be built based on analysis on real
data and assumptions on probabilistic characteristics of the
stochastic variables. Traditionally, uncertainties in loads of a
power system are ignored in time-domain simulation for the
sake of simplicity. However their stochastic behaviors are wellrecognized in [17]. Taking stochastic loads into consideration
will enable more realistic power system stability assessment.
This paper uses the Ornstein-Uhlenbeck process in [18] to
model the stochastic variations of a load in these SDEs:
y PL aP y PL bP W(t )
(3)
y QL aQ yQL bQ W(t )
(4)
where W(t) is the white noise vector whose dimension equals
the number of load buses, a and b parameters are drifting and
diffusion parameters of the SDEs, operator “ ” is the
Hadamard Product, i.e., element-wise multiplication, and yPL
and yQL are the stochastic variations in normal distributions.
The stochastic dynamic of the load is therefore modeled by
PL PL0 y PL
(5)
QL QL0 yQL
(6)
where PL0 and QL0 are the mean values of the active and
reactive loads, respectively.
Periodicities and autocorrelations have been observed in
historical data of loads on the daily basis. However, in the time
frame of seconds, loads at different substations have much
lower autocorrelations. Refer to [7], this paper sets the drifting
3
parameter on the autocorrelations of loads as 0.5 p.u./s.
T
III. PROPOSED ADM-BASED APPROACH TO SOLVING POWER
SYSTEM SDES
A. Modeling Stochastic Variables
Consider S stochastic variables y1 (t ), , yS (t ) , which could
be stochastic loads following S different distributions. Each yi(t)
can be transformed by function gi () in (7) from some i in a
normal distribution. For example, if yi(t) is a load represented
by a normal distribution with certain mean value, then i
specifies a zero-mean normal distribution as in (9) and gi ()
shifts it to around the desired mean value like in (5) and (6).
T
(7)
y (t ) g ( ) g ( ) g ( )
i
1
1
2
2
S
S
The Ornstein-Uhlenbeck process is utilized to generate each
where A n A1,n , A2, n , , AM , n
The next step is to apply inverse Laplace transform to both
sides of (15) and (16) to calculate the N-th order SAS of (10):
N
(17)
x SAS (t , y ) x n (t , y )
n 0
In the resulting SAS, stochastic variables in y appear
explicitly as symbolic variables.
IV. COMPARISON BETWEEN THE EULER-MARUYAMA
APPROACH AND THE PROPOSED APPROACH
This section applies both the Euler-Maruyama approach and
the proposed ADM-based approach to the SMIB system with a
stochastic load shown in Fig. 2 to illustrate the fundamental
difference between the two approaches.
E’∠δ
from (10).
ε (t ) a ε (t ) b W (t )
where
Ra
jXd’
R
jX
V∠0°
(8)
ε(t ) 1 (t ) 2 (t ) S (t )
T
RL
a(t ) a1 (t ) a2 (t ) aS (t )
T
jXL
b(t ) b1 (t ) b2 (t ) bS (t )
T
i (0, bi2 / 2 ai ) i 1, 2, , S
(9)
B. Solving SDEs Using the ADM
Consider a nonlinear system modeled by SDE (10) having
M deterministic state variables x1, …, xM, such as the state
variables of generators, exciters and speed governors, and S
stochastic variables y1, …, yS.
(10)
x (t ) f ( x (t ), y (t ))
x(t ) x1 (t ) x2 (t ) xM (t )
T
f () f1 ()
f 2 ()
f M ()
T
To solve x (t ) , the procedure in [14] can be used. First,
apply Laplace transformation to (10) to obtain
(11)
x (0) [f ( x, y )]
[x]
s
s
Then use (13) and (14) to calculate the Adomian polynomials
under the assumption of (12),
(12)
x(t ) xn (t )
n 0
f k (x, y ) Ak ,n (x0, x1, x n , y )
(13)
1 n
n
k
n fk xk , y
n !
k 0
0
(14)
Recursive formulas (15) and (16) can be derived by matching
terms of x (t ) and f () :
(15)
x x(0) s
0
xn1 An s n 0
The stochastic load is connected to the generator bus and has
its resistance RL and reactance XL modeled by stochastic
variables. Thus, the whole system is now modeled by DEs
(18a), (18b) and SDEs (18c), (18d).
R
R R
EV
Pm k3
k4 cos( ) k5 sin( )
D
2H
k1k2
1 (t )
RL a1RL bW
X a X b W(t)
2 L
2
L
(16)
(18a)
(18b)
(18c)
(18d)
where,
GL jBL
GS jBS
(19a)
1
RL jX L
1
Ra jX d
(19b)
1
R jX
(19c)
GR jBR
k1
n 0
Ak , n
Fig. 2. SMIB system with constant impedance load at generator bus.
(GL GR GS ) 2
( BL BR BS )
( BL BR BS )
(19d)
( BL BR BS ) 2
(GL GR GS )
(19e)
k2 (GL GR GS )
G ( B BR ) BS (GL GR ) BS ( BL BR ) GS (GL GR )
k3 E 2 S L
k1
k2
(19f)
k4 k2 ( BS GR GS BR ) k1 ( BS BR GS GR )
(19g)
k5 k2 ( BS BR GS GR ) k1 ( BS GR GS BR )
(19h)
Since RL and XL change stochastically, GL and BL cannot be
4
treated as constants in (19). The variances of RL and XL depend
on the values of drifting parameters a1 and a2 and diffusion
parameters b1 and b2, respectively.
To find the SAS of this system, the first step is to apply ADM
to DEs (18a) and (18b). Once the SAS of the system’s DEs is
derived, the SAS of the SDEs can be derived and incorporated
into it.
For instance, the 2nd order SAS for rotor speed ω is
2
(t ) n (t )
(20)
n 0
where,
0 (t ) (0)
1 (t )
(21)
tR D( (0) R )
Pm k3
2H
R
Therefore the infinite order SAS of (20c) is
s
t s
i1
1
(a1t )i
b1B(t ) b1 (a1 )i B(si )dsi ds2ds1 (33)
i!
i 0
i 1
0 0
0
RL (t ) RL (0)
Apply Maclaurin expansion of an exponential function and
lemma 2.3 in [19] to (33), the solution becomes
t
(22)
k E V
k4 E V
cos( (0)) 5
sin( (0))
k1k2
k1k2
E V
cos( (0))
k1k2
The 2nd order SAS of RL can be derived using ADM as
2
RL (t ) RL ,n (t )
(24)
n 0
where
(25)
RL ,0 (t ) RL (0) b1 B(t )
t
RL ,1 (t ) a1 RL (0)t a1b1 B ( s1 )ds1
RL (t ) RL (0)e a1t b1 B (t ) a1b1 ea1s a1t B( s )ds
(34)
0
Then apply the integration by parts formula
t 2 R D 2 ( (0) R )
2 (t )
8H 2
R
k E V
k E V
D ( Pm k3 4
cos( (0)) 5
sin( (0))) (23)
k1k2
k1k2
k E V
k E V
2 H R 5
cos( (0)) 2 H R 4
sin( (0))
k1k2
k1k2
2 H ( (0) R )
(24) and (28).
For some forms of SDEs, an analytical solution may exist,
which can be incorporated into the DEs’ SAS to directly derive
the SAS of the entire system. For example, the general
expression of the SAS terms of (18c) can be written as
sn1
t s1
tn
RL,n (t ) (1)n a1n RL (0) (1)n a1nb1 B( sn )dsn ds2 ds1 (32)
n!
0 0
0
(26)
t
t
0
0
as
at
as
e 1 dB(s) e 1 B(t ) a1e 1 B(s)ds
(35)
The close form solution can be found as
t
RL (t ) e a1t [ RL (0) b1 ea1s dB( s)]
(36)
0
In this case the symbolic variable RL in (20) can be replaced
by (36) instead of (24).
On the other hand, for the Euler-Maruyama approach
[20][21], since the deterministic model described by (18a) and
(18b) does not permit a close form solution, the sample
trajectories of (18) have to be numerically computed. The
numerical scheme for RL is shown in (37) and the same scheme
also applies to XL.
(37)
R L( , nt ) 1 R L( , nt ) a1 R L( , nt ) t b1 R L( , nt ) W
In practice the value of ΔW is dependent of the step size Δt
for integration.
(38)
W (0 , t 1 / 2 )
0
t s
RL ,2 (t ) a12 RL (0)
1
t2
a12b1 B( s2 )ds2 ds1
2!
0 0
(27)
Here, B(t) is the Brownian motion starting at origin and
dB(t)=W(t)dt.
Similarly, the 2nd order SAS of XL is,
2
X L (t ) X L , n (t )
(28)
n 0
where
X L ,0 (t ) X L (0) b2 B(t )
t
X L ,1 (t ) a2 RL (0)t a2b2 B( s1 )ds1
(29)
(30)
0
X L ,2 (t ) a22 RL (0)
2
t s1
t
a22b2 B( s2 )ds2 ds1
2!
0 0
(31)
To derive the SAS of the entire system considering both the
DEs and SDEs, replace the symbolic variables in the DEs’ SAS
representing the stochastic variables with the SDEs’ SAS, i.e.,
the 2nd order SAS of the system (18) can be derived by
replacing the symbolic variables RL and XL in (20) with SAS
V. STABILITY OF STOCHASTIC SYSTEMS
There are a variety of definitions on the stability of a
stochastic dynamical system in literature [23]-[26]. The
definition of “asymptotic stability in probability” in [26] can be
directly applied to a power system with stochastic variables.
That definition is a counterpart of the asymptotic Lyapunov
stability of a deterministic system.
Definition 1: Stability in probability
An equilibrium point is said to be stable in probability if for
given (0,1) and r, there exists σ(μ,r,t0) >0 such that,
P sup x(t ; x0 , t0 ) xeq r 1
t t0
(39)
whenever ||x0-xeq||<σ.
Definition 2: Asymptotic stability in probability
An equilibrium point is said to be asymptotic stable in
probability if it is stable in probability and for given (0,1)
, there exists σ0(μ)>0 such that,
5
P lim x (t ; x0 , t0 ) x eq 0 1
t
(40)
whenever ||x0-xeq||<σ0
To analyzed the stability of numerical simulation results, this
paper modifies (40) to (41) so that the stability can be accessed
using the results of finite time period simulations.
P x(t ; x0 , t0 ) xeq r0 1 t ts
(41)
where ts is a predefined time instant, ||r0|| is a small positive
number.
VI. CASE STUDIES
The proposed ADM-based approach is tested on the IEEE
10-machine 39-bus New England system as shown in Fig. 3.
Selected loads are assumed to change stochastically while all
generators are represented by deterministic models. In each
case study, the stochastic simulation result by the EulerMaruyama approach is used as the benchmark, and the 2nd order
SASs (i.e. N=2) are used and evaluated every 0.001 s. The value
of each stochastic variable is changed every 0.1 s. For each case,
100 sample trajectories are generated. The fault applied in all
cases is a 10-cycle 3-phase fault at bus 3 cleared by tripping line
3-4. All simulations are performed in MATLAB R2016a on a
desktop computer with an Intel Core i7-3770 3.40GHz CPU
and 8 GB RAM.
(a) Result from the ADM-based approach.
(b) Result from the Euler-Maruyama approach
Fig. 4. Simulation results of generator 1 rotor angle with loads connecting to
bus 3 and 4 represented by stochastic variable with 2% load variation.
From the simulation results, the deterministic system
response is indicated by the mean value and is asymptotically
stable. Use the stochastic system stability definition introduced
in Section V. When the loads at buses 3 and 4 have small
variances, the system behaves similar to a deterministic system,
which is asymptotically stable with a probability of 0.9 (ts=15
s, r0=0.05 rad/s).
Fig. 3. IEEE 10-machine 39-bus system.
A. Stochastic Loads at 5% with Low Variances
In the first case, model the loads at buses 3 and 4 (about 5%
of the system load) by Ornstein-Uhlenbeck process. The
variances of the loads are 2% of their mean values. The results
from the ADM-based approach and the Euler-Maruyama
approach are shown in Fig. 4. Among all the generators,
generator 1 has the shortest the electrical distance to bus 3 and
4, hence the rotor angle of it is presented in the following
results.
B. Stochastic Loads at 100% with Low Variances
In the second case, extend stochastic loads to all buses with
variances equal to 2% of their mean values. As shown in Fig.
5, the simulation results from two approaches agree with each
other, which reveal a less stable post-fault system response due
to increased uncertainties.
When all the system loads are stochastic, the system is
asymptotically stable with a probability of 0.6 (ts=15 s, r0=0.05
rad/s). Compared to the first case having only two stochastic
loads with the same r0 value, the probability of the system being
asymptotically stable reduces from 0.9 to 0.6.
Therefore, when the percentage of stochastic loads
increases, even though the load uncertainties are low and the
equilibrium point of the system is almost the same as its
deterministic model, the asymptotic stability of the system in
probability downgrades. That justifies the necessity of using
stochastic load models to study the stability of power systems
with a high penetration of stochastic loads.
6
(a) Result from the ADM-based approach.
(b) Result from the Euler-Maruyama approach.
Fig. 5. Simulation results of generator 1 rotor angle with all loads represented
by stochastic variable with 2% load variation.
In the third case, all the loads are represented by stochastic
loads and the variances of the loads are increased to 4% of the
mean values. This case may represent a scenario having DERs
widely deployed in distribution networks, which make the
aggregated bus load seen from each transmission or subtransmission substation behave more stochastically. The
simulation results from the ADM-based approach and EulerMaruyama approach are shown in Fig. 6.
The ADM-based approach agrees with the Euler-Maruyama
approach on the simulation results. Both of them show that the
system loses its stability when the variance of the loads
increases to 4% of their mean values. The instability is due to
the cumulative effect of stochastic load variations. The 90%
confidence envelope can be utilized as an indicator of the
system stability. Unlike Fig. 5, the 90% confidence envelope in
Fig. 6 is not bounded any more, indicating a 0.9 probability of
the system losing stability.
(a) ADM-based approach
C. Stochastic Loads at 100% with High Variances
(b) Euler-Maruyama approach
Fig. 7. Simulation results of bus voltage at bus 30 with all loads represented by
stochastic variable with 4% load variation.
(a) Result from the ADM-based approach.
(a) Result from the Euler-Maruyama approach.
Fig. 6. Simulation results of generator 1 rotor angle with all loads represented
by stochastic variable with 4% load variation.
Bus voltages also reflect the impact from high load
uncertainties as shown in Fig. 7 about the voltage magnitude of
bus 30, denoted by V30. With loads of high uncertainties, the
system has an increased risk of under- and over-voltage issues
because the imbalance between generation and load is
magnified by increased load uncertainties. That also indicates
the importance of stochastic power system simulation when
penetration of DERs becomes high.
From results of stochastic power system simulation, how the
probability distribution function (PDF) of a system variable
evolves in time during a post-contingency period can be
estimated and fit into an anticipated probability distribution for
analysis. As an example, if we assume V30 to follow a normal
distribution at each time instant with the mean value and
variance varying with time, Fig. 8 shows the evolutions of its
7
PDF using simulation results from both the ADM-based
approach and Euler-Maruyama approach for comparison. Fig.
8a basically matches Fig. 8b, indicating the accuracy of the
proposed ADM-based approach in reflecting the evaluation of
the PDF. From Fig.8, as time elapses, the PDF of the bus
voltage not only shifts the mean value but also increases the
variance indicated by the increasing width of the shape. Such
information is not available from deterministic power system
simulation. The longer the system is subjected to the effect of
stochastic variables the bigger variance and larger uncertainty
the system has in post-contingency dynamics.
Fig. 9. Mean value of generator 1’s rotor angle for case A.
Fig. 10. Standard deviation of generator 1’s rotor angle for case A.
As more loads are modeled as stochastic, the variance of
state variables grows accordingly. The mean value and standard
deviation of the rotor angle of generator 1 for case B are shown
in Fig. 11 and Fig. 12. In case B, the standard deviation reaches
its largest value 0.25 rad/s during the first swing, which is larger
than the largest standard deviation 0.1 rad/s in case A.
(a) ADM-based approach
Fig. 11. Mean value of generator 1’s rotor angle for case B.
(b) Euler-Maruyama approach
Fig. 8. Evolution of the pdf of the voltage magnitude at bus 30 from t=10 s to
20 s.
D. Variances of State Variables
To compare the accuracy of the numerical results from the
ADM-based approach and Euler-Maruyama approach, the
mean value and standard deviation of the 100 trajectories are
compared. For case A, as shown in Fig. 9 and Fig. 10, the ADMbased approach achieves comparable accuracy as the EulerMaruyama approach in terms of both mean value and standard
deviation value.
Fig. 12. Standard deviation of generator 1’s rotor angle for case B.
E. Comparison on Time Performances
The time performances for cases A, B and C of the ADMbased approach and Euler-Maruyama approach are compared in
TABLE I, from which the ADM-based approach takes less than
50% of the time cost of the Euler-Maruyama approach. The
advantage of the ADM-based approach in time performance is
more prominent when many simulation runs are required. As
discussed in [14], the ADM-based approach is inherently
8
suitable for parallel implementation, which could help further
improve the time performance if high-performance parallel
computers are available.
TABLE I
TIME PERFORMANCE COMPARISON OF STOCHASTIC LOAD CASES
Time costs (s)
Ito calculus single run
Ito calculus 100 runs
ADM single run
ADM 100 runs
Stochastic loads
at all buses
(Case B, C)
11.6
1165.1
5.1
511. 0
Stochastic loads
at buses 3 and 4
(Case A)
11.4
1142.4
5.1
503.6
[12]
[13]
[14]
[15]
[16]
[17]
VII. CONCLUSION
This paper proposes an alternative approach for stochastic
simulation of power systems. Using the SAS derived from the
ADM, the stochastic effects from load uncertainties can be
taken into considerations. The result from the proposed
approach is benchmarked with that from the Euler-Maruyama
approach. Since the evaluation of SASs is faster than the
integration with the Euler-Maruyama approach, the proposed
approach has an obviously advantage in time performance. This
is critical when a large number of simulation runs need to be
performed for simulating stochastic behaviors of a future power
grid having a high penetration of DERs. The simulation results
on different levels of stochastic loads show that when the level
of load uncertainty is low, the deterministic simulation is still
trustworthy compared to the mean-value trajectory from
stochastic simulation, but, once the level of load uncertainty
becomes high, the mean-value trajectory no longer represents
the true behavior of the system.
VIII. REFERENCES
[1]
I. Hiskens, J. Alseddiqui, "Sensitivity, approximation and uncertainty in
power system dynamic simulation," IEEE Trans. Power Systems, vol. 21,
no. 4, pp. 1808-1820, Nov. 2006.
[2] M. Tatari, M. Dehghan, M. Razzaghi, "Application of the Adomian
decomposition method for the Fokker-Planck equation," Math. and
Comput. Modelling, vol. 45, no. 5, pp.638-650, Mar. 2007.
[3] B. Spencer, Jr., L. Bergman, "On the numerical solution of the FokkerPlanck equation for nonlinear stochastic systems," Nonlinear Dynamics,
vol. 4, no. 4, pp. 357-372, Aug. 1993.
[4] Y. Saito, T. Mitsui, "Simulation of stochastic differential equations," Ann.
Inst. Stat. Math., vol. 45, no. 3, pp. 419-432, Sep. 1993.
[5] D. J. Higham, "An algorithmic introduction to numerical simulation of
stochastic differential equations," Soc. Ind. and Appl. Math. Review,
vol.43, no.3, pp.525-546, 2001.
[6] K. Wang, M. Crow, "Fokker Planck equation application to analysis of a
simplified wind turbine model," North American Power Symposium,
Champaign, IL, 2012.
[7] F. Milano, R. Zarate-Minano, "A systematic method to model power
systems as stochastic differential algebraic equations," IEEE Trans.
Power Systems, vol. 28, no. 4, pp. 4537-4544, Nov. 2013.
[8] W. Wu, K. Wang, G. Li, Y. Hu, "A stochastic model for power system
transient stability with wind power," IEEE PES General Meeting,
National Harbor, MD, 2014.
[9] K. Wang, M. Crow, "Numerical simulation of stochastic differential
algebraic equations for power system transient stability with random
loads," IEEE PES General Meeting, Detroit, MI, 2011.
[10] B. Yuan, M. Zhou, G. Li, X. Zhang, "Stochastic small signal stability of
power system with wind power generation," IEEE Trans. Power Systems,
vol. 30, no. 4, pp.1680-1689, Jul. 2015.
[11] X. Wang, H. D. Chiang, J. Wang, H. Liu, T. Wang, "Long-term stability
analysis of power systems with wind power based on stochastic
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
differential equations: model development and foundations," IEEE Trans.
Sustainable Energy, vol. 6, no. 4, pp. 1534-1542, Oct. 2015.
N. Duan, K. Sun, "Application of the Adomian decomposition method for
semi-analytic solutions of power system differential algebraic equations,"
IEEE PowerTech, Eindhoven, Netherlands, 2015.
N. Duan, K. Sun, "Finding semi-analytic solutions of power system
differential-algebraic equations for fast transient stability simulation,"
arXiv preprint arXiv:1412.0904, Dec. 2014.
N. Duan, K. Sun, "Power system simulation using the multistage
Adomian decomposition method," IEEE Trans. Power Systems, vol.32,
no. 1, pp. 430-441, Jan. 2017.
G. Adomian, "Nonlinear stochastic differential equations," Math. Anal.
And Applicat., vol. 55, no. 2, pp. 441-452, Aug. 1976.
J. Qi, K. Sun, W. Kang, "Optimal PMU placement for power system
dynamic state estimation by using empirical observability Gramian,"
IEEE Trans. Power Systems, vol. 30, no.4, pp. 2041-2054, Jul. 2015.
F. Galiana, E. Handschin, A. Fiechter, "Identification of stochastic
electric load models from physical data," IEEE Trans. Automat. Control,
vol. 19, no. 6, pp. 887-893, Dec. 1974.
T. Sauer, "Numerical solution of stochastic differential equations in
finance," in Handbook of Mathematical Functions, Springer Berlin
Heidelberg, 2012, pp. 529-550.
K. Nouri, "Study on stochastic differential equations via modified
Adomian decomposition method," U. P. B. Sci. Bull., Series A, vol. 78,
no. 1, pp. 81-90, 2016.
W. Cao, M. Liu, Z. Fan, "MS-stability of the Euler-Maruyama method for
stochastic differential delay equations," Appl. Math. and Comp., vol. 159,
no. 1, pp. 127-135, 2004.
M. Hutzenthaler, A. Jentzen, P. Kloeden, "Strong convergence of an
explicit numerical method for SDEs with non-globally Lipschitz
continuous coefficients", The Ann. of Appl. Probability, vol. 22, no.4, pp.
1611-1641, 2012.
G. Adomian, "A review of the decomposition method in applied
mathematics," J. of Math. Anal. and Applicat., vol. 135, no.2, pp. 501544, Nov. 1988.
U. H. Thygesen, "A survey of Lyapunov techniques for stochastic
differential equations," Dept. of Math. Modelling, Tech. Univ. of
Denmark, Lyngby, Denmark, Rep. IMM Technical Report nr. 18-1997.
X. Mao, Stochastic Differential Equations and Applications, 2nd edition,
Chichester, UK, Horwood, 2008.
K. Burrage, P. Burrage, T. Mitsui, "Numerical solutions of stochastic
differential equations – implementation and stability issues," J. of
Computational and Appl. Math., vol. 125, no. 1, pp. 171-182, 2000.
F. Kozin, "A survey of stability of stochastic systems," Automatica, vol.
5, no. 1, pp. 95-112, Jan. 1969.
| 3cs.SY
|
MagnifyMe: Aiding Cross Resolution Face Recognition via Identity Aware
Synthesis
Maneet Singh, Shruti Nagpal, Richa Singh, Mayank Vatsa, and Angshul Majumdar
IIIT-Delhi, India
arXiv:1802.08057v1 [cs.CV] 22 Feb 2018
{maneets, shrutin, rsingh, mayank, angshul}@iiitd.ac.in
Abstract
Enhancing low resolution images via super-resolution
or image synthesis for cross-resolution face recognition
has been well studied. Several image processing and machine learning paradigms have been explored for addressing the same. In this research, we propose Synthesis via
Deep Sparse Representation algorithm for synthesizing a
high resolution face image from a low resolution input image. The proposed algorithm learns multi-level sparse representation for both high and low resolution gallery images,
along with an identity aware dictionary and a transformation function between the two representations for face identification scenarios. With low resolution test data as input, the high resolution test image is synthesized using the
identity aware dictionary and transformation which is then
used for face recognition. The performance of the proposed
SDSR algorithm is evaluated on four databases, including
one real world dataset. Experimental results and comparison with existing seven algorithms demonstrate the efficacy
of the proposed algorithm in terms of both face identification and image quality measures.
Low Resolution
Face Image
Bicubic Interpolation
Low Resolution
Face Image
High Resolution
Gallery Image
Bicubic Interpolation
Figure 1: Images captured few minutes before Boston
Marathon Bombing, 2013, of suspect Dzhokhar Tsarnaev
(circled). The resolution of the circled image is less than
24 × 24, which is interpolated to (96 × 96).
covariate of face recognition with widespread applications.
Several researchers have shown that the performance of
state-of-the-art (SOTA) algorithms reduces while matching
cross-resolution face images [4, 30, 31]. In order to overcome this limitation, an intuitive approach is to generate a
high resolution image for the given low resolution input,
which can be provided as input to the face recognition engine. Figure 1 shows a sample real world image captured
before the Boston Bombing (2013). Since the person of
interest is at a distance, the face captured is thus of low
resolution. Upon performing bicubic interpolation to obtain a high resolution image, results in an image suffering from blur and poor quality. With the ultimate aim of
high recognition performance, the generated high resolution image should have good quality while preserving the
identity of the subject. As elaborated in the next subsection, while there exist multiple synthesis or super resolution techniques, we hypothesize that utilizing a (domain)
face-specific, recognition-oriented model for face synthesis
should result in improved recognition performance, especially for close-set recognition scenarios. To this effect, this
work presents a novel domain specific identity aware Synthesis via Deep Sparse Coding algorithm for synthesizing
a high resolution face image from a given low resolution
input image.
1. Introduction
Group images are often captured from a distance, in
order to capture multiple people in the image. In such
cases, the resolution of each face image is relatively smaller,
thereby resulting in errors during automated tagging. Similarly, in surveillance and monitoring applications, cameras
are often designed to cover the maximum field of view, this
often limits the size of face images captured, especially for
individuals at a distance. If we use these images to match
against high resolution images, e.g., profile images on social media or mugshot images captured by law enforcement,
then resolution gap between the two may lead to incorrect
results. This task of matching a low resolution input image
against a database of high resolution images is referred to
as cross resolution face recognition and it is a challenging
1
1.1. Literature Review
In literature, different techniques have been proposed
to address the problem of cross resolution face recognition. These can broadly be divided into transformation
based techniques and non-transformation based techniques.
Transformation based techniques address the resolution difference between images by explicitly introducing a transformation function either at the image or at the feature level.
Non-transformation techniques propose to learn/extract resolution invariant features or classifiers, in order to address
the resolution variations [4, 30]. In 2013, Wang et al. [31]
present an exhaustive review of the proposed techniques for
addressing cross resolution face recognition.
Peleg and Elad [21] propose a statistical model that uses
Minimum Mean Square Error estimator on high and low
resolution image pair patches for prediction. Lam [14] propose a Singular Value Decomposition based approach for
super resolving low resolution face images. Researchers
have also explored the domain of representation learning
to address the problem of cross resolution face recognition.
Yang et al. [32] propose learning dictionaries for low and
high resolution image patches jointly followed by learning a
mapping between the two. Yang et al. [33] propose a Sparse
Representation-based Classification approach in which the
face recognition and hallucination constraints are solved simultaneously. Gu et al. [13] propose convolutional sparse
coding where an image is divided into patches and filters
are learned to decompose a low resolution image into features. A mapping is learned to predict high resolution feature maps from the low resolution features. Mundunuri and
Biswas [19] propose a multi-dimensional scaling and stereo
cost technique to learn a common transformation matrix for
addressing the resolution variations.
A parallel area of research is that of super-resolution,
where research has focused on obtaining a high resolution
image from a given low resolution image, with the objective of maintaining/improving the visual quality of the input [3, 22, 28, 29]. There has been significant advancement in the field of super-resolution over the past several
years including recent representation learning architectures
[5, 6, 7, 16, 26] being proposed for the same. It is important to note that while such techniques can be utilized for
addressing cross resolution face recognition, however, they
are often not explicitly trained for face images, or for providing recognition-oriented results.
1.2. Research Contributions
This research focuses on cross resolution face recognition by proposing a recognition-oriented image synthesis algorithm, capable of handling large magnification factors. We propose a deep sparse representation based transfer learning approach termed as Synthesis via Deep Sparse
Representation (SDSR). The proposed identity aware syn-
thesis algorithm can be incorporated as a pre-processing
module prior to any existing face recognition engine to enhance the resolution of a given low resolution input. In order to ensure recognition-oriented synthesis, the proposed
model is trained using a gallery database having a single
image per subject. The results are demonstrated with four
databases and the effectiveness is evaluated in terms of both
no-reference image quality measure of the synthesized images and face identification accuracies with existing face
recognition models.
2. Synthesis via Deep Sparse Representation
Dictionary Learning algorithms have an inherent property of representing a given sample as a sparse combination of it’s basis functions [23]. This property is utilized in
the proposed SDSR algorithm to synthesize a high resolution image from a given low resolution input. The proposed
model learns a transformation between the representations
of low and high resolution images. That is, instead of interpolating the pixel values, this work focuses on interpolating a more abstract representation. Further, motivated by
the abstraction capabilities of deep learning, we propose to
learn the transformation from deeper levels of representation. Unlike traditional dictionary learning algorithms, we
propose to learn the transformation at deeper levels of representation. This leads to the key contribution of this work:
Synthesis via Deep Sparse Representation (SDSR), a transfer learning approach for synthesizing a high resolution image for a given low resolution input.
2.1. Preliminaries
Let X = [x1 |x2 |...|xn ] be the input training data with n
samples. Dictionary learning algorithms learn a dictionary
(D) and sparse representations (A) using data (X). The
objective function of dictionary learning is written as:
n
1 X 1 i
2
x − Dαi F + λ αi 1
(1)
min
D, A n
2
i=1
where, A = [α1 |α2 |....|αn ] are the sparse codes, k·k1 represents `1 -norm, and λ is the regularizing constant that controls how much weight is given to induce sparsity in the
representations. In Eq. 1, the first term minimizes the reconstruction error of the training samples, and the second
term is a regularization term on the sparse codes.
In literature, researchers have proposed extending a
single level dictionary to a multi-level dictionary to
learn multiple levels of representations of the given
data [20, 24, 25]. A k−level deep dictionary learns
k dictionaries D = {D1 , ..., Dk } and sparse coefficients
A = {A1 , ..., Ak } for a given input X.
n
1 X 1 i
2
(2)
x − D1 ...Dk αk,i F + λ αk,i 1
min
D, A n
2
i=1
The architecture of deep dictionary is inspired from the deep
learning techniques where deeper layers of feature learning enhance the level of abstraction learned by the network,
thereby learning meaningful latent variables.
In real world scenarios of surveillance or image tagging, the task is to match the low resolution test images
(probe) to the database of high resolution images known
as gallery images. Without loss of generality, we assume
that the target comprises of high resolution gallery images
while the source domain consists of low resolution images. In the proposed model, for low resolution face images
Xl , and high resolution face images Xh , k level deep dictionaries are learned in both source (GL = {G1l , ..., Gkl })
and target domain (GH = {G1h , ..., Gkh }). It is important
to note that the dictionaries are generated using the preacquired gallery images. Corresponding sparse representations, AL = {A1l , ..., Akl } and AH = {A1h , ..., Akh } are also
k,2
k,n
learned for all k levels, where Akh = [αk,1
h |αh |...|αh ] are
the representations learnt corresponding to the high resoluk,2
k,n
tion deep dictionary and Akl = [αk,1
l |αl |...|αl ] are the
th
representations learnt from the k level dictionary for the
low resolution images. The proposed algorithm learns a
transformation, M, between Akh and Akl . The optimization
formulation for Synthesis via Deep Sparse Representation
(SDSR), a k-level deep dictionary is written as:
n
1 X 1 i
xh − G1h ...Gkh αk,i
h
GH ,AH , n
2
G ,A ,M
i=1
2
+
min
F
L
+
1 i
x − G1l ...Gkl αk,i
l
2 l
2
2
k,i
+ λM αk,i
h − Mαl
+
F
k
X
j=1
k
X
j,i
(λj αh
j=1
j,i
(λj αl
)
1
)
1
F
where, λj are regularization parameters which control the
amount of sparsity in the learned representations of the j th
layer, while λM is the regularization constant for learning
the transformation function. GH and GL correspond to the
deep dictionaries learned for the high and low resolution
gallery images, respectively. The SDSR algorithm learns
multiple levels of dictionaries and corresponding representations for low and high resolution face images, along with
a transformation between the features learned at the deepest
layer.
Training SDSR Algorithm
Without loss of generality, training of the proposed SDSR
algorithm is explained with k = 2 (shown in Figure 2). For
1
L
+λ2
1
+
α2,i
l
1 i
x − G1l G2l α2,i
l
2 l
1
+ λM
α2,i
h
2
+ λ1 α1,i
l
2
− Mα2,i
l
F
F
1
(4)
Since the number of variables in Eq. 4 is large (even more
for deeper dictionaries), directly solving the optimization
problem may provide incorrect estimates and lead to overfitting. Therefore, greedy layer by layer training is applied.
It is important to note that since there is a l1 -norm regularizer on the coefficients of the first and the second layer, the
dictionaries G1h and G2h cannot be collapsed into one dictionary. In order to learn the estimates, Eq. 4 is split into
learning the first level representation, second level representation, and the transformation. From Eq. 2, the optimization
function for two level deep dictionary is as follows:
n
1 X 1 i
2
x − G1 G2 α2,i F +λ1 α1,i 1 +λ2 α2,i
min
2
G1 ,D2 , n
i=1
A1 ,A2
(5)
Assuming an intermediate variable, α1,i = G2 α2,i such
that A1 = [α1,1 |α1,2 |...|α1,n ], the above equation can be
modeled as a step-wise optimization of the following two
equations:
n
1 X 1 i
2
min
x − G1 α1,i F + λ1 α1,i 1
(6)
2
G1 , A 1 n
i=1
n
1 X 1
α1,i − G2 α2,i
min
2
G2 , A2 n
i=1
(3)
2.2.1
H
+λ2 α2,i
h
2.2. SDSR Algorithm
L
a two level deep dictionary, Eq. 3 can be written as:
n
1 X 1 i
2
1,i
min
xh − G1h G2h α2,i
h F + λ 1 αh
GH ,GL
n
2
A ,A ,M
i=1
2
F
+ λ2 α2,i
1
(7)
A deep dictionary of two levels (Eq. 5) requires two
steps for learning (Eq. 6, 7). Upon extending the formulation to k level deep dictionary, it would require exactly
k steps for optimization. The proposed SDSR algorithm
(Eq. 3) builds upon the above and utilizes k + 1 steps based
greedy layer-wise learning for a k level deep dictionary. k
steps are for learning representations using the deep dictionary architecture and the k + 1th step is for learning the
transformation between the final representations. Therefore, Eq. 4 is solved using an independent three step approach: (i) learn first level source (low resolution) and target (high resolution) domain dictionaries, (ii) learn second
level low and high resolution image dictionaries, and (iii)
learn a transformation between the final representations.
Using the concept in Eq. 5 - 7, in the first step, two separate level-1 (i.e. k = 1) dictionaries are learned from the
given input data for the low resolution (G1l ) and high resolution (G1h ) face images independently. Given the training
data consisting of low (Xl ) and high (Xh ) resolution face
1
Learn Sparse
Representations
Learn Sparse
Representations
Gh2
G1h
High Resolution Gallery Images
1st Level Dictionary
2nd Level Sparse Representations
2nd Level Dictionary
1st Level Sparse Representations
(a)
Learn Sparse
Representations
Learn Sparse
Representations
G1l
Low Resolution Gallery Images
Gl2
1st Level Dictionary
2nd Level Dictionary
1st Level Sparse Representations
Gl2
G1l
(b)
xltest
Learn
Transformation
‘M’
Using Transformation
M
2nd Level Sparse Representations
G1h
Gh2
Face Recognition
Engine
α1,test
h
α2,test
h
α2,test
l
α1,test
l
xhtest
Figure 2: Synthesis via Deep Sparse Representation algorithm for 2-level deep dictionary. (a) refers to the training of the
model, while (b) illustrates the high resolution synthesis of a low resolution input.
images, the following minimization is applied for the two
domains respectively:
n
1X1 i
2
min
xl − G1l α1,i
+ λ1 α1,i
(8)
l
l
2
1
1
1 n
2
Gl , A l
i=1
n
min
G1h , A1h
1X1 i
x − G1h α1,i
h
n i=1 2 h
2
2
+ λ1 α1,i
h
1
(9)
1,2
1,n
here,
A1l = [α1,1
and
l |αl |...|αl ]
1,1
1,2
1,n
1
Ah = [αh |αh |...|αh ] refer to the level-1 sparse
codes learned for the low and high resolution images
respectively. Each of the above two equations can be
optimized independently using an alternating minimization
dictionary learning technique over the dictionary G1 and
representation A1 [17]. After this step, G1h , G1l (dictionaries) and A1h , A1l (representations) are obtained for the two
varying resolution data.
In the second step, a deep dictionary is created by learning the second level dictionaries (G2l , G2h ) using the representations obtained from the first level (A1h and A1l ). That
is, two separate dictionaries, one for low resolution images
and one for high resolution images are learned using the
representations obtained at the first level as input features.
The equations for this step can be written as follows:
n
1X1
2 2,i 2
min
α1,i
+ λ2 α2,i
(10)
l − Gl αl
l
2
1
2
2 n
2
Gl , Al
i=1
n
1X1
2 2,i
min
α1,i
h − Gh αh
2
2 n
2
Gh , Ah
i=1
2
2
+ λ2
α2,i
h 1
(11)
2,2
2,n
here, A2l = [α2,1
l |αl |...|αl ] is the final represen-
tation obtained for the low resolution images and
2,2
2,n
A2h = [α2,1
h |αh |...|αh ] refers to the representation obtained for the high resolution images. Similar to the previous step, the equations can be solved independently using
alternating minimization over the dictionary and representations. After this step, G2l , G2h , A2l and A2h are obtained.
In order to synthesize from one resolution to another, the
third step of the algorithm involves learning a transformation between the deep representations of the two resolutions
(i.e. A2l and A2h ). The following minimization is solved to
obtain a transformation M.
1
2
min
A2h − MA2l F
(12)
M 2
The above equation is a least square problem having a
closed form solution. After training, the dictionaries
(G1l , G1h , G2l , G2h ) and the transformation function (M) are
obtained which are then used at test time.
2.2.2
Testing: Synthesizing High Resolution Face Image from Low Resolution Image
During testing, a low resolution test image, xtest
l , is input
to the algorithm. Using the trained gallery based dictionaries, G1l and G2l , first and second level representations
(α1,test
, α2,test
) are obtained for the given image:
l
l
xtest
= G1l α1,test
; α1,test
= G2l α2,test
l
l
l
l
(13)
The transformation function, M, learned in Eq. 12, is then
used to obtain the second level high resolution representation (α2,test
).
h
α2,test
= Mα2,test
h
l
(14)
Table 1: Summarizing the characteristics of the training and testing partitions of the databases used in experiments.
Dataset
CMU Multi-PIE [12]
CAS-PEAL [10]
Real World Scenarios [4]
SCface [11]
Training
Subjects
100
500
50
Training
Images
200
659
300
Testing
Subjects
237
540
1207
80
Testing
Images
474
705
1222
480
Gallery
Resolution
Probe Resolutions
8 × 8, 16 × 16, 24 × 24,
96 × 96
24 × 24, 32 × 32, 48 × 48
Probe
Resolution
Original
Image
Bicubic
Interp.
Dong et
al. [7]
Kim et
al. [15]
Gu et
al. [13]
Dong et
al. [6]
Peleg et
al. [21]
Yang et
al. [32]
Proposed
SDSR
CMU
MultiPIE
8×8
16×16
24×24
32×32
48×48
0.0±0.0
0.0±0.0
1.2±0.4
3.4±0.6
91.9±1.1
0.1±0.0
1.1±0.1
3.1±0.6
16.9±1.3
95.8±0.4
2.0±3.5
9.7±1.1
85.8±0.7
4.1±1.0
17.5±1.1
96.2±0.6
4.3±1.0
15.4±1.1
93.1±0.9
4.2±0.6
6.9±0.2
95.5±1.1
8.3±0.9
92.8±0.4
94.0±0.6
82.6±1.5
91.1±1.3
91.8±1.8
91.9±1.7
91.5±1.5
CAS-PEAL
8×8
16×16
24×24
32×32
48×48
0.0±0.0
0.0±0.0
0.4±0.6
3.7±0.7
63.4±1.7
0.0±0.0
0.2±0.3
14.9±1.7
76.5±1.8
90.8±1.5
0.4±0.2
5.4±1.2
46.5±2.5
2.3±0.8
11.8±1.1
75.8±2.3
1.9±0.7
8.1±2.3
77.7±2.1
2.5±0.7
2.1±0.7
72.0±0.7
3.1±1.6
74.0±2.6
73.3±3.3
92.8±0.7
94.4±1.1
95.3±1.4
95.6±1.1
95.4±1.5
SCface
Table 2: Rank-1 identification accuracies (%) obtained using Verilook (COTS-I) for cross resolution face recognition. The
target resolution is 96 × 96. The algorithms which do not support the required magnification factor are presented as 0 −0 .
24×24
32×32
48×48
1.1±0.2
1.8±0.5
6.5±0.6
0.8±0.1
2.5±0.3
9.5±1.9
0.4±0.2
2.2±0.4
6.9±0.6
0.4±0.2
2.0±0.0
6.7±1.2
1.5±0.3
2.3±0.3
7.7±0.6
1.3±0.3
0.7±0.3
7.5±1.3
1.8±0.5
7.3±0.9
6.8±0.7
14.7±3.3
15.6±1.3
18.5±2.6
Using Eq. 9 and Eq. 11 and the second level representation for the given image in the target domain, a synthesized
output of the given image is obtained. First α1,test
is calcuh
lated with the help of G2h and then xtest
h is obtained using
G1h , which is the synthesized image in the target domain.
1 1,test
α1,test
= G2h α2,test
; xtest
h = Gh αh
h
h
(15)
It is important to note that the synthesized high resolution
image is a sparse combination of the basis functions of the
learned high resolution dictionary. In order to obtain a good
quality, identity-preserving high resolution synthesis, the
dictionary is trained with the pre-acquired high resolution
database. This ensures that the basis functions of the trained
dictionaries span the latent space of the images. As will be
demonstrated via experiments as well, a key highlight of
this algorithm is to learn good quality, representative dictionaries with a single sample per subject as well. The high
resolution synthesized output image xtest
h can then be used
by any face identification engine for recognition.
3. Databases and Experimental Protocol
The effectiveness of the proposed SDSR algorithm
is demonstrated by evaluating the face recognition performance with original and synthesized images. Two
commercial-off-the-shelf face recognition systems (COTS),
Verilook (COTS-I) [2] and Luxand (COTS-II) [1] are used
on four different face databases. For Verilook, the face quality and confidence thresholds are set to minimum, in order
to reduce enrollment errors. The performance of the proposed algorithm is compared with six recently proposed
super-resolution and synthesis techniques by Kim et al.
[15]1 (kernel ridge regression), Peleg et al. [21]2 (sparse
representation based statistical prediction model), Gu et al.
[13]3 (convolutional sparse coding), Yang et al. [32]4 (dictionary learning), Dong et al. [6]5 (deep convolutional networks), and Dong et al. [7]6 (deep convolutional networks)
along with one of the most popular technique, bicubic interpolation. The results of the existing super-resolution algorithms are computed by using the models provided by
the authors at the links provided in the footnotes. It is to
be noted that not all the algorithms support all the levels of
magnification. For instance, the algorithm proposed by Kim
et al. [15] supports up to 4 levels of magnification whereas,
Yang et al.’s algorithm supports up to 2 levels of magnification.
Face Databases: Table 1 summarizes the statistics of
the databases in terms of training and testing partitions,
along with the resolutions. Details of the databases are
provided below:
1. CMU Multi-PIE Dataset [12]: Images pertaining
1 https://people.mpi-inf.mpg.de/
kkim/supres/supres.htm
2 http://www.cs.technion.ac.il/ẽlad/software/
3 http://www4.comp.polyu.edu.hk/
cslzhang/
4 http://www.ifp.illinois.edu/j̃yang29/
5 http://mmlab.ie.cuhk.edu.hk/projects/SRCNN.html
6 http://mmlab.ie.cuhk.edu.hk/projects/FSRCNN.html
to 337 subjects are selected with frontal pose, uniform
illumination, and neutral expression. 100 subjects are used
for training while the remaining 237 are in the test set.
2. CAS-PEAL Dataset [10] consists of face images of
1040 subjects. All subjects have a single, high-resolution
normal image and the dataset contains images of different
covariates such as lighting, expression, and distance. For
this research, normal images are used as the high resolution
gallery database while face images under the distance
covariate are downsampled and used as probe images.
3. SCface Dataset [11]: It consists of 130 subjects, each
having one high resolution frontal face image and multiple
low resolution images, captured from three distances using
surveillance cameras.
4. Real World Scenarios Dataset [4] contains images
of seven subjects associated with the London Bombing,
Boston Bombing, and Mumbai Attacks. Each subject
has one high resolution gallery image and multiple low
resolution test images. The test images are captured from
surveillance cameras and are collected from multiple
sources from the Internet. Since the number of subjects
are just seven, in order to mimic a real world scenario, the
gallery size is increased to create an extended gallery of
1200 subjects. Images from the Multi-PIE, ND Human
Identification Set-B [8], and MEDS[9] datasets are used for
the same.
Protocol: For all the datasets, a real world matching
protocol is followed. For each subject, multiple low resolution images are used as probe images which are matched
against the pre-acquired database of high resolution gallery
images. Only a single high resolution image per subject is
used as gallery. The proposed and comparative algorithms
are used to synthesize (or super-resolve) a high resolution
image from a given low resolution input. The magnification
factor varies from 2 (for probes of 48 × 48) to 12 (for
probes of 8 × 8) to match it against the gallery database
of size 96 × 96. For all the databases except the SCface,
test images are of sizes varying from 8 × 8 to 48 × 48. For
the SCface database, predefined protocol is followed and
probe resolutions are 24 × 24, 32 × 32, and 48 × 48. Face
detection is performed using face co-ordinates (if provided)
or using Viola Jones Face Detector [27] and synthetic
downsampling is performed to obtain lower resolutions.
All the experiments are performed with five times random
sub-sampling to ensure consistency.
Implementation Details: The SDSR algorithm is trained
using the pre-acquired gallery database for each dataset.
The regularization constant for sparsity is kept at 0.85.
Different dictionaries have different dimensions, based
on the input data. For instance, the two-level dictionaries
created for SCface dataset contain 100 and 80 atoms in the
first and second dictionary respectively. The source code
Input
Bicubic
Proposed
Input
Bicubic
Proposed
Figure 3: Sample images from SCface dataset incorrectly
synthesized by the SDSR algorithm for 32 × 32 input.
of the algorithm will be made publicly available in order to
ensure reproducibility of the proposed approach.
4. Results and Analysis
The proposed algorithm is evaluated with three sets of
experiments: (i) face recognition performance with resolution variations, (ii) image quality measure, and (iii) face
identification analysis with different dictionary levels. The
resolution of the gallery is set to 96 × 96. For the first experiment, the probe resolution varies from 8 × 8 to 48 × 48,
while it is fixed to 24 × 24 for the next two experiments.
4.1. Face Recognition across Resolutions
For all datasets and resolutions, results are tabulated in
Tables 2 to 4. The key observations pertaining to these set
of experiments are presented below:
8 × 8 and 16 × 16 probe resolutions: Except bicubic interpolation, none of the existing super resolution or synthesis algorithms used in this comparison support a magnification factor of 12 (for 8 × 8) or 6 (for 16 × 16); therefore,
the results on these two resolutions are compared with original resolution (when the probe is used as input to COTS as
it is, without any resolution enhancement) and bicubic interpolation only. As shown in the third and fourth columns
of the two tables, on the CMU Multi-PIE and CAS-PEAL
databases, matching with original and bicubic interpolated
images results in an accuracy of ≤ 1.1% whereas, the
images synthesized using the proposed algorithm provide
rank-1 accuracy of 82.6% and 92.8%, respectively.
24 × 24 and 32 × 32 probe resolutions: As shown in Table 2, on CMU Multi-PIE and CAS-PEAL databases with
test resolution of 24 × 24 and 32 × 32, the synthesized images obtained using the proposed SDSR algorithm, yield
a rank-1 accuracy of ≥ 91.8%. Other approaches yield a
rank-1 accuracy of less than 20%, except bicubic interpolation on 32 × 32 size which provides rank-1 accuracy of
76.5%. As shown in Table 3, similar performance trends are
observed using COTS-II on the two databases. For SCface,
the rank-1 accuracy with SDSR is significantly higher than
the existing approaches; however, due to the challenging
nature of the database, both commercial matchers provide
low rank-1 accuracies. Fig. 3 presents sample images from
the SCface dataset, incorrectly synthesized via the proposed
SDSR algorithm. Varying acquisition devices of the training and testing partitions, along with the covariates of pose
and illumination creates the problem further challenging.
Probe
Resolution
Original
Image
Bicubic
Interp.
Dong et
al. [7]
Kim et
al. [15]
Gu et
al. [13]
Dong et
al. [6]
Peleg et
al. [21]
Yang et
al. [32]
Proposed
SDSR
CMU
Multi-PIE
8×8
16×16
24×24
32×32
48×48
0.0±0.0
0.0±0.0
0.9±0.3
11.3±1.1
90.2±0.5
0.0±0.0
0.0±0.0
1.0±0.3
18.3±7.1
97.9±0.5
2.3±0.5
13.5±0.6
96.0±0.6
5.9±0.7
28.6±1.2
97.1±0.7
6.8±1.4
24.3±2.3
96.6±0.5
6.8±0.5
19.4±1.5
96.9±0.6
17.4±2.5
97.5±0.5
96.2±0.4
82.3±1.4
90.5±1.1
92.1±1.5
92.2±1.6
91.9±1.6
CAS-PEAL
8×8
16×16
24×24
32×32
48×48
0.0±0.0
0.0±0.0
0.5±0.4
11.1±2.8
88.1±0.6
0.0±0.0
0.6±0.6
49.3±1.3
92.5±2.0
95.4±1.4
2.3±0.8
27.9±1.1
85.7±2.8
10.2±1.1
34.6±2.3
93.3±1.4
7.3±1.5
31.7±2.3
93.3±1.4
5.8±0.4
15.2±3.3
91.4±1.4
28.0±1.9
93.6±1.9
90.8±1.7
91.7±0.9
93.3±0.7
93.7±1.4
93.9±1.3
93.9±1.5
SCface
Table 3: Rank-1 identification accuracies (%) obtained using Luxand (COTS-II) for cross resolution face recognition. The
target resolution is 96 × 96. The algorithms which do not support the required magnification factor are presented as 0 −0 .
24×24
32×32
48×48
1.1±0.2
2.2±0.4
9.7±1.7
1.5±1.0
3.2±0.4
12.6±1.7
1.2±0.5
3.5±0.5
9.6±1.1
0.8±0.1
2.6±0.7
11.6±1.3
2.2±0.5
4.0±0.7
10.1±1.8
1.9±0.6
2.6±1.0
11.7±2.0
2.8±0.7
11.4±1.2
11.9±1.0
14.7±2.4
15.7±1.3
19.1±3.4
CASPEAL
CMU
Multi-PIE
Real
World
SCface
(a)
(b)
(c)
(d)
(e)
(f)
(g)
Figure 4: Probe images of 24 × 24 are superresolved/synthesized to 96×96. (a) corresponds to the original probe, (b)-(f) correspond to different techniques: bicubic interpolation, Kim et al [15], Gu et al. [13], Dong et al.
[6], Dong et al. [7], and the proposed SDSR algorithm.
48 × 48 probe resolution: Using COTS-I, the proposed
algorithm achieves improved performance than other techniques, except on the CMU Multi-PIE dataset, where it does
not perform as well. On all other databases, the proposed algorithm yields the best results. Upon analyzing both the Tables, it is clear that the proposed algorithm is robust to different recognition systems and performs well without any
bias for a specific kind of recognition algorithm.
Another observation is that with COTS-II, images superresolved using bicubic interpolation yield best results on the
first two databases. However, it should be noted that these
results are only observed for a magnification factor of 2 and
for images which were synthetically down-sampled. In real
world surveillance datasets, such as SCface, the proposed
approach performs best with both commercial systems.
Real World Scenarios Dataset: Table 4 summarizes the
results of COTS-I on Real World Scenarios dataset. Since
the gallery contains images from 1200 subjects, we sum-
marize the results in terms of the identification performance
with top 20% retrieved matches. It is interesting to observe
that for all test resolutions, the proposed algorithm significantly outperforms existing approaches. SDSR achieves a
53.3% identification accuracy on probe resolution of 8 × 8
and an accuracy of 60.0% for 48 × 48 test resolution.
Cross Dataset Experiments: The SDSR algorithm was
trained on the CMU Multi-PIE dataset, and tested on the
SCface dataset for a probe resolution of 24 × 24. A rank1 identification accuracy of 1.62% (1.92%) was obtained
using COTS-I (COTS-II), whereas a rank-5 identification
accuracy of 7.54% and 9.06% was obtained respectively.
The results showcase that the proposed model is still able
to achieve better recognition performance as compared to
other techniques. However, the drop in accuracy strengthens our hypothesis that using an identity-aware model for
performing synthesis is more beneficial for achieving higher
classification performance.
4.2. Quality Analysis
Fig. 4 shows examples of synthesized/super-resolved
images from multiple databases generated using the proposed and existing algorithms. In this figure, images of
96 × 96 are synthesized from low resolution images of
24 × 24. It can be observed that the output images obtained using existing algorithms (columns (b) - (f)) have artifacts in terms of blockiness and/or blurriness. However,
the quality of the images obtained using the proposed algorithm (column (g)) are significantly better than the other
algorithms. To compare the visual quality of the outputs, a
no reference image quality measure, BRISQUE [18] is utilized. Blind/Referenceless Image Spatial QUality Evaluator
(BRISQUE) computes the distortion in the image by using
the statistics of locally normalized luminance coefficients.
It is calculated in the spatial domain and is used to estimate
the losses of naturalness in an image. Lower the value, less
Table 4: Real World Scenarios: Recognition accuracy obtained in top 20% ranks, against a gallery of 1200 subjects using
COTS-I (Verilook) having resolution of 96x96.
Probe
Resolution
Original
Image
Bicubic Interpolation
Dong et
al. [7]
Kim et
al. [15]
Gu et al.
[13]
Dong et
al. [6]
Peleg et
al. [21]
Yang et
al. [32]
Proposed
SDSR
8×8
16×16
24×24
32×32
48×48
0.0
0.0
6.6
33.3
33.3
0.0
13.3
16.6
16.6
46.6
13.3
33.3
26.6
26.6
33.3
33.3
13.3
33.3
26.6
6.6
16.6
20.0
40.0
33.3
40.0
53.3
53.3
53.3
53.3
60.0
Table 5: Average no reference quality measure - BRISQUE [18] for probe resolution of 24 × 24 synthesized to 96 × 96,
obtained over five folds. A lower value for BRISQUE corresponds to lesser distortions in the image.
Database
Bicubic Interp.
Dong et al. [7]
Kim et al. [15]
Gu et al. [13]
Dong et al. [6]
Proposed SDSR
CMU Multi-PIE
CAS-PEAL
SCface
Real World
54.8 ± 0.1
60.0 ± 0.2
58.7 ± 0.1
57.5
28.94 ± 0.0
52.86 ± 0.0
52.86 ± 0.0
28.94
50.8 ± 0.1
54.3 ± 0.2
53.2 ± 0.2
54.5
52.8 ± 0.1
56.4 ± 0.1
54.9 ± 0.1
54.6
48.8 ± 0.1
53.4 ± 0.1
47.2 ± 0.1
49.54
26.2 ± 1.3
39.3 ± 0.3
34.2 ± 0.6
25.9
Table 6: Rank-1 accuracies (%) for varying levels of SDSR
algorithm with 24 × 24 probe and 96 × 96 gallery.
Database
COTS
CMU
Multi-PIE
Verilook
Luxand
Verilook
Luxand
Verilook
Luxand
CAS-PEAL
SCface
k=1
91.4
92.0
93.8
92.2
15.0
15.6
Dictionary Levels
k=2
k=3
91.8
91.8
92.1
92.5
95.3
93.7
93.7
93.6
14.7
15.2
14.7
15.3
distorted is an image. From Table 5, it can be seen that images obtained using the proposed SDSR algorithm have a
better (lower) BRISQUE score as compared to images generated with existing algorithms; a difference of at least 15
points is observed in the BRISQUE scores.
4.3. Effect of Dictionary Levels
As explained in the algorithm section, synthesis can be
performed at different levels of deep dictionary, i.e. with
varying values of k. This experiment is performed to analyze the effect of different dictionary levels on identification
performance. The proposed algorithm is used to synthesize
high resolution images (96 × 96, magnification factor of 4)
from input images of size 24 × 24 with varying dictionary
levels, i.e. k = 1, 2, 3. First level dictionary (k = 1) is
equivalent to shallow dictionary learning, whereas two and
three levels correspond to synthesis with deep dictionary
learning. Table 6 reports the rank-1 identification accuracies obtained with the two commercial matchers for four
databases. The results show that the proposed approach
with k = 2, generally, yields the best results. In some cases,
the proposed approach with k = 3 yields better results.
Generally, abstraction capability of deeper layers and overfitting are two effects in deep learning based approaches. In
Table 6, we observe the trade-off between these two. Most
of the datasets are moderately sized; therefore, we observe
good results in the second layer. In the third layer, overfitting offsets the abstraction, hence we see none to marginal
changes. Further, computational complexity with 3-level
deep dictionary features is higher and the improvements in
accuracy are not consistent across databases. On the other
hand, paired t-test on the results obtained by the shallow
dictionary and 2-level deep dictionary demonstrate statistical significance even with a confidence level of 95% (for
Verilook). Specifically, for a single image, synthesis with
level-1 dictionary requires 0.42 ms, level-2 requires 0.43
ms, and level-3 requires 0.45 ms.
5. Conclusion
The key contribution of this research is a recognitionoriented pre-processing module based on dictionary learning algorithm for synthesizing a high resolution face image
from low resolution input. The proposed SDSR algorithm
learns the representations of low and high resolution images
in a hierarchical manner along with a transformation between the representations of the two. The results are demonstrated on four databases with test image resolutions ranging from 8 × 8 to 48 × 48. Matching these requires generating synthesized high resolution images with a magnification
factor of 2 to 12. Results computed in terms of both image
quality measure and face recognition performance illustrate
that the proposed algorithm consistently yields good recognition results. Computationally, the proposed algorithm requires less than 1 millisecond for generating a synthesized
high resolution image which further showcases the efficacy
and usability of the algorithm for low resolution face recognition applications.
References
[1] Luxand. https://www.luxand.com. 5
[2] Verilook. http://www.neurotechnology.com/verilook.html. 5
[3] S. Baker and T. Kanade. Hallucinating faces. In IEEE International Conference on Automatic Face and Gesture Recognition, FG ’00, pages 83–, 2000. 2
[4] H. S. Bhatt, R. Singh, M. Vatsa, and N. K. Ratha. Improving cross-resolution face matching using ensemble-based cotransfer learning. IEEE Transactions on Image Processing,
23(12):5654–5669, December 2014. 1, 2, 5, 6
[5] R. Dahl, M. Norouzi, and J. Shlens. Pixel recursive super
resolution. In IEEE International Conference on Computer
Vision, 2017. 2
[6] C. Dong, C. C. Loy, K. He, and X. Tang.
Image
super-resolution using deep convolutional networks. IEEE
Transactions on Pattern Analysis and Machine Intelligence,
38(2):295–307, 2016. 2, 5, 7, 8
[7] C. Dong, C. C. Loy, and X. Tang. Accelerating the superresolution convolutional neural network. In European Conference on Computer Vision, pages 391–407. Springer, 2016.
2, 5, 7, 8
[8] P. J. Flynn, K. W. Bowyer, and P. J. Phillips. Assessment of
time dependency in face recognition: An initial study. In International Conference on Audio-and Video-Based Biometric Person Authentication, pages 44–51, 2003. 6
[9] A. Founds, N. Orlans, G. Whiddon, and C. Watson. NIST
special database 32-multiple encounter dataset II (MEDSII).
National Institute of Standards and Technology, Tech. Rep,
2011. 6
[10] W. Gao, B. Cao, S. Shan, X. Chen, D. Zhou, X. Zhang,
and D. Zhao. The CAS-PEAL large-scale chinese face
database and baseline evaluations. IEEE Transactions on
Systems, Man, and Cybernetics - Part A: Systems and Humans, 38(1):149–161, January 2008. 5, 6
[11] M. Grgic, K. Delac, and S. Grgic. Scface - surveillance cameras face database. Multimedia Tools Application,
51(3):863–879, February 2011. 5, 6
[12] R. Gross, I. Matthews, J. Cohn, T. Kanade, and S. Baker.
Multi-PIE. Image Vision Computing, 28(5):807–813, May
2010. 5
[13] S. Gu, W. Zuo, Q. Xie, D. Meng, X. Feng, and L. Zhang.
Convolutional sparse coding for image super-resolution. In
IEEE International Conference on Computer Vision, December 2015. 2, 5, 7, 8
[14] M. Jian and K. M. Lam. Simultaneous hallucination and
recognition of low-resolution faces based on singular value
decomposition. IEEE Transactions on Circuits and Systems
for Video Technology, 25(11):1761–1772, November 2015.
2
[15] K. I. Kim and Y. Kwon. Single-image super-resolution using
sparse regression and natural image prior. IEEE Transactions
on Pattern Analysis and Machine Intelligence, 32(6):1127–
1133, June 2010. 5, 7, 8
[16] C. Ledig, L. Theis, F. Huszar, J. Caballero, A. Cunningham, A. Acosta, A. Aitken, A. Tejani, J. Totz, Z. Wang, and
W. Shi. Photo-realistic single image super-resolution using
a generative adversarial network. In IEEE Conference on
Computer Vision and Pattern Recognition, 2017. 2
[17] H. Lee, A. Battle, R. Raina, and A. Y. Ng. Efficient sparse
coding algorithms. In Advances in Neural Information Processing Systems, pages 801–808. 2007. 4
[18] A. Mittal, A. K. Moorthy, and A. C. Bovik. No-reference
image quality assessment in the spatial domain. IEEE Transactions on Image Processing, 21(12):4695–4708, 2012. 7,
8
[19] S. P. Mudunuri and S. Biswas. Low resolution face recognition across variations in pose and illumination. IEEE
Transactions on Pattern Analysis and Machine Intelligence,
38(5):1034–1040, 2016. 2
[20] J. Ngiam, Z. Chen, S. A. Bhaskar, P. W. Koh, and A. Y. Ng.
Sparse filtering. In Advances in Neural Information Processing Systems, pages 1125–1133. 2011. 2
[21] T. Peleg and M. Elad. A statistical prediction model based
on sparse representations for single image super-resolution.
IEEE Transactions on Image Processing, 23(6):2569–2582,
June 2014. 2, 5, 7, 8
[22] G. Polatkan, M. Zhou, L. Carin, D. Blei, and I. Daubechies.
A bayesian nonparametric approach to image superresolution. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(2):346–358, 2015. 2
[23] R. Rubinstein, M. Zibulevsky, and M. Elad. Double sparsity:
Learning sparse dictionaries for sparse signal approximation.
IEEE Transactions on Signal Processing, 58(3):1553–1564,
March 2010. 2
[24] S. Tariyal, A. Majumdar, R. Singh, and M. Vatsa. Greedy
deep dictionary learning. CoRR, abs/1602.00203, 2016. 2
[25] J. J. Thiagarajan, K. N. Ramamurthy, and A. Spanias. Multilevel dictionary learning for sparse representation of images.
In 2011 Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE), pages 271–276, 2011. 2
[26] T. Tong, G. Li, X. Liu, and Q. Gao. Image super-resolution
using dense skip connections. In IEEE International Conference on Computer Vision, 2017. 2
[27] P. Viola and M. J. Jones. Robust real-time face detection. International Journal Computer Vision, 57(2):137–154, 2004.
6
[28] N. Wang, D. Tao, X. Gao, X. Li, and J. Li. A comprehensive survey to face hallucination. International journal of
computer vision, 106(1):9–30, 2014. 2
[29] S. Wang, L. Zhang, Y. Liang, and Q. Pan. Semi-coupled dictionary learning with applications to image super-resolution
and photo-sketch synthesis. In IEEE Conference on Computer Vision and Pattern Recognition, pages 2216–2223,
2012. 2
[30] Z. Wang, S. Chang, Y. Yang, D. Liu, and T. S. Huang. Studying very low resolution recognition using deep networks.
In The IEEE Conference on Computer Vision and Pattern
Recognition, June 2016. 1, 2
[31] Z. Wang, Z. Miao, Q. M. Jonathan Wu, Y. Wan, and Z. Tang.
Low-resolution face recognition: a review. The Visual Computer, 30(4):359–386, 2013. 1, 2
[32] J. Yang, J. Wright, T. S. Huang, and Y. Ma. Image superresolution via sparse representation. IEEE Transactions on
Image Processing, 19(11):2861–2873, November 2010. 2, 5,
7, 8
[33] M. C. Yang, C. P. Wei, Y. R. Yeh, and Y. C. F. Wang. Recognition at a long distance: Very low resolution face recognition and hallucination. In International Conference on Biometrics, pages 237–242, May 2015. 2
| 1cs.CV
|
TTP: Tool for Tumor Progression
Johannes G. Reiter1 , Ivana Bozic2,3 , Krishnendu Chatterjee1 , Martin A.
Nowak2,3,4
arXiv:1303.5251v1 [q-bio.PE] 21 Mar 2013
1
IST Austria (Institute of Science and Technology Austria), Klosterneuburg, Austria
2
Program for Evolutionary Dynamics, Harvard University, Cambridge, USA
3
Department of Mathematics, Harvard University, Cambridge, USA
4
Department of Organismic and Evolutionary Biology, Harvard University,
Cambridge, USA
Abstract. In this work we present a flexible tool for tumor progression,
which simulates the evolutionary dynamics of cancer. Tumor progression
implements a multi-type branching process where the key parameters
are the fitness landscape, the mutation rate, and the average time of
cell division. The fitness of a cancer cell depends on the mutations it
has accumulated. The input to our tool could be any fitness landscape,
mutation rate, and cell division time, and the tool produces the growth
dynamics and all relevant statistics.
1
Introduction
Cancer is a genetic disease which is driven by the somatic evolution of cells [1],
where driver mutations for cancer increase the reproductive rate of cells through
different mechanisms, e.g. evading growth suppressors, sustaining proliferative
signaling, or resisting cell death [2]. Tumors are initiated by some genetic event
which increases the reproductive rate of previously normal cells. The evolution
of cancer (malignant tumor) is a multi-step process where cells need to receive
several mutations subsequently [3]. This phase of tumor progression is characterized by the uncontrolled growth of cells [2,4]. The requirement to accumulate
multiple mutations over time explains the increased risk of cancer with age.
There are several mathematical models to explain tumor progression and the
age incidence of cancer [5,6,7]. The models have also provided quantitative insights in the evolution of resistance to cancer therapy [8]. The models for tumor
progression are multi-type branching processes which represent an exponentially
growing heterogeneous population of cells, where the key parameters for the process are: (i) the fitness landscape of the cells (which determine the reproductive
rate), (ii) the mutation rate (which determines the accumulation of driver mutations), and (iii) the average cell division time (or the generation time for new
cells). The fitness landscapes allow the analysis of the effects of interdependent
(driver) mutations on the evolution of cancer [9].
In this work, we present a very flexible tool (namely, TTP, tool for tumor
progression) to study the dynamics of tumor progression. The input to our tool
could be any fitness landscape, mutation rate, and cell division time, and the tool
generates the growth dynamics and all relevant statistics (such as the expected
tumor detection time, or the expected appearance time of surviving mutants,
etc). Our stochastic computer simulation is an efficient simulation of a multitype branching process under all possible fitness landscapes, driver mutation
rates, and cell division times.
Our tool provides a quantitative framework to study the dynamics of tumor
progression in different stages of tumor growth. Currently, the data to understand the effects of complex fitness landscapes can only be obtained from patients
or animals suffering the disease. With our tool, playing with the parameters,
once the real-world data is reproduced, the computer simulations can provide
many simulation examples that would aid to understand these complex effects.
Moreover, once the correct mathematical models for specific types of cancer are
identified where the simulations match the real-world data, verification tools for
probabilistic systems can be used to further analyze and understand the tumor
progression process (such an approach has been followed in [10] for the verification of biological models). In this direction, results of specific fitness landscapes
of our tool have already been used in a biological application paper [11]. While
we present our tool for the discrete-time process (which provides a good approximation of the continuous-time process), results of our tool for the special case of
a uniform fitness landscape in the continuous-time process have also been shown
to have excellent agreement with the real-world data for the time to treatment
failure for colorectal cancer [8].
2
Model
Tumor progression is modeled as a discrete-time branching process (GaltonWatson process [12]). At each time step, a cell can either divide or die. The
phenotype i of a cancerous cell determines its division probability bi and is
encoded as a bit string of length four (i.e. {0, 1}4 ). The death probability di
follows from bi as di = 1 − bi . If a cell divides, one of the two daughter cells can
receive an additional mutation (i.e., a bit flips from wildtype 0 to the mutated
type 1) with probability u in one of the wildtype positions (e.g., cells of phenotype
1010 can receive an additional mutation only at positions two and four; cells
of phenotype 1111 can not receive any additional mutations). The branching
process is initiated by a single cell of phenotype i = 0000 (resident cell). The
resident cells are wildtype at all four positions and have a strictly positive growth
rate (i.e., b0000 − d0000 > 0).
Fitness landscapes. Our tool provides two predefined fitness landscapes for
driver mutations in tumor progression: (1) Multiplicative Fitness Landscape
(Mfl) and (2) Path Fitness Landscape (Pfl). Additionally, the user can also
define its own general fitness landscape (Gfl). A fitness landscape defines the
birth probability bi for all possible phenotypes i. Following the convention of the
standard modeling approaches, we let b0000 =1/2(1 + s0 ) be the birth probability
of the resident cells (i.e., cells of phenotype 0000) [9,11]. The growth coefficient
sj indicates the selective advantage provided by an additional mutation at position j in the phenotype.
Multiplicative fitness landscape. In the Mfl a mutation at position j of the
phenotype i of a cell results in a multiplication of its birth probability by (1+sj ).
Specifically, the birth probability bi of a cell with phenotype i is given by
bi =
4
Y
1
(1 + s0 )
(1 + sbj );
2
j=1
where sbj = 0 if the j-th position of i is 0; otherwise sbj = sj . Hence, each
additional mutation can be weighted differently and provides a predefined effect
(1+s1 ), (1+s2 ), (1+s3 ), or (1+s4 ) on the birth probability of a cell. Additional
mutations can also be costly (or neutral) which can be modeled by a negative sj
(or sj = 0). If s0 = s1 = s2 = s3 = s4 the fitness landscape reduces to the model
studied by Bozic et al. [9], which we call Emfl (Equal Multiplicative Fitness
Landscape) and is also predefined in our tool.
Path fitness landscape. The Pfl defines a certain path on which additional mutations need to occur to increase the birth probability of a cell. The predefined
path can be 0000 → 1000 → 1100 → 1110 → 1111, and again the growth coefficients sj determine the multiplicative effect of the new mutation on the birth
probability (see appendix for more details). Mutations not on this path are deleterious for the growth rate of a cell and its birth probability is set to 1/2(1 − v).
The parameter v (0 ≤ v ≤ 1) specifies the disadvantage for cells of all phenotypes
which do not belong to the given path.
General fitness landscapes. Our tool allows to input any fitness landscape as
follows: for bi for i ∈ {0, 1}4 , our tool can take as input the value of bi . In this
way, any fitness landscape can be a parameter to the tool.
Density limitation. In some situations, a tumor needs to overcome current
geometric or metabolic constraints (e.g. when the tumor needs to develop blood
vessels to provide enough oxygen and nutrients for further growth [13,11]). Such
growth limitations are modeled by a density limit (carrying capacity) for various phenotypes. Hence, the cells of a phenotype i grow first exponentially but
eventually reach a steady state around a given carrying capacity Ki . Only cells
with another phenotype (additional mutation) can overcome the density limit.
Logistic growth is modeled with variable growth coefficients sej = sj (1 − Xi /Ki )
where Xi is the current number of cells of phenotype i in the tumor. In this
model, initially sej ≈ sj (Xi Ki ), however, if Xi is on the order of Ki , sej
becomes approximately zero (details are given in the appendix).
3
Tool Implementation & Experimental Results
Our tool provides an efficient implementation of a very general tumor progression
model. Essentially, the tool implements the above defined branching processes
to simulate the dynamics of tumor growth and to obtain statistics about the
expected tumor detection time and the appearance of additional driver mutations
during different stages of disease progression. TTP can be downloaded from
here: http://pub.ist.ac.at/ttp.
For an efficient processing of the discrete-time branching process, the stochastic simulation samples from a multinomial distribution for each phenotype at
each time step [9,11]. The sample returns the number of cells which divided
with and without mutation and the number of cells which died in the current
generation (see the appendix for details). From the samples for each phenotype
the program calculates the phenotype distribution in the next generation. Hence,
the program needs to store only the number of cells of each phenotype during
the simulation. This efficient implementation of the branching process allows
the tool to simulate many patients within a second and to obtain very good
statistical results in a reasonable time frame.
a
b
0000
1000
1001
1011
108
106
0001
0011
1010
1011
0010
0101
1100
1110
1010
0100
0110
0111
1111
Number of cells
Number of cells
1010
104
102
1
0
10
20
106
104
102
1
30
tumor detection size
(109 cells ≈ 1cm3 )
108
0
10
Time (years)
20
30
Time (years)
c
d
1010
Probability density
Number of cells
Emfl
108
106
104
102
1
0
10
20
Time (years)
30
0.2
Mfl
Path
0.1
0
0
10
20
30
Time (years)
Fig. 1. Experimental results illustrating the variability of tumor progression. In panels a and b we show examples for two particular simulation runs where the cells grow
according to the Emfl and resident cells (blue) are constrained by a carrying capacity
of K0000 = 106 . In panel c the cells grow according to the Pfl. In panel d we show
statistical results for the probability density of tumor detection when cells grow according to different fitness landscapes. Parameter values: growth coefficients s0 = 0.004,
s1 = 0.006, s2 = 0.008 , s3 = 0.01, s4 = 0.012, and v = 0.01, mutation rate u = 10−6 ,
cell division time T = 3 days, tumor detection size 109 cells.
Modes. The tool can run in the following two modes: individual or statistics.
In the individual mode the tool produces the growth dynamics of one tumor in a
patient (see panels a, b, and c in Fig. 1). Furthermore, both the growth dynamics
and the phenotype distribution of the tumor are depicted graphically. In the
statistics mode the tool produces the probability distribution for the detection
time of the tumor (see panel d in Fig. 1) both graphically and quantitatively.
Additionally, the tool calculates for all phenotypes the appearance times of the
first surviving lineage, the existence probability, and the average number of cells
at detection time.
Features. TTP provides an intuitive graphical user interface to enter the parameters of the model and shows plots of the dynamics during tumor progression,
the phenotype distribution, or the probability density of tumor detection. These
plots can also be saved as files in various image formats. Furthermore, the tool
can create data files (tab-separated values) of the tumor growth history and
the probability distribution of tumor detection for any set of input parameters
(details on the format are given in the appendix).
Input parameters. In both modes, the tool takes the following input parameters: (i) growth coefficients s0 , s1 , s2 , s3 , and s4 (and v in the case of Pfl),
(ii) mutation rate u, (iii) cell generation time T , (iv) fitness landscape (Mfl,
Pfl, Emfl, or Gfl with the birth probability for each phenotype), and optional
(v) density limits for some phenotypes. In the individual mode, additionally, the
user needs to provide the number of generations which have to be simulated. In
the statistics mode, the additional parameters are: the tumor detection size and
the number of patients (tumors which survive the initial stochastic fluctuations)
which have to be simulated.
Experimental results. In panels a, b, and c of Fig. 1 we show examples of the
growth dynamics during tumor progression. Although we used exactly the same
parameters in panels a and b, we observe that the time from tumor initiation
until detection can be very different. In panel d we show the probability density
of tumor detection under various fitness landscapes. Further experimental results
are given in the appendix.
Case studies. Several results of these models have shown excellent agreement
with different aspects of real-world data. In [9], results for the expected tumor
size at detection time using a Emfl fit the reported polyp sizes of the patients
very well. Similarly, using a continuous-time branching process and a uniform
fitness landscape, results for the expected time to the relapse of a tumor after
start of treatment agree thoroughly with the observed times in patients [8].
Future work. In some ongoing work, we also investigate mathematical models
for tumor dynamics occurring during cancer treatment modeled by a continuoustime branching process. Thus an interesting extension of our tool would be to
model treatment as well. Another interesting direction is to model the seeding of
metastasis during tumor progression and hence simulate a “full” patient rather
than the primary tumor alone. Once faithful models of the evolution of cancer
have been identified, verification tools such as PRISM [14] and theoretical results
such as [15] might contribute to the understanding of these processes.
Acknowledgments. This work is supported by the ERC Start grant (279307:
Graph Games), the FWF NFN Grant (No S11407-N23, Rise), the FWF Grant
(No P 23499-N23), a Microsoft Faculty Fellow Award, the Foundational Questions in Evolutionary Biology initiative of the John Templeton Foundation, and
the NSF/NIH joint program in mathematical biology (NIH grant R01GM078986).
References
1. Vogelstein, B., Kinzler, K.W.: Cancer genes and the pathways they control. Nature
medicine 10(8) (2004) 789–799
2. Hanahan, D., Weinberg, R.a.: Hallmarks of cancer: the next generation. Cell
144(5) (2011) 646–674
3. Jones, S., Chen, W.D., Parmigiani, G., Diehl, F., Beerenwinkel, N., Antal, T.,
Traulsen, A., Nowak, M.A., Siegel, C., Velculescu, V.E., Kinzler, K.W., Vogelstein,
B., Willis, J., Markowitz, S.D.: Comparative lesion sequencing provides insights
into tumor evolution. PNAS 105(11) (2008) 4283–4288
4. Nowak, M.A.: Evolutionary Dynamics: Exploring the equations of life. The Belknap Press of Harvard University Press, Cambridge, MA (2006)
5. Komarova, N.L., Sengupta, A., Nowak, M.A.: Mutation-selection networks of cancer initiation: tumor suppressor genes and chromosomal instability. Journal of
Theoretical Biology 223(4) (2003) 433–450
6. Iwasa, Y., Michor, F., Nowak, M.A.: Stochastic tunnels in evolutionary dynamics.
Genetics 166(3) (2004) 1571–1579
7. Nowak, M.A., Michor, F., Komarova, N.L., Iwasa, Y.: Evolutionary dynamics of
tumor suppressor gene inactivation. PNAS 101(29) (2004) 10635–10638
8. Diaz, L.A., Williams, R.T., Wu, J., Kinde, I., Hecht, J.R., Berlin, J., Allen, B.,
Bozic, I., Reiter, J.G., Nowak, M.A., Kinzler, K.W., Oliner, K.S., Vogelstein, B.:
The molecular evolution of acquired resistance to targeted EGFR blockade in colorectal cancers. Nature 486(7404) (2012) 537–540
9. Bozic, I., Antal, T., Ohtsuki, H., Carter, H., Kim, D., Chen, S., Karchin, R.,
Kinzler, K.W., Vogelstein, B., Nowak, M.A.: Accumulation of driver and passenger
mutations during tumor progression. PNAS 107(43) (2010) 18545–18550
10. Sadot, A., Fisher, J., Barak, D., Admanit, Y., Stern, M., Hubbard, E., Harel, D.:
Toward verified biological models. Computational Biology and Bioinformatics,
IEEE/ACM Transactions on 5(2) (2008) 223–234
11. Reiter, J.G., Bozic, I., Allen, B., Chatterjee, K., Nowak, M.A.: The effect of one
additional driver mutation on tumor progression. Evolutionary Applications 6(1)
(2012) 34–45
12. Haccou, P., Jagers, P., Vatutin, V.A.: Branching Processes: Variation, Growth,
and Extinction of Populations. Cambridge University Press (2005)
13. Kerbel, R.S.: Tumor angiogenesis: past, present and the near future. Carcinogenesis
21(3) (March 2000) 505–15
14. Hinton, A., Kwiatkowska, M.Z., Norman, G., Parker, D.: Prism: A tool for automatic verification of probabilistic systems. In: TACAS. (2006) 441–444
15. Etessami, K., Stewart, A., Yannakakis, M.: Polynomial time algorithms for multitype branching processesand stochastic context-free grammars. In: STOC. (2012)
579–588
A
Appendix: Details of the Tool
TTP is available for download at http://pub.ist.ac.at/ttp. The tool is implemented in Java and runs on all operating systems which run a Java Virtual
Machine (JVM) of version 1.7 or above (www.java.com/getjava). All the necessary libraries are included in the jar-file.
A.1
Tool Features
Our tool supports various features in two running modes.
In the individual mode, TTP simulates the tumor growth dynamics for a
given number of generations. Plots of the growth dynamics over time and the
current phenotype distribution are produced simultaneously. (Both plots can be
saved in a PNG-file or SVG-file.) The full growth history for all cell types can
also be stored in a data-file (format is described in section A.2).
In the statistics mode, TTP simulates the given number of patients with
the same parameters and simultaneously shows the probability density of tumor
detection for a given detection size (109 cells correspond to a tumor volume of
approximately 1cm3 ). The average tumor detection time and the average fraction
of resident cells at detection are also shown during the simulations. After all
patients have been simulated, the existence probability at detection, the average
number of cells, and the average appearance year of the first surviving cell for
all phenotypes are calculated and shown in a new window. In addition the tool
shows the number of detected and died tumors per year in a separate window.
All these data is stored in a data-file (format is described in section A.2).
A.2
Installation and Implementation Details
TTP is written in Java and makes use of several other libraries. The tool requires
the Java Runtime Environment (JRE) of version 1.7 or above. To start TTP
double-click on ttp.jar or on the command line type: java -jar ttp.jar.
(Make sure that you have the permission to execute ttp.jar. On Mac OS invoking the tool from the command line can overcome the security restrictions.)
The tool is composed of the following components: the model implementation,
the statistics thread, the graphical user interface, and the plot generator.
Model implementation. The core component of the tool is the efficient implementation of the discrete-time branching process. Following Bozic et al. [9],
the number of cells Xi of phenotype i in the next generation (t + 1) is calculated
by sampling from the multinomial distribution
Prob[(Y1 , Y2 , Y3 ) = (y1 , y2 , y3 )] =
where y1 + y2 + y3 = Xi (t), y3 =
P
k
Xi (t)!
[bi (1 − u)y1 dyi 2 (bi u)y3 ]
y1 !y2 !y3 !
(1)
Mik , and
Xi (t + 1) = Xi (t) + Y1 − Y2 +
X
k
Mki .
(2)
The number of cells which give birth to an identical daughter cell is denoted
by Y1 , the number of cells which die is denoted by Y2 . The number of cells
which divide with an additional mutation is given by Y3 and the number of
cells mutated from phenotype k to i is given by Mki . In general, one can define
a mutation matrix to encode the probabilities mki that a cell of phenotype
k mutates to a cell of phenotype i. In our case this matrix is defined by the
sequential accumulation of mutations. A cell of some phenotype can receive an
additional mutation only on the positions in its bit-string encoding which are
wildtype (i.e. only bit flips from 0 to 1 are allowed). Mutations on all allowed
positions are equally likely. Back mutations are not considered.
Fitness landscapes. Our tool supports four fitness landscapes for additional driver
and passenger mutations: (i) Mfl, (ii) Emfl, (iii) Pfl, and (iv) Gfl. In principal, driver mutations increase the birth rate of a cell whereas passenger mutations
have no effect on the cell’s birth rate [9]. In the tables A1 and A2 we present
the complete definition of the Mfl and the Pfl, respectively. (The definition of
Emfl and Gfl have been given in Section 2.)
Table A1. Multiplicative Fitness Landscape.
Additional mutations
0
1
2
3
4
Phenotype
Birth probability
1/2(1 + s )
0000
0
1/2(1 + s )(1 + s )
1000
0
1
1/2(1 + s )(1 + s )
0100
0
2
1/2(1 + s )(1 + s )
0010
0
3
1/2(1 + s )(1 + s )
0001
0
4
1/2(1 + s )(1 + s )(1 + s )
1100
0
1
2
1/2(1 + s )(1 + s )(1 + s )
1010
0
1
3
1/2(1 + s )(1 + s )(1 + s )
1001
0
1
4
1/2(1 + s )(1 + s )(1 + s )
0110
0
2
3
1/2(1 + s )(1 + s )(1 + s )
0101
0
2
4
1/2(1 + s )(1 + s )(1 + s )
0011
0
3
4
1/2(1 + s )(1 + s )(1 + s )(1 + s )
1110
0
1
2
3
1/2(1 + s )(1 + s )(1 + s )(1 + s )
1101
0
1
2
4
1/2(1 + s )(1 + s )(1 + s )(1 + s )
1011
0
1
3
4
1/2(1 + s )(1 + s )(1 + s )(1 + s )
0111
0
1
3
4
1/2(1 + s)(1 + s )(1 + s )(1 + s )(1 + s )
1111
1
2
3
4
Density limit. Our tool allows a separate carrying capacity Ki for each phenotype i. When the Gfl is used, in the beginning of the simulation, the growth
coefficients si are calculated from the given bi for all phenotypes i ∈ {0, 1}4 since
the density limiting effects are based on the values for s˜i . As a technical detail,
for sizes Xi for which the birth probability bi would fall below 0 (or for which,
equivalently, s˜i would fall below -1), we set bi = 0.
Statistics thread. The statistics thread handles the simulation of many identical branching processes to obtain the statistical results. These simulations run
Table A2. Path Fitness Landscape.
Additional mutations
0
1
2
3
4
Phenotype
Birth probability
1/2(1 + s)
0000
1
1000
/2(1 + s0 )(1 + s1 )
1/2(1 − v)
0100
1/2(1 − v)
0010
1/2(1 − v)
0001
1
1100
/2(1 + s0 )(1 + s1 )(1 + s2 )
1/2(1 − v)
1010
1/2(1 − v)
1001
1/2(1 − v)
0110
1/2(1 − v)
0101
1/2(1 − v)
0011
1/2(1 + s )(1 + s )(1 + s )(1 + s )
1110
0
1
2
3
1/2(1 − v)
1101
1/2(1 − v)
1011
1/2(1 − v)
0111
1/2(1 + s )(1 + s )(1 + s )(1 + s )(1 + s )
1111
0
1
2
3
4
in a separate thread such that the GUI keeps responsive for user requests. After
completing all the necessary simulations a data-file with all relevant results is
automatically generated and stored to the execution directory of the tool.
Graphical user interface. The graphical user interface (GUI) component contains frames and forms required for the functionality of the tool. It also handles
all the user requests and distributes them to the other components. Within the
GUI the plots for the tumor progression dynamics (in individual mode) and for
the probability density of tumor detection (in statistics mode) are displayed.
Multiple screenshots of the GUI are shown in section A.4.
Plot generator. The plot generation is based on the free JFreeChart library
(www.jfree.org). For the generation of the Scalable Vector Graphics (SVG) the
Apache XML Graphics library (http://xmlgraphics.apache.org) is used. An
example for a plot generated by our tool is shown in Figure A2.
Data files. TTP produces various data files which can be used for further
analysis and processing. The data are given as tab-separated values where each
record is one line of the text files. In Listing A1 we show an example of a data file
generated in the statistics mode. Average results are given as comments which
start with a hash. In the individual mode the data file contains the number of
cells Xi for each phenotype i in all generations.
Fig. A2. Example for a generated plot of the tumor growth dynamics.
Listing A1. Generated data file in the statistics mode.
# Used f i t n e s s l a n d s c a p e : M u l t i p l i c a t i v e
# Growth c o e f f i c i e n t s : s0 =0.004 , s1 =0.006 , s2 =0.008 , s3 =0.01 , s4 =0.012
# Mutation r a t e : 1E−6
# Generation time ( days ) : 3 . 0
# S i m u l a t i o n f o r 10000 p a t i e n t s .
# Bin s i z e i s 20 g e n e r a t i o n s .
died
cumul died
generation
detected
cumul det
0
0
0
0.046003
0.920069
20
0
0
0.001938
0.958826
40
0
0
0.000705
0.972923
60
0
0
0.000358
0.98009
80
0
0
0.000227
0.984622
100
0
0
0.000149
0.987594
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5980
0
1
0
1
6000
0
1
0
1
# 0.7981% ( a b s : 10000) have been d e t e c t e d w i t h i n a t most
#
20000 g e n e r a t i o n s .
# 99.2% ( a b s : 1243006) tumors went e x t i n c t .
# Average y e a r o f d e t e c t i o n : 2 2 . 0 4
# Mutant appearance t i m e s :
# Mutant 0000 appeared i n a v e r a g e i n g e n e r a t i o n : 0 ( y e a r : 0 ) ,
#
e x i s t a n c e p r o b a b i l i t y : 100%,
#
a v e r a g e number o f c e l l s : 3267013.74
# Mutant 0001 appeared i n a v e r a g e i n g e n e r a t i o n : 1540 ( y e a r : 1 2 . 6 6 ) ,
#
e x i s t a n c e p r o b a b i l i t y : 100%,
#
a v e r a g e number o f c e l l s : 1925660.02
.
.
.
.
.
.
.
.
.
.
.
.
# 1253006 runs have been performed t o c r e a t e 10000 p a t i e n t s .
A.3
User Manual
TTP is invoked by a double-click on ttp.jar or by the command java -jar
ttp.jar. After the tool has started, the GUI can be used for all operations (see
Figure A3 for a screenshot of the GUI).
Input parameters. In the control panel the tool takes all the main parameters
for tumor progression: the fitness landscape, the mutation rate, and the cell
division time. If one of the prespecified fitness landscapes (Mfl, Pfl, or Emfl)
is used, the relevant growth coefficients have to be defined. If the general fitness
landscape is used, a pop-up window appears after the selection of the Gfl and
the specific birth probabilities for all the phenotypes can be defined. To add
density limits for specific phenotypes, a pop-up window appears after “density
limit” has been checked. For each phenotype a different density limit can be
given (−1 indicates that there is no limitation on this phenotype). To obtain
statistical results, the number of patients (i.e. the number of tumors with a
surviving lineage) and the tumor detection size (i.e. the number of cells when a
tumor can be detected) need to be provided.
Modes. After all the parameter values have been specified, the tool can either
run in the individual or the statistics mode. To simulate the growth dynamics
of a single tumor, click on “New simulation” and the tool runs in the individual
mode. Then any number of cell generations can be simulated until the tumor
consists of more than 1015 cells.
The statistics mode can be started by clicking on “Obtain statistics”. The
tool simulates the given number of tumors until they reach the detection size
and calculates all relevant statistics.
Output. In the individual mode, the tool generates plots for the growth dynamics and the phenotype distribution during the simulation. Furthermore, the
entire tumor growth dynamics for each phenotype can be stored as a data file
and the plots can be saved as PNG and SVG files (plots are stored to the folder
“charts” in the execution directory of the tool).
In the statistics mode, the tool generates the plot for the probability density
of tumor detection. Statistics about the appearance time of the mutants and the
detection and extinction year are shown in separate windows (see Figures A4
and A6 for screenshots). All the generated statistics are automatically saved to
a data file (see Listing A1).
A.4
Experimental Results & Screenshots
In this section we present some additional experimental results and multiple
screenshots of the tool. In Table A3 we compare the probability of tumor detection for the fitness landscapes Emfl, Mfl, and Pfl. In average our tool needs
approximately 90ms to simulate a tumor with 109 cells (on a dual core 2.67GHz
processor).
Table A3. Cumulative probability of tumor detection for different fitness landscapes.
Results are averages over 105 runs. Parameter values: growth coefficients s0 = 0.004,
s1 = 0.006, s2 = 0.008, s3 = 0.01, s4 = 0.012, v = 0.006, mutation rate u = 10−6 ,
detection size M = 109 .
generation
2000
2200
2400
2600
2800
3000
3200
3400
3600
3800
4000
4200
4400
4600
4800
5000
Emfl
0.0
0.0
0.0
0.004
0.068
0.289
0.567
0.774
0.892
0.949
0.977
0.989
0.995
0.998
0.999
1.0
Mfl
0.001
0.038
0.212
0.491
0.724
0.865
0.937
0.971
0.987
0.994
0.998
0.999
1.0
1.0
1.0
1.0
Pfl
0.0
0.0
0.006
0.075
0.288
0.559
0.766
0.887
0.947
0.976
0.989
0.995
0.998
0.999
1.0
1.0
Fig. A3. Graphical User Interface of TTP in the individual mode.
Fig. A4. Graphical User Interface of TTP in the statistics mode.
Fig. A5. Statistical results of the average detection and extinction year.
Fig. A6. Statistical results of the average appearance year, the existence probability
and the number of cells at detection time.
| 5cs.CE
|
COMPOSITION OF GRAY ISOMETRIES
SIERRA MARIE M. LAURESTA and Virgilio P. Sison
Institute of Mathematical Sciences and Physics
University of the Philippines Los Baños
College, Laguna 4031
E-mail: [email protected], [email protected]
Abstract
In coding theory, Gray isometries are usually defined as mappings
between finite Frobenius rings, which include the ring ℤ𝑚 of integers
modulo m and the finite fields. In this paper, we derive an isometric
mapping from ℤ8 to ℤ24 from the composition of the Gray isometries on
ℤ8 and on ℤ24 . The image under this composition of a ℤ8 -linear block
code of length n with homogeneous distance d is a (not necessarily
linear) quaternary block code of length 2n with Lee distance d.
Introduction
A (block) code of length n over a ring R is a non-empty set of n-tuples over R called
codewords. It is said to be linear of rate-k/n if it is a (not necessarily free) submodule, and is
completely determined by a 𝑘 × 𝑛 matrix G over R.
Codes over rings gained more attention when Hammons, Kumar, Calderbank, Sloane and Solé
[1] discovered in 1994 that certain very good but peculiar nonlinear codes over the binary field
𝔽2 can be viewed as images of linear codes over the integer ring ℤ4 under the so-called Gray
map 𝜙 from ℤ4 onto 𝔽22 defined by 0 ⟼ (0,0), 1 ⟼ (0,1), 2 ⟼ (1,1) and 3 ⟼ (1,0). The
map 𝜙 is an isometry or is weight-preserving, that is, the Lee weight of an element of ℤ4 is
equal to the Hamming weight of its image under 𝜙. The Hamming weight of a binary vector
is the number of nonzero components in the vector.
Carlet [2] introduced a generalization of 𝜙 to the ring ℤ2𝑘 of integers modulo 2𝑘 . Let k be a
positive integer, u an element of ℤ2𝑘 and 𝑢 = ∑𝑘𝑖=1 2𝑖−1 𝑢𝑖 its 2-adic expansion, where 𝑢𝑖 ∈ 𝔽2 .
The image of u by the generalized Gray map is the boolean function on 𝔽𝑘−1
given by
2
(𝑦1 , 𝑦2 , … , 𝑦𝑘−1 ) ⟶ 𝑢𝑘 + ∑𝑘−1
1=1 𝑢𝑖 𝑦𝑖 .
We identify this boolean function with a binary word of length 2𝑘−1 by simply listing its values.
𝑘−1
Thus the generalized Gray map is seen as a nonsurjective mapping from ℤ2𝑘 to 𝔽22 , and
its image is the Reed-Muller code of order 1, RM(1, k-1). The generalized Gray map is naturally
extended to the n-tuples.
When k = 2, RM(1,1) is the set of boolean functions on 𝔽2 , and we obtain the usual Gray map 𝜙
from ℤ4 to 𝔽22 . When k = 3, the generalized Gray map (which we denote by 𝜓) takes ℤ8 onto
RM(1,2) which is the set of boolean functions on 𝔽22 that give all the binary words in 𝔽42 with
even Hamming weight.
1
Methodology
We extend the usual Gray isometry 𝜙 as a bijective mapping from ℤ24 onto 𝔽42 . Table 1 shows
the binary image of an element of ℤ24 under 𝜙. Clearly the Lee weight 𝑤𝐿 of an element of ℤ24 is
equal to the Hamming weight 𝑤𝐻 of its binary image.
(𝑥, 𝑦) ∈ ℤ24
(0,0)
(0,1)
(0,2)
(0,3)
(1,0)
(1,1)
(1,2)
(1,3)
(2,0)
(2,1)
(2,2)
(2,3)
(3,0)
(3,1)
(3,2)
(3,3)
𝑤𝐿 (𝑥, 𝑦)
0
1
2
1
1
2
3
2
2
3
4
3
1
2
3
2
𝜙(𝑥, 𝑦) ∈ 𝔽42
(0,0,0,0)
(0,0,0,1)
(0,0,1,1)
(0,0,1,0)
(0,1,0,0)
(0,1,0,1)
(0,1,1,1)
(0,1,1,0)
(1,1,0,0)
(1,1,0,1)
(1,1,1,1)
(1,1,1,0)
(1,0,0,0)
(1,0,0,1)
(1,0,1,1)
(1,0,1,0)
𝑤𝐻 (𝜙(𝑥, 𝑦))
0
1
2
1
1
2
3
2
2
3
4
3
1
2
3
2
Table 1: The isometric Gray map 𝝓 on ℤ𝟐𝟒
We restrict 𝜙 −1 as a mapping from RM(1,2) to ℤ24 as follows:
𝜙 −1 (𝑥)
(0,0)
(1,1)
(0,2)
(1,3)
(2,2)
(3,3)
(2,0)
(3,1)
𝑥 ∈ 𝑅𝑀(1,2)
(0,0,0,0)
(0,1,0,1)
(0,0,1,1)
(0,1,1,0)
(1,1,1,1)
(1,0,1,0)
(1,1,0,0)
(1,0,0,1)
Table 2: The map 𝝓−𝟏 on 𝑹𝑴(𝟏, 𝟐)
For ℤ8 we apply the following homogeneous weight [3] and extend it coordinatewisely.
0
𝑤ℎ𝑜𝑚 (𝑥) = {4
2
𝑖𝑓 𝑥 = 0
𝑖𝑓 𝑥 = 4
𝑒𝑙𝑠𝑒
Table 3 shows the image of an element of ℤ8 in RM(1,2) under the generalized Gray map 𝜓. If
𝑢 ∈ ℤ8 has the 2-adic expansion 𝑢 = 𝑢1 + 2𝑢2 + 4𝑢3 , then 𝜓(𝑢) = 𝜓(𝑢1 + 2𝑢2 + 4𝑢3 ) =
(𝑢3 , 𝑢3 + 𝑢1 , 𝑢3 + 𝑢2 , 𝑢3 + 𝑢1 + 𝑢2 ). The mapping 𝜓 is weight preserving such that the
homogeneous weight of an element of ℤ8 is equal to the Hamming weight of its image in
RM(1,2).
2
𝑢 ∈ ℤ8
0
1
2
3
4
5
6
7
𝑤ℎ𝑜𝑚 (𝑢)
0
2
2
2
4
2
2
2
𝜓(𝑢) ∈ 𝑅𝑀(1,2)
(0,0,0,0)
(0,1,0,1)
(0,0,1,1)
(0,1,1,0)
(1,1,1,1)
(1,0,1,0)
(1,1,0,0)
(1,0,0,1)
𝑤𝐻 (𝜓(𝑢))
0
2
2
2
4
2
2
2
Table 3: The isometric Gray map 𝝍 on ℤ𝟖
Results and Discussion
We take the composition 𝜙 −1 𝜓: ℤ8 ⟶ ℤ24 . Table 4 shows the quaternary image of an element of
ℤ8 under 𝜙 −1 𝜓. If 𝑢 = 𝑢1 + 2𝑢2 + 4𝑢3 ∈ ℤ8 , then 𝜙 −1 𝜓(𝑢) = 𝜙 −1 𝜓(𝑢1 + 2𝑢2 + 4𝑢3 ) = (𝑢1 +
2𝑢3 , 𝑢1 + 2𝑢3 + 2𝑢2 ).
𝑢 ∈ ℤ8
0
1
2
3
4
5
6
7
𝜙 −1 𝜓(𝑢)
(0,0)
(1,1)
(0,2)
(1,3)
(2,2)
(3,3)
(2,0)
(3,1)
𝑤ℎ𝑜𝑚 (𝑢)
0
2
2
2
4
2
2
2
𝑤𝐿 (𝜙 −1 𝜓(𝑢))
0
2
2
2
4
2
2
2
Table 4: The isometric map 𝝓−𝟏 𝝍: ℤ𝟖 → ℤ𝟐𝟒
The mapping 𝜙 −1 𝜓 is weight preserving such that the homogeneous weight of an element of
ℤ8 is equal to the Lee weight of its image in ℤ24 . It is extended naturally to the n-tuples.
Let C be a linear block code of length n over ℤ8 with minimum homogeneous distance d. The
−1
image of C under 𝜙 −1 𝜓 is the set 𝜙 −1 𝜓(𝐶) = {𝑤 ∈ ℤ2𝑛
4 | 𝑤 = 𝜙 𝜓(𝑐) for 𝑐 ∈ 𝐶}.
Proposition. The set 𝜙 −1 𝜓(𝐶) has the following properties:
i.
ii.
iii.
𝜙 −1 𝜓(𝐶) is a (not necessarily linear) block code of length 2n over ℤ4 .
The Lee distance of 𝜙 −1 𝜓(𝐶) is equal to d.
Every codeword of 𝜙 −1 𝜓(𝐶) has even Lee weight.
To illustrate non-linearity, consider the rate-2/3 linear block code over ℤ8 generated by the
matrix
1 2 7
𝐺=(
)
0 2 4
This code has 32 codewords, minimum Hamming distance 1, and minimum homogeneous
distance 4. The codewords (6,6,6) and (7,6,1) generated by the information words (6,1) and
(7,4), respectively, have quaternary images (2,0,2,0,2,0) and (3,1,2,0,1,1) whose
superimposition is not in the code. This example also shows that 𝜙 −1 𝜓 is not an additive
homomorphism.
3
Conclusion and Recommedation
This paper offers a simple way to define isometric mappings from ℤ2𝑘 to ℤ2𝑟 , in general for
𝑟 < 𝑘, and to take the ℤ2𝑟 -image code of a ℤ2𝑘 -linear block code. Sufficient and necessary
conditions for the linearity of the ℤ2𝑟 -image can be determined. Extension of this construction to
galois rings is inevitable.
References
[1] R. Hammons, Jr., P. V. Kumar, A. R. Calderbank, N. J. A. Sloane, and P. Solé, “The ℤ4 linearity of Kerdock, Preparata, Goethals and related codes,” IEEE Trans. Inform. Theory,
vol. 40, no. 2, pp. 301 - 319, January 1994.
[2] C. Carlet, “ℤ2𝑘 -linear codes,” IEEE Trans. Inform. Theory, vol. 44, no. 4, pp. 1543-1546, July
1998.
[3] M. Greferath and S.E. Schmidt, “Gray isometries for finite chain rings and a nonlinear
ternary (36,312,15) code,” IEEE Trans. Inform.Theory, vol. 45, no. 7, pp. 2522--2524,
November 2001.
4
| 7cs.IT
|
Video Enhancement with Task-Oriented Flow
Tianfan Xue†
Google Research
Baian Chen
MIT CSAIL
Jiajun Wu
MIT CSAIL
Donglai Wei
Harvard University
arXiv:1711.09078v1 [cs.CV] 24 Nov 2017
William T. Freeman
MIT CSAIL, Google Research
Frame interpolation
t=3
t=2
t=1
(I-a) Input Low-frame-rate
Videos
(I-b) Epic Flow
(I-c) Interp. by Epic Flow
(I-d) Task-oriented Flow
(I-e) Interp. by Task-oriented Flow
Video denoising
t=7
t=4
t=1
(II-a) Input Noisy Videos
(II-b) Epic Flow
(II-c) Denoise by Epic Flow
(II-d) Task-oriented Flow
(II-e) Denoise by Task-oriented Flow
Figure 1: Many video processing tasks, e.g., temporal frame-interpolation (top) and video denoising (bottom), rely on flow
estimation. In many cases, however, precise optical flow estimation is intractable and could be suboptimal for a specific
task. For example, although EpicFlow [28] predicts precise movement of objects (I-b, the flow field aligns well with object
boundaries), small errors in estimated flow fields result in obvious artifacts in interpolated frames, like the obscure fingers in
(I-c). With the task-oriented flow proposed in this work (I-d), those interpolation artifacts disappear as in (I-e). Similarly, in
video denoising, our task-oriented flow (II-d) deviates from EpicFlow (II-b), but leads to a cleaner output frame (II-e). Flow
visualization is based on the color wheel shown on the corner of (I-b).
Abstract
Many video processing algorithms rely on optical flow to
register different frames within a sequence. However, a precise estimation of optical flow is often neither tractable nor
optimal for a particular task. In this paper, we propose taskoriented flow (TOFlow), a flow representation tailored for
specific video processing tasks. We design a neural network
with a motion estimation component and a video processing component. These two parts can be jointly trained in a
self-supervised manner to facilitate learning of the proposed
TOFlow. We demonstrate that TOFlow outperforms the traditional optical flow on three different video processing tasks:
frame interpolation, video denoising/deblocking, and video
super-resolution. We also introduce Vimeo-90K, a large-scale,
high-quality video dataset for video processing to better evaluate the proposed algorithm.
† This
work was done when Tianfan Xue was a student in MIT CSAIL.
1. Introduction
Motion estimation is a key component in video processing
tasks like temporal frame interpolation, video denoising, and
video super-resolution. Most motion-based video processing
algorithms use a two-step approach [16, 2, 15]. They first estimate motion between input frames and register them based on
estimated flow fields, and then process the registered frames
to generate the final output. Therefore, the accuracy of flow
estimation greatly affects the performance of these two-step
approaches.
However, precise flow estimation can be challenging and
slow. The brightness constancy assumption, which many motion estimation algorithms rely on, may fail due to variations
in lighting or pose and the presence of motion blur or occlusion. Also, many motion estimation algorithms involve
solving a large-scale optimization problem, making it inefficient for real-time applications. For example, the widely
used EpicFlow algorithm [28] takes about 16 seconds for each
frame of a million pixels.
Moreover, most motion estimation algorithms aim to solve
for a motion field that matches the actual objects in motion.
However, this may not be the best motion representation for
video processing. Figure 1 shows an example in frame interpolation. Even though EpicFlow calculates a precise motion
field (I-b) whose boundary is well-aligned with the fingers
in the image (I-c), the interpolated frame (I-c) based on it
contains obvious artifacts due to occlusion. In contrast, using
the task-oriented flow introduced in this work, the model generates better interpolation result (I-e), though the estimated
motion field (I-d) differs from optical flow in magnitude and
does not align with object boundaries. Similarly, in video
denoising, although EpicFlow shown in (II-b) matches the
boundary of the girl’s hair, the frame denoised with EpicFlow
is much noisier than the one with our task-oriented flow (II-e).
This suggests that for specific video processing tasks, there
exist flow representations that do not match the actual object
movement, but lead to better results.
In this paper, we propose to learn task-oriented flow
(TOFlow) by performing motion analysis and video processing jointly in an end-to-end trainable convolutional network.
Our network consists of three modules: the first one estimates
the motion fields between input frames; the second one registers all input frames based on estimated motion fields; and
the third one generates target output from registered frames.
These three modules are jointly trained to minimize the loss
between output frames and ground truth. Unlike other flow
estimation networks [27, 6], the flow estimation module in our
framework predicts a motion field tailored to a specific task,
e.g., frame interpolation or video denoising, as it is trained together with the corresponding video processing module. The
proposed TOFlow has several advantages: first, it significantly
outperforms optical flow algorithms on three video processing
tasks; second, it is highly efficient, taking only 15.8ms for an
input image with a resolution of 448×256; third, it can be
self-supervised, learning from unlabeled video frames.
To evaluate TOFlow, we build a large-scale, high-quality
video dataset for video processing. Most existing large video
datasets, like Youtube-8M [1], are designed for high-level
vision tasks like event classification. The videos are often of
low resolutions with significant motion blurs, making them
less useful for video processing. To evaluate video processing algorithms systematically, we introduce a new dataset,
Vimeo-90K, which consists of 89,800 high-quality video clips
(i.e., 720p or higher) downloaded from Vimeo∗ . We build
three benchmarks from these videos for interpolation, denoising/deblocking, and super-resolution, respectively. We hope
this dataset will contribute to future research in learning-based
video processing through its high-quality videos and diverse
examples.
The contributions of this paper are three-fold. First, we
propose TOFlow, a flow representation tailored to specific
∗ https://vimeo.com
video processing tasks, significantly outperforming standard
optical flow. Second, we propose a self-supervised and endto-end trainable video processing framework that can handle
various tasks, including frame interpolation, video denoising,
and video super-resolution. Third, we also build a large-scale,
high-quality video dataset, Vimeo-90K, for video processing.
2. Related Work
Optical Flow Estimation Dated back to Horn and
Schunck [9], most optical flow algorithms have sought to
minimize hand-crafted energy terms for image alignment and
flow smoothness [22, 3, 32]. Current state-of-the-art methods
like EpicFlow [28] and DC Flow [34] further exploit image
boundary and segment cues to improve the flow interpolation
among sparse matches. Recently, end-to-end deep learning
methods were proposed for faster inference, some trained
with supervision [6, 27], and some without [35]. In this work,
we used the same flow network as SpyNet [27]. But instead
of training it to minimize the flow estimation error, as SpyNet
does, we train it jointly with a video processing network to
learn a flow representation that is the best for a specific task.
Low-level Video Processing We focus on three video processing tasks: frame interpolation, video denoising, and video
super-resolution. Most existing algorithms in these areas
explicitly estimate the dense motion among input frames,
and then reconstruct the reference frame according to image
formation models for frame interpolation [2, 33, 36], video
super-resolution [17], and denoising [15, 30, 20]. We refer
readers to survey articles [23, 8] for comprehensive literature
reviews on these flourishing research topics.
Deep Learning for Video Enhancement Inspired by the
success of deep learning, researchers have directly modeled
video enhancement tasks as regression problems without representing motions, and have designed deep networks for frame
interpolation [21, 24] and super-resolution [14, 10, 12, 29].
Recently, with differentiable image sampling layers in
deep learning [11], motion information can be incorporated
into networks and trained jointly with the video enhancement
task. Such approaches have been applied to video interpolation [18], light-field video interpolation [31], object novel
view synthesis [37], eye gaze manipulation [7], and superresolution [5, 29]. Although many of these algorithms also
jointly train the flow estimation with the rest parts of network,
there is no systematical study on the advantage of joint training. In this paper, we illustrate the advantage of the trained
task-oriented flow through toy examples, and also demonstrate its superiority over general flow algorithm on various
real-world tasks. We also present a general framework that
can easily adapt to different video processing tasks.
3. Tasks
In the paper, we explore three video enhancement tasks:
frame interpolation, video denoising/deblocking, and video
super-resolution.
Temporal Frame Interpolation Given a low frame rate
video, a temporal frame interpolation algorithm generates
a high frame rate video by synthesizing additional frames
between two temporally neighboring frames. Specifically, let
I1 and I3 be two consecutive frames in an input video, the
task is to estimate the missing middle frame I2 . Temporal
frame interpolation doubles the video frame rate, and can be
recursively applied for even higher frame rates.
Video Denoising/Deblocking Given a degraded video with
artifacts from either the sensor or compression, video denoising/deblocking aims to remove the noise or compression artifacts to recover the original video. This is typically done by
aggregating information from neighboring frames. Specifically, Let I1 , I2 , ..., IN be N-consecutive frames in an input
video, the task of video denoising is to estimate the middle
∗
frame Iref
given degraded frames I1 , I2 , ..., IN as input. For
the ease of description, in the rest of paper, we simply call
both tasks as video denoising.
Video Super-Resolution (SR) Similar to video denoising,
given N consecutive low-resolution frames as input, the task
of video super-resolution is to recover the high-resolution
middle frame. In this work, we first upsample all the input
frames to the same resolution of the output using bicubic
interpolation, and our algorithm only needs to recover the
high-frequency component in the output image.
4. Task-Oriented Flow for Video Processing
Most motion-based video processing algorithms has two
steps: motion estimation and image processing. For example,
in temporal frame interpolation, most algorithms first estimate
how pixels move between input frames (frame 1 and 3), and
then move pixels to the estimated location in the output frame
(frame 2) [2]. Similarly, in video denoising, algorithms first
register different frames based on estimated motion fields
between them, and then remove noises by aggregating information from registered frames.
In this paper, we propose to use task-oriented flow
(TOFlow) to integrate the two steps. To learn the task-oriented
flow, we design an end-to-end trainable network with three
parts (Figure 3): a flow estimation module that estimates the
movement of pixels between input frames; an image transformation module that warps all the frames to a reference frame;
and a task-specific image processing module that performs
video interpolation, denoising, or super-resolution on registered frames. Because the flow estimation module is jointly
trained with the rest of the network, it learns to predict a flow
field that fits to a particular task.
4.1. Toy Example
Before discussing the details of network structure, we first
start with two synthetic sequences to demonstrate why our
TOFlow can outperform traditional optical flows. The left
Video Denoising
Frame Interpolation
?
Input frames
Input frames
Case I: With Ground Truth Flows
GT flow
Warped by Interpolated
GT flow
2nd frame
Case II: With Task-Oriented Flows
TOFlow
Warped by Interpolated
2nd frame
TOFlow
Case I: With Ground Truth Flows
GT flow
Warped by
TOFlow
Denoised
frame
Case II: With Task-Oriented Flows
TOFlow
Warped by
TOFlow
Denoised
frame
Figure 2: A toy example that demonstrates the effectiveness
of task oriented flow over the traditional optical flow. See
Section 4.1 for details.
of Figure 2 shows an example of frame interpolation, where
a green triangle is moving to the bottom in front of a black
background. If we warp both the first and third frames to the
second, even using the ground truth flow (Case I, left column),
there is an obvious doubling artifact in the warped frames due
to occlusion (Case I, middle column), which is a well-known
problem in the optical flow literature [2]. The final interpolation result based on these two warp frames still contains this
artifact (Case I, right column). In contrast, TOFlow does not
stick to object motion: the background should be static, but
it has non-zero motion (Case II, left column). With TOFlow,
however, there is barely any artifact in the warped frames
(Case II, middle column) and the interpolated frame looks
clean (Case II, right column). The hallucinated background
motion actually helps to reduce the doubling artifacts. This
shows that TOFlow can reduce errors and synthesize frames
better than the ground truth flow.
Similarly, on the right of Figure 2, we show an example of
video denoising. The random small boxes in the input frames
are synthetic noises. If we warp the first and the third frames
to the second using the ground truth flow, the noisy patterns
(random squares) remain, and the denoised frame still contains
some noise (Case I, right column. There are some shadows of
boxes on the bottom). But if we warp these two frames using
TOFlow (Case II, left column), those noisy patterns are also
reduced or eliminated (Case II, middle column), and the final
denoised frame base on them contains almost no noise. This
also shows that TOFlow learns to reduce the noise in input
frames by inpainting them with neighboring pixels, which
Flow Network
Input at
diff. scales
Frame 1
…
SPN
Flow net
…
…
Reference
…
Motion L1
Not used in interp.
Frame T
…
…
Motion L2
…
Motion L4
Image Processing Network for Interpolation (with Mask)
Improc net
Output
frame
Warped frame 𝐼21
Motion 𝑣21
Mask 𝑚21
′
Masked frame 𝐼21
Motion 𝑣23
Mask 𝑚23
′
Masked frame 𝐼23
SPN
Flow net
Input
frames
Motion
fields
Flow Estimation
Warped
input
Transformation
Image Processing
Interpolated
frame 𝐼2
Warped frame 𝐼23
Figure 3: Left: our model using task-oriented flow for video processing. Given an input video, we first calculate the motion
between frames through a task-oriented flo estimation network. We then warp input frames to the reference using spatial
transformer networks, and aggregate the warped frames to generate a high-quality output image. Right top: the detailed
structure of flow estimation network (the orange network on the left). Right bottom: the detailed structure of image processing
network for interpolation (the gray network on the left).
traditional flow cannot do.
Now we discuss the details of each module as follows.
the later modules of the network can transform the first and
the third frames to the second frame for synthesis.
4.2. Flow Estimation Module
4.3. Image Transformation Module
The flow estimation module calculates the motion fields between input frames. For a sequence with N frames (N = 3 for
interpolation and N = 7 for denoising and super-resolution),
we select the middle frame as the reference. The flow estimation module consists of N − 1 flow networks, all of which
have the same structure and share the same set of parameters.
Each flow network (the orange network in Figure 3) takes one
frame from the sequence and the reference frame as input,
and predicts the motion between them.
We use the multi-scale motion estimation framework proposed by [27] to handle the large displacement between
frames. The network structure is shown in the top right subfigure of Figure 3. The input to the network are Gaussian
pyramids of both the reference frame and another frame rather
than the reference. At each scale, a sub-network takes both
frames at that scale and upsampled motion fields from previous prediction as input, and calculates a more accurate motion
fields. We uses 4 sub-networks in a flow network, three of
which are shown Figure 3 (the yellow networks).
There is a small modification for frame interpolation,
where the reference frame (frame 2) is not an input to the
network, but what it should synthesize. To deal with that, the
motion estimation module for interpolation consists of two
flow networks, both taking both the first and third frames as
input, and predict the motion fields from the second frame to
the first and the third respectively. With these motion fields,
Using the predicted motion fields in the previous step, the
image transformation module registers all the input frames
to the reference frame. We use the spatial transformer networks [11] for registration, which synthesizes a new frame
after transformation using bilinear interpolation. One important property of this module is that it can back-propagate the
gradients from the image processing module to the flow estimation module, so we can learn a flow representation that
adapts to different video processing tasks.
4.4. Image Processing Module
We use another convolutional network as the image processing module to generate the final output. For each task,
we use a slightly different architecture. Please refer to our
appendix for details.
Occluded regions in warped frames As mentioned Section 4.1, occlusion often results in doubling artifacts in
the warped frames. To solve this, some interpolation algorithms [18, 24, 25] estimate occlusion masks and only use
pixels that are not occluded in interpolation. Inspired by this,
we also design an optional mask prediction network for frame
interpolation, in addition to the image processing module.
The mask prediction network takes the two estimated motion
fields as input, one from frame 2 to frame 1, and the other
from frame 2 to frame 3 (v21 and v23 in the bottom right of
Figure 3). It predicts two occlusion masks: m21 is the mask
Input 𝐼1
Input 𝐼3
Warp 𝐼1 by Epicflow
Warp 𝐼3 by Epicflow
Warp 𝐼1 by TOFlow
TOFlow interp (no mask)
Warp 𝐼3 by TOFlow TOFlow interp (use mask)
Figure 4: Comparison between Epicflow interpolation [28]
and TOFlow interpolation (both with and without mask).
of the warped frame 2 from frame 1 (I21 ), and m23 is the
mask of the warped frame 2 from frame 3 (I23 ). The invalid
regions in the warped frames (I21 and I23 ) are masked out
by multiplying them with their corresponding masks. The
middle frame is then calculated through another convolutional
neural network with both the warped frames (I21 and I23 ) and
0
0
the masked warped frames (I21
and I23
) as input. Please refer
to our appendix for details of the network structure.
Even without the mask prediction network, our flow estimation is mostly robust to occlusion. As shown in the third
column of Figure 4, the warped frames using TOFlow has little doubling artifacts. Therefore, just from two warped frames
without the learned masks, the network synthesizes a decent
middle frame (the top image of the right most column). The
mask network helps to remove some tiny artifacts, such as
the faint ghost of the bottom thumb circled by white (visible
when zoomed in).
4.5. Training
To accelerate the training procedure, we first pre-train
some modules of the network and then fine-tune all of them
together. Details are described below.
Pre-training the Flow Estimation Network Pre-training
the flow network consists of two steps. First, for all tasks,
we pre-train the motion estimation network on the Sintel
dataset [4], a realistically rendered video dataset with ground
truth optical flow, by minimizing the l1 difference between
estimated optical flow and the ground truth. In the second
step, for video denoising and super-resolution, we fine-tune
it with noisy or blurry input frames to improve its robustness
to these input. For video interpolation, we fine-tune it with
frames I1 and I3 from video triplets as input, minimizing
the l-1 difference between the estimated optical flow and the
ground truth flow V23 (or v21 ). This enables the flow network
to calculate the motion from the unknown frame I2 to frame
I3 given only frames I1 and I3 as input. Empirically we find
that this two-step pre-training can improve the convergence
speed.
Pre-training the Mask Network We also pre-train our occlusion mask estimation network for video interpolation as an
optional component of video processing network before joint
training. Two occlusion masks (m21 and m23 ) are estimated
together with the same network and only optical flow v21 , v23
as input. The network is trained by minimizing the l-1 loss
between the output masks and pre-computed occlusion masks.
Joint Training After pre-training, we train all the modules
jointly by minimizing the l1 loss between recovered frame and
the ground truth, without any supervision on estimated flow
fields. For optimization, we use ADAM [13] with a weight
decay of 10−4 . We run 15 epochs with batch size 1 for all
tasks. The learning rate for denoising/deblocking and superresolution is 10−4 , and the learning rate for interpolation is
3 × 10−4 .
5. The Vimeo-90K Dataset
To acquire high quality videos for video processing, previous works [17, 14] take videos by themselves, resulting
in video datasets that are small in size and limited in terms
of content. Alternatively, we resort to Vimeo where many
videos are taken with professional cameras on diverse topics.
In addition, we only search for videos without inter-frame
compression (e.g., H.264), so that each frame is compressed
independently, avoiding artificial signals introduced by video
codecs. As many videos are composed of multiple shots,
we use a simple threshold-based shot detection algorithm to
break each video into consistent shots and further use GIST
feature [26] to remove shots with similar scene background.
As a result, we collect a new video dataset from Vimeo,
consisting of 4,278 videos with 89,800 independent shots that
are different from each other in content. To standardize the input, we resize all frames to the fixed resolution 448×256. As
shown in Figure 5, frames sampled from the dataset contain
diverse content for both indoor and outdoor scenes. We keep
consecutive frames when the average motion magnitude is
between 1–8 pixels. The right column of Figure 5 shows the
histogram of flow magnitude over the whole dataset, where
the flow fields are calculated using SpyNet [27].
We further generate three benchmarks from the dataset for
the three video enhancement tasks studied in this paper.
Vimeo Interpolation Benchmark We select 73,171 frame
triplets from 14,777 video clips with the following three criteria for the interpolation task. First, more than 5% pixels
should have motion larger than 3 pixels between neighboring
frames. This criterion removes static videos. Second, l1 difference between the reference and the warped frame using
optical flow (calculated using SpyNet [27]) should be at most
15 pixels (the maximum intensity level of an image is 255).
This removes frames with large intensity change, which are
too hard for frame interpolation. Third, the average difference
between motion fields of neighboring frames (v21 and v23 )
should be less than 1 pixel. This removes non-linear motion,
15.1
14.1
12.1
13.1
11.1
9.1
10.1
8.1
7.1
6.1
5.1
4.1
2.1
3.1
1.1
Frequency
0.1
Flow
magnitude
(a) Sample frames
12.1
13.1
11.1
10.1
9.1
8.1
7.1
6.1
5.1
4.1
3.1
2.1
1.1
0.1
Frequency
(b) Pixel-wise flow frequency
Flow
magnitude
(c) Image mean flow frequency
Figure 5: The Vimeo-90K dataset. (a) Sampled frames from the dataset, demonstrating the high quality and wide coverage of
our dataset; (b) The histogram of flow magnitude of all pixels in Vimeo-90K; (c) The histogram of mean flow magnitude of all
images (the flow magnitude of an image is the average flow magnitude of all pixels in that image).
as most interpolation algorithms, including ours, are based on
linear motion assumption.
Vimeo Denoising/Deblocking Benchmark We select
91,701 frame septuplets from 38,990 video clips for the denoising task, using the first two criteria introduced for the
interpolation benchmark. For video denoising, we consider
two types of noises: a Gaussian noise with a standard deviation of 0.1, and mixed noises including a 10% salt-and-pepper
noise in addition to the Gaussian noise. For video deblocking,
we compress the original sequences using FFmpeg with codec
JPEG2000, format J2k, and quality value q = 20.
Vimeo Super-Resolution Benchmark We also use the
same set of septuplets for denoising to build the Vimeo
Super-Resolution Benchmark with down-sampling factor of
4: the resolution of input and output images are 112 × 64 and
448 × 256 respectively. To generate the low-resolution videos
from high-resolution input, we use the MATLAB imresize
function, which first blurs the input frames using cubic filters
and then downsamples videos using bicubic interpolation.
Methods
Vimeo interp.
DVF dataset [18]
PSNR
SSIM
PSNR
SSIM
SpyNet [27]
EpicFlow [28]
DVF [18]
AdaConv [24]
SepConv [25]
31.95
32.02
—
32.33
33.45
0.9601
0.9622
—
0.9568
0.9674
33.60
33.71
34.12
—
—
0.9633
0.9635
0.9631
—
—
Fixed flow
Fixed flow + Mask
29.09
30.10
0.9229
0.9322
31.61
32.23
0.9544
0.9575
TOFlow
TOFlow + Mask
33.53
33.73
0.9668
0.9682
34.54
34.58
0.9666
0.9667
Table 1: Quantitative comparison between different frame
interpolation algorithms on Vimeo interpolation test set and
DVF test set [18].
6.1. Frame Interpolation
Datasets We evaluate on two datasets: Vimeo Interpolation
Benchmark and the dataset used by [14].
6. Evaluation
Metrics We use two quantitative measure to evaluate the
performance of interpolation algorithms: peak signal-to-noise
ratio (PSNR) and structural similarity (SSIM) index.
In this section, we evaluate two variations of the proposed
network. The first one is to train each module separately:
we first pre-train motion estimation, and then train video
processing while fixing the flow module. This is similar to
the two-step video processing algorithms, and we refer to it
as Fixed Flow. The other one is to jointly train all modules as
described in Section 4.5, and we refer to it as TOFlow. Both
networks are trained on Vimeo benchmarks we collected.
We evaluate these two variations on three different tasks and
also compare with other state-of-the-art image processing
algorithms.
Baselines We first compare our framework with two-step
interpolation algorithms. For the motion estimation, we use
EpicFlow [28] and SpyNet [27]. To handle occluded regions
as mentioned in Section 4.4, we calculate the occlusion mask
for each frame using [38] and only use non-occluded regions
to interpolate the middle frame. Further, we compare with
state-of-the-art end-to-end models, Deep Voxel Flow (DVF)
[18], Adaptive Convolution (AdaConv) [24], and Separable
Convolution (SepConv) [25]. At last, we also compare with
Fixed Flow, which is another baseline two-step interpolation
algorithm.
Epicflow
AdaConv
SepConv
Fixed Flow
TOFlow
Ground truth
Figure 6: Comparison between different frame interpolation algorithms. Zoomed-in views are shown in lower right.
Vimeo-Mixed Dataset
Vimeo-BW Dataset
V-BM4D Dataset
Input noisy frame
Fixed Flow
TOFlow
Ground truth
VBM4D
TOFlow
Ground truth
Figure 7: Comparison between different algorithms on video denoising. The differences are clearer when zoomed-in.
Results Table 1 shows our quantitative results. On Vimeo
Interpolation Benchmark, TOFlow in general outperforms the
others interpolation algorithms, both the traditional two-step
interpolation algorithms (EpicFlow and SpyNet) and recent
deep-learning based algorithms (DVF, AdaConv, and SepConv), with a significant margin. Moreover, even our model
is trained on our Vimeo-90K dataset, it also out-performs
DVF on DVF dataset in both PSNR and SSIM. There is also
a significant boost over Fixed Flow, showing that the network
does learn a better flow representation for interpolation during
joint training.
Figure 6 also shows qualitative results. All the two-step
algorithms (EpicFlow and Fixed Flow) generate a doubling
artifacts, like the hand in the first row or the head in the second
row. AdaConv on the other sides does not have the doubling
artifacts, but it tends to generate blurry output, by directly
synthesizing interpolated frames without a motion module.
SepConv increases the sharpness of output frame compared
with AdaConv, but there are still artifacts (see the hat on
the bottom row). Compared with these methods, TOFlow
correctly recovers sharper boundaries and fine details even in
presence of large motion.
Baselines We compare our framework with the V-BM4D,
with the standard deviation of Gaussian noise as its additional
input on two grayscale datasets (Vimeo-BW and V-BM4D).
As before, we also compare with the fixed flow variant of
our framework on two RGB datasets (Vimeo-Gaussian and
Vimeo-Mixed).
Results On two RGB datasets, Vimeo-Gaussian and VimeoMixed, TOFlow beats Fixed Flow in both two measurements,
as shown in Table 2. The output of TOFlow also contains less
noise (the differences are clearer when zoomed-in), as shown
on the left side of Figure 7. This shows that TOFlow learns a
motion field for denoising.
6.2. Video Denoising/Deblocking
On two grayscale datasets, Vimeo-BW and V-BM4D,
TOFlow outperforms V-BM4D in SSIM, even we did not finetuned on V-BM4D dataset. Note that even though TOFlow
only achieves a comparable performance with V-BM4D in
PSNR, the output of TOFlow is much sharper than V-BM4D.
As shown in Figure 7, the words on the billboard are kept in
the denoised frame by TOFlow (the top right of Figure 7),
and leaves on the tree are also clearer (the bottom right of
Figure 7). Therefore, TOFlow beats V-BM4D in SSIM, which
better reflects human’s perception than PSNR.
Setup We first train and evaluate our framework on Vimeo
denoising benchmark, with either Gaussian noise or mixture
noise. To compare our network with V-BM4D [20], which is
a monocular video denoising algorithm, we transfer all videos
in Vimeo Denoising Benchmark to grayscale to create VimeoBW (Gaussian noise only), and retrain our network on it. We
also evaluate our framework on the V-BM4D dataset [20].
For video deblocking, Table 3 shows that TOFlow outperforms V-BM4D. Figure 8 also shows the qualitative comparison between TOFlow, Fixed Flow, and V-BM4D. Note
that the compression artifacts around the girl’s hair (top) and
the man’s nose (bottom) are completely removed by TOFlow.
The vertical line around the man’s eye (bottom) due to a
blocky compression is also removed by our algorithm.
Input compressed frames
VBM4D
Ground truth
TOFlow
Fixed Flow
Figure 8: Comparison between our algorithm and V-BM4D [20] on video deblocking. The difference are clearer when
zoomed-in.
Vimeo-Gaussian
Vimeo-Mixed
PSNR
SSIM
PSNR
SSIM
PSNR
SSIM
PSNR
SSIM
V-BM4D [20]
Fixed flow
—
28.38
—
0.9333
—
28.56
—
0.9200
27.38
—
0.8664
—
30.63
—
0.8759
—
TOFlow
29.10
0.9544
28.85
0.9407
29.41
0.9271
30.36
0.8855
Methods
Vimeo-BW
V-BM4D [20]
Table 2: Quantitative comparisons on video denoising
Input
Methods
Vimeo SR
BayesSR [16]
PSNR
SSIM
PSNR
SSIM
—
—
—
—
22.69
24.32
0.7746
0.8486
Full clip
DeepSR [14]
BayesSR [16, 19]
1 frame
Bicubic
29.79
0.9036
22.02
0.7203
DeepSR [14]
BayesSR [16, 19]
7 frames
Fixed flow
25.55
24.64
31.81
0.8498
0.8205
0.9288
21.85
21.95
22.85
0.7535
0.7369
0.7655
33.08
0.9417
23.54
0.8070
TOFlow
Table 4: Results of video super-resolution. Each clip in Vimeo
SR contains 7 frames, and each clip in BayesSR contains 30–
50 frames.
6.3. Video Super-Resolution
Datasets We evaluate our algorithm on two dataset: Vimeo
Super-Resolution Benchmark and the dataset provided by [16]
(BayesSR). The later one consists of 4 sequences, each of
which has 30 to 50 frames.
Baselines We compare our framework with bicubic upsampling, two video SR algorithms: BayesSR (we use the
version provided by Ma et al. [19]) and DeepSR [14], as
well as a baseline with a fixed flow estimation module. Both
BayesSR and DeepSR can take various number of frames as
input. Therefore, on BayesSR datset, we report two numbers.
One is using the whole sequence, the other is to only use
seven frames in the middle, as TOFlow and Fixed Flow only
take 7 frames as input.
Methods
Vimeo-Blocky
PSNR
SSIM
V-BM4D [20]
Fixed flow
35.75
36.52
0.9587
0.9636
TOFlow
36.92
0.9663
Table 3: Results on video deblocking
Results Table 4 shows our quantitative results. Our algorithm performs better than baseline algorithms when using 7
frames as input, and it also achieves comparison performance
to BayesSR when BayesSR uses all 30–50 frames as input
while our framework only uses 7 frames. We show qualitative results in Figure 9. Compared with either DeepSR [14]
or Fixed Flow, the jointly trained TOFlow generates sharper
output. Notice the words on the cloth (top) and the tip of
the knife (bottom) are clearer in the high-resolution frame
synthesized by TOFlow. This shows the effectiveness of joint
training.
In all the experiments, we train and evaluate our network
on a NVIDIA Titan X GPU. For an input clip with resolution
256 × 448, our network takes about 200 ms for interpolation
and 400ms for denoising or super-resolution (the input resolution to the super-resolution network is 64 × 112), where the
flow module takes 18 ms for each estimated motion field.
At last, Figure 10 also visualizes the motion fields learned
by different tasks. Even using the same network structure and
taking the same input frames, the estimated flows for different
tasks are very different: the flow field for interpolation is very
smooth, even on the occlusion boundary, while the flow field
for super-resolution has artificial movements along the texture
edges. This is indicates that the network may learn to encode
different information that is useful for different tasks in the
learned motion fields.
7. Conclusion
In this work, we propose a novel video processing model
that exploits task-oriented motion cues. Traditional video
Bicubic
DeepSR
Fixed Flow
TOFlow
Ground truth
Figure 9: Comparison between different super-resolution algorithms. A close-up is shown on the top left of each result. The
differences are clearer when zoomed-in.
Input
Flow for Interpolation
Flow for Denoising
Flow for SR
Flow for Deblocking
Figure 10: Visualization of motion fields for different tasks.
processing algorithms normally consist of two steps: motion
estimation and video processing based on estimated motion
fields. However, a genetic motion for all tasks might be suboptimal and the accurate motion estimation would be neither
necessary nor sufficient for these tasks. Our self-supervised
framework bypasses this difficulty by modeling motion signals in the loop. To evaluate our algorithm, we also create
a new dataset, Vimeo-90K, for video processing. Extensive
experiments on temporal frame interpolation, video denoising/deblocking, and video super-resolution demonstrate that
our algorithm achieves state-of-the-art performance.
Acknowledgements This work is supported by NSF RI1212849, NSF BIGDATA-1447476, Facebook, Shell Research, and Toyota Research Institute.
References
[1] S. Abu-El-Haija, N. Kothari, J. Lee, P. Natsev, G. Toderici,
B. Varadarajan, and S. Vijayanarasimhan. Youtube-8m: A
large-scale video classification benchmark. arXiv:1609.08675,
2016. 2
[2] S. Baker, D. Scharstein, J. Lewis, S. Roth, M. J. Black, and
R. Szeliski. A database and evaluation methodology for optical
flow. IJCV, 92(1):1–31, 2011. 1, 2, 3
[3] T. Brox, A. Bruhn, N. Papenberg, and J. Weickert. High accuracy optical flow estimation based on a theory for warping. In
ECCV, 2004. 2
[4] D. J. Butler, J. Wulff, G. B. Stanley, and M. J. Black. A
naturalistic open source movie for optical flow evaluation. In
ECCV, 2012. 5
[5] J. Caballero, C. Ledig, A. Aitken, A. Acosta, J. Totz, Z. Wang,
and W. Shi. Real-time video super-resolution with spatio-
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
temporal networks and motion compensation. In CVPR, 2017.
2
P. Fischer, A. Dosovitskiy, E. Ilg, P. Häusser, C. Hazırbaş,
V. Golkov, P. van der Smagt, D. Cremers, and T. Brox. Flownet:
Learning optical flow with convolutional networks. In ICCV,
2015. 2
Y. Ganin, D. Kononenko, D. Sungatullina, and V. Lempitsky.
Deepwarp: Photorealistic image resynthesis for gaze manipulation. In ECCV, 2016. 2
M. Ghoniem, Y. Chahir, and A. Elmoataz. Nonlocal video
denoising, simplification and inpainting using discrete regularization on graphs. Signal Process., 90(8):2445–2455, 2010.
2
B. K. Horn and B. G. Schunck. Determining optical flow. Artif.
Intell., 17(1-3):185–203, 1981. 2
Y. Huang, W. Wang, and L. Wang. Bidirectional recurrent
convolutional networks for multi-frame super-resolution. In
NIPS, 2015. 2
M. Jaderberg, K. Simonyan, A. Zisserman, et al. Spatial transformer networks. In NIPS, 2015. 2, 4
A. Kappeler, S. Yoo, Q. Dai, and A. K. Katsaggelos. Video
super-resolution with convolutional neural networks. IEEE
TCI, 2(2):109–122, 2016. 2
D. P. Kingma and J. Ba. Adam: A method for stochastic
optimization. In ICLR, 2015. 5
R. Liao, X. Tao, R. Li, Z. Ma, and J. Jia. Video super-resolution
via deep draft-ensemble learning. In CVPR, 2015. 2, 5, 6, 8
C. Liu and W. Freeman. A high-quality video denoising algorithm based on reliable motion estimation. In ECCV, 2010. 1,
2
C. Liu and D. Sun. A bayesian approach to adaptive video
super resolution. In CVPR, 2011. 1, 8
C. Liu and D. Sun. On bayesian adaptive video super resolution.
IEEE TPAMI, 36(2):346–360, 2014. 2, 5
[18] Z. Liu, R. Yeh, X. Tang, Y. Liu, and A. Agarwala. Video frame
synthesis using deep voxel flow. In ICCV, 2017. 2, 4, 6
[19] Z. Ma, R. Liao, X. Tao, L. Xu, J. Jia, and E. Wu. Handling
motion blur in multi-frame super-resolution. In CVPR, 2015. 8
[20] M. Maggioni, G. Boracchi, A. Foi, and K. Egiazarian. Video
denoising, deblocking, and enhancement through separable 4-d
nonlocal spatiotemporal transforms. IEEE TIP, 21(9):3952–
3966, 2012. 2, 7, 8
[21] M. Mathieu, C. Couprie, and Y. LeCun. Deep multi-scale video
prediction beyond mean square error. In ICLR, 2016. 2
[22] E. Mémin and P. Pérez. Dense estimation and object-based
segmentation of the optical flow with robust techniques. IEEE
TIP, 7(5):703–719, 1998. 2
[23] K. Nasrollahi and T. B. Moeslund. Super-resolution: a comprehensive survey. MVA, 25(6):1423–1468, 2014. 2
[24] S. Niklaus, L. Mai, and F. Liu. Video frame interpolation via
adaptive convolution. In CVPR, 2017. 2, 4, 6
[25] S. Niklaus, L. Mai, and F. Liu. Video frame interpolation via
adaptive separable convolution. In ICCV, 2017. 4, 6
[26] A. Oliva and A. Torralba. Modeling the shape of the scene: A
holistic representation of the spatial envelope. IJCV, 42(3):145–
175, 2001. 5
[27] A. Ranjan and M. J. Black. Optical flow estimation using a
spatial pyramid network. In CVPR, 2017. 2, 4, 5, 6, 10
[28] J. Revaud, P. Weinzaepfel, Z. Harchaoui, and C. Schmid.
Epicflow: Edge-preserving interpolation of correspondences
for optical flow. In CVPR, 2015. 1, 2, 5, 6
[29] X. Tao, H. Gao, R. Liao, J. Wang, and J. Jia. Detail-revealing
deep video super-resolution. In ICCV, 2017. 2
[30] G. Varghese and Z. Wang. Video denoising based on a spatiotemporal gaussian scale mixture model. IEEE TCSVT,
20(7):1032–1040, 2010. 2
[31] T.-C. Wang, J.-Y. Zhu, N. K. Kalantari, A. A. Efros, and R. Ramamoorthi. Light field video capture using a learning-based
hybrid imaging system. In SIGGRAPH, 2017. 2
[32] A. Wedel, D. Cremers, T. Pock, and H. Bischof. Structure-and
motion-adaptive regularization for high accuracy optic flow. In
CVPR, 2009. 2
[33] M. Werlberger, T. Pock, M. Unger, and H. Bischof. Optical flow
guided tv-l1 video interpolation and restoration. In EMMCVPR,
2011. 2
[34] J. Xu, R. Ranftl, and V. Koltun. Accurate optical flow via direct
cost volume processing. In CVPR, 2017. 2
[35] J. J. Yu, A. W. Harley, and K. G. Derpanis. Back to basics:
Unsupervised learning of optical flow via brightness constancy
and motion smoothness. In ECCV Workshop, 2016. 2
[36] Z. Yu, H. Li, Z. Wang, Z. Hu, and C. W. Chen. Multi-level
video frame interpolation: Exploiting the interaction among
different levels. IEEE TCSVT, 23(7):1235–1248, 2013. 2
[37] T. Zhou, S. Tulsiani, W. Sun, J. Malik, and A. A. Efros. View
synthesis by appearance flow. In ECCV, 2016. 2
[38] C. L. Zitnick, S. B. Kang, M. Uyttendaele, S. Winder, and
R. Szeliski. High-quality video view interpolation using a
layered representation. ACM TOG, 23(3):600–608, 2004. 6
Appendices
Additional Qualitative Results In addition to the qualitative results shown in the main text (Figures 6–8), we show additional results on the following benchmarks: Vimeo Interpolation Benchmark (Figure 12), Vimeo Denoising Benchmark
(Figure 13 for grayscale videos), Vimeo Deblocking Benchmark (Figure 14), and Vimeo Super-resolution Benchmark
(Figure 15). To avoid cherry-picking, we randomly select
testing images from test datasets and do not show close-up as
Figures 6–9 in the main text. Differences between different
algorithms are more clearer when zoomed in.
Flow Estimation Module We used SpyNet [27] as our flow
estimation module. It consists of 4 sub-networks with the
same network structure, but each sub-network has an independent set of parameters. Each sub-network consists of 5 sets of
7x7 convolutional (with zero padding), batch normalization
and ReLU layers. The number of channels after each convolutional layer is 32, 64, 32, 16 and 2 respectively. The input
motion to the first network is a zero motion field.
Image Processing Module We use slight different structures in the image processing module for different tasks. For
temporal frame interpolation both with and without masks,
we build a residual network that consists of a averaging network and a residual network. The averaging network simply
averages the two transformed frames (from frame 1 and frame
3 respectively). The residual network also takes the two transformed frames as input, but calculates the difference between
the actual second frame and the average of two transformed
frames through a convolutional network consists of three convolutional layers, each of which is followed by a ReLU layer.
The kernel sizes of three layers are 9x9, 1x1, 1x1 respectively
(with zero padding), and the numbers of output channels are
64, 64, 3 respectively. The final output is the summation of
the outputs of these two networks (averaging network and
residual network).
For video denoising/deblocking, the image processing
module uses the same six-layer convolutional structure (3
convolutional layers and 3 ReLU layers) as interpolation, but
without the residual structure. We have also tried the residual
structure for denoising/deblocking, but there is no significant
improvement.
For video super-resolution, the image processing module
consists of 4 pairs of convolutional layers and ReLU layers.
The kernel sizes for these four layers are 9x9, 9x9, 1x1 and
1x1 respectively (with zero padding), and the numbers of
output channels are 64, 64, 64, and 3 respectively.
Mask Network Similar to our flow estimation module, our
mask estimation network is also a 4-level convolutional neural
network pyramid as in Figure 11. Each level consists of the
same sub-network structure with 5 sets of 7x7 convolutional
(with zero padding), batch normalization and ReLU layers,
but an independent set of parameters (output channels are 32,
64, 32, 16, and 2 respectively). For the first level, the input to
Mask Network
Estimated flow
at diff. scales
…
…
…
Masks L1
Masks L2
Masks L4
Figure 11: The structure of our mask network
the network is a concatenation of two estimated optical flow
fields (4 channels after concatenation), and the output is a
concatenation of two estimated masks (1 channel per mask).
From the second level, the inputs to the network switch to
a concatenation of 1) two estimated optical flow fields at
that resolution, and 2) bilinear-upsampled masks from the
previous level (the resolution is twice of the previous level).
In this way, the first level mask network estimates a rough
mask, and the rest refines high frequency details of the mask.
Epicflow
AdaConv
SepConv
Fixed flow
TOFlow
Ground Truth
Figure 12: Qualitative results for video interpolation. Samples are randomly selected from Vimeo Interpolation Benchmark.
The differences between different algorithms are clear only when zoomed in.
Input
Fixed Flow
TOFlow
Ground Truth
Input
Vbm4d
TOFlow
Ground Truth
Figure 13: Qualitative results for video denoising. The top five rows are results on color videos and bottom 4 rows are
grayscale videos. Samples are randomly selected from Vimeo Denoising Benchmark. The differences between different
algorithms are clear only when zoomed in.
Input
Vbm4d
TOFlow
Ground Truth
Figure 14: Qualitative results for video deblocking. Samples are randomly selected from Vimeo Deblocking Benchmark. The
differences between different algorithms are clear only when zoomed in.
Bicubic
DeepSR
Fixed flow
TOFlow
Ground Truth
Figure 15: Qualitative results for video super-resolution. Samples are randomly selected from Vimeo Super-resolution
Benchmark. The differences between different algorithms are clear only when zoomed in. DeepSR was originally trained on
30–50 images, but evaluated on 7 frames in this experiment, so there are some artifacts.
| 1cs.CV
|
World of Computer Science and Information Technology Journal (WCSIT)
ISSN: 2221-0741
Vol. 4, No. 7, 90-100, 2014
Intelligent Emergency Message Broadcasting in
VANET Using PSO
Ghassan Samara
Tareq Alhmiedat
Department of Computer Science, Zarqa University
Zarqa, Jordan
Department of Information Technology, Tabuk
University
Tabuk, Saudi Arabia
Abstract— The new type of Mobile Ad hoc Network which is called Vehicular Ad hoc Networks (VANET) created a fertile
environment for research.
In this research, a protocol Particle Swarm Optimization Contention Based Broadcast (PCBB) is proposed, for fast and effective
dissemination of emergency messages within a geographical area to distribute the emergency message and achieve the safety
system, this research will help the VANET system to achieve its safety goals in intelligent and efficient way.
Keywords- PSO; VANET; Message Broadcasting; Emergency System; Safety System.
The new techniques in this system should aim to make
the intelligent vehicle to think, communicate with other
vehicles and act to prevent hazards.
I. INTRODUCTION
Recent Year’s rapid development in wireless
communication networks has made Car to Car (C2C) and
Car to Infrastructure Communications (C2I) possible in
Mobile Ad hoc Networks (MANETs). This has given birth to
a new type of high mobile MANET called Vehicular Ad hoc
Networks (VANET) creating a fertile area of research aiming
for road safety, efficient driving experience, and
infotainment (Information and Entertainment) [1, and 2].
VANET safety applications depend on exchanging the
safety information among vehicles (C2C communication) or
between Vehicle to infrastructure (C2I Communication)
using the control channel, see figure 1.
Creating a safety system on the road is a very important
and critical concern for human today, each year nearly 1.3
million people die as a result of road traffic accidents – more
than 3000 deaths each day - and more than half of these
people are not travelling in a car, the injuries are about fifty
times of this number [3]. The number of cars in 2004 is
approximately estimated as 750 million cars around the
world [4], with an annually constant increase by 50 million
car around the world [5], with this constant raise, the
estimated number of cars nowadays exceeding one billion,
this raise the possibility to increase the number of crashes
and deaths on the roads, road traffic accidents are predicted
to become the fifth leading cause of death in the world,
resulting in an estimated 2.4 million death each year as stated
by the World Health Organization (WHO) [3], besides traffic
congestion makes a huge waste of time and fuel, this makes
developing an efficient safety system an urgent need on the
road.
Figure 1: VANET Structure
VANET safety communication can be made by two
means: Periodic Safety Message (called Beacon in this
paper) and Event Driven Message (called Emergency
Message in this paper), both sharing only one control
channel. The Beacon messages are status messages
containing status information about the sender vehicle like
position, speed, heading …etc. Beacons provide fresh
This research is funded by the Deanship of Research and
Graduate Studies in Zarqa University/ Jordan.
90
WCSIT 4 (7), 90 -100, 2014
information about the sender vehicle to the surrounding
vehicles in the network helping them to know the status of
the current network and predict the movement of vehicles.
Beacons are sent aggressively to neighboring vehicles 10
messages each second.
Depending on just one forwarder is not enough in a high
mobile network like VANET. Furthermore, authors didn’t
depend on beacons to gain the information. They proposed to
use hello message, which creates a chance to increase the
channel load.
Emergency Messages are messages sent by a vehicle
detect a potential dangerous situation on the road; this
information should be disseminated to alarm other vehicles
about a probable danger that could affect the incoming
vehicles. VANET is a high mobile network where the nodes
are moving in speeds that may exceed 120km/h, which
means that this vehicle move 33.33m/s, even if these vehicles
are very far from the danger, they will reach it very soon,
here milliseconds will be very important to avoid the danger
[6, and 7].
The contention period schemes (which is a waiting time
that the receiver waits before rebroadcasting the original
message received from the sender) are proposed by many
researchers[9], [10], [11], [12], [13], [14] and [15].
In [9], authors proposed the Link-based Distributed
Multi-hop Broadcast (LDMB), in which all the receivers of
the emergency message are potential forwarders. Each
forwarder computes and waits for contention time using
equation (3.2), if the contention time ends the forwarder will
start to rebroadcast the emergency message.
Emergency messages in VANET are sent in broadcast
fashion where all the vehicle inside the coverage area of the
sender should receive the message. The coverage area is not
enough as it is hardly reaches a 1000m (which is the DSRC
communication range) due to attenuation and fading effects.
Away vehicles from the danger should receive this critical
information to avoid the danger. Furthermore, the probability
of message reception can reach 99% in short distances and
can be as low as 20% at half of the communication range
(Moreno, 2004). Therefore, there should be a technique to
increase the emergency message reception with high
reliability and availability.
In [11] and [12], where authors proposed position-based
message forwarding strategy by sending the emergency
message in a broadcast fashion, and selecting the best
forwarder available. All vehicles receiving that message are
potential forwarders. In order to decide which node forwards
the message all receivers will be assigned a contention
window (waiting time); the contention window size will be
the smallest for the farthest node and the biggest size for the
nearest node, in other words, this protocol will give priority
for the farthest node to be the next forwarder.
The problem of the last two protocols that all the message
receivers will compute the waiting time and wait to make the
rebroadcast even the closest vehicles to the sender will do
and this will make the entire network vehicles busy for any
message received.
Duo to the high mobility of vehicles, the distribution of
nodes within the network changes rapidly, and unexpectedly
that wireless links initialize and break down frequently and
unpredictably. Therefore, broadcasting of messages in
VANETs plays a crucial rule in almost every application and
requires novel solutions that are different from any other
form of Ad-Hoc networks. Broadcasting of messages in
VANETs is still an open research challenge and needs some
efforts to reach an optimum solution.
Another protocol proposed by [13] called Emergency
Message Dissemination for Vehicular (EMDV) protocol, by
enabling the farthest vehicle within the transmission range to
make the rebroadcasting of the emergency message.
Choosing one forwarder vehicle is not appropriate in a
high mobile network like VANET as the position is always
changing, and the receiver vehicle may become out of range
when sending the message or simply the receiver can’t
receive the message because of the channel problems like
jam or denial of service, see figure 2.
Broadcasting requirements are: high reliability and high
dissemination speed with short latency in single-hop as well
as multi-hop communications. Problems associated with
regular broadcasting algorithms are: the high probability of
collision in the broadcasted messages, the lack of feedback
and the hidden node problem.
In this paper we concerned with proposing a new
intelligent broadcasting technique for the emergency
message in VANET aiming to increase the reception of the
emergency information.
II. RESEARCH BACKGROUND
Emergency message rebroadcast
In [8], authors proposed a street-based broadcast scheme
that utilizes neighbor’s information by exchanging hello
messages among vehicles, when any probable danger is
detected, a warning message is broadcasted to all neighbors.
The farthest vehicle is selected as a forwarder depending on
the information gained from the hello message, if the
preselected forwarder receives the message, it will
rebroadcast it.
Figure 2: Sender utilizing EMDV
In [10] authors proposed that the receivers of the message
will select random waiting times and make acknowledgment
91
WCSIT 4 (7), 90 -100, 2014
to avoid the re-transmissions from nodes closer to the
original sender.
Emergency message rebroadcast by network segments
Another way to rebroadcast the message is to divide the
network into segments proposed in [16, 17, and 18].
The acknowledgment scheme causes delay to the
rebroadcast.
In [16] authors proposed a protocol called Urban Multi–
hop broadcast (UMB) aiming to maximize the message
progress, and avoid broadcast storm, hidden node, and
reliability problems. The protocol assigns the duty of
forwarding and acknowledging the broadcast packets to only
one vehicle by dividing the road portion inside the
transmission range into segments and choosing the vehicle in
the furthest non-empty segment without prior topology
information. The source node transmits a broadcast control
packet, called Request to Broadcast (RTB), which contains
the position of the source and the segment size. On receiving
the RTB packet, nodes compute the distance between the
sender and the receiver. Then, nodes transmit a channel
jamming signal, called black–burst, that contains several
time–slots equal to their distance from the source (in number
of segments): the farther the distance, the longer the black–
burst. Each node transmits its black-burst and senses the
channel; if there is no other black-burst in the channel it
concludes that it is the farthest node from the source. Then
the node returns a Clear–to–Broadcast (CTB) control packet,
containing its identifier (ID), to the source.
In [14] authors proposed the Contention-Based
Forwarding (CBF) protocol where a vehicle sends a packet
as a broadcast message to all its neighbors. On receiving the
packet, neighboring vehicle will contend for forwarding the
packet. The node having the maximum progress to the
destination will have the shortest contention time and will
first rebroadcast the packet. If other nodes receive the
rebroadcast message, they will stop their contention and
delete the previously received message. This protocol mainly
proposed for forwarding the periodic safety message
(Beacons).
The problem of this protocol that there should be a
management technique to manage the contention for all the
neighboring vehicles, and there is a chance that the nearest
vehicle to the sender may not hear the rebroadcast of another
vehicle, here this vehicle will rebroadcast the message and
this called (hidden node problem (Tobagi and Kleinrock,
1975)) also it may lead to broadcast storm problem that
makes the protocol useless.
In [15] authors suggested that the emergency message
will be rebroadcasted by the receivers located at farther
distances from the sender by the selection of shorter waiting
times, see equation 1.
The Smart Broadcasting Protocol [17] addressed the
same objective as UMB using a different methodology.
Upon reception of a RTB message, each vehicle should
determine its segment and set a random back-off time. Each
segment has its own contention window size, i.e. if this
segment has contention window size (4) TS (time-slot);
vehicles in the furthest segment should randomly choose a
back-off time between (0) to (3) TS. Vehicles in the next
nearer segment choose a value between (4) to (7) TS, and so
on, as vehicles near the sender should wait for longer time.
In [7] authors proposed the Contention Based
Broadcasting (CBB) protocol for increasing the emergency
message reception and performance, the emergency message
will be broadcasted in multi-hop fashion, and the multi-hop
forwarders will be selected before the original message is
sent. CBB proven to achieve superiority over the EMDV
protocol as it choses more than one forwarder to rebroadcast
the emergency information and this gives the message a
chance to overcome the preselected forwarder failure.
Vehicles will decrement their backoff timers by one in
each time-slot while listening to the physical channel. While
waiting, if any vehicle receives a valid CTB message, it will
exit the contention time phase and listen to the incoming
broadcast. On the contrary, if any node finishes its backoff
timer, it will send the CTB containing its identity and
rebroadcast any incoming broadcast.
The criteria of choosing the forwarders depends on the
progress and on the segment localization, see figure 3, where
all the vehicles located in the final; none-empty segment are
a potential forwarder.
While in [18] authors proposed the Geographic random
forwarding (GeRaF) protocol, which divides the network
into equally adjacent sectors, the transmitter (source) elects
the sectors starting from the farthest one, by sending RTB
message, all the nodes in the elected sectors reply by CTB
message, if one node reply the CTB message, then this node
will become the next forwarder, if there are more than one
node sent the CTB message the source issue a collision
message and make a collision-resolution procedure to elect
the next forwarder depending on a probabilistic rule.
Many other approaches are discussed in details in our
previous paper (emergency message broadcasting)
III. THE PROPOSED PROTOCOL
Figure 3: Emergency message Sending and transmission range
This section presents a detailed design description for the
PCBB protocol, which aims to increase the percentage of
92
WCSIT 4 (7), 90 -100, 2014
reception for the emergency information by utilizing a
contention window, position based forwarding scheme, and
PSO intelligent technique.
Sending the message in single hop enables it to reach a
number of vehicles within a limited distance up to 1000 m
for the best cases [19]. However, this number should be
increased in order to warn more vehicles of possible dangers
before they reach the danger area.
Beacons and the emergency messages should be received
by all the neighboring vehicles with high probability and
reliability, because of the critical nature of the information
both provide. When a vehicle detects danger, it issues an
emergency message to warn other vehicles within the
network, and all the vehicles in the opposite direction of the
sender movement located in its transmission range must
receive such message. Covering the whole area does not
guarantee that all vehicles will receive the message because
of channel collisions and fading effects. The percentage of
emergency message reception for the network vehicles must
be as high as possible.
Sen ID
This paper proposes to categorize any emergency
message before sending it to make it easier for the receiver
vehicle to recognize the importance of the message being
received. Table 1 lists the codes for each category. For
example, when a vehicle receives two messages containing
categories 1 and 5, it processes the message that contains
category 1 first because it contains more critical information.
After assigning the message code, the sender should add
data to the message, such as the coordinates of the danger
zone or what the receiver should do; however, this aspect
would not be discussed in detail in the current study. The
proposed structure of the emergency message is shown in
Figure 4, where three inputs, namely Cid, MinB and MaxB,
are added to help the receiver vehicle determine what action
to take after receiving the emergency message.
002
Safety of Life
Cooperative Collision Warning
003
Safety
Intersection warning.
004
Safety
Transit Vehicle Signal Priority
005
Non-Safety
Toll Collection
006
Non-Safety
Service Announcement
007
Non-Safety
Movie Download(2 hours of MPEG 1)
MinB
MaxB
As mentioned earlier, the network is divided to several
segments to help the vehicle determine the next forwarder of
the emergency message. As proposed in [16], the
transmission range of the sender is divided into 10 segments
to make it easier for the sender to determine the last vehicle
in the last non-empty segment, which is eventually selected
as the next forwarder. For this paper, the distance is between
the sender and the forwarder. Authors in [16] established a
fixed distance of 1000 m. For the current study, however, if
the distance between the sender and the farthest vehicle is
Application
Emergency Break Warning/Avoidance
CId
As mentioned earlier assigning the forwarding job of the
emergency message to all the receiver vehicles of the
message may cause a broadcast storm problem, and
assigning the forwarding job just for one receiver vehicle
may not be appropriate sometimes as this specific forwarder
may not receive the emergency message. Hence vehicles in
the last segment, which should be the furthest one, will make
the forwarding of the emergency message if the forwarder
fails to receive and forward the message.
TABLE 1: EMERGENCY MESSAGE CLASSIFICATION
Safety of Life
Data
Choosing the next candidate forwarder is a process,
which begins by gathering the information obtained from
beacons received from neighbors. This information is
inserted and ordered into NT. The sender vehicle chooses the
farthest vehicle and assigns it to be the candidate forwarder.
The process of forwarding the emergency message to
increase the probability of reception so that the forwarded
signal can communicate with more vehicles on the road and
reach longer distances is the option used in this paper.
Choosing only one forwarder is inappropriate in high mobile
networks, such as VANET, because the forwarder might not
receive the emergency message. To solve this problem,
dividing the network to several segments is proposed.
Vehicles inside the last non-empty segment (i.e., the farthest
segment from the sender) wait for a period of time and
determine whether or not the candidate forwarder
rebroadcasted the emergency message. If none made the
rebroadcast, the vehicles located in the farthest segment
forwards the message. As mentioned earlier, assigning the
forwarding job of the emergency message to all the receiver
vehicles of the message may cause a broadcast storm
problem, and assigning the forwarding job to just one
receiver vehicle may be inappropriate because the specific
forwarder may not receive the emergency message. Hence,
vehicles in the last segment must forward the emergency
message if the forwarder fails to receive and forward the
message.
Every beacon received by a vehicle provides important
information about the sender status. This information is
utilized to form a rich and real time image about the current
network topology, which facilitates better network vehicle
communication. It also helps to be informed about the
potential dangers when they occur. When a vehicle has a
problem or detects a problem, it determines if the problem is
life critical or not. The life critical (Safety of Life) messages
will be given the highest priority and are then processed and
sent before any other kind of messages.
001
Msg ID
Where Sen ID: sender id, Code: Message Code, TS:
Time Stamp, Msg ID: Message ID, Data: Data sent, CId:
Forwarder Candidate ID, MinB: Minimum Boundary,
MaxB: Maximum Boundary.
Preparing to send
Priority
TS
Figure 4: Emergency message illustration.
In order to cover a wider area for message reception,
some neighboring vehicles can serve as potential forwarders,
and each forwarder has to wait for a certain period of time
(i.e., contention time) before forwarding the message.
Code
Code
93
WCSIT 4 (7), 90 -100, 2014
900 m, anything beyond 900 m is not considered. The
distance between the last vehicle and the sender is computed
using Equation (1).
segment should be expanded to include more vehicles, and
this could be determined using Equation (6).
(6)
(1)
where Dis is the distance between last vehicle and the
sender, SenPos is the position of the sender obtained from
GPS, and ForPos is the forwarder position or the last vehicle
in the last non-empty segment.
This calculation doubles the size of the last segment and
increases the number of the potential forwarders. If the
calculated number remains to be SucPer < Nmax%, the MinB
could be recalculated by multiplying Dif by 3 and so on. This
technique increases the number of the potential forwarders
and solves the preselected forwarder rebroadcast failure.
Determining the boundaries of the last non-empty
segment must be set dynamically depending on the channel
status and the network topology available, because it would
be pointless if this segment does not contain enough number
of vehicles for forwarding. At the same time, determining the
number of sufficient vehicles located in the last non-empty
segment must also depend on the channel status and network
topology. The sender vehicle has all the information required
to analyze the channel and draw the network topology. To
compute the boundaries, the CBB and PCBB protocols are
proposed. The CBB protocol depends on the selection of
boundaries of the last non-empty segment based on the
number of the vehicles located in this segment, and the
number of segments in the network. [16] suggested that the
number of the segments should be 10 segments. Computing
the segments and the boundaries could be done using
Equations (2), (3) and (4). Equation (2) assigns the distance
between the sender, and the farthest vehicle (forwarder) is
the boundary of the last non-empty segment. Equation (3)
computes the length of each segment, and Equation (4) finds
the location of the minimum boundary. MinB is the
minimum boundaries (Borders) where the last segment starts.
Nmax is the maximum number of the segments, and Dif is
the length of the segment.
The PCBB is an enhancement of the CBB and works
when the sender vehicle analyzes the dense locations of the
vehicles along its transmission range. In Figure 5, the vehicle
analyzes the location density in the network to form groups
for dense locations; the resulting network is then divided into
several groups (Figure 6).
Figure 5: vehicle analysis location density.
(2)
(3)
(4)
This means that the vehicles located in the area between
MinB and MaxB from the sender are considered as potential
forwarders of the emergency message. They are rebroadcast
if no vehicle makes the rebroadcast. Sometimes, the last
segment may have an insufficient number of vehicles. The
number of the potential forwarders must have a threshold to
determine if it is sufficient or not.
Figure 6: Analyzed network depending on network density and progress.
A dense or concentrated area has a number of vehicles
within just a small area. Thus, sending a message to vehicles
in concentrated areas increases the chance of receiving and
rebroadcasting the message. The probability of receiving the
rebroadcasted messages in this segment is also high, thus
eliminating the hidden node problem, which is considered
one of the most difficult problems encountered in
rebroadcasting emergency message in VANET. Equation (7)
is used to calculate how vehicles compute the dense
locations. The progress represents the upper bound of the last
segment and the length of the segment is also the distance
between the farthest vehicle in the segment and the first
vehicle located in the segment. For example, if the segment
that has progressed to 820 m, has 15 vehicles in 80 meters
between 820 m and 900 m from the location of the sender,
(5)
The number could be generated and tested using
Equation (5), where SucPer is the success percentage that the
last segment must fulfill before agreeing on the values of
MaxB and MinB, and NeiN is the total number of neighbor
vehicles in NT.
If SucPer > Nmax%, this means that the last segment
holds enough number of potential forwarder vehicles. The
result of
is subtracted by one vehicle, because the last
segment also holds the preselected potential forwarder. If the
SucPer < Nmax%, this means that the area of the last
94
WCSIT 4 (7), 90 -100, 2014
the segments with the higher progress and high number of
vehicles with smaller segments give higher fitness function.
Where MaxB is the highest boundary (border) for the last
segment, and MinB is the minimum boundary (Borders) from
which the segment starts.
(7)
After performing Equation (7), the vehicle inserts it in a
Progress List (PL), which then helps the vehicle in making
quicker analysis and decisions (Table 2).
This means that the vehicles located in the area between
MinB and MaxB from the sender are considered as potential
forwarders of the emergency message, and would have to
wait to rebroadcast in case no vehicle forwards the message.
When the sender decides to broadcast an emergency
message, it should examine the number of neighbors within
the back end of the coverage area. If the number is more than
one, then this protocol could be carried out; if the number of
the neighbors is zero, then the sender broadcasts the message
without specifying any forwarder. If the number of the
neighbors is equal to one, then the sender broadcasts the
message and specifies the forwarder without adding any
detail about the boundaries.
TABLE 2: PROGRESS LIST.
Progress (m)
Length of
Segment
No. of Vehicles
Fitness
Function
520
90
15
86
610
90
15
101
700
120
30
175
820
80
15
153
900
0
1
0
To compute for the contention time, Equation (12) is
performed, where the vehicles with the largest distance from
the sender have the shortest contention time to wait before
testing the channel to rebroadcast. Each vehicle tests its
progress from the sender by dividing its current position on
the maximum distance computed by the sender. The result of
this equation gives the waiting time for the contending
vehicles inside the last segment, giving the opportunity for
all the vehicles inside the last segment to recover from the
failure of the chosen forwarder. Thus, the protocol increases
the probability of resending the emergency message
consequently, increasing the percentage of sending the
emergency message and reaching longer distances at the
same time.
After performing Equation (7) on all the vehicles in the
segments, the sender vehicle takes the upper boundary of the
segment scores the higher fitness function then the PSO
optimization is applied
Fitv = lBestv w + C1
rand1 (pBestv - lBestv) + C2
rand2 (gBestv - lBestv), (8) [20].
lBestv = pBestv + Fitv (9), [20].
Where W is random number between W: 0.1 to 0.5, C1=
2, C2= 2, rand: random number 0.1 to 1, pBest is the last
lBest computed by the vehicle. w is the inertia weight of the
particles, random 1 and random 2 are two uniformly
distributed random numbers in the range [0, 1], and C1 and
C2 are specific parameters which control the relative effect
of the individual and global best particles.
Enabling just the last segment to contend eliminates the
hidden node problem, because all the potential forwarders
have high probabilities to sense the rebroadcasted message
when a forwarder resends the message. All potential
forwarders are located in a small and limited area. The
probability of reception can reach 99% at short distances, but
it could be as low as 20% at half the distance of the
communication range [13].
The lBest for the vehicle is obtained from the fitness
function computed using (7), which represents the best area
(segment dimension). The results indicate the sufficient
number of vehicles depending on the sender analysis. Pbest
is the previous fitness function computed by the vehicle,
while the gBest is best fitness function computed by the
vehicle obtained from the analysis of the information from
CRNT obtained from our previous paper [7]. The CRNT
gives extended information received from other vehicles
located in the neighborhood of the sender, which reduces the
error possibility that the vehicle might make during the
channel dense location analysis because PSO depends on
taking the neighbor’s information and history. From the
CRNT, the vehicle can conclude another global fitness
function from the neighboring vehicles analysis, which
influences the current analysis done by the current vehicle
Sending Steps: The sender dispatches an emergency
message warning other vehicles about any potential danger.
The sender analyzes the danger and selects the code. The
sender creates NT for its neighbors, and then selects the next
forwarder depending on the distance of the farthest vehicle.
The sender analyzes the dense location computing the fitness
function using Equation (7). The sender analyzes the
information gained from neighbors about dense locations
from CRNT and concludes the gBest. The PSO algorithm is
then applied to obtain the MinB, which represents the lower
bound of the segment. The sender creates the message and
inserts the values derived from steps 4 and 8 in the message,
after which it broadcasts the message to the network
To compute for the boundaries of the last segment, the
sender carries out the following equations:
The following illustrates the calculations using Equation
(7), which computes the fitness function for each segment.
This formula ensures that the vehicles having high progress
from the sender and having a large number of vehicles in a
small area can produce better fitness function. This is
because vehicles concentrated in a small area and are located
(10)
(11)
95
WCSIT 4 (7), 90 -100, 2014
far from the sender vehicle have better opportunities to
rebroadcast the emergency message with little chance of
failure.
Tc is the contention time that the segment vehicle has to
wait before checking the system to see if the emergency
message has been rebroadcasted by other vehicle or not,
Tslot: is the system time slot.
From Table 2 and after employing Equation (7):
Receiving emergency message steps: This section
represents the steps for receiving the emergency message,
which must be done efficiently. The receiver accepts a
message then checks the code if it is 1 or 2. The receiver also
checks if the message has been received before and if its ID
is the same as the forwarder ID, then, it rebroadcasts the
message immediately. If the ID is not the same, the receiver
calculates the distance between its current position and the
sender and tests if the current location falls within MinB and
MaxB. The receiver then prepares to forward the message.
The best value for the fitness function is 175; this value
means that the lBest is 700, which represents the lower
boundary for that segment.
The gBest is taken from the CRNT, because this protocol
provides the sender vehicle with information from other
vehicles. This information also enables the sender to analyze
the channel depending on the information from the other
vehicle giving more accurate data about the network.
Rebroadcasting steps:
The rebroadcasting job is only assigned to a limited
number of vehicles. It is not appropriate to assign this job to
all the receiver vehicles, because this can lead to a broadcast
storm problem [22] or the hidden node problem. The first
forwarder should be the first candidate selected by the
sender, and the forwarding steps are as follows.
pBest is the channel analysis history of the network made
from the sender vehicle, lBest is the boundary of the fitness
function, and gBest is the best analysis from the neighbors.
lBest = 700, pBest= 690, gBest= 720.
Apply PSO equation (8)
700 x 0.1 + 2 x 0.65(690 – 700) + 2 x 0.7 (720 –
700) = 70 – 13 + 28 =95
lBest = 690 + 95 eq (4.10)
The forwarder waits for a random back off time
depending on its contention window. The back off time is
used to avoid channel collision. The forwarder then senses
the channel and tests whether or not this message has been
transmitted from others. If no other vehicle rebroadcasts, the
message forwarder reserves the channel and the forwarder
broadcasts the message. The contention window for the first
candidate forwarder is 15 µs.
lBest = 785.
The MinB for this example is 785 m and the MaxB is 900
m, as obtained from Equation (10). The results imply that the
vehicles between 785 m and 900 m from the sender can be
considered as potential forwarders; they would have to
contend by means of the time to rebroadcast and be able to
overcome the preselected forwarder failure.
Each vehicle inside the last non-empty segment is
required to contend before trying to send the emergency
message and this could be done using the following steps.
The forwarder computes the contention window using
Equation (12). The vehicle contends for a random back off
time depending on the contention window. The vehicle
senses the channel and determines whether or not this
message has been transmitted from others. If no other vehicle
rebroadcasts the message, the vehicle reserves the channel
and broadcasts the message.
Receiving a message
Vehicles in VANET receive messages all the time. These
messages could be beacon, emergency, or service messages.
Each message should be analyzed to determine the level of
importance involved. If the message is holding safety critical
information, then the message code should be 1 or 2, and the
message is given higher priority for processing. The receiver
vehicle also has to ensure that this message has not been
received before to eliminate duplication. The receiver checks
the forwarder ID. If the current receiver ID is the same as
that of the forwarder, the receiver rebroadcasts the message
immediately. If the receiver is not a forwarder, then it must
compute the distance between its position and that of the
sender to determine if the receiver is located within the last
non-empty segment. If the receiver is located in the last nonempty segment, it starts contending and prepares itself to
rebroadcast. Each vehicle inside the last non-empty segment
must contend the time and compute the CW time (Waiting
time) using Equation (12). CW depends on the progress, and
the vehicles having the largest progress from the sender has
the shortest contention time before testing the channel to
make the rebroadcast.
PCBB and CBB both have the same goal of increasing
the percentage reception of the emergency information. The
main difference between them, however, is the potential
forwarder selection, where CBB depends on choosing the
last non-empty segment boundaries depending on the
number of the vehicles in the segment against a predefined
threshold, whereas the PCBB depends on selecting the
boundaries on vehicle saturation areas and utilizes the PSO
intelligent technique.
IV. SIMULATION
Simulation Setup
In order to test correctness of our protocol we made the
simulation using the commercial program Matlab®, the
distribution used is Nakagami distribution.
(12)
96
WCSIT 4 (7), 90 -100, 2014
Parameters used in our simulation are summarized in
table 1; all the simulations in this paper will adopt these
parameters.
PCBB can achieve better performance past the first 1000 m
distance representing the DSRC communication range for
the sender. The signal gets very weak in the last meters of the
sender communication range, but when the forwarder
rebroadcasts the message, the signal becomes stronger and
reaches greater distances.
We made our simulation for 10s including 200 vehicles
in 2 km road consisting of 3 lanes.
Simulation Parameters
Another difference between CBB/PCBB and EMDV is
that after several tries, CBB and PCBB never fail to
rebroadcast the emergency message, but EMDV sometimes
fails to do so, proving the effectiveness of the CBB protocol.
The PCBB protocol has also been shown to select forwarders
more carefully than CBB, which depends on a threshold,
while PCBB depends on traffic saturation and progress and
on the analysis made by neighboring vehicles. Furthermore,
PSO adopts the PSO intelligent algorithm, which takes other
vehicles' analysis into consideration, allowing for more
accurate selection of preselected forwarders.
Parameters used in the simulation experiment are
summarized in table 3; all the simulations in this paper will
adopt these parameters.
TABLE 3: SIMULATION CONFIGURATION PARAMETERS
Parameter
Radio
propagation
model
Value
Nakagami-m, m
=3
IEEE 802.11p data rate
PLCP header length
Symbol duration
Noise floor
SNR
6Mbps
8 μs
8 μs
-99dBm
10 - 40 dB
CW Min
CW Max
Slot time
SIFS time
DIFS time
Message size
Beacon Message Rate
Number of Vehicles
Road Length
Car Speed
Simulation Time
Road Type
Number of lanes
Neighbor entry size
15 μs
1023 μs
16 μs
32 μs
64 μs
512 bytes
10 Message / s
200
2 KM
20km – 120km
10 s
Highway
3 lanes
15 Bytes
Description
Model m=3 is
fixed
value,
recommended by
[13]
Fixed value
Fixed value
Fixed value
Fixed value
Adjustable to add
noise to the signal
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Fixed value
Figure 7: Probability of message reception of emergency message with
respect to the distance to the sender.
Figure 8 shows the message delay for CBB and EMDV
compared with PCBB emergency message delay. The
simulation computes the delay for broadcasting and
rebroadcasting of the original message, showing that the
EMDV during the time has a slightly higher delay than CBB
but not exceeding 50 µs. The delay shows a slight increase at
about 20 µs 1000 m away from the sender where the
rebroadcast starts to take effect. If the CBB has a shorter
delay starting from this point, it means that its rebroadcast
efficiency and decisions are made faster than those in
EMDV. PCBB has a slightly shorter delay (about 10 µs
shorter than CBB and 30 µs shorter than EMDV at the ninth
second), because the PSO is an intelligent technique that has
quick performance and response [23]. In safety systems with
a highly mobile network like VANET, a few microseconds
are critical in saving life or avoiding danger.
V. RESULTS
In order to enhance emergency message dissemination in
VANET, two contention- and position-based protocols have
been proposed and implemented, namely, CBB and PCBB
(an enhancement of the proposed CBB). In this section, the
EMDV protocol, which is the outcome of the NOW project
[13, and 22], is compared with the CBB and PCBB. The
results of the experiment are shown in Figures 7, 8, and 9.
The test performed concentrated on the probability of
emergency message reception, channel collision, and the
delay that the protocols may cause. The EMDV and DFPAV
protocols, both widely used in VANET today, are the results
of the NOW project, which is a collaboration between
Mercedes-Benz and Karlsruhe University [22]. Figure 7
shows the simulation results for the proposed CBB and
PCBB protocols. These have been simulated and tested in
terms of probability of emergency message reception;
afterwards, their performances are compared with that of the
EMDV protocol. The results show that all the protocols can
increase the performance and probability of emergency
message reception; more noteworthy is the fact that CBB and
97
WCSIT 4 (7), 90 -100, 2014
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
Figure 8: Delay measured after sending the emergency message with
respect to distance.
[7]
Figure 9 shows the collision produced by the three
protocols, all of which generated the same collision when
broadcasting emergency information. It is worth noting that
the collisions produced by CBB, PCBB and EMDV at the
beginning of the experiment do not increase. However, after
a period of time, sending a large number of emergency
messages resulted in an increase in the number of collision
for all the three protocols, with the difference between them
reaching 1% at the ninth second.
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Figure 9: Collision measured after sending the emergency message.
[16]
VI. CONCLUSION
This Research has proposed the PCBB aiming to improve
road safety by achieving fast and efficient emergency
message transmission and delivery, utilizing the efficient and
newest intelligent technique (PSO), which helped to make
more accurate analysis and performance, and increased the
percentage of the emergency message reception without
affecting the channel collision.
[17]
[18]
[19]
98
Ghassan Samara, Wafaa AH Al-Salihy, R Sures, "Security Issues and
Challenges of Vehicular Ad Hoc Networks (VANET)", 4th
International Conference on New Trends in Information Science and
Service Science (NISS), 2010, 393-398.
Ghassan Samara, Wafaa AH Al-Salihy, R Sures, "Security Analysis
of Vehicular Ad Hoc Nerworks (VANET)", Second International
Conference on Network Applications Protocols and Services
(NETAPPS), 2010, 55-60.
Who,
W.
H.
(2011),
World
Health
Organization,
http://www.who.int/roadsafety/decade_of_action/plan/en/index.html,
visited on 30 April, 2014.
M Raya, D. J., P Papadimitratos, I Aad, JP Hubaux (2006), Certificate
Revocation in Vehicular Networks. Laboratory for computer
Communications and Applications (LCA) School of Computer and
Communication Sciences, EPFL, Switzerland.
Worldometers
(2011),
real
time
world
statistics,
www.worldometers.info, visited on 30 April, 2014.
Ghassan Samara, WAHA Alsalihy, S Ramadass, "Increase
Emergency Message Reception in VANET", Journal of Applied
Sciences, 2011, Volume 11, Pages 2606-2612.
Ghassan Samara, Wafaa Alsalihy, Sureswaran Ramadass,” Increasing
Network Visibility Using Coded Repitition Beacon Piggybacking”,
World Applied Sciences Journal (WASJ), Volume 13, Number 1, pp.
100 - 108, 2011.
Ching-Yi, Y. & Shou-Chih, L. (2010) Street Broadcast with Smart
Relay for Emergency Messages in VANET. 24th International
Conference on Advanced Information Networking and Applications
Workshops (WAINA), 323-328, IEEE.
Qiong, Y. & Lianfeng, S. (2010) A Multi-Hop Broadcast scheme for
propagation of emergency messages in VANET. 12th IEEE
International Conference on Communication Technology (ICCT),
1072-1075, IEEE.
Biswas, S., Tatchikou, R.,
Dion, F. (2006), Vehicle-to-vehicle
wireless communication protocols for enhancing highway traffic
safety, IEEE Communications Magazine, 44, 74-82, IEEE.
Torrent-Moreno, M. (2007), Inter-vehicle communications: assessing
information dissemination under safety constraints, 4th Annual
Conference on Wireless on Demand Network Systems and Services,
WONS '07, 59 – 64, IEEE.
Torrent-Moreno, M., Mittag, J., Santi, P. & Hartenstein, H. (2009),
Vehicle-to-Vehicle Communication: Fair transmit power control for
safety-critical information. Transactions on Vehicular Technology,
58, 3684-3703, IEEE
Torrent-Moreno, M. (2007), Inter-Vehicle Communications:
Achieving Safety in a Distributed Wireless Environment-Challenges,
Systems and Protocols, (Ph.D Paper), Universitatsverlag Karlsruhe,
ISBN: 978-3-86644-175-0.
Füßler, H., Widmer, J., Kasemann, M., Mauve, M. & Hartenstein, H.
(2003), Contention-based forwarding for mobile ad hoc networks, Ad
Hoc Networks, 1 (2003), 351-369.
Briesemeister, L., Schafers, L., Hommel, G. (2000), Disseminating
messages among highly mobile hosts based on inter-vehicle
communication, IEEE Intelligent Vehicles Symposium, IV 2000, 522
- 527, IEEE.
Korkmaz, G., Ekici, E., Özgüner, F. & Özgüner, Ü. (2004), Urban
multi-hop broadcast protocol for inter-vehicle communication
systems, 1st ACM international workshop on Vehicular ad hoc
networks, ACM.
Fasolo, E., Zanella, A., Zorzi, M. (2006), An effective broadcast
scheme for alert message propagation in vehicular ad hoc networks,
IEEE Int. Conf. on Communications ICC'06, 3960 – 3965, IEEE.
Zorzi, M. & Rao, R. R. (2003), Geographic random forwarding
(GeRaF) for ad hoc and sensor networks: energy and latency
performance, IEEE transactions on Mobile Computing, 349-365,
IEEE.
IEEE (2005), White Paper: DSRC technology and the DSRC Industry
consortium (DIC) prototype team.
WCSIT 4 (7), 90 -100, 2014
[20] Neo
Project,
(2014),
http://neo.lcc.uma.es/staff/jamal/portal/?q=content/particle-swarmoptimization-pso, Malaga University, visited on 10 March 2014.
[21] Ni, S. Y., Tseng, Y. C., Chen, Y. S. & Sheu, J. P. (1999a), The
broadcast storm problem in a mobile ad hoc network, 5th annual
ACM/IEEE international conference on Mobile computing and
networking, 151-162, ACM.
[22] Now, (2011). Network on Wheels project, http://www.network-onwheels.de/vision.html, accessed 5 May 2011.
[23] Mendes, R. (2004). Population Topologies and Their Influence in
Particle Swarm Performance (PhD thesis). Universidade do Minho.
Wait contention time
If channel = idle
{
If no rebroadcast
{
Rebroadcast ( )
} % end if
Else
{
Backoff = backoff -1
} % end if
} % end while
} % end if
} % end if
} % end if
}% end procedure
APPENDIX
Procedure DetectDanger ( )
{
Gather neighbor information
Select main forwarder
MaxB = forwarderlocation – senderlocation.
(MinB) = PSO ( )
Insert Emergency information in the message
Send Message
} % end procedure
Procedure Rebroadcast
Rebroadcast emergency message
End % procedure
Procedure Computevehicleconcentration ( )
{
Mindist = Computemindist ( )
Arrange NT descending
For i= 0 NT size -1
{
Take the average between two successive vehicles
If average < 2 * (last average) or number of vehicles compared
is 1 % if this vehicle is the first vehicle
{
Add to current segment % add the current vehicle to this
segment
Segment vehicles = segment vehicles + 1 % increase the number
of vehicles by 1
Vehicle location = location (i) %takes the location of the current
vehicle
Segment (segment count, dist) = Vehicle location - first element
location % compute the width of the
Procedure PSO ( )
{
Currentsegment = Computevehicleconcentration ( ) % to
compute the current concentration of vehicles
pBest = cfitness
cfitness = 0
For i=0 to Currentsegment size -1 % calculate the best result
{
% fitness function
If Fitness > cfitness
cfitness = Fitness
} % end if
} % end for
lBest = cfitness
segment
segment (segment count, Segment vehicles) = Segment vehicles
% to store the number of vehicles for the
neighborsegment = Computevehicleconcentration ( ) % to
compute the current concentration of vehicles
gfitness = 0
For x=0 to Currentsegment size -1 % calculate the best result
{
current segment
}
Else if the new average is more than the double of previous
value
{
segment count = segment count + 1
Vehicle location = location (i)
Segment vehicles = 1
Segment (segment count, progress) = Vehicle location
}
Return (segment)
}
% fitness function
If Fitness > cfitness
gfitness = Fitness
} % end if
} % end for
gBest = gfitness
}% end procedure
Procedure ReceiveEmerMessage ( )
{
If code = 1 or code = 2
{
If preselctedforwarder
{
Rebroadcast ( )
Else if candidate forwarder
{
Compute CW
Choose random backoff
While back <> 0
{
Figure A.1: Psedu-code Particle Swarm Optimization Contention Based
Broadcast Protocol (PCBB).
The procedure DetectDanger works when the vehicle
detects any danger, the first step for the sender is to order the
neighbors' information in NT, and select the first forwarder,
afterwards. It calls the PSO procedure that implements the
PSO algorithm to select the vehicles that overcome the
preselected forwarder’s failure.
99
WCSIT 4 (7), 90 -100, 2014
The procedure ReceiveEmerMessage works when the
vehicle receives an emergency message and checks if the
receiver is a forwarder or not.
The procedure Computevehicleconcentration analyzes
the neighbors to discover the location of the vehicles'
concentration.
100
| 9cs.NE
|
GENERATING THE IDEALS DEFINING UNIONS OF SCHUBERT VARIETIES
arXiv:1405.2945v1 [math.AG] 12 May 2014
ANNA BERTIGER
A BSTRACT. This note computes a Gröbner basis for the ideal defining a union of Schubert varieties.
More precisely, it computes a Gröbner basis for unions of schemes given by northwest rank conditions on the space of all matrices of a fixed size. Schemes given by northwest rank conditions include
classical determinantal varieties and matrix Schubert varieties–closures of Schubert varieties lifted
from the flag manifold to the space of matrices.
1. I NTRODUCTION
We compute a Gröbner basis, and hence ideal generating set, for the ideal defining a union of
schemes each given by northwest rank conditions with respect to an “antidiagonal term order.”
A scheme defined by northwest rank conditions is any scheme whose defining equations are of
the form “all k × k minors in the northwest i × j sub-matrix of a matrix of variables,” where i, j,
and k can take varying values. These schemes represent a generalization of classical determinantal
varieties–those varieties with defining equations all (r+1)×(r+1) minors of a matrix of variables.
One geometrically important collection of schemes defined by northwest rank conditions is the set
of matrix Schubert varieties. Matrix Schubert varieties are closures of the lift of Schubert varieties
from the complete flag manifold to matrix space [Ful92]. In general, a matrix Schubert variety
for a partial permutation π is the subvariety of matrix space given by the rank conditions that
the northwest i × j sub-matrix must have rank at most the number of 1s in the northwest i × j
sub-matrix of the partial permutation matrix for π. Notice that the set of matrix Schubert varieties
contains the set of classical determinantal varieties, which are the zero locus of all minors of a
fixed size on the space of all matrices of fixed size.
Matrix Schubert varieties associated to honest, that is non-partial, permutations are the closures
of the lifts of the corresponding Schubert varieties in the flag manifold, B− \GLn . If Xπ is the matrix
Schubert variety for an honest permutation π the projection
{full rank matrices} B− \ GLn C = F`Cn
sends Xπ ∩ GLn C onto the Schubert variety Xπ ⊆ F`Cn . Schubert varieties, orbits of B+ , stratify
F`Cn and give a basis for H∗ (F`Cn ). It is this application that led to the introduction of matrix
Schubert varieties in [Ful92]. Knutson and Miller showed that matrix Schubert varieties have a
rich algebro-geometric structure corresponding to beautiful combinatorics [KM05]. Fulton’s generators are a Gröbner basis with respect to any antidiagonal term order and their initial ideal is
the Stanley-Reisner ideal of the “pipe dream complex.” Further, Knutson and Miller show that
the pipe dream complex is shellable, hence the original ideal is Cohen-Macaulay. Pipe dreams,
the elements of the pipe dream complex, were originally called RC graphs and were developed
by Bergeron and Billey [BB93] to describe the monomials in polynomial representatives for the
classes corresponding to Schubert varieties in H∗ (F`Cn ).
The importance of Schubert varieties, and hence matrix Schubert varieties, to other areas of
geometry has become increasing evident. For example, Zelevinsky [Zel85] showed that certain
quiver varieties, sequences of vector space maps with fixed rank conditions, are isomorphic to
Date: May 14, 2014.
1
Schubert varieties. Knutson, Miller and Shimozono, [KMS06] produce combinatorial formulae for
quiver varieties using many combinatorial tools reminiscent of those for Schubert varieties.
1.1. Notation and Background. Much of the background surveyed here can be found in [MS05].
Let B− (respectively B+ ) denote the group of invertible lower triangular (respectively upper triangular) n × n matrices. Let M = (mi,j ) be a matrix of variables. In what follows π will be a possibly
partial permutation, written in one-line notation π(1) . . . π(n), with entries for π(i) undefined are
written ?. We shall write permutation even when we mean partial permutation in cases where
there is no confusion. A matrix Schubert variety Xπ is the closure B− πB+ in the affine space of all
matrices, where π is a permutation matrix and B− and B+ act by downward row and rightward
column operations respectively. Notice that for π an honest permutation Xπ is the closure of the
lift of Xπ = B− \B− πB+ ⊆ B− \GLn C to the space of n × n matrices.
The Rothe diagram of a permutation is found by looking at the permutation matrix and crossing
out all of the cells weakly below, and the cells weakly to the right of, each cell containing a 1. The
remaining empty boxes form the Rothe diagram. The essential boxes [Ful92] of a permutation are
those boxes in the Rothe diagram that do not have any boxes of the diagram immediately south
or east of them. The Rothe diagrams for 2143 and 15432 are given in Figure 1.1. In both cases the
essential boxes are marked with the letter e.
1
e
e
1
e
1
e
e
1
1
1
1
1
1
F IGURE 1.1. The Rothe diagrams and essential sets of 2143 (left) and 15432 (right).
The rank matrix of a permutation π, denoted r(π), gives in each cell r(π)ij the rank of the i × j
northwest-justified sub-matrix of the permutation matrix for π. For example, the rank matrix of
15432 is
1 1 1 1 1
1 1 1 1 2
1 1 1 2 3 .
1 1 2 3 4
1 2 3 4 5
Theorem 1.1 ( [Ful92]). Matrix Schubert varieties have radical ideal I(Xπ ) = Iπ given by determinants
representing conditions given in the rank matrix r(π), that is, the (r(π)ij + 1) × (r(π)ij + 1) determinants
of the northwest i × j sub-matrix of a matrix of variables. In fact, it is sufficient to impose only those rank
conditions r(π)ij such that (i, j) is an essential box for π.
Hereafter we call the determinants corresponding the to essential rank conditions, or the analogous determinants for any ideal generated by northwest rank conditions, the Fulton generators.
One special form of ideal generating set is a Gröbner basis. To define a Gröbner basis we set
a total ordering on the monomials in a polynomial ring such that 1 ≤ m and m < n implies
mp < np for all monomials m, n and p. Let init f denote the largest monomial that appears in the
polynomial f. A Gröbner basis for the ideal I is a set {f1 , . . . fr } ⊆ I such that init I := hinit f : f ∈
Ii = hinit f1 , . . . init fr i. Notice that a Gröbner basis for I is necessarily a generating set for I.
2
The antidiagonal of a matrix is the diagonal series of cells in the matrix running from the most
northeast to the most southwest cell. The antidiagonal term (or antidiagonal) of a determinant
is the product of the entries in the antidiagonal. For example, the antidiagonal of ac db is the
cells occupied by b and c, and correspondingly, in the determinant ad − bc the antidiagonal term
is bc. Term orders that select antidiagonal terms from a determinant, called antidiagonal term
orders have proven especially useful in understanding ideals of matrix Schubert varieties. There
are several possible implementations of an antidiagonal term order on an n×n matrix of variables,
any of which would suit the purposes of this paper. One example is weighting the top right entry
highest and decreasing along the top row before starting deceasing again at the right of the next
row; monomials are then ordered by their total weight.
Theorem 1.2 ( [KM05]). The Fulton generators for Iπ form a Gröbner basis under any antidiagonal term
order.
Typically we will denote the cells of a matrix that form antidiagonals by A or B. In what follows if A is the antidiagonal of a sub-matrix of M we will use the notation det(A) to denote the
determinant of this sub-matrix. We shall be fairly liberal in exchanging antidiagonal cells and the
corresponding antidiagonal terms, thus, for any antidiagonal term order, A = init det(A).
1.2. Statement of Result. Let I1 , . . . Ir be ideals defined by northwest rank conditions. We will
produce a Gröbner basis, and hence ideal generating set, for I1 ∩ · · · ∩ Ir . For each list of antidiagonals A1 , . . . , Ar , where Ai is the antidiagonal of a Fulton generator of Ii , we will produce a
Gröbner basis element gA1 ,...,Ar for ∩Ii . The generators gA1 ,...,Ar will be products of determinants,
though not simply the product of the r determinants corresponding to the Ai . For a fixed list of
antidiagonals A1 , . . . , Ar , build the generator gA1 ,...,Ar by:
(1) Begin with gA1 ,...,Ar = 1
(2) Draw a diagram with a dot of color i in each box of Ai and connect the consecutive dots of
color i with a line segment of color i.
(3) Break the diagram into connected components. Two dots are connected if they are either
connected by lines or are connected by lines to dots that occupy the same box.
(4) For each connected component, remove the longest series of boxes B such that there is
exactly one box in each row and column and the boxes are all in the same connected component. If there is a tie use the most northwest of the longest series of boxes. Note that B
need not be any of A1 , . . . , Ar . Multiply gA1 ,...,Ar by det(B). Remove this antidiagonal from
the diagram of the connected component, break the remaining diagram into components
and repeat.
Theorem 1.3. {gA1 ...Ar : Ai is an antidiagonal of a Fulton generator of Ii , 1 ≤ i ≤ r} form a Gröbner
basis, and hence a generating set, for ∩ri=1 Ii .
1.3. Acknowledgements. This work constitutes a portion of my PhD thesis completed at Cornell
University under the direction of Allen Knutson. I wish to thank Allen for his help, advice and
encouragement in completing this project. Thanks also go to Jenna Rajchgot for helpful discussions in the early stages of this work. I’d also like to thank the authors of computer algebra system
Macaulay2, [GS] which powered the computational experiments nessecary to do this work. I’m especially grateful to Mike Stillman who patiently answered many of my Macaulay2 questions over
the course of this work. Kevin Purbhoo gave very helpful comments on drafts of this manuscript
for which I cannot thank him enough.
2. E XAMPLES
We delay the proof of Theorem 1.3 to Section 3 and first give some examples of the generators
produced for given sets of antidiagonals. These examples are given by pictures of the antidiagonals on the left and corresponding determinantal equations on the right. Note that we only give
3
particular generators, rather than entire generating sets, which might be quite large. We then give
entire ideal generating sets for two smaller intersections.
If r = 1 then for each Fulton generator with antidiagonal A the algorithm produces the generator gA = det(A). Therefore, if we intersect only one ideal the algorithm returns the original set of
Fulton generators. The generator for the antidiagonal shown is exactly the determinant of the one
antidiagonal pictured:
m1,1 m1,2 m1,4
m3,1 m3,2 m3,4
m4,1 m4,2 m4,4
.
The generator for two disjoint antidiagonals is the product of the determinants corresponding
to the two disjoint antidiagonals:
m1,1 m1,2
m2,1 m3,2
m1,1 m1,2 m1,4
m3,1 m3,2 m3,4
m4,1 m4,2 m4,4
.
In general, if A1 , . . . Ar are disjoint antidiagonals then the then the algorithm looks at each Ai separately as they are part of separate components and the result is that gA1 ,...Ar = det(A1 ) · · · det(Ar ).
If A1 , . . . Ar overlap to form one antidiagonal X then the last step of the algorithm will occur
only once and will produce gA1 ,...Ar = det(X). For example,
m1,1
m2,1
m3,1
m4,1
m1,2
m2,2
m3,2
m4,2
m1,3
m2,3
m3,3
m4,3
m1,4
m2,4
m3,4
m4,4
.
In this example, there are two longest possible antidiagonals, the three cells occupied by the
green dots and the three cells occupied by the red dots. The ones occupied by the green dots are
more northwest, hence the generator for the three antidiagonals shown below is
4
m1,1 m1,2
m2,1 m2,2
m1,2 m1,3 m1,3
m2,2 m2,3 m2,3
m3,2 m3,3 m3,4
m4,2 m4,3
m5,2 m2,2
.
In the picture below, the longest possible anti diagonal uses all of the cells in the green anti
diagonal but only some of the cells in the red antidiagonal, however, there is only one possible
longest antidiagonal. Thus the generator is
m1,1 m1,2
m2,1 m2,2
m1,1
m2,1
m3,1
m4,1
m1,2
m2,2
m3,2
m4,2
m1,4
m2,4
m3,4
m4,4
m1,5
m2,5
m3,5
m4,5
m5,1
.
We now give two examples where the complete ideals are comparatively small. Firstly, we
calculate I(X231 ∪ X312 ) = I(X231 ) ∩ I(X312 ). I(X231 ) = hm1,1 , m2,1 i and I(X312 ) = hm1,1 , m1,2 i. The
antidiagonals and corresponding generators are shown below with antidiagonals from generators
of I(X231 ) shown in red and antidiagonals of generators of I(X312 ) shown in blue. Note that the
antidiagonals are only one cell each in this case.
m1,1
m1,1 m1,2
m1,1 m2,1
m1,2 m2,1
Theorem 1.3 results in
I(X231 ∪ X312 ) = I(X231 ) ∩ I(X312 ) = hm1,1 , m1,1 m1,2 , m1,1 m2,1 , m1,2 m2,1 i.
As a slightly larger example, consider I(X1423 ∪ X1342 ) = I(X1423 ) ∩ I(X1342 ). These generators
are given below in the order that the antidiagonals are displayed reading left to right and top to
bottom. The antidiagonals for I(X1423 are shown in red while the antidigaonals I(X1342 ) are shown
in blue. for Note that the full 4 × 4 grid is not displayed, but only the northwest 3 × 3 portion
where antidiagonals for these two ideals may lie.
5
Here Theorem 1.3 produces
m1,1
m1,1 m1,2
,
m2,1
m2,1 m2,2
m1,1 m1,2
m1,1
+
m3,1 m2,2
m1,1 m1,2
m1,2
+
m2,1 m3,2
m2,2
m1,2
m2,2
m1,1
m1,1 m1,3
,
m2,1 m2,3
m1,3
m2,2
m2,1 m2,2
m3,1 m2,2
m3,1 m1,2
,
m2,1 m2,2
m1,1 m1,3
m3,1 m3,2
m1,1 m1,2
,
m3,1 m2,3
m1,1 m1,3
,
m3,1 m2,3
m1,2 m1,3
m2,2 m2,2
m2,1 m2,2
m3,1 m2,3
m1,1 m1,2 m1,3
, m2,1 m2,2 m2,3
m3,1 m3,2 m3,4
3. P ROOF OF T HEOREM 1.3
We now prove the main result of this paper, Theorem 1.3, which states that the gA1 ,...,Ar generate
I1 ∩ · · · ∩ Ir .
We begin with a few fairly general statements:
Theorem 3.1 ( [Knu]). If {Ii : i ∈ S} are ideals generated by northwest rank conditions then init(∩i∈S Ii ) =
∩i∈S (init Ii ).
Lemma 3.2 ( [KM05]). If J ⊆ K are homogeneous ideals in a polynomial ring such that init J = init K
then J = K.
Lemma 3.3. Let IA and IB be ideals that define schemes of northwest rank conditions and let det(A) ∈ IA
and det(B) ∈ IB be determinants with antidiagonals A and B respectively such that A ∪ B = X and
A ∩ B 6= ∅. Then det(X) is in IA ∩ IB .
Proof. Let VX = V(det(X)), VA = V(IA ) and VB = V(IB ) be the varieties corresponding to the ideals
hdet(X)i, IA and IB . It is enough to show that VA ⊆ VX and VB ⊆ VX .
We will show that given a matrix with antidiagonal X with a sub-matrix with antidiagonal
A ⊆ X where the sub-matrix northwest of the cells occupied by A has rank at most length(A) − 1
then the full matrix has rank at most length(X) − 1. The corresponding statement for sub-matrix
with antidiagonal B can be proven by replacing A with B everywhere.
The basic idea of this proof is that we know the rank conditions on the rows and columns northwest of those occupied by A. The rank conditions given by A then imply other rank conditions as
adding either a row or a column to a sub-matrix can increase its rank by at most one.
6
column t + 1 column c
rank at most l
northwest of row k − t column c
rank at most l + k − c ≤ k − t − 2
northwest of column k row k − t
rank at most k − 2
row k − t
northwest of column k row k
row k
F IGURE 3.1. The proof of Lemma 3.3. The antidiagonal cells in A are marked in
black and the antidiagonal cells in X − A ⊆ B are marked in white.
Let k be the number of rows, also the number of columns in the antidiagonal X. Let the length
of A be l + 1, so the rank condition on all rows and columns northwest of those occupied by A
is at most l. Assume that the rightmost column of A is c and the leftmost column of A is t + 1.
Notice that this implies that the bottom row occupied by A is k − t, as the antidiagonal element in
column t + 1 is in row k − t. Thus, the northwest (k − t) × c of matrices in VA has rank at most l.
Notice c ≥ (t+1)+(l+1), with equality if A occupies a continuous set of columns, so matrices in
VA have rank at most l in the northwest (k−t)×(t+l+2). Adding k−c ≤ k−(n−t−l−2) columns to
this sub-matrix gives a (k−t)×k sub-matrix with rank at most l+k−c ≤ r+(k−t−l−2) = k−t−2.
Further, by the same principle, moving down t rows, the northwest k × k, i.e. the whole matrix
with antidiagonal X, has rank at most k − t − 2 + t = k − 2, hence has rank at most k − 1 and so is
in VX .
For a visual explanation of the proof of Lemma 3.3 see Figure 3.1.
Lemma 3.4. gA1 ,...,Ar ∈ Ii for 1 ≤ i ≤ r and hence
hgA1 ,...,Ar : Ai ranges over all antidiagonals for Fulton generators of Ii i ⊆ ∩ri=1 Ii .
Proof. Fix i. Let S be the first antidiagonal containing a box occupied by a box contained in Ai
added to gA1 ,...,Ar . We shall show that det(S) is in Ii and hence gA1 ,...,Ar ∈ Ii as it is a multiple of
det(S). If Ai ⊆ S then det(S) ∈ Ii either because S = Ai or S ( Ai in which case we apply Lemma
3.3. Otherwise, |S| ≥ |Ai | and S is weakly to the northwest of Ai . Therefore, there is a subset B
of S such that |B| = |Ai |, and B is weakly northwest of Ai . Hence, B is an antidiagonal for some
determinant in Ii , and again by Lemma 3.3 det(S) ∈ Ii .
Lemma 3.5. init gA1 ,...,Ar = A1 ∪ · · · ∪ Ar under any antidiagonal term order.
Proof. init gA1 ,...,Ar is a product of determinants, with collective antidiagonals A1 ∪ · · · ∪ Ar .
When we combine Lemma 3.5 and Theorem 3.1 we see that inithgA1 ,...Ar i = init(∩Ii ). Then,
Lemmas 3.2 and 3.4 combine to complete the proof of Theorem 1.3.
7
Note that Theorem 1.3 may produce an oversupply of generators. For example, if I1 = I2 , then
inputting the same set of p Fulton generators twice results in a Gröbner basis of p2 polynomials
for I1 ∩ I2 = I1 = I2 .
R EFERENCES
Nantel Bergeron and Sara Billey, RC-graphs and Schubert polynomials, Experiment. Math. 2 (1993), no. 4, 257–
269. MR 1281474 (95g:05107)
[Ful92] William Fulton, Flags, Schubert polynomials, degeneracy loci, and determinantal formulas, Duke Math. J. 65 (1992),
no. 3, 381–420. MR 1154177 (93e:14007)
[GS]
Daniel R. Grayson and Michael E. Stillman, Macaulay2, a software system for research in algebraic geometry,
Available at http://www.math.uiuc.edu/Macaulay2/.
[KM05] Allen Knutson and Ezra Miller, Gröbner geometry of Schubert polynomials, Ann. of Math. (2) 161 (2005), no. 3,
1245–1318. MR 2180402 (2006i:05177)
[KMS06] Allen Knutson, Ezra Miller, and Mark Shimozono, Four positive formulae for type A quiver polynomials, Invent.
Math. 166 (2006), no. 2, 229–325. MR 2249801 (2007k:14098)
[Knu]
Allen Knutson, Frobenius splitting, point-counting and degeneration, Preprint, arXiv:0911.4941v1.
[MS05] Ezra Miller and Bernd Sturmfels, Combinatorial commutative algebra, Graduate Texts in Mathematics, vol. 227,
Springer-Verlag, New York, 2005. MR 2110098 (2006d:13001)
[Zel85] A. V. Zelevinskiı̆, Two remarks on graded nilpotent classes, Uspekhi Mat. Nauk 40 (1985), no. 1(241), 199–200.
MR 783619 (86e:14027)
[BB93]
8
| 0math.AC
|
An O(log k log2 n)-competitive Randomized Algorithm for the
k-Sever Problem
arXiv:1510.07773v1 [cs.DS] 27 Oct 2015
Wenbin Chen∗†‡
Abstract
In this paper, we show that there is an O(log k log2 n)-competitive
randomized algorithm for the k-sever problem on any metric space
with n points, which improved the previous best competitive ratio
O(log2 k log3 n log log n) by Nikhil Bansal et al. (FOCS 2011, pages 267276).
Keywords: k-sever problem; Online algorithm; Primal-Dual method;
Randomized algorithm;
1
Introduction
The k-sever problem is to schedule k mobile servers to serve a sequence of requests in a metric
space with the minimum possible movement distance. In 1990, Manasse et al. introduced the ksever problem as a generalization of several important online problems such as paging and caching
problems [29] ( Its conference version is [28]), in which they proposed a 2-competitive algorithm
for the 2-sever problem and a n − 1-competitive algorithm for the n − 1 sever problem in a n-point
metric space. They still showed that any deterministic online algorithm for the k-sever problem is
of competitive ratio at least k. They proposed the well-known k-sever conjecture: for the k-sever
problem on any metric space with more than k different points, there exists a deterministic online
algorithm with competitive ratio k.
It was in [29] shown that the k-sever conjecture holds for two special cases: k = 2 and n = k + 1.
The k-sever conjecture also holds for the k-sever problem on a uniform metric. The special case
of the k-sever problem on a uniform metric is called the paging (also known as caching) problem.
Slator and Tarjan have proposed a k-competitive algorithm for the paging problem [31]. For some
other special metrics such as line, tree, there existed k-competitive online algorithms. Yair Bartal
∗
Email:[email protected]
Department of Computer Science, Guangzhou University, P.R. China
‡
State Key Laboratory for Novel Software Technology, Nanjing University, P.R. China
†
1
and Elias Koutsoupias show that the Work Function Algorithm for the k-sever problem is of kcompetitive ratio in the following special metric spaces: the line, the star, and any metric space
with k + 2 points [16]. Marek Chrobak and Lawrence L. Larmore proposed the k-competitive
Double-Coverage algorithm for the k-sever problem on trees [21].
For the k-sever problem on the general metric space, the k-sever conjecture remain open. Fiat
et al. were the first to show that there exists an online algorithm of competitive ratio that depends
only on k for any metric space: its competitive ratio is Θ((k!)3 ). The bound was improved later
by Grove who showed that the harmonic algorithm is of competitive ratio O(k2k ) [25]. The result
was improved to (2k log k) by Y.Bartal and E. Grove [14]. A significant progress was achieved by
Koutsoupias and Papadimitriou, who proved that the work function algorithm is of competitive
ratio 2k − 1 [27].
Generally, people believe that randomized online algorithms can produce better competitive
ratio than their deterministic counterparts. For example, there are several O(log k)-competitive
algorithms for the paging problem and a Ω(log k) lower bound on the competitive ratio in [24, 30,
1, 4]. Although there were much work [17, 13, 15], the Ω(log k) lower bound is still best lower bound
in the randomized case. Recently, N. Bansal et al. propose the first polylogaritmic-competitive
randomized algorithm for the k-sever problem on a general metrics spcace [3]. Their randomized
algorithm is of competitive ratio O(log2 k log3 n log log n) for any metric space with n points, which
improves on the deterministic 2k − 1 competitive ratio of Koutsoupias and Papadimitriou whenever
n is sub-exponential k.
For the k-server problem on the general metric space, it is widely conjectured that there is an
O(log k)-competitive randomized algorithm, which is called as the randomized k-server conjecture.
For the paging problem ( it corresponds to the k-sever problem on a uniform metric), there is
O(log k)-competitive algorithms [24, 30, 1]. For the weighted paging problem ( it corresponds to the
k-sever problem on a weighted star metric space), there were also O(log k)-competitive algorithms
[4, 9] via the online primal-dual method. More extensive literature on the k-server problem can be
found in [26, 18].
In this paper, we show that there exists a randomized k-sever algorithm of O(log k log2 n)competitive ratio for any metric space with n points, which improved the previous best competitive
ratio O(log2 k log3 n log log n) by Nikhil Bansal et al. [3].
In order to get our results, we use the online primal-dual method, which is developed by Buchbinder and Naor et al. in recent years. Buchbinder and Naor et al. have used the primal-dual
method to design online algorithms for many online problems such as covering and packing problems, the ad-auctions problem and so on [4, 5, 6, 7, 8, 10]. First, we propose a primal-dual
formulation for the fraction k-sever problem on a weighted hierarchical well-separated tree (HST).
Then, we design an O(ℓ log k)-competitive online algorithm for the fraction k-sever problem on a
weighted HST with depth ℓ. Since any HST with n leaves can be transformed into a weighted
HST with depth O(log n) with any leaf to leaf distance distorted by at most a constant [3], thus,
we get an O(log k log n)-competitive online algorithm for the fraction k-sever problem on an HST.
Based on the known relationship between the fraction k-sever problem and the randomized k-sever
problem, we get that there is an O(log k log n)-competitive randomized algorithm for the k-sever
problem on an HST with n points. By the metric embedding theory [22], we get that there is an
O(log k log2 n)-competitive randomized algorithm for the k-sever problem on any metric space with
n points.
2
2
Preliminaries
In this section, we give some basic definitions.
Definition 2.1. (Competitive ratio adapted from [32]) For a deterministic online algorithm DALG,
we call it r-competitive if there exists a constant c such that for any request sequence ρ, costDALG (ρ) ≤
r · costOP T (ρ) + c, where costDALG (ρ) and costOP T (ρ) are the costs of the online algorithm DALG
and the best offline algorithm OP T respectively.
For a randomized online algorithm, we have a similar definition of competitive ratio:
Definition 2.2. (Adapted from [32]) For a randomized online algorithm RALG, we call it rcompetitive if there exists a constant c such that for any request sequence ρ, E[costRALG (ρ)] ≤
r · costOP T (ρ) + c, where E[costRALG (ρ)] is the expected cost of the randomized online algorithm
RALG.
In order to analyze randomized algorithms for the k-sever problem, D. Türkouğlu introduce the
fractional k-sever problem [32]. On the fractional k-sever problem, severs are viewed as fractional
entities as opposed to units and an online algorithm can move fractions of servers to the requested
point.
Definition 2.3. (Fractional k-sever problem adapted from [32]) Suppose that there are a metric
space S and a total of k fractional severs located at the points of the metric space. Given a sequence
of requests, each request must be served by providing one unit server at requested point, through
moving fractional servers to the requested point. The cost of an algorithm for servicing a sequence
of requests is the cumulative sum of the distance incurred by each sever, where moving a w fraction
of a server for a distance of δ costs wδ.
In [11, 12], Bartal introduce the definition of a Hierarchical Well-Separated Tree (HST), into
which a general metric can be embedded with a probability distribution. For any internal node, the
distance from it to its parent node is σ times of the distance from it to its child node. The number
σ is called the stretch of the HST. An HST with stretch σ is called a σ-HST. In the following, we
give its formal definition.
Definition 2.4. (Hierarchically Well-Separated Trees (HSTs)[20]). For σ > 1, a σ-Hierarchically
Well-Separated Tree (σ-HST) is a rooted tree T = (V, E) whose edges length function d satisfies the
following properties:
(1). For any node v and any two children w1 , w2 of v, d(v, w1 ) = d(v, w2 ).
(2). For any node v, d(p(v), v) = σ · d(v, w), where p(v) is the parent of v and w is a child of v.
(3). For any two leaves v1 and v2 , d(p(v1 ), v1 ) = d(p(v2 ), v2 ).
Fakcharoenphol et al. showed the following result [22].
Lemma 2.5. If there is a γ-competitive randomized algorithm for the k-sever problem on an σ-HST
with all requests at the n leaves, then there exists an O(γσ log n)- competitive randomized online
algorithm for the k-server problem on any metric space with n points.
We still need the definition of a weighted hierarchically well-separated tree introduced in [3].
3
Definition 2.6. (Weighted Hierarchically Well-Separated Trees (Weighted HSTs)[3]). A weighted
σ-HST is a rooted tree satisfying the property (1), (3) of the definition 2.4 and the property:
d(p(v), v) ≥ σ · d(v, w) for any node v which is not any leaf or the root, where p(v) is the parent of v and w is a child of v.
In [3], Banasl et al. show that an arbitrary depth σ-HST with n leaves can be embedded into
an O(log n) depth weighted σ-HST with constant distortion, which is described as follows.
Lemma 2.7. Let T be a σ-HST T with n leaves which is of possibly arbitrary depth. Then, T can
be transformed into a weighted σ-HST T̃ with depth O(log n) such that: the leaves of T̃ and T are
2σ
factor.
the same, and leaf to leaf distance in T is distorted in T̃ by a at most σ−1
3
An O(log2 k) Randomized Algorithm for the k-Sever Problem on
an HST when n = k + 1
In this paper, we view the k-sever problem as the weighed caching problem such that the cost of
evicting a page out of the cache using another page satisfies the triangle inequality, i.e., a point is
viewed as a page; the set of k points that are served by k severs is viewed as the cache which holds
k pages; the distance of two points i and j is viewed the cost of evicting the corresponding page pi
out of the cache using the corresponding page pj .
Let [n] = {p1 , . . . , pn } denotes the set of n pages and d(pi , pj ) denotes the cost of evicting
the page pi out of the cache using the page pj for any pi , pj ∈ [n], which satisfies the triangle
inequality: for any pages i, j, s, d(pi , pi ) = 0; d(pi , pj ) = d(pj , pi ); d(pi , pj ) ≤ d(pi , ps ) + d(ps , pj ).
Let p1 , p2 , . . . , pM be the requested pages sequence until time M , where pt is the requested page at
time t. At each time step, if the requested page pt is already in the cache then no cost is produced.
Otherwise, P
the page pt must be fetched into the cache by evicting some other pages p in the cache
and a cost
d(p, pt ) is produced.
In this section, in order to clearly describe our algorithm design idea, we consider the case
n = k + 1.
First, we give some notations. Let σ-HST denote a hierarchically well-separated trees with
stretch factor σ. Let N be the number of nodes in a σ-HST and leaves be p1 , p2 , · · · , pn . Let ℓ(v)
denote the depth of a node v. Let r denote the root node. Thus, ℓ(r) = 0. For any leaf p, let ℓ
denote its depth, i.e. ℓ(p) = ℓ. Let p(v) denote the parent node of a node v. C(v) denote the set
of children of a node v. Let D denote the distance from the root to its a child. D(v) denote the
D
.
distance from a node v to its parent, i.e. D(v) = d(v, p(v)). It is easy to know that D(v) = σℓ(v)−1
Let Tv denote the subtree rooted at v and L(Tv ) denote the set of leaves in Tv . Let |Tv | denote the
number of the leaves in Tv . For a leaf pi , let A(pi , j) denote the ancestor node of pi at the depth
j. Thus, A(pi , ℓ) is pi , A(pi , 0) is the root r and so on. At time t, let variable xpi ,t denote the
fraction of pi that is in
Pthe cache and upi ,t denote the fraction
Pof pi that is out of cache. Obviously,
xpi ,t + upi ,t = 1 and
xp,t = k. For a node v, let uv,t =
up,t , i.e., it is the total fraction of
p∈[n]
p∈L(Tv )
P
pages in the subtree Tv which is out of the cache. It is easy to see that uv,t =
uw,t. Suppose
w∈C(v)
that at time 0, the set of initial k pages in the cache is I = {pi1 , . . . , pik }.
At time t, when the request pt arrives, if page pt is fetched mass ∆(pt , p) into the cache by
evicting out the page p in the cache, then the evicting cost is d(p, pt ) · ∆(pt , p). For a σ-HST metric,
4
suppose the path from pt to p in it is: pt , vj , . . . , v1 , v, v1′ , . . . , vj′ , p, where v is the first common
ancestor node of pt and p. By the definition of a σ-HST, we have D(pt ) = D(p) and D(vi ) = D(vi′ )
j
j
j
P
P
P
for any 1 ≤ i ≤ j. Thus, d(p, pt ) = D(pt ) +
D(vi ) + D(p) +
D(vi′ ) = 2D(pt ) +
2D(vi ). So,
the evicting cost is (2D(pt )+
cost incurred at time t is
N
P
j
P
i=1
i=1
i=1
2D(vi ))·∆(pt , p). Since p can be any page in [n]\{pt }, the evicting
i=1
2D(v) max{0, uv,t−1 − uv,t }. Thus, we give the LP formulation for the
v=1
fractional k-sever problem on a σ-HST as follows.
M P
N
M
P
P
(P)
Minimize
2D(v)zv,t +
∞ · upt ,t
t=1 v=1
t=1 P
up,t ≥ |S| − k;
Subject to ∀t > 0 and S ⊆ [n] with |S| > k,
p∈S
P
(up,t−1 − up,t );
∀t > 0 and a subtree Tv (v 6= r), zv,t ≥
(3.1)
(3.2)
p∈L(Tv )
∀t > 0 and node v, zv,t , uv,t ≥ 0;
(3.3)
For t = 0 and any leaf node p ∈ I, up,0 = 0;
(3.4)
For t = 0 and any leaf node p 6∈ I, up,0 = 1;
(3.5)
The first primal
constraintP
(3.1) states that
Pat any time t, if we take any set S of vertices with
P
xp,t = |S| − k, i.e., the total number of pages out
xp,t ≥ |S| −
up,t = |S| −
|S| > k, then
p∈S
p∈S
p∈[n]
of the cache is at lease |S| − k. The variables zv,t denote the total fraction mass of pages in Tv that
are moved out of the subtree Tv (Obviously, it is not needed to define a variable zr,t for the root
node). The fourth and fifth constraints ((3.4) and (3.5)) enforce the initial k pages in the cache
are pi1 , . . . , pik . The first term in the object function is the sum of the moved cost out of the cache
and the second term enforces the requirement that the page pt must be in the cache at time t (i.e.,
upt ,t = 0).
Its dual formulation is as follows.
M
P
P
P
γp
(|S| − k)aS,t +
(D)
Maximize
t=1 S⊆[n],|S|>k
Subject to ∀t and p ∈ [n] \ {pt },
p6∈I
P
aS,t −
S:p∈S
∀t = 0 and ∀p ∈ [n], γp −
ℓ
P
ℓ
P
(b(A(p,j),t+1 − b(A(p,j),t ) ≤ 0
(3.6)
j=1
bA(p,j),1 ≤ 0
(3.7)
j=1
∀t > 0 and any subtree Tv , bv,t ≤ 2D(v)
(3.8)
∀t > 0 and v and |S| > k, aS,t , bv,t ≥ 0
(3.9)
In the dual formulation, the variable aS,t corresponds to the constraint of the type (3.1); the
variable bv,t corresponds to the constraint of the type (3.2); The variable γp corresponds to the
constraint of the type (3.4) and (3.5).
Based on above primal-dual formulation, we extend the design idea of Bansal et al.’s primaldual algorithm for the metric task system problem on a σ-HST [10] to the k-sever problem on a
σ-HST. The design idea of our online algorithm is described as follows. During the execution of
our algorithm, it always maintains the following relation between the primal variable uv,t and dual
bv,t+1
ln(1 + k)) − 1). When the request pt arrives at
variable bv,t+1 : uv,t = f (bv,t+1 ) = |Tkv | (exp( 2D(v)
time t, the page pt is gradually fetched into the cache and other pages are gradually moved out of
5
the cache by some rates until pt is completely fetched into the cache(i.e, upt ,t is decreased at some
rate and other up,t is increased at some rate for any p ∈ [n] \ {pt } until upt ,t becomes 0). It can be
viewed that we move mass upt ,t out of leaf pt through its ancestor nodes and distribute it to other
leaves p ∈ [n] \ {pt }. In order to compute the exact distributed amount at each page p ∈ [n] \ {pt },
the online algorithm should maintain the following invariants:
1. ( Satisfying Dual Constraints:) It is tight for all dual constraints of type (3.6) on other
leaves [n] \ {pt }.
P
2. (Node Identity Property:) uv,t =
uw,t holds for each node v,.
w∈C(v)
We give more clearer description of the online algorithm process. At time t, when the request
pt arrives, we initially set upt ,t = upt ,t−1 . If upt ,t = 0, then we do nothing. Thus, the primal cost
and the dual profit are both zero. All the invariants continue to hold. If upt ,t 6= 0, then we start
to increase variable aS at rate 1. At each step, we would like to keep the dual constraints (3.6)
tight and maintain the node identity property. However, increasing variable aS violates the dual
constraints(3.6) on leaves in [n] \ {pt }. Hence, we increase other dual variables in order to keep
these dual constraints (3.6) tight. But, increasing these variables may also violate the node identity
property. So, it makes us to update other dual variables. This process results in moving initial upt ,t
mass from leaf pt to leaves [n] \ {pt }. We stop the updating process when upt ,t become 0.
In the following, we will compute the exact rate at which we should move mass upt ,t from pt
through its ancestor nodes at time t to other leaves in [n] \ {pt } in the σ-HST. Because of the space
limit, we put proofs of the following some claims in the Appendix. First, we show one property of
the function f .
Lemma 3.1.
duv,t
dbv,t+1
Proof. Since uv,t =
claim.
=
ln(1+k)
2D(v) (uv,t
bv,t+1
|Tv |
k (exp( 2D(v)
+
|Tv |
k ).
ln(1 + k)) − 1), we take the derivative over bv,t+1 and get the
In order to maintain the Node Identity Property: uv,t =
P
uw,t for each node v at any
w∈C(v)
time t, when uv,t is increased or decreased, it is also required to increase or decrease the children
of v at some rate. The connection between these rates is given.
Lemma 3.2. For a node v, if we increase variable bv,t+1 at rate h, then we have the following
equality:
P dbw,t+1
dbv,t+1
|Tv |
1
=
· (uw,t + |Tkv | )
σ (uv,t + k ) ·
dh
dh
w∈C(v)
We need one special case of lemma 3.2: when the variable bv,t+1 is increased (decreased) at rate
h, it is required that the increasing (decreasing) rate of all children of v is the same. By above
lemma, we get:
Lemma 3.3. For v a node, assume that we increase (or decrease ) the variable bv,t+1 at rate h. If
the increasing (or decreasing ) rate of each w ∈ C(v) is the same, then in order to keep the Node
Identity Property, we should set the increasing (or decreasing ) rate for each child w ∈ C(v) as
follows:
db
dbw,t+1
= σ1 · v,t+1
dh
dh
Repeatedly applying this lemma, we get the following corollary.
6
Corollary 3.4. For a node v with ℓ(v) = j and a path P from leaf pi ∈ Tv to v, if bv,t+1 is increased
( or decreased) at rate h and the increasing (decreasing) rate of all children of any v ′ ∈ P is the
P dbv′ ,t+1
db
1
) = (1 + Θ( σ1 )).
= v,t+1
· ψ(j), where ψ(j) = (1 + σ1 + σ12 + · · · + σℓ−j
same, then
dh
dh
v′ ∈P
We still require the following special case of lemma 3.2. Let w1 be the first child of the node
v. Assume that bw1 ,t+1 is increased (or decreased) at some rate and the rate of increasing (or
decreasing) bw′ ,t+1 is the same for every w′ ∈ C(v), w′ 6= w1 . If bv,t+1 is unchanged, then the
following claim should hold.
Lemma 3.5. Let w1 , . . . , wm be the children of a node v. Assume that we increase (or decrease)
db ′
db i ,t+1
w1 at rate h and also increase w2 to wm at the same rate h. For i ≥ 2, let wdh,t+1 be wdh
. If
we would like to maintain the amount uv,t unchanged, then we should have:
dbw′ ,t+1
dh
|T (w1 )|
k
|T (v)|
uv,t + k
uw1 ,t +
=
· (−
dbw1 ,t+1
dh
+
dbw′ ,t+1
)
dh
Theorem 3.6. When request pt arrives at time t, in order to keep the dual constraints tight
and node identity property, if aS,t is increased with rate 1, we should decrease every bA(pt ,j),t+1
(1 ≤ j ≤ ℓ) with rate:
dbA(pt ,j),t+1
daS,t
2+
1
|T
|T
|
|
n−1
= ψ(j)
[(uA(pt ,j),t + A(pk t ,j) )−1 − (uA(pt ,j−1),t + A(ptk,j−1) )−1 ].
For each sibling w of A(pt , j), increase bw,t+1 with the following rate:
dbw,t+1
daS,t
=
1
2+ n−1
ψ(j) (uA(pt ,j−1),t
+
|TA(pt ,j−1) | −1
)
k
Thus, we design an online algorithm for the fractional k-sever problem as follows (see Algorithm
3.1).
1:
2:
3:
4:
5:
6:
At time t = 0, we set bp,1 = γp = 0 for all p and set bA(p,j),1 = 0 for any 1 ≤ j ≤ ℓ.
At time t ≥ 1, when a request pt arrives:
Initially, we set up,t = up,t−1 for all p, and bp,t+1 is initialized to bp,t .
If upt ,t = 0, then do nothing.
Otherwise, do the following:
P
xp,t = k = n − 1. So, S = [n].
Let S = {p : up,t < 1}. Since k = n − 1, |S| >
x∈S
While upt ,t 6= 0:
8:
Increasing aS,t with rate 1;
9:
For each 1 ≤ j ≤ ℓ, decrease every bA(pt ,j),t+1 with rate:
7:
dbA(pt ,j),t+1
daS,t
2+
1
|T
|
|T
|
n−1
= ψ(j)
[(uA(pt ,j),t + A(pk t ,j) )−1 − (uA(pt ,j−1),t + A(ptk,j−1) )−1 ],
For each sibling w of A(pt , j), increase bw,t+1 with the following rate:
10:
11:
12:
dbw,t+1
daS,t
13:
For any
1
σ
·
1
2+ n−1
|TA(pt ,j−1) | −1
)
k
ψ(j) (uA(pt ,j−1),t +
node v ′ in the path from w to a leaf
=
dbv′ ,t+1
dh
in Tw , if w′ be the child of v ′ ,
dbw′ ,t+1
dh
=
Algorithm 3.1: The online primal-dual algorithm for the fractional k-sever problem on a σ-HST.
Theorem 3.7. The online algorithm for the fractional k-sever problem on a σ-HST is of competitive
ratio 15 ln2 (1 + k).
7
In [32], Duru Türkoğlu study the relationship between fractional version and randomized version
of the k-sever problem, which is given as follows.
Lemma 3.8. The fractional k-sever problem is equivalent to the randomized k-sever problem on
the line or circle, or if k = 2 or k = n − 1 for arbitrary metric spaces.
Thus, we get the following conclusion:
Theorem 3.9. There is a randomized algorithm with competitive ratio 15 ln2 (1 + k) for the k-sever
problem on a σ-HST when n = k + 1.
By lemma 2.5, we get the following conclusion:
Theorem 3.10. There is an O(log2 k log n) competitive randomized algorithm for the k-sever problem on any metric space when n = k + 1 .
4
An O(ℓ log k)-competitive Fractional Algorithm for the k-Sever
Problem on a Weighted HST with Depth ℓ
In this section, we first give an O(ℓ log k)-competitive fractional algorithm for the k-Sever problem
on a weighted σ-HST with depth ℓ.
We give another some notations for a weighted HST. Let T̃ be a weighted σ-HST. For a node
D(v)
= d(p(v),v)
whose depth is j, let σj = D(w)
d(v,w) where w is a child of v. By the definition of a weighted σHST, σj ≥ σ for all 1 ≤ j ≤ ℓ−1. For a node v ∈ T̃ , if any leaf p ∈ L(T (v)) such that up,t = 1, we call
it a full node. By this definition, for a full node, uv,t = |L(Tv )|. Otherwise, we call it non-full node.
Let N F C(v) is the set of non-full children node of v, i.e., N F C(v) = {w|w ∈ C(v) and w is a non-full
node }. For a node v, let N L(Tv ) denote the set of non-full leaf nodes in T̃v . Let S = {p|up,t < 1}.
Let P ′ denotes the path from pt to root r: {A(pt , ℓ) = Pt , A(pt , ℓ−1), . . . , A(pt , 1), . . . , A(pt , 0) = r}.
For a node v ∈ P ′ , if there exists a p ∈ S\{pt } such that v is the first common ancestor of pt and p, we
call it a common ancestor node in P ′ . Let CA(pt , S) denote the set of common ancestor nodes in P ′ .
Suppose thatP
CA(pt , S) = {A(pt , ℓh ), . . . , A(pt , ℓ2 ), A(pP
t , ℓ1 )}, where ℓ1 < ℓ2 < . . . < ℓh . For a node
uw,t . Thus, for a full node v, uv,t = 0.
up,t . It is easy to know that uv,t =
v, let uv,t =
p∈S
w∈N F C(v)
For any ℓh < j < ℓ, uA(pt ,j),t = uA(pt ,ℓ),t . For any 0 ≤ j < ℓ1 , uA(pt ,0),t = uA(pt ,j),t = uA(pt ,ℓ1 ),t . For
any ℓi−1 < j < ℓi , uA(pt ,j),t = uA(pt ,ℓi ),t .
The primal-dual formulation for the fractional k-sever problem on a weighted HST is the same
as that on a HST in section 3. Based on the primal-dual formulation, the design idea of our online
algorithm is similar to the design idea in section 3. During the execution of our algorithm, it keeps
the following relation between the primal variable uv,t and dual variable bv,t+1 : uv,t = f (bv,t+1 ) =
bv,t+1
|N L(Tv )|
(exp( 2D(v)
ln(1 + k)) − 1). This relation determines how much mass of upt ,t should be
k
gradually moved out of leaf pt and how it should be distributed among other leaves S \ {pt } until
pt is completely fetched into the cache, i.e. upt ,t = 0. Thus,
P at any time t, the algorithm maintains
up,t = n − k.
a distribution (up1 ,t , . . . , upn ,t ) on the leaves such that
p∈[n]
In order to compute the the exact rate at which we should move mass upt ,t from pt through its
ancestor nodes at time t to other leaves S \ {pt } in the weighted σ-HST, using similar argument to
that in section 3, we get following several claims. Because of the space limit, we put their proofs
in the Appendix.
8
Lemma 4.1.
duv,t
dbv,t+1
Proof. Since uv,t =
claim.
=
ln(1+k)
2D(v) (uv,t
|N L(Tv )|
).
k
+
bv,t+1
|N L(Tv )|
(exp( 2D(v)
k
ln(1 + k)) − 1), we take the derivative over bv,t+1 and get the
Lemma 4.2. For a node v with ℓ(v) = j, if we increase variable bv,t+1 at rate h, then we have the
following equality:
P
dbw,t+1
db
|N L(Tv )|
w )|
1
) · v,t+1
=
· (uw,t + |N L(T
)
σj (uv,t +
k
dh
dh
k
w∈N F C(v)
Lemma 4.3. For v a node with ℓ(v) = j, assume that we increase (or decrease ) the variable bv,t+1
at rate h. If the increasing (or decreasing ) rate of each w ∈ N F C(v) is the same, then in order
to keep the Node Identity Property, we should set the increasing (or decreasing ) rate for each
child w ∈ N F C(v) as follows:
dbw,t+1
db
= σ1j · v,t+1
dh
dh
Repeatedly applying this lemma, we get the following corollary.
Corollary 4.4. For a node v with ℓ(v) = j and a path P from leaf pi ∈ Tv to v, if bv,t+1 is increased
( or decreased) at rate h and the increasing (decreasing) rate of all children of any v ′ ∈ P is the same,
P dbv′ ,t+1
db
= v,t+1
· φ(j), where φ(j) = (1 + σ1j + σj ·σ1j+1 + · · · + σj ·σj+11...σℓ−1 ) ≤ (1 + Θ( σ1 )).
then
dh
dh
v′ ∈P
Lemma 4.5. Let w1 , . . . , wm be the non-full children node of a node v (i.e., any wi ∈ N F C(v)).
Assume that we increase (or decrease) w1 at rate h and also increase w2 to wm at the same rate
db ′
db i ,t+1
. If we would like to maintain the amount uv,t unchanged, then
h. For i ≥ 2, let wdh,t+1 be wdh
we should have:
dbw′ ,t+1
dh
|NL(Tw1 )|
k
v )|
uv,t + |NL(T
k
uw1 ,t +
=
· (−
dbw1 ,t+1
dh
+
dbw′ ,t+1
)
dh
Theorem 4.6. When request pt arrives at time t, in order to keep the dual constraints tight and
node identity property, if aS,t is increased with rate 1, we should decrease every bA(pt ,j),t+1 for each
j ∈ {ℓ1 + 1, ℓ2 + 1, . . . , ℓh + 1} with rate:
dbA(pt ,j),t+1
daS,t
ur,t + |S|
|N L(T
|N L(T
)|
)|
A(pt ,j−1)
A(pt ,j)
= φ(j) k [(uA(pt ,j),t +
)−1 − (uA(pt ,j−1),t +
)−1 ].
k
k
For each sibling w ∈ N F C(v) of A(pt , j), increase bw,t+1 with the following rate:
dbw,t+1
daS,t
|S|
=
ur,t + k
φ(j)
(uA(pt ,j−1),t +
|N L(TA(pt ,j−1) )| −1
)
k
Thus, we design an online algorithm for the fractional k-sever problem on a weighted σ-HST as
follows (see Algorithm 4.1).
Theorem 4.7. The online algorithm for the fractional k-sever problem on a weighted σ-HST with
depth ℓ is of competitive ratio 4ℓ ln(1 + k).
By lemma 2.7, we get:
Theorem 4.8. There exists an O(log k log n)-competitive fractional algorithm for the k-sever problem on any σ-HST.
In [3], Nikhil Bansal et al. show the following conclusion.
9
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
At time t = 0, we set bp,1 = γp = 0 for all p.
At time t ≥ 1, when a request pt arrives:
Initially, we set up,t = up,t−1 for all p, and bp,t+1 is initialized to bp,t .
If upt ,t = 0, then do nothing.
Otherwise, do the following:
Let S = {p : up,t < 1}. Suppose that CA(pt , S) = {A(pt , ℓh ), . . . , A(pt , ℓ2 ), A(pt , ℓ1 )}, where
0 ≤ ℓ1 < ℓ2 < . . . < ℓh < ℓ.
While upt ,t 6= 0:
Increasing aS,t with rate 1;
For each j ∈ {ℓ1 + 1, ℓ2 + 1, . . . , ℓh + 1}, decrease every bA(pt ,j),t+1 with rate:
|S|
dbA(pt ,j),t+1
ur,t + k
=
daS,t
φ(j) [(uA(pt ,j),t
|N L(TA(pt ,j−1) )| −1
) ].
k
+
|N L(TA(pt ,j) )| −1
)
k
− (uA(pt ,j−1),t +
For each sibling w ∈ N F C(v) of A(pt , j), increase bw,t+1 with the following rate:
dbw,t+1
daS,t
ur,t + |S|
|N L(T
)|
A(pt ,j−1)
= φ(j)k (uA(pt ,j−1),t +
)−1
k
14:
For any node v ′ in the path from w to a leaf in N L(Tw ), if w′ ∈ N F C(v ′ ) and
db ′
db ′
ℓ(v ′ ) = j, wdh,t+1 = σ1j · vdh,t+1
15:
For p ∈ S \ {pt }), if some up,t reaches the value of 1, then we update S ← S \ {p} and
16:
the set N F C(v) for each ancestor node v of p.
13:
Algorithm 4.1: The online primal-dual algorithm for the fractional k-sever problem on a weighted
σ-HST.
Lemma 4.9. Let T be a σ-HST with σ > 5. Then any online fractional k-sever algorithm on T can
be converted into a randomized k-sever algorithm on T with an O(1) factor loss in the competitive
ratio.
Thus, we get the following conclusion by Theorem 4.8:
Theorem 4.10. Let T be a σ-HST with σ > 5. There is a randomized algorithm for the k-sever
problem with a competitive ratio of O(log k log n) on T .
By lemma 2.5, we get the following conclusion:
Theorem 4.11. For any metric space, there is a randomized algorithm for the k-sever problem
with a competitive ratio of O(log k log2 n).
5
Conclusion
In this paper, for any metric space with n points, we show that there exist a randomized algorithm
with O(log k log2 n)-competitive ratio for the k-sever problem, which improved the previous best
competitive ratio O(log2 k log3 n log log n).
Acknowledgments
We would like to thank the anonymous referees for their careful readings of the manuscripts and
many useful suggestions.
10
Wenbin Chen’s research has been partly supported by the National Natural Science Foundation
of China (NSFC) under Grant No.11271097., the research projects of Guangzhou education bureau
under Grant No. 2012A074. and the project KFKT2012B01 from State Key Laboratory for Novel
Software Technology, Nanjing University.
References
[1] Dimitris Achlioptas, Marek Chrobak, and John Noga. Competitive analysis of randomized
paging algorithms. Theoretical Computer Science, 234(1-2):203-218, 2000.
[2] Avrim Blum, Carl Burch, and Adam Kalai. Finely-competitive paging. Proceedings of the 40th
Annual Symposium on Foundations of Computer Science, page 450-456, 1999.
[3] Nikhil Bansal, Niv Buchbinder, Aleksander Madry, Joseph Naor. A PolylogarithmicCompetitive Algorithm for the k-Server Problem. FOCS 2011, pages 267-276.
[4] Nikhil Bansal, Niv Buchbinder, and Joseph (Seffi) Naor. A primal-dual randomized algorithm
for weighted paging. Proceedings of the 48th Annual IEEE Symposium on Foundations of
Computer Science, pages 507-517, 2007.
[5] N. Buchbinder, K. Jain, and J. Naor. Online primal-dual algorithms for maximizing ad-auctions
revenue. Proc. 14th European Symp. on Algorithms (ESA), pp. 253-264, 2007.
[6] N. Buchbinder and J. Naor. Online primal-dual algorithms for covering and packing problems.
Proc. 12th European Symp. on Algorithms (ESA), volume 3669 of Lecture Notes in Comput.
Sci., pages 689–701. Springer, 2005.
[7] N. Buchbinder and J. Naor. Improved bounds for online routing and packing via a primal-dual
approach. Proc. 47th Symp. Foundations of Computer Science, pages 293–304, 2006.
[8] Niv Buchbinder, Joseph Naor. The Design of Competitive Online Algorithms via a Primal-Dual
Approach. Foundations and Trends in Theoretical Computer Science 3(2-3): 93–263 (2009).
[9] Nikhil Bansal, Niv Buchbinder, and Joseph (Seffi) Naor. Towards the randomized k-server
conjecture: A primal-dual approach. Proceedings of the 21st Annual ACM- SIAM Symposium
on Discrete Algorithms, pp. 40-55, 2010.
[10] Nikhil Bansal, Niv Buchbinder, and Joseph (Seffi) Naor. Metrical task systems and the ksever problem on HSTs. In ICALP’10: Proceedings of the 37th International Colloquium on
Automata, Languages and Programming, 2010, pp.287-298.
[11] Yair Bartal. Probabilistic approximations of metric spaces and its algorithmic applications.
Proceedings of the 37th Annual IEEE Symposium on Foundations of Computer Science, pages
184-193, 1996.
[12] Yair Bartal. On approximating arbitrary metrices by tree metrics. Proceedings of the 30th
Annual ACM Symposium on Theory of Computing, pages 161-168, 1998.
11
[13] Yair Bartal, Bela Bollobas, and Manor Mendel. A ramsy-type theorem for metric spaces and its
applications for metrical task systems and related problems. Proceedings of the 42nd Annual
IEEE Symposium on Foundations of Computer Science, pages 396-405, 2001.
[14] Yair Bartal and Eddie Grove. The harmonic k-server algorithm is competitive. Journal of the
ACM, 47(1):1-15, 2000.
[15] Yair Bartal, Nathan Linial, Manor Mendel, and Assaf Naor. On metric ramsey-type phenomena. Proceedings of the 35th Annual ACM Symposium on Theory of Computing, pages
463C472, 2003.
[16] Yair Bartal, Elias Koutsoupias. On the competitive ratio of the work function algorithm for
the k-sever problem. Theoretical Computer Science, 324(2-3): 337-345.
[17] Avrim Blum, Howard J. Karloff, Yuval Rabani, and Michael E. Saks. A decomposition theorem
and bounds for randomized server problems. Proceedings of the 31st Annual IEEE Symposium
on Foundations of Computer Science, pages 197-207, 1992.
[18] Allan Borodin and Ran El-Yaniv. Online computation and competitive analysis. Cambridge
University Press, 1998.
[19] M. Chrobak and L. Larmore. An optimal on-line algorithm for k-servers on trees. SIAM Journal
on Computing, 20(1): 144-148, 1991.
[20] A. Coté, A. Meyerson, and L. Poplawski. Randomized k-server on hierarchical binary trees.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pages 227-234,
2008.
[21] B. Csaba and S. Lodha. A randomized on-line algorithm for the k-server problem on a line.
Random Structures and Algorithms, 29(1): 82-104, 2006.
[22] Jittat Fakcharoenphol, Satish Rao, and Kunal Talwar. A tight bound on approximating arbitrary metrics by tree metrics. Proceedings of the 35th Annual ACM Symposium on Theory of
Computing, pages 448-455, 2003.
[23] A. Fiat, Y. Rabani, and Y. Ravid. Competitive k-server algorithms. Journal of Computer and
System Sciences, 48(3): 410-428, 1994.
[24] Amos Fiat, Richard M. Karp, Michael Luby, Lyle A. McGeoch, Daniel Dominic Sleator, and
Neal E. Young. Competitive paging algorithms. Journal of Algorithms, 12(4): 685-699, 1991.
[25] Edward F. Grove. The harmonic online k-server algorithm is competitive. Proceedings of the
23rd Annual ACM Symposium on Theory of Computing, pages 260-266, 1991.
[26] Elias Koutsoupias. The k-sever problem. Computer Science Review. Vol. 3. No. 2. Pages 105118, 2009.
[27] Elias Koutsoupias and Christos H. Papadimitriou. On the k-server conjecture. Journal of the
ACM, 42(5): 971-983, 1995.
12
[28] M.S. Manasse, L.A. McGeoch, and D.D. Sleator. Competitive algorithms for online problems.
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pages 322-333,
1988.
[29] M. Manasse, L.A. McGeoch, and D. Sleator. Competitive algorithms for server problems.
Journal of Algorithms, 11: 208-230, 1990.
[30] Lyle A. McGeoch and Daniel D. Sleator. A strongly competitive randomized paging algorithm.
Algorithmica, 6(6): 816-825, 1991.
[31] Daniel D. Sleator and Robert E. Tarjan. Amortized efficiency of list update and paging rules.
Communications of the ACM, 28(2): 202-208, 1985.
[32] Duru Türkoğlu. The k-sever problem and fractional analysis. Master’s Thesis, The University
of Chicago, 2005. http://people.cs.uchicago.edu/∼duru/papers/masters.pdf.
Appendix
Proofs for claims in section 3
The proof for Lemma 3.2 is as follows:
P
Proof. Since it is required to maintain uv,t =
uw,t, we take the derivative of both sides and
w∈C(v)
get that:
duv,t
dbv,t+1
·
dbv,t+1
dh
P
=
w∈C(v)
By lemma 3.1, we get:
duw,t
dbw,t+1
·
dbw,t+1
dh .
ln(1+k)
2D(v) (uv,t
+
D(v)
Since D(w)
= σ, we get :
P dbw,t+1
dbv,t+1
|Tv |
1
=
σ (uv,t + k ) ·
dh
dh
w∈C(v)
|Tv |
k )
P
=
w∈C(v)
· (uw,t +
dbw,t+1
dh
·
ln(1+k)
2D(w) (uw,t
+
|Tv |
k ).
|Tw |
k )
The proof for Lemma 3.3 is as follows:
Proof. By above Lemma 3.2, if the increasing (or decreasing ) rate of each w ∈ C(v) is the same,
we get that:
P
dbv,t+1
db
db
|Tv |
1
= w,t+1
·
· (uv,t + |Tkv | ).
(uw,t + |Tkw | ) = w,t+1
σ (uv,t + k ) ·
dh
dh
dh
So, we get that:
dbw,t+1
dh
=
1
σ
·
w∈C(v)
dbv,t+1
dh
The proof for Lemma 3.5 is as follows:
Proof. By lemma 3.2, in order to keep the amount uv,t unchanged, we get:
P
dbw1 ,t+1
dbw,t+1
1 )|
· (uw1 ,t + |T (w
)+
· (uw,t + |T (w)|
dh
k
dh
k ) = 0.
Thus,
db 1 ,t+1
( wdh
db
−
db
dbw′ ,t+1
)
dh
′
w∈C(v)\{w1 }
1 )|
· (uw1 ,t + |T (w
)
k
1 ,t+1
So, ( wdh
− wdh,t+1 ) · (uw1 ,t +
Hence, we get the claim.
|T (w1 )|
)
k
+
+
dbw′ ,t+1
dh
dbw′ ,t+1
dh
13
·
·
P
(uw,t +
w∈C(v)
(uv,t + |T (v)|
k )
|T (w)|
k )
=0
=0
The proof for Theorem 3.6 is as follows:
Proof. When request pt arrives at time t, we move mass upt ,t from pt through its ancestor nodes
to other leaves [n] \ {pt }, i.e. upt ,t is decreased and up,t is increased for any p ∈ [n] \ {pt }. Since
these mass moves out of each subtree TA(pt ,j) for each 1 ≤ j ≤ ℓ, uA(pt ,j),t is decreased. By
b
t ,j),t+1
uA(pt ,j),t = f (bA(pt ,j),t+1 ) = |Tkv | (exp( A(p
ln(1 + k)) − 1) (we need to keep this relation during
2D(v)
the algorithm), bA(pt ,j),t+1 also decreases for each 1 ≤ j ≤ ℓ. On the other hand, up,t is increased
for each p ∈ [n] \ {pt }. Thus, for each node v whose Tv doesn’t contain pt , its mass uv,t is also
increased. For each node v whose Tv doesn’t contain pt , it must be a sibling of some node A(pt , j).
For each 1 ≤ j ≤ ℓ, we assume that all siblings v ′ of node A(pt , j) increase bv′ ,t+1 at the same rate.
In the following, we will compute the increasing (or decreasing) rate of all dual variables in the
b
t ,j),t+1
be the decreasing rate of bA(pt ,j),t+1
σ-HST regarding aS . For 1 ≤ j ≤ ℓ, let ∇bj = − A(pda
S
b
regarding aS . For 1 ≤ j ≤ ℓ, let ∇b′j = w,t+1
daS be the increasing rate of bw,t+1 for any siblings w of
A(pt , j) regarding aS .
Using from top to down method, we can get a set of equations about the quantities ∇bj and
∇b′j . First, we consider the siblings of A(pt , 1) ( i.e. those nodes are children of root r, but they
are not A(pt , 1)). Let w be one of these siblings. If bw,t+1 is raised by ∇b′1 , by Corollary 3.4, the
sum of ∇b′ on any path from a leaf in Tw to w must be ψ(1) · ∇b′1 . Since aS is increasing with rate
1, it forces ψ(1) · ∇b′1 = 1 in order to maintain the dual constraint (3) tight for leaves in Tw .
This considers the dual constraints for these leaves. Now, this increasing mass must be canceled
out by decreasing the mass in TA(pt ,1) since the mass ur,t in Tr is not changed. Thus, in order to
maintain the “Node Identity Property” of root, by Lemma 3.5, we must set ∇b1 such that:
∇b′1 = (∇b1 + ∇b′1 ) ·
|T(A(p ,1)) |
t
)
k
(uA(pt ,1),t +
n
1+ n−1
For siblings of node A(pt , 2), we use the similar argument. Let w be a sibling of A(pt , 2).
Consider a path from a leaf in Tw to the w. Their dual constraint (3) already grows at rate
1 + ψ(1)∇b1 . This must be canceled out by increasing bw,t+1 , and if bw,t+1 is raised by ∇b′2 , by
corollary 3.4, the sum of ∇b′ on any path from a leaf in Tw to w must be ψ(2) · ∇b′2 . Thus, ∇b′2
must be set such that: ψ(2) · ∇b′2 = 1 + ψ(1) · ∇b1
Again, this increasing mass must be canceled out by decreasing the mass in TA(pt ,2) . In order
to keep the “Node Identity Property” of A(pt , 1), by Lemma 3.5. we must set ∇b2 such that:
∇b′2 = (∇b2 + ∇b′2 ) ·
|TA(p ,2) |
t
)
k
|T(A(p ,1) |
t
(uA(pt ,1),t +
)
k
(uA(pt ,2),t +
Continuing this method, we obtain a system of linear equations about all ∇bj and ∇b′j (1 ≤
j ≤ ℓ). For maintaining the dual constraints tight, we get the following equations:
ψ(1) · ∇b′1 = 1
ψ(2) · ∇b′2 = 1 + ψ(1) · ∇b1
..
.
ℓ−1
P
ψ(ℓ) · ∇b′ℓ = 1 +
ψ(i)∇bi
i=1
For keeping the node identity property, we get the following equations:
∇b′1 = (∇b1 + ∇b′1 ) ·
|T(A(p ,1)) |
t
)
k
(uA(pt ,1),t +
n
1+ n−1
14
∇b′2 = (∇b2 + ∇b′2 ) ·
..
.
∇b′ℓ
= (∇bℓ +
∇b′ℓ )
·
|T(A(p ,2)) |
t
)
k
|T(A(p ,1)) |
t
(uA(pt ,1),t +
)
k
(uA(pt ,2),t +
|T(A(p ,ℓ)) |
t
)
k
|T(A(p ,ℓ−1)) |
t
)
(uA(pt ,ℓ−1),t +
k
(uA(pt ,ℓ),t +
.
We continue to solve the system of linear equations.
For each 1 ≤ j ≤ ℓ,
j−1
P
ψ(j) · ∇b′j = 1 +
ψ(i)∇bi
=1+
j−2
P
i=1
ψ(i)∇bi + ψ(j − 1)∇bj−1
i=1
= ψ(j − 1) · ∇b′j−1 + ψ(j − 1)∇bj−1
= ψ(j − 1) · (∇b′j−1 + ∇bj−1 ).
|T(A(p ,j−1)) |
t
)
k
|T(A(p ,j−2)) |
t
(uA(pt ,j−2),t +
)
k
|T(A(p ,j−2)) |
t
)
(uA(pt ,j−2),t +
k
|T(A(p ,j−1)) |
t
(uA(pt ,j−1),t +
)
k
Since ∇b′j−1 = (∇bj−1 + ∇b′j−1 ) ·
ψ(j)∇b′j = ψ(j − 1)∇b′j−1 ·
(uA(pt ,j−1),t +
, we get:
Solving the recursion, we get:
n
1+ n−1
∇b′j =
|T(A(p ,j−1)) |
∇bj =
ψ(j)·(uA(pt ,j−1),t +
n
1+ n−1
ψ(j) · [(uA(pt ,j),t
t
k
+
)
|T(A(pt ,j)) | −1
)
k
− (uA(pt ,j−1),t +
|T(A(pt ,j−1)) | −1
) ]
k
The proof for Theorem 3.7 is as follows:
Proof. Let P denote the value of the objective function of the primal solution and D denote the
value of the objective function of the dual solution. Initially, let P = 0 and D = 0. In the following,
we prove three claims:
(1) The primal solution produced by the algorithm is feasible.
(2) The dual solution produced by the algorithm is feasible.
(3) P ≤ 15 ln2 (1 + k)D.
By three claims and weak duality of linear programs, the theorem follows immediately.
First,
we prove the claim (1) as follows. At any time t, since S = [n] and the algorithm keeps
P
= n − k = 1 = |S| − k. So, the primal constraints (3.1) are satisfied.
p∈[n]
Second, we prove the claim (2) as follows. By theorem 3.6, the dual constraints (3.6) are
satisfied. Obviously, dual constraints (3.7) are satisfied. For any node v, if bv,t+1 = 0, then
uv,t = 0; if bv,t+1 = 2D(v), then uv,t = |Tv |. Thus, the dual constraints (3.8) are satisfied.
Third, we prove claim (3) as follows. If the algorithm increases the variables aS,t at some time
∂D
= |S| − k = n − (n − 1) = 1. Let’s compute the primal cost. At depth j(1 ≤ j ≤ ℓ),
t, then: ∂a
S,t
we compute the movement cost of our algorithm by the change of ∇b′j as follows.
P
db′
du
2D(w) · dbw,t
· aSj
′
j
w∈C(A(pt ,j−1))\{A(pt ,j)}
P
= ∇b′j ·
2D(w)
w∈C(A(pt ,j−1))\{A(pt ,j)}
·
ln(1+k)
2D(w) (uw,t
15
+
|Tw |
k )
=
1
2+ n−1
ψ(j)
≤
5
2
P
(uw,t +
w∈C(A(pt ,j−1))\{A(pt ,j)}
|TA(p ,j−1) |
t
uA(p ,j−1),t +
k
P t
|T |
(uw,t + kw )
w∈C(A(pt ,j−1))\{A(pt ,j)}
|TA(p ,j−1) |
t
uA(pt ,j−1),t +
k
|Tw |
)
k
· ln(1 + k) ·
· ln(1 + k) ·
Let Bj denote uA(pt ,j),t +
|TA(pt ,j) |
.
k
P
Then
(uw,t +
w∈C(A(pt ,j−1))\{A(pt ,j)}
|Tw |
k )
= Bj−1 − Bj .
Hence, the total
cost over all ℓ levels is
Pℓ movement
Bj−1 −Bj
5
ln(1
+
k)
·
j=1 Bj−1
2
P
Bj
5
= 2 ln(1 + k) · ℓj=1 (1 − Bj−1
)
P
B
ℓ
j
≤ 52 ln(1 + k) · j=1 ln Bj−1
=
=
5
2
5
2
5
2
5
2
5
2
0
ln(1 + k) · ln B
Bℓ
ln(1 + k) · ln u B0+ 1
pt ,t
k
≤ ln(1 + k) · ln kB0
≤ ln(1 + k) · 2 ln k · B0
1
≤ ln(1 + k) · 2 ln k · (2 + n−1
)
2
= 15 ln (1 + k)
where the first inequality holds since 1 ≤ y − ln y for any 0 ≤ y ≤ 1.
Thus, we get P ≤ 15 ln2 (1 + k)D.
Let OP T be the cost of the best offline algorithm. Pmin be the optimal primal solution and
Dmax be the optimal dual solution. Then, Pmin ≤ OP T since OP T is a feasible solution for the
15 ln2 (1+k)D
P
P
≤
primal program. Based on the weak duality, Dmax ≤ Pmin . Hence, OP
T ≤ Pmin ≤
Pmin
15 ln2 (1+k)Dmax
Pmin
2
min
≤ 15 ln (1+k)P
= 15 ln2 (1 + k).
Pmin
So, the competitive ratio of this algorithm is 15 ln2 (1 + k).
Proofs for claims in section 4
The proof for Lemma 4.2 is as follows:
P
Proof. Since it is required to maintain uv,t =
uw,t, we take the derivative of both sides
w∈N F C(v)
and get that:
dbv,t+1
duv,t
=
dbv,t+1 ·
dh
P
duw,t
dbw,t+1
·
w∈N F C(v)
ln(1+k)
2D(v) (uv,t
By lemma 3.1, we get:
D(v)
Since D(w)
= σj , we get :
db
|N L(Tv )|
1
) · v,t+1
σj (uv,t +
k
dh
=
dbw,t+1
dh .
+
|N L(Tv )|
)
k
P
w∈N F C(v)
dbw,t+1
dh
=
P
w∈N F C(v)
· (uw,t +
dbw,t+1
dh
·
ln(1+k)
2D(w) (uw,t
+
|N L(Tw )|
).
k
|N L(Tw )|
)
k
The proof for Lemma 4.3 is as follows:
Proof. By Lemma 4.2, if the increasing (or decreasing ) rate of each w ∈ N F C(v) is the same, we
get that:
16
1
σj (uv,t
+
db
|N L(Tv )|
) · v,t+1
k
dh
So, we get that:
dbw,t+1
dh
=
=
1
σj
dbw,t+1
dh
·
P
·
(uw,t +
w∈N F C(v)
|N L(Tw )|
)
k
=
dbw,t+1
dh
· (uv,t +
|N L(Tv )|
).
k
dbv,t+1
dh
The proof for Lemma 4.5 is as follows:
Proof. By lemma 4.2, in order to keep the amount uv,t unchanged, we get:
P
dbw1 ,t+1
|N L(Tw1 )|
dbw,t+1
w )|
· (uw1 ,t +
)+
· (uw,t + |N L(T
) = 0.
dh
k
dh
k
Thus,
db 1 ,t+1
( wdh
db
−
db
dbw′ ,t+1
)
dh
w∈N F C(v)\{w1 }
|N L(Tw1 )|
· (uw1 ,t +
)
k
′
1 ,t+1
− wdh,t+1 ) · (uw1 ,t +
So, ( wdh
Hence, we get the claim.
|N L(Tw1 )|
)
k
+
+
dbw′ ,t+1
dh
dbw′ ,t+1
dh
·
·
P
(uw,t +
w∈N F C(v)
v )|
(uv,t + |N L(T
)
k
|N L(Tw )|
)
k
=0
=0
The proof for Theorem 4.6 is as follows:
Proof. When request pt arrives at time t, we move mass upt ,t from pt through its ancestor nodes to
other non-full leaves nodes S \ {pt }, i.e. upt ,t is decreased and up,t is increased for any p ∈ S \ {pt }.
Since these mass moves out of each subtree TA(pt ,j) for each 1 ≤ j ≤ ℓ, uA(pt ,j),t is decreased. By
b
v )|
t ,j),t+1
(exp( A(p
uA(pt ,j),t = f (bA(pt ,j),t+1 ) = |N L(T
ln(1 + k)) − 1) (we need to keep this relation
k
2D(v)
during the algorithm), bA(pt ,j),t+1 also decreases for each 1 ≤ j ≤ ℓ. On the other hand, up,t is
increased for each p ∈ S \ {pt }. Thus, for each non-full node v whose Tv doesn’t contain pt , its mass
uv,t is also increased. For each non-full node v whose Tv doesn’t contain pt , it must be a sibling of
some node A(pt , j) where j ∈ {ℓ1 , . . . , ℓh }. We assume that all siblings v ′ of any node v increase
bv′ ,t+1 at the same rate
In the following, we will compute the increasing (or decreasing) rate of all dual variables in
b
t ,j),t+1
be the decreasing rate of
the weighted σ-HST regarding aS . For 1 ≤ j ≤ ℓ, let ∇bj = − A(pda
S
b
bA(pt ,j),t+1 regarding aS . For each j ∈ {ℓ1 + 1, ℓ2 + 1, . . . , ℓh + 1}, let ∇b′j = w,t+1
daS be the increasing
rate of bw,t+1 for any siblings w ∈ N F C(A(pt , j)) of A(pt , j) regarding aS .
Using from top to down method, we can get a set of equations about the quantities ∇bj and
∇b′j . First, we consider the siblings of A(pt , ℓ1 + 1) ( i.e. those nodes are children of A(pt , ℓ1 ),
but they are not A(pt , ℓ1 + 1)). Let w be one of these siblings. If bw,t+1 is raised by ∇b′ℓ1 +1 , by
Corollary 4.4, the sum of ∇b′ on any path from a leaf in Tw to w must be φ(ℓ1 + 1) · ∇b′ℓ1 +1 . Since
aS is increasing with rate 1, it forces φ(ℓ1 + 1) · ∇b′ℓ1 +1 = 1 in order to maintain the dual constraint
(3) tight for non-full leaf nodes in Tw .
This considers the dual constraints for these non-full leaf nodes. Now, this increasing mass
must be canceled out by decreasing the mass in TA(pt ,ℓ1 +1) since the mass uA(pt ,ℓ1 ),t in TA(pt ,ℓ1 ) is
not changed. Thus, in order to maintain the “Node Identity Property” of A(pt , ℓ1 ), by Lemma 4.5,
we must set ∇b1 such that:
∇b′ℓ1 +1
= (∇bℓ1 +1 +
|NL(T(A(p ,ℓ +1)) )|
t 1
)
k
|S|
uA(pt ,ℓ1 ),t + k
|NL(T(A(p ,ℓ )) )|
t 2
(uA(pt ,ℓ2 ),t +
)
k
|S|
ur + k
∇b′ℓ1 +1 )
= (∇bℓ1 +1 + ∇b′ℓ1 +1 ) ·
·
(uA(pt ,ℓ1 +1),t +
For siblings of node A(pt , ℓ2 +1), we use the similar argument. Let w be a sibling of A(pt , ℓ2 +1).
Consider a path from a non-full leaf node in Tw to the w. Their dual constraint (3.6) already grows
17
at rate 1 + φ(ℓ1 + 1)∇bℓ1 +1 . This must be canceled out by increasing bw,t+1 , and if bw,t+1 is raised
by ∇b′ℓ2 +1 , by corollary 4.4, the sum of ∇b′ on any path from a leaf in Tw to w must be φ(2) · ∇b′2 .
Thus, ∇b′2 must be set such that: φ(ℓ2 + 1) · ∇b′ℓ2 +1 = 1 + φ(ℓ1 + 1) · ∇bℓ1 +1 .
Again, this increasing mass must be canceled out by decreasing the mass in TA(pt ,ℓ2 ) . In order
to keep the “Node Identity Property” of A(pt , ℓ2 ), by Lemma 4.5. we must set ∇bℓ2 +1 such that:
|NL(TA(p ,ℓ +1) )|
t 2
)
k
|NL(T(A(p ,ℓ ) )|
t
2
(uA(pt ,ℓ2 ),t +
)
k
|NL(TA(p ,ℓ ) )|
t
3
(uA(pt ,ℓ3 ),t +
)
k
|NL(T(A(p ,ℓ ) )|
t
2
(uA(pt ,ℓ2 ),t +
)
k
∇b′ℓ2 +1 = (∇bℓ2 +1 + ∇b′ℓ2 +1 ) ·
= (∇bℓ2 +1 + ∇b′ℓ2 +1 ) ·
(uA(pt ,ℓ2 +1),t +
Continuing this method, we obtain a system of linear equations about all ∇bj and ∇b′j (j ∈
{ℓ1 +1, ℓ2 +1, . . . , ℓh +1}). For maintaining the dual constraints tight, we get the following equations:
φ(ℓ1 + 1) · ∇b′ℓ1 +1 = 1
φ(ℓ2 + 1) · ∇b′ℓ2 +1 = 1 + φ(ℓ1 + 1) · ∇bℓ1 +1
..
.
h−1
P
ψ(ℓh + 1) · ∇b′ℓh +1 = 1 +
φ(ℓi + 1)∇bℓi +1
i=1
For keeping the node identity property, we get the following equations:
∇b′ℓ1 +1
= (∇bℓ1 +1 +
∇b′ℓ1 +1 )
·
∇b′ℓ2 +1 = (∇bℓ2 +1 + ∇b′ℓ2 +1 ) ·
..
.
∇b′ℓh +1
= (∇bℓh +1 +
∇b′ℓh +1 )
·
|NL(T(A(p ,1)) )|
t
)
k
|S|
ur + k
|NL(T(A(p ,ℓ )) )|
t 3
)
(uA(pt ,ℓ3 ),t +
k
|NL(T(A(p ,ℓ )) )|
t
2
(uA(pt ,ℓ2 ),t +
)
k
(uA(pt ,ℓ2 ),t +
|NL(T(A(p ,ℓ)) )|
t
)
k
|NL(T(A(p ,ℓ )) )|
t h
(uA(pt ,ℓh ),t +
)
k
(uA(pt ,ℓ),t +
.
We continue to solve the system of linear equations.
For each 1 ≤ j ≤ h,
j−1
P
φ(ℓj + 1) · ∇b′ℓj +1 = 1 +
φ(ℓi + 1)∇bℓi +1
=1+
j−2
P
i=1
i=1
φ(ℓi + 1)∇bℓi +1 + φ(ℓj−1 + 1)∇bℓj−1 +1
= φ(ℓj−1 + 1) · ∇b′ℓj−1 +1 + φ(j − 1)∇bℓj−1 +1
= φ(ℓj−1 + 1) · (∇b′ℓj−1 +1 + ∇bℓj−1 +1 ).
Since
∇b′ℓj−1 +1
= (∇bℓj−1 +1 +
∇b′ℓj−1 +1 ) ·
ψ(ℓj + 1)∇b′ℓj +1 = ψ(ℓj−1 + 1)∇b′ℓj−1 +1 ·
|NL(T(A(p ,ℓ )) )|
t j
)
k
|NL(T(A(p ,ℓ
)|
t j−1 ))
(uA(pt ,ℓj−1 ),t +
)
k
|NL(T(A(p ,ℓ
)|
))
t j−1
)
(uA(pt ,ℓj−1 ),t +
k
|NL(T(A(p ,ℓ )) )|
t j
(uA(pt ,ℓj ),t +
)
k
(uA(pt ,ℓj ),t +
, we get:
Solving the recursion, we get:
∇b′ℓj +1 =
ur + |S|
k
φ(ℓj +1)·(uA(pt ,ℓj ),t +
|NL(T(A(p ,ℓ )) )|
t j
)
k
|S|
∇bℓj +1 =
=
|N L(T(A(pt ,ℓj )) )|
|N L(T(A(pt ,ℓj+1 )) )|
)−1 − (uA(pt ,ℓj ),t +
)−1 ]
k
k
|S|
|N L(T(A(pt ,ℓj +1)) )|
|N L(T(A(pt ,ℓj )) )|
ur + k
)−1 − (uA(pt ,ℓj ),t +
)−1 ]
k
k
φ(ℓj +1) · [(uA(pt ,ℓj +1),t +
ur + k
φ(ℓj +1)
· [(uA(pt ,ℓj+1 ),t +
18
The proof for Theorem 4.7 is as follows:
Proof. Let P denote the value of the objective function of the primal solution and D denote the
value of the objective function of the dual solution. Initially, let P = 0 and D = 0. In the following,
we prove three claims:
(1) The primal solution produced by the algorithm is feasible.
(2) The dual solution produced by the algorithm is feasible.
(3) P ≤ 2 ln(1 + k)D.
By three claims and weak duality of linear programs, the theorem follows immediately.
The proof of claim (1) and (2) are similar to that of claim (1) and (2) in section 3.7.
Third, we prove claim (3) as follows. If the algorithm increases the variables aS,t at some time
∂D
= |S| − k. Let’s compute the primal cost. At depth j ∈ {ℓ1 + 1, ℓ2 + 1, . . . , ℓh + 1},
t, then: ∂a
S,t
we compute the movement cost of our algorithm by the change of ∇b′j as follows.
P
db′
du
2D(w) · dbw,t
· aSj
′
j
w∈N F C(A(pt ,j−1))\{A(pt ,j)}
= ∇b′j
P
2D(w) ·
w∈C(A(pt ,j−1))\{A(pt ,j)}
=
|S|
ur,t + k
φ(j)
P
=
p∈S
=
up,t + |S|
k
φ(j)
P
+
|N L(Tw )|
)
k
P
w )|
)
(uw,t + |NL(T
k
w∈C(A(pt ,j−1))\{A(pt ,j)}
|NL(TA(p ,j−1) )|
t
uA(pt ,j−1),t +
k
P
w )|
(uw,t + |NL(T
)
k
w∈C(A(pt ,j−1))\{A(pt ,j)}
|NL(TA(p ,j−1) )|
t
uA(pt ,j−1),t +
k
· ln(1 + k) ·
P
w )|
)
(uw,t + |NL(T
k
w∈C(A(pt ,j−1))\{A(pt ,j)}
|NL(TA(p ,j−1) )|
φ(j)
t
uA(pt ,j−1),t +
k
P
P
|S|−1
w )|
(uw,t + |NL(T
(
up,t + k +2(|S|−k))
)
k
w∈C(A(pt ,j−1))\{A(pt ,j)}
p∈S\{pt }
|NL(TA(p ,j−1) )|
φ(j)
t
uA(pt ,j−1),t +
k
P
|T (w)|
(uw,t + k )
w∈C(A(pt ,j−1))\{A(pt ,j)}
(|S|−1)
|NL(TA(p ,j−1) )|
k
t
uA(pt ,j−1),t +
k
P
w )|
)
(uw,t + |NL(T
k
w∈C(A(pt ,j−1))\{A(pt ,j)}
|NL(TA(p ,j−1) )|
t
uA(pt ,j−1),t +
k
(
<
· ln(1 + k) ·
ln(1+k)
2D(w) (uw,t
p∈S\{pt }
+2)
up,t + |S|−1
k
· ln(1 + k) ·
· ln(1 + k) ·
≤ (3(|S| − k) +
) · ln(1 + k) ·
≤ 4 · ln(1 + k) · (|S| − k) ·
≤ 4 · ln(1 + k) · (|S| − k), since
P
(uw,t +
w∈C(A(pt ,j−1))\{A(pt ,j)}
|N L(T
)|
A(pt ,j−1)
.
uA(pt ,j−1),t +
k
Where the first inequality holds since
|N L(Tw )|
)
k
≤
P
up,t < |S| − k, the reason is that the constraint
P
up,t =
at time t is not satisfied otherwise the algorithm stop increasing the variable up,t (Since
p∈S
P
up,t < |S| − k ⇔ upt ,t = 0, i.e the algorithm stop increasing the variables). In
|S| − k,
p∈S\{pt }
p∈S\{pt }
addition, when |S| ≥ k + 1, |S|−1
= |S| − k.
k
Thus, the total cost of all j depth is at most 4ℓ · ln(1 + k) · (|S| − k). Hence, we get P ≤
4ℓ̇ · ln(1 + k) · D.
19
So, the competitive ratio of this algorithm is 4ℓ ln(1 + k).
20
| 8cs.DS
|
1
On the Exact Solution to a
Smart Grid Cyber-Security Analysis Problem
I. I NTRODUCTION
A modern society relies critically on the proper operation of
the electric power distribution and transmission system, which
is supervised and controlled through Supervisory Control
And Data Acquisition (SCADA) systems. Through remote
terminal units (RTUs), SCADA systems measure data such
as transmission line power flows, bus power injections and
part of the bus voltages, and send them to the state estimator
to estimate the power network states (e.g., the bus voltage
phase angles and bus voltage magnitudes). The estimated
states are used for vital power network operations such as
optimal power flow (OPF) dispatch and contingency analysis
(CA) [1], [2]. See Fig. 1 for a block diagram of the above
functionalities. Any malfunctioning of these operations can
delay proper reactions in the control center, and lead to
significant social and economical consequences such as the
northeast US blackout of 2003.
The technology and the use of the SCADA systems have
evolved a lot since the 1970s when they were introduced. The
SCADA systems now are interconnected to office LANs, and
through them they are connected to the Internet. Hence, today
there are more access points to the SCADA systems, and also
more functionalities to tamper with. For example, the RTUs
can be subjected to denial-of-service attacks (A1 in Fig. 1).
The communicated data can be subjected to false data attacks
(A2). Furthermore, the SCADA master itself can be attacked
(A3). This paper focuses on the cyber security issue related
to false data attacks (A2), where the communicated metered
measurements are subjected to additive data attacks. A false
data attack can potentially lead to erroneous state estimates
The authors are with the ACCESS Linnaeus Center and the Automatic
Control Lab, the School of Electrical Engineering, KTH Royal Institute of
Technology, Sweden. {sou,hsan,kallej}@kth.se
This work is supported by the European Commission through the VIKING
project, the Swedish Research Council (VR) under Grant 2007-6350 and Grant
2009-4565 and the Knut and Alice Wallenberg Foundation.
Power Network
RTUs
RTUs
A2
AGC
Optimal Power Flow
.
.
.
.
.
.
EMS x
SSCADA Masster
Index Terms—Power network state estimation, security, operation research, optimization methods.
A1
State Estimatorr
Abstract—This paper considers a smart grid cyber-security
problem analyzing the vulnerabilities of electric power networks
to false data attacks. The analysis problem is related to a
constrained cardinality minimization problem. The main result
shows that an l1 relaxation technique provides an exact optimal
solution to this cardinality minimization problem. The proposed
result is based on a polyhedral combinatorics argument. It is
different from well-known results based on mutual coherence
and restricted isometry property. The results are illustrated on
benchmarks including the IEEE 118-bus and 300-bus systems.
SSCADA Masster
arXiv:1201.5019v2 [math.OC] 17 Sep 2012
Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson
A3
Human
operator
Control center
Fig. 1: Block diagram of power network control center and
SCADA. RTUs connected to the substations transmit and
receive data from the control center using the SCADA system.
At the control center, a state estimate is computed and then
used by Energy Management Systems (EMS) to send out
commands to the power network. The human figures indicate
where a human is needed in the control loop. This paper
considers the false data attack scenario in A2.
by the state estimator, which can result in gross errors in OPF
dispatch and CA. In turn, these can lead to disasters of significant social and economical consequences. False data attack
on communicated metered measurements has been considered
in the literature (e.g., [3]–[10]). [3] was the first to point out
that a coordinated intentional data attack can be staged without
being detected by state estimation bad data detection (BDD)
algorithm, which is a standard part of today’s SCADA/EMS
system. [3]–[5], [7]–[10] investigate the construction problem
for such “unobservable” data attack, especially the sparse ones
involving relatively few meters to compromise, under various
assumptions of the network (e.g., DC power flow model [1],
[2]). In particular, [3] poses the attack construction problem as
a cardinality minimization problem to find the sparsest attack
including a given set of target measurements. [4], [5], [8] set
up similar optimization problems for the sparsest attack including a given measurement. [7], [10] seek the sparsest nonzero
attack and [9] finds the sparsest attack including exactly two
injection measurements. The solution information of the above
optimization problems can help network operators identify
the vulnerabilities in the network and strategically assign
2
protection resources (e.g., encryption of meter measurements)
to their best effect (e.g., [5], [6], [10]). On the other hand,
the unobservable data attack problem has its connection to
another vital EMS functionality, namely observability analysis
[1], [2]. In particular, solving the attack construction problem
can also solve an observability analysis problem (this is to be
explained in Section II-C). This connection was first reported
in [7], and was utilized in [11] to compute the sparsest critical
p-tuples for some integer p. This is a generalization of critical
measurements and critical sets [1].
To perform the cyber-security analysis in a timely manner,
it is important to solve the data attack construction problem
efficiently. This effort has been discussed, for instance, in [3]–
[5], [7]–[10]. The efficient solution to the attack construction
problem in [4] is the focus of this paper. The matching pursuit
method [12] employed in [3] and the basis pursuit method
[13] (l1 relaxation and its weighted variant) employed in [10]
are common efficient (i.e., polynomial-time) approaches to
suboptimally solve the attack construction problem. However,
these methods do not guarantee exact optimal solutions, and
in some cases they might not be sufficient (see for instance [8]
for a naive application of basis pursuit and its consequences).
While [7], [10] provide polynomial-time solution procedures
for their respective attack construction problems, the problems
therein are different from the one in this paper. Furthermore,
the considered problem in this paper cannot be solved as a
special case of [7], [10]. In particular, in [7] the attack vector
contains at least one nonzero entry. However, this nonzero
entry cannot be given a priori. [10] needs to restrict the number
of nonzero injection measurements attacked, while there is
no such requirement in the problem considered in this paper.
In [4], [5] a simple heuristics is provided to find suboptimal
solutions to the attack construction problem. This heuristics,
however, might not be sufficiently accurate. [8], [11], [23] is
most closely related to the current work. The distinctions will
be elaborated in Section IV-B.
The main conclusion of this paper is that basis pursuit
(i.e., l1 relaxation) can indeed solve the data attack construction problem exactly, under the assumption on the network metering system that no injection measurements are
metered. The limitations of this assumption will be discussed
in Section IV-A. In fact, the main result identifies a class
of cardinality minimization problems where basis pursuit can
provide exact optimal solutions. This class of problems include
as a special case the considered data attack construction
problem, under the assumption above.
Outline: Section II describes the state estimation model
and introduces the optimization problems considered in this
paper. Section III describes the main results of this paper – the
solution to the considered optimization problems. Section IV
compares the proposed result to related works. Section V
provides the proof the proposed main results. Section VI
numerically demonstrates the advantages of the proposed
results.
II. S TATE E STIMATION AND C YBER -S ECURITY A NALYSIS
O PTIMIZATION P ROBLEMS
A. Power network model and state estimation
A power network with n + 1 buses and ma transmission
lines can be described as a graph with n + 1 nodes and ma
edges. The graph topology can be specified by the (directed)
incidence matrix B0 ∈ R(n+1)×ma , in which the direction of
the edges can be assigned arbitrarily. The physical property
of the network is described by a nonsingular diagonal matrix
D ∈ Rma ×ma , whose nonzero entries are the reciprocals of
the reactance of the transmission lines.
The states of the network include bus voltage phase angles
and bus voltage magnitudes, the latter of which are typically
assumed to be constant (equal to one in the per unit system).
In addition, since one arbitrary bus is assigned as the reference
with zero voltage phase angle, the network states considered
n
can be captured in a vector θ ∈ [0, 2π) . The state estimator
estimates the states θ based on the measurements obtained
from the network. Under the DC power flow model [1], [2]
the measurement vector, denoted as z, is related to θ by
P DB T
z = Hθ + ∆z, where H ,
.
(1)
QBDB T
In (1), ∆z can be either a vector of random error or intentional
additive data attack (e.g., [3]). B ∈ Rn×ma is the truncated
incidence matrix (i.e., B0 with the row corresponding to
the reference node removed), and P consists of a subset
of rows of an identity matrices of appropriate dimension,
indicating which line power flow measurements are actually
taken. Together, P DB T θ is a vector of the power flows on the
transmission lines to be measured. Analogously, the matrix Q
selects the bus power injection measurements that are taken.
QBDB T θ is a vector of power injections at the buses to be
measured. Therefore, H is the measurement matrix, relating
the measured power quantities to the network states. The
number of rows of H is denoted m.
The measurements z and the network information H are
jointly used to find an estimate of the network states denoted
as θ̂. Assuming that the network is observable, it is wellestablished that the state estimate can be obtained using the
weighted least squares approach [1, Chapter 5] [2, Chapter 8]:
−1
θ̂ = (H T W H)
W H T z,
(2)
where W is a positive definite diagonal weighting matrix,
typically weighting more on the more accurate measurements.
The state estimate θ̂ is subsequently fed to other vital SCADA
functionalities such as OPF dispatch and CA. Therefore, the
accuracy and reliability of θ̂ is of paramount concern.
To detect possible faults in the measurements z, the BDD
test is commonly performed (see [1], [2]). In one typical
strategy, if the norm of the residual
−1
residual , z − H θ̂ = (I − H(H T W H)
W H T )∆z
is too big, then the BDD alarm will be triggered.
(3)
3
B. Unobservable data attack and security index
The BDD test is in general sufficient to detect the presence
of ∆z if it contains a single random error [1], [2]. However, in
face of a coordinated malicious data attack on multiple measurements the BDD test can fail. In particular, [3] considers
unobservable attack of the form
∆z = H∆θ
(4)
for an arbitrary ∆θ ∈ Rn . Since ∆z as defined in (4) would
result in a zero residual in (3), it is unobservable from the BDD
perspective. This was also experimentally verified in [14] in a
realistic SCADA system testbed. To quantify the vulnerability
of a network to unobservable attacks, [4] introduced the notion
of security index for an arbitrarily specified measurement. The
security index is the optimal objective value of the following
cardinality minimization problem:
minimize
n
kH∆θk0
subject to
H(k, :)∆θ = 1,
∆θ∈R
(5)
where k is given, indicating that the security index is computed
for measurement k. The symbol k · k0 denotes the cardinality
of a vector and H(k, :) denotes the k th row of H. The
security index is the minimum number of measurements an
attacker needs to compromise in order to attack measurement
k undetected. In particular, a small security index for a
particular measurement k means that in order to compromise k
undetected it is necessary to compromise only a small number
of additional measurements. This can imply that measurement
k is relatively easy to compromise in an unobservable attack.
As a result, the knowledge of the security indices allows the
network operator to pinpoint the security vulnerabilities of
the network, and to better protect the network with limited
resource. To model the case where certain measurements are
protected (hence cannot be attacked) [3], [5], [6], problem (5)
becomes:
minimize
kH∆θk0
n
∆θ∈R
subject to H(k, :)∆θ = 1
H(I, :)∆θ = 0,
(6)
where the protection index set I ⊂ {1, 2, . . . , m} is given,
H(I, :) denotes a submatrix of H with rows indexed by I.
By convention, the constraint H(I, :)∆θ = 0 is ignored when
I = ∅. Hence, (5) is a special case of (6).
C. Measurement set robustness analysis
J
subject to
kJ k0
rank(H(J¯, :)) < n
rank(H(J¯ ∪ {k}, :)) = n
k ∈ J.
I:
II:
H(k, :) 6= 0.
H has full column rank (= n).
The following three statements are true:
(a)
(b)
(c)
Problem (5) is feasible if and only if condition I is
satisfied.
Problem (7) is feasible if and only if conditions I and
II are satisfied.
If conditions I and II are satisfied, then (5) and (7)
are equivalent (see Definition 1 in Section V-A).
Note that if condition I is not satisfied, then the corresponding
measurement k should be removed from consideration. Also,
since measurement redundancy is a common practice in power
networks [1], [2], H can be assumed to have full column rank
(= n). Therefore, conditions I and II in Proposition 2.1 can be
justified in practice. Finally, note that Proposition 2.1 remains
true for arbitrary matrix H (not necessarily defined by (1)).
III. P ROBLEM S TATEMENT AND M AIN R ESULT
A. Problem statement
Problem (5) is also motivated from another important state
estimation analysis problem, namely observability analysis [1],
[2]. The measurement set, described by H in (1), is observable
if θ̂ can be uniquely determined by (2). An important question
of observability analysis is as follows:
minimize
In above, k is a given index and J¯ denotes the complement
of J (for index set I in the rest of the paper, Ī denotes its
complement). The meaning of (7) is as follows: J denotes
a subset of measurements from the measurement system
described by H. The condition that rank(H(J¯, :)) < n
means that the measurement system becomes unobservable
if the measurements associated with J are lost. That is, it
becomes impossible to uniquely determine θ̂ from H(J¯, :).
The problem in (7) seeks the minimum cardinality J which
must include a particular given measurement k. Therefore, if
there exist a measurement k which leads to an instance of
(7) with a very small objective value, then the measurement
system is not robust against meter failure. Special cases of (7)
have been extensively studied in the power system community.
For instance, the solution label sets of cardinalities one and
two are, respectively, referred to as critical measurements and
critical sets containing measurement k [1]. Their calculations
have been documented in, for example, [1], [15]–[18]. For the
more general cases where the minimum cardinality is p > 2,
the solution label set in (7) is a critical p-tuple which contains
the specified measurement k [11], [19]. Solving (5) solves (7)
as well. The justification is given by the following statement
inspired by [7], and proved in Appendix:
Proposition 2.1: Let H ∈ Rm×n and k ∈ {1, 2, . . . , m} be
given for problems (5) and (7). Denote the two conditions:
As discussed previously, this paper proposes an efficient
solution to the security index (i.e., attack construction) problem in (6). However, the proposed result focuses only on a
generalization of a special case of (6). In this special case, H
in (1) does not contain injection measurements:
H = P DB T .
(8)
(7)
The limitation of the assumption in (8) will be discussed in
Section IV-A, after the main result is presented.
4
In the Appendix, it is shown that the special case of (6)
with the assumption in (8) is equivalent to
P (Ī, :)B T ∆θ
minimize
n
∆θ∈R
subject to
0
P (k, :)B T ∆θ = 1
P (I, :)B T ∆θ = 0.
(9)
Instead of considering (9) directly, the proposed result pertains
to a more general optimization problem associated with a
totally unimodular matrix (i.e., the determinant of every square
submatrix is either −1, 0, or 1 [20]). In particular, the
following problem is the main focus of this paper:
minimize
n
x∈R
subject to
A(Ī, :)x
0
A(k, :)x = 1
A(I, :)x = 0,
(10)
where A ∈ Rm×n is a given totally unimodular matrix, and
k ∈ {1, 2, . . . , m} and I ⊂ {1, 2, . . . , m} are given. Since B
in (9) is an incidence matrix, P B T is a totally unimodular
matrix. Therefore, (10) is a generalization of (9). However,
neither (10) nor (6) includes each other as special cases.
C. Statement of main result
⋆
⋆
Theorem 3.1: Let (x⋆+ , x⋆− , y+
, y−
) be an optimal basic
feasible solution to (12), where A, k and I are defined in
(10). Then x⋆ , (x⋆+ − x⋆− ) is an optimal solution to (10).
Remark 3.1: Theorem 3.1 provides a complete procedure
for solving (10) via (12). If the standard form LP problem
in (12) is feasible, then it contains at least one basic feasible
solution (see the definition in Section V-A). Together with
the fact that the objective value is bounded from below (e.g.,
by zero), [22, Theorem 2.8, p. 66] implies that problem (12)
contains at least one optimal basic feasible solution, which can
be used to construct an optimal solution to (10) according to
Theorem 3.1. Conversely, if the feasible set of (12) is empty,
then the feasible set of (10) must also be empty because a
feasible solution to (10) can be used to construct a feasible
solution to (12).
Remark 3.2: To ensure that an optimal basic feasible solution to (12) is found if one exists, the simplex method (e.g.,
[22, Chapter 3]) can be used to solve (12).
The proof of Theorem 3.1 will be given in Section V. Before
that, the related work are reviewed, and the assumption in (8)
is discussed.
IV. R ELATED W ORK
B. l1 relaxation
Problem (10) is a cardinality minimization problem. In
general, no efficient algorithms have been found for solving
cardinality minimization problems [21], so heuristic or relaxation based algorithms are often considered. The l1 relaxation
(i.e., basis pursuit [13]) is a relaxation technique which has
received much attention. In l1 relaxation, instead of (10), the
following optimization problem is set up and solved:
minimize
n
x∈R
subject to
A(Ī, :)x
1
A(k, :)x = 1
A(I, :)x = 0,
(11)
where in the objective function in (11) the vector 1-norm
replaces the cardinality in (10). Problem (11) can be rewritten
as a linear programming (LP) problem in standard form [22,
pp. 4-6, p.17]:
minimize
x+ ,x− ,y+ ,y−
|Ī|
P
j=1
y+ (j) + y− (j)
A(Ī, :)(x+ − x− ) = y+ − y−
A(k, :)(x+ − x− ) = 1
A(I, :)(x+ − x− ) = 0
|Ī|
|Ī|
x+ ∈ Rn+ , x− ∈ Rn+ , y+ ∈ R+ , y− ∈ R+ ,
(12)
where |Ī| denotes the cardinality of the index set Ī.
If (x+ , x− , y+ , y− ) is a feasible solution to (12), then
x , x+ − x− is feasible to (10). Hence, an optimal solution
to (12), if it exists, corresponds to a suboptimal solution to
the original problem in (10). An important question is under
what conditions this suboptimal solution is actually optimal to
(10). An answer is provided by our main result, based on the
special structure in (10) and the fact that matrix A is totally
unimodular.
subject to
A. Rationale of the no injection assumption in (8)
Consider the case of (6) where I corresponds only to line
power flow measurements, then with the definition of H in
(1) it can be verified that (6) is equivalent to the following:
minimize
n
∆θ∈R
P (Ī, :)B T ∆θ
0
+ QB T DB∆θ
0
(13)
T
subject to P (k, :)B ∆θ = 1
P (I, :)B T ∆θ = 0.
This indicates that the considered problem in (9) is a relaxation [22] of the general case in (13). [8] utilizes this
observation and obtains satisfactory suboptimal solution to
(6). Alternatively, [11] considers indirectly accounting for
the term QB T DB∆θ 0 in the objective function of (13).
[11] demonstrates that solving the following problem provides
satisfactory suboptimal solution to (13)
minimize
n
∆θ∈R
subject to
¯ :)B T ∆θ
P̃ (Ĩ,
0
P̃ (k̃, :)B T ∆θ = 1
(14)
P̃ (Ĩ, :)B T ∆θ = 0,
with appropriately defined P̃ , I˜ and k̃. Notice that (14) has the
same form as (9). In conclusion, the “no injection assumption”
in (8) which leads to (9) introduces limitation, but it need
not be as restrictive as it might appear. The proposed result
in Theorem 3.1 still leads to a LP based approach to obtain
suboptimal solutions to (13) (and hence (6)).
B. Relationship with minimum cut based results
Nevertheless, the main strength of the current result lies
in the fact that it solves problem (10) where the A matrix
is totally unimodular. (10) includes (9) as a special case
5
where the corresponding constraint matrix is a transposed
graph incidence matrix. This distinguishes the current work
with other ones such as [8], [11], [23] which specialize in
solving (9) using graph-based minimum cut algorithms (e.g.,
[24]). One example of A which is totally unimodular but
not associated with a graph is the matrix with consecutive
ones property (i.e., if either for each row or for each column,
the 1’s appear consecutively) [25]. For a possible application,
consider a networked control system [26], [27] with one
controller and n sensor nodes. Each node contains a scalar
state value, constant over a period of m time slots. The nodes
need to transmit their state values through a shared channel
to the controller. Each node can keep transmitting over an
arbitrary period of consecutive time slots. At each time slot,
the measurement transmitted to the controller is the sum of
the state values of all transmitting nodes. Denote z ∈ Rm as
the vector of measurements transmitted over all time slots,
and θ ∈ Rn as the vector of node state values. Then the
measurements and the states are related by z = Aθ, where
A ∈ Rm×n is a (0, 1) matrix with consecutive ones in the
each column. Solving the observability problem in (7) with
H = A can identify the vulnerable measurement slots, which
should have higher priority in communication.
C. Relationship with compressed sensing type results
Problem (10) can be written in a form more common in
the literature. Consider only the case where the null space of
AT is not empty (otherwise rank(A) = m and (10) is trivial).
With a change of decision variable z = Ax, (10) can be posed
as:
minimize
kz(Ī)k0
m
z∈R
subject to
Lz = 0
z(I) = 0
z(k) = 1,
(15)
where L has full rank and LA = 0, and z(Ī) denotes a
sub-vector of z containing the entries corresponding to the
index set Ī. (15) can be written as the cardinality minimization
problem considered, for instance, in [21], [28]–[30]:
minimize
z̃
kz̃k0
subject to Φz̃ = b,
(16)
with appropriately defined matrix Φ and vector b. In this
subsection, we restrict the discussion to the standard case.
That is, (16) is feasible and Φ is a full rank matrix with
more columns than rows. As (16) is well-studied, certain
conditions regarding when its optimal solution can be obtained
by l1 relaxation are known. For example, [28], [31] report
a sufficient condition based on mutual coherence, which is
denoted as µ(Φ) and defined as
T
µ(Φ) = max
i6=j
|Φ(:, i) Φ(:, j)|
.
kΦ(:, i)k2 kΦ(:, j)k2
(17)
The sufficient condition [30] states that if there exists a feasible
solution z̃ in (16) which is sparse enough:
1
1
1+
,
(18)
kz̃k0 <
2
µ(Φ)
then z̃ is the unique optimal solution to (16) and its l1 relaxation (i.e., problem (16) with kz̃k1 replacing kz̃k0 ). Another
well-known sufficient condition is based on the restricted
isometry property (RIP) [21], [32]. For any integer s, the RIP
constant δs of matrix Φ is the smallest number satisfying
(1 − δs )kxk22 ≤ kΦxk22 ≤ (1 + δs )kxk22
(19)
for all vector x such that kxk0 ≤ s. The RIP-based sufficient
condition
√ [32] states that if for some s, Φ has a RIP constant
δ2s < 2 − 1, then any z̃ satisfying Φz̃ = b and kz̃k0 ≤ s
is necessarily the unique optimal solution to both (16) and
its l1 relaxation. It has been shown that certain type of
randomly generated matrices satisfy the above conditions with
overwhelming probabilities (e.g., [21] provides a RIP-related
result). However, the above conditions might not apply to (10),
which is the focus of this paper. For instance, consider A in
(10) being a submatrix of the transpose of the incidence matrix
of the 6-bus power network from [33]:
1 −1 0
0
0
0
0 1 −1 0
0
0
0 0
0
1
−1
0
.
A=
0
0
0
0
1
−1
1 0
0
−1
0
0
0 1
0
0 −1 0
0 0
1
0
0 −1
Let k = 6, and I = ∅.
b are
1 1 −1
Φ = 1 0 −1
0 0 0
Then the corresponding Φ in (16) and
−1 −1 0
0 −1 1
0
0 1
1
0
0
0
b = 0 .
1
(20)
For this Φ, (17) implies that µ(Φ) = 1. Therefore, the sparsity
bound in (18) becomes kz̃k0 < 1. This is too restrictive
to be practical. Similarly, for all s ≥ 1, the RIP constants
δ2s are at least one because Φ(:, 1) = −Φ(:, 3). Hence the
RIP-based sufficient condition would not be applicable either.
Nevertheless, the failure to apply these sufficient conditions
here does not mean that it is impossible to show that l1
relaxation can exactly solve (16). The mutual coherence and
RIP-based conditions characterize when a unique optimal
solution exists for both (16) and its l1 relaxation, while in
this paper uniqueness is not required. Indeed, for (16) with
T Φ
and b defined in (20), both −1 0 0 −1 0 1 0 and
T
−1 1 0 0 0 1 0 are optimal (this can be verified
by inspection). Using the CPLEX LP solver [34] in MATLAB
to solve the l1 relaxation leads to the first optimal solution.
It is the main contribution of this paper to show that this is
the case in general when (16) is defined by (10), even though
the optimal solution might not be unique. The reason why the
proposed result is applicable is that it is based on a polyhedral
combinatorics argument, which is different from those of the
mutual coherence and RIP based results.
V. P ROOF
OF THE
M AIN R ESULT
A. Definitions
The proof requires the following definitions:
6
Definition 1: Two optimization problems are equivalent
if there is an one-to-one correspondence of their instances.
The corresponding instances either are both infeasible, both
unbounded or both have optimal solutions. In the last case,
it is possible to construct an optimal solution to one problem
from an optimal solution to the other problem and vice versa.
In addition, the two problems have the same optimal objective
value.
Definition 2: A polyhedron in Rp is a subset of Rp
described by linear equality and inequality constraints. A
standard form polyhedron (as associated with a standard form
LP problem instance) is specified by {θ Cθ = d, θ ≥ 0} for
some given matrix C and vector d.
Definition 3: A basic solution [22, p. 50] of a polyhedron
in Rp is a vector satisfying all equality constraints. In addition,
out of all active constraints p of them are linearly independent.
For a standard form polyhedron with a constraint matrix of full
row rank, basic solutions can alternatively be defined by the
following statement [22, p. 53]:
Theorem 5.1: Consider a polyhedron {θ Cθ = d, θ ≥ 0},
and assume that C ∈ Rl×p and C has full row rank. A vector
θ is a basic solution if and only if Cθ = d and there exists an
index set J ⊂ {1, 2, . . . , p}, with |J | = l, such that det(C(:
, J )) 6= 0 and θ(i) = 0 if i ∈
/ J.
Definition 4: A basic feasible solution [22, p. 50] of a
polyhedron is a basic solution which is also feasible. By
convention, the terminology “a basic feasible solution to a LP
problem instance” should be understood as a basic feasible
solution of the polyhedron which defines the feasible set of
the instance.
B. Proof
Two lemmas, key to the proof, are presented first. The first
lemma states that problem (12), as set up by l1 relaxation, has
integer-valued optimal basic feasible solutions.
⋆
⋆
Lemma 5.1: Let (x⋆+ , x⋆− , y+
, y−
) be an optimal basic feasible solution to (12). Then it holds that x⋆ (i) , (x⋆+ (i) −
x⋆− (i)) ∈ {−1, 0, 1} for all 1 ≤ i ≤ n. In addition,
y ⋆ (j) , |A(Ī(j), :)x⋆ | ∈ {0, 1} for all 1 ≤ j ≤ |Ī|, where
Ī(j) denotes the j th element of Ī.
Proof: Assume that the feasible set of (12) is nonempty,
otherwise there is no basic feasible solution (cf. Definition 4).
The following two claims are made:
A(k, :) cannot be a linear combination of the rows
of A(I, :).
(b)
There exists I ′ ⊂ I such that either I ′ = ∅ or the
rows of A(I ′ , :) are linearly independent. In addition,
in both cases A(I ′ , :)θ = 0 and A(I, :)θ = 0 define
the same constraints.
Claims (a) and (b) together imply that problem (12) can be
written as a standard form LP problem with a constraint matrix
with full row rank (i.e., matrix C below):
(a)
minimize
θ
fT θ
subject to Cθ = d
θ ≥ 0,
(21)
with
A(Ī, :) −A(Ī, :) −I|Ī| I|Ī|
C , A(I ′ , :) −A(I ′ , :)
0
0
A(k, :) −A(k,
:) 0 0
0n×1
x+
0
x−
0n×1
d , 0 θ ,
y+ f , 1|Ī|×1 ,
1
y−
1|Ī|×1
(22)
where I|Ī| is an identity matrix of dimension |Ī|, and 1 is a
vector of all ones.
To see the claims, first note that (a) is implied by the
feasibility of (12). For (b), If I = ∅ or A(I, :) = 0, then
set I ′ = ∅. Otherwise, there exists I ′ ⊂ I with the properties
that |I ′ | = rank(A(I, :)), A(I ′ , :) has linearly independent
rows and A(I, :) = SA(I ′ , :) for some matrix S. On the
other hand, A(I ′ , :) = S ′ A(I, :) for some matrix S ′ , because
I ′ ⊂ I. Hence, A(I, :)θ = 0 and A(I ′ , :)θ = 0 define the
same constraints. This shows (b).
The next step of the proof is to show that every basic
solution of (21) has its entries being either −1, 0 or 1. Denote
the matrix B1 as the first 2n columns of C, and let B̃1
be any square submatrix of B1 . If B̃1 has two columns (or
rows) which are the same or negative of each other, then
det(B̃1 ) = 0. Otherwise, B̃1 is a (possibly row and/or column
permuted) square submatrix of A, and A is assumed to be
totally unimodular. Hence, det(B̃1 ) ∈ {−1, 0, 1} and B1 is
totally unimodular. Next consider the matrix B defined as
A(Ī, :) −A(Ī, :) −I|Ī| I|Ī| 0
B , C d = A(I ′ , :) −A(I ′ , :)
0
0 0
A(k, :) −A(k, :)
0
0 1
−I|Ī| I|Ī| 0
= B1
0
0 0 .
0
0 1
Denote the number of rows and the number of columns of B as
mB and nB respectively. Let J ⊂ {1, 2, . . . , nB } be any set
of column indices of B such that |J | = mB (so that B(:, J ) is
square). If B(:, J ) contains only columns of B1 , then det(B(:
, J )) ∈ {−1, 0, 1} since B1 is totally unimodular. Otherwise,
by repeatedly applying Laplace expansion on the columns of
B(:, J ) which are not columns of B1 , it can be shown that
det(B(:, J )) is equal to the determinant of a square submatrix
of B1 , which can only be −1, 0 or 1. Hence, by Cramer’s rule
the following holds: If v is the solution to the following system
of linear equations
B(:, J ) v = B(:, nB ), J ⊂ {1, . . . , nB − 1},
|J | = mB , and det(B(:, J )) 6= 0,
(23)
then
v(j) ∈ {−1, 0, 1},
∀ j.
(24)
Theorem 5.1 and (23) together imply that the nonzero entries
of all basic solutions to (21) are either −1, 0 or 1. Therefore,
the basic feasible solutions, which are also basic solutions, to
the polyhedron in (21) also satisfy this integrality property.
7
⋆
⋆
Finally, let (x⋆+ , x⋆− , y+
, y−
) be an optimal basic feasible
solution. Then feasibility (i.e., nonnegativity) implies that
x⋆+ (j) ∈ {0, 1},
⋆
y+
(j) ∈ {0, 1},
x⋆− (j) ∈ {0, 1},
⋆
y−
(j) ∈ {0, 1}, ∀ j.
(25)
minimize
The minimization excludes the possibility that, at optimality,
⋆
⋆
y+
(j) = y−
(j) = 1. Hence, it is possible to define x⋆ and y ⋆
such that
x⋆ (i) , (x⋆+ (i) − x⋆− (i)) ∈ {−1, 0, 1} ∀ i
⋆
⋆
y ⋆ (j) , (y+
(j) + y−
(j)) = |A(Ī(j), :) x⋆ | ∈ {0, 1} ∀ j.
(26)
The second lemma is concerned with a restricted version of
(10) with an infinity norm bound as follows:
minimize
x
A(Ī, :) x
(27)
Lemma 5.2: Optimization problems (10) and (27) are
equivalent.
Proof: Suppose (10) is feasible, then it has an optimal
solution denoted as x⋆ . Let Īx⋆ ⊂ Ī be the row index set such
that A(j, :)x⋆ 6= 0 if and only if j ∈ Īx⋆ . Then it is claimed
that there exists a common optimal solution to both (10) and
(27) with the same optimal objective value. The argument
is as follows. The property of x⋆ implies the feasibility of
′
(12) , which is denoted as a variant of (12) with Ī replaced
by Īx⋆ . By [22, Corollary 2.2, p. 65], problem (12)′ , as a
standard form LP problem, has at least one basic feasible
solution. Furthermore, since the optimal objective value of
(12)′ is bounded from below (e.g., by zero), [22, Theorem 2.8,
′
p. 66] implies that (12) has an optimal basic feasible solu⋆
⋆
⋆
⋆
tion (x̃+ , x̃− , ỹ+ , ỹ− ) which is integer-valued as specified by
Lemma 5.1. Denote x̃⋆ , (x̃⋆+ − x̃⋆− ). Then x̃⋆ is feasible to
both (10) and (27) since Īx⋆ ⊂ Ī, |A(Īx⋆ , :)x̃⋆ | ∈ {0, 1}|Īx⋆ |
and k ∈ Īx⋆ . Also, A(Ī, :)x̃⋆ 0 = A(Īx⋆ , :)x̃⋆ 0 ≤
A(Īx⋆ , :)x⋆ 0 = A(Ī, :)x⋆ 0 , as the inequality is true
′
because x̃⋆ is an optimal solution to (12) . Hence x̃⋆ is optimal
to both (10) and (27), with the same objective value.
Conversely, suppose (10) is infeasible, then (27) is also
infeasible. This concludes that (10) and (27) are equivalent.
⋆
⋆
Proof of Theorem 3.1: Let (x⋆+ , x⋆− , y+
, y−
) be an
optimal basic feasible solution to (12). Then there exist x⋆ and
y ⋆ as defined in Lemma 5.1. In particular, x⋆ = (x⋆+ − x⋆− ).
It can be verified that (x⋆ , y ⋆ ) is an optimal solution to the
following optimization problem:
minimize
x,y
subject to
|Ī|
P
y(i)
j=1
A(Ī, :)x ≤ y
−A(Ī, :)x ≤ y
A(k, :)x = 1
A(I, :)x = 0
0 ≤ y(j) ≤ 1 ∀ j = 1, 2, . . . , |Ī|,
x,y
|Ī|
P
y(i)
j=1
subject to
A(Ī, :)x ≤ y
−A(Ī, :)x ≤ y
A(k, :)x = 1
A(I, :)x = 0
y(j) ∈ {0, 1} ∀ j = 1, 2, . . . , |Ī|.
(28)
It can be verified that (28) is equivalent to (27). Then
Lemma 5.2 states that (28) is also equivalent to (10). Consequently, (x⋆ , y ⋆ ) being an optimal solution to (28) implies that
|Ī|
P
(10) is feasible with optimal objective value being
y ⋆ (j). A
j=1
0
subject to A(k, :) x = 1
A(I, :) x = 0
kAxk∞ ≤ 1.
where the inequalities above hold entry-wise. Because of the
property that y ⋆ (j) ∈ {0, 1} for all j, (x⋆ , y ⋆ ) is also an
optimal solution to
feasible solution to (10) is x⋆ . Since y ⋆ (j) = |A(Ī(j), :)x⋆ | ∈
|Ī|
P
{0, 1} ∀j, it holds that A(Ī, :)x⋆ 0 =
y ⋆ (j). Hence, x⋆
j=1
is an optimal solution to (10).
VI. N UMERICAL D EMONSTRATION
As a demonstration, instances of the restricted security index
problem in (9) are solved with P being an identity matrix
and I being empty. The incidence matrix B describes the
topology of one of the following benchmark systems: IEEE
14-bus, IEEE 57-bus, IEEE 118-bus, IEEE 300-bus and Polish
2383-bus and Polish 2736-bus [35]. For each benchmark, (9) is
solved for all possible values of k (e.g., 186 choices in the 118bus case and 411 choices in the 300-bus case). Two solution
approaches are tested. The first approach is the one proposed.
It is denoted the l1 approach, and includes the following steps:
1) Set up the LP problem in (12) with A being B T .
2) Solve (12) using a LP solver (e.g., CPLEX LP). Let
⋆
⋆
(x⋆+ , x⋆− , y+
, y−
) be its optimal solution.
⋆
3) Define ∆θ = x⋆+ − x⋆− . It is the optimal solution to (9),
according to Theorem 3.1.
The second solution approach to (9) is standard, and it was
applied also in [8], [11]. This second approach is referred to as
l0 approach, as (9) is formulated into the following problem:
P
minimize
y(j)
∆θ, y
subject to
j
B T ∆θ
−B T ∆θ
T
B(:, k) ∆θ
y(j)
≤
≤
=
∈
My
My
1
{0, 1} ∀ j,
(29)
where M is a constant required to be at least B T ∞ = kBk1
(i.e., the maximum column sum of the absolute values of the
entries of B) [8]. Because of the binary decision variables in
y, (29) is a mixed integer linear programming (MILP) problem
[22]. It can be solved by a standard solver such as CPLEX.
The correctness of the l0 approach is a direct consequence
that (29) is a reformulation of (9). As a result, both the l1
and l0 approaches are guaranteed to correctly solve (9) by
theory. Fig. 2 shows the sorted security indices (i.e., optimal
objective values of (9)) for the four larger benchmark systems.
8
8
118 bus
300 bus
2383 bus
2736 bus
7
3
10
2383 bus
l0 approach
l1 approach
2736 bus
2
10
solve time (sec)
The security indices are computed using the l1 approach. As a
comparison, the security indices are also computed using the
l0 approach, and they are shown in Fig. 3. The two figures
reaffirm the theory that the proposed l1 approach computes
the security indices exactly. Fig. 2 (or Fig. 3) indicates that
the measurement systems are relatively insecure, as there exist
many measurements with very low security indices (i.e., equal
to 1 or 2).
1
300 bus
10
118 bus
57 bus
0
10
14 bus
−1
10
6
−2
security index
10
1
2
3
5
4
5
6
case number
Fig. 4: Solve-time for computing all security indices for
different benchmark systems
4
3
2
VII. C ONCLUSION
1
0
0
500
1000
1500
2000
2500
3000
3500
ranked measurement index
Fig. 2: Security indices using the l1 approach
8
118 bus
300 bus
2383 bus
2736 bus
7
security index
6
5
4
3
2
The cardinality minimization problem is important but in
general difficult to solve. An example is shown in this paper
as the smart grid security index problem in (6). The l1
relaxation has demonstrated promise but to establish the cases
where it provides exact solutions is non-trivial. Well-known
results based on mutual coherence and RIP provide sufficient
conditions under which a unique optimal solution solves both
the cardinality minimization problem and its l1 relaxation.
However, this paper identifies a class of application motivated
problems (as in (10)) which can be shown to be solvable by l1
relaxation, even though results based on mutual coherence and
RIP cannot make the assertion. In fact, the optimal solution to
(10) might not be unique. The key property that leads to the
conclusion of this paper is total unimodularity of the constraint
matrix. The total unimodularity of matrix A in (10) leads to
two important consequences. (10) is equivalent to its ∞-norm
restricted version in (27). Furthermore, (27) can be solved
exactly by solving the LP problem in (12), thus establishing
the conclusion that l1 relaxation exactly solves (10).
A PPENDIX
1
A. Proof of the equivalence between (6) and (9)
0
0
500
1000
1500
2000
2500
3000
3500
ranked measurement index
Fig. 3: Security indices using the l0 approach
In terms of computation time performances, it is well-known
that the l0 approach is much more time-consuming than the
l1 approach since a MILP problem is much more difficult
to solve than a LP problem of the same size [22]. Fig. 4
shows the solve-time for computing all security indices for
each benchmark system, using the l1 and l0 approaches. It
verifies that the proposed l1 approach is more effective. In the
above illustration, all computations are performed on a dualcore Windows machine with 2.4GHz CPU and 2GB of RAM.
Note that the constraint H(I, :)∆θ = 0 implies that
kH∆θk0 = H(Ī, :)∆θ 0 . Since P consists of rows of an
identity matrix and D is diagonal and nonsingular, for all
J ⊂ {1, 2, . . . , m}, there exists a diagonal and nonsingular
matrix DJ such that P (J , :)D = DJ P (J , :). In particular,
let Dkk be a positive scalar such that P (k, :)D = Dkk P (k, :
) = P (k, :)Dkk . The above implies that for all ∆θ,
P (k, :)B T ∆θ = 1 if and only if
P (k, :)Dkk B T (Ddd −1 ∆θ) = P (k, :)DB T (Ddd −1 ∆θ) = 1.
In addition, for all ∆θ
P (I, :)B T ∆θ = 0 if and only if
Dkk −1 DI P (I, :)B T ∆θ = P (I, :)DB T (Ddd −1 ∆θ) = 0.
9
Finally, for all ∆θ
T
P (Ī, :)B ∆θ
0
−1
T
DĪ P (Ī, :)B ∆θ
=
Dkk
=
P (Ī, :)DB T (Ddd −1 ∆θ)
0
0
.
Applying the definition of H in (1) and a change of decision
variable to Dkk −1 ∆θ shows that (6) and (9) are equivalent.
B. Proof of Proposition 2.1
Part (a) is trivial.
For the necessary part of (b), condition I is necessary
because if H(k, :) = 0 then rank(H(J¯, :)) = rank(H(J¯ ∪
{k}, :)) for all J (meaning that (7) is infeasible). Condition
II is also necessary because if rank(H) < n. then there does
not exist any J such that rank(H(J¯, :)) = n.
For the sufficiency part of (b), assume that conditions I
and II are satisfied. Then by part (a) problem (5) is feasible.
Hence it has an optimal solution denoted as θ⋆ . Define Jθ⋆ ⊂
{1, 2, . . . , m} such that p ∈ Jθ⋆ if and only if H(p, :)θ⋆ 6= 0.
By definition of Jθ⋆ , rank(H(Jθ⋆ , :)) < n. Also, k ∈ Jθ⋆
because H(k, :)θ⋆ = 1. If rank(H(Jθ⋆ ∪ {k}, :)) = n, then
Jθ⋆ is feasible to (7), thus showing that (7) is feasible. To
show this, first consider the case when kHθ⋆ k0 = 1. Then
Jθ⋆ = {k} and rank(H(Jθ⋆ ∪ {k}, :)) = rank(H) = n
because of condition II (i.e., H has full column rank). Next
consider the case when kHθ⋆ k0 > 1 (i.e., |Jθ⋆ \ {k}| > 0). If
rank(H(Jθ⋆ ∪ {k}, :)) < n, then there exists θ̃ 6= 0 such
that H(Jθ⋆ ∪ {k}, :)θ̃ = 0. In particular, H(k, :)θ̃ = 0.
Also, condition II implies that H(Jθ⋆ \ {k}, :)θ̃ 6= 0 (since
otherwise H θ̃ = 0). Let q ∈ Jθ⋆ \ {k} such that H(q, :)θ̃ 6= 0.
Note also that by definition of Jθ⋆ , H(q, :)θ⋆ 6= 0. Construct
θ′ , (H(q, :)θ̃)θ⋆ − (H(q, :)θ⋆ )θ̃. Then H(k, :)θ′ = 1,
H(p, :)θ′ = 0 whenever H(p, :)θ⋆ = 0, but H(q, :)θ′ = 0
while H(q, :)θ⋆ 6= 0. This implies that θ′ is feasible to (5) with
a strictly less objective value than that of θ⋆ , contradicting the
optimality of θ⋆ . Therefore, the claim that rank(H(Jθ⋆ ∪{k}, :
)) = n is true. This implies that Jθ⋆ is feasible to (7),
establishing the sufficiency of part (b).
For part (c), under conditions I and II both (5) and (7)
are feasible. In addition, Jθ⋆ constructed in the proof of
the sufficiency part of (b) satisfies |Jθ⋆ | = kHθ⋆ k0 , for θ⋆
being an optimal solution to (5). This means that the optimal
objective function value of (7) is less than or equal to that of
(5). For the converse, suppose that J ⋆ is optimal to (7), then
the feasibility of J ⋆ implies that there exists θJ ⋆ 6= 0 such that
H(J¯⋆ , :)θJ ⋆ = 0. This also implies that kHθJ ⋆ k0 ≤ |J ⋆ |.
If H(k, :)θJ ⋆ = 0, then H(J¯⋆ ∪ {k}, :)θJ ⋆ = 0. This
implies that rank(H(J¯⋆ ∪ {k}, :)) < n, contradicting the
feasibility of J ⋆ . Therefore, there exists a scalar α such that
H(k, :)(αθJ ⋆ ) = 1. Consequently, αθJ ⋆ is feasible to (5) with
an objective function value less than or equal to the optimal
objective function value of (7).
R EFERENCES
[1] A. Abur and A. Expósito, Power System State Estimation. Marcel
Dekker, Inc., 2004.
[2] A. Monticelli, State Estimation in Electric Power Systems A Generalized
Approach. Kluwer Academic Publishers, 1999.
[3] Y. Liu, M. Reiter, and P. Ning, “False data injection attacks against
state estimation in electric power grids,” in 16th ACM Conference on
Computer and Communication Security, New York, NY, USA, 2009, pp.
21–32.
[4] H. Sandberg, A. Teixeira and K.H. Johansson, “On security indices for
state estimators in power networks,” in First Workshop on Secure Control
Systems, CPSWEEK 2010, 2010.
[5] G. Dán and H. Sandberg, “Stealth attacks and protection schemes for
state estimators in power systems,” in IEEE SmartGridComm, 2010.
[6] R. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. Overbye, “Detecting false data injection attacks on dc state estimation,” in
the First Workshop on Secure Control Systems, CPSWEEK 2010, 2010.
[7] O. Kosut, L. Jia, R. Thomas, and L. Tong, “Malicious data attacks on
the smart grid,” IEEE Transactions on Smart Grid, vol. 2, pp. 645–658,
2011.
[8] K.C. Sou and H. Sandberg and K.H. Johansson, “Electric power network
security analysis via minimum cut relaxation,” in IEEE Conference on
Decision and Control, December 2011.
[9] A. Giani, E. Bitar, M. McQueen, P. Khargonekar, and K. Poolla, “Smart
grid data integrity attacks: Characterizations and countermeasures,” in
IEEE SmartGridComm, 2011.
[10] T.T. Kim and H.V. Poor, “Strategic protection against data injection
attacks on power grids,” IEEE Transactions on Smart Grid, vol. 2, pp.
326–333, June 2011.
[11] K.C. Sou, H. Sandberg and K.H. Johansson, “Computing Critical ktuples in Power Networks,” IEEE Transactions on Power Systems,
vol. 27, no. 3, pp. 1511–1520, 2012.
[12] S. Mallat and Z. Zhang, “Matching pursuit with time-frequency dictionaries,” IEEE Transactions on Signal Processing, vol. 41, pp. 3397–
3415, 1993.
[13] S. S. Chen, D. L. Donoho, and M. A. Saunders, “Atomic decomposition
by basis pursuit,” SIAM Journal on Scientific Computing, vol. 20, 1998.
[14] A. Teixeira, G. Dan, H. Sandberg, and K. Johansson, “Cyber security
study of a scada energy management system: stealthy deception attacks
on the state estimator,” in IFAC World Congress, Milan, Italy, 2011.
[15] G. Korres and G. Contaxis, “Identification and updating of minimally
dependent sets of measurements in state estimation,” IEEE Transactions
on Power Systems, vol. 6, no. 3, pp. 999 –1005, aug 1991.
[16] M. de Almeida, E. Asada, and A. Garcia, “Identifying critical sets
in state estimation using gram matrix,” in PowerTech, 2009 IEEE
Bucharest, 28 2009-july 2 2009, pp. 1 –5.
[17] M. Ayres and P. H. Haley, “Bad data groups in power system state
estimation,” IEEE Transactions on Power Systems, vol. 1, no. 3, pp. 1
–7, aug. 1986.
[18] K. Clements, G. Krumpholz, and P. Davis, “Power system state estimation residual analysis: An algorithm using network topology,” Power
Apparatus and Systems, IEEE Transactions on, vol. PAS-100, no. 4, pp.
1779 –1787, april 1981.
[19] J. London, J.B.A., L. Alberto, and N. Bretas, “Network observability:
identification of the measurements redundancy level,” in Power System
Technology, 2000. Proceedings. PowerCon 2000. International Conference on, vol. 2, 2000, pp. 577 –582 vol.2.
[20] A. Schrijver, “A course in combinatorial optimization,” CWI,
Amsterdam, Netherlands, 2010, online document available from
http://homepages.cwi.nl/˜lex/.
[21] E. Candès and T. Tao, “Decoding by linear programming,” Information
Theory, IEEE Transactions on, vol. 51, no. 12, pp. 4203 – 4215, Dec.
2005.
[22] J. Tsitsiklis and D. Bertsimas, Introduction to Linear Optimization.
Athena Scientific, 1997.
[23] J. Hendrickx, K.H. Johansson, R. Jungers, H. Sandberg, and K.C. Sou,
“An exact solution to the power networks security index problem and
its generalized min cut formulation,” in preparation, [Online]. Available:
http://arxiv.org/abs/1204.6174.
[24] M. Stoer and F. Wagner, “A simple min-cut algorithm,” J. ACM, vol. 44,
pp. 585–591, July 1997.
[25] A. Schrijver, Theory of Linear and Integer Programming. Wiley, 1998.
[26] J. Hespanha, P. Naghshtabrizi, and Y. Xu, “A survey of recent results
in networked control systems,” Proceedings of the IEEE, vol. 95, no. 1,
pp. 138 –162, jan. 2007.
[27] A. Bemporad, M. Heemels, and M. Johansson, Networked Control
Systems. Springer, 2010.
[28] D. L. Donoho and M. Elad, “Optimally sparse representation in general
(nonorthogonal) dictionaries via l1 minimization,” Proceedings of The
National Academy of Sciences, vol. 100, pp. 2197–2202, 2003.
10
[29] E. Candès, M. Wakin, and S. Boyd, “Enhancing sparsity by reweighted
l1 minimization,” Journal of Fourier Analysis and Applications, vol. 14,
pp. 877–905, 2008.
[30] A. M. Bruckstein, D. L. Donoho, and M. Elad, “From sparse solutions of
systems of equations to sparse modeling of signals and images,” SIAM
Review, vol. 51, 2009.
[31] R. Gribonval and M. Nielsen, “Sparse representations in unions of
bases,” Information Theory, IEEE Transactions on, vol. 49, no. 12, pp.
3320 – 3325, dec. 2003.
[32] E. J. Candés, “The restricted isometry property and its implications for
compressed sensing,” Comptes Rendus Mathematique, vol. 346, no. 910,
pp. 589 – 592, 2008.
[33] A. Wood and B. Wollenberg, Power generation, operation, and control.
J. Wiley & Sons, 1996.
[34] “Cplex,” http://www-01.ibm.com/software/integration/optimization/cplex-optimizer/.
[35] R. Zimmerman, C. Murillo-Sánchez, and R. Thomas, “MATPOWER
Steady-State Operations, Planning and Analysis Tools for Power Systems Research and Education,” IEEE Transacations on Power Systems,
vol. 26, no. 1, pp. 12–19, 2011.
| 5cs.CE
|
Accelerating Learning in Constructive Predictive
Frameworks with the Successor Representation
arXiv:1803.09001v1 [cs.LG] 23 Mar 2018
Craig Sherstan1 , Marlos C. Machado1 , Patrick M. Pilarski1
Abstract— Here we propose using the successor representation
(SR) to accelerate learning in a constructive knowledge system
based on general value functions (GVFs). In real-world settings
like robotics for unstructured and dynamic environments, it is
infeasible to model all meaningful aspects of a system and its
environment by hand due to both complexity and size. Instead,
robots must be capable of learning and adapting to changes in
their environment and task, incrementally constructing models
from their own experience. GVFs, taken from the field of
reinforcement learning (RL), are a way of modeling the world
as predictive questions. One approach to such models proposes
a massive network of interconnected and interdependent GVFs,
which are incrementally added over time. It is reasonable
to expect that new, incrementally added predictions can be
learned more swiftly if the learning process leverages knowledge
gained from past experience. The SR provides such a means
of separating the dynamics of the world from the prediction
targets and thus capturing regularities that can be reused across
multiple GVFs. As a primary contribution of this work, we show
that using SR-based predictions can improve sample efficiency
and learning speed in a continual learning setting where new
predictions are incrementally added and learned over time. We
analyze our approach in a grid-world and then demonstrate its
potential on data from a physical robot arm.
I. INTRODUCTION
A long standing goal in the pursuit of artificial general intelligence is that of knowledge construction—incrementally
modeling and explaining the world and the agent’s interaction with it directly from the agent’s own experience. This is
particularly important in fields such as continual learning [1]
and developmental robotics [2], where we expect agents to
be capable of learning, dynamically and incrementally, to
interact and succeed in complex environments.
One proposed approach for representing such world models is a collection of general value functions (GVFs) [3],
which models the world as a set of predictive questions each
defined by a policy of interest, a target signal of interest
under that policy, and a timescale (discounting schedule) for
accumulating the signal of interest. For example, a GVF on
a mobile robot could pose the question “How much current
will my wheels consume over the next second if I drive
straight forward?”
GVF questions are typically answered using temporaldifference (TD) methods [4] from the field of reinforcement
learning (RL) [5]. A learned GVF approximates the expected
future value of a signal of interest, directly representing the
relationship between the environment, policy, timescale, and
target signal as the output of a single predictive unit.
1
University of Alberta, Canada
{sherstan, machado, pilarski}@ualberta.ca
Nevertheless, despite the success RL algorithms have
achieved recently (e.g., [6], [7]), methods for answering multiple predictive questions from a single stream of experience
(critical in a robotic setting) are known to exhibit sample
inefficiency. In our setting of interest, where multitudes of
GVFs are learned in an incremental, sample by sample way,
this problem is multiplied. Ultimately, the faster an agent can
learn to approximate a new GVF, the better.
In this paper we show how one can accelerate learning in
a constructive knowledge system based on GVFs by sharing
the environment dynamics across the different predictors.
This is done with the successor representation (SR) [8],
which allows us to learn the world dynamics under a policy
independently of any signal being predicted.
We empirically demonstrate the effectiveness of our approach on both a tabular representation and on a robot
arm which uses function approximation. We evaluate our
algorithm in the continual learning setting where it is not
possible to specify all GVFs a priori, but rather GVFs are
added incrementally during the course of learning. As a key
result, we show that using a learned SR enables an agent to
learn newly added GVFs faster than when learning the same
GVFs in the standard fashion without the use of the SR.
II. BACKGROUND
We consider an agent interacting with the environment
sequentially. We use the standard notation in the reinforcement learning (RL) literature [5], modeling the problem as
a Markov Decision Process. Starting from state S0 ∈ S,
at each timestep the agent chooses an action, At ∈ A,
according to the policy distribution π : S × A → [0, 1], and
transitions to state St+1 ∈ S according to the probability
At
transition p(·|St , At ). For each transition St −−→
St+1
the agent receives a reward, Rt , from the reward function
R(St , At , St+1 ) ∈ R.
In this paper we focus on the prediction problem in RL, in
which the agent’s goal is to predict the value of a signal from
its current state (e.g., the cumulative sum of future rewards).
Note that throughout this paper we use upper case letters to
indicate random variables.
A. General Value Functions (GVFs)
The most common prediction made in RL is about the
expected return. The return is defined to be the sum of future
discounted rewardsPunder policy π starting from state s.
T
t
Formally, Gt =
t=0 γ Rt , with γ ∈ [0, 1] being the
discount factor and T being the final timestep, where T =
∞ denotes a continuing task. The function encoding the
prediction about the return is known as the value function
vπ (s) = Eπ [Gt |S0 = s].
GVFs [3] extend the notion of predictions to different
signals in the environment. This is done by replacing the
reward signal, Rt , by any other target signal, which we refer
to as the cumulant, Ct , and by allowing a state-dependent
discounting function, γt = γ(St ), instead of using a fixed
discounting factor. The general value of state s under policy
π is defined as:
X
vπ:γ (s) = c̄π + γ̄π
pπ (s0 |s)vπ (s0 ),
(1)
s0
where c̄π is the average cumulant from state s, γ̄π is the
average γ from state s, and pπ (s0 |s) is the probability of
transitioning from state s to s0 under policy π. This can also
be written in matrix form: vπ:γ = c̄π + γ̄ π Pπ vπ:γ , where
denotes element-wise multiplication.. Such an equation,
when solved, gives us
vπ:γ = (I − γ̄ π
Pπ )−1 c̄π ,
(2)
where I is the identity matrix, v, c̄, γ̄ ∈ R|S|×1 , and
Pπ ∈ [0, 1]|S|×|S| is a probability matrix such that [Pπ ]ij =
E[pπ (St+1 = sj |St = si )].
B. The Successor Representation (SR)
The successor representation [8] was initially proposed as
a representation capable of capturing state similarity in terms
of time. It is formally defined, for a fixed γ < 1, as:
∞
i
hX
ψπ (s, s0 ) = Eπ
γ t 1{St =s0 } |S0 = s .
t=0
In words, the SR encodes the expected number of times the
agent will visit a particular state when the sum is discounted
by γ over time1 . It can be re-written in matrix form as
Ψπ =
∞
X
(γPπ )t = (I − γPπ )−1 .
(3)
t=0
Importantly, the SR can be easily computed, incrementally,
by standard RL algorithms such as TD learning [4], since its
primary modification is to replace the reward signal by a
state visitation counter. Nevertheless, despite its simplicity,
the SR holds important properties we leverage in this paper.
The SR, in the limit, for a constant γ (see Eq. 3),
corresponds to the first factor of the solution in Eq. 2. Thus,
the SR can be seen as encoding the dynamics of the Markov
chain induced by the policy π and by the environment’s
transition probability p. If the agent has access to the SR, it
can accurately predict the (discounted) accumulated value of
any signal, from any state, by simply learning the expected
immediate value, c̄π , of that signal in each state. On the
other hand, if the agent does not use the SR, the agent must
also deal with the problem of credit assignment, having to
look at n-step returns to control for delayed consequences.
1 Note that Dayan describes the SR as predicting future state visitation
from time t onward. This is non-standard in RL as we typically describe
the return as predicting the signal from t + 1 onward.
Importantly, the dynamics encoded by the SR
for all signals learned under the same policy
function. This factorization of the solution
property we use in our work, described in the
are the same
and discount
is the main
next section.
III. METHODS
As aforementioned, we are interested in the problem of
knowledge acquisition in the continual learning setting [1],
where knowledge is encoded as predictive questions (GVFs).
In this setting it is not possible to specify all GVFs ahead of
time. Instead, GVFs must be added incrementally by some,
as yet unknown, mechanism. The standard approach would
be to learn each newly added prediction from scratch. In this
section we discuss how we can use the SR to accelerate learning by taking advantage of the factorization shown in Eq. 2.
Our method leverages the fact that the SR is independent of
the target signal being predicted, learning the SR separately
and re-using it when learning to predict new signals.
In the previous section, for clarity, we discussed the main
concepts in the tabular case. In real world applications,
where the state space is too large, assuming states can be
uniquely identified is not often feasible. Instead, we generally
represent states as a set of features φ(s) ∈ Rd where
d |S|. Because both ψ and c̄ are a function of feature
vector φ(S), they can easily be represented using function
approximation and learned using TD algorithms. In order
to present a more general version of our algorithm, we
introduce it here using the function approximation notation.
The first step in our algorithm is to compute the one-step
average cumulant, which we do with TD error:
δt = Ct+1 − c̄ φ(St ) .
(4)
If we use
linear function approximation to estimate c̄ then
c̄ φ(s) = φ(s)> w. The TD error for ψ is given as (note
that δ is a vector of length n)
δ t = φ(St ) + γt+1 ψ φ(St+1 ) − ψ φ(St ) .
(5)
This generalization of the SR to the function approximation
case is known as successor features [9].
If we use linear function approximation to estimate ψ
then ψ φ(s) = M > φ(s), where M ∈ Rd×d . Using the
usual semi-gradient method,2 often used with TD, we derive
a TD(0) stochastic gradient descent update as:
1
Mt+1 = Mt − α∇M (δ 2t )
2
= Mt + α∇M ψ(St ) ⊗ δ t
= Mt + αφ(St ) ⊗ δ t ,
where ∇M is the gradient with respect to M and ⊗ is
the outer product. Based on this derivation, as well as
Eq. 4 and 5, we obtain Algorithm 1. Note that the last two
lines of Algorithm 1, which update the SR for the state S 0 ,
are only required for the episodic case.
2 In semi-gradient methods, the effect of M on the prediction target
φ(St+1 ) + γψ φ(St+1 ) is ignored when computing the gradient.
Algorithm 1
TABLE I: Signal Primitives
GVF prediction with the SR
Input: Feature representation φ, policy π, discount function γ, and step-sizes αC , αSR
Output: Matrix M and vectors c̄i as predictors of Ci
Initialize w and M arbitrarily
while S 0 is not terminal do
Observe state S, take action A selected according to
π(S), and observe a next state S 0 and the cumulants Ci
δSR = φ(S) + γ(S 0 )M > φ(S 0 ) − M > φ(S)
M ← M + αSR φ(S) ⊗ δSR
for each cumulant Ci do
δCi = Ci − φ(S)> wi
wi ← wi + αCi φ(S)δCi
end for
end while
δSR = φ(S 0 ) − M > φ(S 0 )
M ← M + αSR φ(S 0 ) ⊗ δSR
This algorithm allows us to predict the cumulant Ci , in
state S, using the current estimate of the matrix M and the
weights wi . We can then obtain the final prediction by simply
>
>
>
computing ψ φ(S) w = M > φ(s) w = φ(s) M w.
This algorithm accelerates learning because, generally,
learning to estimate c̄ is faster than learning the GVF directly.
This is exactly what our algorithm does. When predicting a
new signal, it starts with its current estimate for the SR,
Ψ. At the end, the multiplication Ψc̄ is simply a weighted
average of the one-step predictions across all states, weighted
by the likelihood they will be visited. We provide empirical
evidence supporting this claim in the next sections.
IV. EVALUATION IN DAYAN’S GRID WORLD
We first evaluated our algorithm in a tabular grid world. Its
simplicity allowed us to analyze our method more thoroughly
since we were not bounded by the speed and complexity of
physical robots. The grid world we used was inspired by
Dayan’s [8] (see Figure 1a). Four actions are available in this
environment: up, down, left, right. Taking an action into a
wall (blue) results in no change in position. Transitions are
deterministic, i.e., a move in any direction moves the agent to
the next cell in the given direction, except when moving into
a wall. For each episode the agent spawns at location S and
the episode terminates when the agent reaches the goal G.
We generated fifty different signals for the agent to
predict. They were generated randomly from a collection
of primitives enumerated in Table I. They are composed
of two different primitives, one for each axis, like so:
(sigx (x + of f setx ) + biasx ) ∗ (sigy (y + of f sety ) + biasy ).
The bias and offset were drawn from [−2.0, 2.0) and [0, 10),
respectively. Offset and bias were not applied to either the
unit or shortest path primitives. Further, the shortest path
primitive was not combined with a second signal, but was
Primitive
Fixed value
Square wave
Sin wave
Random
binary
Random float
Unit
Shortest path
Parameters
value ∈ [−2.0, 2.0)
period ∈ [2, 40), invert ∈ [T rue, F alse]
period ∈ [2, 40)
Fixed random binary string generated over
the length of an axis.
Fixed random floats ∈ [0, 1.0) generated
over the length of an axis.
Fixed value of 1.0
transition cost ∈ [−10.0, −1.0),
goal reward ∈ [1.0, 10.0)
used on its own. Gaussian noise with a standard deviation
of 0.3 was applied on top of each signal. The shortest path
signal is inspired by a common reward function used in RL
where each transition has a cost (a negative reward) meant
to push the agent to completing a task in a timely manner
and reaching the goal produces a positive reward signal.
Our agent selects actions using -greedy action selection
where, at each timestep, with probability 1 − , it uses the
action specified by a hand-coded policy (see Figure 1a), and
otherwise chooses randomly from all four actions ( = 0.3
in our experiments). A tabular representation is used with
each grid cell uniquely represented by a one-hot encoding.
In this set of experiments we can compute the groundtruth predictors for the SR and the signal predictors. This is
done by taking the average return observed from each state.
The SR reference was averaged over 30,000 episodes and
the signal predictor references were averaged over 10,000
episodes. Each episode started at the start state and followed
the -greedy policy already described.
We first evaluated the predictive performance of our SR
learning algorithm with respect to the step-size for a variety
of γ values. We report the average over 30 trials of 10,000
episodes. We initialize the SR weights to 0.0. The squared
Euclidean distance was calculated between the predicted SR
and the reference SR for each timestep. These values were
summed over the run and the average was taken across the
runs. These averages are shown in Figure 1b.
Using the results in Figure 1b we evaluated the performance of the two signal prediction approaches by sweeping
across step-sizes for various γ. For each experimental run,
learning of a new signal was enabled incrementally every 50
episodes. This produced runs with a total length of 2,500
episodes where the first pair of GVFs added (the direct and
one-step predictors) were trained for 2,500 episodes and the
last added GVFs were trained for 50 episodes. Further, for
each run, the order in which the signals were added was
randomized. Thirty runs were performed. The weights of the
predictors and of the SR were initialized to 0.0. Notice that
the SR was being learned at the same time as the direct and
one-step predictions.
For each run a cumulative MSE for each signal i was
calculated according to Eq. 6. This equation computes the
total squared error between the predictor’s estimate, V and
the reference predictor’s estimate, V ∗ . For each episode, E,
the error of the current and previous episodes is averaged.
Then, for each signal, the maximum error for a given γ,
(a)
(b)
(c)
Fig. 1: a) Dayan’s grid world. Arrows indicate the hand-coded policy (from the start state the policy is to go up). Black
squares indicate the SR prediction given from the starting state, S, for γ = 1.0; the darker the square the higher the expected
visitation. Notice the graying around the central path caused by the -greedy action selection. b) MSE of the SR as a function
of step-size α for different values of γ. Lowest error is indicated by the markers. c) A comparison of the NMSE of the direct
(dashed lines) and SR-based (solid lines) predictions as a function of fixed step-size α and discount factor γ summed across
all signals. Lowest cumulative error is indicated by up arrows (direct predictions) and down arrows (SR-based predictions).
Note, that although difficult to see, confidence intervals of 95% are included in both b and c.
either in the direct or SR-based predictions, is found and used
to normalize the errors in the signal across that particular
value of γ (see Eq. 7). In this way we attempt to treat
the error of each signal equally. If this is not done the
errors of large magnitude signals dominate the results. These
normalized values are then summed across the signals and
the averages across all 30 runs are plotted in Figure 1c.
M SEi =
E T
1 XX
∗ 2
(Vi:t − Vi:t
)
E e t
(6)
M SEi:α:γ
maxα (M SEi:γ:direct , M SEi:γ:SR )
(7)
0
N M SEi:α:γ =
The advantage of the SR-based method is clear as γ
increases. This is to be expected since for γ = 0.0 both
methods are making one-step predictions. In the experiment
of Figure 1c, the SR performs better in the vast majority of
the signals, as shown in Table II. For all step-sizes not listed
the SR-based method was better on all signals. Analysis
of these cases where the direct method did better reveal
that some of the target signals have very small magnitudes,
suggesting the SR-based approach may be more susceptible
to signal-to-noise ratio. Further analysis remains to be done.
Finally, we analyzed how the prediction error of our
systems evolve with time. This is demonstrated in Figure 2
where we selected the best step-sizes for γ = 0.9 and
plotted the performance over time across 30 different runs.
In this case the order of the signals remained fixed so that
sensible averages could be plotted for each signal. Signal
performance was normalized as before and summed across
TABLE II: Signal performance for γ = 0.9 of Figure 1c.
α
0.25
0.5
0.75
1.0
Direct Better
3
5
4
1
SR-Based Better
47
45
46
49
Fig. 2: All predictors learn from scratch with new predictors
added in every 50 episodes. As the SR error (red, right axis)
goes low the SR-based predictors (green) are able to learn
faster than their direct (blue) counterparts. Shading indicates
a 95% confidence interval.
all active signals. As expected, we clearly see that the SRbased predictions (green) start with much higher error than
the direct (blue), but as the error of the SR (red) drops low the
newly added SR-based predictors are able to learn quicker,
with less peak and overall error than the direct predictor.
In the continual learning setting we never have the opportunity to tune for optimal step-sizes as we did in our
evaluation. Practically, fixed step-sizes are used for many
robotics settings in RL, but, in order to ensure stable learning,
small step-sizes are chosen. As we saw in Figure 1c, the
advantage of using the SR-based predictions is enhanced
with smaller step-sizes. Ideally, however, we would imagine
that a fully developed system would use some method of
adapting step-sizes, such as ADADELTA [10].
V. EVALUATION ON A ROBOT ARM
Tabular settings like Dayan’s grid world are useful for
enabling analysis and providing insight into the behavior
of our method. However, our goal is to accelerate learning
Fig. 3: The user controls the robot arm using a joystick to
trace the inside of the wire maze in a counter-clockwise
direction. Circuit path shown in blue.
on a real robot where states are not fully observed and
cannot be represented exactly; instead we must use function
approximation. Here we demonstrate our approach using a
robot arm and learning sensorimotor predictions with respect
to a human-generated policy. In our task a user controls a
robot arm via joystick to trace a counter-clockwise circuit
through the inside of the wire maze (see Figure 3) with a
rod held in the robot’s gripper. The user performed this task
for approximately 12 minutes completing around 50 circuits.
In this experiment we used six different prediction targets:
the current, position and speed of both the shoulder rotation
and elbow flexion joints. A new predictor was activated every
2,000 timesteps (Note that the robot reports sensor updates
at 30 timesteps/s). For this demonstration a discount factor
of γ = 0.95 was used. Four signals were used as input
to our function approximator: the current position and a
decaying trace of the position for the shoulder and elbow
joints. The decaying trace for joint j was calculated as
trj:t+1 = 0.8 ∗ trj:t + 0.2 ∗ posj:t+1 . These inputs were
normalized over the joint ranges observed in the experiment
and passed into a 4-dimensional tilecoding [5] with 100
tilings of width 1.0 and a total memory size of 2048.
Additionally a bias unit was added, resulting in a binary
feature vector of length 2049 with a maximum of 101 active
features on each timestep (hashing collisions can reduce this
number). We use a decaying step-size for all the predictors
where the step-size starts at 0.1 and decays linearly to zero
over the entire dataset. At each timestep this step-size is
further divided by the number of active features in φ(St ).
Finally, for each predictor, this step-size is offset such that
the step-size starts at 0.1 when it is first activated and decays
at the same rate as all the other predictors.
To compare the prediction error we compute a running
MSE for each signal according to Eq. 8, where at each
timestep t the sum is taken over all previous timesteps.
Unlike the previous tabular domain, we do not have the
ideal estimator to compare against and instead compare the
predictions, V , against the actual return, G. In order to
treat each signal equally we further normalize these errors
according to Eq. 9. Note that the NMSE allows us to compare
the predictions of a single signal between the two methods,
but does not tell us how accurate the predictions are nor does
Fig. 4: A 12 minute run tracing the maze circuit. A new
predictor is added every 2,000 timesteps. NMSE errors are
summed across all predictors.
it allow comparison between signals.
T
1 X
(Vi:t − Gi:t )2
T t=t
(8)
M SEi
max(M SEi:direct , M SEi:SR )
(9)
M SEi:t =
0
N M SEi =
Figures 4 and 5 show a single run, approximately 12
minutes in length. A single ordering of the predictors was
used. Figure 4 shows the error across all predictors while
Figure 5 separates out each predictor. Here we see a clear
advantage to using the SR-based predictions for most of the
signals. Unlike the previous tabular results, there is little
difference on the performance of the first predictor (shoulder
current), even while the SR is being learned. To investigate,
we ran experiments where each signal was learned from the
beginning of the run. We observed that performance was
rarely worse and sometimes even better when using the SRbased method. This suggests the SR-based approach is more
robust than expected, but further experimentation is needed.
VI. FURTHER ADVANTAGES WHEN SCALING
While this paper analyzed single policies and discount
functions, this is not the setting in which the GVF framework
is proposed to be used. Rather, it is imagined that massive
numbers of GVFS over many policies and timescales will
be used represent complex models of the world [3], [11]. In
this setting we note that using SR-based predictions can offer
additional benefits, allowing the robot to do more with less.
Consider, for a single policy π, a collection of SRs learned
for f discount functions and h one-step predictors. We can
then represent f h predictions using f + h predictors. A first
advantage is that far fewer GVFs need to be updated on each
timestep, saving computational costs. As a second benefit,
there is potential to reduce the number of weights used by the
system. For example, consider learning in a tabular setting,
with |S| states, using linear estimators. For f h predictions
the number of weights needed is : |w|direct = f h|S|,
|w|SR−based = f |S|2 + h|S|. It can be shown that for a
fixed f and S the total number of weights used by the direct
|S|
prediction approach is greater when h > ff −1
.
new predictor. We demonstrated this behaviour in both a
tabular grid world and on a robot arm. These results suggest
an effective method for improving the learning rate and
sample efficiency for robots learning in the real world.
There are several clear opportunities for further research
on this topic. The first is to provide greater understanding
into why, for a given fixed step-size, some (few) signals are
better predicted directly rather than through the SR. Further,
the work in using the SR with function approximation is
preliminary and more insight can yet be gained in this setting.
Another opportunity for research is to explore using SRbased predictions with state-dependent discount functions.
Finally, we suggest that SR-based predictions with deep
feature learning [12], [13] and an incrementally constructed
architecture would be a very powerful tool to support continual or developmental learning in robotic domains with
widespread real-world applications.
R EFERENCES
Fig. 5: The same results as Figure 4, but with the NMSE for
the individual predictors. Each is normalized from 0 to 1.
VII. RELATED WORK
The idea of the SR was originally introduced as a function
approximation method [8]. However, it has recently been
applied to other settings. It has been used, for instance,
in transfer learning problems allowing agents to generalize
better across similar but different tasks [9], [12], and to define
intrinsic rewards in option discovery algorithms [13].
GVFs were originally proposed as a method for building
an agent’s overall knowledge in a modular way [3]. To
date they have primarily been used with hand-coded fixed
policies [11]. The UNREAL agent [14] is a powerful demonstration of the usefulness of multiple predictions; pre-defined
auxiliary tasks, which can be viewed as GVFs, are shown to
accelerate and improve the robustness of learning.
Finally, the idea closest to this work is the concept of
Universal Value Functions (UVFAs) [15]. UVFAs are, as
GVFs, a generalization of value functions. However, instead
of generalizing them to multiple predictors (and discount
factors) they generalize value functions over goals in a
parametrized way. We believe our result and the idea of
UVFAs are complementary, and could in fact be eventually
combined in a future work.
VIII. CONCLUSIONS
In this paper we showed how the successor representation
(SR), although originally introduced for another purpose,
can be used to accelerate learning in a continual learning
setting in which a robot incrementally constructs models of
its world as a collection of predictions known as general
value functions (GVFs). The SR enables a given prediction
to be modularized into two components, one representing
the dynamics of the environment (the SR) and the other
representing the target signal (one-step signal prediction).
This allows a robot to reuse its existing knowledge when
adding a new prediction target, speeding up learning of the
[1] M. B. Ring, “Continual Learning in Reinforcement Environments,”
Ph.D. dissertation, The University of Texas at Austin, 1994.
[2] P. Oudeyer, F. Kaplan, and V. V. Hafner, “Intrinsic Motivation Systems for Autonomous Mental Development,” IEEE Transactions on
Evolutionary Computation, vol. 11, no. 2, pp. 265–286, 2007.
[3] R. S. Sutton, J. Modayil, M. Delp, T. Degris, P. M. Pilarski, A. White,
and D. Precup, “Horde: a Scalable Real-time Architecture for Learning
Knowledge from Unsupervised Sensorimotor Interaction,” in Proceedings of the International Joint Conference on Autonomous Agents and
Multiagent Systems (AAMAS), 2011, pp. 761–768.
[4] R. S. Sutton, “Learning to Predict by the Methods of Temporal
Differences,” Machine Learning, vol. 3, pp. 9–44, 1988.
[5] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction. MIT Press, 1998.
[6] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
Bellemare, A. Graves, M. A. Riedmiller, A. Fidjeland, G. Ostrovski,
S. Petersen, C. Beattie, A. Sadik, I. Antonoglou, H. King, D. Kumaran,
D. Wierstra, S. Legg, and D. Hassabis, “Human-level Control through
Deep Reinforcement Learning,” Nature, vol. 518, no. 7540, pp. 529–
533, 2015.
[7] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang,
A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton, Y. Chen, T. Lillicrap,
F. Hui, L. Sifre, G. van den Driessche, T. Graepel, and D. Hassabis,
“Mastering the Game of Go Without Human Knowledge,” Nature, vol.
550, pp. 354–359, 2017.
[8] P. Dayan, “Improving Generalization for Temporal Difference Learning: The Successor Representation,” Neural Computation, vol. 5, no. 4,
pp. 613–624, 1993.
[9] A. Barreto, W. Dabney, R. Munos, J. J. Hunt, T. Schaul, D. Silver, and
H. P. van Hasselt, “Successor Features for Transfer in Reinforcement
Learning,” in Advances in Neural Information Processing Systems
(NIPS), 2017, pp. 4058–4068.
[10] M. D. Zeiler, “ADADELTA: An Adaptive Learning Rate Method,”
CoRR, vol. abs/1212.5701, 2012.
[11] J. Modayil, A. White, and R. S. Sutton, “Multi-Timescale Nexting in
a Reinforcement Learning Robot,” Adaptive Behavior, vol. 22, no. 2,
pp. 146–160, 2014.
[12] T. D. Kulkarni, A. Saeedi, S. Gautam, and S. J. Gershman, “Deep Successor Reinforcement Learning,” CoRR, vol. abs/1606.02396, 2016.
[13] M. C. Machado, C. Rosenbaum, X. Guo, M. Liu, G. Tesauro, and
M. Campbell, “Eigenoption Discovery through the Deep Successor
Representation,” in Proceedings of the International Conference on
Learning Representations (ICLR), 2018.
[14] M. Jaderberg, V. Mnih, W. M. Czarnecki, T. Schaul, J. Z. Leibo, D. Silver, and K. Kavukcuoglu, “Reinforcement Learning with Unsupervised
Auxiliary Tasks,” in Proceedings of the International Conference on
Learning Representations (ICLR), 2017.
[15] T. Schaul, D. Horgan, K. Gregor, and D. Silver, “Universal Value Function Approximators,” in Proceedings of the International Conference
on Machine Learning (ICML), 2015, pp. 1312–1320.
| 2cs.AI
|
Foundations of Declarative Data Analysis Using Limit Datalog Programs
arXiv:1705.06927v2 [cs.AI] 12 Nov 2017
Mark Kaminski, Bernardo Cuenca Grau, Egor V. Kostylev, Boris Motik and Ian Horrocks
Department of Computer Science, University of Oxford, UK
{mark.kaminski, bernardo.cuenca.grau, egor.kostylev, boris.motik, ian.horrocks}@cs.ox.ac.uk
Abstract
Motivated by applications in declarative data analysis, we study Datalog Z —an extension of positive Datalog with arithmetic functions over integers. This language is known to be undecidable, so
we propose two fragments. In limit Datalog Z predicates are axiomatised to keep minimal/maximal
numeric values, allowing us to show that fact entailment is CO NE XP T IME-complete in combined,
and CO NP-complete in data complexity. Moreover,
an additional stability requirement causes the complexity to drop to E XP T IME and PT IME, respectively. Finally, we show that stable Datalog Z can
express many useful data analysis tasks, and so our
results provide a sound foundation for the development of advanced information systems.
1
Introduction
Analysing complex datasets is currently a hot topic in information systems. The term ‘data analysis’ covers a broad
range of techniques that often involve tasks such as data aggregation, property verification, or query answering. Such
tasks are currently often solved imperatively (e.g., using Java
or Scala) by specifying how to manipulate the data, and this
is undesirable because the objective of the analysis is often
obscured by evaluation concerns. It has recently been argued
that data analysis should be declarative [Alvaro et al., 2010;
Markl, 2014; Seo et al., 2015; Shkapsky et al., 2016]: users
should describe what the desired output is, rather than how to
compute it. For example, instead of computing shortest paths
in a graph by a concrete algorithm, one should (i) describe
what a path length is, and (ii) select only paths of minimum
length. Such a specification is independent of evaluation details, allowing analysts to focus on the task at hand. An evaluation strategy can be chosen later, and general parallel and/or
incremental evaluation algorithms can be reused ‘for free’.
An essential ingredient of declarative data analysis is an
efficient language that can capture the relevant tasks, and
Datalog is a prime candidate since it supports recursion.
Apart from recursion, however, data analysis usually also requires integer arithmetic to capture quantitative aspects of
data (e.g., the length of a shortest path). Research on combining the two dates back to the ’90s [Mumick et al., 1990;
Kemp and Stuckey, 1991; Beeri et al., 1991; Van Gelder,
1992; Consens and Mendelzon, 1993; Ganguly et al., 1995;
Ross and Sagiv, 1997], and is currently experiencing a revival
[Faber et al., 2011; Mazuran et al., 2013]. This extensive
body of work, however, focuses primarily on integrating recursion and arithmetic with aggregate functions in a coherent
semantic framework, where technical difficulties arise due to
nonmonotonicity of aggregates. Surprisingly little is known
about the computational properties of integrating recursion
with arithmetic, apart from that a straightforward combination is undecidable [Dantsin et al., 2001]. Undecidability also
carries over to the above formalisms and practical Datalogbased systems such as BOOM [Alvaro et al., 2010], DeALS
[Shkapsky et al., 2016], Myria [Wang et al., 2015], SociaLite
[Seo et al., 2015], Overlog [Loo et al., 2009], Dyna [Eisner
and Filardo, 2011], and Yedalog [Chin et al., 2015].
To develop a sound foundation for Datalog-based declarative data analysis, we study Datalog Z —negation-free Datalog with integer arithmetic and comparisons. Our main contribution is a new limit Datalog Z fragment that, like the existing data analysis languages, is powerful and flexible enough
to naturally capture many important analysis tasks. However,
unlike Datalog Z and the existing languages, reasoning with
limit programs is decidable, and it becomes tractable in data
complexity under an additional stability restriction.
In limit Datalog Z , all intensional predicates with a numeric
argument are limit predicates. Instead of keeping all numeric
values for a given tuple of objects, such predicates keep only
the minimal (min) or only the maximal (max) bounds of numeric values entailed for the tuple. For example, if we encode
a weighted directed graph using a ternary predicate edge, then
rules (1) and (2), where sp is a min limit predicate, compute
the cost of a shortest path from a given source node v0 to
every other node.
→ sp(v0 , 0)
sp(x, m) ∧ edge(x, y, n) → sp(y, m + n)
(1)
(2)
If these rules and a dataset entail a fact sp(v, k), then the cost
of a shortest path from v0 to v is at most k; hence, sp(v, k 0 )
holds for each k 0 ≥ k since the cost of a shortest path is also at
most k 0 . Rule (2) intuitively says that, if x is reachable from
v0 with cost at most m and hx, yi is an edge of cost n, then v 0
is reachable from v0 with cost at most m + n. This is different from Datalog Z , where there is no implicit semantic con-
nection between sp(v, k) and sp(v, k 0 ), and such semantic
connections allow us to prove decidability of limit Datalog Z .
We provide a direct semantics for limit predicates based on
Herbrand interpretations, but we also show that this semantics can be axiomatised in standard Datalog Z . Our formalism
can thus be seen as a fragment of Datalog Z , from which it
inherits well-understood properties such as monotonicity and
existence of a least fixpoint model [Dantsin et al., 2001].
Our contributions are as follows. First, we introduce limit
Datalog Z programs and argue that they can naturally capture
many relevant data analysis tasks. We prove that fact entailment in limit Datalog Z is undecidable, but, after restricting the use of multiplication, it becomes CO NE XP T IME- and
CO NP-complete in combined and data complexity, respectively. To achieve tractability in data complexity (which is
very important for robust behaviour on large datasets), we additionally introduce a stability restriction and show that this
does not prevent expressing the relevant analysis tasks.
The proofs of all results are given in the appendix of this
paper.
2
Preliminaries
In this section, we recapitulate the well-known definitions of
Datalog with integers, which we call Datalog Z .
Syntax A vocabulary consists of predicates, objects, object
variables, and numeric variables. Each predicate has an integer arity n, and each position 1 ≤ i ≤ n is of either object
or numeric sort. An object term is an object or an object variable. A numeric term is an integer, a numeric variable, or
of the form s1 + s2 , s1 − s2 , or s1 × s2 where s1 and s2 are
numeric terms, and +, −, and × are the standard arithmetic
functions. A constant is an object or an integer. The magnitude of an integer is its absolute value. A standard atom
is of the form B(t1 , . . . , tn ), where B is a predicate of arity
n and each ti is a term whose type matches the sort of position i of B. A comparison atom is of the form (s1 < s2 ) or
(s1 ≤ s2 ), where < and ≤ are the standard comparison predicates,Vand s1 Vand s2 are numeric terms. A rule r is of the
form i αi ∧ j βj → α, where α(i) are standard atoms, βj
are comparison atoms, and each variable in r occurs
V in some
αi . Atom h(r) = α is the head
V of r; sb(r) = i αi is the
standard body of r; cb(r) = j βj is the comparison body
of r; and b(r) = sb(r) ∧ cb(r) is the body of r. A ground
instance of r is obtained from r by substituting all variables
by constants. A (Datalog Z ) program P is a finite set of rules.
Predicate B is intensional (IDB) in P if B occurs in P in the
head of a rule whose body is not empty; otherwise, B is extensional (EDB) in P. A term, atom, rule, or program is ground
if it contains no variables. A fact is a ground, function-free,
standard atom. Program P is a dataset if h(r) is a fact and
b(r) = ∅ for each r ∈ P. We often say that P contains a
fact α and write α ∈ P, which actually means → α ∈ P. We
write a tuple of terms as t, and we often treat conjunctions
and tuples as sets and write, say, αi ∈ sb(r), |t|, and ti ∈ t.
Semantics A (Herbrand) interpretation I is a (not necessarily finite) set of facts. Such I satisfies a ground atom α,
written I |= α, if (i) α is a standard atom and evaluating the
arithmetic functions in α produces a fact in I, or (ii) α is a
comparison atom and evaluating the arithmetic functions and
comparisons produces true. The notion of satisfaction is extended to conjunctions of ground atoms, rules, and programs
as in first-order logic, where each rule is universally quantified. If I |= P, then I is a model of program P; and P entails
a fact α, written P |= α, if I |= α holds whenever I |= P.
Complexity In this paper we study the computational properties of checking P |= α. Combined complexity assumes that
both P and α are part of the input. In contrast, data complexity assumes that P is given as P 0 ∪ D for P 0 a program and
D a dataset, and that only D and α are part of the input while
P 0 is fixed. Unless otherwise stated, all numbers in the input
are coded in binary, and the size kPk of P is the size of its
representation. Checking P |= α is undecidable even if the
only arithmetic function in P is + [Dantsin et al., 2001].
Presburger arithmetic is first-order logic with constants 0
and 1, functions + and −, equality, and the comparison predicates < and ≤, interpreted over all integers Z. The complexity of checking sentence validity (i.e., whether the sentence
is true in all models of Presburger arithmetic) is known when
the number of quantifier alternations and/or the number of
variables in each quantifier block are fixed [Berman, 1980;
Grädel, 1988; Schöning, 1997; Haase, 2014].
3
Limit Programs
Towards introducing a decidable fragment of Datalog Z for
data analysis, we first note that the undecidability proof of
(plain) Datalog Z outlined by Dantsin et al. [2001] uses atoms
with at least two numeric terms. Thus, to motivate introducing our fragment, we first prove that undecidability holds
even if atoms contain at most one numeric term. The proof
uses a reduction from the halting problem for deterministic
Turing machines. To ensure that each standard atom in P has
at most one numeric term, combinations of a time point and
a tape position are encoded using a single integer.
Theorem 1. For P a Datalog Z program and α a fact, checking P |= α is undecidable even if P contains no × or − and
each standard atom in P has at most one numeric term.
We next introduce limit Datalog Z , where limit predicates
keep bounds on numeric values. This language can be seen
as either a semantic or a syntactic restriction of Datalog Z .
Definition 2. In limit Datalog Z , a predicate is either an object predicate with no numeric positions, or a numeric predicate where only the last position is numeric. A numeric predicate is either an ordinary numeric predicate or a limit predicate, and the latter is either a min or a max predicate. Atoms
with object predicates are object atoms, and analogously for
other types of atoms/predicates. A Datalog Z rule r is a limit
(Datalog Z ) rule if (i) b(r) = ∅, or (ii) each atom in sb(r) is
an object, ordinary numeric, or limit atom, and h(r) is an
object or a limit atom. A limit (Datalog Z ) program P is a
program containing only limit rules; and P is homogeneous
if it does not contain both min and max predicates.
In the rest of this paper we make three simplifying assumptions. First, numeric atoms occurring in a rule body are
function-free (but comparison atoms and the head can contain arithmetic functions). Second, each numeric variable in
a rule occurs in at most one standard body atom. Third, distinct rules in a program use different variables. The third
assumption is clearly w.l.o.g. because all variables are universally quantified so their names are immaterial. Moreover,
the first two assumptions are w.l.o.g. as well since, for each
rule, there exists a logically equivalent rule that satisfies these
assumptions. In particular, we can replace an atom such as
A(t, m1 + m2 ) with conjunction
A(t, m) ∧ I(m1 ) ∧ I(m2 ) ∧
(m ≤ m1 + m2 ) ∧ (m1 + m2 ≤ m)
where m is a fresh variable and I is a fresh predicate axiomatised to hold on all integers as follows:
→ I(0)
I(m) → I(m + 1)
I(m) → I(m − 1)
Also, we can replace atoms A1 (t1 , m) ∧ A2 (t2 , m) with conjunction A1 (t1 , m) ∧ A2 (t2 , m0 ) ∧ (m ≤ m0 ) ∧ (m0 ≤ m),
where m0 is a fresh variable.
Intuitively, a limit fact B(a, k) says that the value of B for
a tuple of objects a is at least k (if B is max) or at most k
(if B is min). For example, a fact sp(v, k) in our shortest
path example from Section 1 says that node v is reachable
from v0 via a path with cost at most k. To capture this intended meaning, we require interpretations I to be closed for
limit predicates—that is, whenever I contains a limit fact α, it
also contains all facts implied by α according to the predicate
type. In our example, this captures the observation that the
existence of a path from v0 to v of cost at most k implies the
existence of such a path of cost at most k 0 for each k 0 ≥ k.
Definition 3. An interpretation I is limit-closed if, for each
limit fact B(a, k) ∈ I where B is a min (resp. max) predicate, B(a, k 0 ) ∈ I holds for each integer k 0 with k ≤ k 0 (resp.
k 0 ≤ k). An interpretation I is a model of a limit program P
if I |= P and I is limit-closed. The notion of entailment is
modified to take into account only limit-closed models.
The semantics of limit predicates in a limit Datalog Z program P can be axiomatised explicitly by extending P with
the following rules, where Z is a fresh predicate. Thus, limit
Datalog Z can be seen as a syntactic fragment of Datalog Z .
→ Z(0)
Z(m) → Z(m + 1)
Z(m) → Z(m − 1)
B(x, m) ∧ Z(n) ∧ (m ≤ n) → B(x, n)
for each min predicate B in P
B(x, m) ∧ Z(n) ∧ (n ≤ m) → B(x, n)
for each max predicate B in P
Each limit program can be reduced to a homogeneous program; however, for the sake of generality, in our technical
results we do not require programs to be homogeneous.
Proposition 4. For each limit program P and fact α, a homogeneous program P 0 and fact α0 can be computed in linear
time such that P |= α if and only if P 0 |= α0 .
Intuitively, program P 0 in Proposition 4 is obtained by replacing all min (or all max) predicates in P by fresh max
(resp. min) predicates and negating their numeric arguments.
In Section 1 we have shown that limit Datalog Z can compute the cost of shortest paths in a graph. We next present
further examples of data analysis tasks that our formalism
can handle. In all examples, we assume that all objects in
the input are arranged in an arbitrary linear order using facts
first(a1 ), next(a1 , a2 ), . . . , next(an−1 , an ); we use this order to simulate aggregation by means of recursion.
Example 5. Consider a social network where agents are connected by the ‘follows’ relation. Agent as introduces (tweets)
a message, and each agent ai retweets the message if at least
kai agents that ai follows tweet the message, where kai is
a positive threshold uniquely associated with ai . Our goal
is to determine which agents tweet the message eventually.
To achieve this using limit Datalog Z , we encode the network
structure in a dataset Dtw containing facts follows(ai , aj ) if
ai follows aj , and ordinary numeric facts th(ai , kai ) if ai ’s
threshold is kai . Program Ptw , containing rules (3)–(8), encodes message propagation, where nt is a max predicate.
→ tw (as )
(3)
follows(x, y 0 ) ∧ first(y) → nt(x, y, 0)
follows(x, y) ∧ first(y) ∧ tw (y) → nt(x, y, 1)
nt(x, y 0 , m) ∧ next(y 0 , y) → nt(x, y, m)
0
(4)
(5)
(6)
0
nt(x, y , m) ∧ next(y , y) ∧
(7)
follows(x, y) ∧ tw (y) → nt(x, y, m + 1)
th(x, m) ∧ nt(x, y, n) ∧ (m ≤ n) → tw (x)
(8)
Specifically, Ptw ∪ Dtw |= tw (ai ) iff ai tweets the message.
Intuitively, nt(ai , aj , m) is true if, out of agents {a1 , . . . , aj }
(according to the order), at least m agents that ai follows
tweet the message. Rules (4) and (5) initialise nt for the first
agent in the order; nt is a max predicate, so if the first agent
tweets the message, rule (5) ‘overrides’ rule (4). Rules (6)
and (7) recurse over the order to compute nt as stated above.
Example 6. Limit Datalog Z can also solve the problem of
counting paths between pairs of nodes in a directed acyclic
graph. We encode the graph in the obvious way as a dataset
Dcp that uses object predicates node and edge. Program
Pcp , consisting of rules (9)–(14) where np and np 0 are max
predicates, then counts the paths.
node(x) → np(x, x, 1)
(9)
node(x) ∧ node(y) ∧ first(z) → np 0 (x, y, z, 0)
(10)
edge(x, z) ∧
np(z, y, m) ∧ first(z) → np 0 (x, y, z, m)
(11)
np 0 (x, y, z 0 , m) ∧ next(z 0 , z) → np 0 (x, y, z, m)
(12)
0
0
0
np (x, y, z , m) ∧ next(z , z) ∧
(13)
edge(x, z) ∧ np(z, y, n) → np 0 (x, y, z, m + n)
np 0 (x, y, z, m) → np(x, y, m)
(14)
Specifically, Pcp ∪ Dcp |= np(ai , aj , k) iff at least k paths
exist from node ai to node aj . Intuitively, np 0 (ai , aj , ak , m) is
true if m is at least the sum of the number of paths from each
a0 ∈ {a1 , . . . , ak } (according to the order) to aj for which
there exists an edge from ai to a0 . Rule (9) says that each
node has one path to itself. Rule (10) initialises aggregation
by saying that, for the first node z, there are zero paths from x
to y, and rule (11) overrides this if there exists an edge from
x to z. Finally, rule (12) propagates the sum for x to the next
z in the order, and rule (13) overrides this if there is an edge
from x to z by adding the number of paths from z 0 and z to y.
Example 7. Assume that, in the graph from Example 6, each
node ai is associated with a bandwidth bai limiting the number of paths going through ai to at most bai . To count the
paths compliant with the bandwidth requirements, we extend
Dcp to dataset Dbcp that additionally contains an ordinary
numeric fact bw (ai , bai ) for each node ai , and we define Pbcp
by replacing rule (14) in Pcp with the following rule.
np 0 (x, y, z, m) ∧ bw (z, n) ∧ (m ≤ n) → np(x, y, m)
Then, Pbcp ∪ Dbcp |= np(ai , aj , k) iff there exist at least k
paths from node ai to node aj , where the bandwidth requirement is satisfied for all nodes on each such path.
4
Fixpoint Characterisation of Entailment
Programs are often grounded to eliminate variables and thus
simplify the presentation. In limit Datalog Z , however, numeric variables range over integers, so a grounding can be
infinite. Thus, we first specialise the notion of a grounding.
Definition 8. A rule r is semi-ground if each variable in r is a
numeric variable that occurs in r in a limit body atom. A limit
program P is semi-ground if all of its rules are semi-ground.
The semi-grounding of P contains, for each r ∈ P, each rule
obtained from r by replacing each variable not occurring in
r in a numeric argument of a limit atom with a constant of P.
Obviously, P |= α if and only if P 0 |= α for P 0 the semigrounding of P. We next characterise entailment of limit
programs by pseudo-interpretations, which compactly represent limit-closed interpretations. If a limit-closed interpretation I contains B(b, k) where B is a min predicate, then
either the limit value ` ≤ k exists such that B(b, `) ∈ I and
B(b, k 0 ) 6∈ I for k 0 < `, or B(b, k 0 ) ∈ I holds for all k 0 ≤ k,
and dually for B a max predicate. Thus, to characterise the
value of B on a tuple of objects b in I, we just need the limit
value, or information that no such value exists.
Definition 9. A pseudo-interpretation J is a set of facts over
integers extended with a special symbol ∞ such that k = k 0
holds for all limit facts B(b, k) and B(b, k 0 ) in I.
Limit-closed interpretations correspond naturally and oneto-one to pseudo-interpretations, so we can recast the notions
of satisfaction and model using pseudo-interpretations. Unlike for interpretations, the number of facts in a pseudo-model
of a semi-ground limit program P can be bounded by |P|.
Definition 10. A limit-closed interpretation I corresponds to
a pseudo-interpretation J if I contains exactly all object and
ordinary numeric facts of J, and, for each limit predicate B,
each tuple of objects b, and each integer `, (i) B(b, k) ∈ I
for all k if and only if B(b, ∞) ∈ J, and (ii) B(b, `) ∈ I and
B(b, k) 6∈ I for all k < ` (resp. ` < k) and B is a min (resp.
max) predicate if and only if B(b, `) ∈ J.
Let J and J 0 be pseudo-interpretations corresponding to
interpretations I and I 0 . Then, J satisfies a ground atom α,
written J |= α, if I |= α; J is a pseudo-model of a program
P, written J |= P, if I |= P; finally, J v J 0 holds if I ⊆ I 0 .
Example 11. Let I be the interpretation consisting of A(1),
A(2), B(a, k) for k ≤ 5, and B(b, k) for k ∈ Z, where A is
an ordinary numeric predicate, B is a max predicate, and a
and b are objects. Then, {A(1), A(2), B(a, 5), B(b, ∞)} is
the pseudo-interpretation corresponding to I.
We next introduce the immediate consequence operator
TP of a limit program P on pseudo-interpretations. We assume for simplicity that P is semi-ground. To apply a rule
r ∈ P to a pseudo-interpretation J while correctly handling
limit atoms, operator TP converts r into a linear integer constraint C(r, J) that captures all ground instances of r applicable to the limit-closed interpretation I corresponding to J. If
C(r, J) has no solution, r is not applicable to J. Otherwise,
h(r) is added to J if it is not a limit atom; and if h(r) is a min
(max) atom B(b, m), then the minimal (maximal) solution
` for m in C(r, J) is computed, and J is updated such that
the limit value of B on b is at least (at most) `—that is, the
application of r to J keeps only the ‘best’ limit value.
Definition 12. For P a semi-ground limit program, r ∈ P,
and J a pseudo-interpretation, C(r, J) is the conjunction of
comparison atoms containing (i) cb(r); (ii) (0 < 0) if an object or ordinary numeric atom α ∈ sb(r) exists with α 6∈ J,
or a limit atom B(b, s) ∈ sb(r) exists with B(b, `) 6∈ J for
each `; and (iii) (` ≤ s) (resp. (s ≤ `)) for each min (resp.
max) atom B(b, s) ∈ sb(r) with B(b, `) ∈ J and ` 6= ∞.
Rule r is applicable to J if C(r, J) has an integer solution.
Assume r is applicable to J. If h(r) is an object or ordinary numeric atom, let hd(r, J) = h(r). If h(r) = B(b, s) is
a min (resp. max) atom, the optimum value opt(r, J) is the
smallest (resp. largest) value of s in all solutions to C(r, J),
or ∞ if no such bound on the value of s in the solutions to
C(r, J) exists; moreover, hd(r, J) = B(b, opt(r, J)).
Operator TP (J) maps J to the smallest (w.r.t. v) pseudointerpretation satisfying hd(r, J) for each r ∈ P applicable
to J. Finally, T0P = ∅, and TnP = TP (Tn−1
P ) for n > 0.
Example 13. Let r be A(x) ∧ (2 ≤ x) → B(x + 1) with A
and B max predicates. Then, C(r, ∅) = (2 ≤ x) ∧ (0 < 0)
does not have a solution, and therefore rule r is not applicable to the empty pseudo-interpretation. Moreover, for
J = {A(3)}, conjunction C(r, J) = (2 ≤ x) ∧ (x ≤ 3) has
two solutions—{x 7→ 2} and {x 7→ 3}—and therefore rule
r is applicable to J. Finally, B is a max predicate, and so
opt(r, J) = max{2 + 1, 3 + 1} = 4, and hd(r, J) = B(4).
Consequently, T{r} (J) = {B(4)}.
Lemma 14. For each semi-ground limit program P, operator
TP is monotonic w.r.t. v. Moreover, J |= P if and only if
TP (J) v J for each pseudo-interpretation J.
Monotonicity ensures existence of the closure T∞
P of P—
the least pseudo-interpretation such that TnP v T∞
P for each
n ≥ 0. The following theorem characterises entailment and
provides a bound on the number of facts in the closure.
Theorem 15. For P a semi-ground limit program and α a
∞
fact, P |= α if and only if T∞
P |= α; also, |TP | ≤ |P|; and
J |= P implies T∞
v
J
for
each
pseudo-interpretation
J.
P
The proofs for the first and the third claim of Theorem 15
use the monotonicity of TP analogously to plain Datalog.
The second claim holds since, for each n ≥ 0, each pair of
distinct facts in TnP must be derived by distinct rules in P.
5
Decidability of Entailment: Limit-Linearity
We now start our investigation of the computational properties of limit Datalog Z . Theorem 15 bounds the cardinality of
the closure of a semi-ground program, but it does not bound
the magnitude of the integers occurring in limit facts; in fact,
integers can be arbitrarily large. Moreover, due to multiplication, checking rule applicability requires solving nonlinear
inequalities over integers, which is undecidable.
Theorem 16. For P a semi-ground limit program and α a
fact, checking P |= α and checking applicability of a rule of
P to a pseudo-interpretation are both undecidable.
The proof of Theorem 16 uses a straightforward reduction
from Hilbert’s tenth problem.
Checking rule applicability is undecidable due to products
of variables in inequalities; however, for linear inequalities
that prohibit multiplying variables, the problem can be solved
in NP, and in polynomial time if we bound the number of
variables. Thus, to ensure decidability, we next restrict limit
programs so that their semi-groundings contain only linear
numeric terms. All our examples satisfy this restriction.
Definition 17. A limit rule r P
is limit-linear if each numeric
n
term in r is of the form s0 + i=1 si × mi , where (i) each
mi is a distinct numeric variable occurring in a limit body
atom of r, (ii) term s0 contains no variable occurring in a
limit body atom of r, and (iii) each si with i ≥ 1 is a term
constructed using multiplication ×, integers, and variables
not occurring in limit body atoms of r. A limit-linear program
contains only limit-linear rules.1
In the rest of this section, we show that entailment for limitlinear programs is decidable and provide tight complexity
bounds. Our upper bounds are obtained via a reduction to
the validity of Presburger formulas of a certain shape.
Lemma 18. For P a semi-ground limit-linear program
Wnand α
a fact, there exists a Presburger sentence ϕ = ∀x∃y. i=1 ψi
that is valid if and only if P |= α. Each ψi is a conjunction of possibly negated atoms. Moreover, |x| + |y| and
each kψi k are bounded polynomially by kPk + kαk. Number n is bounded polynomially by |P| and exponentially by
maxr∈P krk. Finally, the magnitude of each integer in ϕ is
bounded by the maximal magnitude of an integer in P and α.
The reduction in Lemma 18 is based on three main ideas.
First, for each limit atom B(b, s) in a semi-ground program
P, we use a Boolean variable def Bb to indicate that an atom
of the form B(b, `) exists in a pseudo-model of P, a Boolean
variable fin Bb to indicate whether the value of ` is finite, and
an integer variable val Bb to capture ` if it is finite. Second,
each rule of P is encoded as a universally quantified Presburger formula by replacing each standard atom with its encoding. Finally, entailment of α from P is encoded as a sentence stating that, in every pseudo-interpretation, either some
rule in P is not satisfied, or α holds; this requires universal
quantifiers to quantify over all models, and existential quantifiers to negate the (universally quantified) program.
Lemma 19 bounds the magnitude of integers in models of
Presburger formulas from Lemma 18. These bounds follow
from recent deep results on semi-linear sets and their connection to Presburger arithmetic [Chistikov and Haase, 2016].2
1
Note that each multiplication-free limit program can be normalised in polynomial time to a limit-linear program.
2
We thank Christoph Haase for providing a proof of this lemma.
Wn
Lemma 19. Let ϕ = ∀x∃y. i=1 ψi be a Presburger sentence where each ψi is a conjunction of possibly negated
atoms of size at most k mentioning at most ` variables, a
is the maximal magnitude of an integer in ϕ, and m = |x|.
Then, ϕ is valid if and only if ϕ is valid over models where
each integer variable assumes a value whose magnitude is
`
4
bounded by (2O(` log `) · ak` )n2 ·O(m ) .
Lemmas 18 and 19 provide us with bounds on the size of
counter-pseudo-models for entailment.
Theorem 20. For P a semi-ground limit-linear program, D
a dataset, and α a fact, P ∪ D 6|= α if and only if a pseudomodel J of P ∪ D exists where J 6|= α, |J| ≤ |P ∪ D|, and
the magnitude of each integer in J is bounded polynomially
by the largest magnitude of an integer in P ∪ D, exponentially by |P|, and double-exponentially by maxr∈P krk.
By Theorem 20, the following nondeterministic algorithm
decides P 6|= α:
1. compute the semi-grounding P 0 of P;
2. guess a pseudo-interpretation J that satisfies the bounds
given in Theorem 20;
3. if TP 0 (J) v J (so J |= P 0 ) and J 6|= α, return true.
Step 1 requires exponential (polynomial in data) time, and it
does not increase the maximal size of a rule. Hence, Step 2 is
nondeterministic exponential (polynomial in data), and Step 3
requires exponential (polynomial in data) time to solve a system of linear inequalities. Theorem 21 proves that these
bounds are both correct and tight.
Theorem 21. For P a limit-linear program and α a fact, deciding P |= α is CO NE XP T IME-complete in combined and
CO NP-complete in data complexity.
The upper bounds in Theorem 21 follow from Theorem 20,
in data complexity is shown by a reduction
from the square tiling problem, and CO NE XP T IME-hardness
in combined complexity is shown by a similar reduction from
the succinct version of square tiling.
CO NP-hardness
6
Tractability of Entailment: Stability
Tractability in data complexity is important on large datasets,
so we next present an additional stability condition that brings
the complexity of entailment down to E XP T IME in combined
and PT IME in data complexity, as in plain Datalog.
6.1
Cyclic Dependencies in Limit Programs
The fixpoint of a plain Datalog program can be computed in
PT IME in data complexity. However, for P a limit-linear program, a naı̈ve computation of T∞
P may not terminate since repeated application of TP can produce larger and larger numbers. Thus, we need a way to identify when the numeric argument ` of a limit fact A(a, `) diverges—that is, grows or
decreases without a bound; moreover, to obtain a procedure
tractable in data complexity, divergence should be detected
after polynomially many steps. Example 22 illustrates that
this can be achieved by analysing cyclic dependencies.
Example 22. Let Pc contain facts A(0) and B(0), and rules
A(m) → B(m) and B(m) → A(m + 1), where A and B
are max predicates. Applying the first rule copies the value
of A into B, and applying the second rule increases the value
of A; thus, both A and B diverge in T∞
Pc . The existence of
a cyclic dependency between A and B, however, does not
necessarily lead to divergence. Let program Pc0 be obtained
from Pc by adding a max fact C(5) and replacing the first
rule with A(m) ∧ C(n) ∧ (m ≤ n) → B(m). While a cyclic
dependency between A and B still exists, the increase in the
values of A and B is bounded by the value of C, which is independent of A or B; thus, neither A nor B diverge in T∞
Pc0 .
In the rest of this section, we extend <, +, and − to ∞
by defining k < ∞, ∞ + k = ∞, and ∞ − k = ∞ for each
integer k. We formalise cyclic dependencies as follows.
Definition 23. For each n-ary limit predicate B and each
tuple b of n − 1 objects, let vBb be a node unique for B
and b. The value propagation graph of a semi-ground limitlinear program P and a pseudo-interpretation J is the directed weighted graph GJP = (V, E, µ) defined as follows.
1. For each limit fact B(b, `) ∈ J, we have vBb ∈ V.
2. For each rule r ∈ P applicable to J with the head of
the form A(a, s) where vAa ∈ V and each body atom
B(b, m) of r where vBb ∈ V and variable m occurs
in term s, we have hvBb , vAa i ∈ E; such r is said to
produce the edge hvBb , vAa i in E.
3. For each r ∈ P and each edge e = hvBb , vAa i ∈ E produced by r, δre (J) = ∞ if opt(r, J) = ∞; otherwise,
opt(r, J) − `
if B and A are max, ` 6= ∞
−opt(r,
J)
−
`
if B is max, A is min, ` 6= ∞
δre (J) = −opt(r, J) + ` if B and A are min, ` 6= ∞
opt(r, J) + `
if B is min, A is max, ` 6= ∞
opt(r, J)
if ` = ∞
where ` is such that B(b, `) ∈ J. The weight of each
edge e ∈ E is then given by
µ(e) = max{δre (J) | r ∈ P produces e}.
A positive-weight cycle in GJP is a cycle for which the sum of
the weights of the contributing edges is greater than 0.
Intuitively, GJP describes how, for each limit predicate B
and objects b such that B(b, `) ∈ J, operator TP propagates ` to other facts. The presence of a node vBb in V indicates that B(b, `) ∈ J holds for some ` ∈ Z ∪ {∞}; this
` can be uniquely identified given vBb and J. An edge
e = hvBb , vAa i ∈ E indicates that at least one rule r ∈ P is
applicable to J where h(r) = A(a, s), B(b, m) ∈ sb(r), and
m occurs in s; moreover, applying r to J produces a fact
A(a, `0 ) where `0 satisfies ` + µ(e) ≤ `0 if both A and B are
max predicates, and analogously for the other types of A and
B. In other words, edge e indicates that the application of TP
to J will propagate the value of vBb to vAa while increasing it
by at least µ(e). Thus, presence of a positive-weight cycle in
GJP indicates that repeated rule applications might increment
the values of all nodes on the cycle.
6.2
Stable Programs
As Example 22 shows, the presence of a positive-weight cycle
in GJP does not imply the divergence of all atoms corresponding to the nodes in the cycle. This is because the weight of
such a cycle may decrease after certain rule applications and
so it is no longer positive.
This motivates the stability condition, where edge weights
in GJP may only grow but never decrease with rule application. Hence, once the weight of a cycle becomes positive,
it will remain positive and thus guarantee the divergence of
all atoms corresponding to its nodes. Intuitively, P is stable
if, whenever a rule r ∈ P is applicable to some J, rule r is
also applicable to each J 0 with larger limit values, and applying r to such J 0 further increases the value of the head.
Definition 24 defines stability as a condition on GJP . Please
note that, for all pseudo-interpretations J and J 0 with J v J 0
0
and GJP = (V, E, µ) and GJP = (V 0 , E 0 , µ0 ) the corresponding value propagation graphs, we have E ⊆ E 0 .
Definition 24. A semi-ground limit-linear program P is stable if, for all pseudo-interpretations J and J 0 with J v J 0 ,
0
GJP = (V, E, µ), GJP = (V 0 , E 0 , µ0 ), and each e ∈ E,
1. µ(e) ≤ µ0 (e), and
2. e = hvBb , vAa i and B(b, ∞) ∈ J imply µ(e) = ∞.
A limit-linear program is stable if its semi-grounding is stable.
Example 25. Program Pc from Example 22 is stable, while
Pc0 is not: for J = {A(0), C(0)} and J 0 = {A(1), C(0)}, we
have J v J 0 , but µ(hvA , vB i) = 0 and µ0 (hvA , vB i) = −1.
For each semi-ground program P and each integer n, we
have TnP v Tn+1
P , and stability ensures that edge weights
only grow after rule application. Thus, recursive application
of the rules producing edges involved in a positive-weight cycle leads to divergence, as shown by the following lemma.
Lemma 26. For each semi-ground stable program P, each
pseudo-interpretation J with J v T∞
P , and each node vAa
on a positive-weight cycle in GJP , we have A(a, ∞) ∈ T∞
P .
Algorithm 1 uses this observation to deterministically compute the fixpoint of P. The algorithm iteratively applies TP ;
however, after each step, it computes the corresponding value
propagation graph (line 4) and, for each A(a, `) where node
vAa occurs on a positive-weight cycle (line 5), it replaces
` with ∞ (line 6). By Lemma 26, this is sound. Moreover, since the algorithm repeatedly applies TP , it necessarily derives each fact from T∞
P eventually. Finally, Lemma 27
shows that the algorithm terminates in time polynomial in the
number of rules in a semi-ground program. Intuitively, the
proof of the lemma shows that, without introducing a new
edge or a new positive weight cycle in the value propagation graph, repeated application of TP necessarily converges
in O(|P|2 ) steps; moreover, the number of edges in GJP is
at most quadratic |P|, and so a new edge or a new positive
weight cycle can be introduced at most O(|P|2 ) many times.
Lemma 27. When applied to a semi-ground stable program
P, Algorithm 1 terminates after at most 8|P|6 iterations of
the loop in lines 2–8.
Lemmas 26 and 27 imply the following theorem.
Theorem 28. For P a semi-ground stable program, D a
dataset, and α a fact, Algorithm 1 decides P ∪ D |= α in time
polynomial in kP ∪ Dk and exponential in maxr∈P krk.
Since the running time is exponential in the maximal size
of a rule, and semi-grounding does not increase rule sizes,
Algorithm 1 Entailment for Semi-Ground Stable Programs
Input: semi-ground stable program P, fact α
Output: true if P |= α
1: J 0 ··= ∅
2: repeat
3:
J ··= J 0
4:
GJP ··= (V, E, µ)
5:
for each vAa ∈ V in a positive-weight cycle in GJP do
6:
replace A(a, `) in J with A(a, ∞)
7:
J 0 ··= TP (J)
8: until J = J 0
9: return true if J |= α and false otherwise
Algorithm 1 combined with a semi-grounding preprocessing
step provides an exponential time decision procedure for stable, limit-linear programs. This upper bound is tight since
entailment in plain Datalog is already E XP T IME-hard in combined and PT IME-hard in data complexity.
The first condition of Definition 31 ensures that each variable occurring in a numeric term contributes to the value of
the term. For example, it disallows terms such as 0 · x and
x − x, since a rule with such a term in the head may violate the second condition. Moreover, the second condition of
Definition 31 ensures that, if the value of a numeric variable
x occurring in the head ‘increases’ w.r.t. the type of the body
atom introducing x (i.e., x increases if it occurs in a max
body atom and decreases otherwise), then so does the value
of the numeric term in the head; this is essential for the first
condition of stability (cf. Definition 24). Finally, the third
condition of Definition 31 ensures that comparisons cannot
be invalidated by ‘increasing’ the values of the variables involved, which is required for both conditions of stability.
Type consistency is a purely syntactic condition that can
be checked by looking at one rule and one atom at a time.
Hence, checking type consistency is feasible in L OG S PACE.
Proposition 32. Each type-consistent limit-linear program is
stable.
Theorem 29. For P a stable program and α a fact, checking P |= α is E XP T IME-complete in combined and PT IMEcomplete in data complexity.
Proposition 33. Checking whether a limit-linear program is
type-consistent can be accomplished in L OG S PACE.
6.3
7
Type-Consistent Programs
Unfortunately, the class of stable programs is not recognisable, which can again be shown by a reduction from Hilbert’s
tenth problem.
Proposition 30. Checking stability of a limit-linear program
P is undecidable.
We next provide a sufficient condition for stability that captures programs such as those in Examples 5 and 6. Intuitively,
Definition 31 syntactically prevents certain harmful interactions. In the second rule of program Pc0 from Example 22,
numeric variable m occurs in a max atom and on the lefthand side of a comparison atom (m ≤ n); thus, if the rule is
applicable for some value of m, it is not necessarily applicable for each m0 ≥ m, which breaks stability.
Definition 31. A semi-ground limit-linear rule r is typeconsistent if
Pn
– each numeric term t in r is of the form k0 + i=1 ki × mi
where k0 is an integer and each ki , 1 ≤ i ≤ n, is a nonzero
integer, called the coefficient of variable mi in t;
– if h(r) = A(a, s) is a limit atom, then each variable occurring in s with a positive (resp. negative) coefficient also
occurs in a (unique) limit body atom or r that is of the same
(resp. different) type (i.e., min vs. max) as h(r); and
– for each comparison (s1 < s2 ) or (s1 ≤ s2 ) in r, each
variable occurring in s1 with a positive (resp. negative)
coefficient also occurs in a (unique) min (resp. max) body
atom, and each variable occurring in s2 with a positive
(resp. negative) coefficient also occurs in a (unique) max
(resp. min) body atom of r.
A semi-ground limit-linear program is type-consistent if all
of its rules are type-consistent. Moreover, a limit-linear program P is type-consistent if the program obtained by first
semi-grounding P and then simplifying all numeric terms as
much as possible is type-consistent.
Conclusion and Future Work
We have introduced several decidable/tractable fragments of
Datalog with integer arithmetic, thus obtaining a sound theoretical foundation for declarative data analysis. We see
many challenges for future work. First, our formalism should
be extended with aggregate functions. While certain forms
of aggregation can be simulated by iterating over the object domain, as in our examples in Section 3, such a solution may be too cumbersome for practical use, and it relies on the existence of a linear order over the object domain, which is a strong theoretical assumption. Explicit
support for aggregation would allow us to formulate tasks
such as the ones in Section 3 more intuitively and without relying on the ordering assumption. Second, it is unclear whether integer constraint solving is strictly needed
in Step 7 of Algorithm 1: it may be possible to exploit
stability of P to compute TP (J) more efficiently. Third,
we shall implement our algorithm and apply it to practical data analysis problems. Fourth, it would be interesting to establish connections between our results and existing
work on data-aware artefact systems [Damaggio et al., 2012;
Koutsos and Vianu, 2017], which faces similar undecidability
issues in a different formal setting.
Acknowledgments
We thank Christoph Haase for explaining to us his results
on Presburger arithmetic and semi-linear sets as well as for
providing a proof for Lemma 19. Our work has also benefited from discussions with Michael Benedikt. This research
was supported by the Royal Society and the EPSRC projects
DBOnto, MaSI3 , and ED3 .
References
[Alvaro et al., 2010] Peter Alvaro, Tyson Condie, Neil Conway, Khaled Elmeleegy, Joseph M. Hellerstein, and Rus-
sell Sears. BOOM analytics: exploring data-centric,
declarative programming for the cloud. In EuroSys. ACM,
2010.
[Beeri et al., 1991] Catriel Beeri, Shamim A. Naqvi, Oded
Shmueli, and Shalom Tsur. Set constructors in a logic
database language. J. Log. Program., 10(3&4), 1991.
[Berman, 1980] Leonard Berman. The complexitiy of logical theories. Theor. Comput. Sci., 11, 1980.
[Byrd et al., 1987] Richard H. Byrd, Alan J. Goldman, and
Miriam Heller. Recognizing unbounded integer programs.
Oper. Res., 35(1), 1987.
[Chin et al., 2015] Brian Chin, Daniel von Dincklage, Vuk
Ercegovac, Peter Hawkins, Mark S. Miller, Franz Josef
Och, Christopher Olston, and Fernando Pereira. Yedalog:
Exploring knowledge at scale. In SNAPL, 2015.
[Chistikov and Haase, 2016] Dmitry
Chistikov
and
Christoph Haase. The taming of the semi-linear set.
In ICALP, 2016.
[Consens and Mendelzon, 1993] Mariano P. Consens and
Alberto O. Mendelzon. Low complexity aggregation in
GraphLog and Datalog. Theor. Comput. Sci., 116(1), 1993.
[Damaggio et al., 2012] Elio Damaggio, Alin Deutsch, and
Victor Vianu. Artifact systems with data dependencies and
arithmetic. ACM Trans. Database Syst., 37(3):22:1–22:36,
2012.
[Dantsin et al., 2001] Evgeny Dantsin, Thomas Eiter, Georg
Gottlob, and Andrei Voronkov. Complexity and expressive
power of logic programming. ACM Comput. Surv., 33(3),
2001.
[Eisner and Filardo, 2011] Jason Eisner and Nathaniel Wesley Filardo. Dyna: Extending datalog for modern AI. In
Datalog, 2011.
[Faber et al., 2011] Wolfgang Faber, Gerald Pfeifer, and
Nicola Leone. Semantics and complexity of recursive aggregates in answer set programming. Artif. Intell., 175(1),
2011.
[Ganguly et al., 1995] Sumit Ganguly, Sergio Greco, and
Carlo Zaniolo. Extrema predicates in deductive databases.
J. Comput. Syst. Sci., 51(2), 1995.
[Grädel, 1988] Erich Grädel. Subclasses of presburger arithmetic and the polynomial-time hierarchy. Theor. Comput.
Sci., 56, 1988.
[Haase, 2014] Christoph Haase. Subclasses of Presburger
arithmetic and the weak EXP hierarchy. In CSL-LICS,
2014.
[Hougardy, 2010] Stefan Hougardy. The Floyd-Warshall algorithm on graphs with negative cycles. Inf. Process. Lett.,
110(8-9), 2010.
[Kannan, 1987] Ravi Kannan. Minkowski’s convex body
theorem and integer programming. Math. Oper. Res.,
12(3):415–440, 1987.
[Kemp and Stuckey, 1991] David B. Kemp and Peter J.
Stuckey. Semantics of logic programs with aggregates. In
ISLP, 1991.
[Koutsos and Vianu, 2017] Adrien Koutsos and Victor
Vianu. Process-centric views of data-driven business
artifacts. J. Comput. System Sci., 86:82–107, 2017.
[Loo et al., 2009] Boon Thau Loo, Tyson Condie, Minos N.
Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros
Maniatis, Raghu Ramakrishnan, Timothy Roscoe, and Ion
Stoica. Declarative networking. Commun. ACM, 52(11),
2009.
[Markl, 2014] Volker Markl. Breaking the chains: On
declarative data analysis and data independence in the big
data era. PVLDB, 7(13), 2014.
[Mazuran et al., 2013] Mirjana Mazuran, Edoardo Serra,
and Carlo Zaniolo. Extending the power of datalog recursion. VLDB J., 22(4), 2013.
[Mumick et al., 1990] Inderpal Singh Mumick, Hamid Pirahesh, and Raghu Ramakrishnan. The magic of duplicates
and aggregates. In VLDB, pages 264–277, 1990.
[Papadimitriou, 1981] Christos H. Papadimitriou. On the
complexity of integer programming. J. ACM, 28(4), 1981.
[Ross and Sagiv, 1997] Kenneth A. Ross and Yehoshua Sagiv. Monotonic aggregation in deductive databases. J.
Comput. System Sci., 54(1), 1997.
[Schöning, 1997] Uwe Schöning. Complexity of presburger
arithmetic with fixed quantifier dimension. Theory Comput. Syst., 30(4), 1997.
[Seo et al., 2015] Jiwon Seo, Stephen Guo, and Monica S.
Lam. SociaLite: An efficient graph query language based
on datalog. IEEE Trans. Knowl. Data Eng., 27(7), 2015.
[Shkapsky et al., 2016] Alexander Shkapsky, Mohan Yang,
Matteo Interlandi, Hsuan Chiu, Tyson Condie, and Carlo
Zaniolo. Big data analytics with datalog queries on Spark.
In SIGMOD. ACM, 2016.
[Van Gelder, 1992] Allen Van Gelder. The well-founded semantics of aggregation. In PODS, 1992.
[von zur Gathen and Sieveking, 1978] Joachim von zur Gathen and Malte Sieveking. A bound on solutions of linear integer equalities and inequalities. Proc. AMS, 72(1),
1978.
[Wang et al., 2015] Jingjing Wang, Magdalena Balazinska,
and Daniel Halperin. Asynchronous and fault-tolerant
recursive datalog evaluation in shared-nothing engines.
PVLDB, 8(12), 2015.
A
Proofs for Section 3
Theorem 1. For P a Datalog Z program and α a fact, checking P |= α is undecidable even if P contains no × or − and each
standard atom in P has at most one numeric term.
Proof. We prove the claim by presenting a reduction of the halting problem for deterministic Turing machines on the empty
tape. Let M be an arbitrary deterministic Turing machine with finite alphabet Γ containing the blank symbol , the finite set of
states S containing the initial state s and the halting state h, and transition function δ : S × Γ → S × Γ × {L, R}. We assume
that M works on a tape that is infinite to the right, that it starts with the empty tape and the head positioned on the leftmost cell,
and that it never moves the head off the left edge of the tape.
We encode each time point i ≥ 0 using an integer 2i , and we index tape positions using zero-based integers; thus, at time i,
each position j ≥ 2i is necessarily empty, so we can encode a combination of a time point i and tape position j with 0 ≤ j < 2i
using a single integer 2i + j. We use this idea to encode the state of the execution of M using the following facts:
• Num(k) is true for each positive number k;
• Time(k) is true if k = 2i and so k encodes a time point i;
• Tape(a, 2i + j) says that symbol a occupies position j of the tape at time i, and it will be defined for each 0 ≤ j < 2i ;
• Pos(2i + j) says that the head points to position j of the tape at time i;
• State(q, 2i ) says that the machine is in state q at time i; and
• Halts is a propositional variable saying that the machine has halted.
We next give a Datalog Z program PM that simulates the behaviour of M on the empty tape. We represent each alphabet
symbol a ∈ Γ using an object constant a, and we represent each state q ∈ S using an object constant q. Furthermore, we
.
abbreviate (s ≤ t) ∧ (t < u) as (s ≤ t < u). Finally, we abbreviate conjunction (s ≤ t) ∧ (t ≤ s) as (s = t), and disjunction
.
(s < t) ∨ (t > s) as (s =
6 t). Strictly speaking, disjunctions are not allowed in rule bodies; however, each rule with a disjunction
.
in the body of the form ϕ ∧ (s =
6 t) → α corresponds to rules ϕ ∧ (s < t) → α and ϕ ∧ (t < s) → α, so we use the former
form for the sake of clarity. With these considerations in mind, program PM contains rules (15)–(24).
→ Num(1)
Num(x) → Num(x + 1)
→ Time(1)
Time(x) → Time(x + x)
→ Tape( , 1)
→ Pos(1)
→ State(s, 1)
State(h, x) → Halts
.
Time(x) ∧ Tape(v, y) ∧ Pos(z) ∧ (x ≤ y < x + x) ∧ (x ≤ z < x + x) ∧ (y =
6 z) → Tape(v, x + y)
Time(x) ∧ Num(u) ∧ (x + x + x ≤ u + u < x + x + x + x) → Tape( , u)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
Moreover, for each alphabet symbol a ∈ Γ and all states q, q 0 ∈ S such that δ(q, a) = (q 0 , a0 , D) where D ∈ {L, R} is a direction, PM contains rules (25)–(28).
Time(x) ∧ State(q, x) ∧ Tape(a, y) ∧ Pos(y) ∧ (x ≤ y < x + x) → Tape(a0 , x + y)
0
(25)
Time(x) ∧ State(q, x) ∧ Tape(a, y) ∧ Pos(y) ∧ (x ≤ y < x + x) → State(q , x + x)
(26)
Time(x) ∧ State(q, x) ∧ Tape(a, y) ∧ Pos(y) ∧ Num(u) ∧
.
(x ≤ y < x + x) ∧ (x + y = u + 1) → Pos(u)
if D = L
(27)
Time(x) ∧ State(q, x) ∧ Tape(a, y) ∧ Pos(y) ∧ Num(u) ∧
.
(x ≤ y < x + x) ∧ (x + y + 1 = u) → Pos(u)
if D = R
(28)
Rules (15)–(16) initialise Num so that it holds of all positive integers, and rules (17)–(18) initialise Time so that it holds for
each integer k = 2i . Rules (19)–(21) initialise the state of the M at time i = 0. Rule (22) derives Halts if at any point the
Turing machine enters the halting state h. The remaining rules encode the evolution of the state of M , and they are based on
the following idea: if variable x encodes a time point i using value 2i , then variable y encodes a position j for time point i if
x ≤ y < x + x holds; moreover, for such y, position j at time point i + 1 is encoded as 2i+1 + j = 2i + 2i + j and can be
obtained as x+y, and the encodings of positions j −1 and j +1 can be obtained as x + y − 1 and x + y + 1, respectively. Since
our goal is to prove undecidability by just using +, we simulate subtraction by looking for a value u such that x + y = u + 1.
With these observations in mind, one can see that rule (23) copies the unaffected part of the tape from time point i to time point
i + 1. Moreover, rule (24) pads the tape by filling each location j with 1.5 × 2i ≤ j < 2 × 2i with the blank symbol; since
division is not supported in our language, we express this condition as 3 × 2i ≤ 2 × j < 2 × 2 × 2i . Finally, rule (25) updates
the tape at the position of the head; rule (26) updates the state; and rules (27) and (28) move the head left and right, respectively.
Consequently, we have PM |= Halts if and only if M halts on the empty tape.
Proposition 4. For each limit program P and fact α, a homogeneous program P 0 and fact α0 can be computed in linear time
such that P |= α if and only if P 0 |= α0 .
Proof. Let P be an arbitrary limit program. Without loss of generality, we construct a program P 0 containing only max
predicates. For each min predicate A, let A0 be a fresh max predicate uniquely associated with A. We construct P 0 from P by
modifying each rule r ∈ P as follows:
1. if h(r) = A(t, s) where A is a min predicate, replace the head of r with A0 (t, −s);
2. for each body atom A(t, n) ∈ sb(r) where A is a min predicate and n is a variable, replace the atom with A0 (t, m) where
m is a fresh variable, and replace all other occurrences of n in the rule with −m;
3. for each body atom A(t, k) ∈ sb(r) where A is a min predicate and k is an integer, replace the atom with A0 (t, −k).
Finally, if α = A(a, k) is a min fact, let α0 = A(a, −k); otherwise, let α0 = α. Now consider an arbitrary interpretation I, and
let I 0 be the interpretation obtained from I by replacing each min fact A(a, k) with A0 (a, −k); it is straightforward to see that
I |= P if and only if I 0 |= P 0 , and that I |= α if and only if I 0 |= α0 . Thus, P |= α if and only if P 0 |= α0 .
B
Proofs for Section 4
We use the standard notion of substitutions—sort-compatible partial mappings of variables to constants. For ϕ a formula and σ
a substitution, ϕσ is the formula obtained by replacing each free variable x in ϕ on which σ is defined with σ(x).
Proposition B.1. For each semi-ground rule r = ϕ → α, each pseudo-interpretation J, and each mapping σ of the variables
of r to integers, σ is an integer solution to C(r, J) if and only if J |= ϕσ.
Proof. (⇒) Assume that σ is an integer solution to C(r, J). We consider each atom β ∈ ϕ and show that J |= βσ holds.
• If β is a comparison atom, the claim is straightforward due to β ∈ C(r, J).
• If β is an object atom or an ordinary numeric atom, β is ground and we have β ∈ J and J |= β; otherwise,
(0 < 0) ∈ C(r, J) would hold and so σ could not be a solution to C(r, J).
• If β is a max atom B(b, s), since (0 < 0) 6∈ C(r, J), either B(b, `) ∈ J for some integer ` ∈ Z and (s ≤ `) ∈ C(r, J),
or B(b, ∞) ∈ J. In the former case, since σ is a solution to C(r, J), we have sσ ≤ `, and, since B is a max predicate,
J |= B(b, sσ) holds. In the latter case, J |= B(b, sσ) holds due to {B(b, sσ)} v {B(b, ∞)}.
• If β is a min atom, the proof is analogous to the previous case.
The proof of the (⇐) direction is analogous and we omit it for the sake of brevity.
Definition B.2. Given a limit-closed interpretation I and a program P, let
V
V
IP (I) = {γ | i αi → β is a ground instance of a rule in P such that I |= i αi and γ is a fact such that {γ} v {β}}.
S
∞
n
Let I0P = ∅, let InP = IP (In−1
P ) for n > 0, and let IP =
n≥0 IP .
Lemma B.3. For each program P, operator IP is monotonic w.r.t. ⊆; moreover, for I an interpretation, I |= P if and only if
IP (I) = I, and I |= P implies I∞
P ⊆ I.
Proof. Operator IP is the standard immediate consequence operator of Datalog, but applied to the program P 0 obtained by
extending P with the rules from Section 3 encoding the semantics of limit predicates. Thus, all claims of this lemma hold in
the usual way [Dantsin et al., 2001].
Lemma B.4. For each limit-closed interpretation I and the corresponding pseudo-interpretation J, and for each semi-ground
limit program P, interpretation IP (I) corresponds to the pseudo-interpretation TP (J).
Proof. It suffices to show that, for each fact α, the following claims hold:
1. if α is an object fact or ordinary numeric fact, then α ∈ IP (I) if and only if α ∈ TP (J);
2. if α is a limit fact of the form A(a, k) where k is an integer, then α ∈ IP (I) if and only if {α} v TP (J); and
3. if α is a limit fact of the form A(a, ∞), then {A(a, k) | k ∈ Z} ⊆ IP (I) if and only if α ∈ TP (J).
(Claim 1) Consider an arbitrary object fact α of the form A(a); the proof for ordinary numeric facts is analogous.
• Assume α ∈ IP (I). Then, a rule r = ϕ → α ∈ P and a grounding σ of r exist such that I |= ϕσ; the head of r must be
α since P is semi-ground. But then, J |= ϕσ holds as well, so Proposition B.1 ensures that σ is a solution to C(r, J);
moreover, hd(r, J) = α, and thus we have α ∈ TP (J).
• Assume α ∈ TP (J). Then, there exist a rule r = ϕ → α ∈ P and an integer solution σ to C(r, J). Proposition B.1 then
ensures J |= ϕσ, and so I |= ϕσ holds as well. Thus, we have ασ = α ∈ IP (I).
(Claim 2) Consider an arbitrary max fact α of the form A(a, k); the proof for a min fact is analogous.
• Assume α ∈ IP (I). Then, a rule r = ϕ → A(a, s) ∈ P and a grounding σ of r exist such that I |= ϕσ and α = A(a, sσ).
But then, J |= ϕσ holds as well, so Proposition B.1 ensures that σ is a solution to C(r, J); moreover, sσ ≤ opt(r, J), and
therefore we have {α} v {hd(r, J)} = {A(a, opt(r, J))} v TP (J).
• Assume {α} v TP (J). Then, there exist a rule r = ϕ → A(a, s) ∈ P and an integer solution σ to C(r, J) such that
{α} v {hd(r, J)} = {A(a, sσ)} where sσ = opt(r, J). Proposition B.1 then ensures J |= ϕσ, and so I |= ϕσ holds as
well. Thus, γ ∈ IP (I) holds for each fact γ with {γ} v {A(a, sσ)}, so we have α ∈ IP (I).
(Claim 3) Consider an arbitrary max fact α of the form A(a, ∞); the proof for a min fact is analogous. In the following, let
S = {A(a, k) | k ∈ Z}.
• Assume S ⊆ IP (I). Program P contains only finitely many rules, so the infinitely many facts of S in IP (I) are produced
by a rule r = ϕ → A(a, s) ∈ P and an infinite sequence (σi )i≥0 of groundings of r such that, for each i, we have I |= ϕσi
and sσi < sσi+1 . But then, J |= ϕσi , so Proposition B.1 ensures that σi satisfies C(r, J) for each i ≥ 0; therefore,
opt(r, J) = ∞ and α ∈ TP (J) holds.
• Assume A(a, ∞) ∈ TP (J). Then, a rule r = ϕ → A(a, s) ∈ P exists such that opt(r, J) = ∞, so an infinite sequence
(σi )i≥0 of solutions to C(r, J) exists such that sσi < sσi+1 for each i ≥ 0. Proposition B.1 ensures J |= ϕσi for each
i ≥ 0, and so I |= ϕσi as well. Thus, for each k ∈ Z, some i ≥ 0 exists such that k ≤ sσi , and therefore we have
{A(a, k)} v {A(a, sσi )}; consequently, S ⊆ IP (I) holds.
Lemma 14. For each semi-ground limit program P, operator TP is monotonic w.r.t. v. Moreover, J |= P if and only if
TP (J) v J for each pseudo-interpretation J.
Proof. Immediate from Lemmas B.3 and B.4.
∞
Theorem 15. For P a semi-ground limit program and α a fact, P |= α if and only if T∞
P |= α; also, |TP | ≤ |P|; and J |= P
implies T∞
v
J
for
each
pseudo-interpretation
J.
P
Proof. By inductively applying Lemma B.4, for each n ≥ 0, the limit-closed interpretation InP clearly corresponds to the
∞
pseudo-interpretation TnP . Thus, I∞
P and TP also correspond on all object and ordinary numeric facts. Now consider an
arbitrary n-ary max predicate A and a tuple of n − 1 objects a, and for M = {k | A(a, k) ∈ I∞
P } consider the following cases.
n
• M = ∅. Then, for each n ≥ 0 and each k ∈ Z, we have A(a, k) 6∈ IP , which implies A(a, k) 6∈ TnP and A(a, ∞) 6∈ TnP .
∞
∞
Finally, T∞
P is the least (w.r.t. v) fixpoint of TP , so A(a, k) 6∈ TP and A(a, ∞) 6∈ TP holds as well.
0
• There exists ` = max M . Then, there exists n ≥ 0 such that A(a, `) ∈ InP , and A(a, `0 ) 6∈ Im
P for each ` > ` and m ≥ 0;
0
∞
is
the
least
(w.r.t.
v) fixpoint of
for
each
`
>
`
and
m
≥
0;
finally,
T
but then, A(a, `) ∈ TnP , and A(a, `0 ) 6∈ Tm
P
P
holds.
operator TP , so A(a, `) ∈ T∞
P
• M = Z. Then, for each k ∈ Z, there exists n ≥ 0 such that A(a, k) ∈ InP , and so TnP |= A(a, k) holds; but then,
A(a, ∞) ∈ TnP holds as well.
∞
Analogous reasoning holds for min predicates, so I∞
P corresponds to TP . But then, the first and the third claim of this theorem
follow straightforwardly from Lemma B.3. Moreover, pseudo-interpretations contain at most one fact per combination of a
limit predicate and a tuple of objects (of corresponding arity), and program P is semi-ground so each rule in P produces at
most one fact in T∞
P , which implies the second claim of this theorem.
C
Proofs for Section 5
Theorem 16. For P a semi-ground limit program and α a fact, checking P |= α and checking applicability of a rule of P to a
pseudo-interpretation are both undecidable.
Proof. We present a reduction from Hilbert’s tenth problem, which is to determine whether, given a polynomial P (x1 , . . . , xn )
over variables x1 , . . . , xn , equation P (x1 , . . . , xn ) = 0 has integer solutions. It is well known that the problem remains undecidable even if the solutions must be nonnegative integers, so we use that variant in this proof. For each such polynomial P , let
PP be the program containing rules (29)–(30) for A a unary min predicate and B a nullary object predicate; it is obvious that
PP |= B if and only if P (x1 , . . . , xn ) = 0 has a nonnegative integer solution.
→ A(0)
(29)
Vn
i=1
A(xi ) ∧ (P (x1 , . . . , xn ) ≤ 0) ∧ (P (x1 , . . . , xn ) ≥ 0) → B
(30)
Moreover, rule (30) is applicable to J = {A(0)} if and only if P (x1 , . . . , xn ) = 0 has a nonnegative integer solution.
Although Presburger arithmetic does not have propositional variables, these can clearly be axiomatised using numeric variables. Hence, in the rest of this section we use propositional variables in Presburger formulas for the sake of clarity.
Definition C.1. For each n-ary object predicate A, each (n + 1)-ary ordinary numeric predicate B, each (n + 1)-ary limit
predicate C, each n-tuple of objects a, and each integer k, let def Aa , def Bak , def Ca and fin Ca be distinct propositional
variables, and let val Ca a distinct integer variable.
Moreover, let C be ≤ (resp. ≥) if C is a max (resp. min) predicate.
V
For P a semi-ground program, Pres(P) = r∈P Pres(r) is the Presburger formula where Pres(r) = ∀y.r0 for y all numeric
variables in r and r0 is obtained by replacing each atom α in r with its encoding Pres(α) defined as follows:
• Pres(α) = α if α is a comparison atom;
• Pres(α) = def Aa if α is an object atom of the form A(a);
• Pres(α) = def Bak if α is an ordinary numeric atom of the form B(a, k); and
• Pres(α) = def Ca ∧ (¬fin Ca ∨ s C val Ca ) if α is a limit atom of the form C(a, s).
Let J be a pseudo-interpretation, and let µ be an assignment of Boolean and integer variables. Then, J corresponds to µ if
all of the following conditions hold for all A, B, C, and a as specified above, for each integer k ∈ Z:
• µ(def Aa ) = true if and only if A(a) ∈ J;
• µ(def Bak ) = true if and only if B(a, k) ∈ J;
• µ(def Ca ) = true if and only if C(a, ∞) ∈ J or there exists ` ∈ Z such that C(a, `) ∈ J;
• µ(fin Ca ) = true and µ(val Ca ) = k if and only if C(a, k) ∈ J.
Note that k in Definition C.1 ranges over all integers (which excludes ∞), µ(val Ca ) is an equal to some integer k, and J is
a pseudo-interpretation and thus cannot contain both C(a, ∞) and C(a, k); thus, C(a, ∞) ∈ J implies µ(fin Ca ) = false.
Also note that each assignment µ corresponds to precisely one J; however, each J corresponds to infinitely many assignments
µ since Definition C.1 does not restrict the value of variables other than def Aa , def Bak , def Ca , fin Ca , and val Ca . Moreover,
two assignments corresponding to the same pseudo-interpretation may differ on the value of val Ca if fin Ca is set to false in
both assignments, and they can differ on the values of fin Ca and val Ca if def Ca is set to false in both assignments.
Lemma C.2. Let J be a pseudo-interpretation and let µ be a variable assignment such that J corresponds to µ. Then,
1. J |= α if and only if µ |= Pres(α) for each ground atom α, and
2. J |= r if and only if µ |= Pres(r) for each semi-ground rule r.
Proof. (Claim 1) We consider all possible forms of α.
• α is a comparison atom. Then, the truth of α is independent from J so the claim is immediate.
• α = A(a) is an object fact. Then, Pres(α) = def Aa , and µ(def Aa ) = true if and only if def Aa ∈ J, so the claim holds.
• α = B(a, k) is an ordinary numeric fact. The proof is analogous to the case of object facts.
• α = C(a, k) is a limit fact. If J |= α, then either C(a, ∞) ∈ J or an integer ` exists such that C(a, `) ∈ J and k C `;
either way, µ(def Ca ) = true holds; moreover, µ(fin Ca ) = false holds in the former and µ(val Ca ) = ` holds in the latter
case; thus, µ |= Pres(r) clearly holds. The converse direction is analogous so we omit it for the sake of brevity.
(Claim 2) Let r be an arbitrary semi-ground rule, and let I be the limit-closed interpretation corresponding to J. By definition,
J |= r if and only if I |= r, and the latter is equivalent to I |= r0 for each ground instance r0 of r by the semantics of universal
quantification in first-order logic; but then, the latter claim is equivalent to J |= r0 for each ground instance r0 of r.
Now note that, by construction, we have Pres(βσ) = Pres(β)σ for each semi-ground atom β and each grounding σ, and
thus Pres(rσ) = Pres(r)σ. Finally, groundings of r can be equivalently seen as variable assignments to universally quantified
numeric variables in Pres(r), so Claim 2 follows immediately from Claim 1.
Wn
Lemma 18. For P a semi-ground limit-linear program and α a fact, there exists a Presburger sentence ϕ = ∀x∃y. i=1 ψi
that is valid if and only if P |= α. Each ψi is a conjunction of possibly negated atoms. Moreover, |x| + |y| and each kψi k are
bounded polynomially by kPk + kαk. Number n is bounded polynomially by |P| and exponentially by maxr∈P krk. Finally,
the magnitude of each integer in ϕ is bounded by the maximal magnitude of an integer in P and α.
Proof. Lemma C.2 immediately implies that P |= α if and only if the sentence ϕ0 = ∀x. Pres(α) ∨ ¬Pres(P) is valid, where
x contains all variables def Aa , def Bak , def Ca , fin Ca , and val Ca occurring in Pres(P) or Pres(α). Clearly, |x| is polynomially
bounded by kPk + kαk, and the magnitude of each integer in ϕ0 is bounded by the maximum magnitude of an integer in P
and α. Let ϕ1 be the sentence obtained from ϕ0 by converting each top-level conjunct of Pres(P) into form ∀yi .χi where χi
is in CNF. Formulae ϕ0 and ϕ1 are equivalent, and ϕ1 is of the form
Vn
V`i
χji ,
ϕ1 = ∀x. Pres(α) ∨ ¬ i=1 ∀yi . j=1
where n = |P| and, for each rule ri ∈ P, integer `i is exponentially bounded by kri k, and kχji k and |yi | are linearly bounded
by kri k. By moving all quantifiers to the front of the formula and pushing negations inwards, we finally obtain formula
Wn W`i
ψij ,
ϕ2 = ∀x∃y.Pres(α) ∨ i=1 j=1
Sn
where y = i=1 yi and each ψij is the negation-normal form of ¬χji . Formula ϕ2 is of the required form, |y| is bounded
Pn
polynomially by kPk, number i=1 `i is bounded polynomially by n = |P| and exponentially by maxr∈P krk, and kψij k is
bounded linearly by kPk.
Wn
Lemma 19. Let ϕ = ∀x∃y. i=1 ψi be a Presburger sentence where each ψi is a conjunction of possibly negated atoms
of size at most k mentioning at most ` variables, a is the maximal magnitude of an integer in ϕ, and m = |x|. Then, ϕ
is valid if and only if ϕ is valid over models where each integer variable assumes a value whose magnitude is bounded by
`
4
(2O(` log `) · ak` )n2 ·O(m ) .
Proof. Let m0 = |y|. Each ψi can be seen as a system of linear inequalities Si = (Ai x ≤ ci ) such that |x| ≤ `, |ci | ≤ k,
and where the maximal magnitude of all numbers in A and ci is bounded by ak . By Proposition 3 of Chistikov and Haase
[2016] (adapted from
S the work by von zur Gathen and Sieveking [1978]), the set of solutions to Si can be represented by
a semi-linear set i0 ∈Ni L(bi0 , Pi0 ) where bi0 ∈ Z` , Pi0 ⊆ Z` , |Ni | ≤ 2` , and the magnitude of all integers in bi0 and Pi0
Wn
S
is bounded by 2O(` log `) · ak` . Consequently, disjunction i=1 ψi corresponds to a semi-linear set j∈M L(bj , Pj ) where
0
0
O(` log `)
bj ∈ Zm+m W
, Pj ⊆ Zm+m , |M | ≤ n2` , and the magnitude
· ak` .
S of each integer in bj and Pj is still bounded by 2
n
Formula ∃y. i=1 ψi then corresponds to the projection of j∈M L(bj , Pj ) on the variables in x, which is a semi-linear set of
S
the form j∈M L(b0j , Pj0 ) where each b0j ∈ Zm is a projection of bj on x, and each Pj0 ⊆ Zm is a projection of Pj on x. Now,
Wn
0
Theorem 21 by Chistikov and Haase
S [2016] implies that the satisfying assignments to the formula ϕ = ¬∃y. i=1 ψi can be
represented as a semi-linear set j 0 ∈M 0 L(cj 0 , Qj 0 ) where the magnitude of each integer in each cj 0 and Qj 0 is bounded by
`
4
b = (2O(` log `) · ak` )n2 ·O(m ) . Since ϕ0 has a satisfying assignment if and only if it has a satisfying assignment involving only
numbers from some cj 0 , it follows that ϕ0 is satisfiable if and only if it is satisfiable over models where the absolute value of
every integer variable is bounded by b. This implies the claim of this lemma since ϕ is valid if and only if ϕ0 is unsatisfiable.
Theorem 20. For P a semi-ground limit-linear program, D a dataset, and α a fact, P ∪ D 6|= α if and only if a pseudo-model
J of P ∪ D exists where J 6|= α, |J| ≤ |P ∪ D|, and the magnitude of each integer in J is bounded polynomially by the largest
magnitude of an integer in P ∪ D, exponentially by |P|, and double-exponentially by maxr∈P krk.
Proof. The ⇐ direction is trivial. For the ⇒ direction assume that P ∪ D 6|= α holds, and let D0 be obtained
Wn from D by
removing each fact that does not unify with an atom in P or α; clearly, we have P ∪ D0 6|= α. Let ϕ = ∀x∃y. i=1 ψi be the
Presburger sentence from Lemma 18 for P ∪ D0 and α. Sentence ϕ is not valid and it satisfies the following conditions.
• Number m = |x| is polynomial in kP ∪ D0 k, which, in turn, is bounded by |P ∪ D0 | · maxr∈P∪D0 krk. Moreover, D0
contains only facts that unify with atoms in P and α, so m can be bounded further, namely linearly in the product cs, for
c = |P| and s = maxr∈P kPk.
• Number n is linear in the product of c and 2s .
• The size, and hence the number ` of variables in each ψi , are linear in s.
Let a be the maximal magnitude of an integer in P ∪ D0 (and thus in ϕ as well). By Lemma 19, an assignment µ exists such
2
s
O(s)
4
that µ 6|= ϕ and the magnitude of each integer variable is bounded by b = (2O(s log s) · aO(s ) )O(c·2 )·2 ·O((cs) ) . Clearly,
b is polynomial in a, exponential in c, and doubly-exponential in s, as required. Moreover, clearly µ |= Pres(P ∪ D0 ) and
µ 6|= Pres(α). Now let J 0 be the pseudo-model corresponding to µ; by Lemma C.2, we have J 0 |= P ∪ D0 and J 0 6|= α. By
construction, the magnitude of each integer in J 0 is bounded by b. Furthermore, let J be the restriction of J 0 to the facts that
unify with the head of at least one rule in P ∪ D0 ; clearly, we still have J |= P ∪ D0 and J 6|= α. Finally, |J| ≤ |P ∪ D0 | holds
by our construction, which implies our claim.
Lemma C.3. For each semi-ground, limit-linear program P, pseudo-interpretation J, and dataset D, there exists a polynomial p such that TP∪D (J) can be computed in nondeterministic polynomial time in kPk + kDk + kJk, and in deterministic
p(maxr∈P krk)
polynomial time in kPk + kDk + kJk
.
Proof. Let S = {hd(r, J) | rule r ∈ P ∪ D is applicable to J}. Program P is semi-ground, and therefore P ∪ D is semiground as well; thus, each rule of P ∪ D can contribute at most one fact to S, so we have |S| ≤ |P| + |D|. By Definition 12,
TP∪D (J) is the smallest (w.r.t. v) pseudo-interpretation such that TP∪D (J) |= S, so we can compute TP∪D (J) as the set
containing each object and ordinary numeric fact in S, each fact A(a, ∞) ∈ S for A a limit predicate, each fact A(a, `) ∈ S
such that A is a min (resp. max) predicate and A(a, k) ∈ S implies k 6= ∞ and k ≥ ` (resp. k ≤ `). To complete the proof of
this lemma, we next argue that set S can be computed within the required time bounds.
Consider an arbitrary rule r ∈ P ∪ D, and let J 0 be the subset of J containing all facts that unify with a body atom in r; note
that |J 0 | ≤ krk. Rule r is applicable to J if and only if conjunction C(r, J 0 ) has an integer solution. By construction, kC(r, J 0 )k
is linear in krk + kJ 0 k, the number of variables in C(r, J 0 ) and r is the same, |C(r, J 0 )| is linear in krk, and the magnitude of
each integer in C(r, J 0 ) is exponentially bounded in krk + kJk. But then, checking whether C(r, J) has an integer solution is
in NP w.r.t. krk + kJk, and in PT IME w.r.t. kJkp(krk) for some polynomial p, as we argue next.
• We first consider the former claim. Let a be the maximal magnitude of an integer in C(r, J 0 ). Conjunction C(r, J 0 ) contains
only the numbers from r and J 0 , whose magnitude is at most 2krk and 2kJk , respectively; thus, we have a ≤ 2krk+kJk .
Moreover, the results by Papadimitriou [1981] show that there exists a polynomial p1 such that the magnitude of an integer
in a solution to C(r, J 0 ) can be bounded by b = ap1 (krk) , and so there exists a polynomial p2 such that b ≤ 2p2 (krk+kJk) .
The binary representation of b thus requires at most krk + kJk bits, and so we can guess it in polynomial time.
• We next consider the latter claim. By Theorem 5.4 of Kannan [1987], checking satisfiability of C(r, J) over Z is fixedparameter tractable in the number n of variables in r–that is, there exists a polynomial p3 such that a solution to C(r, J)
can be computed in time O((krk + kJk) · 2p3 (n) ). Since n ≤ krk clearly holds, there exists a polynomial p4 such that the
satisfiability of C(r, J) can be checked in time that is thus kJkp4 (krk) .
Now assume that r is applicable to J. Then hd(r, J) = h(r) if h(r) is an object atom, so we assume that h(r) = A(a, s) is a
limit atom and argue that opt(r, J) can be computed within the required time bounds using the following two steps.
1. Depending on whether A is a min or a max predicate, we check whether there is a smallest/largest value for s in all solutions
to C(r, J)—that is, we check whether the integer linear program ‘minimise/maximise s subject to C(r, J)’ is bounded.
Byrd et al. [1987] showed that this amounts to checking boundedness of the corresponding linear relaxation, which in turn
can be reduced to checking linear feasibility and can be solved in deterministic polynomial time in krk + kJk.
2. If the above problem is bounded, we compute its optimal solution, which can be reduced to polynomially many (in
krk + kJk) feasibility checks, as shown by Papadimitriou [1981] (Corollary 2 with binary search). Each such feasibility
check is in NP w.r.t. krk + kJk, and in PT IME w.r.t. kJkp(krk) .
Thus, hd(r, J) can be computed in nondeterministic polynomial time in krk + kJk, and in deterministic polynomial time in
kJkp(krk) , which implies our claim.
Lemma C.4. Deciding P |= α is CO NP-hard in data complexity for P a limit-linear program and α a fact.
Proof. An instance T of the square tiling problem is given by an integer N coded in unary, a set T = {t0 , . . . , tM −1 } of
M tiles, and two compatibility relations H ⊆ T × T and V ⊆ T × T . The problem is to determine whether there exists a
tiling τ : {0, . . . , N − 1}2 → T of an N × N square such that hτ (i, j), τ (i + 1, j)i ∈ H holds for all 0 ≤ i < N − 1 and
0 ≤ j < N , and hτ (i, j), τ (i, j + 1)i ∈ V holds for all 0 ≤ i < N and 0 ≤ j < N − 1, which is known to be NP-complete.
Thus, to prove the claim of this lemma, we reduce the complement of the problem by presenting a fixed program Ptiling and a
dataset DT (that depends on T ), and showing that T has no solution if and only if Ptiling ∪ DT |= noSolution.
Our encoding uses object EDB predicates succ, incompatibleH , and incompatibleV ; ordinary numeric EDB predicates
shift, tileNo, numTiles, and maxTiling; nullary object IDB predicate noSolution; unary min IDB predicate I; and unary
.
max IDB predicate tiling. Program Ptiling contains rules (31)–(35), where (s = t) abbreviates (s ≤ t) ∧ (t ≤ s).
→ I(0)
→ tiling(0)
(31)
(32)
tiling(n) ∧ numTiles(nt) ∧
.
shift(x, y, s) ∧ tileNo(u, t) ∧ I(m1 ) ∧ I(m2 ) ∧ (n = m1 × nt × s + t × s + m2 ) ∧ (m2 < s) ∧
succ(x, x0 ) ∧
(33)
. 0
0
0
0 0
0
0
0
0
0
0
shift(x , y, s ) ∧ tileNo(u , t ) ∧ I(m1 ) ∧ I(m2 ) ∧ (n = m1 × nt × s + t × s + m2 ) ∧ (m02 < s0 ) ∧
incompatibleH (u, u0 ) → tiling(n + 1)
tiling(n) ∧ numTiles(nt) ∧
.
shift(x, y, s) ∧ tileNo(u, t) ∧ I(m1 ) ∧ I(m2 ) ∧ (n = m1 × nt × s + t × s + m2 ) ∧ (m2 < s) ∧
succ(y, y 0 ) ∧
(34)
. 0
0 0
0 0
0
0
0
0
0
0
shift(x, y , s ) ∧ tileNo(u , t ) ∧ I(m1 ) ∧ I(m2 ) ∧ (n = m1 × nt × s + t × s + m2 ) ∧ (m02 < s0 ) ∧
incompatibleV (u, u0 ) → tiling(n + 1)
tiling(n) ∧ maxTiling(m) ∧ (m < n) → noSolution
(35)
Dataset DT contains facts (36)–(42), where g0 , . . . , gN −1 are fresh objects, and ti for 0 ≤ i < M are distinct objects corre2
sponding to the tiles in T . Since N is coded in unary, although numbers M N − 1 and M i+N j are exponential in N , they can
be computed in polynomial time and represented using polynomially many bits.
→ numTiles(M )
→ tileNo(ti , i)
→ incompatibleH (ti , tj )
→ incompatibleV (ti , tj )
for each 0 ≤ i < M
for each 0 ≤ i, j < M such that (ti , tj ) ∈
/H
for each 0 ≤ i, j < M such that (ti , tj ) ∈
/V
(36)
(37)
(38)
(39)
for each 0 ≤ i < N − 1
(40)
(41)
for each 0 ≤ i, j < N
(42)
2
→ maxTiling(M N − 1)
→ succ(gi , gi+1 )
→ shift(gi , gj , M
i+N j
)
Our reduction uses the following idea. Facts (37) associate each tile ti with an integer i where 0 ≤ i < M ; hence, in
the rest P
of this discussion, we do not distinguish a tile from its number. This allows us to represent each tiling τ using a
number 0≤i,j<N τ (i, j) × M i+N j . Thus, given a number n that encodes a tiling, number t with 0 ≤ t < M corresponds
to the tile assigned to position (i, j) if n = m1 × M × M i+N j + t × M i+N j + m2 for some integers m1 and m2 where
0 ≤ m2 < M i+N j . Thus, if numeric variable n is assigned such an encoding of a tiling and numeric variable s is assigned the
factor M i+N j corresponding to a position (i, j), then conjunction
.
tileNo(u, t) ∧ I(m1 ) ∧ I(m2 ) ∧ (n = m1 × nt × s + t × s + m2 ) ∧ (m2 < s)
is true if and only if u is assigned the tile object corresponding to position (i, j) in the tiling encoded by n. To complete the
construction, we represent each position (i, j) by a pair of objects (gi , gj ), each of which is associated with the corresponding
factor M i+N j using facts (42). Facts (41) provide an ordering on gi , which allows us to identify adjacent positions. Finally,
fact (40) records the maximal number that encodes a tiling as we outlined earlier. Program Ptiling then simply checks through
all tilings: rule (32) ensures that the tiling encoded as 0 is checked; moreover, for each n such that tiling(n) holds, rules (33)
and (34) derive tiling(n + 1) if either the horizontal or the vertical compatibility requirement is violated for the tiling encoded
2
by n. Finally, rule (35) detects that no solution exists if tiling(M N ) is derived.
Lemma C.5. Deciding P |= α is CO NE XP T IME-hard for P a limit-linear program and α a fact.
Proof. We present a reduction from the succinct square tiling problem. An instance T of the problem is given by an integer
N coded in unary, a set T containing M tiles, and horizontal and vertical compatibility relations H and V , respectively, as in
the proof of Lemma C.4; however, the objective is to tile a square of 2N × 2N positions, which is known to be NE XP T IMEcomplete. Thus, to prove the claim of this lemma, we reduce the complement of the problem by presenting a program PT and
showing that T has no solution if and only if PT |= noSolution.
The main idea behind our reduction is similar to Lemma C.4. Program PT contains rules (43)–(45) that associate each tile
with a number using an ordinary numeric predicate tileNo, and encode the horizontal and vertical incompatibility relations
using the object predicates incompatibleH and incompatibleV .
→ tileNo(ti , i)
→ incompatibleH (ti , tj )
→ incompatibleV (ti , tj )
for each 0 ≤ i < M
for each 0 ≤ i, j < M such that (ti , tj ) ∈
/H
for each 0 ≤ i, j < M such that (ti , tj ) ∈
/V
(43)
(44)
(45)
The main difference to Lemma C.4 is that, in order to obtain a polynomial encoding, we cannot represent a position (i, j)
in the grid explicitly using a pair of objects. Instead, we encode each position using a pair (i, j) where i and j are N -tuples of
objects 0̄ and 1̄. If we read 0̄ and 1̄ as representing numbers 0 and 1, respectively, then each i and j can be seen as a binary
number in [0, 2N − 1]. By a slight abuse of notation, we often identify a tuple over 0̄ and 1̄ with the number it encodes and use
tuples in arithmetic expressions. While positions can be encoded using N bits, we will also need to ensure distance between
positions, which requires N + 1 bits. In the rest of this proof, 0̄ and 1̄ stand for tuples 0̄, . . . , 0̄ and 1̄, . . . , 1̄, respectively, whose
length is often implicit from the context where these tuples occur. Similarly, x, x0 , y, and y0 are tuples of distinct variables
whose length will also be clear from the context.
To axiomatise an ordering on numbers with N bits, program PT contains rules (46)–(49), where B is a unary object predicate,
succ is a 2N -ary object predicate, and succ 0 is a (2N + 2)-ary object predicate. Rules (46)–(48) ensure PT |= succ(i, j)
where i and j encode numbers with N bits such that j = 1 + i; in particular, rule (48) encodes binary incrementation, where
x1̄0̄ = 1 + x1̄0̄ holds for each position k and each k-tuple of zeros and ones x. Rules (46)–(47) and (49) ensure an analogous
property for succ 0 , but for numbers with N + 1 bits.
→ B (0̄)
(46)
→ B (1̄)
(47)
Vk
B (xi ) → succ(x, 0̄, 1̄, x, 1̄, 0̄)
for each 0 ≤ k < N where |x| = k and |1̄| = |0̄| = N − k − 1
(48)
Vk
0
for each 0 ≤ k < N + 1 where |x| = k and |1̄| = |0̄| = N − k
(49)
i=1
i=1
B (xi ) → succ (x, 0̄, 1̄, x, 1̄, 0̄)
2N
Analogously to the proof of Lemma C.4, we encoded tilings using numbers in [0, M 2 − 1]. To compute the maximum
number encoding a tiling, program PT contains rules (50)–(53), where maxTiling is a unary min predicate, and auxT is
a (2N + 1)-ary min predicate. Auxiliary rules (50)–(52) multiply M with itself as many times as there are grid positions,
N
so we have PT |= auxT (i, j, M 1+i+2 ·j ) for each position (i, j). Consequently, rule (53) ensures that, for all s, we have
2N
PT |= maxTiling(s) if and only if s ≥ M 2 − 1.
→ auxT (0̄, 0̄, M )
0
(50)
0
auxT (x, y, n) ∧ succ(x, x ) → auxT (x , y, M × n)
0
(51)
0
auxT (1̄, y, n) ∧ succ(y, y ) → auxT (0̄, y , M × n)
(52)
auxT (1̄, 1̄, n) → maxTiling(n − 1)
(53)
Unlike in the proof of Lemma C.4, we cannot include shift factors explicitly into PT since this would make the encoding
exponential; moreover, we could precompute shift factors using rules similar to (50)–(52), but then we would need to use values
from limit predicates in multiplication, which would not produce a limit-linear program. Therefore, we check tilings using a
different approach. As in the proof of Lemma C.4, our construction ensures that, for all s, we have PT |= tiling(s) if and only
if each tiling n with 0 ≤ n ≤ s does not satisfy the compatibility relations. Given a tiling encoded by n and a position (i, j), let
j
k
n
sn,i,j =
.
N
i+j·2
M
Program PT contains rules (54)–(57) where shiftedTiling is a max predicate of arity 2N + 1 and I is a unary min predicate.
These rules ensure that, for each i, j, and tiling n such that PT |= tiling(n), we have PT |= shiftedTiling(i, j, sn,i,j ). To
understand how this is achieved, we order the grid positions as follows:
(0, 0), (1, 0), . . . , (2N − 1, 0), (0, 1), (1, 1), . . . , (2N − 1, 1), . . . . . . , (0, 2N − 1), (1, 2N − 1), . . . , (2N − 1, 2N − 1)
Now consider an arbitrary position (i, j) and its successor (i0 , j0 ) in the ordering. The encoding of a tiling using an integer n
ensures sn,i,j = M × sn,i0 ,j0 + t holds, where 0 ≤ t < M is the number of the tile that n assigns to position (i, j). Thus, rule
(55) ensures that position (0̄, 0̄) satisfies the mentioned property, rule (56) handles adjacent positions of the form (i, j) and
(i + 1, j), and rule (57) handles adjacent positions of the form (1̄, j) and (0̄, j + 1).
→ I (0)
tiling(n) → shiftedTiling(0̄, 0̄, n)
.
shiftedTiling(x, y, n) ∧ succ(x, x ) ∧ I (`) ∧ I (m) ∧ (` < M ) ∧ (n = M × m + `) → shiftedTiling(x0 , y, m)
.
shiftedTiling(1̄, y, n) ∧ succ(y, y0 ) ∧ I (`) ∧ I (m) ∧ (` < M ) ∧ (n = M × m + `) → shiftedTiling(0̄, y0 , m)
0
0
(54)
(55)
(56)
(57)
0
Note that, for all n and n with n < n and each position (i, j), we have sn,i,j < sn0 ,i,j . Thus, since shiftedTiling is a max
predicate, the limit value for s in shiftedTiling(i, j, s) will always correspond to the limit value for n in tiling(n).
N
Checking horizontal compatibility is now easy, but checking vertical compatibility requires dividing sn,i,j by M 2 , which
would make the reduction exponential. Hence, PT checks compatibility using rules (58)–(61), where conflict is a max predicate
of arity 3N + 3. These rules ensure that, for each i, j, d, u, and tiling n such that PT |= tiling(n) and the position that precedes
(i, j) by distance d in the ordering cannot be labelled in n with tile u, we have PT |= conflict(i, j, d, u, sn,i,j ). To this end,
assume that (x, y) is labelled with tile u0 ; now if (u, u0 ) 6∈ H and x 6= 0̄ (i.e., the predecessor x0 of x exists), then rule (58)
says that the position preceding (x, y) by 0̄1̄ (i.e., the position to the left) cannot be labelled with u; moreover, if (u, u0 ) 6∈ V
and y 6= 0̄ (i.e., the predecessor y0 of y exists), then rule (59) says that the position preceding (x, y) by 1̄0̄ = 2N (i.e., the
position above) cannot be labelled with u. Moreover, rule (60) propagates such constraints from position (i, j) to (i − 1, j) while
reducing the distance by one, and rule (61) does so for positions (0̄, j) and (1̄, j − 1).
shiftedTiling(x, y, m) ∧ succ(x0 , x) ∧ incompatibleH (u, u0 ) ∧ tileNo(u0 , t0 ) ∧
.
I (`) ∧ (m = M × ` + t0 ) → conflict(x, y, 0̄1̄, u, m)
(58)
shiftedTiling(x, y, m) ∧ succ(y0 , y) ∧ incompatibleV (u, u0 ) ∧ tileNo(u0 , t0 ) ∧
.
I (`) ∧ (m = M × ` + t0 ) → conflict(x, y, 1̄0̄, u, m)
(59)
shiftedTiling(x, y, m) ∧ succ(x, x0 ) ∧ conflict(x0 , y, z0 , u, m0 ) ∧ succ 0 (z, z0 ) ∧
.
I (`) ∧ (` < M ) ∧ (m = M × m0 + `) → conflict(x, y, z, u, m)
(60)
shiftedTiling(1̄, y, m) ∧ succ(y, y0 ) ∧ conflict(0̄, y0 , z0 , u, m0 ) ∧ succ 0 (z, z0 ) ∧
.
I (`) ∧ (` < M ) ∧ (m = M × m0 + `) → conflict(1̄, y, z, u, m)
(61)
Program PT also contains rules (62)–(64) where invalid is a (2N + 1)-ary max predicate. These rules ensure that, for
each i, j, and each tiling n such that PT |= tiling(n) and there exists a position (i0 , j0 ) that comes after (i, j) in the position
order such that n does not satisfy the compatibility relations between (i0 , j0 ) and its horizontal or vertical successor, we have
PT |= invalid (i, j, sn,i,j ). Rule (62) determines invalidity at position (x, y) for conflicts with zero distance, and rules (63) and
(64) propagate this information to preceding positions analogously to rules (60) and (61).
.
conflict(x, y, 0̄, u, m) ∧ tileNo(u, t) ∧ I (`) ∧ (m = M × ` + t) → invalid (x, y, m)
(62)
shiftedTiling(x, y, m) ∧ succ(x, x0 ) ∧ invalid (x0 , y, m0 ) ∧
.
I (`) ∧ (` < M ) ∧ (m = M × m0 + `) → invalid (x, y, m)
(63)
shiftedTiling(1̄, y, m) ∧ succ(y, y0 ) ∧ invalid (0̄, y0 , m0 ) ∧
.
I (`) ∧ (` < M ) ∧ (m = M × m0 + `) → invalid (1̄, y, m)
(64)
Finally, program PT contains rules (65)–(67) where tiling is a unary max predicate and noSolution is a nullary predicate.
Rule (65) ensures that tiling encoded by 0 is checked. Based on our discussion from the previous paragraph, for each invalid
tiling n such that PT |= tiling(n), we have PT |= invalid (0̄, 0̄, s0̄,0̄,n ); moreover, s0̄,0̄,n = n so, if PT |= invalid (0̄, 0̄, n)
.
holds, then rule (66) ensures that tiling encoded by n + 1 is considered; atom (m = n) is needed in the rule since no numeric
variable is allowed to occur in more than one standard body atom. If we exhaust all available tilings, rule (67) determines that
no solution exists, just as in the proof of Lemma C.4.
→ tiling(0)
.
invalid (0̄, 0̄, m) ∧ tiling(n) ∧ (m = n) → tiling(n + 1)
tiling(n) ∧ maxTiling(m) ∧ (m < n) → noSolution
(65)
(66)
(67)
Based on our discussion of the consequences of PT , we conclude that instance T of the succinct tiling problem does not
have a solution if and only if PT |= noSolution.
Proposition C.6. For J a pseudo-interpretation and α a fact, J |= α if and only if {α} v J.
Proof. Consider an arbitrary pseudo-interpretation J and the corresponding limit-closed interpretation I. If J |= α, then α ∈ I,
so there exists a fact α0 ∈ J such that such that {α} v {α0 }, which implies {α} v J. Moreover, if {α} v J, then there exists
a fact α0 ∈ J such that {α} v {α0 } and, since I is limit-closed, we have α ∈ I, which implies J |= α.
Theorem 21. For P a limit-linear program and α a fact, deciding P |= α is CO NE XP T IME-complete in combined and CO NPcomplete in data complexity.
Proof. Lemmas C.4 and C.5 prove hardness. Moreover, the following nondeterministic algorithm decides P ∪ D 6|= α in time
polynomial in kDk + kαk, and exponential in kPk + kDk + kαk.
1. Compute the semi-grounding P 0 of P.
2. Guess a pseudo-interpretation J over the signature of P 0 ∪ D such that the number of facts in J and the absolute values
of all integers in J are bounded as in Theorem 20.
3. Check that J is a pseudo-model of P ∪ D; if not, return false.
4. Return false if J |= α and true otherwise.
Correctness of the algorithm follows from Theorem 20, so we next argue about its complexity. The mentioned data complexity
holds by the following observations.
• In step 1, kP 0 k, |P 0 |, and the time required to compute P 0 are all polynomial in kDk and constant in kαk.
• Since |P 0 | is polynomial in kDk and constant in kαk, and maxr∈P 0 krk is constant in kDk and kαk, the magnitude of the
integers in J is exponentially bounded in kαk + kDk by Theorem 20; thus, the number of bits needed to represent each
integer in J is polynomial in kαk + kDk. Furthermore, we have |J| ≤ |D| + |P 0 |, and |D| + |P 0 | is polynomial in kDk
and constant in kαk; thus, J can be guessed in step 2 in nondeterministic polynomial time in kαk + kDk.
• By Lemma 14, checking that J is a pseudo-model of P ∪ D amounts to checking TP 0 ∪D (J) = J. By Lemma C.3,
TP 0 ∪D (J) can be computed in deterministic polynomial time in kJk + kDk and hence in kDk (as kJk is polynomial in
kDk). Hence, step 3 requires deterministic polynomial time in kαk + kDk.
• By Proposition C.6, step 4 amounts to checking {α} v J, which can be done in time polynomial in kJk and kαk, and
hence polynomial in kDk + kαk as well.
Finally, the mentioned combined complexity holds by the following observations.
• In step 1, kP 0 k, |P 0 |, and time required to compute P 0 are all exponential in kPk + kDk and constant in kαk.
• Since |P 0 | is exponential in kPk + kDk and constant in kαk, and maxr∈P 0 krk is linear in kPk and constant in
kDk + kαk, the magnitude of the integers in J is doubly exponentially bounded in kPk + kDk + kαk by Theorem 20;
thus, the number of bits needed to represent each integer in J is exponential in kPk + kDk + kαk. Furthermore, we have
|J| < |D| + |P 0 |, and |D| + |P 0 | is exponential in kPk + kDk and constant in kαk; thus, J can be guessed in step 2 in
nondeterministic exponential time in kPk + kDk + kαk.
• By Lemma 14, checking that J is a pseudo-model of P ∪D amounts to checking TP 0 ∪D (J) = J. By Lemma C.3, polynomial p exists such that TP 0 ∪D (J) can be computed in deterministic polynomial time in kP 0 k + kDk + kJkp(maxr∈P 0 krk) ,
which, in turn, is bounded by O(2kPk+kDk ) + kDk + O(2(kPk+kDk)p(maxr∈P krk) ). Hence, step 3 requires deterministic
exponential time in kPk + kDk + kαk.
• By Proposition C.6, step 4 amounts to checking {α} v J, which can be done in time polynomial in kJk and kαk, and
hence in time exponential in kPk + kDk + kαk.
D
Proofs for Section 6
For arbitrary value propagation graph GJP = (V, E, µ), a path in GJP is a nonempty sequence π = v1 , . . . , vn of nodes from V
such that hvi , vi+1 i ∈ E holds for each 0 ≤ i < n; such π starts in v1 and ends in vn . We define |π| = n; moreover, by a slight
abuse of notation, we sometimes write π ∩ X = ∅ or vi ∈ π, where we identify π with the set of its nodes. A path π is simple
if all of its nodes are pair-wise distinct. A path π is a cycle if vn = v1 .
Definition D.1. Given a semi-ground, limit linear program P, a pseudo-interpretation J, value propagation graph
GJP = (V, E, µ), and a path π = v1 , . . . , vn in GJP , the weight µ(π) of π is defined as
µ(π) =
n−1
X
µ(hvi , vi+1 i).
i=1
Lemma D.2. Let P be a semi-ground and stable limit-linear program, let J be a pseudo-model of P, let GJP = (V, E, µ), and
let vAa , vBb ∈ V be nodes such that vAb is reachable from vBa by a path π. Then, for each k ∈ Z such that J |= B(b, k),
• J |= A(a, k + µ(π)) if A and B are both max predicates;
• J |= A(a, −k − µ(π)) if A is a min predicate and B is a max predicate;
• J |= A(a, k − µ(π)) if A and B are both min predicates; and
• J |= A(a, −k + µ(π)) if A is a max predicate and B is a min predicate.
Proof. We consider the case when A and B are both max predicates; the remaining cases are analogous. We proceed by
induction on the length of π. The base case (π is empty) is immediate. For the inductive step, assume that π = π 0 , vAa where
π 0 is a path starting at vBb and ending in node vCc . Then, there exists an edge e = hvCc , vAa i ∈ E, and e is produced by a rule
r = C(c, n) ∧ ϕ → A(a, s) ∈ P such that n is a variable occurring in s, and σ is a grounding of r such that
1. J |= (C(c, n) ∧ ϕ)σ, and
2. δre (J) = µ(e) = µ(hvCc , vAa i).
We next consider the case when C is a max predicate; the case when C is a min predicate is analogous. Let ` be such that
C(c, `) ∈ J. We have the following possibilities.
• If opt(r, J) and ` are both integers (i.e., they are not ∞), we have µ(e) = opt(r, J) − `.
• If opt(r, J) = ∞, then µ(e) = ∞ by Definition 23.
• If ` = ∞, then µ(e) = ∞ by Definition 24 and the fact that P is stable, and moreover opt(r, J) = ∞ by Definition 23.
Now for an arbitrary k ∈ Z such that J |= B(b, k), we consider the following two cases.
• µ(e) 6= ∞. The inductive hypothesis holds for π 0 , so J |= C(c, k + µ(π 0 )) and thus k + µ(π 0 ) ≤ `. Consequently,
we have µ(π) = µ(π 0 ) + µ(e) = µ(π 0 ) + opt(r, J) − ` ≤ opt(r, J) − k, and so k + µ(π) ≤ opt(r, J) holds. Moreover,
J |= P implies TP (J) = J by Lemma 14; thus, Proposition C.6 and the definition of TP imply J |= A(a, k + µ(π)).
• µ(e) = ∞. Clearly, µ(π) = ∞. Moreover, J |= P implies TP (J) = J by Lemma 14; thus, opt(r, J) = ∞, Proposition C.6, and the definition of TP imply J |= A(a, ∞).
Lemma 26. For each semi-ground stable program P, each pseudo-interpretation J with J v T∞
P , and each node vAa on a
positive-weight cycle in GJP , we have A(a, ∞) ∈ T∞
.
P
0
J
0
0
0
Proof. Let GJP = (V, E, µ), let J 0 = T∞
P , and let GP = (V , E , µ ). Now assume for the sake of a contradiction that there
J
exist a cycle π in GP and a node vAa ∈ π such that µ(π) > 0 and J 0 6|= A(a, ∞). Rule applicability is monotonic w.r.t. v, so
0
π is still a cycle in GJP , and, since P is stable, we have µ0 (π) ≥ µ(π) > 0. We consider the case when A is a max predicate;
the remaining case is analogous. Now vAa ∈ V ⊆ V 0 implies that A(a, k) ∈ J 0 for some k; moreover, J 0 6|= A(a, ∞) implies
k 6= ∞. But then, Lemma D.2 implies J 0 |= A(a, k + µ0 (π)); moreover, µ0 (π) > 0 implies that k + µ0 (π) is either ∞ or it is
an integer larger than k; either way, this contradicts our assumption that A(a, k) ∈ J 0 .
Lemma 27. When applied to a semi-ground stable program P, Algorithm 1 terminates after at most 8|P|6 iterations of the
loop in lines 2–8.
Proof. For J a pseudo-interpretation, A an (n + 1)-ary limit predicate, and a an n-tuple of objects such such that A(a, `) ∈ J,
let val(J, Aa) = ` if ` = ∞ or A is a max predicate and ` ∈ Z, and val(J, Aa) = −` if A is a min predicate and ` ∈ Z;
moreover, let R(J, Aa) be the set containing each rule r ∈ P that is applicable to J and where h(r) is of the form A(a, s).
By monotonicity of Datalog Z , we have R(J, Aa) ⊆ R(J 0 , Aa) for each J and J 0 such that J v J 0 . Moreover, for each edge
e = hvBb , vAa i ∈ E generated by a rule r ∈ R(J, Aa), Definition 23 ensures that the following property holds:
val(J, Bb) + µ(e) ≥ val(T{r} (J), Aa)
(∗)
To prove this lemma, we first show the following auxiliary claim.
Claim (♦). For each n ≥ 0 determining the pseudo-interpretation J = TnP and the value propagation graph GJP = (V, E, µ),
0
0
each n0 ≥ 1 determining the pseudo-interpretation J 0 = Tn+n
and the value propagation graph GJP = (V 0 , E 0 , µ0 ), each set
P
of nodes X ⊆ V, and each node vAa ∈ V of such that
1. E = E 0 ;
0
2. val(J 0 , Bb) = ∞ holds for each node vBb ∈ V 0 that occurs in GJP in a positive-weight cycle;
3. vAa 6∈ X;
4. val(J 0 , Aa) < val(TP (J 0 ), Aa);
5. |π| ≤ n0 holds for each simple path π in GJP that ends in vAa and satisfies π ∩ X = ∅;
6. for each node vBb ∈ X, there exists a path π in GJP that starts in vAa and ends in vBb ;
one of the following holds:
(i) val(J 0 , Cc) + µ0 (π) ≥ val(TP (J 0 ), Aa) for some node vCc ∈ X and path π in GJP starting in vCc and ending in vAa ;
(ii) R(J, Cc) ( R(J 0 , Cc) for some node vCc ∈ V.
Proof. For arbitrary n, we prove the claim by induction on n0 . For the base case n0 = 1, consider an arbitrary set X ⊆ V and
vertex vAa ∈ V that satisfy properties 1–6 of (♦). We distinguish two cases.
• There exists an edge e = hvBb , vAa i ∈ E such that val(J 0 , Bb) + µ0 (e) = val(TP (J 0 ), Aa). Now either vBb ∈ X or
vBb = vAa holds: if that were not the case, path π = vBa , vAa would be a simple path in GJP such that |π| = 2, which
would contradict property 5.
We next show that vBb = vAa is impossible. For the sake of a contradiction, assume that vBb = vAa holds, and thus we
have val(J 0 , Aa) + µ0 (e) = val(TP (J 0 ), Aa). By property 4, this implies val(J 0 , Aa) + µ0 (e) > val(J 0 , Aa), and hence
0
µ0 (e) > 0. Consequently, path π is a positive-weight cycle in GJP , and so, by property 2, we have val(J, Aa) = ∞, which,
in turn, contradicts property 4.
Consequently, we have vBb ∈ X. But then, since, by assumption, val(J 0 , Bb) + µ0 (e) = val(TP (J 0 ), Aa), part (i) of the
claim holds for vCc = vBb .
• For each edge hvBb , vAa i ∈ E we have val(J 0 , Bb) + µ0 (e) < val(TP (J 0 ), Aa). Then, for each rule r ∈ P that generates
an edge e = hvBb , vAa i, property (∗) ensures val(T{r} (J 0 ), Aa) < val(TP (J 0 ), Aa). Since
val(TP (J 0 ), Aa) =
max
r∈P,h(r)=A(a,s)
val(T{r} (J 0 ), Aa),
a rule r ∈ P exists that satisfies val(TP (J 0 ), Aa) = val(T{r} (J 0 ), Aa) but does not generate an edge in E ending
in vAa . Clearly, h(r) is of the form A(a, s) and r is applicable to J 0 , so r ∈ R(J 0 , Aa) holds. Moreover, r is
semi-ground; hence, if s were to contain a variable, this variable would occur in a limit body atom of r, and so r
would generate an edge in E; consequently, s is ground. Finally, if r were applicable to J, then {A(a, s)} v J 0
and so val(J 0 , Aa) ≥ val({A(a, s)}, Aa) = val(TP (J 0 ), Aa), which contradicts property 4. Consequently, we have
r∈
/ R(J, Aa), and so part (ii) of the claim holds for vCc = vAa .
For the inductive step, we assume that (♦) holds for n0 − 1 ≥ 1, each set X ⊆ V, and each node vAa ∈ V; and we consider
an arbitrary set X ⊆ V and vertex vAa ∈ V that satisfy properties 1–6 of (♦). By property 4, there exists a rule r ∈ P such
that val(J 0 , Aa) < val(TP (J 0 ), Aa) = val(T{r} (J 0 ), Aa). Now if r does not generate an edge in E, then in exactly the same
way as in the base case we conclude that part (ii) of claim (♦) holds for vCc = vAa ; consequently, in the rest of this proof
0
00
−1
we assume that r generates at least one edge in E. Let J 00 = Tn+n
and let GJP = (V 00 , E 00 , µ00 ). Then, E = E 00 = E 0
P
by property 1, and val(T{r} (J 00 ), Aa) ≤ val(J 0 , Aa) < val(T{r} (J 0 ), Aa), so there exists an edge e = hvBb , vAa i ∈ E such
that val(J 00 , Bb) < val(J 0 , Bb). Furthermore, since val(J 0 , Aa) < val(T{r} (J 0 ), Aa), if vBa were equal to vAa , then path
vAa , vAa would be a positive-weight cycle containing vAa , which contradicts property 2; hence, we have vBb 6= vAa and so
path vBb , vAa is simple. Now if vBb ∈ X holds, then, since r generates e and and val(T{r} (J 0 ), Aa) = val(TP (J 0 ), Aa), by
property (∗), we have val(J 0 , Bb) + µ0 (e) ≥ val(TP (J 0 ), Aa)—that is, part (i) of the claim holds for vCc = vBb . Therefore,
in the rest of this proof we assume vBb ∈
/ X. We now distinguish two cases.
J
• vBb is reachable from vAa in GP . We next show that the set X ∪ {vAa } and node vBb satisfy properties 5 and 6 of the
inductive hypothesis for n0 − 1.
For property 5, note that, since vBb is the direct predecessor of vAa in GJP , each simple path π in GJP that ends in vBb and
does not involve vAa can be extended to the simple path π, vAa that ends in vAa . Thus, we have
max{|π| | π is a simple path in GJP ending in vBb and π ∩ (X ∪ {vAa }) = ∅} <
max{|π| | π is a simple path in GJP ending in vAa and π ∩ X = ∅}.
Property 5 for X, vAa , and n0 ensures
max{|π| | π is a simple path in GJP ending in vAa and π ∩ X = ∅} ≤ n0 ,
which in turn implies
max{|π| | π is a simple path in GJP ending in vBb and π ∩ (X ∪ {vAa }) = ∅} ≤ n0 − 1.
Property 6 holds for X and vAa ; moreover, there exists a path from vBb to vAa via the edge e, so the property also holds
for the set X ∪ {vAa } and node vBb .
Property 3 (vBb ∈
/ X ∪ {vAa }) and property 4 (val(J 00 , Bb) < val(J 0 , Bb)) have already been established for X ∪ {vAa },
vBb , and n0 − 1; moreover, properties 1 and 2 do not depend on X, vAa , and n0 . Thus, we can apply the inductive
hypothesis and conclude that one of the following holds:
(i) val(J 00 , Cc) + µ00 (π) ≥ val(J 0 , Bb) holds for some node vCc ∈ X ∪ {vAa } and path π in GJP that starts in vCc and
ends in vBb ;
(ii) R(J, Cc) ( R(J 00 , Cc) holds for some node vCc ∈ V.
If (ii) is true, then case (ii) of claim (♦) holds since R(J 00 , Cc) ⊆ R(J 0 , Cc). Thus, we next assume that case (i) holds,
and we show that then part (i) of claim (♦) holds for vCc , X, and vAa .
We first show that vCc 6= vAa . For contradiction, assume vCc = vAa . Then val(J 00 , Aa) + µ00 (π) ≥ val(J 0 , Bb). Moreover, since r generates e, by property (∗) and property 4, we have
val(J 0 , Bb) + µ0 (e) ≥ val(T{r} (J 0 ), Aa) = val(TP (J 0 ), Aa) > val(J 0 , Aa).
Consequently, val(J 00 , Aa) + µ00 (π) + µ0 (e) > val(J 0 , Aa). Moreover, val(J 0 , Aa) ≥ val(J 00 , Aa) holds since TP is
monotonic, and µ0 (π) > µ00 (π) holds since P is stable. By these observations, we have
val(J 0 , Aa) + µ0 (π) + µ0 (e) > val(J 0 , Aa);
0
that is, µ0 (π) + µ0 (e) > 0. But then π, vAa is a positive-weight cycle in GJP , and so we have val(J 0 , Aa) = ∞, which
contradicts property 4.
Thus, we have vCc ∈ X. Then, from
val(J 00 , Cc) + µ00 (π) ≥ val(J 0 , Bb) and
val(J 0 , Bb) + µ0 (e) ≥ val(T{r} (J 0 ), Aa) = val(TP (J 0 ), Aa) we conclude
val(J 0 , Cc) + µ0 (π) + µ0 (e) ≥ val(TP (J 0 ), Aa)
as in the case for vCc = vAa . Since µ0 (π) + µ0 (e) = µ0 (π, vAa ), part (i) of claim (♦) holds for vCc , X, and vAa .
• vBb is not reachable from vAa in GJP . Then, by property 6, vBb is not reachable in GJP from any node in X; otherwise,
vBb would also be reachable in GJP from vAa via some node in X. Thus, no simple path in GJP ending in vBb involves
vAa or a node in X—that is, each such path can be extended to a simple path ending in vAa . Now property 5 ensures
max{|π| | π is a path in GJP ending in vAa and π ∩ X = ∅} ≤ n0 , which implies
max{|π| | π is a path in GJP ending in vBb } ≤ n0 − 1.
Thus, property 5 of the inductive hypothesis for n0 − 1 holds for the set ∅ and node vBb . Moreover, property 6 holds
vacuously for ∅, properties 3 and 4 have already been established for vBb , and properties 1 and 2 hold by assumption.
Thus, we can apply the inductive hypothesis for n0 − 1 to ∅ and vBb , and so one of the following holds:
(i) val(J 00 , Cc) + µ00 (π) ≥ val(J 0 , Bb) for some node vCc ∈ ∅ and path π in GJP that starts in vCc and ends in vBb ;
(ii) R(J, Cc) ( R(J 00 , Cc) for some node vCc in GJP .
Clearly, (i) is trivially false, so (ii) holds. But then, case (ii) of claim (♦) holds since R(J 00 , Cc) ⊆ R(J 0 , Cc).
Tn
Tn
Note that, for each n ≥ 0 and each simple path π in GP P , |π| is bounded by the number of nodes in GP P , which is in turn
n+m+1
bounded by m = |P|. Therefore, claim (♦) for n0 = m and X = ∅ ensures that, for each n ≥ 0 such that Tn+m
6= TP
,
P
one of the following holds:
Tn+m
1. val(Tn+m
, Cc) 6= ∞ for some node vCc that occurs in GP P in a positive weight cycle (so the value of the fact correP
sponding to vCc is set to ∞ in the next iteration of the main loop of the algorithm),
Tn+m
2. GP P
Tn
contains at least one edge that does not occur in GP P , or
Tn
3. R(TnP , Cc) ( R(Tn+m
, Cc) for some node vCc in GP P .
P
Tn
For each n ≥ 0, the size of the set R(TnP , Cc) for each node vCc and the number of nodes in GP P are both bounded by
Tn
m, and the number of edges in GP P is bounded by m2 . Thus, the number of iterations of the main loop is bounded by
m · (m + 1) · (m2 + 1) · (m2 + 1) ≤ 8m6 , where the first factor is given by Claim (♦), the second factor comes from the first
case above, the third factor comes from second case, and the fourth factor comes from the third case . Hence, Algorithm 1
reaches a fixpoint after at most 8m6 iterations of the main loop.
Theorem 28. For P a semi-ground stable program, D a dataset, and α a fact, Algorithm 1 decides P ∪ D |= α in time
polynomial in kP ∪ Dk and exponential in maxr∈P krk.
Proof. Partial correctness follows by Lemma 26, while termination follows by Lemma 27. Moreover, the number of iterations
of the main loop of Algorithm 1 is polynomially bounded in |P ∪ D|, and hence kJk in each such iteration is bounded by
kP ∪Dk. Consequently, lines 7 and 4 of Algorithm 1 require time that is worst-case exponential in maxr∈P krk and polynomial
in kP ∪ Dk by Lemma C.3. Moreover, lines 3, 6, and the check in line 8 require time polynomial in kJk and hence in kP ∪ Dk.
Finally, we argue that the check for positive-weight cycles in line 5 is feasible in time polynomial in kP ∪ Dk. Let G0 be
the graph obtained from GJP by negating all weights. Then, a maximal-weight path from vv1 to vv2 in GJP corresponds to the
least-weight path from vv1 to vv2 in G0 . Thus, detecting whether a node occurs in GJP in at least one positive-weight cycle
reduces to detecting whether the node occurs in G0 on a negative cycle (i.e., on a cycle with a negative sum of weights), which
can be solved in polynomial time using, for example, a variant of the Floyd-Warshall algorithm [Hougardy, 2010].
Theorem 29. For P a stable program and α a fact, checking P |= α is E XP T IME-complete in combined and PT IME-complete
in data complexity.
Proof. The E XP T IME lower bound in combined complexity and the PT IME lower bound in data complexity are inherited from
plain Datalog [Dantsin et al., 2001]. The PT IME upper bound in data is immediate by Theorem 28. For the E XP T IME upper
bound in combined complexity, note that, for P 0 = P00 ∪D the semi-grounding of P = P0 ∪D over constants in P, we have that
kP 0 k is exponentially bounded in kPk, whereas maxr∈P00 krk = maxr∈P0 krk. Hence, by Theorem 28, running Algorithm 1
on P 0 gives us an exponential-time decision procedure for P |= α.
Proposition 30. Checking stability of a limit-linear program P is undecidable.
Proof. We present a reduction from Hilbert’s tenth problem, which is to determine whether, given a polynomial P (x1 , . . . , xn )
over variables x1 , . . . , xn , equation P (x1 , . . . , xn ) = 0 has integer solutions. For each such polynomial P , we can assume
P
Qn
k
without loss of generality that P is of the form j (cj × i=1 xi j,i ) for cj ∈ Z and kj,i ≥ 0. Now let PP be the program
containing the following rule, where B is a unary max predicate, and A1 , . . . , An are distinct unary ordinary numeric predicates:
A1 (x1 ) ∧ · · · ∧ An (xn ) ∧ (P (x1 , . . . , xn ) ≤ 0) ∧ (P (x1 , . . . , xn ) ≥ 0) ∧ B(m) ∧ (m ≤ 0) → B(m + 1)
(68)
Note that rule (68) is limit-linear since variables x1 , . . . , xn do not occurs in a limit atom in the rule. We show that PP is stable
if and only if P (x1 , . . . , xn ) = 0 has no integer solutions.
Assume that P (x1 , . . . , xn ) = 0 has no integer solutions. Then, for each grounding σ of (68), at least one of the first two
comparison atoms in the rule is not satisfied, and so PP is trivially stable since, for each pseudo-interpretation J, the value
propagation graph GJP does not contain any edges.
Assume that substitution σ exists such that P (σ(x1 ), . . . , σ(xn )) = 0 holds, and let J1 and J2 be the following pseudointerpretations with the corresponding value propagation graphs:
J1 = {A1 (σ(x1 )), . . . , A1 (σ(xn ))} ∪ {B(0)}
GJP1P = (V1 , E1 , µ1 )
(69)
J2 = {A1 (σ(x1 )), . . . , A1 (σ(xn ))} ∪ {B(1)}
GJP2P
(70)
= (V2 , E2 , µ2 )
Then, we clearly have J1 v J2 and e = hvB , vB i ∈ E1 = E2 ; however, µ1 (e) = 1 and µ2 (e) = 0. Consequently, program PP
is not stable.
Lemma D.3. For each pseudo-interpretation J and each semi-ground type-consistent rule r, if r is applicable to J and it
contains a limit body atom B(b, n) ∈ sb(r) such that B(b, ∞) ∈ J and variable n occurs in h(r), then opt(r, J) = ∞.
Proof. Consider an arbitrary pseudo-interpretation J and rule r applicable to J that contains a limit body atom B(b, n) ∈ sb(r)
with B(b, ∞) ∈ J and n occurring in h(r). We consider the case when h(r) = A(a, s) for A a max predicate and variable
n occurs in s with a negative coefficient; the cases when A is a min predicate and/or n occurs in s with a positive coefficient
are analogous. Then, term s has the form ` × n + t for some negative integer ` and term t not containing n. Moreover, r is
type-consistent, so B is a min predicate. Since r is applicable to J, conjunction C(r, J) has a solution σ. We next show that
opt(r, J) = ∞ holds, for which it suffices to argue that, for each k ∈ Z, conjunction C(r, J) has a solution σ 0 such that sσ 0 ≥ k.
Let k0 = sσ and let σ 0 be the grounding of C(r, J) such that σ 0 (n) = σ(n) − |k − k0 | and σ 0 (m) = σ(m) for each variable
m 6= n. Since B(b, ∞) ∈ J, we have J |= B(b, σ 0 (n)). Moreover, r is type-consistent, σ satisfies all comparison atoms in
the body of r, B is a min predicate, and σ 0 (n) ≤ σ(n), so σ 0 also satisfies all comparison atoms in the body of r. Hence, σ 0 is
a solution to C(r, J). Then, the following calculation implies the claim of this lemma:
sσ 0 = ` × (σ(n) − |k − k0 |) + tσ = (` × σ(n) + tσ) − ` × |k − k0 | = k0 − ` × |k − k0 | ≥ k0 + |k − k0 | ≥ k.
Lemma D.4. For each type-consistent, limit-linear rule r with h(r) = A(t, s), each limit body atom B(t0 , n) ∈ sb(r) such that
n occurs in s, each semi-grounding σ of r such that n 6∈ dom(σ), and all pseudo-interpretations J1 and J2 such that J1 v J2
e
e
and rσ is applicable to J1 , we have δrσ
(J1 ) ≤ δrσ
(J2 ) where e = hvBt0 σ , vAtσ i.
Proof. Consider arbitrary r, B(t0 , n), σ, J1 , J2 , and e as stated in the lemma. We consider the case when A is a max and B
is a min predicate; the remaining cases are analogous. Let ϕ be the body of r and let σ be a semi-grounding of r. Moreover,
e
e
(J2 ) 6= ∞. Due to J1 v J2 , each solution to C(rσ, J1 ) is a solution
(J2 ) = ∞, so we next assume δrσ
the claim is trivial if δrσ
e
(J1 ) 6= ∞ holds. By Definition 23, we then have opt(rσ, J1 ) 6= ∞ and opt(rσ, J2 ) 6= ∞.
to C(rσ, J2 ) as well, so therefore δrσ
But then, by Lemma D.3, there exist k1 , k2 ∈ Z such that B(t0 σ, k1 ) ∈ J1 and B(t0 σ, k2 ) ∈ J2 ; since B is a min predicate,
e
e
(J2 ) = opt(r, J2 ) + k2 . Rule r is
(J1 ) = opt(r, J1 ) + k1 and δrσ
we have k2 ≤ k1 ; moreover, by Definition 23 we have δrσ
type-consistent, so variable n occurs negatively in s; thus, sσ is of the form s0 × n + s00 where s0 is a ground product evaluating
to a negative integer and s00 does not mention n. Moreover, opt(rσ, J1 ) 6= ∞, so there exists a grounding σ1 of rσ such that
e
J1 |= ϕσσ1 and opt(rσ, J1 ) = sσσ1 = s0 × k1 + s00 σ1 = δrσ
(J1 ) − k1 . Let σ2 be the substitution such that σ2 (n) = k2 and
σ2 (m) = σ1 (m) for m 6= n. Clearly, J2 satisfies all object and numeric atoms in ϕσσ2 . Then, we have the following:
e
δrσ
(J2 ) = opt(rσ, J2 ) + k2 ≥ sσσ2 + k2 = s0 × nσ2 + s00 σ2 + k2 = s0 × k2 + s00 σ1 + k2
e
Furthermore, we have already established s0 × k1 + s00 σ1 = δrσ
(J1 ) − k1 , which implies the following:
e
e
e
δrσ
(J2 ) ≥ s0 × k2 − s0 × k1 + δrσ
(J1 ) − k1 + k2 = (s0 + 1) × (k2 − k1 ) + δrσ
(J1 )
e
e
But then, s0 < 0 and k2 ≤ k1 clearly imply δrσ
(J2 ) ≥ δrσ
(J1 ), as required.
Proposition 32. Each type-consistent limit-linear program is stable.
Proof. For P a type-consistent program and σ a semi-grounding of P, condition 1 of Definition 24 follows by Lemma D.4, and
condition 2 of Definition 24 follows by Lemma D.3.
Proposition 33. Checking whether a limit-linear program is type-consistent can be accomplished in L OG S PACE.
Proof. Let P be a limit-linear program. We can check whether P is type-consistent by considering each rule r ∈ P independently. Note that the first type consistency condition is satisfied for every semi-ground limit-linear rule where all numeric terms
are simplified as much as possible; thus, no semi-grounding of r (with constants from P) where all numeric terms are simplified as much as possible can violate the first condition of Definition 31. Thus, it suffices to check whether a semi-grounding
of r (with constants from P) can violate the second or the third condition. In both cases, it suffices to consider at most one
atom α at a time (a limit head atom A(a, s) for the second condition or a comparison atom s1 < s2 or s1 ≤ s2 for the third
condition).PIn α, we consider at most one numeric term s at a time (s ∈ {s1 , s2 } for the third condition), where s is of the
n
form t0 + i=1 ti × mi and ti , for i ≥ 1, are terms constructed from integers, variables not occurring in limit atoms, and
multiplication. Moreover, for each such s, we consider each variable m occurring in s.
By assumption, m occurs in s, so we have mi = m for some i. For the second condition of Definition 31, we need to check
that, if the limit body atom B(s, mi ) introducing mi has the same (different) type as the head atom, then term ti can only be
grounded to positive (negative) integers or zero. For the third condition, we need to check that, if s = s1 and the limit body atom
B(s, mi ) introducing mi is min (max), then term ti can only be grounded to positive (negative) integers or 0, and dually for the
case s = s2 . Hence, in either case, it suffices to check whether term ti can be semi-grounded so that it evaluates to a positive
integer, a negative integer, or zero. We next discuss how this can be checked in logarithmic space. Let ti = t1i × · · · × tki ,
where each tji is an integer or a variable not occurring in a limit atom, and assume without loss of generality that we want to
check whether ti can be grounded to a positive integer; this is the case if and only if one of the following holds:
• all tji are integers whose product is positive;
• the product of all integers in ti is positive and P contains a positive integer;
• the product of all integers in ti is positive, P contains a negative integer, and the total number of variable occurrences in ti
is even;
• the product of all integers in ti is negative, P contains a negative integer, and the total number of variable occurrences in
ti is odd; or
• the product of all integers in ti is negative, P contains both positive and negative integers, and some variable tji has an odd
number of occurrences in ti .
Each of these conditions can be verified using a constant number of pointers into P and binary variables. This clearly requires
logarithmic space, and it implies our claim.
| 2cs.AI
|
arXiv:1702.02362v2 [cs.IT] 22 May 2017
The Necessity of Scheduling in
Compute-and-Forward
Ori Shmuel
Asaf Cohen
Omer Gurewitz
Department of Communication
System Engineering
Ben-Gurion University of the Negev
Email: [email protected]
Department of Communication
System Engineering
Ben-Gurion University of the Negev
Email: [email protected]
Department of Communication
System Engineering
Ben-Gurion University of the Negev
Email: [email protected]
Abstract—Compute and Forward (CF) is a promising relaying scheme which, instead of decoding single messages or
forwarding/amplifying information at the relay, decodes linear
combinations of the simultaneously transmitted messages. The
current literature includes several coding schemes and results
on the degrees of freedom in CF, yet for systems with a fixed
number of transmitters and receivers. It is unclear, however, how
CF behaves at the limit of a large number of transmitters.
In this paper, we investigate the performance of CF in that
regime. Specifically, we show that as the number of transmitters
grows, CF becomes degenerated, in the sense that a relay prefers
to decode only one (strongest) user instead of any other linear
combination of the transmitted codewords, treating the other
users as noise. Moreover, the sum-rate tends to zero as well. This
makes scheduling necessary in order to maintain the superior
abilities CF provides. Indeed, under scheduling, we show that
non-trivial linear combinations are chosen, and the sum-rate does
not decay, even without state information at the transmitters and
without interference alignment.
I. I NTRODUCTION
Compute and Forward (CF) [1] is a coding scheme which
enables receivers to decode linear combinations of transmitted
messages, exploiting the broadcast nature of wireless relay
networks. CF utilizes the shared medium and the fact that
a receiver, which received multiple transmissions simultaneously, can treat them as a superposition of signals, and decode
linear combinations of the received messages. Specifically,
together with the use of lattice coding, the obtained signal,
after decoding, can be considered as a linear combination
of the transmitted messages. This is due to an important
characteristic of lattice codes - every linear combination of
codewords is a codeword itself.
However, since the wireless channel suffers from fading,
the received signals are attenuated by real (and not integers)
attenuations factors, hence the received linear combination is
”noisy”. The receiver (e.g., a relay) then seeks a set of integer
coefficients, denoted by a vector a, to be as close as possible1
to the true channel coefficients.
This problem was elegantly associated with Diophantine
Approximation Theory in [2], and was compared to a similar
problem, that of finding a co-linear vector for the true channel
1 One can define different criteria for the goodness of the approximation,
for example, the minimum distance between the vectors elements.
coefficients vector (between the receiver and the transmitters).
In addition, the co-linear vector must be an integer valued
vector, due to the fact that it should represent the coefficients
of an integer linear combination of codewords. Based on this
theory, if one wishes to find an integer vector a that is close (in
terms of co-linearity) to a real vector h, then one must increase
||a|| in order to have a small approximation error between
them. The increase in the norm value leads to a significant
penalty in the achievable rate at the receiver and thus results
in a tradeoff between the goodness of the approximation and
the maximization of the rate.
The CF scheme was extended in many directions, such
as MIMO CF [3], linear receivers (Integer Forcing) [4] [5],
integration with interference alignment [2], scheduling [6] and
more [7], [8]. All the mentioned works considered a general
setting, where the number of transmitters is a parameter for
the system and all transmitters are active at all times. That
is, the receiver is able to decode a linear combination of
signals from a large number of transmitters as long as the
transmitters comply with the achievable rates at the receiver,
and still promise, to some extent, an acceptable performance.
However, in this work, we show that the number of simultaneous transmitters is of great importance when the number of
relays is fixed. In fact, this number cannot be considered solely
as a parameter but as a restriction since, when it grows, the
receiver will prefer to decode only the strongest user over all
possible linear combinations. This will make the CF scheme
degenerated, in the sense that the relay chooses a vector a
which is actually a unit vector (a line in the identity matrix),
thus treating all other signals as noise. In other words, the
linear combination chosen is trivial. Furthermore, we show
that as the number of transmitters grows, the scheme’s sumrate goes to zero as well. Thus, one is forced to use users
scheduling to maintain the superior abilities CF provide.
We conclude this paper with an optimistic view, that user
scheduling can improve the CF gain. We believe that this
can be done by suitable matching of linear combinations, i.e.
coding possibilities. Using simple Round Robin scheduling
and results for CF in fixed size systems, we lower bound the
sum-rate. We thus show that even for a simple scheduling
policy the system sum-rate does not decay to zero.
The paper is organized as follows. In Section II, the system
𝒘𝟏
𝒘𝟐
𝒘𝑳
𝜀"
𝜀#
.
.
.
𝜀$
𝒛𝟏 𝒚
𝟏
𝒙𝟏
𝒙𝟐
𝒛𝟐
𝐻
𝒛𝑴
𝒙𝑳
𝒚𝟐
𝒚𝑴
𝒟"
.𝟏
𝒖
𝒟#
.𝟐
𝒖
.
.
.
𝒟&
In CF each relay decodes a linear combination um of the
original messages, and forward it to the destination. With
enough linear combinations, the destination is able to recover
the desired (original) messages from all sources.
The main results in CF are the following.
.𝑴
𝒖
Fig. 1: Compute and Forward system model. L transmitters
communicate through a shared medium to M relays.
model is described. In Section III, we derive an analytical
expression for the probability of choosing a unit vector by the
relay, as the number of users grows. Section IV depicts the
behaviour of the sum-rate for this model, and in Section V
we present the advantage of using scheduling, along with a
simple scheduling algorithm.
II. S YSTEM MODEL AND K NOWN RESULTS
Consider a multi-user multi-relay network, where L transmitters are communicating to a single destination D via M
relays. The model is illustrated in figure 1. All relays form
a layer between the transmitters and the destination such that
each transmitter can communicate with all the relays. Each
transmitter draws a length-k message with equal probability
over a prime size finite field, wl ∈ Fkp , l = 1, 2, ..., L, where
Fp denotes the finite field with a set of p elements.
This message is then forwarded to the transmitter’s encoder,
El : Fkp → Rn , which maps length-k messages over the finite
field to length-n real-valued codewords, xl = El (wl ). Each
codeword is subject to a power constraint, kxl k2 ≤ nP . The
message rate of each transmitter is defined as the length of
the message measured in bits normalized by the number of
channel uses, that is, R = nk log p, which is equal2 for each
transmitter. Each transmitter then broadcasts it’s codeword to
the channel.
Hence, each relay m ∈ {1...M } observes a noisy linear
combination of the transmitted signals through the channel,
ym =
L
X
hml xl + zm
m = 1, 2, ..., M,
(1)
i=1
where hml ∼ N (0, 1) are the real channel coefficients and
z is an i.i.d., Gaussian noise, z ∼ N (0, In×n ). Let hm =
[hm1 , hm2 , ..., hmL ]T denote the vector of channel coefficients
at relay m. We assume that each relay knows its own channel
vector. After receiving the noisy linear combination, each relay
selects a scale coefficient αm ∈ R, an integer coefficients
vector am = (am1 , am2P
, ..., amL )T ∈ ZL , and attempts to
L
decode the lattice point l=1 aml xl from αm ym .
2 Note
that messages with different length can be allowed with zero padding
to attain a length-k message which will result in different rates for the
transmitters.
Theorem 1 ([1, Theorem 1]). For real-valued AWGN networks
with channel coefficient vectors hm ∈ RL and coefficients
vector am ∈ ZL , the following computation rate region is
achievable:
P
1
+
,
R(hm , am ) = max log
2 + P kα h − a k2
αm ∈R 2
αm
m m
m
(2)
where log+ (x) , max{log(x), 0}.
Theorem 2 ([1, Theorem 2]). The computation rate given in
Theorem 1 is uniquely maximized by choosing αm to be the
MMSE coefficient
αM M SE =
P hTm am
,
1 + P khm k2
which results in a computation rate region of
−1
1
P (hTm am )2
R(hm , am ) = log+ kam k2 −
.
2
1 + P khm k2
(3)
(4)
Note that the above theorems are for real channels and the
rate expressions for the complex channel are twice the above
([1, Theorems 3 and 4]).
Since the relay can decide which linear combination to
decode (i.e., the coefficients vector a), an optimal choice will
be one that maximizes the achievable rate. That is,
−1
1
P (hTm am )2
+
2
aopt
=
arg
max
log
ka
k
−
. (5)
m
m
1 + P khm k2
am ∈ZL \{0} 2
Remark 1 (The coefficients vector). The coefficients vector a
plays a significant role in the CF scheme. It dictates which
linear combination of the transmitted codewords the relay
wishes to decode. That is, each non-zero element signifies
the fact that the relay is interested in it’s corresponding
codeword. If, starting from a certain number of simultaneously
transmitting users, the coefficients vector the relay chooses is
always (or with high probability) a unit vector, this means
that essentially we treat all other users as noise and loose the
promised gain of CF.
The following Lemma bounds the search domain for the
maximization problem in (5).
Lemma 1 ([1, Lemma 1]). For a given channel vector h,
the computation rate R(hm , am ) in Theorem 2 is zero if the
coefficient vector a satisfies
kam k2 ≥ 1 + P khm k2 .
(6)
The problem of finding the optimal a can be done by
exhaustive search for small values of L. However, as L grows,
the problem becomes prohibitively complex quickly. In fact,
it becomes a special case of the lattice reduction problem,
which has been proved to be NP-complete. This can be seen
if we write the maximization problem of (5) as an equivalent
minimization problem [9]:
T
aopt
m = arg min f (am ) = am Gm am ,
(7)
am ∈ZL \{0}
where Gm = (1 + P khm k2 )I − P hm hTm . Gm can be
regarded as the Gram matrix of a certain lattice and am will be
the shortest basis vector and the one which minimize f . This
problem is also known as the shortest lattice vector problem
(SLV), which has known approximation algorithms due to its
hardness [10], [11]. The most notable of them is the LLL
algorithm [12], [13] which has an exponential approximation
factor which grows with the size of the dimension. However,
for special lattices, efficient algorithms exist [14]. In [9],
a polynomial complexity algorithm was introduced for the
special case of finding the best coefficient vector in CF.
III. P ROBABILITY OF A U NIT V ECTOR
In this section, we examine the coefficient vector at a single
relay, hence, we omit the index m in the expressions.
(a) L = 4
(b) L = 8
(c) L = 16
(d) L = 32
Fig. 2: Example for the magnitude of the elements of G for
different dimensions (i.e., different values of L), for P=10.
The graphs depict a single realization for each L, and were
interpolated for ease of visualization.
A. The Matrix G
Examining the matrix G, one can notice that as L, the
number of transmitters, grows, the diagonal elements grow
very fast relatively to the off-diagonal elements. Specifically,
each diagonal element is a random variable, which is a χ2L
r.v. minus a multiplication of two Gaussian r.vs., whereas
the off-diagonal elements are only a multiplication of two
Gaussian r.vs.. Of course, as L grows, the former has much
higher expectation value compared to later. Examples of G
are presented in Figure 2, for different dimensions. It is clear
that even for moderate number of transmitters, the differences
in values between the diagonal and off-diagonal elements are
significant.
Consider now the quadric form (7) we wish to minimize.
Any choice of a that is not a unit vector, will add more than
one element from the diagonal of G to it. When L is large, the
off-diagonal elements have little effect on the function value
compared to the diagonal elements. Therefore, intuitively, one
would prefer to have as little as possible elements from the
diagonal although the off-diagonal elements can reduce the
function value. This will happen if we choose a to be a unit
vector. In the reminder of this section, we make this argument
formal.
B. Minimization of the Quadratic form f
Note that the right term consists of all possible pairs (i, j)
such that i 6= j, a total of L(L−1)
elements.
2
We wish to understand when will a relay prefer a unit vector
over any other non-trivial vector a. Specifically, since a is
a function of the random channel h, we will compute the
probability of having a unit vector as the minimizer of f for
a given a. Or, alternatively, the probability that a certain nontrivial a will minimize f compared to a unit vector. We thus
wish to find the probability
P r(f (a) ≤ f (ei ))
= P r(kak2 + P (kak2 khk2 − (aT h)2 ) ≤ 1 + P (khk2 − h2i )),
(8)
where ei is a unit vector of size L with 1 at the i-th entry
and zero elsewhere, and a is any integer valued vector that is
not a unit vector. Note that (8) refers to any integer vector a,
including the vectors in the search domain such that kak ≤
p
1 + P khk2 ([1, Lemma 1]).
Note also that the right and left hand sides of the inequality
in equation (8) are dependent, hence direct computation of this
probability is not trivial. Still, this probability can be evaluated
exactly noting that the angle between a and h is what mainly
affects it. The details are in the theorem below.
The minimization function f (a) = aT Ga can be written as
C. The Optimality of ei VS. a Certain Vector a
aT Ga =
L
X
(1 − P (khk2 − h2i ))a2i − 2
i=1
= kak2 + P
L X
i−1
X
i=1 j=1
L X
i−1
X
(hi aj − hj ai )2
i=1 j=1
= kak2 + P (kak2 khk2 − (aT h)2 ).
P hi hj ai aj
Theorem 3. Under the CF scheme, the probability that a nontrivial vector a will be the coefficient vector aopt which maximize the achievable rate R(h, aopt ), i.e., minimize f (aopt ),
comparing with a unit vector ei , is upper bounded by
1 L−1
,
(9)
P r(f (a) ≤ f (ei )) ≤ 1 − IΦ(a)
2
2
where Ix (a, b) is the CDF of the Beta distribution with param1
1
eters a and b, and Φ(a) = 1 − kak
2 . Note that 2 ≤ Φ(a) ≤ 1
for any a which is not a unit vector.
Pr
0.4
In the context of this work, the main consequence of
Theorem 3, is the following.
0.3
Corollary 1. As the number of simultaneously transmitting
users grows, the probability that a non-trivial a will be the
maximizer for the achievable rate goes to zero. Specifically,
0.2
P r(f (a) ≤ f (ei )) ≤ e−LE1 (L) ,
The proofs will be given after the following discussion.
1) Discussion and simulation results: Corollary 1 clarifies
that for every P , as the number of users grows, the probability
of having a non-trivial vector a as the maximizer of the
achievable rate is going to 0. Note that the assumption of
L > 3, which arises naturally form this paper’s regime, along
with the fact that kak ≥ 2 grantees that E1 (L) is positive.
Figure 3 depicts the probability in (9), it’s upper bound given
in equation (10) and simulation results. From the analytic
results as well as the simulations on the rate of decay, one can
deduce that even for relatively small values of simultaneously
transmitting users (L > 20), the relay will prefer to choose a
unit vector. Also, one can observe from the results and from
the analytic bound that as the norm of a grows, the rate
of decay increases. This faster decay reflects the increased
penalty of approximating a real vector using an integer valued
vector.
2) Proofs: The proof of Theorem 3 is based on the lemma
below.
T
2
(a h)
Lemma 2. The distribution of kak
2 khk2 , which is the squared
cosine of the angle between an integer vector a and a standard
normal vector h, both of dimension L, is Beta( 12 , L−1
2 ).
Proof. Let Q be an orthogonal rotation matrix such that
Qa = a0 where a0 , is co-linear to the basis vector e1 . That
is, a0 = (kak, 0, ..., 0). Define h0 = Qh. Note that h0 is
a standard normal vector since E[h0 ] = E[Qh] = 0, and
QIQT = QQT = I. We have
(aT h)2
(aT h)2
(aT QT Qh)2
= T
= T T
2
2
T
kak khk
(a a)(h h)
(a Q Qa)(hT QT Qh)
((Qa)T Qh)2
((Qa)T Qh)2
=
=
T
T
((Qa) Qa)((Qh) Qh)
kQak2 kQhk2
2
=
ka0 k2 (e1 T h0 )2
(e1 T h0 )2
h0 1
=
=
.
0
2
2
0
2
2
0
2
ka k ke1 k kh k
ke1 k kh k
kh0 k2
(11)
Considering the above we have the equality of cos θ =
h0 21
. This expression can be represented as WW
+V ,
h021 +h0 22 +...+h02L
PL
2
0
2
02
2
where W = h 1 is a χ1 r.v. and V = i=2 h i is a χL−1 r.v.
independent in W . This ratio has a Beta(a, b) distribution,
with a = 12 and b = L−1
2 . Note that a and b correspond to the
degrees of freedom of W and V .
2
||a||2 =5
||a||=2
Simulation
Beta dist. bound
Min. dist. bound
0.1
(10)
where a is any integer vector that is not a unit vector and
E1 (L) = (1 − L3 ) log kak.
||a||2 =8
0
5
10
15
20
L
Fig. 3: The upper bounds given in (10)(solid lines), (9) (dashed
lines) and simulation results (dotted lines) for not having a unit
vector as the minimizer of f compared to various values of
kak2 as a function of simultaneously transmitting users.
Proof of Theorem 3. According to equation (8) we have,
P r(f (a) ≤ f (ei ))
= P r kak2 + P kak2 khk2 − (aT h)2 ≤ 1 + P (khk2 − h2i )
1 − kak2
= Pr
+ khk2 − h2i − kak2 khk2 + (aT h)2 ≥ 0
P
(a)
≤ P r khk2 − kak2 khk2 + (aT h)2 ≥ 0
(aT h)2
1
−
1
+
≥
0
= Pr
kak2
kak2 khk2
T
2
(a h)
1
= Pr
≥
1
−
kak2 khk2
kak2
(b)
1 L−1
,
,
= 1 − IΦ(a)
2
2
(12)
where (a) follows since we removed negative terms (kak2 >
1
1) and (b) follows from Lemma 2 with Φ(a) = 1 − kak
2.
The bound on the probability given in Theorem 3 consists
of a complicated analytic function IΦ(a) (·). Hence, corollary 1
includes a simplified bound which avoids the use of IΦ(a) (·),
yet keeps the nature of the result in Theorem 3. The proof of
Corollary 1 is based on the following lemma.
T
2
(a h)
Lemma 3. The CDF of kak
2 khk2 can be lower bounded by
the CDF of the minimum of L2 − 1 i.i.d. uniform random
variables in [0, 1].
Proof. We start by assuming that L is even where the case
of odd
L will be dealt with later. From 2Lemma 2, the r.v.
h1
(aT h)2
kak2 khk2 has the same distribution as khk2 , that is, for any
0 ≤ α ≤ 1,
(aT h)2
≤
α
kak2 khk2
2
h1
= Pr
≤
α
khk2
Pr
2
h1 + h22
≥ Pr
≤
α
khk2
h21 + h22
= Pr
≤
α
(h21 + h22 ) + ... + (h2L−1 + h2L )
(a)
L
(b)
= 1 − (1 − α) 2 −1 ,
(a) is true since a larger r.v. will yield lower probability. (b)
h21 +h22
is due to the observation that khk
can be represented as
2
PL
W
2
2
2
i=3 hi are independent
W +V , where W = h1 +h2 and V =
exponential r.vs. Note that V is essentially a sum of L2 − 1
independent
pairs. This ratio is distributed as the minimum
of L2 − 1 i.i.d. uniform [0, 1] random variables [15, Lemma
3.2]. This is since the ratio can be interpreted as the proportion
of the waiting time for the first arrival to the L2 arrival of a
Poisson process.
In case L is an odd number,2 we2 can increase the term in the
h +h
proof by replacing it with khk12 −h22 , resulting in a distribution
L
which is similar to the minimum of ( L−1
2 − 1) i.i.d. uniform
random variables in the same manner.
Proof of Corollary 1.
P r(f (a) ≤ f (ei ))
(a)
(aT h)2
1
≤ Pr
≥
1
−
kak2 khk2
kak2
L −1
b2c
(b)
1
≤ 1− 1−
2
kak
L−1 −1
2
1
≤
kak2
(13)
= e−LE1 (L) ,
where (a) and (b) follows from Lemmas 2 and 3 respectively, E1 (L) = (1 − L3 ) log kak and kak2 > 1.
The following lemma shows a simple property of the
optimal coefficients vector which shows that if the relay is
interested in only one transmitter, i.e. a unit vector as the
optimal coefficients vector, it will be the transmitter with the
strongest channel.
Lemma 4. For any channel vector h of size L with m =
arg maxi {|hi |}, the optimal coefficients vector aopt which
maximize the rate R(h, a) has to satisfy m = arg maxi {|ai |}
as well.
Proof. Suppose that there exist h for which (w.l.o.g.) |h1 | >
|hi | for all i 6= 1 and that the optimal coefficients vector aopt
satisfies (w.l.o.g.) |a2 | > |ai | for all i 6= 2. Considering the rate
expression R(h, a) we will show that by rearranging aopt a
b be a vector which is identical
higher rate can be attain. Let a
to aopt except the two first entries which are switched, i.e.
ab1 = aopt
and ab2 = aopt
1 . The values of the vectors are the
2
same thus we have kb
ak = kaopt k and the only term affecting
the rate is the scalar multiplication between aopt and h. We
first note that the signs of hi and its corresponding optimal
coefficient aopt
has to be equal or different for all i. I.e. the
i
the case which there exist i such that sign(hi ) = sign(aopt
i )
and j such that sign(hj ) 6= sign(aopt
j ) could not be possible.
This is due to the fact that the optimal coefficients vector has
to maximize the scalar multiplication. Therefore, considering
this property, h1 ab1 + h2 ab2 > h1 aopt
+ h2 aopt
1
2 . This means
b contradicting aopt
that the rate can be improved by choosing a
optimality. Specifically, we’ll get that as long as the maximal
value in any a is not in the same place as the maximal value
in h we can always improve the rate.
D. The Optimality of ei VS. All Possible Vectors a
Corollary 1 refers to the probability that a unit vector will
minimize f for a fixed a. Next we wish to explore this
probability for any possible a. For the purpose of clarity, (13)
gives an upper bound on the probability that a unit vector
will not minimize f compered to a certain possible integer
coefficients vectors with a certain kak2 . Where the probability
of having an optimal vector which is not a unit vector will be
the union of all probabilities for each a vector which satisfies
kak2 < 1 + P khk2 . Let us define P (ei ) as the probability
that a relay picked a unit vector as the coefficient vector, and
P (ei ) as the probability which any other vector was chosen.
In [9], a polynomial time algorithm for finding the optimal
coefficients vector a was given. The complexity result derives
from the fact that the cardinality of the set of all a vectors
3
(denoted
p as Φ) which are considered is upper bounded by
2L(d 1 + P khk2 e + 1). That is, any vector which does not
exist in this set has zero probability to be the one which
maximize the rate. We shell note this set here as A. Thus,
we wish to compute
[
P (ei ) =
P (f (a) ≤ f (ei )) ,
(14)
A
L
where A = {a ∈ Z : a ∈ Φ, a 6= ei ∀i}. Note that the
cardinality of A grows with the dimension of h, i.e., with L
and can be easily upper bounded as follows,
|A| ≤ 2L(d
p
1 + P khk2 e + 1)
≤ 2L(d1 + P khk2 e + 1) ≤ 2L(P khk2 + 3). (15)
Theorem 4. Under the CF scheme, the probability which any
other coefficients vector a will be chosen to maximize the
achievable rate R(h, aopt ) compared with a unit vector ei ,
as the number of simultaneously transmitting users grows, is
zero. That is,
lim P (ei ) = 0,
(16)
L→∞
Proof. We have,
lim P (ei ) = lim
L→∞
≤ lim
L→∞
L→∞
X
[
P (f (a) ≤ f (ei ))
A
P (f (a) ≤ f (ei ))
A
X 1
≤ lim
L→∞
kak2
L−1
2 −1
A
3 In [9], Φ is a set of points which the average of any consecutive points
is mapped to a different coefficients vector.
L−1
−1
1 2
≤ lim |A|
L→∞
2
Sum
Rate
7
(a)
L−1
−1
1 2
2
≤ lim 2L(P khk + 3)
L→∞
2
L−1 −1
L
X
1 2
= lim 2L(P
h2i + 3)
L→∞
2
i=1
L−1
L
−1
1 2
1X 2
(c)
h
= lim 2L2 P
L→∞
2
L i=1 i
L−1
−1
1 2
(d)
= lim 2L2 P
L→∞
2
6
(b)
= 4P lim L2 2−
5
4
3
2
1
ææææ
æ
æ
P=103
æ
æ
æ
æ
P=102
àààà
æ
æ à
à
æ
à
à
P=10
à
à ææ
æ
à
ììì
ì
à
ìì
à
ì
à æ
ì
ì
ì
à æ
ì
ì à æ
ì
ì à æ
ìì à
ììààæ
æ
àììì
ææ
ììì
àà
àà
ààììì
ììì
æææ
àààììì
æææ
àààìììì
ææææ
ààààà
ææææ
ìììììì
àààààààààà
ææææææ
ìììììì
æææææ
à
10
20
30
40
Trans.
50 Users
Fig. 4: The sum rate as give in (18) for the case of 4 relays as
a function of the number of simultaneously transmitting users,
for different values of P.
L−1
2
L→∞
= 4P lim L2 e−LE2 (L) = 0,
L→∞
where (a) is true since the term inside the sum is maximized
with kak2 = 2. (b) is due to (15), in (c) we multiplied and
divide with L and eliminate the limit term which is multiplied
by 3 since it goes to zero. (d) follows from the strong law
of large numbers were the normalized sum converge with
probability one to the expected value of χ21 r.v. which is one.
And lastly we define E2 (L) = 12 (1 − L1 ) log 2.
This result implies that the probability of having any non
unit vector as the rate maximizer is decreasing exponentially
to zero as the number of users grows.
IV. C OMPUTE AND F ORWARD S UM -R ATE
In order that relay m will be able to decode a linear
combination with coefficients vector am , all messages’ rates
which are involved in the linear combination must be within
the computation rate region [1]. I.e., all the messages for which
the corresponding entry in the coefficient vector is non zero.
That is,
Rl < min R(hm , am )
aml 6=0
(17)
Hence, the sum rate of the system is defined as the sum of
messages’ rates, i.e.,
L
X
l=1
min R(hm , am ).
m:aml 6=0
(18)
Following the results from previous subsections, we would
like to show that as the number of users grows, the system’s
sum-rate decreases to zero as well. That is, without scheduling
users, not only each individual rate is negligible, this is true
for the sum-rate as well. This will strengthen the necessity to
schedule users in CF.
Theorem 5. As L grows, the sum rate of CF is tends to zero,
that is,
L
X
lim
min R(hm , am ) = 0.
(19)
L→∞
l=1
m:aml 6=0
Proof. The proof outline is as follows. The sum rate expression is divided into two parts, which describe two scenarios.
The first is for the case where a relay chooses a unit vector
as the coefficients vector and the second is for the case where
any other vector is chosen. The probabilities for that are P (ei )
and P (ei ), respectively. Then, we show that each part goes to
zero by upper bounding the corresponding expressions. The
complete proof is given in appendix A.
Simulations for the sum-rate for different values of P can
be found in Figure 4. It is obvious that for large L, the sumrate decreases, hence, for a fixed number of relays there is no
use in scheduling a large number of users, as CF degenerates
to choosing unit vectors and treating other users as noise.
However, the simulations suggests a peak at a small number
of transmitters. We explore this in the next section.
V. S CHEDULING IN C OMPUTE AND F ORWARD
Theorem 4 and 5 suggest that a restriction on the number of
simultaneously transmitting users should be made. That is, in
order to apply the CF scheme for systems with a large number
of sources, scheduling a smaller number of users should take
place.
The most simple scheduling scheme is to schedule users
in a Round Robin (RR) manner, where in each transmission
only k users may transmit simultaneously. The value of k can
be optimized, yet as a thump rule, one can schedule M users
(similar to the number of relays) is each transmission to obtain
a sum-rate which is not going to zero. Figure 5 depicts such a
scenario. In fact, even higher sum rates can be obtained if the
number of scheduled users is higher than the number of relays,
i.e., the number for which the maximal sum-rate in Figure 4
is achieved. Still, it is clearly seen that it is not zero for M
scheduled sources, compared to the zero sum-rate when all L
users transmit and the relay use CF.
In fact, one can use existing results for the CF sum-rate for
the case of equal number of sources and relays, and describe
the sum-rate in each transmission under such a schedule.
Sum
Rate
12
Sum
Rate
5
4
æ
à
ì
æ
à
ì
æ
ò
à
ì
æ
à
ì
æ
à
ì
ò
ò
ò
ò
æ
à
æ
ì
à
ì
ò
ò
3
P=100
P=75
P=50
P=25
No Scheduling
Scheduling
2
1
5
10
æ
à
ì
æ
à
ì
æ
à
ì
æ
à
ì
æ
à
ì
æ
à
ì
10
ò
ò
ò
ò
ò
ò
8
æ
à
ì
Upper
æ
Best Eq.
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
æ
M=4
æ æ æ
æ æ
æ æ
M=8
à à
æ æ
à
à à
à à
æ æ
à à
à à
æ æ
à à
à à
à à
æ æ
à
à à à
à à
æ æ
à
à à à
æ æ
à à
à à
à
à
æ æ
à
à à à
æ
æ à à à à
à
æ
à
æ
à à à
æ
à à
à
à
æ
à à
æ
à à à à
à
à
ò
ò ò ò ò
ò
ò ò ò ò ò
ò ò
ò ò
ò ò
ò ò ò
ò
ò ò
ò ò ò
ò ò
ò ò ò ò ò
ò ò
ò ò
ò ò ò
ò ò ò ò
ò ò
ò ò
ò ò ò ò ò ò ò
Lower
6
4
ò
æ
à
ì
ò
15
æ
à
ì
ò
20
æ
à
ò
ì
25
2
æ
ò
ì
à
ò
æ
ì
à
Trans.
30 Users
5
10
15
20
25
Power
30 @dBD
Fig. 5: Simulation results for the average sum-rate per transmission. Here, the number of relays is 3 and scheduling was
performed in a Round Robin manner, where in every phase 3
sources were scheduled among the transmitting users.
Fig. 6: Simulation results for the average sum-rate compared
with the upper and lower bounds given in (20) and (21),
respectively, as a function of the transmission power for
M = 4 and M = 8.
According to [2], the sum rate for M sources and M relays
is upper bounded by,
any other linear combination of the transmitted signals. Thus,
CF becomes degenerate and it is more preferable to apply
scheduling for much smaller group size. We show that even
with a simple scheduling policy the sum-rate does not goes to
zero and would like, as future work, to proceed and explore
scheduling policies which exploit the decoding procedure of
CF.
M
X
l=1
min R(hm , am ) ≤
m:aml 6=0
1
log P + log log P , (20)
1 + 1/M
for M ≥ 2 and P ≥ 3. A very coarse lower bound can be
attained if the relays are forced to choose their coefficients
vectors such that each relay i chooses ai = ei . That is,
an interference channel where each relay i considers the
interferences from all other sources j, j 6= i as noise. Even
with this one has
M
X
l=1
≥
min
m:aml 6=0
M
X
l=1
Proof. The probabilities P (ei ) and P (ei ) define a partition on
the channel vectors a relays sees, specifically we define,
He = {h ∈ RL | arg min f (a) = ei }
R(hm , am )
min
m:aml 6=0
a∈ZL \{0}
1
log+
2
1 + P khm k2
1 + P (khm k2 − h2l )
L
He = {h ∈ R | arg min f (a) 6= ei }.
j6=l
which is not zero. Simulation results for the bounds and
the optimal CF coefficient vectors are presented in Figure 6.
From the aforesaid one can conclude that scheduling M users
for transmission is worthwhile with respect to the alternative
of permitting all users transmit simultaneously. Of course, the
scheduling policy has great impact on the performance, which
can be increased if, for example, one schedules groups whose
channel vectors are more suitable for CF.
That is, with probability P (ei ) a relay sees a channel vector
h ∈ He and with probability P (ei ) a relay sees a channel
vector h ∈ He . We note he and he as a channel vectors
which belongs to He and He respectively.
Under the above definitions, the sum rate can be written as
follows,
L
X
l=1
=
min R(hm , am )
m:aml 6=0
L
X
l=1
VI. C ONCLUSION AND FUTURE WORK
This work gives evidence for the necessity of user scheduling under the CF scheme for large number of simultaneously
transmitting users. We proved, with probability which goes
to one, that in this regime the optimal choice of decoding at
the relays is to decode the user with best channel instead of
(22)
a∈ZL \{0}
(21)
M
X
1
P h2l
P 2
≥
log 1 +
,
2
1+P
hj
l=1
A PPENDIX A
P ROOF FOR T HEOREM 5
P (ei ) min R(hem , ei )
(23)
m:eml 6=0
+ P (ei ) min R(hem , am ).
m:aml 6=0
We treat the two terms above separately where the second
term represents the sum rate for the case which the optimal
coefficients vectors may be any integer vector excluding the
unit vector ei . And the first term is for the case that the optimal
coefficients vector is ei . We will show that both terms goes to
zero while starting with the second term.
L
X
Returning to the expectation in (26) we have,
Z
e 2
E khm k =
= P (ei )
m:aml 6=0
L
X
l=1
(a)
Z
∞
≤
min
m:aml 6=0
α
R(hem , am )
e
≥ ) = 0,
lim P (RL
(25)
for all > 0.
Using The Markov and Jensen’s inequalities we have,
1 e
e
P (RL
≥ ) ≤ E RL
1
1
+
e 2
= E P (ei )L log 1 + P khm k
2
1
L
≤ P (ei ) log+ 1 + P E khem k2 ,
2
(27)
which means in words, all possible squared norm values which
belong to all vectors he . We define then, P (ξ) = P (khk2 ∈
Henorm ) as the probability to belong to Henorm . That is,
Z
fχ2L (x)dx = P (ξ).
Henorm
∞
x
fχ2L (x)
P (ξ)
α
fχ2L (x)
1
x
dx ≤
P (ei )
P (ei )
Z
dx
∞
0
xfχ2L (x)dx
L
.
P (ei )
(29)
R∞
Where, α satisfies α fχ2L (x)dx = P (ξ) and (a) is due to the
fact that P (ξ) ≥ P (ei ) since it may happen that two vectors
he and he would have the same squared norm value.
Applying the expectation’s upper bound in (26) we have,
1
L
P (ei ) log+ 1 + P E khem k2
2
L
PL
1
≤ P (ei ) log+ 1 +
2
P (ei )
s
(30)
(a) 1
L
PL
1 Lp
2
=
2P LP (ei )
≤ P (ei )
2
P (ei )
2
(b) 1 L p
√
1
≤
8P 2 L3 e−LE2 (L) = P L2 2Le−LE3 (L)
2
√
where (a) is due the bound log(1+x) ≤ 2x, (b) following
directly from Theorem 4 and E3 (L) = 41 (1 − L1 ) log 2.
Considering the above, as L grows, the second term of (23) is
going to zero, that is,
lim
(26)
therefore, we are interested in analyzing the expectation of
the squared norm values belonging to all channel vectors he .
Remember that, without any constraints, the channel vector
h is a Gaussian random vector which it’s squared norm follows
the χ2L distribution, we shell note as fχ2L (x). A single squared
norm value can belong to a several different Gaussian random
vectors. Hence, we define Henorm as the set of squared norm
values which belongs to he , formally,
Henorm = {khk2 ∈ R|h ∈ He },
P (ξ)
Z
dx ≤
=
≤ P (ei )L max R(hem , am )
m
= P (ei )L max
m
1 + P khem k2
1
+
log
2
kam k2 + P (kam k2 khem k2 − ((hem )T am )2 )
1
≤ P (ei )L max log+ 1 + P khem k2
m 2
1
= max P (ei )L log+ 1 + P khem k2 .
m
2
(24)
+
1
e
e 2
Define RL = P (ei )L 2 log 1 + P khm k , we would like
e p
to show that RL
→ 0, that is,
L→∞
fχ2L (x)
Henorm
P (ei ) min R(hem , am )
l=1
x
(28)
L
X
L→∞
P (ei ) min R(hem , am )
l=1
m:aml 6=0
√
1 P L2 L −LE3 (L)
√
≤ lim
e
=0
L→∞
0.5
(31)
for all > 0.
Thus, we are left with the first term in (23)
lim
L→∞
L
X
P (ei ) min R(hm , ei ) ≤
m:eil 6=0
l=1
L
X
l=1
min R(hm , ei )
m:eil 6=0
L
X
1
1 + P khm k2
+
= lim
min
log
L→∞
m:eil 6=0 2
1 + P (khm k2 − h2i )
l=1
M
X
(b)
1 + P khm k2
1
≤ lim
log+
L→∞
2
1 + P (khm k2 − h2i )
m=1
M
X
1 + P khm k2
1
+
log
lim
=
=0
L→∞ 1 + P (khm k2 − h2
2
i)
m=1
(a)
(32)
where in (a) we set the unit vector ei in the rate expression
R(hm , am ). The upper bound (b) is for the best case scenario
for which each relay has different unit vector ei . Finally, it is
clear that as L grows for each realization of hm the argument
of the log is going to 1.
R EFERENCES
[1] B. Nazer and M. Gastpar, “Compute-and-forward: Harnessing interference through structured codes,” IEEE Transactions on Information
Theory, vol. 57, no. 10, pp. 6463–6486, 2011.
[2] U. Niesen and P. Whiting, “The degrees of freedom of compute-andforward,” IEEE Transactions on Information Theory, vol. 58, no. 8, pp.
5214–5232, 2012.
[3] J. Zhan, B. Nazer, M. Gastpar, and U. Erez, “Mimo compute-andforward,” in 2009 IEEE International Symposium on Information Theory. IEEE, 2009, pp. 2848–2852.
[4] J. Zhan, B. Nazer, U. Erez, and M. Gastpar, “Integer-forcing linear
receivers,” IEEE Transactions on Information Theory, vol. 60, no. 12,
pp. 7661–7685, 2014.
[5] A. Sakzad, J. Harshan, and E. Viterbo, “Integer-forcing mimo linear
receivers based on lattice reduction,” Wireless Communications, IEEE
Transactions on, vol. 12, no. 10, pp. 4905–4915, 2013.
[6] W. He, C. Feng, C. I. Ionita, and B. Nazer, “Collision scheduling for cellular networks,” in Information Theory (ISIT), 2015 IEEE International
Symposium on. IEEE, 2015, pp. 1417–1421.
[7] L. Wei and W. Chen, “Compute-and-forward network coding design
over multi-source multi-relay channels,” IEEE Transactions on Wireless
Communications, vol. 11, no. 9, pp. 3348–3357, 2012.
[8] S.-N. Hong and G. Caire, “Compute-and-forward strategies for cooperative distributed antenna systems,” Information Theory, IEEE Transactions on, vol. 59, no. 9, pp. 5227–5243, 2013.
[9] S. Sahraei and M. Gastpar, “Compute-and-forward: Finding the best
equation,” in Communication, Control, and Computing (Allerton), 2014
52nd Annual Allerton Conference on. IEEE, 2014, pp. 227–233.
[10] D. Dadush, C. Peikert, and S. Vempala, “Enumerative lattice algorithms
in any norm via m-ellipsoid coverings,” in Foundations of Computer
Science (FOCS), 2011 IEEE 52nd Annual Symposium on. IEEE, 2011,
pp. 580–589.
[11] M. Alekhnovich, S. A. Khot, G. Kindler, and N. K. Vishnoi, “Hardness
of approximating the closest vector problem with pre-processing,” in
46th Annual IEEE Symposium on Foundations of Computer Science
(FOCS’05). IEEE, 2005, pp. 216–225.
[12] A. K. Lenstra, H. W. Lenstra, and L. Lovász, “Factoring polynomials
with rational coefficients,” Mathematische Annalen, vol. 261, no. 4, pp.
515–534, 1982.
[13] N. Gama and P. Q. Nguyen, “Finding short lattice vectors within
mordell’s inequality,” in Proceedings of the fortieth annual ACM symposium on Theory of computing. ACM, 2008, pp. 207–216.
[14] J. H. Conway and N. J. A. Sloane, Sphere packings, lattices and groups.
Springer Science & Business Media, 2013, vol. 290.
[15] K. P. Jagannathan, S. Borst, P. Whiting, and E. Modiano, “Efficient
scheduling of multi-user multi-antenna systems,” in Modeling and
Optimization in Mobile, Ad Hoc and Wireless Networks, 2006 4th
International Symposium on. IEEE, 2006, pp. 1–8.
| 7cs.IT
|
Multi-frame image super-resolution with fast
upscaling technique
Longguang Wang, Zaiping Lin, Xinpu Deng, Wei An
Abstract—Multi-frame image super-resolution (MISR) aims
to fuse information in low-resolution (LR) image sequence to
compose a high-resolution (HR) one, which is applied extensively in many areas recently. Different with single image super-resolution (SISR), sub-pixel transitions between multiple
frames introduce additional information, attaching more significance to fusion operator to alleviate the ill-posedness of
MISR. For reconstruction-based approaches, the inevitable
projection of reconstruction errors from LR space to HR
space is commonly tackled by an interpolation operator,
however crude interpolation may not fit the natural image
and generate annoying blurring artifacts, especially after fusion operator. In this paper, we propose an end-to-end fast
upscaling technique to replace the interpolation operator,
design upscaling filters in LR space for periodic sub-locations
respectively and shuffle the filter results to derive the final
reconstruction errors in HR space. The proposed fast upscaling technique not only reduce the computational complexity of
the upscaling operation by utilizing shuffling operation to
avoid complex operation in HR space, but also realize superior performance with fewer blurring artifacts. Extensive experimental results demonstrate the effectiveness and efficiency
of the proposed technique, whilst, combining the proposed
technique with bilateral total variation (BTV) regularization,
the MISR approach outperforms state-of-the-art methods.
Index Terms—multi-frame super-resolution, upscaling
technique, bilateral total variation, shuffling operation
I. INTRODUCTION
UE to the limited technical and manufacturing level,
the resolution of image may not be satisfied in video
surveillance [1][2], medical imaging [3][4][5], aerospace [6][7][8] and many other fields [9][10], where high
resolution (HR) images are commonly required and desired
for distinct image details. With charge-coupled device
(CCD) and CMOS image sensors developing rapidly in
recent decades, the increasing demand in image resolution
still cannot be satisfied, leading to attempts to steer clear of
the sensor issues but utilize computational imaging to improve the spatial resolution, namely super-resolution (SR).
Serving as a typical inverse problem, SR aims to recover
missing image details during image degradation process,
which is underdetermined, requiring additional information
to alleviate the ill-posedness. For single image super-resolution (SISR), lack of observation information
leads to attempts to exploit additional information to learn
how natural images are, and many example-based approaches [11][12][13][14][15][16] have been proposed. For
multi-frame image super-resolution (MISR), sub-pixel
transitions between multiple observations provide underly-
D
L. Wang is with the College of Electronic Science and Engineering, National University of Defense Technology, Changsha, China. (e-mail:
[email protected])
Z. Lin, X. Deng, and W. An are also with the College of Electronic Science and Engineering, National University of Defense Technology,
Changsha, China.
1
ing available information, therefore reconstruction-based
approach [17][20][21][25][26] is mainly concentrated on to
derive the high resolution (HR) image through maintaining
global consistency, which is intuitive and natural.
Concerning reconstruction-based MISR approaches, extensive works have been put forward focusing on the design of regularization to realize favorable results. Tikhonov
regularization SR method [17][18], as a representative
method, introduces smoothness constraints to suppress the
noise but results in the loss of detailed information in edge
regions. To realize edge preserving, total variation (TV)
operator is introduced as a regularization term [19][20][21],
however, leads to the deterioration of smoothness in local
flat region. Motivated by bilateral filter, Farsiu et al. [25]
proposed the bilateral total variation (BTV) operator measured by 𝐿1 norm, which integrates TV with bilateral filter
and realizes superior performance and robustness. Due to
the performance and simplicity of BTV, further improvement has attracted extensive investigation, Li et al. [31]
proposed the locally adaptive bilateral total variation
(LABTV) operator measured by fuzzy-entropy-based
neighborhood homogeneous measurement, realizing locally
adaptive regularization.
Among these reconstruction-based approaches, to maintain global consistency with multiple observations, reconstruction errors are commonly integrated in the cost function to penalize the discrepancy between reconstructed HR
image and LR observations. Within the iterative SR process,
inevitable projection of reconstruction error from LR space
to HR space is usually tackled by an interpolation operator
for simplicity, however this crude operation may introduce
additional errors and lead to deteriorated convergence and
performance, especially after fusion operation of MISR. In
this paper, we propose an end-to-end fast upscaling technique to replace the interpolation operation in the SR
framework. Firstly, we unfold the degradation model to
analyze underlying contributions of periodic sub-locations
to reconstruction error in LR space and design upscaling
filters correspondingly. Secondly, the filter results utilizing
designed upscaling filters are shuffled to derive the reconstruction errors in HR space. Finally, the reconstruction
errors are cooperated with regularization term to modify the
HR image iteratively until convergence. Extensive experiments are conducted to demonstrate the effectiveness and
efficiency of the proposed upscaling technique, besides,
combining the proposed technique with BTV regularization,
the MISR approach realizes state-of-the-art performance.
The rest of the paper is organized as follows: Section II
mainly formulates the problem of multi-frame image super-resolution. Section III presents the proposed upscaling
technique in detail. Section IV performs extensive experiments compared with other state-of-the-art approaches and
the conclusions are drawn in Section V.
𝐹𝑘
Original Image
𝐻𝑘
Geometric Wrap
Fig. 1.
𝐷𝑘
Blurring
𝑁𝑘
Downsample Add Noise
Sketch of degradation model.
II. MULTI-FRAME IMAGE SR PROBLEM FORMULATION
A. Degradation model
As the inverse process of image degradation, SR reconstruction is tightly dependent on the degradation model.
With many degrading factors existing like atmospheric
turbulence, optical blurring, relative motion and sampling
process, the degradation model of LR images can be formulated as:
𝒀𝑘 = 𝑫𝑘 𝑯𝑘 𝑭𝑘 𝑿 + 𝑵𝑘 , 𝑘 = 1,2, … 𝑀,
(1)
where 𝒀𝑘 , X represent 𝑘 𝑡ℎ LR image and HR image respectively, 𝑫𝑘 , 𝑯𝑘 , 𝑭𝑘 serve as decimation matrix, blurring operator and geometric warp matrix of 𝒀𝑘 respectively, and 𝑵𝑘 is the additional Gaussian noise in 𝒀𝑘 .
Note that although complex motions may be common in
real sequences which cannot be represented by a simple
parametric form and many works [28][29][30] tend to address this problem, global translational displacements between multiple frames serving as a fundamental issue, is
still the focus of this paper.
Generally assuming all LR images are generated under
the same condition, we can derive the following model:
𝒀𝑘 = 𝑫𝑯𝑭𝑘 𝑿 + 𝑵𝑘 , 𝑘 = 1,2, … 𝑀,
(2)
where 𝑫 and 𝑯 represent same decimation matrix and
blurring operator respectively in all LR images. The degradation model is further illustrated in Fig. 1.
B. Reconstruction-based SR process
In Bayesian framework, SR reconstruction is equivalent
to the estimation of HR image with given LR images,
where maximum a posteriori (MAP) estimator is extensively utilized as
*∏𝑀
𝑿=
𝑚
𝑘 1 𝑝(𝑿|𝒀𝑘 )+
*∏𝑀
=
𝑚
(3)
𝑘 1 𝑝(𝒀𝑘 |𝑿) 𝑝(𝑿)+
To solve the probabilistic maximization problem, equivalent minimization of reconstruction errors can be derived
as:
2
𝑿=
𝑚𝑖𝑛𝑿 *∑𝑀
(4)
𝑘 1‖𝑫𝑯𝑭𝑘 𝑿 − 𝒀𝑘 ‖ +
As insufficient information given in LR image sequence
𝒀𝑘 , reconstructing the original HR image 𝑿 is an underdetermined problem. To solve the ill-posed problem, regularization is commonly introduced as priori knowledge to
obtain a stable solution and (4) can be rewritten as:
2
𝑿=
𝑚𝑖𝑛 *∑𝑀
𝑘 1‖𝑫𝑯𝑭𝑘 𝑿 − 𝒀𝑘 ‖ + 𝜆𝑅(𝑿)+, (5)
where 𝑅(𝑿) is the regularization term of HR image 𝑿, 𝜆
serves as a regularization parameter weighting the reconstruction errors against the regularization cost.
Assuming decimation matrix 𝑫, blurring operator 𝑯
and geometric warp matrix 𝑭𝑘 are already known, the
minimization problem can be solved utilizing steepest descent approach as:
𝜕𝑅(𝑿)
𝑇 𝑇 𝑇
𝑿𝑙+1 = 𝑿𝑙 − 𝜂 .∑𝑀
/
𝑘 1 𝑭𝑘 𝑯 𝑫 (𝑫𝑯𝑭𝑘 𝑿 − 𝒀𝑘 ) + 𝜆
𝜕𝑿
(6)
where 𝑿𝑙 , 𝑿𝑙+1 are estimators of HR image 𝑿 in 𝑙 𝑡ℎ
and 𝑙 + 1𝑡ℎ iteration respectively, 𝜂 is the learning rate
representing the pace to approach the optimal during iterations. In this paper, the derivation of displacements and blur
kernel is not under consideration, we assume the blur kernel is already known and utilize optical flow method to
estimate the underlying displacements.
III. MULTI-FRAME IMAGE SR WITH FAST UPSCALING TECHNIQUE
In this section, we first present the proposed end-to-end
fast upscaling technique, introduce our motivation and its
formulation in detail before theoretical analysis on computational complexity and convergence. Then we integrate the
proposed upscaling technique with BTV regularization to
construct the overall MISR framework.
A. End-to-end upscaling technique
1) Motivation
As we can see from (6), projecting reconstruction errors
(𝑫𝑯𝑭𝑘 𝑿 − 𝒀𝑘 ) from LR space into HR space is required
in the inference, where interpolation operator commonly
plays a main role as the upscaling operator 𝑫𝑇 , and then
deblurring operator 𝑯𝑇 and inverse translation operator
𝑭𝑘 𝑇 are performed in HR space. Lacking in theoretical
basis, crude interpolation may introduce additional errors
leading to blurring artifacts, therefore it serves as a fundamental operator and requires small stepsize and enough
iterations to alleviate the deterioration, which is
sub-optimal and adds computational complexity [27].
In Shi et al. [27], an efficient sub-pixel convolutional
neural network is proposed, where an array of upscaling
filters are utilized to corporate with a shuffling operator to
upscale the final LR feature maps in to HR output, which is
located at the very end of the network. As [27] demonstrates increasing the resolution of LR image before image
enhancement increase the computational complexity, besides the commonly used interpolation methods do not
bring additional information to solve the ill-posed reconstruction problem, we are inspired to unfold the degradation model to analyze underlying contributions of periodic
sub-locations to reconstruction error in LR space and design similar array of upscaling filters. In this paper, we
propose an end-to-end upscaling technique to perform fast
and efficient upscaling operation, serving as a direct bridge
between reconstruction errors in LR space and HR space.
2) Formulation
Further analyze the degradation model shown in (2) from
the perspective of image, assuming the blurring operator 𝑯
is limited in a × region ( is odd for the symmetry of
blurring kernel) in HR space and the upscaling factor is
determined
sub-location
#4
sub-location
#3
sub-location
#2
sub-location
#1
original
d decimal
geometric wrap
after
translation
blurring
after
blurring
downsample
after
decimation
Fig. 2. Degradation process with respect to different sub-locations.
as 𝛾, namely the decimation operator 𝑫 is limited in a
𝛾 × 𝛾 region in HR space. Concerning translational displacements 𝒅 between LR images, only sub-pixel displacements 𝒅𝑠𝑢𝑏𝑝𝑖𝑥𝑒𝑙 are considered for pixel-level displacements do not bring additional information. Without
loss of generality, only positive sub-pixel displacements
𝒅𝑠𝑢𝑏𝑝𝑖𝑥𝑒𝑙 (𝒅𝑠𝑢𝑏𝑝𝑖𝑥𝑒𝑙 = 𝒅 − 𝑙𝑜𝑜 (𝒅)) are taken into consideration, so that the geometric wrap operator can be limited in a 2 × 2 region.
To illustrate the interaction between the concatenation of
operators, here we set
to be 3 with 𝛾 to be 2 and derive
the degradation model from the perspective of image as
shown in Fig. 2.
With the degradation process unfolded as shown in Fig.
2, it can been seen that different ranges of influence in LR
space correspond with different sub-locations, which inspires us to structure upscaling filters concerning periodic
sub-locations utilizing the differences between influence
ranges. As parameters including sub-pixel displacements
𝒅𝑠𝑢𝑏𝑝𝑖𝑥𝑒𝑙 , blurring kernel 𝑯 and upscaling factor 𝛾 are
all determined, the overall degradation process and the underlying contributions of periodic sub-locations to LR
space can be derived.
Remembering the projection of reconstruction errors
from LR space to HR space in (6), we structure upscaling
filters utilizing the underlying contributions of periodic
sub-locations to realize end-to-end upscaling of reconstruction errors in LR space. Within the probabilistic framework,
the upscaling operator can be equivalent to an optimal estimation problem as
𝑚 𝑝(ℎ𝑖 |𝑒𝑗,𝑗∈𝐶(𝑖) ) , 𝑖 = 1,2, … , 𝑁𝐻𝑅 ,
(7)
𝑖 =
ℎ𝑖
where 𝑖 , 𝑒𝑗 are reconstruction error of 𝑖 𝑡ℎ pixel in HR
space and 𝑗𝑡ℎ pixel in LR space respectively, 𝐶(𝑖) serves
as the influence range in LR space of pixel 𝑖 in HR space
and 𝑁𝐻𝑅 (𝑁𝐻𝑅 = 𝛾 2 𝑁𝐿𝑅 ) is the number of pixels in HR
space. Further assuming 𝑝𝑖𝑗 serves as the contribution of
𝑖 𝑡ℎ pixel in HR space to 𝑗𝑡ℎ pixel in LR space, minimization problem equivalent to (7) can be derived utilizing
greedy strategy
𝑖
=
𝑁𝐶(𝑖)
‖𝑝𝑖𝑗 ℎ𝑖
1
𝑚𝑖𝑛 *∑𝑗
ℎ𝑖
𝑝
− 𝑒𝑗 ‖𝑝 + , 𝑖 = 1,2, … , 𝑁𝐻𝑅 , (8)
where 𝑁𝐶(𝑖) is the number of pixels within 𝐶(𝑖). As the
influence ranges of different sub-locations can be limited in
a 3× 3 LR region in the case of Fig. 2, here we utilize 𝐿2
norm for simplicity and the closed-form solution can be
computed as
ℎ𝑖 =
∑9
𝑗=1 𝑝𝑖𝑗 𝑒𝑗
2
∑9
𝑗=1 𝑝𝑖𝑗
, 𝑖 = 1,2, … , 𝑁𝐻𝑅
(9)
Considering influence range and corresponding contributions are both sub-location dependent, namely HR pixels
with same sub-location share identical influence range and
contribution distribution, we intuitively separate the upscaling operator with respect to different sub-locations and
rewrite (9) for identical sub-location in a convolution form
due to the global consistent process.
𝑇 ∗𝑬
𝑮𝑖 = ‖𝑇𝑖 ‖2 = 𝑇′𝑖 ∗ 𝑬, 𝑖 = 1,2, … , 𝑁𝐻𝑅 ,
(10)
𝑖 2
where 𝑮𝑖 represents reconstruction error map for 𝑖 𝑡ℎ
sub-location in HR space, 𝑬 represents reconstruction
error map in LR space, namely 𝑬 = 𝑫𝑯𝑭𝑘 𝑿 − 𝒀𝑘 and 𝑇𝑖
serves as the contribution distribution concerning 𝑖 𝑡ℎ
sub-location. Regarding the 𝐿2 norm of 𝑇𝑖 as a normalization constant, we integrate it into 𝑇𝑖 to derive normalized contribution distribution 𝑇′𝑖 as filter masks. In this
way, the upscaling operator can be implemented by convolution operator, which realizes favorable efficiency.
As reconstruction errors with respect to ranged
sub-locations in HR space derived separately, a shuffling
operator is introduced to rearrange the elements in separate
error maps to a complete error map 𝑮 in HR space as
shown in Fig. 3. Utilizing the proposed end-to-end upscaling technique, we evade the interpolation operator which
may introduce additional errors, design filter masks according to contribution distribution concerning ranged
sub-locations and process the error map in LR space separately, finally a shuffling operator is implemented to derive
the final error map in HR space. As all processes in LR
P'1
P'2
Shuffling
P'3
P'4
reconstruction error map H
reconstruction error map E
reconstruction error map H1 ~ H 4
Fig. 3. End-to-end upscaling technique.
space are end-to-end, namely all processing results can be
mapped directly to corresponding HR space without intermediate operations, our upscaling technique can realize
superior efficiency and effectiveness, which is demonstrated in the following analysis and Section IV.
3) Theoretical analysis
In this section, theoretical analysis with respect to computational complexity and convergence are carried out respectively, we attempt to illustrate the superiority of the
proposed end-to-end upscaling technique theoretically.
Computational complexity
For conventional interpolation-based upscaling technique,
the reconstruction errors in LR space are commonly projected into HR space by an interpolation operator first, and
then processed by deblurring operator 𝑯𝑇 and inverse
translation operator 𝑭𝑘 𝑇 . In this way, deblurring operator
and inverse translation operator are both performed in HR
space, which adds computational complexity.
Although the complexities of interpolation-based upscaling technique and the proposed end-to-end upscaling
technique are both of order 𝛰(𝑁𝐻𝑅 ), where 𝑁𝐻𝑅 is the
number of pixels in HR space, the computation amounts
differ greatly. Assuming 𝑯, 𝑭𝑘 are limited in × and
2 × 2 region of HR space respectively, for interpolation-based upscaling technique, bicubic interpolation is
commonly utilized performing as weighted sum of neighboring 4 × 4 pixels in LR space, afterwards deblurring
operator 𝑯𝑇 and inverse translation operator 𝑭𝑘 𝑇 are
performed as weighted sum of neighboring × and
2 × 2 pixels respectively in HR space. For our proposed
end-to-end upscaling technique, the upscaling operator is
𝑎+1
performed as weighted sum of neighboring 𝑐𝑒𝑖𝑙(
+
1) × 𝑐𝑒𝑖𝑙(
𝑎+1
𝛾
𝛾
+ 1) pixels in LR space, which remarkably
scent and fixed stepsize are commonly utilized for interpolation-based upscaling technique, which requires small
stepsize and enough iterations to approach the optimal. As
interpolation-based upscaling technique introduces additional errors, the deviation of descent direction makes the
convergence process greatly time consuming.
While Newton-type methods typically tend to converge
in fewer iterations, the computation of Hessian matrix in
each iteration is required, leading to expensive computational cost. As we analyze our end-to-end upscaling technique theoretically, it can be regarded as a variation and
simplification of Newton-type method, which can realize
superior convergence.
Remembering the minimization problem in (5), as we
unfold the degradation model, it can be rewritten as
2
𝑿=
𝑚𝑖𝑛 *∑𝑁
(11)
𝑘 1‖𝑨𝑘 𝑿 − 𝒀𝑘 ‖ + 𝜆𝑅(𝑿)+,
where 𝑿, 𝒀𝑘 represent vectorized HR image and 𝑘 𝑡ℎ LR
image respectively, 𝑨𝑘 = ,𝒂𝑘1 , 𝒂𝑘2 , … , 𝒂𝑘𝐿 - serves as a
dictionary arranged in lexicographic order, which consists
of 𝑁𝐻𝑅 atoms. As analyzed before, different sub-locations
correspond to different influence ranges and contribution
distributions, we utilize this characteristic to construct
overcomplete dictionary as shown in Fig. 4.
For Newton method, the inference of 𝑿 can be written
as
𝑿𝑙+1 = 𝑿𝑙 − ∑𝑀
𝑘
𝜕𝑅(𝑿)
𝜕𝑿
2
𝜕 𝑅(𝑿)
2𝑨𝑘 𝑇 𝑨𝑘 +𝜆
2
𝜕𝑿
2𝑨𝑘 𝑇 (𝑨𝑘 𝑿−𝒀𝑘 )+𝜆
1
(12)
As dictionary 𝑨𝑘 is hard to manipulate, Newton method
cannot be directly utilized in general. Considering 𝑅(𝑿) is
commonly a non-linear operator and the computation of
second derivation is relatively difficult, besides the regularization parameter 𝜆 is usually small, we simplify (12)
and separate 𝑅(𝑿) term out as
𝑨 𝑇 (𝑨 𝑿−𝒀 )
𝜕𝑅(𝑿)
𝑘
𝑘
𝑘
reduces the computational complexity especially with larg𝑿𝑙+1 = 𝑿𝑙 − (∑𝑀
+ 𝜆 𝜕𝑿𝑇 ) (13)
𝑘 1
𝑨𝑘 𝑇 𝑨𝑘
2𝑨𝑘 𝑨𝑘
er upscaling factor 𝛾.
𝑇
Unfold the symmetric matrix 𝑨𝑘 𝑨𝑘 and we can derive
Convergence
For reconstruction-based MISR approaches, steepest de𝒂𝑘1 𝑇 𝒂𝑘−1 𝒂𝑘1 𝑇 𝒂𝑘𝑁𝐻𝑅
𝒂𝑘1 𝑇 𝒂𝑘1 𝒂𝑘1 𝑇 𝒂𝑘2
⋯
𝒂𝑘2 𝑇 𝒂𝑘1 𝒂𝑘2 𝑇 𝒂𝑘2
𝒂𝑘2 𝑇 𝒂𝐾−1 𝒂𝑘2 𝑇 𝒂𝑘𝑁𝐻𝑅
(14)
⋮
⋱
⋮
𝒂𝑘(𝑁𝐻𝑅 −1) 𝑇 𝒂𝑘(𝑁𝐻𝑅 −1) 𝒂𝑘(𝑁𝐻𝑅 −1) 𝑇 𝒂𝑘𝐿
𝒂𝑘(𝑁𝐻𝑅 −1) 𝑇 𝒂𝑘1 𝒂𝑘(𝑁𝐻𝑅 −1) 𝑇 𝒂𝑘2
⋯
𝑇
𝒂𝑘𝑁𝐻𝑅 𝑇 𝒂𝑘(𝑁𝐻𝑅 −1)
𝒂𝑘𝑁𝐻𝑅 𝑇 𝒂𝑘𝑁𝐻𝑅 ]
𝒂𝑘𝑁𝐻𝑅 𝑇 𝒂𝑘2
[ 𝒂𝑘𝑁𝐻𝑅 𝒂𝑘1
As we can see from Fig. 4, the atom is highly sparse and
As the inverse operation of 𝑨𝑘 𝑇 𝑨𝑘 is hard to manipulate,
𝑇
regional, namely 𝒂𝑘𝑖 𝒂𝑘𝑗 equals to zero except 𝑗 ∈ 𝜂(𝑖),
we only take diagonal elements into consideration, namely
where 𝜂(𝑖) represents the neighborhood of corresponding
regard 𝑨𝑘 𝑇 𝑨𝑘 as a diagonal matrix by ignoring other
HR pixel 𝑖 in HR space. Taking this into consideration,
non-diagonal non-zero entries, and rewrite (13) as
𝜕𝑅(𝑿)
𝑇
elements in 𝑨𝑇 𝑨 can be rearranged through placing cor𝑀 𝑨𝑘 (𝑨𝑘 𝑿−𝒀𝑘 )
𝑙+1
𝑙
𝜕𝑿
𝑿
=
𝑿
−
(∑
+
𝜆
) (15)
𝑇
𝑘 1 𝑑𝑖𝑎 (𝑨 𝑨 )
relative atoms closer, and then we can derive an approxi2𝑑𝑖𝑎 (𝑨𝑘 𝑇 𝑨𝑘 )
𝑘
𝑘
𝑇
mate diagonal matrix, namely most entries in 𝑨𝑘 𝑨𝑘
𝐴 𝑇 (𝐴 −𝑌 )
Rewrite 𝑘 𝑘 𝑇 𝑘 in an atom-wise way and we can
equal to zeros except diagonal ones and some other ones.
𝑑𝑖𝑎 (𝐴𝑘 𝐴𝑘 )
derive
sub-location
#1
sub-location
#3
X
Yk
Yk
sub-location
#2
X
sub-location
#4
dictionary AkT
X
Yk
Yk
X
Fig. 4. Procedure of dictionary 𝑨𝑘 .
.
𝐴𝑘 𝑇 (𝐴𝑘 −𝑌𝑘 )
/ =
𝑑𝑖𝑎 (𝐴𝑘 𝑇 𝐴𝑘 ) 𝑖
𝑎𝑘𝑖 𝑇 (𝐴𝑘 −𝑌𝑘 )
(16)
𝑎𝑘𝑖 𝑇 𝑎𝑘𝑖
If we push atom 𝒂𝑘𝑖 backwards into the corresponding LR
image, (16) can rewritten in a convolution form
𝑨𝑘 𝑇 (𝑨𝑘 𝑿−𝒀𝑘 )
(
) =
𝑑𝑖𝑎 (𝑨𝑘 𝑇 𝑨𝑘 ) 𝑖
𝑻𝑘𝑖 ∗(𝑨𝑘 𝑿−𝒀𝑘 )
,
‖𝑻𝑘𝑖 ‖2
2
(17)
where 𝑻𝑘𝑖 represents the contribution distribution map
corresponding to atom 𝒂𝑘𝑖 . Now we can see (15) performs
identical to (10) concerning reconstruction error in LR
space, illustrating the proposed end-to-end upscaling technique performs as a variation and simplification of Newton
method, which can realize superior convergence.
1
As 𝒂𝑘𝑖 is a one-sum atom, ‖𝑻 ‖2 performs as a magni𝑘𝑖 2
fication constant no less than 1. Considering 𝜆 is commonly small, the magnification effect on regularization
term can be ignored and we can derive
𝑿𝑙+1 = 𝑿𝑙 − (∑𝑀
𝑘
1
𝑨𝑘 𝑇 (𝑨𝑘 𝑿−𝒀𝑘 )
𝑨𝑘 𝑇 𝑨𝑘
+𝜆
𝜕𝑅(𝑿)
𝜕𝑿
)
𝑨𝑘 𝑇 (𝑨𝑘 𝑿−𝒀𝑘 )
1 𝑑𝑖𝑎 (𝑨 𝑇 𝑨 )
𝑘
𝑘
+𝜆
𝜕𝑅(𝑿)
𝜕𝑿
(19)
0.034
Interpolation-based technique
End-to-end technique
0.032
0.031
MSE
LR Y1
interpolation
R ( X l )
X l
HR X
strategy
However, the descent direction utilizing our end-to-end
upscaling technique is relatively more accurate, therefore
the convergence can be faster and more stable.
To further demonstrate the superior convergence, we
utilize Tikhonov regularization without loss of generality
and compare the convergence process of interpolation-based with the end-to-end upscaling technique, the
comparison of convergence process is shown in Fig. 5.
0.033
BTV
regularization
LR Y1 ~ YN
(18)
)
LR error map
HR error map
DHFk X Yk end-to-end
G
Considering our end-to-end upscaling technique performs as an approximate Newton method where the simplifications may introduce additional errors, therefore we also
applied a similar learning rate 𝜂 in (18) as (6) for stable
convergence
𝑿𝑙+1 = 𝑿𝑙 − 𝜂 (∑𝑀
𝑘
upscaling technique with BTV regularization to construct
the overall MISR framework. Due to the performance and
simplicity of BTV, it has become one of the most commonly applied regularization in SR process, therefore we
utilize BTV in our MISR framework to corporate with the
proposed end-to-end upscaling technique. The overall
framework is illustrated in Fig. 6 and further summarized
in Algorithm 1.
Fig. 6. Overall MISR framework
Algorithm 1: MISR utilizing end-to-end upscaling technique
Input: LR images 𝒀1 , 𝒀2 , … , 𝒀𝑀 , blurring kernel, upscaling factor 𝛾
Initialize: Select target image (𝒀1 for example), utilize
bicubic interpolation to derive initial HR image 𝑿 , estimate translational displacements 𝒅1𝑘 between target
image 𝒀1 and other LR images.
Loop until ‖𝑿𝑙 − 𝑿𝑙−1 ‖2 /‖𝑿𝑙−1 ‖2 < 𝜖 or 𝑙 𝑁𝑀𝑎𝑥
Compute error map 𝑫𝑯𝑭𝑘 𝑿 − 𝒀𝑘 in LR space
respectively
Perform end-to-end upscaling technique to derive
error map 𝑮 in HR space
Compute BTV regularization 𝑅(𝑿) and its deriva𝜕𝑅(𝑿)
tion
𝜕𝑿
Update 𝑿𝑙−1 to derive 𝑿𝑙 according to (19)
Output: Reconstructed HR image 𝑿
0.03
IV. EXPERIMENTAL RESULTS
0.029
0.028
0.027
0.026
0
50
100
150
200
250
300
Iteration
Fig. 5. Comparison of convergence process
As we can see form Fig. 5, our technique converges
within around 50 iterations while interpolation-based technique requires more than 150 iterations to converge,
demonstrating superior convergence of our end-to-end upscaling technique.
B. MISR framework
In this section, we integrate the proposed end-to-end
In this section, extensive experimental results are presented to demonstrate the effectiveness and efficiency of
the proposed end-to-end upscaling technique. We first perform experiments to demonstrate the effectiveness of our
upscaling technique through equipping it to various reconstruction-based MISR methods, and then the proposed
MISR framework is compared with other state-of-the-art
algorithms.
As described in the degradation model, the degraded LR
images are generated from an HR image through parallel
translations, blurring, downsampling and addition of noises.
In the experiments, the translational displacements 𝒅 are
randomly set with vertical and horizontal shifts randomly
sampled from a uniform distribution in [-5, 5]. The blurring
(a) Tikhonov
(b) TV
(c) BTV
(a) Tikhonov_ETE
(b) TV_ETE
(c) BTV_ETE
(d) LABTV
(d) LABTV_ETE
Fig. 7. Comparison of methods utilizing end-to-end technique with baselines on image Baby.
(a) Tikhonov
(b) TV
(c) BTV
(a) Tikhonov_ETE
(b) TV_ETE
(c) BTV_ETE
(d) LABTV
(d) LABTV_ETE
Fig. 8. Comparison of methods utilizing end-to-end technique with baselines on image Butterfly.
operator is realized utilizing a 5 × 5 Gaussian kernel with
standard deviation 𝜎 = 1 2. After geometric wrapping and
blurring operation, the images are then downsampled by a
factor 𝛾 = 3. Finally Gaussian noise with standard deviation 𝜎𝑛𝑜𝑖𝑠𝑒 = 1 is added.
In our scenario, we use 5 LR images to reconstruct an
HR image for MISR approaches, select the first one as target image without loss of generality and suppose the blurring kernel is already given. As human vision is more sensitive to brightness changes, all the SR methods are imple𝑁𝑅 = 1 𝑙𝑜
{
1
𝐼𝑀 =
.
2
𝑀
2
/,𝑀 𝐸 =
mented only in brightness channel (Y) with color channels
(UV) upscaled by bicubic interpolation for color images.
All the experiments are coded in Matlab R2011 and running on a workstation with Septuple Core i7 @ 3.60 GHz
CPUs and 16 GB memory.
For quantitative analysis and comparison of reconstruction performance, peak-signal-to-noise ratio (PSNR) and
mean structure similarity (SSIM) are utilized as metrics,
which are defined as
1
𝑀𝑁
𝑁
2
∑𝑀
𝑖 1 ∑𝑗 1(𝒀(𝑖, 𝑗) − 𝑿(𝑖, 𝑗))
,
(20)
𝑐 = (𝑘1 𝐿)2
,{ 1
𝑐2 = (𝑘2 𝐿)2
senting the dynamics of a pixel value, and 𝑘1 , 𝑘2 are generally set to be 0.01 and 0.03 respectively.
(2𝜇𝑥 𝜇𝑦+𝑐1 )(2𝜎𝑥 𝜎𝑦 +𝑐2 )
(𝜇𝑥 2 +𝜇𝑦2 +𝑐1 )(𝜎𝑥 2 +𝜎𝑦 2 +𝑐2 )
where 𝜇𝑥 , 𝜇𝑦 are mean value of image 𝑿 and 𝒀 respectively, 𝜎𝑥 , 𝜎𝑦 are standard variance of 𝑿 and 𝒀 respectively, 𝑐1 , 𝑐2 are two stabilizing constants with 𝐿 repre-
A. Evaluation of the proposed upscaling technique
(a) Original
(e) BTV
To validate the effectiveness and efficiency of the pro
(b) Bicubic
(c) Kim
(d) Yang
(f) LABTV
(g) MIScSR
(j) Proposed
Fig. 9. Reconstruction results for image Bridge by ranged methods.
posed end-to-end upscaling technique, we first select four
representative reconstruction-based MISR method consisting of Tikhonov, TV [19], BTV [22] and LABTV [24]
method as baseline methods, apply our technique to replace
interpolation-based technique in the SR pipelines (note as
Tikhonov_ETE for example) and conduct experiments on
Set5 dataset to compare the performance correspondingly.
Visual comparison is exhibited in Fig. 7 and 8 with quantitative results are presented in Table. I.
As we can see from Fig. 7 and 8, compared with corresponding baseline methods, methods equipped with our
end-to-end technique generate sharper edges and fine details, effectively alleviate the blurring effects with fewer
artifacts and realize superior visual quality, which demonstrates the effectiveness of our end-to-end technique.
From the quantitative results shown in Table. I we can
further see that the proposed technique remarkably improves the reconstruction performance with respect to
PSNR and SSIM in all the images of Set5, whilst accelerating the MISR process. The PSNR values have been improved by around 0.9 (dB) in average while SSIM values
also increased by around 0.015. Concerning computational
complexity, the running time of equipped methods is
shortened by around 0.3s in average with practicability
greatly enhanced.
TABLE I
COMPARISON OF PSNR, SSIM AND RUNNDING TIME. THE MEAN PERFROMANCE OF 50 EXPERIMENTS IS PRESENTED WITH THE PERFORMANCE IMPROVEMENT EQUIPPED WITH THE PROPOSED TECHNIQUE SHOWN IN BRACKETS (RED AND BOLD).
Set5
Metric Tikhonov Tikhonov_ETE
TV
TV_ETE
BTV
BTV_ETE
LABTV LABTV_ETE
PSNR
32.75
33.60(↑0.85)
32.76
33.61(↑0.85)
33.18
33.91(↑0.73)
33.38
33.99(↑0.61)
baby
SSIM
0.887
0.903(↑0.016)
0.886 0.903(↑0.017) 0.898 0.903(↑0.005)
0.901
0.904(↑0.003)
Time
1.67
1.19(↓0.48)
2.03
1.50(↓0.53)
2.87
2.34(↓0.53)
25.92
25.39(↓0.53)
PSNR
30.64
31.59(↑0.95)
30.66
31.61(↑0.95)
30.80
31.99(↑1.19)
31.00
31.99(↑0.99)
bird
SSIM
0.898
0.909(↑0.011)
0.898 0.909(↑0.011) 0.903 0.911(↑0.002)
0.904
0.906(↑0.002)
Time
0.75
0.47(↓0.28)
0.80
0.58(↓0.22)
1.06
0.82(↓0.24)
8.70
8.47(↓0.23)
PSNR
23.15
24.12(↑0.97)
23.19
24.13(↑0.94)
22.78
24.08(↑1.30)
23.01
24.23(↑1.22)
butterfly
SSIM
0.799
0.827(↑0.028)
0.801 0.827(↑0.026) 0.801 0.825(↑0.024)
0.806
0.832(↑0.026)
Time
0.61
0.39(↓0.22)
0.69
0.48(↓0.21)
0.90
0.70(↓0.20)
7.18
6.83(↓0.35)
PSNR
30.18
30.52(↑0.34)
30.18
30.53(↑0.35)
30.39
30.60(↑0.21)
30.46
30.64(↑0.18)
head
SSIM
0.726
0.743(↑0.017)
0.726 0.744(↑0.018) 0.741 0.748(↑0.007)
0.746
0.752(↑0.006)
Time
0.68
0.45(↓0.23)
0.78
0.54(↓0.24)
1.00
0.77(↓0.23)
8.50
8.32(↓0.18)
PSNR
27.71
28.90(↑1.19)
27.73
28.93(↑1.20)
27.43
28.97(↑1.54)
27.70
29.10(↑1.40)
woman
SSIM
0.882
0.901(↑0.019)
0.882 0.902(↑0.020) 0.885 0.904(↑0.019)
0.890
0.904(↑0.014)
Time
0.71
0.47(↓0.24)
0.79
0.55(↓0.24)
1.04
0.80(↓0.24)
8.53
7.98(↓0.55)
PSNR
28.89
29.75(↑0.86)
28.90
29.76(↑0.86)
28.92
29.91(↑0.99)
29.11
29.99(↑0.88)
average
SSIM
0.838
0.856(↑0.018)
0.838 0.857(↑0.019) 0.846 0.857(↑0.011)
0.849
0.859(↑0.010)
Time
0.88
0.59(↓0.29)
1.02
0.73(↓0.29)
1.37
1.09(↓0.28)
11.77
11.40(↓0.37)
B. Comparison with state-of-the-art methods
To further demonstrate the effectiveness and efficiency
of the proposed MISR framework, seven methods are selected to compare with our work. As bicubic interpolation
serves as the simplest SR approach, it is selected as a baseline method. Serving as most cited method in the field of
MISR for the performance and simplicity, Farsiu’s BTV
method [25] is selected besides with its variation Li’s
LABTV method [31]. As the popularity of learning-based
approaches increases, we also select Kato’s sparse coding
method for MISR (denote as MIScSR) [32] as one
state-of-the-art method in this field. In addition, Kim’s [34]
and Yang’s [33] methods considered as state-of-the-art
SISR methods are also introduced in the comparison.
For fair comparisons, the source codes of Kim’s and
Yang’s methods released in the authors’ homepages are
(a) Original
(e) BTV
directly implemented in our experiments. As no available
(b) Bicubic
(c) Kim
(d) Yang
(f) LABTV
(g) MIScSR
(j) Proposed
Fig. 10. Reconstruction results for image Commic by ranged methods.
(a) Original
(e) BTV
(b) Bicubic
(c) Kim
(f) LABTV
(g) MIScSR
(d) Yang
(j) Proposed
Fig. 11. Reconstruction results for image Foreman by ranged methods.
codes for other methods, we implement them according to
the instructions in [25][31][32], and the performance may
differ from the original. Note that Kato’s MIScSR method
is only utilized for comparison with upscaling factor 3 for
instructions in [32] only presented implementation details
and parameter settings under this condition. Extensive experiments are conducted on Set14 dataset, and the reconstruction results are exhibited in Figs. 9-13 with quantitative results presented in Table. III.
In our scenario, for bicubic method and SISR methods,
only the target LR image (first LR image) is utilized for
reconstruction, and for MISR methods, same registration
procedure is adopted. Note that the blurring kernel is sup-
posed to be given for all SR approaches for its derivation is
not the focus of this paper. Other detailed parameter settings for our MISR framework are summarized in Table.
II.
TABLE II
PARAMETER SETTINGS FOR THE PROPOSED UPSCALING
TECHNIQUE
Parameters
Values
𝜖: tolerance threshold
1 −
30
𝑁𝑀𝑎𝑥 : maximum iteration
0.1
𝜆: regularization parameter in (17)
0.1
𝜂: step size in (17)
From the perspective of visual quality, for SISR methods,
Kim’s method serving as the superior approach, has already
recovered the major structures of the scene, however it
(a) Original
(e) BTV
tends to oversmooth fine details. For MISR methods,
(b) Bicubic
(c) Kim
(d) Yang
(f) LABTV
(g) MIScSR
(j) Proposed
Fig. 12. Reconstruction results for image Girl by ranged methods.
blurring artifacts in BTV and LABTV methods are commonly noticeable, especially within edge and texture regions. Although the sparse representation alleviates the
blurring effect for MIScSR, some ragged edges are still
visible. By comparison, the proposed MISR approach produces sharper and clearer images with fine details and fewer artifacts.
From the quantitative results exhibited in Table. III we
can further see that our approach outperforms other
state-of-the-art methods in all the images of Set14 with
respect to reconstruction performance and efficiency.
Compared with Kim’s method, serving as the superior
SISR method, the PSNR value of our approach is improved
by 0.62 (dB) in average with processing efficiency 10 times
faster. Compared with MIScSR method, known as the
state-of-the-art MISR method, our approach improves the
PSNR value by 0.49 (dB) and runs nearly 8 times faster.
Comparing our approach with BTV method, the superiority
of the proposed end-to-end upscaling technique can be further extensively validated by the higher PSNR values with
shorter running time. Leave out the bicubic method, we can
see our approach performs as the most effective and efficient one among comparing methods with practical applications.
TABLE III
COMPARISON OF PSNR AND RUNNING TIME FOR RANGE METHODS. FOR MIMR METHODS, THE MEAN PERFROMANCE OF 50 EXPERIMENTS IS PRESENTED WITH STANDARD DERIVATION SHOWN IN BRACKETS. THE BEST RESULTS ARE SHOWN IN RED BOLD.
Set14
baboon
barbara
bridge
coastguard
comic
face
flowers
foreman
lenna
man
monarch
pepper
ppt
zebra
average
Bicubic
PSNR
Time
20.81
0.04
24.13
0.04
23.74
0.03
24.68
0.01
20.85
0.01
29.44
0.01
24.40
0.02
28.38
0.01
28.93
0.02
24.93
0.02
26.81
0.03
29.18
0.02
21.31
0.02
23.77
0.02
25.10
0.02
Kim
PSNR
Time
21.19
40.16
24.76
47.94
24.55
57.20
25.43
18.95
21.93
22.68
30.11
10.25
25.55
32.32
30.59
12.90
30.30
18.49
26.13
30.87
29.02
39.32
30.30
19.08
22.91
45.44
26.05
45.29
26.34
31.49
PSNR
21.16
24.75
24.53
25.44
21.77
29.99
25.41
30.06
29.99
25.92
28.39
30.10
22.52
25.58
26.11
Yang
Time
673.24
1103.15
980.27
319.60
288.58
275.17
424.51
253.73
412.01
414.53
624.27
569.97
579.91
506.18
530.37
BTV
PSNR
21.24(±0.01)
24.82(±0.02)
24.75(±0.02)
25.54(±0.02)
21.69(±0.01)
30.38(±0.03)
25.42(±0.01)
29.97(±0.03)
30.18(±0.03)
26.00(±0.02)
28.13(±0.02)
30.19(±0.03)
22.10(±0.01)
25.41(±0.02)
26.13(±0.02)
To further demonstrate the effectiveness of the proposed
MISR approach, experiments are conducted on Set5 dataset
concerning ranged upscaling factors and noise intensities
with results presented in Table. IV and Table. V.
As shown in Table. IV, with upscaling factor increased,
the effects of multiple observations are gradually erased
due to the growing ill-posedness, leading to the performances of MISR approaches deteriorating severely and
even inferior to SISR approaches in several conditions.
Although our approach also undergoes same deterioration,
Time
3.76
6.59
5.47
2.23
1.94
1.84
3.10
1.63
3.15
2.90
4.74
3.39
4.90
2.61
3.45
LABTV
PSNR
21.33(±0.02)
24.95(±0.02)
24.92(±0.04)
25.73(±0.04)
21.86(±0.02)
30.47(±0.04)
25.59(±0.02)
30.21(±0.05)
30.35(±0.04)
26.17(±0.03)
28.34(±0.03)
30.28(±0.04)
22.24(±0.02)
25.70(±0.04)
26.30(±0.03)
Time
33.77
61.41
57.74
22.66
19.50
17.23
30.09
15.69
30.35
27.00
41.31
27.05
36.04
23.98
31.70
MIScSR
PSNR
21.33(±0.00)
25.13(±0.00)
24.87(±0.00)
25.60(±0.00)
22.14(±0.00)
30.22(±0.00)
25.73(±0.00)
30.43(±0.00)
30.32(±0.00)
26.25(±0.00)
28.80(±0.00)
30.10(±0.00)
23.07(±0.00)
26.59(±0.00)
26.47(±0.00)
Time
27.95
48.36
41.48
15.69
14.31
12.13
24.05
11.89
21.99
18.70
28.23
18.74
24.78
16.43
23.20
Proposed
PSNR
21.64(±0.03)
25.37(±0.04)
25.61(±0.06)
26.40(±0.06)
22.59(±0.04)
30.64(±0.06)
26.28(±0.05)
31.04(±0.08)
30.86(±0.07)
26.88(±0.05)
29.30(±0.08)
30.54(±0.05)
23.11(±0.07)
27.21(±0.08)
26.96(±0.06)
Time
3.01
5.46
4.53
1.58
1.54
1.36
2.49
1.25
2.55
2.37
4.61
3.02
4.24
2.73
2.91
it still performs superiorly with highest PSNR values in
most conditions.
From Table. V we can further see that our approach performs strong robustness and tolerance to noises. As all the
SR methods are sensitive to noises and deteriorate with
noise intensity increased, the proposed approach still outperforms in average. Even under the condition of noise
intensity 3, the proposed approach performs +0.46 dB and
+0.42 dB compared with Kim’s method and LABTV
method respectively.
(a) Original
(e) BTV
(b) Bicubic
(c) Kim
(d) Yang
(f) LABTV
(g) MIScSR
(j) Proposed
Fig. 13. Reconstruction results for image Lenna by ranged methods.
TABLE IV
MAGNIFICATION × 2, × 3 AND × 4 PERFORMANCE IN TERMS OF PSNR ON SET5 DATASET. FOR MIMR METHODS, THE MEAN PERFROMANCE OF 20 EXPERIMENTS IS PRESENTED WITH STANDARD DERIVATION SHOWN IN BRACKETS. THE BEST RESULTS ARE
SHOWN IN RED BOLD.
Set5
baby
bird
butterfly
head
woman
average
baby
bird
butterfly
head
woman
average
baby
bird
butterfly
head
woman
average
Upscaling
factor
2
3
4
Bicubic
Kim
Yang
BTV
LABTV
MIScSR
Proposed
32.53
30.71
22.98
30.25
27.43
28.78
31.07
28.94
21.53
29.44
25.85
27.38
29.63
27.31
20.21
28.75
24.48
26.08
33.52
32.00
24.61
30.69
28.81
29.93
32.39
30.58
24.12
30.11
27.87
29.02
30.08
28.76
22.54
29.39
26.37
27.43
33.30
31.68
24.20
30.64
28.51
29.67
32.23
30.22
23.31
29.99
27.47
28.65
30.77
28.49
21.78
29.21
25.86
27.22
34.74(±0.03)
32.89(±0.02)
24.41(±0.01)
31.20(±0.02)
29.26(±0.02)
30.50(±0.02)
33.13(±0.05)
30.81(±0.03)
22.77(±0.01)
30.38(±0.03)
27.42(±0.03)
28.91(±0.03)
31.50(±0.09)
28.88(±0.08)
21.30(±0.03)
29.61(±0.06)
25.81(±0.04)
27.42(±0.06)
35.08(±0.05)
33.26(±0.03)
24.93(±0.02)
31.37(±0.03)
29.79(±0.04)
30.89(±0.03)
33.31(±0.07)
31.00(±0.05)
23.00(±0.02)
30.47(±0.04)
27.67(±0.05)
29.10(±0.05)
31.60(±0.11)
28.97(±0.10)
21.41(±0.04)
29.65(±0.07)
25.94(±0.05)
27.51(±0.07)
N.A.
N.A.
N.A.
N.A.
N.A.
N.A.
32.86(±0.00)
30.92(±0.00)
23.57(±0.00)
30.22(±0.00)
28.22(±0.00)
29.17(±0.00)
N.A.
N.A.
N.A.
N.A.
N.A.
N.A.
35.37(±0.05)
34.20(±0.06)
26.77(±0.04)
31.39(±0.03)
31.51(±0.07)
31.85(±0.05)
33.83(±0.08)
31.87(±0.07)
24.13(±0.07)
30.64(±0.06)
28.87(±0.13)
29.87(±0.08)
31.85(±0.12)
29.45(±0.15)
22.04(±0.11)
29.66(±0.09)
26.66(±0.11)
27.93(±0.12)
TABLE V
NOISE INTENSITY 1, 2 AND 3 PERFORMANCE IN TERMS OF PSNR ON SET5 DATASET. FOR MIMR METHODS, THE MEAN PERFROMANCE OF 50 EXPERIMENTS IS PRESENTED WITH STANDARD DERIVATION SHOWN IN BRACKETS. THE BEST RESULTS ARE SHOWN
IN RED BOLD.
Set5
baby
bird
butterfly
head
woman
average
baby
bird
butterfly
head
woman
average
baby
bird
butterfly
head
woman
average
Noise
intensity
1
2
3
Bicubic
Kim
Yang
BTV
LABTV
MIScSR
Proposed
31.07
28.94
21.53
29.49
25.85
27.38
30.89
28.84
21.50
29.37
25.80
27.28
30.63
28.69
21.47
29.18
25.71
27.14
32.39
30.58
24.12
30.15
27.87
29.02
32.09
30.37
24.07
29.99
27.74
28.85
31.61
30.04
23.96
29.64
27.52
28.55
32.23
30.22
23.31
30.04
27.47
28.65
31.87
30.00
23.27
29.80
27.33
28.45
31.38
29.68
23.18
29.49
27.12
28.17
33.13(±0.05)
30.81(±0.03)
22.77(±0.01)
30.41(±0.03)
27.42(±0.03)
28.91(±0.03)
32.74(±0.04)
30.56(±0.03)
22.72(±0.02)
30.17(±0.03)
27.29(±0.03)
28.70(±0.03)
32.24(±0.04)
30.25(±0.03)
22.66(±0.02)
29.90(±0.02)
27.14(±0.02)
28.44(±0.03)
33.31(±0.07)
31.00(±0.05)
23.00(±0.02)
30.51(±0.04)
27.67(±0.05)
29.10(±0.05)
32.89(±0.05)
30.73(±0.05)
22.94(±0.03)
30.25(±0.04)
27.53(±0.04)
28.87(±0.04)
32.33(±0.06)
30.41(±0.04)
22.87(±0.03)
29.96(±0.03)
27.36(±0.03)
28.59(±0.04)
32.86(±0.00)
30.92(±0.00)
23.57(±0.00)
30.27(±0.00)
28.22(±0.00)
29.17(±0.00)
32.17(±0.01)
30.48(±0.01)
23.48(±0.00)
29.85(±0.01)
27.97(±0.01)
28.79(±0.01)
31.24(±0.01)
29.84(±0.02)
23.34(±0.01)
29.27(±0.02)
27.58(±0.01)
28.25(±0.01)
33.83(±0.08)
31.87(±0.07)
24.13(±0.07)
30.66(±0.05)
28.87(±0.13)
29.87(±0.08)
33.07(±0.06)
31.33(±0.08)
23.93(±0.09)
30.27(±0.04)
28.56(±0.09)
29.43(±0.07)
32.36(±0.04)
30.82(±0.06)
23.78(±0.09)
29.89(±0.03)
28.24(±0.07)
29.01(±0.06)
V. CONCLUSIONS
In this paper, we propose an end-to-end fast upscaling
technique to replace the interpolation operator for recon-
struction-based MISR approaches. As we unfold the degradation model from the perspective of image, we find the
influence ranges and underlying contributions of periodic
sub-locations vary periodically, which inspires us to design
upscaling filters for periodic sub-locations respectively and
utilize a shuffling operator to realize effective fusion operation. Equipped with our upscaling technique, remarkable
improvements are realized with respect to reconstruction
performance and efficiency for reconstruction-based methods, besides the cooperation of our technique and BTV
regularization outperforms other state-of-the-art methods
demonstrated by extensive experiments.
REFERENCES
[1] V. Chandran, C. Fookes, F. Lin, S. Sridharan, “Investigation into optical flow super-resolution for surveillance applications,” Aprs Workshop on Digital Image Computing, vol. 26, no. 47, pp. 73–78, 2005.
[2] L. Zhang, H. Zhang, H. Shen, and P. Li, “A super-resolution reconstruction algorithm for surveillance images,” Signal Processing, vol.
90, no. 3, pp. 848–859, 2010.
[3] H. Greenspan, G. Oz, N. Kiryati, S. Peled, “Super-resolution in MRI,”
in Proc. IEEE ISBI, 2002, pp. 943-946.
[4] W. Shi, J. Caballero, C. Ledig, X. Zhuang, W. Bai, K. Bhatia, A. Marvao, T. Dawes, D. ORegan, and D. Rueckert, “Cardiac image super-resolution with global correspondence using multi-atlas patchmatch,” in Proc. Int. Conf. Medical Image Computing and Computer
Assisted Intervention (MICCAI), Jan. 2013, pp. 9–16.
[5] D. Trinh, M. Luong, F. Dibos, J. Rocchisani, C. Pham, and T. Q. Nguyen, “Novel Example-Based Method for Super-Resolution and Denoising of Medical Images,” IEEE Trans. Image Process., vol. 23, no.
4, pp. 1882-1895, Apr. 2014.
[6] A.J. Tatem, H.G. Lewis, P.M. Atkinson, M.S. Nixon, “Super-resolution target identification from remotely sensed images using
a hopfield neural network,” IEEE Trans. Geosci. Rem. Sens., vol. 39,
no. 4, pp. 781-796, Apr. 2001.
[7] M. W. Thornton, P. M. Atkinson, and D. a. Holland, “Sub-pixel mapping of rural land cover objects from fine spatial resolution satellite
sensor imagery using super-resolution pixel-swapping,” International
Journal of Remote Sensing, vol. 27, no. 3, pp. 473–491, Jan. 2006.
[8] K. Makantasis, K. Karantzalos, A. Doulamis, N. Doulamis, “Deep
supervised learning for hyperspectral data classification through convolutional neural networks,” in Proc. IEEE IGARSS, Jul. 2015, pp.
4959–4962.
[9] A.J. Tatem, H.G. Lewis, P.M. Atkinson, M.S. Nixon, “Super-resolution
land cover pattern prediction using a Hopfield neural network,” Remote Sens. Environ., vol. 79, no. 1, pp. 1–14, 2002.
[10] T. Goto, T. Fukuoka, F. Nagashima, S. Hirano and M. Sakurai, “Super-resolution System for 4K-HDTV, ” in Proc. Int Conf. Pattern
Recognition, Jan. 2014, pp. 4453–4458.
[11] K. Zhang, X. Gao, D. Tao and X. Li, “Multi-scale dictionary for
single image super-resolution,” in Proc. CVPR, Providence, RI, Jun.
2012, pp. 1114-1121.
[12] C. Yang, and M. H. Yang. “Fast direct super-resolution by simple
functions,” in Proc. ICCV, 2013, pp. 561-568.
[13] R. Timofte, V. De, and L. V. Gool. “Anchored neighborhood regression for fast example-based super-resolution,” in Proc. ICCV, 2014,
pp. 1920-1927.
[14] C. Dong, C. C. Loy, K. He and X. Tang, “Learning a deep convolutional network for image super-resolution,” In Proc. ECCV, 2014, pp.
184-199.
[15] S. Yang, Z. Wang, L. Zhang, and M. Wang, “Dual-geometric neighbor
embedding for image super resolution with sparse tensor,” IEEE
Trans. Image Process., vol. 23, no. 7, pp. 2793-2803, Jul. 2014.
[16] S. Gu, et al. “Convolutional sparse coding for image super-resolution,” in Proc. ICCV, 2016, pp. 1823-1831.
[17] N. Nguyen, P. Milanfar, G. Golub, “A computationally efficient superresolution image reconstruction algorithm,” IEEE Trans. Image
Process., vol. 10, no. 4, pp. 573–583, 2001.
[18] X. Zhang, E.Y. Lam, E.X. Wu, K.K. Wong, “Application of Tikhonov
regularization to super-resolution reconstruction of brain MRI image,”
Lecture Notes in Computer Science, vol. 4987, pp. 51–56, 2008.
[19] M. K. Ng, H. Shen, E. Y. Lam, L. Zhang, “A total variation regularization based super-resolution reconstruction algorithm for digital
video,” EURASIP J. Adv. Signal Process, vol. 2007, no. 74585, pp.
1-16, 2007.
[20] S. D. Babacan, R. Molina, A.K. Katsaggelos, “Parameter estimation
in TV image restoration using variational distribution approximation,”
IEEE Trans. Image Process., vol. 17, no. 3, pp. 326–339, Apr. 2008.
[21] Q. Yuan, L. Zhang, H. Shen, “Multiframe super-resolution employing
a spatially weighted total variation model,” IEEE Trans.Circuits Syst.
Video Technol., vol. 22, no. 3, pp. 379-392Mar. 2012.
[22] H. Shen, L. Zhang, B. Huang, P. Li, “A MAP approach for joint motion estimation segmentation and super resolution,” IEEE Trans. Image Process., vol. 16, no. 2, pp. 479–490, Jan. 2007.
[23] R. Molina, J. Mateos, A. K. Katsaggelos, and M. Vega, “Bayesian
multichannel image restoration using compound Gauss-Markov random fields,” IEEE Trans. Image Process., vol. 12, no. 12, pp. 1642–
1654, Feb. 2003.
[24] F. Humblot, A. Mohammad-Djafari, “Superresolution using hidden
Markov Model and Bayesian detection estimation framework,”
EURASIP J. Appl. Signal Process., vol. 2006, Article ID. 36971, pp.
1–16, Jan. 2006.
[25] S. Farsiu, M.D. Robinson, M. Elad, P. Milanfar, “Fast and robust
multi-frame superresolution,” IEEE Trans. Image Process., vol. 13, no.
10, pp. 1327–1344, Oct. 2004.
[26] P. Purkait and B. Chanda, “Super resolution image reconstruction
through bregman iteration using morphologic regularization,” IEEE
Trans. Image Process., vol. 21, no. 9, pp. 4029-4039, Sep. 2012.
[27] W. Shi, J. Caballero, F. Huszar, et al, “Real-time single image and
video super-resolution using an efficient sub-pixel convolutional neural network,” in Proc. IEEE CVPR, Sep. 2016, pp. 1874-1883.
[28] M. Protter, M. Elad, H. Takeda, and P. Milanfar, “Generalizing the
non-local-means to super-resolution reconstruction,” IEEE Trans.
Image Process., vol. 18, no. 1, pp. 36-51, Mar. 2008.
[29] H. Takeda, P. Milanfar, M. Protter, and M. Elad, “SuperResolution
without Explicit Subpixel Motion Estimation,” IEEE Trans. Image
Process., vol. 18, no. 9, pp. 1958-1975, Sep. 2009
[30] C. Liu, D. Sun, “On Bayesian adaptive video super resolution,” IEEE
Trans. Image Process., vol. 36, no. 2, pp. 346-360, Feb. 2014.
[31] X. Li, Y. Hu, X. Gao, D.Tao, B. Ning, “A multi-frame image super-resolution method,” Signal Processing, vol. 90, no. 2, pp.405-414,
2010.
[32] T. Kato, H. Hino, N. Murata, “Multi-frame image super resolution
based on sparse coding,” Neural Networks, vol. 66, pp. 64-78, 2015.
[33] J. Yang, J. Wright, T. Huang. “Image super-resolution as sparse representation of raw image patches,” IEEE Trans. Image Process., vol.
19, no. 11, pp. 2861,2010.
[34] K. I. Kim and Y. Kwon. “Single-image super-resolution using sparse
regression and natural image prior,” IEEE Trans. Pattern Anal. Mach.
Intell., vol. 32, no. 6, pp. 1127-1133, 2010.
| 1cs.CV
|
arXiv:1601.06367v1 [math.AC] 24 Jan 2016
THE ANNIHILATING-SUBMODULE GRAPH OF MODULES
OVER COMMUTATIVE RINGS II
HABIBOLLAH ANSARI-TOROGHY AND SHOKOUFEH HABIBI
Abstract. Let M be a module over a commutative ring R. In this paper,
we continue our study of annihilating-submodule graph AG(M ) which was
introduced in (The Zariski topology-graph of modules over commutative rings,
Comm. Algebra., 42 (2014), 3283–3296). AG(M ) is a (undirected) graph in
which a nonzero submodule N of M is a vertex if and only if there exists
a nonzero proper submodule K of M such that N K = (0), where N K, the
product of N and K, is defined by (N : M )(K : M )M and two distinct vertices
N and K are adjacent if and only if N K = (0). We prove that if AG(M ) is a
tree, then either AG(M ) is a star graph or a path of order 4 and in the latter
case M ∼
= F × S, where F is a simple module and S is a module with a unique
non-trivial submodule. Moreover, we prove that if M is a cyclic module with
at least three minimal prime submodules, then gr(AG(M )) = 3 and for every
cyclic module M , cl(AG(M )) ≥ |M in(M )|.
1. Introduction
Throughout this paper R is a commutative ring with a non-zero identity and M
is a unital R-module. By N ≤ M (resp. N < M ) we mean that N is a submodule
(resp. proper submodule) of M .
Define (N :R M ) or simply (N : M ) = {r ∈ R| rM ⊆ N } for any N ≤ M .
We denote ((0) : M ) by AnnR (M ) or simply Ann(M ). M is said to be faithful if
Ann(M ) = (0).
Let N, K ≤ M . Then the product of N and K, denoted by N K, is defined by
(N : M )(K : M )M (see [6]).
There are many papers on assigning graphs to rings or modules (see, for example,
[4, 7, 10, 11]). The annihilating-ideal graph AG(R) was introduced and studied in
[11]. AG(R) is a graph whose vertices are ideals of R with nonzero annihilators
and in which two vertices I and J are adjacent if and only if IJ = (0). Later, it
was modified and further studied by many authors (see, e.g., [1-3]).
In [7, 8], we generalized the above idea to submodules of M and defined the
(undirected) graph AG(M ), called the annihilating-submodule graph, with vertices
V (AG(M ))= {N ≤ M | there exists (0) 6= K < M with N K = (0)}. In this graph,
distinct vertices N, L ∈ V (AG(M )) are adjacent if and only if N L = (0). Let
AG(M )∗ be the subgraph of AG(M ) with vertices V (AG(M )∗ ) = {N < M with
(N : M ) 6= Ann(M )| there exists a submodule K < M with (K : M ) 6= Ann(M )
and N K = (0)}. Note that M is a vertex of AG(M ) if and only if there exists a
Date: April 8, 2018.
2010 Mathematics Subject Classification. primary 05C75, secondary 13C13.
Key words and phrases. annihilating-submodule graph, cyclic module, minimal prime submodule, chromatic and clique number.
1
2
HABIBOLLAH ANSARI-TOROGHY AND SHOKOUFEH HABIBI
nonzero proper submodule N of M with (N : M ) = Ann(M ) if and only if every
nonzero submodule of M is a vertex of AG(M ).
In this work, we continue our studying in [7, 8] and we generalize some results related to annihilating-ideal graph obtained in [1-3] for annihilating-submodule graph.
A prime submodule of M is a submodule P 6= M such that whenever re ∈ P for
some r ∈ R and e ∈ M , we have r ∈ (P : M ) or e ∈ P [13].
The prime radical radM (N ) or simply rad(N ) is defined to be the intersection
of all prime submodules of M containing N , and in case N is not contained in any
prime submodule, radM (N ) is defined to be M [13].
The notations Z(R), N il(R), and M in(M ) will denote the set of all zero-divisors,
the set of all nilpotent elements of R, and the set of all minimal prime submodules
of M , respectively. Also, ZR (M ) or simply Z(M ), the set of zero divisors on M , is
the set {r ∈ R| rm = 0 for some 0 6= m ∈ M }.
A clique of a graph is a complete subgraph and the supremum of the sizes of
cliques in G, denoted by cl(G), is called the clique number of G. Let χ(G) denote the
chromatic number of the graph G, that is, the minimal number of colors needed
to color the vertices of G so that no two adjacent vertices have the same color.
Obviously χ(G) ≥ cl(G).
In section 2 of this paper, we prove that if AG(M ) is a tree, then either AG(M )
is a star graph or is the path P4 and in this case M ∼
= F × S, where F is a simple
module and S is a module with a unique non-trivial submodule (see Theorem
2.7). Next, we study the bipartite annihilating-submodule graphs of modules over
Artinian rings (see Theorem 2.8). Moreover, we give some relations between the
existence of cycles in the annihilating-submodule graph of a cyclic module and the
number of its minimal prime submodules (see Theorem 2.18 and Corollary 2.19)).
Let us introduce some graphical notions and denotations that are used in what
follows: A graph G is an ordered triple (V (G), E(G), ψG ) consisting of a nonempty
set of vertices, V (G), a set E(G) of edges, and an incident function ψG that associates an unordered pair of distinct vertices with each edge. The edge e joins x
and y if ψG (e) = {x, y}, and we say x and y are adjacent. A path in graph G is a
finite sequence of vertices {x0 , x1 , . . . , xn }, where xi−1 and xi are adjacent for each
1 ≤ i ≤ n and we denote xi−1 − xi for existing an edge between xi−1 and xi .
A graph H is a subgraph of G, if V (H) ⊆ V (G), E(H) ⊆ E(G), and ψH is
the restriction of ψG to E(H). A bipartite graph is a graph whose vertices can be
divided into two disjoint sets U and V such that every edge connects a vertex in
U to one in V ; that is, U and V are each independent sets and complete bipartite
graph on n and m vertices, denoted by Kn,m , where V and U are of size n and
m, respectively, and E(G) connects every vertex in V with all vertices in U . Note
that a graph K1,m is called a star graph and the vertex in the singleton partition
is called the center of the graph. For some U ⊆ V (G), we denote by N (U ), the
set of all vertices of G \ U adjacent to at least one vertex of U . For every vertex
v ∈ V (G), the size of N (v) is denoted by d(v). If all the vertices of G have the
same degree k, then G is called k-regular, or simply regular. An independent set is
a subset of the vertices of a graph such that no vertices are adjacent. We denote
by Pn and Cn , a path and a cycle of order n, respectively. Let G and G′ be two
graphs. A graph homomorphism from G to G′ is a mapping φ : V (G) −→ V (G′ )
such that for every edge {u, v} of G, {φ(u), φ(v)} is an edge of G′ . A retract of G
is a subgraph H of G such that there exists a homomorphism φ : G −→ H such
THE ANNIHILATING-SUBMODULE GRAPH OF MODULES
3
that φ(x) = x, for every vertex x of H. The homomorphism φ is called the retract
(graph) homomorphism (see [19]).
2. The Annihilating-submodule graph II
An ideal I ≤ R is said to be nil if I consist of nilpotent elements; I is said to be
nilpotent if I n = (0) for some natural number n.
Proposition 2.1. Suppose that e is an idempotent element of R. We have the
following statements.
(a) R = R1 ⊕ R2 , where R1 = eR and R2 = (1 − e)R.
(b) M = M1 ⊕ M2 , where M1 = eM and M2 = (1 − e)M .
(c) For every submodule N of M , N = N1 × N2 such that N1 is an R1 submodule M1 , N2 is an R2 -submodule M2 , and (N :R M ) = (N1 :R1
M1 ) × (N2 :R2 M2 ).
(d) For submodules N and K of M , N K = N1 K1 × N2 K2 such that N =
N1 × N2 and K = K1 × K2 .
(e) Prime submodules of M are P × M2 and M1 × Q, where P and Q are prime
submodules of M1 and M2 , respectively.
Proof. This is clear.
We need the following lemmas.
Lemma 2.2. (See [5, Proposition 7.6].) Let R1 , R2 , . . . , Rn be non-zero ideals of
R. Then the following statements are equivalent:
(a) R R = R1 ⊕ . . . ⊕ Rn ;
(b) As an abelian group R is the direct sum of R1 , . . . , Rn ;
(c) There exist pairwise orthogonal central idempotents e1 , . . . , en with 1 =
e1 + . . . + en , and Ri = Rei , i = 1, . . . , n.
Lemma 2.3. (See [12, Theorem 21.28].) Let I be a nil ideal in R and u ∈ R be
such that u + I is an idempotent in R/I. Then there exists an idempotent e in uR
such that e − u ∈ I.
Lemma 2.4. (See [8, Lemma 2.4].) Let N be a minimal submodule of M and let
Ann(M ) be a nil ideal. Then we have N 2 = (0) or N = eM for some idempotent
e ∈ R.
Proposition 2.5. Let R/Ann(M ) be an Artinian ring and let M be a finitely
generated module. Then every nonzero proper submodule N of M is a vertex in
AG(M ).
Proof. Let N be a non-zero submodule of M . So there exists a maximal submodule
K of M such that N ⊆ K. Hence we have (0 :M (K : M )) ⊆ (0 :M (N : M )).
Since R/Ann(M ) is an Artinian ring, (K : M ) is a minimal prime ideal containing
Ann(M ). Thus (K : M ) ∈ Ass(M ). It follows that (K : M ) = (0 : m) for some
0 6= m ∈ M . Therefore N (Rm) = (0), as desired.
Lemma 2.6. Let M = M1 ×M2 , where M1 = eM , M2 = (1−e)M , and e (e 6= 0, 1)
is an idempotent element of R. If AG(M ) is a triangle-free graph, then one of the
following statements holds.
(a) Both M1 and M2 are prime R-modules.
4
HABIBOLLAH ANSARI-TOROGHY AND SHOKOUFEH HABIBI
(b) One Mi is a prime module for i = 1, 2 and the other one is a module with
a unique non-trivial submodule.
Moreover, AG(M ) has no cycle if and only if either M = F × S or M = F × D,
where F is a simple module, S is a module with a unique non-trivial submodule,
and D is a prime module.
Proof. If none of M1 and M2 is a prime module, then there exist r ∈ Ri (R1 = Re
and R2 = R(1 − e)), 0 6= mi ∈ Mi with ri mi = 0, and ri ∈
/ AnnRi (Mi ) for
i = 1, 2. So r1 M1 × (0), (0) × r2 M2 , and R1 m1 × R2 m2 form a triangle in AG(M ), a
contradiction. Thus without loss of generality, one can assume that M1 is a prime
module. We prove that AG(M2 ) has at most one vertex. On the contrary suppose
that {N, K} is an edge of AG(M2 ). Therefore, M1 × (0), (0) × N , and (0) × K form
a triangle, a contradiction. If AG(M2 ) has no vertex, then M2 is a prime module
and so part (a) occurs. If AG(M2 ) has exactly one vertex, then by [7, Theorem 3.6]
and Proposition 2.5, we obtain part (b). Now, suppose that AG(M ) has no cycle.
If none of M1 and M2 is a simple module, then choose non-trivial submodules Ni
in Mi for some i = 1, 2. So N1 × (0), (0) × N2, M1 × (0), and (0) × M2 form a cycle,
a contradiction. The converse is trivial.
Theorem 2.7. If AG(M ) is a tree, then either AG(M ) is a star graph or AG(M ) ∼
=
P4 . Moreover, AG(M ) ∼
= P4 if and only if M = F × S, where F is a simple module
and S is a module with a unique non-trivial submodule.
Proof. If M is a vertex of AG(M ), then there exists only one vertex N such that
Ann(M ) = (N : M ) and since AG(M )∗ is an empty subgraph, hence AG(M )
is a star graph. Therefore we may assume that M is not a vertex of AG(M ).
Suppose that AG(M ) is not a star graph. Then AG(M ) has at least four vertices. Obviously, there are two adjacent vertices N and K of AG(M ) such that
|V (N ) \ {K}| ≥ 1 and |V (K) \ {N }| ≥ 1. Let V (N ) \ {K} = {Ni }i∈Λ and
V (K) \ {N } = {Kj }j∈Γ . Since AG(M ) is a tree, we have V (N ) ∩ V (K) = ∅.
By [7, Theorem 3.4], diam(AG(M )) ≤ 3. So every edge of AG(M ) is of the form
{N, K}, {N, Ni } or {K, Kj }, for some i ∈ Λ and j ∈ Γ. Now, consider the following
claims:
Claim 1. Either N 2 = (0) or K 2 = (0). Pick p ∈ Λ and q ∈ Γ. Since AG(M )
is a tree, Np Kq is a vertex of AG(M ). If Np Kq = Nu , for some u ∈ Λ, then
KNu = (0), a contradiction. If Np Kq = Kv , for some v ∈ Γ, then N Kv = (0), a
contradiction. If Np Kq = N or Np Kq = K, then N 2 = (0) or K 2 = (0), respectively and the claim is proved.
Here, without loss of generality, we suppose that N 2 = (0). Clearly, (N : M )M * K
and (K : M )M * N .
Claim 2. Our claim is to show that N is a minimal submodule of M and K 2 6= (0).
To see that, first we show that for every 0 6= m ∈ N , Rm = N . Assume that
0 6= m ∈ N and Rm 6= N . If Rm = K, then K ⊆ N , a contradiction. Thus
Rm 6= K, and the induced subgraph of AG(M ) on N , K, and Rm is K3 , a
contradiction. So Rm = N . This implies that N is a minimal submodule of
M . Now if K 2 = (0), then we obtain the induced subgraph on N , K, and
(N : M )M + (K : M )M is K3 , a contradiction. Thus K 2 6= (0), as desired.
THE ANNIHILATING-SUBMODULE GRAPH OF MODULES
5
Claim 3. For every i ∈ Λ and every j ∈ Γ, Ni ∩ Kj = N . Let i ∈ Λ and
j ∈ Γ. Since Ni ∩ Kj is a vertex and N (Ni ∩ Kj ) = K(Ni ∩ Kj ) = (0), either
Ni ∩ Kj = N or Ni ∩ Kj = K. If Ni ∩ Kj = K, then K 2 = (0), a contradiction.
Hence Ni ∩ Kj = N and the claim is proved.
Claim 4. We complete the claim by showing that M has exactly two minimal
submodules N and K. Let L be a non-zero submodule properly contained in K.
Since N L ⊆ N K = (0), either L = N or L = Ni for some i ∈ Λ. So by the Claim
3, N ⊆ L ⊆ K, a contradiction. Hence K is a minimal submodule of M . Suppose
that L′ is another minimal submodule of M . Since N and K both are minimal submodules, we deduce that N L′ = KL′ = (0), a contradiction. So the claim is proved.
Now by the Claims 2 and 4, K 2 6= (0) and K is a minimal submodule of M . Then by
Lemma 2.4, K = eM for some idempotent e ∈ R. Now we have M ∼
= eM ×(1−e)M .
By Lemma 2.6, we deduce that either M = F × S and AG(M ) ∼
= P4 or R = F × D
and AG(M ) is a star graph. Conversely, we assume that M = F × S. Then AG(M )
has exactly four vertices (0) × S, F × (0), (0) × N , and F × N . Thus AG(M ) ∼
= P4
with the vertices (0) × S, F × (0), (0) × N , and F × N .
Theorem 2.8. Let R be an Artinian ring and AG(M ) is a bipartite graph. Then
either AG(M ) is a star graph or AG(M ) ∼
= P4 . Moreover, AG(M ) ∼
= P4 if and
only if M = F × S, where F is a simple module and S is a module with a unique
non-trivial submodule.
Proof. First suppose that R is not a local ring. Hence by [9, Theorem 8.9], R =
R1 × . . . × Rn , where Ri is an Artinian local ring for i = 1, . . . , n. By Lemma 2.2
and Proposition 2.1, since AG(M ) is a bipartite graph, we have n = 2 and hence
M∼
= M1 × M2 . If M1 is a prime module, then it is easy to see that M1 is a vector
space over R/Ann(M1 ) and so is a semisimple R-module. Hence by Lemma 2.6
and Theorem 2.7, we deduce that either AG(M ) is isomorphic to P2 or P4 . Now we
assume that R is an Artinian local ring. Let m be the unique maximal ideal of R
and k be a natural number such that mk M = 0 and mk−1 M 6= 0. Clearly, mk−1 M
is adjacent to every other vertex of AG(M ) and so AG(M ) is a star graph.
Proposition 2.9. Assume that Ann(M ) is a nil ideal of R.
(a) If AG(M ) is a finite bipartite graph, then either AG(M ) is a star graph or
AG(M ) ∼
= P4 .
(b) If AG(M ) is a regular graph of finite degree, then AG(M ) is a complete
graph.
Proof. (a). If M is a vertex of AG(M ), then AG(M ) has only one vertex N
such that Ann(M ) = (N : M ) and since AG(M )∗ is an empty subgraph, AG(M )
is a star graph. Thus we may assume that M is not a vertex of AG(M ) and
hence by [7, Theorem 3.3], M is not a prime module. Therefore [7, Theorem 3.6]
follows that R/Ann(M ) is an Artinian ring. If (R/Ann(M ), m/Ann(M )) is a local
ring, then there exists a natural number k such that mk M = 0 and mk−1 M 6= 0.
Clearly, mk−1 M is adjacent to every other vertex of AG(M ) and so AG(M ) is a
star graph. Otherwise, by [9, Theorem 8.9] and Lemma 2.2, there exist pairwise
orthogonal central idempotents modulo Ann(M ). By Lemma 2.3, it is easy to see
6
HABIBOLLAH ANSARI-TOROGHY AND SHOKOUFEH HABIBI
that M ∼
= eM × (1 − e)M , where e is an idempotent element of R and Lemma 2.6
implies that AG(M ) is a star graph or AG(M ) ∼
= P4 .
(b). If M is a vertex of AG(M ), since AG(M ) is a regular graph, then AG(M ) is a
complete graph. Hence we may assume that M is not a vertex of AG(M ). So M is
not a prime module, and hence rm = 0 such that 0 6= m ∈ M , r ∈
/ Ann(M ). It is
easy to see that (rM )(0 :M r) = (0). If the set of R-submodules of rM (resp., (0 :M
r))) is infinite, then (0 :M r) (resp., rM ) has infinite degree, a contradiction. Thus
rM and (0 :M r) have finite length. Since rM ∼
= M/(0 :M r), M has finite length so
that R/Ann(M ) is an Artinian ring. As in the proof of part (a), M ∼
= M1 × M2 . If
M1 has one non-trivial submodule N , then deg((0) × M2 ) > deg(N × M2 ) and this
contradicts the regularity of AG(M ). Hence, M1 is a simple module. Similarly, M2
is a simple module. So AG(M ) ∼
= K2 . Now suppose that (R/Ann(M ), m/Ann(M ))
is an Artinian local ring. Now as we have seen in part (a), there exists a natural
number k such that mk−1 M is adjacent to all other vertices and we deduce that
AG(M ) is a complete graph.
Let S be a multiplicatively closed subset of R. A non-empty subset S ∗ of M is
said to be S-closed if se ∈ S ∗ for every s ∈ S and e ∈ S ∗ . An S-closed subset S ∗
is said to be saturated if the following condition is satisfied: whenever ae ∈ S ∗ for
a ∈ R and e ∈ M , then a ∈ S and e ∈ S ∗ .
We need the following result due to Chin-Pi Lu.
Theorem 2.10. (See [16, Theorem 4.7].) Let M = Rm be a cyclic module. Let S ∗
be an S-closed subset of M relative to a multiplicatively closed subset S of R, and
N a submodule of M maximal in M \ S ∗ . If S ∗ is saturated, then ideal (N : M ) is
maximal in R \ S so that N is prime in M .
Theorem 2.11. If M is a cyclic module, Ann(M ) is a nil ideal, and |M in(M )| ≥
3, then AG(M ) contains a cycle.
Proof. If AG(M ) is a tree, then by Theorem 2.7, either AG(M ) is a star graph or
M∼
= F × S, where F is a simple module and S has a unique non-trivial submodule.
The latter case is impossible because |M in(F × S)| = 2. Suppose that AG(M ) is a
star graph and N is the center of star. Clearly, one can assume that N is a minimal
submodule of M . If N 2 6= (0), then by Lemma 2.4, there exists an idempotent
e ∈ R such that N = eM so that M ∼
= eM × (1 − e)M . Now by Proposition 2.1
and Lemma 2.6, we conclude that |M in(M )| = 2, a contradiction. Hence N 2 = 0.
Thus one may assume that N = Rm and (Rm)2 = (0). Suppose that P1 and P2
are two distinct minimal prime submodules of M . Since (Rm)2 = (0), we have
(Rm : M )2 ⊆ Ann(M ) ⊆ (Pi : M ), i = 1, 2. So (Rm : M )M = Rm ⊆ Pi , i = 1, 2.
Hence m ∈ Pi , i = 1, 2. Choose z ∈ (P1 : M ) \ (P2 : M ) and set S1 = {1, z, z 2, . . .},
S2 = M \ P1 , and S ∗ = S1 S2 . If 0 ∈
/ S ∗ , then Σ = {N < M | N ∩ S ∗ = ∅} is
not empty. Then Σ has a maximal element, say N . Hence by Theorem 2.10, N
is a prime submodule of M . Since N ⊆ P1 , we have N = P1 , a contradiction
because z ∈
/ (N : M ). So 0 ∈ S ∗ . Therefore, there exist positive integer k and
′
m ∈ S2 such that z k m′ = 0. Now consider the submodules (m), (m′ ), and z k M .
It is clear that (m) 6= (m′ ) and (m) 6= z k M . If (m) = z k M , then z ∈ (P2 : M ), a
contradiction. Thus (m), (m′ ), and z k M form a triangle in AG(M ), a contradiction.
Hence AG(M ) contains a cycle.
THE ANNIHILATING-SUBMODULE GRAPH OF MODULES
7
Theorem 2.12. Suppose that M is a cyclic module, radM (0) 6= (0), and Ann(M )
is a nil ideal. If |M in(M )| = 2, then either AG(M ) contains a cycle or AG(M ) ∼
=
P4 .
Proof. A similar argument to the proof of Theorem 2.11 shows that either AG(M )
contains a cycle or M ∼
= F × S, where F is a simple module and S is a module with
a unique non-trivial submodule. The latter case implies that AG(M ) ∼
= P4 (note
that radF ×D (0) = (0), where F is a simple module and D is a prime module).
We recall that N < M is said to be a semiprime submodule of M if for every
ideal I of R and every submodule K of M , I 2 K ⊆ N implies that IK ⊆ N .
Further M is called a semiprime module if (0) ⊆ M is a semiprime submodule.
Every intersection of prime submodules is a semiprime submodule (see [21]).
Theorem 2.13. Let S be a maltiplicatively closed subset of R containing no zerodivisors on finitely generated module M . Then cl(AG(MS )) ≤ cl(AG(M )). Moreover, AG(MS ) is a retract of AG(M ) if M is a semiprime module. In particular,
cl(AG(MS )) = cl(AG(M )), whenever M is a semiprime module.
Proof. Consider a vertex map φ : V (AG(M )) −→ V (AG(MS )), N −→ NS . Clearly,
NS 6= KS implies N 6= K and N K = (0) if and only if NS KS = (0). Thus φ
is surjective and hence cl(AG(MS )) ≤ cl(AG(M )). In what follows, we assume
that M a semiprime module. If N 6= K and N K = (0), then we show that
NS 6= KS . Without loss of generality we can assume that M is not a vertex of
AG(M ) and On the contrary suppose that NS = KS . Then NS2 = NS KS =
(N K)S = (0) and so N 2 = (0), a contradiction. This shows that the map φ is
a graph homomorphism. Now, for any vertex NS of AG(MS ), we can choice the
fixed vertex N of AG(M ). Then φ is a retract (graph) homomorphism which clearly
implies that cl(AG(MS )) = cl(AG(M )) under the assumption.
Corollary 2.14. If M is a finitely generated semiprime module, then cl(AG(T (M )) =
cl(AG(M )), where T = R \ Z(M ).
Since the chromatic number χ(G) of a graph G is the least positive integer r such
that there exists a retract homomorphism ψ : G −→ Kr , the following corollaries
follow directly from the proof of Theorem 2.13.
Corollary 2.15. Let S be a maltiplicatively closed subset of R containing no
zero-divisors on finitely generated module M . Then χ(AG(MS )) ≤ χ(AG(M )).
Moreover, if M is a semiprime module, then χ(AG(MS )) = χ(AG(M )).
Corollary 2.16. If M is a finitely generated semiprime module, then χ(AG(T (M )) =
χ(AG(M )), where T = R \ Z(M ).
Eben Matlis in [18, Proposition 1.5], proved that if {p1 , . . . , pn } is a finite set of
distinct minimal prime ideals of R and S = R \ ∪ni=1 pi , then Rp1 × . . . × Rpn ∼
= RS .
In [20], this result was generalized to finitely generated multiplication modules. In
Theorem 2.18, we use this generalization for a cyclic module.
Theorem 2.17. (See [20, Theorem 3.11].) Let {P1 , . . . , Pn } be a finite set of distinct minimal prime submodules of finitely generated multiplication module M and
S = R \ ∪ni=1 (Pi : M ). Then Mp1 × . . . × Mpn ∼
= MS , where pi = (Pi : M ) for
1 ≤ i ≤ n.
8
HABIBOLLAH ANSARI-TOROGHY AND SHOKOUFEH HABIBI
Theorem 2.18. Let M be a cyclic module and {P1 , . . . , Pn } be a finite set of
distinct minimal prime submodules of M . Then there exists a clique of size n.
Proof. Let M be a cyclic module and S = R \ ∪ni=1 pi , where pi = (Pi : M )
for 1 ≤ i ≤ n. Then since M is a multiplication module, by Theorem 2.17,
there exists an isomorphism φ : Mp1 × . . . × Mpn −→ MS . Let M = Rm, ei =
(0, . . . , 0, m/1, . . . , 0, . . . , 0) and φ(ei ) = ni /ti , where m ∈ M , 1 ≤ i ≤ n, and m/1 is
in the i-th position of ei . Consider the principal submodules Ni = (ni /ti ) = (ni /1)
in the module MS . By Lemma 2.2 and Proposition 2.1, the product of submodules
(0)×. . .×(0)×(m/1)Rpi ×(0)×. . .×(0) and (0)×. . .×(0)×(m/1)Rpj ×(0)×. . .×(0)
are zero, i 6= j. Since φ is an isomorphism, there exists tij ∈ S such that tij ri nj = 0,
for every i, j, 1 ≤ i < j ≤ n, where ni = ri m for some ri ∈ R. Let t = Π1≤i<j≤n tij .
We show that {(tn1 ), . . . , (tnn )} is a clique of size n in AG(M ). For every i, j, 1 ≤
i < j ≤ n, (Rtni )(Rtnj ) = (Rtnj : M )Rtni = (Rtnj : M )tri M = tri Rtnj = (0).
Since (tni )S = (ni /1) = Ni , we deduce that (tni ) are distinct non-trivial submodules of M .
Corollary 2.19. For every cyclic module M , cl(AG(M )) ≥ |M in(M )| and if
|M in(M )| ≥ 3, then gr(AG(M )) = 3.
Theorem 2.20. Let M be a cyclic module and radM (0) = (0). Then χ(AG(M )) =
cl(AG(M )) = |M in(M )|.
Proof. If |M in(M )| = ∞, then by Corollary 2.19, there is nothing to prove. Thus
suppose that |M in(M )| = {P1 , ..., Pn }, for some positive integer n. Let pi = (Pi :
M ) and S = R \ ∪ni=1 pi . By Theorem 2.17, we have Mp1 × . . . × Mpn ∼
= MS .
Clearly, cl(AG(MS )) ≥ n. Now we show that χ(AG(MS )) ≤ n. By [15, Corollary
3], Pi Rpi is the only prime submodule of M and since radM (0) = (0), every Mpi
is a simple Rpi -module. Define the map C : V (AG(MS )) −→ {1, 2, . . . , n} by
C(N1 × . . . × Nn ) = min{i| Ni 6= (0)}. Since each Mpi is a simple module, c is a
proper vertex coloring of AG(MS ). Thus χ(AG(MS )) ≤ n and so χ(AG(MS )) =
cl(AG(MS )) = n. Since radM (0) = (0), it is easy to see that S ∩ Z(M ) = ∅. Now
by theorem 2.13 and Corollary 2.15, we obtain the desired.
Theorem 2.21. For every module M , cl(AG(M )) = 2 if and only if χ(AG(M )) =
2.
Proof. For the first assertion, we use the same technique in [3, Theorem 13]. Let
cl(AG(M )) = 2. On the contrary assume that AG(M ) is not bipartite. So AG(M )
contains an odd cycle. Suppose that C := N1 − N2 − . . . − N2k+1 − N1 be a shortest
odd cycle in AG(M ) for some natural number k. Clearly, k ≥ 2. Since C is a
shortest odd cycle in AG(M ), N3 N2k+1 is a vertex. Now consider the vertices
N1 , N2 , and N3 N2k+1 . If N1 = N3 N2k+1 , then N4 N1 = (0). This implies that
N1 − N4 − . . . − N2k+1 − N1 is an odd cycle, a contradiction. Thus N1 6= N3 N2k+1 .
If N2 = N3 N2k+1 , then we have C3 = N2 − N3 - N4 − N2 , again a contradiction.
Hence N2 6= N3 N2k+1 . It is easy to check N1 , N2 , and N3 N2k+1 form a triangle in
AG(M ), a contradiction. The converse is clear.
The radical
√ of I, defined as the intersection of all prime ideals containing I,
the next theorem, we recall that if M is a finitely
denoted by I. Before stating
p
generated module, then (Q : M ) = (rad(Q) : M ), where Q < M (see [14] and
[17, Proposition 2.3]). Also, we know that if M is a finitely generated module, then
THE ANNIHILATING-SUBMODULE GRAPH OF MODULES
9
for every prime ideal p of R with p ⊇ Ann(M ), there exists a prime submodule P
of M such that (P : M ) = p (see [15, Theorem 2]).
Theorem 2.22. Assume that M is a finitely generated module, Ann(M ) is a nil
ideal, and |M in(M )| = 1. If AG(M ) is a triangle-free graph, then AG(M ) is a star
graph.
Proof. Suppose first that P is the unique minimal prime submodule of M . Since
M is not a vertex of AG(M ), hence Z(M ) 6= (0). So there exist non-zero elements
r ∈ R and m ∈ M such that rm = 0. It is easy to see that rM and Rm are
vertices of AG(M ) because (rM )(Rm) = 0. Since AG(M ) is triangle-free, Rm
or rM is a minimal submodule of M . Without loss of generality, we can assume
that Rm is a minimal submodule of M so that (Rm)2 = (0) (if rM is a minimal
submodule of M , then there exists 0 6= m′ ∈ M such that rM = Rm′ ). We
claim that Rm is the unique minimal submodule of M . On the contrary, suppose
that K is another minimal submodule of M . So either K 2 = K or K 2 = 0. If
K 2 = K, then by Lemma 2.4, K = eM for some idempotent element e ∈ R and
hence M ∼
= eM × (1 − e)M . This implies that |M in(M )| > 1, a contradiction.
If K 2 = 0, then we have C3 = K − (K : M )M + (Rm : M )M − Rm − K, a
contradiction. So Rm is the unique minimal submodule of M . Let V1 = N ((Rm)),
V2 = V (AG(M )) \ V1 , A = {K ∈ V1 |(Rm) ⊆ K}, B = V1 \ A, and C = V2 \ {Rm}.
We prove that AG(M ) is a bipartite graph with parts V1 and V2 . We may assume
that V1 is an independent set because AG(M ) is triangle-free. We claim that one
end of every edge of AG(M ) is adjacent to Rm and another end contains Rm. To
prove this, suppose that {N, K} is an edge of AG(M ) and Rm 6= N , Rm 6= K.
Since N (Rm) ⊆ Rm, by the minimality of Rm, either N (Rm) = (0) or Rm ⊆ N .
The latter case follows that K(Rm) = (0). If N (Rm) = (0), then K(Rm) 6= (0) and
hence Rm ⊆ K. So our plain is proved. This gives that V2 is an independent set
and N (C) ⊆ V1 . Since every vertex of A contains Rm and AG(M ) is triangle-free,
all vertices in A are just adjacent to Rm and so by [7, Theorem 3.4], N (C) ⊆ B.
Since one end of every edge is adjacent to Rm and another end contains Rm, we also
deduce that every vertex of C contains Rm and so every vertex of A ∪ V2 contains
Rm. Note that if Rm = P , then one end of each edge of AG(M ) is contained in Rm
and since Rm is a minimal submodule of M , AG(M ) is a star graph with center
Rm = P . Now, suppose that P 6= Rm. We claim that P ∈ A. Since Rm ⊆ P , it
suffices to show that (Rm)P = (0). To see this, let r ∈ (P : M ). We prove that
rm = 0. Clearly, (Rrm) ⊆ Rm. If rm = 0, then we are done. Thus Rrm = Rm
and so m = rsm for some s ∈ R. We have
p m(1 − rs) = 0. By [15, Theorem 2],
we have N il(R) = (P : M ) (note that Ann(M ) = (rad(0) : M ) = (P : M )).
Therefore 1 − rs is unit, a contradiction, as required. Since N (C) ⊆ B, if B = ∅,
then C = ∅ and so AG(M ) is a star graph with center Rm. It remains to show
that B = ∅. Suppose that K ∈ B and consider the vertex K ∩ P of AG(M ). Since
every vertex of A ∪ V2 contains Rm, yields K ∩ P ∈ B. Pick 0 6= m′ ∈ K ∩ P .
Since AG(M ) is triangle-free, one can find an element m′′ ∈ Rm′ such that Rm′′
is a minimal submodule of M and (Rm′′ )2 = (0). Since Rm is the unique minimal
submodule of M , we have Rm = Rm′′ ⊆ Rm′ . Thus Rm ⊆ K ∩ P , a contradiction.
So B = ∅ and we are done. Hence AG(M ) is a star graph whose center is Rm, as
desired.
10
HABIBOLLAH ANSARI-TOROGHY AND SHOKOUFEH HABIBI
Corollary 2.23. Assume that M is a finitely generated module, Ann(M ) is a nil
ideal, and |M in(M )| = 1. If AG(M ) is a bipartite graph, then AG(M ) is a star
graph.
References
[1] G. Aalipour, S. Akbari, R. Nikandish, M. J. Nikmehr, and F. Shaveisi, On the coloring
of the annihilating-ideal graph of a commutative ring. Discrete Mathematics. 312 (2012),
2620–2626.
, Minimal prime ideals and cycles in annihilating-ideal graphs. Rocky Mountain J.
[2]
Math. Vol. 43 (2013) No. 5, 1415–1425.
[3] G. Aalipour, S. Akbari, M. Behboodi, R. Nikandish, M. J. Nikmehr and F. Shaveisi, The
Classication of the Annihilating-Ideal Graphs of Commutative Rings. Algebra Colloquium.
21 (2) (2014), 249–256.
[4] D. F. Anderson and P. S. Livingston, The zero-divisor graph of a commutative ring. J.
Algebra, Springer, NJ. 217 (1999), 434–447.
[5] W. Anderson, K. R. Fuller, Rings and Categories of Modules, (New York-Heidelberg-Berlin,
Springer-Verlag, 1974).
[6] H. Ansari-Toroghy and F. Farshadifar, Product and dual product of submodules. Far East
J. Math. Sci. 25 (3) (2007), 447–455.
[7] H. Ansari-Toroghy and S. Habibi, The Zariski topology-graph of modules over commutative
rings, Comm. Algebra. 42 (2014), 3283–3296.
, The annihilating-submodule graph of modules over commutative rings, arXiv: 1601
[8]
.00916v1, submitted.
[9] M.F. Atiyah and I.G. Macdonald, Introduction to commutative algebra. Addison-Wesley.
(1969).
[10] I. Beck, Coloring of commutative rings. J. Algebra., 116 (1988), 208–226.
[11] M. Behboodi and Z. Rakeei, The annihilating-ideal graph of commutative rings I. J. Algebra
Appl. Vol. 10 (2011), No. 4, 727–739.
[12] T. Y. Lam, A First Course in Non-Commutative Rings. Springer - Verlag. (New York,
1991).
[13] Chin-Pi. Lu, Prime submodules of modules. Comment. Math. Univ. St. Pauli. 33 (1984),
no. 1, 61–69.
, M-radicals of submodules in modules II. Mathematica Japonica. 35 (5) (1990),
[14]
991–1001.
[15]
, Spectra of modules. Comm. Algebra. 23 (10) (1995), 3741–3752.
[16]
, Unions of prime submodules. Houston Journal of Mathematics., 23 (1997), no. 2,
203–213.
[17]
, Modules with Noetherian Spectrum. Comm. Algebra. 38 (2010), 807–828.
[18] E. Matlis, The minimal prime spectrum of a reduced ring. Illinois J. Math. 27 (3) (1983),
353–391.
[19] D. Reinard, Graph Theory. Grad, Texts in Math, Springer, NJ. (2005).
[20] K. Samei, Reduced multiplication modules. Math. Sci. 121 (2011), no.2, 121–132.
[21] H. A. Tavallaee and R. Varmazyar, Semi-radicals of submodules in modules, IUST International Journal of Engineering Science. 19 (2008), 21–27.
Department of pure Mathematics
Faculty of mathematical Sciences,
University of Guilan, P. O. Box 41335-19141, Rasht, Iran
E-mail: [email protected]
Department of pure Mathematics
Faculty of mathematical Sciences,
University of Guilan, P. O. Box 41335-19141, Rasht, Iran
E-mail: [email protected]
| 0math.AC
|
arXiv:1503.05436v4 [math.ST] 22 Feb 2018
Inference in Additively Separable Models with a
High-Dimensional Set of Conditioning Variables
Damian Kozbur
University of Zürich
Department of Economics
Schönberggasse 1, 8001 Zürich
email: [email protected]
Abstract. This paper studies nonparametric series estimation and inference
for the effect of a single variable of interest x on an outcome y in the presence of potentially high-dimensional conditioning variables z. The context is
an additively separable model E[y|x, z] = g0 (x) + h0 (z). The model is highdimensional in the sense that the series of approximating functions for h0 (z)
can have more terms than the sample size, thereby allowing z to have potentially very many measured characteristics. The model is required to be
approximately sparse: h0 (z) can be approximated using only a small subset
of series terms whose identities are unknown. This paper proposes an estimation and inference method for g0 (x) called Post-Nonparametric Double
Selection which is a generalization of Post-Double Selection. Standard rates
of convergence and asymptotic normality for the estimator are shown to hold
uniformly over a large class of sparse data generating processes. A simulation
study illustrates finite sample estimation properties of the proposed estimator
and coverage properties of the corresponding confidence intervals. Finally, an
empirical application estimating convergence in GDP in a country-level crosssection demonstrates the practical implementation of the proposed method.
Key Words: additive nonparametric models, high-dimensional sparse regression, inference under imperfect model selection. JEL Codes: C1.
1. Introduction
Nonparametric estimation in econometrics and statistics is useful in applications
where theory does not provide functional forms for relations between relevant observed variables. In many problems, primary quantities of interest can be computed
from the conditional expectation function of an outcome variable y given a regressor
of interest x,
E[y|x] = f0 (x).
Date: First version: September 2013. This version is of February 23, 2018.
Correspondence: Schönberggasse 1, 8001 Zürich, Department of Economics, University of Zürich,
[email protected].
I thank Christian Hansen, Tim Conley, Matt Taddy, Azeem Shaikh, Dan Nguyen, Dan Zhou,
Emily Oster, Martin Schonger, Eric Floyd, Kelly Reeve, and seminar participants at University
of Western Ontario, University of Pennsylvania, Rutgers University, Monash University, and the
Center for Law and Economics at ETH Zurich for helpful comments. I gratefully acknowledge
financial support from the ETH Postdoctoral Fellowship.
1
2
DAMIAN KOZBUR
In this case, nonparametric estimation is a flexible means for estimating unknown
f0 from data under minimal assumptions.
In most econometric models, however, it is also important to take into account
conditioning information, given through variables z. Failing to properly control for
such variables z will lead to incorrect estimates of the effects of x on y. When such
conditioning information is important to the problem, it is necessary to replace the
simple objective of learning the conditional expectation function f0 with the new
objective of learning a family of conditional expectation functions
E[y|x, z] = f0,z (x)
indexed by z.
This paper studies series estimation1 and inference of f0,z in a particular case
characterized by the following two main features.
1. f0,z is additively separable in x and z, meaning that
f0,z (x) = g0 (x) + h0 (z)
for some functions g0 and h0 .
2. The conditioning variables z are observable and high-dimensional.
Additively separable models are convenient in many economic problems because
any ceteris paribus effect of changing x to x0 is completely described by g0 . In
addition, a major statistical advantage in restricting to additively separable models
is that the individual components g0 , h0 can be estimated at faster rates than a
joint estimation of the family f0,z .2 Therefore, imposing additive separability in
contexts where such an assuption is justified is very helpful.
The motivation for studying a high-dimensional framework for z is to allow
researchers substantial flexibility in modeling conditioning information when the
primary object of interest is g0 . This framework allows analysis of particularly
rich or big datasets with a large number of conditioning variables.3 In this paper,
high-dimensionality of z is formally defined by the total number of terms in a series
expansion of h0 (z). This will allow many possibilities on the types of variables z
and functions h0 covered. For example, z can be high-dimensional itself, while h0
is approximately linear in the sense that
0
h0 (z) = z10 βh0 ,1 + ... + zL
βh0 ,L + o(1)
with L > n and βh0 ,j denoting the jth component of the vector βh0 and the
asymptotic o(1) valid for L → ∞. More generally, z itself can also have moderate
1Series estimation of nonparametric regression problems involves least squares estimation performed on a series expansion of the regressor variables. Series estimation is described more fully
in Section 2.
2Results on faster rates for separable models exist for both kernel methods (marginal integration and back-fitting methods) and series based estimators. For a general review of these issues,
see for example the textbook [41]. Additional discussion on the literature on additively separable
models is provided later in the introduction.
3In many cases, larger set of covariates can lend additional credibility to conditional exogeneity
assumptions. See the discussion in [15].
ADDITIVELY SEPARABLE
3
dimension, but any sufficiently expressive series expansion of h0 must have many
terms as a simple consequence of the curse of dimensionality.
A basic mechanical outline for the estimation and inference strategy presented
in this paper proceeds in the following steps.
1. Consider approximating dictionaries (equivalently series expansions) with
K terms, given by pK (x) = (p1K (x), ..., pKK (x)). Linear combinations of
pK (x) are used for approximating g0 (x). In addition, consider approximating dictionaries with L terms, q L (z) = (q1L (z), ..., qLL (z)), for approximating h0 (z). Possibly L > n.
2. Reduce the number of series terms for h0 in a way which continues to allow
robust inference. This requires multiple model selection steps.
3. Proceed with traditional series estimation and inference techniques on the
reduced dictionaries.
Strategies of this form are commonly referred to as post-model selection inference
strategies.
The primary targets of inference considered in this paper are real-valued functionals, g 7→ a(g) ∈ R. Specifically, let
θ0 = a(g0 ).
Leading examples of such functionals include the average derivative a(g) = E[g 0 (x)]
or the difference of a(g) = g(x20 ) − g(x10 ) for two distinct x10 , x20 of interest.
The main contribution of this paper is the construction of confidence sets that
cover θ0 to some pre-specified confidence level. Moreover, the construction is valid
uniformly over a large class of data generating processes which allow z to be highdimensional.
Current high-dimensional estimation techniques provide researchers with useful
tools for dimension reduction and dealing with datasets where the number of parameters exceeds the sample size.4 Most high-dimensional techniques require additional
structure to be imposed on the problem at hand in order to ensure good performance. One common structure for which reliable high-dimensional techniques exist
is sparsity. Sparsity means that the number of nonzero parameters is small relative
to the sample size. In this setting, common techniques include `1 -regularization
techniques like Lasso and Post-Lasso5. Other techniques include the Dantzig selector, Scad, and Forward Stepwise regression.
The literature on nonparametric estimation of additively separable models is well
developed. As mentioned above, additively separable models are useful since they
4Statistical models which are extremely flexible, and thus overparameterized, are likely to
overfit the data, leading to poor inference and out of sample performance. Therefore, when many
covariates are present, regularization is necessary.
5The Lasso is a shrinkage procedure which estimates regression coefficients by minimizing a
quadratic loss function plus an `1 penalty for the size of the coefficient. The nature of the penalty
gives Lasso favorable property that many parameter values are set identically to zero and thus
Lasso can also be used as a model selection technique. Post-Lasso fits an ordinary least squares
regression on variables with non-identically-zero estimated Lasso coefficients. For theoretical and
simulation results about the performance of these two methods, see [29] [52], [32] [23] [4], [5], [17],
[21], [20] [22], [23], [33], [38], [39], [42], [43], [44], [47], [52], [53], [55], [57], [9], [18], [9], among many
more.
4
DAMIAN KOZBUR
impose an intuitive restriction on the class of models considered, and as a result
provide higher quality estimates. Early study of additively separable models was
initiated in [19] and [31], who describe backfitting techniques. [25] propose marginal integration methods in the kernel context. [50] and [56] consider estimation
of derivatives in components of additive models. [26] develop local partitioned regression which can be applied more generally than the additive model. In terms of
series-based estimation, series estimators are particularly easy to use for estimating
additively separable models since series terms can be allocated to respective model
components. General large sample properties of series estimators have been derived
by [51], [27], [2], [28], [3] [45] [14] and many other references. Relative to kernel
estimation, series estimators are simpler to implement, but often require stronger
support conditions. Many additional references for both kernel and series based
estimation can be found in the reference text [41]. Finally, [34] consider estimation
of additively separable models in a setting where there are high-dimensional additive components. The authors propose and analyze a series estimation approach
with a Group-Lasso penalty to penalize different additive components. This paper therefore studies a very similar setting to the one in [34], but constructs a valid
procedure for forming confidence intervals rather than focusing on estimation error.
The main challenge in statistical inference or construction of confidence intervals
after model selection is in attaining robustness to model selection errors. When coefficients are small relative to the sample size (ie statistically indistinguishable from
zero), model selection mistakes are unavoidable.6 Such model selection mistakes can
lead to distorted statistical inference in much the same way that pretesting procedures lead to distorted inference. This intuition is formally developed in [46]
and [40]. Nevertheless, given the practical value of dimension reduction, and the
increasing prevalence of high-dimensional datasets, studying robust post-model selection inference techniques and post-regularization inference techniques is an active
area of current research. Offering solutions to this problem is the focus of a number
of recent papers; see, for example, [11], [8], [58], [12], [15], [54], [36], [10], and [16].7
This paper proposes a procedure called Post-Nonparametric Double Selection
for the additively separable model. The proposed procedure is a generalization
of the approach in [15] (named Post-Double-Selection). [15] gives robust statistical
inference for the slope parameter α0 of a treatment variable x with high-dimensional
control variables z in the context of a partially linear model E[y|x, z] = α0 x+h0 (z).8
The Post-Double Selection method selects elements of z in two steps. Step 1 selects
the terms in an expansion of z that are most useful for predicting x. Step 2 selects
terms in an expansion of z most useful for predicting y. A consequence of the
particular construction using two selection steps is that terms excluded by model
selection mistakes twice necessarily have a negligible effect on subsequent statistical
inference.9 Post-Nonparametric Double Selection replaces step 1 of Post-Double
6
Under some restrictive conditions, for example beta-min conditions which constrain nonzero
coefficients to have large magnitudes, perfect model selection can be attained.
7
Citations are ordered by date of first appearance on arXiv.
8Several authors have addressed the task of assessing uncertainties or estimation error of model
parameter estimates in a wide variety of models with high dimensional regressors (see, for example,
[11], [8], [58], [12], [15], [54], [36], and [10]).
9The use of two model selection steps is motivated partially by the intuition that two necessary
conditions for omitted variables bias to occur: an omitted variable exists which is (1) correlated
with the treatment x, and (2) correlated with the outcome y. Each selection step addresses one
ADDITIVELY SEPARABLE
5
Selection with selecting variables useful for predicting any test function ϕ(x) ∈ ΦK
for a sufficiently general class of functions ΦK .
This paper suggests a simple choice for ΦK which is based on the linear span
of pK (x). This choice is called ΦK,Span .10 Theoretical and simulation results show
that the suggested choice has favorable statistical properties uniformly under certain
sequences of data generating processes.
Working with a generalization of Post-Double Selection which dissociates the
first stage selection from the final estimation is useful for several reasons. One
reason is that the direct extension of Post-Double is not invariant to the choice of
dictionary pK (x) and leads natural to the consideration of more general ΦK . In
addition, applying the direct generalization of Post-Double selection may lead to
poorer statistical performance than using a larger, more robust ΦK . A simulation
study later in this paper explores these properties. Next, as a theoretical advantage,
in some cases a larger ΦK gives estimates and inference which are valid under weaker
rate conditions on K, n, etc. Finally, working dissociating the first stage helps in
terms of organizing the arguments in the proofs. In particular, various bounds
developed in the proof depend on a notion of density of ΦK within LinSpan(pK ).
This paper proves convergence rates and asymptotic normality for PostNonparametric Double Selection estimates of g0 (x) and θ0 respectively. The proofs
in the paper proceed by using the techniques in Newey’s analysis of series estimators (see [45]) and ideas in Belloni, Chernozhukov, and Hansen’s analysis of
Post-Double Selection (see [15]), along with careful tracking of a notion of density
of the set ΦK within the linear span of pK (x). The estimation rates for g0 obtained
in this paper match those of [45]. Next, a simulation study demonstrates finite
sample performance of the proposed procedure. Finally, an empirical example estimating the relationship of initial GDP to GDP growth in a cross-section of 90
countries illustrates the use of Post-Nonparametric Double Selection.
2. Series estimation with a reduced dictionary
This section establishes notation, reviews series estimation, and describes series
estimation on a reduced dictionary. The exposition begins with basic assumptions
on the observed data.
Assumption 1 (Data). The observed data, Dn , is given by n iid copies of random
variables (x, y, z) ∈ X × Y × Z indexed by 1 6 i 6 n, so that
Dn = (yi , xi , zi )ni=1 .
Here, yi are outcome variables, xi are explanatory variables of interest, and zi are
conditioning variables. In addition, Y ⊆ R and X ⊆ Rr for some integer r > 0 and
Z is a general measure space.
of the two concerns. In their paper, they prove that under the regularity right conditions, the two
described model selection steps can be used to obtain asymptotically normal estimates of α0 and
in turn to construct correctly sized confidence intervals.
10Alternative choices are possible and the analysis in the paper covers a general class of choices
for ΦK .
6
DAMIAN KOZBUR
Assumption 2 (Additive Separability). There is a random variable ε and functions g0 and h0 such that the following additive separability11 holds.
y = g0 (x) + h0 (z) + ε, E[ε|x, z] = 0.
Traditional series estimation of (g0 , h0 ) is carried out by performing least squares
regression on series expansions in x and z. Define a dictionary of approximating
functions by
(pK (x), q L (z))
where pK (x) = (p1K (x), ..., pKK (x)) and q L (z) = (q1L (z), ..., qLL (z)) are each
series of K and L functions such that their linear combinations can approximate g0 (x) and h0 (z). Construct the matrices P = [pK (x1 ), ..., pK (xn )]0 , Q =
[q L (z1 ), ..., q L (zn )]0 ,Y = (y1 , ..., yn )0 , and let βby,(K,L) = ([P Q]0 [P Q])−1 [P Q]0 Y be
the least squares estimate from Y on [P Q]. Let [βby,(K,L) ]g be the components of
βby,(K,L) corresponding to pK . Then gb(x) is defined by
0
gb(x) = pK (x) [βby,(K,L) ]g .
When L > n, quality statistical estimation is only feasible provided dimension
reduction or regularization is performed. A dictionary reduction selects new approximating terms,
(pK (x), q L (z))
reduction
−→
(p̃(x), q̃(z)),
comprised of a subset of the series terms in (pK (x), q L (x)). In this paper, because the primary objects of interest center around g0 (x), it will be the convention to always take p̃(x) = pK (x). The post-model-selection estimate of g0 (x)
is then defined analogously to the traditional series estimate. Let βby,(p̃,q̃) =
([P̃ Q̃]0 [P̃ Q̃])−1 [P̃ Q̃]0 Y where P̃ = [p̃(x1 ), ..., p̃(xn )]0 = P , Q̃ = [q̃(z1 ), ..., q̃(zn )]0
and as before, let [βby,(p̃,q̃) ]g be the components of βby,(p̃,q̃) corresponding to p̃. Then
gb is defined by
0
gb(x) = p̃(x) [βby,(p̃,q̃) ]g .
Finally, consider a functional12 a(g) ∈ R and as before, set θ0 = a(g0 ). One
sensible estimate for θ0 is given by
θb = a(b
g ).
In order to use θb for inference on θ0 , an approximate expression for the varib is necessary. As is standard, the expression for the variance will
ance var(θ)
K
0
b = ∂a(p (x) b) ([βby,(p̃,q̃) ]g ). Let
be approximated using the delta method. Let A
∂b
M = Idn − Q̃(Q̃0 Q̃)−1 Q̃0 be the projection matrix onto the space orthogonal to the
11This assumption simply rewrites the equation stated in the introduction in terms of a residual
ε. To ensure uniqueness of g0 , a further normalization is required. A common normalization in
the series context is g0 (0) = 0, which is sufficient for most common assumptions on h0 .
12Restriction to one dimensional functionals is for simplicity.
7
ADDITIVELY SEPARABLE
b = Y − [P̃ , Q̃]βby,(p̃,q̃) . Estimate Vb using the following
span of Q̃.13 Finally, let E
sandwich form:
bΩ
b −1 Σ
bΩ
b −1 A
b
Vb = A
b = n−1 P̃ 0 MP̃
Ω
b 2 MP̃ .
b = n−1 P̃ 0 Mdiag(E)
Σ
The following sections describe a dictionary reduction technique, along with regularity conditions, which imply that
b →d N (0, 1).
n1/2 Vb −1/2 (θ0 − θ)
The practical value of the results is that they formally justify approximate Gaussian inference for θ0 . An immediate corollary of the Gaussian limit is that for any
significance level γ ∈ (0, 1), with c1−γ/2 the (1 − γ/2)-quantile of the standard
Guassian distribution, it holds that
P(θ0 ∈ [θb − c1−γ/2 n1/2 Vb −1/2 , θb − c1−γ/2 n1/2 Vb −1/2 ]) → γ.
3. Dictionary Reduction by Post-Nonparametric Double Selection
The previous section described estimation using a generic dictionary reduction.
This section discusses one class of possibilities for constructing such reductions.
It is important to note that the coverage probabilities of the above confidence sets
depend critically on how the dictionary reduction is performed. In particular, naive
one-step methods will fail to produce correct inference. Formal results expanding
on this point can be found, for instance, in [46], [40]. Heuristically, the reason
resulting confidence intervals have poor coverage properties is due to model selection
mistakes.
To address this problem, this section proposes a procedure for selecting q̃(z). The
new procedure is a generalization of the methods in [15] who work in the context
of the partially linear model E[y|x, z] = α0 x + h0 (z). The methods described below
rely heavily on Lasso-based model selection. Therefore, a brief description of Lasso
is now provided. The following description of Lasso, which uses an overall penalty
level as well as term-specific penalty loadings follows [8] who are motivated by
allowing for heteroskedasticity.
For any random variable v with observations (v1 , ..., vn ), the Lasso estimate v
on q L (z) with penalty parameter λ and loadings lj is defined as a solution
βbv,L,Lasso ∈ arg min
n
X
(vi − q L (zi )0 b)2 + λ
i=1
L
X
|lj bj |.
j=1
The corresponding selected set Iv,L is defined as
Iv,L = {j : βbv,L,Lasso,j 6= 0}.
Finally, the corresponding Post-Lasso estimator is defined by
n
X
βbv,L,Post-Lasso ∈ arg
min
(vi − q L (zi )0 b)2 .
b:bj =0 for j ∈I
/ v,L
i=1
13When the required inverse does not exist, a pseudo-inverse may be used.
8
DAMIAN KOZBUR
Lasso is chosen over other model selection possibilities for several reasons. Foremost, Lasso is a simple, computationally efficient estimation procedure which produces sparse estimates because of its ability to set coefficients identically equal
to zero. In particular, |Iv,L | will generally be much smaller than n if a suitable
penalty level is chosen. The second reason is for the sake of continuity with the
previous literature; Lasso was used in [15]. The third reason is for concreteness.
There are indeed many alternative estimation or model selection procedures which
select a sparse set of terms which in principle can replace the Lasso. It is possible
to instead consider general model selection techniques in the course of developing
the subsequent theory. However, framing the discussion using Lasso allows explicit
calculation of bounds and explicit description of tuning parameters. This is also
helpful in terms of practical implementation of the procedures proposed below.
The quality of Lasso estimation is controlled by λ and lj . As the number of
different Lasso estimations increases (ie. with increasingly many different variables
v), the penalty parameter must be increased to ensure quality estimation uniformly
over all different v. The penalty parameter must also be increased with increasing
L. However, higher λ typically leads to more shrinkage bias in Lasso estimation.
Therefore, given lj , λ is usually chosen to be large enough to ensure quality performance, and no larger. See [8] for details.
For the sake of completeness, the Post-Double Selection procedure of [15] is now
reproduced for a partially linear model specified by E[y|x, z] = α0 x + h0 (z).
Algorithm 1. Post-Double Selection for the Partially Linear Model. (Reproduced
from [15]).
1. First Stage Model Selection Step. Perform Lasso regression x on q L (z) with
penalty λFS and loadings lFS,j . Let IFS be the set of selected terms.
2. Reduced Form Model Selection Step. Perform Lasso regression y on q L (z)
with penalty λRF and loadings lRF,j . Let IRF be the set of selected terms.
3. Post-Model Selection Estimation. Set IPD = IFS ∪ IRF and let q̃(z) =
[qjL (z)]j∈IPD . Estimate α0 with α
b based on least squares regression14 of y
on [x, q̃(z)].
Appendix A contains details about one possible method for choosing λFS , λRF
as well as lFS,j ,lRF,j . Arguments in [15] show that the choices of tuning parameters given in Appendix A are sufficient to guarantee a centered Gaussian sampling
distribution of α
b for α0 .
The simplest generalization of Post-Double Selection is to expand the first stage
selection step into K steps. More precisely, for k = 1, ..., K, perform Lasso regression of pkK (x) on q L (z), and set IFS,k as the selected terms. Then define
15
IFS = ∪K
This
k=1 IFS,k and continue to the reduced form and estimation steps.
approach has a few disadvantages. First, the selected variables can depend on
the particular dictionary pK (x). Ideally, the first stage model selection should be
approximately invariant to the choice of pK (x).
14In [15] heteroskedasticity-consistent standard errors are used for inference.
15A previous draft of this paper took this approach. Deriving theoretical results for this
approach requires stronger sparsity assumptions than required here.
9
ADDITIVELY SEPARABLE
Instead, consider a general class of test functions ΦK = {ϕ}. Concrete classes for
test functions are provided below. In the first stage in Post-Nonparametric Double
Selection, a Lasso step of ϕ(x) on q L (z) is performed for each ϕ ∈ ΦK .
Algorithm 2. Post-Nonparametric Double Selection
1. First Stage Model Selection Step. For each ϕ ∈ ΦK , perform Lasso regression ϕ(x) on q L (z) with penalty λϕ and loadings lϕ,j . Let Iϕ,L be the
selected terms. Let IΦK = ∪ϕ∈ΦK Iϕ,L be the union set of selected terms.
2. Reduced Form Model Selection Step. Perform Lasso regression y on q L (z)
with penalty λRF and loadings lRF,j . Let IRF be the set of selected terms.
3. Post-Model Selection Estimation. Set IΦK +RF = IΦK ∪ IRF . Estimate θ0
using θb based on the reduced dictionary
(p̃(x), q̃(z)) = (pK (x), [qjL (z)]j∈IΦK +RF ).
The following are several concrete, feasible options for ΦK . The first option is
named the Span option. This option is suggested for practical use and is the main
option in the simulation study as well as in the empirical example that follow.
ΦK, Span = {ϕ(x) ∈ LinSpan(pK (x)) : var(ϕ(x)) 6 1}.
The theory in the subsequent section is general enough to consider other options
for ΦK which might possibly be preferred in different contexts. Three additional
examples are as follows.
ΦK, Graded = {p11 (x)} ∪ {p12 (x), p22 (x)}... ∪ {p1K (x), ..., pKK (x)}
(1)
(1)
(m)
(m)
ΦK, Multiple = {p1K (x), ..., pKK (x)} ∪ ... ∪ {p1K (x), ..., pKK (x)}}
ΦK, Simple = {p1K (x), ..., pKK (x)}.
Appendix A again contains full implementation details for the Span option. This
includes one possible method for choosing λϕ , lϕ,j as well as lFS,j ,lRF,j which yield
favourable model selection properties. Discussion of the most important details is
given in the text below. The analysis in the next section gives conditions under
which θb attains a centered Gaussian limiting distribution.
Choosing ΦK optimally is an important problem, which is similar to the problem of dictionary selection.16 The Span option, ΦK, Span is used in the simulation
study as well as in the empirical example, since it performed well in initial simulations. Note that the definition of the set ΦK, Span depends on a population
quantity var(ϕ(x)) which may be unknown to the researcher. Note however, that
the identities of the covariates selected in the Lasso-based procedure described in
the appendix are invariant to rescaling of the left-hand side variable. The invariance
16The question of which option for Φ is optimal is likely application dependent. In order to
K
maintain focused, this question is not considered in detail in this paper but might be of interest
for future work.
10
DAMIAN KOZBUR
is a consequence of the method for choosing penalty loadings. Therefore, replacing the condition supx∈X kϕ(x)k2 6 1 with var(ϕ(x)) 6 1 is possible. The option
ΦK, Simple is the direct extension of Post Double Selection as given in [15]. The
set ΦK, Multiple corresponds to using multiple dictionaries, indexed (1), ..., (m) in
the notation above. For example ΦK, Multiple could include the union of B-splines,
orthogonal polynomials, and trigonometric polynomials, all in the first stage selection. The ΦK, Graded is appropriate when dictionaries are not nested with respect
to K. These include B-splines.
In order to set up a practical choice of penalty levels, the set proposed above,
ΦK is considered as a union17 :
ΦK,Span = ΦK 1 ∪ ΦK 2 ∪ ΦK 3
where
ΦK 1 = {x}
ΦK 2 = {p1K (x), ..., pKK (x)}
ΦK 3 = {ϕ(x) ∈ LinSpan(pK (x)) : var(ϕ(x)) 6 1}.
The reason then for decomposing ΦK,Span in this way is allow the use of different
penalty levels on each of the three sets ΦK 1 , ΦK 2 , ΦK 3 . In particular, λΦK 1 is the
penalty for a single heteroskedastic Lasso as described in [8]. λΦK 2 is a penalty
which adjusts for the presence of K different Lasso regressions with K → ∞. The
main proposed estimator sets λΦK3 = λΦK2 . This is less conservative than the
penalty level would be following [10] for a continuum of Lasso estimations.18 As
a result, any corresponding Lasso performance bounds do not hold uniformly over
ΦK3 . Rather the implied bounds hold only uniformly over any pre-specified K
element subsets of ΦK3 . The high-level model selection assumption below (see Assumption 10) indicates that these bounds are sufficient for the present purpose. In
the simulation study, a more conservative (higher) choice for λΦK3 is also considered. In terms of inferential quality, there is no noticeable difference between the
two choices of penalties in the data generating processes considered in the simulation study. As discussed above, penalty levels accounting for a set of different
Lassos estimated simultaneously must be higher to ensure quality estimation. This
leads to higher shrinkage bias. The above decomposition therefore addresses both
concerns about quality estimation and shrinkage bias by allowing smaller penalty
levels to be used on subsets of ΦK,Span . Because the decomposition is into a fixed,
finite number of terms (ie. into 3 terms), such an estimation strategy presents no
additional theoretical difficulties.
Another practical difficulty with this approach is computational. It is infeasible
to estimate a Lasso regression for every ϕ indexed by a continuum. Therefore, some
approximation must be made. The reference [10] gives suggestions for estimating a
continuum of Lasso regressions using a grid. This may be computationally expensive if K is even moderately large. An alternative heuristic approach is motivated
by the observation that qjL is selected into IΦK only when there is ϕ ∈ ΦK such
that j ∈ Iϕ,L . In the context of estimating θ0 , only the identity of selected terms is
17Some dictionaries pK (x) may not contain a term p
kK (x) = x. In this case, ϕ(x) = x can
be appended to ΦK . In addition, after rescaling, ΦK 1 ⊆ ΦK 2 ⊆ ΦK 3 is possible, and so the sets
have nonempty intersection. This causes no additional problems.
18Note, the normalization that kϕ(x)k 6 1 ensures that Φ
2
K3 is indexed by a compact set and
so λΦK 3 can chosen as described in [10] to account for a continuum of Lassos.
11
ADDITIVELY SEPARABLE
important (not their coefficients). For the implementation in this paper, a strategy
for approximating IΦK is adopted where for each j 6 L, a Lasso regression is run
using exactly one test function, ϕ̌j ∈ ΦK . The choice of ϕ̌j is made based on being
likely to select qjL relative to other ϕ ∈ ΦK . Specifically, for each j, ϕ̌j is set to
the linear combination of p1K , ..., pKK with highest marginal correlation to qjL .
Then the
S approximation to the first stage model selection step proceeds by using
IˇΦK = j6L Iϕ̌j (x) in place of IΦK . This is also detailed in the appendix.
The formal theory in the subsequent sections proceeds by working with a notion
of density of ΦK within a broader space of approximating functions for g(x). Aside
from added generality, working in this manner is helpful since it adds structure to
the proofs and it isolates exactly how the density of ΦK interacts with the final
estimation quality for θ0 .
4. Formal Theory
In this section, additional formal conditions are given which guarantee convergence and asymptotic normality of the Post-Nonparametric Double Selection.
There are undoubtedly many aspects of the estimation strategy that can be analyzed. These include important choices of tuning parameters and K.
The following definition helps characterize smoothness properties of target function g0 and approximating functions pK . Let g be a function on X. Define the
Sobolev norm |g|d = supx∈X max|c|6d |∂ |c| g/∂xc | where the inner maximum ranges
over multi-indeces c.
Assumption 3 (Regularity for pK ). For each K, there is a nonsingular matrix
BK such that the smallest eigenvalue of the matrix
ΩBK pK = E BK pK (x)(BK pK (x))0
is bounded uniformly away from zero in K. In addition, there is a sequence of
constants ζ0 (K) satisfying supx∈X kBK pK (x)k2 6 ζ0 (K) and n−1 ζ0 (K)2 K → 0 as
n → ∞.
Assumption 4 (Approximation of g0 ). There is an integer d > 0, a real number
αg0 > 0, and a sequence of vectors βg0 ,K which depend on K such that |g0 −
0
pK βg0 ,K |d = O(K −αg0 ) as K → ∞.
Assumptions 3 and 4 would be identical to Assumptions 2 and 3 from [45] if
there was no conditioning variable z present. These assumptions require that the
dictionary pK has certain regularity and can approximate g0 at a pre-specified rate.
The quantity ζ0 (K) is dictionary specific, and can be explicitly calculated in certain
cases. For instance, [45] gives that ζ0 = O(K 1/2 ) is possible for B-splines. Note
that values of αg0 can be derived for particular d, pK , and classes of functions
containing g0 . [45] also gives explicit calculation of αg0 for the leading cases when
pK (x) are power series and regression splines.
The next assumption quantifies the density of ΦK within LinSpan(pK ). In order
to do so, define the following. Let
ρ(g, ΦK ) =
inf
kg >1, η=(η1 ,...,ηkg )∈Rkg ,ϕ1 ,...,ϕkg ∈ΦK
LαZ sup |g(x) − ϕ(x)| + kηk1 .
x∈X
12
DAMIAN KOZBUR
Assumption 5 (Density of ΦK ). Each ϕ ∈ ΦK satisfies var(ϕ(x)) 6 1. There is
a constant αρ > 0 such that
sup
ρ(g, ΦK ) = O(K αρ ).
{g∈LinSpan(pK ): var(g(x))61}
There is nothing special about the constant 1 in var(ϕ(x)) 6 1. It is mainly a
tool for helping describe the density of ΦK . In addition, as mentioned above, the
set selected by Lasso as described in the appendix is invariant to rescaling of the
left-hand side variable. As a result, imposing restrictions on var(ϕ(x)) is without
loss of generality.
The density assumption is satisfied with αρ = 0 if the ΦK = ΦK,Span is used
since in that case, ρZ (g, ΦK ) is bounded uniformly in g. On the other hand, the
density assumption may only be satisfied with αρ = 1/2 or higher for the basic
ΦK Simple = {p1K (x), ..., pKK (x)} option.
The next assumptions concern sparse approximation properties of q L (z). Two
definitions are necessary before stating the assumption. First, a vector X is called
s-sparse if |{j : Xj 6= 0}| 6 s. Next, let πqL denote the linear projection operator. More precisely, for a square integrable random variable v, πqL v is defined
by πqL v(z) = q L (z)0 βv,L for βv,L such that E[(v − q L (z)0 βv,L )2 ] is minimized. For
functions ϕ of x such that ϕ(x) is square integrable, write βϕ,L = βϕ(x),L .
Assumption 6 (Sparsity). There is a sequence s0 > 1 and a constant αZ > 0 such
that the following hold.
1. There is a sequence of vectors βh0 ,L,s0 that are s0 -sparse with support S0
such that supz∈Z |h0 (z) − q L (z)0 βh0 ,L,s0 | = O(L−αZ ).
2. For all ϕ ∈ ΦK there are vectors βϕ,L,s0 that are s0 -sparse, all with common
support S0 , such that
sup sup |πqL ϕ(z) − q L (z)0 βϕ,L,s0 | = O(L−αZ ).
ϕ∈ΦK z∈Z
Assuming a uniform bound for the sparse approximation error for h0 is potentially stronger than necessary. At the moment of the writing of the manuscript, the
author sees
Pnno theoretical obstacle in terms of working under the weaker assumption n−1 i=1 |h0 (zi )−q L (zi )0 βh0 ,L,s0 |2 = Op (L−αZ ). In addition, the L−αZ rate is
imposed in order to maintain a parallel exposition relative to the O(K −αg0 ) term.
Other rates, for instance n−αZ , can also replace L−αZ , and this is done in [15], [8]
and other references.19 The same comment holds for the sparse approximation
conditions for ϕ ∈ ΦK .
Several references in the prior econometrics literature work with sparse approximation of the conditional expectation rather than the linear projection. In this
context, working with the conditional expectation places a higher burden on the
approximating dictionary q L . In particular, If the conditional expectation of ϕ(x)
given z can be approximated using s0 terms from q L , then the conditional expectation of ϕ(x)2 may potentially require O(s20 ) terms to approximate once interactions
are taken into account. This potentially requires the dictionary q L to contain a
prohibitively large amount of interaction terms. For this reason, the conditions in
this paper are cast in terms of linear projections.20
19using n−αZ is only more general if L grows faster than every polynomial of n.
20The author sees no theoretical obstructions in terms of applying the same arguments for
Lasso bounds in [8] without the conditional expectation assumption. The key ingredient in that
ADDITIVELY SEPARABLE
13
The next assumption imposes limitations on the dependence between x and z.
For example, in the case that ϕ(x) = x is an element of pK (x), this assumption
states that the residual variation after a linear regression of x on z is non-vanishing.
More generally, the assumption requires that population residual variation after
projecting pkK (x) away from z is non-vanishing uniformly K, L. One consequence
of Assumption 7 is that constants cannot be freely added to both g0 (x) and h0 (z).
This therefore requires the user to enforce a normalization condition like g0 (0) = 0
or E[g0 (x)] = 0. The simulation study and empirical illustration below both enforce
g0 (0) = 0.
Assumption 7 (Identifiability). For each K and for BK as in Assumption 3, the
matrix E[BK (pK (x)−πqL pK (z))(BK (pK (x)−πqL pK (z)))0 ] has eigenvalues bounded
uniformly away from zero in K, L. In addition, supz∈Z kBK πqL pK (x)k2 6 ζ0 (K).
The next condition restricts the sample Gram matrix of the second dictionary.
A standard condition for nonparametric estimation is that for a dictionary P , the
Gram matrix n−1 P 0 P eventually has eigenvalues bounded away from zero uniformly
in n with high probability. If K +L > n, then the matrix n−1 [P Q]0 [P Q] will be rank
deficient. However, in the high-dimensional setting, to assure good performance of
Lasso, it is sufficient to only control certain moduli of continuity of the empirical
Gram matrix. There are multiple formalizations of moduli of continuity that are
useful in different settings, see [17], [59] for explicit examples. This paper focuses
on a simple condition that seems appropriate for econometric applications. In particular, the assumption that only small submatrices of n−1 Q0 Q have well-behaved
eigenvalues will be sufficient for the results that follow. In the sparse setting, it
is convenient to define the following sparse eigenvalues of a positive semi-definite
matrix M :21
δ0 M δ
δ0 M δ
,
κ
(m)(M
)
:=
max
κmin (m)(M ) := min
max
2
2 .
16kδk0 6m kδk2
16kδk0 6m kδk2
In this paper, favorable behavior of sparse eigenvalues is taken as a high level
condition and the following is imposed.
Assumption 8 (Sparse Eigenvalues). There is a sequence sκ = sκ (n) such
that sκ → ∞ and such that the sparse eigenvalues obey κmin (sκ )(n−1 Q0 Q)−1 =
O(1) and κmax (sκ )(n−1 Q0 Q) = O(1) with probability 1 − o(1).
The assumption requires only that sufficiently small submatrices of the large p × p
empirical Gram matrix n−1 Q0 Q are well-behaved. This condition seems reasonable
and will be sufficient for the results that follow. Informally it states that no small
subset of covariates in q L suffer a multicollinearity problem. They could be shown
to hold under more primitive conditions by adapting arguments found in [9] which
build upon results in [57] and [49]; see also [48].
Pn
L
L
argument is that expression
i=1 q (zi )(πq L (zi ) − q (zi )βϕ,L ) stays suitably small. Note this
expression is a sum of mean zero independent random variables in the present context.
21In the sparse eigenvalue definition, k · k refers to the number of nonzero components of a
0
vector ( · ).
14
DAMIAN KOZBUR
Assumption 9 (High-Level Model Selection Performance). There are constants
αIΦ and αΦ and bounds
1. |IΦK | 6 K αIΦ O(s0 )
Pn
2. supϕ∈ΦK i=1 (q L (zi )0 (βϕ,L,s0 − βbϕ,L,Post-Lasso ))2 = O(K αΦ s0 log(L))
3. |IRF | = O(s0 )
Pn
L
0
2
b
4.
i=1 (q (zi ) (βy,L,s0 − βy,L,Post-Lasso )) = O(s0 log(L))
which hold with probability 1 − o(1).
The standard Lasso and Post-Lasso estimation rates when there is only one
outcome considered are s0 log(L) for the sum of the squared prediction errors, and
O(s0 ) for the number of selected covariates. Therefore, K αΦ is a uniform measure
of the loss of estimation quality stemming from the fact that Lasso estimation is
performed on all ϕ ∈ ΦK rather than just on a single outcome. Similarly, K αIΦ
measures the number of unique j selected in all first stage Lasso estimations. The
choice to present high-level assumptions is for generality - so that other model
selection techniques can also be applied. However, verification of the high level
bounds are available under additional regularity for Lasso estimation.
One reference on performance bounds for a continuum of Lasso estimation steps
is [10]. In that paper, the authors provide formal conditions (specifically Assumption 6.1) and prove that Statement 2 of Assumption 9 holds. The bounds in that
reference correspond to taking αΦ = 1/2. An important note is that the conditions
in [10] are slightly more stringent since the authors assume that βϕ,L,s0 and βy,L,s0
can be taken to approximate the conditional expectation of ϕ(x) and y given z
rather than just the linear projection. When |ΦK | finite, but grows only polynomially with n and L > n, αΦ = 0 is possible under further regularity conditions.
The main theoretical difficulty in verifying Assumption 9 using primitive conditions is in showing that the size of the set IΦK stays suitably small. [10] prove certain
performance bounds for a continuum of Lasso estimates under the assumption that
dim ΦK is fixed and state that their argument would hold for certain sequences
dim ΦK → ∞. [10] also proves that the size of the supports of the Lasso estimates,
|Iϕ,L | stay bounded uniformly by a constant multiple of s0 which does not depend
on n or ϕ. They do not, however, prove that the size of the union | ∪ϕ∈ΦK Iϕ,L |
remains similarly bounded. Therefore, their results do not imply a the existence
of a finite value of αIΦ . The later bound is required for the analysis of the above
proposed estimator. For a finite approximation to ΦK,Span (like ΦK, Simple ), there
is no difficulty calculating bounds on the total number of distinct selected terms.
This is because under regularity conditions standard in the literature, each Iϕ,L
satisfies |Iϕ,L | 6 O(s0 ) where the implied constants in the O(s0 ) terms can be
bounded uniformly over ϕ ∈ ΦK . In particular, when ΦK is finite, it is possible to
take K αIΦ = |ΦK |. This paper does not derive a bound for |IΦK, Span | as this would
likely lie outside the scope of this project. A valid alternative for which verifiable
bounds on the union of selected covariates is possible is to report estimates using
(
ΦK, Simple on the event that |IΦK, Span | > t(n)
b
ΦK =
ΦK, Span otherwise.
for some increasing threshold function t of n.
ADDITIVELY SEPARABLE
15
When {g ∈ LinSpan(pK ) : var(g(x)) 6 1} coincides with ΦK , so that ΦK is as
dense as possible, then Assumption 9 can be weakened in the following.
Assumption 10 (Alternative High-Level Model Selection Performance ). Suppose
that {g ∈ LinSpan(pK ) : var(g(x)) 6 1} ⊆ ΦK . Let ΦK 0 ⊂ ΦK be any nonrandom
fixed finite subset of at most K elements. There are constants αIΦ and αΦ and
bounds
1. |IΦK | 6 K αIΦ O(s0 )
Pn
(q L (zi )0 (βϕ,L,s − βbϕ,L,Post-Lasso ))2 = O(K αΦ s0 log(L))
2. sup
0
ϕ∈ΦK
i=1
0
3. |IRF | = O(s0 )
Pn
L
0
2
b
4.
i=1 (q (zi ) (βy,L,s0 − βy,L,Post-Lasso )) = O(s0 log(L))
which hold with probability 1 − o(1).
Assumption 10 is weaker than Assumption 9. However, Assumption 9 can be
more easily verified with primitive conditions by using finite sets ΦK .
Statements 2-4 can be attained under standard conditions with αΦ = 0 provided
a penalty adjusting for K different Lasso estimations is used. On the other hand,
using a conservative penalty as in [10] for the continuum of Lasso estimations like
in ΦK,Span would result in αΦ = 1/2. There is currently no proof that Statement
1 with αIΦ = 0 and Statement 2 with αΦ = 0 can hold simultaneously under
conditions standard in the econometrics literature.
It is interesting to note that the requirements to satisfy Assumption 10 are essentially pointwise bounds on the predictive performance of a set of Lasso estimations
along with a uniform bound on the identity of selected covariates. By contrast, [10]
prove uniform bounds on Lasso estimations along with pointwise bounds on the
identity of selected covariates. In practice, verification of the Condition 1 in Assumption 10 could be potentially very useful. This would allow the researcher to
use a penalty level which is smaller by a factor of K 1/2 , and would ultimately allow
more robustness without increasing variability of the final estimator.
For the choice of penalty parameters given in Appendix A for the Span option,
Conditions 2-4 of Assumption 10 can be verified under further regularity conditions like those given in [10] or [8] to yield αΦ = 0. Furthermore, Condition 1
b K mentioned on the previous
of Assumption 10 can be verified if an option like Φ
page is used. Most importantly, Assumption 10 serves a plausible high-level model
selection condition which is sufficient for proving the results that follow.
The next assumption describes moment conditions needed
Pn by applying certain
laws of large numbers, for instance for the quantities n−1 i=1 ε2i qjL (zi )2 .
Assumption 11 (Moment Conditions). The following moment conditions hold.
1. E[qjL (z)2 [BK (pK (x) − πqL pK (z))]2k ] is bounded away from zero uniformly
in K, L
2. E[|qjL (z)|3 ] is bounded uniformly in L
3. E[qjL (z)2 ε2 ] is bounded away from zero uniformly in L
4. E[|qjL (z)|3 |ε|3 ] is bounded uniformly in L.
The first statement of the assumption may also be seen as a stricter identifiability condition condition on the residual variation pK (x) − πqL pK (z). It rules
out situations where for instance x 6= 0 ⇔ qjL (z) = 0. Note that E[[BK (pK (x) −
πqL pK (z))]2k ] = 1 is given by the identifiability assumption. No direct assumption
16
DAMIAN KOZBUR
is needed about the corresponding third moment E[[BK (pK (x) − πqL pK (z))]3k ] = 1
since instead a reference to the bound ζ0 (K) is used.
The final assumption before the statement of Theorem 1 are rate conditions.
Assumption 12 (Rate Conditions). The following rate conditions hold.
1. s0 K αIΦ = o(sκ )
2. log(KL) = o(ζ0 (K)−1 n1/3 )
3. L−αZ n1/2 K −1/2 ζ0 (K) = O(1)
4. L−2αZ K 2αρ (K 1/2 n1/2 ζ0 (K)−1 + n1/2 + K log(L)1/2 ζ0 (K)−2 ) = O(1)
5. n−1/2 K 1/2 s0 log(L)ζ0 (K)−1 (K 2αρ +αΦ + K αρ +αΦ /2+αIΦ /2 ) = O(1)
1/2
1/2
6. n−1/2 s0 log(L)(K 2αρ +αΦ s0 + K αIΦ /2 ) = O(1).
The first statement ensures that the sparse eigenvalues remain well-behaved in
the with high probability over sets whose size is larger that the selected covariates. The second statement is used in conjunction with the above moment conditions to allow the use of moderate deviation bounds following [37]. The third
and fourth conditions are assumption on the sparse approximation error for q L (z).
The final two assumptions restrict the size of s0 and K and quantities depending on αρ , αΦ , and αIΦ relative to n. These assumptions can be unraveled for
certain choices of dictionaries. For example, as was noted above and by [45], for
B-splines, ζ0 (K) can be taken to be O(K 1/2 ). Using the simple option gives αρ = 1,
αΦ = 0 and αIΦ = 1. Then the conditions can be reduced to L−αZ n1/2 = O(1),
L−2αZ K 2 n1/2 = O(1), n−1/2 K 2 s0 log(L) = O(1).
The first result is a preliminary result which gives bounds on convergence rates
for the estimator gb. They are used in the course of the proof of Theorem 1 below, the
main inferential result of this paper. The proposition is a direct analogue of the rates
given in Theorem 1 of [45] which considers estimation of a conditional expectation g0
without model selection over a conditioning set. The rates obtained in Proposition
1 match the rates in [45]. To state it, let F0 be the distribution function of the
random variable x. In addition, let ζd (K) = max|c|6d supx∈X k∂ |c| BK pK (x)/∂xc k2 .
Theorem 1. Under Assumptions 1-8, 9 or 10, and 11-12, the Post-Nonparametric
Double Selection estimate gb for the function g0 satisfies the following bounds.
Z
(b
g (x) − g0 (x))2 dF0 (x) = Op (n−1 K + K −2αg0 ).
|b
g − g0 |d = Op (n−1/2 ζd (K)K 1/2 + K −αg0 ).
The next formal results concern inference for θ0 = a(g0 ). Recall that θ0 , is
estimated by θb = a(b
g ) and inference is conducted via the estimator Vb as described
in earlier sections.
Assumption 13 (Moments for Asymptotic Normality). E[ε4+δ |x, z] is bounded for
some δ > 0. var(ε|x, z) is bounded away from zero.
Note that the conditions in [45] require only that E[ε4 |x, z] is bounded. The
strengthened condition is needed for consistent variance estimation, in order to
construct a bound on the quantity maxi6n ε2i .
The following assumptions on the functional a are imposed. They are regularity
assumptions that imply that a attains a certain degree of smoothness. For example,
they imply that a is Fréchet differentiable.
ADDITIVELY SEPARABLE
17
Assumption 14 (Differentiability for a). The real valued functional a(g) ∈ R
is either linear or the following conditions hold. n−1 ζd (K)4 K 2 → 0. There is a
linear function D(g; ǧ) that is linear in g and such that for some constants C, ν >
0 and all ǧ, ǧˇ with |g − g0 |d < ν, |ǧ − g0 |d < ν, |ǧˇ − g0 |d < ν, it holds that
|a(g) − a(ǧ) − D(g − ǧ; ǧ)| 6 C(|g − ǧ|d )2 and |D(g; ǧ) − D(g; ǧˇ)| 6 C|g|d |ǧ − ǧˇ|d .
The function D is related to the functional derivative of a. The following assumption imposes further regularity on the continuity of the derivative. For shorthand,
let D(g) = D(g; g0 ).
The next rate conditions is used to ensure that estimates are undersmoothed.
The rate condition ensures that the estimation bias, which is heuristically captured
by K −αg0 , converges to zero faster than the estimation standard error.
Assumption 15 (Undersmoothing Rate Condition). n1/2 K −αg0 = o(1).
The next rate condition is used in order to bound quantities appearing in the
proof of Theorem 2. As was demonstrated in the case of Assumption 12, the rate
conditions can be unraveled for certain choices of K, pK , and ΦK .
Assumption 16 (Rate Conditions for Asymptotic Normality).
1. L−2αZ K 2αρ (ζ0 (K)K + ζ0 (K)4 K 1−2αρ + K log(L) + n1/2 ) = o(1)
2. n−1 s0 ζ0 (K) log(L)(K 1+2αρ +αΦ + K 1+αρ +αΦ /2+αIΦ /2 ) = o(1)
3. n−1 s20 log(L)2 (K 4αρ +2αΦ + K 2αρ +αΦ +αIΦ ) = o(1)
4. s0 K αIΦ n−1/2 ζ0 (K)K 1/2 + K −αg0 = o(1)
5. n2/(4+δ) ζ0 (K)n−1/2 K 1/2 = o(1).
The final two conditions divide the cases considered into two classes. The first
class (covered by Assumption 17) are functionals which fail to be mean-square differentiable and therefore cannot be estimated at the parametric n1/2 rate. The
second class (covered by Assumption 18) does attain the n1/2 rate. One example
with the functional of interest is evaluation of g at a point x0 : a(g) = g(x0 ). In this
case, a fails to be estimated that the parametric n1/2 rate in general
circumstances.
R
A second example is the weighted average derivative a(g) = w(x)∂g(x)/∂x for
a weight function w which satisfies regularity conditions. The Assumption 18
holds if w is differentiable, vanishes outside a compact set, and the density of x
is bounded away from zero wherever w is positive. In this case, a(g) = E[ψ(x)g(x)]
for ψ(x) = −φ(x)−1 ∂w(x)/∂x by a change of variables provided that x is continuously distributed with non vanishing density φ. These are one possible set
of
√ sufficient conditions under which the weighted average derivative does achieve
n-consistency.
Assumption 17 (Regularity for a in Absence of Mean-Square Differentiability).
There is a constant C̄ > 0 such that |D(g)| 6 C̄|g|d . There is β̄ dependent on K
0
such that for ḡ(x) = p(x)K β̄, it holds that E[ḡ(x)2 ] → 0 and D(ḡ) > C̄ > 0.
Assumption 18 (Conditions for n1/2 -Consistency). There is ψ(x) such that
E[ψ(x)2 ] finite and nonzero and such that D(g) = E[ψ(x)g(x)] and D(pkK ) =
0
E[ψ(x)pkK (x)] for every k. There is β̆ such that E[(ψ(x) − p(x)K β̆)2 ] → 0. Fi2
nally, the matrix V̄ = E[ψ(x) var(y|x, z)] is finite and nonzero.
Theorem 2 now establishes the validity of standard inference procedure after
model selection as well as validity of the plug in variance estimator.
18
DAMIAN KOZBUR
Theorem 2. Under Assumptions 1-8, 9 or 10, 11-17, the Post-Nonparametric
Double Selection estimate for the function θ0 satisfies
θb = θ0 + Op (n−1/2 ζd (K)).
In addition,
d
n1/2 V −1/2 (θb − θ) → N(0, 1)
and
d
n1/2 Vb −1/2 (θb − θ) → N(0, 1).
Under Assumptions 1-8, 9 or 10, 11-16, and 18,
d
n1/2 (θb − θ) → N(0, V̄ ) and
p
V − V̄ → 0.
5. Simulation study
The results stated in the previous section suggest that Post-Nonparametric Double Selection series estimation should exhibit good inferential properties for additively separable conditional expectation models when the sample size n is large. The
following simulation study is conducted in order to illustrate the implementation
and study the performance of the outlined procedure.
The simulation study is divided into two parts. The first part compares several
alternative estimators to Post-Nonparametric Double Selection. The second part
compares several Post-Nonparametric Double Selection estimates using different
choices for ΦK . This part demonstrates finite sample benefits from using the Span
option relative to the direct generalization of Post-Double Selection estimation (ie.
using the Simple option).
The following process generates the data in each simulation.
y = g0 (x) + h0 (z) + ε
2
g0 (x) = 10 sin(0.1x) − 0.5 sin(4πx4−x )
h0 (z) = z 0 βh0 ,L , βh0 ,L,j = −0.5 · (−0.65)j−1 1j6s0
zj ∼ N(0, 1), corr(zj1 , zj2 ) = 0.25|j1 −j2 |
ε ∼ N(0, 1)
x = 0.15v + 0.0375 − 3.75(stair(z 0 γ0 + v) + 0.375)FN(0,1) (10zs0 )...
+ 3.75(stair(0.5(z 0 γ0 + v)|z 0 γ0 + v|0.25 )(1 − FN(0,1) (10zs0 ))
γ0,L,j = −1.5(−0.75)j−1 1j6s0
v ∼ N(0, 1)
stair( · ) = 0.25
tanh(12( · )/2.5) − 12b( · )/2.5c − 6
.
2 tanh(6) + 0.5 + b( · )/2.5c
The study performs simulations for n ∈ {100, 150, ..., 500}. Two settings for the
parameter L are considered: L = n/2 and L = 2n. Finally, the sparsity level is set
to s0 = 6. Within each data generating process, 1000 simulation replications are
performed.
ADDITIVELY SEPARABLE
19
The data generating process is quite complicated. It is designed in order to create
correlations between the covariates z and various transformations of x. This allows
the data generating process to highlight many different statistical problems which
can arise using Nonparametric-Post Double Selection and alternative estimation
techniques all in one simulation study. Despite the complicated formulas for the
joint distribution of x and z, their realizations appear natural. Scatter plots of one
sample of n = 500 showing the respective bivariate distributions between z1 , ..., z6
and x are provided in Figure 6. Figure 5 provides a picture of the graph of g0 .
The simulations evaluate estimation of g0 and of θ0 defined by
θ0 = E[g00 (x)].
In order to avoid further complications, for each replication, the expectation and
thus true θ0 are calculated against the empirical distribution of x within that simulation replication.22
The first part of the simulation study considers the performances of five estimators23 for g0 and θ0 . Each estimator is a reduced series estimator based on initial
dictionaries consisting of a cubic spline expansion pK (x) for g0 (x) and a linear
expansion q L (z) = z for h0 (z).
1. Oracle. Estimator 1 is infeasible and sets q̃(z) = (z1 , .., zs0 ). This estimator serves as a benchmark for comparison to estimates in which the correct
support is known.
2. Span Post-Nonparametric Double. Estimator 2 selects q̃(z) using
Post-Nonparametric Double Selection with Φk given by the Span option,
as described in this paper.
3. Naive. Estimator 3 selects q̃(z) in one model selection step by performing
Lasso of y on q L (z).
4. OLS. Estimator 4 uses q̃(z) = z. In other words, this estimator does not
reduce the dictionary. This estimation strategy is only calculated provided
L < n.
5. Targeted Undersmoothing. Estimator 5 implements an alternative inferential procedure for dense functionals of high-dimensional parameters;
TU(1). This procedure was proposed in [30] and is described further below.
22Another possibility is to calculate against the population expectation of x. Under the assumption that the researcher knows the population distribution of x, this causes no further complication. If the distribution of x is unknown and estimated, this must however be taken into
account.
23
There are likely other sensible estimators beyond the 5 considered in the simulation section.
As pointed out by an anonymous reviewer, such estimators may include propensity score matching
on a continuous variable. Though such an approach may work well, the context here is not exactly
the same as usually seen in propensity score matching. In particular, the assumptions here do not
require unconfoundedness conditions. In addition, propensity score techniques are most commonly
applied to discrete treatement variables. There is some work on propensity score matching with a
continuous treatment; for example, see [35], who require the estimation of the conditional density
of treatment. In the high-dimensional setting, estimating the conditional density of x given z
would likely introduce complications beyond the scope of this paper.
20
DAMIAN KOZBUR
Detailed implementation descriptions are provided in Appendix A. For each
of the above estimators, the choice of pK (x) is made using a data-dependent
rule. First, an initial dictionary reduction q initial (z) is selected. For Oracle,
q initial (z) = (z1 , .., zs0 ). For the Span Post-Nonparametric Double and Naive estimators, q initial (z) is based on Lasso of y on q L (z) as implemented in Appendix A.
For OLS, q initial (z) = z. Next, BIC is used to choose a B-spline expansion pK (x).
Comparison of estimators 1-4 is standard in the post-model selection econometrics literature. The oracle estimator should be seen as a benchmark which is known
to provide good estimates if the true set, S0 , was known. The Naive estimator is
expected to perform poorly since it is not a uniformly valid estimator and susceptible to size-distortions arising from model selection mistakes. OLS is expected to
perform poorly due to potential problems related to overfitting.
Estimator 5 is a procedure called Targeted Undersmoothing which looks to correct distortions in inference from model selection mistakes. Targeted Undersmoothing appends covariates which significantly affect the value of the functional θb = a(b
g)
to an initially selected model (see [30]). It is appropriate for functionals of highdimensional models which depend on a growing number of parameters (dense functionals) and is therefore a potentially sensible procedure for inference for θ0 . This
estimator is detailed further in Appendix A.
The simulation results report several quantities which measure the performance
b bias
of each estimator. The results report standard deviation of the estimates θ,
of the estimates for θ0 , confidence interval length for estimates for θ0 , rejection
frequencies under the null for θ0 at the 5% level, mean number of series terms K
used, mean number of series terms selected from the original L, and integrated
squared error for g0 . The simulation results are reported in Figure 1 for L = n/2
and Figure 2 for L = 2n. The figures display the above mentioned simulation results
for each n = 100, ..., 500 with n changing over the horizontal axis.24 Note also that
across some of the estimators, some of the reported quantities will be identical. For
example, the point estimates for TU are identical to the Naive point estimates. The
selected K is identical for the Naive estimates as well as the Post-Nonparametric
Double Selection estimates.
In all of the simulations, the Post-Nonparametric Double Selection estimates
behave similarly to the Oracle estimates. The OLS estimates have wide confidence
intervals relative to the Post-Nonparametric Double Selection estimation, but have
similar coverage properties. The final estimator, Targeted Undersmoothing (TU),
is conservative in terms of coverage, with substantially larger intervals in every case.
On the other hand, the Naive estimator has poor coverage properties. For the
Naive estimator, after failing to control for the correct covariates, the increase in K
leads to an increasing bias. This highlights the fact that simply producing undersmoothed estimates of g0 by increasing K may not be adequate for reducing bias
and making quality statistical inference possible in the high-dimensional setting.
24Note that since s , the magnitude of coefficients β
0
h0 ,L and the joint distribution between
relevant covariates are all fixed in the simulations as n → ∞. Therefore, for sufficiently large n, all
relevant covariates would be identified with high probability, and all of the post-model selection
estimators would perform similarly. This simulation study therefore is identifying differences in
finite sample performance.
ADDITIVELY SEPARABLE
21
Figure 1. Simulation Results
This figure presents simulation results for the estimation of g0 and θ0 in the cases
n = 100, 150, ..., 500 with s0 = 6 and L = n/2 according to the data generating process described
in the text. Estimates are presented for the five estimators, Oracle, Post-Nonparametric Double
(PND Span), Naive, OLS and Targeted Undersmoothing (TU) as described in the text. The first
plot shows standard deviation of the respective estimates for θ0 . The second plot shows bias of
the estimates for θ0 . The third plot shows confidence interval length for estimates for θ0 . The
fourth plot shows rejection frequencies under the null for θ0 for a 5% level test. The fifth plot
shows the mean number of series terms K used. The sixth plot shows the mean number of series
terms from L selected. The seventh plot shows root mean integrated squared error for g0 .
Figures are based on 1000 simulation replications. n is always indexed by the horizontal axis.
22
DAMIAN KOZBUR
Figure 2. Simulation Results
This figure presents simulation results for the estimation of g0 and θ0 in the cases
n = 100, 150, ..., 500 with s0 = 6 and L = 2n according to the data generating process described
in the text. Estimates are presented for the four estimators, Oracle, Post-Nonparametric Double
(PND Span), Naive, and Targeted Undersmoothing (TU) as described in the text. The first plot
shows standard deviation of the respective estimates for θ0 . The second plot shows bias of the
estimates for θ0 . The third plot shows confidence interval length for estimates for θ0 . The fourth
plot shows rejection frequencies under the null for θ0 for a 5% level test. The fifth plot shows the
mean number of series terms K used. The sixth plot shows the mean number of series terms
from L selected. The seventh plot shows root mean integrated squared error for g0 . In each plot,
the horizontal axis denotes sample size n. Figures are based on 1000 simulation replications. n is
always indexed by the horizontal axis.
ADDITIVELY SEPARABLE
23
The second part of the simulation study compares four Post-Nonparametric Double Selection estimators which use different specifications for ΦK .
1. Span Post-Nonparametric Double. Estimator 1 is identical to the Span
Post-Nonparametric Double estimator in the first part of the simulation.
2. Conservative Span Post-Nonparametric Double. Estimator 2 uses
pK and ΦK as in the Span option, but in the decomposition ΦK,Span =
ΦK 1 ∪ ΦK 2 ∪ ΦK 3 , the penalty applied to ΦK 3 is more conservative, explicitly aimed at achieve Lasso performance bounds which hold uniformly over
all of ΦK .
3. Simple Post-Nonparametric Double. Estimator 3 uses pK as in the
Span, but uses ΦK = ΦK, Simple .
4. Alternative Spline Basis Simple Post-Nonparametric Double. Estimator 4 uses a different basis for selection. A QR decomposition is applied
to P in order to obtain orthonormal columns. Next, ΦK = ΦK, Simple is
used on the new orthogonalized data. Importantly, the new P spans the
same K-dimensional linear space in Rn as in the 3 previous estimators.
The estimates for the second part of the simulation are presented in Figures 3-4.
Note that all estimators are identical with regards to K, hence only one curve is
visible in the corresponding plots. In addition, the Conservative Span and Span
estimators have very similar performance in terms of standard deviation, bias, interval length, rejection frequency, and integrated squared error. The two estimators
are practically indistinguishable except in terms of the number of elements of q L
they select. They do not give numerically identical estimates or confidence intervals.
However, their differences are too small to be seen in Figures 3-4.
There are noticeable differences in the performance of the estimators. The Span
option is able to identify the highest number of relevant covariates, followed by
the Conservative Span option, the Simple option, and the Alternative Spline Basis
Simple option. The Span, Conservative Span, and Simple Post-Nonparametric
Double Selection procedures exhibit favorable finite sample properties for this data
generating process. In particular, for those estimators, the calculated rejection
frequencies move towards 5% as n increases.
By contrast, the Alternative Spline Basis Simple Post-Nonparametric Double
Selection procedure has very poor finite sample performance. It is unlikely that the
projection of the new orthogonalized basis onto q L has a good sparse representation.
This causes increased model selection mistakes in the first stage. Unlike in the
partially linear model, these mistakes can accumulate to cause more severe bias
since the number of first stage selection steps is growing with K. Note that the
Alternative Spline Basis estimator has similar performance to the Naive estimator
in the first part of the simulation study.
The Span and the Conservative Span options offer an opportunity to potentially
add additional robustness. These options select more variables than the Simple
option. There is no evidence from this simulation study that using the Span option
over-selects conditioning variables to the extent that rejection frequencies become
severely distorted or variability increases to an undesirable level.
24
DAMIAN KOZBUR
Figure 3. Simulation Results
This figure presents simulation results for the estimation of g0 and θ0 in the cases
n = 100, 150, ..., 500 with s0 = 6 and L = n/2 according to the data generating process described
in the text. Estimates are presented for four Post-Nonparametric Double Selection (PND)
estimators, Simple, Span, Conservative Span, and Alternative Spline Simple as described in the
text. The first plot shows standard deviation of the respective estimates for θ0 . The second plot
shows bias of the estimates for θ0 . The third plot shows confidence interval length for estimates
for θ0 . The fourth plot shows rejection frequencies under the null for θ0 for a 5% level test. The
fifth plot shows the mean number of series terms K used. The sixth plot shows the mean
number of series terms from L selected. The seventh plot shows root mean integrated squared
error for g0 . In each plot, the horizontal axis denotes sample size n. Figures are based on 1000
simulation replications. n is always indexed by the horizontal axis.
ADDITIVELY SEPARABLE
25
Figure 4. Simulation Results
This figure presents simulation results for the estimation of g0 and θ0 in the cases
n = 100, 150, ..., 500 with s0 = 6 and L = 2n according to the data generating process described
in the text. Estimates are presented for the four Post-Nonparametric Double Selection (PND)
estimators, Simple, Span, Conservative Span, and Alternative Spline Simple as described in the
text. The first plot shows standard deviation of the respective estimates for θ0 . The second plot
shows bias of the estimates for θ0 . The third plot shows confidence interval length for estimates
for θ0 . The fourth plot shows rejection frequencies under the null for θ0 for a 5% level test. The
fifth plot shows the mean number of series terms K used. The sixth plot shows the mean
number of series terms from L selected. The seventh plot shows root mean integrated squared
error for g0 . In each plot, the horizontal axis denotes sample size n. Figures are based on 1000
simulation replications. n is always indexed by the horizontal axis.
26
DAMIAN KOZBUR
Figure 5. Simulation study: g0
This figure depicts the function g0 used in the simulation study.
Figure 6. Simulation study: joint covariate distribution
This figure depicts the joint distribution between x and the first s0 = 6 covariates
as described in the above text. The plots are generated by one sample of size
n = 500.
ADDITIVELY SEPARABLE
27
Figure 7. GDP Growth Results
6. Empirical Example: GDP Growth
This section applies Post-Nonparametric Double Selection to an international
economic growth example. The data comes from the Barro and Lee [6] dataset
which contains a panel of 138 countries for the period of 1960 to 1985. This example
was also considered in [13], who apply Lasso techniques in the context of a highdimensional linear model for the purpose of locating important variables which
are predictive of GDP growth rates. This considers growth in GDP per capita as
a dependent variable y for the period 1965-85. The growth rate in GDP over a
period from t1 to t2 is commonly defined as log(GDPt2 /GDPt1 ).
Studying the factors that influence growth in GDP is a problem of central importance in economics. A difficulty with studying this problem empirically on a
cross-country level is that the number of observations is limited by the total number of countries. At the same time, the number of potential factors which influence
GDP growth can be large. This leads naturally to the need to regularize econometric estimation on any data on a cross-section of countries. This example specifically
studies the relation between initial GDP level and subsequent GDP growth in the
presence of a large number of other determinants of GDP growth. The interest in
studying this particular question is in testing the fundamental macroeconomic theory of convergence. Convergence predicts that countries with high initial GDP will
show lower levels of GDP growth, and conversely countries with low initial GDP
will show higher levels of GDP growth. There are many references for assumptions
which imply such convergence. See [1] and references therein.
This analysis considers a model with p = 62 covariates, which allows for a total of
n = 90 complete observations. Since p is comparably large relative to n, dimension
reduction in this setting is necessary. The goal here is to select a subset of these
covariates and briefly compare the resulting to predictions made in the growth
literature (see [7], [6] ). [24] and [6] contain complete definitions and discussion of
each of these variables. The estimated model is given by the specification
28
DAMIAN KOZBUR
yi = g0 ( log(GDPi ) − log(GDPi ) ) + h0 (zi ) + εi
where log(GDPi ) denotes the sample mean. The observed covariates enter linearly,
so that the expansion h0 (zi ) = zi1 β1 + .... + zi62 β62 is assumed.
The estimation is performed using cubic splines as detailed in Appendix A. g0
is normalized so that g0 (0) = 0. Estimates of several density-weighted average
derivatives of the effect of initial GDP on GDP growth are constructed using PostNonparametric Double Selection and are presented in Table 1. In addition, a scatter
plot of the primary variables of interest as well as an estimate of g0 are shown in
Figure 7.
A nonlinear specification for g0 allows testing of several hypotheses related to the
convergence of GDP. These include the hypothesis that conditional convergence can
depend on initial GDP. This is related to the idea of a poverty trap where countries
with smaller initial GDP exhibit less convergence (ie. the relationship between
initial GDP and GDP growth may be locally flat; see the reference text [1] for
additional background and details.) Conditional convergence could also imply that
at the high end of the initial GDP distribution, GDP growth is locally flat. The
existence of conditional convergence based on initial GDP can be tested by using a
nonlinear specification for g0 . In order to study the overall convergence, the data is
divided into quartiles. An average derivative is then estimated within each quartile.
In addition, an overall average derivative is estimated over the support of all initial
GDP observations. The respective average derivatives are then compared.
Estimates based on Post-Nonparametric Double Selection are presented in Table 1. The estimate for the overall weighted average derivative is -0.042 (std. err.
= 0.014, p = 0.003).25 The estimate is negative and statistically significant. This
result is consistent with convergence theory. In addition, the density-weighted average derivative is calculated for various smaller ranges of initial GDP. The empirical
distribution of initial GDP is divided into quartiles. Estimates for the weighted
average derivatives are calculated within each quartile. The estimated average
derivatives are 0.013 (std. err. = 0.022, p = 0.568) for Q1 , -0.042 (std. err. =
0.025, p = 0.087) for Q2 , -0.100 (std. err. = 0.041, p = 0.015) for Q3 , -0.062
(std. err. = 0.027, p = 0.022) for Q4 . The test of the hypothesis that the average
derivative in Q1 is equal to the average derivative over Q2 , Q3 , Q4 rejects the null
at the 5% level (p = 0.009, t stat. = -2.632). The test of the hypothesis that the
average derivative in Q4 is equal to the average derivative over Q1 , Q2 , Q3 fails to
reject the null at the 5% level (p = 0.908, t stat. = -0.115). The overall average
derivative estimate is negative and statistically significant. These estimates also
agree with and thus support the previous findings reported in [24], [6], [7], which
relied on ad-hoc reasoning for covariate selection. In addition, the analysis supports
the claim that conditional convergence is nonlinear in initial GDP, being flatter for
countries with lower initial GDP.
25p-values are calculated against a two-sided alternative for the null that the average derivative
is 0.
29
ADDITIVELY SEPARABLE
Table 1. Estimation Results for GDP Example.
Estimates
( S. E. )
[
95% C. I.
]
Average Derivative
-0.042
(0.014)
[ -0.070 -0.014 ]
Quartile-Specific Average Derivative
Q1
Q2
Q3
Q4
-0.013
-0.042
-0.100
-0.062
(0.022)
(0.025)
(0.041)
(0.027)
[
[
[
[
-0.031 0.056 ]
-0.090 0.006 ]
-0.182 -0.019 ]
-0.115 -0.009 ]
Additional Selected Variables
•
•
•
•
•
•
•
Life expectancy
Average schooling years in female population over age 25
Infant mortality rate
Female gross enrollment ratio for secondary education
Male gross enrollment ratio for secondary education
Total fertility rate
Population proportion under 15
Additional Hypothesis Tests
H0 : ave. deriv. (Q1 ) = ave. deriv. (Q2 -Q4 )
p-value = .009
t-statistic = -2.632
H0 : ave. deriv. (Q4 ) = ave. deriv. (Q1 -Q3 )
p-value = .9084
t-statistic = 0.115
Note. Post-Nonparametric Double Selection estimates with
b = 7.
B-spline basis. K
7. Conclusion
This paper considers the problem of selecting a conditioning set in the context of
nonparametric regression. Convergence rates and inference results are provided for
series estimators of a primary component of interest in additively separable models
with high-dimensional conditioning information. The finite sample performance of
several Post-Nonparametric Double Selection estimators are evaluated in a simulation study. Overall, the proposed Span option has good estimation and inferential
properties in the data generating processes considered.
30
DAMIAN KOZBUR
Appendix A. Implementation Details
A.1. Lasso Implementation Details.
A.1.1. Lasso implementation given penalty λ. In every case, penalty loadings `j are
chosen as described in [8] with one small modification. The procedure suggested in
[8] requires an initial penalty loadings which are constructed using initial estimates
= yi followed by an iterative
of regression residuals. Their suggestion is to use εbinitial
i
procedure. Here, instead, εbinitial
are
taken
as
the
linear
regression residuals after
i
regressing the outcome v on the 5 most marginally correlated qjL , ie, the 5 which
have the highest |corr(v,
d qjL (z)|. Such modification was also used in [30].
A.1.2. Penalty level choice for single outcome. In every case when a single outcome variable is considered in isolation (this includes the reduced form selection
step and the selection step corresponding to ΦK 1 ), Lasso is implemented with
penalty λ as described in [8]. For ease of reference, note that [8] suggest λ given by
−1
2cLasso FN(0,1)
(1 − αLasso /L) where cLasso > 1, αLasso → 0 are tuning parameters. In
every instance in this paper, cLasso = 1.01 and αLasso = .05 are used.
A.1.3. Penalty level choice for ΦK,Simple . In this case, K Lasso regressions are run
−1
simultaneously. In this case, for all ϕ ∈ ΦK , λ is given by 2cLasso FN(0,1)
(1 −
αLasso /L) where cLasso = 1.01 and αLasso = .05/K are used.
A.1.4. Penalty level choice and implementation for ΦK,Span . When the Span option
is used, ΦK,Span is decomposed ΦK, Span = ΦK 1 ∪ ΦK 2 ∪ ΦK 3 . Each component has
a corresponding penalty level applied to all ϕ within that component. On the first
−1
component, λΦK 1 = 2cLasso FN(0,1)
(1 − αLasso /L) where cLasso = 1.01 and αLasso =
−1
.05. On the second component, λΦK 2 = 2cLasso FN(0,1)
(1 − αLasso /L) where cLasso =
−1
(1 −
1.01 and αLasso = .05/K. On the third component, λΦK 3 = 2cLasso FN(0,1)
αLasso /L) where cLasso = 1.01 and αLasso = .05/K.
The following procedure is used for approximating IΦK in the case that a component of ΦK contains a continuum of test functions. For each j 6 L, a Lasso
regression ϕ̌j ∈ ΦK3 which is more likely to select qjL(z) than other ϕ ∈ ΦK .
Specifically, for each j, ϕ̌j is set to the linear combination of p1K , ..., pKK with
highest marginal correlation to qjL . Then the approximation to the first stage
S
model selection step proceeds by using IˇΦK 3 = j6L Iϕ̌j (x) in place of IΦK 3 .
A.1.5. Penalty level choice for ΦK,Span-Conservative . When the Conservative Span
option is used, ΦK, Span-Conservative is decomposed ΦK, Span-Conservative = ΦK 1 ∪
ΦK 2 ∪ ΦK 3 . Each component again has a corresponding penalty level applied to
−1
all ϕ within that component. On the first component, λΦK 1 = 2cLasso FN(0,1)
(1 −
αLasso /L) where cLasso = 1.01 and αLasso = .05. On the second component, λΦK 2 =
−1
2cLasso FN(0,1)
(1 − αLasso /L) where cLasso = 1.01 and αLasso = .05/K. On the third
−1
component, λΦK 3 = 2cLasso FN(0,1)
(1 − αLasso /L) where cLasso = 1.01K 1/2 and
αLasso = .05.
In order to approximate the variables selected on the continuum of Lasso estimates indexed by ΦK 3 , the identical procedure with the Span option above is used.
Note that the only difference between the Conservative Span option and the Span
option is in λΦK 3 .
ADDITIVELY SEPARABLE
31
A.2. pK Implementation Details.
In every simulation and in the empirical example, pK is constructed using a cubic
B-spline expansion. For fixed K, the approximating dictionary is chosen according
to the following procedure. Knots points t1 , ..., tK−3 are chosen according to the
following rule. Set
tmax = quantile0.95 (|x1 |, ..., |xn |) and tmin = −tmax .
Let ∆k = tk − tk−1 . For constants c1 , c2 > 0 set
∆k = c1 + c2 |(K − 2)/2 − k|
for k = 2, ..., K − 3.
The constants c1 , c2 serve to insert more knot points where the density of x
is higher. The choices for c1 , c2 are determined uniquely by the condition that
c1 = 2c2 and that the endpoints satisfy t1 = tmin and tK−3 = tmax . Next, the
B-spline formulation used here is given by the recursive formulation. Set
Bk,0 (x) = 1tk 6x<tk+1 .
Set Bk,0 = 0 for k outside of 1, ..., K − 3. In addition, for spline order o > 0,
tk+o+1 − x
x − tk
Bk,o−1 +
Bk+1,o−1 .
Bk,o (x) =
tk+o − tk
tk+o+1 − tk+1
Set (p1,K (x), ..., pK−3,K (x)) = (B1,3 (x), ...BK−3,3 (x)). The dictionary is completed
by adding the additional terms pK−2,K (x) = x, pK−1,K (x) = x2 , pK,K (x) = x3 .
b is chosen according to the following procedure. First, an initial set of terms
K
q initial (z) ⊆ q L (z) is selected. In each case, q initial (z) contains the terms IRF .
That is, the terms selected in a Lasso regression y on q L (z). Next, an initial value
b 0 6 2bn1/3 c is chosen to minimize BIC using (pK (x), q initial (z)). In the simulation
K
b 0 is constrained to be > 5. Finally, in order to ensure undersmoothing, K
b
study, K
b
b
is set to K = b(log10 (n))K0 c.
A.3. Targeted Undersmoothing Implementation Details. The following
procedure is used to estimate the Targeted Undersmoothing (TU; specifically
c K,I (θ0 ) be
TU(1); see [30]) confidence intervals for θ0 . For each I ⊆ {1, ..., p} let CI
the corresponding confidence interval for θ0 using K terms and the components of
q L corresponding to I. Then the full TU confidence interval is defined by the convex
cb
hull of ∪j6p CI
K,IRF ∪{j} (θ0 ). In this implementation, a truncated TU confidence incb
terval is calculated instead: ∪j62s CI
(θ0 ). This is done be the simulation
0
K,IRF ∪{j}
run time reduces to the order of a day (from the order of a month), and therefore
helps facilitate easier replicability. Changing the code to calculate the full TU confidence intervals is trivial. This also highlights that computing speed is another
advantage of the Post-Nonparametric Double procedure relative to TU in certain
settings. In terms of approximation error, the full TU estimator was implemented
for the case n = 100, p = 50 for 1000 replications. The full TU confidence intervals
as well as the truncated TU confidence intervals each made 9 false rejections. In
addition, the average interval length for the full TU intervals was 1.740 while the
average interval length for the truncated TU intervals was 1.722. Therefore, the
truncated and full TU confidence intervals show very similar performance in this
instance.
32
DAMIAN KOZBUR
Appendix B. Proofs
B.1. Preliminary Setup and Additional Notation. Throughout the course of
the proof, as much reference as possible is made to results in [45], [15]. This is done
in order to maximize clarity and to present a better picture of the overall argument.
In many cases, appealing directly to arguments in [45] is possible because many of
the bounds required for deriving asymptotic normality for series estimators depend
only on properties of gb, g0 , pK and D. Less direct appeal to bounds in the original
Post-Double Selection argument is possible, since those arguments do not track K,
and do not have notions of quantities stemming from ΦK like αρ , αΦ . However, the
main idea of decomposing pK into components in the span of, and orthogonal to
q L , remains as a theme throughout the proofs.
For any function ϕ, let ϕ(X) denote the vector [ϕ(x1 ), ϕ(x2 ), ..., ϕ(xn )]0 . Similarly, let φqL ϕ(Z) = [πqL ϕ(z1 ), πqL ϕ(z2 ), ..., πqL ϕ(zn )]0 . In addition, define the
following quantities.
1. Let m be the n × K matrix m = πqL pK (Z) = [πqL p1K (Z), ..., πqL pKK (Z)]
3. Let W = P − m
b = n−1 P 0 M̃ P
4. Let Ω
5. Let Ω = n−1 E[W 0 W ]
6. Let Ω̄ = n−1 W 0 W
7. Let m be partitioned m = [m1 , ..., mK ]
8. Let W be partitioned m = [W1 , ..., WK ]
9. For any ϕ, let Rϕ = Q(βϕ,L − βϕ,L,s0 )
10. Let Ry = Q(βy,L − βy,L,s0 )
11. For any ϕ, let Uϕ = ϕ(X) − Qβϕ,L
12. Let Uy = Y − Qβy,L
13. Let F = V −1/2
14. Let ϕa (x) be the function such that πqL ϕa (Z) = F A0 m
15. Let ma = F A0 m
16. Let Wa = ϕa (X) − ma .
Assume without loss of generality that BK = IdK , the identity matrix of order
K. The reason this is without loss of generality is that dictionary pK is used only
in the post-selection estimation, while ΦK is used for first stage model selection. In
addition, assume without loss of generality that Ω = IdK .
Throughout the exposition, there is a common naming convention for various
regression coefficients. Quantities of the form βbv,I always denotes the sample regression coefficients from regressing the variable v on the components specified
by I. This implies that the quantities βbϕ,Iϕ,L = βbϕ,L,Post-Lasso are equivalent,
since the specified components being regressed on are the same. In addition,
βbϕ,IΦK +RF = βbϕ,q̃ = βbϕ(X),IΦK +RF are equivalent. Next, quantities of the form
βv,L and βv,L,s0 without a hat accent are population quantities and are defined in
the text above.
ADDITIVELY SEPARABLE
33
B.2. Preliminary Lemmas.
Lemma 1. Under the assumptions of Theorem 1,
1. J1 := maxk6K n−1/2 kQ0 Wk k∞ = Op ( log(KL)1/2 )
2. J2 := n−1/2 kQ0 Ek∞ = Op ( log(L)1/2 )
0
3. J3 := n−1/2 kRm
Ek2 = Op ((KK αρ L−αZ ))
4. J4 := n−1/2 kRh0 0 W k2 = Op ( n1/2 ζ0 (K)L−αZ )
5. J5 := maxk6K n−1/2 kMmk k2
1/2
= Op ( n−1/2 K αρ K αΦ /2 s0 log(L)1/2 + L−αZ K αρ )
1/2
6. J6 := n−1/2 kMh0 (Z)k2 = Op ( n−1/2 K αρ K αΦ /2 s0 log(L)1/2 + L−αZ K αρ )
7. J7 := maxk6K kβbmk ,IΦK +RF − βpkK ,L,s0 k1
= Op ( n−1/2 K αρ K αΦ /2 s0 K αIΦ /2 log(L)1/2 + L−αZ K αρ )
8. J8 := kβbh0 ,IΦK +RF − βh0 ,L,s0 k1
= Op ( n−1/2 K αρ K αΦ /2 s0 K αIΦ /2 log(L)1/2 + L−αZ K αρ )
1/2
9. J9 := maxk6K kβbWk ,IΦK +RF k1 = Op ( n−1/2 s0 K αIΦ /2 log(KL)1/2 )
1/2
10. J10 := kβbE,IΦK +RF k1 = Op ( n−1/2 s0 K αIΦ /2 log(L)1/2 )
11. J11 := n−1/2 kQ0 Wa k∞ = Op ( log(KL)1/2 )
0
Ek2 = Op ((KK αρ L−αZ ))
12. J12 := n−1/2 kRm
a
1/2
13. J13 := n−1/2 kMma k2 = Op ( n−1/2 K αρ K αΦ /2 s0 log(L)1/2 + L−αZ K αρ )
14. J14 := kβbma ,IΦK +RF − βϕa ,L,s0 k1
= Op ( n−1/2 K αρ K αΦ /2 s0 K αIΦ /2 log(L)1/2 + L−αZ K αρ )
1/2
15. J15 := kβbWa ,IΦK +RF k1 = Op ( n−1/2 s0 K αIΦ /2 log(KL)1/2 )
0
15. J16 := n−1 kRm
W kF = Op (K 1/2 ζ0 (K)K αρ L−αZ ).
Proof.
Statement
1.
By Lemma 5 of [15],
|Q0 Wk |
are sufficient for maxk6Kj6L √Pn j
2
i=1
E[|qjL (z)|3 |Wik |3 ]1/3
2 ]1/2
E[qjL (z)2 Wik
−1 1/3
maxk6K,j6L
two conditions which together
2
qjL (zi ) Wki
= Op ((log KL)1/2 ) are that
= O(ζ0 (K)) and the rate condition log KL =
2 1/2
o(ζ0 (K) n ). Note that E[qjL (z)2 Wik
]
is bounded away from zero by assumption. In addition, by Hölder’s inequality, E[|qjL (z)|3 |Wik |3 ] 6 E[|qjL (z)|3 ]ζ0 (K)3 .
34
DAMIAN KOZBUR
This implies that the first condition holds. The second condition is given in the
assumptions.
Statement 2. Follows similarly as Statement 1.
Statement 3. This statement follows directly from the fact that E[ε|x, z] = 0,
0
E[ε2 |x, z] bounded, along with dim(Rm
E) = K and kRmk k∞ = O(L−αZ ), allowing
the use of the K-dimensional Chebyshev Inequality.
P
Statement 4. kRh0 0 W k2 = k i Rh0 ,i Wi k2 6 O(L−αZ )ζ0 (K) by the facts that
Rh0 = O(L−αZ ) and kWi k2 6 ζ0 (K).
Statement 5.
First note that the following two hold.
1. For any ϕ ∈ ΦK , MπqL ϕ(Z) = MRϕ + M(Qβϕ,L,s0 − Qβbϕ,Iϕ,L ).
2. For any g ∈ LinSpan(pK ), and any corresponding expansion g = η1 ϕ1 +
... + ηkg ϕkg + rg with η1 , ...ηkg ∈ R, ϕ1 , ...ϕkg ∈ ΦK ,
kMπqL g(Z)k2 6 kηk1
max
ϕ∈{ϕ1 ,...,ϕkg }
kQβϕ,L,s0 − Qβbϕ,Iϕ,L k2 + kηk1 kRg k2 + krg (Z)k2 .
To show the first of the above two statements, for each ϕ ∈ ΦK , note that
MπqL ϕ(Z) = MMπqL ϕ(Z)
= M(πqL ϕ(Z) − PπqL ϕ(Z))
= M(Qβϕ,L − P(ϕ(X) − Uϕ ))
= M(Qβϕ,L − Qβbϕ,IΦK +RF + PUϕ )
= MRϕ + M(Qβϕ,L,s0 − Qβbϕ,IΦK +RF ) + MPUϕ
= MRϕ + M(Qβϕ,L,s0 − Qβbϕ,IΦK +RF )
= MRϕ + M(Qβϕ,L,s0 − Qβbϕ,Iϕ,L ) + M(Qβbϕ,Iϕ,L − Qβbϕ,IΦK +RF )
{z
}
|
= M(PIϕ,L ϕ(X) − Pϕ(X))
= MP(PIϕ,L ϕ(X) − ϕ(X))
=0
⇒ MπqL ϕ(Z) = MRϕ + M(Qβϕ,L,s0 − Qβbϕ,Iϕ,L ).
This establishes the first claim. Now turn to the second claim. Note that using
the density assumption, there are ϕ1 , ..., ϕkg and a vector η = (η1 , ..., ηkg ) such that
g = η1 ϕ1 + ... + ηkg ϕkg + rg for some remainder rg , sufficiently small. Then
kMπqL g(Z)k2 = kη1 MπqL ϕ1 (X) + ... + ηkg MπqL ϕkg (Z) + MπqL rg (Z)k2
Next, looking at each ϕ in the above expansion (ie each ϕ ∈ {ϕ1 , ..., ϕkg }) and
combining the above expression gives
35
ADDITIVELY SEPARABLE
kMπqL g(Z)k2 = kη1 MRϕ1 + η1 M(Qβϕ1 ,L,s0 − Qβbϕ1 ,Iϕ1 ) + ...
... + ηkg MRϕkg + ηkg M(Qβϕkg ,L,s0 − Qβbϕkg ,Iϕk ) + MπqL rg (Z)k2 .
g
Applying Hölder’s inequality and the fact that M is a projection (and hence
non-expansive) gives the bound
6 kηk1
max
ϕ∈{ϕ1 ,...,ϕkg }
kQβϕ,L,s0 − Qβbϕ,Iϕ,L k2 + kηk1 kRg k2 + krg (Z)k2 .
These can then be applied directly to n−1/2 kMmk k2 . Under Assumption 9, note
that for mk , the corresponding η and Rmk satisfy kηk1 6 O(K αρ ) and kRmk k2 6
n1/2 O(L−αZ K αρ ). Then we have the bound
1/2
kMπqL g(Z)k2 = Op (K αρ K αΦ /2 s0
log(L)1/2 + n1/2 L−αZ K αρ ).
Under Assumption 10, note that for each mk , taking η = 1 and Rmk = 0 are
feasible by assumption. The result follows.
Statement 6.
n−1/2 kMh0 (Z)k2 = n−1/2 kM(Qβh0 ,L,s0 + Rh0 )k2 )
6 n−1/2 (kMQβh0 ,L,s0 k2 + kMRh0 k2 )
6 n−1/2 (kMQ(βg0 ,L,s0 + βh0 ,L,s0 − Qβg0 ,L,s0 )k2 + kMRh0 )k2
= n−1/2 (kM(Qβy,L,s0 − Qβg0 ,L,s0 )k2 + kMRh0 k2 )
6 n−1/2 (kMQβy,L,s0 k2 + kMQβg0 ,L,s0 k2 + kMRh0 k2 )
= n−1/2 (kMπqL y(Z)k2 + kMπqL g0 (Z)k2 + kMRh0 k2 )
The first two terms above, n−1/2 (kMQπqL y(Z)k2 + n−1/2 kMπqL g0 (Z)k2 ), are
1/2
Op (K αρ K αΦ /2 n−1/2 s0 log(L)1/2 +L−αZ K αρ ) by the same reasoning as Statement
−1/2
6. In addition n
kMRh0 k2 6 n−1/2 kRh0 k2 = O(L−αZ ) by assumption. This
gives
1/2
n−1/2 kMh0 (Z)k2 = Op (K αρ K αΦ /2 n−1/2 s0
log(L)1/2 + L−αZ K αρ ).
36
DAMIAN KOZBUR
Statement 7.
kβbmk ,IΦK +RF − βpkK ,L,s0 k1
6 |IΦK +RF |1/2 kβbmk ,IΦK +RF − βpkK ,L,s0 k2
1/2
= |IΦK +RF |1/2 (βbmk ,IΦK +RF − βpkK ,L,s0 )0 (βbmk ,IΦK +RF − βpkK ,L,s0 )
1/2
6 |IΦK +RF |1/2 Op (1) (βbmk ,IΦK +RF − βpkK ,L,s0 )0 (Q0IΦ +RF QIΦK +RF /n)(βbg,IΦK +RF − βpkK ,L,s0 )
K
= |IΦK +RF |1/2 Op (1)n−1/2 kPmk − QβpkK ,L,s0 k2
= |IΦK +RF |1/2 Op (1)n−1/2 kmk − Mmk − QβpkK ,L,s0 k2
= |IΦK +RF |1/2 Op (1)n−1/2 k − Mmk + Rmk k2
6 |IΦK +RF |1/2 Op (1)(J5 + O(L−αZ ))
1/2
= Op (s0 K αIΦ /2 )(J5 + O(L−αZ ))
αIΦ /2+1/2
= Op (s0
1/2
)Op (K αρ K αΦ /2 s0
log(L)1/2 + n1/2 L−αZ K αρ )
= Op (K αρ K αΦ /2 s10 K αIΦ /2 log(L)1/2 + n1/2 L−αZ K αρ ).
Statement 8. Proven analogously to Statement 7.
Statement 9.
max kβbWk ,IΦK +RF k1
k6K
= max k(Q̃0 Q̃)−1 Q̃0 Wk k1
k6K
6 ||IΦK +RF |1/2 max k(Q̃0 Q̃)−1 Q̃0 Wk k2
k6K
6
−1/2
|IΦK +RF |1/2 κmin (IΦK +RF |) max kn−1 Q0 Wk k∞
k6K
1/2
= Op (s0 K αIΦ /2 · 1 · n−1/2 log(KL)1/2 ).
Statement 10.
Proven analogously to Statement 9.
Statements 11-15.
Proven analogously to Statements 1,3,5,7,9.
Statement 16.
n−1
n
X
!1/2
Wi0 Rm,i
i=1
F
= n−1
X
kW 0 Rmk k22
k
!1/2
6 n−1
X
k
2
k
n2 ζ0 (K)2 kRm
k ∞
.
37
ADDITIVELY SEPARABLE
By the density assumption, kRmk k∞ 6 K αρ L−αZ . This then implies that
n
X
6 K 1/2 K αρ L−αZ .
n−1
Wi0 Rm,i
F
i=1
Lemma 2.
1. Ξ1 := n−1 kW 0 PW kF 6 n−1/2 KJ9 J1
2. Ξ2 := n−1 km0 MmkF 6 KJ52
3. Ξ3 := n−1 km0 MW kF 6 J16 + n−1/2 KJ7 J1
4. Ξ4 := n−1/2 km0 Mh0 (Z)k2 6 n1/2 K 1/2 J5 J6
5. Ξ5 := n−1/2 kW 0 Mh0 (Z)k2 6 J4 + K 1/2 J8 J1
6. Ξ6 := n−1/2 kW 0 PEk2 6 K 1/2 J9 J2
7. Ξ7 := n−1/2 km0 MEk2 6 J4 + K 1/2 J7 J2
8. Ξ8 := n−1/2 |m0a Mh0 (Z)| 6 n1/2 J5 J13
9. Ξ9 := n−1/2 |Wa0 Mh0 (Z)| 6 J12 + J14 J1
10. Ξ10 := n−1/2 |Wa0 PE| 6 J9 J11
11. Ξ11 := n−1/2 |m0a ME| 6 J12 + J7 J11 .
Proof.
Statement 1.
n−1 kW 0 PW kF
2
=
X
(n−1 Wk0 PWk̄ )2 =
k,k̄6K
=
X
0
(n−1 βbW
k ,IΦ
K +RF
Q0 Wk̄ )2
k,k̄6K
6
X
kn−1/2 βbWk ,IΦK +RF k21 kn−1/2 Q0 Wk̄ k2∞
k,k̄6K
=
X
kn−1/2 βbWk ,IΦK +RF k21
k6K
6K ·n
−1
X
k̄6K
J92
·K ·
J12
⇒ n−1 kW 0 PW kF 6 n−1/2 KJ1 J9 .
kn−1/2 Q0 Wk̄ k2∞
38
DAMIAN KOZBUR
Statement 2.
n−1 km0 MmkF
2
=
X
(n−1 m0k Mmk̄ )2 6
k,k̄6K
kn−1/2 Mmk k22 kn−1/2 Mmk̄ k22
k,k̄6K
2
=
X
X
kn−1/2 Mmk k22 6 K 2 J54
k6K
⇒ n−1 km0 MmkF 6 KJ52 .
Statement 3.
n−1 km0 MW kF = n−1 km0 W/n − m0 PW kF
0
= n−1 kRm
W + (QβpK ,L,s0 )0 W − m0 PW kF
0
= n−1 kRm
W + (QβpK ,L,s0 )0 W − (Qβbm,IΦK +RF )0 W kF
0
= n−1 kRm
W + (βpK ,L,s0 − βbm,IΦK +RF )0 Q0 W kF
0
6 n−1 kRm
W kF + n−1 k(βpK ,L,s0 − βbm,IΦK +RF )0 Q0 W kF .
0
W kF = J16 while
Then the first term in the last line is bounded above as n−1 kRm
the second term has
2
n−1 k(βpK ,L,s0 − βbm,IΦK +RF )0 Q0 W kF
X
= n−2
((βpk ,L,s0 − βbmk ,IΦK +RF )0 Q0 Wk̄ )2
k,k̄6K
6n
−2
X
kβpk ,L,s0 − βbmk ,IΦK +RF k21 kQ0 Wk̄ k2∞
k,k̄6K
= n−1
kβpk ,L,s0 − βbmk ,IΦK +RF k21
k6K
6n
−1
X
K·
J72
X
kn−1/2 Q0 Wk̄ k2∞
k̄6K
·K ·
J12 .
Therefore, n−1 km0 MW kF 6 J16 + n−1/2 KJ7 J1 .
Statement 4.
n−1/2 km0 Mh0 (Z)k2 6 n1/2 kn−1/2 Mh0 (Z)k2 K 1/2 max n−1/2 km0 Mk2
k6K
6n
1/2
K
1/2
J5 J6 .
39
ADDITIVELY SEPARABLE
Statement 5.
n−1/2 kW 0 Mh0 (Z)k2 = n−1/2 kW 0 h0 (Z) − W 0 Ph0 (Z)k2
= n−1/2 kW 0 h0 (Z) − W 0 Qβbh0 (Z),IΦK +RF k2
= n−1/2 kW 0 Rh0 + W 0 Qβh0 ,L,s0 − W 0 Qβbh0 (Z),IΦK +RF k2
= n−1/2 kW 0 h0 (Z)k2 + k(βbh0 (Z),IΦK +RF − β)0 Q0 W k2
6 J4 + K 1/2 max kβbh0 (Z),IΦK +RF − βh0 ,L,s0 k1 kn−1/2 Q0 Wk k∞
k6K
6 J4 + K
1/2
J8 J1 .
Statement 6.
2
X
(Wk0 PE)2
n−1/2 kW 0 PW k2 = n−1
k6K
=n
−1
X
0
(βbW
k ,IΦ
K +RF
Q0 E)2
k6K
6
X
kβbWk ,IΦK +RF k21 kn−1/2 Q0 Ek2∞
k6K
6 K · J92 · J22
⇒ n−1/2 kW 0 PEkF 6 K 1/2 J9 J2 .
Statement 7.
n−1/2 km0 MEk2 = n−1/2 km0 E/n − m0 PEkF
0
= n−1/2 kRm
E + (QβpK ,L,s0 )0 W − m0 PEkF
0
= n−1/2 kRm
E + (QβpK ,L,s0 )0 W − (Qβbm,IΦK +RF )0 Ek2
0
= n−1/2 kRm
E + (βpK ,L,s0 − βbm,IΦK +RF )0 Q0 Ek2
0
6 n−1/2 kRm
Ek2 + n−1/2 k(βpK ,L,s0 − βbm,IΦK +RF )0 Q0 Ek2 .
0
Then the first term in the last line is bounded above as n−1/2 kRm
Ek2 = J4 . Turning
to the second term,
2
n−1/2 k(βpK ,L,s0 − βbm,IΦK +RF )0 Q0 Ek2
X
= n−1
((βpk ,L,s0 − βbmk ,IΦK +RF )0 Q0 E)2
k6K
6
X
kβpk ,L,s0 − βbmk ,IΦK +RF k21 kn−1/2 Q0 Ek2∞
k6K
6 K · J72 · J22 .
Therefore, n−1/2 km0 MEk2 6 J4 + K 1/2 J7 J2 .
40
DAMIAN KOZBUR
Statements 8-11.
The argument is identical to the argument for Statements 4-7, adjusting appropriately for the fact that ma is 1-dimensional rather than K-dimensional.
The following corollaries follow directly from assumed rate conditions and the
above bounds. These are used in the proof of Theorems 1 and 2.
Corollary 1. Under the assumptions of Theorem 1,
1. Ξ1 + Ξ2 + Ξ3 = Op (n−1/2 ζ0 (K)K 1/2 )
2. n−1/2 (Ξ4 + Ξ5 + Ξ6 + Ξ7 ) = Op (n−1/2 K 1/2 + K −αg0 ).
Corollary 2. Under the assumptions of Theorem 2,
1. n−1/2 ζ0 (K)K 1/2 (Ξ4 + Ξ5 + Ξ6 + Ξ7 ) = op (1).
2. Ξ8 + Ξ9 + Ξ10 + Ξ11 = op (1).
B.3. Proof of Theorem 1.
Lemma 3.
b − ΩkF 6 Op (ζ0 (K)K 1/2 n−1/2 ) + Ξ1 + Ξ2 + Ξ3 = op (1)
1. kΩ
b
2. kΩ−1 − Ω−1 k2→2 = Op (ζ0 (K)K 1/2 n−1/2 ) + O(Ξ1 + Ξ2 + Ξ3 ).
Proof. The argument in Theorem 1 of [45] gives the bound kΩ̄ − ΩkF =
b =
OP (ζ0 (K)K 1/2 n−1/2 ). Next, using the decomposition, P = m + W , write Ω
0
0
0
0
0
(m + W ) M(m + W )/n = W W/n − W (Idn − M)W/n + m Mm/n + 2m MW/n.
b F 6 kW 0 PW/nkF + km0 Mm/nkF + k2m0 MW/nkF =
By triangle inquality, kΩ̄ − Ωk
Ξ1 + Ξ2 + Ξ3 . Bounds for each of the three above terms are established above along
b F = op (1). The last statement holds
with the assumed rate conditions give kΩ̄ − Ωk
by applying an expansion of the matrix inversion function around IdK .
b −1 = (IdK − (IdK − Ω))
b −1 = IdK + (IdK − Ω)
b + (IdK − Ω)
b 2 + ...
Ω
The sum given above is with probability → 1 absolutely convergent relative to the
b −1 −
Frobenius norm F. In addition, by the bound k · k2→2 6 k · kF , we have kΩ
2
1/2 −1/2
b
b
b
IdK k2→2 6 kΩ − IdK kF 6 kIdK − ΩkF + kIdK − ΩkF + ... = Op (ζ0 (K)K n
)+
O(Ξ1 + Ξ2 + Ξ3 ).
Note that since Ω has minimal eigenvalues bounded from below by assumption, it
b and Ω̄ are invertible with probability approaching 1. The reference
follows that Ω
b > 1/2} and later uses the fact that this
[45] works on the event 1n := {λmin (Ω)
event has probability → 1. This fact is used several times, however its use is only
implicitly in reference to arguments in [45].
b −1 n−1 P 0 MEk2 = Op (n−1/2 K 1/2 ).
Lemma 4. kΩ
Proof.
b −1 n−1 P 0 MEk2 6 kΩ
b −1 k2→2 n−1 kP 0 MEk2
kΩ
b −1 k2→2 (n−1 kW 0 Ek2 + n−1/2 Ξ6 + n−1/2 Ξ7 )
6 kΩ
kW 0 Ek2 = Op (n−1/2 K 1/2 = Op (n−1/2 ) by arguments in [45]. Bounds for n−1/2 Ξ6 +
n−1/2 Ξ7 follows from the previous Lemmas and from the assumed rate conditions.
ADDITIVELY SEPARABLE
41
b −1 P 0 M(g0 (X) − P βg ,K )/nk2 = Op (K −αg0 ).
Lemma 5. kΩ
0
Proof.
b −1 P 0 M(g0 (X) − P βg
kΩ
0 ,K
b −1 P 0 M(g0 (X) − P β)/n]1/2
)/nk2 = [(g0 (X) − P β)0 MP Ω
= Op (1)[(g0 (X) − P βg0 ,K )0 (g0 (Z) − P βg0 ,K )/n]1/2
= Op (K −αg0 )
b −1 P 0 M =
by assumption on (g0 (X) − P βg0 ,K ) and idempotency of MP Ω
0
−1
MP (P MMP ) M.
b −1 P 0 Mh0 (Z)/nk2 = op (n−1/2 ).
Lemma 6. kΩ
b has eigenvalues bounded below and above with probability approaching
Proof. Ω
1. Then,
b −1 P 0 Mh0 (Z)/nk2 6 Op (1)kP 0 Mh0 (Z)/nk2
kΩ
= Op (1)k(m + W )0 Mh0 (Z)/nk2
= n−1/2 Op (1)n−1/2 k(m + W )0 Mh0 (Z)/nk2
6 n−1/2 Op (1)(n−1/2 km0 Mh0 (Z)k2 + n−1/2 kW 0 Mh0 (Z)k2 )
= n−1/2 Op (1)(Ξ4 + Ξ5 )
= n−1/2 Op (1)op (1).
Lemma 7. kβbg − βg0 ,K k2 = Op (n−1/2 K 1/2 + K −αg0 ).
b −1 P 0 M b(g0 (X) −
b −1 P 0 ME + n−1 Ω
Proof. Note that ([βby,(p̃,q̃) ]g − βg0 ,K ) = n−1 Ω
I
−1 b −1 0
P βg0 ,K ) + n Ω P Mh0 (Z). Triangle inequality in conjuction with the bounds
described in the previous three lemmas give the result.
The final statement of Theorem 1 follows from the bound on kβbg − βg0 ,K k2 using
the arguments in [45].
B.4. Proof of Theorem 2. Recall that F = V −1/2 . Let ḡ = pK (x)0 βg0 ,K and
decompose the quantity n1/2 F [a(b
g ) − a(g0 )] by
n1/2 F [a(b
g ) − a(g0 )] = n1/2 F [a(b
g ) − a(g0 ) + D(b
g ) − D(g0 )
+ D(ḡ) − D(b
g)
+ D(g0 ) − D(ḡ)].
Lemma 8. n1/2 F [D(ḡ) − D(g0 )] = O(n1/2 K −αg0 ).
Proof. This follows from arguments given in the proof of Theorem 2 in [45]. Note
that the statement does not contain any reference to random quantities.
Lemma 9. |n1/2 F [a(b
g ) − a(g) − D(b
g ) + D(g)| = op (1).
Proof. Bounds on |b
g − g|d given by Theorem 1 imply that |n1/2 F [a(b
g ) − a(g0 ) −
D(b
g ) + D(g0 )| 6 Cn1/2 |b
g − g0 |2d = Op (n1/2 (n−1/2 ζd (K)K 1/2 + K −αg0 )2 ) = op (1).
This is again identical to the reasoning given in Theorem 2 in [45], since that
references uses only a bound on |b
g − g|d to prove the analogous result.
42
DAMIAN KOZBUR
The last step is to show that n1/2 F [D(b
g ) − D(ḡ)] →d N(0, 1).
Lemma 10. n1/2 F [D(b
g ) − D(ḡ)] →d N(0, 1).
Proof. Note that D(b
g ) can be expanded
K
b −1 n−1 P 0 MY )
D(b
g ) = D(p (x)0 [βby,(p̃,q̃) ]g ) = D(pK (x)0 Ω
b −1 n−1 P 0 M(g0 (X) + h0 (Z) + E))
= D(pK (x)0 Ω
b −1 n−1 (g0 (X) + h0 (Z) + E)
= D(pK (x))0 Ω
b −1 n−1 P 0 M(g0 (X) + h0 (Z) + E)
= A0 Ω
b −1 n−1 P 0 Mg0 (X) + A0 Ω
b −1 n−1 P 0 Mh0 (Z) + A0 Ω
b −1 n−1 P 0 ME.
= A0 Ω
In addition, D(ḡ) = D(pK (x)0 βg0 ,K ) = A0 βg0 ,K gives
b −1 n−1 P 0 Mg0 (X) − βg ,K ]
n1/2 F [D(b
g ) − D(ḡ)] = n1/2 F A0 [Ω
0
b −1 n−1 P 0 M(h0 (Z) + E)].
+ n1/2 F A0 [Ω
The above equation gives a decomposition of the right hand side into two terms,
which are next bounded separately. Before proceeding, note that the followb −1/2 k2 = Op (1),
b −1 k2 = Op (1), kF A0 Ω
ing bounds kF Ak2 = O(1), kF A0 Ω
0 −1
0 −1/2
kF A Ω k2 = Op (1), kF A Ω
k2 = O(1) all hold by arguments in [45]. Consider the first term.
b −1 P 0 Mg0 (X) − βg ,K ]|
|n1/2 F A0 [n−1 Ω
0
√
= | nF A0 [(P 0 MP/n)−1 P 0 M(G − P β)/n]|
√
b −1 P 0 M/ nk2 kg0 (X) − P βg ,K k2
6 kF A0 Ω
0
√
√
0 b −1 0
6 kF A Ω P M/ nk2 n max |g(xi ) − ḡ(xi )|
i6n
√
0 b −1/2
= kF A Ω
k2 n max |g(xi ) − ḡ(xi )|
i6n
√
0 b −1/2
6 kF A Ω
k2 n|g − ḡ|0
√
= Op (1)Op ( nK −α )
= op (1).
b −1 n−1 P 0 M(h0 (Z)+E). To handle this term, first bound
Next, consider n1/2 F A0 Ω
b −1 − Ω−1 )P 0 M(h0 (Z) + E)|
|n−1/2 F A0 (Ω
b −1 − Ω−1 )k2 kP 0 M(h0 (Z) + E)k2
6 n−1/2 kF A0 (Ω
b −1 − Ω−1 )k2 (n−1/2 kP 0 M(h0 (Z) + E)k2 )
= kF A0 (Ω
b −1 − Ω−1 )k2 (n−1/2 k(m + W )0 M(h0 (Z) + E)k2 )
= kF A0 (Ω
b −1 − Ω−1 )k2 (Ξ4 + Ξ5 + Ξ6 + Ξ7 )
6 kF A0 (Ω
b −1 − Ω−1 k2→2 kF A0 k2 (Ξ4 + Ξ5 + Ξ6 + Ξ7 )
6 kΩ
= op (1).
ADDITIVELY SEPARABLE
43
Next consider the last remaining term for which a central limit result will be shown.
√
nF A0 Ω−1 P 0 M(h0 (Z) + E)/n
√
= nF A0 Ω−1 (W + m)0 M(h0 (Z) + E)/n
√
= n(F A0 Ω−1 W + ma )0 M(h0 (Z) + E)/n
√
√
√
= nF A0 Ω−1 W ME + nm0a M(h0 (Z) + E)/n + nWa0 Mh0 (Z)/n
√
√
√
√
= nF A0 Ω−1 W E − nF A0 Ω−1 W PE + nm0a M(h0 (Z) + E)/n + nWa0 Mh0 (Z)/n
√
= nF A0 Ω−1 W 0 E/n + op (1).
bound in the equation
array above holds by the fact that
√
√ Note that the last√op (1)
0
0
W
PE+
nm
M(h
(Z)+E)/n+
nW
Mh0 (Z)/n| 6 Ξ8 +Ξ9 +Ξ10 +Ξ11 .
| nF A0 Ω−1
0
a
a
√
0 −1
0
The term nF A Ω W E/n satisfies the conditions Lindbergh-Feller Central Limit
Theorem, by arguments given in [45].
The previous three lemmas prove that n1/2 F [a(b
g ) − a(g0 )] → N(0, 1).
The next set of arguments bound Vb −V . For ν as in the statement of Assumption
b and u =
b −1 AF
14, Define the event Ag = {|b
g − g0 |d < ν/2}. Define u
b = 1A g Ω
P
−1
0 2
1Ag Ω AF . In addition, define Σ̄ = i Wi Wi εi /n, an infeasible sample analogue
of Σ.
Lemma 11.
b − Ak2 = op (1)
1. kA
2. kb
u − uk2 = op (1)
3. kΣ̄ − ΣkF = op (1)
4. |b
uΣ̄b
u−u
b0 Σb
u| = op (1).
Proof. Statement 1. In the case that a(g) is linear in g, then a(p0 β) = A0 β =⇒
b = A. Therefore, consider the case that a(g) is not linear in g. Using arguments
A
identical to those in [45], 1Ag = 1 with probability → 1, and
b − Ak2 6 C · ζd (K)|b
1Ag kA
g − g|d .
Statement 2. This follows from arguments in [45].
Statement 3. This follows from arguments in [45].
Statement 4. An immediate implication of Statement 3 is that 1Ag |b
uΣ̄b
u−u
b0 Σb
u| =
2
0
2
|b
u (Σ̄ − Σ)b
u| 6 kb
uk2 kΣ̄ − Σk2→2 = Op (1)op (1).
Lemma 12. maxi6n |h0 (zi ) − b
h(zi )| = op (1).
Proof. First note that
max |h0 (zi ) − b
h(zi )| 6 max |h0 (zi ) − q L (zi )0 βh0 ,L,s0 |
i
i
+ max |q L (zi )0 [βby,(p̃,q̃) ]h − q L (zi )0 βh0 ,L,s0 |.
i
44
DAMIAN KOZBUR
The first term has the bound maxi |h0 (zi ) − q(xi )0 η| = Op (L−αZ ) by assumption.
Next,
max |q L (zi )0 [βby,(p̃,q̃) ]h − q L (zi )0 βh ,L,s | = max |q L (zi )0 ([βby,(p̃,q̃) ]h − βh ,L,s )|
0
i
0
0
i
0
L
6 max kq (zi )k∞ k[βby,(p̃,q̃) ]h − βh0 ,L,s0 k1
i
Then,
k[βby,(p̃,q̃) ]h − βh
0 ,L,s0
k1 = kβby−bg,IΦK +RF − βh0 ,L,s0 k1
= kβbg0 ,IΦK +RF + βbh0 ,IΦK +RF + βbε,IΦK +RF − βbgb,IΦK +RF − βh0 ,L,s0 k1 .
6 kβbh0 ,IΦK +RF − βh0 ,L,s0 k1 + kβbε,IΦK +RF k1 + kβbg0 −bg,IΦK +RF k1
= J8 + J10 + kβbg0 −bg,IΦK +RF k1 .
Next,
kβbg −bg,I
0
ΦK +RF
k1
6 |IΦK +RF |1/2 kβbg0 −bg,IΦK +RF k2
= |IΦK +RF |1/2 k(Q0IΦ
K +RF
QIΦK +RF /n)−1 Q0IΦ
6 |IΦK +RF |1/2 κmin (|IΦK +RF |)−1 kQ0IΦ
1/2
6 |IΦK +RF |
κmin (|IΦK +RF |)
−1
|IΦK +RF |
6 |IΦK +RF |κmin (|IΦK +RF |)−1 kQ0IΦ
= |IΦK +RF |κmin (|IΦK +RF |)−1
=
K +RF
K +RF
(g0 (X) − gb(X))/nk2
(g0 (X) − gb(X))/nk2
1/2
kQ0IΦ
K +RF
(g0 (X) − gb(X))/nk∞
(g0 (X) − gb(X))/nk∞
!
n
X
−1
max n
|qjL (zi )| kg0 (X) − gb(X)k∞
K +RF
j
i=1
Op (s10 K αIΦ )Op (1)op (n−1/2 ζ0 (K)K 1/2
+ K −αg0 ).
Putting these together, it follows from the assumed rate conditions that
max |h0 (zi ) − b
h(zi )| = op (1).
i
Next, let ∆g0 i = g0 (xi ) − gb(xi ) and ∆h0 i = h0 (zi ) − b
h(zi ). Then above lemma
states maxi6n ∆h0 i = op (1). In addition maxi6n |∆g0 i | 6 |b
g − g|0 = op (1). Let
ωi2 = u0 Wi Wi0 u and ω
bi2 = u
b0 Wi Wi0 u
b.
Lemma 13. |F Vb F − u
bΣ̄b
u| = op (1).
Proof.
b − Σ̄)b
1Ag |F Vb F − u
b0 Σ̄b
u| = |b
u0 (Σ
u| =
n
X
ci W
ci0 εb2i u
u
b0 W
b/n −
i=1
6
n
X
i=1
ωi2 (b
ε2i − ε2i )/n +
n
X
u
b0 Wi Wi0 ε2i u
b/n
i=1
n
X
i=1
(b
ωi2 − ωi2 )b
ε2i /n .
45
ADDITIVELY SEPARABLE
Both terms on the right hand side will be bounded. Consider the first term. Expanding (b
ε2i − ε2i ) gives
n
X
n
X
ωi2 (b
ε2i − ε2i )/n 6
ωi2 ∆21i /n +
i=1
i=1
+2
n
X
n
X
ωi2 ∆22i /n +
i=1
ωi2 ∆1i εi /n + 2
n
X
n
X
ωi2 ∆1i ∆2i/n
i=1
ωi2 ∆2i εi /n .
i=1
Pn
Pni=1
Note that i=1 ωi2 /n, i=1 ωi2 |εi | = Op (1) by arguments is in [45]. The five terms
above are then bounded in order of their appearence by
n
n
X
X
ωi2 ∆21i /n 6 max |∆1i |
ωi2 /n = op (1)Op (1)
i=1
n
X
i6n
ωi2 ∆22i /n 6 max |∆2i |
i6n
i=1
n
X
ωi2 ∆1i ∆2i /n
i=1
n
X
6 max |∆1i | max |∆2i |
i6n
i6n
i6n
n
X
n
X
ωi2 /n = op (1)Op (1)
i=1
ωi2 |εi |/n = op (1)Op (1)
i=1
ωi2 ∆2i εi /n 6 max |∆2i |
i6n
i=1
ωi2 |εi |/n = op (1)Op (1)
i=1
ωi2 ∆1i εi /n 6 max |∆1i |
i=1
n
X
i=1
n
X
n
X
ωi2 |εi |/n = op (1)Op (1).
i=1
The second term is bounded by
n
X
ci W
ci0 − Wi Wi0 )b
u
b(W
ε2i u
b/n 6 max |ε2i |
i6n
i=1
n
X
ci W
ci0 − Wi Wi0 )b
u
b(W
u/n
i=1
n
X
2
2
ci W
ci0 − Wi Wi0 )/nk2→2 = max |b
b − Ω̄k2→2
6 max |b
εi |kb
uk2 k
(W
ε2i |kb
uk22 kkΩ
i6n
i6n
i=1
b − Ω̄k2→2
max |ε2i | + max |b
ε2i − ε2i | kb
uk22 kkΩ
i6n
i6n
= Op (n2/δ ) + op (1) Op (1)(Op (ζ0 (K)n−1/2 K 1/2 ) + Ξ1 + Ξ2 + Ξ3 )
6
= op (1).
where the last bounds come from the rate condition in Assumption 9 and
maxi6n |b
ε2i − ε2i | = op (1) by maxi6n |∆1i | + |∆2i | = op (1).
These results give the conclusion that
d
n1/2 Vb −1/2 (θb − θ) = n1/2 (F Vb F )−1/2 (θb − θ) → N (0, 1).
Calculations which give the rates of convergence in each of the cases of Assumption
17 or of Assumption 18, as well as the proof of the second statement of Theorem
2, use the same arguments as in [45]. This concludes the proof.
46
DAMIAN KOZBUR
References
[1] P. Aghion and P.W. Howitt. The Economics of Growth. MIT Press, 2008.
[2] Donald D.W. Andrews and Yoon-Jae Whang. Additive interactive regression models: Circumvention of the curse of dimensionality. Econometric Theory, 6(4):466479, 12 1990.
[3] Donald W. K. Andrews. Asymptotic normality of series estimators for nonparametric and
semiparametric regression models. Econometrica, 59(2):307–345, 1991.
[4] J. Bai and S. Ng. Forecasting economic time series using targeted predictors. Journal of
Econometrics, 146:304–317, 2008.
[5] J. Bai and S. Ng. Boosting diffusion indices. Journal of Applied Econometrics, 24, 2009.
[6] R.J. Barro and J.W. Lee. Data set for a panel of 139 countries.
NBER,http://www.nber.org/pub/barro.lee.html (1994).
[7] Robert J. Barro and Jong-Wha Lee. Losers and winners in economic growth. Working Paper
4341, National Bureau of Economic Research, April 1993.
[8] A. Belloni, D. Chen, V. Chernozhukov, and C. Hansen. Sparse models and methods for
optimal instruments with an application to eminent domain. Econometrica, 80:2369–2429,
2012. Arxiv, 2010.
[9] A. Belloni and V. Chernozhukov. Least squares after model selection in high-dimensional
sparse models. Bernoulli, 19(2):521–547, 2013. ArXiv, 2009.
[10] A. Belloni, V. Chernozhukov, I. Fernndez-Val, and C. Hansen. Program evaluation and causal
inference with high-dimensional data. Econometrica, 85(1):233–298, 2017.
[11] A. Belloni, V. Chernozhukov, and C. Hansen. Lasso methods for gaussian instrumental variables models. 2010 arXiv:[math.ST], http://arxiv.org/abs/1012.1297, 2010.
[12] A. Belloni, V. Chernozhukov, and C. Hansen. Inference for high-dimensional sparse econometric models. Advances in Economics and Econometrics. 10th World Congress of Econometric
Society. August 2010, III:245–295, 2013.
[13] Alexandre Belloni and Victor Chernozhukov. High Dimensional Sparse Econometric Models:
An Introduction, pages 121–156. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011.
[14] Alexandre Belloni, Victor Chernozhukov, Denis Chetverikov, and Kengo Kato. Some new
asymptotic theory for least squares series: Pointwise and uniform results. Journal of Econometrics, 186(2):345 – 366, 2015. High Dimensional Problems in Econometrics.
[15] Alexandre Belloni, Victor Chernozhukov, and Christian Hansen. Inference on treatment effects after selection amongst high-dimensional controls with an application to abortion on
crime. Review of Economic Studies, 81(2):608–650, 2014.
[16] Alexandre Belloni, Victor Chernozhukov, Christian Hansen, and Damian Kozbur. Inference
in high-dimensional panel models with an application to gun control. Journal of Business &
Economic Statistics, 34(4):590–605, 2016.
[17] P. J. Bickel, Y. Ritov, and A. B. Tsybakov. Simultaneous analysis of Lasso and Dantzig
selector. Annals of Statistics, 37(4):1705–1732, 2009.
[18] P. Bühlmann and S. van de Geer. Statistics for High-Dimensional Data: Methods, Theory
and Applications. Springer, 2011.
[19] Andreas Buja, Trevor Hastie, and Robert Tibshirani. Linear smoothers and additive models.
Ann. Statist., 17(2):453–510, 06 1989.
[20] F. Bunea, A. Tsybakov, and M. H. Wegkamp. Sparsity oracle inequalities for the lasso.
Electronic Journal of Statistics, 1:169–194, 2007.
[21] F. Bunea, A. B. Tsybakov, , and M. H. Wegkamp. Aggregation and sparsity via `1 penalized
least squares. In Proceedings of 19th Annual Conference on Learning Theory (COLT 2006)
(G. Lugosi and H. U. Simon, eds.), pages 379–391, 2006.
[22] F. Bunea, A. B. Tsybakov, and M. H. Wegkamp. Aggregation for Gaussian regression. The
Annals of Statistics, 35(4):1674–1697, 2007.
[23] E. Candès and T. Tao. The Dantzig selector: statistical estimation when p is much larger
than n. Ann. Statist., 35(6):2313–2351, 2007.
[24] Been-Lon Chen. Economic growth : Robert J. Barro and Xavier Sala-i-Martin, (McGraw-Hill,
1995), 539 pp. Journal of Economic Dynamics and Control, 21(4-5):895–898, May 1997.
[25] R. Chen, W. Härdle, O. B. Linton, and E. Severance-Lossin. Nonparametric estimation of additive separable regression models. In Wolfgang Härdle and Michael G. Schimek, editors, Statistical Theory and Computational Aspects of Smoothing, pages 247–265, Heidelberg, 1996.
Physica-Verlag HD.
ADDITIVELY SEPARABLE
47
[26] Norbert Christopeit and Stefan G. N. Hoderlein. Local partitioned regression. Econometrica,
74(3):787–817, 2006.
[27] Dennis D. Cox. Approximation of least squares regression on nested subspaces. Ann. Statist.,
16(2):713–732, 06 1988.
[28] Brian J. Eastwood and A. Ronald Gallant. Adaptive rules for seminonparametric estimators
that achieve asymptotic normality. Econometric Theory, 7(3):307–340, 1991.
[29] Ildiko E. Frank and Jerome H. Friedman. A statistical view of some chemometrics regression
tools. Technometrics, 35(2):109–135, 1993.
[30] C. Hansen, D. Kozbur, and S. Misra. Targeted Undersmoothing. ArXiv e-prints, June 2017.
[31] Trevor Hastie and Robert Tibshirani. [generalized additive models]: Rejoinder. Statist. Sci.,
1(3):314–318, 08 1986.
[32] Trevor Hastie, Robert Tibshirani, and Jerome Friedman. Elements of Statistical Learning:
Data Mining, Inference, and Prediction. Springer, New York, NY, 2009.
[33] Jian Huang, Joel L. Horowitz, and Fengrong Wei. Variable selection in nonparametric additive
models. Ann. Statist., 38(4):2282–2313, 2010.
[34] Jian Huang, Joel L. Horowitz, and Fengrong Wei. Variable selection in nonparametric additive
models. Ann. Statist., 38(4):2282–2313, 08 2010.
[35] Guido Imbens and Keisuke Hirano. The propensity score with continuous treatments. 2004.
[36] Adel Javanmard and Andrea Montanari. Confidence intervals and hypothesis testing for highdimensional regression. Journal of Machine Learning Research, 15:2869–2909, 2014.
[37] Bing-Yi Jing, Qi-Man Shao, and Qiying Wang. Self-normalized cramr-type large deviations
for independent random variables. Ann. Probab., 31(4):2167–2215, 2003.
[38] Keith Knight. Shrinkage estimation for nearly singular designs. Econometric Theory, 24:323–
337, 2008.
[39] V. Koltchinskii. Sparsity in penalized empirical risk minimization. Ann. Inst. H. Poincar
Probab. Statist., 45(1):7–57, 2009.
[40] Hannes Leeb and Benedikt M. Pötscher. Can one estimate the unconditional distribution of
post-model-selection estimators? Econometric Theory, 24(2):338–376, 2008.
[41] Qi Li and Jeffrey Scott Racine. Nonparametric Econometrics: Theory and Practice. Princeton
University Press: Princeton, NJ, 2006.
[42] K. Lounici. Sup-norm convergence rate and sign concentration property of lasso and dantzig
estimators. Electron. J. Statist., 2:90–102, 2008.
[43] K. Lounici, M. Pontil, A. B. Tsybakov, and S. van de Geer. Taking advantage of sparsity in
multi-task learning. arXiv:0903.1468v1 [stat.ML], 2010.
[44] N. Meinshausen and B. Yu. Lasso-type recovery of sparse representations for high-dimensional
data. Annals of Statistics, 37(1):2246–2270, 2009.
[45] Whitney K. Newey. Convergence rates and asymptotic normality for series estimators. Journal
of Econometrics, 79:147–168, 1997.
[46] Benedikt M. Pötscher. Confidence sets based on sparse estimators are necessarily large.
Sankhyā, 71(1, Ser. A):1–18, 2009.
[47] Mathieu Rosenbaum and Alexandre B. Tsybakov. Sparse recovery under matrix uncertainty.
The Annals of Statistics, 38(5):2620–2651, 2010.
[48] M. Rudelson and S. Zhou. Reconstruction from anisotropic random measurements. IEEE
Transactions on Information Theory, 59(6):3434–3447, June 2013.
[49] Mark Rudelson and Roman Vershynin. On sparse reconstruction from fourier and gaussian
measurements. Communications on Pure and Applied Mathematics, 61:10251045, 2008.
[50] Eric Severance-Lossin and Stefan Sperlich. Estimation of derivatives for additive separable
models. Statistics, 33(3):241–265, 1999.
[51] Charles J. Stone. Additive regression and other nonparametric models. The Annals of Statistics, 13(2):689–705, 1985.
[52] R. Tibshirani. Regression shrinkage and selection via the lasso. J. Roy. Statist. Soc. Ser. B,
58:267–288, 1996.
[53] S. A. van de Geer. High-dimensional generalized linear models and the lasso. Annals of
Statistics, 36(2):614–645, 2008.
[54] Sara van de Geer, Peter Bhlmann, Yaacov Ritov, and Ruben Dezeure. On asymptotically
optimal confidence regions and tests for high-dimensional models. Ann. Statist., 42(3):1166–
1202, 06 2014.
48
DAMIAN KOZBUR
[55] M. Wainwright. Sharp thresholds for noisy and high-dimensional recovery of sparsity using
`1 -constrained quadratic programming (lasso). IEEE Transactions on Information Theory,
55:2183–2202, May 2009.
[56] Lijian Yang, Stefan Sperlich, and Wolfgang Hrdle. Derivative estimation and testing in generalized additive models. Journal of Statistical Planning and Inference, 115(2):521 – 542,
2003.
[57] C.-H. Zhang and J. Huang. The sparsity and bias of the lasso selection in high-dimensional
linear regression. Ann. Statist., 36(4):1567–1594, 2008.
[58] Cun-Hui Zhang and Stephanie S. Zhang. Confidence intervals for low dimensional parameters in high dimensional linear models. Journal of the Royal Statistical Society: Series B
(Statistical Methodology), 76(1):217–242, 2014.
[59] S. Zhou. Restricted eigenvalue conditions on subgaussian matrices. ArXiv:0904.4723v2, 2009.
| 10math.ST
|
Asymptotics For High Dimensional Regression
M -Estimates: Fixed Design Results
Lihua Lei∗, Peter J. Bickel†, and Noureddine El Karoui‡
arXiv:1612.06358v1 [math.ST] 19 Dec 2016
Department of Statistics, University of California, Berkeley
December 20, 2016
Abstract
We investigate the asymptotic distributions of coordinates of regression M-estimates
in the moderate p/n regime, where the number of covariates p grows proportionally with the sample size n. Under appropriate regularity conditions, we establish the coordinate-wise asymptotic normality of regression M-estimates assuming
a fixed-design matrix. Our proof is based on the second-order Poincaré inequality
(Chatterjee, 2009) and leave-one-out analysis (El Karoui et al., 2011). Some relevant
examples are indicated to show that our regularity conditions are satisfied by a broad
class of design matrices. We also show a counterexample, namely the ANOVA-type
design, to emphasize that the technical assumptions are not just artifacts of the
proof. Finally, the numerical experiments confirm and complement our theoretical
results.
1
Introduction
High-dimensional statistics has a long history (Huber, 1973; Wachter, 1976, 1978) with
considerable renewed interest over the last two decades. In many applications, the researcher collects data which can be represented as a matrix, called a design matrix and
denoted by X ∈ Rn×p , as well as a response vector y ∈ Rn and aims to study the connection between X and y. The linear model is among the most popular models as a starting
point of data analysis in various fields. A linear model assumes that
y = Xβ ∗ + ,
(1)
where β ∗ ∈ Rp is the coefficient vector which measures the marginal contribution of each
predictor and is a random vector which captures the unobserved errors.
The aim of this article is to provide valid inferential results for features of β ∗ . For
example, a researcher might be interested in testing whether a given predictor has a
negligible effect on the response, or equivalently whether βj∗ = 0 for some j. Similarly,
linear contrasts of β ∗ such as β1∗ − β2∗ might be of interest in the case of the group
comparison problem in which the first two predictors represent the same feature but are
collected from two different groups.
An M-estimator, defined as
n
β̂(ρ) = arg min
β∈Rp
1X
ρ(yi − xTi β)
n i=1
∗ contact:
(2)
[email protected]. Support from Grant FRG DMS-1160319 is gratefully acknowledged.
from Grant FRG DMS-1160319 is gratefully acknowledged.
‡ Support from Grant NSF DMS-1510172 is gratefully acknowledged.
AMS 2010 MSC: Primary: 62J99, Secondary: 62E20;
Keywords: M-estimation, robust regression, high-dimensional statistics, second order Poincaré inequality, leave-one-out analysis.
† Support
1
where ρ denotes a loss function, is among the most popular estimators used in practice
(Relles, 1967; Huber, 1973). In particular, if ρ(x) = 21 x2 , β̂(ρ) is the famous Least Square
Estimator (LSE). We intend to explore the distribution of β̂(ρ), based on which we can
achieve the inferential goals mentioned above.
The most well-studied approach is the asymptotic analysis, which assumes that the
scale of the problem grows to infinity and use the limiting result as an approximation.
In regression problems, the scale parameter of a problem is the sample size n and the
number of predictors p. The classical approach is to fix p and let n grow to infinity. It
has been shown (Relles, 1967; Yohai, 1972; Huber, 1972, 1973) that β̂(ρ) is consistent in
terms of L2 norm and asymptotically normal in this regime. The asymptotic variance
can be then approximated by the bootstrap (Bickel & Freedman, 1981). Later on, the
studies are extended to the regime in which both n and p grow to infinity but p/n
converges to 0 (Yohai & Maronna, 1979; Portnoy, 1984, 1985, 1986, 1987; Mammen,
1989). The consistency, in terms of the L2 norm, the asymptotic normality and the
validity of the bootstrap still hold in this regime. Based on
q these results, we can construct
d β̂j (ρ)) where Var(
d β̂j (ρ)) is
a 95% confidence interval for β0j simply as β̂j (ρ) ± 1.96 Var(
calculated by bootstrap. Similarly we can calculate p-values for the hypothesis testing
procedure.
We ask whether the inferential results developed under the low-dimensional assumptions and the software built on top of them can be relied on for moderate and highdimensional analysis? Concretely, if in a study n = 50 and p = 40, can the software built
upon the assumption that p/n ' 0 be relied on when p/n = .8? Results in random matrix
theory (Marčenko & Pastur, 1967) already offer an answer in the negative side for many
PCA-related questions in multivariate statistics. The case of regression is more subtle:
For instance for least-squares, standard degrees of freedom adjustments effectively take
care of many dimensionality-related problems. But this nice property does not extend to
more general regression M-estimates.
Once these questions are raised, it becomes very natural to analyze the behavior
and performance of statistical methods in the regime where p/n is fixed. Indeed, it will
help us to keep track of the inherent statistical difficulty of the problem when assessing
the variability of our estimates. In other words, we assume in the current paper that
p/n → κ > 0 while let n grows to infinity. Due to identifiability issues, it is impossible to
make inference on β ∗ if p > n without further structural or distributional assumptions.
We discuss this point in details in Section 2.3. Thus we consider the regime where
p/n → κ ∈ (0, 1). We call it the moderate p/n regime. This regime is also the natural
regime in random matrix theory (Marčenko & Pastur, 1967; Wachter, 1978; Johnstone,
2001; Bai & Silverstein, 2010). It has been shown that the asymptotic results derived
in this regime sometimes provide an extremely accurate approximations to finite sample
distributions of estimators at least in certain cases (Johnstone, 2001) where n and p are
both small.
1.1
Qualitatively Different Behavior of Moderate p/n Regime
First, β̂(ρ) is no longer consistent in terms of L2 norm and the risk Ekβ̂(ρ)−β ∗ k2 tends to
a non-vanishing quantity determined by κ, the loss function ρ and the error distribution
through a complicated system of non-linear equations (El Karoui et al., 2011; El Karoui,
2013, 2015; Bean et al., 2012). This L2 -inconsistency prohibits the use of standard
perturbation-analytic techniques to assess the behavior of the estimator. It also leads to
qualitatively different behaviors for the residuals in moderate dimensions; in contrast to
the low-dimensional case, they cannot be relied on to give accurate information about the
distribution of the errors. However, this seemingly negative result does not exclude the
possibility of inference since β̂(ρ) is still consistent in terms of L2+ν norms for any ν > 0
and in particular in L∞ norm. Thus, we can at least hope to perform inference on each
coordinate.
Second, classical optimality results do not hold in this regime. In the regime p/n → 0,
the maximum likelihood estimator is shown to be optimal (Huber, 1964, 1972; Bickel &
2
Doksum, 2015). In other words, if the error distribution is known then the M-estimator
associated with the loss ρ(·) = − log f (·) is asymptotically efficient, provided the design
is of appropriate type, where f (·) is the density of entries of . However, in the moderate
p/n regime, it has been shown that the optimal loss is no longer the log-likehood but
an other function with a complicated but explicit form (Bean et al., 2013), at least
for certain designs. The suboptimality of maximum likelihood estimators suggests that
classical techniques fail to provide valid intuition in the moderate p/n regime.
Third, the joint asymptotic normality of β̂(ρ), as a p-dimensional random vector, may
be violated for a fixed design matrix X. This has been proved for least-squares by Huber
(1973) in his pioneering work. For general M-estimators, this negative result is a simple
consequence of the results of El Karoui et al. (2011): They exhibit an ANOVA design
(see below) where even marginal fluctuations are not Gaussian. By contrast, for random
design, they show that β̂(ρ) is jointly asymptotically normal when the design matrix is
elliptical with general covariance by using the non-asymptotic stochastic representation
for β̂(ρ) as well as elementary properties of vectors uniformly distributed on the uniform
sphere in Rp ; See section 2.2.3 of El Karoui et al. (2011) or the supplementary material
of Bean et al. (2013) for details. This does not contradict Huber (1973)’s negative result
in that it takes the randomness from both X and into account while Huber (1973)’s
result only takes the randomness from into account. Later, El Karoui (2015) shows that
each coordinate of β̂(ρ) is asymptotically normal for a broader class of random designs.
This is also an elementary consequence of the analysis in El Karoui (2013). However, to
the best of our knowledge, beyond the ANOVA situation mentioned above, there are no
distributional results for fixed design matrices. This is the topic of this article.
Last but not least, bootstrap inference fails in this moderate-dimensional regime. This
has been shown by Bickel and Freedman (1983) for least-squares and residual bootstrap
in their influential work. Recently, El Karoui and Purdom (2015) studied the results
to general M-estimators and showed that all commonly used bootstrapping schemes,
including pairs-bootstrap, residual bootstrap and jackknife, fail to provide a consistent
variance estimator and hence valid inferential statements. These latter results even apply
to the marginal distributions of the coordinates of β̂(ρ). Moreover, there is no simple,
design independent, modification to achieve consistency (El Karoui & Purdom, 2015).
1.2
Our Contributions
In summary, the behavior of the estimators we consider in this paper is completely different in the moderate p/n regime from its counterpart in the low-dimensional regime.
As discussed in the next section, moving one step further in the moderate p/n regime is
interesting from both the practical and theoretical perspectives. The main contribution
of this article is to establish coordinate-wise asymptotic normality of β̂(ρ) for certain fixed
design matrices X in this regime under technical assumptions. The following theorem
informally states our main result.
Theorem (Informal Version of Theorem 3.1 in Section 3). Under appropriate conditions
on the design matrix X, the distribution of and the loss function ρ, as p/n → κ ∈ (0, 1),
while n → ∞,
β̂j (ρ) − Eβ̂j (ρ)
, N (0, 1) = o(1)
max dTV L q
Var(β̂j (ρ))
1≤j≤p
where dTV (·, ·) is the total variation distance and L(·) denotes the law.
It is worth mentioning that the above result can be extended to finite dimensional
linear contrasts of β̂. For instance, one might be interested in making inference on β1∗ −β2∗
in the problems involving the group comparison. The above result can be extended to
give the asymptotic normality of β̂1 − β̂2 .
Besides the main result, we have several other contributions. First, we use a new
approach to establish asymptotic normality. Our main technique is based on the secondorder Poincaré inequality (SOPI), developed by Chatterjee (2009) to derive, among many
3
other results, the fluctuation behavior of linear spectral statistics of random matrices.
In contrast to classical approaches such as the Lindeberg-Feller central limit theorem,
the second-order Poincaré inequality is capable of dealing with nonlinear and potentially
implicit functions of independent random variables. Moreover, we use different expansions
for β̂(ρ) and residuals based on double leave-one-out ideas introduced in El Karoui et al.
(2011), in contrast to the classical perturbation-analytic expansions. See aforementioned
paper and follow-ups. An informal interpretation of the results of Chatterjee (2009) is
that if the Hessian of the nonlinear function of random variables under consideration is
sufficiently small, this function acts almost linearly and hence a standard central limit
theorem holds.
Second, to the best of our knowledge this is the first inferential result for fixed (non
ANOVA-like) design in the moderate p/n regime. Fixed designs arise naturally from an
experimental design or a conditional inference perspective. That is, inference is ideally
carried out without assuming randomness in predictors; see Section 2.2 for more details.
We clarify the regularity conditions for coordinate-wise asymptotic normality of β̂(ρ)
explicitly, which are checkable for LSE and also checkable for general M-estimators if the
error distribution is known. We also prove that these conditions are satisfied with by a
broad class of designs.
The ANOVA-like design described in Section 3.3.4 exhibits a situation where the
distribution of β̂j (ρ) is not going to be asymptotically normal. As such the results of
Theorem 3.1 below are somewhat surprising.
For complete inference, we need both the asymptotic normality and the asymptotic
bias and variance. Under suitable symmetry conditions on the loss function and the error
distribution, it can be shown that β̂(ρ) is unbiased (see Section 3.2.1 for details) and
thus it is left to derive the asymptotic variance. As discussed at the end of Section 1.1,
classical approaches, e.g. bootstrap, fail in this regime. For least-squares, classical results
continue to hold and we discuss it in section 5 for the sake of completeness. However,
for M-estimators, there is no closed-form result. We briefly touch upon the variance
estimation in Section 3.4.2. The derivation for general situations is beyond the scope of
this paper and left to the future research.
1.3
Outline of Paper
The rest of the paper is organized as follows: In Section 2, we clarify details which
are mentioned in the current section. In Section 3, we state the main result (Theorem
3.1) formally and explain the technical assumptions. Then we show several examples of
random designs which satisfy the assumptions with high probability. In Section 4, we
introduce our main technical tool, second-order Poincaré inequality (Chatterjee, 2009),
and apply it on M-estimators as the first step to prove Theorem 3.1. Since the rest of the
proof of Theorem 3.1 is complicated and lengthy, we illustrate the main ideas in Appendix
A. The rigorous proof is left to Appendix B. In Section 5, we provide reminders about the
theory of least-squares estimation for the sake of completeness, by taking advantage of its
explicit form. In Section 6, we display the numerical results. The proof of other results
are stated in Appendix C and more numerical experiments are presented in Appendix D.
2
2.1
More Details on Background
Moderate p/n Regime: a more informative type of asymptotics?
In Section 1, we mentioned that the ratio p/n measures the difficulty of statistical inference. The moderate p/n regime provides an approximation of finite sample properties
with the difficulties fixed at the same level as the original problem. Intuitively, this regime
should capture more variation in finite sample problems and provide a more accurate approximation. We will illustrate this via simulation.
4
Consider a study involving 50 participants and 40 variables; we can either use the
asymptotics in which p is fixed to be 40, n grows to infinity or p/n is fixed to be 0.8,
and n grows to infinity to perform approximate inference. Current software rely on lowdimensional asymptotics for inferential tasks, but there is no evidence that they yield more
accurate inferential statements than the ones we would have obtained using moderate
dimensional asymptotics. In fact, numerical evidence (Johnstone, 2001; El Karoui et al.,
2013; Bean et al., 2013) show that the reverse is true.
We exhibit a further numerical simulation showing that. Consider a case that n = 50,
has i.i.d. entries and X is one realization of a matrix generated with i.i.d. gaussian
(mean 0, variance 1) entries. For κ ∈ {0.1, 0.2, . . . , 0.9} and different error distributions,
we use the Kolmogorov-Smirnov (KS) statistics to quantify the distance between the
finite sample distribution and two types of asymptotic approximation of the distribution
of β̂1 (ρ).
Specifically, we use the Huber loss function ρHuber,k with default parameter k = 1.345
(Huber, 2011), i.e.
1 2
|x| ≤ k
2x
ρHuber,k (x) =
k(|x| − 12 k) |x| > k
Specifically, we generate three design matrices X (0) , X (1) and X (2) : X (0) for small sample
case with a sample size n = 50 and a dimension p = nκ; X (1) for low-dimensional
asymptotics (p fixed) with a sample size n = 1000 and a dimension p = 50κ; and X (2)
for moderate-dimensional asymptotics (p/n fixed) with a sample size n = 1000 and a
dimension p = nκ. Each of them is generated as one realization of an i.i.d. standard
gaussian design and then treated as fixed across K = 100 repetitions. For each design
matrix, vectors of appropriate length are generated with i.i.d. entries. The entry
has either a standard normal distribution, or a t3 -distribution, or a standard Cauchy
distribution, i.e. t1 . Then we use as the response, or equivalently assume β ∗ = 0,
and obtain the M-estimators β̂ (0) , β̂ (1) , β̂ (2) . Repeating this procedure for K = 100 times
results in K replications in three cases. Then we extract the first coordinate of each
(0)
(1) K
(2) K
estimator, denoted by {β̂k,1 }K
k=1 , {β̂k,1 }k=1 , {β̂k,1 }k=1 . Then the two-sample KolmogorovSmirnov statistics can be obtained by
r
r
n
n
(0)
(1)
KS1 =
max |F̂n (x) − F̂n (x)|, KS2 =
max |F̂n(0) (x) − F̂n(2) (x)|,
2 x
2 x
(r)
(r)
where F̂n is the empirical distribution of {β̂k,1 }K
k=1 . We can then compare the accuracy
of two asymptotic regimes by comparing KS1 and KS2 . The smaller the value of KSi , the
better the approximation.
Figure 1 displays the results for these error distributions. We see that for gaussian errors and even t3 errors, the p/n-fixed/moderate-dimensional approximation is uniformly more accurate than the widely used p-fixed/low-dimensional approximation. For
Cauchy errors, the low-dimensional approximation performs better than the moderatedimensional one when p/n is small but worsens when the ratio is large especially when
p/n is close to 1. Moreover, when p/n grows, the two approximations have qualitatively different behaviors: the p-fixed approximation becomes less and less accurate while
the p/n-fixed approximation does not suffer much deterioration when p/n grows. The
qualitative and quantitative differences of these two approximations reveal the practical
importance of exploring the p/n-fixed asymptotic regime. (See also Johnstone (2001).)
2.2
Random vs fixed design?
As discussed in Section 1.1, assuming a fixed design or a random design could lead to
qualitatively different inferential results.
In the random design setting, X is considered as being generated from a super population. For example, the rows of X can be regarded as an i.i.d. sample from a distribution known, or partially known, to the researcher. In situations where one uses
techniques such as cross-validation (Stone, 1974), pairs bootstrap in regression (Efron &
5
Kolmogorov−Smirnov Statistics
Distance between the small sample and large sample distribution
normal
t(3)
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
0.45
0.40
cauchy
●
0.50
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
0.35
●
●
●
●
●
●
●
●
●
●
0.30
●
●
●
0.25
0.25
0.50
0.75
0.25
0.50
0.75
0.25
0.50
0.75
kappa
Asym. Regime
●
p fixed
●
p/n fixed
Figure 1: Axpproximation accuracy of p-fixed asymptotics and p/n-fixed asymptotics:
each column represents an error distribution; the x-axis represents the ratio κ of the dimension and the sample size and the y-axis represents the Kolmogorov-Smirnov statistic;
the red solid line corresponds to p-fixed approximation and the blue dashed line corresponds to p/n-fixed approximation.
Efron, 1982) or sample splitting (Wasserman & Roeder, 2009), the researcher effectively
assumes exchangeability of the data (xTi , yi )ni=1 . Naturally, this is only compatible with
an assumption of random design. Given the extremely widespread use of these techniques
in contemporary machine learning and statistics, one could argue that the random design setting is the one under which most of modern statistics is carried out, especially
for prediction problems. Furthermore, working under a random design assumption forces
the researcher to take into account two sources of randomness as opposed to only one
in the fixed design case. Hence working under a random design assumption should yield
conservative confidence intervals for βj∗ .
In other words, in settings where the researcher collects data without control over the
values of the predictors, the random design assumption is arguably the more natural one
of the two.
However, it has now been understood for almost a decade that common random design
assumptions in high-dimension (e.g. xi = Σ1/2 zi where zi,j ’s are i.i.d with mean 0 and
variance 1 and a few moments and Σ “well behaved”) suffer from considerable geometric
limitations, which have substantial impacts on the performance of the estimators considered in this paper (El Karoui et al., 2011). As such, confidence statements derived from
that kind of analysis can be relied on only after performing a few graphical tests on the
data (see El Karoui (2010)). These geometric limitations are simple consequences of the
concentration of measure phenomenon (Ledoux, 2001).
On the other hand, in the fixed design setting, X is considered a fixed matrix. In this
case, the inference only takes the randomness of into consideration. This perspective
is popular in several situations. The first one is the experimental design. The goal is
to study the effect of a set of factors, which can be controlled by the experimenter, on
the response. In contrast to the observational study, the experimenter can design the
experimental condition ahead of time based on the inference target. For instance, a oneway ANOVA design encodes the covariates into binary variables (see Section 3.3.4 for
details) and it is fixed prior to the experiment. Other examples include two-way ANOVA
designs, factorial designs, Latin-square designs, etc. (Scheffe, 1999).
Another situation which is concerned with fixed design is the survey sampling where
the inference is carried out conditioning on the data (Cochran, 1977). Generally, in order
to avoid unrealistic assumptions, making inference conditioning on the design matrix
X is necessary. Suppose the linear model (1) is true and identifiable (see Section 2.3 for
details), then all information of β ∗ is contained in the conditional distribution L(y|X) and
hence the information in the marginal distribution L(X) is redundant. The conditional
6
inference framework is more robust to the data generating procedure due to the irrelevance
of L(X).
Also, results based on fixed design assumptions may be preferable from a theoretical
point of view in the sense that they could potentially be used to establish corresponding
results for certain classes of random designs. Specifically, given a marginal distribution
L(X), one only has to prove that X satisfies the assumptions for fixed design with high
probability.
In conclusion, fixed and random design assumptions play complementary roles in
moderate-dimensional settings. We focus on the least understood of the two, the fixed
design case, in this paper.
2.3
Modeling and Identification of Parameters
The problem of identifiability is especially important in the fixed design case. Define
β ∗ (ρ) in the population as
n
β ∗ (ρ) = arg min
β∈Rp
1X
Eρ(yi − xTi β).
n i=1
(3)
One may ask whether β ∗ (ρ) = β ∗ regardless of ρ in the fixed design case. We provide
an affirmative answer in the following proposition by assuming that i has a symmetric
distribution around 0 and ρ is even.
d
Proposition 2.1. Suppose X has a full column rank and i = −i for all i. Further
assume ρ is an even convex function such that for any i = 1, 2, . . . and α 6= 0,
1
(Eρ(i − α) + Eρ(i + α)) > Eρ(i ).
(4)
2
Then β ∗ (ρ) = β ∗ regardless of the choice of ρ.
The proof is left to Appendix C. It is worth mentioning that Proposition 2.1 only
requires the marginals of to be symmetric but does not impose any constraint on the
dependence structure of . Further, if ρ is strongly convex, then for all α 6= 0,
1
(ρ(x − α) + ρ(x + α)) > ρ(x).
2
As a consequence, the condition (4) is satisfied provided that i is non-zero with positive
probability.
If is asymmetric, we may still be able to identify β ∗ if i are i.i.d. random variables.
In contrast to the last case, we should incorporate an intercept term as a shift towards
the centroid of ρ. More precisely, we define α∗ (ρ) and β ∗ (ρ) as
n
(α∗ (ρ), β ∗ (ρ)) = arg min
α∈R,β∈Rp
1X
Eρ(yi − α − xTi β).
n i=1
Proposition 2.2. Suppose (1, X) is of full column rank and i are i.i.d. such that
Eρ(1 − α) as a function of α has a unique minimizer α(ρ). Then β ∗ (ρ) is uniquely
defined with β ∗ (ρ) = β ∗ and α∗ (ρ) = α(ρ).
The proof is left to Appendix C. For example, let ρ(z) = |z|. Then the minimizer of
Eρ(1 − a) is a median of 1 , and is unique if 1 has a positive density. It is worth pointing
out that incorporating an intercept term is essential for identifying β ∗ . For instance, in
the least-square case, β ∗ (ρ) no longer equals to β ∗ if Ei 6= 0. Proposition 2.2 entails that
the intercept term guarantees β ∗ (ρ) = β ∗ , although the intercept term itself depends on
the choice of ρ unless more conditions are imposed.
If i ’s are neither symmetric nor i.i.d., then β ∗ cannot be identified by the previous
criteria because β ∗ (ρ) depends on ρ. Nonetheless, from a modeling perspective, it is
popular and reasonable to assume that i ’s are symmetric or i.i.d. in many situations.
Therefore, Proposition 2.1 and Proposition 2.2 justify the use of M-estimators in those
cases and M-estimators derived from different loss functions can be compared because
they are estimating the same parameter.
7
3
3.1
Main Results
Notation and Assumptions
Let xTi ∈ R1×p denote the i-th row of X and Xj ∈ Rn×1 denote the j-th column of X.
Throughout the paper we will denote by Xij ∈ R the (i, j)-th entry of X, by X[j] ∈
Rn×(p−1) the design matrix X after removing the j-th column, and by xTi,[j] ∈ R1×(p−1)
the vector xTi after removing j-th entry. The M-estimator β̂(ρ) associated with the loss
function ρ is defined as
β̂(ρ) = arg min
β∈Rp
n
n
k=1
k=1
1X
1X
ρ(yk − xTk β) = arg min
ρ(k − xTk (β − β ∗ ))
n
β∈Rp n
(5)
We define ψ = ρ0 to be the first derivative of ρ. We will write β̂(ρ) simply β̂ when no
confusion can arise.
When the original design matrix X does not contain an intercept term, we can simply
replace X by (1, X) and augment β into a (p + 1)-dimensional vector (α, β T )T . Although
being a special case, we will discuss the question of intercept in Section 3.2.2 due to its
important role in practice.
Equivariance and reduction to the null case
β̂ −Eβ̂j
is invariant to the choice of β ∗ , provided that β ∗
Notice that our target quantity √j
Var(β̂j )
is identifiable as discussed in Section 2.3, we can assume β ∗ = 0 without loss of generality.
In this case, we assume in particular that the design matrix X has full column rank. Then
yk = k and
n
1X
ρ(k − xTk β).
β̂ = arg min
β∈Rp n
k=1
Similarly we define the leave-j-th-predictor-out version as
n
β̂[j] = arg min
β∈Rp−1
1X
ρ(k − xTk,[j] β).
n
k=1
Based on these notations we define the full residuals Rk as
Rk = k − xTk β̂,
k = 1, 2, . . . , n
and the leave-j-th-predictor-out residual as
rk,[j] = k − xTk,[j] β̂[j] ,
k = 1, 2, . . . , n,
j = 1, . . . , p.
Three n × n diagonal matrices are defined as
D = diag(ψ 0 (Rk ))nk=1 ,
D̃ = diag(ψ 00 (Rk ))nk=1 ,
D[j] = diag(ψ 0 (rk,[j] ))nk=1 .
(6)
We say a random variable Z is σ 2 -sub-gaussian if for any λ ∈ R,
EeλZ ≤ e
λ2 σ 2
2
.
In addition, we use Jn ⊂ {1, . . . , p} to represent the indices of parameters which are
of interest. Intuitively, more entries in Jn would require more stringent conditions for the
asymptotic normality.
Finally, we adopt Landau’s notation (O(·), o(·), Op (·), op (·)). In addition, we say an =
Ω(bn ) if bn = O(an ) and similarly, we say an = Ωp (bn ) if bn = Op (an ). To simplify the
logarithm factors, we use the symbol polyLog(n) to denote any factor that can be upper
1
bounded by (log n)γ for some γ > 0. Similarly, we use polyLog(n)
to denote any factor
1
0
that can be lower bounded by (log n)γ 0 for some γ > 0.
8
3.2
Technical Assumptions and main result
Before stating the assumptions, we need to define several quantities of interest. Let
T
T
X X
X X
λ+ = λmax
, λ− = λmin
n
n
be the largest (resp. smallest) eigenvalue of the matrix
canonical basis vector and
XT X
n .
Let ei ∈ Rn be the i-th
T
T
D[j] X[j] )−1 X[j]
)ei .
hj,1,i , (I − D[j] X[j] (X[j]
hj,0 , (ψ(r1,[j] ), . . . , ψ(rn,[j] ))T ,
Finally, let
(
|hTj,1,i Xj |
|hTj,0 Xj |
∆C = max max
, max
j∈Jn ||hj,0 ||2 i≤n,j∈Jn ||hj,1,i ||2
)
,
Qj = Cov(hj,0 )
Based on the quantities defined above, we state our technical assumptions on the design
matrix X followed by the main result. A detailed explanation of the assumptions follows.
1
, K1 , K2 =
A1 ρ(0) = ψ(0) = 0 and there exists positive numbers K0 = Ω polyLog(n)
O (polyLog(n)), such that for any x ∈ R,
K0 ≤ ψ 0 (x) ≤ K1 ,
|ψ 00 (x)|
d p 0
( ψ (x)) = p
≤ K2 ;
dx
ψ 0 (x)
A2 i = ui (Wi ) where (W1 , . . . , Wn ) ∼ N (0, In×n ) and ui are smooth functions with
ku0i k∞ ≤ c1 and ku00i k∞ ≤
c2 for some c1 , c2 = O(polyLog(n)). Moreover, assume
mini Var(i ) = Ω
1
polyLog(n)
.
A3 λ+ = O(polyLog(n)) and λ− = Ω
A4 minj∈Jn
XjT Qj Xj
tr(Qj )
=Ω
1
polyLog(n)
1
polyLog(n)
;
;
A5 E∆8C = O (polyLog(n)).
Theorem 3.1. Under assumptions A1 − A5, as p/n → κ for some κ ∈ (0, 1), while
n → ∞,
β̂
−
E
β̂
j
j
, N (0, 1) = o(1),
max dTV L q
j∈Jn
Var(β̂j )
where dTV (P, Q) = supA |P (A) − Q(A)| is the total variation distance.
We provide several examples where our assumptions hold in Section 3.3. We also
provide an example where the asymptotic normality does not hold in Section 3.3.4. This
shows that our assumptions are not just artifacts of the proof technique we developed,
but that there are (probably many) situations where asymptotic normality will not hold,
even coordinate-wise.
3.2.1
Discussion of Assumptions
Now we discuss assumptions A1 - A5. Assumption A1 implies the boundedness of the
first-order and the second-order derivatives of ψ. The upper bounds are satisfied by most
loss functions including the L2 loss, the smoothed L1 loss, the smoothed Huber loss,
etc. The non-zero lower bound K0 implies the strong convexity of ρ and is required for
technical reasons. It can be removed by considering first a ridge-penalized M-estimator
9
and taking appropriate limits as in El Karoui (2013, 2015). In addition, in this paper we
consider the smooth loss functions and the results can be extended to non-smooth case
via approximation.
Assumption A2 was proposed in Chatterjee (2009) when deriving the second-order
Poincaré inequality discussed in Section 4.1. It means that the results apply to nonGaussian distributions, such as the uniform distribution on [0, 1] by taking ui = Φ, the
cumulative distribution function of standard normal distribution. Through the gaussian
concentration (Ledoux, 2001), we see that A2 implies that i are c21 -sub-gaussian. Thus
A2 controls the tail behavior of i . The boundedness of u0i and u00i are required only for the
direct application of Chatterjee’s results. In fact, a look at his proof suggests that one can
obtain a similar result to his Second-Order Poincaré inequality involving moment bounds
on u0i (Wi ) and u00i (Wi ). This would be a way to weaken our assumptions to permit to have
the heavy-tailed distributions expected in robustness studies. Since we are considering
strongly convex loss-functions, it is not completely unnatural to restrict our attention to
light-tailed errors. Furthermore, efficiency - and not only robustness - questions are one
of the main reasons to consider these estimators in the moderate-dimensional context.
The potential gains in efficiency obtained by considering regression M-estimates (Bean
et al., 2013) apply in the light-tailed context, which further justify our interest in this
theoretical setup.
Assumption A3 is completely checkable since it only depends on X. It controls the
singularity of the design matrix. Under A1 and A3, it can be shown that the objective
function is strongly convex
withcurvature (the smallest eigenvalue of the Hessian matrix)
1
everywhere.
lower bounded by Ω polyLog(n)
Assumption A4 is controlling the left tail of quadratic forms. It is fundamentally
connected to aspects of the concentration of measure phenomenon (Ledoux, 2001). This
condition is proposed and emphasized under the random design setting by El Karoui et
al. (2013). Essentially, it means that for a matrix Qj ,which does not depend on Xj , the
quadratic form XjT Qj Xj should have the same order as tr(Qj ).
Assumption A5 is proposed by El Karoui (2013) under the random design settings. It
is motivated by leave-one-predictor-out analysis. Note that ∆C is the maximum of linear
contrasts of Xj , whose coefficients do not depend on Xj . It is easily checked for design
matrix X which is a realization of a random matrix with i.i.d sub-gaussian entries for
instance.
Remark 3.2. In certain applications, it is reasonable to make the following additional
assumption:
A6 ρ is an even function and i ’s have symmetric distributions.
Although assumption A6 is not necessary to Theorem 3.1, it can simplify the result. Under
d
assumption A6, when X is full rank, we have, if = denotes equality in distribution,
n
β̂ − β ∗ = arg min
η∈Rp
n
1X
1X
ρ(i − xTi η) = arg min
ρ(−i + xTi η)
n i=1
η∈Rp n i=1
n
d
= arg min
η∈Rp
1X
ρ(i + xTi η) = β ∗ − β̂.
n i=1
This implies that β̂ is an unbiased estimator, provided it has a mean, which is the case
here. Unbiasedness is useful in practice, since then Theorem 3.1 reads
β̂j − βj∗
, N (0, 1) = o(1) .
max dTV L q
j∈Jn
Var(β̂j )
For inference, we only need to estimate the asymptotic variance.
10
3.2.2
An important remark concerning Theorem 3.1
When Jn is a subset of {1, . . . , p}, the coefficients in Jnc become nuisance parameters.
Heuristically, in order for identifying βJ∗n , one only needs the subspaces span(XJn ) and
span(XJnc ) to be distinguished and XJn has a full column rank. Here XJn denotes the
sub-matrix of X with columns in Jn . Formally, let
Σ̂Jn =
1 T
X (I − XJnc (XJTnc XJnc )− XJTnc )XJn
n Jn
where A− denotes the generalized inverse of A, and
λ̃+ = λmax Σ̂Jn , λ̃− = λmin Σ̂Jn .
Then Σ̂Jn characterizes the behavior of XJn after removing the effect of XJnc . In particular, we can modify the assumption A3 by
1
.
A3* λ̃+ = O(polyLog(n)) and λ̃− = Ω polyLog(n)
Then we are able to derive a stronger result in the case where |Jn | < p than Theorem 3.1
as follows.
Corollary 3.3. Under assumptions A1-2, A4-5 and A3*, as p/n → κ for some κ ∈
(0, 1),
β̂
−
E
β̂
j
j
, N (0, 1) = o(1).
max dTV L q
j∈Jn
Var(β̂j )
It can be shown that λ̃+ ≤ λ+ and λ̃− ≥ λ− and hence the assumption A3* is weaker
than A3. It is worth pointing out that the assumption A3* even holds when XJcn does not
have full column rank, in which case βJ∗n is still identifiable and β̂Jn is still well-defined,
although βJ∗nc and β̂Jnc are not; see Appendix C-2 for details.
3.3
Examples
Throughout this subsection (except subsubsection 3.3.4), we consider the case where
X is a realization of a random matrix, denoted by Z (to be distinguished from X).
We will verify that the assumptions A3-A5 are satisfied with high probability under
different regularity conditions on the distribution of Z. This is a standard way to justify
the conditions for fixed design (Portnoy, 1984, 1985) in the literature on regression Mestimates.
3.3.1
Random Design with Independent Entries
First we consider a random matrix Z with i.i.d. sub-gaussian entries.
Proposition 3.4. Suppose Z has i.i.d. mean-zero σ 2-sub-gaussian
entries with Var(Zij ) =
1
2
τ > 0 for some σ = O(polyLog(n)) and τ = Ω polyLog(n) , then, when X is a realization of Z, assumptions A3-A5 for X are satisfied with high probability over Z for
Jn = {1, . . . , p}.
In practice, the assumption of identical distribution might be invalid. In fact the
assumptions A4, A5 and the first part of A3 (λ+ = O (polyLog(n))) are still satisfied with
high probability if we only assume the independence between entries and boundedness of
certain moments. To control λ− , we rely on Litvak et al. (2005) which assumes symmetry
of each entry. We obtain the following result based on it.
11
Proposition 3.5. Suppose Z has independent σ 2 -sub-gaussian entries with
d
Zij = −Zij , Var(Zij ) > τ 2
1
for some σ = O (polyLog(n)) and τ = Ω polyLog(n)
, then, when X is a realization of Z,
assumptions A3-A5 for X are satisfied with high probability over Z for Jn = {1, . . . , p}.
Under the conditions of Proposition 3.5, we can add an intercept term into the design
matrix. Adding an intercept allows us to remove the mean-zero assumption for Zij ’s. In
fact, suppose Zij is symmetric with respect to µj , which is potentially non-zero, for all i,
then according to section 3.2.2, we can replace Zij by Zij − µj and Proposition 3.6 can
be then applied.
Proposition 3.6. Suppose Z = (1, Z̃) and Z̃ ∈ Rn×(p−1) has independent σ 2 -subgaussian entries with
d
Z̃ij − µj = µj − Z̃ij , Var(Z̃ij ) > τ 2
1
and arbitrary µj . Then, when X is a
for some σ = O (polyLog(n)), τ = Ω polyLog(n)
realization of Z, assumptions A3*, A4 and A5 for X are satisfied with high probability
over Z for Jn = {2, . . . , p}.
3.3.2
Dependent Gaussian Design
To show that our assumptions handle a variety of situations, we now assume that the
observations, namely the rows of Z, are i.i.d. random vectors with a covariance matrix
i.i.d.
Σ. In particular we show that the Gaussian design, i.e. zi ∼ N (0, Σ), satisfies the
assumptions with high probability.
i.i.d.
Proposition
3.7. Suppose zi ∼ N (0, Σ) with λmax (Σ) = O (polyLog(n)) and λmin (Σ) =
1
Ω polyLog(n) , then, when X is a realization of Z, assumptions A3-A5 for X are satisfied
with high probability over Z for Jn = {1, . . . , p}.
This result extends to the matrix-normal design (Muirhead, 1982)[Chapter 3], i.e.
(Zij )i≤n,j≤p is one realization of a np-dimensional random variable Z with multivariate
gaussian distribution
vec(Z) , (z1T , z2T , . . . , znT ) ∼ N (0, Λ ⊗ Σ),
and ⊗ is the Kronecker product. It turns out that assumptions A3 − A5 are satisfied if
both Λ and Σ are well-behaved.
Proposition 3.8. Suppose Z is matrix-normal with vec(Z) ∼ N (0, Λ ⊗ Σ) and
1
λmax (Λ), λmax (Σ) = O (polyLog(n)) , λmin (Λ), λmin (Σ) = Ω
.
polyLog(n)
Then, when X is a realization of Z,assumptions A3-A5 for X are satisfied with high
probability over Z for Jn = {1, . . . , p}.
In order to incorporate an intercept term, we need slightly more stringent condition
on Λ. Instead of assumption A3, we prove that assumption A3* - see subsubsection 3.2.2
- holds with high probability.
Proposition 3.9. Suppose Z contains an intercept term, i.e. Z = (1, Z̃) and Z̃ satisfies
the conditions of Proposition 3.8. Further assume that
1
maxi |(Λ− 2 1)i |
1
mini |(Λ− 2 1)i |
= O (polyLog(n)) .
(7)
Then, when X is a realization of Z, assumptions A3*, A4 and A5 for X are satisfied
with high probability over Z for Jn = {2, . . . , p}.
12
When Λ = I, the condition (7) is satisfied. Another non-trivial example is the exchangeable case where Λij are all equal for i 6= j. In this case, 1 is an eigenvector of Λ and
1
1
hence it is also an eigenvector of Λ− 2 . Thus Λ− 2 1 is a multiple of 1 and the condition
(7) is satisfied.
3.3.3
Elliptical Design
Furthermore, we can move from Gaussian-like structure to generalized elliptical models
where zi = ζi Σ1/2 Zi where {ζi , Zij : i = 1, . . . , n; j = 1, . . . , p} are independent random
variables, Zij having for instance mean 0 and variance 1. The elliptical family is quite
flexible in modeling data. It represents a type of data formed by a common driven factor
and independent individual effects. It is widely used in multivariate statistics (Anderson
(1962); Tyler (1987)) and various fields, including finance (Cizek et al., 2005) and biology
(Posekany et al., 2011). In the context of high-dimensional statistics, this class of model
was used to refute universality claims in random matrix theory (El Karoui, 2009). In
robust regression, El Karoui et al. (2011) used elliptical models to show that the limit
of kβ̂k22 depends on the distribution of ζi and hence the geometry of the predictors. As
such, studies limited to Gaussian-like design were shown to be of very limited statistical
interest. See also the deep classical inadmissibility results (Baranchik, 1973; Jurečkovà &
Klebanov, 1997). However, as we will show in the next proposition, the common factors ζi
do not distort the shape of the asymptotic distribution. A similar phenomenon happens
in the random design case - see El Karoui et al. (2013); Bean et al. (2013).
Proposition 3.10. Suppose Z is generated from an elliptical model, i.e.
Zij = ζi Zij ,
where ζi are independent random variables taking values in [a, b] for some 0 < a < b < ∞
and Zij are independent random variables satisfying the conditions of Proposition 3.4 or
Proposition 3.5. Further assume that {ζi : i = 1, . . . , n} and {Zij : i = 1, . . . , n; j =
1, . . . , p} are independent. Then, when X is a realization of Z, assumptions A3-A5 for
X are satisfied with high probability over Z for Jn = {1, . . . , p}.
Thanks to the fact that ζi is bounded away from 0 and ∞, the proof of Proposition
3.10 is straightforward, as shown in Appendix C. However, by a more refined argument
and assuming identical distributions ζi , we can relax this condition.
Proposition 3.11. Under the conditions of Proposition 3.10 (except the boundedness of
ζi ) and assume ζi are i.i.d. samples generated from some distribution F , independent of
n, with
α
P (ζ1 ≥ t) ≤ c1 e−c2 t ,
for some fixed c1 , c2 , α > 0 and F −1 (q) > 0 for any q ∈ (0, 1) where F −1 is the quantile
function of F and is continuous. Then, when X is a realization of Z, assumptions A3-A5
for X are satisfied with high probability over Z for Jn = {1, . . . , p}.
3.3.4
A counterexample
Consider a one-way ANOVA situation. In other words, let the design matrix have exactly
1 non-zero entry per row, whose value is 1. Let {ki }ni=1 be integers in {1, . . . , p}. And
let Xi,j = 1(j = ki ). Furthermore, let us constrain nj = |{i : ki = j}| to be such that
1 ≤ nj ≤ 2bp/nc. Taking for instance ki = (i mod p) is an easy way to produce such a
matrix. The associated statistical model is just yi = i + βk∗i .
It is easy to see that
X
X
β̂j = arg min
ρ(yi − βj ) = arg min
ρ(i − (βj − βj∗ )) .
β∈R
β∈R
i:ki =j
i:ki =j
This is of course a standard location problem. In the moderate-dimensional setting we
consider, nj remains finite as n → ∞. So β̂j is a non-linear function of finitely many
random variables and will in general not be normally distributed.
13
For concreteness, one can take ρ(x) = |x|, in which case β̂j is a median of {yi }{i:ki =j} .
The cdf of β̂j is known exactly by elementary order statistics computations (see David
and Nagaraja (1981)) and is not that of a Gaussian random variable in general. In fact,
the ANOVA design considered here violates the assumption A3 since λ− = minj nj /n =
O (1/n). Further, we can show that the assumption A5 is also violated, at least in the
least-square case; see Section 5.1 for details.
3.4
3.4.1
Comments and discussions
Asymptotic Normality in High Dimensions
In the p-fixed regime, the asymptotic distribution is easily defined as the limit of L(β̂) in
terms of weak topology (Van der Vaart, 1998). However, in regimes where the dimension
p grows, the notion of asymptotic distribution is more delicate. a conceptual question
arises from the fact that the dimension of the estimator β̂ changes with n and thus there
is no well-defined distribution which can serve as the limit of L(β̂), where L(·) denotes
the law. One remedy is proposed by Mallows (1972). Under this framework, a triangular
2
array {Wn,j , j = 1, 2, . . . , pn }, with EWn,j = 0, EWn,j
= 1, is called jointly asymptotically
pn
normal if for any deterministic sequence an ∈ R with kan k2 = 1,
pn
X
L
an,j Wn,j → N (0, 1).
j=1
When the zero mean and unit variance are not satisfied, it is easy to modify the definition
by normalizing random variables.
Definition 3.12 (joint asymptotic normality).
{Wn : Wn ∈ Rpn } is jointly asymptotically normal if and only if for any sequence
{an : an ∈ Rpn },
!
aTn (Wn − EWn )
→ N (0, 1).
L p
aTn Cov(Wn )an
The above definition of asymptotic normality is strong and appealing but was shown
not to hold for least-squares in the moderate p/n regime (Huber, 1973). In fact, Huber
(1973) shows that β̂ LS is jointly asymtotically normal only if
max(X(X T X)−1 X T )i,i → 0.
i
When p/n → κ ∈ (0, 1), provided X is full rank,
max(X(X T X)−1 X T )i,i ≥
i
p
1
tr(X(X T X)−1 X T ) = → κ > 0.
n
n
In other words, in moderate p/n regime, the asymptotic normality cannot hold for all
linear contrasts, even in the case of least-squares.
In applications, however, it is usually not necessary to consider all linear contrasts but
instead a small subset of them, e.g. all coordinates or low dimensional linear contrasts
such as β1∗ − β2∗ . We can naturally modify Definition 3.12 and adapt to our needs by
imposing constraints on an . A popular concept, which we use in Section 1 informally,
is called coordinate-wise asymptotic normality and defined by restricting an to be the
canonical basis vectors, which have only one non-zero element. An equivalent definition
is stated as follows.
Definition 3.13 (coordinate-wise asymptotic normal).
14
{Wn : Wn ∈ Rpn } is coordinate-wise asymptotically normal if and only if for any
sequence {jn : jn ∈ {1, . . . , pn }},
!
Wn,jn − EWn,jn
p
L
→ N (0, 1).
Var(Wn,jn )
A more convenient way to define the coordinate-wise asymptotic normality is to introduce a metric d(·, ·), e.g. Kolmogorov distance and total variation distance, which induces
the weak convergence topology. Then Wn is coordinate-wise asymptotically normal if and
only if
!
!
Wn,j − EWn,j
, N (0, 1) = o(1).
max d L p
j
Var(Wn,j )
3.4.2
Discussion about inference and technical assumptions
Variance and bias estimation
To complete the inference, we need to compute the bias and variance. As discussed in
Remark 3.2, the M-estimator is unbiased if the loss function and the error distribution are
symmetric. For the variance, it is easy to get a conservative estimate via resampling methods such as Jackknife as a consequence of Efron-Stein’s inequality; see El Karoui (2013)
and El Karoui and Purdom (2015) for details. Moreover, by the variance decomposition
formula,
h
i
h
i
h
i
Var(β̂j ) = E Var(β̂j |X) + Var E(β̂j |X) ≥ E Var(β̂j |X) ,
the unconditional variance, when X is a random design matrix, is a conservative estimate.
The unconditional variance can be calculated by solving a non-linear system; see El Karoui
(2013) and Donoho and Montanari (2016).
However, estimating the exact variance is known to be hard. El Karoui and Purdom
(2015) show that the existing resampling schemes, including jacknife, pairs-bootstrap,
residual bootstrap, etc., are either too conservative or too anti-conservative when p/n is
large. The challenge, as mentioned in El Karoui (2013); El Karoui and Purdom (2015),
is due to the fact that the residuals {Ri } do not mimic the behavior of {i } and that
the resampling methods effectively modifies the geometry of the dataset from the point
of view of the statistics of interest. We believe that variance estimation in moderate
p/n regime should rely on different methodologies from the ones used in low-dimensional
estimation.
Technical assumptions
On the other hand, we assume that ρ is strongly convex. One remedy would be adding
a ridge regularized term as in El Karoui (2013) and the new problem is amenable to analysis with the method we used in this article. However, the regularization term introduces
a non-vanishing bias, which is as hard to be derived as the variance. For unregularized Mestimators, the strong convexity is also assumed by other works (El Karoui, 2013; Donoho
& Montanari, 2016). However, we believe that this assumption is unnecessary and can
be removed at least for well-behaved design matrices. Another possibility, for errors that
have more than 2 moments is to just add a small quadratic term to the loss function, e.g.
λx2 /2 with a small λ. Finally, we recall that in many situations, least-squares is actually
more efficient than `1 -regression (see numerical work in Bean et al. (2013)) in moderate
dimensions. This is for instance the case for double-exponential errors if p/n is greater
than .3 or so. As such working with strongly convex loss functions is as problematic
for moderate-dimensional regression M-estimates as it would be in the low-dimensional
setting.
To explore traditional robustness questions, we will need to weaken the requirements
of Assumption A2. This requires substantial work and an extension of the main results
15
of Chatterjee (2009). Because the technical part of the paper is already long, we leave
this interesting statistical question to future works.
4
Proof Sketch
Since the proof of Theorem 3.1 is somewhat technical, we illustrate the main idea in this
section.
First notice that the M-estimator β̂ is an implicit function of independent random
variables 1 , . . . , n , which is determined by
n
1X
xi ψ(i − xi β̂) = 0.
n i=1
(8)
The Hessian matrix of the loss function in (5) is n1 X T DX D0 λ− Ip under the notation
introduced in section 3.1. The assumption A3 then implies that the loss function is
strongly convex, in which case β̂ is unique. Then β̂ can be seen as a non-linear function
of i ’s. A powerful central limit theorem for this type of statistics is the second-order
Poincaré inequality (SOPI), developed in Chatterjee (2009) and used there to re-prove
central limit theorems for linear spectral statistics of large random matrices. We recall
one of the main results for the convenience of the reader.
Proposition 4.1 (SOPI; Chatterjee, 2009). Let W = (W1 , . . . , Wn ) = (u1 (W1 ), . . . , un (Wn ))
i.i.d.
where Wi ∼ N (0, 1) and ku0i k∞ ≤ c1 , ku00i k∞ ≤ c2 . Take any g ∈ C 2 (Rn ) and let ∇i g,
∇g and ∇2 g denote the i-th partial derivative, gradient and Hessian of g. Let
κ0 =
E
n
X
! 21
∇i g(W )
4
,
1
1
κ1 = (Ek∇g(W )k42 ) 4 ,
κ2 = (Ek∇2 g(W )k4op ) 4 ,
i=1
and U = g(W ). If U has finite fourth moment, then
!
!
√
2 5(c1 c2 κ0 + c31 κ1 κ2 )
U − EU
, N (0, 1) ≤
dTV L p
.
Var(U )
Var(U )
From (8), it is not hard to compute the gradient and Hessian of β̂j with respect to .
Recalling the definitions in Equation (6) on p. 8, we have
Lemma 4.2. Suppose ψ ∈ C 2 (Rn ), then
∂ β̂j
= eTj (X T DX)−1 X T D
∂T
(9)
∂ β̂j
= GT diag(eTj (X T DX)−1 X T D̃)G
∂∂T
where ej is the j-th cononical basis vectors in Rp and
(10)
G = I − X(X T DX)−1 X T D.
Recalling the definitions of Ki ’s in Assumption A1 on p. 9, we can bound κ0 , κ1 and
κ2 as follows.
Lemma 4.3. Let κ0j , κ1j , κ2j defined as in Proposition 4.1 by setting W = and g(W ) =
β̂j . Let
1
(11)
Mj = EkeTj (X T DX)−1 X T D 2 k∞ ,
then
κ20j
≤
K12
3
(nK0 λ− ) 2
· Mj ,
κ41j
K12
≤
,
(nK0 λ− )2
16
κ42j
≤
K24
3
(nK0 λ− ) 2
·
K1
K0
4
· Mj .
As a consequence of the second-order Poincaré inequality , we can bound the total variation distance between β̂j and a normal distribution by Mj and Var(β̂j ). More
precisely, we prove the following Lemma.
Lemma 4.4. Under assumptions A1-A3,
β̂j − Eβ̂j
, N (0, 1) = Op
max dTV L q
j
Var(β̂j )
1
maxj (nMj2 ) 8
n · minj Var(β̂j )
!
· polyLog(n) .
Lemma 4.4 is the key to prove Theorem 3.1. To obtain the coordinate-wise asymptotic
normality, it is left to establish an upper bound for Mj and a lower bound for Var(β̂j ).
In fact, we can prove that
Lemma 4.5. Under assumptions A1 - A5,
1
polyLog(n)
, min Var(β̂j ) = Ω
.
max Mj = O
j
j
n
n · polyLog(n)
Then Lemma 4.4 and Lemma 4.5 together imply that
β̂
−
E
β̂
polyLog(n)
j
j
max dTV L q
, N (0, 1) = O
= o(1).
1
j
n8
Var(β̂j )
Appendix A, provides a roadmap of the proof of Lemma 4.5 under a special case where
the design matrix X is one realization of a random matrix with i.i.d. sub-gaussian entries.
It also serves as an outline of the rigorous proof in Appendix B.
4.1
Comment on the Second-Order Poincaré inequality
Pn
Notice that when g is a linear function such that g(z) = i=1 ai zi , then the Berry-Esseen
inequality (Esseen, 1945) implies that
!
!
Pn
|ai |3
W − EW
dK L p
, N (0, 1) Pi=1
3 ,
n
Var(W )
( i=1 a2i ) 2
where
dK (F, G) = sup |F (x) − G(x)|.
x
On the other hand, the second-order Poincaré inequality implies that
!
!
!
!
1
Pn
4 2
W − EW
W − EW
i=1 ai
, N (0, 1) ≤ dTV L p
, N (0, 1) Pn
dK L p
.
2
Var(W )
Var(W )
i=1 ai
This is slightly worse than the Berry-Esseen bound and requires stronger conditions on
the distributions of variates but provides bounds for TV metric instead of Kolmogorov
metric. This comparison shows that second-order Poincaré inequality can be regarded as
a generalization of the Berry-Esseen bound for non-linear transformations of independent
random variables.
5
Least-Squares Estimator
The Least-Squares Estimator is a special case of an M-estimator with ρ(x) = 12 x2 . Because
the estimator can then be written explicitly, the analysis of its properties is extremely
simple and it has been understood for several decades (see arguments in e.g. Huber
(1973)[Lemma 2.1] and Huber (1981)[Proposition 2.2]). In this case, the hat matrix
H = X(X T X)−1 X T captures all the problems associated with dimensionality in the
problem. In particular, proving the asymptotic normality simply requires an application
of the Lindeberg-Feller theorem.
It is however somewhat helpful to compare the conditions required for asymptotic
normality in this simple case and the ones we required in the more general setup of
Theorem 3.1. We do so briefly in this section.
17
5.1
Coordinate-Wise Asymptotic Normality of LSE
Under the linear model (1), when X is full rank,
β̂ LS = β ∗ + (X T X)−1 X T ,
thus each coordinate of β̂ LS is a linear contrast of with zero mean. Instead of assumption
A2, which requires i to be sub-gaussian, we only need to assume maxi E|i |3 < ∞, under
which the Berry-Essen bound for non-i.i.d. data (Esseen, 1945) implies that
T
−1 T
T
−1 T 3
β̂j − βj∗
, N (0, 1) kej (X X) X k3 ≤ kej (X X) X k∞ .
dK L q
kej (X T X)−1 X T k2
keTj (X T X)−1 X T k32
Var(β̂ )
j
This motivates us to define a matrix specific quantity Sj (X) such that
Sj (X) =
keTj (X T X)−1 X T k∞
keTj (X T X)−1 X T k2
(12)
then the Berry-Esseen bound implies that maxj∈Jn Sj (X) determines the coordinate-wise
asymptotic normality of β̂ LS .
Theorem 5.1. If E maxi |i |3 < ∞, then
β̂
−
β
E|i |3
LS,j
0,j
max dK q
, N (0, 1) ≤ A ·
3 · max Sj (X),
j∈Jn
(E2i ) 2 j∈Jn
Var(β̂LS,j )
where A is an absolute constant and dK (·, ·) is the Kolmogorov distance, defined as
dK (F, G) = sup |F (x) − G(x)|.
x
It turns out that maxj∈Jn Sj (X) plays in the least-squares setting the role of ∆C in
assumption A5. Since it has been known that a condition like Sj (X) → 0 is necessary
for asymptotic normality of least-square estimators (Huber (1973)[Proposition 2.2]), this
shows in particular that our Assumption A5, or a variant, is also needed in the general
case. See Appendix C-4.1 for details.
5.2
Discussion
Naturally, checking the conditions for asymptotic normality is much easier in the leastsquares case than in the general case under consideration in this paper. In particular:
1. Asymptotic normality conditions can be checked for a broader class of random
design matrices. See Appendix C-4.2 for details.
kX k
.
2. For orthogonal design matrices, i.e X T X = cId for some c > 0, Sj (X) = kXjj k∞
2
Hence, the condition Sj (X) = o(1) is true if and only if no entry dominates the
j − th row of X.
3. The ANOVA-type counterexample we gave in Section 3.3.4 still provides a counterexample. The reason now is different: namely the sum of finitely many independent
random variables is evidently in general non-Gaussian. In fact, in this case, Sj (X) =
√1 is bounded away from 0.
nj
Inferential questions are also extremely simple in this context and essentially again dimensionindependent for the reasons highlighted above. Theorem 5.1 naturally reads,
β̂j − βj∗
d
q
→ N (0, 1).
T
T
−1
σ ej (X X) ej
18
(13)
Estimating σ is still simple under minimal conditions provided n − p → ∞: see Bickel
and Freedman (1983)[Theorem 1.3] or standard computations concerning the normalized
residual sum-of-squares (using variance computations for the latter may require up to 4
moments for i ’s). Then we can replace σ in (13) by σ̂ with
n
σ̂ 2 =
1 X 2
Rk
n−p
k=1
where Rk = yk − xTk β̂ and construct confidence intervals for βj∗ based on σ̂. If n − p does
not tend to ∞, the normalized residual sum of squares is evidently not consistent even in
the case of Gaussian errors, so this requirement may not be dispensed of.
6
Numerical Results
As seen in the previous sections and related papers, there are five important factors that
affect the distribution of β̂: the design matrix X, the error distribution L(), the sample
size n, the ratio κ, and the loss function ρ. The aim of this section is to assess the
quality of the agreement between the asymptotic theoretical results of Theorem 3.1 and
the empirical, finite-dimensional properties of β̂(ρ). We also perform a few simulations
where some of the assumptions of Theorem 3.1 are violated to get an intuitive sense of
whether those assumptions appear necessary or whether they are simply technical artifacts
associated with the method of proof we developed. As such, the numerical experiments
we report on in this section can be seen as a complement to Theorem 3.1 rather than
only a simple check of its practical relevance.
The design matrices we consider are one realization of random design matrices of the
following three types:
i.i.d.
(i.i.d. design) : Xij ∼ F ;
i.i.d.
i.i.d.
(elliptical design) : Xij = ζi X̃ij , where X̃ij ∼ N (0, 1) and ζi ∼ F . In addition,
{ζi } is independent of {X̃ij };
(partial Hadamard design) : a matrix formed by a random set of p columns of a n×n
Hadamard matrix, i.e. a n × n matrix whose columns are orthogonal with entries
restricted to ±1.
Here we consider two candidates for F in i.i.d. design and elliptical design: standard
normal distribution N (0, 1) and t-distribution with two degrees of freedom (denoted t2 ).
For the error distribution, we assume that has i.i.d. entries with one of the above two
distributions, namely N (0, 1) and t2 . The t-distribution violates our assumption A2.
To evaluate the finite sample performance, we consider the sample sizes n ∈ {100, 200, 400, 800}
and κ ∈ {0.5, 0.8}. In this section we will consider a Huber loss with k = 1.345 (Huber,
1981), i.e.
1 2
|x| ≤ k
2x
ρ(x) =
k2
kx − 2 |x| > k
k = 1.345 is the default in R and yields 95% relative efficiency for Gaussian errors in
low-dimensional problems. We also carried out the numerical work for L1 -regression, i.e.
ρ(x) = |x|. See Appendix D for details.
6.1
Asymptotic Normality of A Single Coordinate
First we simulate the finite sample distribution of β̂1 , the first coordinate of β̂. For each
combination of sample size n (100, 200, 400 and 800), type of design (i.i.d, elliptical and
Hadamard), entry distribution F (normal and t2 ) and error distribution L() (normal
and t2 ), we run 50 simulations with each consisting of the following steps:
(Step 1) Generate one design matrix X;
19
(Step 2) Generate the 300 error vectors ;
(Step 3) Regress each Y = on the design matrix X and end up with 300 random samples
(1)
(300)
of β̂1 , denoted by β̂1 , . . . , β̂1
;
b
(Step 4) Estimate the standard deviation of β̂1 by the sample standard error sd;
h
i
(k)
b β̂ (k) + 1.96 · sd
b for each
(Step 5) Construct a confidence interval I (k) = β̂1 − 1.96 · sd,
1
k = 1, . . . , 300;
(Step 6) Calculate the empirical 95% coverage by the proportion of confidence intervals
which cover the true β1 = 0.
Finally, we display the boxplots of the empirical 95% coverages of β̂1 for each case in
Figure 2. It is worth mentioning that our theories cover two cases: 1) i.i.d design with
normal entries and normal errors (orange bars in the first row and the first column), see
Proposition 3.4; 2) elliptical design with normal factors ζi and normal errors (orange bars
in the second row and the first column), see Proposition 3.10.
We first discuss the case κ = 0.5. In this case, there are only two samples per
parameter. Nonetheless, we observe that the coverage is quite close to 0.95, even with a
sample size as small as 100, in both cases that are covered by our theories. For other cases,
it is interesting to see that the coverage is valid and most stable in the partial hadamard
design case and is not sensitive to the distribution of multiplicative factor in elliptical
design case even when the error has a t2 distribution. For i.i.d. designs, the coverage
is still valid and stable when the entry is normal. By contrast, when the entry has a t2
distribution, the coverage has a large variation in small samples. The average coverage
is still close to 0.95 in the i.i.d. normal design case but is slightly lower than 0.95 in the
i.i.d. t2 design case. In summary, the finite sample distribution of β̂1 is more sensitive
to the entry distribution than the error distribution. This indicates that the assumptions
on the design matrix are not just artifacts of the proof but are quite essential.
The same conclusion can be drawn from the case where κ = 0.8 except that the
variation becomes larger in most cases when the sample size is small. However, it is
worth pointing out that even in this case where there is 1.25 samples per parameter, the
sample distribution of β̂1 is well approximated by a normal distribution with a moderate
sample size (n ≥ 400). This is in contrast to the classical rule of thumb which suggests
that 5-10 samples are needed per parameter.
6.2
Asymptotic Normality for Multiple Marginals
Since our theory holds for general Jn , it is worth checking the approximation for multiple
coordinates in finite samples. For illustration, we consider 10 coordinates, namely β̂1 ∼
β̂10 , simultaneously and calculate the minimum empirical 95% coverage. To avoid the
finite sample dependence between coordinates involved in the simulation, we estimate the
empirical coverage independently for each coordinate. Specifically, we run 50 simulations
with each consisting of the following steps:
(Step 1) Generate one design matrix X;
(Step 2) Generate the 3000 error vectors ;
(Step 3) Regress each Y = on the design matrix X and end up with 300 random samples
of β̂j for each j = 1, . . . , 10 by using the (300(j − 1) + 1)-th to 300j-th response
vector Y ;
b j for
(Step 4) Estimate the standard deviation of β̂j by the sample standard error sd
j = 1, . . . , 10;
h
i
(k)
(k)
b j , β̂ (k) + 1.96 · sd
b j for
(Step 5) Construct a confidence interval Ij = β̂j − 1.96 · sd
j
each j = 1, . . . , 10 and k = 1, . . . , 300;
20
^
Coverage of β1 (κ = 0.5)
normal
^
Coverage of β1 (κ = 0.8)
t(2)
normal
1.00
●
●
●
●
●
0.95
●
1.00
1.00
●
●
●
●
●
●
●
0.90
●
●
●
●
●
●
1.00
0.95
●
●
●
●
●
●
●
●
100
200
400
800
ellip
●
Coverage
0.90
0.95
●
●
0.90
ellip
Coverage
●
iid
●
iid
0.95
t(2)
1.00
0.90
1.00
0.90
100
200
400
800
100
200
400
hadamard
hadamard
0.95
0.95
0.90
800
100
200
400
Sample Size
Entry Dist.
●
normal
t(2)
800
Sample Size
hadamard
Entry Dist.
●
normal
t(2)
hadamard
Figure 2: Empirical 95% coverage of β̂1 with κ = 0.5 (left) and κ = 0.8 (right) using
Huber1.345 loss. The x-axis corresponds to the sample size, ranging from 100 to 800;
the y-axis corresponds to the empirical 95% coverage. Each column represents an error
distribution and each row represents a type of design. The orange solid bar corresponds
to the case F = Normal; the blue dotted bar corresponds to the case F = t2 ; the red
dashed bar represents the Hadamard design.
(Step 6) Calculate the empirical 95% coverage by the proportion of confidence intervals
which cover the true βj = 0, denoted by Cj , for each j = 1, . . . , 10,
(Step 7) Report the minimum coverage min1≤j≤10 Cj .
If the assumptions A1 - A5 are satisfied, min1≤j≤10 Cj should also be close to 0.95 as
a result of Theorem 3.1. Thus, min1≤j≤10 Cj is a measure for the approximation accuracy
for multiple marginals. Figure 3 displays the boxplots of this quantity under the same
scenarios as the last subsection. In two cases that our theories cover, the minimum
coverage is increasingly closer to the true level 0.95. Similar to the last subsection,
the approximation is accurate in the partial hadamard design case and is insensitive
to the distribution of multiplicative factors in the elliptical design case. However, the
approximation is very inaccurate in the i.i.d. t2 design case. Again, this shows the
evidence that our technical assumptions are not artifacts of the proof.
On the other hand, the figure 3 suggests using a conservative variance estimator, e.g.
the Jackknife estimator, or corrections on the confidence level in order to make simultaneous inference on multiple coordinates. Here we investigate the validity of Bonferroni
correction by modifying the step 5 and step 6. The confidence interval after Bonferroni
correction is obtained by
h
i
(k)
(k)
b j , β̂ (k) + z1−α/20 · sd
bj
Ij = β̂j − z1−α/20 · sd
(14)
j
where α = 0.05 and zγ is the γ-th quantile of a standard normal distribution. The
(k)
proportion of k such that 0 ∈ Ij for all j ≤ 10 should be at least 0.95 if the marginals
are all close to a normal distribution. We modify the confidence intervals in step 5 by
(k)
(14) and calculate the proportion of k such that 0 ∈ Ij for all j in step 6. Figure 4
displays the boxplots of this coverage. It is clear that the Bonferroni correction gives the
valid coverage except when n = 100, κ = 0.8 and the error has a t2 distribution.
21
^
^
Min. coverage of β1 ~ β10 (κ = 0.5)
normal
^
^
Min. coverage of β1 ~ β10 (κ = 0.8)
t(2)
normal
0.95
0.90
t(2)
0.95
●
●
●
●
●
●
●
●
0.90
●
●
●
●
●
●
●
●
0.80
0.95
●
0.90
●
●
●
●
●
ellip
●
●
Coverage
0.95
●
ellip
Coverage
iid
0.80
0.95
0.90
●
●
iid
0.80
●
●
●
●
●
0.80
0.95
0.80
100
200
400
800
100
200
400
hadamard
hadamard
0.90
0.90
0.80
800
100
200
400
Sample Size
Entry Dist.
●
normal
t(2)
800
100
200
400
800
Sample Size
hadamard
Entry Dist.
●
normal
t(2)
hadamard
Figure 3: Mininum empirical 95% coverage of β̂1 ∼ β̂10 with κ = 0.5 (left) and κ = 0.8
(right) using Huber1.345 loss. The x-axis corresponds to the sample size, ranging from
100 to 800; the y-axis corresponds to the minimum empirical 95% coverage. Each column
represents an error distribution and each row represents a type of design. The orange
solid bar corresponds to the case F = Normal; the blue dotted bar corresponds to the
case F = t2 ; the red dashed bar represents the Hadamard design.
7
Conclusion
We have proved coordinate-wise asymptotic normality for regression M-estimates in the
moderate-dimensional asymptotic regime p/n → κ ∈ (0, 1), for fixed design matrices
under appropriate technical assumptions. Our design assumptions are satisfied with high
probability for a broad class of random designs. The main novel ingredient of the proof
is the use of the second-order Poincaré inequality. Numerical experiments confirm and
complement our theoretical results.
22
^
^
Bonf. coverage of β1 ~ β10 (κ = 0.5)
normal
^
^
Bonf. coverage of β1 ~ β10 (κ = 0.8)
t(2)
normal
1.00
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
iid
0.95
iid
0.95
●
0.90
0.90
1.00
●
●
●
●
●
●
●
●
●
●
●
●
●
0.95
●
●
0.90
0.90
1.00
1.00
hadamard
hadamard
0.95
●
ellip
ellip
0.95
Coverage
1.00
Coverage
t(2)
1.00
0.95
0.90
0.90
100
200
400
800
100
200
400
800
100
200
400
Sample Size
Entry Dist.
●
normal
t(2)
800
100
200
400
800
Sample Size
hadamard
Entry Dist.
●
normal
t(2)
hadamard
Figure 4: Empirical 95% coverage of β̂1 ∼ β̂10 after Bonferroni correction with κ = 0.5
(left) and κ = 0.8 (right) using Huber1.345 loss. The x-axis corresponds to the sample size,
ranging from 100 to 800; the y-axis corresponds to the empirical uniform 95% coverage
after Bonferroni correction. Each column represents an error distribution and each row
represents a type of design. The orange solid bar corresponds to the case F = Normal;
the blue dotted bar corresponds to the case F = t2 ; the red dashed bar represents the
Hadamard design.
References
Anderson, T. W. (1962). An introduction to multivariate statistical analysis. Wiley New
York.
Bai, Z., & Silverstein, J. W. (2010). Spectral analysis of large dimensional random
matrices (Vol. 20). Springer.
Bai, Z., & Yin, Y. (1993). Limit of the smallest eigenvalue of a large dimensional sample
covariance matrix. The annals of Probability, 1275–1294.
Baranchik, A. (1973). Inadmissibility of maximum likelihood estimators in some multiple regression problems with three or more independent variables. The Annals of
Statistics, 312–321.
Bean, D., Bickel, P., El Karoui, N., Lim, C., & Yu, B. (2012). Penalized robust regression
in high-dimension. Technical Report 813, Department of Statistics, UC Berkeley.
Bean, D., Bickel, P. J., El Karoui, N., & Yu, B. (2013). Optimal M-estimation in highdimensional regression. Proceedings of the National Academy of Sciences, 110 (36),
14563–14568.
Bickel, P. J., & Doksum, K. A. (2015). Mathematical statistics: Basic ideas and selected
topics, volume i (Vol. 117). CRC Press.
Bickel, P. J., & Freedman, D. A. (1981). Some asymptotic theory for the bootstrap. The
Annals of Statistics, 1196–1217.
Bickel, P. J., & Freedman, D. A. (1983). Bootstrapping regression models with many
parameters. Festschrift for Erich L. Lehmann, 28–48.
Chatterjee, S. (2009). Fluctuations of eigenvalues and second order poincaré inequalities.
Probability Theory and Related Fields, 143 (1-2), 1–40.
Chernoff, H. (1981). A note on an inequality involving the normal distribution. The
Annals of Probability, 533–535.
23
Cizek, P., Härdle, W. K., & Weron, R. (2005). Statistical tools for finance and insurance.
Springer Science & Business Media.
Cochran, W. G. (1977). Sampling techniques. John Wiley & Sons.
David, H. A., & Nagaraja, H. N. (1981). Order statistics. Wiley Online Library.
Donoho, D., & Montanari, A. (2016). High dimensional robust m-estimation: Asymptotic
variance via approximate message passing. Probability Theory and Related Fields,
166 , 935-969.
Durrett, R. (2010). Probability: theory and examples. Cambridge university press.
Efron, B., & Efron, B. (1982). The jackknife, the bootstrap and other resampling plans
(Vol. 38). SIAM.
El Karoui, N. (2009). Concentration of measure and spectra of random matrices: applications to correlation matrices, elliptical distributions and beyond. The Annals of
Applied Probability, 19 (6), 2362–2405.
El Karoui, N. (2010). High-dimensionality effects in the markowitz problem and other
quadratic programs with linear constraints: Risk underestimation. The Annals of
Statistics, 38 (6), 3487–3566.
El Karoui, N. (2013). Asymptotic behavior of unregularized and ridge-regularized
high-dimensional robust regression estimators: rigorous results. arXiv preprint
arXiv:1311.2445 .
El Karoui, N. (2015). On the impact of predictor geometry on the performance on highdimensional ridge-regularized generalized robust regression estimators. Technical
Report 826, Department of Statistics, UC Berkeley.
El Karoui, N., Bean, D., Bickel, P., Lim, C., & Yu, B. (2011). On robust regression with
high-dimensional predictors. Technical Report 811, Department of Statistics, UC
Berkeley.
El Karoui, N., Bean, D., Bickel, P. J., Lim, C., & Yu, B. (2013). On robust regression
with high-dimensional predictors. Proceedings of the National Academy of Sciences,
110 (36), 14557–14562.
El Karoui, N., & Purdom, E. (2015). Can we trust the bootstrap in high-dimension?
Technical Report 824, Department of Statistics, UC Berkeley.
Esseen, C.-G. (1945). Fourier analysis of distribution functions. a mathematical study of
the laplace-gaussian law. Acta Mathematica, 77 (1), 1–125.
Geman, S. (1980). A limit theorem for the norm of random matrices. The Annals of
Probability, 252–261.
Hanson, D. L., & Wright, F. T. (1971). A bound on tail probabilities for quadratic forms
in independent random variables. The Annals of Mathematical Statistics, 42 (3),
1079–1083.
Horn, R. A., & Johnson, C. R. (2012). Matrix analysis. Cambridge university press.
Huber, P. J. (1964). Robust estimation of a location parameter. The Annals of Mathematical Statistics, 35 (1), 73–101.
Huber, P. J. (1972). The 1972 wald lecture robust statistics: A review. The Annals of
Mathematical Statistics, 1041–1067.
Huber, P. J. (1973). Robust regression: asymptotics, conjectures and monte carlo. The
Annals of Statistics, 799–821.
Huber, P. J. (1981). Robust statistics. John Wiley & Sons, Inc., New York.
Huber, P. J. (2011). Robust statistics. Springer.
Johnstone, I. M. (2001). On the distribution of the largest eigenvalue in principal components analysis. Annals of statistics, 295–327.
Jurečkovà, J., & Klebanov, L. (1997). Inadmissibility of robust estimators with respect
to l1 norm. Lecture Notes-Monograph Series, 71–78.
Latala, R. (2005). Some estimates of norms of random matrices. Proceedings of the
American Mathematical Society, 133 (5), 1273–1282.
Ledoux, M. (2001). The concentration of measure phenomenon (No. 89). American
Mathematical Soc.
Litvak, A. E., Pajor, A., Rudelson, M., & Tomczak-Jaegermann, N. (2005). Smallest
singular value of random matrices and geometry of random polytopes. Advances in
24
Mathematics, 195 (2), 491–523.
Mallows, C. (1972). A note on asymptotic joint normality. The Annals of Mathematical
Statistics, 508–515.
Mammen, E. (1989). Asymptotics with increasing dimension for robust regression with
applications to the bootstrap. The Annals of Statistics, 382–400.
Marčenko, V. A., & Pastur, L. A. (1967). Distribution of eigenvalues for some sets of
random matrices. Mathematics of the USSR-Sbornik , 1 (4), 457.
Muirhead, R. J. (1982). Aspects of multivariate statistical theory (Vol. 197). John Wiley
& Sons.
Portnoy, S. (1984). Asymptotic behavior of M-estimators of p regression parameters when
p2 /n is large. i. consistency. The Annals of Statistics, 1298–1309.
Portnoy, S. (1985). Asymptotic behavior of M estimators of p regression parameters when
p2 /n is large; ii. normal approximation. The Annals of Statistics, 1403–1417.
Portnoy, S. (1986). On the central limit theorem in Rp when p → ∞. Probability theory
and related fields, 73 (4), 571–583.
Portnoy, S. (1987). A central limit theorem applicable to robust regression estimators.
Journal of multivariate analysis, 22 (1), 24–50.
Posekany, A., Felsenstein, K., & Sykacek, P. (2011). Biological assessment of robust noise
models in microarray data analysis. Bioinformatics, 27 (6), 807–814.
Relles, D. A. (1967). Robust regression by modified least-squares. (Tech. Rep.). DTIC
Document.
Rosenthal, H. P. (1970). On the subspaces ofl p (p¿ 2) spanned by sequences of independent random variables. Israel Journal of Mathematics, 8 (3), 273–303.
Rudelson, M., & Vershynin, R. (2009). Smallest singular value of a random rectangular
matrix. Communications on Pure and Applied Mathematics, 62 (12), 1707–1739.
Rudelson, M., & Vershynin, R. (2010). Non-asymptotic theory of random matrices:
extreme singular values. arXiv preprint arXiv:1003.2990 .
Rudelson, M., & Vershynin, R. (2013). Hanson-wright inequality and sub-gaussian concentration. Electron. Commun. Probab, 18 (82), 1–9.
Scheffe, H. (1999). The analysis of variance (Vol. 72). John Wiley & Sons.
Silverstein, J. W. (1985). The smallest eigenvalue of a large dimensional wishart matrix.
The Annals of Probability, 1364–1368.
Stone, M. (1974). Cross-validatory choice and assessment of statistical predictions. Journal of the Royal Statistical Society. Series B (Methodological), 111–147.
Tyler, D. E. (1987). A distribution-free M-estimator of multivariate scatter. The Annals
of Statistics, 234–251.
Van der Vaart, A. W. (1998). Asymptotic statistics. Cambridge university press.
Vershynin, R. (2010). Introduction to the non-asymptotic analysis of random matrices.
arXiv preprint arXiv:1011.3027 .
Wachter, K. W. (1976). Probability plotting points for principal components. In Ninth
interface symposium computer science and statistics (pp. 299–308).
Wachter, K. W. (1978). The strong limits of random matrix spectra for sample matrices
of independent elements. The Annals of Probability, 1–18.
Wasserman, L., & Roeder, K. (2009). High dimensional variable selection. Annals of
statistics, 37 (5A), 2178.
Yohai, V. J. (1972). Robust M estimates for the general linear model. Universidad
Nacional de la Plata. Departamento de Matematica.
Yohai, V. J., & Maronna, R. A. (1979). Asymptotic behavior of M-estimators for the
linear model. The Annals of Statistics, 258–268.
25
APPENDIX
A
Proof Sketch of Lemma 4.5
In this Appendix, we provide a roadmap for proving Lemma 4.5 by considering a special
case where X is one realization of a random matrix Z with i.i.d. mean-zero σ 2 -subgaussian entries. Random matrix
theory (Geman, 1980; Silverstein,
√ 1985; Bai & Yin,
√
1993) implies that λ+ = (1 + κ)2 + op (1) = Op (1) and λ− = (1 − κ)2 + op (1) = Ωp (1).
Thus, the assumption A3 is satisfied with high probability. Thus, the Lemma 4.4 in p. 16
holds with high probability. It remains to prove the following lemma to obtain Theorem
3.1.
Lemma A.1. Let Z be a random matrix with i.i.d. mean-zero σ 2 -sub-gaussian entries
and X be one realization of Z. Then under assumptions A1 and A2,
1
polyLog(n)
,
min Var(β̂j ) = Ωp
,
max Mj = Op
1≤j≤p
1≤j≤p
n
n · polyLog(n)
where Mj is defined in (11) in p.16 and the randomness in op (·) and Op (·) comes from
Z.
A-1
Upper Bound of Mj
First by Proposition E.3,
λ+ = Op (1),
λ− = Ωp (1).
In the rest of the proof, the symbol E and Var denotes the expectation and the variance
1
conditional on Z. Let Z̃ = D 2 Z, then Mj = EkeTj (Z̃ T Z̃)−1 Z̃ T k∞ . Let H̃j = I −
T
T
Z̃[j] (Z̃[j]
Z̃[j] )−1 Z̃[j]
, then by block matrix inversion formula (see Proposition E.1), which
we state as Proposition E.1 in Appendix E.
!−1
T
Z̃
Z̃
Z̃1
[1]
1
T
−1 T
(Z̃ Z̃) Z̃ =
T
Z̃[1]
Z̃[1]
Z̃[1]
T
1
1 −Z̃1T Z̃[1] (Z̃[1]
Z̃[1] )−1
Z̃1
= T
Z̃[1]
∗
∗
Z̃1 (I − H̃1 )Z̃1
T
1
Z̃1 (I − H̃1 )
= T
.
∗
Z̃1 (I − H̃1 )Z̃1
Z̃1T Z̃1
T
Z̃[1]
Z̃1
This implies that
M1 = E
kZ̃1T (I − H̃1 )k∞
.
Z̃1T (I − H̃1 )Z̃1
(A-1)
Since Z T DZ/n K0 λ− I, we have
1
1
= eT1 (Z̃ T Z̃)−1 e1 = eT1 (Z T DZ)−1 e1 = eT1
T
n
Z̃1 (I − H̃1 )Z̃1
Z T DZ
n
−1
e1 ≤
1
nK0 λ−
and we obtain a bound for M1 as
1
M1 ≤
EkZ̃1T (I − H̃1 )k∞
EkZ1T D 2 (I − H̃1 )k∞
=
.
nK0 λ−
nK0 λ−
Similarly,
1
1
1
T
T
EkZjT D 2 (I − D 2 Z[j]
(Z[j]
DZ[j] )−1 Z[j] D 2 )k∞
EkZjT D 2 (I − H̃j )k∞
Mj ≤
=
.
nK0 λ−
nK0 λ−
1
26
(A-2)
The vector in the numerator is a linear contrast of Zj and Zj has mean-zero i.i.d. subgaussian entries. For any fixed matrix A ∈ Rn×n , denote Ak by its k-th column, then
ATk Zj is σ 2 kAk k22 -sub-gaussian (see Section 5.2.3 of Vershynin (2010) for a detailed discussion) and hence by definition of sub-Gaussianity,
t2
P (|ATk Zj | ≥ σkAk k2 t) ≤ 2e− 2 .
Therefore, by a simple union bound, we conclude that
t2
P (kAT Zj k∞ ≥ σ max kAk k2 t) ≤ 2ne− 2 .
k
√
Let t = 2 log n,
P (kAT Zj k∞ ≥ 2σ max kAk k2
k
p
2
log n) ≤ = o(1).
n
This entails that
T
kA Zj k∞ = Op
max kAk k2 · polyLog(n) = Op (kAkop · polyLog(n)) .
k
(A-3)
1
with high probability. In Mj , the coefficient matrix (I − Hj )D 2 depends on Zj through
D and hence we cannot use (A-3) directly. However, the dependence can be removed by
replacing D by D[j] since ri,[j] does not depend on Zj .
Since Z has i.i.d. sub-gaussian entries, no column is highly influential. In other words,
the estimator will not change drastically after removing j-th column. This would suggest
Ri ≈ ri,[j] . It is proved by El Karoui (2013) that
polyLog(n)
√
sup |Ri − ri,[j] | = Op
.
n
i,j
It can be rigorously proved that
kZjT D(I − H̃j )k∞ − kZjT D[j] (I − Hj )k∞ = Op
1
polyLog(n)
n
,
1
T
T
2
2
where Hj = I − D[j]
Z[j] (Z[j]
D[j] Z[j] )−1 Z[j]
D[j]
; see Appendix A-1 for details. Since
D[j] (I − Hj ) is independent of Zj and
kD[j] (I − Hj )kop ≤ kD[j] kop ≤ K1 = O (polyLog(n)) ,
it follows from (A-2) and (A-3) that
kZjT D[j] (I
− Hj )k∞ = Op
polyLog(n)
n
.
In summary,
Mj = Op
A-2
A-2.1
polyLog(n)
n
.
(A-4)
Lower Bound of Var(β̂j )
Approximating Var(β̂j ) by Var(bj )
It is shown by El Karoui (2013)1 that
1 Nj
β̂j ≈ bj , √
n ξj
(A-5)
1 El Karoui (2013) considers a ridge regularized M estimator, which is different from our setting.
However, this argument still holds in our case and proved in Appendix B.
27
where
n
1 X
Nj = √
Zij ψ(ri,[j] ),
n i=1
1 T
T
T
Z (D[j] − D[j] Z[j] (X[j]
D[j] X[j] )−1 Z[j]
D[j] )Zj .
n j
ξj =
It has been shown by El Karoui (2013) that
max |β̂j − bj | = Op
j
polyLog(n)
n
.
Thus, Var(β̂j ) ≈ Var(bj ) and a more refined calculation in Appendix A-2.1 shows that
polyLog(n)
.
| Var(β̂j ) − Var(bj )| = Op
3
n2
It is left to show that
Var(bj ) = Ωp
A-2.2
1
n · polyLog(n)
.
(A-6)
Bounding Var(bj ) via Var(Nj )
By definition of bj ,
Var(bj ) = Ωp
polyLog(n)
n
⇐⇒ Var
Nj
ξj
= Ωp (polyLog(n)) .
As will be shown in Appendix B-6.4,
Var(ξj ) = Op
polyLog(n)
n
.
As a result, ξj ≈ Eξj and
Var
Nj
ξj
Nj
Eξj
≈ Var
=
Var(Nj )
.
(Eξj )2
As in the previous paper (El Karoui, 2013), we rewrite ξj as
ξj =
1
1
1
1 T 21
T
T
2
2
2
Zj D[j] (I − D[j]
Z[j] (X[j]
D[j] X[j] )−1 Z[j]
D[j]
)D[j]
Zj .
n
The middle matrix is idempotent and hence positive semi-definite. Thus,
ξj ≤
Then we obtain that
1 T
Z D[j] Zj ≤ K1 λ+ = Op (polyLog(n)) .
n j
Var(Nj )
= Ωp
(Eξj )2
Var(Nj )
polyLog(n)
,
and it is left to show that
Var(Nj ) = Ωp
A-2.3
1
polyLog(n)
.
(A-7)
Bounding Var(Nj ) via tr(Qj )
Recall the definition of Nj (A-5), and that of Qj (see Section 3.1 in p.8), we have
Var(Nj ) =
1 T
Z Qj Zj
n j
Notice that Zj is independent of ri,[j] and hence the conditional distribution of Zj given
Qj remains the same as the marginal distribution of Zj . Since Zj has i.i.d. sub-gaussian
28
entries, the Hanson-Wright inequality (Hanson & Wright, 1971; Rudelson & Vershynin,
2013; see Proposition E.2), shown in Proposition E.2, implies that any quadratic form of
Zj , denoted by ZjT Qj Zj is concentrated on its mean, i.e.
2
ZjT Qj Zj ≈ EZj , ZjT Qj Zj = (EZ1j
) · tr(Qj ).
As a consequence, it is left to show that
tr(Qj ) = Ωp
A-2.4
n
polyLog(n)
.
(A-8)
Lower Bound of tr(Qj )
By definition of Qj ,
tr(Qj ) =
n
X
Var(ψ(ri,[j] )).
i=1
To lower bounded the variance of ψ(ri,[j] ), recall that for any random variable W ,
Var(W ) =
1
E(W − W 0 )2 .
2
(A-9)
where W 0 is an independent copy of W . Suppose g : R → R is a function such that
|g 0 (x)| ≥ c for all x, then (A-9) implies that
Var(g(W )) =
c2
1
E(g(W ) − g(W 0 ))2 ≥ E(W − W 0 )2 = c2 Var(W ).
2
2
(A-10)
In other words, (A-10) entails that Var(W ) is a lower bound for Var(g(W )) provided
that the derivative of g is bounded away from 0. As an application, we see that
Var(ψ(ri,[j] )) ≥ K02 Var(ri,[j] )
and hence
tr(Qj ) ≥ K02
n
X
Var(ri,[j] ).
i=1
By the variance decomposition formula,
Var(ri,[j] ) = E Var ri,[j] (i) + Var E ri,[j] (i) ≥ E Var ri,[j] [i] ,
where (i) includes all but i-th entry of . Given (i) , ri,[j] is a function of i . Using (A-10),
we have
Var(ri,[j] |(i) ) ≥ inf
i
∂ri,[j]
∂i
2
· Var(i |(i) ) ≥ inf
i
∂ri,[j]
∂i
2
· Var(i ).
This implies that
Var(ri,[j] ) ≥ E Var ri,[j] [i]
≥ E inf
∂ri,[j]
∂i
2
2
!
· min Var(i ).
i
Summing Var(ri,[j] ) over i = 1, . . . , n, we obtain that
tr(Qj ) =
n
X
X
Var(ri,[j] ) ≥ E
i=1
i
∂ri,[j]
inf
∂i
· min Var(i ).
i
It will be shown in Appendix B-6.3 that under assumptions A1-A3,
X
∂ri,[j] 2
n
E
inf
= Ωp
.
∂i
polyLog(n)
i
This proves (A-8) and as a result,
min Var(β̂j ) = Ωp
j
29
1
n · polyLog(n)
.
(A-11)
B
B-1
Proof of Theorem 3.1
Notation
To be self-contained, we summarize our notations in this subsection. The model we
considered here is
y = Xβ ∗ +
where X ∈ Rn×p be the design matrix and is a random vector with independent entries.
β̂ −Eβ̂j
Notice that the target quantity √j
is shift invariant, we can assume β ∗ = 0 without
Var(β̂j )
loss of generality provided that X has full column rank; see Section 3.1 for details.
Let xTi ∈ R1×p denote the i-th row of X and Xj ∈ Rn×1 denote the j-th column
of X. Throughout the paper we will denote by Xij ∈ R the (i, j)-th entry of X, by
X(i) ∈ R(n−1)×p the design matrix X after removing the i-th row, by X[j] ∈ Rn×(p−1) the
design matrix X after removing the j-th column, by X(i),[j] ∈ R(n−1)×(p−1) the design
matrix after removing both i-th row and j-th column, and by xi,[j] ∈ R1×(p−1) the vector
xi after removing j-th entry. The M-estimator β̂ associated with the loss function ρ is
defined as
n
1X
ρ(k − xTk β).
(B-12)
β̂ = arg min
p
n
β∈R
k=1
Similarly we define the leave-j-th-predictor-out version as
n
β̂[j]
1X
ρ(k − xTk,[j] β).
= arg min
p
n
β∈R
(B-13)
k=1
Based on these notation we define the full residual Rk as
Rk = k − xTk β̂,
k = 1, 2, . . . , n
(B-14)
the leave-j-th-predictor-out residual as
rk,[j] = k − xTk,[j] β̂[j] ,
k = 1, 2, . . . , n, j ∈ Jn .
(B-15)
D̃ = diag(ψ 00 (Rk )),
(B-16)
D̃[j] = diag(ψ 00 (rk,[j] )).
(B-17)
T
T
G[j] = I − X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] .
(B-18)
Four diagonal matrices are defined as
D = diag(ψ 0 (Rk )),
D[j] = diag(ψ 0 (rk,[j] )),
Further we define G and G[j] as
G = I − X(X T DX)−1 X T D,
Let Jn denote the indices of coefficients of interest. We say a ∈]a1 , a2 [ if and only if a ∈
[min{a1 , a2 }, max{a1 , a2 }]. Regarding the technical assumptions, we need the following
quantities
T
T
X X
X X
λ+ = λmax
, λ− = λmin
(B-19)
n
n
be the largest (resp. smallest) eigenvalue of the matrix
canonical basis vector and
hj,0 = (ψ(r1,[j] ), . . . , ψ(rn,[j] ))T ,
XT X
n .
Let ei ∈ Rn be the i-th
hj,1,i = GT[j] ei .
(B-20)
Finally, let
(
|hTj,0 Xj |
|hTj,1,i Xj |
, max
∆C = max max
j∈Jn ||hj,0 ||
i≤n,j∈Jn ||hj,1,i ||
30
)
,
(B-21)
Qj = Cov(hj,0 ).
(B-22)
We adopt Landau’s notation (O(·), o(·), Op (·), op (·)). In addition, we say an = Ω(bn ) if
bn = O(an ) and similarly, we say an = Ωp (bn ) if bn = Op (an ). To simplify the logarithm
factors, we use the symbol polyLog(n) to denote any factor that can be upper bounded
1
to denote any factor that can be
by (log n)γ for some γ > 0. Similarly, we use polyLog(n)
1
0
lower bounded by (log n)γ 0 for some γ > 0.
Finally we restate all the technical assumptions:
1
A1 ρ(0) = ψ(0) = 0 and there exists K0 = Ω polyLog(n)
, K1 , K2 = O (polyLog(n)),
such that for any x ∈ R,
d p 0
|ψ 00 (x)|
≤ K2 ;
( ψ (x)) = p
dx
ψ 0 (x)
K0 ≤ ψ 0 (x) ≤ K1 ,
A2 i = ui (Wi ) where (W1 , . . . , Wn ) ∼ N (0, In×n ) and ui are smooth functions with
ku0i k∞ ≤ c1 and ku00i k∞ ≤
c2 for some c1 , c2 = O(polyLog(n)). Moreover, assume
mini Var(i ) = Ω
1
polyLog(n)
.
A3 λ+ = O(polyLog(n)) and λ− = Ω
A4 minj∈Jn
XjT Qj Xj
tr(Qj )
=Ω
1
polyLog(n)
1
polyLog(n)
;
;
A5 E∆8C = O (polyLog(n)).
B-2
Deterministic Approximation Results
In Appendix A, we use several approximations under random designs, e.g. Ri ≈ ri,[j] . To
prove them, we follow the strategy of El Karoui (2013) which establishes the deterministic
results and then apply the concentration inequalities to obtain high probability bounds.
Note that β̂ is the solution of
n
0 = f (β) ,
1X
xi ψ(i − xTi β),
n i=1
we need the following key lemma to bound kβ1 − β2 k2 by kf (β1 ) − f (β2 )k2 , which can be
calculated explicily.
Lemma B.1. [El Karoui (2013), Proposition 2.1] For any β1 and β2 ,
kβ1 − β2 k2 ≤
1
kf (β1 ) − f (β2 )k2 .
K0 λ−
Proof. By the mean value theorem, there exists νi ∈]i − xTi β1 , i − xTi β2 [ such that
ψ(i − xTi β1 ) − ψ(i − xTi β2 ) = ψ 0 (νi ) · xTi (β2 − β1 ).
Then
n
1X 0
ψ (νi )xi xTi (β1 − β2 )
n i=1
2
!
n
X
1
≥ λmin
ψ 0 (νi )xi xTi · kβ1 − β2 k2
n i=1
kf (β1 ) − f (β2 )k2 =
≥ K0 λ− kβ1 − β2 k2 .
31
Based on Lemma B.1, we can derive the deterministic results informally stated in
Appendix A. Such results are shown by El Karoui (2013) for ridge-penalized M-estimates
and here we derive a refined version for unpenalized M-estimates. Throughout this subsection, we only assume assumption A1. This implies the following lemma,
Lemma B.2. Under assumption A1, for any x and y,
p
p
p
|ψ(x)| ≤ K1 |x|, | ψ 0 (x)− ψ 0 (y)| ≤ K2 |x−y|, |ψ 0 (x)−ψ 0 (y)| ≤ 2 K1 K2 |x−y| , K3 |x−y|.
To state the result, we define the following quantities.
n
1
1X
T = √ max max kxi k2 , max kXj k2 , E =
ρ(i ),
i
j∈Jn
n i=1
n
n
U=
1X
xi (ψ(i ) − Eψ(i ))
n i=1
(B-23)
n
,
U0 =
2
1X
xi Eψ(i )
n i=1
.
(B-24)
2
The following proposition summarizes all deterministic results which we need in the proof.
Proposition B.3. Under Assumption A1,
(i) The norm of M estimator is bounded by
kβ̂k2 ≤
1
(U + U0 );
K0 λ−
(ii) Define bj as
1 Nj
bj = √
n ξj
where
n
1 X
Nj = √
Xij ψ(ri,[j] ),
n i=1
Then
ξj =
1 T
T
T
X (D[j] − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] )Xj ,
n j
√
√
1
2K1
max |bj | ≤ √ ·
· ∆C · E,
j∈Jn
n K0 λ−
(iii) The difference between β̂j and bj is bounded by
max |β̂j − bj | ≤
j∈Jn
1 2K12 K3 λ+ T
· ∆3C · E.
·
7
n
2
K04 λ−
(iv) The difference between the full and the leave-one-predictor-out residual is bounded
by
!
√
√
1
2K12 K3 λ+ T 2
2K1
3
2
max max |Ri − ri,[j] | ≤ √
· ∆C · E + 3
· ∆C · E .
7
j∈Jn i
n
2
K04 λ−
K02 λ−
Proof.
(i) By Lemma B.1,
kβ̂k2 ≤
1
kf (0)k2
kf (β̂) − f (0)k2 =
,
K0 λ−
K0 λ−
since β̂ is a zero of f (β). By definition,
n
n
n
1X
1X
1X
f (0) =
xi ψ(i ) =
xi (ψ(i ) − Eψ(i )) +
xi Eψ(i ).
n i=1
n i=1
n i=1
This implies that
kf (0)k2 ≤ U + U0 .
32
(ii) First we prove that
ξj ≥ K0 λ− .
(B-25)
Since all diagonal entries of D[j] is lower bounded by K0 , we conclude that
!
X T D[j] X
≥ K0 λ− .
λmin
n
Note that ξj is the Schur’s complement (Horn & Johnson, 2012, chapter 0.8) of
X T D[j] X
,
n
we have
ξj−1
=
eTj
X T D[j] X
n
!−1
ej ≤
1
,
K0 λ−
which implies (B-25). As for Nj , we have
Nj =
XjT hj,0
khj,0 k XjT hj,0
√
= √ 2·
.
khj,0 k2
n
n
(B-26)
The the second term is bounded by ∆C by definition, see (B-21). For the first term,
the assumption A1 that ψ 0 (x) ≤ K1 implies that
Z x
Z x 0
1 2
ψ (y)
· ψ(y)dy =
ψ (x).
ρ(x) = ρ(x) − ρ(0) =
ψ(y)dy ≥
K
2K
1
1
0
0
Here we use the fact that sign(ψ(y)) = sign(y). Recall the definition of hj,0 , we
obtain that
sP
sP
n
n
2
p
ψ(r
)
khj,0 k2
i,[j]
i=1
i=1 ρ(ri,[j] )
√
=
≤ 2K1 ·
.
n
n
n
Since β̂[j] is the minimizer of the loss function
n
Pn
i=1
ρ(i − xTi,[j] β[j] ), it holds that
n
1X
1X
ρ(ri,[j] ) ≤
ρ(i ) = E.
n i=1
n i=1
Putting together the pieces, we conclude that
p
√
|Nj | ≤ 2K1 · ∆C E.
By definition of bj ,
(B-27)
√
√
1
2K1
|bj | ≤ √ ·
∆C E.
n K0 λ−
(iii) The proof of this result is almost the same as El Karoui (2013). We state it here for
the sake of completeness. Let b̃j ∈ Rp with
(b̃j )j = bj ,
T
T
(b̃j )[j] = β̂[j] − bj (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj
(B-28)
where the subscript j denotes the j-th entry and the subscript [j] denotes the subvector formed by all but j-th entry. Furthermore, define γj with
(γj )j = −1,
T
T
(γj )[j] = (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj .
Then we can rewrite b̃j as
(b̃j )j = −bj (γj )j ,
(b̃j )[j] = β̂[j] − bj (γj )[j] .
33
(B-29)
By definition of β̂[j] , we have [f (β̂[j] )][j] = 0 and hence
[f (b̃j )][j] = [f (b̃j )][j] − [f (β̂[j] )][j] =
n
i
h
1X
xi,[j] ψ(i − xTi b̃j ) − ψ(i − xTi,[j] β̂[j] ) .
n i=1
(B-30)
By mean value theorem, there exists νi,j ∈]i − xTi b̃j , i − xTi,[j] β̂[j] [ such that
ψ(i − xTi b̃j ) − ψ(i − xTi,[j] β̂[j] ) = ψ 0 (νi,j )(xTi,[j] β̂[j] − xTi b̃j )
=ψ 0 (νi,j )(xTi,[j] β̂[j] − xTi,[j] (b̃j )[j] − Xij bj )
i
h
T
T
=ψ 0 (νi,j ) · bj · xTi,[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj − Xij
Let
di,j = ψ 0 (νi,j ) − ψ 0 (ri,[j] )
(B-31)
and plug the above result into (B-30), we obtain that
n
i
h
1X
T
T
xi,[j] · ψ 0 (ri,[j] ) + di,j · bj · xTi,[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj − Xij
n i=1
[f (b̃j )][j] =
n
h
i
1X 0
T
T
= bj ·
ψ (ri,[j] )xi,[j] xTi,[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj − Xij
n i=1
n
1X
T
T
di,j xi,[j] (xTi,[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj − Xij )
n i=1
i
1h T
T
T
T
X[j] D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj − X[j]
D[j] Xj
= bj ·
n
n
1X
di,j xi,[j] · xTi γj
+ bj ·
n i=1
!
n
1 X
di,j xi,[j] xTi γj .
= bj ·
n i=1
+ bj ·
Now we calculate [f (b̃j )]j , the j-th entry of f (b̃j ). Note that
n
[f (b̃j )]j =
=
1X
Xij ψ(i − xTi b̃j )
n i=1
n
n
n
n
h
i
1X
1X
T
T
Xij ψ(ri,[j] ) + bj ·
Xij (ψ 0 (ri,[j] ) + di,j ) · xTi,[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj − Xij
n i=1
n i=1
h
i
1X
1X 0
T
T
Xij ψ(ri,[j] ) + bj ·
ψ (ri,[j] )Xij xTi,[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj − Xij
n i=1
n i=1
!
n
1X
T
+ bj ·
di,j Xij xi γj
n i=1
!
n
X
1
1 T
1
T
T
2
= √ Nj + bj ·
D[j] X[j] )−1 X[j]
D[j] Xj −
X D[j] X[j] (X[j]
ψ 0 (ri,[j] )Xij
n j
n i=1
n
!
n
1X
T
+ bj ·
di,j Xij xi γj
n i=1
!
n
1
1X
T
= √ Nj − bj · ξj + bj ·
di,j Xij xi γj
n i=1
n
!
n
1X
T
= bj ·
di,j Xij xi γj
n i=1
=
34
where the second last line uses the definition of bj . Putting the results together, we
obtain that
!
n
1X
T
f (b̃j ) = bj ·
di,j xi xi · γj .
n i=1
This entails that
kf (b̃j )k2 ≤ |bj | · max |di,j | · λ+ · kγj k2 .
(B-32)
i
Now we derive a bound for maxi |di,j |, where di,j is defined in (B-36). By Lemma
B.2,
|di,j | = |ψ 0 (νi,j ) − ψ 0 (ri,[j] )| ≤ K3 |νi,j − ri,[j] | = K3 |xTi,[j] β̂[j] − xTi b̃j |.
By definition of b̃j and hj,1,i ,
T
T
|xTi,[j] β̂[j] − xTi b̃j | = |bj | · xTi,[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj − Xij
T
T
=|bj | · |eTi (I − X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] )Xj |
=|bj | · |hTj,1,i Xj | ≤ |bj | · ∆C khj,1,i k2 ,
(B-33)
where the last inequality is derived by definition of ∆C , see (B-21). Since hj,1,i
T
T
is the i-th column of matrix I − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
, its L2 norm is upper
bounded by the operator norm of this matrix. Notice that
1
1
1
−1
T
T
T
T
2
2
2
I − D[j]
X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j]
D[j]2 .
I − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
= D[j]
The middle matrix in RHS of the displayed atom is an orthogonal projection matrix
and hence
1
1
K1 2
−1
T
T
2
kop · kD[j]2 kop ≤
kI − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
kop ≤ kD[j]
. (B-34)
K0
Therefore,
max khj,1,i k2 ≤ max kI −
i,j
j∈Jn
T
T
D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
kop
and thus
r
max |di,j | ≤ K3
i
≤
K1
K0
12
,
K1
· |bj | · ∆C .
K0
(B-35)
(B-36)
As for γj , we have
K0 λ− kγj k22
≤
γjT
X T D[j] X
n
XjT Dj Xj
=(γj )2j ·
+ (γj )T[j]
n
!
γj
T
X[j]
D[j] X[j]
n
!
(γj )[j] + 2γj
XjT D[j] X[j]
(γj )[j]
n
Recall the definition of γj in (B-37), we have
!
T
X[j]
D[j] X[j]
1
T
T
T
(γj )[j]
(γj )[j] = XjT D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj
n
n
and
γj
XjT D[j] X[j]
1
T
T
(γj )[j] = − XjT D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] Xj .
n
n
35
As a result,
K0 λ− kγj k22
1
1
1
1
1
T
T
2
2
2
2
D[j] X[j] )−1 X[j]
D[j]
≤ XjT D[j]
(I − D[j]
X[j] (X[j]
)D[j]
Xj
n
1
≤
2
Xj k22
kD[j]
n
1
1
2
≤
1
T
T
2
2
· I − D[j]
X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j]
kD[j] Xj k22
n
≤
op
K1 kXj k22
≤ T 2 K1 ,
n
where T is defined in (B-23). Therefore we have
s
K1
T.
kγj k2 ≤
K0 λ−
(B-37)
Putting (B-32), (B-36), (B-37) and part (ii) together, we obtain that
s
r
K1
K1
∆C |bj | ·
T
kf (b̃j )k2 ≤ λ+ · |bj | · K3
K0
K0 λ−
s
r
K1
K1
1 2K1
2
≤ λ+ ·
∆ E · K3
∆C ·
T
n (K0 λ− )2 C
K0
K0 λ−
=
1 2K12 K3 λ+ T
· ∆3C · E.
·
5
n
3
2
K0 λ−
By Lemma B.1,
kβ̂ − b̃j k2 ≤
kf (β̂) − f (b̃j )k2
kf (b̃j )k2
1 2K12 K3 λ+ T
· ∆3C · E.
=
≤ ·
7
K0 λ−
K0 λ−
n
4
2
K0 λ−
Since β̂j − bj is the j-th entry of β̂ − b̃j , we have
|β̂j − bj | ≤ kβ̂ − b̃j k2 ≤
1 2K12 K3 λ+ T
·
· ∆3C · E.
7
n
2
K04 λ−
(iv) Similar to part (iii), this result has been shown by El Karoui (2013). Here we state
a refined version for the sake of completeness. Let b̃j be defined as in (B-28), then
|Ri − ri,[j] | = |xTi β̂ − xTi,[j] β̂[j] | = |xTi (β̂ − b̃j ) + xTi b̃j − xTi,[j] β̂[j] |
≤ kxi k2 · kβ̂ − b̃j k2 + |xTi b̃j − xTi,[j] β̂[j] |.
Note that kxi k2 ≤
√
nT , by part (iii), we have
1 2K12 K3 λ+ T 2
· ∆3C · E.
kxi k2 · kβ̂ − b̃j k2 ≤ √
7
n
K 4λ 2
0
(B-38)
−
On the other hand, similar to (B-36), by (B-33),
r
√
√
K1
1
2K1
T
T
|xi b̃j − xi,[j] β̂[j] | ≤
· |bj | · ∆C ≤ √ · 3
· ∆2C · E.
K0
n K2λ
0 −
(B-39)
Therefore,
1
|Ri − ri,[j] | ≤ √
n
2K12 K3 λ+ T 2
7
2
K04 λ−
36
√
·
∆3C
·E +
2K1
3
K02 λ−
·
∆2C
·
√
!
E
.
B-3
Summary of Approximation Results
Under our technical assumptions, we can derive the rate for approximations via Proposition B.3. This justifies all approximations in Appendix A.
Theorem B.4. Under the assumptions A1 - A5,
(i)
T ≤ λ+ = O (polyLog(n)) ;
(ii)
max |β̂j | ≤ kβ̂k2 = OL4 (polyLog(n)) ;
j∈Jn
(iii)
max |bj | = OL2
j∈Jn
polyLog(n)
√
n
;
(iv)
max |β̂j − bj | = OL2
j∈Jn
polyLog(n)
n
;
(v)
max max |Ri − ri,[j] | = OL2
j∈Jn
i
polyLog(n)
√
n
.
Proof. (i) Notice that Xj = Xej , where ej is the j-th canonical basis vector in Rp , we
have
kXj k2
XT X
= eTj
ej ≤ λ+ .
n
n
Similarly, consider the X T instead of X, we conclude that
kxi k2
XX T
≤ λmax
= λ+ .
n
n
Recall the definition of T in (B-23), we conclude that
p
T ≤ λ+ = O (polyLog(n)) .
(ii) Since i = ui (Wi ) with ku0i k∞ ≤ c1 , the gaussian concentration property (Ledoux,
2001, chapter 1.3) implies that i is c21 -sub-gaussian and hence E|i |k = O(ck1 ) for
any finite k > 0. By Lemma B.2, |ψ(i )| ≤ K1 |i | and hence for any finite k,
E|ψ(i )|k ≤ K1k E|i |k = O(ck1 ).
By part (i) of Proposition B.3, using the convexity of x4 and hence
a+b 4
2
≤
a4 +b4
2 ,
1
8
E(U + U0 )4 ≤
(EU 4 + U04 ).
4
(K0 λ− )
(K0 λ− )4
Pn
Recall (B-24) that U = n1 i=1 xi (ψ(i ) − Eψ(i )) 2 ,
Ekβ̂k42 ≤
U 4 = (U 2 )2 =
1
n4
n
X
2
xTi xi0 (ψ(i ) − Eψ(i ))(ψ(i0 ) − Eψ(i0 ))
i,i0 =1
2
n
X
1 X
= 4
kxi k22 (ψ(i ) − Eψ(i ))2 +
|xTi xi0 |(ψ(i ) − Eψ(i ))(ψ(i0 ) − Eψ(i0 ))
n
0
i=1
i6=i
37
1
= 4
n
+
X
n
kxi k42 (ψ(i ) − Eψ(i ))4 +
(2|xTi xi0 |2 + kxi k22 kxi0 k22 )(ψ(i ) − Eψ(i ))2 (ψ(i0 ) − Eψ(i0 ))2
i6=i0
i=1
X
X
|xTi xi0 |
·
|xTk xk0 |
· (ψ(i ) − Eψ(i ))(ψ(i0 ) − Eψ(i0 ))(ψ(k ) − Eψ(k ))(ψ(k0 ) − Eψ(k0 ))
others
Since ψ(i ) − Eψ(i ) has a zero mean, we have
E(ψ(i ) − Eψ(i ))(ψ(i0 ) − Eψ(i0 ))(ψ(k ) − Eψ(k ))(ψ(k0 ) − Eψ(k0 )) = 0
for any (i, i0 ) 6= (k, k 0 ) or (k 0 , k) and i 6= i0 . As a consequence,
n
1 X
kxi k42 E(ψ(i ) − Eψ(i ))4
EU = 4
n
i=1
X
T
2
2
2
2
2
0
0
0
0
(2|xi xi |2 + kxi k2 kxi k2 )E(ψ(i ) − Eψ(i )) E(ψ(i ) − Eψ(i ))
+
4
i6=i0
n
X
X
1
kxi k42 E(ψ(i ) − Eψ(i ))4 + 3
kxi k22 kxi0 k22 E(ψ(i ) − Eψ(i ))2 E(ψ(i0 ) − Eψ(i0 ))2 .
≤ 4
n
0
i=1
i6=i
4
4
a +b
4
For any i, using the convexity of x4 , hence ( a+b
2 ) ≤
2 , we have
E(ψ(i ) − Eψ(i ))4 ≤ 8E ψ(i )4 + (Eψ(i ))4 ≤ 16Eψ(i )4 ≤ 16 max Eψ(i )4 .
i
By Cauchy-Schwartz inequality,
E(ψ(i ) − Eψ(i ))2 ≤ Eψ(i )2 ≤
q
p
Eψ(i )4 ≤ max Eψ(i )4 .
i
Recall (B-23) that kxi k22 ≤ nT 2 and thus,
1
16n · n2 T 4 + 3n2 · n2 T 4 · max Eψ(i )4
i
n4
1
≤ 4 · (16n3 + 3n4 )T 4 max Eψ(i )4 = O (polyLog(n)) .
i
n
EU 4 ≤
On the other hand, let µT = (Eψ(1 ), . . . , Eψ(n )), then kµk22 = O(n · polyLog(n))
and hence by definition of U0 in (B-24),
r
kµk22
kµT Xk2
1p T
T
=
µ XX µ ≤
· λ+ = O (polyLog(n)) .
U0 =
n
n
n
In summary,
Ekβ̂k42 = O (polyLog(n)) .
(iii) By mean-value theorem, there exists ax ∈ (0, x) such that
ρ(x) = ρ(0) + xψ(0) +
x2 0
ψ (ax ).
2
By assumption A1 and Lemma B.2, we have
ρ(x) =
x2 0
x2 0
K3 x2
ψ (ax ) ≤
kψ k∞ ≤
,
2
2
2
where K3 is defined in Lemma B.2. As a result,
Eρ(i )8 ≤
K3
2
38
8
16
E16
i = O(c1 ).
Recall the definition of E in (B-23) and the convexity of x8 , we have
n
EE 8 ≤
1X
Eρ(i )8 = O(c16
1 ) = O (polyLog(n)) .
n i=1
(B-40)
Under assumption A5, by Cauchy-Schwartz inequality,
q
√
√
E(∆C E)2 = E∆2C E ≤ E∆4C · EE 2 = O (polyLog(n)) .
Under assumptions A1 and A3,
√
2K1
= O (polyLog(n)) .
K0 λ−
Putting all the pieces together, we obtain that
polyLog(n)
√
max |bj | = OL2
.
j∈Jn
n
(iv) Similarly, by Holder’s inequality,
E(∆3C E)2 = E∆6C E 2 ≤ E∆8C
34
· EE 8
41
= O (polyLog(n)) ,
and under assumptions A1 and A3,
2K12 K3 λ+ T
7
= O (polyLog(n)) .
2
K04 λ−
Therefore,
max |β̂j − bj | = OL2
j∈Jn
polyLog(n)
n
.
(v) It follows from the previous part that
√
E(∆2C · E)2 = O (polyLog(n)) .
Under assumptions A1 and A3, the multiplicative factors are also O (polyLog(n)),
i.e.
√
2K1
2K12 K3 λ+ T 2
= O (polyLog(n)) ,
= O (polyLog(n)) .
3
7
4
2
K0 λ−
K02 λ−
Therefore,
max max |Ri − ri,[j] | = OL2
j∈Jn
B-4
i
polyLog(n)
√
n
.
Controlling Gradient and Hessian
Proof of Lemma 4.2. Recall that β̂ is the solution of the following equation
n
1X
xi ψ(i − xTi β̂) = 0.
n i=1
Taking derivative of (B-41), we have
!
∂ β̂
∂ β̂
T
X D I − X T = 0 =⇒ T = (X T DX)−1 X T D.
∂
∂
39
(B-41)
This establishes (9). To establishes (10), note that (9) can be rewritten as
(X T DX)
∂ β̂
= X T D.
∂T
(B-42)
Fix k ∈ {1, · · · , n}. Note that
∂Ri
∂i
∂ β̂
=
− xTi
= I(i = k) − xTi (X T DX)−1 X T D.
∂k
∂k
∂k
Recall that G = I − X(X T DX)−1 X T D, we have
∂Ri
= eTi Gek ,
∂k
(B-43)
where ei is the i-th canonical basis of Rn . As a result,
∂D
= D̃ diag(Gek ).
∂k
(B-44)
Taking derivative of (B-42), we have
XT
∂ β̂
∂D
∂D ∂ β̂
X T + (X T DX)
= XT
T
∂k ∂
∂k ∂
∂k
=⇒
∂ β̂
∂D
= (X T DX)−1 X T
I − X(X T DX)−1 X T D
T
∂k ∂
∂k
=⇒
∂ β̂
= (X T DX)−1 X T D̃ diag(Gek )G,
∂k ∂T
where G = I − X(X T DX)−1 X T D is defined in (B-18) in p.30. Then for each j ∈
{1, · · · , p} and k ∈ {1, . . . , n},
∂ β̂j
= eTj (X T DX)−1 X T D̃ diag(Gek )G = eTk GT diag(eTj (X T DX)−1 X T D̃)G
∂k ∂T
where we use the fact that aT diag(b) = bT diag(a) for any vectors a, b. This implies that
∂ β̂j
= GT diag(eTj (X T DX)−1 X T D̃)G
∂∂T
Proof of Lemma 4.3. Throughout the proof we are using the simple fact that kak∞ ≤
kak2 . Based on it, we found that
1
1
eTj (X T DX)−1 X T D 2
≤ eTj (X T DX)−1 X T D 2
∞
q
= eTj (X T DX)−1 X T DX(X T DX)−1 ej
q
1
= eTj (X T DX)−1 ej ≤
1 .
(nK0 λ− ) 2
1
Thus for any m > 1, recall that Mj = E eTj (X T DX)−1 X T D 2
1
E eTj (X T DX)−1 X T D 2
≤E eTj (X T DX)−1 X T D
≤
Mj
(nK0 λ− )
m−1
2
∞
2
(B-45)
,
m
∞
1
2
1
∞
· eTj (X T DX)−1 X T D 2
.
m−1
2
(B-46)
40
We should emphasize that we cannot use the naive bound that
1
E eTj (X T DX)−1 X T D 2
m
∞
1
=⇒ eTj (X T DX)−1 X T D 2
m
1
≤ E eTj (X T DX)−1 X T D 2
polyLog(n)
m
√
= OL
n
∞
1
m ,
(nK0 λ− ) 2
≤
2
(B-47)
since it fails to guarantee the convergence of TV distance. We will address this issue after
deriving Lemma 4.4.
By contrast, as proved below,
1
polyLog(n)
1
eTj (X T DX)−1 X T D 2
= Op (Mj ) = Op
<< p
.
(B-48)
n
∞
nK0 λ−
Thus (B-46) produces a slightly tighter bound
1
eTj (X T DX)−1 X T D 2
∞
= OLm
polyLog(n)
n
.
m+1
2m
It turns out that the above bound suffices to prove the convergence. Although (B-48)
m+1
implies the possibility to sharpen the bound from n− 2m to n−1 using refined analysis,
we do not explore this to avoid extra conditions and notation.
• Bound for κ0j
First we derive a bound for κ0j . By definition,
4
∂ β̂j
∂
β̂
j
≤ E
κ20j = E
T
∂
∂T
2
∞
4
∂ β̂j
·
∂T
2
.
2
By Lemma 4.2 and (B-46) with m = 2,
E
∂ β̂j
∂T
2
1
≤ E eTj (X T DX)−1 X T D 2
∞
2
∞
· K1 =
K1 Mj
1
(nK0 λ− ) 2
.
On the other hand, it follows from (B-45) that
∂ β̂j
∂T
2
= eTj (X T DX)−1 X T D
2
2
1
≤ K1 · eTj (X T DX)−1 X T D 2
2
2
≤
2
K1
. (B-49)
nK0 λ−
Putting the above two bounds together we have
κ20j ≤
K12
3
(nK0 λ− ) 2
· Mj .
(B-50)
• Bound for κ1j
As a by-product of (B-49), we obtain that
κ41j
∂ β̂j
=E
∂T
4
≤
2
K12
.
(nK0 λ− )2
(B-51)
• Bound for κ2j
Finally, we derive a bound for κ2j . By Lemma 4.2, κ2j involves the operator norm
of a symmetric matrix with form GT M G where M is a diagonal matrix. Then by the
triangle inequality,
GT M G
op
≤ kM kop · GT G
41
2
op
= kM kop · kGkop .
Note that
1
1
1
1
D 2 GD− 2 = I − D 2 X(X T DX)−1 X T D 2
is a projection matrix, which is idempotent. This implies that
1
1
1
1
D 2 GD− 2
= λmax D 2 GD− 2 ≤ 1.
op
Write G as D
− 12
1
2
(D GD
− 12
1
2
)D , then we have
kGkop ≤ D
1
2
− 12
· D GD
− 21
· D
op
r
1
2
≤
op
op
K1
.
K0
Returning to κ2j , we obtain that
4
κ42j = E GT diag(eTj (X T DX)−1 X T D̃)G
op
4
8
· kGkop
≤ E eTj (X T DX)−1 X T D̃
∞
≤E
=E
4
eTj (X T DX)−1 X T D̃
∞
1
1
K1
K0
eTj (X T DX)−1 X T D 2 D− 2 D̃
4
4
K1
·
K0
∞
4
Assumption A1 implies that
1
|ψ 00 (Ri )|
∀i, p
≤ K2 & hence kD− 2 D̃kop ≤ K2 .
0
ψ (Ri )
Therefore,
1
1
eTj (X T DX)−1 X T D 2 D− 2 D̃
4
1
≤ K24 · eTj (X T DX)−1 X T D 2
∞
4
∞
.
By (B-46) with m = 4,
κ42j
≤
K24
3
(nλ− ) 2
·
K1
K0
4
· Mj .
(B-52)
Proof of Lemma 4.4. By Theorem B.4, for any j,
Eβ̂j4 ≤ Ekβ̂k42 < ∞.
Then using the second-order Poincaré inequality (Proposition 4.1),
!
3
β̂
−
E
β̂
c
c
κ
+
c
κ
κ
j
j
1
2
0j
1j
2j
1
, N (0, 1) = O
max dT V L q
j∈Jn
Var(
β̂
j)
Var(β̂j )
1
1
M2
M4
j
j
n 34 + n 87
=O
· polyLog(n)
=O
Var(β̂j )
1
1
(nMj2 ) 4 + (nMj2 ) 8
n Var(β̂j )
!
· polyLog(n) .
It follows from (B-45) that nMj2 = O (polyLog(n)) and the above bound can be simplified
as
!
1
(nMj2 ) 8
β̂
−
E
β̂
j
j
max dT V L q
, N (0, 1) = O
· polyLog(n) .
j∈Jn
n Var(β̂j )
Var(β̂j )
42
Remark B.5. If we use the naive bound (B-47), by repeating the above derivation, we
√
), in which case,
obtain a worse bound for κ0,j = O( polyLog(n)
) and κ2 = O( polyLog(n)
n
n
max dT V
j∈Jn
β̂
−
E
β̂
j
j
L q
, N (0, 1) = O
Var(β̂j )
polyLog(n)
n Var(β̂j )
!
.
1
However, we can only prove that Var(β̂j ) = Ω( n1 ). Without the numerator (nMj2 ) 8 , which
1
will be shown to be O(n− 8 polyLog(n)) in the next subsection, the convergence cannot be
proved.
B-5
Upper Bound of Mj
As mentioned in Appendix A, we should approximate D by D[j] to remove the functional
(1)
dependence on Xj . To achieve this, we introduce two terms, Mj
(1)
Mj
1
(2)
2
k∞ ),
= E(keTj (X T DX)−1 X T D[j]
Mj
(1)
(2)
and Mj , defined as
1
2
= E(keTj (X T D[j] X)−1 X T D[j]
k∞ ).
(1)
(2)
We will first prove that both |Mj − Mj | and |Mj − Mj | are negligible and then derive
(2)
an upper bound for Mj .
B-5.1
(1)
Controlling |Mj − Mj |
By Lemma B.2,
1
1
2
kD 2 − D[j]
k∞ ≤ K2 max |Ri − ri,[j] | , K2 Rj ,
i
and by Theorem B.4,
q
polyLog(n)
2
√
ERj = O
.
n
(1)
Then we can bound |Mj − Mj | via the fact that kak∞ ≤ kak2 and algebra as follows.
(1)
1
1
1
1
2
|Mj − Mj | ≤ E(keTj (X T DX)−1 X T (D 2 − D[j]
)k∞ )
2
)k2 )
≤ E(keTj (X T DX)−1 X T (D 2 − D[j]
r
r
=
1
1
2
E(keTj (X T DX)−1 X T (D 2 − D[j]
)k22 )
≤
1
1
2
E(eTj (X T DX)−1 X T (D 2 − D[j]
)2 X(X T DX)−1 ej ).
By Lemma B.2,
q
p
| ψ 0 (Ri ) − ψ 0 (ri,[j] )| ≤ K2 |Ri − ri,[j] | ≤ K2 Rj ,
thus
1
1
2
(D 2 − D[j]
)2 K22 R2j I
K22 2
R D.
K0 j
This entails that
(1)
− 21
|Mj − Mj | ≤ K2 K0
q
E(R2j · eTj (X T DX)−1 X T DX(X T DX)−1 ej )
q
1
−2
E(R2j · eTj (X T DX)−1 ej )
q
K2
polyLog(n)
p
.
≤√
E(R2j ) = O
n
nK0 λ−
= K2 K0
43
(1)
Bound of |Mj
B-5.2
(2)
− Mj |
First we prove a useful lemma.
Lemma B.6. For any symmetric matrix N with kN kop < 1,
(I − (I + N )−1 )2
N2
.
(1 − kN kop )2
Proof. First, notice that
I − (I + N )−1 = (I + N − I)(I + N )−1 = N (I + N )−1 ,
and therefore
(I − (I + N )−1 )2 = N (I + N )−2 N.
Since kN kop < 1, I + N is positive semi-definite and
1
I.
(1 − kN kop )2
(I + N )−2
Therefore,
N (I + N )−2 N
(1)
N2
.
(1 − kN kop )2
(2)
We now back to bounding |Mj − Mj |. Let Aj = X T D[j] X, Bj = X T (D − D[j] )X.
By Lemma B.2,
kD − D[j] k∞ ≤ K3 max |Ri − ri,[j] | = K3 Rj
i
and hence
kBj kop ≤ K3 Rj · nλ+ I , nηj .
where ηj = K3 λ+ · Rj . Then by Theorem B.4.(v),
polyLog(n)
E(ηj2 ) = O
.
n
Using the fact that kak∞ ≤ kak2 , we obtain that
(1)
|Mj
1
(2)
1
T
T
−1 T
2
2
− Mj | ≤ E(keTj A−1
X D[j]
k∞ )
j X D[j] − ej (Aj + Bj )
r
1
≤
1
2
T
T
−1 X T D 2 k2 )
E(keTj A−1
j X D[j] − ej (Aj + Bj )
[j] 2
q
−1 )X T D X(A−1 − (A + B )−1 )e
E eTj (A−1
j
j
j
[j]
j − (Aj + Bj )
j
q
−1 )A (A−1 − (A + B )−1 )e
= E eTj (A−1
j
j
j
j
j − (Aj + Bj )
j
=
The inner matrix can be rewritten as
−1
−1
(A−1
)Aj (A−1
)
j − (Aj + Bj )
j − (Aj + Bj )
−1
−1
−1
−1
−1
−1
−1
−1
−1
−1
− 12
=Aj 2 (I − (I + Aj 2 Bj Aj 2 )−1 )Aj 2 Aj Aj 2 (I − (I + Aj 2 Bj Aj 2 )−1 )Aj
−1
=Aj 2 (I − (I + Aj 2 Bj Aj 2 )−1 )2 Aj 2 .
−1
(B-53)
−1
Let Nj = Aj 2 Bj Aj 2 , then
−1
−1
1
1
kNj kop ≤ kAj 2 kop · kBj kop · kAj 2 kop ≤ (nK0 λ− )− 2 · nηj · (nK0 λ− )− 2 =
44
ηj
.
K0 λ−
On the event {ηj ≤ 21 K0 λ− }, kNj kop ≤ 12 . By Lemma B.6,
(I − (I + Nj )−1 )2 4Nj2 .
This together with (B-53) entails that
−1
−1
−1
eTj (A−1
)Aj (Aj−1 − (Aj + Bj )−1 )ej = eTj Aj 2 (I − (I + Nj )−1 )2 Aj 2 ej
j − (Aj + Bj )
−1
−1
−1
−1
−1
−1
−1
≤4eTj Aj 2 Nj2 Aj 2 ej = eTj A−1
j Bj Aj Bj Aj ej ≤ kAj Bj Aj Bj Aj kop .
Since Aj nK0 λ− I, and kBj kop ≤ nηj , we have
−1
−1
−1 3
2
kA−1
j Bj Aj Bj Aj kop ≤ kAj kop · kBj kop ≤
1
1
· η2 .
·
n (K0 λ− )3 j
Thus,
K0 λ−
−1
−1
−1
E eTj (A−1
−
(A
+
B
)
)A
(A
−
(A
+
B
)
)e
·
I
η
≤
j
j
j
j
j
j
j
j
j
2
T −1
polyLog(n)
1
1
−1
2
·
Eη
=
O
.
≤E ej Aj Bj A−1
B
A
e
·
≤
j j
j
j
j
n (K0 λ− )3
n2
On the event {ηj > 21 K0 λ− }, since nK0 λ− I Aj nK1 λ+ I and Aj + Bj nK0 λ− I,
−1
−1
|eTj (A−1
)Aj (A−1
)ej |
j − (Aj + Bj )
j − (Aj + Bj )
−1 2
≤nK1 λ+ · |eTj (A−1
) ej |
j − (Aj + Bj )
T
−2
≤nK1 λ+ · 2|eTj A−2
ej |
j ej | + 2|ej (Aj + Bj )
≤
4nK1 λ+
1 4K1 λ+
= ·
.
2
(nK0 λ− )
n (K0 λ− )2
This together with Markov inequality implies htat
K0 λ−
−1
−1
−1
E eTj (A−1
−
(A
+
B
)
)A
(A
−
(A
+
B
)
)e
·
I
η
>
j
j
j
j
j
j
j
j
j
2
K0 λ−
1 4K1 λ+
· P ηj >
≤ ·
n (K0 λ− )2
2
1 4K1 λ+
4
≤ ·
·
· Eηj2
n (K0 λ− )2 (K0 λ− )2
polyLog(n)
=O
.
n2
Putting pieces together, we conclude that
q
(1)
(2)
−1 )A (A−1 − (A + B )−1 )e
|Mj − Mj | ≤ E eTj (A−1
j
j
j
j
j − (Aj + Bj )
j
s
K0 λ−
−1
−1
T
−1
−1
≤ E ej (Aj − (Aj + Bj ) )Aj (Aj − (Aj + Bj ) )ej · I ηj >
2
s
K0 λ−
−1 )A (A−1 − (A + B )−1 )e · I η ≤
+ E eTj (A−1
−
(A
+
B
)
j
j
j
j
j
j
j
j
j
2
polyLog(n)
.
=O
n
B-5.3
(2)
Bound of Mj
Similar to (A-1), by block matrix inversion formula (See Proposition E.1),
1
1
2
eTj (X T D[j] X)−1 X T D[j] =
45
2
XjT D[j]
(I − Hj )
1
1
2
2
XjT D[j]
(I − Hj )D[j]
Xj
,
1
1
T
T
2
2
where Hj = D[j]
X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j]
. Recall that ξj ≥ K0 λ− by (B-25), so we
have
1
1
2
2
(I − Hj )D[j]
Xj = nξj ≥ nλ− .
XjT D[j]
As for the numerator, recalling the definition of hj,1,i , we obtain that
1
1 T
T
2
Xj (I − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j] ) · D[j]
n
∞
p
1 T
−1
T
≤ K1 ·
X (I − D[j] X[j] (X[j] D[j] X[j] ) X[j] )
n j
∞
p
p
= K1 max hTj,1,i Xj ≤ K1 ∆C max khj,1,i k2 .
1
2
kXjT D[j]
(I − Hj )k∞ =
i
i
As proved in (B-35),
max khj,1,i k2 ≤
i
K1
K0
21
.
This entails that
1
K1
2
kXjT D[j]
(I − Hj )k∞ ≤ √
· ∆C = OL1 (polyLog(n)) .
K0
Putting the pieces together we conclude that
1
(2)
Mj
B-5.4
≤
2
EkXjT D[j]
(I − Hj )k∞
nλ−
=O
polyLog(n)
n
.
Summary
Based on results from Section B.5.1 - Section B.5.3, we have
polyLog(n)
Mj = O
.
n
Note that the bounds we obtained do not depend on j, so we conclude that
polyLog(n)
max Mj = O
.
j∈Jn
n
B-6
B-6.1
Lower Bound of Var(β̂j )
Approximating Var(β̂j ) by Var(bj )
By Theorem B.4,
max E(β̂j − bj )2 = O
j
polyLog(n)
n2
,
max Eb2j = O
j
polyLog(n)
n
.
Using the fact that
β̂j2 − b2j = (β̂j − bj + bj )2 − b2j = (β̂j − bj )2 + 2(β̂j − bj )bj ,
we can bound the difference between Eβ̂j2 and Eb2j by
Eβ̂j2 − Eb2j = E(β̂j − bj )2 + 2|E(β̂j − bj )bj | ≤ E(β̂j − bj )2 + 2
q
q
polyLog(n)
E(β̂j − bj )2 Eb2j = O
.
3
n2
Similarly, since |a2 − b2 | = |a − b| · |a + b| ≤ |a − b|(|a − b| + 2|b|),
polyLog(n)
|(Eβ̂j )2 − (Ebj )2 | ≤ E|β̂j − bj | · E|β̂j − bj | + 2E|bj | = O
.
3
n2
46
Putting the above two results together, we conclude that
polyLog(n)
Var(β̂j ) − Var(bj ) = O
.
3
n2
(B-54)
Then it is left to show that
Var(bj ) = Ω
B-6.2
1
n · polyLog(n)
.
Controlling Var(bj ) by Var(Nj )
Recall that
1 Nj
bj = √
n ξj
where
n
1 X
Nj = √
Xij ψ(ri,[j] ),
n i=1
ξj =
1 T
T
T
X (D[j] − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] )Xj .
n j
Then
n Var(bj ) = E
Nj
Nj
−E
ξj
ξj
2
=E
Nj − ENj
ENj
Nj
+
−E
ξj
ξj
ξj
2
.
Using the fact that (a + b)2 − ( 12 a2 − b2 ) = 12 (a + 2b)2 ≥ 0, we have
1
n Var(bj ) ≥ E
2
B-6.3
Nj − ENj
ξj
2
−E
ENj
Nj
−E
ξj
ξj
2
,
1
I1 − I2 .
2
(B-55)
Controlling I1
The Assumption A4 implies that
tr(Cov(hj,0 ))
1 T
Var(Nj ) = Xj Qj Xj = Ω
.
n
npolyLog(n)
1
It is left to show that tr(Cov(hj,0 ))/n = Ω polyLog(n)
. Since this result will also be used
later in Appendix C, we state it in the following the lemma.
Lemma B.7. Under assumptions A1 - A3,
2
n−p+1
tr(Cov(ψ(hj,0 )))
K4
1
≥ 02 ·
· min Var(i ) = Ω
.
i
n
K1
n
polyLog(n)
Proof. The (A-10) implies that
Var(ψ(ri,[j] )) ≥ K02 Var(ri,[j] ).
(B-56)
Note that ri,[j] is a function of , we can apply (A-10) again to obtain a lower bound for
Var(ri,[j] ). In fact, by variance decomposition formula, using the independence of 0i s,
Var(ri,[j] ) = E Var ri,[j] (i) + Var E ri,[j] (i) ≥ E Var ri,[j] (i) ,
where (i) includes all but the i-th entry of . Apply A-10 again,
∂ri,[j]
Var ri,[j] (i) ≥ inf
i
∂i
2
· Var(i ),
and hence
∂ri,[j]
Var(ri,[j] ) ≥ E Var ri,[j] (i) ≥ E inf
∂i
47
2
· Var(i ).
(B-57)
∂ri,[j]
∂i .
Now we compute
Similar to (B-43) in p.40, we have
∂rk,[j]
= eTi G[j] ek ,
∂i
(B-58)
where G[j] is defined in (B-18) in p.30. When k = i,
1
1
1
∂ri,[j]
−1
−1
−1
2
2
2
= eTi G[j] ei = eTi D[j]2 D[j]
G[j] D[j]2 D[j]
ei = eTi D[j]
G[j] D[j]2 ei .
∂i
(B-59)
By definition of G[j] ,
−1
1
1
1
T
T
2
2
2
D[j] X[j] )−1 X[j]
D[j]
G[j] D[j]2 = I − D[j]
X[j] (X[j]
.
D[j]
1
T
T
2
Let X̃[j] = D[j]
X[j] and Hj = X̃[j] (X̃[j]
X̃[j] )−1 X̃[j]
. Denote by X̃(i),[j] the matrix X̃[j]
after removing i-th row, then by block matrix inversion formula (See Proposition E.1),
T
X̃(i),[j] + x̃i,[j] x̃Ti,[j] )−1 x̃i,[j]
eTi Hj ei = x̃Ti,[j] (X̃(i),[j]
=
=
T
(X̃(i),[j]
X̃(i),[j] )−1
x̃Ti,[j]
−
T
T
X̃(i),[j] )−1 x̃i,[j] x̃Ti,[j] (X̃(i),[j]
X̃(i),[j] )−1
(X̃(i),[j]
T
1 + x̃Ti,[j] (X̃(i),[j]
X̃(i),[j] )−1 x̃i,[j]
T
x̃Ti,[j] (X̃(i),[j]
X̃(i),[j] )−1 x̃i,[j]
T
1 + x̃Ti,[j] (X̃(i),[j]
X̃(i),[j] )−1 x̃i,[j]
!
x̃i,[j]
.
This implies that
1
−1
2
eTi D[j]
G[j] D[j]2 ei = eTi (I − Hj )ei =
1
T
1 + x̃Ti,[j] (X̃(i),[j]
X̃(i),[j] )−1 x̃i,[j]
1
=
1
2
1
T
T D2 e
1 + eTi D[j] X[j] (X(i),[j]
D(i),[j] X(i),[j] )−1 X[j]
[j] i
≥
=
≥
≥
1
1
2
1
T
T D2 e
1 + K0−1 eTi D[j] X[j] (X(i),[j]
X(i),[j] )−1 X[j]
[j] i
1
T
T e
1 + K0−1 (D[j] )i,i · eTi X[j] (X(i),[j]
X(i),[j] )−1 X[j]
i
1
1+
T
T e
K0−1 K1 eTi X[j] (X(i),[j]
X(i),[j] )−1 X[j]
i
1
K0
·
.
T
T e
K1 1 + eTi X[j] (X(i),[j]
X(i),[j] )−1 X[j]
i
T
T
Apply the above argument to Hj = X[j] (X[j]
X[j] )−1 X[j]
, we have
1
T
T
= eTi (I − X[j] (X[j]
X[j] )−1 X[j]
)ei .
T (X T
−1 X e
1 + eTi X[j]
[j] i
(i),[j] X(i),[j] )
Thus, by (B-56) and (B-57),
Var(ψ(ri,[j] )) ≥
K04
T
T
· [eTi (I − X[j] (X[j]
X[j] )−1 X[j]
)ei ]2 .
K12
Summing i over 1, . . . , n, we obtain that
n
tr(Cov(hj,0 ))
K4 1 X T
T
T
≥ 02 ·
[e (I − X[j] (X[j]
X[j] )−1 X[j]
)ei ]2 · min Var(i )
i
n
K1 n i=1 i
48
(B-60)
2
1
T
−1 T
tr(I − X[j] (X[j] X[j] ) X[j] ) · min Var(i )
i
n
2
K4
n−p+1
= 02 ·
· min Var(i )
i
K1
n
1
by assumption A2, we conclude that
Since mini Var(i ) = Ω polyLog(n)
K4
≥ 02 ·
K1
tr(Cov(hj,0 ))
=Ω
n
1
polyLog(n)
.
In summary,
Var(Nj ) = Ω
1
polyLog(n)
.
Recall that
ξj =
1 T
1
T
T
Xj (D[j] − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] )Xj ≤ XjT D[j] Xj ≤ K1 T 2 ,
n
n
we conclude that
I1 ≥
B-6.4
Var(Nj )
=Ω
(K1 T 2 )2
1
polyLog(n)
.
(B-61)
Controlling I2
By definition,
2
1
1
1
Nj
I2 = E ENj
−E
+ ENj E − E
ξj
ξj
ξj
ξj
2
ENj
Nj
1
= Var
+ ENj E − E
ξj
ξj
ξj
2
1
1
2
= (ENj ) · Var
+ Cov Nj ,
ξj
ξj
1
1
2
≤ (ENj ) · Var
+ Var(Nj ) Var
ξj
ξj
1
= ENj2 · Var
.
ξj
(B-62)
By (B-27) in the proof of Theorem B.4,
ENj2 ≤ 2K1 E(E · ∆2C ) ≤ 2K1
q
EE 2 · E∆4C = O (polyLog(n)) ,
where the last equality uses the fact that E = OL2 (polyLog(n)) as proved in (B-40). On
the other hand, let ξ˜j be an independent copy of ξj , then
Var
1
ξj
1
= E
2
1
1
−
˜
ξj
ξj
!2
=
1 (ξj − ξ˜j )2
E
.
2
ξj2 ξ˜j2
Since ξj ≥ K0 λ− as shown in (B-25), we have
1
1
1
Var
≤
E(ξj − ξ˜j )2 =
· Var(ξj ).
ξj
2(K0 λ− )4
(K0 λ− )4
(B-63)
To bound Var(ξj ), we propose to using the standard Poincaré inequality (Chernoff, 1981),
which is stated as follows.
49
Proposition B.8. Let W = (W1 , . . . , Wn ) ∼ N (0, In×n ) and f be a twice differentiable
function, then
2
∂f (W )
.
Var(f (W )) ≤ E
∂W
2
In our case, i = ui (Wi ), and hence for any twice differentiable function g,
Var(g()) ≤ E
∂g()
∂W
2
∂g()
∂
·
∂
∂W T
=E
2
2
2
≤ max ku0i k∞ · E
i
2
∂g()
∂
2
.
2
Applying it to ξj , we have
Var(ξj ) ≤ c21 · E
∂ξj
∂
2
.
(B-64)
2
For given k ∈ {1, . . . , n}, using the chain rule and the fact that dB −1 = −B −1 dBB −1 for
any square matrix B, we obtain that
∂
T
T
D[j] − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j]
∂k
∂D[j]
∂D[j]
T
T
T
T ∂D[j]
=
−
X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
∂k
∂k
∂k
∂D
[j]
T
T
T
T
+ D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j]
∂k
∂D[j]
G[j]
=GT[j]
∂k
T
T
where G[j] = I − X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] as defined in last subsection. This implies
that
∂D[j]
∂ξj
1
= XjT GT[j]
G[j] Xj .
∂k
n
∂k
Then (B-64) entails that
2
n
1 X
T T ∂D[j]
E Xj G[j]
Var(ξj ) ≤ 2
G[j] Xj
n
∂k
(B-65)
k=1
∂D
. Similar to (B-44) in p.40 and recalling the definition of D[j] in
First we compute ∂[j]
k
(B-17) and that of G[j] in (B-18) in p.30, we have
∂D[j]
= D̃[j] diag(G[j] ek ) diag(D̃[j] G[j] ek ),
∂k
Let Xj = G[j] Xj and X̃j = Xj ◦ Xj where ◦ denotes Hadamard product. Then
XjT GT[j]
∂D[j]
∂D[j]
G[j] Xj = XjT
Xj = XjT diag(D̃[j] G[j] ek )Xj = X̃jT D̃[j] G[j] ek .
∂k
∂k
Here we use the fact that for any vectors x, a ∈ Rn ,
xT diag(a)x =
n
X
ai x2i = (x ◦ x)T a.
i=1
This together with (B-65) imply that
Var(ξj ) ≤
n
1 X
1
E(X̃jT D̃[j] G[j] ek )2 = 2 E X̃jT D̃[j] G[j]
n2
n
k=1
50
2
=
2
1
E(X̃jT D̃[j] G[j] GT[j] D̃[j] X̃j )
n2
Note that G[j] GT[j] kG[j] k2op I, and D̃[j] K3 I by Lemma B.2 in p.(B.2). Therefore we
obtain that
K2
1
2
2
2
X̃j ≤ 23 · E G[j] op · kX̃j k22
Var(ξj ) ≤ 2 E G[j] op · X̃jT D̃[j]
n
n
K2
K32
2
2
4
4
= 2 E G[j] op · kXj k4 ≤ 3 E G[j] op · kXj k∞
n
n
As shown in (B-34),
kG[j] kop ≤
K1
K0
12
.
On the other hand, notice that the i-th row of G[j] is hj,1,i (see (B-20) for definition), by
definition of ∆C we have
kXj k∞ = kG[j] Xj k∞ = max |hTj,1,i Xj | ≤ ∆C · max khj,1,i k2 .
i
By (B-35) and assumption A5,
kXj k∞ ≤ ∆C ·
K1
K0
21
This entails that
= OL4 (polyLog(n)) .
Var(ξj ) = O
polyLog(n)
n
.
Combining with (B-62) and (B-63), we obtain that
polyLog(n)
I2 = O
.
n
B-6.5
Summary
Putting (B-55), (B-61) and (B-62) together, we conclude that
1
1
polyLog(n)
1
−O
=Ω
=⇒ Var(bj ) = Ω
.
n Var(bj ) = Ω
polyLog(n)
n · polyLog(n)
polyLog(n)
n
Combining with (B-54),
Var(β̂j ) = Ω
C
polyLog(n)
n
.
Proof of Other Results
C-1
Proofs of Propositions in Section 2.3
Proof of Proposition 2.1. Let Hi (α) = Eρ(i − α). First we prove that the conditions
d
imply that 0 is the unique minimizer of Hi (α) for all i. In fact, since i = −i ,
Hi (α) = Eρ(i − α) =
1
(Eρ(i − α) + ρ(−i − α)) .
2
Using the fact that ρ is even, we have
Hi (α) = Eρ(i − α) =
1
(Eρ(i − α) + ρ(i + α)) .
2
By (4), for any α 6= 0, Hi (α) > Hi (0). As a result, 0 is the unique minimizer of Hi . Then
for any β ∈ Rp
n
n
n
n
1X
1X
1X
1X
Eρ(yi − xTi β) =
Eρ(i − xTi (β − β ∗ )) =
Hi (xTi (β − β ∗ )) ≥
Hi (0).
n i=1
n i=1
n i=1
n i=1
51
The equality holds iff xTi (β − β ∗ ) = 0 for all i since 0 is the unique minimizer of Hi . This
implies that
X(β ∗ (ρ) − β ∗ ) = 0.
Since X has full column rank, we conclude that
β ∗ (ρ) = β ∗ .
Proof of Proposition 2.2. For any α ∈ R and β ∈ Rp , let
n
1X
Eρ(yi − α − xTi β).
n i=1
G(α; β) =
Since αρ minimizes Eρ(i − α), it holds that
n
n
1X
1X
G(α; β) =
Eρ(i − α − xTi (β − β ∗ )) ≥
Eρ(i − αρ ) = G(αρ , β ∗ ).
n i=1
n i=1
Note that αρ is the unique minimizer of Eρ(i − α), the above equality holds if and only
if
α − αρ
T
∗
α + xi (β − β ) ≡ αρ =⇒ (1 X)
= 0.
β − β∗
Since (1 X) has full column rank, it must hold that α = αρ and β = β ∗ .
C-2
Proofs of Corollary 3.3
Proposition C.1. Suppose that i are i.i.d. such that Eρ(1 − α) as a function of α has
a unique minimizer αρ . Further assume that XJnc contains an intercept term, XJn has
full column rank and
span({Xj : j ∈ Jn }) ∩ span({Xj : j ∈ Jnc }) = {0}
Let
(C-66)
(
)
n
1X
T
Eρ(yi − xi β) .
βJn (ρ) = arg min min
c n
βJn
βJn
i=1
Then βJn (ρ) = βJ∗n .
Proof. let
n
G(β) =
1X
Eρ(yi − xTi β).
n i=1
For any minimizer β(ρ) of G, which might not be unique, we prove that βJn (ρ) = βJ∗n . It
follows by the same argument as in Proposition 2.2 that
xTi (β(ρ)−β ∗ ) ≡ α0 =⇒ X(β(ρ)−β ∗ ) = α0 1 =⇒ XJn (βJn (ρ)) = −XJnc (β(ρ)Jnc −βJ∗nc )+α0 1.
Since XJnc contains the intercept term, we have
XJn (βJn (ρ) − βJ∗n ) ∈ span({Xj : j ∈ Jnc }).
It then follows from (C-68) that
XJn (βJn (ρ) − βJ∗n ) = 0.
Since XJn has full column rank, we conclude that
βJn (ρ) = βJ∗n .
52
The Proposition C.1 implies that βJ∗n is identifiable even when X is not of full column
rank. A similar conclusion holds for the estimator β̂Jn and the residuals Ri . The following
two propositions show that under certain assumptions, β̂Jn and Ri are invariant to the
choice of β̂ in the presense of multiple minimizers.
Proposition C.2. Suppose that ρ is convex and twice differentiable with ρ00 (x) > c > 0
for all x ∈ R. Let β̂ be any minimizer, which might not be unique, of
n
F (β) ,
1X
ρ(yi − xTi β)
n i=1
Then Ri = yi − xi β̂ is independent of the choice of β̂ for any i.
Proof. The conclusion is obvious if F (β) has a unique minimizer. Otherwise, let β̂ (1) and
β̂ (2) be two different minimizers of F denote by η their difference, i.e. η = β̂ (2) − β̂ (1) .
Since F is convex, β̂ (1) + vη is a minimizer of F for all v ∈ [0, 1]. By Taylor expansion,
F (β̂ (1) + vη) = F (β̂ (1) ) + v∇F (β̂ (1) )η +
v2 T 2
η ∇ F (β̂ (1) )η + o(v 2 ).
2
Since both β̂ (1) + vη and β̂ (1) are minimizers of F , we have F (β̂ (1) + vη) = F (β̂ (1) ) and
∇F (β̂ (1) ) = 0. By letting v tend to 0, we conclude that
η T ∇2 F (β̂ (1) )η = 0.
The hessian of F can be written as
∇2 F (β̂ (1) ) =
1 T
cX T X
X diag(ρ00 (yi − xTi β̂ (1) ))X
.
n
n
Thus, η satisfies that
ηT
cX T X
η = 0 =⇒ Xη = 0.
n
(C-67)
This implies that
y − X β̂ (1) = y − X β̂ (2)
and hence Ri is the same for all i in both cases.
Proposition C.3. Suppose that ρ is convex and twice differentiable with ρ00 (x) > c > 0
for all x ∈ R. Further assume that XJn has full column rank and
span({Xj : j ∈ Jn }) ∩ span({Xj : j ∈ Jnc }) = {0}
(C-68)
Let β̂ be any minimizer, which might not be unique, of
n
F (β) ,
1X
ρ(yi − xTi β)
n i=1
Then β̂Jn is independent of the choice of β̂.
Proof. As in the proof of Proposition C.2, we conclude that for any minimizers β̂ (1) and
β̂ (2) , Xη = 0 where η = β̂ (2) − β̂ (1) . Decompose the term into two parts, we have
XJn ηJn = −XJcn ηJnc ∈ span({Xj : j ∈ Jnc }).
It then follows from (C-68) that XJn ηJn = 0. Since XJn has full column rank, we conclude
(1)
(2)
that ηJn = 0 and hence β̂Jn = β̂Jn .
53
Proof of Corollary 3.3. Under assumption A3*, XJn must have full column rank.
Otherwise there exists α ∈ R|Jn | such that XJn α, in which case αT XJTn (I −HJnc )XJn α = 0.
This violates the assumption that λ̃− > 0. On the other hand, it also guarantees that
span({Xj : j ∈ Jn }) ∩ span({Xj : j ∈ Jnc }) = {0}.
This together with assumption A1 and Proposition C.3 implies that β̂Jn is independent
of the choice of β̂.
c
c
c
Let B1 ∈ R|Jn |×|Jn | , B2 ∈ R|Jn |×|Jn | and assume that B2 is invertible. Let X̃ ∈ Rn×p
such that
X̃Jn = XJn − XJnc B1 , X̃Jnc = XJnc B2 .
Then rank(X) = rank(X̃) and model (1) can be rewritten as
y = X̃ β˜∗ +
where
β̃J∗n = βJ∗n ,
β̃J∗nc = B2−1 βJ∗nc + B1 βJ∗n .
˜
Let β̂ be an M-estimator, which might not be unique, based on X̃. Then Proposition C.3
˜
˜
shows that β̂Jn is independent of the choice of β̂, and an invariance argument shows that
˜
β̂Jn = β̂Jn .
In the rest of proof, we use ˜· to denote the quantity obtained based on X̃. First we show
that the assumption A4 is not affected by this transformation. In fact, for any j ∈ Jn ,
by definition we have
span(X̃[j] ) = span(X[j] )
and hence the leave-j-th-predictor-out residuals are not changed by Proposition C.2. This
implies that h˜j,0 = hj,0 and Q̃j = Qj . Recall the definition of hj,0 , the first-order condition
of β̂ entails that X T hj,0 = 0. In particular, XJTnc hj,0 = 0 and this implies that for any
α ∈ Rn ,
0 = Cov(XJTnc hj,0 , αT hj,0 ) = XJnc Qj α.
Thus,
X̃jT Q̃j X̃j
tr(Q̃j )
=
XjT Qj Xj
(Xj − XJcn (B1 )j )T Qj (Xj − XJnc (B1 )j )
=
.
tr(Qj )
tr(Qj )
Then we prove that the assumption A5 is also not affected by the transformation. The
above argument has shown that
h̃Tj,0 X̃j
kh̃j,0 k2
=
hTj,0 Xj
.
khj,0 k2
I|Jn | 0
On the other hand, let B =
, then B is non-singular and X̃ = XB. Let
−B1 B2
B(j),[j] denote the matrix B after removing j-th row and j-th column. Then B(j),[j] is
also non-singular and X̃[j] = X[j] B(j),[j] . Recall the definition of hj,1,i , we have
T
T
h̃j,1,i = (I − D̃[j] X̃[j] (X̃[j]
D̃[j] X̃j )−1 X̃[j]
)ei
T
T
T
= (I − D[j] X[j] B(j),[j] (B(j),[j]
X[j]
D[j] Xj B(j),[j] )−1 B(j),[j]
X[j] )ei
T
= (I − D[j] X[j] (X[j]
D[j] Xj )−1 X[j] )ei
= hj,1,i .
On the other hand, by definition,
T
T
T
T
X[j]
hj,1,i = X[j]
(I − D[j] X[j] (X[j]
D[j] X[j] )−1 X[j]
)ei = 0.
54
Thus,
hTj,1,i X̃j = hTj,1,i (Xj − XJcn (B1 )j ) = hTj,1,i Xj .
In summary, for any j ∈ Jn and i ≤ n,
h̃Tj,1,i X̃j
kh̃j,1,i k2
=
hTj,1,i Xj
.
khj,1,i k2
Putting the pieces together we have
˜ C = ∆C .
∆
By Theorem 3.1,
β̂
−
E
β̂
j
j
, N (0, 1) = o(1).
max dTV L q
j∈Jn
Var(β̂j )
provided that X̃ satisfies the assumption A3.
Now let U ΛV be the singular value decomposition of XJnc , where U ∈ Rn×p , Λ ∈ Rp×p , V ∈
Rp×p with U T U = V T V = Ip and Λ = diag(ν1 , . . . , νp ) being the diagonal matrix formed
by singular values of XJnc . First we consider the case where XJnc has full column rank,
p
then νj > 0 for all j ≤ p. Let B1 = (XJTn XJn )− XJTn XJn and B2 = n/|Jnc |V T Λ−1 . Then
X̃ T X̃
1
=
n
n
XJTn (I − XJnc (XJTnc XJnc )−1 XJnc )XJn
0
0
nI
.
This implies that
λmax
X̃ T X̃
n
!
n
o
= max λ̃max , 1 ,
The assumption A3* implies that
!
X̃ T X̃
λmax
= O(polyLog(n)),
n
λmin
λmin
X̃ T X̃
n
X̃ T X̃
n
!
n
o
= min λ̃min , 1 .
!
=Ω
1
polyLog(n)
.
By Theorem 3.1, we conclude that
Next we consider the case where XJcn does not have full column rank. We first remove
the redundant columns from XJcn , i.e. replace XJnc by the matrix formed by its maximum
linear independent subset. Denote by X this matrix. Then span(X) = span(X) and
span({Xj : j 6∈ Jn }) = span({Xj : j 6∈ Jn }). As a consequence of Proposition C.1 and
C.3, neither βJ∗n nor β̂Jn is affected. Thus, the same reasoning as above applies to this
case.
C-3
Proofs of Results in Section 3.3
First we prove two lemmas regarding the behavior of Qj . These lemmas are needed for
justifying Assumption A4 in the examples.
Lemma C.4. Under assumptions A1 and A2,
kQj kop ≤ c21
K32 K1
,
K0
kQj kF ≤
where Qj = Cov(hj,0 ) as defined in section B-1.
55
√
nc21
K32 K1
K0
Proof of Lemma C.4. By definition,
||Qj ||op = sup αT Qj α
α∈Sn−1
where Sn−1 is the n-dimensional unit sphere. For given α ∈ Sn−1 ,
αT Qj α = αT Cov(hj,0 )α = Var(αT hj,0 )
It has been shown in (B-59) in Appendix B-6.3 that
∂ri,[j]
= eTi G[j] ek ,
∂k
T
T
where G[j] = I − X[j] (X[j]
D[j] X[j] )−1 X[j]
D[j] . This yields that
!
n
n
n
X
X
∂ri,[j]
∂ X
αi ψ(ri,[j] ) =
=
αi ψ 0 (ri,[j] ) ·
αi ψ 0 (ri,[j] ) · eTi G[j] = αT D̃[j] G[j] .
∂ i=1
∂
i=1
i=1
By standard Poincaré inequality (see Proposition B.8), since i = ui (Wi ),
!
!
n
n
2
X
∂ X
0 2
αi ψ(ri,[j] )
αi ψ(ri,[j] ) ≤ max ||uk ||∞ · E
Var
k
∂ i=1
i=1
≤c21 · E αT D̃[j] G[j] GT[j] D̃[j] α ≤ c21 EkD̃[j] G[j] GT[j] D̃[j] k22 ≤ c21 EkD̃j k2op kG[j] k2op .
We conclude from Lemma B.2 and (B-34) in Appendix B-2 that
kG[j] k2op ≤
kD̃[j] kop ≤ K3 ,
K1
.
K0
Therefore,
||Qj ||op = sup Var
α∈Sn−1
and hence
||Qj ||F ≤
√
n
X
!
αi ψ(Ri )
≤ c21
i=1
n||Qj ||op ≤
√
n · c21
K32 K1
K0
K32 K1
.
K0
Lemma C.5. Under assumptions A1 - A3,
tr(Qj ) ≥ K ∗ n = Ω(n · polyLog(n)),
where K ∗ =
K04
K12
·
n−p+1 2
n
· mini Var(i ).
Proof. This is a direct consequence of Lemma B.7 in p.47.
Throughout the following proofs, we will use several results from the random matrix
theory to bound the largest and smallest singular values of Z. The results are shown in
Appendix E. Furthermore, in contrast to other sections, the notation P (·), E(·), Var(·)
denotes the probability, the expectation and the variance with respect to both and Z in
this section.
Proof of Proposition 3.4. By Proposition E.3,
√
√
λ+ = (1 + κ)2 + op (1) = Op (1), λ− = (1 − κ)2 − op (1) = Ωp (1)
and thus the assumption A3 holds with high probability. By Hanson-Wright inequality
(Hanson & Wright, 1971; Rudelson & Vershynin, 2013; see Proposition E.2), for any given
deterministic matrix A,
t2
t
P (|ZjT AZj − EZjT AZj | ≥ t) ≤ 2 exp −c min
,
σ 4 kAk2F σ 2 kAkop
56
for some universal constant c. Let A = Qj and conditioning on Z[j] , then by Lemma C.4,
we know that
√
K 2 K1
K 2 K1
, kQj kF ≤ nc21 3
kQj kop ≤ c21 3
K0
K0
and hence
t2
t
T
T
P Zj Qj Zj − E(Zj Qj Zj Z[j] ) ≤ −t Z[j] ≤ 2 exp −c min
,
.
σ 4 · nc41 K34 K12 /K02 σ 2 c21 K32 K1 /K0
(C-69)
Note that
2
E(ZjT Qj Zj Z[j] ) = tr(E[Zj ZjT |Z[j] ]Qj ) = EZ1j
tr(Qj ) = τ 2 tr(Qj ).
By Lemma C.5, we conclude that
!
!
T
Q
Z
Z
ZjT Qj Zj
t
t
j
j
j
Z[j] ≤ P
P
Z[j]
≤ τ2 −
≤ τ2 −
tr(Qj )
nK ∗
tr(Qj )
tr(Qj )
t2
t
≤2 exp −c min
,
.
(C-70)
σ 4 · nc41 K34 K12 /K02 2σ 2 c21 K32 K1 /K0
Let t = 21 τ 2 nK ∗ and take expectation of both sides over Z[j] , we obtain that
!
ZjT Qj Zj
τ2
K ∗2 τ 4
K ∗τ 2
P
≤
≤ 2 exp −cn min
,
tr(Qj )
2
4σ 4 c41 K34 K12 /K02 2σ 2 c21 K32 K1 /K0
and hence
P
ZjT Qj Zj
τ2
≤
min
j∈Jn tr(Qj )
2
!
≤ 2n exp −cn min
K ∗2 τ 4
K ∗τ 2
,
4σ 4 c41 K34 K12 /K02 2σ 2 c21 K32 K1 /K0
= o(1).
(C-71)
This entails that
min
j∈Jn
ZjT Qj Zj
= Ωp (polyLog(n)).
tr(Qj )
Thus, assumption A4 is also satisfied with high probability. On the other hand, since Zj
has i.i.d. mean-zero σ 2 -sub-gaussian entries, for any deterministic unit vector α ∈ Rn ,
αT Zj is σ 2 -sub-gaussian and mean-zero, and hence
t2
P (|αT Zj | ≥ t) ≤ 2e− 2σ2 .
Let αj,i = hj,1,i /khj,1,i k2 and αj,0 = hj,0 /khj,0 k2 . Since hj,1,i and hj,0 are independent
of Zj , a union bound then gives
p
t2 +4σ 2 log n
t2
2σ 2
P ∆C ≥ t + 2σ log n ≤ 2n2 e−
= 2e− 2σ2 .
By Fubini’s formula (Durrett, 2010, Lemma 2.2.8.),
E∆8C
Z
∞
Z
7
√
2σ log n
7
8t P (∆C ≥ t)dt ≤
=
0
8t dt +
0
Z
∞
√
2σ log n
8t7 P (∆C ≥ t)dt
Z ∞
p
p
p
log n)8 +
8(t + 2σ log n)7 P (∆C ≥ t + 2σ log n)dt
Z0 ∞
p
t2
7
≤ (2σ log n)8 +
64(8t7 + 128σ 7 (log n) 2 ) · 2e− 2σ2 dt
= (2σ
0
= O(σ 8 · polyLog(n)) = O (polyLog(n)) .
(C-72)
This, together with Markov inequality, guarantees that assumption A5 is also satisfied
with high probability.
57
Proof of Proposition 3.5. It is left to prove that assumption A3 holds with high probability. The proof of assumption A4 and A5 is exactly the same as the proof of Proposition
3.5. By Proposition E.4,
λ+ = Op (1).
On the other hand, by Proposition E.7 (Litvak et al., 2005),
T
Z Z
< c1 ≤ e−c2 n .
P λmin
n
and thus
λ− = Ωp (1).
Proof of Proposition 3.6. Since Jn excludes the intercept term, the proof of assumption A4 and A5 is still the same as Proposition 3.5. It is left to prove assumption A3. Let
R1 , . . . , Rn be i.i.d. Rademacher random variables, i.e. P (Ri = 1) = P (Ri = −1) = 12 ,
and
Z ∗ = diag(B1 , . . . , Bn )Z.
Then (Z ∗ )T Z ∗ = Z T Z. It is left to show that the assumption A3 holds for Z ∗ with high
probability. Note that
(Zi∗ )T = (Bi , Bi x̃Ti ).
For any r ∈ {1, −1} and borel sets B1 , . . . , Bp ⊂ R,
P (Bi = r, Bi Z̃i1 ∈ B1 , . . . , Bi Z̃i(p−1) ∈ Bp−1 )
= P (Bi = r, Z̃i1 ∈ rB1 , . . . , Z̃i(p−1) ∈ rBp−1 )
= P (Bi = r)P (Z̃i1 ∈ rB1 ) . . . P (Z̃i(p−1) ∈ rBp−1 )
= P (Bi = r)P (Z̃i1 ∈ B1 ) . . . P (Z̃i(p−1) ∈ Bp−1 )
= P (Bi = r)P (Bi Z̃i1 ∈ B1 ) . . . P (Bi Z̃i(p−1) ∈ Bp−1 )
where the last two lines uses the symmetry of Z̃ij . Then we conclude that Zi∗ has independent entries. Since the rows of Z ∗ are independent, Z ∗ has independent entries. Since Bi
d
are symmetric and sub-gaussian with unit variance and Bi Z̃ij = Z̃ij , which is also symmetric and sub-gaussian with variance bounded from below, Z ∗ satisfies the conditions
of Propsition 3.5 and hence the assumption A3 is satisfied with high probability.
Proof of Proposition 3.8 (with Proposition 3.7 being a special case). Let Z∗ =
1
1
Λ− 2 ZΣ− 2 , then Z∗ has i.i.d. standard gaussian entries. By Proposition 3.6, Z∗ satisfies
assumption A3 with high probability. Thus,
!
T
1
1
Σ 2 Z∗T ΛZ∗ Σ 2
Z∗ Z∗
λ+ = λmax
≤ λmax (Σ) · λmax (Λ) · λmax
= Op (polyLog(n)),
n
n
and
1
λ− = λmin
1
Σ 2 Z∗T ΛZ∗ Σ 2
n
!
≥ λmin (Σ) · λmin (Λ) · λmin
Z∗T Z∗
n
= Ωp
1
polyLog(n)
1
.
As for assumption A4, the first step is to calculate E(ZjT Qj Zj |Z[j] ). Let Z̃ = Λ− 2 Z,
then vec(Z̃) ∼ N (0, I ⊗ Σ). As a consequence,
Z̃j |Z̃[j] ∼ N (µ̃j , σj2 I)
where
1
−2
µ̃j = Z̃[j] Σ−1
Z[j] Σ−1
[j],[j] Σ[j],j = Λ
[j],[j] Σ[j],j .
58
Thus,
Zj |Z[j] ∼ N (µj , σj2 Λ)
where µj = Z[j] Σ−1
[j],[j] Σ[j],j . It is easy to see that
λ− ≤ min σj2 ≤ max σj2 ≤ λ+ .
j
(C-73)
j
It has been shown that Qj µj = 0 and hence
ZjT Qj Zj = (Zj − µj )T Qj (Zj − µj ).
1
1
1
Let Zj = Λ− 2 (Zj − µj ) and Q̃j = Λ 2 Qj Λ 2 , then Zj ∼ N (0, σj2 I) and
ZjT Qj Zj = ZjT Q̃j Zj .
By Lemma C.4,
kQ̃j kop ≤ kΛkop · kQj kop ≤ λmax (Λ) · c21
and hence
kQ̃j kF ≤
√
nλmax (Λ) · c21
K32 K1
,
K0
K32 K1
.
K0
By Hanson-Wright inequality (Hanson & Wright, 1971; Rudelson & Vershynin, 2013; see
Proposition E.2), we obtain a similar inequality to (C-69) as follows:
P |ZjT Qj Zj − E(ZjT Qj Zj Z[j] )| ≥ t Z[j]
"
(
)#
t2
t
≤2 exp −c min
.
,
σj4 · nλmax (Λ)2 c41 K34 K12 /K02 σj2 λmax (Λ)c21 K32 K1 /K0
On the other hand,
E(ZjT Qj Zj |Z[j] ) = E(ZjT Q̃j Zj |Z[j] ) = σj2 tr(Q̃j ).
By definition,
1
1
1
1
tr(Q̃j ) = tr(Λ 2 Qj Λ 2 ) = tr(ΣQj ) = tr(Qj2 ΛQj2 ) ≥ λmin (Λ) tr(Qj ).
By Lemma C.5,
tr(Q̃j ) ≥ λmin (Λ) · nK ∗ .
Similar to (C-70), we obtain that
!
ZjT Qj Zj
t
2
≥ σj −
Z[j]
P
tr(Qj )
nK ∗
"
(
)#
t2
t
≤2 exp −c min
,
.
σj4 · nλmax (Λ)2 c41 K34 K12 /K02 σj2 λmax (Λ)c21 K32 K1 /K0
Let t = 12 σj2 nK ∗ , we have
P
ZjT Qj Zj
σj2
≥
tr(Qj )
2
!
≤ 2 exp −cn min
K ∗2
K∗
,
4λmax (Λ)2 c41 K34 K12 /K02 2λmax (Λ)c21 K32 K1 /K0
and a union bound together with (C-73) yields that
min
j∈Jn
ZjT Qj Zj
1
1
= Ωp min σj2 ·
= Ωp
.
j
tr(Qj )
polyLog(n)
polyLog(n)
59
=o
1
n
As for assumption A5, let
1
αj,0 =
1
Λ 2 hj,0
,
khj,0 k2
Λ 2 hj,1,i
khj,1,i k2
αj,i =
then for i = 0, 1, . . . , p,
p
λmax (Λ).
kαj,i k2 ≤
Note that
hTj,0 Zj
T
= αj,0
Zj ,
khj,0 k2
hTj,1,i Zj
T
= αj,i
Zj
khj,1,i k2
using the same argument as in (C-72), we obtain that
E∆8C = O λmax (Λ)4 · max σj8 · polyLog(n) = O (polyLog(n)) ,
j
and by Markov inequality and (C-73),
E(∆8C |Z) = Op E∆8C = Op (polyLog(n)).
Proof of Proposition 3.9. The proof that assumptions A4 and A5 hold with high
probability is exactly the same as the proof of Proposition 3.8. It is left to prove assump1
tion A3*; see Corollary 3.3. Let c = (mini |(Λ− 2 1)i |)−1 and Z = (c1 Z̃). Recall the the
definition of λ̃+ and λ̃− , we have
λ̃+ = λmax (Σ{1} ),
λ̃− = λmin (Σ{1} ),
where
Σ{1} =
1 T
Z̃
n
I−
11T
n
Z̃.
Rewrite Σ{1} as
Σ{1}
1
=
n
11T
I−
n
It is obvious that
span
T
11T
Z̃
I−
Z̃ .
n
11T
I−
n
Z̃ ⊂ span(Z).
As a consequence
λ̃+ ≤ λmax
ZT Z
n
λ̃− ≥ λmin
,
It remains to prove that
T
Z Z
λmax
= Op (polyLog(n)) ,
n
λmin
ZT Z
n
ZT Z
n
.
= Ωp
1
polyLog(n)
.
To prove this, we let
1
Z∗ = Λ− 2 Z
1
1
1
0
0
Σ
1
− 21
, (ν Z̃∗ ),
where ν = cΛ− 2 1 and Z̃∗ = Λ− 2 Z̃Σ− 2 . Then
!
T
T
1
1
Z Z
Σ 2 Z∗T ΛZ∗ Σ 2
Z∗ Z∗
λmax
= λmax
≤ λmax (Σ) · λmax (Λ) · λmax
,
n
n
n
60
and
λmin
ZT Z
n
1
1
= λmin
Σ 2 Z∗T ΛZ∗ Σ 2
n
!
≥ λmin (Σ) · λmin (Λ) · λmin
It is left to show that
T
Z∗ Z∗
= Op (polyLog(n)),
λmax
n
λmin
Z∗T Z∗
n
= Ωp
Z∗T Z∗
n
1
polyLog(n)
.
.
By definition, mini |νi | = 1 and maxi |νi | = O (polyLog(n)), then
!
!
T
Z∗ Z∗
kνk22
νν T
Z̃∗T Z̃∗
Z̃∗T Z̃∗
λmax
≤ λmax
+
= λmax
+
.
n
n
n
n
n
Since Z̃∗ has i.i.d. standard gaussian entries, by Proposition E.3,
!
Z̃∗T Z̃∗
= Op (1).
λmax
n
Moreover, kνk22 ≤ n maxi |νi |2 = O(n · polyLog(n)) and thus,
T
Z∗ Z∗
= Op (polyLog(n)).
λmax
n
On the other hand, similar to Proposition 3.6,
Z∗ = diag(B1 , . . . , Bn )Z∗
where B1 , . . . , Bn are i.i.d. Rademacher random variables. The same argument in the
proof of Proposition 3.6 implies that Z∗ has independent entries with sub-gaussian norm
bounded by kνk2∞ ∨ 1 and variance lower bounded by 1. By Proposition E.7, Z∗ satisfies
assumption A3 with high probability. Therefore, A3* holds with high probability.
Proof of Proposition 3.10. Let Λ = (λ1 , . . . , λn ) and Z be the matrix with entries
Zij , then by Proposition 3.4 or Proposition 3.5, Zij satisfies assumption A3 with high
probability. Notice that
T 2
T
Z Λ Z
Z Z
2
λ+ = λmax
≤ λmax (Λ) · λmax
= Op (polyLog(n)),
n
n
and
λ− = λmin
Z T Λ2 Z
n
2
≥ λmin (Λ) · λmin
ZT Z
n
= Ωp
1
polyLog(n)
.
Thus Z satisfies assumption A3 with high probability.
Conditioning on any realization of Λ, the law of Zij does not change due to the independence between Λ and Z. Repeating the arguments in the proof of Proposition 3.4 and
Proposition 3.5, we can show that
ZjT Q̃j Zj
tr(Q̃j )
= Ωp
1
polyLog(n)
,
and E
max
i=0,...,n;j=1,...,p
T
|α̃j,i
Zj |8 = Op (polyLog(n)),
(C-74)
where
Q̃j = ΛQj Λ,
α̃j,0 =
Λhj,0
,
kΛhj,0 k2
61
α̃j,1,i =
Λhj,1,i
.
kΛhj,1,i k2
Then
ZjT Qj Zj
ZjT Q̃j Zj tr(ΛQj Λ)
ZjT Q̃j Zj
·
= Ωp
=
≥ a2 ·
tr(Qj )
tr(Qj )
tr(Q̃j )
tr(Q̃j )
1
polyLog(n)
,
(C-75)
and
"
E∆8C
=E
max
i=0,...,n;j=1,...,p
≤ b8 E
max
kΛhj,1,i k2
kΛhj,0 k2
, max
· max max
j
khj,0 k2 i,j khj,1,i k2
T
|α̃j,i
Zj |8
T
|α̃j,i
Zj |8
i=0,...,n;j=1,...,p
8 #
(C-76)
= Op (polyLog(n)).
By Markov inequality, the assumption A5 is satisfied with high probability.
Proof of Proposition 3.11. The concentration inequality of ζi plus a union bound
imply that
2
2
P max ζi > (log n) α ≤ nc1 e−c2 (log n) = o(1).
i
Thus, with high probability,
T 2
T
4
Z Λ Z
Z Z
λmax = λmax
≤ (log n) α · λmax
= Op (polyLog(n)).
n
n
Let n0 = b(1 − δ)nc for some δ ∈ (0, 1 − κ). Then for any subset I of {1, . . . , n} with
size n0 , by Proposition E.6 (Proposition E.7), under the conditions of Proposition 3.4
(Proposition 3.5), there exists constants c3 and c4 , which only depend on κ, such that
T
ZI ZI
< c3 ≤ e−c4 n
P λmin
n
where ZI represents the sub-matrix of Z formed by {Zi : i ∈ I}, where Zi is the i-th row
of Z. Then by a union bound,
T
ZI ZI
n
P min0 λmin
< c3 ≤
e−c4 n .
n0
n
|I|=n
By Stirling’s formula, there exists a constant c5 > 0 such that
n
o
n!
n
≤
c
exp
(−
δ̃
log
δ̃
−
(1
−
δ̃)
log(1
−
δ̃))n
= 0
5
0
n
n !(n − n0 )!
where δ̃ = n0 /n. For sufficiently small δ and sufficiently large n,
−δ̃ log δ̃ − (1 − δ̃) log(1 − δ̃) < c4
and hence
P
min0 λmin
|I|=n
ZIT ZI
n
< c3
< c5 e−c6 n
for some c6 > 0. By Borel-Cantelli Lemma,
lim inf
min
n→∞ |I|=b(1−δ)nc
λmin
ZIT ZI
n
≥ c3
On the other hand, since F −1 is continuous at δ, then
a.s.
ζ(b(1−δ)nc) → F −1 (δ) > 0.
62
a.s..
(C-77)
where ζ(k) is the k-th largest of {ζi : i = 1, . . . , n}. Let I ∗ be the set of indices corresponding to the largest b(1 − δ)nc ζi0 s. Then with probability 1,
T 2
T 2
T
Z Λ Z
ZI ∗ Λ I ∗ ZI ∗
Z Z
= lim inf λmin
≥ lim inf ζ(b(1−δ)nc) · lim inf λmin
lim inf λmin
n→∞
n→∞
n→∞
n→∞
n
n
n
T
ZI ZI
≥ lim inf ζ(b(1−δ)nc) · lim inf
min
λmin
n→∞
n→∞ |I|=b(1−δ)nc
n
≥ c3 F −1 (δ)2 > 0.
To prove assumption A4, similar to (C-75) in the proof of Proposition 3.10, it is left to
show that
tr(ΛQj Λ)
1
= Ωp
.
min
j
tr(Qj )
polyLog(n)
Furthermore, by Lemma C.5, it remains to prove that
n
min tr(ΛQj Λ) = Ωp
.
j
polyLog(n)
Recalling the equation (B-60) in the proof of Lemma B.7, we have
eTi Qj ei ≥
1
K0
.
·
T
T
T
K1 1 + ei Z[j] (Z(i),[j] Z(i),[j] )−1 Z[j] ei
(C-78)
By Proposition E.5,
v
u
u
P tλmax
ZjT Zj
n
!
> 3C1 ≤ 2e−C2 n .
On the other hand, apply (C-77) to Z(i),[j] , we have
P
min
|I|=b(1−δ)nc
(Z(i),[j] )TI (Z(i),[j] )I
n
λmin
!
!
< c3
< c5 e−c6 n .
A union bound indicates that with probability (c5 np + 2p)e− min{C2 ,c6 }n = o(1),
!
!
T
Z[j]
Z[j]
(Z(i),[j] )TI (Z(i),[j] )I
2
≤ 9C1 , min
min
λmin
≥ c3 .
max λmax
j
i,j |I|=b(1−δ)nc
n
n
This implies that for any j,
λmax
T
Z[j]
Z[j]
!
n
T 2
Z[j]
Λ Z[j]
= λmax
!
n
2
≤ ζ(1)
· 9C12
and for any i and j,
λmin
T
Z(i),[j]
Z(i),[j]
n
!
= λmin
T
2
ζ(i)
Z(i),[j]
Z(i),[j]
!
n
2
≥ min{ζ(b(1−δ)nc) , ζ(b(1−δ)nc) + 1} ·
min
|I|=b(1−δ)nc
λmin
2
(Z(i),[j] )TI ζ(i)
(Z(i),[j] )I
n
2
≥c3 min{ζ(b(1−δ)nc) , ζ(b(1−δ)nc) + 1} > 0.
Moreover, as discussed above,
2
ζ(1) ≤ (log n) α , min{ζ(b(1−δ)nc) , ζ(b(1−δ)nc) + 1} → F −1 (δ)
63
!
almost surely. Thus, it follows from (C-78) that with high probability,
eTi Qj ei ≥
K0
1
·
T (Z T
−1 Z e
K1 1 + eTi Z[j]
[j] i
(i),[j] Z(i),[j] )
K0
1
·
T Z
[j]
K1 1 + eT Z[j]
ei · c3 (F −1 (δ))2
i
n
K0
1
.
≥
·
K1 1 + (log n) α4 · 9C12 · c3 (F −1 (δ))2
≥
The above bound holds for all diagonal elements of Qj uniformly with high probability.
Therefore,
K0
n
1
2
tr(ΛQj Λ) ≥ ζ(b(1−δ)nc)
·b(1−δ)nc·
=
Ω
·
.
p
K1 1 + (log n) α4 · 9C12 · c3 (F −1 (δ))2
polyLog(n)
As a result, the assumption A4 is satisfied with high probability. Finally, by (C-76), we
obtain that
T
E∆8C ≤ E
max
|α̃j,i
Zj |8 · kΛk8op .
i=0,...,n;j=1,...,p
By Cauchy’s inequality,
E∆8C ≤
r
E
max
i=0,...,n;j=1,...,p
T Z |16 ·
|α̃j,i
j
q
E max ζi16 .
i
Similar to (C-72), we conclude that
E∆8C = O (polyLog(n))
and by Markov inequality, the assumption A5 is satisfied with high probability.
C-4
C-4.1
More Results of Least-Squares (Section 5)
The Relation Between Sj (X) and ∆C
In Section 5, we give a sufficient and almost necessary condition for the coordinatewise asymptotic normality of the least-square estimator β̂ LS ; see Theorem 5.1. In this
subsubsection, we show that ∆C is a generalization of maxj∈Jn Sj (X) for general Mestimators.
Consider the matrix (X T DX)−1 X T , where D is obtain by using general loss functions,
then by block matrix inversion formula (see Proposition E.1),
−1
X1T DX1 X1T DX[1]
X1T
eT1 (X T DX)−1 X T = eT1
T
T
T
X[1] DX1 X[1] DX[1]
X[1]
=
≈
T
T
X1T (I − DX[1] (X[1]
DX[1] )−1 X[1]
)
T DX )−1 X T D)X
X1T (D − DX[1] (X[1]
1
[1]
[1]
T
T
X1T (I − D[1] X[1] (X[1]
D[1] X[1] )−1 X[1]
)
T DX )−1 X T D)X
X1T (D − DX[1] (X[1]
1
[1]
[1]
where we use the approximation D ≈ D[1] . The same result holds for all j ∈ Jn , then
T
T
kX1T (I − D[1] X[1] (X[1]
D[1] X[1] )−1 X[1]
)k∞
keTj (X T DX)−1 X T k∞
≈
.
T
T
T
T
T
−1
T
−1
kej (X DX) X k2
kX1 (I − D[1] X[1] (X[1] D[1] X[1] ) X[1] )k2
T
T
Recall that hTj,1,i is i-th row of I − D[1] X[1] (X[1]
D[1] X[1] )−1 X[1]
, we have
max
i
|hTj,1,i X1 |
keTj (X T DX)−1 X T k∞
≈
.
khj,1,i k2
keTj (X T DX)−1 X T k2
The right-handed side equals to Sj (X) in the least-square case. Therefore, although of
complicated form, assumption A5 is not an artifact of the proof but is essential for the
asymptotic normality.
64
C-4.2
Additional Examples
Benefit from the analytical form of the least-square estimator, we can depart from subgaussinity of the entries. The following proposition shows that a random design matrix
Z with i.i.d. entries under appropriate moment conditions satisfies maxj∈Jn Sj (Z) = o(1)
with high probability. This implies that, when X is one realization of Z, the conditions
Theorem 5.1 are satisfied for X with high probability over Z.
Proposition C.6. If {Zij : i ≤ n, j ∈ Jn } are independent random variables with
1
1. maxi≤n,j∈Jn (E|Zij |8+δ ) 8+δ ≤ M for some δ, M > 0;
2. mini≤n,j∈Jn Var(Zij ) > τ 2 for some τ > 0
3. P (Z has full column rank) = 1 − o(1);
4. EZj ∈ span{Zj : j ∈ Jnc } almost surely for all j ∈ Jn ;
where Zj is the j-th column of Z. Then
max Sj (Z) = Op
j∈Jn
1
1
n4
= op (1).
A typical practically interesting example is that Z contains an intercept term, which is
not in Jn , and Zj has i.i.d. entries for j ∈ Jn with continuous distribution and sufficiently
many moments, in which case the first three conditions are easily checked and EZj is a
multiple of (1, . . . , 1), which belongs to span{Zj : j ∈ Jnc }.
In fact, the condition 4 allows Proposition C.6 to cover more general cases than the
above one. For example, in a census study, a state-specific fix effect might be added into
the model, i.e.
yi = αsi + ziT β ∗ + i
where si represents the state of subject i. In this case, Z contains a sub-block formed by
zi and a sub-block with ANOVA forms as mentioned in Example 1. The latter is usually
incorporated only for adjusting group bias and not the target of inference. Then condition
4 is satisfied if only Zij has same mean in each group for each j, i.e. EZij = µsi ,j .
Proof of Proposition C.6. By Sherman-Morison-Woodbury formula,
eTj (Z T Z)−1 Z T =
ZjT (I − Hj )
ZjT (I − Hj )Zj
T
T
where Hj = Z[j] (Z[j]
Z[j] )−1 Z[j]
is the projection matrix generated by Z[j] . Then
Sj (Z) =
keTj (Z T Z)−1 Z T k∞
kZjT (I − Hj )k∞
q
=
.
keTj (Z T Z)−1 Z T k2
ZjT (I − Hj )Zj
(C-79)
Similar to the proofs of other examples, the strategy is to show that the numerator, as a
linear contrast of Zj , and the denominator, as a quadratic form of Zj , are both concentrated around their means. Specifically, we will show that there exists some constants C1
and C2 such that
n
o
1
1
. (C-80)
max
sup
P kAZj k∞ > C1 n 4 + P ZjT AZj < C2 n = o
j∈Jn
n
n×n
2
A∈R
,A =A,
tr(A)=n−p+1
If (C-80) holds, since Hj is independent of Zj by assumptions, we have
T
kZ
(I
−
H
)k
1
1
C1
C1
j ∞
j
P Sj (Z) ≥ √
· n− 4 = P q
≥√
· n− 4
T
C2
C
2
Z (I − Hj )Zj
j
65
1
≤P k(I − Hj )Zj k∞ > C1 n 4 + P ZjT (I − Hj )Zj < C2 n
1
T
4
=E P k(I − Hj )Zj k∞ > C1 n
Z[j] + E P Zj (I − Hj )Zj < C2 n Z[j]
1
≤
sup
P kAZj k∞ > C1 n 4 + P ZjT AZj < C2 n
(C-81)
A∈Rn×n ,A2 =A,tr(A)=n−p+1
(
≤ max
j∈Jn
1
4
P kAZj k∞ > C1 n
sup
)
+P
A∈Rn×n ,A2 =A,tr(A)=n−p+1
ZjT AZj
< C2 n
=o
1
.
n
(C-82)
Thus with probability 1 − o(|Jn |/n) = 1 − o(1),
1
C1
· n− 4
max Sj (Z) ≤ √
j∈Jn
C2
and hence
max Sj (Z) = Op
j∈Jn
1
.
1
n4
Now we prove (C-80). The proof, although looks messy, is essentially the same as the
proof for other examples. Instead of relying on the exponential concentration given by
the sub-gaussianity, we show the concentration in terms of higher-order moments.
In fact, for any idempotent A, the sum square of each row is bounded by 1 since
X
A2ij = (A2 )j,j ≤ λmax (A2 ) = 1.
i
By Jensen’s inequality,
2
2
EZij
≤ (E|Zij |8+δ ) 8+δ .
For any j, by Rosenthal’s inequality (Rosenthal, 1970), there exists some universal constant C such that
!4+δ/2
8+δ
n
n
n
X
X
X
2
Aij Zij
≤C
|Aij |8+δ E|Zij |8+δ +
A2ij EZij
E
i=1
i=1
i=1
!4+δ/2
n
n
X
X
2
8+δ
2
2
≤C
|Aij | E|Zij |
+
Aij EZij
i=1
i=1
!4+δ/2
n
n
X
X
8+δ
2
2
≤ CM
Aij +
Aij
≤ 2CM 8+δ .
i=1
i=1
1
Let C1 = (2CM 8+δ ) 8+δ , then for given i, by Markov inequality,
!
n
X
1
1
P
Aij Zij > C1 n 4 ≤ 2+δ/4
n
i=1
and a union bound implies that
1
P kAZj k∞ > C1 n 4 ≤
1
n1+δ/4
1
=o
.
n
(C-83)
Now we derive a bound for ZjT AZj . Since p/n → κ ∈ (0, 1), there exists κ̃ ∈ (0, 1 − κ)
such that n − p > κ̃n. Then
EZjT AZj
=
n
X
2
Aii EZij
> τ 2 tr(A) = τ 2 (n − p + 1) > κ̃τ 2 n.
i=1
To bound the tail probability, we need the following result:
66
(C-84)
Lemma C.7 (Bai and Silverstein (2010), Lemma 6.2). Let B be an n × n nonrandom
matrix and W = (W1 , . . . , Wn )T be a random vector of independent entries. Assume that
EWi = 0, EWi2 = 1 and E|Wi |k ≤ νk . Then, for any q ≥ 1,
q
q
E|W T BW − tr(B)|q ≤ Cq (ν4 tr(BB T )) 2 + ν2q tr(BB T ) 2 ,
where Cq is a constant depending on q only.
It is easy to extend Lemma C.7 to non-isotropic case by rescaling. In fact, denote σi2
by the variance of Wi , and let Σ = diag(σ1 , . . . , σn ), Y = (W1 /σ1 , . . . , Wn /σn ). Then
1
1
W T BW = Y T Σ 2 BΣ 2 Y,
1
1
with Cov(Y ) = I. Let B̃ = Σ 2 BΣ 2 , then
1
1
1
1
B̃ B̃ T = Σ 2 BΣB T Σ 2 ν2 Σ 2 BB T Σ 2 .
This entails that
1
1
tr(B̃ B̃ T ) ≤ nu2 tr(Σ 2 BB T Σ 2 ) = ν2 tr(ΣBB T ) ≤ ν22 tr(BB T ).
On the other hand,
q2
1
q
q
q
q
1
tr(B̃ B̃ T ) 2 ≤ nλmax (B̃ B̃ T ) 2 = nν22 λmax Σ 2 BB T Σ 2
≤ nν2q λmax (BB T ) 2 .
Thus we obtain the following result
Lemma C.8. Let B be an n×n nonrandom matrix and W = (W1 , . . . , Wn )T be a random
vector of independent mean-zero entries. Suppose E|Wi |k ≤ νk , then for any q ≥ 1,
q
q
E|W T BW − EW T BW |q ≤ Cq ν2q (ν4 tr(BB T )) 2 + ν2q tr(BB T ) 2 ,
where Cq is a constant depending on q only.
Apply Lemma C.8 with W = Zj , B = A and q = 4 + δ/2, we obtain that
E|ZjT AZj − EZjT AZj |4+δ/2 ≤ CM 16+2δ (tr(AAT ))2+δ/4 + tr(AAT )2+δ/4
for some constant C. Since A is idempotent, all eigenvalues of A is either 1 or 0 and thus
AAT I. This implies that
tr(AAT ) ≤ n,
tr(AAT )2+δ/4 ≤ n
and hence
E|ZjT AZj − EZjT AZj |4+δ/2 ≤ 2CM 16+2δ n2+δ/4
for some constant C1 , which only depends on M . By Markov inequality,
P
|ZjT AZj − EZjT AZj | ≥
κ̃τ 2 n
2
≤ 2CM 16+2δ
2
κ̃τ 2
4+δ/2
·
1
n2+δ/4
.
Combining with (C-84), we conclude that
P ZjT AZj < C2 n = O
2
1
n2+δ/4
=o
1
n
(C-85)
where C2 = κ̃τ2 . Notice that both (C-83) and (C-85) do not depend on j and A. Therefore, (C-80) is proved and hence the Proposition.
67
D
Additional Numerical Experiments
In this section, we repeat the experiments in section 6 by using L1 loss, i.e. ρ(x) = |x|.
L1 -loss is not smooth and does not satisfy our technical conditions. The results are
displayed below. It is seen that the performance is quite similar to that with the huber
loss.
^
Coverage of β1 (κ = 0.5)
normal
^
Coverage of β1 (κ = 0.8)
t(2)
normal
1.00
●
●
●
●
●
●
0.95
0.90
1.00
1.00
●
●
●
●
●
●
●
●
0.90
1.00
0.95
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
100
200
ellip
0.95
Coverage
0.90
ellip
Coverage
●
iid
●
iid
0.95
t(2)
1.00
0.90
1.00
0.90
100
200
400
800
100
200
400
hadamard
hadamard
0.95
0.95
0.90
800
100
200
400
Sample Size
Entry Dist.
●
normal
t(2)
800
400
800
Sample Size
hadamard
Entry Dist.
●
normal
t(2)
hadamard
Figure 5: Empirical 95% coverage of β̂1 with κ = 0.5 (left) and κ = 0.8 (right) using
L1 loss. The x-axis corresponds to the sample size, ranging from 100 to 800; the y-axis
corresponds to the empirical 95% coverage. Each column represents an error distribution
and each row represents a type of design. The orange solid bar corresponds to the case
F = Normal; the blue dotted bar corresponds to the case F = t2 ; the red dashed bar
represents the Hadamard design.
68
^
^
Min. coverage of β1 ~ β10 (κ = 0.5)
normal
^
^
Min. coverage of β1 ~ β10 (κ = 0.8)
t(2)
normal
0.95
0.90
t(2)
0.95
●
●
●
●
●
●
●
●
0.90
●
●
●
●
●
●
●
●
0.80
0.95
●
0.90
●
●
●
●
●
ellip
●
●
Coverage
0.95
●
ellip
Coverage
iid
0.80
0.95
0.90
●
●
iid
0.80
●
●
●
●
●
0.80
0.95
0.80
100
200
400
800
100
200
400
hadamard
hadamard
0.90
0.90
0.80
800
100
200
400
Sample Size
Entry Dist.
●
normal
800
100
200
400
800
Sample Size
t(2)
hadamard
Entry Dist.
●
normal
t(2)
hadamard
Figure 6: Mininum empirical 95% coverage of β̂1 ∼ β̂10 with κ = 0.5 (left) and κ = 0.8
(right) using L1 loss. The x-axis corresponds to the sample size, ranging from 100 to 800;
the y-axis corresponds to the minimum empirical 95% coverage. Each column represents
an error distribution and each row represents a type of design. The orange solid bar
corresponds to the case F = Normal; the blue dotted bar corresponds to the case F = t2 ;
the red dashed bar represents the Hadamard design.
^
^
Bonf. coverage of β1 ~ β10 (κ = 0.5)
normal
^
^
Bonf. coverage of β1 ~ β10 (κ = 0.8)
t(2)
normal
1.00
●
●
●
●
●
●
●
●
●
●
●
●
●
●
iid
0.95
iid
0.95
●
0.90
0.90
1.00
●
●
●
●
●
●
●
●
●
●
●
●
●
0.95
●
●
0.90
0.90
1.00
1.00
hadamard
hadamard
0.95
●
ellip
ellip
0.95
Coverage
1.00
Coverage
t(2)
1.00
●
0.95
0.90
0.90
100
200
400
800
100
200
400
800
100
200
400
Sample Size
Entry Dist.
●
normal
t(2)
800
100
200
400
800
Sample Size
hadamard
Entry Dist.
●
normal
t(2)
hadamard
Figure 7: Empirical 95% coverage of β̂1 ∼ β̂10 after Bonferroni correction with κ = 0.5
(left) and κ = 0.8 (right) using L1 loss. The x-axis corresponds to the sample size,
ranging from 100 to 800; the y-axis corresponds to the empirical uniform 95% coverage
after Bonferroni correction. Each column represents an error distribution and each row
represents a type of design. The orange solid bar corresponds to the case F = Normal;
the blue dotted bar corresponds to the case F = t2 ; the red dashed bar represents the
Hadamard design.
69
E
Miscellaneous
In this appendix we state several technical results for the sake of completeness.
Proposition E.1 (Horn & Johnson, 2012, formula (0.8.5.6)). Let A ∈ Rp×p be an invertible matrix and write A as a block matrix
A11 A12
A=
A21 A22
with A11 ∈ Rp1 ×p1 , A22 ∈ R(p−p1 )×(p−p1 ) being invertible matrices. Then
−1
−1
A11 + A−1
A21 A−1
−A−1
11 A12 S
11
11 A12 S
A−1 =
−S −1 A21 A−1
S −1
11
where S = A22 − A21 A−1
11 A12 is the Schur’s complement.
Proposition E.2 (Rudelson & Vershynin, 2013; improved version of the original form
by Hanson & Wright, 1971). Let X = (X1 , . . . , Xn ) ∈ Rn be a random vector with
independent mean-zero σ 2 -sub-gaussian components Xi . Then, for every t,
t
t2
,
P |X T AX − EX T AX| > t ≤ 2 exp −c min
σ 4 kAk2F σ 2 kAkop
Proposition E.3 (Bai & Yin, 1993). If {Zij : i = 1, . . . , n, j = 1, . . . , p} are i.i.d. random
variables with zero mean, unit variance and finite fourth moment and p/n → κ, then
T
T
√ 2
√
Z Z a.s.
Z Z a.s.
→ (1 + κ) , λmin
→ (1 − κ)2 .
λmax
n
n
Proposition E.4 (Latala, 2005). Suppose {Zij : i = 1, . . . , n, j = 1, . . . , p} are independent mean-zero random variables with finite fourth moment, then
sX
sX
sX
q
2 + max
2 +
4
E λmax (Z T Z) ≤ C max
EZij
EZij
EZij
4
i
j
j
i
i,j
4
for some universal constant C. In particular, if EZij
are uniformly bounded, then
λmax
ZT Z
n
r
p
= Op 1 +
.
n
Proposition E.5 (Rudelson & Vershynin, 2010). Suppose {Zij : i = 1, . . . , n, j =
1, . . . , p} are independent mean-zero σ 2 -sub-gaussian random variables. Then there exists
a universal constant C1 , C2 > 0 such that
s
r
T
!
2
Z Z
p
P
λmax
> Cσ 1 +
+t
≤ 2e−C2 nt .
n
n
Proposition E.6 (Rudelson & Vershynin, 2009). Suppose {Zij : i = 1, . . . , n, j =
1, . . . , p} are i.i.d. σ 2 -sub-gaussian random variables with zero mean and unit variance,
then for ≥ 0
s
!
r
T
Z Z
p−1
≤ (1 −
) ≤ (C)n−p+1 + e−cn
P
λmin
n
n
for some universal constants C and c.
70
Proposition E.7 (Litvak et al., 2005). Suppose {Zij : i = 1, . . . , n, j = 1, . . . , p} are
independent σ 2 -sub-gaussian random variables such that
d
Zij = −Zij ,
Var(Zij ) > τ 2
for some σ, τ > 0, and p/n → κ ∈ (0, 1), then there exists constants c1 , c2 > 0, which
only depends on σ and τ , such that
T
Z Z
< c1 ≤ e−c2 n .
P λmin
n
71
| 10math.ST
|
arXiv:1610.03046v4 [math.GT] 16 Dec 2017
The classification of Kleinian groups of
Hausdorff dimensions at most one
Yong Hou∗
Institute for Advanced Study
Princeton University
Abstract
In this paper we provide the complete classification of Kleinian
group of Hausdorff dimensions less than 1. In particular, we prove
that every purely loxodromic Kleinian groups of Hausdorff dimension
< 1 is a classical Schottky group. This upper bound is sharp. As an
application, the result of [4] then implies that every closed Riemann
surface is uniformizable by a classical Schottky group. The proof relies
on the result of Hou [6], and space of rectifiable Γ-invariant closed
curves.
1
Introduction and Main Theorem
We take Kleinian groups to be finitely generated, torsion-free, discrete subgroups of PSL(2, C). The main theorem is:
Theorem 1.1 (Classification). Any purely loxodromic Kleinian group Γ with
limit set of Hausdorff dimension < 1 is a classical Schottky group. This bound
is sharp.
∗
Supported by Ambrose Monell Fundation
1
We note that by Selberg lemma, torsion-free is not really a restriction,
since any finitely generated discrete subgroup of PSL(2, C) has a finite index
torsion-free subgroup.
As an application, we have the following Corollary 1.3, which is a resolution of a folklore problem of Bers on classical Schottky group uniformization
of closed Riemann surface. Corollary 1.3 follows from the work of Hou [4]:
Theorem 1.2 (Hou [4]). Every closed Riemann surface is uniformizable by a
Schottky group of Hausdorff dimension < 1, i.e. every point in moduli space
has a Hausdorff dimension < 1 fiber in the Schottky space.
Corollary 1.3. (Uniformization) Every closed Riemann surface can be uniformized by a classical Schottky group.
1.1
Strategy of proof
First let us recall the result of Hou [6]:
Theorem 1.4 (Hou). There exists λ > 0 such that any Kleinian group with
limit set of Hausdorff dimension < λ is a classical Schottky group
Define Hc = sup{λ|satisfies Theorem 1.4}. Hc is the maximal parameter
such that if Γ is a Schottky group of Hausdorff dimension < Hc then Γ is
classical Schottky group. Hence Theorem 1.1 can be rephrased as: Hc ≥ 1.
We prove by contradiction, so from now on and throughout the paper we
assume that Hc < 1, then we will show that Hc is not maximal.
Recall that the Hausdorff dimension function on the Schottky space of
c
rank g is real analytic. It is a consequence of Theorem 1.4 that, JH
g (rankg Schottky groups of Hausdorff dimension < Hc , see Section 2) is a 3g −
3 dimensional open and connected submanifold of Jg , the rank-g Schottky
space.
c
The proof is done as follows. First we note that, ∂JH
must contain a
g
non-classical Schottky group, otherwise Hc is not maximal by definition, see
Proposition 2.12. Second we show that, if Hc < 1 then every element of the
c
boundary ∂JH
g is either a classical schottky group or, it is not a Schottky
group, Lemma 3.11. This contradicts the first fact, hence we must have
Hc ≥ 1. The bulk of the paper is devoted to proof the second fact, which we
now summarize the idea in the following.
It is a result of Bowen [2] that, a Schottky group Γ has Hausdorff dimension < 1, if and only if there exist a rectifiable Γ-invariant closed curve. Let
2
R(S 1 , W ) be the space of bounded length closed curves which intersects the
compact set W ⊂ C and equipped with Fréchet metric. It is complete space,
see Section 2. We show that if Hc < 1 then, every quasi-circle with bounded
length of Γ is the limit of a sequence of quasi-circles of Γn in R(S 1 , W ).
We also show that if Γ is a Schottky group, then every quasi-circle of Γ has
an open neighborhood in the relative topology of ΨΓ (see section 3) such
that, every element of the open neighborhood is a quasi-circle of Γ. We also
define linearity and transversality invariant for quasi-circles, and show that
quasi-circles of classical Schottky groups preserve these invariants, and nonclassical Schottky groups do not have transverse linear quasi-circles.
Given a quasi-circle of a Schottky group Γ, we show that there exists
an open neighborhood (in the relative topology of space of rectifiable curves
with respect to Frechet metric) about the quasi-circle such that, every point
in the open neighborhood is a quasi-circle of Γ, see Lemma 3.9. Next assume that we have a sequence of classical Schottky groups Γn → Γ to a
Schottky group, and are all of Hasudorff dimensions less than one. We
then study singularity formations of classical fundamental domains of Γn
when Γn → Γ. These singularities are of three types: tangent, degenerate,
and collapsing. We show that all these singularities will imply that there
exists a quasi-circle such that, every open neighborhood about this quasicircle will contain some points which is not a quasi-circle. Essentially, the
existence of a singularity will be obstruction to the existence of any open
neighborhood that are of quasi-circles, see Lemma 3.11. Hence it follows
from these results that, if Γn → Γ with Γn classical and, all Hausdorff dimensions are of less than one then Γ must be a classical Schottky group.
Acknowledgement
This work is made possible by unwavering supports and insightful conversations from Peter Sarnak, whom I’m greatly indebted to. It is the groundbreaking works of Peter Sarnak that has guided the author to study this
problem at first place. I wish to express my deepest gratitude and sincere
appreciation to Dave Gabai for the continuous of amazing supports and encouragements which allowed me to complete this work.
I want to express my sincere appreciation to the referee for detailed reading and, helpful comments and suggestions. I also want express sincere appreciation to Ian Agol, Matthew de Courcy-Irland, for reading of the previous
draft.
This paper is dedicated to my father: ShuYing Hou.
3
2
Quasi-circles and generating Jordan curves
Schottky group Γ of rank g is defined as convex-cocompact discrete faithful
representation of the free group Fg in PSL(2, C). It follows that Γ is freely
generated by purely loxodromic elements {γi }g1 . This implies we can find
collection of open topological disks Di , Di+g , 1 ≤ i ≤ g of disjoint closure
D̄i ∩ D̄i+g = ∅ in the Riemann sphere ∂H3 = C with boundary curves ∂ D̄i =
ci , ∂ D̄i+g = ci+g . By definition ci , ci+g are closed Jordan curves in Riemann
sphere ∂H3 , such that γi (ci ) = ci+g and γi (Di ) ∩ Di+g = ∅. Whenever there
exists a set {γ1 , ..., γg } of generators with all {ci , ci+g }g1 as circles, then it is
called a classical Schottky group with {γ1 , ..., γg } classical generators.
Schottky space Jg is defined as space of all rank g Schottky groups up
to conjugacy by PSL(2, C). By normalization, we can chart Jg by 3g − 3
complex parameters. Hence Jg is 3g − 3 dimensional complex manifold. The
bihomolomorphic Auto(Jg ) group is Out(Fg ), which is isomorphic to quotient
of the handle-body group. Denote by Jg,o the set of all elements of Jg that
are classical Schottky groups. Note that Jg,o is open in Jg . On the other
hand it is nontrivial result due to Marden that Jg,o is non-dense subset of
Jg . However, it follows from Theorem 1.4, Jλg ⊂ Jg,o is 3g − 3 dimensional
open connected submanifold. Here Jλg denotes space of Schottky groups of
Hausdorff dimension < λ.
Some notations:
• Given Γ a Kleinian group, we denote by ΛΓ and ΩΓ and DΓ its limit set,
region of discontinuity, and Hausdorff dimension respectively throughout this paper.
• Given a fundamental domain F of Γ, we denote the orbit of F under
actions of Γ by FΓ . We also say FΓ is a classical fundamental domain
of classical Schottky group if ∂F are disjoint circles.
Definition 2.1 (Quasi-circles). Given a geometrically finite Kleinian group
Γ, a closed Γ-invariant Jordan curve that contains the limit set ΛΓ is called
quasi-circle of Γ.
Remark: From now on, we make the global assumption throughout this paper
that Hc < 1, and all Schottky groups are of Hausdorff dimension DΓ ≤ Hc ,
if not stated otherwise.
Next we give a construction of quasi-circles of Γ which is a generalization
of the construction by Bowen [2].
4
Let F be a fundamental domain of Γ, and {ci }2g
1 be the collection of
2g disjoint Jordan curves comprising ∂F. Let ζ denote collection of arcs
ζ = {ζi } connecting points pi ∈ ci , p0i ∈ ci+g for 1 ≤ i ≤ g, and arcs on
ci+g that connects pi+g to γi (pi ) and p0i+g ∈ ci+g to γi (p0i ). So ζ is a set of
g disjoint curves connecting disjoint points on collection of Jordan curves of
∂F (Figure 1 ).
Figure 1: Quasi-circle
ηΓ = ΛΓ ∪ ∪γ∈Γ γ(ζ) defines a Γ-invariant closed curve containing ΛΓ . ηΓ
defines a quasi-circle of Γ. Obviously there are infinitely many quasi-circles
and different ζ gives a different quasi-circles. Note that, the simply connected
regions C \ ηΓ gives the Bers simultaneous uniformization of Riemann surface
ΩΓ /Γ.
Definition 2.2 (Generating curve). Given a quasi-circle ηΓ of Γ. We say
a collection of disjoint curves ζ is a generating curve of ηΓ , if ηΓ can be
generated by ζ.
Note that the quasi-circles constructed in [2], which requires that pi+g is
a imagine of pi under element of γi , is a subset of the collection that we have
defined here. In fact, this generalization is also used for the construction of
quasi-circles of non-classical Schottky groups.
Proposition 2.3. Every quasi-circle ηΓ of Γ is generated by some generating
curves ζ.
Proof. Let ηΓ be a quasi-circle of Γ. Let F be a fundamental domain of Γ.
Set ξ = F ∩ ηΓ and ξ¯ = ∂F ∩ ηΓ . Then ξ, ξ¯ consists of collection of disjoint
5
curves which only intersects along ∂F. Hence we have, γ(ξ) ∩ γ 0 (ξ) = ∅ for
¯
γ, γ 0 ∈ Γ with γ 6= γ 0 . Since Γ(ξ)−Γ(ξ) = ΛΓ we have have ηΓ = ΛΓ ∪Γ(ξ ∪ ξ),
¯
hence ξ ∪ ξ is a generating curve of ηΓ .
Definition 2.4 (Linear quasi-circle). We call a quasi-circle ηΓ linear if,
ηΓ \ΛΓ consists of points, circular arcs or lines.
Note that, if ηΓ is linear then there exists FΓ such that, ηΓ ∩ FΓ and
ηΓ ∩ ∂FΓ are piece-wise circular arcs or lines.
We say an arc ζ ⊂ ηΓ ∩FΓ is orthogonal if the tangents at intersections on
∂FΓ are orthogonal with ∂FΓ , and an arc ξ ⊂ ηΓ ∩ ∂FΓ is parallel if ξ ⊂ ∂FΓ .
Definition 2.5 (Right-angled quasi-circle). Given a linear quasi-circle ηΓ of
Γ, if all linear arcs intersect at right-angle then we say ηΓ is right-angled
quasi-circle.
Definition 2.6 (Transverse quasi-circle). Given a quasi-circle ηΓ of Γ, we
say ηΓ is transverse quasi-circle if ηΓ intersects ∂FΓ orthogonally for some
FΓ and, ηΓ have no parallel arc. Otherwise, we say ηΓ is non-transverse.
Definition 2.7 (Parallel quasi-circle). Given a quasi-circle ηΓ of Γ, we say
ηΓ is parallel quasi-circle if there exists some arc η of ηΓ such that η ⊂ ∂FΓ
Proposition 2.8. Transverse quasi-circles always exists for a given Schottky
group Γ.
Proof. Let F be bounded by 2g distinct Jordan closed curves and take any
curve connecting pi ∈ ci , pi+g ∈ ci+g such that pi+g = γi (pi ) and pi+g ∈ ci+g =
γi (pi+g ) for 1 ≤ i ≤ g, that intersects ci , ci+g orthogonally.
It should be noted that a quasi-circle of Γ in general is not necessarily
rectifiable. For instance, if we take ζ to be some non-rectifiable generating
curves then, ηΓ will be non-rectifiable. Recall a curve is said to be rectifiable
if and only if the 1-dimensional Hausdorff measure of the curve is finite. This
is not the only obstruction to rectifiability, in fact we have the following result
of Bowen:
Theorem 2.9 ([2]). For a given Schottky group Γ, the Hausdorff dimension
of limit set is DΓ < 1, if and only if there exists a rectifiable quasi-circle for
Γ.
6
The proof of Theorem 2.9 relies on the fact that the Poincare series of Γ
converges if and only if DΓ < 1 [2].
Proposition 2.10. Let Γ be a Schottky group of DΓ < 1. Suppose a given
generating curve ζ is a rectifiable curve. Then ηΓ is a rectifiable quasi-circle
of Γ.
Proof. Let µ1 be the 1-dimensional Hausdorff measure. Since DΓ < 1, we
0
have µ1 (ΛΓ ) = 0. Let Γ = {γk }∞
k=1 , let γk denotes the derivative of γk . Then
we have,
1
µ (ηΓ ) =
∞
X
µ1 (γk (ζ))
k=1
1
µ (ζ)
∞
X
|γk0 (z)|,
z ∈ ζ.
k=1
Also since DΓ < 1 if and only if Poincare series satisfies
implies that ηΓ is rectifiable if and only if ζ rectifiable.
P∞
k=1
|γk0 | < ∞. This
Let W ⊂ C be a compact set. Denote the space of closed curves with
bounded length in C that intersect with W by:
R(S 1 , W ) ⊂ {h : S 1 → C|h(S 1 ) ∩ W 6= ∅,
h continuous rectifiable map}.
For h1 , h2 ∈ R(S 1 , W ) let `(h1 ), `(h2 ) be it’s respective arclength. The
Fréchet distance is defined as,
dF (h1 , h2 ) = inf{sup |h1 (σ1 ) − h2 (σ2 )|; σ1 , σ2 ∈ Homeo(S 1 )} + |`(h1 ) − `(h2 )|.
For a given compact W ⊂ C, the space of closed curves with bounded
length R(S 1 , W ) is a metric space with respect to dF . Two curves in φ, ψ ∈
R(S 1 , W ) are same if there exists parametrization σ such that ψ(σ) = φ and
`(φ) = `(ψ). The topology on R(S 1 , W ) is defined with respect to the metric
dF , see [1] p388. Let ξ be a generating curve for ηΓ . Fix a indexing of Γ, set
ξi = ∪i1 γj (ξ). Let σi be a parametrization of ξi such that σ = ∪i σi define a
parametrization of ηΓ . Then dF (ηΓ1 , ηΓ2 ) ≤ M (inf σ1 ,σ2 |ξ(σk1 ) − ζ(σk2 )| + |`(ξ) −
`(ζ)|) for some M, k. This implies continuity of ηΓ with respect to generating
curve ξ.
Proposition 2.11. For a given compact W ⊂ C, the space R(S 1 , W ) is
complete metric space with respect to dF .
7
Proof. Let {φi } ⊂ R(S 1 , W ) be a Cauchy sequence. φi are rectifiable curves
of bounded length and so there exists {σi } Lipschitz parameterizations with
bounded Lipschitz constants, such that {φi (σi (t))} are uniformly Lipschitz.
Then completeness follows from the fact that all curves of R(S 1 , W ) are
contained within some large compact subset of C.
Hc
c
Proposition 2.12. There exists a Γ ∈ JH
g in the closure of Jg , such that
Γ is not a classical Schottky group.
c
Proof. Suppose false, then every element Γ ∈ JH
g with Hausdorff dimension
≤ Hc is a classical Schottky group. Since the classical Schottky space Jg,o is
c
open in the Schottky space Jg , we have a open neighborhood U of JH
g in Jg
c
such that U ⊂ JH
g,o . By definition of Hc , it is maximal. Hence there are nonclassical Schottky groups of Hausdorff dimension arbitrarily close to Hc and
> Hc . Then there exists a sequence of non-classical Schottky groups {Γn }
of Hausdorff dimensions DΓn & Hc . Let Γ = limn Γn . Since by assumption,
all Schottky groups of Hausdorff dimension Hc is classical, we must have Γ
either it is not a Schottky group, or it is a classical Schottky group. This
implies that for large n we must have Γn ∈ U , which is a contradiction
to the sequence Γn been all non-classical Schottky groups, hence Hc is not
maximal.
Proposition 2.13. There exists a non-classical Schottky group Γ of DΓ =
Hc , and sequence of {Γn } classical Schottky groups such that DΓn < DΓ with
sup DΓn = DΓ .
Proof. It follows from that the Hausdorff dimension map D : Jg → (0, 2) is
real analytic map, and by Proposition 2.12, there exists a non-classical Γ with
c
DΓ = Hc . Theorem 1.4 implies JH
g is open submanifold of Jg,o , hence there
c
exists a sequence of classical Schottkys {Γn } ⊂ JH
g with DΓn → DΓ .
3
Schottky Space and rectifiable curves
Take {Γn } and Γ as given by Proposition 2.13. In particular, {Γn } is a sequence of classical Schottky groups such that Γn → Γ. Denote QC(C) space
of quasiconformal maps on C. It follows from quasiconformal deformation
theory of Schottky space, for Γc classical Schottky group of Hausdorff dimension < Hc we can write ,
Jg = {f ◦ γ ◦ f −1 ∈ PSL(2, C)|f ∈ QC(C), γ ∈ Γc }/PSL(2, C).
8
Remark: From now on throughout rest of the paper, we fix Γc to be a
classical Schottky group with Hausdorff dimension DΓc < Hc .
Notations: Set H to be the collection of all Schottky groups of Hausdorff
dimension < Hc .
Note that there exists a sequence of quasiconformal maps fn and f of C
such that, we can write Γn = fn (Γ) and Γ = f (Γc ). Here we write f (Γ) :=
{f ◦ g ◦ f −1 |g ∈ Γ} for a given Kleinian group Γ and quasiconformal map f.
Schottky space Jg can also be considered as subspace of C3g−3 . This provides Jg analytic structure as 3g − 3-dimensional complex analytic manifold.
Proposition 3.1. Let {Γn } be a sequence of Schottky groups with Γn → Γ
to a Schottky group Γ. Let F be a fundamental domain of Γ. There exists a
sequence of fundamental domain {Fn } of Γn such that Fn → F.
Proof. Let ∪2g
i=1 Ci = ∂F be the Jordan curves which is the boundary of F.
Set Cn = fn−1 (∪2g
i=1 Ci ). Then Cn is the boundary of a fundamental domain of
−1
fn (Γ). Hence we have a fundamental domain Fn of Γn defined by Cn with
Fn → F.
Lemma 3.2. Suppose fn → f and Γ = f (Γc ). Every quasi-circle with
bounded length of Γn = fn (Γc ) is in R(S 1 , W ) for some compact W.
Proof. Let ηn be a quasi-circle of Γn . Note ΛΓn ⊂ ηn . Since limit set ΛΓn →
ΛΓ , and limit set Λ(Γ) is compact, and ηn is rectifiable, we can find some
compact set W ⊃ ∪n ΛΓn ∪ ΛΓ .
Given {Γn } ⊂ H with Γn → Γ, let EΓn denote the collection of all bounded
dF
length quasi-circles of Γn . We define ΨΓ = ∪EΓn to be the closure of the
set of bounded length quasi-circles of Γn in R(S 1 , W ).
Proposition 3.3. The subspace ΨΓ is compact.
Proof. Curves in ΨΓ are bounded length and we have parametrization with
bounded Lipschitz constants. It follows from Ascoli-Arzela theorem we have
uniform convergence topology on ΨΓ . Since curves in R(S 1 , W ) are all contained in some large compact set of C, we have ΨΓ is closed and bounded,
hence compact.
9
We define O(η), open sets about η ∈ ΨΓ in relative topology given by
O(η) ∩ ΨΓ for some open set O(η) ⊂ R(S 1 , W ).
Let Γ be a Schottky group. Let F be a fundamental domain of Γ. For
O(ηΓ ) of ηΓ ∈ ΨΓ , and suppose every element is quasi-circle, and let ζξ
denote a generating curve of ξ ∈ O(ηΓ ) with respect to F. Then we have,
O(ζ) = ∪ξ∈O(ηΓ ) ζξ the collection of all generating curves of the open set
O(ηΓ ) gives a open set of generating curves of ηΓ . On set of collection of all
generating curves of elements of ΨΓ , we define the topology as ξηn → ξη , if
and only if ηn → η for ηn , η ∈ ΨΓ .
We will sometime denote by η∞ ∈ ∂ΨΓ a curve which is the limit of
rectifiable quasi-circles of {Γn }.
Proposition 3.4. Let {Γn } ⊂ H with Γn → Γ. Then every bounded length
quasi-circle ηΓ of Γ is in ΨΓ . In addition, if ηn are linear then ηΓ is linear
quasi-circles of Γ.
Proof. Let Γn = fn−1 (Γ). Note that since DΓn < Hc , we have DΓ ≤ Hc < 1.
Define ηn = fn−1 (ηΓ ), for all n. Then {ηn } is a sequence of Jordan closed
curves. It follows from Proposition 2.3, we have a generating curve ζ of ηΓ . So
ηΓ = ΛΓ ∪∪γ∈Γ γ(ζ), and we have ηn = fn−1 (ΛΓ )∪fn−1 (∪γ∈Γ γ(ζ)). Since ΛΓn =
fn−1 (ΛΓ ) and fn−1 (∪γ∈Γ γ(ζ)) = ∪γ∈Γ fn−1 γfn (fn−1 (ζ)) so its ∪γn ∈Γn γn (ζn ), where
ζn = fn−1 (ζ). Hence ζn is a generating curve of ηn which are quasi-circles of
Γn . Denote by ζΓ a generating curve for ηΓ . Since ζ is rectifiable curve,
modify ζn if necessary, we can assume {ζn } are rectifiable curves.
Let z ∈ ζn , since DΓn < Hc , we have the 1-dimension Hausdorff measure
1
µ (ηn ):
X
µ1 (ηn ) µ1 (ζn )
|γ 0 (z)| < ∞,
γ∈Γn
0
where γ is the derivative of γ. Hence {ηn } are rectifiable quasi-circles. It
follows that there exists c > 0 such that µ1 (ηn ) < cµ1 (ηΓ ) for large n, hence
{ηn } are bounded quasi-circles of R(S 1 , W ), and by Proposition 3.3, we have
ηn → ηΓ and ηΓ ∈ ΨΓ . Finally, if ηn are linear then ζn are linear and since
Mobius maps preserves linearity, we have ηΓ is linear.
Definition 3.5 (Good-sequences). For a given sequence {ηn } of quasi circles
of {Γn } ⊂ H with Γn → Γ, we say {ηn } is a good-sequence of quasi-circles
if, it is convergent sequence and η∞ is a quasi-circle of Γ. We also call {ηn }
(non)transverse good-sequence if all ηn are also (non)transverse.
10
Lemma 3.6 (Existence). Let {Γn } ⊂ H be a sequence of Schottky groups
with Γn → Γ. There exists a good-sequence {ηn } of quasi-circles of {Γn }. In
addition, if {ηn } is also (non)transverse then η∞ is (non)transverse.
Proof. Let fn be quasi-conformal maps such that Γn = fn (Γ). Let ηΓ be a
quasi-circle of Γ. Then ηn = fn (ηΓ ) is a good-sequence of quasi-circles. The
(non)transverse property obviously is preserved.
Corollary 3.7 (Linear-invariant). Let {ηn } be a good-sequence of linear
quasi-circles of {Γn } ⊂ H. η∞ is a linear quasi-circle of Γ.
Proof. Linearity is obviously preserved at η∞ .
Corollary 3.8 (Tranverse-invariant). Let {ηn } be a good-sequence of quasicircles of {Γn } ⊂ H. Then η∞ is a (non)transverse linear quasi-circle of Γ if
and only if {ηn } is a (non)transverse.
Proof.
Lemma 3.9 (Open). Let {Γn } ⊂ H. Let Γn → Γ be a Schottky group. Let
ηΓ be a quasi-circle of Γ. Then there exists a open neighboredood O(ηΓ ) of ηΓ
in ΨΓ such that every elements of O(ηΓ ) is a quasi-circle of Γ.
Proof. Let F be a fundamental domain of Γ. Let ξ be the generating curve of
ηΓ with respect to F. Let Fn be the fundamental domain of Γn with Fn → F.
By Proposition 3.4, we have ηn → ηΓ . Let U(ξn ) to be the open set about the
generating curve ξn of ηn , and set O(ξn ) = U(ξn ) ∩ ΨΓ . Then O(ξn ) is open
sets of generating curves in ΨΓ (Figure 2). Let O(ξn ) = fn (O(ξc )) for O(ξc ) a
open set of generating curves for ηΓc = fn−1 (ηn ). Since ηΓ is a quasi-circle, and
Fn → F, for large n we can choose sufficiently small neighborhood O0 (ξc )
such that f (O0 (ξc )) is a open neighborhood of generating curves of ηΓ . Let
ξn0 ∈ fn (O0 (ξc )) and ηn0 be generated by ξn0 . Assuming O0 (ξc ) is sufficiently
small neighborhood, we have length `(ηn0 ) < c`(ηΓ ) for some small c ≥ 1 for
0
large n and ηn0 generated by all ξn0 ∈ fn (O0 (ξc )). Since ηn → ηΓ , we have η∞
is quasi-circle of Γ with bounded length. This defines a open set which all
elements are quasi-circles in ΨΓ .
Corollary 3.10. Let {Γn } ⊂ H with Γn → Γ a Schottky group Γ. Let {ηn }
be a good-sequence of quasi-circles of {Γn }. Then there exists an open neighborhood O(η∞ ) of η∞ such that every element of O(η∞ ) is a quasi-circle of
Γ.
11
Figure 2: Open set of generating curves about ζ
Proof. Follows from Lemma 3.6 and Lemma 3.9.
Next we analyze the formations of singularities for a given sequence of
classical Schottky groups converging to a Schottky group. These types of
singularities has been studied in [5, 6].
Lemma 3.11 (Singularity). Let {Γn } ⊂ H with Γn → Γ a Schottky group.
Assume that Γ is non-classical Schottky group. Then there exists ηΓ such
that, every O(ηΓ ) contains a non-quasi-circle.
Here we say a closed curve is a non-quasi-circle, if it’s non-Jordan(contains
a singularity point), or it’s not Γ-invariant.
Proof. For each n, let Fn be a classical fundamental domain of Γn . Given a
sequence of classical fundamental domains {Fn } the convergence is consider
as follows: {∂Fn } is collection of 2g circles {ci,n }i=1,...,2g in the Riemann
sphere C, pass to a subsequence if necessary, then limn ci,n , is either a point
or a circle. We say {Fn } convergents to G, if G is a region that have boundary
consists of limn ci,n for each i, which necessarily is either a point or a circle.
Note that G is not necessarily a fundamental domain, nor it’s necessarily
connected.
Let lim Fn = G. By assumption that Γ is not a classical Schottky group,
we have G is not a classical fundamental domain of Γ. We have ∂G consists of
circles or points. However these circles may not be disjoint. More precisely,
we have the following possible degeneration of circles of ∂Fn which gives ∂G
of at least one of following singularities types:
• Tangency: Contains tangent circles.
12
• Degeneration: Contains a circles degenerates into a point.
• Collapsing: Contains two circles collapses into one circle. Here we have
two concentric circles centered at origin and rest circles squeezed in
between these two and these two collapse into a single circle in G.
Consider ∂G contains a tangency:
Let p be a tangency point. Let ηΓ be a quasi-circle of Γ which pass
through point p. Assume the Lemma is false, then all sufficiently small open
neighborhood O(ηΓ ) contains only quasi-circles of Γ. It follows from Proposition 3.2, we have a sequence with ηn → ηΓ . Let ξn be the generating curves
of ηn with respect to Fn . Define φn as follows. Note that ξn ∩ ∂Fn consists
of points or linear arcs. We define ζn be a generating curve with ζn ∩ ∂Fn
to consists of linear arcs, with one of its end point to be the point that converges into a tangency in ∂G. In addition we also require the arcs on ∂Fn
that with a end points which converges to tangency point be be connect by a
arc between the other end points. It is clear that every O(ηn ) ∩ Fn contains a
generating curve of this property. Let φn be the quasi-circle generated by ζn ,
and set φ = lim φn , then φ contains a loop singularity at a point of tangency
(Figure 3). Hence φ is non-quasi-circle of Γ. Since every O(ηΓ ) contains such
a φ we must have the lemma to be true for this type of singularity.
Figure 3: Tangency singularity
Consider ∂G contains a degeneration:
In this case, we must have any quasi-circle ηn pass through a degeneration
point. Note that we can’t have all circles degenerates into a single point.
There are two possibilities to have degenerate points. Case (A): two circles
merge into a single degenerate point p. Case (B): A circle degenerates into a
point on a circle.
13
Consider (A). In this case, any quasi-circles η∞ will have two possible
properties, either there is a point q on some circle of ∂G such that every
quasi-circle must pass through q, or two separate arcs of η∞ meet at p. The
second possibility implies there exists a loop singularity at p, hence η∞ can
not be a Jordan curve (Figure 4). Therefore we only have the first possibility
for η∞ . But it follows from Proposition 3.4, all rectifiable quasi-circles of
Γ is the limit of some sequence of quasi-circles of Γn , and hence all must
pass through q. However q is not a limit point, hence we can have some
quasi-circle not passing through q, a contradiction.
Figure 4: Degenerate singularities
Now consider (B). Here we can assume that there exists at least two circles
that do not degenerates into points. Otherwise, we will have the third type
(collapsing) singularity, which we will consider next. Having some circles
degenerates into a point on to a circle at p, we have a sequence of quasicircles ηn which passes through p. This is given by the generating curves that
have curves connecting the degenerating circle to point pn → p converging
to linear arc intersecting orthogonally at boundary. But any neighboring
quasi-circle of ηn will converges to a η∞ with a loop singularity at p, which
is not a Jordan curve (Figure 5).
Finally, we note that if we have a degeneration point p which is not a
limit point, then there exists a neighboring quasi-circle of ηΓ that misses the
point p. Hence any O(ηΓ ) will contains some curve which is the limit of a
sequence of quasi-circles that do not pass through the point. This gives a
non-quasi-circle in O(ηΓ ).
Consider ∂G contain collapsing:
Let C denote the collapsed circle. First suppose that there exists γ ∈ Γ
such that it has a fixed point not on C. Then there are infinitely many
elements with fixed points not on C. Let γn ∈ Γn with γn → γ. Since
14
Figure 5: Degenerate singularities
γn (Fn ) → γ(G) = γ(C), we must have γ(C) either identical or disjoint. Suppose that not all fixed points of elements of Γ is contained in C. Then we
have infinitely many fixed points not in C. Take three points a, b, c fixed
points of elements of Γ with a ∈ C and b, c 6∈ C. For sufficiently large n, we
must have some βn ∈ Γn such that a, b, c is contained in three distinct disk
of the complement of βn (Fn ). This follows from the fact that the orbit FΓn
of Fn will have images with disks converging to fixed points, and since they
are distinct fixed points, we must have some disks that only contain one of
the points only. Since βn (Fn ) → β(C), so converges to a circle. But a, b, c
are contained in distinct disks bounded by circles of ∂βn (Fn ) for all large n,
which implies a, b, c must lies on β(C). Hence β(C) ∩ C 6= ∅, but they are not
identical circles, which is a contradiction. Hence all fixed points of elements
of Γ are ⊂ C, which implies ΛΓ ⊂ C. Since Γ is Schottky group, we must have
Γ is Fuchsian group of second kind. By [3], Γ is classical Schottky group, a
contradiction.
4
Proof of Theorem 1.1
Proof. (Theorem 1.1)
We proof by contradiction. Suppose that Hc < 1.
First note that by Selberg Lemma we can just assume Kleinian group to
be torsion-free.
Now note that if a Kleinian group Γ of DΓ < 1 then it must be free.
To show this, assume otherwise. Since DΓ < 1 and Γ is purely loxodromic,
it is convex-cocompact of second-kind. There exists an imbedded surface
R = ΩΓ /Γ in H3 /Γ. If R is incompressible then, subgroup π1 (R) ⊂ Γ have
Dπ1 (R) = 1 which is contradiction. If R is compressible then, we can cut along
15
compression disks. We either end with incompressible surface as before or
after finitely many steps of cutting we obtain topological ball, which implies
H3 /Γ is handle-body, hence free.
Let {Γn } ⊂ H, and Γn → Γ, with Γ a Schottky group. It follows
from Lemma 3.9, that there exists an open set O(ηΓ ) such that every element is quasi-circle of Γ. Now if Γ is non-classical Schottky group then by
Lemma 3.11, we must have every open set contains some non-quasi-circle,
in-particular we must have O(ηΓ ) contain a non-quasi-circle. But this gives
a contradiction, hence we must have Γ is a classical Schottky group.
Finally, sharpness comes from the fact that, there exists Kleinian groups
which is not free of Hausdorff dimension equal to one. Hence we have our
result.
E-mail: [email protected]
References
[1] Choquet-Bruhat, Y. (2009). General relativity and the Einstein equations. Oxford university press.
[2] Bowen, R. (1979). Hausdorff dimension of quasi-circles. I.H.E.S. 50. p.
11-25.
[3] Button, J. All Fuchsian Schottky groups are classical Schottky groups.
Geometry&Topology Mono. Vol 1. p. 117-125.
[4] Hou, Y. (2016). On smooth moduli space of Riemann surfaces.
[5] Hou, Y. (2010). Kleinian groups of small Hausdorff dimension are classical Schottky groups. I. Geometry & Topology. 14. p 473-519
[6] Hou, Y. (2014). All finitely generated Kleinian groups of
small Hausdorff dimension are classical Schottky groups.
http://arxiv.org/abs/1307.2677
[7] Phillips, R., Sarnak, P. The Laplacian for domains in hyperbolic space
and limit sets of Kleinian groups. Acta Math., 155:173-241
16
| 4math.GR
|
arXiv:1508.06610v1 [cs.DS] 26 Aug 2015
Technische Universität München
Full-text and Keyword Indexes for String
Searching
by
Aleksander Cisłak
Master’s Thesis in Informatics
Department of Informatics
Technische Universität München
Full-text and Keyword Indexes for String Searching
Indizierung von Volltexten und Keywords für Textsuche
Author: Aleksander Cisłak ([email protected])
Supervisor: prof. Burkhard Rost
Advisors: prof. Szymon Grabowski; Tatyana Goldberg, MSc
Master’s Thesis in Informatics
Department of Informatics
August 2015
Declaration of Authorship
I, Aleksander Cisłak, confirm that this master’s thesis is my own work and I have documented all sources and material used.
Signed:
Date:
ii
Abstract
String searching consists in locating a substring in a longer text, and two strings can be
approximately equal (various similarity measures such as the Hamming distance exist).
Strings can be defined very broadly, and they usually contain natural language and
biological data (DNA, proteins), but they can also represent other kinds of data such as
music or images.
One solution to string searching is to use online algorithms which do not preprocess
the input text, however, this is often infeasible due to the massive sizes of modern data
sets. Alternatively, one can build an index, i.e. a data structure which aims to speed up
string matching queries. The indexes are divided into full-text ones which operate on
the whole input text and can answer arbitrary queries and keyword indexes which store
a dictionary of individual words. In this work, we present a literature review for both
index categories as well as our contributions (which are mostly practice-oriented).
The first contribution is the FM-bloated index, which is a modification of the well-known
FM-index (a compressed, full-text index) that trades space for speed. In our approach,
the count table and the occurrence lists store information about selected q-grams in
addition to the individual characters. Two variants are described, namely one using
O(n log2 n) bits of space with O(m + log m log log n) average query time, and one with
linear space and O(m log log n) average query time, where n is the input text length
and m is the pattern length. We experimentally show that a significant speedup can be
achieved by operating on q-grams (albeit at the cost of very high space requirements,
hence the name “bloated”).
In the category of keyword indexes we present the so-called split index, which can efficiently solve the k-mismatches problem, especially for 1 error. Our implementation in the
C++ language is focused mostly on data compaction, which is beneficial for the search
speed (by being cache friendly). We compare our solution with other algorithms and
we show that it is faster when the Hamming distance is used. Query times in the order
of 1 microsecond were reported for one mismatch for a few-megabyte natural language
dictionary on a medium-end PC.
A minor contribution includes string sketches which aim to speed up approximate string
comparison at the cost of additional space (O(1) per string). They can be used in
the context of keyword indexes in order to deduce that two strings differ by at least k
mismatches with the use of fast bitwise operations rather than an explicit verification.
Acknowledgements
I would like to thank prof. Szymon Grabowski for his constant support, advice, and
mentorship. He introduced me to the academia, and I would probably not pursue the
scientific path if it were not for him. His vast knowledge and ability to explain things
are simply unmatched.
I would like to thank prof. Burkhard Rost and Tatyana Goldberg for their helpful remarks
and guidance in the field of bioinformatics.
I would like to thank the whole “Gank Incoming” Dota 2 team; the whole Radogoszcz
football and airsoft pack; Ester Cłapińska, who keeps my ego in check; Łukasz Duda,
whose decorum is still spoiled; Edwin Fung, for not letting the corporate giant consume
him; Łukasz Fuchs, who still promises the movie; Florentyna Gust, who always supported
me in difficult times, for being a cat from Korea; Jacek Krasiukianis, for introducing me
to the realm of street fighter games; Rafał Madaj, for biking tours; Jakub Przybylski,
who recently switched focus from whisky to beer (while remaining faithful to the interdisciplinary field of malt engineering), for solving world problems together; and Wojciech
Terepeta, who put up with my face being his first sight in the morning.
I am indebted to Ozzy Osbourne, Frank Sinatra, and Roger Waters for making the world
slightly more interesting. I would like to thank the developers of the free yUML software
(http://yuml.me/) for making my life somewhat easier.
Many thanks also goes to my family as well as to all the giants who lent me their shoulders
for a while.
iv
Contents
Declaration of Authorship
ii
Abstract
iii
Acknowledgements
iv
Contents
v
1 Introduction
1.1 Applications . . . . . . . . . . . . .
1.1.1 Natural language . . . . . .
1.1.2 Bioinformatics . . . . . . .
1.1.3 Other . . . . . . . . . . . .
1.2 Preliminaries . . . . . . . . . . . .
1.2.1 Sorting . . . . . . . . . . .
1.2.2 Trees . . . . . . . . . . . . .
1.2.2.1 Binary search tree
1.2.2.2 Trie . . . . . . . .
1.2.3 Hashing . . . . . . . . . . .
1.2.4 Data structure comparison .
1.2.5 Compression . . . . . . . .
1.2.5.1 Entropy . . . . . .
1.2.6 Pigeonhole principle . . . .
1.3 Overview . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
1
2
3
4
5
6
7
8
8
9
11
11
12
13
13
2 String Searching
2.1 Problem classification
2.1.1 Error metrics .
2.2 Online searching . . .
2.2.1 Exact . . . . .
2.2.2 Approximate .
2.3 Offline searching . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
15
16
17
19
19
22
24
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3 Full-text Indexes
26
v
vi
Contents
3.1
3.2
3.3
Exact . . . . . . . . . . . . . . . . . . . . . .
3.1.1 Suffix tree . . . . . . . . . . . . . . . .
3.1.2 Suffix array . . . . . . . . . . . . . . .
3.1.2.1 Modifications . . . . . . . . .
3.1.3 Other suffix-based structures . . . . .
3.1.4 FM-index . . . . . . . . . . . . . . . .
3.1.4.1 Burrows–Wheeler Transform
3.1.4.2 Operation . . . . . . . . . . .
3.1.4.3 Efficiency . . . . . . . . . . .
3.1.5 FM-index flavors . . . . . . . . . . . .
3.1.5.1 Binary rank . . . . . . . . .
3.1.6 FM-bloated . . . . . . . . . . . . . . .
3.1.6.1 Superlinear space . . . . . .
3.1.6.2 Linear space . . . . . . . . .
Approximate . . . . . . . . . . . . . . . . . .
Word-based . . . . . . . . . . . . . . . . . . .
3.3.1 BLAST . . . . . . . . . . . . . . . . .
4 Keyword Indexes
4.1 Exact . . . . . . . . . . . . . . . . .
4.1.1 Bloom filter . . . . . . . . . .
4.1.2 Inverted index . . . . . . . .
4.2 Approximate . . . . . . . . . . . . .
4.2.1 The 1-error problem . . . . .
4.2.2 Permuterm index . . . . . . .
4.2.3 Split index . . . . . . . . . .
4.2.3.1 Complexity . . . . .
4.2.3.2 Compression . . . .
4.2.3.3 Parallelization . . .
4.2.3.4 Inverted split index
4.3 Keyword selection . . . . . . . . . .
4.3.1 Minimizers . . . . . . . . . .
4.4 String sketches . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
26
26
27
28
30
30
31
32
32
34
36
36
37
38
39
41
41
.
.
.
.
.
.
.
.
.
.
.
.
.
.
43
43
43
44
45
47
47
48
51
51
52
52
53
53
54
5 Experimental Results
56
5.1 FM-bloated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
5.2 Split index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.3 String sketches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
6 Conclusions
65
6.1 Future work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
A Data Sets
67
B Exact Matching Complexity
69
C Split Index Compression
71
Contents
vii
D String Sketches
73
E English Letter Frequency
74
F Hash Functions
75
Bibliography
76
List of Symbols
92
List of Abbreviations
94
List of Figures
94
List of Tables
97
“Why did the scarecrow win the Nobel Prize?
Because he was out standing in his field.”
Unknown
For everybody who have devoted their precious time to read this
work in its entirety
ix
Chapter 1
Introduction
The Bible, which consists of the Old and the New Testament, is composed of roughly 800
thousand words (in the English language version) [Bib]. Literary works of such stature
were often regarded as good candidates for creating concordances — listings of words
that originated from the specific work. Such collections usually included positions of
the words, which allowed the reader to learn about their frequency and context. Their
assembly was a non-trivial task that required a lot of effort. Under a rather favorable
assumption that a friar (today also referred to as a research assistant) would be able
to achieve a throughput of one word per minute, compilation (do not confuse with code
generation) for the Bible would require over thirteen thousand man-hours, or roughly one
and a half years of constant work. This naturally ignores additional efforts, for instance
printing and dissemination.
Such a listing is one of the earliest examples of a text-based data structure constructed
with the purpose of faster searches at the cost of space and preprocessing. Luckily, today
we are capable of building and using various structures in a much shorter time. With the
aid of silicone, electrons, and capable human minds, we have managed to decrease the
times from years to seconds (indexing) and from seconds to microseconds (searching).
1.1
Applications
String searching has always been ubiquitous in everyday life, most probably since the
very creation of the written word. In the modern world, we encounter text on a regular
basis — on paper, glass, rubber, human skin, metal, cement, and since the 20th century
also on electronic displays. We perform various text-based operations almost all the time,
often subconsciously. This happens in trivial situations such as looking for interesting
1
Introduction
2
news on a website on a slow Sunday afternoon, or trying to locate information in the bus
timetable on a cold Monday morning. Many familiar text-related tasks can be finished
faster thanks to computers, and powerful machines are also crucial to scientific research.
Specific areas are discussed in the following subsections.
1.1.1
Natural language
For years, the main application of computers to textual data was natural language (NL)
processing, which goes back to the work of Alan Turing in the 1950s [Tur50]. The goal was
to understand the meaning as well as the context in which the language was used. One of
the first programs that could actually comprehend and act upon English sentences was
Bobrow’s STUDENT (1967), which solved simple mathematical problems [RN10, p. 19].
The first application to text processing where string searching algorithms could really
shine was spell checking, i.e. determining whether a word is written in a correct form. It
consists in testing whether a word is present in a NL dictionary (a set of words). Such
a functionality is required since spelling errors appear relatively often due to a variety
of reasons, ranging from writer ignorance to typing and transmission errors. Research
in this area started around 1957, and the first spell checker available as an application
is believed to have appeared in 1971 [Pet80]. Today, spell checking is universal, and it
is performed by most programs which accept user input. This includes dedicated text
editors, programming tools, email clients, command-line interfaces, and web browsers.
More sophisticated approaches which try to take the context into account were also
described [CV81, Mit87], due to the fact that checking for dictionary membership is prone
to errors (e.g., mistyping “were” for “where”; Peterson [Pet86] reported that up to 16% of
errors might be undetected). Another familiar scenario is searching for words in a textual
document such as a book or an article, which allows for locating relevant fragments in a
much shorter time than by skimming through the text. Determining positions of certain
keywords in order to learn their context (neighboring words) may be also useful for
plagiarism detection (including the plagiarism of computer programs [PH89]).
With the use of approximate methods, similar words can be obtained from the NL dictionary and correct spelling can be suggested (spelling correction is usually coupled with
spell checking). This may also include proper nouns, for example in the case of shopping catalogs (relevant products) or geographic information systems (specific locations,
e.g., cities). Such techniques are also useful for optical character recognition (OCR)
where they serve as a verification mechanism [EL90]. Other applications are in security,
where it is desirable to check whether a password is not too close to a word from a dictionary [MW94a] and in data cleaning, which consists in detecting errors and duplication in
Introduction
3
data that is stored in the database [CGGM03]. String matching is also employed for preventing the registration of fraudulent websites having similar addresses, the phenomenon
known as “typosquatting” [ME10].
It may happen that the pattern that is searched for is not explicitly specified, as is the
case when we use a web search engine (i.e. we would like to find the entire website, but we
specify only a few keywords), which is an example of information retrieval. For instance,
index-based methods form an important component of the architecture of the Google
engine [BP98].
1.1.2
Bioinformatics
The biological data is commonly represented in a textual form, and for this reason it can
be searched just like any other text. Most popular representations include:
• DNA — the alphabet of four symbols corresponding to nucleobases: A, C, G, and
T. It can be extended with an additional character N, indicating that there might
be any nucleobase at a specified position. This is used, for instance, when the
sequencing method could not determine the nucleobase with a desired certainty.
Sometimes, additional information such as the quality of the read, i.e. the probability that a specific base was determined correctly, is also stored.
• RNA — four nucleobases: A, C, G, and U. Similarly to the DNA, additional information may be present.
• Proteins — 20 symbols corresponding to different amino acids (uppercase letters
from the English alphabet), with 2 additional symbols for amino acids occurring
only in some species (O and U), and 4 placeholders (B, J, X, Z) for situations where
the amino acid is ambiguous. All 26 letters from the English alphabet are used.
Computational information was an integral part of the field of bioinformatics from the
very beginning, and at the end of the 1970s there was a substantial activity in the
development of string (sequence) alignment algorithms (e.g., for RNA structure prediction) [OV03]. Alignment methods allow for finding evolutionary relationships between
genes and proteins and thus construct phylogenetic trees. Sequence similarity in proteins
is important because it may imply structural as well as functional similarity. Researchers
use tools such as BLAST [AGM+ 90], which try to match the string in question with similar ones from the database (of proteins or genomes). Approximate methods play an
Introduction
4
important role here, because related sequences often differ from one another due to mutations in the genetic material. These include point mutations, that is changes at a single
position, as well as insertions and deletions (usually called indels).
Another research area that would not thrive without computers is genome sequencing.
This is caused by the fact that sequencing methods cannot read the whole genome, but
rather they produce hundreds of gigabytes of strings (DNA reads, whose typical length
is from tens to a thousand base pairs [LLL+ 12]) whose exact positions in the genome
are not known. Moreover, the reads often contain mistakes due to the imperfection
of the sequencing itself. The goal of the computers is to calculate the correct order
using complicated statistical and string-based tools, with or without a reference genome
(the latter being called de novo sequencing). This process is well illustrated by its
name — shotgun sequencing, and it can be likened to shredding a piece of paper and
reconstructing the pieces. String searching is crucial here because it allows for finding
repeated occurrences of certain patterns [LTP+ 09, SD10].
1.1.3
Other
Other data can be also represented and manipulated in a textual form. This includes music, where we would like to locate a specific melody, especially using approximate methods
which account for slight variations or imperfections (e.g., singing out of pitch) [Gra11,
p. 77]. Another field where approximate methods play a crucial role is signal processing,
especially in the case of audio signals, which can be processed by speech recognition
algorithms. Such a functionality is becoming more and more popular nowadays, due
to the evolution of multimedia databases containing audiovisual data [Nav01]. String
algorithms can be also used in intrusion detection systems, where their goal is to identify
malicious activities by matching data such as system state graphs, instruction sequences,
or packets with those from the database [KS94, TSCV04]. String searching can be also
applied for the detection of arbitrary two-dimensional shapes in images [BB93], and yet
another application is in compression algorithms, where it is desirable to find repetitive
patterns in a similar way to sequence searching in biological data. Due to the fact that
almost any data can be represented in a textual form many other application areas exist,
see, e.g., Navarro [Nav01] for more information.
This diversity of data causes the string algorithms to be used in very different scenarios.
The pattern size can vary from a few letters (NL words) to a few hundred (DNA reads),
and the input text can be of almost arbitrary size. For instance, Google reported in 2015
that their web search index has reached over 100 thousand terabytes (1017 bytes) [goo].
Massive data is also present in bioinformatics, where the size of the genome of a single
Introduction
5
organism is often measured in gigabytes; one of the largest animal genomes belong to the
lungfish and the salamander, each occupying approximately 120 Gbp [Gre02] (i.e. roughly
28 GB, assuming that each base is coded with 2 bits). As regards proteins, the UniProt
protein database stores approximately 50 million sequences (each composed of roughly
a few hundred symbols) in 2015 and continues to grow exponentially [uni]. It was remarked recently that biological textual databases grow more quickly than the ability to
understand them [BC15].
When it comes to data of such magnitude, it is feasible only to perform an index-based
search (meaning that the data is preprocessed), which is the main focus of this thesis. It
seems most likely that the data sizes will continue to grow, and for this reason there is
a clear need for the development of algorithms which are efficient in practice.
1.2
Preliminaries
This section presents an overview of data structures and algorithms which act as building
blocks for the ones presented later, and it introduces the necessary terminology. String
searching, which is the main topic of this thesis, is described in the following chapter.
Throughout this thesis, data structures are usually approached from two angles: theoretical, which concentrates on the worst-case space and query time, and a practical one. The
latter focuses on performance in real-world scenarios, and it is often heuristically oriented
and focused on cache utilization and reducing slow RAM access. It is worth noting that
state-of-the-art theoretical algorithms sometimes perform very poor in practice because
of certain constant factors which are ignored in the analysis. Moreover, they might not
be even tested or implemented at all. On the other hand, a practical evaluation depends
heavily on the hardware (peculiarities of the CPU cache, instruction prefetching, etc),
properties of the data sets used as input, and most importantly on the implementation.
Moffat and Gog [MG14] provided an extensive analysis of experimentation in the field
of string searching, and they pointed out various caveats. These include for instance a
bias towards certain repetitive patterns when the patterns are randomly sampled from
the input text, or the advantage of smaller data sets which increase the probability that
(at least some of) the data would fit into the cache.
The theoretical analysis of the algorithms is based on the big O family of asymptotic notations, including O, Ω, Θ, and the relevant lower case counterparts (we assume that the
reader is familiar with these tools and with complexity classes). Unless stated otherwise,
the complexity analysis refers to the worst-case scenario, and all logarithms are assumed
Introduction
6
to be base 2 (this might be also stated explicitly as log2 ). When we state that the complexity or the average or the worst case is equal to some value, we mean the running
time of the algorithm. On the other hand, if the time or space is explicitly mentioned,
the word “complexity” might be omitted. Array, string, and vector indexes are always 0based and they are assumed to be contiguous, and collection indexes are 1-based (e.g., a
collection of strings s1 , . . . , sn ). We consider a standard hierarchical memory model with
RAM and a faster CPU cache, and we take for granted that the data always fits into the
main memory, i.e. disk input/output (I/O) is ignored. Moreover, we assume that the size
of the data does not exceed 232 bytes, which means that it is sufficient for each pointer
or counter to occupy 32 bits (4 bytes). Sizes that are given in kilobytes and megabytes
are indicated with abbreviations KB and MB, which refer to standard computer science
quantities, i.e. 210 (rather than 1,000) and 220 .
1.2.1
Sorting
Sorting consists in ordering n elements from a given set S in such a way that the following
holds: ∀i ∈ [0, n − 1) : S[i] 6 S[i + 1], that is the smallest element is always in front.
In reverse sorting, the highest element is in front, and the inequality sign is reversed.
Popular sorting methods include the heapsort and the mergesort with O(n log n) worstcase time guarantees. Another well-known algorithm is the quicksort with average time
O(n log n) (although the worst case is equal to O(n2 )), which is known to be 2–3 times
faster in practice than both heapsort and mergesort [Ski98]. There also exist algorithms
linear in n which can be used in certain scenarios, for instance the radix sort for integers
with time complexity O(wn) (or O(n(w/ log n)) for a byte-wide radix), where w is the
machine word size.
When it comes to sorting n strings of average length m, a comparison sorting method
would take O(n log nm) time (assuming that comparing two strings is linear in time).
Alternatively, we could obtain an O(nm) time bound by sorting each letter column with
a sorting method which is linear for a fixed alphabet (essentially performing a radix
sort), e.g., using a counting sort. Moreover, we can even achieve an O(n) complexity by
building a trie with lexicographically ordered children at each level and performing a preorder, depth-first search (DFS) (see the following subsections for details). When it comes
to suffix sorting (i.e. sorting all suffixes of the input text), dedicated methods which do
not have a linear time guarantee are often used due to reduced space requirements or
good practical performance [MF04, PST07]. Recently, linear methods which are efficient
in practice have also been described [Non13].
Introduction
1.2.2
7
Trees
A tree contains multiple nodes that are connected with each other, with one (top-most)
node designated as the root. Every node contains zero or more children, and a tree is an
undirected graph where any two vertexes are connected by exactly one path (there are no
cycles). Further terminology which is relevant to trees is as follows [CLRS09, Sec. B.5]:
• A parent is a neighbor of a child and it is located closer to the root (and vice
versa).
• A sibling is a node which shares the same parent.
• Leaves are the nodes without children and in the graphical representation they
are always shown at the bottom of the diagram. The leaves are also called external
nodes, and internal nodes are all nodes other than leaves.
• Descendants are the nodes located anywhere in the subtree rooted by the current
node, and ancestors are the nodes anywhere on the path from the root (inclusive)
to the current node. Proper descendants and ancestors exclude the current node.
If n1 is an ancestor of n2 , then n2 is a descendant of n1 , and vice versa.
• The depth of a node is the length of the path from this node to the root.
• The height of a tree is the longest path from the root to any leaf (i.e. the depth
of the deepest node).
The maximum number of children can be limited for each node. Many structures are
binary trees, which means that every node has at most two children, and a generic term
is a k-ary tree (or multiary for k > 2). A full (complete) k-ary tree is a structure where
every node has exactly 0 (in the case of leaves) or k (in the case of internal nodes)
children. A perfect tree is a tree where all leaves have the same depth. A historical note:
apparently, a binary tree used to be called a bifurcating arborescence in the early years
of computer science [Knu97, p. 363]. A balanced (height-balanced, self-balancing) tree
is a tree whose height is maintained with respect to its total size irrespective of possible
updates and deletions. The height of a balanced binary tree is logarithmic, i.e. O(log n)
(logk n for a k-ary tree). It is often desirable to maintain such a balance because otherwise
a tree may lose its properties (e.g., worst-case search complexity). This is caused by the
fact that the time complexity of various algorithms is proportional to the height of the
tree.
There exist many kinds of trees, and they are characterized by some additional properties
which make them useful for a certain purpose.
8
Introduction
1.2.2.1
Binary search tree
The binary search tree (BST) is used for determining a membership in the set or for
storing key-value pairs. Every node stores one value V ; the value of its right child is
always bigger than V , and the value of its left child is always smaller than V . The lookup
operation consists in traversing the tree towards the leaves until either the value is found
or there are no more nodes to process, which indicates that the value is not present. The
BST is often used to maintain a collection of numbers, however, the values can also be
strings (they are ordered alphabetically), see Figure 1.1. It is crucial that the BST is
balanced. Otherwise, in the scenario where every node had exactly one child, its height
would be linear (basically forming a linked list) and thus the complexity for the traversal
would degrade from O(log n) to O(n). The occupied space is clearly linear (there is one
node per value) and the preprocessing takes O(n log n) time because each insertion costs
O(log n).
Karen
Alan
Bob
Tom
Erin
Sasha
Zelda
Figure 1.1: A binary search tree (BST) storing strings from the English alphabet.
The value of the right child is always bigger than the value of the parent, and the value
of the left child is always smaller than the value of the parent.
1.2.2.2
Trie
The trie (digital tree) [Fre60] is a tree in which the position of a node (more specifically, a
path from the root to the node) describes the associated value, see Figure 1.2. The nodes
often store IDs or flags which indicate whether a given node has a word, which is required
because some nodes may be only intermediary and not associated with any value. The
values are often strings, and the paths may correspond to the prefixes of the input text. A
trie supports basic operations such as searching, insertion, and deletion. For the lookup,
we check whether each consecutive character from the query is present in the trie while
moving towards the leaves, hence the search complexity is directly proportional to the
length of the pattern. In order to build a trie, we have to perform a full lookup for each
9
Introduction
word, thus the preprocessing complexity is equal to O(n) for words of total length n.
The space is linear because there is at most one node per input character.
t
t
A (5)
e
o
te
n
ten (1)
e
tea (2)
A
i
i
n
to (4)
d
in (6)
n
ted (3)
inn (7)
Figure 1.2: A trie, which is one of the basic structures used in string searching, constructed for strings from the set {A, in, inn, tea, ted, ten, to}. Each edge corresponds
to one character, and the strings are stored implicitly (here shown for clarity). Additional information such as IDs (here shown inside the parentheses) is sometimes kept
in the nodes.
Various modifications of the regular trie exist — an example could be the Patricia
trie [Mor68], whose aim is to reduce the occupied space. The idea is to merge every
node which has no siblings with its parent, thus reducing the total number of nodes,
and resulting edge labels include the characters from all edges that were merged (the
complexities are unchanged).
1.2.3
Hashing
A hash function H transforms data of arbitrary size into the data of fixed size. Typical
output sizes include 64, 128, 256, and 512 bits. The input can be in principle of any
type, although hash functions are usually designed so that they work well for a particular
kind of data, e.g., for strings or for integers. Hash functions often have certain desirable
properties such as a limited number of collisions, where for two chunks of data d1 and d2 ,
the probability that H(d1 ) = H(d2 ) should be relatively low (e.g., H is called universal
if P r(H(d1 ) = H(d2 )) 6 1/n for an n-element hash table [CW77]). There exists a group
of cryptographic hash functions, which offer certain guarantees regarding the number
of collisions. They also provide non-reversibility, which means that it is hard (in the
Introduction
10
mathematical sense, for example the problem may be NP-hard) to deduce the value of
the input string from the hash value. Such properties are provided at the price of reduced
speed, and for this reason cryptographic hash functions are usually not used for string
matching.
A perfect hash function guarantees no collisions, e.g., the two-level FKS scheme with O(n)
space [FKS84]. All keys have to be usually known beforehand, although dynamic perfect
hashing was also considered [DKM+ 94]. A minimal perfect hash function (MPHF)
uses every bucket in the hash table, i.e. there is one value per bucket (the lower space
bound for describing an MPHF is equal to roughly 1.44n bits for n elements [BBD09]).
The complexity of a hash function is usually linear in the input length, although it is
sometimes assumed that it takes constant time.
A hash function is an integral part of a hash table HT , which is a data structure that
associates the values with buckets based on the key, i.e. the hash of the value. This can
be represented with the following relation: HT [H(v)] = v for any value v. Hash tables
are often used in string searching because they allow for quick membership queries, see
Figure 1.3. The size of the hash table is usually much smaller than the number of
all possible hash values, and it is often the case that a collision occurs (the same key
is produced for two different values). There exist various methods of resolving such
collisions, and the most popular ones are as follows:
• Chaining — each bucket holds a list of all values which hashed to this bucket.
• Probing — if a collision occurs, the value is inserted into the next unoccupied
bucket. This may be linear probing, where the consecutive buckets are scanned
linearly until an empty bucket is found, or quadratic probing, where the gaps
between consecutive buckets are formed by the results of a quadratic polynomial.
• Double hashing — gaps between consecutive buckets are determined by another
hash function. A simple approach could be for instance to locate the next bucket
index i using the formula i = H1 (v)+iH2 (v) mod |HT | for any two hash functions
H1 and H2 .
In order to resolve the collisions, the keys have to be usually stored as well. The techniques which try to locate an empty bucket (as opposed to chaining) are referred to as
open addressing. A key characteristic of the hash table is its load factor (LF), which
is defined as the number of entries divided by the number of buckets. Let us note that
0 6 LF 6 1.0 for open addressing (the performance degrades rapidly as LF → 1.0),
however, in the case of chaining it holds that 0 6 LF 6 n for n entries.
11
Introduction
keys
hash
function
buckets
00
John Smith
Lisa Smith
Sandra Dee
01
521-8976
02
521-1234
03
:
:
13
14
521-9655
15
Figure 1.3: A hash table for strings; reproduced from Wikimedia Commons1 .
1.2.4
Data structure comparison
In the previous subsections, we introduced data structures which are used by more sophisticated algorithms (described in the following chapters). Still, they can be also used
on their own for exact string searching. In Figure 1.1 we present a comparison of their
complexities together with a linear, direct access array. It is to be noted that even though
the worst case of a hash table lookup is linear (iterating over one bucket which stores all
the elements), it is extremely unlikely, and any popular hash function offers reasonable
guarantees against building such a degenerate hash table.
Data structure
Array
Balanced BST
Hash table
Trie
Lookup
O(n)
O(log n)
O(m) avg, O(n) worst-case
O(m)
Preprocessing
O(1)
O(n log n)
O(n)
O(n)
Space
O(n)
O(n)
O(n)
O(n)
Table 1.1: A comparison of the complexities of basic data structures which can be
used for exact string searching. Here, we assume that string comparison takes constant
time.
1.2.5
Compression
Compression consists in representing the data in an alternative (encoded) form with
the purpose of reducing the size. After compression, the data can be decompressed
(decoded) in order to obtain the original representation. Typical applications include
reducing storage sizes and saving bandwidth during transmission. Compression can be
1
Jorge Stolfi, available at http://en.wikipedia.org/wiki/File:Hash_table_3_1_1_0_1_
0_0_SP.svg, CC A-SA 3.0.
12
Introduction
either lossless or lossy, depending on whether the result of decompression matches the
original data. The former is useful especially when it comes to multimedia (frequently
used by domain-specific methods such as those based on human perception of images),
where the lower quality may be acceptable or even indiscernible, and storing the data in
an uncompressed form is often infeasible. For instance, the original size of a 2-hour Full
HD movie with 32 bits per pixel and 24 frames per second would amount to more than
one terabyte. Data that can be compressed is sometimes called redundant.
One of the most popular compression methods is character substitution, where the selected symbols (bit q-grams) are replaced with ones that take less space. A classic algorithm is called Huffman coding [Huf52], and it offers an optimal substitution method.
Based on q-gram frequencies, it produces a codebook which maps more frequent characters to shorter codes, in such a way that every code is uniquely decodable (e.g., 00 and
1 are uniquely decodable, but 00 and 0 are not). For real-world data, Huffman coding
offers compression rates that are close to the entropy (see the following subsection), and
it is often used as a component of more complex algorithms. We refer the reader to
Salomon’s monograph [Sal04] for more information on data compression.
1.2.5.1
Entropy
We can easily determine the compression ratio by taking the size (a number of occupied
bits) of the original data and dividing it by the size of the compressed data, r = n/nc .
It may seem that the following should hold: r > 1, however, certain algorithms might
actually increase the data size after compressing it when operating on an inconvenient
data set (which is of course highly undesirable). A related problem is how to determine
the “compressibility” of the data, i.e. the optimal compression ratio (the highest r). This
brings us to the notion of entropy, sometimes also called Shannon’s entropy after the
name of the author [Sha48]. It describes the amount of information which is contained
in a message, and in the case of strings it determines the average number of bits which
is required in order to encode an input symbol under a specified alphabet and frequency
distribution. This means that the entropy describes a theoretical bound on data compression (one that cannot be exceeded by any algorithm). Higher entropy means that
it is more difficult to compress the data (e.g., when multiple symbols appear with equal
frequency). The formula is presented in Figure 1.4.
E = −K
n
X
pi log pi .
i=1
Figure 1.4: The formula for Shannon’s entropy, where E is the entropy function, pi
is the probability that symbol i occurs, and K is any constant.
Introduction
13
A variation of entropy which is used in the context of strings is called a k-th order
entropy. It takes the context of k preceding symbols into account and it allows for the
use of different codes based on this context (e.g., ignoring a symbol c2 which always
appears after the symbol c1 ). Shannon’s entropy corresponds to the case of k = 0
(denoted as H0 , or Hk in general). When we increase the k value, we also increase the
theoretical bound on compressibility, although the size of the data required for storing
context information may at some point dominate the space [Gog11].
1.2.6
Pigeonhole principle
Let us consider a situation where we have x buckets and n items which are to be positioned inside those buckets. The pigeonhole principle (often also called Dirichlet principle) states that if n > x, then at least one of the buckets must store more than one
item. The name comes from an intuitive representation of the buckets as boxes and
items as pigeons. Despite its simplicity, this principle has been successfully applied to
various mathematical problems. It is also often used in computer science, for example to
describe the number of collisions in a hash table. Later we will see that the pigeonhole
principle is also useful in the context of string searching, especially when it comes to
string partitioning and approximate matching.
1.3
Overview
This thesis is organized as follows:
• Chapter 2 provides an overview of the field of string searching, deals with the
underlying theory, introduces relevant notations, and discusses related work in the
context of online search algorithms.
• Chapter 3 includes related work and discusses current state-of-the-art algorithms
for full-text indexing as well as our contribution to this area.
• Chapter 4 does the same for keyword indexes.
• Chapter 5 describes the experimental setup and presents practical results.
• Chapter 6 contains conclusions and pointers to the possible future work.
• Appendix A offers information regarding the data sets which were used for the
experimental evaluation.
Introduction
14
• Appendix B discusses the complexity of exact string comparison.
• Appendix C discusses the q-gram-based compression of the split index (Section 4.2.3) in detail.
• Appendix D contains experimental results for string sketches (Section 4.4) when
used for the alphabet with uniform letter frequencies.
• Appendix E presents the frequencies of English alphabet letters.
• Appendix F contains Internet addresses where the reader can obtain the code for
hash functions which were used to obtain experimental results for the split index
(Section 5.2).
Chapter 2
String Searching
This thesis deals with strings, which are sequences of symbols over a specified alphabet.
The string is usually denoted as S, the alphabet as Σ, and the length (size) as n or |S|
for strings, and σ or |Σ| for the alphabet. An arbitrary string S is sometimes called
a word (which is not to be confused with the machine word, i.e. a basic data unit in
the processor), and it is defined over a given alphabet Σ, that is S belongs to the set
of all words specified over the said alphabet, S ∈ Σ∗ . Both strings and alphabets are
assumed to be finite and well-defined, and alphabets are totally ordered. A string with a
specified value is written with the teletype font, as in abcd. The brackets are usually used
to indicate the character at a specified position and the index is 0-based, for instance
if string S = text, then S[1] = e. A substring (sometimes referred to as a factor) is
written as S[i0 , i1 ] (an inclusive range); for the previous example, S[1, 2] = ex, and a
single character is a substring of length 1 (usually denoted with c). The last character is
indicated with -1 and P = P [0, −1]. S1 ⊂ S2 indicates that the string S1 is a substring
of S2 (conversely, S1 6⊂ S2 indicates that S1 is not a substring of S2 ). The subscripts
are usually used to distinguish multiple strings, and two strings may be concatenated
(merged into one), recorded as S = S1 S2 or S = S1 + S2 , in which case |S| = |S1 | + |S2 |.
Removing one substring from another is indicated with the subtraction sign, S = S1 −S2 ,
provided that S2 ⊂ S1 , and as a result |S| = |S1 | − occ · |S2 | for occ occurrences of S2
in S1 . The equality sign indicates that the strings match exactly, which means that the
following relation always holds: S1 = S2 → |S1 | = |S2 |.
String searching, or string matching, refers to locating a substring (a pattern, P , or a
query, Q, with length m) in a longer text T . The textual data T that is searched is
called the input (input string, input text, text, database), and its length is denoted by n
(e.g., O(n) indicates that the complexity is linear with respect to the size of the original
data). The pattern is usually much smaller than the input, often in multiple orders of
15
String Searching
16
magnitude (m n). Based on the position of the pattern in the text, we write that P
occurs in T with a shift s, i.e. P [0, m − 1] = T [s, s + m − 1] ∧ s 6 n − m. As mentioned
before, the applications may vary (see Section 1.1), and the data itself can come from
many different domains. Still, string searching algorithms can operate on any text while
being oblivious to the actual meaning of the data. The field concerning the algorithms
for string processing is sometimes called stringology.
Two important notions are prefixes and suffixes, where the former is a substring S[0, i]
and the latter is a substring S[i, |S| − 1] for any 0 6 i < |S|. Let us observe at this
point that every substring is a prefix of one of the suffixes of the original string, as well
as a suffix of one of the prefixes. This simple statement is a basis for many algorithms
which are described in the following chapters. A proper prefix or suffix is not equal to
the string itself. The strings can be lexicographically ordered, which means that they are
sorted according to the ordering of the characters from the given alphabet (e.g., for the
English alphabet, letter a comes before b, b comes before c, etc). Formally, S1 < S2 for
two strings of respective lengths n1 and n2 , if ∃s : ∀i ∈ [0, s) : S1 [i] = S2 [i] ∧ S1 [s] <
S2 [s] ∧ 0 6 s < min(n1, n2) or n1 < n2 ∧ S1 = S2 [0, n1 − 1] [CLRS09, p. 304]. When
it comes to strings, we often mention q-grams and k-mers, which are lists of contiguous
characters (strings or substrings). The former is usually used in general terms and the
latter is used for biological data (especially DNA reads). A 5-gram or 5-mer is a q-gram
of length 5.
2.1
Problem classification
The match between the pattern and the substring of the input text is determined according to the specified similarity measure, which allows us to divide the algorithms into
two categories: exact and approximate. The former refers to direct matching, where the
length as well as all characters at the corresponding positions must be equal to each
another. This relation can be represented formally for two strings S1 and S2 of the same
length n, which are equal if and only if ∀i ∈ [0, n) : S1 [i] = S2 [i] (or simply, S1 = S2 ). In
the case of approximate matching, the similarity is measured with a specified distance,
also called an error metric, between the two strings. It is to be noted that the word approximation is not used here strictly in the mathematical sense, since approximate search
is actually harder than the exact one when it comes to strings [Nav01]. In general, given
two strings S1 and S2 , the distance D(S1 , S2 ) is the minimum cost of edit operations
that would transform S1 into S2 or vice versa. The edits are usually defined as a finite,
well-defined set of rules E = {r : r(S) = S 0 }, and each rule can be associated with a
different cost. When error metrics are used, the results of string matching are limited to
String Searching
17
those substrings which are close to the pattern. This is defined by the threshold k, that
is we report all substrings s for which D(s, P ) 6 k. For metrics with fixed penalties for
errors, k is called the maximum allowed number of errors. This value may depend both
on the data set and the pattern length, for instance for spell checking a reasonable number of errors is higher for longer words. It should hold that k < m, since otherwise the
pattern could match any string, and k = 0 corresponds to the exact matching scenario.
See Subsection 2.1.1 for detailed descriptions of the most popular error metrics.
The problem of searching (also called a lookup) can vary depending on the kind of answer
that is provided. This includes the following operations:
• Match — determining the membership, i.e. deciding whether P ⊂ T (a decision
problem). When we consider the search complexity, we usually implicitly mean the
match query.
• Count — stating how many times P occurs in T . This refers to the cardinality
of the set containing all indexes i s.t. T [i, i + m − 1] is equal to P . Specific values
of i are ignored in this scenario. The time complexity of the count operation often
depends on the number of occurrences (denoted with occ).
• Locate — reporting all occurrences of P in T , i.e. returning all indexes i s.t.
T [i, i + m − 1] is equal to P .
• Display — showing k characters which are located before and after each match,
that is for all aforementioned indexes i we display substrings T [i − k, i − 1] and
T [i + m, i + m + k − 1]. In the case of approximate matching, it might refer to
showing all text substrings or keywords s s.t. D(s, P ) 6 k.
String searching algorithms can be also categorized based on whether the data is preprocessed. One such classification adapted from Melichar et al. [MHP05, p. 8] is presented
in Table 2.1. Offline searching is also called index-based searching because we preprocess
the text and build a data structure which is called an index. This is opposed to online
searching, where no preprocessing of the input text takes place. For detailed descriptions
of the examples from these classes, consult Chapters 3 and 4 (offline) and Section 2.2
(online).
2.1.1
Error metrics
The motivation behind error metrics is to minimize the score between the strings which
are somehow related to each other. Character differences that are more likely to occur
18
String Searching
Text prepr.
No
No
Yes
Yes
Pattern prepr.
No
Yes
No
Yes
Algorithm type
Online
Online
Offline
Offline
Examples
Naive, dynamic programming
Pattern automata, rolling hash
Index-based methods
Signature methods
Table 2.1: Algorithm classification based on whether the data is preprocessed.
should carry a lower penalty depending on the application area, for instance in the case
of DNA certain mutations appear in the real world much more often than others. The
most popular metrics include:
• Hamming distance — relevant for two strings of equal length n, calculates the
number of differing characters at corresponding positions (hence it is sometimes
called the k-mismatches problem). Throughout this thesis we denote the Hamming
distance with Ham, and given that |S1 | = |S2 | = n, Ham(S1 , S2 ) = |E|, where
E = {i : i ∈ [0, n) ∧ S1 [i] 6= S2 [i]}, and Ham(S1 , S2 ) 6 n. Without preprocessing,
calculating the Hamming distance takes O(n) time. Applications of the Hamming distance include, i.a., bioinformatics [KCO+ 01, LSS01], biometrics [DFM98],
cheminformatics [Flo98], circuit design [GLPS97], and web crawling [MJDS07].
• Levenshtein distance — measures the minimum number of edits, here defined as
insertions, deletions, and substitutions. It was first described in the context of
error correction for data transmission [Lev66]. It must hold that Lev(S1 , S2 ) 6
max(|S1 |, |S2 |). The calculation using the dynamic programming algorithm takes
O(|S1 ||S2 |) time using O(min(|S1 |, |S2 |)) space (see Subsection 2.2.2). Ukkonen
[Ukk85a] recognized certain properties of the DP matrix and presented an algorithm
with O(k min(|S1 |, |S2 |)) time for k errors, and an approximation algorithm in a
near-linear time was also described [AKO10]. Levenshtein distance is sometimes
called simply the edit distance. When the distance for approximate matching is
not explicitly specified, we assume the Levenshtein distance.
• Other edit distances. These may allow only a subset of edit actions, e.g., longest
common subsequence (LCS) which is restricted to indels [NW70] or the Episode
distance with deletions [DFG+ 97]. Another approach is to introduce additional
actions; examples include the Damerau–Levenshtein distance which counts a transposition as one edit operation [Bar07], a distance which allows for matching one
character with two and vice versa (specifically designed for OCR) [CB08], or a
distance which has weights for substitutions based on the probability that a user
may mistype one character for another [BM00].
String Searching
19
• Sequence alignment — there may exist gaps (other characters) in between substrings of S1 and S2 . Moreover, certain characters may match each other even
though they are not strictly equal. The gaps themselves (e.g., their lengths or
positions [NR03, AE86]) as well as the inequality between individual characters
are quantified. The score is calculated using a similarity matrix which is constructed based on statistical properties of the elements from the domain in question
(e.g., the BLOSUM62 matrix for the sequence alignment of proteins [Edd04]). The
problem can be also formulated as (δ, α)-matching, where the width of the gaps
is at most α and for a set P of positions of corresponding characters, it should
hold that ∀(i1 , i2 ) ∈ P : |S1 [i1 ] − S2 [i2 ]| 6 δ [CIM+ 02]. This means that absolute values of numerical differences between certain characters cannot exceed a
specified threshold. Sequence alignment is a generalization of the edit distance,
and it can be also performed for multiple sequences, although this is known to be
NP-complete [WJ94].
• Regular expression matching — the patterns may contain certain metacharacters with various meanings. These can specify ranges of characters which can
match at certain positions or use additional constructs such as the wildcard symbol
which matches 0 or more consecutive characters of any type.
2.2
Online searching
In this section, we present selected algorithms for online string searching, and we divide
them into exact and approximate ones. Online algorithms do not preprocess the input
text, however, the pattern may be preprocessed. We assume that the preprocessing time
complexity is equal to O(1), and the time required for pattern preprocessing is subsumed
under search complexity, which means that we consider a scenario where the patterns
are not known beforehand. Search time refers to the match query.
2.2.1
Exact
Faro and Lecroq [FL13] provided a survey on online algorithms for exact matching and
remarked that over 80 algorithms have been proposed since the 1970s. They categorized
the algorithms into the following three groups:
• Character comparisons
• Automata
String Searching
20
• Bit parallelism
The naive algorithm attempts to match every possible substring of T of length m with the
pattern P . This means that it iterates from left to right and checks whether T [i, m−1] =
P for each 0 6 i 6 n−m. Right to left iteration would be also possible and the algorithm
would report the same results. Time complexity is equal to O(nm) in the worst case
(although to O(n) on average, see Appendix B for more information), and there is no
preprocessing or space overhead.
Even without text preprocessing, the performance of the naive algorithm can be improved
significantly by taking advantage of the information provided by the mismatches between
the text and the pattern. Classical solutions for single-pattern matching include the
Knuth–Morris–Pratt (KMP) [KMP77] and the Boyer–Moore (BM) [BM77] algorithm.
The KMP uses information regarding the characters that appear in the pattern in order
to avoid repeated comparisons known from the naive approach. It reduces the time
complexity from O(nm) to O(n + m) in the worst case at the cost of O(m) space. When
a mismatch occurs at position i in the pattern (P [i] 6= T [s + i]), the algorithm shifts P
by i − l, where l is the length of the longest proper prefix of PS = P [0, i − 1] which is
also a suffix of PS (instead of just 1 position), and it starts matching from the position
i = l instead of i = 0. Information regarding PS is precomputed and stored in a table of
size m. Let us observe that the algorithm does not skip any characters from the input
string. Interestingly, Baeza-Yates and Navarro [BYN04] reported that in practice the
KMP algorithm is roughly two times slower than the brute-force search (although this
depends on the alphabet size).
The BM algorithm, on the other hand, omits certain characters from the input. It
begins the matching from the end of the pattern and allows for forward jumps based on
mismatches. Thanks to the preprocessing, the size of each shift can be determined in
constant time. One of the two rules for jumping is called a bad character rule, which,
given that P [i] 6= T [s + i] ∧ T [s + i] = c, aligns T [s + i] with the rightmost occurrence
of c in P (P [j] = c, where j < i), or shifts the pattern by m if c ∈
/ P . The other rule
is a complex good suffix rule, whose description we omit here, and which is also not a
part of the Boyer–Moore–Horspool (BMH) [Hor80] algorithm which uses only the bad
character rule — this is because the good suffix rule requires extra cost to compute and
it is often not practical. The worst-case time complexity of the BM algorithm is equal to
O(nm + σ), with O(n/ min(m, σ) + m + σ) average (the same holds for BMH), and the
average number of comparisons is equal to roughly 3n [Col94]. This can be improved to
achieve a linear time in the worst case by introducing additional rules [Gal79].
21
String Searching
One of the algorithms developed later is the Rabin–Karp (RK) [KR87] algorithm. It
starts with calculating the hash value of the pattern in the preprocessing stage, and then
compares this hash with every substring of the text, sliding over it in a similar way to the
naive algorithm. Character-wise verification takes place only if two hashes are equal to
each other. The trick is to use a hash function which can be computed in constant time for
the next substring given its output for the previous substring and the next character, a socalled rolling hash [Kor06], viz. H(T [s, s+m−1], T [s+m]) = H(T [s+1, s+m]). A simple
n−1
P
example would be to simply add the values of all characters, H(S) =
S[i]. There
i=0
exist other functions such as the Rabin fingerprint [Rab81], which treats the characters as
n
P
ci xi−1 . The
polynomial variables ci , and the indeterminate x is a fixed base, R(S) =
i=1
RK algorithm is suitable for multiple-pattern matching, since we can quickly compare the
hash of the current substring with the hashes of all patterns using any efficient set data
structure. In this way, we obtain the average time complexity of O(n + m) (assuming
that hashing takes linear time), however, it is still equal to O(nm) in the worst case
when the hashes do match and verification is required.
Another approach is taken by the Aho–Corasick [AC75] algorithm. It builds a finite state
machine (FSM), i.e. an automaton which has a finite number of states. The structure
of the automaton resembles a trie and it contains edges between certain nodes which
represent the transitions. It is constructed from the queries and attempts to match all
queries at once when sliding over the text. The transitions indicate the next possible
pattern which can be still fully matched after a mismatch at a specified position occurs.
The search complexity is equal to O(n log σ + m + z), which means that it is linear with
respect to the input length n, the length of all patterns (m, for building the automaton),
and the number of occurrences z.
An example of a bit-parallel algorithm is the shift-or algorithm by Baeza-Yates and
Gonnet [BYG92], which aims to speed up the comparisons. The pattern length should
be smaller than the machine word size, which is usually equal to 32 or 64 bits. During the
preprocessing, a mismatch mask M is computed for each character c from the alphabet,
where M [i] = 0 if P [i] = c and M [i] = 1 otherwise. Moreover, we maintain a state
mask R, initially set to all 1s, which holds information about the matches so far. We
proceed in a similar manner to the naive algorithm, trying to match the pattern with
every substring, but instead of character-wise comparisons we use bit operations. At each
step, we shift the state mask to the left and OR it with the M for the current character
T [i]. A match is reported if the most significant bit of R is equal to 0. Provided that
m 6 w, the time complexity is equal to O(n) and the masks occupy O(σ) space.
Based on the practical evaluation, Faro and Lecroq [FL13] reported that there is no
superior algorithm and the effectiveness depends heavily on the size of the pattern and
String Searching
22
the size of the alphabet. The differences in performance are substantial — algorithms
which are the fastest for short patterns are often among the slowest for long patterns,
and vice versa.
2.2.2
Approximate
In the following paragraphs, we use δ to denote the complexity of calculating the distance
function between two strings (consult Subsection 2.1.1 for the description of the most
popular metrics). Navarro [Nav01] presented an extensive survey regarding approximate
online matching, where he categorizes the algorithms into four categories which resemble
the ones presented for the exact scenario:
• Dynamic programming
• Automata
• Bit parallelism
• Filtering
The naive algorithm works in a similar manner to the one for exact searching, that is it
compares the pattern with every possible substring of the input text. It forms a generic
idea which can be adapted depending on the edit distance which is used, and for this
reason the time complexity is equal to O(nδ).
The oldest algorithms are based on the principle of dynamic programming (DP). This
means that they divide the problem into subproblems — these are solved and their
answers are stored in order to avoid recomputing these answers (i.e. it is applicable when
the subproblems overlap) [CLRS09, p. 359]. One of the most well-known examples is the
Needleman–Wunsch (NW) [NW70] algorithm, which was originally designed to compare
biological sequences. Starting from the first character of both strings, it successively
considers all possible actions (insertion, (mis)match, deletion) and constructs a matrix
which holds all alignment scores. It calculates the global alignment, and it can use a
substitution matrix which specifies alignment scores (penalties). The situation where the
scores triplet is equal to (−1, 1, −1) (for gaps, matches, and mismatches, respectively)
corresponds directly to the Levenshtein distance (consult Figure 2.1). The NW method
can be invoked with the input text as one string and the pattern as the other.
A closely related variation of the NW algorithm is the Smith–Waterman (SW) [SW81]
algorithm, which can also identify local (and not just global) alignments by not allowing
negative scores. This means that the alignment does not have to cover the entire length
23
String Searching
of the text, and it is therefore more suitable for locating a pattern as a substring. Both
algorithms can be adapted to other distance metrics by manipulating the scoring matrix,
for example by assigning infinite costs in order to prohibit certain operations. The time
complexity of the NW and SW approaches is equal to O(nm) and it possible to calculate
them using O(min(n, m)) space [Hir75]. Despite their simplicity, both methods are still
popular for sequence alignment because they might be relatively fast in practice and they
report the true answer to the problem, which is crucial when the quality of an alignment
matters.
t
a
x
i
0
-1
-2
-3
-4
t
-1
1
0
-1
-2
e
-2
0
0
-1
-2
x
-3
-1
-1
1
0
t
-4
-2
-2
0
0
Figure 2.1: Calculating an alignment with Levenshtein distance using the Needleman–
Wunsch (NW) algorithm. We follow the path from the top-left to the bottom-right
corner selecting the highest possible score (underlined); the optimal global alignment
is as follows: text → taxi (no gaps).
Multiple other dynamic programming algorithms were proposed over the years, and they
gradually tightened the theoretical bounds. The difference lies mostly in their flexibility,
that is a possibility of being adapted to other distance metrics, as well as practical performance. Notable results for the edit distance include the Chang–Lampe [CL92] algorithm
√
with O(kn/ σ) average time using O(m) space, and the Cole–Hariharan [CH02] algorithm with the worst-case time O(n + m + k c n/m) with c = 3 for non-k-break periodic
patterns and c = 4 otherwise, taking O(m + os ) space, where os refers to occurrences
of certain substrings of the pattern in the text (the analysis is rather lengthy). For the
LCS metric, Grabowski [Gra14] provided the algorithm with O(nm log log n/ log2 n) time
bound and linear space.
A significant achievement in the automata category is the Wu–Manber–Myers [WMM96]
algorithm that uses the Four Russians technique, which consists in partitioning the matrix into fixed-size blocks, precomputing the values for each possible block, and then using
a lookup table. It implicitly constructs the automaton, where each state corresponds to
the values in the DP matrix. They obtain an O(kn/ log n) expected time bound using
O(n) space. As regards bit parallelism, Myers [Mye99] presented the calculation of the
DP matrix in O(dk/wen) average time.
An important category is formed by the filtering algorithms, which try to identify parts
of the input text where it is not possible to match any substrings with the pattern. After
String Searching
24
parts of the text are rejected, a non-filtering algorithm is used on the remaining parts.
Numerous filtering algorithms have been proposed, and one of the most significant is the
Chang–Marr [CM94] algorithm with the time bound of O(n(k + logσ m)/m) for the error
√
level α when it holds that α < 1 − e/ σ (for very large σ).
As regards the k-mismatches problem, a notable example is the Amir–Lewenstein–
√
Porat [ALP04] algorithm which can answer the locate query in O(n k log k) time. This
p
was refined to O(n+n k/w log k) in the word RAM model, where w = Ω(log n) [FG09].
Recently, Clifford et al. [CFP+ 15] described an algorithm with search time complexity
O(nk 2 log k/m + n polylog m).
2.3
Offline searching
An online search is often infeasible for real-world data, since the time required for one
lookup might be measured in the order of seconds. This is caused by the fact that
any online method has to access at least n/m characters from the input text [Gra11,
p. 155], and it normally holds that m n. This thesis is focused on index-based (offline)
methods, where a data structure (an index, pl. indexes or indices, we opt for the former
term) is built based on the input text in order to speed up further searches, which is a
classic example of data preprocessing. This is justified even if the preprocessing time is
long, since the same text is often queried with multiple patterns. The indexes can be
divided into two following categories:
• Full-text indexes
• Keyword (dictionary) indexes
The former means that we can search for any substring in the input text (string matching,
text matching), whereas the latter operates on individual words (word matching, keyword
matching, dictionary matching, matching in dictionaries). Keyword indexes are usually
appropriate where there exist well-defined boundaries between the keywords (which are
often simply called words), for instance in the case of a natural language dictionary or
individual DNA reads (k-mers). It is worth noting that the number of distinct words is
almost always smaller than the total number of words in a dictionary D, all of which are
taken from a document or a set of documents. Heaps’ law states that |D| = O(nβ ), where
n is the text size and β is an empirical constant (usually in the interval [0.4, 0.6]) [Hea78].
Full-text and keyword indexes are actually related to each other, because they are often
based on similar concepts (e.g., the pigeonhole principle) and they may even use the
other kind as the underlying data structure.
String Searching
25
The indexes can be divided into static and dynamic ones, depending on whether updates
are allowed after the initial construction. Another category is formed by external indexes
— these are optimized with respect to disk I/O, and they aim to be efficient for the data
which does not fit into the main memory. We can also distinguish compressed indexes
(see Subsection 1.2.5.1 for more information on compression), which store the data in
an encoded form. One goal is to reduce storage requirements while still allowing fast
searches, especially when compared to the scenario where a naive decompression of the
whole index has to be performed. On the other hand, it is also possible to achieve
both space saving and a speedup with respect to the uncompressed index. This can
be achieved mostly due to reduced I/O and (rather surprisingly) fewer comparisons
required for the compressed data [Gra11, p. 131]. Navarro and Mäkinen [NM07] note
that the most successful indexes can nowadays obtain both almost optimal space and
query time. A compressed data structure usually also falls into the category of a succinct
data structure. This is a rather loose term which is commonly applied to algorithms
which employ efficient data representations with respect to space, often close to the
theoretic bound. Thanks to reduced storage requirements, succinct data structures can
process texts which are an order of magnitude bigger than ones suitable for classical
data structures [GP14]. The term succinct may also suggest that the we are not required
to decompress the entire structure in order to perform a lookup operation. Moreover,
certain indexes can be classified as self-indexes, which means that they implicitly store
the input string S. In other words, it is possible to transform (decompress) the index
back to S, and thus the index can essentially replace the text.
The main advantage of indexes when compared to the online scenario are fast queries,
however, this naturally comes at a price. Indexes might occupy a substantial amount
of space (sometimes even orders of magnitude more than the input), they are expensive
to construct, and it is often problematic to support functionality such as approximate
matching and updates. Still, Navarro et al. [NBYST01] point out that in spite of the
existence of very fast (both from a practical and a theoretical point of view) online
algorithms, the data size often renders online algorithms infeasible (which is even more
relevant in the year 2015).
Index-based methods are explored in detail in the following chapters: full-text indexes
in Chapter 3 and keyword indexes in Chapter 4. Experimental evaluation of our contributions can be found in Chapter 5.
Chapter 3
Full-text Indexes
Full-text indexes allow for searching for an arbitrary substring from the input text.
Formally, for a string T of length n, having a set of x substrings S = {s1 , . . . , sx } over a
given alphabet Σ, I(S) is a full-text index supporting matching with a specified distance
D. For any query pattern P , it returns all substrings s from T s.t. D(P, s) 6 k (with
k = 0 for exact matching). In the following sections, we describe data structures from
this category, divided into exact (Section 3.1) and approximate ones (Section 3.2). Our
contribution in this field is presented in Subsection 3.1.6, which describes a variant of
the well-known FM-index called FM-bloated.
3.1
3.1.1
Exact
Suffix tree
The suffix tree (ST) was introduced by Weiner in 1973 [Wei73]. It is a trie (see Subsection 1.2.2.2) which stores all suffixes of the input string, that is n suffixes in total for the
string of length n. Moreover, the suffix tree is compressed, which in this context means
that each node which has only one child is merged with this child, as shown in Figure 3.1.
Searching for a pattern takes O(m) time, since we proceed in a way similar to the search
in a regular trie. Suffix trees offer a lot of additional functionality beyond string searching
such as calculating the Lempel–Ziv compression [Gus97, p. 166] or searching for string
repeats [AKO02]. The ST takes linear space with respect to the total input size (O(n2 )
if uncompressed), however, it occupies significantly more space than the original string
— in a space-efficient implementation around 10.1n bytes on average in practice and
even up to 20n in the worst case [Kur99, AOK02], which might be a bottleneck when
dealing with massive data. Moreover, the space complexity given in bits is actually equal
26
27
Full-text Indexes
to O(n log n) (which is also the case for the suffix array) rather than O(n log σ) required
to store the original text. When it comes to preprocessing, there exist algorithms which
construct the ST in linear time [Ukk95, Far97].
As regards the implementation, an important consideration is how to represent the children of each node. A straightforward approach such as storing them in a linked list would
degrade the search time, since in order to achieve the overall time of O(m), we have to
be able to locate each child in constant time. This can be accomplished for example with
a hash table which offers an O(1) average time for a lookup.
a
a
$
banana$
banana$
na
a$
$
ana
$
ana$
na
na$
na$
nana$
na$
anana$
Figure 3.1: A suffix tree (ST) which stores all suffixes of the text banana with an
appended terminating character $, which prevents a situation where a suffix could be
a prefix of another suffix.
A common variation is called generalized suffix tree and it refers to a ST which stores
multiple strings, that is all suffixes for each string S1 , . . . , Sx . Additional information
which identifies the string Si is stored in the nodes, and the complexities are the same
as for a regular ST [Gus97, p. 116]. Compressed suffix trees which reduce the space
requirements were also described (they are usually based on a compressed suffix array) [Gog11, GNPS15].
3.1.2
Suffix array
The suffix array (SA) comes from Manber and Myers [MM93] and it stores indexes of
sorted suffixes of the input text, see Figure 3.2 for an example. According to Kärkkäinen [Kär95], suffix arrays perform comparably to suffix trees when it comes to string
28
Full-text Indexes
matching, however, they are slower for other kinds of searches such as regular expression
matching. Even though the SA takes more space than the original string (4n bytes in
its basic form, and the original string has to be stored as well), it is significantly smaller
than the suffix tree (5n < 10.1n) and it has better locality properties [AKO02]. The
search over a SA takes O(m log n) time, since we perform a binary search over n suffixes and each comparison takes at most m time (although the comparison is constant
on average, see Appendix B). The space complexity is equal to O(n) (there are n suffixes and we store one index per suffix), and it is possible to construct a SA in linear
time. See Puglisi et al. [PST07] for an extensive survey of multiple construction algorithms with a practical evaluation, which concludes that the algorithm by Maniscalco
and Puglisi [MP08] is the fastest one. Parallel construction algorithms which use the
GPU were also considered [DK13]. Let us point out a similarity of SA to the ST, since
sorted suffixes correspond to the depth-first traversal over the ST. Main disadvantage
with respect to the ST is a lack of additional functionality such as this mentioned in the
previous subsection.
Suffix
$
a$
ana$
anana$
banana$
na$
nana$
Index
6
5
3
1
0
4
2
Figure 3.2: A suffix array (SA) which stores indexes (0-based) of sorted suffixes of
the text banana$. The suffixes are not stored explicitly, although the entire input text
has to be stored.
3.1.2.1
Modifications
Multiple modifications of the original SA have been proposed over the years. Their aim
is to either speed up the searches by storing additional information or to reduce space
requirements by compressing the data or omitting a subset of the data. Most notable
examples are presented below.
The enhanced suffix array (ESA) is a variant where additional information in the form
of a longest common prefix (LCP) table is stored [AKO02]. For a suffix array SA over
the string of length n, the LCP table L holds integers from the range [0, n], and it has
the following properties: L[0] = 0, and L[i] holds the length of the longest common
prefix of suffixes from SA [i] and SA [i − 1]. ESA can essentially replace the suffix tree
since it offers the same functionality, and it can deal with the same problems in the same
29
Full-text Indexes
time complexity (although constant alphabet size is assumed in the analysis) [AKO04].
For certain applications, it also required to store the Burrows–Wheeler transform (see
−1
Subsection 3.1.4.1) of the input string and an inverse suffix array (SA
[SA [i]] = i).
The size of the index can be always reduced using any compression method. However,
such a naive approach would certainly have a negative impact on search performance
because of the overhead associated with decompression, and a much better approach is
to use a dedicated solution. Mäkinen [Mäk00] presented a compact suffix array (CoSA)
with average search time O(((2n−n0 )/n0 )2 (m+log n)) where n0 is the length of the CoSA
and practical space reduction of up to 50% by replacing repetitive suffixes with links to
other suffixes. Grossi and Vitter [GV05] introduced a compressed suffix array (CSA)
which uses O(n log σ) bits instead of O(n log n) bits. It is based on a transformation of
the SA into the array which points to the position of the next suffix in the text. For
instance, for the text banana$ and the suffix ana$, the next suffix is na$, see Figure 3.3.
These transformed values are compressible because of certain properties such as the fact
that number of increasing sequences is in O(σ). The search takes O(m/ logσ n + logσ n)
time, and the relation between search time and space can be fine-tuned using certain
parameters.
For more information on compressed indexes, including the modifications of the SA, we
refer the reader to the survey by Navarro and Mäkinen [NM07]. The FM-index which
is presented in Subsection 3.1.4 can be also regarded as a compressed variant of the
SA [FM05].
i
0
1
2
3
4
5
6
Suffix
$
a$
ana$
anana$
banana$
na$
nana$
SA index
6
5
3
1
0
4
2
CSA index
4
0
5
6
3
1
2
Figure 3.3: A compressed suffix array (CSA) for the text banana$ which stores indexes
pointing to the next suffix from the text (the SA is shown for clarity and it is not stored
along with the CSA).
The sparse suffix array stores only suffixes which are located at the positions in the
form iq for a fixed q value [KU96]. In order to answer a query, q searches and q −
1 explicit verifications are required, and it must hold that m > q. Another notable
example of a modified suffix array which stores only a subset of data is the sampled
suffix array [CNP+ 12]. The idea is to select a subset of the alphabet (denoted with
ΣS ) and extract corresponding substrings from the text. The array is constructed only
Full-text Indexes
30
over those suffixes which start with a symbol from the chosen subalphabet (although
the sorting is performed on full suffixes). Only the part of the pattern which contains a
character c ∈ ΣS is searched for (i.e. there is one search in total) and the matches are
verified by comparing the rest of the pattern with the text. The disadvantage is that
the following must hold, ∃c ∈ P : c ∈ ΣS . Practical reduction in space in the order of
50% was reported. Recently, Grabowski and Raniszewski [GR14] proposed an alternative
sampling technique based on minimizers (see Section 4.3.1) which allows for matching
all patterns P s.t. |P | > q where q is the minimizer window length and requires only one
search.
3.1.3
Other suffix-based structures
The suffix tray combines — just as the name suggests — the suffix tree with the suffix
array [CKL06]. The top-level structure is a ST whose nodes are divided into heavy and
light, depending on whether their subtrees have more or fewer leaves than some predefined
threshold. Light children of heavy nodes store their corresponding SA interval. The query
time equals O(m + log σ), and preprocessing and space complexities are equal to O(n).
The authors also described a dynamic variant which is called a suffix trist and allows
updates.
Yet another modification of the classical ST is called suffix cactus (SC) [Kär95]. Here,
Kärkkäinen reworks the compaction procedure, which is a part of the construction of
the ST. Instead of collapsing only the nodes which have only one child, every internal
node is combined with one of its children. Various methods of selecting such a child exist
(e.g., alphabetical ordering), and thus the SC can take multiple forms for the same input
string. The original article reports the best search times for the DNA, whereas the SC
performed worse than both ST and SA for the English language and random data. The
space complexity is equal to O(n).
3.1.4
FM-index
The FM-index is a compressed (succinct) full-text index which was introduced by Ferragina and Manzini [FM00] in the year 2000. It was applied in a variety of situations, for instance for sequence assembly [LTP+ 09, SD10] or for ranked document retrieval [CPS12]. Multiple modifications of the FM-index were described throughout the
years (some are introduced in the following subsections). The strength of the original
FM-index lies in the fact that it occupies less space than the input text while still allowing fast queries. The search time of its unmodified version is linear with respect to the
pattern length (although a constant-size alphabet is assumed), and the space complexity
Full-text Indexes
31
is equal to O(Hk (T ) + log log n/ log n) bits per input symbol. Taking the alphabet size
into account, Grabowski et al. [GNP+ 06] provide a more accurate total size bound of
O(Hk (T )n + (σ log σ + log log n) logn n + nγ σ σ+1 ) bits for 0 < γ < 1.
3.1.4.1
Burrows–Wheeler Transform
FM-index is based on the Burrows–Wheeler transform (BWT) [BW94], which is an ingenious method of transforming a string S in order to reduce its entropy. BWT permutes
the characters of S in such a way that duplicated characters often appear next to each
other, which allows for easier processing using methods such as run-length or moveto-front encoding (as is the case in, e.g., the bzip2 compressor [Sew, PJT09]). Most
importantly, this transformation is reversible (as opposed to straightforward sorting),
which means that we can extract the original string from the permuted order. BWT
could be also used for compression based on the k-th order entropy (described in Subsection 1.2.5.1) since basic context information can be extracted from BWT, however,
the loss of speed renders such an approach impractical [Deo05].
In order to calculate the BWT, we first append a special character (we describe it with
$, but in practice it can be any character c ∈
/ S) to S in order indicate its end. The
character $ is lexicographically smaller than all {c : c ∈ S}. The next step is to take all
rotations of S (|S| rotations in total) and sort them in a lexicographic order, thus forming
the BWT matrix, where we denote the first column (sorted characters) with F and the
last column (the result of the BWT, i.e. T bwt ) with L. In order to finish the transform,
we take the last character of each rotation, as demonstrated in Figure 3.4. Let us note
the similarities between the BWT and the suffix array described in Subsection 3.1.2,
since the sorted rotations correspond directly to sorted suffixes (see Figure 3.5). The
calculation takes O(n) time, assuming that the prefixes can be sorted in linear time,
and the space complexity of the naive approach is equal to O(n2 ) (but it is linear if
optimized).
In order to reverse the BWT, we first sort all characters and thus obtain the first column
of the matrix. At this point, we have two columns, namely the first and the last one,
which means that we also have all character 2-grams from the original string S. Sorting
these 2-grams gives us the first and the second column, and we proceed in this manner
(later we sort 3-grams, 4-grams, etc) until we reach |S|-grams and thus reconstruct the
whole transformation matrix. At this point, S can be found in the row where the last
character is equal to $.
32
Full-text Indexes
R1
R2
R3
R4
R5
R6
R7
R8
$
a
e
n
p
r
t
t
p
t
r
$
a
n
e
t
a
t
n
p
t
$
r
e
t
e
$
a
t
p
n
r
t
r
p
t
e
a
$
n
e
n
a
t
r
t
p
$
r
$
t
e
n
t
a
p
n
p
t
r
$
e
t
a
Figure 3.4: Calculating a Burrows–Wheeler transform (BWT) for the string pattern
with an appended terminating character $ (it is required for reversing the transform). The rotations are already sorted and the result is in the last column, i.e.
BWT(pattern$) = nptr$eta.
3.1.4.2
Operation
Important aspects of the FM-index are as follows:
• Count table C, which describes the number of occurrences of lexicographically
smaller characters for all c ∈ S (see Figure 3.6).
• Rank operation, which counts the number of set bits in a bit vector v before a
certain position i (we assume that v[i] is included as well), that is rank(i, v) =
|{i0 : 0 6 i0 6 i ∧ v[i0 ] = 1}|.
• Select operation (used only in some variants, e.g., the RLFM [MN05b]), which
reports the position of the i-th set bit in the bit vector v, that is select(i, v) = p if
and only if |{i0 : 0 6 i0 < p ∧ v[i0 ] = 1}| = i − 1.
Note that both rank and select operations can be generalized to any finite alphabet Σ.
When we perform the search using the FM-index, we iterate the pattern characterwise
in a reverse order while maintaining a current range r = [s, e]. Initially, i = m − 1 and
r = [0, n − 1], that is we start from the last character in the pattern and the range covers
the whole input string (here the input string corresponds to T bwt , that is a text after the
BWT). At each step we update s and e using the formulae presented in Figure 3.7. The
size of the range after the last iteration gives us the number of occurrences of P in T ,
or it turns out that P 6⊂ T if s > e at any point. This mechanism is also known as the
LF-mapping.
3.1.4.3
Efficiency
We can see that the performance of C lookup and rank is crucial to the complexity of
the search procedure. In particular, if these operations are constant, the search takes
33
Full-text Indexes
i
0
1
2
3
4
5
6
7
BWT
n
p
t
r
$
e
t
a
SA
7
1
4
6
0
5
3
2
suffix
$
attern$
ern$
n$
pattern$
rn$
tern$
ttern$
Figure 3.5: A relation between the BWT and the SA for the string pattern with
an appended terminating character $. Let us note that BW T [i] = S[SA[i] − 1] (where
S[−1] corresponds to the last character in S), that is a character at the position i in
BWT is a character preceding a suffix which is located at the same position in the SA.
c
C
$
0
i
1
m
5
p
6
s
8
Figure 3.6: Count table C which is a part of the FM-index for the text mississippi$.
The entries describe the number of occurrences of lexicographically smaller characters
for all c ∈ S. For instance for the letter m, there are 4 occurrences of i and 1 occurrence
of $ in S, hence C[m] = 5. It is worth noting that C is actually a compact representation
of the F column.
s = C[P [i]] + rank(s − 1, P [i])
e = C[P [i]] + rank(e, P [i]) − 1
Figure 3.7: Formulae for updating the range during the search procedure in the FMindex, where P [i] is the current character and C is the count table. Rank is invoked
on T bwt and it counts occurrences of the current character P [i].
O(m) time. For the count table, we can simply precompute the values and store them
an array of size σ with O(1) lookup. As regards rank, a naive implementation which
would iterate the whole array would clearly take O(n) time. On the other hand, if we
were to precompute all values, we would have to store a table of size O(nσ). One of the
popular solutions for an efficient rank uses two structures which are introduced in the
following paragraphs.
The RRR (from authors’ names: Raman, Raman, and Rao) is a data structure which
can answer the rank query in O(1) time for bit vectors (i.e. where Σ = {0, 1}), while
providing compression at the same time [RRR02]. It divides a bit vector v of size n into
n/b blocks each of size b, and groups each consecutive s blocks into one superblock (see
Figure 3.8). For each block, we store a weight w which describes the number of set bits
and offset o which describes its position in a table TR (the maximum value of o depends
on w). In TR , for each w and each o, we store a value of rank for each index i, where
34
Full-text Indexes
0 6 i 6 b (see Figure 3.9). This means that we have to keep
b
w
entries each of size b for
each of the b + 1 consecutive weights. Such a scheme provides compression with respect
to storing all n bits explicitly. We achieve the O(1) query time by storing a rank value
for each superblock, and thus during the search we only iterate at most s blocks (s is
constant). The space complexity is equal to nH0 (v) + O(n log log n/ log n) bits.
001
001
101
000
Figure 3.8: An example of RRR blocks for b = 3 and s = 2, where the first superblock
is equal to 001001 and the second superblock is equal to 101000.
offset
0
1
2
block value
011
101
110
rank
012
112
122
Figure 3.9: An example of an RRR table for w = 2 and b = 3, where 32 = 3 (i.e. the
number of all block values of length 3 with weight 2 is equal to 3), with rank presented
for successive indexes i ∈ [0, 2]. Block values do not have to be stored explicitly.
The wavelet tree (WT) from Grossi et al. [GGV03] is a balanced tree data structure that
stores a hierarchy of bit vectors instead of the original string, which allows the use of
RRR (or any other bit vector with an efficient rank operation). Starting from the root,
we recursively partition the alphabet into two subsets of equal length (if the number
of distinct characters is even), until we reach single symbols which are stored as leaves.
Characters belonging to the first subset are indicated with 0s, and characters belonging
to the second subset are indicated with 1s (consult Figure 3.10 for an example).
Thanks to the WT we can implement a rank query for any fixed size alphabet in O(log σ)
time (assuming that a binary rank is calculated in constant time), since the height of
the tree is equal to log σ. For a given character c, we query the WT at each node and
proceed left or right depending on the subset to which c belongs. Each subsequent rank
is called in the form rank(c, p), where p is the result of the rank at the previous level.
Ferragina et al. [FMMN07] described generalized WTs, for instance a multiary WT with
O(log σ/ log log n) traversal time (consult Bowe’s thesis [Bow10] for more information
and a practical evaluation).
3.1.5
FM-index flavors
Multiple flavors of the FM-index were proposed over the years with the goal of decreasing
the query time, e.g., having O(m) time without the dependence on σ, or reducing the
occupied space. The structures which provide asymptotically optimal bounds are often
35
Full-text Indexes
abracadabra
00101010010
{a,b}
abaaaba
0100010
{a}
a
{c,d,r}
rcdr
1011
{b}
b
{c}
{d,r}
rdr
101
c
{d}
d
{r}
r
Figure 3.10: A wavelet tree (WT) over the string abracadabra. The alphabet is
divided into two subsets at each level, with 0 corresponding to one subset and 1 to the
other.
not practical due to the very large constants which are involved [Vig08]. For this reason,
many authors focus on practical performance, and these structures are usually based
on a fast rank operation and take advantage of compressed representations of bit vectors [NM07]. The following paragraphs present selected examples, consult Navarro and
Mäkinen [NM07] for an extensive survey of compressed full-text indexes which discusses
the whole family of FM-indexes.
One of the notable examples where the query time does not depend on σ is the alphabetindependent FM-index by Grabowski et al. [GMN04]. The idea is to first compress the
text using Huffman coding and then apply the BWT transform over it, obtaining a bit
vector v. This vector is then used for searching in a manner corresponding to the FMindex — the array C stores the number of zeros up to a certain position, and the relation
C[c] + rank(T bwt , i, c) is replaced with i − rank(v, i) if c = 0 and n0 − rank(v, n0 ) +
rank(v, i) if c = 1, where n0 is the length of the text compressed with Huffman. The
space complexity is equal to O(n(H0 (T ) + 1)) bits, and the average search time is equal
to O(m(H0 (T ) + 1)) under “reasonable assumptions”.
On the practical front, Grabowski et al. [GRD15] recently described a cache-aligned rank
with 1 cache miss. Moreover, they proposed the so-called FM-dummy index with several
Full-text Indexes
36
variants, for instance one which stores a separate bit vector for each alphabet symbol
(σ vectors in total). Other variants include using certain dense codes as well as using
Huffman-shaped multiary wavelet trees with different arity values. A Huffman-shaped
wavelet tree is unbalanced, and the paths for frequent characters are shorter (which
translates to a smaller number of rank queries on bit vectors). Moreover, the operations
(which are performed in the same manner as for the regular wavelet tree) are faster on
average [CNO14]. They reported search times which are 2–3 times faster than those for
other state-of-the-art methods at the cost of using 1.5–5 times more space.
Data structures which concentrate on reducing space requirements rather than the query
time include the compressed bit vectors from Kärkkäinen et al. [KKP14], where different
compression methods are used for blocks depending on the type of the block, for instance
run-length encoding for blocks with a small number of runs. Another notable example is
a data-aware FM-index by Huo et al. [HCZ+ 15], which encodes the bit vectors (resulting
from the WT) using Gamma coding (a kind of variable-length coding), and thus obtain
one of the best compression ratios in practice.
3.1.5.1
Binary rank
As described in the previous subsection, in order to achieve good overall performance, it is
sufficient to design a data structure which supports an efficient rank query for bit vectors
thanks to the use of a wavelet tree (RRR being a notable example). Jacobson [Jac89]
originally showed that it is possible to obtain a constant-time rank operation using o(n)
extra bits for |v| = n (the same holds for select [Cla96]). Vigna [Vig08] proposed to
interleave (i.e. store next to one another) blocks and superblocks (concepts which were
introduced for the RRR structure) for uncompressed bit vectors in order to reduce the
number of cache and translation lookaside buffer (TLB) misses from 3 to 2. This was
extended by Gog and Petri [GP14], who showed better practical performance by using
a slightly different layout with 64-bit counters. Gonzalez and Navarro [GN09] provided
a discussion of the dynamic scenario where insertions and deletions to the vector are
allowed, and they obtain a space bound of nH0 (v) + o(n log σ) bits and O(log n(1 +
log σ/ log log n)) time for all operations (i.e. queries and updates).
3.1.6
FM-bloated
One of the crucial issues when it comes to the performance of the FM-index is the
number of CPU cache misses which occur during the search. This comes from the fact
that in order to calculate the LF-mapping, non-local access to the BWT sequence is
often required (in the order of Ω(m) misses during the search for a pattern of length m),
37
Full-text Indexes
even for a small alphabet. The problem of cache misses during the FM-index backward
search was identified as the main performance limiter by Chacón et al. [CMEH13], who
proposed to perform the LF-mapping with several symbols at a time (in practice, at most
4 for the 4-symbol DNA alphabet for which the scheme was described). This solution
allowed, for example, to improve the search speed by a factor of 1.5 for the price of
occupying roughly 2 times the size of the 1-step FM-index. Here, we address the problem
of cache misses during the pattern search (count query) in a way related to the Chacón
et al. solution — we also work on q-grams, yet the algorithmic details are different. Two
following subsections describe two variants of our approach, and experimental results can
be found in Section 5.1.
3.1.6.1
Superlinear space
FM-bloated is a variation of the FM-index which aims to speed up the queries at the cost
of additional space. We start by calculating the BWT for the input string in the same
way as for the regular FM-index, however, the difference is that we operate on q-grams
rather than on individual characters, and the count table stores results for each q-gram
sampled from the BWT matrix. This is the case for all q, where q is the power of 2,
up to some predefined value qmax (for instance 128). Namely, for each suffix T [i, n − 1],
we take all q-grams in the following form: T [i − 1] (1-gram), T [i − 2, i − 1] (2-gram),
T [i − 4, i − 1] (4-gram), etc. The q-grams are extracted until we reach qmax or one
of the q-grams contains the terminating character (such a q-gram with the terminating
character is discarded), consult Figure 3.11 for an example. Let Q denote a collection of
all q-grams for all i. For each distinct item s from Q, we create a list Ls of its occurrences
in the sorted suffix order (simply called SA order). This resembles an inverted index on
q-grams, yet the main difference is that the elements in the lists are arranged in SA rather
than the text order, e.g., for the q-gram t in Figure 3.11, the 1-based list of occurrences
corresponding to rows would be as follows: {3, 7}.
row
R1
R2
R3
R4
R5
R6
R7
R8
BWT
$pattern
attern$p
ern$patt
n$patter
pattern$
rn$patte
tern$pat
ttern$pa
q-grams
n, rn, tern
p
t, tt, patt
r, er, tter
e, te, atte
t, at
a, pa
Figure 3.11: Q-gram extraction in the FM-bloated structure with superlinear space
for the text T = pattern$. All q-grams are extracted, i.e. qmax > dn/2e.
Full-text Indexes
38
For a given pattern P , we start the LF-mapping with its longest suffix Ps s.t. |Ps | 6
qmax ∧ |Ps | = 2c for some c ∈ Z. The following backward steps deal with the remaining
prefix of P in a similar way. Note that the number of LF-mapping steps is equal to the
number of 1s in the binary representation of m, i.e. it is in the order of O(log m), and if m
is a power of two, then the result for match and count queries can be reported in constant
time (we simply return |Ls |). When qmax is bigger, the overall index size is bigger,
but the search is faster (for patterns of sufficient length) because it allows for farther
jumps towards the beginning of the pattern. In our representation, each LF-mapping
step translates to performing two predecessor queries on a list Ls . A naive solution is
a binary search with O(log n) worst-case time (or even a linear search, which may be
faster if the list is short), yet the predecessor query can be also handled in O(log log n)
time using a y-fast trie [Wil83]. Hence, the overall average search complexity is equal
to O(m + log m log log n), with O(m/CL + log m log log n) cache misses where CL is the
cache line size in bytes (provided that each symbol from the pattern occupies one byte).
As regards the space complexity, there is a total of n log n q-gram occurrences (log n
q-gram positions for each of n rows of the BWT matrix). Hence, the total length of all
occurrence lists is equal to n log n, and the total complexity is equal to O(n log2 n) bits
(since we need log n bits to store one position from the BWT matrix of n rows).
As regards the implementation (in the C++ language), our focus is on data compaction.
Each q-gram acts as a key in a hash table where collisions are resolved with chaining,
and the q-grams are stored implicitly, i.e. as a (pointer, length) pair, where the pointer
refers to the original string. The values in the hash table include the count and the
list of occurrences which are stored in one, contiguous array. We use a binary search
for calculating rank on lists whose length is greater than or equal to 16 (an empirically
determined value) and a linear search otherwise.
3.1.6.2
Linear space
In this variant, instead of extracting all 1-, 2-, etc, q-grams for each row of the BWT
matrix, we extract only selected q-grams with the help of minimizers (consult Subsection 4.3.1 for the description of minimizers). The first step is to calculate all (α, q)minimizers for the input text T , with some fixed α and q parameters and lexicographic
ordering, where ties are resolved in favor of the leftmost of the smallest substrings. Next,
we store both the count table and the occurrence lists for all single characters in the same
way as for the regular FM-index (using, e.g., a wavelet tree). Moreover, we store information about the counts and occurrences of all q-grams which are located in between
the minimizers from the set M (T ) — these q-grams are referred to as phrases. For the
set of minimizer indexes I(T ), consecutive phrases pi are constructed in the following
39
Full-text Indexes
|I|−1
manner: ∀i=1 pi = T [I[i], I[i + 1] − 1], consult Figure 3.12. It is worth noting that this
approach resembles the recently proposed SamSAMi index, a sampled suffix array on
minimizers [GR14].
T
M
I
Phrases
Phrase ranges
appearance
ap, ar, an
0, 4, 6
appe, ar
[0, 3], [4, 5]
Figure 3.12: Constructing FM-bloated phrases for the text appearance with the use
of (4, 2)-minimizers.
The search proceeds as follows:
1. We calculate all minimizers for the pattern.
2. We search for the pattern suffix PS = P [sr , −1], where sr is the starting position
of the rightmost minimizer using the regular FM-index mechanism, i.e. processing
1 character at a time.
3. We operate on the phrases between the minimizers rather than individual characters and the search for these q-grams is performed in the same way as for the
superlinear variant. If it turns out that the phrase is a 1-gram, a faster FM-index
mechanism for single characters can be used.
4. We search for the pattern prefix PP = P [0, sl − 1], where sl is the starting position
of the leftmost minimizer using the regular FM-index mechanism, i.e. processing 1
character at a time.
The use of minimizers ensures that the phrases are selected from P in the same way
as they are selected from T during the index construction. The overall average search
complexity is equal to O(m log log n) (again, assuming that a y-fast trie [Wil83] is used),
and the space complexity is linear.
3.2
Approximate
Navarro et al. [NBYST01] provided an extensive survey of full-text indexes for approximate string matching. They categorized the algorithms into three categories based on
the search procedure:
Full-text Indexes
40
• Neighborhood generation — all strings in {S : S ∈ Σ∗ ∧ D(S, P ) 6 k} for a
given pattern P are searched for directly.
• Partitioning into exact searching (PiES) — substrings of the pattern are
searched for in an exact manner and these matches are extended into approximate
matches.
• Intermediate partitioning — substrings of the pattern are searched for approximately but with a fewer number of errors. This method lies in between the two
other ones.
In the neighborhood generation approach, we generate the k-neighborhood K of the
pattern, which contains all strings which could be possible matches over a specified
alphabet Σ (if the alphabet is finite, the amount of such strings is finite as well). These
strings can be searched for using any exact index such as a suffix tree or a suffix array. The
main issue is the fact that the size of K grows exponentially, |K| = O(mk σ k ) [Ukk85b],
which means that basically all factors (and especially k) should be small. When the
suffix tree is used as an index for the input text, Cobbs [Cob95] proposed a solution
which reduces the amount of nodes that have to be processed. It runs in O(mq + |o|)
time and occupies O(q) space, where q 6 n (q depends on the problem instance) and |o|
is the size of the output.
When the pattern is partitioned and searched for exactly (PiES), we have to again store
the index which can answer these exact queries. Let us note that this approach is based
on the pigeonhole principle. In the context of approximate string searching this means
that for a given k, at least one of k + 1 parts of average length |P |/(k + 1) must match
the text exactly (more generally, s parts match if k + s parts are created). The value
of k should not be too large, otherwise it could be the case that a substantial part
of the input text has to be verified (especially if the pattern is small). Alternatively,
the pattern can be divided into m − q + 1 overlapping q-grams and these q-grams are
searched for (using the locate query) against the index of q-grams extracted from the
text (see Figure 3.13 for an example of q-gram extraction). These q-grams which are
stored by the index are situated at fixed positions with an interval h and it must hold
that h 6 b(m−k −q +1)/(k +s)c for occurrences of P in T to contain s samples. Sutinen
and Tarhio [ST95] suggested that the optimal value for q is in the order of Θ(logσ m).
If it turns out that the positions of subsequent q-grams may correspond to a match,
explicit verification is performed. Similarly to the k-neighborhood scenario, any index
can be used in order to answer the exact queries. Let us note that this approach with
pattern substring lookup and verification can be also used for exact searching.
Full-text Indexes
41
In the case of intermediate partitioning, we split the pattern into s pieces, and we search
for these pieces in an approximate manner using neighborhood generation. The case
of s = 1 corresponds to pure neighborhood generation, whereas the case of s = k + 1
is almost like PiES. In general, this method requires more searching but less verification when compared to PiES, and thus lies in between the two approaches which were
previously described.
Consult Maaß and Nowak [MN05a] in order to see a detailed comparison of the complexities of modern text indexing methods for approximate matching. Notable structures
from the theoretical point of view include the k-errata trie by Cole et al. [CGL04] which
is based on the suffix tree and the LCP structure (see Subsection 3.1.2.1 for a description
of the LCP). It can be used in various contexts, including full-text and keyword indexing
as well as wildcard matching. For full-text indexing and the k-mismatches problem, it
uses O(n logk n/k!) space and offers O(m + logk n/k! + occ) query time. This was extended by Tsur [Tsu10] who described a structure similar to the one from Cole et al. with
time complexity O(m + log log n + occ) (for constant k) and O(n1+ ) space for a constant
> 0. As regards a solution which is dedicated for the Hamming distance, Gabriele et
al. [GMRS03] provided an index with average search time O(m + occ) and O(n logl n)
space (for some l).
Let us note that these full-text indexes can be usually easily adapted to the keyword
matching scenario which is described in the following chapter.
3.3
Word-based
An interesting category of data structures are word-based indexes, which can be used
for approximate matching and especially sequence alignment. They employ heuristic
approaches in order to speed up the searching, and for this reason they are not guaranteed to find the optimal match. This means that they are also approximate in the
mathematical sense, i.e. they do not return the true answer to the problem. Their popularity is especially widespread in the context of bioinformatics, where the massive sizes of
the databases often force the programmers to use efficient filtering techniques. Notable
examples include BLAST [AGM+ 90] and FASTA [LP85] tools.
3.3.1
BLAST
BLAST stands for Basic Local Alignment Search Tool, and it was published by Altschul
et al. [AGM+ 90] in 1990 with the purpose of comparing biological sequences (see Subsection 1.1.2 for more information about biological data). The name may refer to the
42
Full-text Indexes
algorithm or to the whole suite of string searching tools for bioinformatics which are based
on the said algorithm. BLAST relies heavily on various heuristics and for this reason it
is highly domain specific. In fact there exist various flavors of BLAST for different data
sets, for instance one for protein data (blastp) and one for the DNA (blastn). Another
notable modification is the PSI-BLAST which is combined with dynamic programming
in order to identify distant protein relationships.
The basic algorithm proceeds as follows:
1. Certain regions are removed from the pattern. These include repeated substrings
and regions of low complexity (measured statistically using, e.g., DUST for DNA
[MGSA06]).
2. We create a set Q containing q-grams with overlaps (that is all available q-grams,
see Figure 3.13) which are extracted from the pattern. Each s ∈ Q is scored against
all possible q-grams (these can be precomputed) and ones with the highest scores
are retained creating a candidate set QC .
3. Each word from QC is searched for in an exact manner against the database (using
for instance an inverted index, see Subsection 4.1.2). These exact matches create
the seeds which are later used for extending the matches.
4. The seeds are extended to the left and to the right as long as the alignment score
is increasing.
5. Alignment significance is assessed using domain-specific statistical tools.
size
2
3
4
5
q-grams
te, ex, xt, ti, in, ng
tex, ext, xti, tin, ing
text, exti, xtin, ting
texti, extin, xting
Figure 3.13: Selecting all overlapping q-grams (with the shift of 1) from the text
T = texting. It must always hold that q 6 |T |.
In general, BLAST is faster than other alignment algorithms such as the SW algorithm
(see Subsection 2.2.2) due to its heuristic approach. However, this comes at a price of reduced accuracy, and Shpaer et al. [SRY+ 96] state that there is a substantial chance that
BLAST will miss a distant sequence similarity. Moreover, hardware-oriented implementations of the SW have been created, and in certain cases they can match the performance
of BLAST [MV08]. Still, BLAST is currently the most common tool for sequence alignment using massive biological data, and it is openly available via its website [BLA], which
means that it can be conveniently run without consuming local resources.
Chapter 4
Keyword Indexes
Keywords indexes operate on individual words rather than the whole input string. Formally, for a collection D = {d1 , . . . , dx } of x strings (words, q-grams) of total length n
over a given alphabet Σ, I(D) is a keyword index supporting matching with a specified
distance D. For any query pattern P , it returns all words d from D s.t. D(P, d) 6 k
(with k = 0 for exact matching). Approximate dictionary matching was introduced by
Minsky and Papert in 1969 [MP69, CGL04].
In the following sections, we describe algorithms from this category, divided into exact
(Section 4.1) and approximate ones (Section 4.2). Our contribution in this field is presented in Subsection 4.2.3, which describes an index for approximate matching with few
mismatches (especially 1 mismatch).
4.1
Exact
If the goal were to support only the match query for a finite number of keywords, we
could use any efficient set data structure such as a hash table or a trie (see Subsections 1.2.3 and 1.2.2.2) in order to store all those keywords. Boytsov [Boy11] reported
that depending on the data set, either one of these two may be faster. In order to reduce
space requirements we could use minimal perfect hashing (see Subsection 1.2.3), and we
could also compress the entries in the buckets.
4.1.1
Bloom filter
Alternatively, we could provide only approximate answers (in a mathematical sense) in
order to occupy even less space. A relevant data structure is the Bloom filter (BF) [Blo70],
43
44
Keyword Indexes
which is a space-efficient, probabilistic data structure with possible false positive matches,
but no false negatives and an adjustable error rate. The BF uses a bit vector A of size n,
where no bits are initially set. Each element e is hashed with k different hash functions Hi
in the form H(e) = i, where i ∈ Z ∧ 0 6 i < n, and ∀ki=1 A[Hi (e)] = 1. When the lookup
is performed, the queried element is hashed with the same functions and it is checked
whether A[i] = 1 for all i, and if that is the case a possible match is reported (consult
Figure 4.1). Broder and Mitzenmacher [BM04] provided the following formula for the
expected false positive rate: FP = 0.5k > 0.5m ln 2/n , where m is the size of the filter in
bits and n is the number of elements. They note that for example when m = 8n, the false
positive probability is slightly above 0.02. Recently, Fan et al. [FAKM14] described a
structure based on cuckoo hashing which takes even less space than the BF and supports
deletions (unlike the BF).
{x, y, z}
0
1
0
1
1
1
0
0
0
0
0
1
0
1
0
0
1
0
w
Figure 4.1: A Bloom filter (BF) for approximate membership queries with n = 18
and k = 3, holding the elements from the set {x, y, z}. The element w is not in the set
since H2 (w) = 15 and A[15] = 0; reproduced from Wikimedia Commons1 .
4.1.2
Inverted index
An inverted index is a keyword index which contains a mapping from words d ∈ D to the
lists which store all positions pi of their occurrences in the text (d → p1 , . . . , pn ). These
positions can be for instance indexes in a string of characters, or if a more coarse-grained
approach were sufficient, they could identify individual documents or databases. See
Figure 4.2 for an example with a single input string. The positions allow a search on the
whole phrase (i.e. multiple words) by searching for each word separately and checking
whether the positions describe consecutive words in the text (that is by looking for list
intersections with a shift). It could be also used for searching for a query which may cross
the boundaries of the words by searching for substrings of a pattern and comparing the
respective positions (consult Section 4.3 for more information). This means that the goal
of an inverted index is to support various kinds of queries (e.g., locate, see Section 2.1)
efficiently.
1
David Eppstein, available at http://en.wikipedia.org/wiki/Bloom_filter#/media/
File:Bloom_filter.svg, in public domain.
45
Keyword Indexes
Word
This
is
a
banana
Occurrence list
0
12
15
5, 17
Figure 4.2: An inverted index which stores a mapping from words to their positions
(0-based) in the text “This banana is a banana”.
Main advantage of the inverted index are fast single-word queries, which can be answered
in constant average time using for example a hash table (an inverted index is a rather
generic idea, which means that it could be also implemented with other data structures
such as binary trees). On the other hand, there is a substantial space overhead (in the
order of O(n)) and the original string has to be stored as well. For this reason, one of the
key challenges for inverted indexes is how to succinctly represent the lists of positions
while still allowing fast access. Multiple methods were proposed, and they are often
combined with one other [AM05].
The most popular one is to store gaps, that is differences between subsequent positions.
For the index in Figure 4.2, the list for banana would be equal to {5, 12} instead of {5, 17}
(17 − 5 = 12). The values of the gaps are usually smaller than the original positions and
for this reason they can stored using a fewer amount of bits. Another popular approach
is to use byte-aligned coding. Here, each byte contains a one-bit flag which is set if the
number is bigger or equal to 27 (that is when it does not fit into 7 bits), and the other
seven bits are used for the data. If the number does not fit, 7 least-significant bits are
stored in the original byte, and the algorithm tries to store the remaining bits in the
next byte, proceeding until the whole number has been exhausted. In order to reduce
the average length (in bits) of the occurrence list, one could also divide the original
text into multiple blocks of fixed size. Instead of storing exact positions only block
indexes are stored, and after the index is retrieved the word is searched for explicitly
within the block [MW94b]. If the size of the data is so massive that it is infeasible to
construct a single index (as is often the case for web search engines), sometimes only
the most relevant data is selected for being stored in the index (thus forming a pruned
index) [NC07].
4.2
Approximate
Boytsov [Boy11] presented an extensive survey of keyword indexes for approximate
searching (including a practical evaluation). He divided the algorithms into two following categories:
46
Keyword Indexes
• Direct methods — like neighborhood generation (see Section 3.2), where certain
candidates are searched for exactly.
• Sequence-based filtering methods — the dictionary is divided into many (disjoint or overlapping) clusters. During the search, a query is assigned to one or
several clusters containing candidate strings and thus an explicit verification is
performed only on a fraction of the original dictionary.
Notable results from the theoretical point of view include the k-errata trie by Cole
et al. [CGL04] which was already mentioned in the previous chapter. For the Hamk
ming distance and dictionary matching, it uses O(n + d (logk!d) ) space and offers O(m +
(log d)k
k!
log log n + occ) query time, where d = |D| (this also holds for the edit distance
but with larger constants). Another theoretical work describing the algorithm which is
similar to our split index (which we describe in Subsection 4.2.3) was given by Shi and
Widmayer [SW96], who obtained O(n) preprocessing time and space complexity and
O(n) expected time if k is bounded by O(m/ log m). They introduced the notion of
home strings for a given q-gram, which is the set of strings in D that contain the q-gram
in the exact form (the value of q is set to |P |/(k + 1)). In the search phase, they partition
P into k + 1 disjoint q-grams and use a candidate inspection order to speed up finding
the matches with up to k edit distance errors.
On the practical front, Bocek et al. [BHSH07] provided a generalization of the Mor–
Fraenkel (MF) [MF82] algorithm for k > 1 which is called FastSS. To check if two strings
S1 and S2 match with up to k errors, we first delete all possible ordered subsets of k 0
symbols for all 0 6 k 0 6 k from S1 and S2 . Then we conclude that S1 and S2 may be
in edit distance at most k if and only if the intersection of the resulting lists of strings is
non-empty (explicit verification is still required). For instance, if S1 = abbac and k = 2,
then its neighborhood is as follows: abbac, bbac, abac, abac, abbc, abba, abb, aba, abc,
aba, abc, aac, bba, bbc, bac and bac (of course, some of the resulting strings are repeated
and they may be removed). If S2 = baxcy, then its respective neighborhood for k = 2 will
contain, e.g., the string bac, but the following verification will show that S1 and S2 are
in edit distance greater than 2. If, however, Lev(S1 , S2 ) 6 2, then it is impossible not to
have in the neighborhood of S2 at least one string from the neighborhood of S1 , hence we
will never miss a match. The lookup requires O(kmk log nk ) time (where m is the average
word length from the dictionary) and the index occupies O(nk ) space. Another practical
filter was presented by Karch et al. [KLS10] and it improved on the FastSS method.
They reduced space requirements and query time by splitting long words (similarly to
FastBlockSS which is a variant of the original method) and storing the neighborhood
implicitly with indexes and pointers to original dictionary entries. They claimed to be
faster than other approaches such as the aforementioned FastSS and the BK-tree [BK73].
Keyword Indexes
47
Recently, Chegrane and Belazzougui [CB14] described another practical index and they
reported better results when compared to Karch et al. Their structure is based on the
dictionary by Belazzougui [Bel09] for the edit distance of 1 (see the following subsection).
An approximate (in the mathematical sense) data structure for approximate matching
which is based on the Bloom filter (see Subsection 4.1.1) was also described [MW94a].
4.2.1
The 1-error problem
It is important to consider methods for detecting a single error, since over 80% of errors (even up to roughly 95%) are within k = 1 for the edit distance with transpositions [Dam64, PZ84]. Belazzougui and Venturini [BV12] presented a compressed index
whose space is bounded in terms of the k-th order empirical entropy of the indexed dictionary. It can be based either on perfect hashing, having O(m + occ) query time or
on a compressed permuterm index with O(m min(m, logσ n log log n) + occ) time (when
σ = logc n for some constant c) but improved space requirements. The former is a
compressed variant of a dictionary presented by Belazzougui [Bel09] which is based on
neighborhood generation and occupies O(n log σ) space and can answer queries in O(m)
time. Chung et al. [CTW14] showed a theoretical work where external memory is used,
and their focus is on I/O operations. They limited the number of these operations to
O(1 + m/wB + occ/B), where w is the size of the machine word and B is the number of
words within a block (a basic unit of I/O), and their structure occupies O(n/B) blocks.
In the category of filters, Mor and Fraenkel [MF82] described a method which is based
on the deletion-only 1-neighborhood.
For the 1-mismatch problem, Yao and Yao [YY95] described a data structure for binary strings of fixed length m with O(m log log |D|) query time and O(|D|m log m) space
requirements. This was later improved by Brodal and Gąsieniec [BG96] with a data
structure with O(m) query time which occupies O(n) space. This was improved with a
structure with O(1) query time and O(|D| log m) space in the cell probe model (where
only memory accesses are counted) [BV00]. Another notable example is a recent theoretical work of Chan and Lewenstein [CL15], who introduced the index with the optimal
query time, i.e. O(m/w+occ), which uses additional O(wd log1+ d) bits of space (beyond
the dictionary itself), assuming a constant-size alphabet.
4.2.2
Permuterm index
A permuterm index is a keyword index which supports queries with one wildcard symbol [Gar76]. The idea is store all rotations of a given word appended with the terminating
Keyword Indexes
48
character, for instance for the word text, the index would consist of the following permuterm vocabulary: text$, ext$t, xt$te, t$tex, $text. When it comes to searching, the query is first rotated so that the wildcard appears at the end, and subsequently
its prefix is searched for using the index. This could be for example a trie, or any other
data structure which supports a prefix lookup.
The main problem with the standard permuterm index is its space usage, as the number of strings inserted into the data structure is the number of words multiplied by
the average string length. Ferragina and Venturini [FV10] proposed a compressed permuterm index in order to overcome the limitations of the original structure with respect
to space. They explored the relation between the permuterm index and the BWT (see
Subsection 3.1.4.1), which is applied to the concatenation of all strings from the input
dictionary, and they provided a modification of the LF-mapping known from FM-indexes
in order to support the functionality of the permuterm index.
4.2.3
Split index
One of the practical approximate indexes was described by Cisłak (thesis author) and
Grabowski [CG15]. Experimental results for this structure can be found in Section 5.2.
As indexes supporting approximate matching tend to grow exponentially in k, the maximum number of allowed errors, it is also a worthwhile goal to design efficient indexes
supporting only a small k. For this reason, we focus on the problem of dictionary matching with few mismatches, especially one mismatch, where Ham(di , P ) 6 k for a collection
of words d ∈ D, a pattern P , and the Hamming distance Ham. The algorithm that we
are going to present is uncomplicated and based on the Dirichlet principle, ubiquitous
in approximate string matching techniques. We partition each word d into k + 1 disjoint
pieces p1 , . . . , pk+1 , of average length |d|/(k + 1) (hence the name “split index”), and
each such piece acts as a key in a hash table HT . The size of each piece pi of word d
is determined using the following formula: |pi | = b|d|/(k + 1)e (or |pi | = b|d|/(k + 1)c,
P
depending on the practical evaluation) and |pk+1 | = |d| − ki=1 |pi |, i.e. the piece size is
rounded to the nearest integer and the last piece covers the characters which are not in
other pieces. This means that the pieces might be in fact unequal in length, e.g., 3 and
2 for |d| = 5 ∧ k = 1. The values in HT are the lists of words which have one of their
pieces as the corresponding key. In this way, every word occurs on exactly k + 1 lists.
This seemingly bloats the space usage, still, in the case of small k the occupied space is
acceptable. Moreover, instead of storing full words on the respective lists, we only store
their “missing” prefix or suffix. For instance for the word table and k = 1, we would
Keyword Indexes
49
have a relation tab → le on one list (i.e. tab would be the key and le would be the
value) and le → tab on the other.
In the case of k = 1, we first populate each list with the pieces without the prefix and
then with the pieces without the suffix; additionally we store the position on the list (as
a 16-bit index) where the latter part begins. In this way, we traverse only a half of a
list on average during the search. We can also support k larger than 1 — in this case,
we ignore the piece order on a list, and we store dlog2 (k + 1)e bits with each piece that
indicate which part of the word is the list key. Let us note that this approach would also
work for k = 1, however, it turned out to be less efficient.
As regards the implementation (in the C++ language), our focus is on data compactness.
In the hash table, we store the buckets which contain word pieces as keys (e.g., le) and
pointers to the lists which store the missing pieces of the word (e.g., tab, ft). These
pointers are always located right next to the keys, which means that unless we are
very unlucky, a specific pointer should already be present in the CPU cache during the
traversal. The memory layouts of these substructures are fully contiguous. Successive
strings are represented by multiple characters with a prepended 8-bit counter which
specifies the length, and the counter with the value 0 indicates the end of the list.
During the traversal, each length can be compared with the length of the piece of the
pattern. As mentioned before, the words are partitioned into pieces of fixed length. This
means that on average we calculate the Hamming distance for only half of the pieces
on the list, since the rest can be ignored based on their length. Any hash function for
strings can be used, and two important considerations are the speed and the number of
collisions, since a high number of collisions results in longer buckets, which may in turn
have a negative effect on the query time (this subject is explored in more detail along
with the results in Chapter 5). Figure 4.3 illustrates the layout of the split index.
The preprocessing stage proceeds as follows:
1. Duplicate words are removed from the dictionary D.
The following steps refer to each word d from D:
2. The word d is split into k + 1 pieces.
3. For each piece pi : if pi ∈
/ HT , we create a new list ln containing the missing pieces
(later simply referred to as a missing piece; in the case of k = 1, this is always one
contiguous piece) P = {pj : j ∈ [1, k + 1] ∧ j 6= i} and add it to the hash table (we
append pi and the pointer to ln to the bucket). Otherwise, if pi ∈ HT , we append
the missing pieces P to the already existing list li .
Keyword Indexes
50
Figure 4.3: Split index for keyword indexing which shows the insertion of the word
table for k = 1. The index also stores the words left and tablet (only selected lists
containing pieces of these two words are shown), and L1 and L2 indicate pointers to
the respective lists. The first cell of each list indicates a 1-based word position (i.e. the
word count from the left) where the missing prefixes begin (k = 1, hence we deal with
two parts, namely prefixes and suffixes), and 0 means that the list has only missing
suffixes. Adapted from Wikimedia Commons1 .
As regards the search:
1. The pattern P is split into k + 1 pieces.
2. We search for each piece pi (the prefix and the suffix if k = 1): the list li is retrieved
from the hash table or we continue if pi ∈
/ HT . We traverse each missing piece pj
from li . If |pj | = |P | − |pi |, the verification is performed and the result is returned
if Ham(pj , P − pi ) 6 k.
3. The pieces are combined into one word in order to form the answer.
1
Jorge Stolfi, available at http://en.wikipedia.org/wiki/File:Hash_table_3_1_1_0_1_
0_0_SP.svg, CC A-SA 3.0.
Keyword Indexes
4.2.3.1
51
Complexity
P|D|
Let us consider the average word length |d|, where |d| = ( i=1 |di |)/|D|. The average
time complexity of the preprocessing stage is equal to O(kn), where k is the allowed
number of errors, and n is the total input dictionary size (i.e. the length of the concateP|D|
nation of all words from D, n = i=1 |di |). This is because for each word and for each
piece pi we either add the missing pieces to a new list or append them to the already
existing one in O(|d|) time (let us note that |D| · |d| = n). We assume that adding a new
element to the bucket takes constant time on average, and the calculation of all hashes
takes O(n) time in total. This is true irrespective of which list layout is used (there are
two layouts for k = 1 and k > 1, see the preceding paragraphs). The occupied space is
equal to O(kn), because each piece appears on exactly k lists and in exactly 1 bucket.
The average search complexity is equal to O(kt), where t is the average length of the
list. We search for each of k + 1 pieces of the pattern of length m, and when the
list corresponding to the piece p is found, it is traversed and at most t verifications
are performed. Each verification takes at most O(min(m, |dmax |)) time where dmax is
the longest word in the dictionary (or O(k) time, in theory, using the old technique
from Landau and Vishkin [LV89], after O(n log σ)-time preprocessing), but O(1) time
on average. Again, we assume that determining a location of the specific list, that is
iterating a bucket, takes O(1) time on average. As regards the list, its average length t is
higher when there is a higher probability that two words d1 and d2 from D have two parts
of the same length l which match exactly, i.e. P r(d1 [s1 , s1 + l − 1] = d2 [s2 , s2 + l − 1]).
Since all words are sampled from the same alphabet Σ, t depends on the alphabet size,
that is t = f (σ). Still, the dependence is rather indirect; in real-world dictionaries which
store words from a given language, t will be rather dependent on the k-th order entropy
of the language.
4.2.3.2
Compression
In order to reduce storage requirements, we apply a basic compression technique. We
find the most frequent q-grams in the word collection and replace their occurrences on
the lists with unused symbols, e.g., byte values 128, . . . , 255. The values of q can be
specified at the preprocessing stage, for instance q = 2 and q = 4 are reasonable for
the English alphabet and DNA, respectively. Different q values can be also combined
depending on the distribution of q-grams in the input text, i.e. we may try all possible
combinations of q-grams up to a certain q value and select ones which provide the best
compression. In such a case, longer q-grams should be encoded before shorter ones. For
example, a word compression could be encoded as #p*s\ using the following substitution
Keyword Indexes
52
list: com → #, re → *, co → $, om → &, sion → \ (note that not all q-grams from the
substitution list are used). Possibly even a recursive approach could be applied, although
this would certainly have a substantial impact on the query time. See Section 5.2 for the
experimental results and a further discussion.
The space usage could be further reduced by the use of a different character encoding.
For the DNA (assuming 4 symbols only) it would be sufficient to use 2 bits per character,
and for the basic English alphabet 5 bits. In the latter case there are 26 letters, which in
a simplified text can be augmented only with a space character, a few punctuation marks,
and a capital letter flag. Such an approach would be also beneficial for space compaction,
and it could have a further positive impact on cache usage. The compression naturally
reduces the space while increasing the search time, and a sort of a middle ground can
be achieved by deciding which additional information to store in the index. This can
be for instance the length of an encoded (compressed) piece after decoding, which could
eliminate some pieces based on their size without performing the decompression and
explicit verification.
4.2.3.3
Parallelization
The algorithm could be sped up by means of parallelization, since index access during the
search procedure is read-only. In the most straightforward approach, we could simply
distribute individual queries between multiple threads. A more fine-grained variation
would be to concurrently operate on word pieces after the word has been split up (with
the number of pieces being dependent on the k parameter). We could even access in
parallel the lists which contain missing pieces (prefixes and suffixes for k = 1), although
the gain would be probably limited since these lists usually store at most a few words.
If we had a sufficient amount of threads at our disposal, these approaches could be
combined. Still, it is to be noted that the use of multiple threads has a negative effect
on cache utilization.
4.2.3.4
Inverted split index
The split index could be extended in order to include the functionality of an inverted
index for approximate matching. As mentioned in Subsection 4.1.2, the inverted index
could be in practice any data structure which supports an efficient word lookup. Let us
consider the compact list layout of the split index presented in Figure 4.3, where each
piece is located right next to other pieces. Instead of storing only the 8-bit counter which
specifies the length of the piece, we could also store (right next to this piece) its position
in the text. Such an approach would increase the average length of the list only by
Keyword Indexes
53
constant factor and it would not break the contiguity of the lists, while also keeping the
O(kn) space complexity. Moreover, the position should be already present in the CPU
cache during the list traversal.
4.3
Keyword selection
Keyword indexes can be also used in the scenario where there are no explicit boundaries
between the words. In such a case, we would like to select the keywords according to
a well-defined set of rules and form a dictionary D from the input text T . Such an
index which stores q-grams sampled from the input text may be referred to as a q-gram
index. It is useful for answering keyword rather than full-text queries, which might be
required for example due to time requirements (i.e. when we would like to trade space
for speed). Examples of the input which cannot be easily divided into words include
some natural languages (e.g., Chinese) where it is not possible to clearly distinguish the
words (their boundaries depend on the context) or other kinds of data such as a complete
genome [KWLL05].
Let us consider the input text T which is divided into n − q + 1 q-grams. The issue
lies in the amount of space which is occupied by all q-gram tuples (s, li ), where s is
the q-gram and li identifies its positions, which is in the order of O(n) or O(nqmax )
for all possible q-grams up to some qmax value. General compression techniques are
usually not sufficient and thus a dedicated solution is required. This is especially the
case in the context of bioinformatics where data sets are substantial; the applications
could be for instance retrieving the seeds in the seed-and-extend algorithm described in
Section 3.3. One of the approaches was proposed by Kim et al. [KWLL05], and it aims to
eliminate the redundancy in position information. Consecutive q-grams are grouped into
subsequences, and each q-gram is identified by the position of the subsequence within the
documents and the position of a q-gram within the subsequence, which forms a two-level
index structure. This concept was also extended by the original authors to include the
functionality of approximate matching [KWL07].
4.3.1
Minimizers
The idea of minimizers was introduced by Roberts et al. [RHH+ 04] (with applications in, e.g., genome sequencing with de Bruijn graphs [CLJ+ 14] and k-mer counting [DKGDG15]), and it consists in storing only selected rather than all q-grams from
the input text. Here, the goal is to choose such q-grams from a given string S (a set
M (S)), so that for two strings S1 and S2 , if it holds for a pattern P that P ⊂ S1 ∧P ⊂ S2
54
Keyword Indexes
and |P | is above some threshold, then it should also hold that |M (S1 ) ∩ M (S2 )| > 1. In
order to find a (α, q)-minimizer, we slide a window of length q + α − 1 (α consecutive
q-grams) over T , shifting it by 1 character at a time, and at each window position we
select a q-gram which is the smallest one lexicographically (ties may be resolved for instance in favor of the leftmost of the smallest substrings). Figure 4.4 demonstrates this
process.
T
W1
W2
W3
W4
t
t
e
e
e
x
x
x
x
t
t
t
t
t
i
n
g
i
i
i
n
n
g
Figure 4.4: Selecting (3, 2)-minimizers (underlined), that is choosing 2-grams while
sliding a window of length 4 (3 + 2 − 1 = 4) over the text texting. The results belong
to the following set: {ex, in}.
Let us repeat an important property of the minimizers which makes them useful in
practice. If for two strings S1 and S2 it holds that P ⊂ S1 ∧ P ⊂ S2 ∧ |P | > q + α − 1,
then it is guaranteed that S1 and S2 share an (α, q)-minimizer (because they share one
full window). This means that for certain applications we can still ensure that no exact
matches are overlooked by storing the minimizers rather than all q-grams.
4.4
String sketches
We introduce the concept of string sketches, whose goal is to speed up string comparisons
at the cost of additional space. For a given string S, a sketch S 0 is constructed as
S 0 = f (S) using some function f which returns a fixed-sized block of data. In particular,
for two strings S1 and S2 , we would like to determine with certainty that S1 6= S2 or
Ham(S1 , S2 ) > k when comparing only sketches S10 and S20 . There exists a similarity
between sketches and hash functions, however, hash comparison would work only in the
context of exact matching. When the sketch comparison is not decisive, we still have
to perform an explicit verification on S1 and S2 , but the sketches allow for reducing
the number of such verifications. Since the sketches refer to individual words, they are
relevant in the context of keyword indexes. Assuming that each word d ∈ D is stored
along with d0 , sketches could be especially useful if the queries are known in advance or
|D| is relatively high, since sketch calculation might be time-consuming.
Sketches use individual bits in order to store information about q-gram frequencies in
the string. Various approaches exist, and main properties of the said q-grams include:
Keyword Indexes
55
• Size — for instance individual letters (1-grams) are sensible for the English alphabet but pairs (2-grams) might be better for the DNA.
• Frequency — we can store binary information in each bit that indicates whether a
certain q-gram appears in the string (8 q-grams in total for a 1-byte sketch, we call
this approach an occurrence sketch), or we can store their count (at most 3) using
2-bits per q-gram (4 q-grams in total for a 1-byte sketch, we call this approach a
count sketch).
• Selection — which q-grams should be included in the sketches. These could be
for instance q-grams which occur most commonly in the sample text.
For instance, let us consider an occurrence sketch which is built over 8 most common
letters of the English alphabet, namely {e, t, a, o, i, n, s, h} (consult Appendix E to see
the frequencies). For the word instance, the 1-byte sketch where each bit corresponds
to one of the letters from the aforementioned set would be as follows: 11101110.
We can quickly compare two sketches by taking a binary xor operation and counting
the number of bits which are set in the result (calculating the Hamming weight, HW ).
Note that HW can be determined in constant time using a lookup table of size 28n
bytes, where n is the sketch size in bytes. We denote the sketch difference with HS ,
and HS = HW (S10 ⊕ S20 ). Let us note that HS does not determine the number of
mismatches, for instance for S1 = run and S2 = ran, HS (S1 , S2 ) might be equal to 2
(occurrence differences in a and u) but there is still only one mismatch. On the other
extreme, for two strings of length n where each string consists of a repeated occurrence
of one different letter, HS might be equal to 1, but the number of mismatches is n. In
general, HS can be used to provide a lower bound on the true number of errors. For
sketches which record information about single characters (1-grams), the following holds:
Ham(S1 , S2 ) > dHS (S10 , S20 )/2e (the right-hand side can be calculated quickly using a
lookup table, since 0 6 HS 6 8). The true number of mismatches is underestimated
especially by count sketches, since we calculate the Hamming weight instead of comparing
the counts. For instance, for the count of 3 (bits 11) and the count of 1 (bits 01), the
difference is 1 instead of 2. Still, even though the true error is higher than HS , sketches
can be used in order to speed up the comparisons because certain strings will be compared
(and rejected) in constant time using fast bitwise operations and array lookups. As
regards the space overhead incurred by the sketches, it is equal to O(|D| + σ), since we
have to store one constant-size sketch per word together with the lookup tables which
are used to speed up the processing. Consult Section 5.3 in order to see the experimental
results.
Chapter 5
Experimental Results
The results were obtained on the machine with the following specifications:
• Processor — Intel i5-3230M running at 2.6 GHz
• RAM — 8 GB DDR3 memory
• Operating system — Ubuntu 14.04 64-bit (kernel version 3.16.0-41)
Programs were written in the C++ programming language (with certain prototypes in
the Python language) using features from the C++11 standard [cpp11]. They use the
C++ Standard Library, Boost libraries (version 1.57) [Kar05], and Linux system libraries.
Correctness was analyzed using Valgrind [NS03], a tool for error checking and profiling
(no errors or memory leaks were reported). The source code was compiled (as a 32-bit
version) with clang compiler v. 3.4-1, which turned out to be produce a slightly faster
executable than the gcc when checked under the -O3 optimization flag.
5.1
FM-bloated
For the description of the FM-bloated structure consult Subsection 3.1.6. Here, we
present experimental results for the superlinear index version. As regards the hash
function, xxhash was used (available on the Internet, consult Appendix F), and the load
factor was equal to 2.81.
The length of the pattern has a crucial impact on the search time, since the number
LF-mapping steps is equal the number of 1s in the binary representation of m. This
means that the search will be the fastest for m in the form 2c (constant time for m up
56
57
Experimental Results
to a certain maximum value) and the slowest for m in the form 2c − 1, where c ∈ Z. We
can see in Figure 5.1 that the query time also generally decreases as the pattern length
increases, mostly due to the fact that the times are given per character. The results are
the average times calculated for one million queries which were extracted from the input
text.
160
Query time per char (ns)
140
120
100
80
60
40
20
0
0
20
40
60
80
Pattern length
100
120
140
Figure 5.1: Query time per character vs pattern length (16, 20, 22, 24, 31, 32, 64, 80,
82, 85, 90, 100, 102, 126, 127, and 128) for the English text of size 30 MB. Let us point
out notable differences between pattern lengths 31 and 32, and 127 and 128.
We also compare our approach with other FM-index-based structures (consult Figure 5.2). We used the implementations from the sdsl library [GBMP14] (available on
the Internet [sds]) and the implementations of FM-dummy structures by Grabowski et
al. [GRD15] (available on the Internet [ran]). As regards the space, the FM-bloated structure (just as the name suggests) is roughly two order of magnitude bigger than other
indexes. The index size for other methods ranged from approximately 0.6n to 4.25n,
where n is the input text size. FM-bloated, on the other hand, occupied the amount of
space equal to almost 85n (for qmax = 128).
5.2
Split index
In this section we present the results which appeared in a preprint by Cisłak (thesis
author) and Grabowski [CG15]. For the description of the split index consult Subsection 4.2.3.
58
Experimental Results
FM-bloated superlinear
FM-index Huffman WT
CSA compressed bit vector
FM-dummy 2 256c
FM-dummy WT4 512
Query time per char (ns)
104
103
102
101
20
40
60
80
Pattern length
100
120
Figure 5.2: Query time per character vs pattern length (16, 24, 64, 80, and 120) for
different methods for the English text of size 30 MB. Note the logarithmic y-scale.
One of the crucial components of the split index is a hash function. Ideally, we would
like to minimize the average length of the bucket (let us recall that we use chaining for
collision resolution), however, the hash function should be also relatively fast because
it has to be calculated for each of k + 1 parts of the pattern (of total length m). We
investigated various hash functions, and it turned out that the differences in query times
are not negligible, although the average length of the bucket was almost the same in
all cases (relative differences were smaller than 1%). We can see in Table 5.1 that the
fastest function was the xxhash (available on the Internet, consult Appendix F), and for
this reason it was used for the calculation of other results.
Hash function
xxhash
sdbm
FNV1
FNV1a
SuperFast
Murmur3
City
FARSH
SpookyV2
Farm
Query time (µs)
0.93
0.95
0.95
0.95
0.96
0.97
0.99
1.00
1.04
1.04
Table 5.1: Evaluated hash functions and search times per query for the English
dictionary of size 2.67 MB and k = 1. A list of common English misspellings was used
as queries, max LF = 2.0.
59
Experimental Results
Decreasing the value of the load factor did not strictly provide a speedup in terms of the
query time, as demonstrated in Figure 5.3. This can be explained by the fact that even
though the relative reduction in the number of collisions was substantial, the absolute
difference was equal to at most a few collisions per list. Moreover, when the LF was
higher, pointers to the lists could be possibly closer to each other, which might have had
a positive effect on cache utilization. The best query time was reported for the maximum
LF value of 2.0, hence this value was used for the calculation of other results.
1.00
0.98
0.96
0.94
Index size (MB)
Query time ( s)
1.02
0
1
2
3
6.2
6.0
5.8
5.6
5.4
5.2
5.0
0
1
2
3
4
5
6
7
8
4
5
6
7
8
Load factor
Load factor
Figure 5.3: Query time and index size vs the load factor for the English dictionary
of size 2.67 MB and k = 1. A list of common English misspellings was used as queries.
The value of LF can be higher than 1.0 because we use chaining for collision resolution.
In Table 5.2 we can see a linear increase in the index size and an exponential increase
in query time with growing k. Even though we concentrate on k = 1 and the most
promising results are reported for this case, our index might remain competitive also for
higher k values.
k
1
2
3
Query time (µs)
0.51
11.49
62.85
Index size (KB)
1,715
2,248
3,078
Table 5.2: Query time and index size vs the error value k for the English language
dictionary of size 0.79 MB. A list of common English misspellings was used as queries.
Q-gram substitution coding provided a reduction in the index size, at the cost of increased
query time. Q-grams were generated separately for each dictionary D as a list of 100
60
Experimental Results
q-grams which provided the best compression for D, i.e. they minimized the size of
P|D|
all encoded words, SE =
i=1 |Enc(di )|. For the English language dictionaries, we
also considered using only 2-grams or only 3-grams, and for the DNA only 2-grams (a
maximum of 25 2-grams) and 4-grams, since mixing the q-grams of various sizes has a
further negative impact on the query time. For the DNA, 5,000 queries were generated
randomly by introducing noise into words sampled from dictionary, and their length was
equal to the length of the particular word. Up to 3 errors were inserted, each with a 50%
probability. For the English dictionaries we opted for the list of common misspellings,
and the results were similar to the case of randomly generated queries. The evaluation
was run 100 times and the results were averaged.
We can see the speed-to-space relation for the English dictionaries in Figure 5.4 and for
the DNA in Figure 5.5. In the case of English, using the optimal (from the compression
point of view, i.e. minimizing the index size) combination of mixed q-grams provided almost the same index size as using only 2-grams. Substitution coding methods performed
better for the DNA (where σ = 5) because the sequences are more repetitive. Let us note
that the compression provided a higher relative decrease in index size with respect to
the original text as the size of the dictionary increased. For instance, for the dictionary
of size 627.8 MB the compression ratio was equal to 1.93 and the query time was still
Index size (MB)
Query time ( s)
around 100 µs. Consult Appendix C for more information about the compression.
7
6
5
4
3
2
1
0
12
10
8
6
4
2
0
1
2
3
4
5
6
3
4
5
6
Dictionary size (MB)
No q-grams
2-grams
3-grams
Mixed q-grams
1
2
Dictionary size (MB)
Figure 5.4: Query time and index size vs dictionary size for k = 1, with and without
q-gram coding. Mixed q-grams refer to the combination of q-grams which provided the
best compression, and for the three dictionaries these were equal to ([2-, 3-, 4-] grams):
[88, 8, 4], [96, 2, 2], and [94, 4, 2], respectively. English language dictionaries and the
list of common English misspellings were used.
61
Index size (MB)
Query time ( s)
Experimental Results
120
100
80
60
40
20
0
800
700
600
500
400
300
200
100
0
0
100
200
300
400
500
600
300
400
500
600
Dictionary size (MB)
No q-grams
2-grams
4-grams
Mixed q-grams
0
100
200
Dictionary size (MB)
Figure 5.5: Query time and index size vs dictionary size for k = 1, with and without
q-gram coding. Mixed q-grams refer to the combination of q-grams which provided
the best compression, and these were equal to ([2-, 3-, 4-] grams): [16, 66, 18] (due to
computational constraints, they were calculated only for the first dictionary, but used
for all four dictionaries). DNA dictionaries and the randomly generated queries were
used.
Tested on the English language dictionaries, promising results were reported when compared to methods proposed by other authors. Others consider the Levenshtein distance
as the edit distance, whereas we use the Hamming distance, which puts us at the advantageous position. Still, the provided speedup is significant, and we believe that the
more restrictive Hamming distance is also an important measure of practical use (see
Subsection 2.1.1 for more information). The implementations of other authors are available on the Internet [boy, che]. As regards the results reported for the MF and Boytsov’s
Reduced alphabet neighborhood generation, it was not possible to accurately calculate
the size of the index (both implementations by Boytsov), and for this reason we used
rough ratios based on index sizes reported by Boytsov for similar dictionary sizes. Let
us note that we compare our algorithm with Chegrane and Belazzougui [CB14], who
published better results when compared to Karch et al. [KLS10], who in turned claimed
to be faster than other state-of-the-art methods. We have not managed to identify any
practice-oriented indexes for matching in dictionaries over any fixed alphabet Σ dedicated for the Hamming distance, which could be directly compared to our split index.
The times for the brute-force algorithm are not listed, since they were roughly 3 orders
of magnitude higher than the ones presented. Consult Figure 5.6 for details.
We also evaluated different word splitting schemes. For instance for k = 1, one could
62
Experimental Results
35
Our method
Our method w. compression
Chegrane and Belazzougui
Boytsov
Mor-Fraenkel
30
Query time ( s)
25
20
15
10
5
0
2
4
6
Index size (MB)
8
10
12
Figure 5.6: Query time vs index size for different methods. The method with compression encoded mixed q-grams. We used the Hamming distance, and the other authors
used the Levenshtein distance for k = 1. English language dictionaries of size 0.79 MB,
2.67 MB, and 5.8 MB were used as input, and the list of common misspellings was used
for queries.
split the word into two parts of different sizes, e.g., 6 → (2, 4) instead of 6 → (3, 3), however, unequal splitting methods caused slower queries when compared to the regular one.
As regards Hamming distance calculation, it turned out that the naive implementation
(i.e. simply iterating and comparing each character) was the fastest one. The compiler with automatic optimization was simply more efficient than other implementations
(e.g., ones based directly on SSE instructions) that we have investigated.
5.3
String sketches
String sketches which were introduced in Section 4.4 allow for faster string comparison,
since in certain cases we can deduce for two strings S1 and S2 that D(S1 , S2 ) > k for some
k without performing an explicit verification. In our implementation, a sketch comparison
requires performing one bitwise operation and one array lookup, i.e. 2 constant operations
in total. We analyze the comparison time between two strings using various sketch
types versus an explicit verification. The sketch is calculated once per query and it is
then reused for the comparison with consecutive words, i.e. we examine the situation
where a single query is compared against a dictionary of words. The dictionary size
for which a speedup was reported was around 100 words or more, since in the case of
fewer words sketch construction was too slow in relation with the comparisons. When the
63
Experimental Results
sketch comparison was not decisive a verification was performed and it contributed to the
elapsed time. The words were generated over the English alphabet (consult Appendix E
in order to see letter frequencies), and each sketch occupied 2 bytes (1-byte sketches were
not effective). Figures 5.7 and 5.8 contain the results for occurrence and count sketches,
respectively. Consult Appendix D for more information regarding the letter distribution
in the alphabet.
8
Comparison time (ns)
7
No sketches
Occurrence sketch common
Occurrence sketch mixed
Occurrence sketch rare
6
5
4
3
2
101
Word size
102
Figure 5.7: Comparison time vs word size for 1 mismatch using occurrence sketches
for words generated over the English alphabet. Each sketch occupies 2 bytes, and time
refers to average comparison time between a pair of words. Common sketches use 16
most common letters, rare sketches use 16 least common letters, and mixed sketches
use 8 most common and 8 least common letters. Note the logarithmic x-scale.
64
Experimental Results
7.0
6.5
Comparison time (ns)
6.0
No sketches
Count sketch common
Count sketch mixed
Count sketch rare
5.5
5.0
4.5
4.0
3.5
3.0
2.5
101
Word size
102
Figure 5.8: Comparison time vs word size for 1 mismatch using count sketches for
words generated over the English alphabet. Each sketch occupies 2 bytes, and time
refers to average comparison time between a pair of words. Common sketches use 16
most common letters, rare sketches use 16 least common letters, and mixed sketches
use 8 most common and 8 least common letters. Note the logarithmic x-scale.
Chapter 6
Conclusions
String searching algorithms are ubiquitous in computer science. They are used for common tasks performed on home PCs such as searching inside text documents or spell
checking as well as for industrial projects, e.g., genome sequencing. Strings can be defined very broadly, and they usually contain natural language and biological data (DNA,
proteins), but they can also represent various kinds of data such as music or images.
An interesting aspect of string matching is the diversity and complexity of the solutions
which have been presented over the years (both theoretical and practical), despite the
simplicity of problem formulation (one of the most common ones being “check if pattern
P exists in text T ”).
We investigated string searching methods which preprocess the input text and construct
a data structure called an index. This allows to reduce the time required for searching,
and it is often indispensable when it comes to massive sizes of modern data sets. The
indexes are divided into full-text ones which operate on the whole input text and can
answer arbitrary queries, and keyword indexes which store a dictionary of individual
q-grams (these can corresponds to, e.g., words in a natural language dictionary or DNA
reads).
Key contributions include the structure called FM-bloated, which is a modification of
the FM-index (a compressed, full-text index) that trades space for speed. Two variants of the FM-bloated were described — one using O(n log2 n) bits of space with
O(m + log m log log n) average query time, and one with linear space and O(m log log n)
average query time, where n is the input text length and m is the pattern length. We
experimentally show that by operating on q-grams in addition to individual characters a
significant speedup can be achieved (albeit at the cost of very high space requirements,
hence the name “bloated”).
65
Conclusions
66
The split index is a keyword index for the k-mismatches problem with a focus on the
1-error case. It performed better than other solutions for the Hamming distance, and
times in the order of 1 microsecond were reported for one mismatch for a few-megabyte
natural language dictionary on a medium-end PC. A minor contribution includes string
sketches which aim to speed up approximate string comparison at the cost of additional
space (O(1) per string).
6.1
Future work
We presented results for the superlinear variant of the FM-bloated index in order to
demonstrate its potential and capabilities. Multiple modifications and implementations
of this data structure can be introduced. Let us recall that we store the count table and
occurrence lists for selected q-grams in addition to individual characters from the regular
FM-index. This q-gram selection process can be fine-tuned — the more q-grams we store,
the faster the search should be, but the index size grows as well. For instance, the linear
space version could be augmented with additional 1-, 2-, etc q-grams which start at the
position of each minimizer, up to an s-gram where s is the maximum gap size between
two minimizers. This would eliminate two phases of the search (for prefixes and suffixes,
cf. Subsection 3.1.6.2) where individual characters have to be used for the LF-mapping
mechanism. Moreover, the comparison with other methods could be augmented with an
inverted index on q-grams, whose properties should be more similar to FM-bloated than
those of FM-index variants, especially when it comes to space requirements.
As regards the split index, we describe possible extensions in Subsections 4.2.3.3 and
4.2.3.4. These include using multiple threads and introducing the functionality of an
inverted index on q-grams. Moreover, the algorithm could be possibly extended to handle
the Levenshtein distance as well, although this would certainly have a substantial impact
on space usage. Another desired functionality could include a dedicated support for a
binary alphabet (σ = 2). In such a case, individual characters could be stored with bits,
which should have a positive effect on cache usage thanks to further data compaction
and possibly an alignment with the cache line size.
Appendix A
Data Sets
The following tables present information regarding the data sets that were used in
this work. Table A.1 describes data sets from the popular Pizza & Chili (P&C) corpus [FGNV09, piz], which were used for full-text indexes (English.30 was extracted
from English.50). Table A.2 describes data sets which were used for keyword indexes.
The English dictionaries come from Linux packages and the webpage by Foster [fos],
and the list of common misspellings which were used as queries was obtained from the
Wikipedia [typ]. The DNA dictionaries contain 20-mers which were extracted from the
genome of Drosophila melanogaster that was collected from the FlyBase database [fly].
The provided sizes refer to the size of the dictionary after preprocessing — for keyword
indexes, duplicates as well as delimiters (usually newline characters) are removed. The
abbreviation NL refers to natural language.
Name
English.30
English.50
English.200
Source
P&C
P&C
P&C
Type
NL (English)
NL (English)
NL (English)
Size
30 MB
50 MB
200 MB
Table A.1: A summary of data sets which were used for the experimental evaluation
of full-text indexes.
67
68
Data Sets
Name
iamerican
foster
iamerican-insane
misspellings
dmel-tiny
dmel-small
dmel-medium
dmel-big
Source
Linux package
Foster
Linux package
Wikipedia
FlyBase
FlyBase
FlyBase
FlyBase
NL
NL
NL
NL
Type
(English)
(English)
(English)
(English)
DNA
DNA
DNA
DNA
Size
0.79 MB
2.67 MB
5.8 MB
42.2 KB (4,261 words)
6.01 MB
135.89 MB
262.78 MB
627.80 MB
Table A.2: A summary of data sets which were used for the experimental evaluation
of keyword indexes.
Appendix B
Exact Matching Complexity
In the theoretical analysis we often mention exact string comparison, i.e. determining
whether S1 = S2 . It must hold that |S1 | = |S2 |, and the worst-case complexity of this
operation is equal to O(n) (all characters have to be compared when the two strings
match). On the other hand, the average complexity depends on the alphabet Σ. If, for
instance, σ = 2, we have 1/2 probability that characters S1 [0] and S2 [0] match, 1/4 that
characters S1 [1] and S2 [1] match as well, etc, in the case of uniform letter frequencies.
More generally, the probability that there is a match between all characters up to a 0based position i is equal to 1/σ i+1 , and the average number of required comparisons AC
is equal to 1+1/(σ −1) for any σ > 2. We can derive the following relation: lim AC = 1,
σ→∞
and hence treating the average time required for exact comparison of two random strings
from the same alphabet Σ as O(1) is justified for any σ. In Figure B.1 we present the
relation between the average number of comparisons and the σ value.
In the case of real-world Σ such as the English language alphabet, context information
in the form of k-th order entropy should be taken into account. In a simplified analysis,
let us consider the frequencies from Appendix E; the probability that two characters
sampled at random match is equal to 0.1272 (for a) + 0.0912 (for t), etc. Proceeding in
this manner, the probability for the match between the first pair of characters is equal to
6.55%, for the first and the second pair 0.43%, etc. As regards an empirical evaluation
on the English.200 text, the average number of comparisons between a random pair of
strings was equal to approximately 1.075.
69
70
Exact Matching Complexity
Avg number of comparisons
2.0
1.8
1.6
1.4
1.2
1.0
0
5
10
15
Alphabet size ( )
20
25
30
Figure B.1: Average number of character comparisons when comparing two random
strings (for exact matching) from the same alphabet with uniform letter frequency vs
the alphabet size σ.
Appendix C
Split Index Compression
This appendix presents additional information regarding the q-gram-based compression
of the split index (consult Subsection 4.2.3 for the description of this data structure and
Section 5.2 for the experimental results). In Figures C.1 and C.2 we can see the relation
between the index size and the selection of 100 2-grams and 3-grams for the English
alphabet (where the 2-grams clearly provided a better compression) and 100 3-grams
and 4-grams for the DNA.
4.9
Index size (MB)
4.8
4.7
4.6
4.5
4.4
4.3
0
20
40
60
2-grams count
80
100
Figure C.1: Index size vs the number of 2-grams used for the compression for the
English dictionary. 100 q-grams were used, and the remaining q-grams were 3-grams.
71
72
Split Index Compression
12.2
Index size (MB)
12.0
11.8
11.6
11.4
11.2
11.0
0
20
40
60
3-grams count
80
100
Figure C.2: Index size vs the number of 3-grams used for the compression for the
DNA dictionary. 100 q-grams were used, and the remaining q-grams were 4-grams.
Appendix D
String Sketches
In Section 5.3 we discussed the use of string sketches for the English alphabet, where
we could take advantage of the varying letter frequency. Here, we present the results for
the alphabet with uniform distribution and σ = 26. Instead of selecting the most or the
least common letters, the 2-byte sketches contain information regarding 16 (occurrence)
or 8 (count) randomly selected letters. We can see in Figure D.1 that in this case the
sketches do not provide the desired speedup.
6.5
No sketches
Occurrence sketch
Count sketch
Comparison time (ns)
6.0
5.5
5.0
4.5
4.0
3.5
3.0
101
Word size
102
Figure D.1: Comparison time vs word size for 1 mismatch using various string sketches
generated over the alphabet with uniform letter frequency and σ = 26. Each sketch
occupies 2 bytes, and time refers to average comparison time between a pair of words.
Note the logarithmic x-scale.
73
Appendix E
English Letter Frequency
Frequencies presented in Table E.1 [Lew00, p. 36] were used for the generation of random
queries where the letter distribution corresponded to the real-world English use.
Letter
e
t
a
o
i
n
s
h
r
d
l
c
u
Frequency
12.702%
9.056%
8.167%
7.507%
6.966%
6.749%
6.327%
6.094%
5.987%
4.253%
4.025%
2.782%
2.758%
Letter
m
w
f
g
y
p
b
v
k
j
x
q
z
Frequency
2.406%
2.361%
2.228%
2.015%
1.974%
1.929%
1.492%
0.978%
0.772%
0.153%
0.150%
0.095%
0.074%
Table E.1: Frequencies of English alphabet letters.
74
Appendix F
Hash Functions
Table F.1 contains Internet addresses of hash functions which were used to obtain experimental results for the split index (Section 5.2). If the hash function is not listed, it
means that our own implementation was used.
Name
City
Farm
FARSH
Murmur3
SpookyV2
SuperFast
xxhash
Address
https://code.google.com/p/cityhash/
https://code.google.com/p/farmhash/
https://github.com/Bulat-Ziganshin/FARSH
https://code.google.com/p/smhasher/wiki/MurmurHash3
http://burtleburtle.net/bob/hash/spooky.html
http://www.azillionmonkeys.com/qed/hash.html
https://code.google.com/p/xxhash/
Table F.1: A summary of Internet addresses of hash functions.
75
Bibliography
[AC75] Alfred V. Aho and Margaret J. Corasick. Efficient string matching: an aid
to bibliographic search. Communications of the ACM, 18(6):333–340, 1975.
[AE86] Stephen F. Altschul and Bruce W. Erickson. Optimal sequence alignment
using affine gap costs. Bulletin of Mathematical Biology, 48(5-6):603–616,
1986.
[AGM+ 90] Stephen F. Altschul, Warren Gish, Webb Miller, Eugene W. Myers, and
David J. Lipman. Basic local alignment search tool. Journal of Molecular
Biology, 215(3):403–410, 1990.
[AKO02] Mohamed Ibrahim Abouelhoda, Stefan Kurtz, and Enno Ohlebusch. The
enhanced suffix array and its applications to genome analysis. In Algorithms
in Bioinformatics, pages 449–463. Springer, 2002.
[AKO04] Mohamed Ibrahim Abouelhoda, Stefan Kurtz, and Enno Ohlebusch. Replacing suffix trees with enhanced suffix arrays. Journal of Discrete Algorithms, 2(1):53–86, 2004.
[AKO10] Alexandr Andoni, Robert Krauthgamer, and Krzysztof Onak. Polylogarithmic approximation for edit distance and the asymmetric query complexity.
In Foundations of Computer Science, 2010 51st Annual IEEE Symposium
on, pages 377–386. IEEE, 2010.
[ALP04] Amihood Amir, Moshe Lewenstein, and Ely Porat. Faster algorithms for
string matching with k mismatches. Journal of Algorithms, 50(2):257–275,
2004.
[AM05] Vo Ngoc Anh and Alistair Moffat. Inverted index compression using wordaligned binary codes. Information Retrieval, 8(1):151–166, 2005.
[AOK02] Mohamed Ibrahim Abouelhoda, Enno Ohlebusch, and Stefan Kurtz. Optimal exact string matching based on suffix arrays. In String Processing and
Information Retrieval, pages 31–43. Springer, 2002.
76
77
Bibliography
[Bar07] Gregory V. Bard. Spelling-error tolerant, order-independent pass-phrases
via the Damerau-Levenshtein string-edit distance metric. In Proceedings
of the fifth Australasian symposium on ACSW frontiers-Volume 68, pages
117–124. Australian Computer Society, Inc., 2007.
[BB93] Horst Bunke and Urs Bühler. Applications of approximate string matching
to 2D shape recognition. Pattern Recognition, 26(12):1797–1812, 1993.
[BBD09] Djamal Belazzougui, Fabiano C. Botelho, and Martin Dietzfelbinger. Hash,
displace, and compress. In Algorithms - ESA 2009, 17th Annual European Symposium, Copenhagen, Denmark, September 7-9, 2009. Proceedings, pages 682–693, 2009.
[BC15] Djamal Belazzougui and Fabio Cunial. Space-efficient detection of unusual
words. arXiv preprint arXiv:1508.02968, 2015.
[Bel09] Djamal Belazzougui. Faster and space-optimal edit distance “1” dictionary.
In Combinatorial Pattern Matching, pages 154–167. Springer, 2009.
[BG96] Gerth Stølting Brodal and Leszek Gąsieniec.
Approximate dictionary
queries. In Combinatorial Pattern Matching, pages 65–74. Springer, 1996.
[BHSH07] Thomas Bocek, Ela Hunt, Burkhard Stiller, and Fabio Hecht. Fast similarity search in large dictionaries. Technical Report ifi-2007.02, Department
of Informatics, University of Zurich, Switzerland, 2007.
[Bib] The Holy Bible. King James Version.
[BK73] Walter A. Burkhard and Robert M. Keller. Some approaches to best-match
file searching. Communications of the ACM, 16(4):230–236, 1973.
[BLA] BLAST: Basic local alignment search tool. http://blast.ncbi.nlm.nih.
gov/Blast.cgi. [Online; accessed 24-June-2015].
[Blo70] Burton H. Bloom. Space/time trade-offs in hash coding with allowable
errors. Communications of the ACM, 13(7):422–426, 1970.
[BM77] Robert S. Boyer and J. Strother Moore. A fast string searching algorithm.
Communications of the ACM, 20(10):762–772, 1977.
[BM00] Eric Brill and Robert C. Moore. An improved error model for noisy channel
spelling correction. In Proceedings of the 38th Annual Meeting on Association for Computational Linguistics, pages 286–293. Association for Computational Linguistics, 2000.
78
Bibliography
[BM04] Andrei Broder and Michael Mitzenmacher. Network applications of Bloom
filters: A survey. Internet Mathematics, 1(4):485–509, 2004.
[Bow10] Alexander Bowe. Multiary wavelet trees in practice. Honours thesis, RMIT
University, Australia, 2010.
[boy] Leonid Boytsov’s software.
http://searchivarius.org/personal/
software. [Online; accessed 12-March-2015].
[Boy11] Leonid Boytsov. Indexing methods for approximate dictionary searching:
Comparative analysis. Journal of Experimental Algorithmics, 16:1–1, 2011.
[BP98] Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual
web search engine. Computer Networks and ISDN Systems, 30(1):107–117,
1998.
[BV00] Gerth Stølting Brodal and Srinivasan Venkatesh. Improved bounds for dictionary look-up with one error. Information Processing Letters, 75(1):57–
59, 2000.
[BV12] Djamal Belazzougui and Rossano Venturini. Compressed string dictionary
look-up with edit distance one. In Combinatorial Pattern Matching, pages
280–292. Springer, 2012.
[BW94] Michael Burrows and David J. Wheeler. A block-sorting lossless data compression algorithm. Technical Report 124, Systems Research Center, 1994.
[BYG92] Ricardo Baeza-Yates and Gaston H. Gonnet. A new approach to text
searching. Communications of the ACM, 35(10):74–82, 1992.
[BYN04] Ricardo Baeza-Yates and Gonzalo Navarro. Text searching: theory and
practice. In Formal languages and applications, pages 565–597. Springer,
2004.
[CB08] Manolis Christodoulakis and Gerhard Brey. Edit distance with singlesymbol combinations and splits. In Prague Stringology Conference 2008,
pages 208–217, 2008.
[CB14] Ibrahim Chegrane and Djamal Belazzougui. Simple, compact and robust
approximate string dictionary. Journal of Discrete Algorithms, 28:49–60,
2014.
[CFP+ 15] Raphaël Clifford, Allyx Fontaine, Ely Porat, Benjamin Sach, and Tatiana Starikovskaya. The k-mismatch problem revisited. arXiv preprint
arXiv:1508.00731, 2015.
79
Bibliography
[CG15] Aleksander Cisłak and Szymon Grabowski.
A practical index for ap-
proximate dictionary matching with few mismatches.
arXiv preprint
arXiv:1501.04948, 2015.
[CGGM03] Surajit Chaudhuri, Kris Ganjam, Venkatesh Ganti, and Rajeev Motwani.
Robust and efficient fuzzy match for online data cleaning. In Proceedings of
the 2003 ACM SIGMOD international conference on Management of data,
pages 313–324. ACM, 2003.
[CGL04] Richard Cole, Lee-Ad Gottlieb, and Moshe Lewenstein. Dictionary matching and indexing with errors and don’t cares. In Proceedings of the thirtysixth annual ACM symposium on Theory of computing, pages 91–100.
ACM, 2004.
[CH02] Richard Cole and Ramesh Hariharan. Approximate string matching: A
simpler faster algorithm. SIAM Journal on Computing, 31(6):1761–1782,
2002.
[che] Simple, compact and robust approximate string dictionary. https://code.
google.com/p/compact-approximate-string-dictionary/. [Online; accessed 12-March-2015].
[CIM+ 02] Maxime Crochemore, Costas S. Iliopoulos, Christos Makris, Wojciech Rytter, Athanasios K. Tsakalidis, and T. Tsichlas. Approximate string matching with gaps. Nordic Journal of Computing, 9(1):54–65, 2002.
[CKL06] Richard Cole, Tsvi Kopelowitz, and Moshe Lewenstein. Suffix trays and
suffix trists: structures for faster text indexing. In Automata, Languages
and Programming, pages 358–369. Springer, 2006.
[CL92] William I. Chang and Jordan Lampe. Theoretical and empirical comparisons of approximate string matching algorithms. In Combinatorial Pattern
Matching, pages 175–184. Springer, 1992.
[CL15] Timothy Chan and Moshe Lewenstein. Fast string dictionary lookup with
one error. In Combinatorial Pattern Matching, pages 114–123. Springer,
2015.
[Cla96] David Clark. Compact Pat Trees. PhD thesis, University of Waterloo,
Canada, 1996.
[CLJ+ 14] Rayan Chikhi, Antoine Limasset, Shaun Jackman, Jared T. Simpson, and
Paul Medvedev. On the representation of de Bruijn graphs. In Research in
Computational Molecular Biology, pages 35–55. Springer, 2014.
80
Bibliography
[CLRS09] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford
Stein. Introduction to Algorithms. The MIT Press, 3rd edition, 2009.
[CM94] William I. Chang and Thomas G. Marr. Approximate string matching
and local similarity. In Combinatorial Pattern Matching, pages 259–273.
Springer, 1994.
[CMEH13] Alejandro Chacón, Juan Carlos Moure, Antonio Espinosa, and Porfidio
Hernández. n-step FM-index for faster pattern matching. Procedia Computer Science, 18:70–79, 2013.
[CNO14] Francisco Claude, Gonzalo Navarro, and Alberto Ordóñez. Efficient compressed wavelet trees over large alphabets. arXiv preprint arXiv:1405.1220,
2014.
[CNP+ 12] Francisco Claude, Gonzalo Navarro, Hannu Peltola, Leena Salmela, and
Jorma Tarhio. String matching with alphabet sampling. Journal of Discrete
Algorithms, 11:37–50, 2012.
[Cob95] Archie L. Cobbs. Fast approximate matching using suffix trees. In Combinatorial Pattern Matching, pages 41–54. Springer, 1995.
[Col94] Richard Cole. Tight bounds on the complexity of the Boyer–Moore string
matching algorithm. SIAM Journal on Computing, 23(5):1075–1091, 1994.
[cpp11] Standard for programming language C++. Technical Report 14882:2011,
ISO/IEC, 2011.
[CPS12] J. Shane Culpepper, Matthias Petri, and Falk Scholer. Efficient in-memory
top-k document retrieval. In Proceedings of the 35th international ACM
SIGIR conference on Research and development in information retrieval,
pages 225–234. ACM, 2012.
[CTW14] Chin-Wan Chung, Yufei Tao, and Wei Wang. I/O-efficient dictionary search
with one edit error. In String Processing and Information Retrieval, pages
191–202. Springer, 2014.
[CV81] Lorinda L. Cherry and William Vesterman. Writing tools - the STYLE and
DICTION programs. Technical report, Rutgers University, USA, 1981.
[CW77] J. Lawrence Carter and Mark N. Wegman. Universal classes of hash functions. In Proceedings of the ninth annual ACM symposium on Theory of
computing, pages 106–112. ACM, 1977.
81
Bibliography
[Dam64] Fred J. Damerau. A technique for computer detection and correction of
spelling errors. Communications of the ACM, 7(3):171–176, 1964.
[Deo05] Sebastian Deorowicz.
Context exhumation after the Burrows–Wheeler
transform. Information Processing Letters, 95(1):313–320, 2005.
[DFG+ 97] Gautam Das, Rudolf Fleischer, Leszek Gąsieniec, Dimitris Gunopulos, and
Juha Kärkkäinen. Episode matching. In Combinatorial Pattern Matching,
pages 12–27. Springer, 1997.
[DFM98] George I. Davida, Yair Frankel, and Brian J. Matt. On enabling secure
applications through off-line biometric identification. In Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium on, pages 148–157. IEEE,
1998.
[DK13] Mrinal Deo and Sean Keely. Parallel suffix array and least common prefix
for the GPU. In ACM SIGPLAN Notices, volume 48, pages 197–206. ACM,
2013.
[DKGDG15] Sebastian Deorowicz, Marek Kokot, Szymon Grabowski, and Agnieszka
Debudaj-Grabysz. KMC 2: Fast and resource-frugal k-mer counting. Bioinformatics, 31(10):1569–1576, 2015.
[DKM+ 94] Martin Dietzfelbinger, Anna Karlin, Kurt Mehlhorn, Friedhelm Meyer Auf
Der Heide, Hans Rohnert, and Robert E. Tarjan. Dynamic perfect hashing:
Upper and lower bounds. SIAM Journal on Computing, 23(4):738–761,
1994.
[Edd04] Sean R. Eddy. Where did the BLOSUM62 alignment score matrix come
from? Nature Biotechnology, 22(8):1035–1036, 2004.
[EL90] D.G. Elliman and I.T. Lancaster. A review of segmentation and contextual
analysis techniques for text recognition. Pattern Recognition, 23(3):337–
346, 1990.
[FAKM14] Bin Fan, Dave G. Andersen, Michael Kaminsky, and Michael D. Mitzenmacher. Cuckoo filter: Practically better than Bloom. In Proceedings of the
10th ACM International Conference on Emerging Networking Experiments
and Technologies, pages 75–88. ACM, 2014.
[Far97] Martin Farach. Optimal suffix tree construction with large alphabets. In
38th Annual Symposium on Foundations of Computer Science, FOCS ’97,
Miami Beach, Florida, USA, October 19-22, 1997, pages 137–143, 1997.
82
Bibliography
[FG09] Kimmo Fredriksson and Szymon Grabowski. Fast convolutions and their
applications in approximate string matching. In Combinatorial Algorithms,
pages 254–265. Springer, 2009.
[FGNV09] Paolo Ferragina, Rodrigo González, Gonzalo Navarro, and Rossano Venturini. Compressed text indexes: From theory to practice. Journal of
Experimental Algorithmics, 13:12, 2009.
[FKS84] Michael L Fredman, János Komlós, and Endre Szemerédi. Storing a sparse
table with O(1) worst case access time. Journal of the ACM, 31(3):538–544,
1984.
[FL13] Simone Faro and Thierry Lecroq. The exact online string matching problem: a review of the most recent results.
ACM Computing Surveys,
45(2):13, 2013.
[Flo98] Darren R. Flower. On the properties of bit string-based measures of chemical similarity. Journal of Chemical Information and Computer Sciences,
38(3):379–386, 1998.
[fly] Flybase homepage.
http://flybase.org/.
[Online; accessed 28-July-
2015].
[FM00] Paolo Ferragina and Giovanni Manzini. Opportunistic data structures with
applications. In Foundations of Computer Science, 2000. Proceedings. 41st
Annual Symposium on, pages 390–398. IEEE, 2000.
[FM05] Paolo Ferragina and Giovanni Manzini. Indexing compressed text. Journal
of the ACM, 52(4):552–581, 2005.
[FMMN07] Paolo Ferragina, Giovanni Manzini, Veli Mäkinen, and Gonzalo Navarro.
Compressed representations of sequences and full-text indexes.
ACM
Transactions on Algorithms, 3(2):20, 2007.
[fos] /foster/dictionary.
http://www.math.sjsu.edu/~foster/dictionary.
txt. [Online; accessed 28-July-2015].
[Fre60] Edward Fredkin. Trie memory. Communications of the ACM, 3(9):490–499,
1960.
[FV10] Paolo Ferragina and Rossano Venturini. The compressed permuterm index.
ACM Transactions on Algorithms, 7(1):10, 2010.
[Gal79] Zvi Galil. On improving the worst case running time of the Boyer–Moore
string matching algorithm. Communications of the ACM, 22(9):505–508,
1979.
83
Bibliography
[Gar76] Eugene Garfield. The permuterm subject index: An autobiographical review. Journal of the American Society for Information Science, 27(5):288–
291, 1976.
[GBMP14] Simon Gog, Timo Beller, Alistair Moffat, and Matthias Petri. From theory to practice: Plug and play with succinct data structures. In 13th
International Symposium on Experimental Algorithms, (SEA 2014), pages
326–337, 2014.
[GGV03] Roberto Grossi, Ankur Gupta, and Jeffrey Scott Vitter.
High-order
entropy-compressed text indexes. In Proceedings of the fourteenth annual
ACM-SIAM symposium on Discrete algorithms, pages 841–850. Society for
Industrial and Applied Mathematics, 2003.
[GLPS97] Patrick Girard, Christian Landrault, Serge Pravossoudovitch, and Daniel
Severac. Reduction of power consumption during test application by test
vector ordering. Electronics Letters, 33(21):1752–1754, 1997.
[GMN04] Szymon Grabowski, Veli Mäkinen, and Gonzalo Navarro.
First Huff-
man, then Burrows-Wheeler: A simple alphabet-independent FM-index.
In String Processing and Information Retrieval, pages 210–211. Springer,
2004.
[GMRS03] Alessandra Gabriele, Filippo Mignosi, Antonio Restivo, and Marinella
Sciortino. Indexing structures for approximate string matching. In Algorithms and Complexity, pages 140–151. Springer, 2003.
[GN09] Rodrigo González and Gonzalo Navarro.
Rank/select on dynamic
compressed sequences and applications. Theoretical Computer Science,
410(43):4414–4422, 2009.
[GNP+ 06] Szymon Grabowski, Gonzalo Navarro, Rafał Przywarski, Alejandro
Salinger, and Veli Mäkinen. A simple alphabet-independent FM-index.
International Journal of Foundations of Computer Science, 17(06):1365–
1384, 2006.
[GNPS15] Travis Gagie, Gonzalo Navarro, Simon J. Puglisi, and Jouni Sirén. Relative
compressed suffix trees. arXiv preprint arXiv:1508.02550, 2015.
[Gog11] Simon Gog. Compressed suffix trees: Design, construction, and applications. PhD thesis, University of Ulm, Germany, 2011.
[goo] How search works - the story. http://www.google.com/insidesearch/
howsearchworks/thestory/. [Online; accessed 21-April-2015].
84
Bibliography
[GP14] Simon Gog and Matthias Petri. Optimized succinct data structures for
massive data. Software: Practice and Experience, 44(11):1287–1314, 2014.
[GR14] Szymon Grabowski and Marcin Raniszewski. Sampling the suffix array
with minimizers. arXiv preprint arXiv:1406.2348, 2014.
[Gra11] Szymon Grabowski.
New Algorithms for Exact and Approximate Text
Matching. Zeszyty Naukowe Nr 1051. Politechnika Łódzka, available at:
http://cybra.lodz.pl/dlibra/doccontent?id=3528&from=FBC, 2011.
[Gra14] Szymon Grabowski. New tabulation and sparse dynamic programming
based techniques for sequence similarity problems. In Proceedings of the
Prague Stringology Conference 2014, Prague, Czech Republic, September
1-3, 2014, pages 202–211, 2014.
[GRD15] Szymon Grabowski, Marcin Raniszewski, and Sebastian Deorowicz. FMindex for dummies. arXiv preprint arXiv:1506.04896, 2015.
[Gre02] T. Ryan Gregory. Genome size and developmental complexity. Genetica,
115(1):131–146, 2002.
[Gus97] Dan Gusfield. Algorithms on strings, trees and sequences: computer science
and computational biology. Cambridge University Press, 1997.
[GV05] Roberto Grossi and Jeffrey Scott Vitter. Compressed suffix arrays and
suffix trees with applications to text indexing and string matching. SIAM
Journal on Computing, 35(2):378–407, 2005.
[HCZ+ 15] Hongwei Huo, Longgang Chen, Heng Zhao, Jeffrey Scott Vitter, Yakov
Nekrich, and Qiang Yu. A data-aware FM-index. In Proceedings of the Seventeenth Workshop on Algorithm Engineering and Experiments, ALENEX
2015, San Diego, CA, USA, January 5, 2015, pages 10–23, 2015.
[Hea78] Harold Stanley Heaps. Information retrieval: Computational and theoretical aspects. Academic Press, Inc., 1978.
[Hir75] Daniel S. Hirschberg. A linear space algorithm for computing maximal
common subsequences. Communications of the ACM, 18(6):341–343, 1975.
[Hor80] R. Nigel Horspool. Practical fast searching in strings. Software: Practice
and Experience, 10(6):501–506, 1980.
[Huf52] David A. Huffman. A method for the construction of minimum redundancy
codes. Proceedings of the IRE, 40(9):1098–1101, 1952.
85
Bibliography
[Jac89] Guy Jacobson. Space-efficient static trees and graphs. In Foundations
of Computer Science, 1989, 30th Annual Symposium on, pages 549–554.
IEEE, 1989.
[Kär95] Juha Kärkkäinen. Suffix cactus: A cross between suffix tree and suffix
array. In Combinatorial Pattern Matching, pages 191–204. Springer, 1995.
[Kar05] Björn Karlsson. Beyond the C++ standard library: an introduction to
Boost. Addison-Wesley, 2005.
[KCO+ 01] Stefan Kurtz, Jomuna V. Choudhuri, Enno Ohlebusch, Chris Schleiermacher, Jens Stoye, and Robert Giegerich. REPuter: the manifold applications of repeat analysis on a genomic scale. Nucleic Acids Research,
29(22):4633–4642, 2001.
[KKP14] Juha Kärkkäinen, Dominik Kempa, and Simon J. Puglisi. Hybrid compression of bitvectors for the FM-index. In Data Compression Conference,
2014, pages 302–311. IEEE, 2014.
[KLS10] Daniel Karch, Dennis Luxen, and Peter Sanders. Improved fast similarity
search in dictionaries. In String Processing and Information Retrieval, pages
173–178. Springer, 2010.
[KMP77] Donald E. Knuth, James H. Morris, and Vaughan R. Pratt. Fast pattern
matching in strings. SIAM Journal on Computing, 6(2):323–350, 1977.
[Knu97] Donald E. Knuth. The Art of Computer Programming, volume 2. AddisonWesley, 1997.
[Kor06] Jesse Kornblum. Identifying almost identical files using context triggered
piecewise hashing. Digital Investigation, 3:91–97, 2006.
[KR87] Richard M. Karp and Michael O. Rabin. Efficient randomized patternmatching algorithms.
IBM Journal of Research and Development,
31(2):249–260, 1987.
[KS94] Sandeep Kumar and Eugene H Spafford. A pattern matching model for
misuse intrusion detection. Technical Report 94-071, Department of Computer Science, Purdue University, USA, 1994.
[KU96] Juha Kärkkäinen and Esko Ukkonen. Sparse suffix trees. In Computing
and Combinatorics, pages 219–230. Springer, 1996.
[Kur99] Stefan Kurtz. Reducing the space requirement of suffix trees. Software:
Practice and Experience, 29(13):1149–71, 1999.
86
Bibliography
[KWL07] M. Kim, K Whang, and J. Lee. n-gram/2L-approximation: a two-level ngram inverted index structure for approximate string matching. Computer
Systems Science and Engineering, 22(6):365, 2007.
[KWLL05] Min-Soo Kim, Kyu-Young Whang, Jae-Gil Lee, and Min-Jae Lee.
n-
gram/2L: A space and time efficient two-level n-gram inverted index structure. In Proceedings of the 31st international conference on Very large data
bases, pages 325–336. VLDB Endowment, 2005.
[Lev66] Vladimir I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet Physics Doklady, volume 10, pages 707–710,
1966.
[Lew00] Robert Lewand. Cryptological mathematics. MAA, 2000.
[LLL+ 12] Lin Liu, Yinhu Li, Siliang Li, Ni Hu, Yimin He, Ray Pong, Danni Lin,
Lihua Lu, and Maggie Law. Comparison of next-generation sequencing
systems. BioMed Research International, 2012, 2012.
[LP85] David J. Lipman and William R. Pearson. Rapid and sensitive protein
similarity searches. Science, 227(4693):1435–1441, 1985.
[LSS01] Gad M. Landau, Jeanette P. Schmidt, and Dina Sokol. An algorithm for
approximate tandem repeats. Journal of Computational Biology, 8(1):1–18,
2001.
[LTP+ 09] Ben Langmead, Cole Trapnell, Mihai Pop, Steven L. Salzberg, et al. Ultrafast and memory-efficient alignment of short DNA sequences to the human
genome. Genome Biology, 10(3):R25, 2009.
[LV89] Gad M. Landau and Uzi Vishkin. Fast parallel and serial approximate
string matching. Journal of Algorithms, 10(2):157–169, 1989.
[Mäk00] Veli Mäkinen. Compact suffix array. In Combinatorial Pattern Matching,
pages 305–319. Springer, 2000.
[ME10] Tyler Moore and Benjamin Edelman. Measuring the perpetrators and funders of typosquatting. In Financial Cryptography and Data Security, pages
175–191. Springer, 2010.
[MF82] Moshe Mor and Aviezri S. Fraenkel. A hash code method for detecting and
correcting spelling errors. Communications of the ACM, 25(12):935–938,
1982.
87
Bibliography
[MF04] Giovanni Manzini and Paolo Ferragina. Engineering a lightweight suffix
array construction algorithm. Algorithmica, 40(1):33–50, 2004.
[MG14] Alistair Moffat and Simon Gog. String search experimentation using massive data.
Philosophical Transactions of the Royal Society of London
A: Mathematical, Physical and Engineering Sciences, 372(2016):20130135,
2014.
[MGSA06] Aleksandr Morgulis, E. Michael Gertz, Alejandro A. Schäffer, and Richa
Agarwala. A fast and symmetric DUST implementation to mask lowcomplexity DNA sequences. Journal of Computational Biology, 13(5):1028–
1040, 2006.
[MHP05] Bořivoj Melichar, Jan Holub, and Tomáš Polcar. Text searching algorithms.
Department of Computer Science and Engineering, Czech Technical University in Prague, Czech Republic, 2005.
[Mit87] Roger Mitton. Spelling checkers, spelling correctors and the misspellings of
poor spellers. Information Processing & management, 23(5):495–505, 1987.
[MJDS07] Gurmeet Singh Manku, Arvind Jain, and Anish Das Sarma. Detecting
near-duplicates for web crawling. In Proceedings of the 16th international
conference on World Wide Web, pages 141–150. ACM, 2007.
[MM93] Udi Manber and Gene Myers. Suffix arrays: a new method for on-line
string searches. SIAM Journal on Computing, 22(5):935–948, 1993.
[MN05a] Moritz G. Maaß and Johannes Nowak. Text indexing with errors. In
Combinatorial Pattern Matching, pages 21–32. Springer, 2005.
[MN05b] Veli Mäkinen and Gonzalo Navarro.
Succinct suffix arrays based on
run-length encoding. In Combinatorial Pattern Matching, pages 45–56.
Springer, 2005.
[Mor68] Donald R. Morrison. PATRICIA – practical algorithm to retrieve information coded in alphanumeric. Journal of the ACM, 15(4):514–534, 1968.
[MP69] Marvin Minsky and Seymour Papert. Perceptrons. MIT Press, Cambridge,
Massachusetts, 1969.
[MP08] Michael A. Maniscalco and Simon J. Puglisi. An efficient, versatile approach
to suffix sorting. Journal of Experimental Algorithmics, 12:1–2, 2008.
[MV08] Svetlin A. Manavski and Giorgio Valle. CUDA compatible GPU cards as
efficient hardware accelerators for Smith-Waterman sequence alignment.
BMC Bioinformatics, 9(Suppl 2):S10, 2008.
88
Bibliography
[MW94a] Udi Manber and Sun Wu. An algorithm for approximate membership checking with application to password security. Information Processing Letters,
50(4):191–197, 1994.
[MW94b] Udi Manber and Sun Wu. GLIMPSE: A tool to search through entire file
systems. In Usenix Winter, pages 23–32, 1994.
[Mye99] Gene Myers. A fast bit-vector algorithm for approximate string matching
based on dynamic programming. Journal of the ACM, 46(3):395–415, 1999.
[Nav01] Gonzalo Navarro. A guided tour to approximate string matching. ACM
Computing Surveys, 33(1):31–88, 2001.
[NBYST01] Gonzalo Navarro, Ricardo A. Baeza-Yates, Erkki Sutinen, and Jorma
Tarhio. Indexing methods for approximate string matching. IEEE Data
Engineering Bulletin, 24(4):19–27, 2001.
[NC07] Alexandros Ntoulas and Junghoo Cho. Pruning policies for two-tiered inverted index with correctness guarantee. In Proceedings of the 30th annual
international ACM SIGIR conference on Research and development in information retrieval, pages 191–198. ACM, 2007.
[NM07] Gonzalo Navarro and Veli Mäkinen. Compressed full-text indexes. ACM
Computing Surveys, 39(1):2, 2007.
[Non13] Ge Nong. Practical linear-time o(1)-workspace suffix sorting for constant
alphabets. ACM Transactions on Information Systems, 31(3):15, 2013.
[NR03] Gonzalo Navarro and Mathieu Raffinot. Fast and simple character classes
and bounded gaps pattern matching, with applications to protein searching.
Journal of Computational Biology, 10(6):903–923, 2003.
[NS03] Nicholas Nethercote and Julian Seward. Valgrind: A program supervision
framework. Electronic Notes in Theoretical Computer Science, 89(2):44–66,
2003.
[NW70] Saul B. Needleman and Christian D. Wunsch. A general method applicable
to the search for similarities in the amino acid sequence of two proteins.
Journal of Molecular Biology, 48(3):443–453, 1970.
[OV03] Christos A. Ouzounis and Alfonso Valencia. Early bioinformatics: the birth
of a discipline — a personal view. Bioinformatics, 19(17):2176–2190, 2003.
[Pet80] James L. Peterson.
Computer programs for detecting and correcting
spelling errors. Communications of the ACM, 23(12):676–687, 1980.
89
Bibliography
[Pet86] James L. Peterson. A note on undetected typing errors. Communications
of the ACM, 29(7):633–637, 1986.
[PH89] Alan Parker and O. Hamblen, James. Computer algorithms for plagiarism
detection. IEEE Transactions on Education, 32(2):94–99, 1989.
[piz] Pizza&Chili corpus – compressed indexes and their testbeds.
http:
//pizzachili.dcc.uchile.cl/. [Online; accessed 09-June-2015].
[PJT09] Victor Pankratius, Ali Jannesari, and Walter F. Tichy. Parallelizing bzip2:
A case study in multicore software engineering. Software, IEEE, 26(6):70–
77, 2009.
[PST07] Simon J. Puglisi, William F. Smyth, and Andrew H. Turpin. A taxonomy
of suffix array construction algorithms. ACM Computing Surveys, 39(2):4,
2007.
[PZ84] Joseph J. Pollock and Antonio Zamora. Automatic spelling correction in
scientific and scholarly text. Communications of the ACM, 27(4):358–368,
1984.
[Rab81] Michael O. Rabin. Fingerprinting by random polynomials. Technical Report TR-15-81, Department of Mathematics, The Hebrew University of
Jerusalem, Israel, 1981.
[ran] /indexes/fm. http://ranisz.iis.p.lodz.pl/indexes/fm/. [Online; accessed 24-July-2015].
[RHH+ 04] Michael Roberts, Wayne Hayes, Brian R. Hunt, Stephen M. Mount, and
James A. Yorke. Reducing storage requirements for biological sequence
comparison. Bioinformatics, 20(18):3363–3369, 2004.
[RN10] Stuart Russell and Peter Norvig. Artificial Intelligence: a Modern Approach. Prentice Hall, 3rd edition, 2010.
[RRR02] Rajeev Raman, Venkatesh Raman, and S. Srinivasa Rao. Succinct indexable dictionaries with applications to encoding k-ary trees and multisets.
In Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete
algorithms, pages 233–242. Society for Industrial and Applied Mathematics,
2002.
[Sal04] David Salomon. Data compression: the complete reference. Springer Science
& Business Media, 2004.
90
Bibliography
[SD10] Jared T. Simpson and Richard Durbin. Efficient construction of an assembly string graph using the FM-index. Bioinformatics, 26(12):i367–i373,
2010.
[sds] sdsl-lite. https://github.com/simongog/sdsl-lite. [Online; accessed
24-July-2015].
[Sew] Julian Seward. bzip2. http://bzip.org/. [Online; accessed 13-July-2015].
[Sha48] Claude Elwood Shannon. A mathematical theory of communication. The
Bell Systems Technical Journal, 27(3):379–423, 1948.
[Ski98] Steven S. Skiena. The algorithm design manual, volume 1. Springer Science
& Business Media, 1998.
[SRY+ 96] Eugene G. Shpaer, Max Robinson, David Yee, James D. Candlin, Robert
Mines, and Tim Hunkapiller. Sensitivity and selectivity in protein similarity
searches: a comparison of Smith–Waterman in hardware to BLAST and
FASTA. Genomics, 38(2):179–191, 1996.
[ST95] Erkki Sutinen and Jorma Tarhio. On using q-gram locations in approximate
string matching. In Algorithms - ESA ’95, Third Annual European Symposium, Corfu, Greece, September 25-27, 1995, Proceedings, pages 327–340,
1995.
[SW81] Temple F. Smith and Michael S. Waterman. Identification of common
molecular subsequences. Journal of Molecular Biology, 147(1):195–197,
1981.
[SW96] Fei Shi and Peter Widmayer. Approximate multiple string searching by
clustering. Genome Informatics, 7:33–40, 1996.
[TSCV04] Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese. Deterministic memory-efficient string matching algorithms for intrusion detection. In INFOCOM 2004. Twenty-third Annual Joint Conference of the
IEEE Computer and Communications Societies, volume 4, pages 2628–
2639. IEEE, 2004.
[Tsu10] Dekel Tsur. Fast index for approximate string matching. Journal of Discrete
Algorithms, 8(4):339–345, 2010.
[Tur50] Alan Turing. Computing machinery and intelligence. Mind, 59:433–460,
1950.
91
Bibliography
[typ] Lists of common misspellings.
http://en.wikipedia.org/wiki/
Wikipedia:Lists_of_common_misspellings/For_machines. [Online; accessed 28-July-2015].
[Ukk85a] Esko Ukkonen. Algorithms for approximate string matching. Information
and Control, 64(1):100–118, 1985.
[Ukk85b] Esko Ukkonen. Finding approximate patterns in strings. Journal of Algorithms, 6(1):132–137, 1985.
[Ukk95] Esko Ukkonen.
On-line construction of suffix trees.
Algorithmica,
14(3):249–260, 1995.
[uni] UniProt. http://www.uniprot.org/. [Online; accessed 21-April-2015].
[Vig08] Sebastiano Vigna. Broadword implementation of rank/select queries. In
Experimental Algorithms, pages 154–168. Springer, 2008.
[Wei73] Peter Weiner. Linear pattern matching algorithms. In Switching and Automata Theory, 1973. SWAT’08. IEEE Conference Record of 14th Annual
Symposium on, pages 1–11. IEEE, 1973.
[Wil83] Dan E. Willard. Log-logarithmic worst-case range queries are possible in
space θ(n). Information Processing Letters, 17(2):81–84, 1983.
[WJ94] Lusheng Wang and Tao Jiang. On the complexity of multiple sequence
alignment. Journal of Computational Biology, 1(4):337–348, 1994.
[WMM96] Sun Wu, Udi Manber, and Gene Myers. A subquadratic algorithm for
approximate limited expression matching. Algorithmica, 15(1):50–67, 1996.
[YY95] Andrew Chi-Chih Yao and F. Frances Yao. Dictionary look-up with small
errors. In Combinatorial Pattern Matching, pages 387–394, 1995.
List of Symbols
B block — either an I/O unit or a fixed-size piece of a bit vector
c character (a string of length 1)
C count table in the FM-index
CL cache line size
D distance metric
δ time required for calculating D(S1 , S2 ) for two strings over the same alphabet Σ
D dictionary of keywords (for keyword indexes)
d word (string) from a dictionary
Enc(d) encoded (compressed) word d
F first column of the BWT matrix
H hash function
Hk (S) k-th order entropy of string S
HT hash table
HW Hamming weight (number of 1s in a bit vector)
Ham Hamming distance
bie number i rounded to the nearest integer
I index for string matching
k number of errors (in approximate matching)
L last column of the BWT matrix
LF load factor
92
List of Symbols
Lev Levenshtein distance
m pattern size, m = |P |
n input size
occ number of occurrences of the pattern
M (S) set of minimizers of string S
P pattern
p piece of a word in the case of word partitioning
P r(e) probability of event e
Q collection of q-grams
S string
S 0 string sketch over S
s substring
S set of substrings (for full-text indexes)
SA suffix array
Σ alphabet
Σ∗ set of all strings over the alphabet Σ
σ alphabet size, σ = |Σ|
T input string (text)
TR RRR table
T bwt input text T after applying the BWT
w size of the machine word (typically 32 or 64 bits)
v bit vector
93
List of Abbreviations
BF Bloom filter
LF load factor
BM Boyer–Moore algorithm
MF Mor–Fraenkel algorithm
BMH Boyer–Moore–Horspool algorithm
MPHF minimal perfect hash function
BST binary search tree
NL natural language
BWT Burrows–Wheeler transform
NW Needleman–Wunsch algorithm
CSA compressed suffix array
OCR optical character recognition
CoSA compact suffix array
P&C Pizza & Chili corpus
DFS depth-first search
PiES partitioning into exact searching
DP dynamic programming
RK Rabin–Karp algorithm
ESA enhanced suffix array
SA suffix array
FSM finite state machine
SC suffix cactus
I/O input/output
TLB translation lookaside buffer
KMP Knuth–Morris–Pratt algorithm
ST suffix tree
LCP longest common prefix
SW Smith–Waterman algorithm
LCS longest common subsequence
WT wavelet tree
94
List of Figures
1.1
1.2
1.3
1.4
A binary search tree (BST) storing strings from the English alphabet.
A trie which is one of the basic structures used in string searching. . .
A hash table for strings. . . . . . . . . . . . . . . . . . . . . . . . . . .
The formula for Shannon’s entropy. . . . . . . . . . . . . . . . . . . . .
2.1
Calculating an alignment with Levenshtein distance using the Needleman–
Wunsch (NW) algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.1
3.2
3.3
3.8
3.9
3.10
3.11
3.12
3.13
A suffix tree (ST) which stores all suffixes of a given text. . . . . . . . . .
A suffix array (SA) which stores indexes of sorted suffixes of a given text.
A compressed suffix array (CSA) which stores indexes pointing to the next
suffix from the text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Calculating the Burrows–Wheeler transform (BWT). . . . . . . . . . . . .
A relation between the BWT and the SA. . . . . . . . . . . . . . . . . . .
Count table C which is a part of the FM-index. . . . . . . . . . . . . . . .
Formulae for updating the range during the search procedure in the FMindex. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
An example of RRR blocks. . . . . . . . . . . . . . . . . . . . . . . . . . .
An example of an RRR table. . . . . . . . . . . . . . . . . . . . . . . . . .
A wavelet tree (WT). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Q-gram extraction in the FM-bloated structure with superlinear space. . .
Constructing FM-bloated phrases with the use of minimizers. . . . . . . .
Selecting all overlapping q-grams from a given text. . . . . . . . . . . . . .
33
34
34
35
37
39
42
4.1
4.2
4.3
4.4
A Bloom filter (BF) for approximate membership queries. . .
An inverted index which stores a mapping from words to their
Split index for keyword indexing. . . . . . . . . . . . . . . . .
Selecting minimizers from a given text. . . . . . . . . . . . . .
44
45
50
54
5.1
Query time per character vs pattern length for the English text of size
30 MB (FM-bloated). . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Query time per character vs pattern length for different methods for the
English text of size 30 MB (FM-bloated). . . . . . . . . . . . . . . . . . .
Query time and index size vs the load factor (split index). . . . . . . . .
Query time and index size vs dictionary size, with and without q-gram
coding for English dictionaries (split index). . . . . . . . . . . . . . . . .
Query time and index size vs dictionary size, with and without q-gram
coding for DNA dictionaries (split index). . . . . . . . . . . . . . . . . .
Query time vs index size for different methods (split index). . . . . . . .
3.4
3.5
3.6
3.7
5.2
5.3
5.4
5.5
5.6
95
.
.
.
.
. . . . . .
positions.
. . . . . .
. . . . . .
. 8
. 9
. 11
. 12
.
.
.
.
27
28
29
32
33
33
. 57
. 58
. 59
. 60
. 61
. 62
List of Figures
5.7
5.8
96
Comparison time vs word size for 1 mismatch using occurrence sketches
for words generated over the English alphabet. . . . . . . . . . . . . . . . 63
Comparison time vs word size for 1 mismatch using count sketches for
words generated over the English alphabet. . . . . . . . . . . . . . . . . . 64
B.1 Average number of character comparisons when comparing two random
strings from the same alphabet with uniform letter frequency vs the alphabet size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
C.1 Index size vs the number of 2-grams used for the compression for the
English dictionary (split index). . . . . . . . . . . . . . . . . . . . . . . . . 71
C.2 Index size vs the number of 3-grams used for the compression for the DNA
dictionary (split index). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
D.1 Comparison time vs word size for 1 mismatch using various string sketches
generated over the alphabet with uniform letter frequency and σ = 26. . . 73
List of Tables
1.1
A comparison of the complexities of basic data structures which can be
used for exact string searching. . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1
Algorithm classification based on whether the data is preprocessed. . . . . 18
5.1
5.2
Evaluated hash functions and search times per query (split index). . . . . 58
Query time and index size vs the error value k (split index). . . . . . . . . 59
A.1 A summary of data
of full-text indexes.
A.2 A summary of data
of keyword indexes.
sets which were used
. . . . . . . . . . . .
sets which were used
. . . . . . . . . . . .
for
. .
for
. .
the experimental
. . . . . . . . . .
the experimental
. . . . . . . . . .
evaluation
. . . . . . . 67
evaluation
. . . . . . . 68
E.1 Frequencies of English alphabet letters. . . . . . . . . . . . . . . . . . . . . 74
F.1 A summary of Internet addresses of hash functions. . . . . . . . . . . . . . 75
97
| 8cs.DS
|
arXiv:1511.06967v1 [math.AC] 22 Nov 2015
ARTIN APPROXIMATION PROPERTY AND THE GENERAL
NERON DESINGULARIZATION
DORIN POPESCU
Abstract. This is an exposition on the General Neron Desingularization and its
applications. We end with a recent constructive form of this desingularization in
dimension one.
Key words : Artin approximation, Neron Desingularization, Bass-Quillen Conjecture, Quillen’s Question, smooth morphisms, regular morphisms, smoothing ring
morphisms.
2010 Mathematics Subject Classification: Primary 1302, Secondary 13B40, 13H05,
13H10, 13J05, 13J10, 13J15, 14B07, 14B12, 14B25.
Introduction
Let K be a field and R = Khxi, x = (x1 , . . . , xm ) be the ring of algebraic power
series in x over K, that is the algebraic closure of the polynomial ring K[x] in the
formal power series ring R̂ = K[[x]]. Let f = (f1 , . . . , fq ) in Y = (Y1 , . . . , Yn ) over
R and ŷ be a solution of f in the completion R̂ of R.
Theorem 1 (M. Artin [Artin69]). For any c ∈ N there exists a solution y (c) in R
such that y (c) ≡ ŷ mod (x)c .
In general we say that a local ring (A, m) has the Artin approximation property
if for every system of polynomials f = (f1 , . . . , fq ) ∈ A[Y ]q , Y = (Y1 , . . . , Yn ), a
solution ŷ of f in the completion  and c ∈ N there exists a solution y (c) in A of f
such that y (c) ≡ ŷ mod mc . In fact A has the Artin approximation property if every
finite system of polynomial equations over A has a solution in A if and only if it
has a solution in the completion  of A. We should mention that M. Artin proved
already in [Artin68] that the ring of convergent power series with coefficients in C
has the Artin approximation property as it was later called.
A ring morphism u : A → A′ of Noetherian rings has regular fibers if for all prime
ideals P ∈ Spec A the ring A′/P A′ is a regular ring, i.e. its localizations are regular
local rings. It has geometrically regular fibers if for all prime ideals P ∈ Spec A and
all finite field extensions K of the fraction field of A/P the ring K ⊗A/P A′/P A′ is
regular.
A flat morphism of Noetherian rings u is regular if its fibers are geometrically
regular. If u is regular of finite type then u is called smooth. A localization of a
smooth algebra is called essentially smooth.
We gratefully acknowledge the support from the project ID-PCE-2011-1023, granted by the
Romanian National Authority for Scientific Research, CNCS - UEFISCDI.
1
A Henselian Noetherian local ring A is excellent if the completion map A → Â
is regular. For example, a Henselian discrete valuation ring V is excellent if the
completion map V → V̂ induces a separable fraction field extension.
Theorem 2 (M. Artin [Artin69]). Let V be an excellent Henselian discrete valuation
ring and V hxi the ring of algebraic power series in x over V , that is the algebraic
closure of the polynomial ring V [x] in the formal power series ring V [[x]]. Then
V hxi has the Artin approximation property.
The proof used the so called the Néron Desingularization, which says that an
unramified extension V ⊂ V ′ of valuation rings inducing separable field extensions
on the fraction and residue fields, is a filtered inductive union of essentially finite
type subextensions V ⊂ A, which are regular local rings, even essentially smooth
V -subalgebras of V ′ .
Néron Desingularization is extended by the following theorem.
Theorem 3 (General Neron Desingularization, Popescu [P85], [P86], [P90], André
[An91], Teissier [Te94], Swan [Sw98], Spivakovski [Sp99]). Let u : A → A′ be a
regular morphism of Noetherian rings and B an A-algebra of finite type. Then any
A-morphism v : B → A′ factors through a smooth A-algebra C, that is v is a
composite A-morphism B → C → A′ .
The smooth A-algebra C given for B by the above theorem is called a General
Neron Desingularization. Note that C is not uniquely associated to B and so we
better speak about a General Neron Desingularization.
The above theorem gives a positive answer to a conjecture of M. Artin [Artin70].
Theorem 4 ([P86], [P00]). An excellent Henselian local ring has the Artin approximation property.
This paper is a survey on the Artin approximation property, the General Neron
Desingularization and their applications. It relies mainly on some lectures given by
us within the special semester on Artin Approximation of the Chaire Jean Morlet at
CIRM, Luminy, Spring 2015 (see http://hlombardi.free.fr/Popescu-Luminy2015.pdf).
1. Artin approximation properties
First we show how one recovers Theorem 4 from Theorem 3. Indeed, let f be a
finite system of polynomial equations over A in Y = (Y1 , . . . , Yn ) and ŷ a solution
of f in Â. Set B = A[Y ]/(f ) and let v : B → Â be the morphism given by Y → ŷ.
By Theorem 3, v factors through a smooth A-algebra C, that is v is a composite
A-morphism B → C → A′ . Thus changing B by C we may reduce the problem to
the case when B is smooth over A. Since A′ is local, changing B by Bb for some
b ∈ B \ v −1 (mA′ ) we may assume that 1 ∈ (g) : I MB for somepolynomials
∂g
g = (g1 , . . . , gr ) from (f ) and a r × r-minor M of the Jacobian matrix
. Thus
∂Y
g(ŷ) = 0 and M(ŷ) is invertible. By the Implicit Function Theorem there exists
y ∈ A such that y ≡ ŷ modulo mÂ.
2
The following consequence of Theorem 3 was noticed and hinted by N. Radu to
M. André. This was the origin of André’s interest to read our theorem and to write
later [An91].
Corollary 5. Let u : A → A′ be a regular morphism of Noetherian rings. Then the
differential module ΩA′ /A is flat.
For the proof note that by Theorem 3 it follows that A′ is a filtered inductive limit
of some smooth A-algebras C and so ΩA′ /A is a filtered inductive limit of A′ ⊗C ΩC/A ,
the last modules being free modules.
Definition 6. A Noetherian local ring (A, m) has the strong Artin approximation
property if for every finite system of polynomial equations f in Y = (Y1 , . . . , Yn ) over
A there exists a map ν : N → N with the following property:
If y ′ ∈ An satisfies f (y ′) ≡ 0 modulo mν(c) , c ∈ N, then there exists
a solution y ∈ An of f with y ≡ y ′ modulo mc .
M. Greenberg [Gr66] proved that excellent Henselian discrete valuation rings have
the strong Artin approximation property and ν is linear in this case.
Theorem 7 (M. Artin [Artin69]). The algebraic power series ring over a field has
the strong Artin approximation property.
Note that in general ν is not linear as it is showed in [Ron05]. The following
theorem was conjectured by M. Artin in [Artin70].
Theorem 8 ([P75]). Let A be an excellent Henselian discrete valuation ring and
Ahxi the ring of algebraic power series in x over A. Then Ahxi has the strong Artin
approximation property.
Theorem 9 (Pfister-Popescu [PfPo75] (see also [KMPPR78], [P79])). The Noetherian complete local rings have the strong Artin approximation property. In particular,
A has the strong Artin approximation property if it has the Artin approximation
property.
Thus Theorem 8 follows from Theorem 2 and Theorem 4 gives that excellent
Henselian local rings have the strong Artin approximation property. An easy direct
proof of this fact is given in [P86, 4.5] using Theorem 3 and the ultrapower methods.
What about the converse implication in Theorem 4? It is clear that A is Henselian
if it has the Artin approximation property. On the other hand, if A is reduced and
it has the Artin approximation property, then  is reduced, too. Indeed, if ẑ ∈  is
nonzero and satisfies ẑ r = 0 then choosing c ∈ N such that ẑ 6∈ mc  we get a z ∈ A
such that z r = 0 and z ≡ ẑ modulo mc Â. It follows that z 6= 0, which contradicts
our hypothesis. It is easy to see that a local ring B which is finite as a module
over A has the Artin approximation property if A has it. It follows that if A has
the Artin approximation property, then it has so called reduced formal fibers. In
particular, A must be a so called universally japanese ring.
Using also the strong Artin approximation property it is possible to prove that
given a system of polynomial equations f ∈ A[Y ]r , Y = (Y1 , . . . , Yn ) and another
3
one g ∈ A[Y, Z]t , Z = (Z1 , . . . , Zs ) then the sentence
LA := there exists y ∈ An such that f (y) = 0 and g(y, z) 6= 0 for all z ∈ As
holds in A if and only if L holds in  provided that A has the Artin approximation
property. In this way it was proved in [BNP81] that if A has the Artin approximation
property, then A is a normal domain if and only if  is a normal domain, too (this was
actually the starting point of the quoted paper). Later, Cipu and myself [CP81] used
this fact to show that the formal fibers of A are the so called geometrically normal
domains if A has the Artin approximation property. Finally, Rotthaus [Rot90]
proved that A is excellent if A has the Artin approximation property.
Next, let (A, m) be an excellent Henselian local ring, Â its completion and MCM(A)
(resp. MCM(Â)) be the set of isomorphism classes of maximal Cohen Macaulay
modules over A (resp. Â). Assume that A is an isolated singularity. Then a
maximal Cohen-Macaulay module is free on the punctured spectrum. Since  is
also an isolated singularity we see that the map ϕ :MCM(A) →MCM(Â) given by
M → Â ⊗A M is surjective by a theorem of Elkik [El73, Theorem 3].
Theorem 10 (Popescu-Roczen, [PR90]). ϕ is bijective.
Proof. Let M, N be
two finite A-modules. P
We may suppose that M = An /(u),
P
N = An /(v), uk = j∈[n] ukj ej , k ∈ [t], vr = j∈[n] vrj ej , r ∈ [p], where ukj , vrj ∈ A
and (ej ) is the canonical basis of An . Let f : An → An be an A-linear map defined
by an invertible n × n-matrix (xij ) with respect to (ej ). Then f induces a bijection
M → N if and only if f maps (u) onto (v), that is there exist ykr , zrk ∈ A, k ∈ [t],
r ∈ [p] such that
P
1) f (uk ) = r∈[p] ykr vr , k ∈ [t] and
P
2) f ( k∈[t] zrk uk ) = vr , r ∈ [p].
Note
Pthat 1), 2) are
Pequivalent to
′
1 ) i∈[n] uki xij = r∈[p] ykr vrj , k ∈ [t], j ∈ [n],
P
P
2′ ) k∈[t] zrk ( i∈[n] uki xij ) = vrj , r ∈ [p], j ∈ [n].
Therefore, if  ⊗A M ∼
=  ⊗A N there exist (x̂ij ), (ŷkr ), (ẑrk ) in  such that
det(x̂ijP
) 6∈ m and
P
1′′ ) i∈[n] uki x̂ij = r∈[p] ŷkr vrj , k ∈ [t], j ∈ [n],
P
P
2′′ ) k∈[t] ẑrk ( i∈[n] uki x̂ij ) = vrj , r ∈ [p], j ∈ [n].
Then by the Artin approximation property there exists a solution of 1′′ ), 2′′ ), let
us say (xij ), (ykr ), (zrk ) in A, such that xij ≡ x̂ij , ykr ≡ ŷkr , zrk ≡ ẑrk modulo mÂ.
It follows that det(xij ) ≡ det(x̂ij ) 6≡ 0 modulo m and so M ∼
= N.
Corollary 11. In the hypothesis of the above theorem if M ∈ MCM(A) is indecomposable, then  ⊗A M is indecomposable, too.
Proof. Assume that Â⊗A M = N̂1 ⊕ N̂2 . Then N̂i ∈ MCM(Â) and by the surjectivity
of ϕ we get N̂i =  ⊗A Ni for some Ni ∈ MCM(A). Then  ⊗A M ∼
= (Â ⊗A N1 ) ⊕
∼
(Â ⊗A N2 ) and the injectivity of ϕ gives M = N1 ⊕ N2 .
4
Remark 12. If A is not Henselian then the above corollary is false. For example
let A = C[X, Y ](X,Y ) /(Y 2 − X 2 − X 3 ). Then M = (X, Y )A is indecomposable in
√
MCM(A) but  ⊗A M is decomposable. Indeed, for û = 1 + X ∈  we have
 ⊗A M = (Y − ûX) ⊕ (Y − ûX)Â.
Remark 13. Let Γ(A), Γ(Â) be the so called AR-quivers of A, Â. Then ϕ induces
also an inclusion Γ(A) ⊂ Γ(Â) (see [PR90]).
Remark 14. It is known that MCM(Â) is finite if and only if  is a simple singularity. What about a complex unimodal singularity R? Certainly in this case
MCM(R) is infinite but maybe there exists a special property which characterizes
the unimodal singularities. For this purpose it would be necessary to describe somehow MCM(R) at least in some special cases. Small attempts are done by Andreas
Steenpass [St14].
For most of the cases when we need the Artin approximation property, it is enough
to apply Artin’s Theorem 1. Sometimes we might need a special kind of Artin approximation, the so called Artin approximation in nested subring condition, namely
the following result which was also considered as possible by M. Artin in [Artin70].
Theorem 15 ([P86], [P00, Theorem 3.6]). Let K be a field, A = Khxi, x =
(x1 , . . . , xm ), f = (f1 , . . . , fr ) ∈ Khx, Y ir , Y = (Y1 , . . . , Yn ) and 0 ≤ s1 ≤ . . . ≤ sn ≤
m, c be some non-negative integers. Suppose that f has a solution ŷ = (ŷ1, . . . , ŷn )
in K[[x]] such that ŷi ∈ K[[x1 , . . . , xsi ]] for all 1 ≤ i ≤ n. Then there exists a
solution y = (y1 , . . . , yn ) of f in A such that yi ∈ Khx1 , . . . , xsi i for all 1 ≤ i ≤ n
and y ≡ ŷ mod (x)c K[[x]].
Corollary 16. The Weierstrass Preparation Theorem holds for the ring of algebraic
power series over a field.
Proof. Let f ∈ Khxi, x = (x1 , . . . , xm ) be an algebraic power series such that
f (0, . . . , 0, xm ) 6= 0. By Weierstrass Preparation Theorem f is associated in diP
i
visibility with a monic polynomial ĝ = xpm + p−1
i=0 ẑi xm ∈ K[[x1 , . . . , xm−1 ]][xm ]
for some p ∈ N, ẑi ∈ (x1 , . . . , xm−1 )K[[x1 , . . . , xm−1 ]]. Thus the system F1 =
P
i
f − Y (xpm + p−1
i=0 Zi xm ), F2 = Y U − 1 has a solution ŷ, û, ẑi in K[[x]] such that
ẑi ∈ K[[x1 , . . . , xm−1 ]]. By Theorem 15 there exists a solution y, u, zi in Khxi such
that zi ∈ Khx1 , . . . , xm−1 i and is congruent modulo (x) with the previous one. Thus
P
i
y is invertible and f = yg, where g = xpm + p−1
i=0 zi xm ∈ Khx1 , . . . , xm−1 i[xm ]. By
the unicity of the (formal) Weierstrass Preparation Theorem it follows that y = ŷ
and g = ĝ.
Now, we see that Theorem 15 is useful to get algebraic versal deformations (see
[Artin74]) . Let D = KhZi, A = KhT i/J, Z = (Z1 , . . . , Zs ), T = (T1 , . . . , Tn ) and
N = D/(f1 , . . . , fd ). A deformation of N over A is a
P = KhT, Zi/(J) ∼
= ((A ⊗K D)(T,Z) )h -module L such that
1) L ⊗A K ∼
= N,
2) L is flat over A,
5
where above B h denotes the Henselization of a local ring B. The condition 1) says
that L has the form P/(F1 , . . . , Fd ) with Fi ∈ KhT, Zi, Fi ∼
= fi modulo (T ) and 2)
says that
2′ ) TorA
1 (L, K) = 0
by the Local Flatness Criterion, since L is (T )-adically ideal separated because P is
local Noetherian. Let
ν
Pe −
→ Pd → P → L → 0
be part of a free resolution of L over P , where the map P d → P is given by
(F1 , . . . , Fd ). Then 2′ ) says that tensorizing with K ⊗A − the above sequence we get
an exact sequence
D e → D d → D → N → 0,
because P is flat over A. Therefore, 2′ ) is equivalent to
P
2′′ ) For all g ∈ D d with di=1 gi fi = 0 there exists G ∈ KhT, Zid with G ≡ g
P
modulo (T ) such that G modulo J ∈ Im ν, that is di=1 Gi Fi ∈ (J).
We would like to construct a versal deformation L (see [KMPPR78, pages 157159]), that is for any A′ = KhUi/J ′ , U = (U1 , . . . , Un′ ), P ′ = ((A′ ⊗K D)(U,Z))h and
L′ = KhUi/(F ′ ) a deformation of N to A′ there exists a morphism α : A → A′ such
that P ′ ⊗P L ∼
= L′ , where the structural map of P ′ over P is given by α. If we
replace above the algebraic power series with formal power series then this problem
is solved by Schlessinger in the infinitesimal case followed by some theorems of Elkik
and M. Artin. Set  = K[[T ]]/(J), P̂ = (( ⊗K D)(T,Z))h . We will assume that we
have already L such that L̂ = P̂ ⊗P L is versal in the frame of complete local rings.
How to get the versal property for L in the frame of algebraic power series?
Let A′ , P ′ , L′ be as above. Since L̂ is versal in the frame of complete local rings,
there exists α̂ : Â → Â′ such that P̂ ′ ⊗P̂ L̂ ∼
= L̂′ = P̂ ′ ⊗P ′ L′ , where the structure of
P̂ ′ as a P̂ -algebra is given by α̂. Assume that α̂ is given by T → t̂ ∈ (U)K[[U]]n .
Then we have
i) J(t̂) ≡ 0 modulo (J ′ ).
On the other hand, we may suppose that α̂ induces an isomorphism P̂ ′ ⊗P̂ L̂ → L̂′
which is given by (T, Z) → (t̂, ẑ) for some ẑ ∈ (U, Z)K[[U, Z]]s with ẑ ≡ Z modulo
(U, Z)2 and the ideals (F (t̂, ẑ)), (F ′ ) of K[[U, Z]] coincide. Thus there exists an
invertible d × d-matrix Ĉ = (Ĉij ) over K[[U, Z]] with
P
ii) Fi′ = dj=1 Ĉij Fj (t̂, ẑ)).
By Theorem 15 we may find t ∈ (U)KhUin and z ∈ (U, Z)KhU, Zis, Cij ∈
KhU, Zi satisfying i), ii) and such that t ≡ t̂, z ≡ ẑ, Cij ≡ Ĉij modulo (U, Z)2.
Note that det(Cij ) ≡ det Ĉ modulo (U, Z)2 and so (Cij ) is invertible. It follows that
α : A → A′ given by T → t is the wanted one, that is P ′ ⊗P L ∼
= L′ , where the
′
structure of P as a P -algebra is given by α.
Next we give an idea of the proof of Theorem 15 in a particular, but essential
case.
Proposition 17. Let K be a field, A = Khxi, x = (x1 , . . . , xm ), f = (f1 , . . . , fr ) ∈
Khx, Y ir , Y = (Y1 , . . . , Yn ) and 0 ≤ s ≤ m, 1 ≤ q ≤ n, c be some non-negative
6
integers. Suppose that f has a solution ŷ = (ŷ1 , . . . , ŷn ) in K[[x]] such that ŷi ∈
K[[x1 , . . . , xs ]] for all 1 ≤ i ≤ q. Then there exists a solution y = (y1 , . . . , yn ) of f
in A such that yi ∈ Khx1 , . . . , xs i for all 1 ≤ i ≤ q and y ≡ ŷ mod (x)c K[[x]].
Proof. Note that B = K[[x1 , . . . , xs ]]hxs+1 , . . . , xm i is excellent Henselian and so it
has the Artin approximation property. Thus the system of polynomials
f ((ŷi )1≤i≤q , Yq+1, . . . , Yn ) has a solution (ỹj )q<j≤n in B with ỹj ≡ ŷj modulo (x)c .
Now it is enough to apply the following lemma for A = Khx1 , . . . , xs i.
Lemma 18. Let (A, m) be an excellent Henselian local ring, Â its completion, A[x]h ,
x = (x1 , . . . , xm ), Â[x]h be the Henselizations of A[x](m,x) respectively Â[x](m,x) , f =
(f1 , . . . , fr ) a system of polynomials in Y = (Y1 , . . . , Yn ) over A[x]h and 1 ≤ q < n,
c be some positive integers. Suppose that f has a solution ŷ = (ŷ1 , . . . , ŷn ) in Â[x]h
such that ŷi ∈ Â for all i ≤ q. Then there exists a solution y = (y1 , . . . , yn ) of f in
A[x]h such that yi ∈ A for all i ≤ q and y ≡ ŷ mod mc Â[x]h .
Proof. Â[x]h is a union of etale neighborhoods of Â[x]. Take an etale neighborhood
B of Â[x](m,x) such that ŷi ∈ B for all q < i ≤ n. Then B ∼
= (Â[x, T ]/(ĝ))(m,x,T ) for
some monic polynomial ĝ in T over Â[x] with ĝ(0) ∈ (m, x) and ∂ĝ/∂T (0) 6∈ (m, x),
let us say
e−1
X
X
e
ĝ = T +
(
ẑjk xk )T j ,
j=0 k∈Nm ,|k|<u
for some u high enough and ẑjk ∈ Â. Note that ẑ00 ∈ m and ẑ10 6∈ mÂ. Changing
if necessary u, we may suppose that
ŷi ≡
e−1
X
X
(
ŷijk xk )T j mod ĝ
j=0 k∈Nm ,|k|<u
for some ŷijk ∈ Â, q < i ≤ n. Actually, we should take ŷi as a fraction but for an
easier expression we will skip the denominator. Substitute Yi , q < i ≤ n by
Yi+
=
e−1
X
X
(
Yijk xk )T j
j=0 k∈Nm ,|k|<u
in f and divide by the monic polynomial
G = Te +
e−1
X
X
(
Zjk xk )T j
j=0 k∈Nm ,|k|<u
in Â[x, T, Y1 , . . . , Yt , (Yij ), (Zj )], where (Yijk ), (Zjk ) are new variables.
We get
+
fp (Y1 , . . . , Yq , Y ) ≡
e−1
X
(
X
Fpjk (Y1 , . . . , Yq , (Yijk ), (Zjk ))xk T j mod G,
j=0 k∈Nm ,|k|<u
7
1 ≤ p ≤ r. Then ŷ is a solution of f in B if and only if (ŷ1 , . . . , ŷq , (ŷijk ), (ẑjk )) is a
solution of (Fpjk ) in Â. As A has the Artin approximation property we may choose
a solution (y1 , . . . , yq , (yijk ), (zjk )) of (Fpjk ) in A which coincides modulo mc  with
the former one. Then
e−1
X
X
yi =
(
(yijk ))xk T j ,
j=0 k∈Nm ,|k|<u
q < i ≤ n together with yi , 1 ≤ i ≤ q form a solution of f in the etale neighborhood
B ′ = (A[x, T ]/(g))(m,x,T ),
e
g=T +
e−1
X
X
(
zjk xk )T j
i=0 k∈Nm ,|k|<u
of A[x](m,x) , which is contained in A[x]h . Clearly, y is the wanted solution.
2. Applications to the Bass-Quillen Conjecture
Let R[T ], T = (T1 , . . . , Tn ) be a polynomial algebra in T over a regular local
ring (R, m). An extension of Serre’s Problem proved by Quillen and Suslin is the
following
Conjecture 19 (Bass-Quillen). Every finitely generated projective module over
R[T ] is free.
Theorem 20 (Lindel [Li81]). The Bass-Quillen Conjecture holds if R is essentially
of finite type over a field.
Swan’s unpublished notes on Lindel’s paper (see [P89, Proposition 2.1]) contain
two interesting remarks.
1) Lindel’s proof works also when R is essentially of finite type over a DVR A
such that its local parameter p 6∈ m2 .
2) The Bass-Quillen Conjecture holds if (R, m) is a regular local ring containing
a field, or p =char R/m 6∈ m2 providing that the following question has a positive
answer.
Question 21 (Swan). Is a regular local ring a filtered inductive limit of regular
local rings essentially of finite type over Z?
Indeed, suppose for example that R contains a field and R is a filtered inductive
limit of regular local rings Ri essentially of finite type over a prime field P . A
finitely generated projective R[T ]-module M is an extension of a finitely generated
projective Ri [T ]-module Mi for some i, that is M ∼
= R[T ] ⊗Ri [T ] Mi . By Theorem
20 we get Mi free and so M is free, too.
Theorem 22 ([P89]). Swan’s Question 21 holds for regular local rings (R, m, k)
which are in one of the following cases:
(1) R contains a field,
8
(2) the characteristic p of k is not in m2 ,
(3) R is excellent Henselian.
Proof. (1) Suppose that R contains a field k. We may assume that k is the prime
field of R and so a perfect field. Then the inclusion u : k → R is regular and by
Theorem 3 it is a filtered inductive limit of smooth k morphisms k → Ri . Thus Ri is
a regular ring of finite type over k and so over Z. Therefore R is a filtered inductive
limit of regular local rings essentially of finite type over Z. Similarly we may treat
(2).
(3) First assume that R is complete. By the Cohen Structure Theorem we may
also assume that R is a factor of a complete local ring of type A = Z(p) [[x1 , . . . , xm ]]
for some prime integer p. By (2) we see that A is a filtered inductive limit of regular
local rings Ai essentially of finite type over Z. Since R, A are regular local rings we
see that R = A/(x) for a part x of a regular system of parameters of A. Then there
exists a system of elements x′ of a certain Ai which is mapped into x by the limit
map Ai → A. It follows that x′ is part of a regular system of parameters of At for all
t ≥ j for some j > i and so Rt = At /(x′ ) are regular local rings. Now, it is enough
to see that R is a filtered inductive limit of Rt , t ≥ j.
Next assume that R is excellent Henselian and let R̂ be its completion. Using
[AD83], or [Sw98] it is enough to show that given a finite type Z-subalgebra E of
R the inclusion α : E → R factors through a regular local ring E ′ essentially of
finite type over Z, that is there exists β : E ′ → R such that α is the composite map
β
E → E′ −
→ R.
As above, R̂ is a filtered inductive limit of regular local rings and so the composite
α
map α̂ : E −
→ R → R̂ factors through a regular local ring F essentially of finite type
over Z. We may choose a finite type Z-subalgebra D ⊂ F such that F ∼
= Dq for
some q ∈ Spec D and the map E → F factors through D, i.e. D is an E-algebra.
As D is excellent, its regular locus Reg D is open and so there exists d ∈ D \ q such
that Dd is a regular ring. Changing D by Dd we may assume that D is regular.
Let E = Z[b1 , . . . , bn ] for some bi ∈ E ⊂ R and let D = Z[Y ]/(h), Y = (Y1 , . . . , Yn )
for some polynomials h. Since D is an E-algebra we may write bi ≡ Pi (Y ) modulo h,
i = 1, . . . , n for some polynomials Pi ∈ E[Y ] ⊂ R[Y ]. Note that there exists ŷ ∈ R̂n
such that bi = Pi (ŷ), h(ŷ) = 0 because α̂ factors through D. As R has the Artin
approximation property, by Theorem 4 there exists y ∈ Rn such that bi = Pi (y),
h(y) = 0. Let ρ : D → R be the map given by Y → y. Clearly, α factors through D
and we may take E ′ = Dρ−1 m . More precisely, we have the following diagram which
is commutative except in the right square,
α //
ROO
❄❄
❄❄
❄❄ ρ
❄
E❄
D
R̂OO
//
//
F
9
Corollary 23 ([P89]). The Bass-Quillen Conjecture holds if R is a regular local
ring in one of the cases (1), (2) of the above theorem.
Remark 24. Theorem 22 is not a complete answer to Question 21, but (3) says
that a positive answer is expected in general. Since there exists no result similar
to Lindel’s saying that the Bass-Quillen Conjecture holds for all regular local rings
essentially of finite type over Z we decided to wait with our further research. So we
have waited already 25 years.
Another problem is to replace in the Bass-Quillen Conjecture the polynomial
algebra R[T ] by other R-algebras. The tool is given by the following theorem.
Theorem 25 (Vorst [V83]). Let A be a ring, A[x], x = (x1 , . . . , xm ) a polynomial
algebra, I ⊂ A[x] a monomial ideal and B = A[x]/I. Then every finitely generated
projective B-module M is extended from a finitely generated projective A-module N,
that is M ∼
= B ⊗A N, if for all n ∈ N every finitely generated projective A[T ]-module,
T = (T1 , . . . , Tn ) is extended from a finitely generated projective A-module.
Corollary 26 ([P15]). Let R be a regular local ring in one of the cases (1), (2) of
Theorem 22, I ⊂ R[x] be a monomial ideal with x = (x1 , . . . , xm ) and B = R[x]/I.
Then any finitely generated projective B-module is free.
For the proof, apply the above theorem using Corollary 23.
The Bass-Quillen Conjecture could also hold when R is not regular as the following
corollary shows.
Corollary 27 ([P15]). Let R be a regular local ring in one of the cases of Theorem
22, I ⊂ R[x] be a monomial ideal with x = (x1 , . . . , xm ) and B = R[x]/I. Then
every finitely generated projective B[T ]-module, T = (T1 , . . . , Tn ) is free.
This result holds because B[T ] is a factor of R[x, T ] by the monomial ideal
IR[x, T ].
Remark 28. If I is not monomial, then the Bass-Quillen Conjecture may fail when
replacing R by B. Indeed, if B = R[x1 , x2 ]/(x21 − x32 ) then there exist finitely
generated projective B[T ]-modules of rank one which are not free (see [La78, (5.10)]).
Now, let (R, m) be a regular local ring and f ∈ m \ m2 .
Question 29 (Quillen [Q76]). Is free a finitely generated projective module over
Rf ?
Theorem 30 (Bhatwadeckar-Rao, [BR83]). Quillen’s Question has a positive answer if R is essentially of finite type over a field.
Theorem 31 ([P02]). Quillen’s Question has a positive answer if R contains a field.
This goes similarly to Corollary 23 using Theorem 30 instead of Theorem 20.
Remark 32. The paper [P02] was not accepted for publication in many journals
since the referees said that ”relies on a theorem [that is Theorem 3] which is still
not recognized by the mathematical community”. Since our paper was quoted as an
unpublished preprint in [Sw98] we published it later in the Romanian Bulletin and
it was noticed and quoted by many people (see for instance [KaVi14]).
10
3. General Neron Desingularization
Using Artin’s methods from [Artin68], Ploski gave the following theorem, which
is the first form of a possible extension of Neron Desingularization in dim > 1.
Theorem 33 ([Pl74]). Let C{x}, x = (x1 , . . . , xm ), f = (f1 , . . . , fs ) be some convergent power series from C{x, Y }, Y = (Y1 , . . . , Yn ) and ŷ ∈ C[[x]]n with ŷ(0) = 0
be a solution of f = 0. Then the map v : B = C{x, Y }/(f ) → C[[x]] given
by Y → ŷ factors through an A-algebra of type B ′ = C{x, Z} for some variables
Z = (Z1 , . . . , Zs ), that is v is a composite map B → B ′ → C[[x]].
Using Theorem 3 one can get an extension of the above theorem.
Theorem 34 ([P15]). Let (A, m) be an excellent Henselian local ring, Â its completion, B a finite type A-algebra and v : B → Â an A-morphism. Then v factors
through an A-algebra of type A[Z]h for some variables Z = (Z1 , . . . , Zs ), where A[Z]h
is the Henselization of A[Z](m,Z) .
Suppose that B = A[Y ]/I , Y = (Y1 , . . . , Yn ). If f = (f1 , . . . , fr ), r ≤ n is a system
of polynomials from I, then
by ∆f the ideal generated by all r × r−minors
denote
∂fi
of the Jacobian matrix
. After Elkik [El73], let HB/A be the radical of the
∂Yj
X
(f ) : I ∆f B, where the sum is taken over all systems of polynomials f
ideal
f
from I with r ≤ n. Then BP , P ∈ Spec B is essentially smooth over A if and only if
P 6⊃ HB/A by the Jacobian criterion for smoothness. Thus HB/A measures the non
smooth locus of B over A.
In the linear case we may easily get cases of Theorem 3 when dim A > 1.
Lemma 35 ([P85, (4.1)]). Let A be a ring and a1 , a2 a weak regular sequence of A,
that is a1 is a non-zero divisor of A and a2 is a non-zero divisor of A/(a1 ). Let A′
be a flat A-algebra and set B = A[Y1 , Y2 ]/(f ), where f = a1 Y1 + a2 Y2 . Then HB/A
is the radical of (a1 , a2 ) and any A-morphism B → A′ factors through a polynomial
A-algebra in one variable.
Proof. Note that all solutions of f = 0 in A are multiples of (−a2 , a1 ). By flatness,
any solution of f in A′ is a linear combinations of some solutions of f in A and so
again a multiple of (−a2 , a1 ). Let h : B → A′ be a map given by Yi → yi ∈ A′ .
Then (y1 , y2 ) = z(−a2 , a1 ) and so h factors through A[Z], that is h is the composite
map B → A[Z] → A′ , the first map being given by (Y1 , Y2) → Z(−a2 , a1 ) and the
second one by Z → z.
Pn
Proposition 36 ([P85, Lemma 4.2]). Let fi = i=1 aij Yj ∈ A[Y1 , . . . , Yn ], i ∈ [r] be
(k)
(k)
a system of linear homogeneous polynomials and y (k) = (y1 , . . . , yn ), k ∈ [p] be a
complete system of solutions of f = (f1 , . . . , fr ) = 0 in A. Let b = (b1 , . . . , br ) ∈ Ar
and c a solution of f = b in A. Let A′ be a flat A-algebra and
B = A[Y1 , . . . , Yn ]/(f − b). Then any A-morphism B → A′ factors through a polynomial A-algebra in p variables.
11
Proof. Let h : B → A′ be a map given by Y → y ′ ∈ A′n . Since A′ is flat over A we see
that y ′ −h(c) is a linear combinations
of y (k) , that is there exists z = (z1 , . . . , zp ) ∈ A′p
P
such that y ′ − h(c) = pk=1 zk h(y (k) ). Therefore, h factors through A[Z1 , . . . , Zp ],
that is h is the compositePA-morphism B → A[Z1 , . . . , Zp ] → A′ , where the first
map is given by Y → c + pk=1 Zk y (k) and the second one by Z → z.
Another form of Theorem 3 is the following theorem which is a positive answer
to a conjecture of M. Artin [Artin82].
Theorem 37 (Cipu-Popescu [CP84]). Let u : A → A′ be a regular morphism of
Noetherian rings, B an A-algebra of finite type, v : B → A′ an A-morphism and
D ⊂ Spec B the open smooth locus of B over A. Then there exist a smooth A-algebra
C and two A-morphisms t : B → C, w : C → A′ such that v = wt and C is smooth
over B at t∗ −1 (D), t∗ : Spec C → Spec B being induced by t.
There exists also a form of Theorem 3 recalling us the strong Artin approximation
property.
Theorem 38 ([P01], [P15]). Let (A, m) be a Noetherian local ring with the completion map A → Â regular, B an A-algebra of finite type and ν the Artin function over
 associated to the system of polynomials f defining B. Then there exists a function λ : N → N, λ ≥ ν such that for every positive integer c and every morphism
v : B → A/mλ(c) there exists a smooth A-algebra C and two A-algebra morphisms
v
t : B → C, w : C → A/mc such that wt is the composite map B −
→ A/mλ(c) → A/mc .
Sometimes, we may find some information about λ (and so about ν). Let A be
a discrete valuation ring, x a local parameter of A, A′ = Â its completion and
B = A[Y ]/I, Y = (Y1 , . . . , Yn ) an A-algebra of finite type. If f = (f1 , . . . , fr ),
r ≤ n is a system of polynomials from I then we consider a r × r-minor M of the
Jacobian matrix (∂fi /∂Yj ). Let c ∈ N. Suppose that there exists an A-morphism
v : B → A′ /(x2c+1 ) and N ∈ ((f ) : I) such that v(NM) 6∈ (x)c /(x2c+1 ), where for
simplicity we write v(NM) instead of v(NM + I).
Theorem 39 ([P15, Theorem 10]). There exists a B-algebra C which is smooth
over A such that every A-morphism v ′ : B → A′ with v ′ ≡ v modulo x2c+1 (that is
v ′ (Y ) ≡ v(Y ) modulo x2c+1 ) factors through C.
Corollary 40 ([P15, Theorem 15]). In the assumptions and notation of Corollary
39 there exists a canonical bijection
for some s ∈ N.
A′s → {v ′ ∈ HomA (B, A′ ) : v ′ ≡ v modulo x2c+1 }
Let k be a field and F a k-algebra of finite type, let us say F = k[U]/J, U =
(U1 , . . . , Un ). An arc Spec k[[x]] → Spec F is given by a k-morphism F → A′ = k[[x]].
Assume that HF/k 6= 0 (this happens for example when F is reduced and k is
perfect). Set A = k[x](x) , B = A ⊗k F . Let f = (f1 , . . . , fr ), r ≤ n be a system
of polynomials from J and M a r × r-minor of the Jacobian matrix (∂fi /∂Uj ).
Let c ∈ N. Assume that there exists an A-morphism g : F → A′ /(x2c+1 ) and
12
N ∈ ((f ) : J) such that g(NM) 6∈ (x)c /(x2c+1 ). Note that A ⊗k − induces a
bijection Homk (F, A′ ) → HomA (B, A′ ) by adjunction.
Corollary 41 ([P15, Corollary 16]). The set {g ′ ∈ Homk (F, A′ ) : g ′ ≡ g modulo x2c+1 }
is in bijection with an affine space A′s over A′ for some s ∈ N.
Next we give a possible extension of Greenberg’s result on the strong Artin approximation property [Gr66]. Let (A, m) be a Cohen-Macaulay local ring (for example a reduced ring) of dimension one, A′ = Â the completion of A, B = A[Y ]/I,
Y = (Y1 , . . . , Yn ) an A-algebra of finite type and c, e ∈ N. Suppose that there exists
f = (f1 , . . . , fr ) in I, a r×r-minor M of the Jacobian matrix (∂f /∂Y ), N ∈ ((f ) : I)
and an A-morphism v : B → A/m2e+c such that (v(MN)) ⊃ me /m2e+c . Then we
may construct a General Neron Desingularization in the idea of Theorem 39, which
could be used to get the following theorem.
Theorem 42 (A. Popescu-D. Popescu, [APDP15]). There exists an A-morphism
v ′ : B → Â such that v ′ ≡ v modulo mc Â, that is v ′ (Y + I) ≡ v(Y + I) modulo mc Â.
Moreover, if A is also excellent Henselian there exists an A-morphism v ′ : B → A
such that v ′ ≡ v modulo mc .
Remark 43. The above theorem could be extended for Noetherian local rings of
dimension one (see [PfPo15]). In this case the statement depends also on a reduced
primary decomposition of (0) in A.
Using [APDP15] we end this section with an algorithmic attempt to explain the
proof of Theorem 3 in the frame of Noetherian local domains of dimension one. Let
u : A → A′ be a flat morphism of Noetherian local domains of dimension 1. Suppose
that A ⊃ Q and the maximal ideal m of A generates the maximal ideal of A′ . Then
u is a regular morphism. Moreover, we suppose that there exist canonical inclusions
k = A/m → A, k ′ = A′ /mA′ → A′ such that u(k) ⊂ k ′ .
If A is essentially of finite type over Q, then the ideal HB/A can be computed
in Singular
by following its definition but it is easier to describe only the ideal
P
(f
)
:
I
∆f B defined above. This is the case considered in our algorithmic part,
f
let us say A ∼
= k[x]/F for some variables x = (x1 , . . . xm ), and the completion of
′
′
A is k JxK/(F ). When v is defined by polynomials y from k ′ [x] then our problem
is easy. Let L be the field obtained by adjoining to k all coefficients of y. Then
R = L[x]/(F ) is a subring of A′ containing Im v which is essentially smooth over A.
Then we may take B ′ as a standard smooth A-algebra such that R is a localization
of B ′ . Consequently we suppose usually that y is not in k ′ [x].
We may suppose that v(HB/A ) 6= 0. Indeed, if v(HB/A ) = 0 then v induces an Amorphism v ′ : B ′ = B/HB/A → A′ and we may replace (B, v) by (B ′ , v ′). Applying
this trick several times we reduce to the case v(HB/A ) 6= 0. However, the fraction
field of Im v is essentially smooth over A by separability, that is HIm v/A A′ 6= 0 and
in the worst case our trick will
change B by Im v after several steps.
′
Choose P ∈ ∆f ((f ) : I) \ I for some system of polynomials f = (f1 , . . . , fr )
from I and d′ ∈ v(P ′ )A′ ∩ A, d′ 6= 0. Moreover, we may choose P ′ to be from
13
∂f
. Then d′ = v(P ′ )z ∈ v(HB/A ) ∩ A
M (f ) : I where M is a r × r-minor of
∂Y
for some z ∈ A′ . Set B1 = B[Z]/(fr+1 ), where fr+1 = −d′ +P ′ Z and let v1 : B1 → A′
be the map of B-algebras given by Z → z. It follows that d′ ∈ (f, fr+1 ) : (I, fr+1 )
and d′ ∈ ∆f , d′ ∈ ∆fr+1 . Then d = d′2 ≡ P modulo (I, fr+1 ) for P = P ′2 Z 2 ∈ HB1 /A .
Replace
B byB1 and the Jacobian matrix J = (∂f /∂Y ) will be now the new J given
J 0
by
. Thus we reduce to the case when d ∈ HB/A ∩ A.
∗ P′
But how to get d with a computer if y is not polynomial defined over k ′ ? Then
the algorithm is complicated because we are not able to tell the computer who is y
and so how to get d′ . We may choose an element a ∈ m and find a minimal c ∈ N
such that ac ∈ (v(M)) + (a2c ) (this is possible because dim A = 1). Set d′ = ac . It
follows that d′ ∈ (v(M)) + (d′2 ) ⊂ (v(M)) + (d′4 ) ⊂ . . . and so d′ ∈ (v(M)), that is
d′ = v(M)z for some z ∈ A′ . Certainly we cannot find precisely z, but later it is
enough to know just a kind of truncation of it modulo d′6 .
Thus we may suppose that there exist f = (f1 , . . . , fr ), r ≤ n a system of polynomials from I, a r × r-minor M of the Jacobian matrix (∂fi /∂Yj ), N ∈ ((f ) : I) such
that 0 6= d ≡ P = MN modulo I. We may assume that M = det((∂fi /∂Yj )i,j∈[r]).
Set Ā = A/(d3 ), Ā′ = A′ /d3A′ , ū = Ā ⊗A u, B̄ = B/d3 B, v̄ = Ā ⊗A v. Clearly, ū is a
regular morphism of Artinian local rings and it is easy to find a General Neron Desingularization in this frame. Thus there exists a B̄-algebra C, which is smooth over
Ā such that v̄ factors through C. Moreover we may suppose that C ∼
= (Ā[U]/(ω))τ
for some polynomials ωτ ∈ k[U] which are not in m(Ā[U]/(ω)) (note that k ⊂ A).
Then D ∼
= (A[U]/(ω))τ is smooth over A and u factors through D. Usually, v does
not factor through D, though v̄ factors through C ∼
= Ā ⊗A D.
′
n
Let y ∈ D be such that the composite map B̄ → C → D̄ is given by Y →
y ′ + d3 D. Thus I(y ′) ≡ 0 modulo d3 D. We have d ≡ P modulo I and so P (y ′) ≡ d
modulo d3 . Thus P (y ′) = ds for a certain s ∈ D with s ≡ 1 modulo d. Let H
be the n × n-matrix obtained by adding down to (∂f /∂Y ) as a border the block
(0|Idn−r ). Let G′ be the adjoint matrix of H and G = NG′ . We have
GH = HG = NMIdn = P Idn
and so
dsIdn = P (y ′)Idn = G(y ′ )H(y ′).
Set h = s(Y − y ′ ) − dG(y ′)T , where T = (T1 , . . . , Tn ) are new variables. Since
s(Y − y ′) ≡ dG(y ′)T modulo h
and
f (Y ) − f (y ′) ≡
X ∂f
(y ′)(Yj − yj′ )
∂Y
j
j
modulo higher order terms in Yj − yj′ , by Taylor’s formula we see that for p =
maxi deg fi we have
sp f (Y ) − sp f (y ′) ≡ sp−1 dP (y ′)T + d2 Q
14
modulo h, where Q ∈ T 2 D[T ]r . This is because (∂f /∂Y )G = (P Idr |0). We have
f (y ′) = d2 b for some b ∈ dD r . Set gi = sp bi + sp Ti + Qi , i ∈ [r]. Then we may take
B ′ to be a localization of (D[Y, T ]/(I, h, g))s.
Remark 44. An algorithmic proof in the frame of all Noetherian local rings of
dimension one is given in [PfPo15].
References
[An91] M. André, Cinq exposes sur la desingularisation, Handwritten manuscript Ecole Polytechnique Federale de Lausanne, (1991).
[Artin68] M. Artin, On the solutions of analytic equations, Invent. Math., 5, (1968), 277-291.
[Artin69] M. Artin, Algebraic approximation of structures over complete local rings, Publ. Math.
IHES, 36, (1969), 23-58.
[Artin70] M. Artin, Constructions techniques for algebraic spaces, Actes Congres. Intern. Math., t
1, (1970), 419-423-291.
[Artin74] M. Artin, Versal deformations and algebraic stacks, Invent. Math., 27, 1974, 165-189.
[Artin82] M. Artin, Algebraic structure of power series rings, Contemp. Math. AMS, Providence,1982, 223-227.
[AD83] M. Artin, J. Denef, Smoothing of a ring homomorphism along a section, Arithmetic and
Geometry, vol. II, Birkhäuser, Boston, (1983), 5-32.
[BNP81] S. Basarab, V. Nica, D. Popescu, Approximation properties and existential completeness
for ring morphisms, Manuscripta Math. 33, (1981), 227-282.
[BR83] S. M. Bhatwadeckar, R. A. Rao, On a question of Quillen, Trans. Amer. Math. Soc., 279,
(1983),801-810.
[CP81] M. Cipu, D. Popescu, Some extensions of Neron’s p-desingularization and approximation,
Rev. Roum. Math. Pures et Appl., 26(1981),1299-1304.
[CP84] M. Cipu, D. Popescu, A desingularization theorem of Neron type, Ann. Univ. Ferrara, 30
(1984), 63-76.
[Sing12] W. Decker, G.-M. Greuel, G. Pfister, H. Schönemann: Singular 3-1-6 — A computer
algebra system for polynomial computations.http://www.singular.uni-kl.de (2012).
[El73] R. Elkik, Solutions d’equations a coefficients dans un anneaux henselien, Ann. Sci. Ecole
Normale Sup., 6 (1973), 553-604.
[Gr66] M. Greenberg, Rational points in henselian discrete valuation rings, Publ. Math. IHES, 31,
(1966), 59-64.
[EGA66] A. Grothendieck, J. Dieudonne, Elements de geometrie algebrique, IV, Part 1, Publ.
Math. IHES, 1966.
[KaVi14] M. Kashiwara, K. Vilonen, Microdifferential systems and the codimension-three conjecture, Ann. of Math., (2) 180, (2014), 573-620.
[KMPPR78] H. Kurke, T. Mostowski, G. Pfister, D. Popescu, M. Roczen, Die Approximationseigenschaft lokaler Ringe, Springer Lect. Notes in Math., 634, Springer-Verlag, Berlin-New
York, (1978).
[La78] T. Y. Lam, Serre’s Conjecture, Springer Lect. Notes in Math., 635, Berlin, 1978.
[Li81] H. Lindel, On the Bass-Quillen conjecture concerning projective modules over polynomial
rings, Invent. Math., 65, (1981), 319-323.
[Ne64] A. Néron, Modeles minimaux des varietes abeliennes sur les corps locaux et globaux, Publ.
Math. IHES, 21, 1964.
[PfPo75] G. Pfister, D. Popescu, Die strenge Approximationseigenschaft lokaler Ringe, Inventiones
Math. 30, (1975), 145-174.
[PfPo15] G. Pfister, D. Popescu, Constructive General Neron Desingularization for one dimensional local rings, 2015, in preparation.
15
[Pl74] A. Ploski, Note on a theorem of M. Artin, Bull. Acad. Polon. des Sci., t. XXII, 11 (1974),
1107-1110.
[APDP15] A. Popescu, D. Popescu, A method to compute the General Neron Desingularization in
the frame of one dimensional local domains, arXiv:AC/1508.05511.
[P75] D. Popescu, A strong approximation theorem over discrete valuation rings, Rev. Roum.
Math. Pures et Appl., 20, (1975), 659-692.
[P79] D. Popescu, Algebraically pure morphisms, Rev.Roum.Math.Pures et Appl., 24, (1979), 947977.
[P85] D. Popescu, General Neron Desingularization, Nagoya Math. J., 100 (1985), 97-126.
[P86] D. Popescu, General Neron Desingularization and approximation, Nagoya Math. J., 104,
(1986), 85-115.
[P89] D. Popescu, Polynomial rings and their projective modules, Nagoya Math. J., 113, (1989),
121-128.
[P90] D. Popescu, Letter to the Editor. General Neron Desingularization and approximation,
Nagoya Math. J., 118 (1990), 45-53.
[P00] D. Popescu, Artin Approximation, in ”Handbook of Algebra”, vol. 2, Ed. M. Hazewinkel,
Elsevier, 2000, 321-355.
[P01] D. Popescu, Variations on Néron desingularization, in: Sitzungsberichte der Berliner Mathematischen Gesselschaft, Berlin, 2001, 143-151.
[P02] D. Popescu, On a question of Quillen, Bull. Math. Soc. Sci. Math. Roumanie, 45(93),
(2002), 209-212.
[P15] D. Popescu, Around General Neron Desingularization, arXiv:AC/1504.06938.
[PR90] D. Popescu, M. Roczen, Indecomposable Cohen-Macaulay modules and irreducible maps,
Compositio Math. 76, (1990), 277-294.
[Q76] D. Quillen, Projective modules over polynomial rings, Invent. Math., 36, (1976), 167-171.
[Ron05] G. Rond, Sur la linearité de la fonction de Artin, Ann. Sci. Ecole Norm. Sup., (4), 38,
(2005), 979-988.
[Rot90] C. Rotthaus, Rings with the property of approximation, Math. Ann., 287, (1990), 455-466.
[Sp99] M. Spivakovski, A new proof of D. Popescu’s theorem on smoothing of ring homomorphisms,
J. Amer. Math. Soc., 294, (1999), 381-444.
[St14] A. Steenpass, Algorithms in SINGULAR: Parallelization, Syzygies, and Singularities, PhD
Thesis, 2014, Kaiserslautern.
[Sw98] R. Swan, Neron-Popescu desingularization, in ”Algebra and Geometry”, Ed. M. Kang,
International Press, Cambridge, (1998), 135-192.
[Te94] B. Teissier, Resultats recents sur l’approximation des morphismes en algebre commutative
[d’apres Artin, Popescu et Spivakovski], Sem. Bourbaki, 784, (1994), 259-282.
[V83] T. Vorst, The Serre Problem for discrete Hodge algebras, Math. Z., 184, (1983), 425-433.
Dorin Popescu, Simion Stoilow Institute of Mathematics of the Romanian Academy, Research unit 5, University of Bucharest, P.O.Box 1-764, Bucharest 014700,
Romania
E-mail address: [email protected]
16
| 0math.AC
|
RANK THREE GEOMETRY AND POSITIVE CURVATURE
arXiv:1607.04134v1 [math.DG] 14 Jul 2016
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
Abstract. An axiomatic characterization of buildings of type C3 due to Tits is used to prove
that any cohomogeneity two polar action of type C3 on a positively curved simply connected
manifold is equivariantly diffeomorphic to a polar action on a rank one symmetric space. This
includes two actions on the Cayley plane whose associated C3 type geometry is not covered by
a building.
The rank (or size) of a Coxeter matrix M coincides with the number of generators of its
associated Coxeter system. The basic objects in Tits’ local approach to buildings [Ti2] are the
so-called chamber systems C of type M (see also [Ro]). Indeed, if any so-called (spherical)
residue (subchamber system) of C of rank 3 is covered by a building, so is C .
Recall that a polar G action on a Riemannian manifold M is an isometric action with a socalled section Σ, i.e., an immersed submanifold of M that meets all G orbits orthogonally. Since
the action by the identity component of G is polar as well, we assume throughout without stating
it that G is connected.
It is a key observation of [FGT] that the study of polar G actions on 1-connected positively
curved manifolds M in essence is the study of a certain class of (connected) chamber systems
C (M; G). Moreover, when the universal (Tits) cover of C (M; G) is a building it has the structure
of a compact spherical building in the sense of Burns and Spatzier [BSp]. This was utilized in
[FGT] to show:
Theorem A. Any polar G action of cohomogeneity at least two on a simply connected closed
positively curved manifold M is equivariantly diffeomorphic to a polar G action on a rank one
symmetric space if the associated chamber system C (M; G) is not of type C3 .
We note here, that when the action has no fixed points, the rank of C (M; G) is dim(M/ G)+1,
i.e., one more than the cohomogeneity of the action. In the above theorem the Cayley plane
emerges only in cohomogeneity two and when G has fixed points. Moreover, there are indeed
chamber systems with type M = C3 whose universal cover is NOT a building (see, e.g., [Ne],
[FGT], [Ly], [KL] and below). In our case, a polar G action on M is of type C3 if and only if its
orbit space M/ G is a geodesic 2-simplex with angles π/2, π/3 and π/4.
Our aim here is to take care of this exceptional case and prove
Theorem B. Any polar G action on a simply connected positively curved manifold M of
type C3 is equivariantly diffeomorphic to a polar action on a rank one symmetric space. This
The first author is supported in part by an NSFC grant and he is grateful to the University of Notre Dame for
its hospitality. The second author is supported in part by an NSF grant, a research chair at the Hausdorff Center at
the University of Bonn and by a Humboldt research award. The third author is grateful to the University of Notre
Dame and the Capital Normal University in Beijing for their hospitality.
1
2
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
includes two actions on the Cayley plane where the universal covers of the associated chamber
systems are not buildings.
Combining these results of course establishes, the
Corollary. Any polar G action of cohomogeneity at least two on a simply connected closed
positively curved manifold M is equivariantly diffeomorphic to a polar G action on a rank one
symmetric space.
This is in stark contrast to the case of cohomogeneity one, where in dimensions seven and
thirteen there are infinitely many non-homogeneous manifolds (even up to homotopy). The
classification work in [GWZ] also lead to the discovery and construction of a new example of a
positively curved manifold (see [De] and [GVZ]).
By necessity, as indicated above, the proof of Theorem B is entirely different from the proof
of Theorem A. In general, the geometric realization of our chamber systems C (M; G) utilized
in the proof of Theorem A are not simplicial. However, in [FGT] it was proved that in fact
Theorem C. The geometric realization |C (M, G)| of a chamber system C (M, G) of type A3
or C3 associated with a simply connected polar G-manifold M is simplicial.
When the geometric realization of a chamber system of type M is simplicial it is called a Tits
geometry of type M. This allows us to use an axiomatic characterization of C3 geometries that
are buildings (see [Ti2], Proposition 9). So rather than considering the universal cover C˜(M; G)
directly, we construct in all but two cases a suitable cover of C (M; G) (possibly C (M; G) itself),
and prove that it satisfies the C3 building axiom of Tits. The two cases where this methods fails,
are then recognized as being equivalent to two C3 type polar actions on the Cayley plane OP2
(cf. [PTh, GK]).
We note, that since all our chamber systems C (M, G) are homogeneous and those of type C3
(and A3 ) are Tits geometries an independent alternate proof of Theorem B follows from [KL].
1. Preliminaries
The purpose of this section is threefold. While explaining the overall approaches to the
strategies needed in the proof of Theorem B, we recall the basic concepts and establish notation.
Throughout G denotes a compact connected Lie group acting on a closed 1- connected positively curved manifold M in a polar fashion and of type C3 .
Fix a chamber C in a section Σ for the action. Then C is isometric to the orbit spaces M/ G
and Σ/W, where W is the reflection group of Σ and W acts simply transitively on the chambers of
Σ. Since the action is of type C3 , C is a convex positively curved 2-simplex with geodesic sides
= faces, ℓr , ℓt and ℓq opposite its vertices r, t and q with angles π/2, π/3 and π/4 respectively.
By the Reconstruction Theorem of [GZ] recall that any polar G manifold M is completely
determined by its so-called polar data. In our case, this data consist of G and all its isotropy
groups, together with their inclusions along a chamber C (cf. also Lemma 1.5 in [Go]). We
denote the principal isotropy group by H, and the isotropy groups at vertices and opposite faces
by Gr , Gt , Gq and Gℓr , Gℓt , Gℓq respectively. What remains after removing G from this data will
be referred to as the local data for the action.
RANK THREE GEOMETRY AND POSITIVE CURVATURE
3
With two exceptions, it turns out that only partial data are needed to show that the action
indeed is equivalent to a polar action on a rank one symmetric space. Since the data in the
two exceptional cases coincide with those of the exceptional C3 actions on the Cayley plane,
this will then complete the proof of Theorem A. In addition, it is worth noting, that since the
groups G derived from those data (in 7.2 and 8.1) are maximal connected subgroups of F4 , the
identity component of the isometry group of the Cayley plane OP2 , their actions are uniquely
determined and turn out to be polar.
The proof of Theorem A in all but the two exceptional cases is based on showing that the
universal cover, C˜ of the chamber system C = C (M, G) associated to the polar action is a
spherical Tits building [FGT]. Here, the homogeneous chamber system C (M, G) is the union
∪g∈G g C of all chambers with three adjacency relations one for each face: Specifically g1 C and
g2 C are i adjacent if their respective i faces are the same in M. This chamber system with the
thin topology, i.e., induced from the its path metric is a simplicial complex by Theorem C, and
hence C (M, G) is a so-called C3 geometry.
As indicated, the Fundamental Theorem of Tits used in [FGT] to show that C˜ is a building
yields nothing for rank three chamber systems as well as rank three geometries. Instead we will
show that C , or a cover we construct of C is a C3 building (and hence simply connected) by
verifying an axiomatic incidence characterization (see section 3) of such buildings due also to
Tits.
The construction of chamber system covers we utilize is equivalent in our context to the
principal bundle construction of [GZ] (Theorem 4.5) for Coxter polar actions and manifolds.
Specifically for our case:
• Given the data, H, Gℓi , G j , i, j ∈ {t, r, q} and G for (M, G), the data for (P, L × G) consists
of graphs Ĥ, Ĝℓi , Ĝ j in Ĝ := L × G of compatible homomorphisms from H, Gℓi , G j , i, j ∈
t, r, q to L. In particular, the local data for (P, L × G) are isomorphic to the local data for
(M, G).
• Clearly L acts freely as a group of automorphisms, and C (P, L × G)/L = C (M, G), i.e.,
Cb(M; G) := C (P, L × G) is a chamber system covering of C (M; G).
In our case L will be S1 (or in one case S3 ).
2. Basic tools and obstructions
The aim of this section is to establish a number of properties and restrictions of the data to
be used throughout. Unless otherwise stated G will be a compact connected Lie group and M a
closed simply connected positively curved manifold.
Without any curvature assumptions we have the possibly well known
Lemma 2.1 (Orbit equivalence). Let M be a simply connected polar G manifold. Then the
slice representation of any isotropy group is orbit equivalent to that of its identity component.
Proof. Recall that the slice representation of an isotropy group K = G p ⊂ G restricted to the
orthogonal complement T p⊥ of the fixed point set of K inside the normal space to the orbit G p
is a polar representation. Clearly the finite group K/K0 acts isometrically on the orbit space
S(T p⊥ )/K0 , which is isometric to a chamber C of the polar K0 action on the sphere S(T p⊥ ). Since
C is convex with non-empty boundary its soul point (the unique point at maximal distance to
4
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
the boundary) is fixed by K/K0 . This soul point, however, corresponds to a principal K0 orbit,
and hence to an exceptional K orbit unless K/K0 acts trivially on C. However, by Theorem 1.5
[AT] there are no exceptional orbits of a polar action on a simply connected manifold.
Because of this, when subsequently talking casually about a slice representation we refer to
the slice representation of its identity component unless otherwise stated.
Using positive curvature the following basic fact was derived in [FGT], Theorem 3.2:
Lemma 2.2 (Primitivity). The group G is generated by the (identity components) of the face
isotropy groups of any fixed chamber.
Naturally, the slice representations of Gt , Gq and Gr play a fundamental role. We denote the
respective kernels of these representations by Kt , Kq and Kr and their quotients by Ḡt , Ḡq and
Ḡr . Since in particular the slice representation of Gt is of type A2 it follows that the multiplicity
triple of the polar G manifold M, i.e, the dimensions of the unit spheres in the normal slices
along the edges ℓq , ℓr , ℓt is (d, d, k) ∈ Z3+ , where d = 1, 2, 4 or 8.
For the kernels Kt and Kq , which are usually large groups, we have:
Lemma 2.3 (Slice Kernel). Let M be a simply connected polar G-manifold of type C3 . If
G acts effectively, then the kernel Kt , respectively Kq acts effectively on the slices T q⊥ and T r⊥ ,
respectively T t⊥ and T r⊥ .
Proof. Note that Kt fixes all sections through t since Kt acts trivially on the slice T t⊥ . We must
prove that Kt ∩ Kq = {1}, Kt ∩ Kr = {1} and Kq ∩ Kr = {1}. We consider only Kt ∩ Kq , since the
arguments for the remaining cases are similar.
Note that since G is assumed to act effectively on M, and Kt ∩ Kq is contained in the principal
isotropy group, it suffices to prove that Kt ∩ Kq is normal in G. By the primitivity (see 2.2),
−1
G = hp−1
q (Ḡq,0 ), pt (Ḡt,0 )i, where pq : Gq → Ḡq is the quotient homomorphism and Ḡq,0 is the
identity component of Ḡq and similarly for pt . Thus, it suffices to show that Kt ∩ Kq is normal
−1
in each of p−1
t (Ḡt,0 ) and pq (Ḡq,0 ). In each case, assuming the effective vertex isotropy group is
connected does not alter the proof only simplifies notation. Accordingly, we proceed to assume
that Ḡt is connected, i.e., Ḡt = Ḡt,0 and will show that Kt ∩ Kq is a normal subgroup of Gt .
Note that Kt ∩ Kq is a normal subgroup of Kt acting trivially on both the slices T t⊥ and T q⊥ .
By assumption the quotient map Gt,0 ⊂ Gt → Ḡt is surjective when restricted to the identity
˜
component Gt,0 of Gt . A finite central cover G̃t,0 of Gt,0 is isomorphic to the product K̃t,0 × Ḡ
t
˜ is locally isomorphic
where K̃t,0 is locally isomorphic to the identity component Kt,0 of Kt and Ḡ
t
˜ ) covering Ḡ , where π :
to Ḡt . In particular, Gt contains a connected and closed subgroup π( Ḡ
t
t
˜ ) commutes with
G̃t,0 → Gt,0 is the cover map. Moreover, every element of the subgroup π( Ḡ
t
˜ ), the conjugation by h gives rise to an
the elements in Kt,0 . On the other hand, for every h ∈ π( Ḡ
t
element in the automorphism group Aut(Kt ) since Kt is normal, hence defines a homomorphism
˜ ) → Aut(K ). Since φ(π( Ḡ
˜ )) has a trivial image in Aut(K ) under the forgetful
φ : π( Ḡ
t
t
t
t,0
˜
homomorphism Aut(Kt ) → Aut(Kt,0 ), the group φ(π( Ḡt )) is finite, and hence trivial because
˜ )) is connected. This implies that the elements of π( Ḡ
˜ ) commute with the elements of
φ(π( Ḡ
t
t
RANK THREE GEOMETRY AND POSITIVE CURVATURE
5
˜ )i and K ∩ K is normal in K , it then follows that K ∩ K is a normal
Kt . Since Gt = hKt , π( Ḡ
t
t
q
t
t
q
subgroup of Gt .
As mentioned above, the same arguments show that Kt ∩ Kq is normal in p−1
t (Ḡt,0 ) in case Ḡt
is not connected. The same arguments also show that Kt ∩ Kq is normal in p−1
q (Ḡq,0 ).
Remark 2.4. It turns out that in all cases Ḡt is connected. In fact, this is automatic whenever
d , 2, since Ḡt acts transitively on a projective plane. Up to local isomorphism its identity
component is one of the groups SO(3), SU(3), Sp(3), or F4 corresponding to d = 1, 2, 4 and 8
respectively, and the slice representation is its standard polar representation of type A2 (see also
Table 4.3). In view of the Transversality Lemma 2.5 below, Gt is connected whenever k ≥ 2. In
the (2, 2, 1) case, the connectedness of Gr (again by Lemma 2.5) implies that also in this case
Ḡt is connected (see Proposition 5.5).
The following simple topological consequence of transversality combined with the fact that
the canonical deformation retraction of the orbit space triangle minus any side to its opposite
vertex lifts to M (or alternatively of the work [Wie]) will also be used frequently:
Lemma 2.5 (Transversality). Given a multiplicity triple (d, d, m). Then the inclusion maps
G / Gr ⊂ M, G / Gq ⊂ M and G / Gℓt ⊂ M are d-connected, G / Gℓr ⊂ M, and G / Gℓr ⊂ M are
min{d, m} connected, and G / Gt ⊂ M is m-connected.
Recall here that a continuos map is said to be k - connected if the induced map between the
ith homotopy groups is an isomorphism for i < k and a surjection for i = k.
Another Connectivity Theorem [Wi3] (Theorem 2.1) using positive curvature á la Synge is
very powerful:
Lemma 2.6 (Wilking). Let M be a positively curved n-manifold and N a totally geodesic
closed codimension k submanifold. Then the inclusion map N → M is n − 2k + 1 connected.
If in addition N is fixed by an isometric action of a compact Lie group K with principal orbit
of dimension m(K), then the inclusion map is n − 2k + 1 + m(K) connected.
We conclude this section with two severe restrictions on G stemming from positive curvature.
The first follow from the well known Synge type fact, that an isometric Tk action has orbits
with dim ≤ 1 in odd dimensions and 0 in even dimensions, when M has positive curvature
(cf. [Su]). In particular, since Gq has maximal rank among the isotropy groups, and the Euler
characteristic χ(G / Gq ) > 0 if and only if rk(G) = rk(Gq ) ([HS] page 248) we conclude
Lemma 2.7 (Rank Lemma). The dimension of M is even if and only if rk(G) = rk(Gq ), and
otherwise rank rk(G) = rk(Gq ) + 1.
When adapting Wilking’s Isotropy Representation Lemma 3.1 from [Wi2] for positively
curved G manifolds to polar manifolds of type C3 we obtain:
Lemma 2.8 (Sphere Transitive Subrepresentations). Let Li ⊳ Gℓi , i ∈ {q, r, t} be a simple
normal subgroup and U an irreducible isotropy subrepresentation of G /Li . Then (U, Li ) is
isomorphic to a standard defining representation. In particular, Li acts transitively on the sphere
S(U).
6
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
Proof. Let U be an irreducible isotropy subrepresentation of G /Li not isomorphic to a summand
of the slice representation of Li on T i⊥ . By [Wi2], U is isomorphic to a summand of the isotropy
representation of L∗i /Li , where L∗i is a vertex isotropy group. On the other hand, the almost
effective factor of L∗i is well understood (cf. the tables 4.3 and 4.4), which are all the standard
defining representation. The desired result follows.
3. The C3 building axiom
Recall that Tits has provided an axiomatic characterization of buildings of irreducible type M
when the geometric realization |C | (C with the thin topology) of the associated chamber system
C , is a simplicial complex. This characterization is given in terms of the incidence geometry
associated with C .
The purpose of this section is to describe this characterization when M = C3 and translate it
to our context.
Here, by definition
• Vertices x, y ∈ |C | are incident, denoted x ∗ y, if and only if x and y are contained in a
closed chamber of |C |.
Clearly, the incidence relation (not an equivalence relation) is preserved by the action of G in
our case.
To describe the needed characterization we will use the following standard terminology:
• The shadow of a vertex x on the set of vertices of type i ∈ I, denoted Shi (x), is the union
of all vertices of type i incident to x.
Following Tits [Ti2], when M = C3 , we call the vertices of type q, r and t, points, lines, and
planes respectively. We denote by Q, R and T the set of points, lines, and planes in C (M; G).
Notice that G acts transitively on Q, R and T . With this terminology the axiomatic characterization [Ti2] (cf. Proposition 9 and the proof of the C3 case on p. 544) alluded to above
states:
Theorem 3.1 (C3 Axiom). A connected Tits geometry of type C3 is a building if and only if
the following axiom holds:
• (LL) If two lines are both incident to two different points, they coincide.
Equivalently:
• If ShQ (r) ∩ ShQ (r′ ) has cardinality at least two, then r = r′ .
or:
• For any q, q′ ∈ Q, with q , q′ , ShR (q) ∩ ShR (q′ ) has cardinality at most one.
In our case, if r ∈ R and q ∈ Q are incident, (LL) is clearly equivalent to
• For any r′ ∈ Gq (r), r′ , r, we have Gr (q) ∩ Gr′ (q) = q
or,
• For any q′ ∈ Gr (q), q′ , q, we have Gq (r) ∩ Gq′ (r) = r
We proceed to interpret (LL) in terms of the isotropy groups data. This will be used either
directly for C (M; G) or for a suitably constructed cover C˜(M; G) as described at the end of
section 1. For notational simplicity we will describe it here only for C (M; G) (for the general
case see remark 3.5 below).
RANK THREE GEOMETRY AND POSITIVE CURVATURE
7
Proposition 3.2. If C (M; G) is a building of type C3 , then the following holds:
⋆ for any pair of different points q, q′ ∈ Q both incident to an r ∈ R, we have
Gq ∩ Gq′ ⊂ Grq ∩ Grq′
where Grq denotes the isotropy group of the unique edge between r and q (cf. Theorem C).
Proof. Note that every line in the orbit Gq ∩ Gq′ (r) is incident to both q and q′ . Axiom (LL)
implies that the orbit contains only one line, r and hence Gq ∩ Gq′ ⊂ Gr . Since C (M; G) is a
building, we have Gr ∩ Gq = Grq and Gr ∩ Gq′ = Grq′ . The desired result follows.
We will see that the condition ⋆ together with an assumption on a suitable reduction of the
G action implies that C (M; G) is a building of type C3 .
To describe the reduction, let r ∈ R be a line, and let S⊥r,Q be the normal sphere in the summand
in the slice T r⊥ . Then the shadow of r in Q is exp( π4 S⊥r,Q ). Moreover, the isotropy group Gr acts
transitively on S⊥r,Q .
Let Kr,Q denote the identity component of the kernel of the transitive Gr action on S⊥r,Q .
It is clear that the fixed point connected component M Kr,Q (containing r) is a cohomogeneity
one N0 (Kr,Q ) submanifold of M, where N0 (Kr,Q ) is the identity component of the normalizer
N(Kr,Q ) of Kr,Q in G. The corresponding chamber system denoted C (M Kr,Q ) is a subcomplex of
C (M) := C (M; G) that inherits an incidence structure, which gives rise to a Tits geometry of
rank 2.
Lemma 3.3 (Reduction). The connected chamber system C (M, G) of type C3 is a building if
for any r ∈ R, the reduction C (M Kr,Q ) is a C2 -building and ⋆ holds.
Proof. If not, by Axiom (LL) there are two points q , q′ ∈ Q which are both incident to two
different lines r, r′ ∈ R. By ⋆ we know that Gq ∩ Gq′ ⊂ Grq ∩ Grq′ and Gq ∩ Gq′ ⊂ Gr′ q ∩ Gr′ q′ .
Therefore, the configuration {rq, rq′, r′ q, r′q′ } is contained in the fixed point set M Gq ∩ Gq′ . Since
by definition clearly Kr,Q is a subgroup of Gq ∩ Gq′ , we have that M Gq ∩ Gq′ ⊂ M Kr,Q . This implies
that there is a length 4 circuit in the C2 building C (M Kr,Q ). A contradiction.
The following technical criterion will be more useful to us:
Lemma 3.4 (C3 Building Criterion). The connected chamber system C (M, G) is a building if
for any r ∈ R, the reduction C (M Kr,Q ) is a C2 -building and the following Property (P) holds:
(P) For any q ∈ Sh Q (r), and any Lie group L with Kr,Q ⊂ L ⊂ Gq but L 1 Grq , the normalizer
N(Kr,Q ) ∩ L is not contained in Grq either.
Proof. By the previous lemma it suffices to verify ⋆. Suppose ⋆ is not true. Then there is
an r ∈ R and a pair of points q , q′ both incident to r such that Gq ∩ Gq′ is not a subgroup
of Grq . Let L = Gq ∩ Gq′ . By Assumption (P), there is an α ∈ N(Kr,Q ) ∩ L so that α < Grq .
However, Gr ∩ Gq ∩N(Kr,Q ) = Grq ∩N(Kr,Q ) since M Kr,Q is an C2 building. In particular, α <
Gr , and so there is a length 4 circuit {rq, qα(r), α(r)q′ , q′ r} in the C2 building C (M Kr,Q ). A
contradiction.
Remark 3.5. For an S1 cover C˜ := C (P, S1 × G) of C (M, G) constructed as above note
that the property ⋆ is inherited from (M, G). Likewise, the group K̂ being the graph of the
8
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
homomorphism Gℓt ⊂ Gr to S1 restricted to K := Kr,Q satisfies Property (P) when K does.
For this note that by construction the local data for the reduction PK̂ are isomorphic to the
local data for M K . It then follows as in the proofs above, that if a component of the reduction
C (PK̂ ) ⊂ C (P, S1 × G) is a C2 -building, then the corresponding component of C˜ will be a C3
building covering C (M, G), and our main result, Theorem 4.10, from the [FGT] applies.
Remark 3.6. If K′ = K′r,Q ⊂ Kr,Q = K is a subgroup, then the assumption of C (M K ) being a C2
′
building in the above criterion may be replaced by, the fixed point component C (M K ) ⊃ C (M K )
being a C2 building, or a rank 3 building. For the latter, we notice that, by Charney-Lytchak
[CL] Theorem 2, a rank 3 spherical building is a CAT(1) space, hence any two points of distance
less than π are joined by a unique geodesic. This clearly excludes a length 4 circuit in the above
proof, since its perimeter is π.
Remark 3.7. Note that clearly Kt ⊂ Kℓq ∩ Kℓr and similarly for the other kernels of vertex and
edge isotropy groups. In particular, for the identity component K′ of Kt we have K′ ⊂ K, where K
(= Kr,Q ) is the identity component of the kernel of Gr acting on Sd . Consequently, the reduction
′
M K is a cohomogeneity two manifold of type either A3 , or C3 containing the cohomogeneity
one manifold M K (cf. 3.6 above).
4. Classification outline and organization
The subsequent sections are devoted to a proof of the following main result of the paper:
Theorem 4.1. Let M be a compact, simply connected positively curved polar G-manifold
with associated chamber system C (M; G) of type C3 . Then the universal cover C˜ of C (M; G)
is a building if and only if (M, G) is not equivariantly diffeomorphic to one of the exceptional
polar actions on OP2 by G = SU(3) · SU(3) or G = SO(3) · G2 .
This combined with the main result of [FGT] proves Theorem B in the introduction.
The purpose of this section is to describe how the proof is organized according to four types
of scenarios driven by the possible compatible types of slice representations for Gt and Gq at
the vertices t and q of a chamber C.
The common feature in each scenario and all cases is the determination of all local data.
The basic input for this is indeed knowledge of the slice representations at the vertices t and
q of a chamber C, and Lemma 2.3. The local data identifies the desired K ⊂ Gr reduction
M K with its cohomogeneity one action by N(K) referred to in the Building Criteria Lemma 3.4,
with Property (P) being essentially automatic. The main difficulty is to establish that C (M K ) ⊂
C (M; G) or the corresponding reduction in a cover (which by construction has the same local
data) is a C2 building. The first step for this frequently uses the following consequence of the
classification work on positively curved cohomogeneity one manifolds in [GWZ] and [Ve].
Lemma 4.2. Any simply connected positively curved cohomogeneity one manifold with multiplicity pair different from (1, 1), (1, 3) and (1, 7) is equivariantly diffeomorphic to a rank one
symmetric space.
As already pointed out and used, there are only four possible (effective) slice representations
at t, in particular forcing the codimensions of the orbit strata corresponding to ℓq , ℓr , and ℓt to
RANK THREE GEOMETRY AND POSITIVE CURVATURE
9
be d + 1, d + 1 and k + 1, where d = 1, 2, 4 or 8. In Table 4.3, L± , respectively H are the singular,
respectively principal isotropy groups for the effective slice representation, χ by Ḡt restricted to
the unit sphere, and l± + 1 are the codimensions of the singular orbits.
n
Ḡt
4
SO(3)
7
PSU(3)
L−
L+
H
(l− , l+ ) W
S(O(2) O(1))
S(O(1) O(2))
Z2 ⊕ Z2
(1, 1) A2
T2 /Z3
(2, 2) A2
χ
Ad S(U(2) U(1))/∆(Z3 ) S(U(1) U(2))/∆(Z3 )
13 Sp(3)/∆(Z2 ) ψ14 Sp(2) Sp(1)/∆(Z2 ) Sp(1) Sp(2)/∆(Z2 ) Sp(1)3 /∆(Z2 ) (4, 4) A2
25
F4
Spin(9)
ψ26
Spin(9)
Spin(8)
(8, 8) A2
Table 4.3. Effective t-slice representations on S⊥t = Sn
Similarly (see Table 4.4), the identity component (Ḡq )0 of possible effective C2 type slice representations at q which are compatible with the multiplicity restrictions in Table 4.3 are known
as well (see e.g. Table E of [GWZ] in which we have corrected an error for the exceptional
SO(2) Spin(7) representation (see also [GKK] (Main Theorem)).
n
(Ḡq )0
8k + 15, k ≥ 0
Sp(2) Sp(k+2)
4k + 7 , k ≥ 1 even
SU(2) SU(k+2)
∆(Z2 )
∆(Z2 )
L−
χ
ˆ k+2
ν2 ⊗ν
Sp(2) Sp(k)
ˆ k+2
µ2 ⊗µ
△ SU(2) SU(k)
∆(Z2 )
L+
Sp(1)2
Sp(k+1)
∆(Z2 )
∆(Z2 )
S1 · SU(k + 1)
H
Sp(1)2
Sp(k)
∆(Z2 )
S1 · SU(k)
∆(Z2 )
(l− , l+ )
W
(4, 4k + 3) C2
(2, 2k + 1) C2
ˆ k+2 △ SU(2) SU(k) S1 · SU(k + 1) S1 · SU(k) (2, 2k + 1) C2
4k + 7 , k ≥ 1 odd SU(2) SU(k + 2) µ2 ⊗µ
4k + 7, k ≥ 1
7
2k + 3, k ≥ 1 even
U(2) SU(k+2)
∆(Zk )
U(2) SU(2)
∆(Z2 )
SO(2) SO(k+2)
∆(Z2 )
ˆ k+2
µ2 ⊗µ
△ U(2) SU(k)
∆(Zk )
T2 · SU(k+1)
T2 · SU(k)
ˆ 2
µ2 ⊗µ
△ SO(3)
∆(Zk )
2
T
∆(Zk )
1
S
(2, 1)
C2
ˆ k+2
ρ2 ⊗ρ
△ SO(2) SO(k)
∆(Z2 )
SO(k + 1)
SO(k)
(1, k)
C2
(1, k)
C2
ˆ k+2 △ SO(2) SO(k) Z2 · SO(k + 1) Z2 · SO(k)
2k + 3, k ≥ 1 odd SO(2) SO(k + 2) ρ2 ⊗ρ
(2, 2k + 1) C2
13
SO(2) G2
ˆ 7 △ SO(2) SU(2)
ρ2 ⊗φ
Z2 · SU(3)
Z2 · SU(2)
(1, 5)
C2
15
SO(2) Spin(7)
ˆ 7 △ SO(2) SU(3)
ρ2 ⊗∆
G2
SU(3)
(1, 6)
C2
9
SO(5)
ad
U(2)
SO(3) SO(2)
T2
(2, 2)
C2
19
SU(5)
Λ2 µ5
Sp(2)
SU(2) SU(3)
SU(2)2
(4, 5)
C2
Λ2 µ5
1
1
1
∆(Z2 )
U(5)
S · Sp(2)
S · SU(2) SU(3) S · SU(2)2
Table 4.4. Effective q-slice representation on S⊥q = Sn
Aside from a few exceptional representations, they are the isotropy representations of the
Grassmannians G2,m+2 (k) of 2-planes in km+2 , where k = R, C, or H. The pairs of multiplicities
10
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
that occur for the exceptional representations are (1, 6), (1, 5), (4, 5), (2, 2), corresponding to
Ḡq = SO(2) Spin(7), SO(2) G2 , SU(5), U(5), or SO(5).
Note that effectively, there are only four exceptional Gq slice representations, corresponding to the last four rows of Table 4.4. However, special situations occur also when the slice
representation of Ḡq is the isotropy representation of the real Grassmann manifold, when its
multiplicity (1, k) happen to have k = d = 1, 2, 4 or 8. We will refer to these as flips. As may be
expected, the low multiplicity cases (1, 1, 1), (1, 1, 5) and (2, 2, 3) play important special roles.
The latter two are where the exceptional Cayley plane emerges, the only cases where complete
information about the polar data are required.
Accordingly we have organized the proof of 4.1 into four sections depending on the type of
slice representations we have along Q: Three Grassmann flips, three Grassmann series (two non
minimal), two minimal Grassmann representations, and four exceptional representations.
5. Grassmann Flip Gq slice representation
This section will deal with the multiplicity cases (d, d, 1) with d = 2, 4 and 8, leaving d = 1
(minimal and odd) for section 7. We have the following common features:
Lemma 5.1. The isotropy groups Gq and Gr are connected, and the reducible Ḡr slice representation on S1 ∗ Sd = Sd+2 is the standard action by SO(2) SO(d + 1). For the kernels of the
slice representations we have that Kt = {1}, Kq = Kℓr and Kr = Kℓq .
Proof. The Transversality Lemma 2.5 implies that the orbits Q = G q and R = G r are simply
connected since M is. In particular, Gq and Gr are connected since G is. The second claim
follows since d is even (cf. Appendix in [FGT] for a description of reducible polar representations).
Since (Ḡq )ℓr (cf. Table 4.4) as well as (Ḡr )ℓq act effectively on the respective normal spheres
d
S , we see that Kq = Kℓr and Kr = Kℓq . Also since Kt ⊂ Kℓr we have Kt ∩ Kq = Kt but Kt ∩ Kq = {1}
by the Kernel Lemma 2.3 and hence Kt = {1}.
Recall that K is the identity component of the kernel of the Gr action restricted to Sd .
Lemma 5.2. Clearly K⊳Gr , and K ⊂ Gℓt acts transitively on the corresponding normal sphere
S1 with kernel identity component of Kr . Moreover, K ∩ Kq = {1} and hence K ⊂ Gq → Ḡq is
injective.
The reduction M K is a positively curved irreducible cohomogeneity one N0 (K) manifolds with
multiplicity pair (d, 1).
Proof. Note that K ∩ Kq acts trivially on S1 ∗ Sd , so K ∩ Kq ⊂ Kr . The second claim follows since
Kr ∩ Kq = {1}.
Since K ⊳ Gℓt → Ḡq is injective, we see from Table 4.4 that N(K)∩ Gq / Gℓt = N(K)∩ Ḡq /Ḡℓt =
1
S , and hence M K is cohomogeneity one with multiplicity pair (d, 1).
To complete the proof assume by contradiction that the action is reducible, i.e., that the action
by N0 (K)/K on M K is equivalent to the sum action of SO(2) SO(d + 1) on S1 ∗ Sd , where the
isotropy (N0 (K)/K)q is SO(2) SO(d). In all cases, it is easy to see that, the center of Gq intersects
the center of N0 (K) in a nontrivial subgroup S1 . This, together with primitivity implies that, S1
RANK THREE GEOMETRY AND POSITIVE CURVATURE
11
is in the center of G. Notice that, as a subgroup of Gq , S1 can not be in Kq because Kq ⊂ H,
and the factor SO(2) ⊳ Ḡq acts freely on the unit sphere of the slice T q⊥ . Thus, the fixed point
1
set M S coincides with the orbit G q = G / Gq . From the classification of positively curved
homogeneous spaces we get immediately that, G is the product of S1 (or T2 if d = 2) with one
of a few orthogonal groups or unitary groups, each of which is not big enough to contain the
simple group Gt . The desired result follows.
Although what remains is in spirit the same for all the flip cases, we will cary out the arguments for each case individually, beginning with d = 8.
Proposition 5.3. In the Flip (8,8,1) case, C (M, G) or an S1 covering is a building, with the
isotropy representation of E7 / E6 × S1 as a linear model.
Proof. From Lemma 5.1 and Tables 4.4 and 4.3 we obtain the following information about the
local data: Gt = F4 ⊃ Spin(8) = H, Gℓq = Spin(9), Gℓr = Spin(9), Gq = S1 · Spin(10) ⊃
∆(S1 ) · Spin(8) = Gℓt , and Gr = S1 · Spin(9).
Also Gr ⊲K = ∆(S1 ) ⊂ Gℓt ⊂ Gq , and from Lemma 5.2 and Lemma 4.2 we see that the
corresponding reduction, M K is S19 , S19 /Zm , or S19 / S1 = CP9 with the tensor product representation by SO(2) SO(10) of type C2 or induced by it. It is easily seen that the Assumption
(P) in Lemma 3.4 is satisfied as well. In particular, if M K = S19 , the associated chamber system
C (M K ) is the a building of type C2 and by Lemma 3.4 we conclude that C (M, G) is a building.
For the latter two cases, we will use the bundle construction for polar actions to obtain a free
S1 covering of C (M; G). Guided by our knowledge of the cohomogeneity one diagrams , i.e.,
data for the cohomogeneity one manifolds S19 /Zm or CP9 we proceed as follows:
Note that since Gt , Gℓr and Gℓq are simple groups, only the trivial homomorphism to S1 exists.
Now let Ĝq , Ĝr be the graphs of the projection homomorphisms Gq → S1 , and Gr → S1 . We
denote the total space of the corresponding principal S1 bundle over M by P. Then P is a polar
S1 · G manifold, and C (P; S1 · G) covers C (M; G).
Let K̂ ⊂ Ĝℓt be the graph of K in S1 · G. From 3.5 and our choice of data in S1 · G it follows
that PK̂ → M K is the Hopf bundle if M K = CP9 , and the bundle S1 ×Zm S19 → S19 /Zm if M K =
S19 /Zm . In the former case, C (PK̂ ) is the C2 building C (S19 , SO(2) SO(10)) and we are done by
Lemma 3.4 via 3.5. In the latter case, the action on the reduction PK̂ is not primitive, so C (PK̂ ) is
not connected. However, each connected component is the C2 building C (S19 , SO(2) SO(10))
and hence by 3.5 the corresponding component of C (P) is a C3 building covering C (M). When
combined with the previous section, this in turn shows that M K cannot be a lens space when M
is simply connected.
Proposition 5.4. In the Flip (4,4,1) case C (M, G) or an S1 covering is a building, with the
isotropy representation of SO(12)/ U(6) as a linear model.
Proof. From Lemma 5.1 and Tables 4.4 and 4.3 we obtain the following information about the
local data modulo a common Z2 kernel: Gt = Sp(3) ⊃ Sp(1)3 = H, Gℓq = Sp(1) Sp(2), Gℓr =
Sp(2) Sp(1), Gq = S1 Spin(6) Sp(1) ⊃ ∆(S1 ) · Spin(4) Sp(1) = Gℓt , and Gr = S1 Spin(5) Sp(1).
In this case Gr ⊲K = ∆(S1 ) Sp(2)⊳Gℓt ⊂ Gq , and from Lemma 5.2 and Lemma 4.2 we see that
the corresponding reduction, M K is S11 , S11 /Zm , or S11 / S1 = CP5 with the linear tensor product
12
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
representation by SO(2) SO(6) of type C2 or induced by it. It is easily seen that the Assumption
(P) in Lemma 3.4 is satisfied as well. In particular, if M K = S11 , the associated chamber system
C (M K ) is the a building of type C2 and by Lemma 3.4 we conclude that C (M, G) is a building.
If M K = CP5 or a lens space S11 /Zm , we proceed as above with an S1 bundle construction.
Again only the trivial homomorphism to S1 exists from Gt , Gℓr and Gℓq , and we choose Ĝq , Ĝr
to be the graphs of the projection homomorphisms Gq → S1 , and Gr → S1 . We denote the
total space of the corresponding principal S1 bundle over M by P. As above, P is a polar S1 · G
manifold, and C (P; S1 · G) covers C (M; G).
From 3.5 and our choice of data in S1 · G it follows that PK̂ → M K is the Hopf bundle if
M K = CP5 , and the bundle S1 ×Zm S11 → S11 /Zm if M K = S11 /Zm . The proof is completed as
above.
Proposition 5.5. In the Flip (2,2,1) case C (M, G) or an S1 covering is a building, with the
isotropy representation of SU(6)/ S(U(3) U(3)) as a linear model .
Proof. We begin by verifying our earlier claim (see 2.4) that Ḡt is connected also in this case.
From (5.1) we already know that Gr and hence Ḡr is connected, and that its slice representation
is the product action of Ḡr = SO(3) × SO(2) on R3 ⊕ R2 . The singular isotropy group along R2
(away from origin) is SO(3). Hence, the isotropy group Ḡℓq = SO(3).
On the other hand, suppose Ḡt is not connected. Then, by 5.1 Ḡt = Gt = PSU(3) ⋊ Z2
and Gℓq = (S(U(2) U(1))/Z3 ) ⋊ Z2 . In particular the slice representation along ℓq is by Ḡℓq =
PSU(2) ⋊ Z2 acting on S2 = CP1 where Z2 acts by complex conjugation. Contradicting Ḡℓq =
SO(3).
The above and Tables 4.4 and 4.3 yield the following information about the local data modulo
the Z3 kernel: Gt = SU(3) ⊃ T2 = H, Gℓq = S(U(2) U(1)) = U(2), Gℓr = S(U(1) U(2)) = U(2),
Gq = U(2) U(2). Moreover, Gℓt = T3 and Gr = S1 · U(2), where the U(2) factor in Gr is the face
isotropy group of Gℓq .
Here, Gr ⊲K = T2 ⊳ Gℓt ⊂ Gq , and from Lemma 5.2 and Lemma 4.2 we see that the corresponding reduction, M K is S7 , S7 /Zm , or S7 / S1 = CP3 with the linear tensor product representation by SO(2) SO(4) of type C2 or induced by it. Again, the Assumption (P) in Lemma 3.4
is easily checked to hold. In particular, if M K = S7 , we conclude as above that C (M, G) is a
building.
For the latter two cases, we are again guided by the reduction for our bundle construction.
For Ĝt we have no choice but Ĝt = {1} · Gt . We let Ĝq be the graph of the homomorphism
U(2) U(2) → S1 defined by sending (A, B) to det(A) det(B)−1 , and Ĝr the graph of the projection
homomorphism Gr = S1 · U(2) → S1 . This yields a compatible choice of data for a polar S1 · G
action on a principal S1 bundle P over M whose corresponding chamber system C (P; S1 · G) is
a free S1 cover of C (M, G).
Again from 3.5 and our choice of data in S1 · G it follows that PK̂ → M K is the Hopf bundle
if M K = CP3 , and the bundle S1 ×Zm S7 → S7 /Zm if M K = S7 /Zm , and the proof is completed as
above.
Remark 5.6. The tensor representation of SU(3) SU(3) on C3 ⊗ C3 is not polar, but it is polar
on the projective space P(C3 ⊗ C3 ). On the other hand, it is necessary in the above construction
RANK THREE GEOMETRY AND POSITIVE CURVATURE
13
of the covering that both Gq and Gr have T2 factors, since the face isotropy groups Gℓr Gℓq
U(2) which are subgroups in Gt = SU(3), hence a compatible homomorphism to S1 will be
trivial on the face isotropy groups.
6. Non minimal Grassmann Series for Gq slice representation
Recall that there are three infinite families of cases (1, 1, k), k ≥ 1, (2, 2, 2k + 1), k ≥ 1 and
(4, 4, 4k + 3), k ≥ 0 corresponding the real, complex and quaternion Grassmann series for the
Gq slice representation.
We point out that (1, 1, 1) is special in two ways: There are two scenarios. One of them
corresponding to the “Flip” case of d = 1 not covered in the previous subsection, the other
being “standard”. Yet the standard (1, 1, 1) does not appear as a reduction in any of the general
cases (1, 1, k), k ≥ 2. For the (2, 2, 3) case, there are two scenarios as well, both with the same
local data(!): One of them belonging to the family, the other not. Moreover, each of the cases
(2, 2, 2k + 1) with k ≥ 2 admit a reduction to the “Flip” (2, 2, 1) case, whereas (2, 2, 3) does not.
For the reasons just provided, this subsection will deal with the multiplicity cases (1, 1, k), k ≥
2, (2, 2, 2k + 1), k ≥ 2 and (4, 4, 4k + 3), k ≥ 0, each of which has a uniform treatment.
Although the case (2, 2, 3) is significantly different from the other general cases to be treated
here, we begin by pointing out some common features for all the cases (1, 1, k), k ≥ 2, (2, 2, 2k +
1), k ≥ 1 and (4, 4, 4k + 3), k ≥ 0, i.e., including the case (2, 2, 3).
To describe the information we have about the local data in a uniform fashion, we use Gd (k)
to denote SO(k), SU(k) and Sp(k), k ≥ 1, according to d = 1, 2 and d = 4, with the exceptional
convention that G1 (−1) = Z2 , G2 (−1) = S1 or T2 , depending on whether the center of Kt is finite
or not, and G4 (0) = G4 (−1) = {1}. Also, we use the symbol ”=” to mean ”isomorphic” up to a
finite connected covering.
Lemma 6.1. In all cases Gt is connected as are Gq and Gr when d , 1. Moreover Kt = Gd (k)
with the additional possibility that Kt = Gd (k) · S1 when d = 2.
For the q and r vertex isotropy groups we have: Gq = Gd (2) Gd (k + 2) · Gd (−1), Gr =
Gd (2) Gd (k + 1) · Gd (−1). Moreover, the normal subgroup K ⊳ Gr is Gd (k + 1) · Gd (−1), where
Gd (k + 1) is a block subgroup of Gd (k + 2) ⊳ Gq , and if d = 1, “· Gd (−1)” denotes a nontrivial
extension. In particular, Gq = S(O(2) O(k + 2)).
Proof. The connectedness claim is a direct consequence of transversality. The proof follows the
same strategy in all cases, just simpler when all vertex isotropy groups are conneceted. The two
possibilities for Gt when d = 2 correspond to the different rank possibilities for Ḡq , cf. Table
4.4. For these reasons we only provide the proof in the most subtle case of d = 1.
First, notice that the effective slice representation Ḡt = SO(3) on T t⊥ is of type A2 with
principal isotropy group H̄ = Z22 . Hence, H is an extension of Z22 by the kernel Kt . On the
other hand, (Ḡq )0 = SO(2) SO(k + 2) (cf. Table 4.4), and Ḡq ⊂ O(2) O(k + 2), up to a possible
quotient by a diagonal Z2 in the center if k is even. Therefore, H is also an extension of SO(k),
SO(k) · Z2 or SO(k) · Z22 by Kq . This together with Lemma 2.3, implies that Kt = SO(k) and
hence Gt = SO(3) SO(k). In particular, H = SO(k) × Z22 .
We conclude that Gℓr = O(2) SO(k), and similarly, Gℓq = O(2) SO(k), acting on the normal
sphere S1 with principal isotropy group H. Thus Kℓr = SO(k) × Z2 = Kt × Z2 . Since Kq ⊳ Kℓr ,
14
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
we get easily that Kq = {1} or Z2 , since Kq ∩ Kt = {1}. On the other hand, as a subgroup of Gq ,
Gℓr = ∆(O(2)) SO(k). Hence Gq contains exactly two connected components, whose identity
component is SO(2) SO(k + 2) ⊃ (Gℓr )0 . All in all it follows that, Gq = S(O(2) O(k + 2)). The
rest of the proof is straightforward.
Note that Kt contains Gd (k) as a normal subgroup. The fact that the reduction M Gd (k) with the
action by the identity component of its normalizer, N0 (Gd (k)), will give a geometry of type A3
or C3 will play an important role in the d = 1, 2 cases below (cf. 3.6).
′
In what follows we will consider the reduction M K by K′ = Gd (k + 1) ⊳ Gd (k + 1) · Gd (1) =
K ⊂ Gr rather than the one by K.
′
Lemma 6.2. The cohomogeneity one N(K′ ) manifold M K has multiplicity pair (d, 2d − 1),
and the action is not equivalent to the reducible cohomogeneity one action on S2d−1 ∗ Sd .
Proof. For simplicity we give a proof for d = 2, all other cases are the same.
First note that the orbit space of the cohomogeneity one N(K′ )-action is rq, and the two
singular isotropy groups (mod kernel) are SU(2) · S1 and SU(2) · T2 respectively, with principal
isotropy group T2 . Hence the multiplicity pair is (2, 3).
′
To prove that it is not reducible, we argue by contradiction. Indeed, if M K is equivariantly
diffeomorphic to S2 ∗ S3 with the product action of SU(2) U(2), it follows that the normal subgroup SU(2) ⊳ Gq is also normal in N(K′ ). By primitivity G = hGr , Gq i = hN, Gq i and hence
SU(2) is normal in G. On the other hand, the face isotropy group Gℓr ⊂ Gt contains a subgroup
SU(2) which sits as ∆(SU(2)) ⊂ Gq . Therefore, the projection homomorphism p : G → SU(2)
is an epimorphism on ∆(SU(2)). However, since it sits in SU(3) ⊳ Gt it must be trivial, because
any homomorphism from SU(3) to SU(2) is trivial. A contradiction.
When d = 1 this is not immediately of much help since there are several positively curved
irreducible cohomogeneity one manifolds with multiplicity pair (1, 1) (cf. Tables A and E in
[GWZ]) whose associated chamber system is not of type C2 . However, when d = 2, respectively d = 4 corresponding to multiplicity pairs (2, 3), respectively (4, 7) we read off from the
classification in [GWZ] that
′
Corollary 6.3. The universal covering of M K is equivariantly diffeomorphic to a linear
action of type C2 on S11 , CP5 or HP2 when d = 2, and on S23 when d = 4.
We are now ready to deal with each family individually, beginning with d = 1, i.e. with
the standard (1, 1, k ≥ 2) case, where the (almost) effective slice representation at q ∈ Q is the
defining tensor product representation of SO(2) SO(k + 2).
Proposition 6.4. In the standard (1, 1, k) case with k ≥ 2, the associated chamber system
C (M; G) is a building, with the isotropy representation of SO(k + 3)/ SO(3) SO(k) as a linear
model.
Proof. By Lemma 6.1 Kt = SO(k), which is a normal subgroup of the principal isotropy group
H. Consider the reduction M Kt with the action of its normalizer N(Kt ), once again a polar action
with the same section Σ. By Lemma 6.1 it is clear that the identity component of N(Kt ) ∩ Gq
is T2 . Hence, the subaction by N0 (Kt ), the identity component of N(Kt ), is of type A3 , with a
RANK THREE GEOMETRY AND POSITIVE CURVATURE
15
right angle at q. Therefore, from the classification of A3 geometries (cf. section 7 in [FGT])
it is immediate that, the universal cover of M Kt is equivariantly difffeomorphic to S8 with the
linear action of SO(3) SO(3). In particular, if the section Σ = S2 , then M Kt = S8 and the
chamber complex for the subaction is a building of type A3 , and we are done by Remark 3.6,
since Property (P) is clearly satisfied for K = SO(k + 1) ⊳ Gr .
It remains to prove that M Kt is simply connected. Consider the normal subgroup SO(2) ⊳ Gq ,
and the fixed point component M SO(2) , a homogeneous manifold of positive curvature with dimension at least two, since M SO(2) ∩ M Kt ⊂ M Kt is of dimension 2. Since the identity component
of the isotropy group, (Gq )0 = SO(2) SO(k + 2), we see that M SO(2) = Sk+2 or RPk+2 , according to M Kt ∩ M SO(2) = S2 or RP2 , equivalently, according to M Kt = S8 or RP8 . We argue by
contradiction. If M SO(2) = RPk+2 , then the identity connected component of the normalizer
N(SO(2)) acts transitively on it with principal isotropy group SO(2) O(k + 2) ⊂ Gq . Hence
Gq = SO(2) O(k + 2), a contradiction, since Gq = S(O(2) O(k + 2)).
Proposition 6.5. In the standard (2, 2, 2k + 1) case, with k ≥ 2 the chamber system C (M; G)
is covered by a building, with the isotropy representation of U(k + 3)/ U(k) U(3) as a linear
model.
Proof. First note that the reduction M SU(k) , where SU(k) ⊳ Kt , k ≥ 2, is a positively curved
cohomogeneity two manifold of type C3 with multiplicity triple (2, 2, 1). Moreover, SU(k) is a
′
block subgroup in K′ ⊂ K, where K′ = SU(k + 1) ⊂ SU(k + 2) ⊳ Gq and of course M K ⊂ M SU(k) .
We will prove that both reductions above are simply connected, by appealing to the Con′
nectivity Lemma 2.6 of Wilking [Wi3]. To do this we now proceed to prove that codimM K ⊂
M SU(k) = 6, and codimM SU(k) ⊂ M = 6k.
By the Spherical isotropy Lemma 2.8, every irreducible isotropy subrepresentation of K′ =
SU(k + 1) is the defining representation µk+1 . From Table B in [GWZ] and the above fact that
SU(k + 2) ⊃ K′ it follows that, there is a simple normal subgroup L ⊳ G such that, SU(k + 2) ⊳ G q
projects to a block subgroup of L where L = SU(n) if k ≥ 4, L = SU(n) or SO(n) if k = 3, and
finally L = SU(n), SO(n) or one of the exceptional Lie groups F4 ⊂ E6 ⊂ E7 ⊂ E8 , if k = 2.
On the other hand, by the Flip Proposition 5.5 the normalizer N(SU(k)) is either SU(3) SU(3)
or U(3) SU(3) modulo Kt . Since SU(k) ⊳ Kt is a block subgroup in K′ , this together with the
above implies that in fact L = SU(k + 3) for all k ≥ 2, and only one such factor exist. In
particular, the K′ -isotropy representation along ℓt contains exactly 3 copies of µk+1 , one copy
along the normal slice T ℓ⊥t , and two copies along the orbit G / Gℓt . Therefore, the codimension
′
of M K in M is 6(k + 1), and hence the codimension of M SU(k) in M is 6k. By the Connectivity
lemma 2.6 of Wilking, we conclude that πi (M) πi (M SU(k) ) for i ≤ 2, by induction on k. In
particular, M SU(k) is simply connected and hence S17 if dim(M) is odd and CP8 if dim(M) is
even, by the Flip Proposition 5.5. Since Assumption (P) in Lemma 3.4 is satisfied we conclude
from 3.6 that C (M; G) is a building if dim(M) is odd.
It remains to prove that C (M; G) is covered by a building if dim(M) is even. In this case, by
the above we know that π2 (M) π2 (M SU(k) ) Z. On the other hand, from the Transversality
Lemma 2.5 it follows that π2 (M) π2 (G / Gt ), and hence Gt contains at least an S1 in its center,
i.e, SU(3) U(k) ⊳ Gt . By Lemma 6.1 we get that, both Gq and Gr have at least a T2 factor, and
we are now in the same situation as in the proof of Lemma 5.5 above. As a consequence we
16
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
can proceed with the same construction of a principal S1 bundle P over M and conclude that its
associated chamber system is a building covering C (M; G).
Proposition 6.6. In the standard (4, 4, 4k+3) case where k ≥ 0, the chamber system C (M; G)
is a building, with the isotropy representation of Sp(k + 3)/ Sp(k) Sp(3) as a linear model.
Proof. Since the Assumption (P) for K′ = Sp(k + 1) in Lemma 3.4 is easily seen to be satisfied,
′
it suffices by Corollary 6.3 to prove that M K is simply connected. As in the proof of the general
(2, 2, 2k + 1) case above this is achieved via Wilkings Connectivity Lemma 2.6.
Consider the normal subgroup Sp(2)⊳ Gq . It is clear that M Sp(2) is a homogeneous space with
a transitive action by the identity component of its normalizer N0 (Sp(2)) with isotropy group
Gq . By the classification of positively curved homogeneous spaces we get that M Sp(2) is either
S4(k+3)−1 or RP4(k+3)−1 . Moreover, the universal cover Ñ0 (Sp(2)) is Sp(k + 3) Sp(2) Sp(1), and in
particular has the same rank as G by the Rank Lemma.
On the other hand, by Lemma 2.8 and Table B in [GWZ] it follows that, G contains a normal
subgroup isomorphic to Sp(n) so that K′ ⊂ Sp(k + 2) ⊂ Sp(k + 3) ⊂ Sp(n) is in a chain of block
subgroups. Up to a finite cover, we let G = Sp(n) · L. On the other hand, by Corollary 6.3 we
know that N0 (K′ ) = Sp(2) Sp(3)K′ . This together with the information on Ñ(Sp(2)) implies that
G = Sp(k + 3) · L. As in the proof of the (2, 2, 2k + 1) case we see that the isotropy representation
of K′ , along ℓt contains exactly three copies of νk+1 , one copy along the normal slice T ℓ⊥t , and
′
two copies along the orbit G / Gℓt . In particular, the codimension of M K in M is 12(k + 1).
′
Recalling that the dimension of M K is 23, it follows again by connectivity and induction on k
′
as before that M K is simply connected.
7. Minimal Grassmann Gq slice representation
This section will deal with the multiplicity cases (1, 1, 1) and (2, 2, 3), including the appearance of an exceptional Cayley plane action. In all previous cases all reductions considered have
been irreducible polar actions. Here, however, we will encounter reductions, that are reducible
cohomogeneity two actions, and we will rely on the independent classification of such actions
in sections 6 and 7 of [FGT].
′
We begin with the d = 2 case, where by 6.3 we know that the universal covering M̃ K of the
′
reduction M K is diffeomorphic to S11 , CP5 or HP2 . The first two scenarios follow the outline of
the general (2, 2, 2k + 1) case, whereas the latter is significantly different.
Proposition 7.1. In the case of multiplicities (2, 2, 3), C (M; G) is covered by a building, with
′
the isotropy representation of U(7)/ U(4) U(3) as a linear model, provided M K is not diffeomorphic to HP2 .
Proof. By Lemma 6.1, Gt is either SU(3) or U(3) depending on whether Kt is finite or S1 . In
the latter case, the reduction M Kt is a positively curved cohomogeneity two manifold of type
C3 with multiplicity triple (2, 2, 1), as in the general (2, 2, 2k + 1) case, where k ≥ 2 (cf. 6.5).
Therefore, N0 (Kt )/Kt = SU(3) · SU(3) or U(3) · SU(3), by the Flip Proposition 5.5. The desired
result follows, as in the proof of Proposition 6.5.
RANK THREE GEOMETRY AND POSITIVE CURVATURE
17
From now on we assume that, up to finite kernel, Gt = SU(3), and correspondingly, Gq =
U(2) SU(3), and Gr = U(2) SU(2). Moreover, K′ = SU(2), and from our assumption on the re′
duction M K , by Corollary 6.3 the normalizer N(K′ ) contains SU(2) SU(2) SU(3) as its semisimple part. On the other hand, by the Rank Lemma 2.7 we know that rk(G) = 5 (resp. rk(G) = 4)
if dim(M) is odd (resp. even). In particular, SU(2) SU(2) SU(3) is a maximal rank subgroup of
G if rk(G) = 4. In this case, it is immediate, by Borel and de Siebenthal [BS] (see the Table on
page 219), that G is not a simple group of rank 4. Similarly, we claim that G is not a simple
group when its rank is 5: Indeed if so, by Lemma 2.8 and Table B in [GWZ], it would follow
that G = SU(6) and K′ = SU(2) ⊂ SU(3) ⊳ Gq is a block subgroup. This, however, is not
possible, since then N(K′ ) would contain SU(4). Thus, G = L1 · L2 , where L1 , L2 are nontrivial
Lie groups. Without loss of generality, we assume that the projection of SU(3) ⊳ Gq to L2 has
nontrivial image. But then SU(3) must be contained in L2 , because otherwise, the normalizer
N(K′ ) would be much smaller than SU(2) SU(2) SU(3). By Primitivity 2.2 it is easy to see that
Gt is diagonally imbedded in L1 · L2 , since G = hGt , Gℓt i = hGt , K′ i. In particular, both L1
and L2 have rank at least two since the projections from Gt are almost imbeddings, i,e,, have
finite kernel. If both L1 and L2 have rank two, it is easy to see that, L1 = SU(3) and K′ ⊂ L2 ,
where L2 = SU(3) or G2 . Neither scenario is possible: For the latter since, by the primitivity,
G = h∆(SU(3)), K′ i = SU(3) · SU(3), while for the former the semisimple part of N(K′ ) is L1 .
Therefore rk(G) = 5 and once again by Lemma 2.8 and Table B in [GWZ], G = SU(3) SU(4).
Note that dimM = 21 and the principal orbit of K′ in M is of dimension at least 2. In particu′
lar, it follows from Wilkings Connectivity Lemma2.6 that M K is simply connected. Thus, as in
the general case the desired result follows from Lemma 3.4.
Proposition 7.2. In the case of multiplicities (2, 2, 3), M is equivariantly diffeomorphic to
′
the Cayley plane OP2 with an isometric polar action by SU(3) · SU(3), provided M K is diffeomorphic to HP2 .
Proof. Recall that K′ = SU(2) ⊳ Gℓt . By Lemma 2.8 and the slice representation of Gℓt it
′
follows that, every irreducible subrepresentation of K′ on the normal space to M K is the standard
′
representation µ2 on C2 . In particular, the codimension of M K is a multiple of 4, and so M has
dimension divisible by 4. By 6.1 the isotropy group Gt = SU(3) or U(3), and correspondingly,
Gq = U(2) SU(3) or U(2) U(3), and Gr = U(2) SU(2) or U(2) U(2). By the Rank Lemma
rk(G) = rk(Gq ) = 4 or 5.
By Lemma 2.8 the isotropy representations of K′ ⊂ SU(3) ⊳ Gq , as well as of SU(2) ⊂
Gℓq ⊂ Gt , are spherical transitive. By Table B in [GWZ] it follows that, G can not be a simple
group of rank 5, and moreover, G can not contain F4 , Sp(4), SO(8) and SO(9) as a normal
subgroup, since if so, the semisimple part of N0 (K′ )/K′ would not be SU(3), a contradiction to
′
our assumption on the reduction M K , for which N0 (K′ )/K′ = SU(3)· S1 . On the other hand, note
that the identity component of the normalizer N0 (Gt ) = Gt since Gt is a maximal isotropy group
and hence N0 (Gt )/ Gt acts freely on the positively curved fixed point set M Gt of even dimension.
Therefore, G can not contain SU(5) as a normal subgroup, since otherwise, Gt would be a block
subgroup in SU(5) and hence N0 (Gt )/ Gt would not be trivial. Consequently, G is not a simple
group, and moreover, G = L1 · L2 , where SU(3) ⊳ Gt is diagonally imbedded in G. In particular,
both L1 and L2 contain SU(3) as subgroups. It is easy to see that, SU(3) ⊳ Gq ⊂ G = L1 · L2 is
a subgroup in either L1 or L2 , say in L2 . Hence, K′ ⊂ L2 , and L1 ⊳ N(K′ ). It follows that L1 =
18
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
SU(3). Furthermore, L2 can neither be a semi-simple group of rank 3 or G2 , since otherwise,
N0 (K′ )/K′ contains a rank 3 semisimple group. Hence, L2 is SU(3) or U(3). The latter, however,
is impossible: Indeed, in this case Gt = U(3), and the center S1 ⊂ Z(G) would be contained in
Kt , and hence in every principal isotropy groups (the center is invariant under conjugation) thus
1
M S = M.
In summary we have proved that G = SU(3) · SU(3) (indeed a quotient group by ∆(Z3 )),
with Gt = SU(3) diagonally imbedded in G. We claim that this combined with the above
analysis of the isotropy groups modulo conjugation will force the polar data (Gt , Gq , Gr ) ⊂ G
(noting that face isotropy groups are intersections of vertex isotropy groups) to be (Gt , Gq , Gr ) =
(∆(SU(3)), U(2) · SU(3), S(U(2) U(2))), where U(2) ⊂ SU(3) is the upper 2 × 2 block subgroup
in SU(3), and S(U(2) U(2)) ⊂ SU(3) · SU(3) is the product of the lower 2 × 2 block subgroups.
In other words, by the recognition theorem for polar actions [GZ] there is at most one such polar
action. - On the other hand the unique action by the maximal subgroup SU(3) · SU(3) ⊂ F4 , the
isometry group of the Cayley plane OP2 is indeed polar of type C3 [PTh].
To prove the above claim, by conjugation we may assume that Gt = ∆(SU(3)) and Gq =
U(2) · SU(3) as claimed. Moreover, up to conjugation by an element of the face isotropy group
Gℓr = Gt ∩ Gq , we may further assume that K′ ⊳ Gℓt ⊂ Gq is the lower 2×2 block subgroup in the
second factor SU(3) ⊳ G. Note that K′ is a normal subgroup of Gr , indeed the second factor of
SU(2)· SU(2)⊳ Gr ⊂ SU(3)· SU(3). Since Gℓq = ∆(SU(3))∩ Gr , it follows that SU(2)· SU(2)⊳ Gr
is the product of the lower 2 × 2 block subgroups. Since Gr = hSU(2) · SU(2), Hi where
H = ∆(T2 ) is the principal isotropy group, the desired assertion follows.
Next we deal with the case of multiplicity (1, 1, 1), where there are two scenarios: One is
naturally viewed as part of the infinite family (1, 1, k), whereas the other should be viewed as
the flip case with d = 1.
We point out that unlike all other cases an S3 chamber system cover arises in the first case,
corresponding to a polar action of SO(3) SO(3) on HP2 .
Proposition 7.3. For the multiplicity (1, 1, 1) case, the chamber system C (M; G) is covered
by a building, with the isotropy representation of either SO(7)/ SO(4) SO(3), or of Sp(3)/ U(3)
as a linear model.
Proof. Recall that, Ḡt = SO(3), and H̄ = Z22 . We first claim that the identity component (Gt )0 =
SO(3). To see this, recall that the kernel Kt ⊂ Kℓr , and Ḡq is either SO(2) SO(3) or S(O(2) O(3)).
The claim follows since, if dim Kt ≥ 1 or (Gt )0 = S3 , then Kt ∩ Kq is nontrivial, a contradiction
to Lemma 2.3. From this we also conclude that (Gq )0 is not S1 × S3 , since otherwise again
Kt ∩ Kq is non-trivial. Hence it is isomorphic to either SO(2) SO(3) (the “standard” case) or to
the 2 fold covering U(2) of SO(2) SO(3) (the “flip” case). By the Rank Lemma 2.7 it follows
that rank G ≤ 3.
We start with the following observation:
• Let z be cyclic subgroup of the principal isotropy group H with non-trivial image [z] ⊂ H̄.
Then the action by N0 (z) on the reduction M z is a reducible polar action of cohomogeneity 2.
To see this note that the type t orbit in the reduction is no longer a vertex. Indeed the normalizer
of [z] ⊂ H̄ ⊂ SO(3) is O(2).
RANK THREE GEOMETRY AND POSITIVE CURVATURE
19
In addition, note that the identity component of every face isotropy group is S1 . By the Dual
Generation Lemma 7.2 in [FGT] we conclude that
• 7.3.1. The semisimple part of N0 (z) has rank at most one.
To proceed we will prove that
(a). G is not a simple group of rank 3.
This is a direct consequence of 7.3.1 combined with the following algebraic fact: If G is
a rank 3 simple group, i.e., one of SO(6) = SU(4), SO(7) or Sp(3) (up to center), then, the
normalizer of any order 2 subgroup Z2 ⊂ SO(3) = (Gt )0 contains a semisimple subgroup
of rank at least 2. The algebraic fact is easily established by noticing that the inclusion map
SO(3) → G either can be lifted to a homomorphism into one of the four matrix groups, or
SO(3) sits in the quotient image of a diagonally imbedded SU(2) in one of the matrix groups.
Next we are going to prove that
(b). If G is a rank 2 group, then either (M, G) = (CP5 , SU(3)) or (HP2 , SO(3) SO(3)) up to
equivariant diffeomorphism.
Exactly as in Case (a), we can exclude G being SO(5) since a subgroup Z2 ⊂ H̄ ⊂ (Gq )0
will have a normalizer containing SO(4). We now exclude G being the exceptional group G2 .
Otherwise, (Gq )0 must be U(2), and contained in either an SO(4) ⊂ G2 or an SU(3) ⊂ G2 by
Borel-Siebenthal [BS]. The center Z2 ⊂ U(2) is in Kq . For the same reason as above, U(2) is
not in SO(4) ⊂ G2 . Finally, if U(2) ⊂ SU(3) ⊂ G2 , the q orbit (G q)Z2 in the reduction M Z2
contains (G2 / SU(3))Z2 = (S6 )Z2 = S2 . Again by the Dual Generation Lemma 7.2 of [FGT] this
is impossible, since the identity component of the isotropy group of the face opposite of q is a
circle, which cannot act transitively on the orbit (G q)Z2 . Therefore, up to local isomorphism,
G is SO(3) SO(3) or SU(3) respectively. One checks that the corresponding isotropy group
data are given by Gt = ∆(SO(3)) ⊂ SO(3) SO(3), and Gq = O(2) SO(3) ⊂ SO(3) SO(3),
respectively by Gt = SO(3) ⊂ SU(3) (inclusion induced by the field homomorphism), and
Gq = U(2) ⊂ SU(3) as a block subgroup. The recognization theorem then yields (b).
(c). Now suppose G = L1 · L2 , where Li is a rank i Lie group.
If L1 acts freely on M, then L1 = S1 , SO(3), or S3 , and L2 acts on M/L1 in a polar fashion of
type C3 . Hence, M/L1 is even dimensional and thus CP5 or HP2 by (b). In either case, we know
that the universal cover C˜ of the chamber system C (M/L1, L2 ) is a building. Since C (M, G) is
a connected chamber system covering C (M/L1, L2 ) it follows that C˜ is the universal cover of
C (M, G).
Now consider the remaining case where
• L1 does not act freely on M, and we let Zm ⊂ L1 be a cyclic group such that M Zm , ∅.
Note that G can not be SO(3) · T2 , since, then Gt and SO(3) ⊳ Gq would be the same simple
group factor, which is absurd. In particular, the semi-simple part of G has rank at least two.
Thus from now on we may assume that L2 is a rank two semi-simple group. Moreover, by the
argument in Case (b) it is immediate that in fact L2 is either SO(4) or SU(3).
Notice that:
• If Kt is not trivial, then (M Kt , N0 (Kt )) is a polar manifold with the same section, which is
of type A3 . By the Connectivity Lemma 2.6 it follows that M Kt is simply connected. Hence,
from the classification of A3 geometries, M Kt is diffeomorphic to S8 , and the chamber system of
(M Kt , N0 (Kt )) is a building. By 3.6 C (M, G) is a building.
20
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
Therefore, we may assume in the following that Kt = {1}, hence Gt = SO(3). It follows that,
Gq is either S(O(2) O(3)) or U(2).
We split the rest of the proof according to L1 abelian or not. In either case note that the
normalizer N0 (Zm ) is S1 ·L2 . From this we get immediately that Zm 1 H, by appealing to 7.3.1.
(ci) G = S1 ·L2 .
It suffices to prove that the S1 action is free, since then the situation reduces to the previous
rank 2 case.
Note that Zm is normal in G. From this and the above it follows that Zm is neither in Gt nor
in Gℓt . To see this, if Zm ⊂ Gℓt then (Ḡq )ℓt ⊂ Ḡq would contain a non-trivial normal subgroup
of Ḡq contradicting Table 4.4. The proof in the other case is similar but simpler. Hence, M Zm is
either the orbit G r or G q.
Assuming M Zm = G / Gr , it is immediate that L2 = SU(3) from the list of positively curved
homogeneous spaces. On the other hand, notice that Gr is not connected, indeed (Gr )0 = T2 and
Gr ⊃ Gℓq ⊃ O(2), it follows that G / Gr is not simply connected. However, G / Gr is a totally
geodesic submanifold in M which has dimension 11. A contradiction to Wilking’s Connectivity
Lemma 2.6.
Assuming M Zm = G / Gq , corresponding to L2 = SU(3) or SO(4), the universal cover of
G / Gq is a sphere of dimension either 5 or 3. The latter case is ruled out as follows: If Gq = U(2)
then Kq = Z2 is in the center of U(2) hence also in the center of G. This is impossible, since
Kq ⊂ H and G acts effectively on M by assumption. If Gq = S(O(2) O(3)) there are no nontrivial homomorphisms to S1 , hence Gq ⊂ SO(4), which is impossible. For the former case,
Gq = U(2) and G = U(3), with action on G / Gq equivalent to the standard linear action on a 5dimensional spherical space form with Zm in the kernel. Thus, Gq ⊃ Zm × U(2), a contradiction.
(cii) G = L1 · L2, where L1 is a simple rank one group, i.e., either S3 or SO(3).
We will show that in this case G = SO(3) SO(4), with local data Gq = S(O(2) O(3)) ⊂ G,
and Gt = ∆(SO(3)) ⊂ G forcing all data to coincide with those of the isotropy representation of
SO(7)/ SO(3) SO(4), and hence M with the action of G is determined via recognition.
We first prove that L2 = SO(4). If not, we start with an observation that, L1 = SO(3),
and moreover, Gt is a diagonally imbedded subgroup in L1 · L2 . Indeed, otherwise, an order 2
element z ∈ H ⊂ Gt will have a normalizer N0 (z) which contains a rank 2 semisimple subgroup,
contradicting 7.3.1. For the same reason, as above, we see that Gq , U(2) and hence, Gq =
S(O(2) O(3)). Similarly by 7.3.1, SO(3) ⊳ Gq must be diagonally embedded in L1 · L2 . This is
impossible since then N(SO(3))/ SO(3) is finite, but (Gq )0 ⊂ N(SO(3)).
Finally, given that L2 = SO(4) it follows as above that Gq , U(2), hence Gq = S(O(2) O(3)).
Since Gt = SO(3) and Gℓr = O(2) sits diagonally in Gq it follows that Gt sits diagonally in
L1 · L2 , in particular L1 = SO(3). Using the same arguments as above we see that SO(3) ⊳ Gq is
in L2 . All together, all isotropy data are determined.
8. Exceptional Gq slice representation
This section will deal with the remaining cases, all of which are exceptional with multiplicities (1, 1, 5), (2, 2, 2), (4, 4, 5), and (1, 1, 6). All but the latter will occur, and the case of (1, 1, 5)
will include an exceptional action on the Cayley plane.
RANK THREE GEOMETRY AND POSITIVE CURVATURE
21
Proposition 8.1. In the case of the multiplicities (1, 1, 5) where the (effective) slice representation at T q⊥ is the tensor representation of SO(2) G2 on R2 ⊗ R7 , either M is equivariantly
diffeomorphic to the Cayley plane OP2 with an isometric polar action by SO(3) · G2 or C (M, G)
is a building, with the tensor product representation of SO(3) Spin(7) on R3 ⊗ R8 as a linear
model.
Proof. By the Transversality Lemma 2.5 we conclude that Gt is connected since G / Gt is simply
connected. The kernel Kt is a normal subgroup in Gt , as well as of the principal isotropy
group H with quotients Gt /Kt = SO(3), and H /Kt = Z2 ⊕ Z2 respectively (cf. Table 4.3). By
the Slice Lemma 2.3 Kt acts effectively on the q-slice. Combining this with Table 4.4 where
(Ḡq )0 = SO(2) G2 it follows that, the identity components (Kt )0 = H0 = S3 . Thus, Gt = SO(4),
or Spin(4) = S3 × S3 . The latter, however, is impossible, since then Kt = S3 ×Z2 ⊳ S3 ×Q8 =
H where Q8 is the quaternion group of order 8. On the other hand, by Table 4.4 the slice
representation at q is the natural tensor representation of O(2) G2 on R2 ⊗ R7 , where the center
Z2 ⊂ Q8 is in the kernel Kq and so in Kt ∩ Kq . A contradiction. Therefore, Gt = SO(4), and
consequently, Gq = O(2) · G2 , Gr = O(2) · SU(3) and Gℓt = SU(3) · Z22 .
By Lemma 6.3 we have 3 ≤ rk(G) ≤ 4.
Case (i). Assume rk(G) = 3:
By Lemma 6.3 again dimM is even. By [BS] (table on page 219) SO(2) G2 is not a subgroup
in any rank 3 simple group. Therefore, G = L · G2 , where L is a rank one group. By Table 4.4 the
face isotropy group (Gℓr )0 = SU(2)·∆(SO(2)) is diagonally embedded in SO(2) G2 ⊳ Gq ⊂ L·G2 .
It follows that, the composition homomorphism Gt ⊂ G → L is nontrivial, hence surjective onto
L, because Gt = SO(4). Hence L = SO(3) and G = SO(3) G2 since the only proper nontrivial
normal Lie subgroup of SO(4) is S3 with quotient SO(3). By the above, we already know
that, Gt = SO(4) is a diagonal subgroup given by an epimorphism SO(4) → SO(3) and a
monomorphism SO(4) → G2 . It is clear that, up to conjugation, Gq = O(2) · G2 ⊂ G where
O(2) ⊂ SO(3) is the standard upper 2 × 2 block matrices subgroup.
As in the proof of Proposition 7.2 we now claim that there is at most one polar action with
the data as above. Since we are dealing with a non classical Lie group, however, we proceed as
follows:
Given another C3 type polar action of G = SO(3) G2 with isomorphic local data along
a chamber C ′ with vertices t′ , q′ , r′. Without loss of generality we may assume that Gq =
Gq′ ⊂ SO(3) G2 , and moreover, Gt = Gt′ since any two SO(4) subgroups in G2 are conjugate. Moreover, we can further assume that Gℓt = Gℓt′ since the singular isotropy groups
pair for the slice representation at q is unique up to conjugation. In particular, the principal
isotropy groups H = H′ . We prove now (Gℓq )0 = (Gℓq′ )0 = SO(2) SU(2). This clearly implies the assertion since Gr is generated by (Gℓq )0 and Gℓt . Recall that Gt = ∆(SO(4)) ⊂ G,
its composition with the projection to G2 ⊳ G is a monomorphism, so is the composition of
(Gℓq )0 ⊂ (Gr )0 = SO(2) · SU(3) to G2 , hence, (Gℓq )0 is a diagonal subgroup of Gr , whose
projection to the factor SU(3) is injective. Hence it suffices to show that the projection images
of (Gℓq )0 and (Gℓq′ )0 in SU(3) = (Gℓt )0 = (Gℓt′ )0 coincide. On the other hand, note that the
projection image of (Gℓq )0 in SU(3) is the normalizer N0 (H0 ) in SU(3) = (Gℓt )0 , where H0 is the
identity component of the principal isotropy group. The above assertion follows.
22
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
As for existence we again note that SO(3) G2 is a maximal subgroup of the isometry group F4
of the Cayley plane OP2 . The corresponding unique isometric action is indeed polar as proved
in [GK] and of type C3 .
Case (ii). Assume rk(G) = 4:
By Lemma 2.7, dimM is odd. Consider the reduction M H0 with the action of N0 (H0 ), the
identity component of the normalizer. Note that, this is also a C3 type polar action, but the
multiplicity triple is (1, 1, 1). By appealing to Lemma 2.8, the codimension of M H0 is divisible
by 4. Thus from the (1, 1, 1) case it follows that, the universal cover M̃ H0 is S11 , and the identity
component N0 (H0 ) is either U(3) or SO(3) SO(4), modulo kernel.
We are going to prove that M H0 is simply connected. It suffices to show that M H0 ⊂ M is 2connected. This follows trivially by the Connectivity Lemma of Wilking 2.6, if the codimension
of M H0 is at most 12.
If G2 ⊳ Gq is a normal subgroup of G, then G = L · G2 where L is a rank 2 group. Then
N0 (H0 )/ H0 is isomorphic to L · SO(3). Hence L = SO(4). It is easy to count the codimension
to see that it is strictly less than 12.
If G2 is not a normal subgroup, by Lemma 2.8 the isotropy representation of SU(3) ⊂ G2 ⊂ G
is spherical transitive. Hence, G contains a normal simple Lie subgroup L, such that G2 ⊂
Spin(7) ⊂ L is spherical. We claim that L = Spin(7). If not, L contains Spin(8) such that
Spin(7) ⊂ L is a block subgroup in Spin(8), and hence N0 (H0 ) contains Spin(5), which contradicts the above. This proves that G = L1 · Spin(7), where L1 is a rank 1 group. From this we
get that the isotropy subrepresentation of G / H0 contains exactly three copies of the standard
defining representation of SU(2), hence the desired estimate for the codimension.
In summary we conclude that M H0 = S11 , N0 (H0 ) = SO(3) SO(4) and hence, from the multiplicity (1, 1, 1) case, the chamber system for the action of N0 (H0 ) is a building of type C3 . By
remark 3.6 we conclude that C (M, G) is a building.
Proposition 8.2. There is no polar action of type C3 type with multiplicities (1, 1, 6), where
the (effective) slice representation at T q⊥ is the tensor product representation of SO(2) Spin(7)
on R2 ⊗ R8 .
Proof. We will prove that, if there is such a slice representation at q, the chamber system
C (M, G) is a building. The desired claim follows from the classification of C3 buildings, i.e.,
indeed there is no such a building.
To proceed, note that from Table 4.4 Ḡq = SO(2) Spin(7), and the principal isotropy group
H̄ = SU(3). It follows that, up to local isomorphism Gt = SU(3) SO(3) with Kt = SU(3). Notice
that, the reduction (M Kt , N0 (Kt )) is of cohomogeneity 2 with the same section. It is clear that it
is of type A3 since the q vertex is a vertex with angle π/2, because N0 (Kt ) ∩ Gq is T2 . By the
classification of A3 geometries it follows that, M Kt is either S8 or RP8 . We claim that M Kt = S8 ,
and hence the chamber system for (M Kt , N0 (Kt )) is a building. By appealing to 3.6 it follows
that C (M, G) is a building. To see the claim, it suffices to prove that M Kt is orientable and
hence simply connected, thanks to the positive curvature. By 2.8 the isotropy representation of
2
Kt = SU(3) is the defining complex representation. From this it is immediate that, M Kt = M T ,
and hence oriented, where T2 ⊂ Kt is a maximal torus.
RANK THREE GEOMETRY AND POSITIVE CURVATURE
23
Proposition 8.3. When the multiplicity triple is (2, 2, 2), there are two scenarios. In either
case C (M, G) is a building, with linear model the adjoint polar representation of either SO(7)
or of Sp(3) on S20 .
Proof. By Lemma 2.5 we know that all vertex isotropy groups are connected. Notice that, by
Table 4.4, the slice representation at q is the adjoint representation of SO(5) on R10 . Together
with Proposition 2.3, up to local isomorphism, the local isotropy group data are determined
as follows: Gt = U(3), Gq = SO(5) S1 and Gr = SO(3) U(2). Moreover, H = T3 , Gℓt =
SO(3) SO(2) S1 , and K′ = SO(3) ⊳ Gℓt .
Let SO(2) = K′ ∩ H ⊂ K′ . Consider the reduction (M SO(2) , N(SO(2))). It is once again a polar
manifold with the same section. For such a reduction, notice that: the face ℓq has multiplicity
2, the face ℓt is exceptional with normal sphere S0 , and Gq ∩N(SO(2))/ Gℓt ∩N(SO(2)) = S2 .
Therefore, the action of N(SO(2)) is reducible with fundamental chamber rqq′ , where q′ is a
reflection image of q, and rq = ℓt is of exceptional orbit type. In particular, the multiplicities
at q′ are (2, 2), hence the slice representation at q′ for the N(SO(2))-action is again the adjoint
representation of SO(5) on R10 . This clearly implies that q′ is a fixed point. On the other hand,
notice that M SO(2) is orientable and hence simply connected. Therefore, by Theorem 6.2 of
[FGT] we know that M SO(2) = S10 . Since Property (P) holds for SO(2) it follows from Remark
3.6 that C (M, G) is a building.
Remark 8.4. We remark that in the above proof, the chamber system of (M SO(2) , N(SO(2)))
is a building of type A1 × C2 but the one for (M SO(2) , N0 (SO(2))) is not.
Proposition 8.5. In the case of the multiplicities (4, 4, 5), the chamber system C (M; G) is
covered by a building, with the isotropy representation of SO(14)/ U(7) as a linear model.
Proof. By Lemma 2.5 we know that all isotropy groups are connected. Note that Ḡt = Sp(3),
and Ḡq = SU(5) or U(5). By Lemma 2.3, it is easy to see that:
• if Gt is semisimple, then, up to local isomorphism, Gt = Sp(3), Gr = Sp(2) SU(3), Gq =
SU(5) Sp(1) and Gℓt = SU(3) Sp(1)2 , where Sp(1) = Kq is a subgroup of Gt .
• if Gt is not semisimple, then Kt = S1 , and all isotropy groups data are the product of S1
with the corresponding data above.
We now prove that G contains SU(7) as a normal subgroup. By Lemma 2.8 the isotropy
representations of G / Sp(2) and G / SU(3) are both spherical, where Sp(2), SU(3) are normal
factors of face isotropy groups. Hence, a normal factor L of G is either SO(n) or SU(n), by
Table B in [GWZ]. Moreover, the subgroup Kq ⊂ Gt is contained in a block subgroup SO(4) ⊂ L
(resp. a block subgroup SU(2) ⊂ L) if L = SO(n) (resp. L = SU(n)). Since N0 (Kq ) contains
Gq , it follows that n ≥ 14 (resp. n ≥ 7) if L = SO(n) (resp. SU(n)). To rule out the former
case, consider the fixed point set M Kq with the polar action of N0 (Kq ). It is clearly a reducible
cohomogeneity 2 action with q a vertex of angle π/4. By the Dual Generation Lemma 7.2 of
[FGT] it follows that N0 (Kq ) is either Gq (the fixed point case) or the product of SU(5) ⊳ Gq with
the face isotropy group opposite to q in the reduction M Kq /N0 (Kq ). From this it is immediate
that L = SU(7).
Note that if Gt is semisimple, or dim(M) is even, then rank G ≤ 6, by the Rank Lemma,
and hence G = SU(7). For the remaining case, i.e., dim(M) being odd and Gt = S1 · Sp(3),
24
FUQUAN FANG, KARSTEN GROVE, AND GUDLAUGUR THORBERGSSON
we now prove that G = U(7), up to local isomorphism. Indeed, it is clear that rank G = 7,
and hence G = SU(7) · L2 , where L2 is a rank 1 group. It suffices to prove that L2 = S1 . Let
K′ = SU(3) ⊳ Gℓt . It is clear that the projection p2 : G → L2 is trivial, when restricted to either
of Sp(3) ⊳ Gt and K′ ⊂ Gq . By primitivity 2.2, G = hGt , Gℓt i = hGt , K′ i. Therefore, p2 (Gt ) = L2
and hence, L2 = S1 .
To complete the proof, we split into two cases, i.e, dim(M) being even or odd. For the
former, Kt = S1 and G = SU(7). It is clear that Gt = Sp(3) S1 is a subgroup of U(6) ⊂ SU(7)
and Gq = SU(5) Sp(1)· S1 is the normalizer N(Sp(1)) in G, where Sp(1)⊳ Gℓr ⊂ Gt . This forces
all isotropy groups data to be the same as for the linear cohomogeneity 2 polar action on CP20
induced from the isotropy representation of SO(14)/ U(7). Hence, in particular, the chamber
system C (M; G) is covered by a building. For the latter, G = SU(7) or U(7) depending on
′
Kt = {1} or S1 . The fixed point set M K is odd dimensional, since the isotropy representation of
′
K′ is the defining complex representation. Note that N0 (K′ ) = SU(4) Ti ·K′ , i = 1, 2, and M K is
equivariantly diffeomorphic to S11 with a standard linear cohomogeneity one action of type C2 .
Hence, by Lemma 3.4, C (M; G) is a building.
References
[AT]
M. Alexandrino and D. Töben, Singular Riemannian foliations on simply connected spaces, Differential
Geom. Appl. 24 (2006), 383–397.
[BS]
A. Borel and J. De Siebenthal, Les sous-groupes fermes de rang maximum des groupes de Lie clos,
Comment. Math. Helv. 23(1949), 200–221.
[BSp] K. Burns and R. Spatzier, On topological Tits buildings and their classification, Inst. Hautes Études Sci.
Publ. Math. 65 (1987), 5–34.
[CL]
R. Charney and A. Lytchak, Metric characterizations of spherical and Euclidean buildings, Geom. Topol.
5 (2001), 521–550.
[De]
O. Dearricott, A 7-manifold with positive curvature, Duke Math. J. 158 (2011), 307–346.
[EH]
J.-H. Eschenburg and E. Heintze, On the classification of polar representations, Math. Z. 232 (1999),
391–398.
[FGT] F. Fang, K. Grove and G. Thorbergsson, Tits geometry and positive curvature, preprint.
[GK]
C. Gorodski and A. Kollross, Some remarks on polar actions, preprint .
[Go]
F. J. Gozzi, Low Dimensional Polar Actions, arXiv 1407.0638
[GVZ] K. Grove, L. Verdiani and W. Ziller, An exotic T 1 S4 with positive curvature, Geom. Funct. Anal. 21
(2011), 499–524.
[GWZ] K. Grove, B. Wilking and W. Ziller, Positively curved cohomogeneity one manifolds and 3-Sasakian
geometry, J. Differential Geom. 78 (2008), 33–111.
[GZ]
K. Grove and W. Ziller, Polar Actions and Manifolds, The Journal of Fixed Point Theory and Applications
11 (2012), 279–313
[GKK] T. Grundhöfer, N. Knarr, and L. Kramer, Flag-homogeneous compact connected polygons. II, Geom.
Dedicata 83 (2000), 1–29.
[HS]
H. Hopf and H. Samelson, Ein Satz über die Wirkungsräume geschlossener Liescher Gruppen, Comment.
Math. Helv. 13 (1941), 240–251.
[KL]
L. Kramer and A. Lytchak, Homogeneous compact geometries, Transform. Groups 19 (2014), 793–852.
[Ly]
A. Lytchak, Polar foliations of symmetric spaces, Geom. Funct. Anal. 24 (2014), 1298–1315.
[Ne]
A. Neumaier, Some sporadic geometries related to PGL(3, 2), Arch. Math. 42 (1984), 89–96.
[PTh] F. Podestà and G. Thorbergsson, Polar actions on rank-one symmetric spaces, J. Differential Geom. 53
(1999), 131–175.
[Ro]
M. Ronan, Lectures on buildings. Perspectives in Mathematics 7. Academic Press, Inc., Boston, MA,
1989.
RANK THREE GEOMETRY AND POSITIVE CURVATURE
[Su]
[Ti1]
[Ti2]
[Ve]
[Wie]
[Wi1]
[Wi2]
[Wi3]
25
K. Sugahara, The isometry group and the diameter of a Riemannian manifold with positive curvature,
Math. Japon. 27 (1982), 631–634.
J. Tits, Buildings of spherical type and finite BN-pairs.. Lecture Notes in Mathematics 386. SpringerVerlag, Berlin-New York, 1974.
J. Tits, A local approach to buildings, The geometric vein. The Coxeter Festschrift. Edited by C. Davis,
B. Grünbaum, and F. A. Sherk, 519–547, Springer, New York-Berlin, 1981.
L. Verdiani, Cohomogeneity one manifolds of even dimension with strictly positive sectional curvature,
J. Differential Geom., 68 (2004), 31–72.
S. Wiesendorf, Taut submanifolds and foliations, J. Differential Geom. 96 (2014), 457–505.
B. Wilking, Nonnegatively and positively curved manifolds, Surveys in differential geometry. Vol. XI,
25–62, Surv. Differ. Geom. 11, Int. Press, Somerville, MA, 2007.
B. Wilking, Positively curved manifolds with symmetry, Ann. of Math. 163 (2006), 607–668.
B. Wilking, Torus actions on manifolds of positive sectional curvature, Acta Math. 191 (2003), no. 2,
259–297.
Department of Mathematics, Capital Normal University, Beijing 100048, China
E-mail address: fuquan [email protected]
Department of Mathematics, University of Notre Dame, Notre Dame, IN 46556, USA
E-mail address: [email protected]
Mathematisches Institut, Universität zu Köln, Weyertal 86-90, 50931 Köln, Germany
E-mail address: [email protected]
| 4math.GR
|
Real-Time Rejection and Mitigation of
Time Synchronization Attacks on the
Global Positioning System
arXiv:1802.01649v1 [cs.SY] 5 Feb 2018
Ali Khalajmehrabadi, Student Member, IEEE, Nikolaos Gatsis, Member, IEEE,
David Akopian, Senior Member, IEEE, and Ahmad F. Taha, Member, IEEE
Abstract—This paper introduces the Time Synchronization Attack Rejection and Mitigation (TSARM) technique for
Time Synchronization Attacks (TSAs) over the Global Positioning System (GPS). The technique estimates the clock
bias and drift of the GPS receiver along with the possible
attack contrary to previous approaches. Having estimated
the time instants of the attack, the clock bias and drift of
the receiver are corrected. The proposed technique is computationally efficient and can be easily implemented in real
time, in a fashion complementary to standard algorithms
for position, velocity, and time estimation in off-the-shelf
receivers. The performance of this technique is evaluated
on a set of collected data from a real GPS receiver. Our
method renders excellent time recovery consistent with the
application requirements. The numerical results demonstrate that the TSARM technique outperforms competing
approaches in the literature.
Index Terms—Global Positioning System, Time Synchronization Attack, Spoofing Detection
I. I NTRODUCTION
I
NFRASTRUCTURES such as road tolling systems, terrestrial digital video broadcasting, cell phone and air traffic
control towers, real-time industrial control systems, and Phasor
Measurement Units (PMUs) [1] heavily rely on synchronized
precise timing for consistent and accurate network communications to maintain records and ensure their traceability. The
Global Positioning System (GPS) provides time reference of
microsecond precision for these systems [2]–[5].
The GPS-based time-synchronization systems use the civilian GPS channels, which are open to the public [6], [7]. The
unencrypted nature of these signals makes them vulnerable
to unintentional interference and intentional attacks. Thus,
unauthorized manipulation of GPS signals leads to disruption
of correct readings of GPS-based time references, and thus,
is called Time Synchronization Attack (TSA). To address the
impact of malicious attacks, for instance on PMU data, the
Electric Power Research Institute published a technical report
that recognizes the vulnerability of PMUs to GPS spoofing
under its scenario WAMPAC.12: GPS Time Signal Compromise [8]. These attacks introduce erroneous time stamps which
are eventually equivalent to inducing wrong phase angle in
Authors are with the Electrical and Computer Engineering Department, University of Texas at San Antonio, San Antonio, TX, 78249,
USA (e-mails: {ali.khalajmehrabadi, nikolaos.gatsis, david.akopian, ahmad.taha}@utsa.edu).
the PMU measurements [9], [10]. The impact of TSAs on
generator trip control, transmission line fault detection, voltage
stability monitoring, disturbing event locationing, and power
system state estimation has been studied and evaluated both
experimentally [11] and through simulations [12]–[14].
Intentional unauthorized manipulation of GPS signals is
commonly referred to as GPS spoofing, and can be categorized
based on the spoofer mechanism as follows:
• Jamming (blocking): The spoofer sends high power signals
to jam the normal operation of the receiver by disrupting
the normal operation of the victim receiver, often referred
to as loosing lock. Then, the victim receiver may lock onto
the spoofer signal after jamming [9], [15]–[17].
• Data level spoofing: The spoofer manipulates the navigation
data such as orbital parameters (ephemerides) that are used
to compute satellite locations [13], [15], [18].
• Signal level spoofing: The spoofer synthesizes GPS-like
signals that carry the same navigation data as concurrently
broadcasted by the satellites [11].
• Record-and-replay attack: The spoofer records the authentic
GPS signals and retransmits them with selected delays at
higher power [9], [19]. Typically the spoofer starts from
low power transmission and increases its power to force
the receiver to lock onto the spoofed (delayed) signal. The
spoofer may change the transmitting signal properties such
that the victim receiver miscalculates its estimates.
Common off-the-shelf GPS receivers lack proper mechanisms to detect these attacks. A group of studies have been
directed towards evaluating the requirements for successful
attacks, theoretically [16] and experimentally [11], [29]–[31].
For instance, the work in [30] has designed a real spoofer as
a Software Defined Radio (SDR) that records authentic GPS
signals and retransmits fake signals. It provides the option of
manipulating various signal properties for spoofing.
A. Spoofing Detection Techniques in the Literature
The first level of countermeasures to reduce the effect of
malicious attacks on GPS receivers typically relies on the
Receiver Autonomous Integrity Monitoring (RAIM) [4]. Offthe-shelf GPS receivers typically apply RAIM consistency
checks to detect the anomalies exploiting measurement redundancies. For example, RAIM may evaluate the variance of
GPS solution residuals and consequently generate an alarm
if it exceeds a predetermined threshold. Similar variance
authentication techniques have been proposed in [22], [32]
TABLE I
GPS S POOFING D ETECTION T ECHNIQUES : D ETECTION D OMAIN AND I MPLEMENTATION A SPECTS
Method
EKF
CUSUM [20]
Attack Detection Domain
GPS Navigation domain
GPS baseband signal domain
Attack
Not Estimated
Not Estimated
Ref. [21]
GPS baseband & power grid domains
Not Estimated
SPREE [22]
Ref. [23], [24]
Ref. [25], [26]
Ref. [27]
Ref. [28]
TSARM
GPS baseband signal domain
GPS baseband signal domain
GPS navigation domain
GPS navigation domain
GPS navigation domain
GPS navigation domain
Not Estimated
Not Estimated
Not Estimated
Not Estimated
Not Estimated
Estimated
based on hypothesis testing on the Kalman filter innovations;
however, they are vulnerable to smarter attacks that pass RAIM
checks or the innovation hypothesis testing.
A plethora of countermeasures have been designed to
make the receivers robust against more sophisticated attacks
[9], [15], [17]–[19], [21]–[25], [27], [28], [33]–[35]. Vector
tracking exploits the signals from all satellites jointly and
feedbacks the predicted position, velocity, and time (PVT) to
the internal lock loops [23], [24], [33]. If an attack occurs, the
lock loops become unstable which is an indication of attack.
Cooperative GPS receivers can perfrom authentication check
by analyzing the integrity of measurements through peer-topeer communications [24], [25], [34], [35]. Also, a quick
sanity check for stationary time synchronization devices is to
monitor the estimated location. As the true location can be
known a priori, any large shift that exceeds the maximum
allowable position estimation error can be an indication of
attack [28]. The receiver carrier-to-noise receiver can be used
as an indicator of spoofing attack [17]. In [21], the difference
between the carrier-to-noise ratios of two GPS antennas has
been proposed as a metric of PMU trustworthiness. In addition, some approaches compare the receiver’s clock behavior
against its statistics in normal operation [19], [28], [33].
B. Existing Literature Gaps
As discussed above, prior research studies addressed a
breadth of problems related to GPS spoofing. However, there
are certain gaps that should still be addressed: 1) Most of the
works do not provide analytical models for different types of
spoofing attacks. The possible attacking procedure models are
crucial for designing the countermeasures against the spoofing
attacks. 2) Although some countermeasures might be effective
for a certain type of attack, a comprehensive countermeasure
development is still lacking for defending the GPS receiver.
This is practically needed as the receiver cannot predict the
type of attack. 3) The main effort in the literature is in
detection of possible spoofing attacks. However, even with
the spoofing detection, the GPS receiver cannot resume its
normal operation, especially in PMU applications where the
network’s normal operation cannot be interrupted. So, the
spoofing countermeasures should not only detect the attacks
but also mitigate their effects so that the network can resume
its normal operation. 4) There is a need for simpler solutions
which can be integrated with current systems.
Implementation Aspects
Benchmark for most common GPS receivers
Applies hypothesis testing on packets of received signal
Combines the statistics of carrier-to-noise ratio difference
between two GPS antennas
Applies auxiliary peak tracking in the correlators of receiver
Applies a position-information-aided vector tracking loop
Needs collaboration among multiple GPS receivers
Applies an anti-spoofing particle filter
Applies hypothesis testing on a GPS clock signature
Applies a real-time optimization technique
Relevant
Yes
No
No
No
No
No
Yes
Yes
-
C. Contributions of This Work
This work addresses the previously mentioned gaps for
stationary time synchronization systems. To the best of our
knowledge, this is the first work that provides the following
major contributions: 1) The new method is not a mere spoofing
detector; it also estimates the spoofing attack. 2) The spoofed
signatures, i.e., clock bias and drift, are corrected using the
estimated attack. 3) The new method detects the smartest
attacks that maintain the consistency in the measurement set.
A descriptive comparison between our solution and representative works in the literature is provided in Table I. A review
of the spoofing detection domain shows that most of the prior
art operates at the baseband signal processing domain, which
necessitates manipulation of the receiver circuitry. Hence, the
approach in the present paper is compared only to those works
whose detection methodology lies in navigation domain.
The proposed TSA detection and mitigation approach in
this paper consists of two parts. First, a dynamical model
is introduced which analytically models the attacks in the
receiver’s clock bias and drift. Through a proposed novel Time
Synchronization Attack Rejection and Mitigation (TSARM)
approach, the clock bias and drift are estimated along with
the attack. Secondly, the estimated clock bias and drift are
modified based on the estimated attacks so that the receiver
would be able to continue its normal operation with corrected
timing for the application. The proposed method detects and
mitigates the effects of the smartest and most consistent
reported attacks in which the position of the victim receiver is
not altered and the attacks on the pseudoranges are consistent
with the attacks on pseudorange rates.
Different from outlier detection approaches in [36], [37],
the proposed method detects the anomalous behavior of the
spoofer even if the measurement integrity is preserved. The
spoofing mitigation scheme has the following desirable attributes: 1) It solves a small quadratic program, which makes
it applicable to commonly used devices. 2) It can be easily integrated into existing systems without changing the receiver’s
circuitry or necessitating mulitple GPS receivers as opposed
to [21]–[24], [33], [34]. 3) It can run in parallel with current
systems and provide an alert if spoofing has occurred. 4)
Without halting the normal operation of the system, corrected
timing estimates can be computed.
The proposed anti-spoofing technique has been evaluated
using a commercial GPS receiver with open-source measurements access [38]. These measurements have been perturbed
with spoofing attacks specific to PMU operation. Applying the
proposed anti-spoofing technique shows that the clock bias of
the receiver can be corrected within the maximum allowable
error in the PMU IEEE C37.118 standard [39].
Paper Organization: A brief description of the GPS is
described in Section II. Then, we provide the models for
possible spoofing attacks in Section III. Section IV elaborates
on the proposed solution to detect and modify the effect of
these attacks. Our solution is numerically evaluated in Section
V followed by the conclusions in Section VI.
II. GPS PVT E STIMATION
In this section, a brief overview of the GPS Position,
Velocity, and Time (PVT) estimation is presented.
The main idea of localization and timing through GPS is
trilateration, which relies on the known location of satellites
as well as distance measurements between satellites and the
GPS receiver. In particular, the GPS signal from satellite n
contains a set of navigation data, comprising the ephemeris and
the almanac (typically updated every 2 hours and one week,
respectively), together with the signal’s time of transmission
(tn ). This data is used to compute the satellite’s position
pn = [xn (tn ), yn (tn ), zn (tn )]T in Earth Centered Earth Fixed
(ECEF) coordinates, through a function known to the GPS
receiver. Let tR denote the time that the signal arrives at the
GPS receiver. The distance between the user (GPS receiver)
and satellite n can be found by multiplying the signal propagation time tR − tn by the speed of light c. This quantity is
called pseudorange: ρn = c(tR − tn ), n = 1, . . . , N , where
N is the number of visible satellites. The pseudorange is not
the exact distance because the receiver and satellite clocks
are both biased with respect to the absolute GPS time. Let
the receiver and satellite clock biases be denoted by bu and
bn , respectively. Therefore, the time of reception tR and tn
are related to their absolute values in GPS time as follows:
+ bn , n = 1, . . . , N. The
+ bu ; tn = tGPS
tR = tGPS
n
R
bn ’s are computed from the received navigation data and are
considered known. However, the bias bu must be estimated
and should be subtracted from the measured tR to yield the
receiver absolute GPS time tGPS
R , which can be used as a time
reference used for synchronization. Synchronization systems
time stamp their readings based on the Coordinated Universal
Time (UTC) which has a known offset with the GPS time as
tUTC
= tGPS
− ∆tUTC , where ∆tUTC is available online.1
R
R
Let pu = [xu , yu , zu ]T be the coordinates of the GPS
receiver, and dn its true range to satellite n. This distance
is expressed via the locations pu , pn and the times tGPS
R ,
tGPS
as dn = kpn − pu k2 = c(tGPS
− tGPS
). Therefore, the
n
n
R
measurement equation becomes
ρn = kpn − pu k2 + c(bu − bn ) + ρn
(1)
where n = 1, . . . , N , and ρn represents the noise. The
unknowns in (1) are xu , yu , zu , bu and therefore measurements
from at least four satellites are needed to estimate them.
1 https://confluence.qps.nl/qinsy/en/utc-to-gps-time-correction-\
32245263.html (accessed Jan. 16, 2018).
Furthermore, the nominal carrier frequency (fc =
1575.42 MHz) of the transmitted signals from the satellite
experiences a Doppler shift at the receiver due to the relative
motion between the receiver and the satellite. Hence, in
addition to pseudoranges, pseudorange rates are estimated
from the Doppler shift and are related to the relative satellite
velocity vn and the user velocity vu via
pn − pu
+ ḃu + ρ̇n
ρ̇n = (vn − vu )T
(2)
kpn − pu k
where ḃu is the clock drift.
In most cases, there are more than four visible satellites,
resulting in an overdetermined system of equations in (1)
and (2). Typical GPS receivers use nonlinear Weighted Least
Squares (WLS) to solve (1) and (2) and provide an estimate of
the location, velocity, clock bias, and clock drift of the receiver,
often referred to as PVT solution. To additionally exploit the
consecutive nature of the estimates, a dynamical model is used.
The conventional dynamical model for stationary receivers is
a random walk model [3, Chap. 9]
xu [l + 1]
xu [l]
yu [l]
yu [l + 1]
03×2
I3×3
zu [l + 1] =
zu [l] + w[l] (3)
1
∆t
02×3
bu [l]
bu [l + 1]
0 1
ḃu [l]
ḃu [l + 1]
where l is the time index, ∆t is the time resolution (typically
1 sec), and w is the noise. The dynamical system (3) and
measurement equations (1) and (2) are the basis for estimating
the user PVT using the Extended Kalman Filter (EKF).
Previous works have shown that simple attacks are able
to mislead the solutions of WLS or EKF. Stationary GPSbased time synchronization systems are currently equipped
with the position-hold mode option which can potentially
detect an attack if the GPS position differs from a known
receiver location by a maximum allowed error [40]. This can
be used as the first indication of attack. But, more advanced
spoofers, such as the ones developed in [30], have the ability to
manipulate the clock bias and drift estimates of the stationary
receiver without altering its position and velocity (the latter
should be zero). So, even with EKF on the conventional
dynamical models, perturbations on the pseudoranges in (1)
and pseudorange rates in (2) can be designed so that they
directly result in clock bias and drift perturbations without
altering the position and velocity of the receiver.
III. M ODELING T IME S YNCHRONIZATION ATTACKS
This section puts forth a general attack model that encompasses the attack types discussed in the literature. This model
is instrumental for designing the anti-spoofing technique discussed in the next section.
While TSAs have different physical mechanisms, they manifest themselves as attacks on pseudorange and pseudorange
rates. These attacks can be modeled as direct perturbations on
(1) and (2) as
ρs [l] = ρ[l] + sρ [l]
(4)
ρ̇s [l] = ρ̇[l] + sρ̇ [l]
5000
50000
0
0
-5000
-10000
-50000
-15000
0
50
100
150
200
250
0
300
50
100
150
200
250
300
350
400
250
300
350
400
(a)
(a)
0
500
-2000
-4000
0
-6000
-8000
0
50
100
150
200
250
300
-500
0
(b)
Time (s)
100
150
200
(b)
Time(s)
Fig. 1. Type I attack on (a) pseudorange and (b) pseudorange rate
versus local observation time.
where sρ and sρ̇ are the spoofing perturbations on pseudoranges and pseudorange rates, respectively; and ρs and ρ̇s are
respectively the spoofed pseudorange and pseudorange rates.
A typical spoofer follows practical considerations to introduce feasible attacks. These considerations can be formulated
as follows: 1) An attack is meaningful if it infringes the
maximum allowed error defined in the system specification.
For instance in PMU applications, the attack should exceed
the maximum allowable error tolerance specified by the IEEE
C37.118 Standard, which is 1% Total Variation Error (TVE),
equivalently expressed as 0.573◦ phase angle error, 26.65 µs
clock bias error, or 7989 m of distance-equivalent bias error
[39]. On the other hand, CDMA cellular networks require
timing accuracy of 10 µs.2 2) Due to the peculiarities of
the GPS receivers, the internal feedback loops may loose
lock on the spoofed signal if the spoofer’s signal properties
change rapidly [11], [29]. 3) The designed spoofers have the
ability to manipulate the clock drift (by manipulating the
Doppler frequency) and clock bias (by manipulating the code
delay) [30]. These perturbations can be applied separately,
however, the smartest attacks maintain the consistency of the
spoofer’s transmitted signal. This means that the pertubations
on pseudoranges, sρ , are the integration of perturbations over
pseudorange rates, sρ̇ , in (4).
Here, distinguishing between two attack procedures is advantageous as the literature includes very few research reports
on the technical intricacies of the spoofer constraints:
• Type I: The spoofer manipulates the authentic signal so
that the bias abruptly changes in a very short time [13],
[15], [28]. Fig. 1 illustrates this attack. The attack on the
pseudoranges suddenly appears at t = 30 s and perturbs
the pseudoranges by 8000 m. The equivalent attack on
pseudorange rates is a Dirac delta function.
• Type II: The spoofer gradually manipulates the authentic
signals and changes the clock bias through time [11], [17],
[19], [28], [29], [41]. This attack can be modeled by
sρ [l] = sρ [l − 1] + sρ̇ [l]∆t
(5)
sρ̇ [l] = sρ̇ [l − 1] + ṡρ̇ [l]∆t
2 http://www.endruntechnologies.com/cdma
2017).
50
(accessed
Sept.
11,
Fig. 2. Type II attack on (a) pseudorange and (b) pseudorange rate
versus local observation time.
where sρ̇ and ṡρ̇ are respectively called distance equivalent
velocity and distance equivalent acceleration of the attack.
To maintain the victim receiver lock on the spoofer’s signals,
the attack should not exceed a certain distance equivalent
velocity. Two such limiting numbers are reported in the literature, namely, |sρ̇ | ≤ 400 m/s in [29] and |sρ̇ | ≤ 1000 m/s
in [11]. The acceleration to reach the maximum spoofing
velocity is reported to be |ṡρ̇ | ≤ 5 m/s2 . The spoofer acceleration ṡρ̇ can be random, which makes Type II attack quite
general. The distance equivalent velocity can be converted
to the equivalent bias change rate (in s/s) through dividing
the velocity by the speed of light. Fig. 2 illustrates this
attack. The attack on the pseudoranges starts at t = 30 s and
perturbs the pseudoranges gradually with distance equivalent
velocity not exceeding 400 m/s and maximum distance
equivalent random acceleration satisfying |ṡρ̇ | ≤ 5 m/s2 .
The introduced attack models are quite general and can
mathematically capture most attacks on the victim receiver’s
measurements (pseudoranges and pseudorange rates) discussed
in Section I. In another words, Type I and Type II attacks
can be the result of data level spoofing, signal level spoofing,
record-and-replay attack, or a combination of the aformentioned attacks. The main difference between Type I and Type
II attacks is the spoofing speed. The speed of the attack
depends on the capabilities of the spoofer with respect to
manipulating various features of the GPS signals. Indeed,
attacks of different speeds have been reported in the literature
provided earlier in the present section. This work does not
deal with jamming, which disrupts the navigation functionality
completely whereas spoofing misleads it.
In the next section, a dynamical model for the clock bias
and drift is introduced which incorporates these attacks. Based
on this dynamical model, an optimization problem to estimate
these attacks along with the clock bias and drift is proposed.
IV. TSA-AWARE DYNAMICAL M ODEL , TSA R EJECTION
AND M ITIGATION
This section introduces a dynamical model to accommodate
the spoofing attack and a method to estimate the attack.
Afterwards, a procedure for approximately nullifing the effects
of the attack on the clock bias and drift is introduced.
A. Novel TSA-aware Dynamical Model
Modeling of the attack on pseudoranges and pseudorange
rates is motivated by the attack types discussed in the previous
section. These attacks do not alter the position or velocity,
but only the clock bias and clock drift. Our model does
not follow the conventional dynamical model for stationary
receivers which allows the position of the receiver to follow
a random walk model (3). Instead, the known position and
velocity of the victim receiver are exploited jointly. The state
vector contains the clock bias and clock drift, and the attacks
are explicitly modeled on these components, leading to the
following dynamical model:
cbu [l]
cbu [l + 1]
1 ∆t
csb [l]
cwb [l]
=
+
+
0 1
csḃ [l]
cwḃ [l] (6)
cḃu [l]
cḃu [l + 1]
{z
} | {z } | {z } | {z } | {z }
|
xl+1
xl
sl
wl
F
where sb and sḃ are the attacks on clock bias and clock
drift and wb and wḃ are colored Gaussian noise samples with
covariance function defined in [3, Chap. 9]. Here, both sides
are multiplied with c, which is a typically adopted convention.
The state noise covariance matrix, Ql , is particular to the
crystal oscillator of the device.
Similarly, define ρ[l] = [ρ1 [l], . . . , ρN [l]]T and ρ̇[l] =
[ρ̇1[l], .
. . , ρ̇N
[l]]T . The measurement
equation can be as
cbu [l]
ρ[l]
1N ×1 0N ×1
=
+
ρ̇[l]
0N ×1 1N ×1
cḃu [l]
| {z } |
{z
} | {z }
yl
xl
H
kp1 [l] − pu [l]k
cb1 [l]
ρ1 [l]
..
. .
. .
.
. .
cb [l]
kp
[l]
−
p
[l]k
N
u
N
+ ρN [l] .
(v1 [l] − vu [l])T . p1 [l]−pu [l] −
c
ḃ
[l]
[l]
1
kp1 [l]−pu [l]k
ρ̇1
..
.. ..
. .
.
pN [l]−pu [l]
T
ρ̇N [l]
cḃN [l]
(vN [l] − vu [l]) . kpN [l]−pu [l]k
|
{z
} | {z }
l
cl
(7)
Explicit modeling of pu and vu in cl indicates that the
dynamical model benefits from using the stationary victim
receiver’s known position and velocity (the latter is zero). The
measurement noise covariance matrix, Rl , is obtained through
the measurements in the receiver. Detailed explanation of how
to obtain the state and measurement covariance matrices, Ql
and Rl , is provided in Section V. It should be noted that
the state covariance Ql only depends on the victim receiver’s
clock behavior and does not change under spoofing. However,
the measurement covariance matrix, Rl , experiences contraction. The reason is that to ensure that the victim receiver
maintains lock to the fake signals, the spoofer typically applies
a power advantage over the real incoming GPS signals at the
victim receiver’s front end [17].
Comparing (5), (6) and (7), TSAs which do not alter the
position and velocity transfer the attack on pseudoranges and
pseudorange rates directly to clock bias and clock drift. Thus,
it holds that sρ̇ = csb and ṡρ̇ = csḃ .
B. Attack Detection
Let l = k, . . . , k + L − 1 define the time index within the
observation window of length L, where k is the running time
index. The solution to the dynamical model of (6) and (7) is
obtained through stacking L measurements and forming the
following optimization problem:
( k+L−1
1 X
kyl − Hxl − cl k2R−1
(x̂, ŝ) = argmin
l
2
x,s
l=k
) (8)
k+L−1
k+L−1
X
1 X
2
+
kxl+1 − Fxl − sl kQ−1 +
λkDsl k1
l
2
l=k
l=k
kxk2M
T
where
= x Mx, x̂ = [x̂1 , . . . , x̂L ]T are the estimated
states, ŝ = [ŝ1 , . . . , ŝL ]T are the estimated attacks, λ is a
regularization coefficient, and D is an L × 2L total variation
matrix which forms the variation of the signal over time as [42]
−1
0
D=
..
.
0
0
−1
..
.
...
1
0
..
.
0
0
1
..
.
−1
...
...
..
.
0
0
0
..
.
.
1
(9)
The first term is the weighted residuals in the measurement
equation, and the second term is the weighted residuals of the
state equation. The last regularization term promotes sparsity
over the total variation of the estimated attack.
In (8), the clock bias and clock drift are estimated jointly
with the attack. Here, the model of the two introduced attacks
should be considered. In Type I attack, a step attack is
applied over the pseudoranges. The solution to the clock bias
equivalently P
experiences
a step at the attack time. The term
k+L−1
kDsl k1 =
|s
b [l] − sb [l − 1]| + |sḃ [l] − sḃ [l − 1]|
l=k+1
indicates a rise as it tracks the significant differences between
two subsequent time instants. If the magnitude of the estimated
attack in two adjacent times does not change significantly, the
total variation of the attack is close to zero. Otherwise, in the
presence of an attack, the total variation of the attack includes
a spike at the attack time.
In Type II attack, the total variation of the attack does not
show significant changes as the attack magnitude is small at
the beginning and the sparsity is not evident initially. Although
we explained why it is meaningful to expect only few nonzero
entries in the total variation of the attacks in general, this is not
a necessary condition for capturing the attacks during initial
small total variation magnitudes. This means that explicit
modeling of the attacks in (6) and estimation through (8) does
not require the attacks to exhibit sparsity over the total variation. Furthermore, when the bias and bias drift are corrected
using the estimated attack (we will provide one mechanism
in Section IV-C), sparsity over the total variation appears for
subsequent time instants. In these time instants, the attack
appears to be more prominent, and in effect, the low dynamic
behavior of the attack is magnified, a fact that facilitates the
attack detection and will also be verified numerically. This
effect is a direct consequence of (8) and the correction scheme
discussed in the next section.
The optimization problem of (8) boils down to solving a
simple quadratic program. Specifically, the epigraph trick in
convex optimization can be used to transform the `1 -norm into
linear constraints [43]. The observation window L slides for
a lag time Tlag < L, which can be set to Tlag = 1 for realtime operation. The next section details the sliding window
operation of the algorithm, and elaborates on how to use the
solution of (8) in order to provide corrected bias and drift.
C. State Correction
In observation window of length L, the estimated attack ŝ
is used to compensate the impact of the attack on the clock
bias, clock drift, and measurements.
Revisiting the attack model in (6), the bias at time l + 1
depends on the clock bias and clock drift at time l. This dependence successively traces back to the initial time. Therefore,
any attack on the bias that occurred in the past is accumulated
through time. A similar observation is valid for the clock
drift. The clock bias at time l is therefore contaminated by
the cumulative effect of the attack on both the clock bias and
clock drift in the previous times. The correction method takes
into account the previously mentioned effect and modifies the
bias and drift by subtracting the cumulative outcome of the
clock bias and drift attacks as follows:
!
l−1
l
X
X
cb̃u [l]
cb̂u [l]
ŝḃ [l0 ]∆t 1
=
−
ŝb [l0 ] −
ρ̃[l]
ρ[l]
0
0
l =k
l =k
(10)
!
!
!
l
˜
X
ˆ
cḃu [l] = cḃu [l] −
0
ŝḃ [l ] 1
˜
ρ̇[l]
ρ̇[l]
l0 =k
˜
where b̃u and ḃu are respectively the corrected clock bias and
˜ are respectively the corrected pseudorange
clock drift, ρ̃ and ρ̇
and pseudorange rates, and 1 is an all one vector of length
N + 1. In (10), l = 1, . . . , L for the first observation window
(k = 1) and k + L − Tlag ≤ l ≤ k + L − 1 for the observation
windows afterwards. This ensures that the measurements and
states are not doubly corrected. The corrected measurements
are used for solving (8) for the next observation window.
The overall attack detection and modification procedure
is illustrated in Algorithm 1. After the receiver collects L
measurements, problem (8) is solved. Based on the estimated
attack, the clock bias and clock drift are cleaned using (10).
This process is repeated for a sliding window and only the
clock bias and drift of the time instants that have not been
cleaned previously are corrected. In another words, there is
no duplication of modification over the states.
The proposed technique boils down to solving a simple
quadratic program with only few variables and can thus be
performed in real time. For example, efficient implementations
of quadratic programming solvers are readily available in lowlevel programming languages. The implementation of this
technique in GPS receivers and electronic devices is thus
straightforward and does not necessitate creating new libraries.
V. N UMERICAL R ESULTS
We first describe the data collection device and then assess
three representative detection schemes in the literature that fail
to detect the TSA attacks. These attacks mislead the clock bias
and clock drift, while maintaining correct location and velocity
estimates. The performance of our detection and modification
technique over these attacks is illustrated afterwards.
Algorithm 1 : TSA Rejection and Mitigation (TSARM)
1: Set k = 1
2: while True do
3:
Batch yl ∀l = k, . . . , k + L − 1
4:
Construct H, cl , F ∀l = k, . . . , k + L − 1
5:
Compute Ql and Rl (details provided in Section V)
6:
Estimate x̂, ŝ via (8)
ˆ
7:
Assign cb̂u [l] = x̂[m], m = 2l − 1 and cḃu [l] =
x̂[m], m = 2l ∀l = k, . . . , k + L − 1
8:
Assign ŝb [l] = ŝ[m], m = 2l−1 and ŝḃ [l] = ŝ[m], m =
2l ∀l = k, . . . , k + L − 1
ˆ
9:
Modify b̂u [l], ḃu [l], ρ[l] and ρ̇[l] via (10) ∀l =
1, . . . , L for the first window and k + L − Tlag ≤ l ≤
k + L − 1 forthe
windows afterwards
ρ̃[l]
10:
Set yl = ˜
∀l = k, . . . , k + L − 1
ρ̇[l]
11:
Output tUTC
[l] = tR [l] − b̃u [l] − ∆tU T C ∀l =
R
k, . . . , k + L − 1 to the user for time stamping
12:
Slide the observation window by setting k = k + Tlag
13: end while
A. GPS Data Collection Device
A set of real GPS signals has been recorded with a Google
Nexus 9 Tablet at the University of Texas at San Antonio on
June, 1, 2017.3 The ground truth of the position is obtained
through taking the median of the WLS position estimates for
a stationary device. This device has been recently equipped
with a GPS chipset that provides raw GPS measurements. An
android application, called GNSS Logger, has been released
along with the post-processing MATLAB codes by the Google
Android location team [38].
Of interest here are the two classes of the
Android.location package. The GnssClock4 provides the
GPS receiver clock properties and the GnssMeasurement5
provides the measurements from the GPS signals
both with sub-nanosecond accuracies. To obtain the
pseudorange measurements, the transmission time is
subtracted from the time of reception. The function
getReceivedSvTimeNanos() provides the transmission
time of the signal which is with respect to the current GPS
week (Saturday-Sunday midnight). The signal reception
time is available using the function getTimeNanos(). To
translate the receiver’s time to the GPS time (and GPS
time of week), the package provides the difference between
the device clock time and GPS time through the function
getFullBiasNanos().
The receiver clock’s covariance matrix, Ql , is dependent
on the statistics of the device clock oscillator. The following
3 Our data is available at: https://github.com/Alikhalaj2006/UTSA
GPS DATA.git
4 https://developer.android.com/reference/android/location/
GnssClock.html (accessed Feb. 20, 2017).
5 https://developer.android.com/reference/android/location/
GnssMeasurement.html (accessed Feb. 20, 2017).
105
Bias (m)
1
0
EKF Normal
EKF Spoofed
Anti-Spoofing PF
-1
-2
0
50
100
150
200
250
300
350
400
Time(s)
Drift (m/s)
-60
EKF Normal
EKF Spoofed
-62
-64
-66
0
50
100
150
200
250
300
350
400
Time(s)
Fig. 3. The effect of Type II attack on the EKF and the anti-spoofing
particle filter [27] on (a) clock bias and (b) clock drift. The attack started
at t = 30 s. Panel (b) does not include the drift.
No attack
500
0
Consistent attack Inconsistent attack
-500
0
50
1000
100
150
200
100
150
200
150
200
(a)
0
Attack started
-1000
0
50
(b)
500
0
Attack started
-500
0
50
100
(c)
Time (s)
Fig. 4. Performance of hypothesis testing based on statistic (V-B) [28]
under Type I attack for different false alarm probabilities: (a) No attack,
(b) inconsistent attack, (c) consistent attack.
model is typically adopted:
3
Ql =
c2 σb2 ∆t + c2 σḃ2 ∆t3
2
c2 σḃ2 ∆t2
2
c2 σḃ2 ∆t2
c2 σḃ2 ∆t
!
(11)
where σb2 = h20 and σḃ2 = 2π 2 h−2 ; and we select h0 =
8 × 10−19 and h−2 = 2 × 10−20 [44, Chap. 9]. For calculating
the measurement covariance matrix, Rl , the uncertainty of the
pseuodrange and pseudorange rates are used. These uncertainties are available from the device together with the respective
measurements.5 In the experiments, we set λ = 5 × 10−10 ,
because the distance magnitudes are in tens of thousands of
meters. The estimated clock bias and drift through EKF in
normal operation is considered as the ground truth for the
subsequent analysis. In what follows, reported times are local.
B. Failure of Prior Work in Detecting Consistent Attacks
This section demonstrates that three relevant approaches
from Table I may fail to detect consistent attacks, that is,
attacks where sρ is the integral of sρ̇ in (4).
The performance of the EKF and the anti-spoofing particle
filter of [27] subject to a Type II attack is reported first. The
perturbations over GPS measurements are the same as in Fig. 2
and are used as input to the EKF and the particle filter. The
attack starts at t = 30 s. Fig. 3 depicts the effect of attack on
the clock bias and drift. The EKF on the dynamical model in
(6) and (7) blindly follows the attack after a short settling time.
The anti-spoofing particle filter only estimates the clock bias
and assumes the clock drift is known from WLS. Similarly to
the EKF, the particle filter is not able to detect the consistent
spoofing attack. The maximum difference between the receiver
estimated position obtained from the EKF on (3) under Type
II attack and under normal operation is xdiff = 67 m, ydiff =
112 m, and zdiff = 71 m. The position estimate has thus not
been considerably altered by the attack.
The third approach to be evaluated has been proposed
in [28] and monitors the statistics of the receiver clock,
as a typical spoofing detection technique [33]. Considering that off-the-shelf GPS receivers compute the bias
at regular ∆t intervals, a particular approach is to estimate the GPS time after k time epochs, and confirm that the time elapsed is indeed k∆t [28]. To this
hend, the following statistic can bePformulated: iD(k) =
k
ˆ
S
S
tGP
(k) − tGP
(1) − (k − 1)∆t − k0 =1 ḃ[k 0 ]∆t c. The
R
R
test statistic D is normally distributed with mean zero when
there is no attack and may have nonzero mean depending on
the attack, as will be demonstrated shortly. Its variance needs
to be estimated from a few samples under normal operation.
The detection procedure relies on statistical hypothesis testing.
For this, a false alarm probability, PF A , is defined. Each PF A
corresponds to a threshold γ to which D(k) is compared
against [45, Chap. 6]. If |D(k)| ≥ γ, the receiver is considered
to be under attack.
The result of this method is shown in Fig. 4 for different
false alarm probabilities. Fig. 4 (a) depicts D(k) when the
system is not under attack. The time signature lies between
the thresholds only for low false alarm probabilities. The
system can detect the attack in case of an inconsistent Type I
attack, in which sρ , is not the integration of perturbations over
pseudorange rates, sρ̇ , and only pseudoranges are attacked.
Fig. 4 (b) shows that the attack is detected right away.
However, for smart attacks, where the spoofer maintains the
consistency between the pseudorange and pseudorange rates,
Fig. 4 (c) illustrates that the signature D(k) fails to detect the
attack. This example shows that the statistical behavior of the
clock can remain untouched under smart spoofing attacks. In
addition, even if an attack is detected, the previous methods
cannot provide an estimate of the attack.
C. Spoofing Detection on Type I Attack
Fig. 5 shows the result of solving (8) using the GPS
measurements perturbed by the Type I attack of Fig. 1. The
spoofer has the capability to attack the signal in a very short
time so that the clock bias experiences a jump at t = 30 s. The
estimated total variation of bias attack renders a spike right at
the attack time. The modification procedure of (10) corrects
the clock bias using the estimated attack.
Bias Spoofed
Bias Normal
10
15
20
25
(a)
30
5000
0
-5000
-10000
35
40
45
Attack started
1
5
10
15
20
1
25
(b)
30
35
40
45
Attack started
-1
5
10
15
20
5000
25
(c)
30
35
40
45
50
Attack started
-5000
1
5
10
15
20
25
-10000
1
5
10
15
20
30
35
40
45
50
-200000
12 Normal
12 Attacked
-300000
5 Normal
5 Attacked
150
200
250
300
350
400
(a)
450
6 Normal
6 Attacked
Attack started
2 Normal
2 Attacked
12 Normal
12 Attacked
5 Normal
-500
5 Attacked
-1000
0
50
100
50
40
45
50
40
45
50
40
45
50
-200
1
5
10
15
20
25
30
35
(b)
1
Attack started
0
-1
1
5
10
15
20
25
30
35
5000
Attack started
Bias Modified
Bias Normal
0
-5000
5
10
15
20
25
30
35
Fig. 7. The result of attack detection and modification over Type II attack
for t = 1 s through t = 50 s. The attack started at t = 30 s. From
top to bottom: (a) Normal clock bias (blue) and spoofed bias (red), (b)
estimated bias attack ŝb , (c) total variation of the estimated bias attack,
and (d) true bias (blue) and modified bias (magenta).
150
200
250
300
350
400
(b)
Time (s)
Fig. 6. Comparison of (a) normal pseudorange change (ρ(k) − ρ(1))
and spoofed pseudoranges change (ρs (k) − ρs (1)), and (b) normal
pseudorange rates (ρ̇) and spoofed pseudorange rates (ρ˙s ) under Type
II attack for some of the visible satellites. The attack started at t = 30 s.
Bias (m)
2 Normal
2 Attacked
0
45
Attack started
1
MBias (m) Drift TV (m/s) Bias TV(m)
0
-100000
100
40
6 Normal
6 Attacked
Attack started
50
35
(d)
Time (s)
Fig. 5. The result of attack detection and modification over a Type I
attack that started at t = 30 s. From top to bottom: (a) Normal clock bias
(blue) and spoofed bias (red), (b) total variation of the estimated bias
attack ŝb , (c) total variation of the estimated drift attack ŝḃ , and (d) true
bias (blue) and modified bias (magenta).
0
30
0
(d)
Time (s)
100000
25
(a)
200
(c)
Bias Modified
Bias Normal
0
Attack started
Bias Spoofed
Bias Normal
0
50
0
1
10000
50
Bias TV(m)
5
Drift TV (m/s)
-10000
1
MBias (m) Drift TV (m/s) Bias TV (m)
Bias (m)
Attack started
0
MBias (m)
Bias (m)
10000
10000
-10000
11
Attack started
Bias Spoofed
Bias Normal
0
15
20
25
30
40
45
50
55
60
40
45
50
55
60
40
45
50
55
60
Attack started
0
-2000
11
35
(a)
2000
15
20
25
30
2
35
(b)
Attack started
0
-2
11
15
20
25
30
5000
35
(c)
Attack started
Bias Modified
Bias Normal
0
-5000
11
15
20
25
30
35
40
45
50
55
60
(d)
Time (s)
D. Spoofing Detection on Type II Attack
Fig. 8. The result of attack detection and modification over Type II
attack for t = 11 s through t = 60 s. From top to bottom: (a) Normal
clock bias (blue) and spoofed bias (red), (b) estimated bias attack ŝb , (c)
total variation of the estimated bias attack, and (d) true bias (blue) and
modified bias (magenta).
The impact of Type II attack on the pseudoranges and
pseuodrange rates is shown in Fig. 6. Specifically, Fig. 6
(a) illustrates the normal and spoofed pseudorange changes
with respect to their initial value at t = 0 s for some of the
visible satellites in the receiver’s view. Fig. 6 (b) depicts the
corresponding pseudorange rates. The tag at the end of each
line indicates the satellite ID and whether the pseudorange
(or pseudorange rate) corresponds to normal operation or
operation under attack. The spoofed pseudoranges diverge
quadratically starting at t = 30 s following the Type II attack.
For the Type II attack, Algorithm 1 is implemented for an
sliding window with L = 50 s with Tlag = 10 s. Fig. 7
shows the attacked clock bias starting at t = 30 s. Since
the attack magnitude is small at initial times of the spoofing,
neither the estimated attack ŝb nor the total variation do not
show significant values. The procedure of sliding window is
to correct the current clock bias and clock drift for all the
times that have not been modified previously. Hence, at the
first run the estimates of the whole window are modified.
Fig. 8 shows the estimated attack and its corresponding total
variation after one Tlag . As is obvious from the figure, the
modification of the previous clock biases transforms the low
dynamic behavior of the spoofer to a large jump at t = 50 s
which facilitates the detection of attack through the total
variation component in (8). The clock bias and drift have been
modified for the previous time instants and need to be cleaned
only for t = 50 s − 60 s.
1200
In the present work, the set of GPS signals are obtained from
an actual GPS receiver in a real environment, but the attacks
are simulated based on the characteristics of real spoofers
reported in the literature. Experimentation on the behavior
of the proposed detection and mitigation approach under real
spoofing scenarios is the subject of future research.
RMSE (m)
1000
800
600
R EFERENCES
400
200
10
20
30
40
50
60
70
L
Fig. 9. The RMSE of TSARM for various values of L and Tlag .
E. Analysis of the Results
Let K be the total length of the observation time (in this
experiment, K = 386). The q
root mean square error (RMSE)
PK−1
2
is introduced: RMSE = Kc
k=0 (b̃u [k] − b̌u [k]) , which
shows the average error between the clock bias that is output
from the spoofing detection technique, b̃u , and the estimated
clock bias from EKF under normal operation, b̌u , which is
considered as the ground truth. Comparing the results of the
estimated spoofed bias from the EKF and the normal bias
shows that RMSEEKF = 3882 m. This error for the antispoofing particle filter is RMSEPF = 3785 m. Having applied
TSARM, the clock bias has been modified with a maximum
error of RMSETSARM = 258 m. Fig. 9 illustrates the RMSE
of TSARM for a range of values for the window size, L,
and the lag time, Tlag . When the observation window is
smaller, fewer measurements are used for state estimation.
On the other hand, when L exceeds 40 s, the number of
states to be estimated grows although more measurements
are employed for estimation. The numerical results illustrate
that (6) models the clock bias and drift attacks effectively,
which are subsequently estimated using (8) and corrected
through (10).
VI. C ONCLUDING R EMARKS AND F UTURE W ORK
This work discussed the research issue of time synchronization attacks on devices that rely on GPS for time tagging their measurements. Two principal types of attacks are
discussed and a dynamical model that specifically models
these attacks is introduced. The attack detection technique
solves an optimization problem to estimate the attacks on
the clock bias and clock drift. The spoofer manipulated clock
bias and drift are corrected using the estimated attacks. The
proposed method detects the behavior of spoofer even if the
measurements integrity is preserved. The numerical results
demonstrate that the attack can be largely rejected, and the
bias can be estimated within 0.86 µs of its true value, which
lies within the standardized accuracy in PMU and CDMA
applications. The proposed method can be implemented for
real-time operation.
[1] “Energy.gov, Office of Electricity Delivery & Energy Reliability,” http:
//energy.gov/oe/services/technology-development/smart-grid, accessed:
2016-08-08.
[2] “Gps.gov,
Official U.S. government information about
the Global Positioning System (GPS) and related topics,”
http://www.gps.gov/applications/timing/.
[3] B. W. Parkinson, J. J. Spilker, P. Axelrad, and P. Enge, Global Positioning System: Theory and Applications. American Institute of Aeronautics
and Astronautics, 1996, vol. I.
[4] ——, Global Positioning System: Theory and Applications. American
Institute of Aeronautics and Astronautics, 1996, vol. II.
[5] P. Misra and P. Enge, Global Positioning System: Signals, Measurements,
and Performance, 2nd ed. Ganga-Jamuna Press, Lincoln MA, 2006.
[6] I. Yaesh and U. Shaked, “Neuro-adaptive hinf inity estimation and its
application to improved tracking in GPS receivers,” IEEE Trans. Ind.
Electron., vol. 56, no. 3, pp. 642–647, Mar. 2009.
[7] X. Li and Q. Xu, “A reliable fusion positioning strategy for land vehicles
in GPS-denied environments based on low-cost sensors,” IEEE Trans.
Ind. Electron., vol. 64, pp. 3205–3215, Apr. 2017.
[8] “Electric sector failure scenarios and impact analyses - version 3.0,”
Electric Power Research Institute, Tech. Rep., Dec. 2015.
[9] D. Schmidt, K. Radke, S. Camtepe, E. Foo, and M. Ren, “A survey
and analysis of the GNSS spoofing threat and countermeasures,” ACM
Computer Survey, vol. 48, no. 4, pp. 64:1–64:31, May 2016.
[10] B. Moussa, M. Debbabi, and C. Assi, “Security assessment of time
synchronization mechanisms for the smart grid,” IEEE Commun. Surveys
Tut., vol. 18, no. 3, pp. 1952–1973, thirdquarter 2016.
[11] D. P. Shepard, T. E. Humphreys, and A. A. Fansler, “Evaluation of the
vulnerability of phasor measurement units to GPS spoofing attacks,” Int.
J. Crit. Infrastruct. Protect., vol. 5, pp. 146–153, Dec. 2012.
[12] Z. Zhang, S. Gong, A. D. Dimitrovski, and H. Li, “Time synchronization
attack in smart grid: Impact and analysis,” IEEE Trans. Smart Grid,
vol. 4, no. 1, pp. 87–98, Mar. 2013.
[13] X. Jiang, J. Zhang, B. J. Harding, J. J. Makela, and A. D. DominguezGarcı́a, “Spoofing GPS receiver clock offset of phasor measurement
units,” IEEE Trans. Power Systems, vol. 28, pp. 3253–3262, Aug. 2013.
[14] P. Risbud, N. Gatsis, and A. Taha, “Assessing power system state
estimation accuracy with GPS-spoofed PMU measurements,” in IEEE
Trans. Smart Grid, to be published.
[15] T. Nighswander, B. Ledvina, J. Diamond, R. Brumley, and D. Brumley,
“GPS software attacks,” in Proc. of the ACM Conf. on Comput. and
Commun. Security, Oct. 2012, pp. 450–461.
[16] N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Čapkun, “On
the requirements for successful GPS spoofing attacks,” in Proc. of the
18th ACM Conf. on Comput. and Commun. Security, Oct. 2011, pp.
75–86.
[17] K. D. Wesson, J. N. Gross, T. E. Humphreys, and B. L. Evans, “GNSS
signal authentication via power and distortion monitoring,” IEEE Trans.
on Aeros. and Elect. Systems, vol. PP, no. 99, pp. 1–1, 2017.
[18] M. L. Psiaki and T. E. Humphreys, “GNSS spoofing and detection,”
Proc. of the IEEE, vol. 104, no. 6, pp. 1258–1270, June 2016.
[19] P. Papadimitratos and A. Jovanovic, “GNSS-based Positioning: Attacks
and Countermeasures,” in Proc. of the IEEE Military Commun. Conf.,
San Diego, CA, USA, Nov. 2008, pp. 1–7.
[20] Q. Zeng, H. Li, and L. Qian, “GPS spoofing attack on time synchronization in wireless networks and detection scheme design,” in IEEE
Military Communications Conference, Oct. 2012, pp. 1–5.
[21] Y. Fan, Z. Zhang, M. Trinkle, A. D. Dimitrovski, J. B. Song, and
H. Li, “A cross-layer defense mechanism against GPS spoofing attacks
on PMUs in smart grids,” IEEE Trans. Smart Grid, vol. 6, no. 6, pp.
2659–2668, Nov. 2015.
[22] A. Ranganathan, H. Ólafsdóttir, and S. Capkun, “SPREE: A spoofing
resistant GPS receiver,” in Proc. of the 22Nd Annual Int. Conf. on Mobile
Comput. and Netw., 2016, pp. 348–360.
[23] D. Chou, L. Heng, and G. X. Gao, “Robust GPS-based timing for phasor
measurement units: A position-information-aided approach,” in Proc.
of the 27th Int. Tech. Meeting of The Sat. Division of the Institute of
Navigation, Sept. 2014, pp. 1261 – 1269.
[24] Y. Ng and G. X. Gao, “Advanced multi-receiver position-informationaided vector tracking for robust GPS time transfer to PMUs,” in Proc.
of the Institute of Navigation GNSS+ Conf. (ION GNSS+ 2015), Sept.
2015, pp. 3443 – 3448.
[25] D.-Y. Yu, A. Ranganathan, T. Locher, S. Čapkun, and D. Basin, “Short
paper: Detection of GPS spoofing attacks in power grids,” in Proc. of
the ACM Conf. on Security and Privacy in Wireless Mobile Netw., 2014,
pp. 99–104.
[26] K. Jansen, N. O. Tippenhauer, and C. Pöpper, “Multi-receiver GPS
spoofing detection: Error models and realization,” in Proc. of the 32nd
Annual Conf. on Comput. Security Appl., 2016, pp. 237–250.
[27] S. Han, D. Luo, W. Meng, and C. Li, “A novel anti-spoofing method
based on particle filter for GNSS,” in Proc. of the IEEE Int. Conf. on
Commun. (ICC), June 2014, pp. 5413–5418.
[28] F. Zhu, A. Youssef, and W. Hamouda, “Detection techniques for datalevel spoofing in GPS-based phasor measurement units,” in Proc. of the
2016 Int. Conf. on Selected Topics in Mobile Wireless Netw. (MoWNeT),
Apr. 2016, pp. 1–8.
[29] D. P. Shepard and T. E. Humphreys, “Characterization of receiver
response to a spoofing attacks,” in Proc. of the 24th Int. Tech. Meeting
of The Sat. Division of the Institute of Navigation (ION GNSS 2011),
Portland, OR, Sept. 2011, pp. 2608 – 2618.
[30] T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. O’Hanlon, and
P. M. Kintner, “Assessing the spoofing threat: Development of a portable
GPS civilian spoofer,” in Proc. of the 21st Int. Tech. Meeting of the Sat.
Division of The Institute of Navigation (ION GNSS 2008), Savannah,
GA, Sept. 2008, pp. 2314–2325.
[31] B. Motella, M. Pini, M. Fantino, P. Mulassano, M. Nicola, J. FortunyGuasch, M. Wildemeersch, and D. Symeonidis, “Performance assessment of low cost GPS receivers under civilian spoofing attacks,” in 5th
ESA Workshop on Sat. Nav. Tech. and European Workshop on GNSS
Signals and Signal Proc., Dec. 2010, pp. 1–8.
[32] P. Teunissen, “Quality control in integrated navigation systems,” IEEE
Aeros. and Elect. Sys. Magazine, vol. 5, pp. 35 – 41, July 1990.
[33] L. Heng, J. J. Makela, A. D. Dominguez-Garcı́a, R. B. Bobba, W. H.
Sanders, and G. X. Gao, “Reliable GPS-based timing for power systems:
A multi-layered multi-receiver architecture,” in Power and Energy Conf.
at Illinois (PECI), Feb. 2014, pp. 1–7.
[34] L. Heng, D. B. Work, and G. X. Gao, “GPS signal authentication from
cooperative peers,” IEEE Trans. on Intell. Transportation Syst., vol. 16,
no. 4, pp. 1794–1805, Aug. 2015.
[35] D. Radin, P. F. Swaszek, K. C. Seals, and R. J. Hartnett, “GNSS
spoof detection based on pseudoranges from multiple receivers,” in
Proceedings of the 2015 International Technical Meeting of The Institute
of Navigation, Jan. 2015, pp. 657–671.
[36] C. Masreliez and R. Martin, “Robust Bayesian estimation for the linear
model and robustifying the Kalman filter,” IEEE Trans. Autom. Control,
vol. 22, no. 3, pp. 361–371, June 1977.
[37] S. Farahmand, G. B. Giannakis, and D. Angelosante, “Doubly robust
smoothing of dynamical processes via outlier sparsity constraints,” IEEE
Trans. Signal Process., vol. 59, pp. 4529–4543, Oct. 2011.
[38] “Android GNSS,” https://developer.android.com/guide/topics/sensors/
gnss.html, accessed: 2017-02-20.
[39] “IEEE standard for synchrophasor measurements for power systems,”
IEEE Std C37.118.1-2011 (Revision of IEEE Std C37.118-2005), pp.
1–61, Dec. 2011.
[40] “Model 1088b GPS satellite clock (40 ns),” http://www.arbiter.com/
catalog/product/model-1088b-gps-satellite-precision-time-clock-40ns.
php, accessed: 2017-02-20.
[41] Z. Zhang, S. Gong, A. D. Dimitrovski, and H. Li, “Time synchronization
attack in smart grid: Impact and analysis,” IEEE Trans. on Smart Grid,
vol. 4, no. 1, pp. 87–98, March 2013.
[42] F. I. Karahanoglu, . Bayram, and D. V. D. Ville, “A signal processing approach to generalized 1-D total variation,” IEEE Trans. Signal Process.,
vol. 59, no. 11, pp. 5265–5274, Nov. 2011.
[43] S. Boyd and L. Vandenberghe, Convex Optimization.
Cambridge
University Press, 2004.
[44] R. G. Brown and P. Y. C. Hwang, Introduction to random signals and
applied Kalman filtering: with MATLAB exercises and solutions; 3rd ed.
New York, NY: Wiley, 1997.
[45] S. M. Kay, Fundamentals of Statistical Signal Processing, Volume II:
Detection Theory. Prentice-Hall Inc, 1993.
Ali Khalajmehrabadi (S’16) received the B.Sc.
degree from the Babol Noshirvani University of
Technology, Iran, in 2010, and the M.Sc. degree
from University Technology Malaysia, Malaysia,
in 2012, where he was awarded the Best Graduate Student Award. He is currently pursuing the
Ph.D. degree with the Department of Electrical
and Computer Engineering, University of Texas
at San Antonio. His research interests include indoor localization and navigation systems, collaborative localization, and global navigation satellite system. He is a Student Member of the Institute of Navigation and
the IEEE.
Nikolaos Gatsis (S’04-M’05) received the
diploma (with Hons.) degree in electrical and
computer engineering from the University of Patras, Greece, in 2005, and the M.Sc. degree in
electrical engineering and the Ph.D. degree in
electrical engineering with minor in mathematics
from the University of Minnesota, in 2010 and
2012, respectively. He is currently an Assistant
Professor with the Department of Electrical and
Computer Engineering, University of Texas at
San Antonio. His research interests lie in the
areas of smart power grids, communication networks, and cyberphysical
systems, with an emphasis on optimal resource management and statistical signal processing. He has co-organized symposia in the area of
smart grids in IEEE GlobalSIP 2015 and IEEE GlobalSIP 2016. He has
also served as a co-guest editor for a special issue of the IEEE Journal
on Selected Topics in Signal Processing on critical infrastructures.
David Akopian (M’02-SM’04) received the
Ph.D. degree in electrical engineering in 1997.
He is a Professor with the University of Texas
at San Antonio. He was a Senior Research Engineer and a Specialist with Nokia Corporation
from 1999 to 2003. From 1993 to 1999, he
was a Researcher and an Instructor with the
Tampere University of Technology, Finland. He
has authored and coauthored over 30 patents
and 140 publications. His current research interests include digital signal processing algorithms
for communication and navigation receivers, positioning, dedicated
hardware architectures and platforms for software defined radio and
communication technologies for healthcare applications. He served in
organizing and program committees of many IEEE conferences and
co-chairs annual SPIE Multimedia on Mobile Devices conferences. His
research has been supported by the National Science Foundation,
National Institutes of Health, USAF, U.S. Navy, and Texas foundations.
Ahmad F. Taha (S’07–M’15) received the B.E.
and Ph.D. degrees in Electrical and Computer
Engineering from the American University of
Beirut, Lebanon in 2011 and Purdue University,
West Lafayette, Indiana in 2015. In Summer
2010, Summer 2014, and Spring 2015 he was
a visiting scholar at MIT, University of Toronto,
and Argonne National Laboratory. Currently he
is an assistant professor with the Department
of Electrical and Computer Engineering at The
University of Texas, San Antonio. Dr. Taha is interested in understanding how complex cyber-physical systems operate,
behave, and misbehave. His research focus includes optimization and
control of power system, observer design and dynamic state estimation,
and cyber-security.
| 3cs.SY
|
1
Information capacity of direct detection optical
transmission systems
arXiv:1711.01888v1 [cs.IT] 6 Nov 2017
Antonio Mecozzi, Fellow, OSA, Fellow, IEEE and Mark Shtaif, Fellow, OSA, Fellow, IEEE
Abstract—We show that the spectral efficiency of a direct
detection transmission system is at most 1 bit/s/Hz less than the
spectral efficiency of a system employing coherent detection with
the same modulation format. Correspondingly, the capacity per
complex degree of freedom in systems using direct detection is
lower by at most 1 bit.
(a)
Tx
Noise
ݐ ܧ
ܧ ݐ
propagation
channel
ݐ ܧ
+
Rx
Index Terms—Channel capacity, Optical detection, Modulation.
I. I NTRODUCTION
R
ECENTLY, the field of optical communications is witnessing a revival of interest in direct detection receivers,
which are often viewed as a promising low-cost alternative to
their expensive coherent counterparts [1]–[12]. This process
stimulates an interesting fundamental question to whose answer the present paper is dedicated: What is the difference
between the information capacity of a direct detection system
and that of a system using coherent detection?
In order to answer this question we consider the channel
schematic illustrated in Fig. 1a, which consists of a transmitter
that is capable of generating any desirable complex waveform
whose spectrum is contained within a bandwidth B, a noise
source of arbitrary spectrum and statistics, a propagation
channel, and a receiver. Although the linearity of the channel
and the additivity of the noise are immaterial to our analysis,
we will assume these properties in the beginning, while
postponing the generalization of our discussion to Sec. IV. The
direct detection receiver in our definition is one that recovers
the communicated data from the intensity (i.e. absolute square
value) of the received electric field, while using a single photodiode. As illustrated in Fig. 1b, it consists of a square optical
band-pass filter of width B that rejects out of band noise,
a photo-diode whose output current is proportional to the
received optical intensity1 , and a processing unit that recovers
the information. The benchmark to which we compare the
direct detection receiver, is the coherent receiver, in whose case
the complex-valued received optical field is reconstructed.
Intuitively, it is tempting to conclude that since a direct
detection receiver ignores one of the two degrees of freedom
that are necessary for uniquely characterizing the electric field,
its capacity should be close to half of the capacity of a coherent
system. Surprisingly, this notion turns out to be incorrect, and
as we show in this paper, the capacity per complex degree of
freedom in systems using direct detection is lower by not more
A. Mecozzi is with the Department of Physical and Chemical Sciences,
University of L’Aquila, L’Aquila 67100, Italy. M. Shtaif is with the Department of Physical Electronics, Tel Aviv University, Tel Aviv 69978, Israel.
1 For simplicity, in what follows we will assume that the proportionality
coefficient is 1.
(b)
ݐ ܧ
OBPF
ܤ
PD
Processing and
Data Recovery
Fig. 1. (a) The setup considered in this paper. It consists of an I/Q transmitter
(Tx) that can generate any complex waveform whose spectrum is contained
in a bandwidth B, a stationary noise source of arbitrary spectrum and
distribution, a propagation channel, and a receiver (Rx). (b) The schematic
of a direct detection receiver. The incoming optical field is filtered with an
optical band-pass filter (OBPF) to reject out of band noise and square law
detected (without any manipulation of the field) by a single photodiode (PD).
The photodiode and subsequent electronics are assumed to have bandwidth of
at least 2B so as to accommodate the bandwidth of the intensity waveform.
than 1 bit than that of fully coherent systems. Correspondingly,
the loss in terms of spectral efficiency is limited to be no
greater than 1 bit/s/Hz.
Throughout the paper, in order to simplify the notation, we
will assume that the transmitted field is scalar. This assumption
does not affect the generality of the results, as the transmission
of orthogonal polarization components through linear channels
is independent.
II. R ELATION TO PRIOR WORK
Our result, stating that a direct detection channel is characterized by almost the same capacity as a coherent channel,
requires some clarification in view of its being in an apparent
contradiction to prior work, where the capacity of a seemingly
similar channel was found to be lower by approximately a
factor of two. This work consists of Ref. [13] published by
the authors of the current manuscript, as well as a number of
more recent works, the most relevant of which are contained
in Refs. [14]–[17]. In order to avoid confusion, we will adopt
the terminology of [16] and refer to the channels studied
in those papers as various flavors of the intensity channel,
whereas the term direct detection channel will only be used
in reference to the channel that we study here. The reason for
this apparent contradiction boils down to the fact that all the
versions of the intensity channel assume that the information
2
is encoded at a given rate B directly onto the intensity of
the transmitted optical signal and then it is recovered by
sampling the received signal’s intensity at exactly the same
rate. In all cases, the channel is assumed to be memoryless and
the optical bandwidth (and hence also the spectral efficiency)
do not play any role. The studies in [14]–[17] can be given
practical justification when considering very short-reach, or
very old optical systems that used a low-coherence optical
source (such as a light-emitting diode). Indeed, with such
sources the optical phase is far too noisy to be used for
transmitting information and the source linewidth is so much
greater than the modulation bandwidth that relating to spectral
efficiency in the modern sense is not meaningful.
In contrast to the above, the direct detection channel is
inspired by modern fiber-optic communications systems, the
vast majority of which relies on a highly coherent laser
source – one whose linewidth is substantially smaller than
the bandwidth of the modulation. This is the reason for our
assumption that the transmitter in the direct detection channel
can encode information into any complex waveform with the
only constraint being that its spectrum is contained in some
bandwidth B. In addition, since the process of photo-detection
involves frequency doubling, the spectrum of the measured
intensity is contained in a two-sided bandwidth of 2B, and
hence sampling at the rate of 2B is imperative in order to
extract the information present in the photo-detection current.
In order to further clarify the difference between the direct
detection channel and the intensity channel, we denote the
complex-valued field received after optical filtering, by E(t).
Since the spectrum of E(t) is contained in a bandwidth B, it
can be rigorously expressed as
E(t) =
∞
X
Ek sinc [π(Bt − k)] ,
(1)
k=−∞
where sinc(x) = sin(x)/x, and where Ek = E(t = k/B) are
the complex-field samples carrying the transmitted information. The detected photo-current is proportional to I = |E(t)|2 .
If this photocurrent were to be sampled at a rate of B, as in
[13]–[17], the samples at t = n/B would have been equal to
In = |En |2 , and the phase information would have been lost.
In this case the drop in the amount of extracted information
(and hence the capacity) would have been roughly a factor of
2, similarly to the results obtained in [13]–[17]. Yet, in the
direct detection channel the sampling of the photo-current is
done at a rate of 2B, so that the middle-point samples that
are taken at t = (n + 0.5)/B are also obtained. These middle
samples are given by
∞
X
1
In+1/2 =
sinc π n − m +
2
k,m=−∞
1
∗
×sinc π n − k +
Em
Ek ,
(2)
2
and they are clearly affected by the phase differences between
the various complex-field samples. In fact, as our final result
indicates, knowledge of all intensity samples (In and In+1/2
for all n) allows one to collect almost all of the information
contained in the complex optical field.
We note that the idea of increasing the information rate by
sampling the received analog signal at a rate that is higher than
B, has been considered previously [18]. This is a natural idea
in cases where the receiver contains a nonlinear element that
expands the analog bandwidth of the received waveform so
that sampling at B is no longer sufficient in order to collect
all the information from the analog waveform. In our case
the nonlinearity is that of square-law detection and it expands
the analog bandwidth by exactly a factor of 2. Hence, unlike
the case studied in [18], where the doubling of the sampling
rate produced only minuscule benefits, here sampling at 2B
is sufficient in order to extract all the information contained
in the analog intensity waveform, and there is no benefit in
increasing the sampling rate farther.
Finally, it is instructive to relate to the most widespread
example, where the additive noise of Fig. 1a is white Gaussian.
In this case, our theory implies that the capacity of the
direct detection channel is within 1 bit of log(1 + SNR)
[19], where the SNR is the ratio between the average power
of the information carrying signal and the variance of the
filtered noise (summed over both quadratures). Conversely, as
demonstrated in [13] and [17], the capacity of the intensity
channel (i.e. one that samples the received intensity at the rate
B) in the limit of high SNR, is 0.5 log(SNR/2) — roughly
half of the direct detection channel’s capacity.2
III. T HE INFORMATION CAPACITY OF A DIRECT
DETECTION RECEIVER
A. The definition of distinguishable waveforms
Usually, in engineering practice, two waveforms E1 (t) and
E2 (t) are said to be distinguishable when the energy of the
difference between them is greater than 0,
Z ∞
|E1 (t) − E2 (t)|2 dt > 0.
(3)
−∞
In the context of optical communications this definition is too
restrictive, because in all cases of interest, optical receivers (including coherent receivers) are unable to distinguish between
waveforms that differ only by a constant (i.e. time independent) phase.3 Owing to this reality, we define waveforms to be
distinguishable only when they can be told apart by an ideal
coherent receiver. Formally, this means that E1 (t) and E2 (t)
are distinguishable only when they remain distinguishable
according to Eq. (3), even if one of them is rotated in the
complex plane by some arbitrary constant phase, i.e.
Z ∞
|E1 (t) − eiθ E2 (t)|2 dt > 0.
(4)
−∞
2 In Ref. [13], the capacity in the high SNR limit is written as
0.5 log(SNR/4), but the difference is only in the SNR definition, which
relates to the noise variance in one quadrature.
3 In order to overcome this limitation, the transmitter and reciever would
have to share an exact time-reference (on the scale of a fraction of a single
optical cycle!). In principle, this can be achieved by means of an atomic clock.
However, the costs of such a solution on the one hand, and the minuscule
potential benefit in terms of information rate, on the other hand, ensure that
this solution isn’t deployed.
3
where Ω =
2πB
M .
B
Fk =
M
Z
The Fourier coefficients are given by
M/B
E(t)e
ikΩt
0
M −1
2πkn
1 X
dt =
En ei M ,
M n=0
(6)
with En = E(t = n/B), and where the second equality in
(6) takes advantage of the relation between the Fourier series
coefficients and the discrete Fourier transform in band-limited
periodic signals. We now assign
A(Z) =
M
−1
X
Fk Z k
(7)
k=0
−1
to be the Z-transform of the Fourier
coefficients {Fk }M
k=0 .
Clearly, E(t) = A exp(−iΩt) , and hence special attention
needs to be paid to the cases where the value of Z is on
the unit circle. When FM −1 6= 0, A(Z) is an M − 1 degree
polynomial which admits M −1 zeros, and it can be expressed
as
A(Z) = C
M
−1
Y
F0
.
(Z − Zk ), with C = QM −1
k=0 (−Zk )
k=0
(8)
Consider now the functions
Uk (Z) =
Fig. 2. An example of 8 different waveforms in the case of M = 4 (so that
2M −1 = 8), all band-limited to [0, B] (with B = 1/T ) and all having the
intensity shown in (a). In (b) the phases φ(t) of these eight waveforms are
plotted. As explained in the text, this is the largest number of distinguishable
waveforms that are band-limited to [0, B] and have the same intensity. We
stress that waveforms that only differ by a constant (time-independent) phase
are not counted as distinguishable in our definition.
for all values of θ. Notice that distinguishability by means of
a coherent receiver (4) doesn’t necessarily imply distinguishability by means of a direct detection receiver. The gap between
the two is the subject of the subsection that follows.
B. The multiplicity of complex waveforms having the same
intensity
We consider a complex signal E(t), whose spectrum is
contained within a bandwidth B and which is periodic in time,
with a period M/B, with M being an integer. The assumption
of periodicity is not a limiting factor in our arguments, as once
the main results are established, the non-periodic case can be
addressed by assuming the limit of M → ∞. A direct detection receiver can only exploit the intensity I(t) = |E0 (t)|2 in
order to extract the transmitted data. Our first claim, which
is key to proving the main arguments of this paper, is that
there are at most 2M −1 distinguishable legitimate waveforms
Ej (t) (with j = 0, 1, . . . , 2M −1 ), whose intensities |Ej (t)|2
are equal to I(t). An illustration of this idea in the case of
M = 4 can be found in Figure 2.
In order to formally prove our statements, we express E(t)
as a Fourier series having at most M non-zero elements,
E(t) =
M
−1
X
k=0
Fk e−ikΩt ,
(5)
ZZk∗ − 1
,
Z − Zk
(9)
one for each zero of A(Z). Since |Uk exp(iθ) | = 1, these
functions have the property that the action of Uk exp(−iΩt)
on E(t) produces a pure phase modulation and hence they
can be considered as the dual of all-pass filters where time
and frequency are interchanged. When any combination of
these functions multiplies A(Z), it does not change the degree
of the resulting polynomial, as the corresponding zeros of
A(Z) are simply reflected with respect to the unit circle, as
illustrated below. For example, if we multiply A(Z) by the
product of U1 (Z), U3 (Z) and U7 (Z), the zeros Z1 , Z3 , and
Z7 are replaced by 1/Z1∗ , 1/Z3∗ , and 1/Z7∗ , respectively. Yet,
the modulus of the product A(Z)U1 (Z)U3 (Z)U7 (Z) remains
identical to the modulus of A(Z) when Z is on the unit circle
(and in particular, when Z = exp(−iΩt)). Since there is a
total of M − 1 functions Uk (Z), there are 2M −1 functions
Aj (Z) that have the same modulus on the unit circle. Thus, we
end up with 2M −1 time waveforms Ej (t) = Aj exp(−iΩt)
whose intensity is I(t), i.e. identical to the intensity of E(t).
−1
Note that {Uk (Z)}M
k=0 are the only functions applying a pure
phase modulation to E(t) that also preserve the number of
elements in the Z-transform (the degree of the polynomial)
and consequently the spectral width of the resulting time
M −1
waveforms. For this reason {Ej (t)}2j=1 are the only temporal
waveforms whose intensity is I(t), and whose spectrum is
fully contained within the bandwidth B. A further discussion
M −1
of the uniqueness of the waveforms {Ej (t)}2j=1 is provided
in the appendix.
Prior to concluding this section, it is interesting to stress that
while 2M −1 is the highest possible number of distinguishable
band-limited waveforms whose intensity equals I(t), the actual
number of such waveforms is 2N0 , where N0 is the number
of zeros that are not located on the unit circle. That is
because when a zero Zl falls on the unit circle, Ul (Z) can
4
be easily verified to be a constant (i.e. Z-independent) phasefactor whose application to A(Z) does not produce a new
waveform. Note also that in this situation E(tl ) = 0 with
tl = arg(Zl )/Ω.4
C. The implications to capacity
We now prove the following relation between Cd – the
information capacity of the direct detection channel, and the
capacity Cc of a system using coherent detection
Cc − 1 ≤ Cd ≤ Cc ,
(10)
where in all cases, we are referring to the capacity per complex
degree of freedom.5 We denote by X the input alphabet of
our channel and by Y 0 the output alphabet available to a
coherent receiver. The output alphabet that is available to a
direct detection receiver is denoted by Y . Since no constraints
are imposed on the transmitter, the alphabet X contains all
complex waveforms without restriction. The alphabet Y 0 , on
the other hand, contains only those complex waveforms that
are band-limited to B, whereas Y contains all real-valued
waveforms that can be obtained by squaring the absolute value
of the waveforms contained in Y 0 . Communication requires
that a probability px (x) is prescribed to the transmission of
each individual waveform x ∈ X.6 The effect of the communications channel (noise distortions etc.) is characterized
by the conditional probabilities of detecting a given element
y 0 ∈ Y 0 (in the case of coherent detection), or y ∈ Y (in
the case of direct detection), given that a particular element
x ∈ X was transmitted. These conditional probabilities are
denoted by py0 |x (y 0 |x) and py|x (y|x), respectively. The mutual
information per complex degree of freedom between the
transmitter and each of the two receivers equals [19]
1
[H(Y 0 ) − H(Y 0 |X)] ,
(11)
M
1
I(X; Y ) =
[H(Y ) − H(Y |X)] ,
(12)
M
where the entropy H(Y ) and the conditional entropy H(Y |X)
are given by7
X
py (y) log2 py (y)
(13)
H(Y ) = −
I(X; Y 0 )
=
y
X
X
H(Y |X) = − px (x)
py|x (y|x) log2 py|x (y|x) ,(14)
x
y
and where the corresponding equations H(Y 0 ) and H(Y 0 |X)
are obtained by replacing y with y 0 in all places. The capacities
Cc and Cd are obtained by maximizing the mutual information
4 Interestingly,
when E(t) equals 0 exactly M − 1 times within the time
period M/B, then it is also the only waveform that is band-limited to B and
has that particular intensity.
5 The number of complex degrees of freedom is M , which is the product
of the temporal duration of the signal M/B and the bandwidth B.
6 Since x is an element of the alphabet X it represents a time dependent
waveform. Nonetheless, in order to keep the notation simple, we avoid writing
x(t), leaving the time dependence of x implicit. Additionally, in order to avoid
over-cluttering the notation, we denote the probability distribution of x simply
by px (x). A similar practice is used with the elements of Y and Y 0 .
7 In line with our simplified notation, summation over x and y should be
P
interpreted in a generalized sense. In addition py (y) = x px (x)py|x (y|x).
values of Eqs. (11) and (12) with respect to the transmitted
distribution px (x). In order to derive Eq. (10), we take
advantage of the relation
I(X; Y 0 )
= I(X; Y 0 , Y ) = I(X; Y ) + I(X; Y 0 |Y )
M −1
,
(15)
≤ I(X; Y ) +
M
where the first equality follows from the fact that
I(X; Y |Y 0 ) = 0, and the second equality follows from the
relations
1
[H(X) − H(X|Y 0 , Y )] ,
(16)
I(X; Y 0 , Y ) =
M
1
I(X; Y ) =
[H(X) − H(X|Y )] ,
(17)
M
1
I(X; Y 0 |Y ) =
[H(X|Y ) − H(X|Y 0 , Y )] . (18)
M
The last inequality is true because Y 0 can take no more than
2M −1 functional values for any given Y .
In the limit of large M , Eq. (15) reduces to
I(X; Y 0 ) − 1 ≤ I(X; Y ) ≤ I(X; Y 0 ).
(19)
Note that expressions (15) and (19) hold for any distribution
of the transmitted alphabet PX (x). This means that, for any
modulation format, the information per complex degree of
freedom that can be extracted when using a direct detection
receiver is at most one bit less than the information per channel
use that can be extracted with coherent detection.
When px (x) is set to be the distribution that maximizes
I(X; Y 0 ), we arrive at
Cc − 1 ≤ Ip (X; Y ) ≤ Cc ,
(20)
where Ip (X; Y ) is the mutual information I(X; Y ) that corresponds to the distribution px (x) for which Cc is attained.
Clearly, Cd ≥ Ip (X; Y ) and hence Cd ≥ Cc − 1. Nonetheless,
Cd remains smaller or equal to Cc , as follows from the rightside inequality of Eq. (15). This concludes the proof of Eq.
(10).
Finally, we note that the capacity per complex degree of
freedom, which we have evaluated in Sec. III-C is identical to
the spectral efficiency, which is the more commonly used term
in the context of fiber communications. Hence the spectral
efficiency of a direct detection system is at most 1 bit/sec/Hz
smaller than that of a system using coherent detection. In order
to see that the two are exactly the same, note that B is both
the bandwidth of the optical signal as well as the number of
complex degrees of freedom that are transmitted per second.
IV. E XTENSION TO N ONLINEAR SYSTEMS OR TO
NON - ADDITIVE NOISE
Fiber-optic communications are often affected by the nonlinear propagation phenomena taking place in optical fibers.
Their effect is not only to distort the signal itself, but also to
cause a nonlinear interaction between the signal and noise, in
which case the noise can no longer be modeled as additive.
From the standpoint of our current study, the only difficulty
that is imposed by this situation is that it is impossible to
relate to the spectrum occupied by the data-carrying signal
5
as a constant, and hence the definition of spectral efficiency
becomes problematic. Nonetheless, it must be stressed that our
analysis of the received waveforms in Sec. III did not explicitly
assume anything about the type of noise, or propagation.
Therefore, our results with respect to the capacity of the
optically filtered signal in Fig. 1b, remain perfectly valid.
In other words, after band-pass filtering, the information per
degree of freedom that is contained in the received complex
optical signal is at most one bit larger than the information
contained in its intensity. With this said, it must be noted
that we do not claim that positioning of a square filter in
front of the receiver is an optimal practice in the nonlinear
case. Nonetheless, in practical situations encountered in fiber
communications, the inclusion of such a filter is practically
unavoidable.
V. D ISCUSSION
While Eq. (10) corresponds to the only relevant case of
M → ∞, the opposite limit of M = 1, which can be
deduced from Eq. (15) may challenge one’s physical intuition,
as it predicts equality between the mutual information values
corresponding to direct and coherent detection. For this reason
the discussion of this special case is interesting in spite of
the fact that it is of no practical importance whatsoever. In
order to resolve this apparent conundrum, note that the case
M = 1 represents a situation in which the complex field E is
time independent. In particular, the phase difference between
any two possible fields is also time independent, implying
that the fields are distinguishable only provided that their
intensities differ. Hence, in this artificial situation, the coherent
receiver has no advantage over the direct detection receiver and
therefore their capacities are identical.
Another curious point related to the assumption of periodicity is that it is not the only convenient choice for arriving
at the result of Sec. III.B. Since E(t) is band limited and its
spectrum is contained within ω ∈ [0, B], it can be written as
E(t) =
∞
X
En e−i(Bt−n)π sinc [π(Bt − n)] ,
(21)
n=−∞
where, as noted earlier, En = E(t = n/B), and where
sinc(x) = sin(x)/x. If we impose the requirement that
En = 0 for n < 0 and for n ≥ M , we end up with a bandlimited, but non-periodic E(t). Nonetheless, the number of
waveforms Ej (t) whose intensity equals that of E(t) remains
at most 2M −1 . In order to see that, consider a time interval of
M 0 /B that contains the interval M/B at its center. Assume
also that M 0 M , so that the tails of the various sinc
functions decay to the extent that the signal within M 0 /B can
be extended periodically without introducing any bandwidth
broadening. We may now apply the reasoning of Sec. III to the
signal in the interval M 0 /B, according to which the number
of equal intensity waveforms is 2 to the power of the number
of zeros in A(Z) that do not coincide with the unit circle.
Evidently, the number of such zeros is at most M −1, because
there are at least M 0 − M zeros that fall on the unit circle.
These are the zeros of E(t) at the times tl = l/B (with l
being outside of the range of 0 to M − 1), which correspond
to zeros in A(Z) at Zl = exp(iΩtl ), i.e. on the unit circle.
Finally, it is important to stress the consequences of our
definition of direct detection, which requires that the incoming
optical signal is detected by a single photo-diode per polarization, and without any manipulation of the signal prior to
photo-detection.8 This definition excludes not only the use of
a local oscillator, as in coherent detection, but also all selfcoherent schemes, such as the ones proposed in [20], and
phase-reconstruction schemes of the kind considered in [21],
[22].
VI. ACKNOWLEDGEMENT
A. Mecozzi acknowledges financial support from the Italian
Government under project INCIPICT. M. Shtaif acknowledges financial support from Israel Science Foundation (grant
1401/16).
A PPENDIX A
Our discussion in Sec. III involved the statement that
the number of distinguishable complex waveforms that are
characterized by a bandwidth B and a period M/B, cannot
be greater than 2M −1 . One justification for this claim is
that the only functions in Z-domain that produce pure phase
modulation and do not increase the order of the polynomial
A(Z) (and hence they do not increase the bandwidth of E(t))
are of the form ck (Z Z̃k − 1)/(Zk − 1), where Zk is one of the
zeros of A(Z) and ck a constant. In order for these functions
not to change the time-domain intensity waveform of E(t),
one must have Z̃k = Zk∗ and |ck | = 1, so that the amplitude
of the function’s transfer function on the unit circle is 1. This
means that the only functions that can be applied to A(Z)
without changing neither the order of the polynomial, nor the
intensity waveform, are the M − 1 functions specified in Eq.
(9). Indeed, the number of such function combinations does
not exceed 2M −1 . Here, we also present an alternative proof
that is based on the uniqueness of minimum-phase functions.
Given a periodic band-limited waveform, we have shown
that by reflecting any of its zeros with respect to the unit
circle, as described in Sec. III.B, one obtains a different
waveform having the same intensity, bandwidth, and timeperiod.
If we look at an arbitrary given waveform E0 (t) =
p
I(t) exp(iφ0 (t)) of the above specified characteristics, and
identify all of its zeros, we can chose to reflect only the
zeros that are inside thep unit circle, thereby producing a
new waveform Em (t) = I(t) exp(φm (t)), having the same
intensity I(t), but a different phase. Since the spectrum of
Em (t) is contained between 0 and B, and since all of its zeros
in Z-domain are outside the unit circle, it belongs to a special
class of functions that is famously known as functions of
minimum-phase [23]. One of the most well known properties
of such functions is that up to an immaterial constant, their
8 The requirement that there is no manipulation of the signal prior to photodetection can be replaced by the requirement that no manipulation other than
all-pass filtering (e.g. dispersion) is applied prior to photo-detection. The
reason is that all pass filtering can also be done at the transmitter and hence
it does not affect the assumption of this work.
6
phase is uniquely determined by their intensity
means
h by
i of
p
the the Hilbert transform. Namely, φ(t) = H log I(t) + c,
where H[·] designates the Hilbert transform and where c is
an unknown constant. Since waveforms differing only by a
constant phase are indistinguishable in our definition (see Sec.
III.B), we conclude that the minimum phase function that
corresponds to a given intensity profile is unique.
The uniqueness of the minimum-phase function implies that
each waveform in the set of distinguishable equal intensity
waveforms that are band-limited to B and periodic in M/B,
can be obtained from any other waveform in the set by means
of functions of the form given in Eq. (9), whose effect is
to reflect the zeros of the waveforms that it acts upon in
Z-domain. Had it not been so, different waveforms in the
set would have produced different minimum phase functions.
Therefore the total number of distinguishable waveforms in
the set cannot exceed 2M −1 .
R EFERENCES
[1] S. Randel, F. Breyer, S.C.J. Lee, and J.W. Walewski, “Advanced Modulation Schemes for Short-Range Optical Communications,” IEEE J. Sel.
Topics Quantum Electron. 16, 1280–1289 (2010).
[2] T. Takahara, T. Tanaka, M. Nishihara, Y. Kai, L. Li, Z. Tao, and J. Rasmussen, “Discrete Multi-Tone for 100 Gb/s Optical Access Networks,” in
Optical Fiber Communication Conference, OSA Technical Digest (online)
(Optical Society of America, 2014), paper M2I.1.
[3] A. Weiss, A. Yeredor, and M. Shtaif, “Iterative Symbol Recovery For
Power Efficient DC Biased Optical OFDM Systems, IEEE J. of Lightwave
Technol. 34, 2331–2338 (2016).
[4] A.J. Lowery and J. Armstrong, “Orthogonal-frequency-division multiplexing for dispersion compensation of long-haul optical systems,” Opt.
Express 14, 2079–2084 (2006).
[5] B.J.C. Schmidt, A.J. Lowery, and J. Armstrong, “Experimental Demonstrations of Electronic Dispersion Compensation for Long-Haul Transmission Using Direct-Detection Optical OFDM,” J. Lightwave Technol.
26, 196–203 (2008).
[6] A. Li, D. Che, V. Chen, and W. Shieh, “Spectrally efficient optical
transmission based on Stokes vector direct detection,” Opt. Express 22,
15662–15667 (2016).
[7] S. Randel, D. Pilori, S. Chandrasekhar, G. Raybon, and P.J. Winzer
“100-Gb/s Discrete-Multitone Transmission Over 80-km SSMF Using Single-Sideband Modulation With Novel Interference-Cancellation
Scheme,” Proc. of European Conference of Optical Communications 2015
(ECOC15), Valencia – Spain, Paper 0697 (2015).
[8] M. Schuster, S. Randel, C.A. Bunge, S.C.J. Lee, F. Breyer, B. Spinnler,
and K. Petermann, “Spectrally Efficient Compatible Single-Sideband
Modulation for OFDM Transmission With Direct Detection,” IEEE
Photon. Technol. Letters 20, 670–672 (2008).
[9] A. Mecozzi, C. Antonelli, and M. Shtaif, “KK coherent receiver,” Optica
3, 1220-1227 (2016).
[10] C. Antonelli, A. Mecozzi, and M. Shtaif, “Kramers-Kronig PAM
Transceiver,” in Optical Fiber Communication Conference, OSA Technical Digest (online) (Optical Society of America, 2017), paper Tu3I.5.
[11] X. Chen, C. Antonelli, S. Chandrasekhar, G. Raybon, J. Sinsky, A.
Mecozzi, M. Shtaif, and P. Winzer, “218-Gb/s Single-Wavelength, SinglePolarization, Single- photo-diode Transmission Over 125-km of Standard
Singlemode Fiber Using Kramers-Kronig Detection,” in Optical Fiber
Communication Conference, OSA Technical Digest (online) (Optical
Society of America, 2017), post deadline paper Th5B.6
[12] Z. Li, S. Erkilinc, K. Shi, E. Sillekens, L. Galdino, B. Thomsen, P.
Bayvel, and R. Killey, “SSBI Mitigation and Kramers-Kronig Scheme
in Single-Sideband Direct-Detection Transmission with Receiver-based
Electronic Dispersion Compensation,” J. Lightwave Technol. 35, 1887–
1893 (2017).
[13] A. Mecozzi and M. Shtaif, “On the Capacity of Intensity Modulated
Systems Using Optical Amplifiers,” IEEE Photon. Technol. Lett. 13,
1029–1031 (2001).
[14] A. Lapidoth, “On phase noise channels at high SNR,” in Proc. IEEE
Information Theory Workshop (ITW), Bangalore, India, Oct. 2002, pp.
1–4.
[15] S. Hranilovic and F. R. Kschischang, “Capacity bounds for power- and
band-limited optical intensity channels corrupted by Gaussian noise,”
IEEE Transactions on Information Theory 50, 784–795 (2004).
[16] M. Katz and S. Shamai, “On the capacity-achieving distribution of the
discrete-time noncoherent and partially coherent AWGN channels,” IEEE
Transactions on Information Theory 50, 2257–2270 (2004).
[17] A. Lapidoth, S. M. Moser, and M. A. Wigger, “On the Capacity of FreeSpace Optical Intensity Channels,” IEEE Transactions on Information
Theory 55, 4449–4461 (2009).
[18] E.N. Gilbert, “Increased information rate by oversampling,” IEEE Transactions on Information Theory 39, 1973–1976 (1993).
[19] C. E. Shannon, “Mathematical theory of communications,” Bell System
Technical Journal, 27, pp. 379–423 & 623–656, July & October, 1948.
[20] Xiang Liu, S. Chandrasekhar, and Andreas Leven, “Digital self-coherent
detection,” Opt. Express 16, 792–803 (2008).
[21] Y. Shechtman, Y. C. Eldar, O. Cohen, H. N. Chapman, J. Miao, and
M. Segev, “Phase Retrieval with Application to Optical Imaging: A
contemporary overview,” IEEE Signal Processing Magazine 32, 87–109
(2015).
[22] Gang Wang, Georgios B. Giannakis, Yonina C. Eldar, “Solving Systems of Random Quadratic Equations via Truncated Amplitude Flow,”
arXiv:1605.08285, available at https://arxiv.org/abs/1605.08285.
[23] Alan V. Oppenheim and Ronald W. Schafer, Discrete-Time Signal Processing, 3nd ed, Upper Saddle River, NJ: Prentice-Hall Signal Processing
Series, (2010).
| 7cs.IT
|
Extracting Three Dimensional Surface Model of Human Kidney from the
Visible Human Data Set using Free Software
Kirana Kumara P*
Centre for Product Design and Manufacturing
Indian Institute of Science
Bangalore, INDIA - 560012
E-mail: [email protected]
*
Corresponding author: Phone: +91 80 2293 2284; Fax: +91 80 2360 1975
Abstract
Three dimensional digital model of a representative human kidney is needed
for a surgical simulator that is capable of simulating a laparoscopic surgery
involving kidney. Buying a three dimensional computer model of a
representative human kidney, or reconstructing a human kidney from an
image sequence using commercial software, both involve (sometimes
significant amount of) money. In this paper, author has shown that one can
obtain a three dimensional surface model of human kidney by making use of
images from the Visible Human Data Set and a few free software packages
(ImageJ, ITK-SNAP, and MeshLab in particular). Images from the Visible
Human Data Set, and the software packages used here, both do not cost
anything. Hence, the practice of extracting the geometry of a representative
human kidney for free, as illustrated in the present work, could be a free
alternative to the use of expensive commercial software or to the purchase of a
digital model.
Keywords
Visible; Human; Data; Set; Kidney; Surface; Model; Free.
Introduction
Laparoscopic surgery is often a substitute for a traditional open surgery, when human
kidney is the organ that is to be operated upon [1]; choosing laparoscopic surgery over an
open surgery reduces trauma and shortens the recovery time for the patient [1]. But since
laparoscopic surgery needs highly skilled surgeons, it is preferable to use a surgical simulator
for training and evaluating surgeons [2]. A surgical simulator that can simulate a laparoscopic
surgery over a human kidney needs a virtual kidney, i.e., a computer (digital) three
dimensional (3D) model of a representative human kidney.
Currently, mainly two approaches are being practiced to obtain the geometry of a
representative human kidney. The first approach is to buy a readily available 3D model of a
human kidney from an online store (e.g., [3]). The second approach is to use commercial
software packages (such as 3D-DOCTOR [4], Mimics [5], Amira [6]) to reconstruct a 3D
geometry of a kidney from a two dimensional (2D) image sequence. One can see that both of
these approaches cost (sometimes significant amount of) money.
Present work shows that it is possible to obtain a three dimensional surface model of a
representative human kidney, completely for free. Present approach is to make use of a few
free software packages to extract 3D geometry of human kidney from CT-scan images from
the Visible Human Data Set (VHD) (also known as The Visible Human Project Image Data
Set, or The Visible Human Project Data Sets) [7]. The free software packages used are ImageJ
[8-10], ITK-SNAP [11, 12], and MeshLab [13, 14]. One can note that images from VHD may
be downloaded for free, after obtaining a free license [15] from National Library of Medicine
(NLM) [16] which is a part of National Institutes of Health (NIH) [17]; VHD is a part of the
more ambitious Visible Human Project (VHP) [18].
Approaches similar to the approach presented in the present paper may be found in the
present author’s previous works [19, 20]. Although the free software packages used in those
works are the same as the ones used in the present work, the images were not from VHD;
images used in [19] and [20] were downloaded from [21] (the images are no longer accessible
as of now; but images were downloadable sometime back). Also, [19] and [20] discuss the
reconstruction of a pig liver, while the present work deals with the reconstruction of a human
kidney.
Upon conducting literature review, one can see that there are authors who have used
VHD together with commercial software packages, e.g., [22]. Also, there are authors who
have used images from sources other than VHD and have used commercial software packages
to perform 3D reconstruction of biological organs [23-26]. Also, there are authors who have
used free software packages to extract geometry of biological organs [27]. But the present
author could not find any source in the literature where the three free software packages –
ImageJ, ITK-SNAP and MeshLab – were used to obtain 3D surface model of human kidney
from CT-scan images from the VHD.
The practice of extracting the geometry of a representative human kidney for free, as
presented in the present work, could be a free alternative to the use of expensive commercial
software or to the purchase of a digital model.
Material and Method
For the present work, CT-scan images from VHD and the three free and open source
software packages – ImageJ, ITK-SNAP, and MeshLab – form the material. As far as method
is concerned, the three software packages are used to reconstruct 3D models of human kidney
from the CT-scan images from the VHD.
VHD contains CT, MRI and cryosection images. In this work, only normal CT-scan
images of visible human male and female are used. Present work uses images in the ‘png’
format since this is the format recommended by VHP. File size of CT-scan images is small,
and the images are good enough for reconstructing a 3D model of whole kidney (i.e., inner (or
finer) details of kidney are not present; reconstructed 3D model represents just the outer
surface of kidney). One can easily identify human kidney in the CT-scan images of VHD.
In the present work, ImageJ 1.42q is used to form an image stack which contains
kidney. ITK-SNAP Version 2.0.0 is used for segmentation and 3D reconstruction to the
correct scale. MeshLab v1.2.2 is used to control the level of detail in the reconstructed 3D
model; it also serves as a tool to smoothen the 3D model and reduce its file size.
Now the method is explained in a bit detail in the following subsections.
Using ImageJ to Form an Image Stack
CT-scan images for visible human male and female are available from head to toe. Out
of these images, one has to identify the images which belong to kidney. Upon viewing
individual images in ImageJ, and upon consulting [28] and [29], one can conclude that for
visible human male, both left are right kidneys are contained between the images
‘cvm1551f.png’ and ‘cvm1692f.png’ (47 images in total). Similarly, for visible human
female, both left and right kidneys are contained between the images ‘cvf1564f.png’ and
‘cvf1693f.png’ (130 images in total). Now these 47 images for male, and 130 images for
female, have to be copied into two separate empty folders. Now, to form an image stack for
male, select the menu item ‘File -> Import -> Image Sequence…’, browse to the location of
the folder containing 47 images and select the first image in the folder and follow the prompts
(with default options); all 47 images are now displayed in ImageJ as an image stack; now,
select the menu item ‘File -> Save As -> Raw Data…’ to save the image stack in the ‘*.raw’
format (where * is the name given). Similar procedure may be followed to obtain an image
stack for the female.
Using ITK-SNAP to Perform Segmentation and 3D Reconstruction
ITK-SNAP does the segmentation and 3D reconstruction to the correct scale. Hence
header information for the images in the image stack is essential. VHD contains header
information for each of the images in its database. Upon going through the header files of
each of the 47 images of male, one can note that the following header information is identical
for all the 47 images: Image matrix size – X = 512, Image matrix size – Y = 512, Image
dimension – X = 460 mm, Image dimension –Y = 460 mm, Image pixel size – X = 0.898438,
Image pixel size – Y = 0.898438, Screen Format = 16 bit, Spacing between scans = 3 mm.
Similarly, the following header information is identical for all the 130 female images: Image
matrix size – X = 512, Image matrix size – Y = 512, Image dimension – X = 480 mm, Image
dimension –Y = 480 mm, Image pixel size – X = 0.9375, Image pixel size – Y = 0.9375,
Screen Format = 16 bit, Spacing between scans = 1 mm.
Now, the method of reconstructing the left kidney of the male is explained in detail,
with illustrations. The same method may be employed to reconstruct the right kidney of the
male, and the left and right kidneys of the female.
Select the menu item ‘File -> Open Greyscale Image…’, browse to the location of the
image stack for male, follow the prompts and supply the header information. As noted in the
first paragraph of this subsection, the ‘missing header information’ to be supplied for the
image stack (for male) is: Image dimensions: X: 512, Y: 512, Z: 47, Voxel spacing: X =
0.898438, Y = 0.898438, Z = 3, Voxel representation: 16 bit, unsigned. Once the header
information is supplied, image stack is displayed in ITK-SNAP. One can browse through all
the 47 images in the image stack. For illustration purposes, 17th image and 33rd image in the
image stack (i.e., ‘cvm1602f.png’ and ‘cvm1650f.png’ in the VHD) are shown in Figure 1
and Figure 2 respectively; also, the left and right kidneys are identified in Figure 1 and Figure
2, by making use of illustrations from [28] and [29].
Right Kidney
Left Kidney
Figure 1. The 17th image in the image stack
Right Kidney
Left Kidney
Figure 2. The 33rd image in the image stack
Now the task is to do the segmentation. Select ‘Polygon tool’ from the ‘IRIS
Toolbox’, for slice-by-slice manual segmentation. Select ‘continuous’ radio button under
‘Polygon Tool’. Now click and drag the mouse cursor along the edge of the left kidney (as
seen in the axial view (window)), carefully. This draws the contour of the edge of the left
kidney. Now, right click on the image, and select the ‘accept’ button to create the
segmentation for the image on display. This process has to be repeated for all images in the
image stack, which contain pixels that belong to the left kidney. For illustration purposes,
17th image and 33rd image in the image stack, after segmentation, are shown in Figure 3 and
Figure 4 respectively.
Segmented
Left Kidney
Figure 3. The 17th image in the image stack (after segmentation)
Segmented
Left Kidney
Figure 4. The 33rd image in the image stack (after segmentation)
Once the segmentation is over, 3D reconstruction is to be carried out. This is
accomplished by the menu item ‘Segmentation -> Save As Mesh…’, following prompts,
browsing to the location where the reconstructed model is to be stored, and giving a name in
the format ‘path\*.stl’ for the file that represents the reconstructed 3D model (where ‘path’ is
the complete path, e.g., C:\Users\PC\Desktop\*.stl, and * is any file name).
Now, a 3D reconstruction of the left kidney for the visible human male is over. Similar
process may be followed to reconstruct the right kidney of the visible human male, and the
left and right kidneys of the visible human female.
Using MeshLab to Reduce the Total Number of Faces Describing the 3D
Model
The 3D model of kidney obtained through the use of ITK-SNAP typically is of very
large size and typically is described by a very large number of surface triangles. MeshLab
could be very helpful in reducing the total number of surface triangles that are needed to
describe the 3D model satisfactorily. It also serves as a tool to smoothen the reconstructed 3D
geometry; after using smoothing features provided by MeshLab, it may be necessary to scale
the reconstructed 3D models to the correct dimensions, if the original dimensions are to be
strictly retained. MeshLab can also improve the triangle quality of surface triangles of the 3D
model. It can also reduce the file size.
The 3D models of kidney, after undergoing processing with MeshLab, are shown in
the next section.
Results
Reconstructed left kidney of the male, after undergoing processing through MeshLab,
is shown in Figure 5. Similarly, reconstructed right kidney of the male, after undergoing
processing through MeshLab, is shown in Figure 6. Reconstructed left kidney of the female is
shown in Figure 7. Reconstructed right kidney of the female is shown in Figure 8. All the four
3D models are made up of 1000 surface triangles. While obtaining these four models, job of
MeshLab is to smoothen the 3D models reconstructed through ITK-SNAP and to reduce the
total number of surface triangles to 1000.
Figure 5. Reconstructed left kidney of male
Figure 6. Reconstructed right kidney of male
Figure 7. Reconstructed left kidney of female
Figure 8. Reconstructed right kidney of female
Discussion
In this work, 3D model of human kidney is extracted from CT-scan images from the
VHD, using free software packages. The free software packages used are: 1) ImageJ 2) ITKSNAP 3) MeshLab. The organs reconstructed are: 1) left kidney of visible human male 2)
right kidney of visible human male 3) left kidney of visible human female 4) right kidney of
visible human female. All the four models are in ‘stl’ format.
Use of free software packages together with images that may be obtained for free, as
has been done in the present work, makes it possible to obtain the geometry of a
representative human kidney, completely for free. Buying a 3D model of a human kidney, or
using a commercial software package to extract 3D models from image sequences, cost
(sometimes significant amount of) money. Also, in the present approach, user can control how
finely the geometry should be described (using the free software package MeshLab). Since
MeshLab can improve the quality of the surface mesh that describes a reconstructed 3D
model, the reconstructed 3D model that has undergone processing with MeshLab can be used
in a finite element analysis after converting the surface model to a solid model using software
packages like Rhinoceros. Also, the method used to extract the geometry of a kidney, as
illustrated in the present work, may possibly be used to extract other whole biological organs
from VHD.
It may be noted that the method given here to obtain the 3D models of human kidney
need not be followed rigidly. It is good to read the documentation for the software packages
used here, and one can experiment with the various options provided by the software
packages instead of rigidly following the method illustrated in this work. For example, instead
of tracing the boundary of the kidney in each of the images through the mouse pointer, the
‘Paintbrush tool’ provided by ITK-SNAP can be tried out to carry out the segmentation; ITKSNAP also provides a tool that can do semi-automatic segmentation.
As to the limitations, present work uses only CT-scan images. Although these are
found to be sufficient to obtain the geometry of a whole kidney, whenever the reconstructed
geometry should include the finer details of the kidney, or whenever some other organ is to be
extracted from VHD, there is a possibility that other types of images (e.g., MRI images) are
more suited in some cases. Also, multiple software packages need to be downloaded, installed
and used here.
Future work is to extract other biological organs from VHD, using free software
packages. Aim is to reconstruct biological organs with inner details (not obtaining just the
outer surface of the organs) and to use other types of images (like MRI, cryosection images)
from the VHD if need be.
Conclusion
It is possible to obtain the 3D surface model of a representative human kidney from
CT-scan images from the VHD, using free software packages only; the free software
packages needed are: ImageJ, ITK-SNAP, and MeshLab. The practice of extracting the
geometry of a representative human kidney completely for free, as illustrated in the present
work, could be a free alternative to the use of expensive commercial software packages or to
the purchase of a digital model.
Acknowledgements
Author is grateful to the Robotics Lab, Department of Mechanical Engineering &
Centre for Product Design and Manufacturing, Indian Institute of Science, Bangalore, INDIA,
for providing the necessary infrastructure to carry out this work.
Author acknowledges Prof. Ashitava Ghosal, Robotics Lab, Department of
Mechanical Engineering & Centre for Product Design and Manufacturing, Indian Institute of
Science, Bangalore, INDIA, for providing the CT-scan images from the Visible Human Data
Set (VHD).
Author acknowledges National Library of Medicine (NLM) and Visible Human
Project (VHP) for providing free access to the Visible Human Data Set (VHD) to Prof.
Ashitava Ghosal.
Visible Human Data Set (VHD) is an anatomical data set developed under a contract
from the National Library of Medicine (NLM) by the Departments of Cellular and Structural
Biology, and Radiology, University of Colorado School of Medicine.
References
1.
Jay T. Bishoff, Louis R. Kavoussi (online), LAPAROSCOPIC SURGERY OF THE
KIDNEY. Available at: http://www.pkdiet.com/pdf/Laparoscopic%20nephrectomy.pdf
(accessed July 14, 2012)
2.
Issenberg SB, McGaghie WC, Hart IR, Mayer JW, Felner JM, Petrusa ER, Waugh RA,
Brown DD, Safford RR, Gessner IH, Gordon DL, Ewy GA., Simulation Technology for
Health Care Professional Skills Training and Assessment, The Journal of the American
Medical Association, 1999, 282(9), p. 861-6.
3.
http://www.turbosquid.com (accessed July 14, 2012)
4.
http://www.ablesw.com/3d-doctor/ (accessed July 14, 2012)
5.
http://biomedical.materialise.com/mimics (accessed July 14, 2012)
6.
http://www.amira.com/ (accessed July 14, 2012)
7.
http://www.nlm.nih.gov/research/visible/getting_data.html (accessed July 14, 2012)
8.
http://rsbweb.nih.gov/ij/ (accessed July 14, 2012)
9.
Rasband W.S., ImageJ, U. S. National Institutes of Health, Bethesda, Maryland, USA,
http://rsb.info.nih.gov/ij/ , 1997-2009.
10. Abramoff M.D., Magelhaes P.J., Ram S.J., Image Processing with ImageJ,
Biophotonics International, 2004, volume 11, issue 7, pp. 36-42.
11. http://www.itksnap.org/pmwiki/pmwiki.php (accessed July 14, 2012)
12. Paul A. Yushkevich, Joseph Piven, Heather Cody Hazlett, Rachel Gimpel Smith, Sean
Ho, James C. Gee, Guido Gerig, User-guided 3D active contour segmentation of
anatomical structures: Significantly improved efficiency and reliability, Neuroimage,
2006, 31(3), 1116-28.
13. http://meshlab.sourceforge.net/ (accessed July 14, 2012)
14. MeshLab, Visual Computing Lab – ISTI – CNR
15. http://www.nlm.nih.gov/research/visible/vhpagree.pdf (accessed July 14, 2012)
16. http://www.nlm.nih.gov/ (accessed July 14, 2012)
17. http://www.nih.gov/ (accessed July 14, 2012)
18. http://www.nlm.nih.gov/research/visible/visible_human.html (accessed July 14, 2012)
19. Kirana Kumara P, Ashitava Ghosal, A Procedure for the 3D Reconstruction of
Biological Organs from 2D Image Sequences, Proceedings of BEATS 2010, 2010,
International Conference on Biomedical Engineering and Assistive Technologies
(BEATS 2010), Dr B R Ambedkar National Institute of Technology, Jalandhar, INDIA.
20. Kirana Kumara P (online), Reconstructing Solid Model from 2D Scanned Images of
Biological
Organs
for
Finite
Element
Simulation.
Available
at:
http://knolskiranakumarap.wordpress.com/2011/07/03/reconstructing-solid-modelfrom-2d-3rc2kfwq179j2-5/ (accessed July 14, 2012)
21. http://www.biorobotics.harvard.edu/ (accessed July 14, 2012)
22. Aimee Sergovich, Marjorie Johnson, Timothy D. Wilson, Explorable ThreeDimensional Digital Model of the Female Pelvis, Pelvic Contents, and Perineum for
Anatomical Education, Anatomical Sciences Education, 2010, 3:127–133.
23. Dong Sun Shin, Jin Seo Park, Byeong-Seok Shin, Min Suk Chung, Surface models of
the male urogenital organs built from the Visible Korean using popular software,
Anatomy & Cell Biology, 2011, 44(2), p. 151-159.
24. Amy Elizabeth Kerdok, Characterizing the Nonlinear Mechanical Response of Liver to
Surgical Manipulation, Ph.D Thesis, 2006, The Division of Engineering and Applied
Sciences, Harvard University.
25. Li Lou, Shu Wei Liu, Zhen Mei Zhao, Pheng Ann Heng, Yu Chun Tang, Zheng Ping Li,
Yong Ming Xie, Yim Pan Chui, Segmentation and reconstruction of hepatic veins and
intrahepatic portal vein based on the coronal sectional anatomic dataset, Surgical and
Radiologic Anatomy, 2009, 31:763-768.
26. Chen G, Li XC, Wu GQ, Zhang SX, Xiong XF, Tan LW, Yang RG, Li K, Yang SZ,
Dong JH., Three-dimensional reconstruction of digitized human liver: based on Chinese
Visible Human, Chinese Medical Journal, 2010, 123(2), p. 146-50.
27. Hong-jian Gao, 3-D Reconstruction of Liver Slice Images Based on MITK Framework,
The 1st International Conference on Bioinformatics and Biomedical Engineering
(ICBBE 2007), 2007, DOI: 10.1109/ICBBE.2007.247
28. http://www.voxel-man.de/vm/io_correlation.en.html (accessed July 14, 2012)
29. Henry Gray, Anatomy of the Human Body, Philadelphia, Lea & Febiger, 1918.
| 5cs.CE
|
FACE RINGS OF CYCLES, ASSOCIAHEDRA,
AND STANDARD YOUNG TABLEAUX
arXiv:1503.06243v3 [math.CO] 22 Aug 2016
ANTON DOCHTERMANN
Abstract. We show that Jn , the Stanley-Reisner ideal of the n-cycle, has a free resolution
supported on the (n − 3)-dimensional simplicial associahedron An . This resolution is not
minimal for n ≥ 6; in this case the Betti numbers of Jn are strictly smaller than the f -vector
of An . We show that in fact the Betti numbers βd of Jn are in bijection with the number
of standard Young tableaux of shape (d + 1, 2, 1n−d−3 ). This complements the fact that
the number of (d − 1)-dimensional faces of An are given by the number of standard Young
tableaux of (super)shape (d + 1, d + 1, 1n−d−3 ); a bijective proof of this result was first
provided by Stanley. An application of discrete Morse theory yields a cellular resolution of
Jn that we show is minimal at the first syzygy. We furthermore exhibit a simple involution
on the set of associahedron tableaux with fixed points given by the Betti tableaux, suggesting
a Morse matching and in particular a poset structure on these objects.
1. Introduction
In this paper we study some intriguing connections between basic objects from commutative algebra and combinatorics. For K an arbitrary field we let R = K[x1 , x2 , . . . , xn ] denote
the polynomial ring in n variables. We let Jn denote the edge ideal of the complement of the
n-cycle Cn . By definition, Jn is the ideal generated by the degree 2 monomials corresponding
to the diagonals of Cn . One can also realize Jn as the Stanley-Reisner ideal of the cycle Cn
(now thought of as a one-dimensional simplicial complex).
1
2
6
3
5
4
Figure 1. J6 = hx1 x3 , x1 x4 , x1 x5 , x2 x4 , x2 x5 , x2 x6 , x3 x5 , x3 x6 , x4 x6 i.
The ideals Jn are of course very simple algebraic objects and their homological properties
are well-understood. One can verify that R/Jn is a Gorenstein ring, the dimension of R/Jn
is 2, and (hence) the projective dimension of R/Jn is n − 2. In fact a minimal free resolution
can be described explicitly, and cellular realizations have been provided by Biermann [3] and
more recently by Sturgeon [20].
Date: August 23, 2016.
1
We wish to further investigate the combinatorics involved in the resolutions of Jn . Our
original interest in cellular resolutions of Jn came from the fact that the ideal Jn has an
‘almost linear’ resolution, in the sense that the nonzero entries in the differentials of its minimal resolution are linear forms from R, except at the last syzygy where the nonzero entries
are all degree 2. Recent work in combinatorial commutative algebra has seen considerable
interest in cellular resolutions of monomial and binomial ideals (see for example [2], [4], [8],
[9], [12], [13], [15], [17]), but in almost all cases the ideals under consideration have linear
resolutions. Here we seek to extend some of these constructions.
In the construction of any cellular resolution, one must construct a CW -complex with
faces labeled by monomials that generate the ideal. In the case of Jn there is a well known
geometric object whose vertices are labeled by the diagonals of an n-gon, namely the (simplicial) associahedron An . By definition, An is the simplicial complex with vertex set given
by diagonals of an n-gon, with faces given by collections of diagonals that are non-crossing.
The facets of An are triangulations of the n-gon, of which there are a Catalan number many.
It is well known that An is spherical, and in fact can be realized as the boundary of a convex
polytope. In addition there is a natural way to associate a monomial to each face of An , and
in the first part of the paper we show that this labeled facial structure of An (considered as
a polytope with a single interior cell) encodes the syzygies of Jn .
Theorem 3. With its natural monomial labeling, the complex An supports a free resolution
of the ideal Jn .
The resolution of Jn supported on the associahedron An is not minimal for n > 5, and in
particular in this case we have faces F ( G with the same monomial labeling. The f -vector
of An is completely understood (a closed form can be written down), and in fact the number
of (d − 1)-dimensional faces of An is equal to the number of standard Young tableaux of
shape (d + 1, d + 1, 1n−d−3 ); a bijective proof of this was first provided by Stanley [19].
Since a resolution of Jn is supported on An we know that the f -vector of An provides an
upper bound on the Betti numbers βd (R/Jn ), with equality in the case of β1 (R/Jn ) = f0 (An ).
In the second part of the paper we show that the Betti numbers βd of R/Jn are given by
standard Young tableaux on a set of subpartitions involved in the Stanley bijection.
Theorem 6. The total Betti numbers βd of the module R/Jn are given by the number of
standard Young tableaux of shape (d + 1, 2, 1n−d−3 ).
This bijection along with an application of the hook formula leads to a closed form expression
for the Betti numbers of R/Jn . In addition, the fact that the partition (d + 1, 2, 1n−d−3 ) is
conjugate to (n−d−1, 2, 1d+1 ) provides a nice combinatorial interpretation of the palindromic
property βd = βn−d−2 for the Betti numbers of the Gorenstein ring R/Jn .
The fact that we can (in theory) identify the Betti numbers of R/Jn with certain faces
of An suggests that it may be possible to collapse away faces of An to obtain a minimal
resolution of Jn , employing an algebraic version of Morse theory due to Batzies and Welker
([1]). Indeed certain geometric properties of any subdivision of an n-gon (along with the
almost linearity of Jn ) imply that certain faces must be matched away. For d = 2 we are
able to write down a Morse matching involving the edges and 2-faces of An such that the
number of unmatched (critical) cells is precisely β2 (corresponding to the first syzygy module
of R/Jn ), see Proposition 12. This leads to minimal resolutions of Jn for the cases n ≤ 7.
2
In addition, our identification of both the Betti numbers of R/Jn and the faces of An with
standard Young tableaux leads us to consider a partial matching on the set of associahedron
tableaux such that the unmatched elements correspond to the Betti numbers. The hope
would be to import a poset structure from the face poset of An to extend this matching to
a Morse matching. The trouble with this last step is that the Stanley bijection does not
give us an explicit labeling of the faces of An by standard Young tableaux; there are choices
involved and the bijection itself is recursively defined. However, we can define a very simple
partial matching on the set of standard Young tableaux of shape (d + 1, d + 1, 1n−d−3 ) such
that the unmatched elements can naturally be thought of as standard Young tableaux of
shape (d + 1, 2, 1n−d−3 ) (by deleting the largest entries); see Proposition 16. This suggests a
poset structure on the set of standard Young tableax that extends this covering relation.
The rest of the paper is organized as follows. We begin in Section 2 with some basics regarding the commutative algebra involved in our study. In Section 3 we discuss associahedra
and their role in resolutions of Jn . We turn to standard Young tableaux in Section 4 and
here establish our results regarding the Betti numbers of R/Jn . In Section 5 we discuss our
applications of discrete Morse theory and related matchings of stand Young tableaux. We
end with some open questions.
2. Some commutative algebra
As above we let Jn denote the Stanley-Reisner ideal of the n-cycle, by definition the ideal
in R = K[x1 , x2 , . . . , xn ] generated by degree 2 monomials corresponding to the diagonals.
We are interested in combinatorial interpretations of certain homological invariants of Jn ,
and in particular the combinatorial structure of its minimal free resolution. Recall that a
free resolution of an R-module M is an exact sequence of R-modules
0 ← M ← F1 ← F2 ← · · · ← Fp ← 0,
where each Fd ' ⊕j R(−j)βd,j is free and the differential maps are graded. The resolution
is minimal if each of the βd,j are minimum among all resolutions, in which case the βd,j
are called the (graded) Betti numbers of M . Also in this case the number p (length of the
minimal resolution) is called the projective dimension of M .
Our main tool in calculating Betti numbers will be Hochster’s formula (see for example
[14]), which gives a formula for the Betti numbers of the Stanley-Reisner ring R/I∆ associated
to a simplicial complex ∆.
Theorem 1 (Hochster’s formula). For a simplicial complex ∆ on vertex set [n] we let R/I∆
denote its Stanley-Reisner ring. Then for d ≥ 1 the Betti numbers βd,j of R/I∆ are given by
X
(1)
βd,j (∆) =
dimk H̃j−d−1 (∆[W ]; k).
[n]
W ∈( j )
Here ∆[W ] denotes the simplicial complex induced on the vertex set W .
A cellular resolution of M is a CW-complex X with a monomial labeling of its faces,
such that the algebraic chain complex computing the cellular homology of X ‘supports’ a
resolution of M . We refer to Section 3 for details and more precise definitions.
We next collect some easy observations regarding the Betti numbers of Jn . Since Jn is the
Stanley-Reisner ideal of a triangulated 1-dimensional sphere, we see that R/Jn is Gorenstein
3
and has (Krull) dimension 2. The Auslander-Buchsbaum formula then implies that the
projective dimension of R/Jn is n − 2, which says that βd,j = 0 whenever d > n − 2. An easy
application of Hochster’s formula also implies that a minimal resolution of Jn is linear until
the last nonzero term, by which we mean if 0 ≤ d < n − 2, then βd,j = 0 for all j 6= d + 1.
Also, we have βn−2,n = 1 and βn−2,j = 0 for j 6= n. In this sense the ideals Jn have an ‘almost
linear’ resolution, as mentioned in the introduction.
Convention: Since for any d we have βd,j 6= 0 for at most one value of j, we we will
(without loss of generality) sometimes drop the j and use βd = βd,j to denote the Betti
numbers of Jn .
3. Asssociahedra
For each n, we let An denote the (dual) associahedron, the (n − 4)-dimensional simplicial
complex whose vertices are given by diagonals of a labeled regular n-gon, with facets given
by triangulations (collections of diagonals that do not intersect in their interior). It is well
known that An is homeomorphic to a sphere and in fact is polytopal, and several embeddings
(most often of the dual simple polytope) are described throughout the literature (see [6] for a
good account of the history). From here on we will use An to denote the (n − 3)-dimensional
simplicial polytope (i.e., including the interior).
We wish to describe a monomial labeling of the faces of An . Recall that each vertex of
An corresponds to some diagonal {i, j} of an n-gon, so we simply label that vertex with the
monomial xi xj . We label the higher-dimensional faces of An with the least common multiple
of the vertices contained in that face. We wish to show that, with this simple labeling, the
associahedron An supports a resolution of Jn .
x1x3
x1x5
1
2
6
x1x4
x1x3x5
x1x2x4x5
3
5
4
x2x5
x2x4
x3x5
x4x6
x3x6
x2x6
Figure 2. The complex A6 with its monomial labeling (partially indicated).
Let us first clarify our terms. To simplify notation we will associate to any monomial
· · · xinn ∈ R the vector (i1 , i2 , . . . , in ) ∈ Nn and will freely move between notations. We
xi11 xi22
4
define a labeled polyhedral complex to be a polyhedral complex X together with an assignment
aF ∈ Nn to each face F ∈ X such that for all i = 1, 2, . . . , n we have
(aF )i = max{(aG )i : G ⊂ F }.
If X is a labeled polyhedral complex we can consider the ideal M = MX ⊂ K[x1 , x2 , . . . , xn ]
generated by the monomials corresponding to its vertices (as usual we identify an element
α ∈ Nn as the exponent vector of a monomial). The topological space underlying X (with
a chosen orientation) has an associated chain complex FX of k-vector spaces that computes
cellular homology. Since X has monomial labels on each of its cells, we can homogenize
the differentials with respect to this basis and in this way FX becomes a complex of free
modules over the polynomial ring R = K[x1 , x2 , . . . , xn ]. We say that the polyhedral complex
X supports a resolution of the ideal M if FX is in fact a graded free resolution of M . For
more details and examples of cellular resolutions we refer to [14].
For any σ ∈ Nn we let X≤σ denote the subcomplex of X consisting of faces F for which
aF ≤ σ componentwise. We then have the following criteria, also from [14].
Lemma 2. Let X be a labeled polyhedral complex and let M = MX ⊂ K[x1 , . . . , xn ] denote
the associated monomial ideal generated by the vertices. Then X supports a cellular resolution
of M if and only if the complex X≤σ is K-acyclic (or empty) for all σ ∈ Nn . Futhermore,
the resolution is minimal if and only if aF 6= aG for any pair of faces F ( G.
With this criteria in place we can establish the following.
Theorem 3. For each n ≥ 4 the associahedron An , with the monomial labeling described
above, supports a cellular resolution of the edge ideal Jn .
Proof. Let An denote the n-dimensional simplicial associahedron with this monomial labeling. By construction, the vertices of An correspond to the generators of Jn . To show that An
supports a resolution of Jn , according to Lemma 2 it is enough to show that for any σ ∈ Nn
we have that the subcomplex (An )≤σ is K-acyclic.
Let σ ∈ Nn and let (An )≤σ denote the subcomplex of An consisting of all faces with a
monomial labeling that divides σ (as usual, thinking of σ as the exponent vector of the
monomial xσ1 1 xσ2 2 · · · xσnn ). In particular, a face F ∈ An is an element of (An )≤σ if and only if
for every diagonal xi xj ∈ F we have σi > 0 and σj > 0. We claim that (An )≤σ is contractible
(and hence K-acyclic).
Note that since Jn is squarefree we may assume σ has 0/1 entries, and hence we can
identify σ with a subset of [n]. Also, if σi = 1 for all i (so that σ = [n]) then we have
(An )≤σ = An , which is a convex polytope and hence contractible. If σ has fewer than 2
nonzero entries then (An )≤σ is empty. Without loss of generality, we may then assume that
σ1 = 1 and σn = 0. Let j be the largest integer such that j > 2 and σj = 1.
Now, since j < n and {1, j} ⊂ σ we see that the diagonal (1, j) is a vertex of the simplicial
complex (An )≤σ . In fact, (1, j) is an element of every facet of (An )≤σ since no other diagonal
picked up by the elements of σ intersects (1, j). We conclude that (An )≤σ is a cone and
hence contractible.
For n = 5 one can check that this resolution is in fact minimal, but for n ≥ 6 this is no
longer the case. In particular for n ≥ 6 we have faces F ( G in An with the same monomial
label.
5
4. Standard Young Tableaux
It turns out that the number of i-dimensional faces of the associahedron An (the entries of
the face vector of An ) are given by the number of standard Young tableau (SYT) of certain
shapes. Recall that if λ = (λ1 , λ2 , . . . , λk ) is a partition of n, a standard Young tableaux of
shape λ is a filling of the Young diagram of λ with distinct entries {1, 2, . . . , n} such that
rows and columns are increasing (see Example 5).
For 0 ≤ d ≤ n − 3, we let f (n, d) denote the number of ways to choose d diagonals in a
convex n-gon such that no two diagonals intersect in their interior. We see that f (n, d) is
precisely the number of (d − 1)-dimensional faces of the polytope An . A result attributed to
Cayley (according to [19]) asserts that
1
n+d n−3
(2)
f (n, d) =
.
n+d d+1
d
Using the hook length formula one can see that this number is also the number of standard
Young tableaux of shape
(d + 1, d + 1, 1n−d−3 ),
where as usual
1n−d−3 = 1, . . . , 1
| {z }
(n−d−3)-times
denotes a sequence of n − d − 3 entries with value 1. This fact was apparently first observed
by O’Hara and Zelevinsky (unpublished), and a simple bijection was given by Stanley [19].
Example 4. If we take d = n − 3 we obtain
2n − 3 n − 3
1
2(n − 2)
1
=
,
f (n, n − 3) =
2n − 3 n − 2
n−3
(n − 2) + 1 n − 2
the (n − 2)nd Catalan number.
Example 5. If n = 5 and d = 1 the f (5, 1) =
shape λ = (2, 2, 1) are given by
1 2
3 4
5
1 2
3 5
4
1 3
2 4
5
1 6
6 2
2
1
1 3
2 5
4
= 5 standard Young tableaux of
1 4
2 5
3
These correspond to the 5 diagonals of a 5-gon.
It turns out the Betti numbers of the rings R/Jn are also counted by the number of
standard Young tableaux of certain related (sub)shapes. To establish this result we will
employ Hochster’s formula (Theorem 1 from above). Recall that the ring R/Jn can be
recovered as the Stanley-Reisner ring of the n-cycle, thought of as a 1-dimensional simplicial
complex. Note that when |W | < n the only nonzero contribution to Equation (1) comes from
0-dimensional reduced homology, i.e. the number of connected components of the induced
complex on W (minus one).
n
For n ≥ 4, let βd,j
denote the Betti numbers of the ring R/Jn . Equation (1) implies that
n
for d ≥ 1 we have βd,j
= 0 unless d = n − 2 and j = n, or 1 ≤ d < n − 2 and j = d + 1.
6
n
Another application of Equation (1) gives β1,2
=
cases we have the following result.
n
2
n
− n and βn−2,n
= 1. For the remaining
Theorem 6. For all n ≥ 5 and 1 ≤ d ≤ n − 3 the Betti numbers of R/Jn are given by
(3)
n
βdn = βd,d+1
= the number of standard Young tableau of shape (d + 1, 2, 1n−d−3 ).
Proof. We will establish the equality in Equation (3) by showing that for n ≥ 6 and 1 < d <
n − 4 both sides of the equation satisfy the recursion
n−2
(4)
F (n, d) = F (n − 1, d − 1) + F (n − 1, d) +
.
d+1
For the Betti numbers (the left hand side), we use Hochster’s formula. For each d, the
n
via Equation (1) involves subcomplexes given by subsets W of [n]
computation of βd,d+1
of size d + 1. First suppose we have chosen W ⊂ [n] with n ∈ W . Then we recover the
contribution to Equation (1) from the homology of induced subsets of size d in the cycle on
n−1
the vertices [n − 1], namely βd−1,d
. However, if 1 and n − 1 are both not in W then we get
an additional contribution given by the isolated point n. There are n−3
such instances.
d
Next suppose n ∈
/ W . Then again we recover contribution from the homology of induced
n−1
subsets of size d + 1 in the cycle [n − 1]; this quantity is given by βd,d+1
. In this case we have
an additional contribution coming from the subsets W including both
1 and n − 1, since
n−3
as subsets of the n-cycle these will be disconnected. There are d−1 of these. Putting this
together, we have
n−3
n−3
n−2
n−1
n−1
n−1
n−1
n
βd,d+1 = βd−1,d + βd,d+1 +
+
= βd−1,d + βd,d+1 +
,
d
d−1
d
recovering Equation (4).
We next consider the right hand side of Equation (3), namely the number of standard
Young tableaux of shape (d + 1, 2, 1n−d−3 ). Recall that the fillings involve picking entries
one each from the set {1, 2, . . . , n}. If n is an entry in the first row (necessarily in the last
column) then we recover all such fillings from standard Young tableaux of shape
(d, 2, 1n−d−3 ) = ((d − 1) + 1, 2, 1(n−1)−(d−1)−3 ).
If n is the (only) entry in the last row, then we recover all such fillings from standard Young
tableaux of shape (d + 1, 2, 1n−d−4 ) = (d + 1, 2, 1(n−1)−d−3 ). With these counts we miss the
standard tableaux with n as the entry in the second row (necessarily in the second column).
In this case we must have 1 as the entry in the first row, first column, but are free to choose
any increasing sequence of length d to fill the
remaining entries of the first row (with the rest
n−2
of the entries determined). There are d such choices. Adding these three counts gives
us the desired recursion from Equation (4).
5
We next check the initial conditions. For n = 5 Hochster’s formula again gives us β1,2
=
5
β2,3 = 5. One can check (see Example 5) that there are precisely 5 standard Young tableau
of shape (2, 2, 1) and of its conjugate shape (3, 2).
n
For arbitrary n and d = 1 we have β1,2
= n2 − n, given by the number of generators of
Jn . On the other hand, in a standard Young tableau of shape (2, 2, 1n−4 ) we can have any
pair (i, j) with i < j occupy the second row except
(1, 2), (1, 3), . . . , (1, n), or (2, 3). Hence
the number of such fillings is also given by n2 − n.
7
Similarly, for arbitrary n and d = n−3, Hochster’s formula implies that the Betti numbers
n
βn−3,n−2
are given by all choices of n − 2 vertices of the n-gon corresponding to complements
of diagonals (since
these remaining pair of vertices with be disconnected). Hence again
n
n
βn−3,n−2 = 2 − n (this also follows from the fact that the ring R/Jn is Gorenstein and
therefore has a palindromic sequence of Betti numbers). In terms of tableaux, we see that
the shape (n − 2, 2) is conjugate to (2, 2, 1n−4 ) and hence both shapes have the same number
of fillings.
Remark 7. An application of the hook length formula gives an explicit value for the Betti
numbers of R/Jn :
n
d(n − d − 2)
n
(5)
βd,d+1 =
n−1
d+1
After a version this paper was posted on the ArXiv it was pointed out to the author that
this formula had previously been established in [5], with a combinatorial proof given in [7].
Remark 8. As we have seen, the rings R/Jn are Gorenstein and hence the Betti numbers of
R/Jn are palindromic in the sense that
n
βdn = βn−d−2
.
The realization of the Betti numbers of R/Jn in terms of standard Young tableaux (Theorem 6) provides a nice combinatorial interpretation of this property. The partition (d +
1, 2, 1n−d−3 ) is conjugate to the partition ((n−d−2)+1, 2, 1n−(n−d−2)−3 ) = (n−d−1, 2, 1d−1 )
and hence they have the same number of fillings.
Example 9. For n = 6 the resolution of R/J6 can be represented as
0 ← R ←
←
←
← R ← 0.
In each homological degree we have a basis for the free module given by all standard Young
tableaux of the indicated shape. Note that (2, 2, 1, 1) is conjugate to (4, 2).
5. Discrete Morse theory and matchings
As we have seen, the associahedron An (with the monomial labeling described above)
supports a resolution of the ideal Jn . We have also seen that the resolution is not minimal,
and in particular the labeling of An produces distinct faces F ( G with the same monomial
labeling. In fact as n increases the resolution becomes further and further from minimal in
n
the sense that the number of facets of An (a Catalan number, on the order of n43/2 ) dominates
the dimension of the second highest syzygy module of R/Jn (which is on the order of n2 ).
Example 10. Face numbers versus Betti numbers for n = 6, 7, 8, 9 are indicated below.
Here f (n, j) refers to the number of j-dimensional faces in the Associahedron An .
d=0 1 2 3 4
1 9 16 9 1
f (6, d − 1) 1 9 21 14 1
βd6
8
d=0 1 2 3 4 5
1 14 35 35 14 1
f (7, d − 1) 1 14 56 84 42 1
βd7
d=0 1
2
3
4
5 6
1 20 64 90 64 20 1
f (8, d − 1) 1 20 120 300 330 132 1
βd8
d=0 1
2
3
4
5
6 7
1 27 105 189 189 105 27 1
f (9, d − 1) 1 27 225 825 1485 1287 429 1
βd9
5.1. Morse matchings and first syzygies. Batzies and Welker and others (see [1] and
[18]) have developed a theory of algebraic Morse theory that allows one to match faces of a
labeled complex in order to produce resolutions that become closer to minimal. In the usual
combinatorial description of this theory, one must match elements in the face poset of the
labeled complex that have the same monomial labeling. The matching must also satisfy a
certain acyclic condition, described below. We refer to [1] for further details.
A closer analysis of our monomial labeling of An reveals certain faces that must be matched
away in any minimal resolution, in the sense that the associated monomial has the wrong
degree. In particular, since we know that R/Jn has an ‘almost’ linear resolution (as described
above) it must be the case that in any minimal cellular resolution X , each j-dimensional face
of X is labeled by a monomial of degree j + 2 (for j < n − 3). Our labeling of An has the
property that the monomial m associated to a face F is given by the product of the variables
involved in the choice of diagonals, and in particular a ‘properly’ labeled j-dimensional face
corresponds to a subdivision of Cn with j + 1 diagonals involving precisely j + 2 vertices.
This motivates the following.
Definition 11. Suppose S is a subdivision of the n-gon Cn , by which we mean a collection of
d non-crossing diagonals. We will say that S is proper if the set of endpoints of the diagonals
has exactly d + 1 elements (as vertices of Cn ). We will say that S is superproper if uses more
than d + 1 vertices and subproper if it uses less.
1
2
1
3
6
5
4
2
6
1
3
5
4
2
1
3
6
5
4
1
2
6
3
5
4
2
3
6
5
4
Figure 3. For n = 6, the three superproper subdivisions with d = 2 and the
two subproper subdivisions with d = 3. All other subdivisions of the 6-gon are
proper.
In fact we can explicitly describe a (partial) Morse matching on the monomial-labeled face
poset of An that is ‘perfect’ for rank d = 2. A superproper subdivision of an n-cycle with
d = 2 is simply a pair of disjoint diagonals, say E = {ij, k`} with i < j, k < `, and i < k.
9
In the face poset of An we match this 2-face with the 3-face F , where
{ij, k`, j`} if j < k
F =
{ij, k`, i`} otherwise.
A subproper subdivision with d = 3 is an inscribed triangle, say with diagonals {ij, ik, jk},
i < j < k. We match this face with the (proper) 1-face {ij, jk}. Recall that the Hasse
diagram of the face poset of An is a graph with vertices given by all faces of An , and with
edges given by all cover relations X ≺ Y . It is easy to that our association is a matching
of the Hasse diagram of the face poset of An , and it is clearly ‘algebraic’ in the sense that
matched faces have the same monomial labeling.
As is typical we think of the Hasse diagram as a directed graph with the orientation on
a matched edge pointing up (increasing dimension), and with all unmatched edges pointing
down. The collection of faces not involved in the matching are called the ‘critical cells’, they
form a subposet of the original poset. The main theorem of (algebraic) discrete Morse theory
[1] says that if we have an acyclic (algebraic) matching on the Hasse diagram of a cellular
resolution, then the critical cells form a monomial-labeled CW-complex that also supports a
cellular resolution. In this way one can obtains a resolution that is closer to being minimal.
In our case we have the following result.
Proposition 12. For all n ≥ 6, the matching on the monomial labeled face poset of An
described above is acyclic. Furthermore, the number of unmatched (critical) edges is given
by β2n .
Proof. We first make the simple observation that if F is any 2-face of An corresponding
to a subproper subdivision (in other words an inscribed triangle), there for any 1-face E
with E ≺ F we must have that E is a path of length 2 (a proper subdivision with d = 2).
Similarly, if E is a path of length 2 and E ≺ F is an upward oriented edge then it must
be the case that F is an inscribed triangle with the same vertex set as E. This implies
that there cannot be any cycles in the oriented face poset involving proper subdivisions with
d = 2 (paths of length 2).
Next suppose E ≺ F is an upward oriented edge in the face poset of An where E consists
of two disjoint diagonals (a superproper subdivision with d = 2). Then according to our
matching it must be the case that F is a path of length 3. To form a cycle in the face poset
there must be some downward edge from F to E 0 with E 0 ≺ F . But then according to our
matching it must be the case that E 0 is a path of length 2. Hence our observation from the
previous paragraph implies that no cycles exist. We conclude that the matching is acyclic.
We next count the unmatched edges. First observe that the number of proper subdivisions
of an n-gon with 2 diagonals is given by n(n−3)(n−4)
. To see this, note that the diagonals
2
involved in such a subdivision must form a path of length 3. Once
we designate the middle
n−3
vertex in this path (of which there are n choices) we have 2 choices for the remaining
two vertices. Next we claim that the the number of subproper subdivisions of an n-gon with
d = 3 diagonals (necessarily forming an inscribed triangle) is given by n(n−4)(n−5)
. To see
6
this, we first count inscribed triangles with ordered vertex set (v1 , v2 , v3 ). We are free to
choose the first vertex v1 from among the n nodes of the cycle. For the second vertex we
have two cases. If we choose v2 from among the two vertices that are distance 2 from v1 ,
we are left with (n − 5) choices for v3 . If we choose v2 from among the vertices more than
distance 2 from v1 (of which there are n − 5 choices), we are then left with n − 6 choices for
10
v3 . In total there are
n(2(n − 5) + (n − 5)(n − 6)) = n(n − 4)(n − 5)
inscribed triangles with the ordered vertex set. Dividing out by 6 to forget the ordering
gives us the desired count. As described above, we match each of the d = 2 superproper
subdivisions with a d = 3 proper subdivision, and we match each of the d = 3 subproper
subdivisions with a d = 2 proper subdivision. Hence after matching the number of critical
edges is given by
n(n − 3)(n − 4) n(n − 4)(n − 5)
n 2(n − 4)
−
=
,
2
6
3
n−1
which is precisely β2n (see Remark 7). This completes the proof.
Hence our simple matching leaves precisely the number of critical 1-cells that we require.
The rank of the first free module in the resulting cellular resolution will be equal to the rank
of the first syzygy module of R/Jn .
Example 13. For n = 6 this matching in fact leads to a minimal resolution of J6 . In this
case we have three superproper subdivisions with d = 2 (namely {13, 46}, {15, 24}, and
{26, 35}), and two subproper subdivisions with d = 3 (namely {13, 15, 35} and {24, 26, 46}).
x1x3
x1x5
x3x5
x1x4
x2x5
x3x6
x2x4
x4x6
x2x6
Figure 4. The monomial labeled A6 with five pairs of faces matched (the
shaded faces are the improper subdivisions). The resulting complex on the
right supports a minimal resolution of J6 .
We remark that the procedure described above can be extended to the case n = 7. We
leave the details to the reader but point out that in this case we have:
• 14 superproper subdivisions with d = 2 (pairs of disjoint diagonals), corresponding
to 14 edges of A7 that we match with 2-faces,
• 7 subproper subdivisions with d = 3 (inscribed triangles in a 7-gon), corresponding
to seven 2-faces that each get matched with an edge,
• 14 superproper subdivisions with d = 3 (forests consisting of three edges and two
components), corresponding to seven 2-faces that get matched to a 3-face,
11
• 14 subproper subdivisions with d = 4 (inscribed triangles with a pendant edge),
corresponding to fourteen 3-faces that get matched down to a 2-face.
The resulting CW-complex has 56 − 14 − 7 = 35 edges, 84 − 14 − 7 − 14 − 14 = 35
two-dimensional faces, and 42 − 28 = 14 three-dimensional faces, as desired. Unfortunately
we do not know how to extend this matching procedure in general; see the next Section for
some comments regarding this.
5.2. An involution of the associahedron tableaux. Recall that the faces of the associahedron An are counted by standard Young tableaux of certain shapes, while the Betti
numbers of Jn are counted by standard Young tableaux of certain subshapes. Again motivated by discrete Morse theory this leads to ask whether we can find a matching on the
set of associahedron tableaux such that the unmatched elements correspond to the Betti
numbers of Jn . This matching should have the property that two matched tableaux differ in
cardinality by one. Let us emphasize that since we do not have a poset structure on these
elements we are not at this pointing searching for a M orse matching. Let us first fix some
notation.
Definition 14. For fixed n ≥ 4 and 1 ≤ d ≤ n − 3, we call the collection of standard Young
tableaux of shape (d + 1, d + 1, 1n−d−3 ) the associahedron tableaux (denoted by An ), and the
n−d−3
standard S
Young tableaux
) the syzygy tableaux (denoted by Sn ).
S of shape (d + 1, 2, 1
Let A = An and S = Sn .
Note that an element of An has n + d − 1 boxes, whereas an element of Sn has n boxes. If
X ∈ An is an associahedron tableux with largest entries in the second row in the positions
(∗, ∗, n + 1, n + 2, . . . , n + d − 1) then it naturally becomes a syzygy tableau by just removing
those boxes. In particular we say that these particular associahedron tableau restrict to
syzygy tableaux, and in this way we have a natural inclusion Sn ⊂ An .
Example 15. The associahedron tableau on the left restricts to a syzygy tableau, whereas
the associahedron tableau on the right does not. Here n = 7 and d = 3.
∗ ∗ ∗ ∗
∗ ∗ ∗ ∗
∗ ∗ 8 9
∗ ∗
∗
→ ∗
∗ ∗ ∗ ∗
∗ ∗ ∗ 8
9
We next describe an involution on the set A such that the fixed elements are precisely
the elements that restrict to S. If X is a standard young tableau we use |X| to denote the
number of boxes in the underlying partition.
Proposition 16. There exists an involution σ on the set A such that the fixed point set of
σ is precisely the set of tableaux in A that restrict to S. Furthermore, if X ∈ A such that
σ(X) 6= X, we have |σ(X)| = |X| ± 1.
Proof. Suppose X ∈ An is an associahedron tableau. If X restricts to a syzygy tableau we
set σ(X) = X. Otherwise some element of {n + 1, n + 2, . . . , n + d − 1} is not in the second
row of X; let i be the largest element with this property. Then i must be the last element
of the first row, or else the bottom element in the first column.
In the latter case (i is the bottom most element of first column) we bring that element i
to the first row, and add the element n + d to the end of the second row. This defines σ(X).
In the former case (i is the last element of the first row) we obtain σ(X) by bringing that
12
element down to the bottom of the first column and deleting the last element of the second
row (which must be n + d − 1). It is clear that σ(σ(X)) = X.
Example 17. An example of the involution matching an associahedron tableau of shape
(3, 3, 1, 1) with one of shape (4, 4, 1) is given by the following.
∗ ∗ ∗
∗ ∗ ∗
∗ ∗ ∗ 8
∗
∗ ∗ ∗ 9
8
↔ ∗
6. Further questions
We end with a number of questions that arise from our study. As we have seen in Section
4, the number f (n, d) of dissections of an n-gon using d (non-crossing) diagonals is well
understood, and is given by the number of standard Young tableaux of shape (d + 1, d +
1, 1n−d−3 ). In the context of enumerating the Betti numbers of the ideal Jn we were interested
in subdivisions that involved a fixed number of vertices. Define f (n, d, j) to be the number
of ways to choose d non-crossing diagonals in a convex n-gon such that the set of endpoints
consists of precisely j vertices of the n-gon.
Question 18. Is there a nice formula for f (n, d, j)? Can it be related to the standard Young
tableaux of shape (d + 1, d + 1, 1n−d−3 )?
We note that if we take d = n − 3 then varying j gives a refinement of the Catalan numbers
which (as far as we know) has not appeared elsewhere. The first few refinements are
14 = 2 + 12, 42 = 14 + 28, 132 = 4 + 64 + 64, . . .
A related question would be to consider those subdivisions for which the collection of
diagonals forms a (connected) tree, since this is likely the more relevant property in the
context of syzygies. For n ≤ 7 it so happens that the proper subdivisions correspond to
those collections of diagonals that form a tree. However, for n = 8 there exist proper
subdivisions that are not trees: for example if d = 4 we can take 3 diagonals to form a
triangle with vertices {1, 3, 5} along with one disconnected diagonal {6, 8}, in total using 5
vertices of the 8-gon.
Question 19. How many dissections of an n-gon with d diagonals have the property that
the set of diagonals forms a tree?
In our quest for a Morse matching on the monomial labeled face poset of the associahedron
An we were unable to employ Stanley’s bijection between faces of An and standard Young
tableaux. As mentioned above, the difficulty arises as the bijection given in [19] is recursively
defined and involves certain choices. However, the fact that the face poset of An is labeled
by standard Young tableaux suggests that there might be a meaningful poset structure on
the set of all standard Young tableaux (or at least the set of Associahedron tableaux). The
hope would be that this poset structure extends the partial order given by the involution on
A described in the proof of Proposition 16. Hence the poset should be graded by the number
of boxes in the underlying partition, but will not restrict to Young’s lattice if one forgets
the fillings. We refer to Example 17 for a example of a cover relation between two standard
Young tableaux such that the underlying partitions are not related in Young’s lattice.
13
Question 20. Does there exist a meaningful poset structure on the set of standard Young
tableaux, consistent with the conditions described above?
Finally, we see in Figure 4 that a minimal resolution of J6 is supported on a 3-dimensional
polytope. As we mentioned the construction there was a bit ad hoc but it does lead us to
following:
Question 21. Does the ideal Jn have a minimal cellular resolution supported on a (necessarily (n − 3)-dimensional) polytope?
Work in this direction (along with some further generalizations) is currently being pursued
by Engström and Linusson [10].
Acknowledgements. We thank Ken Baker for his assistance with the figures, and Alex
Engström, Jakob Jonsson, and Michelle Wachs for helpful conversations. Alex and I first
realized the potential connection to standard Young tableaux after inputting the Betti numbers of Jn into OEIS [16] some years ago. Thanks also to the anonymous referee for a careful
reading.
References
[1] E. Batzies, V. Welker, Discrete Morse theory for cellular resolutions, J. Reine Angew. Math. 543 (2002),
147–168.
[2] D. Bayer, B. Sturmfels, Cellular resolutions of monomial modules, J. Reine Angew. Math. 502 (1998),
123–140.
[3] J. Biermann, Cellular structure on the minimal resolution of the edge ideal of the complement of the
n-cycle, submitted.
[4] B. Braun, J. Browder, and S. Klee, Cellular resolutions of ideals defined by nondegenerate simplicial
homomorphisms, Israel J. Math. (2012), 1–24.
[5] W. Bruns , T. Hibi, Cohen-Macaulay partially ordered sets with pure resolutions, European J. Combin.
19 (1998), 779–785.
[6] C. Ceballos, F. Santos, G. Ziegler, Many non-equivalent realizations of the associahedron, Combinatorica
35 (2015): 513. doi:10.1007/s00493-014-2959-9
[7] S. Choi, J.S. Kim, A combinatorial proof of a formula for Betti numbers of a stacked polytope, Electron.
J. Combin., 17 (2010), Research Paper # R9.
[8] A. Dochtermann, A. Engström, Cellular resolutions of cointerval ideals, Math. Z. 270 (2012), no. 1-2,
145–163.
[9] A. Dochtermann, F. Mohammadi, Cellular resolutions from mapping cones, J. Combin. Theory Ser. A
128 (2014), 180–206.
[10] A. Engström, S. Linusson, personal communication, 2016.
[11] C. Francisco, J. Mermin, J. Schweig, Catalan numbers, binary trees, and pointed pseudotriangulations,
European J. Combin. 45 (2015), 85–96.
[12] A. Goodarzi, Cellular structure for the Herzog-Takayama Resolution, J. Algebr. Comb. 41 (1) (2015),
21–28.
[13] J. Mermin, The Eliahou-Kervaire resolution is cellular, J. Commut. Algebra 2 (2010), no. 1, 55–78.
[14] E. Miller, B. Sturmfels, Combinatorial commutative algebra, Graduate Texts in Mathematics, vol. 227.
Springer, New York (2005).
[15] U. Nagel, V. Reiner, Betti numbers of monomial ideals and shifted skew shapes, Electron. J. Combin.
16 (2009), no. 2, Special volume in honor of Anders Björner, Research Paper 3, 59 pp.
[16] The On-Line Encyclopedia of Integer Sequences, published electronically at http://oeis.org, 2014.
[17] A. Sinefakopoulos, On Borel fixed ideals generated in one degree, J. Algebra 319 (2008), no. 7, 2739–
2760.
[18] E. Sköldberg, Morse theory from an algebraic viewpoint, Trans. Amer. Math. Soc. 358 (2006), 115–129.
14
[19] R. Stanley, Polygon dissections and standard Young tableaux, J. Combin. Theory Ser. A 76 (1996),
175–177.
[20] S. Sturgeon, personal communication, 2013.
15
| 0math.AC
|
arXiv:1605.00050v1 [cs.SY] 30 Apr 2016
DSP IMPLEMENTATION OF A DIRECT ADAPTIVE FEEDFOWARD CONTROL
ALGORITHM FOR REJECTING REPEATABLE RUNOUT IN HARD DISK DRIVES
Jinwen Pan
Prateek Shah
Roberto Horowitz
Department of Mechanical Engineering Department of Mechanical Engineering Department of Mechanical Engineering
University of California, Berkeley
University of California, Berkeley
University of California, Berkeley
Berkeley, California 94720
Berkeley, California 94720
Berkeley, California 94720
Email: [email protected]
Email: [email protected]
Email: [email protected]
ABSTRACT
A direct adaptive feedforward control method for tracking repeatable runout (RRO) in bit patterned media recording
(BPMR) hard disk drives (HDD) is proposed. The technique estimates the system parameters and the residual RRO simultaneously and constructs a feedforward signal based on a known regressor. An improved version of the proposed algorithm to avoid
matrix inversion and reduce computation complexity is given.
Results for both MATLAB simulation and digital signal processor (DSP) implementation are provided to verify the effectiveness
of the proposed algorithm.
1
are briefly listed here: (1) RRO profile is unknown; (2) RRO
frequency spectrum can spread beyond the bandwidth of servo
system, therefore, it will be amplified by the feedback controller;
(3) RRO spectrum contains many harmonics of the spindle frequency (e.g. ∼ 200 harmonics) that should be attenuated, which
increases the computational burden in the controller; (4) RRO
profile is changing from track to track (i.e. it is varying on the
radial direction); (5) HDD servo dynamics changes from drive to
drive and by temperature [9].
The remainder of this paper is organized as follows. Section 2 presents our direct adaptive feedforward control algorithm
and section 3 shows the real time DSP implementation results.
INTRODUCTION
Data bits are ideally written on concentric circular tracks in conventional HDDs that use magnetic disks with continuous media. This process is different in bit patterned media recording
since data should be written on tracks with predetermined shapes,
which are created by lithography on the disk [1, 2]. As shown
in Fig. 1 the trajectories that are required to be followed by the
servo system in BPMR are servo tracks, which are characterized
by the servo sectors written on the disk. Deviation of a servo
track from an ideal circular shape is called RRO. Therefore, the
servo controller in BPMR has to follow the RRO which is unknown in the time of design, and as a result the servo control
methodologies used for conventional drives [3] cannot be applied to BPMR directly. In our prior works, we proposed indirect
adaptive control methods for mechatronic devices to compensate
for unknown disturbances (such as RRO) [4, 5, 6] and dynamics
mismatches [7, 8]. In this paper, we propose a direct adaptive
control method to address challenges specific to BPMR which
Servo tracks
Conventional media
Data tracks
Bit-patterned media
FIGURE 1: Servo Track (dotted blue) and data track (solid red)
in conventional and bit-patterned media
2
Control Design
The architecture that is considered for the servo control system
is shown in Fig. 2. An add-on feedforward controller is designed
for HDD. Without loss of generality, we chose VCM as an example. Here, R is the transfer function from VCM input to PES,
0 Submitted to ASME 2016 Conference on Information Storage and Processing Systems
1
Copyright c 2016 by ASME
uf
e
R
ua
ua
ue
r
R
−n̂b with n̂ the estiwhere B̂ q−1 = b̂1 (k) q−1
b
+ · · · + b̂Tn̂b (k) q
−1
mate of nb . Since A q
r (k) = θR̄ φr (k) with θR̄ an unknown
vector and φr (k) a nonzero vector, from Eq. (5) we have
e
θ̂D (k) + θR̄ (k) = D−1
(k) θ̂M (k) ,
B̂
where DB̂ (k)
can be formed based on the magnitude and phase
of B̂ e− jωi , i = 1, 2, · · · , nr with nr the number of frequencies to
cancel. The updating law for θ̂D (k) is
FIGURE 2: Control architecture.
ue is an exogenous excitation signal, ua is the feedforward signal, r is the unknown RRO with known frequencies and e is the
PES. We aim to design an adaptive controller that generates ua
in order to fade the frequency contents of the error signal e at selective frequencies which correspond to the harmonics of spindle
frequency (120Hz and its harmonics in our case).
θ̂D (k + 1) = θ̂D (k) − αD−1
(k) θ̂M (k) .
B̂
(6)
The inverse of DB̂ (k) involves inverting the estimated magnitudes that might be very small in transition, especially when θ̂B
is initialized by zeros. In that case, any small fluctuation of θ̂B
can cause large transient
error. A smoothing on magnitude and
phase of B̂ e− jωi has to be designed to relax transient errors.
The basic direct adaptive feedforward control algorithm is summarized in Table. 1.
2.1
Basic Direct Adaptive Feedforward Control
From Fig. 2, the PES can be written as
e (k) = R q−1 (ue (k) + ua (k)) + r (k) ,
where R q−1 = B q−1 /A q−1 and can be expanded as
T
e (k) = A∗ q−1 e (k) + B q−1 ue (k) + θM
φr (k) ,
(1)
where A
q−1 = 1−A∗ q−1 , A∗ q−1 = a1 q−1 +· · ·+ana q−na ,
B q−1 = b1 q−1 + · · · + bnb q−nb and the residual error
T
θM
φr (k) = B q−1 ua (k) + A q−1 r (k) ,
(2)
0.
1.
2.
3.
4.
5.
where φr (k) is the regressor for RRO with known frequencies.
In regressor form, PES is
Initialize the regressors φe (k), φue (k) and φr (k);
Apply ue (k) and ua (k) to VCM;
Subtract ê(k) from PES to determine the estimate error ẽ(k);
Update the parameters θ̂ (k) using Eq. (3);
Update the matrix DB̂ (k) from θ̂B (k) and compute its inverse;
Update θ̂D (k) using Eq. (6) and compute ua (k) from Eq. (4).
TABLE 1: Basic Direct Adaptive Feedforward Control
T
e (k) = θAT φe (k) + θBT φue (k) + θM
φr (k) ,
and its estimation
ê (k) = θ̂AT
(k) φe (k) + θ̂BT
2.2
Improved Direct Adaptive Feedforward Control
As mentioned earlier, computational complexity of inverting DB̂ (k) grows as the number of frequencies increases which
is a crucial burden in DSP implementation. In this section, we
will provide an improved version to avoid matrix inversion. By
applying “swapping lemma” to (5), we have
T
(k) φue (k) + θ̂M
(k) φr (k) ,
where θAT = [a1 , a2 , · · · , ana ], φe (k), θBT = b1 , b2 , · · · , bnb and
φue (k) are regressors for e(k) and ue (k). θ̂A , θ̂B and θ̂M are the
estimates of θA , θB and θM and the updating law is
θ̂ (k + 1) = θ̂ (k) + K (k) φ (k) ẽ (k) / 1 + φ T (k) φ (k) , (3)
T (k) T ,
where ẽ (k) = e (k) − ê (k), θ̂ (k) = θ̂AT (k) , θ̂BT (k) , θ̂M
T (k) , φ T (k) T and K(k) is a decreasing gain.
φ (k) = φeT (k) , φue
r
Eq. (3) indicates that both of the system and the residual RRO
are estimated simultaneously. The feedforward control signal is
constructed using the same regressor as the RRO yielding
T
(k) φr (k) ,
θ̂DT (k) B̂ q−1 φr (k) + A q−1 r (k) = θ̂M
(7)
therefore, the updating law for θ̂D (k) is
T
(k) φr (k) .
θ̂D (k + 1) = θ̂D (k) − α B̂ q−1 φr (k) θ̂M
(8)
Note that in (8) no matrix inverse is required. The improved direct adaptive feedforward control algorithm is summarized in Table. 2 where the first three steps are the same as those in Table. 1.
To be noted here, the proposed direct adaptive feedforward control algorithm and its improved version can be directly extended
to the second-stage actuator which is mili-actuator (MA) responsible for high frequency RRO.
ua (k) = θ̂DT (k) φr (k) .
(4)
In Eq. (2), using θ̂M (k) and B̂ q−1 instead of θM and B(q−1 ),
approximately we have
T
B̂ q−1 θ̂DT (k) φr (k) + A q−1 r (k) = θ̂M
(k) φr (k) ,
(5)
2
Copyright c 2016 by ASME
Acknowledgment
Am plitude Spectrum (nm )
0.5
Adaptive Controller Off
Adaptive Controller On
0.4
Financial support for this study was provided by a grant from the
Advanced Storage Technology Consortium (ASTC).
0.3
REFERENCES
[1] Shahsavari, B., Keikha, E., Zhang, F., and Horowitz, R.,
2015. “Adaptive repetitive control design with online secondary path modeling and application to bit-patterned media
recording”. Magnetics, IEEE Transactions on, 51(4), pp. 1–
8.
[2] Keikha, E., Shahsavari, B., Al-Mamun, A., and Horowitz,
R., 2013. “A probabilistic approach to robust controller design for a servo system with irregular sampling”. In Control
and Automation (ICCA), 2013 10th IEEE International Conference on, IEEE, pp. 1790–1795.
[3] Kempf, C., Messner, W., Tomizuka, M., and Horowitz, R.,
1993. “Comparison of four discrete-time repetitive control algorithms”. IEEE Control Systems Magazine, 13(6),
pp. 48–54.
[4] Shahsavari, B., Keikha, E., Zhang, F., and Horowitz, R.,
2014. “Repeatable runout following in bit patterned media
recording”. In ASME 2014 Conference on Information Storage and Processing Systems, American Society of Mechanical Engineers, pp. V001T03A001–.
[5] Shahsavari, B., Keikha, E., Zhang, F., and Horowitz, R.,
2014. “Adaptive repetitive control using a modified filteredx lms algorithm”. In ASME 2014 Dynamic Systems and
Control Conference, American Society of Mechanical Engineers, pp. V001T13A006–.
[6] Shahsavari, B., Pan, J., and Horowitz, R., 2016. “Adaptive
rejection of periodic disturbances acting on linear systems
with unknown dynamics”. arXiv preprint arXiv:1603.05361.
[7] Zhang, F., Keikha, E., Shahsavari, B., and Horowitz, R.,
2014. “Adaptive mismatch compensation for vibratory gyroscopes”. In Inertial Sensors and Systems (ISISS), 2014
International Symposium on, IEEE, pp. 1–4.
[8] Zhang, F., Keikha, E., Shahsavari, B., and Horowitz, R.,
2014. “Adaptive mismatch compensation for rate integrating vibratory gyroscopes with improved convergence
rate”. In ASME 2014 Dynamic Systems and Control
Conference, American Society of Mechanical Engineers,
pp. V003T45A003–V003T45A003.
[9] Bagherieh, O., Shahsavari, B., and Horowitz, R., 2015. “Online identification of system uncertainties using coprime factorizations with application to hard disk drives”. In ASME
2015 Dynamic Systems and Control Conference, American Society of Mechanical Engineers, pp. V002T23A006–
V002T23A006.
0.2
0.1
0
20
40
60
80
100
Ha rm o nic
120
140
160
VCM Inp. (V)
FIGURE 3: Spectrum comparison.
0.5
0
-0.5
0
50
100
150
200
250
300
350
200
250
300
350
MA Inp. (V)
Step
1
0
-1
0
50
100
150
Step
FIGURE 4: Feedforward signal for VCM and MA.
..
.
4. Construct the matrix B̂ q−1 (k) φr (k) and compute residual
T (k) φ (k);
error θ̂M
r
5. Update θ̂D (k) using Eq. (8) and compute ua (k) from Eq. (4).
TABLE 2: Improved Dreict Adaptive Feedforward Control
3
Experiment Results and Conclusion
We implement both of the two algorithms in MATLAB simulation and the real time experiment setup on dual-stage HDD. In
simulation, R and RRO together with NRRO are modeled from
real system measurement data. Since the simulation and experiment results were very close, only experiment results using the
improved version are shown in Fig. 3, where RRO is reduced
to NRRO level. In simulation as well as in experiments, VCM
was responsible for the low frequency RRO (harmonics up to 58),
while MA was responsible for the high frequency RRO (harmonics from 59 to 173). As a result, the feedforward control signal
in one disk revolution shown in Fig. 4 for the VCM consists of
low frequency contents while for the MA it has high frequency
components.
3
Copyright c 2016 by ASME
| 3cs.SY
|
c Springer-Verlag, 2014. This is the author’s version of the work. It is posted here by permission
of Springer-Verlag for your personal use. Not for redistribution. The final publication is published
in the proceedings of the 3rd Conference on Principles of Security and Trust (POST ’14), and is
available at link.springer.com
arXiv:1401.4339v2 [cs.CR] 21 Jan 2014
Information Flow Control in WebKit’s
JavaScript Bytecode
Abhishek Bichhawat1 , Vineet Rajani2 , Deepak Garg2 , and Christian Hammer1
1
Saarland University, Germany
2
MPI-SWS, Germany
Abstract. Websites today routinely combine JavaScript from multiple sources, both trusted and untrusted. Hence, JavaScript security is
of paramount importance. A specific interesting problem is information
flow control (IFC) for JavaScript. In this paper, we develop, formalize
and implement a dynamic IFC mechanism for the JavaScript engine of a
production Web browser (specifically, Safari’s WebKit engine). Our IFC
mechanism works at the level of JavaScript bytecode and hence leverages years of industrial effort on optimizing both the source to bytecode
compiler and the bytecode interpreter. We track both explicit and implicit flows and observe only moderate overhead. Working with bytecode
results in new challenges including the extensive use of unstructured
control flow in bytecode (which complicates lowering of program context
taints), unstructured exceptions (which complicate the matter further)
and the need to make IFC analysis permissive. We explain how we address these challenges, formally model the JavaScript bytecode semantics
and our instrumentation, prove the standard property of terminationinsensitive non-interference, and present experimental results on an optimized prototype.
Keywords: Dynamic information flow control, JavaScript bytecode, taint
tracking, control flow graphs, immediate post-dominator analysis
1
Introduction
JavaScript (JS) is an indispensable part of the modern Web. More than 95% of
all websites use JS for browser-side computation in Web applications [1]. Aggregator websites (e.g., news portals) integrate content from various mutually
untrusted sources. Online mailboxes display context-sensitive advertisements.
All these components are glued together with JS. The dynamic nature of JS
permits easy inclusion of external libraries and third-party code, and encourages
a variety of code injection attacks, which may lead to integrity violations. Confidentiality violations like information stealing are possible wherever third-party
code is loaded directly into another web page [2]. Loading third-party code into
separate iframes protects the main frame by the same-origin policy, but hinders
interaction that mashup pages crucially rely on and does not guarantee absence
of attacks [3]. Information flow control (IFC) is an elegant solution for such
problems. It ensures security even in the presence of untrusted and buggy code.
IFC for JS differs from traditional IFC as JS is extremely dynamic [3,1], which
makes sound static analysis difficult.
Therefore, research on IFC for JS has focused on dynamic techniques. These
techniques may be grouped into four broad categories. First, one may build
an IFC-enabled, custom interpreter for JS source [4,5]. This turns out to be extremely slow and requires additional code annotations to handle semi-structured
control flow like exceptions, return-in-the-middle, break and continue. Second,
we could use a black-box technique, wherein an off-the-shelf JS interpreter is
wrapped in a monitor. This is nontrivial, but doable with only moderate overhead and has been implemented in secure multi-execution (SME)[6,7]. However,
because SME is a black-box technique, it is not clear how it can be generalized
beyond non-interference [8] to handle declassification [9,10]. Third, some variant
of inline reference monitoring (IRM) might inline taint tracking with the client
code. Existing security systems for JS with IRM require subsetting the language
in order to prevent dynamic features that can invalidate the monitoring process.
Finally, it is possible to instrument the runtime system of an existing JS engine,
either an interpreter or a just-in-time compiler (JIT), to monitor the program
on-the-fly. While this requires adapting the respective runtime, it incurs only
moderate overhead because it retains other optimizations within the runtime
and is resilient to subversion attacks.
In this work, we opt for the last approach. We instrument a production
JS engine to track taints dynamically and enforce termination-insensitive noninterference [11]. Specifically, we instrument the bytecode interpreter in WebKit,
the JS engine used in Safari and other open-source browsers. The major benefit
of working in the bytecode interpreter as opposed to source is that we retain
the benefits of these years of engineering efforts in optimizing the production
interpreter and the source to bytecode compiler.
We describe the key challenges that arise in dynamic IFC for JS bytecode (as
opposed to JS source), present our formal model of the bytecode, the WebKit JS
interpreter and our instrumentation, present our correctness theorem, and list
experimental results from a preliminary evaluation with an optimized prototype
running in Safari. In doing so, our work significantly advances the state-of-the-art
in IFC for JS. Our main contributions are:
– We formally model WebKit’s bytecode syntax and semantics, our instrumentation for IFC analysis and prove non-interference. As far as we are aware,
this is the first formal model of bytecode of an in-production JS engine. This
is a nontrivial task because WebKit’s bytecode language is large (147 bytecodes) and we built the model through a careful and thorough understanding
of approximately 20,000 lines of actual interpreter code.3
3
Unlike some prior work, we are not interested in modeling semantics of JS specified
by the ECMAScript standard. Our goal is to remain faithful to the production
bytecode interpreter. Our formalization is based on WebKit build #r122160, which
was the last build when we started our work.
– Using ideas from prior work [12], we use on-the-fly intra-procedural static
analysis of immediate post-dominators to restrict overtainting, even with
bytecode’s pervasive unstructured conditional jumps. We extend the prior
work to deal with exceptions. Our technique covers all unstructured control
flow in JS (including break and continue), without requiring additional code
annotations of prior work [5] and improves permissiveness.
– To make IFC execution more permissive, we propose and implement a bytecode-specific variant of the permissive-upgrade check [13].
– We implement our complete IFC mechanism in WebKit and observe moderate overheads.
Limitations We list some limitations of our work to clarify its scope. Although
our instrumentation covers all WebKit bytecodes, we have not yet instrumented
or modeled native JS methods, including those that manipulate the Document
Object Model (DOM). This is ongoing work, beyond the scope of this paper.
Like some prior work [4], our sequential non-interference theorem covers only
single invocations of the JS interpreter. In reality, JS is reactive. The interpreter
is invoked every time an event (like a mouse click) with a handler occurs and
these invocations share state through the DOM. We expect that generalizing to
reactive non-interference [14] will not require any instrumentation beyond what
we already plan to do for the DOM. Finally, we do not handle JIT-compilation
as it is considerably more engineering effort. JIT can be handled by inlining our
IFC mechanism through a bytecode transformation.
Due to lack of space, several proofs and details of the model have been omitted
from this paper. They can be found in the technical appendix (Section 8).
2
Related Work
Three classes of research are closely related to our work: formalization of JS semantics, IFC for dynamic languages, and formal models of Web browsers. Maffeis
et al. [15] present a formal semantics for the entire ECMA-262 specification, the
foundation for JS 3.0. Guha et al. [16] present the semantics of a core language
which models the essence of JS and argue that all of JS 3.0 can be translated to
that core. S5 [17] extends [16] to include accessors and eval. Our work goes one
step further and formalizes the core language of a production JS engine (WebKit), which is generated by the source-to-bytecode compiler included in WebKit.
Recent work by Bodin et al. [18] presents a Coq formalization of ECMAScript
Edition 5 along with an extracted executable interpreter for it. This is a formalization of the English ECMAScript specification whereas we formalize the JS
bytecode implemented in a real Web browser.
Information flow control is an active area of security research. With the
widespread use of JS, research in dynamic techniques for IFC has regained momentum. Nonetheless, static analyses are not completely futile. Guarnieri et
al. [19] present a static abstract interpretation for tracking taints in JS. However, the omnipresent eval construct is not supported and this approach does
not take implicit flows into account. Chugh et al. propose a staged information
flow approach for JS [20]. They perform server-side static policy checks on statically available code and generate residual policy-checks that must be applied
to dynamically loaded code. This approach is limited to certain JS constructs
excluding dynamic features like dynamic field access or the with construct.
Austin and Flanagan [21] propose purely dynamic IFC for dynamically-typed
languages like JS. They use the no-sensitive-upgrade (NSU) check [22] to handle implicit flows. Their permissive-upgrade strategy [13] is more permissive
than NSU but retains termination-insensitive non-interference. We build on the
permissive-upgrade strategy. Just et al. [12] present dynamic IFC for JS bytecode
with static analysis to determine implicit flows precisely even in the presence of
semi-unstructured control flow like break and continue. Again, NSU is leveraged to prevent implicit flows. Our overall ideas for dealing with unstructured
control flow are based on this work. In contrast to this paper, there was no formalization of the bytecodes, no proof of correctness, and implicit flow due to
exceptions was ignored.
Hedin and Sabelfeld propose a dynamic IFC approach for a language which
models the core features of JS [4], but they ignore JS’s constructs for semi-structured control flow like break and continue. Their approach leverages a dynamic
type system for JS source. To improve permissiveness, their subsequent work [23]
uses testing. It detects security violations due to branches that have not been
executed and injects annotations to prevent these in subsequent runs. A further
extension introduces annotations to deal with semi-structured control flow [5].
Our approach relies on analyzing CFGs and does not require annotations.
Secure multi-execution (SME) [6] is another approach to enforcing noninterference at runtime. Conceptually, one executes the same code once for each
security level (like low and high) with the following constraints: high inputs are
replaced by default values for the low execution, and low outputs are permitted
only in the low execution. This modification of the semantics forces even unsafe
scripts to adhere to non-interference. FlowFox [7] demonstrates SME in the context of Web browsers. Executing a script multiple times can be prohibitive for
a security lattice with multiple levels. Further, all writes to the DOM are considered publicly visible output, while tainting allows persisting a security label
on DOM elements. It is also unclear how declassification may be integrated into
SME. Austin and Flanagan [24] introduce a notion of faceted values to simulate
multiple executions in one run. They keep n values for every variable corresponding to n security levels. All the values are used for computation as the program
proceeds but the mechanism enforces non-interference by restricting the leak of
high values to low observers.
Browsers work reactively; input is fed to an event queue that is processed
over time. Input to one event can produce output that influences the input to
a subsequent event. Bohannon et al. [14] present a formalization of a reactive
system and compare several definitions of reactive non-interference. Bielova et
al. [25] extend reactive non-interference to a browser model based on SME. This
is currently the only approach that supports reactive non-interference for JS. We
will extend our work to the reactive setting as the next step.
Finally, Featherweight Firefox [26] presents a formal model of a browser based
on a reactive model that resembles that of Bohannon et al. [14]. It instantiates
the consumer and producer states in the model with actual browser objects like
window, page, cookie store, mode, connection, etc. Our current work entirely
focuses on the formalization of the JS engine and taint tracking to monitor
information leaks. We believe these two approaches complement each other and
plan to integrate such a model into our future holistic enforcement mechanism
spanning JS, the DOM and other browser components.
3
Background
We provide a brief overview of basic concepts in dynamic enforcement of information flow control (IFC). In dynamic IFC, a language runtime is instrumented
to carry a security label or taint with every value. The taint is an element of a
pre-determined lattice and is an upper bound on the security levels of all entities
that have influenced the computation that led to the value. For simplicity of exposition, we use throughout this paper a three-point lattice {L, H, ?} (L = low
or public, H = high or secret, ? = partially leaked secret), with L v H v ? [13].
For now, readers may ignore ?. Our instrumentation works over a more general
powerset lattice, whose individual elements are Web domains. We write r` for a
value r tagged with label `.
Information flows can be categorized as explicit and implicit [27]. Explicit
flows arise as a result of variables being assigned to others, or through primitive
operations. For instance, the statement x = y + z causes an explicit flow from
values in both z and y to x. Explicit flows are handled in the runtime by updating
the label of the computed value (x in our example) with the least upper bound
of the labels of the operands in the computation (y, z in our example).
Implicit flows arise from control dependencies. For example, in the program
l = 0; if (h) {l = 1;}, there is an implicit flow from h to the final value
of l (that value is 1 iff h is 1). To handle implicit flows, dynamic IFC systems
maintain the so-called pc label (program-context label), which is an upper bound
on the labels of values that have influenced the control flow thus far. In our last
example, if the value in h has label H, then pc will be H within the if branch.
After l = 1 is executed, the final value of l inherits not only the label of 1
(which is L), but also of the pc; hence, that label is also H. This alone does not
prevent information leaks: When h = 0, l ends with 0L ; when h = 1, l ends
with 1H . Since 0L and 1H can be distinguished by a public attacker, this program
leaks the value of h despite correct propagation of implicit taints. Formally, the
instrumented semantics so far fail the standard property of non-interference [8].
This problem can be resolved through the well-known no-sensitive-upgrade
(NSU) check [22,21], which prohibits assignment to a low-labeled variable when
pc is high. This recovers non-interference if the adversary cannot observe program
termination (termination-insensitive non-interference). In our example, when h
= 0, the program terminates with l = 0L . When h = 1, the instruction l = 1
gets stuck due to NSU. These two outcomes are deemed observationally equivalent for the low adversary, who cannot determine whether or not the program
has terminated in the second case. Hence, the program is deemed secure.
Roughly, a program is termination-insensitive non-interferent if any two terminating runs of the program starting from low-equivalent heaps (i.e., heaps
that look equivalent to the adversary) end in low-equivalent heaps. Like all
sound dynamic IFC approaches, our instrumentation renders any JS program
termination-insensitive non-interferent, at the cost of modifying semantics of
programs that leak information.
4
Design, Challenges, Insights and Solutions
We implement dynamic IFC for JS in the widely used WebKit engine by instrumenting WebKit’s bytecode interpreter. In WebKit, bytecode is generated by a
source-code compiler. Our goal is to not modify the compiler, but we are forced
to make slight changes to it to make it compliant with our instrumentation. The
modification is explained in Section 6. Nonetheless, almost all our work is limited
to the bytecode interpreter.
WebKit’s bytecode interpreter is a rather standard stack machine, with several additional data structures for JS-specific features like scope chains, variable
environments, prototype chains and function objects. Local variables are held in
registers on the call stack. Our instrumentation adds a label to all data structures, including registers, object properties and scope chain pointers, adds code
to propagate explicit and implicit taints and implements a more permissive variant of the NSU check. Our label is a word size bit-set (currently 64 bits); each
bit in the bit-set represents taint from a distinct domain (like google.com). Join
on labels is simply bitwise or.
Unlike the ECMAScript specification of JS semantics, the actual implementation does not treat scope chains or variable environments like ordinary objects. Consequently, we model and instrument taint propagation on all these
data structures separately. Working at the low-level of the bytecode also leads
to several interesting conceptual and implementation issues in taint propagation
as well as interesting questions about the threat model, all of which we explain
in this section. Some of the issues are quite general and apply beyond JS. For
example, we combine our dynamic analysis with a bit of static analysis to handle
unstructured control flow and exceptions.
Threat model and compiler assumptions We explain our high-level threat model.
Following standard practice, our adversary may observe all low-labeled values
in the heap (more generally, an adversary at level ` in a lattice can observe
all heap values with labels ≤ `). However, we do not allow the adversary to
directly observe internal data structures like the call stack or scope chains. This
is consistent with actual interfaces in a browser that third-party scripts can
access. In our non-interference proofs we must also show low-equivalence of these
internal data structures across two runs to get the right induction invariants,
but assuming that they are inaccessible to the adversary allows more permissive
program execution, which we explain in Section 4.1.
The bytecode interpreter executes in a shared space with other browser components, so we assume that those components do not leak information over side
channels, e.g., they do not copy heap data from secret to public locations. This
also applies to the compiler, but we do not assume that the compiler is functionally correct. Trivial errors in the compiler, e.g., omitting a bytecode could
result in a leaky program even when the source code has no information leaks.
Because our IFC works on the compiler’s output, such compiler errors are not a
concern. Formally, we assume that the compiler is an unspecified deterministic
function of the program to compile and of the call stack, but not of the heap.
This assumption also matches how the compiler works within WebKit: It needs
access to the call stack and scope chain to optimize generated bytecode. However, the compiler never needs access to the heap. We ignore information leaks
due to other side channels like timing.
4.1
Challenges and Solutions
IFC for JS is known to be difficult due to JS’s highly dynamic nature. Working
with bytecode instead of source code makes IFC harder. Nonetheless, solutions
to many JS-specific IFC concerns proposed in earlier work [4] also apply to
our instrumentation, sometimes in slightly modified form. For example, in JS,
every object has a fixed parent, called a prototype, which is looked up when a
property does not exist in the child. This can lead to implicit flows: If an object
is created in a high context (when the pc is high) and a field missing from it,
but present in the prototype, is accessed later in a low context, then there is
an implicit leak from the high pc. This problem is avoided in both source- and
bytecode-level analysis in the same way: The “prototype” pointer from the child
to the parent is labeled with the pc where the child is created, and the label
of any value read from the parent after traversing the pointer is joined with
this label. Other potential information flow problems whose solutions remain
unchanged between source- and bytecode-level analysis include implicit leaks
through function pointers and handling of eval [12,4].
Working with bytecode both leads to some interesting insights, which are,
in some cases, even applicable to source code analysis and other languages, and
poses new challenges. We discuss some of these challenges and insights.
Unstructured control flow and CFGs To avoid overtainting pc labels, an important goal in implicit flow tracking is to determine when the influence of a control
construct has ended. For block-structured control flow limited to if and while
commands, this is straightforward: The effect of a control construct ends with
its lexical scope, e.g., in (if (h) {l = 1;}; l = 2), h influences the control
flow at l = 1 but not at l = 2. This leads to a straightforward pc upgrading
and downgrading strategy: One maintains a stack of pc labels [22]; the effective
pc is the top one. When entering a control flow construct like if or while, a new
pc label, equal to the join of labels of all values on which the construct’s guard
depends with the previous effective pc, is pushed. When exiting the construct,
the label is popped.
Unfortunately, it is unclear how to extend this simple strategy to non-blockstructured control flow constructs such as exceptions, break, continue and
return-in-the-middle for functions, all of which occur in JS. For example, consider the program l = 1; while(1) {... if (h) {break;}; l = 0; break;}
with h labeled H. This program leaks the value of h into l, but no assignment
to l appears in a block-scope guarded by h. Indeed, the pc upgrading and downgrading strategy just described is ineffective for this program. Prior work on
source code IFC either omits some of these constructs [4,28], or introduces additional classes of labels to address these problems — a label for exceptions [4],
a label for each loop containing break or continue and a label for each function [5]. These labels are more restrictive than needed, e.g., the code indicated
by dots in the example above is executed irrespective of the condition h in the
first iteration, and thus there is no need to raise the pc before checking that
condition. Further, these labels are programmer annotations, which we cannot
support as we do not wish to modify the compiler.
Importantly, unstructured control flow is a very serious concern for us, because WebKit’s bytecode has completely unstructured branches like jump-iffalse. In fact, all control flow, except function calls, is unstructured in bytecode.
To solve this problem, we adopt a solution based on static analysis of generated bytecode [29,12]. We maintain a control flow graph (CFG) of known bytecodes and for each branch node, compute its immediate post-dominator (IPD).
The IPD of a node is the first instruction that will definitely be executed, no
matter which branch is taken. Our pc upgrading and downgrading strategy now
extends to arbitrary control flow: When executing a branch node, we push a
new pc label on the stack along with the node’s IPD. When we actually reach
the IPD, we pop the pc label. In [30,31], the authors prove that the IPD marks
the end of the scope of an operation and hence the security context of the operation, so our strategy is sound. In our earlier example, the IPD of if(h) ...
is the end of the while loop because of the first break statement, so when h
== 0, the assignment l = 1 fails due to the NSU check and the program is
termination-insensitive non-interference secure.
JS requires dynamic code compilation. We are forced to extend the CFG and
to compute IPDs whenever code for either a function or an eval is compiled.
Fortunately, the IPD of a node in the CFG lies either in the same function as
the node or some function earlier in the call-chain (the latter may happen due to
exceptions), so extending the CFG does not affect computation of IPDs of earlier
nodes. This also relies on the fact that code generated from eval cannot alter
the CFG of earlier functions in the call stack [12]. In the actual implementation,
we optimize the calculation of IPDs further by working only intra-procedurally,
as explained below. At the end, our IPD-based solution works for all forms of
unstructured control flow, including unstructured branches in the bytecode, and
semi-structured break, continue, return-in-the-middle and exceptions in the
source code.
Exceptions and synthetic exit nodes Maintaining a CFG in the presence of exceptions is expensive. An exception-throwing node in a function that does not
catch that exception should have an outgoing control flow edge to the next exception handler in the call-stack. This means that (a) the CFG is, in general,
inter-procedural, and (b) edges going out of a function depend on its calling context, so IPDs of nodes in the function must be computed every time the function
is called. Moreover, in the case of recursive functions, the nodes must be replicated for every call. This is rather expensive. Ideally, we would like to build the
function’s CFG once when the function is compiled and work intra-procedurally
(as we would had there been no exceptions). We explain how we attain this goal
in the sequel.4
In our design, every function that may throw an unhandled exception has
a special, synthetic exit node (SEN), which is placed after the regular return
node(s) of the function. Every exception-throwing node, whose exception will
not be caught within the function, has an outgoing edge to the SEN, which is
traversed when the exception is thrown. The semantics of SEN (described below)
correctly transfer control to the appropriate exception handler. By doing this, we
eliminate all cross-function edges and our CFGs become intra-procedural. The
CFG of a function can be computed when the function is compiled and is never
updated. (In our implementation, we build two variants of the CFG, depending
on whether or not there is an exception handler in the call stack. This improves
efficiency, as we explain later.)
Control flows to the SEN when the function returns normally or when an
exception is thrown but not handled within the function. If no unhandled exception occurred within the function, then the SEN transfers control to the caller
(we record whether or not an unhandled exception occurred). If an unhandled
exception occurred, then the SEN triggers a special mechanism that searches
the call stack backward for the first appropriate exception handler and transfers
control to it. (In JS, exceptions are indistinguishable, so we need to find only the
first exception handler.) Importantly, we pop the call-stack up to the frame that
contains the first exception handler but do not pop the pc-stack, which ensures
that all code up to the exception handler’s IPD executes with the same pc as
the SEN, which is indeed the semantics one would expect if we had a CFG with
cross-function edges for exceptions. This prevents information leaks.
If a function does not handle a possible exception but there is an exception
handler on the call stack, then all bytecodes that could potentially throw an
exception have the SEN as one successor in the CFG. Any branching bytecode
will thus need to push to the pc-stack according to the security label of its
condition. However, we do not push a new pc-stack entry if the IPD of the
current node is the same as the IPD on the top of the pc-stack (this is just
4
This problem and our solution are not particular to JS; they apply to dynamic IFC
analysis in all languages with exceptions and functions.
an optimization) or if the IPD of the current node is the SEN, as in this case
the real IPD, which is outside of this method, is already on the pc-stack. These
semantics emulate the effect of having cross-function exception edges.
For illustration, consider the following two functions f and g. The at the
end of g denotes its SEN. Note that there is an edge from throw 9 to because
throw 9 is not handled within g. denotes the IPD of the handler catch(e)
{ l = 1; }.
function g() = {
function f() = {
if (h) {throw 9;}
l = 0;
return 7;
try { g(); } catch(e) { l = 1; }
}
return l;
}
It should be clear that in the absence of instrumentation, when f is invoked
with pc = L, the two functions together leak the value of h (which is assumed to
have label H) into the return value of f. We show how our SEN mechanism prevents this leak. When invoking g() we do not know if there will be an exception
in this function. Depending on the outcome of this method call, we will either
jump to the exception handler or continue at . Based on that branch, we push
the current pc and IPD (L, ) on the pc-stack. When executing the condition
if (h) we do not push again, but merely update the top element to (H, ). If h
== 0, control reaches without an exception but with pc = H because the IPD
of if (h) is . At this point, returns control to f, thus pc = H, but at , pc
is lowered to L, so f ends with the return value 0L . If h == 1, control reaches
with an unhandled exception. At this point, following the semantics of SEN, we
find the exception handler catch(e) { l = 1; } and invoke it with the same
pc as the point of exception, i.e., H. Consequently, NSU prevents the assignment
l = 1, which makes the program termination-insensitive non-interferent.
Because we do not wish to replicate the CFG of a function every time it is
called recursively, we need a method to distinguish the same node corresponding
to two different recursive calls on the pc-stack. For this, when pushing an IPD
onto the pc-stack, we pair it with a pointer to the current call-frame. Since the
call-frame pointer is unique for each recursive call, the CFG node paired with
the call-frame identifies a unique merge point in the real control flow graph.
In practice, even the intra-procedural CFG is quite dense because many JS
bytecodes can potentially throw exceptions and, hence, have edges to the SEN.
To avoid overtainting, we perform a crucial common-case optimization: When
there is no exception handler on the call stack we do not create the SEN and
the corresponding edges from potentially exception-throwing bytecodes at all.
This is safe as a potentially thrown exception can only terminate the program
instantly, which satisfies termination-insensitive non-interference if we ensure
that the exception message is not visible to the attacker. Whether or not an
exception handler exists is easily tracked using a stack of Booleans that mirrors
the call-stack; in our design we overlay this stack on the pc-stack by adding an
extra Boolean field to each entry of the pc-stack. In summary, each entry of our
pc-stack is a quadruple containing a security label, a node in the intraprocedural
CFG, a call-frame pointer and a Boolean value. In combination with SENs, this
design allows us to work only with intraprocedural CFGs that are computed
when a function is compiled. This improves efficiency.
Permissive-upgrade check, with changes The standard NSU check halts program
execution whenever an attempt is made to assign a variable with a low-labeled
value in a high pc. In our earlier example, l = 0; if (h) {l = 1;}, assuming
that h stores a H-labeled value, program execution is halted at the command
l = 1. As Austin and Flanagan (AF in the sequel) observe [13], this may be
overly restrictive when l will not, in fact, have observable effects (e.g., l may
be overwritten by a constant immediately after if (h) {l = 1;}). So, they
propose propagating a special taint called ? into l at the instruction l = 1 and
halting a program when it tries to use a value labeled ? in a way that will be
observable (AF call this special taint P for “partially leaked”). This idea, called
the permissive-upgrade check, allows more program execution than NSU would,
so we adopt it. In fact, this additional permissiveness is absolutely essential for us
because the WebKit compiler often generates dead assignments within branches,
so execution would pointlessly halt if standard NSU were used.
We differ from AF in what constitutes a use of a value labeled ?. As expected,
AF treat occurrence of ? in the guard of a branch as a use. Thus, the program l
= 0; if (h) {l = 1;}; if (l) {l’ = 2} is halted at the command if (l)
when h == 1 because l obtains taint ? at the assignment l = 1 (if the program
is not halted, it leaks h through l’). However, they allow ?-tainted values to
flow into the heap. Consider the program l = 0; if (h) {l = 1;}; obj.a =
l. This program is insecure in our model: The heap location obj.a, which is
accessible to the adversary, ends with 0L when h == 0 and with 1? when h
== 1. AF deem the program secure by assuming that any value with label ? is
low-equivalent to any other value (in particular, 0L and 1? are low-equivalent).
However, this definition of low-equivalence for dynamic analysis is virtually impossible to enforce if the adversary has access to the heap outside the language:
After writing 0L to obj.a (for h == 0), a dynamic analysis cannot determine
that the alternate execution of the program (for h == 1) would have written a
?-labeled value and, hence, cannot prevent the adversary from seeing 0L .
Consequently, in our design, we use a modified permissive-upgrade check,
which we call the deferred NSU check, wherein a program is halted at any construct that may potentially flow a ?-labeled value into the heap. This includes
all branches whose guard contains a ?-labeled value and any assignments whose
target is a heap location and whose source is ?-labeled. However, we do not
constrain flow of ?-labeled values in data structures that are invisible to the adversary in our model, e.g., local registers and variable environments. This design
critically relies on treating internal data structures differently from ordinary JS
objects, which is not the case, for instance, in the ECMAScript specification.
5
Formal Model and IFC
We formally model WebKit’s JS bytecode and the semantics of its bytecode
interpreter with our instrumentation of dynamic IFC. We prove termination-
ins := prim-ins | obj-ins
| func-ins
| scope-ins | exc-ins
prim-ins := prim dst:r src1:r src2:r
| mov dst:r src:r
| jfalse cond:r target:offset
| loop-if-less src1:r src2:r target:offset
| typeof dst:r src:r
| instanceof dst:r value:r cProt:r
func-ins := enter
| ret result:r
| end result:r
| call func:r args:n
| call-put-result res:r
| call-eval func:r args:n
| create-arguments dst:r
| new-func dst:r func:f
| create-activation dst:r
| construct func:r args:n
| create-this dst:r
obj-ins := new-object dst:r
| get-by-id dst:r base:r prop:id
| put-by-id base:r prop:id value:r direct:b
| del-by-id dst:r base:r prop:id
| get-pnames dst:r base:r i:n size:n breaktarget:offset
| next-pname dst:r base:r i:n size:n iter:n target:offset
| put-getter-setter base:r prop:id getter:r setter:r
scope-ins := resolve dst:r prop:id
| resolve-skip dst:r prop:id skip:n
| resolve-global dst:r prop:id
| resolve-base dst:r prop:id isStrict:bool
| resolve-with-base bDst:r pDst:r prop:id
| get-scoped-var dst:r index:n skip:n
| put-scoped-var index:n skip:n value:r
| push-scope scope:r
| pop-scope
| jmp-scope count:n target:offset
exc-ins := throw ex:r
| catch ex:r
Fig. 1. Instructions
insensitive non-interference for programs executed through our instrumented
interpreter. We do not model the construction of the CFG or computation of
IPDs; these are standard. To keep presentation accessible, we present our formal model at a somewhat high-level of abstraction. Details are resolved in our
technical appendix.
5.1
Bytecode and Data Structures
The version of WebKit we model uses a total of 147 bytecodes or instructions,
of which we model 69. The remaining 78 bytecodes are redundant from the
perspective of formal modeling because they are specializations or wrappers on
other bytecodes to improve efficiency. The syntax of the 69 bytecodes we model
is shown in Fig. 1. The bytecode prim abstractly represents 34 primitive binary
and unary (with just the first two arguments) operations, all of which behave
similarly. For convenience, we divide the bytecodes into primitive instructions
(prim-ins), instructions related to objects and prototype chains (obj-ins), instructions related to functions (func-ins), instructions related to scope chains
(scope-ins) and instructions related to exceptions (exc-ins). A bytecode has the
form hinst_name list_of _argsi. The arguments to the instruction are of the
form hvari:htypei, where var is the variable name and type is one of the following:
r, n, bool, id, prop and offset for register, constant integer, constant Boolean,
identifier, property name and jump offset value, respectively.
In WebKit, bytecode is organized into code blocks. Each code block is a
sequence of bytecodes with line numbers and corresponds to the instructions for
a function or an eval statement. A code block is generated when a function
is created or an eval is executed. In our instrumentation, we perform control
flow analysis on a code block when it is created and in our formal model we
abstractly represent a code block as a CFG, written ζ. Formally, a CFG is a
directed graph, whose nodes are bytecodes and whose edges represent possible
control flows. There are no cross-function edges. A CFG also records the IPD of
each node. IPDs are computed using an algorithm by Lengauer and Tarjan [32]
when the CFG is created. If the CFG contains uncaught exceptions, we also
create a SEN. For a CFG ζ and a non-branching node ι ∈ ζ, Succ(ζ, ι) denotes
ι’s unique successor. For a conditional branching node ι, Left(ζ, ι) and Right(ζ, ι)
denote successors when the condition is true and false, respectively.
The bytecode interpreter is a standard stack machine, with support for JS
features like scope chains and prototype chains. The state of the machine (with
our instrumentation) is a quadruple hι, θ, σ, ρi, where ι represents the current
node that is being executed, θ represents the heap, σ represents the call-stack
and ρ is the pc-stack.
We assume an abstract, countable set A = {a, b, . . .} of heap locations, which
are references to objects. The heap θ is a partial map from locations to objects.
An object O may be:
– An ordinary JS object N = ({pi 7→ vi }ni=0 , __proto__ 7→ a`p , `s ), containing properties named p0 , . . . , pn that map to labeled values v0 , . . . , vn , a
prototype field that points to a parent at heap location a, and two labels `p
and `s . `p records the pc where the object was created. `s is the so-called
structure label, which is an upper bound on all pcs that have influenced
which fields exist in the object.5
– A function object F = (N, ζ, Σ), where N is an ordinary object, ζ is a CFG,
which corresponds to the the function stored in the object, and Σ is the
scope chain (closing context) of the function.
A labeled value v = r` is a value r paired with a security label `. A value r
in our model may be a heap location a or a JS primitive value n, which includes
integers, Booleans, regular expressions, arrays, strings and the special JS values
undefined and null.
The call-stack σ contains one call-frame for each incomplete function call. A
call-frame µ contains an array of registers for local variables, a CFG ζ for the
function represented by the call-frame, the return address (a node in the CFG of
the previous frame), and a pointer to a scope-chain that allows access to variables
in outer scopes. Additionally, each call-frame has an exception table which maps
each potentially exception-throwing bytecode in the function to the exception
handler within the function that surrounds the bytecode; when no such exception
handler exists, it points to the SEN of the function (we conservatively assume
that any unknown code may throw an exception, so bytecodes call and eval
are exception-throwing for this purpose). |σ| denotes the size of the call-stack
and !σ its top frame. Each register contains a labeled value.
A scope chain, Σ, is a sequence of scope chain nodes (SCNs), denoted S,
paired with labels. In WebKit, a scope chain node S may either be an object
or a variable environment V , which is an array of labeled values. Thus, Σ ::=
(S1 , `1 ) : . . . : (Sn , `n ) and S ::= O | V and V ::= v1 : . . . : vn .
5
The __proto__ field is the parent of the object; it is not the same as the prototype
field of a function object, which is an ordinary property. Also, in our actual model,
fields pi map to more general property descriptors that also contain attributes along
with labeled values. We elide attributes here to keep the presentation simple.
Each entry of the pc-stack ρ is a triple (`, ι, p), where ` is a security label,
ι is a node in a CFG, and p is a pointer to some call-frame on the call stack
σ. (For simplicity, we ignore a fourth Boolean field described in Section 4.1 in
this presentation.) When we enter a new control context, we push the new pc `
together with the IPD ι of the entry point of the control context and a pointer
p to current call-frame. The pair (ι, p) uniquely identifies where the control of
the context ends; p is necessary to distinguish the same branch point in different
recursive calls of the function [12]. In our semantics, we use the meta-function
isIPD to pop the stack. It takes the current instruction, the current pc-stack and
the call stack σ, and returns a new pc-stack.
(
ρ.pop() if !ρ = (_, ι, !σ)
isIPD(ι, ρ, σ) :=
ρ
otherwise
As explained in Section 4.1, as an optimization, we push a new node (`, ι, σ)
onto ρ only when (ι, σ) (the IPD) differs from the corresponding pair on the top
of the stack and, to handle exceptions correctly, we also require that ι not be
the SEN. Otherwise, we just join ` with the label on the top of the stack. This
is formalized in the function ρ.push(`, ι, σ), whose obvious definition we elide.
If x is a pair of any syntactic entity and a security label, we write Υ (x) for the
entity and Γ (x) for the label. In particular, for v = r` , Υ (v) = r and Γ (v) = `.
5.2
Semantics and IFC with Intra-procedural CFGs
We now present the semantics, which faithfully models our implementation using intra-procedural CFGs with SENs. The semantics is defined as a set of state
transition rules that define the judgment: hι, θ, σ, ρi
hι0 , θ0 , σ 0 , ρ0 i. Fig. 2 shows
rules for selected bytecodes. For reasons of space we omit rules for other bytecodes and formal descriptions of some meta-function like opCall that are used
in the rules. C ⇒ A B is shorthand for a meta-level (if (C) then A else B).
prim reads the values from two registers src1 and src2, performs a binary
operation generically denoted by ⊕ on the values and writes the result into the
register dst. dst is assigned the join of the labels in src1, src2 and the head of
the pc-stack (!ρ). To implement deferred NSU (Section 4.1), the existing label
in dst is compared with the current pc. If the label is lower than the pc, then
the label of dst is joined with ?. Note that the premise ρ0 = isIPD(ι0 , ρ, σ) pops
an entry from the pc-stack if its IPD matches the new program node ι0 . This
premise occurs in all semantic rules.
jfalse is a conditional jump. It skips offset number of successive nodes
in the CFG if the register cond contains false, else it falls-through to the next
node. Formally, the node it branches to is either Right(ζ, ι) or Left(ζ, ι), where ζ
is the CFG in !σ. In accordance with deferred NSU, the operation is performed
only if cond is not labeled ?. jfalse also starts a new control context, so a new
node is pushed on the top of the pc-stack with a label that is the join of Γ (cond)
and the current label on the top of the stack (unless the IPD of the branch point
is already on top of the stack or it is the SEN, in which case we join the new
ι = “op-prim dst:r src1:r src2:r”,
L := Γ (!σ(src1)) t Γ (!σ(src2)) t Γ (!ρ),
V := Υ (!σ(src1)) ⊕ Υ (!σ(src2))
(Γ (!σ(dst)) ≥ Γ (!ρ))
h =⇒ (L :=iL) (L := ?)
σ 0 := σ
0
prim:
0
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
0
,
ι := Succ(!σ .CFG, ι), ρ := isIPD(ι0 , ρ, σ 0 )
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
ι = “op-jfalse cond:r target:offset”,
Γ (!σ(cond)) 6= ?, L := Γ (!σ(cond)) t Γ (!ρ),
Υ (!σ(cond)) = false =⇒ ι0 := Left(!σ.CFG, ι)
ι0 := Right(!σ.CFG, ι),
ρ00 := ρ.push(L, IPD(ι), CF (ι)), ρ0 := isIPD(ι0 , ρ00 , σ)
jfalse:
ι, θ, σ, ρ
ι0 , θ, σ, ρ0
ι = “op-push-scope scope:r”,
σ 0 := pushScope(Γ (!ρ), σ, scope),
ι := Succ(!σ 0 .CFG, ι), ρ0 := isIPD(ι0 , ρ, σ 0 )
push-scope:
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
0
ι = “op-call func:r args:n”,
Γ (func) 6= ?, (ι0 , σ 0 , `f ) := opCall(σ, ι, func, args),
L = `f t Γ (!σ(func)) t Γ (!ρ),
ρ00 := ρ.push(L, IPD(ι), CF (ι)), ρ0 := isIPD(ι0 , ρ00 , σ 0 )
call:
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
ret:
ι = “op-put-by-id base:r prop:id value:r direct:b”,
Γ (!σ(value)) 6= ?, direct = true =⇒
θ0 := putDirect(Γ (!ρ), σ, θ, base, prop, value)
θ0 := putIndirect(Γ (!ρ), σ, θ, base, prop, value),
ι0 := Succ(!σ.CFG, ι), ρ0 := isIPD(ι0 , ρ, σ)
put-by-id:
ι, θ, σ, ρ
ι0 , θ0 , σ, ρ0
ι = “op-ret res:r”,
(ι0 , σ 0 , γ) := opRet(σ, res), ρ0 := isIPD(ι0 , ρ, σ 0 )
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
throw:
ι = “op-throw ex:r”, excValue := Υ (!σ(ex)),
(σ 0 , ι0 ) := throwException(σ, ι), ρ0 := isIPD(ι0 , ρ, σ 0 )
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
Fig. 2. Semantics, selected rules
label with the previous). Traversed from bottom to top, the pc-stack always has
monotonically non-decreasing labels.
put-by-id updates the property prop in the object pointed to by register
base. As explained in Section 4.1, we allow this only if the value to be written is
not labeled ?. The flag direct states whether or not to traverse the prototype
chain in finding the property; it is set by the compiler as an optimization. If the
flag is true, then the chain is not traversed (meta-function putDirect handles this
case). If direct is false, then the chain is traversed (meta-function putIndirect).
Importantly, when the chain is traversed, the resulting value is labeled with the
join of prototype labels `p and structure labels `s of all traversed objects. This
is standard and necessary to prevent implicit leaks through the __proto__
pointers and structure changes to objects.
push-scope, which corresponds to the start of the JS construct with(obj),
pushes the object pointed to by the register scope into the scope chain. Because
pushing an object into the scope chain can implicitly leak information from the
program context later, we also label all nodes in the scope-chain with the pc’s at
which they were added to the chain. Further, deferred NSU applies to the scope
chain pointer in the call-frame as it does to all other registers.
call invokes a function of the target object stored in the register func. Due
to deferred NSU, the call proceeds only if Γ (func) is not ?. The call creates a new
call-frame and initializes arguments, the scope chain pointer (initialized with the
function object’s Σ field), CFG and the return node in the new frame. The CFG
in the call-frame is copied from the function object pointed to by func. All this
is formalized in the meta-function opCall, whose details we omit here. Call is a
branch instruction and it pushes a new label on the pc-stack which is the join of
the current pc, Γ (func) and the structure label `f of the function object (unless
the IPD of the current node is the SEN or already on the top of the pc-stack, in
which case we join the new pc-label with the previous). call also initializes the
new registers’ labels to the new pc. A separate bytecode, not shown here and
executed first in the called function, sets register values to undefined. eval is
similar to call but the code to be executed is also compiled.
ret exits a function. It returns control to the caller, as formalized in the
meta-function opRet. The return value is written to an interpreter variable (γ).
throw throws an exception, passing the value in register ex as argument to
the exception handler. Our pc-stack push semantics ensure that the exception
handler, if any, is present in the call-frame pointed to by the top of the pc-stack.
The meta-function throwException pops the call-stack up to this call-frame and
transfers control to the exception handler, by looking it up in the exception
table of the call-frame. The exception value in the register ex is transferred to
the handler through an interpreter variable.
The semantics of other bytecodes have been described in Section 8.3.
Correctness of IFC We prove that our IFC analysis guarantees terminationinsensitive non-interference [11]. Intuitively, this means that if a program is run
twice from two states that are observationally equivalent for the adversary and
both executions terminate, then the two final states are also equivalent for the
adversary. To state the theorem formally, we formalize equivalence for various
data structures in our model. The only nonstandard data structure we use is the
CFG, but graph equality suffices for it. A well-known complication is that low
heap locations allocated in the two runs need not be identical. We adopt the
standard solution of parametrizing our definitions of equivalence with a partial
bijection β between heap locations. The idea is that two heap locations are
related in the partial bijection if they were created by corresponding allocations
in the two runs. We then define a rather standard relation hι1 , θ1 , σ1 , ρ1 i ∼β`
hι2 , θ2 , σ2 , ρ2 i, which means that the states on the left and right are equivalent
to an observer at level `, up to the bijection β on heap locations. The details
have been presented in Section 8.4.
Theorem 1 (Termination-insensitive non-interference) Suppose:
(1) hι1 , θ1 , σ1 , ρ1 i ∼β` hι2 , θ2 , σ2 , ρ2 i, (2) hι1 , θ1 , σ1 , ρ1 i ∗ hend, θ10 , [], []i, and
0
(3) hι2 , θ2 , σ2 , ρ2 i ∗ hend, θ20 , [], []i. Then, ∃β 0 ⊇ β such that θ10 ∼β` θ20 .
6
Implementation
We instrumented WebKit’s JS engine (JavaScriptCore) to implement the IFC
semantics of the previous section. Before a function starts executing, we generate
its CFG and calculate IPDs of its nodes by static analysis of its bytecode. We
modify the source-to-bytecode compiler to emit a slightly different, but functionally equivalent bytecode sequence for finally blocks; this is needed for accurate
computation of IPDs. For evaluation purposes, we label each source script with
the script’s domain of origin; each seen domain is dynamically allocated a bit in
our bit-set label. In general, our instrumentation terminates a script that violates
Normalized
JS
Execu2on
Time
(%)
350
Interpreter
JIT
Basic
Op@mized
300
250
200
150
100
50
0
3d
access
bitops
controlflow
crypto
date
math
regexp
string
SunSpider
Tests
Fig. 3. Overheads of basic and optimized IFC in SunSpider benchmarks
IFC. However, for the purpose of evaluating overhead of our instrumentation,
we ignore IFC violations in all experiments described here.
We also implement and evaluate a variant of sparse labeling [21] which optimizes the common case of computations that mostly use local variables (registers
in the bytecode). Until a function reads a value from the heap with a label different from the pc, we propagate taints only on heap-writes, but not on in-register
computations. Until that point, all registers are assumed to be implicitly tainted
with pc. This simple optimization reduces the overhead incurred by taint tracking significantly in microbenchmarks. For both the basic and optimized version,
our instrumentation adds approximately 4,500 lines of code to WebKit.
Our baseline for evaluation is the uninstrumented interpreter with JIT disabled. For comparison, we also include measurements with JIT enabled. Our
experiments are based on WebKit build #r122160 running in Safari 6.0. The
machine has a 3.2GHz Quad-core Intel Xeon processor with 8GB RAM and
runs Mac OS X version 10.7.4.
Microbenchmark We executed the standard SunSpider 1.0.1 JS benchmark suite
on the uninstrumented interpreter with JIT disabled and JIT enabled, and on
the basic and the optimized IFC instrumentations with JIT disabled. Results are
shown in Figure 3. The x-axis ranges over SunSpider tests and the y-axis shows
the average execution time, normalized to our baseline (uninstrumented interpreter with JIT disabled) and averaged across 100 runs. Error bars are standard
deviations. Although the overheads of IFC vary from test to test, the average
overheads over our baseline are 121% and 45% for basic IFC and optimized
IFC, respectively. The test regexp has almost zero overhead because it spends
most time in native code, which we have not yet instrumented. We also note
that, as expected, the JIT-enabled configuration performs extremely well on the
SunSpider benchmarks.
Normalized
JavaScript
Execu5on
Time
(%)
160
Interpreter
JIT
Basic
instrumentaGon
OpGmized
InstrumentaGon
140
120
100
80
60
40
20
0
Google
Yahoo
Amazon
Wikipedia
eBay
Websites
Bing
Linkedin
Live
Twi?er
Fig. 4. Overheads of basic and optimized IFC in real websites
Macrobenchmarks We measured the execution time of the intial JS on 9 popular
English language Websites. We load each Website in Safari and measure the
total time taken to execute the JS code without user interaction. This excludes
time for network communication and internal browser events and establishes a
very conservative baseline. The results, normalized to our baseline, are shown in
Fig. 4. Our overheads are all less than 42% (with an average of around 29% in
both instrumentations). Interestingly, we observe that our optimization is less
effective on real websites indicating that real JS accesses the heap more often
than the SunSpider tests. When compared to the amount of time it takes to
fetch a page over the network and to render it, these overheads are negligible.
Enabling JIT worsens performance compared to our baseline indicating that, for
the code executed here, JIT is not useful.
We also experimented with JSBench [33], a sophisticated benchmark derived
from JS code in the wild. The average overhead on all JSBench tests (a total 23
iterations) is approximately 38% for both instrumentations. The average time
for running the benchmark tests on the uninstrumented interpreter with JIT
disabled was about 636.11ms with a standard deviation of about 0.30% of the
mean. The average time for running the same benchmark tests on the instrumented interpreter and the optimized version was about 874.31ms and 880.85ms
respectively, with a standard deviation of about 4.09% and 5.04% of the mean
in the two cases.
7
Conclusion and Future Work
We have explored dynamic information flow control for JS bytecode in WebKit,
a production JS engine. We formally model the bytecode, its semantics, our
instrumentation and prove the latter correct. We identify challenges, largely
arising from pervasive use of unstructured control flow in bytecode, and resolve
them using very limited static analysis. Our evaluation indicates only moderate
overheads in practice.
In ongoing work, we are instrumenting the DOM and other native JS methods. We also plan to generalize our model and non-interference theorem to
take into account the reactive nature of Web browsers. Going beyond noninterference, the design and implementation of a policy language for representing
allowed information flows looks necessary.
Acknowledgments This work was funded in part by the Deutsche Forschungsgemeinschaft (DFG) grant “Information Flow Control for Browser Clients” under
the priority program “Reliably Secure Software Systems” (RS3) and the German Federal Ministry of Education and Research (BMBF) within the Centre for
IT-Security, Privacy and Accountability (CISPA) at Saarland University.
References
1. Richards, G., Hammer, C., Burg, B., Vitek, J.: The eval that men do – a large-scale
study of the use of eval in JavaScript applications. In Mezzini, M., ed.: ECOOP
’11. Volume 6813 of LNCS. (2011) 52–78
2. Jang, D., Jhala, R., Lerner, S., Shacham, H.: An empirical study of privacyviolating information flows in JavaScript web applications. In: Proc. 17th ACM
Conference on Computer and Communications Security. (2010) 270–283
3. Richards, G., Hammer, C., Zappa Nardelli, F., Jagannathan, S., Vitek, J.: Flexible access control for javascript. In: Proc. 2013 ACM SIGPLAN International
Conference on Object Oriented Programming Systems Languages & Applications.
OOPSLA ’13 (2013) 305–322
4. Hedin, D., Sabelfeld, A.: Information-flow security for a core of JavaScript. In:
Proc. 25th IEEE Computer Security Foundations Symposium. (2012) 3–18
5. Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: Tracking information
flow in JavaScript and its APIs. In: Proc. 29th ACM Symposium on Applied
Computing. (2014)
6. Devriese, D., Piessens, F.: Noninterference through secure multi-execution. In:
Proc. 2010 IEEE Symposium on Security and Privacy. (2010) 109–124
7. De Groef, W., Devriese, D., Nikiforakis, N., Piessens, F.: Flowfox: a web browser
with flexible and precise information flow control. In: Proc. 2012 ACM Conference
on Computer and Communications Security. (2012) 748–759
8. Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. 1982
IEEE Symposium on Security and Privacy. (1982) 11–20
9. Myers, A.C., Liskov, B.: A decentralized model for information flow control. In:
Proc. 16th ACM Symposium on Operating Systems Principles. (1997) 129–142
10. Zdancewic, S., Myers, A.C.: Robust declassification. In: Proc. 14th IEEE Computer
Security Foundations Workshop. (2001) 15–23
11. Volpano, D., Irvine, C., Smith, G.: A sound type system for secure flow analysis.
J. Comput. Secur. 4(2-3) (January 1996) 167–187
12. Just, S., Cleary, A., Shirley, B., Hammer, C.: Information flow analysis for JavaScript. In: Proc. 1st ACM SIGPLAN International Workshop on Programming
Language and Systems Technologies for Internet Clients. (2011) 9–18
13. Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In:
Proc. 5th ACM SIGPLAN Workshop on Programming Languages and Analysis
for Security. (2010) 3:1–3:12
14. Bohannon, A., Pierce, B.C., Sjöberg, V., Weirich, S., Zdancewic, S.: Reactive noninterference. In: Proc. 16th ACM Conference on Computer and Communications
Security. (2009) 79–90
15. Maffeis, S., Mitchell, J.C., Taly, A.: An operational semantics for JavaScript. In:
Proc. 6th Asian Symposium on Programming Languages and Systems. APLAS ’08
(2008) 307–325
16. Guha, A., Saftoiu, C., Krishnamurthi, S.: The essence of JavaScript. In: Proc.
24th European Conference on Object-Oriented Programming. (2010) 126–150
17. Politz, J.G., Carroll, M.J., Lerner, B.S., Pombrio, J., Krishnamurthi, S.: A tested
semantics for getters, setters, and eval in JavaScript. In: Proceedings of the 8th
Dynamic Languages Symposium. (2012) 1–16
18. Bodin, M., Chargueraud, A., Filaretti, D., Gardner, P., Maffeis, S., Naudziuniene,
D., Schmitt, A., Smith, G.: A trusted mechanised javascript specification. In:
Proc. 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming
Languages. (2014)
19. Guarnieri, S., Pistoia, M., Tripp, O., Dolby, J., Teilhet, S., Berg, R.: Saving the
world wide web from vulnerable javascript. In: Proc. 2011 International Symposium
on Software Testing and Analysis. ISSTA ’11 (2011) 177–187
20. Chugh, R., Meister, J.A., Jhala, R., Lerner, S.: Staged information flow for JavaScript. In: Proc. 2009 ACM SIGPLAN Conference on Programming Language
Design and Implementation. (2009) 50–62
21. Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In:
Proc. ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis
for Security. (2009) 113–124
22. Zdancewic, S.A.: Programming Languages for Information Security. PhD thesis,
Cornell University (August 2002)
23. Birgisson, A., Hedin, D., Sabelfeld, A.: Boosting the permissiveness of dynamic
information-flow tracking by testing. In: Computer Security – ESORICS 2012.
Volume 7459 of LNCS. Springer Berlin Heidelberg (2012) 55–72
24. Austin, T.H., Flanagan, C.: Multiple facets for dynamic information flow. In: Proc.
39th annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming
Languages. (2012) 165–178
25. Bielova, N., Devriese, D., Massacci, F., Piessens, F.: Reactive non-interference for a
browser model. In: 5th International Conference on Network and System Security
(NSS),. (2011) 97–104
26. Bohannon, A., Pierce, B.C.: Featherweight firefox: formalizing the core of a web
browser. In: Proc. 2010 USENIX conference on Web application development.
WebApps’10 (2010) 11–22
27. Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5)
(May 1976) 236–243
28. Dhawan, M., Ganapathy, V.: Analyzing information flow in JavaScript-based
browser extensions. In: Proc. 2009 Annual Computer Security Applications Conference. ACSAC ’09 (2009) 382–391
29. Robling Denning, D.E.: Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (1982)
30. Xin, B., Zhang, X.: Efficient online detection of dynamic control dependence. In:
Proc. 2007 International Symposium on Software Testing and Analysis. (2007)
185–195
31. Masri, W., Podgurski, A.: Algorithms and tool support for dynamic information
flow analysis. Information & Software Technology 51(2) (2009) 385–404
32. Lengauer, T., Tarjan, R.E.: A fast algorithm for finding dominators in a flowgraph.
ACM Trans. Program. Lang. Syst. 1(1) (January 1979) 121–141
33. Richards, G., Gal, A., Eich, B., Vitek, J.: Automated construction of javascript
benchmarks. In: Proceedings of the 2011 ACM International Conference on Object
Oriented Programming Systems Languages and Applications. (2011) 677–694
8
8.1
Appendix
Data Structures
The formal model described in Section 5 was typechecked in C++. The various data structures used for defining the functions used in the semantics of the
language are given in Figure 5. The source-code of the JavaScript program is
represented as a structure containing the source and a Boolean flag indicating
the strict mode is set or not. The instruction as indicated before is a structure
consisting of the opcode and the list of operands. The opcode is a string indicating
the operation and the operand is a union of registerIndex, immediateValue, identifier, Boolean, funcIndex and offset. The immediateValue denotes the directly
supplied value to an opcode, registerIndex is the index of the register containing
the value to be operated upon, identifier represents the string name directly
used by the opcode, Boolean is a often a flag indicating the truth value of some
parameter and offset represents the offset where the control jumps to. Similarly,
functionIndex indicates the index of the function object being invoked.
The function’s source code is represented in the form of a control flow graph
(CFG). Formally, it is defined as a struct with a list of CFG nodes, each of which
contain the instructions that are to be performed and the edges point to the
next instruction in the program. Multiple outgoing edges indicate a branching
instruction. It also contains variables indicating the number of variables used by
the function code and a reference to the globalObject.
The labels are interpreted as a structure consisting of long integer label. The
label represents the value of the label, which are interpreted as bit vectors. A
special label star which represents partially leaked data, is used for deferred nosensitive-upgrade check. The program counter (pc) is represented as a stack of
pc-nodes, each of which contains the context label and the IPD of the operation
that pushed the node, the callframe of the current node and the handler flag
indicating the presence of an exception handler.
Different types of values are used as operands for performing the operations.
They include Boolean, integer, string, double and objects or special values like
NaN or undefined. These values are associated with a label each and are wrapped
by the JSValue class. All the values used in the data structures have the type
JSValue. The objects consist of properties, a prototype chain pointer with an
associated label and a structure label for the object. The properties are represented as a structure of the propertyName and its descriptor. The descriptor of
the property contains the value, some Boolean flags and a property label. The
struct SourceCode{
String programSrc;
bool strictMode;
};
struct JSValue{
valueTemplate data;
JSLabel label;
};
typedef char* Opcode;
union Operand{
int immediateValue;
String identifier;
int registerIndex;
int funcIndex;
bool flag;
int offset;
};
struct Instruction{
Opcode opc;
Operand* opr;
};
struct CFGNode{
Instruction* inst;
struct CFGNode* left;
struct CFGNode* right;
struct CFGNode* succ;
};
struct PropertyDescriptor{
JSValue value;
bool writable;
bool enumerable;
bool configurable;
JSLabel structLabel;
};
struct Property{
String propertyName;
PropertyDescriptor* pDesc;
};
struct PropertySlot{
Property prop;
PropertySlot* next;
};
struct Register{
JSValue value;
};
struct CallFrameNode{
Register rf[REGISTER_FILE_SIZE];
CFG cfg;
CFGNode* returnAddress;
ScopeChainNode* sc;
JSFunctionObject* callee;
JSLabel calleeLabel;
int argCount;
bool getter;
int dReg;
};
struct CallFrameStack{
CallFrameNode cFN;
CallFrameStack* previous;
};
struct PCNode{
JSLabel l;
struct JSObject{
CFGNode* ipd;
Property property[MAX_PROPS];
CallFrameNode* cFN;
struct proto{
bool handler;
JSLabel l;
};
struct CFG{
JSObject* __proto__;
struct CFGNode* cfgNode;
} prototype;
struct PCStack{
JSGlobalObject* globalObject; JSLabel structLabel;
PCNode node;
int numVars;
};
PCStack* previous;
int numFns;
};
bool strictMode;
struct Heap{
};
unsigned location;
struct JSActivation{
JSObject o;
CallFrameNode* callFrameNode;
struct JSLabel{
}[HEAP_SIZE];
JSLabel structLabel;
uint64_t label;
};
};
enum FunctionType{
JSFunction, HostFunction
enum ScopeChainObjectType{
enum Specials{
};
LexicalObject, VariableObject
NaN, undefined
};
};
struct JSFunctionObject:
JSObject{
union SChainObject{
union ValueType{
CFG* funcCFG;
JSObject* obj;
bool b;
ScopeChainNode* scopeChain;
JSActivation* actObj;
int n;
FunctionType fType;
};
String s;
};
double d;
struct ScopeChainNode{
JSObject* o;
struct JSGlobalObject:
SChainObject Object;
};
JSObject{
ScopeChainObjectType scObjType;
JSFunctionObject evalFunction;
ScopeChainNode* next;
union valueTemplate{
JSObject* objectPrototype;
JSLabel scopeLabel;
Specials s;
JSObject* functionPrototype;
};
ValueType v;
};
};
Fig. 5. Data Structures
heap is a collection of objects with an associated memory address. It is essentially
a map from location to object.
There are subtypes of JSObject that define the function object and the global
object. The function object contains a pointer to the associated CFG and the
scope chain. It also contains a field defining the type of function it represents,
namely, host or user-defined.
The call-stack is made up of various call-frame nodes, each of which contains a
set of registers, the associated CFG, the return address of the function, a pointer
to the scope chain, and an exception table. The registers store values and objects
and are used as operands for performing the operations. The exception table
contains the details about the handlers associated with different instructions in
the CFG of the call-frame. The scope chain is a list of nodes containing objects or
activation objects along with a label indicating the context in which the object
in that node was added. The activation object is a structure containing a pointer
to the call-frame node for which the activation object was created.
The next section defines the different procedures used in the semantics of the
language. The statement stop implies that the program execution hangs.
8.2
Algorithms
The different meta-functions used in the semantics presented in Section 8.3 are
described below:
procedure isInstanceOf (JSLabel context, JSValue obj, JSValue protoVal)
oProto := obj.prototype.__proto__
while oProto do
if oProto = protoVal then
ret := JSValue::construct(true)
ret.label := context
return ret
end if
oProto := oProto.prototype.__proto__
context := context.Join(oProto.prototype.l)
end while
ret := JSValue::construct(false)
ret.label := context
return ret
end procedure
procedure opRet(CallFrameStack* callStack, int ret)
JSValue retValue = callStack.cFN.rf[ret].value
if hostCallFrameFlag then
callStack.pop()
return nil, callStack, retValue
end if
callStack.pop()
return callStack.cFN.returnAddress, callStack, retValue
end procedure
procedure opCall(CallFrameStack* callStack, CFGNode* ip, int func, int argCount)
JSValue funcValue := callStack.cFN.rf[func].value
JSFunctionObject fObj
CallFrameNode *sigmaTop := new CallFrameNode()
CallFrameNode *prevTop := callStack.top()
callStack.push(sigmaTop)
CallType callType := getCallData(funcValue, &fObj)
if callType = CallTypeJS then
ScopeChainNode* sc := fObj.scopeChain
callStack.cFN.cfg := fObj.funcCFG
callStack.cFN.returnAddress := ip.Succ
callStack.cFN.sc := sc
args.noOfArgs := argCount
callStack.cFN.argCount := argCount
for i ← 0, argCount do
callStack.cFN.rf[sigmaTop.baseRegister() + i].value :=
prevTop.rf[prevTop.headRegister()-i].value
end for
ip := callStack.cFN.cfg.cfgNode
else if callType = CallTypeHost then
stop
end if
retState.ip := ip
retState.sigma := callStack
return retState
end procedure
. Not modeled
procedure opCallEval(JSLabel contextLabel, CallFrameStack* callStack, CFGNode* ip, int func,
int argCount)
JSValue funcValue := callStack.cFN.rf[func].value
JSFunctionObject* fObj
JSObject* variableObject
Argument* arguments
if isHostEval(funcValue) then
ScopeChainNode* sc := fObj.scopeChain
callStack.cFN.returnAddress := ip + 1
callStack.cFN.sc := sc
callStack.cFN.argCount := argCount
SourceCode progSrc := funcValue.getSource()
Compiler::preparse(progSrc)
CFG* evalCodeBlock := Compiler::compile(progSrc)
unsigned numVars := evalCodeBlock.numVariables()
unsigned numFuncs := evalCodeBlock.numFuncDecls()
if numVars || numFuncs then
if evalCodeBlock.strictMode then
JSActivation* variableObject := new JSActivation()
variableObject.create(callStack)
SChainObject* scObj
scObj.actObj := variableObject
sc.push(scObj, variableObject, contextLabel)
else
for (ScopeChainNode* n := sc;; n := n.next) do
if n.isVariableObject() && !n.isLexicalObject() then
variableObject := n.getObject()
break
end if
end for
end if
for i ← 0, numVars do
Identifier iden := evalCodeBlock.variable(i)
if !variableObject.hasProperty(iden) then
variableObject.insertVariable(iden)
end if
end for
for i ← 0, numFuncs do
JSFunctionObject* fObj := evalCodeBlock.funcDecl(i)
variableObject.insertFunction(fObj)
end for
end if
callStack.cFN.cfg := evalCodeBlock
ip := evalCodeBlock.cfgNode
retState.ip := ip
retState.sigma := callStack
return retState
else
return opCall(contextLabel, callStack, ip, func, argCount)
end if
end procedure
procedure createArguments(Heap* h, CallFrameStack* callStack)
JSObject* jsArgument := JSArgument::create(h, callStack)
h.o[++(h.location)] := *jsArgument
retState.theta := h
retState.val := JSValue::construct(jsArgument)
return retState
end procedure
procedure newFunc(CallFrameStack* callStack, Heap* heap, int funcIndex, JSLabel context)
CFG* cBlock := callStack.cFN.cfg
SourceCode fcCode := cBlock.getFunctionSrc(funcIndex)
CFG* fcBlock := Compiler::compile(fcCode,callStack.cFN)
JSFunctionObject* fObj := JSFunctionObject::create( fcBlock,callStack.cFN.sc)
fObj.structLabel := context
heap.o[++(heap.location)] := *fObj
retState.theta := heap
retState.val := JSValue::construct(fObj)
return retState
end procedure
procedure createActivation(CallFrameStack* callStack, JSLabel contextLabel)
JSActivation* jsActivation := new JSActivation()
jsActivation.create(callStack)
jsActivation.structLabel := contextLabel
SChainObject* scObj
scObj.actObj := jsActivation
JSValue vActivation := JSValue::jsValuefromActivation (jsActivation)
if callStack.cFN.scopeLabel ≥ contextLabel then
callStack.cFN.sc.push(scObj, VariableObject, contextLabel)
callStack.cFN.scopeLabel := contextLabel
else
stop
end if
return retState
end procedure
procedure createThis(JSLabel contextLabel, CallFrameStack* callStack, Heap* h)
JSFunctionObject* callee := callStack.cFN.callee
PropertySlot p(callee)
String str := "prototype"
JSValue proto := p.getValue(str)
JSObject* obj := new JSObject()
obj.structLabel := contextLabel
obj.prototype.__proto__ := proto.toObject()
obj.prototype.l := proto.toObject().structLabel.join( contextLabel)
h.o[++(h.location)] := *obj
retState.theta := h
retState.val := JSValue::construct(obj)
return retState
end procedure
procedure newObject(Heap* h, JSLabel contextLabel)
JSObject* obj := emptyObject()
obj.structLabel := contextLabel
obj.prototype.__proto__ := ObjectPrototype::create()
obj.prototype.l := contextLabel
h.o[++(h.location)] := *obj
retState.theta := h
retState.val := JSValue::construct(obj)
return retState
end procedure
procedure getPropertyById(JSValue v, String p, int dst)
JSObject* O := v.toObject()
JSLabel label := O.structLabel
JSValue ret := jsUndefined()
if O.isUndefined() then
ret.label := label
return ret
end if
while O 6= null do
if O.containsProperty(p) then
if p.isGetter() then
JSValue v = p.getValue()
JSFunctionObject* funcObj = (JSFunctionObject*) v.toObject()
CallFrameNode *sigmaTop = new CallFrameNode()
callStack.push(sigmaTop)
ScopeChainNode* sc = fObj.scopeChain
CFG* newCodeBlock = fObj.funcCFG
callStack.cFN.cfg = *newCodeBlock
callStack.cFN.returnAddress = ip + 1
callStack.cFN.sc = sc
callStack.cFN.getter = true
callStack.cFN.dReg = dst
ip = newCodeBlock.cfgNode
interpreter.iota = ip
interpreter.sigma = callStack
else
ret := getProperty(p).getValue()
ret.label := label
end if
return ret
else
O := O.prototype.__proto__
end if
label := label.join(label)
end while
end procedure
procedure putDirect(JSLabel contextLabel, CallFrameStack* callStack, Heap* h, int base, String
property, int propVal)
JSValue baseValue := callStack.cFN.rf[base]. value
JSValue propValue := callStack.cFN.rf[propVal]. value
JSObject* obj := baseValue.toObject()
PropertyDescriptor dataPD := PropertyDescriptor::createPD(true, true, true)
dataPD.value := propValue
obj.setProperty(property, dataPD)
obj.structLabel := obj.structLabel.join(contextLabel)
h.o[++(h.location)] := *obj
return h
end procedure
procedure putIndirect(JSLabel contextLabel, CallFrameStack* callStack, Heap* h, int base,
String property, int val)
JSValue baseValue := callStack.cFN.rf[base].value
JSValue propValue := callStack.cFN.rf[val].value
JSObject* obj := baseValue.toObject()
bool isStrict := callStack.cFN.cfg.isStrictMode()
contextLabel := obj.structLabel.join(contextLabel)
if obj.containsPropertyInItself(property) && obj. getProperty(property).isDataProperty() &&
!isStrict && obj.isWritable() then
obj.getProperty(property).setValue(propValue)
h.o[++(h.location)] := *obj
return h
end if
return putDirect(contextLabel, callStack, h, base, property, val)
end procedure
procedure delById(JSLabel contextLabel, CallFrameStack* callStack, Heap* h, int base, Identifier property)
JSValue baseValue := callStack.cFN.rf[base].value
JSObject* obj := baseValue.toObject()
int loc := h.findObject(obj)
Property prop := obj.getProperty(property)
PropertyDescriptor pd := prop.getPropertyDescriptor()
if obj.getPropertyValue(prop).label ≥ contextLabel then
if !obj.containsPropertyInItself(property) then
retState.theta := h
retState.val := JSValue::construct(true)
return retState
end if
if obj.containsPropertyInItself(property) && prop. isConfigurable() then
if !(callStack.cFN.cfg.isStrictMode()) then
pd.value := JSValue::constructUndefined()
obj.setProperty(property, pd)
h.o[loc] := *obj
retState.theta := h
retState.val := JSValue::construct(true)
return retState
end if
end if
retState.theta := h
retState.val := JSValue::construct(false)
return retState
else
stop
end if
end procedure
procedure putGetterSetter(JSLabel contextLabel, CallFrameStack* callStack, Heap* h, int base,
Identifier property, JSValue getterValue, JSValue setterValue)
JSValue baseValue := callStack.cFN.rf[base].value
JSObject* obj := baseValue.toObject()
int loc := h.findObject(obj)
JSFunctionObject *getterObj, *setterObj
JSFunctionObject *getterFuncObj := null, *setterFuncObj := null
if !getterValue.isUndefined() then
getterFuncObj := getterValue.toFunctionObject (callStack.cFN.cfg, callStack.cFN.sc)
end if
if !setterValue.isUndefined() then
setterFuncObj := setterValue.toFunctionObject (callStack.cFN.cfg, callStack.cFN.sc)
end if
if getterFuncObj 6= null then
obj.setGetter(property, getterObj)
end if
if setterFuncObj 6= null then
obj.setSetter(setterObj)
end if
PropertyDescriptor accessor := PropertyDescriptor ::createPD(false, false, false, true)
JSValue v := JSValue::constructUndefined()
v.label := contextLabel
accessor.value := v
obj.setProperty(property, accessor)
obj.structLabel := contextLabel
h.o[loc] := *obj
return h
end procedure
procedure getPropNames(CallFrameStack* callStack, Instruction* ip, int base, int i, int size, int
breakOffset)
JSValue baseVal := callStack.cFN.rf[base].value
JSObject* obj := baseVal.toObject()
PropertyIterator* propItr := obj.getProperties()
if baseVal.isUndefined() || baseVal.isNull() then
retState.v1 := jsUndefined()
retState.v2 := jsUndefined()
retState.v3 := jsUndefined()
retState.ip := ip + breakOffset
return retState
end if
retState.v1 := JSValue::construct(propItr)
retState.v2 := JSValue::construct(0)
retState.v3 := JSValue::construct(propItr.size())
retState.ip := ip + 1
return retState
end procedure
procedure getNextPropName(CallFrameStack* cStack, Instruction* ip, JSValue base, int i, int
size, int iter, int offset, int dst)
JSObject* obj := base.toObject()
PropertyIterator* propItr := cStack.cFN.rf[iter].value. toPropertyIterator()
int b := rFile[i].value.toInteger()
int e := rFile[size].value.toInteger()
while b < e do
String key := propItr.get(b)
retState.value1 := JSValue::construct(b + 1)
if !(key.isNull()) then
retState.value2 := JSValue::construct(key)
ip := ip + offset
break
end if
b++
end while
return retState
end procedure
procedure resolveInSc(JSLabel contextLabel, ScopeChainNode* scopeHead, String property)
JSValue v
JSLabel l
ScopeChainNode* scn := scopeHead
while scn 6= NULL do
PropertySlot pSlot := scn.getPropertySlot()
if pSlot.contains(property) then
v := pSlot.getValue(property)
v.label := contextLabel
return v
end if
scn := scn.next
if scn.scObjType = VariableObject then
contextLabel = contextLabel.join(scn.Object. actObj.structLabel)
else if scn.scObjType = LexicalObject then
contextLabel = contextLabel.join(scn.Object. obj.structLabel)
end if
contextLabel := contextLabel.join(scn. scopeNextLabel)
end while
v := jsUndefined()
v.label := contextLabel
return v
end procedure
procedure resolveInScWithSkip(JSLabel contextLabel, ScopeChainNode* scopeHead, String property, int skip)
JSValue v
JSLabel l
ScopeChainNode* scn := scopeHead
while skip−− do
scn := scn.next
if scn.scObjType = VariableObject then
contextLabel := contextLabel.join( scn.Object. actObj.structLabel)
else if scn.scObjType = LexicalObject then
contextLabel := contextLabel.join(scn.Object. obj.structLabel)
end if
contextLabel := contextLabel.join(scn. scopeNextLabel)
end while
while scn 6= null do
PropertySlot pSlot := scn.getPropertySlot()
if pSlot.contains(property) then
v := pSlot.getValue(property)
v.label := contextLabel
return v
end if
scn := scn.next
if scn.scObjType = VariableObject then
contextLabel := contextLabel.join(scn.Object. actObj.structLabel)
else if scn.scObjType = LexicalObject then
contextLabel := contextLabel.join(scn.Object. obj.structLabel)
end if
contextLabel := contextLabel.join(scn. scopeNextLabel)
end while
v := jsUndefined()
v.label := contextLabel
return v
end procedure
procedure resolveGlobal(JSLabel contextLabel, CallFrameStack* cStack, String property)
JSValue v
struct CFG* cBlock := cStack.cFN.cfg
JSGlobalObject* globalObject := cBlock. getGlobalObject()
PropertySlot pSlot(globalObject)
if pSlot.contains(property) then
v := pSlot.getValue(property)
v.label := contextLabel
return v
end if
v := jsUndefined()
v.label := contextLabel
return v
end procedure
procedure resolveBase(JSLabel contextLabel, CallFrameStack* cStack, ScopeChainNode* scopeHead, String property, bool strict)
JSValue v
ScopeChainNode* scn := scopeHead
CFG *cBlock := cStack.cFN.cfg
JSGlobalObject *gObject := cBlock.globalObject
while scn 6= null do
JSObject* obj := scn.get()
contextLabel := obj.structLabel.join(contextLabel)
PropertySlot pSlot(obj)
if scn.next = null && strict && !pSlot.contains (property) then
v := emptyJSValue()
v.label := contextLabel
return v
end if
if pSlot.contains(property) then
v := JSValueContainingObject(obj)
v.label := contextLabel
return v
end if
scn := scn.next
if scn 6= null then
contextLabel := contextLabel.join(scn. scopeNextLabel)
end if
end while
v := JSValue::construct(gObject)
v.label := contextLabel
return v
end procedure
procedure resolveBaseAndProperty(JSLabel contextLabel, CallFrameStack cStack, int bRegister, int pRegister, String property)
JSValue v
ScopeChainNode* scn := cStack.cFN.sc
while scn 6= null do
JSObject* obj := scn.get()
contextLabel := obj.structLabel.join(contextLabel)
PropertySlot pSlot(obj)
if pSlot.contains(property) then
v := pSlot.getValue(property)
v.label := contextLabel
ret.val1 := v
v := JSValueContainingObject(obj)
v.label := contextLabel
ret.val2 := v
return ret
end if
scn := scn.next
if scn 6= null then
contextLabel := contextLabel.join(scn. scopeNextLabel)
end if
end while
end procedure
procedure getScopedVar(JSLabel contextLabel, CallFrameStack* callStack, Heap* h, int index,
int skip)
JSValue v
ScopeChainNode* scn := callStack.cFN.sc
while skip−− do
if scn.scObjType = VariableObject then
contextLabel := contextLabel.join(scn.Object.actObj. structLabel)
else if scn.scObjType = LexicalObject then
contextLabel := contextLabel.join(scn.Object.obj. structLabel)
end if
contextLabel := contextLabel.join(scn. scopeLabel)
scn := scn.next
end while
v := scn.registerAt(index)
if scn.scObjType = VariableObject then
v.label := contextLabel.join(scn.Object.actObj. structLabel)
else if scn.scObjType = LexicalObject then
v.label := contextLabel.join(scn.Object.obj. structLabel)
end if
return v
end procedure
procedure putScopedVar(JSLabel contextLabel, CallFrameStack* callStack, Heap* h, int index,
int skip, int value)
CallFrameStack* cStack
ScopeChainNode* scn := callStack.cFN.sc
JSValue val := callStack.cFN.rf[value].value
while skip−− do
if scn.scObjType = VariableObject then
contextLabel := contextLabel.join(scn.Object. actObj.structLabel)
else if scn.scObjType = LexicalObject then
contextLabel := contextLabel.join(scn.Object. obj.structLabel)
end if
contextLabel := contextLabel.join(scn. scopeLabel)
scn := scn.next
end while
cStack := scn.setRegisterAt(contextLabel, index, val)
return cStack
end procedure
procedure pushScope(JSLabel contextLabel, CallFrameStack* callStack, Heap* h, int scope)
ScopeChainNode* sc := callStack.cFN.sc
JSValue v := callStack.cFN.rf[scope].value
JSObject* o := v.toObject()
SChainObject* scObj
if sc.scopeLabel ≥ contextLabel then
scObj.obj := o
sc.push(scObj, LexicalObject, contextLabel)
callStack.cFN.sc := sc
else if sc.scopeLabel = star then
scObj.obj := o
sc.push(scObj, LexicalObject, star)
callStack.cFN.sc := sc
end if
return callStack
end procedure
procedure popScope(JSLabel contextLabel, CallFrameStack* callStack, Heap* h)
ScopeChainNode* sc := callStack.cFN.sc
JSLabel l := sc.scopeLabel
if l ≥ contextLabel then
sc.pop()
callStack.cFN.sc := sc
else
stop
end if
return callStack
end procedure
procedure jmpScope(JSLabel contextLabel, CallFrameStack* callStack, Heap* h, int count)
ScopeChainNode* sc := callStack.cFN.sc
while count−− > 0 do
JSLabel l := sc.scopeLabel
if l ≥ contextLabel then
sc.pop()
callStack.cFN.sc := sc
else
stop
end if
end while
return callStack
end procedure
procedure throwException(CallFrameStack* callStack, CFGNode* iota)
CFGNode* handler
while callStack.cFN.hasHandler()==false do
callStack.pop()
end while
while callStack.cFN.sc.length() - callStack.cFN.getHandlerScopeDepth() do
callStack.cFN.sc.pop()
end while
handler := callStack.cFN.getHandler(iota)
interpreter.iota := handler
interpreter.sigma := callStack
end procedure
8.3
Semantics
ι = “prim dst:r src1:r src2:r”
L := Γ (!σ(src1)) t Γ (!σ(src2)) t Γ (!ρ)
V := Υ (!σ(src1)) ⊕ Υ (!σ(src2))
(Γ
(!σ(dst))
≥
Γ
(!ρ))
⇒
(L
:=
L) (L := ?)
σ 0 := σ
prim:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
0
0
ι , θ, σ , ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
prim reads the values from two registers (src1 and src2), performs the binary
operation generically denoted by ⊕, and writes the result into the dst register.
The label assigned to the value in dst register is the join of the label of value in
src1, src2 and the head of the pc-stack (!ρ). In order to avoid implicit leak of
information, the label of the existing value in dst is compared with the current
context label. If the label is lower than the context label, the label of the value
in dst is set to ?.
σ 0 := σ
mov:
ι = “mov dst:r src:r”
L := Γ (!σ(src)) t Γ (!ρ)
V = Υ (!σ(src))
(Γ (!σ(dst))
≥
Γ
(!ρ))
⇒
(L
:=
L) (L := ?)
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
0
0
ι , θ, σ , ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
mov copies the value from the src register to the dst register. The label assigned
to the value in dst register is the join of the label of value in src and the head
of the pc-stack (!ρ). In order to avoid implicit leak of information, the label of
the existing value in dst is compared with the current context label. If the label
is lower than the context label, the label of the value in dst is joined with ?.
jfalse:
ι = “jfalse cond:r target:offset”
Γ (!σ(cond)) 6= ?
ρ00 := ρ.push(Γ (!σ(cond)) t Γ (!ρ), IPD(ι), CF(ι), false)
Υ (!σ(cond)) = false ⇒ ι0 := Left(!σ.CFG, ι) ι0 := Right(!σ.CFG, ι)
ρ0 := isIPD(ι0 , ρ00 , σ)
ι, θ, σ, ρ
ι0 , θ, σ, ρ0
jfalse is a branching instruction. Based on the value in the cond register, it
decides which branch to take. The operation is performed only if the value in
cond is not labelled with a ?. If it contains a ?, we terminate the execution to
prevent possible leak of information. The push function defined in the rule does
the following: A node is pushed on the top of the pc-stack containing the IPD
of the branching instruction and the label of the value in cond joined with the
context, to define the context of this branch. If the IPD of the instruction is SEN
or the same as the top of the pc-stack, then we just join the label on top of the
pc-stack with the context label determined by the cond register.
loop-if-less:
ι = “loop-if-less src1:r src2:r target:offset”
Γ (!σ(src1)) 6= ?
Γ (!σ(src2)) 6= ?
L := Γ (!σ(src1)) t Γ (!σ(src2)) t Γ (!ρ)
Υ (!σ(src1)) < Υ (!σ(src2)) ⇒ ι0 := Left(!σ.CFG, ι) ι0 := Right(!σ.CFG, ι)
00
ρ := ρ.push(L, IPD(ι), CF(ι), false)
ρ0 := isIPD(ι0 , ρ00 , σ)
ι, θ, σ, ρ
ι0 , θ, σ, ρ0
loop-if-less is another branching instruction. If the value of src1 is less than
src2, then it jumps to the target, else continues with the next instruction. The
operation is performed only if the values in src1 and src2 are not labelled with
a ?. If any one of them contains a ?, we abort the execution to prevent possible
leak of information. The push function defined in the rule does the following: A
node is pushed on the top of the pc-stack containing the IPD of the branching
instruction and the join of the label of the values in src1 and src2 joined with
the context, to define the context of this branch. If the IPD of the instruction is
SEN or the same as the top of the pc-stack, then we just join the label on top
of the pc-stack with the context label determined above.
σ 0 := σ
typeof:
ι = “typeof dst:r src:r”
L := (Γ (src) t Γ (!ρ))
V := determineType(!σ(src))
(Γ (!σ(dst))
≥
Γ
(!ρ))
⇒ (L := L) (L := ?)
Υ (!σ(dst)):=V
ι0 := Succ(!σ 0 .CFG, ι)
Γ (!σ(dst)):=L
0
ι, θ, σ, ρ
0
ι , θ, σ , ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
typeof determines the type string for src according to ECMAScript rules, and
puts the result in register dst. We do a deferred NSU check on dst before writing
the result in it. The determineType function returns the data type of the value
passed as the parameter.
ι = “instanceof dst:r value:r cProt:r”
v := isInstanceOf (Γ (!ρ), !σ(value), cProt)
L = Γ (v)
(Γ
(!σ(dst))
≥
Γ
(!ρ))
⇒
(L
:=
L)
(L := ?),
σ 0 := σ
instanceof:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
0
ι, θ, σ, ρ
0
ι , θ, σ , ρ
V = Υ (v),
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
instanceof tests whether the cProt is in the prototype chain of the object in
register value and puts the Boolean result in the dst register after deferred NSU
check.
enter:
ι = “enter”
ι0 := Succ(!σ.CFG, ι)
ρ0 := isIPD(ι0 , ρ, σ)
ι0 , θ, σ, ρ0
ι, θ, σ, ρ
enter marks the beginning of a code block.
ret:
ι = “ret res:r”
(ι0 , σ 0 , γ) := opRet(σ, res)
ι, θ, σ, ρ
0
0
ι , θ, σ , ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
ret is the last instruction to be executed in a function. It pops the call-frame and
returns the control to the callee’s call-frame. The return value of the function is
written to a local variable in the interpreter (γ), which can be read by the next
instruction being executed.
end:
ι = “end res:r”
ι, θ, σ, ρ
opEnd(σ, res)
−
end marks the end of a program. opEnd passes the value present in res register
to the caller (the native function that invoked the interpreter).
00
call:
ρ
ι = “op-call func:r args:n”
Γ (func) 6= ?
(ι0 , σ 0 , H, `f ) := opCall(σ, ι, func, args)
:= ρ.push(`f t Γ (!σ(func)) t Γ (!ρ), IPD(ι), CF(ι), H)
ρ0 := isIPD(ι0 , ρ00 , σ 0 )
ι0 , θ, σ 0 , ρ0
ι, θ, σ, ρ
call, initially, checks the function object’s label for ? and if the label contains a
?, the program execution is aborted. The reason for termination is the possible
leak of information as explained above. If not, call creates a new call-frame,
copies the arguments, initializes the registers, scope-chain pointer, codeblock
and the return address. The registers are initialized to undefined and assigned
a label obtained by joining the label of the context in which the function was
created and the label of the function object itself. We treat call as a branching
instruction and hence, push a new node on the top of the pc-stack with the
label determined above along with its IPD and call-frame. The field H in the
push function is determined by looking up the exception table. If it contains
an associated exception handler, it sets the field to true else it is set to false.
If the IPD is the SEN then we just join the label on the top of the stack with
the currently calculated label. It then points the instruction pointer to the first
instruction of the new code block.
σ 0 := σ
call-put-result:
ι = “call-put-result res:r”
L := Γ (γ) t Γ (!ρ)
V := Υ (γ)
(Γ (!σ(res))
≥ Γ (!ρ)) ⇒ L := L L := ?
Υ (!σ(res)):=V
ι0 := Succ(!σ 0 .CFG, ι)
Γ (!σ(res)):=L
ι, θ, σ, ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
call-put-result copies the return value γ to the res register. The label assigned
to the value in res register is the join of the label of the return value and the
head of the pc-stack. In order to avoid implicit leak of information, deferred
no-sensitive-upgrade is performed.
call-eval:
ρ00
ι = “call-eval func:r args:n”
Γ (!σ(func)) 6= ?
(ι0 , σ 0 , H, `f ) := opCallEval(Γ(!ρ), σ, ι, func, args)
:= ρ.push(`f t Γ (!σ(func)) t Γ (!ρ), IPD(ι), CF(ι), H)
ρ0 := isIPD(ι0 , ρ00 , σ 0 )
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
call-eval calls a function with the string passed as an argument converted to a
code block. If func register contains the original global eval function, then it is
performed in local scope, else it is similar to call.
ι = “create-arguments dst:r”
(θ 0 , v) := createArguments(θ, σ)
L := Γ (!ρ)
V := Υ (v)
(Γ
(!σ(dst))
≥
Γ
(!ρ))
⇒
L
:=
L
L
:=
?
σ 0 := σ
create-arguments:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
0
0
0
ι ,θ ,σ ,ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
create-arguments creates the arguments object and places its pointer in the local
dst register after the deferred NSU check. The label of the arguments object is
set to the context.
ι = “new-func dst:r funcIndex:f”
(θ 0 , v) := newFunc(σ, θ, funcIndex, Γ(!ρ))
L := Γ (v) t Γ (!ρ)
(Γ (!σ(dst))
≥ Γ (!ρ)) ⇒ L := L L := ?
σ 0 := σ
new-func:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
V := Υ (v)
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ 0 , σ 0 , ρ0
new-func constructs a new function instance from function at funcIndex and the
current scope chain and puts the result in dst after deferred NSU check.
ι = “create-activation dst:r”
(σ 0 , v) := createActivation(σ, Γ(!ρ))
L := Γ (v) t Γ (!ρ)
(Γ (!σ(dst)) ≥ Γ (!ρ)) ⇒ L := L L := ?
σ 0 := σ
create-activation:
Υ (!σ00 (dst)):=V
Γ (!σ 00 (dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
V := Υ (v)
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
create-activation creates the activation object for the current call-frame if it has
not been already created and writes it to the dst after the deferred NSU check
and pushes the object in the scope-chain. If the label of the head of the existing
scope-chain is less than the context, then the label of the pushed node is set to
?, else it is set to the context.
00
construct:
ρ
ι = “construct func:r args:n”
Γ (!σ(func)) 6= ?
(ι0 , σ 0 , H, `f ) := opCall(σ, ι, func, args)
0
:= ρ.push(`f t Γ (!σ (func)) t Γ (!ρ), IPD(ι), CF(ι), H)
ρ0 := isIPD(ι0 , ρ00 , σ 0 )
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
construct invokes register func as a constructor and is similar to call. For JavaScript functions, the this object being passed (the first argument in the list of
arguments) is a new object. For host constructors, no this is passed.
ι = “create-this dst:r”
(θ 0 , v) := createThis(Γ(!ρ), σ, θ)
L := Γ (v) t Γ (!ρ)
(Γ (!σ(dst))
≥ Γ (!ρ)) ⇒ L := L L := ?
σ 0 := σ
create-this:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
V := Υ (v)
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ 0 , σ 0 , ρ0
create-this creates and allocates an object as this used for construction later in
the function. The object is labelled the context and placed in dst after deferred
NSU check. The prototype chain pointer is also labelled with the context label.
ι = “new-object dst:r”
(θ 0 , v) := newObject(θ, Γ (!ρ))
L := Γ (v) t Γ (!ρ)
V := Υ (v)
(Γ (!σ(dst))
≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
σ 0 := σ
new-object:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ 0 , σ 0 , ρ0
new-object constructs a new empty object instance and puts it in dst after deferred NSU check. The object is labelled with the context label and the prototype
chain pointer is also labelled with the context.
ι = “get-by-id dst:r base:r prop:id vdst:r”
v := getPropertyById(!σ(base), prop, vdst)
L := Γ (v) t Γ (!ρ)
(Γ (!σ(dst))
≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
σ 0 := σ
get-by-id:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
V := Υ (v)
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
get-by-id gets the property named by the identifier prop from the object in the
base register and puts it into the dst register after the deferred NSU check. If
the object does not contain the property, it looks up the prototype chain to
determine if any of the proto objects contain the property. When traversing the
prototype chain, the context is joined with the structure label of all the objects
and the prototype chain pointer labels until the property is found or the end of
the chain. It then joins the property label to the context. If the property is not
found, it returns undefined. The joined label of the context is the label of the
property put in the dst register.
If the property is an accessor property, it calls the getter function, sets the
getter flag in the call-frame and updates the destination register field with the
register where the value is to be inserted. It then transfers the control to the
first instruction in the getter function.
put-by-id:
ι = “put-by-id base:r prop:id value:r direct:b”
Γ (!σ(value)) 6= ?
(direct = true ⇒ θ 0 := putDirect(Γ (!ρ), σ, θ, base, prop, value)
θ 0 := putIndirect(Γ (!ρ), σ, θ, base, prop, value))
ι0 := Succ(!σ.CFG, ι)
ρ0 := isIPD(ι0 , ρ, σ)
ι, θ, σ, ρ
ι0 , θ 0 , σ, ρ0
put-by-id writes into the heap the property of an object. We check for ? in
the label of value register. If it contains a ?, the program aborts as this could
potentially result in an implicit information flow. If not, it writes the property
into the object. The basic functionality is to search for the property in the object
and its prototype chain, and change it. If the property is not found, a new
property for the current object with the property label as the context is created.
Based on whether the property is in the object itself (or needs to be created in
the object itself) or in the prototype chain of the object, it calls putDirect and
putIndirect, respectively.
ι = “del-by-id dst:r base:r prop:id”
Γ (!σ(base)) 6= ?
(θ 0 , v) := delById(Γ (!ρ), σ, θ, base, prop)
L := Γ (v) t Γ (!ρ)
V := Υ (v) (Γ (!σ(dst)) ≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
σ 0 := σ
del-by-id:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
0
0
0
ι ,θ ,σ ,ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
del-by-id deletes the property specified by prop in the object contained in base.
If the structure label of the object is less than the context, the deletion does not
happen. If the property is found, the property is deleted and Boolean value true
is written to dst, else it writes false to dst. The label of the Boolean value is the
structure label of the object joined with the property label.
getter-setter:
ι = “put-getter-setter base:r prop:id getter:r setter:r”,
?∈
/ Γ (!σ(getter)), ? ∈
/ Γ (!σ(setter)),
θ 0 := putGetterSetter(Γ(!ρ), σ, base, prop, !σ(getter), !σ(setter)),
ι0 := Succ(!σ.CFG, ι), ρ0 := isIPD(ι0 , ρ)
ι0 , θ 0 , σ, ρ0
ι, θ, σ, ρ
getter-setter puts the accessor descriptor to the object in register base. It initially
checks if the structure label of the object is greater or equal to the context. The
property for which the accessor properties are added is given in the register prop.
The property label of the accessor functions is set to the context. putGetterSetter
calls putIndirect internally and sets the getter/setter property of the object with
the specified value.
ι = “get-pnames dst:r base:r i:r size:r breakTarget:offset”
Γ (!σ(base)) 6= ?
(v1 , v2 , v3 , ι0 ) := getPropNames(σ, ι, base, i, size, breakTarget)
Ln := Γ (!σ(base)) t Γ (vn ) t Γ (!ρ)
Vn := Υ (vn ), n := 1, 2, 3
(Γ (!σ(dst)) ≥ Γ (!ρ)) ⇒ (L1 := L1 ) (L1 := ?)
(Γ (!σ(i)) ≥ Γ (!ρ)) ⇒ (L2 := L2 ) (L2 := ?)
(Γ (!σ(size)) ≥ Γ (!ρ)) ⇒ (L3 := L3 ) (L3 := ?)
σ 00 := σ
get-pnames:
Υ (!σ(dst)):=V1
Γ (!σ(dst)):=L1
σ 000 := σ 00
Υ (!σ00 (i)):=V2
Γ (!σ 00 (i)):=L2
σ 0 := σ 000
Υ (!σ000 (size)):=V3
Γ (!σ 000 (size)):=L3
vn = undefined ⇒ (L = Γ (!σ(base)))
(L = Γ (!σ(base)) t Γ(θ(!σ(base))) t (∀p ∈ Prop(θ(!σ(base))).Γ(p)))
ρ00 = ρ.push(L, IPD(ι), CF(ι), false)
ρ0 := isIPD(ι0 , ρ00 , σ 0 )
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
get-pnames creates a property name list for object in register base and puts it in
dst, initializing i and size for iteration through the list, after the deferred NSU
check. If base is undefined or null, it jumps to breakTarget. It is a branching
instruction and pushes the label with join of all the property labels and the
structure label of the object along with the IPD on the pc-stack. If the IPD of
the instruction is SEN or the same as the top of the pc-stack, then we just join
the label on top of the pc-stack with the context label determined above.
ι = “next-pname dst:r base:r i:n size:n iter:n target:offset”
(v1 , v2 , ι0 ) := getNextPropNames(σ, ι, base, i, size, iter, target)
Ln := Γ (vn ) t Γ (!ρ)
Vn := Υ (vn ), n := 1, 2
(Γ (!σ(dst)) ≥ Γ (!ρ)) ⇒ (L1 := L1 ) (L1 := ?)
(Γ (!σ(i)) ≥ Γ (!ρ)) ⇒ (L2 := L2 ) (L2 := ?)
σ 00 := σ
next-pname:
Υ (!σ(dst)):=V1
Γ (!σ(dst)):=L1
σ 0 := σ 00
ι, θ, σ, ρ
Υ (!σ00 (i)):=V2
Γ (!σ 00 (i)):=L2
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
next-pname copies the next name from the property name list created by getpnames in iter to dst after deferred NSU check, and jumps to target. If there are
no names left, it continues with the next instruction. Although, it behaves as a
branching instruction, the context pertaining to this opcode is already pushed
in get-pnames. Also, the IPD corresponding to this instruction, is the same as
the one determined by get-pnames. Thus, we do not push on the pc-stack in this
instruction.
L := Γ (v)
t Γ (!ρ)
σ 0 := σ
resolve:
ι = “resolve dst:r prop:id”
v := resolveInSc(Γ(!ρ), !σ.sc, prop)
V := Υ (v)
(Γ (!σ(dst)) ≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
resolve searches for the property in the scope chain and writes it into dst register,
if found. The label of the property written in dst is a join of the context label, all
the nodes (structure label of the object contained in it) traversed in the scope
chain and the label associated with the pointers in the chain until the node
(object) where the property is found. If the initial label of the value contained in
dst was lower than the context label, then the label of the value in dst is joined
with ?. In case the property is not found, the instruction throws an exception
(similar to throw, as described later).
ι = “resolve-skip dst:r prop:id skip:n”
v := resolveInScWithSkip(Γ(!ρ), !σ.sc, prop, skip)
L := Γ (v)
t Γ (!ρ)
V := Υ (v)
(Γ (!σ(dst)) ≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
σ 0 := σ
resolve-skip:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
resolve-skip looks up the property named by prop in the scope chain similar to
resolve, but it skips the top skip levels and writes the result to register dst. If
the property is not found, it also raises an exception and behaves similarly to
resolve.
L := Γ (v)
t Γ (!ρ)
σ 0 := σ
resolve-global:
ι = “resolve-global dst:r prop:id”
v := resolveGlobal(Γ(!ρ), σ, prop)
V := Υ (v)
(Γ (!σ(dst)) ≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
0
0
ι , θ, σ , ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
resolve-global looks up the property named by prop in the global object. If the
structure of the global object matches the one passed here, it looks into the
global object. Else, it falls back to perform a full resolve.
ι = “resolve-base dst:r prop:id isStrict:bool”
v := resolveBase(Γ(!ρ), σ, !σ.sc, prop, isStrict)
L := Γ (v)
t Γ (!ρ)
V := Υ (v)
(Γ (!σ(dst)) ≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
σ 0 := σ
resolve-base:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
resolve-base looks up the property named by prop in the scope chain similar to
resolve but writes the object to register dst. If the property is not found and
isStrict is false, the global object is stored in dst.
ι = “resolve-with-base bDst:r pDst:r prop:id”
(bdst, pdst) := resolveBaseAndProperty(Γ(!ρ), σ, baseDst, propDst, prop)
L1 := Γ (!σ(bdst)) t Γ(!ρ)
V1 := Υ(!σ(bdst))
L2 := Γ (!σ(pdst)) t Γ(!ρ)
V2 := Υ(!σ(pdst))
(Γ (!σ(bDst)) ≥ Γ (!ρ)) ⇒ (L1 := L1) (L1 := ?)
(Γ (!σ(pDst)) ≥ Γ (!ρ)) ⇒ (L2 := L2) (L2 := ?)
σ 00 := σ
Υ (!σ(bDst)):=V1
σ 0 := σ 00
Γ (!σ(bDst)):=L1
0
ι0 := Succ(!σ .CFG, ι)
resolve-with-base:
Υ (!σ00 (pDst)):=V2
Γ (!σ 00 (pDst)):=L2
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
ι, θ, σ, ρ
resolve-with-base looks up the property named by prop in the scope chain similar
to resolve-base and writes the object to register bDst. It also, writes the property
to pDst. If the property is not found it raises an exception like resolve.
ι = “get-scoped-var dst:r index:n skip:n”
v := getScopedVar(Γ(!ρ), σ, θ, index, skip)
L := Γ (v) t Γ (!ρ)
(Γ (!σ(dst))
≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
σ 0 := σ
get-scoped-var:
Υ (!σ(dst)):=V
Γ (!σ(dst)):=L
ι0 := Succ(!σ 0 .CFG, ι)
V := Υ (v)
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
ι, θ, σ, ρ
get-scoped-var loads the contents of the index local from the scope chain skipping
skip nodes and places it in dst, after deferred NSU. The label of the value in
dst includes the join of the current context along with all the structure label of
objects in the skipped nodes.
put-scoped-var:
ι = “put-scoped-var index:n skip:n value:r”
Γ (!σ(value)) 6= ?
σ 0 := putScopedVar(Γ(!ρ), σ, θ, index, skip, value)
ι0 := Succ(!σ 0 .CFG, ι)
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
ι, θ, σ, ρ
put-scoped-var puts the contents of the value in the index local in the scope
chain skipping skip nodes. The label of the value includes the join of the current
context along with the structure label of all the objects in the skipped nodes.
ι = “push-scope scope:r”
σ 0 := pushScope(Γ(!ρ), σ, scope)
ι0 := Succ(!σ 0 .CFG, ι)
push-scope:
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
ι, θ, σ, ρ
push-scope converts scope to object and pushes it onto the top of the current
scope chain. The contents of the register scope are replaced by the created object.
The scope chain pointer label is set to the context.
pop-scope:
σ 0 := popScope(Γ (!ρ), σ)
ι = “pop-scope”
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
0
0
ι , θ, σ , ρ
ρ0 := isIPD(ι0 , ρ, σ 0 )
0
pop-scope removes the top item from the current scope chain if the scope chain
pointer label is greater than or equal to the context.
jmp-scope:
ι = “jmp-scope count:n target:n”
σ 0 := jmpScope(Γ(!ρ), σ, count)
ι0 := Succ(!σ 0 .CFG, ι)
ι, θ, σ, ρ
0
0
ι , θ, σ , ρ
0
ρ0 := isIPD(ι0 , ρ, σ 0 )
jmp-scope removes the top count items from the current scope chain if the scope
chain pointer label is greater than or equal to the context. It then jumps to offset
specified by target.
throw:
ι = “throw ex:r”
excValue := Υ (!σ(ex))
(σ 0 , ι0 ) := throwException(σ, ι)
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι, θ, σ, ρ
ι0 , θ, σ 0 , ρ0
throw throws an exception and points to the exception handler as the next
instruction to be executed, if any. The exception handler might be in the same
function or in an earlier function. If it is not present, the program terminates. If
it has an exception handler, it has an edge to the synthetic exit node. Apart from
this, throwException pops the call-frames from the call-stack until it reaches the
call-frame containing the exception handler. It writes the exception value to a
local interpreter variable (excValue), which is then read by catch.
L := Γ (excValue)
t Γ (!ρ)
σ 0 := σ
0
catch:
ι = “catch ex:r”
(Γ (!σ(ex))
≥ Γ (!ρ)) ⇒ (L := L) (L := ?)
Υ (!σ(ex)):=Υ (excValue))
Γ (!σ(ex)):=L
0
ι := Succ(!σ .CFG, ι)
ι, θ, σ, ρ
excValue := empty
ρ0 := isIPD(ι0 , ρ, σ 0 )
ι0 , θ, σ 0 , ρ0
catch catches the exception thrown by an instruction whose handler corresponds
to the catch block. It reads the exception value from excValue and writes into
the register ex. If the label of the register is less than the context, a ? is joined
with the label. It then makes the excValue empty and proceeds to execute the
first instruction in the catch block.
8.4
Proofs and Results
The fields in a frame of the pc-stack are denoted by the following symbols: !ρ.ipd
represents the IPD field in the top frame of the pc-stack, Γ (!ρ) returns the label
field in the top frame of the pc-stack, and !ρ.C returns the call-frame field in the
top frame of the pc-stack.
In the definitions and proofs that follow, we assume that the level of attacker
is L in the three-element lattice presented earlier, i.e., in the equivalence relation ∼β` , ` = L. The level of the attacker is omitted for clarity purposes from
definitions and proofs.
Definition 1 (Partial bijection) A partial bijection β is a binary relation on
heap locations satisfying the following properties: (1) if (a, b) ∈ β and (a, b0 ) ∈ β,
then b = b0 , and (2) if (a, b) ∈ β and (a0 , b) ∈ β, then a = a0 .
Using partial bijections, we define equivalence of values, labeled values and
objects.
Definition 2 (Value equivalence) Two values r1 and r2 are equivalent up to
β, written r1 ∼β r2 if either (1) r1 = a, r2 = b and (a, b) ∈ β, or (2) r1 = r1 = v
where v is some primitive value.
Definition 3 (Labeled value equivalence) Two labeled values v1 = r1`1 and
v2 = r2`2 are equivalent up to β, written v1 ∼β v2 if one of the following holds:
(1) `1 = ? or `2 = ?, or (2) `1 = `2 = H, or (3) `1 = `2 = L and r1 ∼β r2 .
The first clause of the above definition is standard for the permissive-upgrade
check. It equates a partially leaked value to every other labeled value.
Objects are formally denoted as N = ({pi 7→ {vi , flags i }}ni=0 , __proto__ 7→
a`p , `s ) . Here pi s correspond to the property name, vi s are their respective
values and flags i represent the writable, enumerable and configurable flags as
described in the PropertyDescriptor structure in the cpp model above. As the
current model does not allow modification of the flags, they are always set to
true. Thus, we do not need to account for the flags i in the equivalence definition
below. __proto__ represents a labelled pointer to the object’s prototype.
Definition 4 (Object equivalence) For ordinary objects N = ({pi 7→ {vi ,
flags i }}ni=0 , __proto__ 7→ a`p , `s ) and N 0 = ({p0i 7→ {vi0 , flags 0i }}m
i=0 , __proto__
0
7→ a0`p , `0s ), we say N ∼β N 0 iff either `s = `0s = H or the following hold:
(1) `s = `0s = L, (2) [p0 , . . . , pn ] = [p00 , . . . , p0m ] (in particular, n = m), (3)
0
∀i. vi ∼β vi0 , and (4) a`p ∼β a`p .
For function objects F = (N, f, Σ) and F 0 = (N 0 , f 0 , Σ 0 ), we say F ∼β F 0 iff
either N.`s = N.`0s = H or N ∼β N 0 , f =β f 0 and Σ ∼β Σ 0 .
The equality f =β f 0 of nodes f, f 0 in CFGs means that the portions of the
CFGs reachable from f, f 0 are equal modulo renaming of operands to bytecodes
under β. Equivalence Σ ∼β Σ 0 of scope chains is defined below. Because we
do not allow ? to flow into heaps, we do not need corresponding clauses in the
definition of object equivalence.
Definition 5 (Heap equivalence) For two heaps θ1 , θ2 , we say that θ1 ∼β θ2
iff ∀(a, b) ∈ β. θ1 (a) ∼β θ2 (b).
Unlike objects, we allow ? to permeate scope chains, so our definition of
scope chain equivalence must account for it. Scope chains are denoted as Σ. A
scope-chain node contains a label ` along with an object S (either JSActivation
or JSObject) represented as (S, `).
Definition 6 (Scope chain equivalence) For two scope chain nodes S, S 0 ,
we say that S ∼β S 0 if one of the following holds: (1) S = O, S 0 = O0 and
O ∼β O0 , or (2) S = v0 : . . . : vn , S 0 = v00 : . . . : vn0 and ∀i. vi ∼β vi0 .
Equivalence of two scope chains Σ, Σ 0 is defined by the following rules. (1)
nil ∼β nil (2) (nil ∼β (S, `)) if ` = H or ` = ? (3) ((S, `) ∼β nil) if ` = H
or ` = ? and (4) ((S, `) : Σ) ∼β ((S 0 , `0 ) : Σ 0 ) if one of the following holds: (a)
` = ? or `0 = ?, (b) ` = `0 = H, or (c) ` = `0 = L, S ∼β S 0 and Σ ∼β Σ 0 .
Definition 7 (Call-frame equivalence) For two call frames µ1 , µ2 , we say
µ1 ∼β µ2 iff (1) #Registers(µ1 ) = #Registers(µ2 ), (2) ∀i. µ1 .Registers[i] ∼β
µ2 .Registers[i], (3) µ1 .CFG =β µ2 .CFG, (4) µ1 .Scopechain ∼β µ2 .Scopechain,
(5) µ1 .ιr = µ2 .ιr (6) (µ1 .`c = µ2 .`c = H) ∨ (µ1 .`c = µ2 .`c = L ∧ µ1 .fcallee ∼β
µ2 .fcallee ) (7) µ1 .argcount = µ2 .argcount (8) µ1 .getter = µ2 .getter and (9)
µ1 .dReg =β µ1 .dReg
Note that a register is simply a labeled value in our semantics, so clause (2)
above is well-defined.
Definition 8 (pc-stack equivalence) For two pc-stacks ρ1 , ρ2 , we say ρ1 ∼ ρ2
iff the corresponding nodes of ρ1 and ρ2 having label L are equal, except for the
call-frame (C) field.
In proofs that follow, two pc-stack nodes are equal if their respective fields
are equal, except for the call-frame (C) field.
Definition 9 (Call-stack equivalence) Given ρ1 ∼ ρ2 , suppose:
e1 is the lowest H-labelled node in ρ1
e2 is the lowest H-labelled node in ρ2
µ1 is the node of σ1 pointed to by e1
µ2 is the node of σ2 pointed to by e2
σ10 is prefix of σ1 up to and including µ1 or
if Γ (!ρ1 ) = L or ρ1 is empty, σ10 = σ1
6. σ20 is prefix of σ2 up to and including µ2 or
if Γ (!ρ2 ) = L or ρ2 is empty, σ20 = σ2
1.
2.
3.
4.
5.
then σ1 ∼βρ1 ,ρ2 σ2 , iff (1) |σ10 | = |σ20 |, and (2) ∀i ≤ |σ10 |.(σ10 [i] ∼β σ20 [i]).
Definition 10 (State equivalence) Two states s1 = hι1 , θ1 , σ1 , ρ1 i and s2 =
hι2 , θ2 , σ2 , ρ2 i are equivalent, written as s1 ∼β s2 , iff ι1 = ι2 , ρ1 ∼ ρ2 , θ1 ∼β θ2 ,
and σ1 ∼βρ1 ,ρ2 σ2 .
Lemma 1 (Confinement Lemma) If hι, θ, σ, ρi
hι0 , θ0 , σ 0 , ρ0 i and Γ (!ρ) =
β
0
0
β 0
H, then ρ ∼ ρ , σ ∼ρ,ρ0 σ and θ ∼ θ where β = {(a, a) | a ∈ θ}
Proof. As Γ (!ρ) = H, the L labelled nodes in the pc-stack will remain unchanged. Branching instructions pushing a new node would have label H due
to monotonicity of pc-stack. Even if ι0 is the IPD corresponding to the !ρ.ipd,
it would only pop the H labelled node. Thus, the L labelled nodes will remain
unchanged. Hence, ρ ∼ ρ0 .
We assume that the !ρ is the first node labelled H in the context stack. For,
other higher labelled nodes above the first node labelled H in the pc-stack, the
call-frames corresponding to the nodes having L label in the pc-stack remain the
same. Hence, σ ∼βρ,ρ0 σ 0 .
By case analysis on the instruction type:
1. prim:
(a) If Γ (!σ(dst)) ≥ Γ (!ρ), then Γ (!σ(dst)) = H.
By premise of prim, Γ (!σ 0 (dst)) = H. By Definition 3, !σ(dst) ∼β
!σ 0 (dst).
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
(b) If Γ (!σ(dst)) < Γ (!ρ), then Γ (!σ 0 (dst)) will contain a ? and by Definition 3, !σ(dst) ∼β !σ 0 (dst).
Only dst changes in the call-frame, so by Definition 7, !σ ∼β !σ 0 . Also, other
call-frames remain unchanged. By Definition 9, σ ∼βρ,ρ0 σ 0 .
θ = θ0 , thus, θ ∼β θ0 .
mov: Similar to prim.
jfalse: σ = σ 0 and θ = θ0 , so, σ ∼βρ,ρ0 σ 0 and θ ∼β θ0 .
loop-if-less: Similar to jfalse.
typeof : Similar to prim.
instanceof : Similar to prim.
enter: σ = σ 0 , so σ ∼βρ,ρ0 σ 0 . θ = θ0 , so θ ∼β θ0 .
ret: If !σ.getter = f alse then only !σ is popped, the call-frames until (!ρ.C)
are unchanged. When !σ.getter = true, then it sets !σ 0 (!σ.dReg) with !σ(res).
Now, let σ1 is the prefix of σ such that !ρ.C =β !σ1 . If !σ 0 ∈
/ σ1 then
changes in !σ 0 does not effect the callframe equivalence and if !σ 0 ∈ σ1 then
Γ (!σ 0 (!σ.dReg)) = ? (when Γ (!σ1 (!σ.dReg))) = L or Γ (!σ1 (!σ.dReg))) = ?)
and Γ (!σ 0 (!σ.dReg))) = H (when Γ (!σ1 (!σ.dReg))) = H), each of the cases
give !σ1 (!σ.dReg) ∼β !σ 0 (!σ.dReg) from Definition 3. So, σ ∼βρ,ρ0 σ 0 , by Definition 9. θ = θ0 , so θ ∼β θ0 .
end: The confinement lemma does not apply.
call: If it pushes on top of pc-stack, !ρ.C is the lowest H-labelled node in
ρ0 . If it joins the label with !ρ, the L labelled nodes remain unchanged and
the !ρ.C = !ρ0 .C. All the call-frames until !ρ.C remain unchanged. So, by
Definition 9, σ ∼βρ,ρ0 σ 0 . θ = θ0 , so θ ∼β θ0 .
call-put-result: Similar to prim.
call-eval: If it is a user-defined eval, it is similar to call.
In strict mode, it pushes a node on scope-chain with label H if Γ (!σ 0 .Σ) = H,
else labels it ?. In non-strict mode, it does not push a node on the scope-chain.
!σ remains equivalent with corresponding call-frame in σ 0 by Definition 7.
As other L call-frames are unchanged, by Definition 9, σ ∼βρ,ρ0 σ 0 .
θ = θ0 , so θ ∼β θ0 .
create-arguments: Over the initial β, by Definition 5, θ ∼β θ0 . If the argument
object is created at x, then β = (x, x) ∪ β after the step is taken.
σ ∼βρ,ρ0 σ 0 (Similar to prim).
new-func: Over the initial β, by Definition 5, θ ∼β θ0 . If the function object
is created at x, then β = (x, x) ∪ β after the step is taken.
σ ∼βρ,ρ0 σ 0 (Similar to prim).
create-activation: Over the initial β, by Definition 5, θ ∼β θ0 . If the argument
objects is created at x, then β = (x, x) ∪ β after the step is taken.
It puts the object in dst with label H or ?, depending on dst value’s initial
label. Also, pushes a node containing the object in the scope chain with a ?,
if Γ (!σ.Σ) = L ∨ ? or with label H, if Γ (!σ.Σ) = H or (!σ.Σ) = nil. Thus,
!σ.Σ ∼β !σ 0 .Σ by Definition 6. By Definition 7, !σ ∼β !σ 0 . Other call-frames
are unchanged, so σ ∼βρ,ρ0 σ 0 by Definition 9.
construct: Similar to call.
17. create-this: Similar to create-arguments.
18. new-object: Over the initial β, by Definition 5, θ ∼β θ0 . If the new object is
created at x, then β = (x, x) ∪ β after the step is taken.
σ ∼βρ,ρ0 σ 0 (Similar to prim).
19. get-by-id: Similar to mov when the property is a data property. If the property is an accessor property then getter is invoked and if the invocation of
getter pushes an entry on top of pc-stack, !ρ.C remains the lowest H-labelled
node in ρ0 . If it joins the label with !ρ, the L labelled nodes remain unchanged
and the !ρ.C = !ρ0 .C. All the call-frames until !ρ.C remain unchanged. So, by
Definition 9, σ ∼βρ,ρ0 σ 0 . θ = θ0 , so θ ∼β θ0 .
20. put-by-id: Sets the property of the object base object to the value with label
H if the structure label of the object `s = H. Thus, the object remains lowequivalent by Definition 4. Thus, θ ∼β θ0 by Definition 5.
Also, σ = σ 0 , so, σ ∼βρ,ρ0 σ 0 .
21. del-by-id : Deletes the property if structure label of object, `s = H. Thus,
the object remains low-equivalent by Definition 4. By Definition 5, θ ∼β θ0 .
σ ∼βρ,ρ0 σ 0 (Similar to mov).
22. getter-setter: Sets accessor property of the object base object with Γ (getter)
and Γ (setter) and label H if the structure label of the object `s = H.
Thus, the object remains low-equivalent by Definition 4. Thus, θ ∼β θ0 by
Definition 5. Also, σ = σ 0 , so, σ ∼βρ,ρ0 σ 0 .
23. get-pnames: Similar to mov and jfalse.
24. next-pname: Similar to mov.
25. resolve: If the property exists, it is similar to mov. If it does not, it is similar
to throw.
26. resolve-skip: Similar to resolve.
27. resolve-global: Similar to resolve.
28. resolve-base: Similar to resolve.
29. resolve-with-base: Similar to resolve.
30. get-scoped-var: Similar to mov.
31. put-scoped-var: Writes the value in the indexth register in skipth node. If
Γ (!σ(index)) = H, then, Γ (!σ 0 (index)) = H. Else if Γ (!σ(index)) = L, then,
Γ (!σ 0 (index)) = ?. Other call-frames are unchanged. Thus, σ ∼βρ,ρ0 σ 0 by
Definition 7 and 9.
θ = θ0 , so θ ∼β θ0 .
32. push-scope: Pushes node on scope-chain with label H if Γ (!σ.Σ) = H or
(!σ.Σ) = nil. Else, assigns a ? as the label. Thus, !σ.Σ ∼β !σ 0 .Σ. Registers remain unchanged. By Definition 7, !σ ∼β !σ 0 . Other call-frames are
unchanged, so by Definition 9, σ ∼βρ,ρ0 σ 0 . θ = θ0 , so θ ∼β θ0 .
33. pop-scope: Pops the node from the scope-chain if Γ (!σ.Σ) = H ∨ ?. Registers remain unchanged. By Definition 7, !σ ∼β !σ 0 . Other call-frames are
unchanged, so by Definition 9, σ ∼βρ,ρ0 σ 0 . θ = θ0 , so θ ∼β θ0 .
34. jmp-scope: Similar to pop-scope.
35. throw: Pops the call-frames until the handler is reached, i.e., until (!ρ.C).
The property of IPD ensures that !σ 0 = (!ρ.C). Either !ρ0 .ipd = !ρ.ipd or
ι0 = !ρ.ipd. Thus, !ρ.C is !σ 0 . This call-frame and the ones below remain
unchanged. Thus, σ ∼βρ,ρ0 σ 0 by Definition 9.
θ = θ0 , so θ ∼β θ0 .
36. catch: Similar to mov.
n
Corollary 2 If hι0 , θ0 , σ0 , ρ0 i
hιn , θn , σn , ρn i and ∀(0 ≤ i ≤ n).Γ (!ρi ) =
β
H, then ρ0 ∼ ρn , and σ0 ∼ρ0 ,ρn σn
Proof. To prove: ρ0 ∼ ρn .
Proof by induction on n.
Basis: ρ0 ∼ ρ0
IH : ρ0 ∼ ρn−1
From Definition 8, L labelled nodes of ρ0 and ρn−1 are equal. From Lemma 1,
ρn−1 ∼ ρn so, L labelled nodes of ρn−1 and ρn are equal. Thus, L labelled nodes
of ρ0 and ρn are equal and by Definition 8, ρ0 ∼ ρn .
To prove: σ0 ∼βρ0 ,ρn σn .
Basis: σ0 ∼βρ0 ,ρ0 σ0 .
IH: σ0 ∼βρ0 ,ρn−1 σn−1 .
From Lemma 1, σn−1 ∼βρn−1 ,ρn σn . As ∀(0 ≤ i ≤ n).Γ (ρi ) = H, the lowest Hlabelled node is the same (pc-stack grows monotonically) in ρ0 , ρn−1 , ρn . Let the
call-frames pointed to by lowest H-labelled node be C0 , Cn−1 , Cn with call-stack
size until the call-frames k (from Definition 9 size of the prefix is same and by
transitivity of equality it is the same for all the three cases).
∀µ0 ∈ σ0 , µn−1 ∈ σn−1 , µn ∈ σn until C0 , Cn−1 , Cn respectively with sizes k, the
following conditions hold:
1. ∀(1 ≤ i ≤ k).((µ0 [i].#Registers) = (µn−1 [i].#Registers)) and ∀(1 ≤ i ≤
k).((µn−1 [i].#Registers) = (µn [i].#Registers)).
Thus, ∀(1 ≤ i ≤ k).((µ0 [i].#Registers) = (µn [i].#Registers)).
2. As the number of registers is the same, given by r,
∀(1 ≤ i ≤ k).∀r((µ0 [i].Registers[r]) ∼β (µn−1 [i].Registers[r])) and
∀(1 ≤ i ≤ k).∀r.((µn−1 [i].Registers[r]) ∼β (µn [i].Registers[r])).
`n−1
Let v0`0 , vn−1
and vn`n represents the values in the registers for σ0 , σn−1 and
σn respectively. Then from Definition 3
(a) `0 = `n−1 = H: In this case `n = H and v0`0 ∼β vn`n (from Lemma 1 and
Definition 3).
(b) `0 = `n−1 = L and v0 = vn−1 : In this case either:
i. `n = ?
ii. `n = L and vn−1 = vn : In this case, the value remains unchanged.
Thus, from Definition 3 v0`0 ∼β vn`n .
(c) `0 = ? ∨ `n−1 = ?: Now the following cases arise:
i. `0 = ?: v0`0 ∼β vn`n .
ii. `n−1 = ?: By Lemma 1 ln = ?. Thus, v0`0 ∼β vn`n .
3. ∀(1 ≤ i ≤ k).((µ0 [i].CFG) = (µn−1 [i].CFG)) and ∀(1 ≤ i ≤ k).((µn−1 [i].CFG) =
(µn [i].CFG)).
Thus, ∀(1 ≤ i ≤ k).((µ0 [i].CFG) = (µn [i].CFG)).
4. ∀(1 ≤ i ≤ k).((µ0 [i].Σ) ∼β (µn−1 [i].Σ)) and ∀(1 ≤ i ≤ k).((µn−1 [i].Σ) ∼β
(µn [i].Σ)).
From Definition 6:
(a) If nil0 and niln−1 be the two scope chains, then due to confinement
(Lemma 1) µn [i].Σ = nil or µn [i].Σ = (S, `n ), where `n = H. In either
case ∀(1 ≤ i ≤ k).((µ0 [i].Σ) ∼β (µn [i].Σ)) from Definition 6.
(b) If ((S0 , `0 ) : Σ0 ), ((Sn−1 , `n−1 ) : Σn−1 ) and ((Sn , `n ) : Σn ) be the three
scope-chains, then for((S0 , `0 ) : Σ0 ) and ((Sn−1 , `n−1 ) : Σn−1 ) one of
the following holds:
i. `0 = ? ∨ `n−1 = ?: Due to confinement (Lemma 1) and Definition 6
`n = ?.
ii. `0 = `n−1 = H: Due to confinement (Lemma 1) and Definition 6
ln = H .
iii. `0 = `n−1 = L ∧ S0 ∼β Sn−1 ∧ Σ0 ∼β Σn−1 : Due to confinement
(Lemma 1) either one should hold:
A. `n = ?: By Definition 6.
B. `n = L ∧ Sn−1 ∼β Sn ∧ Σn−1 ∼β Σn : No additions to the scope
chain.
Thus, ∀(1 ≤ i ≤ k).((µ0 [i].Σ) ∼β (µn [i].Σ)) from Definition 6.
5. ∀(1 ≤ i ≤ k).((µ0 [i].ιr ) = (µn−1 [i].ιr )) and ∀(1 ≤ i ≤ k).((µn−1 [i].ιr ) =
(µn [i].ιr )).
Thus, ∀(1 ≤ i ≤ k).((µ0 [i].ιr ) = (µn [i].ιr )).
6. ∀(1 ≤ i ≤ k).(((µ0 [i].`c ) = (µn−1 [i].`c ) = H) ∨ (((µ0 [i].`c ) = (µn−1 [i].`c ) =
L) ∧ ((µ0 [i].fc ) = (µn−1 [i].fc )))) and
∀(1 ≤ i ≤ k).(((µn−1 [i].`c ) = (µn [i].`c ) = H) ∨ (((µn−1 [i].`c ) = (µn [i].`c ) =
L) ∧ ((µn−1 [i].fc ) = (µn [i].fc )))).
Then either:
– ∀(1 ≤ i ≤ k).((µ0 [i].`c ) = (µn [i].`c ) = H) or
– ∀(1 ≤ i ≤ k).(((µ0 [i].`c ) = (µn [i].`c ) = L) ∧ ((µ0 [i].fc ) = (µn [i].fc ))).
7. ∀(1 ≤ i ≤ k).((µ0 [i].argcount) = (µn−1 [i].argcount)) and ∀(1 ≤ i ≤ k).
((µn−1 [i].argcount) = (µn [i].argcount)).
Thus, ∀(1 ≤ i ≤ k).((µ0 [i].argcount) = (µn [i].argcount)).
8. ∀(1 ≤ i ≤ k).((µ0 [i].getter) = (µn−1 [i].getter)) and ∀(1 ≤ i ≤ k).((µn−1 [i].getter) =
(µn [i].getter)).
Thus, ∀(1 ≤ i ≤ k).((µ0 [i].getter) = (µn [i].getter)).
9. ∀(1 ≤ i ≤ k).((µ0 [i].dReg) =β (µn−1 [i].dReg)) and ∀(1 ≤ i ≤ k).((µn−1 [i].dReg) =β
(µn [i].dReg)).
Thus, ∀(1 ≤ i ≤ k).((µ0 [i].dReg) =β (µn [i].dReg)).
From Definition 7 and Definition 9, σ0 ∼βρ0 ,ρn σn .
Corollary 3 If hι0 , θ0 , σ0 , ρ0 i
H, then θ0 ∼β θn
Proof. By induction on n.
Basis: θ0 ∼β θ0 by Definition 5.
IH: θ0 ∼β θn−1 .
?
hιn , θn , σn , ρn i and ∀(0 ≤ i ≤ n).Γ (!ρi ) =
From IH and Definition 5, ∀(a, b) ∈ β.(θ0 (a) ∼β θn−1 (b). From Lemma 1,
θn−1 ∼β θn . Thus, ∀(b, c) ∈ β.(θn−1 (b) ∼β θn (c)
As (a, b) ∈ β and (b, c) ∈ β, we have (a, c) ∈ β because β is an identity bijection.
Thus, if ∀(a, c) ∈ β.(θ0 (a) ∼β θn (c), then θ0 ∼β θn . If θ0 (a) and θn−1 (b) contain
an ordinary object, then for their respective structure labels `s and `0s , either:
– `s = `0s = H: If `0s = H, then `00s = H by Definition 4, where `00s is the
structure label of the object in θn (c). Thus, θ0 (a) ∼β θn (c).
0
– `s = `0s = L: [p0 , . . . , pn ] = [p00 , . . . , p0m ] (n = m), ∀i. vi ∼β vi0 , and a`p ∼β a`p
for respective properties in θ0 (a) and θn−1 (b).
If `0s = L, then `00s = L and [p00 , . . . , p0m ] = [p000 , . . . , p00k ] (m = k), ∀i. vi0 ∼β vi00 ,
0
00
and a`p ∼β a`p for respective properties in θn−1 (b) and θn (c).
`s = `00s = L, [p0 , . . . , pn ] = [p000 , . . . , p00k ] (n = k). If ∀i. vi ∼β vi0 and ∀i. vi0 ∼β
vi00 , then either `i = `0i = `00i = H or `i = `0i = `00i = L and ri = ri0 = ri00 = n.
0
0
00
00
Also, as a`p ∼β a`p and a`p ∼β a`p , we have a`p ∼β a`p . Thus, by Definition 4
θ0 (a) ∼β θn (c).
If θ0 (a) and θn−1 (b) contain a function object, then for their respective structure
labels `s and `0s , either:
– `s = `0s = H: If `0s = H, then `00s = H by Definition 4, where `00s is the
structure label of the function object in θn (c). Thus, θ0 (a) ∼β θn (c).
– `s = `0s = L: `00s = L is the structure label of the function object in θn (c).
Thus, N ∼β N 00 from the above result for objects. The CFGs f =β f 0 =β f 00
and the scope chains Σ ∼β Σ 00 by Corollary 2. Thus, θ0 (a) ∼β θn (c).
Thus, θ0 ∼β θn .
Lemma 2 (Supporting Lemma 1) Suppose
hι, θ1 , σ1 , ρ1 i
hι01 , θ10 , σ10 , ρ01 i,
hι, θ2 , σ2 , ρ2 i
hι02 , θ20 , σ20 , ρ02 i,
ρ1 ∼ ρ2 , Γ (!ρ1 ) = Γ (!ρ2 ) = L, Γ (!ρ01 ) = Γ (!ρ02 ) and (σ1 ∼βρ1 ,ρ2 σ2 ) ∧ (θ1 ∼β θ2 )
0
0
then ρ01 ∼ ρ02 , and ∃β 0 : ((β 0 ⊇ β) ∧ (σ10 ∼βρ0 ,ρ0 σ20 ) ∧ (θ10 ∼β θ20 )).
1
2
Proof. Every instruction executes isIPD at the end of the operation. If ι0i is the
IPD corresponding to the !ρi .ipd, then it pops the first node on the pc-stack. As
ρ1 ∼ ρ2 and Γ (!ρ1 ) = Γ (!ρ2 ), ι0i would either pop in both the runs or in none.
Thus, ρ01 simρ02 . For instructions that push (branch), we explain in respective
instructions.
Proof by case analysis on the instruction type:
1. prim: No new object is created, so β 0 = β.
As σ1 ∼βρ1 ,ρ2 σ2 , so !σ1 ∼β !σ2 and !σ1 (src i ) ∼β !σ2 (src i ) for i = 1, 2. Case
analysis on the definition of ∼β for src i .
– If (Γ (!σ1 (src 1 )) = ? ∨ Γ (!σ1 (src 2 )) = ? ∨ Γ (!σ2 (src 1 )) = ? ∨ Γ (!σ2 (src 2 )) =
?), then Γ (!σ1 (dst)) = ? ∨ Γ (!σ1 (dst)) = ?. Hence, !σ1 (dst) ∼β !σ2 (dst)
by Definition 3.
– If Γ (!σ1 (src1 )) = Γ (!σ1 (src2 )) = H and Γ (!σ2 (src1 )) = Γ (!σ2 (src2 )) =
H Γ (!σ1 (dst)) = Γ (!σ2 (dst)) = H. So, !σ1 (dst) ∼β !σ2 (dst) by Definition 3.
– If !σ1 (src1 ) = !σ2 (src1 ) ∧ Γ (!σ1 (src2 )) = H ∧ Γ (!σ2 (src2 )) = H, then
Γ (!σ1 (dst)) = Γ (!σ2 (dst)) = H. So, !σ1 (dst) ∼β !σ2 (dst) by Definition 3.
Symmetrical reasoning for !σ1 (src2 ) = !σ2 (src2 ) ∧ Γ (!σ1 (src1 )) = H ∧
Γ (!σ2 (src1 )) = H.
– !σ1 (src1 ) = !σ2 (src1 ) ∧ !σ1 (src2 ) = !σ2 (src2 ):
!σ1 (dst) = !σ2 (dst). So, !σ1 (dst) ∼β !σ2 (dst) by Definition 3.
Only dst changes in the top call-frame of both the call-stacks. Thus, by
Definition 7, !σ10 ∼β !σ20 . Other call-frames in σ10 and σ20 are unchanged. By
0
Definition 9, σ10 ∼βρ0 ,ρ0 σ20 .
1
2.
3.
4.
5.
6.
2
0
θ1 = θ10 and θ2 = θ20 , so, θ10 ∼β θ20 .
mov: Similar reasoning as prim with single source.
jfalse: No new object is created, so β 0 = β.
– !σ1 (cond) = !σ2 (cond) ∧ Γ (!σ1 (cond)) = Γ (!σ2 (cond)) = L: L is the label
to be pushed on ρ.
– Γ (!σ1 (cond)) = Γ (!σ2 (cond)) = H: H is the label to be pushed on ρ.
The IPD of ι would be the same as we have same CFG in both the cases. If
the IPD is SEN, then we join the label of !ρi with the label obtained above,
which is the same in both the runs. Thus, Γ (!ρ01 ) = Γ (!ρ02 ). Because ρ1 ∼ ρ2 ,
ρ01 ∼ ρ02 .
If the IPD is not SEN, then it is some other node in the same call-frame.
Thus the ipd field is also the same. The H field is false in both the cases.
Thus, the pushed node is the same in both the cases and hence, ρ01 ∼ ρ02 .
As, Γ (!ρ01 ) = Γ (!ρ002 ), either ι01 = ι02 = IPD(ι) or ι01 and ι02 may or may not
be equal.
0
0
σ10 = σ1 ∼βρ0 ,ρ0 σ2 = σ20 . θ10 = θ1 ∼β θ2 = θ20 .
1 2
loop-if-less: Similar reasoning as jfalse.
type-of: Similar to mov.
instance-of: No new object is created, so β 0 = β.
The label of the value in the dst is the label of the context joined with
the label of all the prototype chain pointers traversed. As !σ1 (value) ∼β
!σ2 (value), where `s and `0s are the structure labels of objects pointed to by
!σ1 (value) and !σ2 (value) respectively, then by Definition 4:
– If `s = `0s = H, then Γ (!σ10 (dst)) = H and Γ (!σ20 (dst)) = H. So,
!σ10 (dst) ∼β !σ20 (dst) from Definition 3.
– If `s = `0s = L, then the objects have similar properties and prototype
chains. If it is not an instance and none of traversed prototype chain and
objects are H, then Γ (!σ10 (dst)) = Γ (!σ20 (dst)) = L and false. Else if it
is present it has true. So, !σ10 (dst) ∼β !σ20 (dst) from Definition 3. If any
one of traversed prototype chain and objects are H, then Γ (!σ10 (dst)) =
Γ (!σ20 (dst)) = H. So, !σ10 (dst) ∼β !σ20 (dst) from Definition 3.
Only dst changes in the top call-frame of both the call-stacks. Thus, by
Definition 7, !σ10 ∼β !σ20 . Other call-frames are unchanged and by Definition 9,
0
σ10 ∼βρ0 ,ρ0 σ20 .
1
7.
8.
9.
10.
2
0
θ1 = θ10 and θ2 = θ20 , so, θ10 ∼β θ20 .
enter: No new object is created, so β 0 = β.
0
0
σ10 = σ1 ∼βρ0 ,ρ0 σ2 = σ20 . θ10 = θ1 ∼β θ2 = θ20 .
1 2
ret: No new object is created, so β 0 = β.
Since σ1 ∼β σ2 so only two cases arise for the getter flag.
– !σ1 .getter =!σ2 .getter = f alse: σ10 is same as σ1 with !σ1 popped. Similarly, σ20 is same as σ2 with !σ2 popped. As other call-frames are un0
changed by Definition 9, σ10 ∼βρ0 ,ρ0 σ20 .
1 2
– !σ1 .getter =!σ2 .getter = true: only resgister which changes is the σ10 (!σ1 .dReg
and σ20 (!σ2 .dReg). Now, if Γ (!σ10 (!σ1 .dReg)) = Γ (!σ20 (!σ2 .dReg)) = H
then !σ10 (!σ1 .dReg) ∼β !σ20 (!σ1 .dReg) from defintion 3. And if Γ (!σ10 (!σ1 .dReg)) =
Γ (!σ20 (!σ2 .dReg)) = L then !σ10 (!σ1 .dReg)) =!σ1 (res)σ20 (!σ2 .dReg) =
!σ2 (res) and !σ1 (res) ∼β !σ2 (res).
0
0
θ1 = θ1 ∼β θ2 = θ20 .
0
end: No σi and θi0 .
call: No new object is created, so β 0 = β.
Pushes the same node on both ρs (similar to jfalse). The only difference is
the H field. As the CFGs are same, if it has an associated exception handler,
we set the H field to true in both the runs. Else, it is false. Thus, !ρ01 = !ρ02
is the node pushed on ρ and hence, ρ01 ∼ ρ02 .
As !σ1 (f unc) ∼β !σ2 (f unc), if:
– (Γ (!ρ01 ) = H) : As call-frames until !σ1 and !σ2 remain unchanged, which
correspond to the C field in the lowest H-labelled node and σ1 ∼βρ1 ,ρ2 σ2 ,
0
by Definition 9, σ10 ∼βρ0 ,ρ0 σ20 .
1 2
– (Γ (!ρ01 ) = L) : Registers created in the new call-frame contain undefined
with label L and, as θ1 ∼β θ2 so the function objects N ∼β N 0 implying
!σ10 .CFG =!σ20 .CFG and !σ10 .Σ ∼β !σ20 .Σ, also return addresses are the
same and the callee is the same. So !σ10 ∼β !σ20 . Other call-frames are
0
unchanged so, σ10 ∼βρ0 ,ρ0 σ20 .
1
2
0
θ10 = θ1 ∼β θ2 = θ20 .
11. call-put-result: Similar to move.
12. call-eval: ρ01 ∼ ρ02 : Similar to op-call.
In strict mode, it pushes a node on the scope-chain with label L. The pushed
nodes are low-equivalent. Thus, !σ10 .Σ ∼β !σ20 .Σ by Definition 6. In non-strict
0
mode, it does not push anything and is similar to call. Thus, σ10 ∼βρ0 ,ρ0 σ20
1
0
2
and θ10 = θ1 ∼β θ2 = θ20 .
13. create-arguments: Let the argument object be created at x and y in θ1 and
θ2 , then β 0 = β ∪ (x, y). Γ (σ10 (dst)) = Γ (σ10 (dst)) = L and as !σ1 ∼β !σ2 , the
0
0
objects are low-equivalent. Thus, !σ10 ∼β !σ2 by Definition 7 and σ10 ∼βρ0 ,ρ0 σ20
0
1
2
by Definition 9. Also, θ10 ∼β θ20 by Definition 5 as the objects are lowequivalent.
14. new-func: Let the function object be created at x and y in θ1 and θ2 , then
β 0 = β ∪ (x, y). Function objects are low-equivalent as !σ1 .Σ ∼β !σ2 .Σ and
0
!σ1 (func) ∼β !σ2 (func). σ10 (dst) ∼β σ20 (dst) by Definition 3. Thus, !σ10 ∼β !σ2
0
0
by Definition 7 and σ10 ∼βρ0 ,ρ0 σ20 by Definition 9. Also, θ10 ∼β θ20 by Definition
1 2
5 as the objects are low-equivalent.
15. create-activation: Similar to create-arguments.
16. construct: Similar to call.
17. create-this: Similar to create-this.
18. new-object: Similar to create-arguments.
19. get-by-id: No new object is created, so β 0 = β.
As !σ1 (base) ∼β !σ2 (base), either the objects have the same properties or
are labelled H because of Definition 4. In case of data property, either
Γ (σ10 (dst)) = Γ (σ20 (dst)) = H or Γ (σ10 (dst)) = Γ (σ20 (dst)) = L and value of
prop is the same. So, by Definition 3 !σ10 (dst) ∼β !σ20 (dst).
In case of an accessor property, only dst changes in the top call-frame of
both the call-stacks, and σ10 (dst)) ∼β σ20 (dst)) since σ1 ∼β σ2 and θ1 ∼β θ2
Thus, by Definition 7, !σ10 ∼β !σ20 . Other call-frames are unchanged and by
0
Definition 9, σ10 ∼βρ0 ,ρ0 σ20 . For ρ01 ∼ ρ02 , reasoning is similar to call. θ1 = θ10
1
2
0
and θ2 = θ20 , so, θ10 ∼β θ20 .
20. put-by-id: No new object is created, so β 0 = β.
0
σ10 = σ1 ∼βρ0 ,ρ0 σ2 = σ20 .
1
2
Because σ1 ∼βρ1 ,ρ2 σ2 , if value is labelled H, then the properties created or
modified will have label H, and structure labels of the respective objects will
become H. Else if value is labelled L, then the properties created or modified
will have same value and label L. Thus, the objects remain low-equivalent
0
by Definition 4 and hence, by Definition 5, θ10 ∼β θ20 .
21. del-by-id: No new object is created, so β 0 = β.
If the deleted property is H or if the structure label of the object is H , then
(Γ (σ10 (dst)) = Γ (σ20 (dst)) = H). Else if is labelled L, then (Γ (σ10 (dst)) =
Γ (σ20 (dst)) = L) and value is true or false depending on whether the property
0
is deleted or not. σ10 ∼βρ0 ,ρ0 σ20 by Definition 3, 7 and 9. If structure labels of
1 2
the objects are L, they have same properties by Definition 4. If not, they have
structure label as H. Thus, objects remain low-equivalent by Definition 4 and
0
θ10 ∼β θ20 by Definition 5.
22. put-getter-setter: Reasoning similar to put-by-id.
23. get-pnames: No new object is created, so β 0 = β.
As σ1 ∼βρ1 ,ρ2 σ2 , !σ1 (base) ∼β !σ2 (base) and so are the objects (obj1 and
obj2), obj1 ∼β obj2, as θ1 ∼β θ2 . Thus, the structure label of the object is
either H in both the runs or L and have the same properties with values
(Definition 4. The IPD in both the cases is the same and so is the C field.
The mH field is set to false. Thus, ρ01 ∼ ρ02 .
0
For σ10 ∼βρ0 ,ρ0 σ20 , it is similar to mov, but done for dst, i and size.
1
0
2
θ10 = θ1 ∼β θ2 = θ20 .
24. next-pname: Similar to mov, but done for dst and base.
25. resolve: No new object is created, so β 0 = β.
If property is found in a L object and the scope-chain node labels are also
L, then the property value is the same as !σ1 ∼β !σ2 . If it is in H object or
any scope-chain node labels are H or have a ?, then label of the property
0
is H or ?. Thus, !σ10 (dst) ∼β !σ20 (dst) by Definition 3. Thus, σ10 ∼βρ0 ,ρ0 σ20 . If
1 2
property is not found in both runs, it is similar to throw. If property is not
found in second run, then in the first run the property is in H context. So,
the exception thrown is also H. Until, the call-frame of !ρ02 .ipd, call-frames
0
0
are unchanged, so σ10 ∼βρ0 ,ρ0 σ20 . θ10 = θ1 ∼β θ2 = θ20 .
1 2
26. resolve-skip: Similar to resolve.
27. resolve-global: Similar to resolve.
28. resolve-base: Similar to resolve.
29. resolve-with-base: Similar to resolve.
30. get-scoped-var: No new object is created, so β 0 = β.
Reads indexth register in object in skipth node in the scope-chain and writes
into dst. As (!σ1 .Σ ∼β !σ2 .Σ), the value, if labelled L is the same, else is
labelled H or ?. By Definition 3, !σ10 (dst) ∼β !σ20 (dst) and by Definition 7,
0
0
!σ10 ∼β !σ20 . Thus, σ10 ∼βρ0 ,ρ0 σ20 . θ10 = θ1 ∼β θ2 = θ20 .
1 2
31. put-scoped-var: No new object is created, so β 0 = β.
Writes into the scope chain node the same value, if “value” is labelled L. If
it is labelled ? in any of the runs, scope chains remain equivalent. If value
is H, it checks the label of register and puts the value with label H or ?.
Thus, (!σ10 .Σ ∼β !σ20 .Σ) by Definition 6 and (!σ10 ∼β !σ20 ) by Definition 7. By
0
0
Definition 9, σ10 ∼βρ0 ,ρ0 σ20 . θ10 = θ1 ∼β θ2 = θ20 .
1 2
32. push-scope: No new object is created, so β 0 = β.
Pushes in the scope-chain a node containing the object in “scope” with node
label L. As (!σ1 (scope) ∼β !σ2 (scope)) and (!σ1 .Σ ∼β !σ2 .Σ), (!σ10 .Σ ∼β
!σ20 .Σ) by Definition 6. Registers and other call-frames remain the same, so,
0
0
σ10 ∼βρ0 ,ρ0 σ20 . θ10 = θ1 ∼β θ2 = θ20 .
1 2
33. pop-scope: No new object is created, so β 0 = β.
Pops a node from the scope chain if Γ (!σ1 .Σ) = Γ (!σ1 .Σ) 6= (? ∨ H). As
(!σ1 .Σ ∼β !σ2 .Σ), so (!σ10 .Σ ∼β !σ20 .Σ). Other registers remain the same, so,
0
0
σ10 ∼βρ0 ,ρ0 σ20 . θ10 = θ1 ∼β θ2 = θ20 .
1 2
34. jmp-scope: Similar to pop-scope.
35. throw: No new object is created, so β 0 = β.
The property of IPD ensures that !σ10 = (!ρ1 .C) and !σ20 = (!ρ2 .C). The !σ10
0
and !σ20 and the ones below them remain unchanged. Thus, σ10 ∼ρβ0 ,ρ0 σ20 by
1 2
Definition 9.
0
θ10 = θ1 ∼β θ2 = θ20 .
36. catch: Similar to mov.
Lemma 3 (Supporting Lemma 2) Suppose
1. hι0 , θ00 , σ00 , ρ00 i
hι01 , θ10 , σ10 , ρ01 i
n−1
hι0n , θn0 , σn0 , ρ0n i,
2.
3.
4.
5.
m−1
00
00
hι0 , θ000 , σ000 , ρ000 i
hι001 , θ100 , σ100 , ρ001 i
hι00m , θm
, σm
, ρ00m i,
β
(ρ00 ∼ ρ000 ), (σ00 ∼ρ0 ,ρ00 σ000 ), (θ00 ∼β θ000 ),
0 0
(Γ (!ρ00 ) = Γ (!ρ000 ) = L), (Γ (!ρ0n ) = Γ (!ρ00m ) = L),
∀(0 < i < n).(Γ (!ρ0i ) = H) ∧ ∀(0 < j < m).(Γ (!ρ00j ) = H),
00
00
then (ι0n = ι00m ), (ρ0n ∼ ρ00m ), (σn0 ∼βρ0n ,ρ00m σm
), and (θn0 ∼β θm
).
Proof. Starting with the same instruction and high context in both the runs,
we might get two different instructions, ι01 and ι001 . This is only possible if ι was
some branching instruction in the first place and this divergence happened in a
high context. Now,
1. To prove ι0n = ι00m :
From the property of the IPDs we know that if ι0 pushes a H node on top
of pc-stack which was originally L, IPD(ι0 ) pops that node. Since we start
from the same instrucion ι0 , ι0n = ι00m = IPD(ι), where Γ (!ρ) = L.
2. To prove ρ0n ∼ ρ00m :
– n > 1 and m > 1: Γ (!ρ01 ) = Γ (!ρ001 ), because ι0 pushes equal nodes and
ι01 , ι001 are not the IPDs. As ρ00 ∼ ρ000 and Γ (!ρ01 ) = Γ (!ρ001 ), from Lemma 2
we get ρ01 ∼ ρ001 and !ρ01 .ipd =!ρ001 .ipd = IPD(ι0 ), if ι01 6= IPD(ι0 ) and
ι001 6= IPD(ι0 ). As ι0n = ι00m = IPD(ι0 ), it pops the !ρ01 and !ρ001 , which
correspond to ρ0n and ρ00m in the nth and mth step. (IPD is the point
where we pop the final H node on the pc-stack.) Because ρ01 ∼ ρ001 and
from Corollary 2, ρ0n ∼ ρ00m .
– n = 1 and m > 1: If Γ (!ρ01 ) 6= Γ (!ρ001 ) and ι01 = IPD(ι0 ), then Γ (!ρ01 ) = L.
It pops the node pushed by ι0 , i.e., Γ (!ρ0n ) = L. In the other run as
Γ (!ρ001 ) = H and Γ (!ρ00m ) = L, by the property of IPD ι00m = IPD(ι0 ),
which would pop from the pc-stack !ρ001 , the first frame labelled H on the
pc-stack. Thus, ρ0n ∼ ρ00m .
– n > 1 and m = 1: Symmetric case of the above.
00
3. To prove σn0 ∼βρ0n ,ρ00m σm
:
(a) n > 1 and m > 1: From Lemma 2 we get σ10 ∼βρ0 ,ρ00 σ100 . From Corollary 2
1
we get σ10 ∼βρ0 ,ρ0
1
n−1
1
0
0
σn−1
. And from Lemma 1 we have σn−1
∼βρ0
n−1
,ρ0n
σn0 .
00
As, ι0n = ι00m = IPD(ι0 ), we compare all call-frames of σn0 and σm
. As the
IPD of an instruction can lie only in the same call-frame, comparison for
all call-frames in σ00 and σ000 suffice.
σ00 ∼βρ0 ,ρ00 σ000 ⇒ ∀i.((µi ∈ σ00 ∧νi ∈ σ000 ), (µi ∼β νi )∧∀(r ∈ µi , νi ).(µi (r) =
0
0
v1 ∧ νi (r) = v2 , v1 ∼β v2 )).
00
Let v1 and v2 be represented by vn and vm in σn0 and σm
, respectively.
00
The call-frames in σn0 and σm
are represented by µn and νm , respectively.
– We do case analysis on the different cases of Definitions 3 for v1 and
v2 , to show vn ∼β vm . As (∀(1 ≤ i < n).(Γ (!ρ0i ) = H) ∧ ∀(1 ≤ j <
m).(Γ (!ρ00j ) = H)):
• If v1 = v2 ∧ Γ (v1 ) = Γ (v2 ) = L, then either vn = vm or ((? =
Γ (vn )) ∨ (? = Γ (vm ))). By Definition 3(1), vn ∼β vm .
• If Γ (v1 ) = Γ (v2 ) = H, then Γ (vn ) = Γ (vm ) = H. By Definition 3(2), vn ∼β vm .
• If ? = Γ (v1 ), then ? = Γ (vn ) and if ? = Γ (v2 ), then ? = Γ (vm ).
By Definition 3(1), vn ∼β vm .
– Lets S1 and S2 be the scopechains in σ00 and σ000 . And Sn and Sm
00
represent the scopechains in σn0 and σm
, i.e., Sn and Sm are the
respective scope-chains in the nth and mth step of the two runs
and `n and `m are their node labels. For scope chain pointers the
following cases arise:
i. S1 = S2 = nil: In this case Sn and Sm either remain nil or its
head will have a H label, because of the rules of the instructions
that modify the scope-chain.
ii. S1 = (s1 , `1 ) : Σ1 and S2 = (s2 , `2 ) : Σ2 :
A. `1 = ? ∨ `2 = ?: In this case `n and `m will be ? too.
B. `1 = `2 = H: In this case `n and `m will be H too.
C. `1 = `2 = L ∧ Σ1 ∼β Σ2 : In this case `n = ? and `m = ? or
scopechains remain unchanged.
(b) n = 1 and m > 1:
In case of jfalse and loop-if-less, σ00 = σ10 and σ000 = σ100 . And in case
of get-pnames, if n = 1 and m 6= 1, Υ (!σ00 (base)) = undefined and
Υ (!σ000 (base)) 6= undefined. Because σ00 ∼β σ000 , !σ00 (base) ∼β !σ000 (base).
Hence, Γ (!σ00 (base)) = Γ (!σ000 (base)) = H. Thus, Γ (!σ10 (dst)) = Γ (!σ10 (i)) =
Γ (!σ10 (size)) = H and similarly, Γ (!σ100 (dst)) = Γ (!σ100 (i)) = Γ (!σ100 (size)) =
H. Other registers remain unchanged and so do the other call-frames.
Thus, σ10 ∼βρ0 ,ρ00 σ100 . From the case (a) above, we know that if σ10 ∼βρ0 ,ρ00
1
1
1
1
00
.
σ100 , then σn0 ∼βρ0n ,ρ00m σm
(c) n > 1 and m = 1: Symmetric case of the above.
00
:
4. To prove θn0 ∼β θm
(a) n > 1 and m > 1: From Lemma 2 we get θ10 ∼β θ100 . From Corollary 3 we
0
0
. And from Lemma 1 we have θn−1
∼β θn0 . Assume O1 is
get θ10 ∼β θn−1
00
0
an object at x in θ1 and O2 is an object at y in θ1 , such that (x, y) ∈ β
and On and Om are the respective objects in the nth and mth step of
the two runs. We do case analysis on the different cases of Definitions 4
for O1 and O2 , to show On ∼β Om .
– If Γ (O1 ) = Γ (O2 ) = H, then Γ (On ) = Γ (Om ) = H. By Definition 4,
On ∼β Om .
– If O1 = O2 ∧ Γ (O1 ) = Γ (O2 ) = L, then On = Om ∧ Γ (On ) =
Γ (Om ) = L. By Definition 4, On ∼β Om .
Similarly, for function objects, the structure labels would remain H if
they were originally H or will remain L with the same CFGs and scopechains.
(b) n = 1 and m > 1: In case of jfalse, loop-if-less, get-pnames, θ00 = θ10
and θ000 = θ100 . Thus, θ10 ∼β θ100 . From the case (a) above, we know that if
00
θ10 ∼β θ100 , then θn0 ∼β θm
.
(c) n > 1 and m = 1: Symmetric case of the above.
Definition 11 (Trace) A trace is defined as a sequence of configurations or
states resulting from a program evaluation, i.e., for a program evaluation P =
s1
s2
...
sn where si = hιi , θi , σi , ρi i, the corresponding trace is given
as T (P) := s1 :: s2 :: . . . :: sn .
Definition 12 (Epoch-trace) An epoch-trace (E) over a trace T = s1 :: s2 ::
. . . :: sn where si = hιi , θi , σi , ρi i is defined inductively as:
E(nil) := nil
(
si :: E(T )
E(si :: T ) :=
E(T )
if Γ (!ρi ) = L,
else if Γ (!ρi ) = H.
Theorem 1 (Termination-Insensitive Non-interference).
Suppose P and P 0 are two program evaluations.
Then for their respective epoch-traces given by:
E(T (P)) = s1 :: s2 :: . . . :: sn ,
E(T (P 0 )) = s01 :: s02 :: . . . :: s0m ,
if s1 ∼β s01 and n ≤ m,
then
∃βn ⊇ β : sn ∼βn s0n
Proof. Proof proceeds by induction on n.
Basis: s1 ∼β s01 , by assumption.
IH: sk ∼βk s0k where βk ⊇ β.
To prove: ∃βk+1 ⊇ β : sk+1 ∼βk+1 s0k+1 .
Let sk i sk+1 and sk i0 s0k+1 , then:
– i = i0 = 1: From Lemma 2, sk+1 ∼βk+1 s0k+1 where βk+1 ⊇ β.
– i > 1 or i0 > 1: From Lemma 3, sk+1 ∼βk+1 s0k+1 where βk+1 = β.
Corollary 4 Suppose:
1. hι1 , θ1 , σ1 , ρ1 i ∼β hι2 , θ2 , σ2 , ρ2 i
2. hι1 , θ1 , σ1 , ρ1 i ∗ hend, θ10 , [], []i
3. hι2 , θ2 , σ2 , ρ2 i ∗ hend, θ20 , [], []i
0
Then, ∃β 0 ⊇ β such that θ10 ∼β θ20 .
Proof. σ1 , σ2 and ρ1 , ρ2 are empty at the end of ∗ steps. From the semantics,
we know that in L context both runs would push and pop the same number of
nodes. Thus, both take same number of steps in L context. Let k be the number
of states in L context. Then in Theorem 1, n = m = k. Thus, sk ∼βk s0k , where
0
sk = hend, θ10 , [], []i and s0k = hend, θ20 , [], []i. By Definition 10, θ10 ∼β θ20 , where
0
β = βk .
| 6cs.PL
|
1
Energy Storage Sharing in Smart Grid: A Modified
Auction Based Approach
arXiv:1512.07700v1 [cs.SY] 24 Dec 2015
Wayes Tushar, Member, IEEE, Bo Chai, Chau Yuen, Senior Member, IEEE, Shisheng Huang, Member, IEEE,
David B. Smith, Member, IEEE, H. Vincent Poor Fellow, IEEE, and Zaiyue Yang, Member, IEEE
Abstract—This paper studies the solution of joint energy
storage (ES) ownership sharing between multiple shared facility
controllers (SFCs) and those dwelling in a residential community.
The main objective is to enable the residential units (RUs) to
decide on the fraction of their ES capacity that they want to
share with the SFCs of the community in order to assist them
storing electricity, e.g., for fulfilling the demand of various shared
facilities. To this end, a modified auction-based mechanism is
designed that captures the interaction between the SFCs and
the RUs so as to determine the auction price and the allocation
of ES shared by the RUs that governs the proposed joint ES
ownership. The fraction of the capacity of the storage that each
RU decides to put into the market to share with the SFCs and
the auction price are determined by a noncooperative Stackelberg
game formulated between the RUs and the auctioneer. It is shown
that the proposed auction possesses the incentive compatibility
and the individual rationality properties, which are leveraged via
the unique Stackelberg equilibrium (SE) solution of the game.
Numerical experiments are provided to confirm the effectiveness
of the proposed scheme.
Index Terms—Smart grid, shared energy storage, auction
theory, Stackelberg equilibrium, strategy-proof, incentive compatibility.
I. I NTRODUCTION
E
NERGY storage (ES) devices are expected to play a
significant role in the future smart grid due to their
capabilities of giving more flexibility and balance to the grid
by providing a back-up to the renewable energy [1]–[9]. ES
can improve the electricity management in a distribution network, reduce the electricity cost through opportunistic demand
response, and improve the efficient use of energy [10]. The
distinct features of ES make it a perfect candidate to assist in
W. Tushar and C. Yuen are with Singapore University of Technology and
Design (SUTD), 8 Somapah Road, Singapore 487372 (Email: {wayes tushar,
yuenchau}@sutd.edu.sg).
B. Chai is with the State Grid Smart Grid Research Institute, Beijing,
102211, China (Email: [email protected]).
S. Huang is with the Ministry of Home Affairs, Singapore (Email:
[email protected]).
D. B. Smith is with the National ICT Australia (NICTA), ACT 2601,
Australia and adjunct with the Australian National University (Email:
[email protected]).
H. V. Poor is with the School of Engineering and Applied Science at
Princeton University, Princeton, NJ, USA (Email: [email protected]).
Z. Yang is with the State Key Laboratory of Industrial Control Technology
at Zhejiang University, Hangzhou, China (Email: [email protected]).
This work is supported in part by the Singapore University of Technology
and Design (SUTD) through the Energy Innovation Research Program (EIRP)
Singapore NRF2012EWT-EIRP002-045 and IDC grant IDG31500106, and in
part by the U.S. National Science Foundation under Grant ECCS-1549881. D.
B. Smith’s work is supported by NICTA, which is funded by the Australian
Government through the Department of Communications and the Australian
Research Council.
residential demand response by altering the electricity demand
due to the changes in the balance between supply and demand.
Particularly, in a residential community setting, where each
household is equipped with an ES, the use of ES devices can
significantly leverage the efficient flows of energy within the
community in terms of reducing cost, decarbonization of the
electricity grid, and enabling effective demand response (DR).
However, energy storage requires space. In particular for
large consumers like shared facility controllers (SFCs) of large
apartment buildings [11], the energy requirements are very
high, which consequently necessitates the actual installment
of very large energy storage capacity. The investment cost of
such storage can be substantial whereas due to the random
usage of the facilities (depending on the usage pattern of
different residents) some of the storage may remain unused.
Furthermore, the use of ESs for RUs is very limited for two
reasons [10]: firstly, the installation cost of ES devices is very
high and the costs are entirely borne by the users. Secondly, the
ESs are mainly used to save electricity costs for the RUs rather
than offer any support to the local energy authorities, which
further makes their use economically unattractive. Hence, there
is a need for solutions that will capture both the problems
related to space and cost constraints of storage for SFCs and
the benefit to RUs for supporting third parties.
To this end, numerous recent studies have focused on energy
management systems with ES devices as we will see in the
next section. However, most of these studies overlook the
potential benefits that local energy authorities such as SFCs
can attain by jointly sharing the ES devices belonging to the
RUs. Particularly due to recent cost reduction of small-scale
ES devices, sharing of ES devices installed in the RUs by the
SFCs has the potential to benefit both the SFCs and the RUs
of the community as we will see later. In this context, we
propose a scheme that enables joint ES ownership in smart
grid. During the sharing, each RU leases the SFCs a fraction
of its ES device to use, and charges and discharges from the
rest of its ES capacity for its own purposes. On the contrary,
each SFC exclusively uses its portion of ES devices leased
from the RUs. This work is motivated by [10], in which the
authors discussed the idea of joint ownership of ES devices
between domestic customers and local network operators, and
demonstrated the potential system-wide benefits that can be
obtained through such sharing. However, no policy has been
developed in [10] to determine how the fraction of battery
capacity, which is shared by the network operators and the
domestic users, is decided.
Note that, as an owner of an ES device, each RU can decide
IEEE Trans. Smart Grid, Dec. 2015
II. S TATE - OF -T HE A RT
whether or not to take part in the joint ownership scheme with
the SFCs and what fraction of the ES can be shared with the
SFCs. Hence, there is a need for solutions that can capture this
decision making process of the RUs by interacting with the
SFCs of the network. In this context, we propose a joint ES
ownership scheme in which by participating in storage sharing
with the SFCs, both the RUs and SFCs benefit economically.
Due to the interactive nature of the problem, we are motivated
to use auction theory to study this problem [12].
Exploiting the two-way communications aspects, auction
mechanisms can exchange information between users and electricity providers, meet users’ demands at a lower cost, and thus
contribute to the economic and environmental benefits of smart
grid1 [13]. In particular, 1) we modify the Vickrey auction
technique [14] by integrating a Stackelberg game between the
auctioneer and the RUs and show that the modified scheme
leads to a desirable joint ES ownership solution for the RUs
and the SFCs. To do this, we modify the auction price derived
from the Vickrey auction, to benefit the owner of the ES,
through the adaptation of the adopted game as well as keep
the cost savings to the SFCs at the maximum; 2) We study
the attributes of the technique, and show that the proposed
auction scheme possesses both the incentive compatibility and
the individual rationality properties leveraged by the unique
equilibrium solution of the game; 3) We propose an algorithm
for the Stackelberg game that can be executed distributedly
by the RUs and the auctioneer, and the algorithm is shown to
be guaranteed to reach the desired solution. We also discuss
how the proposed scheme can be extended to the time varying
case; and 4) Finally, we provide numerical examples to show
the effectiveness of the proposed scheme.
The importance and necessity of the proposed study with
respect to actual operation of smart grid lies in assisting
the SFCs of large apartment buildings in smart communities
to reduce space requirements and investment costs of large
energy storage units. Furthermore, by participating in storage
sharing with the SFCs, the RUs can benefit economically,
which can consequently influence them to efficiently schedule
their appliances and thus reduce the excess use of electricity.
We stress that multi-agent energy management schemes are
not new in the smart grid paradigm and have been discussed
in [11], [15] and [16]. However, the scheme discussed in the
paper differs from these existing approaches in terms of the
considered system model, chosen methodology and analysis,
and the use of the set of rules to reach the desired solution.
The remainder of the paper is organized as follows. We
provide a comprehensive literature review of the related work
in Section II followed by the considered system model in
Section III. Our proposed modified auction-based mechanism
is demonstrated in Section IV where we also discuss how the
scheme can be adopted in a time varying environment. The
numerical case studies are discussed in Section V, and finally
we draw some concluding remarks in Section VI.
In the recent years, there has been an extensive research
effort to understand the potential of ES devices for residential energy management [17]. This is mainly due to their
capabilities in reducing the intermittency of renewable energy
generation [18] as well as lowering the cost of electricity [19].
The related studies can be divided into two general categories.
The first category of studies consisting of [20], [21], which
assume that the ESs are installed within each RU premises
and are used solely by the owners in order to perform different
energy management tasks such as optimal placement, sizing
and control of charging and discharging of storage devices.
The second type of studies deal with ES devices that are
not installed within the RUs but located in a different location
such as in electric vehicles (EVs). Here, the ESs of EVs are
used to provide ancillary services for RUs [22]–[24] and local
energy providers [25]–[27]. Furthermore, another important
impact of ES devices on residential distribution grids is studied
in [28] and [29]. In particular, these studies focus on how
the use of ES devices can bring benefits for the stakeholders
in external energy markets. In [28], the authors propose a
multi-objective optimization method for siting and sizing of
ESs of a distribution grid to capture the trade-offs between
the storage stakeholders and the distribution system operators.
Furthermore, in [29], optimal storage profiles for different
stakeholders such as distribution grid operators and energy
traders are derived based on case studies with real data. Studies
of other aspects of smart grid can be found in [30]–[36].
As can be seen from the above discussion, the use of
ES devices in smart grid is not only limited to address the
intermittency of renewable generation [18] and assisting users
to take part in energy management to reduce their cost of
electricity [19], [21] but also extends to assisting the grid
(or, other similar energy entities such as an SFC) [37] and
generating revenues for stakeholders [28], [29]. However, one
similarity between most of the above mentioned literature is
that only one entity owns the ES and uses it according to its
requirements. Nonetheless, this might not always be the case if
there are large number of RUs2 in a community. In this regard,
considering the potential benefits of ES sharing, as discussed
in [10], this paper investigates the case in which the SFCs
in a smart community are allowed to share some fraction of
the ESs owned by the RUs through a third party such as an
auctioneer or a community representative.
The proposed modified auction scheme differs from the
existing techniques for multi-agent energy management such
as those in [11], [15], [16] in a number of ways. Particularly, in
contrast to these studies, the proposed auction scheme captures
the interaction between the SFCs and the RUs, whereby the
decision on the auction price is determined via a Stackelberg
game. By exploiting auction rules including the determination
rule, payment rule, and allocation rule the interaction between
the SFCs and RUs is greatly simplified. For instance, the
determination rule can easily identify the number of RUs that
are participating in the auction process, which further leverage
1 Please note that such a technique can be applied in the real distribution
network such as in electric vehicle charging stations by using the two-way
information and power flow infrastructure of smart grids [3].
2 Each RU may participate as a single entity or as a group where RUs
connected via an aggregator [38].
2
IEEE Trans. Smart Grid, Dec. 2015
sicap
either due to the fact that some SFCs do not have their own
ESs [11] or that the ESs of the SFCs are not large enough
to store all the excess energy at that time. It is important to
note that the ES requirement of the SFCs can stem from any
type of intermittent generation profile that the SFCs or RUs
can adopt. For example, one can consider that the proposed
scheme is based on a hybrid generation profile comprising both
solar and wind generation. However, the proposed technique
is equally suitable for other types of intermittent generation
as well. We assume that there are N = |N | RUs, where N is
the set of all RUs in the system, that are willing to share some
parts of their ES with the SFCs of the network. The battery
cap
capacity of each RU i ∈ N is si , and each RU i wants to
put xi fraction of its ES in the market to share with the SFCs,
where
(1)
xi ≤ bi = scap
i − di .
sicap : Total capacity of ES device of RU i.
di : The amount that RU i does not sell.
bi : The maximum ES space the RU i might sell to the SFCs.
bi = sicap − di
di
Sharing price pt
x1 ≤ b1
x2 ≤ b2
Each i decides
ri
ri < pt
Yes
No
x N ≤ bN
Leaves the
et
sharing market
q1
q2
Yes
Each m decides
am
qM
Take
ke part in ES
sharing
am > pt
No
Sharing price pt
Here, bi is the maximum amount of battery space that the RU
can share with the SFCs if the cost-benefit tradeoff for the
sharing is attractive for it. di is the amount of ES that the RU
does not want to share, rather uses for its own needs, e.g., to
run the essential loads in the future if there is any electricity
disruption within the RU or if the price of electricity is very
high.
Fig. 1: The fraction of the ES capacity that an RU i is willing to share with
the SFCs of the community.
the determination of the auction price via the Stackelberg game
in the payment rule. Furthermore, on the one hand the work
here complements the existing works focusing on the potential
of ES for energy management in smart grid. On the other
hand, the proposed work has the potential to open new research
opportunities in terms of control of energy dispatch from ES,
the size of ES, and exploring other interactive techniques such
as cooperative games and bi-level optimization for ES sharing.
To this end, to offer an ES space xi , on the one hand, each
RU i decides on an reservation price ri per unit of energy.
Hereinafter, we will use ES space and energy interchangeably
to refer to the ES space that each RU might share with the
SFCs. However, if the price pt , which each RU received for
sharing its ES, is lower than ri , the RU i removes its ES
space xi from the market as the expected benefit from the
joint sharing of ES is not economically attractive for it. On
the other hand, each SFC m ∈ M, that needs to share ES
space with the RUs to store their energy, decides a reservation
bid am , which represents the maximum unit price the SFC m
is willing to pay for sharing per unit of ES with the RUs in
the smart community, to enter into the sharing market. And,
if am > pt , the SFC removes its commitment of joint ES
ownership with RUs from the market due to the same reason
as mentioned for the RU. A graphical representation of the
concept of ES sharing and their decision making process of
sharing the ES space of each RU i with the SFCs are shown
in Fig. 1. Please note that to keep the formulation simple,
we do not include any specific storage model in the scheme.
However, by suitably modeling some related parameters such
as the storage capacity scap
i , and parameters like di and bi , the
proposed scheme can be adopted for specific ES devices.
III. S YSTEM M ODEL
Let us consider a smart community that consists of a large
number of RUs. Each RU can be an individual home, a
single unit of a large apartment complex, or a large number
of units connected via an aggregator that acts as a single
entity [38]–[40]. Each RU is equipped with an ES device that
the RU can use to store electricity from the main grid or its
renewable energy sources, if there are any, or can perform
DR management according to the real-time price offered by
the grid. The ES device can be a storage device installed
within each RU premises or can be the ES used for the RU’s
electric vehicles. The entire community is considered to be
divided into a number of blocks, where each block consists
of a number of RUs and an SFC. Each SFC m ∈ M, where
M is the set of all SFCs and M = |M|, is responsible for
controlling the electrical equipment and machines such as lifts,
parking lot lights and gates, water pumps, and lights in the
corridor area of a particular block of the community, which
are shared and used by the residents of that block on regular
basis. Each SFC is assumed to have its own renewable energy
generation and is also connected to the main electricity grid
with appropriate communication protocols.
Considering the fact that the nature of energy generation
and consumption is highly sporadic [41], let us assume that
the SFCs in the community need some extra ESs to store
their electricity after meeting the demand of their respected
shared facilities at a particular time of the day. This can be
The interaction that arises from the choice of ES sharing
price between the SFCs and RUs as well as the need of the
SFCs to share the ES space to store their energy and the profits
that the RUs can reap from allowing their ESs to be shared
give rise to a market of ES sharing between the RUs and the
SFCs in the smart grid. In this market, the involved N RUs
and M SFCs will interact with each other to decide as to
how many of them will take part in sharing the ESs between
themselves, and also to agree on the ES sharing parameters
such as the trading price pt and the amount of ES space to
3
IEEE Trans. Smart Grid, Dec. 2015
IV. AUCTION BASED ES OWNERSHIP
Vickrey auction is a type of sealed-bid auction scheme,
where the bidders submit their written bids to the auctioneer without knowing the bids of others participating in the
auction [14]. The highest bidder wins the auction but pays
the second highest bid price. Nevertheless, in this paper, we
modify the classical Vickrey auction [14] to model the joint
ES ownership scheme for a smart community consisting of
multiple customers (i.e., the SFCs) and multiple owners of ES
devices (i.e., the RUs). The modification is motivated by the
following factors: 1) unlike the classical Vickrey auction, the
modified scheme would enable the multiple owners and customers to decide simultaneously and independently whether to
take part in the joint ES sharing through the determination rule
of the proposed auction process, as we will see shortly; 2) the
modification of the auction provides each participating RU i
with flexibility of choosing the amount of ES space that they
may want to share with the SFCs in cases when the auction
price5 pt is lower than their expected reservation price ri ;
and 3) finally, the proposed auction scheme provides solutions
that satisfy both the incentive compatibility and individual
rationality properties, as we will see later, which are desirable
in any mechanism that adopts auction theory [41].
To this end, the proposed auction process, as shown in
Fig. 2, consists of three elements:
Fig. 2: Energy management in a smart community through auction process
consisting of multiple RUs with ES devices, an auctioneer and a number of
SFCs.
be shared. In the considered model, the RUs not only decide
on the reservation prices ri , but also on the amount of ES
space xi that they are willing to share with the SFCs. The
amount of xi is determined by the trade-off between between
the economic benefits that the RU i expects to obtain from
giving the SFCs the joint ownership of its ES device and
the associated reluctance αi of the RU for such sharing. The
reluctance to share ESs may arise from the RUs due to many
factors. For instance, sharing would enable frequent charging
and discharging of ESs that reduce the lifespan3 of an ES
device [42]. Hence, an RU i may set its αi higher so as
to increase its reluctance to participate in the ES sharing.
However, if the RU is more interested in earning revenue rather
than increasing ES life time, it can reduce its αi and thus get
more net benefits from sharing its storage. Therefore, for a
given set of bids am , ∀m and storage requirement qm , ∀m
by the SFCs, the maximum amount of ES xi that each RU
i will decide to put for sharing is strongly affected by the
trading price pt and the reluctance parameter4 αi of each
RU i ∈ N during the sharing process. In this context, we
develop an auction based joint ES ownership scheme in the
next section. We understand that the proposed scheme involves
different types of users such as auctioneers, SFCs, and RUs.
Therefore, the communication protocol used by them could
be asynchronous. However, in our study we assume that the
communication between different entities of the system are
synchronous. This is mainly due to the fact that we assume
our algorithm is executed once in a considered time slot, and
the duration of this time slot can be one hour [43]. Therefore,
synchronization is not a significant issue for the considered
case and the communication complexity is affordable. For
example, the auctioneer can wait for five minutes until it
receives all the data from SFCs and the RUs and then the
algorithm, which is proposed in Section IV-C, can be executed.
1) Owner: The RUs in set N , that own the ES devices,
and expect to earn some economic benefits, e.g., through
maximizing a utility function, by letting the SFCs to share
some fraction of their ES spaces.
2) Customer: The SFCs in set M, that are in need of ESs in
order to store some excess electricity at a particular time
of the day. The SFCs offer the RUs a price with a view
to jointly own some fraction of their ES devices.
3) Auctioneer: A third party (e.g., estate or building manager), that controls the auction process between the
owners and the customers according to some predefined
rules.
The proposed auction policies consist of A) determination
rule, B) payment rule and C) storage allocation rule. Here,
determination rule allows the auctioneer to determine the
maximum limit for the auction price pmax
and the number
t
of SFCs and RUs that will actively take part in the ES sharing
scheme once the auction process is initiated. The payment rule
enables the auctioneer to decide on the price that the customer
needs to pay to the owners for sharing their ES devices, which
allows the RUs to decide how much storage space they will
be putting into the market to share with the SFCs. Finally,
the auctioneer allocates the ES spaces for sharing for each
SFC following the allocation rule of the proposed auction.
It is important to note that although both the customers and
owners do not have any access to others private information
such as the amount of ES to be shared by an RU or the required
energy space by any SFC, the rules of auction are known to
all the participants of the joint ownership process.
3 Please note that the life time degradation due to charging and discharging
may not true for all electromechanical systems such as redox-flow system.
4 Reluctance parameter refers to the opposite of preference parameter [38].
5 Hereinafter, p will be used to refer to auction price instead of sharing or
t
trading price.
4
IEEE Trans. Smart Grid, Dec. 2015
of the SFCs and RUs in the network:
90
Cosumers participating
in auction
Owner
Customer
am < ri ; ∀m ∈ M/{1, 2, . . . , K}, ∀i ∈ N /{1, 2, . . . , J}. (4)
80
Hence, the joint ownership of ES would be a detrimental choice for the RUs and the SFCs within the set
N /{1, 2, . . . , J} and M/{1, 2, . . . , K} respectively, which
consequently remove them from the proposed auction process.
Now, one desirable property of any auction mechanism is that
no participating agents in the auction mechanism will cheat
once the payment and allocation rules are being established.
To this end, we propose that, once J and K are determined,
K − 1 SFCs and J − 1 RUs will be engaged in the joint ES
sharing process, which is a necessary condition for matching
total demand and supply while maintaining a truthful auction
scheme [44]. Nevertheless, if truthful auction is not a necessity,
SFC K and RU J can also be allowed to participate in the
joint ES ownership auction.
Price
70
60
Maximum auction price pmax
t
Vickrey price pmin
t
50
40
Owners participating
in auction
30
0
50
100
150
Storage amount
Fig. 3: Determination of the Vickrey price, the maximum auction price, and
the number of participating RUs and SFCs in the auction process.
The proposed scheme initially determines the set of SFCs
⊂ M and RUs ⊂ N that will effectively take part in the
auction mechanism once the upper bound of the auction price
pmax
is determined. Eventually, the payment and the allocation
t
rules are executed in the course of the auction plan.
B. Payment Rule
We note that the intersection of the demand and supply
curves demonstrates the highest reservation price pmax
for the
t
participating J − 1 RUs. According to the Vickrey auction
mechanism [14], the auction price for sharing the ES devices
would be the second highest reservation price, i.e., the Vickrey
price, which will be indicated as pmin
hereinafter. However, we
t
note that this second highest price might not be considerably
beneficial for all the participating RUs in the auction scheme.
In contrast, if pt is set to pt = pmax
t , the price could be
detrimental for some of the SFCs. Therefore, to make the
auction scheme attractive and beneficial to all the participating
RUs and, at the same time, to be cost effective for all the SFCs,
we strike a balance between the pmax
and pmin
t
t . To do so, we
propose a scheme for deciding on both the auction price pt
and the amount of ESs xi that RUs will put into the market for
sharing according to pt . In particular, we propose a Stackelberg
game between the auctioneer that decides on the auction price
pt to maximize the average cost savings to the SFCs as well as
satisfying their desirable needs of ESs, and the RUs, that decide on the vector of the amount of ES x = [x1 , x2 , . . . , xJ−1 ]
that they would like to put into the market for sharing such that
their benefits are maximized. Please note that the solution of
the proposed problem formulation can also be solved following
other distributed algorithms, e.g., algorithms designed via the
bi-level optimization technique [45].
Stackelberg game: Stackelberg game is a multi-level decision making process, in which the leader of the game takes
the first step to choose its strategy. The followers, on the other
hand, choose their strategy in response to the decision made by
the leader. In the proposed game, we assume the auctioneer
as the leader and the RUs as the followers. Hence, it can
be seen as a single-leader-multiple-follower Stackelberg game
(SLMFSG). We propose that the auctioneer, as a leader of
the SLMFSG Γ, will take the first step to choose a suitable
min
auction price pt from the range [pmin
t , pt ]. Meanwhile, each
RU i ∈ {1, 2, . . . , J − 1}, as a follower of the game, will
play its best strategy by choosing a suitable xi ∈ [0, bi ] in
response to the price pt offered by the auctioneer. The best
A. Determination Rule
The determination rule of the proposed scheme is executed
by the following steps (inspired from [44]):
i) The RUs of set N , i.e., the owners of the ESs, declare
their reservation price ri , ∀i in an increasing order, which
we can consider, without loss of generality, as:
r1 < r2 < . . . < rN .
(2)
The RUs submit the reservation price along with the
amount xi of ES that they are interested to share with
the SFCs to the auctioneer.
ii) The SFCs’ bidding prices, i.e., am , ∀m, are arranged in
a decreasing order, i.e.,
a1 > a2 > . . . > aM .
(3)
The SFCs submit to the auctioneer along with the quantity
qm ∀m of ES that they require.
iii) Once the auctioneer receives the ordered information from
the RUs and the SFCs, it generates the aggregated supply
(reservation price of the RUs versus the amount of ES the
RUs interested to share) and demand curves (reservation
bids am verses the quantity of ES qm needed) using (2)
and (3) respectively.
iv) The auctioneer determines the number of of participating
SFCs K and RUs J that satisfies aK ≥ rJ from
the intersection of the two curves using any standard
numerical method [44].
As soon as the SFC K ≤ M and RU J ≤ N are determined
from the intersection point, as shown in Fig. 3, an important
aspect of the auction mechanism is to determine the number
of SFCs and RUs, which will take part in the joint ownership
of ESs. We note that once the number of SFCs K and RUs
J are determined, the following relationship holds for the rest
5
IEEE Trans. Smart Grid, Dec. 2015
response strategy of each RU i will stem from a utility function
Ui , which captures the benefit that an RU i can gain from
deciding on the amount of ES xi to be shared for the offered
price. Whereas the auctioneer chooses the price pt with a
view to maximize the average cost savings Z of the SFCs
in the network. Now to capture the interaction between the
auctioneer and the RUs, we formally define the SLMFSG Γ
as
Γ = {{{1, 2, . . . , J − 1}, {Auctioneer}}, {Ui }i∈{1,2,...,J−1} ,
{Xi }i∈{1,2,...,J−1} , Z, pt },
which consists of: i) the set of RUs {1, 2, . . . , J − 1} participating in the auction scheme and the auctioneer; ii) the utility
Ui that each RU i reaps from choosing a suitable strategy
xi in response to the price pt announce by the auctioneer;
iii) the strategy set Xi of each RU i ∈ {1, 2, . . . , J − 1};
iv) the average cost savings Z that incurred to each SFC
m ∈ {1, 2, . . . , K − 1} from the strategy
by the
chosen
max
of the
auctioneer, and v) the strategy pt ∈ pmin
t , pt
auctioneer.
In the proposed approach, each RU i iteratively responses to
the strategy pt chosen by the auctioneer independent of other
RUs in set {1, 2, . . . , J − 1}/{i}. The response of i is affected
by the offered price pt , its reluctance parameter αi and the
initial reservation price ri .
However, we note that the auctioneer does not have any
control over the decision making process of the RUs. It only
sets the auction price pt with a view to maximize the cost
savings Z, with respect to the cost with the initial bidding
price, for the SFCs. To this end, the target of auctioneer is
(5)assumed to maximize the average cost savings
! J−1
PK−1
X
(a
−
p
)
m
t
m=1
Z=
xi
(8)
K −1
i=1
by choosing an appropriate price
p to offer to each RU from
PK−1 t
min max
m=1 (am −pt )
is the average savthe range [pt , pt ]. Here,
K−1
ing in auction
price
that
the
SFCs
pay
to
the
RUs for sharing
P
the ESs and i xi is the total amount of ES that all the SFCs
share from the RUs. From Z, we note that the cost savings
will be more if pt is lower for all m ∈ {1, 2, . . . , K − 1}.
However, this is conflicted by that fact that a lower pt may
lead to the choice of lower xi ∀i ∈ {1, 2, . . . , J − 1} by the
RUs, which in turn will affect the cost to the SFCs. Hence,
to reach a desirable solution set (x∗ , p∗t ), the auctioneer and
the RUs continue to interact with each other until the game
reaches a Stackelberg equilibrium (SE).
Now, the utility function Ui , which defines the benefits that
an RU i can attain from sharing xi amount of its ES with the
SFCs, is proposed to be
Ui (xi ) = (pt − ri )xi − αi x2i , xi ≤ bi ,
(6)
where, αi is the reluctant parameter of RU i, and ri is the
reservation price set by RU i. Ui mainly consists of two parts.
The first part (pi − ri )xi is the utility in terms of its revenue
that an RU i obtains from sharing its xi portion of ES device.
The second part αi x2i , on other hand, is the negative impact
in terms of liability on the RU i stemming from sharing its
ES with the SFC. This is mainly due to the fact that once an
RU decides to share its xi amount of storage space with an
SFC, the RU can only use scap
i − xi amount of storage for its
own use. The term αi x2i captures this restriction of the RU
on the usage of its own ES. In (6), the reluctance parameter
αi is introduced as a design parameter to measure the degree
of unwillingness of an RU to take part in energy sharing. In
particular, a higher value of αi refers to the case when an RU
i is more reluctant to take part in the ES sharing, and thus, as
can be seen from (6), even with the same ES sharing attains
a lower net benefit. Thus, Ui can be seen as a net benefit
to RU i for sharing its ES. The utility function is based on
the assumption of a non-decreasing marginal utility, which
is suitable for modeling the benefits of power consumers, as
explained in [46]. In addition, the proposed utility function
also possesses the following properties: i) the utility of any
RU increases as the amount of price pt paid to it for sharing
per unit of ES increases; ii) as the reluctance parameter αi
increases, the RU i becomes more reluctant to share its ES, and
consequently the utility decreases; and iii) for a particular price
pt , the more an RU shares with the SFCs, the less interested it
becomes to share more for the joint ownership. To that end, for
a particular price pt and reluctance parameter αi , the objective
of RU i is
(7)
max (pt − ri )xi − αi x2i , xi ≤ bi .
Definition 1. Let us consider the game Γ as described in (5),
where the utility of each RU i and the average utility per SFC
are described via Ui and Z respectively. Now, Γ will reach a
SE (x∗ , p∗t ), if and only if the solution of the game satisfies
the following set of conditions:
Ui (x∗i , x∗−i , p∗t ) ≥ Ui (xi , x∗−i , p∗t ), ∀i ∈ {1, 2, . . . , J − 1},
max
∀xi ∈ Xi , p∗t ∈ [pmin
t , pt ], (9)
and
PK−1
− p∗t ) X ∗
xi ≥
K −1
i
m=1 (am
PK−1
− pt ) X ∗
xi ,
K −1
i
m=1 (am
(10)
where x−i = [x1 , x2 , . . . , xi−1 , xi+1 , . . . , xJ−1 ].
Hence, according to (9) and (10), both the RUs and the SFCs
achieve their best possible outcomes at the SE. Hence, neither
the RUs nor the auctioneer will have any incentive to change
their strategies as soon as the game Γ reaches the SE. However,
achieving an equilibrium solution in pure strategies is not
always guaranteed in non-cooperative games [38]. Therefore,
we need to investigate whether the proposed Γ possesses an
SE or not.
Theorem 1. There always exists a unique SE solution for
the proposed SLMFSG Γ between the auctioneer and the
participating RUs in set {1, 2, . . . , J − 1}.
Proof: Firstly, we note that the strategy set of the auction
max
.
eer is non-empty and continuous within the range pmin
t , pt
Hence, there will always be a non-empty strategy for the
auctioneer that will enable the RUs to offer some part of their
xi
6
IEEE Trans. Smart Grid, Dec. 2015
ES, within their limits, to the SFCs. Secondly, for any price
pt , the utility function Ui in (6) is strictly concave with respect
2
of xi , ∀i ∈ {1, 2, . . . , J − 1}, i.e., δδxU2i < 0. Hence, for any
i
min max
price pt ∈ pt , pt , each RU will have a unique xi , which
will be chosen from a bounded range [0, bi ] and maximize Ui .
Therefore, it is evident that as soon as the scheme will find
a unique p∗t such that the average utility Z per SFC attains a
maximum value, the SLMFSG Γ will consequently reach its
unique SE.
To this end, first we note that the amount of ES x∗i , at which
the RU i achieves its maximum utility in response to a price
pt can be obtained from (6),
pt − ri
x∗i =
.
(11)
2αi
Algorithm 1: Algorithm for SLMFSG to reach the SE
∗
1: Initialization: p∗t = pmin
t , Z = 0.
2: for Auction price pt from pmin
to pmax
do
t
t
3:
for Each RU i ∈ {1, 2, . . . , (J − 1)} do
4:
RU i adjusts its amount of ES xi to share according to
x∗i = arg
5:
6:
7:
8:
Now, replacing the value of x∗i in (8) and doing some simple
arithmetics, the auction price p∗t , which maximizes the average
cost savings to the SFCs can be found as
P
P
P
J−1 1
K−1
J−1
a
+ i=1 ri (K−1)
m
i=1 2αi
m=1
2αi
∗
pt =
, (12)
PJ−1 K−1
i=1
max
0≤xi ≤bi
[(pt − ri )xi − αi x2i ].
(13)
end for
The auctioneer computes the average cost savings to SFCs
! J −1
PK−1
X ∗
m=1 (am − pt )
xi .
(14)
Z=
K−1
i=1
if Z ≥ Z ∗ then
The auctioneer record the desirable price and maximum
average cost savings
p∗t = pt , Z ∗ = Z.
(15)
9:
end if
10: end for
The SE (x∗ , p∗t ) is achieved.
αi
guaranteed to reach SE of the proposed SLMFSG Γ.
where am for any m ∈ {1, 2, . . . , K − 1} and αi for any
i ∈ {1, 2, . . . , J − 1} is exclusive. Therefore, p∗t is unique for
Γ, and thus Theorem 1 is proved.
Proof: In the proposed algorithm, we note that the choice
of strategies by the RUs emanate from the choice pt of the
auctioneer, which as shown in (12) will always attain a nonempty single value p∗t at the SE due to its bounded strategy set
max
[pmin
t , pt ]. On the other hand, as the Algorithm 1 is designed,
in response to the p∗t , each RU i will choose its strategy xi
from the bounded range [0, bi ] in order to maximize its utility
function Ui . To that end, due to the bounded strategy set and
continuity of Ui with respect to xi , it is confirmed that each
RU i will always reach a fixed point x∗i for the given p∗t .
Therefore, the proposed Algorithm 1 is always guaranteed to
reach the unique SE of the SLMFSG.
C. Algorithm for payment
To attain the SE, the auctioneer, which has the information
of am , m = {1, 2, 3, . . . , K − 1}, needs to communicate with
each RU. It is considered that the auctioneer does not have
any knowledge of the private information of the RUs such
as αi , ∀i. In this regard, in order to decide on a suitable
auction price pt that will be beneficial for both the RUs and
the SFCs, the auctioneer and the RUs interact with one another.
To capture this interaction, we design an iterative algorithm,
which can be implemented by the auctioneer and the RUs in a
distributed fashion to reach the unique SE of the proposed
SLMFSG. The algorithm initiates with the auctioneer who
sets the auction price pt to pmin
and the optimal average
t
cost saving per SFC Z ∗ to 0. Now, in each iteration, after
having the information on the offered auction price by the
auctioneer, each RU i plays its best response xi ≤ bi and
submits its choice to the auctioneer. The auctioneer, on other
hand, receives the information on x = [x1 , x2 , . . . , xJ−1 ]
from all the participating RUs and determines the average
cost savings per SFC Z from its knowledge on the reservation
bids [a1 , a2 , . . . , aK−1 ] and using (8). Then, the auctioneer
compares the Z with Z ∗ . If Z > Z ∗ , the auctioneer updates
the optimal auction price to the one recently offered and
sends a new choice of price to the RUs in the next iteration.
However, if Z ≤ Z ∗ , the auctioneer keeps the same price
and offers another new price to the RUs in the next iteration.
The iteration process continues until the conditions in (9) and
(10) are satisfied, and hence the SLMFSG reaches the SE. We
show the step-by-step process of the proposed algorithm in
Algorithm 1.
D. Allocation Rule
Now, once the the amount of ES x∗i that each RU i ∈
{1, 2, . . . , J − 1} decides to put into the market for sharing in
response to the auction price p∗t is determined, the auctioneer
allocates the quantity Qi to be jointly shared by each RU i
and the SFCs according to following rule [44]:
(
PK−1
PJ−1
x∗i
if i=1 x∗i ≤ m=1 qm ,
Qi (x) =
(16)
P
P
J−1 ∗
(x∗i − ηi )+ if i=1
xi > K−1
m=1 qm ,
where (f )+P = max(0,
Pf ) and ηi is the allotment of the
J−1 ∗
excess ES i=1
xi − K−1
m=1 qm that an RU i must endure.
Essentially, the rule in (16) emphasizes that if the requirements
of the SFCs exceed the available ES space from the RUs, each
RU i will allow the SFCs to share all of the ES xi that it put
into the market. However, if the available ES exceeds the total
demand by the SFCs, then
RU P
i will have to share a
Peach
J−1
K−1
fraction of the oversupply i=1 x∗i − m=1 qm . Nonethless,
this burden, if there is any, can be distributed in different
ways among the participating RUs. For instance, the burden
can be distributed either proportionally to the amount of ES
x∗i that each RU i shared with the SFCs or proportionally to
Theorem 2. The algorithm proposed in Algorithm 1 is always
7
IEEE Trans. Smart Grid, Dec. 2015
the reservation price6 ri of each RU. Alternatively, the total
burden can also be shared equally by the RUs in the auction
scheme [44].
1) Proportional allocation: In proportional allocation [47],
a fraction of the total burden ηi is allocated to each RU i
in
to the reservation
price ri (or, x∗i ) such that
PJ−1
PK−1
P proportion
∗
i ηi =
i=1 xi −
m=1 qm , which can be implemented
as follows:
P
PK−1
J−1 ∗
x
−
i=1 i
m=1 qm ri
P
ηi =
, i = [1, 2, . . . , J − 1]. (17)
i ri
it is clear that all the participants in the proposed auction
scheme are individually rational, which leads to the following
Corollary 1.
Corollary 1. The proposed auction technique possesses the
individual rationality property, in which the J − 1 rational
owners and K − 1 rational customers actively participate in
the mechanism to gain the higher utility.
Theorem 3. The proposed auction mechanism is incentive
compatible, i.e., truthful auction is the best strategy for any
RU i ∈ {1, 2, . . . , J − 1} and SFC m ∈ {1, 2, . . . , K − 1}.
By replacing ri with x∗i in (17), the burden allocation can be
determined in proportion to the shared ES by each RU.
2) Equal allocation: According to equal allocation [44],
each RU bears an equal burden
!
K−1
J−1
X
X
1
∗
ηi =
x −
qm , i = [1, 2, . . . , J − 1] (18)
J − 1 i=1 i m=1
Proof: To validate Theorem 3, first we note that the
choice of strategies by the RUs always guaranteed to converge
to a unique SE, i.e., x∗ = [x∗1 , x∗2 , . . . , x∗J−1 ] as proven in
Theorem 1 and Theorem 2, which confirms the stability of
their selections. Now, according to [44], once the owners of an
auction process, i.e., the RUs in this proposed case, decide on
a stable amount of commodity, i.e., x∗i ∀i ∈ {1, 2, . . . , J − 1},
to supply to or to share with the customers, the auction process
always converges to a strategy-proof auction if the allocation
of commodity is conducted according to the rules described
in (16) and (18). Therefore, neither any RU nor any SFC
will have any intention to falsify their allocation once they
adopt (16) and (18) [44] for sharing the storage space of the
RUs from their SE amount. Therefore, the auction process is
incentive compatible, and thus Theorem 3 is proved.
of the oversupply.
Here it is important to note that, although proportional
allocation allows the distribution of oversupply according to
some properties of the RUs, equal allocation is more suitable
to make the auction scheme strategy proof [44]. Strategy
proofness is important for designing auction mechanisms as
it encourages the participating players not to lie about their
private information such as reservation price [41], which
is essential for the acceptability and sustainability of such
mechanisms in energy markets. Therefore, we will use equal
allocation of (18) for the rest of the paper.
F. Adaptation to Time-Varying Case
To extend the proposed scheme to a time-varying case, we
assume that the ES sharing scheme works in a time-slotted
fashion where each time slot has a suitable time duration based
on the type of application, e.g., 1 hour [43]. It is considered
that in each time slot all the RUs and SFCs take part in the
proposed ES sharing scheme to decide on the parameters such
as the auction price and the amount of ESs that needs to be
shared. However, in a time-varying case, the amount of ES
that an RU shares at time slot t may be affected by the burden
that the RU needed to bear in the previous time slot t − 1. To
this end, first we note that once the number of participating
RUs and SFCs is decided for a particular time slot via the
determination rule, the rest of the procedures, i.e., the payment
and allocation rules are executed following the descriptions in
Section IV-B and IV-D respectively for the respective time
slot. Now, if the total number of RUs and SFCs is fixed, the
RUs and SFCs that participate in the modified auction scheme
in any time slot is determined by their respective reservation
and bidding prices for that time slot. Further, the proposed
auction process may evolve across different time slots based
on the change of the amount of ES that each participating RU
i may want to share and the change in the total amount of
ES required for the SFCs in different time slots. Now, before
discussing how the proposed modified auction scheme can be
extended to a time-varying environment7, first we define the
E. Properties of the Auction Process
We note that once the auction process is executed, there
is always a possibility that the owners of the ES might
cheat on the amount of storage that they wanted put into
the market during auction [13]. In this context, we need to
investigate whether the proposed scheme is beneficial enough,
i.e., individually rational, for the RUs such that they are not
motivated to cheat, i.e., incentive compatible, once the auction
is executed.
Now for the individual rationality property, first we note that
all the players, i.e., the RUs and the auctioneer on behalf of the
SFCs, take part in the SLMFSG to maximize their benefits in
terms of their respected utility from their choice of strategies.
The choice of the RUs is to determine vector of ES x∗ such
that each of the RU can be benefitted at its maximum. On the
other hand, the strategy of the auctioneer is to choose a price pt
to maximize the savings of the SFCs. Accordingly, once both
the RUs and the auctioneer reach such a point of the game
when neither the owners nor the customers can be benefitted
more from choosing another strategy, the SLMFSG reaches
the SE. To this end, it is already proven in Theorem 1 that the
proposed Γ in this auction process must possesses a unique
SE. Therefore, as a subsequent outcome of the Theorem 1,
7 Certain loads such as lifts and water pumps in large apartment buildings
are not easy to schedule as they are shared by different users of the buildings.
Hence, we focus on the time variation of the storage sharing process by the
RUs of the considered system.
6 Please
note that the reservation price ri indicates how much each RU
i wants to be paid forPsharing its ES with the SFCs, and thus affects the
determination of total
x∗i and the total burden.
8
IEEE Trans. Smart Grid, Dec. 2015
which households are equipped with a dedicated battery to sell
the stored electricity to the grid [48]. Nonetheless, xi,t is also
affected by the amount of burden ηi,t−1 that an RU needed to
bear due to an oversupply of ES spaces, if there was any, in
the previous time slot. To this end, the amount of ES space
that an RU i can offer to the SFCs at t can be defined as
(
xi,t−1
if i ∈
/ Jt−1
xi,t =
. (21)
max(bi,t − (xi,t−1 − ηi,t−1 ), 0) otherwise
following parameters:
t: index of time slot.
T : total number of time slot.
ri,t : the reservation price of RU i ∈ N at time slot t.
ri = [ri,1 , ri,2 , . . . , ri,T ]: is the reservation price vector for
RU i ∈ N .
xi,t : the fraction of ES space that the RU i wants to shares
with the SFCs at time slot t.
xi = [xi,1 , xi,2 , . . . , xi,T ]: the vector of ES space shared by
RU i with the SFC during the total considered times.
bi,t : maximum available ES of RU i for sharing at time slot
t.
am,t : the bidding price of each SFC m ∈ M at time slot t.
am = [am,1 , am,2 , . . . , am,T ]: is the reservation price vector
for SFC m ∈ N .
qm,t : the required ES space by each SFC m at time slot t.
pt,t : the auction price at time slot t.
Ui,t : the benefit that each RU i achieves at time slot t.
Zt : the average cost saving per SFC at time slot t.
ηi,t : the burden that is shared by each participating RU at time
slot t.
Kt : number of participating SFCs in the modified auction
scheme at time slot t.
Jt : number of participating RUs in the modified auction
scheme at time slot t.
To this end, the utility function Ui,t of each RU i and the
average cost savings Zt per SFC at time slot t can be defined
as
Ui,t (xi,t ) = (pt,t − ri,t )xi,t − αi x2i,t ,
The SFC m, on the other hand, decides on the amount of ES
qm,t that it needs to share from the RUs at t based on the
random requirement of the shared facilities at t, the available
shared ES space qm,t−1 from time slot t − 1, and the random
generation of renewable energy sources, where appropriate.
Hence,
qm,t = f (qm,t−1 , renewables, facility requirement).
Now, if we assume that the fraction of shared ES available
from previous time slot is negligible, i.e., qm,t−1 ≈ 0, the
requirement qm,t can be assumed to be random for each
time slot t considering the random nature of both renewable
generation and energy requirement of shared facilities. Note
that this assumption is particularly valid if the SFC uses all its
shared ESs from the previous time slot for meeting the demand
of the shared facilities and cannot use them in considered time
slot. Nonetheless, please note that this assumption does not
imply that the inter-temporal relationship between the auction
process across different time slots is non-existent. The auction
process in one time slot still depends on other time slots due
to the inter-temporal dependency of xi,t via (21).
To this end, for the modeled xi,t ∀i ∈ N and qm,t ∀m ∈ M,
the proposed modified auction scheme studied in Section IV
can be adopted in each time slot t = 1, 2, . . . , T with a
view to maximize (19) and (20) ∀t. It is important to note
that the reservation price vector ri of each RU i ∈ N and
the bidding price vector am of each SFC m ∈ M can be
modeled through any existing time-varying pricing schemes
such as time-of-use price [3]. Now, p∗t = [p∗t,1 , p∗t,2 , . . . , p∗t,T ]
and x∗ = [x∗1 , x∗2 , . . . , x∗N ] constitute the solutions of the
proposed modified auction scheme in a time-varying condition,
if the x∗ comprises the solution vector of all ES spaces shared
by the participating RUs in each time slot t = 1, 2, . . . , T
for the auction price vector p∗t . Further, all the auction rules
adopted in each time slot of the proposed time-varying case
will be similar to the rules discussed in Section IV. Hence, the
solution of the proposed modified auction scheme for a timevarying environment also possesses the incentive compatibility
and individual rationality properties for each time slot.
(19)
and
Zt =
PKt −1
(am,t − pt,t )
Kt − 1
m=1
! J−1
X
xi,t
(22)
(20)
i=1
respectively8.
Now, at time slot t, the determination rule of the proposed
scheme determines the number of participating RUs and SFCs
based on their reservation and bidding prices for that time slot.
The number of participation is also motivated by the available
ES space of each RU and the requirement of each SFC.
However, unlike the static case, in a time-varying environment
the offered ES space by an RU at time slot t is influenced by
its contribution to the auction process in the previous time
slot. For instance, if an RU i receives a burden ηi,t−1 in time
slot t − 1, its willingness to share ES space xi,t at time slot
t may reduce. xi,t is also affected by the maximum amount
of ES bi,t available to RU i at t. For simplicity, we assume
that bi,t and αi,t do not change over different time slots.
Therefore, an RU i can offer to share the same amount of
ES space xi,t to the SFCs at time slot t if it did not share
any amount in time slot t − 1. An analogous example of such
arrangement can be found in FIT scheme with ES device in
V. C ASE S TUDY
For numerical case studies, we consider a number of RUs
at different blocks in a smart community that are interested in
allowing the SFCs of the community to jointly share their ES
devices. We stress that when there are a large number of RU
and SFCs in the system, the reservation and bidding prices
will vary significantly from one another. Therefore, it will be
difficult to find an intersection point to determine the highest
8 Please note that in each time slot t, (19) and (20) are related with each
other in a similar manner as (7) and (8) are related for the static case. However,
unlike the static case, the execution of the auction process in each time slot t
is affected by the value of parameters such as xi,t and pt for that particular
time slot.
9
ES shared by each RU
IEEE Trans. Smart Grid, Dec. 2015
TABLE I: Change of average utility achieved by each SFC and each RU in
the network (according to Algorithm 1) due to the change of the reluctance
of each RU for sharing one kWh ES with the SFC.
RU5
300
RU3
RU2
RU4
Reluctance Parameter
!
0.001
0.01
0.1
1
200
RU1
100
0
0
5
10
RU6, RU7, RU8
15
20
Number of iteration
25
30
Average utility per RU
(Net benefit)
3450.6
2883.6 (-16.43%)
1117.3 (-67.6%)
142.37 (-95.3%)
Average utility for SFC
(Average cost savings)
7500
4578.3 (-38.9%)
1671.7 (-77.7%)
259.03 (-96%)
4
Average utility for SFC
8
x 10
6
RU to put into the market for sharing. As can be seen from
the figure, on the one hand, RU 1, RU 2, and RU 3 reach the
SE much quicker than RU 4 and RU 5. On the other hand, no
interest for sharing any ES is observed for RU 4, 5 and 6.
This is due to the fact that as the interaction between the
auctioneer and the RUs continues, the auction price pt is
updated in each iteration. In this regard, once the auction price
for any RU becomes larger than its reservation price, it put all
its reserve ES to the market with an intention to be shared by
the SFCs. Due to this reason, RU 1, RU 2, and RU 3 put their
ESs in the market much sooner, i.e., after the 2nd iteration,
than RU 4 and RU 5 with higher reservation prices, whose
interest for sharing ES reaches the SE once the auction price
is encouraging enough for them to share their ESs after the
5th and 20th iterations. Unfortunately, the utilities of RU 6, 7,
and 8 are not convenient enough to take part in the auction
process, and therefore their shared ES fractions are 0.
We note that the demonstration of the convergence of the
SLMFSG to a unique SE subsequently demonstrates the proofs
of Theorem 1, Theorem 2, Theorem 3 and Corollary 1, which
are strongly related to the SE as explained in the previous
section. Now, we would like to investigate how the reluctance
parameters of the RUs may affect their average utility from
Algorithm 1, and thus affecting their decisions to share ES.
To this end, we first determine the average utility that is
experienced by each RU and SFC for a reluctance parameter of
αi = 0.001 ∀i. Then considering the outcome as a benchmark,
we show the effect of different reluctance parameters on the
achieved average benefits of each SFC and RU in Table I. The
demonstration of this property is necessary in order to better
understand the working principle of the designed technique
for ES sharing.
According to Table I, as the reluctance of each RU increases,
it becomes more uncomfortable, i.e., lower utility, to put its
ES in the market to be jointly owned by the SFCs. As a consequence, it also affects the average utility achieved by each
SFC. As shown in Table I, the reduction in average utilities per
RU are 16.73%, 67.6% and 95.3% respectively compared to
the average utility achieved by an RU at αi = 0.001 for every
ten times reduction in the reluctance parameter. For similar
settings, the reduction of average utility for the SFCs are
38.9%, 77.7% and 96% at αi = 0.01, 0.1 and 1 respectively.
Therefore, the proposed scheme will enable the RUs to put
more storage in the auction market if the related reluctance for
this sharing is small. Note that although the current investment
cost of batteries is very high compared to their relative short
life times, it is expected that battery costs will go down in
the near future [10] and become very popular for addressing
*
Z
4
2
0
0
5
10
15
20
Number of iteration
25
30
Fig. 4: Convergence of Algorithm 1 to the SE. At SE, the average utility per
SFC reaches its maximum and the ES that each RU wants to put into the
market for share reaches a steady state level that maximize their benefits.
reservation price pmax
according to the determination rule. So,
t
in this paper, we limit ourself to around 6 − 10 RUs. However,
having 6-10 RUs can in fact cover a large community, e.g.,
through aggregation such as discussed in [38], [39]. Here,
each RU is assumed to be a group of [5, 25] households,
where each household is equipped with a battery of capacity
25 kilo-Watt hour (kWh) [49]. The reluctance parameter of
all RUs are assumed to be similar, which is taken from range
of [0, 0.1]. It is important to note that αi is considered as a
design parameter in the proposed scheme, which we used to
map the reluctance of each RU to share its ES with the SFCs.
Such reluctance of sharing can be affected by parameters like
ES capacity, the condition of the environment (if applicable)
and the RU’s own requirement. Now, considering the different
system parameters in our proposed scheme, we capture these
two extremes with 0 (not reluctant) and 0.1 (highly reluctant).
The required electricity storage for each SFC is assumed to be
within the range of [100, 500] kWh. Nevertheless, the required
ES for sharing could be different if the usage pattern by the
users changes. Since, the type of ESs (and their associated
cost) used by different RUs can vary significantly [50], the
choices of reservation price to share their ESs with the SFCs
can vary considerably as well. In this context, we consider
that the reservation price set by each RU and SFC is taken
from a range of [20, 70]. It is important to note that all chosen
parameter values are particular to this study only, and may vary
according the availability and number of RUs, requirements of
SFCs, trading policy, time of the day/year and the country.
Now, we first show the convergence of Algorithm 1 to the
SE of the SLMFG in Fig. 4. For this case study, we assume
that there are five SFCs in the smart grid community that are
taking part in an auction process with eight RUs. From Fig. 4,
first we note that the proposed SLMFG reaches the SE after 20
interations when the average cost savings per SFC reaches its
maximum. Hence, the convergence speed, which is just few
seconds, is reasonable. Nonetheless, an interesting property
can be observed when we examine the choice of ES by each
10
IEEE Trans. Smart Grid, Dec. 2015
1100
for the SFCs, it would put a higher burden on the RUs to
carry. As a consequence, the relative utility from auction is
lower. Nevertheless, if the requirement of the SFCs is higher,
the sharing brings significant benefits to the RUs as can be
seen from Fig. 5. On the other hand, for higher reluctance,
RUs tend to share a lower ES amount, which then enables
them to endure a lower burden in case of lower demands from
the SFCs. This consequently enhances their achieved utility.
Nonetheless, if the requirement is higher from the SFCs, their
utility reduces subsequently compared to the RUs with lower
reluctance parameters. Thus, from observing the effects of
different αi ’s on the average utility per RU in Fig. 5, we
understand that, if the total required ES is smaller, RUs with
higher reluctance benefit more and vice versa. This illustrates
the fact that even RUs with high unwillingness to share their
ESs can be beneficial for SFCs of the system if their required
ESs are small. However, for a higher requirement, SFCs would
benefit more from having RUs with lower reluctances as they
will be interested in sharing more to achieve higher average
utilities.
Now, we discuss the computational complexity of the proposed scheme, which is greatly reduced by the determination
rule of the modified auction scheme as this rule determines
the actual number of participating RUs and SFCs in the
auction. We also note that after determining the number of
participating SFCs and RUs, the auctioneer iteratively interacts
with each of the RUs and sets the auction price with a
view to increase the average savings for the SFC. Therefore,
the main computational complexity of the modified auction
scheme stems from the interactions between the auctioneer
and the participating RUs to decide on the auction price. In
this context, the computational complexity of the problem falls
within a category of that of a single leader multiple follower
Stackelberg game, whose computational complexity, which
can be approximated to increase linearly with the number of
followers [38], and is shown to be reasonable in numerous
studies such as in [11] and [38]. Hence, the computational
complexity is feasible for adopting the proposed scheme.
Having an insight into the properties of the proposed auction
scheme, we now demonstrate how the technique can benefit
the RUs of the smart network compared to existing ES
allocation schemes such as equal distribution (ED) [38] and
FIT schemes [48]. ED is essentially an allocation scheme
that allows the SFCs to meet their total storage requirements
by sharing the total requirement equally from each of the
participating RUs. We assume that if the shared ES amount
exceeds the total amount of reservation storage that an RU puts
into the market, the RU will share its full reservation amount.
In FIT, which is a popular scheme for energy trading between
consumers and the grid, we assume that each RU prefers to
sell the same storage amount of energy to the grid at an FIT
price rate, e.g., 22 cents/kWh [52] instead of sharing the same
fraction of storage with the SFC. To this end, the resulting
average utilities that each RU can achieve from sharing its ES
space with the SFCs by adopting the proposed, ED, and FIT
schemes are shown in Table II.
From Table II, first we note that as the amount of required
ES by the SFCs increases the average utility achieved per
α = 0.001 (more willing to share)
Average utility achieved by the RUs
1000
α = 0.01 (less willing to share)
900
800
700
600
500
400
300
η0.001 > 0
η
η0.01 > 0
η
Supply > Demand
200
100
150
200
0.001
0.01
η
>0
0.001
η
=0
0.01
=0
=0
Supply < Demand
250
300
350
400
450
500
Required battery space by the SFCs (kWh)
550
600
Fig. 5: Effect of change of required ES amount by the SFCs on the achieved
average utility per RU.
intermittency of renewables [51]. We have foreseen such a
near future when our proposed scheme will be applicable to
gain the benefit of storage sharing and thus motivate the RUs
to keep their αi ∀i small. According to the observation from
Table I, it can further be said that if the reluctance parameters
of RUs change over either different days or different time slots,
the performance of the system in terms of average utility per
RU and average cost savings per SFC will change accordingly
for the given system parameters.
Once all the participating RUs put their ES amount into
the auction market, they are distributed according to the
allocation rule described in (16) and (18). In this regard,
we investigate how the average utility of each RU is altered as the total storage amount required by the SFCs
changes from in the network. For this particular case, the
considered total ES requirement of the SFCs is assumed to
be 100, 150, 200, 250, 300, 350, 400, 450, 500, 550 and 600. In
general, as shown in Fig. 5, the average utility of each RU
initially increases with the increase required by the SFCs and
eventually becomes saturated to a stable value. This is due to
the fact that as the required amount of ES increases, the RU
can share more of its reserved ES that it put into the market
with the SFCs with the determined auction price from the
SLMFSG. Hence, its utility increases. However, each RU has
a particular fixed ES amount that it puts into the market to
share. Consequently, once the shared ES amount reaches its
maximum, even with the increase of requirement by the SFCs
the RU cannot share more, i.e., ηi = 0. Therefore, its utility
becomes stable without any further increment. Interestingly,
the proposed scheme, as can be seen in Fig. 5, favors the
RUs with higher reluctance more when the ES requirement
by the SFCs is relatively lower and favors the RUs with
lower reluctance during higher demands. This is due to the
way we have designed the proposed allocation scheme, which
is dictated by the burden in (18) and the allocation of ES
through (16). We note that, according to (11), if αi is lower,
the RU i will put a higher amount of ES in the market to
share. However, if the total required amount of ES is lower
11
IEEE Trans. Smart Grid, Dec. 2015
TABLE II: Comparison of the change of average utility per RU in the smart grid system as the required total amount of energy storage required by the SFCs
varies.
Required ES space by the SFCs
Average utility (net benefit) of RU for equal distribution (ED) scheme
Average utility (net benefit) of RU for FIT scheme
Average utility (net benefit) of RU for proposed scheme
Percentage improvement (%) compared to ED scheme
Percentage improvement (%) compared to FIT scheme
ES shared by each RU (kWh)
ES available to share (kWh)
RU also increases for all the cases. The reason for this
increment is explained in Fig. 5. Also, in all the studied
cases, the proposed scheme shows a considerable performance
improvement compared to the ED and FIT schemes. An
interesting trend of performance improvement can be observed
if we compare the performance of the proposed scheme with
the ED and FIT performances for each of the ES requirements.
In particular, the performance of the proposed scheme is higher
as the requirement of the ES increases from 200 to 350.
However, the improvement is relatively less significant as the
ES requirement switches from 400 to 450. This change in
performance can be explained as follows:
In the proposed scheme, as we have seen in Fig. 5, the
amount of ES shared by each participating RU is influenced
by their reluctance parameters. Hence, even the demand of
the SFCs could be larger, the RUs may choose not to share
more of their ES spaces once their reluctance is limited. In
this regard, the RUs in the current case study increase their
share of ES as the requirement by the SFCs increases, which
in turn produces higher revenue for the RUs. Furthermore,
once the RUs choice of ESs reach the saturation, the increase
in demand, i.e., from 200 to 350 in this case, does not affect
their share. As a consequence, their performance improvement
is not as noticeable as the previous four cases. Nonetheless, for
all the considered cases, the auction process performs superior
to the ED scheme with an average performance improvement
of 34.76%, which clearly shows the value of the proposed
methodology to adopt joint ES sharing in smart grid. The
performance improvement with respect to the FIT scheme,
which is 34.34% on average, is due to the difference between
the determined auction price and the price per unit of energy
for the FIT scheme.
Finally, we show how the decision making process of each
RU in the system is affected by its decision in the previous
time slot and the total storage requirement by the SFCs. The
total number of time slots that are considered to show this
performance analysis is four. In this context, we assume that
there are five RUs in the system with ES of 100, 200, 300, 200
and 200 kWh respectively to share with the SFCs. The total
ES requirements of the SFCs for considered four time slot
are 500, 250, 500, and 100. Please note that these numbers are
considered for this case study only and may have different
values for different scenarios. Now, in Fig. 6, we show the
available ES to each of the RUs at the begining of each time
slot and how much they are going to share if the modified
auction scheme is adopted in each time slot. For a simple
analysis, we assume that once an RU shares its total available
ES, it cannot share its ES for the remaining of the time slots.
200
536.52
537.83
629.82
17.4
17.1
250
581.85
583.16
789.82
35.74
35.43
300
624.52
626.83
944.26
51.19
50.63
350
669.85
673.16
960.09
43.32
42.61
400
715.19
717.50
960.09
34.24
33.81
450
757.85
759.16
960.09
26.68
26.46
300
RU1
RU2
RU3
RU4
RU5
200
100
0
1
2
3
Number of time slot
4
300
RU1
RU2
RU3
RU4
RU5
200
100
0
1
2
3
Number of time slot
4
Fig. 6: Demonstration of how the proposed modified auction scheme can be
extended to time varying system. The reservation ES amount varies by the
RUs varies between different time slots based on their sharing amount in the
previous time slot. The total required storage by the SFCs is chosen randomly
due to the reasons explained in Section IV-F.
The reservation prices are considered to change from one time
to the next based on a predefined time of use price scheme.
Now, as can be seen from Fig. 6, in time slot 1, RU1 and RU2
share all their available ESs with the SFC, whereby other RUs
do not share their ESs due to the reasons explained in Fig. 4.
Since, the total requirement is 500, therefore neither of RU1
and RU2 needs to carry any burden. In time slot 3, only RU3
shares its ESs of 300 to meet the requirement. As the SFC’s
requirement is lower than the supply, RU3 needs to carry a
burden of 50 kWh. Similarly, in time slot 3 and 4, all of RU3,
RU4 and RU5 take part in the energy auction scheme as they
have enough ES to share with the SFC. However, the ES to
share in time slot 4 stems from the burden of oversupply from
time slot 3. The scheme is not shown for more than time slot
4 as the available ES from all RUs is already shared by the
SFCs by the end of time slot 4. Thus, the proposed modified
auction scheme can successfully capture the time variation if
the scheme is modified as given in Section IV-F.
VI. C ONCLUSION
In this paper, we have modeled a modified auction based
joint energy storage ownership scheme between a number of
residential units (RUs) and shared facility controllers (SFCs)
in smart grid. We have designed a system and discussed the
determination, payment and allocation rule of the auction,
where the payment rule of this scheme is facilitated by a
Single-leader-multiple-follower Stackelberg game (SLMFSG)
12
IEEE Trans. Smart Grid, Dec. 2015
between the auctioneer and the RUs. The properties of the
auction scheme and the SLMFSG have been studied, and it has
been shown that the proposed auction possesses the individual
rationality and the incentive compatibility properties leveraged
by the unique Stackeberg equilibrium of the SLMFSG. We
have proposed an algorithm for the SLMFSG, which has been
shown to be guaranteed to reach the SE and that also facilitates
the auctioneer and the RUs to decide on the auction price as
well as the amount of ES to be put into the market for joint
ownership.
A compelling extension of the proposed scheme would be
to study of the feasibility of scheduling of loads such as
lifts and water machines in shared space. Another interesting
research direction would be to determine how a very large
number of SFCs or RUs with different reservation and bidding
prices can take part in such a modified auction scheme. One
potential way to look at this problem can be from a cooperative
game-theoretic point-of-view in which the SFCs and RUs may
cooperate to decide on the amount of reservation ES and
bidding price they would like to put into the market so as
to participate in the auction and benefit from sharing. Another
very important, yet interesting, extension of this work would
be to investigate how to quantify the reluctance of each RU to
participate in the ES sharing. Such quantification of reluctance
(or, convenience) will also enable the practical deployment of
many energy management schemes already described in the
literature.
[11] W. Tushar, B. Chai, C. Yuen, D. B. Smith, K. L. Wood, Z. Yang, and
H. V. Poor, “Three-party energy management with distributed energy
resources in smart grid,” IEEE Trans. Ind. Electron., vol. 62, no. 4, Apr.
2015.
[12] P. Klemperer, “Auction theory: A guide to the literature,” Journal of
Economic Surveys, vol. 13, no. 3, pp. 227–286, July 1999.
[13] J. Ma, J. Deng, L. Song, and Z. Han, “Incentive mechanism for demand
side management in smart grid using auction,” IEEE Trans. Smart Grid,
vol. 5, no. 3, pp. 1379–1388, May 2014.
[14] W. Vickrey, “Counterspeculation, auctions, and competitive sealed tenders,” The Journal of Finance, vol. 16, no. 1, pp. 8–37, Mar 1961.
[15] B. Chai, J. Chen, Z. Yang, and Y. Zhang, “Demand response management with multiple utility companies: A two-level game approach,” IEEE
Trans. Smart Grid, vol. 5, no. 2, pp. 722–731, March 2014.
[16] S.Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, and T. Başar, “Dependable
demand response management in the smart grid: A Stackelberg game
approach,” IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 120–132, March
2013.
[17] P. Siano, “Demand response and smart grids-A survey,” Elsevier Renewable and Sustainable Energy Reviews, vol. 30, pp. 461–478, Feb
2014.
[18] P. Denholm, E. Ela, B. Kirby, and M. Milligan, “The role of energy
storage with renewable electricity generation,” National Renewable
Energy Laboratory (NREL), Colorado, USA, Technical Report, Jan
2010.
[19] Y. Cao, T. Jiang, and Q. Zhang, “Reducing electricity cost of smart
appliances via energy buffering framework in smart grid,” IEEE Trans.
Parallel Distrib. Syst., vol. 23, no. 9, pp. 1572–1582, Sep 2012.
[20] M. Sechilariu, B. Wang, and F. Locment, “Building integrated photovoltaic system with energy storage and smart grid communication,” IEEE
Trans. Ind. Electron., vol. 60, no. 4, pp. 1607–1618, April 2013.
[21] G. Carpinelli, G. Celli, S. Mocci, F. Mottola, F. Pilo, and D. Proto,
“Optimal integration of distributed energy storage devices in smart
grids,” IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 985–995, June 2013.
[22] B.-G. Kim, S. Ren, M. van der Schaar, and J.-W. Lee, “Bidirectional
energy trading and residential load scheduling with electric vehicles in
the smart grid,” IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1219–
1234, July 2013.
[23] J. V. Roy, N. Leemput, F. Geth, R. Salenbien, J. Buscher, and J. Driesen,
“Apartment building electricity system impact of operational electric
vehicle charging strategies,” IEEE Trans. Sustain. Energy, vol. 5, no. 1,
pp. 264–272, Jan 2014.
[24] R. Yu, J. Ding, W. Zhong, Y. Liu, and S. Xie, “PHEV charging and
discharging cooperation in v2g networks: A coalition game approach,”
IEEE Internet Things J., vol. 1, no. 6, pp. 578–589, Dec 2014.
[25] J. Lin, K.-C. Leung, and V. Li, “Optimal scheduling with vehicle-to-grid
regulation service,” IEEE Internet Things J., vol. 1, no. 6, pp. 556–569,
Dec 2014.
[26] J. Tan and L. Wang, “Integration of plug-in hybrid electric vehicles into
residential distribution grid based on two-layer intelligent optimization,”
IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 1774–1784, July 2014.
[27] L. Igualada, C. Corchero, M. Cruz-Zambrano, and F.-J. Heredia, “Optimal energy management for a residential microgrid including a vehicleto-grid system,” IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 2163–2172,
July 2014.
[28] F. Geth, J. Tant, E. Haesen, J. Driesen, and R. Belmans, “Integration of
energy storage in distribution grids,” in IEEE Power and Energy Society
General Meeting, Minneapolis, MN, July 2010, pp. 1–6.
[29] S. Nykamp, M. Bosman, A. Molderink, J. Hurink, and G. Smit,
“Value of storage in distribution grids – Competition or cooperation of
stakeholders?” IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1361–1370,
Sep 2013.
[30] W. Tushar, C. Yuen, D. B. Smith, and H. V. Poor, “Price discrimination
for energy trading in smart grid: A game theoretic approach,” IEEE
Trans. Smart Grid, Dec. 2015, (to appear).
[31] W.-T. Li, C. Yuen, N. U. Hassan, W. Tushar, C.-K. Wen, K. L. Wood,
K. Hu, and X. Liu, “Demand response management for residential smart
grid: From theory to practice,” IEEE Access-Special Section on Smart
Grids: A Hub of Interdisciplinary Research, vol. 3, Nov. 2015.
[32] A. Naeem, A. Shabbir, N. U. Hassan, C. Yuen, A. Ahmed, and
W. Tushar, “Understanding customer behavior in multi-tier demand
response management program,” IEEE Access-Special Section on Smart
Grids: A Hub of Interdisciplinary Research, vol. 3, Nov. 2015.
[33] Y. Liu, C. Yuen, R. Yu, Y. Zhang, and S. Xie, “Queuing-based energy
consumption management for heterogeneous residential demands in
smart grid,” IEEE Trans. Smart Grid, vol. pre-print, June 2015, (doi:
10.1109/TSG.2015.2432571).
R EFERENCES
[1] M. L. D. Silvestre, G. Graditi, and E. R. Sanseverino, “A generalized
framework for optimal sizing of distributed energy resources in microgrids using an indicator-based swarm approach,” IEEE Trans. Ind.
Inform., vol. 10, no. 1, pp. 152–162, Feb 2014.
[2] P. Garcı́a, C. A. Garcı́a, L. M. Fernández, F. Llorens, and F. Jurado,
“ANFIS-based control of a grid-connected hybrid system integrating
renewable energies, hydrogen and batteries,” IEEE Trans. Ind. Inform.,
vol. 10, no. 2, pp. 1107–1117, May 2014.
[3] X. Fang, S. Misra, G. Xue, and D. Yang, “Smart grid - The new and
improved power grid: A survey,” IEEE Commun. Surveys Tuts., vol. 14,
no. 4, pp. 944–980, Oct 2012.
[4] Y. Liu, C. Yuen, S. Huang, N. U. Hassan, X. Wang, and S. Xie, “Peakto-average ratio constrained demand-side management with consumer’s
preference in residential smart grid,” IEEE J. Sel. Topics Signal Process.,
vol. PP, no. 99, pp. 1–14, Jun 2014.
[5] Y. Liu, C. Yuen, N. U. Hassan, S. Huang, R. Yu, and S. Xie, “Electricity
cost minimization for a microgrid with distributed energy resources
under different information availability,” IEEE Trans. Ind. Electron.,
vol. 62, no. 4, pp. 2571–2583, Apr. 2015.
[6] N. U. Hassan, Y. I. Khalid, C. Yuen, and W. Tushar, “Customer
engagement plans for peak load reduction in residential smart grids,”
IEEE Trans. Smart Grid, vol. 6, no. 6, pp. 3029–3041, Nov. 2015.
[7] N. U. Hassan, Y. I. Khalid, C. Yuen, S. Huang, M. A. Pasha, K. L.
Wood, and S. G. Kerk, “Framework for minimum user participation
rate determination to achieve specific demand response management
objectives in residential smart grids,” Elsevier International Journal of
Electrical Power & Energy Systems, vol. 74, pp. 91–103, Jan. 2016.
[8] W. Tushar, C. Yuen, S. Huang, D. B. Smith, and H. V. Poor, “Cost
minimization of charging stations with photovoltaics: An approach with
EV classification,” IEEE Trans. Intell. Transp. Syst., vol. pre-print, Aug.
2015, (doi: 10.1109/TITS.2015.2462824).
[9] S. Huang, W. Tushar, C. Yuen, and K. Otto, “Quantifying economic
benefits in the ancillary electricity market for smart appliances in Singapore households,” Elsevier Sustainable Energy, Grids and Networks,
vol. 1, pp. 53–62, Mar. 2015.
[10] Z. Wang, C. Gu, F. Li, P. Bale, and H. Sun, “Active demand response
using shared energy storage for household energy management,” IEEE
Trans. Smart Grid, vol. 4, no. 4, pp. 1888–1897, Dec 2013.
13
IEEE Trans. Smart Grid, Dec. 2015
[34] X. Wang, C. Yuen, X. Chen, N. U. Hassan, and Y. Ouyang, “Cost-aware
demand scheduling for delay tolerant applications,” Elsevier Journal of
Networks and Computer Applications, vol. 53, pp. 173–182, July 2015.
[35] Y. Zhang, S. He, and J. Chen, “Data gathering optimization by dynamic
sensing and routing in rechargeable sensor network,” IEEE/ACM Trans.
Netw., vol. pre-print, June 2015, (doi: 10.1109/TNET.2015.2425146).
[36] H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal DoS attack scheduling
in wireless networked control system,” IEEE Trans. Control Syst.
Technol., vol. pre-print, Aug. 2015, (doi: 10.1109/TCST.2015.2462741).
[37] Z. Wang and S. Wang, “Grid power peak shaving and valley filling
using vehicle-to-grid systems,” IEEE Trans. Power Del., vol. 28, no. 3,
pp. 1822–1829, July 2013.
[38] W. Tushar, W. Saad, H. V. Poor, and D. B. Smith, “Economics of electric
vehicle charging: A game theoretic approach,” IEEE Trans. Smart Grid,
vol. 3, no. 4, pp. 1767–1778, Dec 2012.
[39] L. Gkatzikis, I. Koutsopoulos, and T. Salonidis, “The role of aggregators
in smart grid demand response markets,” IEEE J. Sel. Areas Commun.,
vol. 31, no. 7, pp. 1247–1257, July 2013.
[40] W. Tushar, J. A. Zhang, D. Smith, H. V. Poor, and S. Thiébaux,
“Prioritizing consumers in smart grid: A game theoretic approach,” IEEE
Trans. Smart Grid, vol. 5, no. 3, pp. 1429–1438, May 2014.
[41] W. Saad, Z. Han, H. V. Poor, and T. Başar, “A noncooperative game for
double auction-based energy trading between PHEVs and distribution
grids,” in Proc. IEEE Int’l Conf. Smart Grid Commun. (SmartGridComm), Brussels, Belgium, Oct. 2011, pp. 267–272.
[42] T. H. Bradley and A. A. Frank, “Design, demonstrations and sustainability impact assessments for plug-in hybrid electric vehicles,” Renewable
and Sustainable Energy Reviews, vol. 13, no. 1, pp. 115–128, Jan 2009.
[43] O. Derin and A. Ferrante, “Scheduling energy consumption with local
renewable micro-generation and dynamic electricity prices,” in Proc. 1st
Workshop Green Smart Embedded Syst. Technol.: Infrastruct., Methods,
Tools, Stockholm, Sweden, Apr 2010, pp. 1–6.
[44] P. Huang, A. Scheller-Wolf, and K. Sycara, “Design of a multi-unit
double auction e-market,” Computational Intelligence, vol. 18, no. 4,
pp. 596–617, Feb 2002.
[45] V. Oduguwa and R. Roy, “Bi-level optimisation using genetic algorithm,”
in Proc. IEEE International Conference on Artificial Intelligence Systems, Geelong, Australia, Feb 2002, pp. 322–327.
[46] P. Samadi, A.-H. Mohsenian-Rad, R. Schober, V. Wong, and J. Jatskevich, “Optimal real-time pricing algorithm based on utility maximization
for smart grid,” in Proc. IEEE Int’l Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, Oct. 2010, pp. 415–420.
[47] X. Guojun, L. Yongsheng, H. Xiaoqin, X. Xicong, W. Qianggang,
and Z. Niancheng, “Study on the proportional allocation of electric
vehicles with conventional and fast charge methods when in distribution network,” in Proc. China International Conference on Electricity
Distribution (CICED), Shanghai, China, Sept 2012, pp. 1–5.
[48] G. Krajačić, N. Duića, A. Tsikalakis, M. Zoulias, G. Caralis, E. Panteri,
and M. da Graça Carvalho, “Feed-in tariffs for promotion of energy
storage technologies,” Energy Policy, vol. 39, no. 3, pp. 1410–1425,
Mar 2011.
[49] Fraunhofer-Gesellschaft, “Breakthrough in electricity storage: New
large and powerful redox flow battery,” Science Daily,
March 2013, retrieved August 31, 2014. [Online]. Available:
www.sciencedaily.com/releases/2013/03/130318105003.htm
[50] H. Ali and S. Ali-Oettinger, “Advancing li-ion,” May
2012,
published
in
pv
magazine.
[Online].
Available:
http://www.pv-magazine.com/archive/articles/beitrag/advancing-li-ion-100006681/501/axzz3Vkp0jXnS
[51] N. Garun, “At 38,000 reservations, Tesla’s powerwall is already sold
out until mid-2016,” 2015, accessed May 7, 2015. [Online]. Available:
http://thenextweb.com/gadgets/2015/05/07/powerwall-is-sold-out/
[52] LIPA, “Proposal concerning modifications to lipa’s tariff for electric
service,” 2010, accessed on April 3, 2015. [Online]. Available:
http://www.lipower.org/pdfs/company/tariff/proposal feedin.pdf
14
| 3cs.SY
|
arXiv:1705.03452v4 [math.AG] 19 Jan 2018
DIRECT SUM DECOMPOSABILITY OF POLYNOMIALS AND
FACTORIZATION OF ASSOCIATED FORMS
MAKSYM FEDORCHUK
Abstract. For a homogeneous polynomial with a non-zero discriminant, we
interpret direct sum decomposability of the polynomial in terms of factorization properties of the Macaulay inverse system of its Milnor algebra. This
leads to an if-and-only-if criterion for direct sum decomposability of such a
polynomial, and to an algorithm for computing direct sum decompositions
over any field, either of characteristic 0 or of sufficiently large positive characteristic, for which polynomial factorization algorithms exist. We also give
simple necessary criteria for direct sum decomposability of arbitrary homogeneous polynomials over arbitrary fields and apply them to prove that many
interesting classes of homogeneous polynomials are not direct sums.
1. Introduction
A homogeneous polynomial f is called a direct sum if, after a linear change
of variables, it can be written as a sum of two or more polynomials in disjoint
sets of variables:
(1.1)
f = f1 (x1 , . . . , xa ) + f2 (xa+1 , . . . , xn ).
When f is a homogeneous polynomial over C defining an isolated hypersurface
singularity in Cn , the geometric significance of such decomposition stems from
the classical Sebastiani-Thom theorem [10] that describes the monodromy operator of the singularity {f = 0} ⊂ Cn as a tensor product of the monodromy
operators of the singularities {f1 = 0} ⊂ Ca and {f2 = 0} ⊂ Cn−a . Direct sums
are also the subject of a well-known symmetric Strassen’s additivity conjecture
postulating that the Waring rank of f in (1.1) is the sum of the Waring ranks
of f1 and f2 (see, for example, [13]).
In this paper, we give a new criterion for recognizing when a smooth form1
is a direct sum over a field either of characteristic 0 or of sufficiently large
positive characteristic. The problem of finding such a criterion for an arbitrary
(smooth or singular) form has been successfully addressed earlier by Kleppe
[9] over an arbitrary field, and Buczyńska-Buczyński-Kleppe-Teitler [3] over
an algebraically closed field. Both works interpret direct sum decomposability
1Hereinafter,
we refer to any homogeneous polynomial as a form, and we call a form f in n
variables smooth if it defines a smooth hypersurface in Pn−1 ; see §1.1 for further terminology
and notational conventions.
1
2
MAKSYM FEDORCHUK
of a form f in terms of its apolar ideal f ⊥ (see §1.5 for more details). In
particular, over an algebraically closed field, [3] gives an effective criterion for
recognizing when f is a direct sum in terms of the graded Betti numbers of f ⊥ .
However, none of these works seem to give an effective method for computing
a direct sum decomposition when it exists, and the criterion of [3] cannot be
used over non-closed fields (see Example 4.4). Although our criterion works
only for smooth forms, it does so over an arbitrary field either of characteristic
0 or of sufficiently large characteristic, and it leads to an algorithm for finding
direct sum decompositions over any such field for which polynomial factorization
algorithms exist. This algorithm is given in Section 4.
Recall that to a smooth form f of degree d + 1 in n variables, one can assign
a degree n(d − 1) form A(f ) in n (dual) variables, called the associated form of
f ([1, 2, 4]). The associated form A(f ) is defined as a Macaulay inverse system
of the Milnor algebra of f [1], which simply means that the apolar ideal of A(f )
coincides with the Jacobian ideal of f :
A(f )⊥ = (∂f /∂x1 , . . . , ∂f /∂xn ).
Such definition leads to an observation that for a smooth form f that is written
as a sum of two forms in disjoint sets of variables, the associated form A(f )
decomposes as a product of two forms in disjoint sets of (dual) variables ([7,
Lemma 2.11]). For example, up to a scalar,
d−1
A(xd+1
+ · · · + xd+1
· · · znd−1 .
1
n ) = z1
The main purpose of this paper is to prove the converse statement, and thus
establish an if-and-only-if criterion for direct sum decomposability of a smooth
form f in terms of the factorization properties of its associated form A(f ) (see
Theorem 1.6).
In Lemma 2.1, we give a simple necessary condition, valid over an arbitrary
field, for direct sum decomposability of an arbitrary form in terms of its gradient
point. It is then applied in Section 3 to prove that a wide class of homogeneous
forms contains no direct sums. In Theorem 1.8, we show that this simple necessary condition is in fact sufficient when a form is GIT stable over an algebraically
closed field.
1.1. Notation and conventions. Let k be a field. The k-linear span of a
subset W of a k-vector space will be denoted by hW i. If W is a representation
of the multiplicative group Gm , then, for every i ∈ Z, we denote by W(i) the
weight-space of the action of weight i.
Let V be a vector space over k with n := dimk V ≥ 2. We set S := Sym V ,
and D := Sym V ∨ . Homogeneous elements of S and D will be called forms.
We have a differentiation action of S on D (also known as the apolar pairing).
DECOMPOSABILITY OF POLYNOMIALS AND ASSOCIATED FORMS
3
Namely, if x1 , . . . , xn is a basis of V , and z1 , . . . , zn is the dual basis of V ∨ , then
the pairing
Sd′ × Dd → Dd−d′
is given by
g ◦ F = g(∂/∂z1 , . . . , ∂/∂zn )F (z1 , . . . , zn ).
Given a homogeneous nonzero F ∈ Dd , the apolar ideal of F is
F ⊥ := {g ∈ S | g ◦ F = 0} ⊂ S,
and the space of essential variables of F is
E(F ) := {g ◦ F | g ∈ Sd−1 } ⊂ D1 .
If char(k) = 0 or char(k) > d, then the pairing Sd ×Dd → k is perfect, and for
every F ∈ Dd , we have F ∈ Symd E(F ) ⊂ Dd (cf. [3, §2.2]). Furthermore, the
graded k-algebra S/F ⊥ is a Gorenstein Artin local ring with socle in degree d,
and a well-known theorem of Macaulay establishes a bijection between graded
Gorenstein Artin quotients S/I of socle degree d and elements of P(Dd ) (see,
e.g., [8, Lemma 2.12] or [5, Exercise 21.7]).
Let x1 , . . . , xn be a basis of V . The gradient point of f ∈ Sd+1 is defined to
be:
∇f := h∂f /∂x1 , . . . , ∂f /∂xn i ⊂ Sd .
The Jacobian ideal of f is Jf := (∇f ) = (∂f /∂x1 , . . . , ∂f /∂xn ) ⊂ S, and the
Milnor algebra of f is Mf := S/Jf .
Remark 1.2. Even though we allow k to have positive characteristic, we do
not take D to be the divided power algebra (cf. [8, Appendix A]), as the reader
might have anticipated. The reason for this is that at several places we cannot
avoid but to impose a condition that char(k) is large enough (or zero). In this
case, the divided power algebra is isomorphic to D up to the needed degree.
For a homogeneous ideal I ⊂ S, we denote by V(I) the closed subscheme
of PV ∨ ≃ Pn−1 defined by I. We say that a form f ∈ Sd+1 is smooth if the
hypersurface V(f ) ⊂ Pn−1 is smooth over k (this is, of course, equivalent to
V(f ) being non-singular over the algebraic closure of k). The locus of smooth
forms in PSd+1 will be denoted by (PSd+1 )∆ .
1.2. Direct sums and products. Recall from [3] that f ∈ Symd+1 V is called
a direct sum (or a form of Sebastiani-Thom type) if there is a direct sum decomposition V = U ⊕ W and nonzero f1 ∈ Symd+1 U and f2 ∈ Symd+1 W such
that f = f1 + f2 . In other words, f is a direct sum if and only if for some choice
of a basis x1 , . . . , xn of V , we have that
f = f1 (x1 , . . . , xa ) + f2 (xa+1 , . . . , xn ),
4
MAKSYM FEDORCHUK
where 1 ≤ a ≤ n − 1, and f1 , f2 6= 0. Recall also that f ∈ Symd+1 V is called
degenerate if there exists U ( V such that f ∈ Symd+1 U.
By analogy with direct sums, we will call a nonzero form F ∈ D a direct
product if there is a non-trivial direct sum decomposition V ∨ = U ⊕ W and
F = F1 F2 for some F1 ∈ Sym U and F2 ∈ Sym W . In other words, a nonzero
homogeneous F ∈ Sym D is a direct product if and only if for some choice of a
basis z1 , . . . , zn of V ∨ , we have that
(1.3)
F (z1 , . . . , zn ) = F1 (z1 , . . . , za )F2 (za+1 , . . . , zn ),
where 1 ≤ a ≤ n − 1.
Furthermore, we call a direct product decomposition in (1.3) balanced if
(n − a) deg(F1 ) = a deg(F2 ).
Note that a non-trivial factorization F = F1 F2 is a direct product decomposition
if and only if E(F1 ) ∩ E(F2 ) = (0).
Remark 1.4. Note that the roles of S and D are interchangeable in §1.1, and
so for f ∈ S, we can define the apolar ideal f ⊥ ⊂ D and the space of essential
variables E(f ) ⊂ S1 . With this notation, if char(k) = 0 or char(k) > d + 1, then
f ∈ Sd+1 is a direct sum if and only if we can write f = f1 + f2 , where f1 , f2 6= 0
and E(f1 ) ∩ E(f2 ) = (0). Furthermore, if char(k) = 0 or char(k) > d + 1, we
have that E(f ) ⊂ V is dual to (f ⊥ )1 ⊂ V ∨ , and dimk ∇f = dimk E(f ).
We say that [L] ∈ Grass(n, Symd V ) is a balanced direct sum if there is
a non-trivial direct sum decomposition V = U ⊕ W and elements [L1 ] ∈
Grass(dimk U, Symd U) and [L2 ] ∈ Grass(dimk W, Symd W ) such that
L = L1 + L2 ⊂ Symd U ⊕ Symd W ⊂ Symd V.
1.3. Associated forms. We briefly recall the theory of associated forms as
developed in [2]. Let Grass(n, Sd )Res be the affine open subset in Grass(n, Sd )
parameterizing linear spaces hg1 , . . . , gn i ⊂ Sd such that g1 , . . . , gn form a regular
sequence in S. Note that, if char(k) = 0 or char(k) > d + 1, then f ∈ Sd+1 is
smooth if and only if ∇f ∈ Grass(n, Sd )Res .
For every U = hg1 , . . . , gn i ∈ Grass(n, Sd )Res , the ideal IU = (g1 , . . . , gn ) is
a complete intersection ideal, and the k-algebra S/IU is a graded Gorenstein
Artin local ring with socle in degree n(d − 1). Suppose char(k) = 0 or char(k) >
n(d −1). Then, by Macaulay’s theorem, there exists a unique up to scaling form
A(U) ∈ Dn(d−1) such that
A(U)⊥ = IU .
The form A(U) is called the associated form of g1 , . . . , gn by Alper and Isaev,
who systematically studied it in [2, Section 2]. In particular, they showed2 that
2
Although given over C, their proof applies whenever char(k) = 0 or char(k) > n(d − 1).
DECOMPOSABILITY OF POLYNOMIALS AND ASSOCIATED FORMS
5
the assignment U → A(U) gives rise to an SL(n)-equivariant associated form
morphism
A : Grass(n, Sd )Res → PDn(d−1) .
When U = ∇f for a smooth form f ∈ Sd+1 , we set
A(f ) := A(∇f )
and, following Eastwood and Isaev [4], call A(f ) the associated form of f . The
defining property of A(f ) is that
A(f )⊥ = Jf .
This means that A(f ) is a Macaulay inverse system of the Milnor algebra Mf .
Summarizing, when char(k) = 0 or char(k) > max{n(d − 1), d + 1}, we have
the following commutative diagram of SL(n)-equivariant morphisms:
PSd+1
∇
∆▼
▼▼▼
▼▼A▼
▼▼▼
&
P Dn(d−1)
/
Grass n, Sd
♥♥♥
♥♥♥
♥
♥
♥♥♥ A
♥w
Res
Remark 1.5. In [2], Alper and Isaev define the associated form A(g1 , . . . , gn ) as
an element of Dn(d−1) , which they achieve by choosing a canonical generator of
the socle of S/(g1 , . . . , gn ) given by the Jacobian determinant of g1 , . . . , gn . For
our purposes, it will suffice to consider A(hg1 , . . . , gn i) defined up to a scalar.
1.4. Main results.
Theorem 1.6. Let d ≥ 2. Suppose that either char(k) = 0 or char(k) >
max{n(d − 1), d + 1}. Let f ∈ Sd+1 be a smooth form. Then the following are
equivalent:
(1)
(2)
(3)
(4)
(5)
(6)
f is a direct sum.
∇f is a balanced direct sum.
A(f ) is a balanced direct product.
A(f ) is a direct product.
∇f admits a non-trivial Gm -action defined over k.
A(f ) admits a non-trivial Gm -action defined over k.
Moreover, if z1 , . . . , zn is a basis of V ∨ in which A(f ) factors as A(f ) =
G1 (z1 , . . . , za )G2 (za+1 , . . . , zn ), then f decomposes as
f = f1 (x1 , . . . , xa ) + f2 (xa+1 , . . . , xn )
in the dual basis x1 , . . . , xn of V .
6
MAKSYM FEDORCHUK
Recall from [3, §3.1] that for a non-degenerate form f ∈ Sd+1 , a decomposition
f = f1 + · · · + fr ,
is called a maximally fine direct sum decomposition if V = E(f1 ) ⊕ · · · ⊕ E(fr ),
and fi is not a direct sum in Symd+1 E(fi ), for all i = 1, . . . , r. For nondegenerate forms of degree d + 1 ≥ 3, Kleppe has established that a maximally
fine direct sum decomposition is unique [9, Theorem 3.7]. We use Theorem 1.6
to give an alternate proof of this result for smooth forms, deducing it from the
fact that a polynomial ring over a field is a UFD:
Proposition 1.7. Let d ≥ 2. Suppose that either char(k) = 0 or char(k) >
n(d − 1). Let f ∈ Sd+1 be a smooth form. Then f has a unique maximally fine
direct sum decomposition.
Theorem 1.8. Let d ≥ 2. Suppose k is an algebraically closed field with
char(k) = 0. Then the following are equivalent for a GIT stable f ∈ Sd+1 :
(1) f is a direct sum.
s
(2) The morphism ∇ : PSd+1 → Grass n, Sd has a positive fiber dimension at hf i.
(3) ∇f has a Gm -action.
(4) ∇f is strictly semistable.
(5) dimk SL(V ) · ∇f ≤ n2 − 2.
Consequently, the locus of direct sums is closed in the stable locus.
1.5. Prior works. In [3], Buczyńska, Buczyński, Kleppe, and Teitler prove
that for a non-degenerate form f ∈ Sd+1 over an algebraically closed field, the
apolar ideal f ⊥ has a minimal generator in degree d + 1 if and only if either f
is a direct sum, or f is a limit of direct sums in which case the GL(n)-orbit of
f contains an element of the form
(1.9)
ℓ
X
i=1
xi
∂h(xℓ+1 , . . . , x2ℓ )
+ g(xℓ+1 , . . . , xn ),
∂xℓ+i
where h and g are degree d+1 forms, in ℓ and n−ℓ variables, respectively. Since
the form given by Equation (1.9) is visibly SL(n)-unstable, and in particular
singular, this translates into a computable and effective criterion for recognizing
whether a smooth form f is a direct sum over an algebraically closed field.
In [9], Kleppe uses the quadratic part of the apolar ideal f ⊥ to define an
associative algebra M(f ) of finite dimension over the base field (M(f ) is different
from the Milnor algebra Mf ). He then proves that, over an arbitrary field,
direct sum decompositions of f are in bijection with complete sets of orthogonal
idempotents of M(f ).
DECOMPOSABILITY OF POLYNOMIALS AND ASSOCIATED FORMS
7
A key step in the proof of the direct sum criterion in [3] is the Jordan normal
form decomposition of a certain linear operator, which in general requires solving a characteristic equation. Similarly, finding a complete set of orthogonal
idempotents requires solving a system of quadratic equations. This makes it
challenging to turn [3] or [9] into an algorithm for finding direct sum decompositions when they exist.
The case of a linear factor in Theorem 3.1 was proved in [3, Proposition 2.12]
using a criterion of Smith and Stong [12] for indecomposability of Gorenstein
Artin algebras into connected sums. Our proof of the linear factor case and the
statement for higher degree factors appear to be new. Corollaries 3.6 and 3.7 are
generalizations of [3, Corollary 1.2], whose proof relies on a theorem of Shafiei
[11] saying that the apolar ideals of the generic determinant and permanent are
generated in degree 2; our approach is independent of Shafiei’s results.
2. Proofs of decomposability criteria
Some implications in the statements of Theorems 1.6 and 1.8 are easy observations, the main of which is separated in Lemma 2.1 below. Others are found
in recent papers [6, 7]. The remaining key ingredient that completes the main
circle of implications is separated into Proposition 2.2 below.
Lemma 2.1 (No restrictions on k). Suppose f ∈ Sd+1 is a direct sum such that
∇f 6= (0). Then the following hold:
(1) There is a non-trivial one-parameter subgroup ρ of SL(V ) that fixes ∇f
and such that we have the following ρ-weight-space decompositions
V = V(n−a) ⊕ V(−a) and ∇f = ∇f((n−a)d) ⊕ ∇f(−ad) .
(2) If dimk ∇f = n, then ∇f ∈ Grass(n, Sd ) is a balanced direct sum.
(3) If dimk ∇f = n, then there is a family {gt | t ∈ k ∗ } of pairwise nonproportional forms in Sd+1 such that ∇gt = ∇f for all t ∈ k ∗ , and
∇(gt − cf ) 6= (0) for all t 6= 1 ∈ k ∗ and c ∈ k.
Proof. This is obvious. Namely, suppose f = f1 (x1 , . . . , xa )+f2 (xa+1 , . . . , xn ) in
some basis x1 , . . . , xn of V , where f1 , f2 6= 0. Then the one-parameter subgroup
acting with weight (n−a) on {xi }ai=1 and weight −a on {xi }ni=a+1 clearly satisfies
(1).
Suppose further that dimk ∇f = n. From
∇f = ∇f1 ⊕ ∇f2 = ∇(f1 + tf2 ), for all t 6= 0 ∈ k,
we see that dimk (∇f1 ) = a and dimk (∇f2 ) = n − a. Thus ∇f = ∇f1 ⊕ ∇f2 is a
balanced direct sum. This proves (2). Taking gt = f1 + tf2 for t 6= 0 proves (3).
8
MAKSYM FEDORCHUK
Proof of Theorem 1.6. The implications (1) =⇒ (2) =⇒ (5) are in Lemma 2.1.
Next we prove (2) =⇒ (1). Suppose ∇f decomposes as a balanced direct sum
in a basis x1 , . . . , xn of V . Then
∇f = hs1 , . . . , sa , t1 , . . . , tn−a i,
for some s1 , . . . , sa ∈ k[x1 , . . . , xa ]d and t1 , . . . , tn−a ∈ k[xa+1 , . . . , xn ]d .
It follows that for every 1 ≤ i ≤ a and a + 1 ≤ j ≤ n, we have
∂2f
∈ k[x1 , . . . , xa ]d−1 ∩ k[xa+1 , . . . , xn ]d−1 = (0).
∂xi ∂xj
Using the assumption on char(k), we conclude that
f ∈ k[x1 , . . . , xa ]d+1 ⊕ k[xa+1 , . . . , xn ]d+1 ,
and so is a direct sum, in the same basis as ∇f .
The equivalence (2) ⇐⇒ (3) is proved in Proposition 2.2 below. This concludes the proof of equivalence for the first three conditions.
Next we prove (4) =⇒ (3). Suppose A(f ) = G1 (z1 , . . . , za )G2 (za+1 , . . . , zn )
is a direct product decomposition in a basis z1 , . . . , zn of V ∨ . Let x1 , . . . , xn
be the dual basis of V . Suppose xd11 · · · xdnn is the smallest with respect to the
graded reverse lexicographic order monomial of degree n(d − 1) that does not lie
in (Jf )n(d−1) . Since z1d1 · · · zndn must appear with a nonzero coefficient in A(f ),
we have that d1 + · · · + da = deg G1 . On the other hand, by [7, Lemma 4.1],
we have that d1 + · · · + da ≤ a(d − 1). It follows that deg G1 ≤ a(d − 1). By
symmetry, we also have that deg G2 ≤ (n − a)(d − 1). We conclude that both
inequalities must be equalities and so A(f ) = G1 G2 is a balanced direct product
decomposition. Alternatively, we can consider a diagonal action of Gm ⊂ SL(V )
on V that acts on V ∨ as follows:
t · (z1 , . . . , zn ) = t(n−a) z1 , . . . , t(n−a) za , t−a za+1 , . . . , t−a zn .
Then A(f ) is homogeneous with respect to this action, and has weight (n −
a) deg G1 − a deg G2 . However, the relevant parts of the proof of [6, Theorem
1.2] go through to show that A(f ) satisfies the Hilbert-Mumford numerical
criterion for semistability. This forces (n − a) deg G1 − a deg G2 = 0.
We now turn to the last two conditions. First, the morphism A is an SL(n)equivariant locally closed immersion by [2, §2.5], and so is stabilizer preserving.
This proves the equivalence (5) ⇐⇒ (6). The implication (5) =⇒ (1) follows
from the proof of [6, Theorem 1.0.1] that shows that for a smooth f , the gradient
point ∇f has a non-trivial Gm -action if and only if f is a direct sum. We
note that even though stated over C, the relevant parts of the proof of [6,
Theorem 1.0.1] use only [6, Lemma 3.5], which remains valid over a field k with
char(k) = 0 or char(k) > d + 1, and the fact that a smooth form over any field
must satisfy the Hilbert-Mumford numerical criterion for stability.
DECOMPOSABILITY OF POLYNOMIALS AND ASSOCIATED FORMS
9
Proof of Theorem 1.8. By [6, Theorem 1.0.1], for every GIT stable f , the gradient point ∇f is polystable. Furthermore, it admits a Gm -action if and only
if f is a direct sum. Moreover, [6, Proposition 2.1] shows that the morphism of
the GIT quotients
∇// SL(n) : (PSd+1 )s // SL(n) → Grass(n, Sd )ss // SL(n)
is injective. This proves that for every stable f , the fiber dimension of ∇ at hf i
equals to the dimension of the stabilizer of ∇f . This concludes the proof of all
equivalences. The fact that the locus of direct sums is closed in (PSd+1 )s now
follows from the upper semicontinuity (on the domain) of fiber dimensions.
Proposition 2.2. Let d ≥ 2. Suppose k is a field with char(k) = 0 or char(k) >
n(d − 1). Then an element U ∈ Grass(n, Symd V )Res is a balanced direct sum if
and only if A(U) is a balanced direct product. Moreover, if z1 , . . . , zn is a basis
of V ∨ in which A(U) factors as a balanced direct product, then U decomposes
as a balanced direct sum in the dual basis x1 , . . . , xn of V .
Proof. The forward implication is an easy observation. Consider a balanced
direct sum U = hg1, . . . , gn i ∈ Grass(n, k[x1 , . . . , xn ]d )Res , where g1 , . . . , ga ∈
k[x1 , . . . , xa ]d and ga+1 , . . . , gn ∈ k[xa+1 , . . . , xn ]d . Then, up to a nonzero scalar,
A(U) = A(g1, . . . , ga )A(ga+1 , . . . , gn ), where A(g1 , . . . , ga ) ∈ k[z1 , . . . , za ]a(d−1)
and A(ga+1 , . . . , gn ) ∈ k[za+1 , . . . , zn ](n−a)(d−1) ; see [7, Lemma 2.11], which also
follows from the fact that on the level of algebras, we have
k[x1 , . . . , xa ]
k[xa+1 , . . . , xn ]
k[x1 , . . . , xn ]
≃
⊗k
.
(g1 , . . . , gn )
(g1 , . . . , ga )
(ga+1 , . . . , gn )
Suppose now A(U) is a balanced direct product in a basis z1 , . . . , zn of V ∨ :
(2.3)
A(U) = F1 (z1 , . . . , za )F2 (za+1 , . . . , zn ),
where deg(F1 ) = a(d − 1) and deg(F2 ) = (n − a)(d − 1). Let x1 , . . . , xn be the
dual basis of V , and let IU ⊂ k[x1 , . . . , xn ] be the complete intersection ideal
spanned by the elements of U. We have that
IU = A(U)⊥ ⊂ k[x1 , . . . , xn ].
It is then evident from (2.3) and the definition of an apolar ideal that
(2.4)
(x1 , . . . , xa )a(d−1)+1 ⊂ IU
and
(2.5)
(xa+1 , . . . , xn )(n−a)(d−1)+1 ⊂ IU .
We also have the following observation:
10
MAKSYM FEDORCHUK
Claim 2.6.
dimk U ∩ (x1 , . . . , xa ) = a,
dimk U ∩ (xa+1 , . . . , xn ) = n − a.
Proof. By symmetry, it suffices to prove the second statement. Since U is
spanned by a length
n regular sequence of degree d forms, we have that dimk U ∩
(xa+1 , . . . , xn ) ≤ n − a. Suppose we have a strict inequality. Let
R := k[x1 , . . . , xn ]/(IU , xa+1 , . . . , xn ) ≃ k[x1 , . . . , xa ]/I ′ .
Then I ′ is generated in degree d, and has at least a + 1 minimal generators in
that degree. It follows that the top degree of R is strictly less than a(d − 1),
′
and so Ia(d−1)
= k[x1 , . . . , xa ]a(d−1) (cf. [7, Lemma 2.7]). But then
k[x1 , . . . , xa ]a(d−1) ⊂ (xa+1 , . . . , xn ) + IU .
Using (2.5), this gives
k[x1 , . . . , xa ]a(d−1) k[xa+1 , . . . , xn ](n−a)(d−1) ⊂ IU .
Thus every monomial of
k[z1 , . . . , za ]a(d−1) k[za+1 , . . . , zn ](n−a)(d−1)
appears with coefficient 0 in A(U), which contradicts (2.3).
At this point, we can apply [7, Prop. 3.1] to conclude that U ∩ k[x1 , . . . , xa ]d
contains a regular sequence of length a and that U ∩ k[xa+1 , . . . , xn ]d contains a
regular sequence of length n−a. This shows that U decomposes as a balanced direct sum in the basis x1 , . . . , xn of V . However, for the sake of self-containedness,
we proceed to give a more direct argument:
By Claim (2.6), there exists a regular sequence s1 , . . . , sa ∈ k[x1 , . . . , xa ]d such
that
(s1 , . . . , sa ) = g1 (x1 , . . . , xa , 0, . . . , 0), . . . , gn (x1 , . . . , xa , 0, . . . , 0)
and a regular sequence t1 , . . . , tn−a ∈ k[xa+1 , . . . , xn ]d such that
(t1 , . . . , tn−a ) = g1 (0, . . . , 0, xa+1 , . . . , xn ), . . . , gn (0, . . . , 0, xa+1 , . . . , xn ) .
Let
W := hs1 , . . . , sa , t1 , . . . , tn−a i ∈ Grass(n, Sd )Res
and let IW be the ideal generated by W . We are going to prove that U = W ,
which will conclude the proof of the proposition.
Since char(k) = 0 or char(k) > n(d − 1), Macaulay’s theorem applies, and so
to prove that U = W , we need to show that the ideals IU and IW coincide in
degree n(d − 1). For this, it suffices to prove that (IW )n(d−1) ⊂ (IU )n(d−1) .
DECOMPOSABILITY OF POLYNOMIALS AND ASSOCIATED FORMS
11
Since s1 , . . . , sa is a regular sequence in k[x1 , . . . , xa ]d , we have that
k[x1 , . . . , xa ]a(d−1)+1 ⊂ (s1 , . . . , sa ).
Similarly, we have that
k[xa+1 , . . . , xn ](n−a)(d−1)+1 ⊂ (t1 , . . . , tn−a ).
Together with (2.4) and (2.5), this gives
(2.7)
(x1 , . . . , xa )a(d−1)+1 + (xa+1 , . . . , xn )(n−a)(d−1)+1 ⊂ IU ∩ IW .
Set J := (x1 , . . . , xa )a(d−1)+1 + (xa+1 , . . . , xn )(n−a)(d−1)+1 . It remains to show
that
(IW )n(d−1) ⊂ (IU )n(d−1) + Jn(d−1) .
To this end, consider
a
X
qi si +
i=1
n−a
X
rj tj ∈ (IW )n(d−1) ,
j=1
where q1 , . . . , qa , r1 , . . . , rn−a ∈ Sn(d−1)−d . Since s1 , . . . , sa ∈ k[x1 , . . . , xa ]d , and
we are working modulo J, we can assume that qi ∈ (xa+1 , . . . , xn )(n−a)(d−1) , for
all i = 1, . . . , a. Similarly, we can assume that rj ∈ (x1 , . . . , xa )a(d−1) , for all
j = 1, . . . , n − a.
By construction, we have s1 , . . . , sa ∈ IU + (xa+1 , . . . , xn ) and t1 , . . . , tn−a ∈
IU + (x1 , . . . , xa ). Using this, and (2.7), we conclude that
a
X
i=1
qi si +
n−a
X
rj tj ∈ IU + J.
j=1
This finishes the proof of the proposition.
Proof of Proposition 1.7. If char(k) = 3, the case of (n, d) = (2, 2) is vacuous
since no smooth binary cubic will be a direct sum. In all other cases, char(k) >
n(d − 1) implies char(k) > max{n(d − 1), d + 1}.
Suppose f = f1 + · · · + fs = g1 + · · · + gt are two maximally fine direct sum
decompositions. Then
A(f1 ) · · · A(fs ) = A(g1 ) · · · A(gt ) ∈ PDn(d−1) ,
where V ∨ = ⊕si=1 E(A(fi )) = ⊕tj=1 E(A(gj )). Suppose some A(fi ) shares irreducible factors with more than one A(gj ). Then by the uniqueness of factorization in D, we must have a non-trivial factorization A(fi ) = G1 G2 such
that E(G1 ) ∩ E(G2 ) = (0). Then A(fi ) is a direct product, and so fi must
be a direct sum by Theorem 1.6, contradicting the maximality assumption.
Therefore, no A(fi ) shares an irreducible factor with more than one A(gj );
and, by symmetry, no A(gj ) shares an irreducible factor with more than one
12
MAKSYM FEDORCHUK
A(fi ). It follows that s = t and, up to reordering, A(fi ) = A(gi ), and thus
E(A(fi )) = E(A(gi )), for all i = 1, . . . , t. We conclude that E(fi ) = E(gi ),
which using f1 + · · · + ft = g1 + · · · + gt forces fi = gi , for all i = 1, . . . , t.
3. Necessary conditions for direct sum decomposability
Our next two results give easily verifiable necessary conditions for an arbitrary
form to be a direct sum. They hold over an arbitrary field, with no restriction
on characteristic. We keep notation of §1.1.
Theorem 3.1. Suppose f is a form in S.
⌋, then
(1) Let b = dimk ∇f . If f has a factor g such that dimk ∇g ≤ ⌊ b−1
2
f is not a direct sum.
(2) If f has a repeated factor, then f is not a direct sum.
Corollary 3.2. Suppose f is a form with dimk ∇f ≥ 3. If f has a linear factor,
then f is not a direct sum.
Proof of Theorem 3.1. We apply Lemma 2.1(1). For (1), suppose that in some
basis of V we have
f = gh = f1 (x1 , . . . , xa ) + f2 (xa+1 , . . . , xn ) ∈ S,
and that dimk ∇f = b while dimk ∇g ≤ ⌊ b−1
⌋. Let ρ be the 1-PS subgroup of
2
a
SL(V ) acting with weight (n − a) on {xi }i=1 and weight −a on {xi }ni=a+1 . Then
ρ fixes ∇f , and ∇f = (∇f )((n−a)d) ⊕ (∇f )(−ad) is the decomposition into the
ρ-weight-spaces. Since ∇f ⊂ g∇h + h∇g, we have
b+1
.
dimk (∇f ∩ g∇h) ≥ b − dimk h∇g = b − dimk ∇g ≥
2
It follows by dimension considerations that some nonzero multiple of g belongs
to one of the two weight-spaces of ρ in ∇f . Thus g itself is homogeneous with
respect to ρ. It follows that either g ∈ k[x1 , . . . , xa ] or g ∈ k[xa+1 , . . . , xn ]. This
forces either f2 = 0 or f1 = 0, respectively. A contradiction!
For (2), suppose f is a direct sum with a repeated factor g. Let ρ be the 1-PS
of SL(V ) as above. Since ∇f ⊂ (g), some nonzero multiple of g belongs to a
weight-space of ρ in ∇f , and so we obtain a contradiction as in (1).
Our next result needs the following:
Definition 3.3. Given a basis x1 , . . . , xn of V and a nonzero f ∈ Sd+1 , we
define the state of f to be the set of multi-indices Ξ(f ) ⊂ {(d1 , . . . , dn ) ∈ Zn≥0 |
d1 + · · · + dn = d + 1} such that
X
f=
a(d1 ,...,dn ) xd11 · · · xdnn , where a(d1 ,...,dn ) ∈ k ∗ .
(d1 ,...,dn )∈Ξ(f )
DECOMPOSABILITY OF POLYNOMIALS AND ASSOCIATED FORMS
13
In other words, the state of f is the set of monomials appearing with nonzero
coefficient in f . We set Ξ(0) = ∅.
Theorem 3.4. Suppose k 6= F2 . Let d ≥ 2. Suppose f ∈ Sd+1 is such that in
some basis x1 , . . . , xn of V the following conditions hold:
(0) Ξ(∂f /∂xi ) 6= ∅ for all 1 ≤ i ≤ n.
(1) Ξ(∂f /∂xi ) ∩ Ξ(∂f /∂xj ) = ∅ for all 1 ≤ i < j ≤ n.
(2)
n
Ξ(f ) = (d1 , . . . , dn ) char(k) ∤ di for some 1 ≤ i ≤ n and
o
∂(xd11 · · · xdnn )
Ξ
⊂ ∪nj=1 Ξ(∂f /∂xj ), for all 1 ≤ i ≤ n .
∂xi
(3) The graph with the vertices in {1, . . . , n} and the edges given by
∂2f
(ij) |
6= 0
∂xi ∂xj
is connected.
Then f is not a direct sum.
Remark 3.5. In words, (1) says that no two first partials of f share a common
monomial, and (2) says that any monomial all of whose nonzero first partials
appear in first partials of f must appear in f .
As an immediate corollary of this theorem, we show that the n × n generic
determinant and permanent polynomials, and the 2n × 2n generic pfaffian polynomials, as well as any other polynomial of the same state, are not direct sums
when n ≥ 3.
Corollary 3.6 (Determinant-like
Ppolynomials are not direct sums). Let n ≥ 3.
Suppose S = k[xi,j ]ni,j=1 and f = σ∈Sn aσ x1,σ(1) · · · xn,σ(n) , where aσ ∈ k ∗ . Then
f is not a direct sum.
Corollary 3.7 (Pfaffian-like polynomials are not direct sums). Let n ≥ 3.
Suppose
S = k[xi,j ]1≤i<j≤2n , where we set xj,i := xi,j for j > i, and f =
P
∗
σ∈S2n aσ xσ(1),σ(2) · · · xσ(2n−1),σ(2n) , where aσ ∈ k . Then f is not a direct sum.
Proof of both corollaries. It is easy to see that f satisfies all conditions of The
orem 3.4.
Proof of Theorem 3.4. If char(k) = p, we set
Ξp := {(d1 , . . . , dn ) | p divides di for all 1 ≤ i ≤ n}
to be the set of all monomials whose gradient point is trivial.
14
MAKSYM FEDORCHUK
Suppose f is a direct sum. Note that Condition 3.4 implies that dimk ∇f =
n. Then by Lemma 2.1(3) there exists a form g such that ∇g = ∇f and
∇(g − cf ) 6= 0 for all c ∈ k. Since ∇g = ∇f , by Condition (2), we must
have Ξ(g) ⊂ Ξ(f ) ∪ Ξp . Then Ξ(∂g/∂xi ) ⊂ Ξ(∂f /∂xi ). Since ∂g/∂xi ∈ ∇f ,
Condition (1) implies that in fact
∂g/∂xi = ci ∂f /∂xi , for some ci ∈ k.
Comparing the second partials, and using Condition (3) we conclude that ci = cj
for all 1 ≤ i < j ≤ n. We obtain ∇(g − c1 f ) = (0), which is a contradiction.
4. Finding a balanced direct product decomposition
algorithmically
In this section, we show how Theorem 1.6 reduces the problem of finding a
direct sum decomposition of a given smooth form f to a polynomial factorization
problem. To begin, suppose that we are given a smooth form f ∈ Symd+1 V in
some basis of V . Then the associated form A(f ) is computed in the dual basis
of V ∨ as the form apolar to (Jf )n(d−1) . To apply Theorem 1.6, we now need to
determine if A(f ) decomposes as a balanced direct product, and if it does, then
in what basis of V ∨ . The following simple lemma explains how to do it (cf. §1.1
for notation):
Lemma 4.1. Suppose char(k) = 0 or char(k) > max{n(d − 1), d + 1}. For a
smooth f ∈ Sd+1 , the associated form A(f ) is a balanced direct product if and
only if there is a non-trivial factorization A(f ) = G1 G2 such that
⊥
∨
(4.2) V = G⊥
1 1 + G2 1 , or, equivalently, E(G1 ) ∩ E(G2 ) = (0) ⊂ V .
⊥
Moreover, in this case, we have G⊥
∩
G
1 1
2 1 = (0) ⊂ V and A(f ) decomposes as a balanced direct product in any basis of V ∨ such that its dual basis is
compatible with the direct sum decomposition in Equation (4.2).
Proof. The equivalence of the two conditions in (4.2) follows from the fact that
E(Gi ) ⊂ V ∨ is dual to (G⊥
i )1 ⊂ V . The claim now follows from definitions and
Theorem 1.6 by observing
that for any non-trivial factorization A(f ) = G1 G2 ,
⊥
we have G⊥
∩
G
⊂
A(f )⊥ 1 = (Jf )1 = (0).
1 1
2 1
4.1. An algorithm for direct sum decompositions. Suppose k is a field,
with either char(k) = 0 or char(k) > max{n(d −1), d + 1}, for which there exists
a polynomial factorization algorithm. Let f ∈ k[x1 , . . . , xn ]d+1 , where d ≥ 2.
Step 1: Compute Jf = (∂f /∂x1 , . . . , ∂f /∂xn ) up to degree n(d − 1) + 1. If
(Jf )n(d−1)+1 6= k[x1 , . . . , xn ]n(d−1)+1 ,
then f is not smooth and we stop; otherwise, continue.
DECOMPOSABILITY OF POLYNOMIALS AND ASSOCIATED FORMS
15
Step 2: Compute A(f ) as the dual to (Jf )n(d−1) :
hA(f )i = T ∈ k[z1 , . . . , zn ]n(d−1) | g ◦ T = 0, for all g ∈ (Jf )n(d−1) .
Step 3: Compute the irreducible factorization of A(f ) in k[z1 , . . . , zn ] and check
for the existence of balanced direct product factorizations using Lemma 4.1. If
any exist, then f is a direct sum; otherwise, f is not a direct sum.
Step 4: For every balanced direct product factorization of A(f ), Lemma 4.1
gives a basis of V in which f decomposes as a direct sum.
The above algorithm was implemented in a Macaulay 2 package written by
Justin Kim and Zihao Fang (its source code is available upon request). In what
follows, we give a few examples of the algorithm in action.
Remark 4.3. Jaroslaw Buczyński has pointed out that already Step 2 in the
above algorithm is computationally highly expensive when n and d are large.
However, it is reasonably fast when both n and d are small, with Example 4.5
below taking only a few seconds.
Example 4.4 (Binary quartics). Suppose k is an algebraically closed field of
characteristic 0. Then every smooth binary quartic has a standard form
ft = x41 + x42 + tx21 x22 ,
t 6= ±2.
Up to a scalar, the associated form of Ft is
A(ft ) = t(z14 + z24 ) − 12z12 z22 .
Clearly, A(ft ) is singular if and only if t = 0, or t = ±6. For these values of t,
A(ft ) is in fact a balanced direct product, and so ft is a direct sum. Namely,
up to scalars, we have:
A(f0 ) = z12 z22 ,
f0 = x41 + x42 ,
A(f6 ) = (z12 − z22 )2 = (z1 − z2 )2 (z1 + z2 )2 ,
f6 = (x1 − x2 )4 + (x1 + x2 )4 ,
A(f−6 ) = (z12 + z22 )2 = (z1 − iz2 )2 (z1 + iz2 )2 , f−6 = (x1 − ix2 )4 + (x1 + ix2 )4 .
Note that over R, the associated form A(f−6 ) = (z12 + z22 )2 is not a balanced
direct product. Hence f−6 is not a direct sum over R by Theorem 1.6. Since
the apolar ideal of f−6 is the same over R and over C, this example illustrates
that the direct sum decomposability criterion of [3] fails over non-closed fields.
Example 4.5. Consider the following element in Q[x1 , x2 , x3 , x4 ]4 :
f = x41 + 4x31 x2 + 6x21 x22 + 4x1 x32 + 2x42 + 8x31 x3 + 24x21 x2 x3 + 24x1 x22 x3 + 8x32 x3 + 24x21 x23
+ 48x1 x2 x23 + 24x22 x23 + 32x1 x33 + 32x2 x33 + 17x43 − 12x31 x4 − 36x21 x2 x4 − 36x1 x22 x4 − 12x32 x4
−72x21 x3 x4 −144x1 x2 x3 x4 −72x22 x3 x4 −144x1 x23 x4 −144x2 x23 x4 −96x33 x4 +54x21 x24 +108x1 x2 x24
+ 54x22 x24 + 216x1 x3 x24 + 217x2 x3 x24 + 216x23 x24 − 108x1 x34 − 108x2 x34 − 216x3 x34 + 82x44 .
16
MAKSYM FEDORCHUK
Then its associated form is
A(f ) = 9785z18−32316z17z2 +26370z16z22 −260z15z23 +15z14 z24 +24z13z25 −19488z17z3 +40920z16z2 z3
− 25620z15z22 z3 − 180z14z23 z3 + 60z13 z24 z3 − 12z12z25 z3 + 8730z16z32 − 11910z15z2 z32 + 6390z14z22 z32
+30z13z23 z32 −595z15z33 −495z14z2 z33 +15z13z22 z33 −5z12z23 z33 +15z14z34 +120z13z2 z34 +12z13z35 −12z12z2 z35
− 4194z17z4 − 9000z16z2 z4 + 17820z15z22 z4 − 360z14z23 z4 + 90z13 z24 z4 − 7200z16z3 z4 + 21600z15z2 z3 z4
−17280z14z22 z3 z4 +6480z15z32 z4 −8640z14z2 z32 z4 +4320z13z22 z32 z4 −720z14z33 z4 +90z13z34 z4 −7395z16z42
+ 7140z15z2 z42 + 2970z14z22 z42 − 60z13z23 z42 + 15z12z24 z42 + 3120z15z3 z42 − 720z14z2 z3 z42 − 2880z13z22 z3 z42
+ 1080z14z32 z42 − 1440z13z2 z32 z42 + 720z12z22 z32 z42 − 120z13z33 z42 + 15z12z34 z42 − 1800z15z43 + 2880z14z2 z43
+1440z14z3 z43 −1440z13z2 z3 z43 +30z14 z44 +240z13z2 z44 +120z13z3 z44 −120z12z2 z3 z44 +36z13 z45 +2z12z46 .
One checks that A(f ) = G1 G2 , where G1 = z12 with E(G1 ) = z1 , and E(G2 ) =
h3z3 + 2z4 , 3z2 + z4 , 3z1 + z4 i, is a balanced direct product factorization of A(f ).
It follows that f is a direct sum. In fact, f is projectively equivalent to x41 +
(x42 + x43 + x44 + x2 x3 x24 ).
Acknowledgments
The author is grateful to Jarod Alper for an introduction to the subject,
Alexander Isaev for numerous stimulating discussions that inspired this work,
and Zach Teitler for questions that motivated most of the results in Section
3. The author was partially supported by the NSA Young Investigator grant
H98230-16-1-0061 and Alfred P. Sloan Research Fellowship. Justin Kim and
Zihao Fang wrote a Macaulay 2 package for computing associated forms while
supported by the Boston College Undergraduate Research Fellowship grant under the direction of the author.
References
[1] Jarod Alper and Alexander Isaev. Associated forms in classical invariant theory and their
applications to hypersurface singularities. Math. Ann., 360(3-4):799–823, 2014.
[2] Jarod Alper and Alexander Isaev. Associated forms and hypersurface singularities: The
binary case. J. reine angew. Math., 2016. To appear, DOI: 10.1515/crelle-2016-0008.
[3] Weronika Buczyńska, Jaroslaw Buczyński, Johannes Kleppe, and Zach Teitler. Apolarity
and direct sum decomposability of polynomials. Michigan Math. J., 64(4):675–719, 2015.
[4] Michael Eastwood and Alexander Isaev. Extracting invariants of isolated hypersurface
singularities from their moduli algebras. Math. Ann., 356(1):73–98, 2013.
[5] David Eisenbud. Commutative algebra with a view toward algebraic geometry, volume
150 of Graduate Texts in Mathematics. Springer-Verlag, New York, 1995.
[6] Maksym Fedorchuk. GIT semistability of Hilbert points of Milnor algebras. Math. Ann.,
367(1-2):441–460, 2017.
[7] Maksym Fedorchuk and Alexander Isaev. Stability of associated forms, 2017. Preprint,
arXiv:1703.00438.
DECOMPOSABILITY OF POLYNOMIALS AND ASSOCIATED FORMS
17
[8] Anthony Iarrobino and Vassil Kanev. Power sums, Gorenstein algebras, and determinantal loci, volume 1721 of Lecture Notes in Mathematics. Springer-Verlag, Berlin, 1999.
[9] Johannes Kleppe. Additive splittings of homogeneous polynomials, 2013. Ph.D. thesis,
arXiv:1307.3532.
[10] Marcos Sebastiani and René Thom. Un résultat sur la monodromie. Invent. Math., 13:90–
96, 1971.
[11] Sepideh Masoumeh Shafiei. Apolarity for determinants and permanents of generic matrices. J. Commut. Algebra, 7(1):89–123, 2015.
[12] Larry Smith and R. E. Stong. Projective bundle ideals and Poincaré duality algebras. J.
Pure Appl. Algebra, 215(4):609–627, 2011.
[13] Zach Teitler. Sufficient conditions for Strassen’s additivity conjecture. Illinois J. Math.,
59(4):1071–1085, 2015.
(Fedorchuk) Department of Mathematics, Boston College, 140 Commonwealth
Ave, Chestnut Hill, MA 02467, USA
E-mail address: [email protected]
| 0math.AC
|
GraphVAE: Towards Generation of Small Graphs Using Variational
Autoencoders
Martin Simonovsky 1 Nikos Komodakis 1
arXiv:1802.03480v1 [cs.LG] 9 Feb 2018
Abstract
Deep learning on graphs has become a popular
research topic with many applications. However,
past work has concentrated on learning graph embedding tasks, which is in contrast with advances
in generative models for images and text. Is it
possible to transfer this progress to the domain of
graphs? We propose to sidestep hurdles associated with linearization of such discrete structures
by having a decoder output a probabilistic fullyconnected graph of a predefined maximum size
directly at once. Our method is formulated as
a variational autoencoder. We evaluate on the
challenging task of molecule generation.
1. Introduction
Deep learning on graphs has very recently become a popular research topic (Bronstein et al., 2017), with useful
applications across fields such as chemistry (Gilmer et al.,
2017), medicine (Ktena et al., 2017), or computer vision (Simonovsky & Komodakis, 2017). Past work has concentrated
on learning graph embedding tasks so far, i.e. encoding an
input graph into a vector representation. This is in stark
contrast with fast-paced advances in generative models for
images and text, which have seen massive rise in quality
of generated samples. Hence, it is an intriguing question
how one can transfer this progress to the domain of graphs,
i.e. their decoding from a vector representation. Moreover,
the desire for such a method has been mentioned in the past
by Gómez-Bombarelli et al. (2016).
However, learning to generate graphs is a difficult problem for methods based on gradient optimization, as graphs
are discrete structures. Unlike sequence (text) generation,
graphs can have arbitrary connectivity and there is no clear
best way how to linearize their construction in a sequence
of steps. On the other hand, learning the order for incremen1
Université Paris Est & École des Ponts ParisTech, Champs sur
Marne, France. Correspondence to: Martin Simonovsky <[email protected]>.
tal construction involves discrete decisions, which are not
differentiable.
In this work, we propose to sidestep these hurdles by having
the decoder output a probabilistic fully-connected graph of a
predefined maximum size directly at once. In a probabilistic
graph, the existence of nodes and edges, as well as their
attributes, are modeled as independent random variables.
The method is formulated in the framework of variational
autoencoders (VAE) by Kingma & Welling (2013).
We demonstrate our method, coined GraphVAE, in cheminformatics on the task of molecule generation. Molecular
datasets are a challenging but convenient testbed for our generative model, as they easily allow for both qualitative and
quantitative tests of decoded samples. While our method is
applicable for generating smaller graphs only and its performance leaves space for improvement, we believe our work
is an important initial step towards powerful and efficient
graph decoders.
2. Related work
Graph Decoders. Graph generation has been largely unexplored in deep learning. The closest work to ours is by
Johnson (2017), who incrementally constructs a probabilistic (multi)graph as a world representation according to a
sequence of input sentences to answer a query. While our
model also outputs a probabilistic graph, we do not assume
having a prescribed order of construction transformations
available and we formulate the learning problem as an autoencoder.
Xu et al. (2017) learns to produce a scene graph from an
input image. They construct a graph from a set of object
proposals, provide initial embeddings to each node and edge,
and use message passing to obtain a consistent prediction. In
contrast, our method is a generative model which produces
a probabilistic graph from a single opaque vector, without
specifying the number of nodes or the structure explicitly.
Related work pre-dating deep learning includes random
graphs (Erdos & Rényi, 1960; Barabási & Albert, 1999),
stochastic blockmodels (Snijders & Nowicki, 1997), or state
transition matrix learning (Gong & Xiang, 2003).
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
~
Figure 1. Illustration of the proposed variational graph autoencoder. Starting from a discrete attributed graph G = (A, E, F ) on n nodes
(e.g. a representation of propylene oxide), stochastic graph encoder qφ (z|G) embeds the graph into continuous representation z. Given a
e = (A,
e E,
e Fe) on predefined
point in the latent space, our novel graph decoder pθ (G|z) outputs a probabilistic fully-connected graph G
k ≥ n nodes, from which discrete samples may be drawn. The process can be conditioned on label y for controlled sampling at test time.
e
Reconstruction ability of the autoencoder is facilitated by approximate graph matching for aligning G with G.
Discrete Data Decoders. Text is the most common discrete representation. Generative models there are usually
trained in a maximum likelihood fashion by teacher forcing (Williams & Zipser, 1989), which avoids the need to
backpropagate through output discretization by feeding the
ground truth instead of the past sample at each step. Bengio
et al. (2015) argued this may lead to expose bias, i.e. possibly reduced ability to recover from own mistakes. Recently,
efforts have been made to overcome this problem. Notably,
computing a differentiable approximation using Gumbel distribution (Kusner & Hernández-Lobato, 2016) or bypassing
the problem by learning a stochastic policy in reinforcement
learning (Yu et al., 2017). Our work also circumvents the
non-differentiability problem, namely by formulating the
loss on a probabilistic graph.
Molecule Decoders. Generative models may become
promising for de novo design of molecules fulfilling certain
criteria by being able to search for them over a continuous embedding space (Olivecrona et al., 2017). With that in
mind, we propose a conditional version of our model. While
molecules have an intuitive representation as graphs, the
field has had to resort to textual representations with fixed
syntax, e.g. so-called SMILES strings, to exploit recent
progress made in text generation with RNNs (Olivecrona
et al., 2017; Segler et al., 2017; Gómez-Bombarelli et al.,
2016). As their syntax is brittle, many invalid strings tend to
be generated, which has been recently addressed by Kusner
et al. (2017) by incorporating grammar rules into decoding. While encouraging, their approach does not guarantee
semantic (chemical) validity, similarly as our method.
3. Method
We approach the task of graph generation by devising a neural network able to translate vectors in a continuous code
space to graphs. Our main idea is to output a probabilistic
fully-connected graph and use a standard graph matching
algorithm to align it to the ground truth. The proposed
method is formulated in the framework of variational autoencoders (VAE) by Kingma & Welling (2013), although
other forms of regularized autoencoders would be equally
suitable (Makhzani et al., 2015; Li et al., 2015a). We briefly
recapitulate VAE below and continue with introducing our
novel graph decoder together with an appropriate objective.
3.1. Variational Autoencoder
Let G = (A, E, F ) be a graph specified with its adjacency
matrix A, edge attribute tensor E, and node attribute matrix F . We wish to learn an encoder and a decoder to map
between the space of graphs G and their continuous embedding z ∈ Rc , see Figure 1. In the probabilistic setting
of a VAE, the encoder is defined by a variational posterior qφ (z|G) and the decoder by a generative distribution
pθ (G|z), where φ and θ are learned parameters. Furthermore, there is a prior distribution p(z) imposed on the latent
code representation as a regularization; we use a simplistic isotropic Gaussian prior p(z) = N (0, I). The whole
model is trained by minimizing the upper bound on negative
log-likelihood − log pθ (G) (Kingma & Welling, 2013):
L(φ, θ; G) =
= Eqφ (z|G) [− log pθ (G|z)] + KL[qφ (z|G)||p(z)] (1)
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
The first term of L, the reconstruction loss, enforces high
similarity of sampled generated graphs to the input graph G.
The second term, KL-divergence, regularizes the code space
to allow for sampling of z directly from p(z) instead from
qφ (z|G) later. The dimensionality of z is usually fairly small
so that the autoencoder is encouraged to learn a high-level
compression of the input instead of learning to simply copy
any given input. While the regularization is independent on
the input space, the reconstruction loss must be specifically
designed for each input modality. In the following, we
introduce our graph decoder together with an appropriate
reconstruction loss.
3.2. Probabilistic Graph Decoder
Graphs are discrete objects, ultimately. While this does not
pose a challenge for encoding, demonstrated by the recent
developments in graph convolution networks (Gilmer et al.,
2017), graph generation has been an open problem so far. In
a related task of text sequence generation, the currently dominant approach is character-wise or word-wise prediction
(Bowman et al., 2016). However, graphs can have arbitrary
connectivity and there is no clear way how to linearize their
construction in a sequence of steps1 . On the other hand,
iterative construction of discrete structures during training
without step-wise supervision involves discrete decisions,
which are not differentiable and therefore problematic for
back-propagation.
Fortunately, the task can become much simpler if we restrict the domain to the set of all graphs on maximum k
nodes, where k is fairly small (in practice up to the order
of tens). Under this assumption, handling dense graph representations is still computationally tractable. We propose
to make the decoder output a probabilistic fully-connected
e = (A,
e E,
e Fe) on k nodes at once. This effectively
graph G
sidesteps both problems mentioned above.
In probabilistic graphs, the existence of nodes and edges
is modeled as Bernoulli variables, whereas node and edge
attributes are multinomial variables. While not discussed in
this work, continuous attributes could be easily modeled as
Gaussian variables represented by their mean and variance.
We assume all variables to be independent.
e has thus a probaEach tensor of the representation of G
bilistic interpretation. Specifically, the predicted adjacency
e ∈ [0, 1]k×k contains both node probabilities A
ea,a
matrix A
e
and edge probabilities Aa,b for nodes a 6= b. The edge ate ∈ Rk×k×de indicates class probabilities for
tribute tensor E
edges and, similarly, the node attribute matrix Fe ∈ Rk×dn
contains class probabilities for nodes.
The decoder itself is deterministic. Its architecture is a
simple multi-layer perceptron (MLP) with three outputs in
its last layer. Sigmoid activation function is used to compute
e whereas edge- and node-wise softmax is applied to obtain
A,
e
E and Fe, respectively. At test time, we are often interested
e which can be obtained by
in a (discrete) point estimate of G,
e E,
e and Fe. Note
taking edge- and node-wise argmax in A,
that this can result in a discrete graph on less than k nodes.
3.3. Reconstruction Loss
Given a particular of a discrete input graph G on n ≤ k
e on k nodes,
nodes and its probabilistic reconstruction G
evaluation of Equation 1 requires computation of likelihood
e
pθ (G|z) = P (G|G).
Since no particular ordering of nodes is imposed in either
e or G and matrix representation of graphs is not invariant
G
to permutations of nodes, comparison of two graphs is hard.
However, approximate graph matching described further
in Subsection 3.4 can obtain a binary assignment matrix
e is
X ∈ {0, 1}k×n , where Xa,i = 1 only if node a ∈ G
assigned to i ∈ G and Xa,i = 0 otherwise.
Knowledge of X allows to map information between both
graphs. Specifically, input adjacency matrix is mapped to
the predicted graph as A0 = XAX T , whereas the predicted
node attribute matrix and slices of edge attribute matrix are
e0 =
transferred to the input graph as Fe0 = X T Fe and E
·,·,l
T e
X E·,·,l X. The maximum likelihood estimates, i.e. crossentropy, of respective variables are as follows:
log p(A0 |z) =
X
ea,a + (1 − A0 ) log(1 − A
ea,a ) +
= 1/k
A0a,a log A
a,a
a
+ 1/k(k − 1)
X
ea,b + (1 − A0a,b ) log(1 − A
ea,b )
A0a,b log A
a6=b
log p(F |z) = 1/n
X
T e0
log Fi,·
Fi,·
i
log p(E|z) = 1/(||A||1 − n)
X
T e0
log Ei,j,·
Ei,j,· ,
(2)
i6=j
where we assumed that F and E are encoded in one-hot notation. The formulation considers existence of both matched
and unmatched nodes and edges but attributes of only the
matched ones. Furthermore, averaging over nodes and edges
separately has shown beneficial in training as otherwise the
edges dominate the likelihood. The overall reconstruction
loss is a weighed sum of the previous terms:
1
While algorithms for canonical graph orderings are available
(McKay & Piperno, 2014), Vinyals et al. (2015) empirically found
out that the linearization order matters when learning on sets.
− log p(G|z) = −λA log p(A0 |z) − λF log p(F |z) −
− λE log p(E|z)
(3)
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
3.4. Graph Matching
computing a differentiable loss.
The goal of (second-order) graph matching is to find correspondences X ∈ {0, 1}k×n between nodes of graphs
e based on the similarities of their node pairs
G and G
e It can be
S : (i, j)×(a, b) → R+ for i, j ∈ G and a, b ∈ G.
expressed as integer quadratic programming problem of similarity maximization over X and is typically approximated
by relaxation of X into continuous domain: X ∗ ∈ [0, 1]k×n
(Cho et al., 2014). For our use case, the similarity function
is defined as follows:
S((i, j), (a, b)) =
T e
ea,b A
ea,a A
eb,b [i 6= j ∧ a 6= b] +
= (Ei,j,·
Ea,b,· )Ai,j A
T e
ea,a [i = j ∧ a = b]
+ (Fi,·
Fa,· )A
(4)
The first term evaluates similarity between edge pairs and
the second term between node pairs, [·] being the Iverson
bracket. Note that the scores consider both feature compate and existential compatibility (A),
e which
ibility (Fe and E)
has empirically led to more stable assignments during training. To summarize the motivation behind both Equations 3
and 4, our method aims to find the best graph matching
and then further improve on it by gradient descent on the
loss. Given the stochastic way of training deep network, we
argue that solving the matching step only approximately is
sufficient. This is conceptually similar to the approach for
learning to output unordered sets by (Vinyals et al., 2015),
where the closest ordering of the training data is sought.
In practice, we are looking for a graph matching algorithm
robust to noisy correspondences which can be easily implemented on GPU in batch mode. Max-pooling matching
(MPM) by Cho et al. (2014) is a simple but effective algorithm following the iterative scheme of power methods, see
Appendix A for details. It can be used in batch mode if
similarity tensors are zero-padded, i.e. S((i, j), (a, b)) = 0
for n < i, j ≤ k, and the amount of iterations is fixed.
Max-pooling matching outputs continuous assignment matrix X ∗ . Unfortunately, attempts to directly use X ∗ instead
of X in Equation 3 performed badly, as did experiments with
direct maximization of X ∗ or soft discretization with softmax or straight-through Gumbel softmax (Jang et al., 2016).
We therefore discretize X ∗ to X using Hungarian algorithm
to obtain a strict one-on-one mapping2 . While this operation
is non-differentiable, gradient can still flow to the decoder
directly through the loss function and training convergence
proceeds without problems. Note that this approach is often taken in works on object detection, e.g. (Stewart et al.,
2016), where a set of detections need to be matched to a set
of ground truth bounding boxes and treated as fixed before
2
Some predicted nodes are not assigned for n < k. Our current
implementation performs this step on CPU although a GPU version
has been published (Date & Nagi, 2016).
3.5. Further Details
Encoder. A feed forward network with edge-conditioned
graph convolutions (ECC) (Simonovsky & Komodakis,
2017) is used as encoder, although any other graph embedding method is applicable. As our edge attributes are
categorical, a single linear layer for the filter generating
network in ECC is sufficient. Due to smaller graph sizes
no pooling is used in encoder except for the global one, for
which we employ gated pooling by Li et al. (2015b). As
usual in VAE, we formulate encoder as probabilistic and
enforce Gaussian distribution of qφ (z|G) by having the last
encoder layer outputs 2c features interpreted as mean and
variance, allowing to sample zl ∼ N (µl (G), σl (G)) for
l ∈ 1, .., c using the re-parameterization trick (Kingma &
Welling, 2013).
Disentangled Embedding. In practice, rather than random drawing of graphs, one often desires more control over
the properties of generated graphs. In such case, we follow
Sohn et al. (2015) and condition both encoder and decoder
on label vector y associated with each input graph G. Decoder pθ (G|z, y) is fed a concatenation of z and y, while
in encoder qφ (z|G, y), y is concatenated to every node’s
features just before the graph pooling layer. If the size of
latent space c is small, the decoder is encouraged to exploit
information in the label.
Limitations. The proposed model is expected to be useful
only for generating small graphs. This is due to growth
of GPU memory requirements and number of parameters
(O(k 2 )) as well as matching complexity (O(k 4 )), with small
decrease in quality for high values of k. In Section 4 we
demonstrate results for up to k = 38. Nevertheless, for
many applications even generation of small graphs is still
very useful.
4. Evaluation
We demonstrate our method for the task of molecule generation by evaluating on two large public datasets of organic
molecules, QM9 and ZINC.
4.1. Application in Cheminformatics
Quantitative evaluation of generative models of images and
texts has been troublesome (Theis et al., 2015), as it very
difficult to measure realness of generated samples in an automated and objective way. Thus, researchers frequently
resort there to qualitative evaluation and embedding plots.
However, qualitative evaluation of graphs can be very unintuitive for humans to judge unless the graphs are planar and
fairly simple.
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
Fortunately, we found graph representation of molecules,
as undirected graphs with atoms as nodes and bonds as
edges, to be a convenient testbed for generative models.
On one hand, generated graphs can be easily visualized
in standardized structural diagrams. On the other hand,
chemical validity of graphs, as well as many further properties a molecule can fulfill, can be checked using software
packages (SanitizeMol in RDKit) or simulations. This
makes both qualitative and quantitative tests possible.
Chemical constraints on compatible types of bonds and atom
valences make the space of valid graphs complicated and
molecule generation challenging. In fact, a single addition
or removal of edge or change in atom or bond type can
make a molecule chemically invalid. Comparably, flipping
a single pixel in MNIST-like number generation problem is
of no issue.
To help the network in this application, we introduce three
e
remedies. First, we make the decoder output symmetric A
e
and E by predicting their (upper) triangular parts only, as
undirected graphs are sufficient representation for molecules.
Second, we use prior knowledge that molecules are connected and, at test time only, construct maximum spanning
ea,a ≥ 0.5} in
tree on the set of probable nodes {a : A
order to include its edges (a, b) in the discrete pointwise
ea,b < 0.5 originally. Third,
estimate of the graph even if A
we do not generate Hydrogen explicitly and let it be added
as ”padding” during chemical validity check.
4.2. QM9 Dataset
QM9 dataset (Ramakrishnan et al., 2014) contains about
134k organic molecules of up to 9 heavy (non Hydrogen)
atoms with 4 distinct atomic numbers and 4 bond types, we
set k = 9, de = 4 and dn = 4. We set aside 10k samples
for testing and 10k for validation (model selection).
We compare our unconditional model to the characterbased generator of Gómez-Bombarelli et al. (2016) (CVAE)
and the grammar-based generator of Kusner et al. (2017)
(GVAE). We used the code and architecture in Kusner et al.
(2017) for both baselines, adapting the maximum input
length to the smallest possible. In addition, we demonstrate a conditional generative model for an artificial task of
generating molecules given a histogram of heavy atoms as
4-dimensional label y, the success of which can be easily
validated.
Setup. The encoder has two graph convolutional layers
(32 and 64 channels) with identity connection, batchnorm,
and ReLU; followed by the graph-level output formulation
in Equation 7 of Li et al. (2015b) with auxiliary networks
being a single fully connected layer (FCL) with 128 output
channels; finalized by a FCL outputting (µ, σ). The decoder
has 3 FCLs (128, 256, and 512 channels) with batchnorm
and ReLU; followed by parallel triplet of FCLs to output
graph tensors. We set c = 40, λA = λF = λE = 1, batch
size 32, 75 MPM iterations and train for 25 epochs with
Adam with learning rate 1e-3 and β1 =0.5.
Embedding Visualization. To visually judge the quality
and smoothness of the learned embedding z of our model,
we may traverse it in two ways: along a slice and along a line.
For the former, we randomly choose two c-dimensional orthonormal vectors and sample z in regular grid pattern over
the induced 2D plane. For the latter, we randomly choose
two molecules G(1) , G(2) of the same label from test set
and interpolate between their embeddings µ(G(1) ), µ(G(2) ).
This also evaluates the encoder, and therefore benefits from
low reconstruction error.
We plot two planes in Figure 2, for a frequent label (left)
and a less frequent label in QM9 (right). Both images show
a varied and fairly smooth mix of molecules. The left image
has many valid samples broadly distributed across the plane,
as presumably the autoencoder had to fit a large portion of
database into this space. The right exhibits stronger effect
of regularization, as valid molecules tend to be only around
center.
An example of several interpolations is shown in Figure 3.
We can find both meaningful (1st, 2nd and 4th row) and less
meaningful transitions, though many samples on the lines
do not form chemically valid compounds.
Decoder Quality Metrics. The quality of a conditional
decoder can be evaluated by the validity and variety of generated graphs. For a given label y(l) , we draw ns = 104 samples z(l,s) ∼ p(z) and compute the discrete point estimate
of their decodings Ĝ(l,s) = arg max pθ (G|z(l,s) , y(l) ).
Let V (l) be the list of chemically valid molecules from
Ĝ(l,s) and C (l) be the list of chemically valid molecules
with atom histograms equal to y(l) . We are interested in ratios Valid(l) = |V (l) |/ns and Accurate(l) = |C (l) |/ns .
Furthermore, let Unique(l) = |set(C (l) )|/|C (l) | be the
fraction of unique correct graphs and Novel(l) = 1 −
|set(C (l) ) ∩ QM9|/|set(C (l) )| the fraction of novel out-ofdataset graphs; we define Unique(l) = 0 and Novel(l) = 0
if |C (l) | = 0. Finally, the introduced metrics are aggregated by frequencies of labels in QM9, e.g. Valid =
P
(l)
(l)
l Valid freq(y ). Unconditional decoders are evaluated by assuming there is just a single label, therefore
Valid = Accurate.
In Table 1, we can see that on average 50% of generated
molecules are chemically valid and, in the case of conditional models, about 40% have the correct label which the
decoder was conditioned on. Larger embedding sizes c
are less regularized, demonstrated by a higher number of
Unique samples and by lower accuracy of the conditional
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
N
O
N
N
N
N
NH
N
N
HO
OH
N
O
O
N
OH
N
H2 O
N
HO
N
O
O
OH
N
OH
OH
OH
OH2
N
HO
N
N
N
OH
N
N
N
O
OH2
OH2
OH2
NH
O
O
OH
NH
NH
NH
OH
OH2
NH2
NH
OH
OH2
OH2
OH2
OH2
OH2
OH2
NH
H2 O
H2 O
OH
NH
NH
O
HO
OH
OH2
H2 N
OH
OH
OH
NH2
OH
N
O
HO
OH
O
HO
O
N
OH
OH
NH
O
O
OH
OH
O
OH
N
OH
OH
O
N
OH
NH
O
HO
NH2
O
N
OH
OH
O
O
O
O
O
OH
O
OH
OH
NH
N
HO
O
N
OH
OH
N
O
N
HO
OH
N
N
N
OH
N
O
HO
O
OH
HO
N
N
N
O
OH2
OH
N
OH
O
OH2
O
O
O
O
OH
OH
OH
N
N
N
N
N
OH2
N
OH
OH
OH2
NH2
OH2
HN
OH
N
N
OH
OH
OH
N
N
OH2
OH
N
OH
NH2
OH
HO
O
N
N
OH
N
O
O
NH
OH2
N
O
O
NH
OH2
NH2
OH
O
O
O
NH
N
O
NH2
N
O
N
OH
N
N
OH
O
OH
H2 O
N
NH
O
NH2
N
OH2
O
N
O
H2 N
O
NH
O
NH2
N
O
N
O
OH
OH2
OH
OH2
O
OH2
OH2
NH
OH2
OH
NH
NH
NH
OH2
OH2
O
O
OH2
OH
O
OH2
OH
OH2
OH2
OH2
OH2
HN
O
NH
NH2
NH2
NH2
N
N
O
OH2
OH2
OH2
O
N
O
NH
NH
O
O
OH2
OH2
OH2
NH2
O
O
NH
O
O
OH2
H2 O
NH
O
NH
OH2
OH2
O
N
O
OH
O
OH
O
NH
NH2
N
N
O
OH2
N
OH
N
O
N
OH
H2 O
O
O
O
OH
OH2
N
NH2
OH
O
OH2
O
OH2
H2 O
OH2
OH2
O
O
OH2
O
NH2
O
OH2
OH2
N
O
N
O
NH2
OH
NH
NH
NH
O
NH2
NH2
O
O
OH2
OH
O
OH
OH2
OH
OH2
O
NH
N
O
OH
O
O
O
OH
OH2
NH
NH
O
O
OH2
O
OH2
N
O
NH
OH
O
O
HO
OH2
O
OH
NH
O
O
OH2
N
N
OH
OH
N
NH
OH2
NH
O
OH
O
O
OH2
OH2
OH
OH
N
NH
O
OH2
OH
OH
OH
O
NH2
H2 O
N
O
N
OH
NH
NH
O
OH2
N
OH2
OH2
OH
N
OH2
OH
O
NH2
O
OH2
N
OH
OH2
N
O
O
OH2
N
H2 O
OH
N
OH
OH2
OH
OH2
N
N
NH2
OH2
OH2
HN
OH
OH
OH2
OH2
OH2
NH
OH2
NH
NH
OH2
O
O
OH2
NH
H2 O
OH2
NH2
H2 O
Figure 2. Decodings of latent space points of a conditional model sampled over a random 2D plane in z-space of c = 40 (within 5 units
from center of coordinates). Left: Samples conditioned on 7x Carbon, 1x Nitrogen, 1x Oxygen (12% QM9). Right: Samples conditioned
on 5x Carbon, 1x Nitrogen, 3x Oxygen (2.6% QM9). Color legend as in Figure 3.
model, as the decoder is forced less to rely on actual labels.
The ratio of Valid samples shows less clear behavior, likely
because the discrete performance is not directly optimized
for. For all models, it is remarkable that about 60% of generated molecules are out of the dataset, i.e. the network has
never seen them during training.
Looking at the baselines, CVAE can output only very few
valid samples as expected, while GVAE generates the highest number of valid samples (60%) but of very low variance
(less than 10%). Additionally, we investigate the importance
of graph matching by using identity assignment X instead
and thus learning to reproduce particular node permutations
in the training set, which correspond to the canonical ordering of SMILES strings from rdkit. This ablated model
(denoted as NoGM in Table 1) produces many valid samples
of lower variety and, surprisingly, outperforms GVAE in
this regard. In comparison, our model can achieve good
performance in both metrics at the same time.
Likelihood. Besides the application-specific metric introduced above, we also report evidence lower bound (ELBO)
commonly used in VAE literature, which corresponds to
−L(φ, θ; G) in our notation. In Table 1, we state mean
bounds over test set, using a single z sample per graph.
We observe both reconstruction loss and KL-divergence decrease due to larger c providing more freedom. However,
there seems to be no strong correlation between ELBO and
Valid, which makes model selection somewhat difficult.
Implicit Node Probabilities. Our decoder assumes independence of node and edge probabilities, which allows for
isolated nodes or edges. Making further use of the fact that
molecules are connected graphs, here we investigate the
effect of making node probabilities a function of edge probabilities. Specifically, we consider the probability for node
ea,a = maxb A
ea,b .
a as that of its most probable edge: A
The evaluation on QM9 in Table 2 shows a clear improvement in Valid, Accurate, and Novel metrics in both the
conditional and unconditional setting. However, this is paid
for by lower variability and higher reconstruction loss. This
indicates that while the new constraint is useful, the model
cannot fully cope with it.
4.3. ZINC Dataset
ZINC dataset (Irwin et al., 2012) contains about 250k druglike organic molecules of up to 38 heavy atoms with 9
distinct atomic numbers and 4 bond types, we set k = 38,
de = 4 and dn = 9 and use the same split strategy as
with QM9. We investigate the degree of scalability of an
unconditional generative model.
Setup. The setup is equivalent as for QM9 but with a
wider encoder (64, 128, 256 channels).
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
OH
F
F
H2 N
NH2
NH2
NH2
NH2
F
H2 N
F
N
F
HN
N
F
O
F
H2 N
H2 N
F
H2 N
N
NH
OH
N
NH
NH
N
O
OH2
O
N
O
O
O
N
HN
O
O
NH
OH2
OH
O
NH
NH
O
O
OH
O
NH
O
N
O
O
HO
H2 O
OH
O
O
O
O
O
O
O
OH2
OH2
O
O
O
OH2
OH2
OH2
H2 O
OH2
O
OH
OH
OH2
OH2
O
O
O
OH
OH
O
OH
O
OH
O
N
OH
H2 O
OH
HO
N
H2 O
OH2
OH2
HO
O
HO
O
N
N
N
OH
HO
N
O
N
OH
O
N
OH
O
OH
OH
OH
Figure 3. Linear interpolation between row-wise pairs of randomly chosen molecules in z-space of c = 40 in a conditional model. Color
legend: encoder inputs (green), chemically invalid graphs (red), valid graphs with wrong label (blue), valid and correct (white).
Decoder Quality Metrics. Our best model with c = 40
has archived Valid = 0.135, which is clearly worse than
for QM9. Using implicit node probabilities brought no
improvement. For comparison, CVAE failed to generated
any valid sample, while GVAE achieved Valid = 0.357
(models provided by Kusner et al. (2017), c = 56).
We attribute such a low performance to a generally much
higher chance of producing a chemically-relevant inconsistency (number of possible edges growing quadratically). To
confirm the relationship between performance and graph
size k, we kept only graphs not larger than k = 20 nodes,
corresponding to 21% of ZINC, and obtained Valid = 0.341
(and Valid = 0.185 for k = 30 nodes, 92% of ZINC). To
verify that the problem is likely not caused by our proposed
graph matching loss, we synthetically evaluate it in the following.
Matching Robustness. Robust behavior of graph matching using our similarity function S is important for good
performance of GraphVAE. Here we study graph matching
in isolation to investigate its scalability. To that end, we add
Gaussian noise N (0, A ), N (0, E ), N (0, F ) to each tensor of input graph G, truncating and renormalizing to keep
their probabilistic interpretation, to create its noisy version
GN . We are interested in the quality of matching between
self, P [G, G], using noisy assignment matrix X between G
and GN . The advantage to naive checking X for identity is
the invariance to permutation of equivalent nodes.
In Table 3 we vary k and for each tensor separately and
report mean accuracies (computed in the same fashion as
losses in Equation 3) over 100 random samples from ZINC
with size up to k nodes. While we observe an expected
fall of accuracy with stronger noise, the behavior is fairly
robust with respect to increasing k at a fixed noise level,
the most sensitive being the adjacency matrix. Note that
accuracies are not comparable across tables due to different
dimensionalities of random variables. We may conclude
that the quality of the matching process is not a major hurdle
to scalability.
5. Conclusion
In this work we addressed the problem of generating graphs
from a continuous embedding in the context of variational
autoencoders. We evaluated our method on two molecular datasets of different maximum graph size. While we
achieved to learn embedding of reasonable quality on small
molecules, our decoder had a hard time capturing complex
chemical interactions for larger molecules. Nevertheless,
we believe our method is an important initial step towards
more powerful decoders and will spark interesting in the
community.
There are many avenues to follow for future work. Besides
the obvious desire to improve the current method (for example, by incorporating a more powerful prior distribution
or adding a recurrent mechanism for correcting mistakes),
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
log pθ (G|z)
ELBO
Valid
Accurate
Unique
Novel
Cond.
Ours c = 20
Ours c = 40
Ours c = 60
Ours c = 80
-0.578
-0.504
-0.492
-0.475
-0.722
-0.617
-0.585
-0.557
0.565
0.511
0.520
0.458
0.467
0.416
0.406
0.353
0.314
0.484
0.583
0.666
0.598
0.635
0.613
0.661
Unconditional
Table 1. Performance on conditional and unconditional QM9 models evaluated by mean test-time reconstruction log-likelihood
(log pθ (G|z)), mean test-time evidence lower bound (ELBO), and decoding quality metrics (Section 4.2). Baselines CVAE (GómezBombarelli et al., 2016) and GVAE (Kusner et al., 2017) are listed only for the embedding size with the highest Valid.
Ours c = 20
Ours c = 40
Ours c = 60
Ours c = 80
NoGM c = 80
CVAE c = 60
GVAE c = 20
-0.660
-0.537
-0.486
-0.482
-2.388
–
–
-0.916
-0.744
-0.656
-0.628
-2.553
–
–
0.485
0.542
0.517
0.557
0.810
0.103
0.602
0.485
0.542
0.517
0.557
0.810
0.103
0.602
0.457
0.618
0.695
0.760
0.241
0.675
0.093
0.575
0.617
0.570
0.616
0.610
0.900
0.809
log pθ (G|z)
ELBO
Valid
Accurate
Unique
Novel
Cond.
Ours/imp c = 20
Ours/imp c = 40
Ours/imp c = 60
Ours/imp c = 80
-0.784
-0.671
-0.618
-0.627
-0.919
-0.776
-0.714
-0.713
0.572
0.611
0.566
0.583
0.482
0.518
0.448
0.451
0.238
0.307
0.416
0.475
0.718
0.665
0.710
0.681
Uncond.
Table 2. Performance on conditional and unconditional QM9 models with implicit node probabilities. Improvement with respect to
Table 1 is emphasized in italics.
Ours/imp c = 20
Ours/imp c = 40
Ours/imp c = 60
Ours/imp c = 80
-0.857
-0.737
-0.634
-0.642
-1.091
-0.932
-0.797
-0.777
0.533
0.562
0.587
0.571
0.533
0.562
0.587
0.571
0.228
0.420
0.459
0.520
0.610
0.758
0.730
0.719
Table 3. Mean accuracy of matching ZINC graphs to their noisy
counterparts in a synthetic benchmark as a function of maximum
graph size k.
Noise
k = 15
k = 20
k = 25
k = 30
k = 35
k = 40
A,E,F = 0
99.55
99.52
99.45
99.4
99.47
99.46
A = 0.4
A = 0.8
90.95
82.14
89.55
81.01
86.64
79.62
87.25
79.67
87.07
79.07
86.78
78.69
E = 0.4
E = 0.8
97.11
92.03
96.42
90.76
95.65
89.76
95.90
89.70
95.69
88.34
95.69
89.40
F = 0.4
F = 0.8
98.32
97.26
98.23
97.00
97.64
96.60
98.28
96.91
98.24
96.56
97.90
97.17
we would like to extend it beyond a proof of concept by applying it to real problems in chemistry, such as optimization
of certain properties or predicting chemical reactions. An
advantage of a graph-based decoder compared to SMILESbased decoder is the possibility to predict detailed attributes
of atoms and bonds in addition to the base structure, which
might be useful in these tasks. Our autoencoder might also
be used to pre-train graph encoders for fine-tuning on small
datasets (Goh et al., 2017).
ACKNOWLEDGMENTS
We thank Shell Xu Hu for discussions on variational methods, Shinjae Yoo for project motivation, and anonymous
reviewers for their comments.
References
Barabási, Albert-László and Albert, Réka. Emergence of
scaling in random networks. Science, 286(5439):509–
512, 1999.
Bengio, Samy, Vinyals, Oriol, Jaitly, Navdeep, and Shazeer,
Noam. Scheduled sampling for sequence prediction with
recurrent neural networks. In NIPS, pp. 1171–1179, 2015.
Bowman, Samuel R., Vilnis, Luke, Vinyals, Oriol, Dai,
Andrew M., Józefowicz, Rafal, and Bengio, Samy. Generating sentences from a continuous space. In CoNLL, pp.
10–21, 2016.
Bronstein, Michael M, Bruna, Joan, LeCun, Yann, Szlam,
Arthur, and Vandergheynst, Pierre. Geometric deep learn-
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
ing: going beyond euclidean data. IEEE Signal Processing Magazine, 34(4):18–42, 2017.
Cho, Minsu, Sun, Jian, Duchenne, Olivier, and Ponce, Jean.
Finding matches in a haystack: A max-pooling strategy
for graph matching in the presence of outliers. In CVPR,
pp. 2091–2098, 2014.
Date, Ketan and Nagi, Rakesh. Gpu-accelerated hungarian
algorithms for the linear assignment problem. Parallel
Computing, 57:52–72, 2016.
Erdos, Paul and Rényi, Alfréd. On the evolution of random
graphs. Publ. Math. Inst. Hung. Acad. Sci, 5(1):17–60,
1960.
Gilmer, Justin, Schoenholz, Samuel S., Riley, Patrick F.,
Vinyals, Oriol, and Dahl, George E. Neural message
passing for quantum chemistry. In ICML, pp. 1263–1272,
2017.
Goh, Garrett B., Siegel, Charles, Vishnu, Abhinav, and
Hodas, Nathan O. Chemnet: A transferable and generalizable deep neural network for small-molecule property
prediction. arXiv preprint arXiv:1712.02734, 2017.
Gómez-Bombarelli, Rafael, Duvenaud, David K.,
Hernández-Lobato, José Miguel, Aguilera-Iparraguirre,
Jorge, Hirzel, Timothy D., Adams, Ryan P., and
Aspuru-Guzik, Alán. Automatic chemical design using
a data-driven continuous representation of molecules.
CoRR, abs/1610.02415, 2016.
Gong, Shaogang and Xiang, Tao. Recognition of group
activities using dynamic probabilistic networks. In ICCV,
pp. 742–749, 2003.
Irwin, John J., Sterling, Teague, Mysinger, Michael M.,
Bolstad, Erin S., and Coleman, Ryan G. ZINC: A free tool
to discover chemistry for biology. Journal of Chemical
Information and Modeling, 52(7):1757–1768, 2012.
Jang, Eric, Gu, Shixiang, and Poole, Ben. Categorical reparameterization with gumbel-softmax. CoRR,
abs/1611.01144, 2016.
Johnson, Daniel D. Learning graphical state transitions. In
ICLR, 2017.
Kingma, Diederik P. and Welling, Max. Auto-encoding
variational bayes. CoRR, abs/1312.6114, 2013.
Ktena, Sofia Ira, Parisot, Sarah, Ferrante, Enzo, Rajchl,
Martin, Lee, Matthew C. H., Glocker, Ben, and Rueckert,
Daniel. Distance metric learning using graph convolutional networks: Application to functional brain networks.
In MICCAI, 2017.
Kusner, Matt J. and Hernández-Lobato, José Miguel. GANS
for sequences of discrete elements with the gumbelsoftmax distribution. CoRR, abs/1611.04051, 2016.
Kusner, Matt J., Paige, Brooks, and Hernández-Lobato,
José Miguel. Grammar variational autoencoder. In ICML,
pp. 1945–1954, 2017.
Landrum, Greg. RDKit: Open-source cheminformatics.
URL http://www.rdkit.org.
Li, Yujia, Swersky, Kevin, and Zemel, Richard S. Generative moment matching networks. In ICML, pp. 1718–
1727, 2015a.
Li, Yujia, Tarlow, Daniel, Brockschmidt, Marc, and Zemel,
Richard S. Gated graph sequence neural networks. CoRR,
abs/1511.05493, 2015b.
Makhzani, Alireza, Shlens, Jonathon, Jaitly, Navdeep, and
Goodfellow, Ian J. Adversarial autoencoders. CoRR,
abs/1511.05644, 2015.
McKay, Brendan D. and Piperno, Adolfo. Practical graph
isomorphism, II. Journal of Symbolic Computation, 60
(0):94 – 112, 2014. ISSN 0747-7171.
Olivecrona, Marcus, Blaschke, Thomas, Engkvist, Ola, and
Chen, Hongming. Molecular de novo design through
deep reinforcement learning. CoRR, abs/1704.07555,
2017.
Ramakrishnan, Raghunathan, Dral, Pavlo O, Rupp,
Matthias, and von Lilienfeld, O Anatole. Quantum chemistry structures and properties of 134 kilo molecules. Scientific Data, 1, 2014.
Segler, Marwin H. S., Kogej, Thierry, Tyrchan, Christian,
and Waller, Mark P. Generating focussed molecule libraries for drug discovery with recurrent neural networks.
CoRR, abs/1701.01329, 2017.
Simonovsky, Martin and Komodakis, Nikos. Dynamic edgeconditioned filters in convolutional neural networks on
graphs. In CVPR, 2017.
Snijders, Tom A.B. and Nowicki, Krzysztof. Estimation
and prediction for stochastic blockmodels for graphs with
latent block structure. Journal of Classification, 14(1):
75–100, Jan 1997.
Sohn, Kihyuk, Lee, Honglak, and Yan, Xinchen. Learning
structured output representation using deep conditional
generative models. In NIPS, pp. 3483–3491, 2015.
Stewart, Russell, Andriluka, Mykhaylo, and Ng, Andrew Y.
End-to-end people detection in crowded scenes. In CVPR,
pp. 2325–2333, 2016.
GraphVAE: Towards Generation of Small Graphs Using Variational Autoencoders
Theis, Lucas, van den Oord, Aäron, and Bethge, Matthias.
A note on the evaluation of generative models. CoRR,
abs/1511.01844, 2015.
architecture, we train it as unregularized in this section,
i.e. with a deterministic encoder and without KL-divergence
term in Equation 1.
Vinyals, Oriol, Bengio, Samy, and Kudlur, Manjunath. Order matters: Sequence to sequence for sets. arXiv preprint
arXiv:1511.06391, 2015.
Unconditional models for QM9 achieve mean test loglikelihood log pθ (G|z) of roughly −0.37 (about −0.50
for the implicit node probability model) for all c ∈
{20, 40, 60, 80}. While these log-likelihoods are significantly higher than in Tables 1 and 2, our architecture can
not achieve perfect reconstruction of inputs. We were successful to increase training log-likelihood to zero only on
fixed small training sets of hundreds of examples, where
the network could overfit. This indicates that the network
has problems finding generally valid rules for assembly of
output tensors.
Williams, Ronald J. and Zipser, David. A learning algorithm
for continually running fully recurrent neural networks.
Neural Computation, 1(2):270–280, 1989.
Xu, Danfei, Zhu, Yuke, Choy, Christopher Bongsoo, and
Fei-Fei, Li. Scene graph generation by iterative message
passing. In CVPR, 2017.
Yu, Lantao, Zhang, Weinan, Wang, Jun, and Yu, Yong.
Seqgan: Sequence generative adversarial nets with policy
gradient. In AAAI, 2017.
Appendix
A. Max-Pooling Matching
In this section we briefly review max-pooling matching algorithm of Cho et al. (2014). In its relaxed form, a continuous
correspondence matrix X ∗ ∈ [0, 1]k×n between nodes of
e is determined based on similarities of node
graphs G and G
e represented as matrix elements
pairs i, j ∈ G and a, b ∈ G
+
Sia;jb ∈ R .
Let x∗ denote the column-wise replica of X ∗ . The relaxed
graph matching problem is expressed as quadratic
Pn programming task x∗ = arg maxx xT Sx such that i=1 xia ≤ 1,
Pk
kn
a=1 xia ≤ 1, and x ∈ [0, 1] . The optimization strategy
of choice is derived to be equivalent to the power method
with iterative update rule x(t+1) = Sx(t) /||Sx(t) ||2 . The
starting correspondences x(0) are initialized as uniform and
the rule is iterated until convergence; in our use case we run
for a fixed amount of iterations.
In the context of graph matching, the matrix-vector product
Sx can be interpreted as P
sum-pooling
P over match candidates: xia ← xia Sia;ia + j∈Ni b∈Na xjb Sia;jb , where
Ni and Na denote the set of neighbors of node i and a.
The authors argue that this formulation is strongly influenced by uninformative or irrelevant elements and propose a more robust max-pooling version, which considers only the best pairwise
similarity from each neighbor:
P
xia ← xia Sia;ia + j∈Ni maxb∈Na xjb Sia;jb .
B. Unregularized Autoencoder
The regularization in VAE works against achieving perfect
reconstruction of training data, especially for small embedding sizes. To understand the reconstruction ability of our
| 9cs.NE
|
UNIVERSAL QUANTUM COMPUTING
AND THREE-MANIFOLDS
arXiv:1802.04196v2 [quant-ph] 19 Feb 2018
MICHEL PLANAT†, RAYMOND ASCHHEIM‡,
MARCELO M. AMARAL‡ AND KLEE IRWIN‡
Abstract. A single qubit may be represented on the Bloch sphere or
similarly on the 3-sphere S 3 . Our goal is to dress this correspondence by
converting the language of universal quantum computing (uqc) to that
of 3-manifolds. A magic state and the Pauli group acting on it define a
model of uqc as a POVM that one recognizes to be a 3-manifold M 3 . E.
g., the d-dimensional POVMs defined from subgroups of finite index of
the modular group P SL(2, Z) correspond to d-fold M 3 - coverings over
the trefoil knot. In this paper, one also investigates quantum information
on a few ‘universal’ knots and links such as the figure-of-eight knot,
the Whitehead link and Borromean rings , making use of the catalog
of platonic manifolds available on SnapPy [4] . Further connections
between POVMs based uqc and M 3 ’s obtained from Dehn fillings are
explored.
PACS: 03.67.Lx, 03.65.Wj, 03.65.Aa, 02.20.-a, 02.10.Kn, 02.40.Pc, 02.40.Sf
MSC codes: 81P68, 81P50, 57M25, 57R65, 14H30, 20E05, 57M12
Keywords: quantum computation, IC-POVMs, knot theory, three-manifolds, branch
coverings, Dehn surgeries.
Manifolds are around us in many guises.
As observers in a three-dimensional world, we are most familiar with twomanifolds: the surface of a ball or a doughnut or a pretzel, the surface of a
house or a tree or a volleyball net...
Three-manifolds may be harder to understand at first. But as actors and
movers in a three-dimensional world, we can learn to imagine them as alternate universes. [1]
1. Introduction
Mathematical concepts pave the way for improvements in technology. As
far as topological quantum computation is concerned, non abelian anyons
have been proposed as an attractive (fault tolerant) alternative to standard
quantum computing which is based on a universal set of quantum gates
[5, 6, 7, 8]. Anyons are two-dimensional quasiparticles with world lines
forming braids in space-time. Whether non abelian anyons do exist in the
real world and/or would be easy to create artificially is still open to discussion. Three-dimensional topological quantum computing beyond anyons [9]
still is not well developed although, as it will be shown in this essay, it is
a straightforward consequence of a set of ideas belonging to standard universal quantum computation (uqc) and simultaneously to three-dimensional
topology. For quantum computation, we have in mind the concepts of magic
states and the related positive-operator valued measures (POVMs) that were
1
MICHEL PLANAT†, RAYMOND ASCHHEIM‡, MARCELO M. AMARAL‡ AND KLEE IRWIN‡
2
investigated in detail in [10, 11, 12]. For three-dimensional topology, the
starting point consists of the Poincaré and Thurston conjectures, now theorems [1]. Three-dimensional topological quantum computing would federate
the foundations of quantum mechanics and cosmology, a recurrent dream of
many physicists. Three-dimensional topology was already investigated by
several groups in the context of quantum information [13, 14], high energy
physics [15, 16], biology [17] and consciousness studies [18].
1.1. From Poincaré conjecture to uqc. Poincaré conjecture is the elementary (but deep) statement that every simply connected, closed 3-manifold
is homeomorphic to the 3-sphere S 3 [19]. Having in mind the correspondence
between S 3 and the Bloch sphere that houses the qubits ψ = a |0i + b |1i,
a, b ∈ C, |a|2 +|b|2 = 1, one would desire a quantum translation of this statement. For doing this, one may use the picture of the Riemann sphere C ∪ ∞
in parallel to that of the Bloch sphere and follow F. Klein lectures on the
icosahedron to perceive the platonic solids within the landscape [20]. This
picture fits well the Hopf fibrations [21], their entanglements described in
[22, 23] and quasicrystals [25, 24]. But we can be more ambitious and dress
S 3 in an alternative way that reproduces the historic thread of the proof
of Poincaré conjecture. Thurston’s geometrization conjecture, from which
Poincaré conjecture follows, dresses S 3 as a 3-manifold not homeomorphic
to S 3 . The wardrobe of 3-manifolds M 3 is huge but almost every dress is
hyperbolic and W. Thurston found the recipes for them [1]. Every dress is
identified thanks to a signature in terms of invariants. For our purpose, the
fundamental group π1 of M 3 does the job.
The three-dimensional space surrounding a knot K -the knot complement
S 3 \ K- is an example of a three-manifold [1, 26]. We will be especially
interested by the trefoil knot that underlies work of the first author [2]
as well as the figure-of-eight knot, the Whitehead link and the Borromean
rings because they are universal (in a sense described below), hyperbolic and
allows to build 3-manifolds from platonic manifolds [4]. Such manifolds carry
a quantum geometry corresponding to quantum computing and (possibly
informationally complete: IC) POVMs identified in our earlier work [2, 11,
12].
According to [3], the knot K and the fundamental group G = π1 (S 3 \ K)
are universal if every closed and oriented 3-manifold M 3 is homeomorphic
to a quotient H/G of the hyperbolic 3-space H by a subgroup H of finite
index d of G. The figure-of-eight knot and the Whitehead link are universal.
The catalog of the finite index subgroups of their fundamental group G and
of the corresponding 3-manifolds defined from the d-fold coverings [27] can
easily been established up to degree 8, using the software SnapPy [28].
In paper [2] of the first author, it has been found that d-dimensional
IC-POVMs may be built from finite index subgroups of the modular group
Γ = P SL(2, Z). To an IC is associated a subgroup of index d of Γ, a fundamental domain in the Poincaré upper-half plane and a signature in terms of
genus, elliptic points and cusps as summarized in [2, Fig. 1]. There exists a
relationship between the modular group Γ and the trefoil knot T1 since the
fundamental group π1 (S 3 \ T1 ) of the knot complement is the braid group
B3 , the central extension of Γ. But the trefoil knot and the corresponding
UNIVERSAL QUANTUM COMPUTING
AND THREE-MANIFOLDS
3
Figure
1. (a)
The
figure-of-eight
knot:
K4a1=otet0200001 = m004, (b) the Whitehead link
L5a1 =ooct0100001 = m129, (c) Borromean rings
L6a4 =ooct0200005 = t12067.
braid group B3 are not universal [29] which forbids the relation of the finite
index subgroups of B3 to all three-manifolds.
It is known that two coverings of a manifold M with fundamental group
G = π1 (M ) are equivalent if there exists a homeomorphism between them.
Besides, a d-fold covering is uniquely determined by a subgroup of index d
of the group G and the inequivalent d-fold coverings of M correspond to
conjugacy classes of subgroups of G [27]. In this paper we will fuse the
concepts of a three-manifold M 3 attached to a subgroup H of index d and
the POVM, possibly informationally complete (IC), found from H (thanks
to the appropriate magic state and related Pauli group factory).
Figure 2. (a) The trefoil knot T1 = K3a1 = 31 , (b) the
link L7n1 associated to the Hesse SIC, (c) the link L6a3
associated to the two-qubit IC.
1.2. Minimal informationally complete POVMs and uqc. In our approach [12, 2], minimal informationally complete (IC) POVMs are derived
MICHEL PLANAT†, RAYMOND ASCHHEIM‡, MARCELO M. AMARAL‡ AND KLEE IRWIN‡
4
from appropriate fiducial states under the action of the (generalized) Pauli
group. The fiducial states also allow to perform universal quantum computation [11].
A POVM is a collection of positive semi-definite operators {E1 , . . . , Em }
that sum to the identity. In the measurement of a state ρ, the i-th outcome
is obtained with a probability given by the Born rule p(i) = tr(ρEi ). For a
minimal IC-POVM, one needs d2 one-dimensional projectors Πi = |ψi i hψi |,
with Πi = dEi , such that the rank of the Gram matrix with elements
tr(Πi Πj ), is precisely d2 . A SIC-POVM (the S means symmetric) obeys
dδij +1
, that allows the explicit recovery
the relation|hψi |ψj i|2 = tr(Πi Πj ) = d+1
of the density matrix as in [30, eq. (29)].
New minimal IC-POVMs (i.e. whose rank of the Gram matrix is d2 ) and
with Hermitian angles |hψi |ψj i|i6=j ∈ A = {a1 , . . . , al } have been discovered
1
. The states en[2]. A SIC is equiangular with |A| = 1 and a1 = √d+1
countered are considered to live in a cyclotomic field F = Q[exp( 2iπ
n )], with
n = GCD(d, r), the greatest common divisor of d and r, for some r. The
1
Hermitian angle is defined as |hψi |ψj i|i6=j = k(ψi , ψj )k deg , where k.k means
the field norm of the pair (ψi , ψj ) in F and deg is the degree of the extension
F over the rational field Q [12].
The fiducial states for SIC-POVMs are quite difficult to derive and seem
to follow from algebraic number theory [31]. Except for d = 3, the ICPOVMs derived from permutation groups are not symmetric and most of
them can be recovered thanks to subgroups of index d of the modular group
Γ [2, Table 2]. For instance, for d = 4, the action of the two-qubit Pauli
group on the magic/fiducial state of type (0, 1, −ω, ω − 1) with ω = exp( iπ
3)
results into an IC whose geometry of triple products of projectors Πi , arising
from the the congruence subgroup Γ0 (3) of Γ, turns out to correspond to
the commutation graph of Pauli operators [2, Fig.2]. For d = 5, all five
congruence subgroups Γ′ , Γ(2), 3C 0 , Γ0 (4) or Γ0 (5) point out the geometry
of Borromean rings (see [2, Fig.2] and Table 1 below).
While Γ serves as a motivation for investigating the trefoil knot manifold in relation to uqc and the corresponding ICs, it is important to put
the uqc problem in the wider frame of Poincaré conjecture, the Thurston’s
geometrization conjecture and the related 3-manifolds. E.g. ICs may also
follow from hyperbolic or Seifert 3-manifolds as shown in tables 2 to 5 of
this paper.
1.3. Organization of the paper. The paper runs as follows. Sec. 2 deals
about the relationship between quantum information seen from the modular group Γ and from the trefoil knot 3-manifold. Sec. 3 deals about
the (platonic) 3-manifolds related to coverings over the figure-of-eight knot,
Whitehead link and Borromean rings, and how they relate to a few known
IC-POVMs. Sec. 4 describes the important role played by Dehn fillings
for describing the many types of 3-manifolds that may relate to topological
quantum computing.
UNIVERSAL QUANTUM COMPUTING
AND THREE-MANIFOLDS
5
2. Quantum information from the modular group Γ and the
related trefoil knot T1
In this section, we describe the results established in [2] in terms of the 3manifolds corresponding to coverings of the trefoil knot complement S 3 \ T1 .
d
2
3
.
4
.
.
5
.
6
.
.
.
.
.
.
.
7
.
.
8
.
.
.
ty
hom
cp gens CS link
type in [2]
1
cyc
1
2
-1/6
+
1
3
irr
1+1
2 2
1/4 L7n1 Γ0 (2), Hesse SIC
1
1
+
+
1
cyc
1
3
.
A4
2
2
irr
1+1
2 2
1/6 L6a3
Γ0 (3), 2QB IC
1
irr
1 3
.
4A0 , 2QB-IC
2 +1
1
cyc
1 2
.
S4
3 +1
cyc
1
1 2
5/6
A5
1
irr
1 3
.
5A0 , 5-dit IC
3 +1
reg
1+1+1
3 3
0 L6n1
Γ(2), 6-dit IC
cyc
1+1+1
1 3
. L6n1
Γ′ , 6-dit IC
irr
1+1+1
3 3
.
1
irr
2
3
.
3C 0 , 6-dit IC
+
1
+
1
2
1
irr
2 3
.
Γ0 (4), 6-dit IC
2 +1+1
1
irr
2 3
.
Γ0 (5), 6-dit IC
2 +1+1
irr 12 + 21 + 12 + 1 1 4
.
1
1
irr
1 3
.
3 + 3 +1
cyc
1
1 2
-5/6
irr
1+1
2 3
.
NC 7-dit IC
1
1
irr
1 4
.
7A0 7-dit IC
2 + 2 +1
irr
1+1
2 2
-1/6
1
cyc
2
2
.
+
1
3
1
cyc
2 3
.
3 +1+1
1
cyc
1
4
.
8A0 , ∼ 8-dit IC
+
1
6
Table 1. Coverings of degree d over the trefoil knot found
from SnapPy [28]. The related subgroup of modular group Γ
and the corresponding IC-POVM [2] (when applicable) is in
the right column. The covering is characterized by its type
ty, homology group hom (where 1 means Z), the number of
cusps cp, the number of generators gens of the fundamental
group, the Chern-Simons invariant CS and the type of link
it represents (as identified in SnapPy). The case of cyclic
coverings corresponds to Brieskorn 3-manifolds as explained
in the text: the spherical groups for these manifolds is given
at the right hand side column.
Let us introduce to the group representation of a knot complement π1 (S 3 \
K). A Wirtinger representation is a finite representation of π1 where the
relations are the form wgi w−1 = gj where w is a word in the k generators
{g1 , · · · , gk }. For the trefoil knot T1 = K3a1 = 31 sown in Fig. 2a, a
MICHEL PLANAT†, RAYMOND ASCHHEIM‡, MARCELO M. AMARAL‡ AND KLEE IRWIN‡
6
Wirtinger representation is [32]
π1 (S 3 \ T1 ) = hx, y|yxy = xyxi or equivalently π1 = x, y|y 2 = x3 .
In the rest of the paper, the number of d-fold coverings of the manifold
corresponding to the knot T will be displayed as the ordered list ηd (T ),
d ∈ {1..10 . . .}. For T1 it is
M3
ηd (T1 ) = {1, 1, 2, 3, 2, 8, 7, 10, 18, 28, . . .}.
Details about the corresponding d-fold coverings are in Table 1. As expected, the coverings correspond to subgroups of index d of the fundamental
group associated to the trefoil knot T1 .
Cyclic branched coverings over the trefoil knot. Let p, q, r be three positive
integers (with p ≤ q ≤ r), the Brieskorn 3-manifold Σ(p, q, r) is the intersection in C3 of the 5-sphere S 5 with the surface of equation z1p + z2q + z3r = 1.
In [34], it is shown that a r-fold cyclic covering over S 3 branched along
a torus knot or link of type (p, q) is a Brieskorn 3-manifold Σ(p, q, r) (see
also Sec 4.1). For the spherical case p−1 + q −1 + r −1 > 1, the group associated to a Brieskorn manifold is either dihedral [that is the group Dr
for the triples (2, 2, r)], tetrahedral [that is A4 for (2, 3, 3)], octahedral [that
is S4 for (2, 3, 4)] or icosahedral [that is A5 for (2, 3, 5)]. The Euclidean
case p−1 + q −1 + r −1 = 1 corresponds to (2, 3, 6), (2, 4, 4) or (3, 3, 3). The
remaining cases are hyperbolic.
The cyclic branched coverings with spherical groups for the trefoil knot
[which is of type (2, 3)] are identified in right hand side column of Table 1.
Irregular branched coverings over the trefoil knot. The right hand side column of Table 1 shows the subgroups of Γ identified in [2, Table 1] as corresponding to an IC-POVM. In particular, the Hesse SIC [already found
associated to the congruence subgroup Γ0 (2)] corresponds to the 7-crossing
link L7n1 while the two-qubit IC [already found associated to the congruence subgroup Γ0 (3)] corresponds to the 6- crossing link L6a3. The trefoil
knot and the former two links are pictured in Fig. 2.
Five coverings of degree 6 allow the construction of the (two-valued) 6-dit
IC-POVM whose geometry contain the picture of Borromean rings [2, Fig.
2c]. The corresponding congruence subgroups of Γ are identified in table 1.
The first two, viz Γ(2) and Γ′ , define 3-manifolds whose fundamental group
is the same than the one of the link L6n1, alias the Borromean rings with
surgeries of slope (0, 1) on two cusps (see Sect. 4 for more on this topic). The
other three coverings leading to the 6-dit IC are the congruence subgroups
3C 0 , Γ0 (4) and Γ0 (5).
3. Quantum information from universal knots and links
3.1. Three-manifolds pertaining to the figure-of-eight knot. The
fundamental group for the figure-of-eight knot K0 is
π1 (S 3 \ K0 ) = x, y|y ∗ x ∗ y −1 xy = xyx−1 yx .
and the number of d-fold coverings is in the list
ηd (K0 ) = {1, 1, 1, 2, 4, 11, 9, 10, 11, 38, . . .}.
UNIVERSAL QUANTUM COMPUTING
AND THREE-MANIFOLDS
7
Table 2 establishes the list of 3-manifolds corresponding to subgroups
of index d ≤ 7 of the universal group G = π1 (S 3 \ K0 ). The manifolds
are labeled otetNn in [4] because they are oriented and built from N = 2d
tetrahedra, with n an index in the table. The identification of 3-manifolds of
finite index subgroups of G was first obtained by comparing the cardinality
list ηd (H) of the corresponding subgroup H to that of a fundamental group
of a tetrahedral manifold in SnapPy table [28]. But of course there is more
straightforward way to perform this task by identifying a subgroup H to a
degree d covering of K0 [27]. The full list of d-branched coverings over the
figure eight knot up to degree 8 is available in SnapPy. Extra invariants
of the corresponding M 3 may be found there. In addition, the lattice of
branched coverings over K0 was investigated in [35].
ty
M3
cp
cyc
otet0400002 , m206
1
cyc
otet0600003 , s961
1
irr otet0800002 , L10n46, t12840 2
cyc
otet0800007 , t123839
1
5 cyc
otet1000019
1
irr
otet1000006 , L8a20
3
irr
otet1000026
2
6 cyc
otet1200013
1
irr
otet1200041
2
irr
otet1200039 , otet1200038
1
irr
otet1200017
2
irr
otet1200000
2
7 cyc
otet1400019
1
irr
otet1400002 , L14n55217
3
irr
otet1400035
1
d
2
3
4
rk
2
3
4
16
21
15,21
25
28
36
31
33
36
43
49
49
pp
comment
1
Mom-4s [36]
2-qubit IC
1
5-dit IC
2
6-dit IC
2
6-dit IC
2
2
7-dit IC
7-dit IC
Table 2. Table of 3-manifolds M 3 found from subgroups of
finite index d of the fundamental group π1 (S 3 \K0 ) (alias the
d-fold coverings of K0 ). The terminology in column 3 is that
of Snappy [28]. The identified M 3 is made of 2d tetrahedra
and has cp cusps. When the rank rk of the POVM Gram
matrix is d2 the corresponding IC-POVM shows pp distinct
values of pairwise products as shown.
Let us give more details about the results summarized in Table 2. Using Magma, the conjugacy class of subgroups of index 2 in the fundamental group G is represented by the subgroup on three generators and two
relations as follows H = x, y, z|y −1 zx−1 zy −1 x−2 , z −1 yxz −1 yz −1 xy , from
which the sequence of subgroups of finite index can be found as ηd (M 3 ) =
{1, 1, 5, 6, 8, 33, 21, 32, · · · }. The manifold M 3 corresponding to this sequence
is found in Snappy as otet0400002 , alias m206.
The conjugacy class of subgroups of index 3 in G is represented as
H = x, y, z|x−2 zx−1 yz 2 x−1 zy −1 , z −1 xz −2 xz −2 y −1 x−2 zy ,
MICHEL PLANAT†, RAYMOND ASCHHEIM‡, MARCELO M. AMARAL‡ AND KLEE IRWIN‡
8
with ηd (M 3 ) = {1, 7, 4, 47, 19, 66, 42, 484, · · · } corresponding to the manifold
otet0600003 , alias s961.
As shown in Table 2, there are two conjugacy classes of subgroups of
index 4 in G corresponding to tetrahedral manifolds otet0800002 (the permutation group P organizing the cosets is Z4 ) and otet0800007 (the permutation group organizing the cosets is the alternating group A4 ). The latter
group/manifold has fundamental group
Figure 3. Two platonic three-manifolds leading to the construction of the two-qubit IC-POVM. Details are given in
Tables 2 and 3.
H = x, y, z|yx−1 y −1 z −1 xy −2 xyzx−1 y, zx−1 yx−1 yx−1 zyx−1 y −1 z −1 xy −1 ,
with cardinality sequences of subgroups as ηd (M 3 ) = {1, 3, 8, 25, 36, 229, 435 · · · }.
To H is associated an IC-POVM [12, 2] which follows from the action of the
two-qubit Pauli group on a magic/fiducial state of type (0, 1, −ω6 , ω6 − 1),
with ω6 = exp(2iπ/6) a six-root of unity.
For index 5, there are three types of 3-manifolds corresponding to the
subgroups H. The tetrahedral manifold otet1000026 of sequence ηd (M 3 ) =
{1, 7, 15, 88, 123, 802, 1328 · · · }, is associated to a 5-dit equianguler IC-POVM,
as in [12, Table 5].
For index 6, the 11 coverings define six classes of 3-manifolds and two of
them: otet1200041 and otet1200000 are related to the construction of ICs. For
index 7, one finds three classes of 3-manifolds with two of them: otet1400002
(alias L14n55217) and otet1400035 are related to ICs. Finally, for index 7,
3 types of 3-manifolds exist, two of them relying on the construction of the
7-dit (two-valued) IC. For index 8, there exists 6 distinct 3-manifolds (not
shown) none of them leading to an IC.
A two-qubit tetrahedral manifold. The tetrahedral three-manifold otet0800007
is remarkable in the sense that it corresponds to the subgroup of index 4
of G that allows the construction of the two-qubit IC-POVM. The corresponding hyperbolic polyhedron taken from SnapPy is shown in Fig. 3a. Of
UNIVERSAL QUANTUM COMPUTING
d
2
3
4
5
6
ty
M3
cp
cyc ooct0200003 , t12066, L8n5 3
cyc
ooct0200018 , t12048
2
cyc
ooct0300011 , L10n100
4
cyc
ooct0300018
2
irr
ooct0300014 , L12n1741
3
irr
ooct0400058
4
irr
ooct0400061
3
irr
ooct0500092
3
irr
ooct0500285
2
irr
ooct0500098 , L13n11257
4
cyc
ooct0606328
5
irr
ooct0601972
3
irr
ooct0600471
4
AND THREE-MANIFOLDS
rk
2
2
3
3
9
16
16
25
25
25
36
36
36
pp
1
2
2
1
1
1
2
2
2
9
comment
Mom-4s[36]
Mom-4s[36]
qutrit Hesse SIC
2-qubit IC
2-qubit IC
5-dit IC
5-dit IC
5-dit IC
6-dit IC
6-dit IC
6-dit IC
Table 3. A few 3-manifolds M 3 found from subgroups of
the fundamental group associated to the Whitehead link. For
d ≥ 4, only the M 3 ’s leading to an IC are listed.
Figure 4. (a) The link L12n1741 associated to the qutrit
Hesse SIC, (b) The octahedral manifold ooct0300014 associated to the 2-qubit IC.
the 29 orientable tetrahedral manifolds with at most 8 tetrahedra, 20 are
two-colorable and each of those has at most 2 cusps. The 4 three-manifolds
(with at most 8 tetrahedra) identified in Table 2 belong to the 20’s and
the two-qubit tetrahedral manifold otet0800007 is one with just one cusp [37,
Table 1].
3.2. Three-manifolds pertaining to the Whitehead link. One could
also identify the 3-manifold substructure of another universal object, viz the
Whitehead link L0 [33].
MICHEL
10
PLANAT†, RAYMOND ASCHHEIM‡, MARCELO M. AMARAL‡ AND KLEE IRWIN‡
The cardinality list corresponding to the Whitehead link group π1 (L0 ) is
ηd (L0 ) = {1, 3, 6, 17, 22, 79, 94, 412, 616, 1659 . . .},
Table 3 shows that the identified 3-manifolds for index d subgroups of π1 (L0 )
are aggregates of d octahedra. In particular, one finds that the qutrit Hesse
SIC can be built from ooct0300014 and that the two-qubit IC-POVM may be
buid from ooct0400058 . The hyperbolic polyhedron for the latter octahedral
manifold taken from SnapPy is shown on Fig. 3b. The former octahedral
manifold follows from the link L12n1741 shown in Fig. 4a and the corresponding polyhedron taken from SnapPy is shown in Fig. 4b.
d
2
.
.
3
.
.
.
.
.
ty
hom
1
1
cyc
+
+
1+1+1
2
2
1
.
+
1
+
1
+1+1
2
.
1+1+1+1+1
1
1
cyc
3 + 3 +1+1+1
1
.
3 +1+1+1+1+1
.
1+1+1+1+1+1+1+1
irr
1+1+1+1
.
1+1+1+1+1+1
.
1+1+1+1+1+1
cp
3
4
5
3
5
7
4
4
5
M3
comment
ooct0400259
ooct0400055
ooct0400048 , L12n2226
ooct0607427 Hesse SIC
ooct0600463 Hesse SIC
ooct0600411
ooct0600466 Hesse SIC
ooct0600398
ooct0600407 , L14n63856
Table 4. Coverings of degrees 2 and 3 over the M 3 branched
along the Borromean rings. The identification of the corresponding hyperbolic 3-manifold is at the 5th column. It is
seen at the right hand side column that only three types of
3-manifolds allow to build the Hesse SIC.
3.3. A few three-manifolds pertaining to Borromean rings. Three-manifolds
corresponding to coverings of degree 2 and 3 of the 3-manifold branched along the
Borromean rings L6a4 [that is a not a (3,3)-torus link but an hyperbolic link] (see
Fig. 1c) are given in Table 4. The identified manifolds are hyperbolic octahedral
manifolds of volume 14.655 (for the degree 2) and 21.983 (for the degree 3).
4. A few Dehn fillings and their POVMs
To summarize our findings of the previous section, we started from a building
block, a knot (viz the trefoil knot T1 ) or a link (viz the figure-of-eight knot K0 )
whose complement in S 3 is a 3-manifold M 3 . Then a d-fold covering of M 3 was
used to build a d-dimensional POVM, possibly an IC. Now we apply a kind of
‘phase surgery’ on the knot or link that transforms M 3 and the related coverings
while preserving some of the POVMs in a way to be determined. We will start
with our friend T1 and arrive at a few standard 3-manifolds of historic importance,
the Poincaré homology sphere [alias the Brieskorn sphere Σ(2, 3, 5)], the Brieskorn
sphere Σ(2, 3, 7) and a Seifert fibered toroidal manifold Σ′ . Then we introduce
the 3-manifold ΣY resulting from 0-surgery on the figure-of-eight knot [42]. Later
in this section, we will show how to use the {3, 5, 3} Coxeter lattice and surgery
to arrive at a hyperbolic 3-manifold Σ120e of maximal symmetry whose several
coverings (and related POVMs) are close to the ones of the trefoil knot [38].
Let us start with a Lens space L(p, q) that is 3-manifold obtained by gluing the
boundaries of two solid tori together, so that the meridian of the first solid torus
UNIVERSAL QUANTUM COMPUTING
AND THREE-MANIFOLDS
11
T
Name
ηd (T )
T1
trefoil
{1,1,2,3,2, 8,7,10,10,28, 27,88,134,171,354}
T1 (−1, 1)
Σ(2, 3, 5)
{1,0,0,0,1, 1,0,0,0,1, 0,1,0,0,1}
T1 (1, 1)
Σ(2, 3, 7)
{1,0,0,0,0, 0,2,1,1,0, 0,0,0,9,3}
T1 (0, 1)
Σ′
{1,1,2,2,1, 5,3,2,4,1, 1,12,3,3,4}
K0 (0, 1)
ΣY
{1,1,1,2,2, 5,1,2,2,4, 3,17,1,1,2}
v2413 (−3, 2)
Σ120e
{1,1,1,4,1, 7,2,25,3,10 10,62,1,30,23}
Table 5. A few surgeries (column 1), their name (column 2)
and the cardinality list of d-coverings (alias conjugacy classes
of subgroups). Plain characters are used to point out the
possible construction of an IC-POVM in at least one the
corresponding three-manifolds (see [2] and Sec. 2 for the ICs
corresponding to T1 ).
goes to a (p, q)-curve on the second solid torus [where a (p, q)-curve wraps around
the longitude p times and around the meridian q times]. Then we generalize this
concept to a knot exterior, i.e. the complement of an open solid torus knotted like
the knot. One glues a solid torus so that its meridian curve goes to a (p, q)-curve
on the torus boundary of the knot exterior, an operation called Dehn surgery [1,
p. 275],[26, p 259],[39]. According to Lickorish’s theorem, every closed, orientable,
connected 3-manifold is obtained by performing Dehn surgery on a link in the
3-sphere.
4.1. A few surgeries on the trefoil knot.
The Poincaré homology sphere. The Poincaré dodecahedral space (alias the Poincaré
homology sphere) was the first example of a 3-manifold not the 3-sphere. It can be
obtained from (−1, 1) surgery on the trefoil knot T1 [40].
Let p, q, r be three positive integers and mutually coprime, the Brieskorn sphere
Σ(p, q, r) is the intersection in C3 of the 5-sphere S 5 with the surface of equation
z1p + z2q + z3r = 1. The homology of a Brieskorn sphere is that of the sphere S 3 .
A Brieskorn sphere is homeomorphic but not diffeomorphic to S 3 . The sphere
Σ(2, 3, 5) may be identified to the Poincaré homology sphere. The sphere Σ(2, 3, 7)
[42] may be obtained from (1, 1) surgery on T1 . Table 5 provides the sequences ηd
for the corresponding surgeries (±1, 1) on T1 . Plain digits in these sequences point
out the possibility of building ICs of the corresponding degree. This corresponds
to a considerable filtering of the ICs coming from T1 .
For instance, the smallest IC from Σ(2, 3, 5) has dimension five and is precisely
the one coming from the congruence subgroup 5A0 in Table 1. But it is built from a
non modular (fundamental) group whose permutation representation of the cosets
is the alternating group A5 ∼
= h(1, 2, 3, 4, 5), (2, 4, 3)i (compare [12, Sec. 3.3]).
The smallest dimensional IC derived from Σ(2, 3, 7) is 7-dimensional and twovalued, the same than the one arising from the congruence subgroup 7A0 given in
Table 1. But it arises from a non modular (fundamental) group with the permutation representation of cosets as P SL(2, 7) ∼
= h(1, 2, 4, 6, 7, 5, 3), (2, 5, 3)(4, 6, 7)i.
4.2. The Seifert fibered toroidal manifold Σ′ . An hyperbolic knot (or link)
in S 3 is one whose complement is 3-manifold M 3 endowed with a complete Riemannian metric of constant negative curvature, i.e. it has a hyperbolic geometry
and finite volume. A Dehn surgery on a hyperbolic knot is exceptional if it is reducible, toroidal or Seifert fibered (comprising a closed 3-manifold together with a
MICHEL
12
PLANAT†, RAYMOND ASCHHEIM‡, MARCELO M. AMARAL‡ AND KLEE IRWIN‡
decomposition into a disjoint union of circles called fibers). All other surgeries are
hyperbolic. These categories are exclusive for a hyperbolic knot. In contrast, a non
hyperbolic knot such as the trefoil knot admits a toroidal Seifert fiber surgery Σ′
obtained by (0, 1) Dehn filling on T1 [41].
The smallest dimensional ICs built from Σ′ are the Hesse SIC that is obtained
from the congruence subgroup Γ0 (2) (as for the trefoil knot) and the two-qubit IC
that comes from a non modular fundamental group [with cosets organized as the
alternating group A4 ∼
= h(2, 4, 3), (1, 2, 3)i].
4.3. Akbulut’s manifold ΣY . Exceptional Dehn surgery at slope (0, 1) on the
figure-of-eight knot K0 leads to a remarkable manifold ΣY found in [42] in the
context of 3-dimensional integral homology spheres smoothly bounding integral
homology balls. Apart from its topological importance, we find that some of its
coverings are associated to already discovered ICs and those coverings have the
same fundamental group π1 (ΣY ).
The smallest IC-related covering (of degree 4) occurs with integral homology Z
and the congruence subgroup Γ0 (3) also found from the trefoil knot (see Table 1).
Next, the covering of degree 6 and homology Z5 + Z leads to the 6-dit IC of type 3C 0
(also found from the trefoil knot). The next case corresponds to the (non-modular)
11-dimensional (3-valued) IC.
4.4. The hyperbolic manifold Σ120e . The hyperbolic manifold closest to the
trefoil knot manifold known to us was found in [38]. The goal in [38] is the search
of -maximally symmetric- fundamental groups of 3-manifolds. In two dimensions,
maximal symmetry groups are called Hurwitz groups and arise as quotients of
the (2, 3, 7)-triangle groups. In three dimensions, the quotients of the minimal
co-volume lattice Γmin of hyperbolic isometries, and of its orientation preserving
subgroup Γ+
min , play the role of Hurwitz groups. Let C be the {3, 5, 3} Coxeter
group, Γmin the split extension C ⋊ Z2 and Γ+
min one of the index two subgroups
of Γmin of presentation
3 2 2
2
2
5
.
Γ+
min = x, y, z|x , y , z , (xyz) , (xzyz) , (xy)
According to [38, Corollary 5], all torsion-free subgroups of finite index in Γ+
min
have index divisible by 60. There are two of them of index 60, called Σ60a and
Σ60b , obtained as fundamental groups of surgeries m017(−3, 2) and m016(−3, 2).
Torsion-free subgroups of index 120 in Γ+
min are given in Table 6. It is remarkable
that these groups are fundamental groups of oriented three-manifolds built with a
single icosahedron except for Σ120e .
manifold T
oicocld0100001 = s897(−3, 2)
oicocld0100000 = s900(−3, 2)
oicocld0100003 = v2051(−3, 2)
oicocld0100002 = s890(3, 2)
v2413(−3, 2) 6= oicocld0100004
oicocld0500005 = v3215(1, 2)
subgroup
ηd (T )
Σ120a
{1,0,0,0,0, 8,2,1,1,8}
Σ120b
{1,0,0,0,5, 8,10,15,5,24}
Σ120c
{1,0,0,0,0, 4,8,12,6,6}
Σ120d
{1,0,1,5,0, 9,0,35,9,2}
Σ120e
{1,1,1,4,1, 7,2,25,3,10}
Σ120f
{1,0,0,0,0, 14,10,5,10,17}
Table 6. The index 120 torsion free subgroups of Γ+
min and
their relation to the single isosahedron 3-manifolds [38]. The
icosahedral symmetry is broken for Σ120e (see the text for
details).
UNIVERSAL QUANTUM COMPUTING
AND THREE-MANIFOLDS
13
Σ120e is also special in the sense that many small dimensional ICs may be built
from it in contrast to the other groups in Table 6. The smallest ICs that may be
build from Σ120e are the Hesse SIC coming from the congruence subgroup Γ0 (2), the
two-qubit IC coming the congruence subgroup 4A0 and the 6-dit ICs coming from
the congruence subgroups Γ(2), 3C 0 or Γ0 (4) (see [2, Sec. 3 and Table 1]). Higher
dimensional ICs found from Σ120e does not come from congruence subgroups.
5. Conclusion
The relationship between 3-manifolds and universality in quantum computing
has been explored in this work. Earlier work of the first author already pointed out
the importance of hyperbolic geometry and the modular group Γ for deriving the
basic small dimensional IC-POVMs. In Sec. 2, the move from Γ to the trefoil knot
T1 (and the braid group B3 ) to non hyperbolic 3-manifolds could be investigated by
making use of the d-fold coverings of T1 that correspond to d-dimensional POVMs
(some of them being IC). Then, in Sec. 3, we passed to universal links (such as
the figure-of-eight knot, Whitehead link and Borromean rings) and the related hyperbolic platonic manifolds as new models for quantum computing based POVMs.
Finally, in Sec. 4, Dehn fillings on T1 were used to explore the connection of quantum computing to important exotic 3-manifolds [i.e. Σ(2, 3, 5) and Σ(2, 3, 7)], to
the toroidal Seifert fibered Σ′ , to Akbulut’s manifold ΣY and to a maximum symmetry hyperbolic manifold Σ120e slightly breaking the icosahedral symmetry. It is
expected that our work will have importance for new ways of implementing quantum computing and for the understanding of the link between quantum information
theory and cosmology [43, 44, 45].
Funding
The first author acknowledges the support by the French “Investissements d’Avenir”
program, project ISITE-BFC (contract ANR-15-IDEX-03). The other ressources
came from Quantum Gravity Research.
References
[1] W. P. Thurston, Three-dimensional geometry and topology (vol. 1), (Princeton University Press, Princeton, 1997).
[2] M. Planat, The Poincaré half-plane for informationally complete POVMs, Entropy
20 16 (2018).
[3] H. M. Hilden, M. T. Lozano, J. M. Montesinos and W. C. Whitten, On universal
groups and three-manifolds, Inventiones Mathematicae 87 441-45 (1987).
[4] E. Fominikh, S. Garoufalidis, M. Goerner, V. Tarkaev and A. Vesnin, A census of
tethahedral hyperbolic manifolds, Exp. Math. 25 466-481 (2016).
[5] A. Yu Kitaev, Fault-tolerant quantum computation by anyons, Annals Phys. 303
2-30 (2003).
[6] C. Nayak, S. H. Simon, A. Stern, M. Freedman and S. Das Sarma, Non-Abelian
anyons and topological quantum computation, Rev. Mod. Phys. 80 1083 (2008).
[7] Z. Wang, Topological Quantum Computation, (American Mathematical Soc., Rhode
Island, Number 112, 2010).
[8] J K. Pachos, Introduction to Topological Quantum Computation (Cambridge University Press, Cambridge, 2012).
[9] S. Vijay and L. Fu, A generalization of non-abelian anyons in three dimensions, arXiv
1706.07070 (2017).
[10] S. Bravyi and A. Kitaev, Universal quantum computation with ideal Clifford gates
and noisy ancillas, Phys. Rev. A71 022316 (2005).
[11] M. Planat and R. Ul Haq, The magic of universal quantum computing with permutations, Advances in mathematical physics 217, ID 5287862 (2017) 9 pp.
MICHEL
14
PLANAT†, RAYMOND ASCHHEIM‡, MARCELO M. AMARAL‡ AND KLEE IRWIN‡
[12] M. Planat and Z. Gedik, Magic informationally complete POVMs with permutations,
R. Soc. open sci. 4 170387 (2017).
[13] L. H. Kauffman and R. L. Baadhio, Quantum topology (Series on knots and everything), (World Scientific, 1993).
[14] L. H. Kauffman, Knot logic and topological quantum computing with Majorana
fermions, in Linear and algebraic structures in quantum computing, (J. Chubb, A.
Eskandarian and V. Harizanov eds, Lecture notes in logic 45, Cambridge Univ. Press,
2016).
[15] N. Seiberg, T. Senthil, C. Wang and E. Witten, A duality web in 2 + 1 dimensions
and condensed matter physics, Ann. Phys. 374 395-433 (2016).
[16] D. Gang, Y. Tachikawa and K. Yonekura, Smallest 3d hyperbolic manifolds via simple
3d theories, Phys. Rev. D 96 061701(R) (2017).
[17] N. C. Lim and S. E. Jackson, Molecular knots in biology and chemistry, J. Phys.
Condens. Matter 27 354101 (2015).
[18] K. Irwin, Toward a unification of physics and number theory,
https://www.researchgate.net/publication/314209738
Toward the Unification of Physics and Number Theory
[19] J. Milnor, The Poincaré conjecture 99 years later: a progress report (The Clay
Mathematics Institute 2002 Annual Report, 2003), http://www.math.sunysb.edu/∼
jack/PREPRINTS/poiproof.pdf, Retrieved 2018-01-01.
[20] M. Planat, On the geometry and invariants of qubits, quartits and octits, Int. J.
Geom. Methods in Mod. Phys. 8 303-313 (2011).
[21] N. S. Manton, Connections on discrete fiber bundles, Commun. Math. Phys. 113
341-351 (1987).
[22] R. Mosseri and R. Dandoloff, Geometry of entangled states, Bloch spheres and Hopf
fibrations, it J. Phys. A: Math. Gen. 34 10243 (2001).
[23] J. A. Nieto, Division-Algebras/Poincare-Conjecture Correspondence, J. Mod. Phys.
(Scientific Research) 4 32-36 (2013).
[24] A. Sen, R. Aschheim and K. Irwin, Emergence of an aperiodic Dirichlet space from
the tetrahedral units of an icosahedral internal space Mathematics 5 29 (2017).
[25] F. Fang, D. Hammock and K. Irwin, Methods for calculating empires in quasicrystals,
Crystals 7 304 (1997).
[26] C. C. Adams, The knot book, An elementary introduction to the mathematical theory
of knots (W. H. Freeman and Co, New York, 1994).
[27] A. D. Mednykh, A new method for counting coverings over manifold with fintely
generated fundamental group, Dokl. Math. 74 498-502 (2006).
[28] M. Culler, N. M. Dunfield, M. Goerner, and J. R. Weeks, SnapPy, a
computer program for studying the geometry and topology of 3-manifolds,
http://snappy.computop.org.
[29] H. M. Hilden, M. T. Lozano and J. M. Montesinoos, On knots that are universal,
Topology 24 499-504 (1985).
[30] Chris A. Fuchs, On the quantumness of a Hibert space, Quant. Inf. Comp. 4 467-478
(2004).
[31] M. Appleby, T. Y. Chien, S. Flammia and S. Waldron, Constructing exact symmetric informationally complete measurements from numerical solutions, Preprint
1703.05981 [quant-ph].
[32] D. Rolfsen, Knots and links (Mathematics Lecture Series 7, Houston, 1990).
[33] D. Gabai, The Whitehead manifold is a union of two Euclidean spaces, J. Topol. 4
529-534 (2011).
[34] J. Milnor, On the 3-dimensional Brieskorn manifolds M (p, q, r), in Knots, groups and
3-manifolds (ed. L. P. Neuwirth), Annals of Math. Study 84, Princeton Univ. Press,
Princeton, 175-225 (1975).
[35] J. Hempel, The lattice of branched covers over the Figure-eight knot, Topol. Appl.
34 183-201 (1990).
[36] R. C. Haraway, Determining hyperbolicity of compact orientable 3-manifolds with
torus boundary, Arxiv 1410.7115 [math.GT].
UNIVERSAL QUANTUM COMPUTING
AND THREE-MANIFOLDS
15
[37] S. A. Ballas, J. Danciger and G. S. Lee, Convex projective structures on nonhyperbolic three-manifolds, Arxiv 1508.04794 [math.GT].
[38] M. Conder, G. Martin and A. Torstensson, Maximal symmetry groups of hyperbolic
3-manifolds New Zealand J. Math. 35 3762 (2006).
[39] C. M. Gordon, Dehn filling: a survey, Knot Theory, Banach Center Publ. 42 129-144,
Polish Acad. Sci., Warsaw (1998).
[40] R. C. Kirby and M. G. Scharlemann, Eight faces of the Poincaré homology 3-sphere,
in Geometric Topology (Acad. Press, New York, 1979) pp 113-146.
[41] Ying-Qing Wu, Seifert fibered surgery on Montesinos knots, Arxiv 1207.0154
[math.GT], to appear in Comm. Anal. Geom.
[42] S. Akbulut and K. Larson, Brieskorn spheres bounding rational balls, ArXiv
1704.07739 [math.GT].
[43] K. T. Chan, H. Zainuddin, K. A. M. Atan and A. A. Siddig, Computing Quantum
Bound States on Triply Punctured Two-Sphere Surface, Chin. Phys. Lett. 33 090301
(2016).
[44] R. Aurich, F. Steiner and H. Then, Numerical computation of Maass waveforms and
an application to cosmology, in Hyperbolic Geometry and Applications in Quantum
Chaos and Cosmology (Jens Bolte and Frank Steiner eds, Cambridge Univ. Press,
2012), Preprint gr-qc/0404020.
[45] T. Asselmeyer-Maluga, Smooth quantum gravity: Exotic smoothness and Quantum
gravity, in At the Frontier of Spacetime Scalar-Tensor Theory, Bells Inequality, Machs
Principle, Exotic Smoothness (Fundamental Theories of Physics book series (FTP),
T. Asselmeyer-Maluga ed. (2016), pp 247-308).
† Université de Bourgogne/Franche-Comté, Institut FEMTO-ST CNRS UMR
6174, 15 B Avenue des Montboucons, F-25044 Besançon, France.
E-mail address: [email protected]
‡ Quantum Gravity Research, Los Angeles, CA 90290, USA
E-mail address: [email protected]
E-mail address: [email protected]
E-mail address: [email protected]
| 4math.GR
|
arXiv:1405.5245v1 [math.NA] 20 May 2014
An accurate and efficient numerical framework
for adaptive numerical weather prediction
Giovanni Tumolo(1), Luca Bonaventura(2)
January 16, 2018
(1)
Earth System Physics Section
The Abdus Salam International Center for Theoretical Physics
Strada Costiera 11, 34151 Trieste, Italy
[email protected]
(2)
MOX – Modelling and Scientific Computing,
Dipartimento di Matematica “F. Brioschi”, Politecnico di Milano
Via Bonardi 9, 20133 Milano, Italy
[email protected]
Keywords: Discontinuous Galerkin methods, adaptive finite elements, semiimplicit discretizations, semi-Lagrangian discretizations, shallow water equations, Euler equations.
AMS Subject Classification: 35L02, 65M60, 65M25, 76U05, 86A10
1
Abstract
We present an accurate and efficient discretization approach for
the adaptive discretization of typical model equations employed in
numerical weather prediction. A semi-Lagrangian approach is combined with the TR-BDF2 semi-implicit time discretization method
and with a spatial discretization based on adaptive discontinuous finite elements. The resulting method has full second order accuracy
in time and can employ polynomial bases of arbitrarily high degree in
space, is unconditionally stable and can effectively adapt the number
of degrees of freedom employed in each element, in order to balance accuracy and computational cost. The p−adaptivity approach employed
does not require remeshing, therefore it is especially suitable for applications, such as numerical weather prediction, in which a large number
of physical quantities are associated with a given mesh. Furthermore,
although the proposed method can be implemented on arbitrary unstructured and nonconforming meshes, even its application on simple
Cartesian meshes in spherical coordinates can cure effectively the pole
problem by reducing the polynomial degree used in the polar elements.
Numerical simulations of classical benchmarks for the shallow water
and for the fully compressible Euler equations validate the method
and demonstrate its capability to achieve accurate results also at large
Courant numbers, with time steps up to 100 times larger than those
of typical explicit discretizations of the same problems, while reducing
the computational cost thanks to the adaptivity algorithm.
2
1
Introduction
The Discontinuous Galerkin (DG) spatial discretization approach
is currently being employed by an increasing number of environmental
fluid dynamics models see e.g. [12], [17], [28],[39],[19],[25] and a more
complete overview in [5]. This is motivated by the many attractive
features of DG discretizations, such as high order accuracy, local mass
conservation and ease of massively parallel implementation.
On the other hand, DG methods imply severe stability restrictions when coupled with explicit time discretizations. One traditional
approach to overcome stability restrictions in low Mach number problems is the combination of semi - implicit (SI) and semi - Lagrangian (SL) techniques. In a series of papers [41], [42], [19], [14], [52]
it has been shown that most of the computational gains traditionally achieved in finite difference models by the application of SI, SL
and SISL discretization methods are also attainable in the framework
of DG approaches. In particular, in [52] we have introduced a dynamically p−adaptive SISL-DG discretization approach for low Mach
number problems, that is quite effective in achieving high order spatial
accuracy, while reducing substantially the computational cost.
In this paper, we apply the technique of [52] to the shallow water equations in spherical geometry and to the the fully compressible
Euler equations, in order to show its effectiveness for model problems typical of global and regional weather forecasting. The advective
form of the equations of motion is employed and the semi-implicit
time discretization is based on the TR-BDF2 method, see e.g. [21],
[32]. This combination of two robust ODE solvers yields a second
order accurate, A-stable and L-stable method (see e.g. [27]), that is
effective in damping selectively high frequency modes. At the same
time, it achieves full second order accuracy, while the off-centering in
the trapezoidal rule, typically necessary for realistic applications to
nonlinear problems (see e.g. [7], [11], [52]), limits the accuracy in time
to first order. Numerical results presented in this paper show that the
total computational cost of one TR-BDF2 step is analogous to that of
one step of the off-centered trapezoidal rule, as well as the structure
of the linear problems to be solved at each time step, thus allowing to
extend naturally to this more accurate method any implementation
based on the off-centered trapezoidal rule. Numerical simulations of
the shallow water benchmarks proposed in [55], [29], [22] and of the
non-hydrostatic benchmarks proposed in [47], [23] have been employed
to validate the method and to demonstrate its capabilities. In particular, it will be shown that the present approach enables the use of
time steps even 100 times larger than those allowed for DG models by
3
standard explicit schemes, see e.g. the results in [38].
The method presented in this paper, just as its previous version in
[52], can be applied in principle on arbitrarily unstructured and even
nonconforming meshes. For example, a model based on this method
could run on a non conforming mesh of rectangular elements built
around the nodes of a reduced Gaussian grid [20]. For simplicity,
however, no such implementation has been developed so far. Here,
only a simple Cartesian mesh has been used. If no degree adaptivity
is employed, this results in very high Courant numbers in the polar regions. These do not result in any special stability problems for
the present SISL discretization approach, as it will be shown by the
numerical results reported below. On the other hand, even with an
implementation based on a simple Cartesian mesh in spherical coordinates, the flexibility of the DG space discretization allows to reduce
the degree of the basis and test functions employed close to the poles,
thus making the effective model resolution more uniform and solving
the efficiency issues related to the pole problem by static p−adaptivity.
This is especially advantageous because the conditioning of the linear
system to be solved at each time step is greatly improved and, as a
consequence, the number of iterations necessary for the linear solver
is reduced by approximately 80%, while at the same time no spurious
reflections nor artificial error increases are observed.
Beyond these computational advantages, we believe that the present
approach based on p−adaptivity is especially suitable for applications to numerical weather prediction, in contrast to h−adaptivity
approaches (that is, local mesh coarsening or refinement in which the
size of some elements changes in time). Indeed, in numerical weather
prediction, information that is necessary to carry out realistic simulations (such as orography profiles, data on land use and soil type,
land-sea masks) needs to be reconstructed on the computational mesh
and has to be re-interpolated each time that the mesh is changed. Furthermore, many physical parameterizations are highly sensitive to the
mesh size. Although devising better parameterizations that require
less mesh-dependent tuning is an important research goal, more conventional parameterizations will still be in use for quite some time.
As a consequence, it is useful to improve the accuracy locally by
adding supplementary degrees of freedom where necessary, as done
in a p−adaptive framework, without having to change the underlying
computational mesh. In conclusion, the resulting modeling framework
seems to be able to combine the efficiency and high order accuracy of
traditional SISL pseudo-spectral methods with the locality and flexibility of more standard DG approaches.
In section 2, two examples of governing equations are introduced.
4
In section 3, the TR-BDF2 method is reviewed. In section 4 the
approach employed for the advection of vector fields in spherical geometry is described in detail. In section 5, we introduce the SISL-DG
discretization approach for the shallow water equations in spherical geometry. In section 6, we outline its extension to the fully compressible
Euler equations in a vertical plane. Numerical results are presented
in section 7, while in section 8 we try to draw some conclusions and
outline the path towards application of the concepts introduced here
in the context of a non hydrostatic dynamical core.
2
Governing equations
We consider as a basic model problem the two-dimensional shallow
water equations on a rotating sphere (see e.g. [15]). These equations
are a standard test bed for numerical methods to be applied to the
full equations of motion of atmospheric or oceanic circulation models,
see e.g. [55]. Among their possible solutions, they admit Rossby
and inertial gravity waves, as well as the response of such waves to
orographic forcing. We will use the advective, vector form of the
shallow water equations:
Dh
= −h∇ · u,
Dt
Du
= −g∇h − f k̂ × u − g∇b.
Dt
(1)
(2)
Here h represents the fluid depth, b the bathymetry elevation, f the
Coriolis parameter, k̂ the unit vector locally normal to the Earth’s surface and g the gravity force per unit mass on the Earth’s surface. Assuming that x, y are orthogonal curvilinear coordinates on the sphere
(or on a portion of it), we denote by mx and my the components
of the (diagonal) metric tensor. Furthermore, we set u = (u, v)T ,
where u and v are the contravariant components of the velocity vector in the coordinate direction x and y respectively, multiplied by the
D
the
corresponding metric tensor components. We also denote by Dt
Lagrangian derivative
D
∂
u ∂
v ∂
=
+
+
,
Dt
∂t mx ∂x my ∂y
Dy
so that u = mx Dx
Dt , v = my Dt . In particular, in this paper standard
spherical coordinates will be employed.
As an example of a more complete model, we will also consider the
fully compressible, non hydrostatic equations of motion. Following
5
e.g. [10], [4], [11], they can be written as
cp
DΠ
=−
− 1 Π∇ · u,
Dt
cv
Du
= −cp Θ∇Π − gk̂,
Dt
DΘ
= 0.
Dt
−R/cp
is the powhere, being p0 a reference pressure value, Θ = T pp0
p R/cp
tential temperature, Π = p0
is the Exner pressure, while cp , cv , R
are the constant pressure and constant volume specific heats and the
gas constant of dry air respectively. Here the Coriolis force is omitted
for simplicity. Notice also that, by a slight abuse of notation, in the
three-dimensional case u = (u, v, w)T denotes the three dimensional
D
, ∇ operators are also three-dimensional, while
velocity field and the Dt
we will assume u = (u, w)T in the description of (x, z) two dimensional, vertical slice models. It is customary to rewrite such equations
in terms of perturbations with respect to a steady hydrostatic reference profile, so that assuming Π(x, y, z, t) = π ∗ (z) + π(x, y, z, t),
∗
Θ(x, y, z, t) = θ ∗ (z) + θ(x, y, z, t) with cp θ ∗ dπ
dz = −g, one obtains for
a vertical plane
cp
DΠ
=−
− 1 Π∇ · u,
(3)
Dt
cv
Du
∂π
= −cp Θ ,
(4)
Dt
∂x
∂π
θ
Dw
= −cp Θ
+ g ∗,
(5)
Dt
∂z
θ
dθ ∗
Dθ
=−
w.
(6)
Dt
dz
It can be observed that equations (3)-(6) are isomorphic to equations
(1)-(2), which will allow to extend almost automatically the discretization approach proposed for the former to the more general model.
3
Review of the TR-BDF2 method
We review here some properties of the so called TR-BDF2 method,
which was first introduced in [2]. Given a Cauchy problem
y′ = f (y, t)
y(0) = y0
6
(7)
and considering a time discretization employing a constant time step
∆t, the TR-BDF2 method is defined by the two following implicit
stages:
un+2γ − γ∆tf (un+2γ , tn + 2γ∆t) = un + γ∆tf (un , tn ),
un+1 − γ2 ∆tf (un+1 , tn+1 ) = (1 − γ3 )un + γ3 un+2γ . (8)
Here γ ∈ [0, 1/2] is an implicitness parameter and
γ2 =
1 − 2γ
,
2(1 − γ)
γ3 =
1 − γ2
.
2γ
It is immediate that the first stage of (8) is simply the application
of the trapezoidal rule (or Crank-Nicolson method) over the interval
[tn , tn + 2γ∆t]. It could also be substituted by an off centered CrankNicolson step without reducing the overall accuracy of the method.
The outcome of this stage is then used to turn the two step BDF2
method into a single step, two stages method. This combination of two
robust stiff solvers yields a method with several interesting accuracy
and stability properties, that were analyzed in detail in [21]. As shown
in this paper, this analysis is most easily carried out by rewriting the
method as
k1 = f (un , tn )
k2 = f (un + γ∆tk1 + γ∆tk2 , tn + γ∆t)
1−γ
1−γ
∆tk1 +
∆tk2 + γ∆tk3 , tn+1
k3 = f un +
2
2
1−γ
1−γ
n+1
n
u
= u + ∆t
(9)
k1 +
k2 + γk3 .
2
2
In this formulation, the TR-BDF2 method is clearly a Singly Diagonal
Implicit Runge Kutta (SDIRK) method, so that one can rely on the
theory for this class of methods to derive stability and accuracy results
(see e.g. [27]). Notice that the same method has been rediscovered in
[6] and has been analyzed and applied also in [18], to treat the implicit
terms in the framework of an Additive Runge Kutta approach (see
e.g. [26]). As shown in [21], the TR-BDF2 method is second order
accurate and A-stable for any value of γ. Written as in (9), the method
can also be proven to constitute a (2,3) embedded Runge-Kutta pair,
with companion coefficients given by
√
√
√
2− 2
2
2
)/3, (1 + 3
)/3,
,
(1 −
4
4
6
7
provided that no off centering is employed in the first stage of (8).
This equips the method with an extremely efficient√estimator of the
time discretization error. Furthermore, for γ = 1 − 2/2 it is also Lstable. Therefore, with this coefficient value it can be safely applied to
problems with eigenvalues whose imaginary part is large, such as typically arise from the discretization of hyperbolic problems. This is not
the case for the standard trapezoidal rule (or Crank-Nicolson) implicit
method, whose linear stability region is exactly bounded by the imaginary axis. As a consequence, it is common to apply the trapezoidal
rule with off centering, see e.g. [7], [11] as well as [52], which results
in a first order time discretization. TR-BDF2 appears therefore to be
an interesting one step alternative to maintain full second order accuracy, especially considering that, if formulated as (8), it is equivalent
to performing two Crank-Nicolson steps with slightly modified coefficients. In order to highlight the advantages of the proposed method in
terms of accuracy with respect to other common robust stiff solvers,
we plot in figure 1 the contour levels of the absolute value of the linear stability function of the TR-BDF2 method without off centering in
the first stage, compared to the analogous contours of the off centered
Crank-Nicolson method with averaging parameter θ = 0.6, θ = 0.7 in
figures 2, 3, respectively, and to those of the BDF2 method in figure 4.
It is immediate to see that TR-BDF2 introduces less damping around
the imaginary axis for moderate values of the time step. On the other
hand, TR-BDF2 is more selective in damping very large eigenvalues,
as clearly displayed in figure 5, where the absolute values of the linear
stability functions of the same methods (with the exception of BDF2,
for which an explicit representation of the stability function is not
available) are plotted along the imaginary axis.
8
5
4
3
2
1
0
−1
−2
−3
−4
−5
−5
−4.5
−4
−3.5
−3
−2.5
−2
−1.5
−1
−0.5
0
Figure 1: Contour levels of the absolute value of the stability function of the
TR-BDF2 method without off centering in the first stage. Contour spacing
is 0.1 from 0.5 to 1.
5
4
3
2
1
0
−1
−2
−3
−4
−5
−5
−4.5
−4
−3.5
−3
−2.5
−2
−1.5
−1
−0.5
0
Figure 2: Contour levels of the absolute value of the stability function of
the off centered Crank-Nicolson method with averaging parameter θ = 0.6
(equivalent to an off centering parameter valued 0.05). Contour spacing is
0.1 from 0.5 to 1.
9
5
4
3
2
1
0
−1
−2
−3
−4
−5
−5
−4.5
−4
−3.5
−3
−2.5
−2
−1.5
−1
−0.5
0
Figure 3: Contour levels of the absolute value of the stability function of
the off centered Crank-Nicolson method with averaging parameter θ = 0.7
(equivalent to an off centering parameter valued 0.1). Contour spacing is 0.1
from 0.5 to 1.
5
4
3
2
1
0
−1
−2
−3
−4
−5
−5
−4.5
−4
−3.5
−3
−2.5
−2
−1.5
−1
−0.5
0
Figure 4: Contour levels of the absolute value of the stability function of the
BDF2 method. Contour spacing is 0.1 from 0.5 to 1.
10
1
CN off=0.05
CN off=0.01
TR−BDF2 off=0.0
TR−BDF2 off=0.02
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
−15
−10
−5
0
5
10
15
Figure 5: Graph of the absolute value of the stability functions of several
L-stable methods along the imaginary axis.
11
4 Review of Semi-Lagrangian evolution operators for vector fields on the
sphere
The semi-Lagrangian method can be described introducing the concept of evolution operator, along the lines of [37, 35]. Indeed, let
G = G(x, t) denote a generic function of space and time that is the
solution of
DG
∂G
u ∂G
v ∂G
=
+
+
= 0.
Dt
∂t
mx ∂x
my ∂y
To approximate this solution on the time interval [tn , tn+1 ], a numerical evolution operator E is introduced, that approximates the
exact evolution operator associated to the frozen velocity field u∗ =
(u∗ , v ∗ )T , that may coincide with the velocity field at time level tn or
with an extrapolation derived from more previous time levels. More
precisely, if X(t; tn+1 , x) denotes the solution of
dX(t; tn+1 , x)
= u∗ (X(t; tn+1 , x))
dt
(10)
with initial datum X(tn+1 ; tn+1 , x) = x at time t = tn+1 , then the expression [E(tn , ∆t)G](x) denotes a numerical approximation of Gn (xD )
where xD = X(tn ; tn+1 , x) and the notation Gn (x) = G(x, tn ) is used.
Since xD is nothing but the position at time tn of the fluid parcel
reaching location x at time tn+1 , according to standard terminology,
it is called the departure point associated with the arrival point x.
Different methods can be employed to approximate xD ; in this paper, for simplicity, the method proposed in [34] has been employed in
spherical geometry. Furthermore, to guarantee an accuracy compatible with that of the semi-implicit time-discretization, an extrapolation
1
un+ 2 of the velocity field at the intermediate time level tn + ∆t/2 was
used as u∗ in (10). On the other hand, in the application to Cartesian geometry (for the vertical slice discretization), a simple first order
Euler method with sub-stepping was employed, see e.g. [16], [45].
In case of the advection of a vector field
DG
∂G
u ∂G
v ∂G
=
+
+
= 0,
Dt
∂t
mx ∂x
my ∂y
as in the momentum equation (2), the extension of this approach has
to take into account the curvature of the spherical manifold. More
specifically, unit basis vectors at the departure point are not in general
aligned with those at the arrival point, i.e., if î, ĵ, k̂ represent a unit
vector triad, in general î(x) 6= î(xD ), ĵ(x) 6= ĵ(xD ), k̂(x) 6= k̂(xD ).
12
To deal with this issue two approaches are available. The first,
intrinsically Eulerian, consists in the introduction of the Christoffel symbols in the covariant derivatives definition, giving rise to the
well known metric terms, before the SISL discretization, and then
in the approximation along the trajectories of those metric terms.
This approach has been shown to be source of instabilities in a semiLagrangian frame, see e.g. [44, 8, 9, 13] and therefore is not adopted
in this work. The second approach, more suitable for semi-Lagrangian
discretizations, takes into account the curvature of the manifold only
at discrete level, i.e. after the SISL discretization has been performed. Many variations of this idea have been proposed, see e.g.
[44, 8, 9, 3, 49]. In [48], they have all been derived in a unified way
by the introduction of a proper rotation matrix that transforms vector components in the departure-point unit vector triad îD = î(xD ),
ĵ D = ĵ(xD ), k̂D = k̂(xD ) into vector components in the arrival-point
unit vector triad î = î(x), ĵ = ĵ(x), k̂ = k̂(x). To see how this rotation matrix comes into play, it is sufficient to consider the action of
the evolution operator E on a given vector valued function of space
and time G, defined as an approximation of
[E(tn , ∆t)G] (x) = Gn (xD ),
(11)
and to write this equation componentwise. Gn (xD ) is known through
its components in the departure point unit vector triad:
Gn (xD ) = Gxn (xD )îD + Gyn (xD )ĵ D + Gzn (xD )k̂D .
(12)
Therefore, via (11), the components of [E(tn , ∆t)G] (x) in the unit
vector triad at the same point are given by projection of (12) along î,
ĵ, k̂:
î · Gn (xD ) = Gxn (xD ) î · îD + Gyn (xD ) î · ĵ D + Gzn (xD ) î · k̂D ,
ĵ · Gn (xD ) = Gxn (xD ) ĵ · îD + Gyn (xD ) ĵ · ĵ D + Gzn (xD ) ĵ · k̂D ,
k̂ · Gn (xD ) = Gxn (xD )k̂ · îD + Gyn (xD )k̂ · ĵ D + Gzn (xD )k̂ · k̂D ,
i.e., in matrix notation:
n
î · [E(tn , ∆t)G] (x)
Gx
ĵ · [E(tn , ∆t)G] (x) = R Gyn
Gzn
k̂ · [E(tn , ∆t)G] (x)
î · îD î · ĵ D î · k̂D
R = ĵ · îD ĵ · ĵ D ĵ · k̂D .
k̂ · îD k̂ · ĵ D k̂ · k̂D
13
where
Under the shallow atmosphere approximation [51], R can be reduced
to the 2 × 2 rotation matrix
Λ
Λ12
Λ = Λ(x, xD ) = 11
,
(13)
Λ21 Λ22
where, as shown in [48], Λ11 = Λ22 = (R11 + R22 )/(1 + R33 ), Λ12 =
−Λ21 = (R12 −R21 )/(1+R33 ). Therefore, in the following the evolution
operator for vector fields will be defined componentwise as
î · [E(tn , ∆t)G] (x)
ĵ · [E(tn , ∆t)G] (x)
Gxn (xD )
=Λ
.
Gyn (xD )
(14)
5 A novel SISL time integration approach for the shallow water equations
on the sphere
The SISL discretization of equations.(1)-(2) based on (8) is then obtained by performing the two stages in (8) after reinterpretation of the
intermediate values in a semi-Lagrangian fashion. Furthermore, in order to avoid the solution of a nonlinear system, the dependency on h in
h∇ · u is linearized in time, as common in semi-implicit discretizations
based on the trapezoidal rule, see e.g. [7],[52]. Numerical experiments
reported in the following show that this does not prevent to achieve
second order accuracy in the regimes of interest for numerical weather
prediction. The TR stage of the SISL time semi-discretization of the
equations in vector form (1)-(2) is given by
hn+2γ
+ γ∆t hn ∇ · un+2γ
= E (tn , 2γ∆t) [h − γ∆t h ∇ · u] ,
i
h
un+2γ + γ∆t g∇hn+2γ + f k̂ × un+2γ = −γ∆t g∇b
h
io
n
+E tn , 2γ∆t u − γ∆t g(∇h + ∇b) + f k̂ × u .
(15)
(16)
The TR stage is then followed by the BDF2 stage:
hn+1 + γ2 ∆t hn+2γ ∇ · un+1
= 1 − γ3 E tn , ∆t h
+ γ3 E tn + 2γ∆t, (1 − 2γ)∆t h,
14
(17)
i
h
un+1 + γ2 ∆t g∇hn+1 + f k̂ × un+1 = −γ2 ∆t g∇b
+ 1 − γ3 E tn , ∆t u + γ3 E tn + 2γ∆t, (1 − 2γ)∆t u. (18)
For each of the two stages, the spatial discretization can be performed
along the lines described in [52], allowing for variable polynomial order to locally represent the solution in each element. The spatial
discretization approach considered is independent of the nature of the
mesh and could also be implemented for fully unstructured and even
non conforming meshes. For simplicity, however, in this paper only
an implementation on a structured mesh in longitude-latitude coordinates has been developed. In principle, either Lagrangian or hierarchical Legendre bases could be employed. We will work almost
exclusively with hierarchical bases, because they provide a natural environment for the implementation of a p−adaptation algorithm, see
for example [56]. A central issue in finite element formulations for
fluid problems is the choice of appropriate approximation spaces for
the velocity and pressure variables (in the context of SWE, the role of
the pressure is played by the free surface elevation). An inconsistent
choice of the two approximation spaces indeed may result in a solution
that is polluted by spurious modes, for the specific case of SWE see
for example [31, 53, 54] as well as the more recent and comprehensive
analysis in [30]. Here, we have not investigated this issue in depth, but
the model implementation allows for approximations of higher polynomial degree pu for the velocity fields than ph for the height field. Even
though no systematic study was performed, no significant differences
were noticed between results obtained with equal or unequal degrees.
In the following, only results with unequal degrees pu = ph + 1 are
reported, with the exception of an empirical convergence test for a
steady geostrophic flow.
All the integrals appearing in the elemental equations are evaluated
by means of Gaussian numerical quadrature formulae, with a number
of quadrature nodes consistent with the local polynomial degree being
used. In particular, notice that integrals of terms in the image of
the evolution operator E, i.e. of functions evaluated at the departure
points of the trajectories arriving at the quadrature nodes, cannot
be computed exactly (see e.g. [36, 40]), since such functions are not
polynomials. Therefore a sufficiently accurate approximation of these
integrals is needed, which may entail the need to employ numerical
quadrature formulae with more nodes than the minimal requirement
implied by the local polynomial degree. This overhead is actually
compensated by the fact that, for each Gauss node, the computation
15
of the departure point is only to be executed once for all the quantities
to be interpolated.
After spatial discretization has been performed, the discrete degrees of freedom representing velocity unknowns can be replaced in
the respective discrete height equations, yielding in each case a linear system whose structure is entirely analogous to that obtained in
[52]. The non-symmetric linear systems obtained from the TR-BDF2
stages are solved in our implementation by the GMRES method [46].
A classical stopping criterion based on a relative error tolerance of
10−10 was employed (see e.g. [24]). For the GMRES solver, so far,
only a block diagonal preconditioning was employed. As it will be
shown in section 7, the condition number of the systems to be solved
can be greatly reduced if lower degree elements are employed close
to the poles. In any case, the total computational cost of one TRBDF2 step is entirely analogous to that of one step of the standard
off centered trapezoidal rule employed in [52], since the structure of
the systems is the same but for each stage only a fraction of the time
step is being computed. Once hn+1 has been computed by solving this
linear system, then un+1 can be recovered by back substituting into
the momentum equation.
6 Extension of the time integration approach to the Euler equations
In this section, we show that the previously proposed method can
be extended seamlessly to the fully compressible Euler equations as
formulated in equations (3) - (6). For simplicity, only the application
to the (x, z) two dimensional vertical slice case is presented, but the
extension to three dimensions is straightforward. Again, in order to
avoid the solution of a nonlinear system, the dependency on Π in
Π∇ · u and the dependency on Θ in Θ∇π are linearized in time, as
common in semi-implicit discretizations based on the trapezoidal rule,
see e.g. [10], [4].
The semi-Lagrangian counterpart of the TR substep of (8) is first
applied to to (3) - (6), so as to obtain:
π n+2γ + γ∆t (cp /cv − 1) Πn ∇ · un+2γ = −π ∗
+E (tn , 2γ∆t) [Π − γ∆t (cp /cv − 1) Π ∇ · u] ,
16
(19)
∂π n+2γ
un+2γ + γ∆t cp Θn
=
∂x
∂π
n
,
E(t , 2γ∆t) u − γ∆t cp Θ
∂x
n+2γ
θ n+2γ
n ∂π
w
+ γ∆t cp Θ
=
−g ∗
∂z
θ
θ
∂π
n
−g ∗
,
E(t , 2γ∆t) w − γ∆t cp Θ
∂z
θ
(20)
n+2γ
θ
n+2γ
dθ ∗
dθ ∗ n+2γ
n
w
= E(t , 2γ∆t) θ − γ∆t
w .
+ γ∆t
dz
dz
(21)
(22)
Following [10] the time semi-discrete energy equation (22) can be
inserted into the time semi-discrete vertical momentum equation (21),
in order to decouple the momentum and the energy equations as follows
g dθ ∗
∂π n+2γ
1 + (γ∆t) ∗
wn+2γ + γ∆tcp Θn
=
θ dz
∂z
∂π
θ
n
E(t , 2γ∆t) w − γ∆t cp Θ
−g ∗
∂z
θ
∗
dθ
g
n
w .
+γ∆t ∗ E(t , 2γ∆t) θ − γ∆t
θ
dz
2
(23)
Equations (19), (20) and (23) are a set of three equations in three unknowns only, namely π, u, and w that can be compared with equations
(15), (16) with f = 0 and mx = my = 1 (Cartesian geometry). From
the comparison it is clear that the two formulations are isomorphic
under correspondence π ←→ h, u ←→ u, w ←→ v.
We can then consider the semi-Lagrangian counterpart of the BDF2
substep of (8) applied to (3) - (6) to obtain:
π n+1 + γ2 ∆t (cp /cv − 1) Πn+2γ ∇ · un+1
= −π ∗ + (1 − γ3 )[E (tn , ∆t) Π]
+ γ3 [E (tn + 2γ∆t, (1 − 2γ)∆t) Π],
17
(24)
∂π n+1
∂x
= (1 − γ3 )[E (tn , ∆t) u]
un+1 + γ2 ∆t cp Θn+2γ
+ γ3 [E (tn + 2γ∆t, (1 − 2γ)∆t) u],
w
n+1
n+1
θ n+1
n+2γ ∂π
+ γ2 ∆t cp Θ
−g ∗
∂z
θ
n
= (1 − γ3 )[E (t , ∆t) w]
+ γ3 [E (tn + 2γ∆t, (1 − 2γ)∆t) w],
dθ ∗ n+1
w
dz
= (1 − γ3 )[E (tn , ∆t) θ]
(25)
(26)
θ n+1 + γ2 ∆t
+ γ3 [E (tn + 2γ∆t, (1 − 2γ)∆t) θ].
(27)
Again, following [10], the time semi-discrete energy equation (27) can
be inserted into the time semi-discrete vertical momentum equation
(26), in order to decouple the momentum and the energy equations:
g dθ ∗
∂π n+1
1 + (γ2 ∆t) ∗
wn+1 + γ2 ∆t cp Θn+2γ
=
θ dz
∂z
(1 − γ3 )[E (tn , ∆t) w] + γ3 [E (tn + 2γ∆t, (1 − 2γ)∆t) w] +
(28)
g
γ2 ∆t ∗ {(1 − γ3 )[E (tn , ∆t) θ] + γ3 [E (tn + 2γ∆t, (1 − 2γ)∆t) θ]} .
θ
2
Now equations (24), (25) and (28) are a set of three equations
in three unknowns only, namely π, u, and w, that can be compared
with equations (17), (18) with f = 0 and mx = my = 1 (Cartesian
geometry). Again, it is easy to see that also in this case exactly the
same structure results as in equations (17)-(18) with the correspondence π ←→ h, u ←→ u, w ←→ v, so that the approach (and code)
proposed for the shallow water equations can be extended to the fully
compressible Euler equation in a straightforward way.
18
7
Numerical experiments
The numerical method introduced in section 5 has been implemented
and tested on a number of relevant test cases using different initial
conditions and bathymetry profiles, in order to assess its accuracy and
stability properties and to analyze the impact of the p−adaptivity
strategy. Whenever a reference solution was available, the relative
errors were computed in the L1 , L2 and L∞ norms at the final time tf
of the simulation according to [55] as:
I [ |h(·, tf ) − href (·, tf )| ]
,
I [ |href (·, tf )| ]
n h
2 io1/2
I
h(·, tf ) − href (·, tf )
l2 (h) =
,
1/2
I href (·, tf )2
max |h(·, tf ) − href (·, tf )|
l∞ (h) =
,
max |href (·, tf )|
l1 (h) =
(29)
(30)
(31)
where href denotes the reference solution for a model variable h and
I is a discrete approximation of the global integral
R
h mx my dx
,
(32)
I(h) = RΩ
Ω mx my dx
computed by an appropriate numerical quadrature rule, consistent
with the numerical approximation being tested, and the maximum is
computed over all nodal values.
The test cases considered for the shallow water equations in spherical geometry are
• a steady-state geostrophic flow: in particular, we have analyzed
results in test case 2 of [55] in the configuration least favorable
for methods employing longitude-latitude meshes;
• the unsteady flow with exact analytical solution described in [29];
• the polar rotating low-high, introduced in [33], aimed at showing
that no problems arise even in the case of strong cross polar flows;
• zonal flow over an isolated mountain and Rossby-Haurwitz wave
of wavenumber 4, corresponding respectively to test cases 5 and
6 in [55].
For the first two tests, analytic solutions are available and empirical
convergence tests can be performed. The test cases considered for the
discretization of equations (3)-(6) are
19
• inertia gravity waves involving the evolution of a potential temperature perturbation in a channel with periodic boundary conditions and uniformly stratified environment with constant BruntWäisälä frequency, as described in [47];
• a rising thermal bubble given by the evolution of a warm bubble
in a constant potential temperature environment, as described
in [23].
In all the numerical experiments performed for this paper, neither
spectral filtering nor explicit diffusion of any kind were employed,
the only numerical diffusion being implicit in the time discretization
approach. We have not yet investigated to which extent the quality
of the solutions is affected by this choice, but this should be taken
into account when comparing quantitatively the results of the present
method to those of reference models, such as the one described in
[22], in which explicit numerical diffusion is added. Sensitivity of
the comparison results to the amount of numerical diffusion has been
highlighted in several model validation exercises, see e.g. [43].
Since semi-implicit, semi-Lagrangian methods are most efficient for
low Froude number flows, where the typical velocity is much smaller
than that of the fastest propagating waves, all the tests considered
fall in this hydrodynamical regime. Therefore, in order to assess the
method efficiency, a distinction has been made between the maximum
Courant number based on the velocity, on one hand, and, on the
other hand, the maximum Courant number based on the celerity, or
the maximum Courant number based on the sound speed, defined
respectively as
kuk∞ ∆t
Cvel = max
∆x/p
p
√
(cp /cv )RΘΠ∆t
gh∆t
, Csnd = max
,
Ccel = max
∆x/p
∆x/p
where ∆x is to be interpreted as generic value of the meshsize in
either coordinate direction. For the tests in which p−adaptivity was
employed, if pnI denotes the local polynomial degree used at timestep
tn to represent a model variable inside the I − th element of the mesh,
while pmax is the maximum local polynomial degree considered, the
efficiency of the method in reducing the computational effort has been
measured by monitoring the evolution of the quantities
PN
ITNnadapt
(pn + 1)2
n
n
,
∆
=
,
∆dof = I=1 I
iter
N (pmax + 1)2
ITNnmax
where N is the total number of elements, ITNnadapt denotes the total
number of GMRES iterations at time step n for the adapted local
20
degrees configuration and ITNnmax the total number of GMRES iterations at time step n for the configuration with maximum degree
in all elements, respectively. Average values of these indicators over
the simulations performed are reported in the following, denoted by
respectively. The error between the adaptive
∆average
and ∆average
iter
dof
solution and the corresponding one obtained with uniform maximum
polynomial degree everywhere has been measured in terms of (29).
Finally, in some cases conservation of global invariants has been monitored by evaluating at each time step the following global integral
quantities:
J(q n ) =
I(q(·, tn )) − I(q(·, t0 ))
,
I(q(·, t0 ))
(33)
where I(q) has been defined in (32) and q n = q(·, tn ) is the density
associated to each global invariant. According to the choice of q,
following invariants are considered: mass, i.e. q = qmass = h, total
energy, i.e. q = qenerg = 12 (hu·u+g(h2 −b2 )), and potential enstrophy,
1
(k̂ · ∇ × u + f )2 .
i.e. q = qenstr = 2h
7.1
Steady-state geostrophic flow
We first consider the test case 2 of [55], where the solution is a steady
state flow with velocity field corresponding to a zonal solid body rotation and h field obtained from the velocity ones through geostrophic
balance. All the parameter values are taken as in [55]. The flow orientation parameter has been chosen here as α = π/2 − 0.05, making
the test more challenging on a longitute-latitude mesh. Error norms
associated to the solution obtained on a mesh of 10 × 5 elements for
different polynomial degrees are shown in tables 1, 2 and 3 for h, u and
v, respectively. All the results have been computed at tf = 10 days
at fixed maximum Courant numbers Ccel = 8, Cvel = 2, so that different values of ∆t have been employed for different polynomial order.
We remark that the resulting time steps are significantly larger than
those allowed by typical explicit time discretizations for analogous DG
space discretizations, see e.g. the results in [38]. The spectral decay in
the error norms can be clearly observed, until the time error becomes
dominant. For better comparison with the results in [38], we consider
again the configuration with ph = 6, pu = 7 on 10 × 5 elements, which
corresponds to the same resolution in space as for the 150 × 8 × 8 grid
used in [38]. While ∆t = 36 s is used in [38] giving a l∞ (h) ≈ 8× 10−6 ,
the proposed SISLDG formulation can be run with ∆t = 3600 s, in
which case l∞ (h) ≈ 3 × 10−7 , and the average number of iterations
21
required by the linear solver is 1 for the TR substep and 4 for the
BDF2 substep.
ph pu ∆t [s]
2
3
4
5
6
7
8
3
4
5
6
7
8
9
4800
3600
2880
2400
2057
1800
1600
l1 (h)
l2 (h)
l∞ (h)
5.558 × 10−3
6.017 × 10−4
1.743 × 10−5
1.586 × 10−6
8.829 × 10−8
1.246 × 10−8
5.641 × 10−9
6.805 × 10−3
8.176 × 10−4
2.405 × 10−5
2.281 × 10−6
1.206 × 10−7
1.590 × 10−8
5.952 × 10−9
1.914 × 10−2
2.569 × 10−3
9.024 × 10−5
1.058 × 10−5
4.926 × 10−7
4.158 × 10−8
6.320 × 10−9
Table 1: Relative errors on h for different polynomial degrees, SWE test case
2 with α = π/2 − 0.05 at time tf = 10 days.
ph pu ∆t [s]
2
3
4
5
6
7
8
3
4
5
6
7
8
9
4800
3600
2880
2400
2057
1800
1600
l1 (u)
l2 (u)
l∞ (u)
6.351 × 10−2
9.505 × 10−3
4.288 × 10−4
4.598 × 10−5
2.057 × 10−6
2.162 × 10−7
2.013 × 10−8
6.432 × 10−2
1.037 × 10−2
4.887 × 10−4
4.830 × 10−5
2.262 × 10−6
2.358 × 10−7
2.276 × 10−8
1.143 × 10−1
2.106 × 10−2
2.393 × 10−3
1.706 × 10−4
5.879 × 10−6
6.428 × 10−7
3.268 × 10−8
Table 2: Relative errors on u for different polynomial degrees, SWE test case
2 with α = π/2 − 0.05 at time tf = 10 days.
Another convergence test was performed for ph = pu = 3, increasing the number of elements and correspondingly decreasing the
value of the time step. In this case, the maximum Courant numbers vary because of the mesh inhomogeneity, so that 2 < Ccel < 18,
0.5 < Cvel < 4. The results are reported in tables 4, 5 and 6 for h,
u and v, respectively. The empirical convergence order q2emp based
on the l2 norm errors has also been estimated, showing that in this
stationary test convergence rates above the second order of the time
discretization can be achieved.
22
ph pu ∆t [s]
2
3
4
5
6
7
8
3
4
5
6
7
8
9
4800
3600
2880
2400
2057
1800
1600
l1 (v)
l2 (v)
l∞ (v)
1.001 × 10−1
1.859 × 10−2
7.376 × 10−4
8.185 × 10−5
3.074 × 10−6
3.370 × 10−7
2.175 × 10−8
1.016 × 10−1
1.823 × 10−2
7.428 × 10−4
8.307 × 10−5
3.173 × 10−6
3.432 × 10−7
2.317 × 10−8
2.698 × 10−1
6.848 × 10−2
2.884 × 10−3
2.574 × 10−4
1.123 × 10−5
1.323 × 10−6
5.124 × 10−8
Table 3: Relative errors on v for different polynomial degrees, SWE test case
2 with α = π/2 − 0.05 at time tf = 10 days.
Nx × Ny ∆t [s]
10 × 5
20 × 10
40 × 20
80 × 40
3600
1800
900
450
l1 (h)
l2 (h)
l∞ (h)
q2emp
2.557 × 10−4
2.187 × 10−5
2.530 × 10−6
3.996 × 10−7
3.495 × 10−4
2.889 × 10−5
3.353 × 10−6
5.534 × 10−7
1.403 × 10−3
1.566 × 10−4
1.430 × 10−5
3.134 × 10−6
−
3.6
3.1
2.6
Table 4: Relative errors on h for different number of elements, ph = pu = 3,
SWE test case 2 with α = π/2 − 0.05 at time tf = 10 days.
Nx × Ny ∆t [s]
10 × 5
20 × 10
40 × 20
80 × 40
3600
1800
900
450
l1 (u)
l2 (u)
l∞ (u)
q2emp
2.769 × 10−3
2.896 × 10−4
3.647 × 10−5
6.826 × 10−6
3.358 × 10−3
3.720 × 10−4
4.563 × 10−5
1.035 × 10−5
8.948 × 10−3
2.414 × 10−3
2.473 × 10−4
9.525 × 10−5
−
3.2
3.0
2.1
Table 5: Relative errors on u for different number of elements, ph = pu = 3,
SWE test case 2 with α = π/2 − 0.05 at time tf = 10 days.
23
Nx × Ny ∆t [s]
10 × 5
20 × 10
40 × 20
80 × 40
3600
1800
900
450
l1 (v)
l2 (v)
l∞ (v)
q2emp
3.309 × 10−3
4.016 × 10−4
5.180 × 10−5
9.405 × 10−6
3.346 × 10−3
4.233 × 10−4
5.578 × 10−5
1.214 × 10−5
8.250 × 10−3
1.255 × 10−3
2.329 × 10−4
7.763 × 10−5
−
3.0
2.9
2.2
Table 6: Relative errors on v for different number of elements, ph = pu = 3,
SWE test case 2 with α = π/2 − 0.05 at time tf = 10 days.
24
7.2
Unsteady flow with analytic solution
In a second, time dependent test, the analytic solution of (1)-(2) derived in [29] has been employed to assess the performance of the proposed discretization. More specifically, the analytic solution defined in
formula (23) of [29] was used. Since the exact solution is periodic, the
initial profiles also correspond to the exact solution an integer number
of days later. The proposed SISLDG scheme has been integrated up
to tf = 5 days with ph = 4 and pu = 5 on meshes with increasing
number of elements, while the time step has been decreased accordingly. In this case, the maximum Courant numbers vary because of
the mesh dishomogeneity, so that 4 < Ccel < 26, 1.25 < Cvel < 8.
Error norms for h, u, v of the above-mentioned integrations have been
computed at tf = 5 days and displayed in tables 7 - 9. An empirical order estimation shows that full second order accuracy in time is
attained.
Nx × Ny
10 × 5
20 × 10
40 × 20
80 × 40
∆t [s]
l1 (h)
l2 (h)
l∞ (h)
q2emp
3600
1800
900
450
5.456 × 10−3
1.246 × 10−3
3.039 × 10−4
7.548 × 10−5
6.120 × 10−3
1.397 × 10−3
3.410 × 10−4
8.475 × 10−5
9.537 × 10−3
2.143 × 10−3
5.207 × 10−4
1.292 × 10−4
2.1
2.0
2.0
Table 7: Relative errors on h at different resolutions, Läuter test case.
Nx × Ny
10 × 5
20 × 10
40 × 20
80 × 40
∆t [s]
l1 (u)
l2 (u)
l∞ (u)
q2emp
3600
1800
900
450
6.567 × 10−2
1.665 × 10−2
4.210 × 10−3
1.057 × 10−3
7.848 × 10−2
1.994 × 10−2
5.032 × 10−3
1.261 × 10−3
1.670 × 10−1
3.931 × 10−2
9.811 × 10−3
2.452 × 10−3
2.0
2.0
2.0
Table 8: Relative errors on u at different resolutions, Läuter test case.
For comparison, analogous errors have been computed with the
same discretization parameters but employing the off centered Crank
Nicolson method of [52] with θ = 0.6. The resulting improvement in
the errors between the TRBDF2 scheme and the off-centered Crank
Nicolson is achieved at an essentially equivalent computational cost in
terms of total CPU time employed.
25
Nx × Ny
10 × 5
20 × 10
40 × 20
80 × 40
∆t [s]
l1 (v)
l2 (v)
l∞ (v)
q2emp
3600
1800
900
450
1.174 × 10−1
2.939 × 10−2
7.336 × 10−3
1.833 × 10−3
1.198 × 10−1
3.002 × 10−2
7.497 × 10−3
1.874 × 10−3
2.316 × 10−1
5.561 × 10−2
1.390 × 10−2
3.464 × 10−3
2.0
2.0
2.0
Table 9: Relative errors on v at different resolutions, Läuter test case.
Nx × Ny
10 × 5
20 × 10
40 × 20
80 × 40
∆t [s]
l1 (h)
l2 (h)
l∞ (h)
q2emp
3600
1800
900
450
1.444 × 10−2
8.742 × 10−3
4.814 × 10−3
2.526 × 10−3
1.633 × 10−2
9.894 × 10−3
5.451 × 10−3
2.861 × 10−3
2.398 × 10−2
1.445 × 10−2
7.956 × 10−3
4.177 × 10−3
0.7
0.9
0.9
Table 10: Relative errors on h at different resolutions, Läuter test case with
off centered Crank Nicolson, θ = 0.6.
Nx × Ny
∆t [s]
l1 (u)
l2 (u)
l∞ (u)
q2emp
10 × 5
20 × 10
40 × 20
80 × 40
3600
1800
900
450
1.800 × 10−1
1.077 × 10−1
5.895 × 10−2
3.084 × 10−2
2.092 × 10−1
1.255 × 10−1
6.880 × 10−2
3.603 × 10−2
3.810 × 10−1
2.155 × 10−1
1.186 × 10−1
6.234 × 10−2
0.7
0.9
0.9
Table 11: Relative errors on u at different resolutions, Läuter test case with
off centered Crank Nicolson, θ = 0.6.
Nx × Ny
10 × 5
20 × 10
40 × 20
80 × 40
∆t [s]
l1 (v)
l2 (v)
l∞ (v)
q2emp
3600
1800
900
450
3.608 × 10−1
2.164 × 10−1
1.185 × 10−1
6.195 × 10−2
3.665 × 10−1
2.198 × 10−1
1.203 × 10−1
6.291 × 10−2
5.166 × 10−1
3.041 × 10−1
1.671 × 10−2
8.809 × 10−2
0.7
0.9
0.9
Table 12: Relative errors on v at different resolutions, Läuter test case with
off centered Crank Nicolson, θ = 0.6.
26
7.3
Zonal flow over an isolated mountain
We have then performed numerical simulations reproducing the test
case 5 of [55], given by a zonal flow impinging on an isolated mountain
of conical shape. The geostrophic balance here is broken by orographic
forcing, which results in the development of a planetary wave propagating all around the globe.
Plots of the fluid depth h as well as of the velocity components
u and v at 15 days are shown in figures 6-8. The resolution used
corresponds to a mesh of 60 × 30 elements with ph = 4, pu = 5, and
∆t = 900 s, giving a Courant number Ccel ≈ 58 in elements close to
the poles. It can be observed that all the main features of the flow are
correctly reproduced. In particular, no significant Gibbs phenomena
are detected in the vicinity of the mountain, even in the initial stages
of the simulation.
1.5
5250
52
5500
5750
55
5
5250
50
00
0
0
75
0.5
5500
525
5250
5500
1
5750
750
5750
0
0
550
575
5500
0
5250
50
−1.5
−3
52
−1
5250
−2
50
50
550
57
57
−0.5
55
0
5250 0
y
5
0
−1
0
x
1
2
3
Figure 6: h field after 15 days, isolated mountain wave test case, Ccel ≈ 58.
Contour lines spacing is 50 m.
The evolution in time of global invariants during this simulation is
shown in figures 9(a), 9(b), 9(c), respectively. Error norms for h and
u at different resolutions corresponding to a Ccel ≈ 6 and ph = pu = 3,
have been computed at tf = 5 days and are displayed in tables 13 14, with respect to a reference solution given by the National Center
for Atmospheric Research (NCAR) spectral model [22] at resolution
T511. It is apparent the second order of the proposed SISLDG scheme
in time. Since, as observed in [22], the National Center for Atmospheric Research (NCAR) spectral model incorporates diffusion terms
27
22
14
6
22
22
6
14
6
6
−1.5
−3
6
14
14
6
14
6
14
22
6
14
22
−2
14
−1
14
22
22
14
30
14
14
y
22
14
22
14
22
14
6
−0.5
6
22
30
14
22
14
14
0
14
14
6
14
14
−2
6
−2
−10
1
6
14
−2
6
0.5
−2
6
−2
30
1.5
6
−2
−1
0
x
1
2
3
Figure 7: u field after 15 days, isolated mountain wave test case, Ccel ≈ 58.
Contour lines spacing is 4 m s−1 .
in the governing equations, while the proposed SISLDG scheme does
not employ any diffusion terms nor filtering, nor smoothing of the topography, for this test it seemed more appropriate to compute relative
errors with respect to NCAR spectral model [22] solution at an earlier
time, tf = 5 days, when it can be assumed that the effects of diffusion
have less impact. Error norms for h and u have been computed at
tf = 15 days at different resolutions (corresponding to a Ccel ≈ 7),
ph = pu = 3, and displayed in tables 15 - 16.
Nx × Ny
∆t[min]
l1 (h)
l2 (h)
l∞ (h)
q2emp
12 × 6
24 × 12
48 × 24
20
10
5
8.19 × 10−4
1.49 × 10−4
2.88 × 10−5
1.08 × 10−3
2.08 × 10−4
4.25 × 10−5
5.90 × 10−3
1.92 × 10−3
8.40 × 10−4
2.4
2.3
Table 13: Relative errors on h at different resolutions, isolated mountain
wave test case, tf = 5 days.
Finally the mountain wave test case has been run on the same
mesh of 60 × 30 elements, ∆t = 900 s, with either static or static
plus dynamic adaptivity. The tolerance ǫ for the dynamic adaptivity
[52] has been set to ǫ = 10−2 . Results are reported in terms of error
norms with respect to a nonadaptive solution at the maximum uniform
28
−8
8
0
0
0
0
0
0
8
−8
0
−8
−8
8
−8
0
16
8
0
x
0
−8
−1
0
−2
8
−1.5
−3
−8
0
8
0
8
8
−16
0
−1
0
8
16
−8
0
−8
8
0
8
−16 −8
−8
8
−8
−16
−8
0
−0.5
0
0
0
8
0
y
0
0 0
8
0
0.5
16
0
0
8
1
−8
−16
8
−8
8
1.5
1
2
3
Figure 8: v field after 15 days, isolated mountain wave test case, Ccel ≈ 58.
Contour lines spacing is 4 m s−1 .
Nx × Ny
12 × 6
24 × 12
48 × 24
∆t[min]
l1 (u)
l2 (u)
l∞ (u)
q2emp
20
10
5
4.33 × 10−2
5.70 × 10−3
1.11 × 10−3
5.81 × 10−2
7.33 × 10−3
1.72 × 10−3
1.39 × 10−1
1.06 × 10−1
1.56 × 10−2
2.9
2.2
Table 14: Relative errors on u at different resolutions, isolated mountain
wave test case, tf = 5 days.
resolution and in terms of efficiency gain, measured through the saving
of number of linear solver iterations per time-step ∆average
as well as
iter
through the saving of number of degrees of freedom actually used
per timestep ∆average
; these results are summarized in tables 17 - 19:
dof
≈ 10.7% and
the use of static adaptivity only resulted in ∆average
iter
average
∆dof
≈ 88%, while the use of both static and dynamic adaptivity
led to ∆average
≈ 13% and ∆average
≈ 45%. The distribution of the
iter
dof
statically and dynamically adapted local polynomial degree used to
represent the solution after 15 days is shown in figure 10. It can be
noticed how, even after 15 days, higher polynomial degrees are still
automatically concentrated around the location of the mountain.
29
Nx × Ny
12 × 6
24 × 12
48 × 24
∆t[s]
l1 (h)
l2 (h)
l∞ (h)
q2emp
1500
750
375
2.34 × 10−3
5.99 × 10−4
2.00 × 10−4
2.92 × 10−3
7.72 × 10−4
2.74 × 10−4
1.49 × 10−2
3.87 × 10−3
1.87 × 10−3
1.9
1.5
Table 15: Relative errors on h at different resolutions, isolated mountain
wave test case, tf = 15 days.
Nx × Ny
12 × 6
24 × 12
48 × 24
∆t[s]
l1 (u)
l2 (u)
l∞ (u)
q2emp
1500
750
375
1.12 × 10−1
2.09 × 10−2
6.37 × 10−3
1.29 × 10−1
2.37 × 10−2
7.92 × 10−3
2.97 × 10−1
5.73 × 10−2
3.39 × 10−2
2.4
1.6
Table 16: Relative errors on u at different resolutions, isolated mountain
wave test case, tf = 15 days.
adaptivity
l1 (h)
l2 (h)
l∞ (h)
static
static + dynamic
1.415 × 10−4
1.660 × 10−4
3.314 × 10−4
3.419 × 10−4
2.117 × 10−3
2.038 × 10−3
Table 17: Relative errors between (statically and statically plus dynamically)
adaptive and nonadaptive solution for isolated mountain wave test case, h
field.
adaptivity
l1 (u)
l2 (u)
l∞ (u)
static
static + dynamic
1.289 × 10−2
1.509 × 10−2
3.275 × 10−2
3.309 × 10−2
1.524 × 10−1
1.475 × 10−1
Table 18: Relative errors between (statically and statically plus dynamically)
adaptive and nonadaptive solution for isolated mountain wave test case, u
field.
30
−5
−4
1
10
x 10
0
−1
−6
J (qmass )
J (qenerg )
10
−2
−3
−8
10
−4
−5
−10
10
0
5
days
10
15
−6
0
(a)
5
days
10
(b)
−5
4
x 10
I(qentsr )
3
2
1
0
−1
0
5
days
10
15
(c)
Figure 9: Integral invariants evolution, mass (a), energy (b), potential enstrophy (c), isolated mountain wave test case, Ccel ≈ 58.
adaptivity
l1 (v)
l2 (v)
l∞ (v)
static
static + dynamic
2.501 × 10−2
2.833 × 10−2
6.824 × 10−2
7.019 × 10−2
6.597 × 10−1
6.975 × 10−1
Table 19: Relative errors between (statically and statically plus dynamically)
adaptive and nonadaptive solution for isolated mountain wave test case, v
field.
31
15
4
1
y
3
0
2
−1
−3
1
−2
−1
0
x
1
2
3
Figure 10: Statically and dynamically adapted local ph distribution at 15
days, isolated mountain wave test case.
32
7.4
Rossby-Haurwitz wave
We have then considered test case 6 of [55], where the initial datum
consists of a Rossby-Haurwitz wave of wave number 4. This case
actually concerns a solution of the nondivergent barotropic vorticity
equation, that is not an exact solution of the system (1) - (2). For a
discussion about the stability of this profile as a solution of (1) - (2) see
[50]. Plots of the fluid depth h as well as of the velocity components
u and v at 15 days are shown in figures 11-13. The resolution used
corresponds to a mesh of 64 × 32 elements with ph = 4, pu = 5, and
∆t = 900 s, giving a Courant number Ccel ≈ 83 in elements close to
poles. It can be observed that all the main features of the flow are
correctly reproduced.
1.5
10500
00
90
8500
0
00
10
900
950 0
10 0
00
0
00
90
10500
10500
95 1
00 000
0
0
1
00
00
0
x
10
9 10
900500 000
0
y
00
00
85
−1
0
50
10
00
−2
90
00
95 100
00
90
−1.5
−3
00
8500
8500
−1
00
95
95
0
00
10 0
950 0
900
−0.5
00
951
0000
90
0
0
00 000
95 1
0
900 500 000
9 10
0.5
00
8500
00
8500
1
85
90
8500
8500
8500
2
3
Figure 11: h field after 15 days, Rossby-Haurwitz wave test case, Ccel ≈ 83.
Contour lines spacing is 100 m.
The evolution in time of global invariants during this simulation
is shown in figures 14(a), 14(b), 14(c), respectively. Error norms for
h and u at different resolutions, corresponding to a Ccel ≈ 32 and
ph = 4, pu = 5 have been computed at tf = 15 days and are displayed in tables 20 - 21, with respect to a reference solution given
by the National Center for Atmospheric Research (NCAR) spectral
model [22] at resolution T511. It is apparent the second order of the
proposed SISLDG scheme in time. Unlike the NCAR spectral model,
the proposed SISLDG scheme does not employ any explicit numerical
diffusion.
Finally, the Rossby-Haurwitz wave test case has been run on the
33
1.5
24
24
24
48
48
48
48
24
48
48
48
48
24
48
48
72
48
24
24
24
72
96
48
48
72
48
24
72
96
24
y
48
24
48
72
72
48
48
−1.5
−3
96
48
−1
24
72
96
72
−0.5
48
24
24
0
48
48
0.5
24
1
24
−2
24
−1
0
x
1
2
3
Figure 12: u field after 15 days, Rossby-Haurwitz wave test case, Ccel ≈ 83.
Contour lines spacing is 8 m s−1 .
Nx × Ny
10 × 5
20 × 10
40 × 20
∆t[min]
l1 (h)
l2 (h)
l∞ (h)
q2emp
60
30
15
2.92 × 10−2
5.50 × 10−3
1.40 × 10−3
3.82 × 10−2
6.80 × 10−3
1.80 × 10−3
6.75 × 10−2
1.11 × 10−2
3.20 × 10−3
2.4
2.0
Table 20: Relative errors on h at different resolutions, Rossby-Haurwitz wave
test case.
same mesh of 64 × 32 elements, ∆t = 900 s, with either static or static
plus dynamic adaptivity. The tolerance ǫ for the dynamic adaptivity
[52] has been set to ǫ = 5 × 10−2 . Results are reported in terms of
error norms with respect to a nonadaptive solution at the maximum
uniform resolution and in terms of efficiency gain, measured through
the saving of number of linear solver iterations per time-step ∆average
iter
as well as through the saving of number of degrees of freedom actually
used per timestep ∆average
; these results are summarized in tables 22 dof
24: the use of static adaptivity only resulted in ∆average
≈ 10.7% and
iter
∆average
≈
88%,
while
the
use
of
both
static
and
dynamic
adaptivity
dof
average
average
≈ 13% and ∆dof
≈ 45%. The distribution of the
led to ∆iter
statically and dynamically adapted local polynomial degree used to
represent the solution after 15 days is shown in figure 15. It can be
noticed how, even after 15 days, and even if the maximum allowed ph
34
−12
−36
60
−12
−3
−60 6
12
36
−36
−12
− 12
−12
−36
−12
36
− 12
−12
36
−36
−12
36
60
60
−12
− 12
36
36
−12
−3
−60 6
36
−60
36
−60
60
−60
36
12
−36
−36
−36
−12
12
12
36
12
−36
60
−60
− 12
12
12
y
12
36
−36
60
12
36
−60
−36
12
36
12
36
12
−1
−36
60
−0.5
−12
12
36
12
0
−36
60
12
−60
0.5
−12
−3
6
12
36
1
−12
−3
6
1.5
12
−1.5
−3
−2
−1
0
x
1
2
3
Figure 13: v field after 15 days, Rossby-Haurwitz wave test case, Ccel ≈ 83.
Contour lines spacing is 8 m s−1 .
Nx × Ny
10 × 5
20 × 10
40 × 20
∆t[min]
l1 (u)
l2 (u)
l∞ (u)
q2emp
60
30
15
4.065 × 10−1
7.79 × 10−2
2.04 × 10−2
3.775 × 10−1
7.33 × 10−2
1.95 × 10−2
2.305 × 10−1
5.67 × 10−2
1.76 × 10−2
2.4
1.9
Table 21: Relative errors on u at different resolutions, Rossby-Haurwitz wave
test case.
is 4, the use of the adaptivity criterion with ǫ = 5 × 10−2 leads to the
use of at most cubic polynomials for the local representation of h.
35
adaptivity
l1 (h)
l2 (h)
l∞ (h)
static
static + dynamic
2.182 × 10−4
2.358 × 10−3
3.434 × 10−4
2.963 × 10−3
2.856 × 10−4
5.157 × 10−3
Table 22: Relative errors between (statically and statically plus dynamically)
adaptive and nonadaptive solution for Rossby-Haurwitz wave test case, h
field.
adaptivity
l1 (u)
l2 (u)
l∞ (u)
static
static + dynamic
7.041 × 10−3
3.639 × 10−2
1.236 × 10−2
3.387 × 10−2
2.834 × 10−2
2.678 × 10−2
Table 23: Relative errors between (statically and statically plus dynamically)
adaptive and nonadaptive solution for Rossby-Haurwitz wave test case, u
field.
adaptivity
l1 (v)
l2 (v)
l∞ (v)
static
static + dynamic
3.158 × 10−3
2.723 × 10−2
3.250 × 10−3
2.432 × 10−2
1.148 × 10−2
2.646 × 10−2
Table 24: Relative errors between (statically and statically plus dynamically)
adaptive and nonadaptive solution for Rossby-Haurwitz wave test case, v
field.
36
−9
−4
−10
10
−8
−10
−6
10
J (qmass )
J (qenerg )
−7
−8
−10
−6
−10
10
−5
−10
−4
−10
10
0
5
days
10
15
(a)
−10
0
5
days
10
(b)
−4
2
x 10
1
I(qentsr )
0
−1
−2
−3
−4
−5
−6
0
5
days
10
15
(c)
Figure 14: Integral invariants evolution, mass (a), energy (b), potential enstrophy (c), Rossby-Haurwitz wave test case, Ccel ≈ 83.
37
15
Figure 15: Statically and dynamically adapted local ph distribution at 15
days, Rossby-Haurwitz test case.
38
7.5
Nonhydrostatic inertia gravity waves
In this section we consider the test case proposed in [47]. It consists in a set of inertia-gravity waves propagating in a channel with a
uniformly stratified reference atmosphere characterized by a constant
Brunt-Wäisälä frequency N 2 = 0.01. The domain and the initial and
boundary conditions are identical to those of [47]. The initial perturbation in potential temperature radiates symmetrically to the left and
to the right, but because of the superimposed mean horizontal flow
(u = 20m/s), does not remain centered around the initial position.
Contours of potential temperature perturbation, horizontal velocity,
and vertical velocity time tf = 3000 s are shown in figures 16, 17, 18,
respectively. The computed results compare well with the structure
displayed by the analytical solution of the linearized equations proposed in [1] and with numerical results obtained with other numerical
methods, see e.g. [4]. It is to be remarked that for this experiment
300 × 10 elements, pπ = 4, pu = 5 and a timestep ∆t = 15 s were used,
corresponding to a Courant number Csnd ≈ 25.
0.000977
0.000414
54
01
0.0
−0.000149
−0.000149
0.000414
0.000977
0.00154
−0.000149
−0.000149
−0.000149
0.000414
−0.000149
−0.000149
0.000414
0.000414
0.000414
−0.000149
0.000414
−0.000149
−0.000149
−0.000149
−0.000149
0.000414
54
0.00097
0.000414 7
z
−0.000149
0.000414
977
0.000
0.000414
0.00154
01
0.000414
0.0
0.000977
14
−0.000149
0.000414
0.000977
0.000977 0.000414
0.000414
−0.000149
−0.000149
−0.000149
0.000414
0.0004
2000
−0.000149
3000
0.000977
−0.000149
0.000977
4000
−0.000149
0.000414
0.000977
5000
0.000414
6000
0.00154
7000
0.000414
0.000414
0.00154
8000
0.000414
−0.000149
9000
−0.000149
10000
1000
0
0
0.5
1
1.5
x
2
2.5
3
5
x 10
Figure 16: Contours of perturbation potential temperature in the internal
gravity wave test.
39
20
20
20.004
20
20
20
19.996
20
20
20
20
20
20
5000
20
20
20
6000
z
20.008
20.004
19.996
7000
20
20
2020
20
8000
20.004
19.992
19.996
20
9000
20
10000
20
4000
20
19.996
20
20
20
20
20
1
20
0.5
20
0
0
20
20
20
1000
20.004
2000
20
20
20
20
3000
1.5
x
2
2.5
3
5
x 10
Figure 17: Contours of horizontal velocity in the internal gravity wave test.
−0.001
0.001
0.003
0.001
0.001
0.001
−0.001
0.001
0.001
0.001
0.001
0.001
−0.001
0.001
0.001
0.001
0.001
−0.001
0.003
0.001
1
−0.00
−0.001
01
−0.0
0.001
0.003 0.001
0.001
0.001
0.001
0.001
−0.001
0.001
z
01
.0
−0
−0.001
0.003
0.003
0.003
0.003
2000
0.001
0.001
0.001
0.003
0.003 0.001
3000
0.001
4000
−0.001
5000
0.001
6000
0.003
7000
0.001
0.001
1
−0.00
01
8000
0.0
9000
0.001
10000
1000
0
0
0.5
1
1.5
x
2
2.5
3
5
x 10
Figure 18: Contours of vertical velocity in the internal gravity wave test.
40
7.6
Rising thermal bubble
4000
3500
3500
3000
3000
2500
2500
2000
2000
1500
1500
1000
1000
500
500
0
0
z
z
4000
500
1000
1500
x
2000
2500
0
0
3000
4000
4000
3500
3500
3000
3000
2500
2500
2000
2000
z
z
As nonlinear nonhydrostatic time-dependent experiment, we consider
in this section the test case proposed in [23]. It consists in the evolution
of a warm bubble placed in an isentropic atmosphere at rest. All data
are as in [23]. Contours of potential temperature perturbation at
different times are shown in figure 19. These results were obtained
using 64 × 80 elements, pπ = 4, pu = 5 and a timestep ∆t = 0.5 s,
corresponding to a Courant number Csnd ≈ 17.
1500
1500
1000
1000
500
500
0
0
500
1000
1500
x
2000
2500
3000
0
0
500
1000
1500
x
2000
2500
3000
500
1000
1500
x
2000
2500
3000
Figure 19: Contours (every 0.2 K and the zero contour is omitted) of perturbation potential temperature in the rising thermal bubble test at time 10
min, 14 min, 15 min and 16 min respectively in clockwise sense.
41
8
Conclusions and future perspectives
We have introduced an accurate and efficient discretization approach
for typical model equations of atmospheric flows. We have extended
to spherical geometry the techniques proposed in [52], combining a
semi-Lagrangian approach with the TR-BDF2 semi-implicit time discretization method and with a spatial discretization based on adaptive
discontinuous finite elements. The resulting method is unconditionally
stable and has full second order accuracy in time, thus improving standard off-centered trapezoidal rule discretizations without any major
increase in the computational cost nor loss in stability, while allowing
the use of time steps up to 100 times larger than those required by
stability for explicit methods applied to corresponding DG discretizations. The method also has arbitrarily high order accuracy in space
and can effectively adapt the number of degrees of freedom employed
in each element in order to balance accuracy and computational cost.
The p−adaptivity approach employed does not require remeshing and
is especially suitable for applications, such as numerical weather prediction, in which a large number of physical quantities is associated
to a given the mesh.
Furthermore, although the proposed method can be implemented
on arbitrary unstructured and nonconforming meshes, like reduced
Gaussian grids employed by spectral transform models, even in applications on simple Cartesian meshes in spherical coordinates the
p−adaptivity approach can cure effectively the pole problem by reducing the polynomial degree in the polar elements, yielding a reduction
in the computational cost that is comparable to that achieved with reduced grids. Numerical simulations of classical shallow water and nonhydrostatic benchmarks have been employed to validate the method
and to demonstrate its capability to achieve accurate results even at
large Courant numbers, while reducing the computational cost thanks
to the adaptivity approach. The proposed numerical framework can
thus provide the basis of for an accurate and efficient adaptive weather
prediction system.
42
Acknowledgements
This research work has been supported financially by the The Abdus Salam International Center for Theoretical Physics, Earth System Physics Section. We are extremely grateful to Filippo Giorgi of
ICTP for his strong interest in our work and his continuous support.
Financial support has also been provided by the INDAM-GNCS 2012
project Sviluppi teorici ed applicativi dei metodi Semi-Lagrangiani and
by Politecnico di Milano. We would also like to acknowledge useful
conversations on the topics of this paper with C. Erath, F. X. Giraldo,
M. Restelli, N. Wood.
References
[1] M. Baldauf and S. Brdar. An analytic solution for linear gravity
waves in a channel as a test for numerical models using the nonhydrostatic, compressible Euler equations. Quarterly Journal of
the Royal Meteorological Society, 139:1977–1989, 2013.
[2] R.E. Bank, W.M. Coughran, W. Fichtner, E.H. Grosse, D.J.
Rose, and R.K. Smith. Transient Simulation of Silicon Devices
and Circuits. IEEE Transactions on Electron Devices., 32:1992–
2007, 1985.
[3] J.R. Bates, F.H.M. Semazzi, R.W. Higgins, and S.R.M. Barros.
Integration of the Shallow Water Equations on the Sphere Using a Vector Semi-Lagrangian Scheme with a Multigrid Solver.
Monthly Weather Review, 118:1615–1627, 1990.
[4] L. Bonaventura. A semi-implicit, semi-Lagrangian scheme using
the height coordinate for a nonhydrostatic and fully elastic model
of atmospheric flows. Journal of Computational Physics, 158:186–
213, 2000.
[5] L. Bonaventura, R. Redler, and R. Budich. Earth System
Modelling 2: Algorithms, Code Infrastructure and Optimisation.
Springer Verlag, New York, 2012.
[6] J. Butcher and D. Chen. A new type of singly-implicit RungeKutta method. Applied numerical mathematics, 34:179–188,
2000.
[7] V. Casulli and E. Cattani. Stability, accuracy and efficiency of
a semi-implicit method for three-dimensional shallow water flow.
Computational Mathematics and Applications, 27:99–112, 1994.
43
[8] J. Coté. A Lagrange multiplier approach for the metric terms of
semi-Lagrangian models on the sphere. Quarterly Journal of the
Royal Meteorological Society, 114:1347–1352, 1988.
[9] J. Coté and A. Staniforth. A Two-Time-Level Semi-Lagrangian
Semi-implicit Scheme for Spectral Models. Monthly Weather Review, 116:2003–2012, 1988.
[10] M.J.P. Cullen. A test of a semi-implicit integration technique for
a fully compressible non-hydrostatic model. Quarterly Journal of
the Royal Meteorological Society, 116:1253–1258, 1990.
[11] T. Davies, M.J.P. Cullen, A.J. Malcolm, M.H. Mawson, A. Staniforth, A.A. White, and N. Wood. A new dynamical core for the
Met Office’s global and regional modelling of the atmosphere.
Quarterly Journal of the Royal Meteorological Society, 131:1759–
1782, 2005.
[12] C.N. Dawson, J.J. Westerink, J.C. Feyen, and D. Pothina. Continuous, Discontinuous and coupled Discontinuous-Continuous
Galerkin finite element methods for the shallow water equations.
International Journal of Numerical Methods in Fluids, 52:63–88,
2006.
[13] F. Desharnais and A. Robert. Errors near the poles generated by
a semi-Lagrangian integration scheme in a global spectral model.
Atmosphere-Ocean, 28:162–176, 1990.
[14] M. Dumbser and V. Casulli. A staggered semi-implicit spectral discontinuous Galerkin scheme for the shallow water equations. Applied Mathematics and Computation, 219(15):8057 –
8077, 2013.
[15] A.E. Gill. Atmospheric-Ocean Dynamics. Academic Press, 1987.
[16] F.X. Giraldo. Trajectory computations for spherical geodesic
grids in cartesian space. Monthly Weather Review, 127:1651–
1662, 1999.
[17] F.X. Giraldo, J.S. Hesthaven, and T. Warburton. High-Order
Discontinuous Galerkin methods for the spherical shallow water
equations. Journal of Computational Physics, 181:499–525, 2002.
[18] F.X. Giraldo, J.F. Kelly, and E.M. Constantinescu. Implicitexplicit formulations of a three-dimensional nonhydrostatic unified model of the atmosphere (NUMA). SIAM Journal of Scientific Computing, 35(5):1162–1194, 2013.
[19] F.X. Giraldo and M. Restelli. High-order semi-implicit timeintegrators for a triangular discontinuous Galerkin oceanic shallow water model. International Journal of Numerical Methods in
Fluids, 63(9):1077–1102, 2010.
44
[20] M. Hortal and A. Simmons. Use of reduced Gaussian grids in
spectral models. Monthly Weather Review, 119:1057–1074, 1991.
[21] M.E. Hosea and L.F. Shampine. Analysis and implementation of
TR-BDF2. Applied Numerical Mathematics, 20:21–37, 1996.
[22] R. Jakob-Chien, J. Hack, and D. Williamson. Spectral transform
solutions to the shallow water test set. Journal of Computational
Physics, 119:164187, 1995.
[23] R. L. Carpenter Jr., K. K. Droegemeier, P. R. Woodward, and
C. E. Hane. Application of the Piecewise Parabolic Method
(PPM) to Meteorological Modeling. Monthly Weather Review,
118:586–612, 1990.
[24] C. T. Kelley. Iterative Methods for Linear and Nonlinear Equations. SIAM, Philadelphia, 1995.
[25] J.F. Kelly and F.X. Giraldo. Continuous and discontinuous Galerkin methods for a scalable three-dimensional nonhydrostatic
atmospheric model: Limited-area mode. Journal of Computational Physics, 231(24):7988–8008, 2012.
[26] C. Kennedy and M. Carpenter. Additive Runge-Kutta schemes
for convection-diffusion-reaction equations. Applied Numerical
Mathematics, 44:139–181, 2003.
[27] J.D. Lambert. Numerical methods for ordinary differential systems. Wiley, 1991.
[28] M. Läuter, F.X. Giraldo, D. Handorf, and K. Dethloff. A discontinuous Galerkin method for the shallow water equations in spherical triangular coordinates. Journal of Computational Physics,
227(24):10226–10242, 2008.
[29] M. Läuter, D. Handorf, and K. Dethloff. Unsteady analytical
solutions of the spherical shallow water equations. Journal of
Computational Physics, 210:535,553, 2005.
[30] D.Y. Le Roux. Spurious inertial oscillations in shallow-water
models. Journal of Computational Physics, 231:7959–7987, 2013.
[31] D.Y. Le Roux and G.F. Carey. Stability-dispersion analysis of
the discontinuous Galerkin linearized shallow-water system. International Journal of Numerical Methods in Fluids, 48:325–347,
2005.
[32] R. LeVeque. Finite difference methods for ordinary and partial
differential equations: steady-state and time-dependent problems.
Society for Industrial and Applied Mathematics, 2007.
45
[33] A. McDonald and J.R. Bates. Semi-Lagrangian Integration of a
Gridpoint Shallow Water Model on the Sphere. Monthly Weather
Review, 117:130–137, 1989.
[34] J.L. McGregor. Economical determination of departure points for
semi-Lagrangian models. Monthly Weather Review, 121:221–330,
1993.
[35] K. W. Morton. On the analysis of finite volume methods for
evolutionary problems. SIAM Journal of Numerical Analysis,
35:2195–2222, 1998.
[36] K. W. Morton, A. Priestley, and E. Süli. Stability of the
Lagrange-Galerkin scheme with inexact integration. RAIRO
Modellisation Matemathique et Analyse Numerique, 22:625–653,
1988.
[37] K. W. Morton and E. Süli. Evolution-Galerkin methods and their
supraconvergence. Numerische Mathematik, 71:331–355, 1995.
[38] R. D. Nair, S.J. Thomas, and R.D. Loft. A Discontinuous Galerkin Global Shallow Water Model. Monthly Weather Review,
133:876–888, 2005.
[39] R. D. Nair, S.J. Thomas, and R.D. Loft. A Discontinuous Galerkin transport scheme on the cubed sphere. Monthly Weather
Review, 133:814–828, 2005.
[40] A. Priestley. Exact Projections and the Lagrange-Galerkin Method: A Realistic Alternative to Quadrature. Journal of Computational Physics, 112:316–333, 1994.
[41] M. Restelli, L. Bonaventura, and R. Sacco. A semi-Lagrangian
Discontinuous Galerkin method for scalar advection by incompressible flows. Journal of Computational Physics, 216:195–215,
2006.
[42] M. Restelli and F.X. Giraldo. A conservative Discontinuous Galerkin semi-implicit formulation for the Navier-Stokes equations
in nonhydrostatic mesoscale modeling. SIAM Journal of Scientific Computing, 31:2231–2257, 2009.
[43] P. Ripodas, A. Gassmann, J. Förstner, D. Majewski, M. Giorgetta, P. Korn, L. Kornblueh, H. Wan, G. Zängl, L. Bonaventura,
and T. Heinze. Icosahedral Shallow Water Model (ICOSWM):
results of shallow water test cases and sensitivity to model parameters. Geoscientific Model Development, 2:231–251, 2009.
[44] H. Ritchie. Application of the Semi-Lagrangian Method to
a Spectral Model of the Shallow Water Equations. Monthly
Weather Review, 116:1587–1598, 1988.
46
[45] G. Rosatti, L. Bonaventura, and D. Cesari. Semi-implicit, semiLagrangian environmental modelling on cartesian grids with cut
cells. Journal of Computational Physics, 204:353–377, 2005.
[46] Y. Saad and M.H. Schultz. GMRES: A generalized minimal residual algorithm for solving nonsymmetric linear systems. SIAM
Journal on Scientific and Statistical Computing, 7:856–869, 1986.
[47] W.C. Skamarock and J.B. Klemp. Efficiency and accuracy of the
Klemp-Wilhelmson time-splitting technique. Monthly Weather
Review, 122:2623–2630, 1994.
[48] A. Staniforth, A.A. White, and N. Wood. Treatment of vector equations in deep-atmosphere semi-Lagrangian models.I: Momentum equation. Quarterly Journal of the Royal Meteorological
Society, 136:497–506, 2010.
[49] C. Temperton, M. Hortal, and A. Simmons. A two-time-level
semi-Lagrangian global spectral model. Quarterly Journal of the
Royal Meteorological Society, 127:111–127, 2001.
[50] J. Thuburn and Y. Li. Numerical simulations of Rossby-Haurwitz
waves. Tellus A, 52:181189, 2000.
[51] J. Thuburn and A.A. White. A geometrical view of the
shallow-atmosphere approximation, with application to the semilagrangian departure point calculation. Quarterly Journal of the
Royal Meteorological Society, 139:261268, 2013.
[52] G. Tumolo, L. Bonaventura, and M. Restelli. A semi-implicit,
semi-Lagrangian, p-adaptive discontinuous Galerkin method for
the shallow water equations. Journal of Computational Physics,
232:46–67, January 2013.
[53] R.A. Walters. Numerically induced oscillations in finite-element
approximations to the shallow-water equations. International
Journal of Numerical Methods in Fluids, 3:591–604, 1983.
[54] R.A. Walters and G.F. Carey. Analysis of spurious oscillation
modes for the shallow-water and Navier-Stokes equations. Computers and Fluids, 11:51–68, 1983.
[55] D.L. Williamson, J.B. Drake, J.J. Hack, R. Jacob, and P.N.
Swarztrauber. A Standard Test Set for the Numerical Approximations to the Shallow Water Equations in Spherical Geometry.
Journal of Computational Physics, 102:211–224, 1992.
[56] O.C. Zienkiewicz, J.P.Gago, and D.W. Kelly. The hierarchical
concept in finite element analysis. Computers and Structures,
16:53–65, 1983.
47
| 5cs.CE
|
Fundamental Diagram of Rail Transit
and Its Application to Dynamic Assignment
arXiv:1708.02147v1 [cs.SY] 7 Aug 2017
Toru Seo∗† Kentaro Wada‡ Daisuke Fukuda§
August 8, 2017
Abstract
Urban rail transit often operates with high service frequencies to serve heavy passenger demand
during rush hours. Such operations can be delayed by train congestion, passenger congestion, and
the interaction of the two. Delays are problematic for many transit systems, as they become
amplified by this interactive feedback. However, there are no tractable models to describe
transit systems with dynamical delays, making it difficult to analyze the management strategies of
congested transit systems in general, solvable ways. To fill this gap, this article proposes simple yet
physical and dynamic models of urban rail transit. First, a fundamental diagram of a transit system
(3-dimensional relation among train-flow, train-density, and passenger-flow) is analytically derived
by considering the physical interactions in delays and congestion based on microscopic operation
principles. Then, a macroscopic model of a transit system with time-varying demand and supply is
developed as a continuous approximation based on the fundamental diagram. Finally, the accuracy
of the macroscopic model is investigated using a microscopic simulation, and applicable range of
the model is confirmed.
Keywords: public transport; rush hour; fundamental diagram; kinematic wave theory; MFD; dynamic
traffic assignment
1
Introduction
Urban rail transit, such as metro systems, plays a significant role in handling the transportation needs
of metropolitan areas (Vuchic 2005). Its most notable usage is the morning commute, in which
heavy passenger demand is focused into a short time period. To obtain general policy implications
for management strategies of transit systems (e.g., pricing, gating, scheduling), many studies have
theoretically analyzed such situations under certain simplifications, such as the static travel time of
transit operations (de Cea and Fernández 1993; Tabuchi 1993; Kraus and Yoshida 2002; Tian et al.
2007; Gonzales and Daganzo 2012; Trozzi et al. 2013; de Palma et al. 2015a,b).
It is known that urban mass transit often suffers from delays caused by congestion, even if no
serious incidents or accidents occur (Kato et al. 2012; Tirachini et al. 2013; Kariyazaki et al. 2015).
This means that the dynamical aspect of transit systems is important during periods of congestion.
∗
Corresponding author. [email protected]
Tokyo Institute of Technology, 2-12-1-M1-20, O-okayama, Meguro, Tokyo 152-8552, Japan
‡
Institute of Industrial Science, The University of Tokyo, Cw504, 4-6-1 Komaba, Meguro, Tokyo 153-8505, Japan
§
Tokyo Institute of Technology, 2-12-1-M1-11, O-okayama, Meguro, Tokyo 152-8552, Japan
†
1
For instance, in the Tokyo metropolitan area (TMA), which is one of the most populated regions in
the world, rail transit systems are essential and operated with high service frequency (up to 30 trains
per hour per line; headway of two minutes) to serve the heavy passenger demand during peak hours
(Kariyazaki 2016). Unfortunately, even if there are no accidents, chronic delays occur almost daily and
passengers experience longer and unreliable travel times due to congestion. For example, the mean
delay of one of the major transit lines in Tokyo during the rush hour is about eight minutes, whereas
the standard deviation of the delay is about two minutes (Iwakura et al. 2013). Kariyazaki (2016)
estimated that, on a typical weekday, three million commuters across the entire TMA experience such
delays, and the social cost caused by the delay corresponds to 230 billion Japanese yen (approximately
2 billion USD) per year. Appropriate management strategies to solve this issue are therefore desirable.
In general, the following types of congestion are observed in urban rail transit:
• train-congestion: congestion involving consecutive trains using the same tracks, also known as
‘knock-on delay’ (Carey and Kwieciński 1994).
• passenger-congestion: congestion of passengers at station platforms, namely, bottleneck
congestion at the doors of a train while it is stopped at a station (Wada et al. 2012; Kariyazaki
et al. 2015).1
These two types of congestion interact with each other and cause delay (Newell and Potts 1964; Wada
et al. 2012; Kato et al. 2012; Tirachini et al. 2013; Kariyazaki et al. 2015; Cuniasse et al. 2015). For
example, passenger-congestion can prolong the time that a train spends at a station. This extended
dwell time interrupts the operation of subsequent trains, and causes train-congestion at times of high
service frequency. As passenger throughput deteriorates when train-congestion occurs, the passenger
congestion at stations intensifies—this is a short-term vicious cycle. The extreme case is known as
‘bunching’ (Newell and Potts 1964). Cuniasse et al. (2015) reported macroscopic-scale production
loss phenomena which occur almost daily in a railway system due to congestion. Moreover, in the long
term, such chronic delays could affect passengers’ departure time choice; Kato et al. (2012) observed
this phenomenon in TMA. Kim et al. (2015) also reported that route choice of metro passengers is
affected by congestion, crowding, and delay. Therefore, these congestion dynamics affect both the
within-day and day-to-day dynamics of transit systems.
For this reason, it would be preferable to consider these dynamical aspects of transit systems in
order to obtain general policy implications for transit management under heavy demand during rush
hours, similar to road traffic congestion problems (c.f., dynamic traffic assignment, Szeto and Lo 2006;
Iryo 2013). However, to the authors’ knowledge, no study has investigated such problems in transit
systems. In the aforementioned theoretical studies on transit commuting (i.e., de Cea and Fernández
1993, and others), the travel time of a transit system is assumed to be constant and/or determined by
static models, meaning that the dynamical aspect is neglected. One reason for this might be that we do
not have tractable models of transit systems that can consider the dynamics of delay and congestion.2
To fill this gap, this article proposes tractable models of the dynamics of urban rail transit
considering the physical interaction between train-congestion and passenger-congestion. The
1Note that passenger-congestion differs from in-vehicle passenger-crowding, which results in discomfort due to standing
and crowding, but is not necessarily cause any delay directly.
2Several operation models have been proposed by considering the detailed mechanism of such delay and congestion
(see Vuchic 2005; Koutsopoulos and Wang 2007; Parbo et al. 2016; Cats et al. 2016; Li et al. 2017; Alonso et al. 2017,
and references therein), and these have been used to develop efficient operation schemes. However, their purposes are
case-specific optimization and evaluation such as time-tabling; it would be difficult to use them to obtain general policy
implications for management strategies, as they are essentially complex and intractable.
2
remainder of this article is organized as follows. In Section 2, a simple and tractable operation
model of rail transit is formulated by considering train-congestion, passenger-congestion, and the
interaction between them. The model describes the theoretical relation among train-flow, train-density,
and passenger-flow under ideal conditions—that is, a fundamental diagram (FD). In Section 3, a
macroscopic loading model of a transit system in which demand and supply change dynamically is
developed based on the proposed FD. The model is based on a continuous approximation approach
with the FD, which is widely used for automobile traffic flows—that is, an exit-flow model. The model
is called macroscopic because it describes the aggregated behavior of trains and passengers in a certain
(e.g., urban-scale) spatial domain. In Section 4, the approximation accuracy and other properties of the
proposed macroscopic model are investigated through a comparison with the results of a microscopic
simulation. Section 5 concludes this article.
2
Fundamental Diagram of Rail Transit System
In this section, we analytically derive an FD of a rail transit system based on microscopic operation
principles. The FD is defined as the relation among train-flow, train-density, and passenger-flow.
2.1
Assumptions of the Rail Transit System
We assume two principles of rail transit operation, namely, the train’s dwell behavior at a station for
passenger boarding and the cruising behavior on the railroad. Note that they are equivalent to those
employed by Wada et al. (2012).
The passenger boarding time is modeled using a point-queue bottleneck model. That is, the
flow-rate of passenger boarding to a dwelling train is assumed to be constant, µp ; and there is a buffer
time (e.g., time required for door opening/closing), gb , for the dwell time. The dwell time of a train at
a station, tb , is expressed as
tb =
np
+ gb ,
µp
(1)
where np is the number of passengers waiting to board the train at the station.3 Passengers waiting
for a train at a station are assumed to board the first train that arrives. This means that the passenger
storage capacity of a train is assumed to be unlimited.
The cruising behavior of a train is modeled using Newell’s simplified car-following model (Newell
2002), which is a special case of the well-known road traffic flow model, the Lighthill–Whitham–
Richards model (Lighthill and Whitham 1955; Richards 1956). In this model, a vehicle travels as fast
as possible while maintaining the minimum safety clearance. Specifically, let xm (t) be the position of
train m at time t. It is described as
xm (t) = min {xm (t − τ ) + vf τ, xm−1 (t − τ ) − δ} ,
(2)
where m−1 indicates the preceding train, τ is the physical minimum headway time (similar to reaction
time of the vehicle), vf is the free-flow speed (i.e., maximum speed), and δ is the minimum spacing.
3 The parameter np can also be interpreted as the total number of passengers who are getting on and off the train. In
fact, this more general definition is preferable in some sense. However, it will complicate the following discussions; thus,
we neglect passengers getting off the train. Note that, by carefully distinguishing the two types of passengers, the following
discussions are valid and do not affect the final results.
3
The first term in the min operation indicates that the traffic is in the free-flowing regime, where the
train can travel at its maximum speed. The second term indicates the traffic is in the congested regime,
where the train catches the preceding one and is required to decrease its speed to maintain the safety
headway τ and distance δ simultaneously. In a critical regime, a train’s speed is vf and the train catches
the preceding one. Without loss of generality, we introduce a variable buffer headway time hf ≥ 0 to
describe traffic in the free-flow regime.
2.2
Steady State of Rail Transit System
Here, we consider the steady state of rail transit operation under the assumptions stated in Section 2.1.
The steady state is an idealized traffic state that does not change over time, and its traffic state variables
(typically combination of flow, density, and speed) are characterized by certain relation (called an FD)
of the traffic flow (e.g., Daganzo 1997). In the case of rail transit operation, the steady state can be
defined as a state that satisfies all of the following conditions:
•
•
•
•
•
The model parameters, namely, µp , gb , vf , τ, δ, are constant.
The distance between adjacent stations, l, is constant.
The headway time between successive trains, H, is constant.
The cruising speed v of all trains is the same.
The passenger-flow arriving to each station platform, qp , is the same.
Additionally, we assume that all trains stop at every station. In order to operate the transit system,
qp < µp is assumed; otherwise, passenger boarding will never end. Under the steady state, the dwell
time of a train at a station, represented by Eq. (1), can be transformed to qp H/µp + gb , because
np is equal to qp H. Note that the control strategy of the transit operation (e.g., schedule-based,
headway-based) need not be specified here, because reasonable control strategies should follow such
steady operation if there is no disturbance; otherwise, train bunching will occur (Wada et al. 2012).
Transit systems under different steady states are illustrated as time–space diagrams in Fig. 1, where
the horizontal axis indicates the time of day, the vertical axis indicates space, and the curves indicate
train trajectories. In each sub-figure, train m arrives at and departs from station i, then travels to station
i + 1 at cruising speed v, and finally arrives at station i + 1 under different conditions. In Fig. 1a, the
speed v is equal to the free-flow speed vf and hf is greater than zero; therefore, the state is classified
into the free-flowing regime. In Fig. 1b, the speed is equal to vf and hf is equal to zero; therefore, the
state is classified into the critical regime. In Fig. 1c, the speed is less than vf ; therefore, the state is
classified into the congested regime.
2.3
Fundamental Diagram
In general, the following can be considered as the traffic state variables of a rail transit system:
•
•
•
•
•
•
train-flow q,
train-density k,
train-mean-speed v̄,
passenger-flow qp ,
passenger-density kp ,
passenger-mean-speed v̄p .
4
Space x
Train m − 1
Train m
Station i + 1
δ
hf
τ
v
l
qp H/µp + gb
Station i
H
Time t
(a) Free-flowing regime: v = vf , hf > 0.
Space x
Train m − 1
Train m
Station i + 1
δ
τ
v
l
qp H/µp + gb
Station i
H
Time t
(b) Critical regime: v = vf , hf = 0.
Space x
Train m − 1
Station i + 1
Train m
δ
τ
v
l
qp H/µp + gb
Station i
H
Time t
(c) Congested regime: v < vf , hf = 0.
Figure 1: Time–space diagrams of rail transit system under steady states.
5
Among these, there are three independent variables: for example, the combination of q, k, and qp .
This is because of the identities in continuum flow, namely, q = kv̄ and qp = kp v̄p , and the identity
v̄ = v̄p .4
Now suppose that the relation among the independent variables of the traffic state under every
steady state can be expressed using a function Q as
q = Q(k, qp ).
(3)
The function Q can be regarded as an FD of the rail transit system. If the rail transit operation principle
follows Eqs. (1) and (2), the FD function can be specified as
lk − qp /µp
,
if k < k ∗ (qp ),
gb + l/vf
Q(k, qp ) =
(4)
lδ
−
(k − k ∗ (qp )) + q ∗ (qp ), if k ≥ k ∗ (qp ),
(l − δ)gb + τ l
with
1 − qp /µp
,
gb + δ/vf + τ
(l − δ)/vf − τ
gb + l/vf
k ∗ (qp ) = −
qp +
,
(gb + δ/vf + τ )µp l
(gb + δ/vf + τ )l
q ∗ (qp ) =
(5)
(6)
where q ∗ (qp ) and k ∗ (qp ) represent train-flow and train-density, respectively, at a critical state with
passenger-flow qp . For the derivation of Eqs. (4)–(6), see Appendix A.
2.4
2.4.1
Discussions
Features of Fundamental Diagram
The FD has the following features that can be derived analytically from Eq. (4). Note that they can
easily be found in the numerical example in Fig. 2.
The FD can be interpreted as a function that determines train-flow q and mean-speed v̄ = q/k
under a given train-density k (i.e., supply) and passenger-flow qp (i.e., demand) for the given
technical parameters of the transit system (i.e., µp , gb , vf , τ, δ, l). Although the FD equation (4)
looks complicated, it represents a simple relation: namely, a piecewise linear (i.e., triangular) relation
between q and k under fixed qp .
As mentioned, the traffic state of a transit system can be categorized into three regimes (free-flowing,
critical, and congested), as in the standard traffic flow theory. Therefore, there is a critical train-density
k ∗ (qp ) for any given qp . Train traffic is in the free-flowing regime if k < k ∗ (qp ), in the critical
regime if k = k ∗ (qp ), or in the congested regime otherwise. The congested regime can be considered
as inefficient compared with the free-flowing regime, because the congested regime takes more time
to transport the same amount of passengers. The critical regime is the most efficient in terms of
travel time (i.e., 1/v̄, 1/v̄p ) as well as passenger-crowding (i.e., number of passengers per train, qp /q).
However, the critical regime requires more trains (i.e., higher train- density) than the free-flowing
regime; therefore, it may not be the most efficient if the operation cost is taken into account.
4Note that the mean speed v̄ differs from the cruising speed v; the former takes the dwelling time at a station and cruising
between stations into account, whereas the latter only considers the cruising time.
6
Even in the critical regime, the mean speed v̄ is inversely proportional to passenger demand qp .
This means that travel time increases as passenger demand increases. In addition, the size of the
feasible area of (q, k) narrows as qp increases. Thus, the operational flexibility of the transit system
declines as the passenger demand increases.
Flow and density in the critical regime satisfy the following relations:
q ∗ (qp ) =
l
1
k ∗ (qp ) −
.
(l − δ)/vf − τ
(l − δ)/vf − τ
(7)
(Here, we have assumed (l − δ)/vf − τ 6= 0.) Therefore, the critical regime can be represented as a
straight line whose slope (l/[(l−δ)/vf −τ ]) is either positive or negative in the q–k plane. This implies
a qualitative difference between transit systems. Specifically, if the slope is positive, a transit operation
with constant train-density would transition from the free-flowing regime to the congested regime as
passenger demand increases (Fig. 2). On the contrary, if the slope is negative, such an operation would
transition from free-flowing to congested as passenger demand decreases. This seems paradoxical, but
it is actually reasonable because the operational efficiency can be degraded if the number of trains is
excessive compared to passenger demand.
Note that Eqs. (3) and (4) are consistent with Edie’s generalized definition (Edie 1963) of traffic
states. Therefore, the FD is consistent with the fundamental definition of traffic. For steady-state
transit operation, Edie’s traffic state is derived as5
1
,
H
qp H/µp + gb + l/v
k=
,
lH
l
v̄ =
.
qp H/µp + gb + l/v
q=
(8)
(9)
(10)
One can easily confirm that Eqs. (8)–(10) satisfy the FD equation.
2.4.2
Numerical Example
For ease of understanding, a numerical example is shown in Fig. 2; the parameter values are presented
in Table 1. In the figure, the horizontal axis represents train-density k, the vertical axis represents
train-flow q, and the plot color represents passenger-flow qp . The slope of the straight line from a
traffic state to the origin represents the mean speed v̄ of the state.
The features of the FD described in Section 2.4.1 can be easily confirmed. For example, the figure
can be read as follows. Suppose that the passenger demand per station is qp = 16000 (pax/h). If
the number of trains in the transit system is given by the train-density k = 0.3 (train/km), then the
resulting train traffic has a train-flow of q ' 15 (train/h) and a mean speed of v̄ ' 50 (km/h). This is
the traffic state in the free-flowing regime. There is a congested state corresponding to a free-flowing
state: for the aforementioned state with (q, k, v̄) ' (15 veh/h, 0.3 veh/km, 50 km/h), the corresponding
congested state is (15 veh/h, 0.55 veh/km, 27 km/h). The critical state under qp = 16000 (pax/h) is
(22 veh/h, 0.42 veh/km, 52 km/h). Notice that this state has the fastest average speed under the given
5These relations are derived by applying Edie’s definition to the ‘minimum component of the time–space diagram’ of
the steady state, which is a parallelogram-shaped area in Fig. 1 whose vertexes are time–space points of (i) train m departs
from station i, (ii) train m arrives at station i + 1, (iii) train m − 1 arrives at station i + 1, and (iv) train m − 1 departs from
station i.
7
Figure 2: Numerical example of the FD.
Table 1: Parameters of the numerical example.
parameter
u
τ
δ
µp
gb
l
value
70 km/h
1/70 h
1 km
36000 pax/h
10/3600 h
3 km
passenger demand. The triangular q–k relation mentioned before is clearly shown in the figure; the
‘left edge’ of the triangle corresponds to the free-flowing regime, the ‘top vertex’ corresponds to the
critical regime, and the ‘right edge’ corresponds to the congested regime.
2.4.3
Validity of the Assumptions
Here, we discuss the relation between the operation principles, the proposed FD, and an actual transit
system. First of all, it is worth mentioning that all parameters in the proposed model have an explicit
physical meaning. Therefore, the parameter calibration required to approximate an actual transit system
is relatively simple.
In the train cruising model (2), each train is assumed to maintain a headway that is greater than the
given minimum headway. This is reasonable; similar models with minimum headways have been used
in existing studies (Carey and Kwieciński 1994; Higgins and Kozan 1998; Huisman et al. 2005) to
analyze the effect of train congestion (i.e., knock-on delay). Additionally, the model can be considered
as the so-called ‘moving block control,’ which is one of the standard operation schemes for trains
(Wada et al. 2012).
Under the presence of well-designed adaptive control strategies, such as schedule-based and
headway-based control (Daganzo 2009; Wada et al. 2012), the steady state is likely to be realized. This
is because the aim of such adaptive control is usually to eliminate bunching—in other words, such
control makes the operation steady.
8
The passenger boarding model (1), namely, the bottleneck model, is a coarse approximation of
actual phenomena that would be fairly reasonable. This is because the capacity of a fixed-width
bottleneck for ordinary pedestrian flow is often considered to be constant (Lam et al. 1998;
Hoogendoorn and Daamen 2005). However, some observational studies have reported that, in heavily
crowded conditions, the boarding time could increase nonlinearly as passenger numbers increase,
probably due to passenger-crowding (interference between passengers and a lack of space in carriages)
(Harris 2006; Tirachini et al. 2013). Moreover, there is no stock capacity for passengers in the proposed
model. Therefore, states with excessively large qp and small q in the FD might correspond to unrealistic
situations. This is a limitation of the current model. Nevertheless, the scale of passenger-crowding
can be derived by the model: that is, qp /q represents the number of passengers per train.
2.4.4
Relation to the Macroscopic Fundamental Diagram
The proposed FD resembles the macroscopic fundamental diagram (MFD) (Geroliminis and Daganzo
2007; Daganzo 2007) and its extensions (e.g., Geroliminis et al. 2014; Chiabaut 2015). They are
similar in the following sense. First, they both consider dynamic traffic. Second, they both describe
the relations among macroscopic traffic state variables in which the traffic is not necessarily steady
or homogeneous at the local scale (i.e., they use area-wide aggregations based on Edie’s definition).
Third, they both have unimodal relations, meaning that there are free-flowing and congested regimes,
where the former has higher performance than the latter; in addition, there is a critical regime where
the throughput is maximized. Therefore, it is expected that existing approaches for MFD applications,
such as modeling, control and the optimization of transport systems (e.g., Daganzo 2007; Geroliminis
and Levinson 2009; Geroliminis et al. 2013; Fosgerau 2015), are also suitable for the proposed transit
FD.
However, there are substantial differences between the proposed FD and the existing MFD-like
concepts. In comparison with the original MFD (Geroliminis and Daganzo 2007; Daganzo 2007)
and its railway variant (Cuniasse et al. 2015), the proposed FD has an additional dimension, that
is, passenger-flow. In comparison with the three-dimensional MFD of Geroliminis et al. (2014),
which describes the relations among total traffic flow, car density, and bus density in a multi-modal
traffic network, the proposed FD explicitly models the physical interaction among the three variables.
In comparison with the passenger MFD of Chiabaut (2015), which describes the relation between
passenger flow and passenger density when passengers can choose to travel by car or bus, in the
proposed FD, passenger demand can degrade the performance (i.e., speed) of the vehicles because of
the inclusion of the boarding time.
3
Dynamic Model Based on Fundamental Diagram
Recall that the proposed FD describes the relationship among traffic variables under the steady state;
therefore, the behavior of a dynamical system in which demand and supply change over time is not
described by the FD itself. This feature is the same as in the road traffic FD and MFDs. In this section,
we formulate a model of urban rail transit operation where the demand (i.e., passenger-flow) and
supply (i.e., train-density) change dynamically. In the proposed model, individual train and passenger
trajectories are not explicitly described; therefore, the model is called macroscopic.
The proposed model is based on an exit-flow model (Merchant and Nemhauser 1978; Carey and
McCartney 2004) in which the proposed FD is employed as the exit-flow function. In other words,
the transit system is considered as an input–output system, as illustrated in Fig. 3. The exit-flow
9
modeling approach is often employed for area-wide traffic approximations and analysis using MFDs,
such as optimal control to avoid congestion (Daganzo 2007) and analyses of user equilibrium and
social optimum in morning commute problems (Geroliminis and Levinson 2009; Fosgerau 2015). The
advantage of this approach is that it may be possible to conduct mathematically tractable analysis
of dynamic, large-scale, and complex transportation systems, where the detailed traffic dynamics are
difficult to model in a tractable manner—this is the case for transit operations.
train in-flow: a(t)
its cumulative: A(t)
passenger in-flow: ap (t)
its cumulative: Ap (t)
Railway system
internal average train-flow: Q(k(t) ap (t))
dynamics of internal average train-density:
dk(t)
= a(t) − Q(k(t), ap (t))
dt
travel time: T (t)
train out-flow: Q(k(t), ap (t))
its cumulative: D(t)
passenger out-flow: dp (t)
(determined by the model)
its cumulative: Dp (t)
Figure 3: Railway system as an input–output system.
3.1
Formulation
At time t, let a(t) be the inflow of trains to the transit system, ap (t) be the inflow of passengers, d(t)
be the outflow of trains from the transit system, and dp (t) be the outflow of passengers. We set the
initial time to be 0, and therefore t ≥ 0. Let A(t), Ap (t), D(t), and Dp (t) be the cumulative values
Rt
of a(t), ap (t), d(t), and dp (t), respectively (e.g., A(t) = 0 a(s)ds). Let T (t) be the travel time of
a train that entered the system at time t, and let its initial value T (0) be given by the free-flow travel
time under q = a(0) and qp = ap (0). To simplify the formulation, the trip length of the passengers is
assumed to be equal to that of the trains.6 This means that T (·) is the travel time of both the trains and
the passengers. These functions can be interpreted as follows:
a(t): trains’ departure rate from their origin station at time t.
ap (t): passengers’ arrival rate at the platform of their origin station at time t.
d(t): trains’ arrival rate at their final destination station at time t.
dp (t): passengers’ arrival rate at their destination station at time t.
T (t): travel time of a train and passengers from origin (departs at time t) to destination. Note that the
arrival time at the destination is t + T (t).
Therefore, in reality, a(·) and ap (·) will be determined by the transit operation plan and passenger
departure time choice, respectively. d(·), dp (·), and T (·) are endogenously determined through the
operational dynamics.
In accordance with exit-flow modeling, the train traffic is modeled as follows. First, the exit flow
d(t) is assumed to be
d(t) = Q(k(t), ap (t))
(11)
6This assumption is reasonable if the average trip length is shared by trains and passengers. If they are different, a
modification such as Tp (t) = T (t)/λ, where λ is the ratio of average trip length of the passengers to that of the trains, would
be useful.
10
where the FD function Q(·) is considered to be an exit-flow function.7 This means that the dynamics
of the transit system are modeled by taking the conservation of trains into account as follows:
dLk(t)
= a(t) − Q(k(t), ap (t)),
dt
(12)
where L represents the length of the transit route. This exit-flow model has been employed in several
studies to represent the macroscopic behavior of a transportation system (e.g., Merchant and Nemhauser
1978; Carey and McCartney 2004; Daganzo 2007). Note that the average train-density k(t) can be
defined as
k(t) =
A(t) − D(t)
,
L
(13)
which is consistent with Eq. (12). Based on above functions and equations (i.e., T (0), a(t), ap (t), and
Eqs. (11) and (13)), d(t) and D(t) can be sequentially computed—in other words, the train traffic can
be computed using the initial and boundary conditions and the exit-flow model based on the FD.
The passenger traffic can be derived as follows. By the definition of the travel time of trains,
A(t) = D(t + T (t))
(14)
holds. As A(t) and D(t) have already been obtained, the travel time T (t) such that Eq. (14) holds
can be computed. Then, Dp (t) and dp (t) can be computed from the definition of the travel time of
passengers, which is also T (t):
Ap (t) = Dp (t + T (t)).
3.2
(15)
Discussion
The proposed macroscopic model computes train out-flow d(t) and passenger out-flow d(t) based on
the FD function Q(·), the initial and boundary conditions a(t), ap (t), and T (0). The notable feature
of the model is that it is highly tractable, as it is based on an exit-flow model. Therefore, we expect
the proposed model to be useful for analyzing various management strategies for transit systems (e.g.,
dynamic pricing during the morning commute).
The proposed model can accurately approximate the macroscopic behavior of a transit operation
with high-frequency operation (i.e., small headway time) under moderate changes in demand and/or
supply. This is because exit-flow models are reasonable when the changes in inflow are moderate
compared with the relaxation time of the dynamical system. Because such situations often occur in
busy metropolitan subway systems, which suffer from congestion and delay during rush hours because
of heavy demand, the model may be useful for investigating such congestion problems. However, the
accuracy of the model is expected to decrease if the operation has low steadiness, such as in the event of
train bunching. In the next section, the quantitative accuracy of the model is verified using numerical
experiments.
The model can also derive the social cost and benefit of a transit system. For example, the
generalized travel cost of passengers (e.g., travel time, schedule delay, crowding disutility) can be
calculated from Ap (t) and Dp (t). In addition, the operation cost of the transit system can be calculated
from A(t), D(t), and the FD parameters.
7If np is considered as the sum of the number of passengers who are boarding and alighting (as mentioned in note 3), we
can simply define d(t) to be equal to Q(k(t), ap (t) + dp (t)). Such a model is also computable using a similar procedure.
11
4
Verification of the Macroscopic Model
In this section, we verify the quantitative accuracy of the macroscopic model by comparing its results
with that of the microscopic model (i.e., Eqs. (1) and (2)). The validity of the macroscopic model can
be investigated by comparing its solutions with those of microscopic models using the same initial and
boundary conditions and model parameters.
4.1
Simulation Setting
The parameter values of the transit operation are listed in Table 1 for both the microscopic and
macroscopic models. The railroad is considered to be a one-way corridor. The stations are equally
spaced at intervals of l, and there are a total of 10 stations. Trains enter the railroad with flow a(t);
in the microscopic model, a discrete train enters the railroad from the upstream boundary station if
bA(t)c (i.e., integer part of A(t)) is incremented. In the microscopic model, trains leave the railroad
from the downstream boundary station without any restrictions, other than the passenger boarding and
minimum headway clearance. Passengers arrive at each station with flow ap (t).
The functions a(t) and ap (t) are exogenously determined to mimic morning rush hours, with each
having a peak at t = 2. The flow before the peak time increases monotonically, whereas the flow after
the peak time decreases monotonically—in other words, the so-called S-shaped A(t) and Ap (t) are
considered. These functions are specified as
if t < 2,
a(0) + (a(2) − a(0)) 2t ,
4−t
a(0) + (a(2) − a(0)) 2 , if 2 ≤ t < 4,
a(t) =
(16)
a(0),
if 4 ≤ t,
if t < 2,
ap (0) + (ap (2) − ap (0)) 2t ,
4−t
ap (0) + (ap (2) − ap (0)) 2 , if 2 ≤ t < 4,
(17)
ap (t) =
ap (0),
if 4 ≤ t,
where the values of a(0), a(2), ap (0), and ap (2) are given as scenario parameters. The simulation
duration is set to 4 h for the baseline scenario in Section 4.2.1 and to 8 h for the sensitivity analysis in
Section 4.2.2 (the reason will be explained later).
The microscopic model without any control is asymptotically unstable, as proven by Wada et al.
(2012); this means that time-varying demand and supply always cause train bunching, making the
experiment unrealistic and useless. Therefore, the headway-based control scheme proposed by Wada
et al. (2012) is implemented in the microscopic model to prevent bunching and stabilize the operation.
This scheme has two control measures: holding (i.e., extending the dwell time) and an increase in
free-flow speed, similar to Daganzo (2009). The former is activated by a train if its following train is
delayed, and can be represented as an increase in gb in the microscopic model. The latter is activated
by a train if it is delayed, and can be represented as an increase in vf up to a maximum allowable
speed vmax . In this experiment, vmax is set to 80 km/h and vf is 70 km/h. This control scheme can
be considered realistic and reasonable, as similar operations are executed in practice. See Appendix B
for further details of the control scheme.
4.2
Results
First, to examine how well the proposed model reproduces the behavior of the transit system under
time-varying conditions, the results for the baseline scenario are presented in Section 4.2.1. A
12
Figure 4: Result of the microscopic model in the baseline scenario.
(a) Train
(b) Passenger
Figure 5: Result of the macroscopic model in the baseline scenario.
sensitivity analysis of the demand/supply conditions is then conduced and applicable ranges of the
proposed model are investigated in Section 4.2.2.
4.2.1
Baseline scenario
The baseline scenario with parameter values a(0) = 10 (train/h), a(2) = 15 (train/h), ap (0) = 0.1µp
(pax/h), and ap (2) = 0.5µp (pax/h) is investigated first. A solution of the microscopic model is shown
in Fig. 4 as a time–space diagram. The colored curves represent the trajectories of each train traveling
in the upward direction while stopping at every station. Around the peak time period (t = 2), train
congestion occurs; namely, some of the trains stop occasionally between stations in order to maintain
the safety interval. The congestion is caused by heavy passenger demand; therefore, the situation
during rush hour is reproduced.
The result given by the macroscopic model is shown in Fig. 5 as cumulative plots. Fig. 5a shows
the cumulative curves for the trains, where the blue curve represents the inflow A and the red curve
represents the outflow D. Fig. 5b shows those of passengers in the same manner. Congestion and
delay can be observed around the peak period (it is more remarkable in the passenger traffic). For
example, during the peak time period, dp (t) is less than ap (t) and ap (t0 ), where t0 is time such that
t = t0 + T (t0 ). This means that the throughput of the transit system is reduced by the heavy passenger
demand. Consequently, T (t) is greater during peak hours than in off-peak periods such as T (0),
meaning that delays occur due to the congestion.
The macroscopic and microscopic models are compared in terms of the cumulative number of
13
Figure 6: Comparison between the macroscopic and microscopic models in the baseline scenario.
trains in Fig. 6. In the figure, the solid curves denote the macroscopic model and the dots denote the
microscopic model. It is clear that D in the macroscopic model follows that of the microscopic model
fairly precisely. For example, the congestion and delay during the peak time period are captured very
well. However, there is a slight bias: the macroscopic model gives a slightly shorter travel time. This is
mainly due to the large-scale unsteady state (i.e., train bunching) generated in the microscopic model;
the delay caused by such large-scale bunching cannot be recovered by the microscopic model under the
implemented headway-based control scheme (for details, see Appendix B). It means that if the control
is schedule-based, the bias could be reduced.
4.2.2
Sensitivity analysis of the demand/supply conditions
The accuracy of the macroscopic model regarding the dynamic patterns of demand/supply is now
examined. This is worth investigating quantitatively because it is qualitatively clear that the exit-flow
model is valid if the speed of demand/supply changes is ‘sufficiently’ small as discussed in Section 3.2.
Specifically, the sensitivity of the peak passenger demand ap (2) and train supply a(2) is evaluated by
assigning various values to these parameters. The simulation duration is set to 8 h to take the residual
delay after t = 4 (h) in some scenarios into account. The other parameters are the same as in the
baseline scenario.
The results are summarized in Fig. 7. Fig. 7a shows the relative difference in total travel time
(TTT) of trains between the microscopic and macroscopic models for various peak passenger flows
(negative values indicate that TTT of the macroscopic model is smaller). The relative difference can
be considered as an error index of the macroscopic model. Fig. 7b compares the absolute value of TTT
in each model. Note that there are some missing values, such as the relative error with a(2) = 18 and
ap (2)/µp = 0.60; this is due to that the macroscopic model does not derive a solution under the given
conditions (e.g., k(t) exceeds the jam density); this corresponds to ‘gridlock’ in the transportation
system.
According to the results in Fig. 7, the accuracy of the macroscopic model is high when the peak
passenger demand is low. These are the expected results, as the speed of demand change is slow in
these cases. TTT given by the macroscopic model is almost always less than that of the microscopic
model; this might be due to the aforementioned inconsistency between the steady state assumption of
the macroscopic model and headway-based control of the microscopic model.
As the peak passenger demand increases, the relative error increases gradually when the demand
is low, and increases suddenly when the demand exceeds a certain value. This sudden increase in the
14
(a) Relative error regarding passenger demand
(b) Absolute values of TTT
Figure 7: Comparison between the microscopic and macroscopic models under different
demand/supply conditions.
error is because of extraordinary large-scale train bunching in the microscopic model. As confirmed
by Fig. 7b, the absolute value of TTT in the microscopic model also exhibits a sudden increase when
the demand exceeds the certain value. This bunching often occurs in cases with excessive passenger
demand, such as ap (2) > µp /2. Such demand can be considered as unrealistically excessive, as the
dwell time of a train at a station is longer than the cruising time between adjacent stations in such
situations; this usually does not occur even in rush hours.
As for the sensitivity of the train supply a(·), there is a weak tendency for faster variations in supply
to cause larger errors. This is also the expected result.
From these results, we conclude that the proposed model is fairly accurate under ordinary passenger
demand, although it is not able to reproduce extraordinary and unrealistic situations (for daily travel)
with excessive train bunching. This might be acceptable for representing transit systems during usual
rush hours.
5
Conclusion
In this paper, the following three models of an urban rail transit system have been analyzed:
Microscopic model: A model describing the trajectories of individual trains and passengers based on
Newell’s car-following model and passenger boarding model. This is represented in Eqs. (1)
and (2), and can be solved using simulations.
Fundamental diagram: An exact relationship among train-flow, train-density, and passenger-flow in
the microscopic model under a steady state. This is represented in Eqs. (3)–(6). It is a closed-form
equation.
Macroscopic model: A model describing train and passenger traffic using an exit-flow model whose
exit-flow function is the FD. This is represented in Eqs. (11), (13), (14), and (15), and can be
solved using simple simulations.
The FD and macroscopic model are the original contributions of this study, whereas the microscopic
model was proposed by Wada et al. (2012). The microscopic model can be considered as a lower-order
15
approximation of an actual transit system. The FD represents the exact relation among steady state
traffic variables in the microscopic model. The macroscopic model can be considered as an FD-based
macroscopic approximation of the area-wide behavior of the microscopic model.
The FD itself implies several insights on transit system. In addition, according to the results
of the numerical experiment, the macroscopic model can reproduce the behavior of the microscopic
model accurately, except for cases with unrealistically excessive demands. Because of the simplicity,
mathematical tractability, and good approximation accuracy of the proposed FD and macroscopic
model in ordinary situations, we expect that they will contribute for obtaining general policy
implications on management strategies of rail transit systems, such as pricing and control for morning
commute problems.
Some improvements to the proposed model can be considerable. First, the model ignores in-vehicle
passenger-crowding. This could be solved using a nonlinear passenger boarding model instead of
Eq. (1), or by introducing a disutility crowding term into the departure time choice problem in the
macroscopic model, as in Tian et al. (2007); de Palma et al. (2015a). Second, the variability and
reliability of a transit system (e.g., robustness against unpredictable disturbances, travel time reliability
issues) are not considered by the proposed model. A stochastic extension of the model might be useful
for this problem. Third, the extension to cases with heterogeneity, such as spatially heterogeneous
station distributions and passenger demand, would make the model considerably more realistic.
As an application of the proposed model, the following morning commute problems are being
investigated by the authors: user equilibrium departure time choice problem (find the equilibrium
Ap (t) for a given A(t) and desired arrival time of passengers, Zp (t)), optimal demand control problem
(find Ap (t) such that the total travel cost is minimized for a given A(t) and Zp (t)), and optimal demand
and supply control problem (find Ap (t) and A(t) such that total travel cost is minimized for a given
Zp (t)). The solutions to these problems would provide general insights into both demand and supply
management strategies for transit systems (e.g., dynamic pricing, operation planning). Furthermore,
multimodal commuting problems combined with travel mode choices (e.g., trains modeled by the
proposed FD and cars and buses modeled by MFDs) are also considerable.
Acknowledgements
Part of this research was financially supported by a KAKENHI Grant-in-Aid for Scientific Research
(B) #17H03320.
A
Derivation of FD
This appendix describes derivation of the FD expressed in Eqs. (4)–(6). Consider a looped rail transit
system under steady state operation. Let L be the length of the railroad, S be the number of the
stations, M be the number of trains, H be the headway time of the operation, tb be the dwelling time of
a train at a station, tc be the cruising time of a train between adjacent stations, and qp be the passenger
demand flow rate per station. Note that the distance between adjacent stations l is L/S and the number
of passengers boarding a train at each station is qp H.
The headway time of the operation is derived as follows. The round trip time of a train in the
looped railroad is S(tb + tc ), and M trains pass the station during that time. Then, the identities
N H = S(tb + tc ) and
16
H=
gb + tc
M/S − qp /µp
(18)
hold. Moreover, by the definition of headway and Newell’s car-following rule, the headway time H
must satisfy
δ + vτ
+ hf .
v
(19)
gb + δ/v + τ
+ hf .
1 − qp /µp
(20)
H = tb +
This reduces to
H=
The q–k relation in a free-flowing regime is derived as follows. As the train-flow is 1/H and
train-density is M/L by definition, Eq. (18) can be transformed to
q(k) =
kl − qp /µp
.
gb + l/vf
The train-flow and train-density under a critical state, (q ∗ , k ∗ ), are derived as follows.
substituting v = vf and hf = 0 into Eq. (20) and using the identity q = kv̄, we obtain
1 − qp /µp
,
gb + δ/vf + τ
(1 − qp /µp )(gb + l/vf )
,
k ∗ = k0 +
(gb + δ/vf + τ )l
q∗ =
(21)
By
(22)
(23)
where k0 is the minimum train-density where the train-flow is zero, namely, k0 = qp /(µp l).
The q–k relation in a congested regime is derived as follows. First, the k–v relation in a congested
regime can be easily derived from the q–v relation (20) with hf = 0 and the identity q = kv̄:
k(v) = k0 +
(1 − qp /µp )(gb + l/v)
.
(gb + δ/v + τ )l
(24)
Now, consider dq/dk, which is identical to (dq/dv) · (dv/dk). This can be derived as
dq
lδ
=
,
dk (δ − l)gb − τ l
(25)
which is constant and negative; therefore, the q–k relation is linear in a congested regime. Then,
recalling that the linear q–k curve passes the point (q ∗ , k ∗ ) with a slope of dq/dk, the q–k relation in
a congested regime can be derived as
q(k) =
with
lδ
k + q0
(δ − l)gb − τ l
dq ∗
·k .
dk
Eqs. (4)–(6) are constructed based on Eqs. (21), (22), (23), (26), and (27).
q0 = q ∗ −
17
(26)
(27)
B
Adaptive control scheme in the microscopic model
This appendix briefly explains the adaptive control scheme for preventing train bunching, proposed by
Wada et al. (2012). This scheme consists of two control measures: holding at a station and increasing
the maximum speed during cruising.
First, the scheme modifies the buffer time for dwelling (originally defined as gb in Eq. (1)) of train
m at station i to
gb := max{0, gb − Em (i)}
(28)
Em (i) = (1 − α)εm (i) + αµp (εm (i) − εm−1 (i)) ,
(29)
with
where εm (i) ≡ tm (i) − Tm,i represents the delay, tm (i) represents the time at which train m arrives
at station i, Tm,i represents the scheduled time (i.e., without delay) at which train m should arrive at
station i, and α ∈ [0, 1] is a weighting parameter. This scheme represents a typical holding control
strategy, similar to the bunching prevention method of Daganzo (2009), which extends the dwelling
time of a vehicle if the headway to the preceding vehicle is too small and vice versa.
Second, the scheme modifies the free-flow cruising speed vf such that the interstation travel time
is reduced by
min l/vf − l/vmax , max{0, Em (i) − gb } .
(30)
This means that, in the event of a delay, the train tries to catch up by increasing its cruising speed
up to the maximum allowable speed vmax (which implies that the free-flow speed vf is a ‘buffered’
maximum speed).
Meanwhile, the proposed train operation model in this study does not have a schedule—it is a
frequency-based operation. Therefore, in this study, the scheduled headway in the scheme (Tm,i −
Tm−1,i ) is approximated by the planned frequency (1/a(tm (i))). Thus, we set α = 1 and substitute
Em (i) with
µp tm (i) − tm−1 (i) − 1/a(tm (i)) .
(31)
The stationary state of the operational dynamics under the original scheme is identical to the steady
state defined in Section 2.2. In the case of α < 1, the scheme makes the train operation asymptotically
stable, meaning that the operation schedule is robust to small disturbances. In the case of α = 1,
the scheme prevents the propagation and amplification of delay, but does not recover the original
schedule (the small ‘shift’ found in Fig. 6 is due to α = 1). Note that these control measures do not
interrupt passenger boarding or violate the safety clearance between trains, meaning that most of the
fundamental assumptions of the proposed FD are satisfied.
References
B. Alonso, J. C. Munoz, A. Ibeas, and J. L. Moura. A congested and dwell time dependent transit corridor
assignment model. Journal of Advanced Transportation, 2017.
18
M. Carey and A. Kwieciński. Stochastic approximation to the effects of headways on knock-on delays of trains.
Transportation Research Part B: Methodological, 28(4):251–267, 1994.
M. Carey and M. McCartney. An exit-flow model used in dynamic traffic assignment. Computers & Operations
Research, 31(10):1583–1602, 2004.
O. Cats, J. West, and J. Eliasson. A dynamic stochastic model for evaluating congestion and crowding effects in
transit systems. Transportation Research Part B: Methodological, 89:43–57, 2016.
N. Chiabaut. Evaluation of a multimodal urban arterial: The passenger macroscopic fundamental diagram.
Transportation Research Part B: Methodological, 81:410–420, 2015.
P.-A. Cuniasse, C. Buisson, J. Rodriguez, E. Teboul, and D. de Almeida. Analyzing railroad congestion in a
dense urban network through the use of a road traffic network fundamental diagram concept. Public Transport,
7(3):355–367, 2015.
C. F. Daganzo. Fundamentals of Transportation and Traffic Operations. Pergamon Oxford, 1997.
C. F. Daganzo. Urban gridlock: Macroscopic modeling and mitigation approaches. Transportation Research
Part B: Methodological, 41(1):49–62, 2007.
C. F. Daganzo. A headway-based approach to eliminate bus bunching: Systematic analysis and comparisons.
Transportation Research Part B: Methodological, 43(10):913–921, 2009.
J. de Cea and E. Fernández. Transit assignment for congested public transport systems: an equilibrium model.
Transportation Science, 27(2):133–147, 1993.
A. de Palma, M. Kilani, and S. Proost. Discomfort in mass transit and its implication for scheduling and pricing.
Transportation Research Part B: Methodological, 71:1–18, 2015a.
A. de Palma, R. Lindsey, and G. Monchambert. The economics of crowding in public transport. Working Paper
(hal-01203310), 2015b.
L. C. Edie. Discussion of traffic stream measurements and definitions. In J. Almond, editor, Proceedings of the
2nd International Symposium on the Theory of Traffic Flow, pages 139–154, 1963.
M. Fosgerau. Congestion in the bathtub. Economics of Transportation, 4:241–255, 2015.
N. Geroliminis and C. F. Daganzo. Macroscopic modeling of traffic in cities. In Transportation Research Board
86th Annual Meeting, 2007.
N. Geroliminis and D. M. Levinson. Cordon pricing consistent with the physics of overcrowding. In W. H. K.
Lam, S. C. Wong, and H. K. Lo, editors, Transportation and Traffic Theory 2009, pages 219–240. Springer,
2009.
N. Geroliminis, J. Haddad, and M. Ramezani. Optimal perimeter control for two urban regions with macroscopic
fundamental diagrams: A model predictive approach. IEEE Transactions on Intelligent Transportation
Systems, 14(1):348–359, 2013.
N. Geroliminis, N. Zheng, and K. Ampountolas. A three-dimensional macroscopic fundamental diagram for
mixed bi-modal urban networks. Transportation Research Part C: Emerging Technologies, 42:168–181,
2014.
E. J. Gonzales and C. F. Daganzo. Morning commute with competing modes and distributed demand: User
equilibrium, system optimum, and pricing. Transportation Research Part B: Methodological, 46(10):1519–
1534, 2012.
19
N. G. Harris. Train boarding and alighting rates at high passenger loads. Journal of Advanced Transportation,
40(3):249–263, 2006.
A. Higgins and E. Kozan. Modeling train delays in urban networks. Transportation Science, 32(4):346–357,
1998.
S. P. Hoogendoorn and W. Daamen. Pedestrian behavior at bottlenecks. Transportation Science, 39(2):147–159,
2005.
D. Huisman, L. G. Kroon, R. M. Lentink, and M. J. C. M. Vromans. Operations research in passenger railway
transportation. Statistica Neerlandica, 59(4):467–497, 2005.
T. Iryo. Properties of dynamic user equilibrium solution: existence, uniqueness, stability, and robust solution
methodology. Transportmetrica B: Transport Dynamics, 1(1):52–67, 2013.
S. Iwakura, I. Takahashi, and S. Morichi. A multi agent simulation model for estimating knock-on train delays
under high-frequency urban rail operation. In Transport Policy Studies’s Review, volume 15. Institute For
Transport Policy Studies, 2013. (in Japanese).
K. Kariyazaki. Investigation of train delay recovery mechanism and delay prevention schemes in urban railway.
PhD thesis, National Graduate Institute for Policy Studies, 2016. (in Japanese).
K. Kariyazaki, N. Hibino, and S. Morichi. Simulation analysis of train operation to recover knock-on delay
under high-frequency intervals. Case Studies on Transport Policy, 3(1):92–98, 2015.
H. Kato, Y. Kaneko, and Y. Soyama. Departure-time choices of urban rail passengers facing unreliable service:
Evidence from Tokyo. In Proceedings of the International Conference on Advanced Systems for Public
Transport 2012, 2012.
K. M. Kim, S.-P. Hong, S.-J. Ko, and D. Kim. Does crowding affect the path choice of metro passengers?
Transportation Research Part A: Policy and Practice, 77:292–304, 2015.
H. Koutsopoulos and Z. Wang. Simulation of urban rail operations: Application framework. Transportation
Research Record: Journal of the Transportation Research Board, 2006:84–91, 2007.
M. Kraus and Y. Yoshida. The commuter’s time-of-use decision and optimal pricing and service in urban mass
transit. Journal of Urban Economics, 51(1):170–195, 2002.
W. H. K. Lam, C. Y. Cheung, and Y. F. Poon. A study of train dwelling time at the Hong Kong mass transit
railway system. Journal of Advanced Transportation, 32(3):285–295, 1998.
S. Li, M. M. Dessouky, L. Yang, and Z. Gao. Joint optimal train regulation and passenger flow control strategy
for high-frequency metro lines. Transportation Research Part B: Methodological, 99:113–137, 2017.
M. J. Lighthill and G. B. Whitham. On kinematic waves. II. a theory of traffic flow on long crowded roads.
Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 229(1178):
317–345, 1955.
D. K. Merchant and G. L. Nemhauser. A model and an algorithm for the dynamic traffic assignment problems.
Transportation Science, 12(3):183–199, 1978.
G. F. Newell. A simplified car-following theory: a lower order model. Transportation Research Part B:
Methodological, 36(3):195–205, 2002.
G. F. Newell and R. B. Potts. Maintaining a bus schedule. In Proceedings of the 2nd Australian Road Research
Board, volume 2, 1964.
20
J. Parbo, O. A. Nielsen, and C. G. Prato. Passenger perspectives in railway timetabling: A literature review.
Transport Reviews, 36(4):500–526, 2016.
P. I. Richards. Shock waves on the highway. Operations Research, 4(1):42–51, 1956.
W. Y. Szeto and H. K. Lo. Dynamic traffic assignment: properties and extensions. Transportmetrica, 2(1):
31–52, 2006.
T. Tabuchi. Bottleneck congestion and modal split. Journal of Urban Economics, 34(3):414–431, 1993.
Q. Tian, H.-J. Huang, and H. Yang. Equilibrium properties of the morning peak-period commuting in a
many-to-one mass transit system. Transportation Research Part B: Methodological, 41(6):616–631, 2007.
A. Tirachini, D. A. Hensher, and J. M. Rose. Crowding in public transport systems: effects on users, operation
and implications for the estimation of demand. Transportation Research Part A: Policy and Practice, 53:
36–52, 2013.
V. Trozzi, G. Gentile, M. G. H. Bell, and I. Kaparias. Dynamic user equilibrium in public transport networks
with passenger congestion and hyperpaths. Transportation Research Part B: Methodological, 57:266–285,
2013.
V. R. Vuchic. Urban Transit: Operations, Planning, and Economics. John Wiley & Sons, 2005.
K. Wada, S. Kil, T. Akamatsu, and M. Osawa. A control strategy to prevent delay propagation in high-frequency
railway systems. Journal of Japan Society of Civil Engineers, Ser. D3 (Infrastructure Planning and
Management), 68(5):I_1025–I_1034, 2012. (in Japanese; extended abstract in English was presented
at the 1st European Symposium on Quantitative Methods in Transportation Systems and available at
https://www.researchgate.net/publication/281823577).
21
| 3cs.SY
|
arXiv:1707.07726v1 [math.NT] 24 Jul 2017
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC
GROUPS
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
Abstract. In this paper, we formulate an analogue of Waring’s problem for an algebraic group G. At the field level we consider a morphism
of varieties f : A1 → G and ask whether every element of G(K) is the
product of a bounded number of elements f (A1 (K)) = f (K). We give
an affirmative answer when G is unipotent and K is a characteristic zero
field which is not formally real.
The idea is the same at the integral level, except one must work with
schemes, and the question is whether every element in a finite index
subgroup of G(O) can be written as a product of a bounded number of
elements of f (O). We prove this is the case when G is unipotent and O
is the ring of integers of a totally imaginary number field.
0. Introduction
The original version of Waring’s problem asks whether, for every positive
integer n there exists M := Mn such that every non-negative integer is of
the form an1 + · · · + anM , ai ∈ N, and, if so, what is the minimum value for
Mn . Since 1909, when Hilbert proved that such a bound exists, an enormous
literature has developed, largely devoted to determining Mn . There is also
a substantial literature devoted to variants of Waring’s problem. Kamke
proved [Ka] a generalization of the theorem in which nth powers are replaced
by general polynomials. In a series of papers [W1, W2, W3], Wooley solved
Waring’s problem for vector-valued polynomials. Siegel [Si, Si1] treated the
case of rings of integers in number fields, and since then, many papers have
analyzed Waring’s problem for a wide variety of rings, for instance [Bi, Ca,
Vo, GV, LW, Ch, El]. Also, there has been a flurry of recent activity on
“Waring’s problem for groups”; the typical problem here is to prove that
every element in G is a product of a small number of nth powers of elements
of G (see, for instance, [Sh, LST, AGKS, GT] and the references therein.)
This paper explores the view that algebraic groups are the natural setting
for Waring’s problem. To this extent, it resembles the work on Waring’s
problem for groups of Lie type. The work on the polynomial-valued and
vector-valued variants of Waring’s problem also fit naturally in this framework. We will consider morphisms of varieties (resp. schemes) f : A1 → G
defined over a field (resp. a number ring) and look at bounded generation of
the groups generated by the images.
ML was partially supported by NSF Grant DMS-1401419.
1
2
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
The strategy is developed in §2 for unipotent algebraic groups over fields of
characteristic 0 which are not formally real. (Some justification for concentrating on the unipotent case is given in Lemma 1.4 below and the following
remarks.) In §3, we solve the unipotent version of Waring’s problem for totally imaginary number rings. In §4, we work over general characteristic 0
fields and general number rings, but consider only the “easier Waring’s problem”, in which one is allowed to use inverses. Our methods throughout are
elementary. The only input from analytic number theory is Siegel’s solution
of Waring’s problem over number rings.
Unfortunately, in the original situation of Waring’s problem, namely the
ring Z, the additive group Ga , and the morphism f : A1 → Ga given by
f (x) = xn , our results fall short of Hilbert’s theorem; we can prove only the
easier Waring’s problem in this case, rather than the statement that every
positive integer can be represented as a bounded sum of non-negative nth
powers. The difficulty, of course, is the ordering on Z. It seems natural
to ask whether, for unipotent groups over general number rings, one can
characterize the set which ought to be expressible as a bounded product of
images. In proving the easier Waring’s problem, we simply avoid this issue.
1. Generating subvarieties
Throughout this paper, K will always be a field of characteristic 0, and
G will be an algebraic group over K. A variety over K will be a reduced
separated scheme of finite type and, in particular, need not be connected.
A subvariety, closed subgroup, etc., will always be understood to be defined
over K.
Definition 1.1. Let G be an algebraic group over a field K. A subvariety
X of G is generating if there exists n such that every generic point of G lies
in the image of the product map from X ×n := X × · · · × X to G. A finite
collectionSfi : Xi → G of morphisms is generating if the union of Zariski
closures i f (Xi ) is generating.
We have the following necessary and sufficient condition for a subvariety
to be generating.
Proposition 1.2. Let G be an algebraic group over K and Z ⊆ G a closed
subvariety. Then Z is generating if and only if it satisfies the following two
properties:
I. Z is not contained in any proper closed subgroup of G.
II. For every proper closed normal subgroup H of G, the image of Z →
G/H has positive dimension.
We first prove the following technical lemma:
Lemma 1.3. Let K be algebraically closed. Let X, Y be irreducible closed
subvarieties of G. Assume:
(1) dim(XX) = dim X;
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
3
(2) dim(XY X) = dim X.
Then there exists a closed subgroup H of G such that the following statements
are true:
(i) X = xH = Hx for all x ∈ X(K);
(ii) Y ⊂ yH for some y ∈ NG (H)(K).
Proof. As X is irreducible, X ×2 is irreducible, with generic point η. The
closure X 2 = XX of its image in G is therefore the closure of the image
of η in G and thus irreducible. If x ∈ X(K), then xX and Xx are closed
subvarieties of X 2 of dimension dim X = dim X 2 , so xX = X 2 = Xx. Thus,
Xx−1 = x−1 X.
It follows that for x1 , x2 ∈ X(K),
−1 −1 2
−1
−1
−1 2 −1
−1
−1
x−1
1 X = x1 (x2 X ) = (x1 X)(x2 X) = (x1 X )x2 = Xx2 = x2 X.
Defining H := x−1 X for x ∈ X(K), we see that H does not depend on the
choice of x and, moreover, that H 2 = H. As every h ∈ H(K) can be written
−1 = x−1 x ∈ H(K). Thus H(K) is
x−1
1
1 x2 , x1 , x2 ∈ X(K), it follows that h
2
a subgroup, which since K is algebraically closed implies that H is a closed
subgroup of G, which implies (i).
For y ∈ Y (K), XY X is connected and contains XyX, which has dimension ≥ dim X = dim XY X. Thus,
XY X = XyX = HxyxH
is connected and has dimension dim H. It follows that the double coset
HxyxH consists of a single left coset, so xyx ∈ NG (H)(K). By (i), x also
normalizes H, and it follows that y normalizes H. Finally,
Y ⊆ x−1 XY Xx−1 = (x−1 Hx)y(x−1 Hx) = HyH = yH.
Using this, we can prove Proposition 1.2.
Proof. Clearly, if Z ⊆ H ( G, then the same is true for Z n , and if the
image of Z in G/H is finite, the same is true for Z n . This proves necessity
of conditions I and II.
For the sufficiency, we may assume without loss of generality that K is
algebraically closed. For all z ∈ Z(K), ZZ n ⊆ Z n+1 , so dim Z n is a bounded
non-decreasing sequence of integers. It therefore stabilizes for some n. Let
X denote an irreducible component of Z n of dimension dim Z n and Y any
irreducible component of Z. Then dim X ≤ dim X 2 ≤ dim Z n and dim X ≤
dim XY X ≤ dim Z n , so conditions (1) and (2) of Lemma 1.3 are satisfied.
Let H be the closed subgroup of G satisfying (i) and (ii). As H is a translate
of X, it is irreducible.
If H = G◦ , then X is a connected component of G, which means Z m
is a union of components of G whenever m ≥ n. Applying condition I to
subgroups of G containing G◦ , it follows that every generic point of G lies
4
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
in Z m for some m ≥ n, so Z is generated, as claimed. If H 6= G◦ < then
dim H < dim G. If H is normal in G, then the image of Z in G/H is finite,
contrary to condition II. If H has normalizer N ( G, then Y is contained
in N . Since N does not depend on the choice of component Y , Z ⊆ N ,
contrary to condition I.
Henceforth, we assume G is connected. We are interested in generating
collections of morphisms A1 → G. By a theorem of Chevalley, Barsotti,
and Rosenlicht [Ro], every connected algebraic group G has a closed normal
subgroup H which is a linear algebraic group and such that G/H is an
abelian variety. Every map from a rational curve to an abelian variety is
trivial. Thus, unless G is a linear algebraic group, it is impossible for any
collection of morphisms A1 → G to be generating.
Let R and U denote respectively the radical and the unipotent radical of
G.
Lemma 1.4. If U ( R, then there does not exist a generating set of morphisms A1 → G.
Proof. It suffices to prove that there is no generating set of morphisms from
A1 to the connected reductive group G/U . Thus, we may assume without
loss of generality that G is connected reductive. If the radical R is non-trivial,
then the inclusion map R → G induces an isogeny of tori R → G/[G, G], so
it suffices to prove that there no generating set of morphisms from A1 to a
non-trivial torus T . Without loss of generality, we may assume that K = K̄.
Thus we may replace T by a quotient isomorphic to the multiplicative group,
and it suffices to prove there is no non-constant morphism of curves from A1
to A1 \ {0}. At the level of coordinate rings, this is the obvious statement
that every K-homomorphism from K[t, t−1 ] to K[x] maps t to an element
of K ∗ , or, equivalently, the fact that K[x]∗ = K ∗ .
We need only consider, then, the case that G is the extension of a semisimple group by a unipotent group, both connected. The semisimple case is perhaps even more interesting, but we know that, at least for SL2 , we cannot
always expect bounded generation, since, for example, SL2 (Z) and SL2 (Z[i])
do not have bounded generation by elementary matrices [GS, Ta].
Since the characteristic of K is 0, if G is unipotent, it is necessarily connected [DG, IV, §2, Prop. 4.1]. The derived group G′ is then likewise unipotent [DG, IV, §2, Prop. 2.3], and therefore connected. The quotient G/G′
is unipotent [DG, IV, §2, Prop. 2.3], and commutative and is therefore a
vector group [DG, IV, §2, Prop. 4.2]. The non-abelian Galois cohomology
group H 1 (K, G′ ) vanishes [Se, III Prop. 6], so the cohomology sequence for
the short exact sequence 1 → G′ → G → G/G′ → 1 [Se, I Prop. 38] implies (G/G′ )(K) = G(K)/G′ (K). We identify these groups. We do not
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
5
distinguish between closed (vector) subgroups of G/G′ at the level of algebraic groups over K and the corresponding K-subspaces of the vector space
(G/G′ )(K). If V is a subspace of G/G′ , we denote by V G′ the inverse image
of V in G, regarded as an algebraic group.
Lemma 1.5. Let G be a connected unipotent algebraic group, and let H be
a proper closed subgroup of G. Then the normalizer of H in G is strictly
larger than H.
Proof. We use induction on dim G. The case dim G = 1 is trivial since this
implies G is commutative, so the normalizer of every subgroup is all of G.
For general unipotent G, the fact that the lower central series goes to {1}
implies that the center Z of G is of positive dimension. If Z is not contained
in H, then ZH ⊆ NG (H) is strictly larger than G. Otherwise, replacing G
and H by G/Z and H/Z respectively, we see that H/Z is normal in N/Z
for some N ⊆ G strictly larger than H, so H is normal in N .
Proposition 1.6. If G is a unipotent group over K, then every proper closed
subgroup H of G is contained in a normal subgroup N of codimension 1 in
G which contains the derived group G′ of G.
Proof. As K is of characteristic zero, G is connected. If H = {e}, the proposition asserts that G contains a codimension 1 normal subgroup containing
G′ . As H is a proper subgroup, G is non-trivial, so G/G′ is non-trivial,
and the proposition amounts to the obvious statement that every non-trivial
vector group contains a normal subgroup of codimension 1.
For the general case, applying the previous lemma, we can replace H by
a strictly larger group NG (H) unless H is normal in G. This operation
can be repeated only finitely many times, since NG (H), being strictly larger
than H, must be of strictly higher dimension (since every closed subgroup
of a unipotent group is unipotent and therefore connected). Thus, we may
assume H is normal in G. Then G/H is unipotent. Replacing G and H by
G/H and {e} respectively, we are done.
From Proposition 1.2, we deduce that for unipotent groups, we have the
following simple criterion.
Lemma 1.7. Let G be a unipotent group over K. A subvariety X of G
(resp. a set {f1 , . . . , fn } of morphisms A1 → G) is generating if and only if
for each proper subspace V ( G/G′ , such that the projection of X to G/V G′
is of positive dimension (resp. the composition of some fi with the projection
G → G/V G′ is non-constant.)
Note that the question of whether a set of morphisms fi is generating
depends only on the set of compositions f¯i of fi with the quotient map
G → G/G′ . It is also invariant under left or right translation of the fi by
any element of G(K).
6
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
Lemma 1.8. If {f1 , . . . , fn } is not generating, then for all positive integers
N,
(f1 (K) ∪ · · · ∪ fn (K))N ( G(K).
Proof. The image of (f1 (K) ∪ · · · ∪ fn (K))N in (G/V G′ )(K) is the same
as the image of {f1 (0), . . . , fn (0)}N and is therefore a finite subgroup of an
infinite group.
We record the following lemma, which will be needed later.
Lemma 1.9. Let G be a unipotent group over K, G′ its derived group and
G′′ the derived group of G′ . If V is a proper subspace of G′ /G′′ , then there
exists a dense open subvariety U1 ⊂ G and for all γ1 ∈ U1 (K), a dense open
subvariety U2 of the form G \ W G′ , such that for all γ2 ∈ U2 (K), [γ1 , γ2 ]
does not lie in V G′′ (K).
Proof. Without loss of generality, we assume K is algebraically closed. As
the characteristic of K is 0, G and G′ are connected, so G′ /G′′ is connected.
The composition G × G → G′ /G′′ of the commutator map and the quotient
map has the property that its image generates G′ /G′′ and is therefore not
contained in V . It follows that the inverse image U of the complement of
V is dense and open in G × G. By Chevalley’s theorem, the projection of
U ⊆ G × G onto the first factor G is a constructible set containing the
generic point; it therefore contains an open dense U1 . The fiber over any
point γ1 ∈ U1 (K) is non-empty. The condition on γ2 that [γ1 , γ2 ] 6∈ V G′ is
linear on the image of γ2 in G/G′ and is satisfied for at least one γ2 , so U2 ,
defined by the condition [γ1 , γ2 ] 6∈ V G′ satisfies the properties claimed.
2. The unipotent Waring Problem over nonreal fields
Definition 2.1. We say a field K is nonreal if it is of characteristic zero
but not formally real (i.e., −1 is a sum of squares in K).
The main theorem of the section is the following:
Theorem 2.2. If G is a unipotent algebraic group over a nonreal field K
and {f1 , . . . , fn } is a generating set of K-morphisms A1 → G, then for some
positive integer M ,
(f1 (K) ∪ · · · ∪ fn (K))M = G(K).
The proof occupies the rest of this section. It depends on the following
two propositions:
Proposition 2.3. Theorem 2.2 holds when G is a vector group.
Proposition 2.4. Under the hypotheses of Theorem 2.2, there exists an
integer m, a sequence of elements g1 , . . . , gm ∈ G(K), a sequence of positive integers k1 , . . . , km , for each i ∈ {1, . . . , m}, a sequence of integers
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
7
ℓi,1 , . . . , ℓi,ki ∈ [1, n] and of ai,j , bi,j ∈ K, such that for each i ∈ {1, . . . , m},
the K-morphisms h1 , . . . , hm : A1 → G defined by
hi (x) := gi fℓi,1 (ai,1 x + bi,1 ) · · · fℓi,ki (ai,ki x + bi,ki )
map A1 → G′ and as morphisms to G′ are generating.
Assuming both propositions hold, we can prove Theorem 2.2 by induction
on dimension. If G is commutative, then Proposition 2.3 applies. Otherwise, we apply Proposition 2.4 to construct h1 , . . . , hm . Letting f¯i denote
the composition of fi with G → G/G′ , Proposition 2.3 asserts that every
element of G(K)/G′ (K) = (G/G′ )(K) is represented by a bounded product
of elements of f¯1 (K) ∪ · · · ∪ f¯n (K). For each gi , there exists gi′ , which is a
bounded product of elements of f1 (K) ∪ · · · ∪ fn (K) and lies in the same
G′ (K)-coset of G(K). Defining
h′i (x) := gi′ fℓi,1 (ai,1 x + bi,1 ) · · · fℓi,ki (ai,ki x + bi,ki ),
it suffices to prove that every element of G′ (K) is a bounded product of
elements of h′1 (K) ∪ · · · ∪ h′m (K). As the hi are generating for G′ , the same
is true for h′i , and the theorem follows by induction. Thus, we need only
prove Propositions 2.3 and 2.4.
To prove Proposition 2.3, we begin with a special case.
Proposition 2.5. If K is a characteristic zero field which is not formally
real and d is a positive integer, there exists an integer N > 0 such that every
vector in K d is a sum of elements of
X1d := {(x, x2 , . . . , xd ) | x ∈ K}.
Proof. For each integer k > 0, let
Xkd := X1d + · · · + X1d .
{z
}
|
k
S
Thus
Xid +
pd+1 :
π d+1 : X d+1 → K the projection map onto the last coordinate. In particular,
pd+1 (Xkd+1 ) = Xkd for all positive integers k.
It is a theorem [El, Theorem 2] that for each positive integer d there exists
M such that every element in K is the sum of M dth powers of elements of
K.
We proceed by induction on d. The theorem is trivial for d = 1. Assume
d = X d = K d and every
it holds for d and choose M large enough that XM
element of K is the sum of M (d + 1)st powers. In particular,
X1d ⊆ X2d ⊆ · · · , and we denote by X d the limit i Xid . Clearly
d
d . Taking unions, X d is a semiring. Let
Xjd = Xi+j
and Xid Xjd ⊆ Xij
X d+1 → X d denote the projection map onto the first d coordinates and
(1)
d+1
) = K.
π d+1 (XM
d+1
d+1
d+1
d+1
( XM
If XM
+1 , then choosing w ∈ XM +1 \ XM , there exists an eled+1
d+1
is chosen with
such that pd+1 (v) = pd+1 (w). If u ∈ XM
ment v ∈ XM
8
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
pd+1 (u) = −pd+1 (v), then either u + v or u + w is non-zero, and either way
d+1
d+1 (t) = 0. By (1),
there exists an element t ∈ X2M
+1 \ {0} with p
d+1
{(0, . . . , 0, x) | x ∈ K} ⊂ XM
(2M +1) ,
d+1
d+1 , and we are done.
so by the induction hypothesis, XM
+M (2M +1) = K
d+1
d+1
d+1
= X d+1 .
= XM
We may therefore assume XM
+1 , which implies XM
Moreover, if pd+1 fails to be injective, the same argument applies, so we
may assume that pd+1 is an isomorphism of semirings, and therefore an
isomorphism of rings (since the target K d is a ring).
Thus, we can regard π d+1 ◦(pd+1 )−1 as a ring homomorphism φ : K d → K.
If ei = (0, . . . , 0, 1, 0, . . . , 0), then φ(ei ) maps to an idempotent of K, which
can only be 0 or 1. Since φ(e1 + · · · + ed ) = 1, there exists i such that
φ(ei ) = 1, and it follows that φ factors through projection onto the ith
coordinate. Thus, there exists a ring endomorphism ψ : K → K such that
for all (x1 , . . . , xd+1 ) ∈ X d+1 , ψ(xi ) = xd+1 . As (2, 4, 8, . . . , 2d+1 ) ∈ X d+1 ,
ψ(2i ) = 2d+1 , which is absurd.
We now prove Proposition 2.3.
Proof. Let
(2)
fj (x) = (P1j (x), . . . , Pmj (x)),
where d is the maximum of the degrees of the Pij for 1 ≤ i ≤ m, 1 ≤ j ≤ n.
Let N be chosen as in Proposition 2.5. We write
(3)
Pij (x) =
d
X
aijk xk
k=0
for 1 ≤ i ≤ m, 1 ≤ j ≤ n. Given c1 , . . . , cn , our goal is to find xjℓ ∈ K,
1 ≤ j ≤ n, 1 ≤ ℓ ≤ N that satisfy the system of equations
X
(4)
aijk xkjℓ = ci , i = 1, 2, . . . , m.
j,k,ℓ
By Proposition 2.5, by choosing xjℓ suitably, we can choose the values
yjk =
N
X
xkjℓ
ℓ=1
independently for 1 ≤ j ≤ n and 1 ≤ k ≤ d, while yj0 = N by definition.
Thus, we can rewrite the system of equations (4) as
(5)
d X
n
X
k=1 j=1
aijk yjk = ci − N
n
X
aij0 , i = 1, 2, . . . , m.
j=1
This is always solvable unless there is a non-trivial relation among the linear
forms on the left hand side in this system, i.e., a non-zero sequence b1 , . . . , bm
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
such that
m
X
9
bi aijk = 0
i=1
for all j and k ≥ 1. If this is true, then
m
X
X
bi Pij =
bi aij0 , j = 1, . . . , n.
i=1
i
In other words, defining π(t1 , . . . , tn ) := b1 t1 + · · · + bm tm , π ◦ fj is constant
for all j, contrary to assumption.
Finally, we prove Proposition 2.4.
Proof. Suppose we have already constructed h1 , . . . , hr . Let h̄i denote the
composition of hi with the projection G′ → G′ /G′′ . Let W denote the
vector space spanned by the set {h̄i (t) − h̄i (0) | 1 ≤ i ≤ r, t ∈ K}. Suppose
W = G′ /G′′ . Then for all proper subspaces W ′ ( W there exist i and t such
that h̄i (0) and h̄i (t) represent different classes in W/W ′ . It follows that the
composition of hi with the projection G′ → G′ /W ′ G′′ is non-constant, and
therefore, {h1 , . . . , hr } is a generating set of morphisms to G′ .
Thus, we may assume that W is a proper subspace of G′ /G′′ . We apply
Lemma 1.9 to deduce the existence of γ1 ∈ G(K) and a proper closed subspace V of G/G′ such that for all γ2 ∈ G(K) \ V G′ (K), the commutator of
γ1 and γ2 is not in W G′′ (K). Let f¯i (x) denote the composition of fi (x) with
the quotient map G → G/G′ . As the fi are generating, there exists i such
that for all but finitely many values x ∈ K, f¯i (x) is not in V . Without loss
of generality, we assume i = 1.
By Proposition 2.3, there exists a bounded product
g = fs1 (b1 ) · · · fsM (bM ), si ∈ {1, 2, . . . , n}, bi ∈ K
such that
f¯s1 (b1 ) + · · · + f¯sM (bM ) = γ̄1 .
We write
f¯1 (x) = v0 + xv1 + · · · + xd vd ,
with vi ∈ K m . By Proposition 2.5, there exist a1 , . . . , aN ∈ K, not all zero,
such that
n
X
aki = 0, k = 1, 2, . . . , d.
(6)
i=1
Thus,
f¯1 (a1 x) + f¯2 (a2 x) + f¯3 (a3 x) + · · · + f¯N (aN x) = N v0 ,
which means that x 7→ f1 (a1 x)f2 (a2 x) · · · fN (an x) goes to a constant G′ coset. Without loss of generality, we may assume a1 6= 0.
Let gr+1 be an element of G(K) which can be realized as a product of at
most N values of fi at elements of K and such that
(7)
gr+1 fs1 (b1 ) · · · fbM (bM )f1 (a1 x)f2 (a2 x) · · · fN (an x)
10
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
belongs to G′ (K) for x = 0. By Proposition 2.3, such a gr+1 exists. We
choose hr+1 (x) to be either (7) or
(8)
gr+1 f1 (a1 x)fs1 (b1 ) · · · fsM (bM )f2 (a2 x) · · · fN (an x),
Either way, hr+1 (0) ∈ G′ (K). By (6), hr+1 (x) ∈ G′ (K) for all x ∈ K.
Because the commutator [f1 (a1 x), fs1 (b1 ) · · · fsM (bM )] lies in W G′′ for at
most finitely many x-values, at least one of (7) and (8) is non-constant (mod
W G′′ ). By induction on the codimension of W , the proposition follows.
3. The unipotent Waring Problem over totally imaginary
number rings
In this section K denotes a totally imaginary number field, O its ring of
integers, and G a closed O-subscheme of the group scheme Uk of unitriangular
k × k matrices. Thus the generic fiber GK will be a closed subgroup of Uk
over K and therefore unipotent. Moreover, there is a filtration of G(O) by
normal subgroups such that the successive quotients are finitely generated
free abelian groups. In particular, it is (by definition) a finitely generated
torsion-free nilpotent group, whose Hirsch number is the sum of the ranks
of these successive quotients.
A set {f1 , . . . , fn } of O-morphisms A1 → G is said to be generating if it is
so over K. The main theorem in this section is the following integral version
of Theorem 2.2:
Theorem 3.1. If {f1 , . . . , fn } is a generating set of O-morphisms A1 → G,
then for some positive integer M ,
(f1 (O) ∪ · · · ∪ fn (O))M
is a subgroup of finite index in G(O).
We begin by proving results that allow us to establish that some power of
a subset of a group Γ gives a finite index subgroup of Γ.
Lemma 3.2. Let Γ be a group, ∆ a finite index subgroup of Γ, Ξ a subset
of Γ, and M a positive integer. If ∆ ⊆ ΞM , then there exists N such that
ΞN is a finite index subgroup of Γ.
Proof. Without loss of generality, we assume that ∆ is normal in Γ. Consider
the (finite set)
{(m̄, γ̄) ∈ Z/M Z × Γ/∆ | m ∈ N, γ ∈ Ξm }.
For each element, choose a pair (m, γ), m ∈ N, γ ∈ Ξm representing it.
Choose A to be greater than all values m appearing in such pairs. Let N be
a multiple of M which is greater than A+M . For all positive integers k, ΞkN
is a union of cosets of ∆ in Γ and does not depend on k. The image of ΞN in
Γ/∆ is therefore a subset of a finite group and closed under multiplication.
It is therefore a subgroup, and the lemma follows.
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
11
Lemma 3.3. Let Γ be a finitely generated nilpotent group and ∆ a normal
subgroup of Γ. Then every finite index subgroup ∆0 of ∆ contains a finite
index subgroup ∆◦0 which is normal in Γ.
Proof. We prove there exists a function f : N → N depending only on Γ such
that for any normal subgroup ∆ of Γ, every subgroup ∆0 of ∆ of index n
contains a normal subgroup of Γ of index ≤ f (n) in ∆. Replacing ∆0 with
the kernel of the left action of ∆ on ∆/∆0 , we may assume without loss of
generality that ∆0 is normal in ∆. We prove the claim by induction on the
total number of prime factors of n.
If n = p is prime, it suffices to prove that there is an upper bound,
independent of ∆, on the number of normal subgroups of ∆ of index p. This
is true because intersecting a fixed central series of Γ = Γ0 ⊲ Γ1 ⊲ · · · with ∆
gives a central series of ∆, and every index p normal subgroup of ∆ is the
inverse image in ∆ of an index p subgroup of the finitely generated abelian
group ∆/∆ ∩ Γ1 ⊆ Γ/Γ1 .
If n has ≥ 2 prime factors, then for some prime factor p of n, ∆0 is a
normal subgroup of index n/p of a normal subgroup ∆p of index p in ∆. By
the induction hypothesis, ∆p contains a normal subgroup ∆◦p of Γ, of index
≤ f (p) in ∆. The index of ∆0 ∩ ∆◦p in ∆◦p divides n/p, and applying the
induction hypothesis, we deduce that the existence of a normal subgroup ∆◦0
of Γ of index ≤ maxi≤n/p f (i) in ∆◦p .
Proposition 3.4. Let Γ be a finitely generated nilpotent group, ∆ a normal
subgroup of Γ, Ξ a subset of Γ and M1 , M2 positive integers such that ΞM1
contains a finite index subgroup of ∆ and the image of ΞM2 in Γ/∆ contains
a finite index subgroup of Γ/∆. Then there exists M3 such that ΞM3 is a
finite index subgroup of Γ.
Proof. Let hΞi denote the subgroup of Γ generated by Ξ. The intersection
hΞi ∩ ∆ is of finite index in ∆, and the image hΞi∆/∆ is of finite index in
Γ/∆, so hΞi is of finite index in Γ. As a subgroup of a finitely generated
nilpotent group, it is also finitely generated and nilpotent. Replacing Γ and
∆ by hΞi and hΞi ∩ ∆ respectively, we assume without loss of generality that
Ξ generates Γ.
Replacing Ξ with ΞM1 , we may assume Ξ contains a finite index subgroup
∆0 of ∆. By Lemma 3.3, we may assume that ∆0 is a normal subgroup of
Γ. Let Ξ̄ denote the image of Ξ in Γ/∆0 . If Ξ̄N is a finite index subgroup of
Γ̄ := Γ/∆0 , then ΞN +1 is the inverse image of this subgroup in Γ, and the
¯ := ∆/∆0 , and Ξ̄ respectively,
proposition holds. Replacing Γ, ∆, Ξ by Γ̄, ∆
we reduce to the case that ∆ is finite. We need only show that if ΞM2 ∆
contains a finite index subgroup Γ0 of Γ, then ΞN is a finite index subgroup
of Γ for some N .
Replacing Ξ by ΞM2 ∩ Γ0 ∆, we may assume that Ξ ⊆ Γ0 ∆ and Ξ meets
every fiber of π : Γ0 ∆ → Γ0 ∆/∆. In particular, Ξ contains an element of ∆,
12
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
so replacing Ξ with Ξ|∆| , we may assume Ξ contains the identity, so
Ξ ⊆ Ξ2 ⊆ Ξ3 ⊆ · · ·
(9)
For i a positive integer, let mi denote the maximum over all fibers of π of
the cardinality of the intersection of the fiber with Ξi . Thus, the intersection
of every fiber of π with Ξi+1 is at least mi . Since fiber size is bounded
above by ∆, the sequence (9) must eventually stabilize. Replacing Ξ with
a suitable power, we have Ξ2 = Ξ. Thus Ξ is closed under multiplication.
As Ξ meets every fiber of π in the same number of points, γ ∈ Ξ implies
γ(Ξ ∩ π −1 (π(γ)−1 )) = Ξ ∩ ∆0, which implies γ −1 ∈ Ξ. Thus, Ξ is a subgroup
of Γ of bounded index.
Next, we prove a criterion for a subgroup of G(O) to be of finite index.
Proposition 3.5. Let Γ ⊆ G(O) ⊂ G(K). Then the Hirsch number hΓ of Γ
satisfies
(10)
hΓ ≤ [K : Q] dim GK .
If equality holds in (10), then Γ is of finite index in G(O).
Proof. Hirsch number is additive in short exact sequences. Let G0 := GK ,
and let G0 ) G1 ) · · · ) Gk = {1} be a central series. Then we have a
decreasing filtration of Γ by Γi := Γ ∩ Gi (K), and each quotient Γi /Γi+1
is a free abelian subgroup of Gi (K)/Gi+1 (K) ∼
= K dim Gi /Gi+1 . Every free
r
abelian subgroup of K has rank ≤ r[K : Q] with equality if and only if it is
commensurable with Or . This implies (10).
Applying the same argument to G(O), we get
hΓ ≤ hG(O) ≤ [K : Q] dim GK .
If equality holds in (10), then G(O)i /G(O)i+1 and its subgroup Γi /Γi+1 are
commensurable, and this implies that Γ is of index
k−1
Y
[G(O)i /G(O)i+1 : Γi /Γi+1 ] < ∞
i=0
in Γ.
We prove Theorem 3.1 by showing that h(f1 (O) ∪ · · · ∪ fn (O))M contains
a subset which is a group of Hirsch number [K : Q] dim GK . We first treat
the commutative case.
Proposition 3.6. Theorem 3.1 holds if G is commutative.
Proof. First we claim that for all d > 0 there exist integers L, M > 0 such
that
LOd ⊆ {(x1 + · · · + xM , x21 + · · · + x2M , . . . , xd1 + · · · + xdM ) | xi ∈ O}.
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
13
Since this is of finite index in Od , replacing M by a larger integer (also
denoted M ), we can guarantee that every element in the group generated by
{(x, x2 , . . . , xd ) | x ∈ O} can be written as a sum of M elements.
To prove the claim, we use Proposition 2.5 to show that each basis vector
ei is a sum of M elements of {(x, x2 , . . . , xd ) | x ∈ K}. Replacing each
x in the representation of ei by Dx for some sufficiently divisible positive
integer D, it follows that each ki ei can be written as a sum of M elements
of {(x, x2 , . . . , xd ) | x ∈ O} for suitable positive integers ki .
For each α ∈ O, we see from the (i − 1)th difference of αi (see [Wr,
Theorem 1, p.267]) that
i−1
X
1
m i−1
(−1)
i!α =
(α + m)i − (i − 1)i!.
(11)
m
2
m=0
Thus every element of i!O is in the subring O(i) of O generated by ith powers
of elements of O. A theorem of Siegel (see [Si1, Theorem VI]) implies that
there exist N1 , N2 , . . . such that every element of O(i) is a sum of Ni ith
powers of elements of O. Thus every element of i!O is a sum of Ni ith
powers of elements of O, and therefore every element of i!ki Oei is a sum of
M Ni elements of {(x, x2 , . . . , xd ) | x ∈ O}.
Letting L denote a positive integer divisible by 1!k1 , 2!k2 . . . , d!kd , and
replacing M by M (N1 + · · · + Nd ), we can write every element of LOd as a
sum of M elements of {(x, x2 , . . . , xd ) | x ∈ O}.
Restricting fj to the generic fiber, we can write it as a vector of polynomials (2) with the Pij given by (3). We can solve the system (4) of equations in
O whenever we can solve (5) in yjk ∈ LO. This
P system is always solvable in
K, so it is solvable in LO whenever the ci −N j aij0 is sufficiently divisible.
Thus, there exists an integer D such that if N and the ci are divisible by
D and N is sufficiently large, then (c1 , . . . , cm ) is a sum of N terms each of
which belongs to (f1 (O) ∪ · · · ∪ fn (O)). Let Λ := DOm .
Now, Λ ⊆ G(O) ⊂ G(K) ∼
= K m . As G(O) has a finite filtration whose
quotients are finitely generated free abelian groups, it must contain Λ as a
subgroup of finite index. Defining
Xi := f1 (O) ∪ · · · ∪ fn (O) + · · · + f1 (O) ∪ · · · ∪ fn (O) ,
|
{z
}
iN
we have Λ ⊆ Xi ⊆ G(O) for all i ≥ 1, and Xi+1 = X1 + Xi . It follows that
Xi+1 contains every Λ-coset in G(O) represented by any element of Xi , and
therefore the sequence X1 , X2 , . . . stabilizes to a subgroup of G(O) of rank
m[K : Q] and of finite index in G(O).
Now we prove Theorem 3.1
Proof. We first observe that Proposition 2.4 remains true over O; more precisely, assuming that the morphisms fi are defined over O, the elements gi
can be taken to be in G(O) and ai,j , bi,j ∈ O, so the morphisms hi are defined
14
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
over O. Instead of using Proposition 2.3, we use Proposition 3.6. The image
γ̄1 of the element γ1 guaranteed by Lemma 1.9 may not lie in the lattice
Λ ⊂ G(K)/G′ (K) ∼
= K m , but some positive integer multiple of γ̄1 will do so,
and the property of γ1 with respect to V is unchanged when it is replaced by
a non-trivial power. The elements ai guaranteed by Proposition 2.5 may not
lie in O, but again we can clear denominators by multiplying by a suitable
positive integer. The element gr+1 will exist as long as N v0 ∈ Λ. This can
be guaranteed by replacing N with a suitable positive integral multiple.
induction on dim G.
Now we proceed as in the proof of Theorem 2.2, usingS
By the induction hypothesis, there exists N such that ( i hi (O))N contains
a subgroup of G′ (K) of Hirsch number [K : Q] dim G′ . On the other hand,
by Proposition 3.6, there exists a bounded power of (f¯1 (O) ∪ · · · ∪ f¯n (O))
which contains a subgroup of (G/G′ )(K) of Hirsch number [K : Q] dim G/G′ .
Here for each 1 ≤ i ≤ n, f¯i (x) denotes the composition of fi (x) with the
quotient map G → G/G′ . The theorem follows from Proposition 3.4 and the
additivity of Hirsch numbers.
4. The easier unipotent Waring problem
We recall that the classical “easier Waring problem” [Wr] is to prove that
for every positive integer n there exists m such that every integer can be
written in the form ±an1 ± · · · ± anm , ai ∈ Z, and to determine the minimum
value of m for each n.
In this section, we prove unipotent analogues of the easier Waring problem
for arbitrary fields of characteristic zero and rings of integers of arbitrary
number fields:
Theorem 4.1. If G is a unipotent algebraic group over a field K of characteristic zero and {f1 , . . . , fn } is a generating set of K-morphisms A1 → G,
then for some positive integer M ,
M
[
(f1 (K)e1 ∪ · · · ∪ fn (K)em ) = G(K).
e1 ,...,en ∈{±1}
Theorem 4.2. Let K be a number field, O its ring of integers, and G a
closed O-subscheme of the group scheme Uk of unitriangular k × k matrices.
If {f1 , . . . , fn } is a generating set of O-morphisms A1 → G, then for some
positive integer M ,
M
[
f1 (O)e1 ∪ · · · ∪ fn (O)en
e1 ,...,en ∈{±1}
is a subgroup of bounded index in G(O).
The proof of Theorem 4.1 depends on variants of Propositions 2.3 and 2.4.
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
15
Proposition 4.3. If K is a field of characteristic zero and d is a positive
integer, there exists an integer N > 0 such that K d can be represented as
K d = (X1d + · · · + X1d ) − (X1d + · · · + X1d ),
{z
} |
{z
}
|
N
where
N
X1d := {(x, x2 , . . . , xd ) | x ∈ K}.
Proof. This is [IL, Theorem 3.2].
Proposition 4.4. Theorem 4.1 holds when G is a vector group.
Proof. Let
(12)
fj (x) = (P1j (x), . . . , Pmj (x)),
where d is the maximum of the degrees of the Pij for 1 ≤ i ≤ m and
1 ≤ j ≤ n. Let N be chosen as in Proposition 4.3. Writing
(13)
Pij (x) =
d
X
aijk xk
k=0
for 1 ≤ i ≤ m and 1 ≤ j ≤ n. Given (c1 , . . . , cm ), our goal is to find suitable
ǫjℓ ∈ {±1} and xjℓ ∈ K such that
(c1 , . . . , cm ) =
2N X
n
X
ǫjℓ fj (xjℓ ).
ℓ=1 j=1
In light of Proposition 4.3, for each 1 ≤ j ≤ n, one can let ǫjℓ = 1 if
1 ≤ ℓ ≤ N , and let ǫjℓ = −1 if N + 1 ≤ ℓ ≤ 2N . Thus the above system is
equivalent to the system of equations
!
2N
N
d
n X
X
X
X
(14)
xkjℓ , i = 1, . . . , m.
xkjℓ −
aijk
ci =
j=1 k=0
ℓ=N +1
ℓ=1
By Proposition 4.3, by choosing xjℓ ∈ K suitably, we can choose the values
yjk =
N
X
ℓ=1
xkjℓ
−
2N
X
xkjℓ
ℓ=N +1
independently for 1 ≤ j ≤ n and 1 ≤ k ≤ d, while yj0 = 0 by definition.
Thus we can rewrite the system of equations (14) as
(15)
d
n X
X
aijk yjk = ci , i = 1, . . . , m.
j=1 k=1
Arguing as in the proof of Proposition 2.3, we see that the above system
of equations is always solvable unless fj is constant modulo some proper
subspace V of Am for all 1 ≤ j ≤ n, i.e., each π ◦ fj is constant, where
16
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
π : Am → Am /V is the canonical projection. This is impossible since the set
of morphisms {f1 , . . . , fn } is generating.
Proposition 4.5. Under the hypotheses of Theorem 4.1, there exists an integer m, a sequence of elements g1 , . . . , gm ∈ G(K), a sequence of positive integers k1 , . . . , km , for each i ∈ {1, . . . , m}, a sequence of integers ℓi,1 , . . . , ℓi,ki ∈
[1, n], a sequence of integers ei,1 , . . . , ei,ki ∈ {±1}, and sequences of elements ai,1 , bi,1 , . . . , ai,ki , bi,ki ∈ K, such that for each i ∈ {1, . . . , m}, the
K-morphisms h1 , . . . , hm : A1 → G defined by
hi (x) := gi fℓi,1 (ai,1 x + bi,1 )ei,1 · · · fℓi,ki (ai,ki x + bi,ki )ei,ki
map A1 → G′ and as morphisms to G′ are generating.
Proof. Using Proposition 4.4, and the same arguments as in Proposition 2.4,
Proposition 4.5 follows immediately.
Proof of Theorem 4.1. The proof of Theorem 4.1 is the same as that of Theorem 2.2. Using Propositions 4.4 and 4.5, we proceed as in the proof of
Theorem 2.2, using induction on dim(G). Theorem 4.1 follows immediately.
Next, we prove an integral variant of Proposition 4.3, in greater generality
than we need for Theorem 4.2:
Proposition 4.6. Let O be any integral domain whose quotient field K is
of characteristic zero. For all positive integers d, there exist λ ∈ O \ {0} and
N ∈ Z>0 such that
λOd ⊆ (Y1d + · · · + Y1d ) − (Y1d + · · · + Y1d ),
{z
} |
{z
}
|
N
where
N
Y1d = {(x, x2 , . . . , xd ) | x ∈ O}.
Proof. For each integer k > 0, set
d
= (Y1d + · · · + Y1d ) − (Y1d + · · · + Y1d ) .
Yk,k
|
{z
} |
{z
}
k
k
Choose N > 0 as in Proposition 4.3. For each 1 ≤ m ≤ d, the basis vector
em can be written in the form
em
N
N
X
X
2
d
(yj , yj2 , . . . , yjd )
(xj , xj , . . . , xj ) −
=
j=1
j=1
for some xj , yj ∈ K. Replacing each xj , yj in the above representation by
δxj , δyj for some non-zero δ ∈ O, it follows that there exists a non-zero
κm ∈ O such that
(16)
d
κm em ∈ YN,N
.
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
17
For each α ∈ O, we apply (11) to prove that
d
m!κm Oem ⊆ Y2N
Nm ,2N Nm .
Let λ := d!
Qd
i=1 κi .
Replacing N by 2N (N 1 + · · · + Nd ), we deduce that
d
λOd ⊆ YN,N
.
The next result is a variant of Proposition 3.6.
Proposition 4.7. Theorem 4.2 holds if G is commutative.
Proof. Let λ, N be chosen as in Proposition 4.6. Restricting fj to the generic
fiber, we can write it as a vector of polynomials (12) with the Pij given by
(13). We can solve the system (14) of equations whenever we can solve
the system (15) in yjk ∈ λO. This system is always solvable in K; so
it is solvable in λO whenever the ci are sufficiently divisible. Thus there
exists an integer D such that if the ci are divisible by D and N is sufficiently
S large, then (c1 , . . . , cm ) is a sum of N terms, each of which belongs
to e1 ,...,en∈{±1} (e1 f1 (O) ∪ · · · ∪ en fn (O)). Let Λ := DOm .
Set
[
U=
(e1 f1 (O) ∪ · · · ∪ en fn (O)).
e1 ,...,en ∈{±1}
For each i ≥ 1, define
Xi = |U + ·{z
· · + U} .
iN copies of U
We have Λ ⊆ Xi ⊆ G(O) ⊂ G(K) ∼
= K m for all i ≥ 1, and Xi+1 = X1 +Xi .
Using the same arguments as in the proof of Proposition 3.6, Λ is a subgroup
of finite index in G(O), and therefore the sequence X1 , X2 , . . . stabilizes to a
subgroup of G(O) of rank m[K : Q], and of finite index in G(O).
We now prove Theorem 4.2.
Proof of Theorem 4.2. We first observe that Proposition 4.5 remains true
over O; more precisely, assuming that the morphisms fi are defined over
O, the elements gi can be taken to be in G(O) and ai,j , bi,j ∈ O, so the
morphisms hi are defined over O.
Now we proceed as in the proof of Theorem 4.1, using induction on
dim G.S By the induction hypothesis, there exists an integer N > 0 such
that ( e1 ,...,en∈{±1} (h1 (O)e1 ∪ · · · ∪ hn (O)en ))N is a subgroup of G′ (O) of
Hirsch number [K : Q] dimS
G′ . On the other hand, by Proposition 4.7, there
exists a bounded power of e1 ,...,en ∈{±1} (f¯1 (O)e1 ∪ · · · ∪ f¯n (O)en ) which is a
subgroup of (G/G′ )(O) of Hirsch number [K : Q] dim G/G′ . Here for each
1 ≤ i ≤ n, f¯i (x) denotes the composition of fi (x) with the quotient map
18
MICHAEL LARSEN AND DONG QUAN NGOC NGUYEN
G → G/G′ . The theorem follows by Proposition 3.4 and the additivity of
Hirsch numbers.
References
[AGKS] Avni, Nir; Gelander, Tsachik; Kassabov, Martin; Shalev, Aner: Word values in
p-adic and adelic groups. Bull. Lond. Math. Soc. 45 (2013), no. 6, 1323–1330.
[Bi]
Birch, B. J.: Waring’s problem for p-adic number fields. Acta Arith. 9 (1964),
169–176.
[Ca]
Car, Mireille: Le problème de Waring pour les corps de fonctions. Journées Arithmétiques, 1989 (Luminy, 1989). Astérisque No. 198–200 (1991), 77–82.
[CK1] Carter, David; Keller, Gordon: Bounded elementary generation of SLn (O).
Amer. J. Math. 105 (1983), no.3, 673–687.
[CK2] Carter, David; Keller, Gordon: Elementary expressions for unimodular matrices.
Comm. Algebra 12 (1984), no. 3-4, 379–389.
[Ch]
Chinburg, Ted: Infinite easier Waring constants for commutative rings. Topology
Appl. 158 (2011), no. 14, 1844–1847.
[DG]
Demazure, Michel; Gabriel, Pierre: Groupes algébriques. Tome I: Géométrie algébrique, généralités, groupes commutatifs. Avec un appendice Corps de classes
local par Michiel Hazewinkel. Masson & Cie, Éditeur, Paris; North-Holland Publishing Co., Amsterdam, 1970.
[El]
Ellison, William: Waring’s problem for fields. Acta Arith. 159 (2013), no. 4,
315–330.
[GV]
Gallardo, Luis H.; Vaserstein, Leonid N.: The strict Waring problem for polynomial rings. J. Number Theory 128 (2008), no. 12, 2963–2972.
[GS]
Grunewald, Fritz J.; Schwermer, Joachim: Free nonabelian quotients of SL2 over
orders of imaginary quadratic numberfields. J. Algebra 69 (1981), no. 2, 298–304.
[GT]
Guralnick, Robert M.; Tiep, Pham Huu: Effective results on the Waring problem
for finite simple groups. Amer. J. Math. 137 (2015), no. 5, 1401–1430.
[IL]
Im, Bo-Hae; Larsen, Michael: Waring’s Problem for rational functions in one
variable, preprint.
[Ka]
Kamke, E.: Verallgemeinerungen des Waring-Hilbertschen Satzes. Math. Ann.
83 (1921), no. 1–2, 85–112.
[LST] Larsen, Michael; Shalev, Aner; Tiep, Pham Huu: The Waring problem for finite
simple groups. Annals of Math. (2) 174 (2011), no. 3, 1885–1950.
[LW]
Liu, Yu-Ru; Wooley, Trevor D.: Waring’s problem in function fields. J. Reine
Angew. Math. 638 (2010), 1–67.
[Ro]
Rosenlicht, Maxwell: Some basic theorems on algebraic groups. Amer. J. Math.
78 (1956), 401–443.
[Se]
Serre, Jean-Pierre: Cohomologie galoisienne. With a contribution by Jean-Louis
Verdier. Lecture Notes in Mathematics, No. 5. Troisim̀e édition, 1965 SpringerVerlag, Berlin-New York, 1965.
[Sh]
Shalev, Aner: Word maps, conjugacy classes, and a noncommutative Waringtype theorem. Annals of Math. (2) 170 (2009), no. 3, 1383–1416.
[Si]
Siegel, Carl Ludwig: Generalization of Waring’s problem to algebraic number
fields. Amer. J. Math. 66, (1944), 122–136.
[Si1]
Siegel, Carl Ludwig: Sums of m-th powers of algebraic integers. Ann. of Math.
(2) 46, (1945). 313–339.
[Ta]
Tavgen’, O. I.: Bounded generation of normal and twisted Chevalley groups over
the rings of S-integers. Proceedings of the International Conference on Algebra,
Part 1 (Novosibirsk, 1989), 409–421, Contemp. Math., 131, Part 1, Amer. Math.
Soc., Providence, RI, 1992.
WARING’S PROBLEM FOR UNIPOTENT ALGEBRAIC GROUPS
[Vo]
[W1]
[W2]
[W3]
[Wr]
19
Voloch, José Felipe On the p-adic Waring’s problem. Acta Arith. 90 (1999), no.
1, 91–95.
Wooley, Trevor D. On simultaneous additive equations. I. Proc. London Math.
Soc. (3) 63 (1991), no. 1, 1–34.
Wooley, Trevor D. On simultaneous additive equations. II. J. Reine Angew. Math.
419 (1991), 141–198.
Wooley, Trevor D. On simultaneous additive equations. III. Mathematika 37
(1990), no. 1, 85–96.
Wright, Edward Maitland: An easier Waring problem J. London Math. Soc.
S1–9, (1934), no.4 267–272.
Department of Mathematics, Indiana University, Bloomington, Indiana
47405, USA
E-mail address: [email protected]
Department of Applied and Computational Mathematics and Statistics,
University of Notre Dame, Notre Dame, Indiana 46556, USA
E-mail address: [email protected]
| 4math.GR
|
arXiv:1711.04520v1 [cs.GT] 13 Nov 2017
Fair Knapsack∗
Till Fluschnik† 1 , Piotr Skowron1 , Mervin Triphaus1 , and Kai Wilker1
1
Institut für Softwaretechnik und Theoretische Informatik, TU Berlin, Germany,
[email protected], [email protected],
{mervin.triphaus,wilker}@campus.tu-berlin.de
Abstract
We study the following multiagent variant of the knapsack problem. We are given a
set of items, a set of voters, and a value of the budget; each item is endowed with a cost
and each voter assigns to each item a certain value. The goal is to select a subset of items
with the total cost not exceeding the budget, in a way that is consistent with the voters’
preferences. Since the preferences of the voters over the items can vary significantly,
we need a way of aggregating these preferences, in order to select the socially most
preferred valid knapsack. We study three approaches to aggregating voters preferences,
which are motivated by the literature on multiwinner elections and fair allocation. This
way we introduce the concepts of individually best, diverse, and fair knapsack. We study
computational complexity (including parameterized complexity, and complexity under
restricted domains) of computing the aforementioned concepts of multiagent knapsacks.
1
Introduction
In the classic knapsack problem we are given a set of items, each having a cost and a
value, and a budget. The goal is to find a subset of items with the maximal sum of the
values subject to the constraint that the total cost of the selected items must not exceed
the budget. In this paper we are studying the following variant of the knapsack problem:
instead of having a single objective value for each item we assume that there is a set of agents
(also referred to as voters) who have potentially different valuations of the items. When
choosing a subset of items we want to take into account possibly conflicting preferences of
the voters with respect to which items should be selected: in this paper we discuss three
different approaches to how the voters’ valuations can be aggregated.
Multiagent knapsack forms an abstract model for a number of real-life scenarios. First,
observe that it is a natural generalization of the model for multiwinner elections [19] to the
∗
This research was initiated within the student project “Research in Teams” organized by the research
group Algorithmics and Computational Complexity of TU Berlin, Berlin, Germany.
†
Supported by the DFG, project DAMM (NI 369/13).
1
case where the items come with different costs (in the literature on multiwinner elections,
items are often called candidates). Multiwinner voting rules are applicable in a broad class of
scenarios, ranging from selecting a representative committee of experts, through recommendation systems [34]1 , to resource allocation [37, 50, 49] and facility location problems [21]. In
each of these settings it is quite natural to consider that different items/candidates can incur
different costs. Further, algorithms for multiagent knapsack can be viewed as tools for the
participatory budgeting problem [9], where the authorities aggregate citizens’ preferences
in order to decide which of the potential local projects should obtain funding.
Perhaps the most straightforward way to aggregate voters’ preferences is to select a
subset (a knapsack) that maximizes the sum of the utilities of all the voters over all the
selected items. This approach—which we call selecting an individually best knapsack —
subject to differences in methods used for elicitating voters’ preferences, has been taken by
Benabbou and Perny [3], and in the context of participatory budgeting by Goel et al. [28] and
Benade et al. [4]. However, by selecting an individually best knapsack we can discriminate
even large minorities of voters, which is illustrated by the following simple example: assume
that the set of items can be divided into two subsets, A1 and A2 , that all items have the
same unit cost, and that 51% of the voters like items from A1 (assigning the utility of 1
to them, and the utility of 0 to the other items) and the remaining 49% of voters like only
items from A2 . An individually best knapsack would contain only items from A1 , that is
49% of the voters would be effectively disregarded.
In this paper we introduce two other approaches to aggregating voters’ preferences for
selecting a collective knapsack. One such approach—which we call selecting a diverse knapsack —is inspired by the Chamberlin–Courant rule [11] from the literature on multiwinner
voting. Informally speaking, in this approach we aim at maximizing the number of voters
who have at least one preferred item in the selected knapsack. For the second approach—
which is the main focus of the paper and which we call selecting a fair knapsack —we use
the concept of Nash welfare [39] from the literature on fair allocation. Nash welfare is a
solution concept that implements a tradeoff between having an objectively efficient resource
allocation (knapsack, in our case), and having an allocation which is acceptable for a large
population of agents. Indeed, the properties of Nash welfare have been recently extensively
studied in the literature on fair allocation [10, 38, 14, 46] and this solution concept has
been considered e.g., in the context of public decision making [12], online resource allocation [25] or transmission congestion control [29] (where it is referred to as proportional
fairness). Thus, our work introduces a new application domain—where the goal is to select
a set of shared items—for the concept of Nash welfare. In particular, as a side note, we will
explain that our approach leads to a new class of multiwinner rules, which can be viewed as
generalizations of the Proportional Approval Voting rule [54] beyond the approval setting.
Apart from introducing the new class of multiagent knapsack problems, our contribution
is the following:
1
An example often described in the literature is when an enterprise considers which set of products should
be pushed to production—it is natural to view such a problem as an instance of multiwinner elections with
products corresponding to the items/candidates and potential customers corresponding to the voters.
2
Table 1: Overview of our results: Herein, SP and SC abbreviate single-peaked and single-crossing
preferences, respectively, and “# voters” refers to “when parameterized by the number of voters”.
unary
general
IB Knapsack
Diverse Knapsack
Fair Knapsack
SP
SC
# voters
←
P (Thm. 2)
NP-hard
P
P
FPT
([44])
(Thm. 4)
(Prop. 1)
(Thm. 5)
NP-hard
NP-hard
W[1]-hard
(Thm. 6)
(Thm. 10)
(Thm. 7)
(1) We study the complexity of computing an optimal individually best, diverse, and fair
knapsack. This problem is in general hard, except for the case of individually best
knapsack with the utilities of the voters represented in unary encoding.
(2) We study the parameterized complexity of the problem, focusing on the number of
voters. Considering this parameter is relevant, e.g., for the case when the set of voters
is in fact a relatively small group of experts acting on behalf of a larger population
of agents. Redelegating the task of evaluating the items to the committee of experts
is reasonable for several reasons. For instance, coming up with accurate valuations
of items may require a specialized knowledge and a significant cognitive effort, and
so it would often be impossible to evaluate items efficiently and accurately among a
large group of common people. We show that for unary-encoded utilities of the voters
computing a diverse knapsack is FPT when parameterized by the number of voters.
On the other hand, the problem of computing a fair knapsack is W[1]-hard for the same
parameter.
(3) We study the complexity of the considered problems for single-peaked and singlecrossing preferences. We show that (under unary encoding of voters’ utilities) a diverse knapsack can be computed efficiently when the preferences are single-peaked or
single-crossing. Interestingly, computing fair knapsack stays NP-hard even when the
preferences are both single-peaked and single-crossing.
Our results are summarized in Table 1. We additionally show that all three problems are
NP-hard in the non-unary case (Theorems 3 and 6) and prove fixed-parameter intractability
for the parameter being the budget (Proposition 2 and Corollary 1).
2
The Model
For any pair of natural numbers i, j ∈ N, i ≤ j, by [i, j] we denote the set {i, i + 1, . . . , j}.
Further, by [j] we denote the set [1, j].
3
Let V = {v1 , . . . , vn } be the set of n voters and A = {a1 , . . . , am } be the set of m items.
The voters have preferences over the items, which are represented as a utility profile u =
(ui (a) | i ∈ [n], a ∈ A): for each i ∈ [n] and a ∈ A we use ui (a) to denote the utility that
vi assigns to a; this utility quantifies the extent to which vi enjoys a. We assume that all
utilities are nonnegative integers.
Each item a ∈ A comes with a cost c(a) ∈ N, and we are given a global budget B. We
call a knapsack a subset S of items whose total cost does not exceed B, that is c(S) =
P
a∈S c(a) ≤ B. Our goal is to select a knapsack that would be, in some sense, most
preferred by the voters. Below, we describe three representative rules which extend the
preferences of the individual voters over individual items to their aggregated preferences
over all knapsacks. Each such a rule induces a corresponding method for selecting the best
knapsack. Our rules are motivated with concepts from the literature on fair division and
on multiwinner elections:
Individually best knapsack: this is the knapsack
which maximizes the total utility
P SP
of the voters from the selected items uIB (S) = a∈S vi ∈V ui (a). This defines perhaps
the most straightforward way to select the knapsack: we call it individually best, because
the formula uIB (S) treats the items separately and does not take into account fairnessrelated issues. Indeed, such a knapsack can be very unfair, which is illustrated by the
following example:
Example 1. Let B be an integer, and consider a set of n = B voters and m = B 2
items, all having a unit cost (c(a) = 1 for each a ∈ A). Let us rename the items so that
A = {ax,y | x, y ∈ [B]} and consider the following utility profile:
if i = x = 1
L + 1
ui (ax,y ) = L
if i = x 6= 1
0
otherwise,
for some large L ∈ N. In this case, the individually best knapsack is SIB = {a1,y | y ∈ B},
that is it consists only of the items liked by a single voter v1 . At the same time, there
exists a much more fair knapsack SFair = {ax,1 | x ∈ B} that for each voter v ∈ V
contains an item liked by v.
Diverse knapsack:
this is the knapsack S that maximizes the utility uDiv (S) defined as
P
uDiv (S) = vi ∈V maxa∈S ui (a). In words, in the definition of uDiv we assume that each
voter cares only about his or her most preferred item in the knapsack. This approach
is inspired by the Chamberlin–Courant rule [11] from the literature on multiwinner
elections and by classic models from the literature on facility location [21]. We call
such a knapsack diverse following the convention from the multiwinner literature [19].
Intuitively, such a knapsack represents the diversity of the opinions among the population
of voters; in particular, if the preferences of the voters are very diverse, such a knapsack
tries to incorporate the preferences of as many groups of voters as possible at the cost
of containing only one representative item for each “similar” group.
4
Fair knapsack: we use Nash welfare [39] as a solution concept Q
for fairness.P
Formally, we
call a knapsack S fair if it maximizes the product uFair (S) = vi ∈V 1 + a∈S ui (a) .2
Alternatively,
logarithm of uFair we can represent fair knapsack as the one
Pby taking theP
maximizing vi ∈V log(1 + a∈S ui (a)).
In Section 1 we referred the reader to the literature supporting the use of Nash welfare
in various settings. Let us complement these arguments with one additional observation.
When the utilities of the voters come from the binary set {0, 1} and costs of all items
are equal to one, then our multiagent knapsack framework boils down to the standard
multiwinner elections model with approval preferences. In such a case, a very appealing rule,
Proportional
P
P Approval Voting [19, 54], can be expressed as finding a knapsack maximizing
H(
vi ∈V
a∈S ui (a)), where H(i) is the i-th harmonic number. This is almost equivalent
to finding a fair knapsack (maximizing the Nash welfare) since the harmonic function can
be viewed as a discrete version of the logarithm. Thus, fair knapsack can be considered a
generalization of PAV to the model with cardinal utilities and costs. In particular (as a
side note), observe that the notion of fair knapsack combined with positional scoring rules
induces rules that can be viewed as an adaptations of PAV to the ordinal model.
3
Related Work
Our work extends the literature on the multi-objective (MO) knapsack problem, that is
on the variant of the classic knapsack problem with multiple independent functions valuating the items. Typically, in the MO knapsack problem the goal is to find a (the set of)
Pareto optimal solution(s) according to multiple objectives defined through given functions
valuating items. Our approach is different since we consider specific forms of aggregating
the objectives; in particular each of the concepts we study—the individually best, diverse
and fair knapsack—is a Pareto optimal solution. For an overview of the literature on the
MO knapsack problem (with the focus on the analysis of heuristic algorithms) we refer the
reader to the survey by Lust and Teghem [35].
Multidimensional (MD) knapsack is yet another generalization of the original knapsack
problem; in the MD knapsack we have multiple cost constraints (each item comes with
different costs for different constraints), and the goal is to maximize a single objective while
respecting all the constraints. Approximation algorithms for the problem with submodular
objective functions have been considered, e.g., by Kulik et al. [30], Sviridenko [53], and
Lee et al. [32]. Further, Fréville [26] and Puchinger et al. [45] provide an overview of
heuristic algorithms for the problem. Finally, Florios et al. [23] consider algorithms for the
multidimensional multi-objective variant of the knapsack problem.
Lu and Boutilier [34] studied a variant of the Chamberlin–Courant rule which includes
knapsack constraints, and so, which is very similar to our diverse knapsack problem. The
2
P
Q
Typically,
Nash welfare would be defined as vi ∈V
a∈S ui (a) . In our definition, we add one to the
P
sum a∈S ui (a) in order to avoid pathological situations when the sum is equal to zero for some voters.
This also allows us to represent the expression we optimize as a sum of logarithms, and thus, to expose the
close relation between the fair knapsack and the Proportional Approval Voting rule.
5
difference is that (i) they consider utilities which are extracted from the voters’ preference
rankings, thus these utilities have a specific structure, and (ii) in their model the items are
not shared; instead, the selected items can be copied and distributed among the voters. Lu
and Boutilier consider a model with additional costs related to copying a selected item and
sending it to a voter. Consequently, their general model is more complex than our diverse
knapsack; they also considered a more specific variant of this model, equivalent to winner
determination under the Chamberlin–Courant rule.
The computational complexity of winner determination under the Chamberlin–Courant
rule (i.e., the variant of the diverse knapsack, where the costs of all items are equal to
one) has been extensively studied in the computational social choice (ComSoc) literature.
Procaccia et al. [44] showed that the problem is NP-hard. The parameterized complexity of the problem was investigated by Betzler et al. [5], and its computational complexity under restricted domains by Betzler et al. [5], Yu et al. [55], Elkind and Lackner [16],
Skowron et al. [51], and Peters and Lackner [43]. Lu and Boutilier [34] and Skowron et al. [50]
investigated approximation algorithms for the problem; superpolynomial (FPT) approximation algorithms have been considered by Skowron and Faliszewski [48].
A variant of the diverse knapsack problem with the utilities satisfying a form of the
triangle inequality is known under the name of the knapsack median problem; see the work
of Byrka et al. [8] for a discussion on the approximability of the problem.
The Chamberlin–Courant method is a multiwinner election rule (in short, the multiagent
knapsack model extends the multiwinner model by allowing the items to have different
costs). There is a broad class of multiwinner rules aggregating voter preferences in various
ways. In particular, there exists a number of spectra of rules “between” the individually
best and the Chamberlin–Courant objectives [20, 31]. For an overview of other multiwinner
rules which can be adapted to our setting, see [52, 19].
As we discussed in the introduction, the multiagent variant of the knapsack problem
has been often considered in the context of participatory budgeting, yet to the best of
our knowledge this literature focused on the simplest aggregation rule corresponding to
our individually best knapsack approach [9, 28, 4]. Another avenue has been explored by
Fain et al. [18], who studied rules that determine the level of funding provided to different
projects (items, in our nomenclature) rather than rules selecting subsets of projects with
predefined funding requirements.
As we mentioned before, Nash welfare is an established solution concept used in the
literature on fair allocation [10, 38, 14, 46]. Nguyen et al. [40] provided a thorough survey
on the complexity of computing Nash welfare in the context of allocating indivisible goods
in the multiagent setting. To the best of our knowledge, our paper is the first work studying
fairness solution concepts for the problem of selecting a collective knapsack.
4
Computing Collective Knapsacks
In this section we investigate the computational complexity of finding individually best,
diverse, and fair knapsack. Formally, we define the computational problem for individually
6
best knapsack as:
Individually Best Knapsack
Input: An instance (V, A, u, c) and a budget B.
Task: P
Compute
P a knapsack S ⊆ A such that c(S)
vi ∈V
a∈S ui (a) is maximum.
≤
B and uIB (S) =
We define the computational problems Diverse Knapsack and Fair Knapsack
analogously—the difference is only in the expression to maximize, which for the two problems is uDiv and uFair , respectively. We will use the same names when referring to the
decision variants of these problems; in such cases we will assume that one additional integer
x is given in the input, and that the decision question is whether there exists S with value
uIB (S) (respectively, uDiv (S) or uFair (S)) greater or equal to x, and c(S) ≤ B.
We observe that the functions uIB , uDiv , and uFair (when represented as a sum of logarithms) are submodular. Thus, we can use the algorithm of Sviridenko [53] with the
following guarantees.
Theorem 1. There exists a polynomial-time (1 − 1/e)-approximation algorithm for Individually Best Knapsack, Diverse Knapsack, and Fair Knapsack.
In the remaining part of the paper we will focus on computing an exact solution to the
three problems. In particular, we study the complexity under the following two restricted
domains:
Single-peaked preferences [6, 1]. Let topi denote vi ’s most preferred item, and let ⊳
be an order of the items. We say that a utility profile u is single-peaked with respect to
⊳ if for each a, b ∈ A and each vi ∈ V such that a ⊳ b ⊳ topi or topi ⊳ b ⊳ a we have that
ui (b) ≥ ui (a).
Single-crossing preferences [36, 47]. Let ⊳ be an order of the voters. We say that a
utility profile u is single-crossing with respect to ⊳ if for each two items a, b ∈ A the set
{vi ∈ V | ui (b) ≥ ui (a)} forms a consecutive block according to ⊳.
We say that a profile u is single-peaked (resp., single-crossing) if there exists an order ⊳
of the items (resp., of the voters) such that u is single-peaked (resp., single-crossing) with
respect to ⊳. Note that an order witnessing single-peakedness or single-crossingness can be
computed in polynomial time (see, e.g., [17]).
We will also study the parameterized complexity of the three problems. For a given
parameter p, we say that an algorithm for a problem is FPT with respect to p if it solves
each instance I of the problem in O f (p) · poly(|I|) time, where f is some computable
function. In the parameterized complexity theory, FPT algorithms are considered efficient.
There is a whole hierarchy of complexity classes, but informally speaking, a problem that
is W[1]- or W[2]-hard is assumed not to be FPT and, hence, hard from the parameterized
point of view (see [13, 41, 24, 15] for more details on parameterized complexity).
7
4.1
Individually Best Knapsack
We first look at the simplest case of individually best knapsack.
Theorem 2. Individually Best Knapsack is solvable in polynomial time when the
utilities of voters are unary-encoded.
P
P
Proof. Consider an instance (V, A, u, c, B), and let û := vi ∈V a∈A ui (a). We apply dynamic programming with table T , where T [i, x] denotes the minimal cost of S ⊆ {a1 , . . . , ai }
with value uIB (S) at least equal to x. We initialize T [i, 0] = 0 for i ∈ [m] and T [0, x] = ∞
for each x ∈ [û]. For i ∈ [m], we have
T [i − 1, x],
h
i .
T [i, x] = min
P
c(ai ) + T i − 1, max(0, x − vj ∈V uj (ai ))
By precomputing
P
vj ∈V
uj (a) for each a ∈ A, we get a running time of O(nm + mû).
Note that if the utilities are not encoded in unary, then the problem is NP-hard even
for one voter (see Theorem 6).
4.2
Diverse Knapsack
We now turn our attention to the problem of computing a diverse knapsack. Through a
straightforward reduction from the standard knapsack problem, we get that the problem
is computationally hard even for profiles which are both single-peaked and single-crossing,
unless the utilities are provided in unary encoding.
Theorem 3. Diverse Knapsack is NP-hard even for single-peaked and single-crossing
utility profiles.
Proof. We present a many-one reduction from Knapsack. Let (X = {x1 , . . . , xn }, x, y) be
an instance of Knapsack where each xi comes with
P value ν(xi ) ≥ 1 and
P weight ω(xi );
the question is whether there exists S ⊆ X with xi ∈S ν(xi ) ≥ x and xi ∈S ω(xi ) ≤ y.
We set our set of items A = {a1 , . . . , an } with c(ai ) := ω(xi ) for each i ∈ [n]. We add n
voters v1 , . . . , vn with
2
3n · ν(aj ), i = j,
ui (aj ) := j,
i > j,
2n − j + 1, i < j.
P
P
It
is
immediate
that
for
each
S
we
have
that
c(a
)
=
Further,
i
a
∈S
xi ∈S ω(xi ).
i
P
P
2 x if and only if
max
u
(a
)
≥
3n
ν(x
)
≥
x,
which
proves
the
correctness.
a
∈S
i
j
j
j
vi ∈V
xj ∈S
It is immediate to check that the utility profile is single-peaked and single-crossing.
8
Note that computing a diverse knapsack is also NP-hard for unary encoding, as it
generalizes the Chamberlin–Courant rule, which is computationally hard [44]. For singlepeaked and single-crossing profiles the Chamberlin-Courant rule is computable in polynomial time [5, 51]. These known algorithms can be extended (by considering dynamic
programs with induction running over other dimensions) to the case of the diverse knapsack.
Theorem 4. Diverse Knapsack is solvable in polynomial time when the utility profile is
single-peaked and encoded in unary.
Proof. Consider an input instance (V = {v1 , . . . , vn }, A = {a1 , . . . , am }, u, c, B), where A
is enumerated such that the order is single-peaked
(note that such an ordering can be
P
P
computed in polynomial time [17]). Let û := vi ∈V a∈A ui (a). We apply dynamic programming with table T , where T [i, x] denotes the minimal cost of a subset S ⊆ {a1 , . . . , ai }
containing ai (ai ∈ S) with value at least equal to x (uDiv (S) ≥ x). We define the helper
function
(
P
c(ai ),
vj ∈V uj (ai ) ≥ x,
f (i, x) :=
∞,
otherwise.
We initialize T [1, x] = f (1, x) for all x ∈ [0, û]. Then we set
T [i, x] = min
f [i, x],
c(ai ) + min1≤j<i T [j, x − d(i, j)]
!
,
P
where d(i, j) := vℓ ∈V max(0, uℓ (ai ) − uℓ (aj )). Let M := {(i, x) | T [i, x] ≤ B}. Then we
can derive the value of the best diverse knapsack from max{x | ∃i : (i, x) ∈ M }.
We inductively argue over 1 ≤ i ≤ n. Clearly, the best diverse knapsack over item
set {a1 } has cost c(a1 ). Consider T [i, x] with i > 1. Let Ai ⊆ {a1 , . . . , ai } be a set of
items with value at least x of minimal cost containing ai . Then, either Ai = {ai }, or
Ai = Aj ∪ {ai }, where j ∈ [i − 1] with aj ∈ Ai and there is no j ′ ∈ [i − 1] such that aj ′ ∈ Ai
and j < j ′ < i. In the first case, c(Ai ) = c(ai ) = f [i, x]. Consider the second case. Clearly,
c(Aj ) = c(Ai ) − c(ai ). Let V1 = vℓ ∈ V | uℓ (aj ) ≤ uℓ (ai ) and let V2 := V \ V1 . From the
single-peakedness, we have that uℓ (ai ) − max1≤j ′ ≤j uℓ (aj ′ ) = uℓ (ai ) − uℓ (aj ), if vℓ ∈ V1 , and
clearly uℓ (ai ) −P
max1≤j ′ ≤j uℓ (aj ′ ) < 0, if vℓ ∈ V2 . Hence, the value of Ai is greater than the
value of Aj by vℓ ∈V max(0, uℓ (ai ) − uℓ (aj )) = d(i, j).
Before we provide an analogous result for single-crossingness, let us define a set of useful
tools. We will also use these tools later on, when analyzing the parameterized complexity
of the problem.
~ = (v1 , . . . , vn ) and a subset S ⊆ A of items, we define
Given a tuple of voters V
an assignment πS,V~ as a surjection [n] → S. An assignment is called connected, if for
every s ∈ S it holds that π −1~ (s) := {i ∈ [n] | s = πS,V~ (i)} = [x, y] for some x, y ∈ [n]. For
S,V
our first tool we introduce the following auxiliary problem.
9
Ordered Diverse Knapsack
~ , A, u, c) where V
~ = (v1 , . . . , vn ) is ordered and a budget B.
Input: An instance (V
Task: Compute a knapsack
S ⊆ A such that c(S) ≤ B, and uOrd =
Pn
maxconnected πS,V~ i=1 ui (πS,V~ (i)) is maximum.
If S = {s1 , . . . , sℓ } ⊆ A is a cost-minimal solution to Diverse Knapsack on (V, A, u, c),
~ = (V1 , . . . , Vℓ ),
then let Vi := {vj ∈ V | si = arg maxa∈S uj (a)}. Consider an ordering V
where for each i ∈ [ℓ], the voters in Vi are arbitrarily ordered. Then it is not difficult to
see that the assignment πS,V~ (i) = arg maxa∈S ui (a) is connected. Hence, we obtain the
following connection between Diverse Knapsack and Ordered Diverse Knapsack.
~ on the voters V such that there is an S ⊆ A
Observation 1. There is an ordering V
that forms a cost-minimal solution for Ordered Diverse Knapsack and for Diverse
Knapsack.
Next, we give a dynamic program for computing knapsacks that qualitatively lie “between” optimal knapsacks for Ordered Diverse Knapsack and Diverse Knapsack
(we will specify what we mean by “lying in between” later on).
~ = (v1 , . . . , vn ) of the voters. We
Let us
an input (V, A, u, c, B) and an ordering V
Pfix
n P
set û := i=1 a∈A ui (a). We give a dynamic program with table T , where T [i, x] denotes
“some” cost of a knapsack with a value assigned by voters from (v1 , . . . , vi ) at least equal
to x. We set T [1, x] = min{c(a) | a ∈ A, u1 (a) ≥ x}, if there is an a ∈ A such that u1 (a) ≥ x,
and T [1, x] = ∞ otherwise. We define the helper function
(
Pi
c(a),
j=1 uj (a) ≥ x,
f (i, a, x) =
∞,
otherwise.
We set
T [i, x] = min
a∈A
f (i, a, x),
c(a) + min T [j, max(0, x −
j∈[i−1]
Pi
ℓ=j+1 uℓ (a))]
.
(1)
Observation 2. When the utilities are unary-encoded, we can compute all entries in T in
polynomial time.
Lemma 1. Let S be a cost-minimal solution to Diverse Knapsack on (V, A, u, c) and
let x = uDiv (S). Then T [n, x] ≥ c(S).
Proof. Suppose that this is not the case, that is, T [n, x] < c(S). Then we construct a
knapsack S ′ from T [n, x] as follows. Let a ∈ A be an item that minimizes (1) for T [n, x],
then make a ∈ S ′ . If T [n, x] = f (n, a, x), then T [n, x] = c(a) < c(S), contradicting the fact
that S is cost-minimal. Otherwise,
T [n, x] = c(a) + T [j, x′ := max(0, x −
n
X
ℓ=j+1
10
uℓ (a))].
Then we proceed towards a contradiction as before: Let a′ ∈ A be an item that minimizes (1)
for T [j, x′ ], then make a′ ∈ S ′ , and continue the same reasoning.
We next give the relation to Ordered Diverse Knapsack.
Lemma 2. Let S be a cost-minimal solution to Ordered Diverse Knapsack
~ , A, u, c) where V
~ = (v1 , . . . , vn ) is ordered and let x = uOrd (S). Then T [n, x] ≤ c(S).
on (V
Proof. Assume S = {s1 , . . . , sℓ } being enumerated. Let πS,V~ be an connected assignment
P
such that vi ∈V ui (πS,V~ (i)) = x. Let 0 = i0 < i1 < . . . < iℓ = n be such that [ij + 1, ij+1 ] =
P ij
ui (πS,V~ (i)), for j ∈ [ℓ. By our definition of T , we have
π −1~ (sj+1 ). Moreover, let xj := i=1
S,V
that T [i1 , x1 ] ≤ c(s1 ). Moreover, we have T [i2 , x2 ] ≤ T [i1 , x1 ] + c(s2 ). It follows inductively
that T [iℓ , xℓ ] ≤ c(S).
We have all ingredients at hand to prove our main results.
Proposition 1. Diverse Knapsack is solvable in polynomial time when utility profiles
are single-crossing and encoded in unary.
~ is a single-crossing ordering on the voters V , then there is an S ⊆ A that forms
Proof. If V
a cost-minimal solution for Ordered Diverse Knapsack and for Diverse Knapsack.
By Lemmas 1 and 2 we are guaranteed that our algorithm will find it.
Further, we can use our tools to obtain an FPT algorithm (with respect to the number
of voters) for unrestricted domains.
Theorem 5. Diverse Knapsack is in FPT when parameterized by the number of voters
when the utilities are unary-encoded.
~ on the voters such that there
Proof. By Observation 1, we know that there is an ordering V
is an S ⊆ A that forms a cost-minimal solution for Ordered Diverse Knapsack and
~ our dynamic
for Diverse Knapsack. Together with Lemmas 1 and 2 we obtain that for V
program will find such S. Hence, for each ordering on the voters in V , we compute T [n, x].
Then, we take the minimum over all observed values. Note that x is the largest value such
that T [n, x] ≤ B for some ordering on the voters in V . Altogether, this yields a running
time of O(n! poly(û + n + m)) ⊆ O(2n log n poly(û + n + m)).
Finally, we complement Theorem 5 by proving a lower bound on the running time,
assuming ETH.
Proposition 2. Diverse Knapsack with binary utilities and unary costs is W[2]-hard
when parameterized by the budget B and, unless the ETH breaks, there is no 2o(n+m) ·
poly(n + m) algorithm.
11
Proof. We give a many-one reduction from Dominating Set. An instance of dominating
set consists of a graph G = (W, E) and an integer k; the question is whether there exists
a subset S of at most k vertices such that for each vertex w ∈ W there is an s ∈ S such
that w ∈ NG [s], where NG [s] = {v ∈ W | {v, s} ∈ E} ∪ {s} denotes the closed neighborhood
of s in G. For each vertex w ∈ W , we introduce a voter vw to V and an item aw to A of cost
one. We set uvw (aw′ ) = 1, if w′ ∈ NG [w], and uvw (aw′ ) = 0, otherwise. Furthermore, we set
the budget B = k. It is not difficult to see that there is a diverse knapsack S with c(S) ≤ B
and uDiv (S) ≥ n if and only if (G, k) is a yes-instance. As B = k and |V | = |A| = n, the
lower bounds follow.
4.3
Fair Knapsack
Let us now turn to the problem of computing a fair knapsack. We first prove that the problem is NP-hard, even for restricted cases, and then we study its parameterized complexity.
Theorem 6. Fair Knapsack is NP-hard, even
(1) for one voter;
(2) for two voters and when all costs are equal to one;
(3) if all utilities are in {0, 1} and all costs are equal to one.
Proof. (1): We provide a many-one reduction from the Partition problem [27]: Given a
set S = {s1 , . . . , sn } of nPpositive integers,
the question is to decide whether there exists a
P
subset S ′ ⊆ S such that s∈S ′ s = 21 s∈S s. Given an instance (S) of Partition where all
integers
P are divisible by two, we construct an instance of Fair Knapsack as follows. Let
T := s∈S s. For each si ∈ S, we introduce an item ai with cost si . Further, we introduce
one voter v1 with utility u1 (ai ) = si for each i ∈ [n]. We set the budget B = T /2, and we
ask if there exists a knapsack with a Nash welfare W of at least T /2 + 1.
Let (S) be a yes-instance and let S ′ ⊆ S be P
a solution. Then,
P the subset of items
′
′
A := {ai ∈ A | si ∈ S } forms aPfair knapsack, as P
s∈S ′ s = T /2 ≤ B, and
a∈A′ c(a) =
the Nash welfare is at least 1 + a∈A′ (u1 (a)) = 1 + s∈S ′ s = T /2 + 1
Conversely, let the constructed instance of Fair Knapsack be a yes-instance, and
′
let A′ ⊆ A be a fair knapsack. Denote
to
P
P subset of integers in S corresponding
P by S the
′
s
=
Moreover,
1
+
the P
items in A . Then it holds that s∈S ′ s = a∈A′ c(a) ≤ T /2.
′
s∈S
P
1 + a∈A′ (u1 (a)) ≥ T /2 + 1. Together, both inequalities yield s∈S ′ = T /2, and hence S ′
forms a solution to (S).
(2): We provide a many-one reduction from the Exact Partition problem: Given a
set S = {s1 , . . . , sn } of n positive integers
k ≥ 1, decide whether there is
Pand an integer
1P
′
′
a subset S ⊆ S with |S | = k such that s∈S ′ s = 2 s∈S s. Given an instance (S, k) of
Exact Partition where all integers are divisible by two and byP
k, we construct an instance
of Fair Knapsack as follows. Similarly as before we set T := s∈S s. For each si ∈ S, we
introduce an item ai with cost 1. Further, we introduce two voters, v1 and v2 , with utility
12
functions u1 (ai ) = T + si and u2 (ai ) = T + Tk − si , respectively. We set the budget B = k
and ask for a knapsack with a Nash welfare W at least equal to (1 + kT + T /2)2 .
Let (S, k) be a yes-instance and let S ′ ⊆ S be a solution. We claim that the subset ofPitems A′ := {ai ∈ A | si ∈ S ′ } forms an appropriate fair knapsack. It holds
that a∈A′ c(a) = |S ′ | = k ≤ B. The Nash welfare is at least
!
!
X
X
1+
u1 (a) · 1 +
u2 (a) =
a∈A′
1 + kT +
a∈A′
X
s∈S ′
s
!
·
1 + kT +
X T
s∈S ′
(1 + kT + T /2) 1 + kT + T −
X
s∈S ′
s
k
!
−s
!
=
= (1 + kT + T /2)2 .
Conversely, let the constructed instance of Fair Knapsack be a yes-instance, and
let A′ ⊆ A be a corresponding fair knapsack. Let S ′ denote P
the subset of integers in S
corresponding to the items in A′ . Then it holds that |S ′ | = a∈A′ c(a) ≤Pk. Moreover,
for each item a ∈ A it holds that u1 (a) + u2P
(a) = 2T + T /k, and
P hence a∈A′ (u1 (a) +
u2P
(a)) = |A′ |(2T P
+ T /k). The product (1P+ a∈A′ u1 (a)) · (1 + a∈A
′ u2 (a)) is maximal
T
. Together, it follows
if a∈A′ u1 (a) = a∈A′ u2 (a), leading to a∈A′ u1 (a) = |A′ | T + 2k
′
′
that |A | = k, and hence S forms a solution for (S, k).
(3): We provide a many-one reduction from the Exact Regular Set Packing (ERSP)
problem (there is a straight-forward parameterized reduction from Exact Regular Independent Set [2]): Given a set X, set F = {F1 , . . . , Fm } of subsets of X with |Fi | = d
for all i ∈ [m], and an integer k ≥ 1, decide whether there exists a subset F ′ ⊆ F
with |F ′ | = k such that for each distinct F, F ′ ∈ F it holds F ∩ F ′ = ∅. Let
(X = {x1 , . . . , xn }, F = {F1 , . . . , Fm }, k) be an instance of ERSP where |Fi | = d for all
i ∈ [m]. We construct an instance of Fair Knapsack as follows. Let A := {ai | Fi ∈ F} be
the set of items each with cost equal to one. Further, we introduce n voters with ui (aj ) = 1
if xi ∈ Fj , and ui (aj ) = 0 otherwise, for all i ∈ [n], j ∈ [m]. We set B = k and the desired
Nash welfare to W = 2dk . This finishes the construction.
Assume that (X, F, k) admits a solution F ′ . We claim that A′ := {ai ∈ A | Fi ∈ F ′ }
is a fair knapsack with the desired value of the Nash welfare (note that |A′ | = k). By the
construction, each item a ∈ A contributes one to exactly d voters. Moreover, each distinct
a, a′ ∈ A′ contribute to disjoint sets of voters. Hence,
!
Y
X
1+
ui (a) = 2dk .
1≤i≤n
a∈A′
Conversely, let A′ ⊆ A be a fair knapsack, and let F ′ P
= {Fi ∈P
F | ai ∈ A′ }. We claim
that F ′ forms a solution to (X, F, k). First, observe that 1≤i≤n a∈A′ ui (a) = |A′ |d. Let
13
M := {i ∈ [n] | xi ∈
Then
S
Y
i∈M
F ′ } be the set of elements covered by F ′ . Note that 1 ≤ |M | ≤ |A′ |·d.
1+
X
a∈A′
!
ui (a)
≤
|A′ |d
1+
|M |
|M |
′
≤ 2|A |d ≤ 2kd .
For the second inequality, observe that the function (1 + y/x)x is increasing on the interval
(0, y] for every y > 0. Hence, we have that |A′ | = k and |M | = k · d. Thus, F ′ is a set of
exactly k pairwise disjoint sets.
Given that Exact Regular Set Packing (ERSP) is W[1]-hard with respect to the
size of the solution [2], the proof of Theorem 6 (3) implies the following.
Corollary 1. Fair Knapsack is W[1]-hard when parameterized by the budget, even if all
utilities are in {0, 1} and all costs are equal to one.
Using a more clever construction, we can show that for the combination of the two
parameters—the number of voters and the budget—we still get fixed-parameter intractability.
Theorem 7. Fair Knapsack is W[1]-hard when parameterized by the number of voters
and the budget, even if the utilities and the budget are represented in unary encoding and
the costs of all items are equal to one.
Proof. We provide a parameterized reduction from the k-Multicolored Clique problem, which is known to be W[1]-hard with respect to the number of colors [22]. Let I be
an instance of k-Multicolored Clique. In I we are given a graph G with the set of
vertices V (G) and the set of edges E(G), a natural number k ∈ N, and a coloring function
f : V (G) → [k] that assigns one of k colors to each vertex. We ask if G contains k pairwise
connected vertices, each having a different color. Without loss of generality we assume
that k ≥ 2.
From I we construct an instance IF of Fair Knapsack as follows (we refer to Figure 1
for an illustration). Let T = |V (G)|. We set the set of items to V (G) ∪ E(G), that is we
associate one item with each vertex and with each edge. We construct the set of voters as
follows (unless specified otherwise, by default we assume that a voter assigns utility of zero
to an item):
(1) For each color we introduce one voter who assigns utility of T to each vertex with this
color. Clearly, there are k such voters.
(2) For each pair of two different colors we introduce k − 2 voters, each assigning utility of
T to each edge that connects two vertices with these two colors. There are (k − 2) k2
such voters.
14
, V (G)
n11 · · ·
v1
(1)
T
···
n1i · · ·
n1ℓ
···
T
T
v2
n2j · · ·
n2ℓ · · · · · · {n1i , n2j } · · ·
0
···
T
0
..
.
n21 · · ·
, E(G)
···
T
T
0
···
0
1
v{1,2}
T
..
.
T
..
.
(2)
k−2
v{1,2}
0
..
.
..
.
a
v(1,2)
b
v(1,2)
(3)
0
0
1
···
T − 1 ···
i
···
T − i ···
a
v(2,1)
0
b
v(2,1)
0
ℓ
0
T −i
T −ℓ
0
i
···
1
T − 1 ···
..
.
j
···
T − j ···
ℓ
0
T −j
T −ℓ
0
j
0
Figure 1: Illustration of the instance obtained in the proof of Theorem 7. Herein, ncb denotes
vertex b in color class c, where each color class contains ℓ vertices. In the presented example, the
vertices n1i and n2j are adjacent. Blocks containing a zero indicate that the corresponding entries
are zero.
(3) For each ordered pair of colors, c1 and c2 , with c1 6= c2 we introduce two vertices, call
them a and b, with the following utilities. Consider the set of vertices with color c1 and
rename them in an arbitrary way so that they can be put in a sequence n1 , n2 , . . . , nℓ .
For each i ∈ [ℓ] voter a assigns utility i to vertex ni and utility (T − i) to each edge
that connects ni with a vertex with color c2 . Voter b assigns utility (T − i) to ni and
utility i to each edge that connects ni with a vertex with color c2 . There are 2k(k − 1)
such voters.
We set the cost of each item to one, and the total budget to B = k + k2 . By a simple
calculation one can check that the total number of voters is equal to k + (k − 2) · k2 +
2k(k − 1) = kB. This completes our construction.
First, observe that in total each item is assigned utility of kT from all the voters. Indeed,
each item corresponding to a vertex gets utility of T from exactly one voter from the first
group, and total utility of (k − 1) · T from 2(k − 1) voters from the third group. Similarly,
each item corresponding to an edge gets utility of T from k − 2 voters from the second
15
group, and total utility of 2 · T from four voters from the third group. Thus, independently
of how we select B items, the sum of the utilities they are assigned from the voters will
always be the same, that is BkT . Thus, clearly the Nash welfare would be maximized if
the total utility assigned to the selected items by each voter is the same, and equal to T .
Only in such case the Nash welfare would be equal to (T + 1)kB . We will show, however,
that each voter assigns to the set of B items utility
T if and only if k out of such items are
k
vertices with k different colors, the remaining 2 of such items are edges, and each selected
edge connects two selected vertices.
Indeed, it is easy to see that if the selected set of items has the structure as described
above, then each voter assigns to this set the utility of T . We will now prove the other
implication. Assume that for the set of B items S each voter assigns total utility of T . By
looking at the first group of voters, we infer that k items from S correspond to the vertices,
and that these k vertices have different colors. By looking at the second group of voters,
we infer that for each pair of two different colors, S contains exactly one edge connecting
vertices with such colors. Finally, by looking at the third group of voters we infer that each
edge from S that connects colors c1 and c2 is adjacent to the vertices from S with colors c1
and c2 . This completes the proof.
On the other hand, each instance I of Fair Knapsack with utilities represented in
unary encoding is solvable in O(|I|f (n) ) time (it is in XP when parameterized by n), where n
is the number of voters and f is some computable function only depending on n.
Theorem 8. For utilities represented in unary encoding, Fair Knapsack is in XP when
parameterized by the number of voters.
Proof. We provide an algorithm based on dynamic programing. We construct a table T
where for each sequence of n + 1 integers, z1 , z2 , . . . , zn , and i, entry T [z1 , z2 , . . . , zn , i]
represents the lowest possible value of the budget x such that there exists a knapsack S
with P
the following properties: (i) the total cost of all items in the knapsack is equal to x (i.e.,
x = a∈S c(a)), (ii) the last index of an P
item in the knapsack S is i (i.e., i = maxaj ∈S j),
and (iii) for each voter vj we have that a∈S uj (a) = zj . This table can be constructed
recursively:
T [z1 , z2 , . . . , zn , i] = c(ai ) + min T [z1 − u1 (ai ), z2 − u2 (ai ), . . . , zn − un (ai ), j].
j≤i
We handle the corner cases by setting T [0, 0, . . . , 0, i] = 0 for each i, and T [z1 , z2 , . . . , zn , i] =
∞ whenever zi < 0 for some i ∈ [n].
Clearly, if n is fixed and if the utilities are represented in unary encoding, then the table
can be filled in polynomial time. Now, it is sufficient
to traverse the table and to find the
Q
entry T [z1 , z2 , . . . , zn , i] ≤ B which maximizes nj=1 (zj + 1).
On the positive side, with stronger requirements on the voters’ utilities, that is, if the
number of different values over the utility functions is small, we can strengthen Theorem 8
and prove the membership in FPT.
16
Theorem 9. Fair Knapsack is FPT when parameterized by the combination of the number of voters and the number of different values that a utility function can take.
Proof. We will use the classic result of Lenstra [33] which says that an integer linear program
(ILP) can be solved in FPT time with respect to the number of integer variables. We will
also use a recent result of Bredereck et al. [7] who proved that one can apply concave/convex
transformations of certain variables in an ILP, and that such a modified program can be
still solved in an FPT time. We construct an ILP as follows. Let U be the set of values
that a utility function can take. For each vector z = (z1 , . . . , zn ) with zi ∈ U for each i, we
define Az as the set of items a such that for each voter vi we have ui (a) = zi . Intuitively, Az
describes a subcollection of the items with the same “type”: such items are indistinguishable
when we look only at the utilities assigned by the voters; they may vary only with their
costs. For each such a set Az we introduce an integer variable xz which intuitively denotes
the number of items from the optimal solution that belong to Az . Further, we construct a
function fz such that fz (x) is the cost of the x cheapest items from Az ; clearly fz is convex.
We formulate the following program:
maximize:
X
log
X
zi · xz
z∈U n
vi ∈V
subject to:
X
!
fz (xz ) ≤ B
z∈U n
xz ∈ Z,
z ∈ Un
The above program uses concave transformations (logarithms) for the maximized expression,
and convex transformations (functions fz ) in the left-hand sides of the constraints, so we
can use the result of Bredereck et al. [7] and claim that this program can be solved in an
FPT time with respect to the number of integer variables. This completes the proof.
4.4
Fair Knapsack under Restricted Domains
In contrast to Individually Best Knapsack and Diverse Knapsack, both being solvable in polynomial time on restricted domains, computing a fair knapsack remains NP-hard
on utility profiles that are even both, single-peaked and single-crossing.
Theorem 10. Fair Knapsack is NP-hard even on single-peaked single-crossing domains,
when the costs of all items are equal to one, and the utilities of each voter come from the
set {0, . . . 6}.
Proof. We give a many-one reduction from the NP-hard Exact-Set-Cover (X3C) problem: Given a universe U with 3k elements and a set F of 3-size subsets of U , the question
is to decide whether there exist exactly k subsets in F that cover U . Without loss of
generality, we can additionally assume that each element in U appears in exactly three
sets from F [27]. Given an instance (U = {e1 , . . . , en }, F = {F1 , . . . , Fm }) of X3C (note
17
a1 a2 · · · ai
x1
am a′m
···
a′i · · ·
6
···
a′2 a′1
0
6
x2
0
(i)
y1
6
(i)
y2
(ℓ)
z1
(ℓ)
z2
3
6
5
0
4
3
6
5
4
3
2
1
0
6
3
0
2
1
0
Figure 2: Visualization of the utilities of the voters used in the proof of Theorem 10. The solid lines
can be interpreted as plots depicting the utilities of the voters from different items. For instance,
agent x1 assigns utility of 0 to the items a1 , . . . am , and utility of 6 to the items am+1 , . . . a2m (note
(ℓ)
(ℓ)
that a′j = a2m−j+1 ). Agents z1 and z2 depicted in the figure correspond to the element eℓ such
that eℓ ∈ F2 ∩ Fi ∩ Fm .
that n = m = 3k), we compute an instance of the problem of computing a fair knapsack as
follows (the utilities of the voters are depicted in Figure 2).
First, for each i ∈ [m], we introduce two items, ai and a2m−i , that correspond to set Fi ,
each with the cost of one. Further, we introduce three different types of voters:
(1) We add two voters x1 and x2 with ux1 (ai ) = ux1 (am+i ) − 6 = 0 and ux2 (am+i ) =
ux2 (ai ) − 6 = 0 for all i ∈ [m].
(i)
(i)
(2) For each i ∈ [m], we add two voters y1 and y2 with
0,
uy(i) (aj ) = 3,
1
6,
1 ≤ j ≤ i,
i < j < 2m − i + 1,
2m − i + 1 ≤ j ≤ 2m,
and uy(i) (aj ) = uy(i) (a2m−j+1 ).
2
1
(i)
(i)
(3) For each i ∈ [n], we add two voters z1 and z2 with uz (i) (aj ) = fi (aj ) and uz (i) (aj ) =
1
uz (i) (a2m−j+1 ), where
2
1
fi (aj ) = |{ℓ | 1 ≤ ℓ ≤ j, ei ∈ Fℓ }|,
for j ∈ [m],
fi (a2m−j+1 ) = 3 + |{ℓ | j ≤ ℓ ≤ m, ei ∈ Fℓ }|,
for j ∈ [m].
18
We set the budget to B = 2k and the required Nash welfare to W = (6k + 1)2+2m (6k + 2)2n .
It is apparent that with the order (a1 , . . . , a2m ), this is profile is single-peaked. For single(i)
(i)
crossingness, note that the utilities of agents xi , yj , zj ′ are increasing over (a1 , . . . , a2m )
if i = 1, and decreasing, if i = 2. Hence, the order of voters
(1)
(1)
(2)
(2)
(1)
(1)
(2)
(2)
(x1 , y1 , . . . , ym
, z1 , . . . , zm
, x2 , y 1 , . . . , y m
, z1 , . . . , zm
)
witnesses single-crossingness.
We will prove that (U = {e1 , . . . , e3k }, F = {F1 , . . . , Fm }) is a yes-instance for X3C if
and only if the constructed instance of Fair Knapsack is a yes-instance.
(⇒) Let F ′ = {Fb1 , . . . , Fbk } ⊆ F be an exact cover of U . We claim that S =
{abi , a2m−bi +1 | i ∈ [k]} is a fair knapsack. First observe that c(S) = 2k ≤ B. We
consider the welfare for each of P
the three typesP
(1)-(3) of voters separately.
For x1 and x2 (1), we have a∈S ux1 (a) = a∈S ux2 (a) = 6k.
(i)
Next, consider the voters of type (2). Consider y1 , i ∈ [m]:
k
X
[uy(i) (abj ) + uy(i) (a2m−bj +1 )] =
j=1
1
1
=
X
[uy(i) (abj ) + uy(i) (a2m−bj +1 )] +
1
1
1≤bj ≤i
X
[uy(i) (abj ) + uy(i) (a2m−bj +1 )]
i<bj ≤m
1
1
= {j | 1 ≤ bj ≤ i} · (0 + 6) + {j | i < bj ≤ m} · (3 + 3) = 6k.
By symmetry,
Pk
j=1 [uy (i) (abj )
2
+ uy(i) (a2m−bj +1 )] = 6k.
2
(i)
Finally, consider the voters of type (3). Consider a voter z1 , i ∈ [m]. Let j ∗ be the
index such that ei ∈ Fbj∗ (recall exact cover). We have
X
a∈S
uz (i) (a) =
1
k
X
[fi (abj ) + fi (a2m−bj +1 )]
j=1
= fi (abj∗ ) + fi (a2m−bj∗ +1 ) +
X
[fi (abj ) + fi (a2m−bj +1 )]
j∈[k]\{j ∗ }
X
=6+1+
j∈[k]\{j ∗ }
X
=6+1+
|{ℓ | 1 ≤ ℓ ≤ bj , ei ∈ Fℓ }| + 3 + |{ℓ | bj ≤ ℓ ≤ m, ei ∈ Fℓ }|
(|{ℓ | 1 ≤ ℓ ≤ m, ei ∈ Fℓ }| + 3) +
j∈[k]\{j ∗ }
X
=6+1+
j∈[k]\{j ∗ }
By symmetry,
P
a∈S
X
j∈[k]\{j ∗ }
6+
X
0 = 6k + 1
j∈[k]\{j ∗ }
uz (i) (a) = 6k + 1.
2
19
{ei } ∩ Fbj
Hence, we get in total that the Nash welfare is equal to
(1 + 6k)2 (1 + 6k)2m (2 + 6k)2n = W .
(⇐) Let S ⊆ {a1 , . . . , a2m } be a fair knapsack with c(S) ≤ 2k and with the Nash welfare
at least equal to W . We will now show that the total utility that all voters assign to each
item aj ∈ A is equal to 6 + 6m + 6n + 3. Indeed, the two voters from (1) assign to aj
(i)
(i)
the total utility of 6. Similarly, any pair of voters, y1 and y2 , assigns utility of 6 to aj .
(i)
(i)
Finally, observe that, whenever ei ∈ Fj , then voters z1 and z2 assign utility of 7 to aj ;
otherwise they assign utility of 6 to aj . Since each set Fj contains exactly 3 elements, we
get that aj gets total utility of (n − 3)6 + 3 · 7 from the voters from (3).
Hence, 2k items contribute 2k(6 + 6m + 6n + 3) to the total utility, and so, for the Nash
welfare to be equal to W , this total utility must be distributed as equally as possible among
the voters. Specifically, 2m + 2 voters need to get the total utility of 6k, and 2n voters must
get the total utility of 6k + 1.
Now, we claim that for each i ∈ [m], ai ∈ S ⇐⇒ a2m−i+1 ∈ S. Suppose this is not
the case, and let i ∈ [m] be the smallest index such that either (i) ai ∈ S ∧ a2m−i+1 6∈ S
or (ii) ai 6∈ S ∧ a2m−i+1 ∈ S. Consider the first case (i). Let k1 = |{1 ≤ j ≤ i | aj ∈ S}|
and k2 = |{2m − i + 1 ≤ j ≤ 2m | aj ∈ S}|. It holds that k1 ≥ k2 + 1, and it follows for
(i)
voter y2 that
X
uy(i) (aj ) = k1 6 + (2k − (k1 + k2 )) · 3 + k2 · 0
aj ∈S
2
= 3(2k + (k1 − k2 )) ≥ 6k + 3 ∈
/ {6k, 6k + 1}.
Case P(ii) works analogously, and hence, our claim follows. P
From this we infer
that a∈S uy(ℓ) (a) = 6k for each i ∈ {1, 2} and ℓ ∈ [m], and that a∈S uxi (a) = 6k for
i
P
each i ∈ {1, 2}. Thus, for each voter z from (3) it must be the case that a∈S uz (a) = 6k+1.
Finally, we will prove that F ′ = {Fb1 , . . . , Fbk } = {Fi ∈ F | ai ∈ S, i ∈ [m]} forms a
cover of U . Towards a contradiction suppose that there is an element ei ∈ U such that ei
(i)
is not covered by F ′ . We consider voter z1 . Observe that since ei 6∈ Fbj for each j ∈ [k],
we have
X
X
6 = 6k < 6k + 1.
uz (i) (abj ) + uz (i) (a2m−bj +1 ) =
j∈[k]
1
1
j∈[k]
Thus, we reached a contradiction, and consequently we get that every element in U is
covered by F. This completes the proof.
As we discussed in Section 2, if the voters’ utilities come from the binary set {0, 1} and
if the costs of the items are equal to one, then the problem of computing a fair knapsack
is equivalent to computing winners according to Proportional Approval Voting. For this
case with single-peaked preferences, Peters [42] showed that the problem can be formulated
20
as an integer linear program with total unimodular constraints, and thus it is solvable in
polynomial time. This makes our result interesting, as it shows that by allowing slightly
more general utilities (coming from the set {0, . . . , 6}, instead of {0, 1}) the problem becomes
already NP-hard (even if we additionally assume single-crossingness of the preferences).
This draws quite an accurate line separating instances which are computationally easy
from those which are intractable.
5
Conclusion
In this paper we study three variants of the knapsack problem in multiagent settings. One of
these variants, selecting an individually best knapsack, has been considered in the literature
before, and this work introduces the other two concepts: diverse and fair knapsack. Our
paper establishes a relation between the multi-objective knapsack problem and a broad
literature including a literature on multiwinner voting and on fair allocation. This way,
we expose a variety of ways in which the preferences of the voters can be aggregated in
a number of real-life scenarios that are captured by the abstract model of the multiagent
knapsack.
Our computational results are outlined in Table 1. In summary, our results show that
the problem of computing an individually-best or a diverse knapsack can be handled efficiently under some simplifying assumptions. On the other hand, we give multiple evidences
that computing a fair knapsack is a hard problem. Thus, this research provides theoretical
foundations motivating, and calls for, studying approximation and heuristic algorithms for
the problem of computing a fair knapsack.
References
[1] K. Arrow. Social Choice and Individual Values. John Wiley and Sons, 1951 (revised
editon, 1963).
[2] G. Ausiello, A. D’Atri, and M. Protasi. Structure preserving reductions among convex
optimization problems. Journal of Computer and System Sciences, 21:136–153, 1980.
[3] N. Benabbou and P. Perny. Solving multi-agent knapsack problems using incremental
approval voting. In Proceedings of the 22nd European Conference on Artificial Intelligence, pages 1318–1326, 2016.
[4] G. Benade, S. Nath, A. Procaccia, and N. Shah. Preference elicitation for participatory
budgeting. In Proceedings of the 31st AAAI Conference on Artificial Intelligence, pages
376–382, 2017.
[5] N. Betzler, A. Slinko, and J. Uhlmann. On the computation of fully proportional
representation. Journal of Artificial Intelligence Research, 47:475–519, 2013.
21
[6] D. Black. On the rationale of group decision-making. Journal of Political Economy,
56(1):23–34, 1948.
[7] R. Bredereck, P. Faliszewski, R. Niedermeier, P. Skowron, and N. Talmon. Mixed integer programming with convex/concave constraints: Fixed-parameter tractability and
applications to multicovering and voting. Technical Report arXiv:1709.02850 [cs.DS],
arXiv.org, 2017.
[8] J. Byrka, T. Pensyl, B. Rybicki, J. Spoerhase, A. Srinivasan, and K. Trinh. An improved approximation algorithm for knapsack median using sparsification. In Proceedings of 23rd Annual European Symposium on Algorithms (ESA-2015), pages 275–287,
2015.
[9] Y. Cabannes. Participatory budgeting: a significant contribution to participatory
democracy. Environment and Urbanization, 16(1):27–46, 2004.
[10] I. Caragiannis, D. Kurokawa, H. Moulin, A. Procaccia, N. Shah, and J. Wang. The
unreasonable fairness of maximum nash welfare. In Proceedings of the 2016 ACM
Conference on Economics and Computation (EC-16), pages 305–322.
[11] B. Chamberlin and P. Courant. Representative deliberations and representative decisions: Proportional representation and the Borda rule. American Political Science
Review, 77(3):718–733, 1983.
[12] V. Conitzer, R. Freeman, and N. Shah. Fair public decision making. In Proceedings of
the 2017 ACM Conference on Economics and Computation (EC-17), pages 629–646,
2017.
[13] M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk,
M. Pilipczuk, and S. Saurabh. Parameterized Algorithms. Springer, 2015.
[14] A. Darmann and J. Schauer. Maximizing nash product social welfare in allocating
indivisible goods. European Journal of Operational Research, 247(2):548–559, 2015.
[15] R. Downey and M. Fellows. Fundamentals of Parameterized Complexity. Texts in
Computer Science. Springer, 2013.
[16] E. Elkind and M. Lackner. Structure in dichotomous preferences. In Proceedings of the
24th International Joint Conference on Artificial Intelligence, pages 2019–2025, 2015.
[17] E. Elkind, M. Lackner, and D. Peters. Structured preferences. In U. Endriss, editor,
Trends in Computational Social Choice. AI Access, 2017.
[18] B. Fain, A. Goel, and K. Munagala. The core of the participatory budgeting problem.
In Proceedings of the 12th Conference on Web and Internet Economics, pages 384–399,
2016.
22
[19] P. Faliszewski, P. Skowron, A. Slinko, and N. Talmon. Multiwinner voting: A new
challenge for social choice theory. In U. Endriss, editor, Trends in Computational
Social Choice. AI Access, 2017.
[20] P. Faliszewski, P. Skowron, A. Slinko, and N. Talmon. Multiwinner rules on paths from
k-Borda to Chamberlin–Courant. pages 192–198, 2017.
[21] F. Zanjirani Farahani and M. Hekmatfar, editors. Facility Location: Concepts, Models,
and Case Studies. Springer, 2009.
[22] M. Fellows, D. Hermelin, F. Rosamond, and S. Vialette. On the parameterized complexity of multiple-interval graph problems. Theoretical Computer Science, 410(1):
53–61, 2009.
[23] K. Florios, G. Mavrotas, and D. Diakoulaki. Solving multiobjective, multiconstraint
knapsack problems using mathematical programming and evolutionary algorithms. European Journal of Operational Research, 203(1):14–21, 2010.
[24] J. Flum and M. Grohe. Parameterized Complexity Theory. Springer-Verlag, 2006.
[25] R. Freeman, S. Zahedi, and V. Conitzer. Fair and efficient social choice in dynamic
settings. pages 4580–4587, 2017.
[26] A. Fréville. The multidimensional 0–1 knapsack problem: An overview. European
Journal of Operational Research, 155(1):1–21, 2004.
[27] M. Garey and D. Johnson. Computers and Intractability: A Guide to the Theory of
NP-Completeness. W. H. Freeman and Company, 1979.
[28] A. Goel, A. Krishnaswamy, S. Sakshuwong, and T. Aitamurto. Knapsack voting:
Voting mechanisms for participatory budgeting. Manuscript, 2016.
[29] Frank Kelly. Charging and rate control for elastic traffic. European Transactions on
Telecommunications, 8:33–37, 1997.
[30] A. Kulik, H. Shachnai, and T. Tamir. Approximations for monotone and nonmonotone submodular maximization with knapsack constraints. Mathematics of Operations
Research, 38(4):729–739, 2013.
[31] M. Lackner and P. Skowron. Consistent approval-based multi-winner rules. Technical
Report arXiv:1704.02453v1 [cs.GT], arXiv.org, April 2017.
[32] J. Lee, V. Mirrokni, V. Nagarajan, and M. Sviridenko. Non-monotone submodular
maximization under matroid and knapsack constraints. In Proceedings of the Fortyfirst Annual ACM Symposium on Theory of Computing (STOC-2009), pages 323–332,
2009.
23
[33] H. Lenstra, Jr. Integer programming with a fixed number of variables. Mathematics
of Operations Research, 8(4):538–548, 1983.
[34] T. Lu and C. Boutilier. Budgeted social choice: From consensus to personalized decision making. In Proceedings of the 22nd International Joint Conference on Artificial
Intelligence, pages 280–286, 2011.
[35] T. Lust and J. Teghem. The multiobjective multidimensional knapsack problem: a
survey and a new approach. International Transactions in Operational Research, 19
(4):495–520, 2012.
[36] J. Mirrlees. An exploration in the theory of optimal income taxation. Review of
Economic Studies, 38:175–208, 1971.
[37] B. Monroe. Fully proportional representation. American Political Science Review, 89
(4):925–940, 1995.
[38] H. Moulin. Fair division and collective welfare. The MIT Press, 2003.
[39] J. Nash. The bargaining problem. Econometrica, 18(2):155–162, 1950.
[40] T. Nguyen, M. Roos, and J. Rothe. A survey of approximability and inapproximability
results for social welfare optimization in multiagent resource allocation. Annals of
Mathematics and Artificial Intelligence, 68(1-3):65–90, 2013.
[41] R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University Press,
2006.
[42] D. Peters. Single-peakedness and total unimodularity: Efficiently solve voting problems
without even trying. Technical Report 1609.03537, arXiv.org, 2017.
[43] D. Peters and M. Lackner. Preferences single-peaked on a circle. In Proceedings of the
31st AAAI Conference on Artificial Intelligence, pages 649–655, 2017.
[44] A. Procaccia, J. Rosenschein, and A. Zohar. On the complexity of achieving proportional representation. Social Choice and Welfare, 30(3):353–362, 2008.
[45] J. Puchinger, G. Raidl, and U. Pferschy. The multidimensional knapsack problem:
Structure and algorithms. INFORMS Journal on Computing, 22(2):250–265, 2010.
[46] S. Ramezani and U. Endriss. Nash Social Welfare in Multiagent Resource Allocation,
pages 117–131. Springer Berlin Heidelberg, 2010.
[47] K. W. S. Roberts. Voting over income tax schedules. Journal of Public Economics, 8
(3):329–340, 1977.
24
[48] P. Skowron and P. Faliszewski. Fully proportional representation with approval ballots:
Approximating the MaxCover problem with bounded frequencies in FPT time. In
Proceedings of the 29th AAAI Conference on Artificial Intelligence, pages 2124–2130,
2015.
[49] P. Skowron, P. Faliszewski, and J. Lang. Finding a collective set of items: From
proportional multirepresentation to group recommendation. In Proceedings of the 29th
AAAI Conference on Artificial Intelligence, 2015.
[50] P. Skowron, P. Faliszewski, and A. Slinko. Achieving fully proportional representation:
Approximability result. Artificial Intelligence, 222:67–103, 2015.
[51] P. Skowron, L. Yu, P. Faliszewski, and E. Elkind. The complexity of fully proportional
representation for single-crossing electorates. Theoretical Computer Science, 569:43–57,
2015.
[52] P. Skowron, P. Faliszewski, and J. Lang. Finding a collective set of items: From
proportional multirepresentation to group recommendation. Artificial Intelligence, 241:
191–216, 2016.
[53] M. Sviridenko. A note on maximizing a submodular set function subject to a knapsack
constraint. Operations Research Letters, 32(1):41–43, 2004.
[54] T. N. Thiele. Om flerfoldsvalg. In Oversigt over det Kongelige Danske Videnskabernes
Selskabs Forhandlinger, pages 415–441. 1895.
[55] L. Yu, H. Chan, and E. Elkind. Multiwinner elections under preferences that are
single-peaked on a tree. In Proceedings of the 23rd International Joint Conference on
Artificial Intelligence, pages 425–431, 2013.
25
| 8cs.DS
|
AN INFORMAL OVERVIEW OF TRIPLES AND SYSTEMS
arXiv:1709.03174v3 [math.AC] 14 Nov 2017
LOUIS ROWEN
Abstract. We describe triples and systems, expounded as an axiomatic algebraic umbrella theory for
classical algebra, tropical algebra, hyperfields, and fuzzy rings.
1. Introduction
The goal of this overview is to present an axiomatic algebraic theory which unifies, simplifies, and
“explains” aspects of tropical algebra [28, 34, 35, 32], hyperfields [5, 21, 41, 61], and fuzzy rings [16, 17, 21]
in terms of familiar algebraic concepts. It was motivated by an attempt to understand whether or not it
is coincidental that basic algebraic theorems are mirrored in supertropical algebra, and was spurred by
the realization that some of the same results are obtained in parallel research on hyperfields and fuzzy
rings. Our objective is to hone in on the precise axioms that include these various examples, formulate
the axiomatic structure, describe its uses, and review five papers [58, 4, 45, 46, 44] in which the theory
is developed. The bulk of this survey concerns [58], in which the axiomatic framework is laid out, since
the other papers build on it.
Other treatments can be found in [13, 23, 49]. Although we deal with general categorical issues,
ours is largely a “hands on” approach, emphasizing a “negation map” which exists in all of the abovementioned examples, and which often is obtained by means of a “symmetrization” functor. Although
the investigation has centered on semirings, having grown out of tropical considerations, it also could be
used to develop a parallel Lie semi-algebra theory (and more generally Hopf semi-algebra theory).
1.1. Acquaintance with basic notions.
One starts with a set T that we want to study, called the set of tangible elements, endowed with a
partial additive algebraic structure which however is not defined on all of T ; this is resolved by embedding
T in a larger set A with a fuller algebraic structure. Often T is a multiplicative monoid 1, a situation
developed by Lorscheid [49, 50] when A is a semiring. However, there also are examples (such as Lie
algebras) lacking associative multiplication. We usually denote a typical element of T as a, and a typical
element of A as b.
Definition 1.1. A T -module over a set T 2 is an additive monoid (A, +, 0A ) together with scalar
multiplication T × A → A satisfying distributivity over T 3 in the sense that
a(b1 + b2 ) = ab1 + ab2
for a ∈ T , bi ∈ A, also stipulating that a0A = 0A .
A T -monoid module over a multiplicative monoid T is a T -module Asatisfying the extra conditions
1T b = b,
(a1 a2 )b = a1 ,
∀ai ∈ T , b ∈ A.
Date: November 15, 2017.
2010 Mathematics Subject Classification. Primary 08A05, 16Y60, 12K10, 13C60, 20N20; Secondary 03C05, 06F05,
13C10, 14T05.
Key words and phrases. bipotent, category, congruence, dual basis, homology, hyperfield, linear algebra, matrix, metatangible, morphism, negation map, module, polynomial, prime, projective, tensor product, semifield, semigroup, semiring,
split, supertropical algebra, superalgebra, surpassing relation, symmetrization, system, triple, tropical.
File name: InformalOverview29.
1Geometry over monoids has been a subject of recent interest, cf. [14].
2More generally, when T is not a monoid, Hopf theory can play an interesting role examined in [46].
3It turns out that distributivity over elements of T is enough to run the theory, since one can (re)define multiplication
on A to make it distributive, as seen in [58, Theorem 2.9]. This rather easy result applies for instance to hyperfields such
as the phase hyperfield.
1
2
L. ROWEN
For the sake of this exposition, we assume that A is a T -module and T ⊆ A. Next, we introduce a
formal negation map (−), which we describe in §1.3 after some introductory examples, such that T ∪(−)T
generates A additively, creating a T -triple (A, T , (−)).
When a formal negation map is not available at the outset, we can introduce it in two ways, to be
elaborated shortly:
• Declare the negation map to be the identity, as in the supertropical case, cf. §1.2.2.
• Apply symmetrization, to get the switch map, of second kind, cf. §1.2.4. Often [3] is applicable,
where T could take the role of the “thin elements.”
The element b◦ := b(−)b is called a quasi-zero. We write A◦ for {b◦ : b ∈ A}, and usually require
that T ∩ A◦ = ∅, i.e., a quasi-zero cannot be tangible.
In classical algebra, the only quasi-zero is 0 itself, and a1 − a1 = 0 = a2 − a2 for all a1 , a2 . Accordingly,
we call a triple “T -classical” [58, Definition 2.45], when a1 (−)a1 = a2 (−)a2 for some a1 6= (±)a2 in T .
Examples from classical mathematics might provide some general intuition about employing A to
study T . A rather trivial example: T is the multiplicative subgroup of a field A. Or A could be a graded
associative algebra, with T its multiplicative submonoid of homogeneous elements. A deeper example
tied to Gröbner-Shirshov bases is given in [45, Example 2.2].
But we are more interested in the non-classical situation, involving semirings which are not rings.
Some motivating examples: The supertropical semiring, where T is the set of tangible elements, the
symmetrized semiring, and the power set of a hyperfield, where T is the hyperfield itself. Since hyperfields
are so varied, they provide a good test for this theory. Semirings in general, without negation maps, are
too broad to yield as decisive results as we would like, which is the reason that negation maps and triples
are introduced in the first place.
Since we need to correlate two structures (T and A), as well as the negation map (which could be
viewed as a unary operator), it is convenient to work in the context of universal algebra, which was
designed precisely for the purpose of discussing diverse structures together. (More recently these have
been generalized to Lawvere theories and operads, but we do not delve into these aspects.)
To round things out, given a triple, we introduce a surpassing relation , to replace equality in
our theorems. (In classical mathematics, is just equality.) The quadruple (A, T , (−), ) is called a
T -system.
1.2. Motivating examples.
A semiring† satisfies all the axioms of ring except the existence of a 0 element and of negatives. A
semiring is a semiring† with 0. We elaborate the main non-classical examples motivating this theory.
1.2.1. Idempotent semirings.
Tropical geometry has assumed a prominent position in mathematics because of its ability to simplify algebraic geometry while not changing certain invariants (often involving intersection numbers
of varieties), thereby simplifying difficult computations. Outstanding applications abound, including
[1, 26, 39, 53, 56].
The main original idea, as expounded in [27, 51], was to take the limit of the logarithm of the absolute
values of the coordinates of an affine variety as the base of the logarithm goes to ∞. The underlying
algebraic structure reverted from C to the max-plus algebra Rmax , an ordered multiplicative monoid in
which one defines a + b to be max{a, b}. This is a semiring† and is clearly additively bipotent in the
sense that a + b ∈ {a, b}. Such algebras have been studied extensively some time ago, cf. [12, 20].
Definition 1.2. A semigroup (A, +) has characteristic k > 0 if (k + 1)a = a for all a ∈ A, with k ≥ 1
minimal. A has characteristic 0 if A does not have characteristic k for any k ≥ 1.
Idempotent (in particular bipotent) semirings have characteristic 1, and their geometry has been
studied intensively as “F1 -geometry,” cf. [9, 13]. But logarithms cannot be taken over the complex
numbers, and the algebraic structure of bipotent semirings is often without direct interpretation in tropical
geometry, so attention of tropicalists passed to the field of Puisseux series, which in characteristic 0 also is
an algebraically closed field, but now with a natural valuation, thereby making available tools of valuation
theory, cf. [8]. The collection [7] presents such a valuation theoretic approach. Thus one looks for an
alternative to the max-plus algebra.
AN INFORMAL OVERVIEW OF TRIPLES AND SYSTEMS
3
Properties of the characteristic are described in [58, §4.4]. Most of our major examples have characteristic 0, but some interesting examples have characteristic 2 or more.
1.2.2. Supertropical semirings.
Izhakian [28] overcame many of the structural deficiencies of a max-plus algebra T by adjoining an
extra copy of T , called the ghost copy G in [34, Definition 3.4], and modifying addition. More generally,
a supertropical semiring is a semiring with ghosts (R, G, ν) := T ∪ G, together with a projection
ν : R → G satisfying the extra properties:
(a) (ν-Bipotence) a + b ∈ {a, b}, ∀a, b ∈ R such that ν(a) 6= ν(b);
(b) (Supertropicality) a + b = ν(a) if
ν(a) = ν(b).
The supertropical semiring is standard if ν|T is 1:1.
Mysteriously, although lacking negation, the supertropical semiring provides affine geometry and linear
algebra quite parallel to the classical theory, by taking the negation map (−) to be the identity, where
the ghost ideal G takes the place of the 0 element. In every instance, the classical theorem involving
equality f = g is replaced by an assertion that f = g + ghost, called ghost surpassing. In particular
when g = 0 this means that f itself is a ghost.
For example, an irreducible affine variety should be the set of points which when evaluated at a given
set of polynomials is ghost (not necessarily 0), leading to:
• a version of the Nullstellensatz in [34, Theorem 7.17],
• a link between decomposition of affine varieties and (non-unique) factorization of polynomials,
illustrated in one indeterminate in [34, Remark 8.42 and Theorem 8.46],
• a version of the resultant of polynomials that can be computed by the classical Sylvester matrix
and [37, Theorem 4.12 and Theorem 4.19].
Matrix theory also can be developed along supertropical lines. The supertropical Cayley-Hamilton
theorem [35, Theorem 5.2] says that the characteristic polynomial evaluated on a matrix is a ghost. A
matrix is called singular when its permanent (the tropical replacement of determinant) is a ghost; in [35,
Theorem 6.5] the row rank, column rank, and submatrix rank of a matrix (in this sense) are seen to be
equal. Solution of tropical equations is given in [2, 3, 19, 36]. Supertropical singularity also gives rise to
semigroup versions of the classical algebraic group SL, as illustrated in [33], also cf. [46].
Valuation theory is handled in a series of papers starting with [29], also cf. [43], generalized further
in [30] and [31].
Note that supertropical semirings “almost” are bipotent, in the sense that a1 + a2 ∈ {a1 , a2 } for any
a1 6= a2 in T . This turns out to be an important feature in triples.
1.2.3. Hyperfields and other related constructions.
Another algebraic construction is hyperfields [61], which are multiplicative groups in which sets replace
elements when one takes sums. Hyperfields have received considerable attention recently [5, 25, 41] in
part because of their diversity, and in fact Viro’s “tropical hyperfield” matches Izhakian’s construction.
But there are important nontropical hyperfields (such as the hyperfield of signs, the phase hyperfield, and
the “triangle” hyperfield) whose theories we also want to understand along similar lines. In hyperfield
theory, one can replace “zero” by the property that a given set contains 0.
An intriguing phenomenon is that linear algebra over some classes of hyperfields follows classical lines
as in the supertropical case, but the hyperfield of signs provides easy counterexamples to others, as
discussed in [4].
1.2.4. Symmetrization.
This construction uses Gaubert’s “symmetrized algebras” [19, 55, 2, 20] (which he designed for linear
algebra) as a prototype. We start with T , take A = Tb := T × T , and define the “switch map” (−)
by (−)(a0 , a1 ) = (a1 , a0 ). The reader might already recognize this as the first step in constructing the
integers from the natural numbers, where one identifies (a0 , a1 ) with (a′0 , a′1 ) if a0 + a′1 = a′0 + a1 , but
the trick here is to recognize the equivalence relation without modding it out, since everything could
degenerate in the nonclassical applications. Equality (a0 , a1 ) = (b0 , b1 ) often is replaced by the assertion
4
L. ROWEN
(a0 , a1 ) = (b0 , b1 ) + (c, c) for some c ∈ T . The “symmetrized” T -module also can be viewed as a Tb -supermodule (i.e., 2-graded), via the twist action
(a0 , a1 ) ·tw (b0 , b1 ) = (a0 b0 + a1 b1 , a0 b1 + a1 b0 ),
(1.1)
utilized in [40] to define and study the prime spectrum.
1.2.5. Fuzzy rings.
Dress [16] introduced “fuzzy rings” a while ago in connection with matroids, and these also have been
seen recently to be related to hypergroups in [21].
1.3. Negation maps, triples, and systems.
These varied examples and their theories, which often mimic classical algebra, lead one to wonder
whether the parallels among them are happenstance, or whether there is some straightforward axiomatic
framework within which they can all be gathered and simplified. Unfortunately semirings may lack
negation, so we also implement a formal negation map (−) to serve as a partial replacement for negation.
Definition 1.3. A negation map on a T -module (A, ·, +) is a map (−) : (T , +) → (T , +) together
with a semigroup isomorphism
(−) : (A, +) → (A, +),
both of order ≤ 2, written a 7→ (−)a, satisfying
(−)(ab) = ((−)a)b = a((−)b),
∀a ∈ T , b ∈ A.
(1.2)
Obvious examples of negation maps are the identity map, which might seem trivial but in fact is the
one used in supertropical algebra, the switch map ((−)(a0 , a1 ) = (a1 , a0 )) in the symmetrized algebra,
the usual negation map (−)a = −a in classical algebra, and the hypernegation in the definition of
hypergroups. Accordingly, we say that the negation map (−) is of the first kind if (−)a = a for all
a ∈ T , and of the second kind if (−)a 6= a for all a ∈ T .
As indicated earlier, the quasi-zeros take the role customarily assigned to the zero element. In the
supertropical theory the quasi-zeros are the “ghost” elements. In [3, Definition 2.6] the quasi-zeros are
called “balanced elements” and have the form (a, a).
When 1 ∈ T , the element (−)1 determines the negation map, since (−)b = (−)(1b) = ((−)1)b. When
T ⊆ A, several important elements of A then are:
e = 1◦ = 1(−)1,
e′ = e + 1,
e◦ = e(−)e = e + e = 2e.
(1.3)
The most important quasi-zero for us is e. (For fuzzy rings, e = 1 + ǫ.) But e need not absorb in
multiplication; rather, in any semiring† with negation, Definition 1.1 implies
ae = a(−)a = a◦ .
(1.4)
Definition 1.4. A pseudo-triple is a collection (A, T , (−)), where A is a T -module with T ⊂ A, and
(−) is a negation map.
A triple is a pseudo-triple (A, T , (−)), where T generates (A, +).
Our structure of choice, a system, is a quadruple (A, T , (−), ), where (A, T , (−)) is a triple and
is a T -surpassing relation ([58, Definition 2.65]). The main T -surpassing relations are:
• ◦ , defined by a ◦ b if b = a + c◦ for some c.
• (on sets) is ⊆.
The relation has an important theoretical role, replacing “=” and enabling us to define a broader
category than one would obtain directly from universal algebra, cf. [58, §6]. One major reason why
can formally replace equality in much of the theory is found in the “transfer principle” of [3], given in
the context of systems in [58, Theorem 6.17].
Example 1.5. The four main non-classical examples are:
• (The standard supertropical triple) (A, T , (−)) where A = T ∪ G as before and (−) is the identity
map. We get the system by taking to be ◦ .
AN INFORMAL OVERVIEW OF TRIPLES AND SYSTEMS
5
• (The symmetrized triple) (Â, Tb , (−)) where  = A × A with componentwise addition, and Tb =
(T × {0}) ∪ ({0} × T ) with multiplication Tb × Ab → Ab given by
(a0 , a1 )(b0 , b1 ) = (a0 b0 + a1 b1 , a0 b1 + a0 b1 ).
Here we take (−) to be the switch map ((−)(a0 , a1 ) = (a1 , a0 )), which is of second kind. Again
is ◦ .
• (The fuzzy triple [58, Appendix A]) For any T -monoid module A with an element 1′ ∈ T satisfying
(1′ )2 = 1, we can define a negation map (−) on T and A given by a 7→ 1′ a. In particular,
(−)1 = 1′ . This enables us to view fuzzy rings as systems. Again is ◦ . The same argument
shows that tracts [6] are systems.
• (The hyperfield pseudo-triple [58, §2.4.1]) (P(T ), T , (−)) where T is the original hyperfield, P(T )
is its power set (with componentwise operations), and (−) on the power set is induced from the
hypernegation. Here is ⊆.
Although we introduced pseudo-triples since T need not generate (A, +) (for example, taking A =
P(T ) for the phase hypergroup), we are more concerned with triples, and furthermore in a pseudo-triple
one can take the sub-triple generated by T . More triples and systems related to tropical algebra are
presented in [58, §3.2].
Structures other than monoids also are amenable to such an approach. This can all be formulated
axiomatically in the context of universal algebra, as treated for example in [38]. Once the natural
categorical setting is established, it provides the context in which tropicalization becomes a functor,
thereby providing guidance to understand tropical versions of an assortment of mathematical structures.
1.3.1. Ground triples versus module triples.
Classical structure theory involves the investigation of an algebraic structure as a small category (for
example, viewing a monoid as a category with a single object whose morphisms are its elements), and
homomorphisms then are functors between two of these small categories. On the other hand, one obtains
classical representation theory via an abelian category, such as the class of modules over a given ring.
Analogously, there are two aspects of triples. We call a triple (resp. system) a ground triple
(resp. ground system) when we study it as a small category with a single object in its own right,
usually a semidomain. Ground triples have the same flavor as Lorscheid’s blueprints (albeit slightly
more general, and with a negation map), whereas representation theory leads us to module systems,
described below in §4.1 and §6.
This situation leads to a fork in the road: The first path takes us to a structure theory based on
functors of ground systems, translating into homomorphic images of systems via congruences in [45, §7]
(especially prime systems, in which the product of non-trivial congruences is nontrivial [45, §7.2]).
Ground systems often are designated in terms of the structure of A or T , such as “semiring systems” or
“Hopf systems” or “hyperfield systems.”
The paper [4] has a different flavor, dealing with matrices and linear algebra over ground systems, and
focusing on subtleties concerning Cramer’s rule and the equality of row rank, column rank, and submatrix
rank.
The second path takes us to categories of module systems. In [45] we also bring in tensor products and
Hom functors. This is applied to geometry in [46]. In [44] we develop the homological theory, relying on
work done already by Grandis [23] under the name of N -category and homological category (without
the negation map), and there is a parallel approach of Connes and Consani in [13].
2. Contents of [58]: meta-tangible systems
The emphasis in [58] is on ground systems. One can apply the familiar constructions and concepts of
classical algebra (direct sums [58, Definition 2.10], matrices [58, §4.5], involutions [58, §4.6], polynomials
[58, §4.7], localization [58, §4.8], and tensor products [58, Remark 6.34]) to produce new triples and
systems. The simple tensors a ⊗ b where a, b ∈ T comprise the tangible elements of the tensor product.
The properties of tensors and Hom are treated in much greater depth in [45], and localization is analyzed
for module systems in [46].
6
L. ROWEN
2.0.1. Basic properties of triples and systems.
Let us turn to important properties which could hold in triples. One crucial axiom for this theory,
holding in all tropical situations and most related theories, is:
Definition 2.1. The T -triple (A, T , (−)) is uniquely negated if a + b ∈ A◦ for a, b ∈ T implies
b = (−)a.
By definition, hyperfield triples are uniquely negated. We can hone in further, to obtain two of the
principal concepts of [58]:
Definition 2.2. A uniquely negated T -triple (A, T , (−)) is meta-tangible, if the sum of two tangible
elements is tangible unless they are quasi-negatives of each other.
A special case: (A, T , (−)) is (−)-bipotent if a + b ∈ {a, b} whenever a, b ∈ T with b 6= (−)a. In other
words, a + b ∈ {a, b, a◦ } for all a, b ∈ T .
The stipulation in the definition that b 6= (−)a is of utmost importance, since otherwise all of our main
examples would fail. [58, Proposition 5.64] shows how to view a meta-tangible triple as a hypergroup,
thereby enhancing the motivation of transferring hyperfield notions to triples and systems in general.
Any meta-tangible triple satisfying T ∩ A◦ = ∅ is uniquely negated. The supertropical triple is (−)bipotent, as is the modification of the symmetrized triple described in [58, Example 2.53].
The Krasner hyperfield triple (which is just the supertropicalization of the Boolean semifield B) and
the triple arising from the hyperfield of signs (which is just the symmetrization of B) are (−)-bipotent,
but the phase hyperfield triple and the triangle hyperfield triple are not even metatangible (although
the latter is idempotent). But as seen in [58, Theorem 4.46], hyperfield triples satisfy another different
property of independent interest:
Definition 2.3. [58, Definition 4.13] A surpassing relation in a system is called T -reversible if
a b + c implies b a(−)c for a, b ∈ T .
The category of hyperfields as given in [41] can be embedded into the category of uniquely negated
T -reversible systems ([58, Theorem 6.7]). Reversibility enables one to apply systems to matroid theory,
although we have not yet embarked on that endeavor in earnest.
The height of an element c ∈ A (sometimes called “width” in the group-theoretic literature) is the
Pt
minimal t such that c = i=1 ai with each ai ∈ T . (We say that 0 has height 0.) By definition, every
element of a triple has finite height. The height of A is the maximal height of its elements, when these
heights are bounded. For example, the supertropical semiring has height 2, as does the symmetrized
semiring of an idempotent semifield T .
Some unexpected examples of meta-tangible systems sneak in when the triple has height ≥ 3, as
described in [58, Examples 2.73].
In [58, §5] the case is presented that meta-tangibility could be the major axiom in the theory of ground
systems over a group T , leading to a bevy of structure theorems on meta-tangible systems, starting with
the observation [58, Lemma 5.5] that for a, b ∈ T either a = (−)b, a + b = a (and thus a◦ + b = a◦ ), or
a◦ + b = b.
In [58, Proposition 5.17] the following assertions are seen to be equivalent for a triple (A, T , (−))
containing 1:
(i) T ∪ T ◦ = A,
(ii) A is meta-tangible of height ≤ 2,
(iii) A is meta-tangible with e′ ∈ {1, e}.
We obtain the following results for a meta-tangible system (A, T , (−), ):
• [58, Theorem 5.20] If A is not (−)-bipotent then e′ = 1, with A of characteristic 2 when (−) is
of the first kind.
• [58, Theorem 5.27] Every element has the form c◦ or mc for c ∈ T and m 6= 2. The extent to
which this presentation is unique is described in [58, Theorem 5.31].
• [58, Theorem 5.33] Distributivity follows from the other axioms.
• [58, Theorem 5.34] The surpassing relation must “almost” be ◦ .
• [58, Theorem 5.37] A key property of fuzzy rings holds.
• [58, Theorem 5.43] Reversibility holds, except in one pathological situation.
AN INFORMAL OVERVIEW OF TRIPLES AND SYSTEMS
7
• [58, Theorem 5.55] A criterion is given in terms of sums of squares for (A, T , (−)) to be isomorphic
to a symmetrized triple.
One would want a classification theorem of meta-tangible systems that reduces to classical algebras,
the standard supertropical semiring, the symmetrized semiring, layered semirings, power sets of various
hyperfields, or fuzzy rings, but there are several exceptional cases. Nonetheless, [58, Theorem 5.56] comes
close. Namely, if (−) is of the first kind then either A has characteristic 2 and height 2 with A◦ bipotent,
or (A, T , (−)) is isomorphic to a layered system. If (−) is of the second kind then either T is (−)-bipotent,
with A of height 2 (except for an exceptional case), A is isometric to a symmetrized semiring when A is
real, or A is classical. More information about the exceptions are given in [58, Remark 5.57].
[58, §7] continues with some rudiments of linear algebra over a ground triple, to be discussed shortly.
In [58, §8], tropicalization is cast in terms of a functor on systems (from the classical to the nonclassical).
This principle enables one in [58, §9] to define the “right” tropical versions of classical algebraic structures,
including exterior algebras, Lie algebras, Lie superalgebras, and Poisson algebras.
3. Contents of [4]: Linear algebra over systems
The paper [4] was written with the objective of understanding some of the diverse theorems in linear
algebra
over semiring systems. We define a set of vectors {vi ∈ A(n) : i ∈ I} to be T -dependent if
P
◦ (n)
for some nonempty subset I ′ ⊆ I and αi ∈ T , and the row rank of a matrix to be
i∈I ′ αi vi ∈ (A )
the maximal number of T -independent rows.
A tangible vector is a vector all of whose elements are in T0 . A tangible matrix is a matrix all of
whose rows are tangible vectors.
The (−)-determinant |A| of an n × n matrix A = ai,j is
X
(−)π aπ ,
π∈Sn
Qn
where aπ := i=1 ai,π(i) . A matrix A is nonsingular if |A| ∈ T .
The submatrix rank of A is the largest size of a nonsingular square submatrix of A.
In [58, Corollary 7.4] we see that the submatrix rank of a matrix over a T -cancellative meta-tangible
triple is less than or equal to both the row rank and the column rank. This is improved in [4]:
Theorem 3.1 ([4, Theorem 4.7(i)]). Let (A, T , (−), ◦ ) be a system. For any vector v, the vector
1
1
y = |A|
adj(A)v satisfies |A|v ◦ Ay. In particular, if |A| is invertible in T , then x := |A|
adj(A)v satisfies
v ◦ Ax.
The existence of a tangible such x is subtler. One considers valuations of systems ν : (A, +) → (G, +),
and their fibers {a ∈ T : ν(a) = g} for g ∈ G; we call the system T -Noetherian if any ascending chain
of fibers stabilizes.
Theorem 3.2 ([4, Corollary 4.26]). In a T -Noetherian G-valued system A, if |A| is invertible, then for
1
any vector v, there is a tangible vector x with |x| = |A|
| adj(A)|v, such that Ax + v ∈ A◦ .
One obtains uniqueness of x [4, Theorem 4.7(ii)] using a property called “strong balance elimination.”
After translating some more of the concepts of [3] into the language of systems, we turn to the question,
raised privately for hyperfields by Baker:
Question A. When does the submatrix rank equal the row rank?
Our initial hope was that this would always be the case, in analogy to the supertropical situation.
However, Gaubert observed that a (nonsquare) counterexample to Question A already can be found in [2],
and the underlying system even is meta-tangible. Here the kind of negation map is critical: A rather
general counterexample for triples of the second kind is given in [4, Proposition 3.3]; the essence of the
example already exists in the “sign hyperfield.” Although the counterexample as given is a nonsquare
(3 × 4) matrix, it can be modified to an n × n matrix for any n ≥ 4. This counterexample is minimal in
the sense that Question A has a positive answer for n ≤ 2 and for 3 × 3 matrices under a mild assumption,
cf. [4, Theorem 5.7].
Nevertheless, positive results are available. A positive answer for Question A along the lines of [3,
Theorems 5.11, 5.20, 6.9] is given in [4, Theorem 5.8] for systems satisfying certain technical conditions. In
8
L. ROWEN
[4, Theorem 5.11], we show that Question A has a positive answer for square matrices over meta-tangible
triples of first kind of height 2, and this seems to be the “correct” framework in which we can lift theorems
from classical algebra. A positive answer for all rectangular matrices is given in [4, Theorem 5.19], but
with restrictive hypotheses that essentially reduce to the supertropical situation.
4. Contents of [45]: Basic categorical considerations
The paper [45] elaborates on the categorical aspects of systems, with emphasis on important functors.
The functor triple C S [45, Definition 3.7] embraces important constructions including the symmetrized
triple and polynomial triples (via the convolution product given before [45, Definition 4.4]).
As in [49, 50], the emphasis on [45] is for T to be a cancellative multiplicative monoid (even a group),
which encompasses many major applications. This slights the Lie theory, and indeed one could consider
Hopf systems, as discussed briefly in [45, §2.1] and in more depth in [46]. Motivation can be found in [59].
An issue that must be confronted is the proper definition of morphism, cf. [45, Definitions 5.1, 5.3]. In
categories arising from universal algebra, one’s intuition would be to take the homomorphisms, i.e., those
maps which preserve equality in the operators. We call these morphisms “strict.” However, this approach
loses some major examples of hypergroups. Applications in tropical mathematics and hypergroups (cf. [41,
Definition 2.3]) tend to depend on the “surpassing relation” ([58, Definition 2.65]), so we are led to
a broader definition called -category in [45, Definition 4.8]. -morphisms ([58, Definition 6.3]) often
provide the correct venue for studying ground systems. On the other hand, [45, Proposition 5.4] gives a
way of verifying that some morphisms automatically are strict.
The situation is stricter for module systems [45, §5, 6] over ground triples. The sticky point here is
that the semigroups of morphisms Mor(A, B) in our T -module categories are not necessarily groups, so
the traditional notion of abelian category has to be replaced by “semi-abelian,” [45, Definition 3.16], and
these lack some of the fundamental properties of abelian categories. The tensor product is only functorial
when we restrict our attention to strict morphisms, [45, Proposition 6.8]!
4.1. Module systems.
In both cases, in the theory of semirings and their modules, homomorphisms are described in terms of
congruences, so congruences should be a focus of the theory. The null congruences contain the diagonal,
and not necessarily zero, and lead us to null morphisms, [45, Definition 3.2]. An alternate way of viewing
c is given in [45, §8.4]. In [45, §9], “Hom” is studied
congruences in terms of “transitive” modules of M
together with its dual, and again one only gets all the desired categorical properties (such as the adjoint
isomorphism [45, Lemma 9.8]) when considering strict morphisms. In this way, the categories comprised
of strict morphisms should be amenable to a categorical view, to be carried out in [46] for geometry and
and in [44] for homology, again at times with a Hopfian flavor.
The functors between the various categories arising in this theory are described in [45, §10], also with
an eye towards valuations of triples.
5. Contents of [46]: Geometry
The paper [46] focuses on module systems, leading to a geometric theory over ground systems, and is
comprised of the following parts:
• Group and Lie semialgebra systems.
• The symmetrization functor from Lorscheid’s blueprints to symmetrized triples.
• Localization theory for module triples over semiring triples.
• A geometrical category theory including a representation theorem for semi-abelian N -categories
with negation.
• Schemes of semiringed spaces.
• Sheaves of module systems.
• A Hopf semialgebra approach to ground systems and module systems.
As in classical algebra, the “prime” systems [58, Definitions 2.11, 2.25] play an important role in
affine geometry, via the Zariski topology [45, §5.3.1], so it is significant that we have a version of the
fundamental theorem of algebra in [45, Theorem 7.29], which implies that a polynomial system over a
prime system is prime [45, Corollary 7.30].
AN INFORMAL OVERVIEW OF TRIPLES AND SYSTEMS
9
6. Contents of [44]: Homology
This is work in progress. We start with a version of split epics (weaker than the classical definition):
Definition 6.1. An epic π : M → N -splits if there is an N -monic ν : N → M such that 1N πν.
In this case, we also say that (π, ν) -splits, and N is a -retract of M.
A module system M = (M, TM , (−), ) is the T --direct sum of subsystems (M1 , TM1 , (−), )
and (M2 , TM2 , (−), ) if TM1 ∩ TM2 = ∅ and every a ∈ M can be written a a1 + a2 for ai ∈ Mi .
This leads to projective module systems.
Definition 6.2. A T -module system P is projective if for any strict epic h : M → M′ of T -module
systems, every morphism f : P → M′ lifts to a morphism f˜ : P → M, in the sense that hf˜ = f.
P is -projective if for any (T -module system) strict epic h : M → M′ , every morphism f : P → M′
-lifts to a morphism f˜ : P → M, in the sense that f hf˜.
Their fundamental properties are then obtained, including the -Dual Basis Lemma [44, Proposition 5.14], leading to -projective resolutions and -projective dimension. Then one obtains a homology
theory in the context of homological categories [23] and derived functors, in connection to the recent work
of Connes and Consani [13].
References
[1] K. Adiprasito, J. Huh, and E. Katz, Hodge Theory of Matroids, Notices of the AMS 64 (2017), 26–30.
[2] M. Akian, S. Gaubert, and A. Guterman. Linear independence over tropical semirings and beyond. In Tropical and
Idempotent Mathematics, G.L. Litvinov and S.N. Sergeev, (eds.), Contemp. Math. 495 (2009), 1–38.
[3] M. Akian, S. Gaubert, and A. Guterman. Tropical Cramer Determinants revisited, Contemp. Math. 616, Amer. Math.
Soc. (2014), 1–45.
[4] M. Akian, S. Gaubert, and L. Rowen, Linear algebra over systems, preprint (2017).
[5] M. Baker and N. Bowler, Matroids over hyperfields, arXiv:1601.01204v4, 24 Aug 2016.
[6] M. Baker and N. Bowler, Matroids over partial hyperstructures, preprint, Sept. 2017.
[7] M. Baker and S. Payne (ed), Nonarchimedean and Tropical Geometry , Simons Symposia, Springer-Verlag, 2016.
[8] V. Berkovich, Non-archimedean analytic geometry: first steps in p-adic Geometry: Lectures from the 2007 Arizona
Winter School, University Lecture Series, vol. 45, American Mathematical Society, Providence, R.I., (2008), 1–7.
[9] V. Berkovich, Algebraic and analytic geometry over the field with one element (2014).
[10] A. Bertram and R. Easton, The tropical nullstellensatz for congruences, Advances in Mathematics 308 (2017), 36–82.
[11] N. Bourbaki. Commutative Algebra. Paris and Reading, 1972.
[12] P. Butkovic. Max-algebra: the linear algebra of combinatorics? Lin. Alg. and Appl. (2003), 313–335.
[13] A. Connes and C. Consani, Homological algebra in characteristic one, arXiv:1703.02325v1 [math.AG] 7 Mar 2017.
[14] G. Cortinas, C. Haesemeyer, M. Walker, and C. Weibel, Toric varieties, monoid schemes, and cdh-descent, J. Reine
Angew. Math. 698 (2015), 1-54.
[15] A.A. Costa. Sur la thêorie générale des demi-anneaux, Publ. Math. Decebren 10 (1963), 14–29.
[16] A. Dress, Duality theory for finite and infinite matroids with coefficients, Advances in Mathematics 93(2) (1986),
214–250.
[17] A. Dress and W. Wenzel, Algebraic, tropical, and fuzzy geometry, Beitrage zur Algebra und Geometrie/ Contributions
to Algebra und Geometry 52 (2) (2011), 431–461.
[18] P. Etingof, S. Gelaki, D. Nikshych,and V. Ostrik, Tensor Categories. Mathematical Surveys and Monographs Volume
205, American Mathematical Society.
[19] S. Gaubert. Théorie des systèmes linéaires dans les diodes. Thèse, École des Mines de Paris, 1992.
[20] S. Gaubert and M. Plus. Methods and applications of (max,+) linear algebra. In R. Reischuk and M. Morvan, editors,
STACS97, number 1200 in LNCS, Lubeck, March 1997. Springer.
[21] J. Giansiracusa, J. Jun, and O. Lorscheid, On the relation between hyperrings and fuzzy rings.
[22] J. Golan. The theory of semirings with applications in mathematics and theoretical computer science, volume 54.
Longman Sci & Tech., 1992.
[23] M. Grandis. Homological Algebra: In Strongly Non-abelian Settings, World scientific, 2013.
[24] A. Grothendieck, Produits tensoriels topologiques et espaces nucleaires, Memoirs of the Amer. Math. Soc., no. 16, 1955.
[25] S. Henry, Symmetrization of monoı̈ds as hypergroups, arXiv preprint arXiv:1309.1963 (2013).
[26] I. Itenberg, V. Kharlamov, and E. Shustin, Welschinger invariants of real Del Pezzo surfaces of degree ≥ 3, Math.
Annalen 355 (2013), no. 3, 849-878.
[27] I. Itenberg, G. Mikhalkin and E. Shustin. Tropical Algebraic Geometry, Oberwolfach Seminars, 35, Birkhäuser Verlag,
Basel, 2007.
[28] Z. Izhakian, Tropical arithmetic & algebra of tropical matrices, Preprint at arXiv:math.AG/0505458, 2005.
[29] Z. Izhakian, M. Knebusch, and L. Rowen. Supertropical semirings and supervaluations. J. Pure and Appl. Alg., 215(10)
(2011), 2431–2463.
10
L. ROWEN
[30] Z. Izhakian, M. Knebusch, and L. Rowen. Layered tropical mathematics, Journal of Algebra, 416 (2014), 200–273.
[31] Z. Izhakian, M. Knebusch, and L. Rowen. Categories of layered semirings, Commun. in Algebra 43(5) (2015), 1807–1836.
[32] Z. Izhakian, M. Knebusch, and L. Rowen. Algebraic structures of tropical mathematics, in Tropical and Idempotent
Mathematics, G. L. Litvinov and S. N. Sergeev, (eds.), Contemporary Mathematics (AMS) 616(28) (2014), 125–150.
(Preprint at arXiv:1305.3906.)
[33] Z. Izhakian, A. Niv, and L. Rowen. Supertropical SL, Linear and multilinear algebra, to appear.
[34] Z. Izhakian and L. Rowen. Supertropical algebra, Advances in Mathematics, 225(4) (2010), 2222–2286.
[35] Z. Izhakian and L. Rowen, Supertropical matrix algebra, Israel J. Math., 182(1) (2011), 383–424.
[36] Z. Izhakian and L. Rowen, Supertropical matrix algebra II: Solving tropical equations. Israel J. Math., 186(1) (2011),
69–97.
[37] Z. Izhakian and L. Rowen, Supertropical polynomials and resultants, J. of Algebra, 324 (2010), 1860–1886.
[38] N. Jacobson. Basic algebra II, Freeman, 1980.
[39] D. Jensen and S. Payne, Combinatorial and inductive methods for the tropical maximal rank conjecture, J. Combin.
Theory Ser. A. 152 (2017), 138-158.
[40] D. Joo and K. Mincheva, Prime congruences of idempotent semirings and a Nullstellensatz for tropical polynomials,
arXiv:1408.3817v1 (to appear in Selecta Mathematica).
[41] J. Jun, Algebraic geometry over hyperrings, arxiv:math.AG/1512.04837 (2015).
[42] J. Jun, Cech cohomology of semiring schemes, arXiv preprint arXiv:1503.01389 (2015).
[43] J. Jun, Valuations of semirings (2015), arXiv preprint arXiv:1503.01392 (to appear in Journal of Pure and Applied
Algebra).
[44] J. Jun, K. Mincheva, and L.Rowen, Homology of systems, in preparation.
[45] J. Jun and L.Rowen, Categories with negation, arXiv 1709.0318.
[46] J. Jun and L. Rowen, Geometry of systems (2017).
[47] Y. Katsov, Tensor products of functors, Siberian J. Math. 19 (1978), 222-229, trans. from Sirbiskii Mathematischekii
Zhurnal 19 no. 2 (1978), 318-327.
[48] Y. Katsov, Toward homological characterization of semirings: Serreś conjecture and Bass´ perfectness in a semiring
context, Algebra Universalis 52 (2004), 197-214.
[49] O. Lorscheid, The geometry of blueprints. Part I: algebraic background and scheme theory, Adv. Math. 229 (3) (2012),
pp. 1804–1846.
[50] O. Lorscheid, A blueprinted view on F1-geometry, Absolute Arithmetic and -Geometry, European Mathematical Society
(2016). arXiv:1301.0083v2.
[51] D. Maclagan and B. Sturmfels, Introduction to Tropical Geometry, American Mathematical Society Graduate Studies
in Mathematics 161, 2015.
[52] R. McKenzie, G. McNulty and W. Taylor, Algebras, Lattices and Varieties, Vol. 1 Wadsworth and Brooks, 1987.
[53] G. Mikhalkin. Enumerative tropical algebraic geometry in R2 , J. Amer. Math. Soc 18 (2005), 313–377.
[54] A. Patchkoria, On exactness of long sequences of homology semimodules, Journal of Homotopy and Related Structures,
vol. 1(1), (2006), 229-243.
[55] M. Plus (M. Akian, G. Cohen, S. Gaubert, R. Nikoukhah, and J.P. Quadrat), Max L’algèbre (max,+) et sa symétrisation
ou l’algèbre des équilibres. (French) [(max,+) algebra and its symmetrization or the algebra of balances] C. R. Acad.
Sci. Paris Sér. II Méc. Phys. Chim. Sci. Univers Sci. Terre 311 (1990), no. 4, 443-448.
[56] Q. Ren, K. Shaw, and B. Sturmfels, Tropicalization of Del Pezzo surfaces, Advances in Mathematics 300 (2016),
156–189.
[57] L.H. Rowen, Symmetries in tropical algebra, arXiv:1602.00353 [math.RA]
[58] L.H. Rowen, Algebras with a negation map, 78 pages, arXiv:1602.00353
[59] Y. Sommerhäuser, Hopf algebras and associated group actions, slides of lecture at ACC conference Combinatorics of
group actions, Saint John’s, Newfoundland, August 29, 2017.
[60] B. Toën et M. Vaquié, Au-dessous de Spec Z, Journal K-Theory, 3 (3) (2009), pp. 437–500.
[61] O.Y. Viro, Hyperfields for tropical geometry I. Hyperfields and dequantization. ArXiv AG/1006.3034.
Department of Mathematics, Bar-Ilan University, Ramat-Gan 52900, Israel
E-mail address: [email protected]
| 0math.AC
|
arXiv:1706.08106v1 [cs.AI] 25 Jun 2017
Random Forests for Industrial Device
Functioning Diagnostics Using Wireless Sensor
Networks
W. ElGhazel, C. Guyeux, A. Farhat, M. Hakem,
K. Medjaher, N. Zerhouni, and J.M. Bahi
Abstract
In this paper, random forests are proposed for operating devices diagnostics in the presence of a variable number of features. In various
contexts, like large or difficult-to-access monitored areas, wired sensor
networks providing features to achieve diagnostics are either very costly
to use or totally impossible to spread out. Using a wireless sensor network
can solve this problem, but this latter is more subjected to flaws. Furthermore, the networks’ topology often changes, leading to a variability
in quality of coverage in the targeted area. Diagnostics at the sink level
must take into consideration that both the number and the quality of the
provided features are not constant, and that some politics like scheduling
or data aggregation may be developed across the network. The aim of
this article is (1) to show that random forests are relevant in this context,
due to their flexibility and robustness, and (2) to provide first examples
of use of this method for diagnostics based on data provided by a wireless
sensor network.
1
Introduction
In machine learning, classification refers to identifying the class to which
a new observation belongs, on the basis of a training set and quantifiable
observations, known as properties.
In ensemble learning, the classifiers are combined to solve a particular
computational intelligence problem. Many research papers encourage
adapting this solution to improve the performance of a model, or reduce
the likelihood of selecting a weak classifier. For instance, Dietterich argued that averaging the classifiers’ outputs guarantees a better performance than the worst classifier [6]. This claim was theoretically proven
correct by Fumera and Roli [8]. In addition to this, and under particular
hypotheses, the fusion of multiple classifiers can improve the performance
of the best individual classifier [15].
Two of the early examples of ensemble classifiers are Boosting and
Bagging. In Boosting algorithm [12], the distribution of the training set
1
changes adaptively based on the errors generated by the previous classifiers. In fact, at each step, a higher degree of importance is accorded
to the misclassified instances. At the end of the training, a weight is accorded to each classifier, regarding its individual performance, indicating
its importance in the voting process. As for Bagging [2], the distribution
of the training set changes stochastically and equal votes are accorded to
the classifiers. For both classifiers, the error rate decreases when the size
of the committee increases.
In a comparison made by Tsymbal and Puuronen [14], it is shown that
Bagging is more consistent but unable to take into account the heterogeneity of the instance space. In the highlight of this conclusion, the authors
emphasize the importance of classifiers’ integration. Combining various
techniques can provide more accurate results as different classifiers will
not behave in the same manner faced to some particularities in the training set. Nevertheless, if the classifiers give different results, a confusion
may be induced [10]. It is not easy to ensure reasonable results while combining the classifiers. In this context, the use of random methods could
be beneficial. Instead of combining different classifiers, a random method
uses the same classifier over different distributions of the training set. A
majority vote is then employed to identify the class.
In this article, the use of random forests (RF) is proposed for industrial functioning diagnostics, particularly in the context of devices being
monitored using a wireless sensor network (WSN). A prerequisite in diagnostics is to consider that data provided by sensors are either flawless
or simply noisy. However, deploying a wired sensor network on the monitored device is costly in some well-defined situations, specifically in large
scale, moving, or hardly accessible areas to monitor. Such situations encompass nuclear power plants or any structure spread in deep water or in
the desert. Wireless sensors can be considered in these cases, due to their
low cost and easy deployment.
WSNs monitoring is somehow unique in the sense that sensors too
are subjected to failures or energy exhaustion, leading to a change in
the network topology. Thus, monitoring quality is variable too and it
depends on both time and location on the device. Various strategies can
be deployed on the network to achieve fault tolerance or to extend the
WSN’s lifetime, like nodes scheduling or data aggregation. However, the
diagnostic processes must be compatible with these strategies, and with a
device coverage of a changing quality. The objective of this research work
is to show that RF achieve a good compromise in that situation, being
compatible with a number of sensors which may be variable over time,
some of them being susceptible to errors. More precisely, we will explain
why random methods are relevant to achieve accurate diagnostics of an
industrial device being monitored using a WSN. The functioning of RF
will then be recalled and applied in the monitoring context. Algorithms
will be provided, and an illustration on a simulated WSN will finally be
detailed.
The remainder of this article is organized as follows. Section 2 summarizes the related work. In Section 3, we overview the research works in
industrial diagnostics. We present the random forest algorithm in Section
4 and give simulation results in Section 5. This research work ends with
2
a conclusion section, where the contribution is summarized and intended
future work is provided.
2
Related work
Many research works have contributed in improving the classification’s
accuracy. For instance, tree ensembles use majority voting to identify
the most popular class. They have the advantage of transforming weak
classifiers into strong ones by combining their knowledge to reduce the
error rate.
Usually, the growth of each tree is governed by random vectors sampled
from the training set, and bagging is one of the early examples of this. In
this method, each tree is grown by randomly selecting individuals from
the training set without replacing them [2]. The use of bagging can be
motivated by three main reasons: (1) it enhances accuracy with the use
of random features, (2) it gives ongoing estimates of the generalization
error, strength, and correlation of combined trees, and (3) it is also good
for unstable classifiers with large variance.
Meanwhile, Freund introduced the adaptive boosting algorithm Adaboost, which he defined as [7]: “a deterministic algorithm that selects
the weights on the training set for input to the next classifier based on
the wrong classifications in the previous classifiers”.
The fact that the classifier focuses on correcting the errors at each new
step remarkably improved the accuracy of classifications.
Shortly after, in [1] randomness was again used to grow the trees. The
split was defined at each node by searching for the best random selection
of features in the training set. Ho [9] introduced the random subspace,
in which he randomly selects a subset of vectors of features to grow each
tree. Diettrich introduced the random split selection where at each node,
a split is randomly selected among k best splits [6].
For these methods, and like bagging, a random vector sampled to
grow a tree is completely independent from the previous vectors, but is
generated with the same distribution.
Random split selection [6] and introducing random noise into the outputs [3] both gave better results than bagging. Nevertheless, the algorithms implementing ways of re-weighting the training set, such as Adaboost [7], outperform these two methods [4].
Therefore, Breiman combined the strengths of the methods detailed
above into the random forest algorithm. In this method, individuals are
randomly selected from the training set with replacement. At each node,
a split is selected by reducing the dispersion generated by the previous
step and consequently lowering the error rate. This algorithm is further
detailed in Section 4.
3
Overview of diagnostics
With their constantly growing complexity, current industrial systems witness costly downtime and failures. Therefore, an efficient health assess-
3
ment technique is mandatory. In fact, in order to avoid expensive shutdowns, maintenance activities are scheduled to prevent interruptions in
system operation. In early frameworks, maintenance takes place either
after a failure occurs (corrective maintenance), or according to predefined
time intervals (periodic maintenance). Nevertheless, this still generates
extra costs due to “too soon” or “too late” maintenances. Accordingly,
considering the actual health state of the operating devices is important in
the decision making process. Maintenance here becomes condition-based,
and is only performed after the system being diagnosed in a certain health
state.
Diagnostics is an understanding of the relationship between what we
observe in the present and what happened in the past, by relating the
cause to the effect. After a fault takes place, and once detected, an
anomaly is reported in the system behavior. The fault is then isolated
by determining and locating the cause (or source) of the problem. Doing
so, the component responsible for the failure is identified and the extent
of the current failure is measured. This activity should meet several requirements in order to be efficient [5]. these requirements are enumerated
in the following.
• Early detection: in order to improve industrial systems’ reliability, fault detection needs to be quick and accurate. Nevertheless,
diagnostic systems need to find a reasonable trade-off between quick
response and fault tolerance. In other words, an efficient diagnostic
system should differentiate between normal and erroneous performances in the presence of a fault.
• Isolability: fault isolation is a very important step in the diagnostic process. It refers to the ability of a diagnostic system to
determine the source of the fault and identify the responsible component. With the isolability attribute, the system should discriminate
between different failures. When an anomaly is detected, a set of
possible faults is generated. While the completeness aspect requires
the actual faults to be a subset of the proposed set, resolution optimization necessitates that the set is as small as possible. A tradeoff
then needs to be found while respecting the accuracy of diagnostics.
• Robustness and resources: it is highly desirable that the diagnostic system would degrade gracefully rather than fail suddenly. For
this finality, the system needs to be robust to noise and uncertainties. In addition to this, a trade-off between system performance and
computational complexity is to be considered. For example, on-line
diagnostics require low complexity and higher storage capacities.
• Faults identifiability: a diagnostics system is of no interest if it
cannot distinguish between normal and abnormal behaviors. It is
also crucial that not only the cause of every fault is identified, but
also that new observations of malfunctioning would not be misclassified as a known fault or as normal behavior. While it is very common
that a present fault leads to the generation of other faults, combining
the effects of these faults is not that easy to achieve due to a possible non-linearity. On the other hand, modeling the faults separately
may exhaust the resources in case of large processes.
4
• Clarity: when diagnostic models and human expertise are combined
together, the decision making support is more reliable. Therefore, it
is appreciated that the system explains how the fault was triggered
and how it propagated, and keeps track on the cause/effect relationship. This can help the operator use their experience to evaluate the
system and understand the decision making process.
• Adaptability: operating conditions, external inputs, and environmental conditions change all the time. Thus, to ensure relevant diagnostics at all levels,the system should adapt to changes and evolve
in the presence of new information.
Existent diagnostic models have several limitations. Some of which
are summarized in Table 1.
Diagnostic model
Markovian process
Bayesian networks
Neural networks
Fuzzy systems
Drawbacks
-Aging is not considered
-Different stages of degradation process
cannot be accounted for
-Large volume of data is required for the
training
-The assumptions are not always practical
-Prior transitions are not considered
-Complete reliance on accurate thresholds
-Many state transitions are needed for efficient results
-Unable to predict unanticipated states
-Significant amount of data for the training
-Retraining is necessary with every change
of conditions
-Pre-processing is needed to reduce inputs
-Increasing complexity with every new entry
-Domain experts are required
-Results are as good as the developers’ understanding
Table 1: Limitations of diagnostic models
The degradation process can be considered as a stochastic process.
The evolution of the degradation is a random variable that describes the
different levels of the system’s health state, from good condition to complete deterioration. The deterioration process is multistate and can be
divided into two main categories [11]:
1. Continuous-state space: the device is considered failed when the
predefined threshold is reached.
2. Discrete-state space: the degradation process is divided into a finite
number of discrete levels.
5
As condition-based maintenance relies on reliable scheduling of maintenance activities, an understanding of the degradation process is required.
For this finality, in this paper, we consider the discrete-state space deterioration process.
4
Random forests
The RF algorithm is mainly the combination of Bagging [2] and random
subspace [9] algorithms, and was defined by Leo Breiman as “a combination of tree predictors such that each tree depends on the values of
a random vector sampled independently and with the same distribution
for all trees in the forest” [4]. This method resulted from a number of
improvements in tree classifiers’ accuracy.
This classifier maximizes the variance by injecting randomness in variable selection, and minimizes the bias by growing the tree to a maximum
depth (no pruning). The steps of constructing the forest are detailed in
Algorithm 1.
Algorithm 1 Random forest algorithm
Input: Labeled training set S, Number of trees T , Number of features F .
Output: Learned random forest RF .
initialize RF as empty
for i in 1..T do
Si0 ← bootstrap (S)
initialize the root of tree i
repeat
if current node is terminal then
affect a class
go to the next unvisited node if any
else
select the best feature f ∗ among F
sub-tree ← split(Si0 , f ∗ )
add (leftChild, rightChild) to tree i
end if
until all nodes are visited
add tree i to the forest
end for
In a RF, the root of a tree i contains the instances from the training
subset Si0 , sorted by their corresponding classes. A node is terminal if
it contains instances of one single class, or if the number of instances
representing each class is equal. In the alternative case, it needs to be
further developed (no pruning). For this purpose, at each node, the feature
that guarantees the best split is selected as follows.
1. The information acquired by choosing a feature can be computed
through:
6
(a) The entropy of Shannon, which measures the quantity of information
Entropy(p) = −
c
X
P (k/p) × log(P (k/p))
(1)
k=1
where p is the number of examples associated to a position in the
tree, c is the total number of classes, k/p denotes the fraction of
examples associated to a position in the tree and labelled class
k, P (k/p) is the proportion of elements labelled class k at a
position p.
(b) The Gini index, which measures the dispersion in a population
Gini(x) = 1 −
c
X
P (k/p)2
(2)
k=1
where x is a random sample, c is the number of classes, k/p
denotes the fraction of examples associated to a position in the
tree and labelled class k, P (k/p) is the proportion of elements
labelled class k at a position p.
2. The best split is then chosen by computing the gain of information from growing the tree at given position, corresponding to each
feature as follows:
Gain(p, t) = f (p) −
n
X
Pj × f (pj )
(3)
j=1
where p corresponds to the position in the tree, t denotes the test at
branch n, Pj is the proportion of elements at position p and that go
to position pj , f (p) corresponds to either Entropy(p) or Gini(p).
The feature that provides the higher Gain is selected to split the
node.
The optimal training of a classification problem can be NP-hard. Tree
ensembles have the advantage of running the algorithm from different
starting points, and this can better approximate the near-optimal classifier.
In his paper, Leo Breiman discusses the accuracy of random Forests.
In particular, he gave proof that the generalized error, although different from one application to another, always has an upper bound and so
random forests converge [4].
The injected randomness can improve accuracy if it minimizes correlation while maintaining strength. The tree ensembles investigated by
Breiman use either randomly selected inputs or a combination of inputs at
each node to grow the tree. These methods have interesting characteristics
as:
- Their accuracy is at least as good as Adaboost
- They are relatively robust to outliers and noise
- They are faster than bagging or boosting
7
- They give internal estimates of error, strength, correlation, and variable importance
- They are simple and the trees can be grown in parallel
There are four different levels of diversity which were defined in [13],
level 1 being the best and level 4 the worst.
• Level 1: no more than one classifier is wrong for each pattern.
• Level 2: the majority voting is always correct.
• Level 3: at least one classifier is correct for each pattern.
• Level 4: all classifiers are wrong for some pattern.
RF can guarantee that at least level two is reached. In fact, a trained
tree is only selected to contribute in the voting if it does better than
random, i.e. the error rate generated by the corresponding tree has to be
less than 0.5, or the tree will be dropped from the forest [4].
In [16], Verikas et al. argue that the most popular classifiers (Support
Vector Machine SVM, MultiLayer Perceptron MLP, and Relevance Vector
Machine RVM) provide too little insight about the variable importance to
the derived algorithm. They compared each of these methodologies to the
random forest algorithm to find that in most cases RF outperform other
techniques by a large margin.
5
Experimental study
5.1
Data collection
In this paper, we consider two sets of experiments. The sensor network is
constituted by 110 nodes, sensing respectively the levels of temperature
(50 sensors), pressure (50), and humidity (10) on the industrial device
under consideration.
5.1.1
Set of experiment 1
In this set of experiments, we consider that no level of correlation is introduced betweent the different features. Moreover, we suppose that at
time t:
• Under normal conditions, temperature sensors follow a Gaussian law
of parameter (20×(1+0.005t), 1), while these parameters are mapped
to (35, 1) in case of a malfunction of the industrial device. Finally,
these sensors return the value 0 when they break down.
• The Gaussian parameters are (5 × (1 + 0.01t), 0.3) when both the
industrial device and the pressure sensors are in normal conditions.
The parameters are changed to (15, 1) in case of industrial failure,
while the pressure sensors return 1 when they are themselves broken
down.
8
• Finally, the 10 humidity sensors produce data following a Gaussian
law of parameter (52.5 × (1 + 0.001t), 12.5) when they are sensing a
well-functioning device. These parameters are set to (70, 10) in case
of device failure, while malfunctioning humidity sensors produce the
value 0.
5.1.2
Set of experiment 2
For this set, a linear correlation is injected between the studied features.
• Under normal conditions, temperature sensors follow a Gaussian law
of parameter (20×(1+0.005t), 1), while these parameters are mapped
to (35, 1) in case of a malfunction of the industrial device. Finally,
these sensors return the value 0 when they break down.
• When both the industrial device and the pressure sensors are in
normal conditions, the value of pressure is computed as (x ÷ 2 + 10),
where x is the value of temperature. The parameters are changed to
(15, 1) in case of industrial failure, while the pressure sensors return
1 when they are themselves broken down.
• For a well-functioning device, the 10 humidity sensors produce data
in the form of (x × 525 + 12). These parameters are set to (70, 10) in
case of device failure, while malfunctioning humidity sensors produce
the value 0.
For both data sets, the probability that a failure occurs at time t
follows a Bernoulli distribution of parameter t ÷ 35000.
Five levels of functioning are attributed to each category of sensors,
depending on the abnormality of the sensed data. These levels are defined
thanks to 4 thresholds, which are 22.9, 24.5, 26, and 28 degrees for the
temperature (a temperature lower than 22.9°C is normal, while a sensed
value larger than 28°C is highly related to a malfunctioning), 5.99, 6.4,
7.9, and 9 bars for the pressure parameter, and finally 68, 80, 92, and 95
percents for the humidity.
Data is generated as follows.
• For each time unit t = 1..100 during the industrial device monitoring,
– For each category c (temperature, pressure, humidity) of sensors:
∗ For each sensor s belonging to category c:
· If s has not yet detected a device failure:
1. s picks a new data, according to the Gaussian law corresponding to a well-functioning device, which depends
on both t and c,
2. a random draw from the exponential law detailed previously is realized, to determine if a breakdown occurs
on the location where s is placed.
· Else s picks a new datum according to the Bernoulli distribution of a category c sensor observing a malfunctioning device.
9
The global failure level F t of a set of 110 sensed data produced by
the wireless sensor network at a given time t is defined as follows. For
each sensed datum dti , i = 1..110, let fit ∈ {1, .., 5} be the functioning
level related to its category (pressure, temperature, or humidity). Then
F t = max fit | i = 1..110.
5.2
Random forest design
Figure 1: Example of a tree in the random forest
The random forest, constituted in this set of experiments by 100 trees,
is defined as follows. For each tree Ti , i = 1..100:
• A sample of 67% of dates τ1 , . . . , τ67 ∈ {1, ..., 100} is extracted
• The root of the tree Ti is the tuple (]{j | F τj = n, j = 1..67})n=1..5 ,
where ]X is the cardinality of the finite set X. Thus, its n-th coordinate corresponds to the number of times the device has been in
the global failure n in this sample of observation dates.
• The category c having the largest Gain for the dates in the root
node is selected. The dates are divided into five sets depending on
thresholds related to c. Then, 5 edges labeled by both c and failure
levels li0 = {1, .., 5} are added to Ti , as depicted in Figure 1. They
are directed to (at most) 5 new vertices containing the tuples
τi
]{j | F τj = n and di j has a c level equal to li }
.
n=1,..,5
In other words, we only consider in this node a sub-sample of dates
having their functioning level for category c equal to li0 , and we divide
the sub-sample into 5 subsets, depending on their global functioning
levels: the tuple is constituted by each cardinality of these subsets,
see Fig. 1.
• The process is continued, with: this vertex as a new root, the reduced
set of observed dates, and the categories minus c. It is stopped when
either all the categories have been regarded, or when tuple of the
node has at least 4 components equal to 0.
10
5.3 Providing a diagnostic on a new set of observations
Finally, given a new set of observations at a given time, the diagnostics
of the industrial device is obtained as follows.
Let T be a tree in the forest. T will be visited starting from its root
until reaching a leaf as described below.
1. All the edges connected to the root of T are labeled with the same
category c, but with various failure levels. The selected edge e is
the one whose labeled level of failure regarding c corresponds to the
c-level of failure of the observations.
2. If the obtained node n following edge e is a leaf, then the global
level of failure of the observations according to T is the coordinate
of the unique non zero component of the tuple. If not, the tree walk
is continued at item 1 with node n as new root.
The global diagnostics for the given observation is a majority consensus
of all the responses of all the trees in the forest.
5.4
Numerical simulations
The training set is obtained by simulating 100 observations for 10 successive times, which results in 1000 instances. The resulting data base is
then used to train 100 trees that will constitute the trained random forest.
Figure 2 presents the delay between the time the system enters a failure mode and the time of its detection. This is done in the absence of
correlations between the different features. The 0 time value of delay, the
negative values, and positive value refer to in time predictions, early predictions and late predictions of failures, respectively. The plotted values
are the average result per number of simulations which varies from 1 to
100. With time, sensor nodes start to fail in order to simulate missing
data packets. As a result, the RF algorithm was able to detect 54% of the
failures either in time or before their occurrence.
For each of the 100 performed simulations, we calculated the average
number of errors in fault detection, produced by the trees in the forest.
Figure 3 shows that this error rate remained below 15% through the simulation. This error rate includes both “too early” and “too late” detections.
When certain sensor nodes stop functioning, this leads to a lack on information, which has an impact on the quality of predictions; this explains a
sudden increase in the error rate with time. We can conclude from the low
error rate in the absence of some data packets that increasing the number
of trees in the RF helps improve the quality and accuracy of predictions.
As described in Section 5.1.2, a correlation was introduced between
the features. Figure 4 shows the number of successful diagnostics when
the number of tree estimators in the forest changes. As shown in this
figure, the RF method guarantees a 60% success rate when the number of
trees is limited to 5. As this number grows, the accuracy of the method
increases to reach 80% when the number of trees is around 100.
11
Figure 2: Delay in failure detection with respect to the number of simulations.
Figure 3: Error rate in diagnostics with respect to the number of simulations
6
Conclusion
Instead of using wired sensor networks for a diagnostics and health management method, it is possible to use wireless sensors. Such a use can be
motivated by cost reasons or due to specific particularities of the monitored device. In the context of a changing number and quality of provided
features, the use of random forests may be of interest. These random classifiers were recalled with details in this article, and the reason behind their
use in the context of a wireless sensors network monitoring was explained.
Finally, algorithms and first examples of use of these random forests for
diagnostics using a wireless sensor network were provided. The simulation
results showed that the algorithm guarantees a certain level of accuracy
12
Figure 4: Number of successful diagnostics with respect to the number of trees.
even when some data packets are missing.
In future work, the authors’ intention is to compare various tools for
diagnostics to the random forests, either when considering wireless sensor
networks or wired ones. Comparisons will be carried out both theoretical
and practical aspects. The algorithm of random forests, for its part, will
be extended to achieve prognostics and health management too. Finally,
the method for diagnosing an industrial device will be tested on a life size
model, to illustrate the effectiveness of the proposed approach.
References
[1] Yali Amit and Donald Geman. Shape quantization and recognition
with randomized trees. Neural Computation, 9:1545–1588, 1997.
[2] Leo Breiman. Bagging predictors. Machine Learning, 24:123–140,
1996.
[3] Leo Breiman. Using adaptive bagging to debias regressions. Technical
report, Statics Department UCB, 1999.
[4] Leo Breiman. Random forests. Machine Learning, 45:5–32, 2001.
[5] Sourabh Dash and Venkat Venkatasubramanian. Challenges in the
industrial applications of fault diagnostic systems. Computers and
Chemical Engineering, 24:785–791, 2000.
[6] Thomas G. Dietterich. An experimental comparison of three methods
for constructing ensembles of decision trees: Bagging, boosting, and
randomization. Machine Learning, 40:139–157, 2000.
13
[7] Y. Freund and R. Schapire. Experiments with a new boosting algorithm. In Proceedings of the Thirteenth International Conference on
Machine Learning, pages 148–156, 1996.
[8] Giorgio Fumera and Fabio Roli. A theoretical and experimental analysis of linear combiners for multiple classifier systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(6):942–956,
2005.
[9] Tin Kam Ho. The random subspace method for constructing decision forests. IEEE Transactions on Pattern Analysis and Machine
Intelligence, 20(8):832–844, 1998.
[10] Shigeru Kanemoto, Norihiro Yokotsuka, Noritaka Yusa, and
Masahiko Kawabata. Diversity and integration of rotating machine
health monitoring methods. In Chemical Engineering Transactions,
number 33, pages 169–174, Milan, Italy, 2013.
[11] Ramin Moghaddass and Ming Zuo. An integrated framework for
online diagnostic and prognostic health monitoring using a multistate
deterioration process. Reliability Engieneering and System Safety,
124:92–104, 2014.
[12] Robert E. Schapire. A brief introduction to boosting. In Proceedings
of the sixteenth International Joint Conference on Artificial Intelligence, 1999.
[13] A. Sharkey and N. Sharkey. Combining diverse neural nets. The
Knowledge Egineering Review, 12(3):231–247, 1997.
[14] Alexey Tsymbal and Seppo Puuronen. Bagging and boosting with
dynamic integration of classifiers. In The 4th European Conference
on Principles and Practice of Knowledge Discovery in Data Bases
PKDD, pages 116–125, 2000.
[15] K. Tumer and J. Ghosh. Error correlation and error reduction in
ensemble classifiers. Connection Science, 8:385–404, 1996.
[16] A. Verikas, A. Gelzinis, and M. Bacauskiene. Mining data with random forests: A survey and results of new tests. Pattern Recognition,
44:330–349, 2011.
14
| 2cs.AI
|
IMPROVEMENTS TO DEEP CONVOLUTIONAL NEURAL NETWORKS FOR LVCSR
Tara N. Sainath1, Brian Kingsbury1 , Abdel-rahman Mohamed2 , George E. Dahl2 , George Saon1
Hagen Soltau1, Tomas Beran1, Aleksandr Y. Aravkin1, Bhuvana Ramabhadran1
arXiv:1309.1501v3 [cs.LG] 10 Dec 2013
1
IBM T. J. Watson Research Center, Yorktown Heights, NY 10598
2
Department of Computer Science, University of Toronto
1
{tsainath, bedk, gsaon, hsoltau, tberan, saravkin, bhuvana}@us.ibm.com,
2
{asamir, gdahl}@cs.toronto.edu
ABSTRACT
Deep Convolutional Neural Networks (CNNs) are more powerful
than Deep Neural Networks (DNN), as they are able to better reduce
spectral variation in the input signal. This has also been confirmed
experimentally, with CNNs showing improvements in word error
rate (WER) between 4-12% relative compared to DNNs across a variety of LVCSR tasks. In this paper, we describe different methods
to further improve CNN performance. First, we conduct a deep analysis comparing limited weight sharing and full weight sharing with
state-of-the-art features. Second, we apply various pooling strategies that have shown improvements in computer vision to an LVCSR
speech task. Third, we introduce a method to effectively incorporate
speaker adaptation, namely fMLLR, into log-mel features. Fourth,
we introduce an effective strategy to use dropout during Hessian-free
sequence training. We find that with these improvements, particularly with fMLLR and dropout, we are able to achieve an additional
2-3% relative improvement in WER on a 50-hour Broadcast News
task over our previous best CNN baseline. On a larger 400-hour
BN task, we find an additional 4-5% relative improvement over our
previous best CNN baseline.
1. INTRODUCTION
Deep Neural Networks (DNNs) are now the state-of-the-art in acoustic modeling for speech recognition, showing tremendous improvements on the order of 10-30% relative across a variety of small and
large vocabulary tasks [1]. Recently, deep convolutional neural networks (CNNs) [2, 3] have been explored as an alternative type of
neural network which can reduce translational variance in the input
signal. For example, in [4], deep CNNs were shown to offer a 4-12%
relative improvement over DNNs across different LVCSR tasks. The
CNN architecture proposed in [4] was a somewhat vanilla architecture that had been used in computer vision for many years. The goal
of this paper is to analyze and justify what is an appropriate CNN architecture for speech, and to investigate various strategies to improve
CNN results further.
First, the architecture proposed in [4] used multiple convolutional layers with full weight sharing (FWS), which was found to be
beneficial compared to a single FWS convolutional layer. Because
the locality of speech is known ahead of time, [3] proposed the use
of limited weight sharing (LWS) for CNNs in speech. While LWS
has the benefit that it allows each local weight to focus on parts of
the signal which are most confusable, previous work with LWS had
just focused on a single LWS layer [3], [5]. In this work, we do a
detailed analysis and compare multiple layers of FWS and LWS.
Second, there have been numerous improvements to CNNs in
computer vision, particularly for small tasks. For example, using
lp [6] or stochastic pooling [7] provides better generalization than
max pooling used in [4]. Second, using overlapping pooling [8] and
pooling in time [9] also improves generalization to test data. Furthermore, multi-scale CNNs [6], that is, combining outputs from
different layers of the neural network, has also been successful in
computer vision. We explore the effectiveness of these strategies for
larger scale speech tasks.
Third, we investigate using better features for CNNs. Features
for CNNs must exhibit locality in time and frequency. In [4] it
was found that VTLN-warped log-mel features were best for CNNs.
However, speaker adapted features, such as feature space maximum
likelihood linear regression (fMLLR) features [10], typically give
the best performance for DNNs. In [4], the fMLLR transformation
was applied directly to a correlated VTLN-warped log-mel space.
However, no improvement was observed as fMLLR transformations
typically assume uncorrelated features. In this paper, we propose a
methodology to effectively use fMLLR with log-mel features. This
involves transforming log-mel into an uncorrelated space, applying
fMLLR in this space, and then transforming the new features back
to a correlated space.
Finally, we investigate the role of rectified linear units (ReLU)
and dropout for Hessian-free (HF) sequence training [11] of CNNs.
In [12], ReLU+dropout was shown to give good performance for
cross-entropy (CE) trained DNNs but was not employed during HF
sequence-training. However, sequence-training is critical for speech
recognition performance, providing an additional relative gain of 1015% over a CE-trained DNN [11]. During CE training, the dropout
mask changes for each utterance. However, during HF training, we
are not guaranteed to get conjugate directions if the dropout mask
changes for each utterance. Therefore, in order to make dropout
usable during HF, we keep the dropout mask fixed per utterance for
all iterations of conjugate gradient (CG) within a single HF iteration.
Results with the proposed strategies are first explored on a 50-hr
English Broadcast News (BN) task. We find that there is no difference between LWS and FWS with multiple layers for an LVCSR
task. Second, we find that various pooling strategies that gave improvements in computer vision tasks, do not help much in speech.
Third, we observe that improving the CNN input features by including fMLLR gives improvements in WER. Finally, fixing the dropout
mask during the CG iterations of HF lets us use dropout during HF
sequence training and avoids destroying the gains from dropout accrued during CE training. Putting together improvements from fMLLR and dropout, we find that we are able to obtain a 2-3% relative
reduction in WER compared to the CNN system proposed in [4]. In
addition, on a larger 400-hr BN task, we can also achieve a 4-5%
relative improvement in WER.
The rest of this paper is organized as follows. Section 2 describes the basic CNN architecture in [4] that serves as a starting
point to the proposed modifications. In Section 3, we discuss experiments with LWS/FWS, pooling, fMLLR and ReLU+dropout for
HF. Section 4 presents results with the proposed improvements on a
50 and 400-hr BN task. Finally, Section 5 concludes the paper and
discusses future work.
2. BASIC CNN ARCHITECTURE
In this section, we describe the basic CNN architecture that was introduced in [4], as this will serve as the baseline system which we
improve upon. In [4], it was found that having two convolutional layers and four fully connected layers, was optimal for LVCSR tasks.
We found that a pooling size of 3 was appropriate for the first convolutional layer, while no pooling was used in the second layer. Furthermore, the convolutional layers had 128 and 256 feature maps respectively, while the fully connected layers had 1,024 hidden units.
The optimal feature set used was VTLN-warped log-mel filterbank
coefficients, including delta + double delta. Using this architecture
for CNNs, we were able to achieve between 4-12% relative improvement over DNNs across many different LVCSR tasks.
In this paper, we explore feature, architecture and optimization
strategies to improve the CNN results further. Preliminary experiments are performed on a 50-hr English Broadcast News task [11].
The acoustic models are trained on 50 hours from the 1996 and
1997 English Broadcast News Speech Corpora. Results are reported
on the EARS dev04f set. Unless otherwise noted, all CNNs are
trained with cross-entropy, and results are reported in a hybrid setup.
3. ANALYSIS OF VARIOUS STRATEGIES FOR LVCSR
3.1. Optimal Feature Set
Convolutional neural networks require features which are locally
correlated in time and frequency. This implies that Linear Discriminant Analysis (LDA) features, which are very commonly used in
speech, cannot be used with CNNs as they remove locality in frequency [3]. Mel filter-bank (FB) features are one type of speech
feature which exhibit this locality property [?]. We explore if any
additional transformations can be applied to these features to further
improve WER. Table 3 shows the WER as a function of input feature
for CNNs. The following can be observed:
• Using VTLN-warping to help map features into a canonical
space offers improvements.
• Using fMLLR to further speaker-adapt the input does not
help. One reason could be that fMLLR assumes the data is
well modeled by a diagonal model, which would work best
with decorrelated features. However, the mel FB features are
highly correlated.
• Using delta and double-delta (d + dd) to capture further timedynamic information in the feature helps.
• Using energy does not provide improvements.
In conclusion, it appears VTLN-warped mel FB + d+dd is the
optimal input feature set to use. This feature set is used for the remainder of the experiments, unless otherwise noted.
Feature
Mel FB
VTLN-warped mel FB
VTLN-warped mel FB + fMLLR
VTLN-warped mel FB + d + dd
VTLN-warped mel FB + d + dd + energy
WER
21.9
21.3
21.2
20.7
21.0
Table 1. WER as a function of input feature
3.2. Number of Convolutional vs. Fully Connected Layers
Most CNN work in image recognition makes use of a few convolutional layers before having fully connected layers. The convolutional layers are meant to reduce spectral variation and model spectral correlation, while the fully connected layers aggregate the local
information learned in the convolutional layers to do class discrimination. However, the CNN work done thus far in speech [3] introduced a novel framework for modeling spectral correlations, but this
framework only allowed for a single convolutional layer. We adopt
a spatial modeling approach similar to the image recognition work,
and explore the benefit of including multiple convolutional layers.
Table 2 shows the WER as a function of the number of convolutional and fully connected layers in the network. Note that for
each experiment, the number of parameters in the network is kept the
same. The table shows that increasing the number of convolutional
layers up to 2 helps, and then performance starts to deteriorate. Furthermore, we can see from the table that CNNs offer improvements
over DNNs for the same input feature set.
# of Convolutional vs.
Fully Connected Layers
No conv, 6 full (DNN)
1 conv, 5 full
2 conv, 4 full
3 conv, 3 full
WER
24.8
23.5
22.1
22.4
Table 2. WER as a Function of # of Convolutional Layers
3.3. Number of Hidden Units
CNNs explored for image recognition tasks perform weight sharing across all pixels. Unlike images, the local behavior of speech
features in low frequency is very different than features in high frequency regions. [3] addresses this issue by limiting weight sharing
to frequency components that are close to each other. In other words,
low and high frequency components have different weights (i.e. filters). However, this type of approach limits adding additional convolutional layers [3], as filter outputs in different pooling bands are not
related. We argue that we can apply weight sharing across all time
and frequency components, by using a large number of hidden units
compared to vision tasks in the convolutional layers to capture the
differences between low and high frequency components. This type
of approach allows for multiple convolutional layers, something that
has thus far not been explored before in speech.
Table 3 shows the WER as a function of number of hidden units
for the convolutional layers. Again the total number of parameters
in the network is kept constant for all experiments. We can observe
that as we increase the number of hidden units up to 220, the WER
steadily decreases. We do not increase the number of hidden units
past 220 as this would require us to reduce the number of hidden
units in the fully connected layers to be less than 1,024 in order to
keep the total number of network parameters constant. We have observed that reducing the number of hidden units from 1,024 results in
an increase in WER. We were able to obtain a slight improvement by
using 128 hidden units for the first convolutional layer, and 256 for
the second layer. This is more hidden units in the convolutional layers than are typically used for vision tasks [2], [9], as many hidden
units are needed to capture the locality differences between different
frequency regions in speech.
Number of Hidden Units
64
128
220
128/256
WER
24.1
23.0
22.1
21.9
Table 3. WER as a function of # of hidden units
3.4. Limited vs. Full Weight Sharing
In speech recognition tasks, the characteristics of the signal in lowfrequency regions are very different than in high frequency regions.
This allows a limited weight sharing (LWS) approach to be used
for convolutional layers [3], where weights only span a small local
region in frequency. LWS has the benefit that it allows each local
weight to focus on parts of the signal which are most confusable, and
perform discrimination within just that small local region. However,
one of the drawbacks is that it requires setting by hand the frequency
region each filter spans. Furthermore, when many LWS layers are
used, this limits adding additional full-weight sharing convolutional
layers, as filter outputs in different bands are not related and thus the
locality constraint required for convolutional layers is not preserved.
Thus, most work with LWS up to this point has looked at LWS with
one layer [3], [5].
Alternatively, in [4], a full weight sharing (FWS) idea in convolutional layers was explored, similar to what was done in the image
recognition community. With that approach, multiple convolutional
layers were allowed and it was shown that adding additional convolutional layers was beneficial. In addition, using a large number
of hidden units in the convolutional layers better captures the differences between low and high frequency components.
Since multiple convolutional layers are critical for good performance in WER, in this paper we explore doing LWS with multiple
layers. Specifically, the activations from one LWS layer have locality preserving information, and can be fed into another LWS layer.
Results comparing LWS and FWS are shown in Table 4. Note these
results are with stronger VTLN-warped log-mel+d+dd features, as
opposed to previous LWS work which used simpler log-mel+d+dd.
For both LWS and FWS, we used 2 convolutional layers, as this
was found in [4] to be optimal. First, notice that as we increase the
number of hidden units for FWS, there is an improvement in WER,
confirming our belief that having more hidden units with FWS is
important to help explain variations in frequency in the input signal.
Second, we find that if we use LWS but match the number of parameters to FWS, we get very slight improvements in WER (0.1%). It
seems that both LWS and FWS offer similar performance. Because
FWS is simpler to implement, as we do not have to choose filter locations for each limited weight ahead of time, we prefer to use FWS.
Because FWS with 5.6M parameters (256/256 hidden units per convolution layer) gives the best tradeoff between WER and number of
parameters, we use this setting for subsequent experiments.
3.5. Pooling Experiments
Pooling is an important concept in CNNs which helps to reduce
spectral variance in the input features. Similar to [3], we explore
Method
FWS
FWS
FWS
FWS
LWS
LWS
Hidden Units in Conv Layers
128/256
256/256
384/384
512/512
128/256
256/256
Params
5.1M
5.6M
7.6M
10.0M
5.4M
6.6M
WER
19.3
18.9
18.7
18.5
18.8
18.7
Table 4. Limited vs. Full Weight Sharing
pooling in frequency only and not time, as this was shown to be optimal for speech. Because pooling can be dependent on the input
sampling rate and speaking style, we compare the best pooling size
for two different 50 hr tasks with different characteristics, namely
8kHZ speech - Switchboard Telephone Conversations (SWB) and
16kHz speech, English Broadcast News (BN). Table 5 indicates that
not only is pooling essential for CNNs, for all tasks pooling=3 is the
optimal pooling size. Note that we did not run the experiment with
no pooling for BN, as it was already shown to not help for SWB.
No pooling
pool=2
pool=3
pool=4
WER-SWB
23.7
23.4
22.9
22.9
WER- BN
20.7
20.7
21.4
Table 5. WER vs. pooling
3.5.1. Type of Pooling
Pooling is an important concept in CNNs which helps to reduce
spectral variance in the input features. The work in [4] explored
using max pooling as the pooling strategy. Given a pooling region
Rj and a set of activations {a1 , . . . a|Rj | } ∈ Rj , the operation for
max-pooling is shown in Equation 1.
sj = max ai
i∈Rj
(1)
One of the problems with max-pooling is that it can overfit the
training data, and does not necessarily generalize to test data. Two
pooling alternatives have been proposed to address some of the problems with max-pooling, lp pooling [6] and stochastic pooling [7].
lp pooling looks to take a weighted average of activations ai in
pooling region Rj , as shown in Equation 2.
1
p
X p
sj =
ai
(2)
i∈Rj
p = 1 can be seen as a simple form of averaging while p = ∞ corresponds to max-pooling. One of the problems with average pooling
is that all elements in the pooling region are considered, so areas of
low-activations may downweight areas of high activation. lp pooling
for p > 1 is seen as a tradeoff between average and max-pooling. lp
pooling has shown to give large improvements in error rate in computer vision tasks compared to max pooling [6].
Stochastic pooling is another pooling strategy that addresses the
issues of max and average pooling. In stochastic pooling, first a set
of probabilities p for each region j is formed by normalizing the
activations across that region, as shown in Equation 3.
ai
pi = P
(3)
k∈Rj ak
sj = al where l ∼ P (p1 , p2 , . . . p|Rj | )
(4)
A multinomial distribution is created from the probabilities and
the distribution is sampled based on p to pick the location l and
corresponding pooled activation al . This is shown by Equation 4.
Stochastic pooling has the advantages of max-pooling but prevents
overfitting due to the stochastic component. Stochastic pooling has
also shown huge improvements in error rate in computer vision [7].
Given the success of lp and stochastic pooling, we compare both
of these strategies to max-pooling on an LVCSR task. Results for
the three pooling strategies are shown in Table 6. Stochastic pooling
seems to provide improvements over max and lp pooling, though the
gains are slight. Unlike vision tasks, in appears that in tasks such as
speech recognition which have a lot more data and thus better model
estimates, generalization methods such as lp and stochastic pooling
do not offer great improvements over max pooling.
Method
Max Pooling
Stochastic Pooling
lp pooing
WER
18.9
18.8
18.9
Table 6. Results with Different Pooling Types
3.5.2. Overlapping Pooling
The work presented in [4] did not explore overlapping pooling in
frequency. However, work in computer vision has shown that overlapping pooling can improve error rate by 0.3-0.5% compared to
non-overlapping pooling [8]. One of the motivations of overlapping
pooling is to prevent overfitting.
Table 7 compares overlapping and non-overlapping pooling on
an LVCSR speech task. One thing to point out is that because overlapping pooling has many more activations, in order to keep the experiment fair, the number of parameters between non-overlapping
and overlapping pooling was matched. The table shows that there
is no difference in WER between overlapping or non-overlapping
pooling. Again, on tasks with a lot of data such as speech, regularization mechanisms such as overlapping pooling, do not seem to
help compared to smaller computer vision tasks.
Method
Pooling No Overlap
Pooling with Overlap
WER
18.9
18.9
Table 7. Pooling With and Without Overlap
3.5.3. Pooling in Time
Most previous CNN work in speech explored pooling in frequency
only ([4], [3], [5]), though [13] did investigate CNNs with pooling
in time, but not frequency. However, most CNN work in vision performs pooling in both space and time [6], [8]. In this paper, we do a
deeper analysis of pooling in time for speech. One thing we must ensure with pooling in time in speech is that there is overlap between
the pooling windows. Otherwise, pooling in time without overlap
can be seen as subsampling the signal in time, which degrades performance. Pooling in time with overlap can thought of as a way to
smooth out the signal in time, another form of regularization.
Table 8 compares pooling in time for both max, stochastic and
lp pooling. We see that pooling in time helps slightly with stochastic and lp pooling. However, the gains are not large, and are likely
to be diminished after sequence training. It appears that for large
tasks with more data, regularizations such as pooling in time are not
helpful, similar to other regularization schemes such as lp /stochastic
pooling and pooling with overlap in frequency.
Method
Baseline
Pooling in Time, Max
Pooling in Time, Stochastic
Pooling in Time, lp
WER
18.9
18.9
18.8
18.8
Table 8. Pooling in Time
3.6. Incorporating Speaker-Adaptation into CNNs
In this section, we describe various techniques to incorporate speaker
adapted features into CNNs.
3.6.1. fMLLR Features
Since CNNs model correlation in time and frequency, they require
the input feature space to have this property. This implies that commonly used feature spaces, such as Linear Discriminant Analysis,
cannot be used with CNNs. In [4], it was shown that a good feature
set for CNNs was VTLN-warped log-mel filter bank coefficients.
Feature-space maximum likelihood linear regression (fMLLR)
[10] is a popular speaker-adaptation technique used to reduce variability of speech due to different speakers. The fMLLR transformation applied to features assumes that either features are uncorrelated
and can be modeled by diagonal covariance Gaussians, or features
are correlated and can be modeled by a full covariance Gaussians.
While correlated features are better modeled by full-covariance
Gaussians, full-covariance matrices dramatically increase the number of parameters per Gaussian component, oftentimes leading to parameter estimates which are not robust. Thus fMLLR is most commonly applied to a decorrelated space. When fMLLR was applied
to the correlated log-mel feature space with a diagonal covariance
assumption, little improvement in WER was observed [4].
Semi-tied covariance matrices (STCs) [14] have been used to
decorrelate the feature space so that it can be modeled by diagonal
Gaussians. STC offers the added benefit in that it allows a few full
covariance matrices to be shared over many distributions, while each
distribution has its own diagonal covariance matrix.
In this paper, we explore applying fMLLR to correlated features
(such as log-mel) by first decorrelating them such that we can appropriately use a diagonal Gaussian approximation with fMLLR. We
then transform the fMLLR features back to the correlated space so
that they can be used with CNNs.
The algorithm to do this is described as follows. First, starting
from correlated feature space f , we estimate an STC matrix S to
map the features into an uncorrelated space. This mapping is given
by transformation 5
Sf
(5)
Next, in the uncorrelated space, an fMLLR M matrix is estimated, and is applied to the STC transformed features. This is shown
by transformation 6
MSf
(6)
Thus far, transformations 5 and 6 demonstrate standard transformations in speech with STC and fMLLR matrices. However, in
speech recognition tasks, once features are decorrelated with STC,
further transformation (i.e. fMLLR, fBMMI) are applied in this
decorrelated space, as shown in transformation 6. The features are
never transformed back into the correlated space.
However for CNNs, using correlated features is critical. By multiplying the fMLLR transformed features by an inverse STC matrix,
we can map the decorrelated fMLLR features back to the correlated
space, so that they can be used with a CNN. The transformation we
propose is given in transformation 7
S−1 MSf
(7)
3.7. Multi-scale CNN/DNNs
The information captured in each layer of a neural network varies
from more general to more specific concepts. For example, in speech
lower layers focus more on speaker adaptation and higher layers focus more on discrimination. In this section, we look to combine
inputs from different layers of a neural network to explore if complementarity between different layers could potentially improve results further. This idea, known as multi-scale neural networks [6]
has been explored before for computer vision.
Specifically, we look at combining the output from 2 fullyconnected and 2 convolutional layers. This output is fed into 4 more
fully-connected layers, and the entire network is trained jointly. This
can be thought of as combining features generated from a DNN-style
and CNN-style network. Note for this experiment, the same input
feature, (i.e., log-mel features) were used for both DNN and CNN
streams. Results are shown in Table 5. A small gain is observed
by combining DNN and CNN features, again much smaller than
gains observed in computer vision. However, given that a small
improvement comes at the cost of such a large parameter increase,
and the same gains can be achieved by increasing feature maps in the
CNN alone (see Table 4), we do not see huge value in this idea. It
is possible however, that combining CNNs and DNNs with different
types of input features which are complimentary, could potentially
show more improvements.
3.8. I-vectors
order Hessian-free (HF) optimization method is critical for performance gains with sequence training compared to SGD-style optimization, though not as important for CE-training [11].
Rectified Linear Units (ReLU) and Dropout [16] have recently
been proposed as a way to regularize large neural networks. In fact,
ReLU+dropout was shown to provide a 5% relative reduction in
WER for cross-entropy-trained DNNs on a 50-hr English Broadcast
News LVCSR task [12]. However, subsequent HF sequence training
[11] that used no dropout erased some of these gains, and performance was similar to a DNN trained with a sigmoid non-linearity
and no dropout. Given the importance of sequence-training for neural networks, in this paper, we propose a strategy to make dropout
effective during HF sequence training. Results are presented in the
context of CNNs, though this algorithm can also be used with DNNs.
3.9.1. Hessian-Free Training
One popular 2nd order technique for DNNs is Hessian-free (HF) optimization [17]. Let θ denote the network parameters, L(θ) denote a
loss function, ∇L(θ) denote the gradient of the loss with respect to
the parameters, d denote a search direction, and B(θ) denote a Hessian approximation matrix characterizing the curvature of the loss
around θ. The central idea in HF optimization is to iteratively form
a quadratic approximation to the loss and to minimize this approximation using conjugate gradient (CG).
L(θ + d) ≈ L(θ) + ∇L(θ)T d +
1 T
d B(θ)d
2
(8)
During each iteration of the HF algorithm, first, the gradient is
computed using all training examples. Second, since the Hessian
cannot be computed exactly, the curvature matrix B is approximated
by a damped version of the Gauss-Netwon matrix G(θ) + λI, where
λ is set via Levenberg-Marquardt. Then, Conjugate gradient (CG)
is run for multiple-iterations until the relative per-iteration progress
made in minimizing the CG objective function falls below a certain
tolerance. During each CG iteration, Gauss-Newton matrix-vector
products are computed over a sample of the training data.
3.8.1. Results
3.9.2. Dropout
Results with the proposed fMLLR idea are shown in Table 9. Notice
that by applying fMLLR in a decorrelated space, we can achieve a
0.5% improvement over the baseline VTLN-warped log-mel system.
This gain was not possible in [4] when fMLLR was applied directly
to correlated log-mel features.
Dropout is a popular technique to prevent over-fitting during neural network training [16]. Specifically, during the feed-forward operation in neural network training, dropout omits each hidden unit
randomly with probability p. This prevents complex co-adaptations
between hidden units, forcing hidden units to not depend on other
units. Specifically, using dropout the activation yl at layer l is given
by Equation 9, where yl−1 is the input into layer l, Wl is the weight
for layer l, b is the bias, f is the non-linear activation function (i.e.
ReLU) and r is a binary mask, where each entry is drawn from a
Bernoulli(p) distribution with probability p of being 1. Since dropout
1
is not used during decoding, the factor 1−p
used during training ensures that at test time, when no units are dropped out, the correct
total input will reach each layer.
1
Wl (rl−1 ∗ yl−1 ) + bl
(9)
yl = f
1−p
Feature
VTLN-warped log-mel+d+dd
proposed fMLLR + VTLN-warped log-mel+d+dd
WER
18.8
18.3
Table 9. WER With Improved fMLLR Features
3.9. Rectified Linear Units and Dropout
At IBM, two stages of Neural Network training are performed. First,
DNNs are trained with a frame-discriminative stochastic gradient descent (SGD) cross-entropy (CE) criterion. Second, CE-trained DNN
weights are re-adjusted using a sequence-level objective function
[15]. Since speech is a sequence-level task, this objective is more
appropriate for the speech recognition problem. Numerous studies
have shown that sequence training provides an additional 10-15%
relative improvement over a CE trained DNN [11], [4]. Using a 2nd
3.9.3. Combining HF + Dropout
Conjugate gradient tries to minimize the quadratic objective function given in Equation 8. For each CG iteration, the damped GaussNetwon matrix, G(θ), is estimated using a subset of the training
data. This subset is fixed for all iterations of CG. This is because if
the data used to estimate G(θ) changes, we are no longer guaranteed
to have conjugate search directions from iteration to iteration.
Recall that dropout produces a random binary mask for each presentation of each training instance. However, in order to guarantee
good conjugate search directions, for a given utterance, the dropout
mask per layer cannot change during CG. The appropriate way to
incorporate dropout into HF is to allow the dropout mask to change
for different layers and different utterances, but to fix it for all CG
iterations while working with a specific layer and specific utterance
(although the masks can be refreshed between HF iterations).
As the number of network parameters is large, saving out the
dropout mask per utterance and layer is infeasible. Therefore, we
randomly choose a seed for each utterance and layer and save this
out. Using a randomize function with the same seed guarantees that
the same dropout mask is used per layer/per utterance.
3.9.4. Results
We experimentally confirm that using a dropout probability of p =
0.5 in the 3rd and 4th layers is reasonable, and the dropout in all
other layers is zero. For these experiments, we use 2K hidden units
for the fully connected layers, as this was found to be more beneficial
with dropout compared to 1K hidden units [12].
Results with different dropout techniques are shown in Table 10.
Notice that if no dropout is used, the WER is the same as sigmoid, a
result which was also found for DNNs in [12]. By using dropout but
fixing the dropout mask per utterance across all CG iterations, we
can achieve a 0.6% improvement in WER. Finally, if we compare
this to varying the dropout mask per CG training iteration, the WER
increases. Further investigation in Figure 1 shows that if we vary the
dropout mask, there is slow convergence of the loss during training,
particularly when the number of CG iterations increases during the
later part of HF training. This shows experimental evidence that if
the dropout mask is not fixed, we cannot guarantee that CG iterations
produce conjugate search directions for the loss function.
Non-Linearity
Sigmoid
ReLU, No Dropout
ReLU, Dropout Fixed for CG Iterations
ReLU, Dropout Per CG Iteration
WER
15.7
15.6
15.0
15.3
Table 10. WER of HF Sequence Training + Dropout
0.16
training is that it is more closely linked to the speech recognition
objective function compared to cross-entropy. Using this fact, we
explore how many iterations of CE are actually necessary before
moving to HF training. Table 11 shows the WER for different CE
iterations, and the corresponding WER after HF training. Note that
HF training is started and lattices are dumped using the CE weight
that is stopped at. Notice that just by annealing two times, we can
achieve the same WER after HF training, compared to having the
CE weights converge. This points to the fact that spending too much
time in CE is unnecessary. Once the weights are in a relatively decent space, it is better to just jump to HF sequence training which is
more closely matched to the speech objective function.
CE Iter
4
6
8
13
# Times Annealed
1
2
3
7
CE WER
20.8
19.8
19.4
18.8
HF WER
15.3
15.0
15.0
15.0
Table 11. HF Seq. Training WER Per CE Iteration
4. RESULTS
In this section, we analyze CNN performance with the additions proposed in Section 3, namely fMLLR and ReLU + dropout. Results are
shown on both a 50 and 400 hr English Broadcast News task.
4.1. 50-hour English Broadcast News
4.1.1. Experimental Setup
Following the setup in [4], the hybrid DNN is trained using speakeradapted, VTLN+fMLLR features as input, with a context of 9
frames. A 5-layer DNN with 1,024 hidden units per layer and a
sixth softmax layer with 2,220 output targets is used. All DNNs are
pre-trained, followed by CE training and then HF sequence-training
[11]. The DNN-based feature system is also trained with the same
architecture, but uses 512 output targets. A PCA is applied on top of
the DNN before softmax to reduce the dimensionality from 512 to
40. Using these DNN-based features, we apply maximum-likelihood
GMM training, followed by feature and model-space discriminative
training using the BMMI criterion. In order to fairly compare results
to the DNN hybrid system, no MLLR is applied to the DNN featurebased system. The old CNN systems are trained with VTLN-warped
log-mel+d+dd features, and a sigmoid non-linearity. The proposed
CNN-based systems are trained with the fMLLR features described
in Section 3.6, and ReLU+Dropout discussed in Section 3.9.
Dropout Fixed Per CG
Dropout Varied Per CG
0.15
4.1.2. Results
Loss
0.14
0.13
0.12
0.11
0.1
0
5
10
15
20
25
HF Iteration
Fig. 1. Held-out Loss With Dropout Techniques
Finally, we explore if we can reduce the number of CE iterations
before moving to sequence training. A main advantage of sequence
Table 12 shows the performance of proposed CNN-based feature and
hybrid systems, and compares this to DNN and old CNN systems.
The proposed CNN hybrid system offers between a 6-7% relative
improvement over the DNN hybrid, and a 2-3% relative improvement over the old CNN hybrid system. While the proposed CNNbased feature system offers a modest 1% improvement over the old
CNN-based feature system, this slight improvements with featurebased system is not surprising all. We have observed huge relative
improvements in WER (10-12%) on a hybrid sequence trained DNN
with 512 output targets, compared to a hybrid CE-trained DNN.
However, after features are extracted from both systems, the gains
diminish down to 1-2% relative [18]. Feature-based systems use the
neural network to learn a feature transformation, and seem to saturate in performance even when the hybrid system used to extract the
features improves. Thus, as the table shows, there is more potential
to improve a hybrid system as opposed to a feature-based system.
model
Hybrid DNN
Old Hybrid CNN [4]
Proposed Hybrid CNN
DNN-based Features
Old CNN-based Features [4]
Proposed CNN-based Features
dev04f
16.3
15.8
15.4
17.4
15.5
15.3
rt04
15.8
15.0
14.7
16.6
15.2
15.1
Table 12. WER on Broadcast News, 50 hours
4.2. 400 hr English Broadcast News
[1] G. Hinton, L. Deng, D. Yu, G. Dahl, A. Mohamed, N. Jaitly, A. Senior,
V. Vanhoucke, P. Nguyen, T. N. Sainath, and B. Kingsbury, “Deep
Neural Networks for Acoustic Modeling in Speech Recognition,” IEEE
Signal Processing Magazine, vol. 29, no. 6, pp. 82–97, 2012.
[2] Y. LeCun and Y. Bengio, “Convolutional Networks for Images, Speech,
and Time-series,” in The Handbook of Brain Theory and Neural Networks. MIT Press, 1995.
[3] O. Abdel-Hamid, A. Mohamed, H. Jiang, and G. Penn, “Applying
Convolutional Neural Network Concepts to Hybrid NN-HMM Model
for Speech Recognition,” in Proc. ICASSP, 2012.
[4] T.N. Sainath, A. Mohamed, B. Kingsbury, and B. Ramabhadran, “Deep
Convolutional Neural Networks for LVCSR,” in Proc. ICASSP, 2013.
[5] L. Deng, O. Abdel-Hamid, and D. Yu, “A Deep Convolutional Neural
Network using Heterogeneous Pooling for Trading Acoustic Invariance
with Phonetic Confusion,” in Proc. ICASSP, 2013.
[6] P. Sermanet, S. Chintala, and Y. LeCun, “Convolutional neural networks applied to house numbers digit classification,” in Pattern Recognition (ICPR), 2012 21st International Conference on, 2012.
4.2.1. Experimental Setup
We explore scalability of the proposed techniques on 400 hours of
English Broadcast News [15]. Development is done on the DARPA
EARS dev04f set. Testing is done on the DARPA EARS rt04
evaluation set. The DNN hybrid system uses fMLLR features, with
a 9-frame context, and use five hidden layers each containing 1,024
sigmoidal units. The DNN-based feature system is trained with 512
output targets, while the hybrid system has 5,999 output targets. Results are reported after HF sequence training. Again, the proposed
CNN-based systems are trained with the fMLLR features described
in Section 3.6, and ReLU+Dropout discussed in Section 3.9.
4.2.2. Results
Table 13 shows the performance of the proposed CNN system compared to DNNs and the old CNN system. While the proposed 512hybrid CNN-based feature system did improve (14.1 WER) over the
old CNN (14.8 WER), performance slightly deteriorates after CNNbased features are extracted from the network. However, the 5,999hybrid CNN offers between a 13-16% relative improvement over
the DNN hybrid system, and between a 4-5% relative improvement
over the old CNN-based features systems. This helps to strengthen
the hypothesis that hybrid CNNs have more potential for improvement, and the proposed fMLLR and ReLU+dropout techniques provide substantial improvements over DNNs and CNNs with a sigmoid
non-linearity and VTLN-warped log-mel features.
model
Hybrid DNN
DNN-based Features
Old CNN-based Features [4]
Proposed CNN-based Features
Proposed Hybrid CNN
6. REFERENCES
dev04f
15.1
15.3
13.4
13.6
12.7
rt04
13.4
13.5
12.2
12.5
11.7
Table 13. WER on Broadcast News, 400 hrs
5. CONCLUSIONS
In this paper, we explored various strategies to improve CNN performance. We incorporated fMLLR into CNN features, and also made
dropout effective after HF sequence training. We also explored various pooling and weight sharing techniques popular in computer vision, but found they did not offer improvements for LVCSR tasks.
Overall, with the proposed fMLLR+dropout ideas, we were able to
improve our previous best CNN results by 2-5% relative.
[7] M. Zeiler and R. Fergus, “Stochastic Pooling for Regularization of
Deep Convolutional Neural Networks,” in Proc. of the International
Conference on Representaiton Learning (ICLR), 2013.
[8] A. Krizhevsky, I. Sutskever, and G. Hinton, “Imagenet Classification
with Deep Convolutional Neural Networks,” in Advances in Neural
Information Processing Systems, 2012.
[9] Y. LeCun, F. Huang, and L. Bottou, “Learning Methods for Generic
Object Recognition with Invariance to Pose and Lighting,” in Proc.
CVPR, 2004.
[10] M.J.F. Gales, “Maximum likelihood linear transformations for HMMbased Speech Recognition,” Computer Speech and Language, vol. 12,
no. 2, pp. 75–98, 1998.
[11] B. Kingsbury, T. N. Sainath, and H. Soltau, “Scalable Minimum Bayes
Risk Training of Deep Neural Network Acoustic Models Using Distributed Hessian-free Optimization,” in Proc. Interspeech, 2012.
[12] G.E. Dahl, T.N. Sainath, and G.E. Hinton, “Improving Deep Neural
Networks for LVCSR Using Rectified Linear Units and Dropout,” in
Proc. ICASSP, 2013.
[13] A. Waibel, T. Hanazawa, G. Hinton, K. Shikano, and K.J Lang,
“Phoneme Recognition using Time-delay Neural Networks,” IEEE
Transactions on Acoustics, Speech and Signal Processing, vol. 37, no.
3, pp. 328–339, 1989.
[14] M.J.F. Gales, “Semi-tied Covariance Matrices for Hidden Markov
Models,” IEEE Transactions on Speech and Audio Processing, vol.
7, pp. 272–281, 1999.
[15] B. Kingsbury, “Lattice-Based Optimization of Sequence Classification
Criteria for Neural-Network Acoustic Modeling,” in Proc. ICASSP,
2009.
[16] G.E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, and
R. Salakhutdinov, “Improving Neural Networks by Preventing CoAdaptation of Feature Detectors,” The Computing Research Repository
(CoRR), vol. 1207.0580, 2012.
[17] J. Martens, “Deep learning via Hessian-free optimization,” in Proc.
Intl. Conf. on Machine Learning (ICML), 2010.
[18] T. N. Sainath, B. Kingsbury, and B. Ramabhadran, “Auto-Encoder
Bottleneck Features Using Deep Belief Networks,” in Proc. ICASSP,
2012.
| 9cs.NE
|
Model Identification via Physics Engines for Improved Policy Search
arXiv:1710.08893v1 [cs.RO] 24 Oct 2017
Shaojun Zhu, Andrew Kimmel, Kostas E. Bekris and Abdeslam Boularias
Abstract— This paper presents a practical approach for
identifying unknown mechanical parameters, such as mass
and friction models of manipulated rigid objects or actuated
robotic links, in a succinct manner that aims to improve the
performance of policy search algorithms. Key features of this
approach are the use of off-the-shelf physics engines and the
adaptation of a black-box Bayesian optimization framework
for this purpose. The physics engine is used to reproduce in
simulation experiments that are performed on a real robot,
and the mechanical parameters of the simulated system are
automatically fine-tuned so that the simulated trajectories
match with the real ones. The optimized model is then used for
learning a policy in simulation, before safely deploying it on the
real robot. Given the well-known limitations of physics engines
in modeling real-world objects, it is generally not possible to
find a mechanical model that reproduces in simulation the real
trajectories exactly. Moreover, there are many scenarios where
a near-optimal policy can be found without having a perfect
knowledge of the system. Therefore, searching for a perfect
model may not be worth the computational effort in practice.
The proposed approach aims then to identify a model that
is good enough to approximate the value of a locally optimal
policy with a certain confidence, instead of spending all the
computational resources on searching for the most accurate
model. Empirical evaluations, performed in simulation and on
a real robotic manipulation task, show that model identification
via physics engines can significantly boost the performance of
policy search algorithms that are popular in robotics, such as
TRPO, PoWER and PILCO, with no additional real-world data.
I. INTRODUCTION
This paper presents an approach for model identification
by exploiting the availability of off-the-shelf physics engines
that are used for simulating dynamics of robots and objects
they interact with. There are many examples of popular
physics engines that are becoming increasingly efficient [1]–
[6]. Physics engines take as inputs mechanical and mesh
models of objects in a particular environment, in addition to
forces and torques applied to them at different time-steps,
and return predictions of how the objects would move.
The accuracy of the predicted motions depends on several
factors. The first one is the limitation of the mathematical
model used by the engine (e.g., Coulomb’s law of friction).
The second factor is the accuracy of the numerical algorithm
used for solving the differential equations of motion. Finally,
the prediction depends on the accuracy of the mechanical
parameters of the robot and the objects’ models, such as
mass, friction and elasticity. In this work, we focus on this
The
puter
authors
Science,
are
with
the
Department
of
Rutgers
University,
New
Jersey,
{shaojun.zhu,ask139,kostas.bekris,ab1544}
@cs.rutgers.edu
ComUSA.
The Baxter robot needs to pick up the bottle but it cannot
reach it, while the Motoman robot can. The Motoman gently pushes
the object locally without risking to lose it. From observed motions,
mechanical properties of the object are identified via a physics
engine. The object is then pushed into Baxter’s workspace using a
policy learned in simulation with the identified property parameters.
Fig. 1.
last factor and propose a method for improving the accuracy
of mechanical parameters used in physical simulations.
For motivation, consider the setup illustrated in Figure 1,
where a static robot (Motoman) assists another one (Baxter)
to reach and pick up a desired object (a bottle). The object
is known and both robots have the capability to pick it up.
However, the object can be reached only by Motoman and not
by Baxter. And due to the considerable distance between the
two static robots, the intersection of their reachable workspace
is empty, which restricts the execution of a direct hand-off.
In this case, the Motoman robot must learn an action, such as
rolling or sliding, that would move the bottle to a distant target
zone. If the robot simply executes the maximum velocity push
on the object, the result causes the object to fall off the table.
Similarly, if the object is rolled too slowly, it could end up
stuck in the region between the two robot’s workspaces and
neither of them could reach it. Both outcomes are undesirable
as they would ruin the autonomy of the system and require a
human intervention to reset the scene or perform the action.
This example highlights the need for identifying an object’s
mechanical model to predict where the object would end up
on the table given different initial velocities. An optimal
velocity could be derived accordingly using simulations.
The technique presented in this paper aims at improving the
accuracy of the mechanical parameters used in physics engines
in order to perform a given robotic task. Given recorded
real trajectories of the object in question, we search for the
best model parameters so that the simulated trajectories are
as close as possible to the observed real trajectories. This
search is performed through an anytime black-box Bayesian
optimization, where a probability distribution (belief) on
the optimal model is repeatedly updated. When the time
consumed by the optimization exceeds a certain preallocated
time budget, the optimization is halted and the model with
the highest probability is returned. A policy search subroutine
takes over the returned model and finds a policy that aims
to perform the task. The policy search subroutine could be a
control method, such as LQR, or a reinforcement learning
(RL) algorithm that runs on the physics engine with the
identified model instead of the real world for the sack of
data-efficiency and also for safety. The obtained policy is
then deployed on the robot, run in the real world and the
new observed trajectories are handed back again to the model
identification module, to repeat the same process.
The question that arises here is: how accurate should the
identified model be in order to find the optimal policy? Instead
of spending a significant amount of time searching for the
most accurate model, it would be useful to stop the search
whenever a model that is sufficiently accurate for the task at
hand is found. Answering this question exactly is difficult,
because that would require knowing in advance the optimal
policy for each model, in which case the model identification
process can be stopped simply when there is a consensus
among the most likely models on which policy is optimal.
Our solution to this problem is motivated by a key quality
that is desired in robot RL algorithms. To ensure safety,
most robot RL algorithms constrain the changes in the
policy between two iterations to be minimal and gradual.
For instance, both Relative-Entropy Policy Search (REPS)
and Trust Region Policy Optimization (TRPO) algorithms
guarantee that the KL distance between an updated policy and
a previous one in a learning loop is bounded by a predefined
constant. Therefore, one can in practice use the previous best
policy as a proxy to verify if there is a consensus among the
most likely models on the best policy in the next iteration
of the policy search. This is justified by the fact that the
new policies are not too different from the previous one in
a policy search. The model identification process is stopped
whenever the most likely models predict almost the same
value for the previous policy. In other terms, if all models that
have reached a high probability in the anytime optimization
predict the same value for the previous policy, then any of
these models could be used for searching for the next policy.
While the current paper does not provide theoretical
guarantees of the proposed method, our empirical evaluations
show that it can indeed improve the performance of several
RL algorithms. The first part of the experiments is performed
on systems in the MuJoCo simulator [3]. The second part is
performed on the robotic task shown in Figure 1.
II. R ELATED W ORK
Two high-level approaches exist for learning to perform
tasks in systems with unknown parameters: model-free and
model-based ones. Model-free methods search for a policy
that best solves the task without explicitly learning the
system’s dynamics [7]–[9]. Model-free methods are accredited
with the recent success stories of RL, in video games for
example [10]. In robot learning, the REPS algorithm was
used to successfully train a robot to play table tennis [11].
The PoWER algorithm [12] is another model-free policy
search approach widely used for learning motor skills. The
Trust Region Policy Optimization (TRPO) algorithm [13] is
arguably the state-of-the-art model-free RL technique. Policy
search can also be achieved through Bayesian optimization
and has been used for gait optimization [14], where Central
Pattern Generators are a popular policy parameterization [15].
Model-free methods, however, tend to require a lot of
training data and can also jeopardize the safety of a robot.
Model-based approaches are alternatives that explicitly learn
the unknown parameters of the system, and search for
an optimal policy accordingly. There are many examples
of model-based approaches for robotic manipulation [16]–
[20], some of which have used physics-based simulation
to predict the effects of pushing flat objects on a smooth
surface [16]. A nonparametric approach was employed for
learning the outcome of pushing large objects [18]. For
general-purpose model-based RL, the PILCO algorithm has
been proven efficient in utilizing a small amount of data to
learn dynamical models and optimal policies [21]. Several
cognitive models that combine such Bayesian inference with
approximate knowledge of Newtonian physics have been
proposed recently [22]–[24]. A common characteristic of
many model-based methods is the fact that they learn a
transition function using a purely statistical approach without
taking advantage of the known equations of motion of
rigid-objects. NARMAX [25] is an example of popular
general-purpose model identification techniques that are not
specifically designed for rigid-body dynamics. In contrast
to these methods, we use a physics engine, and concentrate
on identifying only the mechanical properties of the objects
instead of learning laws of motion from scratch.
There is also work on identifying sliding models of objects
using white-box optimization [17], [20], [26]. It is not clear,
however, how these methods would perform, since they are
tailored to specific tasks, such as pushing planar objects [20],
unlike the proposed general approach.
An increasingly popular alternative addresses these challenges through end-to-end learning [27]–[38]. This involves
the demonstration of successful examples of physical interaction and learning a direct mapping of the sensing input to
controls. While a desirable result, these approaches usually
require many physical experiments to effectively learn.
Some recent works also proposed to use physics engines
in combination with real-world experiments to boost policy
search algorithms [39], [40], although these methods do not
explicitly identify mechanical models of objects.
A key contribution of the current work is linking the modelidentification process to the policy search process. Instead
of searching for the most accurate model, we search for a
model that is accurate enough to predict the value function
of a policy that is not too different from the searched policy.
Therefore, the proposed approach can be used in combination
with any policy search algorithm that guarantees smooth
changes in the learned policy.
Physical interaction
force µt
xt
xt+1
t
xt+1
simulation
error ek
position
x̂kt+1
x̂kt+1
= f (xt , µt , ✓k )
x
0.065
0 model distribution
simulate with model ✓ 2
simulation
error e2
x̂2t+1
xt+1
✓
0 model distribution
position x̂2t+1 = f (xt , µt , ✓2 )
✓
simulate with model ✓ 1
simulation
error e1
x̂1t+1
Simulation
✓
0.13
error(✓)
0.13
x
P r(✓)
x
x
simulate with model ✓ k
error(✓)
P r(✓)
x
x
x
x
0 model distribution
t+1
0.26
x
x
x
e1
n
ia or
ss err
au d
r G ve
ro er
er obs
e
th ith
te w
da ss
up oce
Pr
t
0.2
e2
n
ia or
ss err
au d
r G ve
ro er
er obs
e
th ith
te w
da ss
up oce
Pr
use the final model distribution
to find force µt in new state xt
0.4
actual observed pose at time t + 1
P r(✓)
error(✓)
pose at time
xt+1
position x̂1t+1 = f (xt , µt , ✓1 )
Learning a mechanical model of an object (bottle) through physical simulations. The key idea is to search for a model that closes
the gap between simulation with a physics engine and reality, by using an anytime Bayesian optimization. The search stops when the
models with the highest probabilities predict similar values for a given policy. This process is repeated in this figure after each time-step t,
i.e. after every real-world action. In practice, it is more efficient to do the model identification only after a certain number of time-steps.
Fig. 2.
III. P ROPOSED A PPROACH
We start with an overview of the model identification and
policy search system. We then present the main algorithm
and explain the model identification part in more details.
A. System Overview and Notations
Figure 2 shows an overview of the proposed approach.
The example is focused on the non-prehensile manipulation
application but the same approach is used to identify physical
properties of actuated robotic links. In object manipulation
problems (Figure 1), the targeted mechanical properties
correspond to the object’s mass and the static and kinetic
friction coefficients of different regions of the object. The
surface of an object is divided into a regular grid. This allows
to identify the friction parameters of each part of the grid.
These physical properties are all concatenated in a single
vector and represented as a D-dimensional vector θ ∈ Θ,
where Θ is the space of all possible values of the physical
properties. Θ is discretized with a regular grid resolution. The
proposed approach returns a distribution P on discretized Θ
instead of a single point θ ∈ Θ since model identification
is generally an ill-posed problem. In other terms, there are
multiple models that can explain an observed movement of
an object with equal accuracies. The objective is to preserve
all possible explanations and their probabilities.
The online model identification algorithm takes as input a
prior distribution Pt , for time-step t ≥ 0, on the discretized
space of physical properties Θ. Pt is calculated based on
the initial distribution P0 and a sequence of observations
(x0 , µ0 , x1 , µ1 , . . . , xt−1 , µt−1 , xt ). For instance, in the case
of object manipulation, xt is the 6D pose (position and
orientation) of the manipulated object at time t and µt is
a vector describing a force applied by the robot’s fingertip on
the object at time t. Applying a force µt results in changing
the object’s pose from xt to xt+1 . The algorithm returns a
distribution Pt+1 on the models Θ.
The robot’s task is specified by a reward function R that
maps state-actions (x, µ) into real numbers. A policy π returns
an action µ = π(x) for state x. The value V π (θ ) of policy π
H
given model θ is defined as V π (θ ) = ∑t=0
R(xt , µt ), where
H is a fixed horizon, x0 is a given starting state, and xt+1 =
f (xt , µt , θ ) is the predicted state at time t + 1 after simulating
force µt in state xt using physical parameters θ . For simplicity,
we focus here only on systems with deterministic dynamics.
B. Main Algorithm
Given a reward function R and a simulator with model
parameters θ , there are many techniques that can be used for
searching for a policy π that maximizes value V π (θ ). For
example, one can use Differential Dynamic Programming
(DDP), Monte Carlo (MC) methods, or simply run a modelfree RL algorithm on the simulator if the system is highly
nonlinear and a good policy cannot be found with former
methods. The choice of a particular policy search method is
open and depends on the task.
The main loop of our system is presented in Algorithm 1.
This meta-algorithm consists in repeating three main steps: (1)
data collection using the real robot, (2) model identification
using a simulator, and (3) policy search in simulation using
the best identified model.
C. Value-Guided Model Identification
The process, explained in Algorithm 2, consists of simulating the effects of forces µi on the object in states xi under
t ← 0;
Initialize distribution P over Θ to a uniform distribution;
Initialize policy π;
repeat
Execute policy π for H iterations on the real robot,
and collect new state-action-state data {(xi , µi , xi+1 )}
for i = t, . . . ,t + H − 1;
t ← t + H;
Run Algorithm 2 with collected state-action-state data
and reference policy π for updating distribution P;
Initialize a policy search algorithm (e.g. TRPO) with
π and run the algorithm in the simulator with the
model arg maxθ ∈Θ P(θ ) to find an improved policy
π 0; π ← π 0;
until Timeout;
Algorithm 1: Main Loop
various values of parameters θ and observing the resulting
states x̂i+1 , for i = 0, . . . ,t. The accompanying implementation
is using the Bullet and MuJoCo physics engines for this
purpose [2], [3]. The goal is to identify the model parameters
that make the outcomes of the simulation as close as possible
to the real observed outcomes. In other terms, the following
black-box optimization problem is solved:
de f
θ ∗ = arg min E(θ ) =
θ ∈Θ
t
∑ kxi+1 − f (xi , µi , θ )k2 ,
(1)
i=0
wherein xi and xi+1 are the observed states of the object at
times i and i + 1, µi is the force that moved the object from
xi to xi+1 , and f (xi , µi , θ ) = x̂i+1 , the predicted state at time
t + 1 after simulating force µi in state xi using θ .
High-fidelity simulations are computationally expensive. It
is therefore important to minimize the number of simulations,
i.e., evaluations of function E, while searching for the optimal
parameters that solve Equation 1. We solve this problem by
using the Entropy Search technique [41]. This method is wellsuited for our purpose because it explicitly maintains a belief
on the optimal parameters, unlike other Bayesian optimization
methods such as Expected Improvement that only maintain a
belief on the objective function. In the following, we explain
how this technique is adapted to our purpose, and show why
keeping a distribution on all models is needed for deciding
when to stop the optimization.
The error function E does not have an analytical form, it
is gradually learned from a sequence of simulations with
a small number of parameters θk ∈ Θ. To choose these
parameters efficiently in a way that quickly leads to accurate
parameter estimation, a belief about the actual error function is
maintained. This belief is a probability measure over the space
of all functions E : RD → R, and is represented by a Gaussian
Process (GP) [42] with mean vector m and covariance matrix
K. The mean m and covariance
K of the GP
are learned
from data points { θ0 , E(θ0 ) , . . . , θk , E(θk ) }, where θk is
a selected vector of physical properties of the object, and
E(θk ) is the accumulated distance between actual observed
states and states that are obtained from simulation using θk .
Input: state-action-state data {(xi , µi , xi+1 )} for i = 0, . . . ,t
a discretized space of possible values of physical
properties Θ,
a reference policy π,
minimum and maximum number of evaluated
models kmin , kmax ,
model confidence threshold η,
value error threshold ε ;
Output: probability distribution P over Θ;
Sample θ0 ∼ Uniform(Θ); L ← 0;
/ k ← 0; stop ← f alse;
repeat
/* Calculating the accuracy of model θk
*/
lk ← 0;
for i = 0 to t do
Simulate {(xi , µi )} using a physics engine with
physical parameters θk and get the predicted next
state x̂i+1 = f (xi , µi , θk ) ;
lk ← lk + kx̂i+1 − xi+1 k2 ;
end
L ← L ∪ {(θk , lk )};
Calculate GP(m, K) on error function E, where
E(θ ) = l, using data (θ , l) ∈ L;
/* Monte Carlo sampling
Sample E1 , E2 , . . . , En ∼ GP(m, K) in Θ;
foreach θ ∈ Θ do
1 n
P(θ ) ≈ ∑ 1θ =arg minθ 0 ∈Θ E j (θ 0 )
n j=0
end
*/
(2)
/* Selecting the next model to
evaluate
*/
/* Checking the stopping condition
*/
θk+1 = arg minθ ∈Θ P(θ ) log P(θ ) ;
k ← k + 1;
if k ≥ kmin then
θ ∗ ← arg maxθ ∈Θ P(θ );
Calculate the values V π (θ ) with all models θ that
have a probability P(θ ) ≥ η by using the physics
engine for simulating trajectories with models θ ;
if ∑θ ∈Θ 1P(θ )≥η |V π (θ ) −V π (θ ∗ )| ≤ ε then
stop ← true;
end
end
if k = kmax then
stop ← true;
end
until stop = true;
Algorithm 2: Value-Guided Model Identification
The probability distribution P on the identity of the best
physical model θ ∗ , returned by the algorithm, is computed
from the learned GP as
de f
P(θ ) = P θ = arg min
E(θ 0 )
0
θ ∈Θ
Z
(3)
=
pm,K (E)Πθ 0 ∈Θ−{θ } H E(θ 0 ) − E(θ ) dE
E:RD →R
0
where H is the Heaviside step function, i.e., H E(θ
)−
0
0
E(θ ) = 1 if E(θ ) ≥ E(θ ) and H E(θ ) − E(θ ) = 0
otherwise, and pm,K (E) is the probability of a function E
according to the learned GP mean m and covariance K.
Intuitively, P(θ ) is the expected number of times that θ
happens to be the minimizer of E when E is a function
distributed according to GP density pm,K .
Distribution P from Equation 3 does not have a closedform expression. Therefore, a Monte Carlo (MC) sampling
is employed for estimating P. The process samples vectors
[E(θ 0 )]θ 0 ∈Θ containing values that E could take, according to
the learned Gaussian process, in the discretized space Θ. Then
P(θ ) is estimated by counting the ratio of sampled vectors
of the values of simulation error E where θ happens to make
the lowest error, as indicated in Equation 2 in Algorithm 2.
Finally, the computed distribution P is used to select
the next vector θk+1 to use as a physical model in the
simulator. This process is repeated until the entropy of P
drops below a certain threshold, or until the algorithm runs
out of the allocated time budget.
The entropy of P is given as
∑θ ∈Θ −Pmin (θ ) log Pmin (θ ) . When the entropy of P is close
to zero, the mass of distribution P is concentrated around a
single vector θ , corresponding to the physical model that best
explains the observations. Hence, next θk+1 should be selected
so that the entropy ofP would decrease after adding the data
point θk+1 , E(θk+1 ) } to train the GP and re-estimate P
using the new mean m and covariance K in Equation 3.
Entropy Search methods follow this reasoning and use
MC again to sample, for each potential choice of θk+1 , a
number of values that E(θk+1 ) could take according to the
GP in order to estimate the expected change in the entropy
of P and choose the parameter vector θk+1 that is expected
to decrease the entropy of P the most. The existence of a
secondary nested process of MC sampling makes this method
unpractical for our online optimization. Instead, we present a
simple heuristic for choosing the next θk+1 . In this method,
that we call Greedy Entropy Search, the next θk+1 is chosen
as the point that contributes the most to the entropy of P,
θk+1 = arg max −P(θ ) log P(θ ) .
θ ∈Θ
This selection criterion is greedy because it does not anticipate
how the output of the simulation using θk+1 would affect the
entropy of P. Nevertheless, this criterion selects the point that
is causing the entropy of P to be high. That is a point θk+1
with a good chance P(θk+1 ) of being the realmodel, but
also with a high uncertainty P(θk+1 ) log P(θ1 ) . We found
k+1
out from our first experiments that this heuristic version of
Entropy Search is more practical than the original Entropy
Search method because of the computationally expensive
nested MC sampling loops used in the original method.
The stopping condition of Algorithm 2 depends on the
predicted value of a reference policy π. The reference policy
is one that will be used in the main algorithm (Algorithm 1) as
a starting point in the policy search with the identified model.
That is also the policy executed in the previous round of
the main algorithm. Many policy search algorithms (such as
REPS and TRPO) guarantee that the KL divergence between
consecutive policies π and π 0 is minimal. Therefore, if the
difference |V π (θ ) −V π (θ ∗ )| for two given models θ and θ ∗
0
is smaller than a threshold ε, then the difference |V π (θ ) −
0
V π (θ ∗ )| should also be smaller than a threshold that is a
function of ε and KL(πkπ 0 ). A full proof of this conjecture
is the subject of an upcoming work. In practice, this means
that if θ and θ ∗ are two models with high probabilities, and
|V π (θ ) − V π (θ ∗ )| ≤ ε then there is no point in continuing
the Bayesian optimization to find out which one of the two
models is actually the most accurate because both models will
result in similar policies. The same argument could be used
when there are more than two models with high probabilities.
In some tasks, such as the one in the motivation example
in Figure 1, the policy used for data collection is significantly
different from the policy used for actually performing the
task. The policy used to collect data consists in moving the
object slowly without risking to make it move away from the
reachable workspace of the Motoman. Otherwise, a human
intervention would be needed. The optimal policy, on the
other hand, consists in striking the object with a certain high
velocity. Therefore, the data-collecting policy cannot be used
as a proxy for the optimal policy in Algorithm 2. Instead, we
use the actual optimal policy with respect to the most likely
model, i.e. π = arg maxπi V πi (θ ∗ ). It turns out that finding
the optimal policy for a given model in this specific task can
be performed quickly in simulation by searching in the space
of discretized striking velocities. This is not the case in more
complex systems where searching for an optimal policy is
computationally expensive, which is the reason we use the
previous best policy π as a surrogate for the next best policy
π 0 when checking the stopping condition.
IV. E XPERIMENTAL R ESULTS
The proposed Value-Guided Model Identification (VGMI)
approach is validated both in simulation and on a real robotic
manipulation task, and compared to other RL methods.
A. Experiments on RL Benchmarks in Simulation
Setup: The simulation experiments are done in OpenAI gym
(Figure 3) [43] with the MuJoCo physics simulator [3]. The
space of unknown physical models θ is described below.
Inverted Pendulum: A pendulum is connected to a cart,
which moves linearly. The dimensionality of space Θ is two,
one for the mass of the pendulum and one for the cart.
Swimmer: The swimmer is a 3-link planar robot. Space Θ
has three dimensions, one for the mass of each link.
Hopper: The hopper is a 4-link planar mono-pod robot. Thus,
dimensionality of the parameter space Θ is four.
Walker2D: The walker is a 7-link planar biped robot. Thus,
dimensionality of the parameter space Θ is seven.
For each of the environments, we use the simulator with
default mass as the real system, and increase or decrease the
masses by ten to fifty percent randomly to create inaccurate
simulators to use as prior models. In this section, all the
policies are trained with Trust Region Policy Optimization
(TRPO) [13] implemented in rllab [44]. The policy network
has two hidden layers with 32 neurons each.
Inverted Pendulum
Swimmer
Hopper
Fig. 3.
Walker2D
OpenAI Gym systems used in the experiments
1.6
Entropy Search
Greedy Entropy Search
Trajectory Error (meters)
1.4
1.2
1
0.8
0.6
0.4
0.2
0
0
5
10
15
20
Time (seconds)
Fig. 4. Model identification in Inverted Pendulum environment using two
variants of Entropy Search.
We start by comparing Greedy Entropy Search (GES) with
the original Entropy Search (ES) on the problem identifying
the mass parameters of the Inverted Pendulum system. Rollout
trajectories are collected using optimal policies learned with
the real system. Given inaccurate simulators and the control
sequence from rollouts, we try to identify the mass parameters
which enables the simulator to generate trajectories most
close to the real ones. Figure 4 shows that GES converges
faster than ES. Similar behaviors were observed on the other
systems, but not reported here for space’s sake.
We refer to the main algorithm detailed in Algorithm 1
as TRPO+VGMI in this section. TRPO+VGMI starts with
the inaccurate simulator and VGMI gradually increases
the accuracy of the simulator. We compare TRPO+VGMI
against a) TRPO trained directly with the real system and
b) TRPO trained with inaccurate simulators. Depending on
problem difficulty, we vary the number of iterations for
policy optimization. For TRPO both with the real system and
with the inaccurate simulators, we run Inverted Pendulum
for 100 interactions, Swimmer for 400 iterations, Hopper
for 200 iterations and Walker2D for 1000 iterations. For
TRPO+VGMI, we run VGMI as detailed in Algorithm 2
every 10 iterations, i.e. H = 10 in Algorithm 1. We run
TRPO+VGMI 20 iterations for Inverted Pendulum, 100
iterations for Swimmer, 100 iterations for Hopper and 200
iterations for Walker2D. All the results are the mean and
variance of 20 independent trials, for statistical significance.
Results: We report performance both in terms of the number
of rollouts on the real system and the total training time. The
number of rollouts represents the data efficiency of the policy
search algorithms and corresponds to the actual number of
trajectories in the real system. The total training time is the
total simulation and policy optimization time used for TRPO
to converge. For TRPO+VGMI, it also includes the time spent
on model identification. Figure 5 shows the mean cumulative
reward per rollout (trajectory) on the real systems as functions
of the number of rollouts used for training. For all four tasks,
TRPO+VGMI requires less rollouts. The rollouts are used
by VGMI to identify the optimal mass parameter of the
simulator for policy search, while they are used directly for
policy search by TRPO. The results show that the models
identified by VGMI are accurate enough for TRPO to find a
good policy by using the same amount of data.
Figure 6 shows the cumulative reward per trajectory on the
real system as a function of the total time in seconds. We also
report the performance of TRPO when trained with inaccurate
simulators, which is worse then when it is trained directly
on the real system (the real system here is also a simulator,
but with different physical parameters). This clearly shows
the advantage of model identification from data for policy
search. TRPO+VGMI is slower than TRPO because of all
the extra time spent by TRPO+VGMI on model identification
and policy search in the learned simulator.
In summary, VGMI boosts the data-efficiency of TRPO
by identifying parameters of the objects and using a physics
engine with the identified parameters to search for a policy
before deploying it on the real system. On the other hand,
VGMI adds a computational burden to TRPO.
B. Non-prehensile Manipulation Experiments on a Real Robot
Setup: The task in this experiment is to push the bottle
one meter away from one side of a table to the other, as
shown in Figure 7. The goal is to find an optimal policy
with parameter η representing the pushing velocity of the
robotic hand. The pushing direction is always towards
the target position and the hand pushes the object at its
geometric center. During data collection, no human effort
is needed to reset the scene. The velocity and pushing
direction are controlled such that the object is always in
the workspace of the robotic hand. Specifically, a pushing
velocity limit is set and the pushing direction is always
towards the center of the workspace. The proposed approach
iteratively searches for best pushing velocity by uniformly
sampling 20 different velocities in simulation, and identifies
the object model parameters θ ∗ (the mass and the friction
coefficient) using trajectories from rollouts by running
VGMI as in Algorithm 2. In this experiment, we run
VGMI after each rollout, i.e., H = 1 in Algorithm 1. The
method is compared to two reinforcement learning methods:
PoWER [12] and PILCO [21]. For PoWER, the reward
function is r = e−dist , where dist is the distance between
the object position after pushing and the desired target
Fig. 5. Cumulative reward per trajectory as a function of the number of constant-length trajectories on the real system. Trajectories on a second simulator
with identified models are not counted here, as they do not occur on the real system.
Fig. 6.
Cumulative reward per trajectory as a function of total time in seconds, including search and optimization times.
Fig. 7.
Examples of experiment where the Motoman pushes the object into Baxter’s workspace.
0.6
Figure 8 provides the real robotic experiment with a
Motoman robot. The proposed method achieves both lower
final object location error and fewer number of object drops
comparing to alternatives. The reduction in object drops is
especially important for autonomous robot learning as it
minimizes human effort during learning. The model-free
approach such as PoWER results in higher location error and
more object drops. PILCO performs better than PoWER as it
also learns a dynamical model in addition to the policy, but
the model may not be as accurate as a physics engine with
identified parameters. As only a very simple policy search
method is used for VGMI, the performance is expected to
be better is more advanced policy search methods, such as
combining PoWER with VGMI.
PoWER
PILCO
VGMI
PoWER
PILCO
VGMI
0.5
# of Times Object
Falls Off the Table
Results: Two metrics are used for evaluating the performance:
1) The distance between the final object location after being
pushed and the desired goal location; 2) The number of times
the object falls off the table. A video of these experiments
can be found in the supplementary video or on https:
//goo.gl/dX2wPV.
Location Error (meters)
1.5
position. For PILCO, the state space is the 3D object position.
1
0.5
0.4
0.3
0.2
0.1
0
0
5
10
15
20
25
30
3
6
9
Number of trials
12
15
18
21
24
27
30
Number of trials
Fig. 8. Pushing policy optimization results using a Motoman robot. Our
method VGMI achieves both lower final object location error and fewer
object drops comparing to alternatives. Best viewed in color.
V. C ONCLUSION
This paper presents a practical approach that integrates
a physics engine and Bayesian optimization for model
identification to increase the data efficiency of reinforcement
learning algorithms. The model identification process is taking
place in parallel with the reinforcement learning loop. Instead
of searching for the most accurate model, the objective is
to identify a model that is accurate enough so as to predict
the value function of a policy that is not too different from
the current optimal policy. Therefore, the proposed approach
can be used in combination with any policy search algorithm
that guarantees smooth changes in the learned policy. Both
simulated and real robotic manipulation experiments show that
the proposed technique for model identification can decrease
the number of rollouts needed to learn optimal policy.
Future works include performing an analysis of the properties for the proposed Value-Guided Model Identification
method, such as expressing the conditions under which the
inclusion of the model identification approach reduces the
needs for physical rollouts and the speed-up in convergence
in terms of physical rollouts. It is also interesting to consider
alternative physical tasks, such as locomotion challenges,
which can benefit by the proposed framework.
R EFERENCES
[1] T. Erez, Y. Tassa, and E. Todorov, “Simulation tools for model-based
robotics: Comparison of bullet, havok, mujoco, ODE and physx,” in
IEEE International Conference on Robotics and Automation, ICRA,
2015, pp. 4397–4404.
[2] “Bullet physics engine,” [Online]. Available: www.bulletphysics.org.
[3] “MuJoCo physics engine,” [Online]. Available: www.mujoco.org.
[4] “DART physics egnine,” [Online]. Available: http://dartsim.github.io.
[5] “PhysX physics engine,” [Online]. Available: www.geforce.com/
hardware/technology/physx.
[6] “Havok physics engine,” [Online]. Available: www.havok.com.
[7] R. S. Sutton and A. G. Barto, Introduction to Reinforcement Learning,
1st ed. Cambridge, MA, USA: MIT Press, 1998.
[8] D. P. Bertsekas and J. N. Tsitsiklis, Neuro-Dynamic Programming,
1st ed. Athena Scientific, 1996.
[9] J. Kober, J. A. D. Bagnell, and J. Peters, “Reinforcement learning in
robotics: A survey,” International Journal of Robotics Research, July
2013.
[10] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski,
S. Petersen, C. Beattie, A. Sadik, I. Antonoglou, H. King, D. Kumaran,
D. Wierstra, S. Legg, and D. Hassabis, “Human-level control through
deep reinforcement learning,” Nature, vol. 518, no. 7540, pp. 529–533,
02 2015. [Online]. Available: http://dx.doi.org/10.1038/nature14236
[11] J. Peters, K. Mülling, and Y. Altün, “Relative entropy policy search,”
in Proceedings of the Twenty-Fourth AAAI Conference on Artificial
Intelligence (AAAI 2010), 2010, pp. 1607–1612.
[12] J. Kober and J. R. Peters, “Policy search for motor primitives in
robotics,” in Advances in neural information processing systems, 2009,
pp. 849–856.
[13] J. Schulman, S. Levine, P. Abbeel, M. Jordan, and P. Moritz, “Trust
region policy optimization,” in Proceedings of the 32nd International
Conference on Machine Learning (ICML-15), D. Blei and F. Bach, Eds.
JMLR Workshop and Conference Proceedings, 2015, pp. 1889–1897.
[Online]. Available: http://jmlr.org/proceedings/papers/v37/schulman15.
pdf
[14] R. Calandra, A. Seyfarth, J. Peters, and M. P. Deisenroth, “Bayesian
optimization for learning gaits under uncertainty,” Annals of Mathematics and Artificial Intelligence (AMAI), vol. 76, no. 1, pp. 5–23,
2016.
[15] A. J. Ijspeert, “Central pattern generators for locomotion control in
animals and robots: A review.” Neural Networks, vol. 21, no. 4, pp.
642–653, 2008.
[16] M. Dogar, K. Hsiao, M. Ciocarlie, and S. Srinivasa, “Physics-Based
Grasp Planning Through Clutter,” in Robotics: Science and Systems
VIII, July 2012.
[17] K. M. Lynch and M. T. Mason, “Stable pushing: Mechanics, controllability, and planning,” IJRR, vol. 18, 1996.
[18] T. Merili, M. Veloso, and H. Akin, “Push-manipulation of Complex
Passive Mobile Objects Using Experimentally Acquired Motion
Models,” Autonomous Robots, pp. 1–13, 2014.
[19] J. Scholz, M. Levihn, C. L. Isbell, and D. Wingate, “A Physics-Based
Model Prior for Object-Oriented MDPs,” in Proceedings of the 31st
International Conference on Machine Learning (ICML), 2014.
[20] J. Zhou, R. Paolini, J. A. Bagnell, and M. T. Mason, “A convex
polynomial force-motion model for planar sliding: Identification and
application,” in 2016 IEEE International Conference on Robotics and
Automation, ICRA 2016, Stockholm, Sweden, May 16-21, 2016, 2016,
pp. 372–377.
[21] M. Deisenroth, C. Rasmussen, and D. Fox, “Learning to Control a
Low-Cost Manipulator using Data-Efficient Reinforcement Learning,”
in Robotics: Science and Systems (RSS), 2011.
[22] J. Hamrick, P. W. Battaglia, T. L. Griffiths, and J. B. Tenenbaum,
“Inferring mass in complex scenes by mental simulation,” Cognition,
vol. 157, pp. 61–76, 2016.
[23] M. B. Chang, T. Ullman, A. Torralba, and J. B. Tenenbaum, “A
compositional object-based approach to learning physical dynamics,”
Under review as a conference paper for ICLR, 2017.
[24] P. Battaglia, R. Pascanu, M. Lai, D. J. Rezende, and K. Koray,
“Interaction networks for learning about objects, relations and physics,”
in Advances in Neural Information Processing Systems, 2016.
[25] L. Ljung, Ed., System Identification (2Nd Ed.): Theory for the User.
Upper Saddle River, NJ, USA: Prentice Hall PTR, 1999.
[26] K. Yu, J. J. Leonard, and A. Rodriguez, “Shape and pose recovery
from planar pushing,” in 2015 IEEE/RSJ International Conference
on Intelligent Robots and Systems, IROS 2015, Hamburg, Germany,
September 28 - October 2, 2015, 2015, pp. 1208–1215.
[27] P. Agrawal, A. Nair, P. Abbeel, J. Malik, and S. Levine, “Learning
to poke by poking: Experiential learning of intuitive physics,” NIPS,
2016.
[28] K. Fragkiadaki, P. Agrawal, S. Levine, and J. Malik, “Learning visual
predictive models of physics for playing billiards,” in ICLR, 2016.
[29] T. D. Ullman, A. Stuhlmüller, N. D. Goodman, and J. B. Tenenbaum,
“Learning physics from dynamical scenes,” in Proceedings of the ThirtySixth Annual Conference of the Cognitive Science Society, 2014.
[30] J. Wu, I. Yildirim, J. J. Lim, B. Freeman, and J. Tenenbaum, “Galileo:
Perceiving physical object properties by integrating a physics engine
with deep learning,” in Advances in Neural Information Processing
Systems, 2015, pp. 127–135.
[31] A. Byravan and D. Fox, “Se3-nets: Learning rigid body motion using
deep neural networks,” CoRR, vol. abs/1606.02378, 2016.
[32] C. Finn and S. Levine, “Deep visual foresight for planning robot
motion,” ICRA 2017.
[33] R. Zhang, J. Wu, C. Zhang, W. T. Freeman, and J. B. Tenenbaum,
“A comparative evaluation of approximate probabilistic simulation
and deep neural networks as accounts of human physical scene
understanding,” CoRR, vol. abs/1605.01138, 2016.
[34] W. Li, S. Azimi, A. Leonardis, and M. Fritz, “To fall or not to fall: A
visual approach to physical stability prediction,” vol. arXiv:1604.00066
[cs.CV], 2016.
[35] A. Lerer, S. Gross, and R. Fergus, “Learning physical intuition of
block towers by example,” in Proceedings of the 33nd International
Conference on Machine Learning, ICML 2016, New York City, NY,
USA, June 19-24, 2016, 2016, pp. 430–438.
[36] L. Pinto, D. Gandhi, Y. Han, Y. Park, and A. Gupta, “The curious
robot: Learning visual representations via physical interactions,” CoRR,
vol. abs/1604.01360, 2016.
[37] W. Li, A. Leonardis, and M. Fritz, “Visual stability prediction and its
application to manipulation,” CoRR, vol. abs/1609.04861, 2016.
[38] M. Denil, P. Agrawal, T. D. Kulkarni, T. Erez, P. Battaglia, and
N. de Freitas, “Learning to Perform Physics Experiments via Deep
Reinforcement Learning,” 2016.
[39] W. Yu, C. K. Liu, and G. Turk, “Preparing for the unknown:
Learning a universal policy with online system identification,”
CoRR, vol. abs/1702.02453, 2017. [Online]. Available: http:
//arxiv.org/abs/1702.02453
[40] A. Marco, F. Berkenkamp, P. Hennig, A. P. Schoellig, A. Krause,
S. Schaal, and S. Trimpe, “Virtual vs. real: Trading off simulations
and physical experiments in reinforcement learning with bayesian
optimization,” in 2017 IEEE International Conference on Robotics
and Automation, ICRA 2017, Singapore, Singapore, May 29
- June 3, 2017, 2017, pp. 1557–1563. [Online]. Available:
https://doi.org/10.1109/ICRA.2017.7989186
[41] P. Hennig and C. J. Schuler, “Entropy Search for Information-Efficient
Global Optimization,” Journal of Machine Learning Research, vol. 13,
pp. 1809–1837, 2012.
[42] C. E. Rasmussen and C. K. I. Williams, Gaussian Processes for
Machine Learning. The MIT Press, 2005.
[43] G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schulman, J. Tang, and W. Zaremba, “Openai gym,” arXiv preprint
arXiv:1606.01540, 2016.
[44] Y. Duan, X. Chen, R. Houthooft, J. Schulman, and P. Abbeel,
“Benchmarking deep reinforcement learning for continuous control,” in
ICML, 2016, pp. 1329–1338.
| 2cs.AI
|
September 12, 2017
©
Multivariate Density Modeling for Retirement Finance
CHRISTOPHER J. ROOK
ABSTRACT
Prior to the financial crisis mortgage securitization models increased in sophistication as did products
built to insure against losses. Layers of complexity formed upon a foundation that could not support
it and as the foundation crumbled the housing market followed. That foundation was the Gaussian
copula which failed to correctly model failure-time correlations of derivative securities in duress. In
retirement, surveys suggest the greatest fear is running out of money and as retirement decumulation
models become increasingly sophisticated, large financial firms and robo-advisors may guarantee
their success. Similar to an investment bank failure the event of retirement ruin is driven by outliers
and correlations in times of stress. It would be desirable to have a foundation able to support the
increased complexity before it forms however the industry currently relies upon similar Gaussian (or
lognormal) dependence structures. We propose a multivariate density model having fixed marginals
that is tractable and fits data which are skewed, heavy-tailed, multimodal, i.e., of arbitrary complexity
allowing for a rich correlation structure. It is also ideal for stress-testing a retirement plan by fitting
historical data seeded with black swan events. A preliminary section reviews all concepts before they
are used and fully documented C/C++ source code is attached making the research self-contained.
Lastly, we take the opportunity to challenge existing retirement finance dogma and also review some
recent criticisms of retirement ruin probabilities and their suggested replacement metrics.
TABLE OF CONTENTS
Introduction ............................................................................................................................................ 1
I. Literature Review ............................................................................................................................. 2
II. Preliminaries.................................................................................................................................... 3
III. Univariate Density Modeling ....................................................................................................... 29
IV. Multivariate Density Modeling w/out Covariances ..................................................................... 37
V. Multivariate Density Modeling w/Covariances ............................................................................ 40
VI. Expense-Adjusted Real Compounding Return on a Diversified Portfolio .................................. 47
VII. Retirement Portfolio Optimization ............................................................................................. 49
VIII. Conclusion ................................................................................................................................ 51
References ............................................................................................................................................ 52
Data Sources/Retirement Surveys........................................................................................................ 55
IX. Appendix with Source Code ........................................................................................................ 56
Keywords: variance components, EM algorithm, ECME algorithm, maximum likelihood, PDF,
CDF, information criteria, finite mixture model, constrained optimization, retirement decumulation,
probability of ruin, static/dynamic glidepaths, financial crisis
Contact: [email protected]
A financial security that is purchased for $pt-1 at time t-1 with all distributions reinvested yields a value at
time t called the adjusted price, say $Pt, for t = 1,2,...,T. The total return at time t is Rt = (Pt - pt-1)/pt-1 and the
total compounding return is 1+Rt = Pt/pt-1 so that $pt-1(1+Rt) = $Pt. If the inflation rate between times t-1 and t
is It then 1+Rt = (1+It)(1+rt), where rt = (1+Rt)/(1+It) – 1 is the real return at time t. The real price at time t is
the value $pt such that (pt-pt-1)/pt-1 = rt, which upon solving yields $pt = $Pt/(1+It). In an efficient market real
prices are governed by a geometric random walk (GRW), that is, ln($pt) = ln($pt-1) + St, where St ~ N(μ,σ2). A
value of μ > 0 represents a drift and is the expected log-scale price increase sufficient to compensate the
investor for risk (σ2) between times t-1 and t. In a random walk, the next value is the current value plus a
random normal step, St, and the best predictor of it is the current value + μ. Exponentiating both sides of the
GRW model yields the alternative form $pt = ($pt-1)e , where e = (1+rt) ~ lognormal(μ,σ2). Under strict
conditions, the normally distributed step, St, can be justified. Decompose the time between t-1 and t into a
series of smaller segments, say, d = 1,2,...,D and let 1+rd be independent and identically distributed (iid)
random variables (RVs) for the compounding real return between times d-1 and d, so that the ln(1+rd) are
also iid RVs. The compounding real return at time t is (1+rt) = ∏
∑
ln 1
r
1
r
e∑
= e where St =
~ N(μ,σ2) when d ≥ 30 by the Central Limit Theorem (CLT). Here, t can represent years and
d days so that the compounding yearly return is the product of compounding daily returns. The lognormal
assumption for (1+rt) breaks down when the (1+rd) are not iid for d=1,2,...,D and there is ample research to
indicate that the correlation between returns increases as the time length decreases. We also find that
compounding returns on liquid securities used in retirement finance are often better fit by the normal
probability density function (PDF) than the lognormal, suggesting that short term real compounding returns
may not be iid (see §II.C). A further complication is that the normal PDF is generally considered tractable,
whereas the lognormal PDF is not. For example, a diversified portfolio of equities and bonds with real
returns et and bt, respectively, has compounding real return α(1+et) + (1-α)(1+bt) where α is the equity ratio.
Unfortunately, no known PDF exists for the sum of correlated lognormal RVs and we are left to approximate
it for a given α, see Rook & Kerman (2015) for an implementation. Despite the benefits of using normal
RVs to model compounding real returns in finance many practitioners and researchers will not, due primarily
to the lack of skewness and heavy tail, but also because the normal PDF can generate negative prices. The
spectacular failure of Gaussian copulas during the financial crisis reinforces the skepticism. Unfortunately,
those who reject the normal PDF do not benefit from discrete-time finance models optimized using it. This
research is motivated by the dilemma, particularly the desire for skewed, heavy-tailed, multimodal, tractable
PDFs to model the compounding real return on a diversified portfolio in discrete-time finance applications.
Of particular interest is the 1895 claim by Karl Pearson that the moments of a lognormal PDF are virtually
indistinguishable from a mixture of normals (McLachlan & Peel, 2000).
1
I. Literature Review
During the housing boom residential mortgages were packaged and sold as securities. The price of a
security is the present value of future cash flows, which here are the mortgage payments. The products were
partitioned into tranches so that as borrowers defaulted low-level holders suffered first, followed by midlevel and then top-level (MacKenzie & Spears, 2014). Cash flows and timings are needed to price a tranche
which is a function of which loans have defaulted by each time point. Default times can be modeled using an
exponential PDF with the probability of default before some time returned by its cumulative distribution
function (CDF). The probability of simultaneous defaults before given times is computed from the copula or
multivariate CDF and depends on the correlation between default times. There is no way to estimate the true
correlation between default times of residential borrowers due to lack of data.
Li (2000) suggested
translating the copula on simultaneous defaults to an equivalent expression using normal RVs.
The
correlation between these RVs is pulled from a measure on the underlying debt instrument for which the
normal assumption is reasonable and sufficient data exists. Using these correlations the Gaussian copula can
return the probability of simultaneous defaults before specific times. Samples on the correlated exponential
failure times can then be simulated from the Gaussian copula and used to value the security.
Loan pools held ≅5000 mortgages with equity tranches acting like a stock and senior tranches like a
safe bond. Low interest rates led to excess liquidity and produced an insatiable appetite from pension and
sovereign wealth funds for AAA-rated senior tranches which yielded more than U.S. Treasurys (Kachani,
2012). A fatal flaw in the system was that economists have assumed for decades that financial data
originates from regimes and correlations change during crises (Hamilton, 1989). Since housing busts follow
housing booms it was unwise, in hindsight, to measure correlation with one value. As witnessed, defaulttime correlations increase in a crisis and senior tranches sold as safe bonds behaved more like a stock which
devastated the insurers, who by 2007 had underwritten $62.2 trillion of credit default contracts (up from $1.6
trillion in 2002). Blame for the crisis has focused on the Gaussian copula (Salmon, 2009), with a takeaway
being that ‘normal returns are not appropriate in finance’ (Nocera, 2009). Researchers and practitioners who
warned against using the normal distribution were vindicated. Paolella (2013) subsequently declared ‘the
race is on’ to find more suitable multivariate PDFs for financial applications and provides an overview of
mixture densities, which are often used to model economic regimes and form the basis for this research.
The PDF we develop is a multivariate normal mixture having fixed normal mixture marginals. It is
tractable when used in discrete time retirement decumulation models, and intuitive to understand. In §II we
detail the needed theory/techniques, and in §III we fit generic univariate normal mixtures to sets of returns.
In §IV we form the multivariate PDF and add correlations in §V. Finally in §VI and §VII we derive the
expense-adjusted real compounding return on a diversified portfolio and use it within optimal decumulation
models. Supporting proofs, derivations, and a full C/C++ implementation are included in the Appendix.
2
II. Preliminaries
Foundational concepts needed for the density model developed in §III thru §V are presented here.
A. Probability Density & Cumulative Distribution Functions
Let X be a continuous RV and f(x) a function such that f(x) ≥ 0 ∀ x ∈
with
= 1. The
function f(x) is a valid PDF for X (Casella & Berger, 1990). The CDF for X is defined as F(x) = P(X x) =
. By the 2nd Fundamental Theorem of Calculus (Anton, 1988), F′(x) = f(x) - f(-∞) = f(x), that is, the
PDF of an RV X is the 1st derivative of its CDF. Note that X may be defined on a subset of , and f(·)
usually depends on a vector of parameters, say θ, which may represent the mean and variance of X. Other
common expressions for the PDF include f(x,θ), f(x;θ), f(x|θ), and it may also be denoted by fX(·) to indicate
the RV governed, written as X ~ fX(·). For a single RV X, f(x) is a univariate PDF, but the above also applies
n
to an n-dimensional vector of RVs, = (X1, ..., Xn)′, defined on
≥0 ∀
∈
n
, and
Ω = { :⋂
= 1. The multivariate CDF of
}.
. Here, f ( ) is a multivariate PDF with f ( )
is defined as F( ) = P(
)=
, where
Similar to the univariate case, differentiating a multivariate CDF yields the
multivariate PDF, that is,
…
F
=
, and the marginal PDF of one RV, say, X1 is obtained by
integrating out all other RVs. That is, f(x1) =
.
∙∙∙
B. Finite Mixture Densities
Let X be a continuous RV and let f 1(x), ..., f g(x) be g functions that satisfy the univariate PDF
conditions in §II.A. Also, let π1, ..., πg be probabilities (0 < πi 1, i=1,...,g) such that π1 + ... + πg = 1. Then f(x) =
π1f 1(x) + ... + πg f g(x) also satisfies the PDF conditions in §II.A and is called a finite mixture density
∑gi 1 πi
(Titterington, et al., 1985). If X ~ f(x) then F(x) = P(X x) =
CDF of X. Let μ
∑
π
i
= π1F1(x) + ... + πgF g(x) is the
be the rth moment for f i(x). Then E(Xr) = μ(r) =
=∑
π μ . Thus, E(X) = ∑
π μ and V(X) = E(X2) – E(X)2 = ∑
When = (X1, ..., Xn)′ is an n-dimensional vector of RVs on
n
,
=
∑
π μ
=
π
- ∑
π μ
.
= π1f 1( ) + ... + πg f g( ) is a multivariate
mixture PDF and satisfies the multivariate PDF conditions set forth in §II.A.
A mixture PDF, f(x), has two distinct interpretations: (1) f(x) is a function that accurately models the
PDF’s shape/form for an RV X, or (2) the RV X originates from component density f i(x) with probability πi,
i=1,2,...,g, and the components have labels. While parameter estimation is unaffected by the interpretation,
the underlying math is. During parameter estimation we adopt the interpretation that simplifies the math.
Each component density f i(x) may depend on a parameter vector θi, and let = (π1, ..., πg)′ be the vector of
component probabilities. When iid observations from f(x) are drawn, say xt, t=1,2,...,T, the objective is to
estimate the parameters, θi, i=1,2,...,g and . Once estimated the PDF is fully specified and can be used.
3
Under interpretation (2) above, components have meaning. Mixture PDFs model serially correlated
data via the components. Each component is considered a state and there are g states at each time t. If we
assume that observation xt+1 depends only on the prior observation xt, and that the long-run probabilities of
transitioning between states are stationary, then state transitions evolve over time as a Markov chain (Hillier
& Lieberman, 2010). Define the gxg matrix{πij} i,j=1,2,...,g as the conditional probability of being in state j
at time t+1 given that we are in state i at time t. Serially correlated data originating from a mixture PDF thus
requires estimation of the transition probabilities {πij} in addition to θi and , where πi is now interpreted as
the unconditional probability of being in state i at time t (used at time t=0) (McLachlan & Peel, 2000). In
finance/economics, the g states of a mixture PDF are called regimes and the process by which dependent
observations transition between states over time is termed regime switching (Hamilton, 1989)1.
As noted, the underlying math differs between interpretations (1) and (2) above. Under interpretation
(2) components have labels, thus observations from a mixture PDF can be viewed as coming in pairs (xt, zt),
where xt is the actual value and zt is the component that generated it, t=1,2,...,T. It is common to replace zt by
a vector
= { }, for t=1,2,...,T & j=1,2,...,g which has a 1 in the component slot and 0’s elsewhere, e.g.,
component=2 at time t=1 can be expressed as z1 = 2 or
= (0,1,0,...,0)′ (see Figure I).
Figure I. Mixture Data Collection when Components have Labels
Note: Each ztj = 0 or 1 and ∑
=1, for t=1,2,...,T.
This representation applies to dependent and independent data. Mixture PDFs for dependent data are
termed hidden Markov models (HMM) (Rabiner & Juang, 1986) because the state vector
generally cannot
be observed (it is hidden). Thus a critical task in HMM model building is determining which state generated
each observation, xt, t=1,2,...,T. Under interpretation (2), the PDF incorporates the RV Zt, observed as
, as
f(xt, ) = f(xt | )·p[Zt= ] or f(xt, zt1, ..., ztg) = f(xt | zt1, ..., ztg)·p[Zt=(zt1, ..., ztg)′], which is given by:
,
∙
∙
,…,
∙
1
,
,
,
⋮
for
for
1
1
for
1
The regimes in Hamilton (1989) were time series models. In this research they are PDFs.
4
,
(2.B.1)
or, more compactly:
,
,…,
∙
∙ …∙
∙
∙
.
(2.B.2)
For example, suppose N returns on a financial security are observed over time and appear symmetric
around some overall mean, do not exhibit serial correlation, but do include black swan events2 at a frequency
greater than their corresponding tail probabilities under either a normal or lognormal PDF (Taleb, 2010).3
An intuitive tractable PDF for such returns is Tukey’s contaminated normal PDF (Huber, 2002), which is a
mixture of two normals with equal means but unequal variances. It can be used to thicken the tail of a
normal PDF. The density with larger variance generates outliers and has a smaller probability.4 We can
proceed intuitively by partitioning the returns into two sets with one holding the n1 non-outliers, and the
other holding the n2 outliers. A normal PDF can be fit to each set using MLEs, for example with the mixture
weights set to πi= ni/N, i=1,2.5
If X is an RV representing these returns, then X ~ f(x) = π1 f 1(x) + π2 f 2(x),
where f i(x) = N(μ,σi), i=1,2 and σ2 > σ1. After replacing all parameters by their estimates, suppose 75% of the
returns originate from a “Common” PDF (non-outliers) which is N(0.08,0.10), and 25% from a “Gray Swan”
PDF (outliers) which is N(0.08,0.30), where μ=0.08 is the overall mean, estimated by
(see Figure II).
Figure II. Example of Tukey’s Contaminated Normal PDF
By labeling components we are using interpretation (2). Note that a mixture of normal PDFs is generally not
normally distributed, and not symmetric (this being an exception). A note of caution is not to mistake the
mixture PDF in Figure II with the RV Z = 0.75*X1 + 0.25*X2, where X1 ~ N(0.08,0.10) and X2 ~ N(0.08,0.30),
as clearly Z is normally distributed. In practice, a g-component normal mixture can model any PDF and is
tractable (McLachlan & Peel, 2000). For example, a mixture of two normals can closely approximate the
2
Observed outliers are called gray swan events. Black swans are extreme events that have not occurred before.
Taleb (2010) discourages use of the normal PDF in finance/economics and refers to the lognormal PDF as a “bad compromise”.
4
Fama (1965) discussed using mixture PDFs to explain non-normality in stock prices, and Taleb (2010) also used mixtures in practice to
add a heavy tail to the normal PDF as an alternative to the lognormal PDF.
5
This ad-hoc procedure is for illustration only. Such methods were common prior to the advent of the EM algorithm (see, Johnson, et al.,
1994). As will be seen, mixture PDFs are almost always calibrated today using either the EM Algorithm or a gradient procedure.
3
5
lognormal PDF (Titterington, et al., 1985). Lastly, since the mixture PDF in Figure II does not model black
swan events it may be deemed unsatisfactory. A solution could be to add a 3rd component labeled “Black
Swan” as, say N(0.08,0.50), with small probability such as π3 = 0.05, then adjust π1 and π2 so that ∑
π = 1.6
C. The Central Limit Theorem (CLT)
Let Xt
~
f(x), t=1,2,...,T, with E(Xt)=μ and V(Xt)=σ . For large T, ∑
X ~ N(Tμ, √Tσ) per the
central limit theorem (Freund, 1992). In words, the sum of iid RVs from any PDF, f(x), is approximately
normal (denoted ~) for large samples and the rule-of-thumb is T ≥ 30. Unfortunately, this rule does not
always apply to mixture PDFs. Consider f(x) = π1 f 1(x) + π2 f 2(x), where π1=(1-10-5) and π2=10-5, and let f 1(x) =
N(0,1) and f 2(x) = N(1010,1). If X ~ f(x), then μ = E(X) = 105 and σ = V X ≅ 3.16E7 (from §II.B). In an iid
sample of size T=30 from f(x) we are unlikely to draw an observation from f 2(x) leaving ∑
in violation of the CLT, which ensures ∑
f(x) and ∑
X ~ N(0, √30)
X ~ N(30·105, √30·3.16E7). Such a sample was generated from
X = 6.77 with all observations originating from f 1(x). This value is within a σ of the CLT PDF
mean thus is a valid value. Repeating the process 9 times should produce an iid sample of size N=10 from
the CLT PDF. It does not as all 10 values are < the CLT PDF mean.7
Caution is therefore advised when invoking the CLT on RVs from mixture PDFs. For example, let rd
~ f(r) be an RV for the daily real return8 on the S&P 500 Index, d=1,2,...,D, where D=# of trading days/year.
The amount $B invested on January 1st, will grow to $E
$B ∙ ∏
The annual real compounding return is A = ∏
and ln(A) = ∑
1
r
1
the CLT when the rd are iid (D ≫ 30). By definition, the RV Y = e
r
on December 31st, in real dollars.
ln 1
r , which is ~ normal per
= A would then be ~ lognormal,
making the historical collection of annual real S&P 500 Index returns a lognormal random sample. This
hypothesis was tested and rejected using the Anderson-Darling test (Rook & Kerman, 2015).
One
explanation is that daily returns are not independent, a claim supported by academic studies of short-term
index returns (Baltussen et al., 2016).9 Another is that daily returns are not identically distributed, or that
daily returns originate from a mixture PDF with D not large enough for the CLT approximation.
D. The Density of a Future Observation
Under certain assumptions the PDF of a future value can be derived before it is observed. Let Xt
~
N(μ,σ) be compounding returns on a financial security at time t=1,2,...,T+1 (μ and σ unknown). Suppose xt
is the observed value of Xt for t=1,2,...,T, with XT+1 reflecting the unobserved next value. Note that X ~
6
Such an approach is considered for stress-testing a retirement plan.
Full sample (N=10): 6.77, 11.71, 3.04, -6.75, 5.65, -0.49, -3.53, 4.58, 7.95, 5.55 (mean=3.45, standard deviation=5.56).
8
The daily (real) compounding return can be approximated by 1+rd = (1 + Rd)/ 1 I , where Rd is the total daily return calculated as
(end value – start value)/start value, and I is the annual inflation rate.
9
While short term (i.e., daily) index returns have historically exhibited positive serial correlation, Baltussen, et al., (2016) suggest the
ubiquity of index products may have eliminated the signal or even turned it negative.
7
6
X is the sample mean and (T-1)S2/σ ~
∑
N(μ,σ/√T), where X
and S2 are independent RVs (Ross, 2009). Since X and X
X)/σ 1
are also independent, X
1/T ~ N(0,1). Thus (2.D.1) has form N(0,1)/
/ T
X
is the
X
X
X
1
T
σ 1
S
σ
~X
S 1
X
X
σ 1
1
T
∗
σ
S
X
X
S 1
1
T
X ~ N(0,σ 1
1/T)
1 which follows a Student’s
:11
t-distribution with T-1 degrees of freedom (Ross, 2009), denoted by Ŧ
Consequently, X
∑
is a chi-square RV with T-1 degrees of freedom.10 It has been established that X
sample variance, and
and X
, where S2 =
~Ŧ
.
(2.D.1)
, or a future observation has the PDF of a scaled Student’s t-
1/T Ŧ
distribution centered at the sample mean. In a simulation study, this would be the preferred PDF for
evaluating a financial plan. Simulating from a Student’s t-distribution with T-1 degrees of freedom is
straight-forward if we can simulate from the normal distribution. First, generate a N(0,1) random value for
random value
the numerator then generate, square, and sum T-1 additional N(0,1) values to construct a
for the denominator.12 Finally, use the ratio from the definition of a Ŧ
RV given above (Law & Kelton,
2000). The PDF of a future value is
which can be derived by differentiating the CDF (see §II.A).
The CDF for a future observation XT+1 is F
= P(XT+1 ≤ x) = P Ŧ
X / S 1
1/T , which is given
by (Freund, 1992):
/
X
FŦ
S 1
1
T
Γ
T
T
2
1 Γ
T
2
1
1
T
1
,
(2.D.2)
where Γ(·) is the gamma function. Finally the PDF for a future observation XT+1 is
X / S 1
1/T
FŦ
which is derived using §II.A and the chain rule as:
Γ
T
The PDF for future values X
T
2
1 Γ
T
2
, …,X
1
1
X
S 1 1/T
T 1
1
S 1
1
T
, for
∞
x
∞.
(2.D.3)
can be derived similarly. The multivariate PDF of N future values
is the product of the univariate PDFs, assuming independence. Note that the technique just described breaks
10
The distributions of X and S2 here are not approximations (i.e., the CLT is not involved), therefore are valid for any sample size T.
The normal numerator and chi-square denominator must be independent RVs.
12
If X1, X2, ..., Xn ~ N(0,1), then ∑ X ~ , (Ross, 2009).
11
7
down when a 2nd asset is added. Let Xt
~
N(μx,σ ) and Yt
N(μy,σ ) be compounding returns on two
~
uncorrelated financial securities at times t=1,2,...,T+1. Interest is in modeling a future unobserved value on a
diversified portfolio using these securities, say, RT+1 = αXT+1 + (1- α)YT+1, where 0 α 1. It follows that
α(XT+1-X) + (1-α)(YT+1-Y) ~ N(0,
1/T α σ
1
α X
X
1
1
T
1
1
α σ
α Y
1
), thus:
α σ
Y
(2.D.4)
~ N 0,1 .
α σ
As with 1 asset, suppose a quantity Q(σx,σy) exists such that a function of it and (2.D.4) has a known PDF that
is not a function of (σx, σy), and it can be solved for the numerator of (2.D.4). This would suggest a solution to
the Behren’s-Fisher Problem which is a famous unsolved problem in statistics (Casella & Berger, 1990).13
E. Maximum Likelihood (ML) Estimation
Let Xt ~ f(x,θ), t=1,2,...,T, be continuous RVs and xt be the observed value of Xt. The likelihood of xt
is f(xt,θ), which is the PDF of the observed value. The vector θ holds unknown parameters such as θ=(μ,σ)′,
where E(Xt)=μ and V(Xt)=σ2. A likelihood value is not a probability and can be >1, however, it is a similar
measure since values with higher likelihoods are more likely to be observed. The likelihood function, (·), is
the PDF written as a function of θ, i.e., (θ|xt)=f(xt,θ). Extending this to the entire sample, the multivariate
PDF of =(X1,..., XT)′ evaluated at x = (x1, ..., xT)′ is f( ,θ) = f(x1,..., xT,θ) which can be written as (θ| ) =
(θ|x1, ..., xT), the likelihood of the entire sample. An appealing estimate for θ is that which maximizes
(θ| ) and its value, denoted , is called the maximum likelihood estimator (MLE). Since the natural log
function is increasing, maximizing (θ| ) and ln( (θ| )) are equivalent problems and it is often easier to deal
with the latter. If the RVs Xt are independent, t=1,2,...,T, then (θ| ) = f(x1, ..., xT,θ) = ∏
ln( (θ| )) = ∑
ln
,
,
, and
. MLEs possess many desirable statistical qualities, such as consistency,
efficiency, asymptotic normality, and invariance (to functional transformations) thus are often considered the
gold standard for parameter estimation. Such qualities, however, depend on certain regularity conditions
being satisfied (Hogg, et al., 2005), see §II.G. Finding parameter estimates in statistics therefore enters the
purview of engineering disciplines that specialize in constrained optimization techniques, see §II.K. The
likelihood function for an iid sample originating from a g-component mixture PDF depends on the
interpretation, see §II.B. Let
(1)
(θ| ) = f( ,θ) and
(2)
(θ| ,
,…,
) = f( ,
,…,
,θ) be the likelihoods of
θ=( ,θ1,θ2, ...,θg) under interpretations (1) and (2), respectively. Then,
13
The Behren’s-Fisher Problem tests for equal means in two normal populations with unequal (and unknown) variances. Let
X1,...,Xn1
~
N(μx,σ ) and Y1,...,Yn2
~
N(μy,σy) be independent samples. Under Ho: μx = μy, X
Q(σ , σ ) to make this Ŧ or any other fully specified PDF is unknown.
8
Y / σ ⁄n
σ ⁄n ~ N(0,1). A
|
|
→ ln
⋯
,
ln
,
⋯
,
,
,
(2.E.1)
ln
,
,
(2.E.2)
and, using (2.B.2),
| ,
,…,
,
→ ln
| ,
∙ …∙
,
z ∙ ln
,…,
,
ln
,
(2.E.3)
.
(2.E.4)
The goal is to collect data and maximize the log-likelihood from either (2.E.2) or (2.E.4) with respect to ,
obtaining the MLE . Unfortunately, the log-likelihood for interpretation (2) in (2.E.4) cannot be maximized
directly because the component indicator RVs Zt = (zt1, zt2, ..., ztg)′ are missing (i.e., not observable). The loglikelihood from interpretation (1) in (2.E.2) can be maximized directly, however this function is unpleasant
for a variety of reasons. For example, it can have multiple local maximums thus finding stationary points
does not guarantee an MLE with its desirable properties. It also is unbounded for normal components thus
given any value , no matter how large, we can always find a setting for
such that ln(
(1)
(θ| )) > , see
Appendix A. When maximizing the mixture log-likelihood for normal components we will therefore restrict
the parameter space for
to a region where ln(
(1)
(θ| )) is finite and search for all local maximums, declaring
as the argmax. To restrict the parameter space for a g-component mixture PDF, let σ be the variance for
component i, i=1,...,g. The variance ratio constraint is max(σ )/min(σ < C, where C is a given constant
(McLachlan & Peel, 2000). A good choice for C will eliminate spurious maximizers which are optimal
values that lack a meaningful interpretation and can occur when one component fits a small # of observations.
F. The Expectation-Maximization (EM) Algorithm
Several researchers had been using a 2-step process to obtain MLEs in studies with missing data.
The process was observed to possess many interesting properties and became formalized with proofs and a
name by Dempster et al. (1977) in what has become one of the most influential statistics papers ever written.
The procedure, termed the Expectation-Maximization (EM) algorithm, generates MLEs as follows: Let
(Xt,Yt) ~ f(xt, yt,θ) and suppose Xt is observed as xt but Yt is missing, for t=1,...,T. When (Xt,Yt) are iid over
time the joint PDF of =(X1, ..., XT)′ and =(Y1, ..., YT)′ is f( ,y,θ)= ∏
,
,
.14 Depending on θ, the
marginal PDF of Xt may be obtained by integrating yt out of f(xt, yt, θ) when Yt is continuous, or summing it
out when Yt is discrete, see §II.A. That is, f(xt,θ) =
14
,
,
or f(xt,θ) = ∑
,
,
for t=1,...,T, then
The EM algorithm does not require iid observations and can also be used to estimate parameters in HMM models (see §II.B).
9
f( ,θ) = ∏
. This results in 2 likelihood functions for θ, one that includes the missing data and one
,
that does not, i.e., (θ| ,y) = f( ,y,θ) and (θ| ) = f( ,θ). The EM-algorithm computes , the MLE of θ as:
Begin:
Initialize
to starting values
E-Step: Compute EY ln
| ,
M-Step: Maximize EY ln
End:
| ,
.
only when taking expectations wrt Y.
. Use
with respect to . Go to E-Step using = in the expectations.
Terminate when ( | ) stops increasing (use %-change below some threshold).
The E-Step replaces the missing yt, t=1,...,T, with constants as a result of taking expectations and the M-Step
therefore only has
unknown. The value of (θ| ) will not decrease while iterating and it will end at the
local maximum nearest to the starting values for , given (θ| ) is bounded in this region. If (θ| ) has
multiple local maximums we use a variety of starting
values and take
as the argmax. This value will
exhibit the desirable qualities noted in §II.E (McLachlan & Peel, 2000). The EM-algorithm can be used to
find MLEs for a wide variety of models. The trick is to reformulate so that some RVs appear missing.
Applications to mixture PDFs is straightforward. Under interpretation (2) the component indicator RVs Zt =
(zt1, ..., ztg)′ are missing (see §II.B, §II.E). The multivariate PDF of Xt and Zt is given in (2.B.2) and the
corresponding marginal of Xt is f(xt,θ)=∑
⋯
,
,
∑
,…,
∙
∙ …∙
∙
, which is the PDF used in interpretation (1), see (2.E.1). (The Zt are discrete
,
RVs.) The likelihood function for an iid sample (x1,..., xT) from a g-component mixture PDF including the
| ,
missing data RVs is
is
|
from (2.E.3), and the corresponding likelihood without missing data
,…,
| ,
from (2.E.1). The EM-algorithm E-Step uses EZ ln
by their expected value. Notice that ln
E ln
| ,
| ,
,…,
is linear in the
E z
,…,
∙ ln
which replaces the
,…,
=(zt1, ..., ztg)′ (see 2.E.4), thus:
ln
,
(2.F.1)
,
where E(zti) = E(zti| , ), i.e., computed using all available non-missing data along with the current settings
for =( , θ1, ..., θg). Since zti is a discrete RV that equals 1 when xt originates from component i, and 0
otherwise, E(zti| , ) = 1·P[zti=1| , ] + 0·P[zti=0| , ] = P[zti=1| , ], which is:
E z | ,
P
1| ,
1,
,
,
, |
1 ∙P
,
,
1
,
,
(2.F.2)
for t=1,...,T and i=1,...,g. When
is given, this value is completely known and replaces E(zti) in (2.F.1).
The resulting function with only
unknown is optimized in the M-Step. Initial values for
randomly using simulation (McLachlan & Peel, 2000) and, since
the strategy is to apply the EM-algorithm to a variety of starting
10
(1)
can be set
(θ| ) may have many local optimums,
values and select
as the argmax.
G. Regularity Conditions
Statistical tests, models and theorems, are built upon sets of assumptions and in statistical inference
these assumptions are called the regularity conditions. Hogg, et al., (2005) Appendix A describe 9 such
conditions and it is usually the case that only a subset need be satisfied for a given result. The 1st regularity
condition applies to PDFs and deals with uniqueness, namely for PDF f(·), if θ
then f(x,θ) f(x, ). This
condition clearly holds for N(μ,σ) PDFs since changing the mean or variance changes the distribution.
However, consider the mixture PDF f(x,θ) = π1 f 1(x) + π2 f 2(x) where f i(x) ~ N(μi,σi), i=1,2. The vector of
unknown parameters is θ=(π1, μ1, σ1, π2, μ2, σ2)′. Define =(π2, μ2, σ2, π1, μ1, σ1)′ and note that θ
but f(x,θ) =
f(x, ) violating regularity condition #1. In general, mixture PDFs do not satisfy all regularity conditions and
caution is advised when using results that requires them.
H. The Likelihood Ratio Test (LRT)
Let (x,θ) be an arbitrary statistical model and (x,θR) be the same model with some parameters
dropped. For example, (x,θ) may be a linear regression model with θ holding the coefficients and (x,θR)
is the corresponding reduced model that excludes some predictor variables. The principle of parsimony
favors statistical models with fewer parameters and the likelihood ratio test (LRT) checks for a significant
difference between the likelihood value of a full model vs. its reduced version. If the likelihoods are not
significantly different the reduced model (x,θR), having fewer parameters, is preferred. The LRT tests for
equivalence of the likelihoods, namely, Ho: ( |x) = ( |x) vs Ha: ( |x) < ( |x), where
and
are the
MLEs for θ and θR, respectively. The test statistic is given by (Hogg, et al., 2005):
λ
Note that ( |x)
|
2ln
(2.H.1)
|
( |x) since adding parameters to a model does not reduce its likelihood and under Ho
the test statistic λ is close to zero since ln(1) = 0. When ( |x) ≫
, λ takes a large positive value and Ho
is therefore rejected when λ > C, for some critical value C. Under Ho and select regularity conditions
(including the 1st, see §II.G), λ ~
, where v is the number of parameters dropped from θ to create θR. A
test of Ho with Type I Error probability α will define C such that P[
C] = α, and a Type I Error means Ho
is rejected when true. We are interested in using the LRT to test for the optimal # of components in a mixture
PDF however, λ is not
under Ho since the applicable regularity conditions are violated. McLachlan
(1987) suggests approximating the null distribution of λ with a bootstrap. The hypothesis test is:
vs.
Ho: Data vector
Ha: Data vector
Under Ho we estimate the PDF of
f(x, ), where
is the MLE of
originates from a g-component mixture PDF, say f(x,θ)
originates from a (g+k)-component mixture PDF, say f(x, )
as f(x, ), where
is the MLE of θ and under Ha we estimate the PDF as
. A value for the test statistic λ from (2.H.1) is computed using the
11
corresponding likelihood functions of these PDFs. If we implicitly assume that f(x, ) generated our sample
vector , a value from the distribution of λ under Ho can be simulated by generating a random sample from
f(x, ) and fitting both a g-component and a (g+k)-component mixture PDF using MLEs. The sample should
be of the same size as our data vector . Repeating this process K times will simulate values λ1, ..., λK which
estimate of the distribution of λ under Ho and the p-value for this test is approximated by (# of λj ≥ λ)/K.
I. Variance-Covariance Matrices
Let = (X1, X2, ..., XN)′ be RVs for the compounding return on N financial assets at a given time point.
If V(Xi)=σ , Cov(Xi,Xj)=σ , and Corr(Xi,Xj)=σ / σ σ =ρ are the variances, covariances, and correlations
for i,j=1,2,...,N then V( )=E[( - E( ))( - E( ))′] is the variance-covariance (VC) matrix of , written as:
V
σ
σ
⋮
σ
σ
σ
⋮
σ
… σ
… σ
⋱
⋮
… σ
σ
ρ σ σ
⋮
ρ σ σ
ρ σ σ
σ
⋮
ρ σ σ
…
…
⋱
…
ρ σ σ
ρ σ σ
⋮
σ
(2.I.1)
The diagonals are the variances σ and the off-diagonals are the covariances σ =ρ σ σ . Note that V( ) is
square and symmetric so that V( )=V( )′, but not every square symmetric matrix is a VC matrix. To qualify,
all variances and correlations must satisfy σ > 0 and -1< ρ < 1. The values must also make statistical sense,
for example the following do not: ρ ≅0.95, ρ ≅0.95, and ρ ≅-0.95. The strong positive correlation of X1
with both X2 and X3 implies that X2 and X3 should also have a strong positive correlation. It turns out that all
conditions for a square symmetric matrix to be a valid VC matrix are met if it is positive-definite (+definite),
that is,
V
> 0 for any constant vector
=(a1,a2,...,aN) ≠ (Wothke, 1993). Since V(
)= V
, the
condition simply means that any non-zero linear combination of the RVs Xi, i=1,2,...,N is an RV with
variance > 0. A matrix is +definite if all eigenvalues are > 0. The eigenvalues of V( ) are the constants λi that
satisfy |V( ) - λi | = 0, i=1,2,...,N (Meyer, 2000). Since V( ) - λi has determinant = 0 it is singular which
implies the equation (V( ) - λi )·ui =
can be solved by a ui
, thus λi and ui come in pairs. The ui with
length = 1 is referred to as the eigenvector for λi. Note that V( )·ui = λiui so that ui′V( )ui = λiui′ui = λi, which
reveals why each λi must be > 0 for V( ) to be +definite (otherwise Z=ui′ has V(Z) < 0). Note that the
determinant of a matrix is the product of its eigenvalues, |V( )| = ∏
λ , and since each λi > 0, |V( )| > 0
which ensures V( )-1 exists (Guttman, 1982). A matrix with determinant 0 thus cannot be +definite. Also,
a correlation of ρ =1 (or ρ =-1) is not allowed in a VC matrix. If two RVs Xi and Xj are perfectly correlated
we can question why both are needed but beyond that V( ) cannot be +definite. Set ai=1, aj=-σi/σj and all
other elements in =(a1,...,aN)′ to 0 and note that V(Z) = V
a = 0 where Z =
, since V(Z) = 12 σ +
(σi/σj)2σ – 2(σi/σj)ρ σ σ = 2σ - 2ρ σ = 0, with ρ =1. (When ρ =-1 use constants ai=1 and aj=σi/σj.)
12
I.1 Repairing a Broken VC Matrix
A VC matrix that is not +definite is said to be broken and can occur for a variety of reasons including
missing data, ad-hoc estimation procedures, and iterative optimization methods. If encountered we can end
the analysis with an error or repair the broken VC matrix and continue. We take the latter approach and
perform a ridge repair (Wothke, 1993). A ridge is added to V( ) by multiplying the diagonal by a constant
K > 1. Start with K=1+ε and increase ε until the modified matrix, say VR( ) with diagonals Kσ , is +definite.
The entire matrix is then divided by K, which revert the diagonals back to σ and forces the covariances to
ρ /K σ σ , which approach 0 (along with the correlations) as K increases (a diagonal matrix with elements
>0 is +definite). The scaled matrix will be +definite since
> 0 when
1/K V
V
> 0, and K > 0.
I.2 Useful Derivatives for VC Matrices
Let
t = (X1t, ..., XNt)′
be compounding returns on N financial assets at times t=1,...,T where
t ~
f(xt,θ)
~ N(μ, V( )), with θ=(μ, V( )), μ=(μ1,...,μN)′ and μi=E(Xit). The terms in V( ) from (2.I.1) are unknown
parameters that can be estimated as MLEs after collecting data (see §II.E). MLEs maximize (θ|x1, ..., xT),
which is the multivariate PDF of the data. The multivariate normal PDF for
,
, ,V
/
2
1
|V
The multivariate PDF for the entire iid RV sample ( 1, ...
,…,
,
,…,
, ,V
e
T)
is:
/
2
is (Guttman, 1982):
’
/
|
t
1
|V
,
|
/
∈
(2.I.2)
’
e
(2.I.3)
The log-likelihood function for the unknown parameters θ=(μ, V( )) is given by:
ln
,V
|
T∙N
ln 2
2
,…,
T
∙ ln |V
2
|
1
2
(2.I.4)
’V
The MLE for θ = (μ, V( )) is found by maximizing (2.I.4) wrt θ. A critical point is where the vector of 1st
derivatives equals
which would reveal the maximum or it could be found iteratively using a gradient
method also requiring said derivatives.15 Let Aij be an NxN matrix having a 1 in the i-j and j-i positions and a
0 in all other positions, and let Vij( ) be the VC matrix from (2.I.1) with a 0 in the i-j and j-i positions. It
follows that V
=σ
and via the product rule V
V
and
V
. By definition, V
V
V
V
= 0 so that
V
, thus
V
V
et al., 1992). Denote σ =σ and the above holds for all elements. The determinant of V
V
V
V
(Searle,
can be expressed
using cofactor expansion with respect to the i-th row, i=1,...,N, as (Meyer, 2000):
15
As noted in §II.I.1, iterative optimization methods are a source of broken VC matrices as we may step into an infeasible region.
13
|V
where Vij
is V
|
|
σ |V
∑
1
σ V
,
with the i-th row and j-th column removed, thus
matrix with aij=aij(t). The determinant is a function of the aij, say, | |
chain rule (N N dimensions),
|V
|
|V
and
|V
|
|V
for i≠j,
|
1
|
2
|V
∑
V
∑
∙
|V
1, … , N,
|
2V
is symmetric, V
, where V
(2.I.5)
|. Let
|V
a ,…,a ,…,a
t (Anton, 1988). If =V
|, with aij=aji=aij(σ )=aji(σ )=σ . Using (2.I.5),
. Since V
V
1
| |
for i
={aij} be a
. Via the
,…,a
and t=σ , i≠j, then
|V
=V
|
1
′=V
V
′=V
, so that V
and
is V
with a 1 in position i-j and a 0 in all
other row i and column j positions (Searle, et al., 1992).16
J. Serial Correlation
Let Xt, t=1,...,T be RVs for the compounding return on a financial asset at time t. If the unconditional
mean and variance are constants let E(Xt)=μ and V(Xt)=σ2 ∀ t, respectively. When σij=Cov(Xi,Xj) ≠ 0 for i≠j,
the returns are serially correlated and cannot be assumed iid. Serially correlated data are modeled using a
time series model such as the autoregressive (AR) or moving average (MA) process. The AR model of order
p is Zt = ϕ1Zt-1+...+ ϕpZt-p + εt, and the MA model of order q is Zt = εt – θ1εt-1 –... – θqεt-q, where Zt = Xt – μ and
εt
~
N 0, σ
∀ t (Box, et al., 1994). The autoregressive moving average (ARMA) model includes AR(p) and
MA(q) terms. The appropriate model for a data set is identified by the signature of the autocorrelation (ACF)
and partial autocorrelation (PACF) functions. The ACF at lag k is ρt,t-k = Corr(Xt,Xt-k) and the PACF at lag k
is the correlation remaining after accounting for all lag < k correlations, namely ϕ in an AR(p) model. The
classic AR(p) signature has the PACF cut off abruptly and the ACF decay after lag p, with the 1st PACF
being > 0. The classic MA(q) signature has the ACF cut off abruptly but the PACF decay after lag q, with
the 1st PACF being < 0. One of these patterns often emerges (perhaps after log or power transforms) and
usually max(p,q) ≤ 3 (Nau, 2014). A series with fixed μ, σ2 and σ is said to be stationary. A time series that
drifts either up or down over time has a trend and is not stationary since E(Xt) is not fixed. A non-stationary
series can often be made stationary by differencing (Box, et al., 1994). Usually 1 or 2 differences will suffice
where Dt = Zt – Zt-1 for t=2,...,T and D2t = Dt – Dt-1 for t=3,...,T are the 1st & 2nd differences. When Dt ~ AR(0), Zt
= Zt-1 + εt is referred to as a random walk (RW). Each observation in a RW is the prior value plus a random
step governed by εt. An alternative to differencing for a trend is to fit a regression with time as a predictor
then model the stationary residuals. Define the backshift operator B as BkZt = Zt-k so that the AR(p) model
can be written as Zt = ϕ1BZt +...+ ϕpBpZt + εt or ϕ(B)Zt = εt, where ϕ(B) = (1-ϕ1B-...- ϕpBp) is the characteristic
16
The notation V
is ours and introduced since dealing only with NxN matrices simplifies the code. A new NxN matrix V
will
nd
with a 1 in position r-s and 0 in all other row r and column s positions.
be introduced (§V.A.2) when taking 2 derivatives which is V
14
polynomial. An AR(p) process is stationary if all roots of ϕ(B) are >1 in magnitude (Box, et al., 1994). The
MA(q) model is stationary by design since E(Zt) = 0 → E(Xt)=μ, σ2=V(Zt) = σ (1 + θ12 +... + θq2), and σt,t-k =
Cov(Zt,Zt-k) = σ
θ
∑
are the fixed μ, σ2 and σt,t-k for k ≤ q. The covariance was derived using
θθ
the model’s definition as σt,t-k = Cov(-θkεt-k, εt-k) + Cov(θk+1εt-(k+1), θ1εt-(k+1)) + ... + Cov(θqεt-q,θq-kεt-q) = -θkV(εt-k) +
θk+1θ1V(εt-(k+1)) + ... + θqθq-kV(εt-q) for k ≤ q and 0 for k > q. The correlation is ρt,t-k = Corr(Zt,Zt-k) = σt,t-k/σ2 =
θ
∑
θθ
/ 1
∑
θ .
Consider the AR(1) process, Zt = ϕ1Zt-1+ εt. Since Zt-1 = ϕ1Zt-2+ εt-1 and Zt-2 = ϕ1Zt-3+ εt-2, each centered
observation can be rewritten as Zt = ϕ1(ϕ1(ϕ1Zt-3+ εt-2)+ εt-1) + εt = ϕ13Zt-3 + ϕ12εt-2 + ϕ1εt-1 + εt, and repeating without
end yields Zt = ϕ1∞Zt-∞ + ∑
ϕ ε
. The AR(1) model thus only works if |ϕ1| ≤ 1, otherwise ϕ1∞Zt-∞ is infinite
and E(Zt), V(Zt) are not defined. Further, if |ϕ1| < 1, ϕ1∞Zt-∞ → 0 and an alternate form for the AR(1) model is
Zt = ∑
ϕ ε
, with E(Zt)=0, E(Xt)=μ. The AR(1) model has characteristic polynomial ϕ(B) = (1-ϕ1B) with
root B = 1/ϕ1 and is hence stationary when |1/ϕ1|>1 or |ϕ1| <1, justifying the condition noted for a fixed E(Zt)
and V(Zt). The conditional variance of a new observation, Xt, given all prior observations is V(Xt|Xt-1, Xt-2, ...)
= V(Zt|Zt-1, Zt-2, ...) = V(εt) = σ , by definition of the AR(1) model. Using the alternative AR(1) model form, the
unconditional variance of each Xt, given |ϕ1| <1, is σ2=V(Zt)=∑
ϕ V ε
=σ ∑
ϕ =σ / 1
ϕ .17 The
AR(1) model does not imply that each new value Xt depends only on the prior value Xt-1. In fact, it assumes
a non-zero correlation between Xt and all prior observations, Xt-1, Xt-2, ..., which is a reason why p>3 is rarely
needed in practice. To see this use the AR(1) alternative form and note that σt,t-k = Cov(Zt,Zt-k) = Cov(ϕ1Kεt-k,
εt-k) + Cov(ϕ1K+1εt-(k+1), ϕ11εt-(k+1)) +... = ϕ1KV(εt-k) + ϕ1K+2V(εt-(k+1)) +... = σ (ϕ1K + ϕ1K+2 +...) = σ ϕ1K/(1 - ϕ12), since
the εt are iid. The correlation between values k time points apart is Corr(Xt,Xt-k) = Cov(Xt,Xt-k)/ V X V X
= ϕ1K (exponential decline in k). The RW is an AR(1) model with unit root, i.e., ϕ1=1, having alternative
form Zt = Zt-k + ∑
ε
. The unconditional variance is V(Zt) = V(Zt-k) + kσ and since V(Zt) > V(Zt-k) the RW is
not stationary (V(Zt) → ∞ as t → ∞). Parameters in an AR(1) model can be estimated by least squares (with
adjustments to account for serial correlation), maximum likelihood, or the Yule-Walker equations (method of
moments) (Box, et al., 1994). The likelihood function of an observed sample is the multivariate PDF of the
data, written as a function of the parameters ϕ1 and σ . Using Zt, this is the likelihood from (2.I.4) with μ = 0,
and V( )=σ / 1
ϕ
is the VC matrix with
having diagonals =1 and i-j off-diagonals ϕ1|j-i| for i ≠ j.
A time series mean reverts if |E(Zt+k|Zt, Zt-1, ...)| → 0 and V(Zt+k) < ∞ as k→∞. In words, future centered
values, Zt+k, come from a PDF with fixed σ2 and μ → 0 as k increases. Stationary time series thus mean revert
due to their E(Zt)=0 and fixed V(Zt), but RWs do not. Mean reversion strength is measured by speed or halflife. This is the k required for E(Zt+k|Zt, Zt-1, ...) = zt/2, i.e., the time before the process’s conditional mean
17
Let S=ϕ10+ϕ12+ϕ14+..., so that ϕ12S=ϕ12+ϕ14+ϕ16..., and S ϕ12S=ϕ10, resulting in S=ϕ10/(1-ϕ12)=1/(1-ϕ12), iff |ϕ1| < 1, otherwise S=∞.
15
equals ½ of the last observed value Zt=zt. In an AR(1) process, Zt+k = ϕ1kZt + ∑
so that E(Zt+k|Zt=zt)
ϕ ε
=ϕ1kzt, and the half-life is k such that ϕ1kzt = zt/2, or k = ln(0.5) / ln(|ϕ1|) (Tsay, 2011). Mean reversion speed
thus strengthens as ϕ1→0 and weakens as |ϕ1|→1, which is intuitive since ϕ1 is the damping factor applied to
prior values. The fastest mean reverting AR(1) process has ϕ1= 0, which is a random sample without serial
correlation. The half-life of k=0 implies the process generates Zt=zt then instantly reverts to a mean 0, finite
σ2 PDF. As ϕ1→1 the AR(1) process approaches a RW with half-life k=∞, and does not mean revert. Thus
in an AR(1) process as serial correlation strengthens mean reversion weakens, and vice versa. This is
intuitive since as mean reversion strengthens (i.e., ϕ1→0) new values increasingly depend on the mean, but as
serial correlation strengthens (i.e., |ϕ1|→1) new values increasingly depend on the prior value.
Data from 18 time series have been retrieved and tested for serial correlation (see Table I, Appendix
B). Conclusions are draft and subject to relevant diagnostics (Box, et al., 1994). The correct significance
level, α = P(Type I Error), for testing multiple simultaneous hypotheses to control the family-wise error rate,
α* = P(≥ 1 Type I Error), is discussed below. Market efficiency is the default and each test is formed as Ho:
No Serial Correlation vs. Ha: Serial Correlation. Evidence is needed to reject market efficiency for liquid
assets as it may suggest a profitable arbitrage trade for retirement advisors who can predict the path of future
prices. A Type 1 Error occurs if we reject Ho when it is true, i.e., we falsely reject efficiency for a security.
Table I. Tests for Serial Correlation in 18 Finance/Economics Time Series
Data Returns (Annual)
CPI-U (Inflation Rate)
Real S&P 500
Total S&P 500
Real Small Cap Equity
Total Small Cap Equity
Real U.S. 10-Year T-Bond
Total U.S. 10-Year T-Bond
Real U.S. 3-Month T-Bill
Real Gold Return
P-Value1
<0.00001
0.90219
0.96352
0.77708
0.58475
0.58194
0.47060
<0.00001
0.00430
Process
AR(3)
RS
RS
RS
RS
RS
RS2
AR(3)
RS3
Data Returns (Annual)
Cash (No Interest)
Real S&P 500-to-Bond RP
Real S&P 500-to-Small Cap RP
Real Small Cap-to-Bond RP
10-Year Avg. Real S&P 500
10-Year Avg. Total S&P 500
1st Diff. Shiller CAPE Ratio
1st Diff. Log Shiller CAPE Ratio
S&P 10-Year Avg. Real Earnings
P-Value1
<0.00001
0.71082
0.00359
0.80516
<0.00001
<0.00001
0.39993
0.96966
<0.00001
Process
AR(3)
RS
RS3
RS
AR(1)4
AR(1)4
RW5,6
GRW5,7
ARMA(2,1)4,8
Abbreviations: RS = random sample, (G)RW = (geometric) random walk w/Drift, RP = risk premium.
1
P-Value is for test Ho: No Serial Correlation vs. Ha: Serial Correlation, not for test Ho: AR(p) vs Ha: AR(p-1).
2
3
Non-normal. Non-normal, possible serial correlation.
4
Near unit roots by design. Let Xt ~ f(x), t=1,...,T, with E(Xt)=μ, V(Xt)=σ . Avg. 10-year returns are Yt =(Xt+...+Xt+9)/10, for t=1,...,T-9.
2
If f(x) ~ N(μ,σ2), Yt+1=Yt – Xt + Xt+10 = Yt + (Xt+10 - Xt) = Yt +εt , εt ~N(0,√ )≠RW as Cov(Yt,εt)=
σ . If f(x) ~ Ln(μ,σ ), ln(Xt) is similar.
5
6,7
Possible non-normal “steps”.
Dickey-Fuller unit root test statistics -2.067, -2.187, respectively, with critical value -2.900 cannot reject
hypothesis of unit root. Note: Since CAPE Ratio ≥ 0, GRW may be more plausible. Non-zero drifts are 0.0885 (RW) & 0.0040 (GRW).
8
Preliminary model would be ARMA(2,1) on detrended data: Yt – [μ + βt] = ARMA(2,1) → Yt = μ + βt + ϕ1Yt-1 + ϕ2Yt-2 - θ1εt-1 + εt.
The goal is to test these hypotheses such that the family of conclusions is replicable with (1-α*) %
confidence, where α* = P(≥ 1 Type I Error). In general, with N independent tests and α = P(Type I Error) for
each test, the probability of making k (≤ N) Type I Errors is P(B = k) =
N
α 1
α
with B ~ Binomial(N, α).
Thus the probability of making ≥ 1 Type I Errors in N independent tests is P(B ≥ 1) = ∑
16
N
α 1
α
= 1–
P(B = 0) = 1 – (1–α)N. For the N=18 tests conducted above with α=0.05 the probability of making ≥ 1 Type I
Errors is ∑
18
0.05 0.95
= 1-P(B = 0) = 1-0.9518 ≅ 0.60. Being 95% confident on each of 18 independent
tests translates into a 40% chance of replicating the family of conclusions with new data. To replicate the
family with 95% confidence, i.e., α* = P(≥ 1 Type I Error) = 0.05, we adjust the α used for each test. The
Bonferonni adjustment uses α = α*/N and does not require independent tests but does ensure P(≥ 1 Type I
Error) ≤ α* (Westfall, et al., 1999). With α* = 0.05, the adjusted p-value for each test in Table I is α =
0.002778. The conclusions in Table I lead to the Table II concerns about current retirement finance dogma.
Table II. Questionable Claims in the Retirement Finance Literature
Claim
Shiller’s CAPE Ratio (annual) can be used to
time markets. Investors/retirees should sell
when the CAPE ratio is high and buy when it
is low relative to its historical average.
Concern1
The hypothesis that the annual CAPE ratio behaves as a (G)RW
cannot be rejected. Random walks have unit roots and do not
mean revert. The best predictor of any future value in a
random walk is the current value + drift (use logs for GRW).
Annual S&P 500 Returns (real or total) mean
revert therefore are serially correlated and
should be fit using an autoregressive model.
Serial correlation and mean reversion are opposites (i.e., as one
strengthens the other weakens). Annual S&P 500 returns exhibit
no serial correlation, they are random samples and mean revert.
Shiller’s CAPE Ratio (annual) can be used to
predict average future long-term returns.3 A
(log-transformed) linear regression predicting
10-year average future S&P 500 returns using
CAPE values has a highly significant R2.
The 10-year average S&P 500 return is strongly serial
correlated (see Table I and Appendix B).2 Fitting a regression
line through these points is inappropriate and will result in
underestimated variances and inflated Type I Error rates which
commonly lead to false claims that predictors are significant.
1
Findings are preliminary. The fitted (linear) models are subject to appropriate diagnostics (see, Box, et al., 1994).
This is by design. Let Xt ~ f(x), t=1,...,T, with E(Xt)=μ, V(Xt)=σ . Average 10-year returns are constructed as Yt = (Xt+...+Xt+9)/10, for
t=1,...,T-9, so that Cov(Yt,Yt+k) = (1/10)2[V(Xt+k) +... + V(Xt+9)] = [(9-k+1)/100]·σ , for 0 ≤ k ≤ 9 and Cov(Yt,Yt+k) = 0, for k ≥ 10.
3
A similar claim is made about safe withdrawal rates (SWR) in retirement via regression with CAPE, and the exact same concern arises.
2
K. Constrained Optimization
K.1 Linear Programming
A linear program (LP) is an optimization problem where the objective and all constraints are linear
functions of the decision variables. LPs are solved using the simplex algorithm and the standard form for an
LP with n decision variables and k linearly independent constraints is (Jensen & Bard, 2003):
Maximize:
Subject to:
Z = c1x1 + c2x2 + ... + cnxn
a11x1 + a12x2 + ... + a1nxn ≤ b1
a21x1 + a22x2 + ... + a2nxn ≤ b2
′
(2.K.1)
(feasible region)
⋮
Where:
(objective function)
ak1x1 + ak2x2 + ... + aknxn ≤ bk
xi ≥ 0, i=1,2,...,n
(non-negativity constraints)
All LPs come in pairs with the dual being an equivalent minimization problem. When the primary LP is
solved the dual is solved and vice-versa. Whereas the primary LP has n decision variables and k constraints,
17
the dual has k decision variables and n constraints and since min(Z) ≡ max(-Z), any LP can be solved assuming
k ≤ n. The simplex algorithm recognizes that when Z is linear, global solutions must occur at corner points of
the feasible region.18 A constraint binds when ‘≤’ becomes ‘=’ for given values of the decision variables.
When m constraints bind, m decision variables are fixed by the constraints and there are
k
m
ways to select the
these constraints, m=0, ..., k. The remaining n-m decision variables must equal 0 at a corner point, and there
are
n
n
m
ways this can occur. The total # of corner points is thus ∑
solution. The simplex algorithm partitions A as
k
m
n
n
m
=
n
k
k
, with each a potential
such that A11 is mxm and of full rank and let c′ =
[c1|c2], x′ = [x1|x2], b′ = [b1|b2] be the corresponding vector partitions. It follows that A11·x1 +A12·x2 = b1 and x1
= A11-1·b1 - A11-1·A12·x2 reflects the m decision variables fixed by the binding constraints. The objective Z
becomes c1·x1 + c2·x2 = c1·A11-1·b1– (c1·A11-1·A12 – c2)·x2 which is a constant less a linear combination of the
decision variables in x2. If any coefficients in this linear combination are negative the problem is unbounded
and has no solution. Simply increase the corresponding decision variable in x2 to increase the objective Z.
To have a solution all coefficients for x2 in Z must be ≤ 0 and when this occurs, all decision variables in x2
must equal 0 to maximize Z. A constant less a quantity ≥ 0 is maximized when that quantity equals 0.
Finally, when x2 = 0, x1 = A11-1·b1 and if all constraints are satisfied then x′ = [x1|x2] is a basic feasible solution
(BFS) to the LP (Jensen & Bard, 2003). The simplex algorithm starts with a corner point of the feasible
region and cycles through adjacent corner points (i.e., bases defined by
) such that Z does not decrease.
Thus the LP can be solved with a small number of evaluations and the algorithm ends at a global maximizer.
Note that when k ≤ n both A21 and A22 vanish so that each basis is formed by setting n-m decision variables
equal to 0 and solving for the remaining variables.
If any quantity is random then (2.K.1) is a stochastic linear program (SLP). While solving SLPs
using theory is involved (Kall & Mayer, 2010), simulation can be a practical alternative. For example
suppose b = (b1,..., bk)′ is a set of RVs with b ~ fB(b), E(b)=μB.19 Since any solution is a function of b it must
also be an RV, say x ~ fX(x), E(x)=μX. When fB(b) is known/approximated a heuristic SLP solution is obtained
by generating random values for b, say bi = (b1i, ..., bki), where sample i yields an LP BFS, say xi = (x1i,..., xni)′,
i=1,...,N. The solution is then taken as
and as N→∞,
or E
E
=
∑
. Since each xi satisfies
it follows that
̅
. Simulated solutions therefore asymptotically satisfy the constraint
set, in expectation. An exceedingly large number of real-life problems can be formulated and solved as LPs
and some non-linear programs can also be closely approximated by an LP.
18
The solution to an LP may or may not be unique, but it is global. The feasible region of an LP is referred to as a polyhedron which sits
in the 1st quadrant since all decision variables are ≥ 0. A technically incorrect but useful visualization tool when n=2 is that four people of
different heights are holding a flat board (objective function is a plane) over a stop sign laying flat on the ground (feasible region in 1st
quadrant). The highest point on the board inside the sign will be directly above a corner of the sign, it cannot be above an interior point.
19
Here, b may reflect any randomly occurring quantity such as supply, demand, temperature, sales revenue, profit, etc...
18
K.2 Quadratic Programming
When the objective function in (2.K.1) is of the form Z =∑
ax
∑
∑
∑
b xx
c x , the
surface being maximized is quadratic (not linear) and the resulting optimization is referred to as a quadratic
program (QP). If bij = 0 ∀ i < j=1,...,n, Z is said to be separable as the objective separates into a sum of 1decision variable functions, i.e., Z = ∑
x
(Hillier & Lieberman, 2010).
A separable QP can be
approximated by an LP. To begin, convert the QP to a minimization problem noting that max(Z) ≡ min(–Z),
then write each function in –Z as
x
x
posing no issue since minimizing -Z and -Z + ∑
c x
a ⁄2c
which adds the constant ∑
a ⁄4c to -Z
a ⁄4c are equivalent problems. Proceed by partitioning
each xi-axis into equidistant constants [xi1,..., xiS+1] which define S line segments that trace out
x . These
S+1 values are chosen and allow xi to be replaced by a weight vector
= (αi1, ..., αiS+1)′, where ∑
Any xi1 ≤ xi ≤ xiS+1 is reachable by a weighted sum of the constants using
, namely, xi = ∑
function
x ≅∑
α
α = 1.
, and each
where the approximation sharpens as S increases when adjacent weights are
α
used (Jensen & Bard, 2003), see Figure III. Since the objective is min(–Z), adjacent weights must be used in
an optimal solution, compare the blue dot objectives for the dashed and red lines in Figure III.
Figure III. Separable QP Approximation by an LP (S = 4) (Minimization Objective)
The QP max(Z), Z = ∑
Minimize:
-Z ≅ ∑
Subject to:
am1∑
∑
Where:
∑
ax
∑
α
c x , is then approximated by the following LP (linear in ):20
′
α
+ ... + amn∑
α ≤ 1, -∑
α
≤ bm,
α ≤ -1
m=1,2,...,k
i=1,2,...,n
αij ≥ 0, i=1,2,...,n & j=1,2,...,S+1
(objective function)
(feasible region)
(2.K.2)
(non-neg. constraints)
20
The standard form LP in (2.K.1) requires all constraints to have the form fm(x) ≤ bm, m=1,2,...,k where fm(x) is linear in x. Express an
equality constraint fm(x) = bm using only “≤” as (fm(x) ≤ bm ∩ fm(x) ≥ bm) ≡(fm(x) ≤ bm ∩ -fm(x) ≤ -bm).
19
K.3 Classical Convex Programming
A classical convex program (CCP) is a non-linear optimization having objective of either minimizing
a convex, or maximizing a concave function over a set of linear equality constraints (Jensen & Bard, 2003).
A function f( ) is convex iff f(α 1 + (1-α) 2) ≤ αf( 1) + (1-α)f( 2) ∀
1,
2
∈
n
, and if f( ) is convex then -f( ) is
concave. Further, max[-f( )] ≡ max[e-f(x)] thus maximizing a concave function and a log-concave function
are equivalent problems as e-f(x) is log-concave since ln(e-f(x)) = -f( ) is concave (Lovasz & Vempala, 2006).
A CCP has the desirable property that local optimums are global optimums, thus the problem reduces to
finding any local optimum. The following formulation is of interest:
f(x1, x2, ..., xn)
f(x1, x2, ..., xn)
Minimize:
(or) Maximize:
Subject to:
(convex objective function)
(concave objective function)
a11x1 + a12x2 + ... + a1nxn = b1
a21x1 + a22x2 + ... + a2nxn = b2
(2.K.3)
(feasible region)
⋮
ak1x1 + ak2x2 + ... + aknxn = bk
xi ≥ 0, i=1,2,...,n
Where:
(non-negativity constraints)
As with LPs, redundant constraints are removed. If k > n the feasible region is empty and there is no solution.
If k = n the feasible region consists of the point =
∗
such that
f
∗
= 0.
If 0 < k < n,
∗
f
, which is also the solution. If k = 0 the solution is
∗
= 0 and
=
then the unconstrained solution solves the
constrained problem. Most likely none of the above will hold, and we are left to optimize
with 0 < k < n,
= , and rank( ) = k. To solve this problem in 1-step we locate the critical point of the Lagrangian, L(·),
-∑
defined as, L(x1,..., xn, λ1,...,λk)=L( , )=
incorporates all constraints into
λ a x
a x
⋯
a x
b .21 The Lagrangian, L( , ),
and k new decision variables are introduced, λi, i=1,2,...,k, called the
Lagrange multipliers. The solution occurs at L ( , ) = 0, namely:
∑
λa
∑
λa
⋯
a x
b
⋯
a x
b
⋮
L( , ) =
a x
a x
a x
a x
⋮
0
⋮
0
.
0
⋮
0
(2.K.4)
This non-linear system can be solved using Newton’s method which approximates L ( , ) linearly in the
neighborhood of
solving yields
21
as L ( , ) ≅ L ( ,
=
-
L( ,
)+
)]-1 L ( ,
L( ,
)
. Setting the approximation = 0 and
). Repeating the process generates the iterative solution
A multi-step solution would write
= as
= with
k k and rank(
in the objective,
, making it an unconstrained function of only. After solving
20
) = k then solve =
( and replace
∗
= 0 we use the above to determine ∗ .
from
derivatives
and convergence occurs when | L ( ∗ ,
∗
)| < ε. The (n+k) (n+k) symmetric matrix of 2nd
L ( , ) is called the bordered Hessian which is given by:
⋯
⋮
⋱
⋯
L( , )
a
⋮
a
where
⋮
⋯
⋱
⋯
a
⋮
a
= implies
implies = , thus
removed,
= and
= implies
a
⋮
⋱
⋮
a
⋯
a
0
⋮
0
⋯
⋱
⋯
0
⋮
0
= . Since f( ) is convex,
= . (Same for -f( ) concave,
is n k with rank( )=k and
L( , )
= thus
⋯
(2.K.5)
,
L ( , )]-1 thus (2.K.5) must be invertible. Note that
is the Hessian of f( ). Newton’s method uses [
L( , )
a
is +definite and
′
=
–definite.) Since redundant constraints have been
= implies =
.
Therefore when f( ) is convex [-f( ) is concave],
= and the bordered Hessian is full-rank thus invertible (Border, 2013).
K.4 General Non-Linear Programming
A general non-linear program (NLP) seeks to minimize or maximize a smooth function
subject to g
≤ bi, i=1,2,...,k, where
is not necessarily convex or concave and g
,
∈
n
,
is generic. Such
problems can have several local optimums and the goal is to find the best among these. Little can be said
about NLP problems in general and the optimization strategy depends on the nature of the problem. In some
cases the Lagrangian can be used to find local optimums. In others a metaheuristic, such as tabu search,
simulated annealing, or a genetic algorithm can be used (Hillier & Lieberman, 2010). If all else fails we can
generate random values and evaluate
∙ when the constraint set is satisfied, keeping a record of the optimal
value. A better approach would generate random values that satisfy all constraints. Alternatively, we can
take a random setting that is infeasible and project it to a point inside the feasible region then evaluate
22
that point.
∙ at
Random starts can be effective when many local optimums exist and strategies for generating
values have been developed for specific problems such as mixture likelihoods (see McLachlan & Peel, 2000).
L. Copula Modeling
Let X be any continuous RV with PDF f(x) and CDF F(x) = P(X ≤ x) =
. Copula modeling is
based on a fact that initially surprises, but is intuitive upon reflection. Namely that F(X) ~ uniform(0,1). The
proof is straightforward, let U = F(X) then FU(u) = P(U≤ u) = P(F(X)≤ u) = P(X ≤ F-1(u)) = F(F-1(u)) = u, for 0 ≤ u ≤ 1.
Random variables having the same CDF are identically distributed and the CDF for U is from a uniform(0,1)
22
Consider maximizing a generic likelihood function that includes the VC matrix V
from (2.I.1). A constraint on the variances and
covariances is that V
must be +definite. An alternative to discarding any point with a broken V
matrix is to repair it.
21
distribution. Let = (X1, ..., XN)′ be RVs for the compounding return on N financial securities at a given time
point. The marginal PDF and CDF of Xi are fi(xi) and Fi(xi) respectively, and the multivariate PDF and CDF
are f( ) and F( ) = P( ≤ ) = F(x1, ..., xN) = P(X1 ≤ x1 ∩ ... ∩ XN≤ xN) respectively, see §II.A. As above, let Ui
of
= Fi(Xi) where Ui ~ uniform(0,1) and Xi = Fi-1(Ui). The CDF of = (U1, ..., UN)′ is G( ) =P( ≤ ) = G(u1, ..., uN) =
P(U1 ≤ u1 ∩ ... ∩ UN ≤ uN). Since G( ) is a valid CDF, its derivative is the multivariate PDF of , namely
…
G
= g( ) - g( ) = g( ), see §II.A. Note the relationship between F( ) and G( ) (Nelson, 2006):
F
F(x1, ..., xN)
The multivariate PDF of
= P(X1 ≤ x1 ∩ ... ∩ XN ≤ xN)
(2.L.1)
= P(F1-1(U1) ≤ x1 ∩ ... ∩ FN-1(UN) ≤ xN)
(2.L.2)
= P(U1 ≤ F1(x1) ∩ ... ∩ UN ≤ FN(xN))
(2.L.3)
= G(F1(x1), ..., FN(xN)).
(2.L.4)
can then be derived by differentiating F(x1, ..., xN), using the chain rule on Fi(xi) as:
f( ) = f (x1, ..., xN)
=
=
…
…
F
(2.L.5)
[G(F1(x1), ..., FN(xN))]
…
g F
Multivariate PDF
g
,…,F
Multivariate Copula PDF
(2.L.6)
[from (2.L.4)]
,…,
(2.L.7)
…
…
(2.L.8)
Product of Marginal PDFs
The literature refers to G(·) as the copula and g(·) as the copula density. The term indicates a coupling
between the multivariate and marginal PDFs for a set of RVs (Nelson, 2006). When X1,...,XN are independent
U1, ..., UN are also independent and g( ) = 1 ... 1 = 1 so that f (x1, ..., xN) =
...
N
N
. The copula term
therefore models the dependence between a set of RVs, with the breakthrough being that marginal PDFs can
be modeled separately. This quality is appealing, particularly for the field of retirement finance. When
modeling the multivariate PDF for a set of real compounding returns, the marginal return on a given security
should not depend on which other securities are involved. For this reason copula modeling is a standard for
multivariate PDF modeling in finance and many forms have been proposed. For example if g(·) is Gaussianinduced then the copula will model dependence after mapping to normal RVs.
Since the unknown
parameters in a copula exist in the likelihood they can be estimated as MLEs. When building a multivariate
PDF we can choose between candidates copulas by taking the one with smallest root-mean-square error
using the empirical copula, which is constructed via the empirical CDF. In this research we propose a
generic fixed-marginal tractable alternative to copula modeling that is well suited to retirement finance.
22
Assuming marginal PDFs f1(x1), ..., fn(xn) have been arbitrarily fit to the data set, a distribution with
corresponding CDF H(·) is selected to model the dependence structure of RVs X1, ..., Xn. For example,
during the housing boom securitized mortgage products modeled default times of named residential
borrowers as exponential RVs, see §I. Here, fi(xi) would be an exponential PDF for i=1, ..., n. Further, the
dependence structure was chosen as Gaussian so that H(·) becomes Φ(·). The multivariate PDF in (2.L.8)
requires g(·) for full specification, and we say that it is induced by the choice of H(·) using transformations
U1 = H1(Y1), ..., Un = Hn(Yn), where Hj(·) is the corresponding marginal CDF for element j. Following the
standard procedure for transforming RVs (Freund, 1992), the multivariate PDF g(·) has form:
…
g
H
,…,
,…,H
∙
⋮
⋱
,
⋮
∈ 0,1
(2.L.9)
…
where h(·) = H′(·) is the corresponding PDF for our chosen dependence structure. All off-diagonals in the
Jacobian term are zero since each transformation involves only one RV. The diagonal terms are derived for
i=1, ..., n as follows:
(2.L.10)
Using rules from calculus, we can treat
as a ratio when Hi(·) is invertible, thus:
1
1
(2.L.11)
H
The copula density g(·) thus takes form of (2.L.12) when induced by the dependence structure of CDF H(·):
g
,…,
H
,…,H
∙
1
H
,
∈ 0,1
(2.L.12)
When H(·) is Gaussian, h(·) = ϕ(·) and hi(·) = Hi′(·) are univariate standard normal PDFs. The copula density
g(·) from (2.L.12) is used in (2.L.8) to complete the multivariate PDF of our sample data, f (x1, ..., xN). Note
that Sklar’s Theorem guarantees the PDF in (2.L.8) has marginals fi(xi) when using g(·) (Nelson, 2006).
Copula parameters can then be estimated as MLEs with only covariance terms unknown, since it is assumed
that the univariate marginals are fully specified.
Tran, et al., (2013) caution that a straight forward
optimization of (2.L.8) may work for basic copula forms, but can fail when using commercial software and a
complicated dependence structure. Giordoni, et al., (2009) solve a problem similar to the one we address,
but in different ways. Namely, using a normal mixture copula along with normal mixture marginals, and
also with a non-copula adaptive estimator that attempts to smooth out the differences between normal
mixture marginals and the implied marginals of a multivariate normal mixture fit directly to the data.
23
M. Information Criteria
In addition to the LRT from §II.H, fitted models in statistics can be compared using a metric called
the information criteria (IC). Such values quantify the information lost by a model vs. the true state of
nature. Smaller IC values are preferred as they indicate less information loss. Models with too many
parameters are said to lack parsimony. When choosing amongst candidate models, IC metrics attempt to
strike a balance between the likelihood value and # of parameters. Among the most widely used IC metrics
is Akaike’s information criteria (AIC), calculated as (Akaike, 1974):
(2.M.1)
AIC = 2 (# Parameters) - 2 ln( ( | ))
The parameters counted must be free. A model with π1 and π2 constrained linearly by π1 + π2 = 1 only counts
as 1 parameter since estimating π1 estimates π2. Thus, (# parameters) = (total # parameters) – (# independent
constraints). The term ln( ( | )) is the log-likelihood using the MLE, see §II.E. The AIC works well when
interest is in controlling Type I Errors in subsequent hypothesis tests (Tao, et al., 2002), but it tends to over
fit in small samples leading to models that lack parsimony. Thus the corrected AIC (AICC) has been
proposed and includes a penalty that increases with the # of parameters (Hurvich & Tsai, 1989):
2
# Parameters
Sample Size
1
# Parameters
# Parameters
2
2
(2.M.2)
As the sample size increases the penalty decreases, thus AICC ≈ AIC. Whereas α = P(Type I Error) = P(Reject
Ho | Ho is True), β = P(Type II Error) = P(Accept Ho | Ho is False). The power of a hypothesis test is 1 – β =
P(Reject Ho | Ho is False). If interest is in controlling the power of subsequent hypothesis tests then Bayesian
information criteria (BIC) is recommended (Tao, et al., 2002), and calculated as (Schwarz, 1978):
BIC = -2 ln( ( | )) + (# Parameters) ln(Sample Size)
(2.M.3)
While determining the optimal # of components in a finite mixture PDF (see §II.B) is an unsolved problem
in statistics, IC are often used as a heuristic to compare mixture PDFs of various sizes. Titterington, et al.,
(1985) caution that, in theory, their validity often relies on the unmet regularity conditions of §II.G.
N. The Probability of Ruin in Retirement
Let t=1,2,...,T be the time points of a retirement horizon where the 1st withdrawal is made at time t=1
and the last withdrawal at time t=T, which can be fixed (TF) or random (TR). The PMF for TR is defined as
P(TR = t), for t=0,1,...,T, and can be derived using lifetables published at SSA.gov for an individual or a group
(Rook, 2014). The safe withdrawal rate (SWR) is a heuristic that suggests retirees withdraw (100%)WR in
real terms from their savings at each time point (Bengen, 1994). A retirement plan often couples the
withdrawal rate (WR) with an asset allocation. If N securities are involved let Rti, rti, Ei, αti, and It be the total
and real returns, expense ratio, proportion allocated to security i, and inflation rate, respectively, all at time t.
The total compounding return for security i at time t is:
24
(2.N.1)
(1+ Rti) = (1+ rti)(1+ It)
The expense-adjusted total compounding return for security i at time t is:
(2.N.2)
(1- Ei)(1+ Rti) = (1- Ei)(1+ rti)(1+ It)
The expense-adjusted real compounding return for security i at time t, denoted ȓti, is:
ȓti = (1- Ei)(1+ rti) = (1- Ei)(1+ Rti)/(1+ It)
(2.N.3)
Since ȓti is a continuous RV it is governed by a univariate PDF, say fti(ȓti). When Cov(rki, rsj) = 0 for times
k≠s=1,...,T and securities i,j=1,...,N, then ȓti and fti(ȓti) are independent of time. If we drop the time index they
become ȓi and fi(ȓi), respectively. The marginal PDF for security i, fi(ȓi), is modeled using historical data.23 A
retirement plan succeeds or fails based on the return of a diversified portfolio, not that of a single security.
The expense-adjusted real compounding return for the portfolio at time t is:
(2.N.4)
ȓ(t) = (αt-1,1)ȓ1 + ... + (αt-1,N)ȓN,
where αt-1,1 + ... + αt-1,N = 1. Consequently, ȓ(t) is a function of time via the portfolio weights (i.e., the asset
allocation) set at time t-1 and is derived as a linear transform (
N
→
1
) of ȓ = (ȓ1, ..., ȓN)′. The univariate PDF
for ȓ(t), say ht(ȓ), is used to evaluate/optimize a retirement plan. In some cases this PDF is easily derived
(i.e., normal), and in others there is no solution (i.e., lognormal). Various methods exist to derive the PDF of
a transformed RV and one uses the multivariate PDF of the random vector ȓ = (ȓ1,...,ȓN)′, f(ȓ) (Freund, 1992).
Our goal is to model ht(ȓ) using f(ȓ), while maintaining the individual security marginals, that is, subject to
fi(ȓi) =
…
ȓ ,...,ȓ
ȓ
…
ȓ
. Here, ht(ȓ) may be skewed, heavy-tailed and multimodal (i.e., generally non-
normal) allowing higher PDF moments to aid in determining a plan’s success or failure.
N.1 Retirement Surveys and Alternative Metrics
Retiree surveys reveal that the #1 concern is running out of money.24 A retiree who runs out of
money experiences financial ruin. The probability of this event occurring can be computed and shared with
the retiree for a given decumulation strategy. Probabilities are bounded by [0, 1] and multiplying by 100%
yields a percentage which is bounded by [0, 100]. Percentages are a ubiquitous metric and universally
understood. For example, a probability of 0.5 translates to 50% which can be described in words as a “coin
flip”. Retirees make withdrawals at time t and they experience the event of ruin at time t, denoted Ruin(t), iff
the time t-1 withdrawal is successful but the account does not support, or is completely emptied by the time t
withdrawal. The compliment of this event is avoiding ruin at time t, denoted RuinC(t), which occurs iff the
withdrawal at time t is successful, leaving a > $0 balance. Define Ruin(≤ t) as the event of ruin occurring on
or before time t and let RuinC(≤ t) be its compliment.
23
24
The tools described in §II.J can be used to detect serial correlation within and between securities over time.
A number are referenced at the conclusion of this research.
25
Despite being extensively researched, the probability of ruin as a metric is not universally accepted
with criticisms leveled from all directions. The most common being that the retirement ruin event could
occur as Ruin(1) or Ruin(30), and there is a substantial real-life difference for the retiree between these
events. This criticism argues that ruin as a binary outcome is too simplistic and a more nuanced approach
would consider varying degrees of failure. A separate criticism is that the ruin metric is overly complicated
and better left to actuaries at insurance companies. Under this argument, the metric is misunderstood and
being abused by financial planners who lack the ability to properly calibrate the computation and/or fail to
understand its inherent flaws such as the impact of covariances and higher order PDF moments.
While a retirement strategy can have varying degrees of failure, we are primarily interested in the
compliment of the ruin event, which is success. Unlike retirement ruin, the event of retirement success does
not have varying time point-degrees attached to it. Further, a decumulation model that maximizes the
probability of success will also minimize the probability of ruin as these are equivalent optimization
problems. None-the-less, a model that maximizes the probability of success may in fact fail, and in this case
it is reasonable to try and limit the damage. Harlow and Brown (2016) introduce two downside risk metrics
which do precisely this. Their approach uses fully stochastic discounting to compute a retirement present
value (RPV) for withdrawals (cash flows) from a decumulation plan. The RPV is an RV and its PDF can be
estimated via simulation. Values of RPV below zero indicate the account did not support all withdrawals
and retirement ruin has occurred. A strategy that minimizes downside risk recognizes that the ruin section of
the RPV’s PDF can be markedly different for retirement plans having similar failure probabilities. The goal
is to make this section of the PDF as palatable as possible if ruin occurs. Both the mean and standard
deviation of negative RPV values are used as minimization metrics in the optimization and corresponding
asset allocations are found. Harlow and Brown (2016) report that far lower equity ratios are optimal in the
context of minimizing downside risk. This finding has the benefit of being intuitive as we can generally
think of a retiree’s bequest distribution as having a spread (variance) that increases with the equity ratio and a
negative bequest (i.e., RPV < 0) indicates that the retiree has exhausted their savings while still alive.
Milevsky (2016) takes the opposing view that ruin probabilities are being routinely abused and/or
misunderstood by retirement planners, and advocates for replacing it altogether by a different metric, namely
the portfolio longevity (PL). Since investments are volatile PL is an RV that measures the length of time a
retirement portfolio lasts. It takes values l = 0, 1, 2, ..., ∞ in discrete time and has PMF defined by P(PL = l).
Note that (l = 0) ↔ (0 successful withdrawals are made) ↔ Ruin(1), (l =1) ↔ (only 1 successful withdrawal is
made) ↔ Ruin(2), ..., (l = T-1) ↔ (exactly T-1 successful withdrawals are made) ↔ Ruin(T). Finally, (l ≥ T) ↔
(All T withdrawals are made successfully) ↔ RuinC(≤T) ≡ Retirement Success (given horizon length T).
Therefore, P(PL = l) = P[Ruin(l+1)] for l = 0, 1, 2, ...,T-1 and P(l ≥ T) = P[RuinC(≤T)], see Table III. The mean,
26
median and mode of PL will thus be functions of ruin probabilities, and any flaws inherent in their
construction will propagate through to these statistics.
Table III. The Portfolio Longevity (PL ) PMF and Corresponding Statistics
Portfolio Longevity (PL= l)
0
1
2
⋮
i
⋮
j
⋮
k
⋮
1
2
P(PL = l)
P[Ruin(1)]
P[Ruin(2)]
P[Ruin(3)]
Mean (μ=E[PL])
0
1*P[Ruin(2)]
2*P[Ruin(3)]
⋮
P[Ruin(i+1)]
⋮
P[Ruin(j+1)]
⋮
P[Ruin(k+1)]
⋮
∑ 1
⋮
i*P[Ruin(i+1)]
⋮
j*P[Ruin(j+1)]
⋮
k*P[Ruin(k+1)]
⋮
∑
μ EP
Median1
Mode2
X
X
X
∑
0.5
argmax[P(PL = l)]
Sum probabilities in either direction and stop when ≥ 0.5 The corresponding l-value is the median, shown as j above. If the sum
is exactly 0.5 at l = j then median(PL) = (2j+1)/2.
Locate the maximum probability(s) P(PL= l). All corresponding l-values are the mode(s), shown above as mode(PL) = {i,k}.
Table III applies to any non-negative withdrawal rate (WR), and ∑
P Ruin t =1 implies that no
investment account lasts in perpetuity, including when WR = 0. It is suggested that financial advisors examine
the event PL < TR as it implies the retiree outlives their savings. The probability of this event, P(PL < TR), is the
probability of ruin (with T = TR). We can compute P(PL < TR) using conditional probabilities as follows:
PL < TR
≡ P
T
∩ S
≡ P
T
∩ T
0 ∪ T
∩ T
0 ∪ ⋯∪ P
≡ P
→ P(PL < TR)
T
[where S is any generic sample space, i.e., P(S)=1]
1 ∪ ⋯∪ T
=∑
P P
T ∩ T
=∑
P P
T |T
=∑
P P
t|T
=∑
1
P P
=∑
1
P Ruin
=∑
1
P Retirement Success | T
[replace S by the sample space for TR]
T
∩ T
T ] [distributive property for sets]
[probabilities for mutually exclusive events are summed]
t
t P T
t P T
t|T
T
(2.N.5)
t
[conditional probability uses fixed horizon length, TF]
t
t P T
T |T
[since P(A|B) = P(A ∩ B)/P(B)]
[drop t=0 from prior step since PL ≥ 0]
t
t P T
t
t P T
[compute using success probabilities]
t
(2.N.6)
As noted, P(PL < TR) is, by definition, the probability of ruin using a random time horizon. With respect to the
portfolio longevity (PL), the probability said to be of most interest is derived entirely using ruin probabilities,
as shown in (2.N.6) where probabilities for the RV PL do not appear.
27
N.2 Computing Ruin Probabilities
Assume the retiree has made successful withdrawals at times t=1,...,t-1. The event Ruin(t) occurs
when ȓ(t) ≤ RF(t-1), where RF(t) = RF(t-1)/[ȓ(t) – RF(t-1)] for t=1,...,T and RF(0) = WR (Rook, 2014). Thus,
RuinC(t) occurs when ȓ(t) > RF(t-1). RF(t) is called the ruin factor and reflects the retiree’s funded status at
time t with 1/RF(t) equal to the # of real withdrawals remaining (Rook, 2014). The event of achieving
retirement success using an SWR, is thus defined for fixed and random horizons, respectively, as:
RuinC(≤ TF) ≡ (Retirement Success | T=TF) ≡ ⋂
ȓ t
RF t
1 , ȓ(t) ~ ht(ȓ)
(2.N.7)
RuinC(≤ TR) ≡ (Retirement Success | T=TR) ≡ ⋂
ȓ t
RF t
1 , ȓ(t) ~ ht(ȓ) and TR ~ P(TR = t)
(2.N.8)
Recall that ȓ(t) is the expense-adjusted real compounding return on a diversified portfolio of N securities and
a function of the asset allocation set at time t-1. It follows that the corresponding success probability for
fixed T=TF in (2.N.7), assuming independence of ȓ(t) across time, is (
T
P Ruin
…
…
replaces ȓ(t) as vbl of integration):
…
(2.N.9)
The success probability for random T=TR in (2.N.8) is 1 – P[Ruin(≤ TR)], where P[Ruin(≤ TR)] was derived in
(2.N.6) above and also uses (2.N.9). For any events A and B, if A ⊂ B then P(B ∩ AC) = P(B) - P(A). Since
RuinC(≤ t) ⊂ RuinC(≤ t-1) and Ruin(t)≡[RuinC(≤t-1)∩Ruin(≤t)], it follows that P[Ruin(t)] = P[RuinC(≤ t-1) ∩
Ruin(≤t)] = P[RuinC(≤ t-1)] - P[RuinC(≤t)].25 Consequently, for ȓ(t) ~ ht(ȓ) and t ≤ TF:
P Ruin t
P ⋂
…
ȓ i
RF i
1
P ⋂
…
ȓ i
RF i
…
1
(2.N.10)
…
…
…
Given values for the security weights (αt-1,1, ..., αt-1,N) at time t (i.e., the asset allocation), the terms in (2.N.10)
are estimated using simulation or approximated recursively with a dynamic program (DP), see Rook (2014)
and Rook (2015). Subsequently, Table III can be populated with these probabilities. Usually we are not
given the weights but are tasked with deriving them according to some optimality criteria. Rook (2014)
derives the weights that minimize the probability of ruin for a stock and bond portfolio using a dynamic
glidepath (for both TF and TR), and Rook (2015) derives the corresponding weights to minimize the
probability of ruin using a static glidepath. Both solutions assume normally distributed compounding returns
and, as noted, many financial practitioners/researchers reject this assumption. The primary purpose of this
research is to extend these and other models to non-normal compounding returns. It was noted above that
investment accounts do not last forever regardless of the withdrawal rate (WR). When WR = 0, RF(t) = 0 ∀ t =
25
See Rook (2014) for corresponding Venn diagrams.
28
0, ..., T. As T → ∞, Ruin(t) occurs when ȓ(t) ≤ 0 for any t. Consequently, if P[ȓ(t) ≤ 0] > 0, the event of ruin will
eventually occur under an infinite time horizon. Unfortunately, the lognormal PDF is defined for values ≥ 0
with f(0) = 0 and it does not allow compounding returns of zero. The PDF we develop for ȓ(t) assigns a > 0
probability to the event ȓ(t) ≤ 0 as compounding returns and prices of securities can and do take values of zero.
III. Univariate Density Modeling
The expense-adjusted real compounding return on a diversified portfolio determines the success or
failure of a retirement strategy (§II.N). We assume independence across time and use securities from Table I
that are random samples.26 The multivariate PDF for the expense-adjusted real compounding return on S&P
500 (L), Small Cap Equities (S), and U.S. 10-Year T-Bonds (B) will be developed in this research. The RVs
representing these returns are (L, S, B)′ and the multivariate PDF is f(l,s,b). A diversified portfolio using
these securities generates time t expense-adjusted real compounding return ȓ(t) =αt-1L(1-EL)L + αt-1S(1-ES)S+
αt-1B(1-EB)B, where αt-1,L, αt-1,S, αt-1,B are the portfolio weights (≥0) set at time t-1 with αt-1,L + αt-1,S + αt-1,B = 1,
and EL, ES, EB are the expenses. Similar to copula modeling (§II.L), we first build univariate PDFs fL(l),
fS(s) and fB(b) for L, S and B, respectively. The multivariate PDF f(l,s,b) (built in §IV and §V) will preserve
the marginals, i.e., fL(l) =
, ,
, fS(s) =
, ,
and fB(b) =
, ,
.
Univariate PDFs for (L, S, B)′ are fit to finite normal mixtures using the EM algorithm with random starts and
a variance ratio constraint to eliminate spurious maximizers (§II.E). A novel forward-backward procedure
is introduced to find the optimal # of univariate components, generally considered an unsolved problem in
statistics (§II.M). The forward portion tests 1 vs. 2 components using a bootstrapped LRT (§II.H), then (1
or 2) vs. 3 components, up to the maximum # of univariate components allowed. If the forward procedure
ends with the last significant test being g components, the backward portion tests g vs. g-1 components, then
g vs. g-2, etc..., until a significant difference is found ending the procedure. For example, if backward test g
vs. g-k yields a significant difference then the optimal # of components is g-k+1. Note that AndersonDarling normality tests for (L, S, B)′ yield p-values 0.7206, 0.0984 and 0.2607, respectively, indicating that
the normality assumption is not rejected at α=0.05 for these securities. The fact that all 3 can be assumed to
originate from univariate normal distributions should not be lost in the forthcoming analysis.
A. Univariate PDFs
All univariate tests of g vs. g+k components will use 1,000 LRT bootstrap samples. Each sample fits
data to both g and g+k component mixtures using 6,000*(g-1) random starts for each execution of the EM
algorithm when g>1. Random starts use values generated from the nearest fitted mixture for the same data
but with fewer components. Each LRT sample value thus requires 6,000*(2g+k-2) EM executions.
26
Retirement research that uses serially correlated assets should account for the dependence in the multivariate PDF, otherwise valid
doubts may be raised. This would include strategies that use certain short-term cash equivalents such as U.S. T-Bills (see Table I).
29
A.1 Univariate PDF for S&P 500 (L): fL(l)
Figure IV. Annual Real S&P 500 Compounding Returns (L) Histogram
Table IV. Univariate Mixture PDFs for Annual Real S&P 500 Compounding Returns (L)
Number of Components
2
5
1
3
4
LL =
VR =
AIC =
AICC =
BIC =
17.9019
1.0000
-31.8038
-31.5181
-26.8491
LL =
VR =
AIC =
AICC =
BIC =
18.6383
46.7606
-27.2766
-26.2396
-14.8899
LL = 20.1144
VR = 68.4102
AIC = -24.2289
AICC = -21.9211
BIC = -4.4102
LL =
VR =
AIC =
AICC =
BIC =
25.1860
84.6646
-28.3721
-24.2120
-1.1214
LL = 26.7351
VR = 42.6613
AIC = -25.4702
AICC = -18.8035
BIC = 9.2125
μ(L) =
σ(L) =
γ(L) =
κ(L) =
1.082
0.1974
0.00000
3.00000
μ(L) =
σ(L) =
γ(L) =
κ(L) =
1.082
0.1974
-0.10701
2.87231
μ(L) =
1.082
σ(L) = 0.1974
γ(L) = -0.26986
κ(L) = 3.02576
μ(L) =
σ(L) =
γ(L) =
κ(L) =
1.082
0.1974
-0.20207
2.76519
μ(L) =
1.082
σ(L) = 0.1974
γ(L) = -0.14463
κ(L) = 2.98090
π
μ
σ
π
μ
σ
π
μ
σ
π
μ
σ
π
μ
σ
1.000
1.082
0.197
0.056
1.287
0.029
0.833
1.055
0.204
0.092
0.998
0.016
0.114
0.998
0.017
0.944
1.070
0.197
0.078
1.286
0.029
0.708
1.170
0.149
0.045
0.630
0.022
0.089
1.157
0.025
0.155
0.860
0.046
0.191
0.864
0.049
0.045
0.629
0.022
0.037
1.505
0.064
0.613
1.174
0.110
Abbreviations: LL = log-likelihood, VR = Variance Ratio, γ = skewness, κ = kurtosis.
27
27
See §II.M for AIC, AICC, BIC.
Skewness(X) = γ(X) = E[((X-μ)/σ)3] = [E(X3) - 3μE(X2) + 2μ3]/σ3 = 0 for the normal PDF, thus E(X3) = 3μE(X2) - 2μ3. Kurtosis(X) =
κ(X) = E[((X-μ)/σ)4] = [E(X4) - 4μE(X3) + 6μ2E(X2) - 3μ4]/σ4 = 3 for the normal PDF, thus E(X4) = 3σ4 + 4μE(X3) -6μ2E(X2) + 3μ4. (See,
Hogg, et al., 2005 for definitions and Johnson, et al., 1994 for moment details.) Note that higher moments such as these can be difficult to
interpret in multimodal distributions.
30
Figure V. LRT Sampling Distribution for Testing the Optimal # of Univariate Mixture Components
Annual Real S&P 500 Compounding Returns (L)
Forward ↓
Backward ↑
Figure IV plots annual real compounding returns for the S&P 500 Index from 1928-2015 (n=88) in a
histogram and Table IV fits these returns to univariate normal mixtures (≤ 5 components). Tests for the
optimal # of components are done in Figure V using the forward-backward procedure described above. All
displayed values are rounded throughout and unrounded values are used in calculations. The VR constraint
is 162 and a significance level of α=0.2500 is used for each test. Some evidence of non-normality will lead to
rejection of Ho. As shown in Table IV, there is insufficient evidence to reject normality for annual real
compounding S&P 500 Index returns. The forward-backward bootstrapped LRT procedure is in agreement
with all 3 information criteria values (AIC, AICC, BIC) that a univariate normal PDF is appropriate for these
returns, which also agrees with the AD test for normality (p=0.7206).
31
A.2 Univariate PDF for Small Cap (S): fS(s)
Figure VI. Annual Real Small Cap Compounding Returns (S) Histogram
Table V. Univariate Mixture PDFs for Annual Real Small Cap Compounding Returns (S)
Number of Components
2
5
1
3
4
LL =
VR =
AIC =
AICC =
BIC =
-24.7605
1.0000
53.5211
53.8067
58.4758
LL =
VR =
AIC =
AICC =
BIC =
-23.0510
148.4732
56.1021
57.1390
68.4888
μ(S) =
σ(S) =
γ(S) =
κ(S) =
1.132
0.3206
0.00000
3.00000
μ(S) =
σ(S) =
γ(S) =
κ(S) =
1.132
0.3206
0.13061
3.02488
LL = -18.3915
VR = 241.2802
AIC = 52.7829
AICC = 55.0907
BIC = 72.6016
μ(S) =
σ(S) =
γ(S) =
κ(S) =
LL =
VR =
AIC =
AICC =
BIC =
-15.9514
241.5788
53.9028
58.0628
81.1535
μ(S) =
σ(S) =
γ(S) =
κ(S) =
1.132
0.3206
0.15342
4.60462
1.132
0.3206
0.23954
3.71740
LL = -14.4531
VR = 198.4935
AIC = 56.9062
AICC = 63.5729
BIC = 91.5889
μ(S) =
σ(S) =
γ(S) =
κ(S) =
1.132
0.3206
0.61679
4.52729
π
μ
σ
π
μ
σ
π
μ
σ
π
μ
σ
π
μ
σ
1.000
1.132
0.321
0.928
1.150
0.326
0.164
0.945
0.065
0.483
1.155
0.426
0.194
1.185
0.029
0.072
0.908
0.027
0.707
1.165
0.367
0.114
1.338
0.051
0.149
1.338
0.054
0.129
1.192
0.024
0.167
1.187
0.027
0.105
0.662
0.139
0.237
0.948
0.074
0.258
1.370
0.415
0.295
0.954
0.076
Abbreviations: LL = log-likelihood, VR = Variance Ratio, γ = skewness, κ = kurtosis. See §II.M for AIC, AICC, BIC.
32
Figure VII. LRT Sampling Distribution for Testing the Optimal # of Univariate Mixture Components
Annual Real Small Cap Compounding Returns (S)
Forward ↓
Backward ↑
Annual real small cap compounding returns from 1928-2015 (n=88) are plotted in Figure VI and
Table V fits these returns to univariate normal mixtures (≤ 5 components). Tests for the optimal # of
components are shown in Figure VII using the forward-backward procedure described above with VR
constraint of 162 and significance level α = 0.2500. The test of 1 vs. 3 components yields a significant pvalue and Ho is rejected.
Backward processing begins by testing 2 vs. 3 components which is also
significant, ending the procedure. A 3-component normal mixture PDF is therefore found appropriate for
these returns. The coefficient γ(S) = 0.23954 > 0 indicates the PDF has positive skew and κ(S) = 3.71740 > 3
indicates a positive excess kurtosis which implies a heavier tail than the normal distribution. The fitted
marginal PDF is evidently skewed, heavy-tailed, and multimodal (Table V).
33
A.3 Univariate PDF for U.S. 10-Year T-Bonds (B): fB(b)
Figure VIII. Annual Real U.S. 10-Year T-Bond Total Compounding Returns (B) Histogram
Table VI. Univariate Mixture PDFs for Annual Real U.S. 10-Year T-Bond Total Compounding Returns (B)
Number of Components
2
5
1
3
4
LL = 94.9092
VR = 1.0000
AIC = -185.8184
AICC = -185.5327
BIC = -180.8637
μ(B) =
σ(B) =
γ(B) =
κ(B) =
LL = 99.4731
VR = 16.7844
AIC = -188.9463
AICC = -187.9092
BIC = -176.5596
1.022
0.0823
0.00000
3.00000
μ(B) =
σ(B) =
γ(B) =
κ(B) =
1.022
0.0823
0.47529
3.36595
LL =
VR =
AIC =
AICC =
BIC =
100.2688
20.2289
-184.5377
-182.2299
-164.7190
μ(B) =
σ(B) =
γ(B) =
κ(B) =
1.022
0.0823
0.50035
3.26913
LL = 102.2525
VR =
8.8448
AIC = -182.5049
AICC = -178.3450
BIC = -155.2542
μ(B) =
σ(B) =
γ(B) =
κ(B) =
1.022
0.0823
0.49208
3.14599
LL =
VR =
AIC =
AICC =
BIC =
104.1529
125.3318
-180.3057
-173.6391
-145.6230
μ(B) =
σ(B) =
γ(B) =
κ(B) =
1.022
0.0823
0.49047
3.14076
π
μ
σ
π
μ
σ
π
μ
σ
π
μ
σ
π
μ
σ
1.000
1.022
0.082
0.948
1.011
0.070
0.893
1.004
0.065
0.089
1.118
0.020
0.350
0.991
0.029
0.052
1.220
0.017
0.055
1.220
0.017
0.118
0.903
0.021
0.385
1.059
0.041
0.052
1.120
0.015
0.057
1.220
0.017
0.042
1.128
0.004
0.736
1.014
0.051
0.167
0.908
0.024
0.057
1.220
0.017
Abbreviations: LL = log-likelihood, VR = Variance Ratio, γ = skewness, κ = kurtosis. See §II.M for AIC, AICC, BIC.
34
Figure IX. LRT Sampling Distribution for Testing the Optimal # of Univariate Mixture Components
Annual Real U.S. 10-Year T-Bond Total Compounding Returns (B)
Forward ↓
Backward ↑
Annual real U.S. 10-Year T-Bond total compounding returns from 1928-2015 (n=88) are shown in
Figure VIII and are fit to univariate normal mixtures in Table VI. The optimal # of components is found via
the forward-backward procedure detailed in Figure IX with VR constraint of 162 and significance level of α =
0.2500. The test of 1 vs. 2 components yields a significant p-value and Ho is rejected. Backward processing
begins by testing 1 vs. 2 components which is a repeat test and not performed. A 2-component normal
mixture PDF is thus appropriate for these returns. The coefficient γ(B) = 0.47529 > 0 indicates this PDF has
positive skew and κ(B) =3.36595 > 3 indicates a positive excess kurtosis which implies a heavier tail than the
normal distribution. The fitted marginal PDF is evidently skewed, heavy-tailed, and multimodal (Table VI).
35
B. Univariate PDF Summary
Security
S&P 500 (L)
Small Cap (S)
U.S. 10-Year T-Bond (B)
Table VII. Full Univariate PDF Parameterization
π
Component
μ
σ
1
1.000000000000000
1.082139318181818
0.197430382245555
1
0.163796557010864
0.944667188140307
0.065233151408053
2
0.707369571461765
1.165057494177362
0.366529325768043
3
0.128833871527371
1.191903886074301
0.023596517545339
1
2
0.947744576049301
0.052255423950700
1.011164539967906
1.220436091927283
0.069579917666149
0.016983666409906
Note: Use these estimates along with the historical data to reproduce the log-likelihood values.
Tests for the optimal # of components use α = 0.2500. Large values are common defaults in forwardbackward testing procedures. A variance ratio constraint of VR = 256 was used to eliminate spurious
optimizers while finding MLEs (§II.E) with the EM algorithm (§II.F). Reducing this value or adding new
constraints on either the probabilities or means will alter the PDF shapes, for example increasing or
decreasing the # of modes/peaks (see Figure X). To add a constraint simply discard any random start that
violates it.
Skewed unimodal PDFs such as the lognormal were available but did not optimize the
constrained objectives. Under interpretation (2) from §II.B components are assigned labels. The data
suggest that annual real compounding S&P 500 returns originate from one regime, but that small cap equity
returns originate from 3. Namely, a dominant N(1.165, 0.367) PDF generates about 70% of returns (including
outliers) and a low N(0.945, 0.065) PDF generates >15%, with <15% originating from a high N(1.192, 0.024)
PDF. The high/low regimes add shoulders above and below the mean with the PDF evidently heavier tailed
than a normal. Annual real U.S. 10-Year T-Bond total compounding returns originate from 2 regimes with
the dominant N(1.011, 0.070) PDF generating 95% of returns, and a high-outlier N(1.220, 0.017) PDF regime
generating the other 5%. Note that these returns averaged 1.033 from 2010 - 2015, which is above the
dominant regime μ and overall historical mean of μ(B) = 1.022. Consequently, widespread claims that current
low yields invalidate retirement heuristics such as the “4% rule” should be met with skepticism.
Figure X. Univariate Mixture PDFs with Probability Weighted Component Regimes
36
IV. Multivariate Density Modeling w/out Covariances
The multivariate PDF for (L, S, B)′ is built in two steps. First, dependence is introduced without
correlations and the result is the starting point for a final step of estimating correlations. Under interpretation
(2) in §II.B, mixture observations come from labeled regimes as seen in §III.B for (L,S,B)′. An observation
from the multivariate PDF can be viewed as originating from some combination of these regimes. There are
1, 3, 2 regimes governing L, S, B, respectively, thus at most 1·3·2 = 6 regimes will govern the multivariate PDF.
A parsimonious multivariate PDF may call for eliminating combinations that have not produced data. The
goal is to perform regime selection in an optimal manner, accounting for the sample size and total # of
multivariate PDF parameters. We must also preserve the marginal PDFs that were derived in §III.A.
A. Multivariate Regimes
Under mixture PDF interpretation (2), regimes produce observations. After estimating the PDF
parameters in a mixture (2.B.2), we can estimate the probability that an observation is from a given regime.
Let Xt and Zt = (zt1, ..., ztg)′ be the time t observation and component indicator RVs for a g-component
univariate mixture PDF, for t=1,...,T. Assume all parameters have been estimated as in §III.A and that xt is
the observed value at time t. The probability that xt is produced by component i, i=1,...,g is:
P
Since
1|
has been estimated and
P
P
1,
|
P
=
|
with
1 ∗P
P
∗
1
∑
(4.A.1)
also estimated, this quantity can be computed for
each observation xt, t=1,...,T. Bayes decision rule assigns each observation to the component with largest
probability and is considered an optimal allocation scheme (McLachlan & Peel, 2000). Let nijk be the # of
observations in regimes i, j, k of RVs L, S, B, respectively, using the assignment rule above. The probability
that an observation on (L, S, B)′ originates from a given multivariate component can be estimated as
̂ =nijk/T, where
will be the true (unknown) probability, see Figure XI.
Figure XI. Multivariate Regime Combinations for (L, S, B) with Estimated Probabilities
Note: Observations on the trivariate (L, S, B) exist in each cell and correlations may change across regimes. For example
the correlation between S and B may be strongly positive in one cell and strongly negative in another (see §V).
37
If L, S and B are independent, the multivariate PDF is the product of the marginals, f(l,s,b) = fL(l)·fS(s)·fB(b).
The marginals were fit to mixtures in §III.A and their product is a 6-component multivariate normal mixture
that yields the fitted marginals. Under independence the probability that a multivariate observation (l, s, b) is
from a given regime is the product of the marginal probabilities. There is no basis to assume independence
and Figure XI shows the multivariate component probabilities estimated from the data, namely ̂
.
Dependence for multivariate mixture PDFs takes 2 forms: between component and within component.
Between component dependence is modeled via the probabilities and within component dependence is
modeled via the covariances. Both must preserve the marginals from §III.A, however the ̂
estimates in
Figure XI do not, thus they are infeasible. For example, using fS(s) the probability that S is from the
“dominant” regime equals 0.707 (Table V) whereas using the data it is 60/88 = 0.682 (Figure XI). Conway
(1979) gives conditions that guarantee both univariate and bivariate PMFs are enforced for probabilities in a
3-way contingency table. If the bivariate PDF is of interest we suggest deriving it from the trivariate PDF.
B. Multivariate Regime Selection via Linear Programs (LPs)
Our goal is to parsimoniously model between component dependence while preserving the marginal
PDFs from §III.A. Two approaches are presented and become initial solutions for a final step of estimating
covariances and updating component probabilities. We limit the discussion to the problem at hand, however,
the methods are completely generic and easily extendable to arbitrarily dimensional problems.
B.1 Minimize Maximum Distance (Minimax) LP
Define the maximum distance between true (
S, B from Figure XI as Z = max{|
- ̂
|, |
- ̂
|, |
) and estimated ( ̂ ) component probabilities for L,
- ̂
|, |
- ̂
|, |
|, |
- ̂
- ̂
|}. Values for
that minimize Z and preserve the marginal PDFs from §III.A would be of interest. Namely, solving:
Minimize:
Subject to:
Z = max{|
- ̂
|, |
- ̂
|, |
- ̂
|, |
1.000
0.164
0.707
0.129
|, |
|, |
- ̂
(L-marginals)
(S-marginals)
- ̂
|}
(4.B.1)
(B-marginals)
0.948
0.052
1.000
Where:
- ̂
≥ 0, i=1, j=1,2,3, k=1,2
(Probabilities sum to 1)
(non-negativity constraints)
Minimizing the maximum of a set is a minimax objective. While Z is not linear, the constrained optimization
problem in (4.B.1) can be formulated and solved as an LP. Note that of the 7 constraints, the 4th and 6th are
redundant since all probabilities sum to 1 as is the 7th since L has 1 component. They are thus dropped, and
since the maximum of a set must be greater-than or equal-to all set elements, (4.B.1) becomes:
38
Minimize:
Subject to:
Z
Z≥|
- ̂
|
i=1, j=1,2,3, k=1,2
(L-marginals)
(S-marginals)
1.000
0.164
0.707
(B-marginals)
0.948
Where:
≥ 0, i=1, j=1,2,3, k=1,2
Z,
(4.B.2)
(non-negativity constraints)
Constraints in (4.B.2) include absolute values and are non-linear, however note that X ≥ |Y| iff X ≥ Y and X ≥
-Y. To promote parsimony we penalize the objective when a cell from Figure XI containing 0 observations
yields a > 0 probability. This will ensure it only occurs when needed for feasibility. The constraints are
nijk +Xijk, and the penalty is M· ∑
∑
∑
, where M is arbitrarily large. When nijk = 0 and
X
≤
> 0, Xijk
must be > 0 to satisfy the constraint and Z suffers a penalty. The final LP formulation is:
Minimize:
Z+M∙ ∑
∑
Subject to:
Z≥
and Z ≥ ̂
- ̂
∑
X
for i=1, j=1,2,3, k=1,2
for i=1, j=1,2,3, k=1,2
(L-marginals)
(4.B.3)
(S-marginals)
-
≤ nijk + Xijk
1.000
0.164
0.707
(B-marginals)
0.948
Where:
, Xijk ≥ 0, for i=1, j=1,2,3, k=1,2
M and n for i=1, j=1,2,3, k=1,2
(non-negativity constraints)
(known constants)
Z,
This LP was solved using the techniques from §II.K.1. The solution is
= 0.1212,
= 0.0000,
= 0.1638,
= 0.6627,
= 0.0076, yielding the minimization objective Z = 0.0151.
= 0.0447,
B.2 Minimum Sum of Squared Distances LP
Define the sum of squared distances between true (
for L, S, B from Figure XI as Z = (
Values of
- ̂
2
- ̂
+
2
+(
) and estimated ( ̂ ) component probabilities
- ̂
2
+(
- ̂
2
+(
- ̂
2
+(
- ̂
2
.
that minimize Z and preserve the marginal PDFs in §III.A are of interest. Namely, solving:
Minimize:
Z=∑
∑
∑
̂
Subject to:
1.000
0.164
0.707
0.948
Where:
≥ 0, i=1, j=1,2,3, k=1,2
(L-marginals)
(S-marginals)
(4.B.4)
(B-marginals)
(non-negativity constraints)
The objective Z is quadratic and separable therefore (4.B.4) can be approximated by an LP as shown in
§II.K.2. Each decision variable
appears in one term of Z and has a convex shape similar to Figure III.
Each horizontal axis range is 0 ≤
≤ 1 and (4.B.4) is converted to an LP by replacing the quadratic terms
39
with connected line segments. The horizontal axis is partitioned into S contiguous sections and any value
is reachable as
linearly by ∑
α p
=∑
α p
p/S
p/S with ∑
α p
=1. Each term
, and the same penalty from (4.B.3) is applied thus (4.B.4) becomes:
̂
∑
∑
Subject to:
∑
α p
∑
∑
∑
∑
α p
p/S
1.000
∑
∑
∑
∑
α p
p/S
0.164
∑
∑
∑
∑
α p
p/S
0.707
∑
∑
∑
∑
α p
p/S
0.948
The decision variables
∑
∑
+M∙ ∑
Minimize:
Where:
is then approximated
̂
α p
p/S
̂
∑
p/S ≤ nijk + Xijk
, Xijk ≥ 0, for i=1, j=1,2,3, k=1,2, p=0,...,S
M, S, ̂ , n for i=1, j=1,2,3, k=1,2
α p
in (4.B.4) are replaced by α p
∑
X
for i=1, j=1,2,3, k=1,2
(L-marginals)
(S-marginals)
(4.B.5)
(B-marginals)
(non-negativity constraints)
(known constants)
in (4.B.5) and note that a minimization objective
ensures only adjacent α’s are > 0 for each i,j,k. We use S=500 and solve the LP in (4.B.5) to obtain
0.1638,
= 0.6614,
= 0.1226,
= 0.0000,
= 0.0460,
=
= 0.0063, yielding the objective Z = 0.0008.
The LPs solved in §IV.B.1 and §IV.B.2 were customized for the current exercise of modeling the
multivariate PDF of (L, S, B)′ and the concepts are easily extendable to any collection of securities. The code
supplied in Appendix C models an arbitrary number of securities. Our purpose is twofold: (1) find a feasible
solution to initialize the final step, and (2) eliminate as many unnecessary multivariate components as
possible. In larger problems this step can eliminate > 80% of multivariate cells. Note that dependence for (L,
S, B)′ has been introduced without having estimated any covariances as the multivariate PDFs using these LP
solutions are not the product of the marginals from §III.A. Specifically, between component dependence has
been introduced using the data to guide which components occur together and at what frequency. Note that
randomly reordering the returns on each of the 3 assets separately would not change the results of §III.A,
however would change the probability estimates in §IV.B.1 and §IV.B.2. The unknown
from Figure XI
now have 2 sets of initial values that are feasible and preserve the marginals.
V. Multivariate Density Modeling w/Covariances
Let X1, ..., XN be RVs for the real compounding return on N financial securities that are not serially
correlated. Historical data on each Xj will be a random sample over time, say, xtj, t=1,...,T and j=1,...,N, where
Xtj = (1 + rtj) with rtj being the real return from §II.N. The marginal density for each Xj can be modeled as a
normal mixture, fj(xj), having gj components with E(Xj|zji=1)=μji, V(Xj|zji=1)=σji2 and P(zji=1)=πji for j=1,...,N
and i=1,...,gj. The multivariate PDF for (X1,...,XN)′ will be modeled as a G-component normal mixture with
Cov(Xj,Xk|zc =1) = σcjk for j≠k=1,...,N and P[zc=1] = c, c=1,...,G. As seen in Figure XI, each zc defines a
combination of univariate components. The multivariate PDF for (X1,...,XN)′ is:
40
,…,
√2π
| |
e
,
∈
(5.1)
which, to maintain the fitted marginals, must satisfy:
…
,…,
…
…
,
j
1, … , N
(5.2)
The log-likelihood of the unknown parameters given the historical sample and known parameters is:
ln
,…,
,
,…,
,…,
,
,…,
,
ln
,…,
√2π
| |
(5.3)
e
MLEs for the unknown parameters are found by solving the following general NLP (see, §II.K.4):
Maximize:
Z=∑
(5.4)
ln
∞
Subject to:
j
∞
…
∞
1
∞
…
j 1
j 1
…
N
,
j
Eigenj( ) > 0, for j=1,...,N and c=1,...,G
∑
Where:
1, σ
0
|
√
|
e
,
∈
= Diag( ), c=1,...,G
,
(uphold marginals)
(VC matrices are +definite)
, for j≠k=1,...,N and c=1,...,G
∈
1, … , N
(multivariate PDF)
(decision variables)
(known constants)
The log-likelihood for a G-component multivariate mixture is maximized in (5.4) with respect to the
probabilities and off-diagonal VC elements (covariances). Linear probability constraints maintain marginals
as in §IV.B and covariance constraints will ensure +definite VC matrices (see §II.I). Researchers found that
mixture PDF parameters can be estimated conditionally by first deriving the probabilities holding other
parameters constant, then estimating the remaining parameters holding probabilities constant (repeating until
convergence). The ECME algorithm is one such approach that makes use of the actual or incomplete loglikelihood in (2.E.2) (see, Liu & Rubin, 1994; McLachlan & Krishnan, 2008) and is the technique we will
employ in optimizing (5.4). We will define the indicator function I(c,j,i) as 1 when univariate component i of
security j exists in multivariate component c, for j=1,...,N, i=1,...,gj, c=1,...,G and 0 otherwise.
A. Multivariate PDF Optimization
A.1 Step 1: Optimize wrt Probabilities ( ) Holding Covariances Constant
Maximize:
Z=∑
Subject to:
∑
Where:
∑
ln
I c, j, i ∙
ln ∑
∙
= πji, for j=1,...,N and i=1,...,gj
(5.A.1)
(uphold marginals)
≥ 0, for c=1,...,G
(non-negativity constraints)
e
, for t=1,...,T & c=1,...,G (known constants)
√
|
|
Since, (1) linear functions are concave, (2) log of a concave function is concave, (3) sum of concave functions
is concave, Z is concave in
(Boyd & Vandenberghe, 2009). Marginals are enforced with independent
linear constraints, thus (5.A.1) is a CCP from §II.K.3 and local optimums are global optimums. A critical
41
point of the Lagrangian for (5.A.1) yields the maximum where L( , λ) = Z - ∑
(Jensen & Bard, 2003). The 1st derivatives are ∂L( ,λ)/∂ = ∑
I k, j, i
=π -∑
∂2L( ,λ)/
-∑
, the 2nd derivatives are ∂2L( ,λ)/∂ =∑
, ∂2L( ,λ)/
∑
∑
λ ∑
πji ,
I k, j, i
λ I c, j, i , and ∂L( ,λ)/∂λ
, and
=∑
λ =-I c, j, i for c≠d=1,...,G, j=1,...,N, i=1,...,gj. All 2nd derivatives wrt the Lagrange multipliers
are zero and non-negativity constraints on
are enforced by dropping any components having
< 0.
A.2 Step 2: Optimize wrt Covariances (σ ) Holding Probabilities Constant
Maximize:
Z=∑
Subject to:
Eigenj( ) > 0, for j=1,...,N and c=1,...,G
Where:
σ
ln
∑
ln ∑
√
, for j≠k=1,...,N and c=1,...,G
≥ 0, for c=1,...,G
∈
|
|
(5.A.2)
e
(VC matrices are +definite)
(decision variables)
(known constants)
Maximizing a multivariate log-likelihood function with respect to variance components is a difficult general
NLP (§II.K.4) as there may be multiple local optimums or saddle points with zero gradient as well as
boundary optimums with non-zero gradient. Searle, et al., (1992) recommend a hill-climbing procedure
based at a good starting point. The gradient (g) helps inform on direction and the Hessian (H) on step size.
Levenberg (1944) suggests a modification to Newton’s method that iterates as θi+1 = θi – [H(θi) + si·I]-1·g(θi)
where si adjusts the step size and climbing angle. Marquardt (1963) derived a similar modification iterating
as θi+1 = θi – [H(θi) + si·Diag(H(θi))]-1·g(θi), which is considered an optimal compromise between Newton’s
method (which often diverges) and gradient ascent/descent (which converges too slowly). A class of
Levenberg-Marquardt techniques based on these approaches has since been published, see Gavin (2017) for
an overview. While designed to find least-squares estimates in non-linear models (a constrained minimization
problem), Searle, et al. (1992) note that they are also useful in finding MLEs for variance components.
Both gradient ascent and Newton’s method failed to optimize (5.A.2) for the reasons stated and a
Levenberg-Marquardt approach was taken, namely iterations defined by θi+1 = θi –λi [H(θi) + si·I]-1·g(θi) with |si|
≤ Max(|Diag[H(θi)]|) and line-search parameter λi ∈ (0,1). A large # of random si and λi are generated at each
iteration and we select randomly among the top performers. Varying si and λi prevents divergence with large
si mimicking gradient ascent and small si Newton’s method. This ensures the nearest maximum is found,
relative to an informed start, while scanning nearby regions for better values. Iterating into an infeasible
region is addressed by performing a ridge repair on the offending VC matrix (§II.I.1). Exact 1st and 2nd
derivatives of the log-likelihood in (5.A.2) are derived below wrt covariance terms only (§II.I.2).
A.2.1 First Derivatives for (5.A.2): (Gradient Terms)
There are G·N·(N-1)/2 covariance terms in a G-component multivariate mixture PDF for N securities.
Using the chain rule along with the results derived in §II.I.2 and Z from (5.A.2), the 1st derivatives are:
42
Z
σ
| |
√2π
e
σ
∑
∙Q
∙
e
|
|
√2π
(5.A.3)
e
1
2
, where Q
| |
σ
| |
which is a scalar for c
(5.A.4)
,
1, … , G and j
k
1, … , N.
A.2.2 Second Derivatives for (5.A.2): (Hessian Terms)
c
p
where j < k and j ≤ r are as follows:
r
s
The 2nd derivatives wrt terms σ , σ
A.2.2.1 Case 1: wrt σ , σ
where c ≠ p (covariances are from different multivariate components)
A.2.2.2 Case 2: wrt σ , σ
σ
∙
∙
∙Q
(5.A.5)
where c = p (covariances are from the same multivariate component)
∙
Z
σ
∙Q
∙
Z
σ
σ
∙
∙
Q
σ
∙
∙
σ
Q
∙
∙
σ
∙
Q
∙Q
∙
∙Q
∙
σ
∙Q
(5.A.6)
,
where,
1
2
Q
σ
σ
The last term in (5.A.7) depends on the location of σ
∙| |
2
∙
| |
∙| |
σ
| |
2
∙
| |
∙| |
2
in
r and/or k
s
, for k
r
above diagonal in
∙
. . (5.A.7)
and is derived piecewise as:
, for j
i. e., σ
, otherwise
| |
| |
i. e., σ
i. e., σ
below diagonal in
(5.A.8)
above/below diagonal in
Whereas quasi-Newton methods approximate the Hessian, this Levinson-Marquardt approach will
use exact 2nd derivatives, supplied in (5.A.[5–8]). The multivariate PDF log-likelihood is maximized by
iterating over (5.A.1) and (5.A.2).28 The objective is non-decreasing across steps and iterations. We begin
with the informed starts from §IV.B.1 and §IV.B.2 then iterate until the log-likelihood stops increasing.
Non-border solutions are maximums if the region around (5.A.2) is concave, i.e., the Hessian is negative
28
The 2-step algorithm from (5.A.1) and (5.A.2) is an ECME approach, e.g. see Liu & Sun (1997) who apply Newton’s method to the EM
algorithm M-step for faster convergence. See also Liu & Rubin (1994) and McLachlan & Krishnan (2008) for ECME algorithm details.
43
semi-definite (all eigenvalues ≤ 0).
Border solutions may exist in non-concave regions.
Note that
eigenvalues computed from an ill-conditioned matrix are unstable and should not be used. Sparse matrices
containing extremely large and small (diagonal) entries are often ill-conditioned. The Hessian derived above
in §V.A.2.2 may appear problematic via inspection, however, it is real and symmetric thus its eigenvectors
are orthogonal and the condition # is 1 (in theory). Bauer-Fike give bounds for the accuracy of eigenvalues
as κ(U)·‖ ‖ , where the Hessian H is subject to error E and U is the matrix of column eigenvectors for H
with ‖∙‖ denoting the Euclidean norm (2-norm). The condition # is κ(U) = ‖ ‖ and when κ(U) ≫ 1 the
matrix is ill-conditioned and calculated eigenvalues are suspect (Meyer, 2000). We will select the PDF
having min(AIC) across the informed starts from §IV.B and conduct an in-depth analysis of the surface’s
properties at the maximizer, considering also whether or not it is spurious and/or ill-conditioned.
B. Multivariate PDF for (L, S, B)′
The approach from §V.A was used to estimate the probabilities and covariances for f(l,s,b), the
multivariate PDF of (L, S, B)′. The result is a 5-component multivariate mixture PDF (see Table VIII) which
supplements the univariate PDF estimates in Table VII. The univariate regime labels propagate through to
the multivariate PDF. Without a doubt many disciplines would discard this solution as a spurious maximizer
since components 3 & 5 model only a few observations and much of the log-likelihood improvement over a
multivariate normal is via these components.29 Finance, however, differs from other industries in that a
primary focus is studying risk. Extreme events drive risk and instead of discarding outliers, finance assigns
them labels such as ‘gray’ or ‘black’ swans (Taleb, 2010). Conventional wisdom suggests, for example, that
such outliers can cause a bank to fail or a retiree to experience financial ruin thus they must be accounted for.
It is also a reason why the normal distribution may be rejected in financial research. Our model accounts for
risk by either explicitly modeling low outliers which adds density to the tail or by modeling high outliers
which shifts the dominant regimes left (along with their tails). In this application the latter occurs. There is a
tradeoff with either approach as the within regime variance shrinks when observations are separated. The
kurtosis indicates whether or not the mixture PDF is heavier tailed than a normal PDF as described in §III.
As an aside, the predictive modeler may accuse us of memorizing the training data and suggest that this is
always possible with a model of sufficient complexity but that such models are poor at prediction. A best
practice when predicting is to partition the data into 3 sets then train models on the 1st set, evaluate/select the
best using the 2nd, and report results after applying the chosen model to the 3rd. Unfortunately, there is
insufficient data to use this practice on annual historical returns in finance. Lastly, using information criteria
such as AIC from §II.M, the 5-component multivariate mixture from Table VIII (LL=159.09 & 28 free
parameters) is superior to a multivariate normal (LL=134.43 & 9 free parameters), since -262.18 < -250.86.
29
The solution would be to tighten the marginal constraints (lower the variance ratio or add constraints on the means and/or probabilities).
44
Table VIII. Full Multivariate PDF Parameterization
Component
(L, S, B)
π
ρLS
ρLB
ρSB
Det(Σ)
1
(1, 1, 1)
0.163796557010864
0.718841320548123
0.162032898398328
0.156156396700733
0.000000376625410
2
(1, 2, 1)
0.683298902828332
0.846153215066181
-0.095463348011069
-0.082959075055513
0.000007134870354
3
(1, 2, 2)
0.024070668633433
0.047531637731748
-0.703796286452937
-0.743051448755313
0.000000000000100
4
(1, 3, 1)
0.100649116210105
0.577235331054455
0.555733717419093
0.698818203652309
0.000000033408954
5
(1, 3, 2)
0.028184755317266
0.962441058378833
0.487911866790132
0.673278286734948
0.000000000091838
Note: Use these estimates with those in Table VII (and the historical data) to reproduce the multivariate log-likelihood values.
Table VIII estimates were generated using the 2-step procedure from §V.A, which converged in 2
iterations. Step 1 from (5.A.1) required 5 and 4 sub-iterations while Step 2 from (5.A.2) required 54 then 1,
respectively. The optimization in (5.A.1) is convex and will converge to a global maximum, while that in
(5.A.2) is not. Starting at the LP solution from §IV.B.2, (5.A.2) instantly requires 5 ridge repairs and lands
in a non-concave region. The final VC matrix repair occurs at sub-iteration 6/54 and between sub-iterations
8/54 and 47/54 the procedure finds a concave region and methodically climbs it. The Hessian matrix
condition # begins at 1 and slowly increases, ending at 1.001278, perhaps revealing some numerical
instability. Between sub-iterations 47/54 and 54/54 a Hessian eigenvalue turns positive and Step 1 ends at a
saddle point. Step 2 ends nearby and is a boundary solution since Σ3 is borderline +definite, which is a
constraint in (5.A.2). To enforce it we require that all VC matrix eigenvalues are >0 with determinants
>0.113. Table VIII reveals that det(Σ3) is at the threshold and note that the log-likelihood value can be driven
higher at this solution by lowering the threshold, however the condition # becomes large and the result so
unstable that minor rounding of Σ3 produces a non +definite matrix. Such is the nature of a border solution.
The covariance between RVs X and Y is σXY = E[(X-E(X))(Y-E(Y))] =E(XY) - μ μ . Using the law
of total expectation, E(X) = EZ[E(X|Z)] for any RV Z, thus for a G-component multivariate mixture PDF:
σXY = EZ[E(XY | Z)] - μ μ
= ∑
= ∑
E XY|Z
σ
1 ∙P Z
= 0.014, and
–μ μ
–μ μ
(5.B.2)
(5.B.3)
= σXY/(σXσY). Using the multivariate PDF,
=
= -0.030. Similar values are common in retirement research, likely derived using
the unbiased sample estimator, σ =∑
correlations are
1
∙
μ μ
The correlation between RVs X and Y is then derived as
0.693,
(5.B.1)
= 0.801,
x
= 0.046, and
X y
Y ⁄ ∑
x
X
∑
y
Y
. The corresponding sample
= -0.056. The MLEs produced by iterating over (5.A.1) and
(5.A.2) are subject to constraints that maintain the marginals from §III.30 Further, the LPs solved in §IV set
the initial PDF structure and thereby introduce between-regime dependence. For this reason, ρ and ρ are
30
In general MLEs for variance components are biased because the degrees of freedom are not discounted for the estimated means. A
procedure such as restricted maximum likelihood (REML) corrects this by estimating the variances/covariances after removing the means.
45
unlikely to perfectly align. Since variances and covariances are defined as expectations (averages) they can
(and
be skewed by extreme values. The small positive estimate for
) masks the fact that in over 70%
of years the correlation between L and B is negative (regimes 2 & 3), and in another 12% it is strongly
positive (regimes 4 & 5). Mixture modeling thus uncovers insights previously not known as the within
component means/variances are used to derive these correlations. As witnessed during the financial crisis,
extreme value correlations can invalidate models as simple RV dependence structures do not hold during
times of stress. In hindsight, many blame the 2008 crisis on the Gaussian copula and its failure to accurately
model failure time correlations of derivative securities under duress. We should not expect other simple
structures, such as a single-parameter copula family, to perform any better. Retirement research increasingly
advocates for use of complex instruments to improve outcomes. Coupled with the near universal use of a
Gaussian (or lognormal) copula to model dependence reveals a situation that sounds all too familiar.31
C. Simulating from a Multivariate Mixture PDF
Let = (X1,..., XN)′ be RVs for the compounding return on N financial securities at a given time point
where ~ f( ) = ·f 1( ) + ... +
·f G( ) is a G-component multivariate normal mixture PDF. Simulating values
from f( ) is a 2-step process. First generate a uniform(0,1) random value, say u, to determine the component.
If u ≤ , the observation is from regime 1, else if ∑
<u≤∑
, the observation is from regime k,
k=2,...,G. Next, generate a value from the selected regime, say f k( ). If Σk has non-zero covariances we
apply a decorrelating transformation. Recall that the N eigenvalues (λi) and eigenvectors (ui) of Σk satisfy
Σk·ui = λiui so that ui′Σkui = λiui′ui = λi (see §II.I). Also from §V.A.2, the eigenvectors of a real/symmetric
matrix are orthogonal, thus ui′uj=0 for i≠j=1,...,N. Let U=[u1|...|uN] and make the linear transform Z = UX,
where E(Z) = U·E(X) and V(Z) = U′·Σk·U = is a diagonal matrix with variances λi. If the independent and
normally distributed Z = (Z1,...,ZN)′ are simulated individually as
then = U′ is a sample on X ~ f( ).
D. Stress-Testing a Retirement Plan
Let = (X1,..., XN)′ ~ f( ) be RVs for the compounding return on N financial securities at a given time
point. If f( ) has been developed using the historical sample then it accounts for “gray” swans (observed
outliers). A stress-test will be defined as evaluating a retirement strategy using a multivariate PDF, g( ), that
can produce “black” swans (unobserved outliers), a subjective determination. This is accomplished by
seeding the historical data
with extreme events. Note that the model proposed here can be fit to such data
whereas the normal (or lognormal) PDF cannot. The proposed retirement strategy is then subjected to g( ).
31
The problem is not avoided by backtesting a given strategy as the success/failure at any retirement start year is a Bernoulli RV which is
highly correlated with the success/failure in nearby years. This correlation is rarely, if ever, accounted for in retirement research.
46
VI. Expense-Adjusted Real Compounding Return on a Diversified Portfolio
Assume a retiree holds N securities and let pt-1,i and Pt,i be the price (value) of their security i holdings
at times t-1 and t, respectively, for i=1,...,N. The time t total return on security i is Rt,i = [Pt,i - pt-1,i]/pt-1,i and the
compounding return is 1+Rt,i = Pt,i/pt-1,i, so that (1+Rt,i)·pt-1,i = Pt,i. The real compounding return for security i is
1+rt,i, where 1+Rt,i = (1+rt,i)(1+It) and It is the inflation rate between times t-1 and t. Solving yields 1+rt,i =
pt,i/pt-1,i, where pt,i = Pt,i/(1+It) is the real price (value) of security i holdings at time t and (1+ rt,i)·pt-1,i = pt,i. If
security i includes an expense ratio, Ei, then Ei·Pi,t is paid as a cost at time t and the expense-adjusted price
(value) is Pt,i - Ei·Pt,i = (1-Ei)·Pi,t, the expense-adjusted compounding return is (1-Ei)(1+Rt,i ) = (1-Ei)·Pt,i/pt-1,i, and
the expense-adjusted real compounding return is (1-Ei)(1+rt,i) = (1-Ei)·pt,i/pt-1,i. Adding up all holdings, denote
the expense-adjusted total account values at times t-1 and t by vt-1 = ∑
p
,
1
and Vt = ∑
Ei ∙ P , ,
respectively. The expense-adjusted total return on the account between times t-1 and t is Rt = (Vt - vt-1)/vt-1 and
the expense-adjusted compounding return is 1 + Rt = Vt/vt-1. The time t expense-adjusted real compounding
return on the account must satisfy 1+ Rt = (1+ rt)(1+It) so that ȓ(t)=1+ rt = (1+Rt)/(1+It) = vt/vt-1, where vt = Vt/(1+It)
is the expense-adjusted real account value at time t. Combining it all,
r t
1
r
∑
V
1
I
∙v
E ∙ P,
I ∙∑ p
1
p
∑
,
p
∑
1
1
E
∑
,
1
,
1
r,
E ∙p,
p ,
α
,
∙ 1
∑
1
E
∑
1
E
1
p
r, ∙p
,
(6.1)
,
(6.2)
r, ,
where αt-1,i > 0 is the proportion invested in security i at time t-1 and {αt-1,i, ..., αt-1,N} is the asset allocation with
∑
α
,
1, which proves (2.N.4). When modeling returns as RVs that are not serially correlated the time
index on (1+rt,i) can be dropped, however ȓ(t) remains a function of time through the asset allocation.
A. Expense-Adjusted Real Compounding Return for Portfolio using (L, S, B)
Let EL, ES, and EB be annual expenses for the S&P 500 (L), Small Cap Equities (S), and U.S. 10Year T-Bonds (B). Define the asset allocation, set at time t-1, as {αt-1L, αt-1S, αt-1B} where αt-1L+ αt-1S + αt-1B = 1.
Applying (6.2), the expense-adjusted real compounding return, ȓ(t), is a linear transform of (L, S, B)′, namely:
ȓ(t) = αt-1L(1-EL)L + αt-1S(1-ES)S+ αt-1B(1-EB)B
(6.A.1)
The expenses and asset allocations are constants or decision variables. Using means (μcl, μcs, μcb) and variances
(σ , σ , σ ) from Table VII and probabilities ( ) and covariances (σ , σ , σ
, ,
∙
, ,
√2π
| |
e
,
) from Table VIII, f(l, s, b) is:
σ
σ
σ
As in §II.N, let ht(ȓ) be the univariate PDF of ȓ(t) at time t, then ht(ȓ) satisfies
where Ht(ȓ) is the CDF of ȓ(t) and
ȓ
t
σ
σ
σ
σ
σ
σ
(6.A.2)
,
, ,
ȓ = P[ȓ(t) ≤ ȓ] =
∈
ȓ
ȓ = ht(ȓ). Define the sample space S = {S1 ∪ S2 ∪ S3 ∪ S4 ∪ S5}, where
47
,
Sc is the event that Z
1 and c=1,...,5. These are mutually exclusive with P(S) = 1 and,
ȓ
Pȓ t
ȓ
P ȓ t
ȓ ∩S
P ȓ t
ȓ ∩ S ∪S ∪S ∪S ∪S
(6.A.3)
ȓ
P
ȓ t
ȓ ∩S
where ϕ , μ , σ
P ȓ t
ȓ ∩S
P ȓ t
ȓ |Z
1 ∙P Z
1
ϕ ,μ ,σ
,
is a normal PDF having the following mean and variance for t=1,...,T, c=1,...,5:
μtc = αt-1L(1-EL)μcl + αt-1S(1-ES)μcs + αt-1B(1-EB)μcb
(6.A.4)
σ = αt-1L2(1-EL)2σ + αt-1S2(1-ES)2σ + αt-1B2(1-EB)2σ
(6.A.5)
+ 2αt-1L(1-EL)αt-1S(1-ES)σ
+ 2αt-1L(1-EL)αt-1B(1-EB)σ + 2αt-1S(1-ES)αt-1B(1-EB)σ
The PDF for ȓ(t) is a 5-component univariate Gaussian mixture PDF, derived as:
ȓ
ȓ
ȓ
∙ ϕ ȓ, μ , σ
, ȓ∈
(6.A.6)
Various PDFs using (6.A.6) are shown in Figure XII and feature asset allocations that are dominant in one of
the securities (L, S, B). They are non-normal, skewed (γ > 0) and evidently (mostly) heavier-tailed (κ > 3) than
a normal PDF. Each approaches its univariate shape as the proportion for that security increases (see §VI.B).
Figure XII. PDF for ȓ(t) (Expense-Adjusted Real Compounding Return on a Diversified Portfolio)
Notes:
1.) Expenses for all asset allocations are EL = 0.0015 (0.15%), ES = 0.0025 (0.25%), and EB = 0.0020 (0.20%).
2.) Minimum variance portfolio (σ =0.076) occurs at asset allocation αL= 0.141 , αS= 0.003, αB= 0.856.
B. Marginal Distributions
B.1: S&P 500 (L): fL(l)
Set EL=0, αtL=1, αtS=0, αtB=0 in (6.A.1), (6.A.4) and (6.A.5), then ȓ(t) = L ~ fL(l) = ∑
where μ = 1.082, σ = 0.1972, c=1,...,5, and ∑
∙ ϕ ȓ, μ , σ
,
= 1. Thus, matching §III.A.1:
L ~ fL(l) = ϕ(1.082, 0.1972)
48
(6.A.7)
B.2: Small Cap (S): fS(s)
Set ES=0, αtL=0, αtS=1, αtB=0 in (6.A.1), (6.A.4) and (6.A.5), then ȓ(t) = S ~ fS(s) = ∑
where μ = 0.945, σ = 0.0652,
= 0.164 for c=1, μ = 1.165, σ = 0.3672 for c=2,3 with
=0.707, and μ = 1.192, σ = 0.0242 for c=4,5 with
∙ ϕ ȓ, μ , σ
,
+ = 0.683+0.024
+ = 0.101+0.028 = 0.129. Thus, matching §III.A.2:
S ~ fS(s) =(0.164)· ϕ(0.945, 0.0652) + (0.707)· ϕ(1.165, 0.3672) + (0.129)· ϕ(1.192, 0.0242)
(6.A.8)
B.3: U.S. 10-Year T-Bonds (B): fB(b)
Set EB=0, αtL=0, αtS=0, αtB=1 in (6.A.1), (6.A.4) and (6.A.5), then ȓ(t) = B ~ fB(b) = ∑
2
where μ = 1.011, σ = 0.070 for c=1, 2, 4 with
2
0.017 for c=3,5 with
∙ ϕ ȓ, μ , σ
,
+ + = 0.164+0.683+0.101=0.948, and μ = 1.220, σ =
+ = 0.024+0.028 = 0.052. Thus, matching §III.A.3:
B ~ fB(b) =(0.948)· ϕ(1.011, 0.0702) + (0.052)· ϕ(1.220, 0.0172)
(6.A.9)
VII. Retirement Portfolio Optimization
Dynamic retirement glidepaths are asset allocations that adapt over time to changes in either a retiree’s
funded status or market conditions, whereas static glidepaths are fixed allocations the retiree can ‘set and
forget’. Glidepaths are often considered in the context of safe withdrawal rates (SWR), see §II.N. The
optimal glidepath outperforms all others with respect to some measure. Rook (2014) and (2015) derive the
dynamic and static glidepaths that minimize the probability of ruin using an SWR, respectively. Both
models use normally distributed returns which is an assumption many practitioners and researchers reject due
to the lack of skewness and heavy tail. The purpose of this research is to extend those models to returns that
are non-normal, skewed, heavy-tailed, multi-model, i.e., of generic complexity. The multivariate PDF we
develop also allows for stress-testing a retirement plan using data seeded with extreme events (see §V.D).
A. Optimal Dynamic Retirement Glidepaths
The dynamic glidepath that minimizes the probability of ruin using an SWR is derived in Rook (2014)
via a dynamic program (DP) for fixed and random time horizons. It applies to an individual or a group. The
DP value function V(·) is defined on 3 dimensions: t, RF(t) and ȓ(t). Both t and RF(t) are discretized (see
§II.N) to construct the corresponding grid that manages V(·) and it can be solved when the CDF for ȓ(t) is
tractable. Under lognormal returns the CDF for ȓ(t) is intractable although methods do exist to approximate
it, see Rook & Kerman (2015) for one implementation. We have derived ȓ(t), the expense-adjusted annual
real compounding return for a diversified portfolio using S&P 500 (L), Small Cap Equity (S), and U.S. 10Year T-Bonds (B) returns. The CDF for ȓ(t) in (6.A.3) is a function of the normal CDF, Φ(·), which is
considered tractable as near exact approximation routines are readily available. C/C++ source code to solve
the 2-asset portfolio problem is supplied in Rook (2014). For example, an SWR plan using small cap stocks
49
(S) and bonds (B) can be optimized using ȓ(t) from (6.A.3) with αtL= 0, αtS ≥ 0, αtB≥ 0 and αtS + αtB=1, so that
αtB =1- αtS. Incorporating additional securities (such as L) into the optimal dynamic glidepath problem is
straight-forward.
B. Optimal Static Retirement Glidepaths
Expressions for the probability of ruin were supplied in §II.N for fixed (2.N.7) and random (2.N.8)
time horizons. Minimizing the probability of ruin and maximizing the probability of success are equivalent
optimization problems. Using ȓ(t) ~
T
P Ruin
ȓ from (6.A.6) and (2.N.9), under a fixed time horizon TF:
…
∙ϕ
,μ ,σ
(7.B.1)
…
The optimal static glidepath is found by maximizing (7.B.1) with respect to the asset allocation, and is solved
for a 2-asset portfolio in Rook (2015) using both gradient ascent and Newton’s method for fixed and random
time horizons. As in §VII.A, assume S and B are used so that αtL= 0, αtS ≥ 0, αtB≥ 0 and αtS+ αtB=1. Since αtB=
1- αtS, the probability of success is a function of {α0S, ..., αTF-1S}. The 1st derivative wrt each αiS, i=0,...,TF-1 is:
∂
P Ruin
∂α
T
…
∙
∙ϕ
…
∙ϕ
,μ ,σ
,μ ,σ
∙
∙
(7.B.2)
∂
∂α
∂
ϕ
∂α
∙ϕ
,μ ,σ
,μ ,σ
TF
…
TF
1
…
,
(7.B.3)
The 2nd derivatives wrt the same αiS, i=0,...,TF-1 are:
∂
∂α
P Ruin
T
∙
1
(7.B.4)
…
∙ϕ
,μ ,σ
∙
∂
∂α
ϕ
,μ ,σ
TF
…
1
The 2nd derivatives wrt αjS, j≠i=0,...,TF-1 are:
∂
∂α ∂α
P Ruin
T
(7.B.5)
…
∙ϕ
,μ ,σ
∙
∂
ϕ
∂α
,μ ,σ
∙
∂
ϕ
∂α
,μ ,σ
TF …
1
,
Each term in the sum of (7.B.3), (7.B.4), and (7.B.5) can be computed to an arbitrary level of precision, see
Rook (2015) which includes the relevant C/C++ source code. As in §VII.A, the corresponding DPs would
use the CDFs of univariate normal mixture PDFs for t other than i,j.
also be generated using simulation.
50
Estimates for these expressions can
VIII. Conclusion
As retirement decumulation models increase in sophistication financial firms may guarantee their
success. The retiree could pay for this as a percentage of funds remaining at death. Decumulation models are
statistical and based on assumptions which if incorrect can render the model unsound. Quantitative mortgage
products sold during the housing boom were priced using cash-flows generated by simulating default times
with a Gaussian copula. In hindsight, the normal assumption was incorrect because default-time correlations
change in a crisis. Since housing booms are followed by housing busts, model assumptions should have
incorporated economic regimes. As our economy transitions from pensions to defined contribution plans,
quantitative retirement products are proliferating. At present, the industry is built on a Gaussian (or lognormal)
foundation which also fails to incorporate regimes or crises when modeling returns and their correlation.
The purpose of this research is to develop a multivariate PDF for asset returns that is suitable for
quantitative retirement plans. The model fits any set of returns, however the curse of dimensionality will
limit the number of securities. We propose a multivariate mixture having fixed mixture marginals using
normal components. The model is motivated by the claim that a lognormal PDF is virtually indistinguishable
from a mixture of normals. Whereas the lognormal PDF is intractable with regard to weighted sums, the
normal mixture is not. The lognormal PDF is only justifiable when short-term returns are iid and the PDF is
CLT-compatible for the given sample size. A typical retiree could endure several market crashes and we
should not expect the historical sample to represent all possible extremes. We can stress test a retirement
plan by subjecting it to a return PDF that has been fit on the historical sample seeded with black swan events.
The normal or lognormal PDF are unhelpful in this regard as neither can accommodate such outliers.
The univariate and multivariate PDFs we have developed fit the historical returns closely and a valid
criticism is that models which memorize the training data project poorly into the future. Adjusting the
variance ratio constraint and/or p-value when bootstrapping the marginal LRTs can loosen the fit. We have
used relatively high values for both. Larger variance ratio constraints and LRT p-values lead to more
marginal peaks and more components. Since the multivariate PDF maintains the marginals, over fitting the
marginals propagates through to the multivariate PDF. The user sets these values as desired. We fit the
multivariate PDF in 3 steps. First generic mixture marginals are derived using the EM algorithm. Second,
the multivariate PDF structure is set using LPs where the number of multivariate regimes is pruned by
penalizing the objective when it includes components with no data. Lastly, covariances are added and
probabilities updated using an ECME likelihood-based approach with the M-step split into convex and
general NLP optimizations. For the NLP we use a Levenberg-Marquardt approach that simulates the step
size and line search parameters while iterating. Lastly, a linear transform on the multivariate PDF forms the
expense-adjusted real compounding return on a diversified portfolio and it is incorporated it into optimal
discrete time retirement decumulation models using both static and dynamic asset allocation glidepaths.
51
References
Akaike, Hirotugu, 1974, A New Look at the Statistical Model Identification, IEEE Transactions on Automatic
Control, Vol. AC-19, No. 6., pp. 716-723.
Anton, Howard, 1988, Calculus with Analytic Geometry 3rd Edition (John Wiley & Sons, Inc., New York,
NY).
Baltussen, Guido, Sjoerd van Bekkum, and Zhi Da, 2016, Indexing and Stock Market Serial Dependence
Around the World, Working Paper Series, <https://ssrn.com/abstract=2786516>.
Bengen, William P., 1994, Determining withdrawal rates using historical data, Journal of Financial
Planning, Vol. 7, No. 4, pp. 171-180.
Border, K. C., 2013, More Than You Wanted to Know About Quadratic Forms (California Institute of
Technology) <http://people.hss.caltech.edu/~kcb/Notes/QuadraticForms.pdf>.
Box, George E. P., Gwilym M. Jenkins, and Gregory C. Reinsel, 1994, Time Series Analysis: Forecasting
and Control 3rd Edition (Prentice-Hall, Inc., Englewood Cliffs, NJ).
Boyd, Stephen and Lieven Vandenberghe, 2004, Convex Optimization (Cambridge University Press, New
York, NY).
Casella, George, and Roger L. Berger, 1990, Statistical Inference (Wadsworth & Brooks/Cole
Statistics/Probability Series, Pacific Grove, CA).
Conway, Deloras A., 1979, Multivariate Distributions with Specified Marginals, Stanford University
Technical Report No. 145.
Dempster, A. P., N. M. Laird, and D. B. Rubin, 1977, Maximum Likelihood from Incomplete Data via the
EM Algorithm, Journal of the Royal Statistical Society, Vol. 39, No. 1, pp. 1-38.
Fama, Eugene F., 1965, The Behavior of Stock-Market Prices, Journal of Business, Vol. 38, Iss. 1, pp. 34105.
Freund, John E., 1992, Mathematical Statistics 5th Edition (Prentice-Hall, Inc., Englewood Cliffs, New
Jersey).
Gavin, Henry P., 2017, The Levenberg-Marquardt Method for Non-Linear Least Squares Curve-Fitting
Problems (Duke University) <http://people.duke.edu/~hpgavin/ce281/lm.pdf>.
Guttman, Irwin, 1982, Linear Models: An Introduction (Wiley Series in Probability and Mathematical
Statistics, New York, NY).
Hamilton, James D., 1989, A New Approach to the Economic Analysis of Nonstationary Time Series and the
Business Cycle, Econometrica, Vol. 57, No. 2: pp. 357-384.
Harlow, W. V., and Keith C. Brown, 2016, Market Risk, Mortality Risk, and Sustainable Retirement Asset
Allocation: A Downside Risk Perspective, Journal of Investment Management, Vol. 14, No. 2, pp. 5-32.
Hillier, Frederick S., and Gerald J. Lieberman, 2010, Introduction to Operations Research 9th Edition
(McGraw-Hill, New York, NY).
Hogg, Robert V., Joseph W. McKean, and Allen T. Craig, 2005, Introduction to Mathematical Statistics
(Pearson Prentice Hall, Upper Saddle River, NJ).
52
Huber, Peter J., 2002, John W. Tukey's Contributions to Robust Statistics, The Annals of Statistics, Vol. 30,
No. 6, pp. 1640-1648.
Hurvich, Clifford M. and Tsai, Chih-Ling, 1989, Regression and Time Series Model Selection in Small
Samples, Biometrika, Vol. 76, No. 2, pp. 297-307.
Jensen, Paul A., and Jonathan F. Bard, 2003, Operations Research – Models and Methods (John Wiley &
Sons, Inc., Hoboken, NJ).
Johnson, Norman L., Samuel Kotz, and N. Balakrishnan, 1994, Continuous Univariate Distributions Volume
1 2nd Edition, (John Wiley & Sons Inc., New York, NY).
Kachani, Soulaymane, 2012, The Housing Bubble and the Financial Crisis in the United States: Causes,
Effects, and Lessons Learned, Industrial Economics (IEOR E4003) Lecture Notes, Columbia University.
Kall, Peter, and Janos Mayer, 2010, Stochastic Linear Programming – Models, Theory, and Computation
2nd Edition (Springer Series in Operations Research and Management Science, New York, NY).
Law, Averill M. and W. David Kelton, 2000, Simulation Modeling and Analysis (McGraw-Hill Series in
Industrial Engineering and Management Science, New York, NY).
Levenberg, Kenneth, 1944, A Method for the Solution of Certain Non-Linear Problems in Least Squares,
Quarterly of Applied Mathematics, Vol. 2, No. 2, pp. 164-168.
Li, David, 2000, On Default Correlation: A Copula Function Approach, The Journal of Fixed Income, Vol.
9, No. 4, pp. 43-54.
Liu, Chuanhai and Donald B. Rubin, 1994, The ECME Algorithm: A Simple Extension of EM and ECM with
Faster Monotone Convergence, Biometrika, Vol. 81, No. 4, pp. 633-648.
Lovász, László and Santosh Vempala, 2006, Fast Algorithms for Logconcave Functions: Sampling,
Rounding, Integration and Optimization, Proceedings of the 47th Annual IEEE Symposium on Foundations
of Computer Science, pp. 57-68.
MacKenzie, D. and Taylor Spears, 2014, ‘The formula that killed Wall Street’: The Gaussian copula and
modeling practices in investment banking, Social Studies of Science, Vol 44, Issue 3, pp. 393-417.
Marquardt, Donald W., 1963, An Algorithm for Least-Squares Estimation of Non-Linear Parameters, Journal
of the Society for Industrial and Applied Mathematics, Vol. 11, No. 2, pp. 431-441.
McLachlan, Geoffrey J., 1987, On Bootstrapping the Likelihood Ratio Test Statistic for the Number of
Components in a Normal Mixture, Appl. Statist., Vol. 36, No. 3, pp. 318-324.
McLachlan, Geoffrey J. and Thriyambakam Krishnan, 2008, The EM Algorithm and Extensions (Wiley
Series in Probability and Statistics, New York, NY).
McLachlan, Geoffrey J. and David Peel, 2000, Finite Mixture Models (Wiley Series in Probability and
Statistics, New York, NY).
Meyer, Carl D., 2000, Matrix Analysis and Applied Linear Algebra (Society for Industrial and Applied
Mathematics (SIAM), Philadelphia, PA).
Milevsky, Moshe A., 2016, It’s Time to Retire Ruin (Probabilities), Financial Analysts Journal, Vol. 72, No.
2, pp. 8-13.
Nau, Robert, 2014, Notes on Non-Seasonal ARIMA Models (Duke University)
<https://people.duke.edu/~rnau/Notes_on_nonseasonal_ARIMA_models--Robert_Nau.pdf>.
53
Nelson, Roger B., 2006, An Introduction to Copulas 2nd Edition (Springer Series in Statistics, New York,
NY).
Nocera, Joe, 2009, Risk Management, The New York Times Magazine,
<http://www.nytimes.com/2009/01/04/magazine/04risk-t.html>.
Paolella, Marc S., 2013, Multivariate Asset Return Prediction with Mixture Models, The European Journal of
Finance, Vol. 21, Iss. 13-14, pp. 1214-1252.
Giordoni, Paolo, Xiuyan Mun, and Robert Kohn, 2009, Flexible Multivariate Density Estimation with
Marginal Adaptation, Working Paper Series, <https://arxiv.org/abs/0901.0225> [stat.ME].
Rabiner, Lawrence R. and Biing-Hwang Juang, 1986, An Introduction to Hidden Markov Models, IEEE
ASSP Magazine, pp. 4-16.
Rook, Christopher J., 2014, Minimizing the Probability of Ruin in Retirement, Working Paper Series,
<http://arxiv.org/abs/1501.00419> [q-fin.GN].
Rook, Christopher J., 2015, Optimal Equity Glidepaths in Retirement, Working Paper Series,
<https://arxiv.org/abs/1506.08400> [q-fin.GN].
Rook, Christopher J. and Mitchell C. Kerman, 2015, Approximating the Sum of Correlated Lognormals: An
Implementation, Working Paper Series, <https://arxiv.org/abs/1508.07582> [q-fin.GN].
Ross, Sheldon M., 2009, Introduction to Probability and Statistics for Engineers and Scientists 4th Edition
(Elsevier, New York, NY).
Salmon, Felix, 2009, Recipe for Disaster: The Formula that Killed Wall Street, Wired.com,
<https://www.wired.com/2009/02/wp-quant/>.
Schwarz, Gideon, 1978, Estimating the Dimension of a Model, The Annals of Statistics, Vol. 6, No. 2, pp.
461-464.
Searle, Shayle R., George Casella, and Charles E. McCulloch, 1992, Variance Components (Wiley Series in
Probability and Mathematical Statistics, New York, NY).
Taleb, Nassim N., 2010, The Black Swan (Random House, New York, NY).
Tao, Jill, 2002, Mixed Models Analysis Using the SAS System (SAS Institute, Cary NC).
Titterington, D. M., A. F. M. Smith, and U. E. Makov, 1985, Statistical Analysis of Finite Mixture
Distributions (Wiley Series in Probability and Mathematical Statistics, New York, NY).
Tran, Minh-Ngoc, Paolo Giordani, Xiuyan Mun, Robert Kohn, and Mike Pitt, 2014, Copula-type Estimators
for Flexible Multivariate Density Modeling using Mixtures, Journal of Computational and Graphical
Statistics, Vol. 23, No. 4, pp. 1163-1178.
Tsay, R. S., 2010, Analysis of Financial Time Series 3rd Edition (John Wiley & Sons, Inc., Hoboken, NJ).
Westfall, Peter H., Randall D. Tobias, Dror Rom, Russell D. Wolfinger, and Yosef Hochberg, 1999, Multiple
Comparisons and Multiple Tests Using SAS (SAS Institute, Cary NC).
Wothke, Werner, 1993, Testing Structural Equation Models (Chapter 11): Nonpositive Definite Matrices in
Structural Modeling (Sage Publications, Inc., Newbury Park, CA).
54
Data Sources
CPI-U (Inflation Rate), Cash (No Interest)
Federal Reserve Bank of Minneapolis, “Consumer Price Index (CPI-U)”, Link:
https://www.minneapolisfed.org/community/teaching-aids/cpi-calculator-information/consumer-price-indexand-inflation-rates-1913, [Accessed: December 19, 2016]
Real S&P 500, Total S&P 500, Real U.S. 10-Year T-Bond, Total U.S. 10-Year T-Bond, Real U.S. 3Month T-Bill
Aswath Damodaran [Updated: January 5, 2016], "Historical Returns on Stocks, Bonds and Bills - United
States", Link: http://pages.stern.nyu.edu/~adamodar/, [Accessed: December 19, 2016], Download:
http://www.stern.nyu.edu/~adamodar/pc/datasets/histretSP.xls
Real Small Cap Equity, Total Small Cap Equity
Roger Ibbotson, Roger J. Grabowski, James P. Harrington, Carla Nunes [September 1, 2016], “2016 Stocks,
Bonds, Bills, and Inflation (SBBI) Yearbook”, John Wiley and Sons, Link:
http://www.wiley.com/WileyCDA/WileyTitle/productCd-1119316405.html, [Accessed: December 19, 2016]
Yearly Shiller CAPE Ratio (January), S&P 500 Earnings (January)
Robert Shiller “Online Data Robert Shiller: U.S. Stock Markets 1871-Present and CAPE Ratio”, Link:
http://www.econ.yale.edu/~shiller/data.htm, [Accessed: December 19, 2016], Download:
http://www.econ.yale.edu/~shiller/data/ie_data.xls
Gold Returns
Kitco Metals [2016], “Historical Gold Prices Gold 1833-1999 London PM Fix US Dollars”, Link:
http://corp.kitco.com/en/index.html, [Accessed: December 19, 2016], Download:
http://www.kitco.com/scripts/hist_charts/yearly_graphs.plx
Retiree Surveys
Steve Vernon, December 26, 2016, “The Top Retirement Fears, and How to Tackle Them”, CBS News
MoneyWatch, Link: http://www.cbsnews.com/news/the-top-retirement-fears-and-how-to-tackle-them/,
[Accessed: January 15, 2017]
Lea Hart, October 6, 2016, “American’s biggest retirement fear: Running out of Money”, Journal of
Accountancy, Link: http://www.journalofaccountancy.com/news/2016/oct/americans-fear-running-out-ofretirement-money-201615242.html, [Accessed: January 15, 2017]
Robert Brooks, July 18, 2016, “A Quarter of Americans Worry About Running Out of Money in Retirement”,
The Washington Post, Link: https://www.washingtonpost.com/news/get-there/wp/2016/07/18/a-quarter-ofamericans-worry-about-running-out-of-money-in-retirement/?utm_term=.7baa6479c08b, [Accessed: January
15, 2017]
Prudential Investments, 2016, “Perspectives on Retirement: 2016 Retirement Preparedness Survey
Findings”, Prudential Financial Inc., Link: https://investment.prudential.com/util/common/get?file=
18CAC0B95B49D959852580790076AF83, [Accessed: January 15, 2017]
Emily Brandon, March 25, 2011, “Baby Boomers Reveal Biggest Retirement Fears”, US News & World
Report, Link: http://money.usnews.com/money/blogs/planning-to-retire/2011/03/25/baby-boomers-revealbiggest-retirement-fears, [Accessed: January 15, 2017]
55
IX. Appendix with Source Code
Appendix A. Proof of Unbounded Likelihood for Normal Mixture PDF
Let Xt
~
f(x) = π1 f 1(x) + π2 f 2(x) + ... + πg f g(x), where f(x) is a g-component mixture PDF with f i(x)
~ N(μi,σi), i=1,2,...,g, t=1,2,...,T, and suppose that an iid sample of size T has been observed as (x1, x2, ..., xT).
The normal component PDFs are given by:
1
,
√2 σ
∞
∞, i
(9.A.1)
1,2, … , g
The vector of unknown parameters for f(x) = f(x,θ) is defined as θ=(π,μ,σ)′ where π=(π1,...,πg), μ=(μ1,...,μg),
(1)
and =(σ1,...,σg). To obtain an arbitrarily large value for
(θ| ) from (2.E.1), take a single component and
dedicate it to one observation. For example, consider component k, f k(x), and observation j, xj. Let ε be an
arbitrarily small number and set πk = 1/T, μk = xj - ε, and σk = ε. The value of f k(xj) is:
∝
1
ε
∝
Recall that we initialize θ to begin the EM-algorithm and
(1)
1
ε
(9.A.2)
(θ| ) is guaranteed to increase at each iteration.
From (9.A.2) above, as ε → 0, f k(xt) → ∞. Therefore by choosing k, j, and ε we can initialize f k(xt) to an
arbitrarily large number making
(1)
(θ| ) unbounded. Such a solution for θ, however, is not meaningful as it
dedicates a near-degenerate component to a single observation. Similarly, a component that is trapped into
fitting a small number of closely clustered observations also leads to a high likelihood value (due to the small
variance) and is referred to as a spurious maximizer of
(1)
(θ| ) when the solution is not meaningful. These
should be identified and removed if they are not the MLE, . To avoid manually evaluating each
(1)
(θ| ) for
spuriousness, we impose a variance ratio constraint as noted in (§II.E). This prevents any single variance
from becoming too small and eliminates both problems noted above (McLachlan & Peel, 2000).
Appendix B. Diagnostic Plots for 18 Finance/Economics Time Series
Diagnostic plots for the 18 finance/economics time series analyzed in §II.J Table I are presented
here. Each time series includes a plot of the uncentered raw observations, Xt, t=1,2,...,T as well as the ACF
and PACF up to N/4 lags, where N = total # data points for the series (Box, et al., 1994). Annual values
from 1928 – 2015 are used therefore N = 88 for all series that are not differenced or averaged. The sources
for all data can be found in the Data Sources section located after References in the main paper. Each test is
formed as Ho: No Serial Correlation vs Ha: Serial Correlation, with the p-value provided on the PACF plot.
Preliminary conclusions about the behavior of each process are supplied in Table I followed by a discussion
of the appropriate family-wise α* to account for multiplicity. All security returns are annual compounding.
56
1.) CPI-U (Inflation Rate)
2.) Real Compounding S&P 500
3.) Total Compounding S&P 500
57
4.) Real Compounding Small Cap Equity
5.) Total Compounding Small Cap Equity
6.) Real Compounding U.S. 10-Year T-Bond
58
7.) Total Compounding U.S. 10-Year T-Bond
8.) Real Compounding U.S. 3-Month T-Bill
9.) Real Compounding Gold Return
59
10.) Cash Compounding (No Interest)
11.) Real S&P 500-to-Bond Risk Premium
12.) Real S&P 500-to-Small Cap Risk Premium
60
13.) Real Small Cap-to-Bond Risk Premium
14.) 10-Year Avg. Real Compounding S&P 500
15.) 10-Year Avg. Total Compounding S&P 500
61
16.) 1st Diff. Shiller CAPE Ratio
17.) 1st Diff. Log Shiller CAPE Ratio
18.) Detrended S&P 10-Year Avg. Real Earnings
62
Appendix C. C/C++ Source Code
The application accepts 2 input files: 1.) a control file with settings, and 2.) a text file of returns.
Samples of each are shown below. The control file sets 7 parameters with the 1st and 2nd being the # of assets
and # of time points, respectively. The 3rd parameter sets the # of random starts per CPU core for each
execution of the EM algorithm when fitting univariate PDFs. The value is multiplied by 1 less than the # of
components in the mixture being fit. For example, if fitting a 4-component univariate mixture the setting
below results in 5·3 random starts/core. Since our machine contains 40 cores this mixture PDF is fit using 600
EM algorithm random starts. The 4th parameter is the maximum # of components for all univariate mixtures
which we set to 5 in this implementation. The 5th parameter is the # of samples to use for each bootstrapped
LRT within the proposed forward-backward framework that determines the optimal # of univariate mixture
components for each asset. The final 2 values in “control.txt” are the forward-backward LRT p-values,
respectively. The returns file contains a column of (compounding) returns for each asset. On our computer the
control file shown can reproduce the multivariate PDF for (L, S, B) from (6.A.2) in a few minutes.
control.txt
returns.txt
3 88 5 5 100 0.25 0.25
1.45557
0.91700
0.76958
0.61647
1.41387
0.48640
0.63566
0.55159
1.02065
1.04200
1.07441
1.06959
Both univariate and multivariate parameter estimation results are written to the screen and to the file
named “output.txt” in the folder supplied by the user upon application launch. The 2 files above must also exist
within this directory. Lastly, a folder to contain error files for issues encountered during the optimization must
exist and be specified by the user using the global constant “errFolder” which is also defined in the header file.
To save time, processing for both the univariate and multivariate PDF is multithreaded.
Our
implementation of the EM algorithm launches each random start in a separate thread (random starts end at
local optimums). The ECME algorithm takes a small or large step in the general direction of steepest ascent
while maximizing the multivariate log-likelihood function with respect to the covariance parameters, see
§V.A. The line search and stepping parameters are simulated and values that yield the largest increase are
used, which is also multithreaded. Note that our ECME implementation uses the actual or incomplete loglikelihood function from (2.E.2), conditioning first on the probabilities holding the covariances constant, and
then on the covariances holding the probabilities constant. These are Steps 1 and 2 in (5.A.1) and (5.A.2).
This application uses the Boost (http://www.boost.org/), LPSolve (http://lpsolve.sourceforge.net/5.5/),
and Eigen (http://eigen.tuxfamily.org/) external C/C++ libraries, which are freely available to download under
terms and conditions described at the given sites. Our code consists of a header file and 20 functions and is
being provided under the GNU General Public License, see http://www.gnu.org/licenses/ for full details.
63
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: stdafx.h
/
/ Summary:
/
/
This is the header file which is included before each function call to define needed C/C++ libraries, global constants, inline functions, and function prototypes. For function prototypes, see
/
headers attached to the code definition for a description of the purpose and parameters.
/
/ Inline Functions:
/
/
getNDens:
Compute/return the supplied normal density function evaluated at a given point, without the constant 1/sqrt(2*pi).
/
getMDens:
Compute/return the supplied normal mixture density function evaluated at a given point, without the constant 1/sqrt(2*pi).
/
getPost:
Compute/return the probability that a given value belongs to a given component of the supplied normal mixture density.
/
getUniMean:
Compute/return the mean of a given set of observations.
/
getUniStd:
Compute/return the standard deviation (MLE) of a given set of observations.
/
getLLVal:
Compute/return the log‐likelihood value for a given observation set from the supplied univariate mixture density.
/
getVRatio:
Compute/return the ratio of the largest‐to‐smallest variance for a supplied set of standard deviations.
/
getEMMean:
Compute/return mean update for the EM algorithm along with a sum‐of‐squares quantity needed for the EM algorithm variance update.
/
getMVNDens:
Compute/return the supplied multivariate normal density function evaluated at a given vector of values for each random variable.
/
getMVNMDens:
Compute/return the supplied multivariate normal mixture density function evaluated at a given vector of values for each random variable.
/
getCovs:
Accept a multivariate normal mixture density and return the vector of covariances starting with VC element (1,2) of component #1, then element (1,3), etc...
/
setCovs:
Accept a vector of all covariances and insert the values into a single component's VC matrix as specified by the user.
/
getCofM:
Accept a matrix and element/position and convert it to one who's determinant is equal to the cofactor of the matrix with respect to that position/position.
/
getIDM:
Accept an empty square matrix and populate it with an identity matrix of the same size.
/
chkSum:
Accept a multivariate normal mixture density and check that no component has a likelihood of zero at all time points.
/
showVals:
Display the parameters (means, standard deviations, component probabilities) of a supplied multivariate mixture density to standard output.
/*********************************************************************************************************************************************************************************************************/
#pragma once
// Include libraries.
//=====================
#include "targetver.h"
#include <stdio.h>
#include <iostream>
#include <iomanip>
#include <string>
#include <fstream>
#include <random>
#include <boost/algorithm/string.hpp>
#include <boost/thread/thread.hpp>
#include <Eigen/Core>
#include <Eigen/Dense>
#include <Eigen/LU>
#include <Eigen/Eigenvalues>
#include "lp_lib.h"
using namespace std;
// Global constants.
//====================
const string cfile="control.txt";
const string rfile="returns.txt";
const string ofile="output.txt";
const string errFolder="c:\\mDensity\\Issues\\";
const long double pi=3.141592653589793;
const long double logrecipsqrt2pi=‐0.918938533204673;
const long double stdRatio=16.0;
const long double epsilon=pow(0.1,15);
const long double LNegVal=‐pow(9.0,10);
const long double LPosVal=pow(9.0,10);
//
//
//
//
//
//
//
//
//
//
Name of parameter control input file.
Name of input data file.
Name of output file.
Folder where issues/errors will be written to files (mandatory).
Constant representation of pi.
ln(1.00/square root of 2*pi).
Square root of the variance ratio constraint threshold.
Convergence criteria.
Large negative value for use as an invalid value indicator.
Arbitrarily large positive value.
64
const
const
const
const
const
const
const
const
const
const
const
const
const
const
long double rrMultMin=2.0;
long double rrMultMax=10.0;
long double pdmineval=pow(0.1,13);
long double detminval=pow(0.1,13);
int mIters=1000000000;
int K=1000000;
int dLvl=500;
long double minHessAdd=0.00;
int mItersH=1000;
int nCorMult=2;
int nBeats=80;
int dbug=0;
int cDown=2000;
int nECMEs=1;
//
//
//
//
//
//
//
//
//
//
//
//
//
//
Minimum multiple when performing a ridge repair on a broken variance‐covariance matrix.
Maximum multiple when performing a ridge repair on a broken variance‐covariance matrix.
Threshold for minimum eigenvalue to ensure a positive definite variance‐covariance matrix.
Threshold for determinant to ensure a positive definite variance‐covariance matrix.
Maximum # of EM iterations allowed per single optimization.
Large constant for use in LP objective function to enforce feasibility constraint.
Discretization level for separable quadratic objective function in solveLP().
Minimum additive factor to use for Hessian stepping.
Maximum # Hessian steps per thread. (Set to 1 for non‐random ECME stepping.)
Multiply by # cores to determine the total # threads used for Hessian stepping. (Set to 1 for non‐random ECME stepping.)
# of log‐likelihood beats to randomly select from during the ECME algorithm 2nd Step. (Set to 1 for non‐random ECME stepping.)
Debug level (0,1,2) for output window details (higher # = more details).
Processor cool down time in between EM iterations in msec (value of 100000 = 100 seconds).
Number of outer loops for ECME processing. (# of times to repeat the ECME procedure.)
// Inline functions.
//====================
inline long double getNDens(const long double val, const long double mn, const long double std)
{return (1.00/std)*exp(‐0.5*pow((val‐mn)/std,2));}
inline long double getMDens(const long double val, const int g, const long double **inMDist)
{long double dval=0.00; for (int c=0; c<g; ++c) dval=dval + inMDist[0][c]*getNDens(val,inMDist[1][c],inMDist[2][c]); return dval;}
inline long double getPost(const long double val, const int g, const long double **inMDist, const int cID)
{return inMDist[0][cID]*getNDens(val,inMDist[1][cID],inMDist[2][cID])/getMDens(val,g,inMDist);}
inline long double getUniMean(const int T, const long double *r)
{long double mn=0.00; for (int t=0; t<T; ++t) mn=mn + r[t]; return mn/T;}
inline long double getUniStd(const int T, const long double *r, const long double mn)
{long double var=0.00; for (int t=0; t<T; ++t) var=var + pow(r[t]‐mn,2); return sqrt(var/T);}
inline long double getLLVal(const int T, const long double *r, const int g, const long double **inMDist)
{long double llval=((long double) T)*logrecipsqrt2pi; for (int t=0; t<T; ++t) llval=llval + log(getMDens(r[t],g,inMDist)); return llval;}
inline long double getVRatio(const int g, const long double *stds)
{long double minstd=LPosVal, maxstd=LNegVal; for (int c=0; c<g; ++c){if (stds[c] < minstd) minstd=stds[c]; if (stds[c] > maxstd) maxstd = stds[c];}
return pow(maxstd/minstd,2);}
inline long double getEMMean(const int T, const long double *r, const long double *pprbs, const long double cprbs, long double *ssq)
{long double mn=0.00, atrm; ssq[0]=0.00; for (int t=0; t<T; ++t) {atrm=pprbs[t]*r[t]; mn=mn+atrm; ssq[0]=ssq[0]+atrm*r[t];}; return mn/(cprbs);}
inline long double getMVNDens(const Eigen::VectorXd vals, const Eigen::VectorXd mn, const Eigen::MatrixXd vcmi, const long double sqrdet, const long double picnst)
{return (sqrdet/picnst)*exp(‐0.5*((vals‐mn).transpose())*vcmi*(vals‐mn));}
inline long double getMVNMDens(const int uCells, const Eigen::VectorXd vals, const Eigen::VectorXd *mns, const Eigen::MatrixXd *vcmis, const Eigen::VectorXd prbs, const long double *sqrdets,
const long double picnst){long double dval=0.00; for (int u=0; u<uCells; ++u) {dval=dval+prbs[u]*getMVNDens(vals,mns[u],vcmis[u],sqrdets[u],picnst);} return dval;}
inline void getCovs(const int uCells, const Eigen::MatrixXd *inVCs, Eigen::VectorXd *inDVarsM){int itr=0; for (int v=0; v<uCells; ++v) for (int r=0; r<(int) inVCs[v].rows(); ++r)
for (int c=r+1; c<(int) inVCs[v].cols(); ++c)
inDVarsM[0](itr++)=inVCs[v](r,c);}
inline void setCovs(const int uCell, Eigen::MatrixXd *inVCs, const Eigen::VectorXd *inDVarsM){int itr=uCell*((int) (((int) inVCs[uCell].rows())*((int) inVCs[uCell].rows()‐1))/2);
for (int r=0; r<(int) inVCs[uCell].rows(); ++r)
for (int c=r+1; c<(int) inVCs[uCell].cols(); ++c)
{inVCs[uCell](r,c)=inDVarsM[0](itr++);
inVCs[uCell](c,r)=inVCs[uCell](r,c);}}
inline void getCofM(const int numA, const int inr, const int inc, const Eigen::MatrixXd inE, Eigen::MatrixXd *inEjk){inEjk[0]=inE; for (int r=0; r<numA; ++r)
for (int c=0; c<numA; ++c)
{if (r==inr && c==inc) inEjk[0](r,c)=1.00;
else if (r==inr || c==inc) inEjk[0](r,c)=0.00;}}
inline void getIDM(Eigen::MatrixXd *ID){for (int r=0; r<(int) ID[0].rows(); ++r) for (int c=r; c<ID[0].cols(); ++c)
{if (r==c) ID[0](r,c)=1.00; else ID[0](c,r)=ID[0](r,c)=0.00;}}
65
inline void chkSum(const int T, const int nUCmps, const long double **fvals){for (int v=0; v<nUCmps; ++v){long double tmpsum=0.00; for (int t=0; t<T; ++t) tmpsum=tmpsum + fvals[t][v];
if (tmpsum <= 0.00){cout << endl << "ERROR: Unique component # " << v << " has a likelihood that is zero for each time point." << endl
<< "
This will eliminate the corresponding component probability from the stage 2 objective function." << endl
<< "
The component probability should be treated as a constant and moved to the RHS constraint vector" << endl
<< "
and eliminated from the objective function. The code for this has not yet been implemented." << endl
<< "EXITING...ECMEAlg()..." << endl; cin.get(); exit (EXIT_FAILURE);}}}
inline void showVals(const int T, const long double *r, const int g, const long double **inMDist, ostream& oVar=cout)
{oVar.setf(ios_base::fixed, ios_base::floatfield); oVar.precision(16); for (int x=0; x<T; ++x) oVar << r[x] << endl; for (int c=0; c<g; ++c){oVar << string(37,' ')
<< "Prob[" << c << "]=" << inMDist[0][c] << " Mean[" << c << "]=" << inMDist[1][c] << " Std.Dev.[" << c << "]=" << inMDist[2][c] << endl;}};
// Function prototypes.
//=======================
int fitMixDist(const int a, const int T, const long double *r, const int maxcmps, const int nsmpls, const int nstrts, const long double sl[2], long double **fnlMDst, string rdir);
void getRVals(const int N, const int g, const long double **inMDist, long double *rvls);
void getRPrbsStds(const int T, const long double * r, const int g, long double *prbs, const long double *mns, long double *stds);
void EMAlg(const int T, const long double *r, const int g, long double **prbs, long double **mns, long double **stds, long double *llVal, const long double **inMDist, int *rprms);
int ECMEAlg(const int T, const long double **r, const int numA, const int nUCmps, const Eigen::MatrixXd cMtrx, const Eigen::VectorXd cVctr, long double *muPrbs, Eigen::VectorXd *muMns, Eigen::MatrixXd
*muVCs, int *uCellIDs, const string rdir);
long double ThrdEMAlg(const int T, const long double *r, const int rs, const int ing, const long double **inMDist, const int outg, long double **outMDist);
void mapCells(const int totCells, const int numA, int **inCellAry, const int curAst, const int *inCmps, int *cID, int *tmpAry);
int getCell(const int **inCellAry, const int totCells, const int *cmpLvls, const int numA);
void asgnObs(int *inAry, const int T, const long double *r, const int g, const long double **inMDst);
void getCor(const int T, const long double **r, const int **asgn, const int **inCellAry, const int cellID, Eigen::VectorXd Mn, Eigen::MatrixXd *VC, const int vCell);
int solveLP(const int totCells, const int numA, const int **inCellAry, const int *cmps, const long double **prbs, const int *nCellObs, const long double *cellProb, double *outPrbs, const int type);
void getCMtrx(const int totrows, const int nUCmps, const int sol, const int numA, const int *nCmps, const int *vCIDs, const int **inCellAry, const long double **prbs, Eigen::MatrixXd *fLHS,
Eigen::VectorXd *fRHS);
long double getHessE(const int T, const int inUCmps, const long double **infVals, const long double *inDNoms, const Eigen::MatrixXd inCMtrx, const Eigen::VectorXd inCVctr, Eigen::MatrixXd *inHess,
Eigen::MatrixXd *inLHS, Eigen::VectorXd *inRHS);
long double getHessM(const int T, Eigen::VectorXd *rs, const int inUCmps, const int numA, const long double **infVals, const long double *inDNoms, const long double *inPrbs, const Eigen::VectorXd *muMns,
const Eigen::MatrixXd *E, const Eigen::MatrixXd *Einv, const Eigen::MatrixXd *inA, Eigen::MatrixXd *inHess);
void getGradE(const int T, const int inUCmps, const long double **infVals, const long double *inDNoms, const Eigen::MatrixXd inLHS, const Eigen::VectorXd inRHS, const Eigen::VectorXd inDVars,
Eigen::VectorXd *inGrad);
void getGradM(const int T, Eigen::VectorXd *rs, const int inUCmps, const int numA, const long double **infVals, const long double *inDNoms, const long double *inPrbs, Eigen::VectorXd *muMns, const
Eigen::MatrixXd *E, const Eigen::MatrixXd *Einv, const Eigen::MatrixXd *inA, Eigen::VectorXd *inGrad, int chk=0);
long double getLFVals(const int T, const int numA, const int nUCmps, const Eigen::VectorXd *rs, const Eigen::VectorXd uPrbs, const Eigen::VectorXd *inMns, const Eigen::MatrixXd *inVCIs, const long double
*insqs, const long double inpicst, long double *denoms, long double **lfVals);
void wrtDens(const string typ, const int nUCmps, const int *uCells, const long double *muPrbs, const Eigen::VectorXd *muMns, const Eigen::MatrixXd *muVCs, ostream& oVar);
void stepHessM(int *inHess1, long double *inHess2, const Eigen::VectorXd *rs, Eigen::VectorXd *inDvars, const Eigen::VectorXd inGrad, const Eigen::MatrixXd inHess, const Eigen::VectorXd uPrbs, const
Eigen::VectorXd *inMns, const Eigen::MatrixXd *inVCs);
int ridgeRpr(const int uCell, Eigen::MatrixXd *E, long double mult);
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: mDensity.cpp
/
/ Function: main()
/
/ Summary:
/
/
This function defines the entry point for the console application and drives the analysis using 4 major sections. Section #1.) The contents of the control file (control.txt: see global constant
/
cfile in the header program), and the data file (returns.txt: see global constant rfile in the header program) are read in and stored as variables. Section #2.) Build the univariate mixture PDFs
/
for each asset using the EM algorithm with random starts and bootstrapped likelihood ratio test for determining the optimal # of components for each asset. Section #3.) Combine the univariate
/
mixtures into a multivariate mixture PDF without disturbing the marginals and without correlations. At this point, a multivariate mixture PDF is estimated with dependence but without regime
/
correlations. (There are 2 multivariate mixture densities at this stage, one for each type of LP solved. The 2 LP objectives for building the multivariate mixture PDF are minimax and minimum
/
squared distance.) Section #4.) Use an ECME type algorithm to estimate the correlations and refine the component probabilities with maximum likelihood as the objective. This 4th step is a 2‐step
/
iterative procedure similar to the EM algorithm and random starts are used in the 2nd step where the covariances are estimated. The 4th step is repeated nECMEs times and the optimal multivariate
/
mixture PDF for each is written to the output file. Once all 4 steps have been completed there are 2*nECMEs multivariate mixture densities with fixed marginals and one is chosen based on some
/
criteria such as higher likelihood or higher information criteria. This final step is left to the user (we use AIC) and the decision would account for the likelihood value as well as the total # of
/
parameters. All PDFs and their log‐likelihood values are written to the output file (output.txt: see global constant ofile in the header program), along with the univariate mixture PDF details.
66
/
/ Inputs:
/
/
No input arguments are processed by this function. Critical inputs are supplied via the control.txt file (see global constant cfile in the header program), and data is supplied via returns.txt (see
/
global constant rfile in the header program). In addition to control.txt, other inputs are set to global constants in the header file.
/
/ Outputs:
/
/
This function writes details of fitting univariate & multivariate mixture PDFs for the supplied assets to the screen and to the file output.txt (see ofile in the header program).
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
int main(int argc, char *argv[])
{
// Declare/initialize local variables.
//======================================
string rootdir;
int nBoots, nTPoints, nAssets, nRStarts, mComps, *nComps=nullptr, **asgnmnt=nullptr, uCell;
long double **rtrn=nullptr, **prob=nullptr, **mean=nullptr, **stdev=nullptr, alpha[2], **optMDst=new long double *[3];
ofstream fout;
// Ensure that an error/issues folder has been provided. (Set in the header file.)
//===================================================================================
if ("" == errFolder)
{
cout << "ERROR: An error/issues folder has not been provided. Problems found during optimization will be written to files in this folder." << endl
<< "
Use global variable errFolder in the header file to set this destination." << endl << "EXITING...main()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
// Retrieve directory location of setup files.
//==============================================
cout << "Enter the directory where the setup files reside (eg, c:\\mDensity\\): " << endl; cin >> rootdir; cin.get(); boost::algorithm::trim(rootdir); cout << endl;
// Read in control file which contains:
//
1.) # of asset classes.
//
2.) # of timepoints with return data.
//
3.) # of random starts for maximizing the likelihood of a g‐component univariate mixture, as a multiple of # independent processing units and components (i.e., value of 2 with 20 independent
//
processing units will use 2x20x1=40 random starts for a 2‐component mixture, 2x20x2=80 random starts for a 3‐component mixture, and 2x20x(g‐1) random starts for a g‐component mixture.)
//
4.) Maximum # of components appropriate for this data set when fitting univariate mixture densities (i.e., the marginals).
//
5.) Sample size to use when bootstrapping the LRT test statistic.
//
6.) Alpha‐level for LRTs for the # of components using a forward‐backward selection algorithm, where the 1st alpha is used for forward selection and the 2nd alpha is used for backward selection.
//=====================================================================================================================================================================================================
ifstream getparams(rootdir+cfile);
if (getparams.is_open())
{
getparams >> nAssets >> nTPoints >> nRStarts >> mComps >> nBoots >> alpha[0] >> alpha[1]; getparams.close();
}
else
{
cout << "ERROR: Could not open file: " << rootdir + cfile << endl << "EXITING...main()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
// Instantiate 2‐dimensional arrays to hold means, standard deviations, and proportion weights for mixtures.
//============================================================================================================
nComps = new int [nAssets];
// Array to hold # components for each asset.
rtrn = new long double *[nAssets];
// One return per asset and time point up to time nTPoints.
prob = new long double *[nAssets];
// One prob per asset and component for component sizes up to mComp.
mean = new long double *[nAssets];
// One mean per asset and component for component sizes up to mComp.
stdev = new long double *[nAssets];
// One stdev per asset and component for component sizes up to mComp.
asgnmnt = new int *[nAssets];
// One assignment per asset and time point up to time nTPoints.
for (int a=0; a<nAssets; ++a)
{
nComps[a] = 1;
// Start with 1 component for each asset.
rtrn[a] = new long double [nTPoints];
// Array of returns for each asset. Returns are then rtrns[a][0], rtrns[a][1], etc...
asgnmnt[a] = new int [nTPoints];
// Array of component assignments for each asset after density has been determined.
}
67
// Read in returns file which has a column of returns for each asset, and store in a 2‐dimensional array.
//=========================================================================================================
ifstream getrtrns(rootdir+rfile);
if (getrtrns.is_open())
{
int r=0;
while (!getrtrns.eof() && r < nTPoints)
{
for (int a=0; a<nAssets; ++a)
getrtrns >> rtrn[a][r];
r=r+1;
}
getrtrns.close();
if (r < nTPoints)
{
cout << "ERROR: File " << rootdir + rfile << " should have " << nTPoints << " rows of returns, for " << nAssets << " assets, but it has fewer." << endl
<< "EXITING...main()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
}
else
{
cout << "ERROR: Could not open file: " << rootdir + rfile << endl << "EXITING...main()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
// Build a large array to temporarily hold the optimal distribution for each asset.
//===================================================================================
for (int m=0; m<3; ++m)
optMDst[m]=new long double [mComps];
// Calculate the component probability, mean and standard deviation (Normal MLE version). (Note: MLE standard deviation divides by n, not n‐1 and is a biased estimator.)
//===========================================================================================================================================================================
for (int a=0; a<nAssets; ++a)
{
// Initialize all probabilities in the large array to zero.
//===========================================================
for (int c=0; c<mComps; ++c)
optMDst[0][c]=0.00;
// Find the best fitting mixture distribution for this asset.
//=============================================================
nComps[a]=fitMixDist(a,nTPoints,rtrn[a],mComps,nBoots,nRStarts,alpha,optMDst,rootdir);
// Assign each observation to a component. The most likely one using Bayes rule.
//=================================================================================
asgnObs(asgnmnt[a],nTPoints,rtrn[a],nComps[a],(const long double **) optMDst);
// Build arrays to hold the optimal solution and transfer it to these arrays.
//=============================================================================
prob[a]=new long double [nComps[a]];
mean[a]=new long double [nComps[a]];
stdev[a]=new long double [nComps[a]];
for (int c=0; c<nComps[a]; ++c)
{
prob[a][c]=optMDst[0][c];
mean[a][c]=optMDst[1][c];
stdev[a][c]=optMDst[2][c];
}
}
// Write out the assignment of each observation time point to the corresponding components during debug mode.
//=============================================================================================================
if (dbug >= 2)
{
cout << endl << string(97,'=') << endl << "Assignment of observations (at each time point) to a set of components using Bayes Decision Rule:" << endl << string(97,'=');
for (int t=0; t<nTPoints; ++t)
68
{
cout << endl << "Time t = " << setfill('0') << setw(to_string((long long) nTPoints).size()) << t << ":";
for (int a=0; a<nAssets; ++a)
cout << " Asset #" << a+1 << "/Component=" << asgnmnt[a][t];
} cout << endl << endl;
}
// Mixture distribution has been fit for all assets. Assemble the multivariate density. Start by computing the total # of cells
// that need to be mapped (dealing with a k‐dimensional cube). Also compute the total # of components, summing across all assets.
//==================================================================================================================================
int nCells=1, totCmps=0;
for (int a=0; a<nAssets; ++a)
{
nCells = nCells*nComps[a];
totCmps = totCmps + nComps[a];
}
// Initialize variables.
//========================
int **allCells=new int *[nCells], cellID=0, *tmpVals=new int [nAssets];
for (int i=0; i<nCells; ++i)
allCells[i] = new int [nAssets];
// Call function to map each cell of the k‐dimensional cube to a single list value.
//===================================================================================
mapCells(nCells, nAssets, allCells, 0, nComps, &cellID, tmpVals);
// Derive the unique cell ID for each time point and count the # of obs per unique cell.
//========================================================================================
int *tmpCombo=new int [nAssets], *cellAsgn=new int [nTPoints], *cellCnt=new int [nCells];
long double *cellPrb=new long double [nCells];
for (int c=0; c<nCells; ++c)
cellPrb[c]=(long double) (cellCnt[c]=0);
if (dbug>=2)
cout << endl << endl << string(40,'=') << endl << "Assignment of each time point to a cell:" << endl << string(40,'=') << endl;
for (int t=0; t<nTPoints; ++t)
{
if (dbug >= 2)
cout << "Time t = " << setfill('0') << setw(to_string((long long) nTPoints).size()) << t << ": ";
for (int a=0; a<nAssets; a++)
tmpCombo[a]=asgnmnt[a][t];
cellAsgn[t]=getCell((const int **) allCells, nCells, tmpCombo, nAssets);
cellCnt[cellAsgn[t]]=cellCnt[cellAsgn[t]] + 1;
cellPrb[cellAsgn[t]]=cellPrb[cellAsgn[t]] + 1.00/((long double) nTPoints);
}
// Build and solve the corresponding LP that determines the structure of the multivariate density using both a minimax and minimum squared distance objective. Then build an array of cell IDs that
// have non‐zero probabilities attached using each method. These are the cells we must derive a correlation for, ensuring that the resulting VC matrix is positive‐definite. In solveLP(), type is
// defined as: (These become the index values for all arrays that hold results from both methods to compare and select the better performer.)
//
0.) Minimax objective
//
1.) Minimum sum of squared distances objective
//=====================================================================================================================================================================================================
string type[2]; type[0]="Minimax"; type[1]="Minimum Sum of Squared Distances (SSD)";
int numCmps [2], **valcIDs=new int *[2], ctr;
double **estPrbs=new double *[2];
Eigen::MatrixXd *mLHS=new Eigen::MatrixXd [2];
Eigen::VectorXd *mRHS=new Eigen::VectorXd [2];
cout << endl << string(120,'=') << endl << "Running " << type[0] << " and " << type[1] << " LPs to set the initial multivariate density structure." << endl << string(120,'=') << endl << endl;
for (int i=0; i<2; ++i)
{
// Use an LP to approximate the structure of the multivariate density.
//======================================================================
estPrbs[i]=new double [nCells];
69
numCmps[i]=solveLP(nCells,nAssets,(const int **) allCells,nComps,(const long double **) prob,cellCnt,cellPrb,estPrbs[i],i);
valcIDs[i]=new int [numCmps[i]];
// Identify and store the unique cells with non‐zero probabilities.
//===================================================================
ctr=0;
for (int c=0; c<nCells; ++c)
if (estPrbs[i][c] > 0.00)
valcIDs[i][ctr++]=c;
// Retrieve the effective constraint matrix that applies to the LP solution and is full row rank. Ensure it does not have more rows than non‐zero components.
//==============================================================================================================================================================
getCMtrx(totCmps‐nAssets+1,numCmps[i],i,nAssets,nComps,valcIDs[i],(const int **)allCells,(const long double **)prob,mLHS,mRHS);
cout << "‐‐‐‐‐> " << type[i] << " Done. There are " << numCmps[i] << " unique cells with non‐zero probabilities using " << type[i] << "." << endl;
}
// Assemble multivariate densities using the minimax and minimum squared distance objectives as starting points and select the one with a better fit after
// iterating with the ECME algorithm until convergence. (Where the 1st Step is replaced by a convex programming problem.) Better fit means higher likelihood.
//=============================================================================================================================================================
int *numCmpsF=new int [2*nECMEs], **vCIDs=new int *[2*nECMEs];
long double **mProbs=new long double *[2*nECMEs];
Eigen::VectorXd **mMeans=new Eigen::VectorXd *[2*nECMEs];
Eigen::MatrixXd **mVCs=new Eigen::MatrixXd *[2*nECMEs];
for (int i=0; i<2*nECMEs; ++i)
{
// Initialize the arrays to their proper size based on the # of components resulting from the above LPs.
//========================================================================================================
mProbs[i]=new long double [numCmps[(i%2)]];
mMeans[i]=new Eigen::VectorXd [numCmps[(i%2)]];
mVCs[i]=new Eigen::MatrixXd [numCmps[(i%2)]];
vCIDs[i]=new int [numCmps[(i%2)]];
// Initialize each type and cell specific mean vector and VC matrix to the appropriate size, which is the # of assets.
//======================================================================================================================
for (int v=0; v<numCmps[(i%2)]; ++v)
{
mMeans[i][v]=Eigen::VectorXd(nAssets);
mVCs[i][v]=Eigen::MatrixXd(nAssets,nAssets);
vCIDs[i][v]=valcIDs[(i%2)][v];
}
// Populate probabilities, means, and the initial variance‐covariance matrix for each valid cell. Off‐diagonal elements (i.e., covariances) are set to zero at this stage.
//===========================================================================================================================================================================
for (int v=0; v<numCmps[(i%2)]; ++v)
{
uCell=vCIDs[i][v];
mProbs[i][v]=estPrbs[(i%2)][uCell];
for (int a1=0; a1<nAssets; ++a1)
{
mMeans[i][v](a1)=mean[a1][allCells[uCell][a1]];
for (int a2=0; a2<nAssets; ++a2)
{
if (a1 == a2)
mVCs[i][v](a1,a2)=pow(stdev[a1][allCells[uCell][a1]],2);
else
mVCs[i][v](a1,a2)=0.00;
}
}
}
// If debugging mode is on, write out the corresponding parameters of the distribution. These are the initial LP values before improving with covariances.
//===========================================================================================================================================================
if (dbug >= 2)
wrtDens(type[(i%2)],numCmps[(i%2)],vCIDs[i],mProbs[i],mMeans[i],mVCs[i],cout);
70
// Improve the initial estimate using the ECME algorithm. Stop when the multivariate likelihood is maximized.
//==============================================================================================================
cout << endl << string(85,'=') << endl << "ECME Algorithm #" << i+1 << " for " << type[(i%2)] << " initial solution." << endl << string(85,'=') << endl << endl;
fout.open(rootdir+ofile, ios_base::out | ios_base::app);
fout << endl << string(85,'=') << endl << "ECME Algorithm #" << i+1 << " for " << type[(i%2)] << " initial solution." << endl << string(85,'=') << endl << endl;
fout.close();
numCmpsF[i]=ECMEAlg(nTPoints,(const long double **) rtrn,nAssets,numCmps[(i%2)],mLHS[(i%2)],mRHS[(i%2)],mProbs[i],mMeans[i],mVCs[i],vCIDs[i],rootdir);
// Write final density to the output file and display to user (which contains maximum likelihood estimates).
//============================================================================================================
fout.open(rootdir+ofile, ios_base::out | ios_base::app);
wrtDens(type[i],numCmpsF[i],vCIDs[i],mProbs[i],mMeans[i],mVCs[i],fout); fout.close();
wrtDens(type[i],numCmpsF[i],vCIDs[i],mProbs[i],mMeans[i],mVCs[i],cout);
cout << endl << "Done processing " << type[i] << " initial LP solution. Final density shown above and written to file." << endl;
}
// Free temporary memory allocations.
//=====================================
for (int i=0; i<2*nECMEs; ++i)
{
delete [] mProbs[i]; mProbs[i]=nullptr;
delete [] mMeans[i]; mMeans[i]=nullptr;
delete [] mVCs[i]; mVCs[i]=nullptr;
delete [] vCIDs[i]; vCIDs[i]=nullptr;
}
for (int i=0; i<2; ++i)
{
delete [] valcIDs[i]; valcIDs[i]=nullptr;
delete [] estPrbs[i]; estPrbs[i]=nullptr;
}
delete [] mProbs; mProbs=nullptr;
delete [] mMeans; mMeans=nullptr;
delete [] mVCs; mVCs=nullptr;
delete [] valcIDs; valcIDs=nullptr;
delete [] mLHS; mLHS=nullptr;
delete [] mRHS; mRHS=nullptr;
delete [] estPrbs; estPrbs=nullptr;
for (int c=0; c<nCells; ++c)
{
delete [] allCells[c]; allCells[c]=nullptr;
}
delete [] allCells; allCells=nullptr;
delete [] tmpVals; tmpVals=nullptr;
delete [] tmpCombo; tmpCombo=nullptr;
delete [] cellAsgn; cellAsgn=nullptr;
delete [] cellCnt; cellCnt=nullptr;
delete [] cellPrb; cellPrb=nullptr;
for (int m=0; m<3; ++m)
{
delete [] optMDst[m]; optMDst[m]=nullptr;
}
for (int a=0; a<nAssets; ++a)
{
delete [] rtrn[a]; rtrn[a]=nullptr;
delete [] asgnmnt[a]; asgnmnt[a]=nullptr;
delete [] prob[a]; prob[a]=nullptr;
delete [] mean[a]; mean[a]=nullptr;
delete [] stdev[a]; stdev[a]=nullptr;
}
delete [] optMDst; optMDst=nullptr;
delete [] rtrn; rtrn=nullptr;
delete [] asgnmnt; asgnmnt=nullptr;
delete [] prob; prob=nullptr;
delete [] mean; mean=nullptr;
71
delete [] stdev; stdev=nullptr;
delete [] nComps; nComps=nullptr;
delete [] numCmpsF; numCmpsF=nullptr;
// Exit.
//========
cout << endl << "Done.
return 0;
(Hit return to exit.)" << endl; cin.get()
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: fitMixDist.cpp
/
/ Function: fitMixDist()
/
/ Summary:
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
This function fits a univariate normal mixture density to a set of observations using the EM algorithm within a forward‐backward iterative procedure that tests for the optimal # of components.
First, a 1‐component density is fit using standard maximum likelihood (ML) estimates and tested against a 2‐component mixture density fit using the EM algorithm with a (user specified) large # of
random starts. (Note: The # of random starts is specified by the 3rd parameter in the input control file as a multiple of the # of cores/independent processing units on the computer running the
application. In addition this value is multiplied by # components ‐ 1, which uses an increasing # of random starts for densities with more components.) When fitting a particular density, the one
with largest likelihood value from all random starts and obeying the variance ratio constraint (set in the header file using global constant: stdRatio) is selected as the ML estimator. A hypothesis
test of Ho: 1‐component vs Ha: 2‐components is then conducted using the forward alpha (significance level) set by the user in the input control file (parameter #6). The likelihood ratio test
statistic (LRT) is used and derived as ‐2Log(Lo/La), where Lo and La are the maximized likelihood values under Ho and Ha, respectively. The observed LRT statistic value is then compared to the
critical value of the LRT's distribution under Ho that yields area to the right equal to the forward alpha. The distribution of the LRT statistic under Ho is approximated via bootstrapping (see,
McLachlan (1987)). Assuming the MLE's fit under Ho reflect the true distribution of the data (under Ho) random samples from the distribution under Ho are generated. A 1‐component and 2‐component
univariate mixture density is fit to each sample which together generate a single null value from the true null distribution of the LRT statistic (again, assuming the true null distribution is that
fit by the MLEs). Using a large # of samples yields a set of values used to approximate the null distribution of the LRT statistic, with corresponding critical value for rejecting Ho based on the
forward alpha. If Ho is rejected then a 2‐component univariate mixture density becomes the new testing basis and the forward procedure continues with a test of 2‐components vs 3 components.
Otherwise, if Ho is not rejected then the forward procedure testing basis remains a 1‐component density, which is tested against 3‐components in the exact same manner. The key to bootstrapping the
LRT statistic's null distribution is to assume that the density with MLE parameters (under Ho) is the true null density and random samples are generated from it. The forward procedure continues in
this manner testing Ho: go components vs Ha: ga components up to Ha = max # components specified in the control file (parameter #4). If the maximum # of components is set to N, then the forward
procedure will conduct N‐1 hypotheses tests sequentially, where the alternatives are Ha=2 components, 3 components, 4 components, ..., N components, respectively. The forward procedure will end
with a certain # of mixture components being suggested as optimal. It is followed by a backward procedure that tests a univariate mixture density with 1 less component, and repeats the test until
Ho is rejected, ending the forward‐backward procedure. If the forward procedure ends by suggesting that F components are needed to properly fit the data, then the backward procedure begins by
testing Ho: F‐1 components vs Ha: F components using the backward alpha specified by the user in the control file (parameter #7). Note that the forward procedure conducts a series of tests with Ha
having 2, 3, 4, ..., maxcmps (maxcmps is the maximum # of components to consider in the application, which is set by the 4th parameter in the control file) components, respectively. Therefore, once
the forward procedure ends we have optimal univariate mixtures fit with ML estimates for all components from 1 to maxcmps. During backward processing these are used to generate the random samples
needed under Ho to approximate the null distribution of the LRT. If this hypothesis is rejected then the forward‐backward procedure ends and F components are considered optimal for the given
observation set. Else, if Ha is not rejected then the backward procedure basis becomes F‐1 components (since it is not significantly different from F components, and applying the principle of
parsimony). In this case, the backward procedure continues by testing Ho: F‐2 components vs Ha: F‐1 components. If this test is not rejected, a mixture density with F‐2 components becomes the new
basis and the procedure continues by testing Ho: F‐3 components vs Ha: F‐2 components. If the test is rejected then F‐1 components are considered optimal and the forward‐backward procedure ends.
The backward portion continues in this manner until a test is rejected. Consider an example with a maximum of N=10 components specified by the user in the control file (4th parameter) and a forward
alpha = 0.15 (6th parameter) and backward alpha = 0.20 (7th parameter). The following details a possible sequence of testing events and illustrates how the procedure iterates:
Test #
======
1
2
3
4
5
6
7
8
9
10
11
12
======
Ho:
============
1‐Component
1‐Component
1‐Component
4‐Components
4‐Components
4‐Components
7‐Components
7‐Components
7‐Components
6‐Components
5‐Components
4‐Components
============
Ha:
=============
2‐Components
3‐Components
4‐Components
5‐Components
6‐Components
7‐Components
8‐Components
9‐Components
10‐Components
7‐Components
6‐Components
5‐Components
=============
Alpha
=======
0.15
0.15
0.15
0.15
0.15
0.15
0.15
0.15
0.15
0.20
0.20
0.20
=======
Type
========
Forward
Forward
Forward
Forward
Forward
Forward
Forward
Forward
Forward
Backward
Backward
Backward
========
Result (Ho)
===========
Accept
Accept
Reject
Accept
Accept
Reject
Accept
Accept
Accept
Accept
Accept
Reject
===========
72
/
/
Final Result: Here, a 5‐component mixture is considered to provide best fit based on the user‐specified forward and backward alpha values (significance levels). Forward processing ended with a 7‐
/
component mixture producing the best fit and backward processing found no significant difference between 6 & 7 components (a test that was not performed during forward processing), and no difference
/
between 5 & 6 components (a test that was also not performed during forwared processing). The backward test of 4 vs 5 components was performed during forward processing but with a smaller alpha and
/
was not rejected, but is rejected using the larger alpha for backward processing. By tuning the forward/backward alphas the user customizes the procedure to favor a larger/smaller # of components.
/
/ Inputs:
/
/
1.) The asset # being processed (ranges from 0 thru (total # assets‐1)). The asset # is used for debugging and displaying results to the output window and output file. (a)
/
/
2.) The total # of observations (i.e., time points) in the current application. Specified by the user via the control file (2nd parameter). (T)
/
/
3.) An array of size T holding the observations/returns at each time point for the asset currently being processed. (r)
/
/
4.) The maximum # of components to allow in the univariate mixture distribution fit by this function. Specified by the user via the control file (4th parameter). (maxcmps)
/
/
5.) The # of bootstrap samples to use for each LRT when approximating the statistic's null distribution. Specified by the user via the control file (5th parameter). (nsmpls)
/
/
6.) The # of random starts to use when finding the ML estimates for a specific mixture density. Specified by the user via the control file (3rd parameter). Note that this value is taken as a
/
multiple of the # of cores and is also increased by the multiple (# components ‐ 1). (nstrts)
/
/
7.) An array of size 2 to hold the forward and backward alphas, respectively for the LRTs. (sl)
/
/
8.) An empty double array to hold the fitted univariate mixture distribution that results from applying the forward‐backward procedure detailed here. The array is indexed as [s][c], where s = 0, 1,
/
2, and c = component #. Here, s=0 refers to the component's probability, s=1 refers to the component's mean, and s=2 refers to the component's standard deviation. (fnlMDst)
/
/
9.) A string for the output directory. The final univariate mixture density for each # of components considered is written to the output file specified by the global constant ofile. (rdir)
/
/ Outputs:
/
/
This function populates the empty 2‐dimensional array that is supplied via parameter #8 with the optimal univariate mixture density fit by the forward‐backward procedure detailed above. The number
/
of components in this density is returned at the function call.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
int fitMixDist(const int a, const int T, const long double *r, const int maxcmps, const int nsmpls, const int nstrts, const long double sl[2], long double **fnlMDst, string rdir)
{
// Declare/initialize local variables.
//======================================
int hnum=0, sas, strt, end, incr, rCmpsH0=1, cbfsol=1, cbbsol, curopt, tstid, nBootsAdj, pValCntr, fprms, cmpord;
string yn, f_b, tmptxt;
long double LRT[2], *StatLRT=new long double [nsmpls+1], **orProb=new long double *[maxcmps], **orMean=new long double *[maxcmps], **orStd=new long double *[maxcmps],
*orLLVal=new long double [maxcmps], **orH0MDst=new long double *[3], *tmpRtrn=new long double[T], **outMDstH0=new long double *[3], **outMDstH1=new long double *[3],
**rMDstH0=new long double *[3], **oriMDst=new long double *[3], **oroMDst=new long double *[3];
vector<long double> pValue, alpha;
vector<int> h0, h1;
// Derive the 1‐component solution for the incoming sample (i.e., using the MLE estimates).
//===========================================================================================
for (int m=0; m<3; ++m)
{
oriMDst[m]=new long double [1];
rMDstH0[m]=new long double [1];
// 1‐component mixture used for sample random starts.
}
oriMDst[0][0]=1.00;
oriMDst[1][0]=getUniMean(T,r);
oriMDst[2][0]=getUniStd(T,r,oriMDst[1][0]);
// For each asset 2‐dimensional arrays holds the optimal g‐component solutions for the original sample. This will avoid having to rebuild optimal solutions during forward‐backward procedure.
//===============================================================================================================================================================================================
orProb[0]=new long double [1]; orProb[0][0]=oriMDst[0][0];
orMean[0]=new long double [1]; orMean[0][0]=oriMDst[1][0];
orStd[0]=new long double [1]; orStd[0][0]=oriMDst[2][0];
orLLVal[0]=getLLVal(T,r,1,(const long double **) oriMDst);
cout << string(20,'=') << endl << string(20,'=') << endl << "PROCESSING ASSET #" << a+1 << endl << string(20,'=') << endl << string(20,'=') << endl << endl;
strt=2; end=maxcmps+1; incr=1; f_b="Forward";
73
for (int fb=0; fb<2; ++fb)
{
// Iteration limits depend on the forward‐backward procedure.
//=============================================================
if (1 == fb)
{
strt=cbfsol‐1; end=0; incr=‐1; f_b="Backward"; cbbsol=cbfsol;
}
for (int g=strt; g != end; g=g+incr)
{
// Set null and alternative hypotheses.
//=======================================
hnum=hnum+1;
if (0 == fb)
{
h0.push_back(cbfsol); h1.push_back(g); sas=‐1;
alpha.push_back(sl[0]);
}
else if (1 == fb)
{
h0.push_back(g); h1.push_back(cbfsol);
alpha.push_back(sl[1]);
}
// Write details of this iteration.
//===================================
cout << string(62,'‐') << endl << string(62,'‐') << endl << "Asset #" << a+1 << " ‐ Hypothesis Test #" << hnum << " (" << h0[hnum‐1] << " vs " << h1[hnum‐1]
<< ") " << " [Direction: " << f_b << "]" << endl << string(62,'‐') << endl << string(62,'‐') << endl << endl << " " << string(62,'‐') << endl << " " << string(62,'‐')
<< endl << " H0: Asset #" << a+1 << " is best fit by a(n) " << h0[hnum‐1] << " component Normal mixture." << endl << "
vs" << endl << " H1: Asset #"
<< a+1 << " is best fit by a(n) " << h1[hnum‐1] << " component Normal mixture." << endl << " " << string(62,'‐') << endl << " " << string(62,'‐') << endl;
// If backward processing, check whether or not this hypothesis has already been tested. If so, issue a warning then retrieve and use the existing solution.
//=============================================================================================================================================================
for (int h=0; h<hnum‐1; ++h)
{
if (h0[h]==h0[hnum‐1] && h1[h]==h1[hnum‐1])
{
if (sl[0]==sl[1])
tmptxt=" the same ";
else
tmptxt=" a different ";
cout << endl << " WARNING: This hypothesis has already been tested using" << tmptxt << "alpha. (See test #" << h+1 << ".)"; sas=h+1;
}
}
// Rebuild input array under h0. (We need the null dist. to generate bootstrap samples.)
// Note that h0[hnum‐1] = # components under h0 for test # hnum and h0[hnum‐1]‐1 is the index of the optimal solution under h0 # of components.
//====================================================================================================================================================
for (int m=0; m<3; ++m)
orH0MDst[m]=new long double [h0[hnum‐1]];
for (int c=0; c<h0[hnum‐1]; ++c)
{
// In general, the g‐component solution is stored in orXYZ[g‐1][c]. For example:
orH0MDst[0][c]=orProb[h0[hnum‐1]‐1][c];
// ‐‐> orProb[0] is a 1‐dimensional array with single element orProb[0][0].
orH0MDst[1][c]=orMean[h0[hnum‐1]‐1][c];
// ‐‐> orMean[1] is a 2‐dimensional array with elements orMean[1][0], orMean[1][1].
orH0MDst[2][c]=orStd[h0[hnum‐1]‐1][c];
// ‐‐> orStd[2] is a 3‐dimensional array with elements orStd[2][0], orStd[2][1], orStd[2][2].
}
// Report the current optimal solution for the actual sample under H0 when forward processing.
//==============================================================================================
if (0 == fb && dbug >= 1)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(20);
cout << endl << " ‐‐> " << h0[hnum‐1] << "‐Component Optimal Solution: Log‐Likelihood: " << orLLVal[h0[hnum‐1]‐1] << endl << "
<< getVRatio(h0[hnum‐1], orH0MDst[2]) << endl;
showVals(0,r,h0[hnum‐1],(const long double **) orH0MDst);
74
Variance Ratio: "
} cout << endl;
// Simulation is used to approximate the null distribution of the LRT statistic. If a sample is generated but no local optimum is found then reduce the simulation
// count by 1. Also, reduce the simulation count by 1 when the LRT statistic is < 0. This can happen if a local optimum is found under the full model that has a
// smaller likelihood than the optimum value under the reduced model (which may itself be a local optimum). The adjusted count is held in nBootsAdj.
//===================================================================================================================================================================
nBootsAdj=nsmpls;
// LRT value for current solution. Numerator uses the parameters already estimated. We need to fit a new solution using h1 components on the incoming data for the
// denominator of the LRT. This is done here. Once fit, the estimates are transferred to the double arrays that hold optimal solutions for all component sizes.
// (Note: When forward processing, hnum == h1[hnum‐1]‐1 == g‐1 so that hnum+1 == h1[hnum‐1] == g.)
//====================================================================================================================================================================
if (0 == fb)
{
for (int m=0; m<3; ++m)
oroMDst[m]=new long double [h1[hnum‐1]]; /* (2) Note that oriMDst has exactly hnum components during forward processing which is 1 less than the # of comps in H1. */
orLLVal[hnum]=ThrdEMAlg(T,r,3*nstrts,hnum,(const long double **) oriMDst,h1[hnum‐1],oroMDst);
// Instantiate the arrays of size h1 and transfer the optimal solution for storage across component sizes.
//==========================================================================================================
orProb[hnum] = new long double [h1[hnum‐1]]; orMean[hnum] = new long double [h1[hnum‐1]]; orStd[hnum] = new long double [h1[hnum‐1]];
for (int c=0; c<h1[hnum‐1]; ++c)
{
orProb[hnum][c]=oroMDst[0][c];
orMean[hnum][c]=oroMDst[1][c];
orStd[hnum][c]=oroMDst[2][c];
}
// If the algorithm fails to converge on the original data we must exit the program.
//====================================================================================
if (orLLVal[hnum] <= LNegVal)
{
cout << "ERROR: Asset #" << a+1 << " did not converge to a local optimum when attempting to fit " << h1[hnum‐1] << " components." << endl
<< "Try increasing the # of random starts, decreasing the # of components, or increasing the variance ratio constraint." << endl
<< "EXITING...fitMixDist()..." << endl; cin.get();
exit (EXIT_FAILURE);
}
// Also exit if the algorithm finds an inferior optimum when compared to those with fewer #'s of components.
//============================================================================================================
if (orLLVal[hnum‐1] > orLLVal[hnum])
{
cout << "ERROR: Likelihood for Asset #" << a+1 << " when fitting " << h1[hnum‐1] << " components is less than the likelihood when " << endl
<< "fitting " << hnum << " components. An inferior local optimum has been found. (Increase the # of random starts to prevent this.)" << endl
<< "EXITING...fitMixDist()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
}
StatLRT[nsmpls] = ‐2.00*(orLLVal[h0[hnum‐1]‐1] ‐ orLLVal[h1[hnum‐1]‐1]);
// Report the LRT statistic value for the actual sample.
//========================================================
if (dbug >= 1)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(20);
cout << " ‐‐> LRT Details for Original Sample: H0 Log‐L=" << orLLVal[h0[hnum‐1]‐1] << ", H1 Log‐L=" << orLLVal[h1[hnum‐1]‐1] << ", LRTS for Asset #" << a+1 << "="
<< StatLRT[nsmpls] << endl << endl;
}
// Bootstrap the LRT statistic to determine its sampling dist. The reduced model is the one with MLE's just derived for the given # of components. This test is for # of components + 1.
//==========================================================================================================================================================================================
if (‐1==sas)
{
if (0 == dbug)
cout << " Processing bootstrap samples ";
75
// Instantiate the arrays to hold the optimal solutions under H0 and H1. These will be reused for each sample.
//===============================================================================================================
for (int m=0; m<3; ++m)
{
outMDstH0[m]=new long double [h0[hnum‐1]];
outMDstH1[m]=new long double [h1[hnum‐1]];
}
// Test the hypothesis.
//=======================
for (int b=0; b<nsmpls; ++b)
{
if (0 == dbug)
{
cout << ".";
if (b+1 != nsmpls && 0 == (b+1) % 100)
cout << endl << string(31,' ');
}
else if (dbug >= 1)
cout << string(162,'‐') << endl << string(162,'‐') << endl << string(40,' ') << "Asset #" << a+1 << ": Hypothesis Test #" << hnum << " (" << h0[hnum‐1]
<< " vs " << h1[hnum‐1] << "): Start Processing Bootstrap Sample #" << b+1 << " of " << nsmpls << "." << endl << string(162,'‐') << endl << string(162,'‐') << endl << endl;
// Generate sample of size nTPoints from the reduced model under the null hypothesis that the reduced model (using MLEs) is correct for this set of returns.
// When bootstrapping the LRT statistic, use 1‐component values (probs, means, stds) to generate the random starts under h0 (because we do not have access to
// the solution using H0 # components less 1 on each sample) and use the model fitted under h0 to generate random starts when fitting the model specified by h1.
//================================================================================================================================================================
getRVals(T,h0[hnum‐1],(const long double **) orH0MDst,tmpRtrn);
// Fit both H0 (# components) and H1 (# components) models and form the LRT statistic. [Random start for H0 (always a 1‐component mixture)].
//=============================================================================================================================================
rMDstH0[0][0]=1.00;
rMDstH0[1][0]=getUniMean(T,tmpRtrn);
rMDstH0[2][0]=getUniStd(T,tmpRtrn,rMDstH0[1][0]);
// H0.
//=====
LRT[0]=ThrdEMAlg(T,tmpRtrn,nstrts,rCmpsH0,(const long double **) rMDstH0,h0[hnum‐1],outMDstH0);
// H1
//=====
if (LRT[0] > LNegVal)
LRT[1]=ThrdEMAlg(T,tmpRtrn,nstrts,h0[hnum‐1],(const long double **) outMDstH0,h1[hnum‐1],outMDstH1);
// Random observation from the null distribution of the following LRT: (Reduce the simulation size count by 1 if the LRT statistic is negative.)
// H0: Data originate from mixture with h0[hnum‐1] components vs. H1: Data originate from mixture with h1[hnum‐1] components
//=================================================================================================================================================
if (LRT[0] > LNegVal && LRT[1] > LNegVal)
StatLRT[b] = ‐2.00*(LRT[0] ‐ LRT[1]);
else
StatLRT[b] = ‐1.00;
// The denominator gets decremented in 2 ways:
//
1.) The LRT statistic is negative which means that an inferior local optimum was found.
//
2.) No local optimum was found when fitting either the null component or the alternative component distributions, all were spurious (i.e., leading to unboundedness).
//==========================================================================================================================================================================
if (StatLRT[b] < 0.00)
nBootsAdj=nBootsAdj‐1;
// Report the LRT statistic value for the bootstrap sample.
//===========================================================
if (dbug >= 1)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(20);
if (LRT[0] > LNegVal && LRT[1] > LNegVal && StatLRT[b] >= 0.00)
cout << " ‐‐> LRT Details for Sample #" << b+1 << ": LRT[0]=" << LRT[0] << ", LRT[1]=" << LRT[1] << ", LRTS for bootstrap sample "
76
<< b+1 << " of " << nsmpls << "=" << StatLRT[b] << endl << endl;
else
{
if (LRT[0] <= LNegVal || LRT[1] <= LNegVal)
{
tstid=1;
if (LRT[0] <= LNegVal)
tstid=0;
cout << " ‐‐> The EM algorithm did not find a local optimum under H" << tstid << ". (Sample " << b+1 << " will be discarded.)" << endl << endl;
}
else
cout << " ‐‐> Negative LRT test statistic: " << StatLRT[b] <<". (Sample " << b+1 << " will be discarded.)" << endl
<< "
[An inferior (not the largest) local optimum was found under H1.]" << endl << endl;
}
}
}
// Clear out sample solution arrays.
//====================================
for (int m=0; m<3; ++m)
{
delete [] outMDstH0[m]; outMDstH0[m]=nullptr;
delete [] outMDstH1[m]; outMDstH1[m]=nullptr;
}
}
// Clear the array that holds the optimal solution for the original sample under H0.
//====================================================================================
for (int m=0; m<3; ++m)
{
delete [] orH0MDst[m]; orH0MDst[m]=nullptr;
}
if (‐1==sas && 0 == dbug)
cout << " (" << nsmpls << ")" << endl;
// Determine p‐value & test result. If H0 is rejected then move the temporary values into their permanant placeholders. If null hypothesis is not rejected then set variable stop to 1.
//=========================================================================================================================================================================================
if (‐1 == sas)
{
pValCntr=1;
for (int n=0; n<nsmpls; ++n)
if (StatLRT[n] > 0.00 && StatLRT[n] >= StatLRT[nsmpls])
pValCntr=pValCntr+1;
pValue.push_back((long double) pValCntr/(nBootsAdj+1));
// Uncomment to write the LRT[] array to a file in the error folder. These values form the null distribution of the test statistic.
//====================================================================================================================================
// ofstream fout;
// fout.open(errFolder + "Asset_" + to_string((long long) a+1) + "_LRT_" + to_string((long long) h0[hnum‐1]) + "_vs_" + to_string((long long) h1[hnum‐1]) + ".txt");
// fout.setf(ios_base::fixed, ios_base::floatfield); fout.precision(16);
// fout << "‐‐> LRT statistic for original data: " << StatLRT[nsmpls] << endl << endl;
// fout << "‐‐> Null distribution LRT statistic values for " << nsmpls << " bootstrap samples (set values of ‐1.00 to missing):" << endl << endl;
// for (int b=0; b<nsmpls; ++b)
//
fout << "StatLRT[" << b << "] = " << StatLRT[b] << endl;
// fout.close();
}
else
pValue.push_back(pValue[sas‐1]);
// Write out the hypothesis test result. If this is a retest, report the prior result. (Note that it is a retest when sas >= 0, and sas holds the prior test number.)
//=======================================================================================================================================================================
if (‐1 == sas)
{
77
cout << endl << " " << string(37,'=') << endl << " Hypothesis test #" << hnum << " (" <<
<< endl << " ‐‐> The hypothesis test uses " << nBootsAdj << " valid LRTS values from
<< nBootsAdj+1 << ")" << endl << " ‐‐> Of these, there are " << pValCntr << " values
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(20);
cout << " ‐‐> The resulting p‐value for testing H0 vs H1 is: " << pValue[hnum‐1] << " vs.
h0[hnum‐1] << " vs " << h1[hnum‐1] << ") result:" << endl << " " << string(37,'=')
resampling along with the 1 LRTS value from the original sample. (Total="
>= the sample LRT statistic." << endl;
" << f_b << " alpha: " << sl[fb] << "." << endl;
}
else
{
cout << endl << " " << string(67,'=') << endl << " Hypothesis test #" << hnum << " (" << h0[hnum‐1] << " vs " << h1[hnum‐1] << ") is a retest of Hypothesis test # " << sas
<< "." << endl << " " << string(67,'=') << endl;
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(20); cout << " ‐‐> The resulting p‐value for testing H0 vs H1 is: " << pValue[hnum‐1] << " vs. " << f_b
<< " alpha: " << sl[fb] << "." << endl;
}
// Accept or reject the hypothesis. If Ho is rejected then Ha is considered a better fit. When forward testing, Ha has additional components (i.e., the integer value of h1).
// When backward testing Ho is considered an acceptable fit when not rejected (i.e., integer value of h0). Here we keep track of the best solutions for both forward and backward
// testing. The index of the optimal solution when accessing the orXYZ[][] double arrays is (cbbsol‐1) once finished processing. That is, orXYZ[cbbsol‐1][0] ‐ orXYZ[cbbsol‐1][cbbsol‐1].
//=========================================================================================================================================================================================
yn=" NOT ";
if (pValue[hnum‐1] <= sl[fb])
{
yn=" ";
if (0 == fb)
cbfsol=h1[hnum‐1];
// H0 was rejected, set CBFSOL to H1 # components.
else
// Stop backward processing after first H0 is rejected.
end=g+incr;
}
else if (1 == fb)
cbbsol=h0[hnum‐1];
curopt = (int) (0==fb)*cbfsol + (int) (1==fb)*cbbsol;
// For displaying current solution to user.
// If forward processing and not at the max # components we should reset oriMDst[][] and clear out oroMDst[][].
//===============================================================================================================
if (0 == fb && g+incr != end)
{
// Clear/update the input and output arrays. The oriMDst[][] densities will generate the random starts when fitting the original
// sample to one additional component. (Note that the original double mixture arrays are only needed during forward processing.)
//=================================================================================================================================
for (int m=0; m<3; ++m)
{
delete [] oriMDst[m];
oriMDst[m]=new long double [h1[hnum‐1]];
for (int c=0; c<h1[hnum‐1]; ++c)
oriMDst[m][c]=oroMDst[m][c];
delete [] oroMDst[m]; oroMDst[m]=nullptr;
}
}
// Report the current best solution after testing this hypothesis.
//==================================================================
cout << " ‐‐> The null hypothesis is" << yn << "rejected in favor of the alternative hypothesis." << endl << " ‐‐> At this stage a(n) " << curopt
<< "‐component Normal mixture provides the best fit for Asset #" << a+1 << "." << endl << endl << string(162,'‐') << endl << string(162,'‐') << endl << endl;
// Processor cool down.
//=======================
if (dbug >= 2)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(4);
cout << endl << "***** Processor cool Down: " << ((double) cDown/1000.00)/60.00 << " minutes. *****" << endl;
} Sleep(cDown);
}
}
// Display p‐values then clear out the containers.
//==================================================
78
cout << " All p‐values for Asset #" << a+1 << " by test number:" << endl << " " << string(41,'=') << endl;
for (int m=0; m<pValue.size(); ++m)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(10);
cout << " P‐value for hypothesis test #" << setfill('0') << setw(2) << m+1 << " (" << setw(2) << h0[m] << " vs " << setw(2) << h1[m] << "): " << pValue[m]; cout.precision(5);
cout << " (alpha = " << alpha[m] << ")"; cout.precision(10); cout << " (Log‐Likelihood Values: LL[H0]=" << orLLVal[h0[m]‐1] << ", LL[H1]=" << orLLVal[h1[m]‐1] << ")" << endl;
}
// Insert the optimal solution into the double array passed to this function. The # components is returned by the function. 1st order the mixture returned by the respective means.
//====================================================================================================================================================================================
for (int c1=0; c1<cbbsol; ++c1)
{
cmpord=0;
for (int c2=0; (c2<cbbsol); ++c2)
if (orMean[cbbsol‐1][c2] < orMean[cbbsol‐1][c1])
cmpord++;
// Account for ties.
//====================
for (int c3=cmpord; (c3<cbbsol && fnlMDst[0][cmpord] > 0.00); ++c3)
cmpord++;
// Populate the outgoing array.
//===============================
fnlMDst[0][cmpord]=orProb[cbbsol‐1][c1];
fnlMDst[1][cmpord]=orMean[cbbsol‐1][c1];
fnlMDst[2][cmpord]=orStd[cbbsol‐1][c1];
}
// Display the final result for each asset.
//===========================================
fprms = (3*(cbbsol)‐1); // Free parameters.
cout << endl << " ‐‐> Distribution for Asset #" << a+1 << " is a(n) " << cbbsol << "‐Component Normal Mixture (full details below)." << endl
<< endl << "
Log‐Likelihood: " << orLLVal[cbbsol‐1]
<< endl << "
Variance Ratio: " << getVRatio(cbbsol, orStd[cbbsol‐1])
<< endl << "
AIC: " << (long double) 2.00*fprms ‐ 2.00*orLLVal[cbbsol‐1]
<< endl << "
BIC: " << ‐2.00*orLLVal[cbbsol‐1] + (long double) fprms*log((long double) T)
<< endl << "
AICC: " << (long double) 2.00*fprms ‐ 2.00*orLLVal[cbbsol‐1] + ((long double) 2.00*(fprms + 1)*(fprms + 2))/((long double) (T ‐ fprms ‐ 2))
<< endl << "
Density Parameters: " << endl;
showVals(0,r,cbbsol,(const long double **) fnlMDst);
cout << endl << string(162,'=') << endl << string(162,'=') << endl;
// Write all densities to output file for this asset. Along with all p‐values.
//==============================================================================
ofstream fout;
if (0 == a)
fout.open(rdir+ofile, ios_base::out);
else
fout.open(rdir+ofile, ios_base::out | ios_base::app);
fout << string(28,'=') << endl << "Asset #" << a+1 << " Optimal Densities:" << endl << string(28,'=') << endl;
for (int i=0; i<maxcmps; ++i)
{
fout << endl << " " << i+1 << "‐Component Optimal Solution: " << endl << " " << string(43,'=');
fout.setf(ios_base::fixed, ios_base::floatfield); fout.precision(16);
fprms = (3*(i+1)‐1); // Free parameters.
fout << endl << " ‐‐> Log‐Likelihood: " << orLLVal[i]
<< endl << "
Variance Ratio: " << getVRatio(i+1, orStd[i])
<< endl << "
AIC: " << (long double) 2.00*fprms ‐ 2.00*orLLVal[i]
<< endl << "
BIC: " << ‐2.00*orLLVal[i] + (long double) fprms*log((long double) T)
<< endl << "
AICC: " << (long double) 2.00*fprms ‐ 2.00*orLLVal[i] + ((long double) 2.00*(fprms + 1)*(fprms + 2))/((long double) (T ‐ fprms ‐ 2))
<< endl << "
Density Parameters: " << endl;
for (int c=0; c<i+1; ++c)
fout << string(37,' ') << "Prob[" << c << "]=" << orProb[i][c] << " Mean[" << c << "]=" << orMean[i][c] << " Std.Dev.[" << c << "]=" << orStd[i][c] << endl;
}
fout << endl << endl << " All p‐values for Asset #" << a+1 << " by test number:" << endl << " " << string(41,'=') << endl;
79
for (int m=0; m<pValue.size(); ++m)
{
fout.setf(ios_base::fixed, ios_base::floatfield); fout.precision(10);
fout << " P‐value for hypothesis test #" << setfill('0') << setw(2) << m+1 << " (" << setw(2) << h0[m] << " vs " << setw(2) << h1[m] << "): " << pValue[m]; fout.precision(5);
fout << " (alpha = " << alpha[m] << ")"; fout.precision(10); fout << " (Log‐Likelihood Values: LL[H0]=" << orLLVal[h0[m]‐1] << ", LL[H1]=" << orLLVal[h1[m]‐1] << ")" << endl;
}
fout << endl << endl << " Optimal Density for Asset #" << a+1 << endl << " " << string(31,'=') << endl;
showVals(0,r,cbbsol,(const long double **) fnlMDst, fout); fout << endl << endl;
fout.close();
// Clear vectors and free temporary memory allocations.
//=======================================================
pValue.clear(); pValue.shrink_to_fit(); alpha.clear(); alpha.shrink_to_fit();
h0.clear(); h0.shrink_to_fit(); h1.clear(); h1.shrink_to_fit();
for (int m=0; m<3; ++m)
{
delete [] oriMDst[m]; oriMDst[m]=nullptr;
delete [] oroMDst[m]; oroMDst[m]=nullptr;
delete [] rMDstH0[m]; rMDstH0[m]=nullptr;
}
delete [] oriMDst; oriMDst=nullptr;
delete [] oroMDst; oroMDst=nullptr;
delete [] rMDstH0; rMDstH0=nullptr;
for (int c=0; c<maxcmps; ++c)
{
delete [] orProb[c]; orProb[c]=nullptr;
delete [] orMean[c]; orMean[c]=nullptr;
delete [] orStd[c]; orStd[c]=nullptr;
}
delete [] orProb; orProb=nullptr;
delete [] orMean; orMean=nullptr;
delete [] orStd; orStd=nullptr;
delete [] tmpRtrn; tmpRtrn=nullptr;
delete [] StatLRT; StatLRT=nullptr;
delete [] orLLVal; orLLVal=nullptr;
delete [] orH0MDst; orH0MDst=nullptr;
delete [] outMDstH0; outMDstH0=nullptr;
delete [] outMDstH1; outMDstH1=nullptr;
// Return the optimal # of components.
//======================================
return cbbsol;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: ThrdEMAlg.cpp
/
/ Function: ThrdEMAlg()
/
/ Summary:
/
/
This function threads the EM algorithm. An individual thread is used to maximize the likelihood function for 1 random start. Likelihood functions for mixture PDFs have multiple local optimums, and
/
they are unbounded. The MLEs for the parameters are those that yield the largest of the local maximums, after removing spurious optimizers. Spurious optimizers are those where a single component
/
is used to fit one or a small number of closely clustered observations. In such cases the variance of the corresponding component becomes very small or approaches zero, which drives the likelihood
/
value to infinity. Spurious optimizers can be eliminated by imposing a variance ratio constraint which does not allow the ratio of the largest to smallest variance (across components) to exceed
/
some given constant. This will prevent a variance from approaching zero or a small number. The user must set the variance ratio constraint to a value that is appropriate for the data in their
/
application. If the intent is to construct a density function that memorizes the training data then this value can be set very high. If the intent is to build a density that extends well to out‐
/
of‐sample data then this value can be set very low. The global constant stdRatio is set in the header file as the square root of the desired variance ratio constraint. The # of threads is set by
/
the # of independent processing units on the computer running the application as well as the # of components in the mixture being fit and the user‐specified # of random starts parameter setting in
80
/
the control file (3rd parameter). The # of random starts is equal to: rs*(# cores)*(g‐1), where rs = # of random starts specified by the 3rd parameter in control.txt, # cores = # of indpendent
/
processing units on the computer running the application, and g = # of components in the univariate mixture density being fit. The # of random starts therefore increases with the size of the
/
density being fit. Each random start is assigned its own thread and launches the EMAlg() function to find the likelihood maximizer based on that random start (this is a unique value and reflects
/
the local maximum nearest to the parameter settings in the random start). Once all threads finish, the parameter settings from the random start which yields the largest likelihood value (and
/
obeying the variance ratio constraint) are taken as the MLEs. An empty double array is populated with these values and the maximum log‐likelihood function value is returned at the call.
/
/ Inputs:
/
/
1.) The total # of observations (i.e., time points) in the current application. Specified by the user via the control file (2nd parameter). (T)
/
/
2.) An array of size T holding the observations/returns at each time point for the asset currently being processed. (r)
/
/
3.) The # of random starts to use when finding the ML estimates for a specific mixture density. Specified by the user via the control file (3rd parameter). Note that this value is taken as a
/
multiple of the # of cores and is also increased by the multiple (# components ‐ 1), so that an increasing # of random starts is used as the # of components increases. (nstrts)
/
/
4.) The # of components in the univariate mixture distribution used to generate random starts (i.e., means) for the EM algorithm. For example if fitting a 5‐component univariate mixture
/
distribution to an asset and an optimal 4‐component univariate mixture distribution is available for that asset, then a 4‐component mixture distribution is used to generate outg (argument #6 to
/
this function) means as the starting point for constructing the random starts. If no such 4‐component mixture distribution is available (for example during bootstrapping of the LRT with Ho
/
having 4 components), then a 1‐component mixture will be used to generate the means for an outg‐component random start. (Note: Recall that a g‐component random start is built by generating g‐
/
random values which serve as the component means. Each observation is then attached to the nearest mean (component). The probability for that component is the # attached divided by the total #
/
of observations, and the standard deviation for that component is the sample standard deviation for all observations assigned to it.) (ing)
/
/
5.) A 2‐dimensional array to hold the univariate mixture distribution used to generate means for a random start. This density function has ing components as mentioned above and the double array is
/
indexed as [s][c], where s = 0, 1, 2, and c = component #. Here, s=0 refers to the component's probability, s=1 refers to the component's mean, and s=2 refers to the component's standard
/
deviation. As noted above, when generating random starts for the EM algorithm a density function that is most similar to the # of components being fit is desirable. Therefore, if fitting a 5‐
/
component mixture density and an optimal 4‐component mixture density is available then it will be used to generate the random starts. If an optimal 4‐component mixture density is not available
/
then a univariate normal distribution (i.e., 1‐component mixture) can be used to generate the means for a random start. (inMDst)
/
/
6.) The # of components in the outgoing univariate mixture density that is being fit using the EM algorithm. (outg)
/
/
7.) An empty double array to hold the fitted univariate mixture distribution fit using the EM algorithm. The double array is indexed as [s][c], where s = 0, 1, 2, and c = component #. Here, s=0
/
refers to the component's probability, s=1 refers to the component's mean, and s=2 refers to the component's standard deviation. (outMDist)
/
/ Outputs:
/
/
This function returns the log‐likelihood for the optimal univariate mixture fit using the EM algorithm at the function call. It also populates the supplied empty double array (outMDist) with the
/
corresponding optimal univariate mixture distribution.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
long double ThrdEMAlg(const int T, const long double *r, const int rs, const int ing, const long double **inMDist, const int outg, long double **outMDist)
{
// Local variables.
//===================
long double llval;
// Handle trivial case first (i.e., 1‐component), then non‐trivial case (i.e., > 1‐component).
//==============================================================================================
if (outg == 1)
{
for (int m=0; m<3; ++m)
outMDist[m][0]=inMDist[m][0];
// Transfer probabilities, means, and standard deviations.
llval = getLLVal(T,r,outg,(const long double **) outMDist);
// Compute likelihood.
}
else
{
// Declare/initialize local variables. Find # of independent processing units and create array of thread objects using the random start multiplication factor specified in the control file.
// The # of random starts specified in the control file is a multiple of the # of independent processing units.
//=============================================================================================================================================================================================
int p = (int) (outg‐1)*rs*boost::thread::hardware_concurrency(), fstgrp=1, **runprms=new int *[p];
long double **rPrbs=new long double *[p], **rMns=new long double *[p], **rStds=new long double *[p], *llVals=new long double [p];
boost::thread *t=new boost::thread[p];
string cmt, spc;
// Display message with details of the optimization process.
//============================================================
81
if (dbug >= 1)
{
cout << " Threading EM Algorithm will use " << p << " random starts for the current optimization." << endl;
if (dbug >=2)
{
cout << " [Note: When the variance ratio constraint is violated, or the maximum # of iterations has been reached, or an invalid probability detected," << endl
<< "
the log‐likelihood is set to the arbitrarily large negative #: "; cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(7); cout << LNegVal << "]" << endl;
}
cout << endl;
}
// Create arrays to hold the random starts and return values from the EM algorithm. A random start must specify all unknown parameters for
// a ng‐component mixture. (i.e., component probabilities, means, standard deviations) These p arrays will be reused within each run group.
//============================================================================================================================================
for (int j=0; j<p; ++j)
{
rPrbs[j] = new long double [outg];
rMns[j] = new long double [outg];
rStds[j] = new long double [outg];
runprms[j] = new int [4]; runprms[j][0]=ing; runprms[j][1]=j;
}
// Iterate over # of random starts and determine the start, then launch optimization calls.
//===========================================================================================
for (int j=0; j<p; ++j)
{
// Launch call to EMAlg() for each thread. Once all threads finish, we scan the likelihood values across the p solutions (inner loop) and select the largest local optimum as the optimum.
// The outer loop then repeats this process rs*(outg‐1) number of times.
//============================================================================================================================================================================================
t[j] = boost::thread(EMAlg,T,boost::cref(r),outg,boost::ref(rPrbs),boost::ref(rMns),boost::ref(rStds),boost::ref(llVals), boost::cref(inMDist),boost::ref(runprms[j]));
}
// Pause until all sub‐threads finish, and save the optimal solution from this group of runs.
//=============================================================================================
for (int j=0; j<p; ++j)
{
t[j].join();
// Report results when requested.
//=================================
if (dbug >= 2)
{
spc=""; cmt="";
if (0 == runprms[j][2])
cmt="[Variance ratio constraint violated, solution not used.]";
else if (1 == runprms[j][2])
cmt="[Maximum # of iterations reached, solution not used.]";
else if (2 == runprms[j][2])
{
if (llVals[j] > 0.00 && llVals[j] < 10.00) spc=" ";
else if (llVals[j] >= 10.00 && llVals[j] < 100.00) spc=" ";
}
else if (3 == runprms[j][2])
cmt="[Invalid probability encountered, solution not used.]";
cout << " ‐‐> " << outg << "‐Component Log‐Likelihood for random start # " << setfill('0') << setw(to_string((long long) p).size()) << j+1 << " = ";
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(8*(1+(2 == runprms[j][2]))); cout << spc << llVals[j]; cout.precision(0); cout << " (Iterations = " << setfill('0')
<< setw(to_string((long long) mIters).size()) << runprms[j][3] << ") " << cmt << endl;
}
// Retrieve optimal solution: Scan random starts and locate the one associated with the highest likelihood value. The optimal probabilities, means, standard deviations
// are transferred to the placeholders passed to this function. If no local optimum has been found then set the return code to 0, otherwise use a return code of 1.
//=========================================================================================================================================================================
if (0 == j && 1 == fstgrp)
{
fstgrp=0;
llval=llVals[0];
82
for (int c=0; c<outg; ++c)
{
outMDist[0][c]=rPrbs[0][c];
outMDist[1][c]=rMns[0][c];
outMDist[2][c]=rStds[0][c];
}
}
else if (llVals[j] > llval)
{
llval=llVals[j];
for (int c=0; c<outg; ++c)
{
outMDist[0][c]=rPrbs[j][c];
outMDist[1][c]=rMns[j][c];
outMDist[2][c]=rStds[j][c];
}
}
}
if (dbug >= 1)
cout << endl;
// Free temporary memory allocations.
//=====================================
for (int j=0; j<p; ++j)
{
delete [] rPrbs[j]; rPrbs[j]=nullptr;
delete [] rMns[j]; rMns[j]=nullptr;
delete [] rStds[j]; rStds[j]=nullptr;
delete [] runprms[j]; runprms[j]=nullptr;
}
delete [] rPrbs; rPrbs=nullptr;
delete [] rMns; rMns=nullptr;
delete [] rStds; rStds=nullptr;
delete [] runprms; runprms=nullptr;
delete [] llVals; llVals=nullptr;
delete [] t; t=nullptr;
}
// Report the optimal solution.
//===============================
if (dbug >= 1)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(16);
cout << " ‐‐> " << outg << "‐Component Optimal Solution: Log‐Likelihood: " << llval << endl << "
if (llval > LNegVal)
showVals(0,r,outg,(const long double **) outMDist); cout << endl;
}
Variance Ratio: " << getVRatio(outg, outMDist[2]) << endl;
// Return the log‐likelihood value corresponding to the optimal solution.
//=========================================================================
return llval;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: EMAlg.cpp
/
/ Function: EMAlg()
/
/ Summary:
83
/
/
This function implements the EM algorithm for estimating parameters of a univariate mixture PDF. The observations from a univariate mixture PDF can be viewed as an incomplete data problem, where
/
the component # for each observation/time point is missing or unobserved. That is, at each time point 2 random variables produce a value: 1.) the component #, and 2.) the value from it. Note that
/
both sets of RVs will have parameters to be estimated. If viewed this way, the likelihood function can be expressed using both the missing and non‐missing random variables and their corresponding
/
parameters. For example, the parameters for the unobserved component random variable that each observation originates from are the component probabilities, and the parameters for the observed
/
density values are means and standard deviations from each component distribution. The EM algorithm then estimates parameters for both random variables iteratively as follows:
/
/
Step 1: Select starting values for all parameters (for both the missing/unobserved and non‐missing/observed random variables).
/
Step 2: Compute the expected values for all missing/unobserved random variables using the most recent parameter estimates.
/
Step 3: Replace all instances of the missing random variables with their expected values in the likelihood or log‐likelihood function.
/
Step 4: Optimize the resulting likelihood or log‐likelihood function with respect to the parameters for the non‐missing random variables.
/
Step 5: Check the %‐change in likelihood or log‐likelihood value maximized in step 4 for convergence (i.e., small %‐change) or error/exit condition.
/
Step 6: If no convergence or error/exit condition is met in Step 5 then return to Step 2.
/
/
Starting values for Step 1 are computed as random starts for all parameter values. This is acheived by first generating g values from the closest distribution to the one being fit (i.e., if fitting
/
a 5‐component univariate mixture and an optimal 4‐component univariate mixture is available, then use the 4‐component mixture to generate random starts, and if no other density is available then use
/
a 1‐component mixture). These g values are taken as the means, and each observation is attached to the closest mean. The standard deviation of the set of obserations attached to each mean is
/
computed as the component standard deviation, and the proportion of observations attached to each mean is the component probability for the random start. Convergence in Step 5 is checked using the
/
global constant epsilon set in the header file. In Step 5 we also check for error/exit conditions and exit the optimization if any of the following error conditions are met. These are:
/
/
Error/Exit 1.) Variance ratio constraint is violated (control with global constant stdRatio set in the header file)
/
Error/Exit 2.) Maximum # of iterations reached (control with global constant mIters set in the header file)
/
Error/Exit 3.) Any component probability becomes zero or negative while iterating
/
/ Inputs:
/
/
1.) The total # of observations (i.e., time points) in the current application. Specified by the user via the control file (2nd parameter). (T)
/
/
2.) An array of size T holding the observations/returns at each time point for the asset currently being processed. (r)
/
/
3.) The # of components in the univariate mixture density being fit. (g)
/
/
4.) An empty array of size g to hold the probability for each component in the univariate mixture. This array is updated during each iteration of the EM algorithm and therefore holds the optimal
/
probabilities upon convergence, which are returned in this array to the calling function. (Note that this parameter is a double array indexed as [t][g], where t is the thread # assigned by
/
ThrdEMAlg(), which invokes this function. The EM algorithm is implemented within threaded calls where a random start is assigned to its own thread.) (prbs)
/
/
5.) An empty array of size g to hold the mean for each component in the univariate mixture. This array is updated during each iteration of the EM algorithm and therefore holds the optimal means
/
upon convergence, which are returned in this array to the calling function. (Note that this parameter is a double array indexed as [t][g], where t is the thread # assigned by ThrdEMAlg(), which
/
invokes this function. The EM algorithm is implemented within threaded calls where a random start is assigned to its own thread.) (mns)
/
/
6.) An empty array of size g to hold the standard deviation for each component in the univariate mixture. This array is updated during each iteration of the EM algorithm and therefore holds the
/
optimal standard deviations upon convergence, which are returned in this array to the calling function. (Note that this parameter is a double array indexed as [t][g], where t is the thread #
/
assigned by ThrdEMAlg(), which invokes this function. The EM algorithm is implemented within threaded calls where a random start is assigned to its own thread.) (stds)
/
/
7.) An array to hold the log‐likelihood value that the EM algorithm converges to. It is the optimal value for the given random start. The array is indexed by thread #, therefore a single call to
/
this function generates 1 optimal log‐likelihood value which is returned in the element # for the current thread. (llVal)
/
/
8.) A double array to hold the univariate mixture density that is used to generate the random starts. This function begins by generating a random start, then optimizes the log‐likelihood function
/
based on that start (i.e., finds the nearest local maximum). This double array is indexed as [s][c], where s = 0, 1, 2, and c = component #. Here, s=0 refers to the component's probability,
/
s=1 refers to the component's mean, and s=2 refers to the component's standard deviation. (inMDist)
/
/
9.) An array of integer parameters holding values passed to and returned by this function. Element [0] holds the # of components in the mixture density that is used to generate the random starts,
/
which is parameterized in inMDist (parameter #8 to this function); element [1] is the thread # of the current call; element [2] is a return code which takes the following values: 0=variance
/
ratio constraint is violated, 1=maximum # of iterations reached, 2=convergence based on change to log‐likelihood value, 3=A component probability is not between 0.0 and 1.0; element [3] is the
/
iteration # of convergence or algorithm termination for one of the reasons decoded in element [2]. (rprms)
/
/ Outputs:
/
/
This function does not return a value at the call but updates several empty arrays that are supplied by the user. The prbs array is updated with the final estimated component probabilities, the mns
/
array is updated with the final estimated component means, the stds array is updated with the final estimated standard deviations, the llval array is updated with the final log‐likelihood value, and
/
the rprms array is updated at element [2] with the functions return code, and element [3] with the # iterations before convergence or termination.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
void EMAlg(const int T, const long double *r, const int g, long double **prbs, long double **mns, long double **stds, long double *llVal, const long double **inMDist, int *rprms)
{
84
// Declare/initialize local variables.
//======================================
const int ing=rprms[0], thrd=rprms[1];
int stop;
long double oldllval, newllval, minstd, maxstd, cprbs, ssqrs[1], var, **pdens=nullptr, *postprbs=new long double [T], *mdens=nullptr, psum, **orMDst=new long double *[3],
**uMDst=new long double *[3];
// Generate g random obs from solution with rprms[0] components which are specified in inMDist[][]. Use these means to generate probabilities and standard deviations for each random start.
//=============================================================================================================================================================================================
do
{
stop=1; minstd=LPosVal; maxstd=LNegVal;
getRVals(g,ing,(const long double **) inMDist,mns[thrd]);
getRPrbsStds(T,r,g,prbs[thrd],mns[thrd],stds[thrd]);
// Check that none of the probabilities are zero in the random sample and that the variance ratio constraint is not violated in the random sample. Note that any
// component having standard deviation = 0 will disqualify that sample. Generate a new sample if a probability is zero or the variance ratio constraint is violated.
//=====================================================================================================================================================================
for (int c=0; c<g; ++c)
{
if (prbs[thrd][c] <= 0.00)
stop=0;
if (stds[thrd][c] < minstd)
minstd=stds[thrd][c];
if (stds[thrd][c] > maxstd)
maxstd=stds[thrd][c];
}
if (maxstd > stdRatio*minstd)
stop=0;
} while (stop == 0);
// Store random start and updated mixture distribution as 2‐dimensional array for debugging and compliance with other functions.
//================================================================================================================================
for (int m=0; m<3; ++m)
{
orMDst[m]=new long double [g];
uMDst[m]=new long double [g];
}
for (int c=0; c<g; ++c)
{
orMDst[0][c]=prbs[thrd][c];
orMDst[1][c]=mns[thrd][c];
orMDst[2][c]=stds[thrd][c];
}
// Store (component likelihood)x(component probability) (in pdens[][]) for each observation/component using the current solution. Store the mixture likelihood value (in mdens[]) for each observation
// using the current solution. These are needed to implement the updating equations. The log‐likelihood for the initial random start parameters is also computed here and used below.
//=====================================================================================================================================================================================================
pdens = new long double *[T];
mdens = new long double [T];
oldllval = ((long double) T)*logrecipsqrt2pi;
for (int t=0; t<T; ++t)
{
pdens[t] = new long double [g];
mdens[t] = 0.00;
for (int c=0; c<g; ++c)
{
pdens[t][c]=prbs[thrd][c]*getNDens(r[t],mns[thrd][c],stds[thrd][c]);
mdens[t]=mdens[t] + pdens[t][c];
}
oldllval = oldllval+log(mdens[t]);
}
// Iterate using the EM algorithm. Component probabilities are updated first and independently of the means/variances.
//=======================================================================================================================
85
stop=0;
int itcntr=1;
do
{
// Get updated component probabilities, means, and standard deviations. Store in temporary placeholders. The mean and standard deviation update formulas will not
// work (as written) when any component probability is zero because there will be a division by zero. If this happens end the optimization with an error.
//===================================================================================================================================================================
psum=0.00;
for (int c=0; (c<g && 0==stop); ++c)
{
// Derive the posterior probabilities for this component along with the component probabilities.
//================================================================================================
uMDst[0][c]=0.00;
if (c < g‐1)
// Derive component manually if not at last component.
{
for (int t=0; t<T; ++t)
{
postprbs[t]=(pdens[t][c])/mdens[t];
uMDst[0][c] = uMDst[0][c] + postprbs[t];
}
uMDst[0][c] = uMDst[0][c]/T;
psum = psum + uMDst[0][c];
}
else
// Final component probability is: 1.00 ‐ (sum of all others).
{
for (int t=0; t<T; ++t)
postprbs[t]=(pdens[t][c])/mdens[t];
uMDst[0][c] = 1.00 ‐ psum;
}
// Exit the optimization with appropriate code if any single probability is not between 0.0 and 1.0.
//====================================================================================================
if (uMDst[0][c] <= 0.00 || uMDst[0][c] >= 1.00)
{
stop=1; llVal[thrd]=LNegVal;
rprms[2]=3; rprms[3]=itcntr;
}
else
{
// New updating equations (faster processing).
//==============================================
cprbs=uMDst[0][c]*T;
uMDst[1][c]=getEMMean(T,r,postprbs,cprbs,ssqrs);
var=(ssqrs[0] ‐ uMDst[1][c]*uMDst[1][c]*cprbs)/cprbs;
// Updating equations can result in zero (but stored value is negative) variance. If it happens the variance ratio constraint is automatically violated.
//=========================================================================================================================================================
if (var > 0.00)
uMDst[2][c]=sqrt(var);
else
{
stop=1; llVal[thrd]=LNegVal;
rprms[2]=0; rprms[3]=itcntr;
}
}
}
// Find maximum and minimum StDev values. The EM algorithm will stop when the ratio of largest to smallest variance exceeds a constant (variable is stdRatio set in the header file). This
// prevents an unbounded likelihood value and once the constraint is violated we conclude that the solution is spurious. (The likelihood will be set to a large negative # to ensure it is never
// the maximum across random starts.) We also stop when the maximum # of iterations exceeds some value (mIters set in the header file) or when any component probability is not between 0 and 1.
//=================================================================================================================================================================================================
if (stop == 0)
{
minstd=LPosVal; maxstd=LNegVal;
for (int c=0; c<g; ++c)
86
{
if (uMDst[2][c] < minstd)
minstd = uMDst[2][c];
if (uMDst[2][c] > maxstd)
maxstd = uMDst[2][c];
}
if (maxstd > stdRatio*minstd)
{
stop=1; llVal[thrd]=LNegVal;
rprms[2]=0; rprms[3]=itcntr;
}
else if (itcntr > mIters)
{
stop=1; llVal[thrd]=LNegVal;
rprms[2]=1; rprms[3]=itcntr;
}
}
// If the variance ratio constraint is not violated then proceed as usual.
//==========================================================================
if (stop == 0)
{
// Transfer values to permanant placeholders (variance ratio constraint has not been violated).
//===============================================================================================
for (int c=0; c<g; ++c)
{
prbs[thrd][c]=uMDst[0][c];
mns[thrd][c]=uMDst[1][c];
stds[thrd][c]=uMDst[2][c];
}
// Store the (component likelihood)x(component probability) (in pdens[][]) for each component/observation using the updated solution. Store the mixture likelihood value (in mdens[]) for each
// observation using the updated solution. These are to implement the updating equations. The log‐likelihood for the initial random start parameters is also computed here and used below.
//=============================================================================================================================================================================================
newllval = ((long double) T)*logrecipsqrt2pi;
for (int t=0; t<T; ++t)
{
mdens[t] = 0;
for (int c=0; c<g; ++c)
{
pdens[t][c]=prbs[thrd][c]*getNDens(r[t],mns[thrd][c],stds[thrd][c]);
mdens[t]=mdens[t] + pdens[t][c];
}
newllval = newllval+log(mdens[t]);
}
// Terminate the algorithm when %‐change criteria is met.
//=========================================================
if ((newllval‐oldllval) < epsilon*abs(oldllval))
{
stop=1; llVal[thrd]=newllval;
rprms[2]=2; rprms[3]=itcntr;
}
else
{
oldllval=newllval;
++itcntr;
}
}
} while (stop == 0);
// Write error/issue files for debugging.
//=========================================
if (1 == rprms[2])
{
87
ofstream fout;
fout.open(errFolder + "Max_iterations_reached_" + to_string((long long) g) + "_" + to_string((long long) thrd) + ".txt");
fout << "‐‐> Maximum # of iterations (" << mIters << ") has been reached for this optimization. (Check the solution below.)" << endl << endl;
fout.setf(ios_base::fixed, ios_base::floatfield); fout.precision(25);
fout << "‐‐> New log‐likelihood value: " << newllval << endl;
fout << "‐‐> Epsilon = " << epsilon << endl << endl;
fout << endl << "‐‐> Original observation vector and parameter starting values for this EMAlg() call: " << endl << endl;
for (int x=0; x<T; ++x) fout << r[x] << endl; fout << endl;
for (int cc=0; cc<g; ++cc)
{
fout << "Prob[" << cc << "]=" << orMDst[0][cc] << " Mean[" << cc << "]=" << orMDst[1][cc] << " Std.Dev.[" << cc << "]=" << orMDst[2][cc] << endl;
}
fout.close();
}
else if (3 == rprms[2])
{
ofstream fout;
fout.open(errFolder + "Prob_of_0_or_1_in_" + to_string((long long) g) + "_" + to_string((long long) thrd) + ".txt");
fout << "‐‐> Probability of 0.00 or 1.00 has been encountered and updating equations will not work. (Check the solution below.)" << endl << endl;
fout.setf(ios_base::fixed, ios_base::floatfield); fout.precision(25);
fout << "‐‐> Original observation vector and parameter starting values for this EMAlg() call: " << endl << endl;
for (int x=0; x<T; ++x) fout << r[x] << endl; fout << endl;
for (int cc=0; cc<g; ++cc)
{
fout << "Prob[" << cc << "]=" << orMDst[0][cc] << " Mean[" << cc << "]=" << orMDst[1][cc] << " Std.Dev.[" << cc << "]=" << orMDst[2][cc] << endl;
}
fout.close();
}
// Delete temporary memory allocations.
//=======================================
for (int t=0; t<T; ++t)
{
delete [] pdens[t]; pdens[t]=nullptr;
}
delete [] pdens; pdens=nullptr;
delete [] mdens; mdens=nullptr;
for (int m=0; m<3; ++m)
{
delete [] orMDst[m]; orMDst[m]=nullptr;
delete [] uMDst[m]; uMDst[m]=nullptr;
}
delete [] orMDst; orMDst=nullptr;
delete [] uMDst; uMDst=nullptr;
delete [] postprbs; postprbs=nullptr;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getRVals.cpp
/
/ Function: getRVals()
/
/ Summary:
/
/
This function accepts a mixture distribution as input and generates a random sample of observations from that distribution. The # of observations to generate is specified by the user in the call
/
and the sample is placed into an empty array supplied to this function by the user. Generating a random sample from a mixture distribution is a 2‐step process. (1) Generate a uniform random value
/
and compare it to the component probabilities to determine the component, and once the component is selected (2) generate an observation from the corresponding component density. Let p(i) be the
/
probability for component i and let there be a total of C components, then i=0,1,2,...,C‐1. If the uniform random value U <= p(0) then component 0 is selected, else if U <= p(0)+p(1) then component
/
1 is selected, else if U <= p(0)+p(1)+p(2) then component 2 is selected, etc... Once a component is selected an observation is generated from the corresponding density function. The result is an
88
/
observation generated from the supplied mixture distribution. Here, there are 2 reasons for generating random observations from a univariate mixture distribution as described below:
/
/
1.) In this application, univariate mixture distributions are fit using the EM algorithm with random starts. A random start must specify a value for all parameters in the given univariate mixture
/
density which is of known size, but with unknown parameters. The EM algorithm continues to increase the likelihood function until a local optimum is found based on the given parameter settings
/
from the random start. To optimize a g‐component mixture density when a g‐1 component mixture density is available from the same data set, we generate a single random start by producing g
/
random observations from the g‐1 component density. These g values are taken as means for the g‐component mixture. The observations are then assigned to the component with nearest mean by
/
using a standard distance computation. Once all observations are assigned to the closest mean, the standard deviation for each component (i.e., mean) is computed by taking the standard
/
deviation of the corresponding set of observations assigned to that mean. The probability assigned to each component is the # of observations assigned to the component divided by the total # of
/
observations in the data set. At this point, values for all parameters (i.e., g means, g standard deviations, g component probabilities) have been derived and the EM algorithm can be applied
/
starting at the given point in the parameter space. The EM algorithm then climbs to the top of the nearest hill and declares a local optimum. The maximum likelihood estimators would be the set
/
of parameters that yields the largest value for the likelihood function amongst the set of local optimums found via a large # of random starts.
/
/
2.) The likelihood ratio test (LRT) is used to select the optimal # of components for a univariate mixture density fit to a given observation set. The null hypothesis is that g0 components are
/
optimal vs the alternative of ga components being optimal (here, ga > g0). By fitting univariate mixtures of both sizes (g0 and ga) to the data we can generate a single value for the LRT
/
statistic. The value is compared to the null distribution of the LRT statistic, which is the distribution of the LRT under the assumption that a g0 component mixture is the appropriate size.
/
The distribution of the LRT under H0 is not known and is not asymptotically chi‐square due to the relevant regularity conditions not being satisfied. We can estimate the null distribution of
/
the LRT by bootstrapping (see, McLachlan (1987)). To bootstrap the LRT distribution we generate a random sample from the distribution specified by H0 of the same size as our data set. (Note
/
that H0 does not specify a particular univariate mixture, but rather just a # of components, namely g0. We take the ML Estimates of our data under g0 components as the distribution governed by
/
the null hypothesis, and this distribution is used to generate the sample of observations.) This sample is then fit to a univariate mixture under both g0 and ga components by applying the EM
/
algorithm using random starts, and a single value of the LRT statistic is produced. By repeating the process a large # of times we can approximate the null distribution of the LRT statistic.
/
We then compare the value derived from our data set and reject the null hypothesis when the LRT is large, where the critical point is determined by the user's choice of alpha = type 1 error for
/
the test. (Type 1 error probability = probability that the null hypothesis is rejected when it is true.) This function is used to generate the random samples used for the LRT just described.
/
/ Inputs:
/
/
1.) The # of random observations to generate from the supplied univariate mixture density. The observations are inserted into an empty array of the same size that is supplied by the user as the
/
last parameter to this function. (N)
/
/
2.) The # of components in the univariate mixture density that a sample will be generated from. (g)
/
/
3.) A double array holding the univariate mixture distribution definition from which a sample of size N will be generated. The array is indexed as [s][c], where s = 0, 1, 2, and c = component #.
/
Here, s=0 refers to the component's probability, s=1 refers to the component's mean, and s=2 refers to the component's standard deviation. (inMDst)
/
/
4.) An empty array of size N to be populated by this function as a random sample from the supplied univariate mixture distribution. (rvls)
/
/ Outputs:
/
/
This function populates an empty array with a random sample of user‐specified size from the supplied univariate mixture distribution. No value is returned at the function call.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
void getRVals(const int N, const int g, const long double **inMDist, long double *rvls)
{
// Generate N random observations from the current optimal solution that uses g components. These can be the means to use as a random start for fitting a specific model or observations used to
// approximate the null distribution of the LRT statistic.
//===============================================================================================================================================================================================
random_device rd;
default_random_engine gen(rd());
normal_distribution<long double> *ndist = new normal_distribution<long double> [g];
uniform_real_distribution<long double> udist(0.0,1.0);
// Define the array of normal distribution objects, one for each component.
//===========================================================================
for (int c=0; c<g; ++c)
ndist[c] = normal_distribution<long double> (inMDist[1][c],inMDist[2][c]);
// Generate N observations from the existing g‐component mixture distribution.
//==============================================================================
int cid;
long double uval, psum;
for (int i=0; i<N; ++i)
{
// Initialize variables.
//========================
cid=‐1;
psum=inMDist[0][0];
89
// Generate uniform random value.
//=================================
uval = udist(gen);
// Find the corresponding component.
//====================================
for (int c=0; (c<g && cid<0); ++c)
{
if (uval <= psum || c == g‐1)
cid=c;
else
psum = psum + inMDist[0][c+1];
}
// Generate a single obs from that component and store in array provided.
//=========================================================================
rvls[i] = ndist[cid](gen);
}
// Free up temporary memory allocations.
//========================================
delete [] ndist; ndist=nullptr;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getRPrbsStds.cpp
/
/ Function: getRPrbsStds()
/
/ Summary:
/
/
This function accepts a set of T observations along with a set of g means for a g‐component mixture distribution and it derives corresponding values for the component probabilities and standard
/
deviations. Each observation is assigned to a single component (i.e., mean) and the # of observations assigned to a component divided by the total # of observations is the corresponding estimate
/
for that component's probability. Observations are assigned to components using a simple distance function, and specifically each observation is assigned to the component with nearest mean. The
/
standard deviation for each component is then estimated as the sample standard deviation of the set assigned to that component assuming the mean is known. Empty arrays of size g are supplied to
/
this function to hold the set of component probabilities and set of standard deviations, respectively. Combined with the existing set of g means (derived as a random sample via the function
/
getRVals()) these 3 arrays (i.e., mean, standard deviation, and component probability) completely define a g‐component mixture distribution. If the means were generated as a random sample, then it
/
defines a single random start for fitting a g‐component mixture distribution using the EM algorithm.
/
/ Inputs:
/
/
1.) The total # of time points with data collected. (T)
/
/
2.) An array holding the set of observations (i.e., returns) for the asset being processed. (r)
/
/
3.) The # of means (i.e., components) in the array provided (by parameter #5) used to generate a random start for a mixture density. (g)
/
/
4.) An empty array of size g to be populated by this function as component probabilities for the univariate mixture density being constructed. (prbs)
/
/
5.) An array of means (i.e., components) to use as the basis for generating a g‐component mixture distribution. (mns)
/
/
6.) An empty array of size g to be populated by this function as standard deviations for the univariate mixture density being constructed. (stds)
/
/ Outputs:
/
/
This function populates two empty arrays of size g supplied (prbs & stds) with component probability estimates and standard deviation estimates, for each of the g components defined by the means
/
supplied in mns. No value is returned at the function call.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
90
void getRPrbsStds(const int T, const long double *r, const int g, long double *prbs, const long double *mns, long double *stds)
{
// Local variables.
//===================
long double *cssqrs=new long double [g], mindist;
int cid, *ccntr=new int [g];
// Initialize component counter and sum‐of‐squares arrays to all zeros.
//=======================================================================
for (int c=0; c<g; ++c)
{
ccntr[c]=0;
cssqrs[c]=0.0;
}
// Iterate over all observations and classify each into the component whose mean it is closest to.
//==================================================================================================
for (int n=0; n<T; ++n)
{
mindist=abs(r[n]‐mns[0]);
cid=0;
for (int c=1; c<g; ++c)
if (abs(r[n]‐mns[c]) < mindist)
{
cid=c;
mindist=abs(r[n]‐mns[c]);
}
++ccntr[cid];
cssqrs[cid]=cssqrs[cid]+pow(mindist,2);
}
// Compute the estimated probabilities and standard deviations (MLEs).
//======================================================================
for (int c=0; c<g; ++c)
{
prbs[c] = ((long double) ccntr[c]/(long double) T);
stds[c] = sqrt((long double) (cssqrs[c]/ccntr[c]));
}
// Delete temporary memory allocations.
//=======================================
delete [] ccntr; ccntr=nullptr;
delete [] cssqrs; cssqrs=nullptr;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: asgnObs.cpp
/
/ Function: asgnObs()
/
/ Summary:
/
/
This function assigns each observation (which is a time point in this application) to one of the univariate mixture components for a given asset. Each asset has been fit to a univariate mixture
/
distribution containing a certain # of components. Each component can be viewed as a generator of observations for that asset, with the corresponding component probability that the observation
/
originates from any single component's density. Bayes' decision rule is used to assign each observation to a corresponding component by computing the posterior probability that each observation
/
originates from each component. The observation is then assigned to the component with the highest posterior probability. This function performs that task. The user supplies an empty array for
/
the given asset of size equal to the # of time points. Inserted into the array at each position is the component that the observation most likely originates from, and therefore is assigned to.
/
/ Inputs:
91
/
/
1.) An empty array of size T that will hold the component that the observation is assigned to. (Determined by this function.) (inAry)
/
/
2.) The total number of time points with data collected. (T)
/
/
3.) An array of size T holding the returns for the asset being processed. (r)
/
/
4.) The number of univariate components for the asset being processed. (g)
/
/
5.) The (optimal) univariate mixture distribution fit for the given asset as a 2‐dimensional array indexed as [c][s], where c = component #, and s = 0, 1, 2. Here, s=0 refers to the component's
/
probability, s=1 refers to the component's mean, and s=2 refers to the component's standard deviation. (inMDst)
/
/ Outputs:
/
/
This function populates an empty array of size T that is supplied with the component that the given observation most likely originates from. Bayes decision rule is used and the observation is
/
assigned to the component with highest posterior probability. This function returns no value at the call.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
void asgnObs(int *inAry, const int T, const long double *r, const int g, const long double **inMDst)
{
// Declare local variables.
//===========================
long double maxProb, tmpProb;
// Assign each observation per time point to the component with highest posterior probability (Bayes' rule).
//============================================================================================================
for (int t=0; t<T; ++t)
{
maxProb=‐1.00;
for (int c=0; c<g; ++c)
{
tmpProb=getPost(r[t], g, (const long double **) inMDst, c);
if (tmpProb > maxProb)
{
inAry[t]=c;
maxProb=tmpProb;
}
}
}
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: mapCells.cpp
/
/ Function: mapCells()
/
/ Summary:
/
/
A multidimensional grid is formed using the components from the univariate marginal mixture densities for all assets. If there are "a" assets with asset i having c[i] univariate mixture components,
/
for i=0,1,2,...,a‐1, then the multidimensional grid used as the basis for the multivariate density will have a total of c[0]xc[1]xc[2]x...xc[a‐1] cells. This function converts the multidimensional
/
grid to a single array/list holding all cells. Each value in this array/list represents one cell in the grid and therefore contains a set of components, one per asset. For example, the first
/
element of this list contains all assets at their first component, the 2nd element of this list contains all assets at their first component, but the final asset at it's 2nd component. The 3rd
/
element of this list contains all assets at their first component but the last asset at its 3rd component, etc...
The list is ordered as a design matrix for a full factorial experiment, from left
/
to right, with values to the right repeatedly cycling through all of their components for each set of values to the left. The function populates an empty list that is supplied. To keep track of
/
which component levels are used in any given cell, a 2nd term is added to the list making it a 2‐dimensional array indexed as [c][a], where c = unique cell # and a = asset #. That is, element
/
[0][0] would indicate the component of the first asset within the first cell of the multidimensional grid, and element [0][1] would indicate the component level for the 2nd asset within the first
/
cell of the multidimensional grid. If there are a total of 4 assets, then elements at positions [5][0], [5][1], [5][2], [5][3] would indicate the set of components for each of the 4 assets within
/
the 6th cell of the multidimensional grid. Essentially, this function converts the multidimensional grid to a list which is easier to manage and each cell in the list contains a 2nd term to
/
identify the contents of the list item (which is a single cell). Example: Suppose there are 3 assets with c[0]=2, c[1]=3, c[2]=2 components in the respective univariate mixture densities. The
92
/
multidimensional grid is formed by crossing all univariate components across assets and will contain 2x3x2=12 total cells. This grid forms the basis for building the multivariate mixture density.
/
A list of length 12 will be used to represent each cell and the components that are contained within each cell as follows:
/
/
=======
========
========
========
/
Cell ID
Asset #0
Asset #1
Asset #2
/
=======
========
========
========
/
0
0
0
0
/
1
0
0
1
/
2
0
1
0
/
3
0
1
1
/
4
0
2
0
/
5
0
2
1
/
6
1
0
0
/
7
1
0
1
/
8
1
1
0
/
9
1
1
1
/
10
1
2
0
/
11
1
2
1
/
=======
================================
/
Array Index:
[ ]
[ ]
/
/
For example, last row is defined as: inCellAry[11][0]=1, inCellAry[11][1]=2, inCellAry[11][2]=1.
/
/
Note that the list can be derived by starting with the last asset and repeatedly cycling through all component levels, then proceeding to the 2nd last asset and cycling through all component levels
/
for each set just defined, then proceeding to the 3rd last asset and cycling through all component levels for the sets defined to the right. This is the strategy used to convert the
/
multidimensional grid to a single list. This function is recursive with a single call for each asset. That call cycles through all levels of the given asset, invoking a call for the asset to the
/
right at each level. When at the final asset, no additional recursive calls are made and all levels of that asset are posted. In this manner, the function begins at asset #0, burrows inward to
/
asset #(a‐1), then expands outward back to the 1st asset. When the debug level is set to a value >= 2 all details of the mapping are printed for review, similar to the table shown above.
/
/ Inputs:
/
/
1.) The total # of cells in the multidimensional grid, which is: c[0]xc[1]xc[2]x...xc[a‐1], where there are "a" assets with asset i having c[i] components in the corresponding univariate mixture
/
density. (totCells)
/
/
2.) The number of assets in the current application. (numA)
/
/
3.) A 2‐dimensional array that is populated by this function indexed as [c][a], where c = unique cell #, and a = asset #. Here, both “c” and “a” begin at 0. The value contained is the component
/
level of asset a within unique cell c. (inCellAry)
/
/
4.) The current asset that is being processed. This function processes each asset separately and iterates over all of its component levels. At each component level the function recursively invokes
/
itself for the next asset, which similarly processes each component in order. (curAst)
/
/
5.) An array to hold the # of components for each asset in their respective univariate mixture density. This array will hold the values for c[i] as described above. (inCmps)
/
/
6.) An integer value to hold the current unique cell #. Value begins at 0 and ends at totCells‐1. After each cell is defined and written to the inCellAry[][] array this value is incremented. (cID)
/
/
7.) An array to hold the component level being processed for each asset. This function starts at the first asset (i.e., a=0) and iterates over all c[0] levels of the corresponding univariate
/
mixture. At each level, the function is invoked recursively to process the next asset (i.e., a=1). The function then iterates over all c[1] levels of the 2nd asset and recursively invokes
/
itself to process the next asset (i.e., a=2). When at the final asset a cell is completely defined and the result is appended to the list. This array is persistant and of size numA to hold the
/
current component level being processed for each asset. When at the final asset (i.e., final recursive call) the numA components held in this array defines the given unique cell. (tmpAry)
/
/ Outputs:
/
/
This function converts the multidimensional grid formed by crossing all assets and their univariate component levels to a single list where each element in the list defines one cell of the
/
multidimensional grid. It is more straightforward to navigate the grid in this manner. The list has 2 elements, first is the unique cell # and 2nd is the array of component levels that define the
/
given cell. This function is recursive (invokes itself) and returns no value at the call.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
void mapCells(const int totCells, const int numA, int **inCellAry, const int curAst, const int *inCmps, int *cID, int *tmpAry)
{
// Output cell mappings when debugging mode is on.
//==================================================
if (0 == curAst && dbug >= 2)
cout << string(14,'=') << endl << "Cell Mappings: " << endl << string(14,'=') << endl;
93
// Iterate over all components of the current asset. At each component recursively invoke this function to process the next asset.
//===================================================================================================================================
for (int i=0; i<inCmps[curAst]; ++i)
{
// Store the component level for the current asset.
//===================================================
tmpAry[curAst]=i;
// Recursive call, if not processing the final asset. If processing final asset, populate the array and increment the cell counter.
//====================================================================================================================================
if (curAst < numA‐1)
mapCells(totCells, numA, inCellAry, curAst+1, inCmps, cID, tmpAry);
else
{
if (dbug >= 2)
cout << "Cell #" << setfill('0') << setw(to_string((long long) totCells).size()) << *cID;
for (int j=0; j<numA; ++j)
{
if (dbug >= 2)
cout << ", Asset #" << j+1 << " = " << tmpAry[j];
inCellAry[*cID][j] = tmpAry[j];
}
if (dbug >= 2)
cout << endl;
*cID = *cID + 1;
}
}
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getCell.cpp
/
/ Function: getCell()
/
/ Summary:
/
/
This function accepts a set of component levels (one per asset) and returns the unique cell ID # from the multidimensional grid that contains this set. The multi‐dimensional grid contains a cell
/
for each combination of univariate mixture components across all assets. If no match is found a value of ‐1 is returned. This function iterates over the 2‐dimensional array that is supplied until
/
a match is found, then returns the cell ID # and exits. The 2‐dimensional array supplied is indexed as [c][a], where c = unique cell #, and a = asset #.
/
/ Inputs:
/
/
1.) 2‐dimensional array as [c][a], where c=unique cell #, a=asset #. Here, both "c" & "a" begin at 0. The value contained is the component level of asset "a" within unique cell "c". (inCellAry)
/
/
2.) The total # cells in the multidimensional grid: c[0]xc[1]xc[2]x...xc[a‐1], there are "a" assets with asset i having c[i] components in the corresponding univariate mixture PDF. (totCells)
/
/
3.) An array of size numA containing the set of asset component levels we are attempting to match. The unique cell # for the match is returned at the call. (cmpLvls)
/
/
4.) The number of assets in the current application. (numA)
/
/ Outputs:
/
/
This function searches for a match on a set of numA asset component levels and returns the unique cell ID #. The cell ID # ranges from 0 ‐ (totCells‐1). Return ‐1 if no match is found.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
int getCell(const int **inCellAry, const int totCells, const int *cmpLvls, const int numA)
{
// Iterate over all mapped values and find the match.
//=====================================================
94
int cntr;
for (int i=0; i<totCells; ++i)
{
cntr=0;
for (int j=0; j<numA; ++j)
if (inCellAry[i][j] == cmpLvls[j])
++cntr;
// Check for match, then return the cell position of the match.
//===============================================================
if (cntr == numA)
{
if (dbug >= 2)
cout << "Cell = " << i << endl;
return i; // Match found.
}
}
return ‐1;
// No match found.
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: solveLP.cpp
/
/ Function: solveLP()
/
/ Summary:
/
/
This function solves 2 linear programs (LPs) which become (feasible) initial solutions for maximizing the multivariate mixture distribution likelihood. The univariate mixture densities for each
/
asset have already been fit using the EM algorithm and then combined into a multi‐dimensional grid where the grid levels in each dimension are the corresponding asset/mixture component
/
combinations. This multidimensional grid forms the basis for the multivariate density function, which is also a mixture PDF. Each cell in the multivariate grid defines a unique combination of
/
assets and their components. Using Bayes' decision rule we can assign the observation for a given asset at each time point to a corresponding univariate component based on the component with
/
highest probability of membership. Using these individual component memberships we combine them and assign each multivariate observation to a single cell in the multidimensional grid. The
/
probability of an observation originating from that grid cell is then the # of observations in the given cell divided by the total # of observations (or time points). We now have an estimated
/
probability that a new observations originates from each multi‐dimensional grid cell. (Refer to this estimate as ek, applicable to cell k.) Note that each grid cell defines a multivariate density
/
function using the corresponding means and variances for the assets/components that define the cell, but at this point all covariances are undefined (i.e., zero). An important aspect of this
/
research is that we must maintain the univariate marginals that have already been fit. To accomplish this, the sum of probabilities for each cell containing a given asset/component must equal the
/
corresponding probability for that component in the univariate density. This implies that we can use linear constraints on the grid cell probabilities to maintain the marginals. Since the sum of
/
all grid cell probabilites must equal 1.00, there will be (# univariate components) ‐ 1 constraints needed to maintain the univariate marginal for each asset. (Once these constraints are enforced
/
the final (sum of probabilities) constraint for each component is automatically enforced by the fact that the sum of all probabilities equals 1.00.) This means that there will be a total of (Total
/
# of components across all assets ‐ Total # of assets + 1) constraints required to maintain the marginals. A set of linear equality constraints can be formulated in matrix notation as Ax = b. Here,
/
A is a matrix with one row holding the coefficients (0 or 1) for a single constraint and the matrix A has a column for each decision variable (i.e., single grid cell probability which is a
/
probability for the multivariate mixture density). We will refer to A as the LHS constraint matrix and b as the RHS constraint vector. The vector b will hold the component probabilities from the
/
univariate marginals, with only the first (# components) ‐ 1 needed since the probability for the final component within each asset is automatically enforced by the last row of A (i.e., final
/
constraint) that the sum of all probabilities equals 1.00. Note that the LHS constraint matrix should be of full row rank, meaning that we include the minimum # of constraints needed to enforce the
/
marginals. The rows of A must be linearly independent. (This requirement is needed for a future optimization that uses this matrix.) The cell probabilities that have been estimated using the data
/
(i.e., the ek via Bayes' decision rule, see above) will generally not satisfy the marginal constraints in Ax = b, therefore these estimates will not (in general) maintain the marginals. The purpose
/
of this function is to find cell probabilities that do maintain the marginals, and that are in some way as close as possible to the estimated probabilities. We offer 2 methods here. First, to
/
formulate the problem we assign an unknown decision variable to each unique cell in the multidimensional grid and that represents the true probability of membership in that cell. These decision
/
variables are then estimated using the following 2 LP objectives: 1.) Minimize the maximum distance between all estimated unique cell probabilties and the decision variable that represents each
/
cell, and 2.) Minimize the sum of squared distances between the decision variables and the estimated unique cell probabilities. LP #1 is a classic minimax objective of the form:
/
Min{Max[|p1‐e1|,|p2‐e2|,|p3‐e3|, ..., |pu‐eu|]}, where there are u unique cells in the multidimensional grid and pk is the decision variable (true cell probability) for cell k, and ek is the
/
corresponding estimated cell probability. The distance between the two is: |pk‐ek|. In LP #1 our objective is to select the pk, k=1,2,...,u that minimizes the maximum of these distance values such
/
that the constraints Ax = b are satisfied (i.e., the marginal densities are maintained). As written, the objective in LP #1 contains absolute values and therefore is not linear, however, it can be
/
rewritten as an equivalent linear program. For example, note that the objective can be rewritten as: Min{Max[p1‐e1,e1‐p1, p2‐e2,e2‐p2, p3‐e3,e3‐p3, ..., pu‐eu,eu‐pu]} since |pk‐ek| = pk‐ek or
/
ek‐pk, for k=1,2,...,u. The absolute values have now been removed. Next, let Z = Max[p1‐e1,e1‐p1, p2‐e2,e2‐p2, p3‐e3,e3‐p3, ..., pu‐eu,eu‐pu], then the objective becomes Min{Z}, and note that the
/
following inequalities must hold: Z >= p1‐e1, Z >= e1‐p1, Z >= p2‐e2, Z >= e2‐p2, ... Z >= pu‐eu, Z >= eu‐pu. This is because Z is the maximum of a set of values therefore it must be >= all
/
members of the set. Further, since the objective is to minimize Z, it must take one of the values that bounds it below at an optimal solution. Using the new objective and added constraints, the
/
problem is now an equivalent linear program. Lastly, it will be important to keep the multivariate density as parsimonious as possible, meaning carrying fewer unique cells into the multivariate
/
mixture density is desirable. Fewer components translates to fewer parameters and also we will run into problems when optimizing the multivariate mixture likelihood when a component is included
95
/
that generates a zero likelihood value for the set of observations at all time points. A future gradient/Hessian computation will see the component probabilities prefixed by the corresponding
/
likelihood value in the objective. If the likelihood of this multivariate component density is zero for all time points then the decision variable is effectively removed from the problem and the
/
corresponding Hessian will not be of full rank. This will be a problem when applying Newton's method, for example. To prevent components with zero likelihood from being carried merely to satisfy
/
the constraints, we will add a 2nd decision variable to each unique cell in the multidimensional grid that penalizes the objective function when a cell with zero observations is included in the LP
/
solution. This will help to guarantee that we only keep cells that contain actual data points and it prevents likelihoods from being zero at all time points. LP #2 is similar to LP #1 but the
/
objective is to minimize the sum of squared distances between the actual and estimated probabilities, subject to the marginal constraints. That is, in LP #2 the objective takes the form:
/
Min {(p1‐e1)^2 + (p2‐e2)^2 + (p3‐e3)^2 + ... + (pu‐eu)^2}. Note that each term in this sum (pk‐ek)^2, k=1,2,...,u is quadratic and concave (U‐shaped) in pk and centered at ek. Furthermore, no
/
decision variable exists in more than 1 term of the sum. This objective is known as a quadratic program that is separable, which by definition means it is not linear. It can, however, be
/
approximated arbitrarily close by a linear program. Since 0 <= pk <= 1, for k=1,2,...,u, we will define a set of decision variables to approximate each concave quadratic term in the sum over this
/
pk range. The approximation will consist of line segments that trace out the U‐shaped term. For the range 0 <= pk <= 1, we first set the number of line segments to use when tracing out the curve,
/
and this is done via the global constant dLvl defined in the header file (current value=500). Next we compute the pk values on the horizontal axis (i.e., the probability axis) that are equidistant
/
and cover the region between 0 and 1. Note that there will be dLvl+1 such points. At the current setting of 500 line segments, these points will be: 0, 1/500, 2/500, 3/500, ..., 1. They are
/
fixed once dLvl is known and they also do not change per term in the sum. That is, these points on the probability axis are used to trace out each concave term in the objective. Once these points
/
are known we can compute the function evaluated at each point. For example, considering the first term in the sum, the function evaluated at each point is: (0‐e1)^2, (1/500‐e1)^2, (2/500‐e1)^2,
/
..., (1‐e1)^2. These values are fixed and constant once dLvl is determined and the estimates ek are known, but they do change per term in the sum. If there are a total of U components then there
/
will be U*(dLvl+1) such quantities defined. (Connecting the dots of these function values will trace out the curve.) In LP #1 the decision variables were the true probabilities, for each unique
/
cell but in LP #2 the decision variables are dLvl+1 alpha values for each term in the sum that are >= 0 and sum to 1. Each such alpha variable is attached to a segment boundary on the horizontal
/
axis (i.e., 0, 1/500, 2/500, ..., 1). A probability value pk is then defined by using the 2 alpha variables that bound the pk value. For example, we can create the value (1.3)/500 by using
/
(alpha1)*(1/500) + (alpha2)*(2/500), where alpha1=0.7 and alpha2=0.3, and all other alpha values = 0.0.
That is, in general, we define pk=(alpha_k_0)*(0) + (alpha_k_1)*(1/500) +
/
(alpha_k_2)*(2/500) + (alpha_k_3)*(3/500) + ... + (alpha_k_500)*(1). Note that the alpha variables are specific to a component of the sum. Lastly, the quadratic objective component (pk‐ek)^2 is
/
estimated arbitrarily close by (alpha_k_0)*(0‐ek)^2 + (alpha_k_1)*(1/500‐ek)^2 + (alpha_k_2)*(2/500‐ek)^2 + (alpha_k_3)*(3/500‐ek)^2 + ... + (alpha_k_500)*(1‐ek)^2, where ek is the known cell
/
estimate. These constant multipliers were defined above and are stored in variables. Now, both the objective function and constraints are linear in the U*(dLvl+1) alpha decision variables. Within
/
a component, all alpha variables must sum to 1.00, that is: alpha_k_0 + alpha_k_1 + alpha_k_2 + ... + alpha_k_500 = 1.00. Once the pk are defined, we use these variables to build the constraints
/
that maintain the marginals, that is Ax = b. We now have a linear objective, with linear constraints that approximates the quadratic separable program. Linear programs can be solved fast for a
/
global solution using the simplex algorithm. Here, we use the lp_solve free library of functions to solve both LPs.
/
/ Variable Summary:
/
/
Minimax Objective:
/
==================
/
/
Total # of decision variables defined in the array vbl[]: 2*totCells + 1
/
/
vbl[0] ‐ vbl[totCells‐1] will hold the (totCells ‐ 1 ‐ 0 + 1) = totCells "probability" decision variables (pk, for k=1,2,...,u) as detailed above. These are referenced in the LP as column #'s: 1,
/
2, 3, ..., totCells.
/
/
vbl[totCells] ‐ vbl[2*totCells‐1] will hold the (2*totCells ‐ 1 ‐ totCells + 1) = totCells "feasibility factor" decision variables (fk, for k=1,2,...,u). These are referenced in the LP as column
/
#'s: totCells+1, totCells+2, totCells+3, ..., 2*totCells. One constraint is that the true cell probability (i.e., value of the decision variable) must be <= the total # of observations that fall
/
in a cell plus the cell's corresponding feasiblity factor. Thus, when a cell with zero actual observations assigned to it needs a non‐zero probability for an optimal solution this feasibility
/
factor must be set to a positive value to satisfy the constraint. In the objective we then add each of these feasibility factors multiplied by the large constant K (set in the header file). This
/
applies a penalty to the objective when a cell with no observations is included in the optimal solution, and it makes the occurence rare. As noted above we want to avoid including grid cells that
/
have a zero likelihood across all time points since it will lead to the Hessian of a future optimization being non‐singular.
/
/
vbl[2*totCells] holds the objective function decision variable. This is referenced in the LP as column #: 2*totCells+1.
/
/
Minimum Sum of Squared Distances Objective:
/
===========================================
/
/
Total # of decision variables defined in the array vbl[]: totCells*(dLvl+2)
/
/
vbl[0] ‐ vbl[dLvl] will hold the alpha values (which sum to 1.00) within the 1st unique cell (index=0) of the multidimensional grid, say, alpha_0_0, alpha_0_1, alpha_0_2, ..., alpha_0_500. The
/
corresponding optimal probability value p0 is then derived using the 2 non‐zero values combined with the corresponding 2 segment endpoints.
/
/
vbl[dlvl+1] ‐ vbl[2dLvl+1] will hold the alpha values (which sum to 1.00) within the 2nd unique cell (index=1) of the multidimensional grid, say, alpha_1_0, alpha_1_1, alpha_1_2, ...,
/
alpha_1_500. The corresponding optimal probability value p1 is then derived using the 2 non‐zero values combined with the corresponding 2 segment endpoints.
... Etc ... (cont. below)
/
/
vbl[(totCells‐1)*dlvl+(totCells‐1)] ‐ vbl[(totCells)*dLvl+(totCells‐1)] will hold the alpha values (which sum to 1.00) within the last unique cell (index=totCells‐1) of the multidimensional grid,
/
say, alpha_(totCells‐1)_0, alpha_(totCells‐1)_1, alpha_(totCells‐1)_2, ..., alpha_(totCells‐1)_500. The corresponding optimal probability value p2 is then derived using the 2 non‐zero values
/
combined with the corresponding 2 segment endpoints.
/
/
vbl[(totCells)*dLvl+totCells] ‐ vbl[(totCells)*(dLvl+2)‐1] will hold the single feasiblity factor assigned per cell. The corresponding cell probability must be <= the # observations which are
/
assigned to that cell + this variable. When there are 0 observations in a cell and it is required to be non‐zero in an optimal solution then the feasibility factor must be forced to a non‐zero
/
(positive) value. The objective function contains a term for each feasibility factor multiplied by a large constant (see, K=1000000 in the header file). This serves as a penalty on the objective
/
when a grid cell with no observations from the actual data is included in the optimal solution. We want to avoid such solutions whenever possible since it can lead to the Hessian matrix of an
/
upcoming optimization being non full rank.
96
/
/ Inputs:
/
/
1.) The total # of unique cells in the multidimensional grid formed by combining all components across the estimated univariate mixture density functions for all assets. For example, if there are a
/
total of 4 assets being considered and the univariate mixture densities have 2, 3, 4, 2 levels, respectively, the complete multidimensional grid will have 2x3x4x2 = 48 unique cells. This
/
function provides 2 methods for determining which cells are important and needed in the multivariate mixture density. (totCells)
/
/
2.) The total number of assets being considered in the problem. (numA)
/
/
3.) A double array indexed as [c][a], with "c" being a unique cell ID (values are from 0 ‐ totCells‐1), and "a" being an asset ID (values are from 0 ‐ numA‐1). The value held at this position is
/
the univariate mixture component level for asset "a" within unique cell "c". Recall that the multidimensional grid is formed by crossing all assets/components with all other assets/components.
/
(Here component refers back the the univariate mixture density for the asset.) (inCellAry)
/
/
4.) An array of size numA holding the # of univariate mixture components for each asset. Index "a" of this array will return the number of components that were needed to fit the univariate mixture
/
for component "a". (Range is a=0 to numA‐1.) (cmps)
/
/
5.) A double array indexed as [a][g], with "a" being an asset ID (from 0 ‐ numA‐1), and "g" being a component ID for asset "a" ("g" ranges from 0 ‐ cmps[a]‐1). The corresponding univariate mixture
/
component probability is stored at the indexed position. (prbs)
/
/
6.) An array of size totCells that holds the number of observations (i.e., time points) that are assigned to the given unique cell of the multidimensional grid. Observations are assigned to
/
specific components of an asset using Bayes' decision rule, that is they are assigned to the component with highest probability of membership. Once a time point has been processed, it is
/
assigned to a component for each asset and this defines the cell of the multidimensional grid that it is assigned to. For example, nCellObs[4] = 11 implies that there are 11 observations which
/
fall into unique cell ID #4. (nCellObs)
/
/
7.) An array of estimated cell probabilities, ek, k=1,2,...,totCells. These are derived as nCellObs[c]/T and drive both LP optimizations. (cellProb)
/
/
8.) An empty array of true probabilities estimated by the 2 LPs and populated by this function. This array will be of size totCells. (outPrbs)
/
/
9.) The type of LP to use for a given function call, where 0 = Minimax objective, 1 = Minimum Sum of Squared Distances (SSD) objective. (type)
/
/ Outputs:
/
/
This function counts the number of non‐zero probabilities in the array outPrbs and returns this value at the call. This function also populates the empty array outPrbs with the estimated true
/
probability for each unique cell which is "close" to the estimated ek values (using Bayes' decision rule), but that satisfies the marginal constraints.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
int solveLP(const int totCells, const int numA, const int **inCellAry, const int *cmps, const long double **prbs, const int *nCellObs, const long double *cellProb, double *outPrbs, const int type)
{
// Initialize local variables. (Variable dVars=total # of decision variables for the given LP and it depends on type.)
//=======================================================================================================================
lprec *lp=NULL;
int dVars=(int) (2*totCells+1)*(0==type) + (totCells*(dLvl+2))*(1==type), *vnum=new int [dVars], j, non0cmps=0;
double *vbl=new double [dVars], objval, *epnt=new double [dLvl+1], *fpnt=new double [dVars‐totCells];
string strlabel;
char **vlabels=new char *[dVars];
// Build LP model to derive the joint density with zero covariances.
//====================================================================
lp = make_lp(0,dVars);
if (lp == NULL)
{
cout << "ERROR: LP Model did not build. Something is wrong with the lp_solve setup (type=" << type << ")." << endl << "EXITING...solveLP()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
// Add labels to the decision variables. Include the cell index and asset/component values for minimax objective. Include the cell index and alpha index for minimum squared distance objective.
//==================================================================================================================================================================================================
if (0 == type)
// Minimax objective.
{
for (int c=0; c<totCells; ++c)
{
strlabel="Cell_" + to_string((long long) c) + "_";
for (int a=0; a<numA; ++a)
{
strlabel=strlabel + "A" + to_string((long long) a+1) + "C" + to_string((long long) inCellAry[c][a]+1);
if (a < (numA‐1))
97
strlabel=strlabel + "_";
}
vlabels[c]=new char [strlabel.size()+1];
strcpy_s(vlabels[c], strlabel.size()+1, strlabel.c_str());
set_col_name(lp, c+1, vlabels[c]);
// Now label the corresponding feasibility factor. The decision variables come in (probability, feasibility factor) pairs.
//===========================================================================================================================
strlabel="F_" + strlabel;
vlabels[totCells+c]=new char [strlabel.size()+1];
strcpy_s(vlabels[totCells+c], strlabel.size()+1, strlabel.c_str());
set_col_name(lp, totCells+c+1, vlabels[totCells+c]);
}
strlabel="Z";
vlabels[dVars‐1]=new char [strlabel.size()+1];
strcpy_s(vlabels[dVars‐1], strlabel.size()+1, strlabel.c_str());
set_col_name(lp, (int) dVars, vlabels[dVars‐1]);
}
else if (1 == type)
// Sum of squared distances objective.
for (int c=0; c<totCells; ++c)
{
for (int s=0; s<=dLvl; ++s)
{
// Build array of constants for the piecewise linear function endpoints. There are dLvl segments, therefore dLvl+1 endpoints and these
// do not change by cell. Build an array of corresponding function endpoints, which do change by cell since the est. prob changes.
//======================================================================================================================================
if (0 == c)
epnt[s]=(double) (s*(1.00/dLvl));
fpnt[c*(dLvl+1)+s]=pow((epnt[s] ‐ (double) cellProb[c]),2);
// Labels for alpha decision‐variables using minimum squared distance objective.
//================================================================================
strlabel="Cell_" + to_string((long long) c) + "_Alpha_" + to_string((long long) s);
vlabels[c*(dLvl+1)+s]=new char [strlabel.size()+1];
strcpy_s(vlabels[c*(dLvl+1)+s], strlabel.size()+1, strlabel.c_str());
set_col_name(lp, c*(dLvl+1)+s+1, vlabels[c*(dLvl+1)+s]);
}
// Label feasibility factor decision‐variables using minimum squared distance objective.
//========================================================================================
strlabel="F_Cell_" + to_string((long long) c) + "_";
for (int a=0; a<numA; ++a)
{
strlabel=strlabel + "A" + to_string((long long) a+1) + "C" + to_string((long long) inCellAry[c][a]+1);
if (a < (numA‐1))
strlabel=strlabel + "_";
}
vlabels[totCells*(dLvl+1) + c]=new char [strlabel.size()+1];
strcpy_s(vlabels[totCells*(dLvl+1) + c], strlabel.size()+1, strlabel.c_str());
set_col_name(lp, totCells*(dLvl+1) + (c+1), vlabels[totCells*(dLvl+1) + c]);
}
// Add marginal constraints on the cell probabilities. Sum of all probabilities attached to an Asset/Component must equal that Asset/Component probability. For each asset with G components, once the
// first G‐1 constraints have been satisfied the G‐th constraint is set since probabilities sum to 1.00. We have not added the sum to 1.00 constraint thus will keep all G for each component.
//=====================================================================================================================================================================================================
set_add_rowmode(lp, TRUE);
for (int a=0; a<numA; ++a)
for (int g=0; g<cmps[a]; ++g)
{
j=0;
for (int c=0; c<totCells; ++c)
if (inCellAry[c][a] == g)
{
if (0 == type)
// Minimax objective.
{
98
vnum[j]=c+1;
vbl[j++]=1.00;
}
else if (1 == type)
// Sum of squared distances objective.
for (int s=0; s<=dLvl; ++s)
{
vnum[j]=(c*(dLvl+1)+s)+1;
vbl[j++]=epnt[s];
}
}
if (!add_constraintex(lp, j, vbl, vnum, EQ, (double) prbs[a][g]))
{
cout << "ERROR: [LP Issue] Marginal probability constraint for Asset=" << a << "/Component=" << g << " failed to load (type=" << type << ")." << endl
<< "EXITING...solveLP()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
}
// Add feasibility constraints on the cell probabilities when using a minimax or minimum squared distance objective. When an individual cell has zero observations assigned to it, force the cell
// probability to zero (relax if there is no feasible solution).
//=================================================================================================================================================================================================
for (int c=0; c<(int) totCells; ++c)
{
j=0;
if (0 == type)
{
vnum[j]=c+1; vbl[j++]=1.00;
vnum[j]=totCells+c+1; vbl[j++]=‐1.00;
}
else if (1 == type)
{
for (int s=0; s<=dLvl; ++s)
{
vnum[j]=c*(dLvl+1)+s+1;
vbl[j++]=epnt[s];
}
vnum[j]=totCells*(dLvl+1) + (c+1);
vbl[j++]=‐1.00;
}
if (!add_constraintex(lp, j, vbl, vnum, LE, (double) nCellObs[c]))
{
cout << "ERROR: [LP Issue] Feasibility factor constraint for Cell=" << c << " failed to load (type=" << type << ")." << endl << "EXITING...solveLP()..." << endl; cin.get();
exit (EXIT_FAILURE);
}
}
// Add inequality constraints on the minimax objective function. Objective is transformed into an LP using appropriate inequality constraints.
//===============================================================================================================================================
if (0 == type)
for (int c=0; c<(int) totCells; ++c)
{
// First absolute value constraint for the objective function pertaining to this cell probability.
//==================================================================================================
j=0;
vnum[j]=(int) dVars; vbl[j++]=1.00;
vnum[j]=c+1; vbl[j++]=‐1.00;
if (!add_constraintex(lp, j, vbl, vnum, GE, ‐1.00*cellProb[c]))
{
cout << "ERROR: [LP Issue] Minimax objective function absolute value constraint (#1) for Cell=" << c << " failed to load." << endl << "EXITING...solveLP()..." << endl; cin.get();
exit (EXIT_FAILURE);
}
// Second absolute value constraint for the objective function pertaining to this cell probability.
//===================================================================================================
j=0;
99
vnum[j]=(int) dVars; vbl[j++]=1.00;
vnum[j]=c+1; vbl[j++]=1.00;
if (!add_constraintex(lp, j, vbl, vnum, GE, cellProb[c]))
{
cout << "ERROR: [LP Issue] Minimax objective function absolute value constraint (#2) for Cell=" << c << " failed to load." << endl << "EXITING...solveLP()..." << endl; cin.get();
exit (EXIT_FAILURE);
}
}
// The sum of squared distances objective requires a constraint that the decision variables sum to 1 within each cell.
//======================================================================================================================
if (1 == type)
for (int c=0; c<(int) totCells; ++c)
{
j=0;
for (int s=0; s<=dLvl; ++s)
{
vnum[j]=(c*(dLvl+1)+s)+1;
vbl[j++]=1.00;
}
if (!add_constraintex(lp, j, vbl, vnum, EQ, 1.00))
{
cout << "ERROR: [LP Issue] Sum of squared distances constraint that sum of " << dLvl+1 << " decision variables = 1.00 within Cell=" << c << "failed to load."
<< endl << "EXITING...solveLP()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
}
// Add minimization objective. Output the entire LP formulation when requested.
//================================================================================
set_add_rowmode(lp, FALSE);
j=0;
if (0 == type)
// Minimax objective.
{
vnum[j]=(int) dVars; vbl[j++]=1.00;
for (int c=0; c<totCells; ++c)
{
vnum[j]=totCells+c+1;
vbl[j++]=K;
}
}
else if (1 == type)
// Sum of squared distances objective.
for (int c=0; c<totCells; ++c)
{
for (int s=0; s<=dLvl; ++s)
{
vnum[j]=c*(dLvl+1)+s+1;
vbl[j++]=fpnt[c*(dLvl+1)+s];
}
vnum[j]=totCells*(dLvl+1) + (c+1);
vbl[j++]=K;
}
if (!set_obj_fnex(lp, j, vbl, vnum))
{
cout << "ERROR: [LP Issue] Objective failed to load. (Type=" << type << ")." << endl << "EXITING...solveLP()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
set_minim(lp);
if (dbug >= 2)
{
// Note: Uncomment to write out full LP details when debugging. (Note: Output can be large.)
//==============================================================================================
/* cout << string(11,'=') << endl << "LP Details:" << endl << string(11,'=') << endl;
write_LP(lp, stdout); */
}
100
// Solve the LP and retrieve the results.
//=========================================
set_verbose(lp, IMPORTANT);
if (solve(lp) != OPTIMAL)
{
cout << "ERROR: [LP Issue] No solution found, something has gone wrong.
}
(Type=" << type << ")." << endl << "EXITING...solveLP()..." << endl; cin.get(); exit (EXIT_FAILURE);
// Get the objective function value as well as the value of the unknown probabilities that define the multivariate density. (Output the values.)
//=================================================================================================================================================
objval=get_objective(lp);
get_variables(lp, vbl);
// Compute the probabilities. For Minimax these are the values from the first (Total # Cells) decision variables. For Min SSD objective, these are the weighted sum of the dLvl+1 decision variables.
//=====================================================================================================================================================================================================
for (int c=0; c<totCells; ++c)
{
if (0 == type)
outPrbs[c] = vbl[c];
else if (1 == type)
{
outPrbs[c] = 0.00;
for (int s=0; s<=dLvl; ++s)
outPrbs[c] = outPrbs[c] + vbl[c*(dLvl+1)+s]*epnt[s];
}
}
// Write out the LP estimated probabilities along with the empirical values and corresponding distance between the estimated probabilities LP solution probabilities when debugging is requested.
//=================================================================================================================================================================================================
if (dbug >= 2)
{
// Add correct labels if using sum of squared distances objective.
//==================================================================
if (1 == type )
for (int c=0; c<totCells; ++c)
{
strlabel="Cell_" + to_string((long long) c) + "_";
for (int a=0; a<numA; ++a)
{
strlabel=strlabel + "A" + to_string((long long) a+1) + "C" + to_string((long long) inCellAry[c][a]+1);
if (a < (numA‐1))
strlabel=strlabel + "_";
}
vlabels[c]=new char [strlabel.size()+1];
strcpy_s(vlabels[c], strlabel.size()+1, strlabel.c_str());
set_col_name(lp, c+1, vlabels[c]);
}
// Output the estimated probabilities along with the actual and absolute distance between the values.
//=====================================================================================================
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(20);
cout << endl << "Objective function (Type=" << type << ") value = " << objval << endl;
cout << "LP Solution:" << endl << endl;
for (int c=0; c<totCells; ++c)
cout << get_col_name(lp, c+1) << " = " << outPrbs[c] << " vs. (actual) " << cellProb[c] << " and abs(diff) = " << abs(outPrbs[c]‐cellProb[c]) << endl;
if (0 == type)
for (int c=totCells; c<(int) 2*totCells+1; ++c)
cout << get_col_name(lp, c+1) << " = " << vbl[c] << endl;
else if (1 == type)
for (int c=totCells*(dLvl+1); c<totCells*(dLvl+2); ++c)
cout << get_col_name(lp, c+1) << " = " << vbl[c] << endl;
}
// Issue a warning if a cell with zero observations is assigned a non‐zero probability.
//=======================================================================================
101
for (int c=0; c<totCells; ++c)
if (cellProb[c] <= 0.00 && outPrbs[c] > 0.00)
cout << endl << "WARNING: [LP Issue] Unique Cell # " << c << " has no observations but is assigned a non‐zero probability. (Type=" << type << ")." << endl
<< "
The danger is that the likelihood function using this cell density could be zero at all time points. If it occurs then the stage 2" << endl
<< "
optimization will eliminate this decision variable (i.e., the unique cell probability) in the objective function (of the 1st Step)" << endl
<< "
causing the corresponding Hessian to be singular because the upper left block is singular (it is a border matrix). A solution is" << endl
<< "
to change the forward‐backward alphas so that a simpler solution is used as there may be too many unique cells. Also, the variance" << endl
<< "
ratio constraint may be too large resulting in spurious solutions being combined across assets resulting in cells with no obs." << endl << endl;
// Free the memory allocated for the LP and the labels array.
//=============================================================
delete_lp(lp);
delete [] vnum; vnum=nullptr;
delete [] vbl; vbl=nullptr;
delete [] epnt; epnt=nullptr;
delete [] fpnt; fpnt=nullptr;
for (int c=0; c<dVars; ++c)
{
delete [] vlabels[c]; vlabels[c]=nullptr;
}
delete [] vlabels; vlabels=nullptr;
// Count the # of non‐zero cell probability decision variables. This is the # of components in the multivariate density and is returned by this function.
//==========================================================================================================================================================
for (int c=0; c<totCells; ++c)
if (outPrbs[c] > 0.00)
non0cmps++;
return non0cmps;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getCMtrx.cpp
/
/ Function: getCMtrx()
/
/ Summary:
/
/
This function ensures that the constraint matrix used to maintain the marginal mixture densities is of full row rank using only the non‐zero component probabilities from the given LP solution. A
/
full row rank component matrix is required for a future optimization. The marginal probability densities are maintained via a set of linear constraints on the multidimensional grid cell
/
probabilities. Since the sum of all probabilities must equal 1.00, each asset will require: (# univariate mixture components for that asset) ‐ 1 constraints to maintain the marginals. Note that
/
the constraint on the last univariate component for each asset will be automatically satisfied by the final constraint that the sum of all cell probabilities equals 1.00. If there are "a" assets,
/
and C[i] components for asset i in the univariate mixture density, i=1,2,...,a, then there will be: (C[0]‐1) + (C[1]‐1) + (C[2]‐1) + ... + (C[a‐1]‐1) + 1 = C[0] + C[1] + C[2] + ... + C[a‐1] ‐ a + 1
/
total rows in the original constraint matrix used to solve the LPs. The constraints can be written in matrix form as Ax = b, where the vector b contains the corresponding probabilities for each row
/
of A, and x is a vector that holds the unique cell probabilities (i.e., decision variables) for the multidimensional grid. Before the LP has been solved rows(A) <= elements(x), since elements(x) =
/
C[0]xC[1]xC[2]x...xC[a‐1]. Therefore, the matrix A will be of full row rank. After each LP has been fit many elements of x will be zero. The effective constraint matrix that applies to the LP
/
solution will be the constraint matrix A with all columns that correspond to zeros of the vector x removed. This effective constraint matrix is not necessarily of full row rank after the LP has
/
been solved. Consider for example the case of 2 assets with 3 components in their corresponding univariate mixture densities. In this scenario, the multidimensional grid is 3x3. Suppose the
/
optimal LP solution contains non‐zero probabilities on the diagonal of this grid and zeros in all off‐diagonal positions. The matrix A will have (3‐1)+(3‐1)+1 = 5 rows initially, however, after the
/
LP has been fit only 3 decision variables (i.e., columns of A) remain. Therefore, the effective constraint matrix A will be of dimension 5x3, and not of full row rank. That is, not all 5 rows of A
/
are needed to enforce the marginal constraints given the current LP solution and 2 rows may be dropped. This function determines the rows that can be dropped and removes them from A producing a
/
full row rank effective constraint matrix, which is needed for an upcoming optimization. To promote parsimony in the fitted multivariate mixture density, components with zero probabilities are
/
always permanantly eliminated at any point in any optimization. Once dropped, a component is not permitted to return to the multivariate density.
/
/ Inputs:
/
/
1.) The number of rows in the original constraint matrix A before solving the LP (either Minimax or Minimum Sum of Squared Distances (SSD)). (totrows)
/
/
2.) The number of non‐zero probabilities (i.e., decision variables) after solving the LP (either Minimax or Minimum Sum of Squared Distances (SSD)). (nUCmps)
/
102
/
3.) Type of LP objective, 0=Minimax or 1=Minimum Sum of Squared Distances (SSD). (type)
/
/
4.) The total number of assets under consideration. (numA)
/
/
5.) Array to hold the optimal/chosen # of univariate mixture components for each asset. (nCmps)
/
/
6.) Array of unique cell IDs for the multidimensional grid w/non‐0 probs in the LP solution, i.e., cells that are used to structure the initial multivariate mixture PDF (w/out covariances). (vCIDs)
/
/
7.) A double array indexed as [c][a], with "c" being a unique cell ID (values are from 0 ‐ totCells‐1), and "a" being an asset ID (values are from 0 ‐ numA‐1). The value held at this position is
/
the univariate mixture component level for asset "a" within unique cell "c". Recall that the multidimensional grid is formed by crossing all univariate assets/components with all other
/
univariate assets/components. (Here component refers back the univariate mixture density for the asset.) (inCellAry)
/
/
8.) A double array indexed as [a][r], with "a" being the asset indicator (values 0 thru numA‐1), and "r" being the component of the optimal univariate mixture distribution for that asset (values 0
/
thru nCmps[a]‐1). The corresponding univariate mixture component probability is held by the array. Note that these probabilities are used to construct all but the last element of the vector b,
/
where the marginals are maintained via: Ax = b. (prbs)
/
/
9.) An empty matrix to hold the full row rank version of A for the given LP solution. This function derives and returns the corresponding matrix. (inLHS)
/
/
10.) An empty vector to hold the corresponding probabilities for the new full row rank version of A. This is the b vector and it is derived here as the original b vector without the corresponding
/
rows that were dropped from A to make it full row rank. (inRHS)
/
/ Outputs:
/
/
This function returns no value at the call, but it derives and populates the empty LHS matrix and RHS vector for the full row rank version of the constraint set that maintains the marginals. The
/
constraints are linear of the form Ax = b.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
void getCMtrx(const int totrows, const int nUCmps, const int type, const int numA, const int *nCmps, const int *vCIDs, const int **inCellAry, const long double **prbs, Eigen::MatrixXd *inLHS,
Eigen::VectorXd *inRHS)
{
// Declare/initialize local variables.
//======================================
int rnk, trnk, *remrows=nullptr, rr, kr, rw;
Eigen::MatrixXd oLHS(totrows,nUCmps);
Eigen::VectorXd oRHS(totrows), tVec(nUCmps);
// Build modified constraint matrix that applies to the LP solution.
//====================================================================
rw=0;
for (int a=0; a<numA; ++a)
for (int r=0; r<(nCmps[a]‐1); ++r)
{
for (int c=0; c<nUCmps; ++c)
oLHS(rw,c) = (int) (inCellAry[vCIDs[c]][a] == r);
oRHS(rw++) = prbs[a][r];
}
for (int c=0; c<nUCmps; ++c)
oLHS(rw,c) = 1;
oRHS(rw) = 1.00;
// Rank of constraint matrix with non‐basic and zero‐basic columns removed.
//===========================================================================
rnk = (int) Eigen::FullPivLU<Eigen::MatrixXd>(oLHS).rank();
// Full row rank modified constraint matrix must have # rows equal to its rank.
//===============================================================================
inLHS[type] = Eigen::MatrixXd(rnk,nUCmps);
inRHS[type] = Eigen::VectorXd(rnk);
// If the constraint matrix is not of full row rank, identify (totrows ‐ rnk) rows that can be removed from the constraint matrix to make it full row rank.
//===========================================================================================================================================================
if (rnk < totrows)
{
rr=0;
remrows = new int [totrows‐rnk];
103
for (int r=0; r<totrows; ++r)
{
// Store the values at this row and then set the row to all zeros.
//==================================================================
for (int c=0; c<nUCmps; ++c)
{
tVec[c]=oLHS(r,c);
oLHS(r,c)=0.00;
}
// Recheck the rank. If it changes replace the row with its original values. Otherwise, leave it as all zeros and store the row # that can be dropped.
//========================================================================================================================================================
trnk = (int) Eigen::FullPivLU<Eigen::MatrixXd>(oLHS).rank();
if (trnk < rnk)
for (int c=0; c<nUCmps; ++c)
oLHS(r,c)=tVec(c);
else
remrows[rr++]=r;
}
}
// Populate the full row rank modified constraint matrix.
//=========================================================
rw=0;
for (int r=0; r<totrows; ++r)
{
kr=1;
for (int k=0; k<(totrows‐rnk); ++k)
if (r == remrows[k])
kr=0;
if (1 == kr)
{
for (int c=0; c<nUCmps; ++c)
{
inLHS[type](rw,c)=oLHS(r,c);
inRHS[type](rw)=oRHS(r);
}
rw++;
}
}
// Print out the modified constraint matrix when debugging is on.
//=================================================================
if (dbug >= 2)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(0);
cout << endl << "Modified Full Row‐Rank LHS Constraint Matrix: " << endl << inLHS[type] << endl;
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(10);
cout << endl << "Modified RHS Constraint Vector: " << endl << inRHS[type] << endl;
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(0);
int chkrnk; chkrnk = (int) Eigen::FullPivLU<Eigen::MatrixXd>(inLHS[type]).rank();
cout << endl << "The rank of this modified constraint matrix is: " << chkrnk << endl;
}
// Free up temporary memory allocations.
//========================================
delete [] remrows; remrows=nullptr;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
104
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
PARTICULAR PURPOSE.
See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
Filename:
ECMEAlg.cpp
Function:
ECMEAlg()
Summary:
An extension of the ECME algorithm (Liu & Rubin, 1994) is implemented by this function. The multivariate mixture likelihood is optimized with respect to the mixing proportions and the covariances.
The means and variances are held fixed to maintain the mixture marginals. The 1st Step optimization is convex in the mixing proportions and constrained to maintain the mixture marginals. The
corresponding Lagrangian is formed (1st Step optimization) and its zeros are determined iteratively using Newton's method. The resulting mixture proportions are unique global optimizers of the 1st
Step likelihood (all other parameters are fixed at this stage). Once 1st Step convergence is achieved, processing is passed to the 2nd Step where the likelihoood is maximized with respect to only the
covariances. This optimization is constrained by the positive‐definiteness of the corresponding estimated VC matrices (there is 1 VC matrix per multivariate density component). It is also non‐
convex as there may be multiple local optimums of the likelihood function with only the covariances unknown, and the positive‐definite constraint is not convex. The goal of the 2nd Step is to find
the largest local optimum given that the means, variances, and mixing proportions are fixed and only the covariances are unknown. We will attempt to climb to the top of the current hill (local
optimum) using both the gradient and Hessian while also searching for larger hills in the general direction of steepest ascent (see Marquardt, 1963). This is considered a compromise between
strictly applying Newton's Method and Gradient Ascent and is useful when a single‐step Newton's Method overshoots or a single step lands in an infeasible region. Once no further progress is made
during the 2nd Step, we return to the 1st Step with the newly estimated covariances and repeat the optimization over the mixing proportions. Convergence is achieved when the 2nd Step fails to improve
the likelihood function returned from the 1st Step. Both the 1st and 2nd Steps are iterative with the corresponding gradients and Hessians updated repeatedly during a single corresponding iteration
of the extended ECME algorithm. Solutions found here will not be considered spurious, which differs from the search for a solution when dealing with univariate mixtures. This is due to the fact
that the variances have already been fixed and do not change. The corresponding variance ratio constraint specified by the user remains in force. We can justify this approach by noting that
commercial software packages such as SAS (R) use a line‐search based quasi‐Newton algorithm to find the MLE for a univariate mixture density (instead of the EM algorithm). We have not proven that
the extended ECME method used here will guarantee convergence to the largest local optimum, only that we have located the nearest local optimum in the vicinity of the informed start.
Important Note: The 1st Step imposes equality constraints that maintain the mixture marginals. Greater‐than‐zero constraints on the mixing proportions (i.e., probabilities) are not explicitly
imposed, therefore negative probabilities may maximize the 1st Step likelihood function. The 1st Step likelihood function treats the mixing probabilities as unknowns and all other parameters (means,
variances, covariances) as known constants. Any components that require a negative probability to maximize the likelihood function are dropped during the 1st Step and the entire problem is resized
accordingly (fewer components). This may result in a likelihood that decreases, however the overall objective is to balance parsimony with maximizing the likelihood function.
Inputs:
1.) The total number of time points with data collected. (T)
2.) The double array of returns for each asset and at each time point, indexed as r[a][t].
3.) The number of assets with returns collected. (numA)
4.) The number of unique components in the multivariate mixture that results from either the Minimax or Minimum SSD LP optimizations. Each multivariate mixture has fixed means and variances and
this function will optimize the mixing probabilities and covariance terms. All covariance terms begin the optimization at zero. (nUCmps)
5.) The LHS matrix required to enforce the constraint that the marginal density for each asset equals its fixed univariate mixture. This matrix is built during the LP optimization and resized there
accordingly to ensure it is of full row rank. The LHS matrix has a column for each component in the multivariate density. (cMtrx)
6.) The RHS vector required to enforce the constraint that the marginal density for each asset equals its fixed univariate mixture. This vector is built during the LP optimization and contains the
marginal mixture component probabilities for each asset (less the last probability for each asset, which is fixed once all others have been fixed for that asset). (cVctr)
7.) The array of multivariate mixture probabilities returned from the corresponding LP optimization (either Minimax of Minimum SSD).
converted to a vector within this program as other functions require the values to be stored in a vector. (muPrbs)
Note that these probabilities are passed as an array but
8.) The array of mean vectors. Each component of the multivariate mixture density is a multivariate density function which has its own set of means. The first element of this array is the vector
of means for the first multivariate component, etc... All means supplied to this function are fixed and do not change which is required to maintain the marginals, with the exception that
components may be dropped. When a component is dropped the corresponding mean vector for that component is dropped. (muMns)
9.) The array of VC matrices. Each component in the multivariate mixture density is a multivariate density function with a corresponding VC matrix. Each VC matrix is of dimension (numA)x(numA).
The diagonals of each VC matrix are the corresponding variances for that asset within that component. All variances supplied to this function and are fixed and do not change which is required
to maintain the marginals, with the exception that components may be dropped. When a component is dropped the corresponding VC matrix for that component is dropped. (muVCs)
10.) The array of unique cell IDs that link each component of the multivariate density back to the full factorial of components. The full factorial of components represents each cell in the
multidimensional grid formed by considering all combinations of assets and their levels. Note that the full factorial would be required to build a multivariate mixture density with given
marginals under the assumption that the assets were all mutually independent random variables. (uCellIDs)
11.) A string to hold the directory where the output file resides.
(rdir)
Outputs:
105
/
This function updates the arrays of multivariate mixture probabilities (muPrbs), mean vectors (muMns), and VC matrices (muVCs). Note that muMns is updated only when components are dropped, and
/
muVCs is updated when components are dropped and when covariances are estimated. This function returns the total number of unique multivariate mixture components in the final density.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
int ECMEAlg(const int T, const long double **r, const int numA, const int nUCmps, const Eigen::MatrixXd cMtrx, const Eigen::VectorXd cVctr, long double *muPrbs, Eigen::VectorXd *muMns, Eigen::MatrixXd
*muVCs, int *uCellIDs, const string rdir)
{
// Local variables.
//===================
long long mHessMag;
int uCmps=nUCmps, ecnvg, mcnvg, cnvg, n0vals, nLMs=(int) cVctr.size(), ld=uCmps+nLMs, itr, nCovs, nCores=(int) boost::thread::hardware_concurrency(), nUpdts, nThrds=(int) nCorMult*nCores,
**sHess1=new int *[nThrds], ecmeItr=1, eItrs, mItrs, sumval, n_beats=min(nBeats,nThrds), *beat=new int [n_beats], mtch, npos;
long double **fVals=new long double *[T], *dnom=new long double [T], picst=exp(((double) (numA/2.00))*log(2.00*pi)), *sqdets=new long double [uCmps], LL, curmlt, oldLL, **sHess2=new long double
*[nThrds], *maxHLL=new long double [n_beats], eLL, mLL, lBound, sumLL, uval, max1, max2, cnum;
Eigen::VectorXd *gradE=new Eigen::VectorXd [1], *dvarsE=new Eigen::VectorXd [2], *rts=new Eigen::VectorXd [T], *RHS=new Eigen::VectorXd [1], *tmpCVctr=new Eigen::VectorXd [1], *tmpDv=new
Eigen::VectorXd [1], *gradM=new Eigen::VectorXd [1], *dvarsM=new Eigen::VectorXd [4], **tmpDvarsM=new Eigen::VectorXd *[nThrds];
Eigen::MatrixXd *hessE=new Eigen::MatrixXd [1], *VCMInv=new Eigen::MatrixXd [nUCmps], *LHS=new Eigen::MatrixXd [1], *tmpCMtrx=new Eigen::MatrixXd [1], *hessM=new Eigen::MatrixXd [1], *A=new
Eigen::MatrixXd [(int) numA*(numA‐1)/2], *p1Opt=new Eigen::MatrixXd [1], *P=new Eigen::MatrixXd [1], *Pinv=new Eigen::MatrixXd [1];
string lblvar, ndef;
boost::thread *t1=new boost::thread[nThrds];
random_device rd; default_random_engine gen(rd());
uniform_real_distribution<long double> udist(0.0,1.0);
Eigen::EigenSolver<Eigen::MatrixXd> egnslvr, normslvr, normslvrt;
ofstream fout;
// Populate an array of vectors with the returns at each time point indexed as [t][a] to ease computations.
//===========================================================================================================
for (int t=0; t<T; ++t)
{
fVals[t] = new long double [nUCmps];
rts[t]=Eigen::VectorXd(numA);
for (int a=0; a<numA; ++a)
rts[t](a)=r[a][t];
}
// Derive VC inverses and corresponding determinants.
//=====================================================
for (int v=0; v<uCmps; ++v)
{
VCMInv[v]=Eigen::MatrixXd(numA,numA);
VCMInv[v]=muVCs[v].inverse();
sqdets[v]=sqrt(VCMInv[v].determinant());
}
// Populate the covariance identifier matrices for use in the 2nd Step.
//======================================================================
itr=0;
for (int a1=0; a1<numA; ++a1)
for (int a2=a1+1; a2<numA; ++a2)
{
A[itr]=Eigen::MatrixXd(numA,numA);
for (int r=0; r<numA; ++r)
for (int c=0; c<numA; ++c)
{
if (r==a1 && c==a2 || r==a2 && c==a1)
A[itr](r,c)=1.0;
else
A[itr](r,c)=0.0;
}
itr++;
}
// Initialize decision variables for 1st step. Probabilities will be set to their values as determined by solving the corresponding LP and the Lagrange multipliers will be initialized to zeros.
//================================================================================================================================================================================================
for (int i=0; i<2; ++i)
106
dvarsE[i]=Eigen::VectorXd(ld);
for (int d=0; d<uCmps; ++d)
dvarsE[0](d)=muPrbs[d];
for (int d=uCmps; d<ld; ++d)
dvarsE[0](d)=0.00;
// Populate a double array with the likelihood values for each timepoint and component. The multivariate likelihood of each observation is also stored in an array (dnom[]).
// Any component with zero likelihood for all time points is a variable that does not exist in the objective function. It should be treated as a constant and moved to the right
// hand side of each constraint and the problem needs to be resized accordingly. This check is made via the function call chkSum() below.
//=================================================================================================================================================================================
LL=getLFVals(T,numA,uCmps,rts,dvarsE[0],muMns,VCMInv,sqdets,picst,dnom,fVals);
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(15); cout << "Initial Log‐Likelihood value is: " << LL << endl << endl;
chkSum(T,uCmps,(const long double **) fVals);
// Build the corresponding Hessian (of the Lagrangian). The matrix is stored in hessE[0](.,.). When building the Hessian, iterate until it is invertible by multiplying the constraint LHS and RHS by
// a constant value (multiple of 10) until full rank. (Note: A matrix with large and small eigenvalues may be ill‐conditioned and there may be computational issues when attempting to invert it.)
//=====================================================================================================================================================================================================
hessE[0]=Eigen::MatrixXd(ld,ld);
curmlt=getHessE(T,uCmps,(const long double **) fVals,dnom,cMtrx,cVctr,hessE,LHS,RHS);
// Build the gradient (of the Lagrangian) (using the modifed constraint matrix/vector as required above).
//=========================================================================================================
gradE[0]=Eigen::VectorXd(ld);
getGradE(T,uCmps,(const long double **) fVals,dnom,LHS[0],RHS[0],dvarsE[0],gradE);
// Initialize arrays used and reused during the 2nd Step.
//========================================================
for (int h=0; h<nThrds; ++h)
{
sHess1[h]=new int [8];
sHess2[h]=new long double [7];
tmpDvarsM[h]=new Eigen::VectorXd [4];
}
// Iterate using the ECME algorithm until convergence.
// Iterate and update the probabilities (the 1st Step is a maximization problem with concave objective and convex constraints). Stationary points for the Lagrangian will therefore be taken as global
// optimizers and these are determined using Newton's method. (The Hessian here is a bordered matrix which is invertible under certain met conditions on the non‐zero sections.) The 2nd Step is a
// constrained maximization problem having multiple local optimums. We attempt to find the largest local optimum using an iterative technique that steps in the general direction of steepest ascent.
//=====================================================================================================================================================================================================
cnvg=0;
do
{
//==================
// (ECME) 1st STEP:
//==================
oldLL=LL; ecnvg=0; n0vals=0; eItrs=0;
cout << endl << "1st Step Start: ECME Algorithm (Iteration=" << ecmeItr << ") (Beginning LL = ";
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(15); cout << oldLL << ")." << endl << endl << string(15,' ') << "‐‐‐‐‐> Iterating: ";
do
{
// 1st Step iteration counter.
//=============================
eItrs++;
cout << ".";
// Solve for new component probabilities, which are the decision variables in the 1st Step.
//==========================================================================================
dvarsE[1]=hessE[0].colPivHouseholderQr().solve(‐1.00*gradE[0]);
dvarsE[0]=(dvarsE[1]+dvarsE[0]);
// Check for zero or negative probabilities and prepare for next iteration.
//===========================================================================
n0vals=0;
for (int v=0; v<uCmps; ++v)
if (dvarsE[0](v) <= 0.00)
107
n0vals++;
// Resize the problem (if needed) and perform another iteration.
//================================================================
uCmps=uCmps‐n0vals;
nLMs=(int) RHS[0].size();
ld=uCmps+nLMs;
// Update constraint matrix/vector. Undo the multiplier and adjust size if multivariate component probabilities have been set to zero.
//=======================================================================================================================================
tmpCMtrx[0]=Eigen::MatrixXd(nLMs,uCmps);
for (int r=0; r<(int) LHS[0].rows(); ++r)
{
itr=0;
for (int c=0; c<(int) LHS[0].cols(); ++c)
if (dvarsE[0](c) > 0.00)
tmpCMtrx[0](r,itr++)=(1.00/curmlt)*LHS[0](r,c);
}
tmpCVctr[0]=Eigen::VectorXd(nLMs);
tmpCVctr[0]=(1.00/curmlt)*RHS[0];
// If a component is dropped then update mean vectors, VC matrices, and unique cell IDs.
//========================================================================================
if (n0vals > 0)
{
itr=0;
for (int v=0; v<(int) LHS[0].cols(); ++v)
if (dvarsE[0](v) > 0.00)
{
muMns[itr]=muMns[v];
muVCs[itr]=muVCs[v];
VCMInv[itr]=muVCs[itr].inverse();
sqdets[itr]=sqrt(VCMInv[itr].determinant());
uCellIDs[itr++]=uCellIDs[v];
}
// Resize the internal array that holds the likelihood values for each timepoint and component when the # of components changes.
//================================================================================================================================
for (int t=0; t<T; ++t)
{
delete [] fVals[t]; fVals[t]=new long double [uCmps];
}
// Update decision variable vectors, dropping relevant rows.
//============================================================
tmpDv[0]=Eigen::VectorXd((int) dvarsE[0].size());
tmpDv[0]=dvarsE[0];
delete [] dvarsE; dvarsE=new Eigen::VectorXd [2];
for (int i=0; i<2; ++i)
dvarsE[i]=Eigen::VectorXd(ld);
itr=0;
for (int v=0; v<(int) LHS[0].cols(); ++v)
if (tmpDv[0](v) > 0.00)
dvarsE[0](itr++)=tmpDv[0](v);
for (int v=(int) LHS[0].cols(); v<(int) tmpDv[0].size(); ++v)
dvarsE[0](itr++)=tmpDv[0](v);
delete [] tmpDv; tmpDv=new Eigen::VectorXd [1];
}
// Update density function values grid timepoint‐specific likelihood function values.
//=====================================================================================
LL=getLFVals(T,numA,uCmps,rts,dvarsE[0],muMns,VCMInv,sqdets,picst,dnom,fVals);
// Check for 1st Step convergence. Need no negative/zero component probabilities and unchanged LL. Otherwise, rebuild Hessian/gradient and iterate again.
//==========================================================================================================================================================
if (0 == n0vals && (LL ‐ oldLL) < (epsilon)*oldLL)
108
{
ecnvg=1;
itr=0;
oldLL=LL;
for (int v=0; v<uCmps; ++v)
muPrbs[itr++]=dvarsE[0](v);
}
// No 1st Step convergence, iterate again.
//=========================================
if (0 == ecnvg)
{
// Reset Log‐Likelihood, which is only valid when there are no negative probabilities.
//======================================================================================
if (0 == n0vals)
oldLL=LL;
// Rebuild Hessian.
//===================
delete [] LHS; LHS=new Eigen::MatrixXd [1];
delete [] RHS; RHS=new Eigen::VectorXd [1];
delete [] hessE; hessE=new Eigen::MatrixXd [1]; hessE[0]=Eigen::MatrixXd(ld,ld);
curmlt=getHessE(T,uCmps,(const long double **) fVals,dnom,tmpCMtrx[0],tmpCVctr[0],hessE,LHS,RHS);
// Rebuild Gradient then delete temporary memory allocations.
//=============================================================
delete [] gradE; gradE=new Eigen::VectorXd [1]; gradE[0]=Eigen::VectorXd(ld);
getGradE(T,uCmps,(const long double **) fVals,dnom,LHS[0],RHS[0],dvarsE[0],gradE);
delete [] tmpCMtrx; tmpCMtrx=new Eigen::MatrixXd [1];
delete [] tmpCVctr; tmpCVctr=new Eigen::VectorXd [1];
}
} while (0 == ecnvg);
eLL=oldLL;
cout << " (Done.)" << endl << endl << "1st Step Done:
ECME Algorithm (Iteration=" << ecmeItr << ") Converged in " << eItrs << " iterations.
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(15); cout << eLL << ")." << endl << endl;
//==================
// (ECME) 2nd STEP:
//==================
nCovs=(int) uCmps*numA*(numA‐1)/2;
p1Opt[0]=Eigen::VectorXd(nCovs);
for (int i=0; i<4; ++i)
dvarsM[i]=Eigen::VectorXd(nCovs);
getCovs(uCmps,muVCs,dvarsM);
dvarsM[2]=dvarsM[0];
gradM[0]=Eigen::VectorXd(nCovs);
hessM[0]=Eigen::MatrixXd(nCovs,nCovs);
P[0]=Eigen::MatrixXd(nCovs,nCovs);
Pinv[0]=Eigen::MatrixXd(nCovs,nCovs);
for (int h=0; h<nThrds; ++h)
for (int i=0; i<4; ++i)
tmpDvarsM[h][i]=Eigen::VectorXd(nCovs);
mcnvg=0; mItrs=0;
cout << endl << "2nd Step Start: ECME Algorithm (Iteration=" << ecmeItr << ") (Beginning LL = ";
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(15); cout << oldLL << ")." << endl << endl;
do
{
// 2nd Step iteration counter.
//=============================
mItrs++;
// Build gradient for 2nd step.
//==============================
getGradM(T,rts,uCmps,numA,(const long double **) fVals,dnom,muPrbs,muMns,muVCs,VCMInv,A,gradM);
109
(New LL = ";
// Build Hessian for 2nd step. Find the length (# digits) of the element with largest magnitude.
//================================================================================================
mHessMag=(long long) getHessM(T,rts,uCmps,numA,(const long double **) fVals,dnom,muPrbs,muMns,muVCs,VCMInv,A,hessM);
// Write out the max eigenvalue, condition # and # of negative/positive eigenvalues of the Hessian just derived.
//================================================================================================================
egnslvr.compute(hessM[0], true);
P[0]=egnslvr.eigenvectors().real();
Pinv[0]=P[0].inverse();
normslvr.compute(P[0].transpose()*P[0],false);
normslvrt.compute(Pinv[0].transpose()*Pinv[0],false);
max1=LNegVal; max2=LNegVal; npos=0;
for (int a=0; a<(int) hessM[0].rows(); ++a)
{
if (egnslvr.eigenvalues()[a].real() > 0)
npos++;
if (abs(normslvr.eigenvalues()[a].real()) > max1)
max1=abs(normslvr.eigenvalues()[a].real());
if (abs(normslvrt.eigenvalues()[a].real()) > max2)
max2=abs(normslvrt.eigenvalues()[a].real());
}
cnum = sqrt(max1)*sqrt(max2);
cout << endl << string(15,' ') << "Total # of (‐,+) eigenvalues: ("<< nCovs‐npos << "," << npos << ") (Hessian condition # = " << cnum << ")" << endl;
// The function stepHessM() uses the Hessian to step in the direction of the gradient. To step we add a (random) constant to the diagonal
// with larger (random) constants translating to smaller steps, and smaller (random) constants translating to larger steps.
//==========================================================================================================================================
Eigen::initParallel();
lblvar=string(15,' ') + "‐‐‐‐‐> Run #" + to_string((long long) mItrs) + " ‐ Threads Launched: ";
cout << lblvar;
for (int h=0; h<nThrds; ++h)
{
sHess1[h][0]=T; sHess1[h][1]=uCmps; sHess1[h][2]=h; sHess1[h][3]=0; sHess1[h][4]=(int) to_string(mHessMag).size() + 2; sHess1[h][6]=0; sHess1[h][7]=0;
sHess2[h][0]=oldLL; sHess2[h][1]=0.00; sHess2[h][2]=(long double) (minHessAdd + h*mItersH*sHess2[h][1]); sHess2[h][5]=0.00;
tmpDvarsM[h][0]=dvarsM[0];
tmpDvarsM[h][2]=dvarsM[2];
t1[h]=boost::thread(stepHessM,boost::ref(sHess1[h]),boost::ref(sHess2[h]),boost::cref(rts),boost::ref(tmpDvarsM[h]),gradM[0],hessM[0],dvarsE[0],boost::cref(muMns),boost::cref(muVCs));
}
// Conditionally output a line feed and alignment spaces once all threads have successfully launched.
//=====================================================================================================
if (dbug <= 1)
{
do
{
Sleep(1000); sumval=0;
for (int h=0; h<nThrds; ++h)
sumval=sumval+sHess1[h][3];
} while (sumval < nThrds); cout << string(10,' ') << "(Pr LL = " << oldLL << ")" << endl << string(lblvar.size()‐18,' ') << "Threads Finished: ";
sumval=0;
do
{
Sleep(100);
for (int h=0; h<nThrds; ++h)
if (1 == sHess1[h][7])
{
cout << ".";
sHess1[h][7]=0;
sumval++;
}
} while (sumval < nThrds);
}
// Pause until all threads finish.
//==================================
110
for (int j=0; j<nThrds; ++j)
t1[j].join();
// Randomly select one of the top "nBeats" performers to begin the next iteration. (Weight values by their LL to favor higher values.)
// The value of "nBeats" is set in the header file and only LL values that exceed the current LL are considered beats.
//=======================================================================================================================================
nUpdts=0; sumLL=0.00;
for (int b=0; b<n_beats; ++b)
maxHLL[b]=oldLL;
for (int h1=0; h1<nThrds; ++h1)
{
// No LL values returned should be less than the existing maximum.
//==================================================================
if (sHess2[h1][3] < oldLL)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(15);
cout << "ERROR: ECME Algorithm 2nd Step stepping function has returned a LL value inferior to the current maximum, which should not happen." << endl
<< "
Must inspect and fix. Thread # = " << h1 << endl
<< "
The current maximum LL = " << oldLL << endl
<< "
Maximum LL value returned from stepping function = " << sHess2[h1][3] << endl
<< "EXITING...ECMEAlg()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
// Find and process the improvements.
//=====================================
itr=0;
for (int h2=0; h2<nThrds; ++h2)
if (sHess2[h1][3] < sHess2[h2][3])
itr++;
for (int b=0; b<n_beats; ++b)
// Deal with LL ties.
if (sHess2[h1][3] > oldLL && sHess2[h1][3] == maxHLL[b])
itr++;
if (sHess2[h1][3] > oldLL && itr < n_beats)
{
maxHLL[itr]=sHess2[h1][3];
// Store the log‐likelihood for the given beat.
beat[itr] = h1;
// Store the thread index for the given beat.
sumLL = sumLL + (maxHLL[itr]‐oldLL);
// Sum the magnitude of log‐likelihood improvements.
nUpdts++;
// Record the # of improvements.
}
}
// Randomly select one of the LL beats to begin the next 2nd Step iteration.
//===========================================================================
if (nUpdts > 0)
{
uval = udist(gen)*sumLL; mtch=0;
do
{
lBound = sumLL ‐ (maxHLL[nUpdts‐1]‐oldLL);
if (uval >= lBound)
mtch = 1;
else
sumLL = sumLL ‐ (maxHLL[(nUpdts‐‐)‐1]‐oldLL);
} while (0 == mtch);
dvarsM[0]=tmpDvarsM[beat[nUpdts‐1]][3];
}
else
nUpdts=1;
if (0 == dbug)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(15);
cout << " (Done.) (RC LL = " << maxHLL[nUpdts‐1] << ", #(RRs)=" << sHess1[beat[nUpdts‐1]][6] << ")" << endl << endl; cout.precision(15); /* RC = Randomly Chosen */
}
111
// Update the VC and inverse VC matrices along with the vector of corresponding determinants.
//=============================================================================================
for (int v=0; v<uCmps; ++v)
{
setCovs(v,muVCs,dvarsM);
VCMInv[v]=muVCs[v].inverse();
sqdets[v]=sqrt(VCMInv[v].determinant());
}
LL=getLFVals(T,numA,uCmps,rts,dvarsE[0],muMns,VCMInv,sqdets,picst,dnom,fVals);
// QC check that Max LL equals the beat value chosen above.
//===========================================================
if (abs(LL ‐ maxHLL[nUpdts‐1]) > epsilon*maxHLL[nUpdts‐1])
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(15);
cout << "ERROR: ECME Algorithm has derived LL not equal to the beat LL chosen randomly, which should not happen. Must inspect and fix." << endl
<< "
Value of maxHLL[nUpdts‐1] = " << maxHLL[nUpdts‐1] << endl
<< "
Value of LL = " << LL << endl << "EXITING...ECMEAlg()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
// Check for convergence of the 2nd step.
//========================================
if ((LL ‐ oldLL) < pow(10.0,6)*(epsilon)*oldLL)
mcnvg=1;
oldLL=LL; dvarsM[2]=dvarsM[0];
} while (0 == mcnvg);
mLL=oldLL;
cout << endl << "2nd Step Done:
ECME Algorithm (Iteration=" << ecmeItr << ") Converged in " << mItrs << " iterations. (New LL=";
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(15); cout << mLL << ")." << endl << endl;
// Check ECME convergence. (2nd Step did not improve 1st Step likelihood.) If non‐convergence, prepare another 1st Step iteration. If convergence, find/display eigenvalues to check concavity.
//================================================================================================================================================================================================
if ((mLL ‐ eLL) < pow(10.0,6)*(epsilon)*eLL)
cnvg=1;
// Free temporary memory allocations.
//=====================================
delete [] gradM; gradM=new Eigen::VectorXd [1];
delete [] hessM; hessM=new Eigen::MatrixXd [1];
delete [] P; P=new Eigen::MatrixXd [1];
delete [] Pinv; Pinv=new Eigen::MatrixXd [1];
delete [] dvarsM; dvarsM=new Eigen::VectorXd [4];
delete [] p1Opt; p1Opt=new Eigen::MatrixXd [1];
for (int h=0; h<nThrds; ++h)
{
delete [] tmpDvarsM[h]; tmpDvarsM[h]=new Eigen::VectorXd [4];
}
if (0 == cnvg)
{
// Populate the dnom and fVals arrays.
//======================================
LL=getLFVals(T,numA,uCmps,rts,dvarsE[0],muMns,VCMInv,sqdets,picst,dnom,fVals);
chkSum(T,uCmps,(const long double **) fVals);
// Build Hessian and Gradient.
//==============================
delete [] LHS; LHS=new Eigen::MatrixXd [1];
delete [] RHS; RHS=new Eigen::VectorXd [1];
delete [] hessE; hessE=new Eigen::MatrixXd [1]; hessE[0]=Eigen::MatrixXd(ld,ld);
curmlt=getHessE(T,uCmps,(const long double **) fVals,dnom,tmpCMtrx[0],tmpCVctr[0],hessE,LHS,RHS);
delete [] gradE; gradE=new Eigen::VectorXd [1]; gradE[0]=Eigen::VectorXd(ld);
getGradE(T,uCmps,(const long double **) fVals,dnom,LHS[0],RHS[0],dvarsE[0],gradE);
112
// Delete temporary memory allocations.
//=======================================
delete [] tmpCMtrx; tmpCMtrx=new Eigen::MatrixXd [1];
delete [] tmpCVctr; tmpCVctr=new Eigen::VectorXd [1];
ecmeItr++;
}
// Processor cool down.
//=======================
if (dbug >= 2)
{
cout.setf(ios_base::fixed, ios_base::floatfield); cout.precision(4);
cout << endl << "***** Processor cool Down: " << ((double) cDown/1000.00)/60.00 << " minutes. *****" << endl;
} Sleep(cDown);
} while (0 == cnvg);
cout << "ECME Algorithm Converged in " << ecmeItr << " Iterations (Maximum LL=" << LL << ")." << endl;
fout.open(rdir+ofile, ios_base::out | ios_base::app);
fout << "ECME Algorithm Converged in " << ecmeItr << " Iterations (Maximum LL=" << LL << ")." << endl;
fout.close();
// Delete temporary memory allocations.
//=======================================
delete [] dnom; dnom=nullptr;
delete [] sqdets; sqdets=nullptr;
delete [] gradE; gradE=nullptr;
delete [] gradM; gradM=nullptr;
delete [] rts; rts=nullptr;
delete [] VCMInv; VCMInv=nullptr;
delete [] hessE; hessE=nullptr;
delete [] hessM; hessM=nullptr;
delete [] P; P=nullptr;
delete [] Pinv; Pinv=nullptr;
delete [] dvarsE; dvarsE=nullptr;
delete [] dvarsM; dvarsM=nullptr;
delete [] LHS; LHS=nullptr;
delete [] RHS; RHS=nullptr;
delete [] tmpCMtrx; tmpCMtrx=nullptr;
delete [] tmpCVctr; tmpCVctr=nullptr;
delete [] tmpDv; tmpDv=nullptr;
delete [] A; A=nullptr;
delete [] beat; beat=nullptr;
delete [] maxHLL; maxHLL=nullptr;
for (int t=0; t<T; ++t)
{
delete [] fVals[t]; fVals[t]=nullptr;
}
delete [] fVals; fVals=nullptr;
for (int h=0; h<nThrds; ++h)
{
delete [] sHess1[h]; sHess1[h]=nullptr;
delete [] sHess2[h]; sHess2[h]=nullptr;
delete [] tmpDvarsM[h]; tmpDvarsM[h]=nullptr;
}
delete [] sHess1; sHess1=nullptr;
delete [] sHess2; sHess2=nullptr;
delete [] tmpDvarsM; tmpDvarsM=nullptr;
delete [] t1; t1=nullptr;
// Count and return the final number of non‐zero unique cell probabilities for this solution.
//=============================================================================================
return uCmps;
}
113
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getLFVals.cpp
/
/ Function: getLFVals()
/
/ Summary:
/
/
This function decomposes the multivariate mixture likelihood as a 2‐dimensional grid of values with time (T) on the vertical axis and component (U) on the horizontal axis. Each cell in the 2‐
/
dimensional grid is a likelihood value for the data at that timepoint using the corresponding multivariate density function for that component. This function computes each value in the grid and
/
stores the value in the 2‐dimensional array supplied by parameter #11. In addition, if the values in each row are summed using the component probabilities as weights, the value is the multivariate
/
mixture likelihood at the given time point. These values are derived and stored in the single array supplied by parameter #10. Lastly, if the log of the values computed for parameter #10 are taken
/
and summed across all time points then this value is the log‐likelihood for the data using the supplied multivariate mixture density. This log‐likelihood value is computed/returned at the call.
/
/ Inputs:
/
/
1.) The total number of time points with data collected. (T)
/
/
2.) The number of assets with returns. (numA)
/
/
3.) The number of unique components in the multivariate mixture. (Initial value is from either the Minimax or Minimum SSD LP optimizations.) (inUCmps)
/
/
4.) The array of vector returns at each time point indexed as rs[t](a). There are T vectors of returns and each is of size numA, where numA=# assets. (rs)
/
/
5.) The current vector of multivariate mixture probabilities. (Initial values are from either the Minimax or Minimum SSD LP optimizations.) (uPrbs)
/
/
6.) The array of mean vectors. Each component of the multivariate mixture density is a multivariate density function which has its own set of means. The first element of this array is the vector
/
of means for the first multivariate component, etc... (inMns)
/
/
7.) The array of VC inverse matrices. Each component in the multivariate mixture density is a multivariate density function with a corresponding VC matrix. Each VC matrix is invertible and of
/
dimension (numA)x(numA). The diagonals of each VC matrix are the corresponding variances for that asset within that component. (inVCIs)
/
/
8.) The array of square roots of the determinants of the VC inverse matrices from parmeter #7. This term is required to construct the multivariate normal density. (insqs)
/
/
9.) This parameter equals (2*pi)^(numA/2), where numA = total # of assets in the application. (inpicst)
/
/
10.) A single array of T values that sum the double array in parameter #11 across the components at each time point, weighting each component by its corresponding estimated probability. Each value
/
in this array is the multivariate mixture likelihood value for the data at each individual time point. This parameter is supplied empty and populated/returned by this function. (denoms)
/
/
11.) A double array of likelihood values indexed by time and component. At each time point the likelihood for each component is computed and stored in this double array for reuse. This forms a 2‐
/
dimensional grid of values of size TxU, where T=# of time points, and U=# components. This parameter is supplied empty and populated/returned by this function. (lfVals)
/
/ Outputs:
/
/
This function returns the log‐likelihood value at the call and also populates the 2 incoming arrays denoms (see parameter #10) and lfVals (parameter #11).
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
long double getLFVals(const int T, const int numA, const int inUCmps, const Eigen::VectorXd *rs, const Eigen::VectorXd uPrbs, const Eigen::VectorXd *inMns, const Eigen::MatrixXd *inVCIs,
const long double *insqs, const long double inpicst, long double *denoms, long double **lfVals)
{
// Local variables.
//===================
long double LL=0.00;
// Populate 2 containers: 1.) 2‐dimensional grid of all component likelihoods evaluated at each time point. 2.) 1‐dimensional array of all full likelihood values evaluated at each time point.
//=================================================================================================================================================================================================
for (int t=0; t<T; ++t)
{
denoms[t]=0.00;
for (int v=0; v<inUCmps; ++v)
114
{
lfVals[t][v]=getMVNDens(rs[t],inMns[v],inVCIs[v],insqs[v],inpicst);
denoms[t]=denoms[t] + uPrbs(v)*lfVals[t][v];
}
if (denoms[t] > 0.00)
LL=LL+log(denoms[t]);
else
LL=LL+LNegVal;
}
// Return the log‐likelihood value.
//===================================
return LL;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getGradE.cpp
/
/ Function: getGradE()
/
/ Summary:
/
/
This function derives the Gradient for the ECME algorithm 1st Step optimization, which is convex in the decision variables (multivariate mixture component probabilities). All means, variances and
/
covariances are treated as constants. The objective is to maximize the corresponding log‐likelihood function subject to constraints that the marginal densities are fixed and known univariate
/
mixtures. The marginal constraints can be enforced via linear functions on the decision variables (component probabilities). By incorporating the constraints into the objective we form the
/
Lagrangian. Stationary points of the Lagrangian will be unique global optimizers of the constrainted convex optimization problem. These points are found by applying Newton's method to the
Lagrangian. Newton's method requires that the gradient and Hessian of the Lagrangian be constructed during each iteration. The optimization problem converges when the log‐likelihood fails to
/
/
improve. In this function we compute the Gradient of the Lagrangian for the 1st Step. The Gradient is the vector of 1st partial derivatives of the Lagrangian. The number of elements is the sum of
/
the # of unique components (multivariate mixture probabilities) and the # of constraints (Lagrange multipliers).
/
/ Inputs:
/
/
1.) The total number of time points with data collected. (T)
/
/
2.) The number of unique components in the multivariate mixture. (Initial value is from either the Minimax or Minimum SSD LP optimizations.) (inUCmps)
/
/
3.) A double array of likelihood values indexed by time and component. At each time point the likelihood for each component is computed and stored for reuse. This forms a 2‐dimensional grid of
/
values of size TxU, where T=# of time points, and U=# components. (infVals)
/
/
4.) A single array of T values that sum the double array in parameter #3 across the components at each time point, weighting each likelihood value by its corresponding estimated component
/
probability. Therefore, each value in this array is the multivariate mixture likelihood value for the data at each individual time point. (inDNoms)
/
/
5.) The LHS matrix needed to enforce the marginal mixture density constraints. These constraints are linear in the component probabilities therefore can be represented using a LHS matrix and RHS
/
vector. This matrix has 1's & 0's. It may be necessary to multiply both sides of each constraint by a constant factor to make the corresponding Hessian full rank (computationally). The # of
/
columns is equal to the # of components and the # of rows is equal to the # of constraints (i.e., Lagrange multipliers) needed to maintain the marginal univariate mixtures (inLHS).
/
/
6.) The RHS constraint vector required to enforce the fixed marginal density constraints using actual univariate marginal mixture probabilities. The constraints needed to ensure that given fixed
/
mixture marginals add multivariate component probabilities up to equal the given marginal mixture probabilities for each component of each asset. This vector is scaled when the corresponding
/
LHS matrix above is scaled to ensure the Hessian of the Lagrangian is full rank (computationally). (inRHS)
/
/
7.) Current values of the decision variables. Values for the probabilities are not needed given that we have the double array infVals[t][u] above. However we do need the current values of the
/
Lagrange multipliers as these change during each iteration. Therefore we will pull these from the vector of all decision variables passed via this parameter. (inDVars)
/
/
8.) The empty Gradient vector to be filled by this function. The vector is of dimension equal to the sum of the # of unique components and the # of Lagrange multipliers. The # of Lagrange
/
multipliers equals the # of rows in the LHS constraint matrix, which equals the # of constraints. (inGrad)
/
/ Outputs:
/
/
This function populates the empty gradient vector supplied to it but does not return any other output at the function call.
/*********************************************************************************************************************************************************************************************************/
115
#include "stdafx.h"
void getGradE(const int T, const int inUCmps, const long double **infVals, const long double *inDNoms, const Eigen::MatrixXd inLHS, const Eigen::VectorXd inRHS, const Eigen::VectorXd inDVars,
Eigen::VectorXd *inGrad)
{
// Local variables.
//===================
int ld=inUCmps + (int) inRHS.size();
// Gradient: Partials wrt Probabilities.
//=========================================
for (int v=0; v<inUCmps; ++v)
{
inGrad[0](v)=0.00;
for (int t=0; t<T; ++t)
inGrad[0](v)=inGrad[0](v) + infVals[t][v]/inDNoms[t];
for (int r=0; r<(int) inRHS.size(); ++r)
inGrad[0](v)=inGrad[0](v) ‐ inDVars(inUCmps+r)*inLHS(r,v);
}
// Gradient: Partials wrt Multipliers.
//=======================================
for (int m=inUCmps; m<ld; ++m)
{
inGrad[0](m)=0.00;
for (int v=0; v<inUCmps; ++v)
inGrad[0](m)=inGrad[0](m) + ((double) inLHS(m‐inUCmps,v))*inDVars(v);
inGrad[0](m)=‐1.00*(inGrad[0](m) ‐ inRHS(m‐inUCmps));
}
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getHessE.cpp
/
/ Function: getHessE()
/
/ Summary:
/
/
This function derives the Hessian for the ECME algorithm 1st Step optimization, which is convex in the decision variables (multivariate mixture component probabilities). All means, variances and
/
covariances are treated as constants during this optimization (i.e., ECME 1st Step). The objective is to maximize the corresponding log‐likelihood function subject to constraints that the marginal
/
densities are fixed and known univariate mixtures. The marginal constraints can be enforced via linear functions on the decision variables (component probabilities). By incorporating the
/
constraints into the objective we form the Lagrangian. Stationary points of the Lagrangian will be unique global optimizers of the constrained convex optimization problem. These points are found
/
by applying Newton's method to the Lagrangian. Newton's method requires that the gradient and Hessian of the Lagrangian be constructed during each iteration. The optimization problem converges
/
when the log‐likelihood fails to improve (i.e., at a zero of the Lagrangian). In this function we compute the Hessian of the Lagrangian for the 1st Step. The Hessian is a border matrix since the 2nd
/
derivative WRT the Lagrange multipliers is always zero, therefore there will be a block matrix of zeros in the lower right corner. A border matrix is invertible under certain conditions on the 3
/
block matrices that border the zero block. These conditions will be met for this optimization, however it may be necessary to inflate the constraint matrix by using a constant larger than 1. This
/
would be needed when the Hessian is ill‐conditioned using 0/1 indicator variables to enforce the constraints.
/
/ Inputs:
/
/
1.) The total number of time points with data collected. (T)
/
/
2.) The number of unique components in the multivariate mixture. (Initial values are from either the Minimax or Minimum SSD LP optimizations.) (nUCmps)
/
/
3.) A double array of likelihood values indexed by time and component. At each time point the likelihood for each component is computed and stored for reuse. This forms a 2‐dimensional grid of
/
values of size TxU, where T=# of time points, and U=# components. (infVals)
/
/
4.) A single array of T values that sum the double array in parameter #3 across the components at each time point, weighting each component by its corresponding estimated probability. Therefore,
/
each value in this array is the multivariate mixture likelihood value for the data at each individual time point. (inDNoms)
/
116
/
5.) The LHS matrix (of 1's and 0's) needed to enforce the marginal mixture density constraints. These constraints are linear in the decision variables (component probabilities) therefore can be
/
represented using a LHS matrix and RHS vector. This matrix has 1's and 0's but these may be multiplied by a constant to ensure the Hessian returned is full rank (computationally). The # of
/
columns is equal to the # of components and the # of rows is equal to the # of constraints (Lagrange multipliers) that are required to ensure that the marginals match their fixed mixtures as
/
found earlier. The matrix must be of full rank, therefore if multivariate components are set to zero we should check that it remains full rank, if not force it to be full rank by removing rows
/
one at a time until it is. (This code is yet to be implemented. Problem has not been encountered. The function getCMtrx() can be used to perform the task.) (inCMtrx)
/
/
6.) The RHS constraint vector required to enforce the fixed marginal density constraints using actual marginal probabilities. The constraints needed to ensure given fixed mixture marginals add
/
multivariate component probabilities up to equal the given marginal mixture probabilities for each component of each asset. This vector is scaled when the corresponding LHS matrix above is
/
scaled to ensure the Hessian of the Lagrangian is invertible. (inCVctr)
/
/
7.) The empty Hessian matrix to be filled by this function. The matrix is square with dimension equal to the # of unique components plus the # of Lagrange multipliers. The # of Lagrange
/
multipliers equals the # of rows in the LHS constraint matrix, which equals the # of constraints. (inHess)
/
/
8.) An empty matrix to be filled with the updated LHS constraint matrix once scaled to ensure the resulting Hessian is invertible. As noted, the Hessian is for the Lagrangian which is a border
/
matrix with a block of zeros in the lower right corner. The upper right corner is the constraint matrix of 1's and 0's, while the upper left corner is the Hessian of the original objective
/
function (i.e., without the Lagrange multipliers). In rare cases, large values in the upper left matrix coupled with 1's and 0's in the upper right matrix can cause the matrix to be ill‐
/
conditioned, therefore not invertible. We have found that a solution is to scale the constraint matrix up by a large constant. That is, we multiple the LHS and RHS of each constraint by a
/
given large constant. This fixes the singularity of the Hessian. Note that the gradient also uses the constraints therefore when the constraint matrix is scaled we must use the same scaled
/
version when constructing the gradient. This parameter returns the scaled LHS constraint matrix. Note that the scale factor is returned by the function. (inLHS)
/
/
9.) An empty vector to be filled with the updated RHS constraint values when the constraint matrix is scaled to be invertible. (inRHS)
/
/ Outputs:
/
/
This function returns the the multiplier used to scale the constraint matrix and vector to ensure that the resulting Hessian is computationally invertible. It also populates the empty Hessian
/
matrix supplied to it along with the (scaled) LHS matrix and RHS vector.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
long double getHessE(const int T, const int inUCmps, const long double **infVals, const long double *inDNoms, const Eigen::MatrixXd inCMtrx, const Eigen::VectorXd inCVctr, Eigen::MatrixXd *inHess,
Eigen::MatrixXd *inLHS, Eigen::VectorXd *inRHS)
{
// Local variables.
//===================
int rnk, ld=inUCmps + (int) inCVctr.size();
long double mult=1.00;
Eigen::MatrixXd *ulHess=new Eigen::MatrixXd [1];
ulHess[0]=Eigen::MatrixXd(inUCmps,inUCmps);
// Hessian: Upper left.
//========================
for (int r=0; r<inUCmps; ++r)
for (int c=r; c<inUCmps; ++c)
{
inHess[0](r,c)=0.00;
for (int t=0; t<T; ++t)
inHess[0](r,c) = inHess[0](r,c) + infVals[t][r]*infVals[t][c]/pow(inDNoms[t],2);
inHess[0](r,c)=‐1.00*inHess[0](r,c);
ulHess[0](r,c)=inHess[0](r,c);
if (c > r)
{
inHess[0](c,r)=inHess[0](r,c);
ulHess[0](c,r)=ulHess[0](r,c);
}
}
// Before proceeding with the UR, LL, and LR sections, check that the UL Hessian is full rank and put out a warning if it is not.
// (This may or may not prevent the optimization from working. Often it does not prevent the optimization from working.)
//=================================================================================================================================
rnk=(int) Eigen::FullPivLU<Eigen::MatrixXd>(ulHess[0]).rank();
if (rnk < inUCmps && dbug >=2)
cout << endl << "WARNING: The UL Hessian matrix is singular which may prevent the component probabilities from being optimized." << endl
<< "
This can happen for various reasons, two of which are:" << endl
<< "
1.) The likelihood of a single component is zero at all time points, which eliminates the decision variable." << endl
<< "
2.) The Upper Left matrix is ill‐conditioned having large and small elements at different diagonal positions." << endl
<< "Message from ... getHessE() ..." << endl;
117
// Hessian: Build upper right, lower left, and lower right sections of the Hessian. Iterate until the entire Hessian is full rank so that Newton's method may be applied. This may require
//
multiplying all constraints by a constant (both LHS and RHS). First, make sure that the constraint matrix is of full rank since components may be dropped during the 1st Step.
//=============================================================================================================================================================================================
rnk=(int) Eigen::FullPivLU<Eigen::MatrixXd>(inCMtrx).rank();
if (rnk < (int) inCVctr.size())
{
cout << "ERROR: Detection of a non‐full rank constraint matrix rank during the ECME 1st Step, which is likely due to" << endl
<< "
components with < 0 probabilities being dropped. The function getCMtrx() can be used to fix this" << endl
<< "
by sequentially removing linearly dependent rows until the constraint matrix becomes full rank." << endl
<< "EXITING...getHessE()..." << endl; cin.get(); exit (EXIT_FAILURE);
}
inLHS[0]=Eigen::MatrixXd((int) inCVctr.size(),inUCmps); inLHS[0]=mult*inCMtrx;
inRHS[0]=Eigen::VectorXd((int) inCVctr.size());
inRHS[0]=mult*inCVctr;
do
{
// Hessian: Upper right & Lower left.
//======================================
for (int r=0; r<inUCmps; ++r)
for (int c=inUCmps; c<ld; ++c)
{
inHess[0](r,c)=‐1.00*inLHS[0](c‐inUCmps,r);
inHess[0](c,r)=inHess[0](r,c);
}
// Hessian: Lower right.
//=========================
for (int r=inUCmps; r<ld; ++r)
for (int c=r; c<ld; ++c)
{
inHess[0](r,c)=0.00;
if (c > r)
inHess[0](c,r)=inHess[0](r,c);
}
// Before proceeding, ensure that the entire Hessian is full rank.
//==================================================================
rnk=(int) Eigen::FullPivLU<Eigen::MatrixXd>(inHess[0]).rank();
// If another iteration is needed, update the multiplier and the LHS/RHS constraints.
//=====================================================================================
if (rnk < ld)
{
mult=mult*10.00;
inRHS[0]=mult*inRHS[0];
inLHS[0]=mult*inLHS[0];
}
} while (rnk < ld && mult < LPosVal);
// If the entire Hessian is not full rank then put out a warning but do not exit, the optimization may still succeed.
//=====================================================================================================================
if (rnk < ld && dbug >=2)
{
cout << endl << "WARNING: The 1st Step Hessian matrix is singular which may prevent the multivariate component probabilities from being optimized." << endl
<< "
This can happen for various reasons, including:" << endl
<< "
1.) There are very large and very small eigenvalues, resulting in an ill‐conditioned matrix." << endl
<< "
2.) Components have been dropped and the constraint matrix is no longer of full row rank. (Note: Already checked above.)" << endl
<< "Message from ... getHessE() ..." << endl;
}
// Free temporary memory allocations.
//=====================================
delete [] ulHess; ulHess=nullptr;
// Return the multiplier used to correct an ill‐conditioned Hessian.
//====================================================================
118
return mult;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getGradM.cpp
/
/ Function: getGradM()
/
/ Summary:
/
/
This function derives the Gradient for the ECME algorithm 2nd Step optimization, which is (evidently) NOT convex in the decision variables (covariances). In general mixture density likelihoods are
/
not concave functions and have many local optimums. We are dealing with a multivariate mixture density here. All means, variances and component probabilities are treated as constants during this
/
ECME 2nd Step optimization. The objective is to maximize the corresponding log‐likelihood function (only covariances are unknown) subject to constraints that all variance‐covariance matrices are
/
positive definite. That is, we seek the covariances that maximize the multivariate mixture log‐likelihood function with the variance‐covariance matrix at each component being positive definite
/
(and all means, variances, component probabilities being fixed and known). These points are found by applying a modified Newton's method to the log‐likelihood (in which only the covariances are
/
unknown). Newton's method requires that the gradient and Hessian of the log‐likelihood be constructed during each iteration. The gradient is the vector of first order partial derivatives WRT each
/
covariance term, and is derived in this function. The Hessian is the matrix of second order partial derivatives WRT all covariance terms. If the problem has "A" total assets with returns measured,
/
and "U" components in the multivariate mixture density then there will be a total of U*A*(A‐1)/2 unique covariance terms that require estimation. Clearly this problem suffers from the curse of
/
dimensionality and will work best with a limited number of assets relative to the number of observations (i.e., time points). The optimization problem converges when the log‐likelihood fails to
/
improve. The method used to find the largest local optimum is due to Marquardt (1963), which uses the Hessian to step in the general direction of the gradient by adding a constant to the Hessian
/
diagonals prior to solving the updating equation. In practice we will iterate over a large number of random step sizes searching for the local/global log‐likelihood function maximizer. Once the
/
maximizer is found we recompute the gradient and Hessian and iterate again. Note that large additive quantities (i.e., added to the Hessian diagonal) translate into small steps and small quantities
/
translate into large steps. An additive factor of zero translates into using Newton's method without modification, which is assumed here to overshoot the local optimizer. This method is approprate
/
when strictly applying Newton's method overshoots. Here, the goal is to find the largest local optimum in the vicinity of the carefully constructed starting point (i.e., LP solution), but also to
/
search outside the current region/hill in an attempt to find a better solution. The constraints on the resulting variance‐covariance matrices are enforced implictly. At each step, the resulting
/
matrix is decomposed and the eigenvalues are inspected. If none are <= 0 the resulting variance‐covariance matrix is positive definite. Otherwise, it is not and a ridge repair is immediately
/
performed. Stepping continues using the repaired variance‐covariance matrix. In general, we find that there are large regions of the covariance set where stepping proceeds without the need for
/
repairs, and other large regions of the covariance set where repairs are needed after each step. The variance‐covariance matrix of each multivariate component is examined and repaired (if
/
necessary) by the function ridgeRpr(). The feasible region is any covariance set that results in all component variance‐covariance matrices being valid (i.e., positive definite).
/
/ Inputs:
/
/
1.) The total number of time points with data collected. (T)
/
/
2.) The array of vector returns at each time point indexed as rs[t](a). There are T vectors of returns and each is of size numA, where numA=# assets. (rs)
/
/
3.) The number of unique components in the multivariate mixture. (Initial value is from either the Minimax or Minimum SSD LP optimizations.) (inUCmps)
/
/
4.) The number of assets with returns collected. (numA)
/
/
5.) A double array of likelihood values indexed by time and component. At each time point the likelihood for each component is computed and stored for reuse. This forms a 2‐dimensional grid of
/
values of size TxU, where T=# of time points, and U=# components. (infVals)
/
/
6.) A single array of T values that sum the double array in parameter #5 across the components at each time point, weighting each likelihood value by its corresponding estimated component
/
probability. Therefore, each value in this array is the multivariate mixture likelihood value for the data at each individual time point. (inDNoms)
/
/
7.) The current array of multivariate mixture probabilities. (Initial values from either the Minimax or Minimum SSD LP optimizations.) (inPrbs)
/
/
8.) The array of mean vectors. Each component of the multivariate mixture density is a multivariate density function which has its own set of means. The first element of this array is the vector
/
of means for the first multivariate component, etc... (muMns)
/
/
9.) The array of VC matrices. Each component in the multivariate mixture density is a multivariate density function with a corresponding VC matrix. Each VC matrix is of dimension (numA)x(numA).
/
The diagonals of each VC matrix are the corresponding variances for that asset within that component. (E)
/
/
10.) The array of VC matrix inverses. Each component in the multivariate mixture density is a multivariate density function with a corresponding VC matrix. Each VC matrix is of dimension
/
(numA)x(numA). The diagonals of each VC matrix are the corresponding variances for that asset within that component. This parameter holds the corresponding array of inverses of the VC
/
matrices. (Einv)
/
/
11.) The array of identifier matrices for each covariance term. A VC matrix can be decomposed into the sum of a matrix of diagonal elements and a term for each unique covariance. The constant
119
/
matrix multiplied by the covariance term has a 1/0 in each element where 1 is in the location of the corresponding covariance term. The constant matrices are contained in this array. The
/
constant matrices are identical across components and can be reused. The # of these matrices is the number of unique covariance terms for a single multivariate mixture: numA*(numA‐1)/2. (inA)
/
/
12.) The empty Gradient vector to be filled by this function. The vector is of dimension equal to the total # of covariances in the problem. If the problem has "A" total assets with returns
/
measured, and "U" components in the multivariate mixture density then there are a total of U*A*(A‐1)/2 covariance terms. (inGrad)
/
/ Outputs:
/
/
This function populates the empty gradient vector supplied to it but does not return any other output at the function call.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
void getGradM(const int T, Eigen::VectorXd *rs, const int inUCmps, const int numA, const long double **infVals, const long double *inDNoms, const long double *inPrbs, Eigen::VectorXd *muMns, const
Eigen::MatrixXd *E, const Eigen::MatrixXd *Einv, const Eigen::MatrixXd *inA, Eigen::VectorXd *inGrad, int chk)
{
// Local variables.
//===================
int itr=0, itrA;
long double Qtijk;
Eigen::MatrixXd *Ejk=new Eigen::MatrixXd [1];
Ejk[0]=Eigen::MatrixXd(numA,numA);
// Populate gradient vector.
//============================
for (int i=0; i<inUCmps; ++i)
{
itrA=0;
for (int j=0; j<numA; ++j)
for (int k=j+1; k<numA; ++k)
{
getCofM(numA,j,k,E[i],Ejk);
inGrad[0](itr)=0.00;
for (int t=0; t<T; ++t)
{
Qtijk = (0.50)*((rs[t]‐muMns[i]).transpose())*Einv[i]*inA[itrA]*Einv[i]*(rs[t]‐muMns[i]) ‐ Ejk[0].determinant()/E[i].determinant();
inGrad[0](itr)=inGrad[0](itr) + (inPrbs[i]*infVals[t][i]*Qtijk)/inDNoms[t];
}
itr++;
itrA++;
}
}
// Delete temporary memory allocations.
//=======================================
delete [] Ejk; Ejk=nullptr;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: getHessM.cpp
/
/ Function: getHessM()
/
/ Summary:
/
/
This function derives the Hessian matrix for the ECME algorithm 2nd Step optimization, which is (evidently) NOT convex in the decision variables (covariances). In general a univariate/multivariate
/
mixture density likelihood function is not strictly concave and has many local optimums. We are dealing with a multivariate mixture density here where all means, variances and component
/
probabilities fixed during the ECME 2nd Step optimization. The objective is to maximize the corresponding log‐likelihood function (only covariances are unknown) subject to constraints that all
/
resulting variance‐covariance matrices are positive definite. That is, we seek the covariances that maximize the multivariate mixture log‐likelihood function with the variance‐covariance matrix at
each component being positive definite (and all means, variances, component probabilities are fixed). These points are found by applying a modified Newton's method to the log‐likelihood (in which
/
/
only the covariances are unknown). Newton's method requires that the gradient and Hessian of the log‐likelihood be constructed during each iteration. The gradient is the vector of first order
120
/
partial derivatives WRT each covariance term, and is derived in the function getGradM(). The Hessian is the matrix of second order partial derivatives WRT all covariance terms and is derived in
/
this function. If the problem has "A" total assets with returns measured, and "U" components in the multivariate mixture density then there will be a total of U*A*(A‐1)/2 unique covariance terms
/
that require estimation. This problem suffers from the curse of dimensionality and will work best with a limited number of assets relative to the # of observations (i.e., time points). The
/
optimization problem converges when the log‐likelihood fails to improve. The method used to find the largest local optimum is due to Marquardt (1963), which uses the Hessian to step in the general
/
direction of the gradient by adding a constant to the Hessian diagonals prior to solving the updating equation. In practice we will iterate over a large number of random step sizes searching for
/
the best local and global log‐likelihood function maximizer. Once the maximizer is found we recompute the gradient and Hessian and iterate again. Note that large additive quantities translate into
/
small steps and small quantities translate into large steps. An additive factor of zero translates into using Newton's method without modification. This method is appropriate when strictly applying
/
Newton's method overshoots. Here, the goal is to find the largest local optimum in the vicinity of the carefully constructed starting point (LP solution) using small step sizes, but also to search
/
outside the current region/hill in an attempt to find a better solution (using large step sizes). The constraints on the resulting variance‐covariance matrices are enforced implictly. At each
/
step, the resulting matrix is decomposed and the eigenvalues are inspected. If none are <= 0 the resulting variance‐covariance matrix is positive definite. Otherwise, it is not and a ridge repair
/
is immediately performed and stepping continues using the repaired variance‐covariance matrix. In general, we find that there are large regions of the covariance set where stepping proceeds without
/
the need for repairs, and other large regions of the covariance set where repairs are needed after each step. The variance‐covariance matrix of each multivariate component is examined and repaired
/
(if necessary) by the function ridgeRpr(). The feasible region is any covariance set that results in all component variance‐covariance matrices being valid (i.e., positive definite).
/
/ Inputs:
/
/
1.) The total number of time points with data collected. (T)
/
/
2.) The array of vector returns at each time point indexed as rs[t](a). There are T vectors of returns and each is of size numA, where numA=# assets. (rs)
/
/
3.) The number of unique components in the multivariate mixture. (Initial value is from either the Minimax or Minimum SSD LP optimizations.) (inUCmps)
/
/
4.) The number of assets with returns collected. (numA)
/
/
5.) A double array of likelihood values indexed by time and component. At each time point the likelihood for each component is computed and stored for reuse. This forms a 2‐dimensional grid of
/
values of size TxU, where T=# of time points, and U=# components. (infVals)
/
/
6.) A single array of T values that sum the double array in parameter #5 across the components at each time point, weighting each likelihood value by its corresponding estimated component
/
probability. Therefore, each value in this array is the multivariate mixture likelihood value for the data at each individual time point. (inDNoms)
/
/
7.) The current array of multivariate mixture probabilities. (Initial values from either the Minimax or Minimum SSD LP optimizations.) (inPrbs)
/
/
8.) The array of mean vectors. Each component of the multivariate mixture density is a multivariate density function which has its own set of means. The first element of this array is the vector
/
of means for the first multivariate component, etc... (muMns)
/
/
9.) The array of VC matrices. Each component in the multivariate mixture density is a multivariate density function with a corresponding VC matrix. Each VC matrix is of dimension (numA)x(numA).
/
The diagonals of each VC matrix are the corresponding variances for that asset within that component. (E)
/
/
10.) The array of VC matrix inverses. Each component in the multivariate mixture density is a multivariate density function with a corresponding VC matrix. Each VC matrix is of dimension
/
(numA)x(numA). The diagonals of each VC matrix are the corresponding variances for that asset within that component. This parameter holds the inverses of the VC matrices. (Einv)
/
/
11.) The array of identifier matrices for each covariance term. A VC matrix can be decomposed into the sum of a matrix of diagonal elements and a term for each unique covariance. The constant
/
matrix multiplied by the covariance term has a 1/0 in each element where 1 is in the location of the corresponding covariance term. The constant matrices are contained in this array. The
/
constant matrices are identical across components and can be reused. The # of these matrices is the number of unique covariance terms for a single multivariate mixture: numA*(numA‐1)/2. (inA)
/
/
12.) The empty Hessian matrix to be filled by this function. The matrix is square and of dimension equal to the total # of covariances in the problem. If the problem has "A" total assets with
/
returns measured, and "U" components in the multivariate mixture density then there are a total of U*A*(A‐1)/2 covariance terms. (inHess)
/
/ Internal Variables:
/
/
Note: Each Hessian element is a partial WRT Sigma(i,j,k), then another partial WRT Sigma(p,r,s). Where i is the component index for the 1st partial derivative, and p is the component index for the
/
2nd partial derivative. The paired index (j,k) identifies the covariance term from component i, whereas the paired index (r,s) identifies the covariance term from component p. Note that the
/
covariance term at (j,k) is equivalent to the covariance term at (k,j) therefore we will also assume that j < k, and r < s.
/
/
itrAjk:
Index of the indicator matrix array A[] for the 1st covariance term in the partial.
/
itrArs:
Index of the indicator matrix array A[] for the 2nd covariance term in the partial.
/
fti:
Product of the likelihood value for the observations at time t using density for component i (of C) and the corresponding component probability.
/
fti_p:
Partial derivative of fti (defined above) WRT a covariance term from component p (of C) where (p == i). [Note that fti is just a constant when (p != i) since it does not contain
/
the 2nd covariance term in its function.]
/
ftp:
Product of the likelihood value for the observations at time t using density for component p (of C) and the corresponding component probability.
/
Qtijk:
This is the extra term that arises in the numerator when differentiating the density of component i WRT the covariance term (j,k).
/
Qtprs:
This is the extra term that arises in the numerator when differentiating the density of component p WRT the covariance term (r,s).
/
Qtijk_prs: Partial derivative of Qtijk WRT Sigma(p,r,s).
/
gt:
Overall likelihood of all data points using the full multivariate mixture density.
/
gt_prs:
Partial derivative of gt WRT Sigma(p,r,s).
121
/
‐‐‐‐> Note:
If there are n assets then there are n(n‐1)/2 distinct covariance terms within each component and C*n*(n‐1)/2 total distinct covariance terms.
/
/ Outputs:
/
/
This function populates the empty Hessian matrix supplied. The magnitude of the largest element is returned at the call and used to help determine the best step size.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
long double getHessM(const int T, Eigen::VectorXd *rs, const int inUCmps, const int numA, const long double **infVals, const long double *inDNoms, const long double *inPrbs, const Eigen::VectorXd *muMns,
const Eigen::MatrixXd *E, const Eigen::MatrixXd *Einv, const Eigen::MatrixXd *inA, Eigen::MatrixXd *inHess)
{
// Local variables.
//===================
int hr=0, hc, itrAjk, itrArs;
long double fti, fti_p, ftp, Qtijk, Qtprs, Qtijk_prs, gt, gt_prs, q1, q2, q3, maxmag=0.00;
Eigen::MatrixXd *Eijk=new Eigen::MatrixXd [1], *Eprs=new Eigen::MatrixXd [1], *Ejkrs=new Eigen::MatrixXd [1], *Ejksr=new Eigen::MatrixXd [1];
Eijk[0]=Eigen::MatrixXd(numA,numA); Eprs[0]=Eigen::MatrixXd(numA,numA); Ejkrs[0]=Eigen::MatrixXd(numA,numA); Ejksr[0]=Eigen::MatrixXd(numA,numA);
Eigen::MatrixXd q4=Eigen::MatrixXd(numA,numA);
// Populate Hessian matrix.
//===========================
for (int i=0; i<inUCmps; ++i)
{
itrAjk=0;
for (int j=0; j<numA; ++j)
for (int k=j+1; k<numA; ++k)
// 1st covariance term fixed: Cov(i,j,k)
{
hc=0;
// Hessian column entry indicator (0 thru nCovs‐1).
getCofM(numA,j,k,E[i],Eijk);
// Build Eijk.
for (int p=0; p<inUCmps; ++p)
{
itrArs=0;
for (int r=0; r<numA; ++r)
for (int s=r+1; s<numA; ++s)
// 2nd covariance term fixed: Cov(p,r,s)
{
if (hr <= hc)
{
// Unconditional quantities that are not functions of time.
//===========================================================
getCofM(numA,r,s,E[p],Eprs);
// Build Ers.
// Conditional quantities that are not functions of time.
//=========================================================
if (i == p)
/* 2nd covariance term is from the same component. */
{
getCofM(numA,r,s,Eijk[0],Ejkrs);
// Build Ejkrs, conditionally.
getCofM(numA,s,r,Eijk[0],Ejksr);
// Build Ejksr, conditionally.
q1=2.00*(Eijk[0].determinant())*(Eprs[0].determinant())/pow(E[i].determinant(),2);
q2=(Ejksr[0].determinant())/(E[i].determinant());
q3=(Ejkrs[0].determinant())/(E[i].determinant());
q4=Einv[i]*inA[itrAjk]*Einv[i]*inA[itrArs]*Einv[i] + Einv[i]*inA[itrArs]*Einv[i]*inA[itrAjk]*Einv[i];
}
// Initialize the element.
//==========================
inHess[0](hr,hc)=0.00;
// Iterate over the time dimension.
//===================================
for (int t=0; t<T; ++t)
{
// Derive unconditional quantities that are functions of time.
//==============================================================
fti=inPrbs[i]*infVals[t][i];
Qtijk=(0.50)*((rs[t]‐muMns[i]).transpose())*Einv[i]*inA[itrAjk]*Einv[i]*(rs[t]‐muMns[i]) ‐ Eijk[0].determinant()/E[i].determinant();
ftp=inPrbs[p]*infVals[t][p];
122
Qtprs=(0.50)*((rs[t]‐muMns[p]).transpose())*Einv[p]*inA[itrArs]*Einv[p]*(rs[t]‐muMns[p]) ‐ Eprs[0].determinant()/E[p].determinant();
gt=inDNoms[t];
// Derive conditional quantities that are functions of time, including the Hessian value itself.
//================================================================================================
if (i == p)
// 2nd correlation term is from same component.
{
fti_p=fti*Qtprs;
gt_prs=ftp*Qtprs;
if (j == r || k == s)
// 2nd partial WRT term below diagonal only.
Qtijk_prs=q1 ‐ q2 ‐ 0.50*((rs[t]‐muMns[i]).transpose())*(q4)*(rs[t]‐muMns[i]);
else if (k == r)
// 2nd partial WRT term above diagonal only.
Qtijk_prs=q1 ‐ q3 ‐ 0.50*((rs[t]‐muMns[i]).transpose())*(q4)*(rs[t]‐muMns[i]);
else
// 2nd partial WRT term above and below diagonal.
Qtijk_prs=q1 ‐ (q2+q3) ‐ 0.50*((rs[t]‐muMns[i]).transpose())*(q4)*(rs[t]‐muMns[i]);
inHess[0](hr,hc)=inHess[0](hr,hc) + (gt*(fti*Qtijk_prs + fti_p*Qtijk) ‐ (fti*Qtijk)*gt_prs)/pow(gt,2);
}
else
inHess[0](hr,hc)=inHess[0](hr,hc) ‐ (fti*Qtijk*ftp*Qtprs)/pow(gt,2);
}
// Populate corresponding element below the diagonal.
//=====================================================
if (hr < hc)
inHess[0](hc,hr)=inHess[0](hr,hc);
}
hc++;
itrArs++;
// Hessian column entry indicator (0 thru nCovs‐1).
}
}
hr++;
itrAjk++;
}
}
// Delete temporary memory allocations.
//=======================================
delete [] Eijk; Eijk=nullptr;
delete [] Eprs; Eprs=nullptr;
delete [] Ejkrs; Ejkrs=nullptr;
delete [] Ejksr; Ejksr=nullptr;
// Return the magnitude of the largest element.
//===============================================
for (int i=0; i<(int) inHess[0].rows(); ++i)
for (int j=0; j<(int) inHess[0].cols(); ++j)
if (abs(inHess[0](i,j)) > maxmag)
maxmag=abs(inHess[0](i,j));
return maxmag;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: stepHessM.cpp
/
/ Function: stepHessM()
/
/ Summary:
/
/
This function steps in the general direction of steepest ascent for the multivariate mixture likelihood that maintains the marginal mixture densities, using Marquardt (1963). The multivariate
/
mixture likelihood has fixed means, variances, and component probabilities but unknown covariances. The multivariate mixture here is therefore a function of only the unknown covariances, and we
123
/
seek to maximize it. A problem is that the function can have multiple local optimums. Using Marquardt (1963) a constant term of random size is added/subtracted to the diagonals of the
/
correpsonding Hessian matrix prior to solving the updating equations when implementing Newton's method. Adding a large constant results in taking a small step, and adding a small constant results
/
in taking a large step. This method will allow us to take small steps towards the local optimum of the current hill and simultaneously search for larger hills in the general direction of steepest
/
ascent. The minimum step size is set (to zero) in the header file (see minHessAdd) and the maximum step size is set to 10^X where X = # digits in the maximum Hessian element + 2. Within the
/
min/max range a step size is randomly generated for each iteration. The stepping is multi‐threaded (see the wrapper that invokes this function) to save time and the total # of threads used is equal
/
to the # of independent processing units on the PC running the application multiplied by the global constant nCorMult (also set in the header file). Each thread will take a total of mItersH random
/
sized steps, which is also a global constant set in the header file. To cover the step size range from min‐to‐max using a total of nCorMult*(# of independent processing units) threads we first
/
generate a random value of X, between 1 and the maximum # of digits in the largest Hessian element + 2, then generate a step size randomly between 0 and 10^X. At each iteration, a step is taken by
/
adding/subtracting the random step size to the Hessian diagonals and solving the Newton's method updating equations. The decision variables are the U*A*(A‐1)/2 unique covariances, where U = total #
/
multivariate mixture components and A = total # assets. After obtaining the new solution, all corresponding variance‐covariance matrices are confirmed to be positive definite, and if not a ridge
/
repair is immediately performed using a random multiplier between the 2 values (rrMultMin and rrMultMax) specified as global constants in the header file. The decision variables that maximize the
/
likelihood function are returned, as is the maximum log‐likelihood value along with the random step size that generates the maximum. The best solution across all threaded calls is then used for the
/
current iteration of the ECME 2nd Step. After stepping finishes, processing returns to the top of the 2nd Step and the 2nd Step gradient and Hessian are rebuilt for another iteration (in ECMEAlg()).
/
/ Inputs:
/
/
1.) Input supplied to this function as a 4‐element integer array. The element at position [0] is the # of time points with data. The element at position [1] is the # of unique componenents in the
/
current multivariate mixture solution. The element at position [2] is the current thread # determined by the function that generates threaded calls. The thread # is only used within this
/
function for reporting results to the output window, for example during debugging. The element at position [3] is an indicator that the current thread has launched. (inHess1)
/
/
2.) Input/output both supplied to this function and generated by this function as a 5‐element long double array. Elements at positions [0], [1], [2] are input parameters and elements at positions
/
[3] and [4] are output generated by this function and returned to the calling function. The input at position [0] is the current optimal log‐likelihood value we are attempting to improve upon
/
during this ECME 2nd Step iteration. Input at position [1] is the step size, and the input at position [2] is the starting value for stepping in this threaded call. Elements at positions [3]
/
and [4] are placeholders for return values. The maximum log‐likelihood value found during this stepping iteration is returned in element [3], and the step size multiplier that generates this
/
maximum is returned in element [4]. (inHess2)
/
/
3.) The array of vector returns at each time point indexed as rs[t](a). There are T vectors of returns and each is of size numA, where numA=# assets. (rs)
/
/
4.) The current vector of 2nd Step decision variables (i.e., all covariances), as an array of 4 elements. The vector at indices [0] and [2] hold the current covariance estimates. The vector at
/
index [3] holds the returned estimates that maximize the log‐likelihood for this function call. The vector at position [1] holds the updated covariance estimates derived at each step. (inDvars)
/
/
5.) The current gradient vector evaluated at the current values of the covariance estimates (i.e., decision variables). (inGrad)
/
/
6.) The current Hessian matrix evaluated at the current values of the covariance estimates (i.e., decision variables). (inHess)
/
/
7.) The current vector of multivariate mixture probabilities. (Initial values are from either the Minimax or Minimum SSD LP optimizations.) (uPrbs)
/
/
8.) The array of mean vectors. Each component of the multivariate mixture density is a multivariate density function which has its own set of means. The first element of this array is the vector
/
of means for the first multivariate component, etc... (muMns)
/
/
9.) The array of VC matrices. Each component in the multivariate mixture density is a multivariate density function with a corresponding VC matrix. Each VC matrix is of dimension (numA)x(numA).
/
The diagonals of each VC matrix are the corresponding variances for that asset within that component. (inVCs)
/
/ Outputs:
/
/
This function updates element [3] of incoming parameter inDvars[] array with the covariance estimates that maximize the log‐likelihood during this stepping iteration. In addition, elements at
/
positions [3] and [4] of incoming array inHess2 are updated with the maximum value of the log‐likelihood, and the step size multiplier that maximizes the log‐likelihood, respectively.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
void stepHessM(int *inHess1, long double *inHess2, const Eigen::VectorXd *rs, Eigen::VectorXd *inDvars, const Eigen::VectorXd inGrad, const Eigen::MatrixXd inHess, const Eigen::VectorXd uPrbs, const
Eigen::VectorXd *inMns, const Eigen::MatrixXd *inVCs)
{
// Declare/initialize local variables.
//======================================
Eigen::initParallel();
int rpr, nA=(int) inMns[0].size(), inT=inHess1[0], inUCmps=inHess1[1], hMaxLen=inHess1[4], expon, curExp;
long double hIdx=1.00, hmult, curMaxLL=inHess2[0], LL, picst=exp(((double) (nA/2.00))*log(2.00*pi)), *sq_dets=new long double [inUCmps], *d_nom=new long double [inT], **f_vals=new long double
*[inT], strt=inHess2[2], jmp, curMaxMult=strt, mult;
random_device rd; default_random_engine gen(rd());
uniform_real_distribution<long double> udist(0.0,1.0);
Eigen::MatrixXd *Idm=new Eigen::MatrixXd [1], tHessM(inHess.rows(),inHess.cols()), *VC_Inv=new Eigen::MatrixXd [inUCmps], *V_C=new Eigen::MatrixXd [inUCmps];
Idm[0]=Eigen::MatrixXd(inHess.rows(),inHess.cols()); getIDM(Idm);
// Size the array holding all component likelihood values at all time points.
//=============================================================================
124
for (int t=0; t<inT; ++t)
f_vals[t]=new long double [inUCmps];
// Size the local VC and inverse matrices.
//==========================================
for (int v=0; v<inUCmps; ++v)
{
V_C[v]=Eigen::MatrixXd(nA,nA);
V_C[v]=inVCs[v];
VC_Inv[v]=Eigen::MatrixXd(nA,nA);
}
// Initialize the covariance maximizers to the starting values. (Write details when debugging.)
//================================================================================================
inDvars[3]=inDvars[0];
if (dbug <= 1)
{
cout << ".";
inHess1[3]=1;
}
else if (dbug >=2)
{
if (0 == inHess1[2])
cout << endl;
cout << "Launching thread # " << inHess1[2] << endl;
}
// Set the multiple for variance‐covariance matrix repairs. This applies to all steps.
//=======================================================================================
mult = rrMultMin + udist(gen)*(rrMultMax ‐ rrMultMin);
// Iterate using the Hessian and solve for new covariances.
//===========================================================
for (int i=0; i<mItersH; ++i)
{
// Hessian has element with maximum length equal to hMaxLen digits. Randomly select value between 1 and this # to use as the max for stepping.
//===============================================================================================================================================
expon = 1 + (int) (udist(gen)*((double) hMaxLen));
jmp = pow(10.0,expon);
hmult = minHessAdd + udist(gen)*jmp;
if (udist(gen) <= 0.50)
{
hmult=‐1.00*hmult;
expon=0‐expon;
// Indicate the sign/direction. (Value of ‐10 means exponent of 10 used for backward stepping.)
}
tHessM=inHess + hmult*Idm[0];
inDvars[1]=tHessM.colPivHouseholderQr().solve(‐1.00*udist(gen)*inGrad);
inDvars[0]=(inDvars[1]+inDvars[2]);
// Check that the new covariance estimates yield PD VC matrices. (Repair if broken, and update the corresponding vector of current decision variables.)
//========================================================================================================================================================
rpr=0;
for (int v=0; v<inUCmps; ++v)
{
setCovs(v,V_C,inDvars);
rpr=rpr + ridgeRpr(v,V_C,mult);
VC_Inv[v]=V_C[v].inverse();
sq_dets[v]=sqrt(VC_Inv[v].determinant());
}
LL=getLFVals(inT,nA,inUCmps,rs,uPrbs,inMns,VC_Inv,sq_dets,picst,d_nom,f_vals);
if (rpr > 0)
getCovs(inUCmps,V_C,inDvars);
125
// Check vs existing maximum LL. If larger, then update the current maximum and covariance array.
//==================================================================================================
if (LL > curMaxLL)
{
curMaxLL=LL;
curMaxMult=hmult;
inDvars[3]=inDvars[0];
curExp=expon;
inHess1[6]=rpr;
}
}
// Return the maximum log‐likelihood value along with the mutliplier that generated it. (Write details when debugging.)
//========================================================================================================================
inHess2[3]=curMaxLL;
inHess2[4]=curMaxMult;
inHess2[6]=mult;
inHess1[5]=curExp;
if (dbug <= 1)
inHess1[7]=1;
else if (dbug >= 2)
cout << "Done with thread # " << inHess1[2] << " which started at: " << strt << " maximum LL is: " << curMaxLL << endl;
// Delete temporary memory allocations.
//=======================================
delete [] Idm; Idm=nullptr;
delete [] d_nom; d_nom=nullptr;
delete [] sq_dets; sq_dets=nullptr;
delete [] V_C; V_C=nullptr;
delete [] VC_Inv; VC_Inv=nullptr;
for (int t=0; t<inT; ++t)
{
delete [] f_vals[t]; f_vals[t]=nullptr;
}
delete [] f_vals; f_vals=nullptr;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: ridgeRpr.cpp
/
/ Function: ridgeRpr()
/
/ Summary:
/
/
This function accepts a variance‐covariance matrix as input and determines whether or not it is positive‐definite. If not, it performs a ridge repair to make the matrix positive definite. To
/
determine whether or not the matrix is positive definite, an eigenvalue decomposition is performed. If all eigenvalues are > 0 then the matrix is positive definite. A necessary and sufficient
/
condition for a variance‐covariance matrix to be valid is that it is positive definite. To perform a ridge repair, the diagonal elements are all multiplied by the same constant value (> 1). Since
/
the diagonals are the variances, this implies that we increase the variances. Doing so will automatically reduce the size of the covariances relative to the variances. It will also reduce the
/
magnitude of the correlations. The covariances are the correlations multiplied by the standard deviations. That is, Cov(X,Y) = rho*std(X)*std(Y). When std(X) and std(Y) increase and Cov(X,Y)
/
remains constant the correlations decrease in magnitude. If the constant multiplier is large enough we will drive the correlations to near zero, and at this point the covariances will be extremely
/
small relative to the variances. The resulting matrix approaches a diagonal matrix which is positive definite. The point is to use a small multiplier and increase it iteratively until the repaired
/
matrix becomes positive definite and then scale it back so that the variances are undisturbed, but the off‐diagonal elements are smaller relative to the diagonal elements. If a matrix is positive
/
definite, then that matrix multiplied by a constant is also positive definite (easily proven with the definition of positive definite). The initial multiplier is randomly generated in the calling
/
function and bounded by the global constants rrMultMin and rrMultMax, which are set in the header file. This function iterates, multiplying the diagonals by (1.00 + i*rrmult) and checking for
/
positive definiteness after each iteration ("i" is the iteration index). A variance‐covariance matrix that is badly broken (for example with a correlation term > 100, when all such quantities
/
should be between ‐1.00 and +1.00) may require a large number of iterations to repair. Therefore, to speed up processing we increase the multiplier by a factor of 10 after each 100 iterations.
/
That is, after 100 iterations rrmult is multiplied by 10, and again after 200 iterations, etc... Note that The variance‐covariance matrix supplied to this function is a modifiable value and is
/
updated in place with care taken to ensure that the diagonals are not disturbed when it is returned.
/
126
/ Inputs:
/
/
A single variance‐covariance matrix is supplied to this function using 2 inputs: (1) An array of variance‐covariance matrices and (2) an index to identify the one we are checking for positive‐
/
definiteness, and repairing if necessary.
/
/
1.) The index that identifies the variance‐covariance matrix to be checked/repaired. (uCell)
/
/
2.) The array of variance‐covariance matrices for the current multivariate mixture solution. (E)
/
/
3.) The multiple used to add a ridge. (mult)
/
/ Outputs:
/
/
This function returns an integer value of 1 or 0. A 1 is returned if the variance‐covariance matrix is repaired, and a 0 is returned if it is not in need of repair.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
int ridgeRpr(const int uCell, Eigen::MatrixXd *E, long double mult)
{
// Local variables.
//===================
Eigen::initParallel();
int pd, retvar=0;
long double sclfctr, rr_mult=mult, det;
Eigen::EigenSolver<Eigen::MatrixXd> egnslvr;
Eigen::MatrixXd newVCm((int) E[uCell].rows(),(int) E[uCell].cols());
// Is the VC matrix Positive‐definite as required? If not, repair it.
//======================================================================
egnslvr.compute(E[uCell], false);
pd=1; det=1.0;
for (int a=0; a<(int) E[uCell].rows(); ++a)
{
if (egnslvr.eigenvalues()[a].real() <= pdmineval)
pd=0;
det=det*egnslvr.eigenvalues()[a].real();
}
if (det <= detminval)
pd=0;
// Repair is necessary.
//=======================
if (0 == pd)
{
// VC matrix is not positive definite and a ridge repair will be performed.
//===========================================================================
newVCm=E[uCell];
// Repair the matrix.
//=====================
for (int i=1; 0==pd; ++i)
{
// Increase each variance by a factor > 1 and rescale.
//======================================================
sclfctr=(1 + ((double) i)*rr_mult);
for (int r=0; r<(int) E[uCell].rows(); ++r)
for (int c=0; c<(int) E[uCell].cols(); ++c)
if (r != c)
newVCm(r,c)=E[uCell](r,c)/sclfctr;
// Check if the updated VC matrix is positive‐definite.
//=======================================================
egnslvr.compute(newVCm, false);
pd=1; det=1.0;
for (int a=0; a<(int) E[uCell].rows(); ++a)
{
127
if (egnslvr.eigenvalues()[a].real() <= pdmineval)
pd=0;
det=det*egnslvr.eigenvalues()[a].real();
}
if (det <= detminval)
pd=0;
// Increase the scale factor by a multiple of 10 each 100 iterations.
//=====================================================================
if (0 == (int) (i % 100))
rr_mult=10*rr_mult;
}
// Replace the original VC matrix with the repaired version.
//============================================================
E[uCell]=newVCm;
retvar=1;
}
// If the VC matrix has been repaired return a 1, otherwise return a 0.
//=======================================================================
return retvar;
}
/*
/ Copyright (C) 2016 Chris Rook
/
/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License,
/ or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
/ PARTICULAR PURPOSE. See the GNU General Public License for more details: <http://www.gnu.org/licenses/>
/
/ Filename: wrtDens.cpp
/
/ Function: wrtDens()
/
/ Summary:
/
/
This function writes out the structure of the final multivariate density along with the actual values contained in that structure. The output has 2 parts: 1.) the structure, which is a sum of
/
multivariate normal densities weighted by the corresponding component probability using parameters, and 2.) details of the parameter values. For each component, the definitions include the actual
/
component probability, the mean vector, the variance‐covariance matrix, and the unique cell that this component originates from with respect to the full factorial of combinations defined after
/
fitting the univariate mixture densities. Finally, the inverse of the variance‐covariance matrix is printed as is the rank and the determinant. This function can be used to write the supplied
/
density to either standard output (using cout in the last parameter), or a file (using an ofstream fout definition in the last parameter).
/
/ Inputs:
/
/
1.) Specify the type of starting point when transitioning between univariate marginal densities and the multivariate mixture PDF. In this application we offer 2 transition methods: Minimax or
/
Minimum Sum of Squared Distances (SSD). Each are solved as constrained linear programs (LPs). The constraints maintain the univariate marginal mixture densities. This string variable takes
/
one of two values: "Minimax" or "Minimum Sum of Squared Distances (SSD)". This is for display purposes only and informs the user which transition method was used for the given multivariate
/
density function being written. (typ)
/
/
2.) The number of unique components in the multivariate mixture that results from either the Minimax or Minimum SSD LP optimization starting points. (nUCmps)
/
/
3.) The array of unique cell IDs that link each component of the multivariate density back to the full factorial of components. The full factorial of components represents each cell in the
/
multidimensional grid formed by considering all combinations of assets and their levels. (Note that the full factorial would be required to build a multivariate mixture density with given
/
marginals under the assumption that the assets were all mutuallly independent random variables (RVs).) (uCellIDs)
/
/
4.) The array of final multivariate mixture component probabilities. (muPrbs)
/
/
5.) The array of mean vectors. Each component of the multivariate mixture density is a multivariate density function which has its own set of means. The first element of this array is the vector of
/
means for the first multivariate component, etc... (muMns)
/
/
6.) The array of VC matrices. Each component in the multivariate mixture density is a multivariate density function with a corresponding VC matrix. Each VC matrix is of dimension (numA)x(numA),
/
where numA = total # of assets. The diagonals of each VC matrix are the corresponding variances for that asset within that component. (muVCs)
/
/
7.) The output destination as a variable reference. Use either "cout" for display to the screen or a valid ofstream output object. (oVar)
128
/
/ Outputs:
/
/
The density supplied to this function is written to the output desination supplied in 2 parts. First, the structure of the density is written using parameters followed by a detailed definition of
/
those parameters. No value is returned at the call.
/*********************************************************************************************************************************************************************************************************/
#include "stdafx.h"
void wrtDens(const string typ, const int nUCmps, const int *uCells, const long double *muPrbs, const Eigen::VectorXd *muMns, const Eigen::MatrixXd *muVCs, ostream& oVar)
{
// Local variables.
//===================
long long w=to_string((long long) nUCmps).size();
string ps="";
int ln=135;
if ("Minimum Sum of Squared Distances (SSD)" == typ)
ln=ln+20;
// Start by writing the structure of the multivariate density, without actual details of the values for the means, variances, covariances, and component probabilities.
//=======================================================================================================================================================================
oVar << endl << string(ln,'=') << endl << "The structure of the multivariate density function for the supplied assets using an initial " << typ << " LP objective is given by: "
<< endl << string(ln,'=') << endl << endl;
for (int v=0; v<nUCmps; ++v)
{
oVar << ps << "p" << setfill('0') << setw(w) << v << "*" << "f(m" << setfill('0') << setw(w) << v << ",V" << setfill('0') << setw(w) << v << ")";
ps=" + ";
if (0 == ((1 + v) % 5))
oVar << endl;
}
// Write out the details for each component. That is, the means, variances, covariances, and component probabilities.
//=======================================================================================================================
oVar << endl << endl << string(112,'=') << endl << "Where values for the multivariate normal pdfs f(m,V) with mean vector m and " << "variance‐covariance matrix V, are:"
<< endl << string(112,'=') << endl;
oVar.setf(ios_base::fixed, ios_base::floatfield); oVar.precision(30);
for (int v=0; v<nUCmps; ++v)
oVar << endl << string(35,'=') << endl << "Component #" << v << " is unique cell #" << uCells[v] << endl << string(35,'=') << endl << "p" << setfill('0') << setw(w)
<< v << " = " << muPrbs[v] << endl << "m" << setfill('0') << setw(w) << v << " = " << endl << muMns[v] << endl << "V" << v << " = " << endl << muVCs[v] << endl
<< "V" << v << setfill('0') << setw(w) << "^(‐1) = " << endl << muVCs[v].inverse() << endl << "‐‐> The rank of V" << v << " is: "
<< (int) Eigen::FullPivLU<Eigen::MatrixXd>(muVCs[v]).rank() << " and the determinant is: " << muVCs[v].determinant() << endl;
}
129
| 5cs.CE
|
Almost Hyperbolic Groups with Almost Finitely
Presented Subgroups
arXiv:1802.01658v1 [math.GR] 5 Feb 2018
Robert Kropholler
February 7, 2018
Abstract
We construct new examples of CAT(0) groups containing non finitely
presented subgroups that are of type F P2 , these CAT(0) groups do not
contain copies of Z3 . We also give a construction of groups which are of
type Fn but not Fn`1 with no free abelian subgroups of rank greater than
r n3 s.
1
Introduction
Subgroups of CAT(0) groups can be shown to exhibit interesting finiteness properties. In [2] there are examples of groups satisfying Fn but not Fn`1 for all n as
well as the first examples of groups of type F P2 that are not finitely presented
answering a question of Brown.
Definition 1.1. A group G satisfies property Fn , if there is a classifying space
KpG, 1q with finite n skeleton.
Definition 1.2. A group G is of type F Pn if there is a partial resolution of the
trivial ZG module,
Pn
...
P1
P0
Z
0
where Pi is a finitely generated projective ZG module.
It can easily be seen that F1 is equivalent to finite generation and F2 is
equivalent to finite presentability. In [2] the groups are kernels of maps φ : G Ñ
Z where G is a right angled Artin group, the finiteness properties of the kernel
depend solely on the defining flag complex for the right angled Artin group.
The construction of groups of type F P2 that are not finitely presented are
contained in right angled Artin groups having free abelian subgroups of rank 3.
Since [2] there have been other constructions of groups with subgroups of type
F P2 not F2 see [?, 10]. In many cases these groups are subgroups of groups G
of type F , in these cases the maximal rank of a free abelian subgroup of G is at
least 3. We construct the first examples of groups of type F containing no free
abelian subgroups of rank 3 containing a subgroup of type F P2 that is not F2 .
Theorem A. There exists a non positively curved space X such that π1 pXq
contains no subgroups isomorphic to Z3 , which contains a subgroup of type F P2
not F2 .
1
The groups constructed in [2] which are of type Fn´1 not Fn all contain a free
abelian subgroup of rank n ´ 1. Brady asked in [?, Question 8.5] whether there
exist groups of type Fn´1 but not Fn which do not contain Z2 ; he notes that
the known examples all contain Zn´2 . While we are not able to find examples
without Z2 , we reduce the bound to a fraction of n.
Theorem B. For every positive integer n, there exists a group of type Fn´1
but not Fn that contains no abelian subgroups of rank greater than r n3 s.
In the future, we would like to extend these theorems, giving examples of
hyperbolic groups with such subgroups.
The author would like to thank Federico Vigolo for kindly helping draw
several of the figures contained within. The author would also like to thank
Martin Bridson and Gareth Wilkes for reading earlier drafts of this paper and
providing helpful and constructive comments.
2
Preliminaries
2.1
Cube Complexes
A cube complex can be constructed by taking a collection of disjoint cubes and
gluing them together by isometries of their faces.
There is a standard way in which cube complexes can be endowed with
metrics. There is a well known criterion of [7] that characterises those cube
complexes that are locally CAT(0).
The precise definition of a cube complex is given in [5, Def. 7.32] as follows.
Definition
2.1. A cube complex X is a quotient of a disjoint union of cubes
Ů
K “ C r0, 1snc by an equivalence relation „. The restrictions χc : r0, 1snc Ñ X
of the natural projection χ : K Ñ X “ K{ „ are required to satisfy:
• for every c P C the map χc is injective;
• if χc pr0, 1snc q X χc1 pr0, 1snc1 q ‰ H, then there is an isometry hc,c1 from a
1
face Tc Ă r0, 1snc onto a face Tc1 Ă r0, 1snc such that χc pxq “ χc1 px1 q if
1
and only if x “ hc,c1 pxq.
Definition 2.2. A metric space is non-positively curved if its metric is locally
CAT(0)
Gromov’s insight allows us to easily check whether a P E complex is nonpositively curved.
Lemma 2.3 (Gromov, [7], p. 120). A P E complex is non-positively curved if
and only if the link of each vertex is a CAT(1) space.
In a cube complex the link of each vertex is a spherical complex built from
all-right speherical simplices (see [5, §5.18]). Gromov realised that an all-right
spherical complex is CAT(1) if and only if it is flag.
Definition 2.4. A complex L is a flag complex if it is simplicial and every set
tv1 , . . . , vn u of pairwise adjacent vertices spans a simplex.
2
Flag complexes are completely determined by their 1-skeleta.
Thus we arrive at the following combinatorial condition for cube complexes.
Lemma 2.5 (Gromov, [7]). A cube complex is non-positively curved if the link
of every vertex is a flag complex.
We wish to limit the rank of free abelian subgroups, in fact we will limit
the largest dimension of an isometrically embedded flat. The following theorem
shows that in the CAT(0) world the maximal dimension of a flat is the same as
the maximal rank of a free abelian subgroup.
Theorem 2.6 (Bridson-Haefliger, [5], II.7). Let X be a compact non positively
curved cube complex, X̃ its universal cover and G “ π1 pXq. If H “ Zn is a
subgroup of G, then there is an isometrically embedded copy of i : Rn ãÑ X̃.
Moreover, the quotient ipRn q{H is an n-torus
Finally we would like to know when a cube complex is hyperbolic. Bridson
shows that the only obstruction is containing an isometrically embedded flat.
Theorem 2.7 (Bridson, [4], Theorem A). Let X be a compact non-positively
curved cube complex and X̃ be its universal cover. X̃ is not hyperbolic if and
only if there exists an isometric embedding i : E2 ãÑ X̃.
2.2
Right angled Artin groups
Right angled Artin groups have been at the centre of a lot of recent study,
particularly because of their interesting subgroup structure [1, 2, 8, 12]. In particular, their subgroups have interesting connections with finiteness properties
of groups, as shown in [2]. For completeness, we recall the basic theory of right
angled Artin groups.
Definition 2.8. Given a flag complex Γ, we define the associated right angled
Artin group (RAAG) AΓ , as the group,
ˇ
@
D
AΓ “ Γp0q ˇ rv, ws “ 1 if rv, ws P Γp1q .
These groups have non-positively curved cube complexes as classifying spaces,
which are unions of tori:
Definition 2.9. Given a flag complex Γ the Salvetti complex SΓ is defined as
follows.
For each vertex vi in Γ, let Sv1i “ S 1 be a copy of the circle cubulated with
1 vertex. For each simplex σ “ rv0 , . . . , vn s of Γ there is an associated torus
Tσ “ Sv10 ˆ ¨ ¨ ¨ ˆ Sv1n . If τ ă σ, then there is a natural inclusion Tτ ãÑ Tσ . Now
define
O
ž
SΓ “
Tσ „
σăΓ
where the equivalence relation „ is generated by the inclusions Tτ ãÑ Tσ .
p0q
There is a map SΓ Ñ pS 1 qΓ sending each circle in SΓ to the respective
p0q
circle in pS 1 qΓ and extending linearly over cubes; this map is an inclusion of
cubical complexes.
It is a standard fact that SΓ has fundamental group AΓ and is a nonpositively curved cube complex. Proofs of the following can be found in [2].
3
Lemma 2.10. π1 pSΓ q “ AΓ .
Lemma 2.11. SΓ is non-positively curved.
2.2.1
A new classifying space
We will construct a new classifying space, which will also be a non-positively
curved cube complex and will be more amenable to taking branched covers. We
will build such a classifying space in the case that the flag complex satisfies the
following condition.
Definition 2.12. A simplicial complex Γ has an n-partite structure if Γ is
contained in the join V1 ˚ ¨ ¨ ¨ ˚ Vn of several discrete sets Vi . In the case n “ 2
we will say bipartite and in the case n “ 3, tripartite.
Any finite simplicial complex can be given an n-partite structure as a subcomplex of a simplex.
We define a cube complex KΓ for an n-partite complex Γ as follows.
i
Let Vi “ tv1i , . . . , vm
u and I “ t1, . . . , nu. For each vertex vki , let Sv1i be a
i
k
copy of S 1 cubulated with two vertices labelled 0 and 1, and two edges evki and
ev0i .
Definition 2.13. Given J P PpIq, J “ ti1 , . . . , il u, we say that σ is a J-simplex
if it is of the form rvki11 , . . . , vkill s.
Remark 1. Every simplex is a J simplex for some unique (possibly empty) J.
For each J-simplex σ “ rvki11 , . . . , vkill s in Γ we associate the following space.
˜
¸ ˜
¸
ź
ź
Sv1 ˆ
ev0i .
Tσ “
vPσ
iRJ
This is the product of a torus and a cube.
š
Let TJ “ tTσ : σ is a J-simplexu and T “ JPPpIq TJ . Given simplices
τ ă σ there is a natural inclusion Tτ ãÑ Tσ .
O
ž
KΓ “
T „.
T PT
Where once again the equivalence relation is generated via the inclusions
Tτ Ñ Tσ . We need to prove the two key lemmata: the fundamental group of
KΓ is AΓ , and KΓ is non-positively curved.
Lemma 2.14. π1 pKΓ q “ AΓ .
Proof. Apply the Seifert-van Kampen Theorem repeatedly.
Lemma 2.15. KΓ is non-positively curved.
Proof. There are 2n vertices in KΓ . Given two vertices v, w there is a cellular
isomorphism KΓ Ñ KΓ which sends v to w. Thus we only need to check the
link of one vertex; we will check the link of 0 “ p0, . . . , 0q. Let L “ Lkp0, KΓ q.
Let Vi “ Vi Y tv0i u.
š
There is a vertex in L for each edge at 0, so Lp0q “
Vi . Two distinct
vertices vki11 and vki22 are connected if one of the following conditions holds:
4
1. k1 “ 0, k2 “ 0,
2. k1 “ 0, i1 ‰ i2 ,
3. i1 ‰ i2 , k2 “ 0,
4. rvki11 , vki22 s is an edge of Γ.
These edges come from the following subcomplexes.
1. TH ,
2. Tvi1 ,
k1
3. Tvi2 ,
k2
4. Trvi1 ,vi2 s .
k1
k2
This tells us that L Ă V1 ˚ ¨ ¨ ¨ ˚ Vn . We now want to prove that L is in
fact a flag complex. Given a set W “ tvki11 , . . . vkill u of pairwise adjacent vertices
in L we want to show that rvki11 , . . . vkill s is also in L. We split W into two sets
(
i
W0 “ vkjj : kj “ 0 and W1 “ W r W0 “ tw1 , . . . , wa u. Since the vertices in
W1 are pairwise adjacent there is a simplex σ Ă Γ spanning them. We see that
the subcomplex Tσ contains an pl ` 1q-cell which fills the required simplex in
L.
It should be noted the natural projections are injective on each closed cube
and not just on the interior.
Remark 2. The complex KΓ requires a choice of n-partite structure. Given
two n-partite structures the complexes are homotopy equivalent but are not
isomorphic as cube complexes. This is shown in Figure 1, together with some
examples of the construction.
Remark 3. Let Θi be a “cage graph” with two vertices that has an edge
śn for each
element of Vi , then the complex KΓ constructed above embeds in i“1 Θi .
This fact will come in useful later, as will the fact that in the case n “ 3
there is an embedded copy of Θ1 > Θ2 > Θ3 in KΓ .
2.2.2
Finiteness properties of subgroups of RAAGs
We will require one theorem on the finiteness properties of subgroups of RAAGs
from [?]. A homomorphism f : AΓ Ñ Z can be defined by putting an integer
label on each vertex and sending the corresponding generator of AΓ to its label.
Definition 2.16. Let f : AΓ Ñ Z be a homomorphism. We denote Γ: ă Γ
the full subcomplex spanned by those vertices with label 0. Let L˚ be the full
subcomplex spanned by vertices not in Γ: .
Theorem 2.17 (Bux-Gonzalez [?], Theorem A). Let f : AΓ Ñ Z be a homomorphism. Then the following are equivalent:
• The kernel of f is of type F Pn , respectively F2 .
• For every, possibly empty, dead simplex σ ă Γ: the complex Γ˚ X Lkpσ, Γq
is homologically pn ´ dimpσq ´ 2q-connected, respectively L˚ is simply connected.
5
KΓ
Γ
1
1
1
2
1
2
1
2
Y
Figure 1: Some examples of KΓ . The labels on vertices exhibit the n-partite
structure. In the last example the shaded regions are identified.
6
2.3
Branched Covers of Cube Complexes
We will take branched covers of cube complexes to get rid of high dimensional
flats. The techniques we will use were developed in [3]. The idea is to take an
appropriate subset which intersects the high dimensional flats.
Definition 2.18. Let X be a non-positively curved cube complex. We say that
Y Ă X is a branching locus if it satisfies the following conditions:
1. Y is a locally convex cubical subcomplex,
2. Lkpc, Xq r Y is connected and non-empty for all cubes c in Y .
The first condition is required to prove that non-positive curvature is preserved when taking branched covers. The second is a reformulation of the the
classical requirement that the branching locus has codimension 2 in the theory
of branched covers of manifolds, ensuring that the trivial branched covering of
X is X.
Definition 2.19. A branched cover X̂ of X over the branching locus Y is the
result of the following process.
1. Take a finite covering X r Y of X r Y .
2. Lift the piecewise Euclidean metric locally and consider the induced path
metric.
3. Take the metric completion X̂ of X r Y .
We require some key results from [3] which allow us to conclude that this
process is natural and that the resulting complex is still a non-positively curved
cube complex.
Lemma 2.20 (Brady, [3], Lemma 5.3). There is a natural surjection b : X̂ Ñ X
and X̂ is a piecewise Euclidean cube complex.
Lemma 2.21 (Brady, [3], Lemma 5.5). If Y is a finite graph, then X̂ is nonpositively curved.
3
Hyperbolisation in dimension 2
This section will be a warm up to our key theorems which are all related to
dimension 3. The lower dimensional case carries a lot of the ideas that will be
used later.
Throughout this section Γ will be a bipartite graph; say Γ Ă V1 ˚ V2 . Let
i
Vi “ tv1i , . . . , vm
u. Let Θi be the graph with two vertices, labelled 0 and 1,
i
i
, all directed from 0 to 1. We noted
and |Vi | ` 1 edges, labelled v0i , v1i , . . . , vm
i
in Remark 3 that the complex KΓ constructed in Section 2.2.1 is a subcomplex
of Θ1 ˆ Θ2 .
Theorem 3.1. Let Γ be a bipartite graph, let AΓ be the associated RAAG and
let KΓ be the classifying space constructed in Section 2.2.1. Then there is a
branched cover RΓ of KΓ which has hyperbolic fundamental group.
7
vk1
vl1
vk1
p0, 0q
ù
vl1
2
vm
vn2
2
vm
vn2
Figure 2: Depiction of the deformation retraction T 2 r tp0, 0qu Ñ S 1 _ S 1 .
There are in fact many branched covers delivering this result. During the
course of the proof we will pick a prime p and as this varies different hyperbolic
branched covers are obtained.
Proof. The branching locus will be one of the 4 vertices of KΓ . Given two
vertices v and w there is a homeomorphism of KΓ which sends v to w. Therefore,
it does not matter which vertex we pick to be our branching locus. We will
choose the vertex 0 “ p0, 0q.
KΓ r t0u deformation retracts onto the graph Θ1 _ Θ2 . This can be seen
as follows. We start with a torus cubulated as in Figure 2. From each torus
we remove the center vertex. The complement deformation retracts onto the
graph depicted in Figure 2. We now identify the edges via their labels, which
will result in Θ1 _ Θ2 .
This argument shows that π1 pKΓ r t0uq is a free group on |V1 | ` |V2 | gen1
erators. We will denote these generators ai “ vi´1
vi1 for i P t1, . . . , |V1 |u and
2
bj “ vj´1
vj2 for j P t1, . . . , |V2 |u.
From the deformation described we get a map Lkp0, KΓ q Ñ Θ1 _ Θ2 . Each
loop of length 4 in Lkp0, KΓ q corresponds to a torus as in Figure 2. Under the
deformation retraction this gets
sent to aśloop in Θ1 _ Θ2 corresponding to the
śk`l
m`n
2 2
vn s “ r i“k`1 ai , j“m`1 bj s.
commutator rvk1 vl1 , vm
Let p ą 1 ` maxp|V1 |, |V2 |q be a prime and Sp be the symmetric group on
p letters. Let λ be a p-cycle in Sp and µ an element which conjugates λ to λr ,
where r is a generator of Zˆ
p . We define our cover using the map,
ρ : π1 pΘ1 _ Θ2 q Ñ Sp ,
ai ÞÑ λ,
bj ÞÑ µ,
taking the cover corresponding to the stabiliser of 1 in Sp .
n
Note that the commutator rλm , µn s “ λpr ´1qm is a p-cycle. This means
that the loops of length 4 in the link have connected preimage in the cover.
We take the completion RΓ of the resulting complex; there is a natural map
b : RΓ Ñ KΓ . The link of the vertex which maps to 0 will contain no cycles of
length ă 5.
8
We now prove that the resulting complex has hyperbolic universal cover.
rΓ is a non-positively curved cube complex. So to prove that
We know that R
it is hyperbolic we just have to show that there are no isometric embeddings
E2 Ñ R˜Γ by Theorem 2.7. If there is such an embedding, then it will contain
at least one square 2-cell. However, each square contains one vertex which is a
lift of 0 and in the link of this vertex there are no loops of length 2π. However,
were the flat plane to be isometrically embedded there would be a loop of length
2π in the link of every vertex on the plane. This contradiction completes the
proof.
We use this theorem along with Morse theoretic ideas from Section 5 to find
more examples of hyperbolic groups with finitely generated subgroups that are
not finitely presentable.
Proposition 3.2. Let Γ be a complete bipartite graph on sets A “ ta1 , a2 , a3 u
and B “ tb1 , b2 , b3 u, fix p satisfying the above hypotheses and let b : RΓ Ñ KΓ
be the branched cover constructed above. Then π1 pRΓ q has a finitely generated
subgroup which is not finitely presentable.
Proof. In this case KΓ “ Θ1 ˆ Θ2 where Θi is as above and has 4 edges. Put an
orientation on each edge of Θi such that there are 2 edges oriented towards each
vertex and 2 edges oriented away from each vertex. Cubulating S 1 with one
vertex and one oriented edge. Define maps hi : Θi Ñ S 1 on each edge by their
orientation. Define h : KΓ Ñ S 1 by hpx1 , x2 q “ h1 px1 q ` h2 px2 q. Precomposing
with the branched covering map b and lifting to universal covers, we obtain a
Morse function f : R̃Γ Ñ R, which is phbq˚ -equivariant.
The ascending and descending links of this Morse functions are the preimages, under b, of the ascending and descending links of h. For the Morse function
h the ascending and descending links are joins of the ascending and descending
links for hi . These will be copies of S 0 , so the ascending and descending links
will be copies of S 1 .
There are now two possibilities, if we look at a vertex in RΓ which does not
map to 0 the ascending and descending links will remain unchanged and will
still be copies of S 1 .
If the vertex in question maps to 0 we will study the ascending link the other
case being identical. The ascending link of 0 is a loop of length 4. Taking a
branched cover cause this loop of length 4 to lengthen but in the preimage it
will still be a copy of S 1 . It follows that the kernel of phbq˚ is finitely generated
but not finitely presentable by 5.9.
Sizeable graphs are used in [9] to give examples of hyperbolic groups with
subgroups which are type F2 not F3 . Here we outline a procedure for producing
examples of sizeable graphs.
Proposition 3.3. Let A and B be sets with partitions A “ A` \ A´ and
B “ B ` \ B ´ where A´ , B ´ are non-empty and |A` |, |B ` | ą 1. Let Γ be
the complete bipartite graph on A and B. Let AΓ be the associated right angled
Artin group, KΓ the classifying space from 2.13 and RΓ the branched covering
constructed in Theorem 3.1. Let v P RΓ be a vertex mapping to p0, 0q. Then
Lkpv, RΓ q is sizeable.
9
Proof. The link of a vertex is a cover Λ of the graph Λ. Λ is the complete
bipartite graph on sets A1 “ A Y ta0 u and B 1 “ B Y tb0 u. Define A1` “ A` and
A1´ “ A1 r A1` , defining B 1` and B 1´ similarly.
The graph Λ has the following properties. It is bipartite as it is the cover of
a bipartite graph and it has no cycles of length 4 since the branching process
was designed to remove these. To check the last property we let A`
be the set of
Λ
´
1`
vertices mapping to A Ă Λ and AΛ the complement of these in the bipartite
structure. We define BΛ` and BΛ´ similarly.
We must prove that ΛpAsΛ Y BΛt q is connected. ΛpA1s , B 1t q can be covered
by finitely many loops c1 , c2 , . . . of length 4 such that cm`1 X Ym
i“1 cm ‰ H for
all m. When taking the branched cover each ci has connected preimage and the
intersection will still be non empty so the resulting union will be connected.
4
Almost hyperbolisation in dimension 3
Notation 4.1. Given a tripartite complex L Ă V1 ˚ V2 ˚ V3 , let Lij be the full
subcomplex spanned by the vertices of Vi Y Vj .
The main theorem of this section is the following.
Theorem 4.2. Let Γ be a tripartite flag complex, AΓ the associated RAAG
and KΓ the classifying space constructed in Section 2.2.1. Then there exists a
branched cover X of KΓ , such that π1 pXq contains no subgroups isomorphic to
Z3 .
Proof. Our branching locus will be
B “ pΘ1 ˆ t0u ˆ t1uq Y pt1u ˆ Θ2 ˆ t0uq Y pt0u ˆ t1u ˆ Θ3 q,
where Θi is the graph with 2 vertices, 0 and 1, and |Vi | ` 1 edges, each directed
from 0 to 1. We have three maps
p1 : KΓ r B Ñ KΓ12 r tp0, 1qu,
p2 : KΓ r B Ñ KΓ23 r tp0, 1qu,
p3 : KΓ r B Ñ KΓ31 r tp0, 1qu,
which are the restrictions of the projections Θ1 ˆ Θ2 ˆ Θ3 Ñ Θi ˆ Θj . The
maps from Section 3 give us three maps
π1 pKΓ12 r tp0, 1quq Ñ Sq12
π1 pKΓ23 r tp0, 1quq Ñ Sq23
π1 pKΓ31 r tp0, 1quq Ñ Sq31 .
Here, qij are the primes picked in the process of taking a branched cover in
Theorem 3.1. Let q “ q12 q23 q31 . We can combine these permutation representations with the projection maps above to get a map π1 pKΓ r Bq Ñ Sq , which
defines a q-fold cover of KΓ r B by taking the subgroup corresponding to the
stabiliser of 1 in Sq . We complete this cover to get our branched cover X.
Let ti, j, ku “ t1, 2, 3u. The maps p1 , p2 , p3 are retractions to see this consider
the natural map
" *
1
ãÑ KΓij ˆ ev0k ãÑ KΓ .
KΓij ãÑ KΓij ˆ
2
10
v02
v01
vi1
vj2
Figure 3: A loop corresponding to the commutator rvi1 , vj2 s.
It follows that π1 pKΓ r Bq Ñ π1 pKΓij r tp0, 1quq is surjective. We will now
consider what the link of a vertex in the branched cover is. We will restrict our
attention to a vertex mapping to p0, 1, 0q all the other cases are similar.
We will consider the image of the link of p0, 1, 0q under the three maps
p1 , p2 , p3 . In the image of the map p1 , this link is sent surjectively onto the
link of p0, 1q in KΓ12 . By Section 3 we know that KΓ12 r tp0, 1qu deformation
retracts onto the graph Θ1 _ Θ2 . Loops of length 4 are sent to commutators of
the form rvi1 v 1j , vk2 v 2l s. In the map π1 pKΓ12 r tp0, 1quq Ñ Sq this commutator is
sent to a q12 -cycle.
We must now consider the image under the maps p2 , p3 . These maps send the
link to a disjoint union of contractible subsets, so the maps π1 pKΓ r Bq Ñ Sq23
and π1 pKΓ r Bq Ñ Sq31 send the image of the fundamental group of the link to
the identity.
From this we can see that, in the cover of KΓ r B corresponding to the
stabiliser of 1 in Sq , the preimage of one of the loops of length 4 depicted in
Figure 3 will have q23 q31 components, and each component is a loop of length
4q12 . We will now prove that there are no isometrically embedded planes of
dimension ą 2. This, combined with Theorem 2.6, will complete the proof of
the theorem.
Since the resulting cube complex has cubes of dimension at most 3, we can
see that the dimension of an isometrically embedded flat plane is at most 3.
If such a copy E of E3 were isometrically embedded in X̃, it would contain at
least one cube and would in fact be a cubical embedding of the flat. For each
vertex contained in the flat, the link would contain a subcomplex isomorphic to
an octahedron. Let B̃ be the lift of the branching locus B. We can see how this
intersects each cube in X̃ by Figure 4. As such any 3-flat will intersect a vertex
on B̃.
Let x be a vertex on B̃ X E. Then Lkpx, X̃q has a tripartite structure.
If there is an octahedron in this complex it has a tripartite structure of the
form S 0 ˚ S 0 ˚ S 0 . One of the copies of S 0 will be contained in the vertices
corresponding to B̃. The other 4 vertices form a loop of length 4 in the bipartite
graph defined by the edges not in B̃. However, we constructed the branched
11
Figure 4: Intersection pattern of L̃ on a cube in X̃.
cover so that this graph has no cycles of length ă 6.
5
Bestvina-Brady Morse theory
While Bestvina-Brady Morse theory is defined in the more general setting of
affine cell complexes, in this instance we shall only need it for non-positively
curved cube complexes.
For the remainder of this section, let X be a CAT(0) cube complex and let
G be a group which acts freely, cellularly, properly and cocompactly on X. Let
φ : G Ñ Z be a homomorphism and let Z act on R by translations.
Recall that χc is the characteristic map of the cube c.
Definition 5.1. We say that a function f : X Ñ R is a φ-equivariant Morse
function if it satisfies the following 3 conditions.
• For every cube c Ă X of dimension n, the map f χc : r0, 1sn Ñ R extends
to an affine map Rn Ñ R and f χc : r0, 1sn Ñ R is constant if and only if
n “ 0.
• The image of the 0-skeleton of X is discrete in R.
• f is φ-equivariant, i.e. f pg ¨ xq “ φpgq ¨ f pxq.
We will consider the level sets of our function, which we will denote as
follows.
Definition 5.2. For a non-empty closed subset I Ă R we denote by XI the
preimage of I. We also use Xt to denote the preimage of t P R.
The kernel H of φ acts on the cube complex X in a manner preserving each
level set XI . Moreover, it acts properly and cocompactly on the level sets. We
will use the topological properties of the level sets to gain information about
the finiteness properties of the group. We will need to examine how they vary
as we pass to larger level sets.
12
Theorem 5.3 (Bestvina-Brady, [2], Lemma 2.3). If I Ă I 1 Ă R are closed
intervals and XI 1 r XI contains no vertices of X, then the inclusion XI ãÑ XI 1
is a homotopy equivalence.
If XI 1 r XI contains vertices of X, then the topological properties of XI 1 can
be very different from those of XI . This difference is encoded in the ascending
and descending links.
Definition 5.4.ŤThe ascending link of a vertex is
LkÒ pv, Xq “ tLkpw, cq | χc pwq “ v and w is a minimum of f χc u Ă Lkpv, Xq
The descending
Ť link of a vertex is
LkÓ pv, Xq “ tLkpw, cq | χc pwq “ v and w is a maximum of f χc u Ă Lkpv, Xq
Theorem 5.5 (Bestvina-Brady, [2], Lemma 2.5). Let f be a Morse function.
Suppose that I Ă I 1 Ă R are connected, closed and min I “ `min I˘1 (resp.
max I “ max I 1 q, and that I 1 r I contains only one point r of f X p0q . Then
XI 1 is homotopy equivalent to the space obtained from XI by coning off the
descending (resp. ascending) links of v for each v P f ´1 prq.
We can now deduce a lot about the topology of the level and sub-level sets.
We know how they change as we pass to larger intervals and so we have the
following.
Corollary 5.6 (Bestvina-Brady, [2], Corollary 2.6). Let I, I 1 be as above.
1. If each ascending and descending link is homologically pn ´ 1q-connected,
then the inclusion XI ãÑ XI 1 induces an isomorphism on Hi for i ď n ´ 1
and is surjective for i “ n.
2. If the ascending and descending links are connected, then the inclusion
XI ãÑ XI 1 induces a surjection on π1 .
3. If the ascending and descending links are simply connected, then the inclusion XI ãÑ XI 1 induces an isomorphism on π1 .
Knowing that the direct limit of this system is a contractible space allows
us to compute the finiteness properties of the kernel of φ.
Theorem 5.7 (Bestvina-Brady, [2], Theorem 4.1). Let f : X Ñ R be a φequivariant Morse function and let H “ kerpφq. If all ascending and descending
links are simply connected, then H is finitely presented (i.e. is of type F2 ).
We would also like to have conditions which will allow us to deduce that H
does not satisfy certain other finiteness properties. A well known result in this
direction is:
Proposition 5.8 (Brown, [6], p. 193). Let H be a group acting freely, properly,
r i pX, Zq “
cellularly and cocompactly on a cell complex X. Assume further that H
r
0 for 0 ď i ď n ´ 1 and that Hn pX, Zq is not finitely generated as a ZH-module.
Then H is of type F Pn but not F Pn`1 .
In [3], the above result was used to prove that a certain group is not of type
F P3 . However in our theorems not all the links will satisfy the assumptions
of [3, Theorem 4.7] and we require the following.
13
Theorem 5.9 (Kropholler, [9], Theorem 2.23). Let f : X Ñ R be a φ-equivariant
Morse function and let H “ kerpφq. Suppose that for all vertices v the reduced
homology of LkÒ pvq and LkÓ pvq is 0 in dimensions 0, . . . , n´1 and n`1. Further
`
˘
`
˘
r n LkÒ pv 1 q ‰ 0 or H
r n LkÓ pv 1 q ‰ 0
assume that there is a vertex v 1 such that H
(possibly both). Then H is of type F Pn but not of type F Pn`1 .
Finally, we prove a key theorem regarding ascending and descending links.
Theorem 5.10. For i “ 1, 2 let Xi be a CAT(0) cube complex, Gi a group
acting freely, properly and cocompactly on Xi , φi : Gi Ñ Z a surjective homomorphism and fi : Xi Ñ R a φi -equivariant Morse function. Then, there is a
Morse function f : X1 ˆ X2 Ñ R such that
`
˘
LkÒ pv1 , v2 q, X1 ˆ X2 “ LkÒ pv1 , X1 q ˚ LkÒ pv2 , X2 q
and
`
˘
LkÓ pv1 , v2 q, X1 ˆ X2 “ LkÓ pv1 , X1 q ˚ LkÓ pv2 , X2 q
.
We will prove the staement for ascending links, the proof for descending
links is the same. The proof really relies on the following key lemma.
Lemma 5.11. Let X be a CAT(0) cube complex with Morse function f . Then
LkÒ pv, Xq is the full subcomplex of Lkpv, Xq spanned by the vertices in LkÒ pv, Xq.
At first sight this does not appear to be an improvement, however, it allows
for simple calculation of the ascending and descending links once the link of a
vertex is known.
Proof. Let v1 , . . . , vn be n pairwise adjacent vertices in LkÒ pv, Xq, proving that
the simplex rv1 , . . . , vn s is in LkÒ pv, Xq will prove the claim.
Let ei be the edge in X corresponding to vi . We must prove that v is a
minimum for f restricted to c “ e1 ˆ ¨ ¨ ¨ ˆ en . We note that since f extends
to an affine map, c is foliated by level sets f ´1 ptq for t P R. Each of these
level sets corresponds to a linear subspace of dimension n ´ 1 not containing
any subcubes of dimension ą 0. When intersected with the cube c there are
exactly two subspaces where the intersection is a single vertex. One of these
corresponds to the minimum of f |c and the other to the maximum of f |c . One
of these must be at the vertex mapping to v and this is the minimum.
Proof of Theorem 5.10. We define a Morse function f : X1 ˆ X2 Ñ R by
f px1 , x2 q “ f1 px1 q ` f2 px2 q. This satisfies all the conditions of being a Morse
function and is φ-equivariant with respect to the map φpg1 , g2 q “ φ1 pg1 q`φ2 pg2 q.
The link of a vertex pv1 , v2 q in X1 ˆ X2 is Lkpv1 , X1 q ˚ Lkpv2 , X2 q. It is easy
to see that the ascending link is the full subcomplex spanned by LkÒ pv1 , X1 q \
LkÒ pv2 , X2 q Ă Lkpv1 , X1 q˚Lkpv2 , X2 q, which is equal to LkÒ pv1 , X1 q˚LkÒ pv2 , X2 q.
14
5.1
Groups of type Fn´1 but not Fn
In [?], Question 8.5 Brady asks whether there exist groups of type Fn´1 but
not Fn which do not contain Z2 ; he notes that the known examples all contain
Zn´2 . While we are not able to find examples without Z2 , we can drastically
reduce the rank of a free abelian subgroup as shown by the following.
Theorem B. For every positive integer n, there exists a group of type Fn´1
but not Fn that contains no abelian subgroups of rank greater than r n3 s.
Proof. For our general construction, we require 4-tuples pGi , Xi , φi , fi q for i “
1, 2, 3, where:
• Gi is a hyperbolic group,
• Xi is a CAT(0) cube complex with a free cocompact Gi action,
• φi : Gi Ñ Z is a surjective homomorphism,
• fi is a φi -equivariant Morse function.
We also require that all ascending and descending links of fi are pi ´ 2qconnected but at least one is not pi ´ 1q-connected.
The existence of such a Morse function would show by Theorem 5.9 that Gi
has a subgroup of type Fi´1 not Fi , namely kerpφi q.
Let G1 be a free group of rank 2, X1 a 4-valent tree (the Cayley graph of Gi
with respect to generators a and b), φ1 the exponent sum homomorphism with
respect to a and b, and f1 the map that is linear on edges and whose restriction
to the vertices of X1 is φ1 .
Let pG2 , X2 , φ2 , f2 q be the group, classifying space, homomorphism and
Morse function from Proposition 3.2.
Let pG3 , X3 , φ3 , f3 q be the group, classifying space, homomorphism and
Morse function from [3]. We could also use the examples of groups from [9, 11].
An important point to note is that for i “ 1, 2, 3, the ascending and descending links for pGi , Xi , φi , fi q are isomorphic to S i´1 .
Now let n be an integer, let l “ t n3 u, and let pGl , Xl , φl , fl q be the 4-tuple
with
l
l
ź
ź
Gl “
G3 , Xl “
X3 ,
i“1
φl “
l
ÿ
i“1
φ3 , fl “
i“1
l
ÿ
f3 .
i“1
By Theorem 5.10 the ascending and descending links of fl are ˚li“1 S 2 “ S 3l´1
which is p3l ´ 2q-connected but not p3l ´ 1q-connected. If n ” 0 mod 3, then
3l “ n, and we define G “ Gl . If not, let m be the residue of n mod 3 and
consider the 4-tuple pG “ Gl ˆ Gm , X “ Xl ˆ Xm , φ “ φl ` φm , f “ fl ` fm q.
The φ-equivariant Morse function f on the cube complex X has ascending and
descending links that are all copies of S n´1 . In all cases, Kerpφq is of type Fn´1
not Fn by Theorem 5.9.
The group G contains no free abelian subgroups of rank greater than r n3 s
since Gi as a hyperbolic group contains no copy of Z2 .
15
6
Subgroups of type F P2 that cannot be finitely
presented
We will now apply our branched covering technique with carefully chosen flag
complexes Γ to prove the following.
Theorem A. There exists a non positively curved space X such that π1 pXq
contains no subgroups isomorphic to Z3 , which contains a subgroup of type F P2
not F2 .
We will do this using the following steps.
1. Start with a connected 2-dimensional tripartite flag complex L such that
π1 pLq is a perfect group with the the link of every vertex connected and not
a point. Take an auxiliary complex Γ “ RpLq. Then build the complex
KΓ in Section 2.2.1.
2. Define a function f : KΓ Ñ S 1 which lifts to a Morse function on universal covers. Examine the ascending and descending links of this Morse
function.
3. Take a branched covering of KΓ as in Section 4 to get a complex X with an
associated Morse function. Examine the ascending and descending links
of this Morse function. This will show that the kernel of f˚ is of type F P2 .
4. Prove that the kernel of f˚ is not finitely presented.
6.1
The complex RpLq
The construction of this complex is required, the key point of this complex is that
it satisfies Proposition 6.4. This is required to make sure that the fundamental
group of the links is not changed in the branching process.
Firstly, we prove that none of the assumptions from the first step are restrictive. We can realise any finitely presented group as the fundamental group of
a finite connected 2-dimensional simplicial complex. It is also well known that
the barycentric subdivision of a 2-dimensional simplicial complex is flag and we
can put an obvious tripartite structure, on the barycentric subdivision, labelling
vertices by the dimension of the corresponding cell. So we can realise any group
as the fundamental group of a connected 2-dimensional tripartite flag complex.
Given a connected 2-dimensional tripartite flag complex there is a homotopy equivalent complex of the same form such that the link of every vertex is
connected and not a point.
To see this, first note that if there is a vertex where the link is just a single
point, then we can contract this edge without changing the homotopy type of
the complex. Next, note that if there is a vertex x with disconnected link,
then we perform the following procedure: pick two vertices v, w in two different
components of the link, add an extra vertex y and connect it to v, w and x
while also adding two triangles rv, y, xs and ru, y, xs. The result is that we have
reduced the number of components of the link at x, without adding any extra
components to the link of v or w, and the link of y is connected. We have also
not changed the homotopy type, since we have added a contractible space glued
16
along a contractible subspace. Repeating this procedure, we can make sure that
the link of every vertex is connected.
Definition 6.1. For a simplicial complex L the octahedralisation SpLq is defined
as follows. For each vertex v of L, let Sv0 “ tv ` , v ´ u be a copy of S 0 . For every
simplex σ of L take Sσ “ ˚vPσ Sv0 . If τ ă σ, then there is a natural map
Sτ Ñ Sσ . SpLq “ YσăL Sσ { „, where the equivalence relations „ is generated
by the inclusions Sτ Ñ Sσ .
The complex SpLq can also be seen as the link of the vertex in the Salvetti
complex for the RAAG defined by L. If L has an n-partite structure then there
is a natural n-partite structure on SpLq. Let L be contained in V1 ˚ ¨ ¨ ¨ ˚ Vn .
Then SpLq is contained in SpV1 q ˚ ¨ ¨ ¨ ˚ SpVn q.
Remark 4. The map defined by Sv0 Ñ tvu extends to a retraction of SpLq to L
(not a deformation retraction).
In particular, if π1 pLq ‰ 0, then π1 pSpLqq ‰ 0.
It is proved in [2] that if L is a flag complex, then SpLq is a flag complex.
Lemma 6.2. Assume L is a connected simplicial complex and Lkpv, Lq is connected and not equal to a point for all vertices v P L. If H1 pLq “ 0, then
H1 pSpLqq “ 0.
Proof. Let L` be the full subcomplex of SpLq spanned by the set tv ` : v P Lu,
and let L´ be defined similarly. Let N ` be the interior of the star of L` and
N ´ the interior of the star of L´ . It is clear that SpLq is contained in N ´ YN ` .
We can also see that N ` X N ´ is the union of the open simplices which are
contained in neither L` nor L´ . Here we are using the fact that N ` is homotopy
equivalent to L and similarly N ´ is homotopy equivalent to L.
By considering the Mayer-Vietoris sequence for N ´ and N ` we see that
H1 pSpLqq is isomorphic to H̃0 pN ` X N ´ q, so we must prove that N ` X N ´ is
connected.
Let x, y be points of N ` XN ´ . We can always connect x and y to open edges
contained in N ` X N ´ ; label these edges ex and ey . Let vx be the end point of
ex in L` and wx the end point in L´ ; define vertices vy and wy similarly. Let
v “ pvx “ v0 , v1 , . . . , vn “ vy q be a sequence of vertices in L` corresponding to
a geodesic in Lp1q from vx to vy .
The vertices wx and wy have corresponding vertices in L` , these are adjacent
to vx and vy respectively. We split into 4 cases by whether these vertices are on
the geodesic v. We will define a path P in each of these four cases.
1. If wx “ v1 and wy “ vn´1 , then let P “ v0 , v1 , . . . , vn .
2. If wx “ v1 and wy ‰ vn´1 , then let P “ v0 , v1 , . . . , vn , wy .
3. If wx ‰ v1 and wy “ vn´1 , then let P “ wx , v0 , v1 , . . . , vn .
4. If wx ‰ v1 and wy ‰ vn´1 , then let P “ wx , v0 , v1 , . . . , vn , wx .
We will now describe how to get a sequence of edges ex “ e0 , . . . , em “ ey
such that ei , ei`1 are on a 2-simplex in L. The corresponding sequence of edges
in N ` X N ´ will give a path from ex to ey . Thus completing the proof of the
lemma.
17
b1
b3
b2
a1
a3
a2
Figure 5: The key idea from Lemma 6.2.
A path in the link of a vertex v can be viewed as a sequence of edges in L
such that adjacent edges are on a 2-simplex.
We will relabel the path P to a1 , b1 , . . . . Let Ai be a path in the link of bi from
ai to ai`1 . Let Bi be a path in the link of ai from bi to bi`1 . This can be done
since the link of every vertex is connected. The sequence of edges A1 , B2 , A2 , . . .
defines the sequence of edges we require. The key idea is encapsulated in Figure
5, where the curved arcs correspond to the paths Ai , Bi .
We can now define the complex RpLq.
1. Let L be a 2-dimensional tripartite flag complex with π1 pLq perfect, such
that the link of every vertex in L is connected and not a point. Label the
sets of vertices from the tripartite structure V0 , V1 , V2 .
2. Construct SpLq as above. This is a 2-dimensional tripartite flag complex
with π1 pLq perfect.
3. Add 3 extra vertices v 0 , v 1 , v 2 which are of type 0, 1, 2 respectively. Connect v i to all the vertices not of type i. Define RpLq to be the flag completion of the resulting complex.
Take a simplicial complex L as above and let Γ “ RpLq. We can now
construct the cubical complex KΓ from Section 2.2.1.
6.2
The Morse function f
As noted in Remark 3, we can view KΓ as a subcomplex of Θ1 ˆ Θ2 ˆ Θ3 , where
Θi is a graph that has two vertices 0, 1 and has edges labelled by the vertices of
Γ as well as one extra edge labelled v0i , such that each edge runs from 0 to 1.
We define a Morse function on the product by putting an orientation on each
edge of Θi as follows: if it is an edge corresponding to a vertex of SpLq Ă Γ we
orient it towards 1, while for the vertices v i and v0i we orient towards 0. Now
put an orientation on S 1 and map each graph by its orientation; we then extend
linearly across cubes. Restricting this map to KΓ we get a map g, and by lifting
to universal covers we get a Morse function f : K̃Γ Ñ R which is g˚ -equivariant.
Let the vertices of type i in SpLq Ă Γ be the set Vi` and let Vi´ “ tv i , v0i u “:
0
Si .
18
a4
Vertex
p0, 0, 0q
p0, 0, 1q
p0, 1, 0q
p0, 1, 1q
p1, 0, 0q
p1, 0, 1q
p1, 1, 0q
p1, 1, 1q
LkÒ
ΓpV1` Y V2` Y V3` q “ SpLq
ΓpV1` Y V2` q ˚ S30
ΓpV1` Y V3` q ˚ S20
V1` ˚ S20 ˚ S30
ΓpV2` Y V3` q ˚ S10
V2` ˚ S10 ˚ S30
V3` ˚ S10 ˚ S20
2
S “ S10 ˚ S20 ˚ S30
LkÓ
S 2 “ S10 ˚ S20 ˚ S30
V3` ˚ S10 ˚ S20
V2` ˚ S10 ˚ S30
ΓpV2` Y V3` q ˚ S10
V1` ˚ S20 ˚ S30
ΓpV1` Y V3` q ˚ S20
ΓpV1` Y V2` q ˚ S30
`
ΓpV1 Y V2` Y V3` q “ SpLq
Table 1: The ascending and descending links of the Morse function f : KΓ Ñ S 1 .
The ascending and descending links of this Morse function are given in Table
1.
Notation 6.3. Given a simplicial complex Λ and a subset S of the vertices of
Λ, ΛpSq denotes the full subcomplex of Λ spanned by the vertices in S.
Proposition 6.4. Given a complex of the form Vi` ˚Vj´ ˚Sk0 or ΓpVi` YVj` q˚Sk0
there is an ordering v1 , v2 , . . . , vq on the set Vjs such that Stpvm qXpYlăm Stpvl qq
is connected and π1 pStpvm q X pYlăm Stpvl qqq ‰ 0 for 1 ă m ď q.
Proof. In the case Vjs “ Vj´ “ Sj0 we have 2 vertices v1 and v2 and Stpv1 q X
Stpv2 q “ Sk0 ˚ Vi` , which is connected but not simply connected. So either
ordering will do.
In the case Vjs “ Vj` , let Vj “ tw1 , . . . , wn u and Vj` “ tw1` , w1´ , w2` , . . . , wn´ u.
The subgraph Z “ LpVi Y Vj q is connected since L is connected and the
link of every vertex is connected and not a point. We can thus assume that
Stpwl , Zq X pYmăl Stpwm qq ‰ H.
Noting that Stpv s , SpLqq “ CpSpLkpv, Lqqq. We can see that Stpv s , SpLqq X
Stpwt , SpLqq “ SpStpv, LqXStpw, Lqq. Thus ordering Vj` “ tw1` , w1´ , w2` , . . . , wn´ u
we can see that Vi` X Stpvl , SpLqq X pYmăl Stpvm , SpLqqq contains at least two
points.
Noting that
¯¯
´
´
¯ ´ ď
ď
Stpvl , SpLqqXp
Stpvm , SpLqqq “ Vi` X Stpvl , SpLqq X
Stpvm , SpLqq ˚Sk0
măl
măl
we can see that this is connected but not simply connected.
Remark 5. In the above proof we are gluing contractible complexes along connected complexes. This shows that all the complexes in the statement of Proposition 6.4 are simply connected.
Remark 6. At each stage in the above proof Stpvl , SpLqq X pYmăl Stpvm , SpLqqq
could be covered by cycles of length 4, since it is the join of a discrete set and
a copy of S 0 .
19
6.3
Almost hyperbolisation and the Morse function h :
X Ñ S1
We use the almost hyperbolisation technique from Section 4 to get a branched
cover X of KΓ , recall that there is a natural length preserving map b : X Ñ KΓ .
We define a function h “ g ˝ b : X Ñ S 1 , lifting to universal covers we get a
Morse function. In what follows G is the fundamental group of X which does
not contain any copies of Z3 . In what follows, H :“ kerph˚ : G Ñ Zq.
It is worth noting that in the almost hyperbolisation procedure we ensured
that loops of length 4 in the link of a vertex have connected preimage.
6.3.1
Ascending and descending links of h
Recall that KΓ Ă Θ1 ˆ Θ2 Θ3 . We distinguish between 4 types of vertices in X
and label them as follows:
Vertices of type A are those which map to p0, 0, 0q or p1, 1, 1q.
Vertices of type B are those which map to p0, 0, 1q or p1, 0, 1q.
Vertices of type C are those which map to p1, 0, 0q or p1, 1, 0q.
Vertices of type D are those which map to p0, 1, 0q or p0, 1, 1q.
For a vertex in X the ascending (descending) link is the preimage of the
ascending (descending) link of the corresponding vertex in KΓ .
Type A vertices are disjoint from the branching locus, so a small neighbourhood of each lifts to X and the ascending and descending links are isomorphic
to those of the corresponding vertex of KΓ . We claim that for vertices not of
type A the ascending and descending links are simply connected. We will prove
this in the case of a vertex of type B and the ascending link; the other cases are
similar.
A vertex x of type B is on a lift of Θ1 . We may assume that x maps to
p0, 0, 1q. Now, LkÒ p0, 0, 1q “ ΓpV1` Y V2` q ˚ S30 . Let us consider the preimage of
LkÒ p0, 0, 1q in Lkpx, Xq. To envisage this, we start by removing the vertices in
V1 and taking the covering of the remaining space coming from the derivative
map b˚ of b, then add back the vertices of V1 . By Remark 5 we can cover
ΓpV1` Y V2` q ˚ S30 by Stpvq as v runs over vertices in V1` . We noted in Remark 6
that we can construct this cover in such a way that each Stpvm q X pYlăm Stpvl qq
is connected and covered by loops of length 4 with non-empty intersection.
Specifically, if S41 and S411 are 2 loops of length 4 in Stpvm q X pYlăm Stpvl qq, then
S41 X S411 Ą S30 .
In the procedure of passing to the branched covering b : X Ñ KΓ . Associated
to each vertex of X there is a derivative map bLkpvq : Lkpv, Xq Ñ Lkpbpvq, KΓ q.
Each of the 4 cycles above has connected preimage under the map bLkpvq , therefore the preimage of Stpvm q X pYlăm Stpvl qq is connected. Upon taking the
completion, we replace the vertices in V1` ; this corresponds to coning off the
lifts of their links. Thus we see LkÒ pxq is made from a sequence of contractible
spaces glued along connected subspaces, and so is simply connected.
6.4
Proof that the kernel is not finitely presented
To prove that H is not finitely presented we need the following lemma.
Lemma 6.5. π1 pXI q ‰ 0 for all compact intervals I Ă R
20
ĂΓ . In our case Γ: “ S 2 and
Proof. For the purposes of this proof let Y “ K
Γ˚ “ RpLq. By Theorem 2.17 we know that the kernel of g˚ is not finitely
presented. Since the kernel of g˚ acts cocompactly on the level set YI we can
see that YI is not simply connected.
Let γ : S 1 Ñ YI be a non-trivial loop. Then there is a larger interval J 1 such
that γ is trivial in YJ 1 . Let J 1 “ ra, bs. We can assume that γ is non-trivial
in J “ ra ` , bs or J “ ra, b ´ s for all ą 0; assume the latter. There is
a sequence of vertices v1 , v2 , . . . such that YJ 1 “ YJ Y CpLkÒ pvi qq. There is
an integer m such that γ is trivial in YJ Yiďm CpLkÒ pvi qq but not trivial in
xJ .
YJ Yiăm CpLkÒ pvi qq “ Y
Since adding CpLkÒ pxm qq changes the fundamental group (γ becomes trivxJ which is also contained in LkÒ pxm q.
ial), we can find a non-trivial loop γ̂ in Y
We also know that it is contained in YJ since LkÒ pvi q X LkÒ pvj q “ H whenever
i ‰ j, as the restriction of an affine map to a cube can only have one maximum
and one minimum or it is constant on a subcube.
Since adding CpLkÒ pxm qq changes π1 , we see that π1 pLkÒ pxm qq ‰ 0, so xm is
a vertex mapping to p0, 0, 0q and γ̂ bounds a disc in Y which does not intersect
L̃. It follows that this disc lifts to X̃ under the branched covering b̃ coming from
the following commutative diagram:
X̃
b̃
Y
X
b
KΓ
The boundary of this lifted disc is in XJ ; call this loop µ. If µ bounded
a disc in XJ , then we could map this to YJ via b̃, but this would imply that
b̃pµq “ γ̂ bounds a disc in YJ , which it does not. Thus µ is non-trivial in
π1 pXJ q ‰ 1. Since π1 pXI q Ñ π1 pXJ q is surjective we deduce by Theorem 5.7
that π1 pXI q ‰ 1.
Theorem 6.6. H “ kerpg˚ q is not finitely presentable.
Proof. Assume that H is finitely presented.
H acts cocompactly on XI so we can add finitely many 2-cells to the quotient
to gain fundamental group H. Taking a universal cover of the space obtained in
this way we arrive at XI with finitely many H-orbits of 2-cells attached, which
is simply connected. In other words, there are finitely many H-orbits of loops
which generate π1 pXI q.
The direct limit of all the XI is the space X which is CAT(0) and in particular
contractible. We can pass to a larger interval such that the H-orbits of loops
which generate π1 pXI q are trivial. In other words, the map π1 pXI q Ñ π1 pXJ q
is trivial. But it is also surjective by Theorem 5.7 and because we have assumed
that all the ascending and descending links are connected. Thus π1 pXJ q is
trivial, however we know this not to be the case by Lemma 6.5.
References
[1] I. Agol. The virtual Haken conjecture. Doc. Math., 18:1045–1087, 2013.
With an appendix by Agol, Daniel Groves, and Jason Manning.
21
[2] M. Bestvina and N. Brady. Morse theory and finiteness properties of groups.
Invent. Math., 129(3):445–470, 1997.
[3] N. Brady. Branched Coverings of Cubical Complexes and Subgroups of
Hyperbolic Groups. J. Lond. Math. Soc., 60(2):461–480, 1999.
[4] M. R. Bridson. On the existence of flat planes in spaces of nonpositive
curvature. Proceedings of the American Mathematical Society, 123(1):223–
223, January 1995.
[5] M. R. Bridson and A. Haefliger. Metric spaces of non-positive curvature,
volume 319 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Springer-Verlag, Berlin, 1999.
[6] K. S. Brown. Cohomology of Groups, volume 87 of Graduate Texts in
Mathematics. Springer New York, New York, NY, 1982.
[7] M. Gromov. Hyperbolic Groups. In S. S. Chern, I. Kaplansky, C. C. Moore,
I. M. Singer, and S. M. Gersten, editors, Essays in Group Theory, volume 8,
pages 75–263. Springer New York, 1987.
[8] F. Haglund and D. T. Wise. Special cube complexes. Geom. Funct. Anal.,
17(5):1551–1620, 2008.
[9] R. Kropholler. Hyperbolic groups with almost finitely presented subgroups.
In Preparation, 2015.
[10] Ian J. Leary. Uncountably many groups of type $FP$. arXiv:1512.06609
[math], December 2015. arXiv: 1512.06609.
[11] Yash Lodha. A hyperbolic group with a finitely presented subgroup that is
not of type FP3, page 67?81. London Mathematical Society Lecture Note
Series. Cambridge University Press, 2017.
[12] D. T. Wise. The Structure of Groups with a Quasiconvex Hierarchy. 2011.
22
| 4math.GR
|
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No. 6, 2013
Automated Classification of L/R Hand Movement
EEG Signals using Advanced Feature Extraction and
Machine Learning
Mohammad H. Alomari, Aya Samaha, and Khaled AlKamha
Applied Science University
Amman, Jordan
Abstract— In this paper, we propose an automated computer
platform for the purpose of classifying Electroencephalography
(EEG) signals associated with left and right hand movements
using a hybrid system that uses advanced feature extraction
techniques and machine learning algorithms. It is known that
EEG represents the brain activity by the electrical voltage
fluctuations along the scalp, and Brain-Computer Interface (BCI)
is a device that enables the use of the brain’s neural activity to
communicate with others or to control machines, artificial limbs,
or robots without direct physical movements. In our research
work, we aspired to find the best feature extraction method that
enables the differentiation between left and right executed fist
movements through various classification algorithms. The EEG
dataset used in this research was created and contributed to
PhysioNet by the developers of the BCI2000 instrumentation
system. Data was preprocessed using the EEGLAB MATLAB
toolbox and artifacts removal was done using AAR. Data was
epoched on the basis of Event-Related (De) Synchronization
(ERD/ERS) and movement-related cortical potentials (MRCP)
features. Mu/beta rhythms were isolated for the ERD/ERS
analysis and delta rhythms were isolated for the MRCP analysis.
The Independent Component Analysis (ICA) spatial filter was
applied on related channels for noise reduction and isolation of
both artifactually and neutrally generated EEG sources. The
final feature vector included the ERD, ERS, and MRCP features
in addition to the mean, power and energy of the activations of
the resulting Independent Components (ICs) of the epoched
feature datasets. The datasets were inputted into two machinelearning algorithms: Neural Networks (NNs) and Support Vector
Machines (SVMs). Intensive experiments were carried out and
optimum classification performances of 89.8 and 97.1 were
obtained using NN and SVM, respectively. This research shows
that this method of feature extraction holds some promise for the
classification of various pairs of motor movements, which can be
used in a BCI context to mentally control a computer or machine.
Keywords—EEG; BCI; ICA; MRCP; ERD/ERS; machine
learning; NN; SVM
I.
INTRODUCTION
The importance of understanding brain waves is increasing
with the ongoing growth in the Brain-Computer Interface
(BCI) field, and as computerized systems are becoming one of
the main tools for making people’s lives easier, BCI or BrainMachine Interface (BMI) has become an attractive field of
research and applications, BCI is a device that enables the use
of the brain’s neural activity to communicate with others or to
control machines, artificial limbs, or robots without direct
physical movements [1-4].
The term “Electroencephalography” (EEG) is the process
of measuring the brain’s neural activity as electrical voltage
fluctuations along the scalp that results from the current flows
in brain’s neurons [5]. In a typical EEG test, electrodes are
fixed on the scalp to monitor and record the brain’s electrical
activity [6]. BCI measures EEG signals associated with the
user’s activity then applies different signal processing
algorithms for the purpose of translating the recorded signals
into control commands for different applications [7].
The most important application for BCI is helping disabled
individuals by offering a new way of communication with the
external environment [8]. Many BCI applications were
described in [9] including controlling devices like video games
and personal computers using thoughts translation. BCI is a
highly interdisciplinary research topic that combines medicine,
neurology, psychology, rehabilitation engineering, HumanComputer Interaction (HCI), signal processing and machine
learning [10].
The strength of BCI applications lies in the way we
translate the neural patterns extracted from EEG into machine
commands. The improvement of the interpretation of these
EEG signals has become the goal of many researchers; hence,
our research work explores the possibility of multi-trial EEG
classification between left and right hand movements in an
offline manner, which will enormously smooth the path leading
to online classification and reading of executed movements,
leading us to what we can technically call “Reading Minds”.
In this work, we introduce an automated computer system
that uses advanced feature extraction techniques to identify
some of the brain activity patterns, especially for the left and
right hand movements. The system then uses machine learning
algorithms to extract the knowledge embedded in the recorded
patterns and provides the required decision rules for translating
thoughts into commands (as seen in Fig. 1).
This article is organized as follows: a brief review of related
research work is provided in Section II. In Section III, the
dataset used in this study is described. The automated feature
extraction process is described in Section IV. The generation of
our training/testing datasets and the practical implementation
and system evaluation are discussed in Section V. Conclusions
and suggested future work are provided in Section VI.
207 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No. 6, 2013
II. LITERATURE REVIEW
The idea of BCI was originally proposed by Jaques Vidal in
[11] where he proved that signals recorded from brain activity
could be used to effectively represent a user’s intent. In [12],
the authors recorded EEG signals for three subjects while
imagining either right or left hand movement based on a visual
cue stimulus. They were able to classify EEG signals into right
and left hand movements using a neural network classifier with
an accuracy of 80% and concluded that this accuracy did not
improve with increasing number of sessions.
vector consisting of the ERD/ERS patterns of the mu and beta
rhythms and the coefficients of the autoregressive model.
Artificial Neural Networks (ANNs) is applied to two kinds of
testing datasets and an average recognition rate of 93% is
achieved.
The strength of BCI applications depends lies in the way
we translate the neural patterns extracted from EEG into
machine commands. The improvement of the interpretation of
these EEG signals has become the goal of many researchers;
hence, our research work explores the possibility of multi-trial
EEG classification between left and right hand movements in
an offline manner, which will enormously smooth the path
leading to online classification and reading of any executed
movements, leading us to what we can technically call
“Reading Minds”.
III.
THE PHYSIONET EEG DATA
A. Description of the Dataset
The EEG dataset used in this research was created and
contributed to PhysioNet [19] by the developers of the
BCI2000 [20] instrumentation system. The dataset is publically
available at http://www.physionet.org/pn4/eegmmidb/.
Fig. 1. Feature extraction and translation into machine commands
The author of [13] used features produced by Motor
Imagery (MI) to control a robot arm. Features such as the band
power in specific frequency bands (alpha: 8-12Hz and beta: 1330Hz) were mapped into right and left limb movements. In
addition, they used similar features with MI, which are the
Event Related Desynchronization and Synchronization
(ERD/ERS) comparing the signal’s energy in specific
frequency bands with respect to the mentally relaxed state. It
was shown in [14] that the combination of ERD/ERS and
Movement-Related Cortical Potentials (MRCP) improves EEG
classification as this offers an independent and complimentary
information.
In [15], a hybrid BCI control strategy is presented. The
authors expanded the control functions of a P300 potential
based BCI for virtual devices and MI related sensorimotor
rhythms to navigate in a virtual environment. Imagined
left/right hand movements were translated into movement
commands in a virtual apartment and an extremely high testing
accuracy results were reached.
A three-class BCI system was presented in [16] for the
translation of imagined left/right hands and foot movements
into commands that operates a wheelchair. This work uses
many spatial patterns of ERD on mu rhythms along the
sensory-motor cortex and the resulting classification accuracy
for online and offline tests was 79.48% and 85.00%,
respectively. The authors of [17] proposed an EEG-based BCI
system that controls hand prosthesis of paralyzed people by
movement thoughts of left and right hands. They reported an
accuracy of about 90%.
A single trial right/left hand movement classification is
reported in [18]. The authors analyzed both executed and
imagined hand movement EEG signals and created a feature
The dataset consists of more than 1500 EEG records, with
different durations (one or two minutes per record), obtained
from 109 healthy subjects. Subjects were asked to perform
different motor/imagery tasks while EEG signals were recorded
from 64 electrodes along the surface of the scalp. Each subject
performed 14 experimental runs:
A one-minute baseline runs (with eyes open)
A one-minute baseline runs (with eyes closed)
Three two-minute runs of each of the four following
tasks:
o
The left or right side of the screen shows a target.
The subject keeps opening and closing the
corresponding fist until the target disappears. Then
he relaxes.
o
The left or right side of the screen shows a target.
The subject imagines opening and closing the
corresponding fist until the target disappears. Then
he relaxes.
o
The top or bottom of the screen. A target appears
on either. The subject keeps opening and closing
either both fists (in case of a top-target) or both feet
(in case of a bottom-target) until the target
disappears. Then he relaxes.
o
The top or bottom of the screen A target appears on
either. The subject imagines opening and closing
either both fists (in case of a top-target) or both feet
(in case of a bottom-target) until the target
disappears. Then he relaxes.
The 64-channels EEG signals were recorded according to
the international 10-20 system (excluding some electrodes) as
seen in Fig. 2.
208 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No. 6, 2013
B. The Subset used in the Current Work
From this dataset, we selected the three (two-minute) runs
of the first task described above (opening and closing the
left/right fist based on a target that appears on left or right side
of the screen). These runs include EEG data for executed hand
movements.
We created an EEG data subset corresponding to the first
six subjects (S001, S002, S003, S004, S005, and S006)
including three runs of executed movement specifically per
subject for a total of 18 two-minute records.
IV.
AUTOMATED ANALYSIS OF EEG SIGNALS FOR FEATURE
EXTRACTION
A. Channel Selection
According to [6], many of the EEG channels appeared to
represent redundant information. It is shown in [21, 22] that the
neural activity that is correlated to the executed left and right
hand movements is almost exclusively contained within the
channels C3, C4, and CZ of the EEG channels of Fig. 2. This
means that there is no need to analyze all 64 channels of data.
On the other hand, only eight electrode locations are
commonly used for MRCP analysis covering the regions
between frontal and central sites (FC3, FCZ, FC4, C3, C1, CZ,
C2, and C4) [14]. These channels were used for the
Independent Component Analysis (ICA) discussed later in the
current section (Fig. 3).
Fig. 3. Schematic diagram for the proposed system.
B. Filtering
Because EEG signals are known to be noisy and nonstationary, filtering the data is an important step to get rid of
unnecessary information from the raw signals. EEGLAB [23],
which is an interactive MATLAB toolbox, was used to filter
EEG signals.
A band pass filter from 0.5 Hz to 90 Hz was applied to
remove the DC (direct current) shifts and to minimize the
presence of filtering artifacts at epoch boundaries. A Notch
filter was also applied to remove the 50 Hz line noise.
C. Automatic Artifact Removal (AAR)
The EEG data of significance is usually mixed with huge
amounts of useless data produced by physiological artifacts that
masks the EEG signals [24]. These artifacts include eye and
muscle movements and they constitute a challenge in the field
of BCI research. AAR automatically removes artifacts from
EEG data based on blind source separation and other various
algorithms.
The AAR toolbox [25] was implemented as an EEGLAB
plug-in in MATLAB and was used to process our EEG data
subset on two stages: Electrooculography (EOG) removal using
the Blind Source Separation (BSS) algorithm then
Electromyography (EMG) Removal using the same algorithm
[26].
Fig. 2. Electrodes of the International 10-20 system for EEG
D. Epoch Extraction (Splitting)
After the AAR process, the continuous EEG data were
epoched by extracting data epochs that are time locked to
specific event types.
209 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No. 6, 2013
When no sensory inputs or motor outputs are being
processed, the mu (8–12 Hz) and beta (13–30 Hz) rhythms are
said to be synchronized [4, 27]. These rhythms are
electrophysiological features that are associated with the
brain’s normal motor output channels [4, 27]. While preparing
for a movement or executing a movement, a desynchronization
of the mu and beta rhythms occurs which is referred to as ERD
and it can be extracted 1-2 seconds before onset of movement
(as depicted in Fig. 4). Later, these rhythms synchronize again
within 1-2 seconds after movement, and this is referred to as
ERS.
On the other hand, delta rhythms can be extracted from the
motor cortex, within the pre-movement stage, and this is
referred to MRCP. The slow (less than 3 Hz) MRCP is
associated with an event-related negativity that occurs 1-2
seconds before the onset of movement [28, 29].
In our experiments, we extracted time-locking events with
type = 3 (left hand) or type = 4 (right hand) with different
epoch limits and types of analysis:
ERD analysis: epoch limits from -2 to 0 seconds.
ERS analysis: epoch limits from 4.1 to 5.1 seconds.
MRCP analysis: epoch limits from -2 to 0 seconds.
each run: ERD/ERS and MRCP for both left and right hand
movements for each subject.
V.
PRACTICAL IMPLEMENTATION AND RESULTS
A. Feature Vectors Construction and Numerical
Representation
After the EEG datasets were analyzed as described in the
previous section, the activation vectors were calculated for
each of the resulted epochs’ datasets as the multiplication of the
ICA weights and ICA sphere for each dataset subtracting the
mean of the raw data from the multiplication results.
Then, the mean, power, and energy of the activations were
calculated to construct the feature vectors. For each subject’s
single run, 6 feature vectors were extracted as <Power (8
features), Mean (8 features), Energy (8 features), Type (1
feature: ERS/ERD/MRCP), Side (1 target: Left/Right)>
resulting in a 10826 feature matrix.
The constructed features were represented in a numerical
format that is suitable for use with machine learning algorithms
[33, 34]. Every column in the features matrices was normalized
between 0.1 and 0.9 such that the datasets could be inputted to
the learning algorithms described in the next subsection.
B. Machine Learning Algorithms
In this work, Neural Networks (NNs) and Support Vector
Machines (SVMs) algorithms were optimized for the purpose
of classifying EEG signals into right and left hand movements.
A detailed description of these learning algorithms can be
found in [35] and [36].
The MATLAB neural networks toolbox was used for all
NN experiments. The number of input features (25 features)
determined the number of input nodes for NN and the number
of different target functions (1 output: left or right) determined
the number of output nodes. Training was handled with the aid
of the back-propagation learning algorithm [37].
Fig. 4. Epoch Extraction (ERS/ERD and MRCP)
E. Independent Component Analysis (ICA)
After the AAR process, ICA was used to parse the
underlying electrocortical sources from EEG signals that are
affected by artifacts [30, 31]. Data decomposition using ICA
changes the basis linearly from data that are collected at single
scalp channels to a spatially transformed virtual channel basis.
Each row of the EEG data in the original scalp channel data
represents the time course of accumulated differences between
source projections to a single data channel and one or more
reference channels [32].
EEGLAB was used to run ICA on the described epoched
datasets (left and right ERD, ERS, and MRCP) for the channels
FC3, FCZ, FC4, C3, C1, CZ, C2, and C4.
F. Rhythm Isolation
A short IIR band pass filter from 8 to 30 Hz was applied on
the ERD/ERS epoched datasets of the experiment for the
purpose of isolating mu/beta rhythms. Another short IIR
lowpass filter of 3 Hz was applied on MRCP epoched datasets
for isolating delta rhythms. The result of this was 6 files for
All SVM experiments were carried out using the
“MySVM” software [38]. SVM can be performed with
different kernels and most of them were reported to provide
similar results for similar applications [6]. So, the AnovaKernel SVM was used in this work.
C. Optimisation and Results
In all experiments, 80% samples were randomly selected
and used for training and the remaining 20% for testing. This
was repeated 10 times, and in each time the datasets were
randomly mixed.
For each experiment, the number of hidden nodes for NN
varied from 1 to 20. In SVM, each of the degree and gamma
parameters varied from 1 to 10. The mean of the accuracy was
calculated for each ten training-testing pairs.
The features that were used as inputs to NN and SVM are
symbolized as follows:
P: the power.
M: the mean.
E: the energy.
210 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No. 6, 2013
X: the sample type (ERS/ERD/MRCP).
[3]
The results of the experiment are summarized in the Table
[4]
I.
TABLE I.
NN
Features
All
P, X
M, X
E, X
P, M, X
M, E, X
P, E, X
Accuracy
%
88.9
80.4
68.5
82.1
79.8
82.7
89.8
[5]
RESULTS FOR EXPERIMENT B.
SVM
Hidden
Layers
3
15
11
11
3
9
4
Accuracy
%
85.3
88.2
91.2
94.1
80.6
82.4
97.1
Degree
Gamma
1
3
3
4
8
5
4
5
4
10
5
3
4
4
[6]
[7]
[8]
[9]
It is clear from the testing results that SVM outperforms
NN in most experiments. An SVM topology of degree = 4 and
gamma = 4 provides an accuracy of 97.1% if tested with the
power, energy and type inputs of the experiment. A NN of 10
hidden layers can provide an accuracy of 86.5% if all features
are used. These results clearly show that the use of advanced
feature extraction techniques provides good and clear
properties that can be translated using machine learning into
machine commands.
[10]
The next best SVM performance (94.1%) is achieved using
the energy and type features. In general, there has been an
increase in the classification performance with the use of more
discriminative features, such as the total energy, compared to
the power and mean inputs.
[13]
VI. CONCLUSIONS AND FUTURE RESEARCH
This paper focuses on the classification of EEG signals for
right and left fist movements based on a specific set of features.
Very good results were obtained using NNs and SVMs
showing that offline discrimination between right and left
movement, for executed hand movements, is comparable to
leading BCI research. Our methodology is not the best, but is
somewhat a simplified efficient one that satisfies the needs for
researchers in field of neuroscience.
[15]
In the near future, we aim to develop and implement our
system in online applications, such as health systems and
computer games. In addition, more datasets has to be analyzed
for a better knowledgeable extraction and more accurate
decision rules.
[11]
[12]
[14]
[16]
[17]
[18]
[19]
ACKNOWLEDGMENT
The authors would like to acknowledge the financial
support received from Applied Science University that helped
in accomplishing the work of this article.
[1]
[2]
References
J. P. Donoghue, "Connecting cortex to machines: recent advances in
brain interfaces," Nature Neuroscience Supplement, vol. 5, pp. 1085–
1088, 2002.
S. Levine, J. Huggins, S. BeMent, R. Kushwaha, L. Schuh, E. Passaro,
M. Rohde, and D. Ross, "Identification of electrocorticogram patterns as
the basis for a direct brain interface," Journal of Clinical
Neurophysiology, vol. 16, pp. 439-447, 1999.
[20]
[21]
[22]
A. Vallabhaneni, T. Wang, and B. He, "Brain—Computer Interface," in
Neural Engineering, B. He, Ed.: Springer US, 2005, pp. 85-121.
J. Wolpaw, N. Birbaumer, D. McFarland, G. Pfurtscheller, and T.
Vaughan, "Brain-computer interfaces for communication and control,"
Clinical Neurophysiology, vol. 113, pp. 767-791, 2002.
E. Niedermeyer and F. H. L. da Silva, Electroencephalography: Basic
Principles, Clinical Applications, and Related Fields: Lippincott
Williams & Wilkins, 2005.
J. Sleight, P. Pillai, and S. Mohan, "Classification of Executed and
Imagined Motor Movement EEG Signals," Ann Arbor: University of
Michigan, 2009, pp. 1-10.
B. Graimann, G. Pfurtscheller, and B. Allison, "Brain-Computer
Interfaces: A Gentle Introduction," in Brain-Computer Interfaces:
Springer Berlin Heidelberg, 2010, pp. 1-27.
A. E. Selim, M. A. Wahed, and Y. M. Kadah, "Machine Learning
Methodologies in Brain-Computer Interface Systems," in Biomedical
Engineering Conference, 2008, CIBEC 2008. Cairo, 2008, pp. 1-5.
E. Grabianowski, "How Brain-computer Interfaces Work,"
http://computer.howstuffworks.com/brain-computer-interface.htm, 2007.
M. Smith, G. Salvendy, K. R. Müller, M. Krauledat, G. Dornhege, G.
Curio, and B. Blankertz, "Machine Learning and Applications for BrainComputer Interfacing," in Human Interface and the Management of
Information. Methods, Techniques and Tools in Information Design. vol.
4557: Springer Berlin Heidelberg, 2007, pp. 705-714.
J. J. Vidal, "Toward Direct Brain-Computer Communication," Annual
Review of Biophysics and Bioengineering, vol. 2, pp. 157-180, 1973.
G. Pfurtscheller, C. Neuper, D. Flotzinger, and M. Pregenzer, "EEGbased discrimination between imagination of right and left hand
movement," Electroencephalography and Clinical Neurophysiology, vol.
103, pp. 642-651, 1997.
F. Sepulveda, "Brain-actuated Control of Robot Navigation," in
Advances in Robot Navigation, A. Barrera, Ed.: InTech, 2011.
A.-K. Mohamed, "Towards improved EEG interpretation in a
sensorimotor BCI for the control of a prosthetic or orthotic hand," in
Faculty of Engineering. Master of Science in Engineering,
Johannesburg: Universityof Witwatersrand, 2011, p. 144.
Y. Su, Y. Qi, J.-x. Luo, B. Wu, F. Yang, Y. Li, Y.-t. Zhuang, X.-x.
Zheng, and W.-d. Chen, "A hybrid brain-computer interface control
strategy in a virtual environment," Journal of Zhejiang University
SCIENCE C, vol. 12, pp. 351-361, 2011.
Y. Wang, B. Hong, X. Gao, and S. Gao, "Implementation of a BrainComputer Interface Based on Three States of Motor Imagery," in 29th
Annual International Conference of the IEEE Engineering in Medicine
and Biology Society, EMBS2007, 2007, pp. 5059-5062.
C. Guger, W. Harkam, C. Hertnaes, and G. Pfurtscheller, "Prosthetic
Control by an EEG-based Brain- Computer Interface (BCI)," in AAATE
5th European Conference for the Advancement of Assistive Technology,
Düsseldorf, Germany, 1999.
J. A. Kim, D. U. Hwang, S. Y. Cho, and S. K. Han, "Single trial
discrimination between right and left hand movement with EEG signal,"
in Proceedings of the 25th Annual International Conference of the IEEE
Engineering in Medicine and Biology Society, 2003., Cancun, Mexico,
2003, pp. 3321-3324 Vol.4.
A. L. Goldberger, L. A. N. Amaral, L. Glass, J. M. Hausdorff, P. C.
Ivanov, R. G. Mark, J. E. Mietus, G. B. Moody, C.-K. Peng, and H. E.
Stanley, "PhysioBank, PhysioToolkit, and PhysioNet: Components of a
New Research Resource for Complex Physiologic Signals," Circulation,
vol. 101, pp. e215-e220, 2000.
G. Schalk, D. J. McFarland, T. Hinterberger, N. Birbaumer, and J. R.
Wolpaw, "BCI2000: a general-purpose brain-computer interface (BCI)
system," IEEE Transactions on Biomedical Engineering, vol. 51, pp.
1034-1043, 2004.
L. Deecke, H. Weinberg, and P. Brickett, "Magnetic fields of the human
brain accompanying voluntary movements: Bereitschaftsmagnetfeld,"
Experimental Brain Research, vol. 48, pp. 144-148, 1982.
C. Neuper and G. Pfurtscheller, "Evidence for distinct beta resonance
frequencies in human EEG related to specific sensorimotor cortical
areas," Clinical Neurophysiology, vol. 112, pp. 2084-2097, 2001.
211 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 4, No. 6, 2013
[23] A. Delorme and S. Makeig, "EEGLAB: an open source toolbox for
analysis of single-trial EEG dynamics," Journal of Neuroscience
Methods, vol. 134, pp. 9-21, 2004.
[24] G. Bartels, S. Li-Chen, and L. Bao-Liang, "Automatic artifact removal
from EEG - a mixed approach based on double blind source separation
and support vector machine," in 2010 Annual International Conference
of the IEEE Engineering in Medicine and Biology Society (EMBC),
2010, pp. 5383-5386.
[25] G. Gómez-Herrero, "Automatic Artifact Removal (AAR) toolbox for
MATLAB," in Transform methods for Electroencephalography (EEG):
http://kasku.org/projects/eeg/aar.htm, 2008.
[26] C. Joyce, I. Gorodnitsky, and M. Kutas, "Automatic removal of eye
movement and blink artifacts from EEG data using blind component
separation," Psychophysiology, vol. 41, pp. 313-325, 2004.
[27] A. Bashashati, M. Fatourechi, R. Ward, and G. Birch, "A survey of
signal processing algorithms in brain-computer interfaces based on
electrical brain signals," Journal of Neural Engineering, vol. 4, pp. R3257, 2007.
[28] A. Vuckovic and F. Sepulveda, "Delta band contribution in cue based
single trial classification of real and imaginary wrist movement,"
Medical and Biological Engineering and Computing, vol. 46, pp. 529 –
539, 2008.
[29] Y. Gu, K. Dremstrup, and D. Farina, "Single-trial discrimination of type
and speed of wrist movements from EEG recordings," Clinical
Neurophysiology, vol. 20, pp. 1596–1600, 2009.
[30] J. T. Gwin and D. Ferris, "High-density EEG and independent
component analysis mixture models distinguish knee contractions from
ankle contractions," in 2011 Annual International Conference of the
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
IEEE Engineering in Medicine and Biology Society, EMBC, boston,
USA, 2011, pp. 4195-4198.
S. Makeig, A. J. Bell, T. P. Jung, and T. J. Sejnowski, "Independent
component analysis of electroencephalographic data," Advances in
Neural Information Processing Systems, vol. 8, pp. 145-151, 1996.
A. Delorme and S. Makeig, "Single subject data processing tutorial:
Decomposing Data Using ICA," in The EEGLAB Tutorial:
http://sccn.ucsd.edu/wiki/EEGLAB, 2013.
M. Al-Omari, R. Qahwaji, T. Colak, and S. Ipson, "Machine learningbased investigation of the associations between cmes and filaments,"
Solar Physics, vol. 262, pp. 511-539, 2010.
R. Qahwaji, T. Colak, M. Al-Omari, and S. Ipson, "Automated machine
learning based prediction of CMEs based on flare associations," Sol.
Phys, vol. 248, 2007.
R. Qahwaji and T. Colak, "Automatic Short-Term Solar Flare Prediction
Using Machine Learning and Sunspot Associations," Solar Phys., vol.
241, pp. 195-211, 2007.
R. Qahwaji, M. Al-Omari, T. Colak, and S. Ipson, "Using the Real,
Gentle and Modest AdaBoost Learning Algorithms to Investigate the
Computerised Associations between Coronal Mass Ejections and
Filaments," in Mosharaka International Conference on Communications,
Computers and Applications (MIC-CCA 2008), Mosharaka for
Researches and Studies, Amman, Jordan, 2008, pp. 37-42.
S. E. Fahlmann and C. Lebiere, "The cascade-correlation learning
architecture," in Advances in Neural Information Processing Systems 2
(NIPS-2) Denver, Colorado, 1989.
S. Rüping, "mySVM-Manual ": University of Dortmund, Lehrstuhl
Informatik 8, 2000.
212 | P a g e
www.ijacsa.thesai.org
| 9cs.NE
|
arXiv:1702.05063v2 [math.ST] 9 Mar 2018
A concentration inequality for the excess risk in least-squares
regression with random design and heteroscedastic noise
Adrien Saumard
Crest-Ensai, Université Bretagne Loire
March 12, 2018
Abstract
We prove a new and general concentration inequality for the excess risk in least-squares regression
with random design and heteroscedastic noise. No specific structure is required on the model, except the
existence of a suitable function that controls the local suprema of the empirical process. So far, only the
case of linear contrast estimation was tackled in the literature with this level of generality on the model.
We solve here the case of a quadratic contrast, by separating the behavior of a linearized empirical process
and the empirical process driven by the squares of functions of models.
keywords: regression, least-squares, excess risk, empirical process, concentration inequality, margin
relation.
AMS2000 : 62G08, 62J02, 60E15.
1
Introduction
The excess risk of a M-estimator is a fundamental quantity of the theory of statistical learning. Consequently,
a general theory of rates of convergence as been developed in the nineties and early 2000 ([Mas07, Kol11]).
However, it has been recently identified that some theoretical descriptions of learning procedures need finer
controls than those brought by the classical upper bounds of the excess risk. In this case, the derivation of
concentration inequalities for the excess risk is a new and exiting axis of research, of particular importance for
obtaining satisfying oracle inequalities in various contexts, especially linked to high dimension.
In the field of model selection, it has been indeed remarked that such concentration inequalities allow to
discuss the non-asymptotic optimality of model selection procedures ([BM07, AM09, Ler11, Sau12]). More
precisely, concentration inequalities for the excess risk and for the excess empirical risk ([BM11]) are central
tools to access the optimal constants in the oracle inequalities describing the model selection accuracy. Such
results have put to evidence the optimality of the so-called slope heuristics ([BM07, BMM12]) and more
generally of selection procedures based on the estimation of the minimal penalty ([AB09]), in statistical
frameworks linked to regularized quadratic estimation. Under similar assumptions, it is also possible to
discuss optimality of resampling and cross-validation type procedures ([Arl08, AL15, Cel14, NS17]).
In high dimension, convex methods allow to design and compute efficient estimators. This is the reason why
Chatterjee [Cha14] has recently focused on the estimation of the mean of a high dimensional Gaussian vector
under convex constraints. By getting a concentration inequality for the excess risk of a projected least-squares
estimator, Chatterjee [Cha14] has proved the universal admissibility of this estimator. The concentration
inequality has then been sharpened and extended to the excess risk of estimators minimizing penalized convex
criteria ([MvdG15, vdGW17]).
It is also well known (see for instance [BLT17]) that a weakness of the theory of regularized estimators
in a sparsity context is that classical oracle inequalities, such as in [BRT09], describe the performance of
estimators with an amount of regularization that actually depends on the confidence level considered in the
oracle inequality. This does not correspond to any practice with this kind of estimators, whose regularization
parameter is usually fixed using a cross-validation procedure. Recently, Bellec and Tsybakov [BT17], building
on [BLT18], have established more satisfying oracle inequalities, describing the performance of regularized
estimators such as LASSO, group LASSO and SLOPE with a confidence level independent of the regularization
1
parameter. In particular, the oracle inequalities can be integrated. Again, the central tool to obtain such bound
is a concentration inequality for the excess risk estimator at hand.
In this paper, we extend the technology developed in [Cha14, MvdG15, vdGW17] in order to establish a new
concentration inequality for the excess risk in least-squares regression with random design and heteroscedastic
noise. This is appealing since [Cha14] and [MvdG15] cover only least-squares regression with fixed design and
homoscedastic Gaussian noise, while [vdGW17] have to assume that the law of the design is known in order
to perform a ”linearized least-squares regression” (see Section 6.2 of [vdGW17]).
Our strategy is as follows. We first remark that the empirical process of interest splits into two parts: a
linear process and a quadratic one. Then we prove that the linear process achieves a second order margin
condition as defined in [vdGW17] and put meaningful conditions on the quadratic process in order to handle it.
Techniques from empirical process theory such as Talagrand’s type concentration inequalities and contraction
arguments are at the core of our approach.
The paper is organized as follows. The regression framework as well as some properties linked to margin
relations are described in Section 2. Then we state our main result in Section 4. The proofs are deferred to
Section 4.
2
Least-squares heteroscedastic regression with random design
2.1
Setting
n
Let {(Xi , Yi )}i=1 be an i.i.d. sample taking values in X × R, where X is a measurable space - typically a
subset of Rp . We assume that the following relation holds
Yi = g∗ (Xi ) + σ (Xi ) εi
for i = 1, ..., n ,
where g∗ is the regression function, σ is the heteroscedastic
noise level and E [εi |Xi ] = 0, E ε2i |Xi = 1.
We take a closed convex model G ⊂ L2 P X , where P X is the common distribution of the Xi′ s, and set
g 0 = arg min {P (γ (g))} ,
g∈G
where P is the common distribution of the pairs (Xi , Yi ) and γ is the least-squares contrast, defined by
γ (g) (x, y) = (y − g (x))2 .
We will also denote fg := γ (g) , f∗ = γ (g∗ ), f 0 = γ g 0 , fˆ = γ (ĝ) and0 F := γ (G). The function g 0 will be
called the projection of the regression function onto the model G. Indeed, if we denote k·k the quadratic norm
in L2 P X , it holds
g 0 − g∗ = min kg − g∗ k .
g∈G
We consider the least-squares estimator ĝ over G, defined to be
ĝ ∈ arg min {Pn (γ (g))} ,
g∈G
where Pn := 1/n
Pn
i=1 δ (Xi ,Yi )
is the empirical measure associated to the sample.
We want to assess the concentration of the quantity P fˆ − f 0 = P γ (ĝ) − γ g 0 , called the excess risk
of the least-squares estimator on G, around a single deterministic point. To this end, it is easy to see ([Sau12],
Remark 1, [NS17], Section 5.2 or van de Geer and Wainwright [vdGW17]) that the following representation
formula holds for the excess risk on G in terms of empirical process,
r
n
o
(1)
ŝ := P fˆ − f 0 = arg min s2 − Ên (s) ,
s≥0
where
Ên (s) = max (Pn − P ) f 0 − f
f ∈Fs
2
,
with Fs = f ∈ F ; P f − f 0 ≤ s2 . It is shown in [vdGW17] for various settings that include linearized
regression that the quantity ŝ actually concentrates around the following point,
i
h
(2)
s0 := arg min s2 − E (s) , E (s) := E Ên (s) .
s≥0
2.2
On a margin-like relation pointed on the projection of the regression function
In order to prove concentration inequalities for the excess risk on G, we will need to check the following
margin-like relation, also called ”quadratic curvature condition” in [vdGW17]: there exists a constant C > 0
such that
σ2 f − f 0
0
for all f ∈ F ,
(3)
P f −f ≥
C2
where
2
σ 2 (f ) := Ef 2 (X1 ) − (Ef (X1 ))
is the variance of f with respect to P X .
A very classical relation in statistical learning, called margin relation, consists in assuming that (3) holds
with f 0 is replaced by the image of the target f∗ = γ (g∗ ). Such relation is satisfied in least-squares regression
whenever the response variable Y is uniformly bounded. Here we do not assume that f∗ belongs to F thus f 0
may be different from f∗ .
Condition 1 There exists A1 > 0 such that |Y | ≤ A1 a.s.
From Condition 1 we deduce that kg∗ k∞ ≤ A1 and kσk∞ ≤ 2A1 .
Condition 2 There exists A2 > 0 such that
sup kgk∞ ≤ A2 < ∞ .
g∈G
From Conditions 1 and 2, we deduce that the image model F is also uniformly bounded: there exists K > 0
such that
sup f − f 0 ∞ ≤ K < ∞ .
f ∈F
More precisely, K = 2 (A1 + A2 ) is convenient.
The following proposition shows that relation (3) is satisfied in our regression setting whenever the response
variable is bounded and the model G is convex and uniformly bounded. It can also be found in [Lec11],
Proposition 1.3.3.
Proposition 3 If the model G is convex and Conditions 1 and 2 hold, then there exists a constant C > 0 such
that
σ2 f − f 0
P f − f0 ≥
for all f ∈ F ,
(4)
C2
Furthermore, C = 2 (A1 + A2 ) is convenient.
The major gain brought by Proposition 3 over the classical margin relation is that the bias of the model,
that is the quantity P f 0 − f∗ that is implicitly contained in the excess risk appearing in the classical margin
relation, is pushed away from Inequality (4). Proposition 3 is thus a refinement over the classical notion of
margin relation. It is stated for the least-squares contrast but it is easy to see that it can be extended to more
general situations, where the contrast γ is convex and regular in some sense (see Proposition 2.1, Section 2.2.3
in [Sau10]). For completeness, the proof of Proposition can be found in Section 4.1.
3
2.3
Second order quadratic margin condition
First notice that the arguments of the empirical process of interest can be decomposed into a linear and a
quadratic part. It holds, for any f = fg ∈ F and any (x, y) ∈ X ×R,
fg (x, y) − f 0 (x, y) = γ (g) (x, y) − γ g 0 (x, y)
2
(5)
= ψ (x, y) · g − g 0 (x) + g − g 0 (x) ,
where ψ (x, y) = −2 y − g 0 (x) .
To this contrast expansion around the projection g 0 of the regression function onto G, we can associate
two empirical processes, that we will call respectively the linear and
the quadratic empirical process, and we
will be more precisely interested by their local maxima on Gs := g ∈ G ; g − g 0 ≤ s , s ≥ 0,
n
2 o
.
and Ên,q (s) = max (Pn − P ) g − g 0
Ên,ℓ (s) = max (Pn − P ) ψ · g − g 0
g∈Gs
g∈Gs
In what follows, we will not directly show that the excess risk concentrates around s0 defined in (2), but rather
around a point s̃0 , defined to be,
h
i
s̃0 = arg min s2 − Eℓ (s) , Eℓ (s) = E Ên,ℓ (s) .
s≥0
It holds around s̃0 a relation of the type of a second order margin relation, introduced in [vdGW17], as proved
in the following Lemma, which proof is available in Section 4.1.
Lemma 4 For any s ≥ 0, it holds
and also
s2 − Eℓ (s) − s̃20 − Eℓ (s̃0 ) ≥ (s − s̃0 )2 ,
(6)
h
i
2
s2 − Ên,ℓ (s) − s̃20 − Ên,ℓ (s̃0 ) ≥ (s − s̃0 ) .
(7)
The fundamental difference with the second order margin relation stated in [vdGW17] is that we require
in Lemma 4 conditions on the linear part of empirical process and not on the empirical process of origin, that
takes in arguments contrasted functions. Indeed, it seems that for the latter empirical process, the second order
margin relation does not hold or is hard to check in least-squares regression in general. This difficulty indeed
forced van de geer and Wainwright [vdGW17], Section 6.2, to work in a ”linearized least-squares regression”
context, under the quite severe restriction that the distribution of design is known from the statistitian. On
contrary, our main result stated in Section 3 below is stated for a general regression situation, where the
distribution of the design is unknown and the noise level is heteroscedastic.
3
Main result
Before stating our new concentration inequality, we describe the required assumptions. In order to state the
next condition, let us denote
h
i
, E1 (s) = E Ên,1 (s) .
Ên,1 (s) = max (Pn − P ) g − g 0
g∈Gs
Condition 5 There is a sequence mn and a strictly increasing function J1 such that the function
is strictly convex and such that
2
ΦJ1 (u) := J1−1 (u) , u > 0,
E1 (s) ≤
J1 (s)
, s ≥ 0.
mn
4
Condition 6 Take K > 0. For any s > 0, there exists a constant D (s) ∈ (0, K] such that
sup g − g 0
∞
g∈Gs
≤ D (s) .
Notice that if Conditions 1, 2 and 5 hold, then by the use of classical symmetrization and contraction
arguments, for all s ≥ 0,
J1 (s)
J1 (s)
Eℓ (s) ≤ CA1 ,A2
and Eq (s) ≤ 4D (s)
,
mn
mn
where CA1 ,A2 is a positive constant that only depends on A1 and A2 . From now on, we set
J := max {CA1 ,A2 ; 4 (K ∨ 1)} J1 ,
so that max {Eℓ (s) ; Eq (s)} ≤ J (s) /mn for any s > 0 and also Eq (s) ≤ D (s) J (s) /mn .
We are now able to state our main result.
Theorem 7 If
J (s) = AJ s ; D (s) = A∞ s ; mn =
then it holds, for any t ≥ 0,
P
ĝ − g
Hence, if moreover
0
− s̃0
√
AJ A∞ s̃0
∨ c0
≥
n1/4
r
√
A0
n ; s̃0 ≍ √
n
√ !!
√
t + ln (1 + K n) t + ln (1 + K n)
≤ e−t .
+
n
n
(8)
√
√
√
ln n ≪ A0 ≪ n and AJ A∞ ≪ n then,
!
√
√
AJ A∞
ln n
= oP (1) .
∨
A0
n1/4
ĝ − g 0 − s̃0
= OP
s̃0
Inequality (8) of Theorem 7 is a new concentration inequality related least-squares regression with random
design and heteroscedastic noise on a convex, uniformly bounded model. In particular, it extends results of
[vdGW17] related to linearized regression, which is a simplified framework for regression, to the classical and
general least-squares framework described in Section 2.1 above. The proof of Theorem 7 is detailed in Section
4.2.
The following corollary provides an generic example entering into the assumptions of Theorem 7 and that
is related to linear aggregation via empirical risk minimization.
D
Corollary 8 Define M = Span (ϕ1 , ...,
ϕD ) the linear span generated by (ϕk )k=1 , an orthonormal dictionary
in L2 P X . Take G = B(M,L∞ ) g 0 , 1 ⊂ M the unit ball in sup-norm of M centered on g 0 , the projection of
g∗ onto M. Assume that
√
sup
kgk∞ ≤ cM D
(9)
g∈M,kgk2 =1
and
2
(ln n) ≤ D ≤
Then, if s̃0 ≍
p
D/n,
ĝ − g 0 − s̃0
= OP
s̃0
√
D
n1/4
√
n
.
ln n
∨
r
ln n
D
!
= oP (1) .
Note that Inequality (9) relating the sup-norm to the quadratic norm of the functions in the linear span
of the dictionary, is classical in non-parametric estimation and is satisfied for the usual functional bases such
as the Fourier basis, wavelets or piecewise polynomials over a regular partition (including histograms), see for
instance [BBM99]. In particular, Corollary 8 extends a concentration inequality recently obtained in [Sau18],
for the excess risk of the ERM in the linear aggregation problem when the dictionary at hand is the Fourier
dictionary.
5
4
4.1
Proofs
Proofs related to Section 2
Proof of proposition 3. Take f = fg ∈ F . Then, on the one hand,
2
≤ P f − f0
σ2 f − f 0
h
i
2
= E γ (g) − γ g 0
(X, Y )
= E (g − g 0 )2 (X) (2Y − g (X) − g0 (X))2
≤ 4 (A1 + A2 )
2
g − g0
γ (g) − γ g 0
(X, Y )
2
.
(10)
On the other hand,
P f − f0
=
E
=
E (g 0 − g) (X) (2Y − g (X) − g0 (X))
E (g 0 − g) (X) (2 Y − g 0 (X) + g0 (X) − g (X))
2
g − g 0 − 2E Y − g 0 (X) g − g 0 (X)
2
g − g 0 − 2E g∗ − g 0 (X) g − g 0 (X)
=
=
=
≥
g − g0
2
.
(11)
The latter inequality, which corresponds to E g∗ − g (X) g − g (X) ≤ 0 comes from the fact that G is
convex and so, g 0 being the projection of g∗ onto G, the scalar product in L2 P X between the functions
g∗ − g 0 and g − g 0 is nonpositive. Combining (10) and (11) now gives the result.
0
0
Proof of Lemma 4. Inequality (4) derives from (7) by taking expectation on both sides. Concerning the
proof of (4), it is easily seen that the function s 7→ Ên,ℓ (s) is concave. Indeed, take for si ≥ 0, i ∈ {1, 2},
gn,si = arg max (Pn − P ) ψ 1 · g − g 0
.
g∈Gsi
For any α, β ∈ (0, 1) , α + β = 1, if gb = αgn,s1 + βgn,s2 , then by the triangular inequality, gb ∈ Gαs1 +βs2 ,
which gives,
Ên,ℓ (αs1 + βs2 ) ≥ (Pn − P ) ψ 1 · gb − g 0 = αÊn,ℓ (s1 ) + β Ên,ℓ (s2 ) .
Now, from the concavity of s 7→ Ên,ℓ (s), we deduce that the function s 7→ s2 − Ên,ℓ (s) is 1-strongly convex,
which implies (6).
4.2
Proofs related to Section 3
Proof of Theorem 7. We prove the concentration of ĝ − g 0 at the right of s̃0 and arguments will be of
the same type for the deviations at the left. Take t, ε > 0, J := ⌈K/ε⌉ and set, for any j ∈ {1, ..., J} , the
intervals
Ij := ((j − 1) ε + δ + s̃0 , s̃0 + δ + jε] .
We also set
z (t) = 2C s̃0
It holds, for any δ > 0 (to be chosen later),
≤
≤
r
t
+ r0
n
r
Kt
t
+
.
n
n
P (s̃0 + δ < ŝ ≤ K)
P ∃s ∈ (s̃0 + δ, K) , s2 − Ên (s) ≤ s̃20 − Ên (s̃0 )
P ∃s ∈ (s̃0 + δ, K) , s2 − Ên (s) ≤ s̃20 − E (s̃0 ) + z (t) + e−t ,
6
where in the last inequality we used Lemma 10. Furthermore, by setting for all j ∈ {1, ..., J},
Pj := P ∃s ∈ Ij , s2 − Ên (s) ≤ s̃20 − E (s̃0 ) + z (t) ,
a union bound gives,
J
X
Pj .
P ∃s ∈ (s̃0 + δ, K) , s2 − Ên (s) ≤ s̃20 − E (s̃0 ) + z (t) ≤
j=1
Now, for each index j and for all s ∈ Ij , we have
2
s2 − Ên (s) ≥ ((j − 1) ε + δ + s̃0 ) − Ên (jε + δ + s̃0 ) .
Furthermore, it holds for all u > 0, with probability 1 − e−u ,
r
u
+ z (u)
n
Eℓ (jε + δ + s̃0 ) + Eq (jε + δ + s̃0 )
r
u
+2C (δ + jε)
+ z (u) ,
n
Ên (jε + δ + s̃0 ) ≤
E (jε + δ + s̃0 ) + 2C (δ + jε)
≤
where the first inequality comes from Lemma 10. By Lemma 4, we then have
2
((j − 1) ε + δ + s̃0 ) − Eℓ (jε + δ + s̃0 ) − Eq (jε + δ + s̃0 )
2
≥
s̃20 − Eℓ (s̃0 ) + (δ + jε) − D (jε + δ + s̃0 ) J (jε + δ + s̃0 ) /mn
≥
s̃20 − E (s̃0 ) + (δ + jε)2 − D (jε + δ + s̃0 ) J (jε + δ + s̃0 ) /mn
2
2
+ ((j − 1) ε + δ + s̃0 ) − (jε + δ + s̃0 )
−2ε (s̃0 + δ + jε) + ε2 .
Putting the previous estimates in (12), we get, for all s ∈ Ij ,
s2 − Ên (s) ≥
≥
2
s̃20 − E (s̃0 ) + (δ + jε) − D (jε + δ + s̃0 ) J (jε + δ + s̃0 ) /mn
r
u
−2 C
+ ε (δ + jε) − 2εs̃0 + ε2 − z (u)
n
1
2
s̃20 − E (s̃0 ) + (δ + jε) − D (jε + δ + s̃0 ) J (jε + δ + s̃0 ) /mn
2
2
r
u
+ ε − 2εs̃0 + ε2 − z (u) ,
−2 C
n
with probability 1 − e−u . We require that
2
(δ + jε) ≥ 4D (jε + δ + s̃0 ) J (jε + δ + s̃0 ) /mn .
Using the assumptions, it is equivalent to require
√
4 AJ A∞ (jε + δ + s̃0 )2
√
.
(δ + jε) ≥
n
2
Whenever AJ A∞ ≤
√
n, the last display is true if δ ∼ AJ A∞ s̃0 /n1/4 . We also require that
!
r
2
u
2
2
(δ + jε) ≥ 4 2 C
+ ε + 2εs̃0 − ε + z (u) + z (t) .
n
7
(12)
√
√
√
To finish the proof, we fix ε = 1/ n and u = t + ln (1 + K n). In particular, J ≤ 1 + K n and
J
X
j=1
Pj ≤ e−t .
Our conditions on δ = δ (t) become, for a constant c0 only depending on C and K,
r
√
√ !
√
AJ A∞ s̃0
t + ln (1 + K n) t + ln (1 + K n)
.
+
δ (t) ≥
∨ c0
n
n
n1/4
since s̃0 ∨ r0 ≪ 1.
Proof of Corollary 8. Under Assumption (9), we have
"
r
#
2
D
0
1/2
≤s
max (Pn − P ) g − g
E1 (s) ≤ E
,
g∈Gs
n
where we used two times Cauchy-Schwarz inequality. Hence, mn =
Furthermore, by Assumption (9), we have
√
sup g − g 0 ∞ ≤ cM s D .
√
√
n and J (s) = s D are convenient.
g∈Gs
√
√
√
We can thus apply Theorem 7 with D (s) = cM s D. Consequently, condition ln n ≪ A0 ≪ n turns into
ln n ≪ D ≪ n
√
√
and condition AJ A∞ ≪ n is satisfied whenever D ≪ n.
In the following theorem (see Theorem 8.1 in [vdGW17]), the right-tail inequalities are direct applications
of Bousquet [Bou02] and the left-tail inequalities are deduced from Klein and Rio [KR05].
Theorem 9 If Conditions 1 and 2 are satisfied and we set
K := sup f − f 0
f ∈Fs
∞
, σ s := sup σ f − f 0
f ∈Fs
then it holds
!
t
2Kt
P Ên (s) ≥ E (s) + (8KE (s) + 2σ 2s ) +
n
3n
!
r
Kt
t
2
P Ên (s) ≤ E (s) − (8KE (s) + 2σ s ) −
n
n
r
,
≤ e−t ,
≤ e−t ,
Using Proposition 3 and Conditions 1, 2, 5, we can simplify the bounds given in Theorem 9 as follows.
Lemma 10 If Conditions 1, 2 and 5 are satisfied, then with the same notations as in Theorem 9 and also
8K
2
2 ∗
r0 := 2C Φ
mn C 2
we have
!
r
2Kt
t
t
≤
P Ên (s) ≥ E (s) + 2Cs
+ r0
+
n
n
3n
!
r
r
t
t
Kt
P Ên,ℓ (s) ≤ E (s) − 2Cs
≤
− r0
−
n
n
n
r
8
e−t ,
e−t ,
Proof. We have σ 2s ≤ C 2 s2 , where the constant C is defined in proposition 3. Furthermore, using the fact
that uv ≤ ΦJ (u) + Φ∗J (v) for any u, v > 0, we get
8K
16K
2 2
2 ∗
= 2C 2 s2 + r02 .
J (s) ≤ 2C s + 2C ΦJ
8KE (s) ≤
mn
mn C 2
√
√
√
The conclusion is then easy to obtain by using a + b ≤ a + b.
References
[AB09]
S. Arlot and F. Bach. Data-driven calibration of linear estimators with minimal penalties. In
Y. Bengio, D. Schuurmans, J. Lafferty, C. K. I. Williams, and A. Culotta, editors, Advances in
Neural Information Processing Systems 22, pages 46–54, 2009.
[AL15]
S. Arlot and M. Lerasle. Choice of V for V -fold cross-validation in least-squares density estimation.
J. Mach. Learn. Res., 2015. To appear. arXiv:1210.5830.
[AM09]
S. Arlot and P. Massart. Data-driven calibration of penalties for least-squares regression. J. Mach.
Learn. Res., 10:245–279 (electronic), 2009.
[Arl08]
S. Arlot. V -fold cross-validation improved: V -fold penalization, February 2008. arXiv:0802.0566v2.
[BBM99]
A. Barron, L. Birgé, and P. Massart. Risk bounds for model selection via penalization. Probab.
Theory Related Fields, 113(3):301–413, 1999.
[BLT17]
P. C. Bellec, G. Lecué, and A. B. Tsybakov. Towards the study of least squares estimators with
convex penalty. arXiv preprint arXiv:1701.09120, 2017.
[BLT18]
P. C. Bellec, G. Lecué, and A. B. Tsybakov. Slope meets lasso: improved oracle bounds and
optimality. Ann. Stat., 2018. to appear, arXiv:1605.08651.
[BM07]
L. Birgé and P. Massart. Minimal penalties for Gaussian model selection. Probab. Theory Related
Fields, 138(1-2):33–73, 2007.
[BM11]
S. Boucheron and P. Massart. A high-dimensional Wilks phenomenon. Probab. Theory Related
Fields, 150(3-4):405–433, 2011.
[BMM12] J.-P. Baudry, C. Maugis, and B. Michel. Slope heuristics: overview and implementation. Stat.
Comput., 22(2):455–470, 2012.
[Bou02]
O. Bousquet. A Bennett concentration inequality and its application to suprema of empirical
processes. C. R. Math. Acad. Sci. Paris, 334(6):495–500, 2002.
[BRT09]
P. J. Bickel, Y. Ritov, and A. B. Tsybakov. Simultaneous analysis of lasso and Dantzig selector.
Ann. Statist., 37(4):1705–1732, 2009.
[BT17]
P. C. Bellec and A. B. Tsybakov. Bounds on the prediction error of penalized least squares
estimators with convex penalty. In Vladimir Panov, editor, Modern Problems of Stochastic Analysis
and Statistics, Selected Contributions In Honor of Valentin Konakov. Springer, 2017. To appear.
[Cel14]
A. Celisse. Optimal cross-validation in density estimation with the l2 -loss. Ann. Statist., 42(5):1879–
1910, 10 2014.
[Cha14]
S. Chatterjee. A new perspective on least squares under convex constraint.
42(6):2340–2381, 12 2014.
[Kol11]
V. Koltchinskii. Oracle inequalities in empirical risk minimization and sparse recovery problems,
volume 2033 of Lecture Notes in Mathematics. Springer, Heidelberg, 2011. Lectures from the 38th
Probability Summer School held in Saint-Flour, 2008, École d’Été de Probabilités de Saint-Flour.
[Saint-Flour Probability Summer School].
9
Ann. Statist.,
[KR05]
T. Klein and E. Rio. Concentration around the mean for maxima of empirical processes. Ann.
Probab., 33(3):1060–1077, 2005.
[Lec11]
G. Lecué. Interplay between concentration, complexity and geometry in learning theory with applications to high dimensional data analysis. Habilitation à diriger des recherches, Université Paris-Est,
December 2011.
[Ler11]
M. Lerasle. Optimal model selection for density estimation of stationary data under various mixing
conditions. Ann. Statist., 39(4):1852–1877, 2011.
[Mas07]
P. Massart. Concentration inequalities and model selection, volume 1896 of Lecture Notes in Mathematics. Springer, Berlin, 2007. Lectures from the 33rd Summer School on Probability Theory
held in Saint-Flour, July 6–23, 2003, With a foreword by Jean Picard.
[MvdG15] A. Muro and S. van de Geer. Concentration behavior of the penalized least squares estimator.
arXiv preprint arXiv:1511.08698, 2015. To appear in Statistica Neerlandica.
[NS17]
F. Navarro and A. Saumard. Slope heuristics and v-fold model selection in heteroscedastic regression
using strongly localized bases. ESAIM Probab. Stat., 21:412–451, 2017.
[Sau10]
A. Saumard. Regular Contrast Estimation and the Slope Heuristics. PhD thesis, Université Rennes
1, October 2010. https://tel.archives-ouvertes.fr/tel-00569372.
[Sau12]
A. Saumard. Optimal upper and lower bounds for the true and empirical excess risks in heteroscedastic least-squares regression. Electron. J. Statist., 6(1-2):579–655, 2012.
[Sau18]
Adrien Saumard. On optimality of empirical risk minimization in linear aggregation. Bernoulli,
24(3):2176–2203, 2018.
[vdGW17] S. van de Geer and M. J. Wainwright. On concentration for (regularized) empirical risk minimization. Sankhya A, 79(2):159–200, 2017.
10
| 10math.ST
|
ON GEODESIC RAY BUNDLES IN BUILDINGS
arXiv:1708.08431v3 [math.GR] 25 Mar 2018
TIMOTHÉE MARQUIS∗
Abstract. Let X be a building, identified with its Davis realisation. In this
paper, we provide for each x ∈ X and each η in the visual boundary ∂X of
X a description of the geodesic ray bundle Geo(x, η), namely, of the union of
all combinatorial geodesic rays (corresponding to infinite minimal galleries in
the chamber graph of X) starting from x and pointing towards η. When X is
locally finite and hyperbolic, we show that the symmetric difference between
Geo(x, η) and Geo(y, η) is always finite, for x, y ∈ X and η ∈ ∂X. This gives
a positive answer to a question of Huang, Sabok and Shinko in the setting of
buildings. Combining their results with a construction of Bourdon, we obtain
examples of hyperbolic groups G with Kazhdan’s property (T) such that the
G-action on its Gromov boundary is hyperfinite.
1. Introduction
This paper is motivated by a question of Huang, Sabok and Shinko ([HSS17,
Question 1.5]), asking whether in a proper and cocompact hyperbolic space X,
the symmetric difference between two geodesic ray bundles pointing in the same
direction is always finite (see below for precise definitions).
This is motivated by the study of Borel equivalence relations for the action of
a hyperbolic group G on its Gromov boundary: the authors of [HSS17] give a
positive answer to the above question when X is a CAT(0) cube complex, and
deduce that if G is a hyperbolic cubulated group (namely, if G acts properly
and cocompactly on a CAT(0) cube complex), then the G-action on its Gromov
boundary ∂G is hyperfinite, that is, it induces a hyperfinite equivalence relation
([HSS17, Corollary 1.2]).
As it turns out, the answer to [HSS17, Question 1.5] is “no” in full generality:
counter-examples are constructed in [Tou17]. The purpose of this paper is to give a
positive answer to this question when X is a hyperbolic locally finite building. We
underline that the class of groups acting properly and cocompactly on hyperbolic
locally finite buildings includes groups with Kazhdan’s property (T), and is thus
significantly different from the class of cubulated hyperbolic groups considered in
[HSS17] (see the fixed point theorem [NR97]). We now give a precise statement
of our main result.
By a classical result of M. Davis ([Dav98]), any building ∆ can be realised as a
complete CAT(0) metric space (X, d), which can be viewed as a subcomplex of the
barycentric subdivision of the standard geometric realisation of ∆. Let X (0) ⊆ X
denote the set of barycenters of chambers of X, that is, X (0) is the 0-skeleton of
the chamber graph of ∆. The boundary ∂X of X is the set of equivalence classes of
asymptotic geodesic rays in X (see Section 2 for precise definitions). We denote,
for each x ∈ X (0) and η ∈ ∂X, by Geo(x, η) ⊆ X (0) the union of all combinatorial
geodesic rays Γ = (xn )n∈N ⊆ X (0) (i.e. if xn is the barycenter of the chamber Cn ,
∗
F.R.S.-FNRS Postdoctoral Researcher.
1
2
T. MARQUIS
then (Cn )n∈N in an infinite minimal gallery in ∆) starting at x0 = x and pointing
towards η, in the sense that Γ is contained in a tubular neighbourhood of some
geodesic ray towards η. The sets Geo(x, η) are called geodesic ray bundles.
In this paper, we give a description of geodesic ray bundles in arbitrary buildings
(see Section 3 and Proposition 4.1). When the building X is (Gromov) hyperbolic
and locally finite, we deduce from this description the following theorem.
Theorem A. Let X be a locally finite hyperbolic building. Let x, y ∈ X (0) and let
η ∈ ∂X. Then the symmetric difference of Geo(x, η) and Geo(y, η) is finite.
As an immediate consequence of Theorem A and of [HSS17, Theorem 1.4], we
deduce the following corollary.
Corollary B. Let G be a group acting cocompactly on a locally finite hyperbolic
building X, and assume that G acts freely on the chambers of X. Then the natural
action of G on its Gromov boundary is hyperfinite.
In [Bou00, §1.5.3] (see also [Świ01]), M. Bourdon constructs a family of groups
G with property (T) acting cocompactly on some hyperbolic building X. These
groups G are defined as fundamental groups of some complexes of groups (a standard reference to this topic is [BH99]), and it follows straightaway from the form
of the complexes of groups involved that G acts freely on the set of chambers of
X and that X is locally finite. Another example of such a group with an explicit
short presentation also recently appeared in [Cap17].
In particular, Corollary B yields examples of hyperbolic groups with property
(T) whose boundary action is hyperfinite.
Corollary C. There exist (infinite) hyperbolic groups G with property (T) such
that the G-action on its Gromov boundary is hyperfinite.
Note that any group with property (T) that acts on a CAT(0) cube complex
has a global fixed point ([NR97]). In particular, Theorem A covers situations that
are not covered by [HSS17] (see also the last paragraph in the introduction of
[HSS17]).
Acknowledgement. I would like to thank Pierre-Emmanuel Caprace for bringing [HSS17, Question 1.5] to my attention and for suggesting to explore it in the
context of buildings. I would also like to thank the anonymous referee for his/her
precious comments.
2. Preliminaries
2.1. CAT(0)-spaces and Gromov hyperbolic spaces. The standard reference for this paragraph is [BH99].
Let (X, d) be a complete CAT(0)-space, namely, a complete geodesic metric
space in which every triangle ∆ is at least as thin as the corresponding triangle
∆0 in Euclidean space E with same side lengths, in the sense that any two points
x, y of ∆ are at distance at most dE (x0 , y 0 ) from one another, where x0 , y 0 are the
points on ∆0 corresponding to x, y respectively, and dE is the Euclidean distance
on E.
Given two points x, y ∈ X, there is a unique geodesic segment from x to y, which
we denote [x, y]. A geodesic ray based at x ∈ X is an isometry r : R≥0 → X with
r(0) = x. Two geodesic rays r, r0 are called asymptotic if supt∈R≥0 d(r(t), r0 (t)) <
ON GEODESIC RAY BUNDLES IN BUILDINGS
3
∞. Equivalently, identifying r, r0 with their image in X, they are asymptotic if
they are at bounded Hausdorff distance from one another, that is, if r (resp.
r0 ) is contained in a tubular neighbourhood of r0 (resp. r). We recall that a
tubular neighbourhood of a subset S of X is just an -neighbourhood of S for
some > 0. The boundary of X, denoted ∂X, is the set of equivalence classes
[r] of geodesic rays r ⊆ X, where two geodesic rays are equivalent if they are
asymptotic. We then say that the geodesic ray r points towards η := [r] ∈ ∂X.
For each x ∈ X and η ∈ ∂X, there is a unique geodesic ray starting at x and
pointing towards η, which we denote [x, η).
The space X is called (Gromov) hyperbolic if there is some δ > 0 such that
each triangle ∆ in X is δ-slim, in the sense that each side of ∆ is contained in a
δ-neighbourhood of the other two (X is then also called δ-hyperbolic). Hyperbolic spaces can be thought of as fattened versions of trees, and their behavior is
somehow opposite to that of a Euclidean space: if the CAT(0) space X is proper
(every closed ball of X is compact) and cocompact (there is some compact subset C ⊆ X such that Isom(X).C = X), then X is hyperbolic if and only if it does
not contain a subspace isometric to the Euclidean plane.
There is a notion of Gromov boundary of a hyperbolic space; in the context
of CAT(0) spaces, it coincides with the boundary defined above, endowed with
the cone topology (see [BH99, II.8]).
2.2. Buildings. The standard reference for this paragraph is [AB08].
Let ∆ be a building, viewed as a simplicial complex (see [AB08, Chapter 4]).
Let Ch(∆) denote the set of chambers (i.e. maximal simplices) of ∆. A panel
is a codimension 1 simplex of ∆. Two chambers are adjacent if they share a
common panel. A gallery between two chambers C, D ∈ Ch(∆) is a sequence
Γ = (C0 = C, C1 , . . . , Ck = D) of chambers such that Ci−1 and Ci are distinct
and adjacent for each i = 1, . . . , k. The integer k is called the length of Γ. If Γ
is a gallery of minimal length between C and D, it is called a minimal gallery
and its length is denoted dCh (C, D). The map dCh : Ch(∆) × Ch(∆) → N is then
a metric, called the chamber distance on ∆. An infinite sequence Γ = (Ci )i∈N
of chambers is called a minimal gallery if (C0 , . . . , Cn ) is a minimal gallery for
each n ∈ N. Any such Γ is contained in an apartment A of ∆.
Let A be an apartment of ∆ and let C, D ∈ Ch(A) be distinct adjacent chambers
in A. Then no chamber of A is at equal (chamber) distance from C and D;
˙
this yields a partition Ch(A) = Φ(C, D)∪Φ(D,
C), where Φ(C, D) is the set of
chambers that are closer to C than to D. The subcomplexes of A with underlying
chamber sets Φ(C, D) and Φ(D, C) are called half-spaces or roots, and their
intersection is called the wall separating C from D. If m is a wall delimiting the
half-spaces Φ+ , Φ− of A, we say that two subsets S+ ⊆ Φ+ and S− ⊆ Φ− are
separated by m.
A gallery Γ = (C0 , . . . , Ck ) (resp. Γ = (Ci )i∈N ) contained in an apartment A
is said to cross a wall m of A if m is the wall separating Ci−1 from Ci for some
i ∈ {1, . . . , k} (resp. i ∈ N>0 ). The gallery Γ ⊆ A is then minimal if and only if
it crosses each wall of A at most once. Moreover, if C, D ∈ Ch(A), then the set
of walls crossed by a minimal gallery Γ from C to D depends only on C, D, i.e. it
is independent of the choice of Γ.
If A is an apartment of ∆ and C ∈ Ch(A), there is a simplicial map ρA,C : ∆ →
A, called the retraction onto A centered at C, with the following properties:
4
T. MARQUIS
ρA,C is the identity on A and its restriction to any apartment A0 containing C
is an isomorphism, with inverse ρA0 ,C |A : A → A0 (in particular, ρA,C preserves
the minimal galleries from C). Moreover, ρA,C does not increase the distance:
dCh (ρA,C (D), ρA,C (E)) ≤ dCh (D, E) for all D, E ∈ Ch(∆).
The set of all panels of ∆ is denoted Res1 (∆). The star of a panel σ ∈ Res1 (∆),
denoted St(σ), is the set of chambers containing σ. For any panel σ ∈ Res1 (∆)
and any chamber C ∈ Ch(∆), there is a unique chamber C 0 in St(σ) minimising
the gallery distance from C to St(σ); it is called the projection of C on σ and
is denoted projσ (C) := C 0 . It has the following gate property: dCh (C, D) =
dCh (C, C 0 ) + dCh (C 0 , D) for all D ∈ St(σ).
The building ∆ is called locally finite if St(σ) is a finite set of chambers for
each σ ∈ Res1 (∆).
2.3. Davis realisation of a building. The standard reference for this paragraph
is [AB08, Chapter 12] (see also [Dav98]).
Let ∆ be a building. Then ∆ admits a CAT(0)-realisation (X, d), called the
Davis realisation of ∆, which is a complete CAT(0) space. It can be viewed as
a subcomplex of the barycentric subdivision of the standard geometric realisation
of ∆, and contains the barycenter of each chamber and panel of ∆. In the sequel,
we will often identify ∆ with its Davis realisation X, and all related notions
(apartment, chamber, panel, gallery, wall,. . . ) with their realisation in X (viewed
as closed subspaces of X).
We set
X (0) := {xC | C ∈ Ch(∆) = Ch(X)} ⊆ X,
where xC ∈ X denotes the barycenter of the chamber C. If A is an apartment of
X, we also set A(0) := A ∩ X (0) .
A combinatorial path between xC , xD ∈ X (0) is a piecewise geodesic path
Γ ⊆ X which is the union of the geodesic segments [xCi−1 , xCi ] (i = 1, . . . , k) for
some gallery (C = C0 , C1 , . . . , Ck = D); we then write Γ = (xCi )0≤i≤k . Thus
combinatorial paths in X are in bijection with galleries in ∆. A combinatorial
geodesic is a combinatorial path corresponding to a minimal gallery in ∆. One
defines similarly infinite combinatorial paths and combinatorial geodesic rays
(abbreviated CGR) by replacing galleries in ∆ with infinite galleries. If η ∈ ∂X,
then a combinatorial geodesic ray from x ∈ X (0) to η is a combinatorial
geodesic ray starting at x and at bounded Hausdorff distance from some (any)
geodesic ray pointing towards η. We denote by CGR(x, η) the set of CGR from
x ∈ X (0) to η ∈ ∂X. If Γxy is a combinatorial geodesic from some x ∈ X (0) to
some y ∈ X (0) , and if Γyz is a combinatorial geodesic (resp. ray) from y to some
z ∈ X (0) (resp. z ∈ ∂X), we denote by Γxy · Γyz the combinatorial path obtained
as the concatenation of Γxy and Γyz .
Each geodesic segment (resp. geodesic ray) of X is contained in some minimal
gallery, and hence also in some apartment A of X; in particular, ∂X is covered
by the boundaries ∂A of all apartments A of X. Conversely, the uniqueness of
geodesic rays implies that if x ∈ A and η ∈ ∂A for some apartment A of X,
then [x, η) ⊆ A. Of course, any combinatorial geodesic ray is also contained in
some apartment of X. For every apartment A and x = xC ∈ A(0) , the retraction
ρA,C : ∆ → A induces a retraction ρA,x : X → A with the same properties as the
ON GEODESIC RAY BUNDLES IN BUILDINGS
5
ones described in §2.2. Moreover, d(ρA,x (y), ρA,x (z)) ≤ d(y, z) for all y, z ∈ X,
with equality if y belongs to the closed chamber C ⊆ X.
Let A be an apartment of X. Here are a few important properties of walls in
A, which can be found in [Nos11] (see also [NV02]). A wall m of A that intersects
a geodesic (resp. geodesic ray) in more than one point entirely contains that
geodesic (resp. geodesic ray); in particular, m is convex. The subset A\m of A has
two connected components (the open half-spaces corresponding to m), and those
components are convex. As we saw in §2.2, a combinatorial path Γ = (xCi )0≤i≤k
(resp. Γ = (xCi )i∈N ) contained in A is a combinatorial geodesic (resp. a CGR) if
and only if it crosses each wall of A at most once.
Note that X is a proper CAT(0) space if and only if it is locally finite. The
building X is called hyperbolic if it is hyperbolic in the sense of §2.1 when
equipped with the CAT(0) metric d. Equivalently, X is hyperbolic if and only if
(A, d) is hyperbolic for some (resp. for each) apartment A of X, as readily follows
from the properties of retractions onto apartments. Note that Moussong gave a
characterisation of the hyperbolicity of X in terms of the type (W, S) of ∆ (see
[Mou88, Theorem 17.1]): X is hyperbolic if and only if (WJ := hJi, J) is not an
affine Coxeter system whenever |J| ≥ 3, and there is no pair of disjoint subsets
I, J ⊆ S such that WI and WJ are infinite and commute. The only fact that we
will need about hyperbolic buildings, however, is the following.
Lemma 2.1. Assume that the building X is hyperbolic. Then there is a constant
K > 0 such that for any x ∈ X (0) and η ∈ ∂X, any Γ ∈ CGR(x, η) is contained
in a K-neighbourhood of [x, η).
Proof. By [BH99, Proposition I.7.31], combinatorial geodesics are quasi-geodesics
(for the CAT(0) metric d), so that the lemma follows from [BH99, Theorem III.1.7].
Here is also a basic useful fact about combinatorial geodesic rays.
Lemma 2.2. Let x ∈ X (0) , and let Γ = (xn )n∈N be a CGR. Then there exists
some k ∈ N such that Γxxk · (xn )n≥k is a CGR for any combinatorial geodesic Γxxk
from x to xk .
Proof. Reasoning inductively, we may assume that x and x0 are adjacent. If
(x, x0 ) · Γ is a CGR, the claim is clear with k = 0. Otherwise, there is some m ≥ 1
such that the combinatorial path (x, x0 , . . . , xm ) is not a combinatorial geodesic,
so that dCh (x, xm ) ≤ m. Let Γxxm be any combinatorial geodesic from x to xm .
If Γxxm · (xn )n≥m is a CGR, we are done with k = m. Otherwise, there is some
k > m such that the combinatorial path Γxxm · (xm , . . . , xk ) is not a combinatorial
geodesic, so that dCh (x, xk ) ≤ k − 1. Let Γxxk be any combinatorial geodesic from
x to xk . We claim that Γxxk · (xn )n≥k is a CGR, yielding the lemma. Indeed,
otherwise there is some ` > k such that the combinatorial path Γxxk · (xn )k≤n≤` is
not a combinatorial geodesic, and hence
`−1 = dCh (x0 , x` )−1 ≤ dCh (x, x` ) < dCh (x, xk )+dCh (xk , x` ) ≤ k−1+`−k = `−1,
a contradiction.
3. Combinatorial bordification of a building
In this section, we recall the notion of combinatorial bordification of a building
introduced in [CL11], and relate it to the notions introduced in Section 2.
6
T. MARQUIS
Let ∆ be a building, as in §2.2. Recall that for each panel σ ∈ Res1 (∆), we have
a projection map projσ : Ch(∆) → St(σ) ⊆ Ch(∆) associating to each chamber
C the unique chamber of St(σ) closest to C. This defines an injective map
πCh : Ch(∆) →
Y
St(σ) : C 7→ σ 7→ projσ (C) .
σ∈Res1 (∆)
Q
We endow σ∈Res1 (∆) St(σ) with the product topology, where each star St(σ) is a
discrete set of chambers. The (minimal) combinatorial bordification of ∆ is
then defined as the closure
Y
C1 (∆) := πCh (Ch(∆)) ⊆
St(σ).
σ∈Res1 (∆)
Since πCh is injective, we may identify Ch(∆) with a subset of C1 (∆), and it
thus makes sense to say that a sequence of chambers (Cn )n∈N converges to some
ξ : Res1 (∆) → Ch(∆) in C1 (∆). If ∆ is reduced to a single apartment A, this
notion of convergence is transparent: (Cn )n∈N converges in C1 (A) if and only if
for every wall m of A, the sequence (Cn )n∈N eventually remains on the same side
of m. On the other hand, back to a general ∆, one can identify C1 (A) (A an
apartment) with the subset of C1 (∆) consisting of limits of sequences of chambers
in A, and in fact (see [CL11, Proposition 2.4])
C1 (∆) =
[
C1 (A).
A apartment
Let C ∈ Ch(∆), and let (Cn )n∈N be a sequence of chambers converging to some
ξ ∈ C1 (∆). We define the combinatorial sector based at C and pointing towards
ξ as
[ \
Q(C, ξ) :=
Conv(C, Cn ),
k≥0 n≥k
where Conv(C, Cn ) denotes the union of all minimal galleries from C to Cn . Then
Q(C, ξ) indeed only depends on C and ξ (and not on the choice of sequence
(Cn )n∈N converging to ξ), and is contained in some apartment. Note also that if
C 0 ∈ Ch(∆) is contained in Q(C, ξ), then
Q(C 0 , ξ) ⊆ Q(C, ξ).
Example 3.1. Let X be a building of type Ae2 . The apartments of X are then
Euclidean planes tesselated by congruent equilateral triangles. If A is an apartment of X, its bordification C1 (A) consists of 6 “lines of points” and 6 “isolated
points” (see [CL11, Example 2.6]), which can be seen as follows. Let x ∈ A(0) and
η ∈ ∂A.
If the direction η is non-singular, in the sense that [x, η) is not contained in a
tubular neighbourhood of any wall of A, then for any Γ = (xn )n∈N ∈ CGR(x, η)
contained in A, the sequence of (barycenters of) chambers (xn )n∈N converges in
C1 (A), to a unique ξ ∈ C1 (A). The sector Q(x, ξ) in A is shown on Figure 1.
If η is singular, that is, if [x, η) is contained in a tubular neighbourhood of
some wall of A, then the set of ξ ∈ C1 (A) obtained as above as the limit of
some Γ ∈ CGR(x, η) are the vertices of some simplicial line “at infinity” (see the
dashed line on Figure 2), and the combinatorial sectors Q(x, ξ) for ξ on this line
are represented on Figure 2.
ON GEODESIC RAY BUNDLES IN BUILDINGS
7
Figure 1. Non-singular direction
To see what combinatorial sectors look like, we relate them to the notions
introduced in §2.3. As in that paragraph, we identify ∆ with its Davis realisation
X. To avoid cumbersome notations, we also identify the chambers of ∆ with their
barycenters in X (i.e. Ch(∆) with X (0) ): this thus also identifies the notions of
minimal (resp. infinite) gallery and of combinatorial geodesic (resp. ray). For
each η ∈ ∂X and each apartment A of X, we let WηA denote the set of walls m of
A containing η in their boundary (i.e. m contains a geodesic ray towards η). We
also let Aη be the set of apartments of X with η ∈ ∂A.
For η ∈ ∂X, we next define an equivalence relation ∼η on X (0) as follows. For
x, y ∈ X (0) distinct adjacent chambers, we write x ≈η y if, for any apartment A
containing x and y, the wall of A separating x from y does not belong to WηA .
We also write x ≈η x for x ∈ X (0) , so that ≈η becomes a symmetric and reflexive
relation on X (0) . We then let ∼η be the transitive closure of ≈η . For any x ∈ X (0) ,
we now let
Φη (x) ⊆ X
be the subcomplex of X obtained as the union of all chambers y ∈ X (0) with
y ∼η x. Note that
x ∼η y ⇐⇒ y ∈ Φη (x) ⇐⇒ Φη (y) = Φη (x) for any y ∈ X (0) .
We start by making some useful observations about the relation ∼η .
Lemma 3.2. Let x, y ∈ X (0) and η ∈ ∂X, and assume that there exists an
apartment of Aη containing x, y. Then x ≈η y if and only if there exists an
apartment A ∈ Aη containing x, y such that the wall of A separating x from y
does not belong to WηA .
Proof. The implication ⇒ is clear. Conversely, let A ∈ Aη be an apartment
containing x, y and such that the wall m of A separating x from y does not
belong to WηA , and assume for a contradiction that there is an apartment A0 ∈ Aη
0
containing x, y such that the wall m0 of A0 separating x from y belongs to WηA . Let
z ∈ A∩A0 be the barycenter of the common panel of x and y. Then [z, η) ⊆ A∩A0 .
By definition of buildings, there is a simplicial isomorphism φ : A0 → A fixing
8
T. MARQUIS
A ∩ A0 pointwise. Since [z, η) ⊆ m0 by assumption and φ(m0 ) = m, we deduce
that [z, η) = φ([z, η)) ⊆ m. Hence m ∈ WηA , a contradiction.
The next lemma introduces some important terminology and notations. For
x ∈ X (0) and η ∈ ∂X, we call a CGR Γ ∈ CGR(x, η) straight if the infinite
gallery corresponding to Γ contains the geodesic ray [x, η).
Lemma 3.3. Let x ∈ X (0) and η ∈ ∂X. Then the following assertions hold:
(1) Let Γ = (xn )n∈N ∈ CGR(x, η). Then the sequence of chambers (xn )n∈N
converges in C1 (X). We denote its limit by ξΓ ∈ C1 (X) \ X (0) and we say
that Γ converges to ξΓ .
(2) Let y ∈ X (0) , and let Γx ∈ CGR(x, η) and Γy ∈ CGR(y, η) be contained in
some apartment A. Then ξΓx = ξΓy if and only if Γx and Γy eventually lie
on the same side of any given wall m ∈ WηA .
(3) If Γ ∈ CGR(x, η) is straight, it is contained in Φη (x) and in every apartment A ∈ Aη with x ∈ A(0) . Moreover, ξx,η := ξΓ ∈ C1 (X) \ X (0) is
independent of the choice of a straight Γ ∈ CGR(x, η).
Proof. (1) Since the CGR Γ is contained in some apartment A, this readily follows
from the above description of convergence in C1 (A).
(2) We have to show that if Γx and Γy eventually lie on different sides of a wall
m of A, then m ∈ WηA . But if Γ0x ⊆ Γx and Γ0y ⊆ Γy are CGRs separated by m,
then [x, η) (which is contained in a tubular neighbourhood of Γ0x and Γ0y ) must be
contained in a tubular neighbourhood of m, as claimed.
(3) Let Γ ∈ CGR(x, η) be straight, and let A ∈ Aη with x ∈ A(0) . Thus
A also contains [x, η). Since [x, η) is not contained in any wall of A, we deduce
that A must contain infinitely many chambers of Γ, and hence also Γ by convexity.
Moreover, since [x, η) does not intersect any wall in WηA , the CGR Γ does not cross
any wall in WηA , and hence Γ ⊆ Φη (x) by Lemma 3.2. Finally, if Γ0 ∈ CGR(x, η)
is straight, then both Γ and Γ0 are contained in a common apartment A ∈ Aη by
the above discussion, and hence ξΓ = ξΓ0 by (2).
We next give an alternative description of the sets Φη (x).
Proposition 3.4. Let x ∈ X (0) and η ∈ ∂X. Then
Φη (x) ∩ X (0) = {y ∈ X (0) | ξx,η = ξy,η }.
Proof. Let y ∈ X (0) . We have to show that x ∼η y if and only if ξx,η = ξy,η .
Assume first that x ∼η y. Reasoning inductively on the length of a gallery (x =
x0 , x1 , . . . , xn = y) from x to y such that xi−1 ≈η xi for all i ∈ {1, . . . , n}, there is
no loss of generality in assuming that x ≈η y. Let Γx = (xn )n∈N ∈ CGR(x, η) be
straight. By Lemma 2.2, there is some k ∈ N and some combinatorial geodesic
Γyxk from y to xk such that Γyxk η := Γyxk · (xn )n≥k ∈ CGR(y, η). Let A ∈ Aη be
an apartment containing Γyxk η . Let Γy ∈ CGR(y, η) be straight, so that Γy ⊆ A
by Lemma 3.3(3). We claim that Γyxk does not cross any wall in WηA : this will
imply that Γyxk η and Γy do not cross any wall in WηA , and hence that
ξy,η = ξΓy = ξΓyxk η = ξΓx = ξx,η
by Lemma 3.3(2), as desired. Indeed, if m ∈ WηA separates y from xk and if
A0 ∈ Aη is an apartment containing Γx , then the wall m0 := ρA0 ,xk (m) of A0
0
belongs to WηA (because ρA0 ,xk does not increase the distance, and hence [xk , η) =
ON GEODESIC RAY BUNDLES IN BUILDINGS
9
ρA0 ,xk ([xk , η)) ⊆ A ∩ A0 is contained in a tubular neighbourhood of both m and
m0 ) and separates xk from y 0 := ρA0 ,xk (y). But since m0 cannot be crossed by
(xn )0≤n≤k , it must separate the adjacent chambers x = ρA0 ,xk (x) and y 0 . Now, if α
is the half-apartment of A0 containing x and delimited by m0 , we find by [AB08,
00
Exercise 5.83(a)] an apartment A00 containing α and y. Then m0 ∈ WηA separates
x from y in A00 , contradicting our hypothesis x ≈η y.
Conversely, assume that ξx,η = ξy,η , and let us show that x ∼η y. Let Γx =
(xn )n∈N ∈ CGR(x, η) and Γy ∈ CGR(y, η) be straight. By Lemma 2.2, there
is some k ∈ N and some combinatorial geodesic Γyxk from y to xk such that
Γyxk η := Γyxk · (xn )n≥k ∈ CGR(y, η). Let A ∈ Aη be an apartment containing
Γyxk η . Then Γy ⊆ A by Lemma 3.3(3). Note that the walls of A separating xk
from y do not belong to WηA , for otherwise the CGRs (xn )n≥k and Γy (which do
not cross any wall in WηA ) would be separated by some wall of WηA , contradicting
our assumption that ξΓx = ξx,η = ξy,η = ξΓy . Hence x ∼η xk ∼η y by Lemma 3.2,
yielding the claim.
We conclude our round of observations about the relation ∼η with the following
consequences of Proposition 3.4.
Lemma 3.5. Let x ∈ X (0) and η ∈ ∂X. Then the following assertions hold:
(1) Let A ∈ Aη be an apartment containing x and let y ∈ A(0) . Then x ∼η y
if and only if the walls of A separating x from y do not belong to WηA .
(2) Let Γ ∈ CGR(x, η) and let A be an apartment containing Γ. Then Γ
converges to ξx,η ⇐⇒ the walls of A crossed by Γ do not belong to WηA
⇐⇒ Γ ⊆ Φη (x).
Proof. (1) The implication ⇐ follows from Lemma 3.2. Conversely, assume that
x ∼η y. Then ξx,η = ξy,η by Proposition 3.4, that is, ξΓx = ξΓy for some straight
Γx ∈ CGR(x, η) and Γy ∈ CGR(y, η). By Lemma 3.3(3), Γx and Γy are contained
in A. If now m ∈ WηA separates x from y then it also separates Γx from Γy and
hence ξΓx 6= ξΓy , a contradiction.
(2) This readilfy follows from (1).
To get a better understanding of combinatorial sectors, we first show that, given
an element ξ ∈ C1 (X) \ X (0) , one can choose a sequence of chambers (xn )n∈N of
X converging to ξ in a nice and controlled way. Here, by “nice” we mean that
Γ := (xn )n∈N can be chosen to be a CGR, and by “controlled” we mean that we
may impose further restrictions on Γ.
Lemma 3.6. Let ξ ∈ C1 (X) \ X (0) . Then there is some η ∈ ∂X and some straight
Γ = (yn )n∈N ∈ CGR(y0 , η) such that ξΓ = ξ.
Proof. Let A be an apartment of X with ξ ∈ C1 (A). Let (xn )n∈N be a sequence
of chambers of A converging to ξ. Since the space A is proper, the sequence of
geodesic segments ([x0 , xn ])n∈N subconverges to some geodesic ray r0 := [x0 , η) for
some η ∈ ∂A. In other words, up to extracting a subsequence, we may assume
that (xn )n∈N is contained in an -neighbourhood N (r0 ) ⊆ A of r0 for some > 0.
We claim that there exists a finite subset S ⊆ WηA such that for each m ∈
WηA \ S, the neighbourhood N (r0 ) is entirely contained in one of the half-spaces
delimited by m. Indeed, any wall in WηA intersecting N (r0 ), say in y, contains
the geodesic ray [y, η) ⊆ N (r0 ) (see e.g. [BH99, Theorem II.2.13]), and hence a
10
T. MARQUIS
Figure 2. Singular direction
subray of r0 in an -neighbourhood. On the other hand, since A is locally finite,
there is some N ∈ N such that any ball of radius in A intersects at most N walls.
In particular, there are at most N walls intersecting N (r0 ), whence the claim.
Recall that for any wall m of A, the sequence (xn )n∈N eventually remains on
the same side of m; in particular, there is some k ∈ N such that (xn )n≥k is entirely
contained in some half-space associated to m for each m ∈ S. Hence for any n ≥ k,
the walls separating xk from xn do not lie in WηA . Let Γ = (yn )n∈N ∈ CGR(xk , η)
be straight (thus y0 = xk ). Then by Lemma 3.3(3), we know that Γ ⊆ Φη (xk ) ∩ A.
Since for any n ≥ k and any wall m ∈ WηA , the chambers xn , xk , yn all lie on
the same side of m, we conclude as in the proof of Lemma 3.3(2) that ξΓ = ξ, as
desired.
Proposition 3.7. Let x ∈ X (0) and ξ ∈ C1 (X) \ X (0) . Then
Q(x, ξ) = {y ∈ X (0) | y is on a CGR starting from x and converging to ξ}.
Proof. Let Γ = (xn )n∈N be a CGR with x0 = x and converging to ξ. To prove
the inclusion ⊇, we have to show that for any k ∈ N, the chamber xk belongs to
Q(x, ξ). But as xk ∈ Conv(x, xn ) for every n ≥ k, this is clear.
Conversely, let y ∈ Q(x, ξ). By Lemmas 2.2 and 3.6, there exists a CGR
Γ = (xn )n∈N starting from x and converging to ξ. Let n ∈ N be such that
y ∈ Conv(x, xn ). Since replacing the portion of Γ between x and xn by some
combinatorial geodesic from x to xn passing through y still yields a CGR, the
lemma follows.
We next wish to prove a refinement of Proposition 3.7 by relating the combinatorial bordification to the visual boundary of X.
ON GEODESIC RAY BUNDLES IN BUILDINGS
11
For η ∈ ∂X, we define the transversal graph to X in the direction η as the
graph X η with vertex set
Cη := {ξx,η | x ∈ X (0) } ⊆ C1 (X) \ X (0)
and such that ξx,η , ξy,η ∈ Cη with ξx,η 6= ξy,η are adjacent (i.e. connected by an
edge) if and only if there exist adjacent chambers x0 , y 0 ∈ X (0) such that ξx0 ,η = ξx,η
and ξy0 ,η = ξy,η . The elements of Cη will also be called chambers, and we define
the notions of galleries and chamber distance in X η as in §2.2. Note that by
Lemma 3.6, any ξ ∈ C1 (X) \ X (0) is of the form ξ = ξx,η for some x ∈ X (0) and
η ∈ ∂X, that is,
[
C1 (X) = X (0) ∪
Cη .
η∈∂X
Example 3.8. In the context of Example 3.1, assume that X consists of a single
apartment A and that η ∈ ∂A is a singular direction. Then X η is a simplicial line
(the dashed line on Figure 2). The Φη (y) for y ∈ A(0) are stripes obtained as the
convex hull of two “adjacent” walls of WηA , namely, of walls of A in the direction
of η.
Here is another description of Cη , in terms of CGR’s.
Proposition 3.9. Let x ∈ X (0) and η ∈ ∂X. Then
Cη = {ξ ∈ C1 (X) \ X (0) | ξ = ξΓ for some Γ ∈ CGR(x, η)}.
Proof. The inclusion ⊆ is clear. Conversely, if ξ = ξΓ for some Γ = (xn )n∈N ∈
CGR(x, η), then by Lemma 3.10 below, there is some k ∈ N such that Γ0 :=
(xn )n≥k ⊆ Φη (xk ). Hence ξ = ξΓ0 = ξxk ,η ∈ Cη by Lemma 3.5(2).
Lemma 3.10. Let x ∈ X (0) and η ∈ ∂X. For any Γ = (xn )n∈N ∈ CGR(x, η),
the sequence (ξxn ,η )n∈N ⊆ Cη is eventually constant. In other words, there is some
k ∈ N such that (xn )n≥k ⊆ Φη (xk ).
Proof. Let A be an apartment containing Γ (thus A ∈ Aη ), and assume for a
contradiction that (ξxn ,η )n∈N ⊆ Cη is not eventually constant. Thus there are
infinitely many walls {mi | i ∈ N} ⊆ WηA crossed by Γ (see Lemma 3.5).
Since [x, η) ⊆ A is not contained in any wall, it does not intersect any wall mi ,
i ∈ N. On the other hand, Γ is contained in an -neighbourhood of [x, η) for some
> 0. For each y ∈ Γ, let y 0 ∈ [x, η) with d(y, y 0 ) ≤ . Then there is some n ∈ N
such that [y, y 0 ] intersects at most n walls of A for any y ∈ Γ. Now, let y ∈ Γ∩A(0)
be such that the walls m1 , . . . , mn+1 intersect the combinatorial geodesic from x
to y contained in Γ. Then the walls m1 , . . . , mn+1 must all intersect the geodesic
segment [y, y 0 ], yielding the desired contradiction.
We can now formulate the announced refinement of Proposition 3.7.
Theorem 3.11. Let x ∈ X (0) and ξ ∈ Cη for some η ∈ ∂X. Then
Q(x, ξ) = {y ∈ X (0) | y is on a CGR from x to η and converging to ξ}.
Proof. The inclusion ⊇ follows from Proposition 3.7. The converse inclusion is
proved exactly as in the proof of Proposition 3.7, the existence of a CGR from x
to η and converging to ξ following from Proposition 3.9.
12
T. MARQUIS
Given x ∈ X (0) and η ∈ ∂X, we next wish to show that the combinatorial sector
Q(x, ξx,η ) is “minimal” in the direction η, in the sense that it is contained in every
other combinatorial sector Q(x, ξ) with ξ ∈ Cη (see Proposition 3.13 below). To
this end, we first need a more precise version of Lemma 3.6, by further improving
our control of CGR’s converging to a given ξ ∈ C1 (X) \ X (0) .
Lemma 3.12. Let x ∈ X (0) and η ∈ ∂X. If y ∈ X (0) is on some CGR from x to
η, then y is on some Γ ∈ CGR(x, η) converging to ξy,η .
Proof. Let Γxyη be a CGR from x to η passing through y, and let Γxy (resp. Γyη )
be the combinatorial geodesic from x to y (resp. CGR from y to η) contained in
Γxyη , so that Γxyη = Γxy · Γyη . Let A be an apartment containing Γxyη , and let
Γyξ ⊆ A be a straight CGR from y to η and converging to ξ := ξy,η . In particular,
Γyξ does not cross any wall in WηA . We claim that Γ := Γxy ·Γyξ is a CGR, yielding
the lemma.
Otherwise, there is a wall m of A that is crossed by both Γxy and Γyξ . Since
m cannot be crossed by Γyη , it separates Γyη from Γy0 ξ for some CGR Γy0 ξ to
η contained in Γyξ . Since Γy0 ξ and Γyη are at bounded Hausdorff distance from
one another, this implies that m ∈ WηA , and hence that Γyξ cannot cross m, a
contradiction.
Proposition 3.13. Let x ∈ X (0) , η ∈ ∂X and ξ ∈ Cη . Then
Q(x, ξx,η ) = Q(x, ξ) ∩ Φη (x) = {y ∈ Q(x, ξ) | ξy,η = ξx,η }.
Proof. Note that the second equality holds by Proposition 3.4. Let y ∈ Q(x, ξ) ∩
Φη (x). Then y lies on some CGR from x to η by Theorem 3.11, and hence also
on some Γ ∈ CGR(x, η) converging to ξy,η by Lemma 3.12. But since ξy,η = ξx,η
by Proposition 3.4, we then have y ∈ Q(x, ξx,η ) by Theorem 3.11.
Conversely, if y ∈ Q(x, ξx,η ) then certainly y ∈ Φη (x) by Theorem 3.11 and
Lemma 3.5(2), and it remains to show that y ∈ Q(x, ξ). Let A be an apartment
containing Q(x, ξ) (thus A ∈ Aη ).
Note first that A contains Q(x, ξx,η ). Indeed, let Γ = (xn )n∈N ∈ CGR(x, η)
be straight, Sso that
Γ converges to ξx,η and Γ ⊆ A by Lemma 3.3(3). Then
T
Q(x, ξx,η ) = k∈N n≥k Conv(x, xn ) ⊆ A, as claimed.
Let now Γxyη be a CGR from x to η passing through y and converging to ξx,η
(see Theorem 3.11), and let us show that y is also on a CGR from x to η converging
to ξ (and hence that y ∈ Q(x, ξ) by Theorem 3.11, as desired).
Write Γxyη = Γxy · Γyη , where Γxy is a combinatorial geodesic from x to y and
Γyη a CGR from y to η. By Lemma 2.2, there is a CGR Γyξ ⊆ A from y to η
converging to ξ. We claim that Γxy ·Γyξ is still a CGR, as desired. Otherwise, there
is a wall m of A that is crossed by both Γxy and Γyξ . Since m cannot be crossed
by Γyη , it separates Γyη from Γy0 ξ for some CGR Γy0 ξ contained in Γyξ . Since Γy0 ξ
and Γyη are at bounded Hausdorff distance from one another, this implies that
m ∈ WηA , so that Γxyη cannot cross m, a contradiction.
To conclude this section, we give a consequence of hyperbolicity for the building
X in terms of the sets Cη .
Lemma 3.14. Assume that the building X is hyperbolic. Then Cη is a bounded
set of chambers for each η ∈ ∂X. In particular, if X is, moreover, locally finite,
then Cη is finite for all η ∈ ∂X.
ON GEODESIC RAY BUNDLES IN BUILDINGS
13
Proof. Let K be as in Lemma 2.1. Note that there exist constants δ1 ≥ 1 and
δ2 ≥ 0 such that
1
dCh (y, z) − δ2 ≤ d(y, z) for all y, z ∈ X (0)
δ1
(see [BH99, Proposition I.7.31]). We also let δ3 > 0 be such that for any x ∈ X (0) ,
the closed chamber C of X of which x is the barycenter is contained in a δ3 neighbourhood of x (see §2.3). We fix some N ∈ N such that N ≥ δ1 (2K +δ2 +δ3 ).
Let x ∈ X (0) and η ∈ ∂X. We claim that any Γ = (xn )n∈N ∈ CGR(x, η) crosses
at most N walls in WηA , where A is any apartment containing Γ (hence η ∈ ∂A).
This will imply that the chambers {ξxn ,η | n ∈ N} of X η are at gallery distance at
most N from ξx,η , and hence the lemma will follow from Proposition 3.9.
Let thus Γ = (xn )n∈N ∈ CGR(x, η) and let A be an apartment containing Γ.
Let Γ0 = (yn )n∈N ⊆ A be a straight CGR from x to η. By Lemma 2.1, we know
that Γ and Γ0 are contained in a 2K-neighbourhood of one another. Assume for a
contradiction that the combinatorial geodesic (xn )0≤n≤k crosses N +1 walls in WηA
for some k ∈ N. Let ` ∈ N be such that d(xk , y` ) ≤ 2K +δ3 . Thus dCh (xk , y` ) > N .
But then
N
1
2K + δ3 ≤
− δ2 < dCh (xk , y` ) − δ2 ≤ d(xk , y` ) ≤ 2K + δ3 ,
δ1
δ1
a contradiction.
Remark 3.15. Note that, although Lemma 3.14 will be sufficient for our purpose,
it is not hard to see (using Moussong’s characterisation of hyperbolicity for Coxeter
groups, see [Mou88, Theorem 17.1]) that its converse also holds: the building X
is hyperbolic if and only if each transversal graph X η (η ∈ ∂X) is bounded.
4. Geodesic ray bundles in buildings
Throughout this section, we let X be a building, identified with its Davis realisation as in Section 3, and we keep all notations introduced in Sections 2 and 3.
We also fix some η ∈ ∂X.
We denote for each x ∈ X (0) by Geo(x, η) the ray bundle from x to η, that is,
Geo(x, η) := {y ∈ X (0) | y lies on some Γ ∈ CGR(x, η)}.
The description of combinatorial sectors provided in Section 3 then yields the
following description of ray bundles.
Proposition 4.1. Geo(x, η) =
S
ξ∈Cη
Q(x, ξ).
Proof. This inclusion ⊇ is clear by Theorem 3.11. Conversely, if Γ ∈ Geo(x, η),
then Γ converges to some ξ ∈ Cη by Proposition 3.9, and Γ ⊆ Q(x, ξ) by Theorem 3.11, yielding the converse inclusion.
We first establish Theorem A inside an apartment. If x ∈ A(0) for some apartment A ∈ Aη , we set
GeoA (x, η) := {y ∈ A(0) | y lies on some Γ ∈ CGR(x, η) with Γ ⊆ A}.
Lemma 4.2. Let A ∈ Aη . Then for any x ∈ A(0) ,
GeoA (x, η) = Geo(x, η) ∩ A.
14
T. MARQUIS
Proof. The inclusion ⊆ is clear. For the converse inclusion, we have to show that
if y ∈ A(0) lies on some Γ ∈ CGR(x, η), then it also lies on some Γ0 ∈ CGR(x, η)
with Γ0 ⊆ A. But we may take Γ0 = ρA,x (Γ), because ρA,x preserves combinatorial
geodesic rays from x and does not increase the distance.
Lemma 4.3. Let A ∈ Aη and let x ∈ A(0) . If y ∈ GeoA (x, η), then GeoA (y, η) ⊆
GeoA (x, η).
Proof. Reasoning inductively on dCh (x, y), we may assume that x and y are
adjacent. Let m be the wall of A separating x from y. Let z ∈ GeoA (y, η) and let
us show that z ∈ GeoA (x, η).
By Lemma 3.12, we find some CGR Γyzξ ⊆ A from y to η going through z and
converging to ξ := ξz,η . Write Γzξ for the CGR from z to η contained in Γyzξ . Let
also Γxyη ⊆ A be a CGR from x to η going through y, and let Γyη be the CGR
from y to η contained in Γxyη . Finally, let Γxz be a combinatorial geodesic from x
to z. We claim that Γxz · Γzξ is a CGR, yielding the lemma.
Otherwise, there is some wall m0 of A crossed by Γxz and Γzξ . Then m0 cannot
separate z from y because Γyzξ is a CGR, and hence m0 = m. But as Γxyη is a
CGR, the CGR Γyη cannot cross m, so that m separates Γyη from some CGR Γz0 ξ
to η contained in Γzξ . Since Γyη and Γz0 ξ are at bounded Hausdorff distance, we
deduce that m ∈ WηA , and hence that Γzξ cannot cross m, a contradiction.
Lemma 4.4. Assume that X is hyperbolic. Let A ∈ Aη and let x, y ∈ A(0) . Then
the symmetric difference of GeoA (x, η) and GeoA (y, η) is finite.
Proof. Reasoning inductively on dCh (x, y), there is no loss of generality in assuming that x and y are adjacent. Assume for a contradiction that there is an
infinite sequence (yn )n∈N ⊆ GeoA (y, η) \ GeoA (x, η). Choose for each n ∈ N some
Γn ∈ CGR(y, η) passing through yn . Note that if Γn,≤yn denotes the combinatorial
geodesic from y to yn contained in Γn , then Γn,≤yn is disjoint from GeoA (x, η), for
if x0 ∈ GeoA (x, η) ∩ Γn,≤yn , then yn ∈ GeoA (x0 , η) ⊆ GeoA (x, η) by Lemma 4.3, a
contradiction.
Since A is locally finite, the sequence (Γn )n∈N then subconverges to a CGR
Γ = (xn )n∈N ⊆ A that is disjoint from GeoA (x, η). On the other hand, since A is
hyperbolic, Lemma 2.1 yields that Γ ∈ CGR(y, η). But then Lemma 2.2 implies
that xn ∈ GeoA (x, η) for all large enough n, a contradiction.
We now turn to the proof of Theorem A in the building X. For the rest of this
section, we assume that X is hyperbolic and locally finite, so that Cη is finite by
Lemma 3.14.
Lemma 4.5. Let x ∈ X (0) and ξ ∈ Cη , and let A be an apartment containing
Q(x, ξ). Let S be an infinite subset of Q(x, ξ). Then there is some z ∈ Q(x, ξ)
such that Q(z, ξz,η ) ∩ S is infinite.
Proof. Since Cη is finite, there is an infinite subset S1 of S and some ξ1 ∈ Cη
such that ξy,η = ξ1 for all y ∈ S1 . Let z ∈ S1 . By Lemma 4.4, we know that
Q(x, ξ) \ GeoA (z, η) is finite, and hence by Proposition 4.1, there is some infinite
subset S2 of S1 contained in Q(z, ξ2 ) for some ξ2 ∈ Cη . But then Proposition 3.13
implies that S2 ⊆ Q(z, ξz,η ) since ξz,η = ξ1 , as desired.
Lemma 4.6. Let x, y ∈ X (0) . Then Q(y, ξy,η ) \ Geo(x, η) is finite.
ON GEODESIC RAY BUNDLES IN BUILDINGS
15
Proof. Assume for a contradiction that there exists an infinite sequence (yn )n∈N ⊆
Q(y, ξy,η )\Geo(x, η). By [CL11, Proposition 2.30], there is some z ∈ X (0) such that
Q(z, ξy,η ) ⊆ Q(x, ξy,η ) ∩ Q(y, ξy,η ) (note that this amounts to say that Q(x, ξy,η ) ∩
Q(y, ξy,η ) is nonempty, which readily follows from Proposition 3.7 together with
Lemma 2.2). Let A be an apartment containing Q(y, ξy,η ).
By Lemma 4.4, we know that Q(y, ξy,η ) \ GeoA (z, η) is finite, and we may thus
assume, up to taking a subsequence, that (yn )n∈N ⊆ GeoA (z, η). Hence by Proposition 4.1, we may further assume, again up to extracting a subsequence, that
(yn )n∈N ⊆ Q(z, ξ) for some ξ ∈ Cη . Since ξz,η = ξy,η and (yn )n∈N ⊆ Φη (y)
by Proposition 3.13, this proposition implies that (yn )n∈N ⊆ Q(z, ξz,η ). But
Q(z, ξz,η ) ⊆ Q(x, ξz,η ) because z ∈ Q(x, ξy,η ) = Q(x, ξz,η ), yielding the desired
contradiction as Q(x, ξz,η ) ⊆ Geo(x, η) by Proposition 4.1.
Theorem 4.7. Let x, y ∈ X (0) . Assume that X is hyperbolic and locally finite.
Then Geo(y, η) \ Geo(x, η) is finite.
Proof. By Lemma 3.14, we know that Cη is finite. By Proposition 4.1, we have
to prove that if ξ ∈ Cη , then Q(y, ξ) \ Geo(x, η) is finite. Assume for a contradiction that there is an infinite sequence (yn )n∈N ⊆ Q(y, ξ) \ Geo(x, η). Then
by Lemma 4.5, up to extracting a subsequence, we may assume that (yn )n∈N ⊆
Q(z, ξz,η ) for some z ∈ Q(y, ξ). This contradicts Lemma 4.6.
Appendix A. Transversal buildings
Let X be a building and let η ∈ ∂X. In [CL11, Section 5], a construction of
“transversal building” X η to X in the direction η is given. However, as pointed
out to us by the referee, the premises of that construction are incorrect; the correct
construction of X η is the one given in §3 (where we called X η the “transversal
graph” to X in the direction η). Although we did not need this fact in our proof
of Theorem A, one can show that this transversal graph X η is indeed the chamber
graph of a building, and therefore deserves the name of transversal building to
X in the direction η. Since this fact is used in other papers, we devote the present
appendix to its proof. Here, we will follow the “W -metric approach” to buildings
(as opposed to the “simplicial approach” from §2.2); a standard reference for this
topic is [AB08, §5.1].
Let (W, S) be the type of X. Let A ∈ Aη , and view W as a reflection group
acting on A. Let Wη be the reflection subgroup of W generated by the reflections
across the walls in WηA . By a classical result of Deodhar ([Deo89]), Wη is then
itself a Coxeter group. Moreover, the polyhedral structure on A induced by the
walls in WηA can be identified with the Coxeter complex of Wη . More precisely,
if x ∈ A(0) is the fundamental chamber of A (i.e. the chamber whose walls are
associated to the reflections in S), then xη := Φη (x) ∩ A (which coincides with the
intersection of all half-spaces containing x and whose wall belong to WηA ) is the
fundamental chamber of the Coxeter complex associated to the Coxeter system
(Wη , Sη ), where Sη is the set of reflections across the walls in WηA that delimit xη .
Lemma A.1. The group Wη depends only on η, and not on the choice of apartment A.
Proof. This is [CL11, Lemma 5.2] (and the proof of this lemma in [CL11, §5.1]
remains valid in our context).
16
T. MARQUIS
Lemma A.2. Let ξ, ξ 0 ∈ Cη , and let x ∈ X (0) with ξ = ξx,η . Then there exists
some y ∈ X (0) with ξ 0 = ξy,η such that x and y are contained in some apartment
A ∈ Aη .
Proof. Let y ∈ X (0) with ξ 0 = ξy,η , and let Γy = (yn )n∈N ∈ CGR(y, η) be straight.
By Lemma 2.2, there is some k ∈ N such that Γxyk η := Γxyk · (yn )n≥k ∈ CGR(x, η)
for some combinatorial geodesic Γxyk from x to yk . Let A ∈ Aη be an apartment
containing Γxyk η . Then ξy,η = ξyk ,η , so that the claim follows by replacing y with
yk .
Theorem A.3. The transversal graph X η to X in the direction η is the graph of
chambers of a building of type (Wη , Sη ).
Proof. We define a “Weyl distance” function δη : Cη × Cη → Wη as follows. Let
ξ, ξ 0 ∈ Cη . By Lemma A.2, we can write ξ = ξx,η and ξ 0 = ξy,η for some x, y ∈ A(0)
where A ∈ Aη . We then set
δη (ξ, ξ 0 ) := δηA (xη , yη ),
where xη := Φη (x) ∩ A and yη := Φη (x) ∩ A are chambers in the Coxeter complex
of (Wη , Sη ) and δηA is the Weyl distance function on that complex (see [AB08,
§5.1]). Note that this definition is independent of the choice of apartment A (see
Lemma A.1 and its proof) and of chambers x, y ∈ A(0) such that ξ = ξx,η and ξ 0 =
ξy,η . To simplify the notations, we will also simply write δηA (x, y) := δηA (xη , yη ).
To check that X η is a building of type (Wη , Sη ), it then remains to check the
axioms (WD1), (WD2) and (WD3) of [AB08, Definition 5.1]. The axioms (WD1)
and (WD3) are clearly satisfied, because they are satisfied in the building (A, δηA )
for any apartment A ∈ Aη . We now check (WD2).
Let w ∈ Wη , s ∈ Sη and ξ1 , ξ2 , ξ10 ∈ Cη with δη (ξ1 , ξ2 ) = w and δη (ξ10 , ξ1 ) = s.
We have to show that δη (ξ10 , ξ2 ) ∈ {sw, w} and that δη (ξ10 , ξ2 ) = sw if `η (sw) =
`η (w) + 1, where `η : Wη → N is the length function on Wη with respect to the
generating set Sη . Choose some adjacent chambers x, x0 ∈ X (0) such that ξ1 = ξx,η
and ξ10 = ξx0 ,η . Let also y ∈ X (0) be such that ξ2 = ξy,η and such that there is
an apartment A ∈ Aη with x, y ∈ A(0) (see Lemma A.2). Let m be the wall of A
0
containing the s-panel of x. Since x and x0 are separated by a wall m0 ∈ WηA in
some apartment A0 ∈ Aη containing x, x0 , the wall m belongs to WηA (as it is the
image of m0 by the retraction ρA,x |A0 , which fixes the geodesic ray [x, η) ⊆ A ∩ A0
pointwise). On the other hand, by [AB08, Exercise 5.83(a)], there is an apartment
A00 ∈ Aη containing x0 and the half-space α of A delimited by m and that contains
y.
If `η (sw) = `η (w) + 1, then x ∈ α, and hence x, x0 , y ∈ A00 , so that
00
00
00
δη (ξ10 , ξ2 ) = δηA (x0 , y) = δηA (x0 , x)δηA (x, y) = δη (ξ10 , ξ1 )δη (ξ1 , ξ2 ) = sw.
On the other hand, if `η (sw) = `η (w) − 1, so that x ∈
/ α, then letting x00 ∈ A00
00
denote the unique chamber of A that is s-adjacent to x and contained in α, we
00
have δηA (x00 , y) = sw. Hence, in that case,
00
00
00
00
δη (ξ10 , ξ2 ) = δηA (x0 , y) = δηA (x0 , x00 )δηA (x00 , y) = δηA (x0 , x00 )sw ∈ {w, sw},
as desired.
ON GEODESIC RAY BUNDLES IN BUILDINGS
17
References
[AB08]
[BH99]
[Bou00]
[Cap17]
[CL11]
[Dav98]
[Deo89]
[HSS17]
[Mou88]
[Nos11]
[NR97]
[NV02]
[Świ01]
[Tou17]
Peter Abramenko and Kenneth S. Brown, Buildings, Graduate Texts in Mathematics,
vol. 248, Springer, New York, 2008, Theory and applications.
Martin R. Bridson and André Haefliger, Metric spaces of non-positive curvature,
Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], vol. 319, Springer-Verlag, Berlin, 1999.
Marc Bourdon, Sur les immeubles fuchsiens et leur type de quasi-isométrie, Ergodic
Theory Dynam. Systems 20 (2000), no. 2, 343–364.
Pierre-Emmanuel Caprace, A sixteen-relator presentation of an infinite hyperbolic
Kazhdan group, preprint (2017), arxiv.org/abs/1708.09772.
Pierre-Emmanuel Caprace and Jean Lécureux, Combinatorial and group-theoretic compactifications of buildings, Ann. Inst. Fourier, Grenoble 61 (2011), no. 2, 619–672.
Michael W. Davis, Buildings are CAT(0), Geometry and cohomology in group theory
(Durham, 1994), London Math. Soc. Lecture Note Ser., vol. 252, Cambridge Univ.
Press, Cambridge, 1998, pp. 108–123.
Vinay V. Deodhar, A note on subgroups generated by reflections in Coxeter groups,
Arch. Math. (Basel) 53 (1989), no. 6, 543–546.
Jingyin Huang, Marcin Sabok, and Forte Shinko, Hyperfiniteness of boundary actions
of cubulated hyperbolic groups, preprint (2017), arxiv.org/abs/1701.03969v2.
Gabor Moussong, Hyperbolic Coxeter groups, Thesis of the Ohio State University
(1988).
G. A. Noskov, Asymptotic behavior of word metrics on Coxeter groups, Doc. Math. 16
(2011), 373–398.
Graham Niblo and Lawrence Reeves, Groups acting on CAT(0) cube complexes, Geom.
Topol. 1 (1997), 1–7.
Guennadi A. Noskov and Èrnest B. Vinberg, Strong Tits alternative for subgroups of
Coxeter groups, J. Lie Theory 12 (2002), no. 1, 259–264.
Jacek Światkowski, Some infinite groups generated by involutions have Kazhdan’s property (T), Forum Math. 13 (2001), no. 6, 741–755.
Nicholas Touikan, On geodesic ray bundles in hyperbolic groups, preprint (2017),
arxiv.org/abs/1706.01979.
UCL, 1348 Louvain-la-Neuve, Belgium
E-mail address: [email protected]
| 4math.GR
|
arXiv:1001.3604v1 [cs.SE] 20 Jan 2010
Type-Safe Feature-Oriented
Product Lines
Sven Apel† , Christian Kästner‡ , Armin Größlinger† , and
Christian Lengauer†
†
Department of Informatics and Mathematics, University of Passau
{apel,groesslinger,lengauer}@uni-passau.de
‡
School of Computer Science, University of Magdeburg
[email protected]
Technical Report, Number MIP-0909
Department of Informatics and Mathematics
University of Passau, Germany
June 2009
Type-Safe Feature-Oriented Product Lines
Sven Apel† , Christian Kästner‡ , Armin Größlinger† , and Christian Lengauer†
†
Department of Informatics and Mathematics, University of Passau
{apel,groesslinger,lengauer}@uni-passau.de
‡
School of Computer Science, University of Magdeburg
[email protected]
Abstract. A feature-oriented product line is a family of programs that share a
common set of features. A feature implements a stakeholder’s requirement, represents a design decision and configuration option and, when added to a program,
involves the introduction of new structures, such as classes and methods, and the
refinement of existing ones, such as extending methods. With feature-oriented
decomposition, programs can be generated, solely on the basis of a user’s selection of features, by the composition of the corresponding feature code. A key
challenge of feature-oriented product line engineering is how to guarantee the
correctness of an entire feature-oriented product line, i.e., of all of the member
programs generated from different combinations of features. As the number of
valid feature combinations grows progressively with the number of features, it
is not feasible to check all individual programs. The only feasible approach is
to have a type system check the entire code base of the feature-oriented product
line. We have developed such a type system on the basis of a formal model of a
feature-oriented Java-like language. We demonstrate that the type system ensures
that every valid program of a feature-oriented product line is well-typed and that
the type system is complete.
1
Introduction
Feature-oriented programming (FOP) aims at the modularization of programs in terms
of features [55,13]. A feature implements a stakeholder’s requirement and is typically
an increment in program functionality [55,13]. Contemporary feature-oriented programming languages and tools such as AHEAD [13], Xak [2], CaesarJ [48], Classbox/J [14], FeatureHouse [9], and FeatureC++ [10] provide a variety of mechanisms
that support the specification, modularization, and composition of features. A key idea
is that a feature is implemented by a distinct code unit, called a feature module. When
added to a base program, it introduces new structures, such as classes and methods, and
refines existing ones, such as extending methods [43,11]. A program that is decomposed
into features is called henceforth a feature-oriented program.1
1
Typically, feature-oriented decomposition is orthogonal to class-based or functional
decomposition [63,49,61]. A multitude of modularization and composition mechanisms [17,26,24,45,46,56,65] have been developed in order to allow programmers to decompose a program along multiple dimensions [63]. Feature-oriented languages and tools provide
a significant subset of these mechanisms [11].
Beside the decomposition of programs into features, the concept of a feature is
useful for distinguishing different, related programs thus forming a software product
line [35,21]. Typically, programs of a common domain share a set of features but also
differ in other features. For example, suppose an email client for mobile devices that
supports the protocols IMAP and POP3 and another client that supports POP3, MIME,
and SSL encryption. With a decomposition of the two programs into the features IMAP,
POP3, MIME, and SSL, both programs can share the code of the feature POP3. Since
mobile devices have only limited resources, unnecessary features should be removed.
With feature-oriented decomposition, programs can be generated solely on the basis of a user’s selection of features by the composition of the corresponding feature
modules. Of course, not all combinations of features are legal and result in correct
programs [12]. A feature model describes which features can be composed in which
combinations, i.e., which programs are valid [35,21]. It consists of an (ordered) set
of features and a set of constraints on feature combinations [21,12]. For example, our
email client may have different rendering engines for HTML text, e.g., the Mozilla engine or the Safari engine, but only one at a time. A set of feature modules along wit a
feature model is called a feature-oriented product line [12].
An important question is how the correctness of feature-oriented programs, in particular, and product lines, in general, can be guaranteed. A first problem is that contemporary feature-oriented languages and tools usually involve a code generation step
during composition in which the code is transformed into a lower-level representation.
In previous work, we have addressed this problem by modeling feature-oriented mechanisms directly in the formal syntax and semantics of a core language, called Feature
Featherweight Java (FFJ). The type system of FFJ ensures that the composition of
feature modules is type-safe [8].
In this paper, we address a second problem: How can the correctness of an entire
feature-oriented product line be guaranteed? A naive approach would be to type-check
all valid programs of a product line using a type checker like the one of FFJ [8]. However, this approach does not scale; already for 34 implemented optional features, a variant can be generated for every person on the planet. Noticing this problem, Czarnecki
and Pietroszek [22] and Thaker et al. [64] suggested the development of a type system that checks the entire code base of the feature-oriented product line, instead of all
individual feature-oriented programs. In this scenario, a type checker must analyze all
feature modules of a product line on the basis of the feature model. We will show that,
with this information, the type checker can ensure that every valid program variant that
can be generated is type-safe. Specifically, we make the following contributions:
– We provide a condensed version of FFJ, which is in many respects more elegant
and concise than its predecessor [8].
– We develop a formal type system that uses information about features and constraints on feature combinations in order to type-check a product line without generating every program.
– We prove correctness by proving that every program generated from a well-formed
product line is well-formed, as long as the feature selection satisfies the constraints
of the product line. Furthermore, we prove completeness by proving that the well2
typedness of all programs of a product line guarantees that the product line is welltyped as a whole.
– We offer an implementation of FFJ, including the proposed type system, which can
be downloaded for evaluation and for experiments with further feature-oriented
language and typing mechanisms.
Or work differs in many respects from previous and related work (see Section 5
for a comprehensive discussion). Most notably, Thaker et al. have implemented a type
system for feature-oriented product lines and conducted several case studies [64]. We
take their work further with a formalization and a correctness and completeness proof.
Furthermore, our work differs in many respects from previous work on modeling
and type-checking feature-oriented and related programming mechanisms. Most notably, we model the feature-related mechanisms directly in FFJ’s syntax and semantics,
without any transformation to a lower-level representation, and we stay very close to
the syntax of contemporary feature-oriented languages and tools (see Section 5). We
begin with a brief introduction to FFJ.
2
Feature-Oriented Programs in FFJ
In this section, we introduce the language FFJ. Originally, FFJ was designed for featureoriented programs [8,7]. We extend FFJ in Section 3 to support feature-oriented product
lines, i.e., to support the representation of multiple alternative program variants at a
time.
2.1
An Overview of FFJ
FFJ is a lightweight feature-oriented language that has been inspired by Featherweight
Java (FJ) [32]. As with FJ, we have aimed at minimality in the design of FFJ. FFJ
provides basic constructs like classes, fields, methods, and inheritance and only a few
new constructs capturing the core mechanisms of feature-oriented programming. But,
so far, FFJ’s type system has not supported the development of feature-oriented product
lines. That is, the feature modules written in FFJ are interpreted as a single program.
We will change this in Section 3.
An FFJ program consists of a set of classes and refinements. A refinement extends a
class that has been introduced previously. Each class and refinement is associated with
a feature. We say that a feature introduces a class or applies a refinement to a class.
Technically, the mapping between classes/refinements and the features they belong to
can be established in different ways, e.g., by extending the language with modules representing features [48,14,23] or by grouping classes and refinements that belong to a
feature in packages or directories [13,10].
Like in FJ, each class declares a superclass, which may be the class Object. Refinements are defined using the keyword refines. The semantics of a refinement applied to
a class is that the refinement’s members are added to and merged with the member of
the refined class. This way, a refinement can add new fields and methods to the class
and override existing methods (declared by overrides).
3
On the left side in Figure 1, we show an excerpt of the code of a basic email client,
called E MAIL C LIENT, (top) and a feature, called SSL, (bottom) in FFJ. The feature
SSL adds the class SSL (Lines 7–10) to the email client’s code base and refines the
class Trans in order to encrypt outgoing messages (Lines 11–15). To this effect, the
refinement of Trans adds a new field key (Line 12) and overrides the method send of
class Trans (Lines 13-15).
Feature E MAIL C LIENT
1
2
3
4
5
6
class Msg extends Object {
String serialize() { ... }
}
class Trans extends Object {
Bool send(Msg m) { ... }
}
EmailClient
Object
Feature SSL
7
8
9
10
11
12
13
14
15
16
class SSL extends Object {
Trans trans;
Bool send(Msg m) { ... }
}
refines class Trans {
Key key;
overrides Bool send(Msg m) {
return new SSL(this).send(m);
}
}
SSL
Trans
refines
Trans
inherits
class
refinement
Msg
refinement chain
SSL
feature
Fig. 1. A feature-oriented email client supporting SSL encryption.
Typically, a programmer applies multiple refinements to a class by composing a
sequence of features. This is called a refinement chain. A refinement that is applied
immediately before another refinement in the chain is called its predecessor. The order
of the refinements in a refinement chain is determined by their composition order. On
the right side in Figure 1, we depict the refinement and inheritance relationships of our
email example.
Fields are unique within the scope of a class and its inheritance hierarchy and refinement chain. That is, a refinement or subclass is not allowed to add a field that has
already been defined in a predecessor in the refinement chain or in a superclass. For
example, a further refinement of Trans would not be allowed to add a field key, since
key has been introduced by a refinement of feature SSL already. With methods, this is
different. A refinement or subclass may add new methods (overloading is prohibited)
and override existing methods. In order to distinguish the two cases, FFJ expects the
programmer to declare whether a method overrides an existing method (using the modifier overrides). For example, the refinement of Trans in feature SSL overrides the
method send introduced by feature M AIL; for subclasses, this is similar.
The distinction between method introduction and overriding allows the type system
to check (1) whether an introduced method inadvertently replaces or occludes an existing method with the same name and (2) whether, for every overriding method, there
is a proper method to be overridden. Apart from the modifier overrides, a method in
FFJ is similar to a method in FJ. That is, a method body is an expression (prefixed with
4
return) and not a sequence of statements. This is due to the functional nature of FFJ
and FJ. Furthermore, overloading of methods (introducing methods with equal names
and different argument types) is not allowed in FFJ (and FJ).
As shown in Figure 1, refinement chains grow from left to right and inheritance
hierarchies from top to bottom. When looking up a method body, FFJ traverses the
combined inheritance and refinement hierarchy of an object and selects the right-most
and bottom-most body of a method declaration or method refinement that is compatible. This kind of lookup is necessary since we model features directly in FFJ, instead
of generating and evaluating FJ code [40]. First, the FFJ calculus looks for a method
declaration in the refinement chain of the object’s class, starting with the last refinement
back to the class declaration itself. The first body of a matching method declaration is
returned. If the method is not found in the class’ refinement chain or in its own declaration, the methods in the superclass (and then the superclass’ superclass, etc.) are
searched, each again from the most specific refinement of the class declaration itself.
The field lookup works similarly, except that the entire inheritance and refinement hierarchy is searched and the fields are accumulated in a list. In Figure 2, we illustrate the
processes of method body and field lookup schematically.
Object
Class1
Ref(n,1)
Ref(n,p−1)
Ref(n,p)
Classn−1
Ref(n−1,1)
Ref(n−1,k−1)
Ref(n−1,k)
Classn
Ref(n,1)
Ref(n,m−1)
Ref(n,m)
Fig. 2. Order of method body and field lookup in FFJ.
2.2
Syntax of FFJ
Before we go into detail, let us explain some notational conventions. We abbreviate lists
in the obvious ways:
–
–
–
–
–
–
C is shorthand for C1 , . . . , Cn
C f is shorthand for C1 f1 , . . . , Cn fn
C f; is shorthand for C1 f1 ; . . . ; Cn fn ;
t : C is shorthand for t1 : C1 , . . . , tn : Cn
C <: D is shorthand for C1 <: D1 . . . Cn <: Dn
...
Note that, depending on the context, blanks, commas, or semicolons separate the elements of a list. The context will make clear which separator is meant. The symbol •
5
denotes the empty list and lists of field declarations, method declarations, and parameter
names must not contain duplicates. We use the metavariables A–E for class names, f–h
for field names, and m for method names. Feature names are denoted by Greek letters.
In Figure 3, we depict the syntax of FFJ in extended Backus-Naur-Form. An FFJ
program consists of a set of class and refinement declarations. A class declaration L
declares a class with the name C that inherits from a superclass D and consists of a list
C f; of fields and a list M of method declarations.2 A refinement declaration R consists
of a list C f; of fields and a list M of method declarations.
t ::=
terms:
x
variable
t.f
field access
t.m(t) method invocation
new C(t) object creation
(C) t
cast
L ::=
class declarations:
class C extends D { C f; M }
R ::=
refinement declarations:
refines class C { C f; M }
M ::=
method declarations:
[overrides] C m(C x) { return t; }
v ::=
values:
new C(v) object creation
Fig. 3. Syntax of FFJ in extended BNF.
A method m expects a list C x of arguments and declares a body that returns only
a single expression t of type C. Using the modifier overrides, a method declares that it
intends to override another method with the same name and signature. Where we want
to distinguish methods that override others and methods that do not override others, we
call the former method introductions and the latter method refinements
Finally, there are five forms of terms: the variable, field access, method invocation,
object creation, and type cast, which are taken from FJ without change. The only values
are object creations whose arguments are values as well.
2.3
FFJ’s Class Table
Declarations of classes and refinements can be looked up via a class table CT. The compiler fills the class table during the parser pass. In contrast to FJ, class and refinement
declarations are identified not only by their names but, additionally, by the names of
the enclosing features. For example, in order to retrieve the declaration of class Trans,
introduced by feature M AIL, in our example of Figure 1, we write CT(M AIL.Trans);
in order to retrieve the refinement of class Trans applied by feature SSL, we write
CT(SSL.Trans). We call Φ.C the qualified type of class C in feature Φ. In FFJ, class
and refinement declarations are unique with respect to their qualified types. This property is ensured because of the following sanity conditions: a feature is not allowed
2
The concept of a class constructor is unnecessary in FFJ and FJ [54]. Its omittance simplifies
the syntax, semantics, and type rules significantly without loss of generality.
6
– to introduce a class or refinement twice inside a single feature module and
– to refine a class that the feature has just introduced.
These are common sanity conditions in feature-oriented languages and tools [13,10,9].
As for FJ, we impose further sanity conditions on the class table and the inheritance
relation:
– CT (Φ.C) = class C. . . or refines class C. . . for every qualified type Φ.C ∈
dom(CT ); Feature Base plays the same role for features as Object plays for
classes; it is a symbol denoting the empty feature at which lookups terminate.
– Base.Object ∈
/ dom(CT );
– for every class name C appearing anywhere in CT , we have Φ.C ∈ dom(CT ) for
at least one feature Φ; and
– the inheritance relation contains no cycles (incl. self-cycles).
2.4
Refinement in FFJ
Information about the refinement chain of a class can be retrieved using the refinement
table RT . The compiler fills the refinement table during the parser pass. RT (C) yields
a list of all features that either introduce or refine class C. The leftmost element of
the result list is the feature that introduces the class C and, then, from left to right, the
features are listed that refine class C in the order of their composition. In our example of
Figure 1, RT (Trans) yields the list E MAIL C LIENT, SSL. There is only a single sanity
condition for the refinement table:
– RT (C) = Φ for every type C ∈ dom(CT ), with Φ being the features that introduce and refine class C.
In Figure 4, we show two functions for the navigation of the refinement chain that
rely on RT . Function last returns, for a class name C, a qualified type Ψn .C, in which
Ψn refers to the feature that applies the final refinement to class C; if a class is not
refined at all, Ψn refers to the feature that introduces class C. Function pred returns,
for a qualified type Φ.C, another qualified type Ψn .C, in which Ψn refers to the feature
that introduces or refines class C and that is the immediate predecessor of Φ in the
refinement chain; if there is no predecessor, Base.Object is returned.
Navigating along the refinement chain
RT (C) = Ψ
last(C) = Ψn .C
RT (C) = Ψ, Φ, Ω
Ψ 6= •
pred(Φ.C) = Ψn .C
Fig. 4. Refinement in FFJ.
7
RT (C) = Φ, Ω
pred(Φ.C) = Base.Object
2.5
Subtyping in FFJ
In Figure 5, we show the subtype relation of FFJ. The subtype relation <: is defined
by one rule each for reflexivity and transitivity and one rule for relating the type of a
class to the type of its immediate superclass. It is not necessary to define subtyping over
qualified types because only classes (not refinements) declare superclasses and there is
only a single declaration per class.
C <: D
Subtyping
C <: C
CT(Φ.C) = class C extends D { . . . }
C <: D
C <: D
D <: E
C <: E
Fig. 5. Subtyping in FFJ.
2.6
Auxiliary Definitions of FFJ
In Figure 6, we show the auxiliary definitions of FFJ. Function fields searches the refinement chain from right to left and accumulates the fields into a list (using the comma
as concatenation operator). If there is no further predecessor in the refinement chain,
i.e., we have reached a class declaration, then the refinement chain of the superclass is
searched (see Figure 2). If Base.Object is reached, the empty list is returned (denoted
by •).
Function mbody looks up the most specific and most refined body of a method m. A
body consists of the formal parameters x of a method and the actual term t representing
the content. The search is like in fields. First, the refinement chain is searched from
right to left and, then, the superclasses’ refinement chains are searched, as illustrated in
Figure 2. Note that [overrides] means that a given method declaration may (or may not)
have the modifier. This way, we are able to define uniform rules for method introduction
and method refinement. Function mtype yields the signature B → B0 of a declaration
of method m. The lookup is like in mbody.
Predicate introduce is used to check whether a class has been introduced by multiple features and whether a field or method has been introduced multiple times in a
class. Precisely, it states, in the case of classes, whether C has not been introduced by
any feature other than Φ and whether a method m or a field f has not been introduced
by Φ.C or in any of its predecessors or superclasses. To evaluate it, we check, in the
case of classes, whether CT (Ψ.C) yields a class declaration or not, for any feature Ψ
different from Φ, in the case of methods, whether mtype yields a signature or not and,
in the case of fields, whether f is defined in the list of fields returned by fields.
Predicate refine states whether, for a given refinement, a proper class has been
declared previously in the refinement chain. The predicate override states whether a
method m has been introduced before in some predecessor of Φ.C and whether the
previous declaration of m has the given signature.
8
fields(Φ.C) = C f
Field lookup
fields(Base.Object) = •
CT (Φ.C) = class C extends D { C f; M }
fields(Φ.C) = fields(last(D)), C f
CT (Φ.C) = refines class C { C f; M }
fields(Φ.C) = fields(pred(Φ.C)), C f
mbody(m, Φ.C) = (x, t)
Method body lookup
[overrides] B m(B x) { return t; } ∈ M
CT (Φ.C) = class C extends D { C f; M }
mbody(m, Φ.C) = (x, t)
m is not defined in M
CT (Φ.C) = class C extends D { C f; M }
mbody(m, Φ.C) = mbody(m, last(D))
[overrides] B m(B x) { return t; } ∈ M
CT (Φ.C) = refines class C { C f; M }
mbody(m, Φ.C) = (x, t)
m is not defined in M
CT (Φ.C) = refines class C { C f; M }
mbody(m, Φ.C) = mbody(m, pred(Φ.C))
mtype(m, Φ.C) = C → C
Method type lookup
B0 m(B x) { return t; } ∈ M
CT (Φ.C) = class C extends D { C f; M }
m is not defined in M
CT (Φ.C) = class C extends D { C f; M }
mtype(m, Φ.C) = mtype(m, last(D))
mtype(m, Φ.C) = B → B0
B0 m(B x) { return t; } ∈ M
CT (Φ.C) = refines class C { C f; M }
m is not defined in M
CT (Φ.C) = refines class C { C f; M }
mtype(m, Φ.C) = mtype(m, pred(Φ.C))
mtype(m, Φ.C) = B → B0
introduce(Φ.C)
Valid class introduction
@ Ψ : (CT (Ψ.C) = class C . . . ∧ Φ 6= Ψ)
introduce(Φ.C)
introduce(f, Φ.C)
Valid field introduction
fields(Φ.C) = E h
f∈
/h
introduce(f, Φ.C)
introduce(m, Φ.C)
Valid method introduction
(m, Φ.C) ∈
/ dom(mtype)
introduce(m, Φ.C)
refine(Φ.C)
Valid class refinement
RT (C) = Ψ, Φ, Ω
CT (Ψ1 .C) = class C . . .
refine(Φ.C)
override(m, Φ.C, C → C0 )
Valid method overriding
mtype(m, Φ.C) = B → B0
C=B
override(m, Φ.C, C → C0 )
C0 = B0
9
Fig. 6. Auxiliary definitions of FFJ.
2.7
Evaluation of FFJ Programs
Each FFJ program consists of a class table and a term.3 The term is evaluated using the
evaluation rules shown in Figure 7. The evaluation terminates when a value, i.e., a term
of the form new C(v), is reached. Note that we use a direct semantics of class refinement [40]. That is, the field and method lookup mechanisms incorporate all refinements
when a class is searched for fields and methods. An alternative, which is discussed in
Section 5, would be a flattening semantics, i.e., to merge a class in a preprocessing step
with all of its refinements into a single declaration.
fields(last(C)) = C f
(new C(v)).fi −→ vi
(E-P ROJ N EW)
mbody(m, last(C)) = (x, t0 )
(E-I NVK N EW)
(new C(v)).m(u) −→ [x 7→ u, this 7→ new C(v)] t0
C <: D
(D)(new C(v)) −→ new C(v)
(E-C AST N EW)
t0 −→ t00
t0 .f −→ t00 .f
(E-F IELD)
t0 −→ t00
t0 .m(t) −→ t00 .m(t)
(E-I NVK R ECV)
ti −→ t0i
v0 .m(v, ti , t) −→ v0 .m(v, t0i , t)
(E-I NVK A RG)
ti −→ t0i
new C(v, ti , t) −→ new C(v, t0i , t)
(E-N EWA RG)
t0 −→ t00
(C)t0 .f −→ (C)t00 .f
(E-C AST)
Fig. 7. Evaluation of FFJ programs.
Using the subtype relation <: and the auxiliary functions fields and mbody, the evaluation of FFJ is fairly simple. The first three rules are most interesting (the remaining
rules are just congruence rules). Rule E-P ROJ N EW describes the projection of a field
from an instantiated class. A projected field fi evaluates to a value vi that has been
passed as argument to the instantiation. Function fields is used to look up the fields
of the given class. It receives last(C) as argument since we want to search the entire
refinement chain of class C from right to left (cf. Figure 2).
Rule E-P ROJ I NVK evaluates a method invocation by replacing the invocation with
the method’s body. The formal parameters of the method are substituted in the body for
3
The refinement table is not relevant for evaluation.
10
the arguments of the invocation; the value on which the method is invoked is substituted
for this. The function mbody is called with the last refinement of the class C in order to
search the refinement chain from right to left and return the most specific method body
(cf. Figure 2).
Rule E-C AST N EW evaluates an upcast by simply removing the cast. Of course, the
premise must be that the cast is really an upcast and not a downcast or an incorrect cast.
2.8
Type Checking FFJ Programs
The type relation of FFJ consists of the type rules for terms and the well-formedness
rules for classes, refinements, and methods, shown in Figures 8 and 9.
Γ ` t:C
Term typing
x:C ∈ Γ
Γ ` x:C
Γ ` t0 : C0
Γ ` t0 : C0
Γ ` t:C
Γ ` t:C
(T-VAR)
fields(last(C0 )) = C f
Γ ` t0 .fi : Ci
mtype(m, last(C0 )) = D → C
Γ ` t0 .m(t) : C
fields(last(C)) = D f
Γ ` new C(t) : C
C <: D
Γ ` t0 : D
D <: C
Γ ` (C)t0 : C
Γ ` t0 : D
C <: D
Γ ` (C)t0 : C
Γ ` t0 : D
C 6<: D
D 6<: C
Γ ` (C)t0 : C
(T-F IELD)
C <: D
(T-I NVK)
(T-N EW)
(T-UC AST)
C 6= D
stupid warning
(T-DC AST)
(T-SC AST)
Fig. 8. Term typing in FFJ.
Term Typing Rules. A term typing judgment is a triple consisting of a typing context
Γ, a term t, and a type C (see Figure 8).
Rule T-VAR checks whether a free variable is contained in the typing context. Rule
T-F IELD checks whether a field access t0 .f is well-typed. Specifically, it checks whether
f is declared in the type of t0 and whether the type f equals the type of the entire term.
Rule T-I NVK checks whether a method invocation t0 .m(t) is well-typed. To this end,
it checks whether the arguments t of the invocation are subtypes of the types of the
11
M OK a Φ.C
Method typing
x : B, this : C ` t0 : E0
E0 <: B0
introduce(m, last(D))
CT (Φ.C) = class C extends D { C f; M }
B0 m(B x) { return t0 ; } OK a Φ.C
x : B, this : C ` t0 : E0
CT (Φ.C) = class C extends D { C f; M }
E0 <: B0
override(m, last(D), B → B0 )
overrides B0 m(B x) { return t0 ; } OK a Φ.C
x : B, this : C ` t0 : E0
CT (Φ.C) = refines class C { C f; M }
E0 <: B0
introduce(m, pred(Φ.C))
B0 m(B x) { return t0 ; } OK a Φ.C
x : B, this : C ` t0 : E0
E0 <: B0
CT (Φ.C) = refines class C { C f; M }
override(m, pred(Φ.C), B → B0 )
overrides B0 m(B x) { return t0 ; } OK a Φ.C
L OK a Φ
Class typing
∀ f ∈ f : introduce(f, last(D))
introduce(Φ.C)
M OK a Φ.C
class C extends D { C f; M } OK a Φ
R OK a Φ
Refinement typing
∀ f ∈ f : introduce(f, pred(Φ.C))
refine(Φ.C)
refines class C { C f; M } OK a Φ
Fig. 9. Well-formedness rules of FFJ.
12
M OK a Φ.C
formal parameters of m and whether the return type of m equals the type of the entire
term. Rule T-N EW checks whether an object creation new C(t) is well-typed in that it
checks whether the arguments t of the instantiation of C are subtypes of the types D of
the fields of C and whether C equals the type of the entire term. The rules T-UC AST,
T-DC AST, and T-SC AST check whether casts are well-typed. In each rule, it is checked
whether the type C the term t0 is cast to is a subtype, supertype, or unrelated type of the
type of t0 and whether C equals the type of the entire term.4
Well-Formedness Rules. In Figure 9, we show FFJ’s well-formedness rules of classes,
refinements, and methods.
The typing judgments of classes and refinements are binary relations between a
class or refinement declaration and a feature, written L OK a Φ and R OK a Φ. The
rule of classes checks whether all methods are well-formed in the context of the class’
qualified type. Moreover, it checks whether none of the fields of the class declaration
is introduced multiple times in the combined inheritance and refinement hierarchy and
whether there is no feature other than Φ that introduces a class C (using introduce). The
well-formedness rule of refinements is analogous, except that the rule checks whether
a corresponding class has been introduced before (using refine).
The typing judgment of methods is a binary relation between a method declaration
and the qualified type that declares the method, written M OK a Φ.C. There are four
different rules for methods (from top to bottom in Figure 9)
1.
2.
3.
4.
that do not override another method and that are declared by classes,
that override another method and that are declared by classes,
that do not override another method and that are declared by refinements,
that override another method and that are declared by refinements.
All four rules check whether the type E0 of the method body is a subtype of the declared
return type B0 of the method declaration. For methods that are being introduced, it is
checked whether no method with an identical name has been introduced in a superclass
(Rule 1) or in a predecessor in the refinement chain (Rule 3). For methods that override
other methods, it is checked whether a method with identical name and signature exists
in the superclass (Rule 2) or in a predecessor in the refinement chain (Rule 4).
Well-Typed FFJ Programs. Finally, an FFJ program, consisting of a term, a class
table, and a refinement table, is well-typed if
– the term is well-typed (checked using FFJ’s term typing rules),
– all classes and refinements stored in the class table are well-typed (checked using
FFJ’s well-formedness rules), and
– the class and refinement tables are well-formed (ensured by the corresponding sanity conditions).
4
Rule T-SC AST is needed only for the small step semantics of FFJ (and FJ) in order to be
able to formulate and prove the type preservation property. FFJ (and FJ) programs whose type
derivation contains this rule (i.e., the premise stupid warning appears in the derivation) are
not further considered (cf. [32]).
13
Type Soundness of FFJ. The type system of FFJ is sound. We can prove this using the
standard theorems of preservation and progress [66]:
T HEOREM 2.1 (Preservation) If Γ ` t : C and t −→ t0 , then Γ ` t0 : C0 for some
C0 <: C.
T HEOREM 2.2 (Progress) Suppose t is a well-typed term.
1. If t includes new C0 (t).fi as a subterm, then fields(last(C0 )) = C f for some C and
f.
2. If t includes new C0 (t).m(u) as a subterm, then mbody(m, last(C0 )) = (x, t0 ) and
|x| = |u| for some x and t0 .
We provide the proofs of the two theorems in Appendix A.
3
Feature-Oriented Product Lines in FFJPL
In this section, our goal is to define a type system for feature-oriented product lines –
a type system that checks whether all valid combinations of features yield well-typed
programs. In this scenario, the features in question may be optional or mutually exclusive so that different combinations are possible that form different feature-oriented
programs. Since there may be plenty of valid combinations, type checking all of them
individually is usually not feasible.
In order to provide a type system for feature-oriented product lines, we need information about which combinations of features are valid, i.e., which features are mandatory, optional, or mutually exclusive, and we need to adapt the subtype and type rules
of FFJ to check that there are no combinations/variants that lead to ill-typed terms.
The type system guarantees that every program derived from a well-typed product line
is a well-typed FFJ program. FFJ together with the type system for checking featureoriented product lines is henceforth called FFJPL .
3.1
An Overview of Feature-Oriented Product Lines
A feature-oriented product line is made up of a set of feature modules and a feature model. The feature modules contains the features’ implementation and the feature
model describes how the feature modules can be combined. In contrast to the featureoriented programs of Section 2, typically, some features are optional and some are mutually exclusive (Also other relations such as disjunction, negation, and implication are
possible [12]; they are broken down to mandatory, optional, and mutually exclusive
features, as we will explain.). Generally, in a derivation step, a user selects a valid subset of features from which, subsequently, a feature-oriented program is derived. In our
case, derivation means assembling the corresponding feature modules for a given set of
features. In Figure 10, we illustrate the process of program derivation.
Typically, a wide variety of programs can be derived from a product line [21,19].
The challenge is to define a type system that guarantees, on the basis of the feature
modules and the feature model, that all valid programs are well-typed. Once a program
is derived from such a product line, we can be sure that it is well-typed and we can
evaluate it using the standard evaluation rules of FFJ (see Section 2.7).
14
feature−oriented product line
feature−oriented programs
feature modules
A
B
C
D
E
F
A
B
C
program
program
A
B
E
A
B
D
E
derivation
A
B
D
B
F
E
E F
...
...
...
user’s feature
selection
program
program
A
B
C
E
A
B
C
D
E
...
feature model
Fig. 10. The process of deriving programs from a product line.
3.2
Managing Variability – Feature Models
The aim of developing a product line is to manage the variability of a set of programs
developed for a particular domain and to facilitate the reuse of feature implementations
among the programs of the domain. A feature model captures the variability by (explicitly or implicitly) defining an ordered set of all features of a product line and their legal
feature combinations. A well-defined feature order is essential for field and method
lookup (see Section 3.6).
Different approaches to product line engineering use different representations of
feature models to define legal feature combinations. The simplest approach is to enumerate all legal feature combinations. In practice, commonly different flavors of tree
structures are used, sometimes in combination with additional propositional constraints,
to define legal combinations [21,12], as illustrated in Figure 10.
For our purpose, the actual representation of legal feature combinations is not relevant. In FFJPL , we use the feature model only to check whether feature and/or specific
program elements are present in certain circumstances. A design decision of FFJPL is
to abstract from the concrete representation of the underlying feature model and rather
to provide an interface to the feature model. This has to benefits: (1) we do not need
to struggle with all the details of the formalization of feature models, which is well
understood by researchers [12,22,64,23] and outside the scope of this paper, and (2) we
are able to support different kinds of feature model representations, e.g., a tree structures, grammars, or propositional formulas [12]. The interface to the feature model is
simply a set of functions and predicates that we use to ask questions like “may (or may
not) feature A be present together with feature B” or “is program element m present in
every variant in which also feature A is present”, i.e., “is program element m always
reachable from feature A”.
3.3
Challenges of Type Checking
Let us explain the challenges of type checking by extending our email example, as
shown in Figure 11. Suppose our basic email client is refined to process incoming
text messages (feature T EXT, Lines 1–8). Optionally, it is enabled to process HTML
15
messages, using either Mozilla’s rendering engine (feature M OZILLA, Lines 9–12)
or Safari’s rendering engine (feature S AFARI, Lines 13–16). To this end, the features
M OZILLA and S AFARI override the method render of class Display (Line 11 and 15)
in order to invoke the respective rendering engines (field renderer, Lines 10 and 14)
instead of the text printing function (Line 7).
Feature T EXT
1
2
3
4
5
6
7
8
refines class Trans {
Unit receive(Msg msg) {
return /∗ do something... ∗/ new Display().render(msg);
}
}
class Display {
Unit render(Msg msg) { /∗ display message in text format ∗/ }
}
Feature M OZILLA
9 refines class Display {
10
MozillaRenderer renderer;
11
overrides Unit render(Msg m) { /∗ render HTML message using the Mozilla engine ∗/ }
12 }
Feature S AFARI
13 refines class Display {
14
SafariRenderer renderer;
15
overrides Unit render(Msg m) { /∗ render HTML message using the Safari engine ∗/ }
16 }
Fig. 11. A feature-oriented email client using Mozilla’s and Safari’s rendering engines.
The first thing to observe is that the features M OZILLA and S AFARI rely on class
Display and its method render introduced by feature T EXT. In order to guarantee that
every derived program is well-formed, the type system checks whether Display and
render are always reachable from the features M OZILLA and S AFARI, i.e., whether,
in every program variant that contains M OZILLA and S AFARI, also feature T EXT is
present.
The second thing to observe is that the features M OZILLA and S AFARI both add
a field renderer to Display (Lines 10 and 14), both of which have different types. In
FFJ, a program with both feature modules would not be a well-typed program because
the field renderer is introduced twice. However, Figure 11 is not intended to represent a single feature-oriented program but a feature-oriented product line; the features
M OZILLA and S AFARI are mutually exclusive, as defined in the product line’s feature
model (stated earlier), and the type system has to take this fact into account.
Let us summarize the key challenges of type checking product lines:
– A global class table contains classes and refinements of all features of a product
line, even if some features are optional or mutually exclusive so that they are present
only in some derived programs. That is, a single class can be introduced by multiple
features as long as the features are mutually exclusive. This is also the case for
multiple introductions of methods and fields, which may even have different types.
16
– The presence of types, fields, and methods depends on the presence of the features that introduce them. A reference from the elements of a feature to a type, a
field projection, or a method invocation is valid if the referenced element is always
reachable from the referring feature, i.e., in every variant that contains the referring
feature.
– Like references, an extension of a program element, such as a class or method
refinement, is valid only if the extended program element is always reachable from
the feature that applies the refinement.
– Refinements of classes and methods do not necessarily form linear refinement
chains. There may be alternative refinements of a single class or method that exclude one another, as explained below.
3.4
Collecting Information on Feature Modules
For type checking, the FFJPL compiler collects various information on the feature modules of the product line. Before the actual type checking is performed, the compiler fills
three tables with information: the class table (CT ), the introduction table (IT ), and the
refinement table (RT ).
The class table CT of FFJPL is like the one of FFJ and has to satisfy the same
sanity conditions except that (1) there may be multiple declarations of a class (or field
or method), as long as they are defined in are mutually exclusive features, and (2) there
may be cycles in the inheritance hierarchy, but no cycles for each set of classes which
are reachable from any given feature.
The introduction table IT maps a type to a list Φ of (mutually exclusive) features
that introduce the type. The features returned by IT are listed in the order prescribed
by the feature model. In our example of Figure 11, a call of IT (Display) would return
a list consisting only of the single feature T EXT. Likewise, the introduction table maps
field and method names, in combination with their declaring classes, to features. For
example, a call of IT (Display.renderer) would return the list M OZILLA, S AFARI. The
sanity conditions for the introduction table are straightforward:
– IT (C) = Φ for every type C ∈ dom(CT ), with Φ being the features that introduce
class C.
– IT (C.f) = Φ for every field f contained in some class C ∈ dom(CT ), with Φ
being the features that introduce field f.
– IT (C.m) = Φ for every method m contained in some class C ∈ dom(CT ), with
Φ being the features that introduce method m.
Much like in FFJ, in FFJPL there is a refinement table RT . A call of RT (C) yields
a list of all features that either introduce or refine class C, which is different from the
introduction table that returns only the features that introduce class C. As with IT , the
features returned by RT are listed in the order prescribed by the feature model. The
sanity condition for FFJPL ’s refinement table is identical to the one of FFJ, namely:
– RT (C) = Φ for every type C ∈ dom(CT ), with Φ being the features that introduce and refine class C.
17
3.5
Feature Model Interface
As said before, in FFJPL , we abstract from the concrete representation of the feature
model and define instead an interface consisting of proper functions and predicates.
There are two kinds of questions we want to ask about the feature model, which we
explain next.
First, we would like to know which features are never present together, which features are sometimes present together, and which features are always present together. To
this end, we define two predicates, never and sometimes, and a function always. Predicate never (Ω, Φ) indicates that feature Φ is never reachable in the context Ω, i.e., there
is no valid program variant in which the features Ω and feature Φ are present together.
Predicate sometimes(Ω, Φ) indicates that feature Φ is sometimes present when the
features Ω are present, i.e., there are variants in which the features Ω and feature Φ are
present together and there are variants in which they are not present together. Function
always(Ω, Φ) is used to evaluate whether feature Φ is always present in the context Ω
(either alone or within a group of alternative features). There are three cases: if feature Φ
is always present in the context, always returns the feature again (always(Ω, Φ) = Φ);
if feature Φ is not always present, but would be together with a certain group of mutually exclusive features Ψ (i.e., one of the group is always present), always returns all
features of this group (always(Ω, Φ) = Φ, Ψ). If a feature is not present at all, neither
alone nor together with other mutually exclusive features, always returns the empty
list (always(Ω, Φ) = •). The above predicates and function provide all information we
need to know about the features’ relationships. They are used especially for field and
method lookup.
Second, we would like to know whether a specific program element is always
present when a given set of features is present. This is necessary to ensure that references to program elements are always valid (i.e., not dangling). We need two sources
of information for that. First, we need to know all features that introduce the program
element in question (determined using the introduction table) and, second, we need to
know which combinations of features are legal (determined using the feature model).
For the field renderer of our example, the introduction table would yield the features
M OZILLA and S AFARI and, from the feature model, it follows that M OZILLA and S A FARI are mutually exclusive, i.e., never (M OZILLA , S AFARI ). But it can happen that
none of the two features is present, which can invalidate a reference to the field. The
type system needs to know about this situation.
To this end, we introduce a predicate validref that expresses that a program element
is always reachable from a set of features. For example, validref (Ω, C) holds if type
C is always reachable from the context Ω, validref (Ω, C.f) holds if field f of class C
is always reachable from the context Ω, and validref (Ω, C.m) holds if method m of
class C is always reachable from the context Ω. Applying validref to a list of program
elements means that the conjunction of the predicates for every list element is taken.
Finally, when we write validref (Ω, C) a Ψ, we mean that program element C is always
reachable from a context Ω in a subset Ψ of features of the product line.
In our prototype, we have implemented the above functions and predicates using a
SAT solver that reasons about propositional formulas representing constraints on legal
18
feature combinations (see Section 4), as proposed by Batory [12] and Czarnecki and
Pietroszek [22].
3.6
Refinement in FFJPL
In Figure 12, we show the functions last and pred for the navigation along the refinement chain. The two functions are identical to the ones of FFJ (cf. Figure 4). However,
in FFJPL , there may be alternative declarations of a class and, in the refinement chain,
refinement declarations may even precede class declarations, as long as the declaring
features are mutually exclusive. Let us illustrate refinement in FFJPL by means of the
example shown in Figure 13. Class C is introduced in the features Φ1 and Φ3 . Feature
Φ2 refines class C introduced by feature Φ1 and feature Φ4 refines class C introduced by
feature Φ3 . Feature Φ1 and Φ2 are never present when feature Φ3 or Φ4 are present and
vice versa. A call of RT (C) would return the list Φ1 , . . . , Φ4 , a call of last(C) would
return the qualified type Φ4 .C, and a call of pred (Φ4 .C) would return the qualified type
Φ3 .C and so on.
Navigating along the refinement chain
RT (C) = Ψ
last(C) = Ψn .C
Ψ 6= •
RT (C) = Ψ, Φ, Ω
pred(Φ.C) = Ψn .C
RT (C) = Φ, Ω
pred(Φ.C) = Base.Object
Fig. 12. Refinement in FFJPL .
C
C
C
C
Φ1
Φ2
Φ3
Φ4
mutually exclusive
Fig. 13. Multiple alternative refinements.
3.7
Subtyping in FFJPL
The subtype relation is more complicated in FFJPL than in FFJ. The reason is that
a class may have multiple declarations in different features, each declaring possibly
different superclasses, as illustrated in Figure 14. That is, when checking whether a class
is a subtype of another class, we need to check whether the subtype relation holds in
all alternative inheritance paths that may be reached from a given context. For example,
FooBar is a subtype of BarFoo because BarFoo is a superclass of FooBar in every
19
program variant (since always(Φ1 , Φ2 ) = Φ2 , Φ3 ); but FooBar is not a subtype of
Foo and Bar because, in both cases, a program variant exists in which FooBar is not a
(indirect) subclass of the class in question.
Φ2
Foo
Bar
A a;
A m(D d);
B b;
B m(B b);
BarFoo
BarFoo
D d;
D d;
Φ3
Φ2 and Φ3 are
mutually exclusive and
one of them is always
present together with Φ1
FooBar
E e;
Φ1
Fig. 14. Multiple inheritance chains in the presence of alternative features.
In Figure 15, we show the subtype relation of FFJPL . The subtype relation C <:
E a Ω is read as follows: in the context Ω, type C is a subtype of type E, i.e., type C is
a subtype of type E in every variant in which also the features Ω are present. The first
rule in Figure 15 covers reflexivity and terminates the recursion over the inheritance
hierarchy. The second rule states that class C is a subtype of class E if at least one
declaration of C is always present (tested with validref ) and if every of C’s declarations
that may be present together with Ω (tested with sometimes) declares some type D as
its supertype and D is a subtype of E in the context Ω. That is, E must be a direct or
indirect supertype of D in all variants in which the features Ω are present. Additionally,
supertype D must be always reachable from the context (Ω, Ψ). When traversing the
inheritance hierarchy, in each step, the context is extended by the feature that introduces
the current class in question, e.g., Ω is extended with Ψ.
Interestingly, the second rule subsumes the two FFJ rules for transitivity and direct
superclass declaration because some declarations of C may declare E directly as its
superclass and some declarations may declare another superclass D that is, in turn, a
subtype of E, and the rule must be applicable to both cases simultaneously.
C <: E a Ω
Subtyping
C <: C a Ω
validref (Ω, C)
CT(Ψ.C) = class C extends D { . . . }
∀ Ψ ∈ IT (C) : sometimes(Ω, Ψ) ⇒
validref ((Ω, Ψ), D) D <: E a Ω, Ψ
C <: E a Ω
Fig. 15. Subtyping in FFJPL .
20
Applied to our example of Figure 14, we have FooBar <: FooBar a Φ1 because
of the reflexivity rule. We also have FooBar <: BarFoo a Φ1 because FooBar is
reachable from feature Φ1 and every feature that introduces FooBar, namely Φ1 , contains a corresponding class declaration that declares BarFoo as FooBar’s superclass,
and BarFoo is always reachable from Φ1 . However, we have FooBar 6<: Foo a Φ1
and FooBar 6<: Bar a Φ1 because FooBar’s immediate superclass BarFoo is not
always a subtype of Foo respectively of Bar.
3.8
Auxiliary Definitions of FFJPL
Extending FFJ toward FFJPL makes it necessary to add and modify some auxiliary
functions. The most complex changes concern the field and method lookup mechanisms.
Field Lookup. The auxiliary function fields collects the fields of a class including the
fields of its superclasses and refinements. Since alternative class or refinement declarations may introduce alternative fields (or the same field with identical or alternative
types), fields may return different fields for different feature selections. Since we want
to type-check all valid variants, field returns multiple field lists (i.e., a list of lists) that
cover all possible feature selections. Each inner list contains field declarations collected
in an alternative path of the combined inheritance and refinement hierarchy.
For legibility, we separate the inner lists using the delimiter ‘◦’. For example, looking up the fields of class FooBar in the context of feature Φ1 (Figure 14) yields the
list A a, D d, E e ◦ B b, D d, E e because the features Φ2 and Φ3 are mutually exclusive and one of them is present in each variant in which also Φ1 is present. For
readability, we use the metavariables F and G when referring to inner field lists. We
abbreviate a list of lists of fields F1 ◦ . . . ◦ Fn by F. Analogously, F is shorthand for
F11 ◦ . . . ◦ Fn1 ◦ . . . ◦ F1m ◦ . . . ◦ Fnm .
Function fields receives a qualified type Φ.C and a context of selected features Ω.
If we want all possible field lists, the context is empty. If we want only field lists for
a subset of feature selections, e.g., only the fields that can be referenced from a term
in a specific feature module, we can use the context to specify one or more features of
which we know that they must be selected.
The basic idea of FFJPL ’s field lookup is to traverse the combined inheritance and
refinement hierarchy much like in FFJ. There are four situations that are handled differently:
1. The field lookup returns the empty list when it reaches Base.Object.
2. The field lookup ignores all fields that are introduced by features that are never
present in a given context.
3. The field lookup collects all fields that are introduced by features that are always
present in a given context. References to these fields are always valid.
4. The field lookup collects all fields that are introduced by features that may be
present in a given context but that are not always present. In this case, a special
21
marker @ is added to the fields in question because we cannot guarantee that a reference to this field is safe in the given context.5 It is up to the type system to decide,
based on the marker, whether this situation may provoke an error (e.g., the type system ignores the marker when looking for duplicate fields but reports an error when
type checking object creations).
5. A special situation occurs when the field lookup identifies a group of alternative
features. In such a group each feature is optional and excludes every other feature
of the group and at least one feature of the group is always present in a given
context. Once the field lookup identifies a group of alternative features, we split the
result list, each list containing the fields of a feature of the group and the fields of
the original list.
fields(Ω, Φ.C) = C f
Field lookup
fields(Ω, Φ.Object) = •
(FL-1)
never (Ω, Φ)
fields(Ω, Φ.C) = fields(Ω, pred (Φ.C))
(FL-2)
sometimes(Ω, Φ)
always(Ω, Φ) = Φ
CT (Φ.C) = class C extends D { C f; M }
fields(Ω, Φ.C) = append (fields(Ω, last(D)), C f)
sometimes(Ω, Φ)
always(Ω, Φ) = Φ
CT (Φ.C) = refines class C { C f; M }
fields(Ω, Φ.C) = append (fields(Ω, pred (Φ.C)), C f)
sometimes(Ω, Φ)
always(Ω, Φ) = •
CT (Φ.C) = class C extends D { C f; M }
fields(Ω, Φ.C) = append (fields(Ω, last(D)), C f@)
sometimes(Ω, Φ)
always(Ω, Φ) = •
CT (Φ.C) = refines class C { C f; M }
fields(Ω, Φ.C) = append (fields(Ω, pred (Φ.C)), C f@)
(FL-3.1)
(FL-3.2)
(FL-4.1)
(FL-4.2)
sometimes(Ω, Φ)
always(Ω, Φ) = Ψ
(FL-5)
fields(Ω, Φ.C) = fields((Ω, Ψ1 ), Φ.C) ◦ . . . ◦ fields((Ω, Ψn ), Φ.C)
Fig. 16. Field lookup in FFJPL .
In order to distinguish the different cases, we use the predicates and functions defined in Section 3.5 (especially never , sometimes, and always). The definition of func5
Note that the marker @ is generated during type checking, so we do not include it in the syntax
of FFJ.
22
tion fields, shown in Figure 16, follows the intuition described above: Once Base.Object
is reached, the recursion terminates (FL-1). When a feature is never reachable in the
given context, fields ignores this feature and resumes with the previous one (FL-2).
When a feature is mandatory (i.e., always present in a given context), the fields in question are added to each alternative result list, which were created in Rule FL-5 (FL-3.1
and FL-3.2).6 When a feature is optional, the fields in question, annotated with the
marker @, are added to each alternative result list (FL-4.1 and FL-4.2). When a feature
is part of an alternative group of features, we cannot immediately decide how to proceed. We split the result list in multiple lists (by means of multiple recursive invocations
of fields), in which we add one of the alternative features to each context passed to an
invocation of fields (FL-5).
mtype(Ω, m, Φ.C) = B → B0
Method type lookup
mtype(Ω, m, Base.Object) = •
sometimes(Ω, Φ)
B0 m(B x) { . . . } ∈ M
CT (Φ.C) = class C extends D { C f; M }
mtype(Ω, m, Φ.C) = mtype(Ω, m, pred (Φ.C)), mtype(Ω, m, last(D)), B → B0
B0 m(B x) { . . . } ∈ M
sometimes(Ω, Φ)
CT (Φ.C) = refines class C { C f; M }
mtype(Ω, m, Φ.C) = mtype(Ω, m, pred (Φ.C)), B → B0
(m is not defined in M ∨ never (Ω, Φ))
CT (Φ.C) = class C extends D { C f; M }
mtype(Ω, m, Φ.C) = mtype(Ω, m, pred (Φ.C)), mtype(Ω, m, last(D))
(m is not defined in M ∨ never (Ω, Φ))
CT (Φ.C) = refines class C { C f; M }
mtype(Ω, m, Φ.C) = mtype(Ω, m, pred (Φ.C))
(ML-1)
(ML-2)
(ML-3)
(ML-4)
(ML-5)
Fig. 17. Method Lookup in FFJPL .
Method Type Lookup. Like in field lookup, in method lookup, we have to take alternative definitions of methods into account. But the lookup mechanism is simpler
than in fields because the order of signatures found in the combined inheritance and
refinement hierarchy is irrelevant for type checking. Hence, function mtype yields a
simple list B → B0 of signatures for a given method name m. For example, calling
mtype(Φ1 , m, Φ1 .C) in the context of Figure 14 yields the list D → A, B → B.
6
Function append adds to each inner list of a list of field lists a given field. Its implementation
is straightforward and omitted for brevity.
23
In Figure 17, we show the definition of function mtype. For Base.Object, the empty
list is returned (ML-1). If a class that is sometimes reachable introduces a method in
question (ML-2), its signature is added to the result list and all possible predecessors
in the refinement chain (using pred ) and all possible subclasses are searched (using
last). Likewise, if a refinement that is sometimes reachable introduces a method with
the name searched (ML-3), its signature is added to the result list and all possible predecessors in the refinement chain are searched (using pred ). If a class or refinement does
not declare a corresponding method (ML-4 and ML-5) or the a class is never reachable,
the search proceeds with the possible superclasses or predecessors.
The current definition of function mtype returns possibly many duplicate signatures.
A straightforward optimization would be to remove duplicates before using the result
list, which we omitted for simplicity.
introduce(Ω, Φ.C)
Valid class introduction
CT (Ψ.C) = class C extends D { C f; M }
@Ψ :
Ψ 6= Φ
sometimes(Ω, Ψ)
introduce(Ω, Φ.C)
introduce(Ω, f, Φ.C)
Valid field introduction
∀ E h ∈ fields(Ω, Φ.C) : f ∈
/h
introduce(Ω, f, Φ.C)
introduce(Ω, m, Φ.C)
Valid method introduction
mtype(Ω, m, Φ.C) = •
introduce(Ω, m, Φ.C)
refine(Ω, Φ.C)
Valid class refinement
RT (C) = Ψ, Φ, Π
validref (Ω, C) a Ψ
refine(Ω, Φ.C)
Valid method overriding
override(Ω, m, Φ.C, C → C0 )
RT (C) = Ψ, Φ, Π
validref (Ω, C.m) a Ψ, Φ
∀ B → B0 ∈ mtype(Ω, m, Φ.C) : C = B ∧ C0 = B0
override(Ω, m, Φ.C, C → C0 )
Fig. 18. Valid introduction, refinement, and overriding in FFJPL .
24
Valid Introduction, Refinement, and Overriding. In Figure 18, we show predicates
for checking the validity of introduction, refinement, and overriding in FFJPL . Predicate
introduce indicates whether a class with the qualified type Φ.C has not been introduced
by any other feature Ψ that may be present in the context Ω. Likewise, introduce holds
if a method m or a field f has not been introduced by a qualified type Φ.C (including
possible predecessors and superclasses) that may be present in the given context Ω.
To this end, it checks either whether mtype yields the empty list or whether f is not
contained in every inner list returned by fields.
For a given refinement, predicate refine indicates whether a proper class, which is
always reachable in the given context, has been declared previously in the refinement
chain. We write validref (Ω, C) a Ψ in order to state that a declaration of class C
has been introduced in the set Ψ of features, which is only a subset of the features of
the product line, namely the features that precede the feature that introduces class C.
Predicate override indicates whether a declaration of method m has been introduced
(and is always reachable) in some feature introduced by before the feature that refines
m and whether every possible declaration of m in any predecessor of a Φ.C has the
same signature.
3.9
Type Relation of FFJPL
The type relation of FFJPL consists of type rules for terms and well-formedness rules
for classes, refinements, and methods, shown in Figure 19 and Figure 20.
Term Typing Rules. A term typing judgment in FFJPL is a quadruple, consisting of
a typing context Γ, a term t, a list of types C, and a feature Φ that contains the term
(see Figure 19). A term can have multiple types in a product line because there may
be multiple declarations of classes, fields, and methods. The list C contains all possible
types a term can have.
Rule T-VARPL is standard and does not refer to the feature model. It yields a list
consisting only of the type of the variable in question.
Rule T-F IELDPL checks whether a field access t0 .f is well-typed in every possible variant in which also Φ is present. Based on the possible types E of the term t0
the field f is accessed from, the rule checks whether f is always reachable from Φ
(using validref ). Note that this is a key mechanism of FFJPL ’s type system. It ensures that a field, being accessed, is definitely present in every valid program variant
in which the field access occurs – without generating all these variants. Furthermore,
all possible fields of all possible types E are assembled in a nested list F, C f, G in
which C f denotes a declaration of the field f; the call of fields(Φ, last(E)) is shorthand
for fields(Φ, last(E1 )) . . . fields(Φ, last(En )), in which the individual result lists are
concatenated. Finally, the list of all possible types C11 , . . . , Cn1 , . . . , C1m , . . . , Cnm of
field f becomes the list of types of the overall field access. Note that the result list may
contain duplicates, which could be eliminated for optimization purposes.
Rule T-I NVKPL checks whether a method invocation t0 .m(t) is well-typed in every
possible variant in which also Φ is present. Based on the possible types E of the term
t0 the method m is invoked on, the rule checks whether m is always reachable from Φ
25
Γ ` t:CaΦ
Term typing
x:C∈Γ
Γ ` x:CaΦ
(T-VARPL )
∀ E ∈ E : validref (Φ, E.f)
fields(Φ, last(E)) = F, C f, G
Γ ` t0 : E a Φ
Γ ` t0 .f : C11 , . . . , Cn1 , . . . , C1m , . . . , Cnm a Φ
∀ E ∈ E : validref (Φ, E.m)
Γ ` t0 : E a Φ
∀ C ∈ C, ∀ D ∈ D ∈ D : C <: D a Φ
Γ ` t:CaΦ
mtype(Φ, m, last(E)) = D → B
Γ ` t0 .m(t) : B11 , . . . , Bn1 , . . . , B1m , . . . , Bnm a Φ
validref (Φ, C)
∀ D g ∈ F , ∀ C ∈ C : C <: D a Φ
Γ ` t:CaΦ
fields(Φ, last(C)) = F
@∈
/F
Γ ` new C(t) : C a Φ
Γ ` t0 : E a Φ
(T-F IELDPL )
validref (Φ, C)
∀ E ∈ E : (E <: C a Φ ∨ C <: E a Φ)
Γ ` (C)t0 : C a Φ
validref (Φ, C)
stupid warning
Γ ` t0 : E a Φ
∃ E ∈ E : (C 6<: E a Φ ∧ E 6<: C a Φ)
Γ ` (C)t0 : C a Φ
Fig. 19. Term typing in FFJPL .
26
(T-I NVKPL )
(T-N EWPL )
(T-UDC ASTPL )
(T-SC ASTPL )
M OK a Φ.C
Method typing
x : B, this : C ` t0 : E a Φ
∀ E ∈ E : E <: B0 a Φ
introduce(Φ, m, last(D))
validref (Φ, B)
CT (Φ.C) = class C extends D { C f; M }
B0 m(B x) { return t0 ; } OK a Φ.C
x : B, this : C ` t0 : E a Φ
∀ E ∈ E : E <: B0 a Φ
validref (Φ, B)
override(Φ, m, last(D), B → B0 )
CT (Φ.C) = class C extends D { C f; M }
overrides B0 m(B x) { return t0 ; } OK a Φ.C
x : B, this : C ` t0 : E a Φ
∀ E ∈ E : E <: B0 a Φ
validref (Φ, B)
introduce(Φ, m, pred (Φ.C))
CT (Φ.C) = refines class C { C f; M }
B0 m(B x) { return t0 ; } OK a Φ.C
x : B, this : C ` t0 : E a Φ
∀ E ∈ E : E <: B0 a Φ
override(Φ, m, pred (Φ.C), B → B0 )
validref (Φ, B)
CT (Φ.C) = refines class C { C f; M }
overrides B0 m(B x) { return t0 ; } OK a Φ.C
L OK a Φ
Class typing
validref (Φ, D)
∀ f ∈ f : introduce(Φ, f, last(D))
validref (Φ, C)
introduce(Φ, Φ.C)
M OK a Φ.C
class C extends D { C f; M } OK a Φ
R OK a Φ
Refinement typing
validref (Φ, C)
∀ f ∈ f : introduce(Φ, f, pred (Φ.C))
refine(Φ, Φ.C)
refines class C { C f; M } OK a Φ
Fig. 20. Well-formedness rules of FFJPL .
27
M OK a Φ.C
(using validref ). As with field access, this check is essential. It ensures that in generated
programs only methods are invoked that are also present. Furthermore, all possible
signatures of m of all possible types E are assembled in the nested list D → B and it is
checked that all possible lists C of argument types of the method invocation are subtypes
of all possible lists D of parameter types of the method (this implies that the lengths of
the two lists must be equal). A method invocation has multiple types assembled in a list
that contains all result types of method m determined by mtype. As with field access,
duplicates should be eliminated for optimization purposes.
Rule T-N EWPL checks whether an object creation new C(t) is well-typed in every
possible variant in which also Φ is present. Specifically, it checks whether there is a
declaration of class C always reachable from Φ. Furthermore, all possible field combinations of C are assembled in the nested list F, and it is checked whether all possible
combinations of argument types passed to the object creation are subtypes of the types
of all possible field combinations (this implies that the number of arguments types must
equal the number of field types). The fields of the result list must not be annotated with
the marker @ since optional fields may not be present in every variant and references
may become invalid (see field lookup).7 An object creation has only a single type C.
Rules T-UDC ASTPL and T-SC ASTPL check whether casts are well-typed in every
possible variant in which also Φ is present. This is done by checking whether the type
C the term t0 is cast to is always reachable from Φ and whether this type is a subtype,
supertype, or unrelated type of all possible types E the term t0 can have. We have only
a single rule T-UDC ASTPL for up- and downcasts because the list E of possible types
may contain super- and subtypes of C simultaneously. If there is a type in the list which
leads to a stupid case, we flag a stupid warning. A cast yields a list containing only a
single type C.
Well-Formedness Rules. In Figure 20, we show the well-formedness rules of classes,
refinements, and methods.
Like in FFJ, the typing judgment of classes and refinements is a binary relation between a class or refinement declaration and a feature. The rule of classes checks whether
all methods are well-formed in the context of the class’ qualified type. Moreover, it
checks whether the class declaration is unique in the scope of the enclosing feature Φ,
i.e., whether no other feature, that may be present together with feature Φ, introduces
a class with an identical name (using introduce). Furthermore, it checks whether the
superclass and all field types are always reachable from Φ (using validref ). Finally, it
checks whether none of the fields of the class declaration have been introduced before
(using introduce). The well-formedness rule of refinements is analogous, except that
the rule checks that there is at least one class declaration reachable that is refined and
that has been introduced before the refinement (using refine).
The typing judgment of methods is a binary relation between a method declaration
and the qualified type that declares the method. Like in FFJ, there are four different
rules for methods (from top to bottom in Figure 20)
1. that do not override another method and that are declared by classes,
7
The treatment of @ is semiformal but simplifies the rule.
28
2. that override another method and that are declared by classes,
3. that do not override another method and that are declared by refinements,
4. that override another method and that are declared by refinements.
All four rules check whether all possible types E of the method body are subtypes of
the declared return type B0 of the method and whether the argument types B are always
reachable from the enclosing feature Φ (using validref ).
For methods that are introduced, it is checked, using introduce, whether no method
with identical name has been introduced in any possible superclass (Rule 1) or in any
possible predecessor in the refinement chain (Rule 3). For methods that override other
methods, it is checked, using override, whether a method with identical name and
signature exists in any possible superclass (Rule 2) or in any possible predecessor in the
refinement chain (Rule 4).
Well-Typed FFJPL Product Lines. An FFJPL product line, consisting of a term, a
class table, an introduction table, and a refinement table, is well-typed if
– the term is well-typed (checked using FFJPL ’s term typing rules),
– all classes and refinements stored in the class table are well-formed (checked using
FFJPL ’s well-formedness rules), and
– the class, introduction, and refinement tables are well-formed (ensured by the corresponding sanity conditions).
3.10
Type Safety of FFJPL
Type checking in FFJPL is based on information contained in the class table, introduction table, refinement table, and feature model. The first three are filled by the compiler
that has parsed the code base of the product line. The feature model is supplied directly
by the user (or tool). The compiler determines which class and refinement declarations
belong to which features. The classes and refinements of the class table are checked using their well-formedness rules which, in turn, use the well-formedness rules for methods and the term typing rules for method bodies. Several rules use the introduction and
refinement tables in order to map types, fields, and methods to features and the feature model to navigate along refinement chains and to check the presence of program
elements.
What does type safety mean in the context of a product line? The product line itself
is never evaluated; rather, different programs are derived that are then evaluated. Hence,
the property we are interested in is that all programs that can be derived from a welltyped product line are in turn well-typed. Furthermore, we would like to be sure that
all FFJPL product lines, from which only well-typed FFJ programs can be derived, are
well-typed. We formulate the two properties as the two theorems Correctness of FFJPL
and Completeness of FFJPL .
29
Correctness
T HEOREM 3.1 (Correctness of FFJPL ) Given a well-typed FFJPL product line pl (including with a well-typed term t, well-formed class, introduction, and refinement tables
CT , IT , and RT , and a feature model FM ), every program that can be derived with a
valid feature selection fs is a well-typed FFJ program (cf. Figure 10).
pl = (t, CT , IT , RT , FM )
pl is well-typed
derive(pl , fs) is well-typed
fs is valid in FM
Function derive collects the feature modules from a product line according to a
user’s selection fs, i.e., non-selected feature modules are removed from the derived
program. After this derivation step, the class table contains only classes and refinements
stemming from the selected feature modules. We define a valid feature selection to be
a list of features whose combination does not contradict the constraints implied by the
feature model.
The proof idea is to show that the type derivation tree of an FFJPL product line
is a superimposition of multiple so-called type derivation slices. As usual, the type
derivation proceeds from the root (i.e., an initial type rule that checks the term and all
classes and refinements of the class table) to the leaves (type rules that do not have a
premise) of the type derivation tree. Each time a term has multiple types, e.g., a method
has different alternative return types, which is caused by multiple mutually exclusive
method declarations, the type derivation splits into multiple branches. With branch we
refer only to positions in which the type derivation tree is split into multiple subtrees
in order to type check multiple mutually exclusive term definitions. Each subtree from
the root of the type derivation tree along the branches toward a leaf is a type derivation
slice. Each slice corresponds to the type derivation of a feature-oriented program.
Let us illustrate the concept of a type derivation slice by a simplified example. Suppose the application of an arbitrary type rule to a term t somewhere in the type derivation. Term t has multiple types C due to different alternative definitions of t’s subterms.
For simplicity, we assume here that t has only a single subterm t0 , like in the case of a
field access (t = t0 .f), in which the overall term t has multiple types depending on t0 ’s
and f’s types; the rule can be easily extended to multiple subterms by adding a predicate
per subterm. The type rule ensures the well-typedness of all possible variants of t on
the basis of the variants of t’s subterm t0 . Furthermore, the type rule checks whether a
predicate predicate (e.g., C <: D) holds for each variant of the subterm with its possible
types E, written predicate(t0 : Ei ). The possible types C of the overall term follow in
some way from the possible types E of its subterm. Predicate validref is used to check
whether all referenced elements and types are present in all valid variants, including
different combinations of optional features. For the general case, this can be written as
follows:
predicate(t0 : E1 ) predicate(t0 : E2 ) . . .
t0 : E
always(. . .)
Γ ` t:CaΦ
predicate(t0 : En )
(T-*PL )
The different uses of predicate in the premise of an FFJPL type rule correspond
to the branches in the type derivation that denote alternative definitions of subterms.
30
Hence, the premise of the FFJPL type rule is the conjunction of the different premises
that cover the different alternative definitions of the subterms of a term.
The proof strategy is as follows. Assuming that the FFJPL type system ensures that
each slice is a valid FFJ type derivation (see Lemma B.1 in Appendix B.1) and that
each valid feature selection corresponds to a single slice (since alternative features have
been removed; see Lemma B.2 in Appendix B.1), each feature-oriented program that
corresponds to a valid feature selection is guaranteed to be well-typed. Note that multiple valid feature selections may correspond to the same slice because of the presence
of optional features. It follows that, for every valid feature selection, we derive a wellformed FFJ program – since its type derivation is valid – whose evaluation satisfies the
properties of progress and preservation (see Appendix A). In Appendix B, we describe
the proof of Theorem 3.1 in more detail.
Completeness
T HEOREM 3.2 (Completeness of FFJPL ) Given an FFJPL product line pl (including
a well-typed term t, well-formed class, introduction, and refinement tables CT , IT ,
and RT , and a feature model FM ), and given that all valid feature selections fs yield
well-typed FFJ programs, according to Theorem 3.1, pl is a well-typed product line
according to the rules of FFJPL .
pl = (t, CT , IT , RT , FM ) ∀ fs : (fs is valid in FM ⇒ derive(pl , fs) is well-typed)
pl is well-typed
The proof idea is to examine three basic cases and to generalize subsequently: (1) pl
has only mandatory features; (2) pl has only mandatory features except a single optional
feature; (3) pl has only mandatory features except two mutually exclusive features.
All other cases can be formulated as combinations of these three basic cases. To this
end, we divide the possible relations between features into three disjoint sets: (1) a
feature is reachable from another feature in all variants, (2) a feature is reachable from
another feature in some, but not in all, variants, (3) two features are mutually exclusive.
From these three possible relations, we can prove the three basic cases in isolation and,
subsequently, construct a general case that can be phrased as a combination of the three
basic cases. The description of the general case and the reduction finish the proof of
Theorem 3.2. In Appendix B, we describe the proof of Theorem 3.2 in detail.
4
Implementation & Discussion
We have implemented FFJ and FFJPL in Haskell, including the program evaluation and
type checking of product lines. The FFJPL compiler expects a set of feature modules
and a feature model both of which, together, represent the product line. A feature module is represented by a directory. The files found inside a feature module’s directory are
assigned to / belong to the enclosing feature. The FFJPL compiler stores this information for type checking. Each file may contain multiple classes and class refinements.
In Figure 21, we show a snapshot of our test environment, which is based on Eclipse
31
and a Haskell plugin8 . We use Eclipse to interpret or compile our FFJ and FFJPL type
systems and interpreters. Specifically, the figure shows the directory structure of our
email system. The file EmailClient.features contains the user’s feature selection and
the feature model of the product line.
Fig. 21. Snapshot of the test environment of the Haskell implementation.
The feature model of a product line is represented by a propositional formula, following the approach of Batory [12] and Czarnecki and Pietroszek [22]. Propositional
formulas are an effective way of representing the relationships between features (e.g., of
specifying which feature implies the presence and absence of other features and of machine checking whether a feature selection is valid). For example, we have implemented
predicate sometimes as follows:
sometimes(FM , Ω, Ψ) = satisfiable(FM ∧ Ω1 ∧ . . . ∧ Ωn ∧ Ψ)
The feature model is an propositional formula; feature are variables; and satisfiable is
a satisfiability solver. Likewise, we have implemented predicate always on the basis of
logical reasoning on propositional formulas:
always(FM , Ω, Ψ) = ¬(satisfiable(¬(FM ⇒ ((Ω1 ∧ . . . ∧ Ωn ) ⇒ Ψ))))
For a more detailed explanation of how propositional formulas relate to feature models
and feature selections, we refer the interest to the work of Batory [12].
In Figure 22, we show the textual specification of the feature model of our email
system, which can be passed directly to the FFJPL compiler.
8
http://eclipsefp.sourceforge.net/haskell/
32
1 features:
2
EmailClient IMAP POP3 MIME SSL Text Mozilla Safari
3
4 model:
5
EmailClient implies (IMAP or POP3);
6
IMAP implies EmailClient;
7
POP3 implies EmailClient;
8
MIME implies EmailClient;
9
SSL implies EmailClient;
10
Text implies (IMAP or POP3);
11
Mozilla implies (IMAP or POP3);
12
Safari implies (IMAP or POP3);
13
Mozilla implies (not Safari);
14
Safari implies (not Mozilla);
Fig. 22. Feature model of an email client product line.
The first section (features:) of the file representing the feature model defines an
ordered set of names of the features of the product line and the second section (model:)
defines constraints on the features’ presence in the derived programs. In our example,
each email client supports either the protocols IMAP, POP3, or both. Furthermore, every
feature requires the presence of the base feature E MAIL C LIENT. Feature T EXT requires
either the presence of IMAP or POP3 or both – the same for M OZILLA and S AFARI.
Finally, feature M OZILLA requires the absence of feature S AFARI and vice versa.
On the basis of the feature modules and the feature model, FFJPL ’s type system
checks the entire product line and identifies valid program variants that still contain
type errors. A SAT solver is used to check whether elements are never, sometimes, or
always reachable. If an error is found, the product line is rejected as ill-formed. If not,
a feature-oriented program guaranteed to be well-formed can derived on the basis of a
user’s feature selection. This program can be evaluated using the standard evaluation
rules of FFJ, which we have also implemented in Haskell.
In contrast to previous work on type checking feature-oriented product lines [64,23],
our type system provides detailed error messages. This is possible due to the finegrained checks at the level of individual term typing and well-formedness rules. For
example, if a field access succeeds only in some program variants, this fact can be
reported to the user and the error message can point to the erroneous field access. Previously proposed type systems compose all code of all features of a product line and
extract a single propositional formula, which is checked for satisfiability. If the formula
is not satisfiable (i.e., a type error has occurred), it is not possible to identify the location
that has caused the error (at least not without further information). See Section 5, for a
detailed discussion of related approaches.
We made several tests and experiments with our Haskell implementation. However,
real-world tests were not feasible because of two reasons. First, in previous work it has
been already demonstrated that feature-oriented product lines require proper type systems and that type checking entire real-world product lines is feasible and useful [64].
Second, like FJ, FFJ is a core language into which all Java programs can be compiled
and which, by its relative simplicity, is suited for the formal definition and proof of
language properties – in our case, a type system and its correctness and completeness.
33
But, a core language is never suited for the development of real-world programs. This
is why our examples and test programs are of similar size and complexity as the FJ examples of Pierce [54]. Type checking our test programs required acceptable amounts of
time (in the order of magnitude of milliseconds per product line). We do not claim to be
able to handle full-sized feature-oriented product lines by hand-coding them in FFJPL .
Rather, this would require an expansion of the type system to full Java (including support for features as provided by AHEAD [13] or FeatureHouse [9]) – an enticing goal,
but one for the future (especially, as Java’s informal language specification [28] has 688
pages). Our work lays a foundation for implementing type systems in that it provides
evidence that core feature-oriented mechanisms are type sound and type systems of
feature-oriented product lines can be implemented correctly and completely.
Still, we would like to make some predictions on the scalability of our approach. The
novelty of our type system is that it incorporates alternative features and, consequently,
alternative definitions of classes, fields, and methods. This leads to a type derivation tree
with possibly multiple branches denoting alternative term types. Hence, performing a
type derivation of product line with many alternative features may consume a significant
amount of computation time and memory. It seems that this overhead is the price for
allowing alternative implementation of program parts.
Nevertheless, our approach minimizes the overhead caused by alternative features
compared to the naive approach. In the naive approach, all possible programs are derived and type checked subsequently. In our approach, we type check the entire code
base of the product line and branch the type derivation only at terms that really have
multiple, alternative types, and not at the level of entire program variants, as done in
the naive approach. Our experience with feature-oriented product lines shows that, usually, there are not many alternative features in a product line, but mostly optional features [42,3,64,37,59,11,9,5,6,57,60]. For example, in the Berkeley DB product line (JE
edition; 80 000 lines of code) there are 99 feature modules, but only two pairs of them
alternative [9,37]; in the Graph Product Line there are 26 feature modules, of which
only three pairs are alternative [42,9]. A further observation is that most alternative features that we encountered do not alter types. That is, there are multiple definitions of
fields and methods but with equal types. For example, GPL and Berkeley DB contain
alternative definitions of a few methods but only with identical signatures. Type checking these product lines with our approach, the type derivation would have almost no
branches. In the naive approach, still many program variants exist due to optional features. Hence, our approach is preferable. For example, in a product line with n features
and c ∗ n variants (with c being a constant), in our approach, the type system would
have to check n feature modules (with some few branches in the type derivation and
solving few simple SAT problems; see below) and, in the naive approach, the type system would have to check, at least, 2 ∗ n feature modules but, commonly, 2 ∗ n ∗ m with
m < n. For product lines with a higher degree of variability, e.g., with n2 or even 2n
variants the benefit of our approach becomes even more significant. We believe that this
benefit can make a difference in real world product line engineering.
A further point is that almost all typing and well-formedness rules contain calls to
the built-in SAT solver. This results in possibly many invocations of the SAT solver
at type checking time. Determining the satisfiability of a propositional formula is in
34
general an N P-complete problem. However, it has been shown that the structures of
propositional formulas occurring in software product lines are simple enough to scale
satisfiability solving to thousands of features [47]. Furthermore, in our experiments, we
have observed that many calls to the SAT solver are redundant, which is easy to see
when thinking about type checking feature-oriented product lines where the presence
of single types or members is checked in many type rules. We have implemented a
caching mechanism to decrease the number of calls to the SAT solver to a minimum.
Finally, the implementation in Haskell helped us a lot with the evaluation of the
correctness of our type rules. It can serve other researchers to reproduce and evaluate
our work and to experiment with further (feature-oriented) language mechanisms. The
implementations of FFJ and FFJPL , along with test programs, can be downloaded from
the Web.9
5
Related Work
We divide our discussions of related work into two parts: the implementation, formal
models, and type systems (1) of feature-oriented programs and (2) of feature oriented
product lines.
5.1
Feature-Oriented Programs
FFJ has been inspired by several feature-oriented languages and tools, most notably
AHEAD/Jak [13], FeatureC++ [10], FeatureHouse [9], and Prehofer’s feature-oriented
Java extension [55]. Their key aim is to separate the implementation of software artifacts, e.g., classes and methods, from the definition of features. That is, classes and refinements are not annotated or declared to belong to a feature. There is no statement in
the program text that defines explicitly a connection between code and features. Instead,
the mapping of software artifacts to features is established via so-called containment hierarchies, which are basically directories containing software artifacts. The advantage
of this approach is that a feature’s implementation can include, beside classes in the
form of Java files, also other supporting documents, e.g., documentation in the form of
HTML files, grammar specifications in the form of JavaCC files, or build scripts and
deployment descriptors in the form of XML files [13]. To this end, feature composition
merges not only classes with their refinements but also other artifacts, such as HTML
or XML files, with their respective refinements [2,9].
Another class of programming languages that provide mechanisms for the definition
and extension of classes and class hierarchies includes, e.g., ContextL [29], Scala [52],
and Classbox/J [14]. The difference to feature-oriented languages is that they provide
explicit language constructs for aggregating the classes that belong to a feature, e.g.,
family classes, classboxes, or layers. This implies that non-code software artifacts cannot be included in a feature [11]. However, FFJ still models a subset of these languages,
in particular, class refinement.
Similarly, related work on a formalization of the key concepts underlying featureoriented programming has not disassociated the concept of a feature from the level of
9
http://www.fosd.de/ffj
35
code. Especially, calculi for mixins [26,16,1,34], traits [41], family polymorphism and
virtual classes [33,25,30,18], path-dependent types [52,51], open classes [20], dependent classes [27], and nested inheritance [50] either support only the refinement of single classes or expect the classes that form a semantically coherent unit (i.e., that belong
to a feature) to be located in a physical module that is defined in the host programming
language. For example, a virtual class is by definition an inner class of the enclosing
object, and a classbox is a package that aggregates a set of related classes. Thus, FFJ
differs from previous approaches in that it relies on contextual information that has been
collected by the compiler, e.g., the features’ composition order or the mapping of code
to features.
A different line of research aims at the language-independent reasoning about features [13,44,9,39]. The calculus gDeep is most closely related to FFJ since it provides a
type system for feature-oriented languages that is language-independent [4]. The idea is
that the recursive process of merging software artifacts, when composing hierarchically
structured features, is very similar for different host languages, e.g., for Java, C#, and
XML. The calculus describes formally how feature composition is performed and what
type constraints have to be satisfied. In contrast, FFJ does not aspire to be languageindependent, although the key concepts can certainly be used with different languages.
The advantage of FFJ is that its type system can be used to check whether terms of
the host language (Java or FJ) violate the principles of feature orientation, e.g., whether
methods refer to classes that have been added by other features. Due to its language
independence, gDeep does not have enough information to perform such checks.
5.2
Feature-Oriented Product Lines
Our work on type checking feature-oriented product lines was motivated by the work
of Thaker et al. [64]. They suggested the development of a type system for featureoriented product lines that does not check all individual programs but the individual
feature implementations. They have implemented an (incomplete) type system and, in a
number of case studies on real product lines, they found numerous hidden errors using
their type rules. Nevertheless, the implementation of their type system is ad-hoc in the
sense that it is described only informally, and they do not provide a correctness and
completeness proof. Our type system has been inspired by their work and we were able
to provide a formalization and a proof of type safety.
In a parallel line of work, Delaware et al. have developed a formal model of a
feature-oriented language, called Lightweight Feature Java (LFJ), and a type system
for feature-oriented product lines [23]. Their work was also influenced by the practical
work of Thaker et al. So, it is not surprising that it is closest to ours. However, there are
numerous differences. First, their formal model of a feature-oriented language is based
on Lightweight Java (LJ) [62] and not on Featherweight Java (FJ). While LJ is more
expressive, it is also more complex. We decided for the simpler variant FJ, omitting,
e.g., constructors and mutable state. Second, Delaware et al. do not model featureoriented mechanisms, such as class or method refinements, directly in the semantics
and type rules of the language. Instead, they introduce a transformation step in which
LFJ code is “compiled down” to LJ code, i.e., they flatten refinement chains to single
classes. Proceeding likewise, we would have to generate first an FJ program from an
36
FFJ product line and type check the FJ program (that consists of some or all possible
features of the product line) subsequently. We refrained from such a transformation
step in order to model the semantics of feature-oriented mechanisms directly in terms
of dedicated field and method lookup mechanisms as well as special well-formed rules
for method and class refinements.
Lagorio et al. have shown that a flattening semantics and a direct semantics are
equivalent [40]. An advantage of a “direct” semantics is that it allows a type checking
and error reporting at a finer grain. In LFJ, all feature modules are composed and a
single propositional formula is generated and tested for satisfiability; if the formula
is not satisfiable, it is difficult to identify precisely the point of failure. In FFJPL , the
individual type rules consult the feature model and can point directly to the point of
failure.
A further advantage of our approach is that it leaves open when feature composition is performed. Currently, feature composition is modeled in FFJ/FFJPL as a static
process done before compilation but, with our approach, it becomes possible to model
dynamic feature composition at run time [58,53] by making the class and feature tables
and the feature model dynamic, i.e., allowing them to change during a computation.
With LFJ this is not possible. Hutchins has shown that feature composition can be performed by an interpreter and partial evaluation can be used to pre-evaluate the parts of
a composition that are static [31]. However, Delaware et al. have developed a machinechecked model of their type system formalized with the theorem prover Coq [15]. Our
proof is hand-written, but we have a Haskell implementation of the FFJ and FFJPL
calculi that we have tested thoroughly.
Even previously to the work of Thaker et al., Czarnecki et al. presented an automatic
verification procedure for ensuring that no ill-structured UML model template instances
will be generated from a valid feature selection [22]. That is, they type check product
lines that consist not of Java programs but of UML models. They use OCL (object
constraint language) constraints to express and implement a type system for model
composition. In this sense, their aim is very similar to that of FFJPL , but limited to
model artifacts – although they have proposed to generalize their work to programming
languages.
Kästner et al. have implemented a tool, called CIDE, that allows a developer to
decompose a software system into features via annotations [38]. In contrast to other
feature-oriented languages and tools, the link between code and features is established
via annotations. If a user selects a set of features, all code that is annotated with features
(using background colors) that are not present in the selection is removed. Kästner et
al. have developed a formal calculus and a set of type rules that ensure that only welltyped programs can be generated from a valid feature selection [36]. For example, if
a method declaration is removed, the remaining code must not contain calls to this
method. CIDE’s type rules are related to the type rules of FFJPL but, so far, mutually
exclusive features are not supported in CIDE. In some sense, FFJPL and CIDE represent
two sides of the same coin: the former aims at the composition of feature modules, the
latter at the annotation of feature-related code.
37
6
Conclusion
A feature-oriented product line imposes severe challenges on type checking. The naive
approach of checking all individual programs of a product line is not feasible because
of the combinatorial explosion of program variants. Hence, the only practical option is
to check the entire code base of a product line, including all features, and, based on the
information of which feature combinations are valid, to ensure that it is not possible to
derive a valid program variant that contains type errors.
We have developed such a type system based on a formal model of a featureoriented Java-like language, called Feature Featherweight Java (FFJ). A distinguishing
property of our work is that we have modeled the semantics and type rules for core
feature-oriented mechanisms directly, without compiling feature-oriented code down to
a lower-level representation such as object-oriented Java code. The direct semantics allows us to reason about core feature-oriented mechanisms in terms of themselves and
not of generated lower-level code. A further advantage is the fine-grained error reporting and that the time of feature composition may vary between compile time and run
time.
We have demonstrated and proved that, based on a valid feature selection, our type
system ensures that every program of a feature-oriented product line is well-formed and
that our type system is complete. Our implementation of FFJ, including the type system
for product lines, indicates the feasibility of our approach and can serve as a testbed for
experimenting with further feature-oriented mechanisms.
Acknowledgment
This work is being funded in part by the German Research Foundation (DFG), project
number AP 206/2-1.
References
1. D. Ancona, G. Lagorio, and E. Zucca. Jam—Designing a Java Extension with Mixins. ACM
Transactions on Programming Languages and Systems (TOPLAS), 25(5):641–712, 2003.
2. F. Anfurrutia, O. Díaz, and S. Trujillo. On Refining XML Artifacts. In Proceedings of the
International Conference on Web Engineering (ICWE), volume 4607 of LNCS, pages 473–
478. Springer-Verlag, 2007.
3. S. Apel and K. Böhm. Towards the Development of Ubiquitous Middleware Product Lines.
In Software Engineering and Middleware, volume 3437 of LNCS, pages 137–153. SpringerVerlag, 2004.
4. S. Apel and D. Hutchins. An Overview of the gDeep Calculus. Technical Report MIP-0712,
Department of Informatics and Mathematics, University of Passau, 2007.
5. S. Apel, F. Janda, S. Trujillo, and C. Kästner. Model Superimposition in Software Product
Lines. In Proceedings of the International Conference on Model Transformation (ICMT),
volume 5563 of LNCS, pages 4–19. Springer-Verlag, 2009.
6. S. Apel, C. Kästner, A. Größlinger, and C. Lengauer. Feature (De)composition in Functional
Programming. In Proceedings of the International Conference on Software Composition
(SC), volume 5634 of LNCS, pages 9–26. Springer-Verlag, 2009.
38
7. S. Apel, C. Kästner, and C. Lengauer. An Overview of Feature Featherweight Java. Technical
Report MIP-0802, Department of Informatics and Mathematics, University of Passau, 2008.
8. S. Apel, C. Kästner, and C. Lengauer. Feature Featherweight Java: A Calculus for FeatureOriented Programming and Stepwise Refinement. In Proceedings of the International Conference on Generative Programming and Component Engineering (GPCE), pages 101–112.
ACM Press, 2008.
9. S. Apel, C. Kästner, and C. Lengauer. FeatureHouse: Language-Independent, Automated
Software Composition. In Proceedings of the International Conference on Software Engineering (ICSE), pages 221–231. IEEE CS Press, 2009.
10. S. Apel, T. Leich, M. Rosenmüller, and G. Saake. FeatureC++: On the Symbiosis of FeatureOriented and Aspect-Oriented Programming. In Proceedings of the International Conference
on Generative Programming and Component Engineering (GPCE), volume 3676 of LNCS,
pages 125–140. Springer-Verlag, 2005.
11. S. Apel, T. Leich, and G. Saake. Aspectual Feature Modules. IEEE Transactions on Software
Engineering (TSE), 34(2):162–180, 2008.
12. D. Batory. Feature Models, Grammars, and Propositional Formulas. In Proceedings of the
International Software Product Line Conference (SPLC), volume 3714 of LNCS, pages 7–20.
Springer-Verlag, 2005.
13. D. Batory, J. Sarvela, and A. Rauschmayer. Scaling Step-Wise Refinement. IEEE Transactions on Software Engineering (TSE), 30(6):355–371, 2004.
14. A. Bergel, S. Ducasse, and O. Nierstrasz. Classbox/J: Controlling the Scope of Change in
Java. In Proceedings of the International Conference on Object-Oriented Programming,
Systems, Languages, and Applications (OOPSLA), pages 177–189. ACM Press, 2005.
15. Y. Bertot and P. Casteran. Interactive Theorem Proving and Program Development –
Coq’Art: The Calculus of Inductive Constructions. Texts in Theoretical Computer Science.
An EATCS Series. Springer-Verlag, 2004.
16. V. Bono, A. Patel, and V. Shmatikov. A Core Calculus of Classes and Mixins. In Proceedings
of the European Conference on Object-Oriented Programming (ECOOP), volume 1628 of
LNCS, pages 43–66. Springer-Verlag, 1999.
17. G. Bracha and W. Cook. Mixin-Based Inheritance. In Proceedings of the European Conference on Object-Oriented Programming (ECOOP) and International Conference on ObjectOriented Programming Systems, Languages, and Applications (OOPSLA), pages 303–311.
ACM Press, 1990.
18. D. Clarke, S. Drossopoulou, J. Noble, and T. Wrigstad. Tribe: A Simple Virtual Class Calculus. In Proceedings of the International Conference on Aspect-Oriented Software Development (AOSD), pages 121–134. ACM Press, 2007.
19. P. Clements and L. Northrop. Software Product Lines: Practices and Patterns. AddisonWesley, 2002.
20. C. Clifton, T. Millstein, G. Leavens, and C. Chambers. MultiJava: Design Rationale, Compiler Implementation, and Applications. ACM Transactions on Programming Languages and
Systems (TOPLAS), 28(3):517–575, 2006.
21. K. Czarnecki and U. Eisenecker. Generative Programming: Methods, Tools, and Applications. Addison-Wesley, 2000.
22. K. Czarnecki and K. Pietroszek. Verifying Feature-Based Model Templates Against WellFormedness OCL Constraints. In Proceedings of the International Conference on Generative
Programming and Component Engineering (GPCE), pages 211–220. ACM Press, 2006.
23. B. Delaware, W. Cook, and D. Batory. A Machine-Checked Model of Safe Composition. In
Proceedings of the International Workshop on Foundations of Aspect-Oriented Languages
(FOAL), pages 31–35. ACM Press, 2009.
39
24. S. Ducasse, O. Nierstrasz, N. Schärli, R. Wuyts, and A. Black. Traits: A Mechanism for FineGrained Reuse. ACM Transactions on Programming Languages and Systems (TOPLAS),
28(2):331–388, 2006.
25. E. Ernst, K. Ostermann, and W. Cook. A Virtual Class Calculus. In Proceedings of the
International Symposium on Principles of Programming Languages (POPL), pages 270–
282. ACM Press, 2006.
26. M. Flatt, S. Krishnamurthi, and M. Felleisen. Classes and Mixins. In Proceedings of the
International Symposium on Principles of Programming Languages (POPL), pages 171–
183. ACM Press, 1998.
27. V. Gasiunas, M. Mezini, and K. Ostermann. Dependent Classes. In Proceedings of the
International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 133–152. ACM Press, 2007.
28. J. Gosling, B. Joy, G. Steele, and G. Bracha. The Java Language Specification. The Java
Series. Addison-Wesley, 3rd edition, 2005.
29. R. Hirschfeld, P. Costanza, and O. Nierstrasz. Context-Oriented Programming. Journal of
Object Technology (JOT), 7(3):125–151, 2008.
30. D. Hutchins. Eliminating Distinctions of Class: Using Prototypes to Model Virtual Classes.
In Proceedings of the International Conference on Object-Oriented Programming, Systems,
Languages, and Applications (OOPSLA), pages 1–19. ACM Press, 2006.
31. D. Hutchins. Pure Subtype Systems: A Type Theory For Extensible Software. PhD thesis,
School of Informatics, University of Edinburgh, 2008.
32. A. Igarashi, B. Pierce, and P. Wadler. Featherweight Java: A Minimal Core Calculus for Java
and GJ. ACM Transactions on Programming Languages and Systems (TOPLAS), 23(3):396–
450, 2001.
33. A. Igarashi, C. Saito, and M. Viroli. Lightweight Family Polymorphism. In Proceedings of
the Asian Symposium on Programming Languages and Systems (APLAS), volume 3780 of
LNCS, pages 161–177. Springer-Verlag, 2005.
34. T. Kamina and T. Tamai. McJava – A Design and Implementation of Java with Mixin-Types.
In Proceedings of the Asian Symposium on Programming Languages and Systems (APLAS),
volume 3302 of LNCS, pages 398–414. Springer-Verlag, 2004.
35. K. Kang, S. Cohen, J. Hess, W. Novak, and A. Peterson. Feature-Oriented Domain Analysis
(FODA) Feasibility Study. Technical Report CMU/SEI-90-TR-21, Software Engineering
Institute, Carnegie Mellon University, 1990.
36. C. Kästner and S. Apel. Type-Checking Software Product Lines – A Formal Approach.
In Proceedings of the International Conference on Automated Software Engineering (ASE),
pages 258–267. IEEE CS Press, 2008.
37. C. Kästner, S. Apel, and D. Batory. A Case Study Implementing Features using AspectJ. In
Proceedings of the International Software Product Line Conference (SPLC), pages 222–232.
IEEE CS Press, 2007.
38. C. Kästner, S. Apel, and M. Kuhlemann. Granularity in Software Product Lines. In Proceedings of the International Conference on Software Engineering (ICSE), pages 311–320. ACM
Press, 2008.
39. C. Kästner, S. Apel, S. Trujillo, M. Kuhlemann, and D. Batory. Guaranteeing Syntactic Correctness for all Product Line Variants: A Language-Independent Approach. In Proceedings of
the International Conference on Objects, Models, Components, Patterns (TOOLS EUROPE),
volume 33 of LNBI, pages 174–194. Springer-Verlag, 2009.
40. G. Lagorio, M. Servetto, and E. Zucca. Featherweight Jigsaw – A Minimal Core Calculus
for Modular Composition of Classes. In Proceedings of the European Conference on ObjectOriented Programming (ECOOP), LNCS. Springer-Verlag, 2009.
41. L. Liquori and A. Spiwack. FeatherTrait: A Modest Extension of Featherweight Java. ACM
Transactions on Programming Languages and Systems (TOPLAS), 30(2):1–32, 2008.
40
42. R. Lopez-Herrejon and D. Batory. A Standard Problem for Evaluating Product-Line Methodologies. In Proceedings of the International Conference on Generative and ComponentBased Software Engineering (GCSE), volume 2186 of LNCS, pages 10–24. Springer-Verlag,
2001.
43. R. Lopez-Herrejon, D. Batory, and W. Cook. Evaluating Support for Features in Advanced Modularization Technologies. In Proceedings of the European Conference on ObjectOriented Programming (ECOOP), volume 3586 of LNCS, pages 169–194. Springer-Verlag,
2005.
44. R. Lopez-Herrejon, D. Batory, and C. Lengauer. A Disciplined Approach to Aspect Composition. In Proceedings of the International Symposium Partial Evaluation and SemanticsBased Program Manipulation (PEPM), pages 68–77. ACM Press, 2006.
45. O. Madsen and B. Moller-Pedersen. Virtual Classes: A Powerful Mechanism in ObjectOriented Programming. In Proceedings of the International Conference on Object-Oriented
Programming, Systems, Languages, and Applications (OOPSLA), pages 397–406. ACM
Press, 1989.
46. H. Masuhara and G. Kiczales. Modeling Crosscutting in Aspect-Oriented Mechanisms. In
Proceedings of the European Conference on Object-Oriented Programming (ECOOP), volume 2743 of LNCS, pages 2–28. Springer-Verlag, 2003.
47. M. Mendonca, A. Wasowski, and K. Czarnecki. SAT-based Analysis of Feature Models
is Easy. In Proceedings of the International Software Product Line Conference (SPLC).
Software Engineering Institute, Carnegie Mellon University, 2009.
48. M. Mezini and K. Ostermann. Variability Management with Feature-Oriented Programming
and Aspects. In Proceedings of the International Symposium on Foundations of Software
Engineering (FSE), pages 127–136. ACM Press, 2004.
49. G. Murphy, A. Lai, R. Walker, and M. Robillard. Separating Features in Source Code: An
Exploratory Study. In Proceedings of the International Conference on Software Engineering
(ICSE), pages 275–284. IEEE CS Press, 2001.
50. N. Nystrom, S. Chong, and A. Myers. Scalable Extensibility via Nested Inheritance. In Proceedings of the International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 99–115. ACM Press, 2004.
51. M. Odersky, V. Cremet, C. Röckl, and M. Zenger. A Nominal Theory of Objects with Dependent Types. In Proceedings of the European Conference on Object-Oriented Programming
(ECOOP), volume 2743 of LNCS, pages 201–224. Springer-Verlag, 2003.
52. M. Odersky and M. Zenger. Scalable Component Abstractions. In Proceedings of the International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 41–57. ACM Press, 2005.
53. K. Ostermann. Dynamically Composable Collaborations with Delegation Layers. In Proceedings of the European Conference on Object-Oriented Programming (ECOOP), volume
2374 of LNCS, pages 89–110. Springer-Verlag, 2002.
54. B. Pierce. Types and Programming Languages. MIT Press, 2002.
55. C. Prehofer. Feature-Oriented Programming: A Fresh Look at Objects. In Proceedings of the
European Conference on Object-Oriented Programming (ECOOP), volume 1241 of LNCS,
pages 419–443. Springer-Verlag, 1997.
56. T. Reenskaug, E. Andersen, A. Berre, A. Hurlen, A. Landmark, O. Lehne, E. Nordhagen,
E. Ness-Ulseth, G. Oftedal, A. Skaar, and P. Stenslet. OORASS: Seamless Support for the
Creation and Maintenance of Object-Oriented Systems. Journal of Object-Oriented Programming (JOOP), 5(6):27–41, 1992.
57. M. Rosenmüller, C. Kästner, N. Siegmund, S. Sunkle, S. Apel, T. Leich, and G. Saake. SQL
á la Carte – Toward Tailor-made Data Management. In Datenbanksysteme in Business, Technologie und Web – Fachtagung des GI-Fachbereichs Datenbanken und Informationssysteme,
volume P-144 of GI-Edition – LNI, pages 117–136. Gesellschaft für Informatik, 2009.
41
58. M. Rosenmüller, N. Siegmund, G. Saake, and S. Apel. Code Generation to Support Static
and Dynamic Composition of Software Product Lines. In Proceedings of the International
Conference on Generative Programming and Component Engineering (GPCE), pages 3–12.
ACM Press, 2008.
59. M. Rosenmüller, N. Siegmund, H. Schirmeier, J. Sincero, S. Apel, T. Leich, O. Spinczyk,
and G. Saake. FAME-DBMS: Talor-made Data Management Solutions for Embedded Systems. In Proceedings of the EDBT Workshop on Software Engineering for Tailor-made Data
Management (SETMDM), pages 1–6. ACM Press, 2008.
60. N. Siegmund, C. Kästner, M. Rosenmüller, F. Heidenreich, S. Apel, and G. Saake. Bridging
the Gap between Variability in Client Application and Database Schema. In Datenbanksysteme in Business, Technologie und Web – Fachtagung des GI-Fachbereichs Datenbanken
und Informationssysteme, volume P-144 of GI-Edition – LNI, pages 297–306. Gesellschaft
für Informatik, 2009.
61. Y. Smaragdakis and D. Batory. Mixin Layers: An Object-Oriented Implementation Technique for Refinements and Collaboration-Based Designs. ACM Transactions on Software
Engineering and Methodology (TOSEM), 11(2):215–255, 2002.
62. R. Strniša, P. Sewell, and M. Parkinson. The Java Module System: Core Design and Semantic Definition. In Proceedings of the International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 499–514. ACM Press,
2007.
63. P. Tarr, H. Ossher, W. Harrison, and S. Sutton, Jr. N Degrees of Separation: MultiDimensional Separation of Concerns. In Proceedings of the International Conference on
Software Engineering (ICSE), pages 107–119. IEEE CS Press, 1999.
64. S. Thaker, D. Batory, D. Kitchin, and W. Cook. Safe Composition of Product Lines. In
Proceedings of the International Conference on Generative Programming and Component
Engineering (GPCE), pages 95–104. ACM Press, 2007.
65. M. VanHilst and D. Notkin. Using Role Components in Implement Collaboration-based
Designs. In Proceedings of the International Conference on Object-Oriented Programming,
Systems, Languages, and Applications (OOPSLA), pages 359–369. ACM Press, 1996.
66. A. K. Wright and M. Felleisen. A Syntactic Approach to Type Soundness. Information and
Computation, 115(1):38–94, 1994.
A
Type Soundness Proof of FFJ
Before giving the main proof, we state and proof some required lemmas.
L EMMA A.1 If mtype(m, last(D)) = C → C0 , then mtype(m, last(C)) = C → C0 for
all C <: D.
Proof Straightforward induction on the derivation of C <: D. There are two cases:
First, if method m is not defined in the declaration or in any refinement of class C,
then mtype(m, last(C)) should be the same as mtype(m, last(E)) where CT (Φ.C) =
class C extends E { . . . } for some Φ. This follows from the definition of mtype that
searches E’s refinement chain from right to left if m is not declared in C’s refinement
chain. Second, if m is defined in the declaration or in any refinement of class C, then
mtype(m, last(C)) should also be the same as mtype(m, last(E)) with CT (Φ.C) =
class C extends E { . . . } for some Φ. This case is covered by the well-formedness
rules for methods that use the predicate override to ensure that m is properly overridden, i.e., the signatures of the overridden and the overriding declaration of m are equal,
and that m is not introduced twice, i.e., overloading is not allowed in FFJ.
t
u
42
L EMMA A.2 (Term substitution preserves typing) If Γ, x : B ` t : D and Γ, s : A,
where A <: B, then Γ ` [x 7→ s] t : C for some C <: D.
Proof By induction on the derivation of Γ, x : B ` t : D.
C ASE (T-VAR ) t = x
x:D∈Γ
If x 6∈ x, then the result is trivial since [x 7→ s] x = x.10 On the other hand, if x = xi
and D = Bi , then, since [x 7→ s] x = si , letting C = Ai finishes the case.
C ASE (T-F IELD ) t = t0 .fi
Γ, x : B ` t0 : D0
fields(last(D0 )) = C f
D = Ci
By the induction hypothesis, there is some C0 such that Γ ` [x 7→ s] t0 : C0 and
C0 <: D0 . It is easy to check that fields(last(C0 )) = (fields(last(D0 )), D g) for some
D g. Therefore, by T-F IELD, Γ ` ([x 7→ s] t0 ).fi : Ci . The fact that the refinements of
a class may add new fields does not cause problems. D g contains all fields that C0 ,
including all of its refinements, add to D0 .
C ASE (T-I NVK ) t = t0 .m(t) Γ, x : B ` t0 : D0
Γ, x : B ` t : D D <: E
mtype(m, last(D0 )) = E → D
By the induction hypothesis, there are some C0 and C such that:
Γ ` [x 7→ s] t0 : C0
C0 <: D0
Γ ` [x 7→ s] t : C C <: D.
By Lemma A.1, we have mtype(m, last(C0 )) = E → D. Moreover, C <: E by the
transitivity of <: . Therefore, by T-I NVK, Γ ` [x 7→ s] t0 .m([x 7→ s] t) : D. The key is
that subclasses and refinements may override methods but the well-formedness rules of
methods ensure that the method’s type is not altered, i.e., there is no overloading in FFJ.
C ASE (T-N EW ) t = new D(t) fields(last(D)) = D f
Γ, x : B ` t : C C <: D
By the induction hypothesis, Γ ` [x 7→ s] t : E for some E with E <: C. We have E <: D
by the transitivity of <: . Therefore, by rule T-N EW, Γ ` new D([x 7→ s] t) : D. Although refinements of class D may add new fields, rule T-N EW ensures that the arguments of the object creation match the overall fields of D, including all refinements, in
number and types. That is, the number of arguments (t) equals the number of fields (f)
which function fields returns.
C ASE (T-UC AST ) t = (D)t0
Γ, x : B ` t0 : C
C <: D
By the induction hypothesis, there is some E such that Γ ` [x 7→ s] t0 : E and E <: C.
We have E <: D by the transitivity of <: , which yields Γ ` (D)( [x 7→ s] t0 ) : D by
T-UC AST.
C ASE (T-DC AST ) t = (D)t0
10
Γ, x : B ` t0 : C
D <: C
D 6= C
Note that [x 7→ s] x is an abbreviation for [x1 7→ s1 , . . . , xn 7→ sn ] x. It means that all occurrences of the variables x1 , . . . , xn in the term x are substituted with the corresponsing terms
s1 , . . . , sn .
43
By the induction hypothesis, there is some E such that Γ ` [x 7→ s] t0 : E and E <: C.
If E <: D or D <: E, then Γ ` (D)([x 7→ s] t0 ) : D by T-UC AST or T-DC AST, respectively. If both D 6<: E and E 6<: D, then Γ ` (D)([x 7→ s] t0 ) : D (with a stupid warning)
by T-SC AST.
C ASE (T-SC AST ) t = (D)t0
Γ, x : B ` t0 : C
D 6<: C
C 6<: D
By the induction hypothesis, there is some E such that Γ ` [x 7→ s] t0 : E and E <: C.
This means that E 6<: D because, in FFJ, each class has just one superclass and, if both
E <: C and E <: D, then either C <: D or D <: C, which contradicts the induction hypothesis. So Γ ` (D)( [x 7→ s] t0 ) : D (with a stupid warning), by T-SC AST.
t
u
L EMMA A.3 (Weakening) If Γ ` t : C, then Γ, x : D ` t : C
Proof Straightforward induction. The proof for FFJ is similar to the proof for FJ.
t
u
L EMMA A.4 If mtype(m, last(C0 )) = D → D, and mbody(m, last(C0 )) = (x, t), then
for some D0 and some C <: D we have C0 <: D0 and x : D, this : D0 ` t : C .
Proof By induction on the derivation of mbody(m, last(C0 )). The base case (in which
m is defined in the most specific refinement of C0 ) is easy since m is defined in
CT (last(C0 )) and the well-formedness of the class table implies that we must have
derived x : D, this : C0 ` t : C by the well-formedness rules of methods. The induction
step is also straightforward: if m is not defined in CT (last(C0 )), then mbody searches
the refinement chain from right to left; if m has not been found, the superclass’ refinement chain is searched. There are two subcases: first, m is defined in the declaration or
in any refinement of C0 ; this case is similar to the base case. Second, m is defined in a
superclass D0 of C0 or in one of D0 ’s refinements; in this case, the well-formedness of
the class table implies that we must have derived x : D, this : D0 ` t : C by the wellformedness rules of methods, which finishes the case.
t
u
Note that this lemma holds because method refinements do not change the types of
the arguments and the result of a method, overloading is not allowed, and this points
always to the class that is introduced or refined.
T HEOREM A.1 (Preservation) If Γ ` t : C and t −→ t0 , then Γ ` t0 : C0 for some
C0 <: C.
Proof By induction on a derivation of t −→ t0 , with a case analysis on the final rule.
C ASE (E-P ROJ N EW ) t = new C0 (v).fi
t0 = vi
fields(last(C0 )) = D f
From the shape of t, we see that the final rule in the derivation of Γ ` t : C must be
T-F IELD, with premise Γ ` new C0 (v) : D0 , for some D0 , and that C = Di . Similarly,
the last rule in the derivation of Γ ` new C0 (v) : D0 must be T-N EW, with premises
Γ ` v : C and C <: D, and with D0 = C0 . In particular, Γ ` vi : Ci , which finishes the
case, since Ci <: Di .
C ASE (E-I NVK N EW ) t = (new C0 (v)).m(u)
mbody(m, last(C0 )) = (x, t0 )
44
t0 = [x 7→ u, this 7→ new C0 (v)] t0
The final rules in the derivation of Γ ` t : C must be T-I NVK and T-N EW, with premises
Γ ` new C0 (v) : C0 , Γ ` u : C, C <: D, and mtype(m, last(C0 )) = D → C. By
Lemma A.4, we have x : D, this : D0 ` t : B for some D0 and B, with C0 <: D0 and
B <: C. By Lemma A.3, Γ, x : D, this : D0 ` t0 : B. Then, by Lemma A.2, we have
Γ [x 7→ u, this 7→ new C0 (v)] t0 : E for some E <: B. By the transitivity of <: , we obtain E <: C. Letting C0 = E completes the case.
C ASE (E-C AST N EW ) t = (D)(new C0 (v))
C0 <: D
t0 = new C0 (v)
The proof of Γ ` (D)(new C0 (v)) : C must end with T-UC AST since ending with TSC AST or T-DC AST would contradict the assumption of C0 <: D. The premises of
T-UC AST give us Γ ` new C0 (v) : C0 and D = C, finishing the case.
The cases for the congruence rules are easy. We show just the case E-C AST.
C ASE (E-C AST ) t = (D)t0
t0 = (D)t00
t0 −→ t00
There are three subcases according to the last typing rule used.
S UBCASE (T-UC AST ) Γ ` t0 : C0
C0 <: D
t00
D=C
By the induction hypothesis, Γ `
:
for some C00 <: C0 . By transitivity of <: ,
0
0
C0 <: C. Therefore, by T-UC AST, Γ ` (C)t0 : C (with no additional stupid warning).
S UBCASE (T-DC AST ) Γ ` t0 : C0
t00
C00
D <: C0
D=C
By the induction hypothesis, Γ ` :
for some C00 <: C0 . If C00 <: C or C <: C00 ,
0
then Γ ` (C)t0 : C by T-UC AST or T-DC AST (without any additional stupid warning).
On the other hand, if both C00 6<: C or C 6<: C00 , then Γ ` (C)t00 : C with a stupid warning
by T-SC AST.
S UBCASE (T-SC AST ) Γ ` t0 : C0
t00
C00
D 6<: C0
C00
C0 6<: D
D=C
C00
By the induction hypothesis, Γ ` :
for some
<: C0 . Then, also C00 6<: C and
0
0
C 6<: C0 . Therefore Γ ` (C)t0 : C with a stupid warning. If C00 6<: C, then C 6<: C00
since C 6<: C0 and, therefore, Γ ` (C)t00 : C with stupid war ning. If C00 <: C, then Γ `
(C)t00 : C by T-UC AST (with no additional stupid warning). This subcase is analogous
to the case T-SC AST of the proof of Lemma A.2.
t
u
T HEOREM A.2 (Progress) Suppose t is a well-typed term.
1. If t includes new C0 (t).fi as a subterm, then fields(last(C0 )) = C f for some C and
f.
2. If t includes new C0 (t).m(u) as a subterm, then mbody(m, last(C0 )) = (x, t0 ) and
|x| = |u| for some x and t0 .
Proof If t has new C0 (t).fi as a subterm, then, by well-typedness of the subterm, it is
easy to check that fields(last(C0 )) is well-defined and fi appears in it. The fact that
refinements may add fields (that have not been defined already) does not invalidate this
conclusion. Note that for every field of a class, including its superclasses and all its
refinements, there must be a proper argument. Similarly, if t has new C0 (t).m(u) as a
subterm, then it is also easy to show that mbody(m, last(C0 )) = (x, t0 ) and |x| = |u|
from the fact that mtype(m, last(C0 )) = C → D where |x| = |C|. This conclusion
holds for FFJ since a method refinement must have the same signature than the method
refined and overloading is not allowed.
t
u
45
T HEOREM A.3 (Type soundness of FFJ) If ∅ ` t : C and t −→∗ t0 with t0 a normal
form, then t0 is either a value v with ∅ ` v : D and D <: C, or a term containing
(D)(new C(t)) in which C <: D.
Proof Immediate from Theorem A.1 and A.2. Nothing changes in the proof of Theorem A.3 for FFJ compared to FJ.
t
u
B
Type Soundness Proof of FFJPL
In this section, we provide proof sketches of the theorems Correctness of FFJPL and
Completeness of FFJPL . A further formalization would be desirable, but we have stopped
at this point. As is often the case with formal systems, there is a trade-off between formal precision and legibility. We decided that a semi-formal development of the proof
strategies are the best fit for our purposes.
B.1
Correctness
T HEOREM B.1 (Correctness of FFJPL ) Given a well-typed FFJPL product line pl (including with a well-typed term t, well-formed class, introduction, and refinement tables
CT , IT , and RT , and a feature model FM ), every program that can be derived with a
valid feature selection fs is a well-typed FFJ program (cf. Figure 10).
pl = (t, CT , IT , RT , FM )
pl is well-typed
derive(pl , fs) is well-typed
fs is valid in FM
The proof strategy is as follows: assuming that the FFJPL type system ensures that
each slice is a valid FFJ type derivation (Lemma B.1) and that each valid feature selection corresponds to a single slice (Lemma B.1), it follows that the corresponding
feature-oriented program is well-formed. Before we prove Theorem B.1 we develop
two required lemmas that cover the two assumptions of our proof strategy.
L EMMA B.1 Given a well-formed FFJPL product line, every slice of the product line’s
type derivation corresponds to a (set of) valid type derivation(s) in FFJ.
Proof (Proof sketch) Given a well-formed FFJPL product line, the corresponding type
derivation consists of possibly multiple slices.
The basic case is easy: there is only a simple derivation without branches due to
mutually exclusive features (optional features may be present). In this case, each term
has only a single type, which is the one that would also be determined by FFJ. Furthermore, FFJPL guarantees that referenced types, methods, and fields are present in all
valid variants, using the predicate validref .
Let us illustrate this with the rule T-F IELDPL ; the other rules are analogous:
∀ E ∈ E : validref (Φ, E.f)
Γ ` t0 : E a Φ
fields(Φ, last(E)) = F, C f, G
Γ ` t0 .f : C11 , . . . , Cn1 , . . . , C1m , . . . , Cnm a Φ
46
(T-F IELDPL )
In the basic case there are no branches in the type derivation and thus the term
t0 has only a single type E1 . For the same reason, fields returns only a simple list of
fields that contains the declaration of field f. Finally, T-F IELDPL checks whether the
declaration of f is present in all valid variants (using validref ). Hence, in the basic
case, an FFJPL derivation that ends at the rule T-F IELDPL is equivalent to a set of
corresponding FFJ derivations, which do not contain alternative and optional features
and thus t0 has a single type, fields returns a simple list of fields that contains the
declaration of f, and the declaration of f is present. The reason that an FFJPL derivation
without mutually exclusive features (i.e., a single slice) corresponds to multiple FFJ
derivations is that the FFJPL derivation may contain optional features whose different
combinations correspond to the different FFJ derivations. Using predicate validref , all
type rules of FFJPL ensure that all possible combinations of optional features are welltyped.
In the case that there are multiple slices in the FFJPL derivation, a term t0 may have
multiple types E. The type rules of FFJPL make sure that every possible shape of a given
term is well-typed. Each possible type of the term leads to a branch in the derivation
tree. The premise of T-F IELDPL checks whether all possible shapes of a given term
are well-typed by taking the conjunction of all branches of the derivation. Hence, if
T-F IELDPL is successful, each individual branch holds, i.e., each slice corresponds to a
well-typed FFJ program. Ensuring that, in the presence of optional features, all relevant
subterms are well-typed (i.e., all referenced elements are present in all valid variants), a
well-typed slice covers a set of well-typed FFJ derivations that correspond to different
combinations of optional features, like in the basic case.
For example, in a field projection t0 .f, the subterm t0 has multiple types E. For all
these types, fields yields all possible combinations of fields declared by the variants
of the types. It is checked whether, for each type of the subterm t0 , each combination
of fields contains a proper declaration of field f. The different types of f become the
possible types of the overall field projection term. Like in the basic case, it is checked
whether every possible type of t0 is present in all valid variants (using validref ), so that
each slice corresponds a valid FFJ derivation, i.e., a whole set of derivations covering
different combinations of optional features.
t
u
L EMMA B.2 Given a well-formed FFJPL product line, each valid feature selection corresponds to a single slice in the corresponding type derivation.
Proof (Proof sketch) By definition, a valid feature selection does not contain mutually
exclusive features. Considering only a single valid feature selection, each term has only
a single type. But the type derivation of the overall product line contains branches corresponding to alternative types of the terms. A successive removal of mutually exclusive
features removes these branches until only a single branch remains. Consequently, a
valid feature selection corresponds to a single slice.
t
u
Proof (Proof sketch of Theorem B.1 (Correctness of FFJPL )) The fact that the FFJPL
type system ensures that each slice is a valid FFJ type derivation (Lemma B.1) and that
each valid feature selection corresponds to a single slice (Lemma B.2), implies that each
feature-oriented program that corresponds to a valid feature selection is well-formed.
t
u
47
B.2
Completeness
T HEOREM B.2 (Completeness of FFJPL ) Given an FFJPL product line pl (including
a well-typed term t, well-formed class, introduction, and refinement tables CT , IT ,
and RT , and a feature model FM ), and given that all valid feature selections fs yield
well-typed FFJ programs, according to Theorem B.1, pl is a well-typed product line
according to the rules of FFJPL .
pl = (t, CT , IT , RT , FM ) ∀ fs : (fs is valid in FM ⇒ derive(pl , fs) is well-typed)
pl is well-typed
Proof (Proof sketch of Theorem B.2 (Completeness of FFJPL )) There are three basic
cases: (1) pl has only mandatory features; (2) pl has only mandatory features except a
single optional feature; (3) pl has only mandatory features except two mutually exclusive features. Proving Theorem B.2 for the first basic case is trivial. Since only mandatory features exist, only a single FFJ program can be derived from the product line. If
the FFJ program is well-typed, the product line is well-typed, too, because all elements
are always reachable and each term has only a single type. In fact, the type rules of
FFJPL and FFJ become equivalent in this case.
In the second basic case, two FFJ programs can be derived from the product line,
one including and one excluding the optional feature. The difference between the two
programs is the content of the optional feature. The feature can add new classes, refine
existing classes by new methods and fields, and refine existing methods by overriding.
If the two programs are well-typed, then the overall product line is well-typed as well
since the reachability checks succeed in every type rule of FFJPL . Otherwise, at least
one of the two programs would not be well-typed since, in this case, the reachability
checks are the only difference between FFJPL ’s and FFJ’s type rules (as in the first case,
each term has only a single type since there are no mutually exclusive features). The
fact that the two FJ programs are well-typed implies that all elements are reachable in
the type derivations of two FFJ programs. Thus, the reachability checks of the FFJPL
derivation succeed in every case, i.e., the product line in question is well-typed.
In the third basic case, two FFJ programs can be derived from the product line,
one including the first alternative and the other including the second alternative of the
feature in question. The difference between the two programs is, on the one hand, the
program elements one feature introduces that are not present in the other and, on the
other hand, the alternative definitions of similar elements, like two alternative definitions of a single class. The first kind of difference is already covered by the second
basic case. Alternative definitions of a program element (second kind of difference)
that are well-typed in the context of their enclosing FFJ programs, are well-typed in
FFJPL because they lead to two new branches in the derivation tree which are handled
separately and the conjunction of their premises must hold. Since the corresponding
FFJ type rule for the element succeeds in both FFJ programs, their conjunction in the
FFJPL type rule always holds, i.e., the product line in question is well-typed.
Finally, we it remains to show that all other cases, i.e., all other combinations of
mandatory, optional, and alternative features, can be reduced to combinations of the
three basic cases, which proves Theorem B.2. To this end, we divide the possible relations between features into three disjoint sets: (1) a feature is reachable from another
48
feature in all variants, (2) a feature is reachable from another feature in some, but not
in all, variants, (3) two features are mutually exclusive. From these three possible relations we construct a general case that can be reduced to a combination of the three basic
cases.
Assume a feature Φ that is mandatory with respect to a set of features Π, that is
optional with respect to a set of features Ω, and that is alternative to a set ∆ of features.
We use arrows to illustrate to which of the three basic cases a pairwise relation between
Φ and each element of a list is reduced:
/Ω
ΦA
AA
AA3
1
AA
A
Π
∆
2
Such an arrow diagram can be created for every feature of a product line. The reason is
that the three kinds of relations are orthogonal and there are no further relations relevant
for type checking. Hence, the general case covers all possible relations between features
and combinations of features. The description of the general case and the reduction
finish the proof of Theorem B.2, i.e., FFJPL ’s type system is complete.
t
u
49
| 6cs.PL
|
arXiv:1708.05845v1 [math.AT] 19 Aug 2017
SPANNING SIMPLICIAL COMPLEXES OF UNI-CYCLIC
MULTIGRAPHS
IMRAN AHMED, SHAHID MUHMOOD
Abstract. A multigraph is a nonsimple graph which is permitted to have
multiple edges, that is, edges that have the same end nodes. We introduce
the concept of spanning simplicial complexes ∆s (G) of multigraphs G, which
provides a generalization of spanning simplicial complexes of associated
simple graphs. We give first the characterization of all spanning trees of a
r
uni-cyclic multigraph Un,m
with n edges including r multiple edges within
and outside the cycle of length m. Then, we determine the facet ideal
r
r
IF (∆s (Un,m
)) of spanning simplicial complex ∆s (Un,m
) and its primary
decomposition. The Euler characteristic is a well-known topological and
homotopic invariant to classify surfaces. Finally, we device a formula for
r
Euler characteristic of spanning simplicial complex ∆s (Un,m
).
Key words: multigraph, spanning simplicial complex, Euler characteristic.
2010 Mathematics Subject Classification: Primary 05E25, 55U10, 13P10,
Secondary 06A11, 13H10.
1. Introduction
Let G = G(V, E) be a multigraph on the vertex set V and edge-set E. A
spanning tree of a multigraph G is a subtree of G that contains every vertex
of G. We represent the collection of all edge-sets of the spanning trees of a
multigraph G by s(G). The facets of spanning simplicial complex ∆s (G) is
exactly the edge set s(G) of all possible spanning trees of a multigraph G.
Therefore, the spanning simplicial complex ∆s (G) of a multigraph G is defined
by
∆s (G) = hFk | Fk ∈ s(G)i,
which gives a generalization of the spanning simplicial complex ∆s (G) of an
associated simple graph G. The spanning simplicial complex of a simple connected finite graph was firstly introduced by Anwar, Raza and Kashif in [1].
Many authors discussed algebraic and combinatorial properties of spanning
simplicial complexes of various classes of simple connected finite graphs, see
for instance [1], [5], [6] and [9].
Let ∆ be simplicial complex of dimension d. We denote fi by the number
of i-cells of simplicial complex ∆. Then, the Euler characteristic of ∆ is given
1
2
Ahmed and Muhmood
by
χ(∆) =
d−1
X
(−1)i fi ,
i=0
which is a well-known topological and homotopic invariant to classify surfaces,
see [4] and [7].
r
The uni-cyclic multigraph Un,m
is a connected graph having n edges including r multiple edges within and outside the cycle of length m. Our aim is
to give some algebraic and topological characterizations of spanning simplicial
r
complex ∆s (Un,m
).
In Lemma 3.1, we give characterization of all spanning trees of a uni-cyclic
r
multigraph Un,m
having n edges including r multiple edges and a cycle of
r
length m. In Proposition 3.2, we determine the facet ideal IF (∆s (Un,m
)) of
r
spanning simplicial complex ∆s (Un,m ) and its primary decomposition. In Theorem 3.3, we give a formula for Euler characteristic of spanning simplicial
r
complex ∆s (Un,m
).
2. Basic Setup
A simplicial complex ∆ on [n] = {1, . . . , n} is a collection of subsets of [n]
satisfying the following properties.
(1) {j} ∈ ∆ for all j ∈ [n];
(2) If F ∈ ∆ then every subset of F will belong to ∆ (including empty set).
The elements of ∆ are called faces of ∆ and the dimension of any face F ∈ ∆
is defined as |F |−1 and is written as dim F , where |F | is the number of vertices
of F . The vertices and edges are 0 and 1 dimensional faces of ∆ (respectively),
whereas, dim ∅ = −1. The maximal faces of ∆ under inclusion are said to be
the facets of ∆. The dimension of ∆ is denoted by dim ∆ and is defined by
dim ∆ = max{dim F | F ∈ ∆}.
If {F1 , . . . , Fq } is the set of all the facets of ∆, then ∆ =< F1 , . . . , Fq >.
A simplicial complex ∆ is said to be pure, if all its facets are of the same
dimension.
A subset M of [n] is said to be a vertex cover for ∆ if M has non-empty
intersection with every Fk . M is said to be a minimal vertex cover for ∆ if no
proper subset of M is a vertex cover for ∆.
Definition 2.1. Let G = G(V, E) be a multigraph on the vertex set V and
edge-set E. A spanning tree of a multigraph G is a subtree of G that contains
every vertex of G.
Definition 2.2. Let G = G(V, E) be a multigraph on the vertex set V and edgeset E. Let s(G) be the edge-set of all possible spanning trees of G. We define
a simplicial complex ∆s (G) on E such that the facets of ∆s (G) are exactly the
elements of s(G), we call ∆s (G) as the spanning simplicial complex of G and
given by
∆s (G) = hFk | Fk ∈ s(G)i.
Spanning Simplicial Complexes of Uni-Cyclic Multigraphs
3
r
Definition 2.3. A uni-cyclic multigraph Un,m
is a connected graph having n
edges including r multiple edges within and outside the cycle of length m.
Let ∆ be simplicial complex of dimension d. Then, the chain complex C∗ (∆)
is given by
∂
∂d−1
∂
∂
∂
d
2
1
→0 0.
→ Cd−1 (∆)−
−−
→ ...−
→ C1 (∆)−
→ C0 (∆)−
0 → Cd (∆)−
Each Ci (∆) is a free abelian group of rank fi . The boundary homomorphism
∂d : Cd (∆) → Cd−1 (∆) is defined by
P
.
∂d (σαd ) = di=0 (−1)i σαd |[v0 ,v1 ,...,vi,...,v
ˆ
d]
Of course,
Hi (∆) = Zi (∆)/Bi (∆) = Ker∂i /Im∂i+1 ,
where Zi (∆) = Ker ∂i and Bi (∆) = Im ∂i+1 are the groups of simplicial icycles and simplicial i-boundaries, respectively. Therefore,
rank Hi (∆) = rank Zi (∆) − rank Bi (∆).
One can easily see that rank Bd (∆) = 0 due to Bd (∆) = 0. For each i > 0
there is an exact sequence
∂
i
→ Bi−1 (∆) → 0.
0 → Zi (∆) → Ci (∆)−
Moreover,
fi = rank Ci (∆) = rank Zi (∆) + rank Bi−1 (∆).
Therefore,
characteristic
of ∆ can be expressed as
Pd
Pdthe Euler
i
i
χ(∆) = i=0 (−1) fi = i=0 (−1) (rank Zi (∆) + rank Bi−1 (∆))
P
P
= di=0 (−1)i rank Zi (∆) + di=0 (−1)i rank Bi−1 (∆).
Changing index of summation in the last sum and using the fact that
rank B−1 (∆) = 0 = rank Bd (∆), we get
P
P
χ(∆) = di=0 (−1)i rank Zi (∆) + di=0 (−1)i+1 rank Bi (∆)
P
P
= di=0 (−1)i (rank Zi (∆) − rank Bi (∆)) = di=0 (−1)i rank Hi (∆).
Thus, the Euler characteristic of ∆ is given by
χ(∆) =
d
X
(−1)i βi (∆),
i=0
where βi (∆) = rank Hi (∆) is the i-th Betti number of ∆, see [4] and [7].
r
3. Topological Characterizations of ∆s (Un,m
)
r
Let Un,m
be a uni-cyclic multigraph having n edges including r multiple
edges within and outside the cycle of length m. We fix the labeling of the edge
r
set E of Un,m
as follows:
E = {e11 , . . . , e1t1 , . . . , er′ 1 , . . . , er′ tr′ , e(r′ +1)1 , . . . , em1 , e(m+1)1 , . . . , e(m+1)tm+1 ,
. . . , e(m+r′′ )1 , . . . , e(m+r′′ )tm+r′′ , e1 , . . . , ev }, where ei1 , . . . , eiti are the multiple
edges of i-th edge of cycle with 1 ≤ i ≤ r ′ while e(r′ +1)1 , . . . , em1 are the
single edges of the cycle and ej1 , . . . , ejtj are the multiple edges of the j-th
edge outside the cycle with m + 1 ≤ j ≤ m + r ′′ , moreover, e1 , . . . , ev are single
edges appeared outside the cycle.
4
Ahmed and Muhmood
r
We give first the characterization of s(Un,m
).
r
Lemma 3.1. Let Un,m
be the uni-cyclic multigraph having n edges including
r multiple edges and a cycle of length m with the edge set E, given above. A
r
) if and only if Twiw = {e1i1 , . . . , er′ ir′ ,
subset E(Twiw ) ⊂ E will belong to s(Un,m
e(r′ +1)1 , . . . , em1 , e(m+1)i(m+1) , . . . , e(m+r′′ )i(m+r′′ ) , e1 , . . . , ev }\{ewiw } for some ih ∈
{1, . . . , th } with 1 ≤ h ≤ r ′ , m + 1 ≤ h ≤ m + r ′′ and iw ∈ {1, . . . , tw } with
1 ≤ w ≤ r ′ or iw = 1 with r ′ + 1 ≤ w ≤ m for some w = h and iw = ih
appeared in Twiw .
r
Proof. By cutting down method [3], the spanning trees of Un,m
can be obtained
by removing exactly th − 1 edges from each multiple edge such that 1 ≤ h ≤ r ′ ,
m + 1 ≤ h ≤ m + r ′′ and in addition, an edge from the resulting cycle need
to be removed. Therefore, the spanning trees will be of the form Twiw =
{e1i1 , . . . , er′ ir′ , e(r′ +1)1 , . . . , em1 , e(m+1)i(m+1) , . . . , e(m+r′′ )i(m+r′′ ) , e1 , . . . , ev }\{ewiw }
for some ih ∈ {1, . . . , th } with 1 ≤ h ≤ r ′ , m + 1 ≤ h ≤ m + r ′′ and
iw ∈ {1, . . . , tw } with 1 ≤ w ≤ r ′ or iw = 1 with r ′ + 1 ≤ w ≤ m for
some w = h and iw = ih appeared in Twiw .
In the following result, we give the primary decomposition of facet ideal
r
IF (∆s (Un,m
).
r
Proposition 3.2. Let ∆s (Un,m
) be the spanning simplicial complex of unir
cyclic multigraph Un,m having n edges including r multiple edges within and
outside the cycle of length m. Then,
r
IF (∆s (Un,m
)=
\
\
\
\
\
(xk1 , xl1 )
(xi1 , . . . , xiti , xk1 )
(xa )
1≤a≤v
\
r ′ +1≤k<l≤m
1≤i≤r ′ ; r ′ +1≤k≤m
\
1≤i<b≤r ′
(xi1 , . . . , xiti , xb1 , . . . , xbtb )
\
\
m+1≤j≤m+r ′′
(xj1 , . . . , xjtj ) ,
where ti with 1 ≤ i ≤ r ′ is the number of multiple edges appeared in the i-th
edge of the cycle and tj with m + 1 ≤ j ≤ m + r ′′ is the number of multiple
edges appeared in the jth-edge outside the cycle.
r
Proof. Let IF (∆s (Un,m
) be the facet ideal of the spanning simplicial complex
r
∆s (Un,m ). From ([8], Proposition 1.8), minimal prime ideals of the facet ideal
IF (∆) have one-to-one correspondence with the minimal vertex covers of the
simplicial complex ∆. Therefore, in order to find the primary decomposition
r
)); it is sufficient to find all the minimal vertex
of the facet ideal IF (∆s (Un,m
r
covers of ∆s (Un,m ).
r
As ea , a ∈ [v] is not an edge of the cycle of uni-cyclic multigraph Un,m
r
and does not belong to any multiple edge of Un,m
. Therefore, it is clear by
definition of minimal vertex cover that {ea }, 1 ≤ a ≤ v is a minimal vertex
r
cover of ∆s (Un,m
). Moreover, a spanning tree is obtained by removing exactly
th − 1 edges from each multiple edge with h = 1, . . . , r ′ , m + 1, . . . , m + r ′′ and
Spanning Simplicial Complexes of Uni-Cyclic Multigraphs
5
r
in addition, an edge from the resulting cycle of Un,m
. We illustrate the result
into the following cases.
r
Case 1. If atleast one multiple edge is appeared in the cycle of Un,m
. Then, we
cannot remove one complete multiple edge and one single edge from the cycle
r
of Un,m
to get spanning tree. Therefore, (xi1 , . . . , xiti , xk1 ) with 1 ≤ i ≤ r ′ ,
′
r + 1 ≤ k ≤ m is a minimal vertex cover of the spanning simplicial complex
r
r
∆s (Un,m
) having non-empty intersection with all the spanning trees of Un,m
.
r
Moreover, two single edges cannot be removed from the cycle of Un,m to get
spanning tree. Consequently, (xk1 , xl1 ) for r ′ + 1 ≤ k < l ≤ m is a minimal
r
vertex cover of ∆s (Un,m
) having non-empty intersection with all the spanning
r
trees of Un,m .
r
Case 2. If atleast two multiple edges are appeared in the cycle of Un,m
. Then,
r
two complete multiple edges cannot be removed from the cycle of Un,m
to get
spanning tree. Consequently, (xi1 , . . . , xiti , xb1 , . . . , xbtb ) for 1 ≤ i < b ≤ r ′ is a
r
minimal vertex cover of ∆s (Un,m
) having non-empty intersection with all the
r
spanning trees of Un,m .
r
Case 3. If atleast one multiple edge appeared outside the cycle of Un,m
. Then,
r
one complete multiple edge outside the cycle of Un,m cannot be removed to get
spanning tree. So, (xj1 , . . . , xjtj ) for m + 1 ≤ j ≤ m + r ′′ is a minimal vertex
r
cover of ∆s (Un,m
) having non-empty intersection with all the spanning trees
r
of Un,m . This completes the proof.
r
We give now formula for Euler characteristic of ∆s (Un,m
).
r
Theorem 3.3. Let ∆s (Un,m
) be spanning simplicial complex of uni-cyclic
r
multigraph Un,m having n edges including r multiple edges and a cycle of
r′
m+r
P
P′′
r
length m. Then, dim(∆s (Un,m
)) = n −
ti −
tj + r − 2 and the Euler
i=1
j=m+1
r
characteristic of ∆s (Un,m
) is given by
r′
n−1
Q
P
′ −m
n
r
i
ti n−α+r
χ(∆s (Un,m )) =
(−1) i+1 −
i+1−m
i=1
i=0
β
ij
β
P
P
Q
P
β
tk
−
−
(−1)l−j
j
1
j=2
−
α+β
P
j=2
α+β
with α =
j
r′
P
i=1
m+1≤i1 <...<ij ≤m+r ′′ k=i1
ij ∈{r
/ ′P
+1,...,m}
ij
Q
−
1≤i1 <...<ij ≤m+r ′′ k=i1
m+r
P′′
l=j
α+β
P
tk
1
l=j
β−j
l−j
n−α+r ′ −m−l
i+1−m−l
(−1)l−j α+β−j
l−j
n−l
i+1−l
tj such that r ′ and r ′′ are the number of multiple
ti and β =
j=m+1
edges appeared within and outside the cycle, respectively.
Proof. Let E = {e11 , . . . , e1t1 , . . . , er′ 1 , . . . , er′ tr′ , e(r′ +1)1 , . . . , em1 , e(m+1)1 , . . . ,
e(m+1)tm+1 , . . . , e(m+r′′ )1 , . . . , e(m+r′′ )tm+r′′ , e1 , . . . , ev } be the edge set of uni-cyclic
r
multigraph Un,m
having n edges including r multiple edges and a cycle of length
′
m such that r and r ′′ are the number of multiple edges appeared within and
outside the cycle, respectively.
6
Ahmed and Muhmood
r
) is of the same dimension
One can easily see that each facet Twiw of ∆s (Un,m
′
′′
m+r
r′
m+r
r
P
P
P
P′′
n − ti −
tj + r − 2 = n − α − β + r − 2 with α =
ti and β =
tj ,
i=1
j=m+1
i=1
j=m+1
see Lemma 3.1.
By definition, fi is the number of subsets of E with i + 1 elements not
r′
Q
′ −m
containing cycle and multiple edges. There are
ti n−α+r
number of
i+1−m
i=1
subsets of E containing cycle but not containing any multiple edge within the
cycle. There are
X
β
n − α + r′ − m − l
β
n − α + r′ − m − β
l−β β − β
(−1)
=
i+1−m−l
l−β
β l=β
i+1−m−β
r
subsets of E containing cycle and β multiple edges of Un,m
outside the cycle
but not containing any multiple edge within the cycle. There are
n − α + r′ − m − β
n − α + r ′ − m − (β − 1)
β
−
i+1−m−β
i + 1 − m − (β − 1)
β−1
X
β
n − α + r′ − m − l
β
l−(β−1) β − (β − 1)
(−1)
=
i+1−m−l
l − (β − 1)
β−1
l=β−1
r
subsets of E containing cycle and β −1 multiple edges of Un,m
outside the cycle
but not containing any multiple edge within the cycle. Continuing in similar
manner, the number of subsets of E containing cycle and two edges from a
multiple edge outside the cycle but not containing any multiple edge within
the cycle
is given by
n−α+r′ −m−3
n−α+r′ −m−4
β−2 n−α+r ′ −m−2
− β−2
+ β−2
+···
0
i+1−m−2
1
i+1−m−3
2
i+1−m−4
β
n−α+r′ −m−l
P
β−2 n−α+r ′ −m−β
.
+ (−1)β−2 β−2
= (−1)l−2 β−2
l−2
i+1−m−l
i+1−m−β
l=2
i2
Q
P
tk
β
choices of two edges from a
There are
−
1
2
m+1≤i1 <i2 ≤m+r ′′ k=i1
multiple edge outside the cycle. Therefore, we obtain
β
i2 X
X
Y
n − α + r′ − m − l
β
tk
l−2 β − 2
−
(−1)
i+1−m−l
l−2
2
1
′′ k=i
l=2
m+1≤i1 <i2 ≤m+r
1
the number of subsets of E with i+1 elements containing cycle and all possible
choices of two edges from a multiple edge outside the cycle but not containing
multiple edges within the cycle.
Now, we use inclusion exclusion principal to obtain
(number of subsets of E containing cycle but not containing multiple edges)=
r′
Q
ti [(number of subsets of E with i + 1 elements containing cycle but not
i=1
containing multiple edges within the cycle)−(number of subsets of E with
i + 1 elements containing cycle and β multiple edges outside the cycle but
Spanning Simplicial Complexes of Uni-Cyclic Multigraphs
7
not containing multiple edges within the cycle)−(number of subsets of E with
i + 1 elements containing cycle and β − 1 multiple edges outside the cycle but
not containing multiple edges within the cycle)− · · · −(number of subsets of
E with i + 1 elements containing cycle and two edges from a multiple edge
outsidethe cycle but not containing multiple edges within the cycle)]
r′
β
Q
′ −m
β P
l−β β−β n−α+r ′ −m−l
=
ti n−α+r
−
(−1)
i+1−m
β
l−β
i+1−m−l
i=1
l=β
β
P
n−α+r′ −m−l
(−1)l−(β−1) β−(β−1)
l−(β−1)
i+1−m−l
l=β−1
β
i2
P
P
Q
β
tk
−···− 2 −
(−1)l−2
1
′′
l=2
m+1≤i1 <i2 ≤m+r k=i1
r′
Q
′
−m
=
ti n−α+r
i+1−m
i=1
β
ij
β
Q
P
P
P
tk
β
(−1)l−j
−
−
1
j
−
β
β−1
j=2
m+1≤i1 <...<ij ≤m+r ′′ k=i1
l=j
β−2
l−2
β−j
l−j
n−α+r ′ −m−l
i+1−m−l
n−α+r ′ −m−l
i+1−m−l
.
Therefore, we compute
fi = (number of subsets of E with i+1 elements)−(number of subsets of E with
i + 1 elements containing cycle but not containing multiple edges)−(number
of subsets of E with i+1 elements containing α+β multiple edges)−(number of
subsets of E with i+1 elements containing α+β−1 multiple edges)− · · · −(number
of subsets of E with i + 1 elements containing two edges from a multiple edge
r
of Un,m
)
r′
Q
′ −m
n
= i+1 −
ti n−α+r
i+1−m
β
i=1
ij
β
Q
P
P
P
tk
β
l−j β−j n−α+r ′ −m−l
(−1)
−
−
1
l−j
i+1−m−l
j
j=2
−
α+β
α+β
m+1≤i1 <...<ij ≤m+r ′′ k=i1
α+β
P
(−1)l−(α+β)
l=α+β
α+β
P
(α+β)−(α+β)
l−(α+β)
l=j
n−l
i+1−l
n−l
(−1)l−(α+β−1) (α+β)−(α+β−1)
l−(α+β−1)
i+1−l
l=α+β−1
ij ∈{r
′
/ P
+1,...,m} Q
α+β
i2
P
tk
− · · · − α+β
−
(−1)l−2
2
1
′′
l=2
1≤i1 <i2 ≤m+r k=i1
r′
Q
′
−m
n
= i+1
−
ti n−α+r
i+1−m
β
i=1
ij
β
P
Q
P
P
tk
β
(−1)l−j
−
−
1
j
−
α+β
α+β−1
j=2
−
α+β
P
j=2
α+β
j
m+1≤i1 <...<ij ≤m+r ′′ k=i1
ij ∈{r
/ ′P
+1,...,m}
ij
Q
−
1≤i1 <...<ij ≤m+r ′′ k=i1
l=j
α+β
P
tk
1
l=j
(−1)l−j
α+β−2
l−2
β−j
l−j
n−l
i+1−l
n−α+r ′ −m−l
i+1−m−l
α+β−j
l−j
n−l
i+1−l
.
8
Ahmed and Muhmood
e
13
e
12
e
e
e
21
42
11
e
e
31
41
2
Figure 1. U7,3
Example 3.4. Let E = {e11 , e12 , e13 , e21 , e31 , e41 , e42 } be the edge set of uni2
cyclic multigraph U7,3
having 7 edges including 2 multiple edges and a cycle of
length 3, as shown in Figure 1. By cutting-down method, we obtain
2
s(U7,3
) = {{e21 , e31 , e41 }, {e11 , e31 , e41 }, {e11 , e21 , e41 }, {e12 , e31 , e41 }, {e12 , e21 , e41 },
{e13 , e31 , e41 }, {e13 , e21 , e41 }, {e21 , e31 , e42 }, {e11 , e31 , e42 }, {e11 , e21 , e42 }, {e12 , e31 , e42 },
{e12 , e21 , e42 }, {e13 , e31 , e42 }, {e13 , e21 , e42 }}.
By definition, fi is the number of subsets of E with i + 1 elements not containing cycle and multiple edges. Since, {e11 }, {e12 }, {e13 }, {e21 }, {e31 }, {e41 }
and {e42 } are subsets of E containing one element. It implies that f0 = 7.
There are {e11 , e21 }, {e11 , e31 }, {e11 , e41 }, {e11 , e42 }, {e12 , e21 }, {e12 , e31 }, {e12 , e41 },
{e12 , e42 }, {e13 , e21 }, {e13 , e31 }, {e13 , e41 }, {e13 , e42 }, {e21 , e31 }, {e21 , e41 }, {e21 , e42 },
{e31 , e41 }, {e31 , e42 } subsets of E containing two elements but not containing
cycle and multiple edges. So, f1 = 17. We know that the spanning trees
2
2
of U7,3
are 2-dimensional facets of the spanning simplicial complex ∆s (U7,3
).
Therefore, f2 = 14. Thus,
2
χ(∆s (U7,3
)) = f0 − f1 + f2 = 7 − 17 + 14 = 4.
2
Now, we compute the Euler characteristic of ∆s (U7,3
) by using Theorem 3.3.
′
′′
We observe that, n = 7, r = 1, r = 1, r = 2, m = 3, α = 3, β = 2 and
2
0 ≤ i ≤ d, where d = n − α − β + r − 2 = 2 is the dimension of ∆s (U7,3
).
By substituting
3.3, we get
these values in Theorem
5
4
7
2
0
fi = i+1
− 3 i+1−3
− [ 52 − 31 21 ] 30 i+1−2
− 22 i+1−5
− 31 i+1−3
+
3
2
2 4
3
2
3
− 33 i+1−4
− 53
− 21 i+1−4
+ 22 i+1−5
−
2 i+1−4
0 i+1−3
2
1 3
2
5
5
1
−
.
−
5 i+1−5
4
0 i+1−4
1 i+1−5
2
Alternatively, we compute (f0 , f1 , f2 ) = (7, 17, 14) and χ(∆s (U7,3
)) = 4.
2
2
We compute now the Betti numbers of ∆s (U7,3 ). The facet ideal of ∆s (U7,3
)
is given by
Spanning Simplicial Complexes of Uni-Cyclic Multigraphs
9
2
IF (∆s (U7,3
)) = hxF21,31,41 , xF11,31,41 , xF11,21,41 , xF12,31,41 , xF12,21,41 , xF13,31,41 , xF13,21,41 ,
xF21,31,42 , xF11,31,42 , xF11,21,42 , xF12,31,42 , xF12,21,42 , xF13,31,42 , xF13,21,42 i.
2
We consider the chain complex of ∆s (U7,3
)
0 ∂3 C2 ∂2 C1 ∂1 C0 ∂0 0
→
−
−
→
−
→
−
→
Ker(∂i )
with i = 0, 1, 2.
The homology groups are given by Hi = Im(∂
i+1 )
2
Therefore, the i-th Betti number of ∆s (U7,3 ) is given by
βi = rank(Hi ) = rank(Ker(∂i )) − rank(Im(∂i+1 )) with i = 0, 1, 2.
Now, we compute rank and nullity of the matrix ∂i of order fi × fi+1 with
i = 0, 1, 2.
2
2
The boundary homomorphism ∂2 : C2 (∆s (U7,3
)) → C1 (∆s (U7,3
)) can be expressed as
∂2 (F21,31,41 ) = F31,41 − F21,41 + F21,31 ; ∂2 (F11,31,41 ) = F31,41 − F11,41 + F11,31 ;
∂2 (F11,21,41 ) = F21,41 − F11,41 + F11,21 ; ∂2 (F12,31,41 ) = F31,41 − F12,41 + F12,31 ;
∂2 (F12,21,41 ) = F21,41 − F12,41 + F12,21 ; ∂2 (F13,31,41 ) = F31,41 − F13,41 + F13,31 ;
∂2 (F13,21,41 ) = F21,41 − F13,41 + F13,21 ; ∂2 (F21,31,42 ) = F31,42 − F21,42 + F21,31 ;
∂2 (F11,31,42 ) = F31,42 − F11,42 + F11,31 ; ∂2 (F11,21,42 ) = F21,42 − F11,42 + F11,21 ;
∂2 (F12,31,42 ) = F31,42 − F12,42 + F12,31 ; ∂2 (F12,21,42 ) = F21,42 − F12,42 + F12,21 ;
∂2 (F13,31,42 ) = F31,42 − F13,42 + F13,31 ; ∂2 (F13,21,42 ) = F21,42 − F13,42 + F13,21 .
2
The boundary homomorphism ∂1 : C1 (∆s (U7,3
)) → C0 (∆s (UM27,3 )) can be
written as
∂1 (F11,21 ) = e21 − e11 ; ∂1 (F11,31 ) = e31 − e11 ; ∂1 (F11,41 ) = e41 − e11 ; ∂1 (F11,42 ) =
e42 − e11 ; ∂1 (F12,21 ) = e21 − e12 ; ∂1 (F12,31 ) = e31 − e12 ; ∂1 (F12,41 ) = e41 − e12 ;
∂1 (F12,42 ) = e42 − e12 ; ∂1 (F13,21 ) = e21 − e13 ; ∂1 (F13,31 ) = e31 − e13 ; ∂1 (F13,41 ) =
e41 − e13 ; ∂1 (F13,42 ) = e42 − e13 ; ∂1 (F21,31 ) = e31 − e21 ; ∂1 (F21,41 ) = e41 − e21 ;
∂1 (F21,42 ) = e42 − e21 ; ∂1 (F31,41 ) = e41 − e31 ; ∂1 (F31,42 ) = e42 − e31 .
Then, by using MATLAB, we compute rank of ∂2 = 11; nullity of ∂2 = 3; rank
of ∂1 = 6; nullity of ∂1 = 11.
Therefore, the Betti numbers are given by β0 = rank(Ker(∂0 ))−rank(Im(∂1 )) =
7 − 6 = 1; β1 = rank(Ker(∂1 )) − rank(Im(∂2 )) = 11 − 11 = 0; β2 =
rank(Ker(∂2 )) − rank(Im(∂3 )) = 3 − 0 = 3.
2
Alternatively, the Euler characteristic of ∆s (U7,3
) is given by
2
χ(∆s (U7,3
)) = β0 − β1 + β2 = 1 − 0 + 3 = 4.
References
[1] I. Anwar, Z. Raza and A. Kashif, Spanning Simplicial Complexes of Uni-Cyclic Graphs,
Algebra Colloquium, 22 (2015), no.4, 707-710.
[2] S. Faridi, The Facet Ideal of a Simplicial Complex, Manuscripta, 109 (2002), 159-174.
[3] F. Harary, Graph Theory, Reading, MA: Addison-Wesley, 1994.
[4] A. Hatcher, Algebraic Topology, Cambridge University Press, 2002.
[5] A. Kashif, I. Anwar and Z. Raza, On the Algebraic Study of Spanning Simplicial Complex
of r-cycles Graphs Gn,r , ARS Combinatoria, 115 (2014), 89-99.
[6] Y. Pan, R. Li and G.Zhu, Spanning Simplicial Complexes of n-Cyclic Graphs with a
Common Vertex, International Electronic Journal of Algebra, 17 (2015), 180-187.
10
Ahmed and Muhmood
[7] J. J. Rotman, An Introduction to Algebraic Topology, Springer-Verlag, New York, 1988.
[8] R. H. Villarreal, Monomial Algebras. Dekker, New York, 2001.
[9] G. Zhu, F. Shi and Y.Geng, Spanning Simplicial Complexes of n-Cyclic Graphs with a
Common Edge, International Electronic Journal of Algebra, 15 (2014), 132-144.
COMSATS Institute of Information Technology, Lahore, Pakistan
E-mail address: [email protected]
COMSATS Institute of Information Technology, Lahore, Pakistan
E-mail address: shahid [email protected]
| 0math.AC
|
arXiv:1212.2653v1 [math.AC] 11 Dec 2012
ON THE EISENBUD-GREEN-HARRIS CONJECTURE
ABED ABEDELFATAH
Abstract. It has been conjectured by Eisenbud, Green and Harris that if I is
a homogeneous ideal in k[x1 , . . . , xn ] containing a regular sequence f1 , . . . , fn
of degrees deg(fi ) = ai , where 2 ≤ a1 ≤ ⋯ ≤ an , then there is a homogeneous
an
1
ideal J containing xa
1 , . . . , xn with the same Hilbert function. In this paper we prove the Eisenbud-Green-Harris conjecture when fi splits into linear
factors for all i.
1. Introduction
Let S = k[x1 , . . . , xn ] be a polynomial ring over a field k. The ring S = ⊕d≥0 Sd
is graded by deg(xi ) = 1 for all i. In 1927, F.Macaulay proved that if I = ⊕d≥0 Id is
a graded ideal in S, then there exists a lex ideal L such that L has the same Hilbert
function as I [13]; i.e., every Hilbert function in S is attained by a lex ideal. Let M
be a monomial ideal in S. It is natural to ask if we have the same result in S/M . In
[5], Clements and Lindström proved that every Hilbert function in S/⟨xa1 1 , . . . , xann ⟩
is attained by a lex ideal, where 2 ≤ a1 ≤ ⋅ ⋅ ⋅ ≤ an . In the case a1 = ⋯ = an = 2, the
result was obtained earlier by Katona [11] and Kruskal [?]. Another generalizations
of Macaulay’s theorem can be found in [17], [15] and [1].
Let f1 , . . . , fn be a regular sequence in S such that 2 ≤ a1 = deg(f1 ) ≤ ⋯ ≤ an =
deg(fn ). A well known result says that ⟨f1 , . . . , fn ⟩ has the same Hilbert function
as ⟨xa1 1 , . . . , xann ⟩ (see Exercise 6.2. of [9]). It is natural to ask what happens if
I ⊆ S is a homogeneous ideal containing a regular sequence in fixed degrees. This
question bring us to the Eisenbud-Green-Harris Conjecture, denoted by EGH.
Conjecture 1.1 (EGH [8]).
If I is a homogeneous ideal in S containing a regular sequence f1 , . . . , fn of degrees
deg(fi ) = ai , where 2 ≤ a1 ≤ ⋯ ≤ an , then I has the same Hilbert function as an
ideal containing xa1 1 , . . . , xann .
The original conjecture (see Conjecture 2.3) is equivalent to Conjecture 1.1 in
the case ai = 2 for all i (see Proposition 2.5). The EGH Conjecture is known to be
true in few cases. The conjecture has been proven in the case n = 2 [16]. Caviglia
and Maclagan [3] have proven that the EGH Conjecture is true if aj > ∑j−1
i=1 (ai − 1)
for all j > 1. Richert [16] says that the EGH Conjecture in degree 2 (ai = 2 for
all i) holds for n ≤ 5, but this result was not published. Herzog and Popescu [10]
proved that if k is a field of characteristic zero and I is minimally generated by
generic quadratic forms, then the EGH Conjecture in degree 2 holds. Cooper [6, 7]
has done some work in a geometric direction. She studies the EGH Conjecture for
some cases with n = 3.
Key words and phrases. Hilbert function, EGH conjecture, Regular sequence.
1
2
A.ABEDELFATAH
Let f1 , . . . , fn be a regular sequence in S such that fi splits into linear factors for
all i. For all 1 ≤ i ≤ n, let pi ∈ S1 such that pi ∣fi . Since p1 , . . . , pn must be a k-linear
independent, it follows that the k-algebra map α ∶ S → S defined by α(xi ) = pi for
all 1 ≤ i ≤ n, is a graded isomorphism. So the Hilbert function is preserved under
this map and we may assume that pi = xi for all i.
In Section 2, we give background information to the EGH Conjecture. In section
3, we study the dimension growth of some ideals containing a regular sequence
x1 l1 , . . . , xn ln , where li ∈ S1 for all i. In section 4, we prove the EGH Conjecture
when fi splits into linear factors for all i. This answers a question of Chen, who
asked if the EGH Conjecture holds when fi = xi li , where li ∈ S1 for all 1 ≤ i ≤ n (see
Example 3.8 of [4]).
2. Background
A proper ideal I in S is called graded or homogeneous if it has a system of
homogeneous generators. Let R = S/I, where I is a homogeneous ideal. The
Hilbert function of I is the sequence H(R) = {H(R, t)}t≥0 , where
H(R, t) ∶= dimk Rt = dimk St /It .
For simplicity, sometimes we denote the dimension of a k-vector space V by ∣V ∣
instead of dimk V . For a k-vector space V ⊆ Sd , where d ≥ 0, we denote by S1 V
the k-vector space spanned by {xi v ∶ 1 ≤ i ≤ n ∧ v ∈ V }. Throughout this paper
A = (a1 , . . . , an ) ∈ Zn , where 2 ≤ a1 ≤ ⋯ ≤ an . For a subset A of S, we denote by
Mon(A) the set of all monomials in A and let Au = {j ∶ xj ∣u}, where u ∈ Mon(S).
The support of the polynomial f = ∑u∈Mon(S) au u, where au ∈ k, is the set
supp(f ) = {u ∈ Mon(S) ∶ au ≠ 0}.
A monomial w ∈ S is called square-free if x2i ∤ w, for all 1 ≤ i ≤ n. We define
the lex order on Mon(S) by setting xb = xb11 ⋯xbnn <lex xc11 ⋯xcnn = xc if either
deg(xb ) < deg(xc ) or deg(xb ) = deg(xc ) and bi < ci for the first index i such that
bi ≠ ci . We recall the definitions of lex ideal and lex-plus-powers ideal.
Definition 2.1.
● A graded ideal is called monomial if it has a system of
monomial generators.
● A monomial ideal I ⊆ S is called lex, if whenever I ∋ z <lex w, where w, z
are monomials of the same degree, then w ∈ I.
● A monomial ideal I is A-lex-plus-powers if there exists a lex ideal L such
that I = ⟨x1a1 , . . . , xann ⟩ + L.
Example 2.2. the ideal I = ⟨x21 , x22 , x1 x2 x3 , x33 ⟩ is a (2, 2, 3)-lex-plus-powers ideal
in k[x1 , x2 , x3 ], because I = ⟨x21 , x22 , x33 ⟩ + ⟨x31 , x21 x2 , x21 x3 , x1 x22 , x1 x2 x3 ⟩ and
⟨x31 , x21 x2 , x21 x3 , x1 x22 , x1 x2 x3 ⟩ is a lex ideal in k[x1 , x2 , x3 ].
By Clements-Lindström’s theorem, we obtain that for any graded ideal containing ⟨xa1 1 , . . . , xann ⟩ there is a (a1 , . . . , an )-lex-plus-powers ideal with the same Hilbert
function.
q−1
) + ⋯ + (s11 ) be the unique Macaulay expansion of p with
Let p ≥ 0 and (sqq ) + (sq−1
sq
) + (sq−1
) + ⋯ + (s21 ). In [8], Eisenbud,
respect to q > 0. Set 0(q) = 0 and p(q) = (q+1
q
Green and Harris made the following conjecture.
Conjecture 2.3. If I ⊂ S is a graded ideal such that I2 contains a regular sequence
of maximal length and d > 0, then H(S/I, d + 1) ≤ H(S/I, d)(d) .
ON THE EISENBUD-GREEN-HARRIS CONJECTURE
3
Conjecture 2.3 is true if the ideal contains the squares of the variables. This
follows from the Kruskal-Katona theorem (see [2]). In the following proposition,
we prove the equivalence of Conjecture 2.3 and the EGH Conjecture in degree 2.
First, we need the following definition.
Definition 2.4. Let M be a monomial ideal in S and d ≥ 0. A monomial vector
space Ld in (S/M )d is called lexsegment if it is generated by the t biggest monomials
(with respect to the lex order) in (S/M )d = Sd /Md , for some t ≥ 0.
For example, if L is a lex ideal in S, then Lj is lexsegment for all j ≥ 0. If Ld
is a lexsegment space in (S/M )d , where M is a monomial ideal in S, then S1 Ld is
lexsegment in (S/M )d+1 (see Proposition 2.5 of [15]).
Proposition 2.5. Let f1 , . . . , fn be a regular sequence of degrees 2 in S. The
following are equivalent:
(a) If I is a graded ideal in S containing f1 , . . . , fn , then there is a graded ideal
J in S containing x21 , . . . , x2n such that H(S/I) = H(S/J).
(b) If I is a graded ideal in S containing f1 , . . . , fn , then
H(S/I, d + 1) ≤ H(S/I, d)(d) for all d > 0.
Proof. First, we prove that (a) implies (b). Let I be a graded ideal in S containing
f1 , . . . .fn . By (a), it follows that there is a graded ideal J in S containing x21 , . . . , x2n
such that H(S/I) = H(S/J). By Kruskal-Katona theorem it follows that H(S/I, d+
1) = H(S/J, d + 1) ≤ H(S/J, d)(d) = H(S/I, d)(d) for all d > 0.
Now, we prove that (b) implies (a). Let I be a graded ideal in S containing
f1 , . . . , fn . Set M = ⟨x21 , . . . , x2n ⟩ and P = ⟨f1 , . . . , fn ⟩. For every d ≥ 0, let Ld be the
k-vector space spanned by the first square-free monomials (in lex order) of Sd such
that ∣Ld ⊕ Md ∣ = ∣Id ∣. Let K = ⊕j≥0 Kj = ⊕j≥0 (Lj + Mj ). We need to show that K is
an ideal. Let d > 0. By Proposition 6.4.3 of [9], we obtain that
∣Sd+1 /Md+1 ∣ − ∣S1 Ld /S1 Ld ∩ Md+1 ∣ = (∣Sd /Md ∣ − ∣Ld ∣)(d) .
By the hypothesis of (b), we obtain (∣Sd /Md ∣ − ∣Ld ∣)(d) = ∣Sd /Id ∣(d) ≥ ∣Sd+1 /Id+1 ∣. So
∣Sd+1 /Md+1 ∣ − ∣S1 Ld /S1 Ld ∩ Md+1 ∣ = ∣Sd+1 /Md+1 ∣ − ∣S1 Ld + Md+1 /Md+1 ∣ ≥ ∣Sd+1 /Id+1 ∣.
This implies that ∣S1 Ld +Md+1 ∣ ≤ ∣Ld+1 +Md+1 ∣. Since Ld+1 and S1 Ld are lexsegments
in (S/M )d+1 , it follows that S1 Ld ⊆ Ld+1 + Md+1 . So S1 Kd ⊆ Kd+1 for all d ≥ 0,
which implies that K is a graded ideal in S. Clearly, H(S/K) = H(S/I).
The following lemma helps us to study the EGH Conjecture in each component
of the homogeneous ideal.
Lemma 2.6. Let I be a graded ideal in S containing a regular sequence f1 , . . . , fn
of degrees deg(fi ) = ai . The following are equivalent:
(a) There exists a graded ideal J in S containing xa1 1 , . . . , xann such that H(S/I) =
H(S/J).
(b) For every d ≥ 0, there exists a graded ideal J in S containing xa1 1 , . . . , xann
such that H(S/I, d) = H(S/J, d) and H(S/I, d + 1) ≤ H(S/J, d + 1).
Proof. Clearly, (a) implies (b). We will show that (b) implies (a). For every
d ≥ 0, there exists an ideal Jd in S containing xa1 1 , . . . , xann such that H(S/I, d) =
H(S/Jd, d) and H(S/I, d + 1) ≤ H(S/Jd, d + 1). By Clements-Lindström’s theorem,
we may assume that Jd is a A-lex-plus-powers ideal for all d. Let J = ⊕j≥0 Jj,j , where
4
A.ABEDELFATAH
Jj,j is the j-th component of Jj . Since dim(Jd,d+1 ) ≤ dim(Id+1 ) = dim(Jd+1,d+1 ),
it follows that Jd,d+1 ⊆ Jd+1,d+1 , for all d. So S1 Jd,d ⊆ Jd,d+1 ⊆ Jd+1,d+1 , for all d.
Thus, J is an ideal. Clearly, H(S/I) = H(S/J).
We will use the following lemma on regular sequences (see [14, Chapter 6]).
Lemma 2.7. Let f1 , . . . , fn be a sequence of homogeneous polynomials in S with
deg(fi ) = ai and P = ⟨f1 , . . . , fn ⟩. Then
(a) If f1 , . . . , fn is a regular sequence, then H(S/P ) = H(S/⟨xa1 1 , . . . , xann ⟩).
(b) f1 , . . . , fn is a regular sequence if and only if the following condition holds:
if g1 f1 + ⋯ + gn fn = 0 for some g1 , . . . , gn ∈ S, then g1 , . . . , gn ∈ P .
(c) If f1 , . . . , fn is a regular sequence and σ ∈ Sn is a permutation, then
fσ(1) , . . . , fσ(n) is a regular sequence.
3. The dimension growth of some ideals containing a reducible
regular sequence
Let f1 = x1 l1 , . . . , fn = xn ln be a regular sequence in S, where li ∈ S1 for all i.
Set P = ⟨f1 , . . . , fn ⟩ and M = ⟨x21 , . . . , x2n ⟩. Let Vd be a vector space spanned by Pd
and square-free monomials w1 , . . . , wt in Sd , and Wd be the vector space spanned
by Md and w1 , . . . , wt . In this section, we prove that dim(S1 Vd ) = dim(S1 Wd ). We
also compute dim(S1 Kd ), where Kd is the space generated by Pd and the biggest
(in lex order) square-free monomials v1 , . . . , vt in Sd .
For a matrix A ∈ Mn×n (k), we denote by A[i1 , . . . , ir ] the submatrix of A formed
by rows i1 , . . . , ir and columns i1 , . . . , ir , where 1 ≤ r ≤ n and 1 ≤ i1 < ⋯ < ir ≤ n.
We begin with the following lemma, which characterize the structure of f1 , . . . , fn .
Lemma 3.1. (Example 3.8 of [4])
Let f1 = x1 l1 , . . . , fn = xn ln be a sequence of homogeneous polynomials in S, where
li = ∑nj=1 aij xj with aij ∈ k and A be the n × n matrix (aij ). Then f1 , . . . , fn
is a regular sequence if and only if det A[i1 , . . . , ir ] ≠ 0 for all 1 ≤ r ≤ n and
1 ≤ i1 < ⋯ < ir ≤ n.
Proof. Assume that f1 , . . . , fn is regular. We prove that det A[i1 , . . . , ir ] ≠ 0 for all
1 ≤ r ≤ n and 1 ≤ i1 < ⋯ < ir ≤ n, by induction on n, starting with n = 1. Let
n > 1. Assume that 1 ≤ i1 < ⋯ < ir ≤ n, where 1 ≤ r ≤ n − 1. Let j ∉ {i1 , . . . , ir }.
Note that xj lj is regular modulo an ideal I if and only if both xj and lj are regular
modulo I. By Lemma 2.7, xj , f1 , . . . , fj−1 , fj+1 , . . . , fn is a regular sequence. So
f1 , . . . , fj−1 , fj+1 , . . . , fn is a regular sequence in S/⟨xj ⟩. By the inductive step
we obtain that det A[i1 , . . . , ir ] ≠ 0. It remains to show that det(A) ≠ 0. From
the permutability property of regular sequences of homogeneous polynomials, we
obtain that l1 , . . . , ln is a regular sequence. So l1 , . . . , ln is k-linearly independent.
Assume now det A[i1 , . . . , ir ] ≠ 0 for all 1 ≤ r ≤ n and 1 ≤ i1 < ⋯ < ir ≤ n.
We prove that f1 , . . . , fn is a regular sequence by induction on n, starting with
n = 1. Let n > 1. By the inductive step, the sequence f1 , . . . , fn−1 is regular in
S/⟨xn ⟩. So f1 , . . . , fn−1 , xn is a regulae sequence in S. It remains to show that
f1 , . . . , fn−1 , ln is a regular sequence. Since det(A) ≠ 0, it follows that the k-algebra
map α ∶ S → S defined by α(xi ) = li , for all i, is an isomorphism. By the inductive
step, α−1 (f1 ), . . . , α−1 (fn−1 ), α−1 (ln ) = xn is a regular sequence. So f1 , . . . , fn−1 , ln
is a regular sequence, as desired.
The special structure of the regular sequence in 3.1 implies the following lemma.
ON THE EISENBUD-GREEN-HARRIS CONJECTURE
5
Lemma 3.2. Let f1 = x1 l1 , . . . , fn = xn ln be a regular sequence of homogeneous
polynomials in S, where li = ∑nj=1 aij xj with aij ∈ k, and P = ⟨f1 , . . . , fn ⟩. If g ∉ P
is a homogeneous polynomial in S, then
g ≡ h (mod P )
where deg(h) = deg(g) and h is a k-linear combination of square-free monomials.
Proof. Since g ∉ P , we have deg(g) ≤ n. It is sufficient to prove the lemma when
g ∉ P is a monomial in ⟨x21 , . . . , x2n ⟩ of degree ≤ n. We prove by induction on deg(g).
The lemma is true when deg(g) = 2, since aii ≠ 0 for all i. Let g be a monomial in
⟨x21 , . . . , x2n ⟩ of degree d > 2 and A be the n × n matrix (aij ). By the inductive step,
we may assume that xgi is a square-free monomial for some i. By Lemma 3.1, we
have det A[j ∶ j ∈ Ag ] ≠ 0. So there exist scalars (cj )j∈Ag , such that ∑j∈Ag cj lj ≡ xi
(mod ⟨xj ∶ j ∉ Ag ⟩). It follows that xi = ∑j∈Ag cj lj + ∑j∉Ag cj xj , where cj ∈ k
for all j ∉ Ag . Then g = ∑j∈Ag cj lj xgi + ∑j∉Ag cj xj xgi . Let h = ∑j∉Ag cj xj xgi . Note
that h ≠ 0 is a k-linear combination of square-free monomials of degree d. Since
g
∑j∈Ag cj lj xi ∈ P , we obtain that g ≡ h (mod P ).
By the proof of Lemma 3.2, we obtain the following.
Remark 3.3. Let P be as in Lemma 3.2 and 0 ≤ d ≤ n. If w is a square-free
monomial in Sd and q ∈ S1 , then
qw = q̃w + q̂w
where q̃, q̂ ∈ S1 , q̂w ∈ P and q̃w is a k-linear combination of square-free monomials.
Example 3.4. Assume that S = C[x1 , x2 , x3 ] and
f1 = x21 + x1 x2 + x1 x3 = x1 (x1 + x2 + x3 )
f2 = −x1 x2 + x22 + x2 x3 = x2 (−x1 + x2 + x3 )
f3 = −x1 x3 − x2 x3 + x23 = x3 (−x1 − x2 + x3 ).
1 1 ⎞
⎛ 1
In this case, A = ⎜ −1 1 1 ⎟ is the matrix that defined in Lemma 3.1.
⎝ −1 −1 1 ⎠
Since det A[i1 , . . . , ir ] ≠ 0 for all 1 ≤ r ≤ 3 and 1 ≤ i1 < ⋯ < ir ≤ 3, we have that
f1 , f2 , f3 is a regular sequence in S. Set P = ⟨f1 , f2 , f3 ⟩ and let g = x31 + x21 x2 . Since
x21 ≡ −x1 x2 − x1 x3 (mod P ), we have x31 ≡ −x21 x2 − x21 x3 (mod P ). So g ≡ −x21 x3
(mod P ). Also, we see that x3 f1 − x1 f3 = 2x21 x3 + 2x1 x2 x3 ∈ P . So g ≡ x1 x2 x3
(mod P ) and x1 x2 x3 ∉ ⟨x21 , x22 , x23 ⟩.
Remark 3.5. Lemma 3.2 is not true if f1 , . . . , fn is an arbitrary regular sequence.
For example, consider the sequence
f1 = x21 + x1 x2 + x22 , f2 = x1 x2 in C[x1 , x2 ].
Note that f1 , f2 is a regular sequence ⇔ f1 , x1 and f1 , x2 are regular sequences ⇔
x1 , f1 and x2 , f1 are regular sequences ⇔ x22 and x21 are regular elements in C[x2 ]
and C[x1 ], respectively. So f1 , f2 is a regular sequence. Let g = x22 . It is easy to
show that g ∉ ⟨f1 , f2 ⟩. If g ≡ ax1 x2 (mod ⟨f1 , f2 ⟩), for some a ∈ C, then there exist
c1 , c2 , c3 ∈ C, not all zero, such that c1 f1 + c2 f2 + c3 (g − ax1 x2 ) = 0. But the equation
c1 x21 + (c1 + c2 − ac3 )x1 x2 + (c1 + c3 )x22 = 0,
implies that c1 = c2 = c3 = 0, a contradiction.
6
A.ABEDELFATAH
As a result of Lemma 3.2, we obtain the following.
Lemma 3.6. If P as in Lemma 3.2, then the set of all square-free monomials form
a k-basis of S/P .
Proof. Denote by A the set of all square-free monomials in S. Lemma 3.2 shows
that S/P generated by A. Let w = x1 ⋯xn . Assume that w ∈ P . Since H(S/P ) =
H(S/⟨x21 , . . . , x2n ⟩), it follows that there is a polynomial f ∈ Sn such that f ∉ P . By
Lemma 3.2, f ≡ bx1 ⋯xn (mod P ), where 0 ≠ b ∈ k. Since w ∈ P , it follows that
f ∈ P , a contradiction. So w ∉ P . Suppose that ∑w∈A aw w ∈ P , where aw ∈ k and
aw = 0 for almost all w ∈ A. Assume that aw ≠ 0 for some w. Let v ∈ A be a
monomial with minimal degree such that av ≠ 0. So v ∈ ⟨fi ∶ i ∈ Av ⟩ in the ring
S/⟨xi ∶ i ∉ Av ⟩, a contradiction.
Lemma 3.7. Let P be as in Lemma 3.2. If w is a square-free monomial in Sd ,
where 0 ≤ d ≤ n, then
(a) ∣S1 (w) ∩ Pd+1 ∣ = d.
(b) ∣S1 (w) ∩ (Pd+1 + S1 (w1 , . . . , wt ))∣ = ∣S1 (w) ∩ Pd+1 ∣ + ∣S1 (w) ∩ S1 (w1 , . . . , wt )∣
for every square-free monomials w1 , . . . , wt of degrees d such that wi ≠ w
for all 1 ≤ i ≤ t.
Proof. (a). Let q = ∑ni=1 ci li ∈ S1 , where ci ∈ k for all i, such that qw ∈ Pd+1 .
Assume that cj ≠ 0 for some j ∉ Aw . Since qw ∏j≠k∉Aw xk ∈ P , it follows that
cj lj w ∏j≠k∉Aw xk ∈ P . Thus, cj lj w ∏j≠k∉Aw xk = h1 f1 + ⋅ ⋅ ⋅ + hn fn , where hi ∈ S for
all 1 ≤ i ≤ n. So
h1 f1 + ⋅ ⋅ ⋅ + hj−1 fj−1 + (xj hj − cj w ∏ xk )lj + hj+1 fj+1 + ⋅ ⋅ ⋅ + hn fn = 0,
j≠k∉Aw
which implies that
xj hj − cj w ∏ xk ∈ ⟨f1 , . . . , fj−1 , fj+1 , . . . , fn ⟩.
j≠k∉Aw
So w ∏j≠k∉Aw xk ∈ ⟨f1 , . . . , fj−1 , fj+1 , . . . , fn ⟩ in the ring S/⟨xj ⟩, a contradiction to
Lemma 3.6. It follows that q belong to the k-vector space (li ∶ i ∈ Aw ). On the
other hand, li w ∈ P , for all i ∈ Aw . So ∣S1 (w) ∩ Pd+1 ∣ = dim(li w ∶ i ∈ Aw ) = d.
(b). First, we show that
S1 (w) ∩ (Pd+1 + S1 (w1 , . . . , wt )) = S1 (w) ∩ Pd+1 + S1 (w) ∩ S1 (w1 , . . . , wt ).
Assume that qw ∈ Pd+1 +S1 (w1 , . . . , wt ), where q ∈ S1 . There exist f ∈ S1 (w1 , . . . , wt )
and g ∈ Pd+1 such that qw = g + f . If f ∈ P , then qw ∈ S1 (w) ∩ Pd+1 . So assume
that f ∉ P . By 3.3, we may assume that f is a k-linear combination of square-free
monomials. Also, we obtain that qw = q̃w + q̂w, where q̃, q̂ ∈ S1 , q̂w ∈ P and q̃w is a
k-linear combination of square-free monomials. So q̃w − f ∈ P , which implies that
q̃w = f ∈ S1 (w1 , . . . , wt ). Hence qw ∈ S1 (w) ∩ Pd+1 + S1 (w) ∩ S1 (w1 , . . . , wt ) and we
obtain that the desired equality.
It remains to show that
S1 (w) ∩ S1 (w1 , . . . , wt ) ∩ Pd+1 = (0).
Let qw ∈ S1 (w1 , . . . , wt ) ∩ Pd+1 , where q ∈ S1 . By (a), we have q = ∑j∈Aw cj lj , where
cj ∈ k for all j ∈ Aw . For every 1 ≤ j ≤ t, let ij ∈ Awj ∖Aw and let B = {ij ∶ 1 ≤ j ≤ t}.
By the hypothesis, we obtain that qw = ∑ti=1 qi wi , where qi ∈ S1 for all 1 ≤ i ≤ t. So
ON THE EISENBUD-GREEN-HARRIS CONJECTURE
7
qw = 0 in the ring S/⟨xj ∶ j ∈ B⟩, which implies that ∑j∈Aw cj lj = 0. By 3.1, we
obtain that cj = 0, for all j ∈ Aw . Thus, qw = 0.
Remark 3.8. Part (b) of Lemma 3.7 is not true if we replace w, w1 , . . . , wt by homogeneous polynomials which are a k-linear combination of square-free monomials
in Sd . For example, let S = k[x1 , x2 , x3 , x4 ] and P = ⟨x21 , x22 , x23 , x24 ⟩. Suppose that
h = x1 x2 + x2 x4 + x3 x4 and h1 = x1 x2 + x1 x3 . Computation with Macaulay2 shows
that
∣S1 (h) ∩ (P3 + S1 (h1 ))∣ = 2 and ∣S1 (h) ∩ P3 ∣ = ∣S1 (h) ∩ S1 (h1 ))∣ = 0.
In the case that w is a homogeneous polynomial in part (a) of Lemma 3.7,
the dimension is always bounded by the degree. This is a result of the following
proposition.
Proposition 3.9. Let P be as in Lemma 3.2. If g ∉ P is a homogeneous polynomial
of degree d, then ∣S1 (g) ∩ Pd+1 ∣ ≤ d.
Proof. We prove by induction on n. If n = 1, then g = ax1 or g ∈ k, where a ∈ k.
If g ∈ k, then ∣S1 (g) ∩ P1 ∣ = 0 and if g = ax1 , then ∣S1 (g) ∩ P2 ∣ = 1. Let n > 1. We
prove by induction on d, starting with d = 0. Let d > 0. If d = n, then Pd+1 = Sd+1
and so ∣S1 (g) ∩ Pd+1 ∣ = n. Assume that d < n. By 3.2, there exists a k-linear
combination of square-free monomials h ∈ Sd such that g ≡ h (mod Pd ). Clearly,
S1 (h)∩Pd+1 = S1 (g)∩Pd+1 . Let h = ∑ti=1 ai wi , where 0 ≠ ai ∈ k and wi ∈ Mon(Sd ) for
all i. Let j ∉ Aw1 . If lj h ∈ Pd+1 , then lj w1 ∈ Pd+1 in the ring S/⟨xi ∶ i ∉ Aw ∧ i ≠ j⟩,
a contradiction. So lj h ∉ Pd+1 for all j ∉ Aw1 . In particular, there exists a variable
xi such that xi h ∉ Pd+1 . We have two cases:
Case 1. h ∉ Pd in the ring S/⟨xi ⟩. Let p1 h, . . . , ps h be a basis of S1 (h) ∩ Pd+1
in the ring S/⟨xi ⟩. By the inductive step, we obtain that s ≤ d. If f ∈ S1 (h) ∩ Pd+1 ,
then f ∈ (p1 h, . . . , ps h, xi q), where q ∈ Sd . Since f ∈ S1 (h), it follows that xi q = rh,
where r ∈ S1 . Since xi ∤ h, it follows that xi ∣r. So f ∈ (p1 h, . . . , ps h, xi h). Therefore,
S1 (h) ∩ Pd+1 ⊆ (p1 h, . . . , ps h, xi h). If ∣S1 (h) ∩ Pd+1 ∣ = s + 1, then xi h ∈ Pd+1 , a
contradiction.
Case 2. h ∈ Pd in the ring S/⟨xi ⟩. So h ≡ xi q (mod Pd ), where q ∈ Sd−1 . Since
h is the unique k-linear combination of square-free monomials such that xi q ≡ h
(mod P ), we obtain that h = xi h1 , where h1 ∈ Sd−1 . If f ∈ S1 (h) ∩ Pd+1 , then
f = pxi h1 , for some p ∈ S1 . Clearly, xfi ∈ S1 (h1 ). Since f ∈ P , it follows that
ph1 ∈ Pd in the ring S/⟨li ⟩. So xfi ∈ S1 (h1 ) ∩ Pd in S/⟨li ⟩. If h1 ∈ Pd−1 in S/⟨li ⟩, then
xi h1 = h ∈ P , a contradiction. Let p1 h1 , . . . , ps h1 be a basis of S1 (h1 ) ∩ Pd . By the
inductive step, we obtain that s ≤ d − 1. So xfi ∈ (p1 h1 , . . . , ps h1 , li q), which implies
that f ∈ (p1 h, . . . , ps h, li xi q). Therefore, ∣S1 (h) ∩ Pd+1 ∣ ≤ s + 1 ≤ d.
Now, we prove the main results of this section.
Theorem 3.10. Let P be as in Lemma 3.2 and M = ⟨x21 , . . . , x2n ⟩. Assume that
V = Pd +(w1 , . . . , wt ) and W = Md +(w1 , . . . , wt ), where wi is a square-free monomial
of degree d, for all i. Then
dim S1 W = dim S1 V.
8
A.ABEDELFATAH
Proof. We may assume that d ≥ 2 and prove by induction on t. If t = 1, then
dim S1 W = dim Md+1 + dim S1 (w1 ) − dim S1 (w1 ) ∩ Md+1
= dim Pd+1 + dim S1 (w1 ) − dim S1 (w1 ) ∩ Pd+1 = dim S1 V.
Let t > 1, and set W1 = Md + (w1 , . . . , wt−1 ), V1 = Pd + (w1 , . . . , wt−1 ) and Z =
S1 (wt ) ∩ S1 (w1 , . . . , wt−1 ). By Lemma (3.7) and the inductive step, we have
dim S1 W = dim S1 W1 + dim S1 (wt ) − dim S1 (wt ) ∩ S1 W1
= dim S1 V1 + dim S1 (wt ) − dim S1 (wt ) ∩ S1 W1
= dim S1 V1 + dim S1 (wt ) − dim S1 (wt ) ∩ Md+1 − dim Z
= dim S1 V1 + dim S1 (wt ) − dim S1 (wt ) ∩ Pd+1 − dim Z
= dim S1 V1 + dim S1 (wt ) − dim S1 (wt ) ∩ S1 V1
= dim S1 V.
Proposition 3.11. Let P be as in Lemma 3.2 and V = Pd + (w1 , . . . , wt ) be the
k-vector space spanned by Pd and the t biggest (in lex order) square-free monomials
in Sd . Then
t
d+n
n
dim S1 V = (
)−(
) + ∑(n − m(wi )),
d+1
d+1
i=1
where m(wi ) = max{j ∶ xj ∣wi }, 1 ≤ i ≤ t.
Proof. We claim that
t
t
t
i=1
i=1
i=2
∣S1 V ∣ = ∣Pd+1 ∣ + ∑ ∣S1 (wi )∣ − ∑ ∣S1 (wi ) ∩ Pd+1 ∣ − ∑ ∣S1 (wi ) ∩ S1 (w1 , . . . , wi−1 )∣.
We prove the claim by induction on t. If t = 1, then
∣S1 V ∣ = ∣Pd+1 ∣ + ∣S1 (w1 )∣ − ∣S1 (w1 ) ∩ Pd+1 ∣.
Let t > 1 and V1 = Pd + (w1 , . . . , wt−1 ). By the inductive step we obtain that ∣S1 V ∣
is equal to
t
t−1
t−1
i=1
i=1
i=2
∣Pd+1 ∣+ ∑ ∣S1 (wi )∣− ∑ ∣S1 (wi )∩Pd+1 ∣− ∑ ∣S1 (wi )∩S1 (w1 , . . . , wi−1 )∣−∣S1 (wt )∩S1 V ∣.
By Lemma 3.7, we have ∣S1 (wt )∩S1 V1 ∣ = ∣S1 (wt )∩Pd+1 ∣+∣S1 (wt )∩S1 (w1 , . . . , wt−1 )∣.
We proved the claim.
Let 2 ≤ j ≤ t. If i < m(wj ) such that xi ∤ wj , then xi wj ∈ S1 (w1 , . . . , wj−1 ). So
∣S1 (wi ) ∩ S1 (w1 , . . . , wi−1 )∣ = m(wj ) − d. Therefore
∣S1 V ∣ = ∣Sd+1 ∣ − (
t
n
) + tn − td − ∑(m(wi ) − d)
d+1
i=2
t
d+n
n
=(
)−(
) + tn − td − ∑(m(wi ) − d)
d+1
d+1
i=2
t
d+n
n
=(
)−(
) + tn − td − ∑(m(wi ) − d)
d+1
d+1
i=1
t
d+n
n
=(
)−(
) + ∑(n − m(wi )).
d+1
d+1
i=1
ON THE EISENBUD-GREEN-HARRIS CONJECTURE
9
4. The main result
In this section we prove that the EGH Conjecture is true if fi splits into linear
factors for all i. We begin with the following lemma.
Lemma 4.1. Let P = ⟨f1 , . . . , fn ⟩ be an ideal of S generated by a regular sequence
with deg(fi ) = ai and n ≥ 2. Assume that fn = q1 ⋯qs , where q1 , . . . , qs ∈ S1 . Then
(a) H(S/P + ⟨qm ⟩) = H(S/P + ⟨qk ⟩) for all 1 ≤ m, k ≤ s.
(b) H(S/(P ∶ q1 ⋯qj ) + ⟨qm ⟩) = H(S/(P ∶ q1 ⋯qj ) + ⟨qk ⟩) for all 1 ≤ j ≤ s − 1 and
j < m, k ≤ s.
Proof. First, we will prove (a). Let 1 ≤ m, k ≤ s. Note that P + ⟨qm ⟩/⟨qm ⟩ and
P +⟨qk ⟩/⟨qk ⟩ are ideals in S/⟨pm ⟩ and S/⟨qk ⟩, respectively, generated by f1 , . . . , fn−1 .
Note also that f1 , . . . , fn−1 , qm and f1 , . . . , fn−1 , qk are regular sequences. By part
(c) of Lemma 2.7, we obtain that f1 , . . . , fn−1 is a regular sequence in S/⟨qm ⟩ and
S/⟨qk ⟩. By part (a) of Lemma 2.7, we obtain that H(S/P + ⟨qm ⟩) = H(S/P + ⟨qk ⟩).
Now, we prove (b). Let 1 ≤ j ≤ s − 1 and j < m, k ≤ s. Assume that
h = h1 + h2 ∈ (P ∶ q1 ⋯qj ) + ⟨qm ⟩,
where h1 ∈ (P ∶ q1 ⋯qj ) and h2 ∈ ⟨qm ⟩. Since h1 q1 ⋯qj ∈ P , it follows that h1 q1 ⋯qj =
g1 f1 + ⋅ ⋅ ⋅ + gn fn , where g1 , . . . , gn ∈ S; i.e.,
g1 f1 + ⋅ ⋅ ⋅ + gn−1 fn−1 + q1 ⋯qj (gn qj+1 ⋯qs − h1 ) = 0.
Since f1 , . . . , fn−1 , q1 ⋯qj is a regular sequence, it follows that gn qj+1 ⋯qs − h1 ∈
⟨f1 , . . . , fn−1 ⟩. So h1 ∈ ⟨f1 , . . . , fn−1 ⟩ in the ring S/⟨qm ⟩, which implies that h ∈
⟨f1 , . . . , fn−1 ⟩. Conversely, fi ∈ (P ∶ q1 ⋯qj ) + ⟨qm ⟩/⟨qm ⟩ for all 1 ≤ i ≤ n − 1. So
(P ∶ q1 ⋯qj ) + ⟨qm ⟩/⟨qm ⟩ is an ideal in S/⟨qm ⟩ generated by f1 , . . . , fn−1 . Similarly,
(P ∶ q1 ⋯qj ) + ⟨qk ⟩/⟨qk ⟩ is an ideal in S/⟨qk ⟩ generated by f1 , . . . , fn−1 . By Lemma
2.7, it follows that H(S/(P ∶ q1 ⋯qj ) + ⟨qk ⟩) = H(S/(P ∶ q1 ⋯qj ) + ⟨qm ⟩).
Theorem 4.2. Assume that the EGH Conjecture holds in k[x1 , . . . , xn−1 ], where
n ≥ 2. If I is a graded ideal in S = k[x1 , . . . , xn ] containing a regular sequence
f1 , . . . , fn−1 , fn = q1 ⋯qs of degrees deg(fi ) = ai such that qi ∈ S1 for all 1 ≤ i ≤ s,
then I has the same Hilbert function as a graded ideal in S containing xa1 1 , . . . , xann .
Proof. We check the property (b) of Lemma 2.6. Let d ≥ 0. We need to find a
graded ideal K in S containing xa1 1 , . . . , xann such that H(S/I, d) = H(S/K, d) and
H(S/I, d + 1) ≤ H(S/K, d + 1). Let J to be the ideal generated by f1 , . . . , fn and
Id . By renaming the linear polynomials q1 , . . . , qs , we may assume without loss of
generality that
∣Jd ∩ ⟨q1 ⟩d ∣ ≥ ∣Jd ∩ ⟨qi ⟩d ∣ for all 2 ≤ i ≤ s,
∣(J ∶ q1 )d−1 ∩ ⟨q2 ⟩d−1 ∣ ≥ ∣(J ∶ q1 )d−1 ∩ ⟨qi ⟩d−1 ∣ for all 3 ≤ i ≤ s,
∣(J ∶ q1 q2 )d−2 ∩ ⟨q3 ⟩d−2 ∣ ≥ ∣(J ∶ q1 q2 )d−2 ∩ ⟨qi ⟩d−2 ∣ for all 4 ≤ i ≤ s,
⋮
∣(J ∶ q1 ⋯qs−2 )d−(s−2) ∩ ⟨qs−1 ⟩d−(s−2) ∣ ≥ ∣(J ∶ q1 ⋯qs−2 )d−(s−2) ∩ ⟨qs ⟩d−(s−2) ∣.
By considering the short exact sequences
10
A.ABEDELFATAH
0 → S/(J ∶ q1 ) Ð→ S/J Ð→ S/J + ⟨q1 ⟩ → 0,
g↦gq1
g↦g
0 → S/(J ∶ q1 q2 ) Ð→ S/(J ∶ q1 ) Ð→ S/(J ∶ q1 ) + ⟨q2 ⟩ → 0,
g↦gq2
g↦g
0 → S/(J ∶ q1 q2 q3 ) Ð→ S/(J ∶ q1 q2 ) Ð→ S/(J ∶ q1 q2 ) + ⟨q3 ⟩ → 0,
g↦gq3
g↦g
⋮
0 → S/(J ∶ q1 ⋯qs−1 ) Ð→ S/(J ∶ q1 ⋯qs−2 ) Ð→ S/(J ∶ q1 ⋯qs−2 ) + ⟨qs−1 ⟩ → 0.
g↦g
g↦gqs−1
we see that H(S/J, t) is equal to
s−2
H(S/J + ⟨q1 ⟩, t) + ∑ H(S/(J ∶ q1 ⋯qi ) + ⟨qi+1 ⟩, t − i) + H(S/(J ∶ q1 ⋯qs−1 ), t − (s − 1))
i=1
for all t ≥ 0. Let J0 = J + ⟨q1 ⟩, Js−1 = (J ∶ q1 ⋯qs−1 ), and for 1 ≤ i ≤ s − 2 let
i+1 ⟩
) = H(S/Ji ) for all
Ji = (J ∶ q1 ⋯qi ) + ⟨qi+1 ⟩. Note that qi+1 ∈ Ji and H( JS/⟨q
i /⟨qi+1 ⟩
0 ≤ i ≤ s − 1. Set S = k[x1 , . . . , xn−1 ]. For all 0 ≤ i ≤ s − 1, S/⟨qi+1 ⟩ is isomorphic
an−1
with the
to S, so by the hypothesis there is an ideal in S containing xa1 1 , . . . , xn−1
same Hilbert function as Ji . For all 0 ≤ i ≤ s − 1, let Li be the lex-plus-powers ideal
an−1
such that H(S/Li ) = H(S/Ji ).
in S containing xa1 1 , . . . , xn−1
Claim: Li,j ⊆ Li+1,j for all 0 ≤ i ≤ s − 2 and j ≤ d − i, where Li,j is the j-th
component of the ideal Li .
Proof of the claim: Assume that i = 0. If j < d, then by part (a) of Lemma
4.1 we obtain
∣J0,j ∣ = ∣Jj + ⟨q1 ⟩j ∣ = ∣Pj + ⟨q1 ⟩j ∣ = ∣Pj + ⟨q2 ⟩j ∣ ≤ ∣J1,j ∣.
If j = d, then by our assumption we obtain
∣J0,d ∣ = ∣Jd ∣ + ∣⟨q1 ⟩d ∣ − ∣Jd ∩ ⟨q1 ⟩d ∣
≤ ∣Jd ∣ + ∣⟨q1 ⟩d ∣ − ∣Jd ∩ ⟨q2 ⟩d ∣
= ∣Jd ∣ + ∣⟨q2 ⟩d ∣ − ∣Jd ∩ ⟨q2 ⟩d ∣
= ∣Jd + ⟨q2 ⟩d ∣
≤ ∣J1,d ∣.
This means that H(S/J0 , j) ≥ H(S/J1 , j) for all j ≤ d. So H(S/L0 , j) ≥ H(S/L1 , j)
for all j ≤ d. Since L0 and L1 are lex-plus-powers ideals, it follows that L0,j ⊆ L1,j
for all j ≤ d.
Let 0 < i ≤ s − 2. If j < d − i, then by part (b) of Lemma 4.1 we obtain
∣Ji,j ∣ = ∣(J ∶ q1 ⋯qi )j +⟨qi+1 ⟩j ∣ = ∣(P ∶ q1 ⋯qi )j +⟨qi+1 ⟩j ∣ = ∣(P ∶ q1 ⋯qi )j +⟨qi+2 ⟩j ∣ ≤ ∣Ji+1,j ∣.
If j = d − i, then by our assumption we obtain
∣Ji,d−i ∣ = ∣(J ∶ q1 ⋯qi )d−i ∣ + ∣⟨qi+1 ⟩d−i ∣ − ∣(J ∶ q1 ⋯qi )d−i ∩ ⟨qi+1 ⟩d−i ∣
≤ ∣(J ∶ q1 ⋯qi )d−i ∣ + ∣⟨qi+1 ⟩d−i ∣ − ∣(J ∶ q1 ⋯qi )d−i ∩ ⟨qi+2 ⟩d−i ∣
= ∣(J ∶ q1 ⋯qi )d−i ∣ + ∣⟨qi+2 ⟩d−i ∣ − ∣(J ∶ q1 ⋯qi )d−i ∩ ⟨qi+2 ⟩d−i ∣
= ∣(J ∶ q1 ⋯qi )d−i + ⟨qi+2 ⟩d−i ∣
≤ ∣Ji+1,d−i ∣.
Similarly, we conclude that Li,j ⊆ Li+1,j for all j ≤ d − i, and proving the claim.
ON THE EISENBUD-GREEN-HARRIS CONJECTURE
11
Let Ks = {zxs+j
∶ z ∈ Mon(S) ∧ j ≥ 0} and Ki = {zxin ∶ z ∈ Mon(Li )} for all
n
0 ≤ i ≤ s − 1. Define K to be the ideal generated by ⋃0≤i≤s Ki . Since xsn ∈ Ks and
xai i ∈ K0 for all 1 ≤ i ≤ n − 1, it follows that xa1 1 , . . . , xann ∈ K.
Claim: If w is a monomial in K of degree t, where 0 ≤ t ≤ d + 1, then w ∈ ⋃0≤i≤s Ki .
Proof of the claim: There exists a monomial u in ⋃0≤i≤s Ki such that u∣w; i.e.,
w = vu for some monomial v ∈ S. If u ∈ Ks , then w ∈ Ks . Assume that u = zxin ∈ Ki ,
where z ∈ Li for some 0 ≤ i ≤ s − 1. If xn ∤ v, then w ∈ ⋃0≤i≤s Ki . Assume that
xn ∣v. Let r = max{j ∶ xjn ∣v}. If i + r ≥ s, then w ∈ Ks . So we may assume that
i + r < s. By the previous claim, we obtain that Li,j ⊆ Li+r,j for all j ≤ d − (i + r − 1).
Since deg(z) ≤ d + 1 − (i + r), it follows that z ∈ Li+r . So xvr z ∈ Li+r , and then
n
v
zxr+i
n
xrn
= w ∈ Ki+r . Hence, we proved the claim.
We conclude that the number of monomials in K of degree t, where 0 ≤ t ≤ d + 1,
t−s
is equal to ∑s−1
i=0 ∣Li,t−i ∣ + ∑i=0 ∣S i ∣. Since ∣St ∣ = ∑0≤i≤t ∣S i ∣, it follows that
∣St ∣ − ∣Kt ∣ =
t
∑
i=t−(s−1)
s−1
s−1
s−1
i=0
i=0
i=0
∣S i ∣ − ∑ ∣Li,t−i ∣ = ∑ ∣S t−i ∣ − ∑ ∣Li,t−i ∣.
s−1
So H(S/K, t) = ∑s−1
i=0 H(S/Li , t − i) = ∑i=0 H(S/Ji , t − i) = H(S/J, t). In particular,
H(S/K, d) = H(S/J, d) = H(S/I, d) and
H(S/K, d + 1) = H(S/J, d + 1) ≥ H(S/I, d + 1).
Corollary 4.3. If I is a graded ideal in S containing a regular sequence f1 , . . . , fn
with deg(fi ) = ai such that fi splits into linear factors for all i, then I has the same
Hilbert function as a graded ideal in S containing xa1 1 , . . . , xann .
Since the EGH Conjecture holds when n = 2, we obtain the following.
Corollary 4.4. Let n ≥ 3. If I is a graded ideal in S containing a regular sequence
f1 , . . . , fn with deg(fi ) = ai such that fi splits into linear factors for all 3 ≤ i ≤ n,
then I has the same Hilbert function as a graded ideal in S containing xa1 1 , . . . , xann .
By 4.3, the EGH Conjecture is equivalent to the following conjecture.
Conjecture 4.5. If I is a homogeneous ideal in S containing a regular sequence
f1 , . . . , fn of degrees deg(fi ) = ai , then I has the same Hilbert function as an ideal
containing a regular sequence g1 , . . . , gn of degrees deg(gi ) = ai , where gi splits into
linear factors for all i.
5
Example 4.6. Let S = C[x1 , . . . , x5 ], fi = xi (∑i−1
j=1 −xj )+xi (∑j=i xj ) for all 1 ≤ i ≤ 5
and
1
1
1 1 ⎞
⎛ 1
−1
1
1
1
1 ⎟
⎜
⎜
⎟
1 1 ⎟.
A = ⎜ −1 −1 1
⎜
⎟
⎜ −1 −1 −1 1 1 ⎟
⎝ −1 −1 −1 −1 1 ⎠
Since det A[i1 , . . . , ir ] ≠ 0 for all 1 ≤ r ≤ 5 and 1 ≤ i1 < ⋯ < ir ≤ 5, it follows that
f1 , . . . , f5 is a regular sequence in S. Assume that I = ⟨f1 , . . . , f5 , x1 x2 + x1 x3 , x21 +
x4 x5 ⟩. In this example, we construct an ideal in S with the same Hilbert function
12
A.ABEDELFATAH
as I, using the Hilbert functions of J0 = I + ⟨x5 ⟩ and J1 = (I ∶ x5 ). Computation
with Macaulay2 shows that
HS/I = (1, 5, 8, 3, 0, 0, . . . ), HS/J0 = (1, 4, 4, 1, 0, 0, . . . ) and HS/J1 = (1, 4, 2, 0, 0, . . . )
are the Hilbert sequence of I, J0 and J1 , respectively. Denote by R the polynomial
ring C[x1 , . . . , x4 ]. Let
L0 = ⟨x21 , . . . , x24 , x1 x2 , x1 x3 ⟩ ⊂ R and L1 = ⟨x21 , . . . , x24 , x1 x2 , x1 x3 , x1 x4 , x2 x3 ⟩ ⊂ R.
Note that L0 and L1 are lex-plus-powers ideals in R. We can see that L0,0 = L0,1 =
(0) and
L0,2 = (x21 , x1 x2 , x1 x3 , x22 , x23 , x24 ),
L0,3 = (w ∶ w ∈ Mon(R3 ) and w ≠ x2 x3 x4 ),
L0,j = Rj for all j ≥ 4.
So we have HR/L0 = HS/J0 . Also, we have L1,0 = L1,1 = (0) and
So we have HR/L1
L1,2 = (x21 , x1 x2 , x1 x3 , x1 x4 , x22 , x2 x3 , x23 , x24 ),
L1,j = Rj for all j ≥ 3.
= HS/J1 . Let K to be the ideal in S generated by
Mon(L0 ) ∪ {wx5 ∶ w ∈ Mon(L1 )} ∪ {x25 }.
Then K = ⟨x21 , x22 , x23 , x24 , x25 , x1 x2 , x1 x3 , x1 x4 x5 , x2 x3 x5 ⟩. It is clear that ∣S0 /K0 ∣ = 1
and ∣S1 /K1 ∣ = 5. Since S2 /K2 = (x1 x4 , x1 x5 , x2 x3 , x2 x4 , x2 x5 , x3 x4 , x3 x5 , x4 x5 ),
it follows that ∣S3 /K3 ∣ = 8. Also we have S3 /K3 = (x2 x3 x4 , x2 x4 x5 , x3 x4 x5 ) and
Kj = Sj for all j ≥ 4. Thus
HS/K = (1, 5, 8, 3, 0, 0, . . . ) = HS/I .
6
Example 4.7. Let S = C[x1 , . . . , x6 ], fi = xi (∑i−1
j=1 −xj )+xi (∑j=i xj ) for all 1 ≤ i ≤ 5
f6
2
and f6 = x6 (−x1 − x2 − x3 − x4 − x5 + x6 ). Since f1 , . . . , f5 , x6 is a regular sequence,
it follows that f1 , . . . , f6 is a regular sequence in S. Assume that
I = ⟨f1 , . . . , f6 , x1 x2 + x3 x4 , x1 x6 + x25 , x22 x3 ⟩.
Computation with Macaulay2 shows that
HS/I =(1, 6, 14, 13, 2, 0, . . . ),
HS/I+⟨x6 ⟩ =(1, 5, 8, 2, 0, . . . ),
HS/(I∶x6 )+⟨x6 ⟩ =(1, 5, 6, 0, . . . ),
HS/(I∶x26 ) =(1, 5, 2, 0, . . . ).
Also we have
∣I2 ∩ ⟨x6 ⟩2 ∣ = ∣I2 ∩ ⟨−x1 − x2 − x3 − x4 − x5 + x6 ⟩2 ∣
and
∣(I ∶ x6 )1 ∩ ⟨x6 ⟩1 ∣ = ∣(I ∶ x6 )1 ∩ ⟨−x1 − x2 − x3 − x4 − x5 + x6 ⟩1 ∣.
We construct an ideal in S with the same Hilbert function as I, using the Hilbert
functions of I + ⟨x6 ⟩, (I ∶ x6 ) + ⟨x6 ⟩ and (I ∶ x26 ). Denote by J0 , J1 and J2 the ideals
I + ⟨x6 ⟩, (I ∶ x6 ) + ⟨x6 ⟩ and (I ∶ x26 ), respectively. Let R = C[x1 , . . . , x5 ] and L0 =
⟨x21 , . . . , x25 , x1 x2 , x1 x3 , x1 x4 x5 , x2 x3 x4 , x2 x3 x5 ⟩ ⊂ R. An easy calculation shows that
L0 is a lex-plus-powers ideal in R and HR/L0 = (1, 5, 8, 0, . . . ) = HS/I+⟨x6 ⟩ . Let
L1 = ⟨x21 , . . . , x25 , x1 x2 , x1 x3 , x1 x4 , x1 x5 , x2 x3 x4 , x2 x3 x5 , x2 x4 x5 , x3 x4 x5 ⟩ ⊂ R. We
can see that L1 is a lex-plus-powers ideal and HR/L1 = (1, 5, 6, 0, . . . ) = HS/J1 . Let
ON THE EISENBUD-GREEN-HARRIS CONJECTURE
13
L2 = ⟨x21 , . . . , x25 , x1 x2 , x1 x3 , x1 x4 , x1 x5 , x2 x3 , x2 x4 , x2 x5 , x3 x4 ⟩ ⊂ R. Also we have
that L2 is a lex-plus-powers ideal in R and HR/L2 = (1, 5, 3, 0, . . . ) = HS/J2 . Let K
to be the ideal in S generated by Mon(L0 ) ∪ {wx6 ∶ w ∈ Mon(L1 )} ∪ {wx26 ∶ w ∈
Mon(L2 )} ∪ {x36 }. The ideal K generated by
{x21 , . . . , x25 , x36 , x1 x2 , x1 x3 , x1 x4 x5 , x2 x3 x4 , x2 x3 x5 , x1 x4 x6 }
⋃
{x1 x5 x6 , x2 x4 x5 x6 , x3 x4 x5 x6 , x2 x3 x26 , x2 x4 x26 , x2 x5 x26 , x3 x4 x26 }.
Computation with Macaulay2 shows that HS/K = (1, 6, 14, 13, 2, 0, . . . ) = HS/I .
References
[1] A. Abedelfatah. Macaulay-Lex rings. Journal of Algebra, 374:122-131, 2013.
[2] A. Aramova, J. Herzog, and T. Hibi. Gotzmann Theorems for Exterior Algebras and Combinatorics. Journal of Algebra, 191(1):174-211, 1997.
[3] G. Caviglia and D. Maclagan. Some cases of the Eisenbud-Green-Harris conjecture. Mathematical Research Letters, 15(3):427-433, 2008.
[4] R.I.X. Chen. Some special cases of the Eisenbud-Green-Harris Conjecture.
[5] G.F. Clements and B. Lindström. A generalization of a combinatorial theorem of Macaulay.
Journal of Combinatorial Theory, 7(3):230-238, 1969.
[6] S.M. Cooper. Growth conditions for a family of ideals containing regular sequences. Journal
of Pure and Applied Algebra, 212(1):122-131, 2008.
[7] S.M. Cooper. The Eisenbud-Green-Harris Conjecture for Ideals of Points. 2008.
[8] D. Eisenbud, M. Green, and J. Harris. Higher Castelnuovo Theory. Astérisque, 218:187, 1993.
[9] J. Herzog and T. Hibi. Monomial Ideals, volume 260. Springer Verlag, 2010.
[10] J. Herzog and D. Popescu. Hilbert functions and generic forms. Compositio Mathematica,
113(1):1-22, 1998.
[11] G.O.H. Katona. A theorem of finite sets. Theory of graphs, pages 187-207, 1968.
[12] J.B. Kruskal. The Number of Simplices in a Complex. Mathematical optimization techniques,
page 251, 1963.
[13] F. Macaulay. Some properties of enumeration in the theory of modular systems. Proceedings
of the London Mathematical Society, 2(1):531, 1927.
[14] H. Matsumura. Commutative ring theory, volume 8 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge,, 1989.
[15] J. Mermin and I. Peeva. Lexifying ideals. Mathematical Research Letters, 13(2/3):409, 2006.
[16] B.P. Richert. A study of the lex plus powers conjecture. Journal of Pure and Applied Algebra,
186(2):169-183, 2004.
[17] DA. Shakin. Piecewise lexsegment ideals. Sbornik: Mathematics, 194:1701, 2003.
Department of Mathematics, University of Haifa, Mount Carmel, Haifa 31905, Israel
E-mail address: [email protected]
| 0math.AC
|
arXiv:1607.06334v1 [math.GR] 21 Jul 2016
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
DANIEL J. WOODHOUSE
Abstract. A group is tubular if it acts on a tree with Z2 vertex stabilizers and
Z edge stabilizers. We prove that a tubular group is virtually special if and only
if it acts freely on a locally finite CAT(0) cube complex. Furthermore, we prove
that if a tubular group acts freely on a finite dimensional CAT(0) cube complex,
then it virtually acts freely on a three dimensional CAT(0) cube complex.
1. Introduction
A tubular group G splits as a graph of groups with Z2 vertex groups and Z edge
groups. Equivalently, G is the fundamental group of a graph of spaces, denoted by X,
with each vertex space homeomorphic to a torus and each edge space homeomorphic
to S 1 × [−1, 1]. The graph of spaces X is a tubular space. In this paper all tubular
groups will be finitely generated and therefore have compact tubular spaces.
Tubular groups have been studied from various persectives: Brady and Bridson
provided tubular groups with isoperimetric function nα for all α in a dense subset
of [2, ∞) in [1]. Cashen determined when two tubular groups are quasi-isometric
[5]. Wise determined whether or not a tubular group acts freely on a CAT(0) cube
complex [11], and classified which tubular groups are cocompactly cubulated. The
author determined a criterion for finite dimensional cubulations [13]. Button has
proven that all free-by-cyclic groups that are also tubular groups act freely on finite
dimensional cube complexes [3]. The main theorem of this paper is:
Theorem 5.10. A tubular group G acts freely on a locally finite CAT(0) cube
complex if and only if G is virtually special.
Haglund and Wise introduced special cube complexes in [7]. The main consequence of a group being special is that it embeds in a right angled Artin group (see
[9] or [10] for a full outline of Wise’s program).
1.1. Structure of the Paper. In [11] Wise obtained free actions of tubular groups
on CAT(0) cube complexes by first finding equitable sets that allow the construction
e W)
of immersed walls. Such a set of immersed walls determines a wallspace (X,
e W) which G acts freely on. Wallspaces were
which yields a dual cube complex C(X,
first introduced by Haglund and Paulin [6], and the dual cube complex construction
1
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
2
was first developed by Sageev [8]. In [13] the author defined a criterion, called
dilation, that determines if an immersed wall produces infinite or finite dimensional
e W) is
cubulations. More precisely, if the immersed walls are non-dilated, then C(X,
finite dimensional. We recall the relevant definitions and background in Section 2.
Section 3 establishes a technical result using techniques from [13]. It is shown that
that immersed walls can be replaced with primitive immersed walls without losing
the finite dimensionality or local finiteness of the associated dual cube complex. The
reader is encouraged to either read this section alongside [13], or skip it on a first
reading.
e W) in the finite dimensional case to establish a set of
In Section 4 we analyse C(X,
e W) is virtually special. We decompose C(X,
e W)
conditions that imply that G\C(X,
e and then, under the assumpas a tree of spaces, with the same underlying tree as X
e W) maps G-equivariantly into
tion that the walls are primitive, we show that C(X,
e where R is the standard cubulation of R, and Γ
e is the underlying graph
Rd × Γ,
e A further criterion, the notion of a fortified immersed wall, determines when
of X.
e W) is locally finite. Combining these results allow us to give criterion for
C(X,
e W) to be virtually special.
G\C(X,
In Section 5 we consider a tubular group acting freely on a CAT(0) cube complex
e
Y . We show that we can obtain from such an action immersed walls that preserve
the important properties of Ye . More precisely, we prove the following:
Proposition 5.9. Let G be a tubular group acting freely on a CAT(0) cube complex Ye . Then there is a tubular space X and a finite set of immersed walls in X.
e W) is the associated wallspace, then
Moreover, if (X,
e W).
(1) G acts freely on C(X,
e W) is finite dimensional if Ye is finite dimensional.
(2) C(X,
e W) is finite dimensional and locally finite if Ye is locally finite.
(3) C(X,
This Proposition is sufficient to allow us to prove 5.10.
In Section 6 we further exploit the results obtained in Section 4 to obtain the
following, demonstrating that the cubical dimension of tubular groups with finite
dimensional cubulations are virtually within 1 of their cohomological dimension.
Theorem 6.2. A tubular group acting freely on a finite dimensional CAT(0) cube
complex has a finite index subgroup that acts freely on a 3-dimensional CAT(0) cube
complex.
Acknowledgements: I would like to thank Dani Wise and Mark Hagen.
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
3
2. Background Tubular Groups and their Cubulations
Let G be a tubular group with associated tubular space X and underlying graph
Γ. Given an edge e in a graph we will let −e and +e respectively denote the initial
and terminal vertices of e. Let Xv and Xe denote vertex and edge spaces in this
graph of spaces. Let X−e and X+e be the boundary circles of Xe , and denote the
−
+
+
−
+
attaching maps by ϕ−
e : Xe → X−e , and ϕe : Xe → X+e . Note that ϕe and ϕe
e denote the
respectively represent generators of Ge in Ge− and Ge+ . We will let X
eve and X
eee denote vertex and edge spaces in the universal
universal cover of X. Let X
e and let Γ
e denote the Bass-Serre tree. We will assume that each vertex
cover X,
space has the structure of a nonpositively curved geodesic metric space and that
+
attaching maps ϕ−
e and ϕe define locally geodesic curves in X−e and X+e .
2.1. Equitable Sets and Intersection Numbers. Given a pair of closed curves
in a torus α, β : S 1 → T , the intersection points are the elements (p, q) ∈ S 1 × S 1
such that α(p) = β(q). For a pair of homotopy classes [α], [β] of closed curves in a
torus T , their geometric intersection number # [α], [β] is the minimal number of
intersection points realised by a pair of representatives from the respective classes.
This number is realised by any pair of geodesic representatives of the classes. If
B = {[βi ]} is a finite set of homotopy classes of curves in T , then #[α, B] :=
P
#[α, βi ]. Viewing [α] and [β] as elements of π1 T = Z2 , we can compute that
i
# [α], [β] = det [α], [β] . Given an identification of Z2 with π1 T , the elements of
Z2 are identified with homotopy classes of curves in T , so it makes sense to consider
their geometric intersection number. An equitable set for a tubular group G is a
collection of sets {Sv }v∈Γ , where Sv is a finite set of distinct geodesic curves in Xv
disjoint from the attaching maps of adjacent edge spaces, such that Sv generate
+
a finite index subgroup of π1 Xv = Gv , and # ϕ−
e , Se− = # ϕe , Se+ ]. Note that
equitable sets can also be given with Sv a finite subset of Gv that generates a
finite index subgroup of Gv and satisfies the corresponding equality for intersection
numbers. This is how Wise formulates equitable sets, and its equivalence follows
from exchanging elements of Gv = π1 Xv with geodesic closed curves in Xv that
represent the corresponding elements. An equitable set is fortified if for each edge
−
+
+
−
−
e in Γ, there exists α+
e ∈ S+e and αe ∈ S−e such that #[αe , ϕe ] = #[αe , ϕe ] = 0.
An equitable set is primitive if every element α ∈ Sv represents a primitive element
in Gv .
2.2. Immersed Walls From Equitable Sets. Immersed walls are constructed
from circles and arcs. For each α ∈ Sv , let Sα1 be the domain of α. The disjoint union
F 1
+
Sα over all α ∈ Sv and v ∈ V Γ are the circles. Since #[ϕ−
e , Se− ] = #[ϕe , Se+ ],
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
4
there exists a bijection from the intersection points between curves in S−e and ϕ−
e,
+
−
−
1
and the intersection points between curves in S+e and ϕe . Let (p , q ) ∈ Sα− × Xe−
and (p+ , q + ) ∈ Sα1 + be corresponding intersection points between α± ∈ S±e and ϕ±
e.
−
+
∼
Then an arc a = [0, 1] has its endpoints attached to p and p . The endpoints of a
are mapped into X−e ∩Xe and X+e ∩Xe , so the interior of a can be embedded in Xe .
After attaching an arc for each pair of corresponding intersection points, we obtain a
set {Λ1 , . . . , Λn } of connected graphs that map into X, called immersed walls. Each
graph Λi has its own graph of groups structure with infinite cyclic vertex groups
and trivial edge groups. As in [13], all “immersed walls” in this paper are
immersed walls constructed from equitable sets as above.
This means
that we are free use the results obtained in [13].
ei → X
e is a two sided embedding in X,
e separating X
e into two halfspaces.
A lift of Λ
e i to X
e are horizontal walls Wh . The vertical walls
The images of the lifts of Λ
Wv are obtained from the lifts of curves αe : S 1 → Xe given by the inclusion
S 1 × {0} ֒→ S 1 × [−1, 1]. The set W = Wh ⊔ Wv of all horizonal and vertical walls
e W) where the G-action on X
e also gives an action on W. The
gives a wallspace (X,
main theorem of [11] is that a tubular group acts freely on a CAT(0) cube complex
if and only if there exists an equitable set.
A set of immersed walls is fortified if they are obtained from a fortified equitable
set. A set of immersed walls is primitive if they are obtained from a primitive
equitable set.
e and Λ
e ′ be horizontal walls in X.
e An point x ∈ Λ∩
e Λ
e is a regular intersection
Let Λ
eve, and the lines Λ∩
e X
eve and Λ
e′ ∩ X
eve are non-parallel.
point if it lies in a vertex space X
′
e ∩Λ
e is a non-regular intersection point, and either x ∈ X
eve
Otherwise, a point x ∈ Λ
′
e∩X
eve = Λ
e ∩X
eve, or x ∈ X
eee.
where Λ
An infinite cube in a CAT(0) cube complex Ye , is an sequence of c0 , c1 , . . . , cn , . . .
such that cn is an n-cube in Ye , and cn is a face of cn+1 . In [13] a dilation function
is constructed for each immersed wall R : π1 Λ → Q∗ , and an immersed wall is said
to be dilated if R has infinite image. The following is Thm 1.2 from that paper:
e W) the wallspace obtained from a
Theorem 2.1. Let X be tubular space, and (X,
finite set of immersed walls in X. The following are equivalent:
e W) is infinite dimensional.
(1) The dual cube complex C(X,
e W) contains an infinite cube.
(2) The dual cube complex C(X,
(3) One of the immersed walls is dilated.
The following result is also obtained from [13] by combining Thm 1.2, Prop 4.6,
and Prop 3.4. The last part follows from the last paragraph of the proof of Prop
3.4.
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
5
e W) the wallspace obtained from
Proposition 2.2. Let X be tubular space, and (X,
e W) is infinite dimensional, then W
a finite set of immersed walls in X. If C(X,
contains an set of pairwise regularly intersecting walls of infinite cardinality, that
e W). Moreover, the infinite
correspond to the hyperplanes in an infinite cube in C(X,
cube contains a canonical 0-cube.
3. Primitive Immersed Walls
The following result uses the techniques in Section 5. of [13] to compute the
dilation function. Let Λ be an immersed wall in X, and let R : π1 (Λ) → Q∗ be
its dilation function. If R has finite image then Λ is non-dilated. Let q : Λ → Ω
be the quotient map obtained by crushing each circle to a vertex. Note that the
arcs in Ω correspond to the arcs in Λ. The dilation function R factors through
q∗ : π1 Λ → π1 Ω, so there exists a function R̂ : π1 Ω → Q∗ such that R = R̂ ◦ q∗ . We
can therefore determine if Λ is dilated by computing the function R̂.
We orient each arc in Λ so that all arcs embedded in the same edge space are
oriented in the same direction. We orient the arcs in Ω accordingly. We define a
weighting ω : E(Ω) → Q∗ . Let Xe be an edge space in X, and let σ be an arc
mapped into Xe connecting the circles C − and C + . Let α− : C − → X−e and
α+ : C + → X+e be the corresponding elements in the equitable set. Then
ω(σ) =
−
#[ϕ−
e ,α ]
.
+
#[ϕ+
e ,α ]
If γ = σ1ǫ1 · · · σnǫn is an edge path in Ω where σi is an oriented arc in Ω, and ǫ ∈ ±1,
then R̂(γ) = ω(σ1 )ǫ1 · · · ω(σn )ǫn .
Lemma 3.1. Let X be a tubular space, and let G = π1 X. Let Λ1 , . . . Λk be a set
of immersed walls in X obtained from an equitable set {Sv }v∈Γ . Then there exists
a set of primitive immersed walls Λ′1 , . . . , Λ′ℓ in X obtained from an equitable set
{Sv′ }v∈Γ . Moreover:
(1) If Λ1 , . . . , Λk are non-dilated, then so are Λ′1 , . . . Λ′ℓ .
(2) If Λ1 , . . . Λk , are fortified, then so are Λ′1 , . . . Λ′ℓ .
Proof. Each Λi decomposes as the union of disjoint circles, which are the domain of
locally geodesic closed paths in the equitable set and arcs. Suppose that αn ∈ Sv ,
where [α] ∈ π1 Xv = Gv is primitive. Let Λi be the immersed wall containing the
circle Sα1 n corresponding to αn .
A new equitable set is obtained by replacing αn in Sv with n locally geodesic
curves {αi : Si1 → Xv }ni=1 with disjoint images in Xv that are isotopic to α in
ev . This remains an equitable set since #[αn , γ] = n#[α, γ] = Pn #[αi , γ] for
X
i=1
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
6
any locally geodesic curve γ in Xv . New immersed walls are obtained from Λi by
replacing Sg1n with S11 , . . . Sn1 and reattaching the arcs that were attached to the
intersection points in Sα1 n to the corresponding intersection points on S11 , . . . Sn1 . Let
Λi1 , . . . , Λiℓ be the new set of immersed walls obtained in this way. Note that each
arc in Λi1 , . . . , Λiℓ , corresponds to a unique arc in Λi .
Assume that Λi is non-dilated. We claim that the new immersed walls Λi1 , . . . , Λiℓ
are also non-dilated. Let qi : Λi → Ωi and qij : Λij → Ωij be the quotient maps
obtained by crushing the circles to vertices. Let u be the vertex in Ωi corresponding
to Sα1 n . Let Ri : π1 Λi → Q∗ and Rij : π1 Λij → Q∗ be the dilation functions. Let
R̂i : π1 Ωi → Q∗ and R̂ij : π1 Ωij → Q∗ be the unique maps such that Ri = R̂i ◦ qi
and Rij = R̂ij ◦ qij . Let ωi and ωij be the respective weightings of the arcs in Ωi
and Ωij . By assumption, Ri and R̂i have finite image. As the arcs in Λij correspond
to arcs in Λi , there is a map ρi : Ωij → Ωi . We show Λij is non-dilated by showing
that R̂ij (γ) = R̂i (ρi ◦ γ).
−1
Let σ be an oriented arc in Ωij . The edge qij
(σ) embeds in an edge space Xe .
ǫ
−1
If the vertices of σ are disjoint from ρ (u), then ωij (σ ǫ ) = ωi (ρij ◦ σ ǫ ). If the
1
1
endpoints of σ ǫ are contained in ρ−1
ij (v), and correspond to the circles Sι and Sτ
then
ωij (σ ±1 ) =
n
#[ϕ∓
n#[ϕ∓
#[ϕ∓
e , αι ]
e , αι ]
e ,α ]
=
=
= ω(ρij ◦ σ ±1 ).
±
±
n]
#[ϕ±
,
α
]
n#[ϕ
,
α
]
#[ϕ
,
α
e
e
e
τ
τ
ǫ
Suppose that exactly one endpoint of σ ǫ is contained in ρ−1
ij (u). If σ terminates
1
a vertex in ρ−1
ij (u) corresponding to Sτ , and the initial vertex corresponds to a circle
that is the domain of a locally geodesic curve β then
ωij (σ ±1 ) =
n#[ϕ∓
n#[ϕ∓
#[ϕ∓
e , β]
e , β]
e , β]
=
=
= nω(ρij ◦ σ ±1 ).
±
±
±
#[ϕe , ατ ]
n#[ϕe , ατ ]
#[ϕe , αn ]
1
If σ ǫ starts at a vertex in ρ−1
ij (u) corresponding to Sι , and the terminal vertex
correspond to a circle that is the domain of a locally geodesic curve β then
ωij (σ ±1 ) =
n
n#[ϕ∓
#[ϕ∓
1
#[ϕ∓
e , αι ]
e ,α ]
e , αι ]
=
=
= ω(ρij ◦ σ ±1 ).
±
±
±
n
#[ϕe , β]
n#[ϕe , β]
n#[ϕe , β]
Therefore, given an edge path γ in Ωij , since the number of edges exiting vertices
in ρ−1
ij (v) is the same as the number of vertices entering, R̂ij (γ) = R̂i (ρi ◦ γ).
This procedure produces immersed walls with one fewer non-primitive element in
the equitable set. Repeating this procedure for each non-primitive element in the
equitable set produces a primitive set of non-dilated immersed walls. It is also clear,
that if Λ1 , . . . , Λk are fortified, then so are the new immersed walls.
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
7
4. Finite Dimensional Dual Cube Complexes
e W) be the wallspace obtained
Let X be a tubular space and let G = π1 X. Let (X,
from a set of non-dilated immersed walls Λ1 , . . . Λk constructed from an equitable
set, and a vertical immersed wall in each edge space. We emphasize that in this
section all immersed walls are assumed to be non-dilated, even when it
e = C(X,
e W) and let Z = G\Z.
e By Theorem 2.1,
is not explicitly stated. Let Z
e being finite dimensional.
the immersed walls being non-dilated is equivalent to Z
e let Λ
e ee denote the vertical wall in X
eee.
For each edge ee in Γ
We refer to [12] for full background on the dual cube complex construction. A
e is a choice of halfspace z[Λ]
e of Λ
e for each Λ
e ∈ W such that
0-cube z in Z
e1, Λ
e 2 ∈ W, then z[Λ
e 1 ] ∩ z[Λ
e 2 ] 6= ∅.
(1) If Λ
e ∈ W such that x ∈
e
(2) If x ∈ X, then there are only finitely many Λ
/ z[Λ].
e = z2 [Λ]
e for all but precisely one hyperplane
Two 0-cubes z1 , z2 are adjacent if z1 [Λ]
e 12 ∈ W. The 1-cube joining z1 and z2 is dual to the hyperplane corresponding to
Λ
e 12 . An n-cube is then present wherever the 1-skeleton of an n-cube appears. We
Λ
e Λ
e ′ face each other in z if z[Λ]
e is not contained in z[Λ
e ′]
say that two disjoint walls Λ,
and vice versa.
e Therefore Ze decomProposition 4.1. There is a G-equivariant map f : Ze → Γ.
−1
−1
eee = f (e
poses as a tree of spaces with Zeve = f (e
v ), and Z
e) is the carrier of the
e ee ∈ Wv .
hyperplane corresponding to Λ
e such that f (c) = e.
By f −1 (e) we mean the union of all cubes c in Z
Proof. As there is a vertical wall in each edge space, and since the vertical walls are
e Wv ) with the Bass-Serre tree Γ
e of X.
e We define a
all disjoint we can identify C(X,
e let z be a 0-cube in Z, then define f (z) by letting f (z)[Λ
e e ] = z[Λ
e e ].
map f : Ze → Γ:
e 6= z2 [Λ]
e for precisely one wall Λ
e ∈ W. If Λ
e
If z1 , z2 are adjacent 0-cubes, then z1 [Λ]
is a horizontal wall then f (z1 ) = f (z2 ) and the 1-cube joining them is also mapped
e=Λ
e e ∈ Wv then f (z1 ) and f (z2 ) are adjacent in Γ,
e so the
to the same vertex. If Λ
1-cube joining z1 and z2 maps to the edge joining f (z1 ) and f (z2 ). As f is defined
e Then
on the 1-skeleton, the map extends uniquely to the entire cube complex Z.
eve = f −1 (e
Z
v ) and Zeee = f −1 (e
e) is the carrier of the hyperplane corresponding to
e
Λe .
Proposition 4.1 implies that Z decomposes as a graph of spaces with vertex spaces
e
Zv , edge spaces Ze , and underlying graph Γ = G\Γ.
The following proposition, which collects the principal consequences of finite dimensionality, is Prop 4.12 in [13].
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
8
Proposition 4.2. Let X be tubular space with geodesic attaching maps, and let
e W) be the wallspace obtained from a finite set of immersed walls in X. If the
(X,
e W) is finite dimensional, then the horizontal walls in W
dual cube complex C(X,
can be partitioned into a collection P of subsets such that:
(1) The partition P is preserved by G,
(2) For each A ∈ P, the walls in A are pairwise non-intersecting.
e ∈ A ∈ P be a wall intersecting X
eve. There exists h ∈ Gve stabilizing an
(3) Let Λ
eve perpendicular to Λ
e ∩X
eve such that A = {hr Λ}
e r∈Z .
axis in X
Any partition of the horizontal walls in W satisfying conditions (1)-(3) in Proposition 4.2 will be called a stable partition.
e W) be the wallspace obtained from a
Lemma 4.3. Let X be a tubular space and (X,
finite set of immersed walls in X. Let P be a stable partition of the horizontal walls
e only finitely many A ∈ P contain walls intersecting
in W. Then for each ve ∈ Γ,
eve.
X
e is a wall intersecting X
eve, then, by condition (3) of a stable
Proof. Suppose that Λ
e ∩X
eve such that
partition, there exists some h ∈ Gve that is perpendicular to Λ
e r∈Z ∈ P. By G-invariance we can deduce that each of the Gve-translates of
{hr Λ}
e r∈Z is also in P. There are only finitely many such translates, therefore each
{hr Λ}
eve is contained in finitely many elements of P. The claim then
Gve-orbit of a wall in X
follows from the fact that there are only finitely many Gve-orbits of walls intersecting
eve.
X
The immersed walls Λ1 , . . . , Λk are non-dilated, and therefore Ze is finite dimensional, so by Proposition 4.2 there exists a stable partition P of the horizontal walls
eve. Let Pee be the
in W. Let Pve be the subpartition containing walls intersecting X
eee. By Lemma 4.3, both Pve and Pee are finite subsubpartition of walls intersecting X
partitions. If ee is incident to the vertex e
v , then Pee ⊆ Pve. Let Pve = {A1 , . . . , Adve }.
e i }r∈Z such that hi ∈ Gve stablizes an
By criterion (3) of a stable partition Ai = {hri Λ
eve perpendicular to Λ
ei ∩ X
eve. The action of Gve preserves both the partition
axis in X
Pve and the ordering of the walls in each Ai .
Let R denote the cubulation of R with a vertex for each integer and an edge
joining consecutive integers. Therefore, each 0-cube in Rd is an element of Zd . We
construct a free action of Gve on Rdve . Let g ∈ Gve and let (α1 , . . . , αdve ) be a 0-cube
e i = hβj Λ
ej.
in Rdve . Define the map g · (α1 , . . . , αdve ) = (β1 , . . . , βdve ) such that g · hiαi Λ
j
d
As g permutes the walls in Pve, the map g is a bijection on the 0-cubes in R ve . If
e i = hβj Λ
e j , then necessarily g · hαi +1 Λ
e i = hβj ±1 Λ
e j , so adjacent 0-cubes are
g · hαi i Λ
j
i
j
mapped to adjacent 0-cubes and the map extends to an isomorphism of Rdve . If
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
9
g · (α1 , . . . , αdve ) = (α1 , . . . , αdve ) then g would stabilize all the walls in Pve, which
eve. Since Gve acts freely on Z
eve this would
would imply that it fixed every 0-cube in Z
imply that g = 1G , and hence Gve acts freely on Rdve .
eve then every wall
We also define an embedding φve : Zeve → Rdve . If z is a 0-cube in Z
e that is either vertical or not in contained in the subpartition Pve has X
eve ⊆ z[Λ].
e
Λ
e for Λ
e in Pve. For 1 ≤ i ≤ de
Therefore z is entirely determined by z[Λ]
v the set
r
ei ∩ X
eve}r∈Z is an infinite collection of disjoint parallel lines in X
eve. As all the
{hi Λ
e for each 0-cube z in Zeve there exists a unique αi ∈ Z
walls in Ai are disjoint in X,
αi e
αi +1 e
such that hi Λi and hi
Λi face each other in z. Let φve(z) = (α1 , . . . , αdve ). Note
that the map is injective and sends adjacent 0-cubes to adjacent 0-cubes, so the
map on the 0-cubes extends to an embedding of the entire cube complex.
eve → Rdve is Gve-equivariant.
Lemma 4.4. The embedding φve : Z
Proof. Let g ∈ Gve. If φve(z) = (α1 , . . . , αdve ) and g · φve(z) = (β1 , . . . , βdve ), then
e i ] = z[ghαi Λ
e i ] = z[hβj Λ
e j ], which implies that φve(gz) = (β1 , . . . , βd ) =
(gz)[hαi i Λ
i
j
v
e
gφve(z).
Let ee be an edge adjacent to e
v . Then either +e
e = ve or −e
e = ve. We define a free
d
e
action of Gee on R × [−1, 1]. After reindexing, let Pee = {A1 , . . . , Ade } ⊆ Pve where
dee ≤ dve. Let (α1 , . . . , αde , ±1) be a 0-cube in Rd × [−1, 1] and let g ∈ Gee. Then
e i = hβj Λ
e j . As in the case
g · (α1 , . . . , αde , ±1) = (β1 , . . . , βde , ±1) such that g · hαi i Λ
j
of vertex spaces, this map extends to an isomorphism of Rde × [−1, 1].
As with the vertex spaces, there is a Gee-equivariant embedding φee : Zeee →
d
R e × [−1, 1]. Let z be a 0-cube in Zeee. Then for each 1 ≤ i ≤ dee there exe i faces hαi +1 Λ
e i in z, and X
e±ee ⊆ z[Λ
e ee]. Define
ists a unique αi such that hαi i Λ
i
φee(z) = (α1 , . . . , αde , ±1).
Let ve = ±e
e. The free action of Gve on Rdve restricts to a free action of Gee. We
claim that we can embed Rde × {±1} into Rdve in a Gee-equivariant way. Let Hee ⊆ Ze
e e . As Zeee is the carrier of Hee, we can identify
be the hyperplane corresponding to Λ
eee with Hee × [−1, 1]. Note that Hee × {±1} embeds as a subspace in Zeve, and φee
Z
de
restricts to an embedding φ±
e = ±e
e.
ee : Hee × {±1} → R , where v
±
d
d
e
v
e
We construct an embedding Ψee : R → R . Recall that Pee = {A1 , . . . , Ade } ⊆
e j ∈ Aj , then X
eee ⊆ z[hr Λ
e
Pve = {A1 , . . . , Adve }. For dee < j ≤ dve if hrj Λ
j j ] for all 0-cubes
αe
αe +1
e j faces h j
z in Zeee. Therefore, there is a unique αeje ∈ Z such that hj j Λ
j
e
0-cube z in Zee and dee < j ≤ dve. Thus we define
ee
ee
Ψ±
ee (α1 , . . . , αde ) = (α1 , . . . , αde , αde +1 , . . . , αdve ).
The Gee-equivariance of Ψ±
ee will require a further assumption:
e j for every
Λ
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
10
Lemma 4.5. The following commutative square is Gee-equivariant provided the immersed walls are primitive.
Hee × {±1}
φ±
e
/ Rde
_
φve
Zeve
Ψ±
e
/ Rdve
Moreover, Ψ±
ee is a Gee-equivariant inclusion that is equivalent to extending the Geed
action on R e by a trivial action on Rdve −de .
Proof. Let z be a 0-cube in Hee × {±1}. Then by construction
±
ee
ee
Ψ±
e(z).
ee ◦ φee (z) = (α1 , . . . , αde , αde +1 , . . . , αdve ) = φv
To verify that Ψee is Gee-equivariant, let g ∈ Gee. For 1 ≤ i ≤ dee there exists
e i = hβj Λ
e j . For dee < i ≤ dve the intersection
1 ≤ j ≤ dee and βj be such that g · hαi i Λ
j
ei ∩ X
eve is a geodesic line parallel to X
eee ∩ X
eve. Thus, Gee stabilizes Λ
ei ∩ X
eve. As the
Λ
e
immersed walls are primitive we can deduce that Gee stabilizes Λi . For dee < i ≤ dve
e i = hα Λ
e i for α ∈ Z, and conclude:
we deduce that g · hα Λ
i
i
g · Ψee(α1 , . . . , αee) = g · (α1 , . . . , αde , αedee +1 , . . . , αedeve )
= (β1 , . . . , βde , αedee +1 , . . . , αedeve )
= Ψee(β1 , . . . , βee)
= Ψee(g · (α1 , . . . , αee)).
Observe that Gee acts trivially on the last dve − dee coordinates.
e which is finite, since there are only finitely many
Let d = max{|Pve| | ve ∈ V Γ},
vertex orbits.
Proposition 4.6. If the immersed walls Λ1 , . . . , Λk are primitive, then G acts freely
e such that the action on the Γ
e factor is the action of G on the Bass-Serre
on Rd × Γ
e
tree. Moreover, there is a G-equivariant embedding φ : Ze → Rd × Γ.
Proof. The Gve and Gee-actions on Rdve and Rde can be equivariantly extended to
actions on Rd such that Gve and Gee act trivially on the additional factors. Therefore,
the Gee-commutative square in Lemma 4.5 can be extended:
Hee × {±1}
φ±
e
/ Rde
/ Rd
_
eve
Z
φve
Ψ±
e
/ Rdve
/ Rd
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
11
e and a G-equivariant embedding of the
Therefore, we obtain a G-action on Rd × Γ
e
tree of spaces Ze → Rd × Γ.
Proposition 4.7. Ze is locally finite if and only if Λ1 , . . . , Λk are fortified.
eve and an
Proof. If Λ1 , . . . , Λk is not fortified, then there exists a vertex space X
eee such that every horizontal wall Λ
e in Pve intersects X
eve as a
adjacent edge space X
e∩X
eve that intersects X
eve ∩ X
eee. Therefore, every horizontal wall intersecting
line Λ
eve intersects X
eee, so Pee = Pve. Let ee1 , . . . , eei , . . . be an enumeration of the Gve-orbit
X
e ee intersects all the horizontal walls in Pve.
of ee. Then Peei = Pve and Λ
i
e = z[Λ]
e for Λ
e 6= Λ
e ee ,
Let z be a 0-cube in Zeve. There is a 0-cube zi such that zi [Λ]
i
e ee,
e
e
and zi [Λeei ] 6= z[Λeei ]. To verify zi is a 0-cube note that every wall in Pve intersects Λ
e that is not Λ
e e has X
eee ⊆ zi [Λ].
e Therefore zi [Λ
e ee] ∩ zi [Λ]
e 6= ∅ for
and every other wall Λ
e ∈ W − {Λ
e ee}. For any walls Λ
e 1, Λ
e 2 ∈ W − {Λ
e ee} the intersection zi [Λ
e 1 ] ∩ zi [Λ
e 2] =
all Λ
e 1 ] ∩ z[Λ
e 2 ] 6= ∅. Finally, if x ∈ X,
e then x ∈ zi [Λ]
e for all but finitely many Λ
e ∈ W,
z[Λ
because it is true for z, which differs from zi on precisely one wall. Each zi is
adjacent to z since they differ on precisely one wall, so z1 , . . . , zi , . . . is an infinite
e is not locally finite.
collection of distinct 0-cubes adjacent to z, and Z
To show that converse, we first observe that the embedding φve : Zeve → Rdve
proves that Zeve is always locally finite, irrespective of whether the immersed walls
eve, and let u
e via an edge ee.
are fortified. Let z be a 0-cube in Z
e be adjacent to ve in Γ
eue such that z[Λ]
e = zee[Λ]
e for
Then z can be adjacent to at most one 0-cube zee in Z
e ∈ W except Λ
e e . This zee may not always define a 0-cube however. Let ee be an
all Λ
e r∈Z ∈ Pve
edge adjacent to ve. As the immersed walls are fortified there exists {hr Λ}
e ∩X
eve}r∈Z is an infinite set of lines parallel to X
eee ∩ X
eve. As {hr Λ}
e is a
such that {hr Λ
e and hr+1 Λ
e are facing in z. There
set of disjoint walls, there exists r such that hr Λ
eg ee ⊆ z[hr Λ]
e ∩ z[hr+1 Λ].
e
are only finitely many edges g1 ee, . . . , gm ee ∈ Gveee such that X
i
r
r+1
eg ee is not contained in z[h Λ]
e ∩ z[h Λ],
e then either
If ge
e is an edge such that X
i
r
r+1
e ∩ zgee [Λ
e e ] = ∅ or zgee [h Λ]
e ∩ zgee [Λ
e e ] = ∅ so zgee is not a 0-cube. As there are
zgee [h Λ]
only finitely many Gve-orbits of edges incident to ve we conclude that zeee is a 0-cube
for finitely many edges ee incident to ve.
Proposition 4.8. If Λ1 , . . . , Λk are primitive, fortified, non-dilated immersed walls,
then G is virtually special.
Proof. By Proposition 4.6, There is a free action of G on Rd × Aut([−1, 1]d ), so G is
e ∼
e Therefore, there is a
a subgroup of Isom(Rd × Γ)
= Zd ⋊ Aut([−1, 1])d × Aut(Γ).
d
d
projection ρ : G → Z ⋊ Aut([−1, 1] ). Each vertex group Gve embeds in Zd , and the
mapping is invariant under conjugation. As there are only finitely orbits of vertices in
e there exists a finite index subgroup (DZ)d 6 Zd such that if ee is incident to ve then
Γ,
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
12
Gee∩(DZ)d is generated by a primitive element in Gve ∩(DZ)d . Let G′ = ρ−1 (DZ)d .
e such that
Then G′ 6 G is a finite index subgroup that embeds in (DZ)d × Aut(Γ)
each edge group is generated by an element that is primitive in the adjacent vertex
e
groups. By Proposition 4.6 there is a G-equivariant embedding φ : Ze → Rd × Γ.
As G′ does not permute the factors of Rd we can deduce that the hyperplanes in
e /G do not self-intersect, so neither do the hyperplanes in Z/G
e ′ . Indeed,
Rd × Γ
they are also 2-sided and cannot inter-osculate.
Let G′′ be a finite index subgroup such that the underlying graph Γ′′ has girth
at least 2. Let ee be an edge such that +e
e = ve. As Λ1 , . . . , Λk are fortified, we
+
e
conclude that dve > dee and Zee is a proper subcomplex of Zeve. As G′′ee is primitive, if
e d 6= hr Λ
e
ee in a direction
g ∈ G′′ve − G′′ee then ghrdve Λ
dve dve as g acts by translation on Xv
v
e
ed ∩ X
eve. Thus, Ze± is not stabilizes by g, so we can deduce that
non-parallel to Λ
v
e
ee
StabG′′ (Ze+ ) = G′′ . Therefore, G′′ \Ze+ embeds in G′′ \Zeve.
v
e
ee
ee
ee
ee
v
e
e Let z be a 0-cube in Zv′′ . Let He be the vertical hyperplane
Let Z ′′ = G′′ \Z.
contained in Ze′′ , and dual to an edge incident to v. As the attaching maps of Ze′′ are
embeddings, and Γ′′ has girth at least s, we deduce that z can only be incident to
one end of a single 1-cube intersected by He . Therefore He does not self-osculate.
e that projects to a 1-cube in Rd . The G′′ -orbit of
Let σ be a 1-cube in Rd × Γ
σ is a set of 1-cubes, that all project to the same factor of Rd , since G′′ does not
permute the factors of Rd . As G′′ does not invert hyperplanes, after subdividing Rd
we can assume that the G′′ -orbit of σ is a disjoint set of 1-cubes. Therefore, after
the corresponding subdivision, we conclude that the horizontal hyperplanes in Z ′′
don’t self-osculate.
We note that the requirement in Proposition 4.8 that the immersed walls are
fortified is necessary, as the following example demonstrates.
Example 4.9. Let G = ha, b, t | [a, b] = 1, tat−1 = ai. We can decompose G as the
cyclic HNN extension of the vertex group Gv = ha, bi with stable letter t. Thus,
G is a tubular group. Let X be the corresponding tubular space with a single
vertex space Xv and edge space Xe . There is an equitable set {α1 , α2 } where α1
is a geodesic curve in Xv representing ab ∈ Gv , and α2 is a geodesic curve in Xv
−
representing ab−1 ∈ Gv . Note that each attaching map ϕ+
e and ϕe intersects each
curve in the equitable set precisely once. Therefore, we obtain a pair of embedded
immersed horizontal walls Λ1 and Λ2 , by connecting respective intersection points
−
with ϕ+
e and ϕe by an arc. A vertical wall Λe is also embedded in Xe .
e W) we can decompose W into three sets of disjoint walls: the
In the wallspace (X,
walls W1 that cover Λ1 , the walls W2 that cover Λ2 , and the walls We that cover Λe .
These walls are disjoint since the immersed walls are embedded. Furthermore, the
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
13
e W) =
walls in different sets pairwise intersect. Therefore we can conclude that C(X,
e As this is not locally finite, G\C(X,
e W) cannot be virtually special.
R2 × Γ.
5. Revisiting Equitable Sets
Although Wise proved in [11] that acting freely on a CAT(0) cube complex Ye
implied the existence of an equitable set, and thus a system of immersed walls
as in Section 2, no relationship was established between Ye and the resulting dual
e W). Proposition 5.9 gives the relationship required to reduce Theorem 5.10
C(X,
to considering cubulations obtained from equitable sets.
This section will apply the following theorem from [14]. A cubical quasiline is a
CAT(0) cube complex quasi-isomorphic to R.
Theorem 5.1. Let G be virtually Zn . Suppose G acts properly and without inversions on a CAT(0) cube complex Ye . Then G stabilizes a finite dimensional
e ⊆ Ye that is isometrically embedded in the combinatorial metric, and
subcomplex Z
Q
m
e∼
Z
= i=1 Ci , where each Ci is a cubical quasiline and m ≥ n. Moreover, StabG (Λ)
e
is a codimension-1 subgroup for each hyperplane Λ in Z.
Theorem 5.1 allows us to prove the following:
Lemma 5.2. Let G be a tubular group acting freely on a CAT(0) cube complex Ye .
ev ⊆ Ye
Let Gv be a vertex group in G, then there exists a Gv -equivariant subspace X
eve has a metric such that the intersection of a
homeomorphic to R2 . Moreover, X
ev is either empty, or a geodesic line.
hyperplane in Ye with X
Proof. By Theorem 5.1, there exists a Gv -equivariant subcomplex Yev ⊆ Ye that isoQm
metrically embeds in the combinatorial metric, and such that Yev ∼
= i=1 Ci where
each Ci is a cubical quasiline. By the flat torus theorem [2], Gv stabilizes a flat
ev ⊆ Yev , that is a convex subset in the CAT(0) metric of Yev . As the stabilizers of
X
hyperplanes in Yev are codimension-1 subgroups of Gv , the intersection of a hyperev is either empty or a geodesic line in the CAT(0) metric inherited
plane in Ye with X
from Yev .
If S is a subset of a CAT(0) cube complex Ye , then let hull(S) denote the combinatorial convex hull of S. The combinatorial convex hull of S is the minimal convex
subcomplex containing S. Equivalently, hull(S) is the intersection of all closed halfspaces containing S.
Definition 5.3. Let X be a tubular space and let Y be a nonpositively curved cube
complex. A map f : X → Y is an amicable immersion if:
(1) f∗ : π1 X → π1 Y is an isomorphism.
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
14
e → Ye embeds each vertex space X
eve in Ye .
(2) The G-equivariant map fe : X
e
e
(3) Each Xve has a Euclidean metric such that if H ⊆ Y is a hyperplane, then
eve is either the empty set, or a single geodesic line in
the intersection H ∩ X
eve.
X
eee is emdedded transverse to the hyperplanes.
(4) Each edge space X
eve .
eee is contained in hull S
X
(5) Each X
e
v
e∈V Γ
eve is not the subspace metric induced from
Note that the Euclidean metric on each X
e
Y.
Lemma 5.4. Let X be a tubular space and let Y be a nonpositively curved cube
complex. Let F : π1 X → π1 Y be an isomorphism. Then there is an amicable
immersion f : X → Y such that f∗ = F .
Proof. Use F to identify G = π1 X with π1 Y . The claim is proven by constructing
e → Ye . By Lemma 5.2 for each
a G-equivariant map between the tree of spaces X
e we can Gve-equivariantly embed a Euclidean flat X
eve in Ye such that if H ⊆ Ye
ve ∈ V Γ,
eve is either the empty set, or a single
is a hyperplane, then the intersection H ∩ X
S
ee is G-equivariant. The
eve. Moreover, we can ensure that
geodesic line in X
e Xv
v
e∈V Γ
eee can then be inserted transverse to the hyperplanes in Ye so that the
edges spaces X
eee ∩ X
eve with adjacent vertex spaces is not contained in a hyperplane
intersections X
eve .
eee is contained inside hull S
X
in Ye , and X
e
v∈V Γ
e
Lemma 5.5. Let X → Y be an amicable immersion, where Y is finite dimensional.
e then hull(X
eve) embeds as a subcomplex of Rd for some d.
If ve is a vertex in Γ,
eve). If H is a hyperplane in Ye ,
Proof. Let G = π1 X. Let y be a 0-cube in hull(X
let y[H] denote the halfspace of H containing y. Each 0-cube is determined by
the halfspace containing it for each hyperplane. If H is a hyperplane that doesn’t
eve, then y[H] is the halfspace containing X
eve, and therefore is y[H] fixed
intersect X
eve).
for all 0-cubes y in hull(X
eve. Let H ∈ Hve. The intersection
Let Hve denote the hyperplanes intersecting X
e
e
Xve ∩ H is a geodesic line in Xve. Let g ∈ Gve be an isometry that stabilizes an
eve that is not parallel to X
eve ∩ H. Then {gr H}r∈Z is an infinite family of
axis in X
eve}r∈Z is a set of disjoint parallel lines in X
eve. As
hyperplanes such that {gr H ∩ X
Ye is finite dimensional, there exists an N such that H and g N H do not intersect.
Otherwise {gr H}r∈Z would be an infinite set of pairwise intersecting hyperplanes,
which would imply that there are cubes of arbitrary dimension in Ye .
Therefore, as there are only finitely many Gve-orbits of hyperplanes intersecting
eve, there exists a finite set of hyperplanes H1 , . . . , Hd ∈ Hve and g1 , . . . , gd ∈ G such
X
that Hve = {g1r H1 , . . . , gdr Hd }r∈Z , and each {gir Hi }r∈Z is a disjoint set of hyperplanes
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
15
e r∈Z is a set of disjoint geodesic lines in X
eve. Thus,
in Ye . Therefore {gir Hi ∩ E}
given a 0-cube y, there exists a unique yi ∈ Z such that y[giyi Hi ] and y[giyi +1 Hi ]
eve) → Rd by letting
properly intersect each other. Therefore, construct φ : hull(X
φ(y) = (y1 , . . . , yd ) for each 0-cube y. The map φ extends to the 1-skeleton of
eve) since adjacent 0-cubes lie on the opposite sides of precisely one hyperplane.
hull(X
eve).
Therefore φ extends to the higher dimensional cubes, and thus hull(X
e → Ye be the lift of the universal cover of an amicable immersion X → Y .
Let X
eee be an edge space adjacent to a vertex space X
eve. A hyperplane H in Ye
Let X
eve parallel to X
eee if H ∩X
eve is a geodesic line parallel to X
eee∩X
eve. Otherwise,
intersects X
eve is a geodesic line that is not parallel to X
eee ∩ X
eve, then we say H intersects
if H ∩ X
eve non-parallel to X
eee.
X
e Suppose
Lemma 5.6. Let X → Y be an amicable immersion. Let ee be an edge in Γ.
e−ee non-parallel to X
eee, then H intersects
that H ⊆ Ye is a hyperplane intersecting X
e+ee non-parallel to X
eee. Moreover, there is an arc in H ∩ X
eee joining H ∩ X
e−ee to
X
e+ee .
H ∩X
e−ee and X
eee ∩ X
e−ee are non parallel
Proof. Let G = π1 X. The geodesic lines H ∩ X
e−ee , and therefore intersect in a single point p ∈ X
eee ∩ X
e−ee . As H is two sided
in X
in Ye and X the vertex and edge spaces are transverse to H, the intersection of H
e Therefore, p is contained inside a curve in
with X is also locally two sided in X.
e
e
H ∩ Xee. As Xee is Gee-invariant and only finitely many hyperplanes separate any two
e we can deduce that p is an endpoint of a compact curve in H ∩ X
eee
points in X,
e+ee ∩ X
eee. Thus, H must also intersect X
e+ee
with its other endpoint contained in X
eee.
non-parallel to X
Lemma 5.7. Let X → Y be an amicable immersion, where Y is a finite dimensional, locally finite, nonpositively curved cube complex. If π1 X ∼
= Z2 ∗Z Z2 , then
eve and adjacent edge space X
eee there is a hyperplane H in Ye
for every vertex space X
eve parallel to X
eee.
that intersects X
e
Proof. Let G = π1 X. There are precisely two vertex orbits and one edge orbit in Γ.
e Let H denote the set of all hyperplanes in Ye intersecting
Assume that Ye = hull(X).
e Let Hve denote the set of all hyperplanes intersecting X
eve.
X.
For each vertex ve, there is precisely one Gve-orbit of adjacent edges ee. Therefore,
eve, it is non-parallel to all
if H ∈ Hve is non-parallel to an adjacent edge space to X
adjacent edge spaces, and by Lemma 5.6 it must intersect all adjacent vertex spaces
non-parallel to all adjacent edge spaces. Therefore, we deduce that any hyperplane
e will either intersect a vertex space
that doesn’t intersect every vertex space in X
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
16
parallel to its adjacent edge spaces, or its intersection will be a line contained in an
edge space.
eve such that no hyperplane in Hve
Suppose that there exists a vertex space X
1
1
eve parallel to the adjacent edge spaces. Let Ĥ = H − Hve . Every
intersects X
1
1
hyperplane in H − Hve1 must intersect each wall in Hve1 so we deduce that Ye =
eve ) × C(Ye , Ĥ) (see [4, Lem 2.5]). Furthermore, Hgev = Hve for all g ∈ G. By
hull(X
1
1
1
eve) embeds in Rd . Since X
eve is contained inside some subcomplex
Lemma 5.5, hull(X
1
eve ) × C ⊆ Ye , where C is the 0-cube determined by orienting all hyperplanes
hull(X
1
eve , we can conclude that only finitely many hyperplanes in Ĥ intersect
towards X
1
eve .
the r-neighborhood of X
1
eue be an vertex space adjacent to X
eve , and let X
eee be the edge space conLet X
1
1
eve be another vertex space adjacent to X
eue and let X
eee be the
necting them. Let X
2
2
eve and X
eve are in the same Gue -orbit. The
edge space connecting them. Note that X
1
2
eue ∩ X
eee and X
eue ∩ X
eee are parallel in X
eue . Let D ⊆ X
eue be the subgeodesic lines X
1
2
eee ∪ X
eee .
space isometric to R × [a, b] bounded by these parallel lines. Let U = D ∪ X
1
2
Finitely many hyperplanes in Ĥ intersect D.
eve that is non-parallel to
Let g1 be an isometry in Gve1 that stabilizes an axis in X
1
eve ∩ X
eee . Similarly, let g2 be an isometry in Gve that stabilizes an axis
the geodesic X
1
1
2
eve that is non-parallel to the geodesic X
eve ∩ X
eee . Note that F = hg1 , g2 i is a free
in X
2
2
2
group on two generators. Let r be such that U is contained in the r-neighbourhood
eve . As there are only finitely many hyperplanes in Ĥ intersecting Nr (X
eve ),
of X
1
1
n
e
there must exist an n such that g1 stabilizes those walls. Similarly, since Xve2 is a
eve , we can deduce that there are only finitely many hyperplanes in Ĥ
translate of X
1
eve ), and there must exist an m such that gm stabilizes those walls.
intersecting Nr (X
2
2
eve ) and Nr (X
eve ) we can deduce that the
Let F ′ = hg1n , g2m i. As U lies in both Nr (X
1
2
hyperplanes in Ĥ that intersect the F ′ -translates of U are precisely the hyperplanes
e = F ′X
eve ∪ F ′ X
eve ∪ F ′ U . Then hull(Z)
e = hull(X
eve ) × K ⊆ Ye ,
intersecting U . Let Z
1
2
1
e which is a
where K is a compact cube complex. Then F acts freely on hull(Z),
contradiction since number of 0-cubes intersecting the r-neighborhood of a 0-cube
eve ) × K grows polynomially with r, and therefore cannot permit a free
in hull(X
1
F -action.
Lemma 5.7 is a special case of the following more general statement:
Corollary 5.8. Let X → Y be an amicable immersion, where Y is a finite dimensional, locally finite, nonpositively curved cube complex. Then for every vertex space
eve and adjacent edge space X
eee there is a hyperplane H in Ye that intersects X
eve
X
eee.
parallel to X
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
17
e there is a subgroup G′ = hG−ee , G+ee i ≤ G such that
Proof. For every edge ee in Γ
G′ ∼
= Z2 ∗Z Z2 . Let Y ′ = G′ \Ye . Then there is an amicable immersion X ′ → Y ′
e±ee . Therefore, by Lemma 5.7, there is a hyperplane
e and X
e′ = X
e′ = X
such that X
±e
e
ee
e−ee parallel to X
eee, and similarly for X
e+ee .
intersecting X
The following proposition is a strengthening of one direction of Theorem 1.1 in [11].
Let f1 : A → C and f2 : B → C be maps between topological spaces A, B, C. The
fiber product A ⊗C B = {(a, b) ∈ A × B | f1 (a) = f2 (b)}. Note that there are natural
projections p1 : A ⊗C B → A and p2 : A ⊗C B → B.
Proposition 5.9. Let G be a tubular group acting freely on a CAT(0) cube complex
Ye . Then there is a tubular space X with a finite set of immersed walls such that the
e W) has the following properties:
associated wallspace (X,
e W).
(1) G acts freely on C(X,
e W) is finite dimensional if Ye is finite dimensional.
(2) C(X,
e W) is finite dimensional and locally finite if Ye is locally finite.
(3) C(X,
Proof. Let Y = G\Ye . Let X → Y be an amicable immersion. Assume that
e so every immersed hyperplane in Y intersects X. Therefore, as X
Ye = hull(X),
is compact, there are finitely many immersed hyperplanes h1 , . . . hm in Y .
Let hi → Y be an immersed hyperplane in Y . We obtain horizontal immersed
walls in X by considering the components of the fiber product X ⊗Y hi of X → Y
and h → Y . Each component Λ has a natural map into X. The components of
X ⊗Y h that have image in X contained in an edge space are ignored. Let Λp be
a component of X ⊗Y h whose image in X intersects a vertex space Xv ⊆ X. We
will show that after a minor adjustment to Λp , we obtain a horizontal immersed
wall and by considering all such components we obtain a set of horizontal walls in
X obtained from an equitable set.
Using the map Λp → X we can decompose Λp into the components of the preimages of vertex space and edge spaces. As the intersection of each hyperplane H ⊆ Ye
eve is either empty or a geodesic line, the intersection of each
with each vertex space X
hi with Xv is a set of geodesic curves, so Λp restricted to the preimage of Xv is a set
of geodesic curves. By Lemma 5.6 each hyperplane H ⊆ Ye that intersects a vertex
eee will intersect X
eee as an arc with
space Xve non-parallel to an adjacent edge space X
e−ee and X
e+ee . Thus the components of the intersection Xe ∩ hi that
endpoints in X
intersect X−e or X+e , are arcs with endpoints in both X−e and X+e . Therefore,
Λp decomposes into circles that map as local geodesics into vertex spaces, and arcs
that map into edges spaces Xe with an endpoint in each X−e and X+e .
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
18
Let {Λp1 , . . . , Λpk } be the set of all such components of X ⊗Y hi that intersect
vertex spaces. Let Svp be the set curves that map the circles in {Λpi }ki=1 to the vertex
space Xv . The elements of Svp and the attaching maps ϕ±
e of the edge spaces in X
+
−
are locally geodesic curves, and #[ϕe , Se+ ] = #[ϕe , Se− ] since both sides are equal
to the number of arcs in the walls {Λpi }ki=1 that map into Xe . As G acts freely on
eee as geodesics in at
Ye , there must be hyperplanes intersecting each vertex space X
p
least two parallelism classes. This implies that Sv contains curves generating at
least two non-commensurable cyclic subgroups of Gv , and therefore Svp generates a
finite index subgroup of Gv .
Svp is almost an equitable set: the images of the curves in Svp may not be disjoint.
Suppose that α1 , . . . αm ∈ Sv be a maximal set of curves that have identical image in
Xv . Let Nǫ (Q) denote the ǫ-neighborhood of a subset Q of either Y or Ye with respect
to the CAT(0) metric. Let ǫ ∈ (0, 13 ) be such that the neighbourhood Nǫ (α1 ) ⊆ Y
only contains the images of α1 , . . . , αm and the arcs connected to them. There is
F
F
a homotopy of ki=1 Λpi → X that is the identity outside of ki=1 Λpi ∩ Nǫ (α1 ) such
that α1 , . . . , αm are homotoped to a disjoint set of geodesic curves in Xv ∩ Nǫ (α1 )
transverse or disjoint from all the other curves in Svp . By choosing ǫ small enough
F
we can perform such a homotopy Φ : ki=1 Λpi × [0, 1] → X such that all sets of
overlapping curves in {Svp }v∈V Γ become disjoint and such that Φ is the identity map
outside of the ǫ-neighborhood of the overlapping curves. The restriction of Φ to
Λpi × {1} → X is an immersed wall that we will denote by Λi . Thus, the immersed
walls {Λi }ki=1 obtained from an equitable set {Sv }v∈V Γ . We refer to {Λpi }ki=1 as the
e as the proto-walls. Note that proto-walls
ep → X
immersed proto-walls and the lifts Λ
i
have regular and non-regular intersections in the same way that walls do.
e W) be the wallspace obtained from the immersed walls {Λi }k and
Let (X,
i=1
e → X
e covers an
adding a single vertical wall for each edge space. Each wall Λ
immersed wall Λ → X. There exists a homotopy of Λ → X to the corresponding immersed proto-wall Λp → X. This homotopy lifts to a homotopy from the
e → X
e to a unique proto-wall Λ
e p → X.
e Note that each wall is
immersed wall Λ
contained in the ǫ-neighborhood of its corresponding proto-wall. Each proto-wall
e in
corresponds to the intersection of a unique hyperplane in Ye with the image of X
Ye . Therefore, each wall in W corresponds to a unique hyperplane in Ye .
e be a wall in W, and let Λ
e p be the corresponding proto-wall. Note that Λ∩
e X
eve
Let Λ
p
e ∩X
eve are either parallel geodesic lines, or both empty intersections. Therefore,
and Λ
e
e
if Λ1 , Λ2 ∈ W are a pair of regularly intersecting walls, then they correspond to a
pair of regularly intersecting proto-walls, which correspond to a pair of intersecting
hyperplanes in Ye .
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
19
e p and Λ
e p are disjoint, then the corresponding walls in Λ
e1
If a pair of proto-walls Λ
1
2
e 2 in W are also disjoint. Moreover, since Λ
e is contained in the ǫ-neighborhood
and Λ
e p , a halfspace of Λ
e determines a halfspace of Λ
e p and therefore a halfspace of the
of Λ
e p.
hyperplane H corresponding to Λ
e W) were infinite dimensional, then by ProposiTo prove (2), suppose that C(X,
tion 2.2, there would exists an infinite set of pairwise regularly intersecting walls in
W, which implies there is an infinite set of pairwise regularly intersecting proto-walls.
Therefore, there is an infinite set of pairwise intersecting hyperplanes in Ye . This
would imply that Ye is an infinite dimensional CAT(0) cube complex. Therefore, if
e W).
Ye is finite dimensional, then so is C(X,
To prove (3) we first prove the following:
e W) is finite dimensional.
Claim. If Ye is locally finite, then C(X,
e W) is infinite dimensional, then
Proof. Suppose that Ye is locally finite. If C(X,
by Lemma 2.2 it contains an infinite cube containing a canonical 0-cube z. Let
e 1, . . . , Λ
e n , . . . be the set of infinite pairwise crossing walls corresponding to the
Λ
e p, . . . , Λ
e pn , . . . be the corresponding set of infinite pairwise crossing
infinite cube. Let Λ
1
proto-walls, and let H1 , . . . , Hn , . . . be the corresponding infinite family of pairwise
crossing hyperplanes.
Suppose that Q is a subcomplex in Ye . Let U (Q) denote the cubical neighborhood
of Q, which is the union of all cubes in U (Q) that intersect Q. As Ye is locally finite,
if Q is compact, then U (Q) is also compact. By [7, Lem 13.15], if Q is convex, then
so is U (Q). Let U n (Q) denote the cubical neighborhood of U n−1 (Q).
e be a point determining the canonical 0-cube z in C(X,
e W). Let x be
Let x ∈ X
contained in a cube C in Ye . As C is compact and convex, U n (C) is also compact
and convex, and therefore can only be intersected by finitely many Hi . There
exists an Hi such that Hi intersects U N +2 (C), but not U N +1 (C) for some N > 1.
Since Hi does not intersect U N (C) nor U N +1 (C), there must exist a hyperplane
H intersecting U N +1 (C) that separates U N (C) from Hi . Note that dYe (x, H) ≥ N
e p be the proto-wall corresponding to H and Λ
e be the
and dYe (H, Hi ) ≥ 1. Let Λ
p
p
e
e
e
corresponding wall. As Λ separates x from Λi , we can conclude Λ separates x
e i since the Λ
e and Λ
e i are respectively contained in the ǫ-neighborhoods of Λ
ep
from Λ
e p . This contradicts the fact that z is incident to a 1-cube dual to hyperplane
and Λ
i
e i.
corresponding to Λ
e W) is finite dimensional, we can apply Corollary 5.8 to each edge group
As C(X,
in G to deduce that {Λi }ki=1 are fortified. Therefore, by Proposition 4.7 we deduce
e W) is locally finite.
that C(X,
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
20
We can now prove the main theorem of this paper.
Theorem 5.10. A tubular group G acts freely on a locally finite CAT(0) cube
complex if and only if G is virtually special.
Proof. Suppose that G is virtually special. Then G embeds as the subgroup of a
finitely generated right angled Artin group, and therefore acts freely on the universal
cover of the corresponding Salvetti complex, which is necessarily locally finite.
Conversely, suppose that G acts freely on a locally finite CAT(0) cube complex.
Let X be a tubular space such that G = π1 X. By Proposition 5.9 there exists a
e W)
finite set of immersed walls such that the dual of the associated wallspace C(X,
is finite dimensional and locally finite. By Lemma 3.1 we can assume that the
immersed walls are also primitive. Therefore, by Proposition 4.8, G is virtually
special.
6. Virtual Cubical Dimension
Lemma 6.1. Let X be a tubular space and G = π1 X. Suppose there exists an
equitable set that produces primitive, non-dilated immersed walls in X. There exists
a finite index subgroup G′ 6 G such that for each vertex group G′v of the induced
splitting of G′ the natural map H1 (G′v ) → H1 (G′ ) is an injection as a summand.
Proof. Note that H1 (G), and its finite index subgroups, is a summand of two factors.
The first factor Hv1 (G) is generated by the image of the vertex groups of G, and
the second factor Hv1 (G) is generated by the stable letters in the graph of groups
presentation.
e be the Bass-Serre tree. By Proposition 4.6, since there are immersed walls
Let Γ
e such that Gve fixes the
that are primitive and non-dilated, G acts freely on Rd × Γ
e Therefore G is a subgroup of Aut(Rd × Γ)
e ∼
vertex ve in Γ.
= Zd ⋊ Aut([−1, 1]d ) ×
e There is a finite quotient Zd ⋊ Aut([−1, 1]d ) × Aut(Γ)
e → Aut([−1, 1]d ),
Aut(Γ).
so let G′′ 6 G be the finite index subgroup contained in the kernel. Note that G′′
e Let p : G′′ → Zd be the projection onto the first factor.
embeds in Zd × Aut(Γ).
Each vertex group survives in the image of p, and therefore we have embedding
H1 (G′′v ) ֒→ Hv1 (G′′ ) ֒→ Zd .
e ′′ there is a finite index subgroup Av 6 Zd such
For each vertex v in Γ′′ = Γ/G
that p(G′′v ) ∩ Av is a summand of Av . Let A = ∩v Av and G′ = p−1 (A). Each vertex
group in G′ will be a factor in A. As A is free abelian, the map G′ → A will factor
through the Hv1 (G′ ), so we can deduce that each vertex group survives as a retract
in H1 (G′ ). Therefore, each vertex group in G′ survives as a summand in the first
homology.
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
21
Theorem 6.2. Let G be a tubular group acting freely on a finite dimensional
CAT(0) cube complex. Then there is a finite index subgroup G′ 6 G such that
G′ acts freely on a 3-dimensional CAT(0) cube complex.
Proof. Let X be a tubular space such that G = π1 X. By Proposition 5.9 there
exists immersed walls in X that are non-dilated, and by Lemma 3.1 we can assume
that they are also primitive. Let G′ 6 G be the finite index subgroup given by
Lemma 6.1, and let X ′ be the corresponding covering space. Let Hv1 (G′ ) ∼
= Zd be
the summand in the first homology generated by the vertex groups. By Lemma 6.1,
there is an inclusion ιv : G′v → Hv1 (G′ ), and a projection map pv : Hv1 (G′ ) → G′v .
Suppose that d = 2. Choose any pair of elements a, b ∈ Hv1 (G′ ) that generate
Hv1 (G′ ). We claim that S = {Sv = {pv (a), pv (b)} | v ∈ V (Γ)} is an equitable set. By
construction, each Sv generates G′v . The edge group G′e = hge i is adjacent to G′−e
+
and G′+e and the respective inclusions are (ϕ−
e )∗ and (ϕe )∗ . There is an isomorphism
′
+
′
A = p+e ◦ ι−e ∈ SL(2, Z), that maps (ϕ−
e )∗ (ge ) in Gu to (ϕe )∗ (ge ) in Gv . Therefore,
−
+
#[pu (a), (ϕ−
e )∗ (ge )] = #[Apu (a), A(ϕe )∗ (ge )] = #[pv (a), (ϕe )∗ (ge )],
A congruent set of equalities exist for b. These equalities also imply that the choice
of arcs for the equitable sets can be chosen so that they only join circles that are
the image of the same elements of Hv1 (G′ ). Therefore a set of embedded immersed
walls is obtained with precisely two immersed walls intersecting each vertex space:
such a set of horizontal immersed walls along with a vertical wall for each edge will
give a three dimensional dual cube complex.
If d > 2, then there exist vertex groups Gu and Gv such that they embed into
v
H1 (G′ ) as distinct summands. Let Gu = hgu , gu′ i and Gv = hgv , gv′ i. We can assume,
since they are distinct summands that gu is disjoint from the image of Gv in Hv1 (G′ ),
and that gv is disjoint from the image of Gu in Hv1 (G′ ). By attaching an edge
space in X ′ connecting Xu and Xv , that have attaching maps representing gu and
gv respectively we obtain a new graph of spaces X̂ ′ . The resulting tubular group
Ĝ′ = π1 X̂ ′ has Hv1 (Ĝ′ ) ∼
= Zd−1 , so by induction we can obtain the specified graph
of spaces X̂ ′ . Given a set of immersed walls for X̂ ′ with a dual cube complex of
dimension at most 3 we obtain immersed walls for X ′ by deleting the arcs that
map into the the edge space that was added to construct X̂ ′ . The immersed walls
obtained still give a dual cube complex with dimension at most 3.
References
[1] N. Brady and M. R. Bridson. There is only one gap in the isoperimetric spectrum. Geom.
Funct. Anal., 10(5):1053–1070, 2000.
CLASSIFYING VIRTUALLY SPECIAL TUBULAR GROUPS
22
[2] Martin R. Bridson and André Haefliger. Metric spaces of non-positive curvature, volume 319
of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical
Sciences]. Springer-Verlag, Berlin, 1999.
[3] J.O. Button. Tubular free by cyclic groups and the strongest tits alternative.
[4] Pierre-Emmanuel Caprace and Michah Sageev. Rank rigidity for CAT(0) cube complexes.
Geom. Funct. Anal., 21(4):851–891, 2011.
[5] Christopher H. Cashen. Quasi-isometries between tubular groups. Groups Geom. Dyn.,
4(3):473–516, 2010.
[6] Frédéric Haglund and Frédéric Paulin. Simplicité de groupes d’automorphismes d’espaces à
courbure négative. In The Epstein birthday schrift, volume 1 of Geom. Topol. Monogr., pages
181–248 (electronic). Geom. Topol. Publ., Coventry, 1998.
[7] Frédéric Haglund and Daniel T. Wise. Special cube complexes. Geom. Funct. Anal., 17(5):1551–
1620, 2008.
[8] Michah Sageev. Ends of group pairs and non-positively curved cube complexes. Proc. London
Math. Soc. (3), 71(3):585–617, 1995.
[9] Daniel T. Wise. Research announcement: the structure of groups with a quasiconvex hierarchy.
Electron. Res. Announc. Math. Sci., 16:44–55, 2009.
[10] Daniel T. Wise. From riches to raags: 3-manifolds, right-angled Artin groups, and cubical geometry, volume 117 of CBMS Regional Conference Series in Mathematics. Published for the
Conference Board of the Mathematical Sciences, Washington, DC; by the American Mathematical Society, Providence, RI, 2012.
[11] Daniel T. Wise. Cubular tubular groups. Trans. Amer. Math. Soc., 366(10):5503–5521, 2014.
[12] D.T. Wise and C. Hruska. Finiteness properties of cubulated groups. Submitted for publication.
[13] D.J. Woodhouse. Classifying finite dimensional cubulations of tubular groups. Submitted for
publication.
[14] D.J. Woodhouse. A generalized axis theorem for cube complexes. Submitted for publication,
2016.
E-mail address: [email protected]
| 4math.GR
|
1
Convolutional Low-Resolution Fine-Grained
Classification
arXiv:1703.05393v3 [cs.CV] 16 Oct 2017
Dingding Cai, Ke Chen, Yanlin Qian, Joni-Kristian Kämäräinen
Abstract—Successful fine-grained image classification methods
learn subtle details between visually similar (sub-)classes, but
the problem becomes significantly more challenging if the details
are missing due to low resolution. Encouraged by the recent
success of Convolutional Neural Network (CNN) architectures
in image classification, we propose a novel resolution-aware
deep model which combines convolutional image super-resolution
and convolutional fine-grained classification into a single model
in an end-to-end manner. Extensive experiments on multiple
benchmarks demonstrate that the proposed model consistently
performs better than conventional convolutional networks on
classifying fine-grained object classes in low-resolution images.
Index Terms—Fine-Grained Image classification, Super Resolution Convoluational Neural Networks, Deep Learning
The problem of image classification is to categorise images
according to their semantic content (e.g. person, plane). Finegrained image classification further divides classes to their
“sub-categories” such as the models of cars [1], the species
of birds [2], the categories of flowers [3] and the breeds of
dogs [4]. Fine-grained categorisation is a difficult task due
to small inter-class variance between visually similar subclasses. The problem becomes even more challenging when
available images are low-resolution (LR) images where many
details are missing as compared to their high-resolution (HR)
counterparts.
Since the rise of Convolutional Neural Network (CNN)
architectures in image classification [5], the accuracy of finegrained image classification has dramatically improved and
many CNN-based extensions have been proposed [6], [7], [8],
[9], [10], [11]. However, these works assume sufficiently good
image quality and high resolution, (e.g. typically 227 × 227
for AlexNet [5]) while with low resolution images the CNN
performance quickly collapses [12], [13]. The challenge raises
from the problem of how to recover necessary texture details
from low-resolution images. Our solution is to adopt image
super-resolution (SR) techniques [14], [15], [16], [17], [18]
to enrich imagery details. In particular, inspired by the recent
work on CNN-based image SR by Deng et al. [19] we propose
a unique end-to-end deep learning framework that combines
CNN super-resolution and CNN fine-grained classification – a
resolution-aware Convolutional Neural Network (RACNN) for
fine-grained object categorisation in low-resolution images. To
our best knowledge, our work is the first end-to-end learning
model for low-resolution fine-grained object classification.
Our main principle is simple: the higher image resolution,
the easier for classification. Our research questions are: Can
computational super-resolution recover some of the important
details required for fine-grained image classification and can
Fig. 1: Owing to the introduction of the convolutional superresolution (SR) layers, the proposed deep convolutional model
(the bottom pipelines) achieves superior performance for low
resolution images.
such SR layers be added to an end-to-end deep classification
architecture? To this end, our RACNN integrates deep residual
learning for image super-resolution [20] into typical convolutional classification networks (e.g. AlexNet [5] or VGGNet [21]). On one hand, the proposed RACNN has deeper
network architecture (i.e. more network parameters) than the
straightforward solution of conventional CNN on up-scaled
images (e.g. bicubic interpolation [22]). Our RACNN learns
to refine and provide more texture details for low-resolution
images to boost fine-grained classification performance. We
conduct experiments on three benchmarks, Stanford Cars [1],
Caltech-UCSD Birds-200-2011 [2] and Oxford 102 Flower
Dataset [3]. Our results answer the aforementioned questions:
super-resolution improves fine-grained classification and SRbased fine-grained classification can be designed into a supervised end-to-end learning framework, as depicted in Figure 1
illustrating the difference between RACNN and conventional
CNN.
I. R ELATED W ORK
Fine-Grained Image Categorisation – Recent algorithms
for discriminating fine-grained classes (such as animal species
2
or plants [2], [4], [23] and man-made objects [1], [24], [25])
can be divided into two main groups. The first group of
methods utilises discriminative visual cues from local parts
obtained by detection [6], [26] or segmentation [8], [27], [28].
The second group of methods focuses on discovering interclass label dependency via pre-defined hierarchical structure of
labels [10], [29], [30], [31], [32] or manually-annotated visual
attributes [33], [34]. Significant performance improvement is
achieved by convolutional neural networks (CNNs), but this
requires a massive amount of high quality training images.
Fine-grained classification from low-resolution images is yet
challenging and unexplored. The method proposed by Peng et
al. [35] transforms detailed texture information in HR images
to LR via fine-tuning to boost the accuracy of recognizing finegrained objects in LR images. However, in [35], their strong
assumption requiring HR images available for training limits
its generalisation ability. In addtion, the same assumption also
occurs in Wang’s work [36]. Chevalier et al. [12] design
a CNN-based fine-grained object classifier with respect to
varying image resolutions, which adopts ordinary convolutional and fully-connected layers but misses considering superresolution specific layers in convolutional classification networks. On contrary, owing to the introduction of SR-specific
layers in RACNN, our method can consistently gain notable
performance improvement over conventional CNN for image
classification on fine-grained classification datasets.
Convolutional Super-Resolution Layers – Yang et al. [37]
grouped existing SR algorithms into four groups: prediction models [38], edge-based methods [39], image statistical
methods [40] and example-based methods [14], [17], [18],
[41], [42], [43], [44], [45]. Recently, Convolutional Neural Networks have been adopted for image super-resolution
achieving state-of-the-art performance. The first attempt using
convolutional neural networks for image super-resolution was
proposed by Dong et al. [18]. Their method learns a deep
mapping between low- and high- resolution patches and has
inspired a number of follow-ups [20], [46], [47]. In [47], an
additional deconvolution layer is added based on SRCNN [18]
to avoid general up-scaling of input patches for accelerating
CNN training and testing. Kim et al. [46] adopt a deep
recursive layer to avoid adding weighting layers, which does
not need to pay any price of increasing network parameters.
In [20], a convolutional deep network is proposed to learn
the mapping between LR image and its residue between
LR and HR image to speed up CNN training for very
deep network. Convolutional layers designed for image superresolution (namely SR-specific convolutional layers) have been
verified their effectiveness to improve the quality of images.
In this work, we incorporate the state-of-the-art residual CNN
layers for image super-resolution [20] into a convolutional
categorisation network for classifying fine-grained objects (i.e.
AlexNet [5], VGG-Net [21] and GoogLeNet [48]). In the
experiments, SR-specific convolutional layers are verified to
improve classification performance.
Contributions – Our contributions are two-fold:
• Our work is the first attempt to utilise super-resolution
specific convolutional layers to improve convolutional
•
fine-grained image classification.
We experimentally verify that the proposed RACNN
achieves superior performance on low-resolution images
which make ordinary CNN performance collapse.
II. R ESOLUTION -AWARE C ONVOLUTIONAL N EURAL
N ETWORKS
Given a set of N training images and corresponding class
X i , yi }, i = 1, 2, · · · , N, the goal of a conventional CNN
labels {X
X ). The typical
model is to learn a mapping function y = f (X
cross entropy (ce) loss Lce (·) on softmax classifer is adopted
X)
to measure the performance between class estimates ŷ = f (X
and ground truth class labels y :
l
Lce (ŷ, y) = − ∑ y j log(ŷ j ),
(1)
j=1
where j refers to the index of element in vectors, and l denotes
the dimension of softmax layer (i.e. the number of classes). In
this sense, CNN solves the following minimisation problem
with gradient descent back propagation:
N
min
∑ Lce ( f (XX i ), yi ).
(2)
i=1
For fine-grained categorisation in low-quality images, we propose a novel resolution-aware convolutional neural network,
which is illustrated in Fig. 2. In general, our RACNN consists
of two parts: convolutional super-resolution layers (see Sec.
II-A) and convolutional categorisation layers (see Sec. II-B).
In Sec. II-C, we describe an end-to-end training scheme for
the proposed RACNN.
A. Convolutional Super-Resolution Layers
In this section, we present convolutional super-resolution
specific layers for the resolution-aware CNN, the goal of which
is to recover texture details of low-resolution images to feed
into the following convolutional categorisation layers.
We first investigate the conventional CNN for the superresolution task. Given K training pairs of low-resolution and
X LR , X HR }i , i = 1, 2, · · · , K, a direct
high-resolution images {X
X LR ) from X LR (input obCNN-based mapping function g(X
HR
servation) to X
(output target) [18], [47] is learned by
minimising the mean square (ms) loss
X LR , X HR ) =
Lms (X
1 K
∑ kXX HR − g(XX LR )k2 .
2 i=1
(3)
Inspired by recent the state-of-the-art residual convolutional
network [20] to achieve high efficacy, we design convolutional
super-resolution layers as shown on the left hand side of Fig. 2.
Similar to [20], our convolutional super-resolution layers learn
a mapping function from LR images X LR to residual images
X HR − X LR . Object function of the proposed convolutional
super-resolution layers is as the following:
min
1 K
∑ kXX HR − X LR − g(XX LR )k2 .
2 i=1
(4)
3
Fig. 2: Pipeline of the proposed resolution-aware convolutional neural network (RACNN) for fine-grained recognition with
low-resolution images. Convolutional classification layers from AlexNet are adopted for illustrative purpose, which can be
readily replaced by those from other CNNs such as VGG-Net or GoogLeNet
.
The better performance of residual learning yields from the
fact that, since the input (LR) and output images (HR) are
largely similar, it is more meaningful to learn their residue
where similarities are removed. It is obvious that detailed
imagery information in the form of residual images is easier
for CNNs to learn than direct LR-HR CNN models [18], [47].
We utilise three typical stacked convolutional-ReLU layers with zero-padding filters as convolutional SR layers in
RACNN. Following [18], the empirical basic setting of the
layers is f1 = 9×9, n1 = 64, f2 = 5×5, n2 = 32, f3 = 5×5 and
n3 = 3, which are also illustrated in the left hand side of Fig. 2,
where fm and nm donate the size and number of the filters of
the mth layer respectively. The output of the last convolutional
SR layer is summed with the low-resolution input image
X LR to construct the full super-resolution image fed into
the remaining convolutional and fully-connected classification
layers of RACNN.
B. Categorisation Layers
The second part in our RACNN is convolutional and fullyconnected classification layers with high quality images after
super-resolution layers. A number of CNN frameworks [5],
[21], [49], [48] have been proposed for image categorisation, and in this paper we consider three popular convolutional neural networks: AlexNet [5], VGG-Net [21] and
GoogLeNet [48]. All CNNs typically consist of a number
of Convolutional-ReLU-Pool stacks followed by several fullyconnected layers. On the right-hand-side of Fig. 2, the typical
AlexNet [5] is visualised and employed as convolutional
categorisation layers in RACNN. AlexNet [5], the baseline
CNN for large-scale image classification over ImageNet [50],
consists of 5 convolutional layers (i.e. conv1, conv2, conv3,
conv4, and conv5) and 3 fully-connected layers (i.e. fc6,
fc7, and fc8). VGGNet [21] is made deeper (i.e. from 8
layers of Alexnet to 16-19 layers) and more advanced over
AlexNet by using very small (e.g. 3 × 3) convolution filters.
In our paper, we choose the VGG-Net-16 with 16 layers
for our experiments (denoted as VGG-Net in the rest of the
paper). GoogLeNet [48] comprises 22 layers but has much
less number of parameters than AlexNet and VGG-Net owing
to the smaller amount of weights of fully-connected layers.
GoogLeNet generally generates three outputs at various depths
for each input, but for simplicity only the last output (i.e.
the deepest output) is considered in our experiments. In our
experiments, all three networks are pre-trained on the Imagenet
X , y} from fine-grained data as the
data and fine-tuned with {X
baseline. For fair comparison, we fine-tune the identical pretrained CNN models as our convolutional categorisation layers
X , y} by replacing the dimension of final fully-connected
with {X
layer with the size of object classes l.
C. Network Training
The key difference between the proposed resolution-aware
CNN and conventional CNN lies in the introduction of three
convolutional super-resolution layers. Evidently, RACNN is
deeper than corresponding CNN due to the three convolutional SR layers, which can store more knowledge, i.e.
network parameters. Before learning RACNN in an end-toend fashion, we consider two weight initialization strategies
for convolutional SR layers in RACNN, i.e. standard Gaussian
weights and pre-trained weights on the ImageNet data. For fair
comparison, we adopt the identical network structure for both
initialisation schemes.
For RACNN with Gaussian initial weights, we train the
whole network to minimise cross-entropy loss (2) directly.
During training, we set learning rates 1 and weight decays
0.1 for the first two SR layers (sconv1 and sconv2) and both
learning rate and weight decay are set with 0.1 for the third
convolutional SR layer (sconv3), while learning rates and
weight decays are 0.1 and 0 for all categorisation layers except
the last fully-connected layer which uses both learning rate and
weight decay 1.
We consider an alternative initialisation strategy for better
initial weights for convolutional SR layers. To this end, we
4
Fig. 3: Low-resolution image samples after removing background from the Stanford Cars and UCSD-Caltech Birds 2002011 benchmarks.
pre-train the three convolutional SR layers by enforcing the
minimal of the mean square loss (4) on ILSVRC 2015 ImageNet object detection testing dataset [51], which consists of
11,142 high-resolution images. Given the pre-trained weights
in convolutional SR layers, RACNN is end-to-end trained by
minimising the loss function (2) for categorisation. For the
goal of direct utilisation of output of convolutional SR layers,
we train SR layers in RGB color space with all the channels,
instead of only on luminance channel Y in YCbCr color space
[18]. Specifically, we generate LR images from HR images
(e.g. 227×227 pixels) via firstly down-sampling HR images
to 50×50 pixels and then up-scaling to the original image size
by bicubic interpolation [22]. We then sample image patches
using sliding window and thus obtain thousands of pairs of LR
and HR image patches. To be consistent with the setting of
RACNN using Guassian initial weights, the super-resolution
layers are trained with image patches by setting learning rates
being 1 and weight decays being 0.1 for the first two SR
layers (sconv1 and sconv2) and both learning rate and weight
decay being 0.1 for the third SR layer (sconv3). Finally, we
jointly learn both convolutional SR and classification layers
in an end-to-end learning manner with learning rates 0.1 and
weight decays 0 for all classification layers except the last
fully-connected layer with both learning rate and weight decay
set to 1.
III. E XPERIMENTS
A. Datasets and Settings
We evaluate RACNN on three commonly-used datasets: the
Stanford Cars [1], the Caltech-UCSD Birds-200-2011 [2] and
the Oxford 102 Category Flower [3] datasets. The first one
was released by Krause et al. for fine-grained categorisation
and contains 16,185 images from 196 classes of cars and each
class is typically at the level of Brand, Model and Year. By
following the standard evaluation protocol [1], we split the
data into 8,144 images for training and 8,041 for testing.
Caltech-UCSD Birds-200-2011 is another challenging finegrained image dataset aimed at subordinate category classification by providing a comprehensive set of benchmarks
and annotation types for the domain of birds. The dataset
contains 11,788 images of 200 bird species, among which
there are 5,994 images for training and 5,794 for testing [2].
Oxford 102 Category Flower Dataset consists of 8,189 images
which commonly appear in the United Kingdom. These images
belong to 102 categories and each category contains between
40 to 258 images. In the standard evaluation protocol [3], the
whole dataset is divided into 1,020 images for training, 1,020
for validation and 6,149 for testing. In our experiments the
training and validation data are merged together to train the
networks.
Images from these datasets are first cropped with provided
bounding boxes to remove the background. Cropped images
are down-sampled to LR images of the size 50 × 50 pixels and
then up-scaled to 227 × 227 pixels by bicubic interpolation
[22] to fit the conventional CNN, which follows the settings
in [35]. Sample LR images from the both benchmarks are
illustrated in Fig. 3, which verify our motivation to mitigate the
suffering from low visual discrimination due to low-resolution.
We compare our RACNN with multiple state-of-the-art methods, the corresponding CNN model for classification (i.e.
AlexNet [5], VGG-Net [21] and GoogLeNet [48]) and StagedTraining CNN proposed by [35]. The proposed RACNN is
implemented on Caffe [52]. We adopt the average per-class
accuracy [13], [35] for the both datasets (the higher value
denotes the better performance).
In our experiments, we used a Lenovo Y900 desktop with
one Intel i7-6700K CPU and one Nvidia GTX-980 GPU. The
proposed RACNN has deeper structure than the competing
networks (i.e. AlexNet, VGGNet, GoogLeNet) which requires
longer training times as indicated in Table I.
TABLE I: Training times of RACNNs and competing CNNs
(seconds / epoch)
.
Methods
Cars [1]
Birds [2]
Flowers [3]
AlexNet
RACNNAlexNet
11
111
8
80
3
25
VGGNet
RACNNVGGNet
133
356
82
215
34
90
GoogLeNet
RACNNGoogLeNet
20
136
25
120
8
59
B. Comparative Evaluation
In Fig. 4, we compare our results with AlexNet [5] and
Staged-Training AlexNet [35] for fine-grained classification
in low-resolution images. It is evident that our RACNNAlexNet
consistently achieves the best performance on both benchmarks. Precisely, AlexNet achieves 50.4% and 51.3% ac-
5
C. Evaluation of Convolutional SR Layers
Fig. 4: Comparison to two state-of-the-art methods for classification (average per-class accuracies).
TABLE II: Evaluation on effect of convolutional SR layers
to recover high resolution details. We fix all convolutional
and fully-connected layers except the last fully-connected layer
(i.e. extracted features correspond to those with high resolution images). g-RACNN and p-RACNN denote the proposed
RACNN with weights initialized with Gaussian (g-) and pretrained weights (p-) for the convolutional SR layers.
Methods
Cars [1]
Birds [2]
Flowers [3]
AlexNet [5]
g-RACNNAlexNet
p-RACNNAlexNet
43.75%
45.77%
47.90%
44.99%
47.17%
51.23%
70.03%
71.91%
74.24%
VGG-Net [21]
g-RACNNVGG-Net
p-RACNNVGG-Net
41.49%
42.86%
44.65%
43.46%
44.72%
49.33%
67.82%
68.03%
69.17%
GoogLeNet [48]
g-RACNNGoogLeNet
p-RACNNGoogLeNet
46.85%
50.37%
50.76%
48.52%
55.16%
57.30%
69.28%
69.77%
73.51%
In this experiment, we employ all layers in the AlexNet,
VGG-Net and GoogLeNet [48] as categorisation layers in
RACNN. Note that, different from the previous experiments,
we freeze all categorisation layers by setting learning rates and
weights decays to 0 besides the last fully-connected layers
of the baseline CNNs, and our RACNN is then fine-tuned
with low-resolution data. Such setting treats categorisation
layers in RACNN as an identical classifier for evaluating
the effect of adding convolutional SR layers. RACNN with
initial Gaussian and pre-trained weights are called as gRACNN and p-RACNN respectively. Comparative results are
shown in Table II and Fig. 5. Both g-RACNN and p-RACNN
consistently outperform the baseline CNNs in all experiments.
With the same experimental setting except different initial
weights for convolutional super-resolution layers, the results
of g-RACNN and p-RACNN are reported. Test set accuracies
in Table II and Fig. 5 show that p-RACNN is superior to gRACNN. p-RACNN and g-RACNN share the same network
structure but differ only in network weights initialisation of
convolutional SR layers. In this sense, better performance of
p-RACNN is credited to the knowledge about refining lowresolution images (i.e. pre-trained weights), which verifies our
motivation to boost low-resolution image classification via
image super-resolution. It is noteworthy that since the feature
extraction layers are frozen, the networks are not fine-tuned
to low-resolution specific features, but all performance boost
are owing to recovered high-resolution details important for
classifcation by the super-resolution layers.
D. Evaluation on Varying Resolution
TABLE III: Comparison with varying resolution level (Res.
Level) on the Caltech-UCSD Birds 200-2011 Dataset.
Res. Level
25×25
50×50
100×100
curacies (collected from [35]) for the Stanford Cars and
Caltech-UCSD Birds datasets, respectively. Knowledge transfer between varying resolution images (i.e. Staged-Training
AlexNet [35]) can improve classification accuracy, that is
59.5% for the Stanford Cars and 55.3% for the Caltech-UCSD
Birds. However, the staged-training AlexNet [35] relies on the
strong assumption that high-resolution images are available
for training, which limits to its usage to other tasks. Note
that our method is more generic and transforms knowledge
of super resolution across datasets, which indicates that our
method can be readily applied to other low-resolution image
classification tasks. The proposed RACNNAlexNet significantly
beats its direct competitor AlexNet, i.e. 63.8% vs. 50.4% on
the Stanford Cars dataset and 58.1% vs. 51.3% on the CaltechUCSD Birds dataset. With the same settings and training
samples, the performance gap can only be explained by the
novel network structure of RACNN.
AlexNet [5]
g-RACNNAlexNet
p-RACNNAlexNet
31.58%
44.99%
51.01%
43.68%
47.17%
51.24%
45.06%
51.23%
52.88%
We further evaluate our proposed RACNN method with
respect to varying resolutions on the Caltech-UCSD Birds 2002011 Dataset. All low-resolution images are first up-scaled to
the input image size, i.e. 227×227, before training models.
The better performance of RACNNAlexNet over conventional
AlexNet is achieved for cross-resolution fine-grained image
classification, which is shown in Table III.
We observe that our method performs much better for lower
resolution images (e.g. 25×25) than relatively high resolution
images (e.g. 100×100). In details, p-RACNNAlexNet increases
the accuracy by above 13% for 25×25 pixel images but less
than 2% improvement on 100×100 resolution images. The
reason is that the SR layers of RACNN play a significant role
in introducing texture details especially when missing more
visual cues of object classification in lower quality images,
which further demonstrates our observation and motivation.
6
(a) AlexNet
(b) VGG-Net
(c) GoogLeNet
Fig. 5: Training process of AlexNet, VGGNet and GoogLeNet on the Caltech-UCSD Birds Dataset.
In p-RACNNAlexNet , the weights for convolutional SR layers
are pre-trained only with 50×50 resolution-level ImageNet
images, but our RACNN is applied to varying resolution levels
(i.e. 25×25 and 100×100). Further improvement on classification performance shows the generalisation of pre-trained
weights for varying resolution levels, which demonstrates the
generalisation ability of RACNN with pre-trained SR weights.
IV. C ONCLUSION
We propose and verify a simple yet effective resolutionaware convolutional neural network (RACNN) for fine-grained
image classification of low-resolution images. The results
from extensive experiments indicate that the introduction of
convolutional super-resolution layers to conventional CNNs
can indeed recover fine details for low-resolution images
and clearly boost performance in low-resolution fine-grained
classification. This result can be explained by the fact that the
super-resolution layers learn to recover high resolution details
that are important for classification when trained end-to-end
manner together with the classification layers. The concept
of our paper is generic and the existing convolutional superresolution and classification networks can be readily combined
to cope with low-resolution image classification.
R EFERENCES
[1] J. Krause, M. Stark, J. Deng, L. Fei-Fei, 3d object representations for
fine-grained categorization, in: International Conference on Computer
Vision Workshops, 2013, pp. 554–561.
[2] C. Wah, S. Branson, P. Welinder, P. Perona, S. Belongie, The caltechucsd birds-200-2011 dataset.
[3] M.-E. Nilsback, A. Zisserman, Automated flower classification over a
large number of classes, in: Indian Conference on Computer Vision,
Graphics & Image Processing, IEEE, 2008, pp. 722–729.
[4] A. Khosla, N. Jayadevaprakash, B. Yao, F.-F. Li, Novel dataset for finegrained image categorization: Stanford dogs.
[5] A. Krizhevsky, I. Sutskever, G. E. Hinton, Imagenet classification with
deep convolutional neural networks, in: Advance in Neural Information
Processing Systems, 2012.
[6] N. Zhang, J. Donahue, R. Girshick, T. Darrell, Part-based R-CNNs for
fine-grained category detection, in: European Conference on Computer
Vision, 2014.
[7] T.-Y. Lin, A. RoyChowdhury, S. Maji, Bilinear cnn models for finegrained visual recognition, in: IEEE International Conference on Computer Vision, 2015, pp. 1449–1457.
[8] J. Krause, H. Jin, J. Yang, L. Fei-Fei, Fine-grained recognition without
part annotations, in: IEEE Conference on Computer Vision and Pattern
Recognition, 2015, pp. 5546–5555.
[9] K. Chen, Z. Zhang, Learning to classify fine-grained categories with
privileged visual-semantic misalignment, IEEE Transactions on Big
Data.
[10] Z. Akata, S. Reed, D. Walter, H. Lee, B. Schiele, Evaluation of output
embeddings for fine-grained image classification, in: IEEE Conference
on Computer Vision and Pattern Recognition, 2015.
[11] S. Branson, G. V. Horn, S. Belongie, P. Perona, Bird species categorization using pose normalized deep convolutional nets, in: British Machine
Vision Conference, 2014.
[12] M. Chevalier, N. Thome, M. Cord, J. Fournier, G. Henaff, E. Dusch,
LR-CNN for fine-grained classification with varying resolution, in: IEEE
International Conference of Image Processing, 2015, pp. 3101–3105.
[13] Y. Liu, Y. Qian, K. Chen, J.-K. Kämäräinen, H. Huttunen, L. Fan,
J. Saarinen, Incremental convolutional neural network training, in:
International Conference of Pattern Recognition Workshop on Deep
Learning for Pattern Recognition, 2016.
[14] R. Zeyde, M. Elad, M. Protter, On single image scale-up using sparserepresentations, in: International Conference on Curves and Surfaces,
2010, pp. 711–730.
[15] J. Yang, J. Wright, T. S. Huang, Y. Ma, Image super-resolution via sparse
representation, IEEE transactions on image processing 19 (11) (2010)
2861–2873.
[16] H. Chang, D.-Y. Yeung, Y. Xiong, Super-resolution through neighbor
embedding, in: IEEE Conference on Computer Vision and Pattern
Recognition, 2004.
[17] D. Glasner, S. Bagon, M. Irani, Super-resolution from a single image, in:
IEEE International Conference on Computer Vision, 2009, pp. 349–356.
[18] C. Dong, C. C. Loy, K. He, X. Tang, Image super-resolution using
deep convolutional networks, IEEE transactions on Pattern Analysis and
Machine Intelligence 38 (2) (2016) 295–307.
[19] D. Dai, Y. Wang, Y. Chen, L. Van Gool, Is image super-resolution helpful
for other vision tasks?, in: IEEE Winter Conference on Applications of
Computer Vision, 2016, pp. 1–9.
[20] J. Kim, J. Kwon Lee, K. Mu Lee, Accurate image super-resolution using
very deep convolutional networks, in: IEEE Conference on Computer
Vision and Pattern Recognition, 2016, pp. 1646–1654.
[21] K. Simonyan, A. Zisserman, Very deep convolutional networks for largescale image recognition.
[22] R. Keys, Cubic convolution interpolation for digital image processing,
IEEE transactions on acoustics, speech, and signal processing 29 (6)
(1981) 1153–1160.
[23] A. Angelova, S. Zhu, Efficient object detection and segmentation for
fine-grained recognition, in: IEEE Conference on Computer Vision and
Pattern Recognition, 2013, pp. 811–818.
[24] M. Stark, J. Krause, B. Pepik, D. Meger, J. J. Little, B. Schiele, D. Koller,
Fine-grained categorization for 3d scene understanding, International
Journal of Robotics Research (2011) 1543–1552.
[25] S. Maji, E. Rahtu, J. Kannala, M. Blaschko, A. Vedaldi, Fine-grained
visual classification of aircraft, arXiv preprint arXiv:1306.5151.
[26] N. Zhang, R. Farrell, F. Iandola, T. Darrell, Deformable part descriptors
for fine-grained recognition and attribute prediction, in: International
Conference on Computer Vision, 2013.
[27] Y. Chai, V. Lempitsky, A. Zisserman, Symbiotic segmentation and part
localization for fine-grained categorization, in: International Conference
on Computer Vision, 2013.
7
[28] E. Gavves, B. Fernando, C. G. Snoek, A. W. Smeulders, T. Tuytelaars,
Local alignments for fine-grained categorization, International Journal
of Computer Vision 111 (2) (2015) 191–212.
[29] J. Shotton, M. Johnson, R. Cipolla, Semantic texton forests for image
categorization and segmentation, in: IEEE Conference on Computer
Vision and Pattern Recognition, 2008.
[30] S. J. Hwang, K. Grauman, F. Sha, Semantic kernel forests from multiple
taxonomies, in: Advances in Neural Information Processing Systems,
2012.
[31] A. Mittal, M. B. Blaschko, A. Zisserman, P. H. Torr, Taxonomic multiclass prediction and person layout using efficient structured ranking, in:
European Conference on Computer Vision, 2012.
[32] J. Deng, N. Ding, Y. Jia, A. Frome, K. Murphy, S. Bengio, Y. Li,
H. Neven, H. Adam, Large-scale object classification using label relation
graphs, in: European Conference on Computer Vision, 2014.
[33] N. Zhang, M. Paluri, M. Ranzato, T. Darrell, L. Bourdev, Panda: Pose
aligned networks for deep attribute modeling, in: IEEE Conference on
Computer Vision and Pattern Recognition, 2014.
[34] Y. Fu, T. M. Hospedales, T. Xiang, Z. Fu, S. Gong, Transductive multiview embedding for zero-shot recognition and annotation, in: European
Conference on Computer Vision, 2014.
[35] X. Peng, J. Hoffman, X. Y. Stella, K. Saenko, Fine-to-coarse knowledge
transfer for low-res image classification, in: IEEE International Conference of Image Processing, 2016, pp. 3683–3687.
[36] Z. Wang, S. Chang, Y. Yang, D. Liu, T. S. Huang, Studying very low
resolution recognition using deep networks, in: Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, 2016, pp.
4792–4800.
[37] C.-Y. Yang, C. Ma, M.-H. Yang, Single-image super-resolution: a
benchmark, in: European Conference on Computer Vision, 2014, pp.
372–386.
[38] M. Irani, S. Peleg, Improving resolution by image registration, Computer
Vision, Graphics, and Image Processing: Graphical models and image
processing (1991) 231–239.
[39] R. Fattal, Image upsampling via imposed edge statistics, in: ACM
Transactions on Graphics, Vol. 26, 2007, p. 95.
[40] J. Huang, D. Mumford, Statistics of natural images and models, in:
IEEE Conference on Computer Vision and Pattern Recognition, 1999,
pp. 541–547.
[41] J.-B. Huang, A. Singh, N. Ahuja, Single image super-resolution from
transformed self-exemplars, in: IEEE Conference on Computer Vision
and Pattern Recognition, 2015, pp. 5197–5206.
[42] J. Yang, Z. Lin, S. Cohen, Fast image super-resolution based on inplace example regression, in: IEEE Conference on Computer Vision
and Pattern Recognition, 2013, pp. 1059–1066.
[43] G. Freedman, R. Fattal, Image and video upscaling from local selfexamples, ACM Transactions on Graphics 30 (2) (2011) 12.
[44] D. Dai, R. Timofte, L. Van Gool, Jointly optimized regressors for image
super-resolution, in: Computer Graphics Forum, Vol. 34, 2015, pp. 95–
104.
[45] S. Schulter, C. Leistner, H. Bischof, Fast and accurate image upscaling
with super-resolution forests, in: IEEE Conference on Computer Vision
and Pattern Recognition, 2015, pp. 3791–3799.
[46] J. Kim, J. Kwon Lee, K. Mu Lee, Deeply-recursive convolutional
network for image super-resolution, in: IEEE Conference on Computer
Vision and Pattern Recognition, 2016, pp. 1637–1645.
[47] C. Dong, C. C. Loy, X. Tang, Accelerating the super-resolution convolutional neural network, in: European Conference on Computer Vision,
2016, pp. 391–407.
[48] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan,
V. Vanhoucke, A. Rabinovich, Going deeper with convolutions, in:
Proceedings of the IEEE conference on computer vision and pattern
recognition, 2015, pp. 1–9.
[49] K. He, X. Zhang, S. Ren, J. Sun, Deep residual learning for image
recognition, in: IEEE Conference on Computer Vision and Pattern
Recognition, 2016, pp. 770–778.
[50] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, L. Fei-Fei, Imagenet:
A large-scale hierarchical image database, in: IEEE Conference on
Computer Vision and Pattern Recognition, 2009, pp. 248–255.
[51] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma,
Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, L. FeiFei, ImageNet Large Scale Visual Recognition Challenge, International
Journal of Computer Vision 115 (3) (2015) 211–252.
[52] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick,
S. Guadarrama, T. Darrell, Caffe: Convolutional architecture for fast
feature embedding, in: ACM international conference on Multimedia,
2014, pp. 675–678.
| 1cs.CV
|
Preprint, Institute of Statistics, RWTH Aachen University
ASYMPTOTICS FOR HIGH–DIMENSIONAL COVARIANCE MATRICES AND
QUADRATIC FORMS WITH APPLICATIONS TO THE TRACE FUNCTIONAL AND
SHRINKAGE
arXiv:1711.01835v1 [math.PR] 6 Nov 2017
Ansgar Steland∗ and Rainer von Sachs
Institute of Statistics
RWTH Aachen University
Wüllnerstr. 3, D-52056 Aachen, Germany
[email protected]
and
Institut de Statistique, Biostatistique et Sciences Actuarielles (ISBA)
Université catholique de Louvain
Voie du Roman Pays 20, B-1348 Louvain-la-Neuve, Belgium
[email protected]
July 10, 2017
We establish large sample approximations for an arbitray number of bilinear
forms of the sample variance-covariance matrix of a high-dimensional vector
time series using ℓ1 -bounded weighting vectors. Estimation of the asymptotic
covariance structure is also discussed. The results hold true without any constraint on the dimension, the number of forms and the sample size or their
ratios. Concrete and potential applications are widespread and cover highdimensional data science problems such as projections onto sparse principal
components or more general spanning sets as frequently considered, e.g. in
classification and dictionary learning. As two specific applications of our results, we study in greater detail the asymptotics of the trace functional and
shrinkage estimation of the covariance matrices. In shrinkage estimation, it
turns out that the asymptotics differs for weighting vectors bounded away
from orthogonaliy and nearly orthogonal ones in the sense that their inner
product converges to 0.
AMS 2000 subject classifications: Primary 60F17; secondary 62E20 .
Keywords: Brownian motion, Linear process, Long memory, Strong approximation, Quadratic form, Trace.
1. INTRODUCTION
A large number of procedures studied to analyze high–dimensional vector time series of
dimension dn depending on the sample size n relies on projections, e.g. by projecting the
observed random vector onto a spanning set of a lower dimensional subspace of dimension
Ln . Examples include sparse principal component analysis, see e.g. [20], in order to reduce
dimensionality of data, sparse portfolio replication and index tracking as studied by [4], or
dictionary learning, see [1], where one aims at representing input data by a sparse linear
combination of the elements of a dictionary, frequently obtained as the union of several bases
and/or historical data.
b n wn ,
When studying projections, it is natural to study the associated bilinear form vn′ Σ
d
vn , wn ∈ R n , representing the dependence structure in terms of the projections’ covariances.
b n is the (uncentered) sample variance–covariance matrix.
Here and throughout the paper Σ
In order to conduct inference, large sample distributional approximations are needed. For a
vector time series model given by correlated linear processes, we established in [17] a strong
1
2
A. STELAND, R. VON SACHS
approximation by a Brownian motion for a single quadratic form, provided the weighting
vectors are uniformly bounded in the ℓ1 -norm. It turned out that the result does not require
any condition on the ratio of the dimension and the sample size, contrary to many asymptotic
results in highdimensional statistics and probability.
In the present article, we study the more general case of an increasing number of quadratic
forms as arising when projecting onto a sequence of subspaces whose dimension converges to
∞. Noting that the analysis of autocovariances of a stationary linear time series appears as a
special case of our approach, there are a few recent results related to our work: [23] established
a central limit theorem for a finite number of autocovariances, whereas in [22] the case of long
memory series has been studied. [8] has studied the asymptotic theory for detecting a change
in mean of a vector time series with growing dimension.
To treat the case of an increasing number of bilinear forms, we consider two related but
different frameworks: The first framework uses a sequence of Euclidean spaces Rdn equipped
with the usual Euclidean norm. The second framework embeds those spaces in the sequence
space ℓ2 equipped with the ℓ2 –norm. It is shown that, in both frameworks, an increasing
number of, say Ln , quadratic forms can be approximated by Brownian motions without any
constraints on Ln , dn and n apart from n → ∞. One of our main results asserts that, for the
assumed time series models, one can define, on a new probability space, equivalent versions
and a Gaussian process Gn taking values in C([0, 1], RLn ), such that
Ln
1
b ⌊nt⌋ − E Σ
b ⌊nt⌋ )wn(j)
− Gn (t) = oP (1),
vn(j) ′ (Σ
sup √
j=1
nLn
t∈[0,1]
as n → ∞, almost surely (a.s.), without any constraints on Ln , dn .
We believe that those results have many applications in diverse areas, as indicated above.
In this paper we study in some detail two direct applications: The first application considers
the trace operator, which equals the trace matrix norm k · ktr when applied to covariance
matrices. We show that the trace of the sample covariance matrix, appropriately centered,
can be approximated by a Brownian motion, a.s. on a new probability space, which also
establishes the convergence rate
b n ktr − kE Σ
b n ktr = OP (n−1/2 dn ).
kΣ
The second application elaborated in this paper is shrinkage estimation of a covariance
matrix as studied in depth for i.i.d. sequences of high–dimensional random vectors as well
as dependent vector time series, see by [12], [13] and [16] amongst others. In order to regularize the sample variance-covariance matrix, the shrinkage estimator considers a convex
combination with a well–defined target that usually corresponds to a simple regular model.
We consider the identity target, i.e. a multiple of the identity matrix In of dimension dn . To
the best of our knowledge, large sample approximations for those estimators have not yet
been studied. We show that, uniformly in the shrinkage weight for the convex combination,
a bilinear form given by the shrinkage estimator can be approximated by a Gaussian process
when it is centered at the shrunken true covariance matrix using the same shrinkage weight.
By uniformity, the result also holds for the widely used estimator of the optimal shrinkage
weight. For this estimated optimal weight the convergence rate under quite general conditions
is known. It turns out that, when comparing the matrices in terms of a natural pseudodistance induced by bilinear forms, the convergence rate carries over from the optimal weight’s
INFERENCE FOR THE TRACE
3
estimator. We also compare the shrinkage estimator using the estimated optimal weight with
an oracle estimator using the unknown optimal weight. Last, we study the case of nearly (i.e.
asymptotically) orthogonal vectors. As a consequence of the Kabatjanskii-Levenstein bound,
see [18], this property allows to place much more unit vectors on the unit sphere. It turns
out that for nearly orthogonal vectors the nonparametric part dominates in large samples,
contrary to the situation for vectors bounded away from orthogonality.
The high-dimensional time series model of the paper is as follows. At time n, n ∈ N, we
observe a d = dn dimensional mean zero vector time series
(1)
(d )
Yni = (Yni , . . . , Yni n )′ ,
1 ≤ i ≤ n,
defined on a common probability space (Ω, F, P ), whose coordinates are causal linear processes,
(1.1)
(ν)
Yni
=
∞
X
(ν)
i ∈ N0 , ν = 1, . . . , dn ,
cnj ǫi−j ,
j=0
where {ǫt } are independent mean zero error
P terms,possibly not identically distributed, such
that E|ǫk |4+δ < ∞ for some δ > 0 and n−1 ni=1 E(ǫri ), r = 2, 3, 4, converges. The coefficients
(ν)
cnj may depend on n and are therefore also allowed to depend on the dimension dn . We
impose the following growth condition.
(ν)
Assumption (A): The coefficients cnj of the linear processes (1.1) satisfy
(1.2)
(ν)
sup max |cnj |2 ≪ j −3/2−θ
n∈N 1≤ν≤dn
for some 0 < θ < 1/2.
It is well known that Assumption (A) covers common classes of weakly dependent time
series such as ARMA(p, q)-models as well as a wide range of long memory processes. We refer
to [17] for a discussion.
Define the (centered) bilinear form
(1.3)
Qn (vn , wn ) =
where
√
b n − Σn )wn ,
nvn′ (Σ
vn , wn ∈ Rdn ,
n
(1.4)
X
′
bn = 1
Σ
Yni Yni
n
and
i=1
b n.
Σn = E Σ
The class of proper (sequences of) weighting vectors,
wn = (wn1 , . . . , wndn )′ ,
n ≥ 1,
studied throughout the paper is the set W of those sequences {wn : n ≥ 1}, wn ∈ Rdn , n ≥ 1,
which have uniformly bounded ℓ1 -norm in the sense that
(1.5)
sup kwn kℓ1 = sup
n∈N
dn
X
n∈N ν=1
|wnν | < ∞.
4
A. STELAND, R. VON SACHS
ℓ1 -weighting vectors naturally arise in various applications such as sparse principal component
analysis as, see e.g. [20], or sparse financial portfolio selection as studied by [4]. For a more
detailed discussion we refer to [17].
It is worth mentioning that our results easily carry over to weighting vectors with uniformly
bounded ℓ2 -norm, provided one relies on standardized versions of the bilinear form (1.3). First
notice that conditions (1.2) and (1.5) allow us to control the linear process coefficients of a
projected time series, wn′ Yni , 1 ≤ i ≤ n, which are then O(j −3/2−θ ) and therefore decay at
the same rate as the original time series. The ℓ2 assumption
v
u dn
uX
w2 < ∞,
(1.6)
sup t
nν
n≥1
ν=1
leads to the estimate
dn
X
(ν)
wnν cnj
ν=1
v
u dn
uX (ν)
= O t
|c |2
nj
ν=1
For bounded dimension, (1.2) yields the estimate j −3/2−θ for the latter expression, but for
P
(ν) 2
growing dimension this does not hold in general. Assuming ∞
ν=1 |cnj | < ∞ for all j ≥ 0, is,
(ν)
however, not reasonable for a high-dimensional setting, since then cnj = o(1), as ν → ∞. For
(ν)
example, if cnj = ρjν , for 0 < |ρν | < 1, ν ≥ 1, the latter assumption would rule out the case
of observing dn autoregressive time series of order 1 with autoregressive parameters bounded
(ν)
away from zero. On the other hand, if wnν ≥ wmin > 0, for ν ≥ 1, and cnj ≥ cj,min > 0 for
Pn
(ν)
wnν cnj ≥ dn wmin cj,min → ∞ for each lag j ≥ 0. This can be
ν ≥ 1 and n ≥ 1, then dν=1
e n′ Yni instead of wn′ Yni , where w
e n = d−1
fixed by considering w
n wn . Then
!
d
d
n
n
X
1 X
(ν)
(ν)
j ≥ 0.
w
enν cnj = O
|cnj |2 ≪ j −3/2−θ ,
dn
ν=1
ν=1
Next observe that by Jensen’s inequality
v
u∞
dn p
X
X
1 u
1
2
t
2 .
√
|w
enν | =
wnν ≤
wnν
dn
d
n
ν=1
ν=1
ν=1
dn
X
e n : n ≥ 1} ∈ W and w
e n′ Yni is a linear time
Hence, (1.2) and the ℓ2 -condition (1.6) imply {w
series with coefficients decaying at the same rate j −3/2−θ as the original time series. Clearly,
for any sequences vn , wn of weighting vectors with uniformly bounded ℓ2 -norm, we have the
scaling property
e n ),
Qn (vn , wn ) = d2n Qn (e
vn , w
en = d−1
e n = d−1
where v
n vn and w
n wn have uniformly bounded ℓ1 -norm. But if one standardizes
2
Qn , the factor dn cancels. Hence, in this sense several of our theoretical results can be also
applied to study projection onto vectors with uniformly bounded ℓ2 -norm.
The rest of the paper is organized as follows. In Section 2, we introduce the partial sums
and partial sum processes associated to an increasing number of bilinear forms and establish
the strong and weak approximation theorems for those bilinear forms. The application to
the trace functional is discussed in Section 3. The large sample approximations for shrinkage
estimators of covariance matrices are studied in depth in Section 4.
5
INFERENCE FOR THE TRACE
2. LARGE SAMPLE APPROXIMATIONS FOR HIGH–DIMENSIONAL BILINEAR FORMS
2.1. Definitions and review
Let us define the matrix–valued partial sums
!
k
X
(ν)
(µ)
b nk =
Yi Yi
Σ
(2.1)
,
i=1
(2.2)
Σnk =
k
X
i=1
1≤ν,µ≤dn
(ν)
EYi
(µ)
Yi
!
,
1≤ν,µ≤dn
for n, k ≥ 1, and put
(2.3)
b nk − Σnk )wn ,
Dnk (vn , wn ) = vn′ (Σ
n, k ≥ 1,
for two sequences of weighting vectors {vn }, {wn } ∈ W. The associated càdlàg processes will
be denoted by
(2.4)
b n,⌊nt⌋ −Σn,⌊nt⌋ )wn ,
Dn (t; vn , wn ) = n−1/2 Dn,⌊nt⌋ (vn , wn ) = vn′ n−1/2 (Σ
t ∈ [0, 1], n ≥ 1.
Especially, we have
√
b n − Σn )wn , n ≥ 1,
Dn (1) = Dn (1; vn , wn ) = vn′ n(Σ
b n = 1 Pn E(Yni Yni )′ .
with Σn = E Σ
i=1
n
For some sequence of standard Brownian motions, {Bn (t) : t ∈ [0, ∞)}, n ≥ 1, and any
constant N > 0 we can introduce the rescaled version {N −1/2 BN (tN ) : s ∈ [0, 1]} called the
[0,1]–version of Bn . In [17] the following result on the asymptotics of a single bilinear form
for a uniformly bounded ℓ1 -projections is shown:
(2.5)
Theorem 2.1 Suppose Yni , 1 ≤ i ≤ n, n ≥ 1, is a vector time series according to
model (1.1) that satisfies Assumption (A). Let vn and wn be weighting vectors with uniformly bounded ℓ1 –norm in the sense of (1.5). Then, for each n ∈ N, there exists equivalent versions of Dnk (vn , wn ) and Dn (t; vn , wn ), t ≥ 0, again denoted by Dnk (vn , wn ) and
Dn (t; vn , wn ), and a standard Brownian motion {Wn (t) : t ≥ 0}, which depends on (vn , wn ),
i.e. Wn (t) = Wn (t; vn , wn ), both defined on some probability space (Ωn , Fn , Pn ), such that for
some λ > 0 and a constant Cn
(2.6)
|Dnt (vn , wn ) − αn (vn , wn )Wn (t)| ≤ Cn t1/2−λ ,
for all t > 0 a.s.,
where αn (vn , wn ) is defined in (A.7). If Cn n−λ = o(1), as n, t → ∞, this implies the strong
approximation
(2.7)
sup |Dn (t; vn , wn ) − αn (vn , wn )Wn (⌊nt⌋/n)| = o(1),
t∈[0,1]
as n → ∞, for the [0, 1]–version of Wn as well as the CLT
(2.8)
|Dn (1; vn , wn ) − αn (vn , wn )Wn (1)| = o(1),
as n → ∞, i.e. Dn (1) is asymptotically N (0, α2n ).
a.s.,
a.s.,
6
A. STELAND, R. VON SACHS
A multivariate version for L ∈ N bilinear forms, which approximates
L
Dn (·; vn(j) , wn(j) )
j=1
by a L–dimensional Brownian motion, has been shown in [17, Th. 4.2]. This result allows to
consider the dependence structure which arises when mapping Yn = Ynn onto the subspace
(j)
PL = span{wn : j = 1, . . . , L} spanned by L weighting vectors,
wn(j) ∈ W,
j = 1, . . . , L.
We have the canonical mapping, called projection (onto PL ) in the sequel,
(2.9)
Yn 7→ Pn Yn ,
Pn = (wn(1) , . . . , wn(L) )′ ,
(1)
(L)
which represents the orthogonal projection onto PL , if wn , . . . , wn are orthonormal. The
associated variance-covariance matrix is
.
Cov (Pn Yn ) = Cov (wn(j) Yn , wn(k) Yn )
= wn(j) ′ Σn wn(k)
1≤j,k≤L
1≤j,k≤L
(j)
If the wn ’s are eigenvectors of Σn , then Cov (Pn Yn ) is a diagonal matrix. But that property
is lost for more general spanning vectors. Given the sample Yn1 , . . . , Ynn of dn -dimensional
random vectors, the canonical nonparametric statistical estimators of Σn and Cov (Pn Yn )
b n as defined in (1.4) and
are Σ
d (Pn Yn ) = w(j) ′ Σ
b n w(k)
Cov
.
n
n
1≤j,k≤L
d (Pn Yn ) consist of bilinear forms as studied in Theorem 2.1, and for fixed
The entries of Cov
L its multivariate extension suffices to study the dependence structure of the projection onto
PL . This no longer holds, if L is allowed to grow as the sample size increases, i.e. when
studying the case L = Ln → ∞, as n → ∞. Indeed, the treatment of that high–dimensional
situation is much more involved. As we shall see, it requires a different scaling and a more
involved mathematical framework: The strong approximations we establish in this paper take
place in the Euclidean space RLn of growing dimension and the infinite-dimensional Hilbert
space ℓ2 , respectively.
Thus, to go beyond the case of a finite number of bilinear forms we now consider
b n w(j) ,
Qn (vn(j) , wn(j) ) = vn(j) ′ Σ
n
j = 1, . . . , Ln ,
Dnj = L−1/2
Dn (1; vn(j) , wn(j) ),
n
j = 1, . . . , Ln ,
(j)
(j)
∞
where ({vℓ }∞
ℓ=1 , {wℓ }ℓ=1 ) ∈ W × W, j = 1, . . . , Ln , are Ln pairs of uniformly ℓ1 -bounded
sequences of weighting vectors and Ln may tend to infinity as n → ∞. We are interested in
the joint asymptotics of the centered and scaled versions of the corresponding statistics (2.5)
given by
(2.10)
and the associated sequential càdlàg processes
(2.11)
Dnj (t) = L−1/2
Dn (t; vn(j) , wn(j) ),
n
t ∈ [0, 1],
j = 1, . . . , Ln ,
7
INFERENCE FOR THE TRACE
−1/2
cf. (2.4). The additional factor Ln
anticipates the right scaling to obtain a large sample
approximation.
Further, we are interested in studying weighted averages where averaging takes place over
all Ln forms and all sample sizes n ∈ N. Let λn be the weight for sample size n and µρ
the weight for the ρth quadratic form associated to a pair of sequences of weighting vectors
(ρ)
(ρ)
{vn , wn : n ≥ 1} for ρ = 1, . . . , Ln , n ≥ 1. Define for k ≥ 1
(2.12)
Dk ({(vn(ρ) , wn(ρ) )})
=
∞
X
λn λm
Ln X
Lm
X
ρ=1 σ=1
n,m=1
where
(2.13)
(2.14)
b nmk =
Σ
X
(σ)
b nmk − Σnmk )wm
µρ µσ vn(ρ) ′ (Σ
,
′
,
Yni Ymi
i≤k
b nmk ),
Σnmk = E(Σ
for n, m ≥ 1. Notice the relations
b nnk = Σ
b nk ,
Σ
b nn = nΣ
bn
Σ
(ρ)
(ρ)
(ρ)
(ρ)
between (1.4), (2.1) and (2.13). Dk ({(vn , wn )}) depends on all weights {vnν , wnν , λn , µρ :
1 ≤ ν ≤ dn , 1 ≤ ρ ≤ Ln , n ≥ 1} but is measurable w.r.t Gk = σ(Yni : n ∈ N, i ≤ k). Now, for
any sample size M we may consider the associated càdlàg process associated to (2.12)
(2.15)
DM (t; {(vn(ρ) , wn(ρ) )}) = M −1/2 D⌊M t⌋ ({(vn(ρ) , wn(ρ) )}),
t ∈ [0, 1].
2.2. Preliminaries
Before proceeding, recall the following facts on the Hilbert space ℓ2 and strong approximations in Hilbert spaces. We shall denote the inner product of an arbitray Hilbert space by
< ·, · >, the induced norm by| · | and the operator semi-norm of an operator T : H → H
by kT kop = supx∈H:|x|=1 |T x|. Our results take place in the Hilbert space ℓ2 of all sequences
P
f = (fj )j with j fj2 < ∞, which is a separable Hilbert space when equipped with the inner
p
P
product (f, g) = j fj gj , f = (fj )j , g = (gj )j ∈ ℓ2 , and the induced norm kf kℓ2 = (f, f ).
The associated operator norm of an operator T : ℓ2 → ℓ2 is simply denoted by kT k. For two
random variables X, Y defined on (Ω, F, P ) with E(X 2 ), E(Y 2 ) < ∞, we denote the inner
product by (X, Y )L2 , where L2 = L2 (Ω, F, P ).
Sufficient conditions for a strong approximation of partial sums of dependent random
elements taking values in a separable Hilbert space require the control of the associated
conditional covariance operator. Denote the underlying probability space by (Ω, F, P ). Let
2
X
P = (X2j )j be a random element defined on (Ω, F, P ) taking values in ℓ2 with EkXkℓ2 =
j E(Xj ) < ∞. The covariance operator CX : ℓ2 → ℓ2 associated to X is defined by
X
fj E(Xj Xk ) ,
CX (f ) = E[(f, X)X] =
j
k
f = (fj )j ∈ ℓ2 .
8
A. STELAND, R. VON SACHS
To any σ-field A we may associate the conditional covariance operator of X given A,
X
(2.16) CX (f |A) = E[(f, X)X|A] =
fj E(Xj Xk |A) ,
f = (fj )j ∈ ℓ2 .
j
k
Covariance operators are symmetric positive linear operators with operator norm
(2.17)
kCX (·|A)k =
sup
f ∈ℓ2 :kf kℓ2 =1
k(CX (f ), f )kℓ2 .
For further properties and discussion see [3].
A strong invariance principle in ℓ2 deals with the a.s. approximation of partial sums of
ℓ2 –valued random elements by a Brownian motion in ℓ2 . Recall that a random element B =
{B(t) : t ∈ [0, 1]} with values in C([0, 1], ℓ2 ) is called Brownian motion in ℓ2 , if
(i) B(0) = 0 ∈ ℓ2 ,
(ii) for all 0 ≤ t1 < · · · < tn ≤ 1 the increments B(ti+1 ) − B(ti ), i = 1, . . . , n − 1, are
independent and
(iii) for all 0 ≤ s, t ≤ 1 the increment B(t) − B(s) is Gaussian with mean 0 and covariance
operator
P min(s, t)K for some nonnegative linear and self-adjoint operator K on ℓ2 such
that ∞
i=1 (Kei , ei ) < ∞, where {ei } is some orthonormal system for ℓ2 .
If K = CX for some random element X, B is the Brownian motion generated by X. The
definition for a general separable Hilbert space is analogous.
A strong invariance principle or strong approximation for a sequence ζ1 , ζ2 , . . . of random
elements taking values in an arbitrary separable Hilbert space H with inner product < ·, · >
and induced norm | · | asserts that they can be redefined on a rich enough probability space
such that there exists a Brownian motion B with values in H and covariance operator Cζ
such that, a.s.,
(2.18)
X
j≤t
ζj − B(t) ≤ ct1/2−λ ,
for constants λ > 0 and c < ∞, if the dimension of H is finite, and,
(2.19)
X
j≤t
p
ζj − B(t) = o( t log(log t)),
as t → ∞, a.s., if H is infinite dimensional.
Throughout the paper we write, for two arrays {an′ ,m′ } and {bn′ ,m′ } of real numbers,
n′ ,m′
an′ ,m′ ≪ bn′ ,m′ , if there exists a constant c such that an′ ,m′ ≤ cbn′ ,m′ for all n′ , m′ .
2.3. Large sample approximations
We aim at showing a strong approximation for the D([0, 1]; ℓ2 )-valued processes
n
Dn = (Dnj )L
j=1 ,
n ≥ 1,
INFERENCE FOR THE TRACE
9
where the coordinate processes Dnj are given by
Dnj (t) = √
(j)
1
Dn,⌊nt⌋ (vn(j) , wn(j) ),
nLn
(j)
(j)
t ∈ [0, 1],
n ≥ 1,
(j)
b nk − Σnk )wn for j = 1, . . . , Ln , n ≥ 1, cf. (2.3) and (2.10).
with Dnk (vn , wn ) = vn ′ (Σ
The above processes can be expressed as partial sums.
Lemma 2.1
(2.20)
We have the representation
Dnk =
k
X
(n)
ξi ,
i=1
for k = 1, . . . , n, n ≥ 1, leading to
(2.21)
Dn (t) = √
⌊nt⌋
1 X (n)
ξ ,
nLn i=1 i
(n)
where the random elements ξi
t ∈ [0, 1], n ≥ 1,
are defined in (2.37).
To introduce the conditional covariance operators associated to Dn , denote the filtration
Fm = σ(ǫi : i ≤ m), m ∈ Z, and define
C (n) (f |F0 ) = E[(f, Dn (1))Dn (1) | F0 ],
f ∈ ℓ2 , n ≥ 1.
Let us also introduce the unconditional covariance operator
C (n) (f ) = E[(f, Zn )Zn ],
f ∈ ℓ2 ,
n
where Zn = (Znj )L
j=1 , n ≥ 1, with random variables Znj , 1 ≤ j ≤ Ln , satisfying E(Znj ) = 0
and
2
E(Znj Znk ) = L−1
n βn (j, k),
for j, k = 1, . . . , Ln . Here
(2.22)
βn2 (j, k) = βn2 (vn(j) , wn(j) , vn(k) , wn(k) )
are the quantities introduced in (A.9), the asymptotic covariance parameters of the bilinear
(j)
(j)
(k)
(k)
forms corresponding to the pairs (vn , wn ) and (vn , wn ), 1 ≤ j, k ≤ Ln .
The following technical but crucial result establishes the convergence of C (n) (·|F0 ) − C (n) (·)
in the operator semi–norm in expectation and provides us with a convergence rate.
Theorem 2.2
(j)
(j)
Suppose (vn , wn ), j = 1, . . . , Ln , have uniformly bounded ℓ1 -norms,
sup max max{kvn(j) kℓ1 , kwn(j) kℓ1 } ≤ C < ∞,
n≥1 1≤j≤Ln
for some constant C. Let
(2.23)
(n)
Sn′ ,m′
1
=√ ′
n Ln
′ +n′
mX
k=m′ +1
(n)
ξk ,
m′ , n′ ≥ 1, n ≥ 1,
10
A. STELAND, R. VON SACHS
(n)
with ξk
defined by (2.37). Define
(n)
(n)
(n)
Cn′ ,m′ (f |Fm′ ) = E[(f, Sn′ ,m′ )Sn′ ,m′ |Fm′ ],
for f ∈ ℓ2 . Then
n′ ,m′
(n)
EkCn′ ,m′ (·|Fm ) − C (n) (·)k ≪ (n′ )−θ/2 ,
where k · k denotes the operator norm defined in (2.17).
We are now in a position to formulate the first main result on the large sample approximations of Ln bilinear forms when Ln converges to infinity, in terms of the ℓ1 – as well as the
ℓ2 –norm. The results holds true under the weak assumption that the weighting vectors have
uniformly bounded ℓ1 norm.
Theorem 2.3 Let Yni , 1 ≤ i ≤ n, be a vector time series following model (1.1) and sat(L )
(Ln ) ∞
(1) ∞
(1)
}ℓ=1 , {wn n }∞
isfying Assumption (A). Suppose that ({vℓ }∞
ℓ=1 ) ∈
ℓ=1 , {wℓ }ℓ=1 ), . . . , ({vn
W × W, n ≥ 1, have uniformly bounded ℓ1 -norm, i.e.
sup max max{kvn(j) kℓ1 , kwn(j) kℓ1 } ≤ C,
n≥1 1≤j≤Ln
for some constant C < ∞. Then all processes can be redefined on a rich enough probability
space, such that there exists, for each n, a Brownian motion of dimension Ln ,
Bn (t) = Bn (t; {(vn(j) , wn(j) ) : 1 ≤ j ≤ Ln }),
t ≥ 0,
with coordinates Bn (t)j , j = 1, . . . , Ln , and covariance function given by
(2.24)
2
E(Bn (s)j Bn (t)k ) = min(s, t)L−1
n βn (j, k),
for 1 ≤ j, k ≤ Ln and s, t ≥ 0, such that the following assertions hold true.
(i) In the Euclidean space RLn we have the strong approximation
(2.25)
kL−1/2
Dnt
n
− Bn (t)kRLn =
t
X
(n)
L−1/2
ξi
n
i=1
− Bn (t)
RLn
≤ Cn t−1/2−λn ,
a.s, for constants Cn < ∞ and λn > 0, where λn depends only on Ln , δ and θ.
Provided
(2.26)
Cn n−λn = o(1),
as n → ∞, the following assertions hold.
(ii) With respect to the ℓ2 –norm we have
sup
Ln
X
t∈[0,1] j=1
Dnj (t) − B n
⌊nt⌋
n
2
= o(1)
j
as n → ∞, a.s., for the [0, 1]–version B n of Bn .
INFERENCE FOR THE TRACE
11
(iii) With respect to the ℓ1 –norm we have
Ln
1 X
⌊nt⌋
Dnj (t) − B n
= o(1),
sup √
n j
Ln j=1
t∈[0,1]
as n → ∞, a.s., for the [0, 1]–version B n of Bn , and with respect to the maximum norm
sup max Dnj (t) − B n
t∈[0,1] j≤Ln
⌊nt⌋
n
= o(1),
j
as n → ∞, a.s..
(iv) Let {λn : n ∈ N} and {µρ : ρ ∈ N} be ℓ1 –weights. Then there exist constants λ > 0
(ρ)
(ρ) ∞
∞
and C < ∞ and α({λn }∞
n=1 , {µρ }ρ=1 , {(vn , wn )}n,ρ=1 ) ≥ 0, such that for equivalent
versions and a standard Brownian motion B on [0, ∞), defined on a new probability
space,
(2.27)
∞
(ρ)
(ρ) ∞
1/2−λ
|Dt ({(vn(ρ) , wn(ρ) )}) − α({λn }∞
,
n=1 , {µρ }ρ=1 , {(vn , wn )}n,ρ=1 )B(t)| ≤ Ct
a.s., for all t > 0. Further, for any sample size M
(2.28)
−λ
∞
(ρ)
(ρ) ∞
,
sup |DM (t; {(vn(ρ) , wn(ρ) )})−α({λn }∞
n=1 , {µρ }ρ=1 , {(vn , wn )}n,ρ=1 )B M (t)| ≤ CM
t∈[0,1]
a.s., for the [0, 1]–version B M of B.
Remark 2.1
(2.29)
The Brownian motions can be constructed such that
⌊nt⌋ (j) (j)
⌊nt⌋
−1/2
(j)
(j)
; vn , wn
= o(1),
− Ln αn (vn , wn )Wn
sup B n
n j
n
t∈[0,1]
(j)
(j)
as n → ∞, a.s., if (2.26) holds, where Wn (·; vn , wn ) is as in Theorem 2.1, for j = 1, . . . , Ln .
Due to assertion (iv) of the above theorem we may conjecture that (2.26) holds, cf. the
discussion in [17], but we have neither a proof nor a counterexample. The following result
studies the relevant processes in the infinite–dimensional space ℓ2 and yields an approximation
in probability taking into account the additional factor log log(n).
Theorem 2.4 Suppose that the assumptions of Theorem 2.3 hold. In the Hilbert space ℓ2 we
have the strong approximation
(2.30)
kLn−1/2 Dnt
− Bn (t)kℓ2 =
t
X
k=1
(n)
L−1/2
ξk − Bn (t)
n
ℓ2
p
= o( t log(log t)),
as t → ∞, a.s. There exists a sequence {δn : n ≥ 1} ⊂ N such that with N = ⌈n log log(n)⌉
(2.31)
max
δn ≤k≤n
k
X
k
1
(n)
√
ξi − B N
N
N Ln i=1
= oP (1),
ℓ2
12
A. STELAND, R. VON SACHS
n → ∞, for the [0, 1]–version B N (t) = N −1/2 Bn (tN ). In other words,
r
k
n
k
Dn
= oP (1),
− BN
(2.32)
max
δn ≤k≤n
N
n
N
ℓ2
or equivalently
(2.33)
sup
δn
≤t≤1
n
r
n
Dn (t) − B N
N
⌊nt⌋
N
= oP (1),
ℓ2
as n → ∞.
The above result eliminates the condition (2.26), but we have no detailed information about
the sequence δn .
The question arises, whether the above results are limited to linear processes. As the main
arguments deal with approximating martingales, we have the following result, which suggests
that the class of vector time series to which the main results of this paper apply is larger.
(1)
(L )
(1)
(Ln ) ∞
}ℓ=1 )
n
∞
}∞
Theorem 2.5 Let ({vℓ }∞
ℓ=1 , {wn
ℓ=1 , {wℓ }ℓ=1 ), . . . , ({vn
projection vectors with uniformly bounded ℓ1 -norm, i.e.
∈ W × W, n ≥ 1, be
sup max max{kvn(j) kℓ1 , kwn(j) kℓ1 } ≤ C,
n≥1 1≤j≤Ln
for some constant C < ∞. Let Yni , 1 ≤ i ≤ n, be a dn -dimensional vector time series such
(µ)
(ν)
(µ)
(n) (ν)
that Dnk (vn , wn ) can be approximated by the martingales Mk (vn , wn ), k ≥ 1, defined
(ν)
in (2.38) in L2 with rate n−θ , ν = 1, . . . , dn , for certain sequences of coefficients, cnj , j ≥ 0,
ν = 1, . . . , dn , satisfying Assumption (A) and a sequence of independent mean zero random
variables {ǫk : k ≥ 0} with supk≥1 E(ǫ4k ) < ∞. If
sup sup max max{E|vn(j) ′ Ynk |4+2δ , E|wn(j) ′ Ynk |4+2δ } < ∞,
n≥1 k≥1 1≤j≤Ln
for some δ > 0, then the results of this section still hold true.
2.4. Proofs
Proof of Lemma 2.1: We argue as in the proof of Theorem 2.1 given in [17], where it was
shown that the partial sum (2.3) associated to a single bilinear form Q(vn , wn ) attains the
representation
X (n)
(2.34) Dnk (vn , wn ) =
ξi (vn , wn )
i≤k
with Gaussian random variables
(2.35)
(n)
ξi (vn , wn ) = Yni (vn )Yni (wn ) − E(Yni (vn )Yni (wn )),
i = 1, 2, . . . , n, n ≥ 1,
for linear processes
Yni (vn ) =
∞
X
j=0
(v)
cnj ǫi−j ,
Yni (wn ) =
∞
X
j=0
(w)
cnj ǫi−j ,
i ∈ Z, n ∈ N,
13
INFERENCE FOR THE TRACE
with coefficients
(2.36)
(v)
cnj
=
dn
X
(ν)
vν cnj ,
(w)
cnj
=
dn
X
(ν)
wν cnj ,
ν=1
ν=1
(j)
(j)
for j ≥ 0 and n ≥ 1. For Ln pairs of weighting vectors (vn , wn ), j = 1, . . . , Ln , we consider
the corresponding partial sum process where the summands are the Ln -dimensional vectors
(2.37)
(n)
ξi
Ln
(n)
= ξi (j)
,
j=1
(n)
(n)
ξi (j) = ξi (vn(j) , wn(j) ), j = 1, . . . , Ln ,
for i = 1, 2, . . . , which we, however, also interpret as random elements taking values in ℓ2 .
This completes the proof.
Q.E.D.
[15, Th. 1] asserts that (2.18) and (2.19), respectively, hold, if the following conditions for
Pm′ +n′
′ ′
the scaled partial sums Sn′ (m′ ) = (n′ )−1/2 k=m
′ +1 ζk , k, m , n ≥ 0, are satisfied:
2+δ
(I) supj≥1 E|ζj |
< ∞ for some δ > 0.
(II) For some ε > 0
n′ ,m′
E|E(Sn′ (m′ ))|Fm′ )| ≪ (n′ )−ε .
(III) There exists a covariance operator C such that the conditional covariance operators
Cn′ (f |Fm′ ) = E[(f, Sn′ (m′ ))Sn′ (m′ )|Fm′ ),
f ∈ H,
converge in the operator semi-norm k · k to C(f ) in expectation with rate (n′ )−θ , i.e.
n′ ,m′
EkCn′ (·|Fm′ ) − C(·)k ≪ (n′ )−θ ,
for some θ > 0.
For a discussion of this result and extensions see [24]. As shown by [5], the strong invariance
principle (2.19) also holds true for strictly stationary sequences taking values in a separable
Hilbert space, which possess a finite moment of order 2+δ′ , δ′ > 0, and are strong mixing with
′
mixing coefficients satisfying α(k) = O(k−(1+ε)(1+2/δ ) ), for some ε > 0. The above conditions
are, however, more convenient when studying linear processes. [21] has studied strong invariance principles for a univariate nonlinear time series using the physical dependence measure,
which is easy to verify for linear processes. Extensions to vector-valued time series (of fixed
dimension) have been provided by [14]. We rely on the conditions of [15], since they allow to
study time series of growing dimension and taking values in the infinite-dimensional space ℓ2
in a relatively straightforward way.
As a preparation for the proof of Theorem 2.2, we need the following lemma dealing with
the uniform convergence of unconditional and conditional covariances of the approximating
martingales defined by
)
(
∞
m′
X
X
(n)
(n)
(n)
m′ ≥ 0,
fe (ν)ǫk−l ,
fe (ν)(ǫ2 − σ 2 ) + ǫk
(2.38) M ′ (ν) =
0,0
m
k=0
k
k
l,0
l=1
(ν)
(n) (ν)
(n)
where for brevity fel,i (ν) = fel,i (vn , wn ), l, i = 0, 1, 2, . . . , ν = 1, . . . , dn .
14
A. STELAND, R. VON SACHS
Lemma 2.2
Under Assumption (A) we have
(2.39)
(n)
(n)
(n)
n≥1
n′ ,m′
(n)
sup sup E[(Mm′ +n′ (ν) − Mm′ (ν))(Mm′ +n′ (µ) − Mm′ (µ))|Fm′ ] − n′ βn (ν, µ)
1≤ν,µ
<< (n′ )1−θ ,
L1
which implies
(2.40)
(n)
(n)
sup sup (n′ )−1 sup E[(Mm′ +n′ (ν) − Mm′ (ν))2 |Fm′ ] < ∞,
n≥1
1≤ν
n′ ,m′ ≥1
a.s. Further,
(2.41)
(n)
(n)
(n)
n′ ,m′
(n)
(n′ )−1 sup sup E(Mm′ +n′ (ν) − Mm′ (ν))(Mm′ +n′ (µ) − Mm′ (µ)) − n′ βn (ν, µ) << (n′ )−θ ,
n≥1 1≤ν,µ
which implies
(2.42)
(n)
(n)
sup sup (n′ )−1 sup E[(Mm′ +n′ (ν) − Mm′ (ν))2 ] < ∞,
n≥1
1≤ν
n′ ,m′ ≥1
Proof: A direct calculation leads to
(n)
(n)
(n)
(n)
CM n (ν, µ) = E[(Mm′ +n′ (ν) − Mm′ (ν))(Mm′ +n′ (µ) − Mm′ (µ)) | Fm′ ]
(3)
(0)
= CM n (ν, µ) + · · · + CM n (ν, µ),
where
(0)
CM n (ν, µ)
′ +n′
mX
=
∞
X
(n)
(n)
fel,0 (ν)feℓ,0 (µ)E[ǫk ǫk−l (ǫ2k′ − σk2 )|Fm′ ],
k,k ′ =m′ +1 l=1
(1)
CM n (ν, µ)
′ +n′
mX
=
k=m′ +1
(2)
CM n (ν, µ)
(n)
(n)
fe0,0 (ν)fe0,0 (µ)(γk − σk4 ),
′ +n′ k−m′ +1
mX
X
=
k=m′ +1
(3)
CM n (ν, µ) =
′ +n′
mX
l=0
∞
X
(n)
(n)
2
fel,0 (ν)fel,0 (µ)σk2 σk−l
,
k=m′ +1 l,l′ =k−m′
(n)
(n)
fel,0 (ν)fel′ ,0 (µ)σk2 ǫk−l ǫk−l′ ,
(1)
(2)
for m′ , n′ ≥ 0. Let us first estimate CM n (ν, µ) + CM n (ν, µ). We have
n′ ,m′
(2)
(1)
sup sup |CM n (ν, µ) + CM n (ν, µ) − n′ βn (ν, µ)| ≪ (n′ )1−θ ,
n≥1 1≤ν,µ
see (A.10). Next, we show that
#
"
(2.43)
sup E
n≥1
(3)
sup |CM n (ν, µ)|
1≤ν,µ
n′ ,m′
≪ (n′ )1−θ .
15
INFERENCE FOR THE TRACE
Recall that c2 = supk≥1 E(ǫ2k ) < ∞ and assume w.l.o.g. c2 = 1 in what follows. The Cauchy–
Schwarz inequality yields
(3)
|(n′ )−1 CM n (ν, µ)|
′
′
m +n
∞
∞
X
X
1 X
(n)
(n)
≤ ′
fel,0 (ν)ǫk−l
fel′ ,0 (µ)σk2 ǫk−l′
n
k=m′ +1 l=k−m′
l′ =k−m′
v
!2 v
!2
u
u
′ +n′
′ +n′
mX
∞
∞
u 1 mX
X
X
u
1
(n)
(n)
≤t ′
|fel,0 (ν)|ǫk−l t ′
|fel,0 (µ)|ǫk−l′ .
n
n
′
′
′
′
k=m +1
k=m +1
l=k−m
l=k−m
Using k · kℓ1 ≤ k · kℓ4 and Jensen’s inequality, we obtain
v
u
u1
t
n′
′ +n′
mX
k=m′ +1
∞
X
l=k−m′
(n)
|fel,0 (ν)|ǫk−l
!2
v
u
u
u1
≤t ′
n
v
u
u
u1
≤t ′
n
≤
1
n′
′ +n′
mX
∞
X
k=m′ +1
l=k−m′
′ +n′
mX
∞
X
k=m′ +1
′ +n′
mX
l=k−m′
∞
X
(n)
[fel,0 (ν)]4 ǫ4k−l
!1/2
(n)
sup[fel,0 (ν)]4 ǫ4k−l
1≤ν
(n)
sup[fel,0 (ν)]4 ǫ4k−l
1≤ν
k=m′ +1 l=k−m′
!1/2
!1/4
,
where the upper bound does not depend on ν. Hence,
v
u
′ +n′
∞
X
u 1 mX
(n)
′ −1 (3)
t
E sup |(n ) CM n (ν, µ)| ≤ E
sup[fel,0 (ν)]4 ǫ4k−l
′
n
1≤ν,µ
1≤ν
k=m′ +1 l=k−m′
v
u
′ +n′
∞
X
u 1 mX
(n)
t
sup[fel,0 (ν)]4 γk−l
≤
′
n
′
′ 1≤ν
k=m +1 l=k−m
(n)
(ν)
(µ)
Using |fel,0 (ν)| = O(kvn kℓ1 kvn kℓ1 l−3/4−θ/2 ), uniformly in n, supk≥1 γk < ∞ and the elePm′ +n′ P∞
−3−2θ = O((n′ )1−2θ ), (2.43) follows. Lastly, consider
mentary fact that k=m′
l=k−m′ +1 l
(0)
CM n (ν, µ). Since the indices satisfy k − ℓ ≤ m′ , ǫk−ℓ is Fm′ -measurable, whereas ǫk , ǫk′ are
independent from Fm′ . Hence
(0)
CM n (ν, µ)
=
′ +n′
mX
∞
X
k,k ′ =m′ +1 l=1
(n)
(n)
fel,0 (ν)fel,0 (µ)ǫk−ℓ E(ǫk (ǫ2k′ − σk2′ )).
Clearly, for k 6= k′ the summands vanish, such that
(0)
CM n (ν, µ)
=
′ +n′
mX
∞
X
k=m′ +1 l=1
(n)
(n)
fel,0 (ν)fel,0 (µ)ǫk−l E(ǫ3k ).
16
A. STELAND, R. VON SACHS
(0)
If E(ǫ3k ) = 0 for all k, CM n (ν, µ) = 0. Otherwise, put c3 = supk≥1 E|ǫk |3 . We have the estimate
′
′ −1
(n )
(0)
E|CM n (ν, µ)|
′
m +n ∞
1 X X e(n)
(n)
≤ c3 ′
|fl,0 (ν)fel,0 (µ)|E|ǫk−l |
n
k=m′ l=1
v
∞
m′ +n′ uX
1 X u
t [fe(n) (ν)]2 [fe(n) (µ)]2
≤ c3 ′
l,0
l,0
n
l=1
k=m′
v
′ +n′ u ∞
mX
uX
n′ ,m′
1
t
l−3−2θ ≪ (n′ )−θ .
= O ′
n
′
l=1
k=m
Hence (2.39) follows, The above arguments also imply that
n′ ,m′
sup sup E(n′ )−1 |CM n (ν, µ)| ≪ 1,
n≥1 1≤ν,µ
since
|(n′ )−1 CM n (ν, µ)| ≤ (n′ )−1 |CM n (ν, µ) − n′ βn (ν, µ)| + (n′ )−1 |βn (ν, µ)|,
where the first term is a.s. finite, since its L1 -norm is ≪ (n′ )−θ , and the second one is ≪ 1,
uniformly in 1 ≤ ν, µ, such that
sup sup E|(n′ )−1 CM n (ν, µ)| ≤ (n′ )−1 |CM n (ν, µ) − n′ βn (ν, µ)| + (n′ )−1 |βn (ν, µ)| ≪ 1.
n≥1 1≤ν,µ
which in turn implies (2.40). To verify (2.41) one first conditions on Fm′ and then argues simi(3)
larly in order to estimate ECM n (ν, µ). Observe that with c24 = max{supk≥1 (σk2 )3 , supk≥1 γk4 supk≥1 σk2 }
′ −1
E(n )
(3)
CM n (ν, µ)
2
m′ +n′ ∞
1 X X
(n)
≤ c24 ′
sup |fl,0 (ν)|
n
1≤ν
k=m′ +1 l=0
v
u
′ +n′
4
∞
X
u 1 mX
(n)
sup |fl,0 (ν)|
≤ c24 t ′
n
1≤ν
′
k=m +1 l=0
n′ ,m′
≪ (n′ )−θ ,
using k · kℓ1 ≤ k · kℓ4 and Jensen’s inequality, which verifies (2.41) and in turn (2.42). Q.E.D.
(n)
(ν)
(ν)
Introduce for m′ , n′ ≥ 1 and each coordinate 1 ≤ ν ≤ Ln the partial sums Dn′ ,m′ (vn , wn ) =
Pm′ +n′ (n) (ν) (ν)
i=m′ +1 ξi (vn , wn ) and denote the appropriately scaled versions by
(n)
(2.44)
(n)
Tn′ ,m′ (ν)
(ν)
(ν)
Dn′ ,m′ (vn , wn )
√
=
,
Ln n ′
m′ , n′ ≥ 1,
for 1 ≤ ν ≤ Ln . The corresponding martingale approximations are given by
(n)
(2.45)
(n)
Mn′ ,m′ (ν) =
(ν)
(ν)
(n)
(ν)
(ν)
Mn′ +m′ (vn , wn ) − Mm′ (vn , wn )
√
,
Ln n ′
m′ , n′ ≥ 1.
17
INFERENCE FOR THE TRACE
We need to study the approximation error,
(n)
(n)
(n)
n′ , m′ ≥ 1.
Rn′ ,m′ (ν) = Tn′ ,m′ (ν) − Mn′ ,m′ (ν),
The next result improves upon [Lemma 2][11] by showing that, firstly, the error is of order
(n′ )−θ in terms of the L1 –norm when conditioning on the past, and, secondly, that the result
is uniform over ℓ1 –bounded weighting vectors.
Lemma 2.3
We have
(n)
sup E (Rn′ ,m′ (ν))2 | Fm′
1≤ν
n′ ,m′
1
′ −θ
≪ L−1
n (n ) .
Proof: Consider, as in [11], the decomposition
(n)
(n)
(n)
(n)
Rn′ ,m′ (ν) = Qn′ ,m′ (ν) + Pn′ ,m′ (ν) + On′ ,m′ (ν),
where
′
′
−i−1
nX
−1 n X
1
(n)
(σ 2 ′ ′ 1{l=0} − ǫm′ +n′ −i ǫm′ +n′ −l ),
fe
=√
Ln n′ i=0 l=0 l,i+1 m −n −i
(2.46)
(n)
Qn′ ,m′ (ν)
(2.47)
(n)
Pn′ ,m′ (ν) = √
(2.48)
(n)
On′ ,m′ (ν)
∞ ∞
1 X X e(n)
(n)
2
(ν) − fel,i+n′ +1 (ν))(ǫm′ −i ǫm′ −i−l − σm
(f
′ −l 1{l=0} ),
Ln n′ i=0 l=0 l,i+1
′
(n)
nX
−1 X
∞
1
(n)
fe
(ν)ǫm′ +n′ −k ǫm′ +n′ −i .
= −√
Ln n′ i=0 k=n′ k−i,i+1
(n)
Pn′ ,m′ (ν) is the projection of Rn′ ,m′ (ν) onto the subspace spanned by {ǫr ǫs −σr2 1{r=s} : −∞ <
2
r, s ≤ m′ } and therefore Fm′ –measurable. Hence with em′ ,i,l = ǫm′ −i ǫm′ −i−l − σm
′ −l 1{l=0}
(n)
Ln n′ E (Pn′ ,m′ (ν))2 | Fm′ =
≤
∞
∞ X
X
(n)
(n)
(fel,i+1 (ν) − fel,i+n′ +1 (ν))em′ ,i,l
i=0 l=0
∞
∞ X
X
i=1 l=0
!2
!2
(n)
(n)
|fel,i+1 (ν) − fel,i+n′ +1 (ν)||em′ ,i,l |
∞
∞ X
X
(n)
(n)
(fel,i+1 (ν) − fel,i+n′ +1 (ν))2 e2m′ ,i,l
≤
i=1 l=0
≤
∞
∞ X
X
(n)
2
(fel,i+1 (ν)
sup γk sup
1≤ν i=0
k≥1
l=0
a.s., such that due to (A.4)
m′ ,n′
(n)
′ −θ
E sup E (Pn′ ,m′ (ν))2 | Fm′ << L−1
n (n ) , a.s.
(n)
− fel,i+n′ +1 (ν))2 ,
1≤ν
(n)
(n)
Qn′ ,m′ (ν) is the projection of Rn′ ,m′ (ν) onto the subspace spanned by {ǫr ǫs − σr2 1{r=s} :
(n)
m′ < r, s ≤ m′ + n′ } and thus independent from Fm′ , such that E (Qn′ ,m′ (ν))2 | Fm′ =
18
A. STELAND, R. VON SACHS
m′ ,n′
(n)
E(Qn′ ,m′ (ν))2 << supk≥1 γk (Ln n′ )−1
Last, by Fatou
(n)
(Ln n′ )E (On′ ,m′ (ν))2 | Fm′
≤ lim
N →∞
≤
′ −1
nX
N
X
i,i′ =0 k,k ′ =n′
(n)
(n)
fek−i,i+1 (ν)fek−i′ ,i′ +1 (ν)ǫm′ +n′ −k ǫm′ +n′ −k′ E(ǫm′ +n′ −i ǫm′ +n′ −i′ )
′ −1
nX
N
X
(n)
(n)
2
sup σk lim
|fek−i,i+1 (ν)fek′ −i,i+1 (ν)ǫm′ +n′ −k ǫm′ +n′ −k′ |
N
→∞
k≥1
i=0 k,k ′ =n′
≤ sup σk2 lim
k≥1
N →∞
v
′ −1 u
nX
u
i=0
n′ −1
≤
m′ ,n′
Pn′ Pn′ −i e(n)
2 << (n′ )−θ , uniformly in 1 ≤ ν.
(ν))
(
f
i=1
l=0
l,i
t
N
X
k,k ′ =n′
(n)
(n)
[fek−i,i+1 (ν)]2 [fek′ −i,i+1 (ν)]2 ǫ2m′ +n′ −k ǫ2m′ +n′ −k′
N
X X
(n)
2
[fek−i,i+1 (ν)]2 ǫ2m′ +n′ −k
sup σk lim
N
→∞
k≥1
i=0 k=n′
a.s., where we estimated the ℓ1 –norm by the ℓ2 –norm. Hence,
′ −1 ∞
nX
X
(n)
(n)
2
′ −1
2 2
sup[fel,i (ν)]2
E sup E (On′ ,m′ (ν)) | Fm′ ≤ (Ln n ) sup(σk )
1≤ν
i=0 l=1 1≤ν
k≥1
m′ ,n′
′ −θ
≪ L−1
n (n ) ,
by virtue of (A.6). This completes the proof.
Q.E.D.
Proof of Theorem 2.2: For a sequence of conditional covariance operators Cn (·|A) =
E[(·, Xn )Xn | A] with Xn = (Xnj )j , E(Xn ) = 0 , n ≥ 1, say, we have convergence in the
operator semi-norm, defined as kT k = supf :kf k=1 |(f, T f )| for an operator T acting on ℓ2 ,
to some unconditional covariance operator C(·) = E[(·, Z)Z], Z = (Zj )j , E(Z) = 0, in
expectation, if
E
sup
f ∈ℓ2 :kf k=1
|(f, Cn (f |A) − C(f ))| = E
sup
∞
X
f ∈ℓ2 :kf k=1 j,k=1
fj fk [E(Xnj Xnk |A) − E(Zj Zk )]
converges to 0, as n → ∞. Define the ℓ2 –valued random elements
∞
∞
(n)
(n)
(n)
(n)
Mn′ ,m′ = Mn′ ,m′ (ν)
,
Tn′ ,m′ = Tn′ ,m′ (ν)
,
ν=1
(n)
(n)
ν=1
(n)
where Tn′ ,m′ (ν) = 0 and Mn′ ,m′ (ν) = Tn′ ,m′ (ν), for ν > Ln . Recall that
(n)
(n)
(n)
Cn′ ,m′ (f |Fm ) = E[(f, Tn′ ,m′ )Tn′ ,m′ |Fm′ ],
f ∈ ℓ2 ,
and let
(n)
(n)
(n)
C n′ ,m′ (f |Fm ) = E[(f, Mn′ ,m′ )Mn′ ,m′ |Fm′ ],
f ∈ ℓ2 ,
19
INFERENCE FOR THE TRACE
be the conditional covariance operator associated to the martingale approximations. Obviously,
(n)
sup EkCn′ ,m′ (·|Fm′ ) − C (n) (·)k ≤ Ξn′ ,m′ + Ψn′ ,m′
n≥1
where
(n)
(n)
Ξn′ ,m′ = sup EkCn′ ,m′ (·|Fm′ ) − C n′ ,m′ (·|Fm′ )k,
n≥1
(n)
Ψn′ ,m′ = sup EkC n′ ,m′ (·|Fm′ ) − C (n) (·)k.
n≥1
We shall estimate both terms separately. To simplify notation, let
(n)
(n)
CT n (ν, µ) = E Tn′ ,m′ (ν)Tn′ ,m′ (µ) | Fm′ ,
(n)
(n)
CM n (ν, µ) = E Mn′ ,m′ (ν)Mn′ ,m′ (µ) | Fm′ ,
′ −θ/2 ),
for 1 ≤ ν, µ ≤ Ln . To estimate Ξn′ ,m′ , we shall show that |CT n (ν, µ)−CM n (ν, µ)| is O(L−1
n (n )
uniformly in n, ν, µ. By an application of the Cauchy-Schwarz inequality, we have
E sup |CT n (ν, µ) − CM n (ν, µ)|
1≤ν,µ
(n)
(n)
(n)
(n)
= E sup E Tn′ ,m′ (ν)Tn′ ,m′ (µ) | Fm′ − E Mn′ ,m′ (ν)Mn′ ,m′ (µ) | Fm′
1≤ν,µ
(n)
(n)
(n)
≤ E sup E |Tn′ ,m′ (ν) − Mn′ ,m′ (ν)||Tn′ ,m′ (µ)| Fm′
1≤ν,µ
(n)
(n)
(n)
+ E sup E |Mn′ ,m′ (ν)||Tn′ ,m′ (µ) − Mn′ ,m′ (µ)| Fm′ ,
1≤ν,µ
where
(n)
(n)
(n)
E sup E |Tn′ ,m′ (ν) − Mn′ ,m′ (ν)| Tn′ ,m′ (µ)| | Fm′
1≤ν,µ
r
r
(n)
(n)
(n)
≤ E sup E (Tn′ ,m′ (ν) − Mn′ ,m′ (ν))2 | Fm′
sup E|Tn′ ,m′ (ν)|2
1≤ν
1≤ν
n′ ,m′
′ −θ/2
≪ L−1
,
n (n )
(n)
(n)
(n)
since Tn′ ,m′ (µ) is independent from Fm′ and the decomposition Tn′ ,m′ (µ) = Mn′ ,m′ (µ) +
(n)
(n)
(n)
(Tn′ ,m′ (µ) − Mn′ ,m′ (µ)) leads to supn≥1 sup1≤ν E|Tn′ ,m′ (ν)|2 < ∞, by virtue of (2.42) and
Lemma 2.3. Further,
(n)
(n)
(n)
E |Mn′ ,m′ (ν)||Tn′ ,m′ (µ) − Mn′ ,m′ (µ)| Fm′
r
r
(n)
(n)
(n)
2
≤ E (Tn′ ,m′ (µ) − Mn′ ,m′ (µ)) | Fm′
E |Mn′ ,m′ (ν)|2 | Fm′
n′ ,m′
′ −θ/2
≪ L−1
,
n (n )
20
A. STELAND, R. VON SACHS
by (2.40) and Lemma 2.3. uniformly in ν, µ = 1, . . . , Ln . Consequently,
n′ ,m′
sup Ln E sup |CT n (ν, µ) − CM n (ν, µ)| ≪ (n′ )−θ/2
n≥1
1≤ν,µ
Hence, using the inequality
P Ln
1/2
ν=1 |fν | ≤ Ln
(n)
(n)
P
Ln
2
ν=1 fν
1/2
, we obtain
Ξn′ ,m′ ≤ sup EkCn′ ,m′ (·|Fm′ ) − C n′ ,m′ (·|Fm′ )k
n≥1
= sup E
n≥1
Ln X
Ln
X
sup
T
M
fν fµ (Cνµ
− Cνµ
)
f :kf kℓ2 =1 ν=1 µ=1
T
M
≤ sup E sup |Cνµ
− Cνµ
|
n≥1
1≤ν,µ
n′ ,m′
′ −θ/2
≪ L−1
n (n )
Ln
X
ν=1
Ln X
Ln
X
sup
f :kf kℓ2 =1 ν=1 µ=1
!2
|fν |
|fν fµ |
n′ ,m′
≪ (n′ )−θ/2 ,
(n)
By Lemma 2.2, see (2.39), and the scaling of the martingale approximations, Mn′ ,m′ (ν),
1 ≤ ν ≤ Ln , by the factor (Ln n′ )−1/2 ,
sup Ln
n≥1
max
1≤ν,µ≤Ln
(n)
n′ ,m′
(n)
2
′ −θ
kE[Mn′ ,m′ (ν)Mn′ ,m′ (µ)|Fm′ ] − L−1
n βn (ν, µ)kL1 ≪ (n ) .
Therefore
(n)
Ψn′ ,m′ = sup EkC n′ ,m′ (·|Fm ) − C (n) (·)k
n≥1
≤ sup E sup
n≥1
kf kℓ2 =1 ν=1 µ=1
≤ sup E sup
n≥1
Ln X
Ln
X
sup
kf kℓ2 =1 1≤ν,µ
M
2
fν fµ (Cνµ
− L−1
n βn (ν, µ))
M
|Cνµ
−
n′ ,m′
2
L−1
n βn (ν, µ)|
′ −θ
≪ sup L−1
sup Ln
n (n )
n≥1
kf kℓ2 =1
Ln
X
ν=1
Ln
X
ν=1
!2
|fν |
n′ ,m′
fν2 ≪ (n′ )−θ .
Q.E.D.
Proof of Theorem 2.3: By virtue of Lemma 2.1, Equation (2.20), we have the representations
X (n) Ln
X (n) Ln
1
Dnt =
ξk (j)
, Dn (t) = √
ξk (j)
,
j=1
j=1
nLn
k≤t
k≤⌊nt⌋
−1/2 (n)
and therefore we check conditions (I) – (III) of [15] discussed above for ζk = Ln ξk , cf.
(2.37). The summands can be seen as attaining values in the Euclidean space RLn of finite (but
21
INFERENCE FOR THE TRACE
increasing in n) dimension Ln or as random elements taking values in the infinite dimensional
Hilbert space ℓ2 .
To show (I) observe that by the Cr –inequality, for each 1 ≤ j ≤ Ln ,
(n)
E|ξk (j)|2+δ ≤ E(|Ynk (vn(j) )Ynk (wn(j) )| + E|Ynk (vn(j) )Ynk (wn(j) )|)2+δ
≤ 23+δ E|Ynk (vn(j) )Ynk (wn(j) )|2+δ ,
such that
(2.49)
(n)
E|ξk (j)|2+δ
3+δ
≤2
q
(j)
E|Ynk (vn )|4+2δ
q
(j)
E|Ynk (wn )|4+2δ .
Repeating the arguments of [11, p. 343], we obtain for δ′ ∈ (0, 2) with χ = δ′ /2
′
E|Ynk (vn(j) )|4+δ ≤ sup E|ǫk′ |4+δ
k ′ ≥0
′
∞
X
l=0
(v )
|cnℓj |2(2+χ)
X
1+χ X
1+χ
∞
∞
(v )
(v )
|cnℓj |2
,
|cnℓj |2
+ sup E(ǫ2k′ ) sup E(ǫ2k′ )
k ′ ≥1
k ′ ≥0
(v )
ℓ=0
(j)
ℓ′ =0
(ν)
(ν)
uniformly in k ≥ 1. But sup1≤j |cnℓj | ≤ kvn kℓ1 sup1≤ν |cnℓ | and sup1≤ν |cnℓ | ≤ (l∨1)−3/4−θ/2 ,
P
P∞ (vj ) 2(2+χ)
(vj ) 2
due to Assumption (A), imply sup1≤j ∞
< ∞.
ℓ=0 |cnℓ | < ∞ and, in turn,
l=0 |cnℓ |
Noting that the above bounds hold uniformly in k and n, we obtain
(n)
sup sup max E|ξk (j)|2+δ < ∞.
n≥1 k≥1 1≤j≤Ln
By virtue of Jensen’s inequality, we may now conclude that
(n)
EkLn−1/2 ξk k2+δ
ℓ2
1+δ/2
Ln
Ln
X
X
1
(n)
(n)
=E
[ξk (j)]2
E|ξk (j)|2+δ < ∞,
≤ L−1
n
Ln
j=1
j=1
which establishes (I).
Introduce the partial sums
(2.50)
(n)
Sn′ ,m′
1
=√ ′
n Ln
′ +n′
mX
(n)
ξk ,
k=m′ +1
n′ , m′ ≥ 1.
(n)
(n)
Condition (II) can be shown as follows. Denote the coordinates of Sn′ ,m′ by Sn′ ,m′ (j) and
Pm′ +n′
−1/2 (n)
(n)
ξk (j). Denote the corresponding
notice that they are given by Sn′ ,m′ (j) = k=m
′ +1 Ln
(n)
(n)
(n)
(n)
martingale approximations by Mn′ ,m′ and Mn′ ,m′ (j), respectively, and let Rn′ ,m′ = Sn′ ,m′ −
(n)
(n)
Mn′ ,m′ be the remainder with coordinates Rn′ ,m′ (j), 1 ≤ j ≤ Ln , cf. the preparations above.
(n)
(n)
Clearly, the martingale property implies E(Sn′ ,m′ (j)|Fm′ ) = E(Rn′ ,m′ (j)|Fm′ ), 1 ≤ j ≤ Ln .
Lemma 2.3 asserts that
"
#
n′ ,m′
(n)
2
sup Ln E sup E (Rn′ ,m′ (j)) | Fm′
≪ (n′ )−θ ,
n≥1
1≤j
22
A. STELAND, R. VON SACHS
such that two applications of Jensen’s inequality lead to
v
u Ln h
i2
uX
(n)
(n)
sup E E(Sn′ ,m′ | Fm′ ) ≤ sup t
E E(Rn′ ,m′ (j) | Fm′ )
ℓ2
n≥1
n≥1
j=1
v
u Ln h
i
uX
(n)
E E (Rn′ ,m′ (j))2 | Fm′
≤ sup t
n≥1
j=1
v
"
#
u
u
(n)
t
≤ sup Ln E sup E (Rn′ ,m′ (j))2 | Fm′
n≥1
1≤j
n′ ,m′
≪ (n′ )−θ/2 ,
which shows (II). Condition (III) follows from Theorem 2.2.
Consequently, we may conclude that we may redefine all processes on a rich enough probability space where a Brownian motion Bn (t) = (Bn (t)j )j with covariance operator C (n) , i.e.
2
with covariances E(Bn (t)j Bn (t)k ) = L−1
n βn (j, k), exists, such that for constants λn > 0 and
Cn < ∞
kLn−1/2 Dn,t (vn , wn ) − Bn (t)kRLn ≤ Cn t1/2−λn ,
for all t ≥ 0,
a.s.. Therefore
sup kDn (t) − B n (⌊nt⌋/n)kRLn ≤ Cn n−λn ,
t∈[0,1]
a.s., for the [0, 1]–version B n of Bn , which implies assertions (i) and (ii).
−1/2
To show (iii) recall that the vector 1–norm of RLn can be bounded by Ln k · kRLn n , such
that
Ln
X
j=1
1/2
|Dnj (t) − B n (⌊nt⌋/n)j | ≤ L1/2
n kDn (t) − B n (⌊nt⌋/n)kℓ2 = o(Ln ),
as n → ∞, a.s. Further, using |xj | ≤
qP
j
x2j , we have
sup |Dn (t; vn(j) , wn(j) ) − B n (⌊nt⌋/n)j | ≤ sup kDn (t) − B n (⌊nt⌋/n)kℓ2 = o(1),
t∈[0,1]
t∈[0,1]
as n → ∞, a.s., for j = 1, . . . , Ln .
It remains to prove (iv). We may argue as in [17] to obtain
X
(σ) ′
(σ) ′
b nmk − Σnmk )w(σ) =
vn(ρ) ′ (Σ
[(vn(ρ) ′ Yni )(wm
Ymi ) − E((vn(ρ) ′ Yni )(wm
Ymi ))]
m
i≤k
=
X
i≤k
(σ)
(σ)
[Yni (vn(ρ) )′ Ymi (wm
) − E(Yni (vn(ρ) )′ Ymi (wm
))]
where
Yni (vn(ρ) ) =
dn
∞ X
X
j=0 ν=1
(ν)
(ρ)
vnν
cnj ǫi−j
and
(σ)
Ymi (wm
)=
dn
∞ X
X
j=0 µ=1
(µ)
(σ)
wmµ
cmj ǫi−j ,
23
INFERENCE FOR THE TRACE
for ρ = 1, . . . , Ln and σ = 1, . . . , Lm , n, m ≥ 1. Therefore, for k ≥ 1, we obtain the representation
Dk ({(vn(ρ) , wn(ρ) )})
XXX
(σ)
(σ)
λn λm µρ µσ [Yni (vn(ρ) )′ Ymi (wm
) − E(Yni (vn(ρ) )′ Ymi (wm
))]
=
i≤k n,m ρ,σ
X
=
[Yi ({cj })Yi ({dj }) − E(Yi ({cj })Yi ({dj }))]
i≤k
for the linear processes Yi ({cj }) =
cj =
∞
X
λn
dj =
µρ
λn
Ln
X
µρ
ρ=1
n=1
dn
X
j=0 cj ǫi−j
(ν)
(ρ)
vnν
cnj ,
dn
X
and Yi ({dj }) =
P∞
j=0 dj ǫi−j
with coefficients
j ≥ 0,
ν=1
ρ=1
n=1
∞
X
Ln
X
P∞
(ν)
(ρ)
wnν
cnj ,
j ≥ 0.
ν=1
Hence the result follows from [11].
Proof of Remark 2.1:
ability space,
Q.E.D.
By Theorem 2.1, we may and will assume that, on the same prob-
|Dn (t; vn(j) , wn(j) ) − αn (vn(j) , wn(j) )Wn (⌊nt⌋/n; vn(j) , wn(j) )| = o(1),
(j)
(j)
as n → ∞, a.s., for Ln standard Brownian motions Wn (⌊nt⌋/n; vn , wn ), by virtue of The−1/2
(j)
(j)
orem 2.1. But then, since Dnj (t) = Ln Dn (t; vn , wn ),
αn (vn(j) , wn(j) )Wn (⌊nt⌋/n; vn(j) , wn(j) )
sup B n (⌊nt⌋/n)j − L−1/2
n
t∈[0,1]
≤ sup |B n (⌊nt⌋/n)j − Dnj (t)|
t∈[0,1]
+ sup L−1/2
|Dn (t; vn(j) , wn(j) ) − αn (vn(j) , wn(j) )Wn (⌊nt⌋/n; vn(j) , wn(j) )|
n
t∈[0,1]
= o(1),
as n → ∞, a.s., for each j = 1, . . . , Ln , which verifies the remark.
Q.E.D.
Proof of Theorem 2.4: Observe that the conditions (I)-(III) of [15, Theorem 1] hold in
the Hilbert space ℓ2 as well, since for any x ∈ Rdn the Euclidean vector norm coincides with
the ℓ2 –norm. Therefore, we obtain the a.s. strong approximation
k
X
(n)
L−1/2
ξi
n
i=1
− Bn (k)
= ǫnk
ℓ2
p
k log log k,
as k → ∞, for sequences εnk = o(1), k → ∞, a.s., n ≥ 1. Put N = ⌈n log log n⌉. Let ηn ↓ 0 be
given. Then for each n ∈ N we may find δn ∈ N such that P (maxδn ≤k′ ǫnk′ > ε) ≤ ηn . Hence
maxδn ≤k′ ǫnk′ = oP (1), as n → ∞. Now we may conclude that for δn ≤ k ≤ n
k
X
i=1
(n)
L−1/2
ξi
n
√
− Bn (k) ≤ max′ εnk′ N ,
δn ≤k
24
A. STELAND, R. VON SACHS
such that
k
1 X −1/2 (n)
Ln ξi − Bn (k) = oP (1),
max √
δn ≤k≤n
N i=1
as n → ∞, which verifies (2.31)–(2.33).
Q.E.D.
3. ASYMPTOTICS FOR THE TRACE NORM
The trace plays an important role in multivariate analysis and also arises when studying
shrinkage estimation. Before providing the large sample approximation by a Brownian motion,
we shall briefly review its relation to several matrix norms.
3.1. The trace and related matrix norms
There are various matrix norms that can be used to measure the size of (covariance) matrices. Here we shall use the trace norm defined as the ℓ1 -norm of the eigenvalues λi (A) of a
dn -dimensional matrix A,
X
kAktr =
|λi (A)|.
i
Also notice that the trace norm is a linear mapping on the subspace of non-negative definite
matrices and satisfies kAktr = tr(A) for any covariance matrix A. It induces the Frobenius
norm via kAk2F = tr(AA′ ). Further, it is worth mentioning that the trace norm is also related
to the Frobenius norm via the fact
X
λi (A) = kAktr .
kA1/2 k2F =
i
In this way, our results formulated in terms of (scaled) trace norms can be interpreted in
terms of (scaled) squared Frobenius norms of square roots, too.
There is a third interesting direct link to another family of norms, namely the Schatten-p
norms kAkS,p , p ≥ 0, of a n × m matrix A of rank r, which is defined as the ℓp -norm of its
(non-negative) singular values σ1 (A) ≥ · · · ≥ σr (A) > σr+1 (A) = · · · = σn (A) = 0, i.e. of
the eigenvalues of |A| = (AA′ )1/2 , i.e.
X
kAkpS,p =
σi (A)p .
i
b n = AA′ , if A = Yn /√n,
The Schatten-1 norm kAkS,1 is also called nuclear norm. Since Σ
b n ) = σi (Yn /√n)2 , we have the identity
such that λi (Σ
X
√
b n ktr =
b n ) = kYn / nk2 .
kΣ
λi (Σ
S,2
i
between the trace norm of the sample covariance matrix and the Schatten-2 norm of the
scaled data matrix.
For a sequence {An } of matrices of growing dimension dn × dn it makes sense to attach a
scalar weight depending on the dimension to a given norm, such that simple matrices such as
INFERENCE FOR THE TRACE
25
the identity matrix receive bounded norms. Having in mind that the squared Frobenius norm
of An is the trace of An A′n , it is natural to attach a scalar weight f (dn ) to the trace operator
leading to the scalar weight f (dn )1/2 for the Frobenius norm. As proposed by [13], one may
select f (dn ) such that tr(A∗ )f (dn ) = 1 for some simple benchmark matrix A∗ such as the
dn –dimensional identity matrix In . Since tr(Idn ) = dn , we choose f (dn ) = d−1
n and therefore
define the scaled trace operator by
∗
tr (A) =
d−1
n
dn
X
λi (A)
i=1
for a square matrix A = (aij )i,j of dimension dn × dn . The scaled trace operator induces the
scaled trace norm
kAk∗tr = d−1
n kAktr
for a square matrix A, which is given by kAk∗tr = d−1
n tr(A) for a covariance matrix and
averages the (modulus) of the eigenvalues, and the scaled Frobenius matrix norm given by
(3.1)
2
∗
′
−1
kAk∗2
F = tr (AA ) = dn kAkF .
3.2. Trace asymptotics
Let us now turn to the trace asymptotics. If the dimension is fixed, it is well known that the
eigenvalues of a sample covariance matrix, and thus their sum as well, have convergence rate
OP (n−1/2 ) and are asymptotically normal, see [9] and [10]. For the high-dimensional case,
the situation is more involved. The sample covariance matrix is not consistent w.r.t. to the
Frobenius norm, even in the presence of a dimension reducing factor model, see Remark 3.1.
The following result provides a large sample normal approximation for the scaled trace
b n for arbitrarily growing dimension dn when properly normalized. The result also
norm of Σ
shows that the trace norm has convergence rate
b n ktr − kΣn ktr = OP (n−1/2 dn ),
kΣ
as n → ∞.
Introduce for t ∈ [0, 1]
⌊nt⌋
(3.2)
X
′
b n (t) = 1
Yni Yni
,
Σ
n
i=1
and notice that
bn = Σ
b n (1)
Σ
and
b n (t)),
Σn (t) = E(Σ
Σn = Σn (1).
We are interested in studying the scaled trace norm process
(3.3)
Tn (t) =
√
b n (t)k∗ − kΣn (t)k∗ ,
n kΣ
tr
tr
t ∈ [0, 1].
26
A. STELAND, R. VON SACHS
Theorem 3.1 Let Yni , i = 1, . . . , n, be a vector time series following model (1.1) and
satisfying Assumption (A). If (2.26) holds, then under the construction of Theorem 2.3,
sup Tn (t) − d−1/2
n
t∈[0,1]
dn
X
B n (⌊nt⌋/n)j = o(1),
j=1
as n → ∞, a.s. Here B n denotes the [0, 1]–version of the Brownian motion Bn arising in
(j)
(j)
Theorem 2.3, when choosing the dn pairs (vn , wn ) = (ej , ej ), j = 1, . . . , dn , where ej
denotes the jth unit vector, and satisfies properties (ii) and (iii) of Theorem 2.3.
Suppose that, in addition to the assumptions of Theorem 3.1, Yn1 , . . . , Ynn is strictly
stationary. Since the weighting vectors used in Theorem 3.1 are the first dn unit vectors, the
covariance of B n (1)i and B n (1)j , which is associated to the asymptotic covariance of Dni (1)i
2
2
2
and Dnj (1)j , is given by d−1
n βn (i, j) where βn (i, j) = βn (ei , ei , ej , ej ), i, j = 1, . . . , dn , cf.
(A.9). We have the asymptotic representations
√
√
b n − Σn )ei , ne′ (Σ
b n − Σn )ej + o(1)
ne′i (Σ
βn2 (i, j) = Cov
j
!
n
n
X
1 X (i) 2
1
(j)
= Cov √
[(Ynk ) − σ 2 ], √
[(Ynk )2 − σ 2 ] + o(1)
n
n
k=1
k=1
n
1 X
(j)
(i)
=
E (Ynk )2 − σ 2 (Ynk′ )2 − σ 2 + o(1).
n ′
k,k =1
Therefore, up to negligible terms, we may express βn2 (i, j) as a long–run variance parameter,
(3.4)
βn2 (i, j) = γn(i,j) (0) + 2
n−1
X
τ =1
where
(3.5)
n − τ (i,j)
γn (τ ) + o(1),
n
(i)
(j) 2
γn(i,j) (τ ) = Cov (Yn0 )2 , (Ynτ
) ,
τ = 0, . . . , n − 1,
(i)
(j)
is the lag τ cross–covariance of the series {(Ynk )2 : k ≥ 0} and {(Ynk )2 : k ≥ 0}, i, j =
1, . . . , dn . Those cross-covariances can be estimated by
γn(i,j) (τ )
b
n−τ
1X 2
2
(ej ) − µ
bn (j)]
bn (i)][Yk+τ
[Yk (ei ) − µ
=
n
k=1
Pn
−1
2
′
with µ
bn (i) = n
k=1 Yk (ei ), where Yk (ei ) = ei Ynk , for k = 1, . . . , n, i = 1, . . . , dn , n ≥ 1.
The associated estimator for βn2 (i, j) is then given by
b n(i,j) (0) + 2
βbn2 (i, j) = γ
m
X
τ =1
b n(i,j) (τ ) ,
wmτ γ
where m = mn is a sequence of lag truncation constants and {wmh } a sequence of window
weights typically defined by a kernel function w (e.g. a Bartlett kernel) via wmτ = w(τ /bm ),
for some bandwidth parameter b = bm .
INFERENCE FOR THE TRACE
27
By Theorem 3.1,
2
Var (Tn (1)) = σtr,n
+ o(1),
a.s., with
(3.6)
2
σtr,n
dn
1 X
=
Cov (B n (1)j , B n (1)k ),
dn
j,k=1
and, using the canonical estimator
(3.7)
2
σ
btr,n
=
dn
1 X
βbn2 (i, j),
d2n
j,k=1
an asymptotic confidence interval with nominal coverage probability 1 − α, α ∈ (0, 1), for
kΣn k∗tr is given by
√
b n k∗tr ± Φ−1 (1 − α/2)b
kΣ
σtr,n / n.
Lemma 3.1 Assume wmτ → 1 as m → ∞, for all τ ∈ Z, and 0 ≤ wmτ ≤ W < ∞, for some
(ν)
(ν)
constant W , for all m ≥ 1, τ ∈ Z. Further, suppose that cnj = cj , ν ∈ N, satisfy the decay
condition
(ν)
sup |cj | ≪ (j ∨ 1)−(1+δ)
1≤ν
for some δ > 0, and ǫk are i.i.d. with E(ǫ81 ) < ∞. If m = mn → ∞ with m2 /n = o(1), as
n → ∞, then
2
2
| = 0.
lim E|b
σn,tr
− σn,tr
n→∞
Remark 3.1 It is worth comparing our result with the following result obtained by [6] for a
dimension-reducing factor model: Suppose that the generic random vector Yn = (Y1 , . . . , Ydn )′
satisfies a factor model
Yn = Bn f + ǫ
with K = K(dn ) ≤ dn observable factors f = (f1 , . . . , fK )′ , errors ǫ = (ǫ1 , . . . , ǫdn )′ and
a dn × K factor loading matrix Bn . Then the sample covariance matrix of an i.i.d. sample
(Y1 , f1 ), . . . , (Yn , fn ) has the convergence rate OP (n−1/2 dn K),
b n − Σn kF = OP (n−1/2 dn K),
kΣ
if EkYn k2F , maxi E(fi4 ) and maxi E(ǫ4i ) are bounded, see [6, Theorem 1]. This means, compared to the rate for fixed dimension, the Frobenius norm is inflated by the factor dn K.
28
A. STELAND, R. VON SACHS
3.3. Proofs
b
b
Proof of Theorem 3.1: Clearly,
P ′ Σk (1) is p.s.d. for all k ∈ N and thus Σn (t) =
as well. The fact that tr(A) = i ei Aei leads to
b n (t)ktr − kΣn (t)ktr = tr(Σ
b n (t)) − tr(Σn (t)) =
kΣ
dn
X
j=1
−1/2
⌊nt⌋ b
n Σ⌊nt⌋
b n (t) − Σn (t))ej .
e′j (Σ
n
Let Dn = (Dnj )dj=1
with Dnj (t) = dn Dn (t; ej , ej ) for j = 1, . . . , dn . We shall apply Theorem 2.3 with Ln = dn . Therefore, when redefining all processes on a new probability space
together with a dn -dimensional Brownian motion B n with covariances as described in Theorem 2.3, we may argue as follows. Since k · k∗tr = d−1
n tr(·), we have
dn
1 X
Tn (t) = √
Dnj (t).
dn j=1
Now we can conclude that the process
En (t) =
satisfies
√
b n (t)k∗ − kΣn (t)k∗ ) −
n(kΣ
tr
tr
dn
X
d−1/2
B n (⌊nt⌋/n)j
n
j=1
dn
1 X
Dnj (t) − B n (⌊nt⌋/n)j
|En (t)| = √
dn j=1
dn
1 X
≤√
Dnj (t) − B n (⌊nt⌋/n)j
dn i=1
= o(1),
as n → ∞, a.s., by Theorem 2.3 (iv).
Q.E.D.
Proof of Lemma 3.1: The proof follows easily from [17, Theorem 4.4] by noting that the
covariances of the coordinates of the Brownian motion are given by d−1
n βn (i, j), for 1 ≤ i, j ≤
dn .
Q.E.D.
4. SHRINKAGE ESTIMATION
Shrinkage is a well-established approach to regularize the sample variance–covariance matrix
and we shall review in Section 4.1 the results obtained for high–dimensional settings. When
shrinking towards the identity matrix in terms of a convex combination with the sample
variance–covariance matrix, the optimal weight depends on the trace of the true variance–
covariance matrix, which can be estimated canonically by the trace of the sample variance–
covariance matrix. As a consequence, we can apply the results obtained in the previous section
to obtain large sample approximations for shrinkage variance–covariance matrix estimators.
Recall that the approximations deal with the norm of the difference between partial sums and
INFERENCE FOR THE TRACE
29
a Brownian motion, both attaining values in a vector space. In order to compare covariance
matrices, we shall work with the following pseudometric: Define
(4.1)
∆n (An , Bn ; vn , wn ) = |vn′ (An − Bn )wn |,
for (sequences of) matrices An and Bn of dimension dn ×dn . Indeed, for fixed vn , wn the mapping (An , Bn ) 7→ ∆n (An , Bn ) = ∆n (An , Bn ; vn , wn ) is symmetric, non-negative, semidefinite
(i.e. An = Bn implies ∆n (An , Bn ) = 0) and satisfies the triangle inequality. Hence, (4.1) defines a pseudometric on the space of (dn × dn )–dimensional matrices, for each n.
We establish three main results: For regular weighting vectors vn , wn that are bounded
away from orthogonality we establish a large sample approximation, which holds uniformly
in the shrinkage weight and therefore also when using the common estimator for the optimal
weight. Further, we compare the shrinkage estimator using the estimated optimal weight
with an oracle estimator using the unknown optimal weight. In both cases, it turns out that
the convergence rate of the estimated optimal shrinkage weight carries over to the shrinkage
covariance estimator.
Lastly, we study the case of orthogonal and nearly orthogonal vectors. The latter case
is of particular interest, since then one may place more unit vectors on the unit sphere
corresponding to overcomplete bases as studied in areas such as dictionary learning.
4.1. Shrinkage of covariance matrix estimators
The results of the previous chapters show that, under general conditions, inference relying on
ℓ1 -bounded inner products of high-dimensional series can be based on the sample covariance
b n is singular. However, from a statistical point of view, the
matrix, even if dn > n such that Σ
use of this classical estimator is not recommended in such situations of high dimensionality:
important criteria such as its mean-squared error or its condition number (defined to be the
ratio of the largest to the smallest eigenvalue) deteriorate, and it is advisable to regularise
b n in order to improve its performance, both asymptotically and for finite sample sizes, with
Σ
respect to these criteria. Obviously, a particular interest lies in maximum-likelihood based
approaches using an invertible estimator of Σn (as, e.g. in the semi-parametric approach
of [7] on shrinkage estimation in multivariate hidden Markov models). One well-established
b n without needing to impose any structural assumptions on Σn ,
possibility to regularise Σ
in particular avoiding sparsity, is the following approach of shrinkage: ([13], [16]) consider a
b n with a well-conditioned
shrinkage estimator defined by a linear (or convex) combination of Σ
”target” matrix Tn ,
(4.2)
b n + Wn T n ,
Σsn = Σsn (Wn ) = (1 − Wn )Σ
where Wn are the ”shrinkage weights” of this convex combination, to be chosen in an optimal
way to minimise the mean-square error between Σsn and Σn (see below). The role of the target
Tn is, similar to ridge regression, to reduce a potentially large condition number of the highdimensional variance-covariance matrix Σn , by adding a highly regular (”well conditioned”)
matrix. A popular choice for the target is to take a multiple of the dn −dimensional identity
matrix In , i.e.
(4.3)
T n = µ n In ,
with µn = d1n tr Σn , in order to respect the scale of both matrices in the convex combination
(4.2). This choice of the target reduces the dispersion of the eigenvalues of Σn around its
30
A. STELAND, R. VON SACHS
”grand mean” µn = d1n tr Σn , as large eigenvalues are pulled down towards µn and small
eigenvalues are lifted up to µn (and in particular lifted up away from zero). Although a bias is
b n , the gain in variance reduction, in parintroduced in estimating Σn by Σsn compared to Σ
ticular in high-dimensions, helps to considerably reduce the mean-square error in estimating
Σn .
In order to develop the correct asymptotic framework of the behaviour of large covariance
matrices, the authors of [13] propose to use the scaled Frobenius norm given by (3.1) to
measure the distance between two matrices of asymptotically growing dimension dn , to be
used also and in particular to define the mean-square error between Σsn and Σn to become
the expected normalised Frobenius loss E[kΣsn − Σn k∗2
F ].
Furthermore, with this scaling,
µn =
1
tr(Σn )
dn
is the appropriate choice of the factor in front of the identity matrix In in the definition of
the target Tn in equation (4.3).
b n , i.e. by
In practice µn needs to be estimated from the trace of Σ
µ
bn =
1
b n) .
tr(Σ
dn
Similarly, the theoretical shrinkage weight 0 ≤ Wn ≤ 1 need to be replaced by its sample
cn . Thus, the fully data-driven expression for the shrinkage estimator of Σ writes as
analog W
follows:
bn + W
cn ) = (1 − W
cn )Σ
cn µ
Σsn (W
bn In ,
which shrinks the sample covariance matrix towards the (estimated) shrinkage target µ
bn In . It
cn ) with
remains to optimally choose the shrinkage weights Wn (and its data-driven analogue W
the purpose of balancing between a good fit and good regularisation. For this a prominent
possibility is indeed to choose the shrinkage weights Wn such that the mean-squared error
(MSE) between Σsn and Σn , is minimised:
Wn∗ = argminWn ∈[0,1] E[kΣsn (Wn ) − Σn k∗2
F ] ,
which leads to the MSE-optimally shrunken matrix Σ∗n = Σsn (Wn∗ ). A closed form solution
([13] or [16], Proposition 1) can be derived as
Wn∗ =
b n − Σn k∗2 ]
E[kΣ
F
b
E[kµn In − Σn k∗2 ]
F
This choice leads to the interesting property that
∗2
b
E[kΣ∗n − Σn k∗2
F < E[kΣn − Σn kF ,
showing the actual relative gain of the shrunken estimator compared to the classical unshrunken sample covariance, in terms of the mean-squared error. Moreover, it can be shown
that this property continues to hold even if one replaces the in practice yet unknown optimal
c ∗ which is constructed by replacing the population quantities
weights Wn∗ by an estimator W
n
31
INFERENCE FOR THE TRACE
in numerator and denominator of Wn∗ by sample analogs. Whereas the denominator can be
b n k∗2 , it is slightly less straightforward to estimate the nuessentially estimated by kb
µ n In − Σ
F
b n − Σn k2 : one possibility suggested by [16], and further developed by [17] for
merator E[kΣ
F
b n.
our set-up, is based on the estimation of the long-run variance αn of Σ
Note that
dn
√
1 X
∗2
b n (i, j)),
b
EkΣn − Σn kF =
Var ( nΣ
ndn
i,j=1
where, under stationarity, for 1 ≤ i, j ≤ dn ,
σn2 (i, j)
n
X (i) (j)
(i) (j)
b n (i, j) = 1
Σ
[Ynk Ynk − E(Ynk Ynk )].
n
k=1
n−1
X
√
(i,j)
b
(n − τ )Γn(i,j) (τ )
= Var ( nΣn (i, j)) = Γn (0) + 2
τ =1
(i,j)
Γn (τ )
with
of the
(i) (j)
(i)
(j)
= Cov (Ynk Ynk , Yn,k+τ Yn,k+τ ), τ = 0, . . . , n − 1, n
optimal weights Wn∗ can now be obtained as follows. Let
≥ 1. A consistent estimator
n−τ
X (i) (j)
(j)
(i)
b n(i,j) (τ ) = 1
Γ
bn (i, j)] ,
bn (i, j)] [Yn,t+τ Yn,t+τ − κ
[Ynt Ynt − κ
n
t=1
Pn
(i)
(j)
where κ
bn (i, j) = n1 t=1 Ynt Ynt , 1 ≤ i, j ≤ dn . Then, similar as in the previous section, the
long-run variances σn2 (i, j) can be estimated by
b (i,j) (0) + 2
σ
bn2 (i, j) = Γ
n
m
X
τ =1
b (i,j) (τ ) ,
wmτ Γ
n
1 ≤ i, j ≤ dn . Consistency of a more general version has been shown in [17, Equation (4.22)],
under similar assumptions as stated in Lemma 3.1, for dn → ∞, as n → ∞. We are led to the
estimator
P
bn2 (i, j)
(ndn )−1 1≤i,j≤dn σ
∗
c =
W
n
b n k∗2
kb
µ n In − Σ
F
for Wn∗ also studied in depth in [16]. A rate of consistency in an asymptotic framework with
growing dimensionality dn can be achieved again following [16] for the specific shrinkage target
µn In , also considered in [7]. Let 0 < γ ≤ 2 be such that d2−γ
n /n → 0 (i.e. the larger γ, the
faster is dn allowed to grow with n), and that, as n → ∞,
∗2
d1−γ
n kµn In − Σn kF → c > 0 .
Recalling that µn = d−1
n tr(Σn ), we observe that γ measures the closeness of the target to the
true covariance matrix Σn . Then [16] (Theorem 1) and ([7] (Theorem 1) show that
n c∗
∗
(4.4)
2−γ |Wn − Wn | = oP (1) .
dn
In order to apply the results of the previous sections onto the fully data-driven shrinkage
cn∗ ), one needs to study the convergence of the estimated shrinkage weight
estimator Σ∗n (W
normalised by n1/2 , as will become clear from the proof of Theorem 4.1 to be stated below.
We already observe here that (4.4) implies
(4.5)
c ∗ − W ∗ | = oP (1),
n1/2 |W
n
n
if d4−2γ /n = O(1). Thus, for γ close to 2, the dimension dn may even grow faster than n.
32
A. STELAND, R. VON SACHS
4.2. Asymptotics for regular projections
Our interest is now in deriving the asymptotics for bilinear forms based on the shrinkage
estimator of the covariance matrix. We can and will assume that the uniformly ℓ1 –bounded
weighting vectors vn and wn are ℓ2 –normed. It turns out that, due to the shrinkage target,
the inner product vn′ wn , i.e. the angle between the vectors vn and wn , appears in the approximating Brownian functional. The inner product is bounded but may converge to 0, as n
tends to ∞. The latter case requires special treatment and will be studied separately. We shall
call a pair (vn , wn ) of projections regular, if it has uniformly bounded ℓ1 –norm and satisfies
(4.6)
vn′ wn ≥ c > 0,
for all n,
for some constant c, i.e., if it is, in addition, bounded away from orthogonality.
Let 0 < W ≤ 1 be an arbitrary shrinkage weight and consider the associated shrinkage
estimator
b s (W ) = (1 − W )Σ
bn + Wµ
Σ
b n In .
n
b s (W ) estimates the unobservable shrunken variance matrix
Notice that Σ
n
Σsn0 (W ) = (1 − W )Σn + W tr(Σn )d−1
n In .
Define for 0 < W ≤ 1
(4.7)
An (W ) =
√ ′
b s (W ) − Σs (W ))wn .
nvn (Σ
n
n0
We shall apply the trace asymptotics obtained in Theorem 3.1, i.e.
dn
X
√
b n (t)k∗ − kΣn k∗ (t)) = d−1/2
n(kΣ
B n (⌊nt⌋/n)j + o(1),
tr
tr
n
j=1
as n → ∞, a.s. The variance of the approximating linear functional of the dn –dimensional
Brownian motion is given by
2
σtr,n
dn
dn
1 X
1 X
βn2 (i, j),
Cov (B n (1)i , B n (1)j ) = 2
=
dn
dn
i,j=1
i,j=1
where βn2 (i, j) are long–run–variance parameters, see (3.4). Since, typically, long–run–variance
parameters have positive limits, it is natural to assume that
(4.8)
2
inf σtr,n
≥ σ 2tr > 0.
n≥1
Theorem 4.1 Let (vn , wn ) be a regular pair of projections. Under the assumptions of Theorem 3.1 and condition (4.8) there exists on a new probability space, which carries an equivalent
n
on [0, 1], such that
version of the vector time series, a Brownian motion B n (t) = (B n (t)j )dj=0
(4.9)
sup |An (W ) − Bn (W )| = o(1),
0<W ≤1
33
INFERENCE FOR THE TRACE
as n → ∞, a.s., where
(4.10)
Bn (W ) = (1 − W )B n (1)0 +
W vn′ wn d−1/2
n
dn
X
B n (1)j ,
j=1
The covariance structure of B n (t) is given by
Var (B n (1)0 ) = (dn +1)−1 α2n (vn , wn ),
Cov (B n (1)0 , B n (1)i ) = (dn +1)−1 βn2 (vn , wn , ei , ei ),
for i = 1, . . . , dn , and
Cov (B n (1)i , B n (1)j ) = (dn + 1)−1 βn2 (i, j),
for 1 ≤ i, j ≤ dn . Especially, for any deterministic or random sequence of shrinkage weights
Wn we have the large sample approximation for the corresponding shrinkage estimator
√
b s (Wn ) − Σs (Wn ))wn − Bn (Wn )| = o(1),
| nvn′ (Σ
n
n0
as n → ∞, a.s..
Notice that
Var (Bn (W )) =
dn
W 2 (vn′ wn )2 X
(1 − W )2 2
αn (vn , wn ) +
βn2 (i, j)
dn + 1
dn (dn + 1)
i,j=1
dn
(1 − W )W vn′ wn X
βn2 (vn , wn , ej , ej ) + o(1),
+2 p
dn (dn + 1) j=1
as n → ∞. Hence, under assumption (4.6), the variance of the approximating Wiener process
adressing the nonparametric part of the shrinkage estimator is of the order O(d−1
n ), whereas
the variance of the term approximating the target is of the order O(1). This is due to the fact
that we need a (dn + 1)-dimensional Brownian motion (from which dn coordinates are used
to approximate the estimated target). This requires to scale all coordinates (dn + 1)−1/2 , cf.
Theorem 2.3.
The following theorem resolves that issue by approximating the shrinkage estimator by
two Brownian motions, one in dimension 1 for the nonparametric part and one in dimension
dn for the target. Those Brownian motions are constructed separately, such that, a priori,
nothing can be said about their exact covariance structure. It turns out, however, that the
covariances converge properly. We shall see that for this alternative construction the terms of
the resulting variance-covariance decomposition are of the same order.
Theorem 4.2 Let (vn , wn ) be a regular pair of projections. Suppose that the underlying
probability space (Ω, F, P ) is rich enough to carry, in addition to the vector time series {Yni :
1 ≤ i ≤ n, n ≥ 1}, a uniform random variable U1 . Then there exist, on (Ω, F, P ), a univariate
′
Brownian motion {B n (t)0 : t ∈ [0, 1]} with mean zero and
′
′
Cov (B n (s)0 , B n (t)0 ) = min(s, t)α2n (vn ; wn ),
34
A. STELAND, R. VON SACHS
′
n
for s, t ∈ [0, 1], and a mean zero Brownian motion {(B n (t)j )dj=1
: t ∈ [0, 1]} in dimension dn
with covariance function
′
′
2
Cov (B n (s)i , B n (t)j ) = min(s, t)d−1
n βn (i, j),
for s, t ∈ [0, 1] and 1 ≤ i, j ≤ dn , such that
√
b s (W ) − Σs (W ))wn − Bn (W ) = o(1),
nvn′ (Σ
n
n0
′
′
−1/2 Pdn
j=1 B n (1)j .
as n → ∞, a.s., with Bn′ (W ) = (1 − W )B n (1)0 + W vn′ wn dn
(4.11)
′
′
Further,
max |Cov (B n (1)0 , B n (1)j ) − d−1/2
βn2 (vn , wn , ej , ej ) = o(1),
n
1≤j≤dn
as n → ∞.
Observe that
Var (Bn′ (W ))
= (1 −
W )2 α2n (vn , wn )
+2
dn
W 2 (vn′ wn )2 X
βn2 (i, j)
+
d2n
i,j=1
(1 − W )W vn′ wn
dn
dn
X
βn2 (vn , wn , ej , ej ) + o(1),
j=1
as n → ∞, a.s., where all three terms are O(1).
The above result shows that the nonparametric part, namely the sample covariance matrix
b n , as well as the shrinkage target µ
Σ
bn In contribute to the asymptotics. In this sense, shrinking
with respect to the chosen scaled norms provides us with a large sample approximation that
mimics the finite sample situation.
4.3. Comparisons with oracle estimators
Recall that an oracle estimator is an estimator that depends on quantities unknown to us
such as the optimal shrinkage weight Wn∗ . Of course, it is of interest to study the distance
b s (W
c ∗ ) with estimated optimal weight and the associated
between the shrinkage estimator Σ
n
n
∗
oracle using Wn . In particular, the question arises how the rate of convergence (4.4) affects
the difference between the fully data adaptive estimator and an oracle.
b sn = Σ
b sn (W
cn∗ ) that uses the estimated
The next theorem compares the shrinkage estimator Σ
c ∗ and the oracle estimator
optimal shrinkage weight W
n
b s (W ∗ ) = (1 − W ∗ )Σ
b n + W ∗µ
Σ
n
n
n
n b n In ,
which shrinks the sample covariance matrix towards the target using the optimal shrinkage
weight Wn∗ , in terms of the pseudometric ∆n (·, ·; vn , wn ) and thus considers the quantity
b s (W
b s (W ∗ ); vn , wn ) = v′ (Σ
b s (W
b s (W ∗ ))wn .
cn∗ ), Σ
cn∗ ) − Σ
∆n (Σ
n
n
n
n
n
n
n
The following result shows that even now the rate of convergence is equal to the rate of
c ∗.
convergence of the estimator W
n
35
INFERENCE FOR THE TRACE
Theorem 4.3 Under the assumptions of Theorem 4.1 and the construction described there
we have, on the new probability space,
b s (W
c ∗ ), Σ
b s (W ∗ ); vn , wn )
∆n (Σ
n
n
n
n
!
dn
X
∗
∗
−1/2
−1/2
−1/2 −1/2
c
= |Wn − Wn | O(1) + O(B n (1)0 n
),
)+O n
dn
B n (1)i + o(n
i=1
as n → ∞, a.s..
The next result investigates the difference between the shrinkage estimator and the oracle
type estimator
Σsn0 (Wn∗ ) = (1 − Wn∗ )Σn + Wn∗ tr(Σn )d−1
n In
using the oracle shrinkage weight and assuming knowledge of Σn , in terms of the pseudodistance
c ∗ ) − Σs (W ∗ )]wn .
b s (W
c ∗ ), Σs (W ∗ ); vn , wn ) = v′ [Σ
b s (W
∆n (Σ
n
n0
n
n
n
n
n
n
n0
Theorem 4.4 Under the assumptions of Theorem 4.1 and the construction described there
we have, on the new probability space,
s
b n (W
cn∗ ), Σsn0 (Wn∗ ); vn , wn ) = n−1/2 Bn (W
cn∗ ) + (Wn∗ − W
cn∗ )O(1) + o(n−1/2 ),
∆n (Σ
as n → ∞, a.s..
The above result is remarkable in that it shows that it is optimal in the sense that
c ∗ of
b s (W
c ∗ ), Σs (W ∗ ); vn , wn ) inherits the rate of convergence from the estimator W
∆n (Σ
n
n
n
n0
n
∗
the optimal shrinkage weight Wn , cf. (4.4).
4.4. Nearly orthogonal projections
(i)
Let vn , i = 1, . . . , Ln , be unit vectors in Rdn on which we may project Yn , e.g. in order
to determine the best approximating direction. Recall that the true covariance between two
(i)
(j)
projections vn ′ Yn and vn ′ Yn is
Cov (vn(i) ′ Yn , vn(j) ′ Yn ) = vn(i) ′ Σn vn(j) ,
and the corresponding shrinkage estimator is
d (v(i) ′ Yn , v(j) ′ Yn ) = v(i) ′ Σ
b s (W
c ∗ )v(j) .
Cov
n
n
n
n
n n
(i)
b s (W
cn∗ ), as
Clearly, those covariances vanish for i 6= j, if the vn are chosen as eigenvectors of Σ
n
in a classical principal component analysis (PCA) applied to the shrinkage covariance matrix
estimator. But when analyzing high–dimensional data it is common to rely on procedures
such as sparse PCA, see [19], which yield sparse principal components. Then analyzing the
(i)
covariances of the projections vn ′ Yn is of interest.
36
A. STELAND, R. VON SACHS
(j)
If OLn = {vn : 1 ≤ j ≤ Ln } is an orthogonal system and Ln < dn , then OLn spans a
Ln –dimensional subspace of Rdn . Of course, there are at most Ln orthogonal vectors, i.e. Ln
cannot be larger than dn . However, if one relaxes the orthogonality condition
vn(i) ′ vn(j) = 0,
i 6= j,
then one can place much more unit vectors in the Euclidean space Rdn in such a way that their
pairwise angles are small. Indeed, [18] provides an elegant proof of the following KabatjanskiiLevenstein bound.
Theorem 4.5 (Cheap version of the Kabatjanskii-Levenstein bound, Tao 2013).
√
−1/2
for some 1/2 ≤ A ≤ 12 dn .
Let x1 , . . . , xm be unit vectors in Rdn such that |x′i xj | ≤ Adn
2
n CA
for some universal constant C.
Then we have m ≤ Cd
A2
Theorem 4.5 motivates to study the case of nearly orthogonal weighting vectors, defined as
a pair (vn , wn ) ∈ W × W satisfying
(4.12)
vn′ wn = o(1),
n → ∞,
Now the asymptotics of the shrinkage estimator is as follows:
Theorem 4.6 Let vn and wn be unit vectors satisfying the nearly orthogonal condition
(4.12) and suppose that the conditions of Theorem 4.1 hold. Then
√
b s (W ) − Σ
b s (W ))wn − Bn (W )| = oP (1),
| nv′ (Σ
n
n
n0
as n → ∞, a.s., where
Bn (W ) = (1 − W )B n (1)0 +
W vn′ wn d−1/2
n
dn
X
B n (1)i .
i=1
−1/2 Pdn
Observe that for asymptotically orthogonal weighting vectors the term W vn′ wn dn
i=1 B n (1)i
corresponding to the (parametric) shrinkage target is oP (1) and thus vanishes asymptotically.
In this situation, the nonparametric part dominates in large samples.
4.5. Proofs
Proof of Theorem 4.1: First notice that (4.6) ensures that the second term in (4.10)
does not converge to 0 in probability, since (vn , wn ) is a regular projection and condition
−1/2 Pdn
(4.8) ensures that the Gaussian random variable Vn = dn
j=1 B n (1)j is not oP (1), since
inf P (|Vn | > δ) ≥ inf P (|Vn /σtr,n | > δ/σ) > 0
n≥1
n≥1
for any δ > 0. Hence W vn′ wn Vn = oP (1) iff. vn′ wn = o(1), which is excluded by (4.6).
n
We argue similarly as in the proof of Theorem 3.1: Put Dn = (Dnj )dj=0
with Dn0 (t) =
−1/2
−1/2
Ln Dn (t; vn , wn ) and Dnj (t) = Ln Dn (t, ej , ej ), j = 1, . . . , dn , where Ln = dn + 1. Since
the weighting vectors are uniformly ℓ1 -bounded, Theorem 2.3 yields, on a new probability
space where a process equivalent to Dn can be defined and will be denoted again by Dn , the
37
INFERENCE FOR THE TRACE
n
existence of a Brownian motion {(B n (t))dj=0
: t ≥ 0} as characterized in Theorem 4.1, such
that
√
b n wn − v′ Σn wn ) − B n (1)0 | = o(1),
| n(vn′ Σ
n
and
√
b n k∗ − kΣn k∗ ) − d−1/2
n(kΣ
tr
tr
n
dn
X
B n (1)i = o(1),
i=1
b n ktr d−1 and the fact that |v′ wn | ≤ kvn kℓ kwn kℓ =
as n → ∞, a.s. Using these results, µ
bn = kΣ
n
n
1
1
O(1), we have for any 0 < W ≤ 1
|An (W ) − Bn (W )|
√
b n − Σn )wn − (1 − W )B n (1)0
= nvn′ (1 − W )(Σ
dn
X
√
b n k∗ − kΣn k∗ )wn − W v′ wn d−1/2
B n (1)i
+ W nvn′ (kΣ
tr
tr
n
n
i=1
√
b n − Σn )wn − B n (1)0 |
≤ (1 − W )| nvn′ (Σ
+W
√
∗
b k∗ − kΣn k∗ ) − v′ wn d−1/2
nvn′ wn (kΣ
n tr
tr
n
n
√
b n − Σn )wn − B n (1)0 |
≤ (1 − W )| nvn′ (Σ
+
W |vn′ wn |
= o(1),
dn
X
B n (1)i
i=1
dn
X
√
∗ ∗
∗
−1/2
b
n(kΣn ktr − kΣn ktr ) − dn
B n (1)i
i=1
as n → ∞, a.s., which shows (4.9).
Q.E.D.
Proof of Theorem 4.2: By Theorem 2.1 there exist, on a new probability space (Ω′ , F ′ , P ′ ),
d
e ni : i ≥ 1} =
en (t)0 : t ∈
an equivalent process {Y
{Yni : i ≥ 1} and a Brownian motion {B
[0, 1]} on [0, 1], such that
√
e n (t) − Σn (t))wn − B
en (t)0 | = o(1),
(4.13)
sup | nvn′ (Σ
t∈[0,1]
e n (t) = n−1 P⌊nt⌋ Y
e ni Y
e ′ . By Billingsley’s lemma, [2, Section 21,
as n → ∞, P ′ -a.s., where Σ
ni
i=1
′
d
en (t)0 : t ∈ [0, 1]}n defined
Lemma 2], there exist Brownian motions {B n (t)0 : t ∈ [0, 1]}n = {B
on the original probability space (Ω, F, P ), such that
(4.14)
√
b n (t) − Σn (t))wn − B ′n (t)0 | = o(1),
sup | nvn′ (Σ
t∈[0,1]
as n → ∞, a.s. Indeed, recall that the infinite product of a complete and separabe metric
space is complete and separable; in our case (D[0, 1])∞ equipped with the usual metric, see
[2, p. 241], induced by th Skorohod metric making D[0, 1] separable and complete. Then
38
A. STELAND, R. VON SACHS
√
e n (·) − Σn (·))wn , {B
en (·)0 }n≥1 ) and σ =
apply [2, Sec. 21, Lemma 1] with ν = L({ nvn′ (Σ
√ ′ e
′
{ nvn (Σn (·) − Σn (·))wn } to conclude the existence of τ =: {B n (·)0 }, a function of σ and
U1 , such that (4.14) holds, where the convergence w.r.t. the supnorm follows from the a.s.
′
continuity of B n (·)0 .
Further, by Theorem 3.1, there exist, on a new probability space (Ω′′ , F ′′ , P ′′ ), an equivalent
d
en (t)j )dn : t ∈
vector time series {Y̌ni : i ≥ 1} = {Yni : i ≥ 1}, and Brownian motions {(B
j=1
[0, 1]} on [0, 1] in dimension dn characterized as in the theorem, such that
√
(4.15)
n(kΣ̌n (t)k∗tr − kΣn (t)k∗tr ) − d−1/2
n
as n → ∞, P ′′ -a.s., where Σ̌n (t) = n−1
dn
X
j=1
P⌊nt⌋
en (1)j = o(1),
B
′ . Again, an application of Billingsley’s
Y̌ni Y̌ni
′
d
n
en (t)j )dn :
: t ∈ [0, 1]}n = {(B
lemma shows the existence of Brownian motions {(B n (t)j )dj=1
j=1
t ∈ [0, 1]}n , such that
√
(4.16)
i=1
b n (t)k∗ − kΣn (t)k∗ ) − d−1/2
n(kΣ
tr
tr
n
dn
X
′
B n (1)j = o(1),
j=1
as n → ∞, a.s., i.e. on the original probability space.
A priori, we have no information on the exact second order structure of the two Brownian
′
(n)
motions, but B n (1)j is close to the associated process Dnj (t) = Tn,0 (j), cf. (2.44), and to the
(n)
corresponding martingale approximation M⌊nt⌋,0 (j) defined in (2.45), which allows us to study
′
′
′
′
the convergence of the covariances Cov (B n (1)0 , B n (1)j ) = (B n (1)0 , B n (1)j )L2 , j = 1, . . . , dn .
First observe that
′
(n)
max kB n (1)j − Mn,0 (j)kL2 = o(1),
1≤j≤dn
′
n
see [11, Lemma 2], [17], and Lemma 2.2, because of (4.13) and since (B n (t)j )dj=1
satisfies
Pdn
′
2
supt∈[0,1] j=1 |B n (t)j − Dnj (t)| = o(1), as n → ∞, a.s., see Theorem 2.3 (ii). Also notice
′
(n)
that kB n (1)j kL2 and kMn,0 (j)kL2 are O(1), uniformly in j ≥ 0. Now use the decomposition
(X, Y )L2 = (X ′ , Y ′ )L2 + (X ′ , Y − Y ′ )L2 + (X − X ′ , Y )L2
for X, Y, X ′ , Y ′ ∈ L2 to conclude that
′
′
(n)
(n)
′
(n)
(n)
Cov (B n (1)0 , B n (1)j )) = (Mn,0 (0), Mn,0 (j))L2 + (Mn,0 (0), B n (1)j − Mn,0 (j))L2
′
(n)
(n)
+ ((B n (1)0 − Mn,0 (0), Mn,0 (j))L2 ,
where the last two terms are o(1), uniformly in j. E.g.,
′
(n)
′
(n)
(n)
(n)
max |(B n (1)0 − Mn,0 (0), Mn,0 (j))L2 | ≤ sup kB n (1)0 − Mn,0 (0)kL2 kMn,0 (j)kL2 = o(1),
1≤j≤dn
1≤j
as n → ∞. Combining these estimates with Lemma 2.2 yields
′
′
(n)
(n)
max |Cov (B n (1)0 , B n (1)j ) − Cov (Mn,0 (0), Mn,
(j))| ≪ d−1
n + o(1),
1≤j≤dn
39
INFERENCE FOR THE TRACE
−1/2
which establishes (4.11), since the covariances of the approximating martingales equal dn βn2 (vn , wn , ej , ej )+
−1/2
o(1), as n → ∞; the factor dn
is due to the additional scaling of Dnj (t) to approximate dn
bilinear forms by Theorem 2.3.
Q.E.D.
Proof of Theorem 4.3: Recall that, since Σn = Cn ΛC′n and (1.2), the elements of Σn
are uniformly bounded (in n), such that |vn′ Σn wn | ≤ kvn kℓ1 kwn kℓ1 = O(1). This in turn
implies that λmax (Σn ) = O(1) and
(4.17)
tr(Σn )d−1
n = O(1).
Put
(4.18)
c ∗ )wn − v′ Σs (W ∗ )wn
c ∗ , W ∗ ) = v′ Σs (W
Rn (W
n
n n0
n
n
n n0
n
and notice that
′
cn∗ , Wn∗ ) = (Wn∗ − W
cn∗ )vn′ Σn wn + (W
cn∗ − Wn∗ )tr(Σn )d−1
Rn (W
n vn wn .
Using (4.17) we obtain the bound
(4.19)
c ∗ , W ∗ ) = (W
c ∗ − W ∗ )O(1).
Rn (W
n
n
n
n
Observe that
b s (W
b s (W ∗ ) = (W ∗ − W
b n + (W
b n )d−1 In
cn∗ ) − Σ
cn∗ )Σ
cn∗ − Wn∗ )tr(Σ
Σ
n
n
n
n
n
is equal to the difference
cn∗ ) − Σsn0 (Wn∗ ) = (Wn∗ − W
cn∗ )Σn + (W
cn∗ − Wn∗ )tr(Σn )d−1
Σsn0 (W
n In
b n . We have
when replacing Σn by Σ
b s (W
c∗) − Σ
b s (W ∗ )
Σ
n
n
n
n
∗
c
cn∗ − Wn∗ )tr(Σn )d−1
= (Wn − Wn∗ )Σn + (W
n In
cn∗ )(Σ
b n − Σn ) + (W
cn∗ − Wn∗ )(tr(Σ
b n ) − tr(Σn ))d−1
+ (Wn∗ − W
n In
Using (4.19), we therefore obtain for the associated bilinear form
b n (W
c∗) − Σ
b s (W ∗ ))wn
vn′ (Σ
n
n
n
∗
∗
c
= Rn (Wn , Wn )
cn∗ )vn′ (Σ
b n − Σn )wn + (Wn∗ − W
cn∗ )vn′ wn (kΣ
b n k∗tr − kΣn k∗tr )
+ (Wn∗ − W
c ∗ − W ∗ )O(1)
= (W
n
n
∗
cn∗ ) B n (1)0 n−1/2 + o(n−1/2 )
+ (Wn − W
!
dn
X
−1/2
∗
∗
−1/2
−1/2
c −W ) n
B n (1)i + o(n
) v ′ wn ,
+ (W
d
n
n
n
n
i=1
as n → ∞, a.s..
Q.E.D.
40
A. STELAND, R. VON SACHS
Proof of Theorem 4.4:
Recall that An (W ) =
√
b s (W ) − Σs (W ))wn . We have
nvn′ (Σ
n
n0
b sn (W
cn∗ ) − Σsn0 (Wn∗ ))wn
vn′ (Σ
c ∗ ) − Σs (W
c ∗ ))wn + v′ (Σs (W
c ∗ ) − Σs (W ∗ ))wn
b s (W
= vn′ (Σ
n
n
n0
n
n
n0
n
n0
n
−1/2
∗
∗
∗
c
c
=n
An (W ) + Rn (W , W )
n
n
n
cn∗ , Wn∗ ) = (W
cn∗ − Wn∗ )O(1). Further, using
where again Rn (W
√ ′
b s (W
cn∗ ) − Σsn0 (W
cn∗ ))wn = Bn (W
cn∗ ) + o(1),
nvn (Σ
n
a.s., we arrive at
b s (W
c ∗ ) − Σs (W ∗ ))wn
vn′ (Σ
n
n
n0
n
−1/2
∗
c
c∗, W ∗)
=n
An (W ) + Rn (W
n
=n
−1/2
n
n
cn∗ ) + o(1)) + O(W
cn∗ − Wn∗ ),
(Bn (W
as n → ∞, a.s., which completes the proof.
Proof of Theorem 4.6:
Theorem 4.1, we obtain
Q.E.D.
Let An (W ) be defined as in (4.7). Arguing as in the proof of
√
b n − Σn )wn − αn (vn , wn )B n (1)0 |
|An (W ) − Bn (W )| ≤ (1 − W )| nvn′ (Σ
dn
X
√
b n k∗tr − kΣn k∗tr ) − vn′ wn d−1/2
B n (1)i
+ W vn′ wn n(kΣ
n
i=1
The first summand is o(1), a.s., by Theorem 2.1. Under assumption (4.12), the second term
can be bounded by
Rn =
√
b n k∗
vn′ wn n(kΣ
tr
= W |vn′ wn |
= o(1),
√
b n k∗ ) − v′ wn
− kΣ
tr
n
dn
X
B n (1)i
i=1
b n k∗tr − kΣ
b n k∗tr ) − d−1/2
n(kΣ
n
dn
X
B n (1)i
i=1
as n → ∞, a.s., which completes the proof.
Q.E.D.
APPENDIX A: NOTATION AND FORMULAS
We denote
σk2 = E(ǫ2k ), γk = E(ǫ4k ).
The approximating martingales used to obtain the strong approximations require to control
the following quantities. For the reader’s convenience, we reproduce them here from [17] as
well as some related formulas and results. Let
(A.1)
(n)
(n)
f0,j = f0,j (vn , wn ) =
dn
X
ν,µ=1
(ν) (µ)
vν wµ cj cj ,
j = 0, 1, . . . ,
41
INFERENCE FOR THE TRACE
(A.2)
(n)
(n)
fl,j = fl,j (vn , wn ) =
dn
X
(ν) (µ)
(µ) (ν)
vν wµ [cj cj+l + cj cj+l ],
l = 1, 2, . . . ; j = 0, 1, . . . ,
ν,µ=1
and
(A.3)
(n)
(n)
fel,i = fel,i (vn , wn ) =
∞
X
(n)
fl,j =
dn
∞ X
X
(ν) (µ)
(µ) (ν)
vν wµ [cj cj+l + cj cj+l ],
l, i = 0, 1, . . . .
j=i ν,µ=1
j=i
Lemma and Definition A.1 Suppose that vn , wn have uniformly bounded ℓ1 -norm in the
sense of equation (1.5). Then Assumption (A) implies
(A.4)
sup
∞
∞ X
X
(n)
(n)
(fel,i − fel,i+n′ )2 ≤ C(n′ )1−θ ,
for all n′ = 1, 2, . . . ,
n∈N i=1 l=0
′
(A.5)
n X
∞
X
(n)
(fer+k,0 )2 ≤ C(n′ )1−θ ,
sup
for all n′ = 1, 2, . . . ,
n∈N k=1 r=0
′
(A.6)
n X
∞
X
(n)
sup
(fel,k )2 ≤ C(n′ )1−θ ,
for all n′ = 1, 2, . . . ,
n∈N k=1 l=0
and there exist
(A.7)
α2n = α2n (vn , wn ) ≥ 0,
n ≥ 1,
such that
j−1
n X
n
X
X
(n)
′ 2
′ 1−θ
2
2
4
,
(fej−l,0 )2 σm
)
+
(γm′ +j − σm
′ +j σm′ +l − n αn ≤ C(n )
′ +j
′
′
(A.8)
(n)
(fe00 )2
j=1 l=1
j=1
for all n′ , m′ = 0, 1, · · · .
en , w
e n , n ≥ 1, have uniformly bounded ℓ1 -norms, then there exist
Further, if vn , wn , v
(A.9)
with
en , w
e n ),
βn2 = βn2 (vn , wn , v
n ≥ 1,
j−1
n X
n
X
X
(n)
(n)
2
2
4
e n )σm
vn , w
fej−l,0 (vn , wn )fej−l,0 (e
(γm′ +j − σm′ +j ) +
′ +j σm′ +l
′
′
(A.10)
(n)
(n)
e n)
fe0,0 (vn , wn )fe0,0 (e
vn , w
j=1
j=1 l=1
n′ ,m′
en , w
e n ) << (n′ )1−θ .
− n′ βn2 (vn , wn , v
ACKNOWLEDGMENTS
Part of this work has been supported by a grant of the first author from Deutsche Forschungsgemeinschaft (DFG), grant No. STE 1034/11-1, which he gratefully acknowledges. Rainer
von Sachs gratefully acknowledges funding by contract ”Projet d’Actions de Recherche Concertées” No. 12/17-045 of the ,,Communauté française de Belgique” and by IAP research
network Grant P7/06 of the Belgian government (Belgian Science Policy).
42
A. STELAND, R. VON SACHS
REFERENCES
[1] Andrew R. Barron, Albert Cohen, Wolfgang Dahmen, and Ronald A. DeVore. Approximation and learning by greedy algorithms. Ann. Statist., 36(1):64–94, 2008.
[2] Patrick Billingsley. Convergence of probability measures. Wiley Series in Probability and
Statistics: Probability and Statistics. John Wiley & Sons, Inc., New York, second edition,
1999. A Wiley-Interscience Publication.
[3] D. Bosq. Linear processes in function spaces, volume 149 of Lecture Notes in Statistics.
Springer-Verlag, New York, 2000. Theory and applications.
[4] Joshua Brodie, Ingrid Daubechies, Christine De Mol, Domenico Giannone, and Ignace
Loris. Sparse and stable Markowitz portfolios. Proceedings the National Academy of
Sciences of the United States of America, 106(30):12267–12272, 2009.
[5] Herold Dehling and Walter Philipp. Almost sure invariance principles for weakly dependent vector-valued random variables. Ann. Probab., 10(3):689–701, 1982.
[6] Jianqing Fan, Yingying Fan, and Jinchi Lv. High dimensional covariance matrix estimation using a factor model. J. Econometrics, 147(1):186–197, 2008.
[7] Mark Fiecas, Jürgen Franke, Rainer von Sachs, and Joseph Tadjuidje. Shrinkage estimation for multivariate hidden Markov models. J. Amer. Statist. Assoc., to appear,
2016.
[8] Moritz Jirak. Change-point analysis in increasing dimension. J. Multivariate Anal.,
111:136–159, 2012.
[9] Tōnu Kollo and Heinz Neudecker. Asymptotics of eigenvalues and unit-length eigenvectors of sample variance and correlation matrices. J. Multivariate Anal., 47(2):283–300,
1993.
[10] Tōnu Kollo and Heinz Neudecker. Corrigendum: “Asymptotics of eigenvalues and unitlength eigenvectors of sample variance and correlation matrices” [J. Multivariate Anal.
47 (1993), no. 2, 283–300; MR1247379 (94j:62040)]. J. Multivariate Anal., 51(1):210,
1994.
[11] Michael A. Kouritzin. Strong approximation for cross-covariances of linear variables with
long-range dependence. Stochastic Process. Appl., 60(2):343–353, 1995.
[12] Oliver Ledoit and Michael Wolf. Improved estimation of the covariance matrix of stock
returns with an application to portfolio selection. Journal of Empirical Finance, 10:603–
621, 2003.
[13] Olivier Ledoit and Michael Wolf. A well-conditioned estimator for large-dimensional
covariance matrices. J. Multivariate Anal., 88(2):365–411, 2004.
[14] Weidong Liu and Zhengyan Lin. Strong approximation for a class of stationary processes.
Stochastic Process. Appl., 119(1):249–280, 2009.
[15] Walter Philipp. A note on the almost sure approximation of weakly dependent random
variables. Monatsh. Math., 102(3):227–236, 1986.
[16] Alessio Sancetta. Sample covariance shrinkage for high dimensional dependent data. J.
Multivariate Anal., 99(5):949–967, 2008.
[17] A. Steland and R. von Sachs. Large-sample approximations for variance-covariance matrices of high-dimensional time series. Bernoulli, in press, 2016.
[18] Terence Tao. A cheap version of the Kabatjanski-Levenstein bound for almost orthogonal
vectors.
[19] Daniela M. Witten and Robert Tibshirani. Testing significance of features by lassoed
principal components. Ann. Appl. Stat., 2(3):986–1012, 2008.
INFERENCE FOR THE TRACE
43
[20] Daniela M. Witten, Robert Tibshirani, and Trevor Hastie. A penalized decomposition,
with applications to sparse principal components and canonical correlation analysis. Biostatistics, 10:515–534, 2009.
[21] Wei Biao Wu. Strong invariance principles for dependent random variables. Ann. Probab.,
35(6):2294–2320, 2007.
[22] Wei Biao Wu, Yinxiao Huang, and Wei Zheng. Covariances estimation for long-memory
processes. Adv. in Appl. Probab., 42(1):137–157, 2010.
[23] Wei Biao Wu and Wanli Min. On linear processes with dependent innovations. Stochastic
Process. Appl., 115(6):939–958, 2005.
[24] Li-xin Zhang. Strong approximations of martingale vectors and their applications in
Markov-chain adaptive designs. Acta Math. Appl. Sin. Engl. Ser., 20(2):337–352, 2004.
| 10math.ST
|
Genetic Algorithm for Solving Simple Mathematical Equality Problem
Denny Hermawanto
Indonesian Institute of Sciences (LIPI), INDONESIA
Mail: [email protected]
Abstract
This paper explains genetic algorithm for novice in this field. Basic philosophy of genetic
algorithm and its flowchart are described. Step by step numerical computation of genetic
algorithm for solving simple mathematical equality problem will be briefly explained.
Basic Philosophy
Genetic algorithm developed by Goldberg was inspired by Darwin's theory of evolution
which states that the survival of an organism is affected by rule "the strongest species that
survives". Darwin also stated that the survival of an organism can be maintained through the
process of reproduction, crossover and mutation. Darwin's concept of evolution is then
adapted to computational algorithm to find solution to a problem called objective function in
natural fashion. A solution generated by genetic algorithm is called a chromosome, while
collection of chromosome is referred as a population. A chromosome is composed from
genes and its value can be either numerical, binary, symbols or characters depending on the
problem want to be solved. These chromosomes will undergo a process called fitness
function to measure the suitability of solution generated by GA with problem. Some
chromosomes in population will mate through process called crossover thus producing new
chromosomes named offspring which its genes composition are the combination of their
parent. In a generation, a few chromosomes will also mutation in their gene. The number of
chromosomes which will undergo crossover and mutation is controlled by crossover rate and
mutation rate value. Chromosome in the population that will maintain for the next generation
will be selected based on Darwinian evolution rule, the chromosome which has higher fitness
value will have greater probability of being selected again in the next generation. After
several generations, the chromosome value will converges to a certain value which is the best
solution for the problem.
The Algorithm
In the genetic algorithm process is as follows [1]:
Step 1. Determine the number of chromosomes, generation, and mutation rate and crossover
rate value
Step 2. Generate chromosome-chromosome number of the population, and the initialization
value of the genes chromosome-chromosome with a random value
Step 3. Process steps 4-7 until the number of generations is met
Step 4. Evaluation of fitness value of chromosomes by calculating objective function
Step 5. Chromosomes selection
Step 6. Crossover
Step 7. Mutation
Step 8. Solution (Best Chromosomes)
The flowchart of algorithm can be seen in Figure 1
ith Population
Chromosome
Chromosome
Solutions
encoding
Chromosome
Chromosome
Evaluation
Selection
Next generation
Roulette
\’ wheel
Crossover
Mutation
End ?
N
i=i+1
Y
Best Chromosome
Decoding
Best Solution
Figure 1. Genetic algorithm flowchart
Numerical Example
Here are examples of applications that use genetic algorithms to solve the problem of
combination. Suppose there is equality a + 2b + 3c + 4d = 30, genetic algorithm will be used
to find the value of a, b, c, and d that satisfy the above equation. First we should formulate
the objective function, for this problem the objective is minimizing the value of function f(x)
where f(x) = ((a + 2b + 3c + 4d) - 30). Since there are four variables in the equation, namely
a, b, c, and d, we can compose the chromosome as follow: To speed up the computation, we
can restrict that the values of variables a, b, c, and d are integers between 0 and 30.
a
b
c
d
Step 1. Initialization
For example we define the number of chromosomes in population are 6, then we generate
random value of gene a, b, c, d for 6 chromosomes
Chromosome[1] = [a;b;c;d] = [12;05;23;08]
Chromosome[2] = [a;b;c;d] = [02;21;18;03]
Chromosome[3] = [a;b;c;d] = [10;04;13;14]
Chromosome[4] = [a;b;c;d] = [20;01;10;06]
Chromosome[5] = [a;b;c;d] = [01;04;13;19]
Chromosome[6] = [a;b;c;d] = [20;05;17;01]
Step 2. Evaluation
We compute the objective function value for each chromosome produced in initialization
step:
F_obj[1] = Abs(( 12 + 2*05 + 3*23 + 4*08 ) - 30)
= Abs((12 + 10 + 69 + 32 ) - 30)
= Abs(123 - 30)
= 93
F_obj[2] = Abs((02 + 2*21 + 3*18 + 4*03) - 30)
= Abs((02 + 42 + 54 + 12) - 30)
= Abs(110 - 30)
= 80
F_obj[3] = Abs((10 + 2*04 + 3*13 + 4*14) - 30)
= Abs((10 + 08 + 39 + 56) - 30)
= Abs(113 - 30)
= 83
F_obj[4] = Abs((20 + 2*01 + 3*10 + 4*06) - 30)
= Abs((20 + 02 + 30 + 24) - 30)
= Abs(76 - 30)
= 46
F_obj[5] = Abs((01 + 2*04 + 3*13 + 4*19) - 30)
= Abs((01 + 08 + 39 + 76) - 30)
= Abs(124 - 30)
= 94
F_obj[6] = Abs((20 + 2*05 + 3*17 + 4*01) - 30)
= Abs((20 + 10 + 51 + 04) - 30)
= Abs(85 - 30)
= 55
Step 3. Selection
1. The fittest chromosomes have higher probability to be selected for the next
generation. To compute fitness probability we must compute the fitness of each
chromosome. To avoid divide by zero problem, the value of F_obj is added by 1.
Fitness[1] = 1 / (1+F_obj[1])
= 1 / 94
= 0.0106
Fitness[2] = 1 / (1+F_obj[2])
= 1 / 81
= 0.0123
Fitness[3] = 1 / (1+F_obj[3])
= 1 / 84
= 0.0119
Fitness[4] = 1 / (1+F_obj[4])
= 1 / 47
= 0.0213
Fitness[5] = 1 / (1+F_obj[5])
= 1 / 95
= 0.0105
Fitness[6] = 1 / (1+F_obj[6])
= 1 / 56
= 0.0179
Total = 0.0106 + 0.0123 + 0.0119 + 0.0213 + 0.0105 + 0.0179
= 0.0845
The probability for each chromosomes is formulated by: P[i] = Fitness[i] / Total
P[1] = 0.0106 / 0.0845
= 0.1254
P[2] = 0.0123 / 0.0845
= 0.1456
P[3] = 0.0119 / 0.0845
= 0.1408
P[4] = 0.0213 / 0.0845
= 0.2521
P[5] = 0.0105 / 0.0845
= 0.1243
P[6] = 0.0179 / 0.0845
= 0.2118
From the probabilities above we can see that Chromosome 4 that has the highest fitness, this
chromosome has highest probability to be selected for next generation chromosomes. For the
selection process we use roulette wheel, for that we should compute the cumulative
probability values:
C[1] = 0.1254
C[2] = 0.1254 + 0.1456
= 0.2710
C[3] = 0.1254 + 0.1456 + 0.1408
= 0.4118
C[4] = 0.1254 + 0.1456 + 0.1408 + 0.2521
= 0.6639
C[5] = 0.1254 + 0.1456 + 0.1408 + 0.2521 + 0.1243
= 0.7882
C[6] = 0.1254 + 0.1456 + 0.1408 + 0.2521 + 0.1243 + 0.2118
= 1.0
Having calculated the cumulative probability of selection process using roulette-wheel can be
done. The process is to generate random number R in the range 0-1 as follows.
R[1] = 0.201
R[2] = 0.284
R[3] = 0.099
R[4] = 0.822
R[5] = 0.398
R[6] = 0.501
If random number R[1] is greater than C[1] and smaller than C[2] then select
Chromosome[2] as a chromosome in the new population for next generation:
NewChromosome[1] = Chromosome[2]
NewChromosome[2] = Chromosome[3]
NewChromosome[3] = Chromosome[1]
NewChromosome[4] = Chromosome[6]
NewChromosome[5] = Chromosome[3]
NewChromosome[6] = Chromosome[4]
Chromosomes in the population thus became:
Chromosome[1] = [02;21;18;03]
Chromosome[2] = [10;04;13;14]
Chromosome[3] = [12;05;23;08]
Chromosome[4] = [20;05;17;01]
Chromosome[5] = [10;04;13;14]
Chromosome[6] = [20;01;10;06]
In this example, we use one-cut point, i.e. randomly select a position in the parent
chromosome then exchanging sub-chromosome. Parent chromosome which will mate is
randomly selected and the number of mate Chromosomes is controlled using crossover_rate
(ρc) parameters. Pseudo-code for the crossover process is as follows:
begin
k← 0;
while(k<population) do
R[k] = random(0-1);
if(R[k]< ρc) then
select Chromosome[k] as parent;
end;
k = k + 1;
end;
end;
Chromosome k will be selected as a parent if R[k]<ρc. Suppose we set that the crossover rate
is 25%, then Chromosome number k will be selected for crossover if random generated value
for Chromosome k below 0.25. The process is as follows: First we generate a random number
R as the number of population.
R[1] = 0.191
R[2] = 0.259
R[3] = 0.760
R[4] = 0.006
R[5] = 0.159
R[6] = 0.340
For random number R above, parents are Chromosome[1], Chromosome[4] and
Chromosome[5] will be selected for crossover.
Chromosome[1] >< Chromosome[4]
Chromosome[4] >< Chromosome[5]
Chromosome[5] >< Chromosome[1]
After chromosome selection, the next process is determining the position of the crossover
point. This is done by generating random numbers between 1 to (length of Chromosome – 1).
In this case, generated random numbers should be between 1 and 3. After we get the
crossover point, parents Chromosome will be cut at crossover point and its gens will be
interchanged. For example we generated 3 random number and we get:
C[1] = 1
C[2] = 1
C[3] = 2
Then for first crossover, second crossover and third crossover, parent’s gens will be cut at
gen number 1, gen number 1 and gen number 3 respectively, e.g.
Chromosome[1] = Chromosome[1] >< Chromosome[4]
= [02;21;18;03] >< [20;05;17;01]
= [02;05;17;01]
Chromosome[4] = Chromosome[4] >< Chromosome[5]
= [20;05;17;01] >< [10;04;13;14]
= [20;04;13;14]
Chromosome[5] = Chromosome[5] >< Chromosome[1]
= [10;04;13;14] >< [02;21;18;03]
= [10;04;18;03]
Thus Chromosome population after experiencing a crossover process:
Chromosome[1] = [02;05;17;01]
Chromosome[2] = [10;04;13;14]
Chromosome[3] = [12;05;23;08]
Chromosome[4] = [20;04;13;14]
Chromosome[5] = [10;04;18;03]
Chromosome[6] = [20;01;10;06]
Step 5. Mutation
Number of chromosomes that have mutations in a population is determined by the
mutation_rate parameter. Mutation process is done by replacing the gen at random position
with a new value. The process is as follows. First we must calculate the total length of gen in
the population. In this case the total length of gen is total_gen =
number_of_gen_in_Chromosome * number of population
=4*6
= 24
Mutation process is done by generating a random integer between 1 and total_gen (1 to 24).
If generated random number is smaller than mutation_rate(ρm) variable then marked the
position of gen in chromosomes. Suppose we define ρm 10%, it is expected that 10% (0.1) of
total_gen in the population that will be mutated:
number of mutations = 0.1 * 24
= 2.4
≈2
Suppose generation of random number yield 12 and 18 then the chromosome which have
mutation are Chromosome number 3 gen number 4 and Chromosome 5 gen number 2. The
value of mutated gens at mutation point is replaced by random number between 0-30.
Suppose generated random number are 2 and 5 then Chromosome composition after mutation
are:
Chromosome[1] = [02;05;17;01]
Chromosome[2] = [10;04;13;14]
Chromosome[3] = [12;05;23;02]
Chromosome[4] = [20;04;13;14]
Chromosome[5] = [10;05;18;03]
Chromosome[6] = [20;01;10;06]
Finishing mutation process then we have one iteration or one generation of the genetic
algorithm. We can now evaluate the objective function after one generation:
Chromosome[1] = [02;05;17;01]
F_obj[1] = Abs(( 02 + 2*05 + 3*17 + 4*01 ) - 30)
= Abs((2 + 10 + 51 + 4 ) - 30)
= Abs(67 - 30)
= 37
Chromosome[2] = [10;04;13;14]
F_obj[2] = Abs(( 10 + 2*04 + 3*13 + 4*14 ) - 30)
= Abs((10 + 8 + 33 + 56 ) - 30)
= Abs(107 - 30)
= 77
Chromosome[3] = [12;05;23;02]
F_obj[3] = Abs(( 12 + 2*05 + 3*23 + 4*02 ) - 30)
= Abs((12 + 10 + 69 + 8 ) - 30)
= Abs(87 - 30)
= 47
Chromosome[4] = [20;04;13;14]
F_obj[4] = Abs(( 20 + 2*04 + 3*13 + 4*14 ) - 30)
= Abs((20 + 8 + 39 + 56 ) - 30)
= Abs(123 - 30)
= 93
Chromosome[5] = [10;05;18;03]
F_obj[5] = Abs(( 10 + 2*05 + 3*18 + 4*03 ) - 30)
= Abs((10 + 10 + 54 + 12 ) - 30)
= Abs(86 - 30)
= 56
Chromosome[6] = [20;01;10;06]
F_obj[6] = Abs(( 20 + 2*01 + 3*10 + 4*06 ) - 30)
= Abs((20 + 2 + 30 + 24 ) - 30)
= Abs(76 - 30)
= 46
From the evaluation of new Chromosome we can see that the objective function is decreasing,
this means that we have better Chromosome or solution compared with previous
Chromosome generation. New Chromosomes for next iteration are:
Chromosome[1] = [02;05;17;01]
Chromosome[2] = [10;04;13;14]
Chromosome[3] = [12;05;23;02]
Chromosome[4] = [20;04;13;14]
Chromosome[5] = [10;05;18;03]
Chromosome[6] = [20;01;10;06]
These new Chromosomes will undergo the same process as the previous generation of
Chromosomes such as evaluation, selection, crossover and mutation and at the end it produce
new generation of Chromosome for the next iteration. This process will be repeated until a
predetermined number of generations. For this example, after running 50 generations, best
chromosome is obtained:
Chromosome = [07; 05; 03; 01]
This means that: a = 7, b = 5, c = 3, d = 1
If we use the number in the problem equation:
a + 2b + 3c + 4d = 30
7 + (2 * 5) + (3 * 3) + (4 * 1) = 30
We can see that the value of variable a, b, c and d generated by genetic algorithm can satisfy
that equality.
REFERENCE
[1] Mitsuo Gen, Runwei Cheng, “Genetic Algorithms And Engineering Design”, John Wiley
& Sons, 1997.
| 9cs.NE
|
arXiv:1609.04288v1 [math.GR] 14 Sep 2016
A FAMILY OF TWO GENERATOR NON-HOPFIAN GROUPS
DONGHI LEE AND MAKOTO SAKUMA
Abstract. We construct 2-generator non-Hopfian groups Gm , m = 3, 4, 5, . . . ,
where each Gm has a specific presentation Gm = ha, b | urm,0 = urm,1 = urm,2 =
· · · = 1i which satisfies small cancellation conditions C(4) and T (4). Here, urm,i
is the single relator of the upper presentation of the 2-bridge link group of slope
rm,i , where rm,0 = [m + 1, m, m] and rm,i = [m + 1, m − 1, (i − 1)hmi, m + 1, m]
in continued fraction expansion for every integer i ≥ 1.
1. Introduction
Recall that a group G is called Hopfian if every epimorphism G → G is an automorphism. The non-Hopfian property of finitely generated groups has a close
connection with the non-residual finiteness. In fact, the classical work due to
Mal’cev [12] shows that every finitely generated non-Hopfian group is non-residually
finite. One of the hardest open problems about hyperbolic groups is whether or not
every hyperbolic group is residually finite. An important progress on this problem
was given by Sela [19] asserting that every torsion-free hyperbolic group is Hopfian.
In 2007, Osin [14] proved that this problem is equivalent to the question on whether
or not a group G is residually finite if G is hyperbolic relative to a finite collection of residually finite subgroups. The notion of relatively hyperbolic groups is an
important generalization of hyperbolic groups in geometric group theory originally
introduced by Gromov [5] (cf. [3], [4], [15]). Motivating examples for this generalization include the fundamental groups of non-compact hyperbolic manifolds of
finite volume. In particular, every 2-bridge link complement except for a torus link
is a hyperbolic manifold with cusps, so its fundamental group, that is, the 2-bridge
link group, is hyperbolic relative to its peripheral subgroups although it is not a
hyperbolic group. It is known by Groves [6] that a finitely generated torsion-free
group is Hopfian, if it is hyperbolic relative to free abelian subgroups. It is also
proved by Reinfeldt and Weidmann [16, 17] that every hyperbolic group, possibly
with torsion, is Hopfian. In addition, based on this result, Coulon and Guirardel [2]
2010 Mathematics Subject Classification. Primary 20F06, 57M25
The first author was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2014R1A1A2054890). The second author was supported by JSPS Grants-in-Aid 15H03620.
1
proved that every lacunary hyperbolic group, which is characterized as a direct limit
of hyperbolic groups with a certain radii condition, is also Hopfian.
As for small cancellation groups, it is known that if a group has a finite presentation which satisfies small cancellation conditions either C ′ (1/6) or both C ′ (1/4)
and T (4), then it is hyperbolic (see [20]). Wise [22] also proved that every finite
C ′ (1/6)-small cancellation presentation defines a residually finite group.
Historically, not many have been known examples of finitely generated nonHopfian groups with specific presentations. The earliest such example was found
by Neumann [13] in 1950 as follows: ha, b | e2 = e3 = · · · = 1i, where ei =
a−1 b−1 ab−i ab−1 a−1 bi a−1 bab−i aba−1 bi for every integer i ≥ 2. Soon after, the first
non-Hopfian group with finite presentation was discovered by Higman [7] as follows:
ha, s, t | as = a2 , at = a2 i. Also a non-Hopfian group with the simplest presentation
up to now was produced by Baumslag and Solitar [1] as follows: ha, t | (a2 )t = a3 i.
Many other non-Hopfian groups with specific finite presentations have been obtained
by generalizing Higman’s group or Baumslag-Solitar’s group (see, for instance, [18],
[21]). Another notable non-Hopfian group was obtained by Ivanov and Storozhev [8]
in 2005. They constructed a family of finitely generated, but not finitely presented,
non-Hopfian relatively free groups with direct limits of hyperbolic groups, although
the defining relations of their group presentations are not explicitly described in
terms of generators.
Motivated by this background, we construct non-Hopfian groups by using hyperbolic 2-bridge link groups. In more detail, we construct a family of 2-generator
non-Hopfian groups each of which has the form G = ha, b | ur0 = ur1 = ur2 = · · · = 1i
satisfying small cancellation conditions C(4) and T (4), where uri is the single relator
of the upper presentation of the link group of the 2-bridge link of slope ri for every
i = 0, 1, 2, . . . . Here, the rational numbers ri may be parametrized by i ≥ 0, and
there is an explicit formula to express uri in terms of a and b. To parametrize the
rational numbers ri , we express ri in continued fraction expansion. Note that every
rational number 0 < s ≤ 1 has a unique continued fraction expansion such that
1
s=
m1 +
=: [m1 , m2 , . . . , mk ],
1
1
m2 + . . .
+
mk
where k ≥ 1, (m1 , . . . , mk ) ∈ (Z+ )k and mk ≥ 2 unless k = 1.
The main result of the present paper is the following, whose proof is contained in
in Section 3.
Theorem 1.1. Let r0 = [4, 3, 3], and let ri = [4, 2, (i − 1)h3i, 4, 3] for every integer
i ≥ 1. Then the group presentation G = ha, b | ur0 = ur1 = ur2 = · · · = 1i satisfies
small cancellation conditions C(4) and T (4), and G is non-Hopfian.
2
Here, the symbol “(i − 1)h3i” represents i − 1 successive 3’s if i − 1 ≥ 1, whereas
“0h3i” means that 3 does not occur in that place, so that r1 = [4, 2, 0h3i, 4, 3] =
[4, 2, 4, 3].
Remark 1.2. (1) Once we allow the components of a continued fraction expansion
to be “−”, meaning that the two integers immediately before and after − are added
to form one component, ri ’s in Theorem 1.1 can be parametrized including i = 0 as
ri = [4, ih2, 1, −i, 3, 3] for every i = 0, 1, 2, . . . .
(2) If we express the rational number ri in Theorem 1.1 as qi /pi , where pi and qi
are relatively prime positive integers, then |uri | = 2pi (see Section 2.1). A simple
computation shows that the inequality 3 < pi+1 /pi < 4 holds for every i = 0, 1, 2, . . . ,
so that the length |uri | of the word uri satisfies the inequality c · 3i < |uri | < c · 4i
for every integer i ≥ 1, where c = |ur0 |.
By looking at the proof of Theorem 1.1 in Section 3, it is not hard to see that a
similar result holds not only for r0 = [4, 3, 3] but also for r0 = [m + 1, m, m] with
m being any integer greater than 3. Thus we only state its general form without a
detailed proof.
Theorem 1.3. Suppose that m is an integer with m ≥ 3. Let r0 = [m + 1, m, m],
and let ri = [m + 1, m − 1, (i − 1)hmi, m + 1, m] for every integer i ≥ 1. Then the
group presentation G = ha, b | ur0 = ur1 = ur2 = · · · = 1i satisfies small cancellation
conditions C(4) and T (4), and G is non-Hopfian.
The present paper is organized as follows. In Section 2, we recall the upper
presentation of a 2-bridge link group, and basic facts established in [9] concerning
the upper presentations. We also recall key facts from [9] obtained by applying small
cancellation theory to the upper presentations. Section 3 is devoted to the proof of
the main result (Theorem 1.1).
2. Preliminaries
2.1. Upper presentations of 2-bridge link groups
We recall some notation in [9]. The Conway sphere S is the 4-times punctured
sphere which is obtained as the quotient of R2 − Z2 by the group generated by the
π-rotations around the points in Z2 . For each s ∈ Q̂ := Q ∪ {∞}, let αs be the
simple loop in S obtained as the projection of a line in R2 − Z2 of slope s. We call
s the slope of the simple loop αs .
For each r ∈ Q̂, the 2-bridge link K(r) of slope r is the sum of the rational tangle
(B 3 , t(∞)) of slope ∞ and the rational tangle (B 3 , t(r)) of slope r. Recall that
∂(B 3 − t(∞)) and ∂(B 3 − t(r)) are identified with S so that α∞ and αr bound disks
in B 3 − t(∞) and B 3 − t(r), respectively. By van-Kampen’s theorem, the link group
G(K(r)) = π1 (S 3 − K(r)) is obtained as follows:
G(K(r)) = π1 (S 3 − K(r)) ∼
= π1 (S)/hhα∞ , αr ii ∼
= π1 (B 3 − t(∞))/hhαr ii.
3
Let {a, b} be the standard meridian generator pair of π1 (B 3 − t(∞), x0 ) as described
in [9, Section 3]. Then π1 (B 3 − t(∞)) is identified with the free group F (a, b) with
basis {a, b}. For the rational number r = q/p, where p and q are relatively prime
positive integers, let ur be the word in {a, b} obtained as follows. Set ǫi = (−1)⌊iq/p⌋ ,
where ⌊x⌋ is the greatest integer not exceeding x.
(1) If p is odd, then
q
uq/p = aûq/p b(−1) û−1
q/p ,
where ûq/p = bǫ1 aǫ2 · · · bǫp−2 aǫp−1 .
(2) If p is even, then
uq/p = aûq/p a−1 û−1
q/p ,
where ûq/p = bǫ1 aǫ2 · · · aǫp−2 bǫp−1 .
∼ π1 (B 3 − t(∞)) is represented by the simple loop αr , and we
Then ur ∈ F (a, b) =
obtain the following two-generator and one-relator presentation of a 2-bridge link
groups:
G(K(r)) ∼
= π1 (B 3 − t(∞))/hhαr ii ∼
= ha, b | ur i.
This presentation is called the upper presentation of a 2-bridge link group.
2.2. Basic facts concerning the upper presentations
Throughout this paper, a cyclic word is defined to be the set of all cyclic permutations of a cyclically reduced word. By (v) we denote the cyclic word associated
with a cyclically reduced word v. Also the symbol “≡” denotes the letter-by-letter
equality between two words or between two cyclic words. Now we recall definitions
and basic facts from [9] which are needed in the proof of Theorem 1.1 in Section 3.
Definition 2.1. (1) Let v be a reduced word in {a, b}. Decompose v into
v ≡ v1 v2 · · · vt ,
where, for each i = 1, . . . , t − 1, vi is a positive (resp., negative) subword (that is, all
letters in vi have positive (resp., negative) exponents), and vi+1 is a negative (resp.,
positive) subword. Then the sequence of positive integers S(v) := (|v1 |, |v2 |, . . . , |vt |)
is called the S-sequence of v.
(2) Let v be a cyclically reduced word in {a, b}. Decompose the cyclic word (v)
into
(v) ≡ (v1 v2 · · · vt ),
where vi is a positive (resp., negative) subword, and vi+1 is a negative (resp., positive) subword (taking subindices modulo t). Then the cyclic sequence of positive
integers CS(v) := ((|v1 |, |v2 |, . . . , |vt |)) is called the CS-sequence of (v). Here the
double parentheses denote that the sequence is considered modulo cyclic permutations.
4
Definition 2.2. For a rational number r with 0 < r ≤ 1, let ur be the word defined
in the beginning of this section. Then the symbol CS(r) denotes the CS-sequence
CS(ur ) of (ur ), which is called the CS-sequence of slope r.
A reduced word w in {a, b} is said to be alternating if a±1 and b±1 appear in w
alternately, to be precise, neither a±2 nor b±2 appears in w. Also a cyclically reduced
word w in {a, b} is said to be cyclically alternating, i.e., all the cyclic permutations
of w are alternating. In particular, ur is a cyclically alternating word in {a, b}. Note
that every alternating word w in {a, b} is determined by the sequence S(w) and the
initial letter (with exponent) of w. Note also that if w is a cyclically alternating
word in {a, b} such that CS(w) = CS(r), then either (w) ≡ (ur ) or (w) ≡ (u−1
r ) as
cyclic words.
In the remainder of this section, we suppose that r is a rational number with
0 < r ≤ 1, and write r as a continued fraction expansion r = [m1 , m2 , . . . , mk ],
where k ≥ 1, (m1 , . . . , mk ) ∈ (Z+ )k and mk ≥ 2 unless k = 1. Note from [9] that
if k ≥ 2, then some properties of CS(r) differ according to m2 = 1 or m2 ≥ 2. For
brevity, we write m for m1 .
Lemma 2.3 ([9, Proposition 4.3]). For the rational number r = [m1 , m2 , . . . , mk ]
satisfying that m2 ≥ 2 if k ≥ 2, the following hold.
(1) Suppose k = 1, i.e., r = 1/m. Then CS(r) = ((m, m)).
(2) Suppose k ≥ 2. Then each term of CS(r) is either m or m + 1. Moreover,
no two consecutive terms of CS(r) can be (m + 1, m + 1), so there is a cyclic
sequence of positive integers ((t1 , t2 , . . . , ts )) such that
CS(r) = ((m + 1, t1 hmi, m + 1, t2 hmi, . . . , m + 1, ts hmi)).
Here, the symbol “ti hmi” represents ti successive m’s.
Definition 2.4. If k ≥ 2, the symbol CT (r) denotes the cyclic sequence ((t1 , t2 , . . . , ts ))
in Lemma 2.3, which is called the CT -sequence of slope r.
Lemma 2.5 ([9, Proposition 4.4 and Corollary 4.6]). For the rational number r =
[m1 , m2 , . . . , mk ] with k ≥ 2 and m2 ≥ 2, let r ′ be the rational number defined as
r ′ = [m2 − 1, m3 , . . . , mk ].
Then we have CT (r) = CS(r ′ ).
Lemma 2.6 ([9, Proposition 4.5]). For the rational number r = [m1 , m2 , . . . , mk ],
the cyclic sequence CS(r) has a decomposition ((S1 , S2 , S1 , S2 )) which satisfies the
following.
(1) Each Si is symmetric, i.e., the sequence obtained from Si by reversing the
order is equal to Si . (Here, S1 is empty if k = 1.)
(2) Each Si occurs only twice in the cyclic sequence CS(r).
(3) The subsequence S1 begins and ends with m + 1.
5
(4) The subsequence S2 begins and ends with m.
Lemma 2.7 ([9, Proof of Proposition 4.5]). For the rational number r = [m1 , m2 , . . . , mk ]
with k ≥ 2 and m2 ≥ 2, let r ′ be the rational number defined as in Lemma 2.5. Also
let CS(r ′ ) = ((T1 , T2 , T1 , T2 )) and CS(r) = ((S1 , S2 , S1 , S2 )) be the decompositions
described in Lemma 2.6. Then the following hold.
(1) If k = 2, then T1 = ∅, T2 = (m2 − 1), and S1 = (m + 1), S2 = ((m2 − 1)hmi).
(2) If k ≥ 3, then T1 = (t1 , . . . , ts1 ), T2 = (ts1 +1 , . . . , ts2 ), and
S1 = (m + 1, ts1 +1 hmi, m + 1, . . . , m + 1, ts2 hmi, m + 1),
S2 = (t1 hmi, m + 1, t2 hmi, . . . , ts1 −1 hmi, m + 1, ts1 hmi).
The following lemma is useful in the proof of Lemma 3.6.
Lemma 2.8. For two distinct rational numbers r = [m1 , m2 , . . . , mk ] and s =
[m1 , l2 , . . . , lt ], assume that
(i) m is a positive integer;
(ii) mi and lj are integers greater than 1 for every i ≥ 2 and j ≥ 2;
(iii) k, t ≥ 3 and k 6= t; and
(iv) if k < t, then m2 ≥ l2 , while if k > t, then m2 ≤ l2 .
Let r ′ and s′ be the rational numbers defined as in Lemma 2.5. Also let CS(r) =
((S1 , S2 , S1 , S2 )) and CS(r ′ ) = ((T1 , T2 , T1 , T2 )) be the decompositions described in
Lemma 2.6. Suppose that CS(s) contains S1 or S2 as a subsequence. Then CS(s′ )
contains T1 or T2 as a subsequence.
In the above lemma (and throughout this paper), we mean by a subsequence a
subsequence without leap. Namely a sequence (a1 , a2 , . . . , al ) is called a subsequence
of a cyclic sequence, if there is a sequence (b1 , b2 , . . . , bn ) representing the cyclic
sequence such that l ≤ n and ai = bi for 1 ≤ i ≤ l.
Proof. First suppose that CS(s) contains S1 as a subsequence. By Lemma 2.7(2),
CS(s) contains (m + 1, ts1 +1 hmi, m + 1, . . . , m + 1, ts2 hmi, m + 1) as a subsequence,
where T2 = (ts1 +1 , . . . , ts2 ). Then clearly CS(s′ ) = CT (s) contains (ts1 +1 , . . . , ts2 ),
that is, T2 , as a subsequence. So we are done.
Next suppose that CS(s) contains S2 as a subsequence. Again by Lemma 2.7(2),
CS(s) contains (t1 hmi, m + 1, t2 hmi, . . . , ts1 −1 hmi, m + 1, ts1 hmi) as a subsequence,
where T1 = (t1 , . . . , ts1 ). Then CS(s′ ) = CT (s) contains (d1 + t1 , t2 , . . . , ts1 −1 , ts1 +
d2 ) as a subsequence, where d1 , d2 ≥ 0. In the reminder of the proof, we show
that d1 = d2 = 0, so that CS(s′ ) = CT (s) contains T1 = (t1 , t2 , . . . , ts1 ) as a
subsequence. To this end, note that since r ′ = [m2 − 1, m3 , . . . , mk ], t1 = ts1 = m2
by Lemma 2.6(3). Also since s′ = [l2 − 1, l3 , . . . , lt ], CS(s′ ) = CT (s) consists of l2 − 1
and l2 by Lemma 2.3(2). Hence each of d1 + t1 = d1 + m2 and ts1 + d2 = m2 + d2
is either l2 − 1 or l2 . Suppose first that k < t. Then m2 ≥ l2 by the assumption
(iv), and thus the only possibility is m2 = l2 . Thus we have d1 = d2 = 0. Suppose
6
next that k > t. Then m2 ≤ l2 again by the assumption (iv). Note that k ≥ 4,
because t ≥ 3 by the assumption (iii). Thus we can see, by using Lemma 2.7 and
the assumption mi ≥ 2 for every i ≥ 2, that S2 contains (m + 1, (m2 − 1)hmi, m + 1)
as a subsequence. This implies that CS(s′ ) = CT (s) contains a term m2 − 1. Since
m2 − 1 ≤ l2 − 1, the only possibility m2 = l2 . Thus we again have d1 = d2 = 0,
completing the proof of Lemma 2.8.
2.3. Small cancellation theory applied to the upper presentations
A subset R of the free group F (a, b) is called symmetrized, if all elements of R are
cyclically reduced and, for each w ∈ R, all cyclic permutations of w and w−1 also
belong to R.
Definition 2.9. Suppose that R is a symmetrized subset of F (a, b). A nonempty
word v is called a piece (with respect to R) if there exist distinct w1 , w2 ∈ R such
that w1 ≡ vc1 and w2 ≡ vc2 . The small cancellation conditions C(p) and T (q),
where p and q are integers such that p ≥ 2 and q ≥ 3, are defined as follows (see
[11]).
(1) Condition C(p): If w ∈ R is a product of n pieces, then n ≥ p.
(2) Condition T (q): For w1 , . . . , wn ∈ R with no successive elements wi , wi+1 an
inverse pair (i mod n), if n < q, then at least one of the products w1 w2 , . . . ,
wn−1 wn , wn w1 is freely reduced without cancellation.
The following proposition enables us to apply small cancellation theory to the
upper presentation ha, b | ur i of G(K(r)).
Proposition 2.10 ([9, Theorem 5.1]). Let r be a rational number such that 0 <
r < 1, and let R be the symmetrized subset of F (a, b) generated by the single relator
ur of the group presentation G(K(r)) = ha, b | ur i. Then R satisfies C(4) and T (4).
This proposition follows from the following characterization of pieces, which in
turn is proved by using Lemma 2.6.
Lemma 2.11 ([10, Corollary 3.25]). Let r and R be as in Proposition 2.10. Then a
subword w of the cyclic word (u±1
r ) is a piece with respect to R if and only if S(w)
contains neither S1 nor (ℓ1 , S2 , ℓ2 ) with ℓ1 , ℓ2 ∈ Z+ as a subsequence.
3. Proof of Theorem 1.1
In this section, for brevity of notation, we sometimes write x̄ for x−1 for a letter
or a word x. For a quotient group H of the free group F (a, b) and two elements w1
and w2 of F (a, b), the symbol w1 =H w2 means the equality in the group H.
For r0 = [4, 3, 3], we have by using Lemma 2.7
CS(ur0 ) = CS(r0 ) = ((5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4)).
7
Let G0 = ha, b | ur0 = 1i. Also let X ≡ a · · · ā be the alternating word in {a, b} such
that S(X) = (4, 4, 4, 5, 4, 4), and let f : F (a, b) → F (a, b) be the homomorphism
defined by f (a) = X̄ and f (b) = b̄.
Lemma 3.1. Under the foregoing notation, let f˜ : F (a, b) → G0 be the composition
of f and the canonical surjection F (a, b) → G0 . Then f˜ is onto.
Proof. Since f˜(b) = b̄, it suffices to show that a ∈ G0 is contained in the image of f˜.
Let w ≡ a · · · ā be the alternating word in {a, b} such that S(w) = (3, 3, 3, 4, 3, 3).
Then
f (w) = X̄ b̄X̄bXbX̄ b̄X̄bXbX b̄X̄ b̄XbX.
Here, since X ≡ a · · · ā and X̄ ≡ a · · · ā are alternating words in {a, b}, we see that
f (w) ≡ a · · · ā is also an alternating word in {a, b} with
S(f (w)) = (S(X̄ b̄), S(X̄), S(bX), S(bX̄ b̄), S(X̄), S(bX), S(bX b̄), S(X̄ b̄), S(X), S(bX)).
Since S(X) = (4, 4, 4, 5, 4, 4) and S(X̄) = (4, 4, 5, 4, 4, 4), we have S(X̄ b̄) = (4, 4, 5, 4, 4, 5),
S(bX) = (5, 4, 4, 5, 4, 4), S(bX̄ b̄) = (5, 4, 5, 4, 4, 5) and S(bX b̄) = (5, 4, 4, 5, 4, 5), so
that
S(f (w)) = (4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4,
5, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4).
Letting v1 ≡ a · · · b̄, v2 ≡ a · · · b̄, and v3 ≡ b · · · ā be the cyclically alternating words
in {a, b} such that
S(v1 ) = (4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4),
S(v2 ) = (5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4),
S(v3 ) = (4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4),
we see that f (w) ≡ v1 v2 āv3 . Moreover, for each i = 1, 2, 3, since CS(vi ) = CS(r0 ),
(vi ) ≡ (u±1
r0 ) as cyclic words by [9, Lemma 3.2], which implies that vi =G0 1. Hence
f (w) =G0 ā, and thus a ∈ G0 is contained in the image of f˜, as required.
At this point, we set up the following notation which will be used at the end of
the proofs of Lemmas 3.3 and 3.4.
Notation 3.2. (1) Suppose that v is an alternating word in {a, b} such that there
is a sequence (t1 , t2 , . . . , ts ) of positive integers satisfying
S(v) = (ǫ1 h5i, t1 h4i, 5, t2 h4i, . . . , 5, ts h4i, ǫ2 h5i),
where ǫi is 0 or 1 for i = 1, 2. Then the symbol T (v) denotes the sequence
(t1 , t2 , . . . , ts ).
(2) Suppose that v is a cyclically alternating word in {a, b} such that there is a
cyclic sequence ((t1 , t2 , . . . , ts )) of positive integers satisfying
CS(v) = ((5, t1 h4i, 5, t2 h4i, . . . , 5, ts h4i)).
8
Then the symbol CT (v) denotes the cyclic sequence ((t1 , t2 , . . . , ts )). In particular,
by Lemma 2.7, if v ≡ ur for some r = [4, m2 , . . . , mk ] with m2 ≥ 2, then CT (ur ) =
CT (r) = CS(r ′ ), where r ′ = [m2 − 1, . . . , mk ].
(3) Suppose that v is an alternating word in {a, b} such that there is a sequence
(h1 , h2 , . . . , hp ) of positive integers satisfying
T (v) = (ǫ1 h2i, h1 h1i, 2, h2 h1i, . . . , 2, hp h1i, ǫ2 h2i),
where T (v) is defined as in (1) and ǫi is 0 or 1 for i = 1, 2. Then the symbol V (v)
denotes the sequence (h1 , h2 , . . . , hp ).
(4) Suppose that v is a cyclically alternating word in {a, b} such that there is a
cyclic sequence ((h1 , h2 , . . . , hp )) of positive integers satisfying
CT (v) = ((2, h1 h1i, 2, h2 h1i, . . . , 2, hp h1i)),
where CT (v) is defined as in (2). Then the symbol CV (v) denotes the cyclic sequence ((h1 , h2 , . . . , hp )). In particular, by Lemma 2.7, if v ≡ ur for some r =
[4, 2, m3 , . . . , mk ] with m3 ≥ 2, then CV (ur ) = CT (r ′ ) = CS(r ′′ ), where r ′ =
[1, m3 , . . . , mk ] and r ′′ = [m3 − 1, . . . , mk ].
Lemma 3.3. Under the foregoing notation, (f (ur0 )) =G0 (u±1
r1 ).
Proof. Recall that
CS(ur0 ) = CS(r0 ) = ((5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4)).
Clearly the cyclic word (ur0 ) has six positive or negative subwords of length 5.
Cutting in the middle of such subwords, we may write the cyclic word (ur0 ) as a
product (v1 · · · v6 ), where
v1 ≡ abab̄āb̄ābabab̄āb̄āb,
v2 ≡ ababāb̄āb̄ababāb̄ā,
v3 ≡ b̄ābabab̄āb̄āb,
v4 ≡ ababāb̄āb̄ababāb̄āb̄ab,
v5 ≡ v2−1 ≡ abab̄āb̄ābabab̄āb̄ā,
v6 ≡ v3−1 ≡ b̄ababāb̄āb̄ab.
Put wn :≡ f (vn ) for every n = 1, . . . , 6, namely
w1 :≡ X̄ b̄X̄bXbX b̄X̄ b̄X̄bXbX b̄,
w2 :≡ X̄ b̄X̄ b̄XbXbX̄ b̄X̄ b̄XbX,
w3 :≡ bX b̄X̄ b̄X̄bXbX b̄,
w4 :≡ X̄ b̄X̄ b̄XbXbX̄ b̄X̄ b̄XbXbX̄ b̄,
w5 :≡ w2−1
and w6 :≡ w3−1 .
9
It then follows that
(f (ur0 )) = (f (v1 · · · v6 )) = (w1 · · · w6 ).
Claim 1. X̄ b̄X̄bXbX b̄ =G0 z1 , where z1 ≡ a · · · b̄ is an alternating word in {a, b}
with S(z1 ) = (4, 5, 4, 5).
Proof of Claim 1. Recall that X ≡ a · · · ā and X̄ ≡ a · · · ā are alternating words in
{a, b} such that S(X) = (4, 4, 4, 5, 4, 4) and S(X̄) = (4, 4, 5, 4, 4, 4). It is not hard to
see that
S(X̄ b̄X̄bXbX b̄) = (S(X̄ b̄), S(X̄), S(bX), S(bX b̄))
= ((4, 4, 5, 4, 4, 5), (4, 4, 5, 4, 4, 4), (5, 4, 4, 5, 4, 4), (5, 4, 4, 5, 4, 5))
= (4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 5).
Letting y1 ≡ a · · · b̄ and z1 ≡ a · · · b̄ be alternating words in {a, b} such that
S(y1 ) = (4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4) and S(z1 ) = (4, 5, 4, 5), clearly
X̄ b̄X̄bXbX b̄ ≡ y1 z1 . Here, since CS(y1 ) = CS(r0 ) and so y1 =G0 1, we finally have
X̄ b̄X̄bXbX b̄ ≡ y1 z1 =G0 z1 , as required.
Claim 2. X̄ b̄X̄ b̄XbX =G0 z2 , where z2 ≡ a · · · ā is the alternating word in {a, b}
with S(z2 ) = (4, 4, 5, 4).
Proof of Claim 2. As in the proof of Claim 1, we have
S(X̄ b̄X̄ b̄XbX) = (S(X̄ b̄), S(X̄ b̄), S(X), S(bX))
= ((4, 4, 5, 4, 4, 5), (4, 4, 5, 4, 4, 5), (4, 4, 4, 5, 4, 4), (5, 4, 4, 5, 4, 4))
= (4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4).
Letting z2 ≡ a · · · ā and y2 ≡ b · · · ā be alternating words in {a, b} such that
S(z2 ) = (4, 4, 5, 4) and S(y2 ) = (4, 5, 4, 4, 5, 4, 4, 5, 4, 4, 4, 5, 4, 4, 5, 4, 4, 5, 4, 4), clearly
X̄ b̄X̄ b̄XbX ≡ z2 y2 . Here, since CS(y2 ) = CS(r0 ) and so y2 =G0 1, we finally have
X̄ b̄X̄ b̄XbX ≡ z2 y2 =G0 z2 , as required.
By Claims 1 and 2, it follows that
w1 =G0 z12 ≡: w1′ ,
w2 =G0 z2 z1−1 ≡: w2′ ,
w3 =G0 bX b̄z1 ≡: w3′ ,
w4 =G0 z2 z1−1 bX̄ b̄ ≡: w4′ ,
w5 = w2−1 =G0 (w2′ )−1 ≡: w5′ ,
w6 = w3−1 =G0 (w3′ )−1 ≡: w6′ ,
so that
(f (ur0 )) = (w1 · · · w6 ) =G0 (w1′ · · · w6′ ).
10
Moreover, we see that w1′ ≡ a · · · b̄, w2′ ≡ a · · · ā, w3′ ≡ b · · · b̄, w4′ ≡ a · · · b̄, w5′ ≡
a · · · ā and w6′ ≡ b · · · b̄ are alternating words in {a, b} such that
S(w1′ ) = (S(z1 ), S(z1 )) = (4, 5, 4, 5, 4, 5, 4, 5),
S(w2′ ) = (S(z2 ), S(z1−1 )) = (4, 4, 5, 4, 5, 4, 5, 4),
S(w3′ ) = (S(bX b̄), S(z1 )) = (5, 4, 4, 5, 4, 5, 4, 5, 4, 5),
S(w4′ ) = (S(z2 ), S(z1−1 ), S(bX̄ b̄)) = (4, 4, 5, 4, 5, 4, 5, 4, 5, 4, 5, 4, 4, 5),
S(w5′ ) = S((w2′ )−1 ) = (4, 5, 4, 5, 4, 5, 4, 4),
S(w6′ ) = S((w3′ )−1 ) = (5, 4, 5, 4, 5, 4, 5, 4, 4, 5).
This implies that
CS(w1′ · · · w6′ ) = ((S(w1′ ), . . . , S(w6′ ))).
Following Notation 3.2, we also have
T (w1′ ) = (1, 1, 1, 1),
T (w2′ ) = (2, 1, 1, 1),
T (w3′ ) = (2, 1, 1, 1),
T (w4′ ) = (2, 1, 1, 1, 1, 2),
T (w5′ ) = (1, 1, 1, 2),
T (w6′ ) = (1, 1, 1, 2),
and that
CT (w1′ · · · w6′ ) = ((T (w1′ ), . . . , T (w6′ ))).
We furthermore have
V (w1′ ) = (4),
V (w2′ ) = (3),
V (w3′ ) = (3),
V (w4′ ) = (4),
V (w5′ ) = (3),
V (w6′ ) = (3),
and
CV (w1′ · · · w6′ ) = ((V (w1′ ), . . . , V (w6′ ))) = ((4, 3, 3, 4, 3, 3)).
Since ((4, 3, 3, 4, 3, 3)) is the CS-sequence corresponding to the rational number
[3, 3], we see that
(w1′ · · · w6′ ) ≡ (u±1
r )
′′
for some rational number r with r = [3, 3]. For this rational number r, since
CS(r ′ ) = CT (r) = CT (w1′ · · · w6′ ) consists of 1 and 2, we have r ′ = [1, 4, 3]. Furthermore since CS(r) = CS(w1′ · · · w6′ ) consists of 4 and 5, we finally have r = [4, 2, 4, 3]
which equals r1 in the statement of the theorem. This completes the proof of
Lemma 3.3.
Lemma 3.4. Under the foregoing notation, (f (uri )) =G0 (u±1
ri+1 ) for every i ≥ 1.
Proof. Fix i ≥ 1. Then ri = [4, 2, m3 , . . . , mk ] with m3 ≥ 3. By Lemma 2.3(2),
CS(ri ) consists of 4 and 5 without (5, 5). Moreover, since ri′ = [1, m3 , . . . , mk ], by
Lemmas 2.3(2) and 2.5, CT (ri ) = CS(ri′ ) consists of 1 and 2, which implies that
the number of occurrences of 4’s between any two 5’s is one or two.
11
Claim. By cutting the cyclic word (uri ) in the middle of each positive or negative
subwords of length 5, we may write (uri ) as a product (vi,1 · · · vi,ki ), where each vi,j
is one of the following:
v1 ≡ b̄ababāb̄āb̄ab,
v2 ≡ v1−1 ≡ b̄ābabab̄āb̄āb,
v3 ≡ ababāb̄āb̄ababāb̄ā,
v4 ≡ v3−1 ≡ abab̄āb̄ābabab̄āb̄ā,
v5 ≡ b̄ababāb̄ā,
v6 ≡ b̄ābabab̄āb̄ā,
v7 ≡ v6−1 ≡ ababāb̄āb̄ab,
v8 ≡ v5−1 ≡ abab̄āb̄āb.
Proof of Claim. Note that for every n = 1, . . . , 8, vn is an alternating word in {a, b}
such that S(vn ) = (kn , tn h4i, ℓn ), where tn ∈ {1, 2} and kn , ℓn ∈ {1, 2, 3, 4}. Consider
the graph as in Figure 1, where the vertex set is equal to {v1 , . . . , v8 } and each
edge is endowed with one or two orientations. Observe that if vn and vm are the
initial and terminal vertices, respectively, of an oriented edge of the graph, then
the word vn vm is an alternating word such that S(vn vm ) = (kn , tn h4i, 5, tm h4i, ℓm ),
namely, the terminal subword of vn , corresponding to the last component ℓn of
S(vn ), and the initial subword of vm , corresponding to the first component km of
S(vm ), are amalgamated into a maximal positive or negative alternating subword
of vn vm , of length 5. Moreover, the weight tn (resp. tm ) is 1 or 2 according to
whether the vertex vn (resp. vm ) has valence 3 or 2. Thus, if vn1 , vn2 , . . . , vnp , where
vnj ∈ {v1 , . . . , v8 }, is a closed edge path in the graph which is compatible with
the specified edge orientations (a compatible closed edge path, in brief), namely,
if vnj and vnj+1 are the initial and terminal vertices of an oriented edge of the
graph for each j = 1, 2, . . . , p, where the indices are considered modulo p, then
the cyclically reduced word vn1 vn2 · · · vnp is a cyclically alternating word with CSsequence ((5, tn1 h4i, 5, tn2 h4i, 5, . . . , tnp h4i)).
Since the weight tnj is 1 or 2 according to whether the vertex vnj has valence 3 or 2,
we see that for any compatible closed edge path, the CT -sequence ((tn1 , tn1 , . . . , tnp ))
of the corresponding cyclically alternating word consists of only 1 and 2 and that it
has isolated 2’s. Moreover, for any such cyclic sequence, we can construct a compatible closed edge path such that the CT -sequence of the corresponding cyclically alternating word is equal to the given cyclic sequence. In particular, we can find a compatible closed edge path such that the CT -sequence of the corresponding cyclically
alternating word, (w), is equal to CT (uri ). This implies that CS(w) = CS(uri ).
12
v1
v8
v3
v6
v2
v7
v4
v5
Figure 1. Proof of Claim in the proof of Lemma 3.4
Hence (w) ≡ (u±1
ri ) as cyclic words by [9, Lemma 3.2]. This completes the proof of
Claim.
Putting
w1 :≡ bX̄ b̄X̄ b̄XbXbX̄ b̄,
w3 :≡ X̄ b̄X̄ b̄XbXbX̄ b̄X̄ b̄XbX,
w5 :≡ bX̄ b̄X̄ b̄XbX,
w6 :≡ bX b̄X̄ b̄X̄bXbX,
w2 :≡ w1−1 ,
w4 :≡ w2−1 ,
w7 :≡ w6−1
and
w8 :≡ w5−1 ,
we obviously have f (vn ) = wn for every n = 1, 2, . . . , 8, so that
(f (uri )) = (f (vi,1 · · · vi,ki )) = (wi,1 · · · wi,ki ),
where each wi,j ∈ {w1 , . . . , w8 }.
Recall from Claims 1 and 2 in the proof of Lemma 3.3 that X̄ b̄X̄bXbX b̄ =G0 z1 ,
where z1 ≡ a · · · b̄ is the alternating word in {a, b} with S(z1 ) = (4, 5, 4, 5), and
that X̄ b̄X̄ b̄XbX =G0 z2 , where z2 ≡ a · · · ā is the alternating word in {a, b} with
S(z2 ) = (4, 4, 5, 4). It follows that
w1 =G0 z1−1 bX̄ b̄ ≡: w1′ ,
w3 =G0 z2 z1−1 ≡: w3′ ,
w5 =G0 z1−1 ≡: w5′ ,
w6 =G0 bX b̄z2−1 ≡: w6′ ,
w2 = w1−1 =G0 (w1′ )−1 ≡: w2′ ,
w4 = w3−1 =G0 (w3′ )−1 ≡: w4′
w7 = w6−1 =G0 (w6′ )−1 ≡: w7′
w8 = w5−1 =G0 (w5′ )−1 ≡: w8′ .
13
Then we have
′
′
(f (uri )) =G0 (wi,1
· · · wi,k
),
i
′ ∈ {w ′ , . . . , w ′ }. Moreover
where each wi,j
1
8
w1′ ≡ b · · · b̄,
w2′ ≡ b · · · b̄,
w3′ ≡ a · · · ā,
w4′ ≡ a · · · ā,
w5′ ≡ b · · · ā,
w6′ ≡ b · · · ā,
w7′ ≡ a · · · b̄,
w8′ ≡ a · · · b̄
are alternating words in {a, b} such that
S(w1′ ) = (S(z1−1 ), S(bX̄ b̄)) = (5, 4, 5, 4, 5, 4, 5, 4, 4, 5)
S(w3′ ) = (S(z2 ), S(z1−1 )) = (4, 4, 5, 4, 5, 4, 5, 4),
S(w5′ ) = S(z1−1 ) = (5, 4, 5, 4),
S(w6′ ) = (S(bX b̄), S(z2−1 )) = (5, 4, 4, 5, 4, 5, 4, 5, 4, 4),
and S(w2′ ) = S((w1′ )−1 ) = (5, 4, 4, 5, 4, 5, 4, 5, 4, 5), S(w4′ ) = S((w3′ )−1 ) = (4, 5, 4, 5, 4, 5, 4, 4),
S(w7′ ) = S((w6′ )−1 ) = (4, 4, 5, 4, 5, 4, 5, 4, 4, 5), and S(w8′ ) = S((w5′ )−1 ) = (4, 5, 4, 5).
Observe in the graph in Figure 1 that if vn and vm are the initial and terminal
′ is an alternating word such
vertices, respectively, of an oriented edge, then wn′ wm
′
′
′
′
that S(wn wm ) = (S(wn ), S(wm )), which consists of 4 and 5, and moreover the
components 5 are isolated. This observation yields that
′
′
′
′
))),
) = ((S(wi,1
), . . . , S(wi,k
CS(wi,1
· · · wi,k
i
i
′
′
′
′
CT (wi,1
· · · wi,k
) = ((T (wi,1
), . . . , T (wi,k
))).
i
i
Here
T (w1′ ) = (1, 1, 1, 2),
T (w2′ ) = (2, 1, 1, 1),
T (w3′ ) = (2, 1, 1, 1),
T (w4′ ) = (1, 1, 1, 2),
T (w5′ ) = (1, 1),
T (w6′ ) = (2, 1, 1, 2),
T (w7′ ) = (2, 1, 1, 2),
T (w8′ ) = (1, 1).
This also yields that
′
′
′
′
CV (wi,1
· · · wi,k
) = ((V (wi,1
), . . . , V (wi,k
))),
i
i
where V (wn′ ) = (3) if n = 1, 2, 3, 4, and V (wn′ ) = (2) otherwise.
Define N (vn ) to be the number of positive or negative proper subwords of vn of
length 4 for each n = 1, . . . , 8. Here, by a proper subword of vn , we mean a subword
which lies in the interior of vn . Then we see that V (wn′ ) = (N (vn ) + 1) for each
n = 1, . . . , 8. Since (vi,1 · · · vi,ki ) is a product being cut in the middle of each positive
or negative subwords of length 5, we also see that
((N (vi,1 ), . . . , N (vi,ki ))) = CT (ri ) = CS(ri′ )
14
′ ) = (N (v ) + 1) for each j = 1, . . . , k ,
with ri′ = [1, m3 , . . . , mk ]. Since V (wi,j
i,j
i
′ · · · w ′ ) = ((N (v )+1, . . . , N (v
CV (wi,1
i,1
i,ki )+1)) is the CS-sequence corresponding
i,ki
to the rational number [2, m3 , . . . , mk ]. Hence
′
′
) ≡ (u±1
(f (uri )) =G0 (wi,1
· · · wi,k
r )
i
for some rational number r with r ′′ = [2, m3 , . . . , mk ]. For this rational number
′ · · · w ′ ) consists of 1 and 2, we have r ′ =
r, since CS(r ′ ) = CT (r) = CT (wi,1
i,ki
′ · · · w ′ ) consists of 4 and
[1, 3, m3 , . . . , mk ]. Furthermore, since CS(r) = CS(wi,1
i,ki
5, we finally have r = [4, 2, 3, m3 , . . . , mk ] which equals ri+1 in the statement of the
theorem. This completes the proof of Lemma 3.4.
Since G = ha, b | ur0 = ur1 = ur2 = · · · = 1i, Lemmas 3.1–3.4 imply that f
descends to an epimorphism fˆ : G → G. Now we show that fˆ is not an isomorphism.
Let s = [3, 3, 4]. Then
CS(us ) = CS(s) = ((3, 3, 3, 4, 3, 3, 4, 3, 3, 4, 3, 3, 4, 3, 3, 3, 4, 3, 3, 4, 3, 3, 4, 3, 3, 4)),
so that
(us ) ≡ (abab̄āb̄abab̄āb̄ābabāb̄ābabab̄āb̄abab̄āb̄ābabāb̄ābaba
b̄āb̄abab̄āb̄ababāb̄ābabāb̄āb̄abab̄āb̄ababāb̄ābabāb̄āb̄).
As in the proof of Lemma 3.1, letting w ≡ a · · · ā be an alternating word in {a, b}
such that S(w) = (3, 3, 3, 4, 3, 3), we have
(us ) ≡ (wbwbabab̄āb̄w−1 b̄w−1 b̄).
Lemma 3.5. We have fˆ(us ) = 1.
Proof. Clearly
(f (us )) = (f (w)b̄f (w)b̄X̄ b̄X̄bXbf (w−1 )bf (w−1 )b).
Here, since fˆ(w) = ā from the proof of Lemma 3.1, we have
(f (us )) =G (āb̄āb̄X̄ b̄X̄bXbabab),
where (āb̄āb̄X̄ b̄X̄bXbabab) is a cyclically alternating word in {a, b} such that
CS(āb̄āb̄X̄ b̄X̄bXbabab) = ((S(āb̄āb̄), S(X̄ b̄), S(X̄), S(bX), S(babab))),
= ((4, (4, 4, 5, 4, 4, 5), (4, 4, 5, 4, 4, 4), (5, 4, 4, 5, 4, 4), 5))
which equals CS(r0 ). This implies that (f (us )) =G (āb̄āb̄X̄ b̄X̄bXbabab) =G 1,
namely fˆ(us ) = 1, as required.
Lemma 3.6. Under the foregoing notation, let R be the symmetrized subset of
F (a, b) generated by the set of relators {uri | i ≥ 0} of the upper presentation G =
ha, b | ur0 = ur1 = ur2 = · · · = 1i. Then R satisfies C(4) and T (4).
15
Proof. Since every element in R is cyclically alternating, R clearly satisfies T (4).
To show that R satisfies C(4), we begin by setting some notation. Recall from
Lemma 2.6 that for every rational number r with 0 < r ≤ 1, CS(r) has a decomposition ((S1 , S2 , S1 , S2 )) depending on r. For clarity, we write ((S1 (r), S2 (r), S1 (r), S2 (r)))
for this decomposition. On the other hand, if r is a rational number with r =
[m1 , . . . , mk ] with k ≥ 2 and (m2 , . . . , mk ) ∈ (Z≥2 )k−1 , then the symbol r (n) denotes
the rational number with continued fraction expansion [mn+1 − 1, mn+2 , . . . , mk ] for
each n = 1, . . . , k − 1.
Claim 1. For any two integers i, j ≥ 0 with i 6= j, the cyclic word (urj ) does not
contain a subword corresponding to (S1 (ri )) or (ℓ1 , S2 (ri ), ℓ2 ) with ℓ1 , ℓ2 ∈ Z+ .
Proof of Claim 1. Suppose on the contrary that there are some i 6= j such that the
cyclic word (urj ) contains a subword corresponding to S1 (ri ) or (ℓ1 , S2 (ri ), ℓ2 ). We
first show that this assumption implies that CS(rj ) contains S1 (ri ) or S2 (ri ) as
a subsequence. If (urj ) contains a subword corresponding to (ℓ1 , S2 (ri ), ℓ2 ), then
clearly CS(rj ) contains S2 (ri ) as a subsequence. So assume that (urj ) contains a
subword corresponding to S1 (ri ). Then CS(rj ) contains (d1 + s1 , s2 , . . . , st−1 , st +
d2 ) as a subsequence, where S1 (ri ) = (s1 , s2 , . . . , st ). Since the continued fraction
expansions of both ri and rj begin with 4, we see that S1 (ri ) begins and ends with 5
by Lemma 2.6(3) and that CS(rj ) also consists of 4 and 5 by Lemma 2.3(2). Hence,
we must have d1 = d2 = 0 and therefore CS(rj ) contains S1 (ri ) as a subsequence.
Thus we have proved that CS(rj ) contains S1 (ri ) or S2 (ri ) as a subsequence.
Note that the lengths of the continued fraction expansions of ri and rj are i+3 and
(n)
j + 3, respectively. Hence we can apply Lemma 2.8 successively to see that CS(rj )
(n)
(n)
contains S1 (ri ) or S2 (ri ) as a subsequence for every n = 1, . . . , min{i + 1, j + 1}.
Since i 6= j, there are two cases.
Case 1. j > i ≥ 0. Recall that ri is equal to [4, 3, 3] or ri = [4, 2, (i − 1)h3i, 4, 3]
(i+1)
according to whether i = 0 or i ≥ 1. So we have ri
= [m, 3]. Here, m = 2 if
(i+1)
i = 0, and m = 3 otherwise. Since j > i, we can observe that rj
has a continued
fraction expansion of the form [m − 1, n1 , . . . , nk ], where k ≥ 2 and each nt is 3 or 4.
(i+1)
(i+1)
) consists of m−1 and m, the cyclic sequence
) = (m+1) and CS(rj
Since S1 (ri
(i+1)
CS(rj
(i+1)
) cannot contain S1 (ri
must contain
(i+1)
S2 (ri
)
(i+1)
) = (m + 1) as a subsequence. Hence CS(rj
as a subsequence. But since
n1 ≥ 3, (m, m) does not occur in
(i+1)
CS(rj
)
(m, m) by Lemma 2.7(1), this implies that
contradiction.
(i+1)
rj
= [m − 1, n1 , . . . , nk ] with
(i+1)
by Lemma 2.3(2). Since S2 (ri
(i+1)
S2 (ri
)
cannot occur in
(j+1)
Case 2. i > j ≥ 0. As in Case 1, we can observe that rj
if j = 0, and m = 3 otherwise, and that
(j+1)
ri
16
)
)=
(i+1)
CS(rj
),
a
= [m, 3], where m = 2
has a continued fraction expansion of
(j+1)
the form [m − 1, n1 , . . . , nk ], where k ≥ 2 and each nt is 3 or 4. Then both S1 (ri
)
(j+1)
(j+1)
and S2 (ri
) contain a term m−1 by Lemma 2.7(2). But since CS(rj
) consists
of only m and m + 1, this is impossible.
By Claim 1, we see that the assertion in Lemma 2.11 holds even if (u±1
r ) is
)
for
any
i
≥
0
and
the
symmetrized
subset
R
in
the
lemma
is
replaced by (u±1
ri
enlarged to be the set in the current setting, namely, R is the symmetrized subset
of F (a, b) generated by the set of relators {uri | i ≥ 0} of the group presentation
G = ha, b | ur0 = ur1 = ur2 = · · · = 1i. To be precise, the following hold.
Claim 2. For each i ≥ 0, a subword w of the cyclic word (u±1
ri ) is a piece with
respect to the symmetrized subset R in Lemma 3.6 if and only if S(w) contains
neither S1 (ri ) nor (ℓ1 , S2 (ri ), ℓ2 ) with ℓ1 , ℓ2 ∈ Z+ as a subsequence.
By using Claim 2, we can see, as in [9, Proof of Corollary 5.4], that each cyclic
word (u±1
ri ) is not a product of less than 4 pieces with respect to R. Hence R satisfies
C(4).
Lemma 3.7. Under the foregoing notation, us 6=G 1.
Proof. Suppose on the contrary that us =G 1. Then there is a reduced van Kampen
diagram ∆ over G = ha, b | ur0 = ur1 = ur2 = · · · = 1i such that (φ(∂∆)) ≡ (us ) (see
[11]). Since ∆ is a [4, 4]-map by Lemma 3.6, (φ(∂∆)) contains a subword of some
(u±1
ri ) which is a product of 3 pieces with respect to the symmetrized subset R in
Lemma 3.6 (see [9, Section 6]). This implies that CS(φ(∂∆)) must contain a term
5, which is a contradiction to the fact CS(φ(∂∆)) = CS(us ) = CS(s) consists of
only 3 and 4.
Lemma 3.7 together with Lemma 3.5 shows that fˆ is an epimorphism of G,
but not an isomorphism of G. Consequently, G is non-Hopfian, and the proof of
Theorem 1.1 is now completed.
References
[1] G. Baumslag and D. Solitar, Some two-generator one-relator non-Hopfian groups, Bull. Amer.
Math. Soc. 68 (1962), 199–201.
[2] R. Coulon and V. Guirardel, Automorphisms and endomorphisms of lacunary hyperbolic groups,
arXiv:1606.00679.
[3] B. H. Bowditch, Relatively hyperbolic groups, Int. J. Algebra Comput. 22 (2012), 1250016, 66pp.
[4] B. Farb, Relatively hyperbolic groups, Geom. Funct. Anal. 8 (1998), 810–840.
[5] M. Gromov, Hyperbolic groups, Essays in Group Theory (G. M. Gersten, ed.), MSRI Publ. 8,
Springer, 1987, 75–263.
[6] D. Groves, Limit groups for relatively hyperbolic groups, II: Makanin-Razborov diagrams, Geom.
Topol. 9 (2005), 2319–2358.
[7] G. Higman, A finitely related group with an isomorphic proper factor group, J. London Math.
Soc. 26 (1951), 59–61.
17
[8] S. V. Ivanov and A. M. Storozhev, Non-Hopfian relatively free groups, Geom. Dedicata 114
(2005), 209–228.
[9] D. Lee and M. Sakuma, Epimorphisms between 2-bridge link groups: homotopically trivial simple
loops on 2-bridge spheres, Proc. London Math. Soc. 104 (2012), 359–386.
[10] D. Lee and M. Sakuma, Homotopically equivalent simple loops on 2-bridge spheres in 2-bridge
link complements (I), Geom. Dedicata 171 (2014), 1–28.
[11] R. C. Lyndon and P. E. Schupp, Combinatorial group theory, Springer-Verlag, Berlin, 1977.
[12] A. I. Mal’cev, On the faithful representation of infinite groups by matrices, Mat. Sb. 8(50)
(1940), 405–422.
[13] B. H. Neumann, A two-generator group isomorphic to a proper factor group, J. London Math.
Soc. 25 (1950), 247–248.
[14] D. Osin, Peripheral fillings of relatively hyperbolic groups, Invent. Math. 167 (2007), no. 2,
295–326.
[15] D. Osin, Relatively hyperbolic groups: Intrinsic geometry, algebraic properties, and algorithmic
problems, Memoirs Amer. Math. Soc. 179 (2006), no. 843, vi+100 pp.
[16] C. Reinfeldt, Limit groups and Makanin-Razborov diagrams for hyperbolic groups, PhD thesis,
Heriot-Watt University, 2010.
[17] C. Reinfeldt and R. Weidmann, Makanin-Razborov diagrams for hyperbolic groups, Preprint,
2010, updated 2014.
[18] M. Sapir and D. T. Wise, Ascending HNN extensions of residually finite groups can be nonHopfian and can have very few finite quotients, J. Pure Appl. Algebra 166 (2002), 191–202.
[19] Z. Sela, Endomorphisms of hyperbolic groups. I, The Hopf property, Topology 38 (1999), 301–
321.
[20] R. Strebel, Appendix. Small cancellation groups, in “Sur les groupes hyperboliques d’après
Mikhael Gromov”, Papers from the Swiss Seminar on Hyperbolic Groups held in Bern, 1988,
E. Ghys and P. de la Harpe (editors), Progr. Math., vol. 83, Birkhäuser Boston Inc., Boston,
MA, 1990.
[21] D. T. Wise, A non-Hopfian automatic group, J. Algebra 180 (1996), 845–847.
[22] D. T. Wise, Research announcement: the structure of groups with a quasiconvex hierarchy,
Electron. Res. Announc. Math. Sci. 16 (2009), 44–55.
Department of Mathematics, Pusan National University, San-30 Jangjeon-Dong,
Geumjung-Gu, Pusan, 609-735, Korea
E-mail address: [email protected]
Department of Mathematics, Graduate School of Science, Hiroshima University,
Higashi-Hiroshima, 739-8526, Japan
E-mail address: [email protected]
18
| 4math.GR
|
1
Energy-Efficient Transponder Configuration for
FMF-based Elastic Optical Networks
arXiv:1705.10198v1 [cs.IT] 26 May 2017
Mohammad Hadi, Member, IEEE, and Mohammad Reza Pakravan, Member, IEEE
Abstract—We propose an energy-efficient procedure for
transponder configuration in FMF-based elastic optical networks
in which quality of service and physical constraints are guaranteed and joint optimization of transmit optical power, temporal,
spatial and spectral variables are addressed. We use geometric
convexification techniques to provide convex representations for
quality of service, transponder power consumption and transponder configuration problem. Simulation results show that our
convex formulation is considerably faster than its mixed-integer
nonlinear counterpart and its ability to optimize transmit optical
power reduces total transponder power consumption up to 32%.
We also analyze the effect of mode coupling and number of
available modes on power consumption of different network
elements.
Keywords—Convex optimization, Green communication, Elastic
optical networks, Few-mode fibers, Mode coupling.
I. I NTRODUCTION
D temporally, spectrally and spatially Elastic Optical Network (EON) has been widely acknowledged as the next
generation high capacity transport system and the optical
society has focused on its architecture and network resource allocation techniques [1]. EONs can provide an energy-efficient
network configuration by adaptive 3D resource allocation
according to the communication demands and physical conditions. Higher energy efficiency of Orthogonal Frequency
Division Multiplex (OFDM) signaling has been reported in [2]
which nominates OFDM as the main technology for resource
provisioning over 2D resources of time and spectrum. On the
other hand, enabling technologies such as Few-Mode Fibers
(FMFs) and Multi-Core Fibers (MCFs) have been used to
increase network capacity and efficiency through resource allocation over spatial dimension [1], [3]. Although many variants
of algorithms have been proposed for resource allocation in
1D/2D EONs [4], joint assignment of temporal, spectral and
spatial resources in 3D EONs needs much research and study.
Among the available works on 3D EONs, a few of them
have focused on energy-efficiency which is a fundamental
requirement of the future optical networks [5]–[7]. Moreover,
the available energy-efficient 3D approaches do not consider
transmit optical power as an optimization variable which
results in inefficient network provisioning [8].
Flexible resource allocation is an NP-hard problem and it
is usually decomposed into several sub-problems with lower
complexity [9]. Following this approach, we decompose the
resource allocation problem into 1) Routing and Ordering
Sub-problem (ROS) and 2) Transponder Configuration Subproblem (TCS) and mainly focus on TCS which is more complex and time-consuming [10], [11]. We consider FMF because
3
it has simple amplifier structure, easier fusion process, lower
nonlinear effects and lower manufacturing cost compared to
other Space-Division Multiplexed (SDM) optical fibers [3],
[12]. In TCS, we optimally configure transponder parameters
such as modulation level, number of sub-carriers, coding rate,
transmit optical power, number of active modes and central
frequency such that total transponders power consumption is
minimized while Quality of Service (QoS) and physical constraints are met. Unlike the conventional approach, we provide
convex expressions for transponder power consumption and
Optical Signal to Noise Ratio (OSNR), as an indicator of
QoS. We then use the results to formulate TCS as a convex
optimization problem which can efficiently be solved using fast
convex optimization algorithms. We consider transmit optical
power as an optimization variable and show that it has an
important impact on total transponder power consumption.
Simulation results show that our convex formulation can be
solved almost 20 times faster than its Mixed-Integer NonLinear
Program (MINLP) counterpart. Optimizing transmit optical
power also improves total transponder power consumption
by a factor of 32% for European Cost239 optical network
with aggregate traffic 60 Tbps. We analyze the effect of
mode coupling on power consumption of the different network
elements. As simulation results show, total network power
consumption can be reduced more than 50% using stronglycoupled FMFs rather than weakly-coupled ones. Numerical
outcomes also demonstrate that increasing the number of
available modes in FMFs provides a trade-off between FFT
and DSP power consumption such that the overall transponder
power consumption is a descending function of the number of
available modes.
II. S YSTEM M ODEL
Consider a coherent optical communication network characterized by topology graph G(V, L) where V and L are the
sets of optical nodes and directional optical strongly-coupled
FMF links, respectively. The optical FMFs have M modes
and gridless bandwidth B. Q is the set of connection requests
and Ql shows the set of requests sharing FMF l on their
routes. Each request q is assigned a contiguous bandwidth
∆q around carrier frequency ωq and modulates mq modes of
its available M modes. The assigned contiguous bandwidth
includes 2bq OFDM sub-carriers with sub-carrier space of
F so, ∆q = 2bq F. To have a feasible MIMO processing,
the remaining unused modes of a request cannot be shared
among others [12]. We assume that the assigned bandwidths
are continuous over their routes to remove the high cost of
spectrum/mode conversion [13]. Request q passes Nq fiber
spans along its path and has Nq,i shared spans with request
i 6= q. Each FMF span has fixed length of Lspn and an
Mode DEMUX
MIMO
PD
ADC
S/P
FFT
+
EQ
SM
P/S
DEC
PD
ADC
S/P
FFT
+
EQ
SM
P/S
DEC
PD
ADC
S/P
FFT
+
EQ
SM
P/S
DEC
Mode MUX
LO
Optical Mixer
LO
Optical Mixer
2
LD
DAC
P/S
IFFT
SM
S/P
ENC
LD
DAC
P/S
IFFT
SM
S/P
ENC
LD
DAC
P/S
IFFT
SM
S/P
ENC
Fig. 1: Block diagram of a pair of OFDM-based transmit and receive transponders with
3 available modes.
optical amplifier to compensate for its attenuation. There are
pre-defined modulation levels c and coding rates r where
each pair of (c, r) requires minimum OSNR Θ(c, r) to get
a pre-FEC BER value of 1 × 10−4 [10]. Each transponder
is given modulation level cq , coding rate rq and injects
optical power pq /mq to each active mode of each polarization.
Chromatic dispersion and mode coupling signal broadenings
p
are respectively proportional to Nq 2bq and m−0.78
q
p Nq with
coefficients σ = 2π|β2 | FLspn and % = 5∆β1 L
√sec Lspn
where β2 is chromatic dispersion factor and ∆β1 Lsec is
the product of rms uncoupled group delay spread and section
length [14]. Transponders add a sufficient cyclic prefix to each
OFMD symbol to resolve the signal broadening induced by
mode coupling and chromatic dispersion. Transponders have
maximum information bit rate C. There is also a guard band
G between any two adjacent requests on a link. Considering
the architecture of Fig. 1, the power consumption of each pair
of transmit and receive transponders Pq can be calculated as
follows:
Pq = Ptrb + 2Pedc mq rq−1 + 2mq 2bq bq Pf f t + 2m2q 2bq Pdsp
(1)
where Ptrb is transmit and receive transponder bias term,
Pedc is the scaling coefficient of encoder and decoder power
consumptions, Pf f t denotes the power consumption for a
two point FFT operation and Pdsp is the power consumption
scaling coefficient of the receiver DSP and MIMO operations
[2], [12].
To have a green EON, we need a resource allocation
algorithm to determine the values of system model variables
such that the transponders consume the minimum power while
physical constrains are satisfied and desired levels of OSNR are
guaranteed. In general, such a problem is modeled as an NPhard MINLP optimization problem [10]. To simplify the problem and provide a fast-achievable near-optimum solution, the
resource allocation problem is usually decomposed into two
sub-problems: ROS, where the routing and ordering of requests
on each link are defined, and 2) TCS, where transponders
are configured. Usually the search for a near optimal solution
involves iterations between these two sub-problems. To save
this iteration time, it is of great interest to hold the running
time of each sub-problem at its minimum value. In this work,
we mainly focus on TCS which is the most time-consuming
sub-problem and formulate it as a convex problem to benefit
from fast convex optimization algorithms. For a complete study
of ROS, one can refer to [8], [11].
III.
T RANSPONDER C ONFIGUARTION P ROBLEM
A MINLP formulation for TCS is as follows:
min
c,b,r,p,m,ω
X
Pq
(2)
q∈Q
s.t. Ψq > Θq , ∀q ∈ Q
∆Υl,j + ∆Υl,j+1
|Q |
+ G 6 ωΥl,j+1 , ∀l ∈ L, ∀j ∈ M1 l
ωΥl,j +
2
∆q
∆q
6 ωq 6 B −
, ∀q ∈ Q
2
2
−1
2F mq rq cq ∆q
p , ∀q ∈ Q
Rq 6
F −1 + σNq 2bq + %m−0.78
Nq
q
(3)
(4)
(5)
(6)
where c, b, r, p, m and ω are variable vectors of transponder
configuration parameters i.e. modulation level, number of subcarriers, coding rate, transmit optical power, number of active
modes and central frequency. Mba shows the set of integer
numbers {a, a+1, · · · , b−1}. The goal is to minimize the total
transponder power consumption where Pq is obtained using
(1). Constraint (3) is the QoS constraint that forces OSNR Ψq
to be greater than its required minimum threshold Θq . Ψq is a
nonlinear function of b, p, m and ω while the value of Θq is
related to rq and cq [7], [11]. Constraint (4) is nonoverlappingguard constraint that prevents two requests from sharing the
same frequency spectrum. Υl,j is a function that shows which
request occupies j-th assigned spectrum bandwidth on link
l and its values are determined by solving ROS [7], [11].
Constraint (5) holds all assigned central frequencies within
the acceptable range of the fiber spectrum. The last constraint
guarantees that the transponder can convey the input traffic
rate Rq in which wasted cyclic prefix times are considered.
Generally, this problem is a complex MINLP which is
NP-hard and cannot easily be solved in a reasonable time.
Therefore, we use geometric convexification techniques to
convert this MINLP to a mixed-integer convex optimization
problem and then use relaxation method to solve it. To have
a convex problem, we first provide a generalized posynomial
expression [15] for the optimization and then define a variable
change to convexify the problem. A posynomial expression for
OSNR of a request in 2D EONs has been proposed in [11]. We
simply consider each active mode as an independent source of
nonlinearity and incoherently add all the interferences [10].
Therefore the extended version of the posynomial OSNR
expression is:
Ψq =
p
ζNq ∆q + κ1 ς mqq
pq /mq
P
, ∀q ∈ Q (7)
pi 2
) Nq,i /∆i /dq,i
mi ( m
i
i∈Q,q6=i
2
3γ
.
where κ1 = 0.4343, ζ = (eαLspn − 1)hνnsp and ς = 2απ|β
2|
nsp is the spontaneous emission factor, ν is the light frequency,
h is Planck’s constant, α is attenuation coefficient, β2 is
dispersion factor and γ is nonlinear constant. Furthermore,
dq,i is the distance between carrier frequencies ωq and ωi and
equals to dq,i = ωq − ωi . We use Θq ≈ rqκ2 (1 + κ3 cq )κ4
for posynomial curve fitting of OSNR threshold values where
κ2 = 3.37, κ3 = 0.21, κ4 = 5.73 [8]. Following the same
approach as [11], we arrive at this new representation of the
3
optimization problem:
X
min
c,b,r,p,m,ω,t,d
Pq + K
X
d−1
q,i
(8)
q,i∈Q
q6=i,Nq,i 6=0
q∈Q
h
bq
s.t. rqκ2 tκq 4 ζF Nq mq p−1
+ κ1 ςF −1
q 2
X
−bi
Nq,i p2i m−1
i 2
i∈Q,i6=q
i
d−1
q,i 6 1, ∀q ∈ Q
ωΥl,j + 0.5F2
bΥ
l,j
(9)
bΥ
+ G + 0.5F2
l,j+1
6 ωΥl,j+1 , ∀l ∈ L
|Q |
∈ M1 l
bq
, ∀j
0.5F2
(10)
+ ωq 6 B, ∀q ∈ Q
(11)
0.5F2bq 6 ωq , ∀q ∈ Q
(12)
−1 −bq
−1 −1
0.5Rq F −1 rq−1 c−1
+ 0.5σNq Rq m−1
q mq 2
q rq c q
p
−1 −1 −1.78 −bq
+ 0.5% Nq Rq rq cq mq
2
6 1, ∀q ∈ Q
(13)
(14)
1 + κ3 cq 6 tq , ∀q ∈ Q
|Ql |
dΥl,i ,Υl,j + ωΥl,j 6 ωΥl,i , ∀l ∈ L, ∀j ∈ M1
dΥl,i ,Υl,j + ωΥl,i 6 ωΥl,j , ∀l ∈ L, ∀j ∈
|Q |+1
(15)
Mj1
(16)
l
, ∀i ∈ Mj+1
|Q |+1
M2 l , ∀i
∈
Ignoring constraints (14), (15), (16) and the penalty term of
the goal function (8), the above formulation is equivalent geometric program of the previous MINLP in which expressions
(7) and the mentioned posynomial curve fitting have been
used for QoS constraint (9). Constraints (14) and (15) and
the penalty term are added to guarantee the implicit equality
of dq,i = ωq − ωi [11]. Constraint (14) is also needed to
convert the generalized posynomial QoS constraint to a valid
geometric expression, as explained in [15]. Now, consider the
following variable change:
/b
x = eX : x ∈ R>0 −→ X ∈ R, ∀x ∈
(17)
Applying this variable change to the goal function (which is
the most difficult part of the variable change), we have:
X
[Ptrb + 2Pedc emq −rq + 5.36e0.82bq +mq Pf f t + 2e2mq 2bq Pdsp ]
q∈Q
+K
X
e−dq,i
(18)
q,i∈Q,q6=i,Nq,i 6=0
Clearly, e−dq,i , emq −rq and e2mq 2bq are convex over variable
domain. We use expression 5.36e0.82bq +mq to provide a convex
approximation for the remaining term 2emq bq 2bq . The approximation relative error is less than 3% for practical values of
mq > 1 and 4 6 bq 6 11. Consequently, function (18) which
is a nonnegative weighted sum of convex functions is also convex. The same statement (without any approximation) can be
applied to show the convexity of the constraints under variable
change of (17) (for some constraints, we need to apply an extra
log to both sides of the inequality). To solve this problem,
a relaxed continuous version of the proposed mixed-integer
convex formulation is iteratively optimized in a loop [15]. At
each epoch, the continuous convex optimization is solved and
obtained values for relaxed integer variables are rounded by a
given precision. Then, we fix the acceptable rounded variables
and solve the relaxed continuous convex problem again. The
loop continues untill all the integer variables have valid values.
The number of iterations is at most equal to (in practice, is
usually less than) the number of integer variables. Furthermore,
a simpler problem should be solved as the number of iteration
increases because some of the integer variables are fixed during
each loop.
IV. N UMERICAL R ESULTS
In this section, we use simulation results to demonstrate the
performance of the convex formulation for TCS. The European
Cost239 optical network is considered with the topology and
traffic matrix given in [2]. Simulation constant parameters are
|β2 | = 20393 fs2 /m , α = 0.22 dB/km, Lspn = 80 km,
ν = 193.55 THz, nsp = 1.58, γ = 1.3 1/W/km, F = 80
MHz, % = 113 ps, σ = 14 fs, G = 20 GHz, B = 2 THz,
Ptrb = 36 W, Pedc = 3.2 W, Pf f t = 4 mW, Pdsp = 3
mW [2], [14]. We use MATLAB, YALMIP and CVX software
packages for programming, modeling and optimization. The
total power consumption of different network elements in
terms of aggregate traffic with and without adaptive transmit
optical power assignment has been reported in Fig. 2. We
have used the proposed approach of [16] for fixed assignment
of transmit optical power. Clearly, for all the elements, the
total power consumption is approximately a linear function
of aggregate traffic but the slope of the lines are lower
when transmit optical powers are adaptively assigned. As an
example, adaptive transmit optical power assignment improves
total transponder power consumption by a factor of 32%
for aggregate traffic of 60 Tbps. Fig. 3 shows total power
consumption of different network elements versus number of
available modes M in FMFs. The power consumption values
are normalized to their corresponding values for the scenario
with single mode fibers i.e. M = 1. As M increases, the
amount of transponder power consumption decreases but there
is no considerable gain for M > 5. Moreover, there is a
tradeoff between DSP and FFT power consumption such that
the overall transponder power consumption is a decreasing
function of the number of available modes. Fig. 4 shows power
consumption of different network elements in terms of aggregate traffic for strongly- and weakly-coupled FMFs. Obviously,
total transponder power consumption is considerably reduced
for strongly-coupled FMFs (in which group delay spread is
proportional to square root of path lengths) in comparison
to weakly-coupled FMFs (in which group delay spread is
proportional to path lengths). This is the same as the results
published in [12]. As an example, improvement can be more
than 50% for aggregate traffic of 60 Tbps. Numerical outcomes
also show that our convex formulation can be more than 20
times faster than its mixed-integer nonlinear counterpart which
is compatible with the results reported in [8].
V. C ONCLUSION
Energy-efficient resource allocation and quality of service
provisioning is the fundamental problem of green 3D FMFbased elastic optical networks. In this paper, we decompose
the resource allocation problem into two sub-problems for
routing and traffic ordering, and transponder configuration.
We mainly focus on transponder configuration sub-problem
and provide a convex formulation in which joint optimization
4
50
Total
Total
Total
Total
Total
Total
Total
Total
45
40
35
of temporal, spectral and spatial resources along with optical
transmit power are considered. Simulation results show that
our formulation is considerably faster than its mixed-integer
nonlinear counterpart and its ability to optimize transmit optical power can improve total transponder power consumption
up to 32%. We demonstrate that there is a tradeoff between
DSP and FFT power consumptions as the number of modes in
FMFs increases but the overall transponder power consumption
is a descending function of the number of available modes.
We also calculate the power consumption of different network
elements and show that strongly-coupled FMFs reduce the
power consumption of these elements.
Encoder+Decoder Power Consumption (Fixed Transmit Power)
FFT+IFFT Power Consumption (Fixed Transmit Power)
DSP Power Consumption (Fixed Transmit Power)
Transmit+Receive Transponder Power Consumption (Fixed Transmit Power)
Encoder+Decoder Power Consumption (Adaptive Transmit Power)
FFT+IFFT Power Consumption (Adaptive Transmit Power)
DSP Power Consumption (Adaptive Transmit Power)
Transmit+Receive Transponder Power Consumption (Adaptive Transmit Power)
kW
30
25
20
15
10
5
R EFERENCES
0
10
15
20
25
30
35
40
45
[1]
50
Aggregate Tra/c (Tbps)
Fig. 2: Total power consumption of different network elements in terms of aggregate
traffic with and without adaptive transmit optical power assignment.
[2]
1.8
[3]
1.7
1.6
[4]
1.5
1.4
[5]
1.3
[6]
1.2
Normalized
Normalized
Normalized
Normalized
1.1
1
Total
Total
Total
Total
Transmit+Receive Transponder Power Consumption
IFFT+FFT Power Consumption
Encoder+Decoder Power Consumption
DSP Power Consumption
[7]
0.9
[8]
0.8
1
2
3
4
5
6
Number of Available Modes in FMFs
Fig. 3: Normalized total power consumption of different network elements in terms of
the number of available modes in FMFs.
[9]
30
25
20
Total
Total
Total
Total
Total
Total
Total
Total
Encoder+Decoder Power Consumption (Strongly-Coupled FMF)
FFT+IFFT Power Consumption (Strongly-Coupled FMF)
DSP Power Consumption (Strongly-Coupled FMF)
Transmit+Receive Transponder Power Consumption (Strongly-Coupled FMF)
Encoder+Decoder Power Consumption (Weakly-Coupled FMF)
FFT+IFFT Power Consumption (Weakly-Coupled FMF)
DSP Power Consumption (Weakly-Coupled FMF)
Transmit+Receive Transponder Power Consumption (Weakly-Coupled FMF)
[10]
[11]
kW
[12]
15
[13]
10
[14]
5
[15]
0
10
15
20
25
30
35
40
45
50
Aggregate Tra/c (Tbps)
Fig. 4: Total power consumption of different network elements in terms of aggregate
traffic for strongly- and weakly-coupled FMFs.
[16]
R. Proietti, et al., “3d elastic optical networking in the temporal, spectral, and spatial domains,” IEEE Communications Magazine, vol. 53,
no. 2, pp. 79–87, 2015.
H. Khodakarami, et al., “Flexible optical networks: An energy efficiency
perspective,” Journal of Lightwave Technology, vol. 32, no. 21, pp.
3356–3367, 2014.
G. M. Saridis, et al., “Survey and evaluation of space division multiplexing: From technologies to optical networks,” IEEE Communications
Surveys & Tutorials, vol. 17, no. 4, pp. 2136–2156, 2015.
B. C. Chatterjee, N. Sarma, and E. Oki, “Routing and spectrum
allocation in elastic optical networks: A tutorial,” IEEE Communications
Surveys & Tutorials, vol. 17, no. 3, pp. 1776–1800, 2015.
A. Muhammad, et al., “Resource allocation for space-division multiplexing: optical white box versus optical black box networking,” Journal
of Lightwave Technology, vol. 33, no. 23, pp. 4928–4941, 2015.
P. J. Winzer, “Energy-efficient optical transport capacity scaling through
spatial multiplexing,” IEEE Photonics Technology Letters, vol. 23,
no. 13, pp. 851–853, 2011.
L. Yan, et al., “Joint assignment of power, routing, and spectrum in
static flexible-grid networks,” Journal of Lightwave Technology, no. 99,
2017.
M. Hadi and M. R. Pakravan, “Energy-efficient resource allocation
for elastic optical networks using convex optimization,” arXiv preprint
arXiv:1705.06891, 2017.
H. Khodakarami, B. S. G. Pillai, and W. Shieh, “Quality of service
provisioning and energy minimized scheduling in software defined
flexible optical networks,” Journal of Optical Communications and
Networking, vol. 8, no. 2, pp. 118–128, 2016.
L. Yan, et al., “Resource allocation for flexible-grid optical networks
with nonlinear channel model,” Journal of Optical Communications and
Networking, vol. 7, no. 11, pp. B101–B108, 2015.
M. Hadi and M. R. Pakravan, “Resource allocation for elastic optical networks using geometric optimization,” arXiv preprint
arXiv:1705.01191, 2017.
K. Ho and J. M. Kahn, “Mode coupling and its impact on spatially
multiplexed systems,” Optical Fiber Telecommunications VI, vol. 17,
pp. 1386–1392, 2013.
M. Hadi and M. R. Pakravan, “Spectrum-convertible bvwxc placement
in ofdm-based elastic optical networks,” IEEE Photonics Journal,
no. 99, pp. 1–7, 2017.
S. Ö. Arık, D. Askarov, and J. M. Kahn, “Adaptive frequency-domain
equalization in mode-division multiplexing systems,” Journal of Lightwave Technology, vol. 32, no. 10, pp. 1841–1852, 2014.
S. Boyd, et al., “A tutorial on geometric programming,” Optimization
and engineering, vol. 8, no. 1, p. 67, 2007.
G. Gao, et al., “Analytical expressions for nonlinear transmission
performance of coherent optical ofdm systems with frequency guard
band,” Journal of Lightwave Technology, vol. 30, no. 15, pp. 2447–
2454, 2012.
| 7cs.IT
|
arXiv:1407.4546v7 [math.ST] 28 Sep 2016
The Annals of Statistics
2016, Vol. 44, No. 5, 1931–1956
DOI: 10.1214/15-AOS1375
c Institute of Mathematical Statistics, 2016
CRAMÉR-TYPE MODERATE DEVIATIONS FOR STUDENTIZED
TWO-SAMPLE U -STATISTICS WITH APPLICATIONS
By Jinyuan Chang1,∗,† , Qi-Man Shao2,‡ and Wen-Xin Zhou3,§,†
Southwestern University of Finance and Economics,∗ University of
Melbourne,† Chinese University of Hong Kong‡ and Princeton University§
Two-sample U -statistics are widely used in a broad range of applications, including those in the fields of biostatistics and econometrics. In this paper, we establish sharp Cramér-type moderate deviation theorems for Studentized two-sample U -statistics in a general framework, including the two-sample t-statistic and Studentized
Mann–Whitney test statistic as prototypical examples. In particular,
a refined moderate deviation theorem with second-order accuracy is
established for the two-sample t-statistic. These results extend the
applicability of the existing statistical methodologies from the onesample t-statistic to more general nonlinear statistics. Applications to
Tribute: Peter was a brilliant and prolific researcher, who has made enormously influential contributions to mathematical statistics and probability theory. Peter had extraordinary knowledge of analytic techniques that he often applied with ingenious simplicity
to tackle complex statistical problems. His work and service have had a profound impact
on statistics and the statistical community. Peter was a generous mentor and friend with
a warm heart and keen to help the young generation. Jinyuan Chang and Wen-Xin Zhou
are extremely grateful for the opportunity to learn from and work with Peter in the last
two years at the University of Melbourne. Even in his final year, he had afforded time to
guide us. We will always treasure the time we spent with him. Qi-Man Shao is so grateful
for all the helps and supports that Peter had provided during the various stages of his
career. Peter will be dearly missed and forever remembered as our mentor and friend.
Received June 2015.
1
Supported in part by the Fundamental Research Funds for the Central Universities
(Grant No. JBK160159, JBK150501), NSFC (Grant No. 11501462), the Center of Statistical Research at SWUFE and the Australian Research Council.
2
Supported by Hong Kong Research Grants Council GRF 603710 and 403513.
3
Supported by NIH Grant R01-GM100474-4 and a grant from the Australian Research
Council.
AMS 2000 subject classifications. Primary 60F10, 62E17; secondary 62E20, 62F40,
62H15.
Key words and phrases. Bootstrap, false discovery rate, Mann–Whitney U test, multiple hypothesis testing, self-normalized moderate deviation, Studentized statistics, twosample t-statistic, two-sample U -statistics.
This is an electronic reprint of the original article published by the
Institute of Mathematical Statistics in The Annals of Statistics,
2016, Vol. 44, No. 5, 1931–1956. This reprint differs from the original in
pagination and typographic detail.
1
2
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
two-sample large-scale multiple testing problems with false discovery
rate control and the regularized bootstrap method are also discussed.
1. Introduction. The U -statistic is one of the most commonly used nonlinear and nonparametric statistics, and its asymptotic theory has been well
studied since the seminal paper of Hoeffding (1948). U -statistics extend the
scope of parametric estimation to more complex nonparametric problems
and provide a general theoretical framework for statistical inference. We refer to Koroljuk and Borovskich (1994) for a systematic presentation of the
theory of U -statistics, and to Kowalski and Tu (2007) for more recently
discovered methods and contemporary applications of U -statistics.
Applications of U -statistics can also be found in high dimensional statistical inference and estimation, including the simultaneous testing of many
different hypotheses, feature selection and ranking, the estimation of high
dimensional graphical models and sparse, high dimensional signal detection. In the context of high dimensional hypothesis testing, for example,
several new methods based on U -statistics have been proposed and studied
in Chen and Qin (2010), Chen, Zhang and Zhong (2010) and Zhong and
Chen (2011). Moreover, Li et al. (2012) and Li, Zhong and Zhu (2012) employed U -statistics to construct independence feature screening procedures
for analyzing ultrahigh dimensional data.
Due to heteroscedasticity, the measurements across disparate subjects
may differ significantly in scale for each feature. To standardize for scale,
unknown nuisance parameters are always involved and a natural approach
is to use Studentized, or self-normalized statistics. The noteworthy advantage of Studentization is that compared to standardized statistics, Studentized ratios take heteroscedasticity into account and are more robust against
heavy-tailed data. The theoretical and numerical studies in Delaigle, Hall
and Jin (2011) and Chang, Tang and Wu (2013, 2016) evidence the importance of using Studentized statistics in high dimensional data analysis. As
noted in Delaigle, Hall and Jin (2011), a careful study of the moderate
deviations in the Studentized ratios is indispensable to understanding the
common statistical procedures used in analyzing high dimensional data.
Further, it is now known that the theory of Cramér-type moderate deviations for Studentized statistics quantifies the accuracy of the estimated
p-values, which is crucial in the study of large-scale multiple tests for controlling the false discovery rate [Fan, Hall and Yao (2007), Liu and Shao
(2010)]. In particular, Cramér-type moderate deviation results can be used
to investigate the robustness and accuracy properties of p-values and critical
values in multiple testing procedures. However, thus far, most applications
have been confined to t-statistics [Fan, Hall and Yao (2007), Wang and Hall
(2009), Delaigle, Hall and Jin (2011), Cao and Kosorok (2011)]. It is conjectured in Fan, Hall and Yao (2007) that analogues of the theoretical properties
STUDENTIZED TWO-SAMPLE U -STATISTICS
3
of these statistical methodologies remain valid for other resampling methods based on Studentized statistics. Motivated by the above applications,
we are attempting to develop a unified theory on moderate deviations for
more general Studentized nonlinear statistics, in particular, for two-sample
U -statistics.
The asymptotic properties of the standardized U -statistics are extensively
studied in the literature, whereas significant developments are achieved in
the past decade for one-sample Studentized U -statistics. We refer to Wang,
Jing and Zhao (2000) and the references therein for Berry–Esseen-type
bounds and Edgeworth expansions. The results for moderate deviations can
be found in Vandemaele and Veraverbeke (1985), Lai, Shao and Wang (2011)
and Shao and Zhou (2016). The results in Shao and Zhou (2016) paved the
way for further applications of statistical methodologies using Studentized
U -statistics in high dimensional data analysis.
Two-sample U -statistics are also commonly used to compare the different (treatment) effects of two groups, such as an experimental group and
a control group, in scientifically controlled experiments. However, due to
the structural complexities, the theoretical properties of the two-sample U statistics have not been well studied. In this paper, we establish a Cramértype moderate deviation theorem in a general framework for Studentized
two-sample U -statistics, especially the two-sample t-statistic and the Studentized Mann–Whitney test. In particular, a refined moderate deviation
theorem with second-order accuracy is established for the two-sample tstatistic.
The paper is organized as follows. In Section 2, we present the main
results on Cramér-type moderate deviations for Studentized two-sample U statistics as well as a refined result for the two-sample t-statistic. In Section 3, we investigate statistical applications of our theoretical results to the
problem of simultaneously testing many different hypotheses, based particularly on the two-sample t-statistics and Studentized Mann–Whitney tests.
Section 4 shows numerical studies. A discussion is given in Section 5. All the
proofs are relegated to the supplementary material [Chang, Shao and Zhou
(2016)].
2. Moderate deviations for Studentized U -statistics. We use the following notation throughout this paper. For two sequences of real numbers an
and bn , we write an ≍ bn if there exist two positive constants c1 , c2 such that
c1 ≤ an /bn ≤ c2 for all n ≥ 1, we write an = O(bn ) if there is a constant C
such that |an | ≤ C|bn | holds for all sufficiently large n, and we write an ∼ bn
and an = o(bn ), respectively, if limn→∞ an /bn = 1 and limn→∞ an /bn = 0.
Moreover, for two real numbers a and b, we write for ease of presentation
that a ∨ b = max(a, b) and a ∧ b = min(a, b).
4
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
2.1. A review of Studentized one-sample U -statistics. We start with a
brief review of Cramér-type moderate deviation for Studentized one-sample
U -statistics. For an integer s ≥ 2 and for n > 2s, let X1 , . . . , Xn be independent and identically distributed (i.i.d.) random variables taking values in a
metric space (X, G), and let h : Xd 7→ R be a symmetric Borel measurable
function. Hoeffding’s U -statistic with a kernel h of degree s is defined as
Un =
X
1
n
s
h(Xi1 , . . . , Xis ),
1≤i1 <···<is ≤n
which is an unbiased estimate of θ = E{h(X1 , . . . , Xs )}. In particular, we
focus on the case where X is the Euclidean space Rr for some integer r ≥ 1.
When r ≥ 2, write Xi = (Xi1 , . . . , Xir )T for i = 1, . . . , n.
Let
h1 (x) = E{h(X1 , . . . , Xs )|X1 = x}
for any x = (x1 , . . . , xr )T ∈ Rr
and
σ 2 = var{h1 (X1 )},
vh2 = var{h(X1 , X2 , . . . , Xs )}.
Assume that 0 < σ 2 < ∞, then the standardized nondegenerate U -statistic
is given by
Zn =
n1/2
(Un − θ).
sσ
Because σ is usually unknown, we are interested in the following Studentized U -statistic:
1/2
bn = n (Un − θ),
U
sb
σ
(2.1)
where σ
b2 denotes the leave-one-out jackknife estimator of σ 2 given by
n
(n − 1) X
(qi − Un )2
σ
b =
(n − s)2
2
with
i=1
qi =
1
n−1
s−1
X
h(Xi , Xℓ1 , . . . , Xℓs−1 ).
1≤ℓ1 <···<ℓs−1 ≤n
ℓj 6=i for each j=1,...,s−1
Shao and Zhou (2016) established a general Cramér-type moderate deviation theorem for Studentized nonlinear statistics, in particular for Studentized U -statistics.
5
STUDENTIZED TWO-SAMPLE U -STATISTICS
Theorem 2.1. Assume that vp := [E{|h1 (X1 ) − θ|p }]1/p < ∞ for some
2 < p ≤ 3. Suppose that there are constants c0 ≥ 1 and κ ≥ 0 such that for
all x1 , . . . , xs ∈ R,
#
"
s
X
2
2
2
(2.2)
{h1 (xi ) − θ} .
{h(x1 , . . . , xs ) − θ} ≤ c0 κσ +
i=1
Then there exist constants C, c > 0 depending only on d such that
bn ≥ x)
P(U
= 1 + O(1){(vp /σ)p (1 + x)p n1−p/2 + (as1/2 + vh /σ)(1 + x)3 n−1/2 }
1 − Φ(x)
holds uniformly for 0 ≤ x ≤ c min{(σ/vp )n1/2−1/p , (n/as )1/6 }, where |O(1)| ≤
C and as = max(c0 κ, c0 + s). In particular, we have
bn ≥ x)
P(U
→1
1 − Φ(x)
holds uniformly in x ∈ [0, o(n1/2−1/p )).
Condition (2.2) is satisfied for a large class of U -statistics. Below are some
examples.
Statistic
t-statistic
Sample variance
Gini’s mean difference
One-sample Wilcoxon’s statistic
Kendall’s τ
Kernel function
h(x1 , x2 ) = 0.5(x1 + x2 )
h(x1 , x2 ) = 0.5(x1 − x2 )2
h(x1 , x2 ) = |x1 − x2 |
h(x1 , x2 ) = I{x1 + x2 ≤ 0}
h(x1 , x2 ) = 2I{(x22 − x21 )(x12 − x11 ) > 0}
c0
2
10
8
1
1
κ
0
(θ/σ)2
(θ/σ)2
σ −2
σ −2
2.2. Studentized two-sample U -statistics. Let X = {X1 , . . . , Xn1 } and Y =
{Y1 , . . . , Yn2 } be two independent random samples, where X is drawn from
a probability distribution P and Y is drawn from another probability distribution Q. With s1 and s2 being two positive integers, let
h(x1 , . . . , xs1 ; y1 , . . . , ys2 )
be a kernel function of order (s1 , s2 ) which is real and symmetric both in its
first s1 variates and in its last s2 variates. It is known that a nonsymmetric kernel can always be replaced with a symmetrized version by averaging
across all possible rearrangements of the indices.
Set θ := E{h(X1 , . . . , Xs1 ; Y1 , . . . , Ys2 )}, and let
Un̄ =
1
X
X
h(Xi1 , . . . , Xis1 ; Yj1 , . . . , Yjs2 ),
n1 n2
s1 s2 1≤i1 <···<is ≤n1 1≤j1 <···<js ≤n2
2
1
6
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
be the two-sample U -statistic, where n̄ = (n1 , n2 ). To lighten the notation,
we write Xi1 ,...,iℓ = (Xi1 , . . . , Xiℓ ), Yj1 ,...,jk = (Yj1 , . . . , Yjk ) such that
h(Xi1 ,...,iℓ ; Yj1 ,...,jk ) = h(Xi1 , . . . , Xiℓ ; Yj1 , . . . , Yjk ),
and define
h1 (x) = E{h(X1,...,s1 ; Y1,...,s2 )|X1 = x},
(2.3)
h2 (y) = E{h(X1,...,s1 ; Y1,...,s2 )|Y1 = y}.
Also let vh2 = var{h(X1,...,s1 ; Y1,...,s2 )}, σ12 = var{h1 (Xi )}, σ22 = var{h2 (Yj )}
and
σ 2 = σ12 + σ22 ,
(2.4)
2 2 −1
σn̄2 = s21 σ12 n−1
1 + s 2 σ2 n 2 .
For the standardized two-sample U -statistic of the form σn̄−1 (Un̄ − θ), a
uniform Berry–Esseen bound of order O{(n1 ∧ n2 )−1/2 } was obtained by
Helmers and Janssen (1982) and Borovskich (1983). Using a concentration
inequality approach, Chen and Shao (2007) proved a refined uniform bound
and also established an optimal nonuniform Berry–Esseen bound. For large
deviation asymptotics of two-sample U -statistics, we refer to Nikitin and
Ponikarov (2006) and the references therein.
Here, we are interested in the following Studentized two-sample U -statistic:
(2.5)
where
bn̄ = σ
U
bn̄−1 (Un̄ − θ)
n
n
i=1
i=1
1
1
1 X
1 X
σ
b12 =
qi
qi −
n1 − 1
n1
and
2 2 −1
with σ
bn̄2 = s21 σ
b12 n−1
b2 n2 ,
1 + s2 σ
!2
,
n
n
j=1
j=1
2
2
1 X
1 X
pj
pj −
σ
b22 =
n2 − 1
n2
1
X
X
1
X
X
!2
qi =
h(Xi,i2 ,...,is1 ; Yj1 ,...,js2 ),
n1 −1 n2
s1 −1 s2 1≤i2 <···<is1 ≤n1 1≤j1 <···<js2 ≤n2
iℓ 6=i,ℓ=2,...,s1
pj =
h(Xi1 ,...,is1 ; Yj,j2,...,js2 ).
n1 n2 −1
s1 s2 −1 1≤i1 <···<is1 ≤n1 1≤j2 <···<js2 ≤n2
jk 6=j,k=2,...,s2
Note that σ
b12 and σ
b22 are leave-one-out jackknife estimators of σ12 and σ22 ,
respectively.
7
STUDENTIZED TWO-SAMPLE U -STATISTICS
bn̄ . For p > 2, let
2.2.1. Moderate deviations for U
(2.6) v1,p = [E{|h1 (X1 ) − θ|p }]1/p
and v2,p = [E{|h2 (Y1 ) − θ|p }]1/p .
Moreover, put
s = s1 ∨ s2 ,
n̄ = (n1 , n2 ),
n = n1 ∧ n2
and
λn̄ = vh
n1 + n2
σ12 n2 + σ22 n1
1/2
with vh2 = var{h(X1,...,s1 ; Y1,...,s2 )}.
bn̄ given
The following result gives a Cramér-type moderate deviation for U
in (2.5) under mild assumptions. A self-contained proof can be found in the
supplementary material [Chang, Shao and Zhou (2016)].
Assume that there are constants c0 ≥ 1 and κ ≥ 0 such
Theorem 2.2.
that
2
(2.7) {h(x; y) − θ} ≤ c0
"
s2
s1
X
X
2
2
{h2 (yj ) − θ}2
{h1 (xi ) − θ} +
κσ +
j=1
i=1
#
for all x = (x1 , . . . , xs1 ) and y = (y1 , . . . , ys2 ), where σ 2 is given in (2.4).
Assume that v1,p and v2,p are finite for some 2 < p ≤ 3. Then there exist
constants C, c > 0 independent of n1 and n2 such that
bn̄ ≥ x)
P(U
1 − Φ(x)
(2.8)
(
= 1 + O(1)
holds uniformly for
p
2
X
vℓ,p
(1 + x)p
p/2−1
ℓ=1
σℓp nℓ
p/2−1
0 ≤ x ≤ c min[(σ1 /v1,p )n1
1/2
+ (ad
3
+ λn̄ )(1 + x)
p/2−1
, (σ2 /v2,p )n2
n1 + n2
n1 n2
1/2 )
, a−1/6
{n1 n2 /(n1 + n2 )}1/6 ],
s
where |O(1)| ≤ C and as = max(c0 κ, c0 + s). In particular, as n → ∞,
(2.9)
bn̄ ≥ x)
P(U
→1
1 − Φ(x)
holds uniformly in x ∈ [0, o(n1/2−1/p )).
Theorem 2.2 exhibits the dependence between the range of uniform convergence of the relative error in the central limit theorem and the optimal moment conditions. In particular, if p = 3, the region becomes 0 ≤ x ≤
8
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
O(n1/6 ). See Theorem 2.3 in Jing, Shao and Wang (2003) for similar results
on self-normalized sums. Under higher order moment conditions, it is not
clear if our technique can be adapted to provide a better approximation for
bn̄ ≥ x) for x lying between n1/6 and n1/2 in order.
the tail probability P(U
It is also worth noticing that many commonly used kernels in nonparametric statistics turn out to be linear combinations of the indicator functions
and, therefore, satisfy condition (2.7) immediately.
2.2.2. Two-sample t-statistic. As a prototypical example of two-sample
U -statistics, the two-sample t-statistic is of significant interest due to its
wide applicability. The advantage of using t-tests, either one-sample or twosample, is their high degree of robustness against heavy-tailed data in which
the sampling distribution has only a finite third or fourth moment. The robustness of the t-statistic is useful in high dimensional data analysis under
the sparsity assumption on the signal of interest. When dealing with two
experimental groups, which are typically independent, in scientifically controlled experiments, the two-sample t-statistic is one of the most commonly
used statistics for hypothesis testing and constructing confidence intervals
for the difference between the means of the two groups.
Let X = {X1 , . . . , Xn1 } be a random sample from a one-dimensional population with mean µ1 and variance σ12 , and let Y = {Y1 , . . . , Yn2 } be a random
sample from another one-dimensional population with mean µ2 and variance
σ22 independent of X . The two-sample t-statistic is defined as
Tbn̄ = q
X̄ − Ȳ
,
2 n−1
σ
b12 n−1
+
σ
b
1
2 2
Pn1
−1 Pn2
where n̄ = (n1 , n2 ), X̄ = n−1
1
j=1 Yj and
i=1 Xi , Ȳ = n2
n
σ
b12
1
1 X
(Xi − X̄)2 ,
=
n1 − 1
i=1
n
σ
b22
2
1 X
=
(Yj − Ȳ )2 .
n2 − 1
j=1
The following result is a direct consequence of Theorem 2.2.
Theorem 2.3. Assume that µ1 = µ2 , and E(|X1 |p ) < ∞, E(|Y1 |p ) < ∞
for some 2 < p ≤ 3. Then there exist absolute constants C, c > 0 such that
2
X
P(Tbn̄ ≥ x)
1−p/2
= 1 + O(1)(1 + x)p
(vℓ,p /σℓ )p nℓ
1 − Φ(x)
ℓ=1
1/2−1/p
holds uniformly for 0 ≤ x ≤ c minℓ=1,2 {(σℓ /vℓ,p )nℓ
}, where |O(1)| ≤ C
p
1/p
p
1/p
and v1,p = {E(|X1 − µ1 | )} , v2,p = {E(|Y1 − µ2 | )} .
9
STUDENTIZED TWO-SAMPLE U -STATISTICS
Motivated by a series of recent studies on the effectiveness and accuracy
of multiple-hypothesis testing using t-tests, we investigate whether a higher
order expansion of the relative error, as in Theorem 1.2 of Wang (2005) for
self-normalized sums, holds for the two-sample t-statistic, so that one can
use bootstrap calibration to correct skewness [Fan, Hall and Yao (2007),
Delaigle, Hall and Jin (2011)] or study power properties against sparse alternatives [Wang and Hall (2009)]. The following theorem gives a refined
Cramér-type moderate deviation result for Tbn̄ , whose proof is placed in the
supplementary material [Chang, Shao and Zhou (2016)].
Theorem 2.4. Assume that µ1 = µ2 . Let γ1 = E{(X1 − µ1 )3 } and γ2 =
E{(Y1 − µ2 )3 } be the third central moment of X1 and Y1 , respectively. Moreover, assume that E(|X1 |p ) < ∞, E(|Y1 |p ) < ∞ for some 3 < p ≤ 4. Then
−2
P(Tbn̄ ≥ x)
γ1 n−2
3
1 − γ2 n2
x
= exp −
2 −1 3/2
1 − Φ(x)
3(σ12 n−1
1 + σ2 n 2 )
(2.10)
"
#
p
2 3
X
vℓ,3 (1 + x) vℓ,p (1 + x)p
+ p p/2−1
× 1 + O(1)
1/2
σℓ3 nℓ
σℓ n ℓ
ℓ=1
holds uniformly for
(2.11)
1/2
1/2−1/p
0 ≤ x ≤ c min min{(σℓ /vℓ,3 )3 nℓ , (σℓ /vℓ,p )nℓ
ℓ=1,2
},
where |O(1)| ≤ C and for every q ≥ 1, v1,q = {E(|X1 − µ1 |q )}1/q , v2,q =
{E(|Y1 − µ2 |q )}1/q .
A refined Cramér-type moderate deviation theorem for the one-sample tstatistic was established in Wang (2011), which to our knowledge, is the best
result for the t-statistic known up to date, or equivalently, self-normalized
sums.
2.2.3. More examples of two-sample U -statistics. Beyond the two-sample
t-statistic, we enumerate three more well-known two-sample U -statistics
and refer to Nikitin and Ponikarov (2006) for more examples. Let X =
{X1 , . . . , Xn1 } and Y = {Y1 , . . . , Yn2 } be two independent random samples
from population distributions P and Q, respectively.
Example 2.1 (The Mann–Whitney test statistic).
order (s1 , s2 ) = (1, 1), defined as
h(x; y) = I{x ≤ y} − 1/2
The kernel h is of
with θ = P(X1 ≤ Y1 ) − 1/2,
10
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
and in view of (2.3),
h1 (x) = 1/2 − G(x),
h2 (y) = F (y) − 1/2.
In particular, if F ≡ G, we have σ12 = σ22 = 1/12.
Example 2.2 (The Lehmann statistic).
(2, 2), defined as
The kernel h is of order (s1 , s2 ) =
h(x1 , x2 ; y1 , y2 ) = I{|x1 − x2 | ≤ |y1 − y2 |} − 1/2
with θ = P(|X1 − X2 | ≤ |Y1 − Y2 |) − 1/2. Then under H0 : θ = 0, E{h(X1 , X2 ;
Y1 , Y2 )} = 0, and
h1 (x) = G(x){1 − G(x)} − 1/6,
h2 (y) = F (y){F (y) − 1} + 1/6.
In particular, if F ≡ G, then σ12 = σ22 = 1/180.
Example 2.3 (The Kochar statistic). The Kochar statistic was constructed by Kochar (1979) to test if the two hazard failure rates are different.
Denote by F the class of all absolutely continuous cumulative distribution
functions (CDF) F (·) satisfying F (0) = 0. For two arbitrary CDF’s F, G ∈ F ,
and let f = F ′ , g = G′ be their densities. Thus, the hazard failure rates are
defined by
rF (t) =
f (t)
,
1 − F (t)
rG (t) =
g(t)
,
1 − G(t)
as long as both 1 − F (t) and 1 − G(t) are positive. Kochar (1979) considered the problem of testing the null hypothesis H0 : rF (t) = rG (t) against
the alternative H1 : rF (t) ≤ rG (t), t ≥ 0 with strict inequality over a set of
nonzero measures. Observe that H1 holds if and only if δ(s, t) = F̄ (s)Ḡ(t) −
F̄ (t)Ḡ(s) ≥ 0 for s ≥ t ≥ 0 with strict inequality over a set of nonzero measures, where F̄ (·) := 1 − F (·) for any F ∈ F .
Recall that X1 , . . . , Xn1 and Y1 , . . . , Yn2 are two independent samples
drawn respectively from F and G. Following Nikitin and Ponikarov (2006),
we see that
η(F ; G) = E{δ(X ∨ Y, X ∧ Y )}
= P(Y1 ≤ Y2 ≤ X1 ≤ X2 ) + P(X1 ≤ Y2 ≤ Y2 ≤ X2 )
− P(X1 ≤ X2 ≤ Y1 ≤ Y2 ) − P(Y1 ≤ X1 ≤ X2 ≤ Y2 ).
Under H0 , η(F ; G) = 0 while under H1 , η(F ; G) > 0. The U -statistic with
the kernel of order (s1 , s2 ) = (2, 2) is given by
h(x1 , x2 ; y1 , y2 ) = I{yyxx or xyyx} − I{xxyy or yxxy}.
STUDENTIZED TWO-SAMPLE U -STATISTICS
11
Here, the term “yyxx” refers to y1 ≤ y2 ≤ x1 ≤ x2 and similar treatments
apply to xyyx, xxyy and yxxy. Under H0 : rF (t) = rG (t), we have
h1 (x) = −4G3 (x)/3 + 4G2 (x) − 2G(x),
h2 (y) = 4F 3 (y)/3 − 4F 2 (y) + 2F (y).
In particular, if F ≡ G, then σ12 = σ22 = 8/105.
3. Multiple testing via Studentized two-sample tests. Multiple-hypothesis
testing occurs in a wide range of applications including DNA microarray
experiments, functional magnetic resonance imaging analysis (fMRI) and
astronomical surveys. We refer to Dudoit and van der Laan (2008) for a systematic study of the existing multiple testing procedures. In this section, we
consider multiple-hypothesis testing based on Studentized two-sample tests
and show how the theoretical results in the previous section can be applied
to these problems.
3.1. Two-sample t-test. A typical application of multiple-hypothesis testing in high dimensions is the analysis of gene expression microarray data.
To see whether each gene in isolation behaves differently in a control group
versus an experimental group, we can apply the two-sample t-test. Assume
that the statistical model is given by
Xi,k = µ1k + εi,k ,
i = 1, . . . , n1 ,
(3.1)
Yj,k = µ2k + ωj,k ,
j = 1, . . . , n2 ,
for k = 1, . . . , m, where index k denotes the kth gene, i and j indicate the
ith and jth array, and the constants µ1k and µ2k , respectively, represent the
mean effects for the kth gene from the first and the second groups. For each k,
ε1,k , . . . , εn1 ,k (resp., ω1,k , . . . , ωn2 ,k ) are independent random variables with
2 > 0 (resp., σ 2 > 0). For the kth marginal test,
mean zero and variance σ1k
2k
2 and σ 2 are unequal, the two-sample twhen the population variances σ1k
2k
statistic is most commonly used to carry out hypothesis testing for the null
H0k : µ1k = µ2k against the alternative H1k : µ1k 6= µ2k .
Since the seminal work of Benjamini and Hochberg (1995), the Benjamini
and Hochberg (B–H) procedure has become a popular technique in microarray data analysis for gene selection, which along with many other procedures
depend on p-values that often need to be estimated. To control certain simultaneous errors, it has been shown that using approximated p-values is
asymptotically equivalent to using the true p-values for controlling the kfamilywise error rate (k-FWER) and false discovery rate (FDR). See, for
example, Kosorok and Ma (2007), Fan, Hall and Yao (2007) and Liu and
Shao (2010) for one-sample tests. Cao and Kosorok (2011) proposed an alternative method to control k-FWER and FDR in both large-scale one-
12
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
and two-sample t-tests. A common thread among the aforementioned literature is that theoretically for the methods to work in controlling FDR at a
given level, the number of features m and the sample size n should satisfy
log m = o(n1/3 ).
Recently, Liu and Shao (2014) proposed a regularized bootstrap correction
method for multiple one-sample t-tests so that the constraint on m may
be relaxed to log m = o(n1/2 ) under less stringent moment conditions as
assumed in Fan, Hall and Yao (2007) and Delaigle, Hall and Jin (2011). Using
Theorem 2.4, we show that the constraint on m in large scale two-sample
t-tests can be relaxed to log m = o(n1/2 ) as well. This provides theoretical
justification of the effectiveness of the bootstrap method which is frequently
used for skewness correction.
To illustrate the main idea, here we restrict our attention to the special
case in which the observations are independent. Indeed, when test statistics are correlated, false discovery control becomes very challenging under
arbitrary dependence. Various dependence structures have been considered
in the literature. See, for example, Benjamini and Yekutieli (2001), Storey,
Taylor and Siegmund (2004), Ferreira and Zwinderman (2006), Leek and
Storey (2008), Friguet, Kloareg and Causeur (2009) and Fan, Han and Gu
(2012), among others. For completeness, we generalize the results to the
dependent case in Section 3.1.3.
3.1.1. Normal calibration and phase transition. Consider the large-scale
significance testing problem:
H0k : µ1k = µ2k
versus
H1k : µ1k 6= µ2k ,
1 ≤ k ≤ m.
Let V and R denote, respectively, the number of false rejections and the
number of total rejections. The well-known false discovery proportion (FDP)
is defined as the ratio FDP = V / max(1, R), and FDR is the expected FDP,
that is, E{V / max(1, R)}. Benjamini and Hochberg (1995) proposed a
distribution-free method for choosing a p-value threshold that controls the
FDR at a prespecified level where 0 < α < 1. For k = 1, . . . , m, let pk be
the marginal p-value of the kth test, and let p(1) ≤ · · · ≤ p(m) be the order
statistics of p1 , . . . , pm . For a predetermined control level α ∈ (0, 1), the B–H
procedure rejects hypotheses for which pk ≤ p(k̂) , where
αk
k̂ = max 0 ≤ k ≤ m : p(k) ≤
(3.2)
m
with p(0) = 0.
In microarray analysis, two-sample t-tests are often used to identify differentially expressed genes between two groups. Let
Tk = q
X̄k − Ȳk
2 n−1 + σ
2 n−1
σ
b1k
b2k
1
2
,
k = 1, . . . , m,
STUDENTIZED TWO-SAMPLE U -STATISTICS
where X̄k = n−1
1
Pn 1
i=1 Xi,k ,
Ȳk = n−1
2
n
2
=
σ
b1k
1
1 X
(Xi,k − X̄k )2 ,
n1 − 1
i=1
Pn 2
j=1 Yj,k
2
=
σ
b2k
13
and
n
2
1 X
(Yj,k − Ȳk )2 .
n2 − 1
j=1
1
2
Here and below, {Xi,1 , . . . , Xi,m }ni=1
and {Yj,1 , . . . , Yj,m}nj=1
are independent
random samples from {X1 , . . . , Xm } and {Y1 , . . . , Ym }, respectively, generated according to model (3.1), which are usually non-Gaussian in practice.
Moreover, assume that the sample sizes of the two samples are of the same
order, that is, n1 ≍ n2 .
Before stating the main results, we first introduce a number of notation.
Set H0 = {1 ≤ k ≤ m : µ1k = µ2k }, let m0 = #H0 denote the number of true
null hypotheses and m1 = m − m0 . Both m = m(n1 , n2 ) and m0 = m0 (n1 , n2 )
are allowed to grow as n = n1 ∧ n2 increases. We assume that
m0
= π0 ∈ (0, 1].
lim
n→∞ m
In line with the notation used in Section 2, set
2
= var(Xk ),
σ1k
2
= var(Yk ),
σ2k
γ1k = E{(Xk − µ1k )3 },
γ2k = E{(Yk − µ2k )3 }
2 = σ 2 n−1 + σ 2 n−1 . Throughout this subsection, we focus on the
and σn̄,k
2k 2
1k 1
normal calibration and let pbk = 2 − 2Φ(|Tk |), where Φ(·) is the standard
normal distribution function. Indeed, the exact null distribution of Tk and
thus the true p-values are unknown without the normality assumption.
Theorem 3.1. Assume that {X1 , . . . , Xm , Y1 , . . . , Ym } are independent
nondegenerate random variables; n1 ≍ n2 , m = m(n1 , n2 ) → ∞ and log m =
o(n1/2 ) as n = n1 ∧ n2 → ∞. For independent random samples {Xi,1 , . . . ,
1
2
Xi,m }ni=1
and {Yj,1 , . . . , Yj,m}nj=1
, suppose that
max max{E(ξk4 ), E(ηk4 )} ≤ C < ∞
(3.3) min min(σ1k , σ2k ) ≥ c > 0,
1≤k≤m
1≤k≤m
−1
−1
for some constants C and c, where ξk = σ1k
(Xk − µ1k ) and ηk = σ2k
(Yk −
µ2k ). Moreover, assume that
(3.4)
#{1 ≤ k ≤ m : |µ1k − µ2k | ≥ 4(log m)1/2 σn̄,k } → ∞
as n → ∞, and let
(3.5)
c0 = lim inf
n,m→∞
n1/2 X −3
−2
−2
σn̄,k |γ1k n1 − γ2k n2 | .
m0
k∈H0
14
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
(i) Suppose that log m = o(n1/3 ). Then as n → ∞, FDPΦ →P απ0 and
FDRΦ → απ0 .
(ii) Suppose that c0 > 0, log m ≥ c1 n1/3 for some c1 > 0 and that log m1 =
1/3
o(n ). Then there exists some constant β ∈ (α, 1] such that
lim P(FDPΦ ≥ β) = 1
n→∞
and
lim inf FDRΦ ≥ β.
n→∞
(log m)/n1/3
(iii) Suppose that c0 > 0,
→ ∞ and log m1 = o(n1/3 ). Then
as n → ∞, FDPΦ →P 1 and FDRΦ → 1.
Here, FDRΦ and FDPΦ denote, respectively, the FDR and the FDP of the
B–H procedure with pk replaced by pbk in (3.2).
Together, conclusions (i) and (ii) of Theorem 3.1 indicate that the number
of simultaneous tests can be as large as exp{o(n1/3 )} before the normal calibration becomes inaccurate. In particular, when n1 = n2 = n, the skewness
parameter c0 given in (3.5) reduces to
1 X |γ1k − γ2k |
.
c0 = lim inf
2 + σ 2 )3/2
m→∞
m0
(σ1k
2k
k∈H
0
As noted in Liu and Shao (2014), the limiting behavior of the FDRΦ varies
in different regimes and exhibits interesting phase transition phenomena as
the dimension m grows as a function of (n1 , n2 ). The average of skewness c0
plays a crucial role. It is also worth noting that conclusions (ii) and (iii) hold
under the scenario π0 = 1, that is, m1 = o(m). This corresponds to the sparse
settings in applications such as gene detections. Under finite 4th moments of
Xk and Yk , the robustness of two-sample t-tests and the accuracy of normal
calibration in the FDR/FDP control have been investigated in Cao and
Kosorok (2011) when m1 /m → π1 ∈ (0, 1). This corresponds to the relatively
dense setting, and the sparse case that we considered above is not covered.
3.1.2. Bootstrap calibration and regularized bootstrap correction. In this
subsection, we first use the conventional bootstrap calibration to improve
the accuracy of FDR control based on the fact that the bootstrap approximation removes the skewness term that determines first-order inaccuracies
of the standard normal approximation. However, the validity of bootstrap
approximation requires the underlying distribution to be very light tailed,
which does not seem realistic in real data applications. As pointed in the
literature of gene study, many gene data are commonly recognized to have
heavy tails which violates the assumption on underlying distribution used to
make conventional bootstrap approximation work. Recently, Liu and Shao
(2014) proposed a regularized bootstrap method that is shown to be more
robust against the heavy tailedness of the underlying distribution and the
dimension m is allowed to be as large as exp{o(n1/2 )}.
15
STUDENTIZED TWO-SAMPLE U -STATISTICS
†
†
†
†
Let Xk,b
= {X1,k,b
, . . . , Xn† 1 ,k,b }, Yk,b
= {Y1,k,b
, . . . , Yn†2 ,k,b }, b = 1, . . . , B,
denote bootstrap samples drawn independently and uniformly, with replacement, from Xk = {X1,k , . . . , Xn1 ,k } and Yk = {Y1,k , . . . , Yn2 ,k }, respectively.
†
†
Let Tk,b
be the two-sample t-statistic constructed from {X1,k,b
− X̄k , . . . ,
†
Xn† 1 ,k,b − X̄k } and {Y1,k,b
− Ȳk , . . . , Yn†2 ,k,b − Ȳk }. Following Liu and Shao
(2014), we use the following empirical distribution:
m
†
Fm,B
(t) =
B
1 XX
†
I{|Tk,b
| ≥ t}
mB
k=1 b=1
to approximate the null distribution, and thus the estimated p-values are
†
given by pbk,B = Fm,B
(|Tk |). Respectively, FDPB and FDRB denote the FDP
and the FDR of the B–H procedure with pk replaced by pbk,B in (3.2).
The following result shows that the bootstrap calibration is accurate provided log m increases at a strictly slower rate than (n1 ∧ n2 )1/2 , and the
underlying distribution has sub-Gaussian tails.
Theorem 3.2.
Assume the conditions in Theorem 3.1 hold and that
2
2
max max{E(et0 ξk ), E(et0 ηk )} ≤ C < ∞
1≤k≤m
for some constants t0 , C > 0.
(i) Suppose that log m = o(n1/3 ). Then as n → ∞, FDPB →P απ0 and
FDRB → απ0 .
(ii) Suppose that log m = o(n1/2 ) and m1 ≤ mρ for some ρ ∈ (0, 1). Then
as n → ∞, FDPB →P α and FDRB → α.
The sub-Gaussian condition in Theorem 3.2 is quite stringent in practice,
whereas it can hardly be weakened in general when the bootstrap method
is applied. In the context of family-wise error rate control, Fan, Hall and
Yao (2007) proved that the bootstrap calibration is accurate if the observed
data are bounded and log m = o(n1/2 ). The regularized bootstrap method,
however, adopts the very similar idea of the trimmed estimators and is a twostep procedure that combines the truncation technique and the bootstrap
method.
First, define the trimmed samples
bi,k = Xi,k I{|Xi,k | ≤ λ1k },
X
Ybj,k = Yi,k I{|Yj,k | ≤ λ2k }
for i = 1, . . . , n1 , j = 1, . . . , n2 , where λ1k and λ2k are regularized parameters
†
b† , . . . , X
b†
b†
b†
b†
to be specified. Let Xbk,b
= {X
1,k,b
n1 ,k,b } and Yk,b = {Y1,k,b , . . . , Yn2 ,k,b },
b = 1, . . . , B, be the corresponding bootstrap samples drawn by sampling
randomly, with replacement, from
b1,k , . . . , X
bn ,k } and Ybk = {Yb1,k , . . . , Ybn ,k },
Xbk = {X
1
2
16
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
†
respectively. Next, let Tbk,b
be the two-sample t-test statistic constructed from
P
†
n
−1
−1 Pn1 b
−1
1
b†
b
b†
b
{X
i=1 Xi,k } and {Y1,k,b − n2 ×
i=1 Xi,k , . . . , Xn1 ,k,b − n1
1,k,b − n1
Pn 2 b
−1 Pn2 b
b†
j=1 Yj,k }. As in the previous procedure, define
j=1 Yj,k , . . . , Yn2 ,k,b − n2
the estimated p-values by
m
†
pbk,RB = Fbm,RB
(|Tk |)
B
1 XX
†
†
with Fbm,RB
(t) =
I{|Tbk,b
| ≥ t}.
mB
k=1 b=1
Let FDPRB and FDRRB denote the FDP and the FDR, respectively, of the
B–H procedure with pk replaced by pbk,RB in (3.2).
Theorem 3.3.
(3.6)
Assume the conditions in Theorem 3.1 hold and that
max max{E(|Xk |6 ), E(|Yk |6 )} ≤ C < ∞.
1≤k≤m
The regularized parameters (λ1k , λ2k ) are such that
1/6
1/6
n1
n2
λ1k ≍
(3.7)
and λ2k ≍
.
log m
log m
(i) Suppose that log m = o(n1/3 ). Then as n → ∞, FDPRB →P απ0 and
FDRRB → απ0 .
(ii) Suppose that log m = o(n1/2 ) and m1 ≤ mρ for some ρ ∈ (0, 1). Then
as n → ∞, FDPRB →P α and FDRRB → α.
In view of Theorem 3.3, the regularized bootstrap approximation is valid
under mild moment conditions that are significantly weaker than those required for the bootstrap method to work theoretically. The numerical performance will be investigated in Section 4. To highlight the main idea, a
self-contained proof of Theorem 3.1 is given in the supplementary material
[Chang, Shao and Zhou (2016)]. The proofs of Theorems 3.2 and 3.3 are
based on straightforward extensions of Theorems 2.2 and 3.1 in Liu and
Shao (2014), and thus are omitted.
3.1.3. FDR control under dependence. In this section, we generalize the
results in previous sections to the dependence case. Write ̺ = n1 /n2 . For
2 + ̺σ 2 and define
every k, ℓ = 1, . . . , m, let σk2 = σ1k
2k
(3.8)
rkℓ = (σk σℓ )−1 {cov(Xk , Xℓ ) + ̺ cov(Yk , Yℓ )},
which characterizes the dependence between (Xk , Yk ) and (Xℓ , Yℓ ). Partic2 = σ 2 , we see that r = 1 {corr(X , X ) +
ularly, when n1 = n2 and σ1k
kℓ
k
ℓ
2k
2
corr(Yk , Yℓ )}. In this subsection, we impose the following conditions on the
dependence structure of X = (X1 , . . . , Xm )T and Y = (Y1 , . . . , Ym )T .
STUDENTIZED TWO-SAMPLE U -STATISTICS
17
(D1) There exist constants 0 < r < 1, 0 < ρ < (1 − r)/(1 + r) and b1 > 0
such that
max
1≤k6=ℓ≤m
|rkℓ | ≤ r
and
max sk (m) ≤ b1 mρ ,
1≤k≤m
where for k = 1, . . . , m,
sk (m) = {1 ≤ ℓ ≤ m : corr(Xk , Xℓ ) ≥ (log m)−2−γ
or corr(Yk , Yℓ ) ≥ (log m)−2−γ }
for some γ > 0.
(D2) There exist constants 0 < r < 1, 0 < ρ < (1 − r)/(1 + r) and b1 > 0
such that max1≤k6=ℓ≤m |rkℓ | ≤ r and for each Xk , the number of variables Xℓ
that are dependent of Xk is less than b1 mρ .
The assumption max1≤k6=ℓ≤m |rkℓ | ≤ r for some 0 < r < 1 imposes a constraint on the magnitudes of the correlations, which is natural in the sense
that the correlation matrix R = (rkℓ )1≤k,ℓ≤m is singular if max1≤k6=ℓ≤m |rkℓ | =
1. Under condition (D1), each (Xk , Yk ) is allowed to be “moderately” correlated with at most as many as O(mρ ) other vectors. Condition (D2) enforces
a local dependence structure on the data, saying that each vector is dependent with at most as many as O(mρ ) other random vectors and independent
of the remaining ones. The following theorem extends the results in previous sections to the dependence case. Its proof is placed in the supplementary
material [Chang, Shao and Zhou (2016)].
Theorem 3.4. Assume that either condition (D1) holds with log m =
O(n1/8 ) or condition (D2) holds with log m = o(n1/3 ).
(i) Suppose that (3.3) and (3.4) are satisfied. Then as n → ∞, FDPΦ →P
απ0 and FDRΦ → απ0 .
(ii) Suppose that (3.3), (3.6) and (3.7) are satisfied. Then as n → ∞,
FDPRB →P απ0 and FDRRB → απ0 .
In particular, assume that condition (D2) holds with log m = o(n1/2 ) and
m1 ≤ mc for some 0 < c < 1. Then as n → ∞, FDPRB →P απ0 and FDRRB →
απ0 .
3.2. Studentized Mann–Whitney test. Let X = {X1 , . . . , Xn1 } and Y =
{Y1 , . . . , Yn2 } be two independent random samples from distributions F and
G, respectively. Let θ = P(X ≤ Y ) − 1/2. Consider the null hypothesis H0 :
θ = 0 against the one-sided alternative H1 : θ > 0. This problem arises in
many applications including testing whether the physiological performance
of an active drug is better than that under the control treatment, and testing
the effects of a policy, such as unemployment insurance or a vocational
training program, on the level of unemployment.
18
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
The Mann–Whitney (M–W) test [Mann and Whitney (1947)], also known
as the two-sample Wilcoxon test [Wilcoxon (1945)], is prevalently used for
testing equality of means or medians, and serves as a nonparametric alternative to the two-sample t-test. The corresponding test statistic is given
by
n
(3.9)
n
2
1 X
1 X
Un̄ =
I{Xi ≤ Yj },
n1 n2
n̄ = (n1 , n2 ).
i=1 j=1
The M–W test is widely used in a wide range of fields including statistics, economics and biomedicine, due to its good efficiency and robustness
against parametric assumptions. Over one-third of the articles published
in Experimental Economics use the Mann–Whitney test and Okeh (2009)
reported that thirty percent of the articles in five biomedical journals published in 2004 used the Mann–Whitney test. For example, using the M–W U
test, Charness and Gneezy (2009) developed an experiment to test the conjecture that financial incentives help to foster good habits. They recorded
seven biometric measures (weight, body fat percentage, waist size, etc.) of
each participant before and after the experiment to assess the improvements
across treatments. Although the M–W test was originally introduced as a
rank statistic to test if the distributions of two related samples are identical, it has been prevalently used for testing equality of medians or means,
sometimes as an alternative to the two-sample t-test.
It was argued and formally examined recently in Chung and Romano
(2016) that the M–W test has generally been misused across disciplines. In
fact, the M–W test is only valid if the underlying distributions of the two
groups are identical. Nevertheless, when the purpose is to test the equality of
distributions, it is recommended to use a statistic, such as the Kolmogorov–
Smirnov or the Cramér–von Mises statistic, that captures the discrepancies
of the entire distributions rather than an individual parameter. More specifically, because the M–W test only recognizes deviation from θ = 0, it does
not have much power in detecting overall distributional discrepancies. Alternatively, the M–W test is frequently used to test the equality of medians.
However, Chung and Romano (2013) presented evidence that this is another
improper application of the M–W test and suggested to use the Studentized
median test.
Even when the M–W test is appropriately applied for testing H0 : θ = 0,
the asymptotic variance depends on the underlying distributions, unless
the two population distributions are identical. As Hall and Wilson (1991)
pointed out, the application of resampling to pivotal statistics has better
asymptotic properties in the sense that the rate of convergence of the actual
significance level to the nominal significance level is more rapid when the
19
STUDENTIZED TWO-SAMPLE U -STATISTICS
pivotal statistics are resampled. Therefore, it is natural to use the Studentized Mann–Whitney test, which is asymptotic pivotal.
Let
bn̄ = σ
U
bn̄−1 (Un̄ − 1/2)
(3.10)
bn̄2 = σ
b12 n−1
denote the Studentized test statistic for Un̄ as in (3.9), where σ
1 +
−1
2
σ
b2 n2 ,
!2
!2
n1
n2
n1
n2
1 X
1 X
1 X
1 X
2
2
qi −
pj −
qi ,
pj
σ
b2 =
σ
b1 =
n1 − 1
n1
n2 − 1
n2
i=1
j=1
i=1
j=1
−1 Pn1
−1 Pn2
with qi = n2
i=1 I{Xi ≤ Yj }.
j=1 I{Yj < Xi } and pj = n1
When dealing with samples from a large number of geographical regions (suburbs, states, health service areas, etc.), one may need to make
many statistical inferences simultaneously. Suppose we observe a family
of paired groups, that is, for k = 1, . . . , m, Xk = {X1,k , . . . , Xn1 ,k }, Yk =
{Y1,k , . . . , Yn2 ,k }, where the index k denotes the kth site. Assume that Xk is
drawn from Fk , and independently, Yk is drawn from Gk .
For each k = 1, . . . , m, we test the null hypothesis H0k : θk = P(X1,k ≤
Y1,k )−1/2 = 0 against the one-sided alternative H1k : θk > 0. If H0k is rejected,
we conclude that the treatment effect (of a drug or a policy) is acting within
the kth area. Define the test statistic
−1
bn̄,k = σ
U
bn̄,k
(Un̄,k − 1/2),
bn̄,k is constructed from the kth paired samples according to (3.10).
where U
Let
bn̄,k ≤ t|H k )
Fn̄,k (t) = P(U
0
and Φ(t) = P(Z ≤ t),
where Z is the standard normal random variable. Then the true p-values
bn̄,k ), and pbk = 1 − Φ(U
bn̄,k ) denote the estimated p-values
are pk = 1 − Fn̄,k (U
based on normal calibration.
To identify areas where the treatment effect is acting, we can use the
B–H method to control the FDR at α level by rejecting the null hypotheses
indexed by S = {1 ≤ k ≤ m : pbk ≤ pb(k̂) }, where k̂ = max{1 ≤ k ≤ m : pb(k) ≤
αk/m}, and {b
p(k) } denote the ordered values of {b
pk }. As before, let FDRΦ
be the FDR of the B–H method based on normal calibration.
Alternative to normal calibration, we can also consider bootstrap calibra†
†
†
†
tion. Recall that Xk,b
= {X1,k,b
, . . . , Xn† 1 ,k,b } and Yk,b
= {Y1,k,b
, . . . , Yn†2 ,k,b },
b = 1, . . . , B, are two bootstrap samples drawn independently and uniformly,
with replacement, from Xk = {X1,k , . . . , Xn1 ,k } and Yk = {Y1,k , . . . , Yn2 ,k }, reb†
spectively. For each k = 1, . . . , m, let U
n̄,k,b be the bootstrapped test statistic
20
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
†
†
constructed from Xk,b
and Yk,b
, that is,
#
"
n2
n1 X
X
1
†
−1
b
I{Xi,k ≤ Yj,k } ,
U
bn̄,k,b Un̄,k,b −
n̄,k,b = σ
n1 n2
i=1 j=1
where Un̄,k,b and σ
bn̄,k,b are the analogues of Un̄ given in (3.9) and σ
bn̄ specified
†
†
below (3.10) via replacing Xi and Yj by Xi,k,b
and Yj,k,b
, respectively. Using
the empirical distribution function
m
B
XX
b † | ≤ t},
b† (t) = 1
I{|U
G
n̄,k,b
m,B
mB
k=1 b=1
b† (U
b † ). For a predewe estimate the unknown p-values by pbk,B = 1 − G
m,B
n̄,k,b
termined α ∈ (0, 1), the null hypotheses indexed by SB = {1 ≤ k ≤ m : pbk,B ≤
pb(k̂B ),B } are rejected, where k̂B = max{0 ≤ k ≤ m : pbk,B ≤ αk/m}. Denote by
FDRB the FDR of the B–H method based on bootstrap calibration.
Applying the general moderate deviation result (2.9) to Studentized Mann–
bn̄,k leads to the following result. The proof is based on
Whitney statistics U
a straightforward adaptation of the arguments we used in the proof of Theorem 3.1, and hence is omitted.
Theorem 3.5. Assume that {X1 , . . . , Xm , Y1 , . . . , Ym } are independent
random variables with continuous distribution functions Xk ∼ Fk and Yj ∼
Gk . The triplet (n1 , n2 , m) is such that n1 ≍ n2 , m = m(n1 , n2 ) → ∞, log m =
o(n1/3 ) and m−1 #{k = 1, . . . , m : θk = 1/2} → π0 ∈ (0, 1] as n = n1 ∧ n2 →
1
2
∞. For independent samples {Xi,1 , . . . , Xi,m }ni=1
and {Yj,1 , . . . , Yj,m}nj=1
, suppose that min1≤k≤m min(σ1k , σ2k ) ≥ c > 0 for some constant c > 0 and as
n → ∞,
#{1 ≤ k ≤ m : |θk − 1/2| ≥ 4(log m)1/2 σn̄,k } → ∞,
2 = var{G (X )}, σ 2 = var{F (Y )} and σ 2 = σ 2 n−1 + σ 2 n−1 .
where σ1k
k k
k
k
2k 2
1k 1
n̄,k
2k
Then as n → ∞, FDPΦ , FDPB →P απ0 and FDRΦ , FDRB → απ0 .
Attractive properties of the bootstrap for multiple-hypothesis testing were
first noted by Hall (1990) in the case of the mean rather than its Studentized
counterpart. Now it has been rigorously proved that bootstrap methods
are particularly effective in relieving skewness in the extreme tails which
leads to second-order accuracy [Fan, Hall and Yao (2007), Delaigle, Hall
and Jin (2011)]. It is interesting and challenging to investigate whether these
advantages of the bootstrap can be inherited by multiple U -testing in either
the standardized or the Studentized case.
21
STUDENTIZED TWO-SAMPLE U -STATISTICS
4. Numerical study. In this section, we present numerical investigations
for various calibration methods described in Section 3 when they are applied to two-sample large-scale multiple testing problems. We refer to the
simulation for two-sample t-test and Studentized Mann–Whitney test as
Sim1 and Sim2 , respectively. Assume that we observe two groups of m1
2
dimensional gene expression data {Xi }ni=1
and {Yj }nj=1
, where X1 , . . . , Xn1
and Y1 , . . . , Yn2 are independent random samples drawn from the distributions of X and Y, respectively.
For Sim1 , let X and Y be such that
(4.1)
X = µ1 + {ε1 − E(ε1 )} and
Y = µ2 + {ε2 − E(ε2 )},
where ε1 = (ε1,1 , . . . , ε1,m )T and ε2 = (ε2,1 , . . . , ε2,m )T are two sets of i.i.d.
random variables. The i.i.d. components of noise vectors ε1 and ε2 follow two
types of distributions: (i) the exponential distribution Exp(λ) with density
function λ−1 e−x/λ ; (ii) Student t-distribution t(k) with k degrees of freedom.
The exponential distribution has nonzero skewness, while the t-distribution
is symmetric and heavy-tailed. For each type of error distribution, both cases
of homogeneity and heteroscedasticity were considered. Detailed settings for
the error distributions are specified in Table 1.
For Sim2 , we assume that X and Y satisfy
(4.2)
X = µ1 + ε1
and
Y = µ2 + ε2 ,
where ε1 = (ε1,1 , . . . , ε1,m )T and ε2 = (ε2,1 , . . . , ε2,m )T are two sets of i.i.d.
random variables. We consider several distributions for the error terms ε1,k
and ε2,k : standard normal distribution N (0, 1), t-distribution t(k), uniform
distribution U (a, b) and Beta distribution Beta(a, b). Table 2 reports four
settings of (ε1,k , ε2,k ) used in our simulation. In either setting, we know
P(ε1,k ≤ ε2,k ) = 1/2 holds. Hence, the power against the null hypothesis
H0k : P(Xk ≤ Yk ) = 1/2 will generate from the magnitude of the difference
between the kth components of µ1 and µ2 .
In both Sim1 and Sim2 , we set µ1 = 0, and assume that the first m1 =
1/2 and
2 −1
⌊1.6m1/2 ⌋ components of µ2 are equal to c{(σ12 n−1
1 + σ2 n2 ) log m}
2
2
the rest are zero. Here, σ1 and σ2 denote the variance of ε1,k and ε2,k , and
Table 1
Distribution settings in Sim1
Exponential distributions
Student t-distributions
Homogeneous case
Heteroscedastic case
ε1,k ∼ Exp(2)
ε2,k ∼ Exp(2)
ε1,k ∼ Exp(2)
ε2,k ∼ Exp(1)
ε1,k ∼ t(4)
ε2,k ∼ t(4)
ε1,k ∼ t(4)
ε2,k ∼ t(3)
22
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
Table 2
Distribution settings in Sim2
Identical distributions
Nonidentical distributions
Case 1
ε1,k ∼ N (0, 1)
ε2,k ∼ N (0, 1)
ε1,k ∼ N (0, 1)
ε2,k ∼ t(3)
Case 2
ε1,k ∼ U (0, 1)
ε2,k ∼ U (0, 1)
ε1,k ∼ U (0, 1)
ε2,k ∼ Beta(10, 10)
c is a parameter employed to characterize the location discrepancy between
the distributions of X and Y. The sample size (n1 , n2 ) was set to be (50, 30)
and (100, 60), and the discrepancy parameter c took values in {1, 1.5}. The
significance level α in the B–H procedure was specified as 0.05, 0.1, 0.2 and
0.3, and the dimension m was set to be 1000 and 2000. In Sim1 , we compared
three different methods to calculate the p-values in the B–H procedure: normal calibration given in Section 3.1.1, bootstrap calibration and regularized
bootstrap calibration proposed in Section 3.1.2. For regularized bootstrap
calibration, we used a cross-validation approach as in Section 3 of Liu and
Shao (2014) to choose regularized parameters λ1k and λ2k . In Sim2 , we
compared the performance of normal calibration and bootstrap calibration
proposed in Section 3.2. For each compared method, we evaluated its performance via two indices: the empirical FDR and the proportion among the
true alternative hypotheses was rejected. We call the latter correct rejection
proportion. If the empirical FDR is low, the proposed procedure has good
FDR control; if the correct rejection proportion is high, the proposed procedure has fairly good performance in identifying the true signals. For ease
of exposition, we only report the simulation results for (n1 , n2 ) = (50, 30)
and m = 1000 in Figures 1 and 2. The results for (n1 , n2 ) = (100, 60) and
m = 2000 are similar, which can be found in the supplementary material
[Chang, Shao and Zhou (2016)]. Each curve corresponds to the performance
of a certain method and the line types are specified in the caption below.
The horizontal ordinates of the four points on each curve depict the empirical FDR of the specified method when the pre-specified level α in the B–H
procedure was taken to be 0.05, 0.1, 0.2 and 0.3, respectively, and the vertical
ordinates indicate the corresponding empirical correct rejection proportion.
We say that a method has good FDR control if the horizontal ordinates
of the four points on its performance curve are less than the prescribed α
levels.
In general, as shown in Figures 1 and 2, the B–H procedure based on
(regularized) bootstrap calibration has better FDR control than that based
on normal calibration. In Sim1 where the errors are symmetric (e.g., ε1,k and
ε2,k follow the Student t-distributions), the panels in the first row of Figure 1 show that the B–H procedures using all the three calibration methods
STUDENTIZED TWO-SAMPLE U -STATISTICS
23
Fig. 1. Performance comparison of B–H procedures based on three calibration methods in Sim1 with (n1 , n2 ) = (50, 30) and m = 1000. The first and second rows show the
results when the components of noise vectors ε1 and ε2 follow t-distributions and exponential distributions, respectively; left and right panels show the results for homogeneous
and heteroscedastic cases, respectively; horizontal and vertical axes depict empirical false
discovery rate and empirical correct rejection proportion, respectively; and the prescribed
levels α = 0.05, 0.1, 0.2 and 0.3 are indicated by unbroken horizontal black lines. In each
panel, dashed lines and unbroken lines represent the results for the discrepancy parameter
c = 1 and 1.5, respectively, and different colors express different methods employed to calculate p-values in the B–H procedure, where blue line, green line and red line correspond
to the procedures based on normal, conventional and regularized bootstrap calibrations,
respectively.
are able to control or approximately control the FDR at given levels, while
the procedures based on bootstrap and regularized bootstrap calibrations
outperform that based on normal calibration in controlling the FDR. When
the errors are asymmetric in Sim1 , the performances of the three B–H procedures are different from those in the symmetric cases. From the second row
of Figure 1, we see that the B–H procedure based on normal calibration is
distorted in controlling the FDR while the procedure based on (regularized)
bootstrap calibration is still able to control the FDR at given levels. This
24
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
Fig. 2. Performance comparison of B–H procedures based on two different calibration
methods in Sim2 with (n1 , n2 ) = (50, 30) and m = 1000. The first and second rows show
the results when the components of noise vectors ε1 and ε2 follow the distributions specified in cases 1 and 2 of Table 2, respectively; left and right panels show the results for
the cases of identical distributions and nonidentical distributions, respectively; horizontal
and vertical axes depict empirical false discovery rate and empirical correct rejection proportion, respectively; and the prescribed levels α = 0.05, 0.1, 0.2 and 0.3 are indicated by
unbroken horizontal black lines. In each panel, dashed lines and unbroken lines represent
the results for the discrepancy parameter c = 1 and 1.5, respectively, and different colors
express different methods employed to calculate p-values in the B–H procedure, where blue
line and red line correspond to the procedures based on normal and bootstrap calibrations,
respectively.
phenomenon is further evidenced by Figure 2 for Sim2 . Comparing the B–H
procedures based on conventional and regularized bootstrap calibrations, we
find that the former approach is uniformly more conservative than the latter
in controlling the FDR. In other words, the B–H procedure based on regularized bootstrap can identify more true alternative hypotheses than that
using conventional bootstrap calibration. This phenomenon is also revealed
in the heteroscedastic case. As the discrepancy parameter c gets larger so
that the signal is stronger, the correct rejection proportion of the B–H pro-
STUDENTIZED TWO-SAMPLE U -STATISTICS
25
cedures based on all the three calibrations increase and the empirical FDR
is closer to the prescribed level.
5. Discussion. In this paper, we established Cramér-type moderate deviations for two-sample Studentized U -statistics of arbitrary order in a general framework where the kernel is not necessarily bounded. Two-sample
U -statistics, typified by the two-sample Mann–Whitney test statistic, have
been widely used in a broad range of scientific research. Many of these applications rely on a misunderstanding of what is being tested and the implicit
underlying assumptions, that were not explicitly considered until relatively
recently by Chung and Romano (2016). More importantly, they provided
evidence for the advantage of using the Studentized statistics both theoretically and empirically.
Unlike the conventional (one- and two-sample) U -statistics, the asymptotic behavior of their Studentized counterparts has barely been studied
in the literature, particularly in the two-sample case. Recently, Shao and
Zhou (2016) proved a Cramér-type moderate deviation theorem for general
Studentized nonlinear statistics, which leads to a sharp moderate deviation
result for Studentized one-sample U -statistics. However, extension from onesample to two-sample in the Studentized case is totally nonstraightforward,
and requires a more delicate analysis on the Studentizing quantities. Further,
for the two-sample t-statistic, we proved moderate deviation with secondorder accuracy under a finite 4th moment condition (see Theorem 2.4),
which is of independent interest. In contrast to the one-sample case, the
two-sample t-statistic cannot be reduced to a self-normalized sum of independent random variables, and thus the existing results on self-normalized
ratios [Jing, Shao and Wang (2003), Wang (2005, 2011)] cannot be directly
applied. Instead, we modify Theorem 2.1 in Shao and Zhou (2016) to obtain
a more precise expansion that can be used to derive a refined result for the
two-sample t-statistic.
Finally, we show that the obtained moderate deviation theorems provide
theoretical guarantees for the validity, including robustness and accuracy, of
normal, conventional bootstrap and regularized bootstrap calibration methods in multiple testing with FDR/FDP control. The dependence case is also
covered. These results represent a useful complement to those obtained by
Fan, Hall and Yao (2007), Delaigle, Hall and Jin (2011) and Liu and Shao
(2014) in the one-sample case.
Acknowledgements. The authors would like to thank Peter Hall and Aurore Delaigle for helpful discussions and encouragement. The authors sincerely thank the Editor, Associate Editor and three referees for their very
constructive suggestions and comments that led to substantial improvement
of the paper.
26
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
SUPPLEMENTARY MATERIAL
Supplement to “Cramér-type moderate deviations for Studentized twosample U -statistics with applications” (DOI: 10.1214/15-AOS1375SUPP;
.pdf). This supplemental material contains proofs for all the theoretical results in the main text, including Theorems 2.2, 2.4, 3.1 and 3.4, and additional numerical results.
REFERENCES
Benjamini, Y. and Hochberg, Y. (1995). Controlling the false discovery rate: A practical
and powerful approach to multiple testing. J. R. Stat. Soc. Ser. B. Stat. Methodol. 57
289–300. MR1325392
Benjamini, Y. and Yekutieli, D. (2001). The control of the false discovery rate in
multiple testing under dependency. Ann. Statist. 29 1165–1188. MR1869245
Borovskich, Y. V. (1983). Asymptotics of U -statistics and Von Mises’ functionals. Soviet
Math. Dokl. 27 303–308.
Cao, H. and Kosorok, M. R. (2011). Simultaneous critical values for t-tests in very high
dimensions. Bernoulli 17 347–394. MR2797995
Chang, J., Shao, Q. and Zhou, W.-X. (2016). Supplement to “Cramér-type
moderate deviations for Studentized two-sample U -statistics with applications.”
DOI:10.1214/15-AOS1375SUPP.
Chang, J., Tang, C. Y. and Wu, Y. (2013). Marginal empirical likelihood and sure
independence feature screening. Ann. Statist. 41 2123–2148. MR3127860
Chang, J., Tang, C. Y. and Wu, Y. (2016). Local independence feature screening
for nonparametric and semiparametric models by marginal empirical likelihood. Ann.
Statist. 44 515–539. MR3476608
Charness, G. and Gneezy, U. (2009). Incentives to exercise. Econometrica 77 909–931.
Chen, S. X. and Qin, Y.-L. (2010). A two-sample test for high-dimensional data with
applications to gene-set testing. Ann. Statist. 38 808–835. MR2604697
Chen, L. H. Y. and Shao, Q.-M. (2007). Normal approximation for nonlinear statistics
using a concentration inequality approach. Bernoulli 13 581–599. MR2331265
Chen, S. X., Zhang, L.-X. and Zhong, P.-S. (2010). Tests for high-dimensional covariance matrices. J. Amer. Statist. Assoc. 105 810–819. MR2724863
Chung, E. and Romano, J. P. (2013). Exact and asymptotically robust permutation
tests. Ann. Statist. 41 484–507. MR3099111
Chung, E. and Romano, J. (2016). Asymptotically valid and exact permutation tests
based on two-sample U -statistics. J. Statist. Plann. Inference. 168 97–105. MR3412224
Delaigle, A., Hall, P. and Jin, J. (2011). Robustness and accuracy of methods for high
dimensional data analysis based on Student’s t-statistic. J. R. Stat. Soc. Ser. B. Stat.
Methodol. 73 283–301. MR2815777
Dudoit, S. and van der Laan, M. J. (2008). Multiple Testing Procedures with Applications to Genomics. Springer, New York. MR2373771
Fan, J., Hall, P. and Yao, Q. (2007). To how many simultaneous hypothesis tests can
normal, Student’s t or bootstrap calibration be applied? J. Amer. Statist. Assoc. 102
1282–1288. MR2372536
Fan, J., Han, X. and Gu, W. (2012). Estimating false discovery proportion under arbitrary covariance dependence. J. Amer. Statist. Assoc. 107 1019–1035. MR3010887
Ferreira, J. A. and Zwinderman, A. H. (2006). On the Benjamini–Hochberg method.
Ann. Statist. 34 1827–1849. MR2283719
STUDENTIZED TWO-SAMPLE U -STATISTICS
27
Friguet, C., Kloareg, M. and Causeur, D. (2009). A factor model approach to multiple testing under dependence. J. Amer. Statist. Assoc. 104 1406–1415. MR2750571
Hall, P. (1990). On the relative performance of bootstrap and Edgeworth approximations
of a distribution function. J. Multivariate Anal. 35 108–129. MR1084945
Hall, P. and Wilson, S. R. (1991). Two guidelines for bootstrap hypothesis testing.
Biometrics 47 757–762. MR1132543
Helmers, R. and Janssen, P. (1982). On the Berry–Esseen theorem for multivariate
U -statistics. In Math. Cent. Rep. SW 90 1–22. Mathematisch Centrum, Amsterdam.
Hoeffding, W. (1948). A class of statistics with asymptotically normal distribution. Ann.
Math. Statistics 19 293–325. MR0026294
Jing, B.-Y., Shao, Q.-M. and Wang, Q. (2003). Self-normalized Cramér-type large
deviations for independent random variables. Ann. Probab. 31 2167–2215. MR2016616
Kochar, S. C. (1979). Distribution-free comparison of two probability distributions with
reference to their hazard rates. Biometrika 66 437–441. MR0556731
Koroljuk, V. S. and Borovskich, Y. V. (1994). Theory of U -Statistics. Mathematics
and Its Applications 273. Kluwer Academic, Dordrecht. MR1472486
Kosorok, M. R. and Ma, S. (2007). Marginal asymptotics for the “large p, small
n” paradigm: With applications to microarray data. Ann. Statist. 35 1456–1486.
MR2351093
Kowalski, J. and Tu, X. M. (2007). Modern Applied U -Statistics. Wiley, Hoboken, NJ.
MR2368050
Lai, T. L., Shao, Q.-M. and Wang, Q. (2011). Cramér type moderate deviations for
Studentized U -statistics. ESAIM Probab. Stat. 15 168–179. MR2870510
Leek, J. T. and Storey, J. D. (2008). A general framework for multiple testing dependence. Proc. Natl. Acad. Sci. USA 105 18718–18723.
Li, R., Zhong, W. and Zhu, L. (2012). Feature screening via distance correlation learning.
J. Amer. Statist. Assoc. 107 1129–1139. MR3010900
Li, G., Peng, H., Zhang, J. and Zhu, L. (2012). Robust rank correlation based screening.
Ann. Statist. 40 1846–1877. MR3015046
Liu, W. and Shao, Q.-M. (2010). Cramér-type moderate deviation for the maximum of
the periodogram with application to simultaneous tests in gene expression time series.
Ann. Statist. 38 1913–1935. MR2662363
Liu, W. and Shao, Q.-M. (2014). Phase transition and regularized bootstrap in largescale t-tests with false discovery rate control. Ann. Statist. 42 2003–2025. MR3262475
Mann, H. B. and Whitney, D. R. (1947). On a test of whether one of two random variables is stochastically larger than the other. Ann. Math. Statistics 18 50–60. MR0022058
Nikitin, Y. and Ponikarov, E. (2006). On large deviations of nondegenerate two-sample
U - and V -statistics with applications to Bahadur efficiency. Math. Methods Statist. 15
103–122. MR2225432
Okeh, U. M. (2009). Statistical analysis of the application of Wilcoxon and Mann–
Whitney U test in medical research studies. Biotechnol. Molec. Biol. Rev. 4 128–131.
Shao, Q.-M. and Zhou, W.-X. (2016). Cramér type moderate deviation theorems for
self-normalized processes. Bernoulli 22 2029–2079.
Storey, J. D., Taylor, J. E. and Siegmund, D. (2004). Strong control, conservative
point estimation and simultaneous conservative consistency of false discovery rates: A
unified approach. J. R. Stat. Soc. Ser. B. Stat. Methodol. 66 187–205. MR2035766
Vandemaele, M. and Veraverbeke, N. (1985). Cramér type large deviations for Studentized U -statistics. Metrika 32 165–179. MR0824452
Wang, Q. (2005). Limit theorems for self-normalized large deviation. Electron. J. Probab.
10 1260–1285 (electronic). MR2176384
28
J. CHANG, Q.-M. SHAO AND W.-X. ZHOU
Wang, Q. (2011). Refined self-normalized large deviations for independent random variables. J. Theoret. Probab. 24 307–329. MR2795041
Wang, Q. and Hall, P. (2009). Relative errors in central limit theorems for Student’s t
statistic, with applications. Statist. Sinica 19 343–354. MR2487894
Wang, Q., Jing, B.-Y. and Zhao, L. (2000). The Berry–Esseen bound for Studentized
statistics. Ann. Probab. 28 511–535. MR1756015
Wilcoxon, F. (1945). Individual comparisons by ranking methods. Biometrics 1 80–83.
Zhong, P.-S. and Chen, S. X. (2011). Tests for high-dimensional regression coefficients
with factorial designs. J. Amer. Statist. Assoc. 106 260–274. MR2816719
J. Chang
School of Statistics
Southwestern University of Finance
and Economics
Chengdu, Sichuan 611130
China
and
School of Mathematics and Statistics
University of Melbourne
Parkville, Victoria 3010
Australia
E-mail: [email protected]
Q.-M. Shao
Department of Statistics
Chinese University of Hong Kong
Shatin, NT
Hong Kong
E-mail: [email protected]
W.-X. Zhou
Department of Operations Research
and Financial Engineering
Princeton University
Princeton, New Jersey 08544
USA
and
School of Mathematics and Statistics
University of Melbourne
Parkville, Victoria 3010
Australia
E-mail: [email protected]
| 10math.ST
|
A Unified Method for First and Third Person Action
Recognition
Ali Javidani
Ahmad Mahmoudi-Aznaveh
Department of Computer Science and Engineering
Shahid Beheshti University
Tehran, Iran
[email protected]
Cyberspace Research Center
Shahid Beheshti University
Tehran, Iran
[email protected]
Keywords—Video
Classification;
Human
Action
Recognition; Deep Learning; Convolutional Neural Network
(CNN); Optical Flow
motion and recognizing activities in them is highly
challenging [3]. Due to the fact that circumstances of camera
and recording actions are completely different from each
other in the first and third person videos, there exist two
main approaches for classifying each group and to the best of
our knowledge, there does not exist a unified method that
works perfectly for both.
The main motivation of our work is to provide a unified
framework which can classify both first and third-person
videos. Toward this goal, two complementary streams are
designed to capture motion and appearance features of video
data. The motion stream is based on calculating optical flow
images to estimate short-term motion in video and by
following them over time, using PoT representation method
with different pooling operators, long-term motion dynamics
are extracted efficiently. The appearance stream is obtained
via describing the middle frame of the input video utilizing
pre-trained networks. Our method is evaluated on two
different datasets UCF11 (third-person) [1] and DogCentric
(first-person) [2]. It is demonstrated that the proposed
method achieves high accuracy for both datasets.
I. INTRODUCTION
II. RELATED WORKS
Video recognition is one of the popular fields in artificial
intelligence that aims to detect and recognize ongoing events
from videos. This can help humans to inject vision to robots
in order to assist them in different situations. For instance,
one of the most prominent applications of video
classification is driver-less cars which are going to become
available in the market.
Totally, there are two main categories of videos that
researchers conduct their experiments on them: third-person
and first-person videos. In third-person videos, most of the
times, camera is located in a specific place without any
movement or scarcely with a slight movement and records
the actions of humans [1]; while, in first-person videos the
person wears the camera and involves directly in events [2].
This is the reason that first-person videos are full of ego-
In general, there are two major approaches for
classifying videos: Traditional and Modern approaches.
Traditional ones are based on descriptors which try to detect
different aspects of each action. At the first step, features of
video segments are extracted. These features can be interest
points or dense points obtained from raw input frames[4, 5].
Harris3D is one of the ways to obtain 3D corner points from
video[6]. Then feature points are described by handcrafted
descriptors such as HOG[7], HOF[8] and MBH[9]. To
describe features more effectively, some of these descriptors
have been extended to 3 dimensions to incorporate temporal
information in their calculations. HOG3D[10] and
SIFT3D[11] are two of the most popular ones.
Abstract—In this paper, a new video classification
methodology is proposed which can be applied in both first and
third person videos. The main idea behind the proposed
strategy is to capture complementary information of
appearance and motion efficiently by performing two
independent streams on the videos. The first stream is aimed to
capture long-term motions from shorter ones by keeping track
of how elements in optical flow images have changed over time.
Optical flow images are described by pre-trained networks
that have been trained on large scale image datasets. A set of
multi-channel time series are obtained by aligning descriptions
beside each other. For extracting motion features from these
time series, PoT representation method plus a novel pooling
operator is followed due to several advantages. The second
stream is accomplished to extract appearance features which
are vital in the case of video classification. The proposed
method has been evaluated on both first and third-person
datasets and results present that the proposed methodology
reaches the state of the art successfully.
Raw Frames
Optical Flow
Motion Feature
Vector
Description
Description
Final Feature
Vector
PoT (Max-SumHistogram of time
series gradientVariance)
Multi-Class
SVM
Description
Middle
Frame
Description
Appearance
Feature Vector
Figure 1:General pipeline of the proposed methodology. Our framework has two streams for obtaining motion and appearance features. The top stream
extracts motion, while the bottom extracts appearance features.
Following feature extraction and description phases, in
order to obtain a constant-length feature vector and
becoming independent of some variables, such as number of
frames for each video or number of interest points, an
encoding step is required. For so doing, encoding methods
like Bag of Visual Words (BoVW) [12], Fisher kernel[13]
have been used till now. The experiments illustrate that
fisher kernel is more accurate than the former one.
However, recently PoT encoding method was proposed by
Ryoo et al. and it could reach state-of-the-art results in the
case of first-person videos[3].
Modern approaches are mostly based on deep learning.
Convolutional Neural Networks (CNNs) could succeed in
giving the best results on image recognition, image
segmentation and so forth. Although one problem in the
case of video domain is that these networks are designed for
two-dimensional input images. To address this problem,
some researches have been conducted. As a case in point,
Karpathy et al. introduced four models of two-dimensional
but multi-channel CNNs and in their models time dimension
was incorporated in different channels of the network[14].
Zisserman et al. proposed two stream CNN model to classify
videos. However, their method suffers from the problem that
the number of stacked optical flow frames given to CNN is
limited due to the problem of overfitting of the network[15].
Furthermore for better estimation of motions in video, a
3-dimensional convolutional neural network (C3D) was
devised[16]. All convolution and pooling layers in C3D
operate 3-d and the depth of time dimension convolution is a
small number due to the vast amount of convolution
calculations. Hence, it can only capture the short-term
motion dynamics and longer ones would be lost by using this
network. A recent work used stacked auto-encoders to obtain
tractable dimensionality for the case of first-person
videos[17]. Also another work designed a deep fusion
framework in which by the aid of LSTMs, representative
temporal information have been extracted and could reach
state-of-the-art results on three widely used datasets[18].
III. PROPOSED METHOD
In this section, we introduce our proposed method
pipeline. Generally videos, either third-person or first-person,
consist of two different aspects: appearance and motion.
Appearance is related to detecting and recognizing existing
objects in each frame, while motion is their following over
time. Hence, motion information is highly correlated with
temporal dimension. As it is depicted in Fig. 1, in order to
capture two mentioned aspects in video, our proposed
framework has two streams independent of each other. The
upper stream is for extracting motion and the bottom is for
appearance features.
In the following, motion feature extraction is explained in
more detail. Firstly the images of optical flow between
consecutive frames are calculated. This helps to estimate
short-term motion through nearby frames for each video.
However, estimating long-term motion is strictly challenging
and is an open area of research.
Here, the idea is to keeping track of how short-term
motion elements vary over time to estimate longer changes.
Therefore, optical flow images should be described by a
specific set of features to be pursued over the time
dimension. We found that the best way for doing so is
utilizing pre-trained networks that already have been trained
on large scale image datasets. By doing this, not only
training of network, which is a highly time consuming
process, is not needed but also a strong representation would
be obtained since these networks could reach state-of-the-art
results for image recognition.
Aligning representation of sequential frames beside each
other leads to obtaining a set of multi-channel time series.
There are various ways to extract features from time series.
For doing so, PoT representation plus a novel pooling
operator is chosen due to several prominent reasons. Firstly,
thanks to the temporal filters, time series are break down to
sub-intervals which assists to represent high-level activity
from lower levels. Furthermore, PoT is benefited from
extracting different features from time series that each of
them can represent different aspects of data. The resulted
time series, especially those coming from first person videos
which are full of ego-motion, are more sophisticated than a
specific feature (e.g. max) can represent them. As a result,
PoT framework can be beneficial for extracting motion
features from time series.
PoT representation method extracts different features
max, sum and histogram of time series gradient from time
series. The final feature vector representation, which is
designed to be motion features in our framework, is the
concatenation of all of these features together for each time
series. We add variance as another pooling operator to the
pooling set and demonstrate that this feature can also extracts
useful information. Below is the definition of each pooling
operator in the time domain [ts , te]. fi(t)is the value of ith time
series in time t. The max and sum pooling operators are
defined as:
[
]
[
(1)
]
∑
(2)
And the histograms of time series gradient pooling
operators are defined as:
[
]
[
∑
]
∑
(3)
where
{
{
(
)
(4)
(
)
(5)
We proposed variance as a new pooling operator as
follows:
(
)̅
(6)
[
] ∑
̅
Figure 2: Some sample frames from different classes of two different
datasets UCF11 (left) and DogCentric (right).
vectors that are expected to represent complementary
information. As the last step, a SVM is trained on the final
feature vector.
IV. EXPERIMENTAL RESULTS
We conducted our experiments on two public datasets:
UCF11 and DogCentric. Fig. 2 represents some sample
frames of them. UCF11 is a third-person type which contains
11 different human activities e.g. playing basketball,
volleyball and it consists of about 1600 human activity
videos. In this dataset camera is not usually located in a
specific place and it has large amounts of movement. To
evaluate our method, we performed Leave One Out Cross
Validation (LOOCV) on this dataset as in the original
work[1].
DogCentric is a first-person activity dataset in which a
camera is located on the back of dogs. Thus, it has large
amounts of ego-motion which makes it highly challenging
[2]. It has 10 class activities consisting activities of dogs
such as walking and drinking as well as interacting with
humans. The total number of videos in this dataset is 209.
Like other previous methods, half of the total number of
videos per class is used as training and the other half is used
as testing. For classes with odd number of clips, the number
TABLE 1: COMPARISON OF THE ENCODING METHODS ON
THE DOGCENTRIC DATASET. F1-SCORES PER CLASS AND FINAL
CLASSIFICATION ACCURACY.
Activity Class
∑
(7)
Besides, in order to concentrate better on the resulted
time series, temporal pyramid filters are applied on each
series. Hence, the resultant time series are: the whole time
domain, half-parts of the whole time domain, one-fourth
parts and so forth.
Motion features are extracted as explained above by
applying pooling operators on each level of the resulted time
series after exploiting temporal pyramid filters. On the other
hand, appearance features have substantial role in classifying
videos. In our pipeline, we used middle frame of each video
and feed it to a pre-trained network to obtain appearance
feature vector. The final representation for each video is
acquired from concatenating motion and appearance feature
Ball Play
Car
Drink
Feed
Turn Head(left)
Turn Head(right)
Pet
Body Shake
Sniff
Walk
Final accuracy
BoVW
48.29
73.23
12.60
50.62
29.73
50.44
42.85
41.33
54.93
44.69
47.39
Method Accuracy (%)
IFV
PoT
Proposed
61.46
81.54
45.23
57.64
31.13
31.82
74.66
89.54
64.02
67.65
46.54
64.23
44.91
55.68
78.34
72.70
75.51
56.42
65.00
59.41
29.15
35.57
74.73
89.60
64.34
57.35
32.96
36.85
77.23
72.76
76.10
56.87
67.12
of test instances is one more than number of training. We
performed our algorithm 100 times with different
permutation for train and test sets. The mean classification
accuracy is reported in Table 1. It is clear that the proposed
method has been achieved a significant improvement in
terms of classification accuracy in compare with two
traditional representation methods Bag of Visual Words
(BoVW) and Improved Fisher Vector (IFV). In addition, the
proposed method could outperform the baseline PoT method
in most classes of the DogCentric dataset and also in the
final accuracy.
For obtaining optical flow images of consecutive
frames, we used popular method of HORN & SCHUNCK
[19]. To convert it to colorful images, in order to be fed to
pre-trained networks, flow visualization code of Baker et al.
[20] was followed. In our implementation, this method was
applied to all frames of each video and we did not sample
the existing frames. GoogleNet as a pre-trained network is
utilized to describe either optical flow images (in motion
stream) or middle frame (in appearance stream). This was
feasible by omitting softmax and fully-connected layers of
TABLE 2: COMPARISON OF CLASSIFICATION ACCURACY OF
THE DOGCENTRIC DATASET ACCORDING TO TEMPORAL
PYRAMID LEVELS.
Number of temporal
pyramids
1
2
3
4
5
Classification
accuracy
58.25%
59.66%
66.33%
67.12%
66.85%
TABLE 3: COMPARISON OF OUR RESULTS TO THE STATE-OFTHE-ART APPROACHES ON UCF11 DATASET.
Method
Accuracy
Hasan et al. [21]
Liu et al. [1]
Ikizler-Cinbis et al. [22]
Dense Trajectories[23]
Soft attention[24]
Cho et al. [25]
54.5%
71.2%
75.2%
84.2%
84.9%
88.0%
Snippets[26]
Two Stream LSTM(conv-L) [18]
Two Stream LSTM(fc-L) [18]
89.5%
89.2%
93.7%
Proposed method(Linear SVM)
Two Stream LSTM(fu1) [18]
Two Stream LSTM(fu2) [18]
93.75%
94.2%
94.6%
Proposed method(chi-squared SVM)
95.73%
the network. GoogleNet has 1024 neurons in this layer.
Furthermore in the case of number of temporal
pyramids, different experiments have been conducted and
results are illustrated in the Table 2. It can be seen that by
increasing the number of temporal pyramids up to 4 levels,
the classification accuracy has been improved. While by
increasing it to five levels, it has decreased in compare with
four levels. We believe this phenomenon is due to the fact
that by increasing the temporal pyramid levels, the number
of dimensionality would increase dramatically. On the other
hand, there do not exist enough training data for learning the
classifier. This is the reason that increasing number of
temporal pyramids cannot always improve the performance
of the system.
The proposed method is also evaluated on third-person
video dataset UCF11. The number of temporal pyramids
used for this dataset is 3 and sampling between frames was
not performed. Comparison of our method to the state-ofthe-art results on this dataset is reported in Table 3. As can
be seen, the proposed method with chi-squared SVM could
reach the best results on this dataset.
In all our experiments SVM classifier with linear and
chi-squared kernel is used and the later one showed better
performances.
V. CONCLUSION
In this paper, a new approach for video classification
was proposed which has the capability of employing for two
different categories of first and third-person videos. Shortterm/long-term motion changes are calculated by extracting
discriminant features from motion time series following PoT
representation method with a novel pooling operator. Final
feature vector is resulted from concatenating two
complementary feature vectors of appearance and motion to
perform the classification. By evaluating the proposed
method on two different types of datasets and comparing the
obtained results to the state of the art, it is concluded that the
proposed method not only works perfectly for both groups
but also increases the accuracy.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
J. Liu, J. Luo, and M. Shah, "Recognizing realistic actions from
videos “in the wild”," in Computer vision and pattern
recognition, 2009. CVPR 2009. IEEE conference on, 2009, pp.
1996-2003.
Y. Iwashita, A. Takamine, R. Kurazume, and M. S. Ryoo,
"First-person animal activity recognition from egocentric
videos," in Pattern Recognition (ICPR), 2014 22nd
International Conference on, 2014, pp. 4310-4315.
M. S. Ryoo, B. Rothrock, and L. Matthies, "Pooled motion
features for first-person videos," in Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, 2015,
pp. 896-904.
L. Liu, L. Shao, F. Zheng, and X. Li, "Realistic action
recognition via sparsely-constructed Gaussian processes,"
Pattern Recognition, vol. 47, pp. 3819-3827, 2014.
J. R. Uijlings, I. Duta, N. Rostamzadeh, and N. Sebe, "Realtime
video classification using dense HOF/HOG," in Proceedings of
International Conference on Multimedia Retrieval, 2014, p. 145.
I. Laptev, "On space-time interest points," International Journal
of Computer Vision, vol. 64, pp. 107-123, 2005.
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
N. Dalal and B. Triggs, "Histograms of oriented gradients for
human detection," in 2005 IEEE Computer Society Conference
on Computer Vision and Pattern Recognition (CVPR'05), 2005,
pp. 886-893.
N. Dalal, B. Triggs, and C. Schmid, "Human detection using
oriented histograms of flow and appearance," in European
conference on computer vision, 2006, pp. 428-441.
H. Wang and C. Schmid, "Action recognition with improved
trajectories," in Proceedings of the IEEE International
Conference on Computer Vision, 2013, pp. 3551-3558.
A. Klaser, M. Marszałek, and C. Schmid, "A spatio-temporal
descriptor based on 3d-gradients," in BMVC 2008-19th British
Machine Vision Conference, 2008, pp. 275: 1-10.
P. Scovanner, S. Ali, and M. Shah, "A 3-dimensional sift
descriptor and its application to action recognition," in
Proceedings of the 15th ACM international conference on
Multimedia, 2007, pp. 357-360.
G. Csurka, C. Dance, L. Fan, J. Willamowski, and C. Bray,
"Visual categorization with bags of keypoints," in Workshop on
statistical learning in computer vision, ECCV, 2004, pp. 1-2.
G. Csurka and F. Perronnin, "Fisher vectors: Beyond bag-ofvisual-words image representations," in International
Conference on Computer Vision, Imaging and Computer
Graphics, 2010, pp. 28-42.
A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar,
and L. Fei-Fei, "Large-scale video classification with
convolutional neural networks," in Proceedings of the IEEE
conference on Computer Vision and Pattern Recognition, 2014,
pp. 1725-1732.
K. Simonyan and A. Zisserman, "Two-stream convolutional
networks for action recognition in videos," in Advances in
Neural Information Processing Systems, 2014, pp. 568-576.
D. Tran, L. Bourdev, R. Fergus, L. Torresani, and M. Paluri,
"C3D: generic features for video analysis," CoRR,
abs/1412.0767, vol. 2, p. 7, 2014.
X. Wang, L. Gao, J. Song, X. Zhen, N. Sebe, and H. T. Shen,
"Deep appearance and motion learning for egocentric activity
recognition," Neurocomputing, vol. 275, pp. 438-447, 2018.
H. Gammulle, S. Denman, S. Sridharan, and C. Fookes, "Two
Stream LSTM: A Deep Fusion Framework for Human Action
Recognition," in Applications of Computer Vision (WACV),
2017 IEEE Winter Conference on, 2017, pp. 177-186.
B. K. Horn and B. G. Schunck, "Determining optical flow,"
Artificial intelligence, vol. 17, pp. 185-203, 1981.
S. Baker, D. Scharstein, J. Lewis, S. Roth, M. J. Black, and R.
Szeliski, "A database and evaluation methodology for optical
flow," International Journal of Computer Vision, vol. 92, pp. 131, 2011.
M. Hasan and A. K. Roy-Chowdhury, "Incremental activity
modeling and recognition in streaming videos," in Proceedings
of the IEEE Conference on Computer Vision and Pattern
Recognition, 2014, pp. 796-803.
N. Ikizler-Cinbis and S. Sclaroff, "Object, scene and actions:
Combining multiple features for human action recognition,"
Computer Vision–ECCV 2010, pp. 494-507, 2010.
H. Wang, A. Kläser, C. Schmid, and C.-L. Liu, "Action
recognition by dense trajectories," in Computer Vision and
Pattern Recognition (CVPR), 2011 IEEE Conference on, 2011,
pp. 3169-3176.
S. Sharma, R. Kiros, and R. Salakhutdinov, "Action recognition
using visual attention," arXiv preprint arXiv:1511.04119, 2015.
J. Cho, M. Lee, H. J. Chang, and S. Oh, "Robust action
recognition using local motion and group sparsity," Pattern
Recognition, vol. 47, pp. 1813-1825, 2014.
J. Yue-Hei Ng, M. Hausknecht, S. Vijayanarasimhan, O.
Vinyals, R. Monga, and G. Toderici, "Beyond short snippets:
Deep networks for video classification," in Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition,
2015, pp. 4694-4702.
| 1cs.CV
|
Cyber-Physical Attacks on UAS NetworksChallenges and Open Research Problems
Vahid Behzadan
arXiv:1702.01251v1 [cs.CR] 4 Feb 2017
Dept. of Computer Science and Engineering, University of Nevada, Reno, USA
[email protected]
Abstract—Assignment of critical missions to unmanned aerial
vehicles (UAV) is bound to widen the grounds for adversarial intentions in the cyber domain, potentially ranging from
disruption of command and control links to capture and use
of airborne nodes for kinetic attacks. Ensuring the security
of electronic and communications in multi-UAV systems is of
paramount importance for their safe and reliable integration
with military and civilian airspaces. Over the past decade, this
active field of research has produced many notable studies and
novel proposals for attacks and mitigation techniques in UAV
networks. Yet, the generic modeling of such networks as typical
MANETs and isolated systems has left various vulnerabilities out
of the investigative focus of the research community. This paper
aims to emphasize on some of the critical challenges in securing
UAV networks against attacks targeting vulnerabilities specific to
such systems and their cyber-physical aspects.
Index Terms—UAV, Cyber-Physical Security, Vulnerabilities
I. I NTRODUCTION
The 21st century is scene to a rapid revolution in our
civilization’s approach to interactions. Advancement of communication technologies, combined with an unprecedentedly
increasing trust and interest in autonomy, are pushing mankind
through an evolutionary jump towards delegation of challenging tasks to non-human agents. From mars rovers to search and
rescue robots, we have witnessed this trend of overcoming the
limitations inherent to us, through replacement of personnel
with cyber-physical systems capable of performing tasks that
are risky, repetitive, physically difficult or simply economically
infeasible for human actors.
Unmanned Aerial Vehicles, or UAVs, are notable examples of this revolution. Since the early 2000s, military and
intelligence theaters have seen an explosive growth in the
deployment of tactical UAVs for surveillance, transport and
combat operations. In the meantime, civilian use of UAVs has
gained traction as the manufacturing and operations costs of
small and mid-sized UAVs are undergoing a steady decline.
The cheaper cost of such UAVs has also led to a growing
interest in collaborative deployment of multiple UAVs to
perform specific tasks, such as monitoring the conditions
of farms and patrolling national borders. Yet, there are a
multitude of challenges associated with this vision, solving
which are crucial for safe and reliable employment of such
systems in civilian and military scenarios. One such challenge
is ensuring the security of systems that comprise UAVs,
as their remote operational conditions leave the burden of
command and control reliant on the onboard cyber-physical
GNSS, Telemetry
Satellite Relay
UAV1
UAV3
UAV2
Mobile
Ground Unit
Inter-UAV Link
Satellite Link
ATG Link
Ground
Control
Station
Fig. 1: Communication Links in a UAS Network
components. The body of literature on this issue has seen an
accelerated growth in recent years [1], which is partly due to
major cyber attacks on UAVs [2]. The overwhelming number
of potential vulnerabilities in UAVs indicates the need for
vigorous standards and frameworks for assurance of reliability
and resilience to malicious manipulations in all aspects of
UAVs, from the mechanical components to the information
processing units and communications systems.
In multi-UAV operations, Inter-UAV links are necessary
for exchange of situational and operational commands, which
are the basis of essential functions such as formation control
and task optimization. As for the architecture of these UAV
networks, the current consensus in the research community is
biased towards decentralized and ad hoc solutions, which allow
dynamic deployment of Unmanned Aerial Systems (UAS)
with minimal time and financial expenditure on pre-mission
preparations.
Structure of a typical UAS network is shown in Figure 1.
By considering the various types of links and interfaces
depicted in this figure, it can be deduced that such networks
are inherently of a complex nature. Integration of multiple
subsystems not only aggregates their individual vulnerabilities,
but may result in new ones that are rooted in the interactions
between those subsystems. Hence, UAS present the research
community with a novel interdisciplinary challenge. The aim
of this paper is to emphasize on some of the critical vulnerabilities specific to network and communications aspects of
UAVs, and provide the research community with a list of open
problems in ensuring the safety and security of this growing
technology.
II. U NIQUENESS OF UAS N ETWORKS
Accurate analysis of vulnerabilities in UAS networks necessitates an understanding of how an airborne network differs
from traditional computer networks. Much of recent studies in
this area compare UAS networks to Mobile Ad hoc Networks
(MANETs) and Wireless Sensor Networks (WSN), as UAS
communications and protocols may initially seem similar to
those of generic distributed and mobile networks. Yet differences in mobility and mechanical degrees of freedom, as well
as their operational conditions, build the grounds for separate
classification of UAS networks. One such distinguishing factor
is the velocity of airborne vehicles, which may range up to
several hundreds of miles per hour. The high mobility of
airborne platforms increases the complexity of requirements
for the communications subsystem and many aspects of the
UAS network. In the link layer, management of links and
adaptation of access control has to be fast enough to accommodate tasks such as neighbor discovery and resource allocation
in an extremely dynamic environment. Likewise, the network
layer must be able to provide fast route discovery and path
calculation while preserving the reliability of the information
flow.
In the physical layer, not only communications, but the
kinetic aspects of the UAS give rise to unique requirements.
As the span of a UAS network may vary from close-by clusters
to far and sparse distributions, the transmission power of UAV
radios must be adjustable for efficient power consumption and
sustained communications. Also, since the geography and environment of the mission may vary rapidly, channel availability
in UAS links is subject to change. A potential solution is
for the UAS to be equipped with Dynamic Spectrum Access
(DSA) and adaptive radios to provide the required agility. Furthermore, the conventional antenna arrangement on airborne
platforms is such that changes in orientation and attitude of
the aircraft affect the gain of onboard radios. This problem is
further intensified in unmanned aircraft, as the elimination of
risk to human pilot allows longer unconventional maneuvers.
These considerations clarify the demand for a fresh vantage
point for analyzing the problem of security in UAS networks.
The reliability of today’s mission-critical UAVs need to be
studied with models that adopt a more inclusive view of such
systems and the impact of seemingly benign deficiencies on
the overall vulnerability of UAVs.
III. A NATOMY OF A UAV
UAVs are cyber-physical systems, meaning that their operations are reliant on the interaction between physical and
computational elements of the system. Consequently, security
of a UAV is dependent not only on the computation and
communications elements and protocols, but also on the physical components of the system [3]. This heavy entanglement
of traditionally independent components requires a thorough
framework for analysis of security issues in UAVs to be
inclusive of the entire airframe. One obstacle in developing
such a framework is the variety of UAV architectures and
capabilities which makes the design of a generic model
IFF
Antenna
SATCOM
Antenna
GNSS+IMU NAV
Optical and
IR Sensors
Multiband
Data Link
Radar Antenna Antenna
UHF Antenna
Fig. 2: Sensing and Communication Components of a UAV
difficult. Yet, the similarity of fundamental requirements of
such systems allows for generation of a high level system
model for conventional types of UAVs. Figure 2 depicts
a breakdown of components in a conventional UAV. Most
UAVs contain multiple communication antennas, including
air to ground (ATG), air to air (ATA), satellite data link
and navigation antennas, along with a set of sensors. The
positioning and navigation of a UAV is typically consisted
of a Global Navigation Satellite System (GNSS) receiver for
accurate positioning, and an Inertial Measurement Unit (IMU)
for relative positioning based on readings from kinetic sensors.
This subsystem can be further extended to include air traffic
monitors such as ADS-B and collision avoidance systems.
Inside the fuselage, one or more processors supervise the
operation and navigation of the UAV, using the output of
various radios and sensors for adjustment of electronic and
mechanical parameters. This process is performed by adaptive
control mechanisms, many of which are dependent on feedback loops. Each of the elements mentioned in this section
may become the subject of malicious exploitation, leading the
UAV into undesirable states and critical malfunctions.
IV. OVERVIEW OF P OTENTIAL ATTACKS
Table I lists some of the uninvestigated attacks on UAS
networks, categorized according to both network functionalities and cyber-physical factors. The table emphasizes on the
criticality of the security problem, as the potential for vulnerability exists in every major component, ranging from the
outer fuselage and antennas to network layers and application
stack. This section provides an overview on the attacks listed in
Table I, and presents preliminary ideas on potential mitigating
approaches and areas of research.
A. Sensors and Navigation
Absence of a human pilot from the airframe of UAVs
puts the burden of observing the environment on the set of
sensors onboard the aircraft. Whether autonomous or remotely
piloted, sensors are the “eyes and ears” of the flight controller
and provide the environmental measurements necessary for
safe and successful completion of the mission. However,
malicious exploitation of sensors in critical cyber-physical
systems is widely neglected in vulnerability assessment of
TABLE I: Cyber-Physical Attacks on UAS Networks
Component
Attacks
Sensors
Visual Navigation
and Spoofing
Physical
Layer
Adaptive radios: deceptive attacks on spectrum sensing
Jamming
Antennas: Disruption and
Deception of Direction of
Arrival estimator, Beamnullinduced Jamming
Orientation: Self-disruption by
Induction of Defensive Maneuvers
Link Layer
Topology Inference, Topological Vulnerability of Formation
to Adaptive Jamming, Routing
attacks
Network
Layer
Traffic Analysis, Disruption of
Convergence
Air Traffic
Control
ADS-B Spoofing,
Induced Collisions
Fault
Handling
Manipulation of fault detection
TCAS-
such systems. An attacker may manipulate or misuse sensory
input or functions to trigger or transfer malware, misguide the
processes dependent on such sensors, or simply disable them
to cause denial of service attacks and trigger undesired failsafe mechanisms [4].
For navigational measurements, GNSS and IMU units are
traditionally used in tandem to provide accurate positioning of
the aircraft. It is well-known that GNSS signals, such as GPS,
are highly susceptible to spoofing attacks. The report in [5]
demonstrates that UAVs that only rely on commercial GPS
receivers for positioning are vulnerable to relatively simple
jamming and spoofing attacks, which may lead to crash or
capture of the UAV by adversaries. Since the establishment of
GPS, various countermeasures against GNSS spoofing have
been proposed, ranging from exploitation of direction and
polarization of the received GPS signal for attack detection
to beamforming and statistical signal processing methods for
elimination of spoofing signals [6]. However, the speed and
spatial freedom of UAVs render many of the basic assumptions
and criteria of such techniques inapplicable. In [7], the authors
propose the cross-examination of variations in IMU and GPS
readings for detection of spoofing attacks from anomalies in
fused measurements. While theoretically attractive, practical
deployment of this technique requires highly reliable IMUs
and adaptive threshold control for an efficient performance,
which are economically undesirable for the small UAVs industry. Such practical limitations in accuracy and implementation
leave this detection technique ineffective to advanced spoofing
attacks, demonstrating the insufficiency of current civilian
GNSS technology for mission-critical applications.
Fusion of IMU and GNSS systems with other sensors, such
as video camera, may lessen the possibility of spoofing. Yet,
vision-based navigation is also subject to attacks, the simplest
of which is blinding the camera by saturating its receptive
sensors with high intensity laser beams. A more sophisticated
attack may aim for deception of the visual navigation system:
In smaller areas, homogenizing or periodically modifying the
texture of the terrain beneath a camera-equipped UAV may
cause miscalculations of movement and orientation. Investigating the effect of such attacks on the control loop of a
fused positioning system may determine the feasibility of such
attacks and potential mitigation techniques.
Detection of attacks on the navigation subsystem is the basis
of reactive countermeasures, such as triggering of hovering or
return-to-base mechanisms. However, as the following section
demonstrates, fault-handling mechanisms are also potential
subjects to malicious manipulation. Robustness of the sensory
and navigational subsystem against spoofing attacks may be
further improved by implementation of proactive mechanisms
through elimination of spoofing signals, applicability of which
to UAVs is yet to be investigated.
B. Fault Handling Mechanisms
Even with the stringent reliability requirements of UAVs,
mechanical and electronic subsystems of UAVs remain prone
to faults due to physical damage and unpredicted state transitions. Therefore, critical UAV systems must consider the
possibility of faults and implement Fault Handling mechanisms to reduce the impact of such events on the system.
Typical examples of fault handling mechanisms are entering
a hovering pattern when temporary faults occur, return-tobase for persistent faults and self-destruction in the event
of fatal faults such as capture or crash. In remotely operated systems, fault handling mechanisms may be triggered
automatically once a certain fault is detected. This process
adds yet another attack surface to UAS networks, as the fault
detection mechanisms may be subject to manipulation [8].
For instance, if a temporary disruption of communications
triggers the hovering pattern of a UAV, an adversary can jam
the link to bind the motion of the aircraft, thus simplify its
kinetic destruction or physical capture. A more severe case is
when sensory manipulation allows the induction of capture
conditions on a tactical UAV, thereby triggering its autodestruction mechanism.
C. Air Traffic Control (ATC) and Collision Avoidance
Integration of unmanned vehicles with national and international airspaces requires guarantees on safety and reliability
of UAV operations. One major consideration in the safety
D. Physical Layer
Typical UAVs require multiple radio interfaces to retain
continuous connectivity with essential links to satellite relays,
ground control stations and other UAVs. This degree of complexity, along with the physical and mechanical characteristics
of UAVs, widen the scope of potential vulnerabilities and
enable multiple attacks that are specific to UAS networks. This
section presents a discussion on some of such attacks on the
physical layer of UAV nodes.
1. Adaptive Radios: As the operational environment of UAS
𝑡1 -- Detect UAV1
UAV1
𝑡2 -- TCAS Advisory: Descend
𝑡2 -- TCAS Advisory: Climb
UAV2
𝑡1 -- Detect UAV2
Altitude
of all airborne operations -manned and unmanned- is situation awareness and collision avoidance. Modern manned
aircraft in the major civilian airspaces are equipped with
secondary surveillance technologies such as Automatic Dependent Surveillance - Broadcast (ADS-B), which allow each
aircraft to monitor the air traffic in their vicinity. This information, along with other available means of traffic monitoring,
provide situation awareness to the Traffic advisory and Collision Avoidance System (TCAS), which monitors the risk of
collision with other aircraft and generates advisories on how
to prevent collisions.
With the growing interest in large-scale deployment of
UAVs, implementation of similar technologies in UAS is
crucial. Recent literature contain several proposals on TCAS
and ATC solutions for UAVs, many of which are based on
adaptation of ADS-B and commercial TCAS protocols. From
a security point of view, this approach suffers from several
critical vulnerabilities, rendering it unfeasible for missioncritical UAS applications. Firstly, ADS-B is an insecure protocol by design [1]. Lack of authentication and the unencrypted
broadcast nature of this protocol make room for relatively
simple attacks, ranging from eavesdropping to manipulation
of air traffic data by jamming or injection of false data.
Consequently, a TCAS system relying on ADS-B can produce
erroneous results and advisories, leading to unwanted changes
in the flight path or in the worst scenario, collisions.
Also, TCAS is shown to be susceptible to a flaw known as
“TCAS-Induced Collisions” [9]. Common implementations of
TCAS are not equipped with prediction capabilities to foresee
the longer-term effect of an advisory that they produce. In
dense traffic conditions, certain scenarios may cause the TCAS
to generate advisories that lead to a state where avoidance
of collision is not possible. Hence, an adversary capable
of manipulating the traffic data can intentionally orchestrate
conditions leading to TCAS-induced collisions. Authors of [9]
provide an example of this flaw for a 4 airplane scenario,
as illustrated in Figure 3. In this scenario, UAV1 and UAV2
are initially in a collision path, hence the TCAS in each
generates a collision avoidance advisory to descend and climb,
respectively. At a lower altitude, the same situation holds for
UAV3 and UAV4, causing UAV4 to climb, which puts UAV1
and UAV4 on a collision path. Even though that TCAS does
not fail to generate new correction advisories in both UAVs,
but the advisory is no longer practical as there is not enough
time before the collision to implement the new path.
𝑡2 -- TCAS Advisory: Descend
𝑡1 --Detect UAV4
UAV3
𝑡1 -- Detect UAV3
𝑡2 -- TCAS Advisory: Climb
UAV4
Fig. 3: Example of TCAS-Induced Collision in a 4 Airplane
Scenario
networks is highly dynamic, sustained and reliable communications necessitates the employment of radios that are capable
of adjusting to changes in propagation and links conditions.
Depending on the operational requirements, this adaptability
may apply to any of the physical layer parameters such
as transmit power, frequency, modulation, and configuration
of antennas. The procedure responsible for controlling these
parameters must essentially rely on environmental inputs,
which can be manipulated by adversaries to result in undesirable configurations. This issue is analogous to deceptive
attacks on the spectrum sensing process of cognitive radio
networks, for which various mitigation techniques have been
proposed based on anomaly detection and fusion of distributed
measurements [10]. However, the rapid variation of conditions
in a UAS network may lead to situations where determination
of a baseline for anomaly detection is not practical. The
same consideration also develops a necessity for rapid adjustments, which limits the acceptable amounts of redundancy and
overhead. Similarly, deployment of airborne nodes in hostile
environments further reduces the feasibility of relying on
real-time collaboration between distributed sensors. Therefore,
such countermeasures will not be sufficient for agile UAS
radios and novel solutions must be tailored according to the
unique requirements of airborne networks.
2. Antennas: The current trend in antenna selection for UAV
radios is favored towards omnidirectional antennas, defined
by their relatively homogeneous reception and transmission
in all directions of the horizontal or vertical planes. This
feature simplifies communications in mobile nodes, as the
homogeneity of gain eliminates the need for considering the
direction of transmissions. On the other hand, the indiscriminate nature of omnidirectional antennas extends the attack
surface for eavesdroppers and jammers, since they also do
not need to tune towards the exact direction of radios to
implement their attacks. A countermeasure against this class of
attack is the utilization of directional antennas, which can only
communicate in certain directions and are “blind” to others.
Besides their higher security, other advantages of directional
antennas include longer transmission ranges and spatial reuse,
thus providing a higher network capacity. One downside
associated with this approach is the inevitable escalation of
overhead. Maintaining directional communications in highly
mobile networks is a complex and costly task, as it requires
real-time knowledge of other nodes’ positions, as well as
employment of antennas capable of reconfiguring their beam
patterns.
To overcome the disadvantages of these two approaches, a
midway solution combining the simplicity of omnidirectional
radios and spatial selectivity of directional antennas can be
actualized in the form of beamforming antenna arrays. Such
antennas are capable of detecting the Direction of Arrival
(DoA) of individual signals. This measurement, along with
other system parameters, are then used to electronically reconfigure the radiation pattern and directionality of the antenna
array. Beamforming has been studied as a mitigation technique
against jamming attacks, as it allows spatial filtering of the
jammer’s signals by adjusting the antenna pattern such that a
null is placed towards the direction of the jammer [11]. The
accuracy and efficiency of this technique depends on correct
detection of the jamming signal, as well as the resolution of
beamformer’s DoA estimations. An adversary may attack the
DoA estimator by shaping its jamming signals to mimic waveforms of a nearby legitimate node, thus avoiding detection or
causing false detections.
Another attack scenario exploits the process of beamnulling
itself. In an ad hoc UAS network, beamnulling must be
implemented in a distributed fashion to allow targeted nodes to
retain or regain connectivity with the network independently.
Due to lack of coordination, nulls created by one node
towards a jammer may also null the direction of legitimate
signals. Depending on the mobility model and formation of the
network, an adversary may deploy multiple mobile jammers
with strategically controlled trajectories to manipulate the DoA
measurements, and eventually cause the network to null more
of its legitimate links than is necessary. In certain conditions,
the adversary can maximize the efficiency of jamming attacks by persistently manipulating the distributed beamnulling
mechanism in such a way that its solution converges towards
a maximally disconnected state. Analytical studies into feasibility criteria of this attack may produce insights into possible
countermeasures and mitigation techniques.
3. Orientation: As depicted in figure 2, a conventional
UAV employs multiple fixed antennas on different sides, each
of which is dedicated to a certain application. Consider the
ATG antenna which is placed on the lower side of the UAV.
As discussed previously, if the UAV performs a half-roll
maneuver or ascends with a steep climb angle, the ATG
antenna is no longer capable of communicating with the
ground antenna and therefore the ATG link is lost. This issue
can be exploited for jamming in UAS Networks that employ
the spatial retreat as a mitigation technique. By observing the
reaction of the nodes to jamming attacks, an adversary may
infer their reformation strategy, and adapt its attack such that
the defensive reformation of certain nodes leads to the loss of
some links due to the new orientation of antennas.
E. Link Layer and Formation
Similar to generic multihop wireless networks, the topology
of a UAS network is determined based on the location of
UAVs relative to each other: UAVs closer than a threshold
can directly communicate with each other, while those that
are farther must utilize relay nodes to reach their destination.
Knowledge of the topology of a network allows adversaries to
optimize attacks by analyzing the structure of their target and
determine the most vulnerable regions by identifying nodes
whose disconnection incur the maximum loss of connectivity
in the network. Even though the effect of topology on the
resilience of the network is widely studied, the proposed mitigation techniques fail to provide practical solutions for UAS
networks. A class of such solutions are based on a security
by obscurity approach, suggesting the employment of covert
communications between nodes to hide the topology of the
network from adversaries. Besides the undesirable overhead
of this approach in terms of decreased network throughput
and increased processing costs, it has been shown that the
topology of such networks can be estimated with a high degree
of accuracy via timing analysis attacks [12]. Therefore, hiding
the topology may not serve as a reliable solution in mission
critical scenarios.
An alternative mitigation technique is adaptive control of the
topology [13]. In this approach, detection of a jamming attack
triggers a reformation process during which the nodes of a
UAS network change their positions to retain connectivity. A
fundamental assumption of this approach is the ability of the
nodes to detect and localize attacks, which may not always be
practical. A promising area of further investigation is the problem of minimizing the topological vulnerability to targeted
jamming attacks. Development of real-time and distributed
formation control techniques that consider this optimization
problem may lead to highly efficient techniques for ensuring
dynamic resilience of mission-critical UAS networks.
A mitigation technique against topology inference attacks
is randomization of transmission delays. It is expected that
introducing randomness in forwarding delays weakens the
observed correlation between connected hops, and therefore
reduces the accuracy of timing analysis attacks. However,
the high mobility of UAS networks and the consequent requirement for minimal latency limit the maximum amount of
delay permissible in such networks. This constraint limits the
randomness of the forwarding delays, which may neutralize
the effect of mitigation technique. A potential alternative for
delay randomization is transmission of decoy signals to perturb
the adversary’s correlation analysis. This proposal may be
extended by incorporating it in topology control, such that
the resultant formation is optimized for decoy transmissions
in a way that spatial distribution of traffic in the network
appears homogeneous to an outside observer, thereby inducing
an artificial correlation between all nodes in the network. To
the extent of authors’ knowledge, the feasibility, overhead
and optimal implementation of this approach are yet to be
analytically and experimentally studied.
F. Network Layer
The impact of high mobility in UAS networks is greatly
accentuated in the network layer. Speed and frequency of
changes in the topology of a UAS network give rise to
many challenges that are still active subjects of research. Yet,
studies on security of routing mechanisms tend to follow the
tradition of equating UAS networks with MANETs. Indeed,
the unique features of unmanned airborne networks generate
a set of challenges in the network layer that do not match the
criteria of conventional MANETs. The highly dynamic nature
of UAS networks, as well as stringent requirements on latency,
necessitate novel routing mechanisms capable of calculating
paths in rapidly changing topologies. A survey of the state of
the art in this area is presented in [14]. The proposed methods
may be prone to potential vulnerabilities, and the demand for a
detailed technical analysis and comparison of these proposals
in terms of their security is yet to be fulfilled.
Similar to the link layer, the routing layer of UAS networks
is also vulnerable to traffic analysis attacks, aiming to infer
individual flows, as well as source-destination pairs of end-toend connections. Various mitigation techniques against such
attacks have been proposed [15], many of which rely on traditional approaches such as mixing and decoy transmissions. As
such techniques require addition of redundancies and overhead
to the UAS networks, a comprehensive feasibility analysis and
optimal design of the corresponding defense strategies is vital,
but not yet available to the research community.
Mobile routing in UAS networks is a surface for attacks
on convergence of the network. As discussed, the topology
of unmanned airborne networks is subject to manipulation by
adversarial actions such as exploitation of adaptive formation
control and jamming attacks. Also, many of the recently
proposed routing mechanisms for airborne networks rely on
global knowledge of the geographical positions of every node
in the network, which may also be prone to manipulation.
A sophisticated adversary may be able to design a strategic
combination of topological perturbation and sensor manipulations to prevent or slow the convergence of routing in the
network. Investigation of this attack in terms of feasibility, as
well as potential countermeasures may prove to be valuable
for efficient protection of UAS networks operating in hostile
environments.
V. C ONCLUSIONS
The cyber-physical nature of UAVs demand an extension to
the scope of ordinary vulnerability analysis for such systems.
In addition to threats in the electronic and computational
components, a largely overlooked class of vulnerabilities is
fostered by the interactions between the mechanical elements
and the computational subsystems. Pondering on the list of
critical attacks presented in this paper, an alarming conclusion
can be drawn: serious threats still remain unmitigated not
only in every networking component of UAS communications, but also in the interdependency of the network and
other components, including sensors and physical elements
of UAVs. Considering the seriousness of open issues in the
cyber-physical aspects of UAVs, a successful move towards the
age of mainstream unmanned aviation cannot be envisioned
without remedying the void of effective solutions for such
critical challenges.
R EFERENCES
[1] A. Kim, B. Wampler, J. Goppert, I. Hwang, and H. Aldridge, “Cyber
attack vulnerabilities analysis for unmanned aerial vehicles,” Infotech@
Aerospace, 2012.
[2] A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, “Cyber security
threat analysis and modeling of an unmanned aerial vehicle system,” in
Homeland Security (HST), 2012 IEEE Conference on Technologies for,
pp. 585–590, IEEE, 2012.
[3] A. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S.
Gupta, “Ensuring safety, security, and sustainability of mission-critical
cyber–physical systems,” Proceedings of the IEEE, vol. 100, no. 1,
pp. 283–299, 2012.
[4] V. Subramanian, R. Beyah, et al., “Sensory channel threats to cyber
physical systems: A wake-up call,” in Communications and Network
Security (CNS), 2014 IEEE Conference on, pp. 301–309, IEEE, 2014.
[5] K. Wesson and T. Humphreys, “Hacking drones,” Scientific American,
vol. 309, no. 5, pp. 54–59, 2013.
[6] A. Jafarnia-Jahromi, A. Broumandan, J. Nielsen, and G. Lachapelle,
“Gps vulnerability to spoofing threats and a review of antispoofing techniques,” International Journal of Navigation and Observation, vol. 2012,
2012.
[7] T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. OHanlon,
and P. M. Kintner Jr, “Assessing the spoofing threat: Development
of a portable gps civilian spoofer,” in Proceedings of the ION GNSS
international technical meeting of the satellite division, vol. 55, p. 56,
2008.
[8] K. Hartmann and C. Steup, “The vulnerability of uavs to cyber attacksan approach to the risk assessment,” in Cyber Conflict (CyCon), 2013
5th International Conference on, pp. 1–23, IEEE, 2013.
[9] J. Tang, Causal models for analysis of TCAS-induced collisions. PhD
thesis, Universitat Autònoma de Barcelona, 2015.
[10] S. Bhattacharjee, S. Sengupta, and M. Chatterjee, “Vulnerabilities
in cognitive radio networks: A survey,” Computer Communications,
vol. 36, no. 13, pp. 1387–1398, 2013.
[11] S. Bhunia, V. Behzadan, P. A. Regis, and S. Sengupta, “Performance
of adaptive beam nulling in multihop ad hoc networks under jamming,”
IEEE International Symposium on Cyberspace Safety and Security (CSS
2015), New York.
[12] V. Behzadan and S. Sengupta, “Real-time inference of topological
structure and vulnerabilities for adaptive jamming against tactical ad hoc
networks,” Under Review in Elsevier Journal of Computer and System
Sciences, 2016.
[13] M. Zhu and S. Martı́nez, “Attack-resilient distributed formation control
via online adaptation,” in Decision and Control and European Control
Conference (CDC-ECC), 2011 50th IEEE Conference on, pp. 6624–
6629, IEEE, 2011.
[14] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying ad-hoc networks
(fanets): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270,
2013.
[15] J. Kong, X. Hong, and M. Gerla, “An identity-free and on-demand
routing scheme against anonymity threats in mobile ad hoc networks,”
Mobile Computing, IEEE Transactions on, vol. 6, no. 8, pp. 888–902,
2007.
| 3cs.SY
|
A construction of q-ary linear codes with two weights✩
Ziling Henga,b,c , Qin Yuea,b,c
a Department
of Mathematics, Nanjing University of Aeronautics and Astronautics, Nanjing, 211106, PR China
b State Key Laboratory of Cryptology, P. O. Box 5159, Beijing, 100878, PR China
c State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing,
100093, PR China
Abstract
arXiv:1605.04063v2 [cs.IT] 24 Jul 2017
Linear codes with a few weights are very important in coding theory and have attracted a lot of attention. In
this paper, we present a construction of q-ary linear codes from trace and norm functions over finite fields. The
weight distributions of the linear codes are determined in some cases based on Gauss sums. It is interesting
that our construction can produce optimal or almost optimal codes. Furthermore, we show that our codes
can be used to construct secret sharing schemes with interesting access structures and strongly regular graphs
with new parameters.
Keywords: linear codes, secret sharing schemes, strongly regular graphs, Gauss sums
2010 MSC: 94B05, 94B60, 11L05
1. Introduction
Let Fq denote the finite field with q elements. An [n, k, d] linear code C over Fq is a k-dimensional subspace
of Fnq with minimum Hamming distance d. An [n, k, d] code is called optimal if no [n, k, d + 1] code exists. Let
Ai denote the number of codewords with Hamming weight i in a code C with length n. The weight enumerator
5
of C is defined by 1 + A1 z + · · · + An z n . The sequence (1, A1 , · · · , An ) is called the weight distribution of C.
The code C is said to be t-weight if the number of nonzero Aj , 1 ≤ j ≤ n, in the sequence (1, A1 , · · · , An )
equals t. The weight distribution is an interesting topic which was investigated in [5, 9, 12, 21, 22, 30] and
many other papers. In particular, a survey of three-weight cyclic codes and their weight distributions were
provided in [11]. Weight distribution gives the minimum distance and the error correcting capability of a code.
10
In addition, it contains important information on the computation of the probability of error detection and
correction with respect to some error detection and correction algorithms [20].
Recently, Ding et al. proposed a very effective construction of linear codes in [9, 12] as follows. Let
D = {d1 , d2 , · · · , dn } ⊆ Fr , where r is a power of q. A linear code of length n over Fq is defined by
CD = (Trr/q (xd1 ), Trr/q (xd2 ), · · · , Trr/q (xdn )) : x ∈ Fr ,
where Trr/q (x) = x + xq + · · · + xq
s−1
denotes the trace function from Fr to Fq and r = q s . The set D is
called the defining set of C. If the set D is well chosen, the code C may have good parameters. By using this
✩ The
paper is supported by Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-15-009).
Email addresses: [email protected] (Ziling Heng), [email protected] (Qin Yue)
Preprint submitted to Journal of LATEX Templates
July 25, 2017
construction and selecting proper defining sets, many good codes were found in [9, 12, 16, 17, 26, 28, 29]. Let
f be a function over Fr . Then this construction can be equivalently written as
CD = (Trr/q (xf (d1 )), Trr/q (xf (d2 )), · · · , Trr/q (xf (dn ))) : x ∈ Fr .
Let m, m1 , m2 be positive integers such that m1 |m, m2 |m and gcd(m1 , m2 ) = e. Let Trqmi /q be the trace
function from Fqmi to Fq , i = 1, 2. Let Nqm /qmi be the norm function from Fqm to Fqmi , then for x ∈ Fqm ,
Nqm /qmi (x) = x1+q
mi
m −1
+···+(qmi ) mi
qm −1
= x qmi −1 , i = 1, 2.
In this paper, we present a construction of a q-ary linear code as
CD =
Trqm1 /q (xNqm /qm1 (d1 )), · · · , Trqm1 /q (xNqm /qm1 (dn )) : x ∈ Fqm1 ,
(1.1)
where the defining set D is given as
D = {x ∈ F∗qm : Trqm2 /q (Nqm /qm2 (x)) + a = 0}
for a ∈ Fq . Since the norm function Nqm /qm2 : F∗qm → F∗qm2 is surjective, there exists an element c ∈ F∗qm such
that Nqm /qm2 (c) =
1
a
for a ∈ F∗q . If a ∈ F∗q , then
D
= {x ∈ F∗qm : Trqm2 /q (Nqm /qm2 (x)) + a = 0}
= {x ∈ F∗qm : Trqm2 /q (Nqm /qm2 (cx)) + 1 = 0}
= {x ∈ F∗qm : Trqm2 /q (Nqm /qm2 (x)) + 1 = 0}.
15
This implies that we only need to consider a = 0, 1. We remark that this construction is a further generalization
of that in [18]. When m = m1 , in [18], the authors determined a lower bound of the minimum Hamming
distance of CD and gave its weight distributions for m2 = 2, a = 0 and m2 = 1, 2, a = 1, respectively.
The purpose of this paper is to determine the weight distribution of CD defined in Equation (1.1) in some
cases. Our main mathematical tools used in this paper are Gauss sums. Consequently, we obtain four classes
20
of two-weight linear codes with very flexible parameters. Examples given by us show that some codes are
optimal or almost optimal. As some applications, our codes are used to construct secret sharing schemes with
interesting access structures and strongly regular graphs with new parameters.
The following notations will be used in this paper:
25
χ, χ1 , χ2
canonical additive characters of Fq , Fqm1 , Fqm2 , respectively;
λ, λ1 , λ2
generators of multiplicative character groups of Fq , Fqm1 , Fqm2 , respectively;
G(λ), G(λ1 ), G(λ2 )
Gauss sums over Fq , Fqm1 , Fqm2 , respectively;
α
primitive element of F∗qm ;
e
e = gcd(m1 , m2 );
l
l = gcd( me1 , q − 1).
2. Gauss sums
In this section, we recall some basic results of Gauss sums which are important tools in this paper.
2
Let Fq be a finite field with q elements, where q is a power of a prime p. The canonical additive character
of Fq is defined as follows:
Trq/p (x)
where ζp = e
√
2π −1
p
χ : Fq −→ C∗ , χ(x) = ζp
,
denotes the p-th primitive root of complex unity and Trq/p is the trace function from Fq
to Fp . The orthogonal property of additive characters (see [23]) is given by:
q, if a = 0,
X
χ(ax) =
0 otherwise.
x∈Fq
i
Let ψ : F∗q −→ C∗ be a multiplicative character of F∗q . For F∗q = hβi, ψ(β) = ζq−1
for some 0 ≤ i ≤ q − 2. The
trivial multiplicative character ψ0 is defined by ψ0 (x) = 1 for all x ∈ F∗q . It is known from [23] that all the
b∗ , which is isomorphic to F∗ . The orthogonal property
multiplicative characters form a multiplication group F
q
q
of a multiplicative character ψ (see [23]) is given by:
q − 1, if ψ = ψ ,
X
0
ψ(x) =
0,
otherwise.
x∈F∗
q
The Gauss sum over Fq is defined by
G(ψ) =
X
ψ(x)χ(x).
x∈F∗
q
It is easy to see that G(ψ0 ) = −1 and G(ψ̄) = ψ(−1)G(ψ). If ψ 6= ψ0 , we have |G(ψ)| =
√
q. Gauss sums
can be viewed as the Fourier coefficients in the Fourier expansion of the restriction of χ to F∗q in terms of the
multiplicative characters of Fq , i.e.
χ(x) =
1 X
G(ψ̄)ψ(x), x ∈ F∗q .
q−1
(2.1)
ψ∈b
F∗
q
30
In this paper, Gauss sum is an important tool to compute exponential sums. In general, the explicit determination of Gauss sums is a difficult problem. In some cases, Gauss sums are explicitly determined in
[6, 23].
In the following, we state the Gauss sums in the so-called semi-primitive case.
Lemma 2.1. [6, Semi-primitive case Gauss sums] Let φ be a multiplicative character of order N of F∗r .
35
Assume that N 6= 2 and there exists a least positive integer j such that pj ≡ −1 (mod N ). Let r = p2jγ for
some integer γ. Then the Gauss sums of order N over Fr are given by
(−1)γ−1 √r,
if p = 2,
G(φ) =
γ(pj +1) √
(−1)γ−1+ N
r, if p ≥ 3.
Furthermore, for 1 ≤ s ≤ N − 1, the Gauss sums G(φs ) are given by
(−1)s √r,
if N is even, p, γ and
s
G(φ ) =
√
(−1)γ−1 r, otherwise.
3
pj +1
N
are odd,
The well-known quadratic Gauss sums are the following.
Lemma 2.2. [23, Theorem 5.15] Suppose that q = pt and η is the quadratic multiplicative character of Fq ,
where p is an odd prime. Then
(−1)t−1 √q,
if p ≡ 1 (mod 4),
√
G(η) = (−1)t−1 ( p∗ )t =
√
√
(−1)t−1 ( −1)t q, if p ≡ 3 (mod 4),
where p∗ = (−1)
40
p−1
2
p.
3. Exponential sums
In this section, we investigate two exponential sums which will be used to calculate the weight distribution
of CD .
Let χ be the canonical additive character of Fq . Let χi be the canonical additive character of Fqmi , i = 1, 2,
respectively. Denote
Ω(b) =
X
X
x∈F∗
y,z∈F∗
q
qm
and
∆(b) =
X
qm −1
qm −1
χ1 (ybx qm1 −1 )χ2 (zx qm2 −1 )χ(z), b ∈ F∗qm1 ,
X
qm −1
x∈F∗
y,z∈F∗
q
qm
qm −1
χ1 (ybx qm1 −1 )χ2 (zx qm2 −1 ), b ∈ F∗qm1 .
Firstly, we begin to compute the exponential sum Ω(b).
Lemma 3.1. Let m, m1 , m2 be positive integers such that m1 |m, m2 |m and gcd( me1 , q − 1) = l, where e =
b∗ = hλi, F
b ∗mi = hλi i, ti =
gcd(m1 , m2 ). Let F
q
q
Ω(b) =
qmi −1
qe −1 ,
i = 1, 2. For b ∈ F∗qm1 , we have
m2
(q m − 1)(q − 1) X
G(λ̄t11 s )G(λt22 s )λt11 s (b)G(λ̄ e s ),
(q m1 − 1)(q m2 − 1)
s∈S
e
q −1
where S = { q−1
l j : j = 0, 1, . . . , q−1 l − 1}.
qm −1
45
qm −1
Proof. For F∗qm = hαi, let α1 = α qm1 −1 and α2 = α qm2 −1 . Then we have F∗qm1 = hα1 i and F∗qm2 = hα2 i. This
implies that
m
Ω(b) =
−2
X qX
qm −1
i
qm −1
i
χ1 (ybα qm1 −1 )χ2 (zα qm2 −1 )χ(z)
y,z∈F∗
q i=0
m
=
−2
X qX
y,z∈F∗
q
χ1 (ybαi1 )χ2 (zαi2 )χ(z).
i=0
Using the Fourier expansion of additive characters (see Equation (2.1)), we have
m
Ω(b) =
(q m1
qX
−2
X
1
χ(z)
− 1)(q m2 − 1)
∗
i=0
y,z∈Fq
X
ψ1 ∈b
F∗
q m1
4
G(ψ̄1 )ψ1 (ybαi1 )
X
ψ2 ∈b
F∗
q m2
G(ψ̄2 )ψ2 (zαi2 )
=
(q m1
X
1
χ(z)
m
2
− 1)(q − 1)
∗
y,z∈Fq
X
G(ψ̄1 )G(ψ̄2 )ψ1 (yb)ψ2 (z)
m
qX
−2
ψ1 (αi1 )ψ2 (αi2 ).
i=0
ψj ∈b
F∗m
q j
j=1,2
Since mi |m, we obtain ord(ψi )|(q m − 1), where i = 1, 2. Therefore, we have
(ψ1 (α1 )ψ2 (α2 ))q
m
−1
=1
and
m
qX
−2
ψ1 (αi1 )ψ2 (αi2 )
=
(ψ1 (α1 )ψ2 (α2 ))i
i=0
i=0
=
50
m
qX
−2
q m − 1, if ψ (α )ψ (α ) = 1,
1
1
2
2
0
otherwise.
b ∗mi = hλi i such that λi (αi ) = ζqmi −1 , where i = 1, 2. Assume that ψ1 = λu and ψ2 = λv for 0 ≤ u ≤
Let F
q
1
2
q m1 − 2 and 0 ≤ v ≤ q m2 − 2. If ψ1 (α1 )ψ2 (α2 ) = 1, then ζqum1 −1 ζqvm2 −1 = 1 which is equivalent to
(q m2 − 1)u + (q m1 − 1)v ≡ 0
(mod (q m1 − 1)(q m2 − 1)).
(3.1)
This implies that (q m2 − 1)u + (q m1 − 1)v ≡ 0 (mod q mi − 1), i = 1, 2. Therefore, (q m2 − 1)u ≡ 0 (mod q m1 − 1)
and (q m1 − 1)v ≡ 0 (mod q m2 − 1). It is known that
gcd(q m1 − 1, q m2 − 1) = q gcd(m1 ,m2 ) − 1 = q e − 1.
Then we have u ≡ 0 (mod
e
q − 2, where t1 =
qm1 −1
qe −1 )
qm1 −1
qe −1 ,
t2 =
and v ≡ 0 (mod
qm2 −1
qe −1 .
qm2 −1
qe −1 ).
Denote u = t1 s1 and v = t2 s2 for 0 ≤ s1 , s2 ≤
Substituting u = t1 s1 , v = t2 s2 into Equation (3.1), we have
s1 + s2 = q e − 1. Hence,
e
Ω(b) =
(q m1
qX
−2
X
qm − 1
G(λ̄1t1 s1 )G(λt22 s1 )λ1t1 s1 (yb)λ̄2t2 s1 (z)
χ(z)
− 1)(q m2 − 1)
∗
s =0
y,z∈Fq
1
e
=
(q m1
qX
−2
X
X
qm − 1
G(λ̄1t1 s1 )G(λt22 s1 )λ1t1 s1 (b)
χ(z)λ̄2t2 s1 (z)
λ1t1 s1 (y).
m
2
− 1)(q − 1) s =0
∗
∗
z∈Fq
1
y∈Fq
qm2 −1
qm1 −1
Assume that F∗q = hβi, where β = α1 q−1 = α2 q−1 . Hence, λ1 (β) = λ2 (β) = ζq−1 . Since gcd( me1 , q − 1) = l,
55
we have
X
λ1t1 s1 (y)
y∈F∗
q
Denote S = {s1 : s1 ≡ 0 (mod
that
Ω(b) =
q−1
l ), 0
=
q−2
X
λ1t1 s1 (β i ) =
q−2
X
m1 s 1
e
(ζq−1
)i
i=0
i=0
q − 1, if s ≡ 0 (mod
1
=
0
otherwise.
q−1
l ),
b ∗ = hλi. Since λ2 (z) = λ(z) for z ∈ Fq , we have
≤ s1 ≤ q e − 2}. Let F
q
X
(q m − 1)(q − 1) X
G(λ̄t11 s1 )G(λ2t2 s1 )λ1t1 s1 (b)
χ(z)λ̄2t2 s1 (z)
m
m
2
1
(q − 1)(q − 1)
∗
s1 ∈S
z∈Fq
5
=
X
m2
(q m − 1)(q − 1) X
G(λ̄t11 s1 )G(λ2t2 s1 )λ1t1 s1 (b)
χ(z)λ̄ e s1 (z)
m
m
2
1
(q − 1)(q − 1)
∗
s1 ∈S
z∈Fq
X
G(λ̄t11 s1 )G(λ2t2 s1 )λ1t1 s1 (b)G(λ̄
m
=
(q − 1)(q − 1)
(q m1 − 1)(q m2 − 1)
m2
e
s1
).
s1 ∈S
The proof is completed.
We remark that the Fourier expansion of additive characters used in Lemma 3.1 is an effective technique
60
in computing exponential sums. It was also employed in [21] to determine the weight distribution of cyclic
codes by Li and Yue. By Lemma 3.1, we know that the value distribution of Ω(b) can be determined if the
Gauss sums are known. In the following, we mainly consider some special cases to give the value distribution
of Ω(b).
Lemma 3.2. Let l = 1 and other notations and hypothesises be the same as those of Lemma 3.1. Then the
65
value distribution of Ω(b), b ∈ F∗qm1 , is the following.
(1) If e = 1, then
Ω(b) =
−(q m − 1)(q − 1)
, b ∈ F∗qm1 .
(q m1 − 1)(q m2 − 1)
(2) If e = 2, then
Ω(b) =
−(qm −1)(q−1)
(qm1 −1)(qm2 −1) (1
−(qm −1)(q−1)
(qm1 −1)(qm2 −1) (1
+ (−1)
m1 +m2
2
q
+ (−1)
m1 +m2
2
+1
Proof. If l = 1, by Lemma 3.1, we have that G(λ̄
Ω(b) =
m2
e
s
m1 +m2
2
q
+1
m1 +m2
2
),
),
qm1 −1
q+1 times
q(qm1 −1)
times.
q+1
) = −1 and
−(q m − 1)(q − 1) X
G(λ̄t11 s )G(λt22 s )λt11 s (b),
(q m1 − 1)(q m2 − 1)
s∈S
e
−1
where S = {(q − 1)j : j = 0, 1, . . . , qq−1
− 1}. In the following, we discuss the value distribution of the
exponential sum Ω(b) for e = 1, 2, respectively.
(1)Assume that e = 1. It is clear that S = {0}. Then
Ω(b) =
−(q m − 1)(q − 1)
, b ∈ F∗qm1 .
(q m1 − 1)(q m2 − 1)
(2) Assume that e = 2. Then we have S = {(q − 1)j : j = 0, 1, . . . , q}. Hence,
q
Ω(b)
qm2 −1
70
=
q 2 −1
q 1 −1
q 1 −1
−(q m − 1)(q − 1) X
q+1 j
q+1 j
q+1 j
)G(λ
)λ
(b)
G(
λ̄
1
2
1
m
m
2
1
(q − 1)(q − 1) j=0
=
q
qm1 −1
qm2 −1
qm1 −1
X
−(q m − 1)(q − 1)
q+1 j
q+1 j
q+1 j
G(
λ̄
(1
+
)G(λ
)λ
(b)).
1
2
1
(q m1 − 1)(q m2 − 1)
j=1
m
m
m
qm1 −1
Note that ord(λ2 q+1 ) = ord(λ1 q+1 ) = q + 1. Now we give the value distribution of Ω(b) in several cases.
• If q is even, by Lemma 2.1 we have
qm1 −1
G(λ̄1 q+1
j
qm2 −1
)G(λ2 q+1
j
) = (−1)
6
m1 +m2
2
q
m1 +m2
2
, 1 ≤ j ≤ q.
Then
Ω(b) =
q
qm1 −1
m1 +m2 X
m1 +m2
−(q m − 1)(q − 1)
q+1 j
2
2
λ
q
(1
+
(−1)
(b)).
1
(q m1 − 1)(q m2 − 1)
j=1
Let b = αs1 , 0 ≤ s ≤ q m1 − 2. Then we have
q
X
qm1 −1
q+1 j
λ1
(b) =
q
X
js
ζq+1
j=1
j=1
q,
if s ≡ 0 (mod q + 1)
=
−1, otherwise.
Hence, the value distribution of Ω(b) is
m
m1 +m2
m1 +m2
−1)(q−1)
−(q
2
q 2 +1 ),
(qm1 −1)(qm2 −1) (1 + (−1)
Ω(b) =
m
m1 +m2
m1 +m2
−1)(q−1)
−(q
+1
2
q 2 ),
(qm1 −1)(qm2 −1) (1 + (−1)
qm1 −1
q+1 times,
q(qm1 −1)
times.
q+1
• If q is odd and m2 ≡ 0 (mod 4), we have m1 ≡ 2 (mod 4) due to gcd( m21 , q − 1) = 1. Since
and
m2
2
is even, by Lemma 2.1 we have
qm1 −1
G(λ̄1 q+1
j
qm2 −1
)G(λ2 q+1
j
) = (−1)j+1 q
m1 +m2
2
, 1 ≤ j ≤ q.
For b = αs1 , 0 ≤ s ≤ q m1 − 2,
Ω(b) =
=
q
qm1 −1
m1 +m2 X
−(q m − 1)(q − 1)
q+1 j
j+1
2
(−1)
λ
(1
+
q
(b))
1
(q m1 − 1)(q m2 − 1)
j=1
q
m1 +m2 X
−(q m − 1)(q − 1)
js
2
(−1)j+1 ζq+1
).
(1
+
q
(q m1 − 1)(q m2 − 1)
j=1
For s ≡ 0 (mod q + 1), we have
q
X
m1 +m2
−(q m − 1)(q − 1)
js
(−1)j+1 ζq+1
= 1 and Ω(b) = m1
(1 + q 2 ).
m
2
(q − 1)(q − 1)
j=1
For s ≡
q+1
2
(mod q + 1), we have
q
X
j=1
js
(−1)j+1 ζq+1
= −q and Ω(b) =
m1 +m2
−(q m − 1)(q − 1)
(1 − q 2 +1 ).
(q m1 − 1)(q m2 − 1)
(mod q + 1), one can see that
For s 6≡ 0, q+1
2
qs
s
3s
5s
ζq+1
+ ζq+1
+ ζq+1
+ · · · + ζq+1
=0
and
(q−1)s
2s
4s
6s
ζq+1
+ ζq+1
+ ζq+1
+ · · · + ζq+1
= −1.
This implies that
q
X
m1 +m2
−(q m − 1)(q − 1)
js
(−1)j+1 ζq+1
= 1 and Ω(b) = m1
(1 + q 2 ).
m
2
(q − 1)(q − 1)
j=1
Hence, the value distribution of Ω(b) is
m1 +m2
(qm −1)(q−1)
m
+1
2
− 1),
(q 1 −1)(qm2 −1) (q
Ω(b) =
m
m1 +m2
−(q
−1)(q−1)
m
(1 + q 2 ),
m
(q
1 −1)(q
2 −1)
7
qm1 −1
q+1 times,
q(qm1 −1)
times.
q+1
m1
2
is odd
75
• If q is odd and m2 ≡ 2 (mod 4), we have m1 ≡ 2 (mod 4) due to gcd( m21 , q − 1) = 1. In this case,
the value distribution of Ω(b) can be obtained in a similar way. We omit the details here. The value
distribution of Ω(b) is given as
m
m1 +m2
−1)(q−1)
−(q
+1
2
),
(qm1 −1)(qm2 −1) (1 + q
Ω(b) =
m
m1 +m2
−1)(q−1)
−(q
(1 − q 2 ),
m
m
(q
1 −1)(q
2 −1)
qm1 −1
q+1 times,
q(qm1 −1)
times.
q+1
Note that the value distribution of Ω(b) can be represented in a unified form for e = 2. The proof is completed.
80
Lemma 3.3. Let l = 2, e = 1and other notations and hypothesises be the same as those of Lemma 3.1. Then
the value distribution of Ω(b), b ∈ F∗qm1 , is given as follows.
m1 +m2 +1
(qm −1)(q−1)
m
2
),
(q 1 −1)(qm2 −1) (−1 − q
Ω(b) =
m
m1 +m2 +1
(q
−1)(q−1)
m
2
),
(q 1 −1)(qm2 −1) (−1 + q
qm1 −1
2
qm1 −1
2
times,
times.
Proof. Since l = 2, e = 1, by Lemma 3.1 we have that
Ω(b) =
(q m − 1)(q − 1) X
G(λ̄t11 s )G(λt22 s )λt11 s (b)G(λ̄m2 s ), b ∈ F∗qm1 ,
(q m1 − 1)(q m2 − 1)
s∈S
where S = {0, q−1
2 }. It is clear that m1 is even and m2 is odd. Hence, by Lemma 2.2,
Ω(b) =
=
=
=
qm1 −1
qm2 −1
qm1 −1
q−1
(q m − 1)(q − 1)
2
2
2
(−1
+
G(
λ̄
)G(λ
)λ
(b)G(λ̄ 2 m2 ))
1
2
1
(q m1 − 1)(q m2 − 1)
qm2 −1
qm1 −1
qm1 −1
q−1
(q m − 1)(q − 1)
2
2
2
)G(λ
)λ
(b)G(λ̄ 2 ))
(−1
+
G(
λ̄
1
2
1
m
m
(q 1 − 1)(q 2 − 1)
qm1 −1
m1 +m2 +1
(p−1)(m1 +m2 +1)t
(q m − 1)(q − 1)
2
4
2
q
λ
(b))
(−1
−
(−1)
1
m
m
(q 1 − 1)(q 2 − 1)
m1
m1 +m2 +1
(qm −1)(q−1)
m
2
), q 2−1 times,
(q 1 −1)(qm2 −1) (−1 − q
m1
m1 +m2 +1
(qm −1)(q−1)
m
2
(−1 + q
), q −1 times.
m
(q
1 −1)(q
2
2 −1)
For l = e = 2, the value distribution of Ω(b) can’t be given because the Gauss sums of order 2(q + 1) are
85
unknown in general. However, for e = 1 and l = 3, 4, we can easily obtain the value distributions of Ω(b)
because the cubic and quartic Gauss sums are known. We omit the details here.
In the following, we begin to investigate the exponential sum ∆(b), b ∈ F∗qm1 .
Lemma 3.4. Let m, m1 , m2 be positive integers such that m1 |m, m2 |m. Denote e = gcd(m1 , m2 ). Let ti =
qmi −1
qe −1 ,
i = 1, 2. For b ∈ F∗qm1 , we have
∆(b) =
(q m − 1)(q − 1)2 X
G(λ̄t11 s )G(λt22 s )λt11 s (b),
(q m1 − 1)(q m2 − 1)
s∈S
e
−1
b∗mi = hλi i, i = 1, 2.
− 1} and F
where S = {(q − 1)j : j = 0, 1, . . . , qq−1
q
8
qm −1
qm −1
Proof. For F∗qm = hαi, let α1 = α qm1 −1 and α2 = α qm2 −1 . Then we have F∗qm1 = hα1 i and F∗qm2 = hα2 i. This
90
implies that
∆(b) =
X
m
qX
−2
X
m
qX
−2
qm −1
qm −1
i
i
χ1 (ybα qm1 −1 )χ2 (zα qm2 −1 )
y,z∈F∗
q i=0
=
y,z∈F∗
q
χ1 (ybαi1 )χ2 (zαi2 ).
i=0
Using the Fourier expansion of additive characters (see Equation (2.1)), we have
m
∆(b) =
=
Let ti =
qmi −1
qe −1 ,
(q m1
(q m1
−2
X qX
1
− 1)(q m2 − 1)
∗ i=0
y,z∈Fq
X
1
− 1)(q m2 − 1)
∗
X
G(ψ̄1 )ψ1 (ybαi1 )
G(ψ̄2 )ψ2 (zαi2 )
ψ2 ∈b
F∗
q m2
ψ1 ∈b
F∗
q m1
X
X
G(ψ̄1 )G(ψ̄2 )ψ1 (yb)ψ2 (z)
m
qX
−2
ψ1 (αi1 )ψ2 (αi2 ).
i=0
y,z∈Fq ψj ∈bF∗mj
q
j=1,2
i = 1, 2. From the proof of Lemma 3.1, we know that
m
qX
−2
q m − 1, if ψ (α )ψ (α ) = 1,
1
1
2
2
ψ1 (αi1 )ψ2 (αi2 ) =
0
otherwise,
i=0
and ψ1 (α1 )ψ2 (α2 ) = 1 if and only if ψ1 = λ1t1 s1 and ψ2 = λ2t2 s2 , where s2 = q e − 1 − s1 and 0 ≤ s1 ≤ q e − 2.
Hence,
e
∆(b)
=
(q m1
−2
X qX
qm − 1
G(λ̄t11 s1 )G(λ2t2 s1 )λt11 s1 (yb)λ̄2t2 s1 (z)
− 1)(q m2 − 1)
∗ s =0
y,z∈Fq
1
e
=
(q m1
qX
−2
X
X
qm − 1
G(λ̄1t1 s1 )G(λt22 s1 )λ1t1 s1 (b)
λ̄2t2 s1 (z).
λ1t1 s1 (y)
m
2
− 1)(q − 1) s =0
∗
∗
y∈Fq
1
qm1 −1
95
qm2 −1
z∈Fq
Assume that F∗q = hβi, where β = α1 q−1 = α2 q−1 . Hence, λ1 (β) = λ2 (β) = ζq−1 . This implies that
X
λ1t1 s1 (y)
q−2
X
λ1t1 s1 (β i ) =
q−2
X
m1 s 1
e
)i
(ζq−1
i=0
i=0
y∈F∗
q
q − 1, if m1 s1 ≡ 0
e
=
0
otherwise,
and
X
=
λ̄2t1 s1 (z) =
λ̄2t2 s1 (β i ) =
=
q−2
X
−
m2 s 1
(ζq−1 e )i
i=0
i=0
z∈F∗
q
Since gcd( me1 , me2 ) = 1, the system
q−2
X
(mod q − 1),
q − 1, if m2 s1 ≡ 0 (mod q − 1),
e
0
otherwise.
m1 s1
e
m2 s1
e
≡0
(mod q − 1),
≡0
(mod q − 1),
9
is equivalent to s1 ≡ 0 (mod q − 1), where 0 ≤ s1 ≤ q e − 2. Denote S = {s1 : s1 ≡ 0 (mod q − 1), 0 ≤ s1 ≤
q e − 2}. Then we have that
∆(b) =
(q m − 1)(q − 1)2 X
G(λ̄t11 s1 )G(λ2t2 s1 )λ1t1 s1 (b).
(q m1 − 1)(q m2 − 1)
s1 ∈S
100
For e = 1, 2, the value distribution of ∆(b) can be given as follows.
Lemma 3.5. Let the notations be the same as those of Lemma 3.3. Then the value distribution of ∆(b), b ∈
F∗qm1 , is given as follows.
(1) If e = 1, then ∆(b) =
105
(qm −1)(q−1)2
(qm1 −1)(qm2 −1)
for all b ∈ F∗qm1 .
(2) If e = 2, then
∆(b) =
(qm −1)(q−1)2
(qm1 −1)(qm2 −1) (1
(qm −1)(q−1)2
(qm1 −1)(qm2 −1) (1
+ (−1)
+ (−1)
m1 +m2
2
q
m1 +m2
2
+1
m1 +m2
2
q
+1
m1 +m2
2
),
),
qm1 −1
q+1 times
q(qm1 −1)
times.
q+1
Proof. The proof is similar to that of Lemma 3.2. We omit the details here.
4. The weight distribution of CD
In this section, we give the weight distribution of CD defined in Equation (1.1) in some special cases. The
well-known Griesmer bound of linear codes is the following.
Lemma 4.1. [24, Griesmer bound] For an [n, k, d] code over Fq , we have
n≥
110
k−1
X
i=0
⌈d/q i ⌉,
where ⌈x⌉ denotes the smallest integer which is larger than or equal to x.
4.1. The case a = 0
In the following, we determine the weight distribution of CD for a = 0.
Denote n = |D| = |{x ∈ F∗qm : Trqm2 /q (Nqm /qm2 (x)) = 0}|. Since the norm function
qm −1
Nqm /qm2 : F∗qm −→ F∗qm2 , x 7−→ x qm2 −1 ,
is an epimorphism of two multiplicative groups and the trace function Trqm2 /q : Fqm2 −→ Fq is an epimorphism
of two additive groups, we have
n = | ker(Nqm /qm2 )| · (| ker(Trqm2 /q )| − 1) =
q m − 1 m2 −1
(q
− 1).
q m2 − 1
(4.1)
Note that n = 0 when m2 = 1. Hence, we always assume that m2 > 1 in this section. For b ∈ F∗qm1 , we denote
N (b) = |{x ∈ F∗qm : Trqm2 /q (Nqm /qm2 (x)) = 0 and Trqm1 /q (bNqm /qm1 (x)) = 0}|.
10
115
By the basic facts of additive characters, we have that
N (b) =
1 X
q2
∗
X
χ(y Trqm1 /q (bNqm /qm1 (x)))χ(z Trqm2 /q (Nqm /qm2 (x)))
1 X
q2
∗
X
χ1 (ybx qm1 −1 )χ2 (zx qm2 −1 )
x∈Fqm y,z∈Fq
=
qm −1
qm −1
x∈Fqm y,z∈Fq
=
q
qm −1
qm −1
−1
1 X X
1 X X
qm1 −1 ) +
qm2 −1 )
+
χ
(ybx
χ
(zx
1
2
q2
q2
q2
∗
∗
∗
∗
m
x∈Fqm y∈Fq
1 X
+ 2
q
∗
X
χ1 (ybx
x∈Fqm z∈Fq
qm −1
qm1 −1
)χ2 (zx
qm −1
qm2 −1
)
x∈Fqm y,z∈F∗
q
=
qm −1
qm −1
1 X X
1
qm − 1
1 X X
qm1 −1 ) +
qm2 −1 ) +
+
∆(b).
χ
(ybx
χ
(zx
1
2
2
2
q2
q2
q
q
∗
∗
∗
∗
x∈Fqm y∈Fq
x∈Fqm z∈Fq
Note that the norm function Nqm /qm2 is an epimorphism. Hence,
X X
qm −1
χ2 (zx qm2 −1 )
=
qm − 1 X X
χ2 (zx)
q m2 − 1
∗
∗
=
(q − 1)(1 − q m )
q −1 X X
.
χ
(zx)
=
2
q m2 − 1
q m2 − 1
∗
∗
z∈F∗
x∈F∗
q
qm
x∈Fqm z∈Fq
m
z∈Fq x∈Fqm
Similarly,
X X
qm −1
χ1 (ybx qm1 −1 )
=
qm − 1 X X
χ1 (ybx)
q m1 − 1
∗
∗
=
(q − 1)(1 − q m )
q −1 X X
.
χ
(ybx)
=
1
q m1 − 1
q m1 − 1
∗
∗
y∈F∗
x∈F∗
q
qm
x∈Fqm y∈Fq
m
y∈Fq x∈Fqm
From the discussions above, we obtain that
N (b) =
qm − 1
q−1
q−1
1
(1 − m2
−
) + 2 ∆(b).
q2
q − 1 q m1 − 1
q
(4.2)
For any b ∈ F∗qm1 , the weight of a codeword
c(b) = (Trqm1 /q (bNqm /qm1 (d1 )), · · · , Trqm1 /q (bNqm /qm1 (dn )))
equals
wH (c(b)) = n − N (b) =
(q − 1)(q m − 1)(q m1 +m2 − q m1 +1 + q − 1)
1
− 2 ∆(b)
q 2 (q m1 − 1)(q m2 − 1)
q
(4.3)
by Equations (4.1) and (4.2). Hence, by Lemma 3.5, the parameters of CD for e = 1 are
[
120
q m − 1 m2 −1
q m1 −1 (q − 1)(q m − 1)(q m2 −1 − 1)
].
(q
−
1),
m
,
1
m
q 2 −1
(q m1 − 1)(q m2 − 1)
Then CD is an optimal one-weight linear code with respect to the Griesmer bound. However, any one-weight
linear code is not new because it is equivalent to a concatenated version of a simplex code. For e = 2, the
weight distribution of CD is given in the following.
11
Theorem 4.2. Let m, m1 , m2 be positive integers such that m1 |m, m2 |m, and m2 > 1. Denote gcd(m1 , m2 ) =
e. Let CD be the linear code defined in Equation (1.1) for a = 0. If e = 2 and (m1 , m2 ) 6= (2, 2), then CD is a
m
125
m2 −1
two-weight linear code with parameters [ qqm2−1
− 1), m1 ] and its weight enumerator is given by Table I.
−1 (q
Table I. Weight distribution of the code in Theorem 4.2.
Weight
Frequency
0
1
m1 +m2
2
q m1 −1 (q−1)(q m −1)(q m2 −1 −1−(−1)
(q m1 −1)(q m2 −1)
m2 −m1
2
)
(q−1)q
m2 −m1
−1
2
)
q m1 −1
q+1
m1 +m2
2
q m1 −1 (q−1)(q m −1)(q m2 −1 −1−(−1)
(q m1 −1)(q m2 −1)
(q−1)q
+1
q(q m1 −1)
q+1
Proof. For e = 2, the weight distributions of CD can be obtained by Lemma 3.5 and Equation (4.3). It is easy
to verify that wH (cb ) > 0 for all b ∈ F∗qm1 if (m1 , m2 ) 6= (2, 2), then the dimension equals m1 .
Example 4.3. Let m1 = 2, m2 = 4, m = 4. If q = 2, then CD in Theorem 4.2 is an optimal [7, 2, 4] two-weight
linear code according to the Griesmer bound and has weight enumerator 1 + 2z 4 + z 6 . If q = 3, then CD in
130
Theorem 4.2 is an almost optimal [26, 2, 18] two-weight linear code according to the Griesmer bound and has
weight enumerator 1 + 6z 18 + 2z 24 .
Example 4.4. Let m1 = 4, m2 = 6, m = 12 and q = 2. Then CD in Theorem 4.2 is a [2015, 4, 1040] two-weight
linear code. Its weight enumerator is given by 1 + 10z 1040 + 5z 1144 .
4.2. The case a = 1
135
In the following, we determine the weight distribution of CD for a = 1.
Denote n = |D| = |{x ∈ F∗qm : Trqm2 /q (Nqm /qm2 (x)) + 1 = 0}|. It is clear that
n = | ker(Nqm /qm2 )| · | ker(Trqm2 /q )| =
q m2 −1 (q m − 1)
.
q m2 − 1
For b ∈ F∗qm1 , we denote
N (b) = |{x ∈ F∗qm : Trqm2 /q (Nqm /qm2 (x)) + 1 = 0 and Trqm1 /q (bNqm /qm1 (x)) = 0}|.
By the basic facts of additive characters, we have that
N (b) =
1 X
q2
∗
X
χ(y Trqm1 /q (bNqm /qm1 (x)))χ(z Trqm2 /q (Nqm /qm2 (x)) + z)
1 X
q2
∗
X
χ1 (ybx qm1 −1 )χ2 (zx qm2 −1 )χ(z)
x∈Fqm y,z∈Fq
=
qm −1
qm −1
x∈Fqm y,z∈Fq
=
q
m
q2
+
=
−1
1
q2
+
qm −1
qm −1
1 X X
1 X X
qm1 −1 ) +
qm2 −1 )χ(z)
χ
(ybx
χ
(zx
1
2
q2
q2
∗
∗
∗
∗
x∈Fqm y∈Fq
X
X
χ1 (ybx
x∈Fqm z∈Fq
qm −1
qm1 −1
)χ2 (zx
qm −1
qm2 −1
)χ(z)
y,z∈F∗
x∈F∗
q
qm
qm −1
qm −1
1 X X
1 X X
Ω(b)
qm − 1
qm1 −1 ) +
qm2 −1 )χ(z) +
+
.
χ
(ybx
χ
(zx
1
2
2
2
2
q
q
q
q2
∗
∗
∗
∗
x∈Fqm y∈Fq
x∈Fqm z∈Fq
12
(4.4)
Note that
X X
qm − 1 X X
χ2 (zx)χ(z)
q m2 − 1
∗
∗
qm −1
χ2 (zx qm2 −1 )χ(z) =
x∈F∗
z∈F∗
q
qm
x∈Fqm z∈Fq
X
q −1 X
qm − 1
.
χ(z)
χ
(zx)
=
2
q m2 − 1
q m2 − 1
∗
∗
m
=
z∈Fq
x∈Fqm
From Section 4.1 above, we have
X X
qm −1
χ1 (ybx qm1 −1 ) =
y∈F∗
x∈F∗
q
qm
140
(q − 1)(1 − q m )
.
q m1 − 1
From the discussions above, we obtain that
N (b) =
qm − 1
1
q−1
1
(1 + m2
− m1
) + 2 Ω(b).
2
q
q −1 q −1
q
(4.5)
For any b ∈ F∗qm1 , the weight of a codeword
c(b) = (Trqm1 /q (bNqm /qm1 (d1 )), · · · , Trqm1 /q (bNqm /qm1 (dn )))
equals
wH (c(b)) = n − N (b) =
(q − 1)(q m − 1)(q m1 +m2 − 1)
1
− 2 Ω(b)
m
2
m
2
1
q (q − 1)(q − 1)
q
(4.6)
by Equations (4.4) and (4.5). Hence, by Lemma 3.2, the parameters of CD for e = l = 1 is
[
(q − 1)(q m − 1)q m1 +m2 −2
q m2 −1 (q m − 1)
].
,
m
,
1
q m2 − 1
(q m1 − 1)(q m2 − 1)
Then CD is an optimal one-weight linear code with respect to the Griesmer bound and is not new as mentioned
above. For e = 2 and l = 1, the weight distribution of CD is given in the following.
Theorem 4.5. Let m, m1 , m2 be positive integers such that m1 |m, m2 |m, and gcd( me1 , q − 1) = l = 1, where
145
gcd(m1 , m2 ) = e. Let CD be the linear code defined in Equation (1.1) for a = 1. If e = 2, then CD is a
two-weight linear code with parameters [ q
m2 −1
(qm −1)
, m1 ]
qm2 −1
and its weight enumerator is given by Table II.
Table II. Weight distribution of the code in Theorem 4.5.
Weight
Frequency
0
1
m1 +m2
2
(q−1)(q m −1)(q m1 +m2 +(−1)
q 2 (q m1 −1)(q m2 −1)
m1 +m2
2
(q−1)(q m −1)(q m1 +m2 +(−1)
q 2 (q m1 −1)(q m2 −1)
q
m1 +m2
+1
2
)
+1
q
m1 +m2
2
)
q m1 −1
q+1
q(q m1 −1)
q+1
Proof. For e = 2, the weight distributions of CD can be obtained by Lemma 3.2 and Equation (4.6). Note that
wH (cb ) > 0 for all b ∈ F∗qm1 . Then the dimension equals m1 .
Example 4.6. Let m1 = 2, m2 = 4, m = 4. If q = 2, then CD in Theorem 4.5 is an almost optimal [8, 2, 4]
150
linear code according to the Griesmer bound and has weight enumerator 1 + z 4 + 2z 6 . If q = 3, then CD
in Theorem 4.5 is an nearly optimal [27, 2, 18] linear code, while the corresponding optimal linear codes have
parameters [27, 2, 20].
13
Example 4.7. Let m1 = 4, m2 = 6, m = 12 and q = 2. Then CD in Theorem 4.5 is a [2080, 4, 1040] two-weight
linear code. Its weight enumerator is given by 1 + 5z 1040 + 10z 1144 .
Theorem 4.8. Let m, m1 , m2 be positive integers such that m1 |m, m2 |m, and gcd( me1 , q − 1) = l = 2, where
gcd(m1 , m2 ) = e. Let CD be the linear code defined in Equation (1.1) for a = 1. If e = 1, then CD is a
two-weight linear code with parameters
[
155
m1 +m2 +1
2
(q − 1)(q m − 1)(q m1 +m2 − q
q m2 −1 (q m − 1)
,
m
,
1
m
q 2 −1
q 2 (q m1 − 1)(q m2 − 1)
)
]
and its weight distribution is given in Table III.
Table III. Weight distribution of the code in Theorem 4.8.
Weight
Frequency
0
1
m1 +m2 +1
2
)
(q−1)(q m −1)(q m1 +m2 −q
q 2 (q m1 −1)(q m2 −1)
q m1 −1
2
(q−1)(q m −1)(q m1 +m2 +q
q 2 (q m1 −1)(q m2 −1)
q m1 −1
2
m1 +m2 +1
2
)
Proof. The proof is completed by Lemma 3.3 and Equation (4.6).
Example 4.9. Let m1 = 2, m2 = 3, m = 6 and q = 3. Then CD in Theorem 4.8 is a [252, 2, 168] two-weight
linear code. Its weight enumerator is given by 1 + 4z 168 + 4z 210 . Its dual is a near-MDS code with parameters
[252, 250, 2].
160
4.3. Shortened linear codes of CD
It is observed that the weights of the code in Theorems 4.2 have a common divisor q − 1. This indicates
that the code CD may be punctured into a shorter one.
Assume that a = 0. Note that x ∈ D implies that ux ∈ D for any u ∈ Fq . Hence, the defining set of CD in
Equation (1.1) can be expressed as
D = (F∗q )D1 = {uv : u ∈ F∗q and v ∈ D1 },
165
(4.7)
where di /dj 6∈ F∗q for every pair of distinct elements di , dj in D1 . Then we obtain a shortened linear code CD1
of CD . By Theorem 4.2, we directly obtain the following result.
Corollary 4.10. Let m, m1 , m2 be positive integers such that m1 |m, m2 |m, and m2 > 1. Denote gcd(m1 , m2 ) =
e. Let CD1 be the linear code and its defining set is given in Equation (4.7) for a = 0. If e = 2 and
m
m2 −1
−1)
, m1 ] and its weight
(m1 , m2 ) 6= (2, 2), then CD1 is a two-weight linear code with parameters [ (q (q−1)(q
m2 −1)(q−1)
170
enumerator is given by Table IV.
Table IV. Weight distribution of the code in Corollary 4.10.
Weight
Frequency
0
1
m1 +m2
m2 −m1
2
2
q
(q −1)(q
−1−(−1)
(q−1)q
)
m
m
(q 1 −1)(q 2 −1)
m2 −m1
m1 +m2
+1
−1
2
2
(q−1)q
)
q m1 −1 (q m −1)(q m2 −1 −1−(−1)
(q m1 −1)(q m2 −1)
m1 −1
m
m2 −1
14
q
m1
−1
q+1
q(q m1 −1)
q+1
Example 4.11. Let m1 = 2, m2 = 4, m = 4. If q = 3, then CD1 in Corollary 4.10 is an optimal [13, 2, 9]
two-weight linear code according to the Griesmer bound and has weight enumerator 1 + 6z 9 + 2z 12 . Its dual
has parameters [13, 11, 2] which is optimal according to [15].
5. Applications
175
In this section, we apply our linear codes to construct secret sharing schemes and strongly regular graphs.
We denote by C ⊥ the dual code of a code C.
5.1. Secret sharing schemes from linear codes
Secret sharing schemes were introduced by Shamir and Blakley for the first time in 1979 [3, 25]. Secret
sharing schemes are used in banking systems, cryptographic protocols, electronic voting systems, and the
180
control of nuclear weapons.
It was shown in [2, 27] that any linear code over Fq can be employed to construct secret sharing schemes.
In order to describe the secret sharing scheme of a linear code (see [1, 12]), we need to introduce the covering
problem of linear codes. The support of a vector c = {c0 , c1 , . . . , cn−1 } ∈ Fnq is defined as {0 ≤ i ≤ n − 1 :
ci 6= 0}. A codeword c1 covers a codeword c2 if the support of c1 contains that of c2 . A minimal codeword
185
of a linear code C is a nonzero codeword that does not cover any other nonzero codeword of C. The covering
problem of a linear code is to determine all the minimal codewords of C. From [12, Theorem 12], we know that
secret sharing scheme with interesting access structure can be derived from C ⊥ provided that each nonzero
codeword of a linear code C is minimal.
If the weights of a linear code C are close enough to each other, then all nonzero codewords of C are minimal,
190
as described as follows.
Lemma 5.1. [1] Let wmin and wmax denote the minimum and maximum nonzero Hamming weights of a q-ary
linear code C, respectively. If wmin /wmax >
q−1
q ,
then every nonzero codeword of C is minimal.
For the codes in Theorem 4.2 and Corollary 4.10, we have
m2 −m1
q−1
q m2 −1 − 1 − (q − 1)q 2
wmin
>
=
m2 −m1
−1
m
−1
wmax
q
2
q
− 1 + (q − 1)q 2
if m1 + m2 ≡ 0 (mod 4), and
m2 −m1
q m2 −1 − 1 − (q − 1)q 2 −1
wmin
q−1
=
>
m2 −m1
wmax
q
q m2 −1 − 1 + (q − 1)q 2
if m1 + m2 ≡ 2 (mod 4).
For the code in Theorem 4.5, we have
m1 +m2
q−1
wmin
q m1 +m2 − q 2
>
=
m1 +m2
+1
wmax
q
q m1 +m2 + q 2
if m1 + m2 ≡ 0 (mod 4), and
m1 +m2
q−1
q m1 +m2 − q 2 +1
wmin
>
=
m1 +m2
wmax
q
q m1 +m2 + q 2
15
if m1 + m2 ≡ 2 (mod 4).
For the code in Theorem 4.8, we have
m1 +m2 +1
2
2
q−1
wmin
q m1 +m2 − q
=
m1 +m2 +1 = 1 −
m1 +m2 −1 >
wmax
q
2
2
q m1 +m2 + q
1+q
195
if m1 + m2 > 3.
From the discussions above, the linear codes obtained in this paper can be used to construct secret sharing
schemes with interesting access structures using the framework in [27].
5.2. Strongly regular graphs from linear codes
A connected graph with N vertices is called a strongly regular graph with parameters (N, K, λ, µ) if it is
200
regular of valency K and the number of vertices joined to two given vertices is λ or µ according as the two
given vertices are adjacent or non-adjacent. The theory of strongly regular graphs was introduced by Bose in
1963 for the first time [4].
A code C is said to be projective if the minimum distance of its dual code C ⊥ is at least 3.
The following lemma gives a connection between projective two-weight linear codes and strongly regular
205
graphs.
Lemma 5.2. [7] If C is a projective two-weight [n, k] linear code over Fq with two nonzero weights w1 , w2 ,
then it is equivalent to a strongly regular graph with the following parameters:
N
=
qk ,
K
=
n(q − 1),
λ =
µ
=
K 2 + 3K − q(w1 + w2 ) − Kq(w1 + w2 ) + q 2 w1 w2 ,
q 2 w1 w2
.
qk
Due to Lemma 5.2, new projective two-weight linear codes yield new strongly regular graphs. Examples
in Section 4 show that our codes are not always projective. In particular, we find two classes of projective
210
two-weight codes in the following.
Lemma 5.3. Let m = m1 , m2 = 2 and other notations be the same as those of Theorem 4.5. Then the linear
m
−1)
code CD in Theorem 4.5 is a projective two-weight [ q(qq2 −1
, m] linear code with weight enumerator
m
2
q m − 1 qm −(−1)
q+1
1+
z
q+1
m
q 2
m
m
−1
2 q 2
q(q m − 1) qm +(−1)
q+1
+
.
z
q+1
Proof. The weight enumerator can be directly obtained by Theorem 4.5. We now prove that CD is projective.
⊥
Let Ai , Bi denote the numbers of codewords with Hamming weight i in CD and CD
, respectively. Denote
m
w1 =
m
m
m
q m − (−1) 2 q 2
qm − 1
q(q m − 1)
q m + (−1) 2 q 2 −1
, w2 =
, Aw1 =
, Aw2 =
.
q+1
q+1
q+1
q+1
By the first three Pless Power Moments (see [19]), we have
A + Aw2 = q m − 1,
w1
w1 Aw1 + w2 Aw2 = (n(q − 1) − B1 )q m−1 ,
w2 A + w2 A = (n(q − 1) (n(q − 1) + 1) − B (q + 2(n − 1)(q − 1)) + 2B ) q m−2 .
1
2
2 w2
1 w1
16
Note that n =
q(qm −1)
q2 −1 .
⊥
Solving the above system, we have B1 = B2 = 0. Hence, the minimum distance of CD
is at least 3. The proof is completed.
Lemma 5.4. Let m = m1 , m2 = 2 and other notations be the same as those of Corollary 4.10. Then the
m
−1
linear code CD1 in Corollary 4.10 is a projective two-weight [ qq2 −1
, m] linear code with weight enumerator
m
m
m
2 q 2
2
q(q m − 1) qm−1 −(−1)
q m − 1 qm−1 +(−1)
q+1
q+1
z
z
+
1+
q+1
q+1
m −1
q 2
.
Proof. The weight enumerator can be directly obtained by Corollary 4.10. We now prove that CD1 is projective.
⊥
Let Ai , Bi denote the numbers of codewords with Hamming weight i in CD1 and CD
, respectively. Denote
1
m
m
m
m
q m−1 + (−1) 2 q 2
qm − 1
q(q m − 1)
q m−1 − (−1) 2 q 2 −1
w1 =
, w2 =
, Aw1 =
, Aw2 =
.
q+1
q+1
q+1
q+1
By the first three Pless Power Moments (see [19]), we have
A + Aw2 = q m − 1,
w1
w1 Aw1 + w2 Aw2 = (n(q − 1) − B1 )q m−1 ,
w2 A + w2 A = (n(q − 1) (n(q − 1) + 1) − B (q + 2(n − 1)(q − 1)) + 2B ) q m−2 .
1
2
2 w2
1 w1
215
Note that n =
qm −1
q2 −1 .
⊥
Solving the above system, we have B1 = B2 = 0. Hence, the minimum distance of CD
1
is at least 3. The proof is completed.
Lemmas 5.2 and 5.3 yield the following theorem.
Theorem 5.5. Let gcd( m
2 , q − 1) = 1 and 2|m. Then there exists a strongly regular graph with the following
parameters:
= qm ,
q(q m − 1)
K =
,
q+1
m
m
q m+2 − 2q 2 − 3q − (−1) 2 q 2 (1 − q)
,
λ =
(q + 1)2
m
m
m
m
q(q 2 − (−1) 2 )(q 2 +1 + (−1) 2 )
µ =
.
(q + 1)2
N
220
The following theorem can be directly obtained by Lemmas 5.2 and 5.4.
Theorem 5.6. Let 2|m and m ≥ 4. Then there exists a strongly regular graph with the following parameters:
N
=
K
=
λ =
µ
=
qm ,
qm − 1
,
q+1
m
m
q m − 3q − 2 − (−1) 2 q 2 +1 (q − 1)
,
(q + 1)2
q(q
m
2
m
m
m
− (−1) 2 )(q 2 −1 + (−1) 2 )
.
(q + 1)2
We remark that the parameters of the strongly regular graphs in Theorems 5.5 and 5.6 are probably new
after comparing with known ones in the literature.
17
6. Concluding remarks
225
In this paper, we presented a construction of q-ary linear codes and determined the weight distributions in
some cases based on Gauss sums. Four classes of two-weight linear codes were obtained. Note that these linear
codes have very flexible parameters and are probably new after comparing with known two-weight linear codes
in the literature (see [7, 9, 12, 13, 17, 29] for some known two-weight linear codes). It is interesting that our
construction can produce optimal or almost optimal codes. What’s more, our codes can be used to construct
230
secret sharing schemes with interesting access structures and strongly regular graphs.
Acknowledgments
The authors are very grateful to the reviewers and the Editor for their valuable comments that improved the
quality of this paper. Special thanks go to one of the reviewers for pointing out some knowledge of one-weight
linear codes.
235
References
References
[1] A. Ashikhmin, A. Barg, Minimal vectors in linear codes, IEEE Trans. Inf. Theory 44 (5) (1998) 2010-2017.
[2] R. Anderson, C. Ding, T. Helleseth, and T. Kløve, How to build robust shared control systems, Des.
Codes Cryptogr. 15 (2) (1998) 111-124.
240
[3] G. R. Blakley, Safeguarding cryptographic keys, Proc. Nat. Comput. Conf. 48 (1979) 313-317.
[4] R. C. Bose, Strongly regular graphs, partial geometries and partially balanced designs, Pacific J. Math.
13 (1963) 389-419.
[5] L. D. Baumert and R. J. McEliece, Weights of irreducible cyclic codes, Inf. Contr. 20 (2) (1972) 158-175.
[6] B. C. Berndt, R. J. Evans, K. S. Williams, Gauss and Jacobi Sums, J. Wiley and Sons Company, New
245
York, 1997.
[7] A. Calderbank, W. Kantor, The geometry of two-weight codes, Bull. London Math. Soc. 18 (1986) 97-122.
[8] C. Carlet, C. Ding, and J. Yuan, Linear codes from perfect nonlinear mappings and their secret sharing
schemes, IEEE Trans. Inf. Theory 51 (6) (2005) 2089-2102.
[9] C. Ding, Linear codes from some 2-designs, IEEE Trans. Inf. Theory 61 (6) (2015) 3265-3275.
250
[10] C. Ding, X. Wang, A coding theory construction of new systematic authentication codes, Theoretical
Computer Science 330 (1) (2005) 81-99.
[11] C. Ding, C. Li, N. Li, and Z. Zhou, Three-weight cyclic codes and their weight distributions, Discrete
Math. 339 (2) (2016) 415-427.
18
[12] K. Ding, C. Ding, A class of two-weight and three-weight codes and their applications in secret sharing,
255
IEEE Trans. Inf. Theory 61 (11) (2015) 5835-5842.
[13] F. De Clerk, M. Delanote, Two-weight codes, partial geometries and Steiner systems, Des. Codes Cryptogr.
21 (2000) 87-98.
[14] P. Delsarte, Weights of linear codes and strongly regular normed spaces, Discrete Math. 3 (1972) 47-64.
[15] M. Grassl, Bounds on the parameters of various types of codes. Avaliable at http://www.codetables.de/.
260
[16] Z. Heng, Q. Yue, A class of binary linear codes with at most three weights, IEEE Commun. Letters 19
(9) (2015) 1488-1491.
[17] Z. Heng, Q. Yue, Two classes of two-weight linear codes, Finite Fields Appli. 38 (2016) 72-92.
[18] Z. Heng, Q. Yue, Evaluation of the Hamming weights of a class of linear codes based on Gauss sums, Des.
Codes Cryptogr. 83 (2) (2017) 307-326.
265
[19] W. C. Huffman, V. Pless, Fundamentals of Error-Correcting Codes. Cambridge, Cambridge Univ. Press,
2003.
[20] T. Kløve, Codes for Error Detection, Singapore, World Scientific, 2007.
[21] C. Li, Q. Yue, A class of cyclic codes from two distinct finite fields, Finite Fields Appli. 34 (2015) 305-316.
[22] C. Li, Q. Yue, and F. Li, Hamming weights of the duals of cyclic codes with two zeros, IEEE Trans.
270
Inform. Theory 56 (6) (2014) 2568-2570.
[23] R. Lidl, H. Niederreiter, Finite Fields, Cambridge Univ. Press, Cambridge, 1984.
[24] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes. II, Amsterdam, The
Netherlands: North-Holland, 1977, vol.16.
[25] A. Shamir, How to share a secret, Commun. Assoc. Comp. Mach. 22 (11) (1979) 612-613.
275
[26] G. Xu, X. Cao, S. Xu, Two classes of p-ary bent functions and linear codes with three or four weights,
Cryptogr. Commun. 9 (2017) 117-131.
[27] J. Yuan, C. Ding, Secret sharing schemes from three classes of linear codes, IEEE Trans. Inf. Theory 52
(1) (2016) 206-212.
[28] S. Yang, Z. Yao, Complete weight enumerators of a family of three-weight linear codes, Des. Codes
280
Cryptogr. 82 (2017) 663-674.
[29] Z. Zhou, N. Li, C. Fan, et al., Linear codes with two or three weights from quadratic bent functions, Des.
Codes Cryptogr. 81 (2016) 283-295.
[30] Z. Zhou, C, Ding, A class of three-weight cyclic codes, Finite Fields Appli. 25 (2014) 79-93.
19
| 7cs.IT
|
An efficient counting method for the colored triad census
Jeffrey Lienerta,b,c , Laura Koehlya , Felix Reed-Tsochasb , Christopher Steven
Marcuma,c
arXiv:1802.01481v1 [cs.DS] 5 Feb 2018
a
National Human Genome Research Institute, National Institutes of Health
b
Saı̈d Business School, University of Oxford
c
Corresponding Author
Abstract
The triad census is an important approach to understand local structure in network
science, providing comprehensive assessments of the observed relational configurations between triples of actors in a network. However, researchers are often interested
in combinations of relational and categorical nodal attributes. In this case, it is desirable to account for the label, or color, of the nodes in the triad census. In this paper,
we describe an efficient algorithm for constructing the colored triad census, based, in
part, on existing methods for the classic triad census. We evaluate the performance
of the algorithm using empirical and simulated data for both undirected and directed
graphs. The results of the simulation demonstrate that the proposed algorithm reduces computational time by approximately 17,400% over the naı̈ve approach. We
also apply the colored triad census to the Zachary karate club network dataset. We
simultaneously show the efficiency of the algorithm, and a way to conduct a statistical test on the census by forming a null distribution from 1, 000 realizations of a
mixing-matrix conditioned graph and comparing the observed colored triad counts
to the expected. From this, we demonstrate the method’s utility in our discussion
of results about homophily, heterophily, and bridging, simultaneously gained via the
colored triad census. In sum, the proposed algorithm for the colored triad census
brings novel utility to social network analysis in an efficient package.
Keywords: triad census, labeled graphs, simulation
1. Introduction
The triad census is an important approach towards understanding local network
structure. ? ] first presented the 16 isomorphism classes of structurally unique triads
Preprint submitted to XXX
February 6, 2018
possible in a directed network. To conduct a triad census, one simply counts each
occurrence of these structures, without respect to the labeling of the nodes (here we
use node label, color, characteristic, and attribute interchangeably). This is useful
insofar as specific triads, or combinations thereof, may relate to underlying social
processes giving rise to an observed network. For example, bridges (triads with one
null dyad and two non-null dyads) may be important in navigating social networks
[? ], and certain triads may be more or less favorable based on structural balance
theory (e.g. the 300 is balanced but the 201 is not, see Figure 1) [? ]. Moreover, a
variant of the triad census, motif analysis, investigates the statistics of various triad
configurations (motifs), and has found wide application in biology [? ].
Also important to network structure are nodal characteristics and how they relate
to tie formation or dissolution. This has been the subject of research on homophily
(individuals having similar attributes with those to whom they are connected) [? ].
However, homophily is an observed phenomenon, not a process. The processes giving
rise to homophily are varied, often confound the relationship between networks and
outcomes, and are difficult to tease apart [? ]. Methodological advances, such as
stochastic actor-oriented models can disentangle these effects to some some extent [?
]. Other analyses have attempted to disentangle the processes leading to homophily
from structural processes, such as triadic closure [? ]. Additionally, the coloring of
nodes in a network has been an important question for many graph theorists and
indeed represents a major topic in this field [? ].
Although nodal characteristics and the triad census are important, they have
rarely been examined fully in conjunction. Yet, there are a few cases where specific
2
colored triads have been studied. For example, ? ] study brokerage based on triad
structure and group membership simultaneously. This same approach has been used
to study brokerage in dynamic networks [? ]. As well, a study by ? ] examined specific colored triads based on generational membership within families; in this work
the authors showed that inter-generational ties were observed in different quantities
than expected based on the underlying null model. None of the past research evaluated the full census of colored triads, rather, researchers have focused instead on
specific colored triads that were a priori expected to be relevant to the processes at
hand. As a result, these foundational works were not exhaustive with respect to all
alternatives. In other words, previous research examining a subset of colored triads
likely had an amount of false negatives due to not examining every colored triad;
this could be addressed by censusing the colored triads.
The examination of node characteristics together with local structure is important as it provides opportunity to simultaneously study the occurrence of triadic
structure, nodal attributes, and the interactions between them. For instance, certain
colored triads may be impermissible, such as three-cycles between strict heterosexuals in mixed-orientation sexual contact networks [? ]. Impermissible triads would
be categorized the same as those that were not observed due to chance in a triad
census, potentially missing important social processes or constraints at play in this
type of network. Only by incorporating node coloring into the triad census can this
pattern be fully elucidated.
Based on this methodological gap in the literature, we develop a method to census
the colored triads for any one-mode binary network with arbitrary number of colors.
3
Due to the large numbers of unique isomorphism classes as the number of colors
increases, this method requires computational efficiency in addition to mathematical
accuracy. As well, one is often interested in forming a null distribution with which to
compare observed colored triad counts. If the null distribution cannot be analytically
solved, one would likely census the colored triads of many simulated networks, further
increasing the need for the algorithm to be computationally efficient.
Current efficient methods for the triad census exploit the sparseness of networks
[? ], and scale sub-quadratically (as the number of edges increases the time to run
the algorithm is faster than the number of edges squared). However, methods that
exploit network sparseness by inferring the number of null triads do not work in
the colored case because they do not explicitly interrogate every triad, and there
are variations within the null triads due to the coloring. Therefore, we extend the
methodology of ? ], which is based on matrix algebra and interrogates every triad;
his method scales sub-quadratically with the number of nodes.
This paper (1) presents the colored triad census and its computational complexity,
(2) shows that this approach can be used on large networks (tested for up to 10, 000
nodes) with up to 10 colors in relatively efficient time, and (3) uses the method many
times to create null distributions of colored triad censuses to form the basis of conditional uniform graph tests. We illustrate the benefits of an analysis incorporating
the colored triad census using a well-known dataset, Zachary’s Karate Club [? ].
4
2. Algorithm
Since the original appearance of the triad census in 1976, a number of papers
have explored how to compute the triad census of a network in an efficient manner.
Although sub-quadratic methods exist for calculating the triad census (e.g. ? ]), we
use the quadratic algorithm presented by ? ] here. This is because the more efficient
methods avoid interrogating null triads directly by taking advantage of the sparseness
of graphs, the subsequent large number of null (003) triads, and the known number
of total triads. Instead, they interrogate all triads with at least one edge, and then
subtract that count from the total number of triads in the network to arrive at the
number of null triads. This is insufficient in the colored triad census as there are
differently-colored null triads, and their number cannot be algebraically determined.
Moody’s algorithm does not employ this limiting shortcut, and we therefore use it as
a basis for our colored triad census algorithm. Additionally, because many networks
are sparse, we can leverage computational techniques for increasing the efficiency of
sparse matrix operations [? ], further reducing the computational complexity of our
method.
? ] showed that the count of each of the 16 triad isomorphism classes could
be derived by using matrix algebra on the adjacency matrix of the graph and its
derivatives. To review, let A be the adjacency matrix of a network, and Aij = 1
when a tie exists from node i to node j. Let E be the symmetrized matrix A, formed
by making any edge in A reciprocal via Eij = max(Aij , Aji ). The complement of
E, Ē, is formed by subtracting the complete network adjacency matrix from E,
so that Eij = 1 if and only if there is neither a tie from i to j nor a tie from j
5
to i. Next, we have M , the mutual matrix of A, and is made by removing any
asymmetric edges from A, or Mij = Mji = 1 ⇐⇒ Aij = Aji = 1. Finally, C is
the matrix of only asymmetric edges, and is calculated by C = A − M . Therefore,
Cij = 1 ⇐⇒ Aij = 1 & Aji = 0. Based on these matrices, Moody demonstrates how
to calculate the number of each of the 16 isomorphism classes for the case of unlabeled
graphs (or, equivalently, for a graph consisting of nodes of the same single color).
Generally, this was done by multiplying (either through dot-product or element-wise
multiplication) the three matrices corresponding to the relevant edges in the triad of
interest. There were two triads (111U and 111D) that were not directly amenable to
this process and were calculated via addition and subtraction of other triad types,
respectively.
To extend this work to the case of multiple colors, we introduce the out-coloring
0
and in-coloring matrices, K r and K r , respectively, where r is the focal color of
matrix K. Here, the in-coloring matrix is the transpose of the out-coloring matrix.
The out-coloring matrix is calculated by evaluating the color of the nodes row-wise,
such that rows indexing nodes of the focal color are composed in the following way:
r
Ki•
=
1 if R(i) = r
(1)
0 if R(i) 6= r
Where R(i) is a function returning the color of node i. As above, the in-coloring
matrix is the transpose of the out-coloring matrix in Eq. 1.
Our algorithm works by using the in- and out-coloring matrices to evaluate and
“switch on” edges that have nodes of the focal colors at the ends (or tails) of edges
6
in the adjacency matrix A of the network. We adapt the triad census nomenclature
of ? ] by appending the colors after the name of the triad. The colors are ordered
from the top node proceeding clockwise in Figure 1. We have arbitrarily adapted
the orientation of the triads from the triad census figure in ? ] for computational
reasons. The orientation is important here because triads with the same orientation
may no longer be isomorphic when color is introduced. Figure 1 makes it possible
to count unambiguously and name only unique colored triads. Therefore, T102−123
is the triad consisting of 1 symmetric dyad and 2 null dyads, where the top node is
of color 1, the bottom-right node is of color 2 and the bottom-left node is of color
3. This is distinct from the T102−312 triad because the coloring of the nodes is not
identical from the previous triad.
Following this, the general formula for an arbitrary triad “T” with an arbitrary
coloring triplet is:
0
0
0
T = T r (K 1 × H(T, 1, 2) × K 2 )(K 2 × H(T, 2, 3) × K 3 )(K 3 × H(T, 3, 1) × K 1 ) (2)
In the above, “×” refers to element-wise multiplication, and “Tr” is the trace
function. For an arbitrary triad, “T” has a color triplet r1 , r2 , r3 . H(T, i, j) is a
function returning the matrix specific to the type of edge between nodes i and j
in triad “T ”. For example, in a 102 triad, the first edge from the top node going
clockwise is a symmetric edge from node one to node two (Figure 1). H(T102 , 1, 2)
in this case would be the matrix E for the symmetric matrix, and the sandwiching
color matrices would turn the proper edges on and off if nodes one and two were of
7
the specified colors. If the edge is an asymmetric one, and the direction of the edge
in Figure 1 is counter-clockwise, then C 0 is used instead of C to force the edge to go
in the proper direction.
At this point, there are redundant triads due to certain colored triads being
isomorphic. For instance, the T003−122 is isomorphic with T003−221 and T003−212 , and
would be triple-counted. These are removed by checking for isomorphisms based
on matrix row and column permutations of the triad. If two colored matrices are
identical after such row and/or column permutations, then they are isomorphic, and
one is removed. We arbitrarily decide to discard the triad whose coloring triplet
name comes second alphanumerically. It should be noted that removing in this way
is computationally expensive, particularly as the number of colors and nodes grows
large. We therefore shorten this process by performing it once for 1 to 10 colors and
storing the unique isomorphism classes. This leaves only unique isomorphism classes
of colored triads, which can then be accessed in linear time.
The number of unique isomophism classes for a given number of colors can be
shown for each of the 16 ismorphism classes in the triad census. The 16 classes
separate into four types of colored triads, depending on how many structurallydistinct positions there are in the triad (e.g. the two ends of the edge in a 102 triad
are not structurally-distinct from one another, but are distinct from the node with
no edges). The calculation for the number of each isomorphism class for arbitrary
number of colors (k) is shown in Table 1. Each combinatoric term in each row
(together with their respective leading permutation coefficients) counts the number
of colored triads when there are three, two, or one unique color(s), respectively. For
8
example, in a network with three colors,the ‘300’ and ‘003’ classes have only one
accessible permutation when there are three colors present in the triad (i.e. 33 ), six
ways when there are two colors (i.e. 2 32 ), and one way when there is one color in
the triad (i.e. 31 ).
Isomorphism classes
Number of colored
triads
k
k
k
300 and 003
+ 2 2 + 1
3
k
030C
2 3 + 2 k2 + k1
102 021D 021U 201 120D and 120U
3 k3 + 4 k2 + k1
012 021C 111D 111U 030T 120C and 210
6 k3 + 6 k2 + k1
Table 1: Expression for the number of isomorphism classes within a triad class. k is the number of
colors
If these numbers are summed over the 16 isomorphism classes, the total number
of colored isomorphism classes of triads for k colors is returned. Similarly, the same
can be done for undirected triads, solely summing over the 4 triads observed in the
undirected case. Table 2 reports the total number of colored triads for undirected
and directed networks over a range of k. Clearly, the number of isomorphism classes
grows quite quickly as k increases.
The algorithm implemented as an R package is publicly available and is linked
to this paper via github: https://github.com/jlienert/ColoredTriadCensus.
3. Algorithmic Performance
Theoretically, if basic matrix multiplication is used, this algorithm runs with
computational complexity O(N 2 ∗ 3k ). It scales with the number of nodes squared
(N 2 ) because of the matrix multiplication involved in the algorithm. The scaling
with the number of colors cubed comes from the number of distinct colored triads
9
Number of
colors
Number of directed
colored triads
Number of undirected
colored triads
1
2
3
4
5
6
7
8
9
10
16
104
328
752
1440
2456
3864
5728
8112
11080
4
20
56
120
220
364
560
816
1140
1540
Table 2: The number of colored triad isomorphism classes for directed and undirected networks for
k ranging from 1 to 10.
the algorithm needs to evaluate. By taking advantage of methods for matrix multiplication using sparse matrices (as appropriate due to the sparse nature of most
social networks), this complexity is reduced to something closer to O(N log(N ) ∗ 3k ).
To test the efficiency of the algorithm, we apply it to networks ranging in size
from n = 10 to n = 10, 000 with the number of colors ranging from k = 1 to k = 10,
all holding the average density constant at 0.01 by creating Erdös-Rényi graphs with
those parameters. The runtime of the algorithm with these parameters can be seen
in Figure 2. In general, increasing K results in constant increases in log(runtime),
which is what we expect based on the theoretical computational complexity. As
expected, we also observe a super linear increase in log(runtime) as N increases.
Although it is super linear, it is still well below the linear curve that would exist if
we used matrix multiplication not optimized for sparse matrices. Finally, we observe
changes in the rank-order and decreases in runtime going from 10 to 100 nodes. This
is also due to the computational time involved in initializing the sparse matrices and
10
storing and operating on sparse matrices, and as such is not unexpected. To be perfectly optimized, therefore, the algorithm would use standard matrix multiplication
for small networks, and switch to sparse methods for larger networks. However, the
gains would be minimal, generally under 10 seconds, and would require additional
logical steps to check for network size, further minimizing the gain. We therefore use
sparse matrix methods for all network sizes.
4. Empirical Use and Example
To show the empirical value of this algorithm, we use the Zachary karate club
social network [? ]. This is a well-known historical network that describes the social
relationships between 34 members of a university karate club. Ties exist between
members if they overlapped in at least one of eight contexts representing undirected
relations. These relations varied in terms of likely strength of the association. Likely
at the weak end of the spectrum is being enrolled in the same class at the university,
while likely at the strong end is being a student-teacher at the studio. Additionally,
three ties are specific to activities with a part-time instructor. Member “factions”
were identified as a node attribute, taking one of five mutually exclusive values:
strongly associated with the president, weakly associated with the president, neutral,
weakly associated with the part-time instructor, or strongly associated with the parttime instructor. These are labeled ”Zs”, ”Zw”, ”N”, ”Hw”, and ”Hs”, respectively.
These labels can be placed on an ordinal scale from -2 (Zs) to 2 (Hs) to quantify
members’ direction and strength of alignment. This undirected network with five
colors represents a case that is rich in the number of colored triads (220) for detailed
11
conclusions to be drawn using the proposed algorithm (which is general to both
undirected and directed networks).
We initially ran the colored triad census on the social network using the faction
as the nodal attribute. This gave our empirical observed colored triad census. To
determine whether these triads were observed more or less often than expected by
chance, we construct a null model. As the choice of null model can have important
ramifications for the null distribution of triads, we chose a model where edge formation is a function of the probability of ties between nodes of specific attributes [? ].
The null model is a mixing-matrix conditioned uniform random graph distribution
based on probabilities of edges between nodes of particular color combinations [?
]. This matrix comprises empirical probabilities of ties between groups, with the
diagonal representing within-group tie probabilities. This means that significantly
over- or under-represented colored triads are observed as such due to network effects
beyond homophily and heterophily. Networks are then generated from this matrix
via a Bernoulli random graph process á la ? ]. Here, then, this null model therefore
conditions on graph size, the distribution of node factions, and the probability of
ties within and between factions. By generating networks from the null model, we
can observe whether colored triad counts deviate from that expected based on the
marginal distribution of faction mixing. Because we condition on the above parameters, if we observe statistical deviations in our colored triad census, it indicates that
the structure of the network is dependent on parameters other than those on which
we conditioned.
Moreover, for any triad, the expected number and variance can be calculated
12
assuming each tie follows a Binomial distribution (which is a reasonable assumption
for most binary social network data). The observed number can then be compared
to these numerical results and a p-value extracted from an exact Binomial test. This
equates to the following probability, expectation, and variance for an example colored
triad:
P (T ) =P (Aij = 1|R(i) = r1 , R(j) = r2 ) × P (Aij = 1|R(i) = r2 , R(j) = r3 )
(3)
×P (Aij = 1|R(i) = r3 , R(j) = r1 )
L(T ) P
E(T ) = P (T ) ×
Y
r=1
r
K•1
S(T, r)
V (T ) = E(T ) × (1 − P (T ))
(4)
(5)
The probability of T , P (T ) in Equation 3 is based on the mixing-matrix of the
three colors (r) involved in the triad T . As is standard for the mixing-matrix approach, this continues to assume that all edges in the graph are independent. For
the expected value of a specific triad, we multiply the probability of a single one
of those triads by the total number of colored triplets that exist in the graph. In
Equation 4, the expectation of the triad, L(T ) returns the number of unique colors in
P r
T and
K•1 is the number of nodes of color r in the graph. Also, we take the nodes
one, two, or three at a time depending on how many times that color repeats in T ,
represented by S(T, r). This expectation therefore follows a binomial distribution,
and it’s variance follows accordingly in Equation 5.
13
However, to show that this method also works for null distributions that are not
analytically solvable, we construct a null distribution based on simulated draws from
the null model. As the number of trials increases, the simulated null distribution
of the colored triad census should asymptotically approach the analytical solution
shown above. For each of 1, 000 trials, we draw random networks from the null
distribution, and run the triad census on all these networks. Comparing our observed
count to the null distribution then allows us to get an approximate p-value for a
conditional uniform graph test, and test the over- or under-representation of each
colored triad. We now turn to these results.
4.1. Results
Figure 3 is a heatmap of the approximate p-values associated with each binomial
exact test against the null for each triad, clustered by the triad and the colored
triplet as returned by the proposed algorithm. We use a clustering algorithm to
group color triplets with similar profiles across the types of triads. This assists
with identifying trends across different colored triads, leading to conclusions that
would likely be missed if all the colored triads were individually examined. We find
particular importance in three branch cutpoints in the clustering algorithm on the
color triplets. The first branch in the clustering algorithm (A in Figure 3) separates
four color triplets, comprising 16 colored triads, with a pattern of over-observed 003
and 102 triads, and under-observed 201 and 300 triads. These results show that these
color triplets are those that are less clustered than expected by chance. The color
triplets all contain nodes of two factions with the first two nodes being Hs, that is,
those strongly aligned with the part-time instructor. This indicates that those who
14
are so aligned are likely to form ties to one another, but not to members of other
factions. The only exception in this group is that two Hs nodes are more likely to
form a tie from one of the Hs members to a Hw member, but even in this case the
complete triad (003) is still observed less than expected by chance. This particular
result is, perhaps, unsurprising, since Hs and Hw members are close in alignment,
more so than with those aligning with the president. Therefore, given the tendency
towards homophily they are likely to overlap, though less strongly than members of
the same faction; hence, the under-observed T003−HsHsHw .
15
003
012
102
021D
021U
021C
111D
111U
030T
030C
201
120D
120U
120C
210
300
Figure 1: The 16 isomorphism classes of triads and their orientation used here with respect to the
color numbering. When colors are added to these triads, they are labeled starting from the top
node and proceeding clockwise.
16
Algorithmic runtime
3
2
0
1
Log(running time)
4
5
3 Colors
4 Colors
5 Colors
6 Colors
7 Colors
8 Colors
9 Colors
10 Colors
1.0
1.5
2.0
2.5
3.0
3.5
4.0
Log(# nodes)
Figure 2: Runtime of the algorithm on networks ranging from size 10 to 10, 000 nodes in orders
of magnitude, and from one to ten colors. These runtimes were generated using a PC running
Windows 7, with an Intel i7 2.80 GHz Chip and 16GB of RAM.
17
18
80
Count
40
A
0 0.2
B
Value
0.6
1
C
Color Key
and Histogram
003
102
201
300
H sZsZs
ZsN N
ZsZsZs
ZsN Zs
ZsH w Zs
ZsZw Zs
ZsN H w
H sH sH s
N H sH w
H sZw N
H sZw H w
H sN N
H w ZsZs
ZsZw H w
H sZw Zw
ZsZw N
H sN H w
N ZsZs
H sH w Zs
ZsH sN
ZsZw Zw
N H sH s
ZsH sH s
ZsH sH w
Zw ZsZs
N H sZs
H w H sH s
H w H sZs
ZsH sZw
ZsH sZs
Zw H sZs
H sN Zs
Zw H sH s
H sH sN
H sH sZs
H sH sZw
H sH sH w
H w H sH w
Zw H sZw
N H sN
H sH w H w
H sZw Zs
ZsH w H w
ZwZwN
ZwZwZw
ZwZwHw
ZwNN
ZwNHw
ZwHwHw
NNN
NNHw
NHwHw
HwHwHw
NZwZw
NZwN
NZwHw
NZwZs
HwZwZw
HwZwN
HwZwHw
HwZwZs
HwNN
HwNHw
HwNZs
ZwNZs
ZwZwZs
ZwHwZs
NNZs
NHwZs
HwHwZs
Zw H sH w
Zw H sN
N H sZw
H w H sZw
H w H sN
Figure 3: Heatmap of colored triads and their corresponding p-value of how often they were observed in the empirical networks relative to the null distribution.
The columns separate triads based on the MAN configuration, and the rows separate triads based on the triplet of colors. Standard clustering algorithms were used
to create the dendrograms. White space indicates redundant isomorphism classes. Gray boxes are either those with 0 triads observed in the network or in any of
the networks of the null distribution, and therefore have an undefined pseudo p-value, or those with a pseudo p-value of 0.5. The three labels correspond to three
breakpoints in the clustering that separate meaningful groups. (A) is a group of four color triplets exhibiting homophily between Hs nodes. (B) is a group of 21
colored triplets exhibiting low clustering between heterogeneous nodes. (C) is a group of 6 colored triplets that show potential significant amounts of bridging.
0
The second branching point in the clustering (B in Figure 3) separates the group
of color triplets that are over-observed for the 003 triad, under-observed for the 102
and 201 triads, and observed about as much as expected for the 300 triads. All the
triplets in question have nodes of different factions in the first and second position.
Because the edge in the 102 triad is between the first and second node in the triplet
(Figure 1), this means that these are all triplets where the first edge is less likely
than expected by chance, and the lack of formation of the first edge subsequently
hampers the formation of the edge between the second and third nodes in the triplet
(201 triad). The first two nodes of these triplets are often (e.g., 16 out of 21) two
factions at least a distance of two away (e.g. N and Hs), indicating members of
a faction are not likely to overlap with members who are too disparate from their
faction. Put another way, this pattern of triads shows a lack of faction heterophily.
The third branch point (unlabeled) is primarily singling out the group of color
triplets that were not observed in the network, and we cannot draw conclusions about
their prevalence. The fourth branch point (C in Figure 3), however, distinguishes a
group of five triplets that are under-observed for the 102 triad and over-observed for
the 201 triad. This means that the edge between the first two nodes is less likely
than expected by chance, but once that edge does occur, the second edge occurs
more often than expected by chance. All these triplets begin with a Zs member,
and the 201 triad in this case is effectively a bridging tie between it and another.
Interestingly, the bridging node is anything other than an Hs (whom are primarily
consigned to this role in branch A, as discussed above). The third node was another
Zs member in four of five triplets. This indicates that Zs members of the karate
19
club did not often overlap members of other factions, but when they did, provided
it was not with an Hs, that second person also often overlapped with another Zs.
Although the above examples show homophily and bridging, analyzing the full
colored triad census allows us to draw further conclusions by looking at other colored
triads. In particular, the homophily has mostly been a story of the Hs nodes, and the
bridging primarily about the Zs nodes. The 300 triad of both of these factions, when
comprising three nodes of the same faction, are observed more often than expected
by chance in both cases, which has different implications on the previously-noted
results. For the Hs nodes, homophily is strengthened, as not only do Hs nodes not
often overlap with members of other factions, they also very strongly overlap with
one another. This may partially be an artifact of the types of overlap, as stated
before, three of the overlap activities involve direct participation in the part-time
instructor’s studio, but there are no corresponding groups for the president. This
means that those who are Hs or Hw may have more opportunity to overlap with
one another due solely to the structure of the data. On the other hand, the triplet
of all Zs members also has an over-observed 300 triad. Although there are other
triads that seem to indicate bridging between Zs members (C in Figure 3), given
that Zs members are also densely connected to one-another, the practical effect of
these potential bridging ties is reduced. Observing this joint effect of homophily and
bridging ties was possible only through the complete colored triad census. Neither
a standard triad census nor a brokerage analysis would have revealed the intricacies
of these results.
In sum, it is clear from these results that the colored triad census allows one
20
to examine multiple trends simultaneously that are often done in isolated analyses,
including homophily, heterophily, and brokerage. Importantly, it also allows for
generalizations based on the clustering of various triads or color triplets, as well as
specific results based on individual triads. In this manner, the colored triad census
can yield results on multiple structural levels simultaneously, all while examining
local structure, nodal attributes, and their interaction—that is, net of all alternatives
involving mixtures of node coloring and triadic configurations.
5. Limitations
There are some limitations to this method. First, it is only computationally
efficient relative to existing methods (including brute force counting). Networks of
10, 000 nodes or more will take over a day to run using the proposed algorithm for the
colored triad census. However, this is an easily paralellizable process (by partitioning
the separate algebraic steps, for example), and so the real time necessary to run the
analysis can be greatly reduced by taking advantage of this feature. The time needed
for the parallelized colored triad census is approximately inversely proportional to
the number of computational cores used in the calculation (plus some overhead).
Second, the complete explication of all colored triads has both benefits and potential
pitfalls. Examining all of the triads simultaneously eliminates the possibility of
missing interesting results because a specific colored triad was excluded. However,
the sheer number of colored triads means that making complete sense of results can
be difficult, due to information overload. Even if the results are carefully examined
for all colored triads, it is conceivable that one might miss an important result out of
21
the 11, 080 colored triads in a directed, 10-color network, no matter how meticulous
the examiner’s eye. However, use of standard clustering algorithms and heatmaps
(as here) may help to ease interpretation of the results at both a coarse (general
groups of triads) or fine-grained (individual colored triads) perspective.
6. Conclusions
In this paper, we have extended the matrix algebra methods of ? ] to calculate
the colored triad census for any network, directed or undirected, with an arbitrary
number of colors in a relatively computationally efficient manner. We have shown a
number of mathematical results regarding the colored triad census, including a generalized equation for an arbitrary colored triad, the number of isomorphism classes
for arbitrary numbers of colors, and the expectation and variances for colored triads.
We analyzed an empirical social network using our algorithm, and calculated approximate p-values for each colored triad, based on an analytic exact binomial test
for less complex null distributions, or approximately through simulation for more
complex null distributions. We have also shown the type of conclusions that can be
drawn from these results, observing results that would not be feasible with many
other currently available methods.
One additional benefit of this method is that it can be directly used as a counting
tool for sufficient statistics in network inference models, such as exponential random
graphs (ERGM). The colored triad census essentially allows one to simultaneously
evaluate the effect of local structure and node attribute on network structure in an
ERGM, building off previous work where researchers explicated the ERGMs capacity
22
for including the triad census [? ]. We believe that the colored triad census is a useful
technique with an efficient implementation that can be widely-applicable in social
networks research, showing the continued importance of the triad census even in this
era of stochastic models for complex networks.
7. Acknowledgements
8. References
23
Appendix A. Variable and Functional Definitions
Variable or function notation
A
E
Ē
M
C
Kr
R(i)
H(T, i, j)
T
L(T )
S(T, r)
P (T )
E(T )
V (T )
Description of variable or function
Adjacency matrix
Symmetrized adjacency matrix
Complement of symmetrized adjacency matrix
Adjacency matrix including only mutual ties
Adjacency matrix including only asymmetric ties
Coloring matrix for color r
Function returning the color of node i
Function returning the matrix of the edge in triad T
between nodes i and j
An arbitrary colored triad, with a MAN configuration,
and colored triplet r1 , r2 , r3
A function returning the number of unique colors for
a given colored triad
Function returning the number of times color r
appears in colored triad T
The probability of observing triad T
The expectation of triad T under a binomial model
The variance of triad T under a binomial model
Table A.3: List of variables, constants, and functions defined in this manuscript.
24
| 8cs.DS
|
Compressive Sampling of Ensembles of Correlated Signals
Ali Ahmed and Justin Romberg∗
arXiv:1308.5146v3 [cs.IT] 15 Dec 2017
DRAFT: 2:46am, December 18, 2017
Abstract
We propose several sampling architectures for the efficient acquisition of an ensemble of correlated
signals. We show that without prior knowledge of the correlation structure, each of our architectures
(under different sets of assumptions) can acquire the ensemble at a sub-Nyquist rate. Prior to sampling,
the analog signals are diversified using simple, implementable components. The diversification is achieved
by injecting types of “structured randomness” into the ensemble, the result of which is subsampled.
For reconstruction, the ensemble is modeled as a low-rank matrix that we have observed through an
(undetermined) set of linear equations. Our main results show that this matrix can be recovered using
a convex program when the total number of samples is on the order of the intrinsic degree of freedom of
the ensemble — the more heavily correlated the ensemble, the fewer samples are needed.
To motivate this study, we discuss how such ensembles arise in the context of array processing.
1
Introduction
This paper considers the exact reconstruction of correlated signals from the samples collected at a subNyquist rate. We propose several implementable architectures, and derive a sampling theorem that relates
the bandwidth and the (a priori unknown) correlation structure to the sufficient sampling rate for successful
signal reconstruction.
We consider ensembles of signals output from M sensors, each of which is bandlimited to frequencies below
W/2 (see Figure 1). The entire ensemble can be acquired by taking W uniformly spaced samples per second
in each channel, leading to a combined sampling rate of M W . We will show that if the signals are correlated,
meaning that the ensemble can be written as (or closely approximated by) distinct linear combinations of
R M latent signals, then this net sampling rate can be reduced to approximately RW using coded
acquisition. The sampling architectures, we propose are blind to the correlation structure of the signals; this
structure is discovered as the signals are reconstructed.
Each architecture involves a different type of analog diversification which ensures that the signals are sufficiently “spread out” so each point sample captures information about the ensemble. Ultimately, what is
measured are not actual samples of the individual signals, but rather are different linear combinations that
combine multiple signals and capture information over an interval of time. Later, we will show that these
samples can be expressed as linear measurements of a low-rank matrix. Over the course of one second, we aim
to acquire an M × W matrix comprised of samples of the ensemble taken at the Nyquist rate. The proposed
sampling architecture produces a series of linear combinations of entries of this matrix. Conditions under
which a low-rank matrix can be effectively recovered from an under-determined set of linear measurements
have been the object of intense study in the recent literature [1–4]; the mathematical contributions in this
paper show how these conditions are met by systems with clear implementation potential.
∗ A. A. and J. R. are with the School of Electrical and Computer Engineering at Georgia Tech in Atlanta, Georgia. Email:
[email protected], [email protected]. This work was supported by NSF grant CNS-0910592, ONR grant N00014-11-1-0459,
and a grant from the Packard Foundation.
1
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
Our motivation for studying these architectures comes from classical problems in array signal processing. In
these applications, one or more “narrowband” signals are measured at multiple sensors at different spatial
locations. While narrowband signals can have significant bandwidth, they are modulated up to a high carrier
frequency, making them very heavily spatially correlated as they arrive at the array. This correlation, which
we review in more detail in Section 1.4, can be systematically exploited for spatial filtering (beamforming),
interference removal, direction-of-arrival estimation, and multiple source separation. These activities all
depend on estimates of the inter-sensor correlation matrix, and the rank of this matrix can typically be
related to the number of sources that are present.
Compressive sampling has been used in array processing in the past: sparse regularization was used for
direction of arrival estimation [5–7] long before any of the “sub-Nyquist” sampling theorems started to make
the theoretical guarantees concrete [8–10]. These results (along with more recent works including [11–13]),
show how exploiting the structure of the array response in free space (for narrowband signals, this consists
of samples of a superposition of a small number of sinusoids) can be used to either super-resolve the DOA
estimate or reduce the number of array elements required to locate a certain number of sources. A single
sample is associated with each sensor, and the acquisition complexity scales with the number of array
elements.
In this paper, we exploit this structure in a different way. Our goal is to completely reconstruct the timevarying signals at all the array elements. The structure imposed on this ensemble is more general than the
spatial spectral sparsity in the previous work; we ask that the signals are correlated in some a priori unknown
manner. Our ensemble sampling theorems remain applicable even when the array response depends on the
position of the source in a complicated way. Moreover, our reconstruction algorithms are indifferent to what
the spatial array response actually is, as long as the narrowband signals remain sufficiently correlated.
The paper is organized as follows. In Sections 1.2 and 1.4 we describe the signal model and its motivation
from problems in array processing. In Section 1.5, we introduce the components (and their corresponding
mathematical models) that we will use in our sampling architectures. In Section 2, we present the sampling
architectures, show how the measurements taken correspond to generalized measurements of a low-rank
matrix, and state the relevant sampling theorems. Numerical simulations, illustrating our theoretical results,
are presented in Section 3. Finally, Section 5, and Section 7 provide the derivation of the theoretical results.
1.1
Notation
We use upper, and lower case bold letters for matrices and vectors, respectively. Scalars are represented
by upper, and lower case, non-bold letters. The notation x∗ denotes a row vector formed by taking the
hermitian transpose of a column vector x. Linear operators, and sets are represented using script letters.
We use [N ] to denote the set {1, 2, 3, . . . , N }. The notation I W denotes a W × W . For a set B` ⊂ [W ],
I B` denotes a W × W matrix with ones at diagonal positions indexed by B` , and zeros elsewhere. Given
two matrices A, and B, we denote by A B, the rank-1 matrix: [vec(A)][vec(B)]T , where vec(A), and
vec(B) are the column vectors formed by stretching the columns of A, and B, respectively, and T denotes
the transpose. We will use A ⊗ B is the usual Kronecker product of A, and B. We will use 1P to denote
a P × 1 vector of all ones. Lastly, the operator E refers to the expectation operator, and P represents the
probability measure.
1.2
Signal model
Our signal model is illustrated in Figure 1. We denote a continuous-time signal ensemble by X c (t): a set
of M individual signals x1 (t), . . . , xM (t). Conceptually, we may think of X c (t) as a “matrix” with a finite
number M of rows, with each row containing a bandlimited signal. Our underlying assumption is that every
signal in the ensemble can be approximated as the linear combination of underlying R independent signals
in a smaller ensemble S c (t). We write
X c (t) = AS c (t),
(1)
2
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
X c (t)
A
X
S c (t)
A
S
M
W
(a)
(b)
Figure 1: (a) Our model is that an ensemble of continuous-time signals are correlated, meaning the M signals can
be closely approximated by a linear combination of R underlying signals. We can write the M signals in X c (t) as
a tall matrix (capturing the correlation structure) multiplied by an ensemble of R latent signals. (b) The matrix of
TexPoint)fonts)used)in)EMF.))
samples inherits the low-rank structure of the continuous-time
ensemble.
Read)the)TexPoint)manual)before)you)delete)this)box.:)A)
where A is an M × R matrix with entries A[m, r]. We will use the convention that fixed matrices operating
to the left of the signal ensembles simply “mix” the signals point-by-point, and so (1) is equivalent to
xm (t) =
R
X
A[m, r]sr (t).
r=1
The only structure, we impose on the individual signals is that they are real-valued, and bandlimited. To
keep the mathematics clean, we take the signals to be periodic for now, however, the results can be extended
to non-periodic signals as will be discussed shortly. We begin with a natural way to discretize the problem;
that is, what exists in X c (t) for t ∈ [0, 1) is all there is to know, and each signal can be captured exactly
with W equally-spaced samples. Each bandlimited, periodic signal in the ensemble can be written as
xm (t) =
B
X
αm [ω] eι2πωt ,
(2)
ω=−B
where the αm [ω] are complex but are symmetric, αm [−ω] = αm [ω]∗ , to ensure that xm (t) is real. We can
capture xm (t) perfectly by taking W = 2B + 1 equally spaced samples per row. We will call this the M × W
matrix of samples X; knowing every entry in this matrix is the same as knowing the entire signal ensemble.
We can write
X = CF ∗ ,
(3)
where C is an M × W matrix whose rows contain Fourier series coefficients for the signals in X c (t), and F
is a W × W normalized discrete Fourier matrix with entries
1
F [ω, `] = √ e−ι2πω`/W ,
W
ω = −B, −B + 1, . . . , B, ` = 0, 1, 2, . . . , W − 1.
Observe that both X, and hence C inherit the correlation structure of the ensemble X c (t). Before moving
on, observe that (1), and (2) impose an R, and B dimensional subspace structure on X, where rank(X) =
min(R, B + 1). If R ≥ B + 1 then we can take R = B + 1 with the underlying independent signals in S c (t)
being the known sinusoids at frequencies ω = 0, 1, 2, . . . , B. However, we are interested in the more pertinent
and challenging case of R < B + 1. In this case, the underlying independent signals in S c (t) are not known in
advance, and the main contribution of this paper is to leverage this unknown correlation structure in X c (t)
to reduce the sampling rate. Lastly, in the interest of readability of our technical results, we assume without
loss of generality that W ≥ M , that is, the bandwidth of the signals is greater than the number of signals.
Same correlated signal model was considered in [14] for compressive sampling of multiplexed signals. Two
multiplexing architectures were proposed and for each, a sampling theorem was proved that dictated minimum number of samples for exact recovery of the signal ensemble. This paper presents sampling architectures, where we use a separate ADC for each channel and rigorously prove that ADCs can operate at roughly
3
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
the optimal sampling rate to guarantee signal recovery. Other types of correlated signal models have been
exploited previously to achieve gains in the sampling rate. For example, [15] shows that two signals related
by a sparse convolution kernel can be reconstructed jointly at a reduced sampling rate. The signal model
in [16] considers multiple signals residing in a fixed subspace spanned by a subset of the basis functions of a
known basis, and shows that the sampling rate to successfully recover the signals scales with the number of
basis functions used in the construction of the signals. In this paper, we also show that the sampling rate
scales with the number of independent latent signals but we do this without the knowledge of the basis. For
a more applied treatment of the results with similar flavor as in [16], we refer the reader to [17–19].
As will be shown later, we observe the signal ensemble X c (t) through a limited set of random projections,
and signal recovery is achieved by a nuclear norm minimization program. A related work [20] considers the
case when given a few random projections of a signal, we find out the subspace to which it belongs by solving
a series of least-squares programs.
1.3
Extension to non-periodic signals
We end this section by noting that their are many ways this problem might be discretized. Using Fourier
series is convenient in two ways: we can easily tie together the notion of a signal being bandlimited with
having a limited support in Fourier space, and our sampling operators have representations in Fourier space
that make them more straightforward to analyze. In practice, however, the recovery technique can be
extended to non-periodic signals by windowing the input, and representing each finite interval using any one
of a number of basis expansions — the low rank structure is preserved under any linear representation. It
is also possible that we are interested in performing the ensemble recovery over multiple time frames, and
would like the recovery to transition smoothly between these frames. For this we might consider a windowed
Fourier series representations (e.g. the lapped orthogonal transform in [21]) that are carefully designed so
that the basis functions are tapered sinusoids (so we again get something close to bandlimited signals by
truncating the representation to a certain depth) but remain orthonormal. It is also possible to adjust our
recovery techniques to allow for measurements which span consecutive frames, yielding another natural way
to tie the reconstructions together.
A framework similar to this for sparse recovery is described in detail in [22].
1.4
Applications in array signal processing
One application area where low-rank ensembles of signals play a central role is array processing of narrowband
signals. In this section, we briefly review how these low-rank ensembles arise. The central idea is that
sampling a wavefront at multiple locations in space (as well as in time) leads to redundancies which can be
exploited for spatial processing. These concepts are very general, and are common to applications as diverse
as surveillance radars, underwater acoustic source localization and imaging, seismic exploration, wireless
communications.
The essential scenario is that multiple signals are emitted from different locations, each of the signals occupies
the same bandwidth of size W which has been modulated up to a carrier frequency ωc . The signals observed
by receivers in the array are, to a rough approximation, complex multiples of one another. To a very
close approximation, the observed signals lie in a subspace with dimension close to one — this subspace is
determined by the location of the source. This redundancy between the observations at the array elements
is precisely what causes the ensemble of signals to be low rank; the rank of the ensemble is determined by
the number of emitters. The only conceptual departure from the discussion in previous sections, as we will
see below, is that each emitter may be responsible for a subspace spanned by a number of latent “signals”
that is greater than one (but still small).
Having an array with a large number of appropriately spaced elements can be very advantageous even when
there only a relatively small number of emitters present. Observing multiple delayed versions of a signal
4
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
allows us to perform spatial processing, we can beamform to enhance or null out emitters at certain angles,
and separate signals coming from different emitters. The resolution to which we can perform this spatial
processing depends on the number of elements in the array (and their spacing).
The main results of this paper do not give any guarantees about how well these spatial processing tasks can
be performed. Rather, they say that the same correlation structure that makes these tasks possible can be
used to lower the net sampling rate over time. The entire signal ensemble can be reconstructed from this
reduced set of samples, and spatial processing can follow.
We now discuss in more detail how these low rank ensembles come about. For simplicity, this discussion
will center on linear arrays in free space. As we just need the signal ensemble to lie in a low dimensional
subspace, and do not need to know what this subspace may be beforehand, the essential aspects of the model
extend to general array geometries channel responses and frequency-selective/multipath channels.
Suppose that a signal is incident on the array (as a plane wave) at an angle θ. Each array element observes
a different shift of this signal — if we denote what is seen at the array center (the origin in Figure 2(a))
by s(t), then an element m at distance dm from the center sees xm (t) = s(t − (dm /c) sin θ). If the signal
consists of a single complex sinusoid, s(t) = eι2πωt , then these delays translated into different (complex)
linear multiples of the same signal,
xm (t) = e−ι2πωrm sin(θ)/c eι2πωt .
(4)
In this case, the signal ensemble has rank1 1; we can write X c (t) = a(θ, ω)eι2πωt , where a(θ, ω) is an
M -dimensional steering vector of complex weights given above.
This decomposition of the signal ensemble makes it clear how spatial information is coded into the array
observations. For instance, standard techniques [23,24] for estimating the direction of arrival involve forming
the spatial correlation matrix by averaging in time,
L
Rxx =
1X
X(t` )X(t` )∗ .
L
`=1
As the column space of Rxx should be a(θ, ω), we can correlate the steering vector for every direction to see
which one comes closest to matching the principal eigenvector of Rxx .
The ensemble remains low rank when the emitter has a small amount of bandwidth relative to a larger carrier
frequency. If we take s(t) = sb (t) eι2πωc t , where sb (t) is bandlimited to W/2, then when W ωc , the a(θ, ω)
for ω ∈ [ωc − W/2, ωc + W/2] will be very closely correlated with one another. In the standard scenario where
the array elements are uniformly spaced c/(2ωc ) along a line, we can make this statement more precise using
classical results on spectral concentration [25,26]. In this case, the steering vectors a(θ, ω) for ω ∈ [ωc ±W/2]
are equivalent to integer spaced samples of a signal whose (continuous-time) Fourier transform is bandlimited
to frequencies in (1 ± W/(2ωc ))(sin θ)/2, for a bandwidth less than W/(2ωc ). Thus the dimension of the
subspace spanned by {a(θ, ω), ω ∈ [ωc ± W/2]} is, to within a very good approximation, ≈ M W/ωc + 1.
Figure 2(b) illustrates a particular example. The plot shows the (normalized) eigenvalues of the matrix
Z
ωc +W/2
Raa =
a(θ, ω)a(θ, ω)∗ dω,
(5)
ωc −W/2
for the fixed values of ωc = 5 GHz, W = 100 MHz, c equals the speed of light, M = 101, and θ = π/4. We
have M W/ωc + 1 = 3.02, and only 3 of the eigenvalues are within a factor of 104 of the largest one.
It is fair, then, to say that the rank of the signal ensemble is a small constant times the number of narrow
band emitters.
1 We are using complex numbers here to make the discussion go smoothly; the real part of the signal ensemble is rank 2,
having a cos(2πωt) and a sin(2πωt) term.
5
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
log10 (kth largest eigenvalue)
0
dm sin ✓
✓
dm
-1
-2
-3
-4
-5
-6
-7
1
2
(a)
3
k→
(b)
4
5
Figure 2: (a) A plane wave impinges on a linear array in free space. When the wave is a pure tone in time, then the
responses at each element will simply be phase shifts of one another. (b) Eigenvalues for Raa , on a log10 scale and
normalized so that the largest eigenvalue is 1, defined in (5) for an electromagnetic signal with a bandwidth of 100
MHz and a carrier frequency of 5 GHz; the array elements are spaced half a carrier-wavelength apart. Even when the
signal has an appreciable bandwidth, the signals at each of the array elements are heavily correlated — the effective
dimension in this case is R = 3 or 4.
1.5
Architectural components
In addition to analog-to-digital converters, our proposed architectures will use three standard components:
analog vector-matrix multipliers, modulators, and linear time-invariant filters. The signal ensemble is passed
through these devices, and the result is sampled using an analog-to-digital converter (ADC) taking either
uniformly or non-uniformly spaced samples — these samples are the final outputs of our acquisition architectures.
dc (t)
x(t)
AVMM
x(t)dc (t)
(b)
x(t)
LTI filter
hc (t)
x(t) ⇤ hc (t)
(c)
M ⇥N
x(t)
(a)
ADC
x(tk )
(d)
Figure 3: (a) The analog vector-matrix multiplier (AVMM) takes random linear combinations of M input signals to
produce N output signals. The action of AVMM can be thought of as the left multiplication of random matrix A to
ensemble X c (t). Intuitively, this operation amounts to distributing energy in the ensemble equally across channels.
(b) Modulators multiply a signal in analog with a random binary waveform that disperses energy in the Fourier
transform of the signal. (c) Random LTI filters randomize the phase information in the Fourier transform of a given
signal by convolving it with hc (t) in analog, which distributes energy in time. (d) Finally, ADCs convert an analog
stream of information in discrete form. We use both uniform and non-uniform sampling devices in our architectures.
The analog vector-matrix multiplier (AVMM) produces an output signal ensemble AX c (t) when we input
it with signal ensemble X c (t), where A is an N × M matrix whose elements are fixed. Since the matrix
operates pointwise on the ensemble of signals, sampling output AX c (t) is the same as applying A to matrix
6
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
X of the samples (i.e., sampling commutes with the application of A). Recently, AVMM blocks have been
built with hundreds of inputs and outputs and with bandwidths in the tens-to-hundreds of megahertz [27,28].
We will use the AVMM block to ensure that energy disperses more or less evenly throughout the channels. If
A is a random orthogonal transform, it is highly probable that each signal in AX c (t) will contain about the
same amount of energy regardless of how the energy is distributed among the signals in X c (t) (formalized
in Lemma 1 below), allowing us to deploy equal sampling resources in each channel while ensuring that
resources on “quiet” channels are not being wasted.
The second component of the proposed architecture is the modulators, which simply take a single signal
x(t) and multiply it by fixed and known signal dc (t). We will take dc (t) to be a binary ±1 waveform that
is constant over time intervals of a certain length 1/W . That is, the waveform alternates at the Nyquist
sampling rate. If we take W samples of dc (t)x(t) on [0, 1), then we can write the vector of samples y as
y = Dx,
(6)
where x is the W -vector containing the Nyquist-rate samples of x(t) on [0, 1), and D is an W × W diagonal
matrix whose non-zero entries are samples d ∈ RW of dc (t). We will choose a binary sequence that randomly
generates dc (t), which amounts to D being a random matrix of the following form:
d[0]
d[1]
D=
(7)
where d[n] = ±1 with probability 1/2,
.
..
d[W − 1]
and the d[n] are independent. Conceptually, the modulator disperses the information in the entire band of
x(t) — this allows us to acquire the information at a smaller rate by filtering a sub-band as will be shown
in Section 2.
Compressive sampling architectures based on the random modulator have been analyzed previously in the
literature [18,29]. The principal finding is that if the input signal is spectrally sparse (meaning the total size
of the support of its Fourier transform is a small percentage of the entire band), then the modulator can be
followed by a low-pass filter and an ADC that takes samples at a rate comparable to the size of the active
band. This architecture has been implemented in hardware in multiple applications [17, 30–33].
The third type of component we will use to preprocess the signal ensemble is a linear time-invariant (LTI)
filter that takes an input x(t) and convolves it with a fixed and known impulse response hc (t). We will
assume that we have complete control over hc (t), even though this brushes aside admittedly important
implementation questions. Because x(t) is periodic and bandlimited, we can write the action of the LTI
filter as a W × W circular matrix H operating on samples x (the first row of H consists of samples h of
hc (t)), that is, y = Hx, where y is the vector of W samples in t ∈ [0, 1) of the signal obtained at the output
of the filter. We will make repeated use of the fact that H is diagonalized by the discrete Fourier transform:
H = F ∗ ĤF ,
(8)
where F is the W√× W normalized discrete Fourier matrix with entries, and Ĥ is a diagonal matrix whose
entries are Ĥ = W F H. The vector Ĥ is a scaled version of the non-zero Fourier series coefficients of
hc (t).
To generate the impulse response, we will use a random unit-magnitude sequence in the Fourier domain. In
particular, we will take
ĥ(0)
ĥ(1)
Ĥ =
(9)
..
.
ĥ(W − 1)
7
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
where
ω=0
±1, with prob. 1/2,
ĥ(ω) = ejθω , with θω ∼ Uniform([0, 2π]), 1 ≤ ω ≤ (W − 1)/2
.
∗
ĥ(W − ω) ,
(W + 1)/2 ≤ ω ≤ W − 1
(10)
These symmetry constraints are imposed so that h (and hence, hc (t)) is real-valued. Conceptually, convolution with hc (t) disperses a signal over time while maintaining fixed energy (note that H is an orthonormal
matrix).
Convolution with a random pulse followed by sub-sampling has also been analyzed in the compressed sensing
literature [34–37]. If the random filter is created in the Fourier domain as above, then following the filter with
an ADC that samples at random locations produces a universally efficient compressive sampling architecture
— the number of samples that we need to recover a signal with only S active terms at unknown locations
in any fixed basis scales linearly in S and logarithmically in ambient-dimension W .
2
Main Results: Sampling Architectures
The main contribution of the paper is a design and theoretical analysis of a sampling architecture in Section
2.3 that enables the sub-Nyquist acquisition of correlated signals. We state a Sampling Theorem 1 that
claims exact reconstruction of the signal ensemble using a much fewer samples compared to those dictated by
Shannon-Nyquist sampling theorem. The proof of the theorem involves the construction of a dual certificate
via golfing scheme to show that nuclear-norm minimization recovers the signal ensemble. Theorem 1 is also
of an independent interest as it is low-rank matrix recovery result form structured-random measurement
ensemble.
We begin with a straightforward architecture in Section 2.1 that minimizes the sample rate when the correlation structure is known. We then combine our components from the last section in a specific way to create
architectures that are provably effective under different assumptions on the signal ensemble. The main sampling architecture in Section 2.3 uses random modulators prior to the ADCs; this architecture is effective
when the energy in the ensemble is approximately uniformly dispersed across time. Moreover, we expect
the signal energy to be dispersed across array elements when the AVMM upfront does not mix the signals.
In Section 2.5, we present a variation of the above architecture in which ensembles are not required to be
dispersed a priori instead the ensemble is preprocessed with LTI filters, and AVMM to ensure dispersion of
energy across time, and array elements.
2.1
Fixed projections for known correlation structure
If the mixing matrix A for ensemble X c (t) is known, then a straightforward way exists to sample the
ensemble efficiently. Let A = U ΣV ∗ be the singular value decomposition of A, where U is M × R matrix
with orthogonal columns, Σ is R ×R diagonal matrix, and V is W ×R with orthogonal columns. An efficient
way is to whiten ensemble A with U ∗ and sample the resulting R signals (each at rate W ). This scheme is
shown in Figure 4. X can be written as a multiplication of matrix U and R × W matrix Y containing the
Nyquist samples of signals x1 (t), . . . , xR (t) respectively in its R rows. The discretized signal ensemble X is
then simply
X = UY .
Knowing the correlation structure U , the ensemble X and hence X c (t) (using sinc interpolation of samples
in X) can be recovered using only the RW samples in Y . Observe that RW is the optimal sampling rate
as it only scales linearly with R, and not with M .
In many interesting applications, the correlation structure of the ensemble X c (t) is not known at the time of
acquisition. In this paper, we design sampling strategies that are blind to the correlation structure U but are
able achieve signal reconstruction at a near optimal sampling rate nonetheless by introducing AVMMs, filters,
8
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
ADC
AVMM
ADC
…
Figure 4: Known correlation structure U : Optimal sampling strategy is to whiten the ensemble X c (t) with U ∗ and
then sample and then sample each of the resultant R signal at rate W . Total RW samples per second is optimal as
it is the actual number of degrees of freedom in underlying R independent signals each bandlimited to W/2.
and modulators. Intuitively, the randomness introduced by these components disperses limited information
in the correlated ensemble across time and array elements; resultantly, the ADCs collect more generalized
samples that in turn enable the reconstruction algorithm to operate successfully in the sub-Nyquist regime.
2.2
Architecture 1: Random sampling of time-dispersed correlated signals
The architecture presented in this section, shown in Figure 5, consists of one non-uniform sampling (nus)
ADC per channel. Each ADC takes samples at randomly selected locations, and these locations are chosen
independently from channel to channel. Over the time interval t ∈ [0, 1), a nus ADC takes input signal xm (t)
and returns the samples {xm (tk ) : tk ∈ Tm ⊂ {0, 1/W, . . . , 1 − 1/W }. The average sampling rate in each
channel is |Tm | = Ω. Collectively, M nus ADCs return M Ω random samples of the input signal ensemble on
a uniform grid.
avg-rate
nus
ADC
nus
ADC
…
…
avg-rate
avg-rate
nus
ADC
Figure 5: M signals recorded by the sensors are sampled separately by the independent random sampling ADCs,
each of which samples on a uniform grid at an average rate of Ω samples per second. This sampling scheme takes on
the average a total of M Ω samples per second and is equivalent to observing M Ω entries of the matrix of samples X
in (3) at random.
Sampling model is equivalent to observing M Ω randomly chosen entries of the matrix of samples X, defined
in (3). This problem is exactly the same as the matrix-completion problem [3], where given a few randomly
chosen entries of a low-rank matrix enable us to fill in the missing entries under some incoherence assumptions
on the matrix X. Since X is rank-R, its SVD is
X = U ΣV ∗ ,
9
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
(11)
where U ∈ RM ×R , Σ ∈ RR×R , and V ∈ RW ×R . The coherence is then defined as
M
∗
∗
∗ 2
2
2 W
2 MW
κ (U , V ) := max
max kU em k2 ,
max kV e` k2 ,
kU V k∞ .
R m∈[M ]
R `∈[W ]
R
(12)
For brevity, we will sometime drop the dependence on U , and V in κ2 (U , V ). In the interest of readability,
we assume without loss of generality here and in the rest of the write up that bandwidth W of the signal is
larger or at least equal to their number M , that is, W ≥ M . Now the matrix-completion result [38] in the
noiseless case asserts that if
Ω ≥ Cκ2 (R/M )W log2 W,
(13)
then the solution of the nuclear-norm minimization in (21) (with A : RM ×W → RM Ω such that A maps
X to randomly chosen entries of X) exactly equals X with high probability. The result indicates that the
sampling rate scales (within some log factors) with the number R of independent signals rather than with
the total number M of signals in the ensemble. When the measurements y are contaminated with additive
measurement noise as in (22) then the result in [39] suggest that the solution X̂ to a modified nuclear-norm
minimization (23) satisfies
kX̂ − Xk2F ≤ Cκ M δ 2 ,
where Cκ is a constant that depends on the coherence κ, defined in (12).
As discussed before, the number of samples for matrix completion scale linearly with κ2 . The coherence
parameter κ2 quantifies the distribution of energy across the entries of X, and κ2 is small for matrices with
even distribution of energy among their entries; see, [3] for details. In the signal reconstruction application
under investigation here, this means that for successful recovery, a smaller sampling rate would suffice if
the signals are well-dispersed across time and array elements. One can avoid this dispersion requirement by
preprocessing the signals with AVMM, and filters. We will adopt this strategy in the construction of the
main sampling architecture of this paper.
2.3
Architecture 2: The random modulator for correlated signals
To efficiently acquire the correlated signal ensemble, the architecture shown in Figure 6, follows a two-step
approach:
In the first step, the AVMM takes M input to produce N output signals, where N/M = P > 1 meaning
that the output signals are more than the inputs. For now, we take N signals at the output to be just P
replicas of M input signals without any mixing.2 This amounts to an N × M mixing matrix
A = IM ⊗
√1
P
1P .
(14)
The normalization by P ensures that A∗ A = I M . We will take a more general random orthogonal A in our
next sampling architecture.
In the second step, each of the N output signals x̃1 (t), x̃2 (t), . . . , x̃N (t) undergo analog preprocessing, which
involves modulation, and low-pass filtering. The modulator takes an input signal x̃n (t) and multiplies it by
a fixed and known dn (t). We will take dn (t) to be a binary ±1 waveform that is constant over an interval
of length 1/W . Intuitively, the modulation results in the diversification of the signal information over the
frequency band of width W . The diversified analog signals are then processed by an analog-low-pass filter;
implemented using an integrator, see [29] for details. Each of the resultant signals is then acquired using
Ω < W uniformly spaced samples per second.
2 Our sampling theorem will show later that it suffices to take the ratio P of the number of output to the input to be
reasonably small. However, as will be suggested by our simulations, it seems P = 1 is always enough, and we believe P > 1
merely a technical requirement arising due to the proof method.
10
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
Our main sampling result in Theorem 1 shows that exact signal reconstruction is achieved in the sub-Nyquist
regime Ω < W , in particular, we only roughly require Ω to be a factor R/M 1 of the Nyquist rate W .
Intuitively, the sub-Nyquist acquisition is possible as the signals are diversified across frequency using random
demodulators, and therefore, every sample provides a generalized or global information.
LTI
low pass
LTI
low pass
ADC
ADC
…
…
LTI
low pass
ADC
Figure 6: Architecture 2: Randomly modulated sampling: M correlated signals in X c (t) are replicated P times to
produce N output signals, this amounts to choosing A = I M ⊗ √1P 1P ∈ RN ×M as the mixing matrix. In practice,
P = 1 suffices. Signals are then preprocessed in analog using a bank of modulators, and low-pass filters. The
resultant signal is then sampled uniformly by an ADC in each channel operating at rate Ω samples per second. The
net sampling rate is ΩN samples per second.
2.3.1
System Model
This section models3 the measured samples as the linear measurements of an unknown low-rank matrix.
We will show that signal reconstruction in t ∈ [0, 1) from samples in the sub-Nyquist regime corresponds to
recovering a M × W approximately rank-R matrix from an under-determined set of linear equations.
The input signal ensemble X c (t) is mixed using AVMM to produce an ensemble of N signals AX c (t). Let
us denote the individual N signals at the output of AVMM by x̃1 (t), x̃2 (t), . . . , x̃N (t). Since mixing is a
linear operation, every signal in the ensemble AX c (t) is bandlimited just as was the case with X c (t) in (3);
therefore, the DFT coefficients of the mixed signals are simply
e = AC.
C
(15)
Each signal x̃n (t) at the output of AVMM is then multiplied by a corresponding binary sequence dn (t)
alternating at rate W . Each of the binary sequences d1 (t), d2 (t), . . . , dN (t) will be generated randomly, and
independently. The output after modulation in the nth channel is
yn (t) = x̃n (t) · dn (t),
n ∈ [N ], and t ∈ [0, 1).
The modulated outputs yn (t) are then low-pass filtered using an integrator, which integrates yn (t) over an
interval of width 1/Ω and the result is then sampled at rate Ω using an ADC. The `th sample acquired by
the ADC in the nth channel is
Z
`/Ω
yn [`] =
yn (t)dt,
(`−1)/Ω
` ∈ [Ω].
The integration operation commutes with the modulation process; hence, we can equivalently integrate the
signals zn (t) over the interval of width 1/W , and treat them as samples Z 0 ∈ RM ×W of the ensemble Z c (t).
3 Some of the initial development in this section may resemble with [29], but it is to be noted that compared to [29] the
signal structure to be exploited here is correlations among the signals and not the sparsity. This leads to a completely different
development towards the end of this section.
11
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
The entries Z0 [n, `] of the matrix Z 0 are
Z
`/W
Z0 [n, `] =
x̃n (t)dt =
(`−1)/W
B
X
ω=−B
ι2πω/W
e
− 1 −ι2πω`/W
e
e
C[n, ω]
,
ι2πω
(16)
e defined in (15), and the bracketed term representing the
e ω] are the entries of the matrix C
where C[n,
low-pass filter
ι2πω/W
e
−1
L[ω] =
, ω = −B, −B + 1, . . . , B,
ι2πω
where W = 2B + 1, as defined in (2). We will denote by L as a diagonal matrix containing L[ω] along the
diagonal. It is important to note that L is invertible as L[ω] does not vanish on any ω = −B, −B + 1, . . . , B.
In view of (16), it is clear that
∗
e
Z 0 = CLF
= ACLF ∗ = AX 0
(17)
where X 0 = CLF ∗ inherits its low-rank structure from X c (t).
Since we have already carried out integration over intervals of length 1/W , the action of modulator followed
by integration over 1/Ω now simply reduces to randomly, and independently flipping every entry of Z 0 and
adding consecutive W/Ω such entries in a given row to produce the value of the sample acquired by the
ADC. Mathematically, we can write this concisely by defining a vector dn` supported on an index set
B` := {(` − 1)W/Ω + 1 : `W/Ω},
` ∈ [Ω],
(18)
of size |B` | = W/Ω, where we are assuming4 for simplicity that Ω is a factor of W . On the support set B` ,
the entries of the vector dn` are independent binary ±1 random variables, and are zeros on B`c . Moreover,
assume that a∗n are the rows of A. With these notations in place, we can concisely write the `th sample in
t ∈ [0, 1) in the nth branch as
yn [`] := a∗n X 0 dn` , (n, `) ∈ [N ] × [Ω].
(19)
All this shows is that the samples taken by the ADC in the sampling architecture in Figure 6 are linear
measurements of an underlying low-rank matrix X 0 ∈ RM ×W , defined in (17). The rank of X 0 does not
exceed R — recalling from Section 1.2 that R constitutes the number of linearly independent signals in the
ensemble X c (t). Our objective is to recover X 0 from a a few linear measurements yn [`], which amounts to
reconstructing X c (t) at a sub-Nyquist rate sampling.
2.4
Matrix recovery
Define a linear map A : X 0 → y, where y is a length N Ω vector containing linear measurements yn [`] in
(19) as its entries. Formally,
A(X 0 ) = {a∗n X 0 dn` : (n, `) ∈ [N ] × [Ω]}.
(20)
We are mainly interested in the scenario when the linear map A is under determined, that is, the number of
measurements N Ω is much smaller than the number of unknowns M W . Therefore, to uniquely determine
the true solution X 0 , we solve a nuclear-norm penalized optimization program:
argmin kXk∗ subject to y = A(X),
(21)
X
where kXk∗ is the nuclear norm (the sum of the singular values of X). The nuclear norm penalty encourages
the solution to be low rank [1], and has concrete performance guarantees when the linear map A obeys certain
properties [2]. In case of noisy measurements
y = A(X 0 ) + ξ
4a
slight modification of this can result in an argument when Ω is not a factor of W ; for details, see [29]
12
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
(22)
with bounded noise kξk2 ≤ δ, we solve the following quadratically constrained convex optimization program
argmin kXk∗ subject to ky − A(X)k2 ≤ δ.
(23)
X
This optimization program is also provably effective; see, for example, [39, 40] for suitable A.
2.4.1
Sampling theorem: Exact and stable recovery
The unknown matrix X 0 in (17) is at most rank-R, and assume X 0 = U ΣV ∗ is its reduced form SVD,
where U ∈ RM ×R , and V ∈ RW ×R are the matrices of left and right singular vectors, respectively; and
Σ ∈ RR×R is a diagonal matrix of singular values. Define coherences of X 0 as
µ2 (U ) :=
M
Ω
max kU ∗ em k22 , ρ2 (V ) := max kV ∗ I B` k2F ,
R m∈[M ]
R `∈[Ω]
M
Ω
max max ke∗ U V ∗ I B` k22 ,
ν 2 (U , V ) :=
R m∈[M ] `∈[Ω] m
and
(24)
where I B` is a diagonal W × W matrix containing ones at the diagonal positions indexed by B` . We may
sometime just work with notations µ2 , ρ2 , and ν 2 and drop the dependence on U , and V when it is clear
from the context. It can easily be verified that 1 ≤ µ2 ≤ M/R. In a similar manner, one can show that
1 ≤ ρ2 ≤ W/R. To see this, notice that
Ω
ρ2 ≥
Ω
Ω
ΩX
kV ∗ I B` k2F =
kV ∗ I B` k2F =⇒ Ωρ2 ≥
· R,
R
R
R
`=1
that is, ρ2 ≥ 1. Using the fact that kV ∗ I B` kF ≤ kV k2 kI B` k2F = W/Ω, the upper bound also follows. Finally,
similar techniques also show that 1 ≤ ν 2 ≤ M Ω/R. One can attach meaning to the values of coherences in
the context of sampling application under consideration. For example, the smallest value of ρ2 is achieved the
energy of X 0 is roughly equally distributed among the columns indexed by B1 , B2 , . . . , BΩ . In the context of
the sampling problem, this means that the energy in the signal ensemble X c (t) should be dispersed equally
across time. Similarly, the coherence µ2 quantifies the spread of signal energy across array elements, and ν 2
measures the dispersion of energy across both the time and array elements. Let us define
ϑ2 (U , V ) := max(µ2 (U ), ρ2 (V ), ν 2 (U , V )).
(25)
We are now ready to state our main result that dictates the minimum sampling rate Ω at which each ADCs
needs to be operated to guarantee the reconstruction of signal ensemble X c (t).
Theorem 1. Correlated signal ensemble X c (t) in (1) can be acquired using the sampling architecture in
Figure 6 by operating each of the ADCs at a rate
Ω ≥ C β ϑ2
R
W log2 W,
M
(26)
where Cβ is a universal constant that only depends on the fixed parameter β ≥ 1. In addition, the ratio of
the number of output to the input signals in AVMM must satisfy N/M ≥ C log W , where C is a numerical
constant. The exact signal reconstruction can be achieved with probability at least 1 − O(W 1−β ) by solving
the nuclear-norm minimization program in (21).
The result indicates that M well spread out (ϑ2 ≈ 1) correlated signals can be acquired by operating each
ADC in Figure 6 at a rate of R/M 1 times the Nyquist-rate W to within log factors. Moreover, we also
require the number N of output signals at the AVMM to be larger than number M of input signals by a
log factor. However, we believe this is merely an artifact of the proof technique and our experiments also
corroborate that successful recovery is always obtained for Ω satisfying (26) even when N = M or P = 1.
13
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
Also note that the result in Theorem 1 assumes without loss of generality that W ≥ M . In the other case,
when M ≥ W , the sufficient sampling rate at each ACC can be obtained by replacing W in (26) with M .
Another important observation is that the sampling rate scales linearly with coherence ϑ2 implying that
the sampling architecture is not as effective for correlated signals concentrated across time. To remedy this
shortcoming, a preprocessing step using random filters, a mixing AVMM can be added to ensure signals are
well-dispersed across time, and array elements.
2.4.2
Stable recovery
In a realistic scenario, the measurements (19) are almost always contaminated with noise ξn [`]
yn [`] = a∗n X 0 dn` + ξn [`],
(n, `) ∈ [N ] × [Ω]
(27)
compactly
expressed using the vector equality in (22). In the case, when the noise is bounded, i.e.,
P
2
|ξ
[`]|
≤ δ 2 , then following the template of the proof in [39], it can be shown that under the conn
n,`
c of (23) obeys
ditions of Theorem 1, the solution X
√
c − X 0 kF ≤ C M δ
kX
(28)
with high probability; for more details on this,
p see a similar stability result in Theorem 2 in [41]. The upper
bound above is suboptimal by a factor of min(W, M ). In theory, we can improve this suboptimal result
and show the effectiveness of the nuclear norm penalty by analyzing a different estimator:
argmin kX − A∗ (y)k2F + λkXk∗ .
(29)
X
This estimator was proposed in [42], and can be theoretically shown to obey essentially optimal stable
c is the minimizer of (29) if and only if 0 ∈ ∂ kX −A∗ (y)k2 +λkXk∗ ,
recovery results. Using the fact that X
F
c is a simple soft thresholding of the singular values of the matrix
one can show [42] that the estimate X
A∗ (y) ∈ RM ×W
X
λ
c=
X
σr (A∗ (y)) −
ur (A∗ (y))v ∗r (A∗ (y)),
(30)
2
+
r
where x+ = max(x, 0); in addition, ur (A∗ (y)), and v r (A∗ (y)) are the left and right singular vectors of the
matrix A∗ (y), respectively; and σr (A∗ (y)) is the corresponding singular value.
In comparison to the estimator (29), the matrix Lasso in (23) does not use the knowledge of the known
distribution of A and instead minimizes the empirical risk ky − A(X)k2 = kyk22 − 2hy, A(X)i + kA(X)k22 .
Knowing the distribution, and the fact that E A∗ A = I holds in our case, we replace kA(X)k22 , by its
expected value E kA(X)k22 = kXk2F in the empirical risk to obtain the estimator in (29) by completing the
square. Although the KLT estimator is easier to analyze, and will be shown to give optimal stable recovery
results in theory, but it does not empirically perform as well as matrix Lasso in (23).
We quantify the strength of the noise vector ξ ∈ RN Ω through its Orlicz-2 norm. For a random vector z, we
define
2
2
kzkψ2 := inf{u > 0 : E ekzk2 /u ≤ 2 },
and for scaler random variables, we simply take z ∈ R1 in the above definition. The Orlicz-2 norm is finite
if the entries of z are subgaussain, and is proportional to variance, if the entries are Gaussian. We assume
that the entries of the noise vector ξ obey
kξn [`]kψ2 ≤ cδ N1Ω , and kξkψ2 ≤ cδ.
With this the following result is in order.
14
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
(31)
Theorem 2. Fix β ≥ 1. Given measurements y of X 0 in (27) contaminated with additive noise ξ with
c to (29) obeys
statistics in (31), the solution X
c − X 0 k2 ≤ C max(δ, δ 2 )
kX
F
(32)
with probability at least 1−O(W −β ) whenever Ω ≥ Cβ ν 2 (R/M )W log3/2 W , where Cβ is a universal constant
depending only on β.
Roughly speaking, the stable recovery theorem states that the nuclear norm penalized estimators are stable
in the presence of additive measurement noise. The results in Theorem 2 are derived assuming that ξn [`] are
random with statistics in (31). In contrast, the stable recovery results in the compressed sensing literature
only assume that the noise is bounded, i.e., kξk2 ≤ δ, where ξ is the noise vector introduced earlier. Here,
we give a brief comparison of Theorem (2) with the stable recovery results in [39, 43].
Compare
√ the result in (28) with (32), it follows that our results improve upon the results in [39] by a factor
of 1/ M . We will also compare our stable recovery results against the stable recovery results derived in [43].
The result roughly states if the linear operator A satisfies the matrix RIP [2], and kξk2 ≤ δ, then the solution
c to (23) obeys
X
c − X 0 kF ≤ Cδ.
kX
(33)
The above result is essentially optimal stable recovery result. In comparison to (33), the result in (32) is
also optimal, however, we prove it for a different estimator and under a statistical bound on the noise term
kξkψ2 ≤ δ. In addition, we also donot require the matrix RIP for A, which is generally required to prove
optimal results of the form of (33).
2.5
Architecture 3: Uniform sampling architecture
The discussion in Section 2.2, and the result in Theorem 1 suggest that sampling rate sufficient for exact
recovery using the architecture 1 and 2 scales linearly with the coherence parameter µ2 , and ϑ2 , respectively.
As discussed earlier, the coherence parameters quantify the energy dispersion in the correlated signal ensemble X c (t) across time and array elements. Ideally, we would like the sampling rate Ω to only scale with factor
of W , and be independent of signal characteristics (coherences). To achieve this, signals are preprocessed
with random filters and AVMM so that signal energy is evenly distributed across time, and array elements.
The resultant signals are the randomly modulated, low-pass filtered, and sampled uniformly at a rate Ω.
The modified sampling architectures are depicted in Figure 7 and 8.
avg-rate
nus
ADC
nus
ADC
avg-rate
…
…
…
avg-rate
nus
ADC
Figure 7: Architecture 3: Analog vector-matrix multiplier (AVMM) takes random linear combinations of M input
signals to produce M output signals. This equalizes energy across channels. The random LTI filters convolve the
signals with a diverse waveform that results in dispersion of signals across time. The resultant signals are then
sampled, at locations selected randomly on a uniform grid, at an average rate Ω, using a non-uniform sampling (nus)
ADC in each channel.
15
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
LTI
low pass
ADC
LTI
ADC
low pass
…
…
…
LTI
low pass
ADC
Figure 8: Architecture 4: Random LTI filters disperse each of the M signal across time. An Analog vector-matrix
multiplier (AVMM) takes random linear combinations of M input signals to produce N output signals. This amounts
to choosing [Φ ⊗ √1P 1P ] = AΦ as the mixing matrix, where A is as in (14), and Φ is an M × M dense, randomorthogonal matrix. The well dispersed signals across time and array elements are now randomly modulated, low-pass
filtered, and sampled at rate Ω.
Recall that random LTI filters are all pass, and convolve the signals with a diverse impulse response hc (t),
which disperses signal energy over time w.h.p. (see Lemma 1). We will use the same random LTI filter
hc (t) in each channel. The action of the random convolution [34] of hc (t) with each signal in the ensemble
can be modeled by the right multiplication of a circulant random orthogonal matrix H ∈ RW ×W with the
underlying low-rank X 0 in (17). The AVMM takes the random linear combination of M input signals to
produce N output signals, which then equalizes w.h.p., the signal energy across array elements regardless of
the initial energy distribution.
As discussed earlier that the action of AVMM is left multiplication of A with the low-rank ensemble X c (t).
In Architecture 3, the AVMM is M -in-M -out, and to ensure mixing of signals across array elements, we
take the mixing matrix to be an M × M random orthonormal matrix Φ. Thus, the samples collected in
Architecture 3 are not the subset of the entries of X, defined in (3) but of
X̃ = ΦXH.
In Architecture 4, the AVMM is modified from A = [I M ⊗
[Φ ⊗
√1
P
√1
P
(34)
1P ] ∈ RN ×M in (14) to
1P ] = AΦ,
(35)
where Φ ∈ RM ×M is a random orthonormal matrix. This implies that unlike the samples y = A(X 0 ) , the
Architecture 4 collects y = A(X̃ 0 ), where
X̃ 0 = ΦX 0 H,
(36)
and A is same as defined in (20).
Both (34), and (36) multiply the matrix of samples X, and X 0 with random orthogonal matrices on the left,
and right. This multiplication results in modifying the singular vectors U ∈ RM ×R , and V ∈ RW ×R of the
e = ΦU ∈ RM ×R and Ve = HV ∈ RW ×R . Note that matrix X̃,
matrix of samples (either X, or X 0 ) to U
and X̃ 0 are an isometry with, and have the same rank as X, and X 0 , respectively. The new left and right
16
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
singular vectors Ũ and Ve of X̃, or X̃ 0 are in some sense random orthogonal matrices and hence, incoherent
w.h.p.
The following lemma shows the incoherence of matrix Ũ , and Ṽ .
Lemma 1. Fix matrices U ∈ RM ×R and V ∈ RW ×R of the left and right singular vectors, respectively.
e = ΦU , and Ve = HV , and the
Create random orthonormal matrices Φ ∈ RM ×M and H ∈ RW ×W . Let U
2 e e
2 e e
coherences κ (U , V ), and ϑ (U , V ) be as defined in (12), (25). Then for a β ≥ 1, the following conclusions
1
log M ),
R
(37)
e , Ve ) ≤ Cβ log W max (1, 1 log M )
ϑ2 ( U
R
(38)
e , Ve ) ≤ Cβ log W max (1,
κ2 (U
and
each holding with probability exceeding 1 − O(W −β ).
Proof of Lemma 1 is presented in Section 4. In light of (34), it is clear that samples collected using
Architecture 3 are randomly selected subset of the entries of X̃, and using the result in (37), and (13), the
sufficient sampling rate for the successful reconstruction of signals becomes
Ω≥C
1
max(R, log M )W log3 W.
M
In light of (36), it is clear that the samples collected using Architecture 4 are the same as in (19) with X 0
f0 . With this observation, combining the bound on ν 2 in Lemma 1 with Theorem 1 immediately
replaced by X
provides with the following corollary that dictates the sampling rate sufficient for exact recovery using the
uniform sampling architecture in Figure 8.
Corollary 1. Fix β ≥ 1. The correlated ensemble X c (t) in (1) can be exactly reconstructed using the
optimization program in (21) with probability at least 1 − O(W −β ) from the samples collected by each of the
ADC in Figure 8 at a sub-Nyquist rate:
Ω ≥ Cβ
1
max(R, log M )W log4 W,
M
(39)
where Cβ is a universal constant depending only on β. In addition, the ratio of the number of output to the
input signals in AVMM must satisfy N/M ≥ C log W for a sufficiently large constant C.
3
Numerical Experiments
In this section, we study the performance of the proposed sampling architectures with some numerical
experiments. We mainly show that a correlated ensemble X c (t) in (1) can be acquired by only paying a
small factor on top of the optimal sampling rate of roughly RW . We then show the distributed nature of the
sampling architecture in Figure 6 by showing that increasing the number of ADCs (or the array elements),
the sampling burden on each of the ADC can be reduced as the net sampling rate is shared evenly among
the ADCs. Finally, we show that the reconstruction algorithm is robust to additive noise.
3.1
Sampling performance
In all of the experiments in this section, we generate the unknown rank-R matrix X 0 synthetically by
multiplying tall M × R, and fat R × W Gaussian matrices. Our objective is to recover a batch of M = 100
signals, with W = 1024 samples taken in a given window of time using the sampling architecture in Figure
6. We take P = 1 or N = M for all these experiments, and the results hint that P > 1 or N > M in
17
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
Theorem 1 is only a technical requirement due to the proof technique. We will use the following parameters
to evaluate the performance of the sampling architecture:
Oversampling factor : η =
MΩ
,
R(W + M − R)
where the oversampling factor is the ratio between the cumulative sampling rate, and the inherent unknowns
in X 0 . The successful reconstruction is declared when the relative error obeys
Relative error :=
c − X 0 kF
kX
≤ 10−2 .
kX 0 kF
The first experiment shows a graph, in Figure 9(a), between η, and R. Each point, marked with a black
dot, represents the minimum sampling rate required for the successful reconstruction of an X c (t) with a
specific R. The probability of success for each point is 0.99, and is computed empirically by averaging over
100 independent iterations. The blue line shows the least-squares fit of the black dots. It is clear from the
plot that the for reasonably large values of R, the sampling rate is within a small constant of the optimal
rate R(W + M − R).
14
700
12
600
10
Sampling rate Ω
Oversampling η
In context of the application, and under the narrow-band assumption described in Section 1.4, the graph
in Figure 9(b) shows that for a fixed number of sources R = 10, the sufficient sampling rate Ω is inversely
proportional to number M of the receiver array elements. Each black dot represents the minimum sampling
rate required for the successful reconstruction with probability 0.99. The blue line is the least-squares fit
of these marked points. In other words, Figure 9(b) illustrates the relationship between the number M of
ADCs and the sampling rate Ω for a fixed number of sources R = 10. Importantly, an increase in the receiver
array elements reduces the sampling burden on each of the ADCs.
8
6
4
500
400
300
200
2
0
0
Number of source: R = 10
5
10
Rank R
15
100
0
20
50
100
150
200
250
300
350
M: Number of ADCs
(a)
(b)
Figure 9: Performance of Sampling Architecture 2. In these experiments, we take an ensemble of 100 signals, each
bandlimited to 512Hz. The probability of success is computed over 100 iterations. (a) Oversampling factor η as a
function of the number R of underlying independent signals in X c (t). The blue line is the least-squares fit of the
data points. (b) Sampling rate Ω versus the number M of recieving antennas. The blue line is the least-sqaures fit
of the data points.
3.2
Stable recovery
In the second set of experiments, we study the performance of the the recovery algorithm when the measurements are contaminated with additive measurement noise ξ as in (22). We generate noise using the standard
18
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
√
Gaussian model: ξ ∼ N (0, σ 2 I). We select δ ≤ σ(L + L)1/2 ; a natural choice as the condition kξk2 ≤ δ
holds with high probability. For the experiments in Figure 10, we solve the optimization program in (23).
The plot in Figure 10(a) shows the relationship between the signal-to-noise ratio (SNR):
kX 0 k2F
,
SNR(dB) = 10 log
kξk22
and the realtive error(dB):
c − X 0 k2
kX
F
kX 0 k2F
Relative error (dB) = 10 log
!
for a fixed oversampling factor η = 3.5. The result shows that the relative error degrades gracefully with
decreasing SNR. In the Figure 10(b), the plot depicts relative error as a function of the oversampling factor
for a fixed SNR = 40dB. The relative error decrease with increasing sampling rate.
−3
0
12
x 10
Relative error
Relative error (dB)
11
−20
−40
−60
10
9
8
7
6
−80
0
20
40
SNR (dB)
(a)
60
5
2
80
2.5
3
3.5
Oversampling η
4
4.5
(b)
Figure 10: Recovery using matix Lasso in the presence of noise. The input ensemble to the simulated random
demodulator consists of 100 signals, each bandlimited to 512Hz with number R = 15 of latent independent signals.(a)
The SNR in dB versus the relative error in dB. The oversampling factor η = 3.5. (b) Relative error as a function of
the sampling rate. The SNR is fixed at 40dB.
4
Proof of Lemma 1
We start with the proof of Lemma 1
e = AU , where we are taking A ∈ RM ×M to be a random orthogonal matrix, and
Proof. Recall that U
Ve = HV , where H was defined in (8). Let em denote the standard basis vectors in RM . We begin the
proof by noting a standard result; see, [44], that reads
∗
e em k2 ≤
max kU
2
m∈[M ]
1
Cβ max (R, log M ),
M
(40)
with probability at least 1 − O(M −β ). Before proving the lemma, we prove an intermediate result:
∗
1
max kVe ek k22 ≤
Cβ max (R, log W ),
W
k∈[W ]
19
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
(41)
where ek are standard basis vectors in RW . Assuming W is even; it will be clear how to extend the argument
to W odd. We can write H = W Q∗ , where
z
√1
√0 ,
ω=0
ω=0
W
W
√2 cos 2πωn + θ ω = [1, W − 1]
√2 cos 2πωn ω = [1, W − 1]
ω
W
2
W
2
W
W
W [n, ω] = zW/2
.
Q[n, ω] =
1
W
W
k−1
k−1
√
√
(−1)
ω
=
(−1)
,
ω
=
W
W
2
2
√2 sin 2πωn + θ , ω = [ W + 1, W − 1]
√2 sin 2πωn ω = [ W + 1, W − 1]
W
W
2
W
W
ω
2
(42)
and z0 , zW/2 = ±1 with equal probability and θω for ω = 1, . . . , W/2 − 1 are uniform on [0, 2π] and all
W/2 + 1 of these random variables are independent.
It is a fact that in (42) for fixed a and θ ∼ Uniform([0, 2π]), the random variables sign(cos(a + θ)) and
sign(sin(a + θ)) are independent of one another. Thus H has the same probability distribution as W ZQ∗ ,
where Z = diag(z) and the entries of z are iid ±1 random variables. In light of this, we will replace H with
W ZQ∗ . For a fixed k, we can write
∗
e ∗ Zwk =
Ve ek = V ∗ H ∗ ek = Q
W
X
z[ω]wk [ω]q ω
ω=1
e = Q∗ V and wk = W ∗ ek and q ω is the ωth column of Q
e ∗ . We will apply the following concentration
where Q
inequality.
Theorem 3. [45] Let η ∈ Rn be a vector whose entries η[i] are independent random variables with |η[i]| < 1,
and let S be a fixed m × n matrix. Then for every t ≥ 0
2
2
P kSηk2 ≥ E kSηk2 + t ≤ 2e−t /16kSk , where E kSηk2 ≤ kSkF .
∗
e W k , where W k = diag(wk ), and η = z. In this case, we have
We can apply the above theorem with S = Q
e ∗W k
Q
2
F
=
W
X
ω=1
∗
e W kk ≤
and kQ
q
2
W
e =
kQk
q
2
W
2
2
|wk [ω]| kq ω k2 ≤
W
2R
2 X
2
kq ω k2 ≤
,
W ω=1
W
q
q
∗
2
2R
2
. Thus, P kVe ek k2 >
+
t
≤ 2e−t /16 , and using the union
W
W
bound
r
r
∗
2
2R
2
e
P max kV ek k2 >
+t
≤ 2W e−t /16 .
W
W
k∈[W ]
√
−β
We can make this probability less than W
by taking t ≥ C log W , and (41) follows.
Now to prove (37), and (38), we can write H = W ZQ∗ . Let wk be the kth column of W ∗ and let ũ∗m be
e . For a fixed row index m and column index k, we can write an entry of U
e Ve ∗ as
the mth row of U
h
i
h
i
h
i
e Ve ∗
e (W ZQ∗ V )∗
eQ
e ∗ ZW ∗
e ∗ Zwk
U
= U
= U
= ũ∗m Q
m,k
m,k
m,k
∗
e = Q∗ V is a tall orthonormal matrix. Let p∗ = ũ∗ Q
e . Since the z[ω] are iid random variables, a
where Q
m
m
standard applications of the Hoeffding inequality tells us that
P
2
2
e Ve ∗
U
> λ ≤ 2e−λ /2σ ,
m,k
2
σ 2 = E wk Z ∗ pm p∗m Zwk ≤
where
2
2 kũm k2
2 kpm k2
=
.
W
W
Thus, with probability exceeding 1 − 2W −β
h
i
e Ve ∗
U
m,k
2
≤
4β log W
2
kũm k2 .
W
20
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
(43)
Taking the maximum over m ∈ [M ], and k ∈ [W ] on both sides, and plugging in the bound in (40) shows
that
MW
max max
R m∈[M ] k∈[W ]
e Ve ∗ ek
e∗m U
2
≤ Cβ log W max(1,
1
log M )
R
(44)
holds with probability at least 1 − O(W −β + M −β ) = 1 − O(W −β ), where the equality follows from the fact
that W ≥ M . This proves the first claim (37) in Lemma 1.
Similarly, (43) implies that
X
e Ve ∗
U
m,k
2
k∈B`
≤ |B` |
4β log W
4β log W
2
kũm k2 =
kũm k22 ,
W
Ω
(45)
where B` is defined in (18), and the last equality follows from the fact that |B` | = W/Ω. Finally, evaluating
the maximum over m ∈ [M ], and ` ∈ [Ω] on both sides, and using the bound in (40) shows that
MΩ
e Ve ∗ I B k2 ≤ Cβ log W max(1, 1 log M ),
max max ke∗m U
` 2
R m∈[M ] `∈[Ω]
R
which proves the second claim (38) in Lemma 1.
5
5.1
Proof of Theorem 1
Preliminaries
Recall from (19), we obtain measurements yn [`] of an unknown low-rank matrix X 0 through a random
M × W rank-1 measurement ensemble an d∗n` , (n, `) ∈ [N ] × [Ω], where a∗n ∈ RM denote the rows of mixing
matrix A ∈ RN ×M , and dn` ∈ RW are random binary on support set B` , and zero elsewhere. In addition,
the vectors`n` are independently generated for every n, and `. In Theorem 1, the AVMM simply replicates
(without mixing) P copies of M input signals to produce N output signals. This amounts to choosing
A=
√1
P
[I M ⊗ 1P ] =
[I M , . . . , I M ]∗ ,
√1
P
(46)
where P = N/M . From this construction, we have kan k22 = 1/P , and A∗ A = I M . Also recall that using
the definition of linear map A in (20), the measurements are compactly expressed as y = A(X 0 ). Moreover,
the adjoint operator is
X X
X X
A∗ (y) =
yn [`]an d∗n` =
an a∗n X 0 dn` d∗n` ,
n∈[N ] `∈[Ω]
n∈[N ] `∈[Ω]
where the second equality is the result of (19). It will also be useful to visualize the linear operator A∗ A in
a matrix form:
X X
X X
A∗ A =
an d∗n` an d∗n` =
an a∗n ⊗ dn` d∗n` ,
(47)
n∈[N ] `∈[Ω]
n∈[N ] `∈[Ω]
where denotes the tensor product. In general, the tensor product of rank-1 matrices x1 y ∗1 , x2 y ∗2 with
xi ∈ RM , and y i ∈ RW is given by the big matrix
x1 [1]x2 [1]y 1 y ∗2 x1 [1]x2 [2]y 1 y ∗2 · · · x1 [1]x2 [M ]y 1 y ∗2
x1 [2]x2 [1]y 1 y ∗2 x1 [2]x2 [2]y 1 y ∗2 · · · x1 [2]x2 [M ]y 1 y ∗2
∗
∗
x1 y 1 x2 y 2 =
.
..
..
.
.
x1 [M ]x2 [1]y 1 y ∗2
···
···
x1 [M ]x2 [M ]y 1 y ∗2
21
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
With this definition it is easy to visualize that E A∗ A = I. Let {u∗k }k∈[M ] , and {v ∗k }k∈[W ] denote the rows
of the matrices U , and V , respectively.
We begin by defining a subspace T ⊂ RM ×W associated with X 0 with singular-value decomposition given
by X 0 = U ΣV ∗
T = {X : X = U Z ∗1 + Z 2 V ∗ , Z 1 ∈ RW ×R , Z 2 ∈ RM ×R }.
The orthogonal projections onto T , and its orthogonal complement T ⊥ are defined as PT (Z) = U U ∗ Z +
ZV V ∗ − U U ∗ ZV V ∗ , and PT ⊥ (Z) = Z − PT (Z), respectively. In the proofs later, we repeatedly make use
of the following calculation
2
kPT (an d∗n` )kF = hPT (an d∗n` ), an d∗n` i
= hU ∗ an d∗n` , U ∗ an d∗n` i + han d∗n` V , an d∗n` V i − hU ∗ an d∗n` V , U ∗ an d∗n` V i
= kU ∗ an d∗n` k2F + kan d∗n` V k2F − kU ∗ an d∗n` V k2F ≤ kU ∗ an d∗n` k2F + kan d∗n` V k2F .
Observe that
kU ∗ an d∗n` k2F = kU ∗ an k22 kd∗n` k22 =
W
1
kU ∗ an k22 , and kan d∗n` V k2F = kan k22 kd∗n` V k22 = kd∗n` V k22 .
Ω
P
This leads us to
1
W
kU ∗ an k22 + kd∗n` V k22 .
(48)
Ω
P
Finally, we will also require a bound on the operator norm of the linear map A. To this end, note that the
measurement matrices an d∗n` are orthogonal for every ` ∈ [Ω] in the standard Hilbert-Schmidt inner product,
that is, han d∗n` , an d∗n`0 i = 0 whenever ` 6= `0 . This directly implies a following bound on the operator of A:
r
sX
MW
∗ 2
kAk ≤
kan dn` kF =
≤ W,
(49)
Ω
kPT (an d∗n` )k2F ≤
n∈[N ]
where in the last inequality we used the fact that M ≤ W , and Ω ≥ 1. Although a much tighter bound can
be achieved using results from random matrix theory, the loose bound is sufficient for our purposes.
5.2
Sufficient condition for the uniqueness
Uniqueness of the minimizer to (21) can be guaranteed by the sufficient condition [3, 4] given below.
Proposition 1. The matrix X is the unique minimizer to (21) if ∃Y ∈ Range(A∗ ) such that ∀Z ∈ Null(A)
(1 − kPT ⊥ (Y )k) kPT ⊥ (Z)k∗ − kU V ∗ − PT (Y )kF kPT (Z)kF > 0.
In light of the proposition, it is sufficient to show that ∃Y ∈ Range(A∗ ), such that
kPT (Y ) − U V ∗ kF ≤ 1/3W,
and for every Z ∈ Null(A),
kPT ⊥ (Y )k ≤ 1/2,
√
kPT ⊥ (Z)kF ≥ (1/ 2W )kPT (Z)kF
(50)
(51)
holds. This can be immediately shown as follows 0 = kA(Z)kF ≥ kA(PT (Z))kF − kA(PT ⊥ (Z))kF ≥
kA(PT (Z))kF − W kPT⊥ (Z)kF . In addition, for an arbitrary Z, we have
kA(PT (Z))k2F = hA(PT (Z)), A(PT (Z))i = hZ, PT A∗ APT (Z)i
1
≥ (1 − kPT A∗ APT − PT k)kPT (Z)k2F ≥ kPT (Z)k2F ,
2
where the last inequality is obtained by plugging in kPT A∗ APT − PT k ≤ 1/2, which will be shown to be
true under appropriate choice of Ω with probability at least 1 − O(W −β ) in Corollary 2. Combining the last
two inequalities gives us the result in (51).
22
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
5.3
Golfing scheme for the random modulator
For technical reasons, we will work with partial linear maps Ap : RM ×W → RM Ω , p ∈ [P ] modified from the
linear map A in (20). Define P partitions {Γp }P
p=1 of the index set [N ] as Γp := {(p − 1)M + 1, . . . , pM } for
5
every p ∈ [P ]. Clearly, Γp ∩ Γp0 = ∅, and ∪P
p=1 Γp = [N ]. We will take the number of partitions P = N/M .
The partial linear maps Ap are defined as
Ap (X) := {a∗n Xdn` , n ∈ Γp , ` ∈ [Ω]}.
(52)
Using the definition of A in (46), it is clear that
{an : n ∈ Γp } = { √1P em : m ∈ [M ]} for every p ∈ [P ] =⇒
X
an a∗n =
1
P
IM .
(53)
n
The corresponding adjoint operator maps a vector z ∈ RM Ω to an M × W matrix
X X
A∗p (z) =
zn [`]an d∗n` .
n∈Γp `∈[Ω]
It will also be useful to make a note of the following versions of the above definition
X X
X X
A∗p Ap (X) =
an a∗n Xdn` d∗n` , and A∗p Ap =
an d∗n` an d∗n` ,
n∈Γp `∈[Ω]
(54)
n∈Γp `∈[Ω]
where the second definition just emphasizes the fact that the linear map A∗p Ap can be thought of as a big
M W × M W matrix that operates on a vectorized X.
With the linear operators defined on the subsets {Γp }P
p=1 above, we write the iterative construction of the
dual certificate:
Y p = Y p−1 − A∗p Ap PT (Y p−1 ) − U V ∗ , where Y p ∈ Range(A∗ ),
(55)
where we take Y 0 = 0. Projecting onto the subspace T on both sides results in PT (Y p ) = PT (Y p−1 ) −
PT A∗p Ap (PT (Y p−1 ) − U V ∗ ). Define
W p : = PT (Y p ) − U V ∗ ,
(56)
the iteration takes the equivalent form W p = W p−1 − PT A∗p Ap PT (W p−1 ). We will take Y = Y P to be our
candidate for the dual certificate and the rest of this section concerns showing that Y P obeys the conditions
in (50). Let’s start by showing that kPT (Y P ) − U V ∗ kF ≤ (3W )−1 holds. To this end, note that from the
iterative construction above, the following bound immediately follows
kW p kF ≤ kPT A∗p Ap PT − PT kkW p−1 kF .
From Lemma 2, we have kPT A∗p Ap PT − PT k ≤ 1/2 for every p ∈ [P ]. This means that kW p kF cuts after
every iteration giving us the following bound on the Frobenius norm of the final iterate W P
√
(57)
kW P kF ≤ 2−P kU V ∗ kF = 2−P R ≤ (3W )−1 when P ≥ 2 log2 (3W ).
Using the union bound over p ∈ [P ], the bound on kW P kF holds with probability at least 1 − O(P W −β ) ≥
1 − O(W 1−β ). This proves that the candidate dual certificate Y P obeys the first condition in (50).
Since P = N/M , this implies that the number N of output channels from the analog-vector-matrix multiplier
in Figure 6 must be a factor of roughly log W compared to the input channels, i.e.,
N ≥ CM log W.
5 We
assume that N/M is an integer–this can be ensured in the worst case by doubling N .
23
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
(58)
However, we believe this requirement is merely an artifact of using golfing scheme as the proof strategy for
Theorem 1. In practice, all our simulations point to N = M , that is, the number of channels at the output
of the AVMM are equal to the input channels.
PP
From the iterative construction (55), it is clear that Y P = − p=1 A∗p Ap (W p−1 ). We will now converge on
showing that Y P satisfies the second condition in (50). Begin with
kPT ⊥ (Y P )k ≤
P
X
p=1
PT ⊥ (A∗p Ap (W p−1 )) =
P
X
p=1
PT ⊥ A∗p Ap (W p−1 ) − W p−1
,
where the last equality follows from the fact that W p−1 ∈ T . Since kPT ⊥ k ≤ 1, we have
P
X
p=1
PT ⊥ A∗p Ap (W p−1 ) − W p−1
≤
P
X
A∗p Ap (W p−1 ) − W p−1 ≤
p=1
P
X
2−p−1 < 1/2,
p=1
the second last inequality above requires kA∗p Ap (W p−1 ) − W p−1 k ≤ 2−p−1 , for every p ∈ [P ], which
using Lemma 4 is only true when Ω ≥ Cβ ν 2 (R/M )W log2 W with probability at least 1 − O(P W −β ) ≥
1 − O(W −β+1 ), where the factor P comes from the union bound over every p ∈ [P ]. Lemma 4
Combining sample complexities in (59), and (62), and using the definition of ϑ2 in (25) gives us the proof of
Theorem 1.
5.4
Key Lemmas
We now state the key lemmas to prove Theorem 1.
Lemma 2. Fix β ≥ 1. Assume that
Ω ≥ Cβ max(µ2 , ρ2 )
R
W log2 W,
M
(59)
where Cβ is a universal constant only depending on β. Then the linear operator Ap obeys
PT A∗p Ap PT − PT ≤
1
2
with probability at least 1 − O(W −β ).
Proof of this lemma will be presented in Section 6.2.
R
Corollary 2. Fix β ≥ 1. Assume Ω ≥ Cβ max(µ2 , ρ2 ) M
W log2 W , where Cβ is a universal constant that
only depends on β. Then the linear operator A defined in (20) obeys kPT A∗ APT −PT k ≤ 2−1 with probability
at least 1 − O(W −β ).
Proof. Proof of this corollary follows exactly the same steps as the proof of Lemma 2 with only difference
being that we take P = N/M = 1.
Lemma 3. Define coherence νp2 of the iterates W p as
νp2 :=
MΩ
max max ke∗ W p I B` k2F .
R m∈[M ] `∈[Ω] m
(60)
Then under the same conditions as in (59), we have νp ≤ (1/2)νp−1 with probability at least 1 − O(W −β ).
Proof. The proof of this lemma follows similar techniques and matrix Bernstein inequality as used in Lemma
2. Similar results can be found in [41]. We skip the proof due to space constraints.
24
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
Using the definition of ν 2 in (12), and the fact that W 0 = −U V ∗ , we can see that ν02 = ν 2 . Invoking Lemma
3 for every p ∈ [P ], we can iteratively conclude that
νP ≤ 2−P ν
(61)
with probability at least 1 − O(P W −β ) ≥ 1 − O(W 1−β ).
Lemma 4. Fix β ≥ 1. Take
Ω ≥ Cβν 2
R
W log2 W
M
(62)
for a sufficiently large constant C. Let W p−1 be a fixed M × W matrix defined in (56) then
A∗p Ap (W p−1 ) − W p−1 ≤ 2−p−1
with probability at least 1 − O(W −β ).
Proof of this lemma will be presented in Section 6.3
References
[1] M. Fazel, “Matrix rank minimization with applications,” Ph.D. dissertation, Stanford University, March
2002.
[2] B. Recht, M. Fazel, and P. Parrilo, “Guaranteed minimum-rank solutions of linear matrix equations via
nuclear norm minimization,” SIAM Review, vol. 52, no. 3, pp. 471–501, 2010.
[3] E. Candès and B. Recht, “Exact matrix completion via convex optimization,” Found. Comput. Math.,
vol. 9, no. 6, pp. 717–772, 2009.
[4] D. Gross, “Recovering low-rank matrices from few coefficients in any basis,” IEEE Trans. Inform.
Theory, vol. 57, no. 3, pp. 1548–1566, 2011.
[5] I. F. Gorodnitsky and B. D. Rao, “Sparse signal reconstruction from limited data using FOCUSS: a
re-weighted minimum norm algorithm,” IEEE Trans. Sig. Process., vol. 45, no. 3, pp. 600–616, 1997.
[6] J. J. Fuchs, “Multipath time-delay detection and estimation,” IEEE Trans. Sig. Process., vol. 47, pp.
237–243, 1999.
[7] ——, “On the application of the global matched filter to doa estimation with uniform circular arrays,”
IEEE Trans. Signal Process., vol. 49, no. 4, pp. 702–709, April 2001.
[8] E. Candès, J. Romberg, and T. Tao, “Robust uncertainty principles: Exact signal reconstruction from
highly incomplete frequency information,” IEEE Trans. Inform. Theory, vol. 52, no. 2, pp. 489–509,
February 2006.
[9] S. Kunis and H. Rauhut, “Random sampling of sparse trigonometric polynomials,” Appl. Comp. Harmon. Analysis, vol. 22, 2006.
[10] M. Rudelson and R. Vershynin, “On sparse reconstruction from Fourier and Gaussian measurements,”
Comm. Pure Appl. Math., vol. 61, no. 8, pp. 1025–1045, 2008.
[11] M. F. Duarte and R. G. Baraniuk, “Spectral compressive sensing,” Appl. Comp. Harm. Analysis, vol. 35,
no. 1, pp. 111–129, July 2013.
[12] G. Tang, B. N. Bhaskar, P. Shah, and B. Recht, “Compressed sensing off the grid,” IEEE Trans. Inform.
Theory, vol. 59, no. 11, pp. 7465–7490, 2013.
25
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
[13] E. J. Candès and C. Fernandez-Granda, “Towards a mathematical theory of super-resolution,” Comm.
Pure Appl. Math., vol. 67, no. 6, pp. 906–956, June 2014.
[14] Ali Ahmed and Justin Romberg, “Compressive multiplexing of correlated signals,” IEEE Trans. Inform.
Theory, vol. 1, pp. 479–498, 2015.
[15] A. Hormati, O. Roy, Y. M. Lu, and M. Vetterli, “Distributed sampling of signals linked by sparse
filtering: Theory and applications,” IEEE Trans. Sig. Process., vol. 58, no. 3, pp. 1095–1109, 2010.
[16] D. Baron, M. F. Duarte, M. B. Wakin, S. Sarvotham, and R. G. Baraniuk, “Distributed compressive
sensing,” arXiv preprint arXiv:0901.3403, 2009.
[17] M. Mishali and Y. Eldar and O. Dounaevsky and E. Shoshan, “Xampling: Analog to digital at subNyquist rates,” IET Circuits Devices Syst., vol. 5, no. 1, pp. 8–20, 2011.
[18] M. Mishali and Y. Eldar, “Blind multiband signal reconstruction: Compressed sensing for analog signals,” IEEE Trans. Sig. Process., vol. 57, no. 3, pp. 993–1009, 2009.
[19] M. Mishali, Y. C. Eldar, and A. J. Elron, “Xampling: Signal acquisition and processing in union of
subspaces,” IEEE Trans. Sig. Process., vol. 59, no. 10, pp. 4719–4734, 2011.
[20] W. Mantzel and J. Romberg, “Compressed subspace matching on the continuum,” arXiv preprint
arXiv:1407.5234, 2014.
[21] H. Malvar and D. Staelin, “The LOT: Transform coding without blocking effects,” IEEE Trans. Acoust.,
Speech, Signal Process., vol. 37, pp. 553–559, April 1989.
[22] M. S. Asif and J. Romberg, “Sparse recovery of streaming signals using `1 -homotopy,” IEEE Trans.
Sig. Process., vol. 62, no. 16, pp. 4209–4223, 2014.
[23] R. Schmidt, “Multiple emitter location and signal parameter estimation,” IEEE Trans. Antennas
Propag., vol. 34, no. 3, pp. 276–280, 1986.
[24] R. Roy and T. Kailath, “Esprit-estimation of signal parameters via rotational invariance techniques,”
IEEE Trans. Acoust., Speech, Signal Process., vol. 37, no. 7, pp. 984–995, 1989.
[25] D. Slepian, “On bandwidth,” Proceedings of the IEEE, vol. 64, no. 3, pp. 292–300, March 1976.
[26] ——, “Prolate spheroidal wave functions, fourier analysis and uncertainty v — the discete case,” Bell
Systems Tech. Journal, vol. 57, pp. 1371–1430, 1978.
[27] Schlottmann, C.R. and Hasler, P.E., “A highly dense, low power, programmable analog vector-matrix
multiplier: The fpaa implementation,” IEEE J. Emerg. Sel. Topic Circuits Sys., vol. 1, no. 3, pp.
403–411, 2011.
[28] Chawla, R. and Bandyopadhyay, A. and Srinivasan, V. and Hasler, P., “A 531 nw/mhz, 128× 32 currentmode programmable analog vector-matrix multiplier with over two decades of linearity,” in Proc. IEEE
Conf. Custom Integr. Circuits., 2004, pp. 651–654.
[29] J. Tropp and J. Laska and M. Duarte and J. Romberg, and R. Baraniuk, “Beyond Nyquist: Efficient
sampling of sparse bandlimited signals,” IEEE Trans. Inform. Theory, vol. 56, no. 1, pp. 520–544, 2010.
[30] J. Laska and S. Kirilos and M. Duarte and T. Raghed and R. Baraniuk and Y. Massoud, “Theory and
implementation of an analog-to-information converter using random demodulation,” in Proc. IEEE Int.
Symp. Circuits Syst., 2007, pp. 1959–1962.
[31] J. Yoo, S. Becker, M. Loh, M. Monge, and E. Candès, “A 100MHz-2GHz 12.5x sub-Nyquist rate receiver
in 90nm CMOS,” in Proc. IEEE Radio Freq. Integr. Circuits Symp. (RFIC), 2012.
26
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
[32] J. Yoo, C. Turnes, E. Nakamura, C. Le, S. Becker, E. Sovero, M. Wakin, M. Grant, J. Romberg,
A. Emami-Neyestanak, and E. Candès, “A compressed sensing parameter extraction platform for radar
pulse signal acquisition,” Submitted to IEEE J. Emerg. Sel. Topics Circuits Syst., February 2012.
[33] T. Murray, P. Pouliquen, A. Andreou, and K. Lauritzen, “Design of a CMOS A2I data converter: Theory,
architecture and implementation,” in Proc. IEEE Annu. Conf. Inform. Sci. Syst. (CISS), Baltimore,
MD, 2011, pp. 1–6.
[34] J. Romberg, “Compressive sensing by random convolution,” SIAM J. Imag. Sci., vol. 2, no. 4, pp.
1098–1128, 2009.
[35] J. Haupt and W. Bajwa and G. Raz and R. Nowak, “Toeplitz compressed sensing matrices with applications to sparse channel estimation,” IEEE Trans. Inform. Theory, vol. 56, no. 11, pp. 5862–5875,
2010.
[36] H. Rauhut and J. Romberg and J. Tropp, “Restricted isometries for partial random circulant matrices,”
Appl. Comput. Harmonic Anal., vol. 32, no. 2, pp. 242–254, 2012.
[37] J. Tropp and M. Wakin and M. Duarte and D. Baron and R. Baraniuk, “Random filters for compressive
sampling and reconstruction,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP),
Toulouse, France, 2006.
[38] B. Recht, “A simpler approach to matrix completion,” J. Mach. Learn. Res., vol. 12, pp. 3413–3430,
2011.
[39] E. Candès and Y. Plan, “Matrix completion with noise,” Proc. IEEE, vol. 98, no. 6, pp. 925–936, 2010.
[40] K. Mohan and M. Fazel, “New restricted isometry results for noisy low-rank recovery,” in Proc. IEEE
Int. Symp. Inform. Theory (ISIT), Austin, Texas, June 2010.
[41] A. Ahmed and B. Recht and J. Romberg, “Blind deconvolution using convex programming,” IEEE
Trans. Inform. Theory, vol. 60, no. 3, pp. 1711–1732, 2014.
[42] V. Koltchinskii, K. Lounici, and A. Tsybakov, “Nuclear-norm penalization and optimal rates for noisy
low-rank matrix completion,” Ann. Stat., vol. 39, no. 5, pp. 2302–2329, 2011.
[43] M. Fazel and E. Candès and B. Recht and P. Parrilo, “Compressed sensing and robust recovery of low
rank matrices,” in Proc. 42nd IEEE Asilomar Conf. Signals, Syst. Comput., Pacific Grove, CA, 2008,
pp. 1043–1047.
[44] B. Laurent and P. Massart, “Adaptive estimation of a quadratic functional by model selection,” Ann.
Stat., pp. 1302–1338, 2000.
[45] M. Ledoux, The concentration of measure phenomenon.
AMS, 2001, vol. 89.
[46] J. Tropp, “User-friendly tail bounds for sums of random matrices,” Found. Comput. Math., vol. 12,
no. 4, pp. 389–434, 2012.
[47] Y. C. Eldar and G. Kutyniok, Compressed sensing: theory and applications.
Press, 2012.
27
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
Cambridge University
6
Appendix: Proof of Key Lemmas
Proof of all the key lemmas mainly relies on using matrix Bernstein inequality to control the operator norms
of sums of random matrices.
6.1
Matrix Bernstein-type inequality
We will use a specialized version of the matrix Bernstein-type inequality [42, 46] that depends on the Orlicz
norms. The Orlicz norm of a random matrix Z is defined as
kZkψα = inf{u > 0 : E exp(
kZkα
) ≤ 2},
uα
α ≥ 1.
(63)
Suppose that, for some constant Uα > 0, kZ q kψα ≤ U(α) , q = 1, . . . , Q then the following proposition holds.
Proposition 2. Let Z 1 , Z 2 , . . . , Z Q be iid random matrices with dimensions M × N that satisfy E(Z q ) = 0.
Suppose that kZkψα < ∞ for some α ≥ 1. Define
1/2
1/2
Q
Q
X
X
(64)
,
(E Z ∗q Z q )
σZ = max
(E Z q Z ∗q )
q=1
q=1
Then ∃ a constant C > 0 such that , for all t > 0, with probability at least 1 − e−t
p
QUα2
kZ 1 + · · · + Z Q k ≤ C max σZ t + log(M + N ), Uα log1/α
(t
+
log(M
+
N
))
2
σZ
6.2
(65)
Proof of Lemma 2
We start by writing PT A∗p Ap PT as a sum of independent random matrices using (54) to obtain
PT A∗p Ap PT =
Using (53), and the fact that
P
`∈[Ω]
X X
n∈Γp `∈[Ω]
P [PT (an d∗n` ) PT (an d∗n` )] .
E dn` d∗n` = I W , the expectation of the quantity above evaluates to
X X
X
X
E PT A∗p Ap PT = PT P
E(an a∗n ⊗ dn` d∗n` ) PT = PT P
an a∗n ⊗
E dn` d∗n` PT = PT .
n∈Γp `∈[Ω]
n∈Γp
`∈[Ω]
The quantity PT A∗p Ap PT − PT can therefore be expressed as a sum of independent zero mean random
matrices in the following form
X X
PT A∗p Ap PT − PT =
P [PT (an d∗n` ) PT (an d∗n` ) − E PT (an d∗n` ) PT (an d∗n` )] .
n∈Γp `∈[Ω]
We will employ matrix Bernstein inequality to control the operator norm of the above sum. To proceed
define the operator Zn` which maps Z to hPT (an d∗n` ), Zi PT (an d∗n` ), i.e., Zn` = [PT (an d∗n` ) PT (an d∗n` )].
2
∗
This operator
is rank one, therefore,
P
P Pthe operator norm kZn` k = kPT (an dn` )kF . To ease the notation, we
will use
as a shorthand for
. We begin by computing the variance in (64) as follows
n∈Γp `∈[Ω]
n,`
σ2 = P 2
X
n,`
E(Zn` − E Zn` )2 = P 2
X
n,`
2
[E Zn`
− (E Zn` )2 ] ≤ P 2
28
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
X
n,`
2
,
E Zn,`
2
where the last inequality follows from the fact that E(Zn`
), and (E Zn` )2 are symmetric, and positive2
semidefinite matrices. The square of the rank-1 matrices Zn` is simply given by Zn`
= kPT (an d∗n` )k2F Zn` .
Now we develop the operator norm of the result simplified expression using (48)
X W
X
1
2
∗
∗
∗
2
2
E
kPT (an dn` )kF Zn` ≤
kU an k2 + kV dn` k2 Zn` .
Ω
P
n,`
n,`
Using the definition in (12), and (53), we can bound kU ∗ an k22 ≤ µ2 R/P M . Using this fact, we have
X
X
X
∗
∗
2
2 RW
2
2 RW
2
E kV dn` k2 Zn` ≤ µ
σ ≤ Pµ
E Zn` + P
E kV dn` k2 Zn` .
+P
MΩ
MΩ
n,`
n,`
(66)
n,`
The second term in (66) can be simplified as
X
X
E kV ∗ dn` k22 (an d∗n` an d∗n` ) PT
E kV ∗ dn` k22 Zn` = PT
n,`
n,`
≤
X
n,`
E kV ∗ dn` k22 (an d∗n` an d∗n` )
,
(67)
where the last inequality follows form the fact that kPT k ≤ 1. Since an d∗n` an d∗n` = an a∗n ⊗ dn,` d∗n,` , and
a simple calculation reveals the expectation
E kV ∗ dn` k22 (dn` d∗n` ) = kV ∗ I B` k2F I B` + 2I B` V V ∗ I B` − 2diag(I B` V V ∗ I B` ) 4 3kV ∗ I B` k2F
where for diag(X) is the diagonal matrix obtained by setting the off-diagonal entries of X to zero, and I B`
denotes the W × W identity matrix with ones only at the diagonal positions indexed by B` . This directly
implies that
X
X
X
∗
∗
∗
∗
2
∗
2
3kV I B` kF I B` ⊗
an an
E kV dn` k2 (an dn` an dn` ) ≤
n,`
`∈[Ω]
n∈Γp
R
3
≤ max kV ∗ I B` k2F = 3ρ2
,
P `∈[Ω]
PΩ
(68)
where the last equality follows from the definition of the coherence in (12). Plugging (68) in (66), we have
the bound
2
2 RW
2R
σ ≤C µ
+ρ
.
(69)
MΩ
Ω
Finally, we calculate the Orlicz norm, the last ingredient to obtain the Bernstein bound. First, it is important
to see that
P kZn` − E Zn` k ≤ 2P kZn` k = 2P kZn` kF = 2P kPT (an d∗n` )k2F ,
where the second-last equality follows form the fact that Zn` is the rank-1 operator. Using the last equation,
and (48), we have
W
1
kU ∗ a∗n k22 + kV ∗ dn` k22
Ω
P
1
∗
2
2 RW
2R
2 R W
≤ CP µ
+ max kV I B` kF ≤ C µ
+ρ
PM Ω
P `∈[Ω]
MΩ
Ω
U1 = max max 2P kPT (an d∗n` )k2F
n∈[N ] `∈[Ω]
ψ1
≤ 2P max max
n∈[N ] `∈[Ω]
ψ1
(70)
Moreover, a simple calculation, and using the facts that µ2 ≤ M/R, and ρ2 ≤ W/R shows that log(M Ω ·
U12 /σ 2 ) ≤ C log(W M ). Using this together with (69), and (70), and using t = β log(W M ) in the Bernstein’s
inequality in Proposition 2, we have
s
RW
R p
RW
R
∗
kPT Ap Ap PT − PT k ≤ C max
+ ρ2
β log(W M ),
+ ρ2
β log2 (W M )
MΩ
Ω
MΩ
Ω
We can conclude now that choosing Ω ≥ Cβ (µ2 R(W/M )+ρ2 R) log2 (W M ) ensures that kPT A∗p Ap PT −PT k ≤
1/2, which proves the lemma after using the fact that W ≥ M .
29
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
6.3
Proof of Lemma 4
Just as in the proof of Lemma 2, we will start with writing the A∗p Ap (W p−1 ) as a sum of independent
random matrices using (47) as follows
X X
A∗p Ap (W p−1 ) =
P [an a∗n W p−1 dn` d∗n` ] .
n∈Γp `∈[Ω]
Recall that dn` are random binary defined earlier. Then the expectation of the random quantity above is
X X
X X
E A∗p Ap (W p−1 ) =
P E [an a∗n W p−1 d`n d∗`n ] =
P [an a∗n W p−1 I B` ] = W p−1 ,
n∈Γp `∈[Ω]
n∈Γp `∈[Ω]
where the last two equalities follow from the fact that
X
an a∗n =
n∈Γp
1
IM ,
P
X
and
E dn` d∗n` =
`∈[Ω]
X
I B` = I W .
(71)
`∈[Ω]
We bound the operator norm kA∗p Ap (W p−1 ) − W p−1 k. In light of discussion above, A∗p Ap (W p−1 ) − W p−1
can be expressed as a following sum of independent, and zero mean random matrices
X
A∗p Ap (W p−1 ) − W p−1 =
P [an a∗n W p−1 dn` d∗n` − E an a∗n W p−1 dn` d∗n` ] ,
n,`
where
P
n,`
P P
is a shorthand for
n∈Γp `∈[Ω]
. Define Z n` := P [an a∗n W p−1 dn` d∗n` − E an a∗n W p−1 dn` d∗n` ] . To
compute the variance in (64), we start with
X
X
∗
∗
∗
2
∗
∗
W
E Z n` Z ∗n` = P 2
E an a∗n W p−1 dn` d∗n` ,
Ω E (an W p−1 dn` ) an an − E an an W p−1 dn` dn`
n,`
n,`
where we used the fact that kdn` k22 = W/Ω. Since E Z n` Z ∗n` is a symmetric positive-semidefinite matrix,
that is, E Z n` Z ∗n` < 0, this together with definition of Z n` implies that
X
∗
X
∗
2
∗
W
<
E an a∗n W p−1 dn` d∗n` E an a∗n W p−1 dn` d∗n` ,
Ω E (an W p−1 dn` ) an an
n,`
n,`
and, therefore,
X
n,`
E Z n` Z ∗n` ≤ P 2
W X
W X ∗
E (a∗n W p−1 dn` )2 an a∗n ≤ P 2
kan W p−1 I B` k22 an a∗n
Ω
Ω
≤ PW
n,`
n,`
max max ka∗n W p−1 I B` k22
n∈[N ] `∈[Ω]
= W max max ke∗m W p−1 I B` k22
m∈[M ] `∈[Ω]
W/M
2
≤ νp−1
R
,
Ω
(72)
2
where the inequalities follow by using (71), the definition of coherence νp−1
in (60), and (53).
For the second variance term in (64), we skip through similar step as for the first term and land directly at
X X
n∈Γp `∈[Ω]
E Z n` Z ∗n` ≤
X X
n∈Γp `∈[Ω]
=P
P 2 kan k22 E (a∗n W p−1 dn` )2 dn` d∗n`
X X
E (a∗n W p−1 dn` )2 dn` d∗n` ,
n∈Γp `∈[Ω]
30
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
(73)
where the last equality is the result of (53). One can show that for a fixed vector x ∈ RW , and the fact
that dn` is a vector with independent Rademacher random variables at locations indexed by B` , and zero
elsewhere, the following
E (x∗ dn` )2 dn` d∗n` ≤ kxB` k22 I B` + 2xB` x∗B` 4 3kxB` k22 I B`
(74)
holds, where xB` is equal to x on B` , and zero elsewhere. Moreover, I B` is a diagonal matrix with ones at
B` , and zero elsewhere. Using (74) with x∗ = a∗n W p−1 , we have
X X
n∈Γp `∈[Ω]
≤ 3P
E Z n` Z ∗n` ≤ 3P
X
n∈Γp
X X
n∈Γp `∈[Ω]
ka∗n W p−1 I B` k22 I B`
2
max ka∗n W p−1 I B` k22 ≤ 3P M max max ka∗n W p−1 I B` k22 ≤ 3νp−1
n∈Γp `∈[Ω]
`∈[Ω]
R
,
Ω
(75)
2
where in the last inequality, we use the definition of νp−1
in (61) combined with (53). In light of (64), the
maximum of (72), and (75) accounts for the variance σ 2
2
σ 2 ≤ 3νp−1
R
(W/M )
(W/M ) + 1
2
≤ 6νp−1
R
,
Ω
Ω
(76)
where in the last inequality follows from our assumption that W ≥ M . Finally, we need to compute an
upper bound on the Orlicz norm of the random variable kZ n` k. Begin by using similar simple facts above
that
r
1
W ∗
∗
∗
∗
kZ n` k ≤ 2P kan an W p−1 dn` dn` k = 2P kan k2 kdn` k2 |an W p−1 dn` | = 2P √
|a W p−1 dn` |.
(77)
Ω n
P
Using standard calculations; see, for example, [47], we can compute the following finite bound on the Orlicz-1
norm of the random variable |a∗n W p−1 dn` |
max max ka∗n W p−1 dn` kψ2 = max max
n∈Γp `∈[Ω]
m∈[M ] `∈[Ω]
1 ∗
ke W p−1 dn` kψ2
P m
C
max max ke∗ W p−1 I B` k2 ≤ Cνp−1
≤
P n∈Γp `∈[Ω] m
r
R
,
PMΩ
where the last inequality follows from (60). Using (77), P = N/M , and (63) then directly gives us
2
U22 := max max kZ n` k2ψ2 ≤ Cνp−1
R
n∈Γp `∈[Ω]
W/M
.
Ω2
(78)
2
Moreover using a loose bound on variance σ 2 ≤ 3νp−1
R((W/M ) + 1)/Ω, it is easy to see that
log
ΩM · U22
≤ C log M.
σ2
The results in (72), (75), and (78) can be plugged in Proposition 2 to obtain
(r
)
r
W/M p
W/M
3/2
∗
2
2
kAp Ap (W p−1 ) − W p−1 kF ≤ C max
νp−1 R
β log(W M ), νp−1 R
β log (W M )
Ω
Ω2
(79)
with t = (β − 1) log(W M ), which holds with probability at least 1 − O(W M )−β . Recall that W ≥ M . The
2
lemma now follows by using the bound on νp−1
in (61), and choosing Ω ≥ Cβ Rν 2 (W/M ) log3/2 W for a
universal constant Cβ that only depends on a fixed parameter β ≥ 1.
31
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
7
Proof of Theorem 2
The first step in the proof is the following Oracle inequality in [42] that gives an upper bound on the deviation
c in (30) from the true solution X 0 in the mean squared sense.
of X
Theorem 4 (Oracle inequlaity in [42]). Suppose we observe the noisy measurements y in (22) of X 0 with
c
rank(X 0 ) ≤ R, and it is given that kA∗ (y) − E A∗ (y)k ≤ λ/2 fro some scalar λ ≥ 0. Then the solution X
2
2
c
of the nuclear norm penalized estimator in (29) obeys kX − X 0 kF ≤ min 2λkX 0 k∗ , 1.46λ R .
All that is required is to bound the spectral norm:
kA∗ (y) − E A∗ (y)k ≤ kA∗ A(X 0 ) − X 0 k + kA∗ (ξ)k
(80)
We begin by bounding the first term above kA∗ A(X 0 ) − X 0 k using a corollary to Lemma 4 stated as follows.
Corollary 3. Let X 0 be a fixed M × W matrix defined in 17 then
(r
)
r
W/M p
W/M
3/2
∗
2
2
ν
β log W , ν
β log W .
kA A(X 0 ) − X 0 k ≤ CkX 0 kF max
Ω
Ω2
(81)
with probability at least 1 − O(W −β ).
Proof. The proof of the corollary is very similar to the proof of Lemma 4— the main difference is that
the number of partitions is P = N/M √
= 1. Moreover, we have X 0 in place of W p−1 , and in the proof
development replace kW p−1 kF ≤ 2−p+1 R with kX 0 kF to obtain bound in (81), which is understandably
similar to (79)
Lemma 5. Fix β ≥ 1. The for a sufficiently large constant C, the following bound
r
W/M p
∗
kA (ξ)k ≤ Ckξkψ2
β log W
Ω
holds with probability at least 1 − O(W −β ).
Using Corollary 3, and Lemma 5, we can bound (80), and obtain
s
q
(W/M )(ν 2 kX 0 k2F + kξk2ψ2 )
β log3/2 W
λ≥C
Ω
with probability at least 1−O(W −β ). Taking kX 0 kF = 1 without loss of generality, and Ω ≥ Cβ ν 2 R W
log3/2 W ,
qM
where Cβ is a universal constant that depends on a fixed parameter β ≥ 1, allows us to choose λ ≥ kξk2ψ2 /R.
With this, an application of Theorem 4 proves Theorem 2.
7.1
Proof of Lemma 5
The proof of this lemma requires the
P use of matrix Bernstein’s inequality 2. As it is required to bound the
spectral norm of the sum A∗ (ξ) = n,` ξn [`]an d∗n` , we start with the summands Z n` = ξn [`]an d∗n` . Because
variables ξn` are zero mean, it follows that E Z n` = 0. We start by computing the variance
X
n,`
E Z n` Z ∗n` =
W X
W
E |ξn [`]|2 · an a∗n =
Ω
Ω
n,`
max
n∈[N ]
X
`∈[Ω]
E |ξn [`]|2 ·
X
n∈[N ]
an a∗n ≤
32
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
W
kξk2ψ2 , (82)
NΩ
P
where the last inequality follows from the facts that n∈[N ] an a∗n = I M , and that ξn [`] for (n, `) ∈ [N ] × [Ω]
P
are independent and identically distributed implying maxn∈[N ] `∈[Ω] E |ξn [`]|2 ≤ Ckξk2ψ2 /N .
Similarly arguments lead to
X
n,`
E Z n` Z ∗n` =
X
n,`
kan k22 E |ξn [`]|2 E dn` d∗n` =
M X
M
E |ξn [`]|2 I B` ≤
kξk2ψ2 .
N
NΩ
(83)
n,`
Combining (82) and (83) and using (64) gives σ 2 ≤ kξk2ψ2 P W/M Ω, where P = N/M , and we assume that
W ≥ M . The final quantity required is the Orlicz norm of Z n` , which is simply
kZ n` k2ψ2 = kξn [`]k2ψ2 kan d∗n` k2 = C
then
kZ n` kψ2 log
1/2
M Ω · kZ n` k2ψ2
σ2
1
MW
1 W
kξk2ψ2 ·
= Ckξk2ψ2 2
NΩ
NΩ
P M Ω2
!
r
≤C
kξk2ψ2
W/M
log1/2 (M W ).
P 2 Ω2
At the end, using t = β log W in the Bernstein’s bound (65), we have
(
)
r
r
W/M p
W/M
3/2
∗
kA (ξ)k ≤ C max kξkψ2
β log(M W ), kξkψ2
(β log (M W )) ,
Ω
P 2 Ω2
and using the fact that P = O(log W ), and M ≤ W from (57) proves the result.
33
Draft by A. Ahmed and J. Romberg – December 18, 2017 – 2:46
| 7cs.IT
|
White matter fiber segmentation using
functional varifolds
Kuldeep Kumar1,2 , Pietro Gori2,4 , Benjamin Charlier2,5 , Stanley Durrleman2 ,
Olivier Colliot2,3 and Christian Desrosiers1
arXiv:1709.06144v1 [cs.CV] 18 Sep 2017
1
LIVIA, École de technologie supérieure (ÉTS), Montreal, Canada
Aramis project-team, Inria Paris, Sorbonne Universités, UPMC Univ Paris 06,
Inserm, CNRS, Institut du cerveau et la moelle (ICM) - Hôpital Pitié-Salpêtrière,
Boulevard de l0 hôpital, F-75013, Paris, France
3
AP-HP, Departments of Neurology and Neuroradiology, Hôpital Pitié-Salpêtrière,
75013, Paris, France
4
LTCI lab - IMAGES group, Télécom ParisTech, Paris, France
5
Université de Montpellier, France
2
Abstract. The extraction of fibers from dMRI data typically produces a
large number of fibers, it is common to group fibers into bundles. To this
end, many specialized distance measures, such as MCP, have been used
for fiber similarity. However, these distance based approaches require
point-wise correspondence and focus only on the geometry of the fibers.
Recent publications have highlighted that using microstructure measures
along fibers improves tractography analysis. Also, many neurodegenerative diseases impacting white matter require the study of microstructure
measures as well as the white matter geometry. Motivated by these, we
propose to use a novel computational model for fibers, called functional
varifolds, characterized by a metric that considers both the geometry
and microstructure measure (e.g. GFA) along the fiber pathway. We use
it to cluster fibers with a dictionary learning and sparse coding-based
framework, and present a preliminary analysis using HCP data.
1
Introduction
Recent advances in diffusion magnetic resonance imaging (dMRI) analysis have
led to the development of powerful techniques for the non-invasive investigation
of white matter connectivity in the human brain. By measuring the diffusion
of water molecules along white matter fibers, dMRI can help identify connection pathways in the brain and better understand neurological diseases related
to white matter [6]. Since the extraction of fibers from dMRI data, known as
tractography, typically produces a large number of fibers, it is common to group
these fibers into larger clusters called bundles. Clustering fibers is also essential
for the creation of white matter atlases, visualization, and statistical analysis of
microstructure measures along tracts [12].
Most fiber clustering methods use specialized distance measures, such as
Mean Closest Points (MCP) distance [4,11]. However, these distance-based approaches require point-wise correspondence between fibers and only consider
fiber geometry. Another important aspect for white matter characterization
is the statistical analysis of microstructure measures. As highlighted in recent
publications, using microstructure measures along fibers improves tractographic
analysis [3,10,12,15,16,17]. Motivated by these, we propose to use a novel computational model for fibers, called functional varifolds, characterized by a metric
that considers both the geometry and microstructure measure (e.g. generalized
fractional anisotropy) along fiber pathways.
Motivation for this work comes from the fact that the integrity of white
matter is an important factor underlying many cognitive and neurological disorders. In vivo, tissue properties may vary along each tract for several reasons:
different populations of axons enter and exit the tract, and disease can strike at
local positions within the tract. Hence, understanding diffusion measures along
each fiber tract (i.e., tract profile) may reveal new insights into white matter
organization, function, and disease that are not obvious from mean measures of
that tract or from the tract geometry alone [3,17]. Recently, many approaches
have been proposed for tract based morphometry [12], which perform statistical analysis of microstructure measures along major tracts after establishing
fiber correspondences. While studies highlight the importance of microstructure
measures, most approaches either consider the geometry or signal along tracts,
but not both. The intuitive approach would be to consider microstructure signal
during clustering also. However, this has been elusive due to lack of appropriate
framework.
As a potential solution, we explore a novel computational model for fibers,
called functional varifolds [1], which is a generalization of the varifolds framework
[2]. The advantages of using functional varifolds are as follows. First, functional
varifolds can model the fiber geometry as well as signal along the fibers. Also,
it does not require pointwise correspondences between fibers. Lastly, fibers do
not need to have the same orientation as in the framework of currents [5]. We
test the impact of this new computational model on a fiber clustering task, and
compare its performance against existing approaches for this task.
As clustering method, we reformulate the dictionary learning and sparse coding based framework proposed in [8,7,9]. This choice of framework is driven by
its ability to describe the entire data-set of fibers in a compact dictionary of
prototypes. Bundles are encoded as sparse non-negative combinations of multiple dictionary prototypes. This alleviates the need for explicit representation
of a bundle centroid, which may not be defined or may not represent an actual
object. Also, sparse coding allows assigning single fibers to multiple bundles,
thus providing a soft clustering.
The contributions of this paper are threefold: 1) a novel computational model
for modeling both fiber geometry and signal along fibers, 2) a generalized clustering framework, based on dictionary learning and sparse coding, adapted to the
computational models, and 3) a comprehensive comparison of fully-unsupervised
models for clustering fibers.
2
2.1
White matter fiber segmentation using functional
varifolds
Modeling fibers using functional varifolds
In the framework of functional varifolds [1,2], a fiber X is assumed to be a
polygonal line of P segments described by their center point xp ∈ R3 and tangent
vector βp ∈ R3 centered at xp and of length cp (respectively, yq ∈ R3 , γq ∈ R3
and dq for a fiber Y with Q segments). Let fp and gp be the signal values
at center points xp and yq respectively, and ω the vector field belonging to a
reproducing kernel Hilbert space (RKHS) W ∗ . Then the fibers X and Y can be
PP
modeled based on functional varifolds as: V(X,f ) (ω) ≈ p=1 ω(xp , βp , fp )cp and
PQ
V(Y,g) (ω) ≈ q=1 ω(yq , γq , gp )dq . More details can be found in [1].
The inner product metric between X and Y is defined as:
hV(X,f ) , V(Y,g) iW ∗ =
Q
P
X
X
κf (fp , gq )κx (xp , yq )κβ (βp , γq )cp dq
(1)
p=1 q=1
where κf and κx are Gaussian kernels and κβ is a Cauchy-Binet kernel. This can
be re-written as:
Q
P
−kx − y k2 β T γ 2
−kf − g k2
X
X
p
q
p
q
p
q
exp
cp dq
hV(X,f ) , V(Y,g) iW ∗ =
exp
2
2
λ
λ
c
p dq
M
W
p=1 q=1
(2)
where λM and λW are kernel bandwidth parameters. For varifolds [2], a computational model using only fiber geometry and used for comparison in the
experiments, we drop the signal values at center
PPpoints. Thus, the varifoldsbased representation of fibers will be: VX (ω) ≈ p=1 ω(xp , βp )cp and VY (ω) ≈
PQ
ω(yq , γq )dq . Hence, the inner product is defined as:
q=1
hVX , VY iW ∗ =
Q
P
X
X
p=1 q=1
2.2
exp
−kx − y k2 β T γ 2
p
q
p
q
cp dq .
λ2W
cp dq
(3)
Fiber Clustering using Dictionary learning and sparse coding
For fiber clustering, we extend the dictionary learning and sparse coding based
framework presented in [8,7,9]. Let VT be the set of n fibers modeled using
be the atom matrix representing the dictionary
functional varifolds, A ∈ Rn×m
+
coefficients for each fiber belonging to one of the m bundles, and W ∈ Rm×n
+
be the cluster membership matrix containing the sparse codes for each fiber.
Instead of explicitly representing bundle prototypes, each bundle is expressed as
a linear combination of all fibers. The dictionary is then defined as D = VT A.
Since this operation is linear, it is defined for functional varifolds.
The problem of dictionary learning using sparse coding [8,7] can be expressed
as finding the matrix A of m bundle prototypes and the fiber-to-bundle assignment matrix W that minimize the following cost function:
arg min
A,W
1
||VT − VT AW ||2W ∗ ,
2
subject to: ||wi ||0 ≤ Smax .
(4)
Parameter Smax defines the maximum number of non-zero elements in wi (i.e.,
the sparsity level), and is provided by the user as input to the clustering method.
An important advantage of using the above formulation is that the reconstruction error term only requires inner product between the varifolds. Let
Q ∈ Rn×n be the Gram matrix denoting inner product between all pairs of
training fibers, i.e., Qij = hVXi ,fi , VXj ,fj iW ∗ . Matrix Q can be calculated once
and stored for further computations. The problem then reduces to linear algebra
operations involving matrix multiplications. The solution of Eq. (4) is obtained
by alternating between sparse coding and dictionary update [8]. The sparse codes
of each fiber can be updated independently by solving the following sub-problem:
arg min
wi ∈Rm
+
1
||VXi − VT Awi ||2W ∗ ,
2
subject to: ||wi ||0 ≤ Smax .
which can be re-written as:
1
>
Q(i, i) + w>
arg min
i A QAw i − 2Q(i, :)Aw i ,
m
2
wi ∈R+
(5)
s.t.: ||wi ||0 ≤ Smax . (6)
The non-negative weights wi can be obtained using the kernelized Orthogonal
Matching Pursuit (kOMP) approach proposed in [8], where the most positively
correlated atom is selected at each iteration, and the sparse weights ws are
obtained by solving a non-negative regression problem. Note that, since the size
of ws is bounded by Smax , it can be otained rapidly. Also, in case of a large
number of fibers, the Nystrom method can be used for approximating the Gram
matrix [7]. For dictionary update, A is recomputed by applying the following
update scheme, until convergence:
Aij ← Aij
3
(QW > )ij
,
(QAW W > )ij
i = 1, . . . , n,
j = 1, . . . , m.
(7)
Experiments
Data: We evaluate different computational models on the dMRI data of 10 unrelated subjects (6 females and 4 males, age 22-35) from the Human Connectome
Project (HCP) [14]. DSI Studio [18] was used for the signal reconstruction (in
MNI space, 1mm), and streamline tracking employed to generate 50, 000 fibers
per subject (minimum length 50 mm, maximum length 300 mm). Generalized
Fractional Anisotropy (GFA), which extends standard fractional anisotropy to
orientation distribution functions, was considered as along-tract measure of microstructure. While we report results obtained with GFA, any other along-tract
measure may have been used.
Parameter impact: We performed k-means clustering and manually selected
pairs of fibers from clusters most similar to major bundles. We then modeled
these fibers using different computational models, and analyzed the impact of
varying the kernel bandwidth parameters. The range of these parameters were
estimated by observing the values of distance between centers of fiber segments
and difference between along tract GFA values for selected multiple pairs of
fibers. Figure 1 (top left) shows GFA color-coded fibers for 3 pairs corresponding
to a) right Corticospinal tract – CST (R), b) Corpus Callosum – CC, and c) right
Inferior Fronto-Occipital Fasciculus – IFOF (R). Cosine similarity (in degrees) is
reported for the fiber pairs modeled using varifolds (Var) and functional varifolds
(fVar), for λW = 7 mm and λM = 0.01.
Figure 1 (top left) shows GFA color-coded fiber pairs. The color-coded visualization reflect the variation of fiber geometry, microstructure measure (i.e.
GFA) along fiber, and difference in GFA along fiber for the select fiber pairs.
This visualization of variation and difference in GFA values along fibers support
our hypothesis that modeling along tract signal along with geometry provides
additional information. The change in cosine similarity for CC from 45.8 degrees
Fig. 1: Along-fiber GFA visualization and cosine similarity between pairs of fibers
from three prominent bundles: a) CST (R), b) CC, c) IFOF (R), using framework of varifolds (Var) and functional varifolds (fVar) (top left), and Comparing
variation of cosine similarity for the select fiber pairs over kernel bandwidth
parameters λW and λM for the framework of functional varifolds (top right:
CST (R), middle left: CC, middle right: IFOF (R)); Impact of λM on clustering
consistency (measured using Average Silhouette) for m = 100, 125, 150 for functional Varifolds vs Varifolds (bottom left), and functional Varifolds vs GFA only
(bottom right)
(using varifolds) to 66.3 degrees (using functional varifolds) while for CST (R)
from 45.6 degrees to 72.4 degrees, reflect more drop in cosine similarity if along
tract signal profiles are not similar. This shows that functional varifolds imposes
penalty for different along fiber signal profiles.
Figure 1 also compares the impact of varying the kernel bandwidth parameters for functional varifolds using similarity angle between pairs of these selected
fibers (top right: CST (R), bottom left: CC, bottom right: IFOF (R)). We show
variation over λW = 3, 5, 7, 9 and 11 (mm) and λM = 0.001, 0.005, 0.01, 0.05,
and 0.1.
Comparing the parameter variation images in Figure 1 we observe that the
cosine similarity values over the parameter space show similar trends for all 3
pairs of fibers. This observation allows us to select a single pair of parameter
Model m=100 m=125 m=150
fVar
Var
GFA
MCP
0.3624
0.3356
-0.0579
0.3240
0.3451
0.3089
-0.0584
0.2888
0.3314
0.2905
-0.0610
0.2619
Fig. 2: Mean silhouette obtained with Varifolds, Varifolds, GFA, and MCP, computed for varying a number of clusters, over 10 subjects and 3 seed values (left).
Detailed results obtained for 10 subjects using m=100 (right).
values for our experiments. We have used λW = 7 mm and λM = 0.01 for
our experiments based on the cosine similarity values in Figure 1. The smaller
values for λW (< 7mm) and λM (< 0.01mm) will make the current fiber pairs
orthogonal while for larger values we lose the discriminative power as all fiber
pairs will have very high similarity.
Quantitative analysis: We report a quantitative evaluation of clusterings
obtained using as functional varifolds (fVar), varifolds (var), MCP and GFA
computational model. The same dictionary learning and sparse coding framework is applied for all computational models. For each of the 10 HCP subjects,
we compute the Gramian matrix using 5, 000 fibers randomly sampled over the
full brain for 3 seed values. The MCP distance dij is calculated between each
fiber pair (i, j), as described in [4], and the Gramian matrix
obtained using a
radial basis function (RBF) kernel: kij = exp − γ · d2ij . Parameter γ was set
empirically to 0.007 in our experiments.
Since our evaluation is performed in an unsupervised setting, we use the
silhouette measure [11,13] to assess and comparing clustering consistency. Silhouette values, which range from −1 to 1, measure how similar an object is to its
own cluster (cohesion) compared to other clusters (separation). Figure 1 (bottom row) shows impact of λM on clustering consistency for functional Varifolds
w.r.t Varifolds and GFA only. Figure 2 (right) gives the average silhouette for m
= 100, 125, and 150 clusters, computed over 10 subjects and 3 seed values. The
impact of using both geometry and microstructure measures along fibers is evaluated quantitatively by comparing clusterings based on functional varifolds with
those obtained using only geometry (i.e., varifolds, MCP), and only along-fiber
signal (i.e., GFA). As can be seen, using GFA alone leads to poor clusterings, as
reflected by the negative silhouette values. Comparing functional varifolds with
varifolds and GFA, we observe a consistently improved performance for different
numbers of clusters. To further validate this hypothesis, we also report the average silhouette (over 3 seed values) obtained for 10 subjects using m = 100. These
results demonstrate that functional varifolds give consistently better clustering,
compared to other computational models using the same framework1 .
Qualitative visualization: Figure 3 (top row) shows the dictionary learned for
a single subject (m = 100) using functional varifolds (fVar), varifolds (Var), and
MCP distance. For visualization purposes, each fiber is assigned to a single cluster, which is represented using a unique color. The second and third rows of the
1
Silhouette analyzes only clustering consistency, not the along-fiber signal profile.
fVar
Var
MCP
Fig. 3: Full clustering visualization (m = 100, top row), single cluster visualization (mid row), and GFA based color coded visualization of the selected single
cluster (bottom row). Using following computational models for fibers: functional
varifolds (left column), varifolds (middle column), and MCP distance (right column). Superior axial views. Note: (top row) each figure has a unique color code.
figure depict a specific cluster and its corresponding GFA color-coded profiles.
We observe that all three computational models produce plausible clusterings.
From the GFA profiles of the selected cluster (with correspondence across computational models), we observe that functional varifolds enforce both geometric
as well as along-tract signal profile similarity. Moreover, the clustering produced
with varifolds or MCP (i.e., using only geometric properties of fibers), are similar
to one another and noticeably different from that of functional varifolds.
4
Conclusion
A novel computational model, called functional varifolds, was proposed to model
both geometry and microstructure measure along fibers. We considered the task
of fiber clustering and integrated our functional varifolds model within framework based on dictionary learning and sparse coding. The driving hypothesis that
combining along-fiber signal with fiber geometry helps tractography analysis was
validated quantitatively and qualitatively using data from Human Connectome
Project. Results show functional varifolds to yield more consistent clusterings
than GFA, varifolds and MCP. While this study considered a fully unsupervised
setting, further investigation would be required to assess whether functional varifolds augment or aid the reproducibility of results.
Acknowledgements: Data were provided by the Human Connectome
Project.
References
1. Charlier, B., Charon, N., Trouvé, A.: The fshape framework for the variability
analysis of functional shapes. Foundations of Computational Mathematics pp. 1–
71 (2014)
2. Charon, N., Trouvé, A.: The varifold representation of nonoriented shapes for diffeomorphic registration. SIAM Journal on Imaging Sciences 6(4), 2547–2580 (2013)
3. Colby, J.B., Soderberg, L., Lebel, C., Dinov, I.D., Thompson, P.M., Sowell, E.R.:
Along-tract statistics allow for enhanced tractography analysis. Neuroimage 59(4),
3227–3242 (2012)
4. Corouge, I., Gouttard, S., Gerig, G.: Towards a shape model of white matter fiber
bundles using diffusion tensor MRI. In: ISBI 2004. pp. 344–347. IEEE (2004)
5. Gori, P., Colliot, O., Marrakchi-Kacem, L., Worbe, Y., Fallani, F.D.V., Chavez, M.,
Lecomte, S., Poupon, C., Hartmann, A., Ayache, N., et al.: A prototype representation to approximate white matter bundles with weighted currents. In: MICCAI.
pp. 289–296. Springer (2014)
6. Hagmann, P., Jonasson, L., Maeder, P., Thiran, J.P., Wedeen, V.J., Meuli, R.: Understanding diffusion mr imaging techniques: From scalar diffusion-weighted imaging to diffusion tensor imaging and beyond 1. Radiographics 26(suppl 1), S205–
S223 (2006)
7. Kumar, K., Desrosiers, C.: A sparse coding approach for the efficient representation
and segmentation of white matter fibers. In: ISBI, 2016. pp. 915–919. IEEE (2016)
8. Kumar, K., Desrosiers, C., Siddiqi, K.: Brain fiber clustering using non-negative
kernelized matching pursuit. In: Machine Learning in Medical Imaging, LNCS, vol.
9352, pp. 144–152 (2015)
9. Kumar, K., Desrosiers, C., Siddiqi, K., Colliot, O., Toews, M.: Fiberprint: A subject
fingerprint based on sparse code pooling for white matter fiber analysis. NeuroImage 158, 242 – 259 (2017)
10. Maddah, M., Grimson, W.E.L., Warfield, S.K., Wells, W.M.: A unified framework
for clustering and quantitative analysis of white matter fiber tracts. Medical image
analysis 12(2), 191–202 (2008)
11. Moberts, B., Vilanova, A., van Wijk, J.J.: Evaluation of fiber clustering methods
for diffusion tensor imaging. In: VIS 2005. pp. 65–72. IEEE (2005)
12. O’Donnell, L.J., Westin, C.F., Golby, A.J.: Tract-based morphometry for white
matter group analysis. Neuroimage 45(3), 832–844 (2009)
13. Siless, V., Medina, S., Varoquaux, G., Thirion, B.: A comparison of metrics and
algorithms for fiber clustering. In: PRNI, 2013. pp. 190–193. IEEE (2013)
14. Van Essen, D.C., Smith, S.M., Barch, D.M., Behrens, T.E., Yacoub, E., Ugurbil,
K., Consortium, W.M.H., et al.: The wu-minn human connectome project: an
overview. Neuroimage 80, 62–79 (2013)
15. Wang, Q., Yap, P.T., Wu, G., Shen, D.: Application of neuroanatomical features
to tractography clustering. Human brain mapping 34(9), 2089–2102 (2013)
16. Wassermann, D., Bloy, L., Kanterakis, E., Verma, R., Deriche, R.: Unsupervised
white matter fiber clustering and tract probability map generation: Applications
of a Gaussian process framework for white matter fibers. NeuroImage 51(1) (2010)
17. Yeatman, J.D., Dougherty, R.F., Myall, N.J., Wandell, B.A., Feldman, H.M.: Tract
profiles of white matter properties: automating fiber-tract quantification. PloS one
7(11), e49790 (2012)
18. Yeh, F.C., Tseng, W.Y.I.: Ntu-90: a high angular resolution brain atlas constructed
by q-space diffeomorphic reconstruction. Neuroimage 58(1), 91–99 (2011)
| 1cs.CV
|
arXiv:1506.06796v2 [nlin.AO] 19 Oct 2015
When slower is faster
Carlos Gershenson1,2,3,4,5 and Dirk Helbing6
1
Instituto de Investigaciones en Matemáticas Aplicadas y en Sistemas,
Universidad Nacional Autónoma de México.
[email protected] http://turing.iimas.unam.mx/~cgg
2
Centro de Ciencias de la Complejidad, UNAM, México.
3
SENSEable City Lab, Massachusetts Institute of Technology, USA.
4
MoBS Lab, Northeastern University, USA.
5
ITMO University, St. Petersburg, Russian Federation.
6
Department of Humanities, Social and Political Sciences (GESS)
ETH Zürich
[email protected] http://www.coss.ethz.ch
October 21, 2015
Abstract
The slower is faster (SIF) effect occurs when a system performs worse as its components try to do better. Thus, a moderate individual efficiency actually leads to a
better systemic performance. The SIF effect takes place in a variety of phenomena.
We review studies and examples of the SIF effect in pedestrian dynamics, vehicle traffic, traffic light control, logistics, public transport, social dynamics, ecological systems,
and adaptation. Drawing on these examples, we generalize common features of the SIF
effect and suggest possible future lines of research.
1
Introduction
How fast should an athlete run a race? If she goes too fast, she will burn out and become
tired before finishing. If she runs conservatively, she will not get tired, but will not make
her best time. To minimize her race time, she has to go as fast as possible but without
burning out. If she goes faster, she will actually race more slowly. This is an example of
the “slower-is-faster” (SIF) effect: in order to run faster, sometimes it is necessary to run
slower, not to burn out. It is not trivial to calculate the running speed which will lead to the
best race, as this depends on the athlete, race distance, track, temperature, humidity, and
daily performance: Running 100m dash should be done as fast as you can, while running a
marathon demands a carefully paced race. How fast would an athlete run a marathon if she
started with a speed for a 100m? To finish the marathon successfully, she would obviously
have to run more slowly.
1
There are several other examples of the SIF effect, which will be described in the next
section. We then generalize the common features of these phenomena to discuss potential
causes and promising lines of research towards a unified explanation of the SIF effect.
2
2.1
Examples
Pedestrian evacuation
Perhaps the first formal study of the SIF effect was related to pedestrian flows (Helbing et al.,
2000a). Modelling crowds like self-driven particles with “social forces” interacting among
them (Helbing and Molnár, 1995; Helbing et al., 2000b), it has been shown that when individuals try to evacuate a room too quickly, they lead to intermittent clogging and a reduced
outflow as compared to a calmer evacuation. In this context, the SIF effect is also known as
“freezing by heating” (Stanley, 2000). Trying to exit fast makes pedestrians slower, while
calmer people manage to exit faster. This has led people to suggest obstacles close to exits,
precisely to reduce friction (Helbing et al., 2005; Heliövaara et al., 2013). Counterintuitively,
a slowdown of the evacuation can increase the outflow. Also, in a related study of aircraft
evaluation, it was found that there is a critical door width which determines whether “competitive” evacuation will increase or decrease evacuation time (Kirchner et al., 2003). In
other words, pushy people will evacuate slower if there are narrow doors (SIF), but will
evacuate faster if the doors are wide enough (FIF, faster-is-faster).
2.2
Pedestrians crossing a road
Another example concerns mixed pedestrian and vehicle traffic. Imagine pedestrians are
trying to cross a road at a location where there is no traffic light and no pedestrian crossing
is marked. This is a typical situation along speed-reduced roads (e.g. with a speed limit
of 30km/h) or in shared spaces for multi-modal use. Pedestrians would cross when the
gap between two successive vehicles exceeds a certain critical separation that ensures a safe
crossing of the road. However, there are two types of pedestrians: patient and pushy ones.
Pushy pedestrians might force a vehicle to slow down while patient pedestrians would not do
this, i.e. they would wait for a larger gap. Surprisingly, if all pedestrians were of the patient
type, on average they would have to wait for a shorter time period (Jiang et al., 2006).
How does this SIF effect come about? When a pushy pedestrian has slowed a vehicle
down, other arriving pedestrians will pass the road, too, and it takes a long time until no
further pedestrians arrive, and the stopped cars can accelerate again. During the waiting
time, however, a long vehicle queue has formed, such that no large enough gap to cross the
road occurs between vehicles until the entire vehicle queue has dissolved. As a consequence,
pedestrians will have to wait for a long time until they can cross again. Altogether, it is
better if pedestrians wait for large enough gaps such that they don’t force vehicles to slow
down.
2
2.3
Vehicle traffic
SIF effects are also known from vehicle traffic (Helbing and Huberman, 1998; Helbing and Treiber,
1998; Helbing, 2001; Helbing and Nagel, 2004). Surprisingly, speed limits can sometimes
reduce travel times. This is the case, when the traffic density enters the multi-stable (“metastable”) regime. Then, traffic flow is sensitive to disruptions and may break down, which
causes largely increased travel times. A speed limit can delay the breakdown of fluid traffic
flows, because it reduces the variability of vehicle speeds. This homogenization avoids disturbances in the flow, which are big enough to trigger a breakdown (i.e. have a “super-critical”
amplitude).
If vehicles go fast, the safety distance between vehicles must be increased. Thus, less
vehicles will be able to use a road. For example, at 80km/h, a maximum capacity of about
22 vehicles per km per lane is reached before free traffic flow breaks down. At 120km/h, this
capacity is reduced to about 15 vehicles per km per lane. Once vehicles slow down due to
an increased density, traffic jams will propagate, as a following car tends to brake more than
the vehicle ahead. This phase transition of “stable” to “unstable” flow in traffic depends on
the desired speed. Thus, to maximize flow, the optimal speed of a highway will depend on
the current density. However, the maximum flow lies at the tipping point, and thus a small
perturbation can trigger stop-and-go waves which can reduce the highway capacity by 30%.
A similar consideration applies to over-taking maneuvers (Kesting et al., 2007). Pushy
drivers might force cars in the neighboring lane to slow down when changing lanes to overtake
another car, while patient drivers would not do this. As a consequence, pushy drivers may
cause a disruption of metastable traffic flow, which may trigger a breakdown (“capacity
drop”). Consequently, patient drivers will avoid or delay a breakdown of traffic flow, thereby
managing to progress faster on average. One may also formulate this in game theoretical
terms. When traffic flow is metastable, drivers are faced with a social dilemma situation:
choosing a patient behavior will be beneficial for everyone, while pushy behavior will produce
small individual advantages at the cost of other drivers. As a consequence, a “tragedy of
the commons” results: pushy drivers undermine the stability of the metastable traffic flow,
causing congestion that forces everyone to spend more time on travel.
A complementary phenomenon is observed in Braess’s paradox (Braess et al., 2005; Steinberg and Zangw
1983), where adding roads can reduce the flow capacity of a road network.
2.4
Traffic light control
The SIF effect is also found in further systems such as urban traffic light control (Helbing and Mazloumian,
2009). Here, a first-come-first-serve approach works only well at low traffic volumes. Otherwise, forcing vehicles to wait for some time can speed up their overall progress. The
reason is that this will produce vehicle platoons, such that a green light will efficiently serve
many vehicles in a short time period (Gershenson, 2005; Gershenson and Rosenblueth, 2012;
Zubillaga et al., 2014). Similarly, it may be better to switch traffic lights less frequently, because switching reduces service times (due to time lost on amber lights). A “green wave”,
i.e., a coordination of vehicle flows such that several successive traffic lights can be passed
without stopping, is another good example demonstrating that waiting (at a red light) may
be rewarding altogether.
3
Similarly interesting observations can be made for self-organized traffic light control
(“self-control”), which based on decentralized flow control (“distributed control”) (Lämmer et al.,
2006; Lämmer and Helbing, 2008, 2010; Helbing, 2013). If each intersection strictly minimizes the travel times of all vehicles approaching it, according to the principle of a “homo
economicus”, this can create efficient traffic flows, when these are low or moderate (“invisible
hand phenomenon”). However, vehicle queues might get out of hand when the intersection
utilization increases. Therefore, it is beneficial to interrupt travel time minimization in order
to clear a vehicle queue when it has grown beyond a certain “critical” limit. This avoids
spillover effects, which would block other intersections and cause a quick spreading of congestion over large parts of a city. Consequently, waiting for a long queue to be cleared can
speed up traffic altogether. Putting it differently, other-regarding self-organization can beat
the selfish optimization à la “homo economicus”, who strictly does the best, but neglects a
coordination with neighbors.
2.5
Logistics and supply chains
Similar phenomena as in urban traffic flows are found in logistic systems and supply chains (Helbing and Läm
2005; Helbing et al., 2006; Seidel et al., 2008; Peters et al., 2008). We have studied, for example, a case of harbor logistics using automated guided vehicles for container transport.
Our proposal was to reduce the speed of these vehicles. This reduced the required safety
distances between vehicles, such that less conflicts of movement occurred, and the automatic
guided vehicles had to wait less. In this way, transportation times could be overall reduced,
even though movement times obviously increased.
We made a similar observation in semiconductor production. So-called “wet benches” are
used to etch structures into silicium wavers, using particular chemical solutions. To achieve
good results, the wavers should stay in the chemical baths longer than a minimum and shorter
than a maximum time period. Therefore, it might happen that several silicium wavers need
to be moved around at about the same time, while a moving gripper, the “handler”, must
make sure to stay within the minimum and maximum times. It turns out that slightly
extending the exposure time in the chemical bathes enables much better coordination of the
movement processes, thereby reaching a 30 percent higher throughput.
In a third logistics project, the throughput of a packaging plant had to be increased.
One of the central production machines of this plant frequently broke down, such that it
was operated at full speed whenever it was operating well. However, this filled the buffer
of the production plant to an extent that made its operation inefficient. This effect can be
understood with queuing theory, according to which cycle times can dramatically increase
as the capacity of a buffer is approached.
2.6
Public transport
In public transportation systems, it is desirable to have equal headways between vehicles
such as buses, i.e., to reach regular time separations between vehicles. However, the equal
headway configuration is unstable (Gershenson and Pineda, 2009). Forcing equal headways
minimizes waiting times at stations. Nevertheless, the travel time is not independent of the
waiting time, as equal headways imply idling or leaving some passengers at stations. This is
4
because there is a different demand for each vehicle at each station. Still, self-organization
can be used to regulate the headways adaptively (Gershenson, 2011a). Considering only
local information, vehicles are able to respond adaptively to the immediate demand of each
station. With this method, there is also a SIF effect, as passengers wait more time at a
station, but reach their destination faster once they board a vehicle because there is no
idling necessary to maintain equal headways.
2.7
Social dynamics
Axelrod (Axelrod, 1997) proposed an interesting model of opinion formation. In this model,
agents may change their opinion depending on the opinion of their neighbors. Eventually,
the opinions converge to a stable state. However, if agents switch their opinion too fast,
this might delay convergence (Stark et al., 2008a,b). Thus, there is a SIF effect because
the fastest convergence will not necessarily be obtained with the fastest opinion change. In
this model, there is also a phase transition which is probably related to the optimal opinion
change rate (Vilone et al., 2002). There is also experimental evidence of the SIF effect in
group decisions. While designing new buildings, slowing down the deliberative process of
teams accelerates the design and construction of buildings (Cross et al., 2015).
Extrapolating these results, one may speculate that high-frequency financial trading (Narang,
2013) may also produce a SIF effect, in the sense that trading at the microseconds scale generates price and information fluctuations which could generate market instabilities leading
to crashes and slower economic growth (Easley et al., 2011).
In combinatorial game theory (Siegel, 2013), sometimes the best possible move (e.g. taking a queen in chess) is not necessarily the best move in the long term. In other words,
having the highest possible gain at each move does not give necessarily the best game result (Russell and Norvig, 2003, pp. 163–171).
2.8
Ecology
If a predator consumes its prey too fast, there will be no prey to consume and the predator population will decline. Thus, a “prudent predator” (Slobodkin, 1961; Goodnight et al.,
2008) will actually spread faster than a greedy one. A similar SIF effect applies to parasite/host relationships, where parasites taking too many resources from their host are causing
their own demise (Dunne et al., 2013). Over long timescales, evolution will favor symbiotic
over parasitic relationships, promoting mechanisms for cooperation which can regulate the
interaction between different individuals (Sachs et al., 2004; Virgo et al., 2013).
We can see that the same principle applies to natural resource management, such as
fisheries (Pauly et al., 1998). If catches are excessive, there will not be enough fishes left
to maintain their numbers, and subsequent catches will be poor. It is estimated that apart
from its ecological impact, overfishing has left a void of US$32 billion per year due to reduced catches (Toppe et al., 2012). However, regulating how much fish is caught per year
is complicated. The maximum sustainable yield varies from species to species (Maunder,
2002), so the calculation of the “optimal” yields per year is not at all a trivial task.
5
2.9
Adaptation
Evolution, development, and learning can be seen as different types of adaptation, acting
at different timescales (Aguilar et al., 2014). Also, adaptation can be seen as a type of
search (Downing, 2015). In computational searches, it is known that there needs to be
a balance between “exploration” and “exploitation” (Blum and Roli, 2003). An algorithm
can explore different possible solutions or exploit solutions similar to those already found.
Too much exploration or too much exploitation will lead to longer search times. Too much
breadth (exploration) will only explore slightly different types of solution, while too much
depth (exploitation) might lead to local optima and data overfitting. A key problem is
that the precise balance between exploration (diversification) and exploitation (intensification) depends the precise search space (Wolpert and Macready, 1995, 1997) and timescale
(Gershenson, 2010; Watson et al., 2011).
An example of the SIF was described in biological evolution (Sellis et al., 2011). Haploid
species (with a single copy of their genome, such as bacteria) can adapt faster than diploid
species (with two copies of their genome, such as most plants and animals). Still, in a fastchanging environment, haploids adapt “too fast”, i.e. the population loses genome variation,
while diploids can maintain a diversity. Having such a diversity, diploids can adapt faster to
changes in their environment, as they can begin an evolutionary search from many different
states at once.
In principle, it would be desirable to find a solution as fast as possible, exploiting current
solutions. Still, as mentioned, this might lead to suboptimality (SIF) in evolving new features, optimizing a multidimensional function, or training a neural network. To be efficient,
search should eventually “slow down”, as it is known from “simulated annealing”. As too
much exploration would be suboptimal also, the critical question is how to find the precise
balance to speed up search as much as possible. Computationally, it seems that this question is not reducible (Wolfram, 2002), so we can only know a posteriori the precise balance
for a given problem. Still, finding this balance would be necessary for adiabatic quantum
computation (Farhi et al., 2000; Aharonov et al., 2008), as if the system evolves too fast, the
information is destroyed.
3
Generalization
What do all the above examples have in common? They can be described as complex
dynamical systems composed of many non-linearly interacting components. In the above
cases, the system can have at least two different states: an efficient and an inefficient one.
Unfortunately, the efficient state can be unstable, such that the system will tend to end up
in the inefficient state. In the case of freeway traffic, for example, it is well known that the
most efficient state (with the highest throughput) is unstable, thereby causing the traffic
flow to break down sooner or later (“capacity drop”). To avoid the undesired outcome, the
system components must stay sufficiently away from the instability point, which requires
them to be somewhat slower than they could be, but as a reward they will be able to sustain
a relatively high speed for a long time. If they go faster, the efficient state will break down
and trigger another one that is typically slower. This situation might be characterized as a
6
“tragedy of the commons” (Hardin, 1968).
Even though it might be counterintuitive, the SIF effect occurs in a broad variety of systems. For practical purposes, many systems have a monotonic relation between “inputs” and
“outputs”. This is true for systems that “break” (Ashby, 1947). For example, if temperature
is increased in a constrained gas with a constant volume, pressure rises. Yet, if temperature
increases too much, then the gas container will break, leading to a pressure reduction. Still,
without breaking, many physical and non-physical systems have thresholds, where they become unstable and a phase transition to a different systems state occurs. A typical situation
of many-particle systems is that they may get overloaded and turn dysfunctional through a
cascading effect.
To reduce the SIF effect we can seek to adjust the interactions which cause a reduction
in the system performance (Gershenson, 2011b). The vehicle traffic case offers an interesting
example: when vehicles go too fast (and their density crosses a critical density), their changes
in speed will affect other vehicles, generating an amplification of oscillations, which lead
to stop-and-go traffic and, as a consequence, to a reduced average speed. If vehicles go
slower, then such oscillations can be avoided and the average speed will be higher. The
key here is that the critical speed where traffic flow changes from “laminar” (where FIF)
to “unstable” (where SIF) changes with the density. However, suitably designed adaptive
systems, such as driver assistance systems, can be used to drive systems towards their best
possible performance in their respective context (Gershenson, 2007; Helbing, 2015).
4
Discussion
It could be argued that the SIF effect is overly simplistic, as there is only the requirement
of having two dynamical phases, where one comes with a reduced efficiency after crossing
the phase transition point. Still, as we have presented, the SIF effect shows up in a variety of interesting phenomena at different scales. Thus, we can say that having a better
understanding of the SIF effect can be useful and potentially have a broad impact. A challenge lies in characterizing the nature of the different types of interactions which will reduce
efficiency (Gershenson, 2013).
We can identify the following necessary conditions for the SIF effect:
1. There is an instability (internal or external) in the system.
2. The instability is amplified, sometimes through cascading effects.
3. There is a transition from the unstable to a new stable state which leads to inefficiency.
4. Such a state can be characterized as “overloaded”.
It is worth noting that in some cases, single variables may be stable to perturbations,
but their interactions are the ones that trigger instability. This implies that the SIF in these
cases has to be studied at two scales: the scale of the components and the scale of the system,
as studying components in isolation will not provide enough information to reproduce the
SIF effect.
7
Whether all phenomena with a SIF effect can be described with the same mathematical
framework remains to be seen. We believe this is an avenue of research worth pursuing and
with relevant implications for the understanding of complex systems.
Acknowledgments
We should like to thank Luis Álvarez de Icaza, Jeni Cross, Tom Froese, Marios Kyriazis, Gleb
Oshanin, Sui Phang, Frank Schweitzer, Diamantis Sellis, Simone Severini, Thomas Wisdom,
Héctor Zenil, and two anonymous referees for useful comments. C.G. was supported by
CONACYT projects 212802, 221341, and SNI membership 47907. D.H. was supported by
ERC Advanced Grant MOMENTUM 324247.
References
Aguilar, W., Santamarı́a Bonfil, G., Froese, T., and Gershenson, C. (2014).
The past, present, and future of artificial life. Frontiers in Robotics and AI 1 (8). URL
http://dx.doi.org/10.3389/frobt.2014.00008.
Aharonov, D., Van Dam, W., Kempe, J., Landau, Z., Lloyd, S., and Regev, O.
(2008). Adiabatic quantum computation is equivalent to standard quantum computation.
SIAM review 50 (4): 755–787. URL http://dx.doi.org/10.1137/080734479.
Ashby, W. R. (1947). The nervous system as physical machine: With special reference to the origin of adaptive behavior. Mind 56 (221) (January): 44–59. URL
http://tinyurl.com/aqcmdy.
Axelrod, R. (1997). The dissemination of culture: A model with local convergence
and global polarization. Journal of Conflict Resolution 41 (2): 203–226. URL
http://jcr.sagepub.com/content/41/2/203.abstract.
Blum, C. and Roli, A. (2003). Metaheuristics in combinatorial optimization: Overview
and conceptual comparison. ACM Comput. Surv. 35 (3) (Sept.): 268–308. URL
http://doi.acm.org/10.1145/937503.937505.
Braess, D., Nagurney, A., and Wakolbinger, T. (2005). On a paradox of traffic
planning. Transportation Science 39 (4) (November): 446–450. Translated from the original German: Braess, Dietrich. 1968. Über ein Paradoxon aus der Verkehrsplanung. Unternehmensforschung 12 258–268. URL http://dx.doi.org/10.1287/trsc.1050.0127.
Cross, J. E., Barr, S. K., Putnam, R., Dunbar, B. H., and Plaut, J. M. (2015).
The social network of integrative design. Tech. rep., Institute for the Built Environment,
Colorado State University, Fort Collins, CO, USA.
Downing, K. L. (2015). Intelligence Emerging: Adaptivity and Search in Evolving Neural
Systems. MIT Press, Cambridge, MA, USA.
8
Dunne, J. A., Lafferty, K. D., Dobson, A. P., Hechinger, R. F., Kuris,
A. M., Martinez, N. D., McLaughlin, J. P., Mouritsen, K. N., Poulin,
R., Reise, K., Stouffer, D. B., Thieltges, D. W., Williams, R. J., and
Zander, C. D. (2013).
Parasites affect food web structure primarily through
increased diversity and complexity.
PLoS Biol 11 (6) (06): e1001579.
URL
http://dx.doi.org/10.1371/journal.pbio.1001579.
Easley, D., de Prado, M. M. L., and O’Hara, M. (2011). The microstructure of the “flash crash”: Flow toxicity, liquidity crashes, and the probability of informed trading. The Journal of Portfolio Management 37 (2) (Winter): 118–128. URL
http://dx.doi.org/10.3905/jpm.2011.37.2.118.
Farhi, E., Goldstone, J., Gutmann, S., and Sipser, M. (2000).
tum computation by adiabatic evolution.
Tech. Rep. CTP-2936, MIT.
http://arxiv.org/abs/quant-ph/0001106.
QuanURL
Gershenson, C. (2005). Self-organizing traffic lights. Complex Systems 16 (1): 29–53.
URL http://www.complex-systems.com/pdf/16-1-2.pdf.
Gershenson, C. (2007). Design and Control of Self-organizing Systems. CopIt Arxives,
Mexico. http://tinyurl.com/DCSOS2007. URL http://tinyurl.com/DCSOS2007.
Gershenson, C. (2010). Computing networks: A general framework to contrast neural
and swarm cognitions. Paladyn, Journal of Behavioral Robotics 1 (2): 147–153. URL
http://dx.doi.org/10.2478/s13230-010-0015-z.
Gershenson, C. (2011a).
Self-organization leads to supraoptimal performance in public transportation systems.
PLoS ONE 6 (6): e21469.
URL
http://dx.doi.org/10.1371/journal.pone.0021469.
Gershenson, C. (2011b).
The sigma profile: A formal tool to study organization and its evolution at multiple scales.
Complexity 16 (5): 37–44.
URL
http://arxiv.org/abs/0809.0504.
Gershenson, C. (2013). The implications of interactions for science and philosophy. Foundations of Science 18 (4): 781–790. URL http://arxiv.org/abs/1105.2827.
Gershenson, C. and Pineda, L. A. (2009). Why does public transport not arrive on
time? The pervasiveness of equal headway instability. PLoS ONE 4 (10): e7292. URL
http://dx.doi.org/10.1371/journal.pone.0007292.
Gershenson, C. and Rosenblueth, D. A. (2012).
Self-organizing traffic lights at multiple-street intersections.
Complexity 17 (4): 23–39.
URL
http://dx.doi.org/10.1002/cplx.20392.
Goodnight, C., Rauch, E., Sayama, H., De Aguiar, M. A. M., Baranger,
M., and Bar-yam, Y. (2008). Evolution in spatial predator–prey models and
the “prudent predator”: The inadequacy of steady-state organism fitness and the
9
concept of individual and group selection.
http://dx.doi.org/10.1002/cplx.20209.
Complexity 13 (5):
23–44.
URL
Hardin, G. (1968). The tragedy of the commons. Science 162 (3859): 1243–1248. URL
http://www.sciencemag.org/content/162/3859/1243.abstract.
Helbing, D. (2001). Traffic and related self-driven many-particle systems. Reviews of
modern physics 73 (4): 1067.
Helbing, D. (2013). Economics 2.0: the natural step towards a self-regulating, participatory
market society. Evolutionary and Institutional Economics Review 10 (1): 3–41.
Helbing, D. (2015). Thinking Ahead-Essays on Big Data, Digital Revolution, and Participatory Market Society. Springer.
Helbing, D., Buzna, L., Johansson, A., and Werner, T. (2005). Self-organized
pedestrian crowd dynamics: Experiments, simulations, and design solutions. Transportation science 39 (1): 1–24.
Helbing, D., Farkas, I., and Vicsek, T. (2000a). Simulating dynamical features of
escape panic. Nature 407 (6803): 487–490.
Helbing, D., Farkas, I. J., and Vicsek, T. (2000b).
ing in a driven mesoscopic system.
Phys. Rev. Lett. 84:
http://link.aps.org/doi/10.1103/PhysRevLett.84.1240.
Freezing by heat1240–1243.
URL
Helbing, D. and Huberman, B. A. (1998). Coherent moving states in highway traffic.
Nature 396: 738–740. URL http://dx.doi.org/10.1038/25499.
Helbing, D. and Lämmer, S. (2005). Supply and production networks: from the bullwhip
effect to business cycles. In Networks of Interacting Machines: Production Organization
in Complex Industrial Systems and Biological Cells, D. Armbruster, A. S. Mikhailov, and
K. Kaneko, (Eds.). World Scientific, Singapore, 33–66.
Helbing, D. and Mazloumian, A. (2009).
Operation regimes and sloweris-faster effect in the controlof traffic intersections.
The European Physical
Journal B - Condensed Matter and Complex Systems 70:
257–274.
URL
http://dx.doi.org/10.1140/epjb/e2009-00213-5.
Helbing, D. and Molnár, P. (1995). Social force model for pedestrian dynamics. Physical
review E 51 (5): 4282.
Helbing, D. and Nagel, K. (2004).
The physics of traffic
gional development.
Contemporary Physics 45 (5):
405–426.
http://www.tandfonline.com/doi/abs/10.1080/00107510410001715944.
and
reURL
Helbing, D., Seidel, T., Lämmer, S., and Peters, K. (2006). Self-organization principles in supply networks and production systems. In Econophysics and Sociophysics, B. K.
Chakrabarti, A. Chakraborti, and A. Chatterjee, (Eds.). Wiley, Weinheim, 535–559. URL
http://dx.doi.org/10.1002/9783527610006.ch19.
10
Helbing, D. and Treiber, M. (1998). Jams, waves, and clusters. Science 282 (5396):
2001–2003. URL http://arxiv.org/abs/cond-mat/9812299.
Heliövaara, S., Ehtamo, H., Helbing, D., and Korhonen, T. (2013). Patient and
impatient pedestrians in a spatial game for egress congestion. Phys. Rev. E 87: 012802.
URL http://link.aps.org/doi/10.1103/PhysRevE.87.012802.
Jiang, R., Helbing, D., Shukla, P. K., and Wu, Q.-S. (2006).
Inefficient emergent oscillations in intersecting driven many-particle flows.
Physica A: Statistical Mechanics and its Applications 368 (2): 567 – 574.
URL
http://www.sciencedirect.com/science/article/pii/S0378437106000070.
Kesting, A., Treiber, M., and Helbing, D. (2007). General lane-changing model
MOBIL for car-following models. Transportation Research Record: Journal of the Transportation Research Board 1999 (1): 86–94.
Kirchner,
A., Klüpfel,
H., Nishinari,
K., Schadschneider,
A.,
and Schreckenberg, M. (2003).
Simulation of competitive egress behavior:
comparison with aircraft evacuation data.
Physica A: Statistical Mechanics and its Applications 324 (3–4):
689 – 697.
URL
http://www.sciencedirect.com/science/article/pii/S0378437103000761.
Lämmer, S. and Helbing, D. (2008).
Self-control of traffic lights and vehicle flows in urban road networks.
J. Stat. Mech. 2008: P04019.
URL
http://dx.doi.org/10.1088/1742-5468/2008/04/P04019.
Lämmer, S. and Helbing, D. (2010). Self-stabilizing decentralized signal control of realistic, saturated network traffic. Tech. Rep. 10-09-019, Santa Fe Institute.
Lämmer, S., Kori, H., Peters, K., and Helbing, D. (2006). Decentralised control
of material or traffic flows in networks using phase-synchronisation. Physica A 363 (1)
(April): 39–47. URL http://dx.doi.org/10.1016/j.physa.2006.01.047.
Maunder, M. N. (2002). The relationship between fishing methods, fisheries management
and the estimation of maximum sustainable yield. Fish and Fisheries 3 (4): 251–260.
URL http://dx.doi.org/10.1046/j.1467-2979.2002.00089.x.
Narang, R. K. (2013). High-speed trading. In Inside the Black Box: A Simple Guide
to Quantitative and High-Frequency Trading, 2nd ed. John Wiley & Sons, Inc., Hoboken,
NJ, USA, 243–264. URL http://dx.doi.org/10.1002/9781118662717.ch14.
Pauly, D., Christensen, V., Dalsgaard, J., Froese, R., and Torres, F.
(1998). Fishing down marine food webs. Science 279 (5352): 860–863. URL
http://dx.doi.org/10.1126/science.279.5352.860.
Peters, K., Seidel, T., Lämmer, S., and Helbing, D. (2008). Logistics networks: Coping with nonlinearity and complexity. In Managing Complexity: Insights,
Concepts, Applications, D. Helbing, (Ed.). Springer Berlin Heidelberg, 119–136. URL
http://dx.doi.org/10.1007/978-3-540-75261-5_6.
11
Russell, S. and Norvig, P. (2003). Artificial intelligence: a modern approach, 2nd ed.
Prentice Hall, Upper Saddle River, New Jersey.
Sachs, J. L., Mueller, U. G., Wilcox, T. P., and Bull, J. J. (2004). The evolution of cooperation. The Quarterly Review of Biology 79 (2): pp. 135–160. URL
http://www.jstor.org/stable/10.1086/383541.
Seidel, T., Hartwig, J., Sanders, R. L., and Helbing, D. (2008). An agentbased approach to self-organized production. In Swarm Intelligence: Introduction
and Applications, C. Blum and D. Merkle, (Eds.). Springer, Berlin, 219–252. URL
http://dx.doi.org/10.1007/978-3-540-74089-6_7.
Sellis, D., Callahan, B. J., Petrov, D. A., and Messer, P. W. (2011).
Heterozygote advantage as a natural consequence of adaptation in diploids. Proceedings of the National Academy of Sciences 108 (51): 20666–20671.
URL
http://www.pnas.org/content/108/51/20666.abstract.
Siegel, A. N. (2013). Combinatorial Game Theory. American Mathematical Society.
Slobodkin, L. B. (1961). Growth and Regulation of Animal Populations. Holt, Reinhart
and Winston, New York.
Stanley, H. E. (2000). Non-equilibrium physics: Freezing by heating. Nature 404 (6779)
(04): 718–719. URL http://dx.doi.org/10.1038/35008188.
Stark, H.-U., Tessone, C. J., and Schweitzer, F. (2008a). Decelerating microdynamics can accelerate macrodynamics in the voter model. Phys. Rev. Lett. 101: 018701.
URL http://link.aps.org/doi/10.1103/PhysRevLett.101.018701.
Stark, H.-U., Tessone, C. J., and Schweitzer, F. (2008b). Slower is faster: Fostering
consensus formation by heterogeneous inertia. Advances in Complex Systems 11 (04):
551–563.
Steinberg, R. and Zangwill, W. I. (1983). The prevalence of Braess’ paradox. Transportation Science 17 (3): 301–318. URL http://dx.doi.org/10.1287/trsc.17.3.301.
Toppe, J., Bondad-Reantaso, M., Hasan, M., Josupeit, H., Subasinghe, R., Halwart, M., and James, D. (2012). Aquatic biodiversity for sustainable diets: the role of
aquatic foods in food and nutrition security. In Sustainable diets and biodiversity: directions and solutions for policy, research and action, B. Burlingame and S. Dernini, (Eds.).
FAO, Rome, 94–101. URL http://www.fao.org/docrep/016/i3004e/i3004e.pdf.
Vilone, D., Vespignani, A., and Castellano, C. (2002).
Ordering phase
transition in the one-dimensional axelrod model.
The European Physical Journal B - Condensed Matter and Complex Systems 30 (3):
399–406.
URL
http://dx.doi.org/10.1140/epjb/e2002-00395-2.
12
Virgo, N., Froese, T., and Ikegami, T. (2013). The positive role of parasites in the
origins of life. In Artificial Life (ALIFE), 2013 IEEE Symposium on. IEEE, pp. 1–4. URL
http://dx.doi.org/10.1109/ALIFE.2013.6602424.
Watson, R. A., Mills, R., and Buckley, C. L. (2011). Global adaptation in networks of selfish components: Emergent associative memory at the system scale. Artificial
Life 17 (3) (2015/06/01): 147–166. URL http://dx.doi.org/10.1162/artl_a_00029.
Wolfram, S. (2002).
A New Kind of Sciene.
http://www.wolframscience.com/.
Wolfram Media.
URL
Wolpert, D. H. and Macready, W. G. (1995). No free lunch theorems for search.
Tech. Rep. SFI-WP-95-02-010, Santa Fe Institute. URL http://tinyurl.com/yz274ej.
Wolpert, D. H. and Macready, W. G. (1997). No Free Lunch Theorems for Optimization. IEEE Transactions on Evolutionary Computation 1 (1): 67–82.
Zubillaga, D., Cruz, G., Aguilar, L. D., Zapotécatl, J., Fernández, N.,
Aguilar, J., Rosenblueth, D. A., and Gershenson, C. (2014). Measuring
the complexity of self-organizing traffic lights. Entropy 16 (5): 2384–2407. URL
http://dx.doi.org/10.3390/e16052384.
13
| 9cs.NE
|
Rank 1 deformations of non-cocompact hyperbolic lattices
arXiv:1702.00508v1 [math.GT] 2 Feb 2017
Samuel A. Ballas, Julien Paupert, Pierre Will
February 3, 2017
Abstract
Let X be a negatively curved symmetric space and Γ a non-cocompact lattice in Isom(X). We show that
small, parabolic-preserving deformations of Γ into the isometry group of any negatively curved symmetric
space containing X remain discrete and faithful (the cocompact case is due to Guichard). This applies
in particular to a version of Johnson-Millson bending deformations, providing for all n infnitely many noncocompact lattices in SO(n, 1) which admit discrete and faithful deformations into SU(n, 1). We also produce
deformations of the figure-8 knot group into SU(3, 1), not of bending type, to which the result applies.
1
Introduction
This paper concerns an aspect of the deformation theory of discrete subgroups of Lie groups, namely that of
non-cocompact lattices in rank 1 semisimple Lie groups. More specifically, we consider the following questions,
given a discrete subgroup Γ of a rank 1 Lie group H:
(1) Does Γ admit any deformations in H?
(2) If so, do these deformations have any nice properties (e.g. remain discrete and faithful)?
(3) What if we replace H with a larger Lie group G?
Here we call deformation of Γ in H any continuous 1-parameter family of representations ρt : Γ −→ H (for
t in some interval (−ε, ε)) satisfying ρ0 = ι (the inclusion of Γ in H), and ρt not conjugate to ρt′ for any
t 6= t′ ∈ (−ε, ε). We say that Γ is locally rigid in H if it does not admit any deformations into H.
When H is a semisimple real Lie group without compact factors there are a variety of general local rigidity
results which we now outline. Weil proved in [W] that Γ is locally rigid in H if H/Γ is compact and H not locally
isomorphic to SL(2, R). Garland and Raghunathan extended this result to the case where Γ is a non-cocompact
lattice in a rank 1 semisimple group H not locally isomorphic to SL(2, R) or SL(2, C) (Theorem 7.2 of [GR]).
The exclusion of SL(2, R) and SL(2, C) is necessary. Generically, lattices in H = SL(2, R) admit many
deformations in H. The identification of PSL(2, R) with Isom+ (H2R ) allow us to relate lattices in SL(2, R) with
hyperbolic structures which are in turn parameterized by the classical Teichmüller space when Γ is a surface
group. The case of quasi-Fuchsian deformations of a discrete subgroup Γ of H = SL(2, R) into G = SL(2, C)
is also classical, well-studied, and well understood by the Bers simultaneous uniformization theorem [Bers]. In
this setting, PSL(2, C) can be identified with Isom+ (H3R ) and the discrete group Γ ⊂ SL(2, C) gives rise to a
hyperbolic structure on the manifold M ∼
= Σ × R, where Σ is a hyperbolic surface. Deforming Γ in SL(2, C)
corresponds to deforming the hyperbolic structure on M . Such deformations are abundant and according the
Bers simultaneous uniformization can be parameterized by a cartesian product of two copies of the classical
Teichmüller space of the surface Σ. Notice that the existence of deformations into G does not violate Weil’s
result as G/Γ is not compact. This situation can be generalized to the case where H = SO0 (n, 1) ∼
= Isom+ (HnR )
+
0
n+1
∼
and G = SO (n + 1, 1) = Isom (HR ). In this setting, a lattice Γ in H gives rise to a hyperbolic structure on
M = HnR /Γ. Again, regarding Γ as a subgroup of SO0 (n + 1, 1) gives rise to a hyperbolic structure on M × R and
deformations of Γ into G correspond to deforming this hyperbolic structure. In this more general setting there
is no general theorem that guarantees the existence of deformations of Γ into G. However, when n = 3 this
deformation problem has been studied by Scannell [Sc], Bart–Scannell [BSc], and Kapovich [Kap] who prove
some rigidity results.
1
Returning to the 3-dimensional case, many non-cocompact lattices Γ in H = SL(2, C) ∼
= SO0 (3, 1) are known
to admit deformations into H. In particular, when Γ is torsion-free Thurston showed that for each cusp there
exists a (real) 2-dimensional family of deformations of Γ into H, called Dehn surgery deformations (see Section
5.8 of [T]). Geometrically, in each of these families the commuting pair of parabolic isometries generating the
correspdonding cusp group is deformed to a pair of loxodromic isometries sharing a common axis. In particular
these deformations are all non-discrete or non-faithful. If H3R /Γ is an orbifold then the existence of deformations
depends more subtly on the topology of the cusp cross-sections.
Another case of interest in the context of deformations of geometric structures is that of projective deformations of hyperbolic lattices, i.e. deformations of lattices Γ of H = SO(n, 1) into G = SL(n + 1, R). When Γ is a
torsion-free cocompact lattice in SO(n, 1) such that the hyperbolic manifold M = HnR /Γ contains an embedded
totally geodesic hypersurface Σ, Johnson and Millson showed in [JM] that Γ admits a 1-parameter family of
deformations into SL(n + 1, R). They obtained these deformations, called bending deformations of M along
Σ, by introducing an algebraic version of Thurston’s bending deformations of a hyperbolic 3-manifold along a
totally geodesic surface. This algebraic version is very versatile, and can be generalized in a variety of ways. For
example, the hypothesis that M is compact may be dropped, see [BM]. Furthermore, the construction can be
applied to the setting of other Lie groups and will provide us with a rich source of examples that are discussed
in Section 4. In addition to deformations constructed via bending there are also instances of projective deformations that do not arise via the previously mentioned bending technique (see [B1, B2, BDL]). On the other hand,
despite the existence of these bending examples, empirical evidence complied by Cooper–Long–Thistlethwaite
[CLTII] suggests that the existence of deformations into SL(4, R) is quite rare for closed hyperbolic 3-manifolds.
In another direction, complex hyperbolic quasi-Fuchsian deformations of Fuchsian groups have also been
extensively studied (see e.g. [S2], the survey [PP] and references therein). With the above notation, this concerns
deformations of discrete subgroups Γ of H into G, with (H, G) = (SO(2, 1), SU(2, 1)) or (SU(1, 1), SU(2, 1)).
(Recall that the Lie groups SL(2, R), SO(2, 1), SU(1, 1) are all isomorphic, up to index 2). It turns out that for
any n > 2, by work of Cooper–Long–Thistlethwaite [CLT] there is an intricate relationship between projective
deformations and complex hyperbolic deformations of finitely generated subgroups Γ of SO(n, 1), based on the
fact that the Lie algebras of SL(n + 1, R) and SU(n, 1) are isomorphic as modules over the SO(n, 1) group ring.
Specifically, they prove:
Theorem 1.1 ([CLT]) Let Γ be a finitely generated group, and let ρ : Γ −→ SO0 (n, 1) be a smooth point of
the representation variety Hom(Γ, SL(n + 1, R)). Then ρ is also a smooth point of Hom(Γ, SU(n, 1)), and near
ρ the real dimensions of Hom(Γ, SL(n + 1, R)) and Hom(Γ, SU(n, 1)) are equal.
The primary motivation for this article is to construct examples of complex hyperbolic deformations of real
hyperbolic lattices that have nice algebraic and geometric properties. Our main result can be roughly described
as providing a sufficient condition for a deformation of a lattice Γ in H into G to continue to be faithful and
have discrete image. In what follows, the condition of being parabolic-preserving roughly means that parabolic
elements remain parabolic, see Definition 2.1 for a more precise statement.
Theorem 1.2 Let X be a negatively curved symmetric space, S a totally geodesic subspace of X and denote
G = Isom(X), H = StabG (S). Let Γ be a non-cocompact lattice in H, and let ι denote the inclusion of Γ into
G. Then any parabolic-preserving representation ρ : Γ −→ G sufficiently close to ι is discrete and faithful.
Remarks:
1. The Dehn surgery deformations of non-cocompact lattices in SO(3, 1) described above are either indiscrete
or non-faithful, showing the necessity of the parabolic-preserving assumption in general.
2. It was pointed out to us by Elisha Falbel that Theorem 1.2 still holds, with the same proof, under the
weaker hypothesis that Γ is a subgroup of a non-cocompact lattice in H, with no global fixed point in S.
If Γ is not itself a lattice, this is equivalent in this context (see [CG]) to saying that Γ is a thin subgroup
of that lattice, i.e. an infinite-index subgroup with the same Zariski-closure as the lattice.
3. When Γ is a cocompact lattice in H the result is a consequence of the following result of Guichard, as Γ
is then convex-cocompact in G.
2
Theorem 1.3 ([Gui]) Let G be a semisimple Lie group with finite center, H a rank 1 subgroup of G, Γ a
finitely generated discrete subgroup of H and denote ι : Γ −→ G the inclusion map. If Γ is convex-cocompact
then ι has a neighborhood in Hom(Γ, G) consisting entirely of discrete and faithful representations.
We prove Theorem 1.2 in section 2, then apply it in Section 3 to a family of deformations of the figure-8
knot group Γ8 < SO(3, 1) into SU(3, 1). Denoting Γ8 = π1 (S 3 \ K8 ) (where K8 is the figure-8 knot), and
ρhyp : Γ8 −→ SO(3, 1) its hyperbolic representation, i.e. the holonomy representation of the complete hyperbolic
structure on S 3 \ K8 , we obtain:
Theorem 1.4 Let Γ8 be the figure-8 knot group and ρhyp : Γ8 −→ SO(3, 1) its hyperbolic representation. Then
there exists a 1-parameter family of discrete, faithful deformations of ρhyp into SU(3, 1).
In Section 4 we apply Theorem 1.2 to a variation of the Johnson-Millson bending deformations, to obtain
the following result. As above, given a finite-volume hyperbolic manifold M = HnR /Γ, we call hyperbolic representation of Γ = π1 (M ) the holonomy representation into SO(n, 1) of the complete hyperbolic structure on M .
(This is well-defined up to conjugation by Mostow rigidity).
Theorem 1.5 For any n > 3 there exist infinitely many non-commensurable cusped hyperbolic n-manifolds
whose corresponding hyperbolic representation admits a 1-parameter family of discrete, faithful deformations
into SU(n, 1).
Here, two groups Γ, Γ′ ⊂ H are commensurable (in the wide sense) if Γ ∩ gΓ′ g −1 has finite index in both Γ
and gΓ′ g −1 for some g ∈ H. The incommensurability conclusion ensures that in each dimension n the manifolds
in Theorem 1.5 are quite distinct in the sense that they are not obtained by taking covering spaces of a single
example.
2
Discreteness and faithfulness of parabolic-preserving deformations
In this section we prove Theorem 1.2, stated in the introduction. Our strategy of proof in the non-compact
case is to use invariant horospheres, more precisely a variation of what Schwartz ([S1]) called ρ(Γ)-invariant
neutered space, see Definition 2.2 below.
From E. Cartan’s classification of real semisimple Lie groups, any negatively curved symmetric space is a
hyperbolic space HnK , with K = R, C, H or O (and n > 2 if K = R, n = 2 if K = O). We refer the reader to
[CG] for general properties of these spaces and their isometry groups. In particular isometries of such spaces
are roughly classified into the following 3 types: elliptic (having a fixed point in X), parabolic (having no fixed
point in X and exactly one on ∂∞ X) or loxodromic (having no fixed point in X and exactly two on ∂∞ X). For
our purposes we will need to distinguish between elliptic isometries with an isolated fixed point in X, which we
call single-point elliptic and elliptic isometries having boundary fixed points, which we call boundary elliptic.
Definition 2.1 Let X be a negatively curved symmetric space, G = Isom(X), and Γ a subgroup of G. A
representation ρ : Γ −→ G is called parabolic-preserving if for every parabolic (resp. boundary elliptic) element
γ ∈ Γ, ρ(γ) is again parabolic (resp. boundary elliptic).
Remark 2.1 If Γ∞ is a parabolic subgroup of Γ (i.e. a subgroup fixing a point on ∂∞ X), then any parabolicpreserving representation of Γ is faithful on Γ∞ . Indeed, all elements of Γ∞ \ {Id} are parabolic or boundary
elliptic.
Lemma 2.1 Let Γ be a discrete subgroup of G containing a parabolic element P ; denote q∞ = Fix(P ) ∈ ∂∞ X
and Γ∞ = StabΓ (q∞ ). Then, for any parabolic-preserving representation ρ : Γ −→ G, ρ(Γ∞ ) preserves each
horosphere based at Fix(ρ(P )).
Proof. It is well known that first, parabolic and boundary elliptic isometries with fixed point q∞ ∈ ∂∞ X
preserve each horosphere based at q∞ and secondly, in a discrete group of hyperbolic isometries, loxodromic
and parabolic elements cannot have a common fixed point. Therefore Γ∞ consists of parabolic and possibly
boundary elliptic isometries, and likewise for ρ(Γ∞ ) if ρ is parabolic-preserving. The only thing that remains
3
to be seen is that for any Q ∈ Γ∞ and parabolic-preserving representation ρ : Γ −→ G, ρ(Q) fixes Fix(ρ(P )).
This follows from the fact that pairs of isometries having a common fixed boundary point can be characterized
algebraically. Namely, by the assumption that P is parabolic, P and Q have a common fixed boundary point if
and only if the group hP, Qi is virtually nilpotent. This property is preserved by any representation of Γ.
Definition 2.2 Let X be a negatively curved symmetric space, G = Isom(X), Γ a subgroup of G and Γ∞ a
subgroup of Γ. We say that a (closed) horoball H∞ in X is (Γ, Γ∞ )-consistent if the following conditions hold:
(1) γH∞ = H∞ for all γ ∈ Γ∞ , and
(2) γH∞ ∩ H∞ = ∅ for all γ ∈ Γ \ Γ∞ .
Definition 2.3 Given two disjoint horoballs H1 , H2 in X, we call orthogeodesic for the pair {H1 , H2 } the
unique geodesic segment with endpoints in the boundary horospheres ∂H1 , ∂H2 and perpendicular to these horospheres; note that it is is the unique distance-minimizing geodesic segment between H1 and H2 . We will call the
set of points of ∂H1 which are endpoints of a geodesic ray perpendicular to ∂H1 and intersecting H2 the shadow
of H2 on H1 .
Remark 2.2 Since the geodesics othogonal to ∂H1 are exactly those geodesics having the vertex v1 of H1 as
an endpoint, the shadow of H2 on H1 is the intersection with ∂H1 of the geodesic cone over H2 from v1 .
Lemma 2.2 Given two disjoint horoballs H1 , H2 with orthogeodesic [x1 , x2 ], the shadow of H2 on H1 is the
intersection with ∂H1 of a closed ball centered at x1 .
Proof. Note that any isometry fixing the geodesic (x1 , x2 ) pointwise preserves H1 and H2 , hence the shadow
of H2 on H1 has rotational symmetry around x1 . The statement follows by observing that this shadow is closed,
bounded, and has non-empty-interior, which is clear in the upper half-space model of HnR , and the related Siegel
domain models of the other hyperbolic spaces, where horospheres based at the special point ∞ are horizontal
slices of the domain and geodesics through ∞ are vertical lines (see [Go] for the complex case and [KP] for the
quaternionic case).
Proposition 2.1 Let X be a negatively curved symmetric space, G = Isom(X), Γ a discrete subgroup of G
and Γ∞ a subgroup of Γ. Assume that there exists a (Γ, Γ∞ )-consistent horoball H∞ in X such that Γ∞ acts
cocompactly on the horosphere ∂H∞ . Then the set of lengths of orthogeodesics for pairs {H∞ , γH∞ } (with
γ ∈ Γ) is discrete, and each of its values is attained only finitely many times modulo the action of Γ∞ .
Proof. First note that for γ∞ ∈ Γ∞ and γ ∈ Γ\Γ∞ , d(H∞ , γH∞ ) = d(H∞ , γ∞ γH∞ ), and let K be a compact
subset of ∂H∞ whose Γ∞ -orbit covers ∂H∞ . The orbit ΓH∞ is closed, since the single cusp neighborhood
p(H∞ ) = p(ΓH∞ ) is closed in X/Γ (denoting p the projection map X −→ X/Γ), hence so is ΓH∞ \ H∞ . Then
the distance between the compact set K and the closed set ΓH∞ \ H∞ is positive and attained, say by some
point x0 ∈ K and some point in the horoball γ0 H∞ .
We claim that only finitely many Γ∞ -orbits of horospheres in ΓH∞ \ H∞ realize this minimum. To see this,
it suffices to show that any horosphere based at ∞ intersects finitely many Γ∞ -orbits of horospheres in ΓH∞ .
′
′
Fix a horosphere H∞
based at ∞. Consider a horosphere H in ΓH∞ \ H∞ that intersects H∞
, and let BH
′
′
be its shadow on H∞ . By Lemma 2.2, BH is (the intersection with H∞ of) a closed ball. There exists r > 0,
′
depending only on H∞
, such that the radius of BH is at least r. (Indeed r is the radius of the shadow of any
′
horosphere tangent to H∞
.)
Now consider two such horospheres H1 and H2 and assume they are disjoint. Call x1 and x2 the centers
′
of their shadows B1 and B2 on H∞
. We claim that the distance between x1 and x2 is at least r. If not, then
x1 ∈ B2 and x2 ∈ B1 . Consider the geodesic σ1 connecting ∞ to x1 . Since x1 is the center of B1 the intersection
σ1 ∩ H1 is the geodesic ray connecting the highest point on H1 to the endpoint of σ1 which isn’t ∞. As H1 and
H2 are disjoint, σ1 ∩ H2 is a compact geodesic segment contained in σ1 \ (σ1 ∩ H1 ). Permuting the roles of x1
and x2 gives the opposite situation on the geodesic σ2 connecting ∞ to x2 . Now if we move continuously from
4
x1 to x2 along a curve x(t) and consider the associated pencil of geodesics σt connecting ∞ to x(t), we see that
there must be a value of t for which σt ∩ H1 and σt ∩ H2 intersect, contradicting disjointness of H1 and H2 .
′
′
Finally, since K was a compact subset of H∞
whose Γ∞ -translates cover H∞
, for any horosphere H in
′
Γ · H∞ \ H∞ , we can apply an element of Γ∞ that maps the center of BH to a point of K. If H∞
meets
an infinite number of classes in Γ · H∞ we obtain in this way a sequence of distinct points in K, which must
accumulate by compactness of K. But by consistency the corresponding horospheres are disjoint, and the
previous discussion tells us that the distance between the centers of their shadows is uniformly bounded from
below, a contradiction.
The result follows inductively, repeating the argument after removing the first layer of closest horoballs.
Remark 2.3 the hypothesis that the cusp stabilizer acts cocompactly on any horosphere based at the cusp
holds for any non-cocompact lattice. In fact, it holds more generally for any discrete group with a maximal
rank parabolic subgroup.
Proposition 2.2 Let X be a negatively curved symmetric space, S a totally geodesic subspace of X and denote
G = Isom(X), H = StabG (S). If Γ is a non-cocompact lattice in H then for any parabolic-preserving representation ρ : Γ −→ G sufficiently close to the inclusion ι : Γ −→ G, there exists a (ρ(Γ), ρ(Γ∞ ))-consistent horoball,
where Γ∞ is any cusp stabilizer in Γ.
Proof. Since Γ is non-cocompact, it contains a parabolic isometry P . Let as above q∞ = Fix(P ) ∈ ∂∞ S
S
and Γ∞ = StabΓ (q∞ ). Then there exists a horoball H∞
in S, based at q∞ , which is (Γ, Γ∞ )-consistent (this
can be seen by lifting to S an embedded horoball neighborhood of the image of q∞ in the quotient S/Γ, see
S
e.g. Lemma 2.1 of [S1]). Since S is totally geodesic, H∞
is the intersection of S with a horoball H∞ in X
which is (ι(Γ), ι(Γ∞ ))-consistent. Now for any parabolic-preserving representation ρ : Γ −→ G and any γ ∈ Γ∞ ,
ρ(γ)H∞ = H∞ by Lemma 2.1, which is condition (1) of Definition 2.2 for the pair (ρ(Γ), ρ(Γ∞ )). It follows from
Proposition 2.1 that for ρ sufficiently close to ι, the horoballs γH∞ (with γ ∈ Γ \ Γ∞ ) stay disjoint from H∞
as long as some finite subcollection of them do (note that since S is totally geodesic and the horoballs convex,
the distance beween 2 horoballs H∞ and γH∞ based at points of ∂S is given by their distance in S). Hence
condition (2) of Definition 2.2 for the pair (ρ(Γ), ρ(Γ∞ )) holds for ρ sufficiently close to ι.
Proposition 2.3 Let X be a negatively curved symmetric space, denote G = Isom(X) and let Γ be a subgroup
of G without a global fixed point in X. If there exists a (Γ, Γ∞ )-consistent horoball in X for some subgroup Γ∞
of Γ, then Γ is discrete.
Proof. First assume for simplicity that Γ does not preserve any proper totally geodesic subspace of X. Then
Γ is either discrete or dense in G (Corollary 4.5.1 of [CG]). If Γ is dense in G then the orbit of any point of X
is dense in X. But if H∞ is a (Γ, Γ∞ )-consistent horoball, the orbit of any point of H∞ is entirely contained in
ΓH∞ , in which case it cannot be dense in X as ΓH∞ and X \ ΓH∞ both have nonempty interior. Therefore Γ
must be discrete.
Now if Γ does preserve a strict totally geodesic subspace of X, and if S is the minimal such subspace then by
the same argument either Γ is discrete or every orbit of a point of S is dense in S. But the consistent horoball
must be based at a point of ∂∞ S (since it is preserved by all elements of Γ∞ ), hence it intersects S along a
horoball of S and we conclude as before.
Lemma 2.3 Let X be a negatively curved symmetric space, denote G = Isom(X), let Γ be a subgroup of G
and Γ∞ a subgroup of Γ. If ρ : Γ −→ G is a parabolic-preserving representation such that there exists a
(ρ(Γ), ρ(Γ∞ ))-consistent horoball, then ρ is faithful.
Proof. Let γ ∈ Γ \ {Id}. If γ ∈ Γ∞ then ρ(γ) 6= Id by parabolic-preservation, and if γ ∈ Γ \ Γ∞ then
ρ(γ) 6= Id by condition (2) of the definition of (ρ(Γ), ρ(Γ∞ ))-consistent horoball.
Now Theorem 1.2 follows immediately from Propositions 2.2 and 2.3 and Lemma 2.3.
5
3
Deformations of the figure-8 knot group into SU(3, 1)
In this section we construct a family of parabolic-preserving deformations of the hyperbolic representation
of the figure-8 knot group into SU(3, 1). Consider Γ8 = π1 (S 3 \ K8 ) where K8 is the figure-8 knot, and denote
ρhyp : Γ8 −→ SO(3, 1) the holonomy of the complete hyperbolic structure on S 3 \ K8 .
Recall that in the presence of a smoothness hypothesis on the relevant representation varieties, Theorem 1.1
implies that the existence of deformations of ρhyp into SL(4, R) guarantees the existence of deformations of ρhyp
into SU(3, 1). Work of Ballas–Danciger–Lee [BDL] shows that the smoothness hypothesis is guaranteed in the
presence of a cohomological condition. Specifically, they prove the following.
Theorem 3.1 ([BDL]) Let M be an orientable complete finite volume hyperbolic manifold with fundamental
group Γ, and let ρhyp : Γ −→ SO(3, 1) be the holonomy representation of the complete hyperbolic structure. If
M is infinitesimally projectively rigid rel boundary, then ρhyp is a smooth point of Hom(Γ, SL(4, R)) and its
conjugacy class is a smooth point of χ(Γ, SL(4, R)).
Roughly speaking, infinitesimally projectively rigid rel boundary is a cohomological condition that says that a
certain induced map from the twisted cohomology of M into the twisted cohomology of ∂M is an injection. For a
more precise definition, see [HP]. By work of Heusener–Porti [HP], it is known that the figure-8 knot complement
is infinitesimally rigid rel boundary, and so we can apply Theorems 3.1 and 1.1 to produce deformations of ρhyp
into SU(3, 1). However, there is no reason why these representations should be parabolic-preserving, and in
many cases the deformations will not have this property.
Fortunately, work of the first author (see [B1, B2]) provides a family of deformations of ρhyp into SL(4, R)
whose corresponding deformations into SU(3, 1) are parabolic preserving.
Theorem 3.2 ([B1],[B2]) Let Γ8 be the figure-8 knot group. Then there exists a 1-parameter family of discrete,
faithful deformations of ρhyp into SL(4, R).
The construction of this 1-parameter family can be found in [B1] and ultimately constructs a curve ρt of
representations of Γ8 into SL(4, R) containing the hyperbolic representation ρhyp at t = 1/2. In fact, allowing
the parameter t to take complex values gives a 1-complex parameter family of representations into SL(4, C).
Moreover, it turns out that taking 2t to be a unit complex number u gives a 1-parameter family of representations
into SU(3, 1). (The reason for this choice of value of the parameter is that the eigenvalues of one of the peripheral
elements in ρt (Γ8 ) are 1 and a power of 2t, see Section 6 of [B2]).
We now give explicit matrices for the generators and Hermitian form for this family, using the presentation
and notation of Section 6 of [B2]. There, the following presentation of Γ8 was used:
Γ8 = hm, n | mw = wni, where w = [n, m−1 ].
The family of representations ρu : Γ8 −→ SL(4, C) is defined by ρu (m) = Mu and
1 0 1 u/2 − 1
1
0 0
0 1 1
2(1 + ū) 1 0
u/2
Mu =
and Nu =
0 0 1 (u + 1)/2
2
1 1
0 0 0
1
1
1 0
(3.1)
ρu (n) = Nu , where:
0
0
(3.2)
0
1
When |u| = 1, the group ρu (Γ8 ) preserves the Hermitian form Hu on C4 given by H(X, Y ) = X T Ju Ȳ ,
where:
1 + (u + ū)/2
−1 − (u + ū)/2
1+u
−3 − 2(u + ū) − ū2
−1 − (u + ū)/2
1 + (u + ū)/2
−1 − u
1+u
Ju =
(3.3)
1 + ū
−1 − ū
4 + 2(u + ū)
−4 − 2(u + ū)
−3 − 2(u + ū) − u2
1 + ū
−4 − 2(u + ū)
4 + 2(u + ū)
Lemma 3.1 The form Hu has signature (3,1) for all u = eiα with |α| < 2π/3, and signature (2,2) when
α ∈ ±(2π/3, π).
6
Proof. Computing the determinant of Ju gives:
det Ju
= −96 − 83(u + ū) − 53(u2 + ū2 ) − 24(u3 + ū3 ) − 7(u4 + ū4 ) − (u5 + ū5 )
= −96 − 166cos(α) − 106cos(2α) − 48cos(3α) − 14cos(4α) − 2cos(5α)
= −4(cos(α) + 1)2 (2cos(α) + 1)3 .
The latter function of α is negative for |α| < 2π/3, and positive for α ∈ ±(2π/3, π); the result then follows by
noting that Hu has signature (3,1) when u = 1 (corresponding to the hyperbolic representation), and (2,2) for
e.g. u = ±3π/4.
Lemma 3.2 The representations ρu are pairwise non-conjugate in SL(4, C).
Proof. A straightforward computation gives: Tr Mu Nu = 6 + u.
Lemma 3.3 The representations ρu are parabolic-preserving.
Proof. The peripheral subgroup Γ∞ of Γ8 is generated by m and l = wwop = nm−1 n−1 m2 n−1 m−1 n, with
the notation of the presentation (3.1) (see [B1]). Now Mu = ρu (m) is unipotent for all u, and a straightforward
computation (using eg Maple) shows that Lu = ρu (l) is non-diagonalizable (with eigenvalues (u, u, u, ū3)) for
all u, hence parabolic. Since Γ∞ ≃ Z2 , all elements of ρu (Γ∞ ) = hρu (m), ρu (l)i will also remain parabolic for u
in a neighborhood of 1.
The previous result along with Theorem 1.2 has the following immediate corollary
Corollary 3.3 The representations ρu are discrete and faithful for u in some neighborhood of 1 in U(1).
It would be interesting to know how far u can get from 1 before discreteness or faithfulness is lost.
4
Bending deformations
In this section we construct additional examples in arbitrary dimensions, proving Theorem 1.5 stated in the
introduction. We start with a cusped hyperbolic manifold M = HnR /Γ, and ρhyp : Γ −→ SO(n, 1) the hyperbolic
representation of Γ = π1 (M ), i.e. the holonomy representation of the complete hyperbolic structure on M . We
will construct a one-parameter family of representations ρθ : Γ −→ SU(n, 1), (θ ∈ S 1 ) such that ρ0 = ρhyp , using
the bending procedure described by Johnson–Millson ([JM]). Their construction is quite general and allows one
to deform representations in a variety of Lie groups. We briefly outline how to use bending to produce families
of representations in the complex hyperbolic setting.
Define a Hermitian form H on Cn+1 via the formula H(X, Y ) = X T Jn+1 Ȳ where Jn+1 is the diagonal
matrix Diag(1, ..., 1, −1), with signature (n, 1). Using this form we produce a projective model for HnC given by
HnC = {[V ] ∈ CP n | H(V, V ) < 0}
n−1
Using the splitting Cn+1 = C × Cn we can embed HC
into the CP n−1 corresponding to the second factor.
n−1
We will refer to this copy of HC as H0 . Using this embedding we can identify U(n − 1, 1) with the intersection
of SU(n, 1) and the stabilizer of the second factor, and we will refer to this subgroup as U0 (n − 1, 1). It is well
n−1
known that all other copies of HC
inside HnC are isometric to H0 , and similarly, all copies of U(n − 1, 1) inside
SU(n, 1) are conjugate to U0 (n − 1, 1).
Let Cn−1 denote the identity component of the centralizer of U0 (n − 1, 1) in SU(n, 1). Cn−1 is a onedimensional Lie group isomorphic to S 1 and can be written explicitly in block form as
iθ
e
0
Cn−1 = Mθ =
|
θ
∈
R/2πZ
0 e−iθ/n In
7
Let Γ be a lattice in SO(n, 1) ⊂ SU(n, 1); then M = HnR /Γ is a finite volume hyperbolic n-orbifold. For
simplicity, we will assume that Γ is torsion-free and thus M will be a hyperbolic manifold. Suppose that M
contains an embedded orientable totally geodesic hypersurface Σ. By applying a conjugacy of SO(n, 1) we
n−1
n−1
can assume that Σ = HR
/∆ where HR
is thought of as the set of real points of H0 and ∆ is a lattice in
U0 (n − 1, 1) ∩ SO(n, 1).
The hypersurface Σ provides a decomposition of Γ into either an amalgamated free product or an HNN
extension, depending on whether or not Σ is separating. Using this decomposition we can construct a family
ρθ : Γ → SU(n, 1) such that ρ0 = ι, where ι is the inclusion of Γ into SU(n, 1), as follows.
If Σ is separating, then M \Σ consists of two connected components M1 and M2 , with fundamental groups
Γ1 and Γ2 respectively. In this case Γ = Γ1 ∗∆ Γ2 . The group Γ is generated by Γ1 ∪ Γ2 and we define
ι(γ)
γ ∈ Γ1
ρθ (γ) =
Mθ ι(γ)Mθ−1 γ ∈ Γ2
on this generating set. Since Mθ centralizes ∆ we see that the relations coming from the amalgamated
product decomposition are satisfied, and so ρθ : Γ → SU(n, 1) is well defined.
If Σ is non-separating, then M ′ = M \Σ is connected. If we let Γ′ be the fundamental group of M ′ then we
can arrive at the decomposition Γ = Γ′ ∗t . In this case Γ is generated by Γ′ ∪ {t}, where t is a free letter and we
define ρθ on generators as
ι(γ)
γ ∈ Γ′
ρθ (γ) =
Mθ ι(γ) γ = t
Again, since Mθ centralizes ∆ we see that the relations for the HNN extension are satisfied and so ρθ : Γ →
SU(n, 1) is well defined. The representations constructed above are called bending deformations of Γ along ∆,
or just bending deformations if Γ and ∆ are clear from context. By work of Johnson–Millson [JM] this path of
representations is in fact a deformation of ρhyp (i.e. the ρθ are pairwise non-conjugate for small values of θ).
Proof. (proof of Theorem 1.5) We proceed by constructing infinitely many commensurability classes of
cusped hyperbolic manifolds containing totally geodesic hypersurfaces. This is done via a well known arithmetic
construction (see [Ber]). The rough idea is to look at the group, Γ, of integer points of the orthogonal groups
of various carefully selected quadratic forms of signature (n, 1). The quotient M = HnR /Γ will be a cusped
hyperbolic n-orbifold containing a totally geodesic hypersurface. After passing to a carefully selected cover we
can produce our parabolic preserving representations via the bending construction.
We now discuss the details for a specific form and observe that the proof is essentially unchanged if one
ˆ = Γ̂ ∩ U0 (n − 1, 1). The group Γ̂ clearly
selects a different form. Let Γ̂ = SL(n + 1, Z) ∩ SO(n, 1) and let ∆
contains unipotent elements and so we see that M̂ = HnR /Γ̂ is a cusped hyperbolic n-orbifold, which contains
n−1 ˆ
an immersed totally geodesic codimension-1 suborbifold isomorphic to Σ̂ = HR
/∆. By combining work of
Bergeron (Théorème 1 of [Ber]) and McReynolds–Reid–Stover (Proposition 3.1 of [MRS]) we can find finite
ˆ and corresponding manifolds M = Hn /Γ and Σ = Hn−1 /∆ with the
index subgroups Γ ⊂ Γ̂ and ∆ ⊂ ∆
R
R
following properties.
• Γ is torsion-free
• Σ is embedded in M
• M has only torus cusps.
Each M contains the totally geodesic hypersurface Σ along which we can bend to produce a family ρθ of
representations from Γ into SU(n, 1). We now show that the representatons ρθ are parabolic-preserving; then
by Theorem 1.2 the ρθ are discrete and faithful for small values of θ.
Lemma 4.1 The representations ρθ : Γ −→ SU(n, 1) obtained by bending Γ along ∆ are parabolic-preserving.
Proof. By construction, we have arranged that Γ is torsion-free, and so there are no elliptic elements to
consider. Furthermore, the only parabolic elements of Γ correspond to loops in M that are freely homotopic to
one of the torus cusps. We now discuss how such an element is modified when one bends. Let γ be a parabolic
8
element of Γ and let q∞ be its fixed point on ∂∞ HnC . There is a foliation of HnC by horospheres centered at q∞ and
γ preserves this foliation leafwise. Furthermore, leafwise preservation of this foliation characterizes parabolic
isometries of HnC that fix p∞ . Thus it suffices to show that ρθ (γ) preserves this foliation.
Regard γ as a loop in M based at x0 ∈ Σ and lift γ to a path γ̃ in M̃ ⊂ HnC based at x̃0 . Let Σ̃ be the
lift of Σ that contains x̃0 . Each time γ̃ intersects a lift of Σ to HnC (counted with orientation) the holonomy
is modified by composing with a Heisenberg rotation of angle εi θ centered at q∞ that acts as the identity on
Σ̃i . Each of these modifications is by an element of SU(n, 1) that leafwise preserves the foliation of horospheres
centered at q∞ , and so ρθ (γ) also preserves this foliation leafwise, and is thus parabolic. More specifically, if we
Pk
let ε = i=1 εi , then there are two cases. If ε = 0 then ρθ (γ) is a unipotent parabolic which is conjugate to γ.
If ε 6= 0 then ρθ (γ) is an ellipto-parabolic isometry, whose angle of rotation is εθ.
See Apanasov [Ap, §4] for a detailed description in the n = 2 case.
Remark 4.1 It is well known, see [T] or more generally [HT], that the complement in S 3 of the figure-8 knot
does not contain an embedded totally geodesic hypersurface. Therefore, the deformations produced in Theorem
1.4 are distinct from those produced by Theorem 1.5.
References
[Ap]
B. Apanasov; Bending deformations of complex hyperbolic surfaces. J. Reine Angew. Math. 492
(1997), 75–91.
[B1]
S.A. Ballas; Deformations of noncompact projective manifolds. Algebr. Geom. Topol. 14 (2014), no. 5,
2595–2625.
[B2]
S.A. Ballas; Finite volume properly convex deformations of the figure-eight knot. Geom. Dedicata 178
(2015), 49–73.
[BDL] S.A. Ballas, J. Danciger, G.-S. Lee; Convex projective structures on non-hyperbolic three-manifolds.
Preprint 2015, arXiv 1508.0479.
[BL]
S.A. Ballas, D.D. Long; Constructing thin subgroups commensurable with the figure-eight knot group.
Algebr. Geom. Topol. 15 (2015), no. 5, 3011–3024.
[BM]
S.A. Ballas, L. Marquis; Properly convex bending of hyperbolic manifolds. Preprint 2016, arXiv
1609.03046.
[BSc]
A. Bart and K. Scannell; The generalized cuspidal cohomology problem. Canad. J. Math. 58 (2006),
no. 4, 673–690.
[Ber]
N. Bergeron; Premier nombre de Betti et spectre du laplacien de certaines variétés hyperboliques,
Enseign. Math. (2). (2000), 109–137.
[Bers] L. Bers; Simultaneous uniformization, Bull. Amer. Math. Soc. (66). (1960), 94–97.
[CG]
S. Chen, L. Greenberg; Hyperbolic spaces, in Contributions to Analysis. Academic Press, New York
(1974), 49–87.
[CLT] D. Cooper, D.D. Long and M.B. Thistlethwaite; Flexing closed hyperbolic manifolds. Geom. Topol. 11
(2007), 2413–2440.
[CLTII] D. Cooper, D.D. Long and M.B. Thistlethwaite; Computing varieties of representations of hyperbolic
3-manifolds into SL(4, R).. J. of Experimental Math. vol. 15 (2006) pp. 291 – 305.
[GR]
H. Garland, M.S. Raghunathan; Fundamental domains for lattices in (R-)rank 1 semisimple Lie
groups, Ann. of Math. (2) 92 (1970), 279–326.
9
[Go]
W.M. Goldman; Complex Hyperbolic Geometry. Oxford Mathematical Monographs. Oxford University
Press (1999).
[GPS] M. Gromov, I. Piatetski-Shapiro; Non-arithmetic groups in Lobachevsky spaces. Publ. Math. IHES 66
(1987), 93–103.
[Gui]
O. Guichard; Groupes plongés quasi-isométriquement dans un goupe de Lie. Math. Ann. 330 (2004),
no. 2, 331–351.
[HT]
A. Hatcher and W. Thurston; Incompressible surfaces in 2-bridge knot complements. Invent. Math. 79
(1985), no. 2, 225–246.
[HP]
M. Heusener and J. Porti; Infinitesimal projective rigidity under Dehn filling. Geom. Topol. 15 (2011),
no. 4, 2017–2071.
[JM]
D. Johnson and J. Millson; Deformation Spaces Associated to Compact Hyperbolic Manifolds, in
Papers in Honor of G.D. Mostow on His Sixtieth Birthday (Roger Howe, ed.). Birkhäuser, Progress in
Mathematics 67 (1986), 48–106.
[Kap] M. Kapovich; Deformations of representations of discrete subgroups of SO(3, 1). Math. Annalen. 299
(1994), 341–354.
[KP]
I. Kim, J. R. Parker; Geometry of quaternionic hyperbolic manifolds. Math. Proc. Camb. Phil. Soc.
135 (2003), 291–320.
[PP]
J.R. Parker, I.D. Platis; Complex hyperbolic quasi-Fuchsian groups, in: Geometry of Riemann
Surfaces. London Mathematical Society Lecture Notes 368 (2010) 309–355.
[MRS] D.B. McReynolds. and A.W. Reid, and M. Stover; Collisions at infinity in hyperbolic manifolds, Math.
Proc. Cambridge Philos. Soc. (2013), 459–463.
[Sc]
K. Scannell; Local rigidity of hyperbolic 3-manifolds after Dehn surgery. Duke Math. J. 114 (2002),
no. 1, 1–14.
[S1]
R.E. Schwartz; The quasi-isometry classification of rank one lattices. Publ Math. IHES 82 (1995),
133–168.
[S2]
R.E. Schwartz; Complex hyperbolic triangle groups, from: Proceedings of the International Congress of
Mathematicians, Vol. II (Beijing, 2002), Higher Ed. Press, Beijing (2002) 339–349.
[T]
W.P. Thurston; The Geometry and Topology of Three-Manifolds. Electronic version 1.1 (2002).
Available at: http://www.msri.org/publications/books/gt3m/
[W]
A. Weil; Discrete subgroups of Lie groups (II), Ann. of Math. (2) 75 (1962), 578–602.
Samuel Ballas
Department of Mathematics, Florida State University
[email protected]
Julien Paupert
School of Mathematical and Statistical Sciences, Arizona State University
[email protected]
Pierre Will
Institut Fourier, Université de Grenoble I
[email protected]
10
| 4math.GR
|
Published as a conference paper at ICLR 2018
ON
THE IMPORTANCE OF SINGLE DIRECTIONS FOR
GENERALIZATION
arXiv:1803.06959v1 [stat.ML] 19 Mar 2018
Ari S. Morcos1 , David G.T. Barrett, Neil C. Rabinowitz, & Matthew Botvinick
DeepMind
London, UK
{arimorcos,barrettdavid,ncr,botvinick}@google.com
A BSTRACT
Despite their ability to memorize large datasets, deep neural networks often
achieve good generalization performance. However, the differences between the
learned solutions of networks which generalize and those which do not remain
unclear. Additionally, the tuning properties of single directions (defined as the
activation of a single unit or some linear combination of units in response to some
input) have been highlighted, but their importance has not been evaluated. Here,
we connect these lines of inquiry to demonstrate that a network’s reliance on single
directions is a good predictor of its generalization performance, across networks
trained on datasets with different fractions of corrupted labels, across ensembles
of networks trained on datasets with unmodified labels, across different hyperparameters, and over the course of training. While dropout only regularizes this
quantity up to a point, batch normalization implicitly discourages single direction
reliance, in part by decreasing the class selectivity of individual units. Finally,
we find that class selectivity is a poor predictor of task importance, suggesting
not only that networks which generalize well minimize their dependence on individual units by reducing their selectivity, but also that individually selective units
may not be necessary for strong network performance.
1
I NTRODUCTION
Recent work has demonstrated that deep neural networks (DNNs) are capable of memorizing extremely large datasets such as ImageNet (Zhang et al., 2017). Despite this capability, DNNs in practice achieve low generalization error on tasks ranging from image classification (He et al., 2015)
to language translation (Wu et al., 2016). These observations raise a key question: why do some
networks generalize while others do not?
Answers to these questions have taken a variety of forms. A variety of studies have related generalization performance to the flatness of minima and PAC-Bayes bounds (Hochreiter & Schmidhuber,
1997, Keskar et al., 2017, Neyshabur et al., 2017, Dziugaite & Roy, 2017), though recent work
has demonstrated that sharp minima can also generalize (Dinh et al., 2017). Others have focused
on the information content stored in network weights (Achille & Soatto, 2017), while still others
have demonstrated that stochastic gradient descent itself encourages generalization (Bousquet &
Elisseeff, 2002, Smith & Le, 2017, Wilson et al., 2017).
Here, we use ablation analyses to measure the reliance of trained networks on single directions. We
define a single direction in activation space as the activation of a single unit or feature map or some
linear combination of units in response to some input. We find that networks which memorize the
training set are substantially more dependent on single directions than those which do not, and that
this difference is preserved even across sets of networks with identical topology trained on identical
data, but with different generalization performance. Moreover, we found that as networks begin to
overfit, they become more reliant on single directions, suggesting that this metric could be used as a
signal for early stopping.
1
Corresponding author: [email protected]
1
Published as a conference paper at ICLR 2018
We also show that networks trained with batch normalization are more robust to cumulative ablations than networks trained without batch normalization and that batch normalization decreases the
class selectivity of individual feature maps, suggesting an alternative mechanism by which batch
normalization may encourage good generalization performance. Finally, we show that, despite the
focus on selective single units in the analysis of DNNs (and in neuroscience; Le et al., 2011, Zhou
et al., 2014, Radford et al., 2017, Britten et al., 1992), the class selectivity of single units is a poor
predictor of their importance to the network’s output.
2
A PPROACH
In this study, we will use a set of perturbation analyses to examine the relationship between a network’s generalization performance and its reliance upon single directions in activation space. We
will then use a neuroscience-inspired measure of class selectivity to compare the selectivity of individual directions across networks with variable generalization performance and examine the relationship between class selectivity and importance.
2.1
S UMMARY OF MODELS AND DATASETS ANALYZED
We analyzed three models: a 2-hidden layer MLP trained on MNIST, an 11-layer convolutional
network trained on CIFAR-10, and a 50-layer residual network trained on ImageNet. In all experiments, ReLU nonlinearities were applied to all layers but the output. Unless otherwise noted, batch
normalization was used for all convolutional networks (Ioffe & Szegedy, 2015). For the ImageNet
ResNet, top-5 accuracy was used in all cases.
Partially corrupted labels As in Zhang et al. (2017), we used datasets with differing fractions
of randomized labels to ensure varying degrees of memorization. To create these datasets, a given
fraction of labels was randomly shuffled and assigned to images, such that the distribution of labels
was maintained, but any true patterns were broken.
2.2
P ERTURBATION ANALYSES
Ablations We measured the importance of a single direction to the network’s computation by
asking how the network’s performance degrades once the influence of that direction was removed.
To remove a coordinate-aligned single direction , we clamped the activity of that direction to a fixed
value (i.e., ablating the direction). Ablations were performed either on single units in MLPs or an
entire feature map in convolutional networks. For brevity, we will refer to both of these as ‘units.’
Critically, all ablations were performed in activation space, rather than weight space.
More generally, to evaluate a network’s reliance upon sets of single directions, we asked how the network’s performance degrades as the influence of increasing subsets of single directions was removed
by clamping them to a fixed value (analogous to removing increasingly large subspaces within activation space). This analysis generates curves of accuracy as a function of the number of directions
ablated: the more reliant a network is on low-dimensional activation subspaces, the more quickly
the accuracy will drop as single directions are ablated.
Interestingly, we found that clamping the activation of a unit to the empirical mean activation across
the training or testing set was more damaging to the network’s performance than clamping the activation to zero (see Appendix A.1). We therefore clamped activity to zero for all ablation experiments.
Addition of noise As the above analyses perturb units individually, they only measure the influence
of coordinate-aligned single directions. To test networks’ reliance upon random single directions,
we added Gaussian noise to all units with zero mean and progressively increasing variance. To
scale the variance appropriately for each unit, the variance of the noise added was normalized by the
empirical variance of the unit’s activations across the training set.
2.3
Q UANTIFYING CLASS SELECTIVITY
To quantify the class selectivity of individual units, we used a metric inspired by the selectivity indices commonly used in systems neuroscience (De Valois et al., 1982, Britten et al., 1992, Freedman
2
Published as a conference paper at ICLR 2018
Figure 1: Memorizing networks are more sensitive to cumulative ablations. Networks were
trained on MNIST (2-hidden layer MLP, a), CIFAR-10 (11-layer convolutional network, b), and
ImageNet (50-layer ResNet, c). In a, all units in all layers were ablated, while in b and c, only
feature maps in the last three layers were ablated. Error bars represent standard deviation across 10
random orderings of units to ablate.
& Assad, 2006). The class-conditional mean activity was first calculated across the test set, and the
selectivity index was then calculated as follows:
µmax − µ−max
selectivity =
(1)
µmax + µ−max
with µmax representing the highest class-conditional mean activity and µ−max representing the
mean activity across all other classes. For convolutional feature maps, activity was first averaged
across all elements of the feature map. This metric varies from 0 to 1, with 0 meaning that a unit’s
average activity was identical for all classes, and 1 meaning that a unit was only active for inputs of
a single class.
We note that this metric is not a perfect measure of information content in single units; for example,
a unit with a little information about every class would have a low class selectivity index. However,
it does measure the discriminability of classes along a given direction. The selectivity index also
identifies units with the same class tuning properties which have been highlighted in the analysis
of DNNs (Le et al., 2011, Zeiler & Fergus, 2014, Coates et al., 2012, Zhou et al., 2014, Radford
et al., 2017). However, in addition to class selectivity, we replicate all of our results using mutual
information, which, in contrast to class selectivity, should highlight units with information about
multiple classes, and we find qualitively similar outcomes (Appendix A.5). We also note that while
a class can be viewed as a highly abstract feature, implying that our results may generalize to feature
selectivity, we do not examine feature selectivity in this work.
3
E XPERIMENTS
3.1
G ENERALIZATION
Here, we provide a rough intuition for why a network’s reliance upon single directions might be
related to generalization performance. Consider two networks trained on a large, labeled dataset
with some underlying structure. One of the networks simply memorizes the labels for each input
example and will, by definition, generalize poorly (‘memorizing network’) while the other learns
the structure present in the data and generalizes well (‘structure-finding network’). The minimal
description length of the model should be larger for the memorizing network than for the structurefinding network. As a result, the memorizing network should use more of its capacity than the
structure-finding network, and by extension, more single directions. Therefore, if a random single
direction is perturbed, the probability that this perturbation will interfere with the representation of
the data should be higher for the memorizing network than for the structure-finding network2 .
2
Assuming that the memorizing network uses a non-negligible fraction of its capacity.
3
Published as a conference paper at ICLR 2018
a
b
Figure 2: Memorizing networks are more sensitive to random noise. Networks were trained
on MNIST (2-hidden layer MLP, a), and CIFAR-10 (11-layer convolutional network, b). Noise
was scaled by the empirical variance of each unit on the training set. Error bars represent standard
deviation across 10 runs. X-axis is on a log scale.
a
b
Figure 3: Networks which generalize poorly are more reliant on single directions. 200 networks with identical topology were trained on unmodified CIFAR-10. a, Cumulative ablation curves
for the best and worst 5 networks by generalization error. Error bars represent standard deviation
across 5 models and 10 random orderings of feature maps per model. b, Area under cumulative
ablation curve (normalized) as a function of generalization error.
To test whether memorization leads to greater reliance on single directions, we trained a variety of
network types on datasets with differing fractions of randomized labels and evaluated their performance as progressively larger fractions of units were ablated (see Sections 2.2 and 2.1). By definition, these curves must begin at the network’s training accuracy (approximately 1 for all networks
tested) and fall to chance levels when all directions have been ablated. To rule out variance due to
the specific order of unit ablation, all experiments were performed with mutliple random ablation
orderings of units. As many of the models were trained on datasets with corrupted labels and, by
definition, cannot generalize, training accuracy was used to evaluate model performance. Consistent with our intuition, we found that networks trained on varying fractions of corrupted labels were
significantly more sensitive to cumulative ablations than those trained on datasets comprised of true
labels, though curves were not always perfectly ordered by the fraction of corrupted labels (Fig. 1).
We next asked whether this effect was present if networks were perturbed along random bases. To
test this, we added noise to each unit (see Section 2.2). Again, we found that networks trained on
corrupted labels were substantially and consistently more sensitive to noise added along random
bases than those trained on true labels (Fig. 2).
The above results apply to networks which are forced to memorize at least a portion of the training
set – there is no other way to solve the task. However, it is unclear whether these results would
apply to networks trained on uncorrupted data. In other words, do the solutions found by networks
with the same topology and data, but different generalization performance exhibit differing reliance
upon single directions? To test this, we trained 200 networks on CIFAR-10, and evaluated their
generalization error and reliance on single directions. All networks had the same topology and
4
Published as a conference paper at ICLR 2018
were trained on the same dataset (unmodified CIFAR-10). Individual networks only differed in their
random initialization (drawn from identical distributions) and the data order used during training.
We found that the 5 networks with the best generalization performance were more robust to the
ablation of single directions than the 5 networks with the worst generalization performance (Fig. 3a).
To quantify this further, we measured the area under the ablation curve for each of the 200 networks
and plotted it as a function of generalization error (Fig. 3b). Interestingly, networks appeared to
undergo a discrete regime shift in their reliance upon single directions; however, this effect might
have been caused by degeneracy in the set of solutions found by the optimization procedure, and we
note that there was also a negative correlation present within clusters (e.g., top left cluster). These
results demonstrate that the relationship between generalization performance and single direction
reliance is not merely a side-effect of training with corrupted labels, but is instead present even
among sets networks with identical training data.
3.2
R ELIANCE ON SINGLE DIRECTIONS AS A SIGNAL FOR MODEL SELECTION
This relationship raises an intriguing question: can single direction reliance be used to estimate
generalization performance without the need for a held-out test set? And if so, might it be used
as a signal for early stopping or hyperpameter selection? As a proof-of-principle experiment for
early stopping, we trained an MLP on MNIST and measured the area under the cumulative ablation
curve (AUC) over the course of training along with the train and test loss. Interestingly, we found
that the point in training at which the AUC began to drop was the same point that the train and test
loss started to diverge (Fig. 4a). Furthermore, we found that AUC and test loss were negatively
correlated (Spearman’s correlation: -0.728; Fig. 4b).
As a proof-of-principle experiment for hyperparameter selection, we trained 192 CIFAR-10 models
with different hyperparemeter settings (96 hyperparameters with 2 repeats each; see Appendix A.2).
We found that AUC and test accuracy were highly correlated (Spearman’s correlation: 0.914; Fig.
4c), and by performing random subselections of 48 hyperparameter settings, AUC selected one of
the top 1, 5, and 10 settings 13%, 83%, and 98% of the time, respectively, with an average difference
in test accuracy between the best model selected by AUC and the optimal model of only 1 ± 1.1%
(mean ± std). These results suggest that single direction reliance may serve as a good proxy for
hyperparameter selection and early stopping, but further work will be necessary to evaluate whether
these results hold in more complicated datasets.
3.3
R ELATIONSHIP TO DROPOUT AND BATCH NORMALIZATION
Dropout Our experiments are reminiscent of using dropout at training time, and upon first inspection, dropout may appear to discourage networks’ reliance on single directions (Srivastava et al.,
2014). However, while dropout encourages networks to be robust to cumulative ablations up until
the dropout fraction used in training, it should not discourage reliance on single directions past that
point. Given enough capacity, a memorizing network could effectively guard against dropout by
merely copying the information stored in a given direction to several other directions. However, the
network will only be encouraged to make the minimum number of copies necessary to guard against
the dropout fraction used in training, and no more. In such a case, the network would be robust
to dropout so long as all redundant directions were not simultaneously removed, yet still be highly
reliant on single directions past the dropout fraction used in training.
To test whether this intuition holds, we trained MLPs on MNIST with dropout probabilities
∈ {0.1, 0.2, 0.3} on both corrupted and unmodified labels. Consistent with the observation in Arpit
et al. (2017), we found that networks with dropout trained on randomized labels required more
epochs to converge and converged to worse solutions at higher dropout probabilities, suggesting that
dropout does indeed discourage memorization. However, while networks trained on both corrupted
and unmodified labels exhibited minimal loss in training accuracy as single directions were removed
up to the dropout fraction used in training, past this point, networks trained on randomized labels
were much more sensitive to cumulative ablations than those trained on unmodified labels (Fig.
5a). Interestingly, networks trained on unmodified labels with different dropout fractions were all
similarly robust to cumulative ablations. These results suggest that while dropout may serve as an
effective regularizer to prevent memorization of randomized labels, it does not prevent over-reliance
on single directions past the dropout fraction used in training.
5
Published as a conference paper at ICLR 2018
a
b
c
Figure 4: Single direction reliance as a signal for hyperparameter selection and early stopping.
a, Train (blue) and test (purple) loss, along with the normalized area under the cumulative ablation
curve (AUC; green) over the course of training for an MNIST MLP. Loss y-axis has been cropped
to make train/test divergence visible. b, AUC and test loss for a CIFAR-10 ConvNet are negatively
correlated over the course of training. c, AUC and test accuracy are positively corrleated across a
hyperparameter sweep (96 hyperparameters with 2 repeats for each).
a
b
Figure 5: Impact of regularizers on networks’ reliance upon single directions. a, Cumulative
ablation curves for MLPs trained on unmodified and fully corrupted MNIST with dropout fractions
∈ {0.1, 0.2, 0.3}. Colored dashed lines indicate number of units ablated equivalent to the dropout
fraction used in training. Note that curves for networks trained on corrupted MNIST begin to drop
soon past the dropout fraction with which they were trained. b, Cumulative ablation curves for
networks trained on CIFAR-10 with and without batch normalization. Error bars represent standard
deviation across 4 model instances and 10 random orderings of feature maps per model.
6
Published as a conference paper at ICLR 2018
a
b
Figure 6: Batch normalization decreases class selectivity and increases mutual information.
Distributions of class selectivity (a) and mutual information (b) for networks trained with (blue)
and without batch normalization (purple). Each distribution comprises 4 model instances trained on
uncorrupted CIFAR-10.
Batch normalization In contrast to dropout, batch normalization does appear to discourage reliance upon single directions. To test this, we trained convolutional networks on CIFAR-10 with and
without batch normalization and measured their robustness to cumulative ablation of single directions. Networks trained with batch normalization were consistently and substantially more robust to
these ablations than those trained without batch normalization (Fig. 5b). This result suggests that in
addition to reducing covariate shift, as has been proposed previously (Ioffe & Szegedy, 2015), batch
normalization also implicitly discourages reliance upon single directions.
3.4
R ELATIONSHIP BETWEEN CLASS SELECTIVITY AND IMPORTANCE
Our results thus far suggest that networks which are less reliant on single directions exhibit better
generalization performance. This result may appear counter-intuitive in light of extensive past work
in both neuroscience and deep learning which highlights single units or feature maps which are
selective for particular features or classes (Le et al., 2011, Zeiler & Fergus, 2014, Coates et al.,
2012, Zhou et al., 2014, Radford et al., 2017). Here, we will test whether the class selectivity of
single directions is related to the importance of these directions to the network’s output.
First, we asked whether batch normalization, which we found to discourage reliance on single directions, also influences the distribution of information about class across single directions. We
used the selectivity index described above (see Section 2.3) to quantify the discriminability between
classes based on the activations of single feature maps across networks trained with and without
batch normalization. Interestingly, we found that while networks trained without batch normalization exhibited a large fraction of feature maps with high class selectivity3 , the class selectivity of
feature maps in networks trained with batch normalization was substantially lower (Fig. 6a). In contrast, we found that batch normalization increases the mutual information present in feature maps
(Fig. 6b). These results suggest that batch normalization actually discourages the presence of feature maps with concentrated class information and rather encourages the presence of feature maps
with information about multiple classes, raising the question of whether or not such highly selective
feature maps are actually beneficial.
We next asked whether the class selectivity of a given unit was predictive of the impact on the
network’s loss of ablating said unit. Since these experiments were performed on networks trained
on unmodified labels, test loss was used to measure network impact. For MLPs trained on MNIST,
we found that there was a slight, but minor correlation (Spearman’s correlation: 0.095) between
a unit’s class selectivity and the impact of its ablation, and that many highly selective units had
minimal impact when ablated (Fig. 7a). By analyzing convolutional networks trained on CIFAR-10
and ImageNet, we again found that, across layers, the ablation of highly selective feature maps was
no more impactful than the ablation of non-selective feature maps (Figs. 7b and 7d). In fact, in the
CIFAR-10 networks, there was actually a negative correlation between class selectivity and feature
map importance (Spearman’s correlation: -0.428, Fig. 7b). To test whether this relationship was
depth-dependent, we calculated the correlation between class selectivity and importance separately
for each layer, and found that the vast majority of the negative correlation was driven by early
3
And dead feature maps. Feature maps with no activity would have a selectivity index of 0.
7
Published as a conference paper at ICLR 2018
CIFAR-10 ConvNet
MNIST MLP
a
b
c
ImageNet ResNet
d
e
Figure 7: Selective and non-selective directions are similarly important. Impact of ablation
as a function of class selectivity for MNIST MLP (a), CIFAR-10 convolutional network (b-c), and
ImageNet ResNet (d-e). c and e show regression lines for each layer separately.
layers, while later layers exhibited no relationship between class selectivity and importance (Figs.
7c and 7e). Interestingly, in all three networks, ablations in early layers were more impactful than
ablations in later layers, consistent with theoretical observations (Raghu et al., 2016). Additionally,
we performed all of the above experiments with mutual information in place of class selectivity, and
found qualitatively similar results (Appendix A.5).
As a final test, we compared the class selectivity to the L1 -norm of the filter weights, a metric
which has been found to be a successful predictor of feature map importance in the model pruning
literature (Li et al., 2017). Consistent with our previous observations, we found that class selectivity
was largely unrelated to the L1 -norm of the filter weights, and if anything, the two were negatively
correlated (Fig. A3, see Appendix A.4 for details). Taken together, these results suggest that class
selectivity is not a good predictor of importance, and imply that class selectivity may actually be
detrimental to network performance. Further work will be necessary to examine whether class
and/or feature selectivity is harmful or helpful to network performance.
4
R ELATED WORK
Much of this work was directly inspired by Zhang et al. (2017), and we replicate their results using
partially corrupted labels on CIFAR-10 and ImageNet. By demonstrating that memorizing networks
are more reliant on single directions, we also provide an answer to one of the questions they posed:
is there an empirical difference between networks which memorize and those which generalize?
Our work is also related to work linking generalization and the sharpness of minima (Hochreiter
& Schmidhuber, 1997, Keskar et al., 2017, Neyshabur et al., 2017). These studies argue that flat
minima generalize better than sharp minima (though Dinh et al. (2017) recently found that sharp
minima can also generalize well). This is consistent with our work, as flat minima should correspond
to solutions in which perturbations along single directions have little impact on the network output.
Another approach to generalization has been to contextualize it in information theory. For example, Achille & Soatto (2017) demonstrated that networks trained on randomized labels store more
8
Published as a conference paper at ICLR 2018
information in their weights than those trained on unmodfied labels. This notion is also related to
Shwartz-Ziv & Tishby (2017), which argues that during training, networks proceed first through a
loss minimization phase followed by a compression phase. Here again, our work is consistent, as
networks with more information stored in their weights (i.e., less compressed networks) should be
more reliant upon single directions than compressed networks.
More recently, Arpit et al. (2017) analyzed a variety of properties of networks trained on partially
corrupted labels, relating performance and time-to-convergence to capacity. They also demonstrated
that dropout, when properly tuned, can serve as an effective regularizer to prevent memorization.
However, we found that while dropout may discourage memorization, it does not discourage reliance
on single directions past the dropout probability.
We found that class selectivity is a poor predictor of unit importance. This observation is consistent
with a variety of recent studies in neuroscience. In one line of work, the benefits of neural systems
which are robust to coordinate-aligned noise have been explored (Barrett et al. (2016), Montijn
et al. (2016)). Another set of studies have demonstrated the presence of neurons with multiplexed
information about many stimuli and have shown that task information can be decoded with high
accuracy from populations of these neurons with low individual class selectivity (Averbeck et al.
(2006), Rigotti et al. (2013), Mante et al. (2013), Raposo et al. (2014), Morcos & Harvey (2016),
Zylberberg (2017)).
Perturbation analyses have been performed for a variety of purposes. In the model pruning literature, many studies have removed units with the goal of generating smaller models with similar
performance (Li et al., 2017, Anwar et al., 2015, Molchanov et al., 2017), and recent work has explored methods for discovering maximally important directions (Raghu et al. (2017)). A variety of
studies within deep learning have highlighted single units which are selective for features or classes
(Le et al., 2011, Zeiler & Fergus, 2014, Coates et al., 2012, Zhou et al., 2014, Radford et al., 2017,
Agrawal et al., 2014). Additionally, Agrawal et al. (2014) analyzed the minimum number of sufficient feature maps (sorted by a measure of selectivity) to achieve a given accuracy. However, none of
the above studies has tested the relationship between a unit’s class selectivity or information content
and its necessity to the network’s output.
Bau et al. (2017) have quantified a related metric, concept selectivity, across layers and networks,
finding that units get more concept-selective with depth, which is consistent with our own observations regarding class selectivity (see Appendix A.3). However, they also observed a correlation
between the number of concept-selective units and performance on the action40 dataset across networks and architectures. It is difficult to compare these results directly, as the data used are substantially different as is the method of evaluating selectivity. Nevertheless, we note that Bau et al.
(2017) measured the absolute number of concept-selective units across networks with different total
numbers of units and depths. The relationship between the number of concept-selective units and
network performance may therefore arise as a result of a larger number of total units (if a fixed fraction of units is concept-selective) and increased depth (we both observed that selectivity increases
with depth).
5
D ISCUSSION AND FUTURE WORK
In this work, we have taken an empirical approach to understand what differentiates neural networks which generalize from those which do not. Our experiments demonstrate that generalization
capability is related to a network’s reliance on single directions, both in networks trained on corrupted and uncorrupted data, and over the course of training for a single network. They also show
that batch normalization, a highly successful regularizer, seems to implicitly discourage reliance on
single directions.
One clear extension of this work is to use these observations to construct a regularizer which more
directly penalizes reliance on single directions. As it happens, the most obvious candidate to regularize single direction reliance is dropout (or its variants), which, as we have shown, does not appear
to regularize for single direction reliance past the dropout fraction used in training (Section 3.3).
Interestingly, these results suggest that one is able to predict a network’s generalization performance
without inspecting a held-out validation or test set. This observation could be used in several interesting ways. First, in situations where labeled training data is sparse, testing networks’ reliance on
single directions may provide a mechanism to assess generalization performance without sacrific9
Published as a conference paper at ICLR 2018
ing training data to be used as a validation set. Second, by using computationally cheap empirical
measures of single direction reliance, such as evaluating performance at a single ablation point or
sparsely sampling the ablation curve, this metric could be used as a signal for early-stopping or
hyperparameter selection. We have shown that this metric is viable in simple datasets (Section 3.2),
but further work will be necessary to evaluate viability in more complicated datasets.
Another interesting direction for further research would be to evaluate the relationship between single direction reliance and generalization performance across different generalization regimes. In this
work, we evaluate generalization in which train and test data are drawn from the same distribution,
but a more stringent form of generalization is one in which the test set is drawn from a unique, but
overlapping distribution with the train set. The extent to which single direction reliance depends on
the overlap between the train and test distributions is also worth exploring in future research.
This work makes a potentially surprising observation about the role of individually selective units in
DNNs. We found not only that the class selectivity of single directions is largely uncorrelated with
their ultimate importance to the network’s output, but also that batch normalization decreases the
class selectivity of individual feature maps. This result suggests that highly class selective units may
actually be harmful to network performance. In addition, it implies than methods for understanding
neural networks based on analyzing highly selective single units, or finding optimal inputs for single
units, such as activation maximization (Erhan et al., 2009) may be misleading. Importantly, as we
have not measured feature selectivity, it is unclear whether these results will generalize to featureselective directions. Further work will be necessary to clarify all of these points.
ACKNOWLEDGMENTS
We would like to thank Chiyuan Zhang, Ben Poole, Sam Ritter, Avraham Ruderman, and Adam
Santoro for critical feedback and helpful discussions.
R EFERENCES
Alessandro Achille and Stefano Soatto. On the Emergence of Invariance and Disentangling in Deep
Representations. pp. 1–17, 2017. URL http://arxiv.org/abs/1706.01350.
Pulkit Agrawal, Ross B Girshick, and Jitendra Malik. Analyzing the Performance of Multilayer
Neural Networks for Object Recognition. Eccv, 2014.
Guillaume Alain and Yoshua Bengio. Understanding intermediate layers using linear classifier
probes. (2003):1–11, 2016. URL http://arxiv.org/abs/1610.01644.
Sajid Anwar, Kyuyeon Hwang, and Wonyong Sung. Structured Pruning of Deep Convolutional
Neural Networks. 2015.
Devansh Arpit, Stanisław Jastrzȩbski, Nicolas Ballas, David Krueger, Emmanuel Bengio, Maxinder S. Kanwal, Tegan Maharaj, Asja Fischer, Aaron Courville, Yoshua Bengio, and Simon
Lacoste-Julien. A Closer Look at Memorization in Deep Networks. 2017. ISSN 1938-7228.
URL http://arxiv.org/abs/1706.05394.
Bruno B Averbeck, Peter E Latham, and Alexandre Pouget. Neural correlations, population coding
and computation. Nature reviews. Neuroscience, 7(5):358–366, May 2006. ISSN 1471-003X.
doi: 10.1038/nrn1888. URL http://dx.doi.org/10.1038/nrn1888.
David G.T. Barrett, Sophie Denève, and Christian K. Machens. Optimal compensation for neuron
loss. eLife, 5(DECEMBER2016), 2016. ISSN 2050084X. doi: 10.7554/eLife.12454.
David Bau, Bolei Zhou, Aditya Khosla, Aude Oliva, and Antonio Torralba. Network Dissection:
Quantifying Interpretability of Deep Visual Representations. 2017. doi: 10.1109/CVPR.2017.
354. URL http://arxiv.org/abs/1704.05796.
Olivier Bousquet and André Elisseeff. Stability and generalization. Journal of machine learning
research: JMLR, 2(Mar):499–526, 2002. ISSN 1532-4435. URL http://www.jmlr.org/
papers/volume2/bousquet02a/bousquet02a.pdf.
10
Published as a conference paper at ICLR 2018
Kenneth H Britten, Michael N Shadlen, William T Newsome, and J Anthony Movshon. The analysis of visual motion: a comparison of neuronal and psychophysical performance. Journal of
Neuroscience, 12(12):4745–4765, 1992.
Adam Coates, Andrej Karpathy, and Andrew Y Ng. Emergence of Object-Selective Features
in Unsupervised Feature Learning. Nips’2012, pp. 1–9, 2012. ISSN 10495258. doi:
10.1002/elps.200900118. URL http://www.stanford.edu/{˜}acoates/papers/
coateskarpathyng{_}nips2012.pdf.
Russell L De Valois, E William Yund, and Norva Hepler. The orientation and direction selectivity
of cells in macaque visual cortex. Vision research, 22(5):531–544, 1982.
Laurent Dinh, Razvan Pascanu, Samy Bengio, and Yoshua Bengio. Sharp Minima Can Generalize
For Deep Nets. 2017.
Gintare Karolina Dziugaite and Daniel M. Roy. Computing Nonvacuous Generalization Bounds for
Deep (Stochastic) Neural Networks with Many More Parameters than Training Data. 2017. URL
http://arxiv.org/abs/1703.11008.
Dumitru Erhan, Yoshua Bengio, Aaron Courville, and Pascal Vincent. Visualizing Higher-Layer
Features of a Deep Network Technical Report. pp. 1–13, 2009.
David J Freedman and John a Assad. Experience-dependent representation of visual categories in
parietal cortex. Nature, 443(7107):85–8, sep 2006. ISSN 1476-4687. doi: 10.1038/nature05078.
URL http://www.ncbi.nlm.nih.gov/pubmed/16936716.
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep Residual Learning for Image
Recognition. Arxiv.Org, 7(3):171–180, 2015. ISSN 1664-1078. doi: 10.3389/fpsyg.2013.00124.
Sepp Hochreiter and Jürgen Schmidhuber. Flat Minima. Neural Comput, 9(1), 1997.
Sergey Ioffe and Christian Szegedy. Batch Normalization: Accelerating Deep Network Training
by Reducing Internal Covariate Shift. Arxiv, 2015. URL http://arxiv.org/abs/1502.
03167.
Nitish Shirish Keskar, Dheevatsa Mudigere, Jorge Nocedal, Mikahail Smelyanskiy, and Ping Tak Peter Tang. On Large-Batch Training for Deep Learning: Generalization Gap and Sharp Minima.
In ICLR, pp. 1–16, 2017.
Quoc V Le, Marc’Aurelio Ranzato, Rajat Monga, Matthieu Devin, Kai Chen, Greg S Corrado, Jeff
Dean, and Andrew Y Ng. Building high-level features using large scale unsupervised learning.
International Conference in Machine Learning, 2011. ISSN 10535888. doi: 10.1109/MSP.2011.
940881.
Hao Li, Asim Kadav, Igor Durdanovic, Hanan Samet, and Hans Peter Graf. Pruning filters for
efficient ConvNets. (2016):1–10, 2017.
Valerio Mante, David Sussillo, Krishna V Shenoy, and William T Newsome. Context-dependent
computation by recurrent dynamics in prefrontal cortex. Nature, 503(7474):78–84, November
2013. ISSN 0028-0836, 1476-4687. doi: 10.1038/nature12742. URL http://dx.doi.org/
10.1038/nature12742.
Pavlo Molchanov, Stephen Tyree, Tero Karras, Timo Aila, and Jan Kautz. Pruning Convolutional
Neural Networks for Resource Efficient Inference. ICLR, (2015):1–17, 2017.
Jorrit S. Montijn, Guido T. Meijer, Carien S. Lansink, and Cyriel M A Pennartz. Population-Level
Neural Codes Are Robust to Single-Neuron Variability from a Multidimensional Coding Perspective. Cell Reports, 16(9):2486–2498, 2016. ISSN 22111247. doi: 10.1016/j.celrep.2016.07.065.
URL http://dx.doi.org/10.1016/j.celrep.2016.07.065.
Ari S Morcos and Christopher D Harvey. History-dependent variability in population dynamics
during evidence accumulation in cortex. Nature neuroscience, 19(12):nn.4403, October 2016.
ISSN 1097-6256. doi: 10.1038/nn.4403. URL http://www.nature.com/articles/
nn.4403.
11
Published as a conference paper at ICLR 2018
Behnam Neyshabur, Srinadh Bhojanapalli, David McAllester, and Nathan Srebro. Exploring Generalization in Deep Learning. 2017. URL https://arxiv.org/abs/1706.08947.
Alec Radford, Rafal Jozefowicz, and Ilya Sutskever. Learning to Generate Reviews and Discovering
Sentiment. 2017. URL http://arxiv.org/abs/1704.01444.
Maithra Raghu, Ben Poole, Jon Kleinberg, Surya Ganguli, and Jascha Sohl-Dickstein. On the Expressive Power of Deep Neural Networks. 2016. URL http://arxiv.org/abs/1606.
05336.
Maithra Raghu, Justin Gilmer, Jason Yosinski, and Jascha Sohl-Dickstein. SVCCA: Singular Vector
Canonical Correlation Analysis for Deep Understanding and Improvement. pp. 1–16, 2017. URL
http://arxiv.org/abs/1706.05806.
David Raposo, Matthew T Kaufman, and Anne K Churchland. A category-free neural population
supports evolving demands during decision-making. Nature neuroscience, 17(12):1784–1792,
November 2014. ISSN 1097-6256. doi: 10.1038/nn.3865. URL http://www.nature.
com/doifinder/10.1038/nn.3865.
Mattia Rigotti, Omri Barak, Melissa R Warden, Xiao-Jing Wang, Nathaniel D Daw, Earl K Miller,
and Stefano Fusi. The importance of mixed selectivity in complex cognitive tasks. Nature, 497
(7451):585–590, 2013. ISSN 0028-0836. doi: 10.1038/nature12160. URL http://dx.doi.
org/10.1038/nature12160.
Ravid Shwartz-Ziv and Naftali Tishby. Opening the Black Box of Deep Neural Networks via Information. arXiv, pp. 1–19, 2017. URL http://arxiv.org/abs/1703.00810.
Samuel L. Smith and Quoc V. Le. Understanding Generalization and Stochastic Gradient Descent.
pp. 1–11, 2017. URL http://arxiv.org/abs/1710.06451.
Nitish Srivastava, Geoffrey E. Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov.
Dropout : A Simple Way to Prevent Neural Networks from Overfitting. Journal of Machine
Learning Research (JMLR), 15:1929–1958, 2014. ISSN 15337928.
Ashia C. Wilson, Rebecca Roelofs, Mitchell Stern, Nathan Srebro, and Benjamin Recht. The
Marginal Value of Adaptive Gradient Methods in Machine Learning. pp. 1–14, 2017. URL
http://arxiv.org/abs/1705.08292.
Yonghui Wu, Mike Schuster, Zhifeng Chen, Quoc V Le, Mohammad Norouzi, Wolfgang Macherey,
Maxim Krikun, Yuan Cao, Qin Gao, Klaus Macherey, et al. Google’s neural machine translation system: Bridging the gap between human and machine translation. arXiv preprint
arXiv:1609.08144, 2016.
Matthew Zeiler and Rob Fergus. Visualizing and understanding convolutional networks. Computer VisionECCV 2014, 8689:818–833, 2014. ISSN 978-3-319-10589-5. doi: 10.1007/
978-3-319-10590-1 53.
URL http://link.springer.com/chapter/10.1007/
978-3-319-10590-1{_}53.
Chiyuan Zhang, Samy Bengio, Moritz Hardt, Benjamin Recht, and Oriol Vinyals. Understanding
deep learning requires rethinking generalization. 2017. URL http://arxiv.org/abs/
1611.03530.
Bolei Zhou, Aditya Khosla, Agata Lapedriza, Aude Oliva, and Antonio Torralba. Object Detectors
Emerge in Deep Scene CNNs. 2014. URL http://arxiv.org/abs/1412.6856.
Joel Zylberberg. Untuned but not irrelevant: The role of untuned neurons in sensory information
coding. September 2017. URL https://www.biorxiv.org/content/early/2017/
09/21/134379.
12
Published as a conference paper at ICLR 2018
A
A.1
A PPENDIX
C OMPARISON OF ABLATION METHODS
To remove the influence of a given direction, its value should be fixed or otherwise modified such
that it is no longer dependent on the input. However, the choice of such a fixed value can have a
substantial impact. For example, if its value were clamped to one which is highly unlikely given
its distribution of activations across the training set, network performance would likely suffer drastically. Here, we compare two methods for ablating directions: ablating to zero and ablating to
the empirical mean over the training set. Using convolutional networks trained on CIFAR-10, we
performed cumulative ablations, either ablating to zero or to the feature map’s mean (means were
calculated independently for each element of the feature map), and found that ablations to zero were
significantly less damaging than ablations to the feature map’s mean (Fig. A1). Interestingly, this
corresponds to the ablation strategies generally used in the model pruning literature (Li et al., 2017,
Anwar et al., 2015, Molchanov et al., 2017).
Figure A1: Ablation to zero vs. ablation to the empirical feature map mean.
A.2
T RAINING DETAILS
MNIST MLPs For class selectivity, generalization, early stopping, and dropout experiments, each
layer contained 128, 512, 2048 and 2048 units, respectively. All networks were trained for 640
epochs, with the exception of dropout networks which were trained for 5000 epochs.
CIFAR-10 ConvNets Convolutional networks were all trained on CIFAR-10 for 100 epochs. Layer
sizes were: 64, 64, 128, 128, 128, 256, 256, 256, 512, 512, 512, with strides of 1, 1, 2, 1, 1, 2, 1,
1, 2, 1, 1, respectively. All kernels were 3x3. For the hyperparameter sweep used in Section 3.2,
learning rate and batch size were evaluated using a grid search.
ImageNet ResNet 50-layer residual networks (He et al., 2015) were trained on ImageNet using distributed training with 32 workers and a batch size of 32 for 200,000 steps. Blocks were structured
as follows (stride, filter sizes, output channels): (1x1, 64, 64, 256) x 2, (2x2, 64, 64, 256), (1x1,
128, 128, 512) x 3, (2x2, 128, 128, 512), (1x1, 256, 256, 1024) x 5, (2x2, 256, 256, 1024), (1x1,
512, 512, 2048) x 3. For training with partially corrupted labels, we did not use any data augmen13
Published as a conference paper at ICLR 2018
a
b
Figure A2: Class selectivity increases with depth. Class selectivity distributions as a function of
depth for CIFAR-10 (a) and ImageNet (b).
a
b
Figure A3: Class selectivity is uncorrelated with L1 -norm. Relationship between class selectivity and the L1 -norm of the filter weights for CIFAR-10 (a) and ImageNet (b).
tation, as it would have dramatically increasing the effective training set size, and hence prevented
memorization.
A.3
D EPTH - DEPENDENCE OF CLASS SELECTIVITY
Here, we evaluate the distribution of class selectivity as a function of depth. In both networks trained
on CIFAR-10 (Fig. A2a) and ImageNet (Fig. A2b), selectivity increased as a function of depth. This
result is consistent with Bau et al. (2017), who show that concept-selectivity increases with depth.
It is also consistent with Alain & Bengio (2016), who show depth increases the linear decodability
of class information (though they evaluate linear decodability based on an entire layer rather than a
single unit).
A.4
R ELATIONSHIP BETWEEN CLASS SELECTIVITY AND THE FILTER WEIGHT L1 - NORM
Importantly, our results on the lack of relationship between class selectivity and importance do not
suggest that there are not directions which are more or less important to the network’s output, nor
do they suggest that these directions are not predictable; they merely suggest that class selectivity
is not a good predictor of importance. As a final test of this, we compared class selectivity to the
14
Published as a conference paper at ICLR 2018
L1 -norm of the filter weights, a metric which has been found to be a strongly correlated with the
impact of removing a filter in the model pruning literature (Li et al., 2017). Since the L1 -norm of
the filter weights is predictive of impact of a feature map’s removal, if class selectivity is also a good
predictor, the two metrics should be correlated. In the ImageNet network, we found that there was
no correlation between the L1 -norm of the filter weights and the class selectivity (Fig. A3a), while
in the CIFAR-10 network, we found there was actually a negative correlation (Fig. A3b).
A.5
R ELATIONSHIP BETWEEN MUTUAL INFORMATION AND IMPORTANCE
MNIST MLP
a
CIFAR-10 ConvNet
b
c
ImageNet ResNet
d
e
Figure A4: Mutual information is not a good predictor of unit importance. Impact of ablation
as a function of mutual information for MNIST MLP (a), CIFAR-10 convolutional network (b-c),
and ImageNet ResNet (d-e). c and e show regression lines for each layer separately.
To examine whether mutual information, which, in contrast to class selectivity, highlights units
with information about multiple classes, is a good predictor of importance, we performed the same
experiments as in Section 3.4 with mutual information in place of class selectivity. We found, that
while the results were a little less consistent (e.g., there appears to be some relationship in very
early and very late layers in CIFAR-10), mutual information was generally a poor predictor of unit
importance (Fig. A4).
15
| 2cs.AI
|
arXiv:1512.00180v1 [math.AT] 1 Dec 2015
Interactive Visualization of 2-D Persistence
Modules
Michael Lesnick∗
Matthew Wright†
Abstract
The goal of this work is to extend the standard persistent homology pipeline for
exploratory data analysis to the 2-D persistence setting, in a practical, computationally
efficient way. To this end, we introduce RIVET, a software tool for the visualization of
2-D persistence modules, and present mathematical foundations for this tool. RIVET
provides an interactive visualization of the barcodes of 1-D affine slices of a 2-D persistence module M . It also computes and visualizes the dimension of each vector space in
M and the bigraded Betti numbers of M . At the heart of our computational approach
is a novel data structure based on planar line arrangements, on which we can perform
fast queries to find the barcode of any slice of M . We present an efficient algorithm
for constructing this data structure and establish bounds on its complexity.
Contents
∗
†
1
Introduction
2
2
Algebra Preliminaries
17
3
Augmented Arrangements of 2-D Persistence Modules
24
4
Querying the Augmented Arrangement
30
5
Computing the Arrangement A(M )
34
6
Computing the Barcode Templates
41
7
Cost of Computing and Storing the Augmented Arrangement
54
8
Speeding up the Computation of the Augmented Arrangement
60
9
Preliminary Runtime Results
64
10 Conclusion
66
A Appendix
68
References
71
Notation Index
74
Columbia University, New York, NY, USA; [email protected]
St. Olaf College, Northfield, MN, USA; [email protected]
1
1
1.1
Introduction
Overview
Topological data analysis (TDA) is a relatively new branch of statistics whose goal is to
apply topology to develop tools for studying the coarse-scale, global, non-linear, geometric
features of data. Persistent homology, one of the central tools of TDA, provides invariants
of data, called barcodes, by associating to the data a filtered topological space F and
then applying standard topological and algebraic techniques to F. In the last 15 years,
persistent homology has been widely applied in the study of scientific data [9, 31], and has
been the subject of extensive theoretical work [5, 10, 17, 20, 24, 47].
For many data sets of interest, such as point cloud data with noise or non-uniformities
in density, a single filtered space is not a rich enough invariant to encode the structure
of interest in our data [11, 13, 19]. This motivates the consideration of multidimensional
persistent homology, which in its most basic form associates to the data a topological space
simultaneously equipped with two or more filtrations. Multi-D persistent homology yields
algebraic invariants of data far more complex than in the 1-D setting; new methodology is
thus required for working with these invariants in practice.
In the TDA community, it is widely appreciated that there is a need for practical data
analysis tools for handling multidimensional persistent homology. However, whereas the
community has been quick to develop fast algorithms and good publicly available software
for 1-D persistent homology, it has been comparatively slow to extend these to the multi-D
setting. Indeed, to date there is, to the best of our knowledge, no publicly available software
which extends the usual persistent homology pipeline for exploratory data analysis to the
multidimensional persistence.
This work seeks to address this gap in the case of 2-D persistence: building on ideas
presented in [13] and [14], we introduce a practical tool for working with 2-D persistent
homology in exploratory data analysis applications, and develop mathematical and algorithmic foundations for this tool. Our tool can be used in much the same way that 1-D
persistent homology is used in TDA, but offers the user significantly more information and
flexibility than standard 1-D persistent homology does.
Our tool, which we call RIVET (the Rank Invariant Visualization and Exploration
Tool), is interactive–it allows the user to dynamically navigate a two-parameter collection
of persistence barcodes derived from a 2-D persistence module. This is in contrast to
previous visualization tools for persistent homology, which have presented static displays.
Because the invariants considered in this paper are larger and more complex than the
standard 1-D persistence invariants, it is essential for the user have some nice way of
“browsing” the invariant on the computer screen. We expect that as TDA moves towards
the use of richer invariants in practical applications, interactive visualization paradigms
will play an increasingly prominent role in the TDA workflow.
It should be possible to extend our approach for 2-D persistence to 3-D, at a compu-
2
tational cost. However, there are a number of practical challenges in this, not the least
of which is designing and implementing a suitable graphical user interface. Since there is
already plenty to keep us busy in 2-D, we restrict attention to the 2-D case in this paper.
In the remainder of this section, we review multidimensional persistent homology, introduce the RIVET visualization paradigm, and provide an overview of RIVET’s mathematical and computational underpinnings. Given the length of this paper, we expect that
some readers will be content to limit their first reading to this introduction. We invite you
to begin this way.
Availability of the RIVET Software. We plan to make our RIVET software publicly
available at http://rivet.online within the next few months. In the meantime, a demo
of RIVET can be accessed through the website.
1.2
Multidimensional Filtrations and Persistence Modules
We start our introduction to RIVET by defining multidimensional filtrations and persistence modules, and reviewing the standard 1-D persistent homology pipeline for TDA.
Here and throughout, we freely use basic language from category theory. An accessible
introduction to such language in the context of persistence theory can be found in [8].
Notation. For categories, C and D, let DC denote the category whose objects are functors
C → D and whose objects are natural transformations.
For C a poset category, F : C → D a functor, and c ∈ obj(c), let Fc = F(c), and for
c ≤ d ∈ obj(c), let F(c, d) : Fc → Fd denote the image under F of the unique morphism
in homC (c, d). Let Simp denote the category of simplicial complexes and simplicial maps.
For a fixed field K, let Vect denote the category of K-vector spaces and linear maps.
Define a partial order on Rn by taking
(a1 , . . . , an ) ≤ (b1 , . . . bn )
if and only if ai ≤ bi for all i, and let Rn denote the corresponding poset category.
For S a set, we let S ∪ ∞ denote the set S ∪ {∞}.
Finite Multidimensional Filtrations. Define an n-D filtration to be a functor F :
Rn → Simp such that for all a ≤ b, F(a, b) : Fa → Fb is an inclusion. We will usually
refer to a 2-D filtration as a bifiltration. n-D filtrations are the basic topological objects of
study in multidimensional persistence.
In the computational setting, we of course work with filtrations that are specified by a
finite amount of data. Let us now introduce language and notation for such filtrations.
We say an n-D filtration stabilizes if there exists a0 ∈ Rn such that Fa = Fa0 whenever
a ≥ a0 . We write Fmax = Fa0 . We say a simplex s in Fmax appears a finite number of
times if there is a finite set A ∈ Rn such that
3
1. for each a ∈ A, s ∈ Fa , and
2. for each b ∈ Rn with s ∈ Fb , there is some a ∈ A with a ≤ b.
If s appears a finite number of times, then a minimal such A is unique; we denote it A(s),
and call it the set of grades of appearance of s.
We say an n-D filtration F is finite if
1. F stabilizes,
2. Fmax is finite, and
3. each simplex s ∈ Fmax appears a finite number of times.
For F finite, we define |F|, the size of F, by
X
|F| =
|A(s)|.
s∈Fmax
In the computational setting, we can represent a finite n-D filtration F in memory by
storing the simplicial complex Fmax , along with the set A(s) for each s ∈ Fmax .
Multidimensional Persistence Modules. Define an n-D persistence module to be a
functor M : Rn → Vect. We say M is pointwise finite dimensional (p.f.d.) if dim(Ma ) < ∞
n
for all a ∈ Rn . As we explain in Section 2.1, the category VectR of persistence modules
is isomorphic to a category of multi-graded modules over suitable rings. In view of this,
we may define presentations of n-D persistence modules; see Section 2.2 for details.
For i ≥ 0, let Hi : Simp → Vect denote the ith simplicial homology functor with
coefficients in K. For F a finite n-D filtration, there exists a finite presentation for Hi F,
which implies in particular that Hi F is p.f.d.; see Section 2.2 for details on presentations.
Barcodes of 1-D Persistence Modules. [27] shows that p.f.d. 1-D persistent homology
modules decompose in an essentially unique way into indecomposable summands, and that
the isomorphism classes of these summands are parameterized by (non-empty) intervals in
R.
Thus, we may associate to each p.f.d. 1-D persistence module M a multiset B(M ) of
intervals in R, which records the isomorphism classes of indecomposable summands of M .
We call B(M ) the barcode of M ; in general, we refer to any multiset of intervals as a
barcode.
The barcode of a finitely presented 1-D persistence module consists of a finite set of
intervals of the form [a, b), with a ∈ R, b ∈ R ∪ ∞. A barcode of this form can be
represented as a persistence diagram, i.e., a multiset of points in (a, b) ∈ R × (R ∪ ∞)
with a ≤ b. The right side of Fig. 1 depicts a barcode, together with its corresponding
persistence diagram.
4
Figure 1: A point cloud circle (left) and its 1st persistence barcode (right), obtained via the
Vietoris-Rips construction. A barcode can be visualized either by directly plotting each interval
(green bars, oriented vertically) or a via persistence diagram (green dots, right). The single long
interval in the barcode encodes the presence of a cycle in the point cloud.
1.3
Persistence Barcodes of Data
The standard 1-D persistent homology pipeline for data analysis associates a barcode Bi (P )
to a data set P , for each i ≥ 0. We regard each interval of each barcode Bi (P ) as a
topological feature of the data, and we interpret the length of the interval as a measure of
robustness of the feature. The pipeline for constructing Bi (P ) proceeds in three steps:
1. We associate to the data set P a finite 1-D filtration F(P ).
2. We apply Hi to obtain a finitely presented 1-D persistence module Hi F(P ).
3. We take Bi (P ) = B(Hi F(P )).
This pipeline for the construction of barcodes of data is quite flexible: in principle,
we can work with a data set P of any kind, and may consider any number of choices of
the filtration F(P ). Different choices of F(P ) topologically encode different aspects of the
structure of our data.
The barcodes Bi (P ) are readily computed in practice; see [47] or Section 6.2 for details.
Persistence Barcodes of Finite Metric Spaces. Here is one standard choice of P
and F(P ) in the TDA pipeline: Let P be a finite metric space, and let F(P ) = Rips(P ),
the Vietoris-Rips filtration of P , be defined as follows. For t ≥ 0, Rips(P )t is the maximal
simplicial complex with 0-skeleton P , and 1-simplices the pairs [p, q] with d(p, q) ≤ 2t; for
t < 0, Rips(P )t is the empty simplicial complex.
5
Informally, the long intervals in the barcodes Bi (P ) correspond to cycles in the data;
see Fig. 1 for an illustration.
Stability. The following well-known result shows that these barcode invariants of finite
metric spaces are robust to certain perturbations of the data:
Theorem 1.1 (Stability of Barcodes of Finite Metric Spaces [18]). For all finite metric
spaces P , Q and i ≥ 0,
dGH (P , Q) ≥ dB (Bi (P ), Bi (Q)),
where dGH denotes Gromov-Hausdorff distance and dB denotes the bottleneck distance on
barcodes; see [18] for definitions.
See also [21] for a generalization of this theorem to compact metric spaces.
1.4
Multidimensional Persistent Homology
In many cases of interest, a 1-D filtration is not sufficient to capture the structure of interest
in our data. In such cases, we are naturally led to associate to our data an n-D filtration,
for some n ≥ 2. As in the 1-D case, applying homology with field coefficients to an n-D
filtration yields an n-D persistence module. The question then arises of whether we can
associate to this n-D filtration an n-dimensional generalization of a barcode in a way that
is useful for data analysis.
In what follows, we motivate the study of multidimensional persistence by describing
one natural way that bifiltrations arise in the study of finite metric spaces; other ways that
bifiltrations arise in TDA applications are discussed, for example, in [13], [40], and [19]. We
then discuss the algebraic difficulties involved in defining a multidimensional generalization
of barcode.
Bifiltrations of Finite Metric Spaces. In spite of Theorem 1.1, which tells us that
the barcodes Bi (P ) = Bi (Hi Rips(P )) of a finite metric space P are well behaved in a
certain sense, these invariants have a couple of important limitations. First, they are
highly unstable to the addition and removal of outliers; see Fig. 2 for an illustration.
Second, and relatedly, when P exhibits non-uniformities in density, the barcodes Bi (P )
can be insensitive to interesting structure in the high density regions of P ; see Fig. 2.
To address these issues, [13] proposed that we associate a bifiltration to P , and study
the persistent homology of this bifiltration. We describe here both the proposal of [13],
which depends on a choice of bandwidth parameter, and a simple parameter-free variant
which, to the best of our knowledge, has not appeared elsewhere.
The construction of the bifiltration proposed in [13] depends on a choice of codensity
function γ : P → R, a function on P whose value is high at dense points and low at outliers
[13, 45]. For example, [13] proposes to take γ to be a K-nearest neighbors density function;
6
X
Y
B1 (X)
Z
B1 (Y )
B1 (Z)
Figure 2: Barcodes are unstable with respect to addition of outliers, and can be insensitive to
interesting structure in high density regions of the data. Thus, though the point clouds X and Y
share a densely sampled circle and differ only by the addition of a few low-density outliers, B1 (X)
and B1 (Y ) are quite different from one another: B1 (X) has a long interval not appearing in B1 (Y ).
In contrast, the point cloud Z contains no densely sampled circle, but the longest intervals of B1 (Y )
and B1 (Z) are of similar length.
in general, the choice of a density function depends on a choice of a bandwidth parameter
K.
Given γ, we may define a 2-dimensional filtration Rips(γ) by taking
Rips(γ)(a,b) = Rips(γ −1 (−∞, a])b .
If a ≥ a0 and b ≤ b0 , then Rips(γ)(a,b) ⊆ Rips(γ)(a0 ,b0 ) . Thus, the collection of all such
simplicial complexes, together with these inclusions, yields a functor
Rips(γ) : Rop × R → Simp.
Rop × R is naturally isomorphic to R2 —for example there is an isomorphism sending each
object (a, b) to (−a, b)—so upon the identification of these two categories, we may regard
Rips(γ) as a bifiltration. Note that the definition of Rips(γ) in fact makes sense for any
function γ : P → R. As discussed in [13], there are numerous possibilities for interesting
choices of γ in our study of data, aside from density estimates.
To obtain a parameter-free variant of Rips(γ), for (a, b) ∈ R2 we first define the graph
Ga,b to be the subgraph of the 1-skeleton of Rips(P )b consisting of vertices whose degree
is at least a. We then define B-Rips(P )(a,b) to be the maximal simplicial complex with
1-skeleton Ga,b . As above, upon the identification of Rop × R with R2 , the collection of
simplicial complexes {B-Rips(P )(a,b) }(a,b)∈R2 defines a bifiltration B-Rips(P ).
7
Hi B-Rips(P ) is a richer algebraic invariant than Hi Rips(P ), and in particular is sensitive to interesting structure in high density regions of P in a way that Hi Rips(P ) is
not.
Barcodes of Multi-D Persistence Modules? We now explain the algebraic difficulties
with defining the barcode of a n-D persistence module for n > 1, closely following a
discussion in [40].
As for the case n = 1, for n > 1, finitely presented n-D persistence modules also decompose in an essentially unique way into indecomposable summands; this follows easily
from a standard formulation of the Krull-Schmidt theorem [2]. However, it is a consequence of standard quiver theory results, as described for example in [30], that the set of
isomorphism classes of indecomposable multi-D persistence modules is, in contrast to the
1-D case, extremely complicated.1 In particular, for n ≥ 2 the dimension of a vector space
in a finitely presented indecomposable n-D persistence module can be arbitrarily large.
Thus, while in principle we could define the barcode of a multi-D persistence module to be
its multiset of isomorphism classes of indecomposables, as in the 1-D case, for n > 1 this
invariant will typically not be useful for data visualization and exploration in the way that
the 1-D barcode is.
In general, it seems that for the purposes of TDA, there is no entirely satisfactory way of
defining the barcode of an n-D persistence module for n > 1, even if we consider invariants
which are incomplete (i.e., invariants which can take the same value on two non-isomorphic
modules.)
Three Simple Invariants of a Multidimensional Persistence Module. Nevertheless, it is possible to define simple, useful, computable invariants of a multidimensional
persistence module. Our tool RIVET computes and visualizes three such invariants of a
2-D persistence module M :
1. The dimension function of M , i.e., the function which maps a ∈ R2 to dim Ma .
2. The fibered barcode of M , i.e., the collection of barcodes of 1-D affine slices of M .
3. The (multigraded) Betti numbers of M .
The dimension function of M is a simple, intuitive, and easily visualized invariant, but
is unstable and provides no information about persistent features in M . The next two
subsections introduce the fibered barcode and the multigraded Betti numbers.
1
For example, there is a fully faithful functor from the category of representations of the wild quiver
2
E9 to VectR , which maps indecomposables to indecomposables; see also [13] for a study of the possible
isomorphism types of a multidimensional persistence module.
8
1.5
The Rank Invariant and Fibered Barcodes
The Rank Invariant. For n ≥ 1, let Hn ⊆ Rn × Rn denote the set of pairs (s, t) with
s ≤ t, let N denote the non-negative integers, and let M be an n-D persistence module.
Following [13], we define
rank(M ) : Hn → N,
the rank invariant of M , by rank(M )(a, b) = rank M (a, b). Using the structure theorem
for 1-D persistence modules [27], it’s easy to check that for M a p.f.d. 1-D persistence
module M , rank(M ) and B(M ) determine each other [13].
For M an n-D persistence module, n ≥ 2, rank(M ) does not encode the isomorphism
class of M ; see example Example 2.2. Nevertheless, the rank invariant does capture interesting “first order information” about the structure of a persistence module.
[14] observed that if M is a p.f.d. n-D persistence module, rank(M ) carries the same
data as a (2n − 2)-parameter family of barcodes, each obtained by restricting M to an
affine line in Rn ; we call this parameterized family of barcodes the fibered barcode of M .
In particular, if M is a 2-D persistence module, the fibered barcode of M is a 2-parameter
family of barcodes. In what follows, we give the definition of a fibered barcode of a 2-D
persistence module.
The Space of Affine Lines in 2-D with Non-Negative Slope. Let L̄ denote the
collection of all (unparameterized) lines in R2 with non-negative (possibly infinite) slope,
and let L ⊂ L̄ denote the collection of all (unparameterized) lines in R2 with non-negative,
finite slope.
Note that L̄ is a submanifold (with boundary) of an affine Grassmannian of dimension 2.
With the induced topology, L̄ is homeomorphic to [0, 1] × R. In this sense, it is appropriate
to think of L̄ as a 2-parameter family of lines.
A standard point-line duality, to be described in Section 3.1, provides an identification
between L and the half-plane [0, ∞) × R; we will make extensive use of this point-line
duality later in the paper. The duality does not extend to L̄ (i.e., to vertical lines) in a
natural way.
Definition of the Fibered Barcode. For L ∈ L̄, let L denote the associated full
subcategory of R2 . The inclusion L ,→ R2 induces a functor iL : L → R2 . For M a p.f.d.
2-D persistence module, we define M L = M ◦ iL .
Define an interval I in L to be a non-empty subset of L such that whenever a < b <
c ∈ L and a, c ∈ I, we also have that b ∈ I. As L is isomorphic to R, the structure theorem
for p.f.d. 1-D persistence modules yields a definition of the barcode B(M L ) as a collection
of intervals in L.
We define B(M ), the fibered barcode of M , to be the map which sends each line L ∈ L̄
to the barcode B(M L ).
9
Proposition 1.2 ([14]). B(M ) and rank(M ) determine each other.
Proof. For each a ≤ b ∈ R2 , there exists a unique line L ∈ L̄ such that a, b ∈ L. Clearly
then, rank(M ) and the collection of 1-D rank invariants {rank(M L ) | L ∈ L̄} determine
each other. As noted above, for N a p.f.d. 1-D persistence module, B(N ) and rank(N )
determine each other. The result follows.
Stability of the Fibered Barcode. Adapting arguments introduced in [14] and [6], a
recent note by Claudia Landi [38] establishes that B(M ) is stable in two senses. The results
of [38] in fact hold for persistent homology modules of arbitrary dimension. However, in
this paper we are primarily interested in the 2-D case.
In 2-D, Landi’s first stability result says that for L a line which is neither horizontal
nor vertical, the map M → B(M L ) is Lipschitz continuous with respect to the interleaving
distance on 2-D persistence modules and the bottleneck distance on barcodes. The Lipschitz
constant c depends on the slope of L; c = 1 when the slope of L is 1, and c grows larger as
the slope of L deviates from 1, tending towards infinity as the slope of L approaches 0 or
∞. We refer to this stability result as the external stability of B(M ).
[38] also presents an internal stability result for B(M ) which tells us that when M
is finitely presented, the map L → B(M L ) is continuous, in a suitable sense, at lines L
which are neither horizontal nor vertical. In fact the result says something stronger, which
put loosely, is that the closer the slope of the line L is to 1, the more stable B(M L ) is to
perturbations of L.
In sum, the stability results of [38] tell us that for M a 2-D persistence module and L a
line which is neither horizontal or vertical, the barcode B(M L ) is robust to perturbations
both of M and L; the more diagonal L is, the more robust B(M L ) is.
1.6
Multigraded Betti Numbers
We next briefly introduce (multigraded) Betti numbers (called bigraded Betti numbers in
the case of 2-D persistence); see Section 2.4 for a precise definition and examples.
For M a finitely presented n-D persistence module and i ≥ 0, the ith (graded) Betti
number of M is a function ξi (M ) : Rn → N. It follows from the Hilbert Basis Theorem, a
classical theorem of commutative algebra, that ξi (M ) is identically 0 for i > n, so ξi (M )
is only of interest for i ≤ n.
We will be especially interested in ξ0 (M ) and ξ1 (M ) in this paper. For a ∈ Rn ,
ξ0 (M )(a) and ξ1 (M )(a) are the number of generators and relations, respectively, at index
a in a minimal presentation for M ; see Section 2.3. ξ2 (M ) has an analogous interpretation
in terms of a minimal resolution of M .
Neither of the invariants B(M ) nor {ξi (M ) | i = 0, 1, . . . , n} determines the other, but
the invariants are intimately connected. This connection in the case that n = 2 plays a
central role in the present work.
10
One of the main mathematical contributions of this project is a fast algorithm for
computing the multigraded Betti numbers of a 2-D persistence module M ; our algorithm
is described in the companion paper [41].
1.7
The RIVET Visualization Paradigm
Overview. We propose to use the fibered barcode in exploratory data analysis in much
the same way that 1-D barcodes are typically used. In particular, this requires us to have
a good way of visualizing the fibered barcode. Though discretizations of fibered barcodes
have been used in shape matching applications [15], to the best of our knowledge, there is
no prior work on visualization of fibered barcodes.
This work introduces a paradigm, called RIVET, for the interactive visualization of the
fibered barcode of a 2-D persistence module, and presents an efficient computational framework for implementing this paradigm. Our paradigm also provides for the visualization
of the dimension function and bigraded Betti numbers of the module. The visualizations
of the three invariants complement each other, and work in concert: Our visualizations of
the dimension function and bigraded Betti numbers provide a coarse, global view of the
structure of the persistence module, while our visualization of the fibered barcodes, which
focuses on a single barcode at a time, provides a sharper but more local view.
We now give a brief description of our RIVET visualization paradigm. Additional
details are in Appendix A.1.
Given a 2-D persistence module M , RIVET allows the user to interactively select a line
L ∈ R2 via a graphical interface; the software then displays the barcode B(M L ). As the
user moves the line L by clicking and dragging, the displayed barcode is updated in real
time.
The RIVET interface consists of two main windows, the Line Selection Window (left)
and the Persistence Diagram Window (right). Fig. 3 shows screenshots of RIVET for a
single choice of M and four different lines L.
The Line Selection Window. For a given finitely presented persistence module M ,
the Line Selection Window plots a rectangle in R2 containing the union of the supports of
functions ξi (M ), i ∈ {0, 1, 2}.
The greyscale shading at a point a in this rectangle represents dim Ma : a is unshaded
when dim Ma = 0, and larger dim Ma corresponds to darker shading. Scrolling the mouse
over a brings up a popup box which gives the precise value of dim Ma .
Points in the supports of ξ0 (M ), ξ1 (M ), and ξ2 (M ) are marked with green, red, and
yellow dots, respectively. The area of each dot is proportional to the corresponding function
value. The dots are translucent, so that, for example, overlaid red and green dots appear
brown on their intersection. This allows the user to read the values of the Betti numbers
at points which are in the support of more than one of the functions.
11
12
Figure 3: Screenshots of RIVET for a single choice of 2-D persistence module M and four different lines L. RIVET provides
visualizations of the dimension of each vector space in M (greyscale shading); the 0th , 1st , and 2nd bi-graded Betti numbers of
M (green, red, and yellow dots); and the barcodes of the 1-D slices M L , for each L (in purple).
The line selection window contains a blue line of non-negative slope, with endpoints
on the boundary of the displayed region of R2 . This line represents a choice of L ∈ L̄.
The intervals in the barcode B(M L ) are displayed in purple, offset from the line L in the
perpendicular direction.
The Persistence Diagram Window. In the Persistence Diagram Window (right), a
persistence diagram representation of B(M L ) is displayed. To represent B(M L ) via a
persistence diagram, we need to choose an order-preserving parameterization γL : R → L
of L, which we regard as a functor; we then display B(M L ◦ γL ). Our choice of the
parameterizations γL is described in Appendix A.1.
As with the multi-graded Betti numbers, the multiplicity of a point in the persistence
diagram is indicated by the area of the corresponding dot.
Interactivity. The user can click and drag the blue line in the left window with the
mouse, thereby changing the choice of L ∈ L̄. Clicking the blue line away from its endpoints
and dragging moves the line in the direction perpendicular to its slope, while keeping the
slope constant. The clicking and dragging an endpoint of the line moves that endpoint
while keeping the other fixed; this allows the user to change the slope of the line.
As the line moves, the both the interval representation of B(M L ) in the left window
and its persistence diagram representation in the right window are updated in real time.
1.8
Querying the Fibered Barcode
Our algorithm for fast computation of Betti numbers of 2-D persistence modules, described
in [41], performs an efficient computation of the dimension function of M as a subroutine.
Thus, in explaining the computational underpinnings of RIVET, we will focus on the
RIVET’s interactive visualization of the fibered barcode.
Because our visualization paradigm needs to update the plot of B(M L ) in real time as
we move the line L, it must be able to very quickly access B(M L ) for any choice of L ∈ L̄.
In this paper, we introduce an efficient data structure A• (M ), the augmented arrangement
of M , on which we can perform fast queries to determine B(M L ), for L ∈ L̄. We present a
theorem which guarantees that our query procedure correctly recovers B(M L ), and describe
an efficient algorithm for computing A• (M ).
Structure of the Augmented Arrangement. A• (M ) consists of a line arrangement
A(M ) in [0, ∞)×R (that is, a cell decomposition of [0, ∞)×R induced by a set of intersecting
lines), together with a collection T e of pairs (a, b) ∈ R2 × (R2 ∪ ∞) stored at each 2-cell e
of A(M ). We call T e the barcode template at e. As we explain in Section 3.3, T e is defined
in terms of the barcode of a discrete 1-D persistence module derived from M .
13
Queries of A• (M ). We now briefly describe how we query A• (M ) for the barcodes
B(M L ). Further details are given in Section 4.
As noted above, a standard point-line duality, described in Section 3.1, provides an
identification of L with [0, ∞) × R. For simplicity, let us restrict attention for now to the
generic case where L lies in a 2-cell e of A(M ); the general case is similar and is treated in
Section 4. To obtain B(M L ), for each pair (a, b) ∈ T e , we “push” the points of each pair
(a, b) ∈ T e onto the line L, by moving a and b upwards or rightwards in the plane along
horizontal and vertical lines; this gives a pair of points pushL (a), pushL (b) ∈ L; if b = ∞,
we take pushL (b) = ∞.
Our Theorem 4.1, the central mathematical result underlying the RIVET paradigm,
tells us that
B(M L ) = { [pushL (a), pushL (b)) | (a, b) ∈ T e };
see Fig. 4 for an illustration. Thus, to obtain the barcode of B(M L ) it suffices to identify
the cell e and then compute pushL (a) and pushL (b) for each (a, b) ∈ T e .
L
I2
a2
I1
b2
a1
b1
Figure 4: An illustration of how we recover the barcode B(M L ) from the barcode template T e
by “pushing” the points of each pair in the barcode template onto L. In this example, T e =
{(a1 , b1 ), (a2 , b2 )}, and B(M L ) consists of two disjoint intervals I1 , I2 .
1.9
Complexity Results for Computing, Storing, and Querying The Augmented Arrangement
Once A• (M ) has been computed, computing B(M L ) via a query to A• (M ) is far more
efficient than computing B(M L ) from scratch; for typical persistence modules arising from
data, the query of B(M L ) can be performed in real time, as desired. At the same time, the
cost of computing and storing A• (M ) is reasonable. The following two theorems provide
a theoretical basis for these claims.
14
For M a 2-D persistence module and i ∈ {0, 1, 2}, let
supp ξi (M ) = {a ∈ Rn | ξi (M )(a) > 0}.
Let κ = κx κy , for κx and κy the number of unique x and y coordinates, respectively, of
points in supp ξ0 (M ) ∪ supp ξ1 (M ); we call κ the coarseness of M .
Theorem 1.3 (computational cost of querying the augmented arrangement).
(i) For L ∈ L lying in a 2-cell of A(M ), we can query A• (M ) for B(M L ) in time
O(log κ + |B(M L )|), where |B(M L )| denotes the number of intervals in B(M L ).
0
(ii) For all other lines L ∈ L̄, we can query A• (M ) for B(M L ) in time O(log κ+|B(M L )|),
for L0 some arbitrarily small perturbation of L.
Theorem 1.4. For F a bifiltration of size m and M = Hi (F),
(i) A• (M ) is of size O(mκ2 ),
(ii) Our algorithm computes A• (M ) from F using O(m3 κ + (m + log κ)κ2 ) elementary
operations and O(m2 + mκ2 ) storage.
We prove Theorem 1.3 in Section 4.3 and Theorem 1.4 in Section 7.
To keep our exposition brief in this introduction, we have assumed in the statement
of Theorem 1.4 that M is a persistent homology module of a bifiltration. However, our
algorithm for computing augmented arrangements does handle purely algebraic input; see
Section 5.1. We give more general complexity bounds in the algebraic setting in Section 7.
Coarsening and the Interpretation of Theorem 1.4. For a fixed choice of L, B(M L )
is of size O(m), and the time required to compute B(M L ) via an application of the standard
persistence algorithm is O(m3 ). Thus Theorem 1.4 indicates that, as one would expect,
computation and storage of A• (M ) is more expensive than computation and storage of
B(M L ) for some fixed L.
For m as above, |κ| is O(m2 ) in the worst case. Thus, in the worst case, our bounds
on the size and time to compute A• (M ) grow like m5 , which on the surface may appear
problematic for practical applications. However, as we explain in Section 8.2, we can
always employ a simple coarsening procedure to approximate M by a module M 0 for which
κ is a small constant (say, κ ≤ 400). A• (M 0 ) encodes B(M 0 ) exactly, and so in view of
Landi’s external stability result [38], A• (M ) encodes B(M ) approximately. More details
on coarsening are given in Section 8.2.
15
1.10
Computation of the Augmented Arrangement
Our algorithm for computing A• (M ) decouples into three main parts:
1. Computing ξ0 (M ) and ξ1 (M ),
2. Constructing the line arrangement A(M ),
3. Computing the barcode template T e at each 2-cell e of A(M ).
We next say a few words about each of these.
Computing Bigraded Betti Numbers. As noted above, one of the main mathematical
contributions underlying RIVET is a fast algorithm for computing the bigraded Betti
numbers of a 2-D persistence module M . Not only does RIVET provide a visualization
of the Betti numbers, but it also makes essential use of the Betti numbers in constructing
A• (M ).
For M a persistent homology module of a bifiltration with n simplices, our algorithm
for computes the bigraded Betti numbers of M in O(m3 ) time; see [41] and Section 5.3.
In Section 9 of this paper, we present preliminary experimental results on the performance of our algorithm for computing bigraded Betti numbers. These indicate that the
cost of the algorithm is very reasonable in practice.
Computing the Line Arrangement. The second phase of computation constructs the
line arrangement A(M ) underlying A• (M ). Line arrangements have been the object of intense study by computational geometers for decades, and there is well-developed machinery
for constructing and working with line arrangements in practice [29]. Our algorithms for
constructing and querying A• (M ) leverage this machinery; see Section 4.3 and Section 5.
Computing the Barcode Templates. The third phase of our computation of A• (M )
computes the barcode templates T e stored at each 2-cell e ∈ A(M ). As noted above, each
T e is defined in terms of the barcode B(M e ) of a certain 1-D persistence module M e . To
compute each T e for each 2-cell e, we need to compute each B(M e ). This is the most
expensive part of the computation of A• (M ), both in theory and in practice. In Section 6,
we introduce our core algorithm for this, based on the vineyard algorithm for updating
persistent homology computations [25]. In Section 8.1, we present a modification of this
algorithm which is much faster in practice.
In fact, as explained in Section 8.3, our algorithm for computing barcode templates is
embarrassingly parallelizable.
16
Computational Experiments. Section 9 presents preliminary results on the performance of our algorithm for computing augmented arrangements. As explained there, our
present implementation of RIVET is not yet fully optimized, and our timing results should
be regarded as loose upper bounds on what can be achieved using the algorithms of this
paper.
Still, the results demonstrate that even with our current code, computation of an augmented arrangement of a bifiltration containing millions of simplices is feasible on a standard personal computer, provided we employ some modest coarsening. Thus, the current
implementation already performs well enough to be used in the analysis of modestly sized
real world data sets. With more implementation work, including the introduction of parallelization, we expect RIVET to scale well enough to be useful in many of the same settings
where 1-D persistence is currently used for exploratory data analysis.
1.11
Outline
We conclude this introduction with an outline of the remainder of the paper.
Section 2 reviews basic algebraic facts about persistence modules, their (minimal) presentations, and graded Betti numbers. We also discuss the connection between Rn -indexed
persistence modules and their Zn -indexed discretizations. Section 3 defines the augmented
arrangement A• (M ) of a 2-D persistence module M . Sections 4.1 and 4.2 give our main
result on querying A• (M ) for the barcodes B(M L ); this is Theorem 4.1. In Section 4.3,
we describe how A• (M ) is stored in memory, and apply Theorem 4.1 to give an algorithm
for querying A• (M ).
The remaining sections introduce our algorithm for computing A• (M ): First, Section 5
specifies how persistence modules are represented as input to our algorithm, and explains
our algorithm for computing A(M ). Section 6 explains our core algorithm for computing
the barcode templates T e ; this completes the specification of our algorithm for computing A• (M ), in its basic form. Section 7 analyzes the time and space complexity of our
algorithm for computing A• (M ). Section 8 describes several practical strategies to speed
up the computation of A• (M ). Section 9 presents our preliminary timing results for the
computation of A• (M ).
Appendix A.1 expands on the introduction to the RIVET interface given in Section 1.7,
providing additional details.
2
Algebra Preliminaries
In this section, we present the basic algebraic definitions and facts we will need to define
and study augmented arrangements of 2-D persistence modules.
17
2.1
A Module-Theoretic Description of Multi-D Persistence Modules
In Section 1.2 we defined a n-D persistence module to be an object of the functor category
n
n
VectR . Here we give a module-theoretic description of VectR .
The Ring Pn . Let the ring Pn be the analogue of the usual polynomial ring K[x1 , . . . , xn ]
in n variables, where exponents of the indeterminates in Pn are allowed to take on arbitrary
values√ in [0, ∞) rather than only values in N. For example, if K = R, then 1 + x2 + xπ1 +
2
2 3
5 x1 x2 is an element of P2 .
More formally, Pn can be defined as a monoid ring over the monoid ([0, ∞)n , +) [39].
For a = (a1 , . . . , an ) ∈ [0, ∞)n , we let xa denote the monomial xa11 xa22 · · · xann ∈ Pn . Let
I ⊂ Pn be the ideal generated by the set {xαi | α > 0, 1 ≤ i ≤ n}.
Rn -graded Pn -Modules. Since the field K is a subring of Pn , any Pn -module comes
naturally equipped with the structure of a K-vector space.
We define an Rn -graded Pn -module
L to be a Pn -module M with a direct sum decomposition as a K-vector space M ' a∈Rn Ma such that the action of Pn on M satisfies
xb (Ma ) ⊂ Ma+b for all a ∈ Rn , b ∈ [0, ∞)n .
The Rn -graded Pn -modules form a category whose morphisms are the module homomorphisms f : M → N such that f (Ma ) ⊂ Na for all a ∈ Rn . There is an obvious
n
isomorphism between this VectR and this category, so that we may identify the two categories. Henceforth, we will refer to Rn -graded Pn -modules as (n-D) persistence modules,
or n-modules for short.
Remark 2.1. As a rule, the familiar definitions and constructions for modules make sense
n
in the category VectR . For example, as the reader may check, we can define submodules,
quotients, direct sums, tensor products, projective/injective resolutions, and Tor functors
n
in VectR . As we next explain, we also can define free n-modules and presentations of
n-modules.
2.2
Free n-Modules and Presentations
n-graded Sets. Define an n-graded set to be a pair W = (W , grW ) for some set W and
function grW : W → Rn . Formally, we may regard W as the set of pairs
{(w, grW (w)) | w ∈ W },
and we’ll sometimes make use of this representation. We’ll often abuse notation and write
W to mean the set W . Also, when W is clear from context we’ll abbreviate grW as gr.
We say a subset Y of an n-module M is homogeneous if
[
Y⊆
Ma .
a∈Rn
Clearly, we may regard Y as an n-graded set.
18
Shifts of Modules. For M an n-module and v ∈ Rn , we define M (v) to be the n-module
such that for a ∈ Rn , M (v)a = Ma+v , and for a ≤ b ∈ Rn , M (v)(a, b) = M (a + v, b + v).
For example, when n = 2, M (1, 1) is obtained from M by shifting all vector spaces of
M down by one and to the left by one.
Free n-Modules. The usual notion of a free module
L extends to the setting of n-modules
as follows: For W an n-graded set, let Free[W] = w∈W Pn (− gr(w)). We identify W with
a set of generators in Free[W], in the obvious way. A free n-module F is an n-module such
that F ' Free[W] for some n-graded set W. Equivalently, we can define a free n-module
as an n-module which satisfies a certain universal property; see [13].
For Y a homogeneous subset of a free n-module F , let hYi denote the submodule of F
generated by Y.
Matrix Representations of Morphisms of Free Modules. Let W, W 0 be finite n0 }. For a
graded sets with ordered underlying sets W = {w1 , . . . , wl }, W 0 = {w10 , . . . , wm
morphism f : Free[W] → Free[W 0 ], we can represent f by a |W | × |W 0 | matrix [f ] with
coefficients in K: If gr(wi0 ) ≤ gr(wj ), we define [f ]ij to be the unique solution to
0
[f ]ij wi0 = xgr(wi )−gr(wj ) ρi ◦ f (wj ),
where ρi : Free[W] → Free[{wi }] is the projection. If gr(wi0 ) 6≤ gr(wj ), we define [f ]ij = 0.
Presentations of n-Modules. A presentation of an n-module M is a pair (W, Y), where
W is an n-graded set and Y ⊆ Free[W] is a homogeneous, with M ' Free[W]/hYi. We
denote the presentation (W, Y) as hW|Yi. If there exists a presentation hW|Yi for M with
W and Y finite, then we say M is finitely presented.
Note that the inclusion Y ,→ Free[W] induces a morphism Free[Y] → Free[W]; we
denote this morphism as ΦhW|Yi .
Example 2.2. Consider the 2-D persistence modules
M ' h(a, (1, 0)), (b, (0, 1)), (c, (1, 1)) | x2 a − x1 bi
N ' h(a, (1, 0)), (b, (0, 1)) | ∅i.
The induced linear maps M(1,0) ⊕ M(0,1) → M(1,1) and N(1,0) ⊕ N(0,1) → N(1,1) do not have
equal ranks. Hence M and N are not isomorphic. However, rank(M ) = rank(N ). This
shows that the rank invariant does not completely determine the isomorphism type of a
persistence module.
19
2.3
Minimal Presentations of n-Modules
Let M be an n-module. We say a presentation hW|Yi of M is minimal if hYi ⊆ I Free[W]
and ker ΦhW|Yi ⊆ I Free[Y].
The following proposition is a variant of [33, Lemma 19.4], and is proved in the same
way. It makes clear that minimal presentations are indeed minimal, in a reasonable sense.
Proposition 2.3. A finite presentation hW|Yi is minimal if and only if W descends to a
minimal set of generators for coker ΦhW|Yi and Y is a minimal set of generators for hYi.
Remark 2.4. It follows immediately from Proposition 2.3 that every finitely presented
n-D persistence module has a minimal presentation.
2.4
Graded Betti Numbers of Persistence Modules
For M an n-module, define dimf(M ) : Rn → N, the dimension function of M , by
dimf(M )(a) = dim(Ma ).
For i ≥ 0, define
ξi (M ) = dimf(Tori (M , Pn /IPn )).
The functions ξi (M ) are called the (graded) Betti numbers of M . Betti numbers of multigraded K[x1 , · · · , xn ]-modules are defined analogously; these are discussed in many places,
e.g., in [13]. In our study of augmented arrangements and fibered barcodes, we will only
need to consider ξ0 (M ) and ξ1 (M ).
We omit the straightforward proof the following result:
Proposition 2.5. If hW|Yi is a minimal presentation for M , then for all a ∈ Rn ,
ξ1 (M )(a) = | gr−1
Y (a)|.
ξ0 (M )(a) = | gr−1
W (a)|,
Example 2.6. The presentations of the modules M and N given in Example 2.2 are
minimal. Using this, it’s easy to see that
(
(
1 if a ∈ {(1, 0), (0, 1), (1, 1)}
1 if a ∈ {(1, 1)}
ξ0 (M )(a) =
ξ1 (M )(a) =
0 otherwise,
0 otherwise,
(
1 if a ∈ {(1, 0), (0, 1)}
ξ0 (N )(a) =
ξ1 (N ) = ξ2 (N ) = ξ2 (M ) = 0.
0 otherwise.
Example 2.7. For M ' h(a, (0, 0)) | x1 a, x2 ai,
(
(
1 if a ∈ {(0, 0)}
1 if a ∈ {(1, 0), (0, 1)}
ξ0 (M )(a) =
ξ1 (M )(a) =
0 otherwise,
0 otherwise,
(
1 if a ∈ {(1, 1)}
ξ2 (M )(a) =
0 otherwise.
20
Grades of Influence. For M a persistence module and a ∈ Rn let
IM (a) = {y ≤ a | ξ0 (y) > 0 or ξ1 (y) > 0}.
Lemma 2.8. For M finitely presented and a, b ∈ Rn with IM (a) = IM (b), M (a, b) is an
isomorphism.
Proof. Let hW|Yi be a minimal presentation for M . Let M 0 be the n-module with Ma0 =
Free[W]a /hYia , and M 0 (a, a0 ) the map induced by the inclusion Free[W](a, a0 ). Clearly,
M 0 isomorphic to M . Using Proposition 2.5, it’s easy to see that for a, b ∈ Rn with
IM (a) = IM (b), the map Free[W](a, b) is an isomorphism sending hYia isomorphically to
hYib . Hence M 0 (a, b) is an isomorphism. Since M and M 0 are isomorphic, M (a, b) is an
isomorphism as well.
2.5
Continuous Extensions of Discrete Persistence Modules
In the computational setting, the persistence modules we encounter are always finitely presented. It turns out that finitely presented persistence modules are, in a sense, essentially
discrete; we now explain this.
A discrete (or Zn -indexed) persistence module is a functor Zn → Vect, where Zn is
the poset category of Zn . Let An = K[x1 , . . . , xn ] denote the ordinary polynomial ring
in n variables. In analogy with the Rn -indexed case, we can regard a discrete persistence
module as a multi-graded An -module, in the obvious way.
All of the basic definitions and machinery we’ve described above for Rn -indexed persistence modules can be defined for discrete persistence modules in essentially the same way.
In particular, we may define the Betti numbers ξi (Q) : Zn → N of a discrete persistence
module Q.
Grid Functions. For n ≥ 1, we define an n-D grid to be a function G : Zn → Rn , given
by
G(z1 , . . . , zn ) = (G1 (z1 ), . . . , Gn (zn ))
for some non-decreasing functions Gi : Z → R with
lim Gi (z) = −∞
z→−∞
and
lim Gi (z) = ∞
z→∞
for each i.
We define flG (a) to be the maximum element of im(G) ordered before a in the partial
order on Rn . That is, for G a 1-D grid, we let flG : R → im(G) be given by
flG (t) = max{s ∈ im(G) | s ≤ t},
and for G an n-D grid function, we define flG : Rn → im(G) by
flG (a1 , . . . , an ) = (flG1 (a1 ), . . . , flGn (an )).
21
Continuous Extensions of Discrete Persistence Modules. For G an n-D grid, we
n
n
define a functor EG : VectZ → VectR as follows:
1. For Q a Zn -indexed persistence module and a, b ∈ Rn ,
EG (Q)a = Qy ,
EG (Q)(a, b) = Q(y, z),
where
y = max {w ∈ Zn | G(w) = flG (a)},
z = max {w ∈ Zn | G(w) = flG (b)}.
2. The action of EG on morphisms is the obvious one.
We say that an n-module M is a continuous extension of Q along G if M ∼
= EG (Q).
Proposition 2.9. Any finitely presented n-module M is a continuous extension of a finitely
generated discrete persistence module along some n-D grid.
Proof. Let G : Zn → Rn be any n-D grid such that supp ξ0 (M ) ∩ supp ξ1 (M ) ⊆ im G. We
regard G as a functor Zn → Rn in the obvious way. Using Lemma 2.8, it’s easy to check
that M is a continuous extension of M ◦ G along G. Further, M ◦ G is finitely generated; a
finite presentation for M induces one for M ◦ G of the same size.
Betti Numbers of Continuous Extensions.
Proposition 2.10. Suppose an n-module M is a continuous extension of Q along an
injective n-D grid G. Then for all i,
(
ξi (Q)(z) if a = G(z) for some z ∈ Zn ,
ξi (M )(a) =
0
otherwise.
RIVET exploits Proposition 2.10 to compute the Betti numbers of finitely presented
R2 -indexed persistence modules, by appealing to local formulae for the Betti numbers of
Z2 -indexed persistence modules; see Section 5.3.
Proof of Proposition 2.10. Let
α3
α2
α1
· · · −→ F 2 −→ F 1 −→ F 0
be a free resolution of Q. It’s easy to see that EG preserves exactness, so
EG (α3 )
EG (α2 )
EG (α1 )
· · · −−−−→ EG (F 2 ) −−−−→ EG (F 1 ) −−−−→ EG (F 0 )
22
is a free resolution for M . Write Gi = EG (F i ) and β i = EG (αi ).
By definition, ξi (M ) = dimf(Hi ), where Hi is the ith homology module of the following
chain complex:
β3 ⊗Id
β2 ⊗Id
β1 ⊗Id
· · · −−−−→ G2 ⊗ Pn /I −−−−→ G1 ⊗ Pn /I −−−−→ G0 ⊗ Pn /I.
n
n
We have two functors VectR → VectR acting respectively on objects by
N → N ⊗ Pn /I,
N → N/IN ,
with the action on morphisms defined in the obvious way; note that these are naturally
isomorphic. Thus the above chain complex is isomorphic to the chain complex
β̄ 3
β̄ 2
β̄ 1
· · · −→ G2 /IG2 −→ G1 /IG1 −→ G0 /IG0 ,
where β̄ i is the map induced by β i . Since Gi is a continuous extension along G, it is clear
that if a 6∈ im G, then (Gi /IGi )a = 0. Hence, if a 6∈ im G then ξi (M )(a) = 0, as claimed.
It remains to consider the case that a ∈ im G. Let J denote the maximal homogeneous
ideal of An . ξi (Q) = dimf(Ki ), for Ki the ith homology module of the chain complex
ᾱ3
ᾱ2
ᾱ1
· · · −→ F 2 /JF 2 −→ F 1 /JF 1 −→ F 0 /JF 0 ,
where ᾱi is the map induced by αi . If a = G(z), then by the way we have defined the functor
EG , it is clear that we have isomorphisms {ψi : Fzi → Gia }i≥0 sending JFzi isomorphically
to IGia , such that the following diagram commutes:
/ F2
···
α2z
z
ψ2
/ G2
a
···
βa2
/ F1
z
α1z
ψ1
/ G1
a
βa1
/ F0
z
ψ0
/ G0 .
a
Taking quotients, we obtain a commutative diagram:
···
/ (F 2 /JF 2 )z
···
ᾱ2z
/ (F 1 /JF 1 )z
'
/ (G2 /IG2 )a
β̄a2
ᾱ1z
'
/ (G1 /IG1 )a
β̄a1
It follows that Kzi ' Hai , so ξi (M )a = ξi (Q)z as desired.
23
/ (F 0 /JF 0 )z
'
/ (G0 /IG0 )a .
Barcodes of Discrete Persistence Modules. We discussed the barcodes of (Rindexed) 1-D persistence modules in Section 1.2. The structure theorem of [46] tells us
that the barcode B(Q) of a discrete 1-D persistence module Q is also well defined, provided
dim(Va ) < ∞ for all a less than some a0 ∈ Z. When Q is finitely generated, B(Q) is a
finite multiset of intervals [a, b) with a < b ∈ Z ∪ ∞.
Barcodes Under Continuous Extension. We omit the easy proof of the following:
Proposition 2.11. For Q a finitely generated discrete 1-D persistence module and M a
continuous extension of Q along G,
B(M ) = {[G(a), G(b)) | [a, b) ∈ B(Q), G(a) < G(b)},
where we define G(∞) = ∞.
Remark 2.12. As already noted in Section 1.5, for L the poset category corresponding to
a line L ∈ L̄, L is isomorphic to R. Hence, by adapting the definitions given above in the
R-indexed setting, we can define the grid function G : Z → L, a function flG : L → im G,
and the functor EG : VectZ → VectL . As in the R-indexed case, we say M : L → Vect
is a continuous extension of a Z-indexed persistence module Q if M ∼
= EG (Q). Clearly
then, Proposition 2.11 also holds for continuous extensions in the L-indexed setting. In
Section 4.2, we will use Proposition 2.11 in the L-indexed setting to prove our main result
on queries of augmented arrangements.
3
Augmented Arrangements of 2-D Persistence Modules
In this section we define the augmented arrangement A• (M ) associated to a finitely presented 2-D persistence module M .
First, in Section 3.1 we define the line arrangement A(M ) associated to M . Next, in
Section 3.2 we present a characterization of the 1-skeleton of A(M ). Finally, using this
characterization, in Section 3.3 we define the barcode template T e stored at a 2-cell e of
A(M ).
The augmented arrangement A• (M ) is defined to be the arrangement A(M ), together
with the additional data T e at each 2-cell e.
3.1
Definition of A(M )
Let S = supp ξ0 (M ) ∪ supp ξ1 (M ). To keep our exposition simple, we will assume that
each element of S has non-negative x-coordinate. Using the shift construction described
in Section 2.2, we can always translate the indices of M so that this assumption holds, so
there is no loss of generality in this assumption.
24
Point-Line Duality. Recall the definitions of L and L̄ from Section 1.5. As mentioned
there, a standard point-line duality gives a parameterization of L by the half-plane [0, ∞)×
R. We now explain this. Define dual transforms D` and Dp as follows:
D` : L → [0, ∞) × R
Dp : [0, ∞) × R → L
y = ax + b 7→ (a, −b)
(c, d) 7→ y = cx − d
This duality does not extend naturally to vertical lines, i.e. lines in L̄ − L.
Dp (w)
Dp (v)
w
u
D` (L)
L0
v
D` (L0 )
Dp (u)
L
Figure 5: Illustration of point-line duality
The following lemma, whose proof we omit, is illustrated in Fig. 5 by the point w and
line L.
Lemma 3.1. The transforms D` and Dp are inverses and preserve incidence, in the sense
that for w ∈ [0, ∞) × R and L ∈ L, w ∈ L if and only if D` (L) ∈ Dp (w).
Line Arrangements in [0, ∞) × R. A cell is a topological space homeomorphic to Rn
for some n ≥ 0. We define a cell complex on [0, ∞) × R to be a decomposition of [0, ∞) × R
into a finite number of cells, so that the topological boundary of each cell lies in the union
of cells of lower dimension. By standard point-set topology, each cell in a cell complex
on [0, ∞) × R has dimension at most 2. According to the definition, a cell complex on
[0, ∞) × R is not a CW-complex, as some cells will necessarily be unbounded.
By a line arrangement in [0, ∞) × R, we mean the cell complex on [0, ∞) × R induced
by a set W of lines in [0, ∞) × R. In this cell complex, the 1-skeleton consists of the union
of all lines in W , together with the line x = 0.
Definition of A(M ). For W = {(a1 , b1 ), (a2 , b2 ), . . . , (al , bl )} a finite subset of R2 , let
lub(S), the least upper bound of W be given by
lub(S) = (max ai , max bi ).
i
25
i
For example, lub((3, 5), (7, 4)) = (7, 5).
Say that a pair of distinct elements u, v ∈ S is weakly incomparable if one of the following
is true:
• u and v are incomparable with respect to the partial order on R2 ,
• u and v share either their first or second coordinate.
Call α ∈ [0, ∞) × R an anchor if α = lub(u, v) for u, v ∈ S weakly incomparable.
We define A(M ) to be the line arrangement in [0, ∞) × R induced by the set of lines
{Dp (α) | α is an anchor}.
In view of Lemma 3.1, then, the 1-skeleton A1 (M ) of A(M ) is given by
A1 (M ) = {D` (L) | L ∈ L contains an anchor} ∪ ({0} × R).
(3.1)
It is clear that A(M ) is completely determined by S.
0-cells of A(M ). Note that for α 6= β two anchors, Dp (α) and Dp (β) intersect in [0, ∞)
if and only if there exists some L ∈ L containing both α and β; such a line L exists if and
only if α and β are comparable and have distinct x-coordinate.
Size of A(M ). We now bound the number of cells in A(M ) of each dimension. As
in Section 1.9, let κ = κx κy , for κx and κy the number of unique x and y coordinates,
respectively, of points in S. Clearly, the number of anchors for S is bounded above by κ.
Hence the number of lines in A(M ) is also bounded above by κ.
Precise bounds on the number of vertices, edges, and faces in an arbitrary line arrangement are well known, and can be computed by simple counting arguments. These bounds
tell us that the number of vertices, edges, and faces in A(M ) is each not greater than κ2 .
3.2
Characterization of the 1-Skeleton of A(M )
We next give our alternate description of the 1-skeleton of A(M ). To do so, we first define
the set crit(M ) of critical lines in L◦ . Here L◦ denotes the topological interior of L, i.e.
the set of affine lines in R2 with positive, finite slope.
The Push Map. Note that for each L ∈ L̄, the partial order on R2 restricts to a total
order on L. This extends to a total order on L ∪ ∞ by taking v < ∞ for each v ∈ L. For
L ∈ L̄, define the push map pushL : R2 → L ∪ ∞ by taking
pushL (a) = min{v ∈ L | a ≤ v}.
Note that:
26
• ∞ ∈ im pushL if and only if L is horizontal or vertical.
• For a = (a1 , a2 ) ∈ R2 and pushL (u) = (v1 , v2 ) ∈ L, either a1 = v1 or a2 = v2 ; see
Fig. 6.
• For r < s ∈ R2 , pushL (r) ≤ pushL (s).
L
pushL (b)
a
pushL (a)
b
Figure 6: Illustration of the push map for lines of positive, finite slope
Continuity of Push Maps. For any a ∈ R2 , the maps {pushL }L∈L̄ induce a map
pusha : L̄ → R2 ∪ ∞, defined by pusha (L) = pushL (a).
Recall that we consider L̄ as a topological space, with the topology the restriction of
topology on the affine Grassmannian of 1-D lines in R2 .
Lemma 3.2. For each a ∈ R2 , pusha is continuous on L◦ .
Proof. Note that for any a = (a1 , a2 ) and L ∈ L◦ , pusha (L) is the unique intersection of L
with
{(a1 , y) | y ≥ a2 } ∪ {(x, a2 ) | x ≥ a1 }.
From this, the result follows readily.
Critical Lines. For L ∈ L◦ , pushL induces a totally ordered partition S L of S: elements
of the partition are restrictions of levelsets of pushL to S, and the total order on S L is the
pullback of the total order on L. This partition is illustrated in Fig. 7.
0
We call L ∈ L◦ regular if there is an open ball B ∈ L◦ containing L such that S L = S L
for all L0 ∈ B. We call L ∈ L◦ critical if it is not regular. Let crit(M ) denote the set of
critical lines in L◦ .
Theorem 3.3 (Characterization of the 1-Skeleton of A(M )). The 1-skeleton of A(M ) is
exactly
D` (crit(M )) ∪ ({0} × R) .
27
L
S5L
S2L
S1L
S3L S L
4
Figure 7: The totally ordered partition S L of S. The ith element of the partition is labeled as SiL .
u
L0
lub(u, v)
L00
lub(u, v)
u
v
v
Figure 8: An illustration of the geometric idea behind Theorem 3.3: For u, v, ∈ S and a line L0
lying just above lub(u, v), pushL0 (u) < pushL0 (v), whereas for a line L00 lying just below lub(u, v),
pushL00 (v) < pushL00 (u). Thus any line passing through lub(u, v) is critical.
Proof. In view of the description of the 1-skeleton of A(M ) given by Eq. (3.1), proving
the proposition amounts to showing that L ∈ L◦ is critical if and only if L contains some
anchor w.
Suppose L ∈ L◦ contains an anchor w, and let u, v ∈ S be weakly incomparable,
with w = lub(u, v) ∈ L. Then we must have that pushL (u) = pushL (v) = w. Further,
it’s easy to see that we can find an arbitrarily small perturbation of L so that either
pushL (u) < pushL (v) or pushL (v) < pushL (u). Thus L is critical; see Fig. 8 for an
illustration in the case that u and v are incomparable.
To prove the converse, assume that L ∈ L◦ does not contain any anchor, and consider
distinct u, v ∈ S with pushL (u) = pushL (v). Note that u, v must lie either on the same
horizontal line or the same vertical line; otherwise u and v would be incomparable and
we would have pushL (u) = pushL (v) = lub(u, v) ∈ L. Assume without loss of generality
that u < v and u, v lie on the same horizontal line H. Then we must also have that
pushL (u) = pushL (v) lies on H. Since v = lub(u, v), v is an anchor. However, L does not
contain any anchor, so we must have v < pushL (v).
Any sufficiently small perturbation L0 of L will also intersect H at a point p to the
right of v, so that we have pushL0 (u) = pushL0 (v) = p. Thus for all L0 in a neighborhood
of L, push(u) = push(v).
28
In fact, since S is finite, we can choose a single neighborhood N of L in L◦ such
that for any u, v ∈ S with pushL (u) = pushL (v), we have pushL0 (u) = pushL0 (v) for all
L0 ∈ N . By Lemma 3.2, choosing N to be smaller if necessary, may further assume that if
0
pushL (u) 6= pushL (v), then pushL0 (u) 6= pushL0 (v) for all L0 ∈ N . Thus, the partition S L
is independent of the choice of L0 ∈ N . Moreover, by Lemma 3.2 again, the total order on
0
S L is also independent of the choice of L0 ∈ N . Therefore, L is regular.
Corollary 3.4. If the duals of L, L0 ∈ L are contained in the same 2-cell in A(M ), then
0
SL = SL .
Proof. Each 2-cell is connected and open, so this follows from Theorem 3.3.
Remark 3.5. In fact, Corollary 3.4 can be strengthened to show that for any L, L0 ∈ L◦ ,
0
the duals of L and L0 lie in the same cell of A(M ) if and only if S L = S L . However, we
will not need this stronger result.
3.3
The Barcode Templates T e
Using Corollary 3.4, we now define the barcode templates T e stored at each 2-cell e of
A(M ). This will complete the definition of the augmented arrangement A• (M ).
By Corollary 3.4, we can associate to each 2-cell e in A(M ) a totally ordered partition
S e of S. Let Sie denote the ith element of the partition.
A 1-D Persistence Module at the 2-Cell e. We next use S e to define a discrete (i.e.,
Z-indexed) persistence module M e . If M ∼
6 0.
= 0, we take M e = 0. Assume then that M ∼
=
e
2
First, we define a map ζ : N \ {0} → R by
(
lub(∪zi=1 Sie ) if 1 ≤ z < |S e |,
ζ e (z) =
lub(S)
if z ≥ |S e |.
We define P e := im ζ e , and call this the set of template points at cell e. Note that the
restriction of ζ e to {1, . . . , |S e |} is an injection, so that |P e | = |S e |.
Let P denote the poset category of positive integers. ζ e (y) ≤ ζ e (z) whenever y < z,
so ζ e induces a functor P to R2 , which we also denote ζ e . Finally, the functor M ◦ ζ e :
P → Vect extends to a functor M e : Z → Vect (i.e., a Z-indexed persistence module) by
taking Mze = 0 whenever z ≤ 0.
The Definition of Barcode Templates. Clearly, M e is p.f.d., so it has a well-defined
barcode B(M e ), and it’s easy to see that B(M e ) consists of intervals [a, b), with a < b ∈
{1, . . . , |P e |, ∞}. Let us write ζ(∞) = ∞.
We define T e to be a collection of pairs of points in P e × (P e ∪ ∞), as follows:
T e = {(ζ e (a), ζ e (b)) | [a, b) ∈ B(M e )}.
29
This completes the definition of A• (M ).
Remark 3.6. A• (M ) is completely determined by the fibered barcode B(M ) and the set
S. Indeed, A(M ) is completely determined by S, and using Proposition 1.2, it’s easy to
see that T e is completely determined by B(M ) and S. The main result of the next section,
Theorem 4.1, shows that conversely, A• (M ) completely determines B(M ), and does so in
a simple way.
4
Querying the Augmented Arrangement
In the previous section, we defined the augmented arrangement A• (M ) of a finitely presented 2-D persistence module M . We now explain how A• (M ) encodes the fibered barcode
B(M ). That is, for a given L ∈ L̄, we explain how to recover B(M L ) from A• (M ). The
main result of this section, Theorem 4.1, is the basis of our algorithm for querying A• (M ).
We describe the computational details of our query algorithm in Section 4.3.
Recall that the procedure for querying A• (M ) for a barcode B(M L ) was discussed for
the case of generic lines L in Section 1.8. More generally, for any L ∈ L̄, querying A• (M )
for the barcode B(M L ) involves two steps. First, we choose a 2-cell e in A(M ); if L ∈ L,
then e is a 2-dimensional coface of the cell in containing D` (L). Second, we obtain the
intervals of B(M L ) from the pairs of T e by pushing the points in each pair (a, b) ∈ T e onto
the line L, via the map pushL of Section 3.2.
We now describe in more detail the first step of selecting the 2-D coface e.
4.1
Selecting a 2-D Coface e of L
For L ∈ L̄, we choose the 2-D coface e of L as follows:
• If L ∈ L◦ , then there exists a 2-cell of A(M ) whose closure contains D` (L); we take
e to be any such 2-cell.
• If L is horizontal, then the 2-D cofaces of the cell containing D` (L) are ordered
vertically in [0, ∞) × R; we take e to be the bottom coface. (Note that D` (L) has
only one 2-D coface unless L contains an anchor.)
• For L vertical, say L is the line x = a, let L0 be the line in the arrangement A(M )
of maximum slope, amongst those having slope less than or equal to a, if a unique
such line exists; if there are several such lines, take L0 to be the one with the largest
y-intercept. If such L0 exists, it contains a unique unbounded 1-cell in a. We take
e to be the 2-cell lying directly above this 1-cell. If such a line L0 does not exist,
then we take e to be the bottom unbounded 2-cell of A(M ); since we assume all
x-coordinates of S to be non-negative, this cell is uniquely defined.
The selection of cofaces for several lines is illustrated in Fig. 9.
30
e3
L2
L1
e1
D` (L2 ) e
2
D` (L1 )
L3
(a)
(b)
Figure 9: Three anchors are drawn as black dots in (a); the corresponding line arrangement A(M )
is shown in (b). For each line Li in (a), the dual point D` (Li ) and the corresponding 2-cell ei , chosen
as in Section 4.1, are shown in (b) in the same color.
4.2
The Query Theorem
Here is the main mathematical result underlying RIVET:
Theorem 4.1 (Querying the Augmented Arrangement). For any line L ∈ L̄ and e a 2-cell
chosen as in Section 4.1, the barcode obtained by restricting M to L is:
B(M L ) = { [pushL (a), pushL (b)) | (a, b) ∈ T e , pushL (a) < pushL (b) }.
Note that if L is such that D` (L) lies in a 2-cell of A(M ), then pushL (a) < pushL (b)
for all (a, b) ∈ T e , so the theorem statement simplifies for such L. In general, however, it
is possible to have pushL (a) = pushL (b).
Proof of Theorem 4.1. We prove the result for the case L ∈ L◦ ; the proof for L horizontal
or vertical is similar, but easier, and is left to the reader. The result holds trivially if
M∼
6 0.
= 0. Assume then that M ∼
=
Let e be a 2-D coface of the cell containing Dp (L). To keep notation simple, we will
write push = pushL and ζ = ζ e .
Keeping Remark 2.12 in mind, we define a 1-D grid G : Z → L. To do so, we first define
the restriction of G to {1, . . . , |P e |} by taking
G(z) = push ◦ ζ(z);
note that this is non-decreasing. We choose an arbitrary extension of this to a 1-D grid
G : Z → L.
By Proposition 2.11, to finish the proof it suffices to show that M L is a continuous
extension of M e along G; i.e., that there exists an isomorphism α : EG (M e ) → M L .
31
Given t ∈ L, let
z = max {w ∈ Z | G(w) = flG (t)}.
Note that we have
e
EG (M )t =
Mze
(
Mζ(z)
=
0
if z ≥ 1,
if z < 1.
Note also that
G(z) ≤ t < G(z + 1).
To define the maps αt : EG
(M e )
z < 1,
t
→
MtL ,
(4.1)
we will consider separately the three cases
1 ≤ z < |P e |,
and
z ≥ |P e |.
For a ∈ Rn , recall the definition of IM (a) from immediately above Lemma 2.8, and
note that G(1) = push ◦ ζ(1) is the minimal element a of L (with respect to the partial
order on R2 ) such that IM (a) 6= ∅. Hence by Eq. (4.1), if z < 1 then IM (t) = ∅, so
MtL = 0. Further, if z < 1, then EG (M e )t = 0. Thus for z < 1, we (necessarily) take the
isomorphism αt : EG (M e )t → MtL to be the zero map.
For 1 ≤ z < |P e |, Eq. (4.1) and the definition of G give that
push ◦ ζ(z) ≤ t < push ◦ ζ(z + 1).
This implies
ζ(z) ≤ t 6≥ ζ(z + 1),
so IM (ζ(z)) = IM (t). Thus M (ζ(z), t) is an isomorphism by Lemma 2.8. Since EG (M e )t =
Mζ(z) , we may regard the map M (ζ(z), t) as an isomorphism αt : EG (M e )t → Mt = MtL .
For z ≥ |P e |, we have that ζ(z) = lub(S), so IM (ζ(z)) = S. Further, the chain of
inequalities
ζ(z) = lub(S) ≤ push ◦ lub(S) = G(|P e |) ≤ G(z) ≤ t
gives that ζ(z) ≤ t, and further that S = IM (ζ(z)) ⊆ IM (t) ⊆ S, so in fact
IM (ζ(z)) = IM (t) = S.
Then by Lemma 2.8 again, M (ζ(z), t) is an isomorphism, which as above, can be interpreted
as an isomorphism αt : EG (M e )t → MtL .
We have now defined isomorphisms αt : EG (M e )t → MtL for all t ∈ L. Clearly, these
isomorphisms commute with internal maps in EG (M e ) and M L , so they define an isomorphism α : EG (M e ) → M L , as desired.
4.3
Computational Details of Queries
We next explain the computational details of storing and querying A• (M ). We also give
the complexity analysis of our query algorithm, proving Theorem 1.3.
32
DCEL Representation of A(M ). As noted in the introduction, we represent the line
arrangement A(M ) that underlies A• (M ) using the DCEL data structure [29], a standard
data structure for representing line arrangements in computational geometry. The DCEL
consists of a collection of vertices, edges, and 2-cells, together with a collection of pointers
specifying how the cells fit together to form a decomposition of [0, ∞) × R.
Representing the Barcode Templates. To represent the augmented arrangement
A• (M ), we store the barcode template T e at each 2-cell e in the DCEL representation
of A(M ). Recall that T e is a multiset; this means a pair (a, b) may appear in T e multiple
times. We thus store T e as a list of triples (a, b, k), where k ∈ N gives the multiplicity of
(a, b) in T e .
Our Query Algorithm. Given a line L ∈ L̄, the query of A• (M ) for B(M L ) proceeds in
two steps. The first step performs a search for the 2-cell e of A(M ) specified in Section 4.1.
Once the 2-cell e is selected, we obtain B(M L ) from T e by applying pushL to the endpoints
of each pair (a, b) ∈ T e .
Let us describe our algorithm to find the 2-cell e in detail. In the case that L ∈ L
(i.e., L is not vertical), it suffices to find the cell of A(M ) containing D` (L). In general,
the problem of finding the cell in a line arrangement containing a given query point is
known as the point location problem; this is a very well studied problem in computational
geometry. When we need to perform many point location queries on an arrangement, or
when we need to perform the queries in real time, it is standard practice to precompute a
data structure on the which point locations can be performed very efficiently [44]; this is
the approach we take. For v the number of vertices in the arrangement, there are a number
of different strategies which, in time O(v log v), compute a data structure of size O(v) on
which we can perform a point location query in time O(log v). A(M ) has O(κ2 ) vertices,
so computing such a data structure for A(M ) takes time O(κ2 log κ). The data structure
is of size O(κ2 ), and the point location query takes time O(log κ).
In the case that L is vertical, D` (L) is not defined, and we need to take a different
approach to find the 2-cell e. We precompute a separate (simpler) search data structure to
handle this case: Let Y denote the set of lines J in A(M ) such that there is no other line
in A(M ) with the same slope lying above J. We compute a 1-D array which contains, for
each J ∈ Y, a pointer to the rightmost (unbounded) 1-cell of A(M ) contained in J, sorted
according to slope. Given A(M ), computing this array takes O(nl ) time, where nl = O(κ)
is the number of anchor lines. Once the array has been computed, for any vertical line L,
we can find the appropriate 2-cell e via a binary search over the array. This takes log nl
time.
We are now ready to prove our result from the introduction on the cost of querying
•
A (M ).
Proof of Theorem 1.3. From the discussion above, it is clear that once we have precom33
puted the appropriate data structures, finding the cell e takes O(log κ) time. Each evaluation of pushL takes constant time, so computing B(M L ) from T e takes total time O(|T e |).
Thus, the total time to query A• (M ) for B(M L ) is O(|T e | + log κ). If D` (L) ∈ e, then
|T e | = |B(M L )|; this gives Theorem 1.3 (i). If, on the other hand, D` (L) 6∈ e, then we
0
may not have |T e | = |B(M L )|, but we do have |T e | = |B(M L )|, for L0 an arbitrarily small
perturbation of L with D` (L0 ) ∈ e. Theorem 1.3 (ii) follows.
Computing the Arrangement A(M )
5
We now turn to the specification of our algorithm for computing A(M ). First, in Sections 5.1 and 5.2, we specify the algebraic objects which serve as the input to our algorithm,
and explain how these objects arise from bifiltrations.
5.1
Free Implicit Representations of Persistence Modules: The Input to
our Algorithm
For k ≥ 1, define [k] to be the set of integers {1, . . . , k}, and let [0] denote the empty
set. Define a free implicit representation (FI-rep) of an n-D persistence module M to be a
quadruple Φ = (gr1 , gr2 , D1 , D2 ), such that:
• For i = 1, 2, gri : [mi ] → Rn is a function, for some mi ≥ 0.
• D1 and D2 are matrices with coefficients in K, of respective dimensions m0 × m1 and
m1 × m2 , for some m0 ≥ 0. Note that either D1 or D2 may be an empty matrix if
mi = 0.
• If m1 = 0, then M ∼
= 0.
• If m1 > 0, let gr0 : [m0 ] → Rn denote the constant function mapping to the greatest
lower bound of im gr1 . Then, defining ordered n-graded sets Wi := ([mi ], gri ) for
i = 0, 1, 2, we require that (in the notation of Section 2.2), D1 = [∂1 ] and D2 = [∂2 ]
are the matrix representations, respectively, of maps
∂1 : Free(W1 ) → Free(W0 ),
∂2 : Free(W2 ) → Free(W1 )
such that ∂1 ◦ ∂2 = 0 and M ∼
= ker ∂1 / im ∂2 .
We refer to (m0 , m1 , m2 ), defined above, as the dimensions of Φ, and write M ∼
= HΦ. Note
that a presentation of M is an FI-rep of M in the degenerate case that m0 = 0, so that D1
is an empty matrix.
Our algorithm for computing the augmented arrangement of a finitely presented 2-D
persistence module M takes as input an FI-rep of M .
34
Storing a Free Implicit Representation in Memory. We store the matrices D1
and D2 in a column-sparse data structure, as used in the standard persistent homology
algorithm [47]. Columns of Dj are stored in an array of size mj ; the ith column is stored
as a list in position i of the array. We also store grj (i) at position i of the same array.
5.2
Motivation: Free Implicit Representations From Finite Filtrations
We are interested in studying the ith persistent homology module Hi F of a finite bifiltration
F arising from data. Our choice to represent a 2-D persistence module via an FI-rep is
motivated by the fact that in practice, one typically has ready access to an FI-rep of Hi F.
In contrast, we generally do not have direct access to a presentation of Hi F at the outset,
and while there are known algorithms for computing one [36], they are computationally
expensive [12].
We’ll now describe in more detail how FI-reps of persistent homology modules arise in
practice.
The Chain Complexes of Multi-filtrations. Recall from Section 1.2 that an n-D
filtration is a functor F : Rn → Simp such that the map Fa → Fb is an inclusion
whenever a ≤ b ∈ Rn . F gives rise to a chain complex CF of n-D persistence modules,
given by
∂j+2
∂j+1
∂j
∂j−1
· · · −−−→ Cj+1 F −−−→ Cj F −→ Cj−1 F −−−→ · · · ,
where
• we define Cj F by taking the vector space (Cj F)a to be generated by the j-simplices
of Fa , and taking the map Cj F(a, b) to be induced by the inclusion Fa ,→ Fb ,
• the morphism ∂j is induced by the j th boundary maps of the simplicial complexes
Fa .
Note that Hj F ∼
= ker ∂j / im ∂j+1 .
1-Critical and Multi-critical Filtrations. To explain how FI-reps arise from finite
bifiltrations, it is helpful to first consider a special case: Following [12], we define a 1critical filtration F to be a finite n-D filtration where for each s ∈ Fmax , |A(s)| = 1; here,
as in Section 1.2, A(s) denotes the set of grades of appearance of s. If F is finite and not
1-critical, we say F is multi-critical.
Bifiltrations arising in TDA applications are often (but not always) 1-critical. For
example, for P a finite metric space and γ : P → R a function, the bifiltration Rips(γ)
of Section 1.3 is 1-critical, but the filtration B-Rips(P ) of that section generally is not
1-critical.
35
It’s easy to see that if F is 1-critical, then each Cj F is free; we have an obvious
isomorphism between Cj F and Free[Fj ], for Fj the n-graded set given by
Fj ≡ {(s, A(s)) | s a j-simplex in Fmax }.
Thus, choosing an order for each Fj , the boundary map ∂j : Cj F → Cj−1 F can be
represented with respect to Fj , Fj−1 by a matrix [∂j ] with coefficients in the field K, as
explained in Section 2.2; [∂j ] is exactly the usual matrix representation of the j th boundary
map of Fmax .
Free Implicit Representations of Hi F in the 1-Critical Case. The ordered ngraded sets Fj and matrices [∂j ] determine the chain complex CF, and hence each of the
homology modules Hj F up to isomorphism. In fact, for Oj : Fj → {1, 2, . . . , |Fj |} the
total order on Fj , we have that
−1
, [∂j ], [∂j+1 ], )
(grFj ◦ Oj−1 , grFj+1 ◦ Oj+1
is an FI-rep of Hj F, for any j ≥ 0.
Free Implicit Representations of Hi F in the Multi-Critical case. For F a multicritical filtration, the modules Cj F are not free. Nevertheless, as explained in [16], there
is an easy construction of an FI-rep
Φ = (gr1 , gr2 , D1 , D2 )
of Hj F, generalizing the construction given above in the 1-critical setting. Letting
X
lj =
|A(s)|,
s a j-simplex
in Fmax
the dimensions (m0 , m1 , m2 ) of Φ satisfy the following bounds when F is a bifiltration:
m0 ≤ lj−1 ,
m1 ≤ lj ,
m2 ≤ lj+1 + lj − 1;
(5.1)
see [16] for details.
Computation of the Free Implicit Representation of a Bifiltration. As explained
in Section 1.2, we can store a finite simplicial bifiltration in memory as a simplicial complex,
together with a list of grades of appearance for every simplex. Let F be a finite (one-critical
or multi-critical) bifiltration of size l. It’s not hard to show that given this input, for any
i ≥ 0 we can compute the FI-rep of Hi F described above in time O(l log l).
36
One Homology Index at a Time, or All Homology Indices at Once? The standard algorithms for computing persistence barcodes of a 1-D filtration F compute B(Hi F)
for all i up to a specified integer, in a single pass. When one is interested in the barcodes
at each homology index, this is more efficient than doing the computations one index at a
time, because the computations of B(Hi F) and B(Hi+1 F) share some computational work.
In contrast, the algorithm described in this paper, and implemented in the present
version of RIVET, computes A• (Hi F) of a finite bifiltration F, for a single choice of i ≥ 0.
This approach allows us to save computational effort when we are only interested in a
single homology module, and seems to be the more natural approach when working with
multi-critical filtrations.
That said, within the RIVET framework, for a 1-critical bifiltration F one can also
handle all persistence modules Hi F, for i up to a specified integer, in a single pass.2
5.3
Computation of Betti Numbers
Our first step in the computation of A(M ) is to compute S = supp ξ0 (M ) ∪ supp ξ1 (M ).
Since RIVET also visualizes the Betti numbers of M directly, we choose to compute this
by fully computing ξ0 and ξ1 . (In any case, we do not know of any algorithm for computing
S that is significantly more efficient than our algorithm for fully computing ξ0 and ξ1 .)
Computing Betti Numbers of Z2 -indexed Persistence Modules. We can define a
FI-rep Φ = (gr1 , gr2 , D1 , D2 ) of a Z2 -indexed persistence module Q just as we have for an
R2 -indexed persistence module above; in this case the functions gr1 and gr2 take values in
Z2 .
In a companion article [41], we show how to fully compute ξ0 (Q), ξ1 (Q), and ξ2 (Q),
given Φ; the algorithm runs in time runs in time O(m3 ), for (m0 , m1 , m2 ) the dimensions
of Φ and m = m0 + m1 + m2 .
One way to compute the bigraded Betti numbers of M , quite standard in computational
commutative algebra, is to compute a free resolution for M [37]. However, this gives us more
than we need for our particular application. Instead of following this route, our algorithm
computes the Betti numbers via carefully scheduled column reductions on matrices, taking
advantage of a well-known characterization of Betti numbers in terms of the homology of
Kozul complexes [34].
The natural way to do this is not to compute
A• (Hi F) for each 1 ≤ i ≤ l, but rather to compute
• Ll
the single augmented line arrangement A ( i=1 Hi F), labeling the intervals of the discrete barcode at
L
L
each 2-cell of A( li=1 Hi F) by homology degree, so that a query of A• ( li=1 Hi F) provides the homology
Ll
L
degree of each interval of B( i=1 (Hi F)L ). This “labeled” variant of A• ( li=1 Hi F) can be computed
using essentially the same algorithm as presented in this paper for computation of a single augmented
arrangement.
L
When F is not 1-critical, to compute A• ( li=1 Hi F), we need to first replace C(F) by a chain complex
of free 2-D persistence modules. As noted in [12], this can be done via a mapping telescope construction,
though this may significantly increase the size of C(F).
2
37
Computing Betti Numbers of R2 -indexed Persistence Modules. In fact, our algorithm for computing Betti numbers in the discrete setting can also be used to compute
the bigraded Betti numbers of a finitely presented R2 -indexed persistence module. Indeed,
as we will now explain, a FI-rep (gr1 , gr2 , D1 , D2 ) of an R2 -indexed persistence module M
induces a discrete FI-rep Φ = (gr01 , gr02 , D1 , D2 ) and an injective 2-D grid G : Z2 → R2 such
that M is a continuous extension of M along HΦ. (The matrices D1 , D2 are the same in
the two free implicit representations). Given this, we can compute the multigraded Betti
numbers of HΦ using the algorithm of [41] and deduce the multigraded Betti numbers of
M from those of HΦ, by Proposition 2.10.
The construction of Φ and the 2-D grid G are simple: Let ox (respectively, oy ) denote
the ordered set of unique x-coordinates (y-coordinates) of elements of im gr1 ∪ im gr2 . Let
nx = |ox | and ny = |oy |. Let Ωx : [nx ] → ox be the bijection sending i to the ith element of
ox ; define Ωy : [ny ] → oy analogously. We choose G : Z2 → R2 to be an arbitrary extension
of
Ωx × Ωy : [nx ] × [ny ] → ox × oy .
For j = 1, 2, we define gr0j to be the Z2 -valued function (Ωx × Ωy )−1 ◦ grj .
We leave to the reader the easy check that M is a continuous extension of HΦ along G.
5.4
Computation and Storage of Anchors and Template Points
Recall from Section 3.1 that an anchor is the least upper bound of a weakly incomparable
pair of points in S, and that the set of anchors determines the line arrangement A(M ).
In this section, we will let A denote the set of anchors. To compute the line arrangement
A(M ), we need to first compute a list anchors of all elements of A.
Moreover, our algorithm for computing the barcode templates, described in Section 6,
requires us to represent the set
[
P :=
Pe
e a 2-cell in A(M )
of all template points using a certain sparse matrix data structure. It’s easy to see that
P = A ∪ S.
We will see that because of this, it is convenient to compute the list anchors and the sparse
matrix representation of P at the same time.
In this section, we specify our data structure for P and describe our algorithm for
simultaneously computing both this data structure and the list anchors.
Sparse Matrix Data Structure for P. Note that S ⊆ im(Ωx × Ωy ). Given this, it’s
easy to see that also P ⊆ im(Ωx × Ωy ). Thus, to store P, it suffices to store (Ωx × Ωy )−1 (P)
and the maps Ωx and Ωy . We store Ωx and Ωy in two arrays of size nx and ny , and we
38
store (Ωx × Ωy )−1 (P) in a sparse matrix tPtsMat of size nx × ny . The triple (tPtsMat, Ωx ,
Ωy ) is our data structure for P.
Henceforth, to keep notation simple, we will assume that Ωx and Ωy are the identity
maps on [nx ] and [ny ] respectively, so that (Ωx × Ωy )−1 (P) = P.
Let us now describe tPtsMat in detail. An example tPtsMat is shown in Fig. 10. Each
element u ∈ P is represented in tPtsMat by a quintuple
(u, pl , pd , levSet1 (u), levSet2 (u)).
In this quintuple, pl and pd are pointers (possibly null); pl points to the element of P
immediately to the left of u, and pd points to the element of P immediately below u. The
objects levSet1 (u), levSet2 (u) are lists used in the computation of the barcode templates
T e . Initially, these lists are empty. We discuss them further in Section 6.
The data structure tPtsMat also contains an array rows of pointers, of length ny ; the
ith entry of rows points to the rightmost element of P with y-coordinate i.
1
2
3
4
5
6
7
8
9 10
7
6
5
4
3
2
1
rows
Figure 10: Example of tPtsMat for nx = 10 and ny = 7. Each element of P is represented
by a square. Shaded squares represent elements of S, and squares with solid borders represent
anchors. Each entry contains pointers to the next entries down and to the left; non-null pointers
are illustrated by arrows. The lists levSet1 (u) and levSet2 (u) stored at each u ∈ P are not shown.
Computation of tPtsMat and anchors. Our algorithm for computing Betti numbers,
given in [41], computes ξ0 (M )(u) and ξ1 (M )(u) at each bigrade u ∈ [nx ] × [ny ] by iterating
through [nx ] × [ny ] in lexicographical order. As we iterate through [nx ] × [ny ], it is easy to
also compute both tPtsMat and the list anchors. Let us explain this in detail.
Upon initialization, anchors is empty, tPtsMat contains no entries, and all pointers in
rows are null. We create a temporary array columns of pointers, of length nx , with each
pointer initially null.
39
At each u ∈ [nx ] × [ny ], once the Betti numbers at u have been computed, if u ∈
A, then we add u to the list anchors. If u ∈ S ∪ A = P, then we add the quintuple
(u, rows[u2 ], columns[u1 ], [ ], [ ]) to tPtsMat, and set rows[u2 ] and columns[u1 ] to both point
to u. These updates to columns and rows ensure that:
• For each i ∈ [ny ], rows[i] always points to the rightmost entry with y-coordinate i
added to tPtsMat thus far;
• For each j ∈ [nx ], columns[j] always points to the topmost entry with x-coordinate j
added to tPtsMat thus far.
It remains to explain how we determine whether u ∈ A. Note that u ∈ A if and only if
at least one of the following two conditions holds when we visit u:
1. Both rows[u2 ] and columns[u1 ] are not null.
2. u ∈ S and either rows[u2 ] or columns[u1 ] is not null.
Using this fact, we can check whether u ∈ A in constant time.
Beyond the O(m3 ) time required to compute S, this algorithm for computing tPtsMat
and anchors takes O(nx × ny ) = O(m2 ) time.
5.5
Building the Line Arrangement
Recall that the anchors of M correspond under point-line duality to the lines in the arrangement A(M ). Thus, once the list of anchors has been determined, we are ready to
build the DCEL representation of A(M ). For this, our implementation of RIVET uses the
well-known Bentley-Ottmann algorithm [29], which constructs the DCEL representation of
a line arrangement with n lines and k vertices in time O((n + k) log n). Since our arrangement contains O(κ) lines and O(κ2 ) vertices, the algorithm requires O(κ2 log κ) elementary
operations.
As explained in Section 3.1, the number of cells in A(M ) is O(κ2 ). The size of the DCEL
representation of any arrangement is of order the number of cells in the arrangement, so
the size of the DCEL representation of A(M ) is also O(κ2 ).
Remark 5.1. The κ2 log κ term in the bound of Theorem 1.4 (ii) arises from our use of the
Bentley-Ottmann algorithm. There are asymptotically faster algorithms for constructing
line arrangements that would give a slightly smaller term in the bound of Theorem 1.4 (ii)—
in fact, we can remove the log κ factor. However, the Bentley-Ottmann algorithm, which
is relatively simple and performs well in practice, is a standard choice.
Each 1-cell e in A(M ) lies on the line dual to some anchor α. In our DCEL representation of A(M ), we store a pointer at e to the entry of tPtsMat corresponding to
α.
40
Numerical Considerations. Line arrangement computations, as with many computations in computational geometry, are notoriously sensitive to numerical errors that arise
from floating-point arithmetic. Much effort has been invested in the development of smart
arithmetic models for computational geometry which allow us to avoid the errors inexact
arithmetic can produce, without giving up too much computational efficiency [7]. Because
exact arithmetic is generally far more computationally expensive than floating-point arithmetic, these models typically take a hybrid approach, relying on floating-point arithmetic
in cases where the resulting errors are certain to not cause problems, and switching over
to exact arithmetic for calculations where the errors could be problematic. Our implementation of RIVET relies on a simple such hybrid model specially tailored to the problem at
hand.
6
Computing the Barcode Templates
Once we have found all anchors and constructed the line arrangement A(M ), we are ready
to complete the computation of A• (M ) by computing the barcode templates T e for all
2-cells e of A(M ). This section describes our core algorithm for this. In Section 8.1, we
describe a refinement of the algorithm which performs significantly faster in practice.
The input to our algorithm consists of three parts:
1. A FI-rep Φ of M , represented in the way described in Section 5.1,
2. Our sparse matrix representation tPtsMat of the set P of all template points,
3. A DCEL representation of the line arrangement A(M ).
Recall that Φ is given to us as input to our algorithm for computing A• (M ); the computation of tPtsMat and A(M ) from Φ has already been described above.
Recall from Section 3.3 that
T e = {(ζ e (y), ζ e (z)) | [y, z) ∈ B(M e )}.
Thus, to compute T e at each 2-cell e, it suffices to compute the pair (B(M e ), ζ e ) at each
2-cell e. This is essentially what our algorithm does, though it turns out to be unnecessary
to explicitly store either B(M e ) or ζ e at any point in the computation.
Note that M ∼
= 0 if and only if S = ∅, if and only if each T e = ∅. Thus, we may assume
∼
that M =
6 0.
6.1
Trimming the Free Implicit Representation
Let
box(S) = {y ∈ R2 | y ≤ lub S}.
41
We say a FI-rep Φ0 = (gr01 , gr02 , D10 , D20 ) for M is trimmed if
im gr01 ∪ im gr02 ∈ box(S).
As a preliminary step in preparation for the computation of the barcode templates, if
Φ is not already trimmed we replace Φ with a smaller trimmed FI-rep. While it is possible
to work directly with an untrimmed FI-rep to compute the barcode templates, it is more
efficient to work with a trimmed one. In addition, assuming that our FI-rep is trimmed
allows for some simplifications in the description of our algorithm.
For j = 1, 2, let lj = | gr−1
j (box(S))|. There is a unique order-preserving map
ηj : [lj ] → gr−1
j (box(S)).
We define gr0j = grj ◦ ηj . We define D10 to be the submatrix of D1 whose columns correspond
to elements of im η1 , and we define D20 to be the submatrix of D2 whose rows and columns
correspond to elements of im η1 and im η2 , respectively. Let
Φ0 = (gr01 , gr02 , D10 , D20 ).
Proposition 6.1. H(Φ0 ) ∼
= M.
Proof. Associated to Φ and Φ0 we have respective chain complexes of free modules
∂
∂
∂0
∂0
2
1
F2 −→
F1 −→
F0
1
2
F00 ,
F10 −→
F20 −→
with ker ∂1 / im ∂2 = H(Φ) ∼
= M and ker ∂10 / im ∂20 = H(Φ0 ), as in the definition of a FI-rep;
further, since Φ0 is a trimming of Φ, we have obvious maps ψ j : Fj0 ,→ Fj for j = 0, 1, 2,
making the following diagram commute:
F2
∂2
ψ2
F20
F1
∂1
ψ1
∂20
F10
F0
ψ0
∂10
F00
The maps ψ i induce a map ψ : H(Φ0 ) → H(Φ) ∼
= M . It’s easy to see that ψa is an
isomorphism for a ∈ box(S). To finish the proof, it remains to check that ψb is also
an isomorphism for b 6∈ box(S). For b 6∈ box(S), there is a unique element a ∈ box(S)
minimizing the distance to b. Note that a < b. By commutativity, it suffices to see
that M (a, b) is an isomorphism and H(Φ0 )(a, b) is an isomorphism. Lemma 2.8 gives that
M (a, b) is an isomorphism, and since im gr01 ∪ im gr02 ∈ box(S), it’s easy to see directly that
H(Φ0 )(a, b) is an isomorphism.
42
Clearly, Φ0 is trimmed. Given tPtsMat and our column-sparse representation of Φ, we
can compute Φ0 from Φ in O(m + d) time, where d = O(m2 ) is the number of non-zero
entries of D2 .
Henceforth we will assume that Φ, the FI-rep of M given as input to our algorithm, is
trimmed.
6.2
RU -Decompositions and Computation of Persistence Barcodes
To prepare for a description of our algorithm for computing the barcode templates, we begin
with some preliminaries on the computation of persistence barcodes. There is a large and
growing body of work on this topic; see [42] for a recent overview with an emphasis on
publicly available software. We restrict attention here to what is needed to explain our
algorithm.
The standard algorithm for computing persistence barcodes was introduced in [47],
building on ideas in [32]; see also [31] for a succinct description of the algorithm, together
with implementation details.
The algorithm takes as input a FI-rep Φ = (gr1 , gr2 , D1 , D2 ) of a 1-D persistence module, with gr1 and gr2 non-decreasing, and returns B(HΦ). Of course, in applications Φ
typically comes from the chain complex of a 1-D filtration, with the simplices in each
dimension ordered according to their grade of appearance.
The algorithm is a variant of Gaussian elimination; it performs column additions to
construct certain factorizations of D1 and D2 , from which the barcode B(M ) can be read
off directly. Let us explain this in more detail, drawing on ideas introduced in [25]: Let
R be an m × n matrix, and for j the index of a non-zero column of R, let Λ(R, j) denote
the maximum row index of a non-zero entry in column j of R. We say R is reduced if
Λ(R, j) 6= Λ(R, j 0 ) whenever j 6= j 0 are the indices of non-zero columns in R.
The standard persistence algorithm yields a decomposition D = RU of any matrix D
with coefficients in the field K, where R is reduced, and U is an upper-triangular matrix.
For D an r × s matrix, the algorithm runs in time O(rs2 ).
We define an RU -decomposition of Φ simply to be a pair of RU -decompositions D1 =
R1 U1 and D2 = R2 U2 . We can read B(M ) off of R1 and R2 . To explain this, suppose Φ is
of dimensions (m0 , m1 , m2 ), and let Ri (∗, j) denote the j th column of Ri . Define
Pairs(Φ) := {(Λ(R2 , j), j) ∈ [m1 ] × [m2 ] | R2 (∗, j) 6= 0}
Ess(Φ) := {j ∈ [m1 ] | R1 (∗, j) = 0 and j 6= Λ(R2 , k) for any column k of R2 .}
While the RU -decomposition of a matrix is not unique, it is shown in [25] that Pairs(Φ)
and Ess(Φ) are independent of the choice of RU -decomposition of Φ.
Theorem 6.2 ([31, 47]).
B(M ) = [gr1 (j), gr2 (k)) | (j, k) ∈ Pairs(Φ) ∪ [gr1 (j), ∞) | j ∈ Ess(Φ) .
43
Vineyard Updates to Barcode Computations. Suppose that D is a d1 × d2 matrix,
and that D0 is obtained from D by transposing either two adjacent rows or two adjacent
columns of D. [25] introduces an algorithm, known as the vineyard algorithm, for updating
an RU -decomposition of D to obtain an RU -decomposition of D0 in time O(d1 + d2 ). This
algorithm is an essential subroutine in our algorithm for computing the barcode templates.
6.3
Permutations of Free Implicit Representations
As mentioned above, the standard persistence algorithm takes as input a FI-rep of a 1-D
persistence module Φ = (gr1 , gr2 , D1 , D2 ), with gr1 and gr2 non-decreasing. The reason
we need gr1 and gr2 to be non-decreasing is that the formula Theorem 6.2 for reading the
barcode off of the RU -decomposition holds only under this assumption on gr1 and gr2 .
Now suppose that we are given a 1-D FI-rep Φ = (gr1 , gr2 , D1 , D2 ) with either gr1
or gr2 not non-decreasing. How can we modify Φ to obtain a FI-rep Φ0 of H(Φ) with
non-decreasing grade functions, so that we can read the barcode of H(Φ) off of an RU decomposition of Φ0 ? We now answer this question.
It is easy to check that the following lemma holds.
Lemma 6.3. Suppose Φ = (gr1 , gr2 , D1 , D2 ) is a FI-rep of an n-D persistence module
M of dimensions (m0 , m1 , m2 ). Then for σ1 and σ2 any permutations on [m1 ] and [m2 ],
respectively, and P1 and P2 the corresponding permutation matrices, we have that
Φ0 := (gr1 ◦ σ1 , gr2 ◦ σ2 , D1 P1 , P1T D2 P2 )
is also a FI-rep of M .
Thus, in the case that M is 1-D, finding a FI-rep of M with non-decreasing grade
functions amounts to finding permutations σ1 and σ2 as above with gr1 ◦ σ1 and gr2 ◦ σ2
non-decreasing, and applying the corresponding permutations to the rows and columns of
P1 and P2 .
Finding the Permutations σj by Sorting. For j = 1, 2, we may use a sorting algorithm to find a permutation σj−1 which puts the list
grj (1), grj (2), . . . , grj (mj )
in non-decreasing order. The function gri ◦ σj is then non-decreasing. To take advantage
of the vineyard algorithm in our main algorithm, we will want to work with a sorting
algorithm which generates the permutation σj−1 as a product of transpositions of adjacent
elements in [mj ]. For this, we use the well known insertion-sort algorithm [26]. This yields
σj as a minimum length product of adjacent transpositions.
44
6.4
Induced Free Implicit Representations at Each 2-Cell
Using Lemma 6.3 above, we next show that for any 2-cell e in A(M ), Φ yields a FI-rep
Φe = (gre1 , gre2 , D1e , D2e )
of the discrete persistence module M e introduced in Section 3.3, with gre1 and gre2 nondecreasing. Thus, we can compute B(M e ) by computing an RU -decomposition of Φe .
Lift Maps.
a function
Recall the definition of the set of template points P e from Section 3.3. Define
lifte : box(S) → P e
by taking lifte (a) = u, for u the minimum element of P e such that a ≤ u (where as
0
elsewhere, < denotes the partial order order R2 ). In Fig. 11 we illustrate lifte and lifte for
a pair of adjacent 2-cells e and e0 .
u
L
u
L0
α
α
v
v
0
0
Figure 11: Illustration of lifte (left) and lifte (right) at two adjacent cells e and
S e e, containing
0
the duals of lines L and L , respectively. The black dots represent points of P = e P . Note that
0
0
0
u, α ∈ P e and v, α ∈ P e , but u 6∈ P e and v 6∈ P e . The maps lifte , lifte are illustrated by red
arrows, for a few sample points (purple dots). The shaded region in each figure is the subset of
0
box(S) on which lifte 6= lifte .
Let
orde : P e → {1, 2, . . . , |P e |}
denote the unique order-preserving bijection, i.e., the inverse of the restriction of ζ e to
{1, 2, . . . , |P e |}.
Free Implicit Representation of M e . Suppose that Φ = (gr1 , gr2 , D1 , D2 ), our FI-rep
of M , is of dimensions (m0 , m1 , m2 ). For j = 1, 2, let σje : [mj ] → [mj ] be any permutation
such that
grej := orde ◦ lifte ◦ grj ◦ σje : [mj ] → Z
45
is non-decreasing, and write σ e = (σ1e , σ2e ).
Let P1 and P2 denote the permutation matrices corresponding to σ1e and σ2e , respectively.
Let D1e = D1 P1 and D2e = P1T D2 P2 .
Proposition 6.4. Φe := (gre1 , gre2 , D1e , D2e ) is a FI-rep of M e .
Proof. It’s not hard to check that
(orde ◦ lifte ◦ gr1 , orde ◦ lifte ◦ gr2 , D1 , D2 )
is a FI-rep of M e . Given this, the result follows from Lemma 6.3.
Non-Uniqueness of Φe . In general, Φe is not uniquely defined, because it depends on
the pair of permutations σ e , which needn’t be unique. We will sometimes write Φe = Φ(σ e )
to emphasize the dependence on σ e . We say any σ e chosen as above is valid.
Reading off T e from an RU -Decomposition of Φe .
For j = 1, 2, let
fje = lifte ◦ grj ◦ σje = (orde )−1 ◦ grej ,
and write f e = (f1e , f2e ). We call f e the template map for Φe . Note that f e is independent
of the choice of a valid σ e .
From Theorem 6.2, Proposition 6.4, and the definition of the barcode template T e in
Section 3.3, we have the following relationship between Φe , f e , and T e :
T e = (f1e (j), f2e (k)) | (j, k) ∈ Pairs(Φe ) ∪ (f1e (j), ∞) | j ∈ Ess(Φe ) .
(6.1)
6.5
Our Algorithm
Eq. (6.1) tells us that for a 2-cell e in A(M ), to compute the barcode template T e it suffices
to compute the template map f e , along with the RU -decomposition of Φe = Φ(σ e ), for
some valid σ e . This is exactly what our algorithm does; we give a description of the
algorithm here, deferring some details to later sections.
We need to compute T e at every 2-cell e. A naı̈ve approach would be to do the
computation from scratch at each 2-cell e. However, we can do better, by leveraging the
work done at one cell to expedite the computation at a neighboring cell.
We proceed as follows: Let G denote the dual graph of A(M ); this is the undirected
graph with a vertex for each 2-cell e of A(M ), and an edge [e, e0 ] for each pair of adjacent
2-cells e, e0 ∈ A(M ). The dual graph is illustrated in Fig. 12. We compute a path Γ =
e0 , e1 , . . . ew in G which visits each 2-cell at least once. Our algorithm for computing Γ is
discussed below, in Section 6.6.
Let us adopt the convention of abbreviating an expression of the form (−)ei by (−)i .
For example, we write f ei as f i .
46
b
a
c
d
f
i
e
g
h
Figure 12: The line arrangement A(M ) (in grey), together with its dual graph G (in blue). The
path Γ through G might visit the vertices in the order a, b, c, d, e, f , e, g, h, i.
Once we have computed Γ, for each i = 1, . . . , w, we compute the template map f i
and an RU -decomposition of Φ(σ i ) = (gri1 , gri2 , D1i , D2i ), for some valid choice of σ i . We
proceed in order of increasing i.
For j = 1, 2, we store fji in memory by separately storing its factors lifti−1 ◦ grj and
σji−1 ; we discuss the data structures for this in Section 6.7. Thus, to compute fji , we
compute both lifti−1 ◦ grj and σji−1 .
The initial cell e0 is chosen in a way that allows for a simple combinatorial algorithm
to compute lift0 ◦ grj and σj0 ; see Section 6.8. Letting Pj denote the matrix representation
of σj0 , we have that
D10 = D1 P1 ,
D20 = P1T D2 P2 .
Thus, D10 and D20 can be obtained from D1 and D2 by performing row and column permutations. Given D10 and D20 , we compute an RU -decomposition of Φ0 via an application of
the standard persistence algorithm.
For 1 ≤ i ≤ w, we compute f i as an update of f i−1 , and we compute the RU decomposition of Φi as an update of the RU -decomposition of Φi−1 . Let us explain this in
more detail (with yet more detail to come in later sections). To update fji−1 , we update
both lifti−1 ◦ grj and σji−1 . First, we update lifti−1 ◦ grj to obtain lifti ◦ grj ; details of this
computation are given in Section 6.9. Second, we update σji−1 to obtain σji as follows.
Define
gr
˜ ij := ordi ◦ lifti ◦ grj ◦ σji−1 .
Note the distinction between gr
˜ ij and grij : the former is defined in terms of σji−1 , while the
i
latter is defined in terms of σj .
Applying the insertion-sort algorithm to gr
˜ ij , we compute a sequence of transpositions
of adjacent elements in [mj ] such that, for τj−1 : [mj ] → [mj ] the composition of these
47
transpositions, gr
˜ ij ◦ τj is non-decreasing. We take σji = σji−1 ◦ τj . Clearly, then,
grij = ordi ◦ lifti ◦ grj ◦ σji
is non-decreasing, so σ i is valid.
Note that for Pj the matrix representation of τj , we have
D1i = D1i−1 P1 ,
D2i = P1T D2i−1 P2 .
To compute an RU -decomposition of Φi (σ e ) from our RU -decomposition of Φi−1 (σ e ),
we exploit the decomposition of τj−1 as a sequence of transpositions provided by the
insertion-sort algorithm, and apply the RU -update algorithm of [25] repeatedly, performing an update of the RU -decomposition for each transposition in the sequence. We note
that neither τ , nor τ −1 , nor the decomposition of τj−1 into transpositions ever needs to
be stored explicitly in memory. Rather, we use each transposition to perform part of the
update as soon as it is computed; after this, there is no need to store the transposition.
It remains to explain how we compute Γ, lift0 ◦ grj , and σ 0 , and how we update
lifti−1 ◦ grj to obtain lifti ◦ grj . In what follows, we explain all of this, and also fill in
some details about the data structures used by our algorithm.
6.6
Computing the Path Γ
We first explain how we choose the path Γ = e0 , e1 , . . . , ew . As above, let G be the dual
graph of the line arrangement A(M ). To compute Γ, we first compute a weight for each edge
of G. The weight of [e, e0 ] is chosen to be an estimate of the amount of work our algorithm
must do to pass between cells e and e0 , in either direction. We defer the details of how
we define and compute these edge weights until Section 6.10. While the choice of edge
weights impacts our choice of Γ, and hence the speed of our algorithm for computing the
barcode templates, our asymptotic complexity bounds for our algorithm are independent
of the choice of edge weights.
We take e0 to be the topmost 2-cell in A(M ); the points of e0 correspond under pointline duality to lines that pass to the right of all points in S.
Call a path in G starting at e0 and visiting every vertex of G a valid path. We’d like to
choose Γ to be a valid path of minimum length, but we do not have an efficient algorithm
for computing such a path. (Indeed, we expect the problem is NP-hard). Instead, we
compute a path Γ whose length is approximately minimum.
Let Γ∗ be a valid path of minimum length. It is straightforward to compute a valid
path Γ such that length(Γ) ≤ 2 length(Γ∗ ): First we compute a minimum spanning tree
M for G via a standard algorithm such as Kruskal’s Algorithm [26]. Via depth-first search
of M starting at e0 , we can find a valid path Γ in M which traverses each edge of M at
most twice. Since length(M) ≤ length(Γ∗ ), we have that length(Γ) ≤ 2 length(Γ∗ ).
48
In fact, an algorithm with a better approximation ratio is known: [35] shows that a
variant of the Christofides 23 -approximation algorithm for the traveling salesman problem
on a metric graph [23] yields a valid path Γ with length(Γ) ≤ 32 length(Γ∗ ).
6.7
Data Structures
Before completing the specification of our algorithm for computing the barcode templates
T e , we need to describe the data structures used internally by the algorithm.
Persistent Homology and Vineyard Update Data Structures. First, we mention
that our algorithm uses each of the data structures specified in [25] for computing and
updating RU -decompositions. These consist consists of 4 sparse matrices—one to store
each of R1 , R2 , U1 and U2 —as well as several additional 1-D arrays which aid in performing
the persistence and vineyard algorithms, and in reading barcodes off of the matrices R1 ,
R2 . Since we use these data structures only in the way described in [25], we refer the reader
to that paper for details.
Array Data Structures. For j = 1, 2, we also maintain arrays gradesj , liftsj , sigj , and
sigInvj , each of length [mj ]:
• gradesj is a static array with gradesj [k] = grj (k).
• liftsj [k] is an array of pointers to entries of tPtsMat.
• After our computations at cell ei are complete,
liftsj [k] = lifti ◦ grj (k),
sigj [k] = σji (k),
sigInvj [k] = (σji )−1 (k).
Remark 6.5. Note that after all computations at cell ei are complete, we can use liftsj
and sigj together to perform constant time evaluations of the template map
fji = lifti ◦ grj ◦ σji .
Together with the RU -decomposition of Φi , this allows us to efficiently read off T e using
Eq. (6.1).
The Lists levSetj (u). We mentioned in Section 5.4 that for each u ∈ P, we store lists
levSet1 (u) and levSet2 (u) at the entry of tPtsMat corresponding to u. We now specify
what these lists store: After our computations at cell ei are complete, levSetj (u) stores
(lifti ◦ grj ◦ σji )−1 (u) for u ∈ P i , and levSetj (u) is empty for u 6∈ P i . As we will see
in Section 6.9, our algorithm uses the lists levSetj (u) to efficiently perform the required
updates as we pass from cell ei−1 to cell ei .
49
6.8
Computations at the Initial Cell e0
We next describe in more detail the computations performed at the initial cell e0 , building
on the explanation of Section 6.5.
To begin our computations at cell e0 , for each u ∈ P, we initialize
levSetj (u) = (lift0 ◦ grj )−1 (u).
Note that (lift0 ◦ grj )−1 (u) is nonempty only if u is the rightmost element of P on the
horizontal line passing through u. Thus, the elements u ∈ P such that levSetj (u) is nonempty have unique y-coordinates.
To efficiently initialize the lists levSetj (u), we use an O(m log m + mκ) time sweep
algorithm, described in Appendix A.2. When we add k ∈ [mj ] to the list levSetj (u), we
also set liftsj [k] = u.
Next, we concatenate the non-empty lists levSetj (u) into single list of length mj , in
increasing order of the y-coordinate of u, and set sigInvj equal to this list. For j = 1, 2,
given sigInvj , we construct sigj in the obvious way in time O(mj ). We define σj0 to be the
permutation whose array representation is sigj .
Letting Pj denote the matrix representation of σj0 , we use the arrays sigInv1 and sigInv2
to compute
D10 = D1 P1 , D20 = P1T D2 P2 .
Using the column sparse representation of D1 and D2 described in [25], which allows for
implicit representations of row permutations, this takes O(m) time.
As already explained in Section 6.5, we then apply the standard persistence algorithm
to compute the RU-decompositions D10 = R10 U10 , D20 = R20 U20 .
This completes the work done by the algorithm at cell e0 .
6.9
Computations at Cell ei , for i ≥ 1
In Section 6.5, we outlined our algorithm for updating the template map f i−1 and RU decomposition Φi−1 , as we pass from cell ei−1 to e1 . We now give a more detailed account
of this algorithm, filling in some details omitted earlier. As explained in Section 6.5, to
update
fji−1 = lifti−1 ◦ grj ◦ σ i−1 ,
our algorithm separately updates the factors lifti−1 ◦ grj and σji−1 .
While it is possible to first completely update lifti−1 ◦ grj and then update σji−1 via an
application of insertion sort, it is slightly more efficient to interleave the updates of the
two factors, so that when we update the value of lifti−1 ◦ grj (k) for some k ∈ [mj ], we
immediately perform the insertion-sort transpositions necessitated by that update, along
with the corresponding updates to the RU-decomposition. This is the approach we take.
50
We assume without loss of generality that ei−1 lies below ei . The shared boundary of
ei−1 and ei lies on the line dual to some anchor α = (α1 , α2 ). tPtsMat provides constant
time access to the element u = (u1 , u2 ) ∈ P immediately to the left of α and the element
v = (v1 , v2 ) ∈ P immediately below α, if such u and v exist. To keep our exposition simple,
we will assume that u and v do both exist; the cases that either u or v do not exist are
similar, but simpler. Note that
u, α ∈ P i−1 ,
v, α ∈ P i ,
u 6∈ P i ,
v 6∈ P i−1 ;
see Fig. 11.
Recall that for each i, lifti ◦ grj is represented in memory using the data structures liftsj
and levSetj (·), whereas σji is represented using sigj and sigInvj .
To perform the required updates as we pass from cell ei−1 to cell ei , we first iterate
through the list levSetj (α) in decreasing order. For each k ∈ levSetj (α), if the y-coordinate
of grj (k) is less than or equal to v2 , then lifti ◦ grj (k) = v; we remove k from levSetj (α),
add k to the beginning of the list levSetj (v), and set liftsj [k] = v.
If, on the other hand, the y-coordinate of grj (k) is greater than v2 , then lifti ◦ grj (k) = α,
and we do not perform any updates to liftsj , levSetj (α), or levSetj (v) for this value of k.
If in addition, liftsj [sigInvj [sigj [k] + 1]] = v, then we apply insertion sort to update sigj ,
sigInvj , and the RU -decomposition; specifically, we compute sortOneElement(sigj [k]), for
sortOneElement the algorithm defined below.
Algorithm 1 sortOneElement(w)
Input: w ∈ {1, . . . , mj − 1} such that liftsj [sigInvj [y]] ≤ liftsj [sigInvj [z]] whenever w < y < z
Output: Updated sigj and sigInvj such that liftsj [sigInvj [y]] ≤ liftsj [sigInvj [z]] whenever w ≤ y < z; correspondingly updated RU -decomposition
1: y ← w;
2: while y < mj and liftsj [sigInvj [y]] > liftsj [sigInvj [y + 1]] do
3:
swap sigInvj [y] and sigInvj [y + 1]
4:
sigj [sigInvj [y]] ← y
5:
sigj [sigInvj [y + 1]] ← y + 1
6:
Perform the corresponding updates to the RU -decomposition, as described in Section 6.5.
7:
y ←y+1
Once we have finished iterating through the list levSetj (α), we next iterate through the
list levSetj (u) in decreasing order. For each k ∈ levSetj (u), we perform updates exactly as
we did above for elements of levSetj (α), with one difference: If the second coordinate of
grj (k) is greater than v2 , then we must remove k from levSetj (u), add k to the beginning
of the list levSetj (α), and set liftsj [k] = α.
When we have finished iterating through the list levSetj (u), our updates at cell ei are
complete.
51
6.10
Choosing Edge Weights for G
We have seen in Section 6.6 that the path Γ depends on our choice of weights w(E) on
the edges E of G. We now explain how we choose and compute these weights. As we
will explain in Section 8, computing these weights is also the first step in two practical
improvements to our algorithm.
In practice, the cost of our algorithm for computing the barcode templates is dominated
by the cost of updating the RU -decompositions. On average, we expect the cost of updating
the RU -decomposition as we traverse edge E in G to be roughly proportional to the total
number of insertion-sort transpositions performed. Thus, if it were the case that the average
number t(E) of transpositions performed as we traverse E were independent of the choice
of path Γ, then it would be reasonable to take w(E) = t(E). In fact, t(E) does depend on
Γ. Nevertheless, we can give a simple, computable estimate of t(E) which is independent
of Γ. We choose w(E) to be this estimate. For E = [e1 , e2 ], our definition of w(E) in fact
depends only on the anchor line L containing the common boundary of e1 , e2 , so that we
may write w(E) = w(L).
To prepare for the definition of w(L), we introduce some terminology, which we will
also need in Section 7.3.
Switches and Separations. For e and e0 adjacent 2-cells of A(M ), we say r, s ∈ box(S)
switch at (e, e0 ) if either
lifte (r) < lifte (s)
or
0
0
lifte (r) < lifte (s)
and
and
0
0
lifte (s) < lifte (r),
lifte (s) < lifte (r).
Similarly, for r, s incomparable, we say r, s separate at (e, e0 ) if either
0
0
0
0
lifte (r) 6= lifte (s)
and
lifte (r) = lifte (s),
lifte (r) = lifte (s)
and
lifte (r) 6= lifte (s).
or
We omit the straightforward proof of the following:
Lemma 6.6. Suppose (e, e0 ) and (f , f 0 ) are pairs of adjacent 2-cells of A(M ), with the
shared boundary of each pair lying on the same anchor line L. Then
(i) r, s ∈ R2 switch at (e, e0 ) if and only if r, s switch at (f , f 0 ).
(ii) r, s separate at (e, e0 ) if and only if r, s separate at (f , f 0 ).
In view of Lemma 6.6, for L an anchor line, we say that a, b ∈ R2 switch at L if a, b
switch at e, e0 for any adjacent 2-cells e, e0 whose boundary lies on L. Analogously, we
speak of a, b ∈ R2 separating at L.
52
Lemma 6.7. If r, s switch at any anchor line L, then r, s are incomparable.
Proof. Suppose L = Dp (α) for some anchor α. If r, s switch at L, then there exist u, v as
in Fig. 11, and exchanging and r and s if necessary, we have that
r1 ≤ u1 < s1 ,
s2 ≤ v2 < r2 .
Remark 6.8. Every time we cross an anchor line L, our algorithm performs one insertionsort transposition for each pair k, l ∈ [mj ] such that grj (k), grj (l) switch at L. For each
pair k, l ∈ [mj ] such that grj (k), grj (l) separate at L, the algorithm may only perform
a corresponding insertion-sort transposition when crossing L in one direction—e.g., from
above to below—and may sometimes not perform such a transposition even when crossing
L in this direction.
It is reasonable to estimate, then, that for each pair k, l ∈ [mj ] such that grj (k), grj (l)
separate at L, the algorithm performs a corresponding transposition roughly 41 of the time.
Definition of w(L). For an anchor line L, a finite set Y , and a function f : Y → R2 ,
define swL (f ) (respectively sepL (f )) to be the number of unordered pairs a, b ∈ Y such
that f (a), f (b) switch (respectively, separate) along L. Motivated by Remark 6.8, we define
1
1
w(L) = swL (gr1 ) + swL (gr2 ) + sepL (gr1 ) + sepL (gr2 ).
4
4
Computing the weights w(L). The weights w(L) can be be computed using a simplified version of our main algorithm for computing all barcode templates: First, we choose a
path Q through the 2-cells of A(M ) starting at e0 and crossing every anchor line L once;
for example, we can choose Q to be a path through the rightmost cells of A(M ). We then
run a variant of the algorithm for computing the barcode templates described above, using
the path Q in place of P , and omitting all of the steps involving matrices and updates of
RU -decompositions. For e, e0 adjacent 2-cells in Q with shared boundary on the anchor
line L = Dp (α), we compute w(L) as we pass from cell e to cell e0 .
To explain how this works, let u, v be as in Section 6.9; for simplicity, assume that u
and v exist, as we did there. For any pair of elements r, s that switch or separate at L,
lifte (r), lifte (s) ∈ {u, α}, so to compute w(L) we only need to consider pairs whose elements
lie in the lists levSetj (u) and levSetj (α). Further, the lines x = u1 and y = v2 determine
a decomposition of the plane into four quadrants, and whether r, s switch or separate is
completely determined by which of these quadrants contain r and s; see Fig. 11. Using
these observations, we can easily extend the update procedure described in Section 6.9 to
compute the weight w(L) as we cross from e into e0 .
53
7
Cost of Computing and Storing the Augmented Arrangement
In this section, we prove Theorem 1.4, which bounds the cost of computing and storing
A• (M ). Recall that Theorem 1.4 is stated for persistence modules arising as the ith persistent homology of a bifiltration. Using language of FI-reps, we may state the result in a
more general algebraic form:
Proposition 7.1. Let M be 2-D persistence module of coarseness κ, and let Φ be a FI-rep
of M of dimensions (m0 , m1 , m2 ). Letting m = m0 + m1 + m2 , we have that
1. A• (M ) is of size O(mκ2 ),
2. Our algorithm computes A• (M ) using O(m3 κ + mκ2 log κ) elementary operations,
and requires O(m2 + mκ2 ) storage.
To see that Theorem 1.4 follows from Proposition 7.1, let F be a (1-critical or multicritical) bifiltration of size l, and recall from section Section 5.2 that, using the construction
of [16], in O(l log l) time we can compute a FI-rep of Hi (F) of dimensions (m0 , m1 , m2 ),
with m0 + m1 + m2 = O(l).
7.1
Size of the Augmented Arrangement
We prove Proposition 7.1 (i) first. As noted in Section 5.5, the DCEL representation of
A(M ) is of size O(κ2 ).
At each 2-cell of A(M ), we store the barcode template T e . By considering the RU decomposition, we see that if
Φ = (gr1 , gr2 , D1 , D2 )
is a FI-rep of a 1-D persistence module N of dimensions (m0 , m1 , m2 ), then |B(N )| ≤ m1 .
Hence, Proposition 6.4 implies that |T e | ≤ m1 for all 2-cells e. Therefore, our representation
of A• (M ) in memory is of total size O(m1 κ2 ) = O(mκ2 ), as claimed.
7.2
Cost of Computing the Augmented Arrangement
We now turn to the proof of Proposition 7.1 (ii). As we have seen, our algorithm for
computing A• (M ) involves several sub-computations. For each sub-computation, a row
in Table 1 lists the data computed by this sub-computation, a bound on the number
of elementary operation required, and the sections in this paper where the details were
discussed.
The bounds in the first four rows of Table 1 were explained earlier, so it remains to analyze the cost of our algorithm for computing the barcode templates T e . The computation
of T e itself involves a number of steps, whose individual time complexities we again list in
Table 2.
54
Table 1: Cost of augmented arrangement sub-computations
Data
# Elem. Operations
3
Details in
Set S = supp ξ0 (M ) ∪ supp ξ1 (M )
O(m )
Section 5.3
Template points P (stored in
tPtsMat) and list anchors
O(m2 )
Section 5.4
Arrangement A(M ) (constructed
via Bentley-Ottmann algorithm)
O(κ2 log κ)
Section 5.5
Data structures for point location
O(κ2 log κ)
Barcode templates T
e
3
Section 4.3
2
O(m κ + (m + log κ)κ )
Section 6
The bounds in all but the last four rows in Table 2 (above the double horizontal line)
were either explained earlier, or are clear from the discussion presented. In the remainder
of this section, we verify the last four bounds.
Cost of Updates of the levSetj (·) and liftsj at ei , i ≥ 1. In the notation of Section 6.9,
to update the lists levSetj (·) to their proper values at ei , our algorithm considers performing
an update for each element k in the lists levSetj (u) and levSetj (α). In the worst case, for
each cell ei there are O(m) such elements k to consider in total. For each k, the updates
of levSetj (·) and liftsj take constant time. Thus the total amount of work we need to do
at cell ei is O(m). The path P contains O(κ2 ) 2-cells, so the total work to perform the
updates over all 2-cells is O(mκ2 ), as claimed.
A Bound on the Total Number of Transpositions. To establish the next two
bounds, we take advantage of the following result, which we prove in Section 7.3:
Proposition 7.2. Our algorithm for computing all barcode templates performs a total of
O(m2 κ) insertion-sort transpositions on sigInv1 and sigInv2 .
Cost of Updates of sigj , sigInvj at cells ei , i ≥ 1. The cost of updating sig is proportional to the cost of updating sigInvj . Thus it is immediate from Proposition 7.2 that the
total cost of updating these arrays is O(m2 κ).
Cost of Updates of RU -decomposition at cells ei , i ≥ 1. There are O(κ2 ) cells to
consider; this gives us the O(κ2 ) term. For each transposition performed on sigj , we call
the vineyard algorithm, described in Section 6.2, at most twice. Each call to the vineyard
algorithm takes time O(m). By Proposition 7.2, then, the total cost of all vineyard updates
performed is O(m3 κ). This gives the desired bound.
55
Table 2: Cost of barcode template sub-computations
Data
# Elem. Operations
Details in
Trimming the FI-rep
2
O(m )
Section 6.1
Path Γ (found via the 2-approximation algorithm for the optimal path, using Kruskal’s
MST algorithm)
O(κ2 log κ)
Section 6.6
levSetj (u), liftsj , sigj , sigInvj at cell e0
O(m log m + mκ)
Section 6.8, Appendix A.2
0
3
RU-decomposition of Φ
O(m )
Section 6.2
Reading the barcode template T off of the
RU -decomposition of Φi , for all i ≥ 0
O(mκ2 )
Section 6.4, Section 6.7
levSetj (u) and liftsj at all cells ei , i ≥ 1
O(mκ2 )
Section 6.9
e
2
sigj , sigInvj at all ei , i ≥ 1
O(m κ)
Section 6.9
RU-decompositions at all ei , i ≥ 1
O(m3 κ + κ2 )
Section 6.9
Weights w(L) for all anchor lines L
O(m2 + mκ)
Section 6.10
Cost of Computing Weights w(L). As explained in Section 6.10, we compute the edge
weights w(L) using a stripped-down variant of our algorithm for computing the barcode
templates T e . Using Lemma 7.5 below, it can be checked that computing all edge weights
takes time O(m2 + mκ).
Storage Requirements. By Proposition 7.1 (i), A• (M ) itself is of size O(mκ2 ), so our
algorithm for computing A• (M ) requires at least this much storage. Our algorithm for
computing the Betti numbers requires O(m2 ) storage, as do the persistence algorithm and
the vineyard updates to RU -decompositions. The Bentley-Ottmann algorithm requires
O(κ2 ) storage, as does Kruskal’s algorithm. Constructing the search data structures used
for queries of A• (M ) also requires O(κ2 ) storage. From our descriptions of the data structures used in the remaining parts of our algorithm, it is clear that other steps of our
algorithm for computing A• (M ) do not require more than O(m2 + mκ2 ) storage. The
bound of Proposition 7.1 (ii) on the storage requirements of our algorithm follows.
56
7.3
Bounding Total Number of Transpositions Required to Compute all
Barcode Templates
To complete our proof of Proposition 7.1 (ii), it remains to prove Proposition 7.2. To this
end, for r ∈ box(S), let
P ≥r := {u ∈ P | u ≥ r},
lift(r) := {u ∈ P | u = lifte (r) for some 2-cell e}.
We leave to the reader the proofs of the following two lemmas.
Lemma 7.3. For e a 2-cell, L a line with D` (L) ∈ e, and u ∈ P ≥r , lifte (r) = u if and
only if the following two conditions hold:
1. pushL (u) is the minimum element of pushL (P ≥r ),
2. for all u0 ∈ P ≥r , u0 6= u, with pushL (u0 ) = pushL (u), we have u0 < u.
Lemma 7.4. For u ∈ P ≥r , we have that u ∈ lift(r) if and only if the following two
conditions hold:
1. there exists no w ∈ P ≥r with
w1 < u1
and
w2 < u2 .
2. there exist no pair v, w ∈ P ≥r with
v1 < u1 ,
v2 = u2 ,
w1 = u1 ,
and
w2 < w2 .
Fig. 13 illustrates the shape of the set lift(r), as described by Lemma 7.4.
r
Figure 13: The shape of a set lift(r), as described by Lemma 7.4.
The next lemma shows that the number of anchor lines at which a given pair of points
in box(S) can switch or separate is at most two; it is the key step in our proof of Proposition 7.2.
57
Lemma 7.5. For r, s ∈ box(S) incomparable,
(i) there is at most one anchor line L at which r and s switch, and if such L exists, then
there is no anchor line at which r and s separate.
(ii) there are at most two anchor lines at which r and s separate.
Proof. Assume without loss of generality that r1 < s1 . Then, since r and s are incomparable, r2 > s2 . Let
R = {(x, y) ∈ lift(r) | x < s1 },
S = {(x, y) ∈ lift(s) | y < r2 },
Q = {(x, y) = lifte (r) = lifte (s) for some e ∈ A(M )}.
The following observations, illustrated in Fig. 14, follow from Lemma 7.4:
• If R is nonempty, there is an element r0 ∈ R such that for all u ∈ R, u1 ≤ r10 and
u2 ≥ r20 .
• Symmetrically, if S is nonempty, there is an element s0 ∈ R such that for all u ∈ S,
u1 ≥ s01 and u2 ≤ s02 .
• If Q is nonempty, there is an element q x ∈ Q such that for all u ∈ Q, u1 ≥ q1x and
u2 ≤ q2x .
• Symmetrically, if Q is nonempty, there is an element q y ∈ Q such that for all u ∈ Q,
u1 ≤ q1y and u2 ≥ r2 .
Clearly, r0 , s0 , q x , and q y are unique, when they exist. Using Lemma 7.3, it is straightforward
to check that u ∈ Q if and only if u ∈ lift(r) ∩ lift(s) and one of the following is true:
1. u is incomparable to every element of R ∪ S.
2. R is non-empty, u2 = r20 , and there is no v ∈ lift(s) with v1 = u1 and v2 < u2 ,
3. S is non-empty, u1 = s01 , and there is no v ∈ lift(r) with v1 < u1 and v2 = u2 .
See Fig. 14 for an illustration of R, S, and Q.
To finish the proof of Lemma 7.5, we consider seven cases. For each, we explicitly
describe the lines where r and s either switch or separate. The verification of the claimed
behavior in each case, which uses Lemma 7.3 and the observations above, is left to the
reader. Fig. 14 illustrates case 7.
1. R and S empty. lifte (r) = lifte (s) for every 2-cell e ∈ A(M ). Therefore, r and s
never switch or separate.
58
2. R nonempty, S and Q empty. lifte (r) < lifte (s) for every 2-cell e ∈ A(M ). Again, no
switches or separations.
3. S nonempty, R and Q empty. Symmetric to the above, no switches or separations.
4. R and S nonempty, Q empty. lifte (r) < lifte (s) whenever e lies below L =
Dp (lub(r0 , s0 )), and lifte (s) < lifte (r) whenever e lies above L. Hence r and s switch
at L.
5. R and Q nonempty, S empty. lifte (r) < lifte (s) whenever e lies below L =
Dp (lub(r0 , qx )), and lifte (r) = lifte (s) whenever e lies above L. Hence r and s separate at L.
6. S and Q nonempty, R empty.
Dp (lub(qy , s0 )).
Symmetric to the above, r and s separate at
7. R, S, and Q all nonempty. lifte (r) < lifte (s) whenever e lies below L =
Dp (lub(r0 , qx )); lifte (r) = lifte (s) whenever e lies above L and below L0 =
Dp (lub(qy , s0 )); and lifte (s) < lifte (r) whenever e lies above L0 . Hence r and s
separate at L and L0 .
R
r0
qx
Q
qy
r
s0
S
s
Figure 14: An illustration of the case where R, S, and Q are each non-empty (case 7). Points
in lift(r) ∪ lift(s) are drawn as black dots. Observe that r and s separate at Dp (lub(r0 , qx )) and
Dp (lub(qy , s0 )), and at no other anchor line do r and s either switch or separate.
Proof of Proposition 7.2. Fix j ∈ {1, 2}, and let k 6= k 0 ∈ [mj ]. First, we note that if grj (k)
and grj (k 0 ) are comparable, then as we pass from cell ei−1 to cell ei , our algorithm for
computing barcode templates never performs an insertion-sort transposition of the values
59
k and k 0 in sigInvj . This is because our initialization procedure at cell e0 , described in
Section 6.8 and Appendix A.2, chooses sigInvj such that if grj (k) < grj (k 0 ), then sigj [k] <
sigj [k 0 ]. Since lifte (k) ≤ lifte (k 0 ) for all 2-cells e, there thus is never any need to swap k
and k 0 .
Therefore, as we pass from cell ei−1 to cell ei , our algorithm performs an insertion-sort
transposition of the values k and k 0 in sigInvj only if grj (k) and grj (k 0 ) either switch or
separate at (ei−1 , ei ).
Clearly, the number of pairs k, k 0 ∈ [mj ] such that grj (k) and grj (k 0 ) either switch
or separate at any anchor line is less than m2j /2, the total number of pairs. The path Γ,
constructed via the minimum spanning tree construction in Section 6.6, crosses each anchor
line at most 2κ times. By Lemma 7.5 then, for each pair k, k 0 ∈ [mj ] , the insertion-sort
component of our algorithm performs a total of at most 4κ transpositions of that pair in
sigInvj . Hence, the total number of transpositions performed by the algorithm altogether
is at most 2(m21 + m22 )κ < 2m2 κ.
8
Speeding up the Computation of the Augmented Arrangement
In this section, we describe several simple, practical strategies to speed up the runtime
of our computation of A• (M ). Used together, these strategies allow us to the compute
augmented arrangements of the persistent homology modules of much larger datasets than
would otherwise be possible.
8.1
Persistence Computation from Scratch When RU -Updates are too
Slow
Three Options for Computing a Barcode Template. While an update to an RU decomposition involving few transpositions is very fast in practice, an update to an RU decomposition requiring many transpositions can be quite slow; when many transpositions
are required, it is sometimes much faster to simply recompute the RU -decomposition from
scratch using the standard persistence algorithm. In our setting, the practical performance
of our algorithm can be greatly improved if for consecutive 2-cells ei−1 , ei ∈ Γ with the
edge weight w(ei−1 , ei ) greater than some suitably chosen threshold t, we simply compute
the RU -decomposition of Φi from scratch, directly from D1i and D2i .
Moreover, we can obtain significant additional speedups by avoiding the computation
of the full RU -decomposition of Φi altogether at some cells ei . To explain this, we first note
that to obtain T ei via Eq. (6.1), we do not need the full RU -decomposition Φi , but only
PE(Φi ) = (Pairs(Φi ), Ess(Φi )); in particular we do not need U1i and U2i . The algorithm for
computing barcode templates described in Section 6 maintains the full RU -decomposition
of each Φi because the vineyard algorithm requires this. But if we are willing to compute
60
PE(Φi+1 ) from scratch, then it is not necessary to compute the full RU -decomposition of
Φi ; it suffices to compute PE(Φi ). Further, if in this case we have that ei = ej for some
j < i, then we do not even need to compute PE(Φi ) at all at cell ei , since we have already
done so at an earlier step.
In recent years, several algorithms for computing barcodes have been introduced which
are much faster than the standard persistence algorithm [3, 4, 42]. For example, a few such
algorithms are implemented in the software library PHAT [4]. Given a FI-rep Φ as input,
these algorithms compute PE(Φ), but do not compute the full RU -decomposition of Φ.3
Let us restrict our attention a single such algorithm, say, the clear and compress algorithm implemented in PHAT [3].
To compute PE(Φi ), then, we have three options available to us:
(A) Use the clear and compress algorithm if ei 6= ej for all j < i; do nothing if ei = ej for
some j < i.
(B) Compute the full RU -decomposition of Φi from scratch using the standard persistence
algorithm.
(C) Use vineyard updates. This option is only available if we chose option B or C at cell
ei−1 , so that the full RU -decomposition of Φi−1 was computed.
Clearly, there is a tradeoff between options A and B: Option A is much faster, but
choosing option A at cell ei precludes the use of option C at cell ei+1 . How, then, do we
choose between these three options at each cell ei ? We formulate this problem as a discrete
optimization problem, which can solved efficiently by reduction to a min-cut problem.
Estimating Runtimes of the Different Options. Our formulation of the problem
requires us to first estimate the respective runtimes ci (A), ci (B), and ci (C) of options A,
B, and C at each cell ei in the path Γ = e0 , e1 , . . . , ew . We will describe a simple strategy
for this here, and then explain below how to modify our approach to correct for a drawback
of the strategy.
We take ci (A) = 0 if ei = ej for some j < i, and otherwise we take ci (A) to be some
constant c(A) independent of i. Similarly, we take ci (B) = c(B) to be independent of i.
To compute c(A), we compute PE(Φ0 ) using option A, and set c(A) to be the runtime of
this computation. Similarly, to compute c(B), we compute the the full RU -decomposition
of Φ0 from scratch and take c(B) to be the runtime.
We set c0 (C) arbitrarily, say c0 (C) = 0. To compute ci (A) for each i ≥ 1, we perform
several thousand random vineyard updates to the RU -decomposition of Φ0 . Using timing
data from these computations, we compute, for j = 1, 2, the average runtime cvine
of an
j
3
However, some fast algorithms for persistence computation can be readily adapted to compute R1 , R2 ,
and U2−1 . For example, as explained to us by Ulrich Bauer, this is true for the “twist” variant of the
standard persistence algorithm [22].
U1−1 ,
61
update to the RU -decomposition corresponding to a transposition of adjacent elements in
[mj ]. Letting L denote the anchor line containing the shared boundary of ei−1 and ei , and
recalling the notation of Section 6.10, we take
1
1
vine
ci := cvine
1 (swL (gr1 ) + sepL (gr1 )) + c2 (swL (gr2 ) + sepL (gr2 )).
4
4
Some motivation for this choice of ci is provided by Remark 6.8.
The Optimization Problem. To decide between options A, B and C at each cell ei ∈ Γ,
we solve the following optimization problem:
minimize:
w
X
ci (Xi )
i=0
subject to: Xi ∈ {A, B, C},
Xi = A =⇒ Xi+1 6= C,
X0 6= C.
Clearly, this problem is equivalent to the integer linear program (ILP):
minimize:
w
X
ci (A)xi + ci (B)yi + ci (C)zi
i=0
subject to: xi , yi , zi ∈ {0, 1}
xi + yi + zi = 1
xi + zi+1 ≤ 1,
z0 = 0.
Using the constraints xi + yi + zi = 1, we can eliminate the variables yi from this ILP to
obtain an equivalent ILP with a simpler set of constraints:
minimize:
w
X
(ci (A) − ci (B))xi + (ci (C) − ci (B))zi
i=0
subject to: xi , zi ∈ {0, 1}
xi + zi+1 ≤ 1,
z0 = 0.
The constraint matrix associated to the latter ILP is of a standard form, well known to be
totally modular [43]. While an ILP with totally unimodular constraint matrix can always
be solved directly via linear programming relaxation, it is often the case that such an ILP
62
can be cast as a network flow problem, in which case we can take advantage of very efficient
specialized algorithms.
In fact, as explained to us by John Carlsson, the simplified ILP above can be cast
as the problem of finding a minimum cut in a network: First, the ILP can be cast as a
maximum-weight independent set problem in a bipartite graph with non-negative vertex
weights. In any graph, the complement of an independent set is a vertex cover and vice
versa, so the latter problem is in turn equivalent to a minimum-cost vertex cover problem
in a bipartite graph. It is well known that such a problem can be solved by computing a
minimum cut in a flow network [1, Section 8.4.3.1].
Dynamic Updates to our Estimates of Runtime Cost. As mentioned above, there
is a drawback to the approach to barcode template computation we have proposed here:
c(A) and c(B) may not be very good estimates of the respective average costs of option A
and option B; after all, our estimates c(A) and c(B) are computed using very little data.
Here is one way to correct for this: We first solve the optimization problem above for
just the first few cells (say 5%) in the path Γ. Using the solution, we then compute the
barcode template for each of these cells. As we do this, we record the runtime of the
computation at each cell. We next update the value of c(A) to the average run time of all
vine in
computations performed using option A thus far. We also update c(B), cvine
1 , and c2
the analogous way. We then use these updated values as input to the optimization problem
for the next 5% of cells in Γ. We continue in this way until the estimates of c(A), c(B),
vine have stabilized. Finally, we solve the optimization problem for all of the
cvine
1 , and c2
remaining cells in Γ and use the solution to compute the remaining barcode templates.
8.2
Coarsening of Persistence Modules
We have seen that size of the augmented arrangement A• (M ) depends quadratically on the
coarseness κ of M , and that computing A• (M ) requires O(m3 κ+(m+log κ)κ2 ) elementary
operations.
Thus, to keep our computations small, we typically want to limit the size of κ by
coarsening our module. As we now explain, doing this quite simple. A similar coarsening
scheme is mentioned in [12].
Let G = (G1 , G2 , . . . , Gn ) : Z2 → R2 be any grid function, as defined in Section 2.5.
G extends to a functor Zn → Rn , which we also denote by G. For M a 2-D persistence
module, let M G be a continuous extension of M ◦ G. In view of Proposition 2.10, the
coarseness of the grid G controls the coarseness κ of the module M G .
Let dI denote the multidimensional interleaving distance, as defined in [40]. As explained there, dI is a particularly well-behaved metric on persistence modules. The following proposition, whose easy proof we omit, makes precise the intuitive idea that a small
amount of coarsening leads to a small change in our persistence module:
Proposition 8.1. If |Gj (z)−Gj (z +1)| ≤ δ for i = 1, 2 and all z ∈ Z, then dI (M , M G ) ≤ δ.
63
The “external stability theorem” of Landi [38], mentioned earlier in Section 1.5, shows
that if 2-D persistence modules M and N are close in the interleaving distance, then the
fibered barcodes B(M ) and B(N ) will be close, in a precise sense. This justifies the use of
coarsening in conjunction with our visualization paradigm.
Coarsening Free Implicit Representations. As explained in Section 5.2, in practice,
we typically have access to M via a FI-rep Φ = (gr1 , gr2 , D1 , D2 ) for M . Since our algorithm
for computing an augmented arrangement takes a FI-rep as input, to compute A• (M G ),
we want to first construct a FI-rep ΦG of M G from Φ.
Let clG : Rn → G be the function which takes each a ∈ Rn to the minimal z ∈ G with
a ≤ z.
Define ΦG = (clG ◦ gr1 , clG ◦ gr2 , D1 , D2 ). We leave the proof of the following to the
reader:
Proposition 8.2. H(ΦG ) ' M G .
Thus, to obtain a FI-rep of a coarsening of M , it suffices to simply coarsen the grade
functions in our FI-rep of M .
8.3
Parallelization
The problem of computing the barcode templates T e is embarrassingly parallelizable. Here
is one very simple parallelization scheme: Given l2 processors, where l is less than or equal
to the number of anchors, we can choose the l anchor lines L with the largest values of w(L).
These lines divide A(M ) into at most l2 polygonal cells {Ck } with disjoint interiors, and
the remaining anchor lines induce a line arrangement A(M )k on each Ck . On processor k,
we can run our main serial algorithm, described above, to compute the barcode templates
at each 2-cell of A(M )k .
For this, we need to make just one modification to the algorithm: When choosing our
path Γ through the 2-cells of A(M )k , we generally cannot choose our initial cell e to be
the cell e0 described in Section 6.6, since e0 may not be be contained in A(M )k . Instead,
we choose the initial cell e arbitrarily.
This means we cannot use the approach of Section 6.8 to initialize the data structures
sigj , sigInvj , liftsj , and levSetj (·) at cell e. One way to initialize these data structures is
to chose an arbitrary affine line L with D` (L) ∈ e, and consider the behavior of the map
pushL on S ∪ im(gr1 ) ∪ im(gr2 ), using exact arithmetic where necessary.
9
Preliminary Runtime Results
We now present runtimes for the computation of augmented arrangements arising from
synthetic data.
64
We emphasize that these computational results are preliminary, as our implementation
of RIVET does not yet take advantage of some key optimizations. First, the code that
produced these results employs a highly simplified variant of the scheme detailed in Section 8.1 for computing barcode templates; this variant chooses only between options (B)
and (C) at each edge crossing, which is less efficient than what is proposed in Section 8.1.
Secondly, this code stores the columns of our sparse matrices using linked lists; it is known
that a smarter choice of data structure for storing columns can lead to major speedups in
persistence computation [4]. Finally, as mentioned in Section 1.10, our current implementation runs only on a single processing core. We expect to see substantial speedups after
parallelizing the computation of barcode templates as proposed in Section 8.3.
Our computations were run on a single (slow) 800 MHz core in a 32-core server with 96
GB of RAM. However, for the computations reported here, only a fraction of the memory
was required. For example, RIVET used approximately 9.3 GB of RAM for our largest
computation.
Noisy Circle Data. Data sets we consider are point clouds sampled with noise from an
annulus, such as the center point cloud in Fig. 2. Specifically, 90% of the points in each
data set X are sampled randomly from a thick annulus in a plane, and 10% are sampled
randomly from a square containing the annulus. We define a codensity function γ : X → R
by taking γ(p) to be equal to the number of points of X within some fixed distance to p.
We then construct the Vietoris-Rips bifiltration F := Rips(γ), described in Section 1.4,
taking the metric on X to be the Euclidean distance, with the scale parameter for the
Vietoris-Rips complexes capped at a value slightly larger than the inner diameter of the
annulus.
Computing the Graded Betti Numbers. Table 3 displays the average runtimes for
computing the graded Betti numbers ξ0 , ξ1 , and ξ2 of Hi (F), for i ∈ {1, 2}. Each row
gives the averages from three point clouds of the specified size. For example, we generated
three point clouds of 100 points, and the average number of 1-simplices in the resulting
bifiltrations was 3,820, so computing H0 homology required working with a bifiltration of
average size 3,920 simplices.
Building the Augmented Arrangement. Table 4 displays the average runtimes (in
seconds) to build A• (H0 (F)). As before, each row gives the averages from three point
clouds of the specified size. The average runtimes for computing A• (H0 (F)) for each of
four different coarsenings are displayed in the table. Similarly, Table 5 displays the average
runtimes (in seconds) to build A• (H1 (F)).
65
Table 3: Average runtimes for computing the bigraded Betti numbers of the noisy circle data
Points
Simplices
Runtime (sec.)
H0
100
200
300
400
3,920
15,719
35,324
62,415
0.11
0.70
2.38
3.99
H1
100
200
300
400
91,876
755,211
2,560,718
6,052,584
4.01
59.4
264
790
Table 4: Runtimes for computing the augmented arrangement for 0th homology of the noisy circle
data
Runtimes (seconds)
Points
100
200
300
400
Simplices
Bins: 5 × 5
10 × 10
15 × 15
20 × 20
3,920
15,719
35,324
62,415
0.17
0.40
0.46
1.25
0.39
7.90
10.3
22.0
0.97
21.9
46.7
180
1.51
46.1
113
637
Table 5: Runtimes for computing the augmented arrangement for 1st homology of the noisy circle
data
Runtimes (seconds)
10
Points
Simplices
Bins: 5 × 5
10 × 10
15 × 15
20 × 20
100
200
300
400
91,876
755,211
2,560,718
6,052,584
0.60
13.1
39.9
228
1.33
211
374
6,893
2.35
1,012
3,364
18,346
3.61
3,368
7,510
59,026
Conclusion
In this paper, we have introduced RIVET, a practical tool for visualization of 2-D persistence modules. RIVET provides an interactive visualization of the barcodes of 1-D affine
slices of a 2-D persistence module, as well as visualizations of the dimension function and
bigraded Betti numbers of the module. We have presented a mathematical theory for our
visualization paradigm, centered around a novel data structure called an augmented ar-
66
rangement. We have also introduced and analyzed an algorithm for computing augmented
arrangements, and described several strategies for improving the runtime of this algorithm
in practice.
In addition, we have presented timing data from preliminary experiments on the computation of augmented arrangements. Though we have yet to incorporate several key
optimizations into our code, the results demonstrate that our current implementation already scales well enough to be used to study bifitrations with millions of simplices. With
more implementation work, we expect RIVET to scale well enough to be used in many of
the same settings where 1-D persistence is currently used for exploratory data analysis.
From here, there are several natural directions to pursue. Beyond continuing to improve
our implementation of RIVET, we would like to:
• Apply RIVET to the exploratory analysis of scientific data.
• Develop statistical foundations for our data analysis methodology.
• Adapt the RIVET paradigm in the setting of 0-D homology to develop a tool for
hierarchical clustering and interactive visualization of bidendrograms [11].
• Extend the RIVET methodology to other generalized persistence settings, such cosheaves of vector spaces over R2 [28], or cosheaves of 1-D persistence modules over
R.
We hope that RIVET will prove to be a useful addition to the existing arsenal of TDA
tools. Regardless of how it ultimately fares in that regard, however, we feel that the broader
program of developing practical computational tools for multidimensional persistence is
a promising direction for TDA, and we hope that this work can draw attention to the
possibilities for this. We believe that there is room for a diverse set of approaches.
Acknowledgements
This paper has benefited significantly from conversations with John Carlsson about pointline duality and discrete optimization. We also thank Ulrich Bauer, Magnus Botnan, and
Dmitriy Morozov, and Francesco Vaccarino for helpful discussions. The bulk of the work
presented in this paper was carried out while the authors were postdoctoral fellows at the
Institute for Mathematics and its Applications, with funds provided by the National Science
Foundation. Some of the work was completed while Mike was visiting Raul Rabadan’s lab
at Columbia University. Thanks to everyone at the IMA and Columbia for their support
and hospitality.
67
A
Appendix
A.1
Details of the RIVET Interface
Expanding on Section 1.7, we now provide some more detail about RIVET’s graphical
interface.
As discussed in Section 5, the module M is input to RIVET as a free implicit representation
Φ = (gr1 , gr2 , D1 , D2 ).
RIVET uses gr1 and gr2 to choose the bounds for the Line Selection Window and Persistence Diagram Window. To explain, let A and B denote the greatest lower bound and least
upper bound, respectively, of im gr1 ∪ im gr2 . In order to avoid discussion of uninteresting
edge cases, we will assume that A1 < B1 and A2 < B2 .
Choice of Bounds for the Line Selection Window. We take the lower left corner and
upper right corner of the Line Selection Window to be A and B, respectively.4 By default,
the Line Selection Window is drawn to scale. A toggle switch rescales (i.e., normalizes)
the window so that it is drawn as a square on the screen.
Parameterization of Lines for Plotting Persistence Diagrams. We next explain
how, given a line L ∈ L̄, RIVET represents B(M L ) as a persistence diagram. Let us first
assume that the Line Selection Window is unnormalized; we treat the case where it is
normalized at the end of this section. Further, by translating the indices of M if necessary,
we may assume without loss of generality that A = 0.
As noted in Section 1.7, to plot B(M L ) as a persistence diagram, we need to first choose
a parameterization γL : R → L of L. We choose γL to be the unique order-preserving
isometry such that:
1. If L has finite positive slope, then γL (0) is the unique point in the intersection of L
with the union of the non-negative portions of the coordinate axes.
2. If L is the line x = a, then γL (0) = (a, 0).
3. If L is the line y = a, then γL (0) = (0, a).
4
For a more intrinsic choice of bounds for the Line Selection Window, one could instead take the lower left
and upper right corners of the window to be the greatest lower bound and least upper bound, respectively, of
the set {a ∈ R2 | ξi (M )(a) > 0 for some i ∈ {0, 1, 2}}. However, we feel that for a typical TDA application,
the extrinsic bounds for the Line Selection Window we have proposed provide a more intuitive choice of
scale.
68
The Choice of Bounds for the Persistence Diagram Window. The bounds for
the Persistence Diagram Window are are chosen statically, depending on M but not on
the choice of L. RIVET chooses the viewable region of the persistence diagram to be
[0, |B|] × [0, |B|].
Representation of Points Outside of the Viewable Region of the Persistence
Diagram. It may be that for some choices of L, B(M L ) contains intervals [α, β), for
α ≥ |B| or β ≥ |B|, so that [α, β) falls outside of the viewable region of the persistence
diagram; indeed, the coordinates of some points in the persistence diagram can become
huge (but finite), as the slope of the L approaches 0 or ∞. Thus, our persistence diagrams
include some information on the top of the diagram, not found in typical persistence
diagram visualizations, to record the points in the persistence diagram which fall outside
of the viewable region:
• Above the main square region of the persistence diagram are two narrow horizontal
strips, separated by a dashed horizontal line. The upper strip is labeled “inf,” while
the lower is labeled “< inf”. In the higher strip, we plot a point with x-coordinate
α for each interval [α, ∞) with α ≤ |B|. In the lower strip, we plot a point with
x-coordinate α for each interval [α, β) ∈ B(M L ) with α ≤ |B| and |B| < β < ∞.
• Just to the right of each of the two horizontal strips is a number, separated from the
strip by a vertical dashed line. The upper number is the count of intervals [α, ∞) ∈
B(M L ) with |B| < α; the lower number is the count of intervals [α, β) ∈ B(M L ) with
|B| < α, β < ∞.
Persistence Diagrams Under Rescaling. If we choose to normalize the Line Selection Window, then RIVET also normalizes the persistence diagrams correspondingly. To
do this, it computes respective affine normalizations gr01 , gr02 of gr1 , gr2 , so that after normalization, A = (0, 0) and B = (1, 1). RIVET then chooses the parameterizations of lines
L ∈ L̄ and computes bounds on the Persistence Diagram Window exactly as described
above in the unnormalized case, but taking the input FI-rep to be (gr01 , gr02 , D1 , D2 ).
A.2
Computing the Lists levSetj (u) at Cell e0
As mentioned in Section 6.8, to efficiently compute the lists levSetj (u) at cell e0 , we use
a sweep algorithm. As we did in Section 5.4, to keep notation simple we assume that Ωx
and Ωy are the identity maps on [nx ] and [ny ] respectively, so that (Ωx × Ωy )−1 (P) = P.
We assume that to start, gr1 and gr2 are both increasing with respect to colexicographical
order; if this is not the case, then by Lemma 6.3, we can apply a sorting algorithm to
modify Φ so that the assumption does hold. This sorting can be done in O(m log m) time.
69
Our sweep algorithm maintains a linked list Frontier of pointers to elements of P. (These
elements are stored in tPtsMat.) Both the x- and y-coordinates of the entries of Frontier
are always strictly decreasing.
The algorithm iterates through the rows of the grid [nx ] × [ny ] from top to bottom.
The list Frontier is initially empty, and is updated at each row s, with the help of tPtsMat.
If row s is empty, then no update is necessary at row s. Otherwise, let u be the rightmost
entry of P in row s, and let r be the column containing u. If the last element of Frontier is
also in column r, then this element is removed from Frontier and replaced by u. Otherwise,
we append u to the end of Frontier.
The algorithm then inserts each k ∈ [mj ] with grj (k) = (r, s) for some r into the
appropriate list levSetj (−). (Since grj is assumed to be increasing with respect to colexicographical order, we have immediate access to all such k.) Specifically, k is added to the
list levSetj (u), for u the leftmost element of Frontier with r ≤ u1 . The lists levSetj (u) are
maintained in lexicographical order. It is easy to check that u = lift0 ◦ grj (k), as desired.
The frontier-sweep algorithm is stated in pseudocode in Algorithm 2.
Updating Frontier at each row of tPtsMat takes constant time, so the total cost of
updating Frontier is O(ny ). For each row s, we must iterate over Frontier once to identify
the lists levSetj (−) into which we insert elements of [mj ]. There are ny rows, and the length
of Frontier is O(κx ), so the total cost of these iterations over Frontier is O(ny κx ). Inserting
each k ∈ [mj ] into the appropriate list levSetj (−) takes constant time, so the total cost
of such insertions is O(m). Thus, the total number of operations for the frontier-sweep
algorithm (including the cost of the initial sorting to put gr1 and gr2 in the right form), is
O(m log m + ny κx ) = O(m log m + mκ).
Algorithm 2 Frontier-sweep algorithm for building the lists levSetj (u)
Input: grj (represented as a list in colexicographical order), tPtsMat
Output: tPtsMat, updated so that for each u ∈ P e0 , levSetj (u) = (lift0 ◦ grj )−1 (u), with each list sorted
in lexicographical order
1: initialize Frontier as an empty linked list
2: for s = ny to 1 do
3:
if tPtsMat has an entry in row s then
. update Frontier for row s
4:
let r be the column containing rightmost element of P in row s
5:
if last element of Frontier is in column r then
6:
remove the last entry from Frontier
7:
append the entry of P at row s, column r to the end of Frontier
8:
for each entry u in Frontier do
. add elements with grades in row s to the lists levSetj (−)
9:
if u is the last element of Frontier then
10:
add all k ∈ [mj ] such that grj (k) = (r, s) with r ≤ u1 to levSetj (u)
11:
else
12:
let v be the element after u in Frontier
13:
add all k ∈ [mj ] such that grj (k) = (r, s) with v1 < r ≤ u1 to levSetj (u)
70
References
[1] M. J. Atallah. Algorithms and theory of computation handbook. CRC press, 1998.
[2] M. F. Atiyah. On the krull-schmidt theorem with application to sheaves. Bulletin de la Société
Mathématique de France, 84:307–317, 1956.
[3] U. Bauer, M. Kerber, and J. Reininghaus. Clear and compress: Computing persistent homology
in chunks. In Topological Methods in Data Analysis and Visualization III, pages 103–117.
Springer, 2014.
[4] U. Bauer, M. Kerber, J. Reininghaus, and H. Wagner. Phat – persistent homology algorithms
toolbox. In Mathematical Software – ICMS 2014, volume 8592 of Lecture Notes in Computer
Science, pages 137–143. Springer Berlin Heidelberg, 2014.
[5] U. Bauer and M. Lesnick. Induced matchings of barcodes and the algebraic stability of persistence. In Proceedings of the 2014 Annual Symposium on Computational Geometry, page 355.
ACM, 2014.
[6] S. Biasotti, A. Cerri, P. Frosini, and D. Giorgi. A new algorithm for computing the
2-dimensional matching distance between size functions.
Pattern Recognition Letters,
32(14):1735–1746, 2011.
[7] H. Brönnimann, A. Fabri, G.-J. Giezeman, S. Hert, M. Hoffmann, L. Kettner, S. Pion, and
S. Schirra. 2D and 3D geometry kernel. In CGAL User and Reference Manual. CGAL Editorial Board, 4.5.2 edition, 2015. http://doc.cgal.org/4.5.2/Manual/packages.html#
PkgKernel23Summary.
[8] P. Bubenik, V. de Silva, and J. Scott. Metrics for generalized persistence modules. Foundations
of Computational Mathematics, pages 1–31, 2014.
[9] G. Carlsson. Topological pattern recognition for point cloud data. Acta Numerica, 23:289–368,
May 2014.
[10] G. Carlsson, V. de Silva, and D. Morozov. Zigzag persistent homology and real-valued functions. In Proceedings of the 25th annual symposium on Computational geometry, pages 247–256.
ACM, 2009.
[11] G. Carlsson and F. Mémoli. Multiparameter hierarchical clustering methods. Classification as
a Tool for Research, pages 63–70, 2010.
[12] G. Carlsson, G. Singh, and A. Zomorodian. Computing multidimensional persistence. Algorithms and Computation, pages 730–739, 2009.
[13] G. Carlsson and A. Zomorodian. The theory of multidimensional persistence. Discrete and
Computational Geometry, 42(1):71–93, 2009.
[14] A. Cerri, B. Di Fabio, M. Ferri, P. Frosini, and C. Landi. Betti numbers in multidimensional persistent homology are stable functions. Mathematical Methods in the Applied Sciences,
36(12):1543–1557, 2013.
71
[15] A. Cerri, B. Di Fabio, G. Jablonski, and F. Medri. Comparing shapes through multi-scale
approximations of the matching distance. Computer Vision, 2014.
[16] W. Chacholski, M. Scolamiero, and F. Vaccarino. Combinatorial resolutions of multigraded
modules and multipersistent homology. arXiv preprint arXiv:1206.1819, 2012.
[17] F. Chazal, D. Cohen-Steiner, M. Glisse, L. Guibas, and S. Oudot. Proximity of persistence
modules and their diagrams. In Proceedings of the 25th annual symposium on Computational
geometry, pages 237–246. ACM, 2009.
[18] F. Chazal, D. Cohen-Steiner, L. Guibas, F. Mémoli, and S. Oudot. Gromov-Hausdorff stable signatures for shapes using persistence. In Proceedings of the Symposium on Geometry
Processing, pages 1393–1403. Eurographics Association, 2009.
[19] F. Chazal, D. Cohen-Steiner, and Q. Mérigot. Geometric inference for probability measures.
Foundations of Computational Mathematics, pages 1–19, 2011.
[20] F. Chazal, V. de Silva, M. Glisse, and S. Oudot. The structure and stability of persistence
modules. arXiv preprint arXiv:1207.3674, 2012.
[21] F. Chazal, V. De Silva, and S. Oudot. Persistence stability for geometric complexes. Geometriae
Dedicata, 173(1):193–214, 2014.
[22] C. Chen and M. Kerber. Persistent homology computation with a twist. In Proceedings 27th
European Workshop on Computational Geometry, volume 11, 2011.
[23] N. Christofides. Worst-case analysis of a new heuristic for the travelling salesman problem.
Report 388, Graduate School of Industrial Administration, CMU, 1976.
[24] D. Cohen-Steiner, H. Edelsbrunner, and J. Harer. Stability of persistence diagrams. Discrete
and Computational Geometry, 37(1):103–120, 2007.
[25] D. Cohen-Steiner, H. Edelsbrunner, and D. Morozov. Vines and vineyards by updating persistence in linear time. In Proceedings of the twenty-second annual symposium on Computational
geometry, pages 119–126. ACM, 2006.
[26] T. Cormen, C. Leiserson, R. Rivest, and C. Stein. Introduction to Algorithms. MIT Press,
2009.
[27] W. Crawley-Boevey. Decomposition of pointwise finite-dimensional persistence modules. Journal of Algebra and Its Applications, 14(05):1550066, 2015.
[28] J. Curry. Sheaves, cosheaves and applications. Ph.D. Dissertation, University of Pennsylvania,
2014.
[29] M. de Berg, O. Cheong, M. van Kreveld, and M. Overmars. Computational Geometry: Algorithms and Applications. Springer, 2008.
[30] H. Derksen and J. Weyman. Quiver representations. Notices of the AMS, 52(2):200–206, 2005.
72
[31] H. Edelsbrunner and J. Harer. Computational topology: an introduction. American Mathematical Society, 2010.
[32] H. Edelsbrunner, D. Letscher, and A. Zomorodian. Topological persistence and simplification.
Discrete and Computational Geometry, 28(4):511–533, 2002.
[33] D. Eisenbud. Commutative Algebra: with a view toward algebraic geometry, volume 150.
Springer Science & Business Media, 1995.
[34] D. Eisenbud. The geometry of syzygies: a second course in algebraic geometry and commutative
algebra, volume 229. Springer Science & Business Media, 2005.
[35] J. Hoogeveen. Analysis of christofides’ heuristic: Some paths are more difficult than cycles.
Operations Research Letters, 10(5):291–295, 1991.
[36] M. Kreuzer and L. Robbiano. Computational commutative algebra 2, volume 1. Springer, 2005.
[37] R. La Scala and M. Stillman. Strategies for computing minimal free resolutions. Journal of
Symbolic Computation, 26(4):409–431, 1998.
[38] C. Landi. The rank invariant stability via interleavings. arXiv preprint arXiv:1412.3374, 2014.
[39] S. Lang. Algebra, revised third edition. Graduate Texts in Mathematics, 2002.
[40] M. Lesnick. The theory of the interleaving distance on multidimensional persistence modules.
Foundations of Computational Mathematics, 15(3):613–650, 2015.
[41] M. Lesnick and M. Wright. Computing multigraded betti numbers of 2-D persistent homology
modules in cubic time. In preparation, 2015.
[42] N. Otter, M. A. Porter, U. Tillmann, P. Grindrod, and H. A. Harrington. A roadmap for the
computation of persistent homology. arXiv preprint arXiv:1506.08903, 2015.
[43] A. Schrijver. Theory of linear and integer programming. John Wiley & Sons, 1998.
[44] C. D. Toth, J. O’Rourke, and J. E. Goodman. Handbook of discrete and computational geometry. CRC press, 2004.
[45] L. Wasserman. All of statistics: a concise course in statistical inference. Springer Verlag, 2004.
[46] C. Webb. Decomposition of graded modules. Proceedings of the American Mathematical
Society, 94(4):565–571, 1985.
[47] A. Zomorodian and G. Carlsson. Computing persistent homology. Discrete and Computational
Geometry, 33(2):249–274, 2005.
73
Notation Index
A• (M )
augmented arrangement of M , page 13
A(M )
line arrangement, page 13
B(M )
barcode of a 1-D persistence module, page 4; fibered barcode of a 2-D persistence module,
page 9
box(S)
quadrant in R2 with upper right corner lub S, page 42
D` , Dp
point-line duality transforms, page 25
e
cell in A(M ), page 13
EG
f
continuous extension functor, page 22
e
template map, page 46
FI-rep
free implicit representation, page 34
flG
floor function for im G, page 21
G
n-D grid function, page 21
G
dual graph of A(M ), page 46
Γ
path through all 2-cells of G, page 46
grW
grade function of the n-graded set W, page 18
Hi
ith homology functor, page 4
[k]
integers {1, . . . , k}, page 34
κ
coarseness of a 2-D persistence module, page 15
L̄
space of affine lines in R2 with non-negative slope, page 9
L
space of affine lines in R2 with non-negative, finite slope, page 9
L◦
space of affine lines in R2 with finite, positive slope, page 26
lifte
lift map at cell e, page 45
lub
least upper bound, page 26
M
multidimensional persistence module, page 4
mj
dimension of Φ, page 34
non-negative integers, page 9
N
e
ord
order map at cell e, page 45
P
set of all template points, page 38
P
e
set of template points at cell e, page 29
p.f.d.
pointwise finite dimensional, page 4
Φ
a free implicit representation, page 34
pushL
R
n
push map, page 26
poset category of Rn , page 3
rank(M ) rank invariant of M , page 9
74
S
union of the supports of the 0th and 1st bigraded Betti numbers of M , page 24
Se
totally ordered partition of S, page 29
σj
permutation of [mj ], page 44
e
T
barcode template at cell e, page 13
ξi (M )
ith (graded) Betti number of M , page 10
ζe
map from positive integers to template points at cell e, page 29
n
Z
Poset category of Zn , page 21
75
| 0math.AC
|
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
The Journal of MacroTrends in
Technology and Innovation
MACROJOURNALS
Automatic Knot Adjustment Using Dolphin
Echolocation Algorithm for B-Spline Curve
Approximation
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**
*Necmettin Erbakan University, School of Applied Sciences, Department of Management Information
Sciences
**Selcuk University, Faculty of Engineering, Department of Computer Engineering
Abstract
In this paper, a new approach to solve the cubic B-spline curve fitting problem is
presented based on a meta-heuristic algorithm called “dolphin echolocation”. The
method minimizes the proximity error value of the selected nodes that measured
using the least squares method and the Euclidean distance method of the new curve
generated by the reverse engineering. The results of the proposed method are
compared with the genetic algorithm. As a result, this new method seems to be
successful.
Keywords: B-spline Curve Approximation, Cubic B-spline, Data Parameterization on B-Spline, Dolphin
Echolocation Algorithm, Knot adjustment
1. INTRODUCTION
B-Spline curve fitting is a classical problem for computer aided geometric design [1]. For
example, de facto for the CAD / CAM and related graphic design industries, and in most
geometric modeling areas is that non-polynomial parametric curves should be transformed into
non-uniform rational B-splines. Similarly, in vector font modeling problems, fonts are often
fitted with a soft-pass B-Spline. In practical applications, the distance between the target curve
and the fitted B-Spline curve must be less than a predetermined tolerance, and the resulting
curve is called an error-bound approach. Euclidean distance method is used to measure the
value corresponding to the distance between two curves.
100
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
2. B-SPLINE CURVE FITTING PROBLEM
The problem of B-Spline curve fitting is expressing the target curve with minimum tolerance
through b-spline curves. The target curve can be two or three dimensional [2]. The scope of this
paper
The parameterization of the target data points
The convergence of the minimum error tolerance with the B-Spline curves using the
automatically placed minimum control point constitute.
A B-spline curve is expressed as equation (1).
𝑛
𝑃(𝑢) = ∑ 𝑝𝑖 𝑁𝑖 ,𝑝 (𝑢) #(1)
𝑖=0
where 𝑝𝑖 is the ith control point and 𝑁𝑖,𝑝 is the main function of B-Spline curves.
The main function 𝑁𝑖,𝑝 of B-Spline curve for given knot vector t with degree p is expressed as
equation (2).
1,
𝑡𝑖 ≤ 𝑢 ≤ 𝑡𝑖+1
𝑁𝑖,0 (𝑢) = {
0,
𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑡𝑖+𝑝+1 − 𝑢
𝑢 − 𝑡𝑖
(𝑢) #(2)
𝑁𝑖 ,𝑝−1 (𝑢) +
𝑁
𝑡𝑖+𝑝 − 𝑡𝑖
𝑡𝑖+𝑝+1 − 𝑡𝑖+1 𝑖+1,𝑝−1
Further information on the B-Spline curves can be found [3].
𝑁𝑖,𝑝 (𝑢) =
A. Methods on Data Parameterization
Because of B-Spline curves are parametric curves, the target data points need to be
parameterized in the B-Spline curve fitting. However calculation of optimum data
parameterization is theoretically quite difficult, different ways of data parameterization are
used in applications. Three methods of uniform parameterization, chord-length
parameterization, and centripetal parameterization are emerging in researches based on
previous studies [4,5,6]. In this study centripetal parameterization method is used.
B. Euclidean Distance Minimization
The Euclidean distance is used to calculate the error between the target curve and the BSpline fitted curve. The Euclidean distance is calculated by an equation (3)
𝐿
2
𝐷 = √∑(𝐶(𝑖) − 𝐵(𝑖)) #(3)
𝑖=1
where 𝐶(𝑖) is the ith data in original dataset, 𝐵(𝑖) is the ith data in the fitted curve. The general
101
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
approach of this paper is to minimize this distance and express the B-Spline curve with
minimum control point at the same time. Thus the Euclidean distance and the number of
control points is treated together in the fitness function.
C. Dolphin Echolocation Algorithm
The dolphin echolocation algorithm presented by Kaveh and Ferhoudi is an optimization
algorithm that is inspired by the hunting principles of bottlenose dolphins through sonar waves
[7]. The dolphins explore the entire search area for a specific effect to hunt. As they approach
their prey, they try to focus on the target by limiting the number of waves they send by limiting
their search. This algorithm implements search by reducing the distance to the target. The
search space must be sorted before beginning to search. The alternatives of each variable to be
optimized must be sorted in ascending or descending order. If these alternatives have more
than one characteristic, they should be sorted according to the most important one. In the use
of this technique, for example, for the variable j, the vector Aj in length LAj forms the columns
of the Alternatives Matrix. In addition, a convergence curve is used to change the convergence
factor during the optimization process. The variation of this trend throughout the iterations is
calculated by equation (4).
𝐿𝑜𝑜𝑝𝑖𝑃𝑜𝑤𝑒𝑟 − 1
)
(1
)
𝑃𝑃(𝐿𝑜𝑜𝑝𝑖 = 𝑃𝑃1 + − 𝑃𝑃𝑖 ∗
#(4)
(𝐿𝑜𝑜𝑝𝑠𝑁𝑢𝑚𝑏𝑒𝑟)𝑃𝑜𝑤𝑒𝑟 − 1
where PP is the probability of being pre-defined, PP1 is randomly selected probability for the
first iteration, Loopi is the number of the current iteration, Power is the rank of the curve, and
LoopsNumber is the total number of iterations. Algorithm requires a location matrix LNL*NV in the
variable number NV at the location count NL.
The main steps of Dolphin Echolocation (DE) for discrete optimization are as follows:
1. Create NL locations randomly for dolphin.
2. PP of current iteration is calculated using the equation (4).
3. Fitness is calculated for every location.
4. Calculate cumulative fitness according to the following dolphin rules
(a)
for i = 1 to the number of locations
for j = 1 to the number of variables
find the position of L(i,j) in jth column of the Alternatives matrix and name it as A.
for k = -Re to Re
1
𝐴𝐹
=
∗ (𝑅𝑒 − |𝑘|) ∗ 𝐹𝑖𝑡𝑛𝑒𝑠𝑠(𝑖) + 𝐴𝐹 (A+k) #(5)
(𝐴+𝑘)𝑗
where AF(A+k)j is the cumulative fitness
for the jth variable
𝑅𝑒 of the selected alternative (𝐴+𝑘)𝑗
(the numbering of the alternatives is the same as the ordering of the alternative matrix); Re is
end
end
end
102
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
the diameter of the influence of the neighbor affected by the cumulative fitness of alternative
A. It is recommended that this diameter should not be more than 1/4 of the search space;
Fitness(i) is the fitness of the ith location. The fitness should be defined as the best answers will
get higher value. In other words, the goal of optimization should be to maximize the fitness.
AF must be calculated using a reflective property by adding alternatives near the edges (if A +
k is not valid, i.e. A + k <0 or A + k> LAj).
In this case, if the distance of the alternative to the edge is small, the same alternatives
appear in the mirror as if a mirror were placed on the edge.
(b) A small έ value is added to AF sequences AF=AF+έ in order to distribute probabilities
uniformly in search space. Here έ should be chosen according to the way of describing the
fitness. The best choice is lower than the lowest fitness value achieved.
(c) Find the best location for this loop and call it as "Best location". Find the alternatives
assigned to the best location variables and set their AF to zero.
In another saying:
for j = 1: Number of variables
for i = 1: Number of alternatives
if i = The best location(j)
𝐴𝐹𝑖𝑗 = 0
5. For the variable j (j = 1 to NV), calculate the probability by choosing alternative i (i = 1 to ALj)
endequation (6).
according to the
𝐴𝐹𝑖𝑗
end
𝑃𝑖𝑗 = 𝐿𝐴𝑗
#(6)
∑𝑖=1 𝐴𝐹𝑖𝑗
6. end
Assign PP probability to all alternatives of all selected variables for the best location and
distribute the remaining probability to other alternatives according to the form below:
for j = 1 to Number of variables
for i = 1 to Number of alternatives
if i = The best location(j)
𝑃𝑖𝑗 = 𝑃𝑃
7. Calculate the else
next step locations according to the assigned probability to each alternate.
Repeat steps 2-6 maximum
iteration number times.
𝑃 = (1 − 𝑃𝑃) ∗ 𝑃
𝑖𝑗
𝑖𝑗
end
end
end
103
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
3. AUTOMATIC KNOT ADJUSTMENT BY DOLPHIN ECHOLOCATION ALGORITHM
In the problem of B-Spline curve fitting, the fitted curve is tried to converge to the target
curve with minimum tolerance and with minimum control point. In that case, such nodes must
be selected for the given N points so that the error tolerance and the number of control points
of the nearest curve are minimum. Thus, an array of N bits is expressed 1 as selected nodes and
0 as non-selected. Thus, the alternatives for each variable are [0,1]. Each location for a dolphin
echolocation is called as solution. These solutions can be illustrated as Figure 1.
Figure 1. Sample solution illustration
For example, it is possible to express 10 points in this way with the control points to be
calculated for the 5 selected nodes. The aim of dolphin echolocation is maximizing the fitness
for equation (7) can be used as fitness function.
𝑓=
1
#(7)
𝑁𝑢𝑚𝑏𝑒𝑟𝑜𝑓𝐶𝑜𝑛𝑡𝑟𝑜𝑙𝑃𝑜𝑖𝑛𝑡 ∗ 𝐸𝑟𝑟𝑜𝑟𝑉𝑎𝑙𝑢𝑒
The B-Spline curve fitting process with the dolphin echolocation algorithm is as follows.
1. Create random solutions for the startup population.
2. Calculate the PP of current iteration.
3. Calculate the fitness value for all possible solutions.
4. Calculate the cumulative fitness of the variables in each possible solution.
5. Find the best solution according to maximum fitness.
6. Set the cumulative fitness of all solutions variables to 0 which variables equal to the
variables of the best solution.
7. Calculate the probabilities of alternatives for each variable in all solutions.
8. Set the probabilities of all alternatives equal to the variables of the best solution to
probability of the current iteration.
104
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
9. Find the possible solutions to be used in the next iteration by the probabilities of the
alternatives for each variable.
10. Repeat steps 2-9 for the number of iteration times.
4. EXPERIMENTAL RESULTS
A. Experimental Curve
The target is a curve of 200 points. The approximation results of the 3rd degree B-Spline
curves are as shown in Table 1.
GENETIC ALGORITHM
ITERATION
RMSE
10
25
50
100
250
500
1000
2000
4,36660
3,90026
2,18640
2,93898
2,49795
1,75746
1,97076
1,66949
Euclidean Number
Distance
of
Control
Point
670,6340
92
607,9586
96
308,7266
108
418,3969
93
350,5132
97
243,1649
101
278,8363
97
256,1887
98
DOLPHIN ECHOLOCATION ALGORITHM
Fitness
RMSE
61698,32
58364,02
33342,48
38910,91
33999,78
24559,65
27047,12
25106,49
3,92919
3,25922
1,62066
1,88715
1,81226
1,75954
1,41782
1,59712
Euclidean Number
Distance
of
Control
Point
572,6328
95
471,9693
93
233,4690
97
252,2174
98
244,5128
84
226,2702
93
201,0667
89
201,9198
87
Fitness
54400,11
43893,14
22646,50
24717,30
20539,08
21043,13
17894,94
17567,02
Table 1. Experimental results for different number of iteration.
Plotted experimental results is shown in Figure 2.
Figure 2. A) Original Curve, B) Genetic Algorithm, C) Dolphin Echolocation Algorithm
105
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
B. Epitrochoid Curve
The
target
is
a
curve
of
361
points.
The
curve equation is as follows.
𝑎
𝑥(𝑡) = (𝑎 + 𝑏) ∗ cos(𝑡) − ℎ ∗ cos (( + 1) ∗ 𝑡)
𝑏
𝑎
𝑦(𝑡) = (𝑎 + 𝑏) ∗ sin(𝑡) − ℎ ∗ sin (( + 1) ∗ 𝑡)
𝑏
For the parameters a = 5, b = 1 and h = 4, The approximation results of the 3rd degree B-Spline
curve for the curve calculated at -180 <= t <= 180 are as in Table 2.
GENETIC ALGORITHM
ITERATION
10
25
50
100
250
500
1000
2000
RMSE
Euclidea
n
Distance
5,2401
Number of
Control
Point
174
DOLPHIN ECHOLOCATION ALGORITHM
Fitnes
s
RMSE
Euclidea
n
Distance
3,3247
Number of
Control
Point
189
Fitness
192
663,78
185
680,02
195
583,69
185
553,83
181
565,97
179
312,68
166
328,61
0,015
911,7 0,0068
10
8
9
0,007
3,1472
196
616,8 0,0085
3,4572
95
4
1
0,009
3,6672
179
656,4 0,0090
3,6758
37
4
6
0,004
2,4077
193
464,6 0,0065
2,9933
60
9
2
0,007
3,2174
164
527,6 0,0073
2,9937
67
5
9
0,005
2,5488
170
433,3 0,0063
3,1269
71
0
8
0,002
1,7965
189
339,5 0,0025
1,7468
45
4
2
0,003
1,8436
198
365,0 0,0030
1,9796
14
3
8
Table 2. Experimental results for different number of iteration.
628,37
106
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
Plotted experimental results is shown in Figure 3.
Figure 3. A) Original Curve, B) Genetic Algorithm, C) Dolphin Echolocation Algorithm
C. Archimedean Spiral
The target is a curve of 100 points. The curve equation is as follows.
𝑟=𝑎∗ 𝑡
𝑥(𝑡) = 𝑟 ∗ cos(𝑡)
𝑦(𝑡) = 𝑟 ∗ sin(𝑡)
For the a = 2, The approximation results of the 3rd degree B-Spline curve for the curve
calculated at 0 <= t <= π are as shown in Table 3.
GENETIC ALGORITHM
ITERATION
10
25
50
100
250
500
1000
2000
RMSE
Euclidean
Distance
DOLPHIN ECHOLOCATION ALGORITHM
Number Fitness
RMSE
Euclidean Number
of
Distance of Control
Control
Point
Point
0,00468
1,3419
46
61,73
0,00279
1,2520
47
0,00356
1,2649
43
54,39
0,00468
1,3680
48
0,00150
1,1490
50
57,45
0,00417
1,3182
44
0,00178
1,1159
48
53,56
0,00340
1,2512
38
0,00209
1,1604
38
44,09
0,00535
1,3127
32
0,00205
1,1405
38
43,34
0,00313
1,2247
34
0,00209
1,1435
41
46,88
0,00257
1,2135
36
0,00318
1,2054
33
39,78
0,00277
1,1890
36
Table 3. Experimental results for different number of iteration.
Fitness
58,84
65,67
58,00
47,54
42,01
41,64
43,69
42,81
107
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
Plotted experimental results is shown in Figure 4.
Figure 4. A) Original Curve, B) Genetic Algorithm, C) Dolphin Echolocation Algorithm
D. Vivaldi Curve
The target curve is a curve of 241 points. The curve equation is as follows.
𝑥(𝑡) = 𝑎 ∗ (1 + cos(𝑡))
𝑦(𝑡) = 𝑎 ∗ sin(𝑡)
1
𝑧(𝑡) = 2 ∗ 𝑎 ∗ sin ( ∗ 𝑡)
2
For a = 0.5, The approximation results of the 3rd degree B-Spline curve for the curve
calculated at -360 <= t <= 360 are as shown in Table 4.
GENETIC ALGORITHM
ITERATION
10
25
50
100
250
500
1000
2000
RMSE
Euclidea
n
Distance
Number
of Control
Point
DOLPHIN ECHOLOCATION ALGORITHM
Fitness
RMSE
Euclidea
n
Distance
0,00036 1,0711
108
115,67 0,00026 1,0599
0,00021 1,0578
101
106,84 0,00029 1,0636
0,00024 1,0431
90
93,88
0,00054 1,0957
0,00015 1,0271
96
98,60
0,00037 1,0805
0,00013 1,0231
95
97,20
0,00062 1,1046
0,00015 1,0256
80
82,05
0,00074 1,1149
0,00018 1,0327
71
73,32
0,00036 1,0759
0,00028 1,0419
59
61,47
0,00066 1,1431
Table 4. Experimental results for different number of iteration.
Plotted experimental results is shown in Figure 5.
Number
of
Control
Point
92
96
77
79
65
53
54
40
Fitness
97,52
102,11
84,37
85,36
71,80
59,09
58,10
45,72
108
Hasan Ali AKYÜREK*, Erkan ÜLKER**, Barış KOÇER**, JMTI Vol 4 Issue 1 2016
Figure 5. A) Original Curve, B) Genetic Algorithm, C) Dolphin Echolocation Algorithm
5. CONCLUSION AND FEATURE WORK
This paper addresses the problem of curve fitting of noisy data points by using B-spline
curves. Given a set of noisy data points, the goal is to compute all parameters of the
approximating polynomial B-spline curve that best fits the set of data points in the least-squares
sense. This is a very difficult, overdetermined, continuous, multimodal, and multivariate
nonlinear optimization problem. Our proposed method solves it by applying the dolphin
echolocation algorithm. Our experimental results show that the presented method performs
very well by fitting the data points with a high degree of accuracy. A comparison with the most
popular previous approach genetic algorithm to this problem is also carried out. It shows that
our method outperforms previous approaches for the examples discussed in this paper. Future
work includes the extension of this method to other families of curves, such as NURBS and the
parametric B-spline curves. The extension of these results to the case of explicit surfaces is also
part of our future work.
REFERENCES
Park, H., & Lee, J. H. (2007). B-spline curve fitting based on adaptive curve refinement using dominant
points. Computer-Aided Design, 39(6), 439-451.
De Boor, C., De Boor, C., Mathématicien, E. U., De Boor, C., & De Boor, C. (1978). A practical guide to
splines (Vol. 27, p. 325). New York: Springer-Verlag.
Piegl, L., & Tiller, W. (2012). The NURBS book. Springer Science & Business Media.
Park, H. (2001). Choosing nodes and knots in closed B-spline curve interpolation to point data. ComputerAided Design, 33(13), 967-974.
Vassilev, T. I. (1996). Fair interpolation and approximation of B-splines by energy minimization and points
insertion. Computer-Aided Design, 28(9), 753-760.
Wang, X., Cheng, F. F., & Barsky, B. A. (1997). Energy and B-spline interproximation. Computer-Aided
Design, 29(7), 485-496.
Kaveh, A., & Farhoudi, N. (2013). A new optimization method: Dolphin echolocation. Advances in
Engineering Software, 59, 53-70.
109
| 9cs.NE
|
On Integer Programming and the Path-width of the Constraint
Matrix
Fedor V. Fomin1 , Fahad Panolan1 , M. S. Ramanujan2 , and Saket Saurabh1,3
arXiv:1607.05342v2 [cs.DS] 3 Nov 2016
1
Department of Informatics, University of Bergen, Norway.
{fomin|fahad.panolan}@ii.uib.no
2
Technische Universität Wien, Vienna, Austria. [email protected]
3
The Institute of Mathematical Sciences, HBNI, Chennai, India. [email protected]
Abstract
In the classic Integer Programming (IP) problem, the objective is to decide whether, for a
given m × n matrix A and an m-vector b = (b1 , . . . , bm ), there is a non-negative integer n-vector
x such that Ax = b. Solving (IP) is an important step in numerous algorithms and it is important
to obtain an understanding of the precise complexity of this problem as a function of natural
parameters of the input.
Two significant results in this line of research are the pseudo-polynomial time algorithms
for (IP) when the number of constraints is a constant [Papadimitriou, J. ACM 1981] and when
the branch-width of the column-matroid corresponding to the constraint matrix is a constant
[Cunningham and Geelen, IPCO 2007]. In this paper, we prove matching upper and lower bounds
for (IP) when the path-width of the corresponding column-matroid is a constant. These lower
bounds provide evidence that the algorithm of Cunningham and Geelen, are probably optimal.
We also obtain a separate lower bound providing evidence that the algorithm of Papadimitriou
is close to optimal.
1
Introduction
In the classic Integer Programming problem, the input is an m × n integer matrix A, and an m-vector
b = (b1 , . . . , bm ). The objective is to find a non-negative integer n-vector x (if one exists) such that
Ax = b. Solving this problem, denoted by (IP) is an important step in numerous algorithms and it
is important to obtain an understanding of the precise complexity of this problem as a function of
natural parameters of the input.
In 1981, Papadimitriou [26] showed that (IP) is solvable in pseudo-polynomial time on instances
for which the number of constraints m is a constant. His proof consists of two steps. The first step
is combinatorial, showing that if the entries of A and b are from {0, ±1, . . . , ±d}, and (IP) has a
solution, then there is also a solution which is in {0, 1, . . . , n(md)2m+1 }n . The second, algorithmic
step shows that if (IP) has a solution with the maximum entry at most B, then the problem is
solvable in time O((nB)m+1 ). In particular, when the matrix A happens to be non-negative, his
algorithm for IP runs in time O((nd)m+1 ) where d = max{b1 , . . . , bm }. A natural question therefore
is whether the algorithm of Papadimitriou can be improved significantly in general and in particular
for the case when A is non-negative. Our first theorem provides a conditional lower bound indicating
that any significant improvements are unlikely. To be precise, we prove the following theorem.
Theorem 1.1. Unless the Exponential Time Hypothesis (ETH) fails, (IP) with m × n matrix A
o( m )
cannot be solved in time n log m do(m) , where d = max{b1 , . . . , bm }, even when the constraint matrix
A is non-negative and each entry in any feasible solution is at most 2.
ETH is the conjecture that 3-SAT cannot be solved in time 2o(n) on n-variable formulas [21].
Due to Theorem 1.1, the simple dynamic programming algorithm [26] for (IP) when the maximum
entry in a solution, as well as in the constraint matrix, is bounded, is already close to optimal. In
fact, when the constraint matrix is non-negative, our lower bound asymptotically almost matches
the O((nd)m+1 ) running time of Papadimitriou’s algorithm [26]. Hence, we conclude that obtaining
a significant improvement over the algorithm of Papadimitriou for non-negative matrices is at least
as hard as obtaining a sub-exponential time (2o(n) ) algorithm for 3-SAT. In fact, observe that based
on the setting of the parameters m, d, n our lower bound rules out several interesting running times.
For instance, if m = Θ(n) and d = O(1), we immediately get a 2o(n) lower bound.
Continuing the quest for faster algorithms for (IP), Cunningham and Geelen [8] suggested a
new approach for solving (IP) which utilizes a branch decomposition of the matrix A. They were
motivated by the fact that the result of Papadimitriou can be interpreted as a result for matrices of
constant rank and branch-width is a parameter which is upper bounded by rank plus one. Robertson
and Seymour [28] introduced the notion of branch decompositions and the corresponding notion of
branch-width for graphs and more generally for matroids. Branch decompositions have immense
algorithmic significance because numerous NP-hard problems can be solved in polynomial time on
graphs or matroids of constant branchwidth [7, 16, 19, 18]. For a matrix A, the column-matroid
of A denotes the matroid whose elements are the columns of A and whose independent sets are
precisely the linearly independent sets of columns of A. We postpone the formal definitions of
branch decomposition and branch-width till the next section. For (IP) with a non-negative matrix
A, Cunningham and Geelen [8] showed that when the branch-width of the column-matroid of A is
constant, (IP) is solvable in pseudo-polynomial time.
Theorem 1.2 (Cunningham and Geelen [8]). (IP) with non-negative m × n matrix A given
together with a branch decomposition of its column matroid of width k, is solvable in time O((d +
1)2k mn + m2 n), where d = max{b1 , . . . , bm }.
1
Upper Bounds
O(nd)m+1 [26]
(non-negative matrix A)
O((d + 1)pw+1 mn + m2 n) (Theorem 1.3)
(non-negative matrix A)
Lower bounds
m )
o( log
m do(m)
no n
algorithm under ETH (Theorem 1.1)
(even for non-negative matrix A)
no f (pw)(d + 1)(1−)pw (mn)O(1) algorithm under SETH (Theorem 1.4)
(even for non-negative matrix A)
no f (d)(d + 1)(1−)pw (mn)O(1) algorithm under SETH (Theorem 1.5)
(even for non-negative matrix A)
Figure 1: A summary of our lower bound results in comparison to the known/new upper bound
results for non-negative A. Here, n and m are the number of variables and constraints respectively,
pw denotes the path-width of the column matroid of A and d denotes a bound on the largest entry
in b.
In fact, they also show that the assumption of non-negativity is unavoidable (without any further
assumptions such as a bounded domain for the variables) in this setting because (IP) is NP-hard
when the constraint matrix A is allowed to have negative values (in fact even when restricted to
{−1, 0, 1}) and the branchwidth of the column matroid of A is at most 3. A close inspection of the
instances they construct in their NP-hardness reduction shows that the column matroids of the
resulting constraint matrices are in fact direct sums of circuits, implying that even their path-width
is bounded by 3. The parameter path-width is closely related to the notion of trellis-width of a
linear code, which is a parameter commonly used in coding theory [20]. For a matrix A ∈ Rm×n ,
computing the path-width of the column matroid of A is equivalent to computing the trellis-width
of the linear code generated by A. Roughly speaking, the path-width of the column matroid of A is
at most k, if there is a permutation of the columns of A such that in the matrix A0 obtained from
A by applying this column-permutation, for every 1 ≤ i ≤ n − 1, the dimension of the subspace of
Rm obtained by taking the intersection of the subspace of Rm spanned by the first i columns and
the subspace of Rm spanned by the remaining columns, is at most k − 1.
The value of the parameter path-width is always at least the value of branch-width and at
most rank+1. As a result, any upper bounds on the complexity of (IP) in terms of path-width will
translate to upper bounds in terms of the larger parameter rank (number of constraints) and any
lower bounds on the complexity of (IP) in terms of path-width will translate to lower bounds in
terms of the smaller parameter branch-width. Motivated by this fact, we study the question of
designing an ‘optimal’ pseudo-polynomial time algorithm for (IP) when the column matroid of A
has constant path-width. We first obtain the following upper bound.
Theorem 1.3. (IP) with non-negative m×n matrix A given together with a path decomposition of its
column matroid of width k is solvable in time O((d + 1)k+1 mn + m2 n), where d = max{b1 , . . . , bm }.
As mentioned earlier, the NP-hardness of (IP) on constant branch-width instances also holds for
constant path-width instances and hence the assumption of non-negativity is unavoidable here as
well. Furthermore, while the proof of this theorem is not hard and is in fact almost identical to
the proof of Theorem 1.2, this upper bound becomes really interesting when placed in context and
compared to the tight lower bounds we provide in our next two theorems, which form the main
technical part of the paper. In these theorems, we provide tight conditional (subject to Strong ETH)
lower bounds for (IP) matching the running time of the algorithm of Theorem 1.3 (see Figure 1).
Strong ETH (SETH) is the conjecture that CNF-SAT cannot be solved in time (2 − )n mO(1) on
n-variable m-clause formulas for any constant . Both ETH and SETH were first introduced in
2
the work of Impagliazzo and Paturi [21], which built upon earlier work of Impagliazzo, Paturi and
Zane [22]. We obtain the following lower bounds for (IP). The first result shows that we cannot
relax the (d + 1)k factor in Theorem 1.3 even if we allow in the running time, an arbitrary function
depending on k. The second result shows a similar lower bound in terms of d instead of k. Put
together the results imply that no matter how much one is allowed to compromise on either the
path-width or the bound on d, it is unlikely that the algorithm of Theorem 1.3 can be improved.
Theorem 1.4. Unless SETH fails, (IP) with even a non-negative m × n constraint matrix A cannot
be solved in time f (k)(d+1)(1−)k (mn)O(1) for any function f and > 0, where d = max{b1 , . . . , bm }
and k is the path-width of the column matroid of A.
Theorem 1.5. Unless SETH fails, (IP) with even a non-negative m × n constraint matrix A cannot
be solved in time f (d)(d+1)(1−)k (mn)O(1) for any function f and > 0, where d = max{b1 , . . . , bm }
and k is the path-width of the column matroid of A.
Although the proofs of both lower bounds have a similar structure, we believe that there are
sufficiently many differences in the proofs to warrant stating them separately. Finally, since the
branch-width of a matroid never exceeds its path-width, our lower bounds hold when the parameter
of interest is chosen to be the branch-width of the column matroid of A as well. That is, under
SETH, there is no f (bw)(d + 1)(1−)bw (mn)O(1) or f (d)(d + 1)(1−)bw (mn)O(1) algorithm for (IP)
with non-negative constraint matrices (where bw denotes the branchwidth of the column matroid of
A), almost matching the upper bound of O((d + 1)2bw mn + m2 n) from Theorem 1.4.
Related work. Currently ETH is a commonly accepted conjecture and it serves as the basic
tool used for establishing asymptotically optimal lower bounds for various parameterized and
exact exponential algorithms. While there is no such consensus on SETH, the hypothesis has
already played a crucial role in the recent spectacular and rapid development in the analyses of
polynomial, parameterized and exact exponential algorithms. In particular, SETH was used to
establish conditional tight lower bounds for a number of fundamental computational problems,
including k-domination [27], the diameter of sparse graphs [29], dynamic connectivity problems [2],
the Frechet distance computation [5], string editing distance [3], dynamic programming on graphs of
bounded tree-width and clique-width [24, 12, 15, 9], Steiner tree and subset sum [10], finding the
longest common subsequence and the dynamic time warping distance [1, 6], and matching regular
expressions [4]. For further overview of applications of ETH and SETH, we refer to surveys [25, 31]
as well as [11, Chapter 14]. Our work extends this line of research by adding the fundamental (IP)
problem to the classes of “SETH-hard” and “ETH-hard” problems.
Organization of the paper. The remaining part of the paper is organized as follows. The
main technical part of the paper is devoted to proving Theorem 1.4 and Theorem 1.5. Therefore,
once we have set up the requisite preliminary definitions, we begin with Section 3 where we prove
Theorem 1.4. The first part of this section contains an overview of both reductions and could
be helpful for the reader in navigating the paper. We then prove Theorem 1.5 in Section 4 and
Theorem 1.3 in Section 5 (completing the results for constant path-width) and that of Theorem 1.1
in Section 6.
2
Preliminaries
We assume that the reader is familiar with basic definitions from linear algebra, matroid theory and
graph theory.
3
Notations. We use Z≥0 and R to denote the set of non negative integers and real numbers,
respectively. For any positive integer n, we use [n] and Zn to denotes the sets {1, . . . , n} and
{0, 1, . . . , n − 1}, respectively. For convenience, we say that [0] = ∅. For any two vectors b, b0 ∈ Rm
and i ∈ [m], we use b[i] to denote the ith coordinate of b and we write b0 ≤ b, if b0 [i] ≤ b[i] for all
i ∈ [m]. We often use 0 to denote the zero-vector whose length will be clear from the context.
For a matrix A ∈ Rm×n , I ⊆ [m] and J ⊆ [n], A[I, J] denote the submatrix of A obtained by the
restriction of A to the rows indexed by I and columns indexed by J. For an m × n matrix A and
P
n-vector v, we can write Av = ni=1 Ai v[i], where Ai is the ith column of A. Here we say that v[i]
is a multiplier of column Ai .
Branch-width of matroids. The notion of the branch-width of graphs, and implicitly of matroids,
was introduced by Robertson and Seymour in [28]. Let M = (U, F) be a matroid with universe set
U and family F of independent sets over U . We use rM to denote the rank function of M . That is,
for any S ⊆ U , rM (S) = maxS 0 ⊆S,S 0 ∈F |S 0 |. For X ⊆ U , the connectivity function of M is defined as
λM (X) = rM (X) + rM (U \ X) − rM (U ) + 1
For matrix A ∈ Rm×n , we use M (A) to denote the column-matroid of A. In this case the
connectivity function λM (A) has the following interpretation. For E = {1, . . . , n} and X ⊆ E, we
define
S(A, X) = span(A|X) ∩ span(A|E \ X),
where A|X is the set of columns of A restricted to X and span(A|X) is the subspace of Rm spanned
by the columns A|X. It is easy to see that the dimension of S(A, X) is equal to λM (A) (X) − 1.
A tree is cubic if its internal vertices all have degree 3. A branch decomposition of matroid M
with universe set U is a cubic tree T and mapping µ which maps elements of U to leaves of T . Let
e be an edge of T . Then the forest T − e consists of two connected components T1 and T2 . Thus
every edge e of T corresponds to the partitioning of U into two sets Xe and U \ Xe such that µ(Xe )
are the leaves of T1 and µ(U \ Xe ) are the leaves of T2 . The width of edge e is λM (Xe ) and the
width of branch decomposition (T, µ) is the maximum edge width, where maximum is taken over all
edges of T . Finally, the branch-width of M is the minimum width taken over all possible branch
decompositions of M .
The path-width of a matroid is defined as follows. Let us remind that a caterpillar is a tree
which is obtained from a path by attaching to some vertices of the paths some leaves. Then the
path-width of a matroid is the minimum width of a branch decomposition (T, µ), where T is a
cubic caterpillar. Let us note that every mapping of elements of a matroid to the leaves of a
cubic caterpillar, correspond to their ordering. Jeong, Kim, and Oum [23] gave a constructive
fixed-parameter tractable algorithm to construct a path decomposition of width at most k for a
column matroid of a given matrix.
ETH and SETH. For q ≥ 3, let δq be the infimum of the set of constants c for which there exists an
algorithm solving q-SAT with n variables and m clauses in time 2cn · mO(1) . The Exponential-Time
Hypothesis (ETH) and Strong Exponential-Time Hypothesis (SETH) are then formally defined as
follows. ETH conjectures that δ3 > 0 and SETH that limq→∞ δq = 1.
3
Proof of Theorem 1.4
In this section we prove that unless SETH fails, (IP) with non-negative matrix A cannot be solved
in time f (k)(d + 1)(1−)k (mn)O(1) for any function f and > 0, where d = max{b[1], . . . , b[m]} and
k is the path-width of the column matroid of A. In Subsection 3.1, we give an overview of our
reductions and in Subsection 3.2 we give a detailed proof of Theorem 1.4
4
3.1
Overview of our reductions
We prove Theorems 1.4 and 1.5 by giving reductions from CNF-SAT, where the parameters in
the reduced instances are required to obey certain strict conditions. For example, the reduction we
give to prove Theorem 1.4 must output an instance of (IP), where the path-width of the column
matroid M (A) of the constraint matrix A is a constant. Similarly, in the reduction used to prove
Theorem 1.5, we need to construct an instance of (IP), where the largest entry in the target
vector is upper bounded by a constant. These stringent requirements on the parameters make
the SETH-based reductions quite challenging. However, reductions under SETH can take super
polynomial time—they can even take 2(1−)n time for some > 0, where n is the number of variables
in the instance of CNF-SAT. This freedom to avail exponential time in SETH-based reductions is
used crucially in the proofs of Theorems 1.4 and 1.5.
Now we give an overview of the reduction used to prove Theorem 1.4. Let ψ be an instance of
CNF-SAT with n variables and m clauses. Given ψ and a fixed constant c ≥ 2, we construct an
instance A(ψ,c) x = b(ψ,c) , x ≥ 0 of (IP) satisfying certain properties. Since for every c ≥ 2, we have
a different A(ψ,c) and b(ψ,c) , this can be viewed as a family of instances of (IP). In particular our
main technical lemma is the following.
Lemma 3.1. Let ψ be an instance of CNF-SAT with n variables and m clauses. Let c ≥ 2 be a
n
fixed integer. Then, in time O(m2 2 c ), we can construct an instance A(ψ,c) x = b(ψ,c) , x ≥ 0, of (IP)
with the following properties.
(a.) ψ is satisfiable if and only if A(ψ,c) x = b(ψ,c) , x ≥ 0 is feasible.
n
(b.) The matrix A(ψ,c) is non-negative and has dimension O(m) × O(m2 c ).
(c.) The path-width of the column matroid of A(ψ,c) is at most c + 4.
n
(d.) The largest entry in b(ψ,c) is at most 2d c e − 1.
Once we have Lemma 3.1, the proof of Theorem 1.4 follows from the following observation: if
we have an algorithm A solving (IP) in time f (k)(d + 1)(1−)k (mn)a for some , a > 0, then we can
use this algorithm to refute SETH. In particular, given an instance ψ of CNF-SAT, we choose an
appropriate c depending only on and a, construct an instance A(ψ,c) x = b(ψ,c) , x ≥ 0, of (IP), and
run A on it. Our careful choice of c will imply a faster algorithm for CNF-SAT, refuting SETH.
More formally, we choose c to be an integer such that (1 − ) + 4(1−)
+ ac < 1. Then the total
c
running time to test whether ψ is satisfiable, is the time require to construct A(ψ,c) x = b(ψ,c) , x ≥ 0
plus the time required by A to solve the constructed instance of (IP). That is, the time required to
test whether ψ is satisfiable is
n
n
O(m2 2 c ) + f (c + 4)2 c (1−)(c+4) 2
a·n
c
mO(1) = 2
(1−)+
4(1−)
+ ac
c
n
0
mO(1) = 2 n mO(1) ,
where 0 < 1 is a constant depending on the choice of c. It is important to note that the utility of the
reduction described in Lemma 3.1 is extremely sensitive to the value of the numerical parameters
involved. In particular, even when the path-width blows up slightly, say up to δc, or when the
n
largest entry in b(ψ,c) blows up slightly, say up to 2δ c , for some δ > 1, then the calculation above will
not give us the desired refutation of SETH. Thus, the challenging part of the reduction described in
Lemma 3.1 is making it work under these strict restrictions on the relevant parameters.
As stated in Lemma 3.1, in our reduction, we need to obtain a constraint matrix with small
path-width. An important first step towards this is understanding what a matrix of small path-width
looks like. We first give an intuitive description of the structure of such matrices. Let A be a m × n
matrix of small path-width and let M (A) be the column matroid of A. For any i ∈ {1, . . . , n − 1},
5
1 1
1 1
1 1
..
.
1 1
B1
B2
..
.
Bm−1
Bm
(a) A matrix B for which path-width of its column
matroid is 1
(b) A pictorial representation of the matrix A(ψ,c) .
Figure 2: Comparison of A(ψ,c) with a low path-width matrix.
let A|{1, . . . i} denote the set of columns (or vectors) in A whose index is at most i (that is, the first
i columns) and let A|{i + 1, . . . n} denote the set of columns with index strictly greater than i. The
path-width of M (A) is at most
max dimhspan(A|{1, . . . , i}) ∩ span(A|{i + 1, . . . , n})i + 1.
i
Hence, in order to obtain a bound on the pathwidth, it is sufficient to bound dimhspan(A|{1, . . . , i})∩
span(A|{i + 1, . . . , n})i for every i ∈ [n]. Consider for example, the matrix B given in Figure 2a.
The path-width of M (B) is clearly at most 1. In our reduced instance, the constructed constraint
matrix A(ψ,c) will be an appropriate extension of B. That is A(ψ,c) will have the “same form” as B
but with each 1 replaced by a submatrix of order O(c) × n0 for some n0 . See Fig. 2b for a pictorial
representation of A(ψ,c) .
The construction used in Lemma 3.1 takes as input an instance ψ of CNF-SAT with n
variables and a fixed integer c ≥ 2, and outputs an instance A(ψ,c) x = b(ψ,c) , x ≥ 0, of (IP), that
satisfies all four properties of the lemma. Let X denote the set of variables in the input CNFformula ψ = C1 ∧ C2 ∧ . . . ∧ Cm . For the purposes of the present discussion we assume that c
divides n. We partition the variable set X into c blocks X0 , . . . , Xc−1 , each of size nc . Let Xi ,
i ∈ {0, . . . , c − 1}, denote the set of assignments of variables corresponding to Xi . Set ` = nc and
n
L = 2` . Clearly, the size of Xi is upper bounded by 2 c = 2` = L. We denote the assignments in Xi
by φ0 (Xi ), φ1 (Xi ), . . . , φL−1 (Xi ). To construct the matrix A(ψ,c) , we view “each of these assignments
as a different assignment for each clause”. In other words we have separate sets of column vectors in
the constraint matrix A(ψ,c) corresponding to different pairs (Cr , Xi ), where Cr is a clause and Xi
is a block in the partition of X. All the values set in these columns are based on the assignments
of Xi and the clause Cr . That is, based on the clause Cr and assignments in Xi . In total we have
2L columns corresponding to (Cr , Xi ). The set of columns corresponding to Cr , that is, the set of
columns corresponding to (Cr , Xi ), for all i, together forms a bigger block of columns, denoted by
Cr
r
AC
(ψ,c) , in A(ψ,c) . The columns of A(ψ,c) appears consecutively in A(ψ,c) . In other words, the clauses
r
of ψ partition the set of columns of A(ψ,c) into AC
(ψ,c) , r ∈ {1, . . . , m}, where columns in each of
Cr
r
the parts (A(ψ,c)
) occur consecutively. Thus, we can identify each column in the matrix AC
(ψ,c)
with a pair (Cr , φj (Xi )), i ∈ {0, . . . , c − 1} and j ∈ {0, . . . , L − 1}. For a pair (Cr , φj (Xi )), we refer
r
to φj (Xi ) as the assignment part of the pair. The non-zero values in AC
(ψ,c) are covered by 4c + 1
specific consecutive rows. These 4c + 1 rows are divided into 3 parts according to their roles in the
6
reduction:
• the first 2c rows comprise the predecessor matching part,
• the middle row is called the evaluation part, and
• the 2c rows after the evaluation part comprise the successor matching part.
The entries in the row corresponding to the evaluation part get values 0 or 1 depending on whether
the assignment part of the pair (Cr , φj (Xi )) satisfies Cr or not.
The matrix A(ψ,c) and the target vector b(ψ,c) are constructed in such a way that all the feasible
0
solutions to A(ψ,c) x = b(ψ,c) are from the set {0, 1}n , where n0 is the set of columns in A(ψ,c) . Hence,
setting a coordinate of x to 1 corresponds to choosing a particular column from A(ψ,c) . In our
reduction we use a selector gadget to enforce that any feasible solution will choose exactly one column
from the set of columns corresponding to a pair (Cr , Xi ). That is, it corresponds to choosing a
column identified by (Cr , φj (Xi )). Thus it results in choosing an assignment φj (Xi ) to the variables
in the set Xi . Note that this implies that we will choose an assignment in Xi for each clause Cr .
That way we might choose m assignments from Xi corresponding to m different clauses. However,
for the backward direction of the proof, it is important that we choose the same assignment from Xi
for each clause. This will ensure that we have selected an assignment to the variables in Xi . Towards
this we assign values in each of the columns in a way that all the assignments chosen by a feasible
solution for a particular block across different clauses are the same. Then choosing two columns, one
from the set of columns corresponding to (Cr , Xi ) and the other from the columns of (Cr0 , Xi ) in a
feasible solution would imply that both of these columns correspond to one particular assignment of
Xi . In this case, we say that these two columns are consistent. We enforce these consistencies in a
sequential manner. That is, for any block Xi , we make sure that the two columns chosen among
the columns corresponding to (Cr , Xi ) and (Cr+1 , Xi ) are consistent for any r ∈ {1, . . . , m − 1},
as opposed to checking the consistency for every pair (Cr , Xi ) and (Cr0 , Xi ) for r 6= r0 . Thus in
some sense these consistencies propagate. Such a propagation of consistencies is realized through
rows corresponding to the predecessor matching part and the successor matching part. For that
r
the rows corresponding to predecessor matching part of AC
(ψ,c) will be the same as the successor
C
r−1
r
matching part of A(ψ,c)
and the rows corresponding to the successor matching part of AC
(ψ,c) will
C
r+1
be the same as the predecessor matching part of A(ψ,c)
. Both the predecessor matching part as
well as the successor matching part contain designated rows for each block Xi of variables to handle
consistencies between (Cr , Xi ) and (Cr+1 , Xi ). Recall that Xi denotes the set of assignments of Xi
and |Xi | = 2` = L. Furthermore, assignments in Xi are denoted by φ0 (Xi ), . . . , φL−1 (Xi ). Thus, we
can identify the assignment φj (Xi ) by a non-negative integer j ≤ L − 1. These values are assigned
in a co-ordinated manner at designated places in the predecessor matching part as well as in the
successor matching part, enabling us to argue consistency. The largest entry in b(ψ,c) is upper
bounded by L − 1. Furthermore, the idea of making consistency in a sequential manner also allows
us to bound the path-width of column matroid of A(ψ,c) by c + 4.
The proof technique for Theorem 1.5 is similar to that for Theorem 1.4. This is achieved by
modifying the matrix A(ψ,c) constructed in the reduction described for Lemma 3.1. The largest
n
entry in A(ψ,c) is 2 c − 1. So each of these values can be represented by a binary string of length at
most ` = nc . We remove each row, say row indexed by γ, with entries greater than 1 and replace
it with nc rows, γ1 , . . . , γ` . Where, for any j, if the value A(ψ,c) [γ, j] = W then A(ψ,c) [γk , j] = ηk ,
where ηk is the k th bit in the `-sized binary representation of W . This modification reduces the
largest entry in A(ψ,c) to 1 and increases the path-width from constant to approximately n. Finally,
we set all the entries in b(ψ,c) to be 1. This concludes the overview of our reductions and we now
proceed to a detailed exposition.
7
3.2
Detailed Proof of Theorem 1.4
Towards the proof of Theorem 1.4, we first present the proof of our main technical lemma (Lemma 3.1),
which we restate here for the sake of completeness.
Lemma 3.1. Let ψ be an instance of CNF-SAT with n variables and m clauses. Let c ≥ 2 be a
n
fixed integer. Then, in time O(m2 2 c ), we can construct an instance A(ψ,c) x = b(ψ,c) , x ≥ 0, of (IP)
with the following properties.
(a.) ψ is satisfiable if and only if A(ψ,c) x = b(ψ,c) , x ≥ 0 is feasible.
n
(b.) The matrix A(ψ,c) is non-negative and has dimension O(m) × O(m2 c ).
(c.) The path-width of the column matroid of A(ψ,c) is at most c + 4.
n
(d.) The largest entry in b(ψ,c) is at most 2d c e − 1.
Let ψ = C1 ∧ C2 ∧ . . . ∧ Cm be an instance of CNF-SAT with variable set X = {x1 , x2 , . . . , xn }
and let c ≥ 2 be a fixed constant given in the statement of Lemma 3.1. We construct the instance
A(ψ,c) x = b(ψ,c) , x ≥ 0 of (IP) as follows.
Construction. Let C = {C1 , . . . , Cm }. Without loss of generality, we assume that n is divisible
by c, otherwise we add at most c dummy variables to X such that |X| is divisible by c. We divide
X into c blocks X0 , X1 , . . . , Xc−1 . That is Xi = {x i·n +1 , x i·n +2 , . . . , x (i+1)·n } for each i ∈ Zc . Let
c
c
c
` = nc and L = 2` . For each block Xi , there are exactly 2` assignments. We denote these assignments
by φ0 (Xi ), φ1 (Xi ), . . . , φL−1 (Xi ).
Now we create m matrices, one for each clause C ∈ C. These matrices will be submatrices of
the constraint matrix A(ψ,c) . For each clause Cr ∈ C, we create a (4c + 1) × c · 2`+1 matrix Br . For
each block Xi and all possible assignments to the variables of Xi , we allocate 2`+1 columns in Br .
For each assignment φj (Xi ) there are two columns in Br corresponding to it. Then the first 2`+1
columns of Br correspond to assignments of X0 , the second 2`+1 columns correspond to assignments
of X1 , etc.
Matrices Br for 1 < r < m. We first define Br for indices 1 < r < m. Matrices B1 and Bm have a
slightly different structure compared to the other matrices and so we define them separately. The
non-zero values of Br are defined as follows. Each assignment φj (Xi ) is identified by the number j.
Each φj (Xi ) defines 8 entries in Br : four in the column numbered 2`+1 i + 2j + 1 and four in the
column numbered 2`+1 i + 2j + 2. The rows of Br are partitioned into 3 parts. The part composed
of the first 2c rows is called the predecessor matching part, the part composed of the row indexed by
2c + 1 is called the evaluation part, and the part composed of the last 2c rows is called the successor
matching part, see Fig. 3a.
The predecessor matching part is defined by
Br [2i + 1, i · 2`+1 + 2j + 1] = Br [2i + 1, i · 2`+1 + 2j + 2] = j, i ∈ Zc .
(1)
For i ∈ Zc , the evaluation part is defined by
Br [2c + 1, i · 2`+1 + 2j + 1] = 0,
and
(
Br [2c + 1, i · 2
`+1
+ 2j + 2] =
8
1, if φj (Xi ) satisfies Cr ,
0, otherwise.
(2)
(3)
predecessor matching part
evaluation part
successor matching part
evaluation part
successor matching part
(a) Parts of Br for 1 < r ≤ m.
(b) Parts of B1 .
Figure 3: Parts of Bm .
The successor matching part for Br is defined for i ∈ Zc as
Br [2c + 2i + 2, i · 2`+1 + 2j + 1] = Br [2c + 2i + 2, i · 2`+1 + 2j + 2] = L − 1 − j,
(4)
Br [2c + 2i + 3, i · 2
(5)
`+1
+ 2j + 1] = Br [2c + 2i + 3, i · 2
`+1
+ 2j + 2] = 1.
All other entries in Br , which are not defined above, are set to zero. That is, for all i, i0 ∈ Zc
and a ∈ [2`+1 ] such that i 6= i0 ,
Br [2i + 1, i0 · 2`+1 + a] = Br [2i + 2, i0 · 2`+1 + a] = 0,
(6)
Br [2i + 2, i · 2
(7)
`+1
0
+ a] = 0, and
Br [2c + 2i + 2, i · 2
`+1
0
+ a] = Br [2c + 2i + 3, i · 2
`+1
+ a] = 0.
(8)
Before describing the construction of B1 and Bm , we provide a brief description of certain
desirable properties possessed by Br . We have designated set of columns per pair (Cr , Xi ), which
are indexed by [(i + 1)2`+1 ] \ [i · 2`+1 ] and (5) ensures that at most one of the columns from this set
is chosen by a feasible solution. This will be forced by putting 1 in the corresponding coordinate
of vector b(ψ,c) . In the construction of A(ψ,c) , we will only add zeros to the entries in the row
of A(ψ,c) corresponding to the (2c + 2i + 3)th row of Br , but outside the submatrix Br of A(ψ,c) .
This guarantees that exactly one of them is chosen by a feasible solution. The purpose of (1) is
to ensure consistency with the column selected from (Cr−1 , Xi ), and purpose of (4) is to ensures
consistency with the column selected from (Cr+1 , Xi ). We construct the matrix A(ψ,c) in such a way
that the row of Br indexed by 2i + 1 and the row of Br−1 indexed by 2c + 2i + 2 are equal in A(ψ,c) .
Suppose that this row is indexed by h in A(ψ,c) . Then (1) and (4) ensure that if we choose consistent
columns from the columns of (Cr−1 , Xi ) and (Cr , Xi ), then the sum of the values in coordinate h of
the selected columns will be equal to L − 1. So we will set b(ψ,c) [h] = L − 1 in the target vector
b(ψ,c) . For each assignment φj (Xi ), we have two designated columns in Br , they are indexed by
i · 2`+1 + 2j + 1 and i · 2`+1 + 2j + 2. The reason for creating two columns instead of just one per
φj (Xi ) is the following. The coordinate j 0 of the target vector b(ψ,c) corresponding to the row which
contains the row of Br indexed by 2c + 1 will be set to 1. For any satisfying assignment of φ of
ψ, more than one partial assignments of φ (i.e, assignments of φ restricted to different blocks of
X) may satisfy the clause Cr . So among the pairs of columns corresponding to these satisfying
partial assignments a feasible solution will choose the first column from the pair for all but one.
For a partial assignment (assignment of a block of X) which satisfies Cr , the feasible solution will
choose the second column corresponding to it. Equations (2) and (3) make sure that the entries
corresponding to the coordinate j 0 from the set of chosen columns by a feasible solution will add
up to 1; hence at least one selected column would correspond to an assignment (of a block of X)
satisfying clause Cr .
9
0
0
0
0
0
3
1
0
0
0
0
0
0
1
3
1
0
0
1
0
0
0
0
2
1
0
0
1
0
0
0
0
2
1
0
0
2
0
0
0
0
1
1
0
0
2
0
0
0
1
1
1
0
0
3
0
0
0
0
0
1
0
0
3
0
0
0
1
0
1
0
0
?
?
?
?
?
?
0
0
0
0
0
0
0
3
1
0
0
0
0
0
0
0
3
1
0
0
1
0
0
0
0
2
1
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
2
0
0
0
0
1
1
0
0
2
0
0
0
0
1
1
0
0
3
0
0
0
0
0
1
0
0
3
0
1
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
1
1
0
1
0
0
0
0
1
0
1
0
0
0
0
1
0
2
0
0
0
0
1
0
2
0
0
0
1
1
0
3
0
0
0
0
1
0
3
0
0
0
1
1
0
?
?
?
?
?
?
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
1
0
0
0
1
0
0
1
0
1
0
1
0
0
2
0
0
0
1
0
0
2
0
0
0
1
0
0
3
0
0
0
1
0
0
3
0
1
0
1
?
?
?
?
0
0
1
0
1
0
0
2
1
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
Figure 4: Let n = 4, c = 2, ` = 2 and Cr = x1 ∨ x2 ∨ x4 . The assignments are φ0 (X0 ) = {x1 =
x2 = 0}, φ1 (X0 ) = {x1 = 0, x2 = 1}, φ2 (X0 ) = {x1 = 1, x2 = 0}, φ3 (X0 ) = {x1 = x2 = 1}, φ0 (X1 ) =
{x3 = x4 = 0}, φ1 (X1 ) = {x3 = 0, x4 = 1}, φ2 (X1 ) = {x3 = 1, x4 = 0}, φ3 (X1 ) = {x3 = x4 = 1}.
The entries defined according to φ1 (X0 ) and φ3 (X1 ) are colored red and blue respectively. If
1 < r < m, then the matrix on the left represents Br and if r = 1, then Br can be obtained by
deleting the yellow colored portion from the left matrix. The matrix on the right represents Bm .
Sometimes, it is helpful to focus on the positions containing non-zero elements. This can be found
in the two matrices at the bottom of the figure.
Matrices B1 and Bm . The matrix B1 is created as above but with the exception that we remove
the predecessor matching part (see Fig. 3b). The matrix Bm is created as above with the exception
that we remove the rows numbered 2c + 2, 2c + 4, . . . , 4c. An illustration of Bm is given in Fig. 4.
Formally, the entries of B1 and Bm , defined by φj (Xi ) are given below.
For B1 we define its entries as
B1 [2i + 2, i · 2`+1 + 2j + 1] = B1 [2i + 2, i · 2`+1 + 2j + 2] = L − j − 1,
B1 [2i + 3, i · 2
B1 [1, i · 2
`+1
`+1
+ 2j + 1] = B1 [2i + 3, i · 2
`+1
+ 2j + 2] = 1,
+ 2j + 1] = 0, and
(
B1 [1, i · 2`+1 + 2j + 2] =
(9)
(10)
(11)
1 if φj (Xi ) satisfies C1 ,
0 otherwise.
(12)
For Bm ,
Bm [2i + 1, i · 2`+1 + 2j + 1] = Bm [2i + 1, i · 2`+1 + 2j + 2] = j,
Bm [2c + i + 2, i · 2`+1 + 2j + 1] = Bm [2c + i + 2, i · 2`+1 + 2j + 2] = 1,
Bm [2c + 1, i · 2
`+1
Bm [2c + 1, i · 2
`+1
(13)
+ 2j + 1] = 0, and
(
+ 2j + 2] =
1, if φj (Xi ) satisfies Cm ,
0, otherwise.
All other entries in B1 and Bm , which are not defined above, are set to zero. That is, for all
10
i, i0 ∈ Zc and a ∈ [2`+1 ] such that i 6= i0 ,
B1 [2i + 2, i0 · 2`+1 + a] = B1 [2i + 3, i0 · 2`+1 + a] = 0,
0
0
Bm [2i + 1, i · 2
+ a] = Bm [2i + 2, i · 2
`+1
Bm [2i + 2, i · 2
`+1
`+1
+ a] = 0,
+ a] = 0,
0
Bm [2c + i + 2, i · 2
`+1
(14)
(15)
(16)
+ a] = 0.
(17)
Matrix A(ψ,c) and vector b(ψ,c) . Now we explain how to construct the constraint matrix A(ψ,c) and
vector b(ψ,c) , which would serve as instance of (IP). In what follows,
we simplify the notation by using A instead of A(ψ,c) and b instead of b(ψ,c) .
The matrices B1 , . . . , Bm are disjoint submatrices of A and they cover all non zero entries of A.
Informally, the submatrices B1 , . . . , Bm form a chain such that the rows corresponding to the successor
matching part of Br will be the same as the rows in the predecessor matching part of Br+1 . A pictorial
representation of A can be found in Fig. 2b. Formally, A is a ((m − 1)(2c + 1) + (c + 1)) × (m · c · 2`+1 )
matrix. Let I1 = [2c + 1] and Im = [(m − 1)(2c + 1) + (c + 1)] \ [(m − 1)(2c + 1) − 2c]. For every
1 < r < m, let Ir = [r(2c+1)]\[(r−1)(2c+1)−2c], and for r ∈ [m], let Jr = [r·c·2`+1 ]\[(r−1)·c·2`+1 ].
Now for each r ∈ [m],we put matrix A[Ir , Jr ] := Br . All other entries of A not belonging to any of
the submatrices A[Ir , Jr ] are set to zero. This completes the construction of A.
Now we define the ((m − 1)(2c + 1) + (c + 1))-dimensional vector b. Let
P = {(r − 1)(2c + 1) + 2j + 2 | r ∈ [m − 1], j = Zc }.
In other words, P contains the indices of some rows: for each r ∈ [m − 1], alternating rows in
the successor matching part (and thus the alternating rows in the predecessor matching part) of
A[Ir , Jr ] belong to P (refer to Fig. 2b again). Then the entries of b are defined as
(
b[q] =
L − 1, if q ∈ P,
1,
otherwise.
This completes the construction of the matrix A and vector b which together make up the required
instance of (IP).
Correctness. Now we prove that ψ is satisfiable if and only if there is a non-negative integer vector
x such that Ax = b. We start with some notations. We partition the set of columns of A into m
parts J1 , . . . , Jm (we have already defined these sets) with one part per clause. For each r ∈ [m], Jr
is the set of columns associated with Cr . We further divide Jr into c equal parts, one per variable
set Xi . These parts are
Pr,i = {(r − 1)c · 2`+1 + i · 2`+1 + 1, . . . , (r − 1)c · 2`+1 + (i + 1) · 2`+1 }, i ∈ Zc .
In other words, Pr,i is the set of columns associated with the tuple (Cr , Xi ) and |Pr,i | = 2`+1 . The
set Pr,i is divided into 2` parts of size two each, one per tuple (Cr , φj (Xi )), where Cr ∈ C, j ∈ ZL and
i ∈ Zc . The two columns associated with tuple (Cr , φj (Xi )) are indexed by (r−1)2`+1 +i·2`+1 +2j +1
and (r − 1)2`+1 + i · 2`+1 + 2j + 2 in A. We also put n0 = m · c · 2`+1 to be the number of columns
in A.
0
Lemma 3.1. Formula ψ is satisfiable if and only if there exists x∗ ∈ Zn≥0 such that Ax∗ = b.
11
Proof. Suppose ψ is satisfiable and let φ be its satisfying assignment. There exists j0 , j1 , . . . , jc−1 ∈
ZL such that φ is the union of φj0 (X0 ), φj1 (X1 ), . . . , φjc−1 (Xc−1 ). Each clause C ∈ C, C is satisfied
by at least one of the assignments φj0 (X0 ), φj1 (X1 ), . . . , φjc−1 (Xc−1 ). For each C, we fix an arbitrary
i ∈ Zc such that the assignment φji (Xi ) satisfies clause C. Let α be a function which fixes these
assignments for each clause. That is, α : C → Zc such that the assignment φjα(C) (Xα(C) ) satisfies
0
the clause C for every C ∈ C. Now we define x∗ ∈ Zn≥0 and prove that Ax∗ = b. Let
Q1 = {(r − 1)2`+1 + i · 2`+1 + 2ji + 1 | r ∈ [m], i ∈ Zc , α(Cr ) 6= i},
Q2 = {(r − 1)2`+1 + i · 2`+1 + 2ji + 2 | r ∈ [m], i ∈ Zc , α(Cr ) = i}, and
Q = Q1 ∪ Q2 .
Then the vector x∗ is defined by setting
(
1, if q ∈ Q,
0, otherwise.
∗
x [q] =
The q-th entry in x∗ is the multiplier of column q and so we say that entry x∗ [q] corresponds to
column q. For each tuple (C, φji (Xi )), one entry of x∗ among the two entries corresponding to the
columns associated with (C, φji (Xi )) is set to 1. If α(C) = i, then the second column corresponding
to (C, φji (Xi )) is set to 1, otherwise the first column corresponding to (C, φji (Xi )) is set to 1. All
other entries are set to zero. Also note that for every r ∈ [m] and i ∈ Zc , we have that |Pr,i ∩ Q| = 1
and let {qr,i } = Pr,i ∩ Q. Here notice that among the 2`+1 columns of Pr,i , exactly one column,
which is indexed by qr,i , belongs to Q. The column qr,i corresponds to one of the two columns
corresponding to (Cr , φji (Xi )).
We need the following auxiliary claims.
Claim 3.2. For every r ∈ [m − 1] and i, i0 ∈ Zc such that i 6= i0 , we have
(a)
P
A[(r − 1)(2c + 1) + 2i + 2, z] · x[z] = L − 1 − ji ,
(b)
P
A[(r − 1)(2c + 1) + 2i + 3, z] · x[z] = 1,
(c)
P
A[(r − 1)(2c + 1) + 2i0 + h + 1, z] · x[z] = 0, for any h ∈ {1, 2} .
z∈Pr,i
z∈Pr,i
z∈Pr,i
Proof. First consider the case when r = 1. Let Pr,i ∩ Q = {i · 2`+1 + 2ji + g}, where g ∈ {1, 2}. Then
X
A[2i + 2, z] · x[z]
=
B1 [2i + 2, z]
X
z∈P1,i ∩Q
z∈P1,i
= B1 [2i + 2, i · 2`+1 + 2ji + g]
= L − ji − 1
(by (9))
and (a) follows.
To prove (b), we have
X
z∈P1,i
A[2i + 3, z] · x[z] =
X
B1 [2i + 3, z]
z∈P1,i ∩Q
= B1 [2i + 3, i · 2`+1 + 2ji + g]
= 1.
(By (10))
12
To show (c), observe that for h ∈ {1, 2},
X
A[2i0 + h + 1, z] · x[z] =
B1 [2i0 + h + 1, z]
X
z∈Pr,i ∩Q
z∈Pr,i
= B1 [2i0 + h + 1, i · 2`+1 + 2ji + g]
= 0.
(By (14))
Now consider the case when r > 1. Let Pr,i ∩ Q = {(r − 1)c · 2`+1 + i · 2`+1 + 2ji + g}, where
g ∈ {1, 2}. For this case we have
A[(r − 1)(2c + 1) + 2i + 2, z] · x[z] =
X
Br [2c + 2i + 2, z − ((r − 1)c · 2`+1 )]
X
z∈Pr,i ∩Q
z∈Pr,i
= Br [2c + 2i + 2, i · 2`+1 + 2ji + g]
= L − ji − 1.
(By (4))
A[(r − 1)(2c + 1) + 2i + 3, z] · x[z] = Br [2c + 2i + 3, i · 2`+1 + 2ji + g]
X
z∈Pr,i
= 1.
(By (5))
Finally, for h ∈ {1, 2},
X
A[(r − 1)(2c + 1) + 2i0 + h + 1, z] · x[z] =
Br [2c + 2i0 + h + 1, z − ((r − 1)c · 2`+1 )]
X
z∈Pr,i ∩Q
z∈Pr,i
= Br [2c + 2i0 + h + 1, i · 2`+1 + 2ji + g]
= 0.
(By (8))
Claim 3.3. For every r ∈ [m − 1] and i, i0 ∈ Zc such that i 6= i0 , we have
(a)
P
A[(r − 1)(2c + 1) + 2i + 2, z] · x[z] = ji ,
(b)
P
A[(r − 1)(2c + 1) + 2i + 3, z] · x[z] = 0,
(c)
P
A[(r − 1)(2c + 1) + 2i0 + h + 1, z] · x[z] = 0, where h ∈ {1, 2}.
z∈Pr+1,i
z∈Pr+1,i
z∈Pr+1,i
Proof. The proof of the claim is similar to the proof of Claim 3.2. Let Pr+1,i ∩ Q = {rc · 2`+1 + i ·
2`+1 + 2ji + g} where g ∈ {1, 2}. Then
A[(r − 1)(2c + 1) + 2i + 2, z] · x[z] = Br+1 [2i + 1, i · 2`+1 + 2ji + g]
X
z∈Pr+1,i
= ji
X
A[(r − 1)(2c + 1) + 2i + 3, z] · x[z] =
(By (1))
X
Br+1 [2i + 2, z − (rc · 2`+1 )]
z∈Pr+1,i ∩Q
z∈Pr+1,i
= Br+1 [2i + 2, i · 2`+1 + 2ji + g]
= 0
13
(By (7) or (16))
For any h ∈ {1, 2},
X
A[(r − 1)(2c + 1) + 2i0 + h + 1, z] · x[z] =
Br+1 [2i0 + h, z − (rc · 2`+1 )]
X
z∈Pr+1,i ∩Q
z∈Pr+1,i
= Br+1 [2i0 + h, i · 2`+1 + 2ji + g]
= 0
(By (6) or (15))
Now we show that Ax∗ = b. Recall that P = {(r − 1)(2c + 1) + 2j 0 + 2 | r ∈ [m − 1], j 0 ∈ Zc } .
Let m0 = (m − 1)(2c + 1) + c + 1, be the number of rows in A. To prove Ax∗ = b, we need to show
that,
(
n0
X
L − 1, if q ∈, P
A[q, j] · x[j] =
1,
otherwise.
j=1
We consider the following exhaustive cases.
Case 1: q ∈ P . Let q = (r − 1)(2c + 1) + 2i + 2 for some r ∈ [m − 1] and i ∈ Zc . Notice that
q ∈ Ir , q ∈ Ir+1 and q ∈
/ Ir0 for every r0 ∈ [m] \ {r, r + 1}. This implies that
for every j ∈
/ Jr ∪ Jr+1 , A[q, j] = 0.
(18)
Then
0
n
X
j=1
A[q, j] · x[j] =
X X
A[q, j] · x[j]
s∈[m] j∈Js
=
X
A[q, j] · x[j] +
j∈Jr
X
i0 ∈Zc
X
(By (18))
A[q, j] · x[j]
A[q, j] · x[j] +
j∈Pr,i0
=
X
j∈Jr+1
=
X
X
i0 ∈Z
j∈Pr+1,i0
c
A[q, j] · x[j] +
j∈Pr,i
X
A[q, j] · x[j]
X
A[q, j] · x[j]
(By Claims 3.2(c) and 3.3(c))
j∈Pr+1,i
= L − 1 − ji + ji
(By Claims 3.2(a) and 3.3(a))
= L − 1.
Case 2: q ∈ [m0 ] \ P . We partition [m0 ] \ P into R1 ] R2 ] R3 , and consider sub-cases based on
these parts. Let
R1 = (r − 1)(2c + 1) + 2j 0 + 3 | r ∈ [m − 1], j 0 ∈ Zc ,
R2 = {(r − 1)(2c + 1) + 1 | r ∈ [m]} ,
R3 = [(m − 1)(2c + 1) + 1 + c] \ [(m − 1)(2c + 1) + 1].
14
Case 2(a): q ∈ R1 . Let q = (r − 1)(2c + 1) + 2i + 3 for some r ∈ [m − 1] and i ∈ Zc . Notice
that q ∈ Ir , q ∈ Ir+1 and q ∈
/ Ir0 for any r0 ∈ [m] \ {r, r + 1}. This implies that,
for any j ∈
/ Jr ∪ Jr+1 , A[q, j] = 0.
(19)
Hence
0
n
X
A[q, j] · x[j] =
j=1
X X
A[q, j] · x[j]
s∈[m] j∈Js
=
A[q, j] · x[j] +
X
j∈Jr
X
j∈Jr+1
=
X
A[q, j] · x[j] +
X
i0 ∈Zc
j∈Pr,i0
=
(By (19))
A[q, j] · x[j]
X
i0 ∈Z
j∈Pr+1,i0
c
A[q, j] · x[j] +
X
X
j∈Pr,i
A[q, j] · x[j]
X
A[q, j] · x[j]
(By Claims 3.2(c) and 3.3(c))
j∈Pr+1,i
= 1+0
(By Claims 3.2(b) and 3.3(b))
= 1
Case 2(b): q ∈ R2 . Let q = (r − 1)(2c + 1) + 1 for some r ∈ [m]. By construction of A, we
have that for all j ∈
/ Jr , A[q, j] = 0. This implies that
0
n
X
A[q, j] · x[j] =
j=1
X
(20)
A[q, j] · x[j].
j∈Jr
We consider two cases based on r = 1 or r > 1. When r > 1,
A[{(r − 1)(2c + 1) + 1}, Jr ] = Br [{2c + 1}, Jr ].
Recall the function α. That is, if α(Cr ) = g, then φjg (Xg ) satisfies Cr . By Equation (20),
0
n
X
A[q, j] · x[j] =
j=1
`+1
c·2
X
Br [2c + 1, j] · x[j]
j=1
=
X
X
Br [2c + 1, i0 · 2`+1 + j] · x[i0 · 2`+1 + j]
i0 ∈Zc j∈[2`+1 ]
=
X
Br [2c + 1, α(Cr ) · 2`+1 + j] · x[α(Cr ) · 2`+1 + j]
j∈[2`+1 ]
+
X
X
Br [2c + 1, i0 · 2`+1 + j] · x[i0 · 2`+1 + j]
i0 ∈Zc \{α(Cr )} j∈2`+1
=
X
Br [2c + 1, α(Cr ) · 2`+1 + j] · x[α(Cr ) · 2`+1 + j] + 0
j∈[2`+1 ]
(By (2) and definition of Q)
= Br [2c + 1, α(Cr ) · 2
`+1
+ 2α(Cr ) + 2]
= 1.
(By (3) using the fact that φjα(Cr ) satisfies Cr )
15
When r = 1 we have that q = 1 and A[{1}, J1 ] = B1 [{1}, J1 ]. Hence, by Equation (20),
0
n
X
A[q, j] · x[j] =
j=1
`+1
c·2
X
B1 [1, j] · x[j]
j∈1
=
X
B1 [1, i0 · 2`+1 + j] · x[i0 · 2`+1 + j]
X
i0 ∈Zc j∈[2`+1 ]
=
X
B1 [1, α(C1 ) · 2`+1 + j] · x[α(C1 ) · 2`+1 + j]
j∈[2`+1 ]
+
X
X
B1 [1, i0 · 2`+1 + j] · x[i0 · 2`+1 + j]
i0 ∈Zc \{α(C1 )} j∈[2`+1 ]
=
B1 [1, α(C1 ) · 2`+1 + j] · x[α(C1 ) · 2`+1 + j] + 0
X
j∈[2`+1 ]
(By (11) and definition of Q)
= B1 [1, α(C1 ) · 2
`+1
+ 2α(C1 ) + 2]
= 1
(By (11) and definition of Q)
(By (12) using the fact that φjα(C1 ) satisfies C1 )
Case 2(c): q ∈ R3 . Let q = (m − 1)(2c + 1) + 1 + i where i ∈ [c]. By the definition of A. we
have that for every j ∈
/ {(m − 1) · c · 2`+1 + (i − 1)2`+1 + 1, . . . , (m − 1) · c · 2`+1 + i · 2`+1 }, A[q, j] = 0.
That is, for j ∈
/ Pm,i−1 , A[q, j] = 0. Let Pm,i−1 ∩ Q = {(m − 1)c · 2`+1 + (i − 1)2`+1 + 2ji−1 + g},
where g ∈ {1, 2}. Hence
0
n
X
A[q, j] · x[j] =
j=1
X
A[q, j] · x[j]
j∈Pm,i−1
=
X
Bm [2c + 1 + i, j − (m − 1)c2`+1 ]
j∈Pm,i−1 ∩Q
= Bm [2c + 1 + i, (i − 1)2`+1 + 2ji−1 + g]
= 1
(By (13))
Lemma 3.4. The path-width of the column matroid of A is at most c + 4
Proof. Recall that n0 = m · c · 2`+1 , be the number of columns in A and m0 be the number of rows in
A. To prove that the path-width of A is at most c + 4, it is sufficient to show that for all j ∈ [n0 − 1],
dimhspan(A|{1, . . . , j}) ∩ span(A|{j + 1, . . . , n0 })i ≤ c + 3.
(21)
The idea for proving Equation (21) is based on the following observation. For V 0 = A|{1, . . . , j}
and V 00 = A|{j + 1, . . . , n0 }, let
I = {q ∈ [m0 ] | there exists v 0 ∈ V 0 and v 00 ∈ V 00 such that v 0 [q] 6= v 00 [q] 6= 0}.
Then the dimension of span(V 0 ) ∩ span(V 00 ) is at most |I|. Thus to prove (21), for each j ∈ [n0 − 1],
we construct the corresponding set I and show that its cardinality is at most c + 3.
16
We proceed with the details. Let v1 , v2 , . . . , vn0 be the column vectors of A. Let j ∈ [n0 − 1]. Let
V1 = {v1 , . . . , vj } and V2 = {vj+1 , . . . , vn0 }. We need to show that dimhspan(V1 ) ∩ span(V2 )i ≤ c + 3.
Let
I 0 = {q ∈ [m0 ] | there exists v ∈ V1 and v 0 ∈ V2 such that v[q] 6= 0 6= v 0 [q]}.
We know that [n0 ] is partitioned into parts Pr0 ,i0 , r0 ∈ [m], i0 ∈ Zc .
Fix r ∈ [m] and i ∈ Zc such that j ∈ Pr,i .
Let j = (r − 1)c · 2`+1 + i · 2`+1 + 2j 0 + g, where j 0 ∈ ZL and g ∈ {1, 2}. Let q1 = max{0, (r −
1)(2c + 1) − 2c}, q2 = r(2c + 1), j1 = (r − 1) · c · 2`+1 , and j2 = r · c · 2`+1 Then [q2 ] \ [q1 ] = Ir and
[j2 ] \ [j1 ] = Jr (recall the definition of sets Ir and Jr from the construction of matrix A).
The way we constructed matrix A, for every q > q2 and for every vector v ∈ V1 , we have v[q] = 0.
Also, for every q ≤ q1 and for any v ∈ V2 , we have that v[q] = 0. This implies that I 0 ⊆ [q2 ]\[q1 ] = Ir .
Now we partition Ir into 5 parts: R1 , R10 , R, R2 , and R20 . These parts are defined as follows.
(
R1 =
(
R10
=
∅,
if r = 1,
{(r − 2)(2c + 1) + 2i0 + 2 | i0 ∈ Zc }, otherwise,
∅,
if r = 1,
{(r − 2)(2c + 1) + 2i0 + 3 | i0 ∈ Zc }, otherwise,
R = {(r − 1)(2c + 1) + 1},
(
∅,
if r = m,
{(r − 1)(2c + 1) + 2i0 + 2 | i0 ∈ Zc }, otherwise,
(
{(r − 1)(2c + 1) + i0 + 1 | i0 ∈ [c]}, if r = m,
{(r − 1)(2c + 1) + 2i0 + 3 | i0 ∈ Zc }, otherwise.
R2 =
(22)
and
R20
=
Claim 3.5. For each r ∈ [m], q ∈
/ Ir and j 00 ∈ Jr , vj 00 [q] = 0.
Proof. The non-zero entries in A are covered by the disjoint sub-matrices A[Ir , Jr ] = Br , r ∈ [m].
Hence the claim follows.
Claim 3.6. |I 0 ∩ R1 | ≤ c − (i − 1).
Proof. When r = 0, R1 = ∅ and the claim trivially follows. Let r > 1, and let q ∈ R1 be such that
q < (r−2)(2c+1)+2i+2. Then q = (r−2)(2c+1)+2i0 +2 for some i0 < i. Notice that q ∈
/ Ir0 for every
S
S
r0 > r. By Claim 3.5, for every v ∈ r0 >r Jr0 , v[q] = 0. Now consider the vector vj 00 ∈ V2 \ ( r0 >r Jr0 ).
Notice that j 00 > j and j 00 ∈ Jr . Let j 00 = j + a = (r − 1)c · 2`+1 + i · 2`+1 + 2j 0 + g + a for some
a ∈ [rc2`+1 − j]. From the construction of A, vj 00 [q] = Br [2i0 + 1, i · 2`+1 + 2j 0 + g + a] = 0, by (6).
Thus for every q ∈ R, q < (r − 2)(2c + 1) + 2i + 2 and v ∈ V2 , v[q] = 0. This implies that
|I 0 ∩ R1 | ≤ |{q ≥ (r − 2)(2c + 1) + 2i + 2} ∩ R1 | ≤ c − (i − 1).
Claim 3.7. |I 0 ∩ R10 | = 0.
17
Proof. When r = 1, R10 = ∅ and the claim holds. So, now assume that r > 1. Consider any q ∈ R10 .
Let i0 ∈ Zc be such that q = (r − 2)(2c + 1) + 2i0 + 3. Notice that q ∈
/ Ir0 for any r0 > r, and hence,
S
00
by Claim 3.5, for any v ∈ r0 >r Jr0 , v[q] = 0. Now consider any j ∈ Jr . Let j 00 = (r − 1)c · 2`+1 + a,
for some a ∈ [c · 2`+1 ]. From the construction of A, vj 00 [q] = Br [2i0 + 2, a] = 0, by (6) or (7). This
completes the proof of the claim.
Claim 3.8. |I 0 ∩ R2 | ≤ i.
Proof. When r = m, R2 = ∅ and the claim trivially holds. So, now let r < m and consider any
q ∈ R1 ∩ {q > (r − 1)(2c + 1) + 2i + 2}. Let i0 > i such that q = (r − 1)(2c + 1) + 2i0 + 2. Notice that
S
q∈
/ Ir0 for any r0 < r. Hence, by Claim 3.5, for any v ∈ r0 <r Jr0 , v[q] = 0. Now consider any vector
S
vj 00 ∈ V1 \ ( r0 <r Jr0 ). Notice that j 00 ≤ j and j 00 ∈ Jr . Let j 00 = (r − 1)c · 2`+1 + i00 · 2`+1 + a for some
a ∈ [2`+1 ] and i00 ≤ i < i0 . From the construction of A, vj 00 [q] = Br [2c + 2i0 + 2, i00 · 2`+1 + a] = 0, by
(8). Hence we have shown that for any q ∈ R, q > (r − 2)(2c + 1) + 2i + 2 and v ∈ V1 , v[q] = 0.
This implies that
|I 0 ∩ R2 | ≤ |{q ≤ (r − 1)(2c + 1) + 2i + 2} ∩ R1 | ≤ i
Claim 3.9. |I 0 ∩ R20 | ≤ 1.
Proof. Consider the case when r = m. Consider q ∈ R20 . We claim that if q ∈ I 0 ∩ R20 , then
q = (m − 1)(2c + 1) + i + 2. Suppose q ∈ I 0 ∩ R20 and q < (m − 1)(2c + 1) + i + 2. Let
q = (m − 1)(2c + 1) + i0 + 2, where 0 ≤ i0 < i. Then by the construction of A, for any j 00 > j,
vj 00 [q] = Bm [2c + i0 + 2, j 00 − (m − 1)c2`+1 ] = Bm [2c + i0 + 2, i1 2`+1 + a], where c − 1 ≥ i1 ≥ i and
a ∈ [2`+1 ]. Thus by (17), Vj 00 [q] = Bm [2c + i0 + 2, i1 2`+1 + a] = 0. This contradicts the assumption
that q ∈ I 0 ∩ R20 .
Suppose that q ∈ I 0 ∩ R20 and q > (m − 1)(2c + 1) + i + 2. Let q = (m − 1)(2c + 1) + i0 + 2,
where i < i0 ≤ c − 1. Then by the construction of A, for any j 00 ≤ j, vj 00 [q] = Bm [2c + i0 +
2, j 00 − (m − 1)c2`+1 ] = Bm [2c + i0 + 2, i1 2`+1 + a], where 0 ≤ i1 ≤ i, a ∈ [2`+1 ]. Thus by (17),
vj 00 [q] = Bm [2c + i0 + 2, i1 2`+1 + a] = 0. This contradicts the assumption that i ∈ I 0 ∩ R20 . Hence, in
this case, we have proved that |I 0 ∩ R20 | ≤ 1.
So, now assume that r ∈ [m − 1]. Consider any q ∈ R20 . Let i0 ∈ Zc such that q = (r − 1)(2c +
S
1) + 2i0 + 3. Notice that q ∈
/ Ir0 for any r0 < r, and hence, by Claim 3.5, for any v ∈ r0 <r Jr0 ,
S
v[q] = 0. Also notice that q ∈
/ Ir0 for any r0 > r + 1, and hence, by Claim 3.5, for any v ∈ r0 >r+1 Jr0 ,
v[q] = 0. So the only potential j 00 for which vj 00 [q] 6= 0, are from Jr ∪ Jr+1 . Let j 00 ∈ Jr+1 . Then by
the definition of A, vj 00 [q] = Br+1 [2i0 + 2, j 00 − rc2` ] = 0, by (6) or (7) or (15) or (16). Hence, we
conclude that the only possible j 00 for which vj 00 [q] 6= 0, are from Jr .
Now the proof is similar to case when r = m. We claim that if q ∈ I 0 ∩ R20 , then q =
(r − 1)(2c + 1) + 2i + 3. Suppose q ∈ I 0 ∩ R20 and q < (r − 1)(2c + 1) + 2i + 3. Let q =
(r − 1)(2c + 1) + 2i0 + 3, where 0 ≤ i0 < i. Then by the construction of A, for any j 00 > j,
vj 00 [q] = Br [2c + 2i0 + 3, j 00 − (r − 1)c2`+1 ] = Br [2c + 2i0 + 3, i1 2`+1 + a], where c − 1 ≥ i1 ≥ i and
a ∈ [2`+1 ]. Thus by (8), vj 00 [q] = Br [2c + 2i0 + 3, i1 2`+1 + a] = 0. This contradicts the assumption
that q ∈ I 0 ∩ R20 .
Suppose q ∈ I 0 ∩R20 and q > (r−1)(2c+1)+2i+3. Let q = (r−1)(2c+1)+2i0 +3, where i < i0 < c.
Then by the construction of A, for any j 00 ≤ j, vj 00 [q] = Br [2c + 2i0 + 3, j 00 − (r − 1)c2`+1 ] = Br [2c +
1 + i0 , i1 2`+1 + a], where 0 ≤ i1 ≤ i, a ∈ [2`+1 ]. Thus by (8), vj 00 [q] = Br [2c + 2i0 + 3, i1 2`+1 + a] = 0.
This contradicts the assumption that i ∈ I 0 ∩ R20 . Hence, in this case as well, |I 0 ∩ R20 | ≤ 1. This
completes the proof of the claim.
18
Therefore, we have
|I 0 | = |I 0 ∩ Ir |
(Because I 0 ⊆ Ir )
= |I 0 ∩ R1 | + |I 0 ∩ R10 | + |I 0 ∩ R| + |I 0 ∩ R2 | + |I 0 ∩ R20 |
(By (22) and Claims 3.6,3.7,3.8 and 3.9)
≤ c − (i − 1) + 0 + 1 + i + 1
= c+3
This completes the proof of the lemma.
Proof of Theorem 1.4. We prove the theorem by assuming a fast algorithm for (IP) and use it to give
a fast algorithm for CNF-SAT, refuting SETH. Let ψ be an instance of CNF-SAT with n1 variables
and m1 clauses. We choose a sufficiently large constant c such that (1 − ) + 4(1−)
+ ac < 1 holds.
c
We use the reduction mentioned in Lemma 3.1 and construct an instance A(ψ,c) x = b(ψ,c) , x ≥ 0, of
n1
(IP) which has a solution if and only if ψ is satisfiable. The reduction takes time O(m21 2 c ). Let
` = d nc1 e. The constraint matrix A(ψ,c) has dimension ((m1 − 1)(2c + 1) + 1 + c) × (m1 · c · 2`+1 ) and
the largest entry in vector b(ψ,c) does not exceed 2` − 1. The path-width of M (A(ψ,c) ) is at most
c + 4.
Assuming that any instance of (IP) with non-negative constraint matrix of path-width k is
solvable in time f (k)(d + 1)(1−)k (mn)a , where d is the maximum value in an entry of b and , a > 0
are constants, we have that A(ψ,c) x = b(ψ,c) , x ≥ 0, is solvable in time
O(1)
f (c + 4) · 2`·(1−)(c+4) · 2`·a · m1
=2
n1
(1−)(c+4)
c
·2
n1 ·a
c
O(1)
Here the constant f (c + 4) is subsumed by the term m1
whether ψ is satisfiable or not, is,
O(m21 2
n1
c
) + 2n1
where 0 = (1 − ) +
4
4(1−)
c
(1−)+
+
a
c
4(1−)
+ ac
c
O(1)
m1
= 2n1
O(1)
· m1
= 2n1
(1−)+
4(1−)
+ ac
c
O(1)
· m1
.
. Hence the total running time for testing
(1−)+
4(1−)
+ ac
c
O(1)
m1
0
O(1)
= 2 ·n1 m1
,
< 1. This completes the proof of Theorem 1.4.
Proof Sketch of Theorem 1.5
In this section we prove that (IP) with non-negative matrix A cannot be solved in time f (d)(d +
1)(1−)k (mn)O(1) for any function f and > 0, unless SETH fails, where d = max{b[1], . . . , b[m]}
and k is the path-width of the column matroid of A.
In Section 3, we gave a reduction from CNF-SAT to (IP). However in this reduction the values
n
in the constraint matrix A(ψ,c) and target vector b(ψ,c) can be as large as 2d c e − 1, where n is the
number of variables in the CNF-formula ψ and c is a constant. Let m be the number of clauses in ψ.
In this section we briefly explain how to get rid of these large values, at the cost of making large, but
still bounded path-width. From a CNF-formula ψ, we construct a matrix A = A(ψ,c) as described
in Section 3. The only rows in A which contain values strictly greater than 1 (values other than 0 or
1) are the rows indexed from the set P = {(r − 1)(2c + 1) + 1 + 2i + 1 | r ∈ [m − 2], i ∈ Zc }. That is
the values greater than 1 are in the alternate rows in yellow/green colored portion except the last c
rows in A in Figure 2b. Recall that ` = d nc e and the largest value in A is 2` − 1. Any number less
than or equal to 2` − 1 can be represented by a binary string of length ` = nc . Now we construct
a new matrix A0 from A by replacing each row of A whose index is in the set P with ` rows and
19
for any value A[i, j], i ∈ P we write its `-bit binary representation in the column corresponding
to j and the newly added ` rows of A0 . That is, for any γ ∈ P , we replace the row γ with ` rows,
γ1 , . . . , γ` . Where, for any j, if the value A[γ, j] = W then A0 [γk , j] = ηk , where ηk is the k th bit in
the `-sized binary representation of W .
Let m0 be the number of rows in A0 . Now the target vector b0 is defined as b0 [i] = 1 for all
i ∈ [m0 ]. This completes the construction of the reduced (IP) instance A0 x = b0 . The correctness
proof of this reduction is using arguments similar to those used for the correctness of Lemma 3.1.
Lemma 4.1. The path-width of the column matroid of A0 is at most (c + 1) nc + 3.
Proof. We sketch the proof, which is similar to the proof of Lemma 3.4. We define Ir0 and Jr0 for
any r ∈ [m] like Ir and Jr in Section 3. In fact, the rows in Ir0 are the rows obtained from Ir in the
process explained above to construct A0 from A. We need to show that dimhspan(A0 |{1, . . . , j}) ∩
span(A0 |{j + 1, . . . , n0 })i ≤ (c + 1) nc + 2 for all j ∈ [n0 − 1], where n0 is the number of columns in A0 .
The proof proceeds by bounding the number of indices I such that for any q ∈ I there exist vectors
v ∈ A0 |{1, . . . , j} and u ∈ A0 |{j + 1, . . . , n0 } with v[q] 6= 0 6= u[q]. By arguments similar to the ones
used in the proof of Lemma 3.4, we can show that for any j ∈ [n0 − 1], the corresponding set I 0
of indices is a subset of Ir0 for some r ∈ [m]. Recall the partition of Ir into R1 , R10 , R, R2 and R20
in Lemma 3.4. We partition Ir0 into parts S1 , S10 , S, S2 and S20 . Here S10 = R1 , S = R and S20 = R2 .
Notice that R1 , R2 ⊆ P , where P is the set of rows which covers all values strictly greater than 1.
The set S1 and S2 are obtained from R1 and R2 , respectively, by the process mentioned above to
construct A0 from A. That is, each row in Ri , i ∈ {1, 2} is replaced by ` rows in Si . This allows us
to bound the following terms for some i ∈ Zc :
|I 0 ∩ S1 | ≤ (c − (i − 1))` = (c − (i − 1))`,
|I 0 ∩ S10 | = 0,
|I 0 ∩ S2 | ≤ i · `,
|I 0 ∩ S20 | ≤ 1, and
|I 0 ∩ S| ≤ |S| = 1,
By using the fact that I 0 ⊆ Ir0 and the above system of inequalities, we can show that
n
dimhspan(A0 |{1, . . . , j}) ∩ span(A0 |{j + 1, . . . , n0 })i ≤ (c + 1)d e + 2.
c
This completes the proof of the lemma.
Now the proof of the theorem follows from Lemma 4.1 and the correctness of the reduction (it is
similar to the arguments in the proof of Theorem 1.4).
5
Proof of Theorem 1.3
In this section, we sketch how the proof of Cunningham and Geelen [8] of Theorem 1.2, can be
adapted to prove Theorem 1.3. Recall that a path decomposition of width k can be obtained in
f (k) · nO(1) time for some function f by making use of the algorithm by Jeong et al. [23]. However,
we do not know if such a path decomposition can be constructed in time O((d + 1)k+1 )nO(1) , so the
assumption that a path decomposition is given is essential.
Roughly speaking, the only difference in the proof is that when parameterized by the branchwidth, the most time-consuming operation is the “merge" operation, when we have to construct a
20
new set of partial solutions with at most (d + 1)k vectors from two already computed sets of sizes
(d + 1)k each. Thus to construct a new set of vectors, one has to go through all possible pairs of
vectors from both sets, which takes time roughly (d + 1)2k . For path-width parameterization, the
new partial solution set is constructed from two sets, but this time one set contains at most (d + 1)k
vectors while the second contains at most d + 1 vectors. This allows us to construct the new set in
time roughly (d + 1)k+1 .
Recall that for X ⊆ [n], we define S(A, X) = span(A|X) ∩ span(A|E \ X), where E = [n]. The
key lemma in the proof of Theorem 1.2 is the following.
Lemma 5.1 ([8]). Let A ∈ {0, 1, . . . , d}m×n and X ⊆ [n] such that λM (A) (X) = k. Then the
number of vectors in S(A, X) ∩ {0, . . . , d}m is at most (d + 1)k−1 .
To prove Theorem 1.3, without loss of generality, we assume that the columns of A are ordered
in such a way that for every j ∈ [n − 1],
dimhspan(A|{1, . . . , i}) ∩ span(A|{i + 1, . . . , n})i ≤ k − 1.
Let A0 = [A, b]. That is A0 is obtained by appending the column-vector b to the end of A. Then
for each i ∈ [n],
dimhspan(A0 |{1, . . . , i}) ∩ span(A0 |{i + 1, . . . , n + 1})i ≤ k.
(23)
Now we use dynamic programming to check whether the following conditions are satisfied. For
X ⊆ [n + 1], let B(X) be the set of all vectors b0 ∈ Zm
≥0 such that
(1) 0 ≤ b0 ≤ b,
|X|
(2) there exists z ∈ Z≥0 such that (A0 |X)z = b0 , and
(3) b0 ∈ S(A0 , X).
Then (IP) has a solution if and only if b ∈ B([n]). Initially the algorithm computes for all
i ∈ [n], B({i}) and by Lemma 5.1, we have that |B({i})| ≤ d + 1. In fact B({i}) ⊆ {a ·
v | v is the ith column vector of A0 and a ∈ [d + 1]}. Then for each j ∈ [2, . . . n] the algorithm
computes B([j]) in increasing order of j and outputs Yes if and only if b ∈ B([n]). That is, B([j]) is
computed from the already computed sets B([j − 1]) and B({j}). Notice that b0 ∈ B([j]) if and only
if
(a) there exist b1 ∈ B({1, . . . , j − 1}) and b2 ∈ B({j}) such that b0 = b1 + b2 ,
(b) b0 ≤ b and
(c) b0 ∈ S(A0 , [j]).
So the algorithm enumerates vectors b0 satisfying condition (a), and each such vector b0 is included in
B([j]), if b0 satisfy conditions (b) and (c). Since by (23) and Lemma 5.1, |B([j − 1])| ≤ (d + 1)k and
|B({j})| ≤ d + 1, the number of vectors satisfying condition (a) is (d + 1)k , and hence the exponential
factor of the required running time follows. This provides the bound on the claimed exponential
dependence in the running time of the algorithm. The bound on the polynomial component of the
running time follows from exactly the same arguments as in [8].
21
6
Proof of Theorem 1.1
o(
m
)
In this section we prove that unless ETH fails, (IP) cannot be solved in time n log m do(m) , where
d = max{b[1], . . . , b[m]}, even when the constraint matrix is non-negative and all entries in any
feasible solution is at most 2.
Our proof is by a reduction from a 3-CNF SAT to (IP). From a 3-CNF formula ψ on n variables
and m clauses we create an equivalent (IP) instance Aψ x = bψ , x ≥ 0, where Aψ is a non-negative
integer matrix of order (2m + n) × (2(m + n)) and the largest entry in bψ is 3. Our reduction work in
polynomial time. Let ψ be the input of 3-CNF SAT. Let X = {x1 , . . . , xn } be the set of variables
in ψ and C = {C1 , . . . , Cm } be the set of clauses in ψ. Now we create 2n + 2m number of 0 − 1
vectors of length 2m + n, two per variable and two per clause. For each xi ∈ X we make two vectors
vxi and vxi . They are defined as follows. For j ∈ [m], we set
(
1 if xi ∈ Cj ,
0 otherwise,
(
1 if xi ∈ Cj ,
0 otherwise.
vxi [j] =
and
vxi [j] =
For j = m + i, we put vxi [j] = vxi [j] = 1 and for all j ∈ {m + 1, . . . , 2m + n} \ {m + i}, we define
vxi [j] = vxi [j] = 0.
For every clause Cj ∈ C, we define two vectors vCj and vCj0 as follows. For i ∈ [m], we define
(
vCj [i] =
and
1 if i = j,
0 otherwise,
(24)
vCj0 [i] = 0.
For i = m + n + j, we set vCj [i] = vCj0 [i] = 1. For every m + n + j 6= i ∈ {m + 1, . . . , 2m + n}, we
put vCj [i] = vCj0 [i] = 0.
Matrix Aψ is constructed using these vectors as columns. The columns of Aψ are ordered as
0 .
vx1 , vx1 , vx2 , vx2 , . . . , vxn , vxn , vC1 , vC10 , vC2 , vC20 , . . . vCm , vCm
Vector bψ is defined as follows.
bψ [i] =
3 if i ∈ [m],
1 if i ∈ [m + n] \ [m],
2 if i ∈ [2m + n] \ [m + n].
Lemma 6.1. Formula ψ is satisfiable if and only if Aψ x = bψ , x ≥ 0 is feasible.
Proof. Suppose that the formula ψ is satisfiable and let φ be a satisfying assignment of ψ. We
define a (2n + 2m)-vector x∗ and prove that Aψ x∗ = bψ . For any i ∈ Zn ,
(
∗
x [2i + 1] =
1 if φ(xi+1 ) = 1,
0 otherwise,
22
and
(
∗
x [2i + 2] =
1 if φ(xi+1 ) = 1
0 otherwise.
This completes the definition of first 2n entries of x∗ . The other 2m entries (the last 2m entries) of
x∗ is defined as follows. For every i ∈ Zm , we define
0
if the number of literals set to 1 in Ci+1 by φ is 3,
1 if the number of literals set to 1 in Ci+1 by φ is 2,
x [2n + 2i + 1] =
2 otherwise,
∗
and
x∗ [2n + 2i + 2] =
2 if the number of literals set to 1 in Ci+1 by φ is 3,
1 if the number of literals set to 1 in Ci+1 by φ is 2,
0 otherwise.
(25)
(26)
We now proceed to prove that x∗ is indeed a feasible solution.
Claim 6.2. Aψ x∗ = bψ .
Proof. Towards this, we need to show that for every i ∈ [2m + n],
We consider the following exhaustive cases.
P2n+2m
j=1
Aψ [i, j] · x∗ [j] = bψ [i].
Case i ∈ [m]. The fact that each clause has 3 literals along with the definition of Aψ implies that
the number of entries set to 1 in {Aψ [i, j] | j ∈ [2n]} is 3. Also, the indices j for which Aψ [i, j] is
set to one, correspond to a literal in Ci . By the definition of x∗ and the fact that φ is a satisfying
P
P2n
∗
∗
assignment, we have that 2n
j=1 Aψ [i, j]x [j] ∈ [3]. Let r =
j=1 Aψ [i, j]x [j]. Hence
2n+2m
X
Aψ [i, j]x∗ [j] =
j=1
2n
X
Aψ [i, j]x∗ [j] +
j=1
= r+
= r+
2n+2m
X
Aψ [i, j]x∗ [j]
j=2n+1
2n+2m
X
vCi [j]x∗ [j]
j=2n+1
vCi [i]x∗ [2n
+ 2(i − 1) + 1]
= r + 1 · (3 − r)
(By (24) and construction of Aψ )
(By (24) and (25))
= 3 = bψ [i].
Case i ∈ [m + n] \ [m]. By the definition of Aψ and vectors vxj [i], vxj [i], j ∈ [2n], we have that
Aψ [i, j] = 1, j ∈ [2n] if and only if j ∈ {2(i − 1) + 1, 2(i − 1) + 2}. By the definition of x∗ , exactly
P
∗
one from {x∗ [2(i − 1) + 1], x∗ [2(i − 1) + 2]} is set to 1. This implies that 2n
j=1 Aψ [i, j]x [j] = 1.
By the construction of Aψ , we have that Aψ [i, j] = 0 for every j ∈ [2m + 2n] \ [2n]. Therefore,
P2n+2m
Aψ [i, j]x∗ [j] = 1 = bψ [i]
j=1
Case i ∈ [2m + n] \ [m + n]. Let i = m + n + i0 . From the construction Aψ , we have that Aψ [i, j]
is set to zero for all j ∈ [2n], and for any j ∈ [2m + 2n] \ [2n], Aψ [i, j] is set to 1 if and only if
j ∈ {2n + 2(i0 − 1) + 1, 2n + 2(i0 − 1) + 2}. This implies that
2n+2m
X
Aψ [i, j]x∗ [j] = x∗ [2n + 2(i0 − 1) + 1] + x∗ [2n + 2(i0 − 1) + 2]
j=1
= 2 = bψ [i]
(By (25) and (26))
This completes the proof of the claim.
23
For the converse direction of the statement of the lemma, suppose that there exists x∗ ∈ Z2n+2m
≥0
such that Aψ x∗ = bψ . Now we need to show that ψ is satisfiable. We first argue that for any
i ∈ [n], exactly one of {x∗ [2(i − 1) + 1], x∗ [2(i − 1) + 2]} is set to 1 with the other set to 0. This
follows from the fact that (i) Aψ [m + i, 2(i − 1) + 1] = Aψ [m + i, 2(i − 1) + 2] = 1, (ii) for all
j ∈ [2n + 2m] \ {2(i − 1) + 1, 2(i − 1) + 2}, Aψ [m + i, j] = 0 and (iii) bψ [m + i] = 1. Now we define
an assignment φ and prove that φ is a satisfying assignment for ψ. For i ∈ [n] we define
(
φ(xi ) =
1 if x∗ [2(i − 1) + 1] = 1,
0 if x∗ [2(i − 1) + 2] = 1.
We claim that φ satisfies all the clauses. Consider a clause Cj where j ∈ [m]. Since Aψ [m + n +
j, 2n + 2(j − 1) + 1] = 1, bψ [m + n + j] = 2, and x∗ is a feasible solution, we have that
Aψ [m + n + j, 2n + 2(j − 1) + 1] · x∗ [2n + 2(j − 1) + 1] ≤ bψ [m + n + j] = 2.
This implies that x∗ [2n + 2(j − 1) + 1] ≤ 2. Let Cj = x ∨ y ∨ z where x, y, z ∈ {xi , xi | i ∈ [n]}.
Notice that from the construction Aψ there are 3 distinct columns ix , iy , iz ∈ [2n] such that ith
w
column of Aψ is same as the vector vw , where w ∈ {x, y, z}. From the construction of Aψ , the only
non-zero entries in row numbered j are Aψ [j, ix ], Aψ [j, iy ], Aψ [j, iz ] and Aψ [j, 2n + 2(j − 1) + 1]. We
have proved that x∗ [2n + 2(j − 1) + 1] ≤ 2 and notice that bψ [j] = 3. This implies that at least
one among {x∗ [ix ], x∗ [iy ], x∗ [iz ]} is 1 and the corresponding entry in row j is 1. This implies that φ
satisfies Cj . This completes the proof of the lemma.
Now we show that for every feasible solution x, the largest entry in x is at most 2. Notice
that bψ [i] = 3 for all i ∈ [m] and bψ [i] < 3 for all i ∈ [2m + n] \ [m]. This implies that for any
feasible solution x, x[i] ≤ 2 for all i ∈ [2m + n] \ [m]. From the construction of Aψ we have that
for Aψ [i, j] 6= 0, i ∈ [m], there exists an i0 ∈ [2m + n] \ [m] such that Aψ [i0 , j] = 1. This along with
the fact that bψ [i0 ] < 3 implies that in every feasible solution x, x[i] ≤ 2 for all i ∈ [2m + n] \ [m].
Hence the largest entry in any feasible solution is at most 2. The following lemma completes the
proof of the theorem.
Lemma 6.3. If there is an algorithm for (IP) runs in time n
then ETH fails.
m
o( log
)
m do(m) ,
where d = max{b[1], . . . , b[m]},
Proof. By the sparsification lemma [22], we know that 3-CNF SAT on n0 variables and cn0 clauses,
0
where c is a constant, cannot be solved in time 2o(n ) time. Suppose there is an algorithm ALG for
m
o(
)
(IP) running in time n log m do(m) . Then for a 3-CNF formula ψ with n0 variables and m0 = cn
clauses we create an instance Aψ x = bψ , x ≥ 0 of (IP) as discussed in this section, in polynomial
time, where Aψ is a matrix of dimension (2cn0 + n0 ) × (2(n0 + cn0 )) and the largest entry in bψ is 3.
The rank of Aψ is at most (2cn0 + n). Then by Lemma 6.1, we can run ALG to test whether ψ is
satisfiable or not. This takes time
0
0
2cn0 +n0 )
o( log(2cn0 +n0 ) )
(2(cn + n ))
0
0
0
· 3o(2cn +n ) = 2o(n ) ,
hence refuting ETH.
7
Conclusion
We conclude with several open questions. First of all, while our SETH-based lower bounds for (IP)
with non-negative constraint matrix are tight for path-width parameterization, there is a “(d + 1)k
24
to (d + 1)2k gap” between lower and upper bounds for branch-width parameterization. Closing this
gap is the first natural question.
The proof of Cunningham-Geelen of Theorem 1.2 consists of two parts. The first part bounds the
number of potential partial solutions corresponding to any edge of the branch decomposition tree by
(d + 1)k . The second part is the dynamic programming over the branch decomposition using the fact
that the number of potential partial solutions is bounded. The bottleneck in Cunningham-Geelen’s
algorithm is the following subproblem. We are given two vector sets A and B of partial solutions,
each set of size at most (d + 1)k . We need to construct a new vector set C of partial solutions,
where the set C will have size at most (d + 1)k and each vector from C is the sum of a vector from
A and a vector from B. Thus to construct the new set of vectors, one has to go through all possible
pairs of vectors from both sets A and B, which takes time roughly (d + 1)2k .
A tempting approach towards improving the running time of this particular step could be the use
of fast subset convolution or matrix multiplication tricks, which work very well for “join” operations
in dynamic programming algorithms over tree and branch decompositions of graphs [14, 30, 13], see
also [11, Chapter 11]. Unfortunately, we have reason to suspect that these tricks may not help for
matrices: solving the above subproblem in time (d + 1)(1−)2k nO(1) for any > 0 would imply that
3-SUM is solvable in time n2− , which is believed to be unlikely. (The 3-SUM problem asks whether
a given set of n integers contains three elements that sum to zero.) Indeed, consider an equivalent
version of 3-SUM, named 3-SUM0 , which is defined as follows. Given 3 sets of integers A, B and
C each of cardinality n, and the objective is to check whether there exist a ∈ A, b ∈ B and c ∈ C
such that a + b = c. Then, 3-SUM is solvable in time n2− if and only if 3-SUM0 is as well (see
Theorem 3.1 in [17]). However, the problem 3-SUM0 is equivalent to the most time consuming step
in the algorithm of Theorem 1.2, where the integers in the input of 3-SUM0 can be thought of as
length-one vectors. While this observation does not rule out the existence of an algorithm solving
(IP) with constraint matrices of branch-width k in time (d + 1)(1−)2k nO(1) , it indicates that any
interesting improvement in the running time would require a completely different approach.
Our final open question is to obtain a refined lower bound for (IP) with bounded rank. Recall
that the constraint matrix of the algorithm of Papadimitriou [26] can contain negative values and
improving the running time of his algorithm or showing that its running time is tight up to SETH,
is still a very interesting question.
25
References
[1] A. Abboud, A. Backurs, and V. V. Williams, Tight hardness results for LCS and other
sequence similarity measures, in Proceedings of the 56th Annual Symposium on Foundations of
Computer Science (FOCS), IEEE Computer Society, 2015, pp. 59–78. 3
[2] A. Abboud and V. V. Williams, Popular conjectures imply strong lower bounds for dynamic
problems, in Proceedings of the 55th Annual Symposium on Foundations of Computer Science
(FOCS), IEEE Computer Society, 2014, pp. 434–443. 3
[3] A. Backurs and P. Indyk, Edit distance cannot be computed in strongly subquadratic time
(unless SETH is false), in Proceedings of the 47th Annual ACM Symposium on Theory of
Computing (STOC), ACM, 2015, pp. 51–58. 3
[4]
, Which regular expression patterns are hard to match?, in Proceedings of the 57th Annual
Symposium on Foundations of Computer Science (FOCS), IEEE Computer Society, 2016, p. to
appear. 3
[5] K. Bringmann, Why walking the dog takes time: Frechet distance has no strongly subquadratic
algorithms unless SETH fails, in Proceedings of the 55th Annual Symposium on Foundations
of Computer Science (FOCS), IEEE Computer Society, 2014, pp. 661–670. 3
[6] K. Bringmann and M. Künnemann, Quadratic conditional lower bounds for string problems
and dynamic time warping, in Proceedings of the 56th Annual Symposium on Foundations of
Computer Science (FOCS), IEEE Computer Society, 2015, pp. 79–97. 3
[7] W. Cook and P. D. Seymour, Tour merging via branch-decomposition, INFORMS Journal
on Computing, 15 (2003), pp. 233–248. 1
[8] W. H. Cunningham and J. Geelen, On integer programming and the branch-width of the
constraint matrix, in Proceedings of the 12th International Conference on Integer Programming
and Combinatorial Optimization (IPCO), vol. 4513 of Lecture Notes in Comput. Sci., Springer,
2007, pp. 158–166. 1, 20, 21
[9] R. Curticapean and D. Marx, Tight conditional lower bounds for counting perfect matchings
on graphs of bounded treewidth, cliquewidth, and genus, in Proceedings of the 26th Annual
ACM-SIAM Symposium on Discrete Algorithms (SODA), SIAM, 2016, pp. 1650–1669. 3
[10] M. Cygan, H. Dell, D. Lokshtanov, D. Marx, J. Nederlof, Y. Okamoto, R. Paturi,
S. Saurabh, and M. Wahlström, On problems as hard as CNF-SAT, in Proceedings of the
27th IEEE Conference on Computational Complexity (CCC), IEEE, 2012, pp. 74–84. 3
[11] M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk,
M. Pilipczuk, and S. Saurabh, Parameterized Algorithms, Springer, 2015. 3, 25
[12] M. Cygan, S. Kratsch, and J. Nederlof, Fast hamiltonicity checking via bases of perfect
matchings, in Proceedings of the 45th Annual ACM Symposium on Theory of Computing
(STOC), ACM, 2013, pp. 301–310. 3
[13] M. Cygan, J. Nederlof, M. Pilipczuk, M. Pilipczuk, J. M. M. van Rooij, and J. O.
Wojtaszczyk, Solving connectivity problems parameterized by treewidth in single exponential
time, in Proceedings of the 52nd Annual Symposium on Foundations of Computer Science
(FOCS), IEEE, 2011, pp. 150–159. 25
26
[14] F. Dorn, Dynamic programming and fast matrix multiplication, in Proceedings of the 14th
Annual European Symposium on Algorithms (ESA), vol. 4168 of Lecture Notes in Comput.
Sci., Springer, Berlin, 2006, pp. 280–291. 25
[15] F. V. Fomin, P. A. Golovach, D. Lokshtanov, and S. Saurabh, Almost optimal
lower bounds for problems parameterized by clique-width, SIAM J. Computing, 43 (2014),
pp. 1541–1563. 3
[16] F. V. Fomin and D. M. Thilikos, Dominating sets in planar graphs: Branch-width and
exponential speed-up, SIAM J. Computing, 36 (2006), pp. 281–309. 1
[17] A. Gajentaan and M. H. Overmars, On a class of o(n2 ) problems in computational
geometry, Comput. Geom., 5 (1995), pp. 165–185. 25
[18] P. Hliněný, Branch-width, parse trees, and monadic second-order logic for matroids, J.
Combinatorial Theory Ser. B, 96 (2006), pp. 325–351. 1
[19] P. Hlinený, The tutte polynomial for matroids of bounded branch-width, Combinatorics,
Probability & Computing, 15 (2006), pp. 397–409. 1
[20] G. B. Horn and F. R. Kschischang, On the intractability of permuting a block code to
minimize trellis complexity, IEEE Trans. Information Theory, 42 (1996), pp. 2042–2048. 2
[21] R. Impagliazzo and R. Paturi, On the complexity of k-SAT, J. Computer and System
Sciences, 62 (2001), pp. 367–375. 1, 3
[22] R. Impagliazzo, R. Paturi, and F. Zane, Which problems have strongly exponential
complexity, J. Computer and System Sciences, 63 (2001), pp. 512–530. 3, 24
[23] J. Jeong, E. J. Kim, and S. Oum, Constructive algorithm for path-width of matroids, in
Proceedings of the 26th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA),
SIAM, 2016, pp. 1695–1704. 4, 20
[24] D. Lokshtanov, D. Marx, and S. Saurabh, Known algorithms on graphs on bounded
treewidth are probably optimal, in Proceedings of the 21st Annual ACM-SIAM Symposium on
Discrete Algorithms (SODA), SIAM, 2011, pp. 777–789. 3
[25] D. Lokshtanov, D. Marx, and S. Saurabh, Lower bounds based on the exponential time
hypothesis, Bulletin of the EATCS, 105 (2011), pp. 41–72. 3
[26] C. H. Papadimitriou, On the complexity of integer programming, J. ACM, 28 (1981), pp. 765–
768. 1, 2, 25
[27] M. Pătraşcu and R. Williams, On the possibility of faster SAT algorithms, in Proceedings
of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), SIAM, 2010,
pp. 1065–1075. 3
[28] N. Robertson and P. D. Seymour, Graph minors. X. Obstructions to tree-decomposition,
J. Combinatorial Theory Ser. B, 52 (1991), pp. 153–190. 1, 4
[29] L. Roditty and V. V. Williams, Fast approximation algorithms for the diameter and radius
of sparse graphs, in Proceedings of the 45th Annual ACM Symposium on Theory of Computing
(STOC), ACM, 2013, pp. 515–524. 3
27
[30] J. M. M. van Rooij, H. L. Bodlaender, and P. Rossmanith, Dynamic programming
on tree decompositions using generalised fast subset convolution, in Proceedings of the 17th
Annual European Symposium on Algorithms (ESA), vol. 5757 of Lecture Notes in Comput.
Sci., Springer, 2009, pp. 566–577. 25
[31] V. V. Williams, Hardness of Easy Problems: Basing Hardness on Popular Conjectures
such as the Strong Exponential Time Hypothesis (Invited Talk), in Proceedings of the 10th
International Symposium on Parameterized and Exact Computation (IPEC), vol. 43 of Leibniz
International Proceedings in Informatics (LIPIcs), Dagstuhl, Germany, 2015, Schloss Dagstuhl–
Leibniz-Zentrum fuer Informatik, pp. 17–29. 3
28
| 8cs.DS
|
DIMENSION RIGIDITY OF LATTICES IN
SEMISIMPLE LIE GROUPS
arXiv:1607.03652v1 [math.AT] 13 Jul 2016
CYRIL LACOSTE
Abstract. We prove that if Γ is a lattice in the group of isometries of a symmetric space of non-compact type without euclidean
factors, then the virtual cohomological dimension of Γ equals its
proper geometric dimension.
1. Introduction
Let Γ be a discrete virtually torsion-free group. There exist several
notions of "dimension" for Γ. One of them is the virtual cohomological
dimension vcd(Γ), which is the cohomological dimension of any torsionfree finite index subgroup of Γ. Due to a result by Serre, it does not
depend on the choice of such a subgroup (see [9]). Another one is the
proper geometric dimension. A Γ-CW-complex X is said to be a model
for EΓ if the stabilizers of the action of Γ on X are finite and for every
finite subgroup H of Γ, the fixed point space X H is contractible. Note
that two models for EΓ are Γ-equivariantly homotopy equivalent to
each other. The proper geometric dimension gd(Γ) of Γ is the smallest
possible dimension of a model for EΓ.
These two notions are related. In fact, we always have the inequality
vcd(Γ) 6 gd(Γ)
but this inequality may be strict, see for instance the construction of
Leary and Nucinkis in [23], or other examples in [8], [24], [28], [11],
[12].
However there are also many examples of virtually torsion-free groups
Γ with vcd(Γ) = gd(Γ). For instance in [10] Degrijse and MartinezPerez prove that this is the case for a large class of groups containing
all finitely generated Coxeter groups. Other examples for equality can
be found in [1], [2], [25] and [33].
In this paper we will prove that equality holds for groups acting by
isometries, discretely and with finite covolume on symmetric spaces of
non-compact type without euclidean factors:
Theorem 1.1. Let S be a symmetric space of non-compact type without
euclidean factors. Then
gd(Γ) = vcd(Γ)
for every lattice Γ ⊂ Isom(S).
1
2
CYRIL LACOSTE
Recall that a symmetric space of non-compact type without euclidean factors is of the form G/K where G is a semisimple Lie group,
which can be assumed to be connected and centerfree, and K ⊂ G is a
maximal compact subgroup. Then Isom(S) = Aut(g) = Aut(G) where
g is the Lie algebra of G, and note that this group is semisimple, linear
and algebraic but may be not connected. In [1] the authors prove Theorem 1.1 for lattices in classical simple Lie groups G. We will heavily
rely on their results and techniques.
We discuss now some applications of Theorem 1.1. First note that
the symmetric space S is a model for EΓ. Theorem 1.1 yields then
that:
Corollary 1.1. If S is a symmetric space of non-compact type and
without euclidean factors, and if Γ ⊂ Isom(S) is a lattice, then S is
Γ-equivariantly homotopy equivalent to a proper cocompact Γ-CW complex of dimension vcd(Γ).
We stress again that in the setting of Theorem 1.1 we are considering
the full group of isometries of S. This has the consequence that we are
able to deduce that there is equality between the virtual cohomological
dimension and the proper geometric dimension not only for lattices
in Isom(S), but also for groups abstractly commensurable to them.
Here, two groups Γ1 and Γ2 are said abstractly commensurable if for
f of finite index in Γ , such that Γ
f
i = 1, 2, there exists a subgroup Γ
i
i
1
f
is isomorphic to Γ2 . Then we obtain from Theorem 1.1 that:
Corollary 1.2. If a group Γ is abstractly commensurable to a lattice
in the group of isometries of a symmetric space of non-compact type
without euclidean factors, then gd(Γ) = vcd(Γ).
Remark 1.1 Note that in general the equality between the proper
geometric dimension and the virtual cohomological dimension behaves
badly under commensuration. For instance, the fact that there exist
virtully torsion-free groups Γ with vcd(Γ) > 3 and such that vcd(Γ) <
gd(Γ) proves that if Γ0 is a torsion-free subgroup of Γ of finite index,
then vcd(Γ0 ) = cd(Γ0 ) = gd(Γ0 ) = gd(Γ0 ), whereas Γ is commensurable to Γ0 and vcd(Γ) < gd(Γ). In fact, we have concrete exemples of
groups for which Corollary 1.2 fails among familiar classes of groups.
For instance, in [10] the authors prove that if Γ is a finitely generated Coxeter group then vcd(Γ) = gd(Γ) and in [24] the authors construct finite extensions of certain right-angled Coxeter groups such that
vcd(Γ) < gd(Γ).
Returning to the applications of Theorem 1.1, we obtain from Corollary 1.2 that lattices in Isom(S) are dimension rigid in the sense of
[12]: we say that a virtually torsion-free group Γ is dimension rigid if
e = vcd(Γ)
e for every group Γ
e which contains Γ as a finite
one has gd(Γ)
index normal subgroup.
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
3
Dimension rigidity has a strong impact on the behaviour of the
proper geometric dimension under group extensions, and we obtain
from Corollary 1.2 and [11, Cor. 2.3] that:
Corollary 1.3. If Γ is a lattice in the group of isometries of a symmetric space of non-compact type without euclidean factors and
1→Γ→G→Q→1
is a short exact sequence, then gd(G) 6 gd(Γ) + gd(Q).
We sketch now the strategy of the proof of Theorem 1.1. To begin
with, note that while symmetric spaces, both Riemannian and nonRiemannian, will play a key role in our considerations, most of the
time we will be working in the ambient Lie group. In fact it will be
convenient to reformulate Theorem 1.1 as follows:
Main Theorem Let g be a semisimple Lie algebra. Then
gd(Γ) = vcd(Γ)
for every lattice Γ ⊂ Aut(g).
The key ingredient in the proof of the Main Theorem, and hence of
Theorem 1.1, is a result of Lück and Meintrup [26], which basically
asserts that the proper geometric dimension gd(Γ) equals the Bredon
cohomological dimension cd(Γ) - see Theorem 2.3 for a precise statement. In the light of this theorem it suffices to prove that the two
cohomological notions of dimension vcd(Γ) and cd(Γ) coincide. In [1]
the authors noted that to prove the equality vcd(Γ) = cd(Γ) it suffices
to ensure that the fixed point sets S α of finite order elements α ∈ Γ
are of small dimension - see Section 2.8 for details. Still in [1] the
authors checked that this was the case for lattices contained in the
classical simple Lie groups. We will use a similar strategy to prove the
Main Theorem for lattices in groups of automorphisms of all simple Lie
algebras. Recall that any non-compact finite dimensional simple Lie
algebra over R is either isomorphic to one of the classical types or to
one of the exceptional ones. The classical Lie algebras are the complex
ones
sl(n, C), so(n, C), sp(2n, C)
and their real forms
sl(n, R), sl(n, H), so(p, q), su(p, q), sp(p, q), sp(2n, R), so∗ (2n).
Similarly, the exceptional Lie algebras are the five complex ones
gC2 , fC4 , eC6 , eC7 , eC8
and their twelve real forms
g2(2) , f4(4) , f4(−20) , e6(6) , e6(2) , e6(−14) , e6(−26) ,
e7(7) , e7(−5) , e7(−25) , e8(8) , e8(−24) .
4
CYRIL LACOSTE
Here the number in brackets is the difference between the dimension
of the adjoint group and twice the dimension of a maximal compact
subgroup (which equals 0 for a complex Lie group).
We illustrate now the basic steps of the proof of the Main Theorem
in the example of g = sl(n, C). Suppose that Γ ⊂ Aut(g) is a lattice,
and consider the symmetric space S = PSL(n, C)/PSUn . To prove that
gd(Γ) = vcd(Γ), it will suffice to establish that
(1.1)
dim S α < dim S − rkR (PSL(n, C)) = (n2 − 1) − (n − 1)
for every α ∈ Γ of finite order and non central (see Lemma 2.2). First
note that α is the composition of an inner automorphism and an outer
automorphism. Since every non-trivial element in Out(g) has order 2,
it follows that α2 is an inner automorphism. If it is non trivial then
we use the results of Section 6.1 in [1]. In general, if α = Ad(A) is a
non-trivial inner automorphism of sl(n, C), we get from [1] that (1.1)
holds.
We are reduced to the case where α2 is trivial, meaning that α is
of order 2. Then the automorphism α ∈ Aut(g) is induced by an
automorphism of the adjoint group Gad = PSL(n, C) which is still
denoted α and is also an involution. The fixed point set S α is the
Riemannian symmetric space associated to Gαad , where Gαad is the set
of fixed points of α. Now, notice that the quotient Gad /Gαad is a (nonRiemannian) symmetric space. The symmetric spaces associated to
simple groups have been classified by Berger in [4]. In the case of
Gad = PSL(n, C), we obtain from this classification that the Lie algebra
of Gαad is either compact or isomorphic to so(n, C), s(gl(k, C) ⊕ gl(n −
k, C)), sp(n, C), sl(n, R), su(p, n − p) or sl( n2 , H), where sp(n, C) and
sl( n2 , H) only appear if n is even. Armed with this information, we
check (1.1) for every involution α, which leads to the Main Theorem
for g = sl(n, C). The argument we just sketched will be applied in
Section 3 to all complex simple Lie algebras and in Section 4 to the
real ones. Since the arguments are similar, and since the complex case
is somewhat easier, we advise the reader to skip Section 4 in a first
reading.
Having dealt with the simple Lie algebras, we treat in section 5 the
semisimple case. The method for the simple algebras will not work at
first sight, but the proof will eventually by simpler. The idea is to restrict to irreducible lattices, i.e. those who cannot be decomposed into
a product. Then we will show that the rational rank of an irreducible
lattice is lower than the real rank of any factor of the adjoint group,
meaning that we get a much improved bound than in (1.1). This fact
will lead rapidly to the Main Theorem.
Finally note that in the proof of the Main Theorem, we do not construct a concrete model for EΓ of dimension vcd(Γ), we just prove its
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
5
existence. It is however worth mentioning that in a few cases such
models are known. For instance if Γ = SL(n, Z), the symmetric space
S = SL(n, R)/SOn admits a Γ-equivariant deformation retract of dimension vcd(Γ) called the "well-rounded retract" (see [3], [31] and [32]).
It will be interesting to do the same for groups such as Sp(2n, Z).
Acknowledgements. The author thanks Dave Witte Morris for his
help, Dieter Degrijse for interesting discussions and Juan Souto for his
useful advice and instructive discussions.
2. Preliminaries
In this section we recall some basic facts and definitions about algebraic groups, Lie groups and Lie algebras, symmetric spaces, lattices
and arithmetic groups, virtual cohomological dimension and Bredon
cohomology.
2.1. Algebraic groups and Lie groups. An algebraic group is a
subgroup G of SL(N, C) determined by a collection of polynomials. It
is defined over a subfield k of C if those polynomials can be chosen to
have coefficients in k. The Galois criterion (see [6, Prop. 14.2 p.30])
says that G is defined over k if and only if G is stable under the Galois
group Gal(C/k). If G is an algebraic group and R ⊂ C is a ring we note
GR the set of elements of G with entries in R. If G is an algebraic group
defined over R, it is well-known that the groups GC and GR are Lie
groups with finitely many connected components. In fact, G is Zariski
connected if and only if GC is a connected Lie group, whereas GR may
not be connected in this case. A non-abelian algebraic group (or Lie
group) is said simple if every connected normal subgroup is trivial, and
semisimple if every connected normal abelian subgroup is trivial. Note
that if G is a semisimple algebraic group defined over k = R or C
then Gk is a semisimple Lie group. Any connected semisimple complex
linear Lie group is algebraic and any connected semisimple real linear
Lie group is the identity component of the group of real points of an
algebraic group defined over R. Recall that two Lie groups G1 and
G2 are isogenous if they are locally isomorphic, meaning that there
exist finite normal subgroups N1 ⊂ G01 and N2 ⊂ G02 of the identity
components of G1 and G2 such that G01 /N1 is isomorphic to G02 /N2 .
A semisimple linear Lie group is isogenous to a product of simple Lie
groups.
The center Z(G) of a semisimple algebraic group G is finite (it is
also the case for semisimple linear Lie groups but not for semisimple
Lie groups in general) and the quotient G/Z(G) is again a semisimple
algebraic group (see [6, Thm. 6.8 p.98]). Moreover, if G is defined over
k then so is G/Z(G).
6
CYRIL LACOSTE
A connected algebraic group T ⊂ SL(N, C) is a torus if it is diagonalizable, meaning there exists A ∈ SL(N, C) such that for every B ∈ T,
ABA−1 is diagonal. A torus is in particular abelian and isomorphic,
as an algebraic group, to a product C∗ × · · · × C∗ . If T is defined over
k, it is said to be k-split if the conjugating element A can be chosen
in SL(N, k). A torus in an algebraic group G is a subgroup that is a
torus. It is said to be maximal if it is not strictly contained in any
other torus. An important fact is that any two maximal tori in G are
conjugate in G, and that if G is defined over k, then any two maximal
k-split tori are conjugate by an element in Gk . The k-rank of G (or
of Gk ), denoted by rkk G (or rkk Gk ), is the dimension of any maximal
k-split torus in G, and the rank of G is just the C-rank.
We refer to [6], [22] and [30] for basic facts about algebraic groups
and Lie groups.
2.2. Lie algebras and their automorphisms. Recall that the Lie
algebra g of a Lie group G is the set of left-invariant vector fields. A
subalgebra of g is a subspace closed under Lie bracket. An ideal is a
subalgebra I such that [g, I] ⊂ I. The Lie algebra g is simple if it is
not abelian and has no non-trivial ideals, and semisimple if it has no
non-zero abelian ideals. A Lie group is simple (resp. semisimple) if
and only if its Lie algebra is simple (resp. semisimple). A semisimple
Lie algebra is isomorphic to a finite direct sum of simple ones.
By Lie’s third theorem, if g is a finite dimensional real Lie algebra
(which will be always the case here), there exists a connected Lie group,
unique up to covering, whose Lie algebra is g. This means that their
exists a unique simply connected Lie group G associated to g, and every
other connected Lie group whose Lie algebra is g is a quotient of G by a
subgroup contained in the center. In particular, Gad = G/Z(G) is the
unique connected centerfree Lie group associated to g. The group Gad
is called the adjoint group of g. The adjoint group is a linear algebraic
group, whereas its universal cover may be not linear (see for instance
the universal cover of PSL(2, R)). It follows that the classification of
simple Lie algebras is in correspondance with that of simple Lie groups.
A Lie algebra is said compact if the adjoint group is.
An automorphism of a Lie algebra g is a bijective linear endomorphism which preserves the Lie bracket. The group of automorphisms
of g is denoted Aut(g), it is linear and algebraic but not connected in
general. If G is a Lie group associated to g, then the differential of a
Lie group automorphism of G is an automorphism of g. Conversely,
if G is either simply connected or connected and centerfree, any automorphism of g comes from an automorphism of G. In this case, we
will often identify these two automorphisms and denote them by the
same letter. An inner automorphism is the derivative of the conjugation in G by an element A ∈ G - we denote it Ad(A). The group
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
7
Inn(g) of inner automorphisms is a normal subgroup of Aut(g). It is
also the identity component of Aut(g) and is isomorphic to the adjoint
group Gad . If g is semisimple, the subgroup Inn(g) is of finite index
in Aut(g) and the quotient Aut(g)/Inn(g) is the (finite) group of outer
automorphisms Out(g). Moreover if g is simple, Out(g) can be seen as
a subgroup of Aut(g) and Aut(g) is the semidirect product of Out(g)
and Inn(g), that is Aut(g) = Inn(g) o Out(g) (see [16]).
Note that even if g is complex, we let Aut(g) be the group of real
automorphisms. If g is complex and simple then Aut(g) contains the
complex automorphism group AutC (g) as a subgroup of index 2, the
quotient being generated by complex conjugation (see [13, Prop. 4.1]).
Recall that if g is a complex Lie algebra, a real form of g is a real Lie
algebra whose complexification is g. Any real form is the group of fixed
points by a conjugation of g, meaning an involutive real automorphism
which is antilinear over C.
We refer to [30], [22], [17] and [13] for other facts about Lie algebras
and their automorphisms.
2.3. Simple Lie groups, simple Lie algebras and their outer
automorphisms. As mentioned in the previous section, the classification of simple Lie groups (up to isogeny) and of simple Lie algebras
are in correspondance. Both are due to by Cartan. We will now see
that of simple Lie groups. Every linear simple Lie group is isogenous
to either a classical group or to one of the finitely many exceptional
groups. We denote the transpose of a matrix A by At and its conjugate
transpose by A∗ and we consider the particular matrices
Jn =
Idn
−Idn
!
, Qp,q =
!
−Idp
Idq
.
The non-compact classical simple Lie groups are the groups in the
following list
SL(n, C) = {A ∈ GL(n, C)| det A = 1}
n>2
SO(n, C) = {A ∈ SL(n, C)|At A = Id}
n > 3, n 6= 4
Sp(2n, C) = {A ∈ SL(2n, C)|At Jn A = Jn }
n>1
SL(n, R) = {A ∈ GL(n, R)| det A = 1}
n>2
SL(n, H) = {A ∈ GL(n, H)| det A = 1}
n>2
SO(p, q) = {A ∈ SL(p + q, R)|At Qp,q A = Qp,q } 1 6 p 6 q, p + q > 3
SU(p, q) = {A ∈ SL(p + q, C)|A∗ Qp,q A = Qp,q } 1 6 p 6 q, p + q > 3
Sp(p, q) = {A ∈ GL(p + q, H)|A∗ Qp,q A = Qp,q } 1 6 p 6 q, p + q > 3
Sp(2n, R) = {A ∈ SL(2n, R)|At Jn A = Jn }
n>1
∗
t
SO (2n) = {A ∈ SU(n, n)|A Qn,n Jn A = Qn,n Jn }
n>2
Similarly we give the list of the compact ones
SOn = {A ∈ SL(n, R)|At A = Id}
SUn = {A ∈ SL(n, C)|A∗ A = Id}
On = {A ∈ GL(n, R)|At A = Id}
Un = {A ∈ GL(n, C)|A∗ A = Id}
8
CYRIL LACOSTE
Spn = {A ∈ GL(n, H)|A∗ A = Id}
The compact exceptional Lie groups are
G2 , F4 , E6 , E7 , E8
and the non-compact ones are the complex ones (which are the complexifications of the previous compact groups)
GC2 , F4C , E6C , E7C , E8C
and their real forms
G2(2) , F4(4) , F4(−20) , F4(4) , E6(6) , E6(2) , E6(−14) , E6(−26) ,
E7(7) , E7(−5) , E7(−25) , E8(8) , E8(−24) .
We refer to [34] for definitions and complete descriptions of the simply connected versions of the exceptional Lie groups. Note that in this
paper we will always consider the centerless versions with the same
notations.
As usual, the simple Lie algebra associated to a simple Lie group will
be denoted by gothic caracters, for instance sl(n, R) is the Lie algebra
of SL(n, R). Note that the adjoint group of sl(n, R) is PSL(n, R). The
classification of simple Lie algebras runs in parallel to that of simple
Lie groups. The following table summarizes the structure of the outer
automorphisms groups of simple Lie algebras (see [17] section 3.2). We
denote by Sn the symmetric group and D2n the dihedral group.
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
g
sl(n, C), n > 3
so(8, C)
so(2n, C), n > 5
eC6
all others complex Lie algebras
sl(2, R)
sl(n, R), n > 3 odd
sl(n, R), n > 4 even
su(p, q), p 6= q
su(p, p), p > 2
sl(n, H)
so(p, q), p + q odd
so(p, q), p and q odd, p 6= q
so(p, q) p and q even, p 6= q
so(p, p) p > 5 odd
so(p, p) p > 6 even
so(4, 4)
sp(2n, R)
sp(p, p)
so∗ (2n)
e6(j) , j = 6, 2, −14, −26
e7(j) , j = 7, −25
all others real Lie algebras
Table 1. Outer automorphisms groups of
9
Out(g)
Z2 × Z2
S3 × Z2
Z2 × Z2
Z2 × Z2
Z2
Z2
Z2
Z2 × Z2
Z2
Z2 × Z2
Z2
Z2
Z2
Z2 × Z2
Z2 × Z2
D4
S4
Z2
Z2
Z2
Z2
Z2
1
simple Lie algebras
Note that we have the isomorphisms: so(3, C) ∼
= sl(2, C) ∼
= sp(2, C),
∼
∼
so(5, C) = sp(4, C), so(6, C) = sl(4, C) and the corresponding ones
between their real forms, and that so(4, C) is not simple but isomorphic
to sl(2, C) ⊕ sl(2, C).
2.4. Symmetric spaces. Let G be a Lie group. A symmetric space
is a space of the form G/Gρ where ρ is an involutive automorphism
of G and Gρ its fixed points set. It is said irreducible if it can not
be decomposed as a product. From an algebraic point of view, the
irreducibility of G/H implies that the Lie algebra h of H is a maximal
subalgebra of the Lie algebra g of G. Equivalently, the irreducibility of
G/H implies that the identity component of H is a maximal connected
Lie subgroup of the identity component of G.
Another point of view on symmetric spaces is based on Lie algebras.
If G/Gρ is a symmetric space and g is the Lie algebra of G, the involutive automorphism ρ induces an involutive automorphism of g whose
fixed point set is the Lie algebra h of H = Gρ . We can thus always
associate to a symmetric space G/H a linear space g/h, called a local
symmetric space. The Lie subalgebra h is called the isotropy algebra of
10
CYRIL LACOSTE
g/h (more generally we say that h is an isotropy algebra if it is the fixed
point set of an involutive automorphism) . Conversely, if g is a Lie algebra, G a simply connected or connected and centerless Lie group whose
Lie algebra is g, and h ⊂ g an isotropy algebra, the local symmetric
space g/h lifts to a symmetric space G/H, because Aut(g) = Aut(G).
So the classification of symmetric spaces are in correspondance with
those of local symmetric spaces, and has been done by Berger in [4].
Note that if g is simple and complex, and if ρ ∈ Aut(g) is an involution, then ρ is either C-linear and in this case h = gρ is also complex,
or ρ is anti-linear (that means it is a conjugation) and h = gρ is a real
form of g. Note also that is g is real and ρ is an involution, then ρ can
be extended to a C-linear involution ρC of the complexification gC of g,
C
and the isotropy algebra (gC )ρ is the complexification of h = gρ , that
C
is (gC )ρ = hC .
We give now the list of the non-compact isotropy algebras of the
local symmetric spaces associated to sl(n, C) and its real forms.
gC = sl(n, C)
g = sl(n, R)
n
,H
2
gl n2 , C
Table 2. Non-compact isotropy algebras of sl(n, C) and
its real forms
Table 2 is organized as follows: in the first line we give the complex
isotropy algebras hC of sl(n, C) (fixed by a complex involution). Each
column consists of real forms of the complex algebra in the first entry. The local symmetric spaces associated to sl(n, C) are then those
of the form sl(n, C)/hC , for instance sl(n, C)/so(n, C), or of the form
sl(n, C)/g, for instance sl(n, C)/sl(n, R). The ones associated to a real
form g are of the form g/h, for instance sl(n, R)/so(k, l) with k + l = n.
The following tables summarize the classification for other simple
Lie algebras. They are organized in a similar way.
gC = so(n, C)
hC = so(k, C) ⊕ so(l, C)
g = so(p, q)
h = so(kp , kq ) ⊕ so(lp , lq ))
(p =
q) h = so(p, C)
∗
h = so 2 k2 ⊕ so∗ 2 2l
g = so∗ 2
h = so(p, q)
h = s(u(kp , kq ) ⊕ u(lp , lq )) h = sp p2 , 2q
∗
(p = q) h = so
(2p)
h = gl(p, C)
h = sp(2p,
R)
n
k
l
∗
h = so 2 2
h = s(gl( 2 , H) ⊕ gl( 2 , H)) h = sp k2 , 2l
g = su(p, q)
g = sl
hC = s(gl(k, C) ⊕ gl(l, C)) hC = sp(n, C)
h = s(gl(k, R)
h = sp(n, R)
⊕ gl(l,
R))
n
h = gl 2 , C
hC = so(n, C)
h = so(k, l)
n
2
h = so
n
,C
2
n
,C
2
u p2 , 2q
hC = gl
h=
h = gl(p,
R)
k l
h = u 2, 2
h = gl
n
,H
4
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
11
Table 3. Non-compact isotropy algebras of so(n, C)
and its real forms
gC = sp(2n, C) hC = sp(2k, C) ⊕ sp(2l, C)
g = sp(p, q)
h = sp(kp , kq ) ⊕ sp(lp , lq )
(p = q) h = sp(p, C)
g = sp(2n, R)
h = sp(2k, R) ⊕ sp(2l, R)
h = sp(n, C)
Table 4. Non-compact isotropy algebras
and its real forms
hC = gl(n, C)
h = u(p, q)
h = gl(p, H)
h = u(k, l)
h = gl(n, R)
of sp(2n, C)
gC = gC2 hC = sl(2, C) ⊕ sl(2, C)
g = g2(2) h = sl(2, R) ⊕ sl(2, R)
Table 5. Non-compact isotropy algebras of gC2 and its
real form
hC = sp(6, C) ⊕ sp(2, C) hC = so(9, C)
h = sp(6, R) ⊕ sp(2, R)
h = so(4, 5)
h = sp(1, 2) ⊕ sp(1)
g = f4(−20)
h = sp(1, 2) ⊕ sp(1)
h = so(1, 8)
Table 6. Non-compact isotropy algebras of fC4 and its
real forms
gC = fC4
g = f4(4)
hC = sp(8, C) hC = sl(6, C) ⊕ sl(2, C) hC = so(10, C) ⊕ so(2, C) hC = fC4
h = sp(2, 2)
h = sl(6, R) ⊕ sl(2, R)
h = so(5, 5) ⊕ so(1, 1)
h = f4(4)
h = sp(8, R)
h = sl(3, H) ⊕ su(2)
g = e6(2)
h = sp(1, 3)
h = su(2, 4) ⊕ su(2)
h = so(4, 6) ⊕ so(2)
h = f4(4)
∗
h = sp(8, R) h = su(3, 3) ⊕ sl(2, R)
h = so (10) ⊕ so(2)
g = e6(−14)
h = sp(2, 2)
h = su(2, 4) ⊕ su(2)
h = so(2, 8) ⊕ so(2)
h = f4(−20)
∗
h = su(1, 5) ⊕ sl(2, R)
h = so (10) ⊕ so(2)
g = e6(−26) h = sp(1, 3)
h = sl(3, H) ⊕ sp(1)
h = so(1, 9) ⊕ so(1, 1)
h = f4(−20)
C
Table 7. Non-compact isotropy algebras of e6 and its
real forms
gC = eC6
g = e6(6)
hC = sl(8, C) hC = so(12, C) ⊕ sl(2, C) hC = eC6 ⊕ so(2, C)
h = su(4, 4)
h = so(6, 6) ⊕ sl(2, R)
h = e6(6) ⊕ so(1, 1)
h = sl(8, R)
h = so∗ (12) ⊕ sp(1)
h = e6(2) ⊕ so(2)
h = sl(4, H)
g = e7(−5)
h = su(4, 4)
h = so(4, 8) ⊕ su(2)
h = e6(2) × so(2)
∗
h = su(2, 6)
h = so (12) ⊕ sl(2, R)
h = e6(−14) ⊕ so(2)
g = e7(−25) h = sl(4, H) h = so(2, 10) ⊕ sl(2, R)
h = e6(−14) ⊕ so(2)
∗
h = su(2, 6)
h = so (12) ⊕ sp(1)
h = e6(−26) ⊕ so(1, 1)
C
Table 8. Non-compact isotropy algebras of e7 and its
real forms
gC = eC7
g = e7(7)
12
CYRIL LACOSTE
hC = eC7 ⊕ sl(2, C) hC = so(16, C)
h = e7(7) ⊕ sl(2, R)
h = so(8, 8)
h = e7(−5) ⊕ su(2)
h = so∗ (16)
g = e8(−24) h = e7(−25) ⊕ sl(2, R) h = so(4, 12)
h = e7(−5) ⊕ su(2)
h = so∗ (16)
Table 9. Non-compact isotropy algebras of eC8 and its
real forms
gC = eC8
g = e8(8)
Note that not all the symmetric spaces given in these tables are
irreducible. For instance sl(n, C)/s(gl(k, C) ⊕ gl(l, C)) is not. The
results of [4] are more precise and we refer to them for the list of the
irreducible symmetric spaces and the non-irreducibles ones.
We refer to [18] and [4] for facts about symmetric spaces and local
symmetric spaces.
2.5. Riemannian symmetric spaces. We stress that the symmetric
spaces G/H associated to the isotropy subalgebras h of g in Tables
2 to 9 are non-Riemannian. We discuss now a few features about
Riemannian symmetric spaces, which are of the form G/Gρ with Gρ
compact. The symmetric spaces which are Riemannian spaces of nonpositive curvature are called symmetric spaces of non-compact type.
They are all of the form S = G/K where G = Isom(S)0 and K is a
maximal compact subgroup. If it has no euclidean factors, then G is
semisimple, linear and centerless.
Recall that if G is a Lie group, all maximal compact subgroups are
conjugated. If G is semisimple, or more generally reductive, and if K is
a maximal compact subgroup, then the symmetric space G/K is called
the Riemannian symmetric space associated to G. It follows that we
can identify the smooth manifold
S = G/K
with the set of all maximal compact subgroups of G. Remark that
isogenous Lie groups have isometric associated Riemannian symmetric
spaces. In particular, if G is a semisimple linear Lie group, the associated Riemannian symmetric space is the same as that associated to
its identity component G0 or to G/Z(G). We can thus assume that G
is connected and centerless. In this case, as the image of a maximal
compact subgroup by an automorphism of G is again a maximal compact subgroup, we have an action of Aut(G) = Aut(g) by isometries
on S = G/K. Finally we have that the group of isometries of a symmetric space S = G/K of non-compact type without euclidean factors
is Aut(g) where g is the Lie algebra of G.
An important part of our work will be to compute dimensions of
fixed point sets
S α = {x ∈ S | α(x) = x}
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
13
where α ∈ Isom(S) = Aut(g). Assuming that G is connected and
centerless, the fixed point set S α is the Riemannian symmetric space
associated to Gα (recall that we denote by the same letter the automorphism of g and that of G). If A ∈ G we will denote by S A the fixed
point set of the inner automorphism Ad(A). In the case where A is of
finite order, it can be conjugated in the maximal compact subgroup K.
Then the fixed point set of G by Ad(A) is the centralizer of A in G,
that is GAd(A) = CG (A) = {B ∈ G | AB = BA}. A maximal compact
subgroup of CG (A) is CK (A), the centralizer of A in K. So we can
identify S A with CG (A)/CK (A), and we can write:
dim S A = dim CG (A) − dim CK (A).
We refer to [18] for other facts about Riemannian symmetric spaces.
2.6. Lattices and arithmetic groups. A discrete subgroup Γ of a
Lie group G is said to be a lattice if the quotient Γ\G has finite Haar
measure. It is said uniform (or cocompact) if this quotient is compact
and non-uniform otherwise. The Borel density theorem (see [29, Cor.
4.5.6]) says that if G is the group of real points of a connected semisimple algebraic group defined over R, and if a lattice Γ ⊂ G projects
densely into the maximal compact factor of G, then Γ is Zariski-dense
in G. For instance, if G is a connected semisimple algebraic group
defined over Q, then the group GZ is a lattice in GR and thus Zariskidense. The group GZ is the paradigm of an arithmetic group, which
will be defined now.
Let G be a semisimple Lie group with identity component G0 and
Γ ⊂ G a lattice. The lattice Γ is said to be arithmetic if there are a connected algebraic group G defined over Q, compact normal subgroups
K ⊂ G0 , K 0 ⊂ G0R and a Lie group isomorphism
ϕ : G0 /K → G0R /K 0 ,
such that ϕ(Γ) is commensurable to GZ , where Γ and GZ are the images
of Γ ∩ G0 and GZ ∩ G0R in G0 /K and G0R /K (recall that two subgroups
H and H 0 of G are commensurable if their intersection is of finite index
in both subgroups).
We say that the lattice Γ ⊂ G is irreducible if ΓN is dense in G for
every non-compact, closed, normal subgroup N of G0 . The Margulis
arithmeticity theorem (see [27, Ch. IX] and [29, Thm. 5.2.1]) tells us
that in a way, most irreducible lattices are arithmetic.
Theorem 2.1 (Margulis arithmeticity theorem). Let G be the group of
real points of a semisimple algebraic group defined over R and Γ ⊂ G an
irreducible lattice. If G is not isogenous to SO(1, n)×K or SU(1, n)×K
for any compact group K, then Γ is arithmetic.
14
CYRIL LACOSTE
Observe that SO(1, n) × K and SU(1, n) × K have real rank 1, so the
arithmeticity theorem applies to every irreducible lattice in a group of
real rank at least 2.
The definition of arithmeticity can be simplified in some cases. If
G is connected, centerfree and has no compact factors, the compact
subgroup K in the definition must be trivial. Moreover, if Γ is nonuniform and irreducible, then the compact subgroup K 0 is not needed
either (see [29, Cor. 5.3.2]). Under the same assumptions, we can
also assume that the algebraic group G is centerfree, and in this case
the commensurator of GZ in G is GQ and ϕ(Γ) ⊂ GQ . Under the
same hypotheses on G, if Γ is non irreducible, it is almost a product
of irreducible lattices. In fact (see [29, Prop. 4.3.3]), there is a direct
decomposition G = G1 × · · · × Gr such that Γ is commensurable to
Γi × · · · × Γr where Γi = Γ ∩ Gi is an irreducible lattice in Gi .
The rational rank of the arithmetic group Γ, denoted by rkQ Γ, is
by definition the Q-rank of the algebraic group G in the definition of
arithmeticity, and we have
rkQ Γ 6 rkR G.
Note that rkQ Γ = 0 if and only if Γ is cocompact (see [5, Thm. 8.4]).
We refer to [5] and [29] for other facts about lattices and arithmetic
groups.
2.7. Virtual cohomological dimension and proper geometric
dimension. Recall that the virtual cohomological dimension of a virtually torsion-free discrete subgroup Γ is the cohomological dimension
of any torsion-free subgroup Γ0 of finite index of Γ, that is
vcd(Γ) = cd(Γ0 ) = max{n | H n (Γ0 , A) 6= 0 for a certain ZΓ0 -module A}.
If X is a cocompact model for EΓ, we can compute the virtual
cohomological dimension of Γ as
(2.1)
vcd(Γ) = max{n ∈ N | Hnc (X) 6= 0}
where Hnc (X) denotes the compactly supported cohomology of X (see
[9, Cor. VIII.7.6]).
The proper geometric dimension gd(Γ) is the smallest possible dimension of a model for EΓ.
If G is the group of real points of a semisimple algebraic group, K ⊂
G a maximal compact subgroup, S = G/K the associated Riemannian
symmetric space and Γ ⊂ G a uniform lattice of G, S is a model for
EΓ and has dimension vcd(Γ), so we have vcd(Γ) = gd(Γ), that is why
we will be mostly interested in non-uniform lattices.
We will also rule out the case when the adjoint group Gad of g has
real rank 1, in fact we have the following (see [1, Cor. 2.8])
Proposition 2.1. Let G be an algebraic group defined over R and
Γ ⊂ GR a lattice. If rkR G = 1, then vcd(Γ) = gd(Γ).
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
15
For the case of higher real rank, recall that by Margulis arithmeticity
theorem, Γ is arithmetic as long as it is irreducible.
If Γ is non-uniform, Γ \ S is not compact. However Borel and Serre
constructed in [7] a Γ-invariant bordification of S called the Borel-Serre
bordification X which is a cocompact model for EΓ (see [19, Th. 3.2]).
Using their bordification, Borel and Serre proved in [7] the following theorem which links the virtual cohomological dimension and the
rational rank of such an arithmetic lattice.
Theorem 2.2 (Borel-Serre). Let G be a semisimple Lie group, K ⊂ G
a maximal compact subgroup and Γ ⊂ G an arithmetic lattice. Then:
vcd(Γ) = dim(G/K) − rkQ Γ.
In particular:
vcd(Γ) > dim(G/K) − rkR G.
Before moving on, note that we will often in this article consider
groups up to isogeny, and the philosophy behind it is that normal finite
subgroups do not change the dimensions, indeed we have:
Lemma 2.1. Let Γ be an infinite discrete group, and N ⊂ Γ a finite
normal subgroup. Then:
gd(Γ) = gd (Γ/N ) ,
vcd(Γ) = vcd (Γ/N ) .
Proof. For the first equality: if X is a model for EΓ it follows easily
that X N is a model for E(Γ/N ) of dimension lower than those of X,
so:
gd(Γ) > gd (Γ/N ) .
Reciprocally, a model for E(Γ/N ) is also a model for EΓ and we have
the other inequality.
For the second equality, it suffices to recall that vcd(Γ) = cd(Γ0 )
where Γ0 ⊂ Γ is a torsion-free subgroup of finite index, and in this case
Γ0 N/N is a torsion-free subgroup of finite index of Γ/N isomorphic to
Γ0 .
We refer to [9] and [7] for facts about the (virtual) cohomological
dimension and geometric dimension.
2.8. Bredon cohomology. The Bredon cohomological dimension cd(Γ)
is an algebraic counterpart to the proper geometric dimension gd(Γ).
We recall how cd(Γ) is defined and a few of its properties.
Let Γ be a discrete group and F be the family of subgroups of Γ. The
orbit category OF Γ is the category whose objects are left coset spaces
Γ/H with H ∈ F and where the morphisms are all Γ-equivariant maps
between them. An OF Γ-module is a contravariant functor
M : OF Γ → Z-mod
16
CYRIL LACOSTE
to the category of Z-modules. The category of OF Γ-modules, denoted
by Mod-OF Γ, has as objects all the OF Γ-modules and all the natural transformations between them as morphisms. One can show that
Mod-OF Γ is an abelian category and that we can construct projective resolutions on it. The Bredon cohomology of Γ with coefficients
in M ∈ Mod-OF Γ, denoted by H∗F (Γ, M ), is by definition the cohomology associated to the cochain of complexes HomOF Γ (C∗ , M ) where
C∗ → Z is a projective resolution of the functor Z which maps all objects to Z and all morphisms to the identity map. If X is a model for
EΓ, the augmented cellular chain complexes C∗ (X H ) → Z of the fixed
points sets X H for H ∈ F form such a projective (even free) resolution
C∗ (X − ) → Z. Thus we have
HnF (Γ, M ) = Hn (HomOF Γ (C∗ (X − ), M )).
The Bredon cohomological dimension of Γ for proper actions, denoted
by cd(Γ) is defined as
cd(Γ) = sup{n ∈ N | ∃M ∈ Mod-OF Γ : HnF (Γ, M ) 6= 0}.
As we said above, this invariant can be viewed as an algebraic counterpart to gd(Γ). Indeed Lück and Meintrup proved in [26] the following
theorem:
Theorem 2.3 (Lück-Meintrup). If Γ is a discrete group with cd(Γ) >
3, then gd(Γ) = cd(Γ).
We explain now the strategy to prove that vcd(Γ) = cd(Γ), beginning
with some material and definitions. Recall that if G is the group of
real points of a semisimple algebraic group and Γ ⊂ G a lattice, then
the Borel-bordification X is a model for EΓ. Note also that if H is
a finite subgroup of Γ, dim(X H ) = dim(S H ). If we denote F0 the
family of finite subgroups of Γ containing properly the kernel of Γ,
Xsing the subspace of the Borel-bordification X consisting of points
whose stabilizer is stricly larger than the kernel of Γ, and
S = {X H | H ∈ F0 and @H 0 ∈ F0 with X H ( X H },
then we have
Xsing =
[
XH.
X H ∈S
Also every fixed point set X H ∈ S is of the form X α where α ∈ Γ is of
finite order and non-central.
In general, computing cd(Γ) is not an easy task. However, if Γ admits
a cocompact model X for EΓ, then there is a version of the formula
(2.1) for the Bredon cohomological dimension. In fact, from [10, Th.
1.1] we get that
K
cd(Γ) = max{n ∈ N | ∃K ∈ F0 s.t. Hnc (X K , Xsing
) 6= 0}
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
17
K
where X K is the fixed point set of X under K and Xsing
is the subcomK
plex of X consisting of those cells that are fixed by a finite subgroup
of Γ that strictly contains K.
Using the above caracterisations of vcd(Γ) and cd(Γ), one can show
(see [1, Prop. 3.3])
Proposition 2.2. Let G be the group of real points of a semisimple
algebraic group G of real rank at least two, Γ ⊂ G a non-uniform
lattice of G, K ⊂ G a maximal compact subgroup and S = G/K the
associated Riemannian symmetric space. If
(1) dim(X α ) 6 vcd(Γ) for every X α ∈ S, and
(Xsing ) is surjective
(X) → Hvcd(Γ)
(2) the homomorphism Hvcd(Γ)
c
c
then vcd(Γ) = cd(Γ).
Note that in [1] the authors assume that G is connected but this
hypothesis is not needed as the Borel-Serre bordification is still a model
for EΓ if G is not connected (see [19, Th. 3.2]). As dim(X α ) = dim(S α )
we have immediately the following lemma as a corollary of the previous
proposition (see [1, Cor. 3.4])
Lemma 2.2. With the same notations as above, if dim S α < vcd(Γ)
for all α ∈ Γ of finite order and non central, then cd(Γ) = vcd(Γ).
This lemma will be the key argument to prove the Main Theorem.
However, as it is the case in [1], in some cases we will need the following
result (see [1, Cor 3.7])
Lemma 2.3. With the same notations as above, suppose that
(1) dim(S α ) 6 vcd(Γ) for every non-central finite order element
α ∈ Γ,
(2) dim(S α ∩ S β ) 6 vcd(Γ) − 2 for any distinct S α , S β ∈ S, and
(3) for any finite set of non-central finite order elements α1 , . . . , αr
with S αi 6= S αj for i 6= j, dim(S αi ) = vcd(Γ), and such that
CΓ (αi ) is a cocompact lattice in CG (αi ), there exists a rational
flat F in S that intersects S αi in exactly one point and is disjoint
from S αi for i ∈ {2, . . . , n}.
Then vcd(Γ) = cd(Γ).
We refer to [26] and [10] for other facts about Bredon cohomology.
3. Complex simple Lie algebras
In this section we prove the Main Theorem for all complex simple
Lie algebras:
Proposition 3.1. Let g be a complex simple Lie algebra, G = Aut(g)
its group of automorphisms and S the associated Riemannian symmetric space. We assume that rkR G > 2. Then
dim S α < dim S − rkR G
18
CYRIL LACOSTE
for every α ∈ G of finite order and non central. In particular
gd(Γ) = vcd(Γ)
for every lattice Γ ⊂ G.
Recall that the adjoint group Gad is the identity component of G =
Aut(g). It agrees with the group of inner automorphisms, that is Gad =
Inn(g). Note that Gad is centerfree has the same dimension and real
rank as G, and their associated Riemannian symmetric spaces agree.
The quotient Aut(g)/Inn(g) is the group of outer automorphism Out(g)
and can be realized as a subgroup of Aut(g). The group Aut(g) is then
the semi-direct product of Inn(g) and Out(g) (see [16]). Recall also
that if A ∈ Gad , S A is the fixed point set of the inner automorphism
Ad(A).
For further use, note that if ρ ∈ Aut(g) is an involution, then it is
induced by an involution on Gad that will be still denoted ρ. The group
of its fixed points Gρad has Lie algebra gρ and the fixed point set S ρ is
the associated Riemannian symmetric space. In particular, dim S ρ = 0
if Gρad is compact.
The proof of Proposition 3.1 relies on the following lemmas:
Lemma 3.1. Let g be a semisimple Lie algebra such that every element
of Out(g) has order at most 2. Let G be the group of automorphisms
of g and let S be the associated Riemannian symmetric space. If
(3.1)
dim S A < dim S − rkR G and dim S ρ < dim S − rkR G
for all A ∈ Gad non trivial of finite order, and for all involutions ρ ∈ G,
then we also have
dim S α < dim S − rkR G
for every α ∈ G of finite order and non central.
Proof. Every element α ∈ Aut(g) is of the form Ad(A) ◦ ρ where A ∈
Gad and ρ ∈ Out(g) ⊂ Aut(g). We know that ρ is of order at most 2
by hypothesis. Then α2 = Ad(Aρ(A)) is an inner automorphism and
2
we have the inclusion S α ⊂ S α = S Aρ(A) . So, if Aρ(A) is not central
in Gad , then we have
dim S α 6 dim S Aρ(A) < dim S − rkR G.
Note now that if Aρ(A) is central, then it is actually the identity because Gad is centerfree. This means that α2 = Id. In other words, α is
an involution, and we again have
dim S α < dim S − rkR G
by assumption. We have proved the claim.
To check the first part of (3.1) we will use the following:
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
19
Lemma 3.2. Let G be the group of complex points of a semisimple
connected algebraic group and K ⊂ G a maximal compact subgroup.
Suppose that there exists a group H isogenous to a subgroup H 0 of
K such that K/H 0 is an irreducible symmetric space, rkK = rkH,
dim H < dim K − rkR G, and satisfying
dim CH (A) < dim H − rkR G
for all A ∈ H of finite order and non central. Then we have
dim S A < dim S − rkR G
for every A ∈ G of finite order and non central.
Proof. As all maximal compact subgroups are conjugated, we can conjugate such an A ∈ G into K. Since K is connected, A is then contained
in a maximal torus. Since all maximal tori are conjugated, we can conjugate A into any one of them. Since the subgroup H 0 has the same
rank as K, a maximal torus in H 0 is also maximal in K. We can then
assume, up to replacing A by a conjugate element, that A ∈ H 0 .
Taking now into account that G is the group of complex points of
a reductive algebraic group, CG (A) is the complexification of its maximal compact subgroup CK (A) and then its dimension is twice that of
CK (A). As a result we get
dim S A = dim CG (A) − dim CK (A) = dim CK (A)
because S A ' CG (A)/CK (A) as seen in section 2.5.
Similarly we have
dim S = dim(G/K) = dim K.
In particular, the claim follows once we show that
dim CK (A) < dim K − rkR G.
Now, as H and H 0 are isogenous, assume for simplicity that H =
H /F with F a finite normal subgroup of H 0 . We denote by A the class
of A in H 0 /F . As F is finite, we have
0
dim CH (A) = dim CH 0 (A)
and in particular, A is central in H 0 if and only if A is central in H.
Suppose for a moment that A is non central in H 0 , then we write
dim CK (A) 6 dim CH 0 (A)+dim K−dim H = dim CH (A)+dim K−dim H
and by assumption we have
dim CH (A) < dim H − rkR G
and finally
dim CK (A) < dim K − rkR G.
It remains to treat the case that A is central in H 0 but not in K, that
is H 0 ⊂ CK (A) ( K. Since the symmetric space K/H 0 is irreducible,
20
CYRIL LACOSTE
it follows that the identity component of H 0 is a maximal connected
Lie group of K, so dim CK (A) = dim H 0 = dim H, and we have
dim H < dim K − rkR G
by assumption.
In the course of the proof of Proposition 3.1, the subgroups H will
all be classical groups of the forms SO(n) or SU(n) and we will need
the following bounds for the dimension of centralizers in those groups
(see [1] section 5)
1. Let A ∈ SO(n) (n > 3) of finite order and non central, then
(n − 1)(n − 2)
.
2
2. Let A ∈ SU(n) (n > 2) of finite order and non central, then
(3.2)
(3.3)
dim CSO(n) (A) 6
CSU(n) (A) 6 (n − 1)2 .
For more simplicity we will sometimes consider H as a subgroup of
K and denote K/H the symmetric space K/H 0 . For the convenience
of the reader, we summarize in the following table the informations we
need to prove Proposition 3.1 for exceptional Lie algebras.
Gad K
H
dim K dim H rkH = rkK rkR Gad
GC2 G2
SO(4)
14
6
2
2
C
F4 F4
SO(9)
52
36
4
4
E6C E6 U(1) × SO(10)
78
46
6
6
C
E7 E7
SU(8)
133
63
7
7
C
E8 E8
SO(16)
248
120
8
8
Table 10. Exceptional complex simple centerless Lie
groups Gad , maximal compact subgroups K, classical
subgroups H, dimensions and ranks.
We are now ready to launch the proof of Proposition 3.1.
Proof of Proposition 3.1. The second claim follows from Lemma 2.2
because we have
vcd(Γ) > dim S − rkR G
for every lattice Γ ⊂ G by Theorem 2.2. So it suffices to prove the first
claim.
Recall that every complex simple Lie algebra is isomorphic to either
one of the classical algebras sl(n, C), so(n, C) and sp(2n, C) (with conditions on n to ensure simplicity), or to one of the 5 exceptional ones:
gC2 , fC4 , eC6 , eC7 and eC8 .
To prove Proposition 3.1 we will consider all these cases individually.
Classical complex simple Lie algebras:
Let g be a classical complex simple Lie algebra and Γ ⊂ G = Aut(g)
a lattice. From a brief inspection of the table in section 2.3 we obtain
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
21
that, unless g = so(8, C), every outer automorphism of g has order 2.
We will assume that g 6= so(8, C) for a while, treating this case later.
To begin with note that we get from parts 6.1, 6.2 and 6.3 of [1] that
dim S A < dim S − rkR G
for all A ∈ Gad non trivial and of finite order. In other words, the first
part of condition (3.1) in Lemma 3.1 holds. To check the second part
we make use of the classification of local symmetric spaces in [4]. For
instance if g = sl(n, C) with n > 3 because of our assumption on the
rank, and if ρ ∈ G is an involution, then the Lie algebra gρ is isomorphic
to either a Lie algebra whose adjoint group is compact or to one of the
follows: so(n, C), s(gl(k, C) ⊕ gl(n − k, C)), sp(n, C), sl(n, R), su(p, n −
p) and sl( n2 , H), where sp(n, C) and sl( n2 , H) only appear if n is even.
The associated Riemannian symmetric space S ρ is obtained by taking
the quotient of the adjoint group by a maximal compact subgroup, for
example in the case of so(n, C) it is PSO(n, C)/PSOn . The Lie algebra
gρ for which dim S ρ is maximal is s(gl(1, C) ⊕ gl(n − 1, C)) for n 6= 4
(where dim S ρ = (n−1)2 ), and sp(4, C) for n = 4 (where dim S ρ = 10).
In all these cases we have
dim S ρ < (n2 − 1) − (n − 1) = dim S − rkR G.
We get then by Lemma 3.1 that the first claim of Proposition 3.1 holds.
The cases of sp(2n, C) and so(n, C) for n 6= 8 are similar, we leave the
details to the reader.
Now we treat the case of the Lie algebra so(8, C). Its group of
complex outer automorphisms is isomorphic to the symmetric group
S3 and contains an order 3 element τ called triality. (See section 1.14
in [34] for an interpretation of triality in terms of octonions.) The
group Out(so(8, C)) of real outer automorphisms is then isomorphic to
S3 ×Z/2Z where the second factor corresponds to complex conjugation.
Consequently the only order 3 outer automorphisms are τ and τ −1 and
those of order 6 are their compositions with complex conjugation. If
ρ ∈ Aut(so(8, C)) is of order 6 and α = Ad(A) ◦ ρ, then α3 is the
composition of an inner automorphism and ρ3 . As ρ3 is of order 2 and
3
we have the inclusions S α ⊂ S α , we can consider α3 instead of α and
we just have to treat the cases when ρ is of order 2 or 3.
If ρ is of order 2 we apply the same method than for other classical
simple Lie algebras, using the classification of local symmetric spaces.
It remains to treat the case when ρ = τ the triality automorphism (or
its inverse). In this case α = Ad(A) ◦ τ is a complex automorphism.
Proceeding like in the proof of Lemma 3.1, α3 is an inner automorphism and the result follows if it is non trivial. If α3 = 1 then α
belongs to the set Aut3C (so(8, C)) of complex automorphisms of order
3. A result of Gray and Wolf (see [15, Thm. 5.5]) says that if ∼i is
the equivalence relation of conjugation by an inner automorphism in
22
CYRIL LACOSTE
Aut3C (so(8, C)), then Aut3C (so(8, C))/ ∼i contains, besides the classes
of inner automorphisms, four other classes: those of τ and τ −1 and two
others represented by order 3 automorphisms τ 0 and τ 0−1 . The Lie algebra of the fixed point set of triality is the exceptional Lie algebra gC2 ,
and those of the fixed point set of τ 0 is isomorphic to the Lie algebra
sl(3, C). In both cases we have
dim S α < dim S − rkR G
and Proposition 3.1 holds for g = so(8, C).
Lie algebra gC2 :
Here we consider the simple exceptional Lie algebra g = gC2 . Its outer
automorphism group is of order 2 and its adjoint group is Gad = GC2 ,
a connected algebraic group of real rank 2 and complex dimension 14.
The compact group G2 is a maximal compact subgroup of GC2 .
The group G2 contains a subgroup H isomorphic to SO(4), fixed by
an involution of G2 which extends to a conjugation of GC2 , giving the
split real form G2(2) (see section 1.10 of [34] for an explicit description). Then G2 /SO(4) is an irreducible symmetric space, rk(G2 ) =
rk(SO(4)) = 2 and
dim H + rkR Gad = 6 + 2 = 8 < 14 = dim K.
Moreover if A ∈ H is of finite order and non central in H ' SO(4) we
have by inequality (3.2)
dim CH (A) + rkR Gad 6 3 + 2 = 5 < 6 = dim H.
So by Lemma 3.2, the first part of (3.1) in Lemma 3.1 holds.
To check the second part we have to list the local symmetric spaces
associated to an involution ρ ∈ Aut(gC2 ). By the classification of Berger
in [4], the only non compact cases are when gρ is isomorphic to sl(2, C)⊕
sl(2, C) or g2(2) . The associated Riemannian symmetric spaces are
S ρ = (PSL(2, C) × PSL(2, C))/(PSU2 × PSU2 ) and G2(2) /SO(4) and
we have in both cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 3.1 holds for G = Aut(gC2 ).
Lie algebra fC4 :
We proceed like previously for the simple Lie algebra g = fC4 , with
|Out(fC4 )| = 2, Gad = F4C of maximal compact subgroup K = F4 ,
rkR Gad = 4 and dim K = 52. We know that there exists a subgroup
H ⊂ K isogenous to SO(9), with rkH = rkK = 4, and such that K/H
is an irreducible symmetric space. In addition to that
dim H + rkR Gad = 36 + 4 = 40 < 52 = dim K
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
23
and if A ∈ H is of finite order and non central in H, we have
dim CH (A) + rkR Gad 6 28 + 4 = 32 < 36 = dim H
by inequality (3.2).
So by Lemma 3.2, the first part of (3.1) in Lemma 3.1 holds.
Then by the classification of local symmetric spaces, the ones we
have to study is those when gρ is isomorphic to sp(6, C) ⊕ sp(2, C),
so(9, C), f4(4) or f4(−20) , in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 3.1 holds for G = Aut(fC4 ).
Lie algebra eC6 :
For the algebra g = eC6 , the outer automorphism group is a product
of two groups of order 2, Gad = E6C of maximal compact subgroup
K = E6 , rkR Gad = 6 and dim K = 78. We know there exists H ⊂
K isogenous to U(1) × SO(10), with rkH = rkK = 6, K/H is an
irreducible symmetric space and we have the following
dim H + rkR Gad = 46 + 6 = 52 < 78 = dim K
and if A ∈ H is of finite order and non central in H, by inequality (3.2)
we have
dim CH (A) + rkR Gad 6 1 + 36 + 6 = 43 < 46 = dim H.
So by Lemma 3.2, the first part of (3.1) in Lemma 3.1 holds.
Then by the classification of local symmetric spaces, the ones we have
to study is those when gρ is isomorphic to sp(8, C), sl(6, C) ⊕ sl(2, C),
so(10, C) ⊕ so(2, C), fC4 , e6(6) , e6(2) , e6(−14) or e6(−26) , in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 3.1 holds for G = Aut(eC6 ).
Lie algebra eC7 :
Consider now the simple Lie algebra g = eC7 , of order 2 outer automorphism group, and of adjoint group Gad = E7C , whose compact
maximal subgroup is K = E7 , rkR Gad = 7 and dim K = 133. We know
there exists H ⊂ K isogenous to SU(8) with rkH = rkK = 7 and K/H
is an irreducible symmetric space. We have the inequality
dim H + rkR Gad = 63 + 7 = 70 < 133 = dim K
and if A ∈ H is of finite order and non central in H, by inequality (3.3)
we have
dim CH (A) + rkR Gad 6 49 + 7 < 63 = dim H.
So by Lemma 3.2, the first part of (3.1) in Lemma 3.1 holds.
24
CYRIL LACOSTE
Then by the classification of local symmetric spaces, the ones we have
to study is those when gρ is isomorphic to sl(8, C), so(12, C) ⊕ sp(2, C),
eC6 ⊕ so(2, C), e7(7) , e7(5) or e7(−25) , in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 3.1 holds for G = Aut(eC7 ).
Lie algebra eC8 :
The last exceptional Lie algebra is g = eC8 , again its outer automorphism group is of order 2, its adjoint group is Gad = E8C , of maximal
compact subgroup K = E8 , rkR Gad = 8 and dim K = 248. We know
there exists H ⊂ K isogenous to SO(16), with rkH = rkK = 8 and
K/H is an irreducible symmetric space. We have also the inequality
dim H + rkR Gad = 120 + 8 = 128 < 248 = dim K
and if A ∈ H is of finite order and non central in H, by inequality (3.2)
we have
dim CH (A) + rkR Gad 6 105 + 8 < 120 = dim H.
So by Lemma 3.2, the first part of (3.1) in Lemma 3.1 holds.
Then by the classification of local symmetric spaces, the ones we have
to study is those when gρ is isomorphic to so(16, C), eC7 ⊕ sp(2, C), e8(8)
or e8(−24) , in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 3.1 holds for G = Aut(eC8 ) and it
concluded its proof.
4. Real simple Lie algebras
We will in this section extend the previous proposition to the real
simple Lie algebras. They are the real forms of the complex ones studied in the previous section. The ideas of the proof are similar to those of
the complex case, although we face some additional difficulties. Maybe
the reader can skip this section in a first reading.
Proposition 4.1. Let g be a real simple Lie algebra, G = Aut(g) its
group of automorphisms and S the associated Riemannian symmetric
space. Then
gd(Γ) = vcd(Γ)
for every lattice Γ ⊂ G. Moreover
dim S α 6 dim S − rkR G
for every α ∈ G of finite order and non central.
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
25
We will again use Lemma 3.1, but in the case of exceptional real
simple Lie algebras, we cannot use Lemma 3.2 to establish inequalities
of the form
dim S A < dim S − rkR G
for A in the adjoint group Gad of g. The difficulty is that the dimension
of Gad is not anymore twice that of a maximal compact subgroup. To
some extent, we will bypass this problem using the following lemma:
Lemma 4.1. Let G be a connected Lie group which is the group of
real points of a semisimple algebraic group defined over R, and K ⊂ G
a maximal compact subgroup. Suppose there exists a subgroup G ⊂ G
such that G/G is an irreducible symmetric space and whose compact
maximal subgroup K ⊂ K has the same rank as K. Let S = G/K and
S = G/K be the associated Riemannian symmetric spaces. If we have
dim S < dim S − rkR G,
and
A
dim S < dim S − rkR G
for every A ∈ K of finite order non central, then we also have
dim S A < dim S − rkR G
for every A ∈ G of finite order and non central.
Proof. As in the proof of Lemma 3.2 we can conjugate such an A into
a maximal torus in K.
If A is central in G: as G/G is irreducible, we have that the identity
component of G is a maximal connected Lie subgroup of G. It follows
thus from G ⊂ CG (A) ( G that the Riemannian symmetric spaces of
CG (A) and G are the same, that is S A = S. Then the result follows
from the assumption
dim S < dim S − rkR G.
Suppose now that A is not central in G, then we have
dim S − dim S A > dim S − dim S
A
A
as S = S ∩ S A . Then the result follows because
A
dim S − dim S > rkR G
by assumption.
In all cases if interest, the group G will be a classical group. We will
A
use the following inequalities to majorate dim S (see [1] sections 6.5,
6.6 and 6.8):
1. Let A ∈ SU(p, q) (p 6 q, p + q > 3) of finite order non central,
and S = SU(p, q)/S(U(p) × U(q)) the associated symmetric space, then
(4.1)
dim S A 6 2p(q − 1).
26
CYRIL LACOSTE
2. Let A ∈ Sp(p, q) (p 6 q, p + q > 3) of finite order non central, and
S = Sp(p, q)/(Sp(p) × Sp(q)) the associated symmetric space, then
(4.2)
dim S A 6 4p(q − 1).
3. Let A ∈ SO∗ (2n) (n > 2) of finite order non central, et S =
SO∗ (2n)/U(n) the associated symmetric space, then
(4.3)
dim S A 6 n2 − n − 2(n − 1).
The tables below list exceptional real simple Lie groups, the subgroups G we will use and the informations we need to know for the
proof of Proposition 4.1. Note that for more simplicity, the compact
maximal subgroups K are given up to isogeny.
Gad
K
G
K
E6(6)
Sp(4)
Sp(2, 2)
Sp(2) × Sp(2)
E6(2)
SU(6) × SU(2)
SO∗ (10) × SO(2)
U(5) × SO(2)
∗
E6(−14) SO(10) × SO(2) SO (10) × SO(2)
U(5) × SO(2)
E6(−26)
F4
Sp(1, 3)
Sp(1) × Sp(3)
E7(7)
SU(8)
E6(2) × SO(2)
SU(6) × SU(2) × SO(2)
E7(−5) SO(12) × SU(2)
SU(4, 4)
S(U(4) × U(4))
E7(−25)
E6 × SO(2)
SU(2, 6)
S(U(2) × U(6))
∗
E8(8)
SO(16)
SO (16)
U(8)
E8(−24)
E7 × SU(2)
SO∗ (16)
U(8)
G2(2)
SO(4)
SL(2, R) × SL(2, R)
SO(2) × SO(2)
F4(4)
Sp(3) × Sp(1)
SO(4, 5)
S(O(4) × O(5))
Table 11. Real exceptional simple centerless Lie groups
Gad , certain classical subgroups G ⊂ Gad and the respective maximal compact subgroups
Gad
dim S dim S rkK = rkK rkR Gad
E6(6)
42
16
4
6
E6(2)
40
20
6
4
E6(−14)
32
20
6
2
E6(−26)
26
12
4
2
E7(7)
70
40
7
7
E7(−5)
64
32
7
4
E7(−25)
54
24
7
3
E8(8)
128
56
8
8
E8(−24) 112
56
8
4
G2(2)
8
4
2
2
F4(4)
28
20
4
4
Table 12. With the same notations as in Table 11, dimensions of the Riemannian symmetric spaces associated
to Gad and G, together with the ranks of K, K and Gad
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
27
We are now ready to prove Proposition 4.1.
Proof of Proposition 4.1. Recall that the first claim holds when the adjoint group has real rank 1 by Proposition 2.1, that is when g is isomorphic to sl(2, R) ∼
= sp(2, R), sl(2, H), so∗ (4), so∗ (6), so(1, n), su(1, n),
sp(1, n) and f4(−20) . The second claim is also true because if α ∈ Aut(g)
is of finite order and non central, then S α is a strict submanifold of S
so we have
dim S α 6 dim S − 1.
We suppose from now on that rkR G > 2. By inspection of the
table of outer automorphisms in section 2.3, we see that every outer
automorphism of g has order 2, except if g = so(p, p) with p > 4 even.
As in the proof of Proposition 3.1 We will again do a case-by-base
analysis.
Classical real simple Lie algebras other that sl(n, R) and
so(p, q):
We start dealing with the classical Lie algebras su(p, q), sl(n, H),
sp(2n, R) and so∗ (2n). Note that we rule out su(2, 2) ∼
= so(2, 4) and
∼
sp(4, R) = so(2, 3).
We use again Lemma 3.1. We want then to establish
dim S A < dim S − rkR G and dim S ρ < dim S − rkR G
for every A in the adjoint group Gad of finite order and non central
and for every involution ρ ∈ G = Aut(g). The first condition holds by
the computations in sections 6.4 to 6.7 of [1]. Using the classification
of local symmetric spaces, we can check the second condition as we
did in the complex case. For instance, if g = sp(2n, R) with n >
3, then gρ is either compact or isomorphic to one of the following:
sp(2k, R) ⊕ sp(2(n − k), R), u(k, n − k), gl(n, R) or sp(n, C), the last
case only appearing if n is even. The Lie algebra gρ for which dim S ρ
is maximal is sp(2(n − 1), R) ⊕ sp(2, R), for which we have
dim S ρ = n2 − n + 2 < n2 = dim S − rkR G.
Hence by Lemma 3.1 and Lemma 2.2, Proposition 4.1 holds for G =
Aut(sp(2n, R)). The cases of su(p, q), sl(n, H) and so∗ (2n) are similar.
Lie algebras sl(n, R) and so(p, q) The remaining classical cases are
sl(n, R) and so(p, q). If p > 6 is even, then Out(so(p, p)) is isomorphic
to D4 so every outer automorphism ρ has order 2 or 4. The only case
where we have order 3 outer automorphisms is so(4, 4), as Out(so(4, 4))
is isomorphic to S4 .
As already noted in [1], where the argument for lattices in SL(n, R)
and SO(p, q) was more involved than in the other cases, we face the
28
CYRIL LACOSTE
problem that there exists α ∈ Aut(g) such that
dim S α = dim S − rkR G.
Our next goal is to characterize the automorphisms α for which this
happens.
Lemma 4.2. If g = sl(n, R) with n 6= 4 or so(p, q) with p + q = n and
(p, q) 6= (3, 3), and α ∈ Aut(g), then
dim S α 6 dim S − rkR G
with equality if and only if n is odd and S α = S A with A conjugated to
!
Qn−1,1
−In−1 0
=
0
1
in PSL(n, R) or PSO(p, q), or n is even and α is conjugated to the
outer automorphism corresponding to the conjugation by Qn−1,1 .
By abusing notations we will still denote S A the fixed point set by
the automorphism corresponding to the conjugation by A with A conjugated to Qn−1,1 even if it is not an inner automorphism.
Proof. We begin with the case g 6= so(4, 4) and we use the same strategy that for the proof of Lemma 3.1. An automorphism α of g is the
composition of an inner automorphism and an outer automorphism ρ
of order 2 or 4. If ρ has order 4 then α2 is the composition of an inner
automorphism and ρ2 which is of order 2, and we have the inclusion
2
S α ⊂ S α so we can replace α by α2 and it will suffice to consider the
outer automorphisms of order 2. Then if ρ has order 2, α2 is an inner
automorphism, that is α2 = Ad(A) with A ∈ Gad . If A is not trivial,
by the computations in sections 7 and 8 in [1] we have
2
dim S α 6 dim S A 6 dim S − rkR G
with equality in the last inequality if and only if n is odd and A conjugated by Qn−1,1 . The first inequality is an equality if and only if
2
S α = S A . We have proved the claim if A is not trivial. If A is trivial,
then α is an involution, so we use the classification of local symmetric
spaces. For instance if g = sl(n, R) with n 6= 4, the non-compact associated
isotropy
algebra h = gα are so(k, n−k), s(gl(k, R)⊕gl(n−k, R)),
gl n2 , C or sp(n, R), the last two cases only appearing if n is even. In
all theses cases we have
dim S α 6 dim S − rkR G
with equality if and only if h = s(gl(1, R) ⊕ gl(n − 1, R)), which corresponds to an automorphism α conjugated to the inner automorphism
Ad(Qn−1,1 ) if n is odd or to the outer automorphism of conjugation by
Qn−1,1 if n if even.
It remains to consider the case g = so(4, 4). In this case the group
of outer automorphism is isomorphic to the symmetric group S4 so we
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
29
can have elements of order 2, 3 or 4. If ρ is an outer automorphism of
order 2 or 4, and α = Ad(A) ◦ τ , we apply the same method using the
classification of local symmetric spaces and we see that
dim S α 6 dim S − rkR G
with equality if and only if α is an outer automorphism corresponding
to the conjugation by a matrix conjugated to Q7,1 . If ρ is of order 3 and
α = Ad(A) ◦ τ then α3 is inner and we have just to treat the case where
it is trivial, that is α is of order 3. Then its complexification αC is an
order 3 complex automorphism of gC = so(8, C), a case already treated
C
in the previous section. We know that the fixed point set (gC )α is
C
isomorphic to gC2 , sl(3, C) or is compact. As gα is a real form of (gC )α ,
it is isomorphic to g2(2) , sl(3, R), su(2, 1), s(u(dp , dq ) ⊕ o(sp , sq )) with
2dp + sp = 4 and 2dq + sq = 4 or is compact. In all these cases we have
dim S α < dim S − rkR G
so we have proved the claim.
Let us assume for a while that g 6= sl(3, R) and g 6= sl(4, R) ∼
=
so(3, 3). We will conclude that vcd(Γ) = gd(Γ) using Lemma 2.3. The
first condition in the said lemma holds by Lemma 4.2. To check the
second condition, take S α and S β maximal and distinct. We want to
establish
dim(S α ∩ S β ) 6 vcd(Γ) − 2.
First remark that by maximality S α and S β are not contained in each
other. If one of them is not of the form S A with A conjugated to
Qn−1,1 , let us say S α , then dim S α 6 vcd(Γ) − 1 and S α ∩ S β is a
strict submanifold of S α so the result holds. If we have S α = S A and
S β = S B with A and B conjugated to Qn−1,1 , then we refer to the
computations in the proofs of Lemma 7.2 and Lemma 8.4 in [1]. The
proof of the third point is the same as for Lemma 7.5 and Lemma 8.8
in [1]. Note that in [1] the authors consider only inner automorphisms,
so the case n odd, but their argument also works without modifications
of any kind for n even.
It must be enlighted why the argument we just gave fails for sl(3, R)
and sl(4, R) ∼
= so(3, 3). For sl(3, R), the second condition of Lemma
2.3 does not hold anymore. In the case that sl(4, R) ∼
= so(3, 3), the
conclusion of Lemma 4.2 does not apply, because we have that
dim S α = dim S − rkR G
when α is either the conjugation by Q5,1 in PSO(3, 3) or the conjugation by Q3,1 in PSL(4, R). These two are not conjugated, as the
conjugation by Q5,1 in PSO(3, 3) corresponds in PSL(4, R) to an outer
automorphism whose fixed point set is isomorphic to PSp(4, R).
However the proof of Lemma 7.6 in [1] concerning lattices in SL(3, R)
can be adapted to Aut(sl(3, R)) and Aut(sl(4, R)). In fact it can be
30
CYRIL LACOSTE
adapted to Aut(sl(n, R)) for all n > 3, because a lattice in PSL(n, R) of
Q-rank n−1 can be conjugated to a lattice commensurable to PSL(n, Z)
(see the classification of arithmetic groups of classical groups in Section
18.5 in [29]).
As a result Proposition 4.1 holds for all real classical simple Lie
algebras.
Lie algebra e6(6)
Here we consider the simple exceptional Lie algebra g = e6(6) . Its
outer automorphism group is of order 2 and its adjoint group is Gad =
E6(6) , which is the group of real points of an algebraic group of real rank
6. This group contains a maximal compact subgroup K isogenous to
Sp(4). We will use Lemma 4.1 to check the first condition of Lemma
3.1.
The group Gad = E6(6) contains a subgroup G isogenous to Sp(2, 2)
whose maximal compact subgroup is K = Sp(2) × Sp(2). We see in [4]
that E6(6) /Sp(2, 2) is an irreducible symmetric space, furthermore we
have rk(K) = rk(K) = 4 and
dim S = 16 < 42 − 6 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
inequality (4.2)
A
dim S 6 8 < 16 − 6 = dim S − rkR Gad .
Lemma 4.1 applies and shows that the first condition of Lemma 3.1
holds.
To check the second condition we list the local symmetric spaces
associated to an involution ρ ∈ Aut(e6(6) ). By the classification of
Berger in [4], the only non compact cases are when gρ is isomorphic to
sp(2, 2), sp(8, R), sl(6, R) ⊕ sl(2, R), sl(3, H) ⊕ su(2), so(5, 5) ⊕ so(1, 1)
or f4(4) . We have in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 4.1 holds for G = Aut(e6(6) ).
Lie algebra e6(2)
Here we consider the simple exceptional Lie algebra g = e6(2) . Its
outer automorphism group is of order 2 and its adjoint group is Gad =
E6(2) , which is the group of real points of an algebraic group of real rank
4. This group contains a maximal compact subgroup K isogenous to
SU(6) × SU(2). We will use Lemma 4.1 to check the first condition of
Lemma 3.1.
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
31
The group Gad = E6(2) contains a subgroup G isogenous to SO∗ (10)×
SO(2) whose maximal compact subgroup is K = U(5) × SO(2). We see
in [4] that E6(2) /(SO∗ (10) × SU(2)) is an irreducible symmetric space,
furthermore we have rk(K) = rk(K) = 6 and
dim S = 20 < 40 − 4 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
inequality (4.3)
A
dim S 6 12 < 20 − 4 = dim S − rkR Gad .
Lemma 4.1 applies and shows that the first condition of Lemma 3.1
holds.
To check the second condition we list the local symmetric spaces
associated to an involution ρ ∈ Aut(e6(2) ). By the classification of
Berger in [4], the only non compact cases are when gρ is isomorphic
to sp(1, 3), sp(8, R), su(2, 4) ⊕ su(2), su(3, 3) ⊕ sl(2, R), so(4, 6) ⊕ so(2),
so∗ (10) ⊕ so(2) or f4(4) . We have in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 4.1 holds for G = Aut(e6(2) ).
Lie algebra e6(−14)
Here we consider the simple exceptional Lie algebra g = e6(−14) .
Its outer automorphism group is of order 2 and its adjoint group is
Gad = E6(−14) , which is the group of real points of an algebraic group
of real rank 2. This group contains a maximal compact subgroup K
isogenous to SO(10) × SO(2). We will use Lemma 4.1 to check the first
condition of Lemma 3.1.
The group Gad = E6(−14) contains a subgroup G isogenous to SO∗ (10)×
SO(2) whose maximal compact subgroup is K = U(5) × SO(2). We
see in [4] that E6(−14) /(SO∗ (10) × SU(2)) is an irreducible symmetric
space, furthermore we have rk(K) = rk(K) = 6 and
dim S = 20 < 32 − 2 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
inequality (4.3)
A
dim S 6 12 < 20 − 2 = dim S − rkR Gad .
Lemma 4.1 applies and shows that the first condition of Lemma 3.1
holds.
To check the second condition we list the local symmetric spaces
associated to an involution ρ ∈ Aut(e6(−14) ). By the classification of
32
CYRIL LACOSTE
Berger in [4], the only non compact cases are when gρ is isomorphic to
sp(2, 2), su(2, 4) ⊕ su(2), su(1, 5) ⊕ sl(2, R), so(2, 8) ⊕ so(2), so∗ (10) ⊕
so(2) or f4(−20) . We have in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 4.1 holds for G = Aut(e6(−14) ).
Lie algebra e6(−26)
Here we consider the simple exceptional Lie algebra g = e6(−26) .
Its outer automorphism group is of order 2 and its adjoint group is
Gad = E6(−26) , which is the group of real points of an algebraic group
of real rank 2. This group contains a maximal compact subgroup K
isogenous to F4 . We will use Lemma 4.1 to check the first condition of
Lemma 3.1.
The group Gad = E6(−26) contains a subgroup G isogenous to Sp(1, 3)
whose maximal compact subgroup is K = Sp(1) × Sp(3). We see in
[4] that E6(−26) /Sp(1, 3) is an irreducible symmetric space, furthermore
we have rk(K) = rk(K) = 4 and
dim S = 12 < 26 − 2 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
inequality (4.2)
A
dim S 6 8 < 12 − 2 = dim S − rkR Gad .
Lemma 4.1 applies and shows that the first condition of Lemma 3.1
holds.
To check the second condition we list the local symmetric spaces
associated to an involution ρ ∈ Aut(e6(−26) ). By the classification of
Berger in [4], the only non compact cases are when gρ is isomorphic to
sp(1, 3), sl(3, H) ⊕ sp(1), so(1, 9) ⊕ so(1, 1), or f4(−20) . We have in all
cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 4.1 holds for G = Aut(e6(−26) ).
Lie algebra e7(7)
Here we consider the simple exceptional Lie algebra g = e7(7) . Its
outer automorphism group is of order 2 and its adjoint group is Gad =
E7(7) , which is the group of real points of an algebraic group of real rank
7. This group contains a maximal compact subgroup K isogenous to
SU(8). We will use Lemma 4.1 to check the first condition of Lemma
3.1.
The group Gad = E7(7) contains a subgroup G isogenous to E6(2) ×
SO(2) whose maximal compact subgroup is K = SU(6)×SU(2)×SO(2).
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
33
We see in [4] that E7(7) /(E6(2) × SO(2)) is an irreducible symmetric
space, furthermore we have rk(K) = rk(K) = 7 and
dim S = 40 < 70 − 7 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
the results about e6(2)
A
dim S − dim S > 20 − 12 = 8 > rkR Gad .
Lemma 4.1 applies and shows that the first condition of Lemma 3.1
holds.
To check the second condition we list the local symmetric spaces
associated to an involution ρ ∈ Aut(e7(7) ). By the classification of
Berger in [4], the only non compact cases are when gρ is isomorphic
to su(4, 4), sl(8, R), sl(4, H), so(6, 6) ⊕ sl(2, R), so∗ (12) ⊕ sp(1), e6(6) ⊕
so(1, 1) or e6(2) ⊕ so(2). We have in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 4.1 holds for G = Aut(e7(7) ).
Lie algebra e7(−5)
Here we consider the simple exceptional Lie algebra g = e7(−5) . Its
outer automorphism group is trivial so G = Aut(g) is equal to the
adjoint group Gad = E7(7) , which is the group of real points of an
algebraic group of real rank 4. Thus we only have to check the first
condition of Lemma 3.1 and we will again use Lemma 4.1.
The group Gad = E7(−5) contains a maximal compact subgroup K
isogenous to SO(12) × SU(2). It also contains a subgroup G isogenous
to SU(4, 4) whose maximal compact subgroup is K = S(U(4) × U(4)).
We see in [4] that E7(−5) /SU(4, 4) is an irreducible symmetric space,
furthermore we have rk(K) = rk(K) = 7 and
dim S = 32 < 64 − 4 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
inequality (4.1)
A
dim S 6 24 < 32 − 4 = dim S − rkR Gad .
So by Lemma 4.1 and Lemma 3.1, Proposition 4.1 holds for G =
Aut(e7(−5) ).
Lie algebra e7(−25)
Here we consider the simple exceptional Lie algebra g = e7(−25) .
Its outer automorphism group is of order 2 and its adjoint group is
34
CYRIL LACOSTE
Gad = E7(−25) , which is the group of real points of an algebraic group
of real rank 3. This group contains a maximal compact subgroup K
isogenous to E6 × SO(2). We will use Lemma 4.1 to check the first
condition of Lemma 3.1.
The group Gad = E7(−25) contains a subgroup G isogenous to SU(2, 6)
whose maximal compact subgroup is K = S(U(2) × U(6)). We see in
[4] that E7(−25) /SU(2, 6) is an irreducible symmetric space, furthermore
we have rk(K) = rk(K) = 7 and
dim S = 24 < 54 − 3 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
inequality (4.1)
A
dim S 6 20 < 24 − 3 = dim S − rkR Gad .
Lemma 4.1 applies and shows that the first condition of Lemma 3.1
holds.
To check the second condition we list the local symmetric spaces
associated to an involution ρ ∈ Aut(e7(−25) ). By the classification of
Berger in [4], the only non compact cases are when gρ is isomorphic to
su(2, 6), sl(4, H), so(2, 10) ⊕ sl(2, R), so∗ (12) ⊕ sp(1), e6(−14) ⊕ so(2) or
e6(−26) ⊕ so(1, 1). We have in all cases
dim S ρ < dim S − rkR G.
So by Lemma 3.1, Proposition 4.1 holds for G = Aut(e7(−25) ).
Lie algebra e8(8)
Here we consider the simple exceptional Lie algebra g = e8(8) . Its
outer automorphism group is trivial so G = Aut(g) is equal to the
adjoint group Gad = E8(8) , which is the group of real points of an
algebraic group of real rank 8. Thus we only have to check the first
condition of Lemma 3.1 and we will again use Lemma 4.1.
The group Gad = E8(8) contains a maximal compact subgroup K
isogenous to SO(16). It also contains a subgroup G isogenous to
SO∗ (16) whose maximal compact subgroup is K = U(8). We see in
[4] that E8(8) /SO(16) is an irreducible symmetric space, furthermore
we have rk(K) = rk(K) = 8 and
dim S = 56 < 128 − 8 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
inequality (4.3)
A
dim S 6 42 < 56 − 8 = dim S − rkR Gad .
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
35
So by Lemma 4.1 and Lemma 3.1, Proposition 4.1 holds for G =
Aut(e8(8) ).
Lie algebra e8(−24)
Here we consider the simple exceptional Lie algebra g = e8(−24) . Its
outer automorphism group is trivial so G = Aut(g) is equal to the
adjoint group Gad = E8(−24) , which is the group of real points of an
algebraic group of real rank 4. Thus we only have to check the first
condition of Lemma 3.1 and we will again use Lemma 4.1.
The group Gad = E8(−24) contains a maximal compact subgroup K
isogenous to E7 × SU(2). It also contains a subgroup G isogenous to
SO∗ (16) whose maximal compact subgroup is K = U(8). We see in [4]
that E8(−24) /SO(16) is an irreducible symmetric space, furthermore we
have rk(K) = rk(K) = 8 and
dim S = 56 < 112 − 4 = dim S − rkR Gad
where S and S are the Riemannian symmetric spaces associated to
respectively Gad and G.
Moreover, if A ∈ K is of finite order and non central, we get from
inequality (4.3)
A
dim S 6 42 < 56 − 4 = dim S − rkR Gad .
So by Lemma 4.1 and Lemma 3.1, Proposition 4.1 holds for G =
Aut(e8(−24) ).
Lie algebra g2(2)
Here we consider the simple exceptional Lie algebra g = g2(2) . Its
outer automorphism group is trivial, so the group G = Aut(g) equals
the adjoint group Gad = G2(2) , which is the group of real points of
an algebraic group of real rank 2. Thus we only have to check the
conditions of Lemma 3.2.
The group G2(2) contains a maximal compact subgroup K isomorphic
to SO(4). It also contains a subgroup G isogenous to SL(2, R)×SL(2, R)
whose maximal compact subgroup is K = SO(2) × SO(2). We see in
[4] that G2(2) /(SL(2, R) × SL(2, R)) is an irreducible symmetric space,
furthermore we have rk(K) = rk(K) = 2 and
dim S = 4 < 8 − 2 = dim S − rkR G
where S and S are the Riemannian symmetric spaces associated to
respectively G = Gad and G.
Moreover, if A ∈ K is of finite order and non central, we have
A
dim S 6 2 = 4 − 2 = dim S − rkR G.
36
CYRIL LACOSTE
The equality case in the last inequality happens when A is conjugated
to a matrix of the form:
!
±I2 0
0 Rθ
with
!
cos(θ) − sin(θ)
Rθ =
.
sin(θ) cos(θ)
Assume that A is of this form and that the first block is I2 , we will
prove directly that
dim S A < dim S − rkR G.
First of all, CK (A) = CSO(4) (A) = SO(2) × SO(2) is of dimension 2.
To study CG (A), we have to know to which element of G = G2(2)
this matrix corresponds to. Recall that G2(2) is the group of automorphisms of the (non associative) algebra O0 of split octonions, which is
of dimension 8 over R, and equiped with a quadratic form of signature
(4,4) (see section 1.13 of in [34]). We can decompose O0 into the direct
sum H ⊕ He04 where H = Vect{1, e1 , e2 , e3 } is the quaternion algebra.
So G is a subgroup of the special orthogonal group SO(3, 4) which
preserves the standard form of signature (4,4) over R8 and fixes 1.
The maximal compact subgroup K corresponds to the stabilizer of
H, meaning the elements α ∈ G such that α(H) = H. Automatically
we have α(He04 ) = He04 as this is the orthogonal of H. K is isomorphic
to SO(4) via the isomorphism who sends α to its restriction to He04 .
Consequently, the matrix A we consider corresponds to the matrix of
the restriction of an element α ∈ K to He04 . This element α is entirely
determined by the matrix A, indeed for example we have:
α(e1 e04 ) = α(e1 )α(e04 ) = α(e1 )e04 = e1 e04
so we deduce α(e1 ) = e1 . Similarly we find:
α(e2 ) = cos(θ)e2 + sin(θ)e3 ,
α(e3 ) = − sin(θ)e2 + cos(θ)e3 .
Knowing α(1) = 1, we have completely described α. The matrix of
SO(3, 4) which corresponds to is:
1 0 0 0
0 R
0 0
θ
Ae =
.
0 0 I2 0
0 0 0 Rθ
e so:
Then we remark that CG (A) ⊂ CSO(3,4) (A)
e = dim S(O(1, 2) × U(1, 1)) = 6.
dim CG (A) 6 dim CSO(3,4) (A)
Finally:
dim S A 6 6 − 2 = 4 < 6 = dim S − rkR G.
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
37
Thus we have that
dim S A < dim S − rkR G
for every A ∈ G of finite order and non central. Then by Lemma 2.2,
Proposition 4.1 holds for g = g2(2) .
Lie algebra f4(4)
Here we consider the simple exceptional Lie algebra g = f4(4) . Its
outer automorphism group is trivial, so the group G = Aut(g) equals
the adjoint group Gad = F4(4) , which is the group of real points of
an algebraic group of real rank 4. Thus we only have to check the
conditions of Lemma 3.2.
The group F4(4) contains a maximal compact subgroup K isogenous
to Sp(3) × Sp(1). It also contains a subgroup G isogenous to SO(4, 5)
whose maximal compact subgroup is K = S(O(4) × O(5)). We see in
[4] that F4(4) /SO(4, 5) is an irreducible symmetric space, furthermore
we have rk(K) = rk(K) = 4 and
dim S = 20 < 28 − 4 = dim S − rkR G
where S and S are the Riemannian symmetric spaces associated to
respectively G = Gad and G.
Moreover, if A ∈ K is of finite order and non central, we have by the
computations in section 8 of [1]
A
dim S 6 16 = 20 − 4 = dim S − rkR G.
The equality case in the last inequality happens when A is conjugated
to the matrix:
!
−I8 0
∈ SO(4) × SO(5).
0 1
Assuming that A is of this form, the conjugation by A is an involutive
automorphism of G = Gad = F4(4) so the quotient G/GA is a symmetric
space and we know by the classification in [4] that GA is isogenous to
either Sp(6, R) × Sp(2, R), Sp(2, 1) × Sp(1) or SO(4, 5). In all these
cases the inequality
dim S A < dim S − rkR G
holds (in fact GA is isogenous to SO(4, 5)).
Thus we have that
dim S A < dim S − rkR G
for every A ∈ G of finite order and non central. Then by Lemma 2.2,
Proposition 4.1 holds for g = f4(4) , and it concludes the proof.
38
CYRIL LACOSTE
5. Semisimple Lie algebras
We prove in this section the Main Theorem:
Main Theorem Let g be a semisimple Lie algebra and G = Aut(g).
Then
gd(Γ) = vcd(Γ)
for every lattice Γ ⊂ G.
Recall that if g is semisimple, it is isomorphic to a sum of simple Lie
algebras g1 ⊕ · · · ⊕ gr . The adjoint group Gad of g is then isomorphic
to a product of simple Lie groups, that is Gad = G1 × G2 × · · · × Gn
where the Gi are the adjoint groups of the gi . We can also assume that
Gad has no compact factors, indeed the symmetric spaces S and S α do
not change if we replace Gad by its quotient by the compact factors.
An automorphism of g is the composition of a permutation σ of the
isomorphic factors of g and a diagonal automorphism ρ of the form
ρ = ρ1 ⊕ · · · ⊕ ρr with ρi ∈ Aut(gi ).
We explain now why does the strategy used in the previous sections
not work. The point is that the inequality
dim S α 6 dim S − rkR G
for α ∈ Aut(g) needed to apply Lemma 2.3 does not hold even
simplest cases.
−1 0
In fact, if Gad = SL(3, R) × SL(3, R) and A = I3 , 0 −1
0
0
A
we have dim S = 5 + 3 = 8 > 6 = dim S − rgR G.
We bypass this this problem by improving the lower bound
in the
0
0
,
1
vcd(Γ) > dim S − rkR G
used above. Remember that by Theorem 2.2
vcd(Γ) = dim S − rkQ Γ
as long as Γ is arithmetic, so we want to majorate rkQ Γ. To do that
we will restrict our study to irreducible lattices. Recall that in this
context, a lattice Γ in G is irreducible if ΓH is dense in G for every
non-compact, closed, normal subgroup H of Gad .
We prove the following result, which is probably known to experts:
Proposition 5.1. Let g = g1 ⊕ · · · ⊕ gn be a semisimple Lie algebra
and Gi the adjoint group of gi for i = 1 . . . n. Then
rkQ Γ 6 min rkR Gi
i=1...n
for every irreducible arithmetic lattice Γ ⊂ G = Aut(g).
Proposition 5.1 will follow from the following theorem proved in [20]
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
39
Theorem 5.1. Let G = G1 × · · · × Gn (n > 2) be a product of noncompact connected simple Lie groups. The following statements are
equivalent:
(1) G contains an irreducible lattice.
(2) G is isomorphic as a Lie group to (GR )0 , where G is an Qsimple algebraic group.
(3) G is isotypic, that is the complexifications of the Lie algebras of
the Gi are isomorphic.
In addition to that, in this case G contains both cocompact and non
cocompact irreducible lattices.
Recall that an algebraic group G defined over Q is said to be Qsimple if it does not contain non-trivial connected normal subgroups
defined over Q.
Then we can prove Proposition 5.1.
Proof of Proposition 5.1. Remark that rkQ Γ = rkQ (Γ ∩Gad ). Moreover
if Γ is an irreducible lattice of G then Γ ∩ Gad is an irreducible lattice
of Gad , so we can assume that Γ ⊂ Gad . Remember that Gad = G1 ×
· · · × Gn and that we assumed that none of the Gi is compact. If n = 1
the result is trivial so assume that n > 2. Then rkR Gad > 2 so Γ is
arithmetic by Theorem 2.1 and there exists a Lie group isomorphism
ϕ : Gad → (GR )0 , where G is Q-simple by Theorem 5.1. Then we have
rkQ Γ = rkQ G. The algebraic group G is isomorphic to a product G1 ×
· · ·×Gn where the Gi are R-groups with (Gi )R isomorphic to G
for i =
Qi
1 . . . n (we can define Gi as the centralizer in G of the product k6=i Gk ).
We note πi the canonical projection of G on Gi . Let T ⊂ G be maximal
Q-split torus. Our goal is to prove that the restriction πi |T is of finite
kernel. On the one hand, Ker(πi |GQ ) ⊂ GQ is a normal subgroup of
GQ and G is defined over Q, so the Zariski closure of Ker(πi |GQ ) is
defined over Q by the Galois rationality criterion. However it is a non
trivial normal subgroup of G which is Q-simple so Ker(πi |GQ ) is finite
(it may be not connected). So Ker(πi |TQ ) is finite too. But Ker(πi |T ) is
a subgroup of the Q-split torus T, so its identity component is a Q-split
torus, and we have just seen its group of rational points is finite, so
Ker(πi |T ) is finite too.
Then the image of T by πi is a torus of Gi of the same dimension
than T (see [6, Cor. 8.4 p.114]). It may not be Q-split because the
projection is not defined over Q, but it is R-split as the projection is
defined over R, so:
rgQ G = dim T 6 rgR Gi = rgR Gi .
We can now conclude the proof of our Main Theorem.
40
CYRIL LACOSTE
Proof of the Main Theorem. If g is simple then the result follows from
Propositions 2.1, 3.1 and 4.1. Then we assume that g = g1 ⊕ · · · ⊕ gn
with n > 2. We can also assume that the adjoint group Gad of g is of
the form Gad = G1 × · · · × Gn where the Gi are simple, non-compact
and Gi is the adjoint group of gi .
We begin with the case where Γ is irreducible. Then we have
rkQ Γ 6 min rkR Gi .
i=1...r
As rkR G > 2, Γ is arithmetic by Theorem 2.1. Remember that Γ ∩ Gad
is also an irreducible arithmetic lattice of Gad . We can then assume
that Gad = (GR )0 , where G = G1 × · · · × Gn is a semisimple Q-group,
which is Q-simple by Theorem 5.1. As Gad has trivial center, we can
assume that G is centerfree. In this case we have Γ ∩ Gad ⊂ GQ .
We want to use Lemma 2.2. Let α ∈ Γ of finite order non central.
Then α is of the form σ ◦ ρ where σ is a permutation of the isomorphic
factors of g and ρ = ρ1 ⊕ . . . ρr with ρi ∈ Aut(gi ). Assume for a while
that σ is trivial. We identify α ∈ Aut(g) (resp. ρi ∈ Aut(gi )) with
the corresponding automorphism of Gad (resp. Gi ). The key point is
to remark that for all i between 1 and n, the automorphism ρi is not
trivial. In fact if A ∈ Γ ∩ Gad ⊂ GQ , we can identify it with the inner
automorphism Ad(A) and we have
α ◦ Ad(A) ◦ α−1 = Ad(α(A)) ∈ Γ ∩ Gad ⊂ GQ ,
so α(A) lies also in GQ . Recall that we have seen in the proof of
Proposition 5.1 that the projections πi |GQ : GQ → Gi are injective. So
if ρi is trivial, we have πi (A) = πi (α(A)) for each A ∈ Γ ∩ Gad ⊂ GQ ,
which leads to α(A) = A. Then α is trivial on Γ ∩ Gad which is Zariskidense in Gad , so α is trivial.
Finally, α = ρ = ρ1 ⊕ · · · ⊕ ρn where each ρi is a non trivial automorphism of Gi . By Proposition 5.1 we also have
rkQ Γ 6 min rkR Gi .
i=1...n
Then if we note S the symmetric space associated to G and Si those
associated to Gi and we have by Propositions 3.1 and 4.1
dim S α =
n
X
i=1
dim Siρi 6
n
X
(dim Si − rkR Gi )
i=1
6 dim S −
n
X
rkR Gi
i=1
< dim S − rkQ Γ.
as we assumed n > 2.
By Theorem 2.2, dim S A < vcd(Γ) and Lemma 2.2 gives us the
result.
If σ is not trivial, the fixed point set will be even smaller. Indeed,
assume for simplicity that g = g1 ⊕ g2 where g1 and g2 are isomorphic,
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
41
and α ∈ Aut(g) is of the form
α(x1 , x2 ) = (ρ1 (x2 ), ρ2 (x1 ))
with ρ1 , ρ2 ∈ Aut(g1 ) = Aut(g2 ). Then the fixed point set S α is S1ρ1 ρ2
where S1 is the symmetric space associated to g1 . In fact the elements
fixed by α are of the form (x1 , ρ2 (x1 )) where x1 is a fixed point of ρ1 ρ2 .
So we have
dim S α 6 dim S1 < dim S − rkR G1 6 dim S − rkQ Γ = vcd(Γ)
as dim S = 2 dim S1 and dim S1 > rkR G1 . The same argument works
for a higher number of summands by decomposing the permutation σ
into disjoint cycles.
Finally if Γ is reducible, there exists a decomposition of G = H1 ×H2
such that the projections π1 (Γ) and π2 (Γ) are lattices in H1 and H2 , and
then Γ ⊂ π1 (Γ) × π2 (Γ) (see the proof of [29, Prop. 4.3.3]). It follows
by induction that Γ is contained in a product of irreducible lattices of
factors of G. We will treat the case where G = H1 × H2 , Γ ⊂ Γ1 × Γ2
and Γ1 and Γ2 are irreducible lattices of H1 and H2 . As Γ is of finite
index in G, it is also of finite index in Γ1 × Γ2 so vcd(Γ) = vcd(Γ1 × Γ2 ).
If we note S, S1 , S2 the symmetric spaces associated to G, H1 , H2 , by
Theorem 2.2 we have:
vcd(Γ) = vcd(Γ1 × Γ2 ) = dim S1 + dim S2 − rkQ Γ1 − rkQ Γ2
= vcd(Γ1 ) + vcd(Γ2 ).
Finally, we have:
gd(Γ) 6 gd(Γ1 × Γ2 ) 6 gd(Γ1 ) + gd(Γ2 )
because if X1 and X2 are models for EΓ1 and EΓ2 , X1 × X2 is a model
for E(Γ1 ×Γ2 ). As Γ1 and Γ2 are irreducible, we have gd(Γ1 ) = vcd(Γ1 )
and gd(Γ2 ) = vcd(Γ2 ) so:
gd(Γ) 6 vcd(Γ).
The other inequality is always true, so it concludes the proof of the
Main Theorem.
We will end with the proof of Corollaries 1.1 and 1.2.
Proof of Corollary 1.1. The case of real rank 1 is treated in Proposition
2.6 in [1]. For higher real rank, we know by the Main Theorem that
there exists a model for EΓ of dimension vcd(Γ). We also know that
the Borel-Serre bordification is a cocompact model for EΓ. Then using
the same construction as in the proof of Corollary 1.1 in [1], one has
a cocompact model for EΓ of dimension vcd(Γ). As all models of EΓ
are Γ-equivariantly homotopy equivalent and the symmetric space S is
also a model for EΓ, we conclude that S is Γ-equivariantly homotopy
equivalent to a cocompact model for EΓ of dimension vcd(Γ).
42
CYRIL LACOSTE
Proof of Corollary 1.2. We have to prove that if Γ1 ⊂ Aut(g) and Γ2
e of finite index, then gd(Γ ) = vcd(Γ ). To
have a common subgroup Γ
2
2
that end, we will prove that Γ2 is essentially also a lattice in Aut(g).
e is a lattice in Aut(g), so we can assume that Γ
e =Γ ⊂
First note that Γ
1
Γ2 . We can also assume that Γ1 is a normal finite index subgroup of Γ2 .
Then Γ2 acts by conjugation on Γ1 . By Mostow rigidity Theorem (see
for example [29, Thm. 15.1.2]), automorphisms of Γ1 can be extended
to automorphisms of Gad , so we have a morphism Γ2 → Aut(Gad ). The
kernel N of this morphism does not intersect Γ1 (since Γ1 is centerfree,
as it is a lattice and thus it is Zariski-dense in Gad ) and Γ1 is of finite
index in Γ2 , so N is finite. Then Γ2 /N is isomorphic to a lattice in
Aut(Gad ). The result follows now from the Main Theorem and Lemma
2.1.
Note that Mostow rigidity theorem does not apply to the group
PSL(2, R), whose associated symmetric space is the hyperbolic plane.
In this case the lattice Γ1 is either a virtually free group or a virtually surface group. In the first case the group Γ2 is also virtually
free, so there exists a model for EΓ2 which is a tree (see [21]), and
gd(Γ2 ) = vcd(Γ2 ) = 1. In the second case, Γ2 acts as a convergence
group on S1 = ∂∞ Γ1 , so it is also a Fuchsian group (see [14]), that is
Γ2 is isomorphic to a cocompact lattice of PSL(2, R). Finally we have
gd(Γ2 ) = vcd(Γ2 ) = 2.
References
[1] J. Aramayona, D. Degrijse, C. Martinez-Perez, and J. Souto. Geometric dimension of lattices in classical simple Lie groups. arXiv:1504.02607, 2015.
[2] J. Aramayona and C. Martinez-Perez. The proper geometric dimension of the
mapping class group. Algebraic and Geometric Toplogy 14, 217-227, 2014.
[3] A. Ash. Small-dimensional classifying spaces for arithmetic subgroups of general linear groups. Duke Math. J. 51, no. 2, 459-468, 1984.
[4] M. Berger. Les espaces symétriques non compacts. Annales scientifiques de
l’ENS, 1957.
[5] A. Borel. Introduction aux groupes arithmétiques. Hermann, 1969.
[6] A. Borel. Linear Algebraic Groups. Springer, 1969.
[7] A. Borel and J-P. Serre. Corners and arithmetic groups. Comment.Math.Helv.48, 436-491, 1973.
[8] N. Brady, I. Leary, and B. Nucinkis. On algebraic and geometric dimensions
for group with torsion. London. Math. Soc.(2), 64, 489–500, 2001.
[9] K.S. Brown. Cohomology of groups. Graduate texts in Mathematics 77,
Springer, 1982.
[10] D. Degrijse and C. Martinez-Perez. Dimension invariants for groups admitting a cocompact model for proper actions. Journal für Reine und Angewandte
Mathematik: Crelle’s Journal, 2014.
[11] D. Degrijse and N. Petrosyan. Geometric dimension of groups for the family
of virtually cyclic subgroups. J. Topol. 7, 697–726, 2014.
[12] D. Degrijse and J. Souto. Dimension invariants of outer automorphism groups.
arXiv:1602.04354, 2016.
DIMENSION RIGIDITY OF LATTICES IN SEMISIMPLE LIE GROUPS
43
[13] D.Z. Djokovic. On real form of complex semisimple Lie algebras. Aequationes
Math. 58, 73-84, 1999.
[14] D. Gabai. Convergence groups are Fuchsian groups. Annals of Mathematics,
136, 447-510, 1992.
[15] A. Gray and J.A. Wolf. Homogeneous spaces defined by Lie groups automorphisms. I. J. Diff. Geom. 2, 77-114, 1968.
[16] H. Gündogan. The Component Group of the Automorphism Group of a Simple Lie Algebra and the Splitting of the Corresponding Short Exact Sequence.
Journal of Lie Theory 20, 709-737, 2010.
[17] H. Gündogan. Classification and structure theory of Lie algebras of smooth
section. Logos Verlag Berlin GmbH, 2011.
[18] S. Helgason. Differential Geometry, Lie Groups, and Symmetric spaces. American Mathematical Society, 2001.
[19] L. Ji. Integral Novikov conjectures and arithmetic groups containing torsion
elements. Communications in analysis and geometry, Volume 15, Number 3,
509–533, 2007.
[20] F.E.A. Johnson. On the existence of irreducible discrete subgroups in isotypic
Lie groups of classical type. Proc.London Math.Soc., 1988.
[21] A. Karass, A. Pietrowski, and D. Solitar. Finite and infinite cyclic extensions
of free group. J. Austral. Math. Soc. 16, 458–466, 1973.
[22] A.W. Knapp. Lie groups beyond an introduction. Progress in Mathematics,
Birkäuser, 2002.
[23] I. Leary and B. Nucinkis. Some groups of type VF. Invent. Math. 151, 135–165,
2001.
[24] I. Leary and N. Petrosyan. On dimensions of groups with cocompact classifying
spaces for proper actions. arXiv:1504.02704, 2015.
[25] W. Lück. Survey on classifying spaces for families of subgroups. Infinite Groups
: Geometric, Combinatorial and Dynamical Aspects, Springer, 269-322, 2005.
[26] W. Lück and D. Meintrup. On the universal space for group actions with compact isotropy. Proc. of the conference "Geometry and Topology" in Aarhus,
293-305, 1998.
[27] G.A. Margulis. Discrete subgroups of semisimple Lie groups. Springer-Verlag,
1989.
[28] C. Martinez-Perez. Euler classes and Bredon cohomology for groups with restricted families of finite torsion. Math. Z. 2013, 761–780, 2013.
[29] D. Witte Morris. Introduction to arithmetic groups. arXiv:math/0106063, 1990.
[30] A.L. Onishchik and E.B. Vinberg. Lie groups and Algebraic groups. SpringerVerlag, 1980.
[31] A. Pettet and J.Souto. The spine which was no spine. L’Enseignement Mathematique 54, 2008.
[32] A. Pettet and J. Souto. Minimality of the well-rounded retract. Geometry and
Topology 12, 2008.
[33] K. Vogtmann. Automorphisms of free groups and outer space. Geometriae Dedicata, Vol.94 (1), 1-31, 2002.
[34] I. Yokota. Exceptional Lie Groups. arXiv:0902.0431, 2009.
IRMAR, Université de Rennes 1
E-mail address: [email protected]
| 4math.GR
|
arXiv:1710.09358v2 [math.AC] 28 Oct 2017
FRACTAL SEQUENCES AND HILBERT FUNCTIONS
GIUSEPPE FAVACCHIO
Abstract. We introduce the fractal expansions, sequences of integers associated to a number. These
can be used to characterize the O-sequences. We generalize them by introducing numerical functions
called fractal functions. We classify the Hilbert functions of bigraded algebras by using fractal functions.
1. Introduction
In Commutative Algebra (and other fields of pure mathematics) it often happens that easy numerical
conditions describe some deeper algebraic results. A significant example are the O-sequences.
Let S := k[x1 , . . . , xn ] be the standard graded polynomial ring and let I ⊆ S be a homogeneous ideal.
The quotient ring S/I is called a standard graded k-algebra. The Hilbert function of S/I is defined as
HS/I : N → N such that
HS/I (t) := dimk (S/I)t = dimk St − dimk It .
A famous theorem, due to Macaulay (cf. [9]) and pointed out by Stanley (cf. [11]), characterizes the
numerical functions that are Hilbert functions of a standard graded k-algebra, i.e. the functions H such
that H = HS/I for some homogeneous ideal I ⊆ S. To introduce this fundamental result we need some
preparatory material.
Let h, i > 0 be integers, we can uniquely write h as
mj
mi−1
mi
+ ···+
+
(1.1)
h=
j
i−1
i
where mi > mi−1 > · · · > mj ≥ j ≥ 1. This expression is called the i-binomial expansion of the integer
h.
If h > 0 has i-binomial expansion as in 1.1, then we set
mj + 1
mi + 1
mi
+ ··· +
hhii =
.
+
i
j+1
i+1
We use the convention that 0hii = 0.
For example, since 7 = 43 + 32 , the 3-binomial expansion of 7 is and 7h3i =
5
4
+
4
3
= 9.
Definition 1.1. A sequence of non-negative integers (h0 , h1 , h2 · · · ) is called an O-sequence if
i) h0 = 1;
hii
ii) hi+1 ≤ hi for all i > 0.
hii
An O-sequence is said to have maximal growth from degree i to degree i + 1 if hi+1 = hi
2000 Mathematics Subject Classification. 13F20, 13A15, 13D40.
Key words and phrases. Hilbert function, multigraded albegra, numerical function.
Version:October 31, 2017.
1
2
GIUSEPPE FAVACCHIO
We are now ready to enunciate the Macaulay’s theorem. It characterizes the Hilbert function of
standard graded k-algebras bounding the growth from any degree to the next. The proof of this theorem
and more details about O-sequences are also discussed in [2] Chapter 4. We represent HS/I as a sequence
of integers (h0 , h1 , h2 , · · · ) where ht := HS/I (t).
Theorem 1.2 (Macaulay, [9]). Let H := (h0 , h1 , h2 , · · · ) be a sequence of integers, then the following are
equivalent:
1) H is the Hilbert function of a standard graded k-algebra;
2) H is an O-sequence.
It is therefore interesting to find an extension of the above theorem to the multi-graded case. Multigraded Hilbert functions arise in many contexts and properties related to the Hilbert function of multigraded algebras are currently studied. See for instance [6] and [10] for several examples. The generalization of Macaulay’s theorem to multi-graded rings is an open problem. A first answer was given by the
author in [5] where the Hilbert functions of a bigraded algebra in k[x1 , x2 , y1 , y2 ] are classified.
The goal of this work is to generalize the Macaulay’s theorem to any bigraded algebras.
In order to reach our purpose we first, in Section 2, introduce Φ(n) a list of finite sequences called
fractal expansion of n. Then we define a coherent truncation of these vectors and we show that these
objects are strictly related to the O-sequences. Indeed, in Section 3 we show that they also characterize
the Hilbert function of standard graded k-algebras. Furthermore, we show that these sequences can be
used to compute the Betti numbers of a lex ideal. In Section 4 we extend some of these results and we
classify the Hilbert function of bigraded algebras, Theorem 4.13.
The computer program CoCoA [3] was indispensable for all the computations.
2. Expansion of a Fractal sequence
In this section we describe a new approach to classify the Hilbert functions of standard graded algebras.
We introduce a sequence of tuplas, called coherent fractal growth, and we study its properties. The main
result of this section is Theorem 2.14. We prove that these sequences have the same behavior of the
O-sequences.
Roughly speaking a numerical sequence σ is called fractal if once we delete the first occurrence of
each number it remains identical to the original. Such property thus implies we can repeat this process
indefinitely, and σ contains infinitely many copy of itself. It has something like a fractal behavior. See
[8] for a formal definition and further properties.
For instance, one can show that the sequence σ = (1, 1, 2, 1, 2, 3, 1, 2, 3, 4, 1, 2, 3, 4, 5, . . .) is fractal.
Indeed, after removing the first occurrence of each number we get a sequence that it is the same as the
starting one
(✁
1, 1, ✁
2, 1, 2, ✁3, 1, 2, 3, ✁4, 1, 2, 3, 4, ✁5, . . .) = σ.
We introduce some notation. Given a positive integer a ∈ N we denote by [a] := (1, 2, . . . , a) ∈ Na the
tupla of length a consisting af all the positive integers less then or equal to a written in increasing order.
Given a (finite or infinite) sequence σ of positive integers we construct a new sequence, named the
expansion of σ, denoted by [σ]. If σ := (s1 , s2 , s3 , . . .) we set [σ] := [s1 ] [s2 ], [s3 ] · · · , where the symbol
" " denotes the associative operation of concatenation of two vectors. E.g. (3, 5, 4) (2, 3) = (3, 5, 4, 2, 3).
This construction can be recursively applied. We denote by [σ]d := [[σ]d−1 ] where we set [σ]0 := σ.
For a positive integer a, we also denote by [a]d := [[a]d−1 ], where [a]0 := (a).
For instance we have [3] = (1, 2, 3), [3]2 = (1, 1, 2, 1, 2, 3), [3]3 = (1, 1, 1, 2, 1, 1, 2, 1, 2, 3).
FRACTAL SEQUENCES AND HILBERT FUNCTIONS
3
Lemma 2.1. Let σ := (s1 , s2 , s3 , . . .) be a sequence of positive integers. Then [σ]d = [s1 ]d [s2 ]d [s3 ]d
··· .
Proof. If d = 0 the statement is true. Assume d > 0. By definition [σ]d = [[σ]d−1 ] then by the inductive
hypothesis we have [σ]d = [[s1 ]d−1 ] [[s2 ]d−1 ] [[s3 ]d−1 ] · · · = [s1 ]d [s2 ]d [s3 ]d · · · .
Corollary 2.2. Let a ∈ N be a positive integer. Then [a]d = [1]d−1 [2]d−1
···
[a]d−1 .
Proof. The statement follows by Lemma 2.1 since [a]d = [(1, 2, . . . , a)]d−1 .
Remark 2.3. The sequence [N] := [1] [2]
···
[n]
· · · is a fractal sequence.
Given a sequence σ, the symbolsPσi and σ(i) both denote the i-th entry of σ. If σ if finite then |σ|
denotes the number of entries and
σ their sum. We use the convention that
P these values are "∞" for
infinite sequences of positive integers. For instance, [3]34 = 2, [3]3 = 10 and [3]3 = 15.
Throughout this paper we use the convention that, for a finite sequence σ, the notation σa or σ(a)
implies a ≤ |σ|.
Remark 2.4.
P Note that, for a finite sequence of positive integers σ, the definition of [σ] easily implies
the equality
σ = |[σ]| .
Given a positive integer n, we define the fractal expansion of n as the set
Φ(n) := {[n]0 , [n]1 , . . . , [n]d , . . .}.
Each element in Φ(n) is a finite sequence of positive integers. In the following lemma we compute the
number of their entries.
P
Lemma 2.5. Let n be a positive integer. Then [n]d = d+n−1
and [n]d = d+n
d
d+1 .
n−1
n
Proof. By definition we have [n]0 = n−1
= 1 and [n]1 = n−1
= n. By Lemma 2.1 we have
[n]d = [1]d−1 [2]d−1 · · · [n]d−1 , therefore
n
n
X
X
d+j−2
d+n−1
d
d−1
[n] =
[j]
=
.
=
n−1
n−1
j=1
j=1
Moreover, by Remark 2.4 we have
P
[n]d = [n]d+1 =
d+n
d+1
.
Next lemma introduces a way to decompose a number as sum of binomial
coefficients that is slight
different to the Macaulay decomposition. We use the convention that ab = 0 whenever a < b.
Lemma 2.6. Let d be a positive integer. Any a ∈ N can be written uniquely in the form
k1
k2
kd−1
kd
+
+ ··· +
+
(2.1)
a=
1
2
d−1
d
where kd > kd−1 > · · · > k2 ≥ k1 ≥ 1
Proof. In order to prove the existence, we choose kd maximal such that kdd < a. By the inductive
Pd−1
d−1
hypothesis on d, 0 < a− kdd = i=1 kii , where kd−1 > · · · > k2 ≥ k1 ≥ 1. Since k1 ≥ 1 a− kdd > kd−1
,
moreover since kdd+1 ≥ a it follows that
kd−1
kd
kd + 1
kd
kd
.
>
≥a−
=
−
d−1
d
d
d−1
d
4
GIUSEPPE FAVACCHIO
Hence kd > kd−1
uniqueness
follows
. The
by induction on d. If d = 1 it is trivial. Now assume that d > 1
d−1
and let a = kdd + kd−1
+ · · · + k22 + k11 be a decomposition of a. Then kd is the maximal integer such
d−1
that kdd < a. Otherwise, if kdd+1 < a we get a > kdd+1 ≥ kdd + kd−1
+ · · · + k22 + k11 .
Remark 2.7. The decomposition in Lemma 2.6 is different from the Macaulay decomposition since it is
always required that k1 ≥ 1. Moreover, for any j ≥ 2 we only have that kj ≥ j − 1, thus some binomial
1
1
coefficient could be zero. For instance, we have 1 = d−1
+ d−2
d
d−1 + · · · + 2 + 1 where the first d − 1
binomial coefficients in the sum are equal to zero.
Definition 2.8. We refer to equation 2.1 as the d-fractal decomposition of a. We denote by
[a](d) := (kd − d + 2, kd−1 − d + 3, . . . , k4 − 2, k3 − 1, k2 , k1 ) ∈ Nd .
We call these numbers the d-fractal coefficients of a.
(d)
[a](d) is a not increasing sequence of positive integers. Indeed, [a]d > 0 and by construction k1 ≤ k2 .
Moreover, for j > 1, since kj > kj−1 , we have kj − j + 2 ≥ kj−1 − j + 1.
Next result explains the name "d-fractal decomposition". We show that k1 is the a-th entry in [n]d .
We need the convention that [0]d is the empty sequence and [0]d = 0.
(d)
Theorem 2.9. [n]da = [a]d .
(1)
Proof. If d = 1 then [n]1a = a and a = a1 thus [a]1 = a = [n]1a . We now assume d > 1.
d−1
Let a = kdd + kd−1
+ · · · + k22 + k11 be the d-fractal decomposition of a. By Lemma 2.5 we have
d−1
[kd − d + 2]d ≥ a > [kd − d + 1]d and [n]da = [kd − d + 2]d−1kd .Thus, since kd−1
+ · · · + k22 + k11 is
a−( d )
the d − 1 fractal decomposition of a − kdd , by the inductive hypothesis we have k1 = [n]d−1 kd .
(a−( d ))
Given α, β ∈ Nd then α <lex β iff for some i ≤ d we have αj = βj for j < i and αi < βi . The following
lemma is crucial for our intent. We prove that the d-fractal coefficients have a good behavior with respect
the lex order.
Lemma 2.10. [a](d) <lex [b](d) iff a < b.
Proof. If d = 1 the assertion is trivial. Let d > 1 and let a, b be two integers with fractal decomposition
a1
a2
ad−1
ad
, ad > · · · > a2 ≥ a1 ≥ 1
+
+ ···+
+
a=
1
2
d−1
d
and
b=
b1
b2
bd−1
bd
, bd > · · · > b2 ≥ b1 ≥ 1.
+
+ ···+
+
1
2
d−1
d
(d)
(d)
(d)
(d)
If [a](d) <lex [b](d) then there is an index j such that [a]i = [b]i for any i < j and [a]j < [b]j . Hence,
ai
bi
aj
bj
i = i for any i < j and j < j . If j = d then easily b > a, otherwise
ai + 1
ad−1
ad
bj
bd−1
bd
+ ···+
≥ a.
+
≥
+ ···+
+
b>
d−1
j
d
j
d−1
d
Vice versa let b > a we claim that bd ≥ ad . Indeed, if bd < ad we get a > add ≥ bdd+1 ≥ b
contradicting b > a. So if bd > ad we are done otherwise the statement follows by induction.
FRACTAL SEQUENCES AND HILBERT FUNCTIONS
5
Given two sequences τ and σ we say that τ is a truncation of σ if |τ | ≤ |σ| and τ (j) = σ(j) for any
j ≤ |τ |.
Next definition introduces the main tool of the paper. The coherent fractal growths are suitable
truncations the elements in the fractal expansion of n.
Definition 2.11. We say that T := {τ0 , τ1 , τ2 , . . .} is a coherent fractal growth if τ0 := (n) and τj is a
truncation of [τj−1 ] for each j ≥ 1.
For instance {(3), (1, 2, 3), (1, 1, 2, 1, 2), (1, 1, 1, 2, 1, 1), (1, 1, 1, 1)} is a coherent fractal growth. Indeed
one can check that each elements is truncation of the expansion of the previous one. On the other hand,
for instance, {(3), (1, 2, 3), (1, 1, 2), (1, 1, 1, 2, 1)} is not a coherent fractal growth. Indeed, (1, 1, 1, 2, 1) is
not a truncation of [(1, 1, 2)] = (1, 1, 1, 2).
Remark 2.12. Note that, in a coherent fractal growth, τd consists of the first |τd | elements in [n]d .
Moreover, the length of the elements in T := {τ0 , τ1 , τ2 , . . .}, a coherent fractal growth, is bounded for
any d. Indeed, by Remark 2.4 we have
X
(2.2)
|τd | ≤
τd−1
for each d ≥ 1.
In the next part of this section we prove that the bound in Remark 2.12 is equivalent to the binomial
expansion for a O-sequence. In order to relate the
coherent
fractal growth with O-sequences we need the
a−1
following lemma. It uses the equality ab = a−1
+
b
b−1 .
Lemma 2.13. Let [a](d) = (cd , cd−1 , . . . , c1 ) be the d-fractal coefficients of a. Then the (d + 1)-fractal
coefficients of ahdi are [ahdi ](d+1) = (cd , cd−1 , . . . , c2 , c1 , c1 ).
Proof. The d-fractal decomposition of a is, by definition
cd + d − 2
c1
cd−1 + d − 3
c3 + 1
c2
.
a=
+
+
+ ···+
+
1
2
d
d−1
3
If c1 < c2 , we get the Macaulay decomposition of a by removing the binomials ji equal to 0. Since
j
j+1
i = 0 implies i+1 = 0 we have
cd + d − 1
cd + d − 1
c3 + 2
c2 + 1
c1 + 1
ahdi =
+
+ ···+
+
+
.
d+1
d
4
3
2
Since c12+1 = c21 + c11 we are done. Now we consider the case c1 = c2 . Then we can write the following
decomposition of a
cd + d − 2
cd−1 + d − 1
c3 + 1
c2 + 1
a=
+
+ ···+
+
.
d
d−1
3
2
Thus if c3 > c2 this representation is the Macaulay decomposition of a once we remove the binomials ji
equal to 0.
cd + d − 1
cd−1 + d
c3 + 2
c2 + 2
ahdi =
+
+ ···+
+
=
d+1
d
4
3
cd + d − 1
cd−1 + d
c3 + 2
c2 + 1
c1 + 1
=
+
+ ···+
+
+
=
d+1
d
4
3
2
cd + d − 1
cd−1 + d
c3 + 2
c1
c2 + 1
c1
=
.
+
+ ···+
+
+
+
1
d+1
d
2
4
3
The proof follows in a finite number of steps by iterating this argument.
6
GIUSEPPE FAVACCHIO
The following theorem is the main result of this section. We show that the length of the elements in
a coherent fractal growth is an O-sequence.
Theorem 2.14. Let T = {τ0 , τ1 , τ2 . . .} be a list of truncations of Φ(n) = {(n), [n], [n]2 , . . .}. Then the
following are equivalent
i) T = {τ0 , τ1 , τ2 . . .} is a coherent fractal growth;
ii) (|τ0 |, |τ1 |, |τ2 |, . . .) is an O-sequence.
Proof. In order to prove (i) ⇒ (ii), we need to show |τd+1 | ≤ |τd |hdi , for each d ≥ 0. Set a = |τd | and
take the d-fractal decomposition of a
k1
k2
k3
kd−1
kd
.
+
+
+ ···+
+
a=
1
2
3
d−1
d
If a = n+d+1
= [n]d the statement follows by Lemma 2.5. Assume now a <
d
d
truncation of [n] = [1]d−1 [2]d−1 · · · [n]d−1 and, by Lemma 2.5,
kd + 1
kd
d
<a≤
= [kd − d + 2]d
[kd − d + 1] =
d
d
n+d+1
d
. Since τd is a
we get (denoted by [0] = ())
τd = [kd − d + 1]d τd′
where τd′ is a truncation of [kd − d + 2]d−1 . Therefore, reiterating this argument, we have
τd = [kd − d + 1]d [kd−1 − d + 2]d−1
···
[k3 − 1]3 [k2 − 1]2 [k1 ].
By equation 2.2 in Remark 2.12, we have
d
X
X
ki + 1
kd + 1
kd−1 + 1
k1
k2 + 1
k1
.
=
+
+
+ ···+
+
|τd+1 | ≤
τd =
1
d+1
d+1
2
d
3
i=1
The last sum, by Lemma 2.13, is equal to ahdi .
Vice versa, to prove (ii) ⇒ (i), we have to prove that, for each d ≥ 0, the sequence τd+1
P is a truncation
of [τd ] i.e. |τd+1 | ≤ |[τd ]|. It follows by using the same argument as above, |τd |hdi =
τdP
. Indeed, by
hypothesis, we have the bound |τd+1 | ≤ |τd |hdi and, by Remark 2.12, we know that |[τd ]| = τd .
Let’s check, for instance, that H := (1, 3, 3, 4) is an O-sequence. We write a sequence of truncations
of Φ(3) of length 1, 3, 3, 4 respectively. We get
T := {(3), (1, 2, 3), (1, 1, 2), (1, 1, 1, 2)}.
It is a coherent fractal growth. Indeed, by definition each sequence is a truncation of the previous one,
e.g. [(1, 2, 3)] = (1, 1, 2) (1, 2, 3) and [(1, 1, 2)] = (1, 1, 1, 2). On the other hand we can also check that
H := (1, 3, 5, 8) is not an O-sequence. Indeed, in a coherent fractal growth such
{(3), (1, 2, 3), (1, 1, 2, 1, 2), τ3}
τ3 need to be a truncation of [(1, 1, 2, 1, 2)] = (1, 1, 1, 2, 1, 1, 2) that has length 7. Therefore |τ3 | ≤ 7 that
is the maximal growth allowed.
FRACTAL SEQUENCES AND HILBERT FUNCTIONS
7
3. Fractal expansion and Homological Invariants
In Section 2 we introduced a novel approach to describe the O-sequences. In this section we show
the "algebraic" meaning of a coherent fractal growth. We directly relate this sequences with lex segment
ideals and its homological invariants. In particular, the Eliahou-Kervaire formula is naturally applied to
our case. Therefore, the fractal expansion of n is used in Proposition 3.4 to compute the Betti numbers
of a lex algebra.
Let a and d be positive integers. Let [a](d) := (cd , cd−1 , . . . , c2 , c1 ) be the d-fractal coefficient of a, see
(d)
Lemma 2.6 and Definition 2.8. We associate to a and d a monomial Xa of degree d in the variables
X := {x1 , . . . xn } in such a way
Xa(d) := xc1 xc2 · · · xcd−1 xcd .
Vice versa, a monomial T = xc1 xc2 · · · xcd−1 xcd of degree d in the variables in X identifies a d-upla
(cd , cd−1 , . . . , c1 ) such that ci ≥ ci+1 for any i.
(d)
(d)
Remark 3.1. An immediate consequence of Lemma 2.10 is that Xa >lex Xb iff a > b, with respect
(d)
the lex order induced by x1 < x2 < · · · < xn . Therefore, with respect the same order, Xa is the a-th
greatest monomial of degree d in the set of variables X.
Let S := k[X] = k[x1 , . . . , xn ] be the standard graded polynomial ring.
We set
(d)
G(X)≤t := {Xa(d) | a ≤ t}
and
(d)
G(X)>t := {Xa(d) | a > t}.
(d)
(d)
Sd is spanned by the monomials in G(X)≤t ∪ G(X)>t .
(d)
By Remark 3.1 G(X)>t is a lex set of monomials of degree d with respect the degree lexicographic
order x1 < x2 < · · · < xn .
(d)
Given T := {τ0 , τ1 , τ2 , . . .} a coherent fractal growth, we set I(T )d := hG(X)>|τd | ik the k-vector space
(d)
spanned by the monomial in G(X)>|τd | . Then, by Theorem, 2.14 and Theorem 1.2, the following result
holds.
Proposition 3.2. I(T ) := ⊕d Id (T ) ⊆ R is a lex segment ideal and HR/I (d) = |τd |.
Given a minimal free resolution of an lex segment ideal
M
M
S(−j)β1,1+j → S → S/I → 0
S(−j)βp,p+j → · · · →
0→
j
j
the Betti numbers can be computed by the Eliahou-Kervaire formula, see [4]. See also [7] equation 7.7 of
Section 7.
Theorem 3.3 (Eliahou-Kervaire formula). Let I be a lex segment ideal. For u ∈ G(I), a monomial
minimal generator of I, let m(u) denotes the largest index j such that xj divides u. Let mkj be the
number of monomials u ∈ G(I) with m(u) = k. Then
n
X m(u) − 1 X
k−1
mkj .
=
βi,i+j (S/I) =
i−1
i
i=1
u∈G(I)j
This result can be written in terms of coherent fractal growth.
8
GIUSEPPE FAVACCHIO
Proposition 3.4. Given T := {τ0 , τ1 , τ2 , . . .} a coherent fractal growth. Then
X
|[τi−1 ]|
n
(j)
X
[a]j − 1
k−1
βi,i+j (S/I(T )) =
=
wkj
i
i−1
i=1
a=|τj |+1
where wkj is the number of occurrence of "k" in τi′ with [τi−1 ] = τi τi′ .
Proof. It is an immediate consequence of Theorem 3.3 and Theorem 2.9.
4. The Hilbert function of a bigraded algebra and the Fractal Functions
Let k be an infinite field, and let R := k[x1 , · · · xn , y1 , · · · , ym ] be the polynomial ring in n + m
indeterminates with the grading defined by deg xi = (1, 0) and deg yj = (0, 1). Then R = ⊕(i,j)∈N2 R(i,j)
where R(i,j) denotes the set of all homogeneous elements in R of degree (i, j). Moreover, R(i,j) is generated,
jm
as a k-vector space, by the monomials xi11 · · · xinn y1j1 · · · ym
such that i1 + · · ·+ in = i and j1 + · · ·+ jm = j.
An ideal I ⊆ R is called a bigraded ideal if it is generated by homogeneous elements with respect to
this grading. A bigraded algebra R/I is the quotient of R with a bigraded ideal I. The Hilbert function
of a bigraded algebra R/I is defined such that HR/I : N2 → N and HR/I (i, j) := dimk (R/I)(i,j) =
dimk R(i,j) − dimk I(i,j) where I(i,j) = I ∩ R(i,j) is the set of the bihomogeneous elements of degree (i, j)
in I.
From now on, we will work with the degree lexicographical order on R induced by xn > · · · > x1 >
ym > · · · > y1 . With this ordering, we recall the definition of bilex ideal, introduced and studied in [1].
We refer to [1] for all preliminaries and for further results on bilex ideals.
Definition 4.1 ([1], Definition 4.4). A set of monomials L ⊆ R(i,j) is called bilex if for every monomial
uv ∈ L, where u ∈ R(i,0) and v ∈ R(0,j) , the following conditions are satisfied:
• if u′ ∈ R(i,0) and u′ > u, then u′ v ∈ L;
• if v ′ ∈ R(0,j) and v ′ > v, then uv ′ ∈ L.
A monomial ideal I ⊆ R is called a bilex ideal if I(i,j) is generated as k-vector space by a bilex set of
monomials, for every i, j ≥ 0.
Bilex ideals play a crucial role in the study of the Hilbert function of bigraded algebras.
Theorem 4.2 ([1],Theorem 4.14). Let J ⊆ R be a bigraded ideal. Then there exists a bilex ideal I such
that HR/I = HR/J .
In [5] was solved the question of characterize the Hilbert functions of bigraded algebras of k[x1 , x2 , y1 , y2 ]
by introducing the Ferrers functions. In this section we generalize these functions by introducing the fractal functions, see Definition 4.6. We prove, Theorem 4.13, that these classify the Hilbert functions of
bigraded algebras.
We need some preparatory material. We denote by Ma×b (U ) the set of all the matrices with size
(a, b), i.e. a rows and b columns, and entries in a set U ⊆ k. Given a matrix M = (mij ) ∈ Ma×b (U ) we
denote by
X
XX
M :=
mi,j
i≤a j≤b
named the weight of M.
Next definition introduces the objects we need in this section.
Definition 4.3. A Ferrers matrix of size (a, b) is a matrix M = (mij ) ∈ M({0, 1})a×b such that
FRACTAL SEQUENCES AND HILBERT FUNCTIONS
9
if mij = 1 then mi′ j ′ = 1 for any (i′ , j ′ ) ≤ (i, j).
We set by F a×b the family of all the Ferrers matrices of size (a, b).
In the next definition we introduce expansions of a matrix.
Definition 4.4. Let M ∈ M(U )a×b be a matrix of size (a, b) and let v := (v1 , . . . , va ) ∈ Na and P
w :=
b
hv,•i
(w1 , . . . , wb ) ∈ N be vectors of non negative integers. We denote by M
an element in M (U ) v×b
constructed by
repeating vi times the i-th row of M , for i = 1, . . . , a.
We denote by M
h•,wi
an element in M (U )a×
P
v2
constructed by
repeating wj times the j-th column of M , for j = 1, . . . , b.
Remark 4.5. The expansions of a Ferrers matrix are
1 1 1
1 1 0
M =
1 1 0
1 0 0
Set v := (2, 1, 0, 3) and w := (3, 1, 3). Then
1 1 1
1 1 1
1 1 0
hv1 ,•i
∈ F (6,3)
M
=
1 0 0
1 0 0
1 0 0
M h•,v2 i
also Ferres matrices. Take, for instance,
∈ F (4,3) .
1
1
=
1
1
1
1
1
1
1
1
1
1
1
1
1
0
1
0
0
0
1
0
0
0
1
0
∈ F (4,7) .
0
0
Given M, N ∈ F a×b we define a new matrix M ∗ N := (mij ∗ nij ) = (min(mij , nij )) ∈ F a×b . We say
that M ≤ N iff mij ≤ nij for any i, j.
We are ready to introduce the fractal functions.
Definition 4.6. Let H : N2 → N be a numerical function. We say that H is a fractal function if
j−1+m
i−1+n
P
H(0, 0) = 1 and, for any (i, j) ∈ N2 , there exists a matrix of Mij ∈ F ( n−1 )×( m−1 ) with Mij = H(i, j)
and such that all the matrices satisfy the condition
h[n]i−1 ,•i
if i > 0
Mij ≤ Mi−1j
h•,[m]j−1 i
Mij ≤ Mij−1
if j > 0
i−1+m
Remark 4.7. Let H : N2 → N be the numerical function H(i, j) = i−1+n
n−1
m−1 . For any i, j ∈ N,
i−1+m
i−1+n
×
)
)
(
(
m−1
satisfying the condition in Definition 4.6 that is the
there is only one element in M ∈ F n−1
ij
matrix with all "1" entries. Therefore H is a fractal function.
Remark 4.8. If n = m = 2, the definition of fractal functions agrees with Definition 3.3. in [5]. Indeed
it is enough to write each partition αij = (a1 , a2 , . . .) as a matrix Mij = (mhk ) ∈ F (i+1)×(j+1) where
mhk = 1 iff k ≤ ak otherwise mhk = 0. In this case the expansions are given by the elements in
Φ(2) := {(2), (1, 2), (1, 1, 2), (1, 1, 1, 2), . . .}.
In the following we denote by X := {x1 , · · · xn } and Y := {y1 , · · · , ym } the set of the variables of
degree (1, 0) and (0, 1) respectively.
Next lemma is useful for our purpose. It is an immediate consequence of Lemma 2.13.
10
GIUSEPPE FAVACCHIO
(d)
Lemma 4.9. x1 · Xa
(d+1)
= Xahdi .
To shorten the notation we set αi := n+i−1
and βj := m+j−1
n−1
m−1 . In order to relate fractal functions
and Hilbert functions of bigraded algebras we need to introduce a correspondence between Ferrers matrices
and monomials.
Let M = (mab ) ∈ F αi ×βj . We denote by λ(M )(ij) the set of the monomials
(j)
λ(M ) := {Xa(i) · Yb
Proposition 4.10. Let M = (mab ) ∈ F
αi ×βj
| mab = 0}.
. Then λ(M ) is a bilex set of monomials of bidegree (i, j).
(i)
(j)
(i)
(i)
Proof. We use Lemma 2.10 and Remark 3.1. Let Xa · Yb be an element in λ(M ) and Xu > Xa .
(i)
(j)
Since (u, b) > (a, b) and mab = 0 we get mub = 0 i.e. Xu · Yb ∈ λ(M ). In a similar way it follows that
(i)
(j)
Xa · Yv ∈ λ(M ) for v > b.
Let L ⊆ R(i,j) be a bilex set of monomials of bidegree (i, j). We denote by µ(L) ∈ M({0, 1})αi ×βj the
(j)
(i)
matrix (mab ) such that mab = 1 iff Xa · Yb
∈
/ L otherwise mab = 0.
Proposition 4.11. Let L ⊆ R(i,j) be a bilex set of monomials of bidegree (i, j). Then µ(L) ∈ F αi ×βj .
Proof. If follows by using Lemma 2.10 and Remark 3.1. Indeed, say mab = 0 for an entry of µ(L). This
(i)
(j)
(i)
(j)
implies Xa · Yb ∈ L. Thus, for u > a, we have Xu · Yb ∈ L i.e. mub = 0. Analogously, we see that
mav = 0 for v > b.
Proposition 4.10 and Proposition 4.11 together imply the following result.
Corollary 4.12. There is a one to one correspondence between the bilex sets of monomials of degree
(i, j) and the elements in F αi ×βj .
We are ready to prove the main result of this paper.
Theorem 4.13. Let H : N × N → N be a numerical function. Then the following are equivalent
1) H is a fractal function;
2) H = HR/I for some bilex ideal I ⊆ R = k[x1 , . . . , xn , y1 , . . . , ym ].
Proof. (1) → (2) Let H be a fractal function. For each (i, j) ∈ N2 , let I(i,j) be the k-vector space
spanned by the elements in λ(Mij ). Then we claim that I := ⊕(i,j)∈N2 I(i,j) is an ideal of R. To prove the
(i)
(j)
(i)
(j)
claim it is enough to show that if Xa · Yb ∈ I(i,j) then xu · Xa · Yb
(i)
(j)
yv · Xa · Yb ∈ I(i,j+1) for any yv ∈ Y. We have, see Lemma 4.9,
(j)
xu · Xa(i) · Yb
(j)
≥ x1 · Xa(i) · Yb
(i+1)
∈ I(i+1,j) for any xu ∈ X and
(j)
= Xahii · Yb .
(i+1)
Then, by Definition 4.6 and Theorem 2.14, the entry (ahii , b) of the matrix Mi+1,j is 0 and then Xahii ·
(j)
(i)
(j)
Yb ∈ I(i+1,j) and furthermore xu · Xa · Yb
I(i,j+1) .
(i)
(j)
∈ I(i+1,j) . In a similar way it follows that yv · Xa · Yb
∈
(2) → (1) Let I ⊆ R be a bilex ideal such that HR/I = H. Set Mij := µ(Iij ), we claim that the
Mij s satisfy the condition in Definition 4.6. By Theorem 2.14 it is enough to show that if Mij (a, b) = 0
(the entry (a, b) in Mij is 0), then also Mi+1,j (ahii , b) = 0 (the entry (ahii , b) in Mi+1j is 0). Set
(h)
J := (Xu | Mhj (u, b) = 0), then the claim is an immediate consequence of the fact that J is a lex ideal
of k[X].
FRACTAL SEQUENCES AND HILBERT FUNCTIONS
11
The following question is motivated by the argument of Section 3.
Question 4.14. Can the bigraded Betti numbers of a bilex ideal I = ⊕I(i,j) be computed from the
matrices µ(I(i,j) )?
References
[1] Aramova A, Crona K, De Negri E. Bigeneric initial ideals, diagonal subalgebras and bigraded Hilbert functions. Journal
of Pure and Applied Algebra. 2000 Jul 3;150(3):215-35.
[2] Bruns W, Herzog HJ. Cohen-macaulay rings. Cambridge University Press; 1998 Jun 18.
[3] CoCoATeam,
CoCoA: a system for doing Computations in Commutative Algebra. Available at
http://cocoa.dima.unige.it
[4] Eliahou S., Kervaire M., Minimal resolutions of some monomial ideals. J. Algebra 129 (1990) 1–25.
[5] Favacchio G. The Hilbert Function of Bigraded Algebras in k[P1 × P1 ]. Journal of Commutative Algebra. In Press 2017.
[6] Guardo E, Van Tuyl A. Arithmetically Cohen-Macaulay sets of points in P1 × P1 . SpringerBriefs in Mathematics,
Springer 2015.
[7] Herzog J, Hibi T. Monomial ideals. Springer. 2011.
[8] Kimberling C. Fractal sequences and interspersions. Ars Combinatoria. 1997; 45:157-68.
[9] Macaulay FS. Some properties of enumeration in the theory of modular systems. Proceedings of the London Mathematical Society. 1927 Jan 1;2(1):531-55.
[10] Peeva I, Stillman M. Open problems on syzygies and Hilbert functions. Journal of Commutative Algebra. 2009;1(1):15995.
[11] Stanley RP. Hilbert functions of graded algebras. Advances in Mathematics. 1978 Apr 1;28(1):57-83.
Dipartimento di Matematica e Informatica, Viale A. Doria, 6 - 95100 - Catania, Italy
E-mail address: [email protected]
URL: www.dmi.unict.it/~gfavacchio
| 0math.AC
|
Noname manuscript No.
(will be inserted by the editor)
A. B. Duncan · N. Nüsken · G. A. Pavliotis
arXiv:1705.00170v1 [math.PR] 29 Apr 2017
Using Perturbed Underdamped Langevin Dynamics
to Efficiently Sample from Probability Distributions
Received: date / Accepted: date
Abstract In this paper we introduce and analyse Langevin samplers that consist of perturbations
of the standard underdamped Langevin dynamics. The perturbed dynamics is such that its invariant
measure is the same as that of the unperturbed dynamics. We show that appropriate choices of the
perturbations can lead to samplers that have improved properties, at least in terms of reducing the
asymptotic variance. We present a detailed analysis of the new Langevin sampler for Gaussian target
distributions. Our theoretical results are supported by numerical experiments with non-Gaussian target
measures.
1 Introduction and Motivation
Sampling from probability measures in high-dimensional spaces is a problem that appears frequently
in applications, e.g. in computational statistical mechanics and in Bayesian statistics. In particular, we
are faced with the problem of computing expectations with respect to a probability measure π on Rd ,
i.e. we wish to evaluate integrals of the form:
ˆ
π(f ) :=
f (x)π(dx).
(1)
Rd
As is typical in many applications, particularly in molecular dynamics and Bayesian inference, the
density (for convenience denoted by the same symbol π) is known only up to a normalization constant;
furthermore, the dimension of the underlying space is quite often large enough to render deterministic
quadrature schemes computationally infeasible.
A standard approach to approximating such integrals is Markov Chain Monte Carlo (MCMC)
techniques [GCS+ 14, Liu08, RC13], where a Markov process (Xt )t≥0 is constructed which is ergodic
with respect to the probability measure π. Then, defining the long-time average
πT (f ) :=
1
T
ˆ
T
f (Xs )ds
(2)
0
A. B. Duncan
School of Mathematical and Physical Sciences, University of Sussex, Falmer, Brighton, BN1 9RH United
Kingdom E-mail: [email protected]
N. Nüsken
Imperial College London, Department of Mathematics, South Kensington Campus, London SW7 2AZ,England
E-mail: [email protected]
G. A. Pavliotis
Imperial College London, Department of Mathematics, South Kensington Campus, London SW7 2AZ,England
E-mail: [email protected]
2
for f ∈ L1 (π), the ergodic theorem guarantees almost sure convergence of the long-time average πT (f )
to π(f ).
There are infinitely many Markov, and, for the purposes of this paper diffusion, processes that
can be constructed in such a way that they are ergodic with respect to the target distribution. A
natural question is then how to choose the ergodic diffusion process (Xt )t≥0 . Naturally the choice
should be dictated by the requirement that the computational cost of (approximately) calculating (1)
is minimized. A standard example is given by the overdamped Langevin dynamics defined to be the
unique (strong) solution (Xt )t≥0 of the following stochastic differential equation (SDE):
√
(3)
dXt = −∇V (Xt )dt + 2dWt ,
where V = − log π is the potential associated with the smooth positive density π. Under appropriate
assumptions on V , i.e. on the measure π(dx), the process (Xt )t≥0 is ergodic and in fact reversible with
respect to the target distribution.
Another well-known example is the underdamped Langevin dynamics given by (Xt )t≥0 = (qt , pt )t≥0
defined on the extended space (phase space) Rd × Rd by the following pair of coupled SDEs:
dqt = M −1 pt dt,
dpt = −∇V (qt )dt − Γ M −1 pt dt +
√
2Γ dWt ,
(4)
where mass and friction tensors M and Γ , respectively, are assumed to be symmetric positive definite
matrices. It is well-known [Pav14, LS16] that (qt , pt )t≥0 is ergodic with respect to the measure π
b :=
π ⊗ N (0, M ), having density with respect to the Lebesgue measure on R2d given by
1
1
−1
π
b(q, p) = exp −V (q) − p · M p ,
(5)
b
2
Z
b is a normalization constant. Note that π
where Z
b has marginal π with respect to p and thus for
´t
functions f ∈ L1 (π), we have that 1t 0 f (qt ) dt → π(f ) almost surely. Notice also that the dynamics
restricted to the q-variables is no longer Markovian. The p-variables can thus be interpreted as giving
some instantaneous memory to the system, facilitating efficient exploration of the state space. Higher
order Markovian models, based on a finite dimensional (Markovian) approximation of the generalized
Langevin equation can also be used [CBP09].
As there is a lot of freedom in choosing the dynamics in (2), see the discussion in Section 2, it is
desirable to choose the diffusion process (Xt )t≥0 in such a way that πT (f ) can provide a good estimation of π(f ). The performance of the estimator (2) can be quantified in various manners. The
ultimate goal, of course, is to choose the dynamics as well as the numerical discretization in such a
way that the computational cost of the longtime-average estimator is minimized, for a given tolerance.
The minimization of the computational cost consists of three steps: bias correction, variance reduction
and choice of an appropriate discretization scheme. For the latter step see Section 5 and [DLP16, Sec.
6].
Under appropriate conditions on the potential V it can be shown that both (3) and (4) converge
to equilibrium exponentially fast, e.g. in relative entropy. One performance objective would then be
to choose the process (Xt )t≥0 so that this rate of convergence is maximised. Conditions on the potential V which guarantee exponential convergence to equilibrium, both in L2 (π) and in relative entropy
can be found in [MV00, BGL13]. A powerful technique for proving exponentially fast convergence to
equilibrium that will be used in this paper is C. Villani’s theory of hypocoercivity [Vil09]. In the case
when the target measure π is Gaussian, both the overdamped (3) and the underdamped (4) dynamics
become generalized Ornstein-Uhlenbeck processes. For such processes the entire spectrum of the generator – or, equivalently, the Fokker-Planck operator – can be computed analytically and, in particular,
an explicit formula for the L2 -spectral gap can be obtained [MPP02, OPPS12, OPPS15]. A detailed
analysis of the convergence to equilibrium in relative entropy for stochastic differential equations with
linear drift, i.e. generalized Ornstein-Uhlenbeck processes, has been carried out in [AE14].
In addition to speeding up convergence to equilibrium, i.e. reducing the bias of the estimator (2),
3
one is naturally also interested in reducing the asymptotic variance. Under appropriate conditions
on the target measure π and the observable f , the estimator πT (f ) satisfies a central limit theorem
(CLT) [KLO12], that is,
1
d
√ (πT (f ) − π(f )) −−−−→ N (0, 2 σf2 ),
T
→∞
T
where σf2 < ∞ is the asymptotic variance of the estimator πT (f ). The asymptotic variance characterises
how quickly fluctuations of πT (f ) around π(f ) contract to 0. Consequently, another natural objective is
to choose the process (Xt )t≥0 such that σf2 is as small as possible. It is well known that the asymptotic
variance can be expressed in terms of the solution to an appropriate Poisson equation for the generator
of the dynamics [KLO12]
ˆ
2
− Lφ = f − π(f ), σf =
φ(−Lφ) π(dx).
(6)
Rd
Techniques from the theory of partial differential equations can then be used in order to study the
problem of minimizing the asymptotic variance. This is the approach that was taken in [DLP16], see
also [HNW15], and it will also be used in this paper.
Other measures of performance have also been considered. For example, in [RBS15b, RBS15a],
performance
of the estimator is quantified in terms of the rate functional of the ensemble measure
´
1 t
δ
(dx).
See also [JO10] for a study of the nonasymptotic behaviour of MCMC techniques,
t 0 X(t)
including the case of overdamped Langevin dynamics.
Similar analyses have been carried out for various modifications of (3). Of particular interest to us
are the Riemannian manifold MCMC [GC11] (see the discussion in Section 2) and the nonreversible
Langevin samplers [HHMS93, HHMS05]. As a particular example of the general framework that was introduced in [GC11], we mention the preconditioned overdamped Langevin dynamics that was presented
in [AMO16]
√
dXt = −P ∇V (Xt ) dt + 2P dWt .
(7)
In this paper, the long-time behaviour of as well as the asymptotic variance of the corresponding
estimator πT (f ) are studied and applied to equilibrium sampling in molecular dynamics. A variant of
the standard underdamped Langevin dynamics that can be thought of as a form of preconditioning
and that has been used by practitioners is the mass-tensor molecular dynamics [Ben75].
The nonreversible overdamped Langevin dynamics
√
dXt = − (∇V (Xt ) − γ(Xt )) dt + 2 dWt ,
(8)
where the vector field γ satisfies ∇ · (πγ) = 0 is ergodic (but not reversible) with respect to the target
measure π for all choices of the divergence-free vector field γ. The asymptotic behaviour of this process
was considered for Gaussian diffusions in [HHMS93], where the rate of convergence of the covariance
to equilibrium was quantified in terms of the choice of γ. This work was extended to the case of
non-Gaussian target densities, and consequently for nonlinear SDEs of the form (8) in [HHMS05].
The problem of constructing the optimal nonreversible perturbation, in terms of the L2 (π) spectral
gap for Gaussian target densities was studied in [LNP13] see also [WHC14]. Optimal nonreversible
perturbations with respect to miniziming the asymptotic variance were studied in [DLP16, HNW15].
In all these works it was shown that, in theory (i.e. without taking into account the computational cost
of the discretization of the dynamics (8)), the nonreversible Langevin sampler (8) always outperforms
the reversible one (3), both in terms of converging faster to the target distribution as well as in
terms of having a lower asymptotic variance. It should be emphasized that the two optimality criteria,
maximizing the spectral gap and minimizing the asymptotic variance, lead to different choices for the
nonreversible drift γ(x).
The goal of this paper is to extend the analysis presented in [DLP16, LNP13] by introducing the
following modification of the standard underdamped Langevin dynamics:
dqt = M −1 pt dt − µJ1 ∇V (qt )dt,
dpt = −∇V (qt )dt − νJ2 M −1 pt dt − Γ M −1 pt dt +
√
2Γ dWt ,
(9)
4
where M, Γ ∈ Rd×d are constant strictly positive definite matrices, µ and ν are scalar constants and
J1 , J2 ∈ Rd×d are constant skew-symmetric matrices. As demonstrated in Section 3, the process defined
by (9) will be ergodic with respect to the Gibbs measure π
b defined in (5).
Our objective is to investigate the use of these dynamics for computing ergodic averages of the form
(2). To this end, we study the long time behaviour of (9) and, using hypocoercivity techniques, prove
that the process converges exponentially fast to equilibrium. This perturbed underdamped Langevin
process introduces a number of parameters in addition to the mass and friction tensors which must be
tuned to ensure that the process is an efficient sampler. For Gaussian target densities, we derive estimates for the spectral gap and the asymptotic variance, valid in certain parameter regimes. Moreover,
for certain classes of observables, we are able to identify the choices of parameters which lead to the
optimal performance in terms of asymptotic variance. While these results are valid for Gaussian target
densities, we advocate these particular parameter choices also for more complex target densities. To
demonstrate their efficacy, we perform a number of numerical experiments on more complex, multimodal distributions. In particular, we use the Langevin sampler (9) in order to study the problem of
diffusion bridge sampling.
The rest of the paper is organized as follows. In Section 2 we present some background material
on Langevin dynamics, we construct general classes of Langevin samplers and we introduce criteria for
assessing the performance of the samplers. In Section 3 we study qualitative properties of the perturbed
underdamped Langevin dynamics (9) including exponentially fast convergence to equilibrium and the
overdamped limit. In Section 4 we study in detail the performance of the Langevin sampler (9) for the
case of Gaussian target distributions. In Section 5 we introduce a numerical scheme for simulating the
perturbed dynamics (9) and we present numerical experiments on the implementation of the proposed
samplers for the problem of diffusion bridge sampling. Section 6 is reserved for conclusions and suggestions for further work. Finally, the appendices contain the proofs of the main results presented in
this paper and of several technical results.
2 Construction of General Langevin Samplers
2.1 Background and Preliminaries
In this section we consider estimators of the form (2) where (Xt )t≥0 is a diffusion process given by the
solution of the following Itô SDE:
√
(10)
dXt = a(Xt ) dt + 2b(Xt ) dWt ,
with drift coefficient a : Rd → Rd and diffusion coefficient b : Rd → Rd×m both having smooth
components, and where (Wt )t≥0 is a standard Rm –valued Brownian motion. Associated with (10) is
the infinitesimal generator L formally given by
L f = a · ∇f + Σ : D2 f,
f ∈ Cc2 (Rd )
(11)
where Σ = bb> , D2 f denotes the Hessian of the function f and : denotes the Frobenius inner product.
In general, Σ is nonnegative definite, and could possibly be degenerate. In particular, the infinitesimal
generator (11) need not be uniformly elliptic. To ensure that the corresponding semigroup exhibits
sufficient smoothing behaviour, we shall require that the process (10) is hypoelliptic in the sense of
Hörmander. If this condition holds, then irreducibility of the process (Xt )t≥0 will be an immediate
consequence of the existence of a strictly positive invariant distribution π(x)dx, see [Kli87].
Suppose that (Xt )t≥0 is nonexplosive. It follows from the hypoellipticity assumption that the process
(Xt )t≥0 possesses a smooth transition density p(t, x, y) which is defined for all t ≥ 0 and x, y ∈ Rd ,
[Bas98, Theorem VII.5.6]. The associated strongly continuous Markov semigroup (Pt )t≥0 is defined by
ˆ
Pt f (x) =
p(t, x, y)f (y) dy, t ≥ 0.
(12)
Rd
5
Suppose that (Pt )t≥0 is invariant with respect to the target distribution π(x) dx, i.e.
ˆ
ˆ
Pt f (x)π(x) dx =
f (x)π(x) dx, t ≥ 0,
Rd
Rd
for all bounded continuous functions f . Then (Pt )t≥0 can be extended to a positivity preserving
contraction semigroup on L2 (π) which is strongly continuous. Moreover, the infinitesimal generator
corresponding to (Pt )t≥0 is given by an extension of (L, Cc2 (Rd )), also denoted by L.
Due to hypoellipticity, the probability measure π on Rd has a smooth and positive density with respect
to the Lebesgue measure, and (slightly abusing the notation) we will denote this density also by π.
Let L2 (π) be the Hilbert space of π-square integrable functions equipped with inner product h·, ·iL2 (π)
and norm k·kL2 (π) . We will also make use of the Sobolev space
H 1 (π) = {f ∈ L2 (π) :
k∇f k2L2 (π) < ∞}
(13)
of L2 (π)-functions with weak derivatives in L2 (π), equipped with norm
kf k2H 1 (π) = kf k2L2 (π) + k∇f k2L2 (π).
2.2 A General Characterisation of Ergodic Diffusions
A natural question is what conditions on the coefficients a and b of (10) are required to ensure that
(Xt )t≥0 is invariant with respect to the distribution π(x) dx. The following result provides a necessary
and sufficient condition for a diffusion process to be invariant with respect to a given target distribution.
Theorem 1 Consider a diffusion process (Xt )t≥0 on Rd defined by the unique, non-explosive solution
to the Itô SDE (10) with drift a ∈ C 1 (Rd ; Rd ) and diffusion coefficient b ∈ C 1 (Rd ; Rd×m ). Then
(Xt )t≥0 is invariant with respect to π if and only if
a = Σ∇ log π + ∇ · Σ + γ,
(14)
where Σ = bb> and γ : RD → RD is a continuously differentiable vector field satisfying
∇ · (πγ) = 0.
(15)
If additionally γ ∈ L1 (π), then there exists a skew-symmetric matrix function C : Rd → Rd×d such
that
1
γ = ∇ · (πC) .
π
In this case the infinitesimal generator can be written as an L2 (π)-extension of
Lf =
1
∇ · ((Σ + C)π∇f ) ,
π
f ∈ Cc2 (Rd ).
The proof of this result can be found in [Pav14, Ch. 4]; similar versions of this characterisation can
be found in [Vil09] and [HHMS05]. See also [MCF15].
Remark 1 If (14) holds and L is hypoelliptic it follows immediately that (Xt )t≥0 is ergodic with unique
invariant distribution π(x) dx.
More generally, we can consider Itô diffusions in an extended phase space:
√
dZt = b(Zt ) dt + 2σ(Zt ) dWt ,
(16)
where (Wt )t≥0 is a standard Brownian motion in RN , N ≥ d. This is a Markov process with generator
L = b(z) · ∇z + Σ(z) : Dz2 ,
(17)
6
where Σ(z) = σσ T (z). We will consider dynamics (Zt )t≥0 that is ergodic with respect to πz (z) dz
such that
ˆ
πz (x, y) dy = π(x).
(18)
Rm
where z = (x, y), x ∈ Rd , y ∈ Rm , d + m = N .
There are various well-known choices of dynamics which are invariant (and indeed ergodic) with
respect to the target distribution π(x)dx.
1. Choosing b = I and γ = 0 we immediately recover the overdamped Langevin dynamics (3).
2. Choosing b = I, and γ 6= 0 such that (15) holds gives rise to the nonreversible overdamped
equation defined by (8). As it satisfies the conditions of Theorem 1, it is ergodic with respect to π.
In particular choosing γ(x) = J∇V (x) for a constant skew-symmetric matrix J we obtain
dXt = −(I + J)∇V (Xt ) dt +
√
2 dWt ,
(19)
which has been studied in previous works.
3. Given a target density π > 0 on Rd , if we consider the augmented target density π
b on R2d given in
(5), then choosing
M −1 p
γ((q, p)) =
(20)
−∇V (q)
and
b=
√0
Γ
∈ R2d×d ,
(21)
where M and Γ are positive definite symmetric matrices, the conditions of Theorem 1 are satisfied
for the target density π
b. The resulting dynamics (qt , pt )t≥0 is determined by the underdamped
Langevin equation (4). It is straightforward to verify that the generator is hypoelliptic, [LRS10,
Sec 2.2.3.1], and thus (qt , pt )t≥0 is ergodic.
4. More generally, consider the augmented target density π
b on R2d as above, and choose
M −1 p − µJ1 ∇V (q)
γ((q, p)) =
(22)
−∇V (q) − νJ2 M −1 p
and
b=
√0
Γ
∈ R2d×d ,
(23)
where µ and ν are scalar constants and J1 , J2 ∈ Rd×d are constant skew-symmetric matrices. With
this choice we recover the perturbed Langevin dynamics (9). It is straightforward to check that
(22) satisfies the invariance condition (15), and thus Theorem 1 guarantees that (9) is invariant
with respect to π
b.
5. In a similar fashion, one can introduce an augmented target density on R(m+2)d , with
|p|
b
π
b(q, p, u1 , . . . , um ) ∝ e− 2
where p, q, ui ∈ Rd , for i = 1, . . . , m. Clearly
now define γ : R(m+2)d → R(m+2)d by
´
Rd ×Rmd
2
−
2
u2
1 +...+um
2
−V (q)
,
b
π
b(q, p, u1 , . . . , um ) dp du1 . . . dum = π(q). We
pP
m
−∇q V (q) + j=1 λj uj
−λ1 p
γ(q, p, u1 , . . . , um ) =
..
.
−λm p
7
and b : R(m+2)d → R(m+2)d×(m+2)d by
00
0
0
0 0 √ 0
0
0 0 α1 Id×d √ 0
b(q, p, u1 , . . . , um ) =
α2 Id×d
0
0 0
. .
.
..
.. ..
..
.
00
0
0
...
...
...
...
..
.
...
√
0
0
0
0
..
.
,
αm Id×d
where λi ∈ R and αi > 0, for i = 1, . . . , m. The resulting process (10) is given by
dqt = pt dt
dpt = −∇q V (qt ) dt +
d
X
λj uj (t) dt
j=1
du1t = −λ1 pt dt − α1 u1t dt +
..
.
√
m
dum
t = −λm pt dt − αm ut dt +
2α1 dWt1
√
(24)
2αm dWtm ,
where (Wt1 )t≥0 , . . . (Wtm )t≥0 are independent Rd –valued Brownian motions. This process is ergodic
b
with unique invariant distribution π
b, and under appropriate conditions on V , converges exponentially fast to equilibrium in relative entropy [OP11]. Equation (24) is a Markovian representation
of a generalised Langevin equation of the form
dqt = pt dt
ˆ
t
dpt = −∇q V (qt ) dt −
F (t − s)ps ds + N (t),
0
where N (t) is a mean-zero stationary Gaussian process with autocorrelation function F (t), i.e.
E [N (t) ⊗ N (s)] = F (t − s)Id×d ,
and
F (t) =
m
X
λ2i e−αi |t| .
i=1
6. Let π
e(z) ∝ exp(−Φ(z)) be a positive density on RN where N > d such that
ˆ
π(x) =
RN −d
π
e(x, z) dz,
where (x, y) ∈ Rd × RN −d . Then choosing b = ID×D and γ = 0 we obtain the dynamics
dXt = −∇x Φ(Xt , Yt ) dt +
dYt = −∇y Φ(Xt , Yt ) dt +
√
√
then (Xt , Yt )t≥0 is immediately ergodic with respect to π
e.
2 dWt1
2 dWt2 ,
8
2.3 Comparison Criteria
For a fixed observable f , a natural measure of accuracy of the estimator πT (f ) = t−1
the mean square error (MSE) defined by
´t
0
f (Xs ) ds is
2
M SE(f, T ) := Ex |πT (f ) − π(f )| ,
(25)
where Ex denotes the expectation conditioned on the process (Xt )t≥0 starting at x. It is instructive to
introduce the decomposition M SE(f, T ) = µ2 (f, T ) + σ 2 (f, T ), where
µ(f, T ) = |Ex [πT (f )] − π(f )|
2
σ 2 (f, T ) = Ex |πT (f ) − π(f )| = Var[πT (f )].
and
(26)
Here µ(f, T ) measures the bias of the estimator πT (f ) and σ 2 (f, T ) measures the variance of fluctuations of πT (f ) around the mean.
The speed of convergence to equilibrium of the process (Xt )t≥0 will control both the bias term µ(f, T )
and the variance σ 2 (f, T ). To make this claim more precise, suppose that the semigroup (Pt )t≥0 associated with (Xt )t≥0 decays exponentially fast in L2 (π), i.e. there exist constants λ > 0 and C ≥ 1
such that
kPt g − π(g)kL2 (π) ≤ Ce−λt kg − π(g)kL2 (π) , g ∈ L2 (π).
(27)
Remark 2 If (27) holds with C = 1, this estimate is equivalent to − L having a spectral gap in L2 (π).
Allowing for a constant C > 1 is essential for our purposes though in order to treat nonreversible and
degenerate diffusion processes by the theory of hypocoercivity as outlined in [Vil09].
The following lemma characterises the decay of the bias µ(f, T ) as T → ∞ in terms of λ and C. The
proof can be found in Appendix A.
Lemma 1 Let (Xt )t≥0 be the unique, non-explosive solution of (10), such that X0 ∼ π0 π and
dπ0
dπ0
2
dπ ∈ L (π), where dπ denotes the Radon-Nikodym derivative of π0 with respect to π. Suppose that
the process is ergodic with respect to π such that the Markov semigroup (Pt )t≥0 satisfies (27). Then
for f ∈ L∞ (π),
1
C
dπ0 2
−λT
µ(f, T ) ≤
1−e
kf kL∞ Varπ
.
λT
dπ
The study of the behaviour of the variance σ 2 (f, T ) involves deriving a central limit theorem for
´t
the additive functional 0 f (Xt ) − π(f ) dt. As discussed in [CCG12], we reduce this problem to proving
well-posedness of the Poisson equation
− L χ = f − π(f ),
π(χ) = 0.
(28)
The only complications in this approach arise from the fact that the generator L need not be symmetric
in L2 (π) nor uniformly elliptic. The following result summarises conditions for the well-posedness of
the Poisson equation and it also provides with us with a formula for the asymptotic variance. The
proof can be found in Appendix A.
Lemma 2 Let (Xt )t≥0 be the unique, non-explosive solution of (10) with smooth drift and diffusion
coefficients, such that the corresponding infinitesimal generator is hypoelliptic. Syppose that (Xt )t≥0 is
ergodic with respect to π and moreover, (Pt )t≥0 decays exponentially fast in L2 (π) as in (27). Then
for all f ∈ L2 (π), there exists a unique mean zero solution χ to the Poisson equation (28). If X0 ∼ π,
then for all f ∈ C ∞ (Rd ) ∩ L2 (π)
√
d
T (πT (f ) − π(f )) −−−−→ N (0, 2σf2 ),
(29)
T →∞
where
σf2
is the asymptotic variance defined by
σf2 = hχ, (− L)χiL2 (π) = h∇χ, Σ∇χiL2 (π) .
Moreover, if X0 ∼ π0 where π0 π and
dπ0
dπ
(30)
∈ L2 (π) then (29) holds for all f ∈ C ∞ (Rd ) ∩ L∞ (π).
9
Clearly, observables that only differ by a constant have the same asymptotic variance. In the sequel,
we will hence restrict our attention to observables f ∈ L2 (π) satisfying π(f ) = 0, simplifying expressions (28) and (29). The corresponding subspace of L2 (π) will be denoted by
L20 (π) := {f ∈ L2 (π) : π(f ) = 0}.
(31)
If the exponential decay estimate (27) is satisfied, then Lemma 2 shows that − L is invertible on L20 (π),
so we can express the asymptoptic variance as
σf2 = hf, (− L)−1 f iL2 (π) ,
f ∈ L20 (π).
Let us also remark that from the proof of Lemma 2 it follows that the inverse of L is given by
ˆ ∞
Pt dt.
L−1 =
(32)
(33)
0
We note that the constants C and λ appearing in the exponential decay estimate (27) also control the
speed of convergence of σ 2 (f, T ) to zero. Indeed, it is straightforward to show that if (27) is satisfied,
then the solution χ of (28) satisfies
σf2 = hχ, f − π(f )iL2 (π) ≤
C
2
kf kL2 (π) .
λ
(34)
Lemmas 1 and 2 would suggest that choosing the coefficients Σ and γ to optimize the constants
C and λ in (34) would be an effective means of improving the performance of the estimator πT (f ),
especially since the improvement in performance would be uniform over an entire class of observables.
When this is possible, this is indeed the case. However, as has been observed in [LNP13, HHMS93,
HHMS05], maximising the speed of convergence to equilibrium is a delicate task. As the leading order
term in M SE(f, T ), it is typically sufficient to focus specifically on the asymptotic variance σf2 and
study how the parameters of the SDE (10) can be chosen to minimise σf2 . This study was undertaken
in [DLP16] for processes of the form (8).
3 Perturbation of Underdamped Langevin Dynamics
The primary objective of this work is to compare the performances of the perturbed underdamped
Langevin dynamics (9) and the unperturbed dynamics (4) according to the criteria outlined in Section
2.3 and to find suitable choices for the matrices J1 , J2 , M and Γ that improve the performance of the
sampler. We begin our investigations of (9) by establishing ergodicity and exponentially fast return to
equilibrium, and by studying the overdamped limit of (9). As the latter turns out to be nonreversible
and therefore in principle superior to the usual overdamped limit (3),e.g. [HHMS05], this calculation
provides us with further motivation to study the proposed dynamics.
For the bulk of this work, we focus on the particular case when the target measure is Gaussian,
i.e. when the potential is given by V (q) = 12 q T Sq with a symmetric and positive definite precision matrix S (i.e. the covariance matrix is given by S −1 ). In this case, we advocate the following conditions
for the choice of parameters:
M = S,
Γ = γS,
SJ1 S = J2 ,
µ = ν.
(35a)
(35b)
(35c)
(35d)
Under the above choices (35), we show that the large perturbation limit limµ→∞ σf2 exists and is finite
and we provide an explicit expression for it (see Theorem 5). From this expression, we derive an algorithm for finding optimal choices for J1 in the case of quadratic observables (see Algorithm 2).
10
√
If the friction coefficient is not too small (γ > 2), and under certain mild nondegeneracy conditions, we prove that adding a small perturbation will always decrease the asymptotic variance for
observables of the form f (q) = q · Kq + l · q + C:
d 2
σ
dµ f
=0
and
µ=0
d2 2
σ
dµ2 f
< 0,
µ=0
see Theorem 3. In fact, we conjecture that this statement is true for arbitrary observables f ∈ L2 (π),
but we have not been able to prove this. The dynamics (9) (used in conjunction with the conditions
(35a)-(35c)) proves to be especially effective when the observable is antisymmetric (i.e. when it is invariant under the substitution q 7→ −q) or when it has a significant antisymmetric part. In particular,
in Proposition 5 we show that under certain conditions on the spectrum of J1 , for any antisymmetric
observable f ∈ L2 (π) it holds that limµ→∞ σf2 = 0.
Numerical experiments and analysis show that departing significantly from 35c in fact possibly decreases the performance of the sampler. This is in stark contrast to (8), where it is not possible to
increase the asymptotic variance by any perturbation. For that reason, until now it seems practical to
use (9) as a sampler only when a reasonable estimate of the global covariance of the target distribution
is available. In the case of Bayesian inverse problems and diffusion bridge sampling, the target measure
π is given with respect to a Gaussian prior. We demonstrate the effectiveness of our approach in these
applications, taking the prior Gaussian covariance as S in (35a)-(35c).
Remark 3 In [LNP13, Rem. 3] another modification of (4) was suggested (albeit with the simplifications
Γ = γ · I and M = I):
dqt = (1 − J)M −1 pt dt,
dpt = −(1 + J)∇V (qt )dt − Γ M −1 pt dt +
√
2Γ dWt ,
(36)
J again denoting an antisymmetric matrix. However, under the change of variables p 7→ (1 + J)p̃ the
above equations transform into
dqt = M̃ −1 pt dt,
dp˜t = −∇V (qt )dt − Γ̃ M̃ −1 p̃t dt +
p
2Γ̃ dW̃t ,
where M̃ = (1 + J)−1 M (1 − J)−1 and Γ̃ = (1 + J)−1 Γ (1 − J)−1 . Since any observable f depends only
on q (the p-variables are merely auxiliary), the estimator πT (f ) as well as its associated convergence
characteristics (i.e. asymptotic variance and speed of convergence to equilibrium) are invariant under
this transformation. Therefore, (36) reduces to the underdamped Langevin dynamics (4) and does not
represent an independent approach to sampling. Suitable choices of M and Γ will be discussed in
Section 4.5.
3.1 Properties of Perturbed Underdamped Langevin Dynamics
In this section we study some of the properties of the perturbed underdamped dynamics (9). First,
note that its generator is given by
L = M −1 p · ∇q − ∇q V · ∇p −Γ M −1 p · ∇p + Γ : Dp2 −µJ1 ∇V · ∇q − νJM −1 p · ∇p ,
|
{z
}|
{z
}
{z
}|
Lham
|
Ltherm
{z
L0
(37)
Lpert
}
decomposed into the perturbation Lpert and the unperturbed operator L0 , which can be further split
into the Hamiltonian part Lham and the thermostat (Ornstein-Uhlenbeck) part Ltherm , see [Pav14,
LRS10, LS16].
Lemma 3 The infinitesimal generator L (37) is hypoelliptic.
11
t
u
Proof See Appendix B.
An immediate corollary of this result and of Theorem 1 is that the perturbed underdamped Langevin
process (9) is ergodic with unique invariant distribution π
b given by (5).
As explained in Section 2.3, the exponential decay estimate (27) is crucial for our approach, as in
particular it guarantees the well-posedness of the Poisson equation (28). From now on, we will therefore make the following assumption on the potential V, required to prove exponential decay in L2 (π):
Assumption 1 Assume that the Hessian of V is bounded and that the target measure π(dq) =
1 −V
dq satisfies a Poincare inequality, i.e. there exists a constant ρ > 0 such that
Ze
ˆ
ˆ
|∇φ|2 dπ,
(38)
φ2 dπ ≤ ρ
Rd
Rd
holds for all φ ∈ L20 (π) ∩ H 1 (π).
Sufficient conditions on the potential so that Poincaré’s inequality holds, e.g. the Bakry-Emery criterion, are presented in [BGL13].
Theorem 2 Under Assumption 1 there exist constants C ≥ 1 and λ > 0 such that the semigroup
(Pt )t≥0 generated by L satisfies exponential decay in L2 (π) as in (27).
Proof See Appendix B.
Remark 4 The proof uses the machinery of hypocoercivity developed in [Vil09]. However, it seems
likely that using the framework of [DMS15], the assumption on the boundedness of the Hessian of V
can be substantially weakened.
3.2 The Overdamped Limit
In this section we develop a connection between the perturbed underdamped Langevin dynamics
(9) and the nonreversible overdamped Langevin dynamics (8). The analysis is very similar to the one
presented in [LRS10, Section 2.2.2] and we will be brief. For convenience in this section we will perform
the analysis on the d-dimensional torus Td ∼
= (R/Z)d , i.e. we will assume q ∈ Td . Consider the following
scaling of (9):
1 −1
M pt , dt − µJ1 ∇q V (qt )dt,
1
1
1
1√
dpt = − ∇q V (qt )dt − 2 νJ2 M −1 pt dt − 2 Γ M −1 pt dt +
2Γ dWt ,
dqt =
(39a)
(39b)
valid for the small mass/small momentum regime
M → 2 M,
pt → pt .
Equivalently, those modifications can be obtained from subsituting Γ → −1 Γ and t 7→ −1 t, and so in
the limit as → 0 the dynamics (39) describes the limit of large friction with rescaled time. It turns
out that as → 0, the dynamics (39) converges to the limiting SDE
√
dqt = −(νJ2 + Γ )−1 ∇q V (qt )dt − µJ1 ∇q V (qt )dt + (νJ2 + Γ )−1 2Γ dWt .
(40)
The following proposition makes this statement precise.
Proposition 1 Denote by (qt , pt ) the solution to (39) with (deterministic) initial conditions (q0 , p0 ) =
(qinit , pinit ) and by qt0 the solution to (40) with initial condition q00 = qinit . For any T > 0, (qt )0≤t≤T
converges to (qt0 )0≤t≤T in L2 (Ω, C([0, T ]), Td ) as → 0, i.e.
lim E sup |qt − qt0 |2 = 0.
→0
0≤t≤T
12
Remark 5 By a refined analysis, it is possible to get information on the rate of convergence; see,
e.g. [PS03, PS05].
The limiting SDE (40) is nonreversible due to the term −µJ1 ∇q V (qt )dt and also because the matrix
(νJ2 + Γ )−1 is in general neither symmetric nor antisymmetric. This result, together with the fact that
nonreversible perturbations of overdamped Langevin dynamics of the form (8) are by now well-known
to have improved performance properties, motivates further investigation of the dynamics (9).
Remark 6 The limit we described in this section respects the invariant distribution, in the sense that
the limiting dynamics (40) is ergodic with respect to the measure π(dq) = Z1 e−V dq. To see this, we
have to check that (we are using the notation ∇ instead of ∇q )
L† (e−V ) = −∇ · (νJ2 + Γ )−1 ∇e−V + ∇ · (µJ1 ∇e−V ) + ∇ · (νJ2 + Γ )−1 Γ (−νJ2 + Γ )−1 ∇e−V = 0,
where L† refers to the L2 (Rd )-adjoint of the generator of (40), i.e. to the associated Fokker-Planck
operator. Indeed, the term ∇ · (µe−V J1 ∇V ) vanishes because of the antisymmetry of J1 . Therefore, it
remains to show that
∇ · (νJ2 + Γ )−1 Γ (−νJ2 + Γ )−1 − (νJ2 + Γ )−1 ∇e−V = 0,
i.e. that the matrix (νJ2 + Γ )−1 Γ (−νJ2 + Γ )−1 − (νJ2 + Γ )−1 is antisymmetric. Clearly, the first term
is symmetric and furthermore it turns out to be equal to the symmetric part of the second term:
1
1
(νJ2 + Γ )−1 + (−νJ2 + Γ )−1 = = (νJ2 + Γ )−1 (−νJ2 + Γ )(−νJ2 + Γ )−1
2
2
+(νJ2 + Γ )−1 (νJ2 + Γ )(−νJ2 + Γ )−1
= (νJ2 + Γ )−1 Γ (−νJ2 + Γ )−1 ,
so π is indeed invariant under the limiting dynamics (40).
4 Sampling from a Gaussian Distribution
In this section we study in detail the performance of the Langevin sampler (9) for Gaussian target
densities, first considering the case of unit covariance. In particular, we study the optimal choice for the
parameters in the sampler, the exponential decay rate and the asymptotic variance. We then extend
our results to Gaussian target densities with arbitrary covariance matrices.
4.1 Unit covariance - small perturbations
In our study of the dynamics given by (9) we first consider the simple case when V (q) = 21 |q|2 , i.e. the
task of sampling from a Gaussian measure with unit covariance. We will assume M = I, Γ = γI and
J1 = J2 =: J (so that the q− and p−dynamics are perturbed in the same way, albeit posssibly with
different strengths µ and ν). Using these simplifications, (9) reduces to the linear system
dqt = pt dt − µJqt dt,
dpt = −qt dt − νJpt dt − γpt dt +
p
2γdWt .
The above dynamics are of Ornstein-Uhlenbeck type, i.e. we can write
p
dXt = −BXt dt + 2QdW̄t
(41)
(42)
with X = (q, p)T ,
µJ
−I
B=
I γI + νJ
0 0
Q=
0 γI
,
(43)
(44)
13
and (W̄t )t≥0 denoting a standard Wiener process on R2d . The generator of (42) is then given by
L = −Bx · ∇ + ∇T Q∇.
(45)
We will consider quadratic observables of the form
f (q) = q · Kq + l · q + C,
d
2
with K ∈ Rd×d
sym , l ∈ R and C ∈ R, however it is worth recalling that the asymptotic variance σf
does not depend on C. We also stress that f is assumed to be independent of p as those extra degrees
of freedom are merely auxiliary. Our aim will be to study the associated asymptotic variance σf2 , see
equation (30), in particular its dependence on the parameters µ and ν. This dependence is encoded in
the function
R2 → R
Θ:
(µ, ν) 7→ σf2 ,
assuming a fixed observable f and perturbation matrix J. In this section we will focus on small
perturbations, i.e. on the behaviour of the function Θ in the neighbourhood of the origin. Our main
theoretical tool will be the Poisson equation (28), see the proofs in Appendix C. Anticipating the
forthcoming analysis, let us already state our main result, showing that in the neighbourhood of the
origin, the function Θ has favourable properties along the diagonal µ = ν (note that the perturbation
strengths in the first and second line of (46) coincide):
Theorem 3 Consider the dynamics
dqt = pt dt − µJqt dt,
dpt = −qt dt − µJpt dt − γpt dt +
p
2γdWt ,
(46)
√
with γ > 2 and an observable of the form f (q) = q · Kq + l · q + C. If at least one of the conditions
[J, K] 6= 0 and l ∈
/ ker J is satisfied, then the asymptotic variance√of the unperturbed sampler is at a
local maximum independently of K and J (and γ, as long as γ > 2), i.e.
∂µ σf2
µ=0
∂µ2 σf2
µ=0
=0
and
< 0.
4.1.1 Purely quadratic observables
Let us start with the case l = 0, i.e. f (q) = q · Kq + C. The following holds:
Proposition 2 The function Θ satisfies
∇Θ|(µ,ν)=(0,0) = 0
(47)
and
Hess Θ|(µ,ν)=(0,0) =
Proof See Appendix C.
−(γ +
1
γ3
+ γ 3 ) Tr(JKJK) − Tr(J 2 K 2 )
( γ13 + γ1 − γ) Tr(J 2 K 2 )
2
1
1
− γ Tr(JKJK)
+(− γ 3 + γ + γ) Tr(JKJK)
.
1
1
2 2
( γ13 − γ1 ) Tr(J 2 K 2 )
( γ 3 + γ − γ) Tr(J K )
1
1
1
1
+(− γ 3 + γ + γ) Tr(JKJK)
−( γ 3 + γ ) Tr(JKJK)
(48)
t
u
14
The above proposition shows that the unperturbed dynamics represents a critical point of Θ, independently of the choice of K, J and γ. In general though, Hess Θ|(µ,ν)=(0,0) can have both positive
and negative eigenvalues. In particular, this implies that an unfortunate choice of the perturbations
will actually increase the asymptotic variance of the dynamics (in contrast to the situation of perturbed overdamped Langevin dynamics, where any nonreversible perturbation leads to an improvement in asymptotic variance as detailed in [HNW15] and [DLP16]). Furthermore, the nondiagonality
of Hess Θ|(µ,ν)=(0,0) hints at the fact that the interplay of the perturbations J1 and J2 (or rather their
relative strengths µ and ν) is crucial for the performance of the sampler and, consequently, the effect
of these perturbations cannot be satisfactorily studied independently.
Example 1 Assuming J 2 = −I and [J, K] = 0 it follows that
∂µ2 Θ
µ=0
= ∂ν2 Θ
µ=0
=
1
Tr(K 2 ) > 0,
γ
for all nonzero K. Therefore in this case, a small perturbation of J1 only or J2 only will increase the
asymptotic variance, uniformly over all choices of K and γ.
However, it turns out that it is possible to construct an improved sampler by combining both perturbations in a suitable way. Indeed, the function Θ can be seen to have good properties along µ = ν. We
set µ(s) = s, ν(s) := s and compute
d2
Θ
ds2
= (1, 1) · Hess Θ|(µ,ν)=(0,0) (1, 1)
s=0
2
1
= −(γ + 3 + γ 3 ) Tr(JKJK) − Tr(J 2 K 2 ) − Tr(JKJK)
γ
γ
1
1
1
1
+ 2 · ( 3 + − γ) Tr(J 2 K 2 ) + (− 3 + + γ) Tr(JKJK)
γ
γ
γ
γ
1
1
1
1
+ ( 3 − ) Tr(J 2 K 2 ) − ( 3 + ) Tr(JKJK)
γ
γ
γ
γ
4
1
= γ − 3 − γ3 −
· (Tr(JKJK) − Tr(J 2 K 2 )) ≤ 0.
γ
γ
The last inequality follows from
γ−
4
1
− γ3 − < 0
γ3
γ
and
Tr(JKJK) − Tr(J 2 K 2 ) ≥ 0
(both inequalities are proven in the Appendix, Lemma 10), where the last inequality is strict if [J, K] 6=
0. Consequently, choosing both perturbations to be of the same magnitude (µ = ν) and assuring that
J and K do not commute always leads to a smaller asymptotic variance, independently of the choice
of K, J and γ. We state this result in the following corrolary:
Corollary 1 Consider the dynamics
dqt = pt dt − µJqt dt,
dpt = −qt dt − µJpt dt − γpt dt +
p
2γdWt ,
(49)
and a quadratic observable f (q) = q · Kq + C. If [J, K] 6= 0, then the asymptotic variance of the
unperturbed sampler is at a local maximum independently of K, J and γ, i.e.
∂µ σf2
µ=0
∂µ2 σf2
µ=0
=0
and
< 0.
15
Remark 7 As we will see in Section 4.3, more precisely Example 3, if [J, K] = 0, the asymptotic
variance is constant as a function of µ, i.e. the perturbation has no effect.
Example 2 Let us set µ(s) := s and ν(s) := −s (this corresponds to a small perturbation with
J∇V (qt )dt in q and −Jpt dt in p). In this case we get
d2 Θ
ds2
s=0
1 γ 4 + 3γ 2 + 5
Tr(J 2 K 2 )
=− ·
Tr(JKJK) − Tr(J 2 K 2 ) −4
,
2
γ
γ
|
{z
}|
{z
}
≤0
≥0
which changes its sign depending on J and K as the first term is negative and the second is positive.
Whether the perturbation improves the performance of the sampler in terms of asymptotic variance
therefore depends on the specifics of the observable and the perturbation in this case.
4.1.2 Linear observables
Here we consider the case K = 0, i.e. f (q) = l · q + C, where again l ∈ Rd and C ∈ R. We have the
following result:
Proposition 3 The function Θ satisfies
∇Θ|(µ,ν)=(0,0) = 0
and
Hess Θ|(µ,ν)=(0,0) =
−2γ 3 |Jl|2 2γ|Jl|2
2γ|Jl|2
0
.
t
u
Proof See Appendix C.
Let us assume that l ∈
/ ker J. Then ∂µ2 Θ|µ,ν=0 < 0, and hence Theorem 3 shows that a small perturbation by µJ∇V (qt )dt alone always results in an improvement of the asymptotic variance. However,
if we combine both perturbations µJ∇V (qt )dt and νJpt dt, then the effect depends on the sign of
−2γ 3 |Jl|2 2γ|Jl|2
µ
µν
= −(2µ2 γ 3 − 4µνγ)|Jl|2 .
ν
2γ|Jl|2
0
This will be negative if µ and ν have different signs, and also if they have the same sign and γ is big
enough. Following Section 4.1.1, we require µ = ν. We then end up with the requirement
2µ2 γ 3 − 4µνγ > 0,
√
which is satisfied if γ > 2
Summarizing the results of this section, for observables of the form f (q)√= q · Kq + l · q + C,
choosing equal perturbations (µ = ν) with a sufficiently strong damping (γ > 2) always leads to an
improvement in asymptotic variance under the conditions [J, K] 6= 0 and l ∈
/ ker J. This is finally the
content of Theorem 3.
Let us illustrate the results of this section by plotting the asymptotic variance as a function of the
perturbation strength µ (see Figure 1), making the choices d = 2, l = (1, 1)T ,
20
0 1
K=
and J =
.
(50)
01
−1 0
The asymptotic variance has been computed according to (114), using (113a) and (113b) from Appendix C. The graphs confirm the results summarized in Corollary 3 concerning the asymptotic variance
in the neighbourhood of the unperturbed dynamics (µ = 0). Additionally, they give an impression of
the global behaviour, i.e. for larger values of µ.
Figures 1a, 1b and 1c show the asymptotic variance associated with the quadratic observable
f (q) = q · Kq. In accordance with Corollary 1, the asymptotic variance is at a local maximum at zero
perturbation in the case µ = ν (see Figure 1a). For increasing perturbation strength, the graph shows
that it decays monotonically and reaches a limit for µ → ∞ (this limiting behaviour will be explored
16
Quadratic observable, µ=0.9ν, γ=2.5
29
28.5
28.5
asymptotic variance σ2f
asymptotic variance σ2f
Quadratic observable, µ=ν, γ=2.5
29
28
27.5
27
28
27.5
27
26.5
26.5
26
−5
−4
−3
−2
−1
0
1
2
3
4
26
−5
5
−4
−3
−2
(a) Equal perturbations: µ = ν
−1
0
1
2
3
4
5
perturbation strength µ
perturbation strength µ
(b) Approximately equal perturbations: µ = 0.9ν
Linear observable, µ=ν, γ=2.5
10
Quadratic observable, µ=−ν, γ=2.5
400
9
350
asymptotic variance σ2f
8
asymptotic variance σ2f
300
250
200
150
7
6
5
4
3
2
100
1
50
0
−5
0
−5
−4
−3
−2
−1
0
1
2
3
4
5
perturbation strength µ
−4
−3
−2
−1
0
1
2
3
4
5
perturbation strength µ
(d) Equal perturbations: µ = ν (sufficiently large friction γ)
(c) Opposing perturbations: µ = −ν
Linear observable, µ=ν, γ=1
6
asymptotic variance σ2f
5
4
3
2
1
0
−5
−4
−3
−2
−1
0
1
2
3
4
5
perturbation strength µ
(e) Equal perturbations: µ = ν (small friction γ)
Fig. 1: Asymptotic variance for linear and quadratic observables, depending on relative perturbation
and friction strengths
17
analytically in Section 4.3). If the condition µ = ν is only approximately satisfied (Figure 1b), our
numerical examples still exhibits decaying asymptotic variance in the neighbourhood of the critical
point. In this case, however, the asymptotic variance diverges for growing values of the perturbation
µ. If the perturbations are opposed (µ = −ν) as in Example 2, it is possible for certain observables
that the unperturbed dynamics represents a global minimum. Such a case is observed in Figure 1c.
In Figures
1d and 1e the observable f (q) = l · q is considered. If the damping is sufficiently strong
√
(γ > 2), the unperturbed dynamics is at a local maximum of the asymptotic variance (Figure 1d).
Furthermore, the asymptotic variance approaches zero as µ → ∞ (for a theoretical explanation see
again Section 4.3). The graph in Figure 1e shows that the assumption of γ not being too small cannot
be dropped from Corollary 3. Even in this case though the example shows decay of the asymptotic
variance for large values of µ.
4.2 Exponential decay rate
Let us denote by λ∗ the optimal exponential decay rate in (27), i.e.
λ∗ = sup{λ > 0 | There exists C ≥ 1 such that (27) holds}.
(51)
Note that λ∗ is well-defined and positive by Theorem 2. We also define the spectral bound of the
generator L by
s(L) = inf(Re σ(− L) \ {0}).
(52)
In [MPP02] it is proven that the Ornstein-Uhlenbeck semigroup (Pt )t≥0 considered in this section
is differentiable (see Proposition 2.1). In this case (see Corollary 3.12 of [EN00]), it is known that
the exponential decay rate and the spectral bound coincide, i.e. λ∗ = s(L), whereas in general only
λ∗ ≤ s(L) holds. In this section we will therefore analyse the spectral properties of the generator (45).
In particular, this leads to some intuition of why choosing equal perturbations (µ = ν) is crucial for
the performance of the sampler.
In [MPP02] (see also [OPPS12]), it was proven that the spectrum of L as in (45) in L2 (π
b) is given
by
)
( r
X
nj λj : nj ∈ N, λj ∈ σ(B) .
(53)
σ(L) = −
j=1
Note that σ(L) only depends on the drift matrix B. In the case where µ = ν, the spectrum of B can
be computed explicitly.
Lemma 4 Assume µ = ν. Then the spectrum of B is given by
r
r
γ 2
γ
γ 2
γ
− 1 + |λ ∈ σ(J)} ∪ {µλ −
− 1 + |λ ∈ σ(J) .
σ(B) = µλ +
2
2
2
2
Proof We will compute σ B − γ2 I and then use the identity
n
γ
γ o
σ(B) = λ + |λ ∈ σ B − I
.
2
2
We have
γ
γ
γ
det B − I − λI = det µJ − I − λI µJ + I − λI + I
2
2
2
γ 2
2
= det (µJ − λI) −
I +I
2
!
!!
r
r
γ 2
γ 2
= det
µJ − λI +
− 1I · µJ − λI −
− 1I
2
2
!
!
r
r
γ 2
γ 2
= det µJ − λI +
− 1I · det µJ − λI −
− 1I ,
2
2
(54)
(55)
18
4
8=4
3
2
8=3
1
0
8=2
-1
-2
8=1
-3
-4
8=0
0
(a) σ(− L) in the case µ = ν. The arrows indicate
the movement of the spectrum as the perturbation
strength µ increases.
0.5
1
1.5
2
(b) σ(B) in the case J1 = 0, i.e. the dynamics is
only perturbed by −νJ2 pdt. The arrows indicate
the movement of the eigenvalues as ν increases. .
Fig. 2: Effects of the perturbation on the spectra of − L and B.
where I is understood to denote the identity matrix of appropriate dimension. The above quantity is
zero if and only if
r
γ 2
λ−
− 1 ∈ σ(µJ)
2
or
r
γ 2
λ+
− 1 ∈ σ(µJ).
2
t
u
Together with (55), the claim follows.
Using formula (53), in Figure 2a we show a sketch of the spectrum σ(−L) for the case of equal
perturbations (µ = ν) with the convenient choices n = 1 and γ = 2. Of course, the eigenvalue at
0 is associated to the invariant measure since σ(−L) = σ(−L† ) and L† π
b = 0, where L† denotes
the Fokker-Planck operator, i.e. the L2 (R2d )-adjoint of L. The arrows indicate the movement of the
eigenvalues as the perturbation µ increases in accordance with Lemma 4. Clearly, the spectral bound
of L is not affected by the perturbation. Note that the eigenvalues on the real axis stay invariant
under the perturbation. The subspace of L20 (π
b) associated to those will turn out to be crucial for the
characterisation of the limiting asymptotic variance as µ → ∞.
To illustrate the suboptimal properties of the perturbed dynamics when the perturbations are not
equal, we plot the spectrum of the drift matrix σ(B) in the case when the dynamics is only perturbed
by the term νJ2 pdt (i.e. µ = 0) for n = 2, γ = 2 and
J2 =
0 −1
1 0
,
(56)
(see Figure 2b). Note that the full spectrum σ(−L) can be inferred from (53). For ν = 0 we have that
the spectrum σ(B) only consists of the (degenerate) eigenvalue 1. For increasing ν, the figure shows
that the degenerate eigenvalue splits up into four eigenvalues, two of which get closer to the imaginary
axis as ν increases, leading to a smaller spectral bound and therefore to a decrease in the speed of
convergence to equilibrium. Figures (2a) and (2b) give an intuitive explanation of why the fine-tuning
of the perturbation strengths is crucial.
19
4.3 Unit covariance - large perturbations
In the previous subsection we observed that for the particular perturbation J1 = J2 and µ = ν, i.e.
dqt = pt dt − µJqt dt
dpt = −qt dt − µJpt dt − γpt dt +
p
2γ dWt ,
(57)
the perturbed Langevin dynamics demonstrated an improvement in performance for µ in a neighbourhood of 0, when the observable is linear or quadratic. Recall that this dynamics is ergodic with respect
to a standard Gaussian measure π
b on R2d with marginal π with respect to the q–variable. In the following we shall consider only observables that do not depend on p. Moreover, we assume without loss
of generality that π(f ) = 0. For such an observable we will write f ∈ L20 (π) and assume the canonical
embedding L20 (π) ⊂ L2 (π
b). The infinitesimal generator of (57) is given by
L = p · ∇q − q · ∇p + γ(−p · ∇p + ∆p ) +µ (−Jq · ∇q − Jp · ∇p ) =: L0 + µA,
{z
}
|
{z
}
|
L0
(58)
A
where we have introduced the notation Lpert = µA. In the sequel, the adjoint of an operator B in
L2 (π
b) will be denoted by B ∗ . In the rest of this section we will make repeated use of the Hermite
polynomials
gα (x) = (−1)|α| e
|x|2
2
∇α e −
|x|2
2
,
α ∈ N2d ,
(59)
2d
invoking the notation x = (q, p) ∈ R . For m ∈ N0 define the spaces
Hm = span{gα : |α| = m},
with induced scalar product
hf, gim := hf, giL2 (πb) ,
f, g ∈ Hm .
The space (Hm , h·, ·im ) is then a real Hilbert space with (finite) dimension
m + 2d − 1
dim Hm =
.
m
The following result (Theorem 4) holds for operators of the form
L = −Bx · ∇ + ∇T Q∇,
(60)
where the quadratic drift and diffusion matrices B and Q are such that L is the generator of an
ergodic stochastic process (see [AE14, Definition 2.1] for precise conditions on B and Q that ensure
ergodicity). The generator of the SDE (57) is given by (60) with B and Q as in equations (43) and
(44), respectively. The following result provides an orthogonal decomposition of L2 (π
b) into invariant
subspaces of the operator L.
Theorem 4 [AE14, Section 5]. The following holds:
(a) The space L2 (π
b) has a decomposition into mutually orthogonal subspaces:
M
L2 (π
b) =
Hm .
m∈N0
(b) For all m ∈ N0 , Hm is invariant under L as well as under the semigroup (e−tL )t≥0 .
(c) The spectrum of L has the following decomposition:
[
σ(L) =
σ(L|Hm ),
m∈N0
where
σ(L|Hm ) =
( 2d
X
j=1
)
αj λj : |α| = m, λj ∈ σ(B) .
(61)
20
Remark 8 Note that by the ergodicity of the dynamics, ker L consists of constant functions and so
ker L = H0 . Therefore, L20 (π
b) has the decomposition
L20 (π
b) = L2 (π
b)/ ker L =
M
Hm .
m≥1
Our first main result of this section is an expression for the asymptotic variance in terms of the
unperturbed operator L0 and the perturbation A:
Proposition 4 Let f ∈ L20 (π) (so in particular f = f (q)). Then the associated asymptotic variance
is given by
σf2 = hf, −L0 (L20 + µ2 A∗ A)−1 f iL2 (πb) .
(62)
Remark 9 The proof of the preceding Proposition will show that L20 + µ2 A∗ A is invertible on L20 (π
b)
and that (L20 + µ2 A∗ A)−1 f ∈ D(L0 ) for all f ∈ L20 (π
b).
To prove Proposition 4 we will make use of the generator with reversed perturbation
L− = L0 − µA
and the momentum flip operator
P : L20 (π
b) → L20 (π
b)
φ(q, p) 7→ φ(q, −p).
Clearly, P 2 = I and P ∗ = P . Further properties of L0 , A and the auxiliary operators L− and P are
gathered in the following lemma:
Lemma 5 For all φ, ψ ∈ C ∞ (R2d ) ∩ L2 (π
b) the following holds:
(a) The generator L0 is symmetric in L2 (π
b) with respect to P :
hφ, P L0 P ψiL2 (πb) = hL0 φ, ψiL2 (πb) .
(b) The perturbation A is skewadjoint in L2 (π
b):
A∗ = −A.
(c) The operators L0 and A commute:
[L0 , A]φ = 0.
(d) The perturbation A satisfies
P AP φ = Aφ.
(e) L and L− commute,
[L, L− ]φ = 0,
and the following relation holds:
hφ, P LP ψiL2 (πb) = hL− φ, ψiL2 (πb) .
(63)
(f ) The operators L, L0 , L− , A and P leave the Hermite spaces Hm invariant.
Remark 10 The claim (c) in the above lemma is crucial for our approach, which itself rests heavily on
the fact that the q− and p−perturbations match (J1 = J2 ).
21
Proof (of Lemma 5) To prove (a), consider the following decomposition of L0 as in (37):
L0 = p · ∇q − q · ∇p + γ (−p · ∇p + ∆p ) .
{z
} |
{z
}
|
Lham
Ltherm
By partial integration it is straightforward to see that
hφ, Lham ψiL2 (πb) = −hLham φ, ψiL2 (πb)
and
hφ, Ltherm ψiL2 (πb) = hLtherm φ, ψiL2 (πb) ,
for all φ, ψ ∈ C ∞ (R2d ) ∩ L2 (π
b), i.e. Lham and Ltherm are antisymmetric and symmetric in L2 (π
b)
respectively. Furthermore, we immediately see that P Lham P φ = −Lham φ and P Ltherm P φ = Ltherm φ,
so that
hφ, P L0 P ψiL2 (πb) = hφ, −Lham ψ + Ltherm ψiL2 (πb) = hL0 φ, ψiL2 (πb) .
We note that this result holds in the more general setting of Section 3 for the infinitesimal generator
(37). The claim (b) follows by noting that the flow vector field b(q, p) = (−Jq, −Jp) associated to
A is divergence-free with respect to π
b, i.e. ∇ · (π
bb) = 0. Therefore, A is the generator of a strongly
continuous unitary semigroup on L2 (π
b) and hence skewadjoint by Stone’s Theorem. To prove (c) we
use the decomposition L0 = Lham + Ltherm to obtain
[L0 , A]φ = [Lham , A]φ + [Ltherm , A]φ,
φ ∈ C ∞ (R2d ) ∩ L2 (π
b).
(64)
The first term of (64) gives
[p · ∇q − q · ∇p , −Jq · ∇q − Jp · ∇p ]φ
= [p · ∇q , −Jq · ∇q ] + [p · ∇q , −Jp · ∇p ] + [−q · ∇p , −Jq · ∇q ]
+ [−q · ∇p , −Jp · ∇p ] φ
= Jp · ∇q φ − Jp · ∇q φ + Jq · ∇p φ − Jq · ∇p φ = 0.
The second term of (64) gives
[−p · ∇p + ∆p , A]φ = [−p · ∇p , −Jp · ∇p ]φ + [∆p , −Jp · ∇p ]φ,
(65)
since Jq · ∇q commutes with p · ∇p + ∆p . Both terms in (65) are clearly zero due the antisymmetry of
J and the symmetry of the Hessian Dp2 φ.
The claim (d) follows from a short calculation similar to the proof of (a). To prove (e), note that
the fact that L and L− commute follows from (c), as
[L, L− ]φ = [L0 + µA, L0 − µA]φ = −2µ[L0 , A]φ = 0,
φ ∈ C ∞ ∩ L2 (π
b),
while the property hφ, P L0 P ψiL2 (πb) = hL− φ, ψiL2 (πb) follows from properties (a), (b) and (d). Indeed,
hφ, P LP ψiL2 (πb) = hφ, P (L0 + µA)P ψiL2 (πb) = hφ, (P L0 P + µA) ψiL2 (πb)
= h(L0 − µA)φ, ψiL2 (πb) = hL− φ, ψiL2 (πb) ,
as required. To prove (f) first notice that L, L0 and L− are of the form (60) and therefore leave the
spaces Hm invariant by Theorem 4. It follows immediately that also A leaves those spaces invariant.
The fact that P leaves the spaces Hm invariant follows directly by inspection of (59).
t
u
Now we proceed with the proof of Proposition 4:
22
Proof (of Proposition 4) Since the potential V is quadratic, Assumption 1 clearly holds and thus
Lemma 2 ensures that L and L− are invertible on L20 (π
b) with
ˆ ∞
L−1 =
e−tL dt,
(67)
0
and analogously for L−1
− . In particular, the asymptotic variance can be written as
σf2 = hf, (−L)−1 f iL2 (πb) .
Due to the respresentation (67) and Theorem 4, the inverses of L and L− leave the Hermite spaces
Hm invariant. We will prove the claim from Proposition 4 under the assumption that P f = f which
includes the case f = f (q). For the following calculations we will assume f ∈ Hm for fixed m ≥ 1.
Combining statement (f) with (a) and (e) of Lemma 5 (and noting that Hm ⊂ C ∞ (R2d ) ∩ L2 (π
b)) we
see that
P LP = L∗−
(68)
and
P L0 P = L∗0
(69)
when restricted to Hm . Therefore, the following calculations are justified:
1
hf, (−L)−1 f iL2 (πb) + hf, (−L∗ )−1 f iL2 (πb)
2
1
= hf, (−L)−1 f iL2 (πb) + hP f, (−L∗ )−1 P f iL2 (πb)
2
1
= hf, (−L)−1 f iL2 (πb) + hf, (−L− )−1 f iL2 (πb)
2
1
= hf, (−L)−1 + (−L− )−1 f iL2 (πb) ,
2
hf, (−L)−1 f iL2 (πb) =
where in the third line we have used the assumption P f = f and in the fourth line the properties
P 2 = I, P ∗ = P and equation (68). Since L and L− commute on Hm according to Lemma 5(e),(f) we
can write
(−L)−1 + (−L− )−1 = L− (−LL− )−1 + L(−LL− )−1 = −2L0 (LL− )−1
for the restrictions on Hm , using L + L− = 2L0 . We also have
LL− = (L0 + µA)(L0 − µA) = L20 + µ2 A∗ A,
since L0 and A commute. We thus arrive at the formula
σf2 = hf, −L0 (L20 + µ2 A∗ A)−1 f iL2 (πb) ,
f ∈ Hm .
(70)
Now since (L20 + µ2 A∗ A)−1 f = (LL− )−1 f ∈ D(L0 ) for all f ∈ L2 (π
b), it follows that the operator
−L0 (L20 + µ2 A∗ A)−1 is bounded. We L
can therefore extend formula (70) to the whole of L2 (π
b) by
continuity, using the fact that L20 (π
b) = m≥1 Hm .
t
u
Applying Proposition 4 we can analyse the behaviour of σf2 in the limit of large perturbation strength
µ → ∞. To this end, we introduce the orthogonal decomposition
L20 (π) = ker(Jq · ∇q ) ⊕ ker(Jq · ∇q )⊥ ,
(71)
where Jq · ∇q is understood as an unbounded operator acting on L20 (π), obtained as the smallest
closed extension of Jq · ∇q acting on Cc∞ (Rd ). In particular, ker(Jq · ∇q ) is a closed linear subspace of
L20 (π). Let Π denote the L20 (π)-orthogonal projection onto ker(Jq · ∇q ). We will write σf2 (µ) to stress
the dependence of the asymptotic variance on the perturbation strength. The following result shows
that for large perturbations, the limiting asymptotic variance is always smaller than the asymptotic
variance in the unperturbed case. Furthermore, the limit is given as the asymptotic variance of the
projected observable Πf for the unperturbed dynamics.
23
Theorem 5 Let f ∈ L20 (π), then
2
lim σf2 (µ) = σΠf
(0) ≤ σf2 (0).
µ→∞
Remark 11 Note that the fact that the limit exists and is finite is nontrivial. In particular, as Figures
1b and 1c demonstrate, it is often the case that limµ→∞ σf2 (µ) = ∞ if the condition µ = ν is not
satisfied.
Remark 12 The projection Π onto ker(Jq · ∇q ) can be understood in terms of Figure 2a. Indeed,
the eigenvalues on the real axis (highlighted by diamonds) are not affected by the perturbations. Let
us denote by Π̃ the projection onto the span of the eigenspaces of those eigenvalues. As µ → ∞,
the limiting asymptotic variance is given as the asymptotic variance associated to the unperturbed
dynamics of the projection Π̃f . If we denote by Π0 the projection of L2 (π
b) onto L20 (π), then we have
that ΠΠ0 = Π0 Π̃.
Proof (of Theorem 5) Note that L0 and A∗ A leave the Hermite spaces Hm invariant and their restrictions to those spaces commute (see Lemma 5, (b), (c) and (f)). Furthermore, as the Hermite
∗
spaces Hm are finite-dimensional, those operators have discrete
Lspectrum. As A A is nonnegative self2
adjoint, there exists an orthogonal decomposition
L0 (π) =
iW
L
Li into eigenspaces of the operator
−L0 (L20 + µ2 A∗ A)−1 , the decomposition
Wi being finer then
Hm in the sense that every Wi is
a subspace of some Hm . Moreover,
−L0 (L20 + µ2 A∗ A)−1 |Wi = −L0 (L20 + µ2 λi )−1 |Wi ,
where λi ≥ 0 is the eigenvalue of A∗ A associated to the subspace Wi . Consequently, formula (62) can
be written as
X
σf2 =
hfi , −L0 (L20 + µ2 λi )−1 fi iL2 (πb) ,
(72)
i
where f = i fi and fi ∈ Wi . Let us assume now without loss of generality that W0 = ker A∗ A, so in
particular λ0 = 0. Then clearly
P
lim σf2 = 2hf0 , −L0 (L20 )−1 f0 iL2 (πb) = 2hf0 , (−L0 )−1 f0 iL2 (πb) = σf20 (0).
µ→∞
2
Now note that W0 = ker A∗ A = ker A due to ker A∗ = (im A)⊥ . It remains to show that σΠf
(0) ≤
σf2 (0). To see this, we write
σf2 (0) = 2hf, (−L0 )−1 f iL2 (πb) = 2hΠf + (1 − Π)f, (−L0 )−1 Πf + (1 − Π)f iL2 (πb)
2
2
= σΠf
(0) + σ(1−Π)f
(0) + R,
where
R = 2hΠf, (−L0 )−1 (1 − Π)f iL2 (πb) + 2h(1 − Π)f, (−L0 )−1 Πf iL2 (πb) .
Note that since we only consider observables that do not depend on p, Πf ∈ ker(Jq·∇
L
Lq ) and (1−Π)f ∈
−1
W
.
Since
L
commutes
with
A,
it
follows
that
(−L
)
leaves
both
W
and
i
0
0
0
i≥1
i≥1 Wi invariant.
Therefore, as the latter spaces are orthogonal to each other, it follows that R = 0, from which the
result follows.
t
u
From Theorem 5 it follows that in the limit as µ → ∞, the asymptotic variance σf2 (µ) is not decreased
by the perturbation if f ∈ ker(Jq · ∇q ). In fact, this result also holds true non-asymptotically, i.e.
observables in ker(Jq · ∇q ) are not affected at all by the perturbation:
Lemma 6 Let f ∈ ker(Jq · ∇q ). Then
σf2 (µ) = σf2 (0)
for all µ ∈ R.
Proof From f ∈ ker(Jq · ∇q ) it follows immediately that f ∈ ker A∗ A. Then the claim follows from
the expression (72).
t
u
24
d
Example 3 Recall the case of observables of the form f (q) = q · Kq + l · q + C with K ∈ Rd×d
sym , l ∈ R
and C ∈ R from Section 4.1. If [J, K] = 0 and l ∈ ker J, then f ∈ ker(Jq · ∇q ) as
Jq · ∇q (q · Kq + l · q + C) = 2Jq · Kq + Jq · l = q · (KJ − JK)q − q · Jl = 0.
From the preceding lemma it follows that σf2 (µ) = σf2 (0) for all µ ∈ R, showing that the assumption
in Theorem 3 does not exclude nontrivial cases.
The following result shows that the dynamics (57) is particularly effective for antisymmetric observables
(at least in the limit of large perturbations):
Proposition 5 Let f ∈ L20 (π) satisfy f (−q) = −f (q) and assume that ker J = {0}. Furthermore,
assume that the eigenvalues of J are rationally independent, i.e.
σ(J) = {±iλ1 , ±iλ2 , . . . , ±iλd }
with λi ∈ R>0 and
P
i
(73)
ki λi 6= 0 for all (k1 , . . . , kd ) ∈ Zd \ (0, . . . , 0). Then limµ→∞ σf2 (µ) = 0.
Proof (of Proposition 5) The claim would immediately follow from f ∈ ker(Jq · ∇)⊥ according to
Theorem 5, but that does not seem to be so easy to prove directly. Instead, we again make use of the
Hermite polynomials.
Recall from the proof of Proposition 4 that L is invertible on L20 (π
b) and its inverse leaves the
Hermite spaces Hm invariant. Consequently, the asymptotic variance of an observable f ∈ L20 (π
b) can
be written as
σf2 = hf, (−L)−1 f iL2 (πb)
∞
X
=
hΠm f, (−L|Hm )−1 Πm f iL2 (πb) ,
(74a)
(74b)
m=1
where Πm : L20 (π
b) → Hm denotes the orthogonal projection onto Hm . From (59) it is clear that ga
is symmetric for |α| even and antisymmetric for |α| odd. Therefore, from f being antisymmetric it
follows that
M
f∈
Hm .
m≥1,m odd
In view of (54), (61) and (73) the spectrum of L|Hm can be written as
( 2d
)
X
σ(L|Hm ) = µ
αj βj + Cα,γ : |α| = m, βj ∈ σ(J)
j=1
(
=
iµ
d
X
)
(αj − αj+d )λj + Cα,γ : |α| = m
(75a)
j=1
with appropriate real constants Cα,γ ∈ R that depend on α and γ, but not on µ. For |α| =
odd, we have that
d
X
(αj − αj+d )λj 6= 0.
P2d
j=1
αj = m
(76)
j=1
Indeed, assume to the contrary that the above expression is zero. Then it follows that αj = αj+d for
all j = 1, . . . , d by rational independence of λ1 , . . . , λd . From (75a) and (76) it is clear that
µ→∞
sup {r > 0 : B(0, r) ∩ σ(L|Hm ) = ∅} −−−−→ ∞,
where B(0, r) denotes the ball of radius r centered at the origin in C. Consequently, the spectral radius
of (−L|Hm )−1 and hence (−L|Hm )−1 itself converge to zero as µ → ∞. The result then follows from
(74b).
t
u
25
Remark 13 The idea of the preceding proof can be explained using Figure 2a and Remark 12. Since
the real eigenvalues correspond to Hermite polynomials of even order, antisymmetric observables are
orthogonal to the associated subspaces. The rational independence condition on the eigenvalues of J
prevents cancellations that would lead to further eigenvalues on the real axis.
The following corollary gives a version of the converse of Proposition 5 and provides further intuition
into the mechanics of the variance reduction achieved by the perturbation.
Corollary 2 Let f ∈ L20 (π) and assume that limµ→∞ σf2 (µ) = 0. Then
ˆ
f dq = 0
B(0,r)
for all r ∈ (0, ∞), where B(0, r) denotes the ball centered at 0 with radius r.
2
Proof According to Theorem 5, limµ→∞ σf2 (µ) = 0 implies σΠf
(0) = 0. We can write
2
σΠf
(0) = hΠf, (−L0 )−1 Πf iL2 (πb)
1
= hΠf, (−L0 )−1 + (−L∗0 )−1 Πf iL2 (πb)
2
and recall from the proof of Proposition 4 that (−L0 )−1 and (−L∗0 )−1 leave the Hermite spaces Hm
invariant. Therefore
ker (−L0 )−1 + (−L∗0 )−1 = 0
(78)
2
in L20 (π
b), and in particular σΠf
(0) = 0 implies Πf = 0, which in turn shows that f ∈ ker(Jq · ∇)⊥ .
⊥
Using ker(Jq · ∇) = im(Jq · ∇), it follows that there exists a sequence (φn )n ∈ Cc∞ (Rd ) such that
Jq · ∇φn → f in L2 (π). Taking a subsequence if necessary, we can assume that the convergence is
pointwise π-almost everywhere and that the sequence is pointwise bounded by a function in L1 (π).
Since J is antisymmetric, we have that Jq · ∇φn = ∇ · (φn Jq). Now Gauss’s theorem yields
ˆ
ˆ
ˆ
f dq =
∇ · (φJq)dq =
φJq · dn,
B(0,r)
B(0,r)
∂B(0,r)
where n denotes the outward normal to the sphere ∂B(0, r). This quantity is zero due to the orthogonality of Jq and n, and so the result follows from Lebesgue’s dominated convergence theorem.
t
u
4.4 Optimal Choices of J for Quadratic Observables
d×d
Assume f ∈ L20 (π) is given by f (q) = q · Kq + l · q − Tr K, with K ∈ Rsym
and l ∈ Rd (note that
the constant term is chosen such that π(f ) = 0). Our objective is to choose J in such a way that
limµ→∞ σf2 (µ) becomes as small as possible. To stress the dependence on the choice of J, we introduce
⊥
the notation σf2 (µ, J). Also, we denote the orthogonal projection onto (ker J)⊥ by Πker
J.
⊥
Lemma 7 (Zero variance limit for linear observables). Assume K = 0 and Πker
J l = 0. Then
lim σf2 (µ, J) = 0.
µ→∞
Proof According to Proposition 5, we have to show that Πf = 0, where Π is the L2 (π)-orthogonal
projection onto ker(Jq · ∇). Let us thus prove that
f ∈ ker(Jq · ∇)⊥ = im(Jq · ∇)∗ = im(Jq · ∇),
⊥
where the second identity uses the fact that (Jq·∇)∗ = −Jq·∇. Indeed, since Πker
J = 0, by Fredholm’s
alternative there exists u ∈ Rd such that Ju = l. Now define φ ∈ L20 (π) by φ(q) = −u · q, leading to
f = Jq · ∇φ,
so the result follows.
t
u
26
Lemma 8 (Zero variance limit for purely quadratic observables.) Let l = 0 and consider the decomposition K = K0 + K1 into the traceless part K0 = K − TrdK · I and the trace-part K1 = TrdK · I. For
the corresponding decomposition of the observable
f (q) = f0 (q) + f1 (q) = q · K0 q + q · K1 q − Tr K
the following holds:
(a) There exists an antisymmetric matrix J such that limµ→∞ σf20 (µ, J) = 0, and there is an algorithmic
way (see Algorithm 1) to compute an appropriate J in terms of K.
(b) The trace-part is not effected by the perturbation, i.e. σf21 (µ, J) = σf21 (0) for all µ ∈ R.
Proof To prove the first claim, according to Theorem 5 it is sufficient to show that f0 ∈ ker(Jq · ∇)⊥ =
im(Jq · ∇). Let us consider the function φ(q) = q · Aq, with A ∈ Rd×d
sym . It holds that
Jq · ∇φ = q · (J T Aq) = q · [A, J]q.
The task of finding an antisymmetric matrix J such that
lim σf20 (µ, J) = 0
µ→∞
(79)
can therefore be accomplished by constructing an antisymmetric matrix J such that there exists a
symmetric matrix A with the property K0 = [A, J]. Given any traceless matrix K0 there exists an
orthogonal matrix U ∈ O(Rd ) such that U K0 U T has zero entries on the diagonal, and that U can be
obtained in an algorithmic manner (see for example [Kaz88] or [HJ13, Chapter 2, Section 2, Problem
3]; for the reader’s convenience we have summarised the algorithm in Appendix D.) Assume thus that
such a matrix U ∈ O(Rd ) has been found and choose real numbers a1 , . . . , ad ∈ R such that ai 6= aj if
i 6= j. We now set
Ā = diag(a1 , . . . , an ),
(80)
and
(
J¯ij =
(U K0 U T )ij
ai −aj
0
if i 6= j,
if i = j.
(81)
¯ =
Observe that since U K0 U T is symmetric, J¯ is antisymmetric. A short calculation shows that [Ā, J]
¯ to obtain [A, J] = K0 . Therefore, the J
U K0 U T . We can thus define A = U T ĀU and J = U T JU
constructed in this way indeed satisfies (79). For the second claim, note that f1 ∈ ker(Jq · ∇), since
Tr K
Tr K
Jq · ∇ q ·
q =2
q · Jq = 0
(82)
d
d
because of the antisymmetry of J. The result then follows from Lemma 6.
t
u
We would like to stress that the perturbation J constructed in the previous lemma is far from unique
due to the freedom of choice of U and a1 , . . . , ad ∈ R in its proof. However, it is asymptotically optimal:
Corollary 3 In the setting of Lemma 8 the following holds:
min
lim σf2 (µ, J) = σf21 (0).
J T =−J
µ→∞
Proof The claim follows immediately since f1 ∈ ker(Jq · ∇) for arbitrary antisymmetric J as shown in
(82), and therefore the contribution of the trace part f1 to the asymptotic variance cannot be reduced
by any choice of J according to Lemma 6.
As the proof of Lemma 8 is constructive, we obtain the following algorithm for determining optimal
perturbations for quadratic observables:
Algorithm 1 Given K ∈ Rd×d
sym , determine an optimal antisymmetric perturbation J as follows:
27
1. Set K0 = K − TrdK · I.
2. Find U ∈ O(Rd ) such that U K0 U T has zero entries on the diagonal (see Appendix D).
3. Choose ai ∈ R, i = 1, . . . d such that ai 6= aj for i 6= j and set
(U K0 U T )ij
J¯ij =
ai − aj
for i 6= j and J¯ii = 0 otherwise.
¯ .
4. Set J = U T JU
Remark 14 In [DLP16], the authors consider the task of finding optimal perturbations J for the nonreversible overdamped Langevin dynamics given in (19). In the Gaussian case this optimization problem
turns out be equivalent to the one considered in this section. Indeed, equation (39) of [DLP16] can be
rephrased as
f ∈ ker(Jq · ∇)⊥ .
Therefore, Algorithm 1 and its generalization Algorithm 2 (described in Section 4.5) can be used
without modifications to find optimal perturbations of overdamped Langevin dynamics.
4.5 Gaussians with Arbitrary Covariance and Preconditioning
In this section we extend the results of the preceding sections to the case when the target measure π
d×d
symmetric and
is given by a Gaussian with arbitrary covariance, i.e. V (q) = 21 q · Sq with S ∈ Rsym
positive definite. The dynamics (9) then takes the form
dqt = M −1 pt dt − µJ1 Sqt dt,
dpt = −Sqt dt − νJ2 M −1 pt dt − Γ M −1 pt dt +
√
2Γ dWt .
(83)
The key observation is now that the choices M = S and Γ = γS together with the transformation
qe = S 1/2 q and pe = S −1/2 p lead to the dynamics
dqet = pet dt − µS 1/2 J1 S 1/2 qet dt,
dpet = −qet dt − µS −1/2 J2 S −1/2 pet dt − γ pet dt +
p
2γdWt ,
(84)
which is of the form (41) if J1 and J2 obey the condition SJ1 S = J2 (note that both S 1/2 J1 S 1/2 and
S −1/2 J2 S −1/2 are of course antisymmetric). Clearly the dynamics (84) is ergodic with respect to a
Gaussian measure with unit covariance, in the following denoted by π
e. The connection between the
asymptotic variances associated to (83) and (84) is as follows:
For an observable f ∈ L20 (π) we can write
√
T
1
T
ˆ
T
√
f (qs )ds − π(f )
=
T
0
1
T
ˆ
0
T
e
e
f (qes )ds − π
e (f ) ,
where fe(q) = f (S −1/2 q). Therefore, the asymptotic variances satisfy
σf2 = σ
ef2e,
(85)
where σ
ef2e denotes the asymptotic variance of the process (qet )t≥0 . Because of this, the results from the
previous sections generalise to (83), subject to the condition that the choices M = S, Γ = γS and
SJ1 S = J2 are made. We formulate our results in this general setting as corollaries:
28
Corollary 4 Consider the dynamics
dqt = M −1 pt dt − µJ1 ∇V (qt )dt,
√
(86)
dpt = −∇V (qt )dt − µJ2 M −1 pt dt − Γ M −1 pt dt + 2Γ dWt ,
√
with V (q) = 21 q · Sq. Assume that M = S, Γ = γS with γ > 2 and SJ1 S = J2 . Let f ∈ L2 (π) be an
observable of the form
f (q) = q · Kq + l · q + C
(87)
d
with K ∈ Rd×d
/ ker J is
sym , l ∈ R and C ∈ R. If at least one of the conditions KJ1 S 6= SJ1 K and l ∈
satisfied, then the asymptotic variance is at a local maximum for the unperturbed sampler, i.e.
∂µ σf2
µ=0
=0
and
∂µ2 σf2
µ=0
< 0.
Proof Note that
e +e
fe(q) = f (S −1/2 q) = q · S −1/2 KS −1/2 q + S −1/2 l · q + C = q · Kq
l·q+C
e = S −1/2 KS −1/2 and
is again of the form (87) (where in the last equality, K
been defined). From (84), (85) and Theorem 3 the claim follows if at least one
e S 1/2 J1 S 1/2 ] 6= 0 and e
[K,
l ∈
/ ker(S 1/2 J1 S 1/2 ) is satisfied. The first of those can
equivalent to
S −1/2 (KJS − SJK)S −1/2 6= 0,
e
l = S −1/2 l have
of the conditions
easily seen to be
which is equivalent to KJ1 S 6= SJ1 K since S is nondegenerate. The second condition is equivalent to
S 1/2 J1 l 6= 0,
which is equivalent to J1 l 6= 0, again by nondegeneracy of S.
t
u
Corollary 5 Assume the setting from the previous corollary and denote by Π the orthogonal projection
onto ker(J1 Sq · ∇). For f ∈ L2 (π) it holds that
2
lim σf2 (µ) = σΠf
(0) ≤ σf2 (0).
µ→∞
Proof Theorem 5 implies
2
lim σ
ef2e(µ) = σ
eΠ
ef2e(0)
e fe(0) ≤ σ
µ→∞
e denotes
for the transformed system (84). Here fe(q) = f (S −1/2 q) is the transformed observable and Π
2
1/2
1/2
L (π)-orthogonal projection onto ker(S J1 S q · ∇). According to (85), it is sufficient to show
e fe. This however follows directly from the fact that the linear transformation
that (Πf ) ◦ S −1/2 = Π
1/2
φ 7→ φ ◦ S
maps ker(S 1/2 J1 S 1/2 q · ∇) bijectively onto ker(J1 Sq · ∇).
t
u
Let us also reformulate Algorithm 1 for the case of a Gaussian with arbitrary covariance.
1
Algorithm 2 Given K, S ∈ Rd×d
sym with f (q) = q · Kq and V (q) = 2 q · Sq (assuming S is nondegenerate), determine optimal perturbations J1 and J2 as follows:
e = S −1/2 KS −1/2 and K
e0 = K
e − Tr Ke · I.
1. Set K
d
e 0 U T has zero entries on the diagonal (see Appendix D).
2. Find U ∈ O(Rd ) such that U K
3. Choose ai ∈ R, i = 1, . . . , d such that ai 6= aj for i 6= j and set
e 0 U T )ij
(U K
J¯ij =
.
ai − aj
¯ .
4. Set Je = U T JU
−1/2 e −1/2
5. Put J1 = S
JS
and J2 = S 1/2 JS 1/2 .
Finally, we obtain the following optimality result from Lemma 7 and Corollary 3.
29
⊥
Corollary 6 Let f (q) = q · Kq + l · q − Tr K and assume that Πker
J l = 0. Then
lim σf2 (µ, J1 , J2 ) = σf21 (0),
min
J1T =−J1 , J2 =SJ1 S
where f1 (q) = q ·K1 q, K1 =
2.
Tr(S −1 K)
S.
d
µ→∞
Optimal choices for J1 and J2 can be obtained using Algorithm
Remark 15 Since in Section 4.1 we analysed the case where J1 and J2 are proportional, we are not able
to drop the restriction J2 = SJ1 S from the above optimality result. Analysis of completely arbitrary
perturbations will be the subject of future work.
Remark 16 The choices M = S and Γ = γS have been introduced to make the perturbations considered in this article lead to samplers that perform well in terms of reducing the asymptotic variance.
However, adjusting the mass and friction matrices according to the target covariance in this way (i.e.
M = S and Γ = γS) is a popular way of preconditioning the dynamics, see for instance [GC11]
and, in particular mass-tensor molecular dynamics [Ben75]. Here we will present an argument why
such a preconditioning is indeed beneficial in terms of the convergence rate of the dynamics. Let us
first assume that S is diagonal, i.e. S = diag(s(1) , . . . , s(d) ) and that M = diag(m(d) , . . . , m(d) ) and
Γ = diag(γ (d) , . . . , γ (d) ) are chosen diagonally as well. Then (83) decouples into one-dimensional SDEs
of the following form:
(i)
dqt =
1 (i)
p dt,
m(i) t
(i)
(i)
dpt = −s(i) qt dt −
p
γ (i) (i)
p
dt
+
2γ (i) dWt ,
t
m(i)
i = 1, . . . , d.
(88)
Let us write those Ornstein-Uhlenbeck processes as
(i)
dXt
(i)
= −B (i) Xt dt +
with
B
(i)
=
0 − m1(i)
s(i)
p
(i)
2Q(i) dWt
!
γ (i)
m(i)
(i)
and Q
=
0 0
0 γ (i)
(89)
.
As in Section 4.2, the rate of the exponential decay of (89) is equal to min Re σ(B (i) ). A short calculation
shows that the eigenvalues of B (i) are given by
s
2
(i)
γ
γ (i)
s(i)
(i)
λ1,2 =
±
− (i) .
(i)
(i)
2m
2m
m
Therefore, the rate of exponential decay is maximal when
(i) 2
s(i)
γ
− (i) = 0,
(i)
2m
m
(90)
in which case it is given by
r
s(i)
.
m(i)
Naturally, it is reasonable to choose m(i) in such a way that the exponential rate (λ(i) )∗ is the same
for all i, leading to the restriction M = cS with c > 0. Choosing c small will result in fast convergence
to equilibrium, but also make the dynamics (88) quite stiff, requiring a very small timestep ∆t in
a discretisation scheme. The choice of c will therefore need to strike a balance between those two
competing effects. The constraint (90) then implies Γ = 2cS. By a coordinate transformation, the
preceding argument also applies if S, M and Γ are diagonal in the same basis, and of course M and
Γ can always be chosen that way. Numerical experiments show that it is possible to increase the rate
of convergence to equilibrium even further by choosing M and Γ nondiagonally with respect to S
(although only by a small margin). A clearer understanding of this is a topic of further investigation.
(i) ∗
(λ ) =
30
5 Numerical Experiments: Diffusion Bridge Sampling
5.1 Numerical Scheme
In this section we introduce a splitting scheme for simulating the perturbed underdamped Langevin
dynamics given by equation (9). In the unpertubed case, i.e. when J1 = J2 = 0, the right-hand side
can be decomposed into parts A, B and C according to
−1
0√
qt
0
M pt
,
d
=
dt +
dt +
pt
−∇V (qt )
0
−Γ M −1 + 2Γ dWt
|
{z
} |
{z
} |
{z
}
A
B
O
i.e. O refers to the Ornstein-Uhlenbeck part of the dynamics, whereas A and B stand for the momentum and position updates, respectively.
One particular splitting scheme which has proven to be efficient is the BAOAB scheme, (see [LM15] and
references therein). The string of letters refers to the order in which the different parts are integrated,
namely
1
pn+1/2 = pn − ∆t∇V (qn ),
2
1
qn+1/2 = qn + ∆t · M −1 pn+1/2 ,
2
p
p̂ = exp(−∆tΓ M −1 )pn+1/2 + I − e−2Γ ∆t N (0, I),
1
qn+1 = q n+1/2 + ∆t · M −1 p̂,
2
1
pn+1 = p̂ − ∆t · ∇V (qn+1 ).
2
(91a)
(91b)
(91c)
(91d)
(91e)
We note that many different discretisation schemes such as ABOBA, OABAO, etc. are viable, but
that analytical and numerical evidence has shown that the BAOAB-ordering has particularly good
properties to compute long-time ergodic averages with respect to q-dependent observables. Motivated
by this, we introduce the following perturbed scheme, introducing additional Runge-Kutta integration
steps between the A, B and O parts:
1
pn+1/2 = pn − ∆t∇V (qn ),
2
1
qn+1/2 = qn + ∆t · M −1 pn+1/2 ,
2
1
0
qn+1/2
= RK4 ( ∆t, qn+1/2 ),
2
p
p̂ = exp(−∆t(Γ M −1 + νJ2 M −1 ))pn+1/2 + I − e−2Γ ∆t N (0, 1),
1
0
00
qn+1/2
= RK4 ( ∆t, qn+1/2
),
2
1
00
qn+1 = qn+1/2
+ ∆t · M −1 p̂,
2
1
pn+1 = p̂ − ∆t · ∇V (qn+1 ),
2
(92a)
(92b)
(92c)
(92d)
(92e)
(92f)
(92g)
where RK4 (∆t, q0 ) refers to fourth order Runge-Kutta integration of the ODE
q̇ = −J1 ∇V (q),
q(0) = q0
(93)
up until time ∆t. We remark that the J2 -perturbation is linear and can therefore be included in the Opart without much computational overhead. Clearly, other discretisation schemes are possible as well,
for instance one could use a symplectic integrator for the ODE (93), noting that it is of Hamiltonian
31
type. However, since V as the Hamiltonian for (93) is not separable in general, such a symplectic
integrator would have to be implcit. Moreover, (92c) and (92e) could be merged since (92e) commutes
with (92d). In this paper, we content ourselves with the above scheme for our numerical experiments.
Remark 17 The aformentioned schemes lead to an error in the approximation for π(f ), since the
invariant measure π is not preserved exactly by the numerical scheme. In practice, the BAOABscheme can therefore be accompanied by an accept-reject Metropolis step as in [MWL16], leading to
an unbiased estimate of π(f ), albeit with an inflated variance. In this case, after every rejection the
momentum variable has to be flipped (p 7→ −p) in order to keep the correct invariant measure. We note
here that our perturbed scheme can be ’Metropolized’ in a similar way by ’flipping the matrices J1
and J2 after every rejection (J1 7→ −J1 and J2 7→ −J2 ) and using an appropriate (volume-preserving
and time-reversible) integrator for the dynamics given by (93). Implementations of this idea are the
subject of ongoing work.
5.2 Diffusion Bridge Sampling
To numerically test our analytical results, we will apply the dynamics (9) to sample a measure on path
space associated to a diffusion bridge. Specifically, consider the SDE
p
dXs = −∇U (Xs )ds + 2β −1 dWs ,
with Xs ∈ Rn , β > 0 and the potential U : Rn → R obeying adequate growth and smoothness conditions (see [HSV07], Section 5 for precise statements). The law of the solution to this SDE conditioned
on the events X(0) = x− and X(s+ ) = x+ is a probability measure π on L2 ([0, s+ ], Rn ) which poses
a challenging and important sampling problem, especially if U is multimodal. This setting has been
used as a test case for sampling probability measures in high dimensions (see for example [BPSSS11]
and [OPPS16]). For a more detailed introduction (including applications) see [BS09] and for a rigorous
theoretical treatment the papers [HSVW05, HSV07, HSV09, BS09] .
In the case U ≡ 0, it can be shown that the law of the conditioned process is given by a Gaussian
measure π0 with mean zero and precision operator S = − β2 ∆ on the Sobolev space H 1 ([0, s+ ], Rd )
equipped with appropriate boundary conditions. The general case can then be understood as a perturbation thereof: The measure π is absolutely continuous with respect to π0 with Radon-Nikodym
derivative
dπ
∝ exp − Ψ ,
(94)
dπ0
where
ˆ
β s+
G(x(s), β)ds
Ψ (x) =
2 0
and
1
1
|∇U (x)|2 − ∆U (x).
2
β
We will make the choice x− = x+ = 0, which is possible without loss of generality as explained in
[BRSV08, Remark 3.1], leading to Dirichlet boundary conditions on [0, s+ ] for the precision operator
S. Furthermore, we choose s+ = 1 and discretise the ensuing s-interval [0, 1] according to
G(x, β) =
[0, 1] = [0, s1 ) ∪ [s1 , s2 ) ∪ . . . ∪ [sn−1 , sn ) ∪ [sn , 1]
1
in an equidistant way with stespize sj+1 − sj ≡ δ = d+1
. Functions on this grid are determined by the
values x(s1 ) = x1 , . . . , x(sn ) = xn , recalling that x(0) = x(1) = 0 by the Dirichlet boundary conditions.
We discretise the functional Ψ as
d
Ψ̃ (x1 , . . . , xn ) =
β X
δ
G(xi , β)
2
i=1
d
β X
1
= δ
(U 0 (xi )2 − U 00 (xi ) ,
2
β
i=1
32
such that its gradient is given by
(∇Ψ̃ )i =
1
β
δ 2U 0 (xi )U 00 (xi ) − U 000 (xi ) ,
2
β
i = 1, . . . , d.
The discretised version A of the Dirichlet-Laplacian ∆ on [0, 1] is given by
−2 1
1 −2
...
A = δ −2
.
1
1 −2
Following (94), the discretised target measure π
b has the form
π
b=
1 −V
e dx,
Z
with
βδ
x · Ax, x ∈ Rd .
4
In the following we will consider the case n = 1 with potential U : R → R given by U (x) = 21 (x2 − 1)2
and set β = 1. To test our algorithm we adjust the parameters M , Γ , J1 and J2 according to the
recommended choice in the Gaussian case,
V (x) = Ψ̃ (x) −
M = S,
Γ = γS,
SJ1 S = J2 ,
µ = ν,
(95)
where we take S = β2 δ · A as the precision operator of the Gaussian target. We will consider the
linear observable f1 (x) = l · x with l = (1, . . . , 1) and the quadratic observable f2 (x) = |x|2 . In a
first experiment we adjust the perturbation J1 (and via (95) also J2 ) to the observable f2 according
to Algorithm 2. The dynamics (9) is integrated using the splitting scheme introduced in Section 5.1
with a stepsize of ∆t = 10−4 over the time interval [0, T ] with T = 102 . Furthermore, we choose
initial conditions q0 = (1, . . . , 1), p0 = (0, . . . , 0) and introduce a burn-in time T0 = 1, i.e. we take the
estimator to be
ˆ T
1
f (qt )dt.
π̂(f ) ≈
T − T0 T0
We compute the variance of the above estimator from N = 500 realisations and compare the results
for different choices of the friction coefficient γ and of the perturbation strength µ.
The numerical experiments show that the perturbed dynamics generally outperform the unperturbed dynamics independently of the choice of µ and γ, both for linear and quadratic observables.
One notable exception is the behaviour of the linear observable for small friction γ = 10−3 (see Figure
3a), where the asymptotic variance initially increases for small perturbation strengths µ. However,
this does not contradict our analytical results, since the small
√ perturbation results from Section 4.1
generally require γ √to be sufficiently big (for example γ ≥ 2 in Theorem 3). We remark here that
the condition γ ≥ 2, while necessary for the theoretical results from Section 4.1, is not a very advisable choice in practice (at least in this experiment), since Figures 3b and 4b clearly indicate that
the optimal friction is around γ ≈ 10−1 . Interestingly, the problem of choosing a suitable value for the
friction coefficient coefficient γ becomes mitigated by the introduction of the perturbation: While the
performance of the unperturbed sampler depends quite sensitively on γ, the asymptotic variance of
the perturbed dynamics is a lot more stable with respect to variations of γ.
In the regime of growing values of µ, the experiments confirm the results from Section 4.3, i.e. the
asymptotic variance approaches a limit that is smaller than the asymptotic variance of the unperturbed
dynamics.
As a final remark we report our finding that the performance of the sampler for the linear observable is qualitatively independent of the coice of J1 (as long as J2 is adjusted according to (95)). This
result is in alignment with Propostion 5 which predicts good properties of the sampler for antisymmetric observables. In contrast to this, a judicious choice of J1 is critical for quadratic observables. In
particular, applying Algorithm 2 significantly improves the performance of the perturbed sampler in
comparison to choosing J1 arbitrarily.
33
=10-3
40
30
=10-1
=10
35
25
standard deviation
standard deviation
Linear Observable
35
Linear Observable
45
30
25
20
15
=0
=40
20
15
10
10
5
5
0
10 -3
0
0
5
10
15
20
25
30
35
40
10 -2
10 -1
10 0
10 1
10 2
friction
perturbation strength
(a)
(b)
.
Fig. 3: Standard deviation of π̂(f ) for a linear observable as a function of friction γ and perturbation
strength µ
Quadratic Observable
12
=10
=10-1
=10
10
10
8
standard deviation
standard deviation
Quadratic Observable
12
-3
6
4
=0
=40
8
6
4
2
2
0
0
5
10
15
20
25
perturbation strength
(a)
30
35
40
0
10 -3
10 -2
10 -1
10 0
10 1
10 2
friction
(b)
.
Fig. 4: Standard deviation of π̂(f ) for a quadratic observable as a function of friction γ and perturbation
strength µ
6 Outlook and Future Work
A new family of Langevin samplers was introduced in this paper. These new SDE samplers consist
of perturbations of the underdamped Langevin dynamics (that is known to be ergodic with respect
to the canonical measure), where auxiliary drift terms in the equations for both the position and the
momentum are added, in a way that the perturbed family of dynamics is ergodic with respect to
the same (canonical) distribution. These new Langevin samplers were studied in detail for Gaussian
target distributions where it was shown, using tools from spectral theory for differential operators,
that an appropriate choice of the perturbations in the equations for the position and momentum
can improve the performance of the Langvin sampler, at least in terms of reducing the asymptotic
variance. The performance of the perturbed Langevin sampler to non-Gaussian target densities was
tested numerically on the problem of diffusion bridge sampling.
The work presented in this paper can be improved and extended in several directions. First, a
rigorous analysis of the new family of Langevin samplers for non-Gaussian target densities is needed.
34
The analytical tools developed in [DLP16] can be used as a starting point. Furthermore, the study of
the actual computational cost and its minimization by an appropriate choice of the numerical scheme
and of the perturbations in position and momentum would be of interest to practitioners. In addition,
the analysis of our proposed samplers can be facilitated by using tools from symplectic and differential
geometry. Finally, combining the new Langevin samplers with existing variance reduction techniques
such as zero variance MCMC, preconditioning/Riemannian manifold MCMC can lead to sampling
schemes that can be of interest to practitioners, in particular in molecular dynamics simulations. All
these topics are currently under investigation.
Acknowledgments
AD was supported by the EPSRC under grant No. EP/J009636/1. NN is supported by EPSRC
through a Roth Departmental Scholarship. GP is partially supported by the EPSRC under grants
No. EP/J009636/1, EP/L024926/1, EP/L020564/1 and EP/L025159/1. Part of the work reported in
this paper was done while NN and GP were visiting the Institut Henri Poincaré during the Trimester
Program ”Stochastic Dynamics Out of Equilibrium”. The hospitality of the Institute and of the organizers of the program is greatly acknowledged.
A Estimates for the Bias and Variance
Proof (of Lemma 1) Suppose that (Pt )t≥0 satisfies (27). Let π0 be an initial distribution of (Xt )t≥0 such that
0
∈ L2 (π). Slightly abusing notation, we denote by π0 Pt the law of Xt given X0 ∼ π. Then
π0 π and h = dπ
dπ
kπ0 Pt − πkT V = kPt∗ h − 1kL1 (π) ≤ kPt∗ kL2 (π)→L2 (π) kh − 1kL2 (π) ≤ Ce−λt kh − 1kL2 (π) ,
where Pt∗ denotes the L2 (π)-adjoint of Pt . Since f is assumed to be bounded, we immediately obtain
dπ0 1/2
|E[f (Xt )|X0 ∼ π0 ] − π(f )| ≤ C kf kL∞ e−λt Varπ
,
dπ
and so, for X0 ∼ π0 ,
|πT (f ) − π(f )| ≤
C
1 − e−λt kf kL∞
λT
Varπ
dπ0
dπ
1/2
,
u
t
as required.
Proof (of Lemma 2) Given f ∈ L2 (π), for fixed T > 0,
ˆ
T
(π(f ) − Pt f (x)) dt.
χT (x) :=
(96)
0
Then we have that χT ∈ D(L) and LχT = f − PT f , moreover
ˆ
kχT − χT 0 kL2 (π) =
T0
Pt (f ) − π(f ) dt
T
ˆ
≤ C kf kL2 (π)
L2 (π)
T0
so that {χT }T ≥0 is a Cauchy sequence in L2 (π) converging to χ =
(LχT , χT ) → (f − π(f ), χ),
e−λt dt,
T
´∞
0
(π(f ) − Pt f ) dt. Since L is closed and
T → ∞,
in L2 (π), it follows that χ ∈ D(L) and Lχ = f − π(f ). Moreover,
ˆ ∞
kχkL2 (π) ≤
kPt (f ) − π(f )kL2 (π) dt ≤ Kλ kf − π(f )kL2 (π) ,
0
35
´∞
where Kλ = C 0 e−λt dt. Since we assume that f is smooth, the coefficients are smooth and L is hypoelliptic,
then Lχ = f − π(f ) implies that χ ∈ C ∞ (Rd ), and thus we can apply Itô’s formula to χ(Xt ) to obtain:
ˆ
ˆ
1 T
1 T
1
[f (Xt ) − π(f )] dt = [χ(X0 ) − χ(XT )] +
∇χ(Xt )σ(Xt ) dWt .
T 0
T
T 0
One can check that the conditions of [EK86, Theorem 7.1.4] hold. In particular, the following central limit
theorem follows
ˆ T
1
d
√
∇χ(Xt )σ(Xt ) dWt −
→ N (0, 2σf2 ),
as T → ∞.
T 0
By Theorem 1, the generator L has the form
L = π −1 ∇ · (πΣ∇·) + γ · ∇,
where ∇ · (πγ) = 0. It follows that
σf2 = hΣ∇χ, ∇χiL2 (π) = − hL χ, χiL2 (π) = hχ, f iL2 (π) < ∞.
(97)
First suppose that X0 ∼ π. Then (χ(Xt ))t≥0 is a stationary process, and so
1
√ (χ(X0 ) − χ(XT )) → 0,
T
a.s as T → ∞.
From which (29) follows. More generally, suppose that X0 ∼ π0 , where π0 (x) = h(x)π(x) for h ∈ L2 (π). If
f ∈ L∞ (π), then by (1),
ˆ ∞
|χ(x)| ≤
|π(f ) − Pt f (x)| dt
ˆ0∞
≤
kf kL∞ kπ − π0 Pt kT V dt
0
C
≤ kf kL∞
λ
so that χ ∈ L∞ (π). Therefore
√1
T
dπ0 1/2
Varπ
,
dπ
p
(χ(X0 ) − χ(XT )) −
→ 0 as T → ∞, and so (29) holds in this case, similarly.
B Proofs of Section 3
Proof of Lemma 3 We first note that L in (37) can be written in the “sum of squares” form:
L = A0 +
where
d
1X 2
Ak ,
2 k=1
A0 = M −1 p · ∇q − ∇q V · ∇p − µJ1 ∇q V · ∇q − νJ2 M −1 p · ∇p − Γ M −1 p · ∇p
and
Ak = ek · Γ 1/2 ∇p ,
k = 1, . . . , d.
Here {ek }k=1,...,d denotes the standard Euclidean basis and Γ 1/2 is the unique positive definite square root of
the matrix Γ . The relevant commutators turn out to be
[A0 , Ak ] = ek · Γ 1/2 M −1 (Γ ∇p − ∇q − νJ2 ∇p ),
k = 1, . . . , k.
Because Γ has full rank on Rd , it follows that
span{Ak : k = 1, . . . d} = span{∂pk : k = 1, . . . , d}.
Since
and span({Γ
ek · Γ 1/2 M −1 (Γ ∇p − νJ2 ∇p ) ∈ span{Aj : j = 1, . . . d},
1/2
M
−1
k = 1, . . . , d,
∇q : k = 1, . . . , d}) = span{∂qk : k = 1, . . . , d}, it follows that
span({Ak : k = 0, 1, . . . , d} ∪ {[A0 , Ak ] : k = 1, . . . , d}) = R,
so the assumptions of Hörmander’s theorem hold.
u
t
36
B.1 The overdamped limit
The following is a technical lemma required for the proof of Proposition 1:
Lemma 9 Assume the conditions from Proposition 1. Then for every T > 0 there exists C > 0 such that
!
sup |pt |2
E
≤ C.
0≤t≤T
Proof Using variation of constants, we can write the second line of (39) as
pt = e
− t2 (νJ2 +Γ )M −1
p0 −
1
ˆ
t
−
e
(t−s)
(νJ2 +Γ )M −1
2
∇q V (qs )ds +
0
1√
2Γ
ˆ
t
−
e
(t−s)
(νJ2 +Γ )M −1
2
dWs .
0
We then compute
− t2 (νJ2 +Γ )M −1
E sup |pt |2 = sup
0≤t≤T
e
0≤t≤T
√
ˆ
t
2
p0
+
1
E sup
2 0≤t≤T
ˆ
t
−
e
(t−s)
(νJ2 +Γ )M −1
2
2
∇q V (qs )ds
0
2
1
dWs
2Γ
E sup
e
2 0≤t≤T
0
ˆ t
(t−s)
1
− t (νJ +Γ )M −1
(νJ2 +Γ )M −1
−
− E sup e 2 2
p0 ·
e 2
∇q V (qs )ds
0≤t≤T
0
√ ˆ t − (t−s) (νJ +Γ )M −1
−1
t
1
1
(νJ +Γ )M
−
2
p0 ·
dWs
+ E sup e 2 2
2Γ
e 2
0≤t≤T
0
ˆ t
√ ˆ t − (t−s) (νJ +Γ )M −1
(t−s)
−1
1
(νJ
+Γ
)M
−
2
2
− 2 E sup
e 2
∇q V (qs )ds · 2Γ
dWs .
e 2
0≤t≤T
0
0
(t−s)
(νJ2 +Γ )M −1
−
2
+
(98)
Clearly, the first term on the right hand side of (98) is bounded. For the second term, observe that
1
E sup
2 0≤t≤T
ˆ
t
−
e
(t−s)
(νJ2 +Γ )M −1
2
2
∇q V (qs )ds
≤
0
1
sup
2 0≤t≤T
ˆ
t
−
e
(t−s)
(νJ2 +Γ )M −1
2
2
ds
since V ∈ C 1 (Td ) and therefore ∇q V is bounded. By the basic matrix exponential estimate ke−t(νJ2 +Γ )M
Ce−ωt for suitable C and ω, we see that (99) can further be bounded by
1
C sup
2 0≤t≤T
ˆ
t
−2ω
e
0
(t−s)
2
ds =
(99)
0
−1
k≤
C
−2ω T2
,
1−e
2ω
so this term is bounded as well. The third term is bounded by the Burkholder–Davis–Gundy inequality and a
similar argument to the one used for the second term applies. The cross terms can be bounded by the previous
ones, using the Cauchy-Schwarz inequality and the elementary fact that sup(ab) ≤ sup a · sup b for a, b > 0, so
the result follows.
u
t
Proof (of Proposition 1) Equations (39) can be written in integral form as
1
(νJ2 + Γ )qt = (νJ2 + Γ )q0 +
and
ˆ
−
0
t
∇V (qs )ds −
1
ˆ
t
ˆ
t
ˆ
t
(νJ2 + Γ )M −1 ps ds − µ
0
(νJ2 + Γ )M −1 ps ds +
(νJ2 + Γ )J1 ∇q V (qs )ds
0
√
2Γ W (t) = (pt − p0 ),
(100)
0
where the first line has been multiplied by the matrix νJ2 + Γ . Combining both equations yields
ˆ
qt = q0 −
0
t
ˆ
(νJ2 + Γ )∇q V (qs )ds − (νJ2 + Γ )−1 (pt − p0 ) − µ
t
√
J1 ∇q V (qs )ds + (νJ2 + Γ )−1 2Γ Wt .
0
Now applying Lemma 9 gives the desired result, since the above equation differs from the integral version of
(40) only by the term (νJ2 + Γ )−1 (pt − p0 ) which vanishes in the limit as → 0.
u
t
37
B.2 Hypocoercivity
The objective of this section is to prove that the perturbed dynamics (9) converges to equilibrium exponentially
fast, i.e. that the associated semigroup (Pt )t≥0 satisfies the estimate (27). We we will be using the theory of
hypocoercivity outlined in [Vil09] (see also the exposition in [Pav14, Section 6.2]). We provide a brief review
of the theory of hypocoercivity.
Let (H, h·, ·i) be a real separable Hilbert space and consider two unbounded operators A and B with domains
D(A) and D(B) respectively, B antisymmetric. Let S ⊂ H be a dense vectorspace such that S ⊂ D(A) ∩ D(B),
i.e. the operations of A and B are authorised on S. The theory of hypocoercivity is concerned with equations
of the form
∂t h + Lh = 0,
(101)
and the associated semigroup (Pt )t≥0 generated by L = A∗ A−B. Let us also introduce the notation K = ker L.
b ), A = σ∇p and B = M −1 p · ∇q − ∇q V · ∇p − µJ1 ∇q V · ∇q − νJ2 M −1 p · ∇p , it
With the choices H = L2 (π
turns out that L is the (flat) L2 (R2d )-adjoint of the generator L given in (37) and therefore equation (101)
is the Fokker-Planck equation associated to the dynamics (9). In many situations of practical interest, the
operator A∗ A is coercive only in certain directions of the state space, and therefore exponential return to
equilibrium does not follow in general. In our case for instance, the noise acts only in the p-variables and
therefore relaxation in the q-variables cannot be concluded a priori. However, intuitively speaking, the noise
gets transported through the equations by the Hamiltonian part of the dynamics. This is what the theory of
hypocoercivity makes precise. Under some conditions on the interactions between A and B (encoded in their
iterated commutators), exponential return to equilibrium can be proved. To state the main abstract theorem,
we need the following definitions:
Definition 1 (Coercivity) Let T be an unbounded operator on H with domain D(T ) and kernel K. Assume
that there exists another Hilbert space (H̃, h·, ·iH̃ ), continuously and densely embedded in K ⊥ . The operator
is said to be λ-coercive if
hT h, hiH̃ ≥ λkhk2H̃
for all h ∈ K ⊥ ∩ D(T ).
Definition 2 An operator T on H is said to be relatively bounded with respect to the operators T1 , . . . , Tn if
the intersection of the domains ∩D(Tj ) is contained in D(T ) and there exists a constant α > 0 such that
kT hk ≤ α(kT1 hk + . . . + kTn hk)
holds for all h ∈ D(T ).
We can now proceed to the main result of the theory.
Theorem 6 [Vil09, Theorem 24] Assume there exists N ∈ N and possibly unbounded operators
C0 , C1 , . . . , CN +1 , R1 , . . . , RN +1 , Z1 , . . . , ZN +1 ,
such that C0 = A,
[Cj , B] = Zj+1 Cj+1 + Rj+1
(0 ≤ j ≤ N ),
CN +1 = 0,
(102)
and for all k = 0, 1, . . . , N
(a) [A, Ck ] is relatively bounded with respect to {Cj }0≤j≤k and {Cj A}0≤j≤k−1 ,
(b) [Ck , A∗ ] is relatively bounded with respect to I and {Cj }0≤j≤k ,
(c) Rk is relatively bounded with respect to {Cj }0≤j≤k−1 and {Cj A}0≤j≤k−1 and
(d) there are positive constants λi , Λi such that λj I ≤ Zj ≤ Λj I.
P
∗
Furthermore, assume that N
j=0 Cj Cj is κ-coercive for some κ > 0. Then, there exists C ≥ 0 and λ > 0 such
that
kPt kH1 /K→H1 /K ≤ Ce−λt ,
(103)
where H1 ⊂ H is the subspace associated to the norm
v
u
N
u
X
khkH1 = tkhk2 +
kCk hk2
(104)
k=0
and K = ker(A∗ A − B).
Remark 18 Property (103) is called hypocoercivity of L on H1 := (K ⊥ , k · kH1 ).
If the conditions of the above theorem hold, we also get a regularization result for the semigroup e−tL (see
[Vil09, Theorem A.12]):
38
Theorem 7 Assume the setting and notation of Theorem 6. Then there exists a constant C > 0 such that for
all k = 0, 1, . . . , N and t ∈ (0, 1] the following holds:
kCk Pt hk ≤ C
khk
1
tk+ 2
,
h ∈ H.
Proof (of Theorem 2) . We pove the claim by verifying the conditions of Theorem 6. Recall that C0 = A = σ∇p
and
B = M −1 p · ∇q − ∇q V · ∇p − µJ1 ∇q V · ∇q − νJ2 M −1 p · ∇p .
A quick calculation shows that
A∗ = σM −1 p − σ∇p ,
so that indeed
A∗ A = Γ M −1 p · ∇p − ∇T Γ ∇ = Ltherm
and
A∗ A − B = −L∗ .
We make the choice N = 1 and calculate the commutator
[A, B] = σM −1 (∇q + νJ2 ∇p ).
Let us now set C1 = σM −1 ∇q , Z1 = 1 and R1 = νσM −1 J2 ∇p , such that (102) holds for j = 0. Note that
[A, A] = 01 , [A, C1 ] = 0 and [A∗ , C1 ] = 0. Furthermore, we have that
[A, A∗ ] = σM −1 σ.
We now compute
[C1 , B] = −σM −1 ∇2 V ∇p + µσM −1 ∇2 V J1 ∇q
and choose R2 = [C1 , B], Z2 = 1 and recall that C2 = 0 by assumption (of Theorem 6). With those choices,
assumptions (a)-(d) of Theorem 6 are fulfilled. Indeed, assumption (a) holds trivially since all relevant commutators are zero. Assumption (b) follows from the fact that [A, A∗ ] = σM −1 σ is clearly bounded relative to I. To
verify assumption (c), let us start with the case k = 1. It is necessary to show that R1 = νσM −1 J2 ∇p is bounded
relatively to A = σ∇p and A2 . This is obvious since the p-derivatives appearing in R1 can be controlled by the pderivatives appearing in A. For k = 2, a similar argument shows that R2 = −σM −1 ∇2 V ∇p +µσM −1 ∇2 V J1 ∇q
is bounded relatively to A = σ∇p and C1 = σM −1 ∇q because of the assumption that ∇2 V is bounded. Note
that it is crucial for the preceding arguments to assume that the matrices σ and M have full rank. Assumption
(d) is trivially satisfied, since Z1 and Z2 are equal to the identity. It remains to show that
T :=
N
X
Cj∗ Cj
j=0
is κ-coercive for some κ > 0. It is straightforward to see that the kernel of T consists of constant functions and
therefore
b) : π
b (φ) = 0}.
(ker T )⊥ = {φ ∈ L2 (R2d , π
Hence, κ-coercivity of T amounts to the functional inequality
ˆ
|σM
R2d
−1
2
2
ˆ
b≥κ
∇q φ| + |σ∇p φ| dπ
R2d
2
2
ˆ
b−
φ dπ
R2d
b
φdπ
,
b ).
φ ∈ H 1 (π
b ), the above is equivalent
Since the transformation φ 7→ ψ, ψ(q, p) = φ(σ −1 M q, σ −1 p) is bijective on H 1 (R2d , π
to
ˆ
ˆ
2
ˆ
b≥κ
b−
b
b ),
|∇q ψ|2 + |∇p ψ|2 dπ
ψ 2 dπ
ψdπ
, ψ ∈ H 1 (π
R2d
R2d
R2d
b . Since π
b = π ⊗ N (0, M ), coercivity of T boils down to a Poincaré inequality
i.e. a Poincaré inequality for π
for π as in Assumption 1. This concludes the proof of the hypocoercive decay estimate (103). Clearly, the
b ), and therefore it follows that there exist
abstract H1 -norm from (104) is equivalent to the Sobolev norm H 1 (π
constants C ≥ 0 and λ ≥ 0 such that
kPt f kH 1 (πb ) ≤ Ce−λt kf kH 1 (πb ) ,
1
This is not true automatically, since [A, A] stands for the array ([Aj , Ak ])jk .
(105)
39
b ) \ K, where K = ker T consists of constant functions. Let us now lift this estimate to L2 (π
b ).
for all f ∈ H 1 (π
There exist a constant C̃ ≥ 0 such that
2
X
khkH 1 (πb ) ≤ C̃
kCk hkL2 (πb ) ,
b ).
f ∈ H 1 (π
(106)
k=0
Therefore, Theorem 7 implies
kP1 f kH 1 (πb ) ≤ C̃kf kL2 (πb ) ,
b ),
f ∈ L2 (π
(107)
2
b ) \ K. It holds that
for t = 1 and a possibly different constant C̃. Let us now assume that t ≥ 1 and f ∈ L (π
kPt f kL2 (πb ) ≤ kPt f kH 1 (πb ) = kPt−1 P1 f kH 1 (πb ) ≤ Ce−λ(t−1) kP1 f kH 1 (πb ) ,
(108)
where the last inequality follows from (105). Now applying (107) and gathering constants results in
kPt f kL2 (πb ) ≤ Ce−λt kf kL2 (πb ) ,
b ) \ K.
f ∈ L2 (π
(109)
Note that although we assumed t ≥ 1, the above estimate also holds for t ≥ 0 (although possibly with a
different constant C) since kPt kL2 (πb )→L2 (πb ) is bounded on [0, 1].
u
t
C Asymptotic Variance of Linear and Quadratic Observables in the Gaussian Case
We begin by deriving a formula for the asymptotic variance of observables of the form
f (q) = q · Kq + l · q − Tr K,
d
b (f ) = 0. The following calculations
with K ∈ Rd×d
sym and l ∈ R . Note that the constant term is chosen such that π
are very much along the lines of [DLP16, Section 4]. Since the Hessian of V is bounded and the target measure
π is Gaussian, Assumption 1 is satisfied and exponential decay of the semigroup (Pt )t≥0 as in (27) follows by
Theorem 2. According to Lemma 2, the asymptotic variance is then given by
σf2 = hχ, f iL2 (πb ) ,
(110)
where χ is the solution to the Poisson equation
− Lχ = f,
Recall that
b (χ) = 0.
π
(111)
L = −Bx · ∇ + ∇T Q∇ = −x · A∇ + ∇T Q∇
is the generator as in (45), where for later convenience we have defined A = B T , i.e.
−µJ
I
2d×2d
A=
.
−I γI − νJ ∈ R
(112)
In the sequel we will solve (111) analytically. First, we introduce the notation
K 0
K̄ = 0 0 ∈ R2d×2d
and
¯
l=
l
2d
0 ∈R ,
such that by slight abuse of notation f is given by
f (x) = x · K̄x + ¯
l · x − Tr K̄.
By uniqueness (up to a constant) of the solution to the Poisson equation (111) and linearity of L, g has to be
a quadratic polynomial, so we can write
g(x) = x · Cx + D · x − Tr C,
2d×2d
where C ∈ Rsym
and D ∈ R2d (notice that C can be chosen to be symmetrical since x · Cx does not depend
on the antisymmetric part of C). Plugging this ansatz into (111) yields
−Lg(x) = x · A 2Cx + D − γ Trp C = x · K̄x + ¯
l · x − Tr K̄,
40
where
2n
X
Trp C =
Cii
i=n+1
denotes the trace of the momentum component of C. Comparing different powers of x, this leads to the
conditions
AC + CAT
AD
= K̄,
=¯
l,
(113a)
(113b)
γ Trp C = Tr K̄.
(113c)
Note that (113c) will be satisfied eventually by existence and uniqueness of the solution to (111). Then, by the
calculations in [DLP16], the asymptotic variance is given by
σf2 = 2 Tr(C K̄) + D · ¯
l.
(114)
Proof (of Proposition 2) . According to (114) and (113a), the asymptotic variance satisfies
σf2 = 2 Tr(C K̄),
where the matrix C solves
AC + CAT = K̄
(115)
and A is given as in (112). We will use the notation
C1 (µ, ν) C2 (µ.ν)
C(µ, ν) =
T
C2 (µ.ν) C3 (µ, ν)
and the abbreviations C(0) := C(0, 0), C µ (0) := ∂µ C|µ,ν=0 and C ν (0) := ∂ν C|µ,ν=0 . Let us first determine
C(0), i.e. the solution to the equation
0 I
−I γI
C(0) + C(0)
0 I
−I γI
T
=
K 0
0 0
.
This leads to the following system of equations,
C2 (0) + C2 (0)T = K,
−C1 (0) + γC2 (0) + C3 (0) = 0,
(116a)
(116b)
−C1 (0) + γC2 (0)T + C3 (0) = 0,
(116c)
−C2 (0) − C2 (0)T + 2γC3 (0) = 0.
(116d)
(116e)
Note that equations (116b) and (116c) are equivalent by taking the transpose. Plugging (116a) into (116e)
yields
1
K.
(117)
C3 (0) =
2γ
Adding (116b) and (116c), together with (116a) and (117) leads to
C1 (0) =
1
γ
K + K.
2γ
2
Solving (116b) we obtain,
C2 (0) =
1
K,
2
so that
C(0) =
1
K + γ2 K 12 K
2γ
1
1
K
K
2
2γ
!
.
(118)
Taking the µ-derivative of (115) and setting µ = ν = 0 yields
Aµ (0)C(0) + A(0)C µ (0) + C µ (0)A(0)T + C(0)Aµ (0)T = 0.
(119)
41
Notice that
Aµ (0)C(0) + C(0)Aµ (0)T
J 0
−J 0
C(0)
+
C(0)
=
00
0 0
1
γ
1
+ 2 [K, J] − 2 JK
2γ
=
.
1
KJ
0
2
With computations similar to those in the derivation of (118) (or by simple substitution), equation (119) can
be solved by
!
2
1
JK − γ4 [K, J]
− γ4 + 4γ12 + 41 [K, J] 2γ
µ
C (0) =
.
(120)
1
− 2γ
KJ − γ4 [K, J] − 4γ12 + 14 [K, J]
We employ a similar strategy to determine C ν (0): Taking the ν-derivative in equation (115), setting µ = ν = 0
and inserting C(0) and A(0) as in (118) and (112) leads to the equation
0
− 12 KJ
0 I
0 I
ν
ν
=
C
(0)
+
C
(0)
,
1
1
−I γI
−I γI
JK − 2γ [K, J]
2
which can be solved by
+ 14 [K, J]
1
1
KJ − 4 [K, J]
2
−
ν
C (0) =
1
γ
1
4γ 2
1
γ
− 12 KJ + 41 [K, J]
− 4γ12 [K, J]
!
.
(121)
Note that Tr(C K̄) = Tr(C1 K), and so
∂µ Θ|µ,ν=0 = 2 Tr(C1µ (0)K) =
=−
γ2
1
1
+ 2 +
· Tr([K, J]K) = 0,
4
4γ
4
since clearly Tr([K, J], K) = Tr(KJK) − Tr(JK 2 ) = 0. In the same way it follows that
∂ν Θ|µ,ν=0 = 0,
proving (47).
Taking the second µ-derivative of (115) and setting µ = ν = 0 yields
2Aµ (0)C µ (0) + A(0)C µµ (0) + C µµ (0)A(0)T + 2C µ (0)Aµ (0)T = 0,
employing the notation C µµ (0) = ∂µ2 C|µ,ν=0 and noticing that ∂µ2 A = 0. Using (120) we calculate
!
γ2
1
+ 4γ12 + 41 [J, [K, J]] − 2γ
J 2 K + γ4 J[K, J]
µ
µ
µ
µ
T
4
.
A (0)C (0) + C (0)A (0) =
1
KJ 2 − γ4 [K, J]J
0
− 2γ
As before, we make the ansatz
C µµ (0) =
C1µµ (0) C2µµ (0)
(C2µµ (0))T C3µµ (0)
,
leading to the equations
1
γ2
1
+ 2 + [J, [K, J]]
4
4γ
4
γ
1 2
µµ
µµ
µ
−C1 (0) + γC2 (0) + C3 (0) = J K − J[K, J]
γ
2
γ
1
µµ
2
µµ
T
µ
−C1 (0) + γC2 (0) + C3 (0) = KJ + [K, J]J
γ
2
C2µµ (0) + C2µµ (0)T = −
−C2µµ (0) − C2µµ (0)T + 2γC3µµ (0) = 0.
(122a)
(122b)
(122c)
(122d)
Again, (122b) and (122c) are equivalent by taking the transpose. Plugging (122a) into (122d) and combing
with (122b) or (122c) gives
C1µµ (0) =
γ
1
γ3
1
+ 3 +
(2JKJ − J 2 K − KJ 2 ) − JKJ.
4
4γ
4
γ
42
Now
2
1
+ γ 3 ) Tr(JKJK) − Tr(J 2 K 2 ) − Tr(JKJK)
γ3
γ
gives the first part of (48). We proceed in the same way to determine C1νν (0). Analogously, we get
!
1
(KJ 2 − 21 [K, J]J)
0
ν
ν
ν
ν
T
γ
.
A (0)C (0) + C (0)A (0) = 1
(JKJ − 12 J[K, J]) 2γ12 ([K, J]J − J[K, J])
γ
∂µ2 Θ|µ,ν=0 = 2 Tr(C1µµ (0)K) = −(γ +
Solving the resulting linear matrix system (similar to (122a)-(122d)) results in
1
1
1
1
C1νν (0) =
(KJ 2 + J 2 K) −
JKJ,
−
+
4γ 3
4γ
2γ 3
2γ
leading to
1
1
1
1
Tr(J 2 K 2 ) −
Tr(JKJK).
−
+
γ3
2γ
2γ 3
2γ
2
To compute the cross term C1µν (0) we take the mixed derivative ∂µν
of (115) and set µ = ν = 0 to arrive at
∂ν2 Θ|µ,ν=0 = 2 Tr(C1νν (0)K) =
Aµ (0)C ν (0) + Aν (0)C µ (0) + A(0)C µν (0) + C µν (0)A(0)T + C µ (0)Aν (0)T + C ν (0)Aµ (0)T = 0.
Using (120) and (121) we see that
Aµ (0)C ν (0) + Aν (0)C µ (0) + C µ (0)Aν (0)T + C ν (0)Aµ (0)T
1
− 14 [J, [K, J]]
4γ 2
=
1
1
JKJ + 2γ
KJ 2 + γ4 J[K, J] −
2γ
1
JKJ
γ
1
[K, J]J
4γ
1
J[K, J] − γ4 [K, J]J
4γ
1
+ 14 [J, [K, J]]
4γ 2
−
!
.
The ensuing linear matrix system yields the solution
C1µν (0) = −
γ
1
1
1
+ −
[J, [K, J]] + JKJ,
4γ 3
4
4γ
γ
leading to
2
∂µν
Θ|µ,ν=0 = 2 Tr(C1µν (0)K) =
1
1
1
1
+ − γ Tr(J 2 K 2 ) + − 3 + + γ Tr(JKJK).
γ3
γ
γ
γ
(123)
u
t
This completes the proof.
Proof (Proof of Proposition 3) By (113b) and (114) the function Θ satisfies
l.
Θ(µ, ν) = ¯
l · A−1 ¯
Recall the following formula for blockwise inversion of matrices using the Schur complement:
−1
U V
(U − V X −1 W )−1 . . . ,
=
W X
...
...
(124)
provided that X and U − V X −1 W are invertible. Using this, we obtain
Θ(µ, ν) = l · − µJ + (γ − νJ)−1 l.
Taking derivatives, setting µ = ν = 0 and using the fact that J T = −J leads to the desired result.
u
t
Lemma 10 The following holds:
(a) γ − γ43 − γ 3 − γ1 < 0 for γ ∈ (0, ∞).
(b) Let J = −J T and K = K T . Then Tr(JKJK) − Tr(J 2 K 2 ) ≥ 0. Furthermore, equality holds if and only if
[J, K] = 0.
Proof To show (a) we note that γ − γ43 −γ 3 − γ1 < γ − γ43 −γ 3 = γ(1− γ44 −γ 2 ). The function f (γ) := 1− γ44 −γ 2
has a unique global maximum on (0, ∞) at γmin = 81/6 with f (γmin ) = −2, so the result follows.
For (b) we note that [J, K]T = [J, K], and that [J, K]2 is symmetric and nonnegative definite. We can write
X 2
Tr([J, K]2 ) =
λi ,
i
with λi denoting the (real) eigenvalues of [J, K]. From this it follows that Tr([J, K]2 ) ≥ 0 with equality if and
only if [J, K] = 0. Now expand
Tr([J, K]2 ) = 2 Tr(JKJK) − Tr(J 2 K 2 ),
which implies the advertised claim.
u
t
43
D Orthogonal Transformation of Tracefree Symmetric Matrices into a Matrix with
Zeros on the Diagonal
d
Given a symmetric matrix K ∈ Rd×d
sym with Tr K = 0, we seek to find an orthogonal matrix U ∈ O(R ) such
that U KU T has zeros on the diagonal. This is a crucial step in Algorithms 1 and 2 and has been addressed in
various places in the literature (see for instance [Kaz88] or [Bha97], Chapter 2, Section 2). For the convenience
of the reader, in the following we summarize an algorithm very similar to the one in [Kaz88].
Since K is symmetric, there exists an orthogonal matrix U0 ∈ O(Rd ) such that U0 KU0T = diag(λ1 , . . . , λd ).
Now the algorithm proceeds iteratively, orthogonally transforming this matrix into one with the first diagonal entry vanishing, then the first two diagonal entries vanishing, etc, until after d steps we are left with a
matrix with zeros on the diagonal. Starting with λ1 , assume that λ1 6= 0 (otherwise proceed with λ2 ). Since
P
Tr(K) = Tr(U0 KU0T ) =
λi = 0, there exists λj , j ∈ {2, . . . , d} such that λ1 λj < 0 (i.e. λ1 and λj have
opposing signs). We now apply a rotation in the 1j-plane to transform the first diagonal entry into zero. More
specifically, let
j
cos α 0 . . . 0 − sin α
0
. . . 0
..
0
1
0
.
.
..
.
.
.
1
0
0
j ∈ O(Rd )
U1 = sin α 0
0
cos α
0
..
0
0
1
.
..
..
. 0
.
0
0 ...
...
0
1
with α = arctan
q
− λλ1j . We then have (U1 U0 KU0T U1T )11 = 0. Now the same procedure can be applied to the
second diagonal entry λ2 , leading to the matrix U2 U1 U0 KU0T U1T U2T with
(U2 U1 U0 KU0T U1T U2T )11 = (U2 U1 U0 KU0T U1T U2T )22 = 0
Iterating this process, we obtain that Ud . . . U1 U0 KU0T U1T . . . UdT has zeros on the diagonal, so Ud . . . U1 U0 ∈
O(Rd ) is the required orthogonal transformation.
References
AE14.
A. Arnold and J. Erb. Sharp entropy decay for hypocoercive and non-symmetric Fokker-Planck
equations with linear drift. arXiv:1409.5425v2, 2014.
AMO16. H. Alrachid, L. Mones, and C. Ortner. Some remarks on preconditioning molecular dynamics. arXiv
preprint arXiv:1612.05435, 2016.
Bas98.
R. F. Bass. Diffusions and elliptic operators. Springer Science & Business Media, 1998.
Ben75.
C. H. Bennett. Mass tensor molecular dynamics. Journal of Computational Physics, 19(3):267 –
279, 1975.
BGL13.
D. Bakry, I. Gentil, and M. Ledoux. Analysis and geometry of Markov diffusion operators, volume
348. Springer Science & Business Media, 2013.
Bha97.
R. Bhatia. Matrix analysis, volume 169 of Graduate Texts in Mathematics. Springer-Verlag, New
York, 1997.
BPSSS11. A. Beskos, F. J. Pinski, J. M. Sanz-Serna, and A. M. Stuart. Hybrid Monte Carlo on Hilbert spaces.
Stochastic Process. Appl., 121(10):2201–2230, 2011.
BRSV08. A. Beskos, G. Roberts, A. Stuart, and J. Voss. MCMC methods for diffusion bridges. Stoch. Dyn.,
8(3):319–350, 2008.
BS09.
A. Beskos and A. Stuart. MCMC methods for sampling function space. In ICIAM 07—6th International Congress on Industrial and Applied Mathematics, pages 337–364. Eur. Math. Soc., Zürich,
2009.
CBP09.
M. Ceriotti, G. Bussi, and M. Parrinello. Langevin equation with colored noise for constanttemperature molecular dynamics simulations. Physical Review Letters, 102(2):020601, 2009.
CCG12. P. Cattiaux, D. Chafaı, and A. Guillin. Central limit theorems for additive functionals of ergodic
markov diffusions processes. ALEA, 9(2):337–382, 2012.
DLP16.
A. B. Duncan, T. Lelievre, and G. A. Pavliotis. Variance reduction using nonreversible Langevin
samplers. Journal of Statistical Physics, 163(3):457–491, 2016.
DMS15. J. Dolbeault, C. Mouhot, and C. Schmeiser. Hypocoercivity for linear kinetic equations conserving
mass. Trans. Amer. Math. Soc., 367(6):3807–3828, 2015.
44
EK86.
EN00.
GC11.
GCS+ 14.
HHMS93.
HHMS05.
HJ13.
HNW15.
HSV07.
HSV09.
HSVW05.
JO10.
Kaz88.
Kli87.
KLO12.
Liu08.
LM15.
LNP13.
LRS10.
LS16.
MCF15.
MPP02.
MV00.
MWL16.
OP11.
OPPS12.
OPPS15.
OPPS16.
Pav14.
PS03.
PS05.
RBS15a.
S. N. Ethier and T. G. Kurtz. Markov processes. Wiley Series in Probability and Mathematical
Statistics: Probability and Mathematical Statistics. John Wiley & Sons, Inc., New York, 1986.
Characterization and convergence.
K.-J. Engel and R. Nagel. One-parameter semigroups for linear evolution equations, volume 194
of Graduate Texts in Mathematics. Springer-Verlag, New York, 2000. With contributions by S.
Brendle, M. Campiti, T. Hahn, G. Metafune, G. Nickel, D. Pallara, C. Perazzoli, A. Rhandi, S.
Romanelli and R. Schnaubelt.
M. Girolami and B. Calderhead. Riemann manifold Langevin and Hamiltonian Monte Carlo methods. J. R. Stat. Soc. Ser. B Stat. Methodol., 73(2):123–214, 2011. With discussion and a reply by
the authors.
A. Gelman, J. B. Carlin, H. S. Stern, D. B. Dunson, A. Vehtari, and D. B. Rubin. Bayesian data
analysis. Texts in Statistical Science Series. CRC Press, Boca Raton, FL, third edition, 2014.
C.-R. Hwang, S. Hwang-Ma, and S. J. Sheu. Accelerating Gaussian diffusions. Ann. Appl. Probab.,
3(3):897–913, 1993.
C.-R. Hwang, S.-Y. Hwang-Ma, and S.-J. Sheu. Accelerating diffusions. Ann. Appl. Probab.,
15(2):1433–1444, 2005.
Roger A. Horn and Charles R. Johnson. Matrix analysis. Cambridge University Press, Cambridge,
second edition, 2013.
C.-R. Hwang, R. Normand, and S.-J. Wu. Variance reduction for diffusions. Stochastic Process.
Appl., 125(9):3522–3540, 2015.
M. Hairer, A. M. Stuart, and J. Voss. Analysis of SPDEs arising in path sampling. II. The nonlinear
case. Ann. Appl. Probab., 17(5-6):1657–1706, 2007.
M. Hairer, A. Stuart, and J. Voss. Sampling conditioned diffusions. In Trends in stochastic analysis, volume 353 of London Math. Soc. Lecture Note Ser., pages 159–185. Cambridge Univ. Press,
Cambridge, 2009.
M. Hairer, A. M. Stuart, J. Voss, and P. Wiberg. Analysis of SPDEs arising in path sampling. I.
The Gaussian case. Commun. Math. Sci., 3(4):587–603, 2005.
A. Joulin and Y. Ollivier. Curvature, concentration and error estimates for Markov chain Monte
Carlo. Ann. Probab., 38(6):2418–2442, 2010.
J. Y. Kazakia. Orthogonal transformation of a trace free symmetric matrix into one with zero
diagonal elements. Internat. J. Engrg. Sci., 26(8):903–906, 1988.
W. Kliemann. Recurrence and invariant measures for degenerate diffusions. The Annals of Probability, pages 690–707, 1987.
T. Komorowski, C. Landim, and S. Olla. Fluctuations in Markov processes, volume 345 of
Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Springer, Heidelberg, 2012. Time symmetry and martingale approximation.
J. S. Liu. Monte Carlo strategies in scientific computing. Springer Science & Business Media, 2008.
B. Leimkuhler and C. Matthews. Molecular dynamics, volume 39 of Interdisciplinary Applied Mathematics. Springer, Cham, 2015. With deterministic and stochastic numerical methods.
T. Lelièvre, F. Nier, and G. A. Pavliotis. Optimal non-reversible linear drift for the convergence to
equilibrium of a diffusion. J. Stat. Phys., 152(2):237–274, 2013.
T. Lelièvre, M. Rousset, and G. Stoltz. Free energy computations. Imperial College Press, London,
2010. A mathematical perspective.
T. Lelièvre and G. Stoltz. Partial differential equations and stochastic methods in molecular dynamics. Acta Numer., 25:681–880, 2016.
Y.-A. Ma, T. Chen, and E. Fox. A complete recipe for stochastic gradient MCMC. In Advances in
Neural Information Processing Systems, pages 2899–2907, 2015.
G. Metafune, D. Pallara, and E. Priola. Spectrum of Ornstein-Uhlenbeck operators in Lp spaces
with respect to invariant measures. J. Funct. Anal., 196(1):40–60, 2002.
P. A. Markowich and C. Villani. On the trend to equilibrium for the Fokker-Planck equation: an
interplay between physics and functional analysis. Mat. Contemp, 19:1–29, 2000.
C. Matthews, J. Weare, and B. Leimkuhler. Ensemble preconditioning for Markov Chain Monte
Carlo simulation. arXiv:1607.03954, 2016.
M. Ottobre and G. A. Pavliotis. Asymptotic analysis for the generalized Langevin equation. Nonlinearity, 24(5):1629, 2011.
M. Ottobre, G. A. Pavliotis, and K. Pravda-Starov. Exponential return to equilibrium for hypoelliptic quadratic systems. J. Funct. Anal., 262(9):4000–4039, 2012.
M. Ottobre, G. A. Pavliotis, and K. Pravda-Starov. Some remarks on degenerate hypoelliptic
Ornstein–Uhlenbeck operators. J. Math. Anal. Appl., 429(2):676–712, 2015.
M. Ottobre, N. S. Pillai, F. J. Pinski, and Andrew M. Stuart. A function space HMC algorithm
with second order Langevin diffusion limit. Bernoulli, 22(1):60–106, 2016.
G. A. Pavliotis. Stochastic processes and applications: Diffusion Processes, the Fokker-Planck and
Langevin Equations, volume 60. Springer, 2014.
G. A. Pavliotis and A. M. Stuart. White noise limits for inertial particles in a random field.
Multiscale Model. Simul., 1(4):527–533 (electronic), 2003.
G. A. Pavliotis and A. M. Stuart. Analysis of white noise limits for stochastic systems with two
fast relaxation times. Multiscale Model. Simul., 4(1):1–35 (electronic), 2005.
L. Rey-Bellet and K. Spiliopoulos. Irreversible Langevin samplers and variance reduction: a large
deviations approach. Nonlinearity, 28(7):2081–2103, 2015.
45
RBS15b.
RC13.
Vil09.
WHC14.
L. Rey-Bellet and K. Spiliopoulos. Variance reduction for irreversible Langevin samplers and diffusion on graphs. Electron. Commun. Probab., 20:no. 15, 16, 2015.
C. Robert and G. Casella. Monte Carlo statistical methods. Springer Science & Business Media,
2013.
C. Villani. Hypocoercivity. Number 949-951. American Mathematical Soc., 2009.
S.-J. Wu, C.-R. Hwang, and M. T. Chu. Attaining the optimal Gaussian diffusion acceleration. J.
Stat. Phys., 155(3):571–590, 2014.
| 10math.ST
|
DIVERGENCES MEASURES
Amadou Diadie Ba(1) , Gane Samb Lo(1,2) .
(1)
arXiv:1604.04242v2 [stat.ME] 17 Aug 2016
(2)
LERSTAD, Université Gaston Berger, Sénégal.
LSA, Université Pierre et Marie Curie, France.
1. Introduction
In this paper, we deal with divergence measures estimation using both wavelet and classical probability
density functions. Let P be a class of two probability measures on Rd , a divergence measure on P is an
application,
(1.1)
D:
P2
−→ R
(Q, L) 7−→ D(Q, L)
such that D(Q, Q) = 0 for any Q ∈ P.
A divergence measure then is not necessarily symmetrical and it does neither have to be a metric. To better
explain our concern, let us intoduce some of the most celebrated divergence measures. Most of them are based
on probability density functions. So let us suppose that all Q ∈ P have p.d.f. fQ with respect to a σ-finite
measure ν on (Rd , B(Rd )) that is usually the Lebesgues measure. We have the L22 -divergence measure
Z
(fQ (x) − fL (x))2 dν(x);
DL2 (Q, L) =
Rd
the family of Renyi divergence measures indexed by α 6= 1, more known under the name of Renyi-α,
Z
1
(1.2)
DR,α (Q, L) =
log
fQα (x)fL1−α (x)dν(x) ;
α−1
Rd
the family of Tsallis divergence measures indexed by α 6= 1, also known under the name of Tsallis-α
Z
1
1−α
α
(1.3)
DT,α (Q, L) =
fQ (x)fL (x) − 1 dν(x);
α−1
Rd
and finally the Kulback-Leibler divergence measure
Z
fQ (x) log(fQ (x)/fL (x)) dν(x).
(1.4)
DKL (Q, L) =
Rd
The latter, the Kullback-Leibler measure, may be interpreted as a limit case of both the Renyi’s family and
the Tsallis’ one by letting α → 1. As well, for α near 1, the Tsallis family may be seen as derived from a fisrt
order expansion DR,α (Q, L) based on the first order expansion of the logarithm function in the neigborhood
of the unity.
Although we are focusing on the aforementioned divergence measures, we have to attract the attention of
the reader that there exist quite a few number of them. Let us cite for example the ones denamed as : AliSilvey distance or f -divergence [[1]], Cauchy-Schwarz, Jeffrey’s divergence (see [2]), Chernoff, Jensen-Shannon
divergence etc. According to [3], there is more than a dozen of different divergence measures that one can
find in the literature.
1
2
DIVERGENCES MEASURES CONSISTENCY BANDS
Before coming back to our divergence measures of interest, we want to highlight some important applications of them. Indeed, divergence has proven to be useful in applications. Let us cite a few of them
(a) It may be as a similarity measure in image registration or multimedia classification (see [4]). It is
also applicable as a loss function in evaluating and optimizing the performance of density estimation
methods (see [6]).
(b) The estimation of divergence between the samples drawn from unknown distributions gauges the
distance between those distributions. Divergence estimates can then be used in clustering and in particular for deciding whether the samples come from the same distribution by comparing the estimate
to a threshold.
(c) Divergence estimates can also be used to determine sample sizes required to achieve given performance
levels in hypothesis testing.
(d) Divergence gauges how differently two random variables are distributed and it provides a useful
measure of discrepancy between distributions. In the frame of information theory , the key role of
divergence is well known.
(e) There has been a growing interest in applying divergence to various fields of science and engineering
for the purpose of estimation, classification, etc [[7], [9]].
(f) Divergence also plays a central role in the frame of large deviations results including the asymptotic
rate of decrease of error probability in binary hypothesis testing problems.
The reader may find more applications descriptions in the following papers: [10],[11], [12], [14], [15], [16],
[17],[18]
We may see two kinds of problems we encounter when dealing with these objects. First, the divergence
measures may not be finite on the whole support of the distributions.
These two remarks apply to too many divergence measures. Both these problems are avoided with some
boundedness assumption as in Singh et al. [25] and in Krishnamurthy et al. [23]. In the case where all Q ∈ P
have p.d.f. fQ with respect to a σ-finite measure ν on (Rd , B(Rd )), these authors suppose that there exist two
finite numbers 0 < κ1 < κ2 < +∞ such that
(1.5)
κ1 ≤ f Q , f L ≤ κ2 .
so that the quantities Iα (PX , PY , α), for example, are finite in the expressions of Renyi-α and Tsallis-α mea-
sures and that the Kullback-Leibler is also finite. We will follow these authors by adopting the Assumption
4 throughout this paper.
1.1. Divergence measures as goodness-of-fit tests. The divergence measures may be applied to two
statistical problems among others.
First, it may be used as a goodness-of-fit problem like that : let X1 , X2 , .... a sample from X with an
unkown probability distribution PX and we want to test the hypothesis that PX is equal to a known and
fixed probability P0 .
For example Jager et al. (in [5]) proposed P0 to be the uniform probability distribution on [0, 1].
DIVERGENCES MEASURES CONSISTENCY BANDS
3
Theoritically, if we want to test the null hypothesis H0 : F = F0 versus H1 : F 6= F0 we have to use any of
general phi-divergence test statistic φ(fn (x), f0 (x)). Then our test statistic is of the form
Z
D(fn , f0 ) = φ(fn (x), f0 (x))dx
Then we can answer this question by estimating a divergence measure D(PX , P0 ) by the plug-in estimator
(n)
D(PX , P0 ) based on the sequences of empirical probabilities
n
(n)
PX =
1X
δX .
n i=1 i
(n)
From there establishing an asymptotic theory of ∆n = D(PX , P0 ) − D(PX , P0 ) is necessary to conclude.
1.2. Divergence measures as a comparison tool problem. As a comparison tool for two distributions,
we may have two samples and wonder whether they come from the same probability measure. Here, we also
may two different cases. In the first, we have two independent samples X1 , X2 , .... and Y1 , Y2 , .... respectively
(n)
(n)
from a random variable X and Y. Here the empirical divergence D(PX , PY ) is the natural estimator of
D(PX , PY ) on which depends the statistical test of PX = PY .
But the data may aslo be paired (X, Y ), (X1 , Y2 ), (X2 , Y2 ), ..., that is Xi and Yi are measurements of the
same case i = 1, 2, ... In that case, testing the equality of the margins PX = PY should be based on the
empirical probabilities from the couple (X, Y ), that is
n
(n)
P(X,Y ) =
1X
δ(Xi ,Yi ) .
n i=1
1.3. Related work : Krisnamurthy et al. ([23]), Singh and Poczos ([25] ) studied mainly the independent
case of the two distributions comparaison. They both used divergence measures based on probability density
functions and concentrated of Renyi-α, Tsallis-α and Kullback-Leibler. (???). Reyni :
- Singh and Poczos [25] proposed divergence estimators that achieve the parametric convergence of rate
n−N (s) where 0 < N (s) ≤ 1/2 depends on the smoothness s of the densities f and g both in a Holder class
of smothness s
They showed that
and
i
h
(n)
(n)
E DT,α (PX , PY ) − DT,α (PX , PY ) = O (ǫn )
h
i
(n)
(n)
E DR,α (PX , PY ) − DR,α (PX , PY ) = O (ǫn )
4s
where ǫn = Ω(n−γ ) and γ = min{ 4s+d
, 1/2}.
Singh and Poczos [25] , and Krishnamurthy et al [23] each proposed divergence estimators that achieve the
parametric convergence rate O T1 under weaker conditions than those given in [39].
4
DIVERGENCES MEASURES CONSISTENCY BANDS
Krishnamurthy et al [23] proposed three estimators for the divergence measures DL2 (PX , PY ), DR,α (PX , PY ),
and for DT,α (PX , PY ): the plugging (pl), linear (lin), and the quadratic (qd) one. They showed that
s
(n)
(n)
pl
E DT,α
(PX , PY ) − DT,α (PX , PY ) = O n− 2s+d
and
(n)
(n)
lin
E DT,α
(PX , PY ) − DT,α (PX , PY )
(n)
(n)
qd
E DT,α
(PX , PY ) − DT,α (PX , PY )
with the quadratic estimator
(n)
(n)
qd
E DR,α
(PX , PY ) − DR,α (PX , PY )
(n)
(n)
qd
E DT,α
(PX , PY ) − DT,α (PX , PY )
≤
≤
1
2s
c n− 2 + n− 2s+d
1
3s
c n− 2 + n− 2s+d
1
3s
≤ c n− 2 + n− 2s+d
1
3s
≤ c n− 2 + n− 2s+d
Poczos and Jeff ([26]) considered two samples not necessarily with the same size and used the k−Nearest
Neighbour (kNN) based density estimators. They showed that, if |α − 1| < k, then Reyni estimator est
asymptotically unbiaised that is
(m)
(n)
lim E DR,α (PX , PY ) = DR,α (PX , PY )
n,m→∞
and it is consistent for L2 norm that is
2
(n)
(m)
lim E DR,α (PX , PY ) − DR,α (PX , PY ) = 0.
n,m→∞
All this is under conditions on the densities fQ and fL .
In Liu et al. [27] and worked with densities in Holder classes, whereas our work applies for densities in the
Bessov class
In any case, the asymptotic distributions of the estimators in [[30], [25],[23]] are currently unknown.
===========
But, in our view this case should rely on the available data so that using the same sample size may lead
to a reduction (?). To apply their method, one should take the minimum of the two sizes and then loose
(n)
(m)
information. We suggest to come back to a general case and then study the asymptotics of D(PX , PY )
based on samples X1 , X2 , .., Xn . and Y1 , Y2 , ..., Ym .
As for the fitting approach, we may cite Hamza et al. ([28]) who used modern techniques of Mason and
co-authors ([31] ,[32] ,[33]) on consistency bounds for p.d.f’s kernel estimators. But, these authors, hamza and
al., in the current version of their work, did not address the existence problem of the divergence measures.
We will seize the opportunity of these papers to correct this.
Also, for the fitting case, and when using Renyi-α, Tsallis-α and Kulback-Leibler measures, we do not have
(n)
symmetry. So we have to deal with the estimation of both D(PX , P0 ) by D(PX , P0 ) and that of D(P0 , PX )
(n)
by D(P0 , PX ) and decided which of these cases is better.
DIVERGENCES MEASURES CONSISTENCY BANDS
5
As to the paired case, we are not aware of works on this. Yet, this approach is very important and should
be addressed.
This paper will be devoted to a general study the estimation the Renyi-α, Tsallis-α, Kulback-Leibler, and
L2 measures in the three level : fitting, independent comparison and paired comparison.
We will use empirical estimations of the density functions both by the Parzen estimator and the wavelet
ones. The main novelty here resides in the wavelet approach. When using the Parzen statistics, our main
tool will be modern techniques of Mason and co-authors ([31] ,[32] ,[33]) on consistency bounds for p.d.f’s
kernel. For the wavelet approch, we will mainly back on the Giné and Nickl paper ([43]).
Since the tools we are using do not have the level of developpement, our results for the Parzen scheme will
use k-dimensional distributions, while those pertaining to the wavelet frame are set for univariate distributions.
But, we will have to give a precise account of wavelet theory and its applications to statistical estimation,
using Hardle et al.([37]), .....
The paper will be organized as follows. In section 3, we will describe how to use the density estimations
both for Parzen and wavelets as well as the statements of the main hypothesis. As for wavelets, a broader
account will be given in Appendix .. In Section 3, we deal with the fitting questions. Section 4 is devoted to
independent distribution comparison. Finally in Section 5, we deal with margins distribution comparison. In
all Sections 3, 4 and 5, we will establish strong efficiency and central limit theorems.
Under standards assumptions on the densities fQ (x), fL (x), on the scale function ϕ and on the wavelet
kernel K (formalized in the sequel) we establish the following properties.
a) We define the linear wavelet density estimators and establish the consistency of these density estimators
b) We establish the asymptotic consistency showing that . . .(Theorem ??)
b) When .... we prove that the estimator is asymptotically normal (Theorem ??).
c) We derive . . .
d) We also prove
e) Lastly, we prove
Organization of the paper (plan)
2. RESULTS
We are going to establish general results both for consistency and asymptotic normality. Next results for
particular divergences measures will follow as corollaries.
6
DIVERGENCES MEASURES CONSISTENCY BANDS
2.1. General conditions. Let J(f, g) be a functional of two densities functions f and g satisfying Assumption 4 below of the form
J(f, g) =
Z
φ(f (x), g(x))dx
D
where φ(s, t) is a function of (s, t) ∈ R2 of class C 2 . We adopt the following notations with respect to the partial
derivatives :
(1)
φ1 (s, t) =
∂φ
∂φ
(1)
(s, t), φ2 (s, t) =
(s, t)
∂s
∂t
and
∂2φ
∂ 2φ
∂2φ
(2)
(2)
(2)
(s, t), φ2 (s, t) = 2 (s, t), φ1,2 (s, t) = φ2,1 (s, t) =
(s, t).
2
∂s
∂t
∂s∂t
We require the following general conditions
(2)
φ1 (s, t) =
C1-φ : The following integrals are finite
Z n
o
(1)
(1)
|φ1 (f (x), g(x))| + |φ2 (f (x), g(x))| dx < +∞.
(1)
(2)
(1)
(2)
C2-φ : For any measurable sequences of functions δn (x), δn (x), ρn (x), and ρn (x) of x ∈ D, uniformly
converging to zero, that is
max
i=1,2, j=1,2
then
(2.1)
Z
φ1
(2.2)
Z
φ2
(2)
(2)
and
(2.3)
Z
(2)
φ1,2
sup
n
δn(i) (x) + ρ(j)
n (x)
o
< +∞,
Z
(2)
f (x) + δn(1) (x), g(x) dx → φ1 (f (x), g(x))dx,
Z
(2)
f (x), g(x) + δn(2) (x) dx → φ2 (f (x), g(x))dx
f (x) +
ρ(1)
n (x), g(x)
+
ρ(2)
n (x)
dx →
Z
(2)
φ1,2 (f (x), g(x))dx.
Remark 1. These results may result from the Dominated Convergence Theorem or the monotone Convergence
Theorem or from other limit theorems. We may either express conditions under which these results hold true
on the general function φ. But we choose here to state the final results and next, to check them for particular
cases, on which reside our real interests.
Our general results concern the estimations of J(f, g) in a one sample (see Theorem 2) and two samples
problems (see Theorem 3). In both case, we use the linear wavelet estimators of f and g, denoted fn and gn ,
and defined in [37]. From there we mainly use results for Giné and Nickl [43].
Under their conditions, we define
(2.4)
an = kfn − f k∞ , bn = kgn − gk∞ , cn = an ∨ bn ,
where khk∞ stands for supx∈D |h(x)|.
DIVERGENCES MEASURES CONSISTENCY BANDS
7
2.2. Wavelet setting. The wavelet setting involves two functions ϕ and ψ in L2 (R) such that
n
o
2j/2 ϕ(2j (.) − k), 2j/2 ψ(2j (.) − k), (j, k) ∈ Z2
be a orthonormal basis of L2 (R) . The associated kernel function of the wavelets ϕ and ψ is defined by
Kj (x, y) = 2j K(2j x, 2j y), j ∈ N
where K(x, y) =
P
k∈Z
ϕ(x − k)(y − k), x, y ∈ R.
For a mesurable function we define Kj (h)(x) =
Assuming the following :
R
Kj (x, y)h(y)dy.
Assumption 1. (S ). ϕ and ψ are bounded and have compact support and either (i) the father wavelet ϕ
R
has weak derivatives up to order S in Lp (R) or (ii) ψ has S vanishing moments, i.e xm ψ(x)dx = 0 for all
m = 0, . . . , S − 1.
Assumption 2. ϕ is of bounded p-variation for some 1 ≤ p < ∞ and vanishes on (B1 , B2 ]c for some
−∞ < B1 < B2 < ∞.
Assumption 3. The resolution level j := jn is such that 2jn ≈ n1/4 .
With this assumption, one has jn ր ∞ and
(2.5)
r
jn 2jn
+ 2−t/jn
n
jn
log log n
=
s
1 log n
+ n−t/4 → 0 as n → ∞, ∀t > 0
4 log 2 n3/4
→ ∞ as n → ∞,
sup (j2n − jn ) ≤ τ .
and
n≥n0
These conditions allow the use of results of Giné [43].
Definition 1. Given two independent samples with size n X1 , . . . Xn ∼ f and Y1 , . . . Yn ∼ g respectively from
a random variable X and Y and absolute continuous law PX and PY on R, straighforward wavelets estimators
of f and g are defined by
n
fn (x) = Pn,X (Kjn (x, .)) =
(2.6)
and
1X
Kj (x, Xi )
n i=1 n
n
1X
Kj (x, Yi )
gn (x) = Pn,Y (Kjn (x, .)) =
n i=1 n
(2.7)
t
In the sequel we suppose the densities f and g belong to the Besov space B∞,∞
(R) (see [37]),
h ∈ L∞ (R) : khks,∞,∞ := sup |αk (h)| + sup sup 2l(t+1/2) βlk (h) < ∞
k∈Z
where αk (h) =
the function h.
R
R
h(x) ϕ(x − k)dx and βlk (h) =
l≥0 k∈Z
R
R
2l/2 h(x) ψ(2l x − k)dx are the wavelet coefficients of
t
The spaces B∞,∞
(R) are the Holder-Zygmund spaces, which contain the classical Holder-Lipschitz spaces.
Given these definitions, we now describe how we will use the wavelet approach.
8
DIVERGENCES MEASURES CONSISTENCY BANDS
t
It is remarquable from Theorem 3 (in [43]) that, if the densities f and g belong to B∞,∞
(R), ϕ satisfies
Assumption2, and ϕ, ψ satisfy Assumption1 (T ) then an , bn and cn are all of them
s
!
1 log n
−t/4
O
+n
4 log 2 n3/4
almost surely and converge all to zero at this rate (with 0 < t < T ).
In order to establish the asymptotic normality of the divergences estimators, we need to recall some facts
about kernels wavelets.
t
For h ∈ B∞,∞
(R), the Theorem 1 below provides the asymptotic normality of
√
n
Z
(fn (x) − f (x))h(x)dx
necessary for setting the asymptotic normality of divergence measure, provided the finitness of PX (Kjn (h)(X))2 .
t
Theorem 1. Under Assumption 1 and 2 and if h ∈ B∞,∞
(R), then we have
√
n
Z
(fn (x) − f (x))h(x)dx
N (0, σh2 ) as n → ∞,
where
σh2 = PX (Kjn (h)(X))2 − (PX (Kjn (h)(X))2
(2.8)
The symbol
denotes the convergence in law.
R
PX (h) = h(x)f (x)dx denotes the expection of the measurable function h.
The proof of this theorem is postpooned to Subsection 4.
2.3. Main results. In the sequel J(f, g) is a functional of two densities functions f and g satisfying Assumption 4 and defined by
J(f, g) =
Z
φ(f (x), g(x))dx
D
where φ(s, t) is a function of (s, t) ∈ R2 of class C 2 .
Define the functions h1 and h2 by
(1)
(1)
h1 (x) = φ1 (f (x), g(x)) and h2 (x) = φ2 (f (x), g(x))
and the constants A1 and A2 by
A1 =
Z
|h1 (x)| dx and A2 =
Suppose that A1 and A2 are both finites.
Z
|h2 (x)| dx
DIVERGENCES MEASURES CONSISTENCY BANDS
9
2.3.1. One side estimation. Suppose that either we have a sample X1 , . . . , Xn with unknown p.d.f f and
a known p.d.f g and we want to study the limit behavior of J(fn , g) or we have a sample Y1 , . . . , Yn with
unknown p.d.f g and a known p.d.f. f and we want to study the limit behavior of J(f, gn ).
fn or gn are as in (2.6) or in (2.7).
Theorem 2. Under Assumption 1 and 2, we have :
• Consistency :
(2.9)
lim sup
n→∞
|J(fn , g) − J(f, g)|
≤ A1 , a.s
an
and
(2.10)
lim sup
n→∞
|J(f, gn ) − J(f, g)|
≤ A2 , a.s
bn
where an and bn are as in (2.4).
• Asymptotic normality :
(2.11)
√
n(J(fn , g) − J(f, g))
N 0, σ12
as n → ∞
√
n(J(f, gn ) − J(f, g))
N 0, σ22
as n → ∞
and
(2.12)
where
σ12 = PX (Kjn (h1 )(X))2 − (PX (Kjn (h1 )(X)))2
(2.13)
and
(2.14)
2
2
σ22 = PY (Kjn (h2 )(Y )) − (PY (Kjn (h2 )(Y ))) .
2.3.2. Two sides estimation. Suppose that we have two samples X1 , . . . , Xn and Y1 , . . . , Yn with respectively
unknown p.d.f f and g and we want to study the limit behavior of J(fn , gn ).
Theorem 3. Under Assumption 1 and 2, we have
(2.15)
lim sup
n→∞
J(fn , gn ) − J(f, g)
≤ A1 + A2
cn
and
(2.16)
√
n(J(fn , gn ) − J(f, g))
where σ32 = σ12 + σ22 .
N 0, σ32
as n → ∞
σ12 and σ22 are as in 2.13 and 2.14.
The proofs are given in Section 4.
Right now, we are going to apply these results to particular divergence measures estimations. We will have
to check the conditions (2.1),(2.2), and (2.3).
10
DIVERGENCES MEASURES CONSISTENCY BANDS
2.4. Particular cases. Results for Tsallis-α, Renyi-α, Kullback-Leibler and L2 divergences measures will
follow as corollaries since they are particular cases of J(f, g). To ensure the general conditions C1 − φ and
C2 − φ we begin by giving the main assumption on the densities f and g.
Assumption 4. There exists a compact K ⊂ R containing the supports of the densities f and g and such
that
∃(κ1 , κ2 ) ∈ R2 , such that , 0 < κ1 ≤ f (x), g(x) ≤ κ2 < ∞.
Throughout this subsection, we will use the Assumption 4. The integrales are on K and the constantes
are integrables. We use the Dominate convergence theorem based on this remark. Meaning that with
Assumption 4, then the conditions (2.1),(2.2), and (2.3) are satisfied.
In the following the divergence measures, the functions h1 and h2 should be updated in each cases, in the
t
same way that A1 , A2 , σ12 , and σ22 since they depend on the bessov functions f and g in B∞,∞
(R) and on the
randoms variables X and Y .
2.4.1. Case 1 : Hellinger integral of order α. We start by the Hellinger integral of order α defined by
Z
I(f, g) =
f α (x)g 1−α (x)dx
K
α 1−α
Here φ(s, t) = s t
and one has
(1)
(1)
φ1 (s, t) = αsα−1 t1−α , φ2 (s, t) = (1 − α)sα t−α
and
(2)
(2)
(2)
(2)
φ1 (s, t) = α(α − 1)sα−2 t1−α , φ2 (s, t) = −α(1 − α)sα t−α−1 , φ1,2 (s, t) = φ2,1 (s, t) = α(1 − α)sα−1 t−α .
Now let h1 (x) = αf α−1 (x)g 1−α (x) and h2 (x) = (1 − α)f α (x)g −α (x)
R
R
A1 = h1 (x)dx < ∞ and A2 = |h2 (x)| dx < ∞.
Corollary 1. (One sample estimation). We have
• Consistency
lim sup
n−→∞
lim sup
n−→∞
• Asymptotic normality
|I(fn , g) − I(f, g)|
≤ A1 , a.s
an
|I(f, gn ) − I(f, g)|
≤ A2 , a.s
bn
√
n(I(fn , g) − I(f, g))
√
2
N (0, σI,1
) as n → ∞
2
N (0, σI,2
) as n → ∞
n(I(f, gn ) − I(f, g))
where
2
σI,1
= PX (Kjn (h1 )(X))2 − (PX (Kjn (h1 )(X)))2
and
2
2
2
σI,2
= PY (Kjn (h2 )(Y )) − (PY (Kjn (h2 )(Y ))) .
DIVERGENCES MEASURES CONSISTENCY BANDS
11
whith h1 (x) = αf α−1 (x)g 1−α (x) and h2 (x) = (1 − α)f α (x)g −α (x).
Corollary 2. (Two side estimation) We have
• Consistency
lim sup
n−→∞
• Asymptotic normality
|I(fn , gn ) − I(f, g)|
≤ A1 + A2 , a.s
cn
√
n(I(fn , gn ) − I(f, g))
N (0, σ32 ) as n → ∞
where σ32 = σ12 + σ22 .
In the following, handling I the Hellinger integral of order α, conditions (2.1),(2.2), and (2.3) are satisfied
from Assumption 4
2.4.2. Case 2 : Tsallis Divergence measure.
DT,α (f, g) =
1
(I(f, g) − 1)
α−1
Corollary 3. (One side estimation) We have
• Consistency
lim sup
n−→∞
lim sup
n−→∞
|DT,α (fn , g) − DT,α (f, g)|
1
≤
A1 , a.s
an
|α − 1|
1
|DT,α (f, gn ) − DT,α (f, g)|
≤
A2 , a.s
bn
|α − 1|
• Asymptotic normality
√
n(DT,α (fn , g) − DT,α (f, g))
√
n(DT,α (f, gn ) − DT,α (f, g))
where
2
σT,1
=
and
2
N 0, σT,1
2
N 0, σT,2
as n → ∞
as n → ∞
1
PX (Kjn (h1 )(X))2 − (PX (Kjn (h1 )(X)))2
2
(α − 1)
1
2
2
.
(h
)(Y
)))
(h
)(Y
))
−
(P
(K
P
(K
2
2
Y
j
Y
j
n
n
(α − 1)2
whith h1 (x) = αf α−1 (x)g 1−α (x) and h2 = (1 − α)f α (x)g −α (x).
2
σT,2
=
Corollary 4. (Two sides estimation)
Under conditions of theorem , we have
• Consistency
lim sup
n−→∞
• Asymptotic normality
2
2
where σT2 = σT,1
+ σT,2
.
|DT,α (fn , gn ) − DT,α (f, g)|
≤ A1 + A2 , a.s
cn
√
n(DT,α (fn , gn ) − DT,α (f, g))
N 0, σT2
12
DIVERGENCES MEASURES CONSISTENCY BANDS
2.4.3. Case 3 : Reyni Divergence measure.
1
log I(f, g)
α−1
DR,α (f, g) =
Corollary 5. (One side estimation) We have
• Consistency
(2.17)
DR,α (fn , g) − DR,α (f, g) = Oa.s (an )
(2.18)
DR,α (f, gn ) − DR,α (f, g) = Oa.s (bn )
where an and bn are as in (2.4).
• Asymptotic normality
√
(2.19)
n(DR,α (fn , g) − DR,α (f, g))
2
N 0, σR,1
√
n(DR,α (f, gn ) − DR,α (f, g))
(2.20)
2
where σR,1
=
2
σI,1
2
(α−1) I(f,g)
2
and σR,2
=
2
σI,2
2
2
N 0, σR,2
(α−1) I(f,g)
.
as n → ∞
as n → ∞
.
Corollary 6. (Two sides estimation) We have
• Consistency
DR,α (fn , gn ) − DR,α (f, g) = Oa.s (cn )
(2.21)
where cn is as in (2.4)
• Asymptotic normality
√
n(DR,α (fn , gn ) − DR,α (f, g))
(2.22)
2
N 0, σR
2
2
2
where σR
= σR,1
+ σR,2
.
as n → ∞
The proofs of Corollaries 5 and 6 are postponed to Section4.
2.4.4. Case 4 : Kulback-Leib Divergence measure.
DKL (f, g) =
In this case φ(s, t) = s log st and one has
Z
K
f (x) log
f (x)
dx
g(x)
s (1)
s
(1)
φ1 (s, t) = 1 + log , φ2 (s, t) = −
t
t
and
1
s
1 (2)
(2)
(2)
, φ2 (s, t) = 2 , φ1,2 (s, t) = φ2,1 (s, t) = − .
s
t
t
R
R
(x)
(x)
(x)
Thus h1 (x) = 1 + log fg(x)
dx < ∞, and A2 = K
, h2 (x) = fg(x)
, A1 = K 1 + log fg(x)
(2)
φ1 (s, t) =
f (x)
g(x)
dx < ∞.
With the Assumption 4, the conditions (2.1),(2.2), and (2.3) are satisfied for any measurables sequences
(1)
(2)
(1)
(2)
of functions δn (x), δn (x), ρn (x), and ρn (x) of x ∈ D, uniformly converging to zero.
DIVERGENCES MEASURES CONSISTENCY BANDS
13
Corollary 7. (One side estimation) We have
• Consistency
lim sup
n−→∞
lim sup
n−→∞
|DKL (fn , g) − DKL (f, g)|
≤ A1 , a.s
an
|DKL (f, gn ) − DKL (f, g)|
≤ A2 , a.s
bn
• Asymptotic normality
√
n(DKL (fn , g) − DKL (f, g))
√
n(DKL (f, gn ) − DKL (f, g))
2
N 0, σK,1
2
N 0, σK,2
where
2
σK,1
=
and
2
σK,2
=
as n → ∞
as n → ∞
1
PX (Kjn (h1 )(X))2 − PX (Kjn (h1 )(X)))2
(α − 1)2
1
2
2
PY (Kjn (h2 )(Y )) − (PY (Kjn (h2 )(Y ))) .
2
(α − 1)
(x)
and h2 (x) =
with h1 (x) = 1 + log fg(x)
f (x)
g(x)
Corollary 8. (Two sides estimation) We have
• Consistency
lim sup
n−→∞
|DKL (fn , gn ) − DKL (f, g)|
≤ A1 + A2 , a.s
cn
• Asymptotic normality
√
n(DKL (fn , gn ) − DKL (f, g))
2
N 0, σK
2
2
2
where σK
= σK,1
+ σK,2
as n → ∞
2.4.5. Case 5 : L2 Divergence measure.
DL2 (f, g) =
Z
K
2
(f (x) − g(x)) dx
2
Here φ(s, t) = |f (x) − g(x)| , but we proceed by a different route.
One has
DL2 (fn , g) − DL2 (f, g) =
=
=
Z
2
(fn (x) − g(x))2 − (f (x) − g(x)) dx
ZK
(fn (x) − f (x)) (fn (x) + f (x) − 2g(x)) dx
K
Z
Z
(fn (x) − f (x))2 dx
2 (fn (x) − f (x)) (f (x) − g(x)) dx +
K
K
and also
DL2 (f, gn ) − DL2 (f, g) = −2
Z
K
(gn (x) − g(x)) (f (x) − g(x)) dx +
Z
K
(gn (x) − g(x))2 dx
14
DIVERGENCES MEASURES CONSISTENCY BANDS
Let h1 (x) = 2(f (x) − g(x)) and h2 = −h1 . Then we deduce
Z
√
√
n (DL2 (fn , g) − DL2 (f, g)) =
n (fn (x) − f (x))h1 (x)dx + oP (1)
Z
√
√
n (DL2 (f, gn ) − DL2 (f, g)) =
n (gn (x) − g(x))h2 (x)dx + oP (1)
Let A1 = A2 = 2
R
K
|f (x) − g(x)| dx. Then we give
Theorem 4. (One side estimation )
• Consistency
lim sup
n−→∞
lim sup
n−→∞
DL2 (fn , g) − DL2 (f, g)
≤ A1 , a.s
an
DL2 (f, gn ) − DL2 (f, g)
≤ A2 , a.s
bn
• Asymptotic normality
√
n(DL2 (fn , g) − DL2 (f, g))
√
n(DL2 (f, gn ) − DL2 (f, g))
2
N 0, σL
2 ,1
2
N 0, σL
2 ,2
where
as n → ∞
as n → ∞
2
σL
= PX (Kjn (h1 )(X))2 − (PX (Kjn (h1 )(X))2
2 ,1
and
2
σL
= PY (Kjn (h2 )(Y ))2 − (PY (Kjn (h2 )(Y ))2
2 ,2
with h1 (x) = 2(f (x) − g(x)) and h2 (x) = 2(g(x) − f (x)).
Theorem 5. (Two sides estimation)
• Consistency
lim sup
n→∞
• Normality
where
2
σL
2
DL2 (fn , gn ) − DL2 (f, g))
≤ A1 + A2 a.s
cn
√
n(DL2 (fn , gn ) − DL2 (f, g))
=
2
σL
2 ,1
+
2
N 0, σL
2
2
σL
2 ,2
a.s n → ∞
3. Applications
3.1. Statistics tests. The divergence measures may be applied to two statistical problems among others.
First, it may be used as a goodness-of-fit problem like that : let X1 , X2 , .... a sample from X with an unkown
probability density function f and we want to test the hypothesis that f is equal to a known and fixed
probability density function g . We want to test
H0 : f = g
versus H1 : f 6= g,
t
both unctions f and g in Besov space B∞,∞
(R).
For a fixed x ∈ D, we can test the (pointwise) null hypothesis
(3.1)
H0 : f (x) = g(x)
versus H1 : f (x) 6= g(x)
DIVERGENCES MEASURES CONSISTENCY BANDS
15
using particular divergences measure like α−Tsallis, α−Renyi, KB, or L2 divergences.
Then our proposed test statistics are of the form
Z
Dφ (fn , g) = φ(fn (x), g(x))dx
As particular cases we consider
φ1 (s, t)
φ2 (s, t)
φ3 (s, t)
= sα t1−α
s
= s log
t
= |s − t|2
3.1.1. Limit distribution under null hypothesi H0 . In testing the null hypothesis, we propose tests statistics
using Tsallis, Renyi, Kulback and L2 divergence measures. Suppose that the null hypothesis H0 holds so that
g is a known p.d.f.
Then it follows, from the previous work that
√
n(DT,α (fn , g) − DT,α (f, g))
(3.2)
2
N 0, σT,1
where
as n → ∞
1
PX (Kjn (hT )(X))2 − (PX (Kjn (hT )(X)))2
2
(α − 1)
R
α−1
1−α
with hT (x) = αf
(x)g
(x) and Kjn (hT )(X) = Kjn (x, t)h1 (t)f (t)dt
2
σT,1
=
Renya divergence measure
2
where σR,1
=
2
σI,1
.
(α−1)2 I(f,g)
√
n(DR,α (fn , g) − DR,α (f, g))
2
N 0, σR,1
as n → ∞
2
σI,1
= PX (Kjn (h1 )(X))2 − (PX (Kjn (h1 )(X)))2
whith hR (x) = αf α−1 (x)g 1−α (x)
Kulback-Leib :
√
n(DKL (fn , g) − DKL (f, g))
2
N 0, σK,1
where
2
σK,1
=
(x)
where hK (x) = 1 + log fg(x)
as n → ∞
1
PX (Kjn (hK )(X))2 − PX (Kjn (hK )(X)))2
2
(α − 1)
3.2. Confidence bands. We want to obtain
4. PROOFS
The rest of this section, proceeds as follows. In Subsection4.1 we establish the proof of the Theorem 1.
Subsection4.2 is devoted to the proof of the Theorem 2. In Subsection 4.3 we present the proof of the theorem
3 . The Subsection 4.4 is devoted to proofs of the corollaries 5 and 6
16
DIVERGENCES MEASURES CONSISTENCY BANDS
4.1. Proof of the Theorem 1.
t
Proof. Suppose assumptions 1 and 2 are satisfied and h ∈ B∞,∞
(R) .
√ R
We start by showing first that n (fn (x) − f (x))h(x)dx is a sum of an empirical process based on the
sample Xi and applied on the function Kjn (h) and a random variable.
R
We have, by definition Kjn (h)(.) = Kjn (x, (.))h(x)dx. Write
!
Z
Z
n
1X
Kj (x, Xi )h(x) − f (x)h(x) dx
(fn (x) − f (x))h(x)dx =
n i=1 n
Z
n Z
1X
=
Kjn (x, Xi )h(x)dx − f (x)h(x)dx
n i=1
Z
n
1X
=
Kjn (h)(Xi ) − f (x)h(x)dx
n i=1
=
Therefore
where
√
n
Z
Pn,X (Kjn (h)) − PX h(X) = (Pn,X − PX )(Kjn (h)) + PX ((Kjn (h))(X) − h(X)).
(fn (x) − f (x))h(x)dx =
√
√
nR1,n = n(PX ((Kjn (h))(X) − h(X)).
√
√
n(Pn,X − PX )(Kjn (h)) + nR1,n
One has
2
PX (Kjn (h)(X))
=
=
Z
(Kjn (h)(x))2 f (x)dx
Z Z
= 2
2jn
Kjn (x, t)h(t)dt
Z Z
jn
2
jn
f (x)dx
K(2 x, 2 t)h(t)dt
2
f (x)dx.
P
Boundedness and support compactness of ϕ and ψ give K(2jn x, 2jn t) = k ϕ(2jn x − k)ψ(2jn t − k) ≤ C1 .
2
R
Now
K(2jn x, 2jn t)h(t)dt ≤ C12 C2 since ϕ vanishes on (B1 , B2 ]c and h is bounded. Finally
PX (Kjn (h)(X))2 ≤ κ2 22jn C12 C2 with C1 , C2 > 0.
Now the usual C.L.T gives
(4.1)
√
n(Pn,X − PX )(Kjn (h))
where σh2 = PX (Kjn (h)(X))2 − (PX (Kjn (h)(X))2 .
Then the theorem will be proved if we show that
√
N (0, σh2 ) as n → ∞
nR1,n = oP (1) and it is in this step that we use the
s
fact that h ∈ B∞,∞
(R).
From Theorem 9.3 in [37] one has
|PX (Kjn (h) − h)| ≤
Z
|Kjn (h)(x) − h(x)| f (x)dx
≤ C3 kKjn (h) − hk∞ kf k∞
≤ κ2 C3 2−jn t .
DIVERGENCES MEASURES CONSISTENCY BANDS
Therefore
17
√
√
nR1,n (h) ≤ κ2 C3 n2−jn t = κ2 C3 n(1−2t)/8 = oP (1),
for any 1/2 < t < T .
Note the moment condition in theorem quoted above is equivallent to Assumption 1 (S ) (see [37] page
85). This justify its use in our context.
Finally we conclude by
√
Z
n
where σh2 is defined above.
N (0, σh2 ) as n → ∞
(fn (x) − f (x))h(x)dx
4.2. Proof of the Theorem 2.
Proof. In the following development we are going to use systematically the Mean Value Theorem (M.V.T) in
a bivariate dimensional and with real functions θi (i = 1, 2, . . . , 6) depending on x ∈ K but always satisfying
|θi (x)| ≤ 1.
For ease of notation, we introduce the two following notations used in the sequel
∆n f (x) = fn (x) − f (x)
and ∆n g(x) = gn (x) − g(x)
such that
an = k∆n f k∞
and bn = k∆n gk∞ .
Let cn = max(an , bn ). Recall an , bn and cn are all oP (1).
We start by the one side asymptotic estimation.
One has
φ(fn (x), g(x)) = φ(f (x) + ∆n f (x), g(x)).
By an application of the M.V.T to the function u1 (x) 7→ φ(u1 (x), g(x)) one has that there exists θ1 (x) ∈ (0, 1)
such that
(4.2)
φ(fn (x), g(x))
(1)
=
φ(f (x), g(x)) + ∆n f (x)φ1 (f (x) + θ1 (x)∆n f (x), g(x))
where
(1)
(1)
(2)
∆n f (x)φ1 (f (x) + θ1 (x)∆n f (x), g(x)) = ∆n f (x) φ1 (f (x), g(x)) + θ1 (x)(∆n f (x))2 φ1 (f (x) + θ2 (x)∆n f (x), g(x)) ,
(1)
by an application of the M.V.T to the function u2 (x) 7→ φ1 (u2 (x), g(x)) and with θ2 (x) ∈ (0, 1).
We can write (4.2) as
φ(fn (x), g(x))
(2)
(1)
= φ(f (x), g(x)) + ∆n f (x)φ1 (f (x), g(x)) + θ1 (x)(∆n f (x))2 φ1 (f (x) + θ2 (x)∆n f (x), g(x))
Now we has
(4.3)
J(fn , g) − J(f, g) =
hence
Z
(1)
∆n f (x) φ1 (f (x), g(x))dx +
|J(fn , g) − J(f, g)| ≤ an
Z
(1)
Z
(2)
θ1 (x)(∆n f (x))2 φ1 (f (x) + θ2 (x)∆n f (x), g(x)) dx,
φ1 (f (x), g(x)) dx + a2n
Z
(2)
φ1 (f (x) + θ2 (x)∆n f (x), g(x)) dx.
18
DIVERGENCES MEASURES CONSISTENCY BANDS
Therefore
|J(fn , g) − J(f, g)|
≤ A1 + an
lim sup
an
n→∞
where A1 =
R
Z
(2)
φ1 (f (x) + θ2 (x)∆n f (x), g(x)) dx,
(1)
φ1 (f (x), g(x)) dx.
This with 2.1 yield and prove (2.9).
Now let prove 2.10
By swapping the roles of f and g one obtains
(4.4)
J(f, gn ) − J(f, g) =
Z
(1)
∆n g(x) φ2 (f (x), g(x))dx +
then
|J(f, gn ) − J(f, g)| ≤ bn
one obtains
Z
(1)
R
Z
(2)
θ3 (x)(∆n g(x))2 φ2 (f (x), g(x) + θ4 (x)∆n g(x)) dx
φ2 (f (x), g(x)) dx + b2n
|J(f, gn ) − J(f, g)|
≤ A2 + bn
bn
where A2 =
Z
Z
(2)
φ2 (f (x), g(x) + θ4 (x)∆n g(x)) dx
(2)
φ2 (f (x), g(x) + θ4 (x)∆n g(x)) dx
(1)
φ2 (f (x), g(x)) dx. This and (2.2) give and prove (2.10).
We focus now on the asymptotic normality for one sample estimation.
Going back to (4.3), we have
Z
Z
√
√
(1)
(2)
2
n(J(fn , g) − J(f, g)) =
φ1 (f (x), g(x)) αn (x)dx + θ1 (x) n (∆n f (x)) φ1 (f (x) + θ2 (x)∆n f (x), g(x)) dx.
Z
√
√
=
n (fn (x) − f (x))h1 (x)dx + nR2,n
(1)
where h1 (x) = φ1 (f (x), g(x)).
√ R
Now by theorem 1, n (fn (x) − f (x))h1 (x)dx
N (0, σ12 ) as n → ∞ where
σ12 = PX (Kjn (h1 )(X))2 − (PX (Kjn (h1 )(X)))2
(4.5)
and provided that h1 ∈ B∞,∞ (R).
√
Thus, (2.11) will be proved if we show that nR2,n = 0P (1). One has
Z
√
√ 2
(2)
(4.6)
nR2,n ≤ nan φ1 (f (x) + θ2 (x)∆n f (x), g(x))dx
Let show that
√
na2n = oP (1).
By Chebyshev’s inequality, one has for any ǫ > 0
√
√ 2
n1/4
ǫ
P nan > ǫ = P an > 1/4 ≤ √ E a2n .
ǫ
n
DIVERGENCES MEASURES CONSISTENCY BANDS
19
From theorem 3 in Gine [43], one has
1/2
Ea2n
=
=
!
O
r
jn 2jn
+ 2−tjn
n
O
s
1 log n
+ n−t/4
4 log 2 n3/4
!
where we use the fact that 2jn ≈ n1/4 . Thus
Finally
2
√
P na2n > ǫ
=O
√ 2
nan = oP (1) since
s
s
1 log n
+ n(1−2t)/8
4 log 2 n1/2
!
1 log n
+ n(1−2t)/8 → 0 as n → +∞
4 log 2 n1/2
for any 1/2 < t < T.
Finally from (4.6) and using (2.1), one has
This yields and ends the proof of (2.11)
√
nR2,n →P 0 as n → +∞.
Going back to (4.4), one has
Z
Z
√
√
(1)
(2)
n(J(f, gn ) − J(f, g)) =
φ2 (f (x), g(x)) βn (x)dx + n θ4 (x)(∆n g(x))2 φ2 (f (x), g(x) + θ4 (x)∆n g(x)) dx.
Z
√
√
=
n (gn (x) − g(x))h2 (x)dx + nR3,n
(1)
where h2 (x) = φ2 (f (x), g(x)).
Then by Theorem 1, one has
√ R
n (gn (x) − g(x))h2 (x)dx
N (0, σ22 ) where
2
2
σ22 = PY (Kjn (h2 )(Y )) − (PY (Kjn (h2 )(Y )))
(4.7)
since P2Y (h2 ) < ∞ and provided that h2 ∈ B∞,∞ (R)).
Similarly,
√
while
nR3,n ≤
√ 2
nbn
Z
(2)
φ2 (f (x), g(x) + θ4 (x)∆n g(x))dx,
√ 2
√
nbn = oP (1) as previously. So this and (2.2) give nR3,n = oP (1).
Finally this shows that (2.12) holds and completes the proof of the Theorem 2.
20
DIVERGENCES MEASURES CONSISTENCY BANDS
4.3. Proof of Theorem 3.
Proof. We proceed by the same techniques that led to the prove of (2.9).
We begin by breaking φ(fn (x), gn (x)) − φ(f (x), g(x)) into two terms we have already handled :
= φ(fn (x), gn (x)) − φ(f (x), gn (x)) + φ(f (x), gn (x)) − φ(f (x), g(x))
{z
} |
{z
}
|
=
I1
+
I2
φ(fn (x), gn (x)) − φ(f (x), g(x))
By an application of the M.V.T to the function fn (x) 7→ φ(fn (x), gn (x)), one has that there exists θ5 (x) ∈
(0, 1) such that
I1
=
φ(f (x) + ∆fn (x), gn (x)) − φ(f (x), gn (x))
=
∆fn (x)φ1 (f (x) + θ5 (x)∆n f (x), g(x))
=
∆fn (x)φ1 (f (x), g(x)) + θ5 (x)(∆n f (x))2 φ1 (f (x) + θ6 (x)∆n f (x), g(x))
(1)
(1)
(2)
By a second application of the M.V.T to the function
(1)
f (x) + θ5 (x)∆n f (x) 7→ φ1 (f (x) + θ5 (x)∆n f (x), g(x))
with θ5 (x) ∈ (0, 1).
From (4.4), we get
(1)
(2)
I2 = ∆n g(x) φ2 (f (x), g(x)) + θ3 (x)(∆n g(x))2 φ2 (f (x), g(x) + θ4 (x)∆n g(x))
Therefore
(4.8)
J(fn , gn ) − J(f, g) =
and
Z
Z
(1)
(1)
∆n f (x)φ1 (f (x), g(x))dx + ∆n g(x)φ2 (f (x), g(x))dx
Z
(2)
+ θ5 (x)(∆n f (x))2 φ1 (f (x) + θ6 (x)∆n f (x), g(x))dx
Z
(2)
+
θ3 (x)(∆n g(x))2 φ2 (f (x), g(x) + θ4 (x)∆n g(x))dx
|J(fn , gn ) − J(f, g)| ≤
thus
|J(fn , gn ) − J(f, g)|
cn
Z
(2)
φ1 (f (x) + θ6 (x)∆n f (x), g(x)) dx
cn A1 + cn A2 + c2n
Z
(2)
φ2 (f (x), g(x) + θ4 (x)∆n g(x)) dx
+c2n
Z
(2)
≤ A1 + A2 + cn
φ1 (f (x) + θ6 (x)∆n f (x), g(x)) dx
Z
(2)
+ cn
φ2 (f (x), g(x) + θ4 (x)∆n g(x)) dx
(2.1) and (2.2) give
lim sup
x→∞
This proves the desired result.
It remains to prove (2.16)
J(fn , gn ) − J(f, g)
≤ A1 + A2 a.s
cn
DIVERGENCES MEASURES CONSISTENCY BANDS
21
Going back to (4.8) one has
Z
Z
√
√
√
√
(1)
(1)
n(J(fn , gn )−J(f, g)) = n (fn (x)−f (x))φ1 (f (x), g(x))dx+ n (gn (x)−g(x))φ2 (f (x), g(x))dx+ nR4,n
where
√
nR4,n
√
n
Then by Theorem 1, one has
√
n
Z
Z
(2)
θ5 (x)(∆n f (x))2 φ1 (f (x) + θ6 (x)∆n f (x), g(x))dx
Z
√
(2)
θ3 (x)(∆n g(x))2 φ2 (f (x), g(x) + θ4 (x)∆n g(x))dx.
+ n
=
(fn (x) − f (x))h1 (x)dx +
√
n
Z
(gn (x) − g(x))h2 (x)dx
N (0, σ12 + σ22 )
t
since P2X (h1 ) < ∞ and P2Y (h2 ) < ∞. Provided that h2 , h2 ∈ B∞,∞
(R).
Now one has
√
nR4,n
As previously, one has
≤
√ 2
ncn
Z
(2)
φ1 (f (x) + θ6 (x)∆n f (x), g(x)) dx
Z
√ 2
(2)
φ2 (f (x), g(x) + θ4 (x)∆n g(x)) dx.
+ ncn
√ 2
√
ncn = oP (1) and from conditions (2.1) and (2.2) one has | nR4,n | = oP (1).
Finally this shows that (2.16) holds and completes the proof of the Theorem 3.
4.4. Proofs of Corollaries 5 and 6.
Proof. of Corollary 5.
One has
1
(log I(fn , g) − log I(f, g))
α−1
but I(fn , g) − I(f, g) = Oa.s (an ) = oP (1). Then, by using a Taylor expansion of log(1 + y) it follows that
DR,α (fn , g) − DT,α (f, g)) =
almost surely,
I(fn , g) − I(f, g)
log 1 +
I(f, g)
log I(fn , g) − log I(f, g) =
I(fn , g) − I(f, g)
+ Oa.s (a2n ) = Oa.s (an ).
I(f, g)
=
That is
DR,α (fn , g) − DR,α (f, g) = Oa.s (an ).
This proves the desired result.
The proof of (2.18) is similar to the previous proof.
To prove (2.19), recall
√
√
n(I(fn , g) − I(f, g)) = n
then
I(fn , g)
=1+
I(f, g)
R
Z
(fn (x) − f (x))h1 (x)dx + oP (1) = OP (1)
(fn (x) − f (x))h1 (x)dx
+ oP (1)
I(f, g)
22
DIVERGENCES MEASURES CONSISTENCY BANDS
and by Taylor expansion of log(1 + y) it follows that almost surely,
R
(fn (x) − f (x))h1 (x)dx
log I(fn , g) − log I(f, g) = log 1 +
I(f, g)
R
(fn (x) − f (x))h1 (x)dx
1
+ OP
=
I(f, g)
n
therefore
√
n (DR,α (fn , g) − DR,α (f, g)) =
2
where σR,1
=
2
σI,1
.
(α−1)2 I(f,g)
1
α−1
√ R
n (fn (x) − f (x))h1 (x)dx
+ oP (1)
I(f, g)
2
N 0, σR,1
as n → ∞
(2.20) is proved similarly.
Finally this ends the proof of the Corollary 5.
Proof of the Corollary 6
Proof. We start by the consistency. From the previous work one gets
I(fn , gn ) − I(f, g)
+ Oa.s (c2n )
I(f, g)
= Oa.s (cn )
log I(fn , gn ) − log I(f, g) =
hence (DR,α (fn , gn ) − DR,α (f, g)) = Oa.s (cn ). That proves (2.21)
Let find the asymptotic normality. One gets
Z
Z
√
√
√
n (I(fn , gn ) − I(f, g)) =
n (fn (x) − f (x))h1 (x)dx + n (gn (x) − g(x))h2 (x)dx + oP (1) = Nn
=
OP (1)
where h1 (x) = αf α−1 (x)g 1−α (x) and h2 (x) = (1 − α)f α (x)g −α (x).
Hence we obtain
log I(fn , gn ) − log I(f, g) = √
Nn
+ OP
nI(f, g)
Therefore
√
n (DR,α (fn , gn ) − DR,α (f, g))
=
2
2
2
where σR
= σR,1
+ σR,2
.
1
n
1
Nn
+ oP (1)
α − 1 I(f, g)
2
as n → ∞.
N 0, σR
References
[1] Topsoe F. (2000), Some inequalities for information divergence and related measures of discrimination, IEEE Trans. Inf.
Theory, vol. 46, pp. 1602- 1609.
[2] Evren, A. Some applications of Kullback-Leibler and Jeffreys’divergences in multinomial populations.
[3] Cichocki, A.; Amari, S (2010). Families of Alpha-Beta-and Gamma-Divergences: Flexible and Robust Measures of Similarities. Entropy , 12, 1532-1568.
[4] P. J. Moreno, P. P. Ho, and N. Vasconcelos (2004), ”A Kullback-Leibler divergence based kernel for SVM classification in
multimedia applications”, HP Laboratories, Cambridge, MA, Tech. Rep. HPL-2004-4, 2004.
[5] Jager L. and Jon A. Wellner ”Goodness of fit tests via Phi-divergences”. The Annals of Statistics 2007, vol.35, N◦ 5,2018-2053
DIVERGENCES MEASURES CONSISTENCY BANDS
23
[6] P. Hall (1987), ”On Kullback-Leibler loss and density estimation,” Ann. Statist., vol. 15, no. 4, pp. 1491-1519, Dec. 1987.
[7] P. K. Bhattacharya (1967), Efficient estimation of a shift parameter from grouped data, The Annals of Mathematical
Statistics, vol. 38, no. 6,pp. 1770-1787, Dec., 1967.
[8] A. Berlinet, L. Devroye, and L. Gyorfi, ”Asymptotic normality of L1 error in density estimation,” Statistics, vol. 26, pp.
329-343, 1995.
[9] C. Liu, and H-Y Shum (2003), ”Kullback-Leibler boosting,” Proc. of the 2003 IEEE Computer Society Conference on
Computer Vision and Pattern Recognition, vol. 1, pp. 587-594, June, 2003.
[10] Kullback, S.; Leibler, R. (1951) On information and sufficiency. Ann. Math. Stat. , 22, 79âe“86.
[11] Fukunaga, K.; Hayes, R. (1989) The reduced Parzen classifier. IEEE Trans. Pattern Anal. Mach. Intell. , 11, 423âe“425.
[12] Cardoso, J. Infomax and maximum likelihood for blind source separation. IEEE Signal Process. Lett. 1997, 4, 112âe“114.
[13] Cardoso, J. Blind signal separation: statistical principles. Proc. IEEE 1998, 86, 2009-2025.
[14] Ojala, T.; Pietik ainen, M.; Harwood, D. A comparative study of texture measures with classification based on featured
distributions. Pattern Recogn. 1996, 29, 51-59.
[15] Hastie, T.; Tibshirani, R. Classification by pairwise coupling. Ann. Stat. 1998, 26, 451-471.
[16] Buccigrossi, R.; Simoncelli, E. Image compression via joint statistical characterization in the wavelet domain. IEEE Trans.
Image Process. 1999, 8, 1688âe“1701.
[17] Moreno, P.; Ho, P.; Vasconcelos, N. A Kullback-Leibler divergence based kernel for SVM classification in multimedia
applications. Adv. Neural Inform. Process. Syst. 2004, 16, 1385-1392.
[18] MacKay, D. Information Theory, Inference, and Learning Algorithms; Cambridge University Press: Cambridge, UK, 2003.
[19] Cover, T. and Thomas, J.(1991). Elements of Information Theory. : Wiley, 1991.
[20] G. A. Darbellay and I. Vajda (1999), ”Estimation of the information by an adaptive partitioning of the observation space,”
IEEE Trans. Inf. Theory, vol. 45, no. 4, pp. 1315-1321, May 1999.
[21] Common, P.(1994). Independent component analysis, a new concept?, Signal Process., vol. 36, pp. 387-314, 1994.
[22] Tsitsiklis, J.N.(1993). Decentralized detection. In Advances in Statistical Signal Processing. New York: JAI, 1993, pp.
297-344.
[23] Akshay Krishnamurthy, Kirthevasan Kandasamy Barnaba Poczos, Larry Wasserman. Nonparametric Estimation of Rényi
Divergence and Friends.Journal of Selcuk. University Natural and Applied Science.
[24] Liu, H., Lafferty,J., and Wasserman, L. Exponential concentration inequality for
[25] Shashank Singh and Barnabas Poczos Generalized Exponential Concentration Inequality for Rényi Divergence Estimation
Carnegie Mellon University, 5000 Forbes Ave., Pittsburgh, PA 15213 USA.
[26] Poczos B.,Jeff, S. On the estimation of α−Divergences
[27] Liu, H., Lafferty, J., and Wasserman, L. Exponential concentration inequality for mutual information estimation. In Neural
Information Processing Systems (NIPS), 2012.
[28] Hamza, D., Ngom, P., Deme, E. and Mendy, P.(2007). Kernel-type estimators of divergence measures and its strong uniform
consistency.
[29] XuanLong N.,Martin J.W., and Michael I.J.(2010). Estimating Divergence Functionals and the Likelihood Ratio by Convex
Risk Minimization. IEEE Transastions on information theory, vol.56, no.11, pp.5847 − 561, 2010;
[30] X. Nguyen, M. J. Wainwright, and M. I. Jordan, ”Estimating divergence functionals and the likelihood ratio by convex risk
minimization, IEEE Trans. Inform. Theory, vol. 56, no. 11, pp. 5847-5861, 2010.
[31] Einmahl, U. and Mason, D. M. (2000). An empirical process approach to the uniform consistency of kernel-type function
estimators. J. Theoret. Probab., 13 (1), 1-37.
[32] Einmahl, U. and Mason, D. M. (2005). Uniform in bandwidth consistency of kernel-type function estimators. Ann. Statist.,
33(3), 1380-1403.
[33] Giné, E. and Mason, D. M. (2008) Uniform in bandwidth estimation of integral functionals of the density function. Scand.
J. Statist., 35(4), 739-761
[34] H. Cai, S. R. Kulkarni, and S. Verdu (2002), ”Universal estimation of entropye and divergence via block sorting,” in Proc.
IEEE Int. Symp. Information Theory, Lausanne, Switzerland, Jun-Jul. 2002, p. 433.
24
DIVERGENCES MEASURES CONSISTENCY BANDS
[35] H. Cai, S. R. Kulkarni, and S. Verdu, ”Universal divergence estimation for finite-alphabet sources,” IEEE Trans. Inf. Theory,
submitted for publication
[36] J. Ziv and N. Merhav(1993), ”A measure of relative entropy between individual sequences with application to universal
classification,” IEEE Trans. Inf.Theory, vol. 39, no. 4, pp. 1270-1279, Jul. 1993.
[37] Wolfgang HardIe, Gerard Kerkyacharian,Dominique Picard, and Alexander Tsybakov. Wavelets, Approximation,
and Statistical Applications
[38] A. Hero, B. Ma, and O. Michel (1999), ”Estimation of RÃ c nyi information divergence via pruned minimal spanning trees,”
in IEEE Workshop on Higher Order Statistics, Caesaria, Israel, Jun. 1999.
[39] K. R. Moon and A. O. Hero III, ”Ensemble estimation of multivariate f -divergence, in IEEE International Symposium on
Information Theory, pp. 356-360, 2014.
[40] A. Berlinet, L. Gyorfi, and I. D nes, ”Asymptotic normality of relative entropy in multivariate density estimation,” Publications de l’Institut de Statistique de l’Université c de Paris, vol. 41, pp. 3-27, 1997.
[41] P. J. Bickel and M. Rosenblatt, ”On some global measures of the deviations of density function estimates,” The Annals of
Statistics, pp. 1071-1095, 1973.
[42] Kevin R.M.,AlfredO.H.III. ”Multivariate f −Divergence Estimation with Confidence”
[43] Giné E., Nickl R. (2009) ”Uniform Limit theorem for wavelet density estimators”. The Annals of Probability 2009, Vol. 37,
No. 4, 1605-1646 DOI: 10.1214 08-AOP447
| 10math.ST
|
arXiv:1801.01258v1 [cs.CV] 4 Jan 2018
Deep Learning Reconstruction for 9-View Dual
Energy CT Baggage Scanner
Yoseob Han
Jingu Kang
Jong Chul Ye
KAIST, Daejeon, Korea
Email: [email protected]
GEMSS Medical Co. Seongnam, Korea
Email: [email protected]
KAIST, Daejeon, Korea
Email: [email protected]
Abstract—For homeland and transportation security applications, 2D X-ray explosive detection system (EDS) have been
widely used, but they have limitations in recognizing 3D shape
of the hidden objects. Among various types of 3D computed
tomography (CT) systems to address this issue, this paper is
interested in a stationary CT using fixed X-ray sources and
detectors. However, due to the limited number of projection
views, analytic reconstruction algorithms produce severe streaking artifacts. Inspired by recent success of deep learning approach
for sparse view CT reconstruction, here we propose a novel image
and sinogram domain deep learning architecture for 3D reconstruction from very sparse view measurement. The algorithm
has been tested with the real data from a prototype 9-view dual
energy stationary CT EDS carry-on baggage scanner developed
by GEMSS Medical Systems, Korea, which confirms the superior
reconstruction performance over the existing approaches.
Index terms— Explosive detection system (EDS), sparseview X-ray CT, convolutional neural network (CNN)
I. I NTRODUCTION
In homeland and aviation security applications, there has
been increasing demand for X-ray CT EDS system for carryon baggage screening. A CT-EDS can produce an accurate
3D object structure for segmentation and threat detection,
which is often not possible when a 2D-EDS system captures
projection views in only one or two angular directions. There
are currently two types of CT EDS systems: gantry-based CT
and stationary CT. While gantry-based CT EDS is largely the
same as medical CT, baggage screening should be carried out
continuously, so it is often difficult to continuously screen
carry-on bags because of the possible mechanical overloading
of the gantry system. On the other hand, a stationary CT EDS
system uses fixed X-ray sources and detectors, making the
system suitable for routine carry-on baggage inspection.
For example, Fig. 1 shows source and detector geometry of
the prototype stationary CT-EDS system developed by GEMSS
Medical Systems, Korea. As shown in Fig. 1(a), nine pairs
of X-ray source and dual energy detector in the opposite
direction are distributed at the same angular interval. For
seamless screening without stopping convey belt, each pair
of source and detectors are arranged along the z-direction as
shown in Fig. 1(b) so that different projection view data can
be collected while the carry-on baggages moves continuously
on the conveyor belt. Then, 9-view fan beam projection data
is obtained for each z-slice by rebinning the measurement
data. This type of stationary CT system is suitable for EDS
Fig. 1. X-ray source positions in our prototype 9 view dual energy CT EDS:
(a) x − y direction and (b) θ − z direction, respectively.
applications because it does not require a rotating gantry, but
with only 9 projection views it is difficult to use a conventional
filtered backprojection (FBP) algorithm due to severe streaking
artifacts. Therefore, advanced reconstruction algorithms with
fast reconstruction time are required.
For sparse-view CT EDS, model-based iterative reconstruction (MBIR) with the total variation (TV) penalty have been
extensively investigated [1], [2]. Inspired by the recent success
of deep learning approach for sparse view and limited angle
CT [3], [4], [5], [6] that outperform the classical MBIR
approach, this paper aims at developing a deep learning
approach for real-world sparse view CT EDS. However, neural
network training using the retrospective angular subsampling
as in the existing works [3], [4], [5], [6] is not possible for
our prototype system, since there are no ground-truth data for
the real world sparse view CT EDS. We therefore propose a
novel deep learning approach composed of image domain and
sinogram domain learning that compensate for the imperfect
label data.
II. T HEORY
A. Problem Formulation
Recall that the forward model for sparse view CT EDS
system can be represented by
gΘ = PΘ Rf
(1)
where R denotes the 3D projection operator from an x − y − z
volume image to a s − θ − z domain sinogram data with s, θ
and z denoting the detector, projection angle, and the direction
Fig. 2. Sinogram interpolation flow for the proposed method. The final reconstruction is obtained by applying the FBP for the interpolated sinogram data.
of the conveyor belt travel, respectively. See Fig. 2 for the
coordinate systems. In (1), PΘ denotes the view sampling
operator for the measured angle set Θ, and gΘ refers to the
measured sinogram data. For each projection view data, we
use the notation gθ and Pθ , where θ denotes the specific view.
The main technical issue of the sparse view CT reconstruction is the non-uniqueness of the solution for (1). More
specifically, there exists a null spacce NΘ such that
PΘ Rh = 0,
∀h ∈ NΘ ,
which leads to infinite number of feasible solutions. To avoid
the non-uniqueness of the solution, constrained form of the
penalized MBIR can be formulated as :
min3 kLf k1 ,
f ∈R
subject to gΘ = PΘ R ,
(2)
where L refers to a linear operator and k · k1 denotes the l1
norm. For the case of the TV penalty, L corresponds to the
derivative. Then, the uniqueness of (2) is guaranteed that if
the NL ∩ NΘ = {0}, where NL denotes the null space of the
operator L.
Instead of designing a linear operator L such that the
common null space of NΘ and NL to be zero, we can design
a frame W, its dual W̃, and shrinkage operator Sλ such that
W̃ > W = I and
>
∗
W̃ Sλ W(f + g) = f
∗
∀g ∈ NΘ
∀h ∈ NΘ
.
More specifically, our sparse view reconstruction algorithm
finds the unknown f ∈ R3 that satisfy both data fidelity and
the so-called frame constraints [8]:
gΘ = PΘ Rf,
(3)
In other word, (3) directly removes the null space component.
Eq. (3) is the constraint we use for training our neural network.
QI (f ) = f ∗
,
(4)
where QI is the image domain CNN that satisfies (3) and f ∗
denotes the ground-truth images that are available for training
data. Now, by defining M as a right-inverse of PΘ R, i.e.
(PΘ R)MgΘ = gΘ , ∀gΘ , we have
MgΘ = f ∗ + h
for some h ∈ NΘ , since the right inverse is not unique due to
the existence of the null space. Thus, we can show that MgΘ
is the feasible solution for (4), since we have
QI MgΘ = QI (f ∗ + h) = f ∗
,
(5)
for the training data, and
PΘ RMgΘ = PΘ R(f ∗ + h) = gΘ
.
(6)
Therefore, the neural network training problem to satisfy (4)
can be equivalently represented by
min
QI
for the ground-truth image f ∗ . This frame-based regularization is also an active field of research for image denoising,
inpainting, etc [7]. One of the most important contributions
of the deep convolutional framelet theory [8] is that W
and W̃ > correspond to the encoder and decoder structure
of a convolutional neural network (CNN), respectively, and
the shrinkage operator Sλ emerges by controlling the number of filter channels and nonlinearities. More specifically,
a convolutional neural network can be designed such that
Q = W̃ > Sλ W and
Q(f ∗ + h) = f ∗ ,
B. Derivation of Image and Projection Domain CNNs
N
X
(i)
kf ∗(i) − QI MgΘ k2
(7)
i=1
(i)
where {(f ∗(i) , gΘ )}N
i=1 denotes the training data set composed of ground-truth image an its sparse view projection.
Since a representative right inverse for the sparse view projection is the inverse Radon transform after zero padding to
(i)
the missing view, MgΘ in (7) can be implemented using the
standard FBP algorithm. In fact, this is the main theoretical
ground for the success of image domain CNN when the
ground-truth data is available [3], [4], [5], [6]. Moreover, the
fan-beam rebinning makes the problem separable for each z
slices, so we use the 2D FBP for each slice as shown in Fig. 2.
However, the main technical difficulties in our 9-view CT
EDS system is that we do not have ground-truth image
{f ∗(i) }N
i=1 . One could use physical phantoms and atomic
number to form a set of ground-truth images, but those data
set may be different from the real carry-on bags, so we need a
new method to account for the lack of ground-truth for neural
network training. Thus, to overcome the lack of the groundtruth data, the approximate label images are generated using
an MBIR with TV penalty. Then, using MBIR reconstruction
I
as label data {f ∗(i) }N
i=1 , an 2D image domain network Q is
trained to learn the mapping between the artifact-corrupted 2D
image and MBIR reconstruction in x − y domain.
One downside of this approach is that the network training
by (7) is no more optimal, since the label data is not the
ground-truth image. Thus, the generated sinogram data from
the denoised 3D volume may be biased. Thus, we impose
additional frame constraint to the sinogram data in addition to
(4):
gθ∗ = QS (gθ ) ,
(8)
for the measured angle θ, where QS is the s − z sinogram
domain CNN and gθ∗ denotes the ground-truth sinogram data
measured at θ. Then, Eq. (8) leads to the following network
training:
min
QS
N
XX
∗(i)
kgθ
(i)
− QS Pθ RQI MgΘ k2
(9)
θ∈Θ i=1
More specifically, as shown in Fig. 2, 3D sinogram data is
generated in the s − θ − z domain by applying the forward
projection operator along 720-projection views after stacking
the image domain network output over multiple slices to form
3D reconstruction volume in the x − y − z domain. Next, a 2D
sinogram domain network QS is trained so that it can learn the
mapping between the synthetic s−z sinogram data and the real
projection data in the s − z domain. Since the real projection
data is available only in 9 views, this sinogram network
training is performed using synthetic and real projection data
in the measured projection views. The optimization problems
(7) and (9) can be solved sequentially or simultaneously, and
in this paper we adopt the sequential optimization approach
for simplicity.
After the neural networks QI and QS are trained, the
inference can be done simply by obtaining x − y − z volume
images from the 9 view projection data by slice-by-slice FBP
algorithm, which are then fed into QI to obtain the denoised
3D volume data. Then, by applying projection operator, we
generate 720 projection view data in s − θ − z domain,
which are fed into the QS to obtain denoised sinogram data
for each θ angle. Then, the final reconstruction is obtained
by applying FBP algorithms. One could use post-processing
using additional TV-based denosing. This algorithmic flow is
illustrated in Fig. 2.
III. M ETHODS
A. Real CT EDS data Acquisition
We collected CT EDS data using the prototype stationary
9 view dual energy CT-EDS system developed by GEMSS
Medical Systems, Korea as shown in Fig. 1. the distance from
source to detector (DSD) and the distance from source to
Fig. 3. CNN architecture for our image and singoram domain networks.
object (DSO) are 1202.6mm and 648.2mm, respectively. The
number of detector is 384 with a pitch of 1.5mm. The region
of interest (ROI) is 256 × 256 and the pixel size is 2mm2 .
The detectors collect low and high energy X-ray at 80KVp
and 120KVp, respectively.
We collect 47 sets of projection data from the prototype
CT EDS baggage scanner. Among the 47 sets, 32 dataset are
simple-objects and the other set are realistic carry-on bags.
The 47 set of 28 simple- and 13 baggage-objects was used
during the training phase, and the validation was performed
by two simple- and one baggage-object. The other set was
used for test.
B. Network Architecture and Training
Fig. 3 illustrates modified the U-Net structure [9] for the
image domain and the sinogram domain networks. To account
for the multi-energy image and sinogram data, the input for
the network is two channel multi-energy image and sinogram
data. The proposed network consists of convolution layer,
batch normalization, rectified linear unit (ReLU) [10], and
contracting path connection with concatenation [9]. A detail
parameters are illustrated as shown in Fig. 3.
The proposed networks were trained by stochastic gradient
descent (SGD). The regularization parameter was λ = 10−4 .
The learning rate has been set from 10−3 to 10−5 , which
has been reduced step by step in each epoch. The number
of epoch was 200. The batch size was 12 and the patch
size for image and projection data are 256 × 256 × 2 and
768 × 384 × 2, respectively. The network was implemented
using MatConvNet toolbox (ver.24) [11] in the MATLAB
2015a environment (MathWorks, Natick). Central processing
unit (CPU) and graphic processing unit (GPU) specification
are i7-7700 CPU (3.60 GHz) and GTX 1080 Ti GPU, respectively.
IV. E XPERIMENTAL R ESULTS
To evaluate the performance of the proposed method, we
perform image reconstruction from real 9-view CT EDS prototype system. Fig. 4 illustrates image reconstruction results
of bag using various methods such as FBP, MBIR with
TV penalty, image domain CNN [3], [5], and the proposed
method. The FBP reconstruction results suffered from severe
streaking artifacts, so it was difficult to see the threats in the
tomographic reconstruction and 3D rendering. The MBIR and
image domain CNN were slight better in their reconstruction
quality, but the detailed 3D structures were not fully recovered
and several objects were not detected as indicated by the red
arrow in Fig. 4. Moreover, the 3D rendering results in Fig.
Fig. 5. A s − z domain sinogram data from (a) measurement, (b) 9-views
FBP (c) MBIR, (d) image CNN, and (e) the proposed method. The number
written in the images is the NMSE value. Yellow and red arrows indicate
grenade and knife, respectively.
high quality images. Using real data from our prototype 9-view
CT EDS system, we demonstrated that the proposed method
outperforms the existing algorithms, delivering high quality
three reconstruction for threat detection.
ACKNOWLEDGMENT
Fig. 4. Reconstruction results by various methods from 9-views CT-EDS..
4 correctly identify the shape of grenade and knife as well
as the frame of the bag, which was not possible using other
methods.
Because we do not have the ground-truth in the image
domain, we perform quantitative evaluation using normalized
mean squares error (NMSE) in the sinogram domain. More
specifically, after obtaining the final reconstruction, we perform the forward projection to generate the sinogram data in
the measured projection view and calculated the normalized
mean square errors. Table I showed that the proposed method
provides the most accurate sinogram data compared to the
other methods. Moreover, the s − z projection data in Fig. 5
showed that the projection data from the proposed method is
much closer to the ground-truth measurement data.
TABLE I
NMSE VALUE COMPARISON OF VARIOUS METHODS .
Energy level
FBP
MBIR-TV
Image CNN
Ours
80 kvP
1.6647e+1
5.8247e-1
3.3207e-1
0.6845e-1
120 kvP
1.0536e+1
6.0440e-1
3.2249e-1
0.5450e-1
V. C ONCLUSION
In this paper, we proposed a novel deep learning reconstruction algorithm for a prototype 9-view dual energy CT
EDS for carry-on baggage scanner. Even though the number
of projection view was not sufficient for high equality 3D
reconstruction, our method learns the relationships between
the 2D tomographic slices in x − y domain as well as the 2D
projections in s − z domain such that the artifact-corrupted
image and sinogram data can be successively refined to obtain
This work is supported by Korea Agency for Infrastructure
Technology Advancement, Grant number 17ATRP-C07116405-000000.
R EFERENCES
[1] Sagar Mandava, David Coccarelli, Joel A Greenberg, Michael E Gehm,
Amit Ashok, and Ali Bilgin, “Image reconstruction for view-limited
x-ray ct in baggage scanning,” in Anomaly Detection and Imaging with
X-Rays (ADIX) II. International Society for Optics and Photonics, 2017,
vol. 10187, p. 101870F.
[2] Sherman J Kisner, Eri Haneda, Charles A Bouman, Sondre Skatter,
Mikhail Kourinny, and Simon Bedford, “Limited view angle iterative ct
reconstruction,” in Computational Imaging X, 2012, vol. 8296.
[3] Yoseop Han, Jaejoon Yoo, and Jong Chul Ye, “Deep residual learning for
compressed sensing ct reconstruction via persistent homology analysis,”
arXiv preprint arXiv:1611.06391, 2016.
[4] Yoseob Han and Jong Chul Ye, “Framing U-net via deep convolutional framelets: Application to sparse-view CT,” arXiv preprint
arXiv:1708.08333, 2017.
[5] Kyong Hwan Jin, Michael T McCann, Emmanuel Froustey, and Michael
Unser, “Deep convolutional neural network for inverse problems in
imaging,” IEEE Transactions on Image Processing, vol. 26, no. 9, pp.
4509–4522, 2017.
[6] Jawook Gu and Jong Chul Ye, “Multi-scale wavelet domain residual learning for limited-angle CT reconstruction,” arXiv preprint
arXiv:1703.01382, 2017.
[7] Jian-Feng Cai, Raymond H Chan, and Zuowei Shen, “A framelet-based
image inpainting algorithm,” Applied and Computational Harmonic
Analysis, vol. 24, no. 2, pp. 131–149, 2008.
[8] Jong Chul Ye, Yo Seob Han, and Eunjoo Cha, “Deep convolutional
framelets: A general deep learning framework for inverse problems,”
arXiv preprint arXiv:1707.00372, 2017.
[9] Olaf Ronneberger, Philipp Fischer, and Thomas Brox, “U-net: Convolutional networks for biomedical image segmentation,” in International
Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 2015, pp. 234–241.
[10] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton, “Imagenet
classification with deep convolutional neural networks,” in Advances in
neural information processing systems, 2012, pp. 1097–1105.
[11] Andrea Vedaldi and Karel Lenc, “Matconvnet: Convolutional neural
networks for matlab,” in Proceedings of the 23rd ACM international
conference on Multimedia. ACM, 2015, pp. 689–692.
| 2cs.AI
|
arXiv:1612.05124v2 [math.ST] 7 Jun 2017
Adaptive nonparametric drift estimation for diffusion
processes using Faber-Schauder expansions
Frank van der Meulen*
Moritz Schauer†
Jan van Waaij‡
June 8, 2017
Abstract
We consider the problem of nonparametric estimation of the drift of a continuously observed one-dimensional diffusion with periodic drift. Motivated by computational considerations, van der Meulen et al. (2014) defined a prior on the drift as a randomly truncated
and randomly scaled Faber-Schauder series expansion with Gaussian coefficients. We study
the behaviour of the posterior obtained from this prior from a frequentist asymptotic point
of view. If the true data generating drift is smooth, it is proved that the posterior is adaptive
with posterior contraction rates for the L 2 -norm that are optimal up to a log factor. Contraction rates in L p -norms with p ∈ (2, ∞] are derived as well.
1 Introduction
Assume continuous time observations X T = {X t , : t ∈ [0, T ]} from a diffusion process X defined
as (weak) solution to the stochastic differential equation (sde)
dX t = b 0 (X t ) dt + dWt ,
X 0 = x0 .
(1)
Here W is a Brownian Motion and the drift b 0 is assumed to be a real-valued measurable function
on the real line that is 1-periodic and square integrable on [0, 1]. The assumed periodicity implies
that we can alternatively view the process X as a diffusion on the circle. This model has been
used for dynamic modelling of angles, see for instance Pokern (2007) and Hindriks (2011).
We are interested in nonparametric adaptive estimation of the drift. This problem has recently
been studied by multiple authors. Spokoiny (2000) proposed a locally linear smoother with a
data-driven bandwidth choice that is rate adaptive with respect to |b 00 (x)| for all x and optimal
* TU Delft, Mekelweg 4, 2628 CD Delft, The Netherlands, E-mail address: [email protected].
† Leiden University, Niels Bohrweg 1, 2333 CA Leiden, The Netherlands, E-mail address: m.r.schauer@math.
leidenuniv.nl.
‡ Korteweg-de Vries Institute for Mathematics, Science Park 107, 1098 XG Amsterdam, The Netherlands, E-mail
address: [email protected].
1
up to a log factors. Interestingly, the result is non-asymptotic and does not require ergodicity.
Dalalyan and Kutoyants (2002) and Dalalyan (2005) consider ergodic diffusions and construct
estimators that are asymptotically minimax and adaptive under Sobolev smoothness of the drift.
Their results were extended to the multidimensional case by Strauch (2015).
In this paper we focus on Bayesian nonparametric estimation, a paradigm that has become increasingly popular over the past two decades. An overview of some advances of Bayesian nonparametric estimation for diffusion processes is given in van Zanten (2013).
The Bayesian approach requires the specification of a prior. Ideally, the prior on the drift is chosen such that drawing from the posterior is computationally efficient while at the same time
ensuring that the resulting inference has good theoretical properties. which is quantified by a
contraction rate. This is a rate for which we can shrink balls around the true parameter value,
while maintaining most of the posterior mass. More formally, if d is a semimetric on the space
of drift functions, a contraction rate εT is a sequence of positive numbers εT ↓ 0 for which the
posterior mass of the balls {b : d (b, b 0 ) ≤ εT } converges in probability to 1 as T → ∞, under the
law of X with drift b 0 . For a general discussion on contraction rates, see for instance Ghosal et al.
(2000) and Ghosal and van der Vaart (2007).
For diffusions, the problem of deriving optimal posterior convergence rates has been studied
R1
recently under the additional assumption that the drift integrates to zero, 0 b 0 (x)d x = 0. In
Papaspiliopoulos et al. (2012) a mean zero Gaussian process prior is proposed together with an
algorithm to sample from the posterior. The precision operator (inverse covariance operator)
¡
¢
of the proposed Gaussian process is given by η (−∆)α+1/2 + κI , where ∆ is the one-dimensional
Laplacian, I is the identity operator, η, κ > 0 and α + 1/2 ∈ {2, 3, . . .}. A first consistency result was
shown in Pokern et al. (2013).
In van Waaij and van Zanten (2016) it was shown that this rate result can be improved upon for
a slightly more general class of priors on the drift. More specifically, in this paper the authors
consider a prior which is defined as
b=L
∞
X
k −1/2−α ϕk Zk ,
(2)
k=1
p
p
where ϕ2k (x) = 2 cos(2πkx), ϕ2k−1 (x) = 2 sin(2πkx) are the standard Fourier series basis
functions, {Zk } is a sequence of independent standard normally distributed random variables
and α is positive. It is shown that when L and α are fixed and b 0 is assumed to be α-Sobolev
smooth, then the optimal posterior rate of contraction, T −α/(1+2α) , is obtained. Note that this
result is nonadaptive, as the regularity of the prior must match the regularity of b 0 . For obtaining
optimal posterior contraction rates for the full range of possible regularities of the drift, two options are investigated: endowing either L or α with a hyperprior. Only the second option results
in the desired adaptivity over all possible regularities.
While the prior in (2) (with additional prior on α) has good asymptotic properties, from a computational point of view the infinite series expansion is inconvenient. Clearly, in any implementation this expansion needs to be truncated. Random truncation of a series expansion is a well
known method for defining priors in Bayesian nonparametrics, see for instance Shen and Ghosal
(2015). Exactly this idea was exploited in van der Meulen et al. (2014), where the prior is defined
as the law of the random function
2
Figure 1: Elements ψ1 and ψ j ,k , 0 ≤ j ≤ 2 of the Faber-Schauder basis
b
R,S
= S Z 1 ψ1 + S
R X
2j
X
Zjkψjk,
(3)
j =0 k=1
where the functions ψ j k constitute the Faber-Schauder basis (see fig. 1). These functions feature
prominently in the Lévy-Ciesielski construction of Brownian motion (see for instance (Bhattacharya and Waymire, 2007, paragraph 10.1)). The prior coefficients Z j k are equipped with a
Gaussian distribution, and the truncation level R and the scaling factor S are equipped with independent priors. Truncation in absence of scaling increases the apparent smoothness of the
prior (as illustrated for deterministic truncation by example 4.5 in van der Vaart and van Zanten
(2008)), whereas scaling by a number ≥ 1 decreases the apparent smoothness. (Scaling with a
number ≤ 1 only increases the apparent smoothness to a limited extent, see for example Knapik
et al. (2011).)
The simplest type of prior is obtained by taking the coefficients Z j k independent. We do however
also consider the prior that is obtained by first expanding a periodic Ornstein-Uhlenbeck process
into the Faber-Schauder basis, followed by random scaling and truncation. We will explain that
specific stationarity properties of this prior make it a natural choice.
Draws from the posterior can be computed using a reversible jump Markov Chain Monte Carlo
(MCMC) algorithm (cf. van der Meulen et al. (2014)). For both types of priors, fast computation is
facilitated by leveraging inherent sparsity properties stemming from the compact support of the
functions ψ j k . In the discussion of van der Meulen et al. (2014) it was argued that inclusion of
both the scaling and random truncation in the prior is beneficial. However, this claim was only
supported by simulations results.
In this paper we support this claim theoretically by proving adaptive contraction rates of the posterior distribution in case the prior (3) is used. We start from a general result in van der Meulen
et al. (2006) on Brownian semimartingale models, which we adapt to our setting. Here we take
into account that as the drift is assumed to be one-periodic, information accumulates in a different way compared to (general) ergodic diffusions. Subsequently we verify that the resulting
prior mass, remaining mass and entropy conditions appearing in this adapted result are satis-
3
fied for the prior defined in equation (3). An application of our results shows that if the true drift
β
function is B ∞,∞ -Besov smooth, β ∈ (0, 2), then by appropriate choice of the variances of Z j k , as
well as the priors on R and S, the posterior for the drift b contracts at the rate (T / log T )−β/(1+2β)
around the true drift in the L 2 -norm. Up to the log factor this rate is minimax-optimal (See for instance (Kutoyants, 2004, Theorem 4.48)). Moreover, it is adaptive: the prior does not depend on
β. In case the true drift has Besov-smoothness greater than or equal to 2, our method guarantees
contraction rates equal to essentially T −2/5 (corresponding to β = 2). A further application of our
results shows that for L p -norms we obtain contraction rate T −(β−1/2+1/p)/(1+2β) , up to log-factors.
The paper is organised as follows. In the next section we give a precise definition of the prior.
In section 3 a general contraction result for the class of diffusion processes considered here is
derived. Our main result on posterior contraction for L p -norms with p ≥ 2 is presented in section 4. Many results of this paper concern general properties of the prior and their application
is not confined to drift estimation of diffusion processes. To illustrate this, we show in section 5
how these results can easily be adapted to nonparametric regression and nonparametric density
estimation. Proofs are gathered in section 6. The appendix contains a couple of technical results.
2 Prior construction
2.1 Model and posterior
Let
¾
½
¯Z 1
¯
b(x)2 dx < ∞ and b is 1-periodic
L 2 (T) = b : R → R ¯
0
be the space of square integrable 1-periodic functions.
Lemma 1. If b 0 ∈ L 2 (T), then the SDE eq. (1) has a unique weak solution.
The proof is in section 6.1.
For b ∈ L 2 (T), let P b = P b,T denote the law of the process X T generated by eq. (1) when b 0 is
replaced by b. If P 0 denotes the law of X T when the drift is zero, then P b is absolutely continuous
with respect to P 0 with Radon-Nikodym density
µZ T
¶
Z
¡ T¢
1 T 2
p b X = exp
b(X t ) dX t −
b (X t ) dt .
(4)
2 0
0
Given a prior Π on L 2 (T) and path X T from (1), the posterior is given by
R
p b (X T ) Π( db)
T
Π(b ∈ A | X ) = RA
,
p b (X T ) Π( db)
(5)
where A is Borel set of L 2 (T). These assertions are verified as part of the proof of theorem 3.
2.2 Motivating the choice of prior
We are interested in randomly truncated, scaled series priors that simultaneously enable a fast
algorithm for obtaining draws from the posterior and enjoy good contraction rates.
4
To explain what we mean by the first item, consider first a prior that is a finite series prior. Let
{ψ1 , . . . , ψr } denote basis functions and Z = (Z1 , . . . , Zr ) a mean zero Gaussian random vector with
P
precision matrix Γ. Assume that the prior for b is given by b = ri=1 Zi ψi . By conjugacy, it follows
that Z | X T ∼ N(W−1 µ, W−1 ), where W = G + Γ,
µi =
T
Z
0
ψi (X t ) dX t
T
Z
and G
i ,i 0
=
0
ψi (X t )ψi 0 (X t ) dt
(6)
for i , i 0 ∈ {1, . . . , r }, cf. (van der Meulen et al., 2014, Lemma 1). The matrix G is referred to as the
Grammian. From these expressions it follows that it is computationally advantageous to exploit
compactly supported basis functions. Whenever ψi and ψi 0 have nonoverlapping supports, we
have G i ,i 0 = 0. Depending on the choice of such basis functions, the Grammian G will have a
specific sparsity structure (a set of index pairs (i , i 0 ) such that G i ,i 0 = 0, independently of X T .)
This sparsity structure is inherited by W as long as the sparsity structure of the prior precision
matrix matches that of G.
In the next section we make a specific choice for the basis functions and the prior precision
matrix Γ.
2.3 Definition of the prior
Define the “hat” function Λ by Λ(x) = (2x)1[0, 1 ) (x) + 2(1 − x)1[ 1 ,1] (x). The Faber-Schauder basis
2
2
functions are given by
ψ j ,k (x) = Λ(2 j x − k + 1),
j ≥ 0,
k = 1, . . . , 2 j
Let
¡
¢
ψ1 = ψ0,1 (x − 21 ) + ψ0,1 (x + 12 ) I[0,1] (x).
In figure 1 we have plotted ψ1 together with ψ j ,k where j ∈ {0, 1, 2}.
We define our prior as in (3) with Gaussian coefficients Z1 and Z j k , where the truncation level R
and the scaling factor S are equipped with (hyper)priors. We extend b periodically if we want to
consider b as function on the real line. If we identify the double index ( j , k) in (3) with the single
P R+1
index i = 2 j + k, then we can write b R,S = S 2i =1 ψi Zi . Let
`(i ) =
(
0
j
if i ∈ {1, 2}
.
©
ª
if i ∈ 2 j + 1, . . . , 2 j +1 and j ≥ 1
We say that ψi belongs to level j ≥ 0 if `(i ) = j . Thus both ψ1 and ψ0,1 belong to level 0, which is
convenient for notational purposes. For levels j ≥ 1 the basis functions are per level orthogonal
with essentially disjoint support. Define for r ∈ {0, 1, . . .}
©
ª
Ir = i : `(i ) ≤ r } = {1, 2, . . . , 2r +1 .
Let A = (Cov(Zi , Zi 0 ))i ,i 0 ∈N and define its finite-dimensional restriction by A r = (A i i 0 )i ,i 0 ∈Ir . If we
denote Z r = {Zi , i ∈ Ir }, and assume that Z r is multivariate normally distributed with mean zero
5
and covariance matrix A r , then the prior has the following hierarchy
b | R, S, Z R = S
X
Z i ψi
(7)
i ∈IR
Z R | R ∼ N(0, AR )
(8)
(R, S) ∼ Π(·).
(9)
Here, we use Π to denote the joint distribution of (R, S).
We will consider two choices of priors for the sequence Z1 , Z2 , . . . Our first choice consists of taking independent Gaussian random variables. If the coefficients Zi are independent with standard deviation 2−`(i )/2 , the random draws from this prior are scaled piecewise linear interpolations on a dyadic grid of a Brownian bridge on [0, 1] plus the random function Z1 ψ1 . The choice
¡
¢
of ψ1 is motivated by the fact that in this case Var b(t )|S = s, R = ∞ = s 2 is independent of t .
We construct this second type of prior as follows. For γ, σ2 > 0, define V ≡ (Vt , t ∈ [0, 1]) to be
the cyclically stationary and centred Ornstein-Uhlenbeck process. This is a periodic Gaussian
process with covariance kernel
Cov(V (s),V (t )) =
σ2 e −γh + e −γ(1−h)
, h = t − s ≥ 0.
2γ
1 − e −γ
(10)
This process is cyclically stationary, that is, the covariance only depends on |t − s| and 1 − |t − s|.
It is the unique Gaussian and Markovian prior with continuous periodic paths with this property. This makes the cyclically stationary Ornstein-Uhlenbeck prior an appealing choice which
respects the symmetries of the problem.
Each realisation of V is continuous and can be extended to a periodic function on R. Then V can
be represented as an infinite series expansion in the Faber-Schauder basis:
Vt =
X
Zi ψi (t ) = Z1 ψ1 (t ) +
2j
∞ X
X
Z j ,k ψ j ,k (t )
(11)
j =0 k=1
i ≥1
Finally by scaling by S and truncating at R we obtain from V the second choice of prior on the
drift function b. Visualisations of the covariance kernels Cov(b(s), b(t )) for first prior (Brownian
bridge type) and for the second prior (periodic Ornstein-Uhlenbeck process prior with parameter γ = 1.48) are shown in fig. 2 (for S = 1 and R = ∞).
2.4 Sparsity structure induced by choice of Zi
Conditional on R and S, the posterior of Z R is Gaussian with precision matrix G R + ΓR (here G R
is the Grammian corresponding to using all basis functions up to and including level R).
If the coefficients are independent it is trivial to see that the precision matrix Γ does not destroy
the sparsity structure of G, as defined in (6). This is convenient for numerical computations. The
next lemma details the situation for periodic Ornstein-Uhlenbeck processes.
Lemma 2. Let V be defined as in equation (10)
6
Figure 2: Heat maps of (s, t ) 7→ Cov(b(s), b(t )), in case S = 1 and R = ∞. Left: Brownian bridge
plus the random function Z1 ψ1 . Right: periodic Ornstein-Uhlenbeck process with parameter
γ = 1.48 and σ2 chosen such that Var(b(s)) = 1.
1. The sparsity structure of the precision matrix of the infinite stochastic vector Z (appearing
in the series representation (11)) equals the sparsity structure of G, as defined in (6).
2. The entries of the covariance matrix of the random Gaussian coefficients Zi and Zi 0 , A i ,i 0 =
2
E Zi Zi 0 , satisfy the following bounds: A 11 = A 22 = σ
2γ coth(γ/2) and for γ ≤ 1.5 and i ≥ 3,
0.95 · 2−`(i ) σ2 /4 ≤ A i i ≤ 2−`(i ) σ2 /4
and A 12 = A 21 =
σ2
2γ
sinh−1 (γ/2) and for i 6= i 0
|A i i 0 | ≤
(
0
0.20σ2 2−1.5(`(i )∨`(i ))
0.37σ2 2−1.5(`(i )+`(i
0
))
i ∧ i 0 ≤ 2 < i ∨ i 0,
otherwise.
The proof is given in section 6.2. By the first part of the lemma, also this prior does not destroy
the sparsity structure of the G. The second part asserts that while the off-diagonal entries of A r
are not zero, they are of smaller order than the diagonal entries, quantifying that the covariance
matrix of the coefficients in the Schauder expansion is close to a diagonal matrix.
3 Posterior contraction for diffusion processes
The main result in van der Meulen et al. (2006) gives sufficient conditions for deriving posterior
contraction rates in Brownian semimartingale models. The following theorem is an adaptation
and refinement of Theorem 2.1 and Lemma 2.2 of van der Meulen et al. (2006) for diffusions defined on the circle. We assume observations X T , where T → ∞. Let ΠT be a prior on L 2 (T) (which
henceforth may depend on T ) and choose measurable subsets (sieves) BT ⊂ L 2 (T). Define the
balls
B T (b 0 , ε) = {b ∈ BT : kb 0 − bk2 < ε}.
7
The ε-covering number of a set A for a semimetric ρ, denoted by N (ε, A, ρ), is defined as the
minimal number of ρ-balls of radius ε needed to cover the set A. The logarithm of the covering
number is referred to as the entropy.
The following theorem characterises the rate of posterior contraction for diffusions on the circle
in terms of properties of the prior.
Theorem 3. Suppose {εT } is a sequence of positive numbers such that T ε2T is bounded away from
zero. Assume that there is a constant ξ > 0 such that for every K > 0 there is a measurable set
BT ⊆ L 2 (T) and for every a > 0 there is a constant C > 0 such that for T big enough
¡
¢
log N aεT , B T (b 0 , εT ), k · k2 ≤ C T ε2T ,
(12)
¡
¢
2
ΠT B T (b 0 , εT ) ≥ e −ξT εT ,
(13)
and
¡
¢
2
ΠT L 2 (T) \ BT ≤ e −K T εT .
(14)
Then for every M T → ∞
¡
¢
P b0 ΠT b ∈ L 2 (T) : kb − b 0 k2 ≥ M T εT | X T → 0
and for K big enough,
¡
¢
ΠT L 2 (T) \ BT | X T → 0.
(15)
Equations (12), (13) and (14) are referred to as the entropy condition, small ball condition and
remaining mass condition of theorem 3 respectively. The proof of this theorem is in section 6.3.
4 Theorems on posterior contraction rates
The main result of this section, theorem 9 characterises the frequentist rate of contraction of the
posterior probability around a fixed parameter b 0 of unknown smoothness using the truncated
series prior from section 2.
We make the following assumption on the true drift function.
Assumption 4. The true drift b 0 can be expanded in the Faber-Schauder basis, b 0 = z 1 ψ1 +
P∞ P2 j
P
j =0 k=1 z j k ψ j k = i ≥1 z i ψi and there exists a β ∈ (0, ∞) such that
Jb0 Kβ := sup 2β`(i ) |z i | < ∞.
(16)
i ≥1
Note that we use a slightly different symbol for the norm, as we denote the L 2 -norm by k · k2 .
β
Remark 5. If β ∈ (0, 2), then assumption 4 on b 0 is equivalent to assuming b 0 to be B ∞,∞ -Besov
smooth. It follows from the definition of the basis functions that
´ 1 ³
´
³
´ 1 ³
z j k = b 0 (2k − 1)2−( j +2) − b 0 2−( j +2) (2k − 2) − b 0 2−( j −2) 2k .
2
2
8
Therefore it follows from equations (4.72) (with r = 2) and (4.73) (with p = ∞) in combination
with equation (4.79) (with q = ∞) in Giné and Nickl (2016), section 4.3, that kb 0 k∞ + Jb 0 Kβ is
β
equivalent to the B ∞,∞ -norm of b 0 for β ∈ (0, 2).
β
If β ∈ (0, 1), then β–Hölder smoothness and B ∞,∞ –smoothness coincide (cf. Proposition 4.3.23
in Giné and Nickl (2016)).
For the prior defined in eqs. (7) to (9) we make the following assumptions.
Assumption 6. The covariance matrix A satisfies one of the following conditions:
(A) For fixed α > 0, A i i = 2−2α`(i ) and A i i 0 = 0 for i 6= i 0 .
(B) There exists 0 < c 1 < c 2 and 0 < c 3 with 3c 3 < c 1 independent from r , such that for all
i , i 0 ∈ Ir
c 1 2−`(i ) ≤ A i i ≤ c 2 2−`(i ) ,
|A i i 0 | ≤ c 3 2−1.5(`(i )+`(i
0
))
if i 6= i 0 .
In particular the second assumption if fulfilled by the prior defined by eq. (10) if 0 < γ ≤ 3/2 and
any σ2 > 0.
Assumption 7. The prior on the truncation level satisfies for some positive constants c 1 , c 2 ,
P(R > r ) ≤ exp(−c 1 2r r ),
(17)
P(R = r ) ≥ exp(−c 2 2r r ).
For the prior on the scaling we assume existence of constants 0 < p 1 < p 2 , q > 0 and C > 1 with
p 1 > q|α − β| such that
¡
¢
P(S ∈ [x p 1 , x p 2 ]) ≥ exp − x q
for all x ≥ C .
(18)
The prior on R can be defined as R = b2 logY c, where Y is Poisson distributed. Equation (18) is
satisfied for a whole range of distributions, including the popular family of inverse gamma distributions. Since the inverse gamma prior on S 2 decays polynomially (lemma 17), condition (A2)
of Shen and Ghosal (2015) is not satisfied and hence their posterior contraction results cannot
be applied to our prior. We obtain the following result for our prior.
Theorem 8. Assume b 0 satisfies assumption 4. Suppose the prior satisfies assumptions 6 and 7.
Let {εn }∞
n=1 be a sequence of positive numbers that converges to zero. There is a constant C 1 > 0
such that for any C 2 > 0 there is a measurable set Bn ⊆ L 2 (T) such that for every a > 0 there is a
positive constant C 3 such that for n sufficiently large
¡
¢
−1/β
log P kb R,S − b 0 k∞ < εn ≥ −C 1 εn | log εn |
¡
¢
−1/β
log P b R,S ∉ Bn ≤ −C 2 εn | log εn |
−1/β
log N (aε, {b ∈ Bn : kb − b 0 k2 ≤ εn }, k · k∞ ) ≤ C 3 εn
9
| log εn |.
(19)
(20)
(21)
The following theorem is obtained by applying these bounds to theorem 3 after taking εn =
(T / log T )−β/(1+2β) .
Theorem 9. Assume b 0 satisfies assumption 4. Suppose the prior satisfies assumptions 6 and 7.
Then for all M T → ∞
Ã
P b0 Πn b : kb − b 0 k2 ≥ M T
µ
T
log T
¶−
β
1+2β
¯
!
¯
¯ T
¯X →0
¯
as T → ∞.
β
This means that when the true parameter is from B ∞,∞ [0, 1], β < 2 a rate is obtained that is op2−δ
[0, 1], for
timal possibly up to a log factor. When β ≥ 2 then b 0 is in particular in the space B ∞,∞
−2/5
every small positive δ, and therefore converges with rate essentially T
.
When a different function Λ is used, defined on a compact interval of R, and the basis elements
P
are defined by ψ j k = m∈Z Λ(2 j (x−m)+k−1); forcing them to be 1-periodic. Then theorem 9 and
derived results for applications still holds provided kψ j k k∞ = 1 and ψ j ,k · ψ j ,l ≡ 0 when |k − l | ≥
d for a fixed d ∈ N and the smoothness assumptions on b 0 are changed accordingly. A finite
number of basis elements can be added or redefined as long as they are 1-periodic.
It is easy to see that our results imply posterior convergences rates in weaker L p -norms, 1 ≤ p < 2,
with the same rate. When p ∈ (2, ∞] the L p -norm is stronger than the L 2 -norm. We apply ideas
of Knapik and Salomond (2014) to obtain rates for stronger L p -norms.
Theorem 10. Assume the true drift b 0 satisfies assumption 4. Suppose the prior satisfies assumptions 6 and 7. Let p ∈ (2, ∞]. Then for all M T → ∞
³
´
β−1/2+1/p
2β−2β/p ¯
¯
− 1+2β
P b0 Πn b : kb − b 0 kp ≥ M T T
(log T ) 1+2β ¯ X T → 0
as T → ∞.
These rates are similar to the rates obtained for the density estimation in Giné and Nickl (2011).
However our proof is less involved. Note that we have only consistency for β > 1/2 − 1/p.
5 Applications to nonparametric regression and density estimation
Our general results also apply to other models. The following results are obtained for b 0 satisfying
assumption 4 and the prior satisfying assumptions 6 and 7.
5.1 Nonparametric regression model
As a direct application of the properties of the prior shown in the previous section, we obtain the
following result for a nonparametric regression problem. Assume
X in = b 0 (i /n) + η i ,
10
0 ≤ i ≤ n,
(22)
with independent Gaussian observation errors η i ∼ N(0, σ2 ). When we apply Ghosal and van der
Vaart (2007), example 7.7 to theorem 8 we obtain, for every M n → ∞,
Ã
Π b : kb − b 0 k2 ≥ M n
µ
n
log n
¶−
β
1+2β
¯
!
¯
¯ n Pb0
¯ X −→ 0
¯
as n → ∞ and (in a similar way as in theorem 10) for every p ∈ (2, ∞],
¯
¶
µ
2β−2β/p ¯
β−1/2+1/p
b
− 1+2β
n P 0
¯
1+2β
(log n)
Π b : kb − b 0 k2 ≥ M n n
¯ X −→ 0
as n → ∞.
5.2 Density estimation
Let us consider n independent observations X n := (X 1 , . . . , X n ) with X i ∼ p 0 where p 0 is an unknown density on [0, 1] relative to the Lebesgue measure. Let P denote the space of densities
on [0, 1] relative to the Lebesgue measure. The natural distance for densities is the Hellinger
distance h defined by
Z 1 ³p
´2
p
2
p(x) − q(x) dx.
h(p, q) =
0
b
Define the prior on P by p = keeb k , where b is endowed with the prior of theorem 9 or its non1
periodic version. Assume that log p 0 is β-smooth in the sense of assumption 4. Applying Ghosal
et al. (2000), theorem 2.1 and van der Vaart and van Zanten (2008), lemma 3.1 to theorem 8, we
obtain for a big enough constant M > 0
Ã
n
Π p ∈ P : h(p, p 0 ) ≥ M
log n
µ
¶−
β
1+2β
¯
!
¯
¯ n P0
¯ X −→ 0,
¯
as n → ∞.
6 Proofs
6.1 Proof of lemma 1
Since conditions (ND) and (LI) of (Karatzas and Shreve, 1991, theorem 5.15) hold, the SDE eq. (1)
has a unique weak solution up to an explosion time.
Assume without loss of generality that X 0 = 0. Define τ0 = 0 and for i ≥ 1 the random times
τi = inf{t ≥ τi −1 : |X t − X τi −1 | = 1}.
By periodicity of drift and the Markov property the random variables Ui = τi − τi −1 are independent and identically distributed.
11
Note that
inf{t : X t = ±n} ≥
n
X
Ui
i =1
P
and hence non-explosion follows from limn→∞ ni=1 Ui = ∞ almost surely. The latter holds true
since U1 > 0 with positive probability, which is clear from the continuity of diffusion paths.
6.2 Proof of lemma 2
Proof of the first part. For the proof we introduce some notation: for any ( j , k), ( j 0 , k 0 ) we write
( j , k) ≺ ( j 0 , k 0 ) if supp ψ j 0 ,k 0 ⊂ supp ψ j ,k . The set of indices become a lattice with partial order ≺,
and by ( j , k) ∨ ( j 0 , k 0 ) we denote the supremum. Identify i with ( j , k) and similarly i 0 with ( j 0 , k 0 ).
For i > 1, denote by t i the time points in [0, 1] corresponding to the maxima of ψi . Without loss
of generality assume t i < t i 0 . We have G i ,i 0 = 0 if and only if the interiors of the supports of ψi and
ψi 0 are disjoint. In that case
max supp ψ j ,k ≤ t ( j ,k)∨( j 0 ,k 0 ) ≤ min supp ψ j 0 ,k 0 .
(23)
The values of Zi can be found by the midpoint displacement technique. The coefficients are
given by Z1 = V0 , Z2 = V 1 and for j ≥ 1
2
Z j ,k = V2− j (k−1/2) −
¢
1¡
V2− j (k−1) + V2− j k .
2
As V is a Gaussian process, the vector Z is mean-zero Gaussian, say with (infinite) precision
matrix Γ. Now Γi ,i 0 = 0 if there exists a set L ⊂ N such that L ∩ {i , i 0 } = ∅ for which conditional
on {Zi ? , i ? ∈ L }, Zi are Zi 0 are independent.
Define ( j ? , k ? ) = ( j , k) ∨ ( j 0 , k 0 ) and
L = {i ? ∈ N : i ? = 2 j + k, with j ≤ j ? }.
The set {Zi ? , i ? ∈ L } determine the process V at all times k2− j
?
−1
, k = 0...,2j
?
?
+1
Now Zi and Zi 0 are conditionally independent given {Vt , t = k2− j −1 , k = 0 . . . , 2 j
the Markov property of the nonperiodic Ornstein-Uhlenbeck process.
The result follows since σ({Zi ? , i ? ∈ L }) = σ({Vt , t = k2− j
Lemma 11. Let K (s, t ) = EVs Vt =
?
−1
, k = 0...,2j
σ
1
−γ|t −s|
+ e −γ(1−|t −s|) ).
2γ 1−e −γ (e
2
?
+1
.
?
+1
} by (23) and
}).
If x ∉ (s, t )
1
1
t +s
K (s, x) − K ( s+t
, x) + K (t , x) = 2 sinh2 (γ t −s
2
4 )K ( 2 , x)
2
2
Proof. Without loss of generality assume that t ≤ x ≤ 1. With m = (t + s)/2 and δ = (t − s)/2
(e −γ|s−x| + e −γ(1−|s−x|) ) − 2(e −γ|m−x| + e −γ(1−|m−x|) ) + (e −γ|t −x| + e −γ(1−|t −x|) )
= e −γ|t −x| e −2γδ − 2e −γ|t −x| e −γδ + e −γ|t −x| + e −γ(1−|s−x|) − 2e −γ(1−|s−x|) e −γδ + e −γ(1−|s−x|) e −2γδ
= (1 − e −γδ )2 (e −γ|t −x| + e −γ(1−|s−x|) ) = (1 − e −γδ )2 e γδ (e −γ|m−x| + e −γ(1−|m−x|) )
The result follows from (1 − e −γδ )2 e γδ = 4 sinh2 (γδ/2) and scaling both sides with
12
1 σ2
1
2 2γ 1−e −γ .
Proof of the second part. Denote by [a, b], [c, d ] the support of ψi and ψi 0 respectively and let
m = (b + a)/2 and n = (d + c)/2 but for i = 1, let m = 0. Z1 = V (0), Z2 = V1/2 and Var(Z1 ) =
2
σ2
−1
Var(Z2 ) = σ
2γ coth(γ/2), and Cov(Z1 , Z2 ) = 2γ sinh (γ/2). Note that the 2 × 2 covariance matrix of
Z1 and Z2 has eigenvalues
σ2
2γ
tanh(γ/4) and
σ2
2γ
coth(γ/4) and is strictly positive definite.
By midpoint displacement, 2Zi = 2Vm − Va − Vb , i > 2 and K (s, t ) = EVs Vt =
σ2
1
−γ|t −s|
+
2γ 1−e −γ (e
e −γ(1−|t −s|) ).
Assume without loss of generality b−a ≥ d −c. Define δ to be the halfwidth of the smaller interval,
0
so that δ := (d − c)/2 = 2− j −1 . Then
(b − a)/2 = 2− j −1 = hδ,
with h = 2 j
0
−j
.
Consider three cases:
1. The entries on diagonal, i = i 0 ;
2. The interiors of the supports of ψi and ψi 0 are non-overlapping;
3. The support of ψi 0 is contained in the support of ψi .
Case 1. By elementary computations for i > 2,
4
2γ
(1 − e −γ )A i i = 6(1 + e −γ ) + 2(e −γ2δ + e −γ(1−2δ) ) − 8(e −γδ + e −γ(1−δ) ) =
σ2
= 2(1 − e −γδ )(3 − e −γδ ) + 2e −γ (1 − e γδ )(3 − e γδ ).
As δ ≤
1
4
and under the assumption γ ≤ 3/2 the last display can be bounded by
0.9715 · 4γδ(1 − e −γ ) ≤ 4
2γ
(1 − e −γ )A i i ≤ 4γδ(1 − e −γ ).
σ2
Hence 0.9715 · 2− j σ2 /4 ≤ A i i ≤ 2− j σ2 /4.
Case 2. Necessarily i , i 0 > 2. By twofold application of lemma 11
A i j = (K (c, b) − 2K (n, b) + K (d , b))/4
− 2(K (c, m) − 2K (n, m) + K (d , m))/4
+ (K (c, a) − 2K (n, a) + K (d , a))/4
(24)
2
= 2 sinh (γ d −c
4 )(K (n, b) − 2K (n, m) + K (n, a))/2
2 b−a
= 4 sinh (γ 4 ) sinh2 (γ d −c
4 )K (n, m).
Using the convexity of sinh we obtain the bound
2 sinh2 (x/2) ≤ 0.55x 2
(25)
for 0 ≤ x ≤ 1. Note that f (x) = e −γx + e −γ(1−x) is convex on [0, 1], from which we derive f (x) ≤
1 + e −γ . Using this bound, and the fact that for γ ≤ 3/2,
γ2 K (n, m) ≤
2
σ2
2 γ coth(γ/2) ≤ σ (1 + γ/2),
13
(26)
which can be easily seen from a plot, that
|A i i 0 | ≤0.552 γ4 · 2−2 j −2 · 2−2 j
2 2
0
−2
≤0.0095σ γ (1 + γ/2)2
|K (n, m)|
−1.5( j + j 0 )
.
Case 3.
For i 0 > 2, i = 1 with m = 0 or i = 2 with m = 21 , using eq. (26), we obtain
1
1
|A i i 0 | = |K (m, n) − K (m, c) − K (m, d )|
2
2
≤2 sinh2 (γ d −c
)K
(m,
n)
4
≤0.55γ2 2−2 j
0
−2
(27)
K (m, n)
≤0.098σ2 (1 + γ/2)2−1.5 j .
When i , i 0 > 2 then, using the calculation eq. (24) and lemma 11 noting that a, b and m are not in
(c, d ), we obtain
A i i 0 = 2 sinh2 (γ d −c
4 )(K (n, b) − 2K (n, m) + K (n, a))/2.
Write x = γ|a − m| = γ|b − m| = γhδ and α =
|m−n|
|b−m|
∈ (0, 1). A simple computation then shows
e −γ|b−n| − 2e −γ|m−n| + e −γ|a−n|
=e −(1+α)x − 2e −αx + e −(1−α)x .
The derivative of f (α) := e −(1+α)x − 2e −αx + e −(1−α)x is nonnegative, for α, x > 0 hence f (α) is
increasing and so f (0) ≤ f (α) ≤ f (1). Note that f (0) = 2e −x − 2 ≥ −2x, for x > 0 and f (1) = e −2x −
2e −x + 1 =: g (x). Maximising g 0 (x) over x > 0 gives g 0 (x) ≤ 1/2 and g (0) = 0 and therefore f (1) =
g (x) ≤ x/2.
It follows that
−2γhδ ≤ e −γ|b−n| − 2e −γ|m−n| + e −γ|a−n| ≤ γhδ/2.
For the other terms we derive the following bounds. Write
e −γ(1−|b−n|) − 2e −γ(1−|m−n|) + e −γ(1−|a−n|)
=e −γ+(1+α)x − 2e −γ+αx + e −γ+(1−α)x =: h(α).
Now h(α) is decreasing for x ≤ log 2 and convex and positive for x ≥ log 2. In both case we can
bound h(α) by its value at the endpoints α = 0 and α = 1. Using that 2x ≤ γ we obtain 0 ≤ h(0) =
¡
¢
e −γ (2e x − 2) ≤ 2x and 0 ≤ h(1) = e −γ e 2x − 2e x + 1 ≤ 2x. So 0 ≤ h(α) ≤ 2γhδ.
Using the bound eq. (25) and x/(1 − exp(−x)) ≤ (1 + x) we obtain
0
|A i i 0 | ≤ 0.061σ2 γ(1 + γ)2−1.5( j + j ) .
14
6.3 Proof of theorem 3
A general result for deriving contraction rates for Brownian semi-martingale models was proved
in van der Meulen et al. (2006). Theorem 3 follows upon verifying the assumptions of this result
for the diffusion on the circle. These assumptions are easily seen to boil down to:
1. For every T > 0 and b 1 , b 2 ∈ L 2 (T) the measures P b1 ,T and P b2 ,T are equivalent.
2. The posterior as defined in equation eq. (5) is well defined.
3. Define the (random) Hellinger semimetric h T on L 2 (T) by
Z T³
´2
2
h T (b 1 , b 2 ) :=
b 1 − b 2 (X t ) dt , b 1 , b 2 ∈ L 2 (T).
(28)
0
There are constants 0 < c < C for which
´
³ p
p
lim P þ0 ,T c T kb 1 − b 2 k2 ≤ h T (b 1 , b 2 ) ≤ C T kb 1 − b 2 k2 , ∀ , b 1 , b 2 ∈ L 2 (T) = 1.
T →∞
We start by verifying the third condition. Recall that the local time of the process X T is defined
as the random process L T (x) which satisfies
Z T
Z
f (X t ) dt = f (x)L T (x) dx.
0
R
For every measurable function f for which the above integrals are defined. Since we are working
with 1-periodic functions, we define the periodic local time by
X
L̊ T (x) =
L T (x + k).
k∈Z
Note that t 7→ X t is continuous with probability one. Hence the support of t 7→ X t is compact
with probability one. Since x 7→ L T (x) is only positive on the support of t 7→ X t , it follows that the
sum in the definition of L̊ T (x) has only finitely many nonzero terms and is therefore well defined.
For a one-periodic function f we have
Z T
Z 1
f (X t ) dt =
f (x)L̊ T (x) dx,
0
0
provided the involved integrals exists. It follows from (Schauer and van Zanten, 2017, Theorem
5.3) that L̊ T (x)/T converges to a positive deterministic function only depending only on b 0 and
which is bounded away from zero and infinity. Since the Hellinger distance can be written as
s
Z 1
p
L̊ T (x)
h T (b 1 , b 2 ) = T
(b 1 (x) − b 2 (x))2
dt
T
0
p
it follows that the third assumption is satisfied with d T (b 1 , b 2 ) = T kb 1 − b 2 k2 .
Conditions 1 and 2 now follow by arguing precisely as in lemmas A.2 and 3.1 of van Waaij and
van Zanten (2016) respectively (the key observation being that the convergence result of L̊ T (x)/T
R1
also holds when 0 b(x) dx is nonzero, which is assumed in that paper).
p
The stated result follows from Theorem 2.1 in van der Meulen et al. (2006) (taking µT = T εT in
their paper).
15
6.4 Proof of theorem 8 with assumption 6 (A)
The proof proceeds by verifying the conditions of theorem 3. By assumption 4 the true drift can
P
P2 j
be represented as b 0 = z 1 ψ1 + ∞
j =0 k=1 z j k ψ j k . For r ≥ 0, define its truncated version by
b 0r
= z 1 ψ1 +
r X
2j
X
z jkψjk.
j =0 k=1
6.4.1 Small ball probability
For ε > 0 choose an integer r ε with
1/β
Cβε
−1/β
rε
≤ 2 ≤ 2C β ε
−1/β
where
Cβ =
Jb0 Kβ
(2β − 1)1/β
.
(29)
For notational convenience we will write r instead of r ε in the remainder of the proof. By
lemma 16 we have kb 0r − b 0 k∞ ≤ ε. Therefore
kb r,s − b 0 k2 ≤ kb r,s − b 0r k2 + kb 0r − b 0 k2 ≤ kb r,s − b 0r k∞ + ε
which implies
¢
¡
¢
¡
P kb r,s − b 0 k2 < 2ε ≥ P kb r,s − b 0r k∞ < ε .
Let f S denotes the probability density of S. For any x > 0, we have
Z ∞
¡
¢ X
¡
¢
P kb R,S − b 0 k2 < 2ε =
P kb r,s − b 0 k2 < 2ε f S (s) ds
P(R = r )
0
r ≥1
≥ P(R = r )
where
Lε = ε
inf
s∈[L ε ,Uε ]
p
− qβ1
and
¢
¡
P kb r,s − b 0r k∞ < ε
Uε = ε
Z
Uε
Lε
f S (s) ds,
(30)
p
− qβ2
and p 1 , p 2 and q are taken from assumption 7. For ε sufficiently small, we have by the second
part of assumption 7
Z Uε
¡
−1 ¢
f S (s) ds ≥ exp − ε β
Lε
By choice of r and the first part of assumption 7, there exists a positive constant C such that
³
´
³
´
−1
P(R = r ) ≥ exp − c 2 2r r ≥ exp −C ε β | log ε| ,
for ε sufficiently small.
For lower bounding the middle term in equation (30), we write
b r,s − b 0r = (s Z1 − z 1 )ψ1 +
r X
2j
X
j =0 k=1
16
(s Z j k − z j k )ψ j k
which implies
kb r,s − b 0r k∞ ≤ |s Z1 − z 1 | +
r
X
max |s Z j k − z j k | ≤ (r + 2) max |s Zi − z i |.
j =0 1≤k≤2
j
i ∈Ir
This gives the bound
¡
¢ Y ³
P kb r,s − b 0r k∞ < ε ≥
P |s Zi − z i | <
i ∈Ir
ε ´
.
r +2
By choice of the Zi , we have for all i ∈ {1, 2, . . .}, 2α`(i ) Zi is standard normally distributed and
hence
Ã
!
¯
¯ 2α`(i ) ε
³
ε ´
¯ α`(i )
¯
α`(i )
= log P ¯2
log P |s Zi − z i | <
Zi − 2
z i /s ¯ <
r +2
(r + 2)s
Ã
!
2α`(i ) 2
zi 1
¡ ¢
2α`(i ) ε
22α`(i ) ε2 2
≥ log
−
−
+ 2 log π2 ,
2
2
2
(r + 2)s
(r + 2) s
s
where the inequality follows from lemma 18. The third term can be further bounded as we have
22α`(i ) z i2 = 22(α−β)`(i ) 22β`(i ) z i2 ≤ 22(α−β)`(i ) Jb 0 K2β .
Hence
Ã
!
2(α−β)`(i )
Jb0 K2β
¡ ¢
2α`(i ) ε
22α`(i ) ε2 2
ε ´
−
+ 12 log π2 .
≥ log
−
log P |s Zi − z i | <
2
2
2
r +2
(r + 2)s
(r + 2) s
s
³
(31)
For s ∈ [L ε ,Uε ] and i ∈ Ir we will now derive bounds on the first three terms on the right of
eq. (31). For ε sufficiently small we have r ≤ r + 2 ≤ 2r and then inequality (29) implies
logC β ≤ r + 2 ≤ 2 log(4C β ) +
2
| log ε|.
β
Bounding the first term on the RHS of (31). For ε sufficiently small, we have
³
´¶
µ
¶
µ
¶
µ
p
(r + 2)s
(r + 2)Uε
− 1+ qβ2
log α`(i ) ≤ log
= log (r + 2)ε
ε
2
ε
½
¾ µ
¶
2
p2
≤ log 2 log(4C β ) + | log ε| + 1 +
| log ε|
β
qβ
≤ C̃ p 2 ,q,β | log ε|,
where C̃ p 2 ,q,β is a positive constant.
Bounding the second term on the RHS of (31). For ε sufficiently small, we have
(2C β )2α 2 (−α+β+p 1 /q )
22α`(i ) ε2
22αr ε2
≤
≤
εβ
≤ 1.
(r + 2)2 s 2 (logC β )2 L 2ε (logC β )2
The final inequality is immediate in case α = β, else if suffices to verify that the exponent is nonnegative under the assumption p 1 > q|α − β|.
17
Bounding the third term on the RHS of (31). For ε sufficiently small, in case β ≥ α we have
22(α−β)`(i ) Jb 0 K2β
s2
≤ Jb 0 K2β L −2
ε ≤ 1.
In case β < α we have
22(α−β)`(i ) Jb 0 K2β
s2
≤
22(α−β)r Jb 0 K2β
L 2ε
2
≤ (2C β )2(α−β) ε β (
p 1 /q−α+β)
≤1
as the exponent of ε is positive under the assumption p 1 > q|α − β|.
Hence for ε small enough, we have
³
log P |s Zi − z i | <
ε ´
≥ −C̃ p 2 ,q,β | log ε| − 3.
r +2
As −2r +1 ≥ −4C β ε−1/β we get
log
inf
p
s∈[x
1 ,x p 2 ]
¡
¢
¡
¢
P kb r,s − b 0r k∞ < ε ≥ −4C β ε−1/β C̃ p 2 ,q,β | log ε| + 3
& −ε−1/β | log ε|.
¡
¢
We conclude that the right hand side of eq. (30) is bounded below by exp −C 1 ε−1/β | log ε| , for
some positive constant C 1 and sufficiently small ε.
6.4.2 Entropy and remaining mass conditions
For r ∈ {0, 1, . . .} denote by C r the linear space spanned by ψ1 and ψ j k , 0 ≤ j ≤ r, k ∈ 1, . . . , 2 j , and
define
©
ª
C r,t := b ∈ C r , Jb Kα ≤ t .
Proposition 12. For any ε > 0
log N (ε, C r,t , k · k∞ ) ≤ 2r +1 log(3A α t ε−1 ),
where A α =
P∞
k=0
2−kα .
Proof. We follow (van der Meulen et al., 2006, §3.2.2). Choose ε0 , . . . , εr > 0 such that
Define
(£
¤2 j
−2−α j t , 2−α j t
if j ∈ {1, . . . , r }
Uj =
.
2
[−t , t ]
if j = 0
Pr
j =0 ε j
j
≤ ε.
For each j ∈ {1, . . . , r }, let E j be a minimal ε j -net with respect to the max-distance on R2 and let
E 0 be a minimal ε0 -net with respect to the max-distance on R2 . Hence, if x ∈ U j , then there exists
a e j ∈ E j such that maxk |x k − e k | ≤ ε j .
18
Take b ∈ C r,t arbitrary: b = z 1 ψ1 +
Pr
j =0
P2 j
k=1
z j k ψ j k . Let b̃ = e 1 ψ1 +
Pr
j =0
P2 j
e ψ ,
k=1 j k j k
where
j
(e 1 , e 0,1 ) ∈ E 0 and (e j 1 , . . . , e j 2 j ) ∈ E j (for j = 1, . . . , 2 ). We have
kb − b̃k∞ ≤ |z 1 − e 1 |kψ1 k∞ +
≤ |z 1 − e 1 | +
This can be bounded by
Pr
j =0 ε j
r
X
r
X
max |z j k − e j k |kψ j k k∞
j =0 1≤k≤2
j
max 2 j α |2− j α z j k − 2− j α e j k |.
j
j =0 1≤k≤2
by an appropriate choice of the coefficients in b̃. In that case we
obtain that kb − b̃k∞ ≤ ε. This implies
µ
¶
3 · 2−α j t
2 log
log |E j | ≤
.
log N (ε, C r,t , k · k∞ ) ≤
εj
j =0
j =0
r
X
r
X
j
The asserted bound now follows upon choosing ε j = ε2− j α /A α .
Proposition 13. There exists a constant a positive constant K such that
¡
¢
log N (aε, {b ∈ C r : kb − b 0 k2 ≤ ε}, k · k2 ) ≤ 2r +1 log 6A α K 2αr .
Proof. There exists a positive K such that
{b ∈ C r : kb − b 0 k2 ≤ aε} ⊂ {b ∈ C r : kbk2 ≤ K }.
By lemma 21, this set is included in the set
n
o
p
b ∈ C r : kbk∞ ≤ 32(r +1)/2 K .
By lemma 20, for any b = z 1 ψ1 +
Pr
j =0
P2 j
k=1
(32)
z j k ψ j k in this set we have
o
n
p
max |z 1 |, |z j k |, j = 0, . . . , r, k = 1 . . . , 2 j ≤ 2kbk∞ 32(r +1)/2 K .
©
ª
Hence, the set eq. (32) is included in the set b ∈ C r : Jb Kα ≤ a(r, ε) = C r,a(r,ε) , where a(r, ε) =
p
21+αr 32(r +1)/2 K .
Hence,
¡
¢
N (aε, {b ∈ C r : kb − b 0 k2 ≤ ε}, k · k2 ) ≤ N ε, C r,a(r,ε) , k · k2 .
Using lemma 21 again the latter can be bounded by
³ p
´
N ε 32(r +1)/2 , C r,a(r,ε) , k · k∞
The result follows upon applying proposition 12.
19
We can now finish the proof for the entropy and remaining mass conditions. Choose r n to be the
− β1
smallest integer so that 2r n ≥ Lεn , where L is a constant, and set Bn = C r n . The entropy bound
then follows directly from proposition 13.
For the remaining mass condition, using assumption 7, we obtain
¡
¢
¡
¢
¡
¢
− β1
P b R,S ∉ Bn = P(R > r n ) ≤ exp − c 1 2r n r n ≤ exp −C 3 εn | log εn | ,
and note that the constant C 3 can be made arbitrarily big by choosing L big enough.
6.5 Proof of theorem 8 under assumption 6 (B)
We start with a lemma.
Lemma 14. Assume there exists 0 < c 1 < c 2 and 0 < c 3 with c 3 < c 1 independent from r , such that
for all i , i 0 , 2 ≤ `(i ), `(i 0 ) ≤ r ,
c 1 2−`(i ) ≤ A i i ≤ c 2 2−`(i ) ,
|A i i 0 | ≤ c 3 2
−1.5(`(i )+`(i 0 ))
(33)
0
if i 6= i .
(34)
Let Ae = (A i i 0 )2≤`(i ),`(i 0 )≤r (so the right-lower submatrix of A r ). Then for all x ∈ R|Ir |−2
e ≤ x 0 Ax
e ≤ 2c 2 x 0 Λx.
e
(c 1 − c 3 )x 0 Λx
e = (Λ
e i i 0 )2≤`(i ),`(i 0 )≤r is the diagonal matrix with Λ
e i i = 2−`(i ) , .
where Λ
Proof. In the following the summation are over i , i 0 , 2 ≤ `(i ), `(i 0 ) ≤ r .
P 2
P
i x i A i i + i 6= j x i A i j x j . By the first inequality
c 1 x 0 Λ(r ) x = c 1
X
i
x i2 2−`(i ) <
X
i
x i2 A i i < c 2
X
i
Trivially, x 0 A r x =
x i2 2−`(i ) = c 2 x 0 Λ(r ) x.
On the other hand
¯
¯
Ã
!2
¯X
¯
X
X
0
¯
¯
x A 0 x 0 ¯ ≤ c3
|x i |2−1.5`(i ) |x i 0 |2−1.5`(i ) ≤ c 3
|x i |2−1.5`(i ) .
¯
¯i 6=i 0 i i i i ¯
i
i 6=i 0
At the first inequality we used the second part of of (33). The second inequality follows upon
including the diagonal. By Cauchy-Schwarz, this can be further bounded by
Ã
!Ã
!
X 2 −`(i ) X −2`(i )
c3
xi 2
2
≤ c 3 x 0 Λx,
i
i
P
P
P
−2`(i )
j −2 j
where the final inequality follows from i 2−2`(i ) ≤ ∞
= ∞
= 1. The result
i =3 2
j =1 2 2
follows by combining the derived inequalities.
20
We continue with the proof of theorem 8. Write A as block matrix
¸
·
A1 B 0
,
A=
B A2
with A 1 a 2 × 2-matrix, and B , A 2 defined accordingly. By lemma 2
·
¸
σ2
coth(γ/2) sinh−1 (γ/2)
A1 =
γ
.
sinh−1 (γ/2) coth(γ/2)
2
Define the 2 × 2-matrix
Λ1 = c σ2 γ tanh(γ/4)I,
2
c ∈ (0, 1).
where I is the 2 × 2-identity matrix. It is easy to see that A 1 − Λ1 is positive definite.
When A 2 − Λ2 − B (A 1 − Λ1 )−1 B 0 is positive definite, then it follows from the Cholesky decomposition that A − Λ is positive definite, where Λ = diag(Λ1 , Λ2 ) positive definite.
Note
where
!
Ã
0
(B A −1
1 B )i ,i 0
=
X
k,k 0
0 0
B i k (A 1 )−1
kk 0 B i k
Ã
!
X
k,k 0
(A 1 )−1
kk 0
=
≤
X
k,k 0
(A 1 )−1
kk 0
(B i ,1 ∨ B i ,2 )(B i 0 ,1 ∨ B i 0 ,2 )
2
2
2
≤ 2
.
−1
2
σ γ sinh (γ/2) + coth(γ/2) σ (1 + γ)
Therefore
0
2
−1.5(`(i )+`(i
|(B A −1
1 B )i i 0 | ≤ 0.020σ (1 + γ/4)2
0
))
0 0
Now consider à = A 2 − Λ2 − B (A 1 − Λ1 )−1 B 0 . By lemma 2 and the bound on |(B A −1
1 B )i i | and
choosing c > 0 in the definition of Λ1 small enough, under the assumption that γ ≤ 1.5,
0.945 · 2−`(i ) σ2 /4 < Ã i i < 1.03 · 2−`(i ) σ2 /4.
and for i 6= i 0 | Ã i i 0 | ≤ 0.9415 σ4 2−1.5(`(i )+`(i )) . Therefore by lemma 14 Ã − Λ2 is positive definite
with diagonal matrix Λ2 with diagonal entries 2−`(i ) .
2
0
It follows that x 0 Λx ³ x 0 Ax. This implies that the small ball probabilities and the mass outside
a sieve behave similar under assumption 6(B) as when the Zi are independent normally distributed with zero mean and variance ξ2i = Λi i . As this case corresponds to assumption 6(A) with
α = 21 for which posterior contraction has already been established, the stated contraction rate
under assumption 6(B) follows from Anderson’s lemma (lemma 19).
6.6 Proof of theorem 10: convergence in stronger norms
The linear embedding operator T : L p (T) → L 2 (T), x 7→ x is a well-defined injective continuous
operator for all p ∈ (2, ∞]. Its inverse is easily seen to be a densely defined, closed unbounded
linear operator. Following Knapik and Salomond (2014) we define the modulus of continuity m
as
©
ª
m(Bn , ε) := sup k f − f 0 kp : f ∈ Bn , k f − f 0 k2 ≤ ε .
Theorem 2.1 of Knapik and Salomond (2014) adapted to our case is
21
Theorem 15 (Knapik and Salomond (2014)). Let εn ↓ 0, Tn ↑ ∞ and Π be a prior on L p (T) such
that
¡
¢
E0 Π Bnc | X Tn → 0,
for measurable sets Bn ⊂ L p (T). Assume that for any positive sequence M n
¡
¢
E0 Π b ∈ Bn : kb − b 0 k2 ≥ M n εn | X Tn → 0,
then
¡
¢
E0 Π b ∈ L p (T) : kb − b 0 kp ≥ m(Bn , M n εn ) | X Tn → 0.
c
|
Note that the sieves C r,t which we define in section 6.4.2 have by eq. (15) the property Π(C r,t
T
r (1/2−1/p)
X ) → 0. By lemmas 21 and 23, the modulus of continuity satisfies m(C r,u , εn ) . 2
εn ,
for all p ∈ (2, ∞], (assume 1/∞ = 0), and the result follows.
A Lemmas used in the proofs
Lemma 16. Suppose z has Faber-Schauder expansion
2j
∞ X
X
z = z 1 ψ1 +
z jkψjk.
j =0 k=1
If Jz Kβ < ∞ (with the norm defined in (16)), then for r ≥ 1
°
°
X
°
°
z i ψi °
°z −
∞
i ∈Ir
≤ Jz Kβ
2−r β
2β − 1
.
(35)
Proof. This follows from
°
°
X
°
°
z i ψi °
°z −
i ∈Ir
∞
°
2j
∞ °X
X
°
°
z jkψjk°
°
≤
=
j =r +1
∞
X
j =r +1
∞
k=1
2− j β max 2 j β |z j k | ≤ Jz Kβ
1≤k≤2 j
∞
X
2− j β .
j =r +1
Lemma 17. If X ∼ IG(A, B ) then for any M > 0,
P(X ≥ M ) ≤
BA
M −A .
Γ(A)
Proof. This follows from
P(X ≥ M ) ≤
BA
Γ(A)
Z
∞
M
x −α−1 dx = −
22
B A £ −α ¤∞
BA
x
=
M −A .
x=M
Γ(A)
Γ(A)
Lemma 18. Let X ∼ N(0, 1), θ ∈ R and ε > 0.Then
q
2
p ´
e −θ ³
log ε−ε2 −θ 2 +log π2
P(|X − θ| ≤ ε) ≥ p P |X | ≤ 2ε ≥ e
.
2
Proof. Note that
θ+ε
Z
θ−ε
and
1
e − 2 (x+θ)
e
thus e
− 12 (x+θ)2
2
≥ e −θ e
Z
− 12 (
p 2
2x)
θ+ε
θ−ε
−θ 2
e
− 12 x 2
Now the elementary bound
e
1
2
e − 2 x dx =
Z
ε
1
2
e − 2 (x+θ) dx
−ε
2
= eθ
p
− 12 ( 2x)2
2
− 12 (x+θ)2 +x 2
1
2
= e 2 (x−θ) ≥ 1,
, hence
dx ≥ e
Ry
−y e
1
P(|X − θ| ≤ ε) = p
2π
−θ 2
− 12 x 2
Z
Z
e
p
− 21 ( 2x)2
−ε
1
2
e −θ
dx = p
2
Z
p
2ε
p e
− 2ε
− 21 u 2
du.
2
≥ 2ye − 2 y gives
2
θ+ε
θ−ε
ε
e
− 12 x 2
1 e −θ
dx ≥ p
p
2π 2
2
p
2ε
Z
p e
− 2ε
2
− 12 u 2
p
2
1 e −θ p
e −θ
= p P(|X | ≤ 2ε) ≥ p
p 2 2εe −ε =
2π 2
2
du
r
2 log ε−θ2 −ε2
e
π
Lemma 19 (Anderson’s lemma). Define a partial order on the space of n×n-matrices (n ∈ N ∪{∞})
by setting A ≤ B, when B − A is positive definite. If X ∼ N(0, ΣX ) and Y ∼ N(0, ΣY ) independently
with Σ X ≤ ΣY , then for all symmetric convex sets C
P(Y ∈ C ) ≤ P(X ∈ C ).
Proof. See Anderson (1955).
Lemma 20. Let
f = z 1 ψ1 +
r X
2j
X
z j ,k ψ j ,k .
j =1 k=1
Then
sup |z i | ≤ 2k f k∞ .
i :`(i )≤r
Proof. Note that |z 1 | = | f (0)| ≤ 2k f k∞ , and |z 0,1 | = | f (1/2)| ≤ 2k f k∞ and inductively, for j ≥ 1,
¡
¢
¡
¢
¡
¢
z j k = f (2k − 1)2−( j +2) − 12 f 2−( j +1) (k − 1) − 12 f 2−( j −1) k , hence |z j k | ≤ 2k f k∞ .
Lemma 21. Let C r as in section 6.4.2. Then
sup
06= f ∈C r
k f k∞ p
≤ 3 · 2(r +1)/2 .
k f k2
23
Proof. Let f ∈ C r be nonzero. Note that for any constant c > 0,
kc f k∞ k f k∞
=
.
kc f k2
k f k2
Hence, we may and do assume that k f k∞ = 1. Furthermore, since the L 2 and L ∞ norm of f and
| f | are the same, we also assume that f is nonnegative.
Let x 0 be a global maximum of f . Clearly f (x 0 ) = 1. Since f is a linear interpolation between
the points {k2− j −1 : k = 0, 1, . . . , 2r +1 }, we may also assume that x 0 is of the form x 0 = k2− j −1 . We
consider two cases
(i) 0 ≤ k < 2r +1 ,
(ii) k = 2r +1 .
¡
¢
In case (i) we have that f (x) ≥ 1 − 2r +1 (x − k2−r −1 ) I[k2−r −1 ,(k+1)2−r −1 ] (x), for all x ∈ [k2−r −1 , (k +
1)2−r −1 ]. In case (ii) f (x) ≥ 2r +1 (x −1+2−r −1 )I[1−2−r −1 ,1] (x), for all x ∈ [1−2−r −1 , 1]. Hence, in both
cases,
Z 2−r −1
1
1
2
2r +2
k f k2 ≥ 2
x 2 dx = 22r +2 2−3r −3 = 2−r −1 .
3
3
0
Thus
k f k∞
≤
k f k2
1
p1 2−(r +1)/2
3
=
p
3 · 2(r +1)/2 ,
uniformly over all nonzero f ∈ C r,s .
Lemma 22. Let a 1 , a 2 , x 1 , x 2 be positive numbers. Then
a1 + a2 a1 W a2
≤
.
x1 + x2 x1 x2
Proof. Suppose that the lemma is not true, so there are positive a 1 , a 2 , x 1 , x 2 such that,
·
¸ ·
¸
a1 W a2 a1 + a2
a1 a1 + a2 W a2 a1 + a2
−
=
−
−
x1 x2 x1 + x2
x1 x1 + x2
x2 x1 + x2
" a1
# " a2
#
x 1 (x 1 + x 2 ) − (a 1 + a 2 ) W x 2 (x 1 + x 2 ) − (a 1 + a 2 )
=
< 0.
x1 + x2
x1 + x2
Hence, both terms on the right-hand-side are negative. In particular, this means for the first term
that x 2 /x 1 < a 2 /a 1 . For the second term this gives x 1 /x 2 < a 1 /a 2 . These two inequalities cannot
hold simultaneously and we have reached a contradiction.
Lemma 23. Let C r and C r,s as in section 6.4.2. Then for p ∈ [2, ∞),
sup
06= f ∈C r
k f kp
k f k2
≤
31/2
(p + 1)1/p
24
2(r +1)(1/2−1/p) .
Proof. Let f ∈ C r . Just as in proof of lemma 21 we may assume that f is nonnegative and k f k2 =
1. Hence
Ã
!1/p Ã
p !1/p
k f kp
k f kp
p
=
sup
=
sup
k f kp
.
sup
2
06= f ∈C r ,k f k2 =1 k f k2
06= f ∈C r ,k f k2 =1
06= f ∈C r k f k2
Note that
p
k f kp =
+1
2r X
−1 Z (k+1)2−r −1
k=0
Hence, by repeatedly applying lemma 22
P2r +1 R (k+1)2−r −1
f (x)p dx
k=0 k2−r −1
≤
P2r +1 −1 R (k+1)2−r −1
f (x)2 dx
k=0
k2−r −1
f (x)p dx.
k2−r −1
R (k+1)2−r −1
_
k ∈ {0, . . . , 2r +1 − 1}
∃x ∈ (k2−r −1 , (k + 1)2−r −1 ) : f (x) 6= 0
k2−r −1
R (k+1)2−r −1
k2−r −1
f (x)p dx
f (x)2 dx
.
Note that f is a linear interpolation between the points k2−r −1 , k ∈ {0, 1, . . . , 2r +1 }.
Now study affine functions g : [0, 2−r −1 ] → R which are positive. A maximum of g is attained in
either 0 or 2−r −1 . Without lose of generality it is attained in 0. Using scaling in a later stadium of
the proof, we assume for the moment that g (0) = 1. Hence a := g (2−r −1 ) ∈ [0, 1]. Note that
g (x) = 1 − (1 − a)2r +1 x.
When a = 1, kg kp = kg k2 = 1. Now consider a < 1,
Z 2−r −1
Z 2−r −1
£
¤p
p
g (x) dx =
1 − (1 − a)2r +1 x dx.
0
0
−r −1
−r −1
Let y = −x + 21−a then x = −y + 21−a and dx = − dy. Hence
2−r −1
Z
0
Z
p
g (x) dx =
2−r −1
1−a
−r −1
−2−r −1 + 2 1−a
= 2−r −1
(1 − a)p 2r p+p y p dy
·
¸
1
1 − a p+1
.
p +1
1−a
Note that for a constant c > 0 and a function h,
p
kchkp
kchk22
p
=
c p khkp
c 2 khk22
Let
c 2 = 3 · 2r +1
p
= c p−2
khkp
khk22
.
1−a
.
1 − a3
Hence c g has L 2 -norm one and
p
p
kcg kp = c p kg kp
µ
¶p
·
¸
2
1 − a p+1
r +1 1 − a
−r −1 1
= 3·2
2
1 − a3
p +1
1−a
=
3p/2 (r +1)(p/2−1)
2
(1 − a)p/2−1 (1 − a 3 )−p/2 (1 − a p+1 ).
p +1
25
The maximum is attained for a = 0, then
p
kc g kp =
Hence
kcg kp =
3p/2 (r +1)(p/2−1)
2
p +1
31/2
(p + 1)1/p
2(r +1)(1/2−1/p)
and the result follows, using that k f I(k2−r −1 ,(k+1)2−r −1 ) k22 ≤ k f k22 and that for 0 < c 0 < c,
p
p
kc 0 g kp
p
(c 0 /c)p kc g kp kc g kp
=
≤
.
kc 0 g k22 (c 0 /c)2 kc g k22 kc g k22
B Acknowledgement
This work was partly supported by the Netherlands Organisation for Scientific Research (NWO)
under the research programme “Foundations of nonparametric Bayes procedures”, 639.033.110
and by the ERC Advanced Grant “Bayesian Statistics in Infinite Dimensions”, 320637.
References
Anderson, T. W. (1955). The integral of a symmetric unimodal function over a symmetric convex
set and some probability inequalities. Proc. Amer. Math. Soc., 6:170–176.
Bhattacharya, R. and Waymire, E. (2007). A Basic Course in Probability Theory. Universitext.
Springer New York.
Dalalyan, A. (2005). Sharp adaptive estimation of the drift function for ergodic diffusions. Ann.
Statist., 33(6):2507–2528.
Dalalyan, A. S. and Kutoyants, Y. A. (2002). Asymptotically efficient trend coefficient estimation
for ergodic diffusion. Math. Methods Statist., 11(4):402–427 (2003).
Ghosal, S., Ghosh, J. K., and van der Vaart, A. W. (2000). Convergence rates of posterior distributions. Ann. Statist., 28(2):500–531.
Ghosal, S. and van der Vaart, A. W. (2007). Convergence rates of posterior distributions for noniid
observations. Ann. Statist., 35(1):192–223.
Giné, E. and Nickl, R. (2011). Rates of contraction for posterior distributions in L r -metrics, 1 ≤
r ≤ ∞. Ann. Statist., 39(6):2883–2911.
Giné, E. and Nickl, R. (2016). Mathematical foundations of infinite-dimensional statistical models. Cambridge Series in Statistical and Probabilistic Mathematics. Cambridge University
Press.
26
Hindriks, R. (2011). Empirical dynamics of neuronal rhythms. PhD thesis, Vrije Universiteit Amsterdam.
Karatzas, I. and Shreve, S. E. (1991). Brownian motion and stochastic calculus, volume 113 of
Graduate Texts in Mathematics. Springer-Verlag, New York, second edition.
Knapik, B. and Salomond, J.-B. (2014). A general approach to posterior contraction in nonparametric inverse problems. Bernoulli.
Knapik, B. T., van der Vaart, A. W., and van Zanten, J. H. (2011). Bayesian inverse problems with
Gaussian priors. Ann. Statist., 39(5):2626–2657.
Kutoyants, Y. A. (2004). Statistical inference for ergodic diffusion processes. Springer, New York.
Papaspiliopoulos, O., Pokern, Y., Roberts, G. O., and Stuart, A. M. (2012). Nonparametric estimation of diffusions: a differential equations approach. Biometrika, 99(3):511.
Pokern, Y. (2007). Fitting Stochastic Differential Equations to Molecular Dynamics Data. PhD
thesis, University of Warwick.
Pokern, Y., Stuart, A. M., and van Zanten, J. H. (2013). Posterior consistency via precision operators for Bayesian nonparametric drift estimation in SDEs. Stochastic Processes and their
Applications, 123(2):603 – 628.
Schauer, M. and van Zanten, J. H. (2017). Uniform central limit theorems for additive functionals
of diffusions on the circle. In preparation.
Shen, W. and Ghosal, S. (2015). Adaptive Bayesian procedures using random series priors. Scandinavian Journal of Statistics, 42(4):1194–1213.
Spokoiny, V. G. (2000). Adaptive drift estimation for nonparametric diffusion model. Ann. Statist.,
28(3):815–836.
Strauch, C. (2015). Sharp adaptive drift estimation for ergodic diffusions: the multivariate case.
Stochastic Process. Appl., 125(7):2562–2602.
van der Meulen, F. H., Schauer, M., and van Zanten, J. H. (2014). Reversible jump MCMC for
nonparametric drift estimation for diffusion processes. Comput. Statist. Data Anal., 71:615–
632.
van der Meulen, F. H., van der Vaart, A. W., and van Zanten, J. H. (2006). Convergence rates of
posterior distributions for Brownian semimartingale models. Bernoulli, 12(5):863–888.
van der Vaart, A. W. and van Zanten, J. H. (2008). Rates of contraction of posterior distributions
based on Gaussian process priors. Ann. Statist., 36(3):1435–1463.
van Waaij, J. and van Zanten, H. (2016). Gaussian process methods for one-dimensional diffusions: Optimal rates and adaptation. Electron. J. Statist., 10(1):628–645.
van Zanten, J. H. (2013). Nonparametric Bayesian methods for one-dimensional diffusion models. Mathematical biosciences, 243(2):215–222.
27
| 10math.ST
|
Work in progress by Shie Mannor, Vianney Perchet and Gilles Stoltz (2016)
Approachability in Unknown Games:
Online Learning Meets Multi-Objective Optimization
Shie Mannor
[email protected]
Israel Institute of Technology (Technion), Faculty of Electrical Engineering, 32000 Haifa, Israel
Vianney Perchet
arXiv:1402.2043v2 [stat.ML] 17 Jun 2016
[email protected]
ENSAE ParisTech, 3 avenue Pierre Larousse, 92240 Malakoff, France
Gilles Stoltz
[email protected]
GREGHEC: HEC Paris — CNRS, 1 rue de la Libération, 78351 Jouy-en-Josas, France
Abstract
In the standard setting of approachability there are two players and a target set. The
players play repeatedly a known vector-valued game where the first player wants to have
the average vector-valued payoff converge to the target set which the other player tries to
exclude it from this set. We revisit this setting in the spirit of online learning and do not
assume that the first player knows the game structure: she receives an arbitrary vectorvalued reward vector at every round. She wishes to approach the smallest (“best”) possible
set given the observed average payoffs in hindsight. This extension of the standard setting
has implications even when the original target set is not approachable and when it is not
obvious which expansion of it should be approached instead. We show that it is impossible,
in general, to approach the best target set in hindsight and propose achievable though
ambitious alternative goals. We further propose a concrete strategy to approach these goals.
Our method does not require projection onto a target set and amounts to switching between
scalar regret minimization algorithms that are performed in episodes. Applications to global
cost minimization and to approachability under sample path constraints are considered.
Keywords: Approachability, online learning, multi-objective optimization
1. Introduction
The approachability theory of Blackwell (1956) is arguably the most general approach available so far for online multi-objective optimization and it has received significant attention
recently in the learning community (see, e.g., Abernethy et al., 2011, and the references
therein). In the standard setting of approachability there are two players, a vector-valued
payoff function, and a target set. The players play a repeated vector-valued game where
the first player wants the average vector-valued payoff (representing the states in which the
different objectives are) to converge to the target set (representing the admissible values
for the said states), which the opponent tries to exclude. The target set is prescribed a
priori before the game starts and the aim of the decision-maker is that the average reward
be asymptotically inside the target set.
A theory of approachability in unknown games (i.e., for arbitrary vector-valued
bandit problems). The analysis in approachability has been limited to date to cases where
some underlying structure of the problem is known, namely the vector payoff function r
c (2016) by Mannor, Perchet, Stoltz.
Mannor, Perchet, Stoltz
(and some signalling structure if the obtained payoffs are not observed). We consider the
case of “unknown games” where only vector-valued rewards are observed and there is no a
priori assumption on what can and cannot be obtained. In particular, we do not assume
that there is some underlying game structure we can exploit. In our model at each round,
for every action of the decision maker there is a vector-valued reward that is only assumed
to be arbitrary. The minimization of regret could be extended to this setting (see, e.g.,
Cesa-Bianchi and Lugosi, 2006, Sections 7.5 and 7.10). And we know that the minimization
of regret is a special case of approachability. Hence our motivation question: can a theory
of approachability be developed for unknown games?
One might wonder if it is possible to treat an unknown game as a known game with a
very large class of actions and then use approachability. While such lifting is possible in
principle, it would lead to unreasonable time and memory complexity as the dimensionality
of the problem will explode.
In such unknown games, the decision maker does not try to approach a pre-specified
target set, but rather tries to approach the best (smallest) target set given the observed
vector-valued rewards. Defining a goal in terms of the actual rewards is standard in online
learning, but has not been pursued (with a few exceptions listed below) in the multiobjective optimization community.
A theory of smallest approachable set in insight. Even in known games it may
happen that no pre-specified target set is given, e.g., when the natural target set is not
approachable. Typical relaxations are then to consider uniform expansions of this natural
target set or its convex hull. Can we do better? To answer this question, another property
of regret minimization is our source of inspiration. The definition of a no-regret strategy
(see, e.g., Cesa-Bianchi and Lugosi, 2006) is that its performance is asymptotically as good
as the best constant strategy, i.e., the strategy that selects at each stage the same mixed
action. Another way to formulate this claim is that a no-regret strategy performs (almost)
as well as the best mixed action in hindsight. In the approachability scenario, this question
can be translated into the existence of a strategy that approaches the smallest approachable
set for a mixed action in hindsight. If the answer is negative (and, unfortunately, it is) the
next question is to define a weaker aim that would still be more ambitious than the typical
relaxations considered.
Short literature review. Our approach generalizes several existing works. Our proposed
strategy can be used for standard approachability in all the cases where the desired target
set is not approachable and where one wonders what the aim should be. We illustrate this
on the problems of global costs introduced by Even-Dar et al. (2009) and of approachability
with sample path constraints as described in the special case of regret minimization by
Mannor et al. (2009).
The algorithm we present does not require projection which is the Achilles’ heel of many
approachability-based schemes (it does so similarly to Bernstein and Shimkin, 2015). Our
approach is also strictly more general and more ambitious than one recently considered
by Azar et al. (2014). An extensive comparison to the results by Bernstein and Shimkin
(2015) and Azar et al. (2014) is offered in Section 5.2.
2
Approachability in Unknown Games
Outline. This article consists of four parts of about equal lengths. We first define the
problem of approachability in unknown games and link it to the standard setting of approachability (Section 2).
We then discuss what are the reasonable target sets to consider (Sections 3 and 4).
Section 3 shows by means of two examples that the best-in-hindsight expansion cannot be
achieved while its convexification can be attained but is not ambitious enough. Section 4 introduces a general class of achievable and ambitious enough targets: a sort of convexification
of some individual-response-based target set.
The third part of the paper (Section 5) exhibits concrete and computationally efficient
algorithms to achieve the goals discussed in the first part of the paper. The general strategy
of Section 5 amounts to playing a (standard) regret minimization in blocks and modifying
the direction as needed; its performance and merits are then studied in detail with respect
to the literature mentioned above. It bears some resemblance with the approach developed
by Abernethy et al. (2011).
Last but not least, the fourth part of the paper revisits two important problems, for
which dedicated methods were created and dedicated articles were written: regret minimization with global cost functions, and online learning with sample path constraints (Section 6).
We show that our general strategy has stronger performance guarantees in these problems
than the ad hoc strategies that had been constructed by the literature.
2. Setup (“unknown games”), notation, and aim
The setting is the one of (classical) approachability, that is, vector payoffs are considered.
The difference lies in the aim. In (classical) approachability theory, the average rT of the
obtained vector payoffs should converge asymptotically to some target set C, which can be
known to be approachable based on the existence and knowledge of the payoff function r.
In our setting, we do not know whether C is approachable because there is no underlying
payoff function. We then ask for convergence to some α–expansion of C, where α should be
as small as possible.
Setting: unknown game with vectors of vector payoffs. The following game is
repeatedly played between two players, who will be called respectively the decision-maker
(or first player) and the opponent (or second player). Vector payoffs in Rd , where d > 1,
will be considered. The first player has finitely many actions whose set we denote by
A = {1, . . . , A}. We assume A > 2 throughout the paper, to avoid trivialities. The
opponent chooses at each round t ∈ {1, 2, . . .} a vector mt = (mt,a )a∈A of vector payoffs
mt,a ∈ Rd . We impose the restriction that these vectors mt lie in a convex and bounded set
K of (Rd )A . The first player picks at each round t an action at ∈ A, possibly at random
according to some mixed action xt = (xt,a )a∈A ; we denote by ∆(A) the set of all such mixed
actions. She then receives mt,at as a vector payoff. We can also assume that mt,at is the
only feedback she gets on mt and that she does not see the other components of mt than
the one she chose. (This is called bandit monitoring but can and will be relaxed to a full
monitoring as we explain below.)
Remark 1 We will not assume that the first player knows K (or any bound on the maximal
norm of its elements); put differently, the scaling of the problem is unknown.
3
Mannor, Perchet, Stoltz
The terminology of “unknown game” was introduced in the machine learning literature,
see Cesa-Bianchi and Lugosi (2006, Sections 7.5 and 7.11) for a survey. A game is unknown
(to the decision-maker) when she not only does not observe the vector payoffs she would have
received has she chosen a different pure action (bandit monitoring) but also when she does
not even know the underlying structure of the game, if any such structure exists. Section 2.2
will make the latter point clear by explaining how the classical setting of approachability
introduced by Blackwell (1956) is a particular case of the setting described above: some
payoff function r exists therein and the decision-maker knows r. The strategy proposed
by Blackwell (1956) crucially relies on the knowledge of r. In our setting, r is unknown and
even worse, might not even exist. Section 2.3 (and Section A) will recall how a particular
case of approachability known as minimization of the regret could be dealt with for unknown
games.
Formulation of the approachability aim. The decision-maker is interested in controlling her average payoff
T
1X
reT =
mt,at .
T
t=1
She wants it to approach an as small as possible neighborhood of a given target set C, which
we assume to be closed. This concept of neighborhood could be formulated in terms of a
general filtration (see Remark 2 below); for the sake of concreteness we resort rather to
expansions of a base set C in some `p –norm, which we denote by k · k, for 0 < p 6 +∞.
Formally, we denote by Cα the closed α–expansion in `p –norm of C:
Cα = c ∈ Rd : ∃ c0 ∈ C s.t. kc − c0 kp 6 α = c ∈ Rd : dp (c, C) 6 α .
Here and in the sequel, dp ( · , S) denotes the distance in `p –norm to a set S.
As is traditional in the literature of approachability and regret minimization, we consider
the smallest set that would have been approachable in hindsight, that is, had the averages
of the vectors of vector payoffs be known in advance:
mT =
T
1X
mt ,
T
whose components equal
t=1
∀ a ∈ A,
mT,a =
T
1X
mt,a .
T
t=1
This notion of “smallest set” is somewhat tricky and the first part of this article will be
devoted to discuss it. The model we will consider is the following one. We fix a target
function ϕ : K → [0, +∞); it takes mT as argument. (Section 4 will indicate reasonable
such choices of ϕ.) It associates with it the ϕ(mT )–expansion of C. Our aim is then to
ensure the almost-sure convergence
dp reT , Cϕ(mT ) −→ 0
as T → ∞ .
As in the definition of classic approachability, uniformity will be required with respect to
the strategies of the opponent: the decision-maker should construct strategies such that for
all ε > 0, there exists a time Tε such that for all strategies of the opponent, with probability
at least 1 − ε,
sup dp reT , Cϕ(mT ) 6 ε .
T >Tε
4
Approachability in Unknown Games
Remark 2 More general filtrations α ∈ [0, +∞) 7→ Cα could have been considered than
expansions in some norm. By “filtration” we mean that Cα ⊆ Cα0 for all a 6 α0 . For
instance, if 0 ∈ C, one could have considered shrinkages and blow-ups, that is, C0 = {0} and
Cα = α C for α > 0. Or, given some compact set B with non-empty interior, Cα = C + αB
for α > 0. But for the sake of clarity and simplicity, we restrict the exposition to the more
concrete case of expansions of a base set C in some `p –norm.
Summary: the two sources of unknowness. As will become clearer in the concrete
examples presented in Section 6, not only the structure of the game is unknown and might
even not exist (first source of unknownness) but also the target is unknown. This second
source arises also in known games, in the following cases: when some natural target (e.g.,
some best-in-hindsight target) is proven to be unachievable or when some feasible target
is not ambitious enough (e.g., the least approachable uniform expansion of C as will be
discussed in Section 5.2.5). What to aim for, then? Convex relaxations are often considered
more manageable and ambitious enough targets; but we will show that they can be improved
upon in general.
See the paragraph “Discussion” on page 26 for more details on these two sources of
unknownness in the concrete example of global costs.
2.1. Two classical relaxations: mixed actions and full monitoring
We present two extremely classical relaxations of the general setting described above. They
come at no cost but simplify the exposition of our general theory.
The decision-maker can play mixed actions. First, because of martingale convergence results, for instance, the Hoeffding-Azuma inequality, controlling reT is equivalent to
controlling the averages rT of the conditionally expected payoffs rt , where
rt = xt
mt =
X
xt,a mt,a
and
rT =
T
T
1X
1X
rt =
xt
T
T
t=1
a∈A
mt .
t=1
Indeed, the boundedness of K and a component-by-component application of the said inequality ensure that there exists a constant C such that for all ε > 0, for all T > 1, for all
strategies of the opponent, with probability at least 1 − ε,
r
w
w
wreT − rT w 6 C ln(d/ε) .
p
T
Given ε > 0, we use these inequalities each with ε replaced by ε/T 2 : a union bound entails
that choosing Tε > 2 sufficiently large so that
r
ln(dT 2 /ε)
sup C
6 ε,
T
T >Tε
we then have, for all strategies of the opponent, with probability at least 1 − ε,
w
w
sup wreT − rT wp 6 ε .
T >Tε
(1)
Therefore, we may focus on rT instead of reT in the sequel and consider equivalently the
aim (3) discussed below.
5
Mannor, Perchet, Stoltz
The decision-maker can enjoy a full monitoring. Second, the bandit-monitoring
assumption can be relaxed to a full monitoring, at least under some regularity assumptions,
e.g., uniform continuity of the target function ϕ.
Indeed, we assumed that the decision-maker only gets to observe mt,at after choosing the
component at ∈ A of mt . However, standard estimation techniques presented by Auer et al.
(2002) and Mertens et al. (1994, Sections V.5.a and VI.6) provide accurate and unbiased
estimators m
b t of the whole vectors mt , at least in the case when the latter only depends on
what happened in the past and on the opponent’s strategy but not on the decision-maker’s
present1 choice of an action at . The components of these estimators m
b t equal, for a ∈ A,
m
b t,a =
mt,a
I
,
xt,a {a=at }
(2)
with the constraint on mixed actions that xt,a > γt for all t > 1. The decision-maker should
then base her decisions and apply her strategy on m
b t , and eventually choose as a mixed
action the convex combination of the mixed action she would have freely chosen based on
the m
b t , with weight 1 − γt , and of the uniform distribution, with weight γt .
Indeed, by the Hoeffding-Azuma inequality, the averages of the vector payoffs and of
the vectors of vector payoffs based respectively on the mt,a and on the m
b t,a , as well as the
corresponding average payoffs obtained by the decision-maker, differ by something of the
order of
v
u T
T
u
X
X
p
1 t
1
+
γt ln(1/ε)
2
T
γ
t=1 t
t=1
for each T with probability at least 1 − ε, and uniformly over the opponent’s strategies.
These differences vanish as T → ∞, e.g., at a T −2/3 rate when the γt are of the order of
t−1/3 . A treatment similar to the one performed to obtain (1) can also be applied to obtain
statements with uniformities both with respect to time T > Tε and to the strategies of
opponent.
Because our aim involves the average payoffs mT via the target function ϕ as in Cϕ(mT ) ,
we require the uniform continuity of ϕ for technical reasons, i.e., to carry over the negligible differences between the average payoffs and their estimation in the approachability
aim. (This assumption of uniform continuity can easily be dropped based on the result of
Theorem 11; details are omitted.)
Conclusion: approachability aim. The decision-maker, enjoying a full monitoring,
should construct a strategy such that almost surely and uniformly over the opponent’s
strategies,
dp rT , Cϕ(mT ) −→ 0
as T → ∞ ;
(3)
that is, for all ε > 0, there exists Tε > 0 such that for all strategies of the opponent, with
probability at least 1 − ε,
sup dp rT , Cϕ(mT ) 6 ε .
T >Tε
1. However, such a dependency can still be dealt with in some cases, see, e.g., the case of regret minimization
in Section 2.3 (and Section A): when the dependency on the decision-maker’s present action at comes
only through an additive term equal to the obtained payoff, which is known.
6
Approachability in Unknown Games
We note that we will often be able to provide stronger, uniform and deterministic controls,
of the form: there exists a function ζ : {1, 2, 3, . . .} → [0, +∞) such that ζ(T ) → 0 and for
all strategies of the opponent,
dp rT , Cϕ(mT ) 6 ζ(T ) .
To conclude this section, we point out again that the two relaxations considered come at
no cost in the generality of setting: they are only intended to simplify and clarify the
exposition. Full details of this standard reduction from the case of bandit monitoring to full
monitoring are omitted because they are classical, though lengthy and technical, to expose.
2.2. Link with approachability in known finite games
We link here our general setting above with the classical setting considered by Blackwell
(1956). Therein the decision-maker and the opponent have finite sets of actions A and B,
and choose at each round t respective pure actions at ∈ A and bt ∈ B, possibly at random
according to some mixed actions xt = (xt,a )a∈A ∈ ∆(A) and yt = (yt,b )b∈B ∈ ∆(B). A
payoff function r : A × B → Rd is given and is multilinearly extended to ∆(A) × ∆(B)
according to
XX
∀ (x, y) ∈ ∆(A) × ∆(B),
r(x, y) =
xa yb r(a, b) .
a∈A b∈B
From the decision-maker viewpoint, the game takes place as if the opponent was choosing
at each round the vector of vector payoffs
mt = r( · , bt ) = r(a, bt ) a∈A .
A target set C is to be approached, that is, the convergence
reT =
T
1X
r(at , bt ) −→ C
T
a.s.
t=1
should hold uniformly over the opponent’s strategies. (Of course, as recalled above, we can
equivalently require the uniform convergence of rT to C.)
A necessary and sufficient condition for this when C is closed and convex is that for all
y ∈ ∆(B), there exists some x ∈ ∆(A) such that r(x, y) ∈ C. Of course, this condition,
called the dual condition for approachability, is not always met. However, in view of the
dual condition, the least approachable α–expansion in `p –norm of such a non-empty, closed,
and convex set C is given by
αunif = max min dp r(x, y), C .
(4)
y∈∆(B) x∈∆(A)
Approaching Cαunif corresponds to considering the constant target function ϕ ≡ αunif in (3).
Better (uniformly smaller) choices of target functions exist, as will be discussed in Section 5.2.5. This will be put in correspondence therein with what is called “opportunistic
approachability.”
7
Mannor, Perchet, Stoltz
The knowledge of r is crucial (a first strategy). The general strategies used to
approach C (or Cαunif when C is not approachable and p = 2) rely crucially on the knowledge
of r.
Indeed, the original strategy of Blackwell (1956) proceeds as follows: at round t + 1, it
first computes the projection e
ct of ret onto C. Then it picks at+1 at random according to a
mixed action xt+1 such that
ret − e
ct , r(xt+1 , y) − e
ct 6 0 .
∀ y ∈ ∆(B),
(5)
When C is approachable, such a mixed action always exists; one can take, for instance,
xt+1 ∈ arg min max ret − e
ct , r(x, y) .
x∈∆(A) y∈∆(B)
In general, the strategy thus heavily depends on the knowledge of r.
When C is not approachable and p = 2, the set Cαunif is the target and the choice right
above is still suitable to approach Cαunif in `2 –norm. Indeed, the projection det of ret onto
Cαunif is such that ret − det is proportional to ret − e
ct , thus
arg min max ret − e
ct , r(x, y) = arg min max ret − det , r(x, y) .
x∈∆(A) y∈∆(B)
x∈∆(A) y∈∆(B)
The knowledge of r is crucial (a second strategy). There are other strategies to
perform approachability in known finite games, though the one described above may be the
most popular one. For instance, Bernstein and Shimkin (2015) propose a strategy based on
the√dual condition for approachability, which still performs approachability at the optimal
1/ T rate. We discuss it in greater details and generalize it to the case of unknown games
in Section 5.2. For now, we describe it shortly only to show how heavily it relies on the game
r being known. Assume that C is approachable. At round t = 1, choose an arbitrary mixed
action x1 to draw a1 and choose an arbitrary mixed action ye1 ∈ B. For rounds t + 1, assume
that mixed actions ye1 , . . . , yet ∈ ∆(B) have been chosen by the decision-maker in addition to
the pure actions b1 , . . . , bt actually played
by the opponent, and that corresponding mixed
actions x
e1 , . . . , x
et such that r x
es , yes ∈ C have been chosen as well. Denoting
δt =
t
X
τ =1
r(aτ , bτ ) −
the strategy selects
xt+1 ∈ arg min max hδt , r(x, y)i
x∈∆(A) y∈∆(B)
and
t
X
τ =1
r x
eτ , yeτ ,
yet+1 ∈ arg max min hδt , r(x, y)i ,
y∈∆(B) x∈∆(A)
et+1 exists since C is
as well as x
et+1 ∈ ∆(A) such that r x
et+1 , yet+1 ∈ C, where such an x
approachable. Thus, it is crucial that the strategy knows r; however, that C be approachable
is not essential: in case it is not approachable and Cαunif is to be approached instead, it
suffices to pick
x
es ∈ arg min dp r x, yes , C ,
x∈∆(A)
so that r x
es , yes ∈ Cαunif . Any `p –norm is suitable for this argument.
8
Approachability in Unknown Games
2.3. Link with regret minimization in unknown games
The problem of regret minimization can be encompassed as an instance of approachability.
For the sake of completeness, we recall in Appendix A why the knowledge of the payoff
structure is not crucial for this very specific problem. This, of course, is not the case at all
for general approachability problems.
3. Two toy examples to develop some intuition
The examples presented below will serve as guides to determine suitable target functions
ϕ : K → [0, +∞), that is, target functions for which the convergence (3) can be guaranteed
and that are ambitious (small) enough, in a sense that will be made formal in the next
section.
Example 1: minimize several costs at a time. The following example is a toy modeling of a case when the first player has to perform several tasks simultaneously and incurs
a loss (or a cost) for each of them; we assume that her overall loss is the worst (the largest)
of the losses thus suffered.
For simplicity, and because it will be enough for our purpose, we will assume that the
decision-maker only has two actions, that is, A = {1, 2}, while the opponent is restricted to
only pick convex combinations of the following vectors of vector payoffs:
and
†
m =
m†a a∈{1,2}
]
m]a a∈{1,2}
m =
∈R
2×2
2×2
∈R
with
m†1
with
m]1
=
3
4
=
4
3
and
m†2
and
m]2
=
0
5
,
=
5
0
.
The opponent’s actions can thus be indexed by ν ∈ [0, 1], where the latter corresponds to
the vector of vectors
m(ν) = νm† + (1 − ν)m] ∈ R2×2 .
The base target set C is the negative orthant C = (−∞, 0]2 and its α–expansions in
the supremum norm (p = +∞) are Cα = (−∞, α]2 . A graphical representation of these
expansions and of the vectors m† and m] is provided in Figure 1.
Example 2: control absolute values. In this example, the decision-maker still has only
two actions, A = {1, 2}, and gets scalar rewards, i.e., d = 1. The aim is to minimize the
absolute value of the average payoff, i.e., to control the latter from above and from below
(for instance, because these payoffs measure deviations in either direction from a desired
situation).
Formally, the opponent chooses vectors mt ∈ R2 , which we assume to actually lie in
K = [−1, 1]2 . The product
is then simply the standard inner product over R2 . We
consider C = {0} as a base target set to be approached. Its expansions (in any `p –norm)
are C = [−α, α], for α > 0.
9
5 − 5ν
?
ϕ (ν) = min αx (ν) = min α0 (ν), α1 (ν) =
x∈[0,1]
5ν
3 + ν
Mannor, Perchet, Stoltz
if ν ∈ [1/4, 1/2],
if ν ∈ [1/2, 3/4],
if ν ∈ [3/4, 1].
This last set of equalities can be seen to hold true by contemplating Figure 2.
m†
5
αx
4
ϕ?
m]
C
C2.5
2.5
m]
m†
C4
Figure 1: Graphical
of m† and m]ofand
different
.
Figurerepresentation
2: Graphical representation
m† of
and
m] , andexpansions
of differentCαexpansions
Cα (left); graph
?
of the functions ϕ (bold solid line), of α0 and α1 (dotted lines), and of some αx , fo
x ∈ [0, 1] (thin solid line).
3.1. The smallest set in hindsight cannot be achieved in general
We denote by ϕ? : K → [0, +∞) the function that associates with a vector of vector payoffs
Proof
[of Lemma
4] Assume
contradiction
that ϕ?combination
is achievableofinitsthe above example an
m ∈ K the index of the
smallest
`p –expansion
of Cbycontaining
a convex
consider any strategy of the decision maker to do so, which we denote by σ. Imagine in a first tim
components:
that Nature chooses, at every stage t > 1,othe vectors mt = m† , which amounts to playing νt =
n
?
ϕ (m) = min Given
α > 0that
: the
∃ x average
∈ ∆(A)ofs.t.
m ∈ CναT =
= 1 min
dp (x
m, C)
(6) ϕ? (1) = 4, the ai
thexνt equals
and that
its image
by, ϕ? equals
x∈∆(A)
is then to converge to C4 . But this can only be guaranteed if the average of the chosen xt converge
the infimum being achieved
byis,continuity.
This
defines
function
x? : large, integer Tε such that
to 1. That
given ε > 0,
there
exists asome,
possibly
∀ m ∈ K,
∃ x? (m) ∈ ∆(A) :
x? (m) m ∈3 Cϕ? (m) .
rTε −
6 ε.
(21
4
?
∞
Lemma 3 In Examples 1 and 2, the convergence (3) cannot be achieved for ϕ against all
strategies of the opponent.
Now, consider a second scenario. During the first Tε stages, Nature chooses the vectors mt = m
By construction, as σ is fixed, (21) is ensured. Now, for the next Tε stages, for Tε + 1 6 t 6 2T
The proofs (located in Appendix B.1) reveal thatthe difficulty ]in (3) is that it should
assume that Nature chooses the vectors mt = m , and denote by γ ∈ [0, 1] the average of th
hold along a whole path, while the value of ϕ? mT can change
more rapidly than the
x ∈ [0, 1] selected by σ. The average of the played vectors is m2Tε corresponds to ν = 1/2, whos
average payoff vectors trT do. ?
image by ϕ equals ϕ? (1/2) = 5/2. Therefore the target set is C2.5 . However, by definition of γ
They will formalize the following proof scheme. To accommodate a first situation,
which
we have
lasts a large number T 0 of stages, the decision-maker should play in a given way; but then,
is she
2Tε from where the decision-maker
X
the opponent changes drastically his 1strategy1 and
1
1
4
5
]
rTε +
x0 t. The
m situation
= rTε +is repeated.
γ
+ (1 − γ)
ε =
cannot catch up and is far fromr2T
the
target
at
stage
2T
3
0
2
2
2
2
t=Tε +1
1
1
5−γ
3.2. A concave relaxation is not ambitious enough
= rTε +
,
3γ
2
2
A classical relaxation in the game-theory literature for unachievable targets (see, e.g., how
Mannor et al., 2009 proceed) is to consider concavifications. Can the convergence (3) hold
23
with ϕ = cav[ϕ? ], the concavification of ϕ? ? The latter is defined as the least concave
function K → [0, +∞] above ϕ? . The next section will show that it is indeed always the
case but we illustrate on our examples why such a goal is not ambitious enough. (The proof
of the lemma below can be found in Appendix B.2.)
Lemma 4 In Examples 1 and 2, the decision-maker has a mixed action (x, 1 − x) that
she can play at each round to ensure the convergence (3) for a target function ϕx that is
uniformly smaller than ϕ? , and even strictly smaller at some points.
10
Approachability in Unknown Games
4. A general class of ambitious enough target functions
The previous section showed on examples that the best-in-hindsight target function ϕ? was
too ambitious a goal while its concavification cav[ϕ? ] seemed not ambitious enough. In this
section, based on the intuition given by the formula for concavification, we provide a whole
class of achievable target functions, relying on a parameter: a response function Ψ.
In the definition below, by uniformity over strategies of the opponent player, we mean
the uniform convergence stated right after (3). We denote by Gϕ the graph of the set-valued
mapping m ∈ K 7→ Cϕ(m) :
n
o
Gϕ = (m, r) ∈ K × Rd s.t. r ∈ Cϕ(m) ⊂ (Rd )A × Rd .
Definition 5 A continuous target function ϕ : K → [0, +∞) is achievable if the decisionmaker has a strategy ensuring that, uniformly over all strategies of the opponent player,
dp rT , Cϕ(mT ) −→ 0
as T → ∞ .
(7)
More generally, a (possibly non-continuous) target function ϕ : K → [0, +∞) is achievable
if Gϕ is approachable for the game with payoff function (x, m) ∈ ∆(A) × K 7→ (m, x m),
that is, if uniformly over all strategies of the opponent player,
(mT , rT ) −→ Gϕ
as T → ∞ .
(8)
We always have that (7) entails (8), with or without continuity of ϕ. The condition (8)
is however less restrictive in general and it is useful in the case of non-continuous target
functions (e.g., to avoid lack of convergence due to errors at early stages). But for continuous
target functions ϕ, the two definitions (7) and (8) are equivalent. We prove these two facts
in Section C.1 in the appendix.
The defining equalities (6) for ϕ? show that this function is continuous (it is even a
Lipschitz function with constant 1 in the `p –norm). We already showed in Section 3.1 that
the target function ϕ? is not achievable in general.
To be able to compare target functions, we consider the following definition and notation.
Definition 6 A target function ϕ : K → [0, +∞) is strictly smaller than another target
function ϕ0 if ϕ 6 ϕ0 and there exists m ∈ K with ϕ(m) < ϕ0 (m). We denote this fact by
ϕ ≺ ϕ0 .
For instance, in Lemma 4, we had ϕx ≺ ϕ? .
4.1. The target function cav[ϕ? ] is always achievable
We show below that the target function cav[ϕ? ] is always achievable... But of course,
Section 3.2 already showed that cav[ϕ? ] is not ambitious enough: in Examples 1 and 2,
there exist easy-to-construct achievable target functions ϕ with ϕ ≺ cav[ϕ? ]. We however
provide here a general study of the achievability of cav[ϕ? ] as it sheds light on how to achieve
more ambitious target functions.
So, we now only ask for convergence of (mT , rT ) to the convex hull of Gϕ? , not to
Gϕ? itself. Indeed, this convex hull is exactly the graph Gcav[ϕ? ] , where cav[ϕ? ] is the
11
Mannor, Perchet, Stoltz
concavification of ϕ? , defined as the least concave function K → [0, +∞] above ϕ? . Its
variational expression reads
X
X
cav[ϕ? ](m) = sup
λi ϕ? (mi ) : N > 1 and
λi mi = m ,
(9)
i6N
i6N
for all m ∈ K, where the supremum is over all finite convex decompositions of m as elements
of K (i.e., the mi belong to K and the λi factors are nonnegative and sum up to 1). By a
theorem of Fenchel and Bunt (see Hiriart-Urruty and Lemaréchal, 2001, Theorem 1.3.7) we
could actually further impose that 1 6 N 6 dA + 1. In general, cav[ϕ? ] is not continuous;
it is however so when, e.g., K is a polytope.
Lemma 7 The target function cav[ϕ? ] is always achievable.
Proof sketch; when K is known When the decision-maker knows K (and only in this
case), she can compute cav[ϕ? ] and its graph Gcav[ϕ? ] . As indicated after Definition 5,
it suffices to show that the convex set Gcav[ϕ? ] is approachable for the game with payoffs
(x, m) ∈ ∆(A) × K 7→ (m, x m); the decision-maker should then play any strategy approaching Gcav[ϕ? ] . Note that ϕ? is continuous, that Gϕ? is thus a closed set, and that
Gcav[ϕ? ] is a closed convex set containing Gϕ? . Now, the characterization of approachability
by Blackwell (1956) for closed convex sets (recalled already in Section 2.2) states that for
all m ∈ K, there should exist x ∈ ∆(A) such
that (m, x m) ∈ Gcav[ϕ? ] . But by the
definition (6), we even have m, x? (m) m ∈ Gϕ? , which concludes the proof.
We only proved Lemma 7 under the assumption that the decision-maker knows K, a
restriction which we are however not ready to consider as indicated in Remark 1. Indeed,
she needs to know K to compute Gϕ? and the needed projections onto this set to implement
Blackwell’s approachability strategy. Some other approachability strategies may not require
this knowledge, e.g., a generalized version of the one of Bernstein and Shimkin (2015) based
on the dual condition for approachability (see Section 2.2 for their original version, see
Section 5.2.4 for our generalization).
But anyway, we chose not to go into these details now because at least in the case
when C is convex, Lemma 7 will anyway follow from Lemmas 8 and 10 (or Theorem 11)
below, which are proved independently and wherein no knowledge of K is assumed2 . Even
better, they prove the strongest notion of convergence (7) of Definition 5, irrespectively of
the continuity or lack of continuity of cav[ϕ? ].
4.2. An example of a more ambitious target function
By (6) we can rewrite (9) as
X
cav[ϕ? ](m) = sup
λi dp x? (mi )
i6N
mi , C : N > 1 and
X
i6N
λi mi = m
.
2. Indeed, the functions x? and ϕ? at hand therein are independent of K as they are defined for each m ∈ K
as the solutions of some optimization program that only depends on this specific m and on C, but not
on K.
12
Approachability in Unknown Games
Now, whenever C is convex, the function dp ( · , C is convex as well over Rd ; see, e.g., Boyd
?
and Vandenberghe (2004, Example 3.16). Therefore, denoting by ϕx the function defined
as
!
X
X
?
ϕx (m) = sup dp
λi x? (mi ) mi , C : N > 1 and
λi mi = m
(10)
i6N
i6N
?
for all m ∈ K, we have ϕx 6 cav[ϕ? ]. The two examples considered in Section 3.2 actually
show that this inequality can be strict at some points. We summarize these facts in the
?
lemma below, whose proof can be found in Appendix B.3. That ϕx is achievable is a special
?
case of Lemma 10 stated in the next subsection, where a class generalizing the form of ϕx
will be discussed.
?
Lemma 8 The inequality ϕx 6 cav[ϕ? ] always holds when C is convex. For Examples 1
?
and 2, we even have ϕx ≺ cav[ϕ? ].
4.3. A general class of achievable target functions
The class is formulated by generalizing the definition (10): we call response function any
function Ψ : K → ∆(A) and we replace in (10) the specific response function x? by any
response function Ψ.
Definition 9 The target function ϕΨ based on the response function Ψ is defined, for all
m ∈ K, as
X
X
ϕΨ (m) = sup dp
λi Ψ(mi ) mi , C : N > 1 and
λi mi = m .
(11)
i6N
i6N
Lemma 10 For all response functions Ψ, the target functions ϕΨ are achievable.
The lemma actually follows from Theorem 11 below, which provides an explicit and efficient strategy to achieve any ϕΨ , in the stronger sense (7) irrespectively of the continuity
or lack of continuity of ϕΨ . For now, we provide a sketch of proof (under an additional
assumption of Lipschitzness for Ψ) based on calibration, because it further explains the
intuition behind (11). It also advocates why the ϕΨ functions are reasonable targets: resorting to some auxiliary calibrated strategy outputting accurate predictions m̂t (in the
sense of calibration) of the vectors mt almost amounts to knowing in advance the mt . And
with such a knowledge, what can we get?
Proof sketch; when Ψ is a Lipschitz function We will show below that there exists
a constant L0 ensuring the following: given any δ > 0, there exists randomized strategy of
the decision-maker such that for all ε > 0, there exists a time Tε such that for all strategies
of the opponent, with probability at least 1 − ε,
a.s.
(12)
sup dp rT , CϕΨ (mT ) 6 L0 (δ + ε)
T >Tε
13
Mannor, Perchet, Stoltz
In terms of approachability theory (see, e.g., Perchet, 2014 for a survey), this means that
GϕΨ is in particular an L0 δ–approachable set for all δ > 0, thus a 0–approachable set. But 0–
approachability and approachability are two equivalents notions (a not-so-trivial fact when
the sets at hand are not closed convex sets). That is, GϕΨ is approachable, or put differently,
ϕΨ is achievable.
Indeed, fixing δ > 0, there exists a randomized strategy picking predictions m
b t among
[j]
finitely many elements m ∈ K, where j ∈ {1, . . . , Nδ } so that the so-called calibration
score is controlled: for all ε > 0, there exists a time Tε such that for all strategies of the
opponent, with probability at least 1 − ε,
w
Nδ w
T
X
w1 X
I
sup
w
m
b t =m[j]
wT
T >Tε
j=1
t=1
w
w
w
m
b t − mt w
w
6δ+ε
a.s.;
(13)
p
see3 Foster and Vohra (1998). Now, the main strategy, based on such an auxiliary calibrated
strategy, is to play Ψ(m
b t ) at each round. The average payoff of the decision-maker is thus
rT =
T
1X
Ψ m
bt
T
mt .
t=1
We decompose it depending on the predictions m
b t made: for each j ∈ {1, . . . , Nδ }, the av[j]
erage number of times m was predicted and the average vectors of vector payoffs obtained
on the corresponding rounds equal
bj,T
λ
T
1X
=
I
m
b t =m[j]
T
and
t=1
m
b
j,T
=
PT
t=1 mt I m
b t =m[j]
PT
t=1 I m
b t =m[j]
j,T
bj,T > 0, otherwise, we take an arbitrary value for m
whenever λ
b . In particular,
mT =
Nδ
X
j=1
j,T
bj,T m
λ
b
rT =
and
Nδ
X
j=1
bj,T Ψ m[j]
λ
j,T
m
b
.
Using this convex decomposition of mT in terms of elements of K, the very definition of ϕΨ
leads to
Nδ
j,T
X
j,T
bj,T Ψ m
λ
b
m
b
∈ CϕΨ (mT ) ,
j=1
3. Actually, the latter reference only considers the case of calibrated predictions of elements in some simplex,
but it is clear from the method used in Mannor and Stoltz (2010) — a reduction to a problem of
approachability — that this can be performed for all subsets of compact sets, such as K here, with the
desired uniformity over the opponent’s strategies; see also Mannor et al. (2014, Appendix B). The result
holds for any `p –norm by equivalence of norms on vector spaces of finite dimension, even if the original
references considered the `1 or `2 –norms only.
14
Approachability in Unknown Games
hence
dp rT , CϕΨ (mT )
w
w
w
w
Nδ
j,T
X
w
j,T w
b
w
6 wrT −
λj,T Ψ m
b
m
b w
w
w
w
j=1
p
w
wX
Nδ
j,T
w
bj,T Ψ m[j] − Ψ m
b
=w
λ
w
w j=1
w
w
j,T w
m
b w
w .
w
p
We denote by Bp,max a bound on the maximal `p –norm of an element in the bounded set
K. A triangular equality shows that
w
w
wX
w
Nδ
j,T
j,T w j,T w
X
X
w Nδ
j,T w
w
w
[j]
bj,T Ψ m[j] − Ψ m
bj,T
w
w 6
b
m
b
m
b
ba w
λ
λ
Ψ
m
−
Ψ
wm
w
w
a
a
p
w j=1
w
j=1
a∈A
p
6 Bp,max
Nδ
X
j=1
bj,T
λ
X
Ψ m[j]
a∈A
j,T
m
b
−
Ψ
a
a
where ψ(m)a refers to the probability mass put on a ∈ A by ψ(m). As indicated above,
we assume for this sketch of proof that Ψ is a Lipschitz function, with Lipschitz constant L
with respect to the `1 –norm over ∆(A) and the `p –norm over K. We get
Bp,max
Nδ
X
j=1
bj,T
λ
X
a∈A
Ψ m
[j]
j,T
m
b
−
Ψ
a
a
6 Bp,max L
Nδ
X
j=1
w
w
j,T w
w [j]
b
b w
λj,T wm − m
p
w
Nδ w
T
X
w1 X
= Bp,max L
I
w
m
b t =m[j]
wT
j=1
t=1
w
w
w
m
b t − mt w .
w
p
Substituting (13), we proved (12) for L0 = Bp,max L, which concludes the proof.
4.4. Some thoughts on the optimality of target functions
The previous subsections showed that target functions of the form ϕΨ were achievable,
unlike the best-in-hindsight target function ϕ? , and that they were more ambitious than
the concavification cav[ϕ? ]. The question of their optimality can be raised — a question to
which we will not be able to answer in general. Our thoughts are gathered in Appendix D.
5. A strategy by regret minimization in blocks
In this section we exhibit a strategy to achieve the stronger notion of convergence (7) with
the target functions ϕΨ advocated in Section 4.3, irrespectively of the continuity or lack of
continuity of ϕΨ . The algorithm is efficient, as long as calls to Ψ are (a full discussion of
the complexity issues will be provided for each application studied in Section 6).
15
Mannor, Perchet, Stoltz
5.1. Description and analysis of the strategy
As in Abernethy et al. (2011), the considered strategy — see Figure 2 — relies on some
auxiliary regret-minimizing strategy R, namely, a strategy with the following property.
Assumption 1 The strategy R sequentially outputs mixed actions ut ∈ ∆(A) such that
for all ranges B > 0 (not necessarily known in advance), for all T > 1 (not necessarily
known in advance), for all sequences of vectors m0t ∈ RA of one-dimensional payoffs lying
in the bounded interval [−B, B], possibly chosen online by some opponent player, where
t = 1, . . . , T ,
T
T
X
X
√
max
u m0t 6 4B T ln A +
ut m0t .
u∈∆(A)
t=1
t=1
Note in particular that the auxiliary strategy R automatically adapts to the range B of
the payoffs and to the number of rounds T , and has a sublinear worst-case guarantee. (The
adaptation to B will be needed because K is unknown.) Such auxiliary strategies indeed
exist, for instance, the polynomially weighted average forecaster of Cesa-Bianchi
and Lugosi
√
(2003). Other ones with a possibly larger constant factor in front of the B T ln A term also
exist, for instance, exponentially weighted average strategies with learning rates carefully
tuned over time, as described by Cesa-Bianchi et al. (2007) or de Rooij et al. (2014).
For the sake of elegance (but maybe at the cost of not providing all the intuitions that
led us to this result), we only provide in Figure 2 the time-adaptive version of our strategy,
which does not need to know the time horizon T in advance. The used blocks are of
increasing lengths 1, 2, 3, . . .. Simpler versions with
√ fixed block length L would require a
tuning of L in terms of T (pick L of the order of T ) to optimize the theoretical bound.
Theorem 11 For all response functions Ψ, the strategy of Figure 2 is such that for all
T > 1, for all strategies of the opponent, there exists cT ∈ CϕΨ (mT ) ensuring
w
w
wrT − cT w 6 10 T −1/4 ln A + 3B2,max T −1/2 ,
(14)
2
where B2,max = max kmk2 is the maximal Euclidean norm of elements in K.
m∈K
In particular, denoting by κp a constant such that k · kp 6 κp k · k2 , for all T > 1 and
all strategies of the opponent,
dp rT , CϕΨ (mT ) 6 κp 10 T −1/4 ln A + 3B2,max T −1/2 .
(15)
Remark 12 With the notation of Figure 2, denoting in addition by nT the largest integer
such that nT (nT + 1)/2 6 T , by
mpart. =
1
T − nT (nT + 1)/2
T
X
mt
t=nT (nT +1)/2+1
the partial average of the vectors of vector payoffs mt obtained during the last and (nT +1)–th
block when nT (nT + 1)/2 < T (and an arbitrary element of K otherwise), we can take
!
nT
1 X
nT (nT + 1)
(k)
(k)
part.
part.
cT =
kΨ m
m + T−
Ψ m
m
.
(16)
T
2
k=1
16
Approachability in Unknown Games
Parameters: a regret-minimizing strategy R (with initial action u1 ) and a response function
Ψ : K → ∆(A)
Initialization: play x1 = u1 and observe m1 ∈ (Rd )A ; this is block n = 1
For blocks n = 2, 3 . . .,
1. compute the total discrepancy δn at the beginninga of block n (that is, till the end of
block n − 1),
n(n−1)/2
δn =
X
t=1
where
m(k)
xt
mt −
n−1
X
k=1
k
1X
=
mk(k−1)/2+t
k t=1
k Ψ m(k)
m(k) ∈ Rd ,
is the average vector of vector payoffs obtained in block k ∈ {1, . . . , n − 1};
2. run a fresh instance Rn of R for n rounds as follows: set un,1 = u1 ; then, for t = 1, . . . , n,
(a) play xn(n−1)/2+t = un,t and observe mn(n−1)/2+t ∈ (Rd )A ;
(b) feed Rn with the vector payoff m0n,t ∈ RA with components given, for a ∈ A, by
m0n,t,a = −hδn , mn(n−1)/2+t,a i ∈ R,
where h · , · i denotes the inner product in Rd ;
(c) obtain from Rn a mixed action un,t+1 .
a. Block n starts at round 1 +
n(n + 1)
n(n − 1)
, is of length n, thus lasts till round
.
2
2
Figure 2: The proposed strategy, which plays in blocks of increasing lengths 1, 2, 3, . . .
Important comments on the result. The strategy itself does not rely on the knowledge
of K, as promised in Remark 1; only its performance bound does, via the B2,max term. Also,
the convexity of C is not required. The convergence rates are independent of the ambient
dimension d.
Concerning the norms, even if the strategy and its bound (14) are based on the Euclidean
norm, the set CϕΨ (mT ) is defined in terms of the `p –norm as in (11). The constant κp exists
by equivalence of the norms on a finite-dimensional space.
Finally, we note that we obtained the uniformity requirement
stated after (3) in the
deterministic form with a function ζ where ζ(T ) = O T −1/4 .
Proof The convergence (15) follows from the bound (14) via the equivalence between `p –
and `2 –norms. That the stated cT in (16) belongs to CϕΨ (mT ) , where the latter set is defined
in terms of the `p –norm as in (11), is by construction of ϕΨ as a supremum. It thus suffices
to prove (14) with the cT defined in (16), which we do by induction.
The induction is on the index n > 1 of the blocks, and the quantities to control are the
squared Euclidean norms of the discrepancies at the end of these blocks, kδn+1 k22 . (We recall
17
Mannor, Perchet, Stoltz
that δn+1 denotes the discrepancy at the end of block n.) We have that δ2 is a difference
2
between two elements of K, thus that kδ2 k22 6 4B2,max
.
We use a self-confident approach: we consider a function β : {1, 2, . . .} → [0, +∞) to be
defined by the analysis and assume that we have proved that our strategy is such that for
some n > 1 and for all sequences of vectors of vector payoffs mt ∈ K, possibly chosen by
some opponent (i.e., for all strategies of the opponent),
w
w2
wn(n+1)/2
w
n
X
X
w
w
2
(k)
(k) w
w
kδn+1 k2 = w
xt mt −
kΨ m
m w 6 β(n) .
w t=1
w
k=1
2
2
4B2,max
.
For instance, we define β(1) =
We then study what we can guarantee for n + 2. We have
w
w2
w
w
(n+1)(n+2)/2
X
w
w
2
(n+1)
(n+1)
w
kδn+2 k2 = w
xt mt − (n + 1) Ψ m
m
wδn+1 +
w
w
w
t=n(n+1)/2+1
2
+
*
(n+1)(n+2)/2
X
m(n+1)
= kδn+1 k22 + 2 δn+1 ,
xt mt − (n + 1) Ψ m(n+1)
t=n(n+1)/2+1
w
w (n+1)(n+2)/2
X
w
+w
xt
w
wt=n(n+1)/2+1
mt − (n + 1) Ψ m(n+1)
w2
w
w
(n+1) w
m
w .
w
(17)
2
2
1)2 B2,max
,
We upper bound the two squared norms by β(n) and 4(n +
respectively. Using
(n+1)
(n+1)
, the inner product can be rewritten, with the
the short-hand notation u
=Ψ m
notation of Figure 2, as
*
+
(n+1)(n+2)/2
X
δn+1 ,
xt mt − (n + 1) Ψ m(n+1)
m(n+1)
t=n(n+1)/2+1
=−
n+1
X
t=1
un+1,t
m0n+1,t +
n+1
X
u(n+1)
m0n+1,t (18)
t=1
Now, the Cauchy–Schwarz inequality indicates that for all a and t,
p
m0n+1,t,a 6 kδn+1 k2 kmn(n+1)/2+t,a k2 6 B2,max β(n) ,
where we used again the induction hypothesis.
Assumption
1 therefore indicates that the
p
p
quantity (18) can be bounded by 4B2,max β(n) (n + 1) ln A.
Putting everything together, we have proved that the induction holds provided that
β(n + 1) is defined, for instance, as
p
p
2
β(n + 1) = β(n) + 8B2,max β(n) (n + 1) ln A + 4B2,max
(n + 1)2 .
√
2
By the lemma in Appendix C.2 (taking γ1 = 4B2,max ln A and γ2 = 4B2,max
), we thus get
first
√
2
∀ n > 1, β(n) 6 32 B2,max
(ln A) n3 ,
then
∀ n > 1, kδn+1 k2 6 B2,max 32 n3 ln A .
18
Approachability in Unknown Games
It only remains to relate the quantity at hand in (14) and (16) to the δn+1 . By separating
time till the end of the nT –block and starting from the beginning of block nT + 1 (should
the latter start strictly before T ), we get
T
1X
rT − cT =
xt
T
t=1
=
1
mt −
T
1
1
δnT +1 +
T
T
nT
X
(k)
kΨ m
k=1
T
X
t=nT (nT +1)/2+1
(k)
m
xt − Ψ mpart.
nT (nT + 1)
+ T−
2
Ψ m
part.
part.
m
mt .
The second sum contains at most nT elements, as the (nT + 1)-th regime is incomplete. A
triangular inequality thus shows that
q
1
nT
1
nT
krT − cT k2 6 kδnT +1 k2 + 2B2,max
6 B2,max 32 n3T ln A + 2B2,max
T
T
T
T
−1/4
−1/2
6 10 T
ln A + 3B2,max T
,
√
where we used the inequality nT (nTp
+ 1)/2 6 T , its implication nT 6 2T , as well as (for
√
the sake of readability) the bounds 32 × 23/2 < 10 and 2 2 < 3.
5.2. Discussion
In this section we gather comments, remarks, and pointers to the literature. We discuss
in particular the links and improvements over the concurrent (and independent) works
by Bernstein and Shimkin (2015) and Azar et al. (2014).
5.2.1. Do we have to play in blocks? Is the obtained T −1/4 rate optimal?
Our strategy proceeds in blocks, unlike the ones exhibited for the case of known games, as
the original strategy by Blackwell (1956) or the more recent one by Bernstein and Shimkin
(2015), see Section 2.2. The calibration-based strategy considered in the proof of Lemma 10
also performed some grouping, according to the finitely many possible values of the predicted
vectors of vector payoffs. This is because the target set to approach is unknown: the
decision-maker approaches a sequence of expansions of this set, where the sizes ϕΨ (mT ) of
the expansions vary depending on the sequence of realized averages mT of vectors of vector
payoffs. When an approachable target set C is given, the strategies, e.g., by Blackwell (1956)
or Bernstein and Shimkin (2015), do not need to perform any grouping.
Actually, it is easy to prove that the following quantity, which involves no grouping in
rounds, cannot be minimized in general:
krT −
where
c0T
c0T kp
T
1X
=
xt
T
T
1X
=
Ψ(mt )
T
t=1
mt .
t=1
19
T
1X
mt −
Ψ(mt )
T
t=1
mt
(19)
p
(20)
!
Mannor, Perchet, Stoltz
Indeed, consider a toy case where the mt = (gt,a )a∈A have scalar components gt,a ∈ R,
the negative orthant C = (−∞, 0] is to be approached, whose expansions
are given by
Cα = (−∞, α], for α > 0. Considering the response function Ψ (ga )a∈A ∈ arg maxa∈A ga ,
we see that (19) boils down to controlling
T
T
1 XX
1X
max
ga0 ,t ,
xt,a gt,a −
T
T
a0t ∈A t
t=1 a∈A
t=1
which is impossible4 . This is in contrast with the regret (38), which can be minimized.
The most severe issue here is not really the absolute value taken, but the fact that we
are comparing the decision-maker’s payoff to the sum of the instantaneous maxima of the
payoffs ga,t , instead of being interesting in the maximum of their sums as in (38).
So, the answer to the first question would be: yes, we have to play in blocks. Given
that, is the obtained T −1/4 rate optimal? We can answer this question in the positive
by considering the same toy case as above. With this example, the bound (14) given the
definition (16) of cT rewrites
k(k+1)/2
nT
T
T
X
X
1 XX
1 X
xt,a gt,a −
max
gt,a0k + 0 max
gt,a0k ,
T
T
a0k ∈A
an +1 ∈A
T
t=1 a∈A
k=1
t=k(k−1)/2+1
t=nT (nT −1)/2+1
which corresponds to the control (from above and from below) of what is called a (per-round)
“tracking regret” for nT shifts. This notion was introduced by Helmbold and M.Warmuth
(1998); see also Cesa-Bianchi and Lugosi (2006, Chapter 5) for a review of the results known
for tracking regret. In particular, the examples used therein to show the optimality of the
bounds (which are of the form of the one considered in Footnote 4) can be adapted in our
context, so thatpthe lower bound on tracking regret with nT shifts applies in our case: it is
of the order of nT /T , thus of T −1/4 .
In a nutshell, what we proved in these paragraphs is that if we are to ensure the convergence (3) by controlling a quantity of the form (14) and (16), then we have to proceed
in blocks and convergence cannot hold at a faster rate than T −1/4 . However, the associated
strategy is computationally efficient. Also, neither the convexity of C, nor the continuity of
ϕΨ or of Ψ are required, yet the stronger convergence (7) is achieved, not only (8).
5.2.2. Trading efficiency for a better rate; an interpretation of the
different rates
Theorem 11 shows that some set is approachable here, namely, the set GϕΨ defined in (8): it
is thus a B–set in the terminology of Spinat (2002), see also Hou (1971) as well as a remark
by Blackwell (1956). Therefore, there exists some (abstract√and possibly computationally
extremely inefficient) strategy which approaches it at a 1/ T –rate. Indeed, the proof of
existence of such a strategy does not rely on any constructive argument.
4. This can be seen, e.g., by taking A = {1, 2} and binary payoffs gt,a ∈ {0, 1}. The expectation of the
per-round regret is larger than a positive constant when the gt,a are realizations of independent random
variables Gt,a identically distributed according to a symmetric Bernoulli distribution. In particular, the
regret is larger than this constant for some sequence of binary payoffs gt,a ∈ {0, 1}.
20
Approachability in Unknown Games
Based on all remarks above, we may provide
an intuitive interpretation of the T −1/4
√
rate obtained in Theorem 11, versus the 1/ T rate achieved either in our context by the
abstract strategy mentioned right above, or associated with Blackwell’s original strategy or
variations of it as the one by Bernstein and Shimkin (2015) in the classical case of known
games and sets C being known to be approachable. The interpretation is in terms of the
number of significant (costly) computational units Ncomp (projections, solutions √
of convex or
linear programs, etc.) to be performed. The strategies with the faster rate 1/ T perform
at √
least one or two of these units at each round, while our strategy does it only of the order
of T times during T rounds—they are encompassed into the calls to Ψ and take
p place at
times t = k(k − 1)/2 + 1 for k > 1. In all these cases, the rate is proportional to Ncomp /T .
5.2.3. On the related framework of Azar et al. (2014)
The setting considered therein is exactly the one described in Section 2; our works are
concurrent and independent. Crucial differences lie however in the aims pursued and in the
nature of the results obtained.
The quality of a strategy is evaluated by Azar et al. (2014) based on some quasi-concave
and Lipschitz function f : Rd → R. With the notation of Theorem 11 (the straightforward
extension to an unknown horizon T of) their aim is to guarantee that
lim inf
T →∞
(
f
T
1X
xt
T
t=1
mt
!
−
min
m(k)
max f x
k∈{1,...,nT −1} x∈∆(A)
)
> 0,
(21)
√
where we recall that nT is of order T . Azar et al. (2014) mention that this convergence
can take place at an optimal T −1/4 rate.
Satisfying (21) and recovering this optimal rate is actually a direct consequence of our
Theorem 11 and of the assumptions on f . Indeed, (14) and (16) together with the Lipschitz
assumption on f entail that
lim inf
T →∞
(
f
T
1X
xt
T
mt
t=1
!
nT −1
√
1 X
− f O(1/ T ) +
k Ψ(m(k) )
T
m(k)
k=1
!)
> 0.
(22)
The quasi-concavity of f implies that the image by f of a convex combination is larger than
the minimum of the images by f of the convex combinations. Thus, (22) yields in particular
lim inf
T →∞
(
f
T
1X
xt
T
t=1
mt
!
−
min
k=1,...,nT −1
f Ψ(m(k) )
m(k)
)
> 0.
The convergence rate is the same as for (22), thus is of order at least T −1/4 . Defining the
response function Ψ by Ψ(m) ∈ arg max f (x m), we get (21).
x∈∆(A)
However, we need to underline that the aim (21) is extremely weak: assume, for instance,
that during some block Nature chooses m(k) with identical components such that
∀ x ∈ ∆(A),
f x
21
m(k) = min f .
Mannor, Perchet, Stoltz
Then (21) is satisfied irrespectively of the algorithm. On the contrary, the more demanding
aim (22) that we consider is not necessarily satisfied and an appropriate algorithm—as our
one—must be used.
In addition, the strategy designed by Azar et al. (2014) still requires some knowledge—
the set K of vectors of vector payoffs needs to be known (which is a severe restriction)—and
uses projections onto convex sets. The rate they obtain for their weaker aim is O(T −1/4 ),
as we get for our improved aim.
5.2.4. Links with the strategy of Bernstein and Shimkin (2015)
In this final paragraph of our discussion of Theorem 11 we review the strategy of Bernstein
and Shimkin (2015) and extend it, as much as it can be extended, to a setting as close as
possible to our setting of unknown games: see Figure 3. The extension however requires
that the set K of possible vectors of vector payoff is known to the decision-maker — an
assumption that we would not be ready to make.
Parameters: the set K, a response function Ψ : K → ∆(A)
Initialization: play an arbitrary x1 ∈ ∆(A), pick an arbitrary m
e1 ∈ K
For rounds t = 2, 3, . . .,
1. Update the discrepancy
∆t−1 =
t−1
X
xτ
τ =1
2. Play a mixed action
xt ∈ arg min max h∆t−1 , x
x∈∆(A) m∈K
m
e t ∈ arg max min h∆t−1 , x
3. Compute
mτ −
m∈K
x∈∆(A)
t−1
X
τ =1
Ψ m
es
mi ;
m
es ;
mi .
Figure 3: A generalization of the strategy of Bernstein and Shimkin (2015).
Theorem 13 For all response functions Ψ, the strategy of Figure 3 is such that for all
T > 1, for all sequences m1 , . . . , mT ∈ (Rd )A of vectors of vector payoffs, possibly chosen
by an opponent player,
w
w
T
T
w
w1 X
2B2,max
1X
w
w
xt mt −
Ψ m
et
m
e tw 6 √
.
(23)
w
w
wT
T
T
t=1
t=1
2
The obtained bound is deterministic and uniform over all strategies of the opponent, just
as the bound of Theorem 11 was. Of course, the control (23) is a much weaker statement
than trying to force the convergence of the quantity (19) towards 0: to which set can we
guarantee that
T
X
Ψ m
et
m
et
t=1
belongs? It seems difficult to relate this quantity to the set CϕΨ (mT ) and get the convergence
dp rT , CϕΨ (mT ) → 0 except in some special cases. The applications of Section 6 will further
underline this limitation.
22
Approachability in Unknown Games
One of these special cases is when the set C is approachable, i.e., that the null target
function ϕ ≡ 0 is achievable. This assumption of approachability translates in our more
general case into the existence of a response function ΨC such that ΨC (m) m ∈ C for
all m ∈ K. As advocated by Bernstein and Shimkin (2015), in such settings it is often
computationally feasible to access to ΨC (m) and less costly than performing projections
onto C.
In a nutshell, the strategy of Bernstein and Shimkin (2015) can be extended to the setting
of “almost unknown” games (the set K needs to be known), but the obtained convergence
guarantees are meaningful only under an assumption of approachability of the target set C.
One of the two sources of unknownness of our setting is then (almost) dealt with: the fact
that the underlying structure of the game is unknown, but not the fact that the target is
unknown as well.
Proof of Theorem 13 The construction of the strategy at hand and the proof of its
performance bound also follow some self-confident approach, as for Theorem 11; however,
no blocks are needed. We proceed as in (17) by developing the square Euclidian norm of
∆t+1 to relate it to the one of ∆t , where t > 1:
k∆t+1 k22 = k∆t k22 + 2 ∆t+1 , xt+1 mt+1 − Ψ m
e t+1
m
e t+1
|
{z
}
w
+ wxt+1
|
60
mt+1 − Ψ m
e t+1
{z
2
64B2,max
w2
m
e t+1 w2 .
}
We show below that the inner product is non-positive, which after an immediate recurrence
2
shows that k∆t+1 k22 6 4B2,max
(t + 1)2 and concludes the proof.
Indeed, by von Neumann’s minmax theorem, using the definitions of xt+1 and m
e t+1 ,
maxhδt+1 , xt+1
mi min maxh∆t+1 , x
m∈K
x∈∆(A) m∈K
mi = max min h∆t+1 , x
m∈K x∈∆(A)
= min
x∈∆(A)
δt+1 , x
In particular, for all m0 ∈ K and x0 ∆(A),
hδt+1 , xt+1
m0 i 6 maxhδt+1 , xt+1
m∈K
mi = min
x∈∆(A)
Choosing m0 = mt+1 and x0 = Ψ m
e t+1 entails
∆t+1 , xt+1
δt+1 , x
mt+1 − Ψ m
e t+1
as used above to complete the induction.
mi
m
e t+1 .
m
e t+1 6 δt+1 , x0
m
e t+1 .
m
e t+1 6 0
5.2.5. Link with classical approachability, opportunistic approachability
We recall that in the setting of known finite games described in Section 2.2, vectors of vector
payoffs m actually correspond to the r( · , b). This defines the closed convex set K as the set
23
Mannor, Perchet, Stoltz
of the r( · , y) for all mixed actions y ∈ ∆(B) of the opponent. Both strategies considered
therein relied on a response function Ψ = x? defined as
∀ y ∈ ∆(B),
Ψ r( · , y) = x? r( · , y) ∈ arg min dp r(x, y), C .
x∈∆(A)
Accessing to a value of this response function amounts to solving the convex program
min
X
a∈A
2
xa r(a, y) − c
s.t. x ∈ ∆(A), c ∈ C ,
which can be done efficiently. (It even reduces to a quadratic problem when C is a polytope.)
Our algorithm based on this response function approaches the set Cαunif , where the
quantity αunif is defined in (4); it is not required to compute the said quantity αunif . The
same guarantee with the same remark apply to the two strategies presented in Section 2.2:
Blackwell’s strategy for the case p = 2 only, and the strategy by Bernstein and Shimkin
(2015) for all 0 < p 6 +∞. These three algorithms ensure in particular that the average
payoffs rT are asymptotically inside of or on the border of the set Cαunif .
Now, that αunif is null or positive indicates whether a convex set C is approachable or not.
But the problem of determining the approachability of a set is actually an extremely difficult
problem as even the determination of the approachability of the singleton set C = {0} in
known games is NP–hard to perform; see Mannor and Tsitsiklis (2009). To see that there
is no contradiction between being able to approach Cαunif and not being able to say that
αunif > 0 or not, note that none of the algorithms discussed above does, neither in advance
nor in retrospect, issue any statement on the value of αunif . They happen to perform
approachability to Cαunif for the specific sequence of actions chosen by the opponent but
do not determine a minimal approachable set which would be suited for all sequences of
actions. In particular, they do not provide a certificate of whether a given convex set C is
approachable or not.
Opportunistic approachability. In general, in known games, one has that the target
?
?
function considered above, ϕx , satisfies ϕx ≺ αunif . That is, easy-to-control sequences of
vectors r( · , bt ) can lead to an average payoff rT being much closer to C than the uniform
distance αunif : we get some pathwise refinement of classical approachability. This should be
put in correspondence with the recent, but different, notion of opportunistic approachability
(see Bernstein et al., 2013). However, quantifying exactly what we gain here with the
pathwise refinement would require much additional work (maybe a complete paper as the
one mentioned above) and this is why we do not explore further this issue.
6. Applications
In this section we work out two applications: learning while being evaluated with global
cost functions, and approachability under sample path constraints.
6.1. Global cost functions
This problem was introduced by Even-Dar et al. (2009) and slightly generalized by Bernstein
and Shimkin (2015). We first extend it to our setting of unknown games and describe what
24
Approachability in Unknown Games
Theorem 11 guarantees in our case, and then compare our approach and results to the ones
of the two mentioned references. We keep the original terminology of global costs (thus to
be minimized) and do not switch to global gains (to be maximized), but such a substitution
would be straightforward.
Description of the problem in the case of unknown games. We denote by Kproj ⊂
Rd the closed convex and bounded set formed by the ma when m ∈ K and a ∈ A. A global
cost function is a mapping C : Kproj → R measuring the quality of any vector in Kproj . For
instance, the choice of a mixed action x ∈ ∆(A) given a vector of vector payoffs m ∈ K
is evaluated by C(x m); or the performance of the average payoff rT is equal to C(rT ).
Some regret is to be controlled to ensure that the latter quantity is small as well. Even-Dar
et al. (2009) and Bernstein and Shimkin (2015) defined this regret as
C(rT ) −
where
C ? (m) =
∀m ∈ K,
inf
x∈∆(A)
inf
C(x
x∈∆(A)
C(x
mT ) = C(rT ) − C ? (mT )
(24)
m) .
Assuming that C is continuous, the infimum in the defining equation of C ? is achieved and
we can thus construct a response function Ψ? : K → ∆(A) such that
∀m ∈ K,
C Ψ? (m) m = min C(x m) = C ? (m) .
(25)
x∈∆(A)
Actually, the proof techniques developed in the latter references (see the discussion below)
only ensure a vanishing regret for the convexification vex[C] of C and the concavification
cav[C ? ] of C ? , i.e., they can only issue statements of the form
lim sup vex[C](rT ) − cav[C ? ](mT ) 6 0 ;
(26)
T →∞
they additionally get convergence rates when vex[C] is a Lipschitz function.
We recall that vex[C] 6 C and that cav[C ? ] > C ? , so that the statements of the form
above are much weaker than the original aim (24), at least when C is not convex or C ?
is not concave. A natural case when the latter assumptions are however satisfied is when
C = Cp is the `p –norm, for p > 1 (including the supremum norm p = +∞):
1/p
d
X
Cp (u1 , . . . , ud ) =
upj
and
C+∞ (u1 , . . . , ud ) = max |uj | .
j=1,...,d
j=1
Our main contribution: a better notion of regret. We will directly bound C(rT ),
whether C is convex or not, and will similarly relax the assumption of concavity of C ?
needed in all mentioned references to tackle the desired regret (24).
To that end, we propose a notion of regret that is better in all cases (whether C and
C ? are respectively convex and concave, or not). More precisely, we compare C(rT ) to a
quantity φΨ (mT ) based on any response function Ψ and which generalizes the definition (11):
for all m ∈ K,
X
X
φΨ (m) = sup C
λi Ψ(mi ) mi : N > 1 and
λi mi = m .
i6N
i6N
25
Mannor, Perchet, Stoltz
The extended notion of regret is then defined as C(rT ) − φΨ (mT ).
We now explain why this new definition is always more ambitious than what could be
guaranteed so far by the literature, namely (26). Indeed, when C is convex and by definition
of Ψ? , we have in particular
X
X
?
φΨ (m) 6 sup
λi C Ψ? (mi ) mi : N > 1 and
λi mi = m = cav[C ? ](m) .
i6N
i6N
The inequality
stated above can be strict. For instance, as indicated in Section 4.2, when
C = dp ( · , C where C is convex, the global cost function C is indeed convex. We then have
?
φ Ψ = ϕx
?
cav[C ? ] = cav[ϕ? ] ,
and
?
and thus we possibly have φΨ ≺ cav[C ? ], as stated in Lemma 8. The function C = dp ( · , C
is also a Lipschitz function, which illustrates the interest of the second part of the following
corollary. We recall that B2,max denotes the maximal Euclidean norm of elements in K.
Corollary 14 For all response functions Ψ, when C is continuous and convex, the strategy
of Figure 2 ensures that, uniformly over all strategies of the opponent,
n
o
lim sup C(rT ) − φΨ (mT ) 6 0 .
(27)
T →∞
When C is in addition a Lipschitz function, with constant L for the `2 –norm on Kproj , we
more precisely have
C(rT ) − φΨ (mT ) 6 10L T −1/4 ln A + 3B2,max L T −1/2 .
Proof We apply Theorem 11 and use its notation. The function C is continuous thus
uniformly continuous on the compact set Kproj . Thus,
w
w
wrT − cT w −→ 0
entails
C(rT ) − C(cT ) −→ 0 ,
2
both convergences toward 0 being uniform over all strategies of the opponent. Now, by
definition of cT as a convex combination of elements of the form Ψ(mi ) mi , we have
C(cT ) 6 φΨ (mT ), which concludes the first part of the corollary.
The second part is proved in the same manner, simply by taking into account the
bound (14) and the fact that C is a Lipschitz function.
Discussion. As indicated in general in Section 2 we offered two extensions to the setting
of global costs: first, we explained how to deal with unknown games and second, indicated
what to aim for, given that the natural target is not necessarily approachable and that
sharper targets as the ones traditionally considered can be reached. The second contribution
is perhaps the most important one.
Indeed, the natural target (24) corresponds to ensuring the following convergence to a
set:
where
H = (r, m) : C(r) 6 C ? (m) .
(28)
(rT , mT ) −→ H
26
Approachability in Unknown Games
This target set H is not necessarily a closed, convex, and approachable set but its convex
hull co[H] is so, as proved by Even-Dar et al. (2009) and Bernstein and Shimkin (2015).
This convex hull is exactly equal to
co[H] = (r, m) : vex[C](r) 6 cav[C ? ](m) .
We replace the convergence of (rT , mT ) to the above convex hull co[H] by a convergence
to, e.g., the smaller set
n
?
(r, m) : C(r) 6 φΨ (m) .
Such a convergence is ensured by (27) and the continuity of C, and this set is smaller than
co[H] as follows from the discussion before Corollary 14.
Even-Dar et al. (2009) use directly Blackwell’s approachability strategy to approach
co[H], which requires the computation of projections onto co[H], a possibly computationally
delicate task. We thus only focus on how Bernstein and Shimkin (2015) proceed and will
explain why the obtained guarantee of convergence to co[H] cannot be easily improved with
their strategy. We apply Theorem 13 to a lifted space of payoffs K ⊂ Rd × (Rd )A . Namely,
with each m ∈ K, we associate m ∈ K defined as
ma
∈ Rd × (Rd )A .
(29)
∀ a ∈ A,
ma =
m
That is, the component a ∈ A of m contains the corresponding component ma of m as well
as the vector m itself. In particular,
T
1X
xt
T
mt =
t=1
rT
mT
.
We pick the response function Ψ? : K → ∆(A) corresponding to the base response function
Ψ? defined in (25): Ψ? (m) = Ψ? (m). Then, the convergence (23) reads
w
w
w
w
T
T
T
w
w
w1 X
w
X
X
1
1
w rT
w
w
w
−
Ψ? m
et
m
e tw = w
xt mt −
Ψ? m
et
m
e t w −→ 0 ,
w
w mT
w
wT
w
T
T
t=1
t=1
t=1
2
2
(30)
?
e 2 , . . . in K. By definition of K and Ψ , for all t > 1,
for some m
e 1, m
?
Ψ m
et
m
et
?
∈ (r, m) : C(r) 6 C ? (m) ⊆ H .
et
m
et =
Ψ m
m
et
Thus, the convex combination of the Ψ? m
et
m
e t belongs to co[H] and the convergence (28) is achieved. Under additional regularity assumptions (e.g., continuity of vex[C]
and cav[C ? ]), the stronger convergence (26) holds as can be seen by adapting the arguments
used in the second part of Section C.1.
However, the limitations of the approach of Bernstein and Shimkin (2015) are twofold.
First, as already underline in Section 5.2.4, the sets K or equivalently K need to be known
to the strategy; thus the game is not fully unknown. Second, there is no control on where
the m
e t or m
e t lie, and therefore, there is no reasonable hope to refine the convergence (28)
to a convergence to a set smaller than co[H] and defined in terms of mT as in our approach.
27
Mannor, Perchet, Stoltz
6.2. Approachability under sample path constraints
We generalize here the setting of regret minimization in known finite games under sample
path constraints, as introduced by Mannor et al. (2009) and further studied by Bernstein
and Shimkin (2015). The straightforward enough generalization is twofold: we deal with
approachability rather than just with regret; we consider unknown games.
Description of the problem in the case of unknown games. A vector in Kproj ⊂ Rd
now not only represents some payoff but also some cost. The aim of the player here is
to control the average payoff vector (to have it converge to the smallest expansion of a
given closed convex target set P) while abiding by some cost constraints (ensuring that the
average cost vector converges to a prescribed closed convex set Γ).
Formally, two matrices G and C, of respective sizes g × d and γ × d, associate with
a vector ma ∈ Kproj ⊂ Rd a payoff vector Gma ∈ Rg and a cost vector Cma ∈ Rγ . For
instance, when the decision-maker chooses a mixed action x ∈ ∆(A) and the vector of vector
payoffs is m ∈ K, she gets an instantaneous payoff G(x m) and suffers an instantaneous
cost C(x m). The admissible costs are represented by a closed convex set Γ ⊆ Rγ , while
some closed convex payoff set P ⊆ Rg is to be approached.
The question is in particular what the decision-maker should aim for: the target is
unknown. Following the general aim (3) and generalizing the aims of Mannor et al. (2009)
and Bernstein and Shimkin (2015), we assume that she wants the following convergences
to take place, uniformly over all strategies of the opponent: as T → ∞,
dp GrT , Pϕ(mT ) −→ 0
and
dp CrT , Γ −→ 0 ,
(31)
for some target function ϕ to be defined (being as small as possible). That is, she wants to
control her average payoff GrT as well as she can while ensuring that asymptotically, her
average cost CrT lies in the set Γ of admissible costs.
To make the problem meaningful and as in the original references, we assume that the
cost constraint is feasible.
Assumption 2 For all m ∈ K, there exists x ∈ ∆(A) such that G(x
m) ∈ Γ.
What the general result of Theorem 11 states. We consider mostly the following
response function x?Γ : for all m ∈ K,
n
o
x?Γ (m) ∈ arg min dp G(x m), P : x ∈ ∆(A) s.t. G(x m) ∈ Γ ,
which provides the instantaneous-best and cost-abiding response. The defining minimum
is indeed achieved by continuity as both P and Γ are closed sets. Since in addition P and
Γ are convex, the defining equation of x?Γ is a convex optimization problem under a convex
constraint and can be solved efficiently.
Of course, more general (preferably also cost-abiding) response functions can be considered. By a cost-abiding response function Ψ, we mean any response function such that
∀ m ∈ K,
C Ψ(m) m ∈ Γ .
This property is indeed satisfied by x?Γ .
28
Approachability in Unknown Games
We adapt the definition (11) of the target function based on some response function Ψ
to only consider payoffs: for all m ∈ K,
X
X
φΨ (m) = sup dp G
λi Ψ(mi ) mi , P : N > 1 and
λi mi = m .
i6N
i6N
?
A discussion below will explain why such goals, e.g., (31) with ϕ = φxΓ , are more ambitious
than the aims targeted in the original references, which essentially consisted of shooting for
(31) with ϕ = cav[φ? ] only and in restricted cases (uni-dimensional ones, g = 1), where for
all m ∈ K,
φ? (m) = dp G x?Γ (m) m , P .
(32)
Corollary 15 For all cost-abiding response functions Ψ, the strategy of Figure 2 ensures
that for all T > 1 and for all strategies of the opponent,
dp GrT , PφΨ (mT ) 6 LG 10 T −1/4 ln A + 3B2,max T −1/2
and
dp CrT , Γ 6 LC 10 T −1/4 ln A + 3B2,max T −1/2 ,
where LG , respectively, LC , is a norm on G, respectively, C, seen as a linear function from
Rd equipped with the `2 –norm to Rg , respectively, Rγ , equipped with the `p –norm.
In particular, the aim (31) is achieved.
Proof We apply Theorem 11 and use its notation. By (14) and by definition of LC ,
w
w
wCrT − CcT w 6 LC 10 T −1/4 ln A + 3B2,max T −1/2 .
p
Because Ψ was assumed to be cost-abiding and in view of the form (16) of cT , we have
CcT ∈ Γ and we thus have proved
dp CrT , Γ 6 LC 10 T −1/4 ln A + 3B2,max T −1/2 .
A similar argument, based on the fact that GcT ∈ PφΨ (mT ) by definition of φΨ , yields the
stated bound for dp GrT , PφΨ (mT ) .
What the extension of earlier results, e.g., Theorem 13, yields. As indicated several times already, Mannor et al. (2009) and Bernstein and Shimkin (2015) only considered
the case of regret minimization, i.e., a special case of approachability when G is a linear
form (g = 1) and P is an interval of the form [G∞ , +∞) where G∞ is a bound on the values
taken by G. We will discuss this special case below.
The strategies considered by Mannor et al. (2009) were not efficient (they relied on being
able to project on complicated sets or resorted to calibrated auxiliary strategies), unlike the
one studied by Bernstein and Shimkin (2015). We will thus focus on the latter. The (not
necessarily convex) target set considered therein is
H = (r, m) : Cr ∈ Γ and dp (Gr, P) 6 φ? (m) ,
29
Mannor, Perchet, Stoltz
where φ? was defined in (32). Because P is convex and G is linear, the function r ∈ Rd 7→
dp (Gr, P) is convex; see, e.g., Boyd and Vandenberghe (2004, Example 3.16). The convex
hull of H thus equals
co[H] = (r, m) : Cr ∈ Γ and dp (Gr, P) 6 cav[φ? ](m) .
To be able to compare the merits of the strategy by Bernstein and Shimkin (2015) to
Corollary 15, we first extend it to the case of unknown games, based on Theorem 13. To
that end we consider the same lifting as in (29) and apply similarly Theorem 13 to get (30)
as well, for the cost-abiding response function x?Γ . Using that in this case, by definition
of x?Γ ,
?
xΓ m
et
m
et
?
et
m
et =
Ψ m
∈ H,
m
et
the convergence (30) rewrites
w
T
w
1 X x?Γ m
et
w rT
−
w
m
et
w mT
T
{z
| t=1
∈ co[H]
m
et
w
w
w
w −→ 0
w
} 2
and entails the convergence of (rT , mT ) to co[H]. In particular, CrT → Γ. Under an
additional regularity assumption, e.g., the continuity of cav[φ? ], we also get (by adapting
the arguments used in the second part of Section C.1) the stronger convergence
n
o
lim sup dp (GrT , P) − cav[φ? ](mT ) 6 0 ,
T →∞
that is,
lim sup dp GrT , Pcav[φ? ](mT ) 6 0 .
T →∞
Summarizing, the convergence (31) is guaranteed with ϕ = cav[φ? ]; an inspection of the
arguments above shows that cav[φ? ] being actually uniformly continuous, the desired uniformity over the strategies of the opponent is achieved.
The same limitations to this approach as mentioned at the end of the previous section
arise as far as the concepts of unknown game and unknown target are concerned. First,
the set K needs to be known to the strategy and the game is not fully unknown. Second,
there is no control on where the m
e t lie, and therefore, there is no reasonable hope to refine
the convergence (31) with ϕ = cav[φ? ] into a convergence with a smaller target function ϕ.
?
In contrast, Corollary 15 provided such a refinement with ϕ = φxΓ , which by convexity of
r ∈ Rd 7→ dp (Gr, P) is smaller and possibly strictly smaller than cav[φ? ] (adapt Lemma 8
to prove the strict inequality).
A note on known games. However, Mannor et al. (2009, Section 5) exhibit a class of
cases when cav[φ? ] is the optimal target function: in known games, with scalar payoffs and
scalar constraints, and with set of constraints of the form Γ = (−∞, c0 ]. This amounts to
minimizing some constrained regret.
We thus briefly indicate what known games are in this context, as defined by Mannor
et al. (2009) and Bernstein and Shimkin (2015). Some linear scalar payoff function u :
30
Approachability in Unknown Games
∆(A) × ∆(B) → [0, G∞ ] and some linear vector-valued cost function v : ∆(A) × ∆(B) → Rγ
are given. (With no loss of generality we can assume that the payoff function takes values
in a bounded nonnegative interval.) The set K of our general formulation corresponds to
the vectors, as y describes ∆(B),
u( · , y)
v( · , y)
∈ R × Rγ .
The matrices G and C extract respectively the first component and all but the first component. Regret is considered, that is, the payoff set P to be be approached given the
constraints is [G∞ , +∞). The expansions are Pα = [G∞ − α, +∞). The distance of some
r ∈ R to some Pα equals (G∞ − α − r)+ .
In this context, convergences of the form (31) thus read
T
1X
v(xt , bt ) −→ Γ
T
and
lim inf
T →∞
t=1
where
uT
vT
T
1X
u(xt , bt ) − G∞ − ϕ (uT , v T )
> 0,
T
t=1
(33)
T
1 X u( · , bt )
,
=
v( · , bt )
T
t=1
and thus correspond to some constrained regret-minimization problems. Indeed, denoting
yT =
T
1X
δbt
T
t=1
the empirical frequency of actions bt ∈ B taken by the opponent, and recalling that u is
bounded by G∞ , we have, for instance, when ϕ = φ? ,
φ? (uT , v T ) = G∞ − u?Γ (y T )
where
u?Γ (y) = max u(x, y) : x ∈ ∆(A) s.t. v(x, y) ∈ Γ . (34)
The convergence (33) finally reads when ϕ = φ? :
T
1X
v(xt , bt ) −→ Γ
T
t=1
and
lim inf
T →∞
T
1X
?
u(xt , bt ) − uΓ (y T ) > 0 .
T
(35)
t=1
Just as we showed (in Section 3.1) that in general the target function φ? is not achievable,
Mannor et al. (2009, Section 3) showed that the constrained regret with respect to u?Γ (y T )
defined in (35) cannot be minimized.
The proposed relaxation was to consider its convexification vex[u?Γ ] instead in (35), which
corresponds to cav[φ? ] in (34). In this specific one-dimensional setting, the target function
?
φxΓ equals cav[φ? ]: our general theory provides no improvement. This is in line with the
optimality result for cav[φ? ] exhibited by Mannor et al. (2009, Section 5) in this case.
31
Mannor, Perchet, Stoltz
6.3. Approachability of an approachable set at a minimal cost
This is the dual problem of the previous problem: have the vector-valued payoffs approach
an approachable convex set while suffering some costs and trying to control the overall cost.
In this case, the set P is fixed and the α–expansions are in terms of the set of constraints
Γ. Actually, this is a problem symmetric to the previous one, when the roles of G and P
are exchanged with C and Γ.
Acknowledgments
Vianney Perchet acknowledges funding from the ANR, under grants ANR-10-BLAN-0112
and ANR-13-JS01-0004-01. Shie Mannor was partially supported by the ISF under contract
890015. Gilles Stoltz would like to thank Investissements d’Avenir (ANR-11-IDEX-0003 /
Labex Ecodec / ANR-11-LABX-0047) for financial support.
An extended abstract of this article appeared in the Proceedings of the 27th Annual
Conference on Learning Theory (COLT’2014), JMLR Workshop and Conference Proceedings, Volume 35, pages 339–355, 2014.
32
Approachability in Unknown Games
References
J. Abernethy, P.L. Bartlett, and E. Hazan. Blackwell approachability and no-regret learning
are equivalent. In Proceedings of COLT, pages 27–46, 2011.
P. Auer, N. Cesa-Bianchi, Y. Freund, and R.E. Schapire. The nonstochastic multiarmed
bandit problem. SIAM Journal on Computing, 32(1):48–77, 2002.
Y. Azar, U. Feige, M. Feldman, and M. Tennenholtz. Sequential decision making with
vector outcomes. In Proceedings of ITCS, 2014.
A. Bernstein and N. Shimkin. Response-based approachability with applications to generalized no-regret problems. Journal of Machine Learning Research, 16(Apr):747–773,
2015.
A. Bernstein, S. Mannor, and N. Shimkin. Opportunistic strategies for generalized no-regret
problems. In Proceedings of COLT, pages 158–171, 2013.
D. Blackwell. An analog of the minimax theorem for vector payoffs. Pacific Journal of
Mathematics, 6:1–8, 1956.
S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, Cambridge, UK, 2004.
N. Cesa-Bianchi and G. Lugosi. Potential-based algorithms in on-line prediction and game
theory. Machine Learning, 3(51):239–261, 2003.
N. Cesa-Bianchi and G. Lugosi. Prediction, Learning, and Games. Cambridge University
Press, 2006.
N. Cesa-Bianchi, Y. Mansour, and G. Stoltz. Improved second-order bounds for prediction
with expert advice. Machine Learning, 66(2/3):321–352, 2007.
S. de Rooij, T. van Erven, P.D. Grünwald, and W. Koolen. Follow the leader if you can,
hedge if you must. Journal of Machine Learning Research, 15(Apr):1281–1316, 2014.
E. Even-Dar, R. Kleinberg, S. Mannor, and Y. Mansour. Online learning for global cost
functions. In Proceedings of COLT, 2009.
D. Foster and R. Vohra. Asymptotic calibration. Biometrika, 85:379–390, 1998.
D.P. Helmbold and M.Warmuth. Tracking the best expert. Machine Learning, 32(2):151–
178, 1998.
J.-B. Hiriart-Urruty and C. Lemaréchal. Fundamentals of Convex Analysis. Springer-Verlag,
2001.
T.-F. Hou. Approachability in a two-person game. The Annals of Mathematical Statistics,
42:735–744, 1971.
S. Mannor and G. Stoltz. A geometric proof of calibration. Mathematics of Operations
Research, 35:721–727, 2010.
33
Mannor, Perchet, Stoltz
S. Mannor and J. N. Tsitsiklis. Approachability in repeated games: Computational aspects
and a Stackelberg variant. Games and Economic Behavior, 66(1):315–325, 2009.
S. Mannor, J.N. Tsitsiklis, and J.Y. Yu. Online learning with sample path constraints.
Journal of Machine Learning Research, 10:569–590, 2009.
S. Mannor, V. Perchet, and G. Stoltz. Set-valued approachability and online learning with
partial monitoring. Journal of Machine Learning Research, 15(Oct):3247–3295, 2014.
J.-F. Mertens, S. Sorin, and S. Zamir. Repeated games. CORE Discussion papers 9420,
9421, 9422, Louvain-la-Neuve, Belgium, 1994.
V. Perchet. Approachability, regret and calibration: Implications and equivalences. Journal
of Dynamics and Games, 1(2):181–254, 2014.
X. Spinat. A necessary and sufficient condition for approachability. Mathematics of Operations Research, 27:31–44, 2002.
34
Approachability in Unknown Games
Appendix A. Link with regret minimization in unknown games
The problem of regret minimization can be encompassed as an instance of approachability.
We recall here why the knowledge of the payoff structure is not crucial for this very specific
problem. (This, of course, is not the case at all for general approachability problems.)
Indeed, with the notation of Section 2.2, the aim of regret minimization, in a known
finite game with payoff function s : A × B, is for the decision-maker to ensure that
lim sup
T →∞
T
T
1X
1X
s(at , bt ) − max
s(a, bt ) > 0
a∈A T
T
t=1
a.s.
t=1
This can be guaranteed by approaching (R− )A with the vector payoff function r : A × B →
RA defined by
r(a, b) = s(a0 , b) − s(a, b) a0 ∈A .
(36)
The necessary and sufficient condition for approachability of the closed convex set (R− )A
is satisfied for r. The condition (5) rewrites in our case
D
E
E D
∀ y ∈ ∆(B),
ret −e
ct , r(xt+1 , y)−e
ct = ret + , r(xt+1 , y)+ ret − = ret + , r(xt+1 , y) 6 0 ,
where ( · )+ and ( · )+ denote respectively the vectors formed by taking the nonnegative
and non-positive parts of the original components of the vector of interest. Now, using the
specific form of r, we see that
!
D
E
X
X
ret + , r(xt+1 , y) =
ret,a0 + s(a0 , y) −
ret,a0 + s(xt+1 , y) .
a0 ∈A
a0 ∈A
Either all components of ret are non-positive, i.e., ret is already in (R− )A , or we can choose
the mixed distribution xt+1 defined by
ret,a +
.
∀ a ∈ A,
xt+1,a = P
(37)
et,a0 +
a0 ∈A r
In the latter case, we then get
∀ y ∈ ∆(B),
ret − e
ct , r(xt+1 , y) − e
ct =
and (5) is in particular satisfied.
D
ret
E
,
r(x
,
y)
= 0,
t+1
+
The knowledge of s (or r) is not crucial here. Comments have to be made on the
specific choice of xt+1 : it is independent of the payoff structure s (or r), it only depends on
the past payoff vectors s( · , bτ ), where τ 6 t.
In particular, the strategy above to minimize the regret can be generalized in a straightforward way to the case of games with full monitoring but whose payoff structure is unknown. In these games, at each round, the opponent chooses a payoff vector
gt = (gt,a )a∈A ,
35
Mannor, Perchet, Stoltz
the decision-maker chooses an action at ∈ A and observes the entire vector gt , while wanting
to ensure that the regret vanishes,
T
T
1X
1X
lim sup
gt,at − max
gt,a > 0
a∈A T
T →∞ T
t=1
a.s.
(38)
t=1
It suffices to replace all occurrences of s( · , bt ) above by gt . In particular, the payoff function
r defined in (36) is to be replaced by the vectors of vector payoffs mt ∈ RA×A whose
components equal
∀ a ∈ A,
mt,a = gt,a0 − gt,a a0 ∈A .
A note on the bandit monitoring: the case of unknown games. In the case of an
unknown game (i.e., when the payoff structure is unknown and when only bandit monitoring
is available), the generic trick presented around (2) should be adapted, as indicated by
Footnote 1. Indeed, the only feedback available at the end of each round is gt,at and not
mt,at . The estimation to be performed is rather on the vectors gt than on the mt : for all
a ∈ A,
gt,a
gbt,a =
I
,
xt,a {a=at }
with the same constraints xt,a > γt for all t > 1, from which we define
m
b t,a = gbt,a0 − gbt,a a0 ∈A .
Substituting the estimates gbt in the strategy defined around (37) in lieu of the vectors
s( · , bt ) ensures that the regret vanishes.
36
Approachability in Unknown Games
Appendix B. Calculations associated with Examples 1 and 2
B.1. Proof of Lemma 3
Proof for Example 1 Assume by contradiction that the convergence (3) can be achieved
and consider any strategy of the decision maker to do so, which we denote by σ. It suffices
to consider the almost sure convergence (3), the stronger uniformity requirements stated
after it will not be invoked. All statements in the sequel hold almost surely, and quantities
like Tε and Tε0 should be thought of as random variables.
Imagine in a first time that opponent chooses, at every stage t > 1, the vectors mt = m† .
We have ϕ? (m† ) = 4, the smallest of the supremum norms of m†1 and m†2 . The aim is then
that the average payoffs rT converge to C4 . But this can be guaranteed only if the averages
of the chosen mixed actions xt converge to (1, 0). That is, given ε > 0, there exists some,
possibly large, integer Tε such that
3
rTε −
6 ε.
(39)
4
∞
Now, consider a second scenario. During the first Tε stages, the opponent chooses the
vectors mt = m† . By construction, as the strategy σ is fixed, (39) is ensured. Now, in
the next Tε stages, for Tε + 1 6 t 6 2Tε , assume that the opponent chooses the vectors
mt = m] , and denote by γε ∈ [0, 1] the average of the first components xt,1 ∈ [0, 1] of the
mixed actions xt selected by σ in this second set of stages. We have m2Tε = m(1/2) , where
1 † 1 ]
2.5
3.5
(1/2)
(1/2)
(1/2)
.
and m2
=
m
= m + m
has components
m1
=
2.5
3.5
2
2
Therefore the target set is Cϕ? (m2Tε ) = C2.5 . However, by definition of γε , we have
r2Tε
2T
1
1
1 Xε
1
1
1 5 − γε
5
4
]
= r Tε +
= rTε +
xt m = rTε +
γε
+ (1 − γε )
,
0
3
3γε
2
2
2
2
2
2
t=Tε +1
and therefore, because of (39),
r2Tε −
4 − γε /2
2 + 3γε /2
6
∞
ε
.
2
This entails that
ε
4 − γε /2
d∞ r2Tε , Cϕ? (m2Tε ) > d∞
, C2.5 − > 1 − ε/2 .
2 + 3γε /2
2
This construction can be repeated again after stage 2Tε , by choosing mt = m† till a
stage Tε0 is reached when
ε
3
r2Tε +Tε0 −
6 ;
4
2
∞
such a stage exists by the assumption that the convergence (3) is achieved by the strategy
σ. One can then similarly see that
d∞ r2Tε +2Tε0 , Cϕ? (m2T +2T 0 ) > 1 − ε/4 .
ε
37
ε
Mannor, Perchet, Stoltz
By repeating this over again and again, one proves that
lim sup d∞ rT , Cϕ? (mT ) > 1 ,
T →∞
which contradicts the assumption that σ ensures the convergence (3). The claim follows.
Proof for Example 2 (sketch) The same construction as for the previous example holds,
by switching between a first regime when mt = (−1, 1) ∈ R2 is chosen and at the end of
which the average payoff should be close to null, rTε 6 ε. Then, another regime of the
same length starts with mt = (1, 1) ∈ R2 and no matter what the decision-maker does, she
will get an average payoff of 1 in this regime. In total, at the end of the second regime,
r2Tε > 1/2 − ε while the target set is given by
Cϕ? (m2Tε ) = Cϕ? ((0,1)) = C0 = {0} ,
as
m2Tε = (0, 1) ∈ R2 .
This can be repeated over and over again.
B.2. Proof of Lemma 4
Proof for Example 1 We have cav[ϕ? ] ≡ 4. To prove this fact, we first compute ϕ? . For
ν ∈ [0, 1], the components of m(ν) = νm† + (1 − ν)m] equal
4−ν
4
3
(ν)
=
+ (1 − ν)
m1 = ν
3+ν
3
4
5 − 5ν
5
0
(ν)
.
=
+ (1 − ν)
and
m2 = ν
5ν
0
5
Therefore,
4−ν
5 − 5ν
ϕ? m(ν) = min max{4 − ν, 3 + ν}, max{5 − 5ν, 5ν} =
5ν
3 + ν
if
if
if
if
ν
ν
ν
ν
∈ [0, 1/4],
∈ [1/4, 1/2],
(40)
∈ [1/2, 3/4],
∈ [3/4, 1].
We note that ϕ? m† = ϕ? m] = 4 and that ϕ? 6 4, so that cav[ϕ? ] is identically equal
to 4 on the set K defined as the convex hull of m† and m] .
Smaller target functions ϕ such that the convergence (3) holds can be considered. This
proves in particular that (3) can also be guaranteed for the larger cav[ϕ? ]. Indeed,
ϕ1 m(ν) = max{4 − ν, 3 + ν}
is smaller than cav[ϕ? ] ≡ 4 (and even strictly smaller when ν 6= 0 and ν 6= 1); see Figure 4. In
addition, the convergence (3) can hold for it. Indeed, if the decision-maker plays xt = (1, 0)
at each round, i.e., always picks the first component of mt , then her average payoff equals
rT = mT,1 , where mT = m(ν T ) for some ν T ∈ [0, 1]. By definition of ϕ1 , the distance of
38
3 + ν
if ν ∈ [3/4, 1].
This last set of equalities can be seen to hold true by contemplating Figure 2.
Approachability in Unknown Games
m†
5
αx
4
ϕ?
m]
C
2.5
m]
m†
C4
C2.5
Figure 4:
Graphs of the functions ϕ? (bold solid line) and ϕ1 (dotted line).
Figure 2: Graphical representation of m† and m] , and of different expansions Cα (left); graphs
(ν)
of the functions
ϕ? (bold
solid
of α0 and
α1 is(dotted
lines),
αx , for we even have in
m1 to (−∞,
0]2 in
theline),
supremum
norm
precisely
ϕ1 and
m(ν)of .some
Therefore,
x ∈ [0,this
1] (thin
casesolid line).
d∞ rT , Cϕ1 (mT ) = 0 ,
which
proves by
in particular
that
theϕ?convergence
for ϕexample
1.
Proof [of Lemma
4] Assume
contradiction
that
is achievable(3)in holds
the above
and
consider any strategy of the decision maker to do so, which we denote by σ. Imagine in a first time
that Nature chooses,
at every
t > 1, the
vectors
mt = m† , which
amounts
to playing
νt = seemingly
1.
Proof
for stage
Example
2 The
computations
are more
involved
in this
simpler
?
?
?
2
Given that the average
of
the
ν
equals
ν
=
1
and
that
its
image
by
ϕ
equals
ϕ
(1)
=
4,
the
aim
t
T
example. As before, we start by computing ϕ . We refer to vectors m ∈ [−1, 1] chosen
is then to converge
C4 . opponent
But this can
guaranteed
if the
the chosen
xt by
converges
bytothe
asonly
m =be(v,
w) and to
theaverage
mixed of
actions
picked
the decision-maker by
to 1. That is, given
ε
>
0,
there
exists
some,
possibly
large,
integer
T
such
that
x = (x1 , 1 − x1 ), where x1 ∈ [0, 1]. The absoluteε value of a convex combination of v and w
is to be minimized. This is achieved
with
3
rTε −
6 ε.
(21)
4
(1,
0)
if
0
<
v
6
w
or
0
>
v > w,
∞
(0,
1)
if
0
<
w
<
v
or
0
>
w > v,
?
Tε stages, Nature chooses
x (v,
w) =the first
Now, consider a second scenario.
During
the vectors mt = m† .
|w|
|v|
, next Tε stages,
if for
v wT6ε +
0, 1 6 t 6 2Tε ,
Now, for the
By construction, as σ is fixed, (21) is ensured.
|v|] + |w| |v| + |w|
assume that Nature chooses the vectors mt = m , and denote by γ ∈ [0, 1] the average of the
which
to
xt ∈ [0, 1] selected
by σ.leads
The average
of the played vectorsis m2Tε corresponds to ν = 1/2, whose
min |v|, |w| if v w > 0,
image by ϕ? equals ϕ? (1/2) = 5/2. Therefore
thew)target
ϕ? (v,
= set is C2.5 . However, by definition of γ,
0
if v w 6 0.
we have
for all v, w ∈ [−1, 1]2 ,
2T
The concavification
of ϕ? thus admits
thefollowing
expression:
1
1 Xε
1
1
4
5
]
r2Tε = rTε +
xt m = rTε +
γ
+ (1 − γ)
3
2
2
2
2
|v − w| 0
t=Tε +1
cav[ϕ? ]
(v, w) = 1
−
.
2
1
1
5−γ
rT +
,
We replace a lengthy and=tedious
of3γthis expression
by the graphical illustrations
2 ε proof
2
provided by Figure 5.
Now, we consider the target
23 function ϕ1/2 defined as
|v + w|
ϕ1/2 (v, w) =
.
2
(41)
We denote mT = v T , wT . By playing xt = (1/2, 1/2) at each round, the decision-maker
ensures that
v T + wT
v T + wT
rT =
while
ϕ1/2 mT =
.
2
2
Thus, for this example again (in which the `p –norm can be chosen freely), we have
dp rT , Cϕ1/2 (mT ) = 0 .
39
1 + |v + w| /3
(1 + v)/2
?
(1 + w)/2
ϕx (v, w) =
(1 − v)/2
(1 − w)/2
if
if
if
if
if
|2w − w| 6 1 and |2v − w| 6 1,
2w − v > 1 and v + w > 0,
2v − w > 1 and v + w > 0,
2w − v 6 −1 and
v + w 6Perchet,
0,
Mannor,
Stoltz
2v − w 6 −1 and v + w > 0,
?
which shows that ϕx 6 cav[ϕ? ]. Admittedly, a picture would help: we provide one as Figure 4.
1
1
v
v
1−y
2
0
0
1+|x+y|
3
1−x
2
w
w
1+x
2
0
1
1+y
2
1
1
1−
0
11
|v−w|
2
1−
1
|v−w|
2
0
0
ϕ?
ϕ?
cav[ϕ? ]
0
cav[ϕ? ]
0
?
? (left)
? ] (right).
Figure
of ϕ
and of its concavification cav[ϕ? ] (right).
3: Representations
ϕ?of(left)
its
concavification
cav[ϕ
Figure Figure
4: Representations
in 2D –of3D
ϕx ?and3:ofRepresentations
α1/2
.
Figure 5: Representations of ϕ (left), of the alternative target function ϕ1/2 (center), and
of the concavification cav[ϕ? ] (right).
?
x can be improved. Indeed,
We conclude our
discussion
of this4]example
by construction
showing
thatLemma
even
Proof [of
4] previous
The sameexample
construction
the previous
Proof
[of Lemma
The same
as
forϕthe
holds,asbyforswitching
be- example holds, by switching be? , that is, somehow by having the unwas constructedtween
by choosing
the
response
function
Ψ
=
x
tween
regimes
mend
(−1,
1) isthe
chosen
andpayoff
at the should
end of which the average payoff should
regimes when mt = (−1, 1)
is chosen
andwhen
at the
which
average
t = of
? in mind. This response function, as the main algorithm below shows,
chievable target function
be close
to null,
rT the
6 ε.
Then,
another
regime
oft =
the same
length
be close ϕto null,
rT 6 ε. Then, another
regime
same
length
with
1) and
no starts with mt = (1, 1) and no
? ],m
The
convergence
(3)ofholds
for
ϕof
and
also
forstarts
cav[ϕ
since(1,the
latter
is larger than ϕ1/2
1/2anMore
s a short-term reply
to awhat
localthe
average
of vectors
payoffs.
reasonable
quantities
matter
whatwill
theget
decision-maker
does, of
she
getregime.
an average
payoff
of 1 in this regime. In total,
matter
decision-maker
does,vector
she
average
payoff
1 will
in this
In total,
?
(strictly
at some
points).
Indeed,
αϕ
follows
from
? , equals
hould be targeted;rTquite
surprisingly
we
that
relaxing
the
short-terms
1/2
rTbelow
>is,1/2
−
ε while
the
image
of? (0,
m6
= (0,
1)] by
ϕ? , equals
ϕ?the
(0, 1)fact
= 0. This
> 1/2
− ε whilelarger
theillustrate
target,
that
the
image
of
m
= the
(0, that
1)inequality
byis,expectations
ϕthe
1)cav[ϕ
0. This
2T
2T target,
lso results in better
long-term
payoffs.
For
instance,
if
the
decision
maker
knows
in
advance
that
that
can be repeated over and over again.
can be repeated over and over again.
thus,
he next vectors will be mt = (0, 1), she should not worry about getting ϕ? (0, 1) = 0, and
|v + w| + |v − w| = max |v|, |w| 6 2 .
?
laying xt = (1, 0); she could well be satisfied with ϕ (0, 1) = 1/2, and thus play xt = (1/2, 1/2).
Proof
[of
the
second
consider
w) = |v + w|/2, which is an achievthe second
part
of Lemma
6] We
α1/2of
(v,Lemma
w) = |v6]
+ We
w|/2,
which αis1/2
an(v,
achievturns out that theProof
same[of
argument
can be
performed
at each
(v,consider
w).? part
That
the inequality
α1/2
6
can
be strict
seen,
e.g.,
at(1/2,
(0,
0).
Again,
an illustration
target
function;
it (1/2,
indeed
suffices
to
play
x
=
1/2)
at each
able target
function;
it indeed able
suffices
to cav[ϕ
play
xt ] =
1/2)
atiseach
round.
The
inequality
t
round. The inequality
? ] follows from the fact that, |v + w| + |v − w| = max |v|, |w| 6 2. That this
? ] follows from the
α
6
cav[ϕ
α
6
cav[ϕ
fact
that,
|v
+
w|
+
|v
−
w|
=
max
|v|,
|w|
6
2.
That
this
5.
1/2partisofprovided
roof [of the second
Lemma 8] by
TheFigure
target1/2
function
ϕ = α1/2 already considered above is
? ]. (Thiswe
?
is seen, e.g.,
at (0,α0).
a conclusion,
inequality
can be strict is seen, inequality
e.g., at (0,can
0). be
As strict
a conclusion,
we have
≺ cav[ϕ
is have α1/2 ≺ cav[ϕ? ]. (This is
x
1/2 As
uch that α1/2 ≺ ϕ as can be seen on a picture.
illustrated by Figures 3 and 4.) illustrated by Figures 3 and 4.)
what we could
a “signvalues
compensation.”
The absolute values of
The B.3.
proof below
illustrates
whatThe
weproof
call a illustrates
“sign compensation.”
Thecall
absolute
of
Proof
of Lemma
8couldbelow
the convex
in (22)
can be (much)
smallerofthan the convex combinations of
the convex combinations considered
in (22)combinations
can be (much)considered
smaller than
the convex
combinations
? ]; it can indeed be
? ]; it in
the absolute
values
their
elements,
as
expression
cav[ϕcompensathe absolute
values
of their
elements,
considered
the expression
of considered
cav[ϕ
indeed
be a of“sign
Proof
for
Example
2asThe
proofofinbelow
illustrates
what
wecanthe
could
call
2
seenfor
in our
example
(given
seen in our
example
form
of
the
α ) that
tion.”
We(given
have the
here,
allsets
(v,Cw)
∈
R ,the form of the sets Cα ) that
( N
)
( N
)
N
N
X
X
X
X
( ?N
)
?
?
?
N
sup
λi 1xand
(vi , wi ) λi (v
(vii,, w
wii)) =: (v,
N w)
> 1 .X
and
λi (vi , wi ) = (v, w) .
cav[ϕ ](v, w) = sup λi xcav[ϕ
(vi X
, w](v,
(v=
>
i ) w)
i, w
i) : N
cav[ϕ? ] (v, w)i=1= 27
sup
λi x? (vi , wi=1
i)
(vi , wi=1
i ) : N > 1 and
i=1
λi=1
i (vi , wi ) = (v, w) ,
i=1
Proof [of
second to
part
Lemma
7] According
(8) Cand
given the form of the sets Cα , the
Proof [of the second part of Lemma
7] the
According
(8)of
and
given the
form of thetosets
α , the
?
?
target function ϕx is defined astarget function ϕx is defined as
)
( N
N
)
( N
)
( N
X
X
N
N
?
X
X
X
X
?
?
? (vi , wi ) :
λ
xi )? :(vN
, w ) = (v, w) .
ϕxsup(v, w) λi=x?sup
i, w
sup
(vi , wi ) λi (v
(vii,, w
wiiN
N1w)
>and
1 . and
ϕx (v, w) =
(vϕi ,xw(v,
(v=
>λi )i1xand
)) =:>(v,
(22) λλi (v
i (vii , wii) = (v, w) . (22)
i ) w)
i , iw
i=1
i=1
i=1
i=1
i=1
i=1
By a tedious case study consisting of identifying the worst convex decompositions
one then gets the explicit expression
ϕx
?
26
1 + |v + w| /3
(1 + v)/2
(1 + w)/2
(v, w) =
(1
− v)/2
(1 − w)/2
if
if
if
if
if
40
26
|2w − v| 6 1 and |2v − w| 6 1,
2w − v > 1 and v + w > 0,
2v − w > 1 and v + w > 0,
2w − v 6 −1 and v + w 6 0,
2v − w 6 −1 and v + w 6 0,
P
λi (vi , wi ),
(42)
Approachability in Unknown Games
to be compared to the closed-form expression obtained earlier for cav[ϕ? ], namely
|v − w|
cav[ϕ? ] (v, w) = 1 −
.
2
Admittedly, a picture would help: we provide one as Figure 6. We see (on the picture or
1
1
v
w
1+v
2
0
1−w
2
1−v
2
0
1
1+|v+w|
3
1−
1
|v−w|
2
0
1+w
2
ϕ?
cav[ϕ? ]
0
?
?
? ϕx of
Figure 1: Representations
in
and
α1/2 .and and
Figure
ϕ?of(left)
of its3D
concavification
cav[ϕ
Figure 6: Representations
in 2D3:– Representations
3D2Dof– 3D
ϕx of(left
and
center)
representation
of ] (right).
cav[ϕ? ].
Proof [of Lemma
4] The same construction as for the previous example holds, by switching bex? 6 cav[ϕ? ], and even that ϕx? ≺ cav[ϕ? ], by considering the
by direct calculations)
that
ϕ
tween regimes when mt = (−1, 1) is chosen and at the end of which the average payoff should
respective values be
1/3close
and to
1 null,
at r(0, 6
0).ε. Then, another regime of the same length starts with m = (1, 1) and no
t
T
matter what the decision-maker does, she will get an average payoff of 1 in this regime. In total,
x? is,
rT > 1/2
the target,
that
the
image
m2T
= (0,will
1) by
ϕ? , equals
ϕ? (0, 1) = 0. This
Proof for Example
1−
Weε while
will prove
that ϕ
=ϕ
thatofthe
result
follow
from the
1 so
? ] already
be repeated
over
and over
again. B.2.
inequality ϕ1 ≺can
cav[ϕ
proved
in Section
Indeed, as can be seen in the computations leading to the closed-form expression (40)
of ϕ? , we have Proof [of the second (
part of Lemma 6] We consider α1/2 (v, w) = |v + w|/2, which is an achiev
(1, 0) if ν ∈ [0, 1/4] ∪ [3/4, 1],
able target
x? function;
m(ν)
= it indeed suffices to play xt = (1/2, 1/2) at each
round. The inequality
?
1) the
if νfact
∈ [1/4,
α1/2 6 cav[ϕ ] follows(0,from
that, 3/4].
|v + w| + |v − w| = max |v|, |w| 6 2. That this
inequality can be strict is seen, e.g., at (0, 0). As a conclusion, we have α1/2 ≺ cav[ϕ? ]. (This is
Therefore,
(4.)(ν)
illustrated by Figures 3 and
m1
if ν ∈ [0, 1/4] ∪ [3/4, 1],
?
(ν)
(ν)
x m
m =
(ν)
m2
if ν ∈ [1/4, 3/4].
The proof below illustrates what we could call a “sign compensation.” The absolute values of
But for ν ∈ [1/4,
wecombinations
have the component-wise
inequality
the3/4],
convex
considered in (22)
can be (much) smaller than the convex combinations of
the absolute values
of
their
elements,
as
considered
in the expression of cav[ϕ? ]; it can indeed be
5 − 5ν
4−ν
(ν)
(ν)
m2 = (given the form
6 of the sets=Cαm) 1that,
seen in our example
5ν
3+ν
( N
)
N
(ν)
X
X
?
(ν)
(ν)
which entails that
for ?all
∈ [0,
m 6 m . Substicav[ϕ
](v,ν w)
= 1],
supagain component-wise,
λi x? (vi , wi ) (vxi , wm
λi (vi , wi ) = (v, w) .
i ) : N > 1 and 1
tuting in (10) and using that the supremum
distance
to
the
negative
orthant is i=1
increasing
i=1
with respect to component-wise inequalities, i.e.,
Proof [of the second part of Lemma 7] According
to (8) and given the form of the sets Cα , the
2
2
?
x
(v,
w)
∈
R
−
7
→
d
(v,
w),
(−∞,
0]
=
max
(v)+ , (w)+ ,
target function ϕ is∞defined as
)
( N
N
X
X
? 41
x?
λi x (vi , wi ) (vi , wi ) : N > 1 and
λi (vi , wi ) = (v, w) . (22)
ϕ (v, w) = sup
i=1
1
i=1
Mannor, Perchet, Stoltz
we get that
x?
ϕ
m
(ν)
(
= sup d∞
(
6 sup d∞
N
X
i=1
N
X
?
(νi )
λi x m
(ν )
(νi )
m
λi m1 i , (−∞, 0]2
i=1
2
, (−∞, 0]
!
!
: N > 1 and
: N > 1 and
(ν)
= d∞ m1 , (−∞, 0]2 = ϕ1 m(ν) .
?
N
X
i=1
N
X
i=1
λi νi = ν
)
λi νi = ν
)
The converse inequality ϕx > ϕ1 follows from the decomposition of any ν ∈ [0, 1] as the
convex combination of 1, with weight λ1 = ν, and 0, with weight λ2 = 1 − ν. In particular,
?
ϕx m(ν) > d∞ ν x? m(1)
m(1) + (1 − ν) x? m(0)
m(0) , (−∞, 0]2
(ν)
= d∞ m1 , (−∞, 0]2 = ϕ1 m(ν) ,
as both x? m(0) = x? m(1) = (1, 0) as indicated above.
42
Approachability in Unknown Games
Appendix C. Other technical proofs
C.1. Proof of two facts related to Definition 5
The comments after Definition 5 mentioned two facts, that we now prove. First, that
condition (8) is less restrictive in general than (7). Second, that for continuous target
functions ϕ, the two definitions (7) and (8) coincide, i.e., that that (8) entails (7).
Condition (8) is less restrictive in general than (7). Non-continuous target functions
need to be considered to that end. We consider a toy case when A is reduced to one element
(so that the decision-maker has no decision to make and has to play this action), and the
opponent player chooses elements in R, i.e., d = 1, and more precisely, K = [0, 1]. The
target set equals C = {0} and the target function ϕ is defined as
(
0 if m ∈ [0, 1),
ϕ(m) =
1 if m = 1.
Since d = A = 1, we can identify mt and rt . We consider the sequence mt = 1 − 1/t. We
have
(mT , rT ) −→ (1, 1) ∈ Gϕ ,
since Gϕ = (m, 0) : m ∈ [0, 1) ∪ {1} × [−1, 1] .
On the contrary, for all T , we have Cϕ(mT ) = {0} and therefore,
dp rT , Cϕ(mT ) = rT
does not converge to 0 as T → ∞ (this sequence converges to 1 actually).
Proof that (8) entails (7) under a continuity assumption. We consider a continuous
function ϕ : K → [0, +∞). To show that (8) entails (7), it suffices to show that there exists
a function f : (0, +∞) → (0, +∞) with f (ε) → 0 as ε → 0, such that for all (m, r) ∈ K ×Rd ,
dp r, Cϕ(m) 6 f dp (m, r), Gϕ ;
(43)
the required uniformities with respect to the strategies of the opponent will be carried over.
To that end, the continuity of ϕ will be exploited through the following two properties.
First, Gϕ is closed. Second, since K is bounded, ϕ is actually uniformly continuous: we
denote by ω : (0, +∞) → (0, +∞) its modulus of continuity in the `p –norm, which is a
non-decreasing function that satisfies ω(ε) → 0 as ε → 0.
We denote by (mG , rG ) the projection in `p –norm of (m, r) ∈ K × Rd onto the closed set
Gϕ . By definition, rG ∈ Cϕ(mG ) and
w
w
(44)
dp (m, r), Gϕ = w(m, r) − (mG , rG )wp > km − mG kp .
We also define an element rG0 ∈ Cϕ(m) as follows. If rG ∈ Cϕ(m) then we let rG0 = rG .
Otherwise, ϕ(mG ) − ϕ(m) > 0 and as rG ∈ Cϕ(mG ) , there exists an element r0 ∈ C such
that krG − r0 kp 6 ϕ(mG ). (We recall that C is a closed set and its expansions are closed
expansions.) We denote by d the vector
d=
1
(rG − r0 ) ;
ϕ(mG )
43
Mannor, Perchet, Stoltz
by construction, kdkp 6 1. We introduce a new point rG0 and provide a rewriting of rG :
rG0 = r0 + ϕ(m) d ∈ Cϕ(m)
and
rG = r0 + ϕ(mG ) d .
These two equalities yield that
krG − rG0 kp = ϕ(mG ) − ϕ(m) kdkp 6 ϕ(mG ) − ϕ(m) .
Summarizing, we have in all cases (whether rG belongs to Cϕ(m) or not)
w
krG − rG0 wp 6 ϕ(mG ) − ϕ(m) .
(45)
Since rG0 ∈ Cϕ(m) , we get, by a triangle inequality,
w
w
w
dp r, Cϕ(m) 6 kr − rG0 wp = w(m, r) − (m, rG0 )wp
w
w
w
w
w
w
6 w(m, r) − (mG , rG )wp + w(mG , rG ) − (m, rG )wp + w(m, rG ) − (m, rG0 )wp
6 2 dp (m, r), Gϕ + krG − rG0 kp ,
where the last inequality follows from (44). By (45) and the uniform continuity of ϕ, the
last term in the right-hand side of the display above can be bounded as
krG − rG0 kp 6 ϕ(mG ) − ϕ(m) 6 ω kmG − mk 6 ω dp (m, r), Gϕ ,
where for the last inequality, we used again (44) and the fact that ω is non-decreasing.
Putting all pieces together, we proved (43) with f : x 7→ 2x + ω(x).
C.2. A lemma used in the proof of Theorem 11
Lemma 16 Consider two positive numbers γ1 , γ2 and form the positive sequence (un ) defined by u1 = γ2 and
p
un+1 = un + 2γ1 (n + 1) un + γ2 (n + 1)2
for all n > 1. Then
∀ n > 1,
un 6 max 2γ12 , γ2 n3 .
Proof We proceed by induction and note that the relation is satisfied by construction for
n = 1. Assuming now
that it holds for some n > 1, we show that it is also true for n + 1.
Denoting C = max 2γ12 , γ2 , we get
p
√ p
un+1 = un + 2γ1 (n + 1) un + γ2 (n + 1)2 6 C n3 + 2γ1 C (n + 1) n3 + γ2 (n + 1)2 .
It suffices to show that the latter upper bound is smaller than C (n + 1)3 , which follows
from
√ p
√
2γ1 C (n + 1) n3 + γ2 (n + 1)2 6 2γ1 2C + γ2 n2 + 2γ2 n + γ2 6 3C n2 + 3C n + C ;
indeed, the first inequality comes from bounding (n+1)n3 by 2n4 and expanding
the (n+1)2
√
term, while the second inequality holds because C > γ2 and 2C > 2γ1 2C by definition
of C.
44
Approachability in Unknown Games
Appendix D. Some thoughts on the optimality of target functions
We first define a notion of optimality, based on the classical theory of mathematical orderings, with ≺ (see Definition 6) being seen as a strict partial order, with associated
non-strict partial order denoted by 4 (corresponding to the standard pointwise inequality
6 for functions).
D.1. On the existence of admissible target functions
Definition 17 A target function ϕ is admissible if it is achievable and if there exists no
other achievable target function ϕ0 such that ϕ0 ≺ ϕ.
There might exist several, even an infinite number of, admissible target functions, as
we will show below for Example 1. But there exists always at least one such admissible
function, as we show below in a non-constructive way. We unfortunately were unable to
exhibit general, concrete and closed-form admissible target functions.
Lemma 18 In any unknown game there exists at least one admissible mapping.
Proof The proof is based on an application of Zorn’s lemma. We prove below that the set
T of all achievable target functions ϕ : K → [0, +∞), which is partially ordered for 4, has
the property that every totally ordered subset TΘ = {ϕθ , θ ∈ Θ} has a lower bound in T .
In that case, Zorn’s lemma ensures that the set T contains at least one minimal element:
an element ϕ such that no other element ϕ ∈ T satisfies ϕ ≺ ϕ.
Given a totally ordered subset TΘ , we can define the target function
ϕΘ : m ∈ K 7−→ inf ϕθ (m) ;
θ∈Θ
ϕΘ is of course smaller than any element of TΘ . The point is to show that ϕΘ ∈ T , i.e.,
that ϕΘ is still achievable.
A property that we will use repeatedly below is that if two target functions are such
that ϕ 4 φ, then Gϕ ⊆ Gφ .
Now, by definition, the fact that the ϕθ are achievable means that the compact sets
Gϕθ are each approachable for the game with payoffs (x, m) ∈ ∆(A) × K 7→ (m, x m); in
particular, they are non empty. The compact set
\
GϕΘ =
Gϕθ
θ∈Θ
cannot be empty. Indeed, if it were, fixing any θ0 ∈ Θ, we would have that the subsets
Gϕθ0 \ Gϕθ cover the compact topological space Gϕθ0 . As these subsets are open sets in the
topological space Gϕθ0 , only finitely many of them would be needed for the covering, call
them Gϕθ0 \Gϕj , with j = 1, . . . , N . Since TΘ is totally ordered, one of the sets Gϕj is minimal
for inclusion ⊆, and therefore, one of the sets Gϕθ0 \ Gϕj is maximal for the inclusion ⊆,
say, the one corresponding to j = 1. Therefore, we would have Gϕθ0 \ Gϕ1 = Gϕθ0 . As TΘ is
totally ordered, we would either have ϕ1 4 ϕθ0 and Gϕ1 ⊆ Gϕθ0 , or ϕθ0 4 ϕ1 and Gϕθ0 ⊆ Gϕ1 .
This would lead to Gϕ1 = ∅ in the former case, and Gϕθ0 = ∅ in the latter case: in both
cases, to a contradiction.
45
Mannor, Perchet, Stoltz
In addition, we now prove that for all ε > 0, there exists θε ∈ Θ such that Gϕθε is
included in the open ε–expansion of GϕΘ , which we denote by GϕΘ ,ε . Indeed, denote by Hϕθ
the compact sets Hϕθ = Gϕθ \ GϕΘ ,ε . We have that
\
HϕΘ =
Hϕθ = GϕΘ \ GϕΘ ,ε = ∅ .
θ∈Θ
Therefore, by the same argument as above, we see that there must exist some θε such that
Hϕθε = ∅, which is exactly what we wanted to prove.
So, summarizing, we proved that GϕΘ is non empty and that each of its ε–open expansion is approachable (as it contains an approachable set). As in the proof of Lemma 10,
this means that GϕΘ is a 0–approachable set, thus an approachable set, or put differently,
that ϕΘ is achievable.
D.2. Illustration on Examples 1 and 2
Which response function Ψ should we choose in practice? And are target functions ϕΨ
always admissible? A convenient and natural choice in practice is Ψ = x? , but Example 2
?
shows that unfortunately, ϕx is not always admissible. Example 1 shows that many different target functions ϕΨ may be admissible. It is thus difficult to issue any general theory
on how to choose Ψ and even on the optimality of the class of target functions ϕΨ .
?
?
Example 2: unfortunately, ϕx is not admissible. Indeed, we have ϕ1/2 ≺ ϕx , as
can be seen by carefully comparing the closed-form expressions (41) and (42). On the other
hand, ϕ1/2 is achievable: it suffices to play xt = (1/2, 1/2) at each round. Actually, ϕ1/2 is
of the form ϕΨ for the constant response function Ψ ≡ (1/2, 1/2).
Example 1: all the target functions associated with the Ψx ≡ (x, 1 − x) are
admissible. We illustrate the general existence result of Lemma 18 by showing that in
Example 1 the target functions ϕx = ϕΨx associated with the constant response functions
Ψx ≡ (x, 1 − x) are admissible, for all x ∈ [0, 1]. This corresponds to the case when the
decision-maker chooses the mixed action (x, 1 − x) at all rounds. In particular, the proof of
?
Lemma 8 indicates that ϕ1 = ϕx , the latter is thus admissible unlike in Example 2.
Closed-form expressions of these target functions ϕx will be needed. For ν ∈ [0, 1], when
the decision-maker plays (x, 1 − x) while the vector of vector payoffs is m(ν) , she gets an
average payoff which we denote by r (x, 1 − x), m(ν) and which equals
r (x, 1 − x), m(ν) = x ν m†1 + (1 − ν)m]1 + (1 − x) ν m†2 + (1 − ν)m]2
3
4
0
5
=x ν
+ (1 − ν)
+ (1 − x) ν
+ (1 − ν)
4
3
5
0
x(4 − ν) + 5(1 − x)(1 − ν)
5 − x − ν(5 − 4x)
=
=
.
x(3 + ν) + 5(1 − x)ν
3x + ν(5 − 4x)
The underlying response function Ψx being constant,
no convex decomposition needs to be
(ν)
considered in the defining supremum for ϕx m
and the latter equals
ϕx m(ν) = d∞ r (x, 1 − x), m(ν) , (−∞, 0]2 = max 5 − x − ν(5 − 4x), 3x + ν(5 − 4x) .
46
Approachability in Unknown Games
Since ν 7→ 5 − x − ν(5 − 4x) is decreasing, and ν 7→ 3x + ν(5 − 4x) is increasing, and both
functions take the same value 5/2 − x/2 at ν = 1/2, we get
(
5 − x − ν(5 − 4x) if ν ∈ [0, 1/2],
(ν)
ϕx m
=
3x + ν(5 − 4x)
if ν ∈ [1/2, 1].
Our proof follows the methodology used to prove Lemma 3. We fix any strategy of the
decision-maker achieving a target function ϕ 6 ϕx , for some fixed x ∈ [0, 1], and we show
that necessarily, ϕ = ϕx . We provide a detailed proof of the equality only for m(ν) where ν
lies in the interval (3/4, 1]; but this proof can be adapted in a straightforward manner to
prove the equality as well the intervals [0, 1/4], [1/4, 1/2] and [1/2, 3/4]. As in the proof
of Lemma 3, it suffices to consider the almost sure statement of convergence as in (3); the
uniformity with respect to strategies of the opponent is not needed. All statements below
hold almost surely and the times T and T 0 should be thought of as random variables.
Our argument for ν ∈ [3/4, 1] is based on three sequences of mixed actions. For the
first one, assume that the opponent chooses m† (corresponding to ν = 1) during T stages,
where T can be made arbitrarily large. We denote by (vT , 1 − vT ) the average of the mixed
actions (xt , 1 − xt ) played by the decision-maker during these rounds. The average payoff
vector received equals
3vT
,
5 − vT
whose distance to the negative orthant is 5 − vT . Since ϕx (m† ) = 5 − x and the strategy
achieves ϕ(m† ), where by assumption ϕ(m† ) 6 ϕx (m† ), it holds that lim sup 5 − vT 6 5 − x
as T → ∞. For the sake of compactness, we will denote this fact by 5 − vT . 5 − x. This
entails that lim inf vT > x as T → ∞, a fact that we denote by vT & x.
During the next T stages, we assume that the opponent chooses m] (which corresponds
to ν = 0) and denote by (wT , 1 − wT ) the average of the mixed actions (xt , 1 − xt ) played
by the decision-maker during these rounds. The average payoff vectors received between
rounds T + 1 to 2T , on the one hand, and during rounds 1 to 2T , on the other hand, are
therefore respectively equal to
1 3vT + 5 − wT
5 − wT
and
,
3wT
2 5 − vT + 3wT
so that the distance of the latter to the negative orthant is given by
1
max 3vT + 5 − wT , 5 − vT + 3wT ,
2
which we know is asymptotically smaller than ϕ m(1/2) by achievability of ϕ, where by
assumption
ϕ m(1/2) 6 ϕx m(1/2) = 5/2 + x .
We thus obtained the following system of equations:
vT & x,
3vT − wT . 2x,
−vT + 3wT . 2x.
47
Mannor, Perchet, Stoltz
The sum of the last two inequalities is vT + wT . 2x. Together with the first inequality
vT & x, it leads to wT . x. Substituting in the second inequality, we get 3vT − wT ≈ 2x,
where the ≈ symbol denotes a convergence: 3vT −wT → 2x as T → ∞. Summing the proved
limits −9vT + 3wT ≈ −6x and 8vT & 8x yields −vT + 3wT & 2x, thus −vT + 3wT ≈ 2x.
From the latter limit and 3vT − wT ≈ 2x, we finally get vT ≈ x and wT ≈ x.
Consider now some ν > 3/4. We show that ϕ(ν) > ϕx (ν). To that end, assume that
after the T stages of m† the opponent switches instead to m(3/4) = (3/4) m† + (1/4) m]
during
1−ν
T0 =
T
ν − 3/4
rounds. Note that in this case, the average values of the coefficients for m† and m] used in
the first T + T 0 rounds are proportional to
1+
ν
3 1−ν
=
4 ν − 3/4
4ν − 3
and
0+
1 1−ν
1−ν
=
4 ν − 3/4
4ν − 3
(46)
that is, mT +T 0 = m(ν) = ν m† + (1 − ν) m] was played. We perform first some auxiliary
calculations: by multiplying the equalities in (46) by T , we see that the total number T + T 0
of rounds equals T + T 0 = T /(4ν − 3). In particular, we have
T /(T + T 0 ) = 4ν − 3
and
T 0 /(T + T 0 ) = 1 − (4ν − 3) = 4 − 4ν .
Finally, denoting by uT 0 the average mixed action played by the decision-maker in rounds
T + 1 to T + T 0 , we have that the average vector payoffs during rounds T + 1 to T + T 0 and
during rounds 1 to T + T 0 are respectively equal to
5 − uT 0 − (3/4)(5 − 4uT 0 )
2uT 0 + 5/4
r (uT 0 , 1 − uT 0 ), 3/4 =
=
15/4
3uT 0 + (3/4)(5 − 4uT 0 )
and
2uT 0 + 5/4
.
15/4
(47)
The overall average payoff is given by the distance of this
vector in the supremum norm to
the negative orthant and must be smaller than ϕ m(ν) in the limit, by achievability of ϕ.
However, the said distance of (47) to the negative orthant is bound to be larger than the
second component of (47), which equals
T
T + T0
3vT
5 − vT
+
T0
T + T0
(4ν − 3)(5 − vT ) + (4 − 4ν)
2uT 0 + 5/4
15/4
= (4ν−3)
3vT
5 − vT
+(4−4ν)
15
15
−→ (4ν − 3)(5 − x) + (4 − 4ν) = 5ν + 3x − 4νx = ϕx m(ν) ,
4
4
as T → ∞, where we substituted
the above
limit vT → x.
We thus proved ϕ m(ν) > ϕx m(ν) , as claimed.
48
| 10math.ST
|
Journal of Machine Learning Research (X) (manuscript under review)
Submitted 1/18; Published XX/XX
Expected Policy Gradients for Reinforcement Learning
Kamil Ciosek
Shimon Whiteson
[email protected]
[email protected]
arXiv:1801.03326v1 [stat.ML] 10 Jan 2018
Department of Computer Science, University of Oxford
Wolfson Building, Parks Road, Oxford OX1 3QD
Editor: David Blei and Bernhard Schölkopf
Abstract
We propose expected policy gradients (EPG), which unify stochastic policy gradients (SPG)
and deterministic policy gradients (DPG) for reinforcement learning. Inspired by expected
sarsa, EPG integrates (or sums) across actions when estimating the gradient, instead of
relying only on the action in the sampled trajectory. For continuous action spaces, we first
derive a practical result for Gaussian policies and quadric critics and then extend it to
an analytical method for the universal case, covering a broad class of actors and critics,
including Gaussian, exponential families, and reparameterised policies with bounded support.
For Gaussian policies, we show that it is optimal to explore using covariance proportional
to eH , where H is the scaled Hessian of the critic with respect to the actions. EPG also
provides a general framework for reasoning about policy gradient methods, which we use to
establish a new general policy gradient theorem, of which the stochastic and deterministic
policy gradient theorems are special cases. Furthermore, we prove that EPG reduces the
variance of the gradient estimates without requiring deterministic policies and with little
computational overhead. Finally, we show that EPG outperforms existing approaches on
six challenging domains involving the simulated control of physical systems.
Keywords: policy gradients, exploration, bounded actions, reinforcement learning, Markov
decision process (MDP)
1. Introduction
In reinforcement learning, an agent aims to learn an optimal behaviour policy from trajectories
sampled from the environment. In settings where it is feasible to explicitly represent the
policy, policy gradient methods (Sutton et al., 2000; Peters and Schaal, 2006, 2008b; Silver
et al., 2014), which optimise policies by gradient ascent, have enjoyed great success, especially
with large or continuous action spaces. The archetypal algorithm optimises an actor, i.e., a
policy, by following a policy gradient that is estimated using a critic, i.e., a value function.
The policy can be stochastic or deterministic, yielding stochastic policy gradients (SPG)
(Sutton et al., 2000) or deterministic policy gradients (DPG) (Silver et al., 2014). The theory
underpinning these methods is quite fragmented, as each approach has a separate policy
gradient theorem guaranteeing the policy gradient is unbiased under certain conditions.
Furthermore, both approaches have significant shortcomings. For SPG, variance in the
gradient estimates means that many trajectories are usually needed for learning. Since
gathering trajectories is typically expensive, there is a great need for more sample efficient
methods.
c X Kamil Ciosek and Shimon Whiteson.
License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/. Attribution requirements are provided
at http://jmlr.org/papers/v/ciosekwhiteson17.html.
Ciosek and Whiteson
DPG’s use of deterministic policies mitigates the problem of variance in the gradient
but raises other difficulties. The theoretical support for DPG is limited since it assumes
a critic that approximates ∇a Q when in practice it approximates Q instead. In addition,
DPG learns off-policy 1 , which is undesirable when we want learning to take the cost of
exploration into account. More importantly, learning off-policy necessitates designing a
suitable exploration policy, which is difficult in practice. In fact, efficient exploration in DPG
is an open problem and most applications simply use independent Gaussian noise or the
Ornstein-Uhlenbeck heuristic (Uhlenbeck and Ornstein, 1930; Lillicrap et al., 2015).
This article, which extends our previous work (Ciosek and Whiteson, 2018), proposes a
new approach called expected policy gradients (EPG) that unifies policy gradients in a way
that yields both theoretical and practical insights. Inspired by expected sarsa (Sutton and
Barto, 1998; van Seijen et al., 2009), the main idea is to integrate across the action selected
by the stochastic policy when estimating the gradient, instead of relying only on the action
selected during the sampled trajectory.
The contributions of this paper are threefold. First, EPG enables two general theoretical
contributions (Section 3.1): 1) a new general policy gradient theorem, of which the stochastic
and deterministic policy gradient theorems are special cases, and 2) a proof that (Section 3.2)
EPG reduces the variance of the gradient estimates without requiring deterministic policies
and, for the Gaussian case, with no computational overhead over SPG. Second, we define
practical policy gradient methods. For the Gaussian case (Section 4), the EPG solution is not
only analytically tractable but also leads to a principled exploration strategy (Section 4.2)
for continuous problems, with an exploration covariance that is proportional to eH , where H
is the scaled Hessian of the critic with respect to the actions. We present empirical results
(Section 6) confirming that this new approach to exploration substantially outperforms
DPG with Ornstein-Uhlenbeck exploration in six challenging MuJoCo domains. Third, we
provide a way of deriving tractable EPG methods for the general case of policies coming
from a certain exponential family (Section 5) and for critics that can be reparameterised as
polynomials, thus yielding analytic EPG solutions that are tractable for a broad class of
problems and essentially making EPG a universal method. Finally, in Section 7, we relate
EPG to other RL approaches.
2. Background
A Markov decision process (Puterman, 2014) is a tuple (S, A, R, p, p0 , γ) where S is a set
of states, A is a set of actions (in practice either A = Rd or A is finite), R(s, a) is a
reward function, p(s0 | a, s) is a transition kernel, p0 is an initial state distribution, and
γ ∈ [0, 1) is a discount factor. A policy π(a | s) is a distribution over actions given a state.
We denote trajectories as τ π = (s0 , a0 , r0 , s1 , a1 , r1 , . . . ), where s0 ∼ p0 , at ∼ π(· | st−1 )
and rt is a sample
reward. A policy π induces a Markov process with transition kernel
R
0
pπ (s | s) = a dπ(a | s)p(s0 | a, s) where we use the symbol dπ(a | s) to denote Lebesgue
integration against the measure π(a | s) where s is fixed. We assume the induced Markov
process is ergodic with a single
P invariant measure defined for the whole state space. The
value function is V π = Eτ [ i γi ri ] where actions are sampled from π. The Q-function is
1. We show in this article that, in certain settings, off-policy DPG is equivalent to EPG, our on-policy
method.
2
Expected Policy Gradients
Qπ (a | s) = ER [r | s, a] + γEpπ (s0 |s) [V π (s0 ) | s] and the advantage function Ris Aπ (a | s) =
Qπ (a | s) − V π (s). An optimal policy maximises the total return J = s dp0 (s)V π (s).
Since we consider only on-policy learning with just one current policy, we drop the π
super/subscript where it is redundant.
If π is parameterised by θ, then stochastic policy gradients (SPG) (Sutton et al., 2000;
Peters and Schaal, 2006, 2008b) perform gradient ascent on ∇J, the gradient of J with
respect to θ (gradients without a subscript are always with respect to θ). For stochastic
policies, we have:
R
R
∇J = s dρ(s) a dπ(a | s)∇ log π(a | s)(Q(a, s) + b(s)),
(1)
where ρ is the discounted-ergodic occupancy measure, defined in the Appendix, and b(s) is
a
R baseline, which can be any function that depends on the state but not the action, since
a dπ(a | s)∇ log π(a | s)b(s) = 0. Typically, because of ergodicity and Lemma 18 (see
Appendix), we can approximate (1) from samples from a trajectory τ of length T :
ˆ = PT γ t ∇ log π(at | st )(Q̂(at , st ) + b(st )),
∇J
t=0
(2)
where Q̂(at , st ) is a critic, discussed below. If the policy is deterministic (we denote it π(s)),
we can use deterministic policy gradients (Silver et al., 2014) instead:
R
∇J = s dρ(s)∇π(s) [∇a Q(a, s)]a=π(s) .
(3)
This update is then approximated using samples:
h
i
ˆ = PT γ t ∇π(s) ∇a Q̂(a, st )
∇J
t=0
a=π(st )
.
(4)
Since the policy is deterministic, the problem of exploration is addressed using an external
source of noise, typically modelled using a zero-mean Ornstein-Uhlenbeck (OU) process
(Uhlenbeck and Ornstein, 1930; Lillicrap et al., 2015) parameterised by ψ and σ:
ni ← −ni−1 ψ + N (0, σI)
a ∼ π(s) + ni .
(5)
In (2) and (4), Q̂ is a critic that approximates Q and can be learned by sarsa (Rummery
and Niranjan, 1994; Sutton, 1996):
Q̂(at , st ) ←Q̂(at , st ) + α rt+1 + γ Q̂(st+1 , at+1 ) − Q̂(at , st ) .
(6)
Alternatively, we can use expected sarsa (Sutton and Barto, 1998; van Seijen et al., 2009),
which marginalises out at+1 , the distribution over which is specified by the known policy, to
reduce the variance in the update:
R
Q̂(st , at ) ← Q̂(at , st ) + α rt+1 + γ a dπ(a | s)Q̂(st+1 , a) − Q̂(at , st ) .
(7)
We could also use advantage learning (Baird et al., 1995) or LSTDQ (Lagoudakis and Parr,
2003). If the critic’s function approximator is compatible, then the actor, i.e., π, converges
(Sutton et al., 2000).
3
Ciosek and Whiteson
Instead of learning Q̂, we can set b(s) = −V (s) so that Q(a, s) + b(s) = A(s, a) and then
use the TD error δ(r, s0 , s) = r + γV (s0 ) − V (s) as an estimate of A(s, a) (Bhatnagar et al.,
2008):
ˆ = PT γ t ∇ log π(at | st )(r + γ V̂ (s0 ) − V̂ (s)),
∇J
t=0
(8)
where V̂ (s) is an approximate value function learned using any policy evaluation algorithm.
(8) works because E [δ(r, s0 , s) | a, s] = A(s, a), i.e., the TD error is an unbiased estimate
of the advantage function. The benefit of this approach is that it is sometimes easier to
approximate V than Q and that the return in the TD error is unprojected, i.e., it is not
distorted by function approximation. However, the TD error is noisy, introducing variance
in the gradient.
To cope with this variance, we can reduce the learning rate when the variance of the
gradient would otherwise explode, using, e.g., Adam (Kingma and Ba, 2014), natural
policy gradients (Kakade, 2002; Amari, 1998; Peters and Schaal, 2008a) or Newton’s method
(Furmston and Barber, 2012). However, this results in slow learning when the variance is
high. See Section 7 for further discussion on variance reduction techniques.
3. Expected Policy Gradients
In this section, we propose expected policy gradients (EPG). First, we introduce IπQ (s) to
denote the inner integral in (1):
Z
Z
∇J = dρ(s) dπ(a | s)∇ log π(a | s)(Q(a, s) + b(s))
s
|a
{z
}
IπQ (s)
Z
=
Z
dπ(a | s)∇ log π(a | s)Q(a, s)
dρ(s)
Zs
=
a
dρ(s)IπQ (s).
(9)
s
This suggests a new way to write the approximate gradient2 , using Lemma 18 (see Appendix):
ˆ =
∇J
T
X
t=0
γ t IπQ̂ (st ),
| {z }
where
IπQ̂ (s) =
Z
dπ(a | s)∇ log π(a | s)Q̂(a, s).
(10)
a
gt
This approach makes explicit that one step in estimating the gradient is to evaluate an
integral included in the term IπQ̂ (s). The main insight behind EPG is that, given a state,
IπQ̂ (s) is expressed fully in terms of known quantities. Hence we can manipulate it analytically
to obtain a formula or we can just compute the integral using numerical quadrature if an
analytical solution is impossible (in Section 5.1 we show that this is rare). For a discrete
action space, IπQ̂ (st ) becomes a sum over actions.
2. The idea behind EPG was also independently and concurrently developed as Mean Actor Critic (Asadi
et al., 2017), though only for discrete actions and without a supporting theoretical analysis.
4
Expected Policy Gradients
SPG as given in (2) performs this quadrature using a simple one-sample Monte Carlo
method as follows, using the action at ∼ π(· | st ).
IπQ̂ (s)
Z
dπ(a | s)∇ log π(a | s)Q̂(a, s) ≈ ∇ log π(at | st )(Q̂(at , st ) + b(st ))
=
a
Moreover, SPG assumes that the action at used in the above estimation is the same action
that is executed in the environment. However, relying on such a method is unnecessary.
In fact, the actions used to interact with the environment need not be used at all in the
evaluation of IˆπQ (s) since a is a bound variable in the definition of IπQ (s). The motivation is
thus similar to that of expected sarsa but applied to the actor’s gradient estimate instead of
the critic’s update rule. EPG, shown in Algorithm 1, uses (10) to form a policy gradient
algorithm that repeatedly estimates IˆπQ (s) with an integration subroutine.
Algorithm 1 Expected policy gradients
1: s ← s0 , t ← 0
2: initialise optimiser, initialise policy π parameterised by θ
3: while not converged do
4:
gt ← γ t do-integral(Q̂, s, πθ )
. gt is the estimated policy gradient as per (10)
5:
θ ← θ + optimiser.update(gt )
6:
a ∼ π(·, s)
7:
s0 , r ← simulator.perform-action(a)
8:
Q̂.update(s, a, r, s0 )
9:
t←t+1
10:
s ← s0
11: end while
One of the motivations of DPG was precisely that the simple one-sample Monte-Carlo
quadrature implicitly used by SPG often yields high variance gradient estimates, even with
a good baseline. To see why, consider Figure 1 (left). A simple Monte Carlo method
evaluates the integral by sampling one or more times from π(a | s) (blue) and evaluating
∇µ log π(a | s)Q(a, s) (red) as a function of a. A baseline can decrease the variance by
adding a multiple of ∇µ log π(a | s) to the red curve, but the problem remains that the
red curve has high values where the blue curve is almost zero. Consequently, substantial
variance persists, whatever the baseline, even with a simple linear Q-function, as shown in
Figure 1 (right). DPG addressed this problem for deterministic policies but EPG extends
it to stochastic ones. We show in Section 5 that an analytical EPG solution, and thus the
corresponding reduction in the variance, is possible for a wide array of critics. We also
discuss the rare case where numerical quadrature is necessary in Section 5.4.
We now provide our most general results, which apply to EPG in any setting.
3.1 General Policy Gradient Theorem
We begin by stating our most general result, showing that EPG can be seen as a generalisation
of both SPG and DPG. To do this, we first state a new general policy gradient theorem.
5
Ciosek and Whiteson
15
SPG update
10
5
−1.0
−0.5
0
0.0
variance of MC
policy PDF
0.5
1.0
action
−0.70
−0.60
−0.50
−0.40
−0.30
baseline
Figure 1: At left, π(a | s) for a Gaussian policy with mean µ = θ = 0 at a given state and
constant σ 2 (blue) and ∇θ log π(a | s)Q(a, s) for Q = 12 + 12 a (red). At right, the variance
of a simple single-sample Monte Carlo estimator as a function of the baseline. In a simple
multi-sample Monte Carlo method, the variance would go down as the number of samples.
Theorem 1 (General Policy Gradient Theorem) If π(·, s) is a normalised Lebesgue
measure for all s, then
Z
Z
∇J = dρ(s) ∇V (s) − dπ(a|s)∇Q(a, s) .
s
a
|
{z
}
IG (s)
Proof We begin by expanding the following expression.
R
R
R
R
R
0
0
s dρ(s) a dπ(a|s)∇Q(a, s) = Rs dρ(s) Ra dπ(a|s)∇(R(a, s) + γR s0 dp(s | s, a)V (s ))
= s dρ(s) a dπ(a|s)(∇R(a, s) +γ s0 dp(s0 | s, a)∇V (s0 ))
| {z }
0
R
R
= γ s dρ(s) s0 dpπ (s0 | s)∇V (s0 )
R
R
= s dρ(s)∇V (s) − s dp0 (s)∇V (s)
|
{z
}
∇J
R
= s dρ(s)∇V (s) − ∇J.
The first equality follows by expanding the definition of Q and the penultimate one follows
from Lemma 19 in the Appendix. Then the theorem follows by rearranging terms.
The crucial benefit of Theorem 1 is that it works for all policies, both stochastic and
deterministic, unifying previously separate derivations for the two settings. To show this,
in the following two corollaries, we use Theorem 1 to recover the stochastic policy gradient
theorem (Sutton et al., 2000) and the deterministic policy gradient theorem (Silver et al.,
2014), in each case by introducing additional assumptions to obtain a formula for IG (s)
expressible in terms of known quantities.
Corollary 2 (Stochastic Policy Gradient Theorem) If π(· | s) is differentiable, then
R
R
R
∇J = s dρ(s)IG (s) = s dρ(s) a dπ(a | s)∇ log π(a | s)Q(a, s).
6
Expected Policy Gradients
Proof We obtain the following by expanding ∇V .
R
R
R
∇V = ∇ a dπ(a|s)Q(a, s) = a da(∇π(a|s))Q(a, s) + a dπ(a|s)(∇Q(a, s))
R
We obtain IG (s) = a dπ(a | s)∇ log π(a | s)Q(a, s) = IπQ (s) by plugging this into the definition of IG (s). We obtain ∇J by invoking Theorem 1 and plugging in the above expression
for IG (s).
We now recover the DPG update introduced in (3).
Corollary 3 (Deterministic Policy Gradient Theorem) If π(· | s) is a Dirac-delta
measure (i.e., a deterministic policy) and Q(·, s) is differentiable, then
R
R
∇J = s dρ(s)IG (s) = s dρ(s)∇π(s) [∇a Q(a, s)]a=π(s) .
We overload
the notation of π slightly. We denote by π(s) the action taken at state s, i.e.
R
π(s) = a adπ(a | s), where π(· | s) is the corresponding Dirac-delta measure.
Proof We begin by expanding the term for ∇V (s), which will be useful later on.
∇V (s) = ∇Q(π(s), a) = [∇Q(a, s)]a=π(s) + [∇a Q(a, s)]a=π(s) ∇π(s)
(11)
The above results from applying the multivariate chain rule—observe that both π(s) and
Q(a, s) depend on the policy parameters θ; hence, the dependency appears twice in Q(π(s), s).
We proceed to obtain an expression for IG (s).
R
IG (s) = ∇V (s) − a dπ(a|s)∇Q(a, s)
= ∇V (s) − [∇Q(a, s)]a=π(s)
= ∇π(s) [∇a Q(a, s)]a=π(s) .
Here, the second equality follows by observing that the policy is a Dirac-delta and the third
one follows from using (11). We can then obtain ∇J by invoking Theorem 1 and plugging
in the above expression for IG (s).
These corollaries show that the choice between deterministic and stochastic policy
gradients is fundamentally a choice of quadrature method. Hence, the empirical success of
DPG relative to SPG (Silver et al., 2014; Lillicrap et al., 2015) can be understood in a new
light. In particular, it can be attributed, not to a fundamental limitation of stochastic policies
(indeed, stochastic policies are sometimes preferred), but instead to superior quadrature.
DPG integrates over Dirac-delta measures, which is known to be easy, while SPG typically
relies on simple Monte Carlo integration. Thanks to EPG, a deterministic approach is no
longer required to obtain a method with low variance.
3.2 Variance Analysis
We now prove that for any policy, the EPG estimator of (10) has lower variance than the
SPG estimator of (2).
7
Ciosek and Whiteson
Lemma 4 If for all s ∈ S, the random variable ∇ log π(a | s)Q̂(a, s) where a ∼ π(·|s) has
nonzero variance, then
hP
i
hP
i
∞
∞
t ∇ log π(a | s )(Q̂(a , s ) + b(s )) > V
t I Q̂ (s ) .
Vτ
γ
γ
π
t
t
t
t
t
τ
t
t=0
t=0
Proof Both random variables have the same mean so we need only show that:
2
2
P∞ t
P∞ t Q̂
Eτ
> Eτ
.
t=0 γ ∇ log π(at | st )(Q̂(at , st ) + b(st ))
t=0 γ Iπ (st )
We start by applying Lemma 21 to the lefthand side and setting X = X1 (st ) = γ t ∇ log π(at |
st )(Q̂(at , st ) + b(st )) where at ∼ π(at |st ). This shows that
2
P∞ t
Eτ
t=0 γ ∇ log π(at | st )(Q̂(at , st ) + b(st ))
is the total return of the MRP (p, p0 , u1 , γ 2 ), where
2
u1 = VX1 (x|s) [x] + EX1 (x|s) [x] + 2γEX1 (x|s) [x] Ep(s0 |s) V (s0 ) .
Likewise, applying Lemma 21 again to the righthandside, instantiating X as a deterministic
2
P∞ t Q̂
random variable X2 (st ) = IπQ̂ (st ), we have that Eτ
is the total return
t=0 γ Iπ (st )
of the MRP (p, p0 , u2 , γ 2 ), where
2
u2 = EX2 (x|s) [x] + 2γEX2 (x|s) [x] Ep(s0 |s) V (s0 ) .
Note that EX1 (x|s) [x] = EX2 (x|s) [x] and therefore u1 ≥ u2 . Furthermore, by assumption of
the lemma, the inequality is strict. The lemma then follows by applying Observation 22.
For convenience, Lemma 4 also assumes infinite length trajectories. However, this is not
a practical limitation since all policy gradient methods implicitly assume trajectories are
long enough to be modelled as infinite. Furthermore, a finite trajectory variant also holds,
though the proof is messier.
Lemma 4’s assumption is reasonable since the only way a random variable ∇ log π(a |
s)Q̂(a, s) could have zero variance is if it were the same for all actions in the policy’s support
(except for sets of measure zero), in which case optimising the policy would be unnecessary.
Since we know that both the estimators of (2) and (10) are unbiased, the estimator with
lower variance has lower MSE. Moreover, we observe that Lemma 4 holds for the case where
the computation of IπQ̂ is exact. Section 5 shows that this is often possible.
4. Expected policy gradients for Gaussian Policies
EPG is particularly useful when we make the common assumption of a Gaussian policy: we
can then perform the integration analytically under reasonable conditions. We show below
8
Expected Policy Gradients
Algorithm 2 Gaussian policy gradients
1: s ← s0 , t ← 0
2: initialise optimiser
3: while not converged do
4:
gt ← γ t do-integral-Gauss(Q̂, s, πθ )
5:
θ ← θ + optimiser.update(gt )
. policy parameters θ are updated using gradient
1/2
1/2
6:
Σs ← get-covariance(Q̂, s, πθ )
. Σs computed from scratch
7:
a ∼ π(· | s)
. π(· | s) = N (µs , Σs )
8:
s0 , r ← simulator.perform-action(a)
9:
Q̂.update(s, a, r, s0 )
10:
t←t+1
11:
s ← s0
12: end while
Algorithm 3 Gaussian integrals
function do-integral-Gauss(Q̂, s, πθ )
Q
2:
Iπ(s),µ
← (∇µs )∇a Q̂(a = µs , s)
s
1:
3:
4:
. Use Lemma 5
Q
Iπ(s),µ
s
return
end function
5:
function get-covariance(Q̂, s, πθ )
7:
H ← compute-Hessian(Q̂(µs , s))
8:
return σ0 ecH
9: end function
6:
. Use Lemma 6
(see Corollary 7) that the update to the policy mean computed by EPG is equivalent to
the DPG update. Moreover, we derive a simple formula for the covariance (see Lemma 6).
Algorithms 2 and 3 show the resulting special case of EPG, which we call Gaussian policy
gradients (GPG).
Surprisingly, GPG is on-policy but nonetheless fully equivalent to DPG, an off-policy
method, with a particular form of exploration. Hence, GPG, by specifying the policy’s
covariance, can be seen as a derivation of an exploration strategy for DPG. In this way,
GPG addresses an important open question. As we show in Section 6, this leads to improved
performance in practice.
The computational cost of GPG is small: while it must store a Hessian matrix H(a, s) =
∇2a Q̂(a, s), its size is only d × d, where A = Rd , which is typically small, e.g., d = 6 for
HalfCheetah-v1, one of the MuJoCo tasks we use for our experiments in Section 6. This
Hessian is the same size as the policy’s covariance matrix, which any policy gradient must
store anyway, and should not be confused with the Hessian with respect to the parameters of
the neural network, as used with Newton’s or natural gradient methods (Peters and Schaal,
2008a; Furmston et al., 2016), which can easily have thousands of entries. Hence, GPG
obtains EPG’s variance reduction essentially for free.
9
Ciosek and Whiteson
4.1 Analytical Quadrature for Gaussian Policies
We now derive a lemma supporting GPG.
Lemma 5 (Gaussian Policy Gradients) If the policy is Gaussian, i.e. π(·|s) ∼ N (µs , Σs )
1/2
with µs and Σs parameterised by θ, and the critic is of the form Q(a, s) = a> A(s)a +
a> B(s) + const, then
>
Q
Q
Q
Iπ (s) = Iπ(s),µs I
,
1/2
π(s),Σs
where the mean and covariance components are given by:
Q
Iπ(s),µ
= (∇µs )B(s),
s
IQ
1/2
π(s),Σs
1/2
= (∇Σ1/2
s )Σs A(s).
(12)
Proof For ease of presentation, we prove the lemma for a one-dimensional action space,
1/2
where µs , a ∈ R and Σs = σs is the standard deviation (we drop the suffix s in µs and
σs in the subsequent formulae). First, note that the constant term in the critic does not
influence the value of IπQ (s) since it depends only on the state and not on the action and
can be treated as a baseline. Observe that
Q
Iπ(s),µ
= (∇µ)Eπ [∇µ log π(a|s)Q(a, s)]
h
i
h
i
= (∇µ) Eπ ∇µ log π(a|s)a> B(s) Eπ ∇µ log π(a|s)a> A(s)a .
We consider the linear term and the quadric term separately. For the linear term we have:
a−µ
Eπ [∇µ log π(a|s)aB(s)] = Eπ
B(s)a
σ2
1
= 2 Eπ B(s)a2 − B(s)aµ =
σ
1
= 2 B(s)Eπ a2 − B(s)µEπ [a]
σ
1
= 2 B(s) σ 2 + µ2 − B(s)µµ = B(s).
σ
For the quadric term we have:
1
Eπ ∇µ log π(a|s)a2 A(s) = 2 Eπ a2 A(s)(a − µ) =
σ
A(s)
= 2 Eπ a3 − a2 µ =
σ
A(s) 3
= 2 µ + 3µσ 2 − (µ2 + σ 2 )µ =
σ
= 2A(s)µ
Summing the two terms yields:
Q
Iπ(s),µ
= ∇µ(2A(s)µ + B(s)).
10
Expected Policy Gradients
We now calculate the integrals for the standard deviation, again beginning with the
linear term:
(a − µ)2
1
Eπ [∇σ log π(a|s)aB(s)] = Eπ B(s)a
− B(s)a
σ3
σ
1 3
B(s)
2
2
= σ Eπ σ2 a − 2a µ + µ a − a
1
µ3 + 3µσ 2 − 2(µ2 + σ 2 )µ + µ3 − µ
= B(s)
σ
σ2
=
B(s)
σ (µ
− µ) = 0.
For the quadric term we have:
Eπ ∇σ log π(a|s)A(s)a2
2
2 (a − µ)
21
= Eπ A(s)a
− A(s)a
σ3
σ
1 4
A(s)
3
2
2
= σ Eπ σ2 (a − 2a µ + µ a ) − a2
1 4
= A(s)
(µ + 6µ2 σ 2 + 3σ 4 − 2µ(µ3 + 3µσ 2 ) + µ2 (µ2 + σ 2 )) − (µ2 + σ 2 )
σ
σ2
= 2A(s)σ.
Summing the two terms yields:
Q
Iπ(s),σ
= ∇σ(2A(s)σ).
The multivariate case (i.e., with a multi-dimensional action space) can be obtained using
the method developed in Section 5 later in the paper by observing that the multivariate
normal distribution is in the parametric family given by (15) with the sufficient statistic
vector T containing the vector a and the vectorised matrix aa> , both of which are polynomial
in a, and hence Lemma 8 is applicable.
While Lemma 5 requires the critic to be quadric in the actions, this assumption is not very
restrictive since the coefficients B(s) and A(s) can be arbitrary continuous functions of the
state, e.g., a neural network.
4.2 Exploration using the Hessian
Equation (12) suggests that we can include the covariance in the actor network and learn it
along with the mean, using the update rule:
1/2
Σ1/2
← Σ1/2
s
s + αΣs H(s).
(13)
However, another option is to compute the covariance from scratch at each iteration by
analytically computing the result of applying (13) infinitely many times, as in the following
lemma.
Lemma 6 (Exploration Limit) The iterative procedure defined by (13) applied n times
1/2
using the diminishing learning rate α = 1/n converges to Σs ∝ eH(s) as n → ∞.
11
Ciosek and Whiteson
eigenvalue increases
sharp maximum,
very little exploration
sharp minimum,
lots of exploration
moderate exploration
Figure 2: The parabolas show different possible curvatures of the critic Q̂(·, s). We set
exploration to be the strongest for sharp mimima, on the left side of the figure. The
exploration strength then decreases as we move towards the right. There is almost no
exploration to the far right, where we have a sharp maximum.
1/2
1/2
1/2
1/2
Proof Consider the sequence (Σs )1 = σ0 I, (Σs )n = (Σs )n−1 + n1 (Σs )n−1 H(s). We
diagonalise the Hessian as H(s) = U ΛU > for some orthonormal matrix U and obtain the
following expression for the n-th element of the sequence:
(Σ1/2
s )n+1 = (I +
1
1
H(s))n σ0 = U (I + Λ)n U > σ0 .
n
n
Since we have limn→∞ (1 − n1 λ)n = eλ for each eigenvalue of the Hessian, we obtain the
identity:
1
lim U (I + Λ)n U > σ0 = σ0 eH(s) .
n→∞
n
The practical implication of Lemma 6 is that, in a policy gradient method, it is justified3
to use Gaussian exploration with covariance proportional to ecH for some reward scaling
constant c. Thus, by exploring with (scaled) covariance ecH , we obtain a principled alternative
to the Ornstein-Uhlenbeck heuristic of (5). Our results below show that it also performs
much better in practice.
Lemma 6 has an intuitive interpretation. If H(s) has a large positive eigenvalue λ, then
Q̂(s, ·) has a sharp minimum along the corresponding eigenvector, and the corresponding
eigenvalue of Σ1/2 is eλ , i.e., also large. This is easiest to see with a one-dimensional action
space, where the Hessian and its only eigenvalue are just the same scalar. The exploration
mechanism in the one-dimensional case is illustrated in Figure 2. The idea is simple: the
larger the eigenvalue the worse the minimum we are in and the more exploration we need to
leave it. On the other hand, if λ is negative, then Q̂(s, ·) has a maximum and so eλ is small,
since exploration is not needed.
In the multi-dimensional case, the critic can have saddle points, as shown in Figure 3.
For the case shown in the figure, we explore little along the blue eigenvector (since the
intersection of Q(·, s) with the blue plane shows a maximum) and much more along the red
3. Lemma 6 relies crucially on the use of step sizes diminishing in the length of the trajectory, rather than
finite step sizes. Therefore, the step sequence serves as a useful intermediate stage between simply taking
one PG step of (13) and using finite step sizes, which would mean that the covariance would converge
either to zero or diverge to infinity.
12
Expected Policy Gradients
Q(·, s)
u1
u2
Figure 3: In multi-dimensional action spaces, the critic Q̂(·, s) can have saddle points. In
this case, we define exploration along each eigenvector separately.
eigenvector (since the intersection of Q(·, s) with the red plane shows a minimum, which we
want to escape). In essence, we apply the one-dimensional reasoning shown in Figure 2 to
each plane separately, where the planes are spanned by the corresponding eigenvector and
the z-axis. This way, we can escape saddle points and minima.4
4.3 Action Clipping
We now describe how GPG works in environments where the action space has bounded
support5 . This setting occurs frequently in practice, since real-world systems often have
physical constraints such as a bound on how fast a robot arm can accelerate. The typical
solution to this problem is simply to start with a policy πb with unbounded support and
then, when an action is to be taken, clip it to the desired range as follows
a ∼ π(a | s)
equivalent to a = max(min(b, 1), 0) with b ∼ πb (b | s).
(14)
The justification for this process is that we can simply treat the clipping operation
max(min(b, 1), 0) as part of the environment specification. Formally, this means that
we transform the original MDP M defined as M = (S, A, R, p, p0, γ) with A = [0, 1]d into
another MDP M 0 = (S, A0 , R, p0 , p0, γ), where A0 = Rd and p0 is defined as
p0 (s0 |b, s) = p(s0 | max(min(b, 1), 0), s).
Since M 0 has an unbounded action space, we can use the RL machinery for unbounded
actions to solve it. Since any MDP is guaranteed to have an optimal deterministic policy,
? : S → A. Now, π ? can be transformed into a policy
we call this deterministic solution πD
D
?
for M of the form max(min(πD (s), 1), 0). In practice, the MDP M 0 is never constructed
explicitly—the described process in equivalent to using an RL algorithm meant for A = Rd
and then, when the action is generated, simply clipping it (Algorithm 4).
4. Of course the optimisation is still local and there is no guarantee of finding a global optimum—we can
merely increase our chances.
5. We assume without loss of generality that the support interval is [0, 1].
13
Ciosek and Whiteson
Algorithm 4 Policy gradients with clipped actions.
1: s ← s0 , t ← 0
2: initialise optimiser, initialise policy π parameterised by θ
3: while not converged do
4:
gt ← γ t do-integral(Q̂b , s, πθ )
5:
θ ← θ + optimiser.update(gt )
6:
b ∼ π(·, s)
? (s), 1), 0).
7:
a = c(b)
. Clipping function c(b) = max(min(πD
0
8:
s , r ← simulator.perform-action(a)
9:
Q̂b .update(s, b, r, s0 )
. Update using the pre-clipping action b.
10:
t←t+1
11:
s ← s0
12: end while
g(b)
{b : g 0 (b) 6= 0}
π
bL
b1
b2
b
Figure 4: Vanishing gradients when using hard clipping. The agent cannot determine
whether b is too small or too large from b1 and b2 alone. It is necessary to sample from the
interval {b : g 0 (b) 6= 0} in order to obtain a meaningful policy update but this is unlikely for
the current policy (shown as the red curve).
However, while such an algorithm does not introduce new bias in the sense that reward
obtained in M and M 0 will be the same, it can lead to problems with slow convergence in
the policy gradient settings. To see why, consider Figure 4.
With hard clipping, the agent cannot distinguish between b1 and b2 since squashing
reduces them both to the same value, i.e., g(b1 ) = g(b2 ). Hence, the corresponding Q values
are identical and, based on trajectories using b1 and b2 , there is no way of knowing how
the mean of the policy should be adjusted. In order to get a useful gradient, a b? has to
be chosen which falls into the interval (−∞, bL ]. Since the b’s are samples from a Gaussian
with infinite support, it will eventually happen and a nonzero gradient will be obtained.
However, if this interval falls into a distant part of the tail of πb , convergence will be slow.
However, this problem is mitigated with GPG. To see why, consider Figure 5. Once the
policy shifts into the flat area, the critic becomes constant. A constant critic has a zero
Hessian, generating a boost to exploration by increasing the standard deviation of the policy,
making it much more likely that a point b < bL is sampled and a useful gradient is obtained.
14
Expected Policy Gradients
g(b)
{b : g 0 (b) 6= 0}
bL
b
Figure 5: GPG avoids the vanishing gradient problem. Once a policy (denoted in red)
enters the flat area entering the flat area b > bL , exploration immediately increases (the new
distribution is in blue).
Another way of mitigating the hard clipping problem is to use a differentiable squashing
function, which we describe in Section 5.
4.4 Quadric Critics and their Approximations
Gaussian policy gradients require a quadric critic given the state. This assumption, which is
different from assuming a quadric dependency on the state, is typically sufficient for two
reasons. First, discrete-time linear quadratic regulators (LQR) with time-varying feedback,
a class of problems widely studied in classical control theory, are known to have a Q-function
that is quadric in the action vector given the state (Crassidis and Junkins, 2011, Equation
8.81)6 . Second, it is often assumed (Li and Todorov, 2004) that a quadric critic (or a quadric
approximation to a general critic) is enough to capture enough local structure to preform
a policy optimisation step, in much the same way as Newton’s method for deterministic
unconstrained optimisation, which locally approximates a function with a quadric, can be
used to optimise a non-quadric function across several iterations. In Corollary 7 below, we
describe such an approximation method applied to GPG where we approximate Q with a
quadric function in the neighbourhood of the policy mean.
Corollary 7 (Approximate Gaussian Policy Gradients with an Arbitrary Critic)
1/2
1/2
If the policy is Gaussian, i.e. π(·|s) ∼ N (µs , Σs ) with µs and Σs parameterised by θ as
in Lemma 5 and any critic Q(a, s) doubly differentiable with respect to actions for each state,
1/2
1/2
Q
then Iπ(s),µ
≈ (∇µs )∇a Q(a = µs , s) and I Q
)Σs H(µs , s), where H(µs , s)
1/2 ≈ (∇Σs
s
π(s),Σs
is the Hessian of Q with respect to a, evaluated at µs for a fixed s.
Proof We begin by approximating the critic (for a given s) using the first two terms of the
Taylor expansion of Q in µs .
Q(a, s) ≈ Q(µs , s) + (a − µs )> [∇a Q(a, s)]a=µs + 12 (a − µs )> H(µs , s)(a − µs )
= 12 a> H(µs , s)a + a> [∇a Q(a, s)]a=µs − H(µs , s)µs + const.
6. Indeed, the Hessian discussed in Section 4.2 can be considered a type of reward model.
15
Ciosek and Whiteson
Because of the series truncation, the function on the righthand side is quadric and we can
then use Lemma 5:
Q
Iπ(s),µ
= ∇µs (2 12 H(µs , s)µs + [∇a Q(a, s)]a=µs − H(µs , s)µs )
s
= ∇µs [∇a Q(a, s)]a=µs
I
1/2
Q
1/2
π(s),Σs
1/2
= ∇Σ1/2 (2 12 H(µs , s)Σs ) = ∇Σ1/2 H(µs , s)Σs .
s
s
To actually obtain the Hessian, we could use automatic differentiation to compute it
analytically. Sometimes this may not be possible—for example when ReLU units are used,
the Hessian is always zero. In these cases, we can approximate the Hessian by generating a
number of random action-values around µs , computing the Q values, and (locally) fitting a
quadric, akin to sigma-point methods in control (Roth et al., 2016).
5. Universal Expected Policy Gradients
Having covered the most common case of continuous Gaussian policies, we now extend
the analysis to other policy classes. We provide two cases of such results in the following
sections: exponential family policies with multivariate polynomial critics (of arbitrary order)
and arbitrary policies (possessing a mean) with linear critics. Our main claim is that an
analytic solution to the EPG integral is possible for almost any system; hence we describe
EPG as a universal method.7
5.1 Exponential Family Policies and Polynomial Critics
We now describe a general technique to obtain analytic EPG updates for the case when
the policy belongs to a certain exponential family and the critic is an arbitrary polynomial.
This result is significant since polynomials can approximate any continuous function on a
bounded interval with arbitrary accuracy (Weierstrass, 1885; Stone, 1948). Since our result
holds for a nontrivial class of distributions in the exponential family, it implies that analytic
solutions for EPG can almost always be obtained in practice and hence that the Monte
Carlo sampling to estimate the inner integral that is typical in SPG is rarely necessary.
Lemma 8 (EPG for Exponential Families with Polynomial Sufficient Statistics)
Consider the class of policies parameterised by θ where:
>
π(a | s) = eηθ T (a)−Uηθ +W (a) ,
(15)
where each entry in the vector T (a) is a (possibly multivariate) polynomial in the entries of
the vector a. Moreover, assume that the critic Q̂(a) is (a possibly multivariate) polynomial
7. Of course no method can be truly universal for a completely arbitrary problem. Our claim is that EPG is
universal for the class of systems arising from lemmas in this section. However, this class is so broad
that we feel the term ‘universal‘ is justified. This is similar to the claim that neural networks based on
sigmoid nonlinearities are universal, even though then can only approximate continuous functions, as
opposed to completely arbitrary ones.
16
Expected Policy Gradients
in the entries of a. Then, the policy gradient update is a closed form expression in terms of
the uncentered moments of π(· | s):
>
IπQ (s) = (∇ηθ> )(CT>Q mπ ) − (∇Uηθ )(CQ
mπ ),
(16)
where CQ is the vector containing the coefficients of the polynomial Q, CT Q is the vector
containing the coefficients of the polynomial T (a)Q(a) (i.e., a multiplication of T and Q)
and mπ is a vector of uncentered moments of π (in the order matching the polynomials).
Proof We first rewrite the inner integral as an expectation.
Z
Q
Iπ (s) =
dπ(a | s)∇ log π(a | s)Q(a)
A
= Ea∼π [∇ log π(a | s)Q(a)]
h
i
= Ea∼π (∇(ηθ> T (a) − Uηθ + W (a)))Q(a)
i
h
= Ea∼π (∇ηθ> )T (a)Q(a) − (∇Uηθ )Q(a)
= (∇ηθ> )Ea∼π [T (a)Q(a)] − (∇Uηθ )Ea∼π [Q(a)] .
Since T (a) and Q(a) are polynomials, and the multiplication of polynomials is still polynomial,
both expectations are expectations of polynomials.
To compute the second expectation, we exploit the fact that, since Q is a polynomial, it
is a sum of monomial terms:
D
d
D
d
X
Y
X
Y
p (j)
p (j)
Ea∼π [Q(a)] = Ea∼π
ci
aj i =
ci Ea∼π
aj i
i=1
j=1
i=1
j=1
|
{z
cross-moment of π
}
hQ
i
pi (j)
d
On the right, the terms Ea∼π
a
, are the uncentered (pi (1), pi (2), . . . , pi (d))-crossj=1 j
moments of π. If we arrange the coefficients ci into the vector CQ and the cross-moments
into the vector mπ , we obtain the right term in (16). We can apply the same reasoning to
the product of T and Q to obtain the left term.
The cross-moments themselves can be obtained from the moment generating function
(MGF) of π. Indeed, for a distribution of the form of (15), the MGF of T (a) is guaranteed
to exist and has a closed form (Bickel and Doksum, 2006). Hence, the computation of the
moments reduces to the computation of derivatives. See details in Appendix A.2.
Note that the assumption that T and Q are polynomial is with respect to the action
a. The dependence on the state only appears in ηθ and Uηθ and can be arbitrary, e.g., a
multi-layered neural network.
Of course, while polynomials are universal approximators, they may not be the most
efficient or stable ones. The importance of Lemma 8 is currently mainly conceptual—analytic
EPG is possible for a universal class of approximators (polynomials) which shows that EPG
17
Ciosek and Whiteson
is analytically tractable in principle for any continuous Q-function.8 It is an open research
question whether more suitable universal approximators admitting analytic EPG solutions
can be identified.
5.2 Reparameterised Exponential Families and Reparameterised Critics
In Lemma 8, we assumed that the function T (a) (called the sufficient statistic of the
exponential family) is polynomial. We now relax this assumption. Our approach is to start
with a policy πb which does have a polynomial sufficient statistic and then introduce a
suitable reparameterisation function g : Rd → A. The policy is then defined as:
>
equivalent to a = g(b) with b ∼ πb (b | s) = eηθ T (b)−Uηθ +V (b) ,
a ∼ π(a | s)
where b is the random variable representing the action before the squashing. Assuming that
g −1 exists and the Jacobian ∇g is non-singular almost everywhere, the PDF9 of the policy
π can be written as:
π(a | s) = πb (g −1 (a) | s)
1
1
= πb (b | s)
.
−1
det ∇g(g (a))
det ∇g(b)
(17)
The following lemma develops an EPG method for such policies.
Lemma 9 Consider an invertible and differentiable function g. Define a policy π as in (17).
Assume that the Jacobian of g is nonsingular except on a set of πb -measure zero. Consider
a critic Q. Denote as Qb a reparameterised critic such that for all a, Qb (g −1 (a)) = Q(a).
Then the policy gradient update is given by the formula IπQ (s) = IπQbb (s).
Proof
IπQ (s)
Z
dπ(a | s)∇ log π(a | s)Q(a)
=
ZA
dπ(g(b) | s)∇ log π(g(b) | s)Q(g(b)) det ∇g(b)
=
ZR
d
dπb (b | s)∇ log π(g(b) | s)Qb (b)
=
d
ZR
=
Rd
dπb (b | s)(∇ log πb (b | s) − ∇ log det ∇g(b))Qb (b) = IπQbb (s).
|
{z
}
0
In the second equality, we perform the variable substitution a = g(b). In the third equality
we use (17) and the fact that Qb (g −1 (a)) = Q(a). In the fourth equality we again use (17)
and the fact that log det ∇g(b) = 0 since g is not parameterised by θ.
8. The universality of polynomials holds only for bounded intervals (Weierstrass, 1885), while the support
of the policy may be unbounded. We do not address the unbounded approximation case here other than
by saying that, in practice, the critic is learned from samples and is thus typically only accurate on a
bounded interval anyway.
9. We abuse notation slightly by using π(a | s) for both the probability distribution and its PDF.
18
Expected Policy Gradients
We are now ready to state our universality result. The idea is to obtain a reparameterised
version of EPG (and Lemma 8) by reparameterising the critic and the policy using the same
transformation g. We do so in the following corollary, which is the most general constructive
result in this article.
Corollary 10 (EPG for Exponential Families with Reparameterisation) Consider
the class of policies, parameterised by θ, defined as in (15). Consider reparameterisation
function g and define Tb , Vb and Qb as Tb (g −1 (a)) = T (a), Wb (g −1 (a)) = W (a) and
Qb (g −1 (a)) = Q(a) for every a. Assume the following:
1. g is invertible;
2. The Jacobian of g exists and is nonsingluar except on a set of πb -measure zero, where
πb is the reparameterised policy as in (17); and
3. Tb and Qb are polynomial as in Lemma 8.
Then a closed-form policy gradient update can be obtained as follows:
>
IπQ (s) = (∇ηθ> )(CT>b Qb mπb ) − (∇Uηθ )(CQ
mπb ).
b
(18)
Proof Apply Lemmas 9 and then 8.
Lemma 9 also has a practical application in case we want to deal with bounded action
spaces. As we discussed in Section 4.3, hard clipping can cause the problem of vanishing
gradients and the default solution should be to use GPG. In case we can’t use GPG, for
instance when the dimensionality of the action space is so large that computing the covariance
of the policy is too costly, we can alleviate the vanishing gradients problem by using a
strictly monotonic squashing function g. One implication of Lemma 9 is that, if we set πb
to be Gaussian, we can invoke Lemma 5 to obtain exact analytic updates for useful policy
classes such as Log-Normal and Logit-Normal (obtained by setting g to the sigmoid and the
exponential function respectively), as long as we choose our critic Q to be quadric in g −1 (a),
i.e., Qb is quadric in b. The reparameterised version of EPG is the same as Algorithm 4
except it uses a squashing function g instead of the clipping function c.
5.3 Aribtrary Policies and Linear Critics
Next, we consider the case where the stochastic policy is almost completely arbitrary, i.e., it
only has to possess a mean and need not even be in the already general exponential family
of policies used in Lemma 8 and Corollary 10, but the critic is constrained to be linear in
the actions. We have the following lemma, which is a slight modification of an observation
made in connection with the Q-Prop algorithm (Gu et al., 2016a, Eq. 7).
Lemma 11 (EPG for Arbitrary Stochastic Policies and Linear Critics) Consider an
arbitrary (nondegenerate) probability distribution π(· | s) which has a mean. Assume that
the critic Q̂(a) is of the form A>
s a for some coefficient vector As . Then the
R policy gradient
Q
>
update is given by Iπ (s) = As ∇µπ(·|s) where µπ(·|s) denotes the integral a adπ(a | s) (the
mean).
19
Ciosek and Whiteson
Proof
IπQ (s)
Z
∇π(a | s)Q(a | s)da
=
Za
∇π(a | s)A>
s ada
a
Z
π(a | s)ada
= A>
∇
s
a
|
{z
}
=
µπ(·|s)
= A>
s ∇(µπ(·|s) ).
Since DPG already provides the same result for Dirac-delta policies (see Corollary 3), we
conclude that using linear critics means we can have an analytic solution for any reasonable
policy class.
To see why the above lemma is useful, first consider systems that arise as a discretisation
of continuous time systems with a fine-enough time scale. If we assume that the true Q
is smooth in the actions and that the magnitude of the allowed action goes to zero as
the time step decreases, then a linear critic is sufficient as an approximation of Q because
we can approximate any smooth function with a linear function in any sufficiently small
neighbourhood of a given point and then choose the time step to be small enough so an
action does not leave that neighbourhood. We can then use Lemma 11 to perform policy
gradients with any policy.10
5.4 If All Else Fails: EPG with Numerical Quadrature
If, despite the broad framework shown in this article, an analytical solution is impossible,
we can still perform integration numerically. EPG can still be beneficial in these cases: if
the action space is low dimensional, numerical quadrature is cheap; if it is high dimensional,
it is still often worthwhile to balance the expense of simulating the system with the cost of
quadrature. Actually, even in the extreme case of expensive quadrature but cheap simulation,
the limited resources available for quadrature could still be better spent on EPG with smart
quadrature than SPG with simple Monte Carlo.
The crucial insight behind numerical EPG is that the integral given as
Z
Q̂
Iπ = dπ(a | s)∇ log π(a | s)Q̂(a, s)
a
only depends on two fully known quantities: the current policy π and the current approximate
critic Q̂. Therefore, we can use any standard numerical integration method to compute it.
The actions at which the integrand is evaluated do not have to be sampled—one can also
use a method such as the Gauss-Legendre quadrature where the abscissae are designed.
10. Of course the update derived in Lemma 11 only provides a direction in which to change the policy mean
(which means that exploration has to be performed using some other mechanism). This is because a
linear critic does not contain enough information to determine exploration.
20
Expected Policy Gradients
6. Experiments
While EPG has many potential uses, we focus on empirically evaluating one particular
application: exploration driven by the Hessian exponential (as introduced in Algorithm 2 and
Lemma 6), replacing the standard Ornstein-Uhlenbeck (OU) exploration in continuous action
domains. To this end, we apply EPG to five domains modelled with the MuJoCo physics
simulator (Todorov et al., 2012): HalfCheetah-v1, InvertedPendulum-v1, Reacher2d-v1,
Walker2d-v1, and InvertedDoublePendulum-v1 and compare its performance to DPG and
SPG. The experiments described here extend our previous conference work (Ciosek and
Whiteson, 2018) in two ways: we added the InvertedDoublePendulum-v1 domain and used
it for a detailed comparison with the PPO algorithm (Schulman et al., 2017).
In practice, EPG differs from deep DPG (Lillicrap et al., 2015; Silver et al., 2014) only
in the exploration strategy, though their theoretical underpinnings are also different. The
hyperparameters for DPG and those of EPG that are not related to exploration were taken
from an existing benchmark (Islam et al., 2017; Brockman et al., 2016). The exploration
hyperparameters for EPG were σ0 = 0.2 and c = 1.0 where the exploration covariance is
σ0 ecH . These values were obtained using a grid search from the set {0.2, 0.5, 1} for σ0 and
{0.5, 1.0, 2.0} for c over the HalfCheetah-v1 domain. Since c is just a constant scaling the
rewards, it is reasonable to set it to 1.0 whenever reward scaling is already used. Hence,
our exploration strategy has just one hyperparameter σ0 as opposed specifying a pair of
parameters (standard deviation and mean reversion constant) for OU. We used the same
learning parameters for the other domains. For SPG11 , we used OU exploration and a
constant diagonal covariance of 0.2 in the actor update (this approximately corresponds to
the average variance of the OU process over time). The other parameters for SPG are the
same as for the rest of the algorithm. For the learning curves, we obtained 90% confidence
intervals and show results of independent evaluation runs that used actions generated by
the policy mean without any exploration noise.
The Hessian in GPG is obtained using a sigma-point method, as follows. At each step,
the agent samples 100 action values from Q̂(·, s) and a quadric is fit to them in the L2 norm.
Since this is a least-squares problem, it can be accomplished by solving a linear system. The
Hessian computation could be greatly sped up by using an approximate method, or even
skipped completely if we used a quadric critic. However, we did not optimise this part of the
algorithm since the core message of GPG is that a Hessian is useful, not how to compute it
efficiently.
The results in Figure 6 show that EPG’s exploration strategy yields much better performance than DPG with OU. Furthermore, SPG does poorly, solving only the easiest domain
(InvertedPendulum-v1) reasonably quickly, achieving slow progress on HalfCheetah-v1, and
failing entirely on the other domains. This is not surprising since DPG was introduced
precisely to solve the problem of high variance SPG estimates on this type of task. In
InvertedPendulum-v1, SPG initially learns quickly, outperforming the other methods. This
is because noisy gradient updates provide a crude, indirect form of exploration that happens
to suit this problem. Clearly, this is inadequate for more complex domains: even for this
simple domain it leads to subpar performance late in learning.
11. We tried learning the covariance for SPG but the covariance estimate was unstable; no regularisation
hyperparameters we tested matched SPG’s performance with OU even on the simplest domain.
21
Ciosek and Whiteson
(a) HalfCheetah-v1
(b) InvertedPendulum-v1
1000
EPG (5 runs)
DPG (40 runs)
SPG (40 runs)
0
0
5000
EPG (40 runs)
DPG (40 runs)
SPG (40 runs)
40
120
200
280
20
40
(c) Reacher2d-v1
80
(d) Walker2d-v1
EPG (40 runs)
DPG (40 runs)
SPG (10 runs)
0
-15
2000
EPG (5 runs)
DPG (5 runs)
SPG (10 runs)
-5
60
50
150
250
350
450
250
500
750
1000
1250
10000
(e) InvertedDoublePendulum-v1
0
EPG (12 runs)
DPG (36 runs)
SPG (22 runs)
20
40
60
80
Figure 6: Learning curves (mean and 90% interval). Returns for Reacher2d-v1 are clipped
at -14. The number of independent training runs is in parentheses. Horizontal axis is scaled
in thousands of steps.
In addition, EPG typically learns more consistently than DPG with OU. In three tasks,
the empirical standard deviation across runs of EPG (σ̂EPG ) was substantially lower than
that of DPG (σ̂DPG ) at the end of learning, as shown in Table 1. For the other two domains,
the confidence intervals around the empirical standard deviations for DPG and EPG were
too wide to draw conclusions.
Surprisingly, for InvertedPendulum-v1, DPG’s learning curve declines late in learning.
The reason can be seen in the individual runs shown in Figure 7: both DPG and SPG suffer
from severe unlearning. This unlearning cannot be explained by exploration noise since the
22
Expected Policy Gradients
Domain
HalfCheetah-v1
σ̂DPG
1336.39
[1107.85, 1614.51]
[875.54, 1275.94]
InvertedPendulum-v1
291.26
0.00
[241.45, 351.88]
n/a
Reacher2d-v1
1.22
0.13
Walker2d-1
InvertedDoublePendulum-v1
σ̂EPG
1056.15
[0.63, 2.31]
[0.07, 0.26]
543.54
762.35
[450.58, 656.65]
[631.98, 921.00]
921.73
226.07
[756.01, 1125.63]
[157.20, 326.00]
10
30
50
70
90
1000
0
1000
0
0
1000
Table 1: Estimated standard deviation (mean and 90% interval) across runs after learning.
10
30
50
70
90
10
30
50
70
90
Figure 7: Three runs for EPG (left), DPG (middle) and SPG (right) for the
InvertedPendulum-v1 domain, demonstrating that EPG shows much less unlearning.
evaluation runs just use the mean action, without exploring. Instead, OU exploration in
DPG may be too coarse, causing the optimiser to exit good optima, while SPG unlearns due
to noise in the gradients. The noise also helps speed initial learning, as described above, but
this does not transfer to other domains. EPG avoids this problem by automatically reducing
the noise when it finds a good optimum, i.e., a Hessian with large negative eigenvalues as
described is Section 4.2.
The fact that EPG is stable in this way raises the question whether the instability of an
algorithm (i.e., an inverted or oscillating learning curve) is caused primarily by inefficient
exploration or by excessivly large differences between subsequent policies. To address it,
we compare our results with proximal policy pptimisation (PPO) (Schulman et al., 2017), a
policy gradient algorithm designed specifically to include a term penalising the difference
between successive policies. Comparing our EPG result for InvertedDoublePendulum-v1
in Figure 6e with PPO (Schulman et al., 2017, Figure 3, first row, third plot from left,
blue PPO curve), it is clear that EPG is more stable. This suggests that efficient adaptive
exploration of the type used by EPG is important for stability, even in this relatively simple
domain.
7. Related Work
In this section, we discuss the relationship between EPG and several other methods.
23
Ciosek and Whiteson
7.1 Sampling Methods for SPG
EPG has some similarities with VINE sampling (Schulman et al., 2015), which uses an
(intrinsically noisy) Monte Carlo quadrature with many samples. However, there are
important differences. First, VINE relies entirely on reward rollouts and does not use an
explicit critic. This means that VINE has to perform many independent rollouts of Q(·, s)
for each s, requiring a simulator with reset. A second, related difference is that VINE uses
the same actions in the estimation of IπQ̂ that it executes in the environment. While this is
necessary with purely Monte Carlo rollouts, Section 5.4 shows that there is no such need in
general if we have an explicit critic. Ultimately, the main weakness of VINE is that it is
a purely Monte Carlo method. However, the example in Figure 1 (Section 3) shows that
even with a computationally expensive many-sample Monte Carlo method, the problem of
variance in the gradient estimator remains, regardless of the baseline.
EPG is also related to variance minimisation techniques that interpolate between two
estimators (Gu et al., 2016a). However, EPG uses a quadric (not linear) critic, which is
crucial for exploration. Furthermore, it completely eliminates variance in the inner integral,
as opposed to just reducing it.
A more direct way of coping with variance in policy gradients is to simply reduce the
learning rate when the variance of the gradient would otherwise explode, using, e.g., Adam
(Kingma and Ba, 2014), natural policy gradients (Kakade, 2002; Amari, 1998; Peters and
Schaal, 2008a), trust region policy optimisation (Schulman et al., 2015), proximal policy
optimisation (Schulman et al., 2017), the adaptive step size method (Pirotta et al., 2013) or
Newton’s method (Furmston and Barber, 2012; Furmston et al., 2016; Parisi et al., 2016).
However, this results in slow learning when the variance is high.
7.2 Sarsa and Q-Learning
It has been known since the introduction of policy gradient methods (Sutton et al., 2000)
that they represent a kind of slow-motion policy improvement as opposed to a greedy
improvement performed by methods such as (expected) sarsa. The two main reasons for the
slow-motion improvement are that a greedy maximisation operator may not be available
(e.g., for continuous or large discrete action spaces) and that a greedy step may be too
large because the critic only approximates the value function. The argument for a sarsa-like
method is that it may converge faster and does not need an additional optimisation for the
actor. Recently, approaches combining the features of both methods have been investigated.
One-step Newton’s method for Q-functions that are quadric in the actions has been used to
produce a sarsa-like algorithm for continuous domains (Gu et al., 2016b), previously only
tractable with policy gradient methods. For discrete action spaces, softmax Q-learning, a
family of methods with a hybrid loss combining sarsa and Q-learning, has recently been
linked to policy gradients via an entropy term(O’Donoghue et al., 2016). In this paper,
GPG with Hessian-based exploration (Section 4.2) can be seen as another kind of hybrid.
Specifically, it changes the mean of the policy slowly, similar to a vanilla policy gradient
method, and computes the covariance greedily, similar to sarsa.
24
Expected Policy Gradients
7.3 DPG
The update for the policy mean obtained in Corollary 7 is the same as the DPG update,
linking the two methods:
IπQ (s) = [∇a Q(a, s)]a=µs ∇µs .
We now formalise the equivalences between EPG and DPG. First, any EPG method with
a linear critic (or an arbitrary critic approximated by the first term in the Taylor expansion)
is equivalent to DPG with actions from a given state s drawn from an exploration policy of
the form:
a ∼ π(s) + n(a|s),
where
Ea∼n [a | s] = 0.
Here, the PDF of the zero-mean exploration noise n(·|s) must not depend on the policy
parameters. This fact follows directly from Lemma 11, which says that, in essence, a linear
critic only gives information on how to shift the mean of the policy and no information
about other moments. Second, on-policy GPG with a quadric critic (or an arbitrary critic
approximated by the first two terms in the Taylor expansion) is equivalent to DPG with a
Gaussian exploration policy where the covariance is computed as in Section 4.2. This follows
from Corollary 7. Third, and most generally, for any critic at all (not necessarily quadric),
DPG is a kind of EPG for a particular choice of quadrature (using a Dirac measure). This
follows from Theorem 1.
Surprisingly, this means that DPG, normally considered to be off-policy, can also be seen
as on-policy when exploring with Gaussian noise defined as above for the quadric critic or
any noise for the linear critic. Furthermore, the compatible critic for DPG (Silver et al.,
2014) is indeed linear in the actions. Hence, this relationship holds whenever DPG uses a
compatible critic.12 Furthermore, Lemma 5 lends new legitimacy to the common practice of
replacing the critic required by the DPG theory, which approximates ∇a Q, with one that
approximates Q itself, as done in SPG and EPG.
7.4 Entropy-Based Methods
On-policy SPG sometimes includes an entropy term (Peters et al., 2010) in the gradient
in order to aid exploration by making the policy more stochastic. The gradient of the
differential entropy H(s) of the policy at state s is defined as follows.13
R
−∇H(s) = ∇ a dπ(a|s) log π(a|s)
R
R
= a da∇π(a|s) log π(a|s) + a dπ(a|s)∇ log π(a|s)
R
R
1
= a da∇π(a|s) log π(a|s) + a dπ(a|s) π(a|s)
∇π(a|s)
R
R
= a da∇π(a|s) log π(a|s) + ∇ a dπ(a|s)
| {z }
1
R
R
= a da∇π(a|s) log π(a|s) = a dπ(a|s)∇ log π(a|s) log π(a|s).
12. The notion of compatibility of a critic is different for stochastic and deterministic policy gradients.
13. For discrete action spaces, the same derivation with integrals replaced by sums holds for the entropy.
25
Ciosek and Whiteson
Typically, we add the entropy update to the policy gradient update with a weight α:
E
IG
(s) = IG (s) + α∇H(s)
R
= a dπ(a|s)∇ log π(a|s)(Q(a, s) − α log π(a|s)).
(19)
This equation makes clear that performing entropy regularisation is equivalent to using a
different critic with Q-values shifted by α log π(a|s). This holds for both EPG and SPG,
including SPG with discrete actions where the integral over actions is replaced with a
sum. This follows because adding entropy regularisation to the objective of optimising the
total discounted reward in an RL setting corresponds to shifting the reward function by a
term proportional to log π(a|s) (Neu et al., 2017; Nachum et al., 2017). Indeed, the path
consistency learning algorithm (Nachum et al., 2017) contains a formula similar to (19),
though we obtained ours independently.
Next, we derive a further specialisation of (19) for the case where the parameters θ are
shared between the actor and the critic. We start with the policy gradient identity given
by (9) and replace the true critic Q with the approximate critic Q̂. Since this holds for any
stochastic policy, we choose one of the form:
1 Q̂(a,s)
π(a|s) =
e
,
Z(s)
Z
where
Z(s) =
eQ̂(a,s) da.
(20)
a
For the continuous case, we assume that the integral in (20) converges for each state. Here,
we assume that the approximate critic is parameterised by θ. Because of the form of (20),
the policy is parameterised by θ as well. Now, for the policy class given by (20), we can
simplify the gradient update even further, obtaining:
E
IG
(s) =
R
a dπ(a|s)∇ log π(a|s)(Q̂(a, s)
=
R
a π(a|s)∇ log π(a|s)(Q̂(s, a)
− α log π(a|s))
− α log eQ̂(a,s) −α log Z(s))
| {z }
Q̂(a,s)
= (1 − α)
R
a π(a|s)∇ log π(a|s)Q̂(s, a)
= −(1 − α)∇H(s).
In the above derivation, we could drop the term log Z(s) since it does not depend on a, as
with a baseline. This shows that, in the case of sharing parameters between the critic and
the policy as above, methods such as A3C (Mnih et al., 2016), which have both an entropy
loss and a policy gradient loss, are redundant since entropy regularisation does nothing
except scale the learning rate.14 Alternatively, for this shared parameterisation, a policy
gradient method simply subtracts entropy from the policy. In practice, this means that
a policy gradient method with this kind of parameter sharing is quite similar to learning
the critic alone and simply acting according to the argmax of the Q values rather than
representing the policy explicitly, producing a method similar to sarsa.
14. In this argument, we ignore the effects of sampling on exploration.
26
Expected Policy Gradients
7.5 Off-Policy Actor-Critic
Off-policy learning with policy gradients typically follows the framework of off-policy actorcritic (Degris et al., 2012). Denote the behaviour policy as b(a | s) and the corresponding
discounted-ergodic measure as ρb . The method uses the following reweighting approximation:
Z
Z
∇J = dρ(s) dπ(a | s)∇ log π(a | s)(Q(a, s))
Za
Zs
≈ dρb (s) dπ(a | s)∇ log π(a | s)(Q(a, s)).
(21)
s
a
The approximation is necessary since, as the samples are generated using the policy b, it is
not known how to approximate the integral with ρ from samples, while it is easy to do so for
an integral with ρb . A natural off-policy version of EPG emerges from this approximation
(see Algorithm 5), which simply replaces the inner integral with IπQ :
Z
Z
Z
dρb (s) dπ(a | s)∇ log π(a | s)(Q(a, s)) = dρb (s)IπQ (s).
(22)
s
a
s
Here, we use an analytic solution to IπQ (s) as before. The importance sampling term π(a|s)
b(a|s)
does not appear because, as the integral is computed analytically, there is no sampling in
IπQ (s), much less sampling with an importance correction. Of course, the algorithm also
requires an off-policy critic for which an importance sampling correction is typically necessary.
Indeed, (22) makes clear that off-policy actor-critic differs from SPG in two places: the use
of ρb as in (21) and the use of an importance-sampled Monte Carlo estimator, rather than
regular Monte Carlo, for the inner integral.
Algorithm 5 Off-policy expected policy gradients with reweighting approximation
1: s ← s0 , t ← 0
2: initialise optimiser, initialise policy π parameterised by θ
3: while not converged do
4:
gt ← γ t do-integral(Q̂, s, πθ )
. gt is the estimated policy gradient as per (10)
5:
θ ← θ + optimiser.update(gt )
6:
a ∼ b(·, s)
7:
s0 , r ← simulator.perform-action(a)
8:
Q̂.update(s, a, r, s0 , π, b)
. Off-policy critic algorithm
9:
t←t+1
10:
s ← s0
11: end while
7.6 Value Gradient Methods
Value gradient methods (Fairbank, 2014; Fairbank and Alonso, 2012; Heess et al., 2015)
assume the same parameterisation of the policy as policy gradients, i.e., π is parameterised
by θ, and maximise J by recursively computing the gradient of the value function. In our
notation, the policy gradient has the following connection with the value gradient of the
27
Ciosek and Whiteson
initial state:
Z
∇J =
dp0 (s0 )∇V (s0 ).
(23)
s0
Value gradient methods use a recursive equation that computes ∇V (s) using ∇V (s0 ) where
s0 is the successor state. In practice, this means that a trajectory is truncated and the
computation goes backward from the last state all the way to s0 , where (23) is applied, so
that the resulting estimate of ∇J can be used to update the policy. The recursive formulae
for ∇V (s) are based on the differentiated Bellman equation:
Z
Z
0
0
∇V = ∇ dπ(a|s) R(s, a) + γ
p(s |a, s)V (s ) .
(24)
s0
a
Different value gradient methods differ in the form of the recursive update for the value
gradient obtained from (24). For example, stochastic value gradients (SVG) introduce a
reparameterisation both of π and p(s0 |a, s):
s0 ∼ p(·|a, s)
⇔
s0 = f (a, s, ξ) with ξ ∼ B1 ,
a ∼ π(·|s)
⇔
a = h(s, η) with η ∼ B2 .
Here, we denote the base noise distributions as B1 and B2 , while f and h are deterministic
functions. The function f can be thought of as an MDP transition model. SVG rewrites
(24) using the reparameterisation as follows:
∇V = ∇
=
R
η
R
η
dB2 (η) R(s, h(s, η)) + γ
R
dB2 (η) ∇R(s, h(s, η)) + γ
s0
R
ξ
dB1 (ξ)V (f (h(s, η), s, ξ)) =
dB1 (ξ)∇V (f (h(s, η), s, ξ)) .
|
{z
}
(25)
s0
Here, the quantities ∇R(s, h(s, η)) and ∇V (f (h(s, η), s, ξ)) can be computed by the chain
rule from the known reward model R, transition model f . SVG learns the approximate
ˆ η̂ from samples and using a sample-based approximation to (25) to obtain the
model fˆ, R̂, ξ,
value gradient recursion.
By contrast, we now derive a related but simpler value gradient method that does not
require a model or a reparameterised policy15 , starting with (24).
R
R
∇V (s) = ∇ a dπ(a|s) R(s, a) + γ s0 p(s0 |a, s)V (s0 )
R
R
R
= a da∇π(a|s)R(s, a) + γ∇π(a|s) s0 p(s0 |a, s)V (s0 ) + π(a|s)∇ s0 p(s0 |a, s)V (s0 )
R
= a,s0 π(a|s)p(s0 |a, s) (∇ log π(a|s)R(s, a) + ∇V (s0 ) + ∇ log π(a|s)V (s0 )) .
(26)
Now (26) can be approximated from samples:
ˆ (s) ≈ ∇ log π(a|s)R(s, a) + ∇V
ˆ (s0 ) + ∇ log π(a|s)V̂ (s0 ) .
∇V
15. SVG(∞) and SVG(1) require a model an a policy reparameterisation while SVG(0) requires only a
policy reparameterisation. However, SVG(0) is inefficient since it does not directly use the reward in the
computation of the value gradient.
28
Expected Policy Gradients
Policy Class
Normal, a ∈ Rd
Logit-Normal; a ∈ [0, 1]d
Log-Normal; a ∈ [0, ∞]d
any policy
Squashing
none
a = expit(b)
a = eb
none
Q̂
Analytic Update
) Q
a> As a + a> Bs
Iπ(s),µs = (∇µs )Bs ,
b> As b + b> Bs
1/2
1/2
IQ
)Σs As
1/2 = (∇Σs
b> As b + b> B s
π(s),Σs
Bs> a
IπQ (s) = Bs> ∇µπ(·|s)
Table 2: A summary of the most useful analytic results for expected policy gradients. For
bounded action spaces, we assume that the bounding interval is [0, 1] or [0, ∞].
Here, the pair (a, s0 ) corresponds to the action taken at s and the successor state. This
method requires learning a critic, while SVG requires a model.
An additional connection between value gradient methods and policy gradients
R is that,
since the quantity IG (s) in Theorem 1 can be written as IG (s) = ∇V (s) − γ s0 dpπ (s0 |
s)∇V (s0 ), we can think of this theorem as showing how to obtain a policy gradient from a
value gradient without backwards iteration.
8. Conclusions
This paper proposed a new framework for reasoning about policy gradient methods called
expected policy gradients (EPG) that integrates across the action selected by the stochastic
policy, thus reducing variance compared to existing stochastic policy gradient methods. We
proved a new general policy gradient theorem subsuming the stochastic and deterministic
policy gradient theorems, which covers any reasonable class of policies. We showed that
analytical results for the policy update exist and, in the most common cases, lead to
a practical algorithm (the analytic updates are summarised in Table 2). We also gave
universality results which state that, under certain broad conditions, the quadrature required
by EPG can be performed analytically. For Gaussian policies, we also developed a novel
approach to exploration that infers the exploration covariance from the Hessian of the critic.
The analysis of EPG yielded new insights about DPG and delineated the links between
the two methods. We also discussed the connections between EPG and other common RL
techniques, notably sarsa, Q-learning and entropy regularisation. Finally, we evaluated the
GPG algorithm in six practical domains, showing that it outperforms existing techniques.
Acknowledgments
This project has received funding from the European Research Council (ERC) under the
European Union’s Horizon 2020 research and innovation programme (grant agreement
number 637713). The experiments were made possible by a generous equipment grant from
NVIDIA.
29
Ciosek and Whiteson
Appendix A.
A.1 Proofs and Detailed Definitions
First, we prove two lemmas concerning the discounted-ergodic measure ρ(s) which have
been implicitly realised for some time but as far as we could find, never proved explicitly.
Definition 12 (Time-dependent occupancy)
p(s | t = 0) = p0 (s)
Z
p(s0 | t = i + 1) = p(s0 | s)p(s | t = i)
for
i≥0
s
Definition 13 (Truncated trajectory) Define the trajectory truncated after N steps as
τ N = (s0 , a0 , r0 , s1 , a1 , r1 , . . . , sN ).
Observation 14 (Expectation
wrt. truncated trajectory) Since τN = (s0 , s1 , s2 , . . . , sN )
QN −1
is associated with the density i=0 p(si+1 | si )p0 (s0 ), we have that
hP
i
N
i f (s ) =
EτN
γ
i
i=0
Q
P
R
N −1
N
i f (s ) ds ds . . . ds =
= s0 ,s1 ,...,sN
p(s
|
s
)
p
(s
)
γ
i+1
i
0
0
i
0 1
N
i=0
i=0
P R
QN −1
i
= N
i=0 s0 ,s1 ,...,sN p0 (s0 )
i=0 p(si+1 | si ) γ f (si )ds0 ds1 . . . dsN =
P R
i
= N
i=0 s p(s | t = i)γ f (s)ds
for any function f .
Definition 15 (Expectation with respect to infinite trajectory) For any bounded function f , we have
"∞
#
"N
#
X
X
i
i
Eτ
γ f (si ) , lim EτN
γ f (si ) .
N →∞
i=0
i=0
Here, the sum on the left-hand side is part of the symbol being defined.
Observation 16 (Property of expectation with respect to infinite trajectory)
hP
i
P∞ i
N
i f (s ) =
Eτ
γ
f
(s
)
=
lim
E
γ
i
i
N →∞ τN
i=0
i=0
PN R
= limN →∞ i=0 s p(s | t = i)γ i f (s)ds =
∞ Z
X
=
dp(s | t = i)γ i f (s)
i=0
s
for any bounded function f .
Definition 17 (Discounted-ergodic occupancy measure ρ)
ρ(s) =
∞
X
γ i p(s | t = i)
i=0
30
Expected Policy Gradients
The measure ρ is not normalised in general. Intuitively, it can be thought of as ‘marginalising
out’ the time in the system dynamics.
Lemma 18 (Discounted-ergodic property) For any bounded function f :
"
Z
ρ(s)f (s) = Eτ
s
∞
X
#
γ i f (si ) .
i=0
Proof
Eτ
"∞
X
#
i
γ f (si ) =
i=0
∞
X
γ
i
Z
p(s | t = i)f (s)ds =
s
i=0
Z "X
∞
s
#
i
γ p(s | t = i) f (s)ds
| i=0
{z
ρ(s)
}
Here, the first equality follows from Observation 16.
This property is useful since the expression on the left can be easily manipulated while the
expression on the right can be estimated from samples using Monte Carlo.
Lemma 19 (Generalised eigenfunction property) For any bounded function f :
Z
Z
γ
0
Z
dp(s | s)f (s ) =
dρ(s)
s0
s
0
s
Z
dρ(s)f (s) −
dp0 (s)f (s)
s
Proof
γ
R
s dρ(s)
R
s0
R
P
i
0
0
0
dp(s0 | s)f (s0 ) = γ ∞
i=0 γ s,s0 p(s | t = i)p(s | s)f (s )dsds =
P∞ i+1 R
0
0
= i=0 γ
0 dp(s | t = i + 1)f (s )
P∞ i R s 0
= i=1 γ s0 dp(s | t = i)f (s0 )
R
P∞ i R
0
0
=
dp
(s)f
(s)
0
i=0 γ s0 dp(s | t = i)f (s ) −
s
R
R
= s dρ(s)f (s) − s dp0 (s)f (s)
Here, the first equality follows form definition 17, the second one from definition 12. The
last equality follows again from definition 17.
Definition 20 (Markov Reward Process) A Markov Reward Process is a tuple (p, p0 , R, γ),
where p(s0 |s) is a transition kernel, p0 is the distribution over initial states, R(·|s) is a reward
distribution conditioned on the state and γ is the discount constant.
An MRP can be thought of as an MDP
R with a fixed policy and dynamics given by
marginalising out the actions pπ (s0 | s) = a dπ(a | s)p(s0 | a, s). Since this paper considers
the case of one policy, we abuse notation slightly by using the same symbol τ to denote trajectories including actions, i.e. (s0 , a0 , r0 , s1 , a1 , r1 , . . . ) and without them (s0 , r0 , s1 , r1 , . . . ).
31
Ciosek and Whiteson
Lemma 21 (Second Moment Bellman Equation) Consider a Markov Reward Process
(p, p0 , X, γ) where p(s0 | s) is a Markov process and X(· | s) is some probability density
function16 . Denote the value function of the MRP as V . Denote the second moment function
S as
!2
∞
X
S(s) = Eτ
γ t xt
s0 = s xt ∼ X(· | st ).
t=0
Then S is the value function of the MRP: (p, p0 , u, γ 2 ), where u(s) is a deterministic random
variable given by
2
u(s) = VX(x|s) [x] + EX(x|s) [x] + 2γEX(x|s) [x] Ep(s0 |s) V (s0 ) .
Proof
i
tx 2 s = s
γ
t
0
t=1
h
i
P
P∞ t 2
∞
tx +
= Eτ x20 + 2x0
γ
γ
x
s
=
s
t
t
0
t=1
t=1
h P
i
2
P∞ t
∞
tx 2 s = s
= Eτ x0 s0 = s + Eτ 2x0
γ
x
s
=
s
+
+
E
γ
t
0
τ
t
0
t=1
t=1
{z
}
|
|
{z
}
S(s) = Eτ
h
x0 +
P∞
u(s)
γ 2 Ep(s0 |s) [S(s0 )]
This is exactly the Bellman equation of the MRP (p, p0 , u, γ 2 ). The theorem follows since
the Bellman equation uniquely determines the value function.
Observation 22 (Dominated Value Functions) Consider two Markov Reward Processes
(p, p0 , X1 , γ) and (p, p0 , X2 , γ), where p(s0 | s) is a Markov process (common to both
MRPs) and X1 (s), X2 (s) are some deterministic random variables meeting the condition X1 (s) ≤ X2 (s) for every s. Then the value functions V1 and V2 of the respective MRPs
satisfy V1 (s) ≤ V2 (s) for every s. Moreover, if we have that X1 (s) < X2 (s) for all states,
then the inequality between value functions is strict.
Proof Follows trivially by expanding the value function as a series and comparing series
elementwise.
A.2 Computation of Moments for an Exponential Family
Consider the moment generating function of T (a), which we denote as MT , for the exponential
family of the form given in Equation 15.
MT (v) = eUv+ηθ −Uηθ
16. Note that while X occupies a place in the definition of the MRP usually called ‘reward distribution’, we
are using the symbol X, not R since we shall apply the lemma to Xes which are constructions distinct
from the reward of the MDP we are solving.
32
Expected Policy Gradients
It is well-known that MT is finite in a neighbourhood of the origin (Bickel and Doksum,
2006), and hence the cross moments can be obtained as:
K
Y
∂
p(j)
MT (v)
Ea∼π
T (a)j = p(1)
p(2)
∂ v1 , ∂ v2 , . . . , ∂ p(K) vK
v=0
j=1
Here, we denoted as K the size of the sufficient statistic (i.e. the length of the vector T (a)).
However, we seek the cross-moments of a, not T (a). If T (a) contains a subset of indices
which correspond to the vector a, then we can simply use the corresponding indices in the
above equation. On the other hand, if this is not the case, we can introduce an extended
0> 0
distribution π 0 (a | s) = eη θ T (a)−Uηθ +W (a) ., where T 0 is a vector concatenation of T and
a. We can then use the MGF of T 0 (a), restricted to a suitable set of indices, to get the
moments.
References
Shun-Ichi Amari. Natural gradient works efficiently in learning. Neural computation, 10(2):
251–276, 1998.
K. Asadi, C. Allen, M. Roderick, A.-r. Mohamed, G. Konidaris, and M. Littman. Mean
Actor Critic. ArXiv e-prints, September 2017.
Leemon Baird et al. Residual algorithms: Reinforcement learning with function approximation. In Proceedings of the twelfth international conference on machine learning, pages
30–37, 1995.
Shalabh Bhatnagar, Mohammad Ghavamzadeh, Mark Lee, and Richard S Sutton. Incremental natural actor-critic algorithms. In Advances in neural information processing systems,
pages 105–112, 2008.
Peter Bickel and Kjell Doksum. Mathematical Statistics, Basic Ideas and Selected Topics,
Vol. 1, (2nd Edition). Prentice Hall, 2 edition, 2006. ISBN 0132306379.
Greg Brockman, Vicki Cheung, Ludwig Pettersson, Jonas Schneider, John Schulman, Jie
Tang, and Wojciech Zaremba. Openai gym. arXiv preprint arXiv:1606.01540, 2016.
Kamil Ciosek and Shimon Whiteson. Expected policy gradients. In AAAI 2018: Proceedings
of the Thirty-Second AAAI Conference on Artificial Intelligence, February 2018.
John L Crassidis and John L Junkins. Optimal estimation of dynamic systems. CRC press,
2011.
Thomas Degris, Martha White, and Richard S Sutton. Off-policy actor-critic. arXiv preprint
arXiv:1205.4839, 2012.
Michael Fairbank. Value-gradient learning. PhD thesis, City University London, 2014.
Michael Fairbank and Eduardo Alonso. Value-gradient learning. In Neural Networks
(IJCNN), The 2012 International Joint Conference on, pages 1–8. IEEE, 2012.
33
Ciosek and Whiteson
Thomas Furmston and David Barber. A unifying perspective of parametric policy search
methods for markov decision processes. In Advances in neural information processing
systems, pages 2717–2725, 2012.
Thomas Furmston, Guy Lever, and David Barber. Approximate newton methods for policy
search in markov decision processes. Journal of Machine Learning Research, 17:1–51,
2016.
Shixiang Gu, Timothy Lillicrap, Zoubin Ghahramani, Richard E Turner, and Sergey
Levine. Q-prop: Sample-efficient policy gradient with an off-policy critic. arXiv preprint
arXiv:1611.02247, 2016a.
Shixiang Gu, Timothy Lillicrap, Ilya Sutskever, and Sergey Levine. Continuous deep qlearning with model-based acceleration. In International Conference on Machine Learning,
pages 2829–2838, 2016b.
Nicolas Heess, Gregory Wayne, David Silver, Tim Lillicrap, Tom Erez, and Yuval Tassa.
Learning continuous control policies by stochastic value gradients. In Advances in Neural
Information Processing Systems, pages 2944–2952, 2015.
Riashat Islam, Peter Henderson, Maziar Gomrokchi, and Doina Precup. Reproducibility of
benchmarked deep reinforcement learning tasks for continuous control. arXiv preprint
arXiv:1708.04133, 2017.
Sham M Kakade. A natural policy gradient. In Advances in neural information processing
systems, pages 1531–1538, 2002.
Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv
preprint arXiv:1412.6980, 2014.
Michail G Lagoudakis and Ronald Parr. Least-squares policy iteration. Journal of machine
learning research, 4(Dec):1107–1149, 2003.
Weiwei Li and Emanuel Todorov. Iterative linear quadratic regulator design for nonlinear
biological movement systems. In ICINCO (1), pages 222–229, 2004.
Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval
Tassa, David Silver, and Daan Wierstra. Continuous control with deep reinforcement
learning. arXiv preprint arXiv:1509.02971, 2015.
Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy Lillicrap,
Tim Harley, David Silver, and Koray Kavukcuoglu. Asynchronous methods for deep
reinforcement learning. In International Conference on Machine Learning, pages 1928–
1937, 2016.
Ofir Nachum, Mohammad Norouzi, Kelvin Xu, and Dale Schuurmans. Bridging the gap
between value and policy based reinforcement learning. arXiv preprint arXiv:1702.08892,
2017.
34
Expected Policy Gradients
Gergely Neu, Anders Jonsson, and Vicenç Gómez. A unified view of entropy-regularized
markov decision processes. arXiv preprint arXiv:1705.07798, 2017.
Brendan O’Donoghue, Remi Munos, Koray Kavukcuoglu, and Volodymyr Mnih. Combining
policy gradient and q-learning. 2016.
Simone Parisi, Matteo Pirotta, and Marcello Restelli. Multi-objective reinforcement learning
through continuous pareto manifold approximation. Journal of Artificial Intelligence
Research, 57:187–227, 2016.
Jan Peters and Stefan Schaal. Policy gradient methods for robotics. In Intelligent Robots
and Systems, 2006 IEEE/RSJ International Conference on, pages 2219–2225. IEEE, 2006.
Jan Peters and Stefan Schaal. Natural actor-critic. Neurocomputing, 71(7):1180–1190, 2008a.
Jan Peters and Stefan Schaal. Reinforcement learning of motor skills with policy gradients.
Neural networks, 21(4):682–697, 2008b.
Jan Peters, Katharina Mülling, and Yasemin Altun. Relative entropy policy search. In
AAAI, pages 1607–1612. Atlanta, 2010.
Matteo Pirotta, Marcello Restelli, and Luca Bascetta. Adaptive step-size for policy gradient
methods. In Advances in Neural Information Processing Systems, pages 1394–1402, 2013.
Martin L Puterman. Markov decision processes: discrete stochastic dynamic programming.
John Wiley & Sons, 2014.
Michael Roth, Gustaf Hendeby, and Fredrik Gustafsson. Nonlinear kalman filters explained:
A tutorial on moment computations and sigma point methods. Journal of Advances in
Information Fusion, 11(1):47–70, 2016.
Gavin A Rummery and Mahesan Niranjan. On-line Q-learning using connectionist systems.
University of Cambridge, Department of Engineering, 1994.
John Schulman, Sergey Levine, Pieter Abbeel, Michael Jordan, and Philipp Moritz. Trust
region policy optimization. In Proceedings of the 32nd International Conference on
Machine Learning (ICML-15), pages 1889–1897, 2015.
John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. Proximal
policy optimization algorithms. arXiv preprint arXiv:1707.06347, 2017.
David Silver, Guy Lever, Nicolas Heess, Thomas Degris, Daan Wierstra, and Martin
Riedmiller. Deterministic policy gradient algorithms. In ICML, 2014.
Marshall H Stone. The generalized weierstrass approximation theorem. Mathematics
Magazine, 21(5):237–254, 1948.
Richard S Sutton. Generalization in reinforcement learning: Successful examples using
sparse coarse coding. Advances in neural information processing systems, pages 1038–1044,
1996.
35
Ciosek and Whiteson
Richard S Sutton and Andrew G Barto. Reinforcement learning: An introduction, volume 1.
MIT press Cambridge, 1998.
Richard S Sutton, David A McAllester, Satinder P Singh, and Yishay Mansour. Policy
gradient methods for reinforcement learning with function approximation. In Advances in
neural information processing systems, pages 1057–1063, 2000.
Emanuel Todorov, Tom Erez, and Yuval Tassa. Mujoco: A physics engine for modelbased control. In Intelligent Robots and Systems (IROS), 2012 IEEE/RSJ International
Conference on, pages 5026–5033. IEEE, 2012.
George E Uhlenbeck and Leonard S Ornstein. On the theory of the brownian motion.
Physical review, 36(5):823, 1930.
Harm van Seijen, Hado van Hasselt, Shimon Whiteson, and Marco Wiering. A theoretical and empirical analysis of expected sarsa. In ADPRL 2009: Proceedings of the
IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning, pages
177–184, March 2009. URL http://www.cs.ox.ac.uk/people/shimon.whiteson/pubs/
vanseijenadprl09.pdf.
Karl Weierstrass. Über die analytische Darstellbarkeit sogenannter willkürlicher Functionen
einer reellen Veränderlichen. Sitzungsberichte der Königlich Preußischen Akademie der
Wissenschaften zu Berlin, 2:633–639, 1885.
36
| 2cs.AI
|