text
stringlengths
2.85k
2.55M
label
class label
11 classes
Constrained Submodular Maximization via a Non-symmetric Technique arXiv:1611.03253v1 [cs.DS] 10 Nov 2016 Niv Buchbinder∗ Moran Feldman† November 11, 2016 Abstract The study of combinatorial optimization problems with a submodular objective has attracted much attention in recent years. Such problems are important in both theory and practice because their objective functions are very general. Obtaining further improvements for many submodular maximization problems boils down to finding better algorithms for optimizing a relaxation of them known as the multilinear extension. In this work we present an algorithm for optimizing the multilinear relaxation whose guarantee improves over the guarantee of the best previous algorithm (which was given by Ene and Nguyen (2016)). Moreover, our algorithm is based on a new technique which is, arguably, simpler and more natural for the problem at hand. In a nutshell, previous algorithms for this problem rely on symmetry properties which are natural only in the absence of a constraint. Our technique avoids the need to resort to such properties, and thus, seems to be a better fit for constrained problems. ∗ Department of Statistics and Operations Research, School of Mathematical Sciences, Tel Aviv university, Israel. Email: niv.buchbinder@gmail.com. † Depart. of Mathematics and Computer Science, The Open University of Israel. Email: moranfe@openu.ac.il. 1 Introduction The study of combinatorial optimization problems with a submodular objective has attracted much attention in recent years. Such problems are important in both theory and practice because their objective functions are very general—submodular functions generalize, for example, cuts functions of graphs and directed graphs, the mutual information function, matroid weighted rank functions and log-determinants. More specifically, from a theoretical perspective, many well-known problems in combinatorial optimization are in fact submodular maximization problems, including: Max-Cut [30, 33, 38, 40, 56], Max-DiCut [20, 30, 31], Generalized Assignment [10, 14, 22, 27], Max-k-Coverage [19, 41], Max-Bisection [3, 28] and Facility Location [1, 16, 17]. From a practical perspective, submodular maximization problems have found uses in social networks [32, 39], vision [5, 36], machine learning [43, 44, 45, 49, 50] and many other areas (the reader is referred, for example, to a comprehensive survey by Bach [4]). The techniques used by approximation algorithms for submodular maximization problems usually fall into one of two main approaches. The first approach is combinatorial in nature, and is mostly based on local search techniques and greedy rules. This approach has been used as early as the late 70’s for maximizing a monotone submodular function subject to a matroid constraint (some of these works apply only to specific types of matroids) [15, 26, 34, 35, 37, 42, 53, 54]. Later works used this approach to handle also problems with non-monotone submodular objective functions and different constraints [6, 21, 25, 47, 48], yielding in some cases optimal algorithms [6, 55]. However, algorithms based on this approach tend to be highly tailored for the specific structure of the problem at hand, making extensions quite difficult. The second approach used by approximation algorithms for submodular maximization problems overcomes the above obstacle. This approach resembles a common paradigm for designing approximation algorithms and involves two steps. In the first step a fractional solution is found for a relaxation of the problem, known as the multilinear relaxation. In the second step the fractional solution is rounded to obtain an integral one while incurring a bounded loss in the objective. This approach has been used to obtain improved approximations for many problems [8, 11, 12, 24, 46]. Various techniques have been developed for rounding the fractional solution. These techniques tend to be quite flexible, and usually can extend to many related problem. In particular, the Contention Resolution Schemes framework of [12] yields a rounding procedure for every constraint which can be presented as the intersection of a few basic constraints such as knapsack constraints, matroid constraints and matching constraints. Given this wealth of rounding procedures, obtaining further improvements for many important submodular maximization problems (such as maximizing a submodular function subject to a matroid or knapsack constraint) boils down to obtaining improved algorithms for finding a good fractional solution, i.e., optimizing the multilinear relaxation. 1.1 Maximizing the Multilinear Relaxation At this point we would like to present some terms more formally. A submodular function is a set function f : 2N → R obeying f (A) + f (B) ≥ f (A ∪ B) + f (A ∩ B) for any sets A, B ⊆ N . A submodular maximization problem is the problem of finding a set S ⊆ N maximizing f subject to some constraint. Formally, let I be the set of subsets of N obeying the constraint. Then, we are interested in the following problem. max f (A) s.t. A ∈ I ⊆ 2N A relaxation of the above problem replaces I with a polytope P ⊆ [0, 1]N containing the 1 characteristic vectors of all the sets of I. In addition, a relaxation must replace the function f with an extension function F : [0, 1]N → R. Thus, a relaxation is a fractional problem of the following format. max F (x) s.t. x ∈ P ⊆ [0, 1]N Defining the “right” extension function, F , for the relaxation is a challenge, as, unlike the linear case, there is no single natural candidate. The objective that turned out to be useful, and is, thus, used by multilinear relaxation is known as the multilinear extension (first introduced by [8]). The value F (x) of this extension for any vector x ∈ [0, 1]N is defined as the expected value of f over a random subset R(x) ⊆ N containing every element u ∈ N independently with probability xu . Formally, for every x ∈ [0, 1]N , Y X Y (1 − xu ) . F (x) = E[R(x)] = f (S) xu S⊆N u∈S u∈S / The first algorithm for optimizing the multilinear relaxation was the Continuous Greedy algorithm designed by Calinescu et al. [8]. When the submodular function f is non-negative and monotone1 and P is solvable2 this algorithm finds a vector x ∈ P such that E[F (x)] ≥ (1 − 1/e − o(1)) · f (OP T ) (where OP T is the set maximizing f among all sets whose characteristic vectors belongs to P ). Interestingly, the guarantee of Continuous Greedy is optimal for monotone functions even when P is a simple cardinality constraint [8, 53]. Optimizing the multilinear relaxation when f is not necessarily monotone proved to be a more challenging task. Initially, several algorithms for specific polytopes were suggested [29, 47, 57]. Later on, improved general algorithms were designed that work whenever f is non-negative and P is down-closed3 and solvable [13, 24]. Designing algorithms that work in this general setting is highly important as many natural constraints fall into this framework. Moreover, the restriction of the algorithms to down-closed polytopes is unavoidable as Vondrák [57] proved that no algorithm can produce a vector x ∈ P obeying E[F (x)] ≥ c · f (OP T ) for any constant c > 0 when P is solvable but not down-closed. Up until recently, the best algorithm for this general setting was called Measured Continuous Greedy [24]. It guaranteed to produce a vector x ∈ P obeying E[F (x)] ≥ (1/e − o(1)) · f (OP T ) ≈ 0.367 · f (OP T ) [24]. The natural feel of the guarantee of Measured Continuous Greedy and the fact that it was not improved for a few years made some people suspect that it is optimal. Recently, an evidence against this conjecture was given by [7], which described an algorithm for the special case of a cardinality constraint with an improved approximation guarantee of 0.371. Even more recently, Ene and Nguyen [18] shuttered the conjecture completely. By extending the technique used by [7], they showed that one can get an approximation guarantee 0.372 for every down-closed and solvable polytope P . On the inapproximability side, Oveis Gharan and Vondrák [29] proved that no algorithm can achieve approximation better than 0.478 even when P is the matroid polytope of a partition matroid. Closing the gap between the best algorithm and inapproximability result for this fundamental problem remains an important open problem. 1 A A 3 A upper 2 set function f : 2N → R is monotone if f (A) ≤ f (B) for every A ⊆ B ⊆ N . polytope is solvable if one can optimize linear functions over it. polytope P ⊆ [0, 1]N is down-closed if y ∈ P implies that every vector x ∈ [0, 1]N which is coordinate-wise bounded by y must belong to P as well. 2 1.2 Our Contribution Our main contribution is an algorithm with an improved guarantee for maximizing the multilinear relaxation. Theorem 1.1. There exists a polynomial time algorithm that given a non-negative submodular function f : 2N → R≥0 and a solvable down-closed polytope P ⊆ [0, 1]N finds a vector x ∈ P obeying F (x) ≥ 0.385 · f (OP T ), where OP T = arg max{f (S) : 1S ∈ P } and F is the multilinear extension of f . Admittedly, the improvement in the guarantee obtained by our algorithm compared to the 0.372 guarantee of [18] is relatively small. However, the technique underlying our algorithm is very different, and, arguably, much cleaner, than the technique underlying the previous results improving over the natural guarantee of 1/e [7, 18]. Moreover, we believe our technique is more natural for the problem at hand, and thus, is likely to yield further improvements in the future. In the rest of this section we explain the intuition on which we base this belief. The results of [7, 18] are based on the observation that the guarantee of Measured Continuous Greedy improves when the algorithm manages to increase all the coordinates of its solution at a slow rate. Based on this observation, [7, 18] run an instance of Measured Continuous Greedy (or a discretized version of it), and force it to raise the coordinates slowly. If this extra restriction does not affect the behavior of the algorithm significantly, then it produces a solution with an improved guarantee. Otherwise, [7, 18] argue that the point in which the extra restriction affect the behavior of Measured Continuous Greedy reveals a vector x ∈ P which contains a significant fraction of OP T . Once x is available, one can use the technique of unconstrained submodular maximization, described by [6], that has higher approximation guarantee of 1/2 > 1/e, to extract from x a vector 0 ≤ y ≤ x of large value. The down-closeness of P guarantees that y belongs to P as well. Unfortunately, the use of the unconstrained submodular maximization technique in the above approach is very problematic for two reasons. First, this technique is based on ideas that are very different from the ideas used by the analysis of Measured Continuous Greedy. This makes the combination of the two quite involved. Second, on a more abstract level, the unconstrained submodular maximization technique is based on a symmetry which exists in the absence of a constraint since f¯(S) = f (N \ S) is non-negative and submodular whenever f has these properties. However, this symmetry breaks when a constraint is introduced, and thus, the unconstrained submodular maximization technique does not seem to be a good fit for a constrained problem. Our algorithm replaces the symmetry based unconstrained submodular maximization technique with a local search algorithm. More specifically, it first executes the local search algorithm. If the output of the local search algorithm is good, then our algorithm simply returns it. Otherwise, we observe that the poor value of the output of the local search algorithm guarantees that it is also far from OP T in some sense. Our algorithm then uses this far from OP T solution to guide an instance of Measured Continuous Greedy, and help it avoid bad decisions. As it turns out, the analysis of Measured Continuous Greedy and the local search algorithm use similar ideas and notions. Thus, the two algorithms combine quite cleanly, as can be observed from Section 3. 3 2 Preliminaries Our analysis uses another useful extension of submodular functions. Given a submodular function f : 2N → R, its Lovász extension is a function fˆ: [0, 1]N → R defined by fˆ(x) = Z 1 f (Tλ (x))dλ , 0 where Tλ (x) = {u ∈ N : xu < λ}. The Lovász extension has many important applications (see, e.g., [9, 52]), however, in this paper we only use it in the context of the following known result (which is an immediate corollary of the work of [51]). Lemma 2.1. Given the multilinear extension F and the Lovász extension fˆ of a submodular function f : 2N → R, it holds that F (x) ≥ fˆ(x) for every vector x ∈ [0, 1]N . We now define some additional notation that we use. Given a set S ⊆ N and an element u ∈ N , we denote by 1S and 1u the characteristic vectors of the sets S and {u}, respectively, and by S + u and S − u the sets S ∪ {u} and S \ {u}, respectively. Given two vectors x, y ∈ [0, 1]N , we denote by x ∨ y, x ∧ y and x ◦ y the coordinate-wise maximum, minimum and multiplication, respectively, of x and y.4 Finally, given a vector x ∈ [0, 1]N and an element u ∈ N , we denote by ∂u F (x) the derivative of F with respect to u at the point x. The following observation gives a simple formula for ∂u F (x). This observation holds because F is a multilinear function. Observation 2.2. Let F (x) be the multilinear extension of a submodular function f : 2N → R. Then, for every u ∈ N and x ∈ [0, 1]N , (1 − xu ) · ∂u F (x) = F (x ∨ 1u ) − F (x) . In the rest of the paper we assume, without loss of generality, that 1u ∈ P for every element u ∈ N and that n is larger than any given constant. The first assumption is justified by the observation that every element u violating this assumption can be safely removed from N since it cannot belong to OP T . The second assumption is justified by the observation that it is possible to find a set S obeying 1S ∈ P and f (S) = f (OP T ) in constant time when n is a constant. Another issue that needs to be kept in mind is the representation of submodular functions. We are interested in algorithms whose time complexity is polynomial in |N |. However, the representation of the submodular function f might be exponential in this size; thus, we cannot assume that the representation of f is given as part of the input for the algorithm. The standard way to bypass this difficulty is to assume that the algorithm has access to f through an oracle. We assume the standard value oracle that is used in most of the previous works on submodular maximization. This oracle returns, given any subset S ⊆ N , the value f (S). 3 Main Algorithm In this section we present the algorithm used to prove Theorem 1.1. This algorithm uses two components. The first component is a close variant of a fractional local search algorithm suggested by Chekuri et al. [13] which has the following properties. 4 More formally, for every element u ∈ N , (x ∨ y)u = max{xu , yu }, (x ∧ y)u = min{xu , yu } and (x ◦ y)u = xu · yu . 4 Lemma 3.1 (Follows from Chekuri et al. [13]). There exists a polynomial time algorithm which returns vector x ∈ P such that, with high probability, for every vector y ∈ P , 1 1 F (x) ≥ F (x ∧ y) + F (x ∨ y) − o(1) · f (OP T ) . 2 2 (1) Proof. Let M = max{f (u), f (N − u) : u ∈ N }, and let a be an arbitrary constant larger than 3. Then, Lemmata 3.7 and 3.8 of Chekuri et al. [13] imply that, with high probability, the fractional local search algorithm they suggest terminates in polynomial time and outputs a vector x ∈ P obeying, for every vector y ∈ P , 2F (x) ≥ F (x ∧ y) + F (x ∨ y) − 5M . na−2 Moreover, the output vector x is in P whenever the fractional local search algorithm terminates. Our assumption that 1u ∈ P for every element u ∈ N implies, by submodularity, that f (S) ≤ n · f (OP T ) for every set S ⊆ N . Since M is the maximum over values of f , we get also M ≤ n · f (OP T ). Using this observation, and plugging a = 4, we get that there exists an algorithm which, with high probability, terminates after T (n) operations (for some polynomial function T (n)) T) for every vector y ∈ P . and outputs a vector x ∈ P obeying 2F (x) ≥ F (x ∧ y) + F (x ∨ y) − 5·f (OP n Moreover, the output vector x belongs to P whenever the algorithm terminates. To complete the lemma, we consider a procedure that executes the above algorithm for T (n) operations, and return its output if it terminates within this number of operations. If the algorithm fails to terminate within this number of operations, which happens with a diminishing probability, then the procedure simply returns 1∅ (which always belongs to P since P is down-closed). One can observe that this procedure has all the properties guaranteed by the lemma. The second component of our algorithm is a new auxiliary algorithm which we present and analyze in Section 4. This auxiliary algorithm is the main technical contribution of this paper, and its guarantee is given by the following theorem. Theorem 3.2. There exists a polynomial time algorithm that given a vector z ∈ [0, 1]N and a value ts ∈ [0, 1] outputs a vector x ∈ P obeying E[F (x)] ≥ ets −1 · [(2 − ts − e−ts − o(1)) · f (OP T ) − (1 − e−ts ) · F (z ∧ 1OP T ) −ts − (2 − ts − 2e (2) ) · F (z ∨ 1OP T )] . Our main algorithm executes the algorithms suggested by Lemma 3.1 followed by the algorithm suggested by Theorem 3.2. Notice that the second of these algorithms has two parameters in addition to f and P : a parameter z which is set to be the output of the first algorithm, and a parameter ts which is set to be a constant to be determined later. After the two above algorithms terminate, our algorithm returns the output of the first algorithm with probability p, for a constant p to be determined later, and with the remaining probability it returns the output of the second algorithm.5 A formal description of our algorithm is given as Algorithm 1. Observe that Lemma 3.1 and Theorem 3.2 imply together that Algorithm 1 is a polynomial time algorithm which always outputs a vector in P . To prove Theorem 1.1, it remains to analyze the quality of the solution produced by Algorithm 1. 5 Clearly it is always better to return the better of the two solution instead of randomizing between them. However, doing so will require the algorithm to either have an oracle access to F or estimate the values of the solutions using sampling (the later can be done using standard techniques—see, e.g., [8]). For the sake of simplicity, we chose here the easier to analyze approach of randomizing between the two solutions. 5 Algorithm 1: Main Algorithm(f, P ) 1 2 3 Execute the algorithm suggested by Lemma 3.1, and let x1 ∈ P be its output. Execute the algorithm suggested by Theorem 3.2 with z = x1 , and let x2 be its output. return with probability p the solution x1 , and the solution x2 otherwise. Lemma 3.3. When its parameters are set to ts = 0.372 and p = 0.23, Algorithm 1 produces a solution whose expected value is at least 0.385 · f (OP T ). Proof. Let E be the event that x1 , the output of the algorithm suggested by Lemma 3.1, satisfies Inequality (1). Since E is a high probability event, it is enough to prove that, conditioned on E, Algorithm 1 produces a solution whose expected value is at least c · f (OP T ) for some constant c > 0.385. The rest of the proof of the lemma is devoted to proving the last claim. Throughout it, everything is implicitly conditioned on E. As we are conditioning on E, we can plug y = 1OP T and, respectively, y = x1 ∧ 1OP T into Inequality (1) to get 1 1 F (x1 ) ≥ F (x1 ∧ 1OP T ) + F (x1 ∨ 1OP T ) − o(1) · f (OP T ) (3) 2 2 and F (x1 ) ≥ F (x1 ∧ 1OP T ) − o(1) · f (OP T ) , (4) where the last inequality follows by noticing that x1 ∨ (x1 ∧ 1OP T ) = x1 . Next, let E[F (x2 ) | x1 ] denote the expected value of F (x2 ) conditioned on the given value of x1 . Inequality (2) guarantees that E[F (x2 ) | x1 ] ≥ ets −1 · [(2 − ts − e−ts − o(1)) · f (OP T ) − (1 − e−ts ) · F (x1 ∧ 1OP T ) −ts − (2 − ts − 2e (5) ) · F (x1 ∨ 1OP T )] . Recall that Algorithm 1 returns x1 with probability p, and x2 otherwise. Hence, the expected value of its output is E[p · F (x1 ) + (1 − p) · E[F (x2 ) | x1 ]] , (6) where the expectation is over x1 . Optimizing the constants. We would like to derive from Inequalities (3), (4) and (5) the best lower bound we can get on (6). To this end, let p1 and p2 be two non-negative numbers such that p1 + p2 = p, and let p3 = 1 − p. Using the above inequalities and this notation, (6) can now be lower bounded by   1 1 p1 · E[F (x1 ∧ 1OP T )] + E[F (x1 ∨ 1OP T )] − o(1) · f (OP T ) 2 2 + p2 · [E[F (x1 ∧ 1OP T )] − o(1) · f (OP T )] + p3 · ets −1 · [(2 − ts − e−ts − o(1)) · f (OP T ) − (1 − e−ts ) · E[F (x1 ∧ 1OP T )] − (2 − ts − 2e−ts ) · E[F (x1 ∨ 1OP T )]] , which can be rewritten as p  + p2 − p3 · ets −1 (1 − e−ts ) · E[F (x1 ∧ 1OP T )]   p2 1 − p3 · ets −1 (2 − ts − 2e−ts ) · E[F (x1 ∨ 1OP T )] + 2 + p3 · ets −1 (2 − ts − e−ts ) · f (OP T ) − o(1) · f (OP T ) . 1 6 To get the most out of this lower bound we need to maximize the coefficient of f (OP T ) while keeping the coefficients of E[F (x1 ∧ 1OP T )] and E[F (x1 ∨ 1OP T )] non-negative (so that they can be ignored due to non-negativity of f ). This objective is formalized by the following non-convex program. max p3 · ets −1 (2 − ts − e−ts ) s.t. p1 /2 + p2 − p3 · ets −1 (1 − e−ts ) p1 /2 − p3 · ets −1 (2 − ts − 2e−ts ) p1 + p2 + p3 p 1 , p 2 , p 3 , ts ≥0 ≥0 =1 ≥0 Solving the program, we get that the best solution is approximately p1 = 0.205, p2 = 0.025, p3 = 0.770 and ts = 0.372, and the objective function value corresponding to this solution is at least 0.3856. Hence, we have managed to lower bound (6) (and thus, also the expected value of the output of Algorithm 1) by 0.3856 · f (OP T ) for p = 0.23 and ts = 0.372, which completes the proof of the lemma. 4 Aided Measured Continuous Greedy In this section we present the algorithm used to prove Theorem 3.2. Proving the above theorem directly is made more involved by the fact that the vector z might be fractional. Instead, we prove the following simplified version of Theorem 3.2 for integral values, and show that the simplified version implies the original one. Theorem 4.1. There exists a polynomial time algorithm that given a set Z ⊆ N and a value ts ∈ [0, 1] outputs a vector x ∈ P obeying E[F (x)] ≥ ets −1 · [(2 − ts − e−ts − o(1)) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )] . Next is the promised proof that Theorem 4.1 implies Theorem 3.2. Proof of Theorem 3.2 given Theorem 4.1. Consider an algorithm ALG that given the z and ts arguments specified by Theorem 3.2 executes the algorithm guaranteed by Theorem 4.1 with the same value ts and with a random set Z distributed like R(z). The output of ALG is then the output produced by the algorithm guaranteed by Theorem 4.1. Let us denote this output by x. Theorem 4.1 guarantees that, for every given Z, E[F (x) | Z] ≥ ets −1 · [(2 − ts − e−ts − o(1)) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )] . To complete the proof we take the expectation over Z over the two sides of the last inequality and observe that E[f (Z ∩ OP T )] = E[f (R(z) ∩ OP T )] = E[f (R(z ∧ 1OP T ))] = F (z ∧ 1OP T ) and E[f (Z ∪ OP T )] = E[f (R(z) ∪ OP T )] = E[f (R(z ∨ 1OP T ))] = F (z ∨ 1OP T ) . 7 In the rest of this section we give a non-formal proof of Theorem 4.1. This proof explains the main ideas necessary for proving the theorem, but uses some non-formal simplifications such as allowing a direct oracle access to the multilinear extension F and giving the algorithm in the form of a continuous time algorithm (which cannot be implemented on a discrete computer). There are known techniques for getting rid of these simplifications (see, e.g., [8]), and a formal proof of Theorem 4.1 based on these techniques is given in Appendix A. The algorithm we use for the non-formal proof of Theorem 4.1 is given as Algorithm 2. This algorithm starts with the empty solution y(0) = 1∅ at time 0, and grows this solution over time until it reaches the final solution y(1) at time 1. The way the solution grows varies over time. During the time range [ts , 1) the solution grows like in the Measured Continuous Greedy algorithm of [24]. On the other hand, during the earlier time range of [0, ts ) the algorithm pretends that the elements of Z do not exist (by giving them negative marginal profits), and grows the solution in the way Measured Continuous Greedy would have grown it if it was given the ground set N \ Z. The value ts is the time in which the algorithm switches between the two ways it uses to grow its solution, thus, the s in the notation ts stands for “switch”. Algorithm 2: Aided Measured Continuous Greedy (non-formal)(f, P, Z, ts ) 1 2 3 4 5 6 Let y(0) ← 1∅ . foreach t ∈ [0, 1) do For each u ∈ N let wu (t) ← F (y(t) ∨ 1u ) − F (y(t)). P P  arg maxx∈P { u∈N \Z wu (t) · xu (t) − u∈Z xu (t)} if t ∈ [0, ts ) , P Let x(t) ← arg maxx∈P if t ∈ [ts , 1) . u∈N wu (t) · xu (t) Increase y(t) at a rate of dy(t) dt = (1N − y(t)) ◦ x(t). return y(1). We first note that algorithm outputs a vector in P . Observation 4.2. y(1) ∈ P . Proof. Observe that x(t) ∈ P at eachR time t, which implies that (1N − y(t)) · x(t) is also in P since 1 P is down-closed. Therefore, y(1) = 0 (1N − y(t)) · x(t)dt is a convex combination of vectors in P , and thus, belongs to P . The following lemma lower bounds the increase in F (y(t)) as a function of t. Lemma 4.3. For every t ∈ [0, 1), ( F (y(t) ∨ 1OP T \Z ) − F (y(t)) dF (y(t)) ≥ dt F (y(t) ∨ 1OP T ) − F (y(t)) if t ∈ [0, ts ) , if t ∈ [ts , 1) . Proof. By the chain rule, ! ! X X dyu (t) ∂F (y) ∂F (y) dF (y(t)) = (1 − yu (t)) · xu (t) · = · dt dt ∂yu y=y(t) ∂yu y=y(t) u∈N u∈N X X = (xu (t) · [F (y(t) ∨ 1u ) − F (y(t))]) = xu (t) · wu (t) = x(t) · w(t) . u∈N (7) u∈N Consider first the case this time period Algorithm 2 chooses x(t) as the P t ∈ [0, ts ). During P vector in P maximizing u∈N \Z wu (t) · xu (t) − u∈Z xu (t). Since P is down-closed x(t) = 1OP T \Z 8 is in P and has value 1OP T \Z · w(t) and thus, we have x(t) · w(t) ≥ 1OP T \Z · w(t). Plugging this observation into Equality (7) yields dF (y(t)) = x(t) · w(t) ≥ 1OP T \Z · w(t) = dt ≥ F (y(t) ∨ 1OP T \Z ) − F (y(t)) , X [F (y(t) ∨ 1u ) − F (y(t))] u∈OP T \Z where the last inequality holds by the submodularity of f . Similarity, when t ∈ [ts , 1) Algorithm 2 chooses x(t) as the vector in P maximizing x(t) · w(t). Since 1OP T ∈ P , we get this time x(t) · w(t) ≥ 1OP T · w(t). Plugging this observation into Equality (7) yields X dF (y(t)) = x(t) · w(t) ≥ 1OP T · w(t) = [F (y(t) ∨ 1u ) − F (y(t))] dt u∈OP T ≥ F (y(t) ∨ 1OP T ) − F (y(t)) , where the last inequality holds again by the submodularity of f . Lemma 4.4. For every time t ∈ [0, 1) and set A ⊆ N it holds that   F (y(t) ∨ 1A ) ≥ e− max{0,t−ts } − e−t max {0, f (A) − f (A ∪ Z)} + e−t · f (A) . Proof. First, we note that for every time t ∈ [0, 1] and element u ∈ N , ( 1 − e−t if u 6∈ Z , yu (t) ≤ − max{0,t−t s} 1−e if u ∈ Z . (8) This follows for the following reason. Since x(t) is always in P ⊆ [0, 1]N , yu (t) obeys the differential inequality dy(t) = (1 − yu (t)) · x(t) ≤ (1 − yu (t)) . dt Using the initial condition yu (0) = 0, the solution for this differential inequality is yu (t) ≤ 1 − e−t . To get the tighter bound for u ∈ Z, we note that at every time t ∈ [0, ts ) Algorithm 2 chooses as x(t) a vector maximizing a linear function in P which assigns a negative weight to elements of Z. Since P is down-closed this maximum must have xu (t) = 0 for every element u ∈ Z. This means that yu (t) = 0 whenever u ∈ Z and t ∈ [0, ts ]. Moreover, plugging the improved initial condition yu (ts ) = 0 into the above differential inequality yields the promised tighter bound also for the range (ts , 1]. Next, let fˆ be the Lovász extension of f . Then, by Lemma 2.1, Z 1 ˆ f (Tλ (y(t) ∨ 1A ))dλ F (y(t) ∨ 1A ) ≥ f (y(t) ∨ 1A ) = 0 ≥ Z 1−e−t 1−e− max{0,t−ts } Z 1−e−t f (Tλ (y(t) ∨ 1A ))dλ + Z 1 1−e−t f (Tλ (y(t) ∨ 1A ))dλ f (Tλ (y(t) ∨ 1A ))dλ + e−t · f (A)   ≥ e− max{0,t−ts } − e−t max {0, f (A) − f (A ∪ Z)} + e−t · f (A) . = (9) (10) 1−e− max{0,t−ts } 9 (11) Inequality (9) follows by the non-negativity of f . Equality (10) follows since, for λ ∈ [1 − e−t , 1), Inequality (8) guarantees that yu (t) ≤ λ for every u ∈ N , and thus, Tλ (y(t) ∨ 1A ) = A. Finally Inequality (11) follows since, for λ ∈ [1 − e− max{0,t−ts } , 1 − e−t ), Inequality (8) guarantees that yu (t) ≤ λ for every u ∈ Z, and thus, Tλ (y(t) ∨ 1A ) = B(λ) ∪ A for some B(λ) ⊆ N \ Z. By the non-negativity of f , f (B(λ) ∪ A) ≥ 0. Also, by the submodularity and non-negativity of f , for every such set B(λ) f (B(λ) ∪ A) ≥ f (A) + f (B(λ) ∪ Z ∪ A) − f (Z ∪ A) ≥ f (A) − f (Z ∪ A) . Plugging the results of Lemma 4.4 into the lower bound given by Lemma 4.3 on the improvement in F (y(t)) as a function of t yields immediately the useful lower bound given by the next corollary.6 Corollary 4.5. For every t ∈ [0, 1), ( f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T ) − F (y(t)) dF (y(t)) ≥ dt ets −t · f (OP T ) − (ets −t − e−t ) · f (Z ∪ OP T ) − F (y(t)) if t ∈ [0, ts ) , if t ∈ [ts , 1) . Using the last corollary we can complete the proof of Theorem 4.1. Proof of Theorem 4.1. We have already seen that y(1)—the output of Algorithm 2—belongs to P . It remains to show that F (y(1)) ≥ ets −1 · [(2 − ts − e−ts ) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )] . Corollary 4.5 describes a differential inequality for F (y(t)). Given the boundary condition F (y(0)) ≥ 0, the solution for this differential inequality within the range t ∈ [0, ts ] is F (y(t)) ≥ (1 − e−t ) · f (OP T \ Z) − (1 − e−t − te−t ) · f (Z ∪ OP T ) . Plugging t = ts into the last inequality, we get F (y(ts )) ≥ (1 − e−ts ) · f (OP T \ Z) − (1 − e−ts − ts e−ts ) · f (Z ∪ OP T ) . Let v = (1 − e−ts ) · f (OP T \ Z) − (1 − e−ts − ts e−ts ) · f (Z ∪ OP T ) be the right hand side of the last inequality. Next, we solve again the differential inequality given by Corollary 4.5 for the range t ∈ [ts , 1] with the boundary condition F (y(ts )) ≥ v. The resulting solution is    F (y(t)) ≥ e−t (t − ts ) ets · f (OP T ) − (ets − 1) · f (Z ∪ OP T ) + vets Plugging t = 1 and the value of v we get    F (y(1)) ≥ e−1 (1 − ts ) ets · f (OP T ) − (ets − 1) · f (Z ∪ OP T ) + vets  1 − ts ts e · f (OP T ) − (ets − 1) · f (Z ∪ OP T ) (12) ≥ e + ets −1 · {(1 − e−ts ) · [f (OP T ) − f (OP T ∩ Z)] − (1 − e−ts − ts e−ts ) · f (Z ∪ OP T )} = ets −1 · [(2 − ts − e−ts ) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )] , where Inequality (12) follows since, by the submodularity and non-negativity of f , f (OP T \ Z) ≥ f (OP T ) − f (OP T ∩ Z) + f (∅) ≥ f (OP T ) − f (OP T ∩ Z) . 6 Note that Corollary 4.5 follows from a weaker version of Lemma 4.4 which only guarantees F (y(t) ∨ 1A ) ≥ (e − e−t ) · [f (A) − f (A ∪ Z)] + e−t · f (A). We proved the stronger version of the lemma above because it is useful in the formal proof of Theorem 4.1 given in Appendix A. − max{0,t−ts } 10 References [1] A. A. Ageev and M. I. Sviridenko. An 0.828 approximation algorithm for the uncapacitated facility location problem. Discrete Appl. Math., 93:149–156, July 1999. [2] Noga Alon and Joel H. Spencer. The Probabilistic Method. Wiley Interscience, second edition, 2000. [3] Per Austrin, Siavosh Benabbas, and Konstantinos Georgiou. Better balance by being biased: A 0.8776-approximation for max bisection. In SODA, pages 277–294, 2013. [4] Francis Bach. Learning with submodular functions: A convex optimization perspective. Foundations and Trends in Machine Learning, 6(2-3):145–373, 2013. [5] Y. Y. Boykov and M. P. Jolly. Interactive graph cuts for optimal boundary & region segmentation of objects in N-D images. In ICCV, volume 1, pages 105–112, 2001. [6] Niv Buchbinder, Moran Feldman, Joseph (Seffi) Naor, and Roy Schwartz. A tight linear time (1/2)-approximation for unconstrained submodular maximization. In FOCS, pages 649–658, 2012. [7] Niv Buchbinder, Moran Feldman, Joseph (Seffi) Naor, and Roy Schwartz. Submodular maximization with cardinality constraints. In SODA, pages 1433–1452, 2014. [8] Gruia Călinescu, Chandra Chekuri, Martin Pál, and Jan Vondrák. Maximizing a monotone submodular function subject to a matroid constraint. SIAM J. Comput., 40(6):1740–1766, 2011. [9] Chandra Chekuri and Alina Ene. Approximation algorithms for submodular multiway partition. In FOCS, pages 807–816, 2011. [10] Chandra Chekuri and Sanjeev Khanna. A polynomial time approximation scheme for the multiple knapsack problem. SIAM J. Comput., 35(3):713–728, September 2005. [11] Chandra Chekuri, Jan Vondrák, and Rico Zenklusen. Dependent randomized rounding via exchange properties of combinatorial structures. In FOCS, pages 575–584, 2010. [12] Chandra Chekuri, Jan Vondrák, and Rico Zenklusen. Submodular function maximization via the multilinear relaxation and contention resolution schemes. In STOC, pages 783–792, 2011. [13] Chandra Chekuri, Jan Vondrák, and Rico Zenklusen. Submodular function maximization via the multilinear relaxation and contention resolution schemes. SIAM J. Comput., 43(6):1831– 1879, 2014. [14] Reuven Cohen, Liran Katzir, and Danny Raz. An efficient approximation for the generalized assignment problem. Information Processing Letters, 100(4):162–166, 2006. [15] M. Conforti and G. Cornuèjols. Submodular set functions, matroids and the greedy algorithm. tight worstcase bounds and some generalizations of the radoedmonds theorem. Disc. Appl. Math., 7(3):251–274, 1984. [16] G. Cornuejols, M. L. Fisher, and G. L. Nemhauser. Location of bank accounts to optimize float: an analytic study of exact and approximate algorithms. Management Sciences, 23:789–810, 1977. 11 [17] G. Cornuejols, M. L. Fisher, and G. L. Nemhauser. On the uncapacitated location problem. Annals of Discrete Mathematics, 1:163–177, 1977. [18] Alina Ene and Huy L. Nguyen. Constrained submodular maximization: Beyond 1/e. In FOCS, 2016. [19] Uriel Feige. A threshold of ln n for approximating set cover. J. ACM, 45(4):634–652, 1998. [20] Uriel Feige and Michel X. Goemans. Aproximating the value of two prover proof systems, with applications to max 2sat and max dicut. In ISTCS, pages 182–189, 1995. [21] Uriel Feige, Vahab S. Mirrokni, and Jan Vondrák. Maximizing non-monotone submodular functions. SIAM Journal on Computing, 40(4):1133–1153, 2011. [22] Uriel Feige and Jan Vondrák. Approximation algorithms for allocation problems: Improving the factor of 1 − 1/e. In FOCS, pages 667–676, 2006. [23] Moran Feldman. Maximization Problems with Submodular Objective Functions. PhD thesis, Technion – Israel Institute of Technology, June 2013. [24] Moran Feldman, Joseph Naor, and Roy Schwartz. A unified continuous greedy algorithm for submodular maximization. In FOCS, pages 570–579, 2011. [25] Moran Feldman, Joseph (Seffi) Naor, Roy Schwartz, and Justin Ward. Improved approximations for k-exchange systems. In ESA, pages 784–798, 2011. [26] M. L. Fisher, G. L. Nemhauser, and L. A. Wolsey. An analysis of approximations for maximizing submodular set functions – ii. In Polyhedral Combinatorics, volume 8 of Mathematical Programming Studies, pages 73–87. Springer Berlin Heidelberg, 1978. [27] Lisa Fleischer, Michel X. Goemans, Vahab S. Mirrokni, and Maxim Sviridenko. Tight approximation algorithms for maximum general assignment problems. In SODA, pages 611–620, 2006. [28] Alan M. Frieze and Mark Jerrum. Improved approximation algorithms for max k-cut and max bisection. In IPCO, pages 1–13, 1995. [29] Shayan Oveis Gharan and Jan Vondrák. Submodular maximization by simulated annealing. In SODA, pages 1098–1117, 2011. [30] Michel X. Goemans and David P. Williamson. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. Journal of the ACM, 42(6):1115–1145, 1995. [31] Eran Halperin and Uri Zwick. Combinatorial approximation algorithms for the maximum directed cut problem. In SODA, pages 1–7, 2001. [32] Jason Hartline, Vahab Mirrokni, and Mukund Sundararajan. Optimal marketing strategies over social networks. In WWW, pages 189–198, 2008. [33] Johan Hȧstad. Some optimal inapproximability results. J. ACM, 48:798–859, July 2001. [34] D. Hausmann and B. Korte. K-greedy algorithms for independence systems. Oper. Res. Ser. A-B, 22(1):219–228, 1978. 12 [35] D. Hausmann, B. Korte, and T. Jenkyns. Worst case analysis of greedy type algorithms for independence systems. Math. Prog. Study, 12:120–131, 1980. [36] S. Jegelka and J. Bilmes. Submodularity beyond submodular energies: Coupling edges in graph cuts. 2012 IEEE Conference on Computer Vision and Pattern Recognition, 0:1897–1904, 2011. [37] T. Jenkyns. The efficacy of the greedy algorithm. Cong. Num., 17:341–350, 1976. [38] Richard M. Karp. Reducibility among combinatorial problems. In R. E. Miller and J. W. Thatcher, editors, Complexity of Computer Computations, pages 85–103. Plenum Press, 1972. [39] David Kempe, Jon Kleinberg, and Éva Tardos. Maximizing the spread of influence through a social network. In SIGKDD, pages 137–146, 2003. [40] Subhash Khot, Guy Kindler, Elchanan Mossel, and Ryan O’Donnell. Optimal inapproximability results for max-cut and other 2-variable csps? SIAM J. Comput., 37:319–357, April 2007. [41] S. Khuller, A. Moss, and J. Naor. The budgeted maximum coverage problem. Information Processing Letters, 70(1):39–45, 1999. [42] B. Korte and D. Hausmann. An analysis of the greedy heuristic for independence systems. Annals of Discrete Math., 2:65–74, 1978. [43] Andreas Krause, AjitSingh, and Carlos Guestrin. Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies. J. Mach. Learn. Res., 9:235–284, January 2008. [44] Andreas Krause and Carlos Guestrin. Near-optimal nonmyopic value of information in graphical models. In UAI, page 5, 2005. [45] Andreas Krause, Jure Leskovec, Carlos Guestrin, Jeanne VanBriesen, and Christos Faloutsos. Efficient sensor placement optimization for securing large water distribution networks. Journal of Water Resources Planning and Management, 134(6):516–526, November 2008. [46] Ariel Kulik, Hadas Shachnai, and Tami Tamir. Approximations for monotone and nonmonotone submodular maximization with knapsack constraints. Math. Oper. Res., 38(4):729–739, 2013. [47] Jon Lee, Vahab S. Mirrokni, Viswanath Nagarajan, and Maxim Sviridenko. Maximizing nonmonotone submodular functions under matroid or knapsack constraints. SIAM Journal on Discrete Mathematics, 23(4):2053–2078, 2010. [48] Jon Lee, Maxim Sviridenko, and Jan Vondrák. Submodular maximization over multiple matroids via generalized exchange properties. In APPROX, pages 244–257, 2009. [49] Hui Lin and Jeff Bilmes. Multi-document summarization via budgeted maximization of submodular functions. In North American chapter of the Association for Computational Linguistics/Human Language Technology Conference (NAACL/HLT-2010), Los Angeles, CA, June 2010. [50] Hui Lin and Jeff Bilmes. A class of submodular functions for document summarization. In HLT, pages 510–520, 2011. 13 [51] László Lovász. Submodular functions and convexity. In A. Bachem, M. Grötschel, and B. Korte, editors, Mathematical Programming: the State of the Art, pages 235–257. Springer, 1983. [52] L. Lovász M. Grötschel and A. Schrijver. The ellipsoid method and its consequences in combinatorial optimization. Combinatoria, 1(2):169–197, 1981. [53] G. L. Nemhauser and L. A. Wolsey. Best algorithms for approximating the maximum of a submodular set function. Mathematics of Operations Research, 3(3):177–188, 1978. [54] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functionsi. Mathematical Programming, 14:265–294, 1978. [55] Maxim Sviridenko. A note on maximizing a submodular set function subject to knapsack constraint. Operations Research Letters, 32:41–43, 2004. [56] Luca Trevisan, Gregory B. Sorkin, Madhu Sudan, and David P. Williamson. Gadgets, approximation, and linear programming. SIAM J. Comput., 29:2074–2097, April 2000. [57] Jan Vondrák. Symmetry and approximability of submodular maximization problems. SIAM J. Comput., 42(1):265–304, 2013. A A Formal Proof of Theorem 4.1 In this section we give a formal proof of Theorem 4.1. This proof is based on the same ideas used in the non-formal proof of this theorem in Section 4, but employs also additional known techniques in order to get rid of the issues that make the proof from Section 4 non-formal. The algorithm we use to prove Theorem 4.1 is given as Algorithm 3. This algorithm is a discrete variant of Algorithm 2. While reading the algorithm, it is important to observe that the choice of the values δ̄1 and δ̄2 guarantees that the variable t takes each one of the values ts and 1 at some point, and thus, the vectors y(ts ) and y(1) are well defined. Algorithm 3: Aided Measured Continuous Greedy(f, P, Z, ts ) 1 2 3 4 5 6 7 8 9 10 // Initialization Let δ̄1 ← ts · n−4 and δ̄2 ← (1 − ts ) · n−4 . Let t ← 0 and y(t) ← 1∅ . // Growing y(t) while t < 1 do foreach u ∈ N do Let wu (t) be an estimate of E[f (u | R(y(t))] obtained by averaging the values of f (u | R(y(t)) for r = ⌈48n6 ln(2n)⌉ independent samples of R(y(t)). P P  arg maxx∈P { u∈N \Z wu (t) · xu (t) − u∈Z xu (t)} if t ∈ [0, ts ) , P Let x(t) ← if t ∈ [ts , 1) . arg maxx∈P u∈N wu (t) · xu (t) Let δt be δ̄1 when t < ts and δ̄2 when t ≥ ts . Let y(t + δt ) ← y(t) + δt (1N − y(t)) ◦ x(t). Update t ← t + δt . return y(1). 14 We begin the analysis of Algorithm 3 by showing that y(t) remains within the cube [0, 1]N throughout the execution of the algorithm. Without this observation, the algorithm is not welldefined. Observation A.1. For every value of t, y(t) ∈ [0, 1]N . Proof. We prove the observation by induction on t. Clearly the observation holds for y(0) = 1∅ . Assume the observation holds for some time t, then, for every u ∈ N , yu (t + δt ) = yu (t) + δt (1 − yu (t)) · xu (t) ≥ 0 , where the inequality holds since the induction hypothesis implies 1 − yu (t) ∈ [0, 1]. A similar argument also implies yu (t + δt ) = yu (t) + δt (1 − yu (t)) · xu (t) ≤ yu (t) + (1 − yu (t)) = 1 . Using the last observation it is now possible to prove the following counterpart of Observation 4.2. Corollary A.2. Algorithm 3 always outputs a vector in P . Proof. Let T be the set of values t takes P P during the execution of Algorithm 3. We observe that δ = 1, which implies that t∈T \{1} t t∈T \{1} δt · x(t) is a convex combination of the vectors {x(t) : t ∈ T \ {1}}. P As all these vectors belong to P , and P is convex, any convex combination of them, including t∈T \{1} δt · x(t), must be in P . Next, we rewrite the output of Algorithm 3 as X X δt · x(t) . δt (1N − y(t)) ◦ x(t) ≤ y(1) = t∈T \{1} t∈T \{1} By the above discussion the rightmost hand side of this inequality is a vector in P , which implies that y(1) ∈ P since P is down-closed. The next step towards showing that Algorithm 3 proves Theorem 4.1 is analyzing its approximation ratio. We start this analysis by showing that with high probability all the estimations made by the algorithm are quite accurate. Let A be the event that |wu (t)−E[f (u | R(y(t)))]| ≤ n−2 ·f (OP T ) for every u ∈ N and time t. Lemma A.3 (The symmetric version of Theorem A.1.16 in [2]). Let Xi , 1 ≤ i ≤ k, be mutually independent with all E[Xi ] = 0 and all |Xi | ≤ 1. Set S = X1 + · · · + Xk . Then, Pr[|S| > a] ≤ 2 2e−a /2k . Corollary A.4. Pr[A] ≥ 1 − n−1 . Proof. Consider the calculation of wu (t) for a given u ∈ N and time t. This calculation is done by averaging the value of f (u | R(y(t))) for r independent samples of R(y(t)). Let Yi denote the value (u|R(y(t)))] . Then, by definition, of f (u | R(y(t))) obtained for the i-th sample, and let Xi = Yi −E[f 2n·f (OP T ) wu (t) = Pr i=1 Yi r = [2n · f (OP T )] · Pr i=1 Xi r + E[f (u | R(y(t)))] . Since Yi is distributed like f (u | R(y(t))), the definition of Xi guarantees that E[Xi ] = 0 for every 1 ≤ i ≤ r. Additionally, |Xi | ≤ 1 for every such i since the absolute values of both Yi and 15 E[f (u | R(y(t)))] are upper bounded by maxS⊆N f (S) ≤ n · f (OP T ) (the last inequality follows from our assumption that 1u ∈ P for every element u ∈ N ). Thus, by Lemma A.3, # " r X r −3 2 Xi > 3 ≤ 2e−[rn /2] /2r Pr[|wu (t) − E[f (u | R(y(t)))]| > n−2 · f (OP T )] = Pr 2n i=1  6 1 1 −rn−6 /8 −6 ln(2n) = 2e ≤ 2e =2· ≤ 6 . 2n 2n Observe that Algorithm 3 calculates wu (t) for every combination of element u ∈ N and time t < 1. Since there are n elements in N and 2n4 times smaller than 1, the union bound implies that the probability that for at least one such value wu (t) we have |wu (t) − E[f (u | R(y(t)))]| > n−2 · f (OP T ) is upper bounded by  1 1 · n · 2n4 = , 6 2n n which completes the proof of the corollary. Our next step is to give a lower bound on the increase in F (y(t)) as a function of t given A. This lower bound is given by Corollary A.7, which follows from the next two lemmata. The statement and proof of the corollary and the next lemma is easier with the following definition. Let OP Tt′ denote the set OP T \ Z when t < ts , and OP T otherwise. P Lemma A.5. Given A, for every time t < 1, u∈N (1 − yu (t)) · xu (t) · ∂u F (y(t)) ≥ F (y(t) ∨ −1 1OP Tt′ ) − F (y(t)) − O(n ) · f (OP T ). Proof. Let us calculate the weight of OP Tt′ according to the weight function w(t). X X wu (t) ≥ [E[f (u | R(y(t)))] − n−2 · f (OP T )] w(t) · 1OP Tt′ = u∈OP Tt′  ≥ E X u∈OP Tt′ u∈OP Tt′  f (R(y(t)) + u) − f (R(y(t))) − n−1 · f (OP T )  ≥ E f (R(y(t)) ∪ OP Tt′ ) − f (R(y(t))) − n−1 · f (OP T )  = F (y(t) ∨ 1OP T ′t ) − F (y(t)) − n−1 · f (OP T ) , where the first inequality follows from the definition of A, and the last follows from the submodularity of f . Recall that x(t) is the vector in P maximizing some objective function (which depends on t). For t < ts , the objective function maximized by x(t) assigns the value w(t)·1OP T \Z = w(t)·1OP Tt′ to the vector 1OP Tt′ ∈ P . Similarly, for t ≥ ts , the objective function maximized by x(t) assigns the value w(t) · 1OP T = w(t) · 1OP Tt′ to the vector 1OP Tt′ ∈ P . Thus, the definition of x(t) guarantees that in both cases we have w(t) · x(t) ≥ w(t) · 1OP Tt′ ≥ F (y(t) ∨ 1OP Tt′ ) − F (y(t)) − n−1 · f (OP T ) . 16 Hence, X (1 − yu (t)) · xu (t)·∂u F (y(t)) = u∈N X xu (t) · [F (y(t) ∨ 1u ) − F (y(t))] u∈N X = xu (t) · E[f (u | R(y(t)))] u∈N X ≥ xu (t) · [wu (t) − n−2 · f (OP T )] = x(t) · w(t) − n−1 · f (OP T ) u∈N ≥ F (y(t) ∨ 1OP Tt′ ) − F (y(t)) − 2n−1 · f (OP T ) , where the first inequality holds by the definition of A and the second equality holds since F (y(t) ∨ 1u ) − F (y(t)) = E[f (R(y(t)) + u)] − E[f (R(y(t)))] = E[f (u | R(y(t)))] . Lemma A.6 (A rephrased version of Lemma 2.3.7 in [23]). Consider two vectors x, x′ ∈ [0, 1]N P such that |xu − x′u | ≤ δ for every u ∈ N . Then, F (x′ ) − F (x) ≥ u∈N (x′u − xu ) · ∂u F (x) − O(n3 δ2 ) · maxu∈N f ({u}). Corollary A.7. Given A, for every time t < 1, F (y(t + δt )) − F (y(t)) ≥ δt [F (y(t) ∨ 1OP Tt′ ) − F (y(t))] − O(n−1 δt ) · f (OP T ). Proof. Observe that for every u ∈ N , |yu (t + δt ) − yu (t)| = |δt (1 − yu (t))xu (t)| ≤ δt . Hence, by Lemma A.6, X F (y(t + δt )) − F (y(t)) ≥ [yu (t + δt )) − yu (t)] · ∂u F (y(t)) − O(n3 δt2 ) · max f ({u}) u∈N u∈N = X δt (1 − yu (t)) · xu (t) · ∂u F (y(t)) − O(n3 δt2 ) · max f ({u}) . u∈N u∈N (13) Consider the rightmost hand side of the last inequality. By Lemma A.5, the first term on this side can be bounded by X δt (1 − yu (t)) · xu (t) · ∂u F (y(t)) ≥ δt · [F (y(t) ∨ 1OP Tt′ ) − F (y(t)) − O(n−1 ) · f (OP T )] u∈N = δt · [F (y(t) ∨ 1OP Tt′ ) − F (y(t))] − O(n−1 δt ) · f (OP T ) . On the other hand, the second term of (13) can be bounded by O(n3 δt2 ) · max f ({u}) = O(n−1 δt ) · f (OP T ) u∈N since δt ≤ n−4 by definition and maxu∈N f ({u}) ≤ f (OP T ) by our assumption that 1u ∈ P for every u ∈ N . The lower bound given by the last corollary is in terms of F (y(t) ∨ 1OP Tt′ ). To make this lower bound useful, we need to lower bound the term F (y(t) ∨ 1OP Tt′ ). This is done by the following two lemma which corresponds to Lemma 4.4. Lemma A.8. [corresponds to Lemma 4.4] For every time t < 1 and set A ⊆ N it holds that   F (y(t) ∨ 1A ) ≥ e− max{0,t−ts } − e−t − O(n−4 ) · max {0, f (A) − f (A ∪ Z)} + (e−t − O(n−4 )) · f (A) . 17 The proof of this lemma goes along the same lines as the proof of its corresponding lemma in Section 4, except that the bounds on the coordinates of y(t) used by the proof from Section 4 are replaced with the (slightly weaker) bounds given by the following lemma. Lemma A.9. For every time t and element u ∈ N , ( 1 − e−t + O(n−4 ) yu (t) ≤ 1 − e− max{0,t−ts } + O(n−4 ) if u 6∈ Z , if u ∈ Z . Proof. Let ε = n−4 , and observe that δt ≤ ε for every time t. Our first objective is to prove by induction on t that, if yu (τ ) = 0 for some time τ ∈ [0, 1], then yu (t) ≤ 1 − (1 − ε)(t−τ )/ε for every time t ∈ [τ, 1]. For t = τ the claim holds because yu (τ ) = 0 = 1 − (1 − ε)(τ −τ )/ε . Next, assume the claim holds for some t, and let us prove it for t + δt . yu (t + δt ) = yu (t) + δt (1 − yu (t)) · xu (t) ≤ yu (t) + δt (1 − yu (t)) = yu (t)(1 − δt ) + δt ≤ (1 − (1 − ε)(t−τ )/ε )(1 − δt ) + δt = 1 − (1 − δt )(1 − ε)(t−τ )/ε ≤ 1 − (1 − ε)δt /ε (1 − ε)(t−τ )/ε = 1 − (1 − ε)(t+δt −τ )/ε , where the last inequality holds since (1 − x)1/x is a decreasing function for x ∈ (0, 1]. We complete the proof for the case u 6∈ Z by choosing τ = 0 (clearly yu (0) = 0) and observing that, for every time t, 1 − (1 − ε)t/ε ≤ 1 − [e−1 (1 − ε)]t = 1 − e−t (1 − ε)t ≤ 1 − e−t (1 − ε) = 1 − e−t + O(ε) . It remains to prove the lemma for the case u ∈ Z. Note that at every time t ∈ [0, ts ) Algorithm 3 chooses as x(t) a vector maximizing a linear function in P which assigns a negative weight to elements of Z. Since P is down-closed this maximum must have xu (t) = 0 for an element u ∈ Z. This means that yu (t) = 0 for t ∈ [0, ts ]. In addition to proving the lemma for this time range, the last inequality also allows us to choose τ = ts , which gives, for t ∈ [ts , 1], yu (t) ≥ 1 − (1 − ε)(t−ts )/ε ≥ 1 − ets −t + O(ε) . Combining Corollary A.7 with Lemma A.8 gives us the following corollary. Corollary A.10. Given A, for every time t ∈ [0, ts ), F (y(t + δt )) − F (y(t)) ≥ δt [f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T ) − F (y(t)))] − O(n−1 δt ) · f (OP T ) and, for every time t ∈ [ts , 1), F (y(t + δt )) − F (y(t)) ≥ δt [e−t · f (OP T ) + (ets −t − e−t ) · max{f (OP T ) − f (Z ∪ OP T ), 0} − F (y(t))] − O(n−1 δt ) · f (OP T ) . Proof. For every time t ∈ [0, ts ), Corollary A.7 and Lemma A.8 imply together F (y(t + δt )) − F (y(t)) ≥ δt [(1 − e−t − O(n−4 )) · max {0, f (OP T \ Z) − f (OP T ∪ Z)} + (e−t − O(n−4 )) · f (OP T \ Z)] − O(n−1 δt ) · f (OP T ) ≥ δt [(1 − O(n−4 )) · f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T ) − F (y(t)))] − O(n−1 δt ) · f (OP T ) . 18 We observe that this inequality is identical to the inequality promised for this time range by the corollary, except that it has an extra term of −δt · O(n−4 ) · f (OP T \ Z) on its right hand side. Since f (OP T \ Z) is upper bounded by f (OP T ), due to the down-closeness of P , the absolute value of this extra term is at most δt · O(n−4 ) · f (OP T ) = O(n−1 δt ) · f (OP T ) , which completes the proof for the time range t ∈ [0, ts ). Consider now the time range t ∈ [ts , 1). For this time range Corollary A.7 and Lemma A.8 imply together F (y(t + δt )) − F (y(t)) ≥ δt [(ets −t − e−t − O(n−4 )) · max {0, f (OP T ) − f (OP T ∪ Z)} + (e−t − O(n−4 )) · f (OP T )] − O(n−1 δt ) · f (OP T ) . We observe again that this inequality is identical to the inequality promised for this time range by the corollary, except that it has extra terms of −δt · O(n−4 ) · f (OP T ) and −δt · O(n−4 ) · max{0, f (OP T ) − f (OP T ∪ Z)} on its right hand side. The corollary now follows since the absolute value of both these terms is upper bounded by O(n−1 δt ) · f (OP T ). Corollary A.10 bounds the increase in F (y(t)) in terms of F (y(t)) itself. Thus, it gives a recursive formula which can be used to lower bound F (y(t)). Our remaining task is to solve this formula and get a closed-form lower bound on F (y(t)). Let g(t) be defined as follows. g(0) = 0 and for every time t < 1, g(t+δt ) ( g(t) + δt [f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T ) − g(t)] = g(t) + δt [e−t · f (OP T ) + (ets −t − e−t ) · max{f (OP T ) − f (Z ∪ OP T ), 0} − g(t)] if t < ts , if t ≥ ts . The next lemma shows that a lower bound on g(t) yields a lower bound on F (y(t)). Lemma A.11. Given A, for every time t, g(t) ≤ F (y(t)) + O(n−1 ) · t · f (OP T ). Proof. Let c be the larger constant among the constants hiding behind the big O notations in Corollary A.10. We prove by induction on t that g(t) ≤ F (y(t)) + (ct/n) · f (OP T ). For t = 0, this clearly holds since g(0) = 0 ≤ F (y(0)). Assume now that the claim holds for some t, and let us prove it for t + δt . There are two cases to consider. If t < ts , then the induction hypothesis and Corollary A.10 imply, for a large enough n, g(t + δt ) = g(t) + δt [f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T ) − g(t)] = (1 − δt )g(t) + δt [f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T )] ≤ (1 − δt )[F (y(t)) + (ct/n) · f (OP T )] + δt [f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T )] = F (y(t)) + δt [f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T ) − F (y(t))] + (ct/n) · (1 − δt ) · f (OP T ) ≤ F (y(t + δt )) + (cδt /n) · f (OP T ) + (ct/n) · (1 − δt ) · f (OP T ) ≤ F (y(t + δt )) + [c(t + δt )/n] · f (OP T ) . Similarly, if t ≥ ts , then we get g(t + δt ) = g(t) + δt [e−t · f (OP T ) + (ets −t − e−t ) · max{f (OP T ) − f (Z ∪ OP T ), 0} − g(t)] 19 = (1 − δt )g(t) + δt [e−t · f (OP T ) + (ets −t − e−t ) · max{f (OP T ) − f (Z ∪ OP T ), 0}] ≤ (1 − δt )[F (y(t)) + (ct/n) · f (OP T )] + δt [e−t · f (OP T ) + (ets −t − e−t ) · max{f (OP T ) − f (Z ∪ OP T ), 0}] = F (y(t)) + δt [e−t · f (OP T ) + (ets −t − e−t ) · max{f (OP T ) − f (Z ∪ OP T ), 0} − F (y(t))] + (ct/n) · (1 − δt ) · f (OP T ) ≤ F (y(t + δt )) + (cδt /n) · f (OP T ) + (ct/n) · (1 − δt ) · f (OP T ) ≤ F (y(t + δt )) + [c(t + δt )/n] · f (OP T ) . It remains to find a closed-form expression that lower bounds g(t) (and thus, also F (y(t))). Let h1 (t) : [0, ts ] → R and h2 (t) : [ts , 1] → R be defined as follows. h1 (t) = (1 − e−t ) · f (OP T \ Z) − (1 − e−t − te−t ) · f (Z ∪ OP T ) , and h2 (t) = e−t · {(t − ts ) · [f (OP T ) + (ets − 1) · max{f (OP T ) − f (OP T ∪ Z), 0}] + ets · h1 (ts )} . Lemma A.12. For every time t ≤ ts , h1 (t) ≤ g(t). Proof. The proof is by induction on t. For t = 0, g(0) = 0 = (1 − e0 ) · f (OP T \ Z) − (1 − e0 − 0 · e0 ) · f (Z ∪ OP T ) = h1 (0). Assume now that the lemma holds for some t < ts , and let us prove it holds also for t + δt . By the induction hypothesis, Z t+δt h′ (τ )dτ h1 (t + δt ) = h1 (t) + t Z t+δt {e−τ · f (OP T \ Z) − τ e−τ · f (Z ∪ OP T )}dτ = h1 (t) + t ≤ h1 (t) + δt · {e−t · f (OP T \ Z) − te−t · f (Z ∪ OP T )}dτ = (1 − δt )h1 (t) + δt · {f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T )} ≤ (1 − δt )g(t) + δt · {f (OP T \ Z) − (1 − e−t ) · f (Z ∪ OP T )} = g(t + δt ) , where the first inequality holds since e−τ is a decreasing function of τ and τ e−τ is an increasing function of τ in the range τ ∈ [0, 1]. Lemma A.13. For every time ts ≤ t ≤ 1, h2 (t) ≤ g(t). Proof. The proof is by induction on t. For t = ts , by Lemma A.12, h2 (ts ) = h1 (ts ) ≤ g(ts ). Assume now that the lemma holds for some ts ≤ t < 1, and let us prove it holds also for t + δt . To avoid repeating complex expressions, let us denote A = f (OP T ) + (ets − 1) · max{f (OP T ) − f (Z ∪ OP T ), 0}. Notice that A is independent of t. Moreover, using this notation we can rewrite h2 (t) as h2 (t) = e−t · {(t − ts ) · A + ets · h1 (ts )}. Thus, for every τ ∈ (ts , 1), h′2 (τ ) = −e−τ · {(τ − ts ) · A + ets · h1 (ts )} + e−τ · A = e−τ · {(1 − τ + ts ) · A − ets · h1 (ts )} . The definition of A and the non-negativity of f imply immediately that A ≥ 0. We would like to prove also that ts · A − ets · h1 (ts ) ≥ 0. There are two cases to consider. First, if f (OP T ) ≥ f (Z ∪ OP T ), then ts · A − ets · h1 (ts ) = ts · f (OP T ) + ts (ets − 1) · max{f (OP T ) − f (Z ∪ OP T ), 0} 20 − (ets − 1) · f (OP T \ Z) + (ets − 1 − ts ) · f (Z ∪ OP T ) ≥ ts ets · f (OP T ) − ts (ets − 1) · f (Z ∪ OP T ) − (ets − 1) · f (OP T ) + (ets − 1 − ts ) · f (Z ∪ OP T ) = (ts ets − ets + 1) · [f (OP T ) − f (Z ∪ OP T )] ≥ 0 . where the inequality uses the fact that f (OP T ) ≥ f (OP T \ Z) because of the down-closure of P . On the other hand, if f (OP T ) < f (Z ∪ OP T ), then ts · A − ets · h1 (ts ) = ts · f (OP T ) − (ets − 1) · f (OP T \ Z) + (ets − 1 − ts ) · f (Z ∪ OP T ) ≥ ts · f (OP T ) − (ets − 1) · f (OP T ) + (ets − 1 − ts ) · f (OP T ) = 0 . Using the above observations and the induction hypothesis, we can now get h2 (t + δt ) = h2 (t) + Z t+δt h′ (τ )dτ = h2 (t) + Z t+δt e−τ · {(1 − τ + ts ) · A − ets · h1 (ts )}dτ t t ≤ h2 (t) + δt · e−t · {(1 − t + ts ) · A − ets · h1 (ts )} = (1 − δt )h2 (t) + δt · e−t · A ≤ (1 − δt )g(t) + δt · e−t · A = g(t + δt ) . The last two lemmata give us the promised closed-form lower bound on g(t), which can be used to lower bound the approximation ratio of Algorithm 3. Corollary A.14. E[F (y(1))] ≥ ets −1 · [(2 − ts − e−ts − O(n−1 )) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )]. Proof. By Lemma A.11, given A, F (y(1)) ≥ g(1) − O(n−1 ) · f (OP T ) . By Lemma A.13, g(1) ≥ h2 (1) = e−1 · {(1 − ts ) · [f (OP T ) + (ets − 1) · max{f (OP T ) − f (Z ∪ OP T ), 0}] + (ets − 1) · f (OP T \ Z) − (ets − 1 − ts ) · f (Z ∪ OP T )} ≥ e−1 · {(1 − ts ) · [ets · f (OP T ) − (ets − 1) · f (Z ∪ OP T )] + (ets − 1) · [f (OP T ) − f (Z ∩ OP T )] − (ets − 1 − ts ) · f (Z ∪ OP T )} = ets −1 · [(2 − ts − e−ts ) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )] , where the second inequality holds since the submodularity and non-negativity of f imply f (OP T \ Z) ≥ f (OP T ) + f (∅) − f (Z ∩ OP T ) ≥ f (OP T ) − f (Z ∩ OP T ) . Combining the above observations we get that, given A, F (y(1)) ≥ ets −1 · [(2 − ts − e−ts − O(n−1 )) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )] . 21 Since F (y(1)) is always non-negative, this implies, by the law of total expectation, E[F (y(1))] ≥ Pr[A] · {ets −1 · [(2 − ts − e−ts − O(n−1 )) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )]} ≥ {ets −1 · [(2 − ts − e−ts − O(n−1 )) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )]} 1 − · ets −1 · (2 − ts − e−ts − O(n−1 )) · f (OP T ) n = ets −1 · [(2 − ts − e−ts − O(n−1 )) · f (OP T ) − (1 − e−ts ) · f (Z ∩ OP T ) − (2 − ts − 2e−ts ) · f (Z ∪ OP T )] , where the second inequality holds since Pr[A] ≥ 1 − n−1 by Corollary A.4. Theorem 4.1 now follows immediately by combining Corollaries A.2 and A.14. 22
8cs.DS
Self Organizing Maps Whose Topologies Can Be Learned With Adaptive Binary Search Trees Using Conditional Rotations arXiv:1506.02750v1 [cs.NE] 9 Jun 2015 César A. Astudillo ∗ † B. John Oommen‡ § Abstract Numerous variants of Self-Organizing Maps (SOMs) have been proposed in the literature, including those which also possess an underlying structure, and in some cases, this structure itself can be defined by the user Although the concepts of growing the SOM and updating it have been studied, the whole issue of using a self-organizing Adaptive Data Structure (ADS) to further enhance the properties of the underlying SOM, has been unexplored. In an earlier work, we impose an arbitrary, user-defined, tree-like topology onto the codebooks, which consequently enforced a neighborhood phenomenon and the so-called tree-based Bubble of Activity (BoA). In this paper, we consider how the underlying tree itself can be rendered dynamic and adaptively transformed. To do this, we present methods by which a SOM with an underlying Binary Search Tree (BST) structure can be adaptively re-structured using Conditional Rotations (CONROT). These rotations on the nodes of the tree are local, can be done in constant time, and performed so as to decrease the Weighted Path Length (WPL) of the entire tree. In doing this, we introduce the pioneering concept referred to as Neural Promotion, where neurons gain prominence in the Neural Network (NN) as their significance increases. We are not aware of any research which deals with the issue of Neural Promotion. The advantages of such a scheme is that the user need not be aware of any of the topological peculiarities of the stochastic data distribution. Rather, the algorithm, referred to as the TTOSOM with Conditional Rotations (TTOCONROT), converges in such a manner that the neurons are ultimately placed in the input space so as to represent its stochastic distribution, and additionally, the neighborhood properties of the neurons suit the best BST that represents the data. These properties have been confirmed by our experimental results on a variety of data sets. We submit that all of these concepts are both novel and of a pioneering sort. Keywords: Adaptive Data Structures, Binary Search Trees, Self-Organizing Maps ∗ Universidad † This de Talca, Merced 437 Curicó, Chile. castudillo@utalca.cl author is Assistant Professor at the Department of Computer Science, with the Universidad de Talca. This work is partially supported by the FONDECYT grant 11121350, Chile. A very preliminary version of this paper was presented at AI’09, the 2009 Australasian Joint Conference on Artificial Intelligence, Melbourne, Australia, in December 2009. That paper won the award of being the Best Paper of the Conference. We are also very grateful for the comments made by the Associate Editor and the anonymous Referees. Their input helped in improving the quality of the final version of this paper. Thank you very much! ‡ School of Computer Science, Carleton University, Ottawa, Canada : K1S 5B6. oommen@scs.carleton.ca § Chancellor’s Professor ; Fellow : IEEE and Fellow : IAPR. This author is also an Adjunct Professor with the University of Agder in Grimstad, Norway. The work of this author was partially supported by NSERC, the Natural Sciences and Engineering Research Council of Canada. 1 1 Introduction This paper is a pioneering attempt to merge the areas of Self-Organizing Maps (SOMs) with the theory of Adaptive Data Structures (ADSs). Put in a nutshell, we can describe the goal of this paper as follows: Consider a SOM with n neurons. Rather than having the neurons merely possess information about the feature space, we also attempt to link them together by means of an underlying Data Structure (DS). This DS could be a singly-linked list, a doubly-linked list or a Binary Search Tree (BST), etc. The intention is that the neurons are governed by the laws of the SOM and the underlying DS. Observe now that the concepts of “neighborhood” and Bubble of Activity (BoA) are not based on the nearness of the neurons in the feature space, but rather on their proximity in the underlying DS. Having accepted the above-mentioned premise, we intent to take this entire concept to a higher level of abstraction and propose to modify this DS itself adaptively using operations specific to it. As far as we know, the combination of these concepts has been unreported in the literature. Before we proceed, to place our results in the right perspective, it is probably wise to see how the concept of neighborhood has been defined in the SOM literature. Kohonen, in his book [36], mentions that it is possible to distinguish between two basic types of neighborhood functions. The first family involves a kernel function (which is usually of a Gaussian nature). The second, is the so-called neighborhood set, also known as the Bubble of Activity (BoA). This paper focuses on the second type of neighborhood function. Even though the traditional SOM is dependent on the neural distance to estimate the subset of neurons to be incorporated into the BoA, this is not always the case for the SOM-variants included in the literature. Indeed, the different strategies described in the state-of-the-art utilize families of schemes to define the BoA. We mainly identify three sub-classes. The first type of BoA uses the concept of the neural distance as in the case of the traditional SOM. Once the Best Matching Unit (BMU) is identified, the neural distance is calculated by traversing the underlying structure that holds the neurons. An important property of the neural distance between two neurons is that it is proportional to the number of connections separating them. Examples of strategies that use the neural distance to determine the BoA are the Growing Cell Structures (GCS) [24], the Growing Grid (GG) [25], the Incremental Grid Growing (IGG) [13], the Growing SOM (GSOM) [3], the Tree-Structured SOM (TSSOM) [37], the Hierarchical Feature Map (HFM) [43], the Growing Hierarchical SOM (GHSOM) [50], the SelfOrganizing Tree Algorithm (SOTA) [22], the Evolving Tree (ET) [46], the Tree-based Topology Oriented SOM (TTOSOM) [8], among others. A second subset of strategies employ a scheme for determining the BoA that does not depend on the inter-neural connections. Instead, such strategies utilize the distance in the feature space. In these cases, it is possible to distinguish between two types of Neural Networks (NNs). The simplest situation occurs when the BoA only considers the BMU, i.e., it constitutes an instance of hard Competitive Learning (CL), as in the case of the Tree-Structured VQ (TSVQ) [37] and the Self-Organizing Tree Map (SOTM) [27]. A more sophisticated and computationally expensive scheme involves ranking the neurons as per their respective distances to the stimulus. In this scenario, the BoA is determined by selecting a subset of the 2 closest neurons. An example of a SOM variant that uses such a ranking is the Neural Gas (NG) [40]. According to the authors of [46], the SOM-based variants included in the literature attempt to tackle two main goals: They either try to design a more flexible topology, which is usually useful to analyze large datasets, or to reduce the the most time-consuming task required by the SOM, namely, the search for the BMU when the input set has a complex nature. In this paper we focus on the former of the two mentioned goals. In other words, our goal is to enhance the capabilities of the original SOM algorithm so as to represent the underlying data distribution and its structure in a more accurate manner. We also intend to do so by constraining the neurons so that they are related to each other, not just based on their neural indices and stochastic distribution, but also based on a BST relationship. Furthermore, as a long term ambition, we also anticipate methods which can accelerate the task of locating the nearest neuron during the CL phase. This work will present the details of the design and implementation of how an adaptive process applied to the BST, can be integrated into the SOM. Regardless of the fact that numerous variants of the SOM has been devised, few of them possess the ability of modifying the underlying topology [13, 21, 22, 26, 27, 42, 46, 52]. Moreover, only a small subset use a tree as their underlying DS [8, 21, 22, 27, 46, 52]. These strategies attempt to dynamically modify the nodes of the SOM, for example, by adding nodes, which can be a single neuron or a layer of a SOM-grid. However, our hypothesis is that it is also possible to attain to a better understanding of the unknown data distribution by performing structural tree-based modifications on the tree, which although they preserve the general topology, attempt to modify the overall configuration, i.e., by altering the way by which nodes are interconnected, and yet continue as a BST. We accomplish this by dynamically adapting the edges that connect the neurons, by rotating1 the nodes within the BST that holds the whole structure of neurons. As we will explain later, this is further achieved by local modifications to the overall structure in a constant number of steps. Thus, we attempt to use rotations, tree-based neighbors and the feature space to improve the quality of the SOM. 1.1 Motivations Acquiring information about a set of stimuli in an unsupervised manner, usually demands the deduction of its structure. In general, the topology employed by any Artificial Neural Network (ANN) possessing this ability has an important impact on the manner by which it will “absorb” and display the properties of the input set. Consider for example, the following: A user may want to devise an algorithm that is capable of learning a triangle-shaped distribution as the one depicted in Figure 1. The SOM tries to achieve this by defining an underlying grid-based topology and to fit the grid within the overall shape, as shown in Figure 1a (duplicated from [36]). However, from our perspective, a grid-like topology does not naturally fit a triangular-shaped distribution, and thus, one experiences a deformation of the original lattice during the modeling phase. As opposed to this, Figure 1b, shows the result of applying one of the techniques developed by us, namely the TTOSOM [8]. As the reader can observe from Figure 1b, a 3-ary tree seems to be a far more superior choice for representing the particular shape in question. 1 The operation of rotation is the one associated with BSTs, as will be presently explained. 3 (a) The grid learned by the SOM. (b) The tree learned by the TTOSOM. Figure 1: How a triangle-shaped distribution is learned through unsupervised learning. On closer inspection, Figure 1b depicts how the complete tree fills in the triangle formed by the set of stimuli, and further, seems to do it uniformly. The final position of the nodes of the tree suggests that the underlying structure of the data distribution corresponds to the triangle. Additionally, the root of the tree is placed roughly in the center of mass of the triangle. It is also interesting to note that each of the three main branches of the tree, cover the areas directed towards a vertex of the triangle respectively, and their sub-branches fill in the surrounding space around them in a recursive manner, which we identify as being a holograph-like behavior. Of course, the triangle of Figure 1b serves only as a very simple prima facie example to demonstrate to the reader, in an informal manner, how both techniques will try to learn the set of stimuli. Indeed, in real-world problems, these techniques can be employed to extract the properties of high-dimensional samples. One can argue that imposing an initial topological configuration is not in accordance with the founding principles of unsupervised learning, the phenomenon that is supposed to occur without “supervision” within the human brain. As an initial response we argue that this “supervision” is required to enhance the training phase, while the information we provide relates to the initialization phase. Indeed, this is in line with the well-accepted principle [23], that very little can be automatically learned about a data distribution if no assumptions are made! As the next step of motivating this research endeavor, we venture into a world where the neural topology and structure are themselves learned during the training process. This is achieved by the method that we propose in this paper, namely the TTOSOM with Conditional Rotations (TTOCONROT), which, in essence, dynamically extends the properties of the above-mentioned TTOSOM. Again, to accomplish this we need key concepts that are completely new to the field of SOMs, namely those related to tree-based Adaptive Data Structure (ADS). Indeed, as demonstrated by our experiments, the results that we have already obtained have been applauded by the research community2 , and these, to the best of our knowledge, have remained unreported in the literature. Another reason why we are interested in such an inter-area integration, deals with the issue for devising efficient methods that add neurons to the tree. Even though the schemes that we are currently proposing 2 As mentioned earlier, a paper which reported the preliminary results of this study, won the Best Paper Award in a well-known international AI conference [7]. 4 in this paper focus on tree adaptation by means of rotations, we envision another type of dynamism,i.e., one which involves the expansion of the tree structure through the insertion of newly created nodes. The state-of-the-art considers different strategies that expand trees by inserting nodes (which can be a single neuron or a SOM-layer) that essentially are based on a Quantization Error (QE) measure. In some of these strategies, the error measure is based on the “hits”, i.e., the number of times a neuron has been selected as the BMU, c.f., [13, 24, 37, 46]. The strategy that we have chosen for adapting the tree, namely using Conditional Rotations (CONROT), already utilizes this BMU counter, and, distinct to the previous strategies that attempt to search for a node to be expanded (which in the case of tree-based SOMs is usually at the level of the leaves [37, 46]), we foresee and advocate a different approach. Our TTOCONROT method asymptotically positions frequently accessed nodes close to the root, and so, according to this property, it is the root node which should be split. Observe that if we follow such a philosophy, one would not have to search for a node with a higher QE measure. Rather, the CONROT, will be hopefully, able to migrate the candidates closer to the root. Of course, this works with assumption that a larger number of hits indicates that the degree of granularity of a particular neuron justifies refinement. The concept of using the root of the tree for growing a tree-based SOM is, in and of itself, pioneering, as far as we know. 1.2 Contributions of the Paper The contributions of the paper can be summarized as follows: 1. We present an integration of the fields of SOMs and ADS. This, we respectfully, submit as pioneering. 2. The neurons of the SOM are linked together using an underlying tree-based DS, and they are governed by the laws of the TTOSOM tree-based paradigm, and simultaneously the restructuring adaptation provided by CONROT. 3. The definition of distance between the neurons is based on the tree structure, and not in the feature space. This is valid also for the BoA, rendering the migrations distinct from the state-of-the-art. 4. The adaptive nature of the TTOCONROT is unique because adaptation is perceived in two forms: The migration of the codebook vectors in the feature space is a consequence of the SOM update rule, and the rearrangement of the neurons within the tree as a result of the rotations. 1.3 Organization of the Paper The rest of the paper is organized as follows. The next section surveys the relevant literature3 , which involves both the field of SOMs including their tree-based instantiations, and the respective field of BSTs with conditional rotations. After that, in Section 2, we provide an in-depth explanation of the TTOCONROT philosophy, which is our primary contribution. The subsequent section shows the capabilities of the approach through a series of experiments, and finally, Section 5 concludes the paper. 3 For the sake of space the literature review has been considerably condensed. However, given that there is no survey paper on the area of tree-based SOMs reported in the literature, we are currently preparing a paper that summarizes the field. 5 2 Literature Review 2.1 The SOM One of the most important families of ANNs used to tackle clustering problems is the well known SOM [36]. Typically, the SOM is trained using (un)supervised learning, so as to produce a neural representation in a space whose dimension is usually smaller than that in which the training samples lie. Further, the neurons attempt to preserve the topological properties of the input space. The SOM concentrates all the information contained in a set of n input samples belonging to the ddimensional space, say X = {x1 , x2 , . . . , xn }, utilizing a much smaller set of neurons, C = {c1 , c2 , . . . , cm }, each of which is represented as a vector. Each of the m neurons contains a weight vector w = [w1 , w2 , . . . , wd ]t ∈ IRd associated with it. These vectors are synonymously called “weights”, “prototypes” or “codebook” vectors. The vector wi may be perceived as the position of neuron ci in the feature space. During the training phase, the values of these weights are adjusted simultaneously so as to represent the data distribution and its structure. In each training step a stimulus (a representative input sample from the data distribution) x is presented to the network, and the neurons compete between themselves so as to identify which is the “winner”, also known as the Best Matching Unit (BMU). After identifying the BMU, a subset of the neurons “close” to it are considered to be within the so-called Bubble of Activity (BoA), which further depends on a parameter specified to the algorithm, namely, the so-called radius. Thereafter, this scheme performs a migration of the codebooks within that BoA so as to position them closer to the sample being examined. The migration factor by which this update is effected, depends on a parameter known as the learning rate, which is typically expected to be large initially, and which decreases as the algorithm proceeds, and which ultimately results in no migration at all. Algorithm 1 describes the details of the SOM philosophy. In Algorithm 1, the parameters are scheduled by defining a sequence S = hS1 , S2 , . . . , Ss i, where each Si corresponds to a tuple (ηi , ri , ti ) that specifies the learning rate, ηi , and the radius, ri , for a fixed number of training steps, ti . The way in which the parameters decay is not specified in the original algorithm, and some alternatives are, e.g., that the parameters remain fixed, decrease linearly, exponentially, etc. Algorithm 1 SOM(X ,S) Input: i) X , the input sample set. ii) S, the schedule for the parameters. Method: 1: Initialize the weights w1 , w2 , . . . , wm , e.g., by randomly selecting elements from X . 2: repeat 3: Obtain a sample x from X . 4: Find the Winner neuron, i.e., the one which is most similar to x. 5: Determine a subset of neurons close to the winner. 6: Migrate the closest neuron and its neighbors towards x. 7: Modify the learning factor and radius as per the pre-defined schedule. 8: until no noticeable changes are observed. End Algorithm Although the SOM has demonstrated an ability to solve problems over a wide spectrum, it possesses some 6 fundamental drawbacks. One of these drawbacks is that the user must specify the lattice a priori, which has the effect that he must run the ANN a number of times to obtain a suitable configuration. Other handicaps involve the size of the maps, where a lesser number of neurons often represent the data inaccurately. The state-of-the-art approaches attempt to render the topology more flexible, so as to represent complicated data distributions in a better way and/or to make the process faster by, for instance, speeding up the task of determining the BMU. There are a vast number of domain fields where the SOM has demonstrated to be useful; a compendium with all the articles that take advantage of the properties of the SOM is surveyed in [32, 45]. These survey papers classify the publications related to the SOM according to their year of release. The report [32] includes the bibliography published between the year 1981 and 1998, while the report [45] includes the analogous papers published between 1998 and 2001. Further, additional recent references including the related work up to the year 2005 have been collected in a technical report [48]. The more recent literature reports a host of application domains, including Medical Image Processing [2], Human Eye Detection [33], Handwriting Recognition [39], Image Segmentation [56], Information Retrieval [20], Object Tracking [30], etc. 2.2 Tree-Based SOMs Although an important number of variants of the original SOM have been presented through the years, we focus our attention on a specific family of enhancements in which the neurons are inter-connected using a tree topology. The Tree-Structured VQ (TSVQ) algorithm [37] is a tree-based SOM variant, whose topology is defined a priori and which is static. The training first takes place at highest levels of the tree. The TSVQ incorporates the concept of a “frozen” node, which implies that after a node is trained for a certain amount of time, it becomes static. The algorithm then allows subsequent units, i.e., the direct children, to be trained. The strategy utilizes a heuristic search algorithm for rapidly identifying a BMU. It starts from the root and recursively traverses the path towards the leaves. If the unit currently being analyzed is frozen, the algorithm identifies the child which is closest to the stimulus, and performs a recursive call. The algorithm terminates when the node currently being analyzed is not a frozen node (i.e., it is currently being trained), and is returned as the BMU. Koikkalainen and Oja, in the same paper [37] refine the idea of the TSVQ by defining the TSSOM, which inherits all the properties of the TSVQ, but redefines the search procedure and BoA. In the case of the TSSOM, SOM layers of different dimensions are arranged in a pyramidal shape (which can be perceived as a SOM with different degrees of granularity). It differs from the TSVQ, in the sense that, once the BMU is found, the direct proximity is examined to check for the BMU. On the other hand, the BoA differs in that, instead of considering only the BMU, its direct neighbors (in the pyramid) will also be considered. The Self-Organizing Tree Algorithm (SOTA) [22] is a dynamically growing tree-based SOM which, according to their authors, take some analogies from the Growing Cell Structures (GCS) [24]. The SOTA utilizes a binary tree as the underlying structure, and similarly to other strategies (e.g., the TSSOM [37] and the Evolving Tree (ET) [46] explained below), it considers the migration of the neurons only if they 7 correspond to leaf nodes within the tree structure. Its BoA depends on the neural tree and is defined for two cases. The most general case occurs when the parent of the BMU is not the root, i.e., a situation in which the BoA is composed by the BMU, its sibling and its parent node. Otherwise, the BoA constitutes the BMU only. The SOTA triggers a growing mechanism that utilizes a QE to determine the node to be split into two new descendants. In [21] the authors presented a tree-based SOM called the Growing Hierarchical SOM (GHSOM), in which each node corresponds to an independent SOM. The expansion of the structure is dual: The first type of adaptation is conceived by inserting new rows (or columns) to the SOM grid that is currently being trained, while the second type is implemented by adding layers to the hierarchical structure. Both types of dynamism depend on the verification of QE measures. The SOTM [27] is a tree-based SOM which is also inspired by the Adaptive Resonance Theory (ART) [15]. In the SOTM, when the input is within a threshold distance from the BMU, the latter is migrated. Otherwise, a new neuron is added to the tree. Thus, in the SOTM, the subset of neurons to be migrated depends only on the distance in the feature space, and not in the neural distance, as most of the tree-based SOM families. In [46], the authors have proposed a tree-structured NN called the Evolving Tree (ET), which takes advantage of a sub-optimal procedure (adapted from the one utilized by the TSVQ) to identify the BMU in O(log |V |) time, where V is the set of neurons. The ET adds neurons dynamically, and incorporates the concept of a “frozen” neuron (explained above), which is a non-leaf node that does not participate in the training process, and which is thus removed from the BoA. Similar to the TSVQ, the training phase terminates when all the nodes become frozen. The Tree-based Topology Oriented SOM (TTOSOM) [8], which is central to this paper, is a tree-based SOM in which each node can possess an arbitrary number of children. Furthermore, it is assumed that the user has the ability to describe/create such a tree whose topological configuration is preserved through the training process. The TTOSOM uses a particular BoA that includes nodes (leaf and non-leaf ones) that are within a certain neural distance (the so-called “radius”). An interesting property displayed by this strategy is its ability to reproduce the results obtained by Kohonen, when the nodes of the SOM are arranged linearly, i.e., in a list. In this case, the TTOSOM is able to adapt this 1-dimensional grid to a 2-dimensional (or multi-dimensional) object in the same way as the SOM algorithm does [8]. This was a phenomenon that was not possessed by prior hierarchical SOM-based networks reported in the literature4 . Additionally, if the original topology of the tree followed the overall shape of the data distribution, the results reported in [8] (and also depicted in the motivational section) showed that is also possible to obtain a symmetric topology for the codebook vectors. In a more recent work [9], the authors have enhanced the TTOSOM to perform classification in a semi-supervised fashion. The method presented in [9] first learns the data distribution in an unsupervised manner. Once labeled instances become available, the clusters are labeled using the evidence. According to the results presented in [9], the number of neurons required to accurately predict the category 4 The SOM possesses the ability to learn the data distribution by utilizing a unidimensional topology [36], i.e., the neighbors are defined along a grid in each direction. Further, when this is the case, one can encounter that the unidimensional topology forms a so-called Peano curve [47]. The TTOSOM also possesses this interesting property, when the tree topology is linear. The details of how this is achieved is presented in detail in [8], including the explanation of how other tree-based techniques fail to achieve this task. 8 of novel data are only a small portion of the cardinality of the input set. 3 Merging ADS and TTOSOM 3.1 Adaptive Data Structures (ADSs) for BSTs One of the primary goals of the area of ADS is to achieve an optimal arrangement of the elements, placed at the nodes of the structure, as the number of iterations increases. This reorganization can be perceived to be both automatic and adaptive, such that on convergence, the DS tends towards an optimal configuration with a minimum average access time. In most cases, the most probable element will be positioned at the root (head) of the tree (DS), while the rest of the tree is recursively positioned in the same manner. The solution to obtain the optimal BST is well known when the access probabilities of the nodes are known a priori [35]. However, our research concentrates on the case when these access probabilities are not known a priori. In this setting, one effective solution is due to Cheetham et al. and uses the concept of CONROT [16], which reorganizes the BST so as to asymptotically produce the optimal form. Additionally, unlike most of the algorithms that are otherwise reported in the literature, this move is not done on every data access operation – it is performed if and only if the overall Weighted Path Length (WPL) of the resulting BST decreases. A BST may be used to store records whose keys are members of an ordered set A = {A1 , A2 , . . . , AN }. The records are stored in such a way that a symmetric-order traversal of the tree will yield the records in an ascending order. If we are given A and the set of access probabilities Q = {Q1 , Q2 , . . . , QN }, the problem of constructing efficient BSTs has been extensively studied. The optimal algorithm due to Knuth [35], uses dynamic programming and produces the optimal BST using O(N 2 ) time and space. In this paper, we consider the scenario in which Q, the access probability vector, is not known a priori. We seek a scheme which dynamically rearranges itself and asymptotically generates a tree which minimizes the access cost of the keys. The primitive tree restructuring operation used in most BST schemes is the well known operation of Rotation [1]. We describe this operation as follows. Suppose that there exists a node i in a BST, and that it has a parent node j, a left child, iL , and a right child, iR . The function P (i) = j relates node i with its parent j (if it exists). Also, let B(i) = k relate node i with its sibling k, i.e., the node (if it exists) that shares the same parent as i. Consider the case when i is itself a left child (see Figure 2a). A rotation is performed on node i as follows: j now becomes the right child, iR becomes the left child of node j, and all the other nodes remain in their same relative positions (see Figure 2b). The case when node i is a right child is treated in a symmetric manner. This operation has the effect of raising (or promoting) a specified node in the tree structure while preserving the lexicographic order of the elements (refer again to Figure2b). A few memory-less tree reorganizing schemes5 which use this operation have been presented in the literature among which are the Move-to-Root and the simple Exchange rules [4]. In the Move-to-Root Heuristic, each time a record is accessed, rotations are performed on it in an upwards direction until it becomes the 5 This review is necessary brief. A more detailed version is found in [18, 38]. 9 (a) The tree before a rotation is performed. The contents of the nodes are their data values, which in this case are the characters {a, b, c, d, e}. (b) The tree after a rotation is performed on node i. Figure 2: The BST before and after a Rotation is performed. root of the tree. On the other hand, the simple Exchange rule rotates the accessed element one level towards the root. Sleator and Tarjan [54] introduced a technique, which also moves the accessed record up to the root of the tree using a restructuring operation called “Splaying”, which actually is a multi-level generalization of the rotation. Their structure, called the Splay Tree, was shown to have an amortized time complexity of O(log N ) for a complete set of tree operations which included insertion, deletion, access, split, and join. The literature also records various schemes which adaptively restructure the tree with the aid of additional memory locations. Prominent among them is the Monotonic Tree (MT) [12] and Mehlhorn’s D-Tree (DT) [41]. The MT is a dynamic version of a tree structuring method originally suggested by Knuth [35]. In spite of all their advantages, all of the schemes mentioned above have drawbacks, some of which are more serious than others. The memory-less schemes have one major disadvantage, which is that both the Move-to-Root and Splaying rules always move the accessed record up to the root of the tree. This means that if a nearly-optimal arrangement is reached, a single access of a seldomly-used record will disarrange the tree along the entire access path, as the element is moved upwards to the root. As opposed to these schemes, the MT rule does not move the accessed element to the root every time. But, as reported in [16], in practice, it does not perform well. The weakness of the MT lies in the fact that it considers only the frequency counts for the records, which leads to the undesirable property that a single rotation may move a subtree with a relatively large probability weight downwards, thus increasing the cost of the tree. This paper uses a particular heuristic, namely, the Conditional Rotations for a BST (CONROT-BST) [16], which has been shown to reorganize a BST so as to asymptotically arrive at an optimal form. In its optimized version, the scheme, referred to Algorithm CONROT-BST, requires the maintenance of a single memory location per record, which keeps track of the number of accesses to the subtree rooted at that record. The CONROT-BST algorithm specifies how an accessed element can be rotated towards the root of the tree so as to minimize the overall cost of the entire tree. Finally, unlike most of the algorithms that are currently 10 in the literature, this move is not done on every data access operation. It is performed if and only if the overall WPL of the resulting BST decreases. In essence Algorithm CONROT-BST attempts to minimize the WPL by incorporating the statistical information about the accesses to the various nodes and subtrees rooted at the corresponding nodes. The basic condition for the rotation of a node is that the WPL of the entire tree must decrease as a result of a single rotation. This is achieved by a so-called Conditional Rotation. To define the concept of a Conditional Rotation, we define τi (n) as the total number of accesses to the subtree rooted at node i. One of the biggest advantages of the CONROT-BST heuristic is that it only requires the maintenance and processing of the values stored at a specific node and its direct neighbors, i.e., its parent and both children, if they exist. Algorithm CONROT-BST, formally given in Algorithm 2, describes the process of the conditional rotations for a BST. The algorithm receives two parameters, the first of which corresponds to a pointer to the root of the tree, and the second which corresponds to the key to be searched, which is assumed to be present in the tree. When a node access is requested, the algorithm seeks for the node from the root down towards the leaves. Algorithm 2 CONROT-BST(j,ki) Input: i) j, A pointer to the root of a binary search tree T ii) ki , A search key, assumed to be in T Output: i) The restructured tree T ′ ii) A pointer to the record i containing ki Method: 1: τj ← τj + 1 2: if ki = kj then 3: if is-left-child(j) = TRUE then 4: Ψj ← 2τj − τjR − τP (j) 5: else 6: Ψj ← 2τj − τjL − τP (j) 7: end if 8: if Ψj > 0 then 9: rotate-upwards(j) 10: recalculate-tau(j) 11: recalculate-tau(P (j)) 12: end if 13: return record j 14: else 15: if ki < kj then 16: CONROT-BST( left-child(j) , ki ) 17: else 18: CONROT-BST( right-child(j) , ki ) 19: end if 20: end if End Algorithm The first task accomplished by the Algorithm CONROT-BST is the updating of the counter τ for the present node along the path traversed. After that, the next step consists of determining whether or not the 11 node with the requested key has been found. When this occurs, the quantities defined by Equations (1) and (2) are computed to determine the value of a quantity referred to as Ψ, where: Ψj = 2τj − τjR − τP (j) (1) when j is the left child of its parent, P (j), and Ψj = 2τj − τjL − τP (j) (2) when j is a right descendant of P (j). When Ψ is less than zero, an upward rotation is performed. The authors of [16] have shown that this single rotation leads to a decrease in the overall WPL of the entire tree. This occur in line 9 of the algorithm, in which the method rotate-upwards is invoked. The parameter to this method is a pointer to the node j. The method does the necessary operations required to rotate the node upwards, which means that if the node j is the left child of the parent, then this is equivalent to performing a right rotation over P (j), the parent of j. Analogously, when j is the right child of its parent, the parent of j is left-rotated instead. Once the rotation takes place, it is necessary to update the corresponding counters, τ . Fortunately this task only involve the updating of τi , for the rotated node, and the counter of its parent, τP (i) . The last part of the algorithm, namely lines 14–19, deals with the further search for the key, which in this case is achieved recursively. The reader will observe that all the tasks invoked in the algorithm are performed in constant time, and in the worst case, the recursive call is done from the root down to the leaves, leading to a O(h) running complexity, where h is the height of the tree. 3.2 The TTOSOM with Conditional Rotations (TTOCONROT) This section concentrates on the details of the integration between the fields of ADS and the SOM, and in particular, the TTOSOM. Although merging ADS and the SOM is relevant to a wide spectrum of DSs, we focus our scope by considering only tree-based structures. More specifically we shall concentrate on the integration of the CONROT-BST heuristic [16] into a TTOSOM [8], both of which were explained in the preceding sections. We can conceptually distinguish our method, namely, the Tree-based Topology Oriented SOM with Conditional Rotations (TTOCONROT) from its components and properties. In terms of components, we detect five elements. First of all, the TTOCONROT has a set of neurons, which, like all SOM-based methods, represents the data space in a condensed manner. Secondly, the TTOCONROT possesses a connection between the neurons, where the neighbor of any specific neuron is based on a nearness measure that is tree-based. The third and fourth components involve the migration of the neurons. Similar to the reported families of SOMs, a subset of neurons closest to the winning neuron are moved towards the sample point using a Vector Quantization (VQ) rule. However, unlike the reported families of SOMs, the identity of the neurons that are moved is based on the tree-based proximity and not on 12 the feature-space proximity. Finally, the TTOCONROT possesses tree-based mutating operations, namely the above-mentioned conditional rotations. With respect to the properties of the TTOCONROT, we mention the following. First of all, it is adaptive, with regard to the migration of the points. Secondly, it is also adaptive with regard to the identity of the neurons moved. Thirdly, the distribution of the neurons in the feature space mimics the distribution of the sample points. Finally, by virtue of the conditional rotations, the entire tree is optimized with regard to the overall accesses, which is a unique phenomenon (when compared to the reported family of SOMs) as far as we know. As mentioned in the introductory section, the general dynamic adaptation of SOM lattices reported in the literature considers essentially adding (and in some cases deleting) nodes/edges. However the concept of modifying the underlying structure’s shape itself has been unrecorded. Our hypothesis is that this is advantageous by means of a repositioning of the nodes and the consequent edges, as seen when one performs rotations on a BST. In other words, we place our emphasis on the self-arrangement which occurs as a result of restructuring the DS representing the SOM. In this case, as alluded to earlier, the restructuring process is done between the connections of the neurons so as to attain an asymptotically optimal configuration, where nodes that are accessed more frequently will tend to be placed close to the root. We thus obtain a new species of tree-based SOMs which is self-arranged by performing rotations conditionally, locally and in a constant number of steps. The primary goal of the field of ADS is to have the structure and its elements attain an optimal configuration as the number of iterations increases. Particularly, among the ADSs that use trees as the underlying topology, the common goal is to minimize the overall access cost, and this roughly means that one places the most frequently accessed nodes close to the root, which is also what CONROT-BST moves towards. Although such an adaptation can be made on any SOM paradigm, the CONROT is relevant to a tree structure, and thus to the TTOSOM. This further implies that some specific settings/modifications must be applied to achieve the integration between the two paradigms. We start by defining a Binary Search Tree SOM (BSTSOM) as a special instantiation of a SOM which uses a BST as the underlying topology. An Adaptive BSTSOM (ABSTSOM) is a further refinement of the BSTSOM which, during the training process, employs a technique that automatically modifies the configuration of the tree. The goal of this adaptation is to facilitate and enhance the search process. This assertion must be viewed from the perspective that for a SOM, neurons that represent areas with a higher density, will be queried more often. Every ABSTSOM is characterized by the following properties. First, it is adaptive, where, by virtue of the BST representation this adaptation is done by means of rotations, rather than by merely deleting or adding nodes. Second, the neural network corresponds to a BST. The goal is that the NN maintains the essential stochastic and topological properties of the SOM. 3.2.1 Neural Distance As in the case of the TTOSOM [8], the Neural Distance, dN , between two neurons depends on the number of unweighted connections that separate them in the user-defined tree. It is consequently the number of edges 13 in the shortest path that connects the two given nodes. More explicitly, the distance between two nodes in the tree, is defined as the minimum number of edges required to go from one to the other. In the case of trees, the fact that there is only a single path connecting two nodes implies the uniqueness of the shortest path, and permits the efficient calculation of the distance between them by a node traversal algorithm. Note however, that in the case of the TTOSOM, since the tree itself was static, the inter-node distances can be pre-computed a priori, simplifying the computational process. The situation changes when the tree is dynamically modified as we shall explain below. The implications of having the tree which describes the SOM to be dynamic, are three-fold. First of all, the siblings of any given node may change at every time instant. Secondly, the parents and ancestors of the node under consideration could also change at every instant. But most importantly, the structure of the tree itself could change, implying that nodes that were neighbors at any time instant may not continue to be neighbors at the next. Indeed, in the extreme case, if a node was migrated to become the root, the fact that it had a parent at a previous time instant is irrelevant at the next. This, of course, changes the entire landscape, rendering the resultant SOM to be unique and distinct from the state-of-the-art. An example will clarify this. Consider Figure 3, which illustrates the computation of the neural distance for various scenarios. First, in Figure 3a, we present the scenario when the node accessed is B. Observe that the distances are depicted with dotted arrows, with an adjacent numeric index specifying the current distance from node B. In the example, prior to an access, nodes H, C and E are all at a distance of 2 from node B, even though they are at different levels in the tree. The reader should be aware that non-leaf nodes may also be involved in the calculation, as in the case of node H. Figures 3b and 3c show the process when node B is queried, which in turn triggers a rotation of node B upwards. Observe that the rotation itself only requires local modifications, leaving the rest of the tree untouched. For the sake of simplicity and explicitness, unmodified areas of the tree are represented by dashed lines. Finally, Figure 3d depicts the configuration of the tree after the rotation is performed. At this time instant, C and E are both at distance of 3 from B, which means that they have increased their distance to B by unity. Moreover, although node H has changed its position, its distance to B remains unmodified. Clearly, the original distances are not necessarily preserved as a consequence of the rotation. Generally speaking, there are four regions of the tree that remain unchanged. These are, namely, the portion of the tree above the parent of the node being rotated, the portion of tree rooted at the right child of the node being rotated, the portion of tree rooted at the left child of the node being rotated, and the portion of tree rooted at the sibling of the node being rotated. Even though these four regions remain unmodified, the neural distance in these regions are affected, because the rotation could lead to a modification of the distances to the nodes. Another consequence of this operation that is worth mentioning is the following: The distance between any two given nodes that belong to the same unmodified region of the tree is preserved after a rotation is performed. The proof of this assertion is obvious, inasmuch as the fact remains that every path between nodes in any unmodified sub-tree remains with the same sub-tree. This property is interesting because it has the potential to accelerate the computation of the respective neural distances. 14 (a) (b) (c) (d) Figure 3: Example of the neural distance before and after a rotation. In Figure 3a nodes H, C and E are equidistant from B even though they are at different levels in the tree. Figures 3b and 3c show the process of rotating node A upwards. Finally, Figure 3d depicts the state of the tree after the rotation when only C and E are equidistant from B, and their distance to B has increased by unity. On the other hand, although H has changed its position, its distance to B remains the same. 3.2.2 The Bubble of Activity A concept closely related to the neural distance, is the one referred to as the Bubble of Activity (BoA) which is the subset of nodes within a distance of r away from the node currently examined. Those nodes are in essence those which are to be migrated toward the signal presented to the network. This concept is valid for all SOM-like NNs, and in particular for the TTOSOM. We shall now consider how this bubble is modified in the context of rotations. The concept of the bubble involves the consideration of a quantity, the so-called radius, which establishes how big the BoA is, and which therefore has a direct impact on the number of nodes to be considered. The BoA can be formally defined as [8] B(vi ; T, r) = {v|dN (vi , v; T ) ≤ r}, (3) where vi is the node currently being examined, and v is an arbitrary node in the tree T , whose nodes are V . Note that B(vi , T, 0) = {vi }, B(vi , T, i) ⊇ B(vi , T, i − 1) and B(vi , T, |V |) = V which generalizes the special case when the tree is a (simple) directed path. To clarify how the bubble changes in the context of rotations, we first describe the context when the tree is static. As presented in [8], the function TTOSOM Calculate Neighborhood (see Algorithm 3) specifies the steps involved in the calculation of the subset of neurons that are part of the neighborhood of the BMU. This computation involves a collection of parameters, including B, the current subset of neurons in the proximity of the neuron being examined, v, the BMU itself, and r ∈ IN the current radius of the neighborhood. When the function is invoked for the first time, the set B contains only the BMU marked as the current node, and 15 Algorithm 3 TTOSOM Calculate Neighborhood(B,v,r) Input: i) B, the set of the nodes in the bubble of activity identified so far. ii) v, the node from where the bubble of activity is calculated. iii) r, the current radius of the bubble of activity. Output: i) The set of nodes in the bubble of activity. Method: 1: if r ≤ 0 then 2: return 3: else 4: for all child ∈ v.getChildren() do 5: if child ∈ / B then 6: B ← B + {child } 7: TTOSOM Calculate Neighborhood(B,child , r − 1) 8: end if 9: end for 10: parent =v.getParent(); 11: if parent 6= NULL and parent ∈ / B then 12: B ← B + {parent } 13: TTOSOM Calculate Neighborhood(B,parent , r − 1) 14: end if 15: end if End Algorithm through a recursive call, B will end up storing the entire set of units within a radius r of the BMU. The tree is recursively traversed for all the direct topological neighbors of the current node, i.e., in the direction of the direct parent and children. Every time a new neuron is identified as part of the neighborhood, it is added to B and a recursive call is made with the radius decremented by one unit6 , marking the recently added neuron as the current node. The question of whether or not a neuron should be part of the current bubble, depends on the number of connections that separate the nodes rather than the distance that separate the networks in the solution space (for instance, the Euclidean distance). Figure 4 depicts how the BoA differs from the one defined by the TTOSOM as a result of applying a rotation. Figure 4a shows the BoA around the node B, using the same configuration of the tree as in Figure 3a, i.e., before the rotation takes place. Here, the BoA when r = 1 involves the nodes {B, A, D, F }, and when r = 2 the nodes contained in the bubble are {B, A, D, F, C, E, H}. Subsequently, considering a radius equal to 3, the resulting BoA contains the nodes {B, A, D, F, C, E, H, G, I}. Finally, the r = 5 case leads to a BoA which includes the whole set of nodes. Now, observe the case presented in Figure 4b, which corresponds to the BoA around B after the rotation upwards has been effected, i.e., the same configuration of the tree used in Figure 3d. In this case, when the radius is unity, nodes {B, A, F } are the only nodes within the bubble, which is different from the corresponding bubble before the rotation is invoked. Similarly, when r = 2, we obtain a set different from the analogous pre-rotation case, which in this case is {B, A, F, D, H}. Note that coincidentally, for the case of a radius equal to 3, the bubbles are identical before and after the rotation, i.e., they invoke the nodes {B, A, D, F, G, I}. Trivially, again, when r = 5, the BoA invokes the entire tree. 6 This fact will ensure that the algorithm reaches the base case when r = 0. 16 (a) Before. (b) After. Figure 4: The BoA associated with the TTOSOM before and after a rotation is invoked at node B. As explained, Equation (3) describes the criteria for a BoA calculated on a static tree. It happens that, as a result of the conditional rotations, the tree will be dynamically adapted, and so the entire phenomenon has to be re-visited. Consequently, the BoA around a particular node becomes a function of time, and, to reflect this fact, Equation (3) should be reformulated as: B(vi ; T, r, t) = {v|dN (vi , v; T, t) ≤ r}, (4) where t is the discrete time index. The algorithm to obtain the BoA for a specific node in such a setting is identical to Algorithm 3, except that the input tree itself dynamically changes. Further, even though the formal notation includes the time parameter, “t”, it happens that, in practice, the latter is needed only if the user/application requires a history of the BoA for any or all the nodes. Storing the history of BoAs will require the maintenance of a DS that will primarily store the changes made to the tree itself. Although storing the history of changes made to the tree can be done optimally [31], the question of explicitly storing the entire history of the BoAs for all the nodes in the tree remains open. 3.2.3 Enforcing the BST Property The CONROT-BST heuristic [16] requires that the tree should possess the BST property [18]: Let x be a node in a BST. If y is a node in the left subtree of x, then key[y] ≤ key[x]. Further, if y is a node in the right subtree of x, then key[x] ≤ key[y]. To satisfy the BST property, first of all we see that, the tree must be binary7 . As a general TTOSOM utilizes an arbitrary number of children per node, one possibility is to bound the value of the branching factor to be 2. In other words, the tree trained by the TTOSOM is restricted to contain at most two children per node. Additionally, the tree must implicitly involve a comparison operator between the two children so as to discern between the branches and thus perform the search process. This comparison can be achieved by defining a unique key that must be maintained for each node in the tree, and which will, in turn, allow a 7 Of course, this is a severe constraint. But we are forced to require this, because the phenomenon of achieving conditional rotations for arbitrary k-ary trees is unsolved. This research, however, is currently being undertaken. 17 lexicographical arrangement of the nodes. This leads to a different, but closely related concept, which concerns the preservation of the topology of the SOM. During the training process, the configuration of the tree will change as the tree evolves, positioning nodes that are accessed more often closer to the root. This probability-based ordering, will hopefully, be preserved by the rotations. A particularly interesting case occurs when the imposed tree corresponds to a list of neurons, i.e., a 1-ary tree. If the TTOSOM is trained using such a tree where each node has at most two children, then the adaptive process will alter the original list. The rotations will then modify the original configuration, generating a new state, where the non-leaf nodes might have one or two children each. In this case the consequence of incorporating ADS-based enhancements to the TTOSOM will imply that the results obtained will be significantly different from those shown in [8]. As shown in [35], an optimal arrangement of the nodes of the tree can be obtained using the probabilities of accesses. If these probabilities are not known a priori, then the CONROT-BST heuristic offers a solution, which involves a decision of whether or not to perform a single rotation towards the root. It happens that the concept of the “just accessed” node in the CONROT-BST is compatible with the corresponding BMU defined for the CL model. In CL, a neuron may be accessed more often than others and some techniques take advantage of this phenomenon through the inclusion of strategies that add or delete nodes The CONROT-BST implicitly stores the information acquired by the currently accessed node by incrementing a counter for that node. This is (in a distant sense) akin to the concept of a BMU counter which adds or delete nodes in competitive networks. During the training phase, when a neuron is a frequent winner of the CL, it gains prominence in the sense that it can represent more points from the original data set. This phenomenon is registered by increasing the BMU counter for that neuron. We propose that during the training phase, we can verify if it is worth modifying the configuration of the tree by moving this neuron one level up towards the root as per the CONROT-BST algorithm, and consequently explicitly recording the relevant role of the particular node with respect to its nearby neurons. CONROT-BST achieves this by performing a local movement of the node, where only its direct parent and children are aware of the neuron promotion. Neural Promotion is the process by which a neuron is relocated in a more privileged position8 in the network with respect to the other neurons in the NN. Thus, while all “all neurons are born equal”, their importance in the society of neurons is determined by what they represent. This is achieved, by an explicit advancement of its rank or position. Given this premise, the nodes in the tree will be adapted in such a way that neurons that have been BMUs more frequently, will tend to move towards the root if an only if a reduction in the overall WPL is obtained as a consequence of such a promotion. The properties of CONROT-BST guarantee this. Once the SOM and BST are “tied” together in a symbiotic manner (where one enhances the other and vice versa), the adaptation can be achieved by affecting the configuration of the BST. This task will be performed every time a training step of the SOM is performed. Clearly, it is our task to achieve an integration of the 8 As far as we know, we are not aware of any research which deals with the issue of Neural Promotion. Thus, we believe that this concept, itself, is pioneering. 18 BST and the SOM, and Figure 5 depicts the main architecture used to accomplish this. It transforms the structure of the SOM by modifying the configuration of the BST that, in turn, holds the structure of the neurons. Figure 5: Architectural view of an Adaptive Tree-Based SOM. As this work constitutes the first attempt to constraint a tree-based SOM using a BST, our focus is placed on the self-adaptation of the nodes. In this sense, the unique identifiers of the nodes are employed to maintain the BST structure and to promote nodes that are frequently accessed towards the root. We are currently examining ways to enhance this technique so as to improve the time required to identify the BMU as well. 3.2.4 Initialization Initialization, in the case of the BST-based TTOSOM, is accomplished in two main steps which involve defining the initial value of each neuron and the connections among them. The initialization of the codebook vectors are performed in the same manner as in the basic TTOSOM. The neurons can assume a starting value arbitrarily, for instance, by placing them on randomly selected input samples. On the other hand, a major enhancement with respect to the basic TTOSOM lays in the way the neurons are linked together. The basic definition of the TTOSOM utilizes connections that remain static through time. The beauty of such an arrangement is that it is capable of reflecting the user’s perspective at the time of describing the topology, and it is able to preserve this configuration until the algorithm reaches convergence. The inclusion of the rotations renders this dynamic. 3.2.5 The Required Local Information In our proposed approach, the codebooks of the SOM correspond to the nodes of a BST. Apart from the information regarding the codebooks themselves in the feature space, each neuron requires the maintenance of additional fields to achieve the adaptation. Besides this, each node inherits the properties of a BST Node, and it thus includes a pointer to the left and right children, as well as (to make the implementation easier), a pointer to its parent. Each node also contains a label which is able to uniquely identify the neuron when it is in the “company” of other neurons. This identification index constitutes the lexicographical key used to sort the nodes of the tree and remains static as time proceeds. Figure 6 depicts all the fields included in a 19 neuron of a BST-based SOM. Figure 6: Fields included in a BST-based SOM neuron. 3.2.6 The Neural State The different states that a neuron may assume during its lifetime are illustrated in Figure 7. At first, when the node is created, it is assigned a unique identifier, and the rest of the data fields are populated with their initial values. Here, the codebook vector assumes a starting value in the feature space, and the pointers are configured so as to appropriately link the neuron with the rest of the neurons in the tree in a BST configuration. Next, during the most significant portion of the algorithm, the NN enters a main loop, where training is effected. This training phase, involves adjusting the codebooks and may also trigger optional modules that affect the neuron. Once the BMU is identified, the neuron might assume the “restructured” state, which means that a restructuring technique, such as the CONROT algorithm, will be applied. Alternatively, the neuron might be ready to accept queries, i.e., be part of the CL process in the mapping mode. Additionally, an option that we are currently investigating, involves the case when a neuron is no longer necessary and may thus be eliminated from the main neural structure. We refer to this state as the so-called “deleted” state, and it is depicted using dashed lines. Finally, we foresee an alternative state referred to as the “frozen” state, in which the neuron does not participate in the CL during the training mode although it may continue to be part of the overall NN structure. Figure 7: Possible states that a neuron may assume. 3.2.7 The Training Step of the TTOCONROT The training module of the TTOCONROT is responsible of determining the BMU, performing restructuring, calculating the BoA and migrating the neurons within the BoA. Basically, what has to be done, is to integrate the CONROT algorithm into the sequence of steps responsible for the training phase of the TTOSOM. 20 Algorithm 4 describes the details of how this integration is accomplished. Line 1 performs the first task of the algorithm, which involves determining the BMU. After that, line 2 invokes the CONROT procedure. The rationale for following this sequence of steps is that the parameters needed to perform the conditional rotation, as specified in [16], includes the “key” of the element queried, which, in the present context, corresponds to the identity of the BMU. At this stage of the algorithm, the BMU may be rotated or not depending on the optimizing criterion given by equations (1) and (2), and the BoA is determined after this restructuring is done. These are performed in lines 3 and 4 of the algorithm respectively. Finally, lines 5 to 7, are responsible for the neural migration itself, and oversee the movement of the neurons within the BoA towards the input sample. Algorithm 4 TTOCONROT-BST train(x,p) Input: i) x, a sample signal. ii) p, the pointer to the tree. Method: 1: v ← TTOSOM Find BMU(x,p) 2: cond-rot-bst(p,v.getID()) 3: B ← {v} 4: TTOSOM Calculate Neighborhood(B,v,radius) 5: for all b ∈ B do 6: update rule(b.getCodebook(),x) 7: end for End Algorithm 3.2.8 Alternative Restructuring Techniques Even though, we have explained the advantages of the CONROT algorithm, the architecture that we are proposing allows the inclusion of alternative restructuring modules other than the CONROT. Potential candidates which can be used to perform the adaptation are the ones mentioned in Section 3.1 and include the splay and the MT algorithms, among others. 4 Experimental Results To illustrate the capabilities of our method, the experiments reported in the present work are primarily focused in lower dimensional feature spaces. This will help the reader in geometrically visualizing the results we have obtained. However, it is important to remark that the algorithm is also capable of solving problems in higher dimensions, although a graphical representation of the results will not be as illustrative. We know that, as per the results obtained in [8], the TTOSOM is capable of inferring the distribution and structure of the data. However, in this present setting, we are interested in investigating the effects of applying the neural rotation as part of the training process. To render the results comparable, the experiments in this section use the same schedule for the learning rate and radius, i.e., no particular refinement of the parameters has been done for any specific data set. Additionally, the parameters follow a rather “slow” decrement of the so-called decay parameters, allowing us to understand how the prototype vectors are moved as convergence 21 takes place. When solving practical problems, we recommend a further refinement of the parameters so as to increase the speed of the convergence process. 4.1 TTOCONROT’s Structure Learning Capabilities We shall describe the performance of TTOCONROT with data sets in 1, 2 and 3 dimensions, as well as experiments in the multidimensional domain. The specific advantages of the algorithm for various scenarios will also be highlighted. 4.1.1 One Dimensional Objects Since our entire learning paradigm assumes that the data has a tree-shaped model, our first attempt was to see how the philosophy is relevant to a unidimensional object (i.e., a curve), which really possesses a “linear” topology. Thus, as a prima facie case, we tested the strength of the TTOCONROT to infer the properties of data sets generated from linear functions in the plane. Figure 8 shows different snapshots of how the TTOCONROT learns the data generated from a curve. Random initialization was used by uniformly drawing points from the unit square. Observe that the original data points do not lie in the curve. Our aim here was to show how our algorithm could learn the structure of the data using arbitrary (initial and “non-realistic”) values for the codebook vectors. Figures 8b and 8c depict the middle phase of the training process, where the edges connecting the neurons are omitted for simplicity. It is interesting to see how, after a few hundred training steps, the original chaotic placement of the neurons are rearranged so as to fall within the line described by the data points. The final configuration is shown in Figure 8d. The reader should observe that after convergence has been achieved, the neurons are placed almost equidistantly along the curve. Even though the codebooks are not sorted in and increasing numerical order, the hidden tree and its root, denoted by two concentric squares, are configured in such a way that nodes that are queried more frequently will tend to be closer to the root. In this sense, the algorithm is not only capturing the essence of the topological properties of the data set, but at the same time rearranging the internal order of the neurons according to their importance in terms of their probabilities of access. 4.1.2 Two Dimensional Data Points To demonstrate the power of including ADS in SOMs, we shall now consider the same two-dimensional data sets studied in [8]. First we consider the data generated from a triangular-spaced distribution, as shown in Figures 9a-9d. In this case, the initial tree topology is unidirectional, i.e., a list, although, realistically, this is quite inadvisable considering the true (unknown) topology of the distribution. In other words, we assume that the user has no a priori information about the data distribution. Thus, for the initialization phase, a 1-ary tree is employed as the tree structure, and the respective keys are assigned in an increasing order. Observe that in this way we are providing minimal information to the algorithm. The root of the tree is marked with two concentric squares, i.e., the neuron labeled with the index 0 in Figure 9a. Also, with regards to the feature space, the prototype vectors are initially randomly placed. In the first iteration, the linear topology is lost, which is attributable to the randomness of the data points. As the prototypes are migrated 22 1 9 5 8 7 3 4 3 2 0 7 6 9 0 5 2 1 8 4 6 (a) After 0 iterations (b) After 1,000 iterations 7 6 7 6 8 8 4 4 9 3 0 9 3 5 5 0 2 1 1 (c) After 3,000 iterations 2 (d) After 5,000 iterations Figure 8: A 1-ary tree, i.e., a list topology, learns a curve. For the sake of simplicity, the edges are ommitted. and reallocated (see Figures 9b and 9c ), the 1-ary tree is modified as a consequence of the rotations. Such a transformation is completely novel to the field of SOMs. Finally, Figure 9d depicts the case after convergence has taken place. Here, the tree nodes are uniformly distributed over the entire triangular domain. The BST property is still preserved, and further rotations are still possible if the training process continues. This experiment serves as an excellent example to show the differences between our current method and the original TTOSOM algorithm [8], where the same data set with similar settings was utilized. In the case of the TTOCONROT the points effectively represent the entire data set. However, the reader must observe that we do not have to provide the algorithm with any particular a priori information about the structure of the data distribution – this is learned during the training process, as shown in Figure 9d. Thus, the specification of the initial “user-defined” tree topology (representing his perspective of the data space) required by the TTOSOM is no longer mandatory, and an alternative specification which only requires the number of nodes in the initial 1-ary tree is sufficient. A second experiment involves a Gaussian distribution. Here a 2-dimensional Gaussian ellipsoid is learned using the TTOCONROT algorithm. The convergence of the entire training execution phase is displayed in Figure 10. This experiment considers a complete BST of depth 4, i.e., containing 15 nodes. For simplicity the labels of the nodes have been removed. In Figure 10, the tree structure generated by the neurons suggest an ellipsoidal structure for the data distribution. This experiment is a good example to show how the nodes close to the root represent dense areas of the ellipsoid, and at the same time, those node that are far from the root (in tree space) occupy regions with low density, e.g., in the “extremes” of the ellipse. The TTOCONROT infers this structure without receiving any a priori information about the distribution or its structure. The experiment shown in Figures 11a-11d considers data generated from an irregular shape with a concave surface. Again, as in the case of the experiments described earlier, the original tree includes 15 neurons arranged unidirectionally, i.e., as in a list. As a result of the training, the distribution is learned and the 23 2 10 14 12 8 4 5 2 7 3 9 1 0 0 3 89 10 7 1 6 4 13 14 12 11 13 6 5 11 (a) After 0 iterations (b) After 1,000 iterations 2 2 6 6 3 3 9 1 1 0 7 4 10 12 11 8 0 9 10 7 14 13 5 11 (c) After 3,000 iterations 8 4 12 14 13 5 (d) After 5,000 iterations Figure 9: A 1-ary tree, i.e., a list topology, learns a triangular distribution. The DS is self-adapted so that nodes accessed more frequently are moved closer to the root conditionally. The BST property is also preserved. Figure 10: A tree learns a Gaussian distribution. The neurons that are accessed more frequently are promoted closer to the root. tree is adapted accordingly, as illustrated in Figure 11d. Observe that the random initialization is performed by randomly selecting points from the unit square, and this points thus do not necessarily fall within the concave boundaries. Although this initialization scheme is responsible of placing codebook vectors outside 24 of the irregular shape, the reader should observe that in a few training steps, they are repositioned inside the contour. It is important to indicate that, even though after the convergence of the algorithm, a line connecting two points passes outside the overall “unknown” shape, one must take into account that the TTOCONROT tree attempts to mimic the stochastic properties in terms of access probabilities. When the user desires the topological mimicry in terms of skeletal structure, we recommend the use of the TTOSOM instead. The final distribution of the points is quite amazing! 6 138 7 4 7 9 10 8 10 0 6 7 8 8 3 9 6 6 9 9 10 10 0 0 1 1 5 11 5 12 13 11 12 7 14 5 11 2 3 14 1 10 (a) After 0 iterations 12 14 4 2 (b) After 1,000 iterations 2 11 13 12 4 13 2 5 3 (c) After 3,000 iterations 14 4 3 (d) After 5,000 iterations Figure 11: A 1-ary tree, i.e., a list topology, learns different distributions from a concave object using the TTOCONROT algorithm. The set of parameters is the same as in the other examples. 4.1.3 Three Dimensional Data Points We will now explain the results obtained when applying the algorithm with and without CONROT. To do this we opt to consider three-dimensional objects. The experiments utilize the data generated from the contour of the unit sphere. It also initially involves an uni-dimensional chain of 31 neurons. Additionally, in order to show the power of the algorithm, both cases initialize the codebooks by randomly drawing points from the unit cube, which thus initially places the points outside the sphere itself. Figure 12 presents the case when the basic TTO algorithm (without CONROT) learns the unit sphere without performing conditional rotations. The illustration presented in Figure 12a show the state of the neurons before the first iteration is completed. Here, as shown, the codebooks lie inside the unit cube, although some of the neurons are positioned outside the boundary of the respective circumscribed sphere, which is the one we want to learn. Secondly, Figures 12b and 12c depict intermediate steps of the learning phase. As the algorithm processes the information provided by the sample points and the neurons are repositioned, the chain of neurons is constantly “twisted” so as to adequately represent the entire manifold. Finally, Figure 12d illustrates the case when the convergence is reached. In this case, the one-dimensional list of neurons is evenly distributed over the sphere, preserving the original properties of the 3-dimensional object and also presenting a shape which reminds the viewer of the so-called Peano curve [47]. A complimentary set of experiments which involved the learning of the same unit sphere where the TTO scheme was augmented by conditional rotations (i.e., CONROT) was also conducted. Figure 13a shows the initialization of the codebooks. Here, the starting positions of the neurons fall within the unit cube as in the case displayed in Figure 12a. Figures 13b and 13c show snapshots after 1, 000 and 3, 000 iterations respectively. In this case the tree configuration obtained in the intermediate phases differ significantly from those obtained by the corresponding configurations shown in Figure 12, i.e., those that involved no rotations. In this case, the list rearranges itself as per CONROT, modifying the original chain structure to yield a more25 14 7 7 19 10 8 26 28 24 22 15 25 28 1 17 27 12 4 26 31 21 121718 16 15 14 13 23 22 21 20 19 22 28 13 3 16 26 6 4 21 5 19 30 29 31 9 10 4 5 6 7 89 2 18 3 2 11 11 29 24 23 5 24 17 31 30 0 27 11 6 0 29 6 25 910 30 23 7 25 20 0 1 2 3 24 20 15 27 1 14 15 0 3 2 16 18 8 22 13 18 20 12 5 23 21 14 17 1 4 19 12 11 10 9 29 28 27 26 25 31 30 8 13 16 (a) After 0 iterations (b) After 1,000 iter. (c) After 3,000 iter. (d) After 5,000 iter. Figure 12: A 1-ary tree, i.e., a list topology, learns a sphere distribution when the algorithm does not utilize any conditional rotation. or-less balanced tree. Finally, from the results obtained after convergence, and illustrated in Figure 13d, it is possible to compare both scenarios. In both cases, we see that the tree is accurately learned. However, in the first case, the structure of the nodes is maintained as a list throughout the learning phase, while, in the case when CONROT is applied, the configuration of the tree is constantly revised, promoting those neurons that are queried more frequently. Additionally, the experiments show us how the dimensionality reduction property evidenced in the traditional SOM, is also present in the TTOCONROT. Here, an object in the 3-dimensional domain is successfully learned by our algorithm, and the properties of the original manifold are captured from the perspective of a tree. 13 24 25 9 9 11 7 25 18 9 10 30 30 10 24 11 4 6 27 12 8 20 23 19 8 14 1 02 3 15 14 27 19 6 24 12 16 14 15 13 30 18 17 15 17 21 20 21 13 22 13 22 26 29 30 28 27 11 14 0 20 17 21 15 28 22 8 5 11 10 20 3 16 16 25 23 5 7 2421 22 23 16 4 23 26 2 4 25 5 7 29 98 29 12 27 26 2 29 26 10 18 18 6 28 0 4 17 12 75 6 19 0 28 3 19 3 1 1 1 2 (a) After 0 iterations (b) After 1,000 iter. (c) After 3,000 iter. (d) After 5,000 iter. Figure 13: A 1-ary tree, i.e., a list topology, learns a sphere distribution. 4.1.4 Multidimensional Data Points The well known Iris dataset was chosen for showing the power of our scheme in a scenario when the dimensionality is increased. This data set gives the measurements (in centimeters) of the variables which are the sepal length, sepal width, petal length and petal width, respectively, for 50 flowers from each of 3 species of the iris family. The species are the Iris Setosa, Versicolor, and Virginica. In this set of experiments, the Iris data set was learned under three different configurations, using a fixed schedule for the learning rate and radius but with a distinct tree configuration. The results of the experiments are depicted in Figure 14 and involve a complete binary tree of depth 3, 4 and 5, respectively. Taking into 26 account that the dataset possesses a high dimensionality, we present the projection in the 2-dimensional space to facilitate the visualization. We also removed the labels from the nodes in Figure 14c to improve understandability. (a) Using 7 nodes. (b) Using 15 nodes. (c) Using 31 nodes. Figure 14: Three different experiments where the TTOCONROT effectively captures the fundamental structure of the iris dataset (2-dimensional projection of the data is shown). The experiment utilizes a underlying tree topology of a complete binary tree with different levels of depth. By this we attempt to show examples of how exactly the same parameters of the TTOCONROT, can be utilized to learn the structure from data belonging to the 2-dimensional, 3-dimensional and also 4-dimensional spaces. After executing the TTO-SOM, each of the main branches of the tree were migrated towards the center of mass of the cloud of points in the hyper-space belonging to each of the three categories of flowers, respectively. Since the TTOCONROT is an unsupervised learning algorithm, it performs learning without knowing the true labels of the samples. However, when these labels are available, one can use them to evaluate the quality of the tree. To do so, each sample is assigned to its closest neuron, and tagging the neuron with the class which is most frequent. Table 1 presents the evaluation for the tree in Figure 14a. Assigned to neuron → Iris-setosa Iris-versicolor Iris-virginica 1 0 0 12 2 0 0 22 3 0 20 0 4 0 7 0 5 0 20 1 6 50 0 0 7 0 3 15 Table 1: “Cluster to class” evaluation for the tree in Figure 14a. Using the simple voting scheme explained above, it is possible to see from Table 1, that only 4 instances are incorrectly classified, i.e., 97.3% of the instances are correctly classified. Additionally, observe that node 6 contains all the 50 instances corresponding to the class Iris-setosa. It is well known that the Iris-setosa class is linearly separable from the other two classes, and our algorithm was able to discover this without providing it with the labels. We find this result quite fascinating! The experimental results shown in Table 1, not only demonstrate the potential capabilities of the TTOCONROT for performing clustering, but also suggest the possibilities of using it for pattern classification. According to [23], there are several reasons for performing pattern classification using an unsupervised approach. We are currently investigating such a classification strategy. 27 4.2 Skeletonization In general, the main objective of skeletonization consists of generating a simpler representation of the shape of an object. The authors of [44] refer to skeletonization in the plane as the process by which a 2-dimensional shape is transformed into a 1-dimensional one, similar to a “stick” figure. The applications of skeletonization are diverse, including the fields of Computer Vision and Pattern Recognition. As explained in [8], the traditional methods for skeletonization assume the connectivity of the data points and when this is not the case, more sophisticated methods are required. Previous efforts involving SOM variants to achieve skeletonization has been proposed [8, 19, 53]. We remark that the TTOSOM [8] is the only one which uses a tree-based structure. The TTOSOM assumed that the shape of the object is not known a priori. Rather, this is learned by accessing a single point of the entire shape at any time instant. Our results reported in [8] confirm that this is actually possible, and we now focus on how the conditional rotations will affect such a skeletonization. Figure 15 shows how the TTOCONROT learned the skeleton of different objects in the 2-dimensional and the 3-dimensional domain. In all the cases the same schedule of parameters were used, and only the number of neurons employed was chosen proportionally to the number of data points contained in the respective data sets. It is important to remark that we did not invoke any post-processing of the edges, e.g., minimum spanning tree, and that the skeleton observed was exactly what our BSTSOM learned. Firstly, Figures 15a-15d illustrate the shapes of the silhouette of a human, a rhinoceros, a 3d representation of a head, and a 3d representation of a woman. The figures also show the trees learned from the respective data sets. Additionally figures 15e-15h display only the data points, which in our opinion are capable of representing the fundamental structure of the four objects in a 1-dimensional way effectively. As a final comment, we stress that all the shapes employed in the experiments involve the learning of the “external” structure of the objects. For the case of solid objects, if the internal data points are also provided, the TTOCONROT is able to give an approximation of the so-called endo-skeleton, i.e., a representation in which the skeleton is built inside the solid object. 4.3 Theoretical Analysis According to Kiviluoto [34], there are three different criteria for evaluating the quality of a map. The first criterion indicates how continuous the mapping is, implying that input signals that are close (in the input space) should be mapped to codebooks that are close in the output space as well. A second criterion involves the resolution of the mapping. Maps with high resolution possess the additional property that input signals that are distant in the input space should be represented by distant codebooks in the output space. A third criterion imposed on the accuracy of the mapping is aimed to reflect the probability distribution of the input set. There exist a variety of measures for quantifying the quality of the topology preservation [5]. The author of [49] surveys a number of relevant measures for the quality of maps, and these include the Quantization Error, the Topographic Product [11], the Topographic Error [34] and the Trustworthiness and Neighborhood Preservation [55]. Although we are currently investigating [6] how the quality of any tree-based SOM (not just our scheme) can be quantified using these metrics. The following arguments are pertinent. 28 (a) (b) (c) (d) (e) (f) (g) (h) Figure 15: TTOCONROT effectively captures the fundamental structure of four objects in a 1-dimensional way. Figures 15a-15d show the silhouette of a human, a rhinoceros, a 3d representation of a head, and a 3d representation of a woman, as well as the respective trees learned. Figures 15e-15h show only the respective data points. The ordering of the weights (with respect to the position) of the neurons of the SOM has been proved for unidimensional topologies [17, 36, 51]. Extending these results to higher dimensional configurations or topologies leads to numerous unresolved problems. First of all, the question of what one means by “ordering” in higher dimensional spaces has to be defined. Further, the issue of the “absorbing” nature of the “ordered state” is open. Budinich, in [14], explains intuitively the problems related to the ordering of neurons in higher dimensional configurations. Huang et al. [29] introduce a definition of the ordering and show that even though the position of the codebook vectors of the SOM have been ordered, there is still the possibility that a sequence of stimuli will cause their disarrangement. Some statistical indexes of correlation between the measures of the weights and distances of the related positions have been introduced in [10]. With regard to the topographic product, the authors of [11] have shown the power of the metric by applying it on different artificial and real-world data sets, and also compared it with different measures to quantify the topology [10]. Their study concentrates on the traditional SOM, implying that the topologies evaluated were of a “linear” nature, with the consequential extension to 2-dimensions and 3-dimensions by means of grids only. In [28], Haykin mention that the Topographic Product may be employed to compare the quality of different maps, even when these maps possess different dimensionality. However, he also noted that this measurement is only possible when the dimensionality of the topological structure is the same as the dimensionality of the feature space. Further, tree-like topologies were not considered in their study. To be more precise, most of the effort towards determining the concept of topology preservation for dimensions greater than unity are specifically focused on the SOM [11, 17, 36, 14, 29, 10], and do not define how a treelike topology should be measured nor how to define the order in topologies which are not grid-based. Thus, we believe that even the tools to analyze the TTOCONROT are currently not available. The experimental 29 results obtained in our paper, suggest that the TTOCONROT is able to train the NN so as to preserve the stimuli. However, in order to quantify the quality of this topology, the matter of defining a concept of ordering on tree-based structure has yet to be resolved. Although this issue is of great interest to us, this rather ambitious task lies beyond the scope of our present manuscript. 5 Conclusions and Discussions 5.1 Concluding Remarks In this paper, we have proposed a novel integration between the areas of Adaptive Data Structures (ADSs) and the Self-Organizing Maps (SOMs). In particular we have shown how a tree-based SOM can be adaptively transformed by the employment of an underlying Binary Search Tree (BST) structure and subsequently, restructured using rotations that are performed conditionally. These rotations on the nodes of the tree are local, can be done in constant time, and performed so as to decrease the Weighted Path Length (WPL) of the entire tree. One of the main advantages of the algorithm, is that the user does not need to have a priori knowledge about the topology of the input data set. Instead, our proposed method, namely the TTOSOM with Conditional Rotations (TTOCONROT), infers the topological properties of the stochastic distribution, and at the same time, attempt to build the best BST that represents the data set. Incorporating the data structure’s constraints in this ways has not being achieved by any of the related approaches included in the state-of-the-art. Our premise is that regions of the hyper-space that are accessed more often should be promoted to preferential spots in the tree representation, which yields to an improved stochastic representation. As our experimental results suggest, the TTOCONROT tree is indeed able to absorb the stochastic properties of the input manifold. It is also possible to obtain a tree configuration that can learn both, the stochastic properties in terms of access probabilities and at the same time preserve the topological properties in terms of its skeletal structure. 5.2 Discussions and Future Work As explained in Section 4.3, the work associated with measuring the topology preservation of the SOM, including the proof of its convergence for the unidimensional case, has been performed for the traditional SOM only. The questions are unanswered for how a tree-like topology should be measured, and for defining the order in topologies which are not grid-based. Thus, we believe that even the tools for formally analyzing the TTOCONROT are currently not available. The experimental results obtained in our paper, suggest that the TTOCONROT is able to train the Neural Network (NN) so as to preserve the stimuli for which the concept of ordering on tree-based structures has yet to be resolved. Even though our principal goal was to obtain a more accurate representation of the stochastic distribution, our results also suggest that the special configuration of the tree obtained by the TTOCONROT can be further exploited so as to improve the time required for identifying the Best Matching Unit (BMU). The state-ofthe-art includes different strategies that expand trees by inserting nodes (which can be a single neuron or a 30 SOM-layer) that essentially are based on a Quantization Error (QE) measure. In some of these strategies, the error measure is based on the “hits”, i.e., the number of times a neuron has been selected as the BMU, which is, in principle, the same type of counter utilized by the Conditional Rotations (CONROT). Our strategy, TTOCONROT, which asymptotically positions frequently accessed nodes close to the root, might incorporate a module, that taking advantage of the “optimal” tree and the BMU counters already present in the TTOCONROT, splits the node at the root level. Thus, the splitting operation will occur without the necessity of searching for the node with the largest QE, under the assumption that a higher number of hits indicates that the degree of granularity of a particular neuron is lacking refinement. The concept of using the root of the tree for growing a tree-based SOM is itself pioneering, as far as we know, and the design and implementation details of this are currently being investigated. References [1] M. Adelson-Velskii and M. E. Landis. An algorithm for the organization of information. Sov. Math. DokL, 3:1259–1262, 1962. [2] M. U. Akram, S. Khalid, and S. A. Khan. Identification and classification of microaneurysms for early detection of diabetic retinopathy. Pattern Recognition, 46(1):107–116, 2013. [3] D. Alahakoon, S. K. Halgamuge, and B. Srinivasan. Dynamic self-organizing maps with controlled growth for knowledge discovery. IEEE Transactions on Neural Networks, 11(3):601–614, 2000. [4] B. Allen and I. Munro. Self-organizing binary search trees. J. ACM, 25(4):526–535, 1978. [5] E. Arsuaga Uriarte and F. Dı́az Martı́n. Topology preservation in SOM. International Journal of Applied Mathematics and Computer Sciences, 1(1):19–22, 2005. [6] C. A. Astudillo. Self Organizing Maps Constrained by Data Structures. PhD thesis, Carleton University, 2011. [7] C. A. Astudillo and B. J. Oommen. On using adaptive binary search trees to enhance self organizing maps. In A. Nicholson and X. Li, editors, 22nd Australasian Joint Conference on Artificial Intelligence (AI 2009), pages 199–209, 2009. [8] C. A. Astudillo and B. J. Oommen. Imposing tree-based topologies onto self organizing maps. Information Sciences, 181(18):3798–3815, 2011. [9] C. A. Astudillo and B. J. Oommen. On achieving semi-supervised pattern recognition by utilizing tree-based SOMs. Pattern Recognition, 46(1):293 – 304, 2013. [10] H. U. Bauer, M. Herrmann, and T. Villmann. Neural maps and topographic vector quantization. Neural Networks, 12(4-5):659 – 676, 1999. [11] H. U. Bauer and K. R. Pawelzik. Quantifying the neighborhood preservation of self-organizing feature maps. Neural Networks, 3(4):570–579, July 1992. 31 [12] J. R. Bitner. Heuristics that dynamically organize data structures. SIAM J. Comput., 8:82–110, 1979. [13] J. Blackmore. Visualizing high-dimensional structure with the incremental grid growing neural network. Master’s thesis, University of Texas at Austin, 1995. [14] M. Budinich. On the ordering conditions for self-organizing maps. Neural Computation, 7(2):284–289, 1995. [15] G. A. Carpenter and S. Grossberg. The art of adaptive pattern recognition by a self-organizing neural network. Computer, 21(3):77–88, 1988. [16] R. P. Cheetham, B. J. Oommen, and D. T. H. Ng. Adaptive structuring of binary search trees using conditional rotations. IEEE Trans. on Knowl. and Data Eng., 5(4):695–704, 1993. [17] P. L. Conti and L. De Giovanni. On the mathematical treatment of self organization: extension of some classical results. In Artificial Neural Networks - ICANN 1991, International Conference, volume 2, pages 1089–1812, 1991. [18] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms, Second Edition. McGraw-Hill Science/Engineering/Math, July 2001. [19] A. Datta, S. M. Parui, and B. B. Chaudhuri. Skeletal shape extraction from dot patterns by selforganization. Pattern Recognition, 1996., Proceedings of the 13th International Conference on, 4:80–84 vol.4, Aug 1996. [20] D. Deng. Content-based image collection summarization and comparison using self-organizing maps. Pattern Recognition, 40(2):718 – 727, 2007. [21] M. Dittenbach, D. Merkl, and A. Rauber. The growing hierarchical self-organizing map. In Neural Networks, 2000. IJCNN 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on, volume 6, pages 15–19 vol.6, 2000. [22] J. Dopazo and J. M. Carazo. Phylogenetic reconstruction using an unsupervised growing neural network that adopts the topology of a phylogenetic tree. Journal of Molecular Evolution, 44(2):226–233, February 1997. [23] R. Duda, P. E. Hart, and D. G. Stork. Pattern Classification (2nd Edition). Wiley-Interscience, 2000. [24] B. Fritzke. Growing Cell Structures – a self-organizing network for unsupervised and supervised learning. Neural Networks, 7(9):1441–1460, 1994. [25] B. Fritzke. Growing Grid - a self-organizing network with constant neighborhood range and adaptation strength. Neural Processing Letters, 2(5):9–13, 1995. [26] B. Fritzke. A growing neural gas network learns topologies. In G. Tesauro, D. S. Touretzky, and T. K. Leen, editors, Advances in Neural Information Processing Systems 7, pages 625–632, Cambridge MA, 1995. MIT Press. 32 [27] L. Guan. Self-organizing trees and forests: A powerful tool in pattern clustering and recognition. In Image Analysis and Recognition, Third International Conference, ICIAR 2006, Póvoa de Varzim, Portugal, September 18-20, 2006, Proceedings, Part I, pages I: 1–14, 2006. [28] S. Haykin. Neural Networks and Learning Machines. Prentice Hall, 3rd edition edition, 2008. [29] G. Huang, H. A. Babri, and H. Li. Ordering of self-organizing maps in multi-dimensional cases. Neural Computation, 10:19–24, 1998. [30] H.-G. Kang and D. Kim. Real-time multiple people tracking using competitive condensation. Pattern Recognition, 38(7):1045 – 1058, 2005. [31] H. Kaplan. Handbook of Data Structures and Applications, chapter 31: Persistent Data Structures, pages 31.1 – 31.26. Chapman and Hall/CRC, 2004. [32] S. Kaski, J. Kangas, and T. Kohonen. Bibliography of self-organizing map (SOM) papers: 1981–1997. Neural Computing Surveys, 1:102–350, 1998. [33] M. H. Khosravi and R. Safabakhsh. Human eye sclera detection and tracking using a modified timeadaptive self-organizing map. Pattern Recognition, 41(8):2571–2593, 2008. [34] K. Kiviluoto. Topology preservation in self-organizing maps. In P. IEEE Neural Networks Council, editor, Proceedings of International Conference on Neural Networks, ICNN’96, volume 1, pages 294–299, New Jersey, USA, 1996. [35] D. E. Knuth. The art of computer programming, volume 3: (2nd ed.) sorting and searching. Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA, 1998. [36] T. Kohonen. Self-Organizing Maps. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 1995. [37] P. Koikkalainen and E. Oja. Self-organizing hierarchical feature maps. IJCNN International Joint Conference on Neural Networks, 2:279–284, June 1990. [38] T. W. H. Lai. Efficient maintenance of binary search trees. PhD thesis, University of Waterloo, Waterloo, Ont., Canada, 1990. [39] Y. Liang, M. C. Fairhurst, and R. M. Guest. No titlea synthesised word approach to word retrieval in handwritten documents. Pattern Recognition, 45(12):4225–4236, 2012. [40] M. Martinetz and K. J. Schulten. A “neural-gas” network learns topologies. In in Proceedings of International Conference on Articial Neural Networks, volume I, pages 397–402, North-Holland, Amsterdam, 1991. [41] K. Mehlhorn. Dynamic binary search. SIAM Journal on Computing, 8(2):175–198, 1979. [42] D. Merkl, S. Hui-He, M. Dittenbach, and A. Rauber. Adaptive hierarchical incremental grid growing: An architecture for high-dimensional data visualization. In In Proceedings of the 4th Workshop on Self-Organizing Maps, Advances in Self-Organizing Maps, pages 293–298, 2003. 33 [43] R. Miikkulainen. Script recognition with hierarchical feature maps. Connection Science, 2(1&2):83–101, 1990. [44] R. L. Ogniewicz and O. Kübler. Hierarchic voronoi skeletons. Pattern Recognition, 28(3):343–359, 1995. [45] M. Oja, S. Kaski, and T. Kohonen. Bibliography of self-organizing map (SOM) papers: 1998-2001 addendum. Neural Computing Surveys, 3:1–156, 2003. [46] J. Pakkanen, J. Iivarinen, and E. Oja. The Evolving Tree — a novel self-organizing network for data analysis. Neural Processing Letters, 20(3):199–211, December 2004. [47] G. Peano. Sur une courbe, qui remplit toute une aire plane. Mathematische Annalen, 36(1):157–160, 1890. [48] M. Pöllä, T. Honkela, and T. Kohonen. Bibliography of self-organizing map (SOM) papers: 20022005 addendum. Technical Report TKK-ICS-R23, Helsinki University of Technology, Department of Information and Computer Science, Espoo, Finland, December 2009. [49] G. Pölzlbauer. Survey and comparison of quality measures for self-organizing maps. In Ján Paralič, Georg Pölzlbauer, and Andreas Rauber, editors, Proceedings of the Fifth Workshop on Data Analysis (WDA’04), pages 67–82, Sliezsky dom, Vysoké Tatry, Slovakia, June 24–27 2004. Elfa Academic Press. [50] A. Rauber, D. Merkl, and M. Dittenbach. The Growing Hierarchical Self-Organizing Map: exploratory analysis of high-dimensional data. IEEE Transactions on Neural Networks, 13(6):1331–1341, 2002. [51] R. Rojas. Neural networks: a systematic introduction. Springer-Verlag New York, Inc., New York, NY, USA, 1996. [52] E. V. Samsonova, J. N. Kok, and A. P. IJzerman. Treesom: Cluster analysis in the self-organizing map. Neural Networks, 19(6–7):935 – 949, 2006. Advances in Self Organising Maps - WSOM’05. [53] R. Singh, V. Cherkassky, and N. Papanikolopoulos. Self-Organizing Maps for the skeletonization of sparse shapes. Neural Networks, IEEE Transactions on, 11(1):241–248, Jan 2000. [54] D. D. Sleator and R. E. Tarjan. Self-adjusting binary search trees. J. ACM, 32(3):652–686, 1985. [55] J. Venna and S. Kaski. Neighborhood preservation in nonlinear projection methods: An experimental study. In Georg Dorffner, Horst Bischof, and Kurt Hornik, editors, ICANN, volume 2130 of Lecture Notes in Computer Science, pages 485–491. Springer, 2001. [56] K. C. Yao, M. Mignotte, C. Collet, P. Galerne, and G. Burel. Unsupervised segmentation using a selforganizing map and a noise model estimation in sonar imagery. Pattern Recognition, 33(9):1575 – 1584, 2000. 34
9cs.NE
"Robust Satisfaction of Temporal Logic Specifications via Reinforcement\nLearning\n\narXiv:1510.0646(...TRUNCATED)
3cs.SY
"BATCHED QR AND SVD ALGORITHMS ON GPUS WITH APPLICATIONS\nIN HIERARCHICAL MATRIX COMPRESSION\n\narXi(...TRUNCATED)
8cs.DS
"Analytical and simplified models for dynamic analysis\nof short skew bridges under moving loads\n\n(...TRUNCATED)
5cs.CE
"Efficient PAC Learning from the Crowd\n\narXiv:1703.07432v2 [cs.LG] 13 Apr 2017\n\nPranjal Awasthi(...TRUNCATED)
8cs.DS
"Automated Identification of Trampoline Skills\nUsing Computer Vision Extracted Pose Estimation\nPau(...TRUNCATED)
1cs.CV
"Parsing methods streamlined\n\narXiv:1309.7584v1 [cs.FL] 29 Sep 2013\n\nLuca Breveglieri\n\nStefano(...TRUNCATED)
6cs.PL
"I/O-Efficient Similarity Join⋆\nRasmus Pagh, Ninh Pham, Francesco Silvestri⋆⋆ , and Morten St(...TRUNCATED)
8cs.DS
"arXiv:1207.0612v2 [math.AC] 21 Jan 2013\n\nCOMPLETION BY DERIVED DOUBLE CENTRALIZER\nMARCO PORTA, L(...TRUNCATED)
0math.AC

Arxiv Classification: a classification of Arxiv Papers (11 classes).

This dataset is intended for long context classification (documents have all > 4k tokens).
Copied from "Long Document Classification From Local Word Glimpses via Recurrent Attention Learning"

@ARTICLE{8675939,
  author={He, Jun and Wang, Liqun and Liu, Liu and Feng, Jiao and Wu, Hao},
  journal={IEEE Access}, 
  title={Long Document Classification From Local Word Glimpses via Recurrent Attention Learning}, 
  year={2019},
  volume={7},
  number={},
  pages={40707-40718},
  doi={10.1109/ACCESS.2019.2907992}
  }

It contains 11 slightly unbalanced classes, 33k Arxiv Papers divided into 3 splits: train (28k), val (2.5k) and test (2.5k).

2 configs:

  • default
  • no_ref, removes references to the class inside the document (eg: [cs.LG] -> [])

Compatible with run_glue.py script:

export MODEL_NAME=roberta-base
export MAX_SEQ_LENGTH=512

python run_glue.py \
  --model_name_or_path $MODEL_NAME \
  --dataset_name ccdv/arxiv-classification  \
  --do_train \
  --do_eval \
  --max_seq_length $MAX_SEQ_LENGTH \
  --per_device_train_batch_size 8 \
  --gradient_accumulation_steps 4 \
  --learning_rate 2e-5 \
  --num_train_epochs 1 \
  --max_eval_samples 500 \
  --output_dir tmp/arxiv
Downloads last month
458

Models trained or fine-tuned on ccdv/arxiv-classification