Generalized distributive law

From HandWiki

The generalized distributive law (GDL) is a generalization of the distributive property which gives rise to a general message passing algorithm.[1] It is a synthesis of the work of many authors in the information theory, digital communications, signal processing, statistics, and artificial intelligence communities. The law and algorithm were introduced in a semi-tutorial by Srinivas M. Aji and Robert J. McEliece with the same title.[1]

Introduction

"The distributive law in mathematics is the law relating the operations of multiplication and addition, stated symbolically, a*(b+c)=a*b+a*c; that is, the monomial factor a is distributed, or separately applied, to each term of the binomial factor b+c, resulting in the product a*b+a*c" - Britannica[2]

As it can be observed from the definition, application of distributive law to an arithmetic expression reduces the number of operations in it. In the previous example the total number of operations reduced from three (two multiplications and an addition in a*b+a*c) to two (one multiplication and one addition in a*(b+c)). Generalization of distributive law leads to a large family of fast algorithms. This includes the FFT and Viterbi algorithm.

This is explained in a more formal way in the example below:

α(a,b)=defc,d,eAf(a,c,b)g(a,d,e) where f() and g() are real-valued functions, a,b,c,d,eA and |A|=q (say)

Here we are "marginalizing out" the independent variables (c, d, and e) to obtain the result. When we are calculating the computational complexity, we can see that for each q2 pairs of (a,b), there are q3 terms due to the triplet (c,d,e) which needs to take part in the evaluation of α(a,b) with each step having one addition and one multiplication. Therefore, the total number of computations needed is 2q2q3=2q5. Hence the asymptotic complexity of the above function is O(n5).

If we apply the distributive law to the RHS of the equation, we get the following:

α(a,b)=defcAf(a,c,b)d,eAg(a,d,e)

This implies that α(a,b) can be described as a product α1(a,b)α2(a) where α1(a,b)=defcAf(a,c,b) and α2(a)=defd,eAg(a,d,e)

Now, when we are calculating the computational complexity, we can see that there are q3 additions in α1(a,b) and α2(a) each and there are q2 multiplications when we are using the product α1(a,b)α2(a) to evaluate α(a,b). Therefore, the total number of computations needed is q3+q3+q2=2q3+q2. Hence the asymptotic complexity of calculating α(a,b) reduces to O(n3) from O(n5). This shows by an example that applying distributive law reduces the computational complexity which is one of the good features of a "fast algorithm".

History

Some of the problems that used distributive law to solve can be grouped as follows

1. Decoding algorithms
A GDL like algorithm was used by Gallager's for decoding low density parity-check codes. Based on Gallager's work Tanner introduced the Tanner graph and expressed Gallagers work in message passing form. The tanners graph also helped explain the Viterbi algorithm.

It is observed by Forney that Viterbi's maximum likelihood decoding of convolutional codes also used algorithms of GDL-like generality.

2. Forward-backward algorithm
The forward backward algorithm helped as an algorithm for tracking the states in the markov chain. And this also was used the algorithm of GDL like generality

3. Artificial intelligence
The notion of junction trees has been used to solve many problems in AI. Also the concept of bucket elimination used many of the concepts.

The MPF problem

MPF or marginalize a product function is a general computational problem which as special case includes many classical problems such as computation of discrete Hadamard transform, maximum likelihood decoding of a linear code over a memory-less channel, and matrix chain multiplication. The power of the GDL lies in the fact that it applies to situations in which additions and multiplications are generalized. A commutative semiring is a good framework for explaining this behavior. It is defined over a set K with operators "+" and "." where (K,+) and (K,.) are a commutative monoids and the distributive law holds.

Let p1,,pn be variables such that p1A1,,pnAn where A is a finite set and |Ai|=qi. Here i=1,,n. If S={i1,,ir} and S{1,,n}, let AS=Ai1××Air, pS=(pi1,,pir), qS=|AS|, 𝐀=A1××An, and 𝐩={p1,,pn}

Let S={Sj}j=1M where Sj{1,...,n}. Suppose a function is defined as αi:ASiR, where R is a commutative semiring. Also, pSi are named the local domains and αi as the local kernels.

Now the global kernel β:𝐀R is defined as : β(p1,...,pn)=i=1Mα(pSi)

Definition of MPF problem: For one or more indices i=1,...,M, compute a table of the values of Si-marginalization of the global kernel β, which is the function βi:ASiR defined as βi(pSi)=pSicASicβ(p)

Here Sic is the complement of Si with respect to {1,...,n} and the βi(pSi) is called the ith objective function, or the objective function at Si. It can observed that the computation of the ith objective function in the obvious way needs Mq1q2q3qn operations. This is because there are q1q2qn additions and (M1)q1q2...qn multiplications needed in the computation of the ith objective function. The GDL algorithm which is explained in the next section can reduce this computational complexity.

The following is an example of the MPF problem. Let p1,p2,p3,p4, and p5 be variables such that p1A1,p2A2,p3A3,p4A4, and p5A5. Here M=4 and S={{1,2,5},{2,4},{1,4},{2}}. The given functions using these variables are f(p1,p2,p5) and g(p3,p4) and we need to calculate α(p1,p4) and β(p2) defined as:

α(p1,p4)=p2A2,p3A3,p5A5f(p1,p2,p5)g(p2,p4)
β(p2)=p1A1,p3A3,p4A4,p5A5f(p1,p2,p5)g(p2,p4)

Here local domains and local kernels are defined as follows:

local domains local kernels
{p1,p2,p5} (f(p1,p2,p5)
{p2,p4} g(p2,p4)
{p1,p4} 1
{p2} 1

where α(p1,p4) is the 3rd objective function and β(p2) is the 4th objective function.

Consider another example where p1,p2,p3,p4,r1,r2,r3,r4{0,1} and f(r1,r2,r3,r4) is a real valued function. Now, we shall consider the MPF problem where the commutative semiring is defined as the set of real numbers with ordinary addition and multiplication and the local domains and local kernels are defined as follows:

local domains local kernels
{r1,r2,r3,r4} f(r1,r2,r3,r4)
{p1,r1} (1)p1r1
{p2,r2} (1)p2r2
{p3,r3} (1)p3r3
{p4,r4} (1)p4r4
{p1,p2,p3,p4} 1

Now since the global kernel is defined as the product of the local kernels, it is

F(p1,p2,p3,p4,r1,r2,r3,r4)=f(p1,p2,p3,p4)(1)p1r1+p2r2+p3r3+p4r4

and the objective function at the local domain p1,p2,p3,p4 is

F(p1,p2,p3,p4)=r1,r2,r3,r4f(r1,r2,r3,r4)(1)p1r1+p2r2+p3r3+p4r4.

This is the Hadamard transform of the function f(). Hence we can see that the computation of Hadamard transform is a special case of the MPF problem. More examples can be demonstrated to prove that the MPF problem forms special cases of many classical problem as explained above whose details can be found at[1]

GDL: an algorithm for solving the MPF problem

If one can find a relationship among the elements of a given set S, then one can solve the MPF problem basing on the notion of belief propagation which is a special use of "message passing" technique. The required relationship is that the given set of local domains can be organised into a junction tree. In other words, we create a graph theoretic tree with the elements of S as the vertices of the tree T, such that for any two arbitrary vertices say vi and vj where ij and there exists an edge between these two vertices, then the intersection of corresponding labels, viz SiSj, is a subset of the label on each vertex on the unique path from vi to vj.

For example,

Example 1: Consider the following nine local domains:

  1. {p2}
  2. {p3,p2}
  3. {p2,p1}
  4. {p3,p4}
  5. {p3}
  6. {p1,p4}
  7. {p1}
  8. {p4}
  9. {p2,p4}

For the above given set of local domains, one can organize them into a junction tree as shown below:

An example of a junction of tree
An example of a junction of tree

Similarly If another set like the following is given

Example 2: Consider the following four local domains:

  1. {p1,p2}
  2. {p2,p3}
  3. {p3,p4}
  4. {p1,p4}

Then constructing the tree only with these local domains is not possible since this set of values has no common domains which can be placed between any two values of the above set. But however, if add the two dummy domains as shown below then organizing the updated set into a junction tree would be possible and easy too.

5.{p1,p2,p4}
6.{p2,p3,p4}

Similarly for these set of domains, the junction tree looks like shown below:

Another example of a junction tree
Another example of a junction tree

Generalized distributive law (GDL) algorithm

Input: A set of local domains.
Output: For the given set of domains, possible minimum number of operations that is required to solve the problem is computed.
So, if vi and vj are connected by an edge in the junction tree, then a message from vi to vj is a set/table of values given by a function: μi,j:ASiSjR. To begin with all the functions i.e. for all combinations of i and j in the given tree, μi,j is defined to be identically 1 and when a particular message is update, it follows the equation given below.

μi,j(pSiSj) = pSiSjASiSjαi(pSi)vkadjvi,kjμk,j(pSkSi)(1)

where vkadjvi means that vk is an adjacent vertex to vi in tree.

Similarly each vertex has a state which is defined as a table containing the values from the function σi:ASiR, Just like how messages initialize to 1 identically, state of vi is defined to be local kernel α(pSi), but whenever σi gets updated, it follows the following equation:

σ(pSi)=αi(pSi)vkadjviμk,j(pSkSi)(2).

Basic working of the algorithm

For the given set of local domains as input, we find out if we can create a junction tree, either by using the set directly or by adding dummy domains to the set first and then creating the junction tree, if construction junction is not possible then algorithm output that there is no way to reduce the number of steps to compute the given equation problem, but once we have junction tree, algorithm will have to schedule messages and compute states, by doing these we can know where steps can be reduced, hence will be discusses this below.

Scheduling of the message passing and the state computation

There are two special cases we are going to talk about here namely Single Vertex Problem in which the objective function is computed at only one vertex v0 and the second one is All Vertices Problem where the goal is to compute the objective function at all vertices.

Lets begin with the single-vertex problem, GDL will start by directing each edge towards the targeted vertex v0. Here messages are sent only in the direction towards the targeted vertex. Note that all the directed messages are sent only once. The messages are started from the leaf nodes(where the degree is 1) go up towards the target vertex v0. The message travels from the leaves to its parents and then from there to their parents and so on until it reaches the target vertex v0. The target vertex v0 will compute its state only when it receives all messages from all its neighbors. Once we have the state, We have got the answer and hence the algorithm terminates.

For Example, let us consider a junction tree constructed from the set of local domains given above i.e. the set from example 1,
Now the Scheduling table for these domains is (where the target vertex is p2).

Round Message or State Computation
1.μ8,4(p4)=α8(p4)
2.μ8,4(p4)=Σp2α9(p2,p4)
3.μ5,2(p3)=α5(p3)
4.μ6,3(p1)=Σp4α6(p1,p4)
5.μ7,3(p1)=α7(p1)
6.μ4,2(p3)=Σp4α4(p3,p4).μ8,4(p4).μ9,4(p4)
7.μ3,1(p2)=Σp1α3(p2,p1).μ6,3(p1).μ7,3(p1)
8.μ2,1(p2)=Σp3α2(p3,p2).μ4,2(p3).μ5,2(p3)
9.σ1(p2)=α1(p2).μ2,1(p2).μ3,1(p2)

Thus the complexity for Single Vertex GDL can be shown as

Σvd(v)|AS(v)| arithmetic operations
Where (Note: The explanation for the above equation is explained later in the article )
S(v) is the label of v.
d(v) is the degree of v (i.e. number of vertices adjacent to v).

To solve the All-Vertices problem, we can schedule GDL in several ways, some of them are parallel implementation where in each round, every state is updated and every message is computed and transmitted at the same time. In this type of implementation the states and messages will stabilizes after number of rounds that is at most equal to the diameter of the tree. At this point all the all states of the vertices will be equal to the desired objective function.

Another way to schedule GDL for this problem is serial implementation where its similar to the Single vertex problem except that we don't stop the algorithm until all the vertices of a required set have not got all the messages from all their neighbors and have compute their state.
Thus the number of arithmetic this implementation requires is at most ΣvVd(v)|AS(v)| arithmetic operations.

Constructing a junction tree

The key to constructing a junction tree lies in the local domain graph GLD, which is a weighted complete graph with M vertices v1,v2,v3,,vM i.e. one for each local domain, having the weight of the edge ei,j:vivj defined by
ωi,j=|SiSj|.
if xkSiSj, then we say xk is contained inei,j. Denoted by ωmax (the weight of a maximal-weight spanning tree of GLD), which is defined by

ω*=Σi=1M|Si|n

where n is the number of elements in that set. For more clarity and details, please refer to these.[3][4]

Scheduling theorem

Let T be a junction tree with vertex set V and edge set E. In this algorithm, the messages are sent in both the direction on any edge, so we can say/regard the edge set E as set of ordered pairs of vertices. For example, from Figure 1 E can be defined as follows

E={(1,2),(2,1),(1,3),(3,1),(4,2),(2,4),(5,2),(2,5),(6,3),(3,6),(7,3),(3,7),(8,4),(4,8),(9,4),(4,9)}

NOTE:E above gives you all the possible directions that a message can travel in the tree.

The schedule for the GDL is defined as a finite sequence of subsets ofE. Which is generally represented by ={E1,E2,E3,,EN}, Where EN is the set of messages updated during the Nth round of running the algorithm.

Having defined/seen some notations, we will see want the theorem says, When we are given a schedule ={E1,E2,E3,,EN}, the corresponding message trellis as a finite directed graph with Vertex set of V×{0,1,2,3,,N}, in which a typical element is denoted by vi(t) for t{0,1,2,3,,N}, Then after completion of the message passing, state at vertex vj will be the jth objective defined in

σ(pSi)=αi(pSi)vkadjviμk,j(pSkSi)

and iff there is a path from vi(0) to vj(N)

Computational complexity

Here we try to explain the complexity of solving the MPF problem in terms of the number of mathematical operations required for the calculation. i.e. We compare the number of operations required when calculated using the normal method (Here by normal method we mean by methods that do not use message passing or junction trees in short methods that do not use the concepts of GDL)and the number of operations using the generalized distributive law.

Example: Consider the simplest case where we need to compute the following expression ab+ac.

To evaluate this expression naively requires two multiplications and one addition. The expression when expressed using the distributive law can be written as a(b+c) a simple optimization that reduces the number of operations to one addition and one multiplication.

Similar to the above explained example we will be expressing the equations in different forms to perform as few operation as possible by applying the GDL.

As explained in the previous sections we solve the problem by using the concept of the junction trees. The optimization obtained by the use of these trees is comparable to the optimization obtained by solving a semi group problem on trees. For example, to find the minimum of a group of numbers we can observe that if we have a tree and the elements are all at the bottom of the tree, then we can compare the minimum of two items in parallel and the resultant minimum will be written to the parent. When this process is propagated up the tree the minimum of the group of elements will be found at the root.

The following is the complexity for solving the junction tree using message passing

We rewrite the formula used earlier to the following form. This is the eqn for a message to be sent from vertex v to w

μv,w(pvw)=pvwAS(v)S(w)αv(pv)uadjvuvμu,v(puv) ----message equation

Similarly we rewrite the equation for calculating the state of vertex v as follows

σv(pv)=αv(pv)uadjvμv,w(pvw)

We first will analyze for the single-vertex problem and assume the target vertex is v0 and hence we have one edge from v to v0. Suppose we have an edge (v,w) we calculate the message using the message equation. To calculate puv requires

qvw1

additions and

qvw(d(v)1)

multiplications.

(We represent the |AS(v) S(w)| as qvw.)

But there will be many possibilities for xvw hence
qvw=def|AS(v)S(w)| possibilities for pvw. Thus the entire message will need

(qvw)(qvw1)=qvqvw

additions and

(qvw)qvw.(d(v)1)=(d(v)1)qv

multiplications

The total number of arithmetic operations required to send a message towards v0along the edges of tree will be

vv0(qvqvw)

additions and

vv0(d(v)1)qv

multiplications.

Once all the messages have been transmitted the algorithm terminates with the computation of state at v0 The state computation requires d(v0)q0 more multiplications. Thus number of calculations required to calculate the state is given as below

vv0(qvqvw)

additions and

vv0(d(v)1)qv+d(v0)qv0

multiplications

Thus the grand total of the number of calculations is

χ(T)=vVd(v)qveEqe ----(1)

where e=(v,w) is an edge and its size is defined by qvw

The formula above gives us the upper bound.

If we define the complexity of the edge e=(v,w) as

χ(e)=qv+qwqvw

Therefore, (1) can be written as

χ(T)=eEχ(e)

We now calculate the edge complexity for the problem defined in Figure 1 as follows

χ(1,2)=q2+q2q3q2
χ(2,4)=q3q4+q2q3q3
χ(2,5)=q3+q2q3q3
χ(4,8)=q4+q3q4q4
χ(4,9)=q2q4+q3q4q4
χ(1,3)=q2+q2q1q2
χ(3,7)=q1+q1q2q1
χ(3,6)=q1q4+q1q2q1

The total complexity will be 3q2q3+3q3q4+3q1q2+q2q4+q1q4q1q3q4 which is considerably low compared to the direct method. (Here by direct method we mean by methods that do not use message passing. The time taken using the direct method will be the equivalent to calculating message at each node and time to calculate the state of each of the nodes.)

Now we consider the all-vertex problem where the message will have to be sent in both the directions and state must be computed at both the vertexes. This would take O(vd(v)d(v)qv) but by precomputing we can reduce the number of multiplications to 3(d2). Here d is the degree of the vertex. Ex : If there is a set (a1,,ad) with d numbers. It is possible to compute all the d products of d1 of the ai with at most 3(d2) multiplications rather than the obvious d(d2). We do this by precomputing the quantities b1=a1,b2=b1a2=a1a2,bd1=bd2ad1=a1a2ad1 and cd=ad,cd1=ad1cd=ad1ad,,c2=a2c3=a2a3ad this takes 2(d2) multiplications. Then if mj denotes the product of all ai except for aj we have m1=c2,m2=b1c3 and so on will need another d2 multiplications making the total 3(d2)

There is not much we can do when it comes to the construction of the junction tree except that we may have many maximal weight spanning tree and we should choose the spanning tree with the least χ(T) and sometimes this might mean adding a local domain to lower the junction tree complexity.

It may seem that GDL is correct only when the local domains can be expressed as a junction tree. But even in cases where there are cycles and a number of iterations the messages will approximately be equal to the objective function. The experiments on Gallager–Tanner–Wiberg algorithm for low density parity-check codes were supportive of this claim.


References

  1. 1.0 1.1 1.2 Aji, S.M.; McEliece, R.J. (Mar 2000). "The generalized distributive law". IEEE Transactions on Information Theory 46 (2): 325–343. doi:10.1109/18.825794. https://authors.library.caltech.edu/1541/1/AJIieeetit00.pdf. 
  2. "distributive law". Encyclopædia Britannica. Encyclopædia Britannica Online. Encyclopædia Britannica Inc. http://www.britannica.com/EBchecked/topic/166204/distributive-law. Retrieved 1 May 2012. 
  3. "Archived copy". Archived from the original on 2015-03-19. https://web.archive.org/web/20150319085443/https://ai.stanford.edu/~paskin/gm-short-course/lec3.pdf. Retrieved 2015-03-19.  The Junction Tree Algorithms
  4. http://www-anw.cs.umass.edu/~cs691t/SS02/lectures/week7.PDF The Junction Tree Algorithm