3.26pt Randomized Projections for Corrupted Linear Systems Jamie - - PowerPoint PPT Presentation

3 26pt randomized projections for corrupted linear systems
SMART_READER_LITE
LIVE PREVIEW

3.26pt Randomized Projections for Corrupted Linear Systems Jamie - - PowerPoint PPT Presentation

3.26pt Randomized Projections for Corrupted Linear Systems Jamie Haddock 1 , Deanna Needell 2 1 Graduate Group in Applied Mathematics, University of California, Davis 2 Department of Mathematics, University of California, Los Angeles


slide-1
SLIDE 1

3.26pt

slide-2
SLIDE 2

Randomized Projections for Corrupted Linear Systems

Jamie Haddock1, Deanna Needell2

1Graduate Group in Applied Mathematics, University of California, Davis 2Department of Mathematics, University of California, Los Angeles

jhaddock@math.ucdavis.edu January 28, 2018

slide-3
SLIDE 3

Problem

Solve large-scale, highly overdetermined, corrupted system of equations for solution to uncorrupted subsystem.

1

slide-4
SLIDE 4

Problem

Solve large-scale, highly overdetermined, corrupted system of equations for solution to uncorrupted subsystem. Problem: Ax = b + e, A ∈ Rm×n, m >> n (Corrupted) Error (e): sparse, arbitrarily large entries Solution (x∗): x∗ ∈ {x : Ax = b}

1

slide-5
SLIDE 5

Problem

Solve large-scale, highly overdetermined, corrupted system of equations for solution to uncorrupted subsystem. Problem: Ax = b + e, A ∈ Rm×n, m >> n (Corrupted) Error (e): sparse, arbitrarily large entries Solution (x∗): x∗ ∈ {x : Ax = b} Applications: logic programming, error correction in telecommunications

1

slide-6
SLIDE 6

Problem

Solve large-scale, highly overdetermined, corrupted system of equations for solution to uncorrupted subsystem. Problem: Ax = b + e, A ∈ Rm×n, m >> n (Corrupted) Error (e): sparse, arbitrarily large entries Solution (x∗): x∗ ∈ {x : Ax = b} Applications: logic programming, error correction in telecommunications Problem: Ax = b + e, A ∈ Rm×n, m >> n (Noisy) Error (e): small, evenly distributed entries Solution (xLS): xLS ∈ argminAx − b − e2

1

slide-7
SLIDE 7

Why not least-squares?

x∗ xLS

2

slide-8
SLIDE 8

Randomized Kaczmarz

RK

  • 1. Start with initial guess x0
  • 2. xk+1 = xk +

bik −aT

ik xk

aik 2 aik where ik ∈ [m] is chosen randomly

  • 3. Repeat (2)

x x0

3

slide-9
SLIDE 9

Randomized Kaczmarz

RK

  • 1. Start with initial guess x0
  • 2. xk+1 = xk +

bik −aT

ik xk

aik 2 aik where ik ∈ [m] is chosen randomly

  • 3. Repeat (2)

x x0 x1

3

slide-10
SLIDE 10

Randomized Kaczmarz

RK

  • 1. Start with initial guess x0
  • 2. xk+1 = xk +

bik −aT

ik xk

aik 2 aik where ik ∈ [m] is chosen randomly

  • 3. Repeat (2)

x x0 x1 x2

3

slide-11
SLIDE 11

Randomized Kaczmarz

RK

  • 1. Start with initial guess x0
  • 2. xk+1 = xk +

bik −aT

ik xk

aik 2 aik where ik ∈ [m] is chosen randomly

  • 3. Repeat (2)

x x0 x1 x2 x3

3

slide-12
SLIDE 12

Randomized Kaczmarz

RK

  • 1. Start with initial guess x0
  • 2. xk+1 = xk +

bik −aT

ik xk

aik 2 aik where ik ∈ [m] is chosen randomly

  • 3. Repeat (2)

Theorem (Strohmer-Vershynin, 2008) If Ax = b is consistent and RK is used with P[ik = j] = aj2/A2

F then

iterates converge linearly in expectation with Exk − x2 ≤

  • 1 −

1 A2

FA−12

k x0 − x2.

4

slide-13
SLIDE 13

Proposed Method

Goal: Use RK to detect the corrupted equations with high probability.

5

slide-14
SLIDE 14

Proposed Method

Goal: Use RK to detect the corrupted equations with high probability. Lemma (H.-Needell) Let ǫ∗ = mini∈[m] |Ax∗ − b|i = |ei| and suppose |supp(e)| = s. If ||ai|| = 1 for i ∈ [m] and ||x − x∗|| < 1

2ǫ∗ we have that the d ≤ s indices

  • f largest magnitude residual entries are contained in supp(e). That is,

we have D ⊂ supp(e), where D = argmax

D⊂[A],|D|=d

  • i∈D

|Ax − b|i.

5

slide-15
SLIDE 15

Proposed Method

Goal: Use RK to detect the corrupted equations with high probability. x∗ xk

5

slide-16
SLIDE 16

Proposed Method

Goal: Use RK to detect the corrupted equations with high probability. x∗ xk We call ǫ∗/2 the detection horizon.

5

slide-17
SLIDE 17

Proposed Method

Method 1 Windowed Kaczmarz

1: procedure WK(A, b, k, W , d) 2:

S = ∅

3:

for i = 1, 2, ...W do

4:

xi

k = kth iterate produced by RK with x0 = 0, A, b.

5:

D = d indices of the largest entries of the residual, |Axi

k − b|.

6:

S = S ∪ D

7:

return x, where ASC x = bSC

6

slide-18
SLIDE 18

Example

WK(A,b,k = 2,W = 3,d = 1): j = 1, i = 1, S = ∅ x∗ x1 H1 H2 H3 H4 H5 H6 H7

7

slide-19
SLIDE 19

Example

WK(A,b,k = 2,W = 3,d = 1): j = 1, i = 1, S = ∅ x∗ x1 x1

1

H1 H2 H3 H4 H5 H6 H7

7

slide-20
SLIDE 20

Example

WK(A,b,k = 2,W = 3,d = 1): j = 2, i = 1, S = {7} x∗ x1 x1

1

x1

2

H1 H2 H3 H4 H5 H6 H7

7

slide-21
SLIDE 21

Example

WK(A,b,k = 2,W = 3,d = 1): j = 1, i = 2, S = {7} x∗ x2 H1 H2 H3 H4 H5 H6 H7

7

slide-22
SLIDE 22

Example

WK(A,b,k = 2,W = 3,d = 1): j = 1, i = 2, S = {7} x∗ x2 H1 H2 H3 H4 H5 H6 H7 x2

1 7

slide-23
SLIDE 23

Example

WK(A,b,k = 2,W = 3,d = 1): j = 2, i = 2, S = {7, 5} x∗ x2 H1 H2 H3 H4 H5 H6 H7 x2

1

x2

2 7

slide-24
SLIDE 24

Example

WK(A,b,k = 2,W = 3,d = 1): j = 1, i = 3, S = {7, 5} x∗ x3 H1 H2 H3 H4 H5 H6 H7

7

slide-25
SLIDE 25

Example

WK(A,b,k = 2,W = 3,d = 1): j = 1, i = 3, S = {7, 5} x∗ x3 H1 H2 H3 H4 H5 H6 H7 x3

1 7

slide-26
SLIDE 26

Example

WK(A,b,k = 2,W = 3,d = 1): j = 2, i = 3, S = {7, 5, 6} x∗ x3 H1 H2 H3 H4 H5 H6 H7 x3

1

x3

2 7

slide-27
SLIDE 27

Example

Solve ASC x = bSC . x∗ H1 H2 H3 H4

7

slide-28
SLIDE 28

Theoretical Guarantees

Lemma (H.-Needell) Let ǫ∗ = mini∈[m] |Ax∗ − b|i = |ei| and suppose |supp(e)| = s. Assume that ||ai|| = 1 for all i ∈ [m] and let 0 < δ < 1. Define k∗ =

  • log
  • δ(ǫ∗)2

4||x∗||2

  • log
  • 1 −

σ2

min(Asupp(e)C )

m−s

  • .

Then in window i of the Windowed Kaczmarz method, the iterate produced by the RK iterations, xi

k∗ satisfies

P

  • ||xi

k∗ − x∗|| ≤ 1

2ǫ∗ ≥ p := (1 − δ) m − s m k∗ .

8

slide-29
SLIDE 29

Theoretical Guarantee Values (Gaussian A ∈ R50000×100)

k∗ =

  • log
  • δ(ǫ∗)2

4||x∗||2

  • log
  • 1−

σ2 min(Asupp(e)C ) m−s

  • 9
slide-30
SLIDE 30

Theoretical Guarantee Values (Correlated A ∈ R50000×100)

k∗ =

  • log
  • δ(ǫ∗)2

4||x∗||2

  • log
  • 1−

σ2 min(Asupp(e)C ) m−s

  • 10
slide-31
SLIDE 31

Theoretical Guarantee Values (Gaussian A ∈ R50000×100)

P

  • ||xi

k∗ − x∗|| ≤ 1 2ǫ∗

≥ p := (1 − δ)

  • m−s

m

k∗

0.2 0.4 0.6 0.8 1 0.2 0.4 0.6 0.8 1

p

s = 1 s = 10 s = 50 s = 100 s = 200 s = 300 s = 400 11

slide-32
SLIDE 32

Theoretical Guarantee Values (Correlated A ∈ R50000×100)

P

  • ||xi

k∗ − x∗|| ≤ 1 2ǫ∗

≥ p := (1 − δ)

  • m−s

m

k∗

12

slide-33
SLIDE 33

Theoretical Guarantees

Theorem (H.-Needell) Assume that ||ai|| = 1 for all i ∈ [m] and let 0 < δ < 1. Suppose d ≥ s = |supp(e)|, W ≤ ⌊ m−n

d ⌋ and k∗ is as given in lemma 2. Then the

Windowed Kaczmarz method on A, b will detect the corrupted equations (supp(e) ⊂ S) and the remaining equations given by A[m]−S, b[m]−S will have solution x∗ with probability at least pW := 1 −

  • 1 − (1 − δ)

m − s m k∗W .

13

slide-34
SLIDE 34

Theoretical Guarantee Values (Gaussian A ∈ R50000×100)

pW := 1 −

  • 1 − (1 − δ)
  • m−s

m

k∗W

0.2 0.4 0.6 0.8 1 0.2 0.4 0.6 0.8 1

pW

s = 1 s = 10 s = 50 s = 100 s = 200 s = 300 s = 400 14

slide-35
SLIDE 35

Experimental Values (Gaussian A ∈ R50000×100)

0.2 0.4 0.6 0.8 1 0.4 0.5 0.6 0.7 0.8 0.9 1

Success ratio

s = 100 s = 200 s = 500 s = 750 s = 1000

15

slide-36
SLIDE 36

Experimental Values (Gaussian A ∈ R50000×100)

500 1000 1500 2000

k

0.2 0.4 0.6 0.8 1

Success ratio

s = 100 s = 200 s = 500 s = 750 s = 1000

16

slide-37
SLIDE 37

Experimental Values (Gaussian A ∈ R50000×100)

17

slide-38
SLIDE 38

Experimental Values (Gaussian A ∈ R50000×100)

18

slide-39
SLIDE 39

Theoretical Guarantee Values (Correlated A ∈ R50000×100)

pW := 1 −

  • 1 − (1 − δ)
  • m−s

m

k∗W

19

slide-40
SLIDE 40

Experimental Values (Correlated A ∈ R50000×100)

20

slide-41
SLIDE 41

Experimental Values (Correlated A ∈ R50000×100)

21

slide-42
SLIDE 42

Conclusions and Future Work

  • randomized projection methods are able to detect corruption
  • often experimental results far outperform theoretical guarantees
  • performance on real data
  • reduce dependence on artificial parameters

22

slide-43
SLIDE 43

The End

Thanks! Questions?

  • E. Amaldi, P. Belotti, and R. Hauser.

Randomized relaxation methods for the maximum feasible subsystem problem. In International Conference on Integer Programming and Combinatorial Optimization, pages 249–264. Springer, 2005.

  • N. Jamil, X. Chen, and A. Cloninger.

Hildreths algorithm with applications to soft constraints for user interface layout. Journal of Computational and Applied Mathematics, 288:193–202, 2015.

  • S. Kaczmarz.

Angen¨ aherte aufl¨

  • sung von systemen linearer gleichungen.

Bull.Internat.Acad.Polon.Sci.Lettres A, pages 335–357, 1937.

  • T. Strohmer and R. Vershynin.

A randomized Kaczmarz algorithm with exponential convergence. Journal of Fourier Analysis and Applications, 15(2):262–278, 2009.

23