stable sparse interpolation with fewer samples
play

Stable Sparse Interpolation with Fewer Samples Daniel S. Roche - PowerPoint PPT Presentation

Set-Up Ingredients Our Algorithm Stable Sparse Interpolation with Fewer Samples Daniel S. Roche United States Naval Academy joint work with Mark Giesbrecht University of Waterloo Fields Workshop on Hybrid Methodologies for Symbolic-Numeric


  1. Set-Up Ingredients Our Algorithm Stable Sparse Interpolation with Fewer Samples Daniel S. Roche United States Naval Academy joint work with Mark Giesbrecht University of Waterloo Fields Workshop on Hybrid Methodologies for Symbolic-Numeric Computation November 18, 2011 1 / 16

  2. Set-Up Ingredients Our Algorithm The Problem Unknown Input Approximation to f ( θ ) Output Exact θ ∈ C Function What f ( x ) = c 1 x d 1 + · · · + c t x d t is in here? What’s in here? 2 / 16

  3. Set-Up Ingredients Our Algorithm The Problem Unknown Input Approximation to f ( θ ) Output Exact θ ∈ C Function What f ( x ) = c 1 x d 1 + · · · + c t x d t is in here? What’s in here? Algorithm input: The black box Algorithm output: The unknown function 2 / 16

  4. Set-Up Ingredients Our Algorithm The Problem Unknown Input Approximation to f ( θ ) Output Exact θ ∈ C Function What f ( x ) = c 1 x d 1 + · · · + c t x d t is in here? What sparse polynomial is in here? Algorithm input: Black box for a sparse polynomial Algorithm output: Approximation to the hidden polynomial 2 / 16

  5. Set-Up Ingredients Our Algorithm The Problem Unknown Approximation to f ( θ ) Exact θ ∈ C Function What f ( x ) = c 1 x d 1 + · · · + c t x d t is in here? 1 ≤ i ≤ t a i x d i Algorithm input: Way to evaluate f ( x ) = � Bounds D ≥ d i and T ≥ t Algorithm output: Exponents d 1 , . . . , d t Coefficients c 1 , . . . , c t 2 / 16

  6. Set-Up Ingredients Our Algorithm Problem is Inherently Symbolic-Numeric! Exact Approximate Input Bounds Evaluations Output Exponents Coefficients 3 / 16

  7. Set-Up Ingredients Our Algorithm Factors Influencing Complexity • Sparsity (number of nonzero terms) • Degree (largest exponent) • Precision (error in evaluations) Our interest is in the hardest case: High sparsity, high degree, low precision We want to minimize the number of probes and the post-processing cost. 4 / 16

  8. Set-Up Ingredients Our Algorithm de Prony’s Method Algorithm to interpolate exponential sums. Involves structured linear system solving, polynomial root finding, and computing logarithms. Much attention in recent years: • Ben-Or & Tiwari (’88) • Kaltofen & Lakshman (’89) • Kaltofen, Lakshman, Wiley (’90) • Kaltofen, Yang, Zhi (’07) • Cuyt & Lee (’08) • Giesbrecht, Labahn, Lee (’09) 5 / 16

  9. Set-Up Ingredients Our Algorithm Properties of de Prony’s method Drawbacks • Not numerically stable • Requires high precision • (Discrete logarithms?) Advantages • Fewest number of evaluations: O ( t ) • Numerical stability can be helped with randomization 6 / 16

  10. Set-Up Ingredients Our Algorithm Degree Reduction Basic Idea : Given a sparse polynomial’s black box, choose evaluations carefully to simulate a lower-degree polynomial Typically, we get f mod ( x p − 1) or f mod ( x p − 1 − 1) . Some appearances: • Bl¨ aser, Hardt, Lipton, Vishnoi (’09) • Garg & Schost (’09) • G. & R. (’10) 7 / 16

  11. Set-Up Ingredients Our Algorithm Garg & Schost’s Algorithm Consider (unknown) f = c 1 x e 1 + c 2 x e 2 + · · · + c t x e t . Idea : Evaluate f mod x p − 1 for a small prime p . This gives f p = c 1 x e 1 mod p + c 2 x e 2 mod p + · · · + c t x e t mod p . If p is “good”, then every e i mod p is distinct, and we have every coefficient and an unordered set { e i mod p | 1 ≤ i ≤ t } . Problem : How to correlate terms between different evaluations? 8 / 16

  12. Set-Up Ingredients Our Algorithm Garg & Schost’s Algorithm Consider (unknown) f = c 1 x e 1 + c 2 x e 2 + · · · + c t x e t . Idea : Evaluate f mod x p − 1 for a small prime p . This gives f p = c 1 x e 1 mod p + c 2 x e 2 mod p + · · · + c t x e t mod p . If p is “good”, then every e i mod p is distinct, and we have every coefficient and an unordered set { e i mod p | 1 ≤ i ≤ t } . Problem : How to correlate terms between different evaluations? Consider the symmetric polynomial whose roots are the exponents: Γ ( z ) = ( z − e 1 )( z − e 2 ) · · · ( z − e t ) ∈ Z [ z ] . Coefficients of Γ have Θ ( t log d ) bits, so we need this many “good prime” evaluations. Then we must find the integer roots of Γ . 8 / 16

  13. Set-Up Ingredients Our Algorithm Making Garg & Schost Numeric The previous algorithm was for finite fields. For other domains, we need a way to compute f mod ( x p − 1) for a chosen p . This is easy in C : Evaluate f (1) , f ( ω ) , . . . , f ( ω p − 1 ) for ω a p -PRU. Using the FFT, this is perfectly numerically stable! Essentially, we are oversampling to get the best stability. 9 / 16

  14. Set-Up Ingredients Our Algorithm Diversification Goal : Avoid the need for computing the symmetric polynomial from Garg & Schost. • Define diverse polynomial as one with pairwise-distinct coefficients. • If α is a random element (of a certain domain), f ( α x ) is diverse w.h.p. • We can of course recover f ( x ) from f ( α x ) . Result: Cost (number of probes and post-processing) reduced from O ( t 4 log 2 d ) down to O ( t 2 log 2 d ) . 10 / 16

  15. Set-Up Ingredients Our Algorithm WARNING This is work in progress! 11 / 16

  16. Set-Up Ingredients Our Algorithm Improving on Diversification O ( t 2 log 2 d ) is an improvement from Garg & Schost, but quadratically more probes than de Prony. New idea — Use the old idea! Embed de Prony’s method inside our Garg & Schost-like method. Instead of computing f (1) , f ( ω ) , . . . f ( ω p − 1 ) and using FFT, we compute f (1) , f ( ω ) , . . . , f ( ω 2 t − 1 ) and use de Prony. 12 / 16

  17. Set-Up Ingredients Our Algorithm Diversifying the Exponents • Need ω d 1 , ω d 2 , . . . , ω d t to be sufficiently separated. Equivalent mod p Bad choice of p or p -PRU ω : Too close 13 / 16

  18. Set-Up Ingredients Our Algorithm Diversifying the Exponents • Need ω d 1 , ω d 2 , . . . , ω d t to be sufficiently separated. p sufficiently large, ω random p -PRU: 13 / 16

  19. Set-Up Ingredients Our Algorithm Diversifying the Coefficients • Need c 1 , c 2 , . . . , c t to be sufficiently distinct — impossible! Not diverse: 14 / 16

  20. Set-Up Ingredients Our Algorithm Diversifying the Coefficients • Need c 1 ζ e 1 , c 2 ζ e 2 , . . . , c t ζ e t to be sufficiently distinct Bad choice of ζ : 14 / 16

  21. Set-Up Ingredients Our Algorithm Diversifying the Coefficients • Need c 1 ζ e 1 , c 2 ζ e 2 , . . . , c t ζ e t to be sufficiently distinct Good choice of ζ : 14 / 16

  22. Set-Up Ingredients Our Algorithm Overview of Combined Algorithm 1 Choose prime s ∈ O ( t 2 ) and random s -PRU ζ 2 Choose prime p ∈ O ( t 2 log d ) and random p -PRU ω 3 Evaluate f (1) , f ( ζω ) , f ( ζ 2 ω 2 ) , . . . f ( ζ 2 t − 1 ω 2 t − 1 ) 4 Recover f ( ζ x ) mod ( x p − 1) using de Prony’s method 5 Correlate coefficients with exponent residues modulo p 6 Repeat Steps 2–5 O (log d ) times 7 Recover exponents from modular residues by Chinese remaindering 15 / 16

  23. Set-Up Ingredients Our Algorithm Overview of Combined Algorithm 1 Choose prime s ∈ O ( t 2 ) and random s -PRU ζ 2 Choose prime p ∈ O ( t 2 log d ) and random p -PRU ω 3 Evaluate f (1) , f ( ζω ) , f ( ζ 2 ω 2 ) , . . . f ( ζ 2 t − 1 ω 2 t − 1 ) 4 Recover f ( ζ x ) mod ( x p − 1) using de Prony’s method 5 Correlate coefficients with exponent residues modulo p 6 Repeat Steps 2–5 O (log d ) times 7 Recover exponents from modular residues by Chinese remaindering These are the randomization steps. 15 / 16

  24. Set-Up Ingredients Our Algorithm Results Sparse interpolation algorithm featuring • O ( t log d ) probes at (nearly) fixed precision — optimal in terms of total bit length • O ˜( t 2 log d ) post-processing cost Requires low precision, even at high degrees, and with as few probes as possible. 16 / 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend