Generalized distributive law explained

The generalized distributive law (GDL) is a generalization of the distributive property which gives rise to a general message passing algorithm.[1] It is a synthesis of the work of many authors in the information theory, digital communications, signal processing, statistics, and artificial intelligence communities. The law and algorithm were introduced in a semi-tutorial by Srinivas M. Aji and Robert J. McEliece with the same title.

Introduction

"The distributive law in mathematics is the law relating the operations of multiplication and addition, stated symbolically,

a*(b+c)=a*b+a*c

; that is, the monomial factor

a

is distributed, or separately applied, to each term of the binomial factor

b+c

, resulting in the product

a*b+a*c

" - Britannica[2]

As it can be observed from the definition, application of distributive law to an arithmetic expression reduces the number of operations in it. In the previous example the total number of operations reduced from three (two multiplications and an addition in

a*b+a*c

) to two (one multiplication and one addition in

a*(b+c)

). Generalization of distributive law leads to a large family of fast algorithms. This includes the FFT and Viterbi algorithm.

This is explained in a more formal way in the example below:

\alpha(a,b)\stackrel{def

} \displaystyle\sum \limits_ f(a, \, c, \, b) \, g(a, \, d, \, e) where

f()

and

g()

are real-valued functions,

a,b,c,d,e\inA

and

|A|=q

(say)

Here we are "marginalizing out" the independent variables (

c

,

d

, and

e

) to obtain the result. When we are calculating the computational complexity, we can see that for each

q2

pairs of

(a,b)

, there are

q3

terms due to the triplet

(c,d,e)

which needs to take part in the evaluation of

\alpha(a,b)

with each step having one addition and one multiplication. Therefore, the total number of computations needed is

2 ⋅ q2q3=2q5

. Hence the asymptotic complexity of the above function is

O(n5)

.

If we apply the distributive law to the RHS of the equation, we get the following:

\alpha(a,b)\stackrel{def

} \displaystyle\sum\limits_ f(a, \, c, \, b) \cdot \sum _ g(a,\,d,\,e)

This implies that

\alpha(a,b)

can be described as a product

\alpha1(a,b)\alpha2(a)

where

\alpha1(a,b)\stackrel{def

} \displaystyle\sum\limits_ f(a, \, c, \, b) and

\alpha2(a)\stackrel{def

} \displaystyle\sum\limits_ g(a,\, d, \,e)

Now, when we are calculating the computational complexity, we can see that there are

q3

additions in

\alpha1(a,b)

and

\alpha2(a)

each and there are

q2

multiplications when we are using the product

\alpha1(a,b)\alpha2(a)

to evaluate

\alpha(a,b)

. Therefore, the total number of computations needed is

q3+q3+q2=2q3+q2

. Hence the asymptotic complexity of calculating

\alpha(a,b)

reduces to

O(n3)

from

O(n5)

. This shows by an example that applying distributive law reduces the computational complexity which is one of the good features of a "fast algorithm".

History

Some of the problems that used distributive law to solve can be grouped as follows

1. Decoding algorithms
A GDL like algorithm was used by Gallager's for decoding low density parity-check codes. Based on Gallager's work Tanner introduced the Tanner graph and expressed Gallagers work in message passing form. The tanners graph also helped explain the Viterbi algorithm.

It is observed by Forney that Viterbi's maximum likelihood decoding of convolutional codes also used algorithms of GDL-like generality.

2. Forward-backward algorithm
The forward backward algorithm helped as an algorithm for tracking the states in the Markov chain. And this also was used the algorithm of GDL like generality

3. Artificial intelligence
The notion of junction trees has been used to solve many problems in AI. Also the concept of bucket elimination used many of the concepts.

The MPF problem

MPF or marginalize a product function is a general computational problem which as special case includes many classical problems such as computation of discrete Hadamard transform, maximum likelihood decoding of a linear code over a memory-less channel, and matrix chain multiplication. The power of the GDL lies in the fact that it applies to situations in which additions and multiplications are generalized.A commutative semiring is a good framework for explaining this behavior. It is defined over a set

K

with operators "

+

" and "

.

" where

(K,+)

and

(K,.)

are a commutative monoids and the distributive law holds.

Let

p1,\ldots,pn

be variables such that

p1\inA1,\ldots,pn\inAn

where

A

is a finite set and

|Ai|=qi

. Here

i=1,\ldots,n

. If

S=\{i1,\ldots,ir\}

and

S\subset\{1,\ldots,n\}

, let

AS=

A
i1

x x

A
ir

,

pS=

(p
i1

,\ldots,

p
ir

)

,

qS=|AS|

,

A=A1 x x An

, and

p=\{p1,\ldots,pn\}

Let

S=\{Sj

M
\}
j=1
where

Sj\subset\{1,...,n\}

. Suppose a function is defined as

\alphai:

A
Si

R

, where

R

is a commutative semiring. Also,
p
Si
are named the local domains and

\alphai

as the local kernels.

Now the global kernel

\beta:AR

is defined as :

\beta(p1,...,pn)=

M
\prod
i=1
\alpha(p
Si

)

Definition of MPF problem: For one or more indices

i=1,...,M

, compute a table of the values of

Si

-marginalization of the global kernel

\beta

, which is the function

\betai

:A
Si

R

defined as

\betai

(p
Si

)=

\displaystyle\sum\limits
p\in
A
c
S
i
c
S
i

\beta(p)

Here

c
S
i
is the complement of

Si

with respect to

\{1,...,n\}

and the

\betai(p

Si

)

is called the

ith

objective function, or the objective function at

Si

. It can observed that the computation of the

ith

objective function in the obvious way needs

Mq1q2q3 … qn

operations. This is because there are

q1q2 … qn

additions and

(M-1)q1q2...qn

multiplications needed in the computation of the

ith

objective function. The GDL algorithm which is explained in the next section can reduce this computational complexity.

The following is an example of the MPF problem. Let

p1,p2,p3,p4,

and

p5

be variables such that

p1\inA1,p2\inA2,p3\inA3,p4\inA4,

and

p5\inA5

. Here

M=4

and

S=\{\{1,2,5\},\{2,4\},\{1,4\},\{2\}\}

. The given functions using these variables are

f(p1,p2,p5)

and

g(p3,p4)

and we need to calculate

\alpha(p1,p4)

and

\beta(p2)

defined as:

\alpha(p1,p4)=

\displaystyle\sum\limits
p2\inA2,p3\inA3,p5\inA5

f(p1,p2,p5)g(p2,p4)

\beta(p2)=

\sum\limits
p1\inA1,p3\inA3,p4\inA4,p5\inA5

f(p1,p2,p5)g(p2,p4)

Here local domains and local kernels are defined as follows:

local domains local kernels

\{p1,p2,p5\}

(f(p1,p2,p5)

\{p2,p4\}

g(p2,p4)

\{p1,p4\}

1

\{p2\}

1

where

\alpha(p1,p4)

is the

3rd

objective function and

\beta(p2)

is the

4th

objective function.

Consider another example where

p1,p2,p3,p4,r1,r2,r3,r4\in\{0,1\}

and

f(r1,r2,r3,r4)

is a real valued function. Now, we shall consider the MPF problem where the commutative semiring is defined as the set of real numbers with ordinary addition and multiplication and the local domains and local kernels are defined as follows:
local domains local kernels

\{r1,r2,r3,r4\}

f(r1,r2,r3,r4)

\{p1,r1\}

p1r1
(-1)

\{p2,r2\}

p2r2
(-1)

\{p3,r3\}

p3r3
(-1)

\{p4,r4\}

p4r4
(-1)

\{p1,p2,p3,p4\}

1

Now since the global kernel is defined as the product of the local kernels, it is

F(p1,p2,p3,p4,r1,r2,r3,r4)=f(p1,p2,p3,p

p1r1+p2r2+p3r3+p4r4
4)(-1)

and the objective function at the local domain

p1,p2,p3,p4

is

F(p1,p2,p3,p4)=\displaystyle\sum

\limits
r1,r2,r3,r4

f(r1,r2,r3,r4)

p1r1+p2r2+p3r3+p4r4
(-1)

.

This is the Hadamard transform of the function

f()

. Hence we can see that the computation of Hadamard transform is a special case of the MPF problem. More examples can be demonstrated to prove that the MPF problem forms special cases of many classical problem as explained above whose details can be found at

GDL: an algorithm for solving the MPF problem

If one can find a relationship among the elements of a given set

S

, then one can solve the MPF problem basing on the notion of belief propagation which is a special use of "message passing" technique. The required relationship is that the given set of local domains can be organised into a junction tree. In other words, we create a graph theoretic tree with the elements of

S

as the vertices of the tree

T

, such that for any two arbitrary vertices say

vi

and

vj

where

ij

and there exists an edge between these two vertices, then the intersection of corresponding labels, viz

Si\capSj

, is a subset of the label on each vertex on the unique path from

vi

to

vj

.

For example,

Example 1: Consider the following nine local domains:

\{p2\}

\{p3,p2\}

\{p2,p1\}

\{p3,p4\}

\{p3\}

\{p1,p4\}

\{p1\}

\{p4\}

\{p2,p4\}

For the above given set of local domains, one can organize them into a junction tree as shown below:

Similarly If another set like the following is given

Example 2: Consider the following four local domains:

\{p1,p2\}

\{p2,p3\}

\{p3,p4\}

\{p1,p4\}

Then constructing the tree only with these local domains is not possible since this set of values has no common domains which can be placed between any two values of the above set. But however, if add the two dummy domains as shown below then organizing the updated set into a junction tree would be possible and easy too.

5.

\{p1,p2

,

p4\}


6.

\{p2,p3

,

p4\}

Similarly for these set of domains, the junction tree looks like shown below:

Generalized distributive law (GDL) algorithm

Input: A set of local domains.
Output: For the given set of domains, possible minimum number of operations that is required to solve the problem is computed.
So, if

vi

and

vj

are connected by an edge in the junction tree, then a message from

vi

to

vj

is a set/table of values given by a function:

\mui,j

:
A
Si\capSj

R

. To begin with all the functions i.e. for all combinations of

i

and

j

in the given tree,

\mui,j

is defined to be identically

1

and when a particular message is update, it follows the equation given below.

\mui,j

(p
Si\capSj

)

=
\sum
p\in
A
Si\setminusSj
Si\setminusSj

\alphai

(p
Si

)

\prod
{vk\operatorname{adj

vi},{kj}}\muk,j

(p
Sk\capSi

)(1)

where

vk\operatorname{adj}vi

means that

vk

is an adjacent vertex to

vi

in tree.

Similarly each vertex has a state which is defined as a table containing the values from the function

\sigmai:

A
Si

R

, Just like how messages initialize to 1 identically, state of

vi

is defined to be local kernel
\alpha(p
Si

)

, but whenever

\sigmai

gets updated, it follows the following equation:
\sigma(p
Si

)=\alphai(p

Si

)

\prod
vk\operatorname{adj

vi}\muk,j

(p
Sk\capSi

)(2).

Basic working of the algorithm

For the given set of local domains as input, we find out if we can create a junction tree, either by using the set directly or by adding dummy domains to the set first and then creating the junction tree, if construction junction is not possible then algorithm output that there is no way to reduce the number of steps to compute the given equation problem, but once we have junction tree, algorithm will have to schedule messages and compute states, by doing these we can know where steps can be reduced, hence will be discusses this below.

Scheduling of the message passing and the state computation

There are two special cases we are going to talk about here namely Single Vertex Problem in which the objective function is computed at only one vertex

v0

and the second one is All Vertices Problem where the goal is to compute the objective function at all vertices.

Lets begin with the single-vertex problem, GDL will start by directing each edge towards the targeted vertex

v0

. Here messages are sent only in the direction towards the targeted vertex. Note that all the directed messages are sent only once. The messages are started from the leaf nodes(where the degree is 1) go up towards the target vertex

v0

. The message travels from the leaves to its parents and then from there to their parents and so on until it reaches the target vertex

v0

. The target vertex

v0

will compute its state only when it receives all messages from all its neighbors. Once we have the state, We have got the answer and hence the algorithm terminates.

For Example, let us consider a junction tree constructed from the set of local domains given above i.e. the set from example 1,
Now the Scheduling table for these domains is (where the target vertex is

p2

).

RoundMessageorStateComputation


1.\mu8,4(p4)=\alpha8(p4)


2.\mu8,4(p4)=

\Sigma
p2

\alpha9(p2,p4)


3.\mu5,2(p3)=\alpha5(p3)


4.\mu6,3(p1)=

\Sigma
p4

\alpha6(p1,p4)


5.\mu7,3(p1)=\alpha7(p1)


6.\mu4,2(p3)=

\Sigma
p4

\alpha4(p3,p4).\mu8,4(p4).\mu9,4(p4)


7.\mu3,1(p2)=

\Sigma
p1

\alpha3(p2,p1).\mu6,3(p1).\mu7,3(p1)


8.\mu2,1(p2)=

\Sigma
p3

\alpha2(p3,p2).\mu4,2(p3).\mu5,2(p3)


9.\sigma1(p2)=\alpha1(p2).\mu2,1(p2).\mu3,1(p2)

Thus the complexity for Single Vertex GDL can be shown as

\Sigmav

d(v)|A
S(v)

|

arithmetic operations
Where (Note: The explanation for the above equation is explained later in the article)

S(v)

is the label of

v

.

d(v)

is the degree of

v

(i.e. number of vertices adjacent to v).

To solve the All-Vertices problem, we can schedule GDL in several ways, some of them are parallel implementation where in each round, every state is updated and every message is computed and transmitted at the same time. In this type of implementation the states and messages will stabilizes after number of rounds that is at most equal to the diameter of the tree. At this point all the all states of the vertices will be equal to the desired objective function.

Another way to schedule GDL for this problem is serial implementation where its similar to the Single vertex problem except that we don't stop the algorithm until all the vertices of a required set have not got all the messages from all their neighbors and have compute their state.
Thus the number of arithmetic this implementation requires is at most

\Sigmav

d(v)|A
S(v)

|

arithmetic operations.

Constructing a junction tree

The key to constructing a junction tree lies in the local domain graph

GLD

, which is a weighted complete graph with

M

vertices

v1,v2,v3,\ldots,vM

i.e. one for each local domain, having the weight of the edge

ei,j:vi\leftrightarrowvj

defined by

\omegai,j=|Si\capSj|

.
if

xk\inSi\capSj

, then we say

xk

is contained in

ei,j

. Denoted by

\omegamax

(the weight of a maximal-weight spanning tree of

GLD

), which is defined by

\omega*=\Sigma

M
i=1

|Si|-n

where n is the number of elements in that set. For more clarity and details, please refer to these.[3] [4]

Scheduling theorem

Let

'T'

be a junction tree with vertex set

'V'

and edge set

'E'

. In this algorithm, the messages are sent in both the direction on any edge, so we can say/regard the edge set E as set of ordered pairs of vertices. For example, from Figure 1

'E'

can be defined as follows

E=\{(1,2),(2,1),(1,3),(3,1),(4,2),(2,4),(5,2),(2,5),(6,3),(3,6),(7,3),(3,7),(8,4),(4,8),(9,4),(4,9)\}

NOTE:

E

above gives you all the possible directions that a message can travel in the tree.

The schedule for the GDL is defined as a finite sequence of subsets of

E

. Which is generally represented by

l{E}=

, Where

EN

is the set of messages updated during the

Nth

round of running the algorithm.

Having defined/seen some notations, we will see want the theorem says,When we are given a schedule

l{E}=\{E1,E2,E3,\ldots,EN\}

, the corresponding message trellis as a finite directed graph with Vertex set of

V x \{0,1,2,3,\ldots,N\}

, in which a typical element is denoted by

vi(t)

for

t\in\{0,1,2,3,\ldots,N\}

, Then after completion of the message passing, state at vertex

vj

will be the

jth

objective defined in
\sigma(p
Si

)=\alphai(p

Si

)

\prod
vk\operatorname{adj

vi}\muk,j

(p
Sk\capSi

)

and iff there is a path from

vi(0)

to

vj(N)

Computational complexity

Here we try to explain the complexity of solving the MPF problem in terms of the number of mathematical operations required for the calculation. i.e. We compare the number of operations required when calculated using the normal method (Here by normal method we mean by methods that do not use message passing or junction trees in short methods that do not use the concepts of GDL)and the number of operations using the generalized distributive law.

Example: Consider the simplest case where we need to compute the following expression

ab+ac

.

To evaluate this expression naively requires two multiplications and one addition. The expression when expressed using the distributive law can be written as

a(b+c)

a simple optimization that reduces the number of operations to one addition and one multiplication.

Similar to the above explained example we will be expressing the equations in different forms to perform as few operation as possible by applying the GDL.

As explained in the previous sections we solve the problem by using the concept of the junction trees. The optimization obtained by the use of these trees is comparable to the optimization obtained by solving a semi group problem on trees. For example, to find the minimum of a group of numbers we can observe that if we have a tree and the elements are all at the bottom of the tree, then we can compare the minimum of two items in parallel and the resultant minimum will be written to the parent. When this process is propagated up the tree the minimum of the group of elements will be found at the root.

The following is the complexity for solving the junction tree using message passing

We rewrite the formula used earlier to the following form. This is the eqn for a message to be sent from vertex v to w

\muv,w(pv)=\sum

pv\inAS(v)

\alphav(pv)\prod

uadjvu

\muu,v(pu)

----message equation Similarly we rewrite the equation for calculating the state of vertex v as follows

\sigmav(pv)=\alphav(pv)\produv}\muv,w(pv)

We first will analyze for the single-vertex problem and assume the target vertex is

v0

and hence we have one edge from

v

to

v0

. Suppose we have an edge

(v,w)

we calculate the message using the message equation. To calculate

pu

requires

qv-1

additions and

qv(d(v)-1)

multiplications.

(We represent the

|AS(v)|

as

qv

.)

But there will be many possibilities for

xv

hence

qv\stackrel{def

} | A _| possibilities for

pv

.Thus the entire message will need

(qv)(qv-1)=qv-qv

additions and

(qv)qv.(d(v)-1)=(d(v)-1)qv

multiplications

The total number of arithmetic operations required to send a message towards

v0

along the edges of tree will be

\sum(qv-qv)

additions and

\sum(d(v)-1)qv

multiplications.

Once all the messages have been transmitted the algorithm terminates with the computation of state at

v0

The state computation requires

d(v0)q0

more multiplications.Thus number of calculations required to calculate the state is given as below

\sum

vv0

(qv-qv)

additions and

\sum

vv0

(d(v)-1)qv+d(v0)q

v0

multiplications

Thus the grand total of the number of calculations is

\chi(T)=\sumvd(v)qv-\sumeqe

----

(1)

where

e=(v,w)

is an edge and its size is defined by

qv

The formula above gives us the upper bound.

If we define the complexity of the edge

e=(v,w)

as

\chi(e)=qv+qw-qv

Therefore,

(1)

can be written as

\chi(T)=\sume\chi(e)

We now calculate the edge complexity for the problem defined in Figure 1 as follows

\chi(1,2)=q2+q2q3-q2

\chi(2,4)=q3q4+q2q3-q3

\chi(2,5)=q3+q2q3-q3

\chi(4,8)=q4+q3q4-q4

\chi(4,9)=q2q4+q3q4-q4

\chi(1,3)=q2+q2q1-q2

\chi(3,7)=q1+q1q2-q1

\chi(3,6)=q1q4+q1q2-q1

The total complexity will be

3q2q3+3q3q4+3q1q2+q2q4+q1q4-q1-q3-q4

which is considerably low compared to the direct method. (Here by direct method we mean by methods that do not use message passing. The time taken using the direct method will be the equivalent to calculating message at each node and time to calculate the state of each of the nodes.)

Now we consider the all-vertex problem where the message will have to be sent in both the directions and state must be computed at both the vertexes. This would take

O(\sumvd(v)d(v)qv)

but by precomputing we can reduce the number of multiplications to

3(d-2)

. Here

d

is the degree of the vertex. Ex : If there is a set

(a1,\ldots,ad)

with

d

numbers. It is possible to compute all the d products of

d-1

of the

ai

with at most

3(d-2)

multiplications rather than the obvious

d(d-2)

. We do this by precomputing the quantities

b1=a1,b2=b1a2=a1a2,bd-1=bd-2ad-1=a1a2ad-1

and

cd=ad,cd-1=ad-1cd=ad-1ad,\ldots,c2=a2c3=a2a3ad

this takes

2(d-2)

multiplications. Then if

mj

denotes the product of all

ai

except for

aj

we have

m1=c2,m2=b1c3

and so on will need another

d-2

multiplications making the total

3(d-2)

There is not much we can do when it comes to the construction of the junction tree except that we may have many maximal weight spanning tree and we should choose the spanning tree with the least

\chi(T)

and sometimes this might mean adding a local domain to lower the junction tree complexity.

It may seem that GDL is correct only when the local domains can be expressed as a junction tree. But even in cases where there are cycles and a number of iterations the messages will approximately be equal to the objective function. The experiments on Gallager–Tanner–Wiberg algorithm for low density parity-check codes were supportive of this claim.

References

  1. Aji. S.M.. McEliece, R.J.. The generalized distributive law. IEEE Transactions on Information Theory. Mar 2000. 46. 2. 325–343. 10.1109/18.825794.
  2. Encyclopedia: distributive law. Encyclopædia Britannica. Encyclopædia Britannica Online. Encyclopædia Britannica Inc. 1 May 2012.
  3. Web site: Archived copy . 2015-03-19 . dead . https://web.archive.org/web/20150319085443/https://ai.stanford.edu/~paskin/gm-short-course/lec3.pdf . 2015-03-19 . The Junction Tree Algorithms
  4. http://www-anw.cs.umass.edu/~cs691t/SS02/lectures/week7.PDF The Junction Tree Algorithm