Skip to main content

Full text of "Smoothed Analysis of Interior-Point Algorithms: Termination"

See other formats


Smoothed Analysis of Interior-Point Algorithms: Termination 



Daniel A. Spielman * Shang-Hua Teng t 

Department of Mathematics Department of Computer Science 

Massachusetts Institute of Technology Boston University and 

Akamai Technologies Inc. 

February 1, 2008 



Abstract 

We perform a smoothed analysis of the termination phase of an interior-point method. 
By combining this analysis with the smoothed analysis of Renegar's interior-point algorithm 
in |DST02j , we show that the smoothed complexity of an interior-point algorithm for linear 
programming is 0(m 3 \og(m/a)). In contrast, the best known bound on the worst-case 
complexity of linear programming is 0(m 3 L), where L could be as large as m. We include 
an introduction to smoothed analysis and a tutorial on proof techniques that have been 
useful in smoothed analyses. 



1 Introduction 

This paper has two objectives: to provide an introduction to smoothed analysis and to present 
a new result — the smoothed analysis of the termination of interior-point algorithms. We begin 
with an intuitive introduction to smoothed analysis (Section 11.1(1 followed by a more formal 
introduction (Section II .2(1 . After introducing necessary notation in Section |5J we survey the 
complexity of interior-point algorithms (Section |3J), emphasizing the role of Renegar's condition 
number (Section0J. We then explain the termination algorithm (Section^}) present its smoothed 
analysis at a high level (Section^)), and then delve into the geometric (Section^) and probabilistic 
(Section [SJ) aspects of its analysis. In Section |H1 we include a tutorial of the fundamental 
techniques used in this work and in the smoothed analysis of the simplex method |ST01] . Finally, 
in Section EH we explain how the analysis of termination is related to the analysis of the simplex 
method. 



1.1 Intuitive Introduction to Smoothed Analysis 

Folklore holds that most algorithms have much better performance in practice than can be proved 
theoretically. This is partially due to the lack of a theoretical definition of "practice" , partially 

'Partially supported by NSF grant CCR-0112487. spielman@math.mit.edu 

f Partially supported by NSF grants CCR-9972532, and CCR-0112487. steng@cs.bu.edu 



1 



due to the approximations made in most theoretical analyses, and partially due to the dearth of 
performance measures considered in theoretical analyses. In jSTOlj . we suggested that smoothed 
analysis might provide a theoretically analyzable measure of an algorithm's performance that 
would be more predictive of its behavior in practice. . 

Algorithms are typically analyzed through either worst-case or average-case complexity. Worst- 
case analyses may disagree with practical experience because they are dominated by the most 
pathological input instances. For many algorithms, these pathological inputs are rarely, if ever, 
encountered in practice, and are only known from lower-bound proofs. In an attempt to create 
a less pessimistic analysis, researchers introduced average-case analysis, in which one defines a 
probability distribution on input instances and then measures the expected performance of an 
algorithm on inputs drawn from that distribution. A low average-case complexity provides some 
evidence that an algorithm may run quickly in practice. However, this evidence is not conclusive 
as the inputs encountered by the algorithm in practice may not look like random inputs. 

This discrepancy between theoretical and experimental analysis manifests itself in the analysis 
of linear programming algorithms. The simplex method for linear programming is known to per- 
form very well in practice, but to have exponential worst-case complexity K \ 1 721 [Mur80l FGS79 , 
G 0I8 3~| lAC 78 1 IJer 73| I A Z 99] . On the other hand, it is known to have polynomial average-case com- 
plexity under a number of notions of average-case |Bor80[ IBor77| ISma83| IHai83| IAKS87| [AM85 , 
Tod86,. Interior-point methods are known to have polynomial worst-case complexity Kar84 . 
However, their performance in practice is much better than their worst-case analyses would sug- 
gest |IL941 ILMS901 IEA96 . It has been shown that the average-case complexity of interior-point 
methods is significantly lower than their worst-case complexity |A.)PY93lfI.IPY99| (the term L 
is replaced by O(logn)); but these analyses are still a factor of approximately y/n off from that 
observed in practice. 

Smoothed analysis provides an alternative to worst-case and average-case analyses, and also 
attempts to circumvent the need for a theoretical definition of "practical inputs" . The smoothed 
complexity of an algorithm is defined to be the maximum over its inputs of the expected running 
time of the algorithm under slight perturbations of that input. The smoothed complexity is 
then measured as a function of the input size and the magnitude of the perturbation. While 
many notions of perturbation are reasonable, most results have been obtained for Gaussian 
perturbations. The assumption that inputs are subject to perturbation is reasonable in many 
circumstances: in many real-world numerical and geometric applications, data are derived from 
experimental and physical measurements and are therefore subject to errors |Wil651 paragraph 
2, pp. 62]. Perturbations can also be used to heuristically model the arbitrary decisions that 
effect to formation of inputs that are presented to algorithms. 

Two important aspects of smoothed analysis are: 

• Smoothed analysis interpolates between worst-case and average-case analysis: By letting 
the magnitude of the random perturbation to the data (e.g., the variance of the Gaussian 
noise) become large, one obtains the traditional average-case complexity measure. By 
letting the magnitude of the random perturbation go to zero, one obtains the traditional 
worst-case complexity measure. In between, one obtains a model corresponding to noise 

1 We remark that a similar framework for discrete problems was introduced by Blum and Spencer |BS95| 



2 



in low-order digits of the input. 

• The smoothed complexity of an algorithm provides an upper bound on the expected com- 
plexity of the algorithm in every neighborhood of inputs. That is, if the smoothed com- 
plexity of an algorithm is low, then it will run quickly on inputs drawn from any small 
neighborhood of inputs. 

Thus, if the inputs presented to an algorithm in practice are subject to perturbation, the 
smoothed complexity of the algorithm should upper bound the practical performance of 
the algorithm. 

In jSTOlj . we introduced smoothed complexity by proving that a particular variant of the 
shadow-vertex simplex method has polynomial smoothed complexity. 

1.2 Formal Introduction to Smoothed Analysis 

The inputs to most numerical and geometric problems may be viewed as points in a vector 
space. For example, an m by n real matrix can be viewed as a vector in IR mn . Similarly, a set 
of n points in d dimensions can be viewed as a vector in IR . 

The most natural notion of perturbations of vectors in a real vector space is that of Gaussian 
perturbations. Recall that a Gaussian random variable with mean and variance a 2 has density 

1 -x 2 /2a 2 

and that a Gaussian random vector of variance a 2 centered at the origin in M n , denoted M(0, cr 2 ), 
is a vector in which each entry is a Gaussian random variable of variance a 2 and mean 0, and 
has density 

1 c -IHl 2 /2q2 

Definition 1.1 (Gaussian perturbation). Let x G IR™. The Gaussian perturbation of x of 
variance a 2 is the random vector x = x + g, where g is a Gaussian random vector of variance 
a 2 , centered at the origin o/M". 

The Gaussian perturbation of x may also be described as a Gaussian random vector of variance 
a 2 centered at x. 

Using the notion of Gaussian perturbation, we define the smoothed value of a function: 

Definition 1.2 (Smoothed value). Let f be a non-negative function on H n . The smoothed 
value of f with respect to Gaussian perturbations of variance a 2 is given by 

m f E 9 ^(0,^) [/(* + 11*11 9)\ 

Note that in this definition we multiply the perturbation g by so that a represents the 
magnitude of the perturbation relative to the data. 



3 



Definition 1.3 (Smoothed complexity). Let A be an algorithm whose inputs can be expressed 
as vectors in ]R n and let T A (x) be the running time of algorithm A on input x. Then the 
smoothed complexity of algorithm A is 

C A (n,a) = maxE 9 ^ (0i(j2) [T A (x + \\x\\ g)] . 

In |ST01| . Spielman and Teng consider the complexity of a particular two-phase shadow- vertex 
simplex method on linear programs of the form 

■ • T 

maximize c x 

subject to Ax < b, (1) 
where A is an m-by-n matrix, b is an m-vector, and c is an n-vector. They prove: 

Theorem 1.4 (Spielman- Teng). There is a two-phase shadow-vertex simplex method with 
time complexity T(A, b, c) such that for every m-vector b and n-vector c, the smoothed com- 
plexity of the algorithm, 



max Eg 

Aen mxn 



T A + 



A 



G,b,c 



is polynomial in m, n, and 1/a, independent of b and c, where G is a Gaussian random m by 
n matrix of variance a 2 centered at the origin. 

One need not limit smoothed analysis to measuring the expected complexity of algorithms in 
various neighborhoods. It is quite reasonable to prove other facts about the distribution of 
running times when the expectation does not exist, or when much stronger bounds can be 
proved. For example, Blum and Dunagan BD02 prove 

Theorem 1.5 (Blum-Dunagan). Let a%, . . . ,a n be Gaussian random vectors in JR d of variance 
a 2 < l/(2d) centered at points each of norm at most 1. Then, there exists a constant c such that 
the probability that the perceptron algorithm for linear programming takes more than cd - ^ '•"^ 
iterations is at most 5. 



2 Notation and Norms 

Throughout the paper, we use bold letters such as b and x to denote vectors, capital letters 
such as A and G to denote matrices, and lower case letters to denote scalars. In any context in 
which the vector b is present, bj denotes the j'th component of b. For a set, V, we let by denote 
the vector obtained by restricting b to the coordinates in V. When indexing and constructing 
matrices, we use the conventions of Matlab. Thus, A.jj denotes the matrix formed by taking 
the columns indexed by U, and Ay,u denotes the sub-matrix of rows indexed by V and columns 
indexed by U. For sets, U and V, we let U and V denote their complements. We also let V, U 
denote the set of pairs (i,j) (V,U); for example, we let Ay-jj denote the set of entries of A 
not in Ay^j. For a matrix A and a column vector b, we let [A, b] denote the matrix obtained 
by appending column b to A. 



4 



For an event, £, we let [£] denote the random variable that is 1 when £ is true and is otherwise. 
We use of the following vector norms: 

• IMIi = Si \ x i\i and 

• 1 1 3 ' I loo = max i 

and note that 

||x||„ < llxll < llxll-, . 

II Moo — II II — II •"111" 

We also use the following matrix norms: 

• \\A\\ = Px|| / ||x||, 

• Plloo = max ^o ll^lloo / ll^lloo' and 

• \\A\\ F = ^/trace(yl T 'A), the square root of the sum of the squares of entries in A. 
We note that 

• Plloo = maX i 111' 
. PIU^PH, 

• \\A\\ < \\A\\ F , and 

• for sets U and V, \\Auy\\ < \\A\\. 

3 Complexity of Interior Point Algorithms 

A linear program is typically specified by a matrix A together with two vectors b and c, where 
where A is an m-by-n matrix, c is an n-dimensional row vector, and b is an m-dimensional 
column vector. There are several canonical forms of linear programs. For the analyses in this 
paper, we will consider linear programs of the form 

max cx such that Ax < b, x > 0, 

with dual 

minyb such that yA > c, y > 0. 
We will assume throughout that m > n. 

If they exist, we denote the solutions to the primal and dual by x* and y*, and note that x* is 
an n-dimensional column vector and y* is an m-dimensional row vector. 

A linear programming algorithm should: (1) determine whether or not the linear program is 
feasible or bounded; and, (2) if the program is feasible and bounded, output a solution. One can 



5 



either insist that the solution be a precisely optimal solution to the linear program, or merely a 
feasible point at which the objective function is approximately optimized. 

The best bounds on the worst-case complexity of interior point methods, and for linear program- 
ming in general, were first obtained by Gonzaga |Gon88j and Vaidya |Vai90| . who showed how 
to solve linear programs in 0(m 3 L) arithmetic operations 2 , where m > n and L is a parameter 
measuring the precision needed to perform the arithmetic operations exactly, and which here 
also appears in the number of arithmetic operations performed. The definition of L varies in 
the literature: Khachiyan Kha79 , Karmarkar Kar8|J, and Vaidya |Vai90| define L for integer 
matrices A to be some constant times 

log(largest absolute value of the determinant of any square sub-matrix of A) 

+ lo g(ll c lloo) + lo g(ll b lloo) + log(m + n). 

Under this definition, L is not efficiently computable, and unless A comes from a very special 
class of matrices, it is difficult to find L below Q(n). Others use cruder bounds such as the total 
number of bits in a row of the matrix or the total number of bits in the entire matrix Wri96 . 

To understand the time complexity of interior point algorithms, we note that they are typically 
divided into three phases: 

[Initialization]: In this phase, the algorithm determines whether or not the program is 
feasible and bounded; and, if it is feasible and bounded, returns a feasible point. 

[Iteration]: In this phase, the algorithm iteratively finds feasible points on which the 
objective function becomes increasingly closer to optimal. 

[Termination]: In this phase, the algorithm jumps from a feasible point that is close to 
optimal to the exact optimal solution of the linear program. 

Of course, if one merely desires an approximate solution to the linear program, then one can 
skip the termination phase. However, the dependency on L appears in both the initialization 
and termination phase. So, the worst-case complexity of linear programming algorithms is not 
decreased by merely asking for an approximate solution. 

The kernel of an interior-point algorithm is the iteration phase, in which feasible points of 
increasing quality are computed. A typical measure of quality in a primal algorithm is the 
optimality gap between the objective function at the current point and the optimal, while in a 
primal-dual algorithm it is the duality gap between the current primal and dual feasible points. 
In either case, one can prove that after k iterations the gap decreases by the multiplicative 

factor ^1 — -j=^j , for some constant c |Ren88[ fVai9f)l lYe97| . If performed carefully, each of 

these iterations has complexity 0(m 5//2 ) Gon88 . Therefore, the total number of arithmetic 
operations required to reduce the gap from R to e is 0(m 3 log(i?/e)). The worst-case complexity 
bounds come from the facts that a typical interior-point algorithm discovers a feasible point with 
initial gap bounded by R = 2°^ in the initialization phase, and requires a point with gap less 
than e = 2~°^ to start the termination phase. 

2 Vaidya's algorithm is somewhat faster as its complexity is 0((m + n)n 2 + (m + n) 15 n)L 



6 



In practice, the speed of interior point methods is much better than that proved in their worst- 
case analyses |IL941 ILMS901 lEA96j . This difference in speed seems to have two sources: first, 
the upper bound of L is overly pessimistic; and, second, the improvement made at each iteration 
is typically much better than ^1 — ■ However, we note that Todd |Tod94j and Todd and 

Ye |TY96j have exhibited linear programs in which f2(n 1//3 ) iterations are required to improve 
the gap by a constant factor. 

In this paper, we perform a smoothed analysis of a simple termination phase for interior point 
methods. By combing this analysis with the analysis of the first two phases of Renegar's interior 
point algorithm Ren95b in DST02 , we obtain an interior point algorithm with smoothed 
complexity 0(m 3 log(m/cr)). Essentially, this analysis replaces the dependency on L in the 
initialization and termination phases with a dependency on log(m/<r). We conjecture that 
one can improve this smoothed complexity estimate by proving that the smoothed number of 
iterations taken by an interior point method is less than 0(y/m log (m/cr)). 

Renegar |Ren95b( IRen95a( IRen94| defined a condition number C(A, b, c) of a linear program, 
and developed an algorithm for the initialization of an interior point method that runs in time 
0(m 3 log(C(^4, b, c))) and returns a feasible point with initial optimality gap R < 0(mC(A, 6, c)). 
Applying a primal iteration phase to this feasible point, one obtains an algorithm that af- 
ter 0(\/mlog(mC(A, b, c))/e) rounds and 0(m 3 log(mC(A, &, c))/e) arithmetic operations pro- 
duces points with optimality gap at most e. Renegar's condition number will be discussed further 
in Section |IJ 

Dunagan, Spielman and Teng DST02 perform a smoothed analysis of Renegar's condition 
number and prove: 

Theorem 3.1 (Dunagan-Spielman-Teng). Let A be an m-by-n matrix for m > n, b an 



A,b, 



< 1, and let A, b and c be the Gaussian 

F 



m-vector, and c an n-vector for which 
perturbations of A, b and c of variance a < 1/y/mn. Then, 

E AAc [log(C(A b, c))\ < 0(\og{m/a)). 

Combining this analysis with that of Renegar, we find that the smoothed complexity of finding 
an e-optimal solution to a linear program is 0(m 3 log (m/cre)). 

In Section [SJ we define a simple termination algorithm that takes 0(m 3 ) arithmetic operations. 
We define 5(A, b, c) to be the greatest number such that cx* — cx < 5(A, b, c) implies that the 
termination algorithm is successful. Thus, after 0(^/mlog(mC (A, b, c))/6(A, b, c)) iterations, 
and 0(m 3 log(mC(A, b, c))/6(A, b, c)) arithmetic operations, one can apply the termination 
phase to find the exact solution to the linear program. Like Karmarkar K ar84j . we handle the 
technical difficulty that the algorithm does not know C(A,b,c) or 5(A,b,c) by periodically 
attempting to terminate, but only once every y/n iterations so as not to increase the complexity 
of the algorithm. 

In Theorem 15.61 proved over Sections H3 and |H1 we show that the smoothed value of 
max (1, log (1/6(A, b, c))) is O (log (m/cr)). We thus prove: 

Theorem 3.2 (Smoothed Complexity of IPM). Let A be an m-by-n matrix for m >n , b 



an m-vector, and c an n-vector for which 



A, b, c 



< 1, and let A, b and c be the Gaussian 

F 



7 



perturbations of A, b and c of variance a < 1/y/mn. Let T(A,b,c) denote the complexity 
of Renegar's interior point algorithm with the periodic application of the termination procedure 
described in Section^ Then, 

E AAc [T(A, b, c)\ < 0(m 3 log(m/a)). 

While this is the statement of the complexity that is most natural for our proof techniques, we 
note that it is not exactly the form specified in Definition 11.31 The difference comes from the 



upper bounds on a and 



A, b. 



in the statement of the theorem. As the behavior of the 



interior point methods are unchanged by multiplicative changes to A, b and e, only the upper 



bound on a is significant: if 
A, b, c 



A, 6, 



> 1, then one can scale down A, b, c, and a to make 



= 1. One could adjust Theorem 13. 21 in two ways to handle a > 1/y/mn: one could 

either extend the proofs, or one could use Theorem 13.21 as a black-box and derive the more 
general statement from it. Such a proof could proceed by observing that a Gaussian of variance 
a 2 is the sum of a Gaussian of variance r 2 and a Gaussian of variance a 2 — t 2 . Thus, one can 
apply Theorem 13.21 with a Gaussian of variance r 2 to the result of perturbing the original data 
by a Gaussian of variance a 2 — r 2 , for an appropriate choice of r. The reader can find a precise 
implementation of this technique in |ST01| Section 5.1]. 



4 Renegar's Condition Number for Linear Programming 

In an effort to develop a parameter in which to measure the complexity of linear programming 
that was more natural than /.. Renegar |Ren95bl Ren95al Ren!) 1 . introduced the condition 
number, C(A, b, c), of a linear program and developed an interior point method that runs in 
time 0(m 3 log(C(j4, b, c)/e)). In contrast with the parameter L, C(A, 6, c) is naturally defined 
for rational or real matrices A. Moreover, C(A, b, c) is often much smaller than L. 

Formally, we define the distance of a linear program specified by (A, b, c) to primal ill-posedness 
to be 

sup : \\A — A', b — b'\\ F < k implies A'x < b, x > is feasible} 

(A b) — ^ ^ X ~ ^' x — ® ^ s ^ eas ible, and 

Kp ' sup {k : \\A — A' , b — b'\\ F < k implies A'x < b, x > is infeasible} 

if A'x < b, x > is infeasible. 

The distance to dual ill-posedness, kd(A, c), is defined similarly. We then define C(A, b, c) 
to be the maximum of the primal condition number Cp{A, b) and the dual condition number 
Cd(A, c), where Cp(A, b) and Cd(A, c) are the normalized distances to primal and dual ill- 
posedness: 

C P {A,b) = \\A,b\\ F /K P (A,b) and C D {A,c) = \\A, c\\ F /k d (A, c). 

We remark that, with this normalization, Cp and Cp> are always at least 1. 

We also note that the linear programs for which Todd |Tod94j and Todd and Ye |TY96j prove 
a ^(n 1 / 3 ) iteration lower bound have exponentially poor condition. It is not known if one can 
prove such an iteration lower bound for a well-conditioned linear program. 



8 



5 Termination 



One can often terminate linear programming algorithms that approach the optimal solution 
of a linear program by using a good solution to guess the optimal solution. The process by 
which this is done is often called termination or rounding. Termination is possible because at 
the optimal solution a number of the inequalities are tight, and the knowledge of the identity 
of these inequalities is enough to reconstruct the optimal solution. Thus, most termination 
algorithms work by guessing that the inequalities having the least slack at a very good solution 
are those which have no slack at the optimal solution. 

We being by recalling the facts that we will use to prove that termination is possible, ignoring 
complications that may occur with probability zero for perturbed A, b and c. We begin with 

Proposition 5.1. For Gaussian distributed A, b and c, with probability 1, the program specified 
by (A, b, c) is either infeasible, unbounded, or has unique primal and dual optimal solutions, x* 
and y* . Moreover, x* makes tight exactly n of the inequalities {x,i > 0} U {Aj t -x < bj} and y* 
makes tight exactly m of the inequalities {yj > 0} U {yA : ^ > q}. 

Proof. If the primal program is feasible and bounded but does not have a unique optimal solu- 
tion, then the space of optimal solutions must lie in a subspace defined by fewer than n of the 
inequalities {xi = 0} U {Aj t: x = bj}, and c must be orthogonal to this subspace. However, as 
this restricts c to a set of measure zero and the number of such possible subspaces is finite given 
A and &, this is an event with probability zero. By symmetry, the same holds for the optimal 
solution of the dual program. To prove the second part, we note that if n + 1 of the inequalities 
are tight at x* , then these inequalities form a system of n + 1 equations in n variables that has 
a solution. As any such degeneracy has probability zero, and there are only finitely many such 
possible degeneracies, the probability of this happening is zero. □ 

We now recall the Duality Theorem of Linear Programming: 

Theorem 5.2 (LP duality). For a linear program specified by (A, b, c), 

• (Weak Duality) for every primal feasible x and dual feasible y, yb > cx, and 

• (Strong Duality) if the linear program is bounded and feasible then for primal optimal x* 
and a dual optimal y* , we have y*b = y* Ax* = cx* . 

For a feasible and bounded linear program (A, b, c) with unique optimal primal and dual solu- 
tions x* and y*, we define 

U = {i:x*> 0} 
V = {j : y* > 0}, 

and we say that the program is of type (U, V). 

We can show that U and V are related to the set of tight constraints: 



9 



Lemma 5.3 (Tight constraints). For a feasible and bounded linear program specified by 
(A, b, c), we have 

V Q {j ' '■ Aj t x* = bj}, and 
UC{i: y*A :!i = a}. 

Proof. Let 

V' = {j : Aj.x* = bj}, and 
U' = {%: y*A , = Ci }. 

To show that U C U', assume by way of contradiction that there exists an % 6 U such that 
y*A : j > Ci. Because x* > we have y*A-.jX% > CiX*, which would imply y*b > cx* and 
contradict Theorem 15.21 Therefore U C U' . We can similarly show that V C V'. □ 

With probability 1, these sets are actually identical: 

Lemma 5.4 (U and V). For Gaussian distributed A, b and c, if the corresponding linear 
program is bounded and feasible, then with probability 1, 

V = {j : Aj !: x* = bj}, and 
U = {i: y*A hi = c,i}. 

Proof. Define V and U' as in the proof of Lemma 15.31 We will show \U\ = \U'\ and \V\ = \V'\. 
By Proposition I5.1[ with probability 1, the number of zeros in x* plus \U'\ equals n. Because 
x* is an n-place vector, the number of zeros in x* plus the number of non-zeros in x* , which is 
\U\, is equal to n. Thus \U\ = \U'\. Similarly \V\ = \V'\. □ 

We will consider the following termination scheme: suppose x is an approximate solution to the 
primal program, we let U(x) and V(x) be the set of indices such that 

{xi : i U(x)} U {bj - Aj.x : j G V(x)} 

are the smallest n values in {x{} U {bj — Aj^-x}. We then guess the optimal solution to be the 
solution to the following linear system: £Cj = for i U(x) and bj — Aj t -x = for j £ V{x). 
We will show that if x is sufficiently close to optimal, then this termination scheme produces 
the optimal solution to the linear program. We now define S(A, b,c) to measure how close to 
optimal x needs to be. 

Definition 5.5 (5(A, b, c)). For a feasible and bounded linear program specified by A, b and c, 
we define 

5(A,b,c) 

to be the supremum of the 5 for which 

(cx* — cx) < 5 implies U(x) = U and V(x) = V. (2) 
For unbounded or infeasible programs, we set 5 to oo. 



10 



The main technical contribution of this paper is: 

Theorem 5.6. Let A be an m-by-n matrix , m > n, b an m-vector, and c an n-vector for 
which A , b , \\c\\ < 1, and let A, b and c be a Gaussian random matrix and two Gaussian 

random vectors of variance a 1 centered at A, b and c, respectively. Then, for a 2 < 1, 

1 



E 



max 1, log 



S(A,b,c) 



< 0(log(m/<r)). 



Our proof of Theorem 15.61 is broken into three sections. In Section H3 we define geometric 
quantities that we will use to bound 5(A, b, c), state the relation between S(A, b, c) and these 
quantities proved in Section [7[ and state the probability bounds for these quantities obtained 
in Section El The rest of the material in Section El is a routine calculation using the results of 
Sections |S1 and Theorem 13. II The reader will probably be most interested in Section |H1 which 
we begin with an intuitive explanation of how the probability estimates are obtained, carefully 
explain the tools used to make these arguments rigorous, and then finally apply these tools to 
obtain the probability bounds. 

We remark that Theorem l5.6l depends very little on the properties of Gaussian random variables. 
Aside for the bound on E [log \\A\\] of Proposition 16.91 which is easily generalized to other distri- 
butions, the only fact about Gaussian random variables used is that proved in Lemma f8.ll Thus, 
one could prove statements similar to Theorem 15.61 for a number of families of perturbations. 



6 Smoothed Analysis of log(l/c^) 

Our analysis of the probability that 5(A, b, c) is small will be divided into two parts: a geometric 
condition for 5(A, b, c) to be small, and a bound on the probability that this geometric condition 
is satisfied. 

To described the geometric condition, we define the following five quantities for bounded and 
feasible linear programs with unique optimal primal and dual solutions x* and y* . 

• a P (A, b, c) = mm ieU x* , 

• a D (A,b,c) = mm j£V y*, 

• Pp(A, b, c) = min Jg y bj — Aj j: x*, 

• 0d(A, b, c) = min j6 j7 y*A : ^ - a, 

• j(A, b, c) = mhifcet/ dist (A v ,k, Span (A v ,u-k))- 

The geometric condition is that one of these five quantities is small. 

When A, b and c are clear from context, we will just write ap, ap>, Pd, Pp, 7 or 5. Note that 
a D (A, b, c) = a P (-A T , -c T , -b T ) and Pd(A, b, c) = (3 P (-A T , -c T , -b T ). 

In Section [71 we prove 



11 



Lemma 6.1. For a linear program specified by {A, b, c) with unique optimal primal and dual 
solutions x* and y* , let 



Then, 



\(A, b, c) = min (a P (A, b, c),a D (A, b, c),(3 P (A, b, c),j3 D (A, b, c)) . 

A(AM) 2 7(AM) 



5(A,b,c) > 



2max(l,Vn||A||)(l + ||A||)" 



We define J- (A, b, c) to be the event that the linear program specified by A, b, c is feasible and 
bounded. In Section |H1 we prove 

Lemma 6.2 (Probability of small a). Under the conditions of Theorem \5.fk 

8en(m + 1) 



Pr 



a P (A, b, c) < 



and J-(A, 6, c) 



< 



(7 



JA|| +2)^11**11 + 1) 
Lemma 6.3 (Probability of small /3). Under the conditions of Theorem \5.b\ 

4em 



Pr 



P (A,b,c) < 



and T{A, b, c)) 



< 



max (1, \\A\\ ||** | 

Lemma 6.4 (Probability of small 7). Under the conditions of Theorem \5.b\ 



Pr 

A v ,u 



l(A,b,c) < 



(1 + ||a;*|| 2 + ||y*|| 2 



141 + 3) 



and J- {A, b, c) 



< 



ene 



(T- 



From these three lemmas, we can reduce our analysis of the probability that S(A, b, c) is small 
to an analysis of the probability that ||**||, \\y*\\ or ||vl|| is large. 



Lemma 6.5. Under the conditions of Theorem \5.(A 



Pr 

A,b,c 



5(A,b : c)(\\A\\+3) 7 (l + \\x*\\ + \\y*\\) 4 <e 



21e 1 / 3 n 1 /6( n+ i)( m + i) 
< ^ — -. (3) 



(7 



Proof. As 5(A, b, c) is infinite for infeasible or unbounded programs, 



Pr 

A,b,c L 



'd(A,b,c)(\\A\\+3) 7 (l + \\x*\\ + \\y*\\) 4 <e 



Pr 

A,b,c 



S(A, b, c) {\\A\\ + 3) 7 (1 + ||**|| + \\y*\\) A < e and T(A, b, c) 



As an{A, b, c) = ap{— A f , — c*, —6*), and 

e 



< 



+2) 2 (||**|| + 1) max(l, \\A\\ \\x* 



12 



Lemmas 16.21 and 16.31 imply 



Pr 

A,b,c 



rmn(ap,aD,fip,f3D) < 



< 



< 



(||vl||+2) 2 (max (||**|| , ||y*||) + l) 
8en(m + 1) + 8em(n + 1) + 4em + 4en 



and J 7 (A, b, c) 



(7 



8e ((n + l/2)(m + 1) + (m + l/2)(n + 1)) 



Let A = min (ap, ap, ftp, /3d)- If 
A 2 7 < 



< 



then either 



or 



(||A||+3) 5 (l + ||**|| + ||y*||) 4 



(||A|| + 2)' J (max(||a!*||,||»*||) + l) 



A < 



1 + ||**|| 2 + ||y*|| 2 ) (\\A\\ +3) 



(||A|| + 2Y (max (||**|| , ||y*||) + l) 



7< 



l + ||a;*|| 2 + ||y*f )(PII+3) 



So, 



Pr 

A,6,c 



A 2 7 < 



(p||+3) & (l + 11**11 + 11^1 



and J 7 (A, b, c) 



ene 8e ((n + 1/2) (m + 1) + (m + 1/2) (n + 1)) 



< 



16e(n + l)(m + l) 



(7 



As Lemma Ifi.ll tells us that 



«5(A,6,c) > 



A 2 7 



2max(l,^P||)(l + P||)' 



we obtain 



Pr 

A,b,c 



5 < 



< Pr 

A,b,c 



(\\A\\ +3) 5 (1 + ||**|| + ||y*ll) 4 V2max(l, Vn\\A\\) (1 + ||A||) 

3 

j and ^(A, &, c 



and .F(.A, &, c) 



A 2 7 < 



< 



(||A|| + 3) s (l + ||x*|| + \\y 
16e(n + l)(m+ 1) 



13 



From this inequality, we derive 



Pr 

A,b,c 



5(\\A\\ +3) 7 (1 + \\x*\\ + ||y*||) 4 < and T{A, b, c) 



< Pr 
A.b,c 



6 (\\A\\ + 3) 5 (1 + ||a;*|| + ||yl) 4 max(l, \\A\\) (1 + \\A\\) < — p= and JF(A, 6, c) 



2^ 



< 



16e(n + l)(m + l) 



(7 



The lemma now follows by changing e i /(2^/n) to 



□ 



To convert this bound on the probability that 5 is small to a bound on the expectation of 
log (1/(5), we will use the following technical lemma: 

Lemma 6.6. Let x be a non-negative random variable for which there exist constants a and k 
such that \og(a)/k > 1 and 

Pr [x < e] < ae k . 



Then, 

Proof. We compute 
E [max (1, log(l/x))] 



E [max(l,log(l/x))] < 



1 + log a 
k ' 



Pr [max(l,log(l/x)) > t] dt 



t=o 



t=o 



t=o 



CO 



Pr [max(l,log(l/x)) > t] dt + / Pr [max (1, log(l/x)) > t] dt 

I logo; 

log a 

< I k dt + I Pr[log(l/x) > t] dt, as (logo)/*; > 1, 

f log a 

k 



OO 



log at 

< I dt + 
Jt=o 

log a 1 
= — h -• 

k k 



OO 



ae- tk dt 



□ 



From this, we obtain 

Corollary 6.7. Under the conditions of Theorem \5.b\ 
E ■-■ ' 1 



max I 1, log 



<5(A,6 >C ) 

< 3(log(21(m + l) 13/6 /a 2 ) + 1) + 71og(||A|| + 3) + 41og(l + \\x*\\ + ||y*| 



14 



Proof. Applying Lemma ESI to ©, and recalling m > n, we obtain 

1 



E 



max 1, log 



S(A,b,c) 



7E [log(p|| + 3)] - 4E [log(l + + ||y*||)] 

< 3 (log(21(m + l) 13/6 /o" 2 ) + 1 



□ 

As || a:* || and ||y*|| can be bounded in terms of the condition number of the linear program, we 
will be able to use Theorem 13. II to bound the probability that they are large. The probability 
that ||j4|| is large may be obtained by more elementary means. In particular, we prove 

To bound E [log(l + || as* || + ||y*||)], we note that Renegar Ren95a ( Propositions 2.2 and 2.3] 
has proved 

Lemma 6.8 (Norms of optimal solutions). 

max(\\x*\\,\\y*\\) <C(A,b,c) 2 . 

So, we may apply Theorem 13. II to bound the norms of x* and y* . To bound the norm of A, we 
apply: 

Proposition 6.9. Let A be a Gaussian perturbation of variance a 2 < 1 of an m-by-n matrix A 
of norm at most 1 . Then, 

E [log(||^|| + 3)] < log((^ + V^)a + 4) 

Proof. Write A = A + Go where G is a Gaussian random matrix of variance 1 centered at 
the origin and A < 1. Seginer SegOO proves that E [||G||] < \fn + \/m, which implies 



E[||Gct||] < a(^/E + ^/nl) and 

E[||A|| +3] < + + 

As the logarithm is a convex function, 

E [log(p|| + 3)] < log (E [\\A\\ + 3]) < log ((Vn + y/m) a + 4) . 
Putting this all together, we prove the main theorem: 

Proof of Theorem \5.b\ To bound the terms obtained in Corollary 16.71 we apply Proposition 
to show 

E [log(P|| + 3)] < log(v^ + Vm + 4). 
We then apply Lemma 16.81 to show 

(l + \\x*\\ + \\y*\\)<3C(A,b,c) 2 , 



□ 



15 



and Theorem 13 .11 to obtain 

E [log(l + 11*1 + ||y*||)] < E [log (3C(A, b, c) 2 )] 

<log(3) + 2E [logC(A,b,c)} 
< 0(log(mn/a)). 



□ 



7 Geometric Analysis of 5 

To prove Lemma 16.11 we use the following lemma which says that if the value of cx is close to 
optimal, then x must be close to x* . 

Lemma 7.1. For a linear program specified by (A, b, c) with unique optimal primal and dual 
solutions x* and y* , let 

X(A, b, c) = mm(a P (A, 6, c),a D (A, b, c),(3 P (A, b, c),(3 D (A, 6, c)) . 

Then, 

II as* - a^lL ^ c ( x * ~ x ) 



1 + 



A(A,6,c)min(7(A,6,c),i; 



Proof of Lemma 16', it Assuming 

X(A,b,c) 2 7 (A,b,c) 



c(x* — x) < 



2max(l,^p||)(l + PID' 
we need to show U(x) = U and V{x) = V. From Lemma 17. 11 we have 

A 2 7 / 1 + \\A\\ \ A A 



11 "°° 2max(l,^p||)(l + || J 4||) VAmin(7, l)y - 2max(l,^||yl||) - 2' 

We then have 

(a) for i eU, Xi > a P (A, b, c) - A/2 > A/2 , 

(b) for i£U,Xi< A/2, 

As \Aj >: (x* - x)\ < WAW^ \\x* — aslloo < \fn \A\ \x* - x\ 00 , we also have 

(c) for j e V, bj - Aj.x < A/2, 

(d) for j V, bj - Aj.x > P (A, b, c) - A/2 > A/2. 

So, the smallest n values in {xi} U {bj — Aj y x} are those indexed by U and V. □ 
The proof of Lemma 17. II relies on the following technical lemmas. 



16 



□ 



Lemma 7.2. For x a feasible point for a bounded linear program specified by (A, b, c), 

c(x* -x)> a D (A, b, c) \\A v .(x* - x)\\ . 

Proof. As y*A > c, we have 

c(x* — x) > cx* — y* Ax 

= y* Ax* — y* Ax (by strong duality) 

= y*A(x* - x) 
= y* v A v -(x* - x), 

as y* is zero outside of V. As Ay t: (x* — x) is non-negative, we may conclude that 

y* v A v .(x* -x)> a D {A, 6, c) \\A v .{x* - x)^ > a D {A, b, c) \\A v .(x* - x)\\ . 

Lemma 7.3. For x a feasible point for a bounded linear program specified by (A, b, c), 

\\A VlU (xu - xu)\\ > 7(A, b, c) \\xjj - xuWoo ■ 
Proof. For any k £ U, let q be the null vector of the span of Ayu—k- Then, 

qA v ,ux = q (A Vtk x k + Av,u-k&u-k) = XkqA Vtk = x fc dist (A v ,k, Span (A v ,u-k)) ■ 

So, 

\\A v ,u{xu - x v )\\ > \qA v ,u(xu - x v )\ 

= \x% - x k \ dist (A Vik , Span (A VtU _ k )) 
> \ x l- x k\l(A b,c). 

Lemma 7.4. For x a feasible solution to a linear program specified by (A, b, c), 

c(x* — x) 
™ ~ p D (A,b,cY 

Proof. As y*A itV = c v , (y*A - c)x = {y*A.jy - c )x D . 

As every entry in y* A. jy — Cy is at least Pd(A, b, c) and x > 0, we have 

(y*A - c)x = {y*A. fi - c D )x D > D {A, b, c) Wx^ > D (A, b, c) \\x D \\ . (4) 

As y* > 0, 

cx* — cx = y* b — cx > y* Ax — cx > (3d{A, b, c) \\xfj\\ , 
where the last inequality follows from □ 

17 



□ 



Proof of Lemma \7.1\ Applying the triangle inequality, we observe 

\\A v .(x* - x)\\ > \\A ViU (xu - xu)\\ - \\A Vjf j(xfj - x D )\\ . 

We can bound the first of these terms by applying Lemma 17.31 and the second by observing 
a;^. = and H-Ay^a^H < [[.Ay^H ||scj/-||, thereby proving 

\\A v .{x* - x)\\ > j(A, b, c) \\x* v - xuWoo - \\A Vj tj\\ \\xfj\\ . 
By now applying Lemma 17.21 we obtain 

c(x* — x)> ao(A, b, c) (j(A, b, c) \\xjj - xu\\<x> ~ ||^v,E/|| \\ x u\\) > which implies 
a D (A, b, c) \\A Vjt j\\ \\xfj\\ + c(x* - x) > a D (A, b, c)j(A, b, c) \\x* v - xuW^ ■ 

As Lemma 17.41 implies c(x* — x) > (3d(A, b, c) and > L4y^ , we obtain 

1 + r C \ \\A\\] c(x* - x) > a D (A, b, c)j(A, b, c) \\x\j - x v \\ which implies 

Pr>[A,b,c) J 

c(x*-x)(l + \\A\\) ... , 

>l(A,b,c)\\x u -x u \\ oo . 



min {a D (A, b, c),/3 D (A, b, c)) 
The lemma now follows from this inequality and Lemma 17.41 which implies 

c(x* — x) 



p D (A,b,c) 



> \\Xu\\ - ll^Cflloo _ \\ X U ~ X U\ 



□ 



8 Bounds on a, (3, and 7 

For this section, we let /jla, fJ-b and /i c denote the Gaussian densities on A, b and c in Theorem l5.6l 
For an index j or set of indices V, we let fj,^. and Hb v denote the induced distributions on bj 
and by, and we extend this notational convention to sub-matrices of A and sub-vectors of c. 

The idea behind our proofs of Lemma 16.21 16.31 and 16.41 is that for any configuration of A, b and 
c in which a, (3, or 7 is small, there are many nearby configurations in which the term is not 
too small. As Gaussian densities do not fall off too quickly, this nearby configuration will have 
approximately the same probability as the original. To make this idea rigorous, we establish 
mappings pairing configurations in which these terms are small with configurations in which 
these terms are not. We then use these mappings to show that the Gaussian probability of the 
configurations in which the terms are not small is much larger than those in which they are. 

To show that it is unlikely that (3p is small, we hold A, y*, c, and x* constant, and map those 
bj's that are close to Aj -x* to be a little further away. To show that it is unlikely that ap 
is small, we hold A, y* and c constant, and map small non-zero entries of x* to larger values 
while simultaneously mapping the entries of b to preserve the tight constraints and maintain 
slack in the others. To show that it is unlikely that 7 is small, we hold x* , y* , and the slack 



18 



components of b and c constant. We then vary Ayu slightly, changing by and Cjj accordingly. 
As each slight motion described only induces a slight motion in the other components, we can 
prove that each configuration obtained has similar probability. 

To turn these intuitive arguments into proofs, we need four tools: 

1. a bound on the smoothness of the Gaussian density, 

2. a bound on the probability that a random variable is small given that its density is smooth 
near zero, 

3. a lemma making rigorous the change of variables implicitly used in the intuitive arguments, 
and 

4. a proof that the probability of an event can be bounded by the maximum of its probability 
over the sets in a partition of its probability space. 

Each of these tools is relatively simple, and the last should be obvious for finite partitions. The 
bound on the smoothed complexity of the simplex method STOl] uses each of these tools along 
with some others. It is our hope that the reader would have an easier time understanding the 
proofs in jSTOlj after having read this section. 

We now develop these four tools, and at the end of the section apply them to the proofs of the 
bounds on a, (3 and 7. 

We make use of the following elementary bound on the smoothness of Gaussians: 

Lemma 8.1 (Smoothness of Gaussians). Let ^{x) be a Gaussian distribution in H n of 
variance a 2 centered at a point of norm at most 1. 7/dist (x, y) < e < 1, then 



^->e 

Proof. Let x be the center of the distribution. We compute 

Mj/) = e ^(ll!/-i|| 2 -ll*-i|| 2 ) 
H{x) 



-1 

> e^ 7 


((\\y-x\\ + \\x-x\\) 2 -\\x-x\\ 2 ) 


by the triangle inequality 


-1 

= e^ 1 


(2|| 2 /-x||||x-i|| + ||;/-a ; || 2 ) 




-1 

> 


(2e||x-x||+e 2 ) 




-1 

> e^ 7 


(2e(|M| + l)+c 2 ) 


as \\x\\ < 1 


-1 

> 


(2e(||«B||+l)+e) 


as e < 1 


< 


11*11+2) 




> e 


<7 2 . 





□ 



19 



We remark that this lemma is the only fact about Gaussian random variables used in this paper. 
Thus, one could obtain results of a similar character for any distribution that satisfies properties 
similar to those derived for Gaussian random vectors above. 

The argument by which we obtain probability bounds from comparing configurations is encap- 
sulated in the following lemma, which is used in each of the three proofs. This lemma essentially 
says that if a distribution of a random variable is relatively flat near a point, then the variable 
is unlikely to lie too close to that point. 

Lemma 8.2 (Smooth distributions unlikely small). Let x be a real random variable dis- 
tributed according to density p such that there exist constants a and c for which 



p(x') 

< x < x < a implies — — — - > c. 

p(x) 



Then, for e < a, 
In particular, 



Pr [x 6 [0,e]\x G [0, a]] < 



Pr [x E [0, el] < — . 

ca 



e 

ca 



Proof. From the definition of conditional probability, we have 

Pr[xe [0,e]|x€ [0,a]] = j° ■ 

Setting y = (e/a)x, we compute 

p(x)dx=(a/e) p({a / e)y) dy > {a / e) I cp{y) dy . 
Jo Jo 

From which the lemma follows. □ 



For example, we can use the previous lemma to derive a bound on the probability that a Gaussian 
random variable is greater than t + e given that it is greater than t: 

Lemma 8.3 (Comparison of Gaussian tails). Let x be a Gaussian random variable of 
variance a 2 < 1 and mean of absolute value at most 1. For e > 0, r > 1 and t < t, 

Pr \x < t + e \x > t < -^e~^~ and Pr \x > t + e \x > t] > 1 kC~^~ . 

o~ L 1 J a z 

Proof. It suffices to prove the first bound. Let p be the density function of x. Let a = cr 2 /r < 1. 
For e > a the lemma is vacuous. For e < a, we will show that 

; t 1 ^') _ e ( T + 3 ) 

t<x<x'<t + a implies — r— > e ^ , (5) 

p[x) 

and then apply Lemma |8.2I to finish the proof. For t < —1. (p)jl is trivial as p is monotone 
increasing on [t, t + a]. For t > —1, we have ||x|| < r + 1 so (jSJ follows from Lemma 18. II □ 



20 



Finally, we note that our intuitive explanation of the proofs of Lemmas 16 , 2116.31 and 16 . 41 implicitly 
used a change of variables: instead of reasoning in terms of the variables A, b and c, we found 
it more convenient to think of x* and y* as quantities to fix or vary. We now introduce the 
machinery that enables us to reason in terms of these variables. We begin by observing that for 
any sets U and V, not necessarily the combinatorial type of (A, b, c), we can introduce variables 
x v and y v , not necessarily the optimal primal and dual solutions, and define 

by = A VyU x\j and cjj = y v A V)U . 

We can then compute probabilities in these new variables by observing that the joint density of 
A, x* v , y* v , b v , and c v is 



VAi^^bviAv^x^^iyyAvv)^ (b v )^ c (c )det (A 



v,u) 



To see why this is true, recall that probabilities are best understood as integrals, and that the 
probability of an event £ (A, b, c) is 



[£(A, b, c)\ (j, A (A){j, b (b)fj, c (c) dA db dc 



(6) 



A,b,c 



To express this integral in the new variables, we first compute the Jacobian of the change of 
variables, which is 



so, 



dA db dc 



det ( d{A, by, Cjj, by, cu) 
\d(A, by,c D ,xij,yv) 

d(A, by, Cjj, b v , cu 



det {A v ,uf 



det 



d(A, b v , c v ,x v ,yy) 



dA dby dcjj dx*y dy\ 



V 



det (Ayjj) dA dby dc v dx v dy 



V ! 



and 



A,by ,Cfj ,y v 



[£(A, b, c)]fx A (A)fx bv (A v ,ux u )ii cu {y v Av,u)^by{b v )fj 1C0 (c u )det (A v ,uY 



dA dby dcjj dx v dy 



V 



While we can define this change of variables for any sets U and V, we will of course only apply 
this change of variables to programs of type (U, V). If we let Type^y^, b, c) denote the set of 
(A, b, c) of type (U, V), then we can express the probability of [£(A, b, c) and J 7 (A, b, c)] as 



A,b,c:F{A,b,c) 



[£(A, b, c)] fj, A (A)fJ, b (b)(j, c (c) dA db dc 



E 



v JA,b,c:Type u v (A,b,c) 



[£(A, b, c)] ix A (A)fi b (b)n c (c) dA db dc , 



and then apply the change of variables corresponding to (U, V) to evaluate the integral over 
Type;y y(A, b, c) on the right. In fact, in each of our proofs, we will actually bound 

maxPr [£{A, b, c)\Type uy (A, b, c)] . 



To see that this upper bounds the probability of [£(A, b, c) and J r (A, b, c)], we prove 



21 



Claim 8.4. 

Pr [£(A, b, c) and F(A, b, c)] < maxPr [£(A, b, c)| Type uv (A, b, c)] . 

Proof. 

Pr [£(A, b, c) and F(A, b, c)] = Pr [ s (A b > c ) and T yP e t/,v(A b > c )] 

= ^Pr [Type^A, 6, c)] Pr [£(A, 6, c)|Type [7 y(A, 6, c)] 

< maxPr [f (A, 6, c)|Type [7)y (A, 6, c)] , 

as Euy Pr [Type^y (A, b, c)] < 1. □ 

We summarize this discussion in the following lemma: 

Lemma 8.5 (Change of variables). Let £(A, b, c) be an event. Then, 

Pr [£(A,b,c) and F(A,b,c)} 

A,b,c 



< max Pr [£(A, b, c)\A v x* < by and y*A D > c D ] , 

f7,y A,x* ,y* ,bv,Cjj 

where A, x* , y* , by and c-q have joint density 

HA(A)n bv (A VjU x^)fi Cu (y v A V:U )n bv (b v )fi Co (c D ) det (A v>u ) 2 . 

In fact, all of our proofs begin by fixing some subset of the variables, and then proving a 
probability bound for any configuration of the fixed variables. This amounts to proving a 
probability upper bound by dividing the probability space into a number of regions, and proving 
that the bound holds in each of these regions. Formally, we are using the fact: 

Proposition 8.6 (Upper bound by max of probabilities). Let X and Y be random vari- 
ables distributed according to an integrable density function fi(X,Y) and let £(X,Y) be an event. 
Then 

Pr [£(X, Y)} < max Pr [£(X, Y)\Y = y) ^ maxPr [£(X, Y)\Y] . 

Proof. By Tonelli's Theorem, we have 

Pr [£(X, Y)] = [ [£(X, Y)] fx(X, Y) dX dY 

X < Y JX,Y 

= J (J P y )] Y) dX \ dY 

' ! u(X Y)dx]( JxW>Y)MX,Y)dX \ 
v Jx^ Y)dX ) [ (f x »(X,Y)dX) J dY 



J^j x H(X,Y)dX^ (P x T[£(X,Y)\Y]^j dY 



<maxPr[£(X,Y)\Y], 



22 



as 



J (^J n(X,Y)dX^j dY = 1. 



□ 



Having established these tools, we now proceed with the proofs of Lemmas 16.21 16.31 and 16.41 
Proof of Lem,m,a \()Jft (Probability of small (5). By Lemma l8.5| it suffices to bound 



max Pr 

U,V A,x* ,y* ,b^,Cfj 



P P (A,b,c) < 



Ay .x* < by and y* A. (j > c 



max(l, \\A\\ [| sb* | 

By Proposition 18.61 it suffices to prove that for all U, V, A, x*j, y v and c U} 

Pr [3j € V : bj -A u x* < e' \ V? : bj - A jt .x* > 0] 
b v 

< ^ Pr [bj - Aj.x* < e' | Vj : bj - Aj.x* > 0] 

j&v 3 

= ^Vr[bj - Aj.x* <e' \ bj-Aj.x*>0] 

jeV 3 



u 



J2^[bj<Aj,x* + e' | bj>Aj,x*} 



< 



me'(\\A\\\\x*\\) »M 



by Lemma 18.31 



Setting e = e' max (1, ||A|| ||sc* ||), and observing that the lemma is vacuously true for e > a 2 /4m, 
we deduce 

Pr [3j eV:b 3 - A jtl x* < e | Vj : bj - Aj,x* > 0] < ™e£ < ^ < 



<y 



o- 



for e < a 2 /Am. 

Proof of Lemma \6.4\ (Probability of small j). By Lemma 18.51 it suffices to bound 



□ 



max Pr 

U,V A,x^,y v ,b v ,c 



j(A,b,c) < 



l + ||a;*|| 2 + ||y*|| 2 ) (Pll +3) 



Ay .x* < by and y* A. v > Cj 



By Proposition 18.61 it suffices to prove that for all U, V, Ayjj, b v , Cfj, x* and y*, for which 
Av,U x U — ana - Vv^V,U — c \Ji 



Pr [y(A, b,c)<e]< 
Av.u 



e^e ( 1 + ||£c*|| 2 + ||2/*|| 2 ) (Pv,HI+3) 



(7) 



23 



where we note that having fixed Ayjj, b v , eg, x* and y* , the induced distribution on Ay,u is 
I^A v , u ( A v,u)tJ'b v (Av,uXu)fJ'c u (yvAv,u)det {Ay^f . 

To prove l[7]). we show that for all k £ U and all Ay t jj_ k , 

ee(l + ||z*|| 2 + b*|| 2 ) (\\A V;U \\ + 3) 
Pr [dist (A v . k , Span {A VjU - k )) < e] < — ^ ^ (8) 

and apply a union bound over k £ U. Having fixed Av,u-k, we may express Ay :k as a + tq 
where a £ Span (Ay ! fj_ k ), 9 is a unit vector orthogonal to Span (Ay \u-k) an d i € M. With 
this representation, we have \t\ = dist (Ay jk , Span (Ayjj_ k )) an d det (Ay t u) = ct, where c is 
some constant depending only on Ay^u-k- 

By the symmetry of q with — q, we can prove (JSJ) by bounding the probability that t is less than 
e given that t is at least 0. Thus, we prove (jSJ) by observing H^Ay^H > HAyjj-fc, a\\ and showing 

ee (l + ||z:*|| 2 + \\y*\\ 2 ) (\\A VtU - k ,a\\ + 3) 

max Pr [t < e\t > 0] < — ^ ^ (9) 

aeSpan(A ViC/ _ fc ) * a 

where the induced distribution on t is proportional to 

p(*) = f MAv,* ( a + *«)M6v (Aw-^tz-fc + (a + tq)x*)/j, Ck (y* v (a + tg)) t 2 . (10) 

We now set 

a 



a 2 



3(l + ||;c*|| 2 + ||y*|| 2 ) (Pv,i;-fc,o|| + 3) 
and prove 

< t < t' < a implies > 1/e, (11) 

from which @ follows by Lemma 18.21 
To prove (|11|). we observe 

1. As dist (a + i'g, a + tg) < t' — t < a < 1, we may apply Lemma 18. II to show 

flA v k {a + t' q) -c»(||a+tg||+2) -a(||g||+3) , ,., 

'■ — r- > e ° 2 > e > e ' . 

H Avk (a + tq) 

2. As 

llAyc/.fcaj^.fc + axfc+tgXfcH < (\\A v ,v-k, *|| + «) II^MI ■ 

and 

dist (^y )C /_ & a;^_ fe + a4 + tg4, Ay )[7 _ fc a;^_ fc + ax* k + i'g4) = (i' -t)x%< ax%, 
Lemma 18.11 implies 

Hb v {A v ,u-kX*jj_ k + (a + t'q)x*) ^ -^(( |Ki/- fc; HMlKII+ 2 ) 



Hh v (A VtU - k x*rr_ k + (a + tq)x*) 



> e > e~ 1/3 . 



24 



3. As \y*{a + tq)\ < \\y*\\ (||o|| +t \\q\\) = \\y*\\ (||a|| + a), and 

dist (y*(a + tq), y*(a + t' q)) = (t' -t)\y*q\<a \\y*\\ , 
Lemma 18.11 implies 

/x Cfc (y v (a + t'q)) > e Hklk|WMi3 > g _ 1/3 
Vc k {y* v (a + tq)) ~ 



Proof of Lemma \6.2\ (Probability of small a). By Lemma l8.5| it suffices to bound 



□ 



max Pr 

U,V A,x* ,y* ,by,Cfj 



a P (A, b, c) < 



Ay .x* < b v and y* A. y > c v 



(|L4||+2) 2 (||^|| + l) 

By Proposition Eini it suffices to prove that for all U, V, A, y v and c U} such that y v A vu > c v , 

8en(m + 1) 



a(A, b, c) < 



(P||+2) 2 (||^|| + l) 



Av,u x u — by 



< 



(12) 



where we note that, fixing U, V, A, y* and Cjj and conditioning upon Ay yXy < by, the 
induced density on x^ is proportional to 



(Ayux^j) Yl Pr [bj > A jtU xlj} . 



To prove (|T2*)) , we show 

V iec/ V x& _ ! Pr [x* < e\A v u x^ < by] < 
which implies 

max max Pr 

i&J x* u _ i X* 

We then observe 



8e(m + l)(|L4|| + 2) 2 (Hx^ll + 1) 



x i < 



(P||+2) 2 (||^_ i ||+l) 



o~ 



A-v,u x u — by 



(13) 



< 



8e(m+ 1) 



o~ 



77--T — - — n — r < ttttt, — TTTTi n — v and union bound over i G U. To prove 

(||A||+2) 2 (|^_ i ||+l) - (11411+2)^(11^11+1) P 

(f X3|> . we first note that having fixed i £ U and x^ J _ i , the induced density on x* is proportional 

to 

*n def 



p(x*) = ^(Ayp-iXu^ + AyiX*) Yl Pr [bj > Ajp-iXu-i + A i 



We now set 



a 



a 



4(m + l)(||A|| + 2) 2 (||^|| + 1) 



< 1, 



and prove that 



o(x') 

< Xi < x\ < a implies > 1/2, 



(14) 



25 



from which (|13|) follows by Lemma 18.21 

To prove (|14|) . we note that for < X{ < x\ < a, 

dist [Av^-iXu-i + Ay,iXi, Av,u-iXu_i + Av,ix'j) = \\Av,i\\ - Xi) < ||A|| a < 1, 

and 

^A v ,u-iXu-i + A v,iXi\\ < \\A ViU -i\\ ||a;^_j|| + \\A v>i \\ Xi < \\A\\ (||a;^_j|| + l) . 
So, by Lemma I5~TI 



in, 



> e ^ > e > 1 



Vb v (A V:U _ i x* u _ i + A Vti Xi) ' 4(m+l)' 

by our choice of a. 

We can also apply Lemma to show that for each j V, 

Pr bj [6, > Aw-iX^ + A hl x[] > i {\\A\\ + l)) \\A\\ a ^MH-j;^)^ 



Pr fe . [6j > A jiC7 _jX^_ i + ^j,iXi] a 2 

_ 2(P||(||^||+l))P|| n 
2 



(7 



1 

> 1 



2(m+ 1)' 

by our choice of a. Thus, we may conclude 

n(x'A ( 1 \ / 1 \ m m + 1 

> I-77 \ ) ( — —-. > 1 - = 1/2. 



p{xi) - V 4(m + l)7v 2(m + l)y ~ 2(m + 1) 

□ 



9 Connection to Smoothed Analysis of Simplex Method 

The analysis of the simplex method in |ST01| is broken into two parts: a combinatorial bound 
on the smoothed size of a two-dimensional shadow of a linear program, and an analysis of a two- 
phase algorithm that uses this combinatorial bound as a black-box. The analysis of termination 
in this paper is closely related to the smoothed analysis of the shadow size. The intuition behind 
this analysis is that if the angle at a corner of the polytope of feasible points is bounded away 
from being flat, then the simplex method should make significant progress as it traverses this 
corner. The measure of angle used in |ST01| is approximately ^y(A, b, c), at least for the corner 
optimizing the linear program. The size of the shadow, which upper bounds the number of 
steps taken by the simplex method, is then bounded by varying c over the plane onto which the 
shadow is projected. 

The main technical lemma of the shadow-size analysis in STOl], Lemma 4.0.11 (Angle bound), 
essentially says that for every b, c and A, the probability that a Gaussian perturbation A of 
A has up (A, b, c)^f(A, b, c) < e is linear in e, with a coefficient polynomial in n, m and a. 



26 



The most significant difference between this statement and the analysis in Lemma 16.21 and 16.41 
is that in |ST01| . b and c are not perturbed. This restriction seems necessary to apply the 
combinatorial bound in a black-box fashion in the analysis of the two-phase simplex algorithm. 
Also note that the simplex method analysis is for linear programs without the constraint x > 0. 

Otherwise, the arguments in this paper have a flavor very similar to those of jSTOlj . which 
mainly use the four techniques outlined in Section |H] of this paper; although, that paper uses 
more elaborate changes of variables. One probabilistic technique used in |ST01| that is absent 
in this paper is the Combination Lemma ST01, Lemma 2.3.5] which allows one to obtain tight 
bounds on the probability that a product of parameters is small from bounds on the probabilities 
that the individual parameters are small. The conditions of this lemma dictate the structure 
of the proofs in |ST01| as without it one could not obtain a bound on the probability of angle 
less than e that is linear in e. Moreover, without a bound that is linear in e, one could not 
prove that the shadow has expected polynomial size. In contrast, in Lemma 16.51 of this paper 
the dependency is on e 1 / 3 . It is possible that one could reduce this dependency using the 
combination lemma, but it is not essential for the results in this paper. 

It is our hope that this paper will serve as a gentile introduction to the techniques used in the 
smoothed analysis of the simplex method. 



References 

[AC78] David Avis and Vasek Chvatal. Notes on Bland's pivoting rule. In Polyhedral Com- 
binatorics, volume 8 of Math. Programming Study, pages 24-34. 1978. 

[AJPY93] K. M. Anstreicher, J. Ji, F. A. Potra, and Y. Ye. Average performance of a self- 
dual interior-point algorithm for linear programming. In P. M. Pardalos, editor, 
Complexity in Numerical Optimization, pages 1-15. World Scientific Publishing Co., 
London, United Kingdom, 1993. 

[AJPY99] K. M. Anstreicher, J. Ji, F. A. Potra, and Y. Ye. Probabilistic analysis of an 
infeasible-interior-point algorithm for linear programming. Mathematics of Opera- 
tions Research, 24(1):176-192, 1999. 

[AKS87] I. Adler, R. M. Karp, and R. Shamir. A simplex variant solving an m x d linear 
program in 0(min(m 2 , d 2 )) expected number of pivot steps. J. Complexity, 3:372- 
387, 1987. 

[AM85] Ilan Adler and Nimrod Megiddo. A simplex algorithm whose average number of steps 
is bounded between two quadratic functions of the smaller dimension. Journal of the 
ACM, 32(4):871-895, October 1985. 

[AZ99] Nina Amenta and Gunter Ziegler. Deformed products and maximal shadows of poly- 
topes. In B. Chazelle, J.E. Goodman, and R. Pollack, editors, Advances in Discrete 
and Computational Geometry, number 223 in Contemporary Mathematics, pages 57- 
90. Amer. Math. Soc, 1999. 



27 



[BD02] Avrim Blum and John Dunagan. Smoothed analysis of the perceptron algorithm for 
linear programming. In SODA '02, pages 905-914, 2002. 

[Bor77] Karl Heinz Borgwardt. [Inter suchung en zur Asymptotik der mittleren Schrittzahl 
von Simplexverfahren in der linearen Optimierung. PhD thesis, Universitat Kaiser- 
slautern, 1977. 

[Bor80] Karl Heinz Borgwardt. The Simplex Method: a probabilistic analysis. Number 1 in 
Algorithms and Combinatorics. Springer- Verlag, 1980. 

[BS95] Avrim Blum and Joel Spencer. Coloring random and semi-random k-colorable graphs. 
J. Algorithms, 19(2):204-234, 1995. 

[DST02] John Dunagan, Daniel A. Spielman, and Shang-Hua Teng. Smoothed anal- 
ysis of interior point methods: Condition numbers. Submitted. Available at 
http : //math . mit . edu/ ~spielman/SmoothedAnalysis, 2002. 

[EA96] C. Mezaros X. Xu E. Andersen, J. Gondzio. Implementation of interior point methods 
for large scale linear programming. In T. Terlaky, editor, Interior point methods in 
mathematical programming. Kluwer Academic Publisher, 1996. 

[Gol83] Donald Goldfarb. Worst case complexity of the shadow vertex simplex algorithm. 
Technical report, Columbia University, 1983. 

[Gon88] Clovis C. Gonzaga. An Algorithm for Solving Linear Programming Problems in 
0(n 3 L) Operations, pages 1-28. Springer- Verlag, 1988. Progress in Mathematical 
Programming, N. Megiddo ed.. 

[GS79] Donald Goldfarb and William T. Sit. Worst case behaviour of the steepest edge 
simplex method. Discrete Applied Math, 1:277-285, 1979. 

[Hai83] M. Haimovich. The simplex algorithm is very good!: On the expected number of pivot 
steps and related properties of random linear programs. Technical report, Columbia 
University, April 1983. 

[IL94] D. Shanno I. Lustig, R. Marsten. Interior point methods: computational state of the 
art. ORSA Journal on Computing, 6(1):1-14, 1994. 

[Jer73] Robert G. Jeroslow. The simplex algorithm with the pivot rule of maximizing im- 
provement criterion. Discrete Math., 4:367-377, 1973. 

[Kar84] N. Karmarkar. A new polynomial time algorithm for linear programming. Combina- 
torica, 4:373-395, 1984. 

[Kha79] L. G. Khachiyan. A polynomial algorithm in linear programming. Doklady Akademia 
Nauk SSSR, pages 1093-1096, 1979. 

[KM72] V. Klee and G. J. Minty. How good is the simplex algorithm? In Shisha, O., editor, 
Inequalities - III, pages 159-175. Academic Press, 1972. 



28 



[LMS90] I. J. Lustig, R. E. Marsten, and D. F. Shanno. The primal-dual interior point method 
on the Cray supercomputer. In T. F. Coleman and Y. Li, editors, Large-Scale Nu- 
merical Optimization, Papers from the Workshop held at Cornell University, Ithaca, 
NY, USA, October 1989, volume 46 of SIAM Proceedings in Applied Mathematics, 
pages 70-80. Society of Industrial and Applied Mathematics (SIAM), Philadelphia, 
PA, USA, 1990. 

[Mur80] K. G. Murty. Computational complexity of parametric linear programming. Math. 
Programming, 19:213-219, 1980. 

[Ren88] J. Renegar. A polynomial-time algorithm, based on Newton's method, for linear 
programming. Math. Programming, 40(1 (Ser. A)):59-93, 1988. 

[Ren94] J. Renegar. Some perturbation theory for linear programming. Math. Programming, 
65(1, Ser. A):73-91, 1994. 

[Ren95a] J. Renegar. Incorporating condition measures into the complexity theory of linear 
programming. SIAM J. Optim., 5(3):506-524, 1995. 

[Ren95b] J. Renegar. Linear programming, complexity theory and elementary functional anal- 
ysis. Math. Programming, 70(3, Ser. A):279-351, 1995. 

[SegOO] Yoav Seginer. The expected norm of random matrices. Combinatorics, Probability 
and Computing, 9:149-166, 2000. 

[Sma83] S. Smale. On the average number of steps in the simplex method of linear program- 
ming. Mathematical Programming, 27:241-262, 1983. 

[ST01] Daniel A. Spielman and Shang-Hua Teng. Smoothed analysis of algorithms: Why the 
simplex algorithm usually takes polynomial time. In Proceedings of the 33rd Annual 
ACM Symposium on the Theory of Computing (STOC '01), pages 296-305, 2001. 
available at http://arxiv.org/abs/cs.DS/0111050 . 

[Tod86] M.J. Todd. Polynomial expected behavior of a pivoting algorithm for linear comple- 
mentarity and linear programming problems. Mathematical Programming, 35:173- 
192, 1986. 

[Tod94] M. J. Todd. A lower bound on the number of iterations of primal-dual interior- 
point methods for linear programming. In G. A. Watson and D. F. Griffiths, editors, 
Numerical Analysis 1993, pages 237-259. Longman Press, Harlow, 1994. 

[TY96] M. J. Todd and Y. Ye. A lower bound on the number of iterations of long-step and 
polynomial interior-point methods for linear programming. Annals of Operations 
Research, 62:233-252, 1996. 

[Vai90] P. M. Vaidya. An algorithm for linear programming which requires 
0((m + n)n 2 + (m + n) 1,5 nL) arithmetic operations. Mathematical Programming, 
47:175-201, 1990. Condensed version in : Proceedings of the 19th Annual ACM Sym- 
posium on Theory of Computing, 29-38, 1987. 



29 



[Wil65] J. H. Wilkinson. The Algebraic Eigenvalue Problem. Oxford University Press, 1965. 

[Wri96] S. Wright. Primal- Dual Interior- Point Methods. Society for Industrial and Applied 
Mathematics (SIAM), Philadelphia, Pa, 1996. 

[Ye97] Yinyu Ye. Interior Point Algorithms. Wiley-Interscience, 1997. 



30