Skip to main content

# Full text of "Smoothed Analysis of Interior-Point Algorithms: Termination"

## See other formats

```Smoothed Analysis of Interior-Point Algorithms: Termination

Daniel A. Spielman * Shang-Hua Teng t

Department of Mathematics Department of Computer Science

Massachusetts Institute of Technology Boston University and

Akamai Technologies Inc.

February 1, 2008

Abstract

We perform a smoothed analysis of the termination phase of an interior-point method.
By combining this analysis with the smoothed analysis of Renegar's interior-point algorithm
in |DST02j , we show that the smoothed complexity of an interior-point algorithm for linear
programming is 0(m 3 \og(m/a)). In contrast, the best known bound on the worst-case
complexity of linear programming is 0(m 3 L), where L could be as large as m. We include
an introduction to smoothed analysis and a tutorial on proof techniques that have been
useful in smoothed analyses.

1 Introduction

This paper has two objectives: to provide an introduction to smoothed analysis and to present
a new result — the smoothed analysis of the termination of interior-point algorithms. We begin
with an intuitive introduction to smoothed analysis (Section 11.1(1 followed by a more formal
introduction (Section II .2(1 . After introducing necessary notation in Section |5J we survey the
complexity of interior-point algorithms (Section |3J), emphasizing the role of Renegar's condition
number (Section0J. We then explain the termination algorithm (Section^}) present its smoothed
analysis at a high level (Section^)), and then delve into the geometric (Section^) and probabilistic
(Section [SJ) aspects of its analysis. In Section |H1 we include a tutorial of the fundamental
techniques used in this work and in the smoothed analysis of the simplex method |ST01] . Finally,
in Section EH we explain how the analysis of termination is related to the analysis of the simplex
method.

1.1 Intuitive Introduction to Smoothed Analysis

Folklore holds that most algorithms have much better performance in practice than can be proved
theoretically. This is partially due to the lack of a theoretical definition of "practice" , partially

'Partially supported by NSF grant CCR-0112487. spielman@math.mit.edu

f Partially supported by NSF grants CCR-9972532, and CCR-0112487. steng@cs.bu.edu

1

due to the approximations made in most theoretical analyses, and partially due to the dearth of
performance measures considered in theoretical analyses. In jSTOlj . we suggested that smoothed
analysis might provide a theoretically analyzable measure of an algorithm's performance that
would be more predictive of its behavior in practice. .

Algorithms are typically analyzed through either worst-case or average-case complexity. Worst-
case analyses may disagree with practical experience because they are dominated by the most
pathological input instances. For many algorithms, these pathological inputs are rarely, if ever,
encountered in practice, and are only known from lower-bound proofs. In an attempt to create
a less pessimistic analysis, researchers introduced average-case analysis, in which one defines a
probability distribution on input instances and then measures the expected performance of an
algorithm on inputs drawn from that distribution. A low average-case complexity provides some
evidence that an algorithm may run quickly in practice. However, this evidence is not conclusive
as the inputs encountered by the algorithm in practice may not look like random inputs.

This discrepancy between theoretical and experimental analysis manifests itself in the analysis
of linear programming algorithms. The simplex method for linear programming is known to per-
form very well in practice, but to have exponential worst-case complexity K \ 1 721 [Mur80l FGS79 ,
G 0I8 3~| lAC 78 1 IJer 73| I A Z 99] . On the other hand, it is known to have polynomial average-case com-
plexity under a number of notions of average-case |Bor80[ IBor77| ISma83| IHai83| IAKS87| [AM85 ,
Tod86,. Interior-point methods are known to have polynomial worst-case complexity Kar84 .
However, their performance in practice is much better than their worst-case analyses would sug-
gest |IL941 ILMS901 IEA96 . It has been shown that the average-case complexity of interior-point
methods is significantly lower than their worst-case complexity |A.)PY93lfI.IPY99| (the term L
is replaced by O(logn)); but these analyses are still a factor of approximately y/n off from that
observed in practice.

Smoothed analysis provides an alternative to worst-case and average-case analyses, and also
attempts to circumvent the need for a theoretical definition of "practical inputs" . The smoothed
complexity of an algorithm is defined to be the maximum over its inputs of the expected running
time of the algorithm under slight perturbations of that input. The smoothed complexity is
then measured as a function of the input size and the magnitude of the perturbation. While
many notions of perturbation are reasonable, most results have been obtained for Gaussian
perturbations. The assumption that inputs are subject to perturbation is reasonable in many
circumstances: in many real-world numerical and geometric applications, data are derived from
experimental and physical measurements and are therefore subject to errors |Wil651 paragraph
2, pp. 62]. Perturbations can also be used to heuristically model the arbitrary decisions that
effect to formation of inputs that are presented to algorithms.

Two important aspects of smoothed analysis are:

• Smoothed analysis interpolates between worst-case and average-case analysis: By letting
the magnitude of the random perturbation to the data (e.g., the variance of the Gaussian
noise) become large, one obtains the traditional average-case complexity measure. By
letting the magnitude of the random perturbation go to zero, one obtains the traditional
worst-case complexity measure. In between, one obtains a model corresponding to noise

1 We remark that a similar framework for discrete problems was introduced by Blum and Spencer |BS95|

2

in low-order digits of the input.

• The smoothed complexity of an algorithm provides an upper bound on the expected com-
plexity of the algorithm in every neighborhood of inputs. That is, if the smoothed com-
plexity of an algorithm is low, then it will run quickly on inputs drawn from any small
neighborhood of inputs.

Thus, if the inputs presented to an algorithm in practice are subject to perturbation, the
smoothed complexity of the algorithm should upper bound the practical performance of
the algorithm.

In jSTOlj . we introduced smoothed complexity by proving that a particular variant of the
shadow-vertex simplex method has polynomial smoothed complexity.

1.2 Formal Introduction to Smoothed Analysis

The inputs to most numerical and geometric problems may be viewed as points in a vector
space. For example, an m by n real matrix can be viewed as a vector in IR mn . Similarly, a set
of n points in d dimensions can be viewed as a vector in IR .

The most natural notion of perturbations of vectors in a real vector space is that of Gaussian
perturbations. Recall that a Gaussian random variable with mean and variance a 2 has density

1 -x 2 /2a 2

and that a Gaussian random vector of variance a 2 centered at the origin in M n , denoted M(0, cr 2 ),
is a vector in which each entry is a Gaussian random variable of variance a 2 and mean 0, and
has density

1 c -IHl 2 /2q2

Definition 1.1 (Gaussian perturbation). Let x G IR™. The Gaussian perturbation of x of
variance a 2 is the random vector x = x + g, where g is a Gaussian random vector of variance
a 2 , centered at the origin o/M".

The Gaussian perturbation of x may also be described as a Gaussian random vector of variance
a 2 centered at x.

Using the notion of Gaussian perturbation, we define the smoothed value of a function:

Definition 1.2 (Smoothed value). Let f be a non-negative function on H n . The smoothed
value of f with respect to Gaussian perturbations of variance a 2 is given by

m f E 9 ^(0,^) [/(* + 11*11 9)\

Note that in this definition we multiply the perturbation g by so that a represents the
magnitude of the perturbation relative to the data.

3

Definition 1.3 (Smoothed complexity). Let A be an algorithm whose inputs can be expressed
as vectors in ]R n and let T A (x) be the running time of algorithm A on input x. Then the
smoothed complexity of algorithm A is

C A (n,a) = maxE 9 ^ (0i(j2) [T A (x + \\x\\ g)] .

In |ST01| . Spielman and Teng consider the complexity of a particular two-phase shadow- vertex
simplex method on linear programs of the form

■ • T

maximize c x

subject to Ax < b, (1)
where A is an m-by-n matrix, b is an m-vector, and c is an n-vector. They prove:

Theorem 1.4 (Spielman- Teng). There is a two-phase shadow-vertex simplex method with
time complexity T(A, b, c) such that for every m-vector b and n-vector c, the smoothed com-
plexity of the algorithm,

max Eg

Aen mxn

T A +

A

G,b,c

is polynomial in m, n, and 1/a, independent of b and c, where G is a Gaussian random m by
n matrix of variance a 2 centered at the origin.

One need not limit smoothed analysis to measuring the expected complexity of algorithms in
various neighborhoods. It is quite reasonable to prove other facts about the distribution of
running times when the expectation does not exist, or when much stronger bounds can be
proved. For example, Blum and Dunagan BD02 prove

Theorem 1.5 (Blum-Dunagan). Let a%, . . . ,a n be Gaussian random vectors in JR d of variance
a 2 < l/(2d) centered at points each of norm at most 1. Then, there exists a constant c such that
the probability that the perceptron algorithm for linear programming takes more than cd - ^ '•"^
iterations is at most 5.

2 Notation and Norms

Throughout the paper, we use bold letters such as b and x to denote vectors, capital letters
such as A and G to denote matrices, and lower case letters to denote scalars. In any context in
which the vector b is present, bj denotes the j'th component of b. For a set, V, we let by denote
the vector obtained by restricting b to the coordinates in V. When indexing and constructing
matrices, we use the conventions of Matlab. Thus, A.jj denotes the matrix formed by taking
the columns indexed by U, and Ay,u denotes the sub-matrix of rows indexed by V and columns
indexed by U. For sets, U and V, we let U and V denote their complements. We also let V, U
denote the set of pairs (i,j) (V,U); for example, we let Ay-jj denote the set of entries of A
not in Ay^j. For a matrix A and a column vector b, we let [A, b] denote the matrix obtained
by appending column b to A.

4

For an event, £, we let [£] denote the random variable that is 1 when £ is true and is otherwise.
We use of the following vector norms:

• IMIi = Si \ x i\i and

• 1 1 3 ' I loo = max i

and note that

||x||„ < llxll < llxll-, .

II Moo — II II — II •"111"

We also use the following matrix norms:

• \\A\\ = Px|| / ||x||,

• Plloo = max ^o ll^lloo / ll^lloo' and

• \\A\\ F = ^/trace(yl T 'A), the square root of the sum of the squares of entries in A.
We note that

• Plloo = maX i 111'
. PIU^PH,

• \\A\\ < \\A\\ F , and

• for sets U and V, \\Auy\\ < \\A\\.

3 Complexity of Interior Point Algorithms

A linear program is typically specified by a matrix A together with two vectors b and c, where
where A is an m-by-n matrix, c is an n-dimensional row vector, and b is an m-dimensional
column vector. There are several canonical forms of linear programs. For the analyses in this
paper, we will consider linear programs of the form

max cx such that Ax < b, x > 0,

with dual

minyb such that yA > c, y > 0.
We will assume throughout that m > n.

If they exist, we denote the solutions to the primal and dual by x* and y*, and note that x* is
an n-dimensional column vector and y* is an m-dimensional row vector.

A linear programming algorithm should: (1) determine whether or not the linear program is
feasible or bounded; and, (2) if the program is feasible and bounded, output a solution. One can

5

either insist that the solution be a precisely optimal solution to the linear program, or merely a
feasible point at which the objective function is approximately optimized.

The best bounds on the worst-case complexity of interior point methods, and for linear program-
ming in general, were first obtained by Gonzaga |Gon88j and Vaidya |Vai90| . who showed how
to solve linear programs in 0(m 3 L) arithmetic operations 2 , where m > n and L is a parameter
measuring the precision needed to perform the arithmetic operations exactly, and which here
also appears in the number of arithmetic operations performed. The definition of L varies in
the literature: Khachiyan Kha79 , Karmarkar Kar8|J, and Vaidya |Vai90| define L for integer
matrices A to be some constant times

log(largest absolute value of the determinant of any square sub-matrix of A)

+ lo g(ll c lloo) + lo g(ll b lloo) + log(m + n).

Under this definition, L is not efficiently computable, and unless A comes from a very special
class of matrices, it is difficult to find L below Q(n). Others use cruder bounds such as the total
number of bits in a row of the matrix or the total number of bits in the entire matrix Wri96 .

To understand the time complexity of interior point algorithms, we note that they are typically
divided into three phases:

[Initialization]: In this phase, the algorithm determines whether or not the program is
feasible and bounded; and, if it is feasible and bounded, returns a feasible point.

[Iteration]: In this phase, the algorithm iteratively finds feasible points on which the
objective function becomes increasingly closer to optimal.

[Termination]: In this phase, the algorithm jumps from a feasible point that is close to
optimal to the exact optimal solution of the linear program.

Of course, if one merely desires an approximate solution to the linear program, then one can
skip the termination phase. However, the dependency on L appears in both the initialization
and termination phase. So, the worst-case complexity of linear programming algorithms is not
decreased by merely asking for an approximate solution.

The kernel of an interior-point algorithm is the iteration phase, in which feasible points of
increasing quality are computed. A typical measure of quality in a primal algorithm is the
optimality gap between the objective function at the current point and the optimal, while in a
primal-dual algorithm it is the duality gap between the current primal and dual feasible points.
In either case, one can prove that after k iterations the gap decreases by the multiplicative

factor ^1 — -j=^j , for some constant c |Ren88[ fVai9f)l lYe97| . If performed carefully, each of

these iterations has complexity 0(m 5//2 ) Gon88 . Therefore, the total number of arithmetic
operations required to reduce the gap from R to e is 0(m 3 log(i?/e)). The worst-case complexity
bounds come from the facts that a typical interior-point algorithm discovers a feasible point with
initial gap bounded by R = 2°^ in the initialization phase, and requires a point with gap less
than e = 2~°^ to start the termination phase.

2 Vaidya's algorithm is somewhat faster as its complexity is 0((m + n)n 2 + (m + n) 15 n)L

6

In practice, the speed of interior point methods is much better than that proved in their worst-
case analyses |IL941 ILMS901 lEA96j . This difference in speed seems to have two sources: first,
the upper bound of L is overly pessimistic; and, second, the improvement made at each iteration
is typically much better than ^1 — ■ However, we note that Todd |Tod94j and Todd and

Ye |TY96j have exhibited linear programs in which f2(n 1//3 ) iterations are required to improve
the gap by a constant factor.

In this paper, we perform a smoothed analysis of a simple termination phase for interior point
methods. By combing this analysis with the analysis of the first two phases of Renegar's interior
point algorithm Ren95b in DST02 , we obtain an interior point algorithm with smoothed
complexity 0(m 3 log(m/cr)). Essentially, this analysis replaces the dependency on L in the
initialization and termination phases with a dependency on log(m/<r). We conjecture that
one can improve this smoothed complexity estimate by proving that the smoothed number of
iterations taken by an interior point method is less than 0(y/m log (m/cr)).

Renegar |Ren95b( IRen95a( IRen94| defined a condition number C(A, b, c) of a linear program,
and developed an algorithm for the initialization of an interior point method that runs in time
0(m 3 log(C(^4, b, c))) and returns a feasible point with initial optimality gap R < 0(mC(A, 6, c)).
Applying a primal iteration phase to this feasible point, one obtains an algorithm that af-
ter 0(\/mlog(mC(A, b, c))/e) rounds and 0(m 3 log(mC(A, &, c))/e) arithmetic operations pro-
duces points with optimality gap at most e. Renegar's condition number will be discussed further
in Section |IJ

Dunagan, Spielman and Teng DST02 perform a smoothed analysis of Renegar's condition
number and prove:

Theorem 3.1 (Dunagan-Spielman-Teng). Let A be an m-by-n matrix for m > n, b an

A,b,

< 1, and let A, b and c be the Gaussian

F

m-vector, and c an n-vector for which
perturbations of A, b and c of variance a < 1/y/mn. Then,

E AAc [log(C(A b, c))\ < 0(\og{m/a)).

Combining this analysis with that of Renegar, we find that the smoothed complexity of finding
an e-optimal solution to a linear program is 0(m 3 log (m/cre)).

In Section [SJ we define a simple termination algorithm that takes 0(m 3 ) arithmetic operations.
We define 5(A, b, c) to be the greatest number such that cx* — cx < 5(A, b, c) implies that the
termination algorithm is successful. Thus, after 0(^/mlog(mC (A, b, c))/6(A, b, c)) iterations,
and 0(m 3 log(mC(A, b, c))/6(A, b, c)) arithmetic operations, one can apply the termination
phase to find the exact solution to the linear program. Like Karmarkar K ar84j . we handle the
technical difficulty that the algorithm does not know C(A,b,c) or 5(A,b,c) by periodically
attempting to terminate, but only once every y/n iterations so as not to increase the complexity
of the algorithm.

In Theorem 15.61 proved over Sections H3 and |H1 we show that the smoothed value of
max (1, log (1/6(A, b, c))) is O (log (m/cr)). We thus prove:

Theorem 3.2 (Smoothed Complexity of IPM). Let A be an m-by-n matrix for m >n , b

an m-vector, and c an n-vector for which

A, b, c

< 1, and let A, b and c be the Gaussian

F

7

perturbations of A, b and c of variance a < 1/y/mn. Let T(A,b,c) denote the complexity
of Renegar's interior point algorithm with the periodic application of the termination procedure
described in Section^ Then,

E AAc [T(A, b, c)\ < 0(m 3 log(m/a)).

While this is the statement of the complexity that is most natural for our proof techniques, we
note that it is not exactly the form specified in Definition 11.31 The difference comes from the

upper bounds on a and

A, b.

in the statement of the theorem. As the behavior of the

interior point methods are unchanged by multiplicative changes to A, b and e, only the upper

bound on a is significant: if
A, b, c

A, 6,

> 1, then one can scale down A, b, c, and a to make

= 1. One could adjust Theorem 13. 21 in two ways to handle a > 1/y/mn: one could

either extend the proofs, or one could use Theorem 13.21 as a black-box and derive the more
general statement from it. Such a proof could proceed by observing that a Gaussian of variance
a 2 is the sum of a Gaussian of variance r 2 and a Gaussian of variance a 2 — t 2 . Thus, one can
apply Theorem 13.21 with a Gaussian of variance r 2 to the result of perturbing the original data
by a Gaussian of variance a 2 — r 2 , for an appropriate choice of r. The reader can find a precise
implementation of this technique in |ST01| Section 5.1].

4 Renegar's Condition Number for Linear Programming

In an effort to develop a parameter in which to measure the complexity of linear programming
that was more natural than /.. Renegar |Ren95bl Ren95al Ren!) 1 . introduced the condition
number, C(A, b, c), of a linear program and developed an interior point method that runs in
time 0(m 3 log(C(j4, b, c)/e)). In contrast with the parameter L, C(A, 6, c) is naturally defined
for rational or real matrices A. Moreover, C(A, b, c) is often much smaller than L.

Formally, we define the distance of a linear program specified by (A, b, c) to primal ill-posedness
to be

sup : \\A — A', b — b'\\ F < k implies A'x < b, x > is feasible}

(A b) — ^ ^ X ~ ^' x — ® ^ s ^ eas ible, and

Kp ' sup {k : \\A — A' , b — b'\\ F < k implies A'x < b, x > is infeasible}

if A'x < b, x > is infeasible.

The distance to dual ill-posedness, kd(A, c), is defined similarly. We then define C(A, b, c)
to be the maximum of the primal condition number Cp{A, b) and the dual condition number
Cd(A, c), where Cp(A, b) and Cd(A, c) are the normalized distances to primal and dual ill-
posedness:

C P {A,b) = \\A,b\\ F /K P (A,b) and C D {A,c) = \\A, c\\ F /k d (A, c).

We remark that, with this normalization, Cp and Cp> are always at least 1.

We also note that the linear programs for which Todd |Tod94j and Todd and Ye |TY96j prove
a ^(n 1 / 3 ) iteration lower bound have exponentially poor condition. It is not known if one can
prove such an iteration lower bound for a well-conditioned linear program.

8

5 Termination

One can often terminate linear programming algorithms that approach the optimal solution
of a linear program by using a good solution to guess the optimal solution. The process by
which this is done is often called termination or rounding. Termination is possible because at
the optimal solution a number of the inequalities are tight, and the knowledge of the identity
of these inequalities is enough to reconstruct the optimal solution. Thus, most termination
algorithms work by guessing that the inequalities having the least slack at a very good solution
are those which have no slack at the optimal solution.

We being by recalling the facts that we will use to prove that termination is possible, ignoring
complications that may occur with probability zero for perturbed A, b and c. We begin with

Proposition 5.1. For Gaussian distributed A, b and c, with probability 1, the program specified
by (A, b, c) is either infeasible, unbounded, or has unique primal and dual optimal solutions, x*
and y* . Moreover, x* makes tight exactly n of the inequalities {x,i > 0} U {Aj t -x < bj} and y*
makes tight exactly m of the inequalities {yj > 0} U {yA : ^ > q}.

Proof. If the primal program is feasible and bounded but does not have a unique optimal solu-
tion, then the space of optimal solutions must lie in a subspace defined by fewer than n of the
inequalities {xi = 0} U {Aj t: x = bj}, and c must be orthogonal to this subspace. However, as
this restricts c to a set of measure zero and the number of such possible subspaces is finite given
A and &, this is an event with probability zero. By symmetry, the same holds for the optimal
solution of the dual program. To prove the second part, we note that if n + 1 of the inequalities
are tight at x* , then these inequalities form a system of n + 1 equations in n variables that has
a solution. As any such degeneracy has probability zero, and there are only finitely many such
possible degeneracies, the probability of this happening is zero. □

We now recall the Duality Theorem of Linear Programming:

Theorem 5.2 (LP duality). For a linear program specified by (A, b, c),

• (Weak Duality) for every primal feasible x and dual feasible y, yb > cx, and

• (Strong Duality) if the linear program is bounded and feasible then for primal optimal x*
and a dual optimal y* , we have y*b = y* Ax* = cx* .

For a feasible and bounded linear program (A, b, c) with unique optimal primal and dual solu-
tions x* and y*, we define

U = {i:x*> 0}
V = {j : y* > 0},

and we say that the program is of type (U, V).

We can show that U and V are related to the set of tight constraints:

9

Lemma 5.3 (Tight constraints). For a feasible and bounded linear program specified by
(A, b, c), we have

V Q {j ' '■ Aj t x* = bj}, and
UC{i: y*A :!i = a}.

Proof. Let

V' = {j : Aj.x* = bj}, and
U' = {%: y*A , = Ci }.

To show that U C U', assume by way of contradiction that there exists an % 6 U such that
y*A : j > Ci. Because x* > we have y*A-.jX% > CiX*, which would imply y*b > cx* and
contradict Theorem 15.21 Therefore U C U' . We can similarly show that V C V'. □

With probability 1, these sets are actually identical:

Lemma 5.4 (U and V). For Gaussian distributed A, b and c, if the corresponding linear
program is bounded and feasible, then with probability 1,

V = {j : Aj !: x* = bj}, and
U = {i: y*A hi = c,i}.

Proof. Define V and U' as in the proof of Lemma 15.31 We will show \U\ = \U'\ and \V\ = \V'\.
By Proposition I5.1[ with probability 1, the number of zeros in x* plus \U'\ equals n. Because
x* is an n-place vector, the number of zeros in x* plus the number of non-zeros in x* , which is
\U\, is equal to n. Thus \U\ = \U'\. Similarly \V\ = \V'\. □

We will consider the following termination scheme: suppose x is an approximate solution to the
primal program, we let U(x) and V(x) be the set of indices such that

{xi : i U(x)} U {bj - Aj.x : j G V(x)}

are the smallest n values in {x{} U {bj — Aj^-x}. We then guess the optimal solution to be the
solution to the following linear system: £Cj = for i U(x) and bj — Aj t -x = for j £ V{x).
We will show that if x is sufficiently close to optimal, then this termination scheme produces
the optimal solution to the linear program. We now define S(A, b,c) to measure how close to
optimal x needs to be.

Definition 5.5 (5(A, b, c)). For a feasible and bounded linear program specified by A, b and c,
we define

5(A,b,c)

to be the supremum of the 5 for which

(cx* — cx) < 5 implies U(x) = U and V(x) = V. (2)
For unbounded or infeasible programs, we set 5 to oo.

10

The main technical contribution of this paper is:

Theorem 5.6. Let A be an m-by-n matrix , m > n, b an m-vector, and c an n-vector for
which A , b , \\c\\ < 1, and let A, b and c be a Gaussian random matrix and two Gaussian

random vectors of variance a 1 centered at A, b and c, respectively. Then, for a 2 < 1,

1

E

max 1, log

S(A,b,c)

< 0(log(m/<r)).

Our proof of Theorem 15.61 is broken into three sections. In Section H3 we define geometric
quantities that we will use to bound 5(A, b, c), state the relation between S(A, b, c) and these
quantities proved in Section [7[ and state the probability bounds for these quantities obtained
in Section El The rest of the material in Section El is a routine calculation using the results of
Sections |S1 and Theorem 13. II The reader will probably be most interested in Section |H1 which
we begin with an intuitive explanation of how the probability estimates are obtained, carefully
explain the tools used to make these arguments rigorous, and then finally apply these tools to
obtain the probability bounds.

We remark that Theorem l5.6l depends very little on the properties of Gaussian random variables.
Aside for the bound on E [log \\A\\] of Proposition 16.91 which is easily generalized to other distri-
butions, the only fact about Gaussian random variables used is that proved in Lemma f8.ll Thus,
one could prove statements similar to Theorem 15.61 for a number of families of perturbations.

6 Smoothed Analysis of log(l/c^)

Our analysis of the probability that 5(A, b, c) is small will be divided into two parts: a geometric
condition for 5(A, b, c) to be small, and a bound on the probability that this geometric condition
is satisfied.

To described the geometric condition, we define the following five quantities for bounded and
feasible linear programs with unique optimal primal and dual solutions x* and y* .

• a P (A, b, c) = mm ieU x* ,

• a D (A,b,c) = mm j£V y*,

• Pp(A, b, c) = min Jg y bj — Aj j: x*,

• 0d(A, b, c) = min j6 j7 y*A : ^ - a,

• j(A, b, c) = mhifcet/ dist (A v ,k, Span (A v ,u-k))-

The geometric condition is that one of these five quantities is small.

When A, b and c are clear from context, we will just write ap, ap>, Pd, Pp, 7 or 5. Note that
a D (A, b, c) = a P (-A T , -c T , -b T ) and Pd(A, b, c) = (3 P (-A T , -c T , -b T ).

In Section [71 we prove

11

Lemma 6.1. For a linear program specified by {A, b, c) with unique optimal primal and dual
solutions x* and y* , let

Then,

\(A, b, c) = min (a P (A, b, c),a D (A, b, c),(3 P (A, b, c),j3 D (A, b, c)) .

A(AM) 2 7(AM)

5(A,b,c) >

2max(l,Vn||A||)(l + ||A||)"

We define J- (A, b, c) to be the event that the linear program specified by A, b, c is feasible and
bounded. In Section |H1 we prove

Lemma 6.2 (Probability of small a). Under the conditions of Theorem \5.fk

8en(m + 1)

Pr

a P (A, b, c) <

and J-(A, 6, c)

<

(7

JA|| +2)^11**11 + 1)
Lemma 6.3 (Probability of small /3). Under the conditions of Theorem \5.b\

4em

Pr

P (A,b,c) <

and T{A, b, c))

<

max (1, \\A\\ ||** |

Lemma 6.4 (Probability of small 7). Under the conditions of Theorem \5.b\

Pr

A v ,u

l(A,b,c) <

(1 + ||a;*|| 2 + ||y*|| 2

141 + 3)

and J- {A, b, c)

<

ene

(T-

From these three lemmas, we can reduce our analysis of the probability that S(A, b, c) is small
to an analysis of the probability that ||**||, \\y*\\ or ||vl|| is large.

Lemma 6.5. Under the conditions of Theorem \5.(A

Pr

A,b,c

5(A,b : c)(\\A\\+3) 7 (l + \\x*\\ + \\y*\\) 4 <e

21e 1 / 3 n 1 /6( n+ i)( m + i)
< ^ — -. (3)

(7

Proof. As 5(A, b, c) is infinite for infeasible or unbounded programs,

Pr

A,b,c L

'd(A,b,c)(\\A\\+3) 7 (l + \\x*\\ + \\y*\\) 4 <e

Pr

A,b,c

S(A, b, c) {\\A\\ + 3) 7 (1 + ||**|| + \\y*\\) A < e and T(A, b, c)

As an{A, b, c) = ap{— A f , — c*, —6*), and

e

<

+2) 2 (||**|| + 1) max(l, \\A\\ \\x*

12

Lemmas 16.21 and 16.31 imply

Pr

A,b,c

rmn(ap,aD,fip,f3D) <

<

<

(||vl||+2) 2 (max (||**|| , ||y*||) + l)
8en(m + 1) + 8em(n + 1) + 4em + 4en

and J 7 (A, b, c)

(7

8e ((n + l/2)(m + 1) + (m + l/2)(n + 1))

Let A = min (ap, ap, ftp, /3d)- If
A 2 7 <

<

then either

or

(||A||+3) 5 (l + ||**|| + ||y*||) 4

(||A|| + 2)' J (max(||a!*||,||»*||) + l)

A <

1 + ||**|| 2 + ||y*|| 2 ) (\\A\\ +3)

(||A|| + 2Y (max (||**|| , ||y*||) + l)

7<

l + ||a;*|| 2 + ||y*f )(PII+3)

So,

Pr

A,6,c

A 2 7 <

(p||+3) & (l + 11**11 + 11^1

and J 7 (A, b, c)

ene 8e ((n + 1/2) (m + 1) + (m + 1/2) (n + 1))

<

16e(n + l)(m + l)

(7

As Lemma Ifi.ll tells us that

«5(A,6,c) >

A 2 7

2max(l,^P||)(l + P||)'

we obtain

Pr

A,b,c

5 <

< Pr

A,b,c

(\\A\\ +3) 5 (1 + ||**|| + ||y*ll) 4 V2max(l, Vn\\A\\) (1 + ||A||)

3

j and ^(A, &, c

and .F(.A, &, c)

A 2 7 <

<

(||A|| + 3) s (l + ||x*|| + \\y
16e(n + l)(m+ 1)

13

From this inequality, we derive

Pr

A,b,c

5(\\A\\ +3) 7 (1 + \\x*\\ + ||y*||) 4 < and T{A, b, c)

< Pr
A.b,c

6 (\\A\\ + 3) 5 (1 + ||a;*|| + ||yl) 4 max(l, \\A\\) (1 + \\A\\) < — p= and JF(A, 6, c)

2^

<

16e(n + l)(m + l)

(7

The lemma now follows by changing e i /(2^/n) to

□

To convert this bound on the probability that 5 is small to a bound on the expectation of
log (1/(5), we will use the following technical lemma:

Lemma 6.6. Let x be a non-negative random variable for which there exist constants a and k
such that \og(a)/k > 1 and

Pr [x < e] < ae k .

Then,

Proof. We compute
E [max (1, log(l/x))]

E [max(l,log(l/x))] <

1 + log a
k '

Pr [max(l,log(l/x)) > t] dt

t=o

t=o

t=o

CO

Pr [max(l,log(l/x)) > t] dt + / Pr [max (1, log(l/x)) > t] dt

I logo;

log a

< I k dt + I Pr[log(l/x) > t] dt, as (logo)/*; > 1,

f log a

k

OO

log at

< I dt +
Jt=o

log a 1
= — h -•

k k

OO

ae- tk dt

□

From this, we obtain

Corollary 6.7. Under the conditions of Theorem \5.b\
E ■-■ ' 1

max I 1, log

<5(A,6 >C )

< 3(log(21(m + l) 13/6 /a 2 ) + 1) + 71og(||A|| + 3) + 41og(l + \\x*\\ + ||y*|

14

Proof. Applying Lemma ESI to ©, and recalling m > n, we obtain

1

E

max 1, log

S(A,b,c)

7E [log(p|| + 3)] - 4E [log(l + + ||y*||)]

< 3 (log(21(m + l) 13/6 /o" 2 ) + 1

□

As || a:* || and ||y*|| can be bounded in terms of the condition number of the linear program, we
will be able to use Theorem 13. II to bound the probability that they are large. The probability
that ||j4|| is large may be obtained by more elementary means. In particular, we prove

To bound E [log(l + || as* || + ||y*||)], we note that Renegar Ren95a ( Propositions 2.2 and 2.3]
has proved

Lemma 6.8 (Norms of optimal solutions).

max(\\x*\\,\\y*\\) <C(A,b,c) 2 .

So, we may apply Theorem 13. II to bound the norms of x* and y* . To bound the norm of A, we
apply:

Proposition 6.9. Let A be a Gaussian perturbation of variance a 2 < 1 of an m-by-n matrix A
of norm at most 1 . Then,

E [log(||^|| + 3)] < log((^ + V^)a + 4)

Proof. Write A = A + Go where G is a Gaussian random matrix of variance 1 centered at
the origin and A < 1. Seginer SegOO proves that E [||G||] < \fn + \/m, which implies

E[||Gct||] < a(^/E + ^/nl) and

E[||A|| +3] < + +

As the logarithm is a convex function,

E [log(p|| + 3)] < log (E [\\A\\ + 3]) < log ((Vn + y/m) a + 4) .
Putting this all together, we prove the main theorem:

Proof of Theorem \5.b\ To bound the terms obtained in Corollary 16.71 we apply Proposition
to show

E [log(P|| + 3)] < log(v^ + Vm + 4).
We then apply Lemma 16.81 to show

(l + \\x*\\ + \\y*\\)<3C(A,b,c) 2 ,

□

15

and Theorem 13 .11 to obtain

E [log(l + 11*1 + ||y*||)] < E [log (3C(A, b, c) 2 )]

<log(3) + 2E [logC(A,b,c)}
< 0(log(mn/a)).

□

7 Geometric Analysis of 5

To prove Lemma 16.11 we use the following lemma which says that if the value of cx is close to
optimal, then x must be close to x* .

Lemma 7.1. For a linear program specified by (A, b, c) with unique optimal primal and dual
solutions x* and y* , let

X(A, b, c) = mm(a P (A, 6, c),a D (A, b, c),(3 P (A, b, c),(3 D (A, 6, c)) .

Then,

II as* - a^lL ^ c ( x * ~ x )

1 +

A(A,6,c)min(7(A,6,c),i;

Proof of Lemma 16', it Assuming

X(A,b,c) 2 7 (A,b,c)

c(x* — x) <

2max(l,^p||)(l + PID'
we need to show U(x) = U and V{x) = V. From Lemma 17. 11 we have

A 2 7 / 1 + \\A\\ \ A A

11 "°° 2max(l,^p||)(l + || J 4||) VAmin(7, l)y - 2max(l,^||yl||) - 2'

We then have

(a) for i eU, Xi > a P (A, b, c) - A/2 > A/2 ,

(b) for i£U,Xi< A/2,

As \Aj >: (x* - x)\ < WAW^ \\x* — aslloo < \fn \A\ \x* - x\ 00 , we also have

(c) for j e V, bj - Aj.x < A/2,

(d) for j V, bj - Aj.x > P (A, b, c) - A/2 > A/2.

So, the smallest n values in {xi} U {bj — Aj y x} are those indexed by U and V. □
The proof of Lemma 17. II relies on the following technical lemmas.

16

□

Lemma 7.2. For x a feasible point for a bounded linear program specified by (A, b, c),

c(x* -x)> a D (A, b, c) \\A v .(x* - x)\\ .

Proof. As y*A > c, we have

c(x* — x) > cx* — y* Ax

= y* Ax* — y* Ax (by strong duality)

= y*A(x* - x)
= y* v A v -(x* - x),

as y* is zero outside of V. As Ay t: (x* — x) is non-negative, we may conclude that

y* v A v .(x* -x)> a D {A, 6, c) \\A v .{x* - x)^ > a D {A, b, c) \\A v .(x* - x)\\ .

Lemma 7.3. For x a feasible point for a bounded linear program specified by (A, b, c),

\\A VlU (xu - xu)\\ > 7(A, b, c) \\xjj - xuWoo ■
Proof. For any k £ U, let q be the null vector of the span of Ayu—k- Then,

qA v ,ux = q (A Vtk x k + Av,u-k&u-k) = XkqA Vtk = x fc dist (A v ,k, Span (A v ,u-k)) ■

So,

\\A v ,u{xu - x v )\\ > \qA v ,u(xu - x v )\

= \x% - x k \ dist (A Vik , Span (A VtU _ k ))
> \ x l- x k\l(A b,c).

Lemma 7.4. For x a feasible solution to a linear program specified by (A, b, c),

c(x* — x)
™ ~ p D (A,b,cY

Proof. As y*A itV = c v , (y*A - c)x = {y*A.jy - c )x D .

As every entry in y* A. jy — Cy is at least Pd(A, b, c) and x > 0, we have

(y*A - c)x = {y*A. fi - c D )x D > D {A, b, c) Wx^ > D (A, b, c) \\x D \\ . (4)

As y* > 0,

cx* — cx = y* b — cx > y* Ax — cx > (3d{A, b, c) \\xfj\\ ,
where the last inequality follows from □

17

□

Proof of Lemma \7.1\ Applying the triangle inequality, we observe

\\A v .(x* - x)\\ > \\A ViU (xu - xu)\\ - \\A Vjf j(xfj - x D )\\ .

We can bound the first of these terms by applying Lemma 17.31 and the second by observing
a;^. = and H-Ay^a^H < [[.Ay^H ||scj/-||, thereby proving

\\A v .{x* - x)\\ > j(A, b, c) \\x* v - xuWoo - \\A Vj tj\\ \\xfj\\ .
By now applying Lemma 17.21 we obtain

c(x* — x)> ao(A, b, c) (j(A, b, c) \\xjj - xu\\<x> ~ ||^v,E/|| \\ x u\\) > which implies
a D (A, b, c) \\A Vjt j\\ \\xfj\\ + c(x* - x) > a D (A, b, c)j(A, b, c) \\x* v - xuW^ ■

As Lemma 17.41 implies c(x* — x) > (3d(A, b, c) and > L4y^ , we obtain

1 + r C \ \\A\\] c(x* - x) > a D (A, b, c)j(A, b, c) \\x\j - x v \\ which implies

Pr>[A,b,c) J

c(x*-x)(l + \\A\\) ... ,

>l(A,b,c)\\x u -x u \\ oo .

min {a D (A, b, c),/3 D (A, b, c))
The lemma now follows from this inequality and Lemma 17.41 which implies

c(x* — x)

p D (A,b,c)

> \\Xu\\ - ll^Cflloo _ \\ X U ~ X U\

□

8 Bounds on a, (3, and 7

For this section, we let /jla, fJ-b and /i c denote the Gaussian densities on A, b and c in Theorem l5.6l
For an index j or set of indices V, we let fj,^. and Hb v denote the induced distributions on bj
and by, and we extend this notational convention to sub-matrices of A and sub-vectors of c.

The idea behind our proofs of Lemma 16.21 16.31 and 16.41 is that for any configuration of A, b and
c in which a, (3, or 7 is small, there are many nearby configurations in which the term is not
too small. As Gaussian densities do not fall off too quickly, this nearby configuration will have
approximately the same probability as the original. To make this idea rigorous, we establish
mappings pairing configurations in which these terms are small with configurations in which
these terms are not. We then use these mappings to show that the Gaussian probability of the
configurations in which the terms are not small is much larger than those in which they are.

To show that it is unlikely that (3p is small, we hold A, y*, c, and x* constant, and map those
bj's that are close to Aj -x* to be a little further away. To show that it is unlikely that ap
is small, we hold A, y* and c constant, and map small non-zero entries of x* to larger values
while simultaneously mapping the entries of b to preserve the tight constraints and maintain
slack in the others. To show that it is unlikely that 7 is small, we hold x* , y* , and the slack

18

components of b and c constant. We then vary Ayu slightly, changing by and Cjj accordingly.
As each slight motion described only induces a slight motion in the other components, we can
prove that each configuration obtained has similar probability.

To turn these intuitive arguments into proofs, we need four tools:

1. a bound on the smoothness of the Gaussian density,

2. a bound on the probability that a random variable is small given that its density is smooth
near zero,

3. a lemma making rigorous the change of variables implicitly used in the intuitive arguments,
and

4. a proof that the probability of an event can be bounded by the maximum of its probability
over the sets in a partition of its probability space.

Each of these tools is relatively simple, and the last should be obvious for finite partitions. The
bound on the smoothed complexity of the simplex method STOl] uses each of these tools along
with some others. It is our hope that the reader would have an easier time understanding the
proofs in jSTOlj after having read this section.

We now develop these four tools, and at the end of the section apply them to the proofs of the
bounds on a, (3 and 7.

We make use of the following elementary bound on the smoothness of Gaussians:

Lemma 8.1 (Smoothness of Gaussians). Let ^{x) be a Gaussian distribution in H n of
variance a 2 centered at a point of norm at most 1. 7/dist (x, y) < e < 1, then

^->e

Proof. Let x be the center of the distribution. We compute

Mj/) = e ^(ll!/-i|| 2 -ll*-i|| 2 )
H{x)

-1

> e^ 7

((\\y-x\\ + \\x-x\\) 2 -\\x-x\\ 2 )

by the triangle inequality

-1

= e^ 1

(2|| 2 /-x||||x-i|| + ||;/-a ; || 2 )

-1

>

(2e||x-x||+e 2 )

-1

> e^ 7

(2e(|M| + l)+c 2 )

as \\x\\ < 1

-1

>

(2e(||«B||+l)+e)

as e < 1

<

11*11+2)

> e

<7 2 .

□

19

We remark that this lemma is the only fact about Gaussian random variables used in this paper.
Thus, one could obtain results of a similar character for any distribution that satisfies properties
similar to those derived for Gaussian random vectors above.

The argument by which we obtain probability bounds from comparing configurations is encap-
sulated in the following lemma, which is used in each of the three proofs. This lemma essentially
says that if a distribution of a random variable is relatively flat near a point, then the variable
is unlikely to lie too close to that point.

Lemma 8.2 (Smooth distributions unlikely small). Let x be a real random variable dis-
tributed according to density p such that there exist constants a and c for which

p(x')

< x < x < a implies — — — - > c.

p(x)

Then, for e < a,
In particular,

Pr [x 6 [0,e]\x G [0, a]] <

Pr [x E [0, el] < — .

ca

e

ca

Proof. From the definition of conditional probability, we have

Pr[xe [0,e]|x€ [0,a]] = j° ■

Setting y = (e/a)x, we compute

p(x)dx=(a/e) p({a / e)y) dy > {a / e) I cp{y) dy .
Jo Jo

From which the lemma follows. □

For example, we can use the previous lemma to derive a bound on the probability that a Gaussian
random variable is greater than t + e given that it is greater than t:

Lemma 8.3 (Comparison of Gaussian tails). Let x be a Gaussian random variable of
variance a 2 < 1 and mean of absolute value at most 1. For e > 0, r > 1 and t < t,

Pr \x < t + e \x > t < -^e~^~ and Pr \x > t + e \x > t] > 1 kC~^~ .

o~ L 1 J a z

Proof. It suffices to prove the first bound. Let p be the density function of x. Let a = cr 2 /r < 1.
For e > a the lemma is vacuous. For e < a, we will show that

; t 1 ^') _ e ( T + 3 )

t<x<x'<t + a implies — r— > e ^ , (5)

p[x)

and then apply Lemma |8.2I to finish the proof. For t < —1. (p)jl is trivial as p is monotone
increasing on [t, t + a]. For t > —1, we have ||x|| < r + 1 so (jSJ follows from Lemma 18. II □

20

Finally, we note that our intuitive explanation of the proofs of Lemmas 16 , 2116.31 and 16 . 41 implicitly
used a change of variables: instead of reasoning in terms of the variables A, b and c, we found
it more convenient to think of x* and y* as quantities to fix or vary. We now introduce the
machinery that enables us to reason in terms of these variables. We begin by observing that for
any sets U and V, not necessarily the combinatorial type of (A, b, c), we can introduce variables
x v and y v , not necessarily the optimal primal and dual solutions, and define

by = A VyU x\j and cjj = y v A V)U .

We can then compute probabilities in these new variables by observing that the joint density of
A, x* v , y* v , b v , and c v is

VAi^^bviAv^x^^iyyAvv)^ (b v )^ c (c )det (A

v,u)

To see why this is true, recall that probabilities are best understood as integrals, and that the
probability of an event £ (A, b, c) is

[£(A, b, c)\ (j, A (A){j, b (b)fj, c (c) dA db dc

(6)

A,b,c

To express this integral in the new variables, we first compute the Jacobian of the change of
variables, which is

so,

dA db dc

det ( d{A, by, Cjj, by, cu)
\d(A, by,c D ,xij,yv)

d(A, by, Cjj, b v , cu

det {A v ,uf

det

d(A, b v , c v ,x v ,yy)

dA dby dcjj dx*y dy\

V

det (Ayjj) dA dby dc v dx v dy

V !

and

A,by ,Cfj ,y v

[£(A, b, c)]fx A (A)fx bv (A v ,ux u )ii cu {y v Av,u)^by{b v )fj 1C0 (c u )det (A v ,uY

dA dby dcjj dx v dy

V

While we can define this change of variables for any sets U and V, we will of course only apply
this change of variables to programs of type (U, V). If we let Type^y^, b, c) denote the set of
(A, b, c) of type (U, V), then we can express the probability of [£(A, b, c) and J 7 (A, b, c)] as

A,b,c:F{A,b,c)

[£(A, b, c)] fj, A (A)fJ, b (b)(j, c (c) dA db dc

E

v JA,b,c:Type u v (A,b,c)

[£(A, b, c)] ix A (A)fi b (b)n c (c) dA db dc ,

and then apply the change of variables corresponding to (U, V) to evaluate the integral over
Type;y y(A, b, c) on the right. In fact, in each of our proofs, we will actually bound

maxPr [£{A, b, c)\Type uy (A, b, c)] .

To see that this upper bounds the probability of [£(A, b, c) and J r (A, b, c)], we prove

21

Claim 8.4.

Pr [£(A, b, c) and F(A, b, c)] < maxPr [£(A, b, c)| Type uv (A, b, c)] .

Proof.

Pr [£(A, b, c) and F(A, b, c)] = Pr [ s (A b > c ) and T yP e t/,v(A b > c )]

= ^Pr [Type^A, 6, c)] Pr [£(A, 6, c)|Type [7 y(A, 6, c)]

< maxPr [f (A, 6, c)|Type [7)y (A, 6, c)] ,

as Euy Pr [Type^y (A, b, c)] < 1. □

We summarize this discussion in the following lemma:

Lemma 8.5 (Change of variables). Let £(A, b, c) be an event. Then,

Pr [£(A,b,c) and F(A,b,c)}

A,b,c

< max Pr [£(A, b, c)\A v x* < by and y*A D > c D ] ,

f7,y A,x* ,y* ,bv,Cjj

where A, x* , y* , by and c-q have joint density

HA(A)n bv (A VjU x^)fi Cu (y v A V:U )n bv (b v )fi Co (c D ) det (A v>u ) 2 .

In fact, all of our proofs begin by fixing some subset of the variables, and then proving a
probability bound for any configuration of the fixed variables. This amounts to proving a
probability upper bound by dividing the probability space into a number of regions, and proving
that the bound holds in each of these regions. Formally, we are using the fact:

Proposition 8.6 (Upper bound by max of probabilities). Let X and Y be random vari-
ables distributed according to an integrable density function fi(X,Y) and let £(X,Y) be an event.
Then

Pr [£(X, Y)} < max Pr [£(X, Y)\Y = y) ^ maxPr [£(X, Y)\Y] .

Proof. By Tonelli's Theorem, we have

Pr [£(X, Y)] = [ [£(X, Y)] fx(X, Y) dX dY

X < Y JX,Y

= J (J P y )] Y) dX \ dY

' ! u(X Y)dx]( JxW>Y)MX,Y)dX \
v Jx^ Y)dX ) [ (f x »(X,Y)dX) J dY

J^j x H(X,Y)dX^ (P x T[£(X,Y)\Y]^j dY

<maxPr[£(X,Y)\Y],

22

as

J (^J n(X,Y)dX^j dY = 1.

□

Having established these tools, we now proceed with the proofs of Lemmas 16.21 16.31 and 16.41
Proof of Lem,m,a \()Jft (Probability of small (5). By Lemma l8.5| it suffices to bound

max Pr

U,V A,x* ,y* ,b^,Cfj

P P (A,b,c) <

Ay .x* < by and y* A. (j > c

max(l, \\A\\ [| sb* |

By Proposition 18.61 it suffices to prove that for all U, V, A, x*j, y v and c U}

Pr [3j € V : bj -A u x* < e' \ V? : bj - A jt .x* > 0]
b v

< ^ Pr [bj - Aj.x* < e' | Vj : bj - Aj.x* > 0]

j&v 3

= ^Vr[bj - Aj.x* <e' \ bj-Aj.x*>0]

jeV 3

u

J2^[bj<Aj,x* + e' | bj>Aj,x*}

<

me'(\\A\\\\x*\\) »M

by Lemma 18.31

Setting e = e' max (1, ||A|| ||sc* ||), and observing that the lemma is vacuously true for e > a 2 /4m,
we deduce

Pr [3j eV:b 3 - A jtl x* < e | Vj : bj - Aj,x* > 0] < ™e£ < ^ <

<y

o-

for e < a 2 /Am.

Proof of Lemma \6.4\ (Probability of small j). By Lemma 18.51 it suffices to bound

□

max Pr

U,V A,x^,y v ,b v ,c

j(A,b,c) <

l + ||a;*|| 2 + ||y*|| 2 ) (Pll +3)

Ay .x* < by and y* A. v > Cj

By Proposition 18.61 it suffices to prove that for all U, V, Ayjj, b v , Cfj, x* and y*, for which
Av,U x U — ana - Vv^V,U — c \Ji

Pr [y(A, b,c)<e]<
Av.u

e^e ( 1 + ||£c*|| 2 + ||2/*|| 2 ) (Pv,HI+3)

(7)

23

where we note that having fixed Ayjj, b v , eg, x* and y* , the induced distribution on Ay,u is
I^A v , u ( A v,u)tJ'b v (Av,uXu)fJ'c u (yvAv,u)det {Ay^f .

To prove l[7]). we show that for all k £ U and all Ay t jj_ k ,

ee(l + ||z*|| 2 + b*|| 2 ) (\\A V;U \\ + 3)
Pr [dist (A v . k , Span {A VjU - k )) < e] < — ^ ^ (8)

and apply a union bound over k £ U. Having fixed Av,u-k, we may express Ay :k as a + tq
where a £ Span (Ay ! fj_ k ), 9 is a unit vector orthogonal to Span (Ay \u-k) an d i € M. With
this representation, we have \t\ = dist (Ay jk , Span (Ayjj_ k )) an d det (Ay t u) = ct, where c is
some constant depending only on Ay^u-k-

By the symmetry of q with — q, we can prove (JSJ) by bounding the probability that t is less than
e given that t is at least 0. Thus, we prove (jSJ) by observing H^Ay^H > HAyjj-fc, a\\ and showing

ee (l + ||z:*|| 2 + \\y*\\ 2 ) (\\A VtU - k ,a\\ + 3)

max Pr [t < e\t > 0] < — ^ ^ (9)

aeSpan(A ViC/ _ fc ) * a

where the induced distribution on t is proportional to

p(*) = f MAv,* ( a + *«)M6v (Aw-^tz-fc + (a + tq)x*)/j, Ck (y* v (a + tg)) t 2 . (10)

We now set

a

a 2

3(l + ||;c*|| 2 + ||y*|| 2 ) (Pv,i;-fc,o|| + 3)
and prove

< t < t' < a implies > 1/e, (11)

from which @ follows by Lemma 18.21
To prove (|11|). we observe

1. As dist (a + i'g, a + tg) < t' — t < a < 1, we may apply Lemma 18. II to show

flA v k {a + t' q) -c»(||a+tg||+2) -a(||g||+3) , ,.,

'■ — r- > e ° 2 > e > e ' .

H Avk (a + tq)

2. As

llAyc/.fcaj^.fc + axfc+tgXfcH < (\\A v ,v-k, *|| + «) II^MI ■

and

dist (^y )C /_ & a;^_ fe + a4 + tg4, Ay )[7 _ fc a;^_ fc + ax* k + i'g4) = (i' -t)x%< ax%,
Lemma 18.11 implies

Hb v {A v ,u-kX*jj_ k + (a + t'q)x*) ^ -^(( |Ki/- fc; HMlKII+ 2 )

Hh v (A VtU - k x*rr_ k + (a + tq)x*)

> e > e~ 1/3 .

24

3. As \y*{a + tq)\ < \\y*\\ (||o|| +t \\q\\) = \\y*\\ (||a|| + a), and

dist (y*(a + tq), y*(a + t' q)) = (t' -t)\y*q\<a \\y*\\ ,
Lemma 18.11 implies

/x Cfc (y v (a + t'q)) > e Hklk|WMi3 > g _ 1/3
Vc k {y* v (a + tq)) ~

Proof of Lemma \6.2\ (Probability of small a). By Lemma l8.5| it suffices to bound

□

max Pr

U,V A,x* ,y* ,by,Cfj

a P (A, b, c) <

Ay .x* < b v and y* A. y > c v

(|L4||+2) 2 (||^|| + l)

By Proposition Eini it suffices to prove that for all U, V, A, y v and c U} such that y v A vu > c v ,

8en(m + 1)

a(A, b, c) <

(P||+2) 2 (||^|| + l)

Av,u x u — by

<

(12)

where we note that, fixing U, V, A, y* and Cjj and conditioning upon Ay yXy < by, the
induced density on x^ is proportional to

(Ayux^j) Yl Pr [bj > A jtU xlj} .

To prove (|T2*)) , we show

V iec/ V x& _ ! Pr [x* < e\A v u x^ < by] <
which implies

max max Pr

i&J x* u _ i X*

We then observe

8e(m + l)(|L4|| + 2) 2 (Hx^ll + 1)

x i <

(P||+2) 2 (||^_ i ||+l)

o~

A-v,u x u — by

(13)

<

8e(m+ 1)

o~

77--T — - — n — r < ttttt, — TTTTi n — v and union bound over i G U. To prove

(||A||+2) 2 (|^_ i ||+l) - (11411+2)^(11^11+1) P

(f X3|> . we first note that having fixed i £ U and x^ J _ i , the induced density on x* is proportional

to

*n def

p(x*) = ^(Ayp-iXu^ + AyiX*) Yl Pr [bj > Ajp-iXu-i + A i

We now set

a

a

4(m + l)(||A|| + 2) 2 (||^|| + 1)

< 1,

and prove that

o(x')

< Xi < x\ < a implies > 1/2,

(14)

25

from which (|13|) follows by Lemma 18.21

To prove (|14|) . we note that for < X{ < x\ < a,

dist [Av^-iXu-i + Ay,iXi, Av,u-iXu_i + Av,ix'j) = \\Av,i\\ - Xi) < ||A|| a < 1,

and

^A v ,u-iXu-i + A v,iXi\\ < \\A ViU -i\\ ||a;^_j|| + \\A v>i \\ Xi < \\A\\ (||a;^_j|| + l) .
So, by Lemma I5~TI

in,

> e ^ > e > 1

Vb v (A V:U _ i x* u _ i + A Vti Xi) ' 4(m+l)'

by our choice of a.

We can also apply Lemma to show that for each j V,

Pr bj [6, > Aw-iX^ + A hl x[] > i {\\A\\ + l)) \\A\\ a ^MH-j;^)^

Pr fe . [6j > A jiC7 _jX^_ i + ^j,iXi] a 2

_ 2(P||(||^||+l))P|| n
2

(7

1

> 1

2(m+ 1)'

by our choice of a. Thus, we may conclude

n(x'A ( 1 \ / 1 \ m m + 1

> I-77 \ ) ( — —-. > 1 - = 1/2.

p{xi) - V 4(m + l)7v 2(m + l)y ~ 2(m + 1)

□

9 Connection to Smoothed Analysis of Simplex Method

The analysis of the simplex method in |ST01| is broken into two parts: a combinatorial bound
on the smoothed size of a two-dimensional shadow of a linear program, and an analysis of a two-
phase algorithm that uses this combinatorial bound as a black-box. The analysis of termination
in this paper is closely related to the smoothed analysis of the shadow size. The intuition behind
this analysis is that if the angle at a corner of the polytope of feasible points is bounded away
from being flat, then the simplex method should make significant progress as it traverses this
corner. The measure of angle used in |ST01| is approximately ^y(A, b, c), at least for the corner
optimizing the linear program. The size of the shadow, which upper bounds the number of
steps taken by the simplex method, is then bounded by varying c over the plane onto which the
shadow is projected.

The main technical lemma of the shadow-size analysis in STOl], Lemma 4.0.11 (Angle bound),
essentially says that for every b, c and A, the probability that a Gaussian perturbation A of
A has up (A, b, c)^f(A, b, c) < e is linear in e, with a coefficient polynomial in n, m and a.

26

The most significant difference between this statement and the analysis in Lemma 16.21 and 16.41
is that in |ST01| . b and c are not perturbed. This restriction seems necessary to apply the
combinatorial bound in a black-box fashion in the analysis of the two-phase simplex algorithm.
Also note that the simplex method analysis is for linear programs without the constraint x > 0.

Otherwise, the arguments in this paper have a flavor very similar to those of jSTOlj . which
mainly use the four techniques outlined in Section |H] of this paper; although, that paper uses
more elaborate changes of variables. One probabilistic technique used in |ST01| that is absent
in this paper is the Combination Lemma ST01, Lemma 2.3.5] which allows one to obtain tight
bounds on the probability that a product of parameters is small from bounds on the probabilities
that the individual parameters are small. The conditions of this lemma dictate the structure
of the proofs in |ST01| as without it one could not obtain a bound on the probability of angle
less than e that is linear in e. Moreover, without a bound that is linear in e, one could not
prove that the shadow has expected polynomial size. In contrast, in Lemma 16.51 of this paper
the dependency is on e 1 / 3 . It is possible that one could reduce this dependency using the
combination lemma, but it is not essential for the results in this paper.

It is our hope that this paper will serve as a gentile introduction to the techniques used in the
smoothed analysis of the simplex method.

References

[AC78] David Avis and Vasek Chvatal. Notes on Bland's pivoting rule. In Polyhedral Com-
binatorics, volume 8 of Math. Programming Study, pages 24-34. 1978.

[AJPY93] K. M. Anstreicher, J. Ji, F. A. Potra, and Y. Ye. Average performance of a self-
dual interior-point algorithm for linear programming. In P. M. Pardalos, editor,
Complexity in Numerical Optimization, pages 1-15. World Scientific Publishing Co.,
London, United Kingdom, 1993.

[AJPY99] K. M. Anstreicher, J. Ji, F. A. Potra, and Y. Ye. Probabilistic analysis of an
infeasible-interior-point algorithm for linear programming. Mathematics of Opera-
tions Research, 24(1):176-192, 1999.

[AKS87] I. Adler, R. M. Karp, and R. Shamir. A simplex variant solving an m x d linear
program in 0(min(m 2 , d 2 )) expected number of pivot steps. J. Complexity, 3:372-
387, 1987.

[AM85] Ilan Adler and Nimrod Megiddo. A simplex algorithm whose average number of steps
is bounded between two quadratic functions of the smaller dimension. Journal of the
ACM, 32(4):871-895, October 1985.

[AZ99] Nina Amenta and Gunter Ziegler. Deformed products and maximal shadows of poly-
topes. In B. Chazelle, J.E. Goodman, and R. Pollack, editors, Advances in Discrete
and Computational Geometry, number 223 in Contemporary Mathematics, pages 57-
90. Amer. Math. Soc, 1999.

27

[BD02] Avrim Blum and John Dunagan. Smoothed analysis of the perceptron algorithm for
linear programming. In SODA '02, pages 905-914, 2002.

[Bor77] Karl Heinz Borgwardt. [Inter suchung en zur Asymptotik der mittleren Schrittzahl
von Simplexverfahren in der linearen Optimierung. PhD thesis, Universitat Kaiser-
slautern, 1977.

[Bor80] Karl Heinz Borgwardt. The Simplex Method: a probabilistic analysis. Number 1 in
Algorithms and Combinatorics. Springer- Verlag, 1980.

[BS95] Avrim Blum and Joel Spencer. Coloring random and semi-random k-colorable graphs.
J. Algorithms, 19(2):204-234, 1995.

[DST02] John Dunagan, Daniel A. Spielman, and Shang-Hua Teng. Smoothed anal-
ysis of interior point methods: Condition numbers. Submitted. Available at
http : //math . mit . edu/ ~spielman/SmoothedAnalysis, 2002.

[EA96] C. Mezaros X. Xu E. Andersen, J. Gondzio. Implementation of interior point methods
for large scale linear programming. In T. Terlaky, editor, Interior point methods in
mathematical programming. Kluwer Academic Publisher, 1996.

[Gol83] Donald Goldfarb. Worst case complexity of the shadow vertex simplex algorithm.
Technical report, Columbia University, 1983.

[Gon88] Clovis C. Gonzaga. An Algorithm for Solving Linear Programming Problems in
0(n 3 L) Operations, pages 1-28. Springer- Verlag, 1988. Progress in Mathematical
Programming, N. Megiddo ed..

[GS79] Donald Goldfarb and William T. Sit. Worst case behaviour of the steepest edge
simplex method. Discrete Applied Math, 1:277-285, 1979.

[Hai83] M. Haimovich. The simplex algorithm is very good!: On the expected number of pivot
steps and related properties of random linear programs. Technical report, Columbia
University, April 1983.

[IL94] D. Shanno I. Lustig, R. Marsten. Interior point methods: computational state of the
art. ORSA Journal on Computing, 6(1):1-14, 1994.

[Jer73] Robert G. Jeroslow. The simplex algorithm with the pivot rule of maximizing im-
provement criterion. Discrete Math., 4:367-377, 1973.

[Kar84] N. Karmarkar. A new polynomial time algorithm for linear programming. Combina-
torica, 4:373-395, 1984.

[Kha79] L. G. Khachiyan. A polynomial algorithm in linear programming. Doklady Akademia
Nauk SSSR, pages 1093-1096, 1979.

[KM72] V. Klee and G. J. Minty. How good is the simplex algorithm? In Shisha, O., editor,
Inequalities - III, pages 159-175. Academic Press, 1972.

28

[LMS90] I. J. Lustig, R. E. Marsten, and D. F. Shanno. The primal-dual interior point method
on the Cray supercomputer. In T. F. Coleman and Y. Li, editors, Large-Scale Nu-
merical Optimization, Papers from the Workshop held at Cornell University, Ithaca,
NY, USA, October 1989, volume 46 of SIAM Proceedings in Applied Mathematics,
pages 70-80. Society of Industrial and Applied Mathematics (SIAM), Philadelphia,
PA, USA, 1990.

[Mur80] K. G. Murty. Computational complexity of parametric linear programming. Math.
Programming, 19:213-219, 1980.

[Ren88] J. Renegar. A polynomial-time algorithm, based on Newton's method, for linear
programming. Math. Programming, 40(1 (Ser. A)):59-93, 1988.

[Ren94] J. Renegar. Some perturbation theory for linear programming. Math. Programming,
65(1, Ser. A):73-91, 1994.

[Ren95a] J. Renegar. Incorporating condition measures into the complexity theory of linear
programming. SIAM J. Optim., 5(3):506-524, 1995.

[Ren95b] J. Renegar. Linear programming, complexity theory and elementary functional anal-
ysis. Math. Programming, 70(3, Ser. A):279-351, 1995.

[SegOO] Yoav Seginer. The expected norm of random matrices. Combinatorics, Probability
and Computing, 9:149-166, 2000.

[Sma83] S. Smale. On the average number of steps in the simplex method of linear program-
ming. Mathematical Programming, 27:241-262, 1983.

[ST01] Daniel A. Spielman and Shang-Hua Teng. Smoothed analysis of algorithms: Why the
simplex algorithm usually takes polynomial time. In Proceedings of the 33rd Annual
ACM Symposium on the Theory of Computing (STOC '01), pages 296-305, 2001.
available at http://arxiv.org/abs/cs.DS/0111050 .

[Tod86] M.J. Todd. Polynomial expected behavior of a pivoting algorithm for linear comple-
mentarity and linear programming problems. Mathematical Programming, 35:173-
192, 1986.

[Tod94] M. J. Todd. A lower bound on the number of iterations of primal-dual interior-
point methods for linear programming. In G. A. Watson and D. F. Griffiths, editors,
Numerical Analysis 1993, pages 237-259. Longman Press, Harlow, 1994.

[TY96] M. J. Todd and Y. Ye. A lower bound on the number of iterations of long-step and
polynomial interior-point methods for linear programming. Annals of Operations
Research, 62:233-252, 1996.

[Vai90] P. M. Vaidya. An algorithm for linear programming which requires
0((m + n)n 2 + (m + n) 1,5 nL) arithmetic operations. Mathematical Programming,
47:175-201, 1990. Condensed version in : Proceedings of the 19th Annual ACM Sym-
posium on Theory of Computing, 29-38, 1987.

29

[Wil65] J. H. Wilkinson. The Algebraic Eigenvalue Problem. Oxford University Press, 1965.

[Wri96] S. Wright. Primal- Dual Interior- Point Methods. Society for Industrial and Applied
Mathematics (SIAM), Philadelphia, Pa, 1996.

[Ye97] Yinyu Ye. Interior Point Algorithms. Wiley-Interscience, 1997.

30

```