Variational Learning for Latent Gaussian Models of Discrete Data by Mohammad Emtiyaz Khan M.Sc., Indian Institute of Science, 2004 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY in The Faculty of Graduate Studies (Computer Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) November 2012 c Mohammad Emtiyaz Khan 2012Abstract This thesis focuses on the variational learning of latent Gaussian models for discrete data. The learning is di cult since the discrete-data likelihood is not conjugate to the Gaussian prior. Existing methods to solve this problem are either inaccurate or slow. We consider a variational approach based on evidence lower bound optimization. We solve the following two main prob- lems of the variational approach: the computational ine ciency associated with the maximization of the lower bound and the intractability of the lower bound. For the rst problem, we establish concavity of the lower bound and design fast learning algorithms using concave optimization. For the second problem, we design tractable and accurate lower bounds, some of which have provable error guarantees. We show that these lower bounds not only make accurate variational learning possible, but can also give rise to algorithms with a wide variety of speed-accuracy trade-o s. We compare various lower bounds, both theoretically and experimentally, giving clear design guidelines for variational algorithms. Through application to real-world data, we show that the variational approach can be more accurate and faster than existing methods. iiPreface All the work in this thesis was done under the supervision of Dr. Kevin Murphy. I also collaborated with several other researchers without whose help this work would not have been possible. I started working on variational learning in 2009 at Xerox Research Center Europe, under the supervision of Dr. Guillaume Bouchard. In 2010, Dr. Benjamin Marlin and I formulated a more general problem in the context of factor analysis. This resulted in the NIPS publications Khan et al. [2010]. Part of Chapter 6 is based on it. The piecewise bounds introduced in Chapter 4 was presented at ICML Marlin et al. [2011]. I am thankful to Ben who originally came up with the idea of piecewise bounds. The stick breaking likelihood introduced in Chapter 5 was rst men- tioned to me by Guillaume Bouchard in 2009. In 2011, Ben convinced me that it could be useful in the context of factor models and Gaussian process regression. Shakir Mohamed helped me with experiments for the paper that was nally published at AISTATS Khan et al. [2012a]. The fast convergent algorithm of Chapter 3 is published in NIPS Khan et al. [2012b]. I collaborated with Shakir who helped me with the experiments done in the paper. I would like to exclusively thank Shakir for useful discussions which resulted in many insights presented in this thesis. Shakir also helped me with many gures and illustrations presented in this thesis. iiiTable of Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix List of Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv List of Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . xv Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.0.1 Notation . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1 Latent Gaussian Models (LGMs) . . . . . . . . . . . . . . . . 4 1.2 Examples of LGMs . . . . . . . . . . . . . . . . . . . . . . . 6 1.2.1 Bayesian Logistic Regression . . . . . . . . . . . . . . 6 1.2.2 Discrete Choice Model . . . . . . . . . . . . . . . . . 9 1.2.3 Gaussian Process Classi cation (GPC) . . . . . . . . 12 1.2.4 Probabilistic Principal Component Analysis . . . . . 14 1.2.5 Correlated Topic Model . . . . . . . . . . . . . . . . . 17 1.3 Distributions for Discrete Observations . . . . . . . . . . . . 19 1.3.1 Binary Observations . . . . . . . . . . . . . . . . . . . 20 1.3.2 Count Observations . . . . . . . . . . . . . . . . . . . 21 1.3.3 Categorical Observations . . . . . . . . . . . . . . . . 21 1.3.4 Ordinal Observations . . . . . . . . . . . . . . . . . . 24 1.4 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . 26 1.5 Summary of Contributions . . . . . . . . . . . . . . . . . . . 27 ivTable of Contents 2 Learning Discrete-Data LGMs . . . . . . . . . . . . . . . . . 30 2.1 Non-Bayesian Approaches . . . . . . . . . . . . . . . . . . . . 30 2.2 Sampling Methods . . . . . . . . . . . . . . . . . . . . . . . . 32 2.2.1 Posterior Inference . . . . . . . . . . . . . . . . . . . 33 2.2.2 Marginal Likelihood Estimation . . . . . . . . . . . . 36 2.2.3 Parameter Estimation . . . . . . . . . . . . . . . . . . 38 2.3 Deterministic Methods . . . . . . . . . . . . . . . . . . . . . 40 2.3.1 Laplace’s Method . . . . . . . . . . . . . . . . . . . . 40 2.3.2 Integrated Nested Laplace Approximation . . . . . . 42 2.3.3 Expectation Propagation . . . . . . . . . . . . . . . . 44 2.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 3 Variational Learning of Discrete-Data LGMs . . . . . . . . 47 3.1 A Variational Approach Based on the Evidence Lower Bound 47 3.2 Intractability of ELBO . . . . . . . . . . . . . . . . . . . . . 50 3.3 Tractable ELBOs Using Local Variational Bounds (LVBs) . 51 3.4 Concavity of the Evidence Lower Bound . . . . . . . . . . . 52 3.5 Variational Learning using Gradient Methods . . . . . . . . . 53 3.5.1 Generalized Gradient Expressions . . . . . . . . . . . 54 3.5.2 An Example of Variational Learning using ELBO . . 56 3.6 Fast Convergent Variational Inference . . . . . . . . . . . . . 57 3.6.1 A Coordinate Ascent Approach . . . . . . . . . . . . 59 3.6.2 Results . . . . . . . . . . . . . . . . . . . . . . . . . . 63 4 Variational Learning of Binary LGMs . . . . . . . . . . . . . 66 4.1 Bernoulli Logit LGMs . . . . . . . . . . . . . . . . . . . . . . 66 4.2 LVBs for bLGMs . . . . . . . . . . . . . . . . . . . . . . . . . 67 4.3 The Jaakkola Bound . . . . . . . . . . . . . . . . . . . . . . . 67 4.3.1 Variational Learning . . . . . . . . . . . . . . . . . . 68 4.4 The Bohning Bound . . . . . . . . . . . . . . . . . . . . . . . 70 4.4.1 Derivation . . . . . . . . . . . . . . . . . . . . . . . . 71 4.4.2 Variational Learning . . . . . . . . . . . . . . . . . . 72 4.5 Piecewise Linear/Quadratic Bounds . . . . . . . . . . . . . . 74 4.5.1 Derivation . . . . . . . . . . . . . . . . . . . . . . . . 75 4.5.2 Variational Learning . . . . . . . . . . . . . . . . . . 77 4.6 Error Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 78 4.7 Experiments and Results . . . . . . . . . . . . . . . . . . . . 81 vTable of Contents 5 Variational Learning of Categorical LGMs . . . . . . . . . . 94 5.1 Categorical LGM . . . . . . . . . . . . . . . . . . . . . . . . 94 5.2 Multinomial Logit Likelihood . . . . . . . . . . . . . . . . . . 95 5.3 Existing LVBs for Multinomial Logit Likelihood . . . . . . . 96 5.4 A New LVB: The Bohning Bound . . . . . . . . . . . . . . . 98 5.4.1 Derivation . . . . . . . . . . . . . . . . . . . . . . . . 99 5.4.2 Variational Learning . . . . . . . . . . . . . . . . . . 100 5.5 Error Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 101 5.6 Stick Breaking Likelihood . . . . . . . . . . . . . . . . . . . . 104 5.6.1 Variational Learning Using Piecewise Bounds . . . . 107 5.7 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 6 Extensions and Future Work . . . . . . . . . . . . . . . . . . 116 6.1 Variational Learning for Ordinal Data . . . . . . . . . . . . . 116 6.2 Variational Learning for Mixed Data . . . . . . . . . . . . . 117 6.3 Variational Learning with Missing Data . . . . . . . . . . . . 119 6.4 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 6.4.1 Designing Generic LVBs . . . . . . . . . . . . . . . . 120 6.4.2 Generalization to Other Likelihoods . . . . . . . . . . 120 6.4.3 Approximate Gradient Methods . . . . . . . . . . . . 121 6.4.4 Large-scale Matrix Factorization . . . . . . . . . . . . 122 6.4.5 Other Speed Ups . . . . . . . . . . . . . . . . . . . . 125 7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Appendix A.1 Expectation Identity . . . . . . . . . . . . . . . . . . . . . . . 140 A.2 Proof of Theorem 3.4.1 . . . . . . . . . . . . . . . . . . . . . 140 A.3 Derivation of the Jaakkola Bound . . . . . . . . . . . . . . . 141 A.4 Derivation of EM algorithm using Quadratic Bounds . . . . 143 A.5 Truncated Gaussian Moments . . . . . . . . . . . . . . . . . 144 A.6 Derivation of the Log Bound . . . . . . . . . . . . . . . . . . 146 A.7 Derivation of the Tilted Bound . . . . . . . . . . . . . . . . . 147 A.8 Proof of Theorem 5.5.1 . . . . . . . . . . . . . . . . . . . . . 148 viList of Tables 1.1 This table shows many existing models as examples of LGM. Each column is a quantity from our generic LGM de nition. Each row shows corresponding quantities for a model. First three models are supervised and last three are unsupervised. For columns 2 and 3, d ranges over 1 to D and n ranges over 1 to N . fadng denotes the set of variables indexed by all values of d and n. y f(z) implies that y can be gener- ated using some function f of z. In last four columns, ‘Obs’ means Observations, ‘Dims’ means Dimensions, ‘Docs’ means Documents, ’Prod’ means Products, ‘Cat’ means Categories, ‘Vocab’ means Vocabulary, and ‘#’ represents the number of a quantity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.2 Link functions for the generalized linear model. Here, ( ) is the cumulative distribution function of the standard normal distribution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.1 This table shows the total number of oating point operations for both algorithms to converge to a tolerance of 1e-3. Rows correspond to values of log(s) while columns correspond for log( ). Here, M,G,T stands for Mega, Giga, and Tera ops. We can see that the proposed algorithms takes much smaller number of operations compared to the existing algorithm. . . 65 viiList of Tables 4.1 Comparison of computational complexity. Each row is a vari- ational EM algorithm. First row is the exact EM algorithm for Gaussian LGM described in Section 3.5.2. Next three rows are variational EM algorithm for bLGMs using various LVBs. The rst two columns contain computational cost of E and M steps, while the third column contains the memory cost. All cost are in big O notation. I is the number of iterations required to converge. Note that the memory cost for piece- wise bound can be reduced to L2+Lmin(D;N) by restricting M-step to one gradient step. . . . . . . . . . . . . . . . . . . . 80 5.1 Performance at best parameter setting (a star in Figure 5.6) . 114 viiiList of Figures 1.1 The graphical model for latent Gaussian models shown in left gure, and expanded in the right gure to explicitly show the correlation in the latent vector zn induced due to a non- diagonal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2 Examples of LGMs for supervised learning: (a) Bayesian lo- gistic regression (b) discrete choice model (c) Gaussian pro- cess classi cation. . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.3 Latent Gaussian Graphical Model . . . . . . . . . . . . . . . . 16 1.4 (a) Correlated topic model vs (b) latent Dirichlet allocation . 19 2.1 MSE vs w for MM, VM, and SS approaches for the FA model. We show results on the test and training sets with 10% and 50% missing data. Top row shows that the test MSE of the non-Bayesian method is extremely sensitive to the prior precision w, while the bottom right plot shows its over tting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 3.1 Convergence results on the binary ionosphere data set for Gaussian process classi cation. We plot the negative of the ELBO with respect to the number of ops. Each plot shows the progress of each algorithm for a hyperparameter setting shown at the top of the plot. The proposed algorithm always converges faster than the other method, in fact, in less than 5 iterations for this dataset. . . . . . . . . . . . . . . . . . . . 64 ixList of Figures 4.1 This gure shows the upper quadratic bounds to the LLP function. Left plot shows the Jaakkola bound (in solid blue lines) for two values of , along with the LLP function (in dashed black lines). The right plot shows the same for the Bohning bound (but in solid red lines) for two values of . Note that the Bohning bound has xed curvature, while the Jaakkola bound allows variable curvature thereby giving a more accurate bound. However, xed curvature leads to a computationally cheaper algorithm. . . . . . . . . . . . . . . . 68 4.2 Figure (a) shows three-piece linear (L3) and quadratic (Q3) upper bounds. Top row shows these bounds on the LLP func- tion and the bottom row shows the induced lower bounds on the Bernoulli logit likelihood. Figure (b) shows the corre- sponding error made in each plot in Figure (a). . . . . . . . . 78 4.3 The maximum error in the LLP bounds as a function of the number of pieces in the bound. Here, ‘L’ stands for the linear bounds, while ‘Q’ stands for the quadratic bounds. . . . . . . 79 4.4 This gure shows results for the 1D synthetic LGGM ex- periment. We show the Bohning, Jaakkola, piecewise lin- ear bounds with 6 and 10 pieces (denoted by L6 and L10 respectively), and piecewise quadratic bounds with 3 and 5 pieces (denoted by Q3 and Q5). The bounds are shown in red dashed lines with darker colors indicating more pieces. The true marginal likelihood is shown in blue solid lines. Markers show the true and estimated parameter values. . . . . . . . . 83 4.5 Figure (a) shows the true covariance matrix for the synthetic bLGGM experiment along with the covariance estimates us- ing the Bohning, Jaakkola, and 10 piece quadratic bounds, in- dicated with ‘B’,‘J’, and ‘Q10’ respectively. Figure (b) shows the KL divergence between the true and estimated distribu- tions for the 5D synthetic bLGGM experiment. We show re- sults for the Bohning and Jaakkola bounds, as well as 3; 4; 5 and 10 piece linear and quadratic bounds. . . . . . . . . . . . 84 xList of Figures 4.6 Results for bFA on the Voting data: Left plot shows the impu- tation error versus time on the UCI Voting data. Markers are plotted at iterations 2; 10; 20; 35. We see that the piecewise bound gives much lower error and takes a times comparable to the Jaakkola bound. Right plot shows the imputation er- ror of the 20-piece quadratic bound relative to Bohning and Jaakkola for the FA model. Each point is a di erent train- test split and a point below the dashed line indicates that piecewise bound performs better than other bounds. . . . . . 85 4.7 Results for 2-factor bFA on the voting data using the piece- wise bound. This gure shows a plot of posterior means of factors. Each point represents a congressman, with size of the marker proportional to the value of the marginal likeli- hood; see legend for details. Republicans (R) are marked with circles while Democrats (D) are marked with squares. . . . . 86 4.8 Left Figure shows the names of the issues. Right gure shows the probability of two issues getting the same vote, computed according to Eq. 4.50. . . . . . . . . . . . . . . . . . . . . . . 87 4.9 The probability of voting ‘yes’ to an issue given the party. . . 88 4.10 Results for bLGGM on the LED dataset. The rst two plots, on the left, show the imputation error of the 20-piece quadratic bound relative to Bohning and Jaakkola for bLGGM and sbLGGM. Each point is a di erent train-test split and a point below the dashed line indicates that piecewise bound performs better than other bounds. The third plot on the right shows the imputation error versus the regularization parameter set- ting for sbLGGM. . . . . . . . . . . . . . . . . . . . . . . . 89 4.11 Posterior mean for the LED dataset at the optimal value of . 90 4.12 Top row shows the posterior covariance matrices for the LED dataset and bottom row shows the corresponding precision matrices, again at the optimal value of . . . . . . . . . . . . 91 4.13 Comparison of approximate posterior for two parameter set- tings, shown at the bottom of the plot with = flog(s); log( )g. We plot elements of the mean and covariance obtained with the variational approach vs those obtained with EP. . . . . . 92 4.14 EP vs variational on the ionosphere dataset. . . . . . . . . . . 93 4.15 EP vs variational on the ‘USPS-3vs5’ dataset. . . . . . . . . . 93 xiList of Figures 5.1 Stick-breaking likelihood for 4 categories. We start with a stick of length 1, and break it at ( 1) to get the probability of rst category. We then split rest of the stick at ( 2) to get the probability of second category. We continue this until the last category, probability of which is equal to whatever is left of the stick. . . . . . . . . . . . . . . . . . . . . . . . . . . 105 5.2 Illustrations showing decision boundaries. There are two fea- tures and 4 categories. In each gure, each point is a data example and its color (and marker) shows its category. The decision boundaries are shown with orange lines. The order- ing of categories for stick breaking likelihood is indicated in blue boxes with numbers. Fig. (a) shows boundaries obtained with the multinomial logit/probit likelihood. Note that there is no ordering constraints imposed on the categories. Fig. (b) and (c) show boundaries for the stick breaking likelihood given a particular ordering of categories. Fig. (b) shows linear decision boundaries, while Fig. (c) shows non-linear bound- aries. Fig. (d) and (e) shows the same for a di erent ordering of categories. This illustration shows that the stick breaking likelihood with linear features is unable to separate the data as well as the multinomial likelihood, however a good sepa- ration can be obtained with non-linear features (quadratic in this illustration). . . . . . . . . . . . . . . . . . . . . . . . . . 106 5.3 A 2D categorical LGGM with K = 3. Fig. (a) shows the covariance matrix of the latent variables. Note that rst 3 latent variables are for the rst dimension, and the last 3 are for the second dimension. Fig. (b) shows the graphical model for the model. We show positive correlations between the latent variables with solid lines and negative correlations with dashed lines. . . . . . . . . . . . . . . . . . . . . . . . . . 109 5.4 Comparison of the true probability distribution to the esti- mated distributions on synthetic data with 4 categories . . . 110 5.5 KL divergence between the true and estimated distributions for di erent categories. . . . . . . . . . . . . . . . . . . . . . . 111 xiiList of Figures 5.6 Comparison of methods for multi-class GP classi cation on the Glass dataset using (a) Multi-HMC (b) Multi-Log (c) Multi-Bohning (d) Probit-VB (e) Stick-PW. For each method, the top plot shows negative of the log marginal likelihood ap- proximations and the bottom plot shows prediction errors. Multi-HMC can be considered as the ground truth, so each method is compared against Figure (a). . . . . . . . . . . . . 113 5.7 Imputation error vs time for cLGGM model on tic-tac-toe data.114 5.8 Imputation errors for Tic-tac-toe and ASES-UK datasets. Each point is a di erent train-test split and a point below the dashed line indicates that Stick-PW performs better than Multi-Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 6.1 Visualization of a 2 factor FA model learned using the Auto data. We plot the posterior means of latent factors for all cars. For easy interpretation, we color code each car depending on its country of origin. . . . . . . . . . . . . . . . . . . . . . . 119 xiiiList of Algorithms 1 Gradients for ELBO . . . . . . . . . . . . . . . . . . . . . . . 55 2 EM for parameter learning in LGMs with Gaussian likelihood 57 3 Fast-convergent coordinate-ascent algorithm . . . . . . . . . . 62 4 Variational EM using the Jaakkola Bound . . . . . . . . . . . 71 5 Variational EM using the Bohning Bound . . . . . . . . . . . 74 xivList of Abbreviations AIS Annealed Importance Sampling CTM Correlated Topic Model ELBO Evidence Lower BOund EM Expectation Maximization EP Expectation Propagation GLM Generalized Linear Model GP Gaussian Process GPC Gaussian Process Classi cation HMC Hybrid Monte Carlo IIA Independence of Irrelevant Alternatives INLA Integrated Nested Laplace Approximations KL Kullback-Leibler LDA Latent Dirichlet Allocation LGM Latent Gaussian Models LGGM Latent Gaussian Graphical Model LLP Logistic-Log-Partition LSE Log-Sum-Exp LVB Local Variational Bound MAP Maximum-a-posteriori MCEM Monte Carlo Expectation Maximization MCMC Markov Chaing Monte Carlo MH Metropolis Hastings PCA Principal Component Analysis POS Product of Sigmoid PPCA Probabilistic Principal Component Analysis RUM Random Utility Model SAEM Stochastic Approximation Expectation Maximization xvAcknowledgements First of all and most importantly, I would like to thank Kevin Murphy for his supervision and for giving me an opportunity to work with him. I would also like to thank my supervisory committee which includes Nando D. Freitas and Arnaud Doucet for helpful discussions and encouragement. During my PhD, I have been extremely lucky to collaborate with many amazing people. First of all, I would like to thank Benjamin Marlin for his help and support. Without him, this work would not have been possible. A special thanks goes to Shakir for useful discussions that have resulted in many insights presented in my thesis. I would also like to thank researchers at Xerox Research center Europe at Grenoble, where I rst started working on this problem. It was a great experience to work there under the supervi- sion of Guillaume Bouchard who not only helped me understand variational methods, but also introduced me to many new avors of wine. I would also like to thank Onno Zoeter and Cedric Archambeau for many useful discus- sions. Many thanks to my colleagues at UBC including David Duvenaud, Frank Hutter, Mark Schmidt, Mike Chiang, Roman Holenstein, and Sancho McCann. I would like to thank all my friends in Vancouver and back home in India who have helped me throughout the course of my PhD. A special thanks goes to Kath, my co ee buddy, for always being there to cheer me up when I am down and celebrate with me when I am happy. Finally, I would like to thank my family for their support throughout my life. xviChapter 1 Introduction The development of accurate models with e cient learning algorithms for high-dimensional and multivariate discrete data is an important and long- standing problem in machine learning and computational statistics. It has applications for data analysis in a wide variety of areas such as economet- rics, social science, medical diagnostics, education, multimedia, web, and recommender systems. In this thesis, we focus on the class of Latent Gaussian Models (LGMs), which model data distributions using Gaussian latent variables. LGMs in- clude popular models such as factor analysis and probabilistic principal com- ponents analysis for continuous data [Bartholomew et al., 2011; Tipping and Bishop, 1999], binary and multinomial factor analysis for discrete data [Collins et al., 2002; Khan et al., 2010; Mohamed et al., 2008; Wedel and Kamakura, 2001], and Gaussian process regression and classi cation [Nick- isch and Rasmussen, 2008]. LGMs use a continuous latent space to capture correlation in data, and are therefore well-suited for the analysis of hetero- geneous discrete datasets containing di erent kinds of data such as binary, categorical, ordinal, count, etc. LGMs also allow for a principled approach to handle missing data and can be used for dimensionality reduction, data prediction, and visualization. The main focus of this thesis is the Bayesian analysis of discrete data us- ing LGMs. A Bayesian analysis is fruitful in applications where uncertainty estimates are important; for example, when the data is noisy or contains missing values. In the Net ix movie-rating dataset, for instance, the num- ber of ratings per user and movie varies signi cantly: some movies in the training set have as few as 3 ratings, while one user has rated over 17,000 movies1. Such variance in missingness makes some of the users (and movies) more informative than others. In situations like this, the Bayesian analysis is useful since it computes a posterior distribution over the unknown vari- ables, providing a measure of reliability and thereby improving prediction performance. Bayesian analysis also computes the marginal likelihood, a ro- 1www.netflixprize.com/community/viewtopic.php?id=141 1Chapter 1. Introduction bust measure of model- t, which provides a principled approach for model selection. In case of LGMs for discrete data, the Bayesian analysis is challenging since the marginalization of latent variables, required for the computation of marginal likelihood, is intractable. This integration can be performed analytically in Gaussian-likelihood LGMs such as factor analysis because the model is jointly Gaussian in the latent and observed variables [Bishop, 2006]. LGMs with discrete-data likelihoods, such as logit and probit, lack this property, resulting in intractable integrals for the marginal likelihood. There are several approaches for approximating this integral. The most popular approach is to use Markov chain Monte Carlo (MCMC) methods [Albert and Chib, 1993; Fr uhwirth-Schnatter and Fr uhwirth, 2010; Holmes and Held, 2006; Mohamed et al., 2008; Scott, 2011]. This approach can be quite accurate since, theoretically, the approximation converges to the truth as the sampler collects more samples. In practice, however, this incurs a sig- ni cantly high computational cost, and requires expert-level knowledge for the convergence diagnostics and sampler tuning. There exist many deter- ministic approaches which usually have much lower computational cost than MCMC, but they are less general. For example, the recently proposed Inte- grated Nested Laplace Approximation (INLA) [Rue et al., 2009], which uses numerical integration to approximate the integral, is limited to six or fewer parameters and is thus not suitable for LGMs with large number of parame- ters. Similarly, expectation propagation (EP) [Minka, 2001], a method that approximates the posterior distribution by maintaining expectations and it- erating until these expectations are consistent for all variables, has problems when applied to the latent factor model case [Rattray et al., 2009]. The EP procedure is not always guaranteed to converge and can be numerically un- stable [Jyl anki et al., 2011; Seeger and Nickisch, 2011] (see Section 2.3.3 for details). Our solutions in this thesis are based on the variational approach where we compute a lower bound to the integral using Jensen’s inequality. Unlike EP and INLA, this approach does not su er from numerical issues and convergence problems, and is applicable to more general settings such as parameter learning in the latent factor models. However, similar to other deterministic methods, the computational cost of the variational approach remains much lower than MCMC. Application of the variational approach to discrete-data LGMs has two main challenges. First, the lower bound obtained using Jensen’s inequal- ity may not be tractable and an additional local variational bound (LVB) is required for tractability. Although many LVBs have been proposed (for 2Chapter 1. Introduction example, Ahmed and Xing [2007]; Blei and La erty [2006]; Bouchard [2007]; Braun and McAuli e [2010]; Khan et al. [2010]), a clear conclusion on accu- racy of these bounds is missing. The variational approach performs poorly whenever LVBs are not accurate, but design of accurate LVBs with error guarantees is a di cult task. The second challenge with the variational approach is their computa- tional e ciency. Even though the approach is more e cient than MCMC, it still does not scale well to large datasets, limiting its use to datasets with only few thousands of variables. For discrete-data LGMs, a big source of in- e ciency comes from the posterior covariances. Variational learning requires inversion of posterior covariances which prohibits the use of the variational approach to large datasets. In addition, these covariances have quadratic number of parameters which slows down the optimization. In this thesis, we make several contributions to solve the two challenges associated with the variational approach. Our rst contribution is the de- sign of accurate LVBs for discrete-data modeling. In Chapter 4,5, and 6, we derive new LVBs for binary, categorical, and ordinal data that lead to accurate and fast variational algorithms. Our second contribution is in the comparison and analysis of LVBs to obtain good design guidelines to con- struct e cient variational algorithms. We show, through application to the real dataset, that LVBs can be used to obtain variational algorithms with a wide range of speed-accuracy trade-o s. Our third contribution is to im- prove the computational e ciency of variational algorithms using concave optimization methods. Finally, we thoroughly compare our approach with existing approaches, such as MCMC, EP, and variational Bayes, showing that our approach, while solving the problems associated with existing ap- proaches, performs not only comparably to them, but sometimes even better than them. Since LGMs are the main focus of this thesis, we spend the rest of the chapter reviewing this model class, along with the statistical and computa- tional challenges it o ers. We de ne LGMs in Section 1.1 and describe a few examples of LGMs in Section 1.2. Our examples include popular mod- els such as Bayesian logistic regression, Gaussian process classi cation, and principal component analysis. LGMs are used to model discrete data using a likelihood function which \links" the latent Gaussian vector to the discrete data. We discuss di erent choices of likelihood functions for binary, cate- gorical, ordinal, and count data in Section 1.3. We describe the objectives of the thesis in Section 1.4, listing four main tasks of interest. We conclude the chapter with a brief summary of the thesis in Section 1.5. 31.1. Latent Gaussian Models (LGMs) 1.0.1 Notation We denote real-valued scalars by small letters e.g. a; b; c; : : :, real-valued vectors by boldface small letters e.g. ; ;x; : : :, real-valued matrices by boldface capital letter e.g. A;B;C; : : :, (subsets of) natural numbers by capital letters e.g. N;M; : : :. We denote i’th element of a vector a by ai and (i; j)’th entry of a matrix A by Aij . Given a square matrix A of size N and S f1; 2; : : : ; Ng, AS denotes the matrix formed by taking the rows and columns corresponding to indices in S. Similarly, A:;S (or AS;:) is a matrix formed by taking columns (or rows) corresponding to indices in S. We denote the determinant of a positive-de nite matrix A by jAj. A random vector x following a Gaussian distribution with mean and covariance is denoted by N (xj ; ). A probability distribution over x given parameters is denoted by p(xj ). Expectation of a function f(x) with respect to this distribution is denoted by Ep(xj )[f(x)]. Lower and upper bound to a quantity f is denoted by f and f , respectively. We denote the identity matrix of size D by ID. 1.1 Latent Gaussian Models (LGMs) In this section, we de ne the generic latent Gaussian model for discrete data. We consider N data instances, with n’th visible data vector denoted by yn and corresponding latent vector denoted by zn. In general, yn and zn will have dimensions D and L, respectively. Each element of yn, denoted by ydn, can take values from a (countably in nite) discrete set Sd, e.g. for binary observations Sd = f0; 1g and for count observations Sd = f0; 1; 2; : : :g. In LGMs, the latent vectors zn follow a Gaussian distribution with mean and covariance matrix as shown in Eq. 1.1. The probability of each observation ydn is parameterized in terms of the linear predictor dn, as shown in Eqs. 1.2 and 1.3. The predictor dn is de ned through Wd, a real-valued matrix of size Kd L called the factor loading matrix, and w0d, a Kd length real-valued vector called the o set vector. The value of Kd and the form of the likelihood p(ydnj dn) both depend on the type of observation ydn. We give few examples of these in the next section. p(znj ) = N (znj ; ) (1.1) dn = Wdzn + w0d (1.2) p(ynjzn; ) = DY d=1 p(ydnj dn; ) (1.3) 41.1. Latent Gaussian Models (LGMs) z n y d n Σ µ d= 1: D n = 1: N w 0 W (a) n = 1: N w 0 y 1 n y 2 n y 3 n y D n z 2 n z L n z 1 n Σ µ W (b) Figure 1.1: The graphical model for latent Gaussian models shown in left gure, and expanded in the right gure to explicitly show the correlation in the latent vector zn induced due to a non-diagonal . If extra input features are available, the predictor dn can be rede ned as a function of them. For example, in hierarchical regression models such as discrete choice model, features Xdn are available for (d; n)’th data point and the predictor may be de ned in terms of these features: dn = Xdnzn (see Section 1.2.2). We will stick with our de nition, since our de nition can be trivially extended to include these special cases (e.g. we can rede ne loading matrices as Wdn = Xdn). We denote the set of parameters by which constitutes of parameters required to de ne the following set of variables: f ; ;Wd;w0dg along with some extra parameters needed to de ne the likelihood of Eq. 1.3. The graphical model for LGM is shown in Fig. 1.1(a), with an expanded version in Fig. 1.1(b) showing correlations in zn due to a non-diagonal . It is redundant to have both W and a non-diagonal since the data correlation can be modeled with one of them xed to identity and other being unrestricted [Roweis and Ghahramani, 1999]. However, we allow both W and to be unrestricted since it allows us to de ne LGM in the most general setting. Depending on a particular model, we will assume some restriction on these parameters. 51.2. Examples of LGMs 1.2 Examples of LGMs In this section, we give examples of LGMs, establishing the generality of our de nition given in the previous section. We discuss many popular models which can be grouped into two major classes: (1) the class of regression mod- els which includes models such as Bayesian logistic regression and Gaussian process classi cation (2) the class of latent factor models which includes models such as principal component analysis and discrete choice models. The former class is supervised while the latter is unsupervised. Table 1.1 summarizes the equivalence between these models and our generic LGM de nition. Our goal in this section is to discuss the challenging problems that these models raise. We summarize these problems in Section 1.4 as our learning objectives for the generic LGM. 1.2.1 Bayesian Logistic Regression The Bayesian logistic regression model [Holmes and Held, 2006; McCullagh and Nelder, 1989] is used to assign a binary label y 2 f0; 1g to input variables (or features) x, say of length L. Given D input-output pairs, the distribution of d’th label yd is de ned by the Bernoulli logit likelihood, shown in Eq. 1.4, with the logit function de ned in Eq. 1.5. A constant bias term is usually added to xTd z which we ignore here for simplicity. We assume that z, the weight vector, follows a Gaussian distribution as shown in Eq. 1.6. The hyperparameters of this model are = f ; g, since we integrate out z. p(yd = 1jxd; z) = (z Txd) (1.4) ( ) := 1=(1 + exp( )) (1.5) p(zj ) = N (zj ; ) (1.6) The graphical model is shown in Fig. 1.2(a). See Table 1.1 for equiv- alence between this model and LGM. The latent vector z is the regression weight vector, and the observation yd can be modeled using the predictor xTd z. The Bayesian logistic regression is a special case of LGM with the following restrictions: (1) there are no repeated samples of yd available i.e. N = 1, (2) the loading matrix wd is given and is equal to xTd , and (3) w0 = 0. The table also gives the descriptions of various quantities such as N;D;L and K under this model. This model can be generalized to handle outputs of di erent types us- ing the generalized linear model (GLM) [McCullagh and Nelder, 1989], all extensions being within the LGM class. For example, for multi-class regres- sion (also known as polychotomous regression in statistics), the multinomial 61.2 . Example s of LGM s Model Data Latent vector z N D L K Bayesian Logistic fyd;xdg Regression weights ; 1 #Obs #Features #Class Regression yd f(zTxd) Discrete fydn;Xdng Regression weights ; #users #Choices #Features #Prod Choice Model yd f(Xdnzn) Gaussian Process fyd;xdg Regression weights s; 1 #Obs #Features #Class Classi cation yd f(zd) Probabilistic fydng Latent factors W;w0 #Obs #Dims #Factors #Cat PCA ydn f(Wdzn + w0d) Latent Gaussian fydng Latent Gaussian ; #Obs #Dims #Dims #Cat Graphical Model ydn f(zdn) Correlated fydng Topic vector ; ;B #Docs #Words #Topics #Vocab Topic Model ydn fd(znjB) Table 1.1: This table shows many existing models as examples of LGM. Each column is a quantity from our generic LGM de nition. Each row shows corresponding quantities for a model. First three models are supervised and last three are unsupervised. For columns 2 and 3, d ranges over 1 to D and n ranges over 1 to N . fadng denotes the set of variables indexed by all values of d and n. y f(z) implies that y can be generated using some function f of z. In last four columns, ‘Obs’ means Observations, ‘Dims’ means Dimensions, ‘Docs’ means Documents, ’Prod’ means Products, ‘Cat’ means Categories, ‘Vocab’ means Vocabulary, and ‘#’ represents the number of a quantity.71.2. Examples of LGMs logit likelihood can be used; see Section 1.3.3 for details on the multinomial logit likelihood. We now describe various tasks of interests in the Bayesian logistic re- gression model. First of all, we would like to infer the posterior distribution over z given the training data, as shown below. p(zjy;X; ) / p(zj )p(yjX; z) = N (zj ; ) DY d=1 eydx T d z log(1+exp(xTd z)) (1.7) Here, y is a vector containing all the output labels and X is a matrix with corresponding inputs as rows. Since the Gaussian distribution is not conju- gate to the Bernoulli logistic likelihood, we do not have a parametric form for the posterior. A popular approach is to use Markov chain Monte Carlo (MCMC) to generate samples from the posterior [Fr uhwirth-Schnatter and Fr uhwirth, 2010; Holmes and Held, 2006; Scott, 2011]. An alternative ap- proach is to approximate the posterior distribution using a Gaussian distri- bution [Jaakkola and Jordan, 1996; Minka, 2001]. Another task of interest is the prediction of new inputs. Given an input vector x , the predictive distribution for label y can be obtained as in Eq. 1.8. This integral is intractable but can be simpli ed to a one-dimension integral which can be approximated either by numerical integration or Monte Carlo estimate [Bishop, 2006, Section 4.5.2]. p(y = 1jx ;y;X; ) = Z p(y = 1jx ; z)p(zjy;X; )dz (1.8) = Z (xT z)p(zjy;X; )dz (1.9) Finally, we would like to compute marginal likelihood for model compar- ison and selection [Fr uhwirth-Schnatter and Wagner, 2008]. This involves a high-dimensional intractable integral shown below. p(yjX; ) = Z p(zj )p(yjX; z)dz (1.10) = Z N (zj ; ) DY d=1 eydx T d z log(1+exp(xTd z))dz (1.11) Although this remains a di cult problem to solve, approximations based on MCMC methods can be obtained (see Fr uhwirth-Schnatter and Wagner [2008] for details). Alternatively, variational methods can be used to obtain an approximation or a lower bound to the integral [Jaakkola and Jordan, 1996; Minka, 2001]. 81.2. Examples of LGMs z y d x d Σ µ d= 1: D (a) z n y d n x dn Σ µ d= 1: D n = 1: N (b) z 2 y 2 X Σ µθ z 1 y 1 z D y D (c) Figure 1.2: Examples of LGMs for supervised learning: (a) Bayesian logistic regression (b) discrete choice model (c) Gaussian process classi cation. 1.2.2 Discrete Choice Model Discrete choice models [Train, 2003] are used in the analysis of consumer choice data which arises when agents select items from a nite collection of alternatives, e.g. people buying items from a store. Heterogeneous discrete choice models that allow preferences to di er across agents are based on a hierarchical regression model and are a special case of LGMs. We describe the model de ned by Braun and McAuli e [2010]. Let us say that we have agents, indexed by n = 1; 2; : : : ; N , choosing items, indexed by k = 1; 2; : : : ;K, di erentiated according to L features or attributes. We observe the choices that agents make at di erent times, i.e. we have pairs (ydn;Xdn) where ydn is the item chosen by the n’th agent at d’th decision and Xdn is a K L matrix containing attributes for all items encountered by the user n when she made her d’th choice. The feature Xdn can also be constant for all d and n, but a more realistic situation is to allow it to be di erent for each (d; n) pair. For simplicity, let us assume that the total number of decisions for all users is same and equal to D. Under the \random utility model", the utility of n’th user choosing the k’th item is obtained as follows: ukdn = zTnxkdn + ekdn, where zn is L- 91.2. Examples of LGMs length vector of the user speci c \taste" or \preference loadings", xkdn is k’th row of Xdn, and ekdn is the random error. A priori, we expect that the taste of agents will be similar and hence we assume a multivariate Gaussian prior over zn shown in Eq. 1.12. We assume that random errors ekdn are iid from a Gumbel Type 2 distribution which leads to the multinomial logit distribution for the choices as shown in Eq. 1.13 (see Section 1.3.3 for details on the multinomial logit distribution). The parameter set of this model is given by = f ; g. p(znj ) = N (znj ; ) (1.12) p(ydn = kjXdn; zn) = exp zTnxkdn PK j=1 exp (z T nxjdn) (1.13) The graphical model is shown in Fig. 1.2(b). See Table 1.1 for equiva- lence between this model and LGM. The latent vector zn is the regression weight vector for n’th user, and the observation ydn can be modeled using the predictor Xdnzn. This model is a special case of LGM with the follow- ing modi cations: allow Wd to depend on n, and de ne Wdn = Xdn and w0 = 0. The table also gives the descriptions of various quantities such as N;D;L and K under this model. We now discuss the tasks of interests in this model. For notational convenience, we use a dummy encoding for ydn, that is, we encode it as a binary vector where we set eykdn to 1, if ydn = k, and set rest of the elements of ey to 0. Using this, the multinomial logit likelihood can be more compactly written as shown below, p(ydnj dn) = exp(~yTdn dn) PK j=1 exp ( jdn) = exp ~yTdn dn lse( dn) (1.14) where lse( ) := log P j exp( j) is the log-sum-exp (LSE) function. Also de ne Xn to be the matrix containing the Xdn as rows, X to be the matrix containing all the Xn, yn to be vector of all the ~ydn, and y to be the vector of all the yn. First task of interest is the computation of posterior distribution of zn given yn, which can be rewritten as follows, p(znjyn;Xn; ) / p(znj )p(ynjXn; zn) (1.15) = N (znj ; ) DY d=1 exp ~yTdn dn lse( dn) (1.16) 101.2. Examples of LGMs Note that, similar to the logistic regression model, we do not have a closed form expression for this posterior distribution, the reason being the same: the Gaussian distribution is not conjugate to the multinomial logit distribu- tion. Second task of interest is the computation of marginal likelihood of yn. This involves computation of an intractable integral as shown below. p(ynj ;Xn) = Z N (znj ; ) DY d=1 exp ~yTdn dn lse( dn) dzn (1.17) The above marginal likelihood is also useful in the estimation of parameters . Fully Bayesian approaches assume a prior distribution over and aim to compute a posterior distribution shown below. p( jy;X) / p( ) NY n=1 p(ynj ;Xn) (1.18) We see that computation of this posterior distribution is di cult since it requires p(ynj ;Xn) for all n, each of which involves an intractable inte- gral. We can obtain samples from this distribution using MCMC methods although this usually tends to be slow and does not scale well with N and D. An alternative approach is to compute a point estimate of , instead of a full posterior distribution, e.g. the maximum-a-posteriori (MAP) estimate [Braun and McAuli e, 2010] shown below. ^ = arg max log p( ) + NX n=1 log p(ynj ;Xn) (1.19) We can use deterministic methods to obtain an approximation of the marginal likelihood and its gradient with respect to , which can then be used in a numerical optimizer to obtained an estimate of . Finally, we are interested in computing predictive choice distribution which is the distribution of an item given a new attribute matrix X , as shown in Eq. 1.20. This can also be interpreted as the choices made by an \average agent" [Braun and McAuli e, 2010]. p(y = kjX ; ) = Z p(y = kjz; )p(zjX ; )dz (1.20) 111.2. Examples of LGMs 1.2.3 Gaussian Process Classi cation (GPC) The Bayesian logistic regression model is a linear classi er since y depends on a linear function of x. A Gaussian process classi cation model uses a non-linear latent function f(x) to obtain the distribution of y [Kuss and Rasmussen, 2005; Nickisch and Rasmussen, 2008]. The non-linearity in f(x) is obtained by assuming a Gaussian process prior. A Gaussian process [Rasmussen and Williams, 2006] is a stochastic pro- cess fully speci ed by a mean functionm(x) = E[f(x)] and a positive-de nite covariance function k(x;x0) = E[(f(x) m(x))(f(x0) m(x0))]. Assuming a Gaussian process prior over f(x) implies that a random variable is associ- ated with every input x, such that given all the inputs X = [x1;x2; : : : ;xD], the joint distribution over [f(x1); f(x2); : : : ; f(xD)] is Gaussian. Let zd = f(xd) and z = (z1; z2; : : : ; zD). The Gaussian process prior is shown in Eq. 1.21. Here, is a vector with m(xi) as the i’th element, is a matrix with k(xi;xj) as the (i; j)’th entry, and are the parameters of the mean and covariance function (more details given below). As before, the likelihood of a label is obtained using the Bernoulli logit likelihood, as shown in Eq. 1.22. p(zjX; ) = N (zj ; ) (1.21) p(yd = 1jzd) = (zd) (1.22) The detailed description of mean and covariance function can be found in Rasmussen and Williams [2006]. An example of the mean function is the zero-mean function with m(x) = 0; 8x. Similarly, an example of the covari- ance function is the squared-exponential covariance function (also known as radial-basis function or Gaussian) de ned below, k(x;x0) = s exp[ 12l (x x 0)T (x x0)] (1.23) For this function, the hyper-parameters of the GP prior are = fs; lg, both positive real numbers, representing the signal variance and length scale, re- spectively. Similar to the Bayesian logistic regression case, likelihood func- tion can be modi ed to handle various types of outputs, for example, see Chu and Ghahramani [2005]; Girolami and Rogers [2006]. The graphical model is shown in Fig. 1.2(c) which can be compared against the LGM graphical model in Fig. 1.1(b). See Table 1.1 for equiva- lence between this model and LGM. The latent vector z contains the latent variables zd for observations yd. The observation yd is modeled using zd. There is one latent variable per observations, making the latent dimension 121.2. Examples of LGMs equal to the data dimension. This model is a special case of LGM with the following restrictions: (1) there are no repeated samples of yd available i.e. N = 1, (2) the loading vector Wd = ID and w0 = 0, and (3) the features X are used to de ne and using mean and covariance functions, respec- tively. The table also gives the descriptions of various quantities such as N;D;L and K under this model. The various tasks of interests are similar to the Bayesian logistic regres- sion model. Let y be the vector yd and X be the matrix containing Xd as rows. First of all, we are interested in posterior inference which has an intractable form shown below. p(zjy;X; ) / p(zjX; )p(yjz) = N (zj ; ) DY d=1 eydzd log(1+exp(zd)) (1.24) Similar to the regression case, we can use MCMC or deterministic approxi- mations. Detailed comparisons of these methods can be found in Kuss and Rasmussen [2005] and Nickisch and Rasmussen [2008]. Note that the di- mensionality of z increases with D, making posterior inference much harder compared to the Bayesian logistic regression. Prediction of a new input x can be obtained by integrating out the corresponding latent function z as shown in Eq. 1.25. The second term in the integral is the posterior distribution of z , derived by marginalizing out z from the joint distribution, as shown in Eq. 1.26 and 1.27. p(y = 1jx ;y;X; ) = Z (z )p(z jx ;y;X; )dz (1.25) p(z jx ;y;X; ) = Z p(z ; zjx ;y;X; )dz (1.26) = Z p(z jz;x ;X; )p(zjy;X; )dz (1.27) The rst term is the conditional distribution of z given z and can be ob- tained using the fact that z and z are jointly Gaussian. This joint distri- bution is shown in Eq. 1.28 where is the variance of z and is the cross-covariance between z and z (note that is a vector, but we denote it with a bold letter for simplicity). Finally, the conditional distribution is shown in Eq. 1.29. p(z ; zjx ;X; ) = N z z 0; T (1.28) p(z jz;x ;X; ) = N z j T 1z; T 1 (1.29) 131.2. Examples of LGMs The nal task of interest is the computation of marginal likelihood, p(yjX; ) = Z N (zj ; ) DY d=1 eydzd log(1+exp(zd))dz (1.30) Marginal likelihood is not only useful for model comparison, but also for optimizing the hyper-parameters . In GPC, classi cation accuracy is very sensitive to the setting of hyper-parameters since they encode the prior belief about correlation in the latent variables, making their estimation very important. We can jointly compute a distribution over f and using MCMC, but a popular approach is to obtain a type II maximum likelihood estimate by maximizing the log of the marginal likelihood as shown below. ^ = arg max log p(yjX; ) (1.31) 1.2.4 Probabilistic Principal Component Analysis Principal component analysis (PCA) is a widely used technique for applica- tions such as dimensionality reduction, visualization, and feature extraction. Given N data vector yn with real-valued entries, PCA is a projection that minimizes the mean squared error between the data vectors and their projec- tions [Pearson, 1901]. It can also be interpreted as the orthogonal projection of the data vectors onto a lower dimensional space such that the variance of the projection is maximized [Hotelling, 1933]. A probabilistic version of PCA was proposed by Tipping and Bishop [1999], where PCA is expressed as the maximum likelihood solution of a probabilistic latent variable model. There are several advantages of prob- abilistic PCA (PPCA), as discussed in Bishop [2006]. First of all, PPCA allows us to capture the correlation in the data with a fewer number of parameters, hence just like PCA it allows dimensionality reduction. An e cient EM algorithm can be obtained in cases where only few principal components are required [Ahn and Oh, 2003]. PPCA also allows for a prin- cipled approach to deal with missing values and to do model selection and comparison. PPCA is a LGM. It assumes an isotropic, spherical Gaussian prior on the latent variables zn and a factorial likelihood for yn, as shown in Eq. 1.32 and 1.33. Distribution for each dimension is a Gaussian distribution shown in Eq. 1.34. Here, 2 is the noise variance, wd and w0d are the factor 141.2. Examples of LGMs loading vector and o set respectively. p(zn) = N (znj0; I) (1.32) p(ynjzn; ) = DY d=1 p(ydnjzn; ) (1.33) p(ydnjzn; ) = N (ydnjw T d zn + w0d; 2) (1.34) See Table 1.1 for equivalence between this model and LGM. The latent vector zn contains the latent factors, and the observation ydn can be modeled using the predictor Wdz + w0d. The table also gives the descriptions of various quantities such as N;D;L and K under this model. There are many popular models similar to PPCA. Bayesian exponential family PCA (BxPCA) [Mohamed et al., 2008] is a generalization of PPCA to non-Gaussian data vectors and is also a special case of LGMs. BxPCA assumes a general exponential family likelihood instead of a Gaussian likeli- hood. For example, for binary data, we can use the Bernoulli logit likelihood, shown below. p(ydnjzn; ) = (w T d zn + w0d) (1.35) A similar technique, called factor analysis (FA) [Bartholomew, 1980; Spear- man, 1904], is also a special case of LGM. Here, the Gaussian likelihood in Eq. 1.33 is not spherical i.e. the noise covariance is a diagonal matrix with di erent variances along di erent dimensions. A rather less popular model but yet important for this thesis is the latent Gaussian graphical model (LGGM). This model uses a Gaussian graphical model over latent variables to model the correlation in the data vectors. See Rue et al. [2009] and Yu et al. [2009] for few examples of this model. In its simplest form, we can assume that the number of latent variables is equal to the length of yn, i.e. L = D. The LGGM model then assumes a multivariate Gaussian prior over latent vectors as shown in Eq. 1.36. The likelihood of each dimension ydn only depends on d’th entry of zn as shown in Eq. 1.37. The parameters of this model are = f ; g. p(znj ) = N (znj ; ) (1.36) p(ynjzn) = DY d=1 p(ydnjzdn) (1.37) This model naturally arises in some applications, e.g. spatial statistics, where a sparse dependency structure on zn is known [Rue et al., 2009]. 151.2. Examples of LGMs z 2 n y 2 n Σ µ z 1 n y 1 n z D n y D n n = 1: N Figure 1.3: Latent Gaussian Graphical Model However, it can also be used as a joint density model to explain the cor- relation in the observed data, e.g. see Yu et al. [2009] for application to collaborative ltering. The graphical model is shown in Fig. 1.3 which can be compared against the LGM graphical model in Fig. 1.1(b). See Table 1.1 for equivalence between this model and LGM. Note that, similar to GPC, there is one latent variable per observations, making the latent dimension equal to the data dimension. We now discuss some tasks of interest for the PPCA model. We will discuss these in the context of binary data using likelihood shown in Eq. 1.35. First task of interest is the computation of posterior distribution of zn given yn, shown below. p(znjyn; ) / p(zn)p(ynjzn; ) (1.38) = N (znj0; I) DY d=1 eyd(w T d zn+w0d) log(1+exp(wTd zn+w0d)) (1.39) Again, the Gaussian distribution is not conjugate to the logistic function making the inference intractable. Second task of interest is the computation of the marginal likelihood of 161.2. Examples of LGMs yn. This involves computation of an intractable integral as shown below. p(ynj ) = Z p(zn)p(ynjzn; )dzn (1.40) = Z N (znj0; I) DY d=1 eyd(w T d zn+w0d) log(1+exp(wTd zn+w0d))dzn (1.41) The above marginal likelihood is also useful in the estimation of parameters , and fully Bayesian approaches based on MCMC can be applied. An easier approach, though, is to compute a point estimate of , for example, the type-II maximum likelihood estimate [Khan et al., 2010; Tipping, 1998; Tipping and Bishop, 1999]. Finally, we are interested in imputing missing values. Given a vector y = [yo ym], where yo is the observed part and ym is the missing part, the probability that the i’th missing entry ymi takes a value 1 is given in Eq. 1.42. Here, we plug-in the estimate ^ of , although a full distribution over can also be used. As the equation suggests, we rst compute the posterior distribution p(zjyo; ) and then approximate this integral with a Monte Carlo estimate. p(ymi = 1jy o; ^) = Z p(ymi = 1; zjy o; ^)dz = Z p(ymi = 1jz; ^)p(zjy o; ^)dz (1.42) 1.2.5 Correlated Topic Model Topic models, such as latent Dirichlet allocation (LDA) [Blei et al., 2003], are useful in the analysis of documents. In LDA, for example, words in documents are represented as random mixtures over latent variables which can be interpreted as topics. The correlated topic model (CTM) [Blei and La erty, 2006] takes a step further and models the correlations among topics using a latent Gaussian vector. We now show that CTM is a special case of LGM. We consider N documents with D words each with a vocabulary of size K. Let zn be a length L real-valued vector for n’th document following a Gaussian distribution as shown in Eq. 1.43. Given zn, a topic tdn is sampled for the d’th word in n’th document using a multinomial distribution shown in Eq. 1.44. Probability of that word ydn is then given by Eq. 1.45. Here B is a K L real-valued matrix with non-negative entries and rows that sum to 1, i.e. PK k=1Bkl = 1 for all l. The parameter set for this model is given 171.2. Examples of LGMs by = f ; ;Bg. p(znj ) = N (znj ; ) (1.43) p(tdn = ljzn) = exp(zln) PL j=1 exp(zjn) (1.44) p(ydn = kjtdn; ) = Bk;tdn (1.45) The graphical model is shown in Fig. 1.4(a). We now show that this model is a LGM with a di erent likelihood func- tion. Below, we derive this likelihood by marginalizing out the topic vari- ables tdn. p(ydn = kjzn; ) = LX l=1 p(ydn = kjtdn = l; )p(tdn = ljzn) (1.46) = LX l=1 Bkl exp(zln) PL j=1 exp(zjn) (1.47) See Table 1.1 for equivalence between this model and LGM. The latent vector zn is the topic vector using which the topic proportions are obtained. The words ydn are then modeled using the topic proportions. The equiva- lence to LGM can be obtained by setting Wd and w0d to the identity matrix and zero vector respectively, and using the likelihood above with an extra parameter B. The complete parameter set is = f ; ;Bg. The table also gives the descriptions of various quantities such as N;D;L and K under this model. This model is closely related to the class of multinomial PCA (mPCA) model where the latent vector z is a probability vector [Buntine, 2002]. For example, LDA, a member of mPCA class, assumes a Dirichlet prior over z. As a result, z lies in the probability simplex with non-negative elements which sum to 1. Since z is probability vector, the topic variable tdn can directly be modeled with a multinomial distribution. In CTM, this required the use of the multinomial logit likelihood which rst transforms the real- valued vector z to a probability vector and then use multinomial distribution to model the topics. We can see in Fig. 1.4(b) that the graphical model of LDA is very similar to that of CTM. The advantage of CTM, however, is that it can model correlations between topics using the covariance matrix [Blei and La erty, 2006]. The topic models can also be combined with the PCA type models to model the correlation between documents and other types of variables, e.g. see the ideal point model of Gerrish and Blei [2011]. 181.3. Distributions for Discrete Observations z n t d n y d n Σ µ B d= 1: D n = 1: N (a) z n t d n y d nΣ d= 1: D n = 1: N B (b) Figure 1.4: (a) Correlated topic model vs (b) latent Dirichlet allocation The tasks of interest in CTM are very similar to what we discussed before for the PPCA and discrete choice models. The di culty in these tasks arises from the non-conjugacy of the likelihood shown in Eq. 1.47 to the Gaussian prior. 1.3 Distributions for Discrete Observations We now discuss choices of the distribution p(ydnj dn) for various types of discrete measurements. Speci cally, we consider the following four types: binary, count, ordinal, and categorical. For notational simplicity, we will drop the subscript d and n, and specify the distribution p(yj ) for a scalar observation y with predictor . There are two popular approaches to derive distributions for discrete observations: the random utility model (RUM) [Marschak, 1960] and the generalized linear model (GLM) [McCullagh and Nelder, 1989]. The former is more popular in statistics and bio-statistics, while the later is popular in econometrics and psychometrics. Although the two approaches are fun- damentally di erent, they can give rise to equivalent models [Skrondal and 191.3. Distributions for Discrete Observations Link Function g( ) Logit log( =(1 )) Probit 1( ) Logarithm log( ) Complementary log-log log( log(1 )) Table 1.2: Link functions for the generalized linear model. Here, ( ) is the cumulative distribution function of the standard normal distribution. Rabe-Hesketh, 2004]. In the RUM approach or otherwise known as the latent response model (LRM), we consider a latent utility u = + , where is an error term. An observation is then generated from the utility using di erent kinds of threshold functions. A GLM is de ned by two components. First, a link function g( ) which links the expectation of the observation (denoted by ) to the linear predictor as = g( ). Examples of g are shown in Table 1.2. Second, a conditional probability distribution of the observation is chosen from the exponential family distribution. For a scalar observation y with a scalar predictor , the exponential family distribution is de ned as follows, p(yj ) = h(y) exp ( T (y) A( )) (1.48) Here, T (y); h(y), and A( ) are known functions. We now describe distribu- tions for di erent types of observations derived using the two models. 1.3.1 Binary Observations We model a binary (or dichotomous) observation y 2 f0; 1g with the Bernoulli distribution p(y = 1j ) = , where is the expectation of the binary vari- able which can be modeled using logit and probit links as shown in Eq. 1.49 and 1.50. = exp( ) 1 + exp( ) = ( ) (1.49) = ( ) (1.50) These distributions can also be derived using the RUM approach. Assuming a normal distribution for the error term gives rise to the probit model, while assuming a logistic cumulative distribution function for the error term gives rise to the logit model (we will discuss this in detail in Section 1.3.3). 201.3. Distributions for Discrete Observations 1.3.2 Count Observations Count observations take non-negative integer values f0; 1; 2; 3; : : : ; g. Such an observation can be modeled using the Poisson distribution with expec- tation , given in Eq. 1.51. We link the expectation to the predictor using a log link where = e . p(y = kj ) = e k k! (1.51) 1.3.3 Categorical Observations A categorical observation takes value in a discrete set fC0; C1; : : : ; CKg, where each Ck is a category. This type of observation is also referred to as multinomial, nominal, polychotomous, quantal, or discrete choices. To model categorical observations, we need to de ne a separate linear predictor k for k = 0; 1; : : : ;K. We denote the vector of k’s by . We derive the distribution p(y = Ckj ) using the random utility model (RUM) framework, de ning utilities as uk = k + k;8k where k is the error term [Marschak, 1960]. In this framework, we choose y = Ck if k’th category has the highest utility, i.e. when uk > uj ;8k 6= j. The probability of this choice depends on the probability distribution of the random errors. Speci cally, the probability of y = Ck is equal to the probability of the region where uk > uj ;8j 6= k as shown in Eq. 1.52. This can be expressed in terms of the probabilities of k’s as shown in Eq. 1.53 and 1.54. p(y = Ckj ) = P (uk > uj ; 8j 6= k) (1.52) = P ( k + k > j + j ; 8j 6= k) (1.53) = P ( j < k + k j ; 8j 6= k) (1.54) This is a K dimensional integral but in some cases a closed form expression can be obtained. The only thing left to do is to de ne the distribution of the random errors. If we assume k to be independently and identically distributed according to the Gumbel distribution, we obtain the multinomial logit distribution as shown below. p(y = Ckj ) = e k PK j=0 e j (1.55) This expression can be derived using the fact that the cumulative distribu- tion function of the Gumbel distribution is F ( k) = exp( exp( k)) (see 211.3. Distributions for Discrete Observations Train [2003] for details). There are many variants of the logit distribution depending on the construction of the predictor, for example, in the condi- tional logit model [McFadden, 1973], regression weights do not depend on data examples [Ho man and Duncan, 1988]. In this thesis, we do not con- sider these special cases but our results can be trivially extended to them. If errors follow a multivariate normal distribution p( ) = N (0; ), we get the multinomial probit distribution. There is no closed form expression for this distribution in general. However, if we assume that the k’s are iid standard normal, we get a simpli cation of the K dimensional integral to a one-dimensional integral shown below. This is a very common assumption made in machine learning community, for example, see Girolami and Rogers [2006]; Seeger et al. [2006]. p(y = Ckj ) = Z Y j 6=k (u+ k j)du (1.56) Both the logit and probit distributions have been extensively used in the literature, see for example, Albert and Chib [1993]; Chib and Greenberg [1998]; Fr uhwirth-Schnatter and Fr uhwirth [2010]; Fr uhwirth-Schnatter and Wagner [2008]; Girolami and Rogers [2006]; Holmes and Held [2006]; Scott [2011]. Although both distributions tend to give similar goodness of t and qualitative conclusions [Holmes and Held, 2006; Train, 2003], they both have their own advantages and disadvantages. One of the advantages of logit over probit is that its parameters are interpretable: for two categories k and l, the log of ratio of probabilities is equal to the di erence between their predictors, as shown below. log p(y = Ckj ) p(y = Clj ) = log e k= P j e j e l= P j e j = log e k e l = k l (1.57) Another advantage of the logit distribution is that it has slightly fatter tails than the probit distribution, which means that the logit distribution allows for slightly more aberrant behavior than the probit distribution. Fatter tails are due to the use of extreme value distribution in the logit distribution, instead of the normal distribution used in the probit distribution. A disadvantage of logit over probit is that it makes an assumption of \independence of irrelevant alternatives (IIA)". Note from Eq. 1.57 that the ratio of probabilities of two categories is independent of any other category, or in other words any \irrelevant" category. The IIA property arises from the assumption that the error terms are independent, an assumption which may not always hold. For example, a person who dislikes traveling by bus because 221.3. Distributions for Discrete Observations of the presence of other travelers might have a similar reaction to train travel. In this situation, the unobserved factors, related to the \presence of other travelers", are correlated for the bus and train categories rather than being independent. For a detailed discussion of the IIA property and other examples, see Chapter 3 of Train [2003]. The IIA property, however, can be useful when it holds in reality. For example, in some situations, we can reduce the computation by selecting subsets of categories, and since their probabilities are independent of other categories, their exclusion does not a ect the analysis. The probit distribution does not have the IIA property due to the presence of a correlated noise, but the independent noise model (shown in Eq. 1.56) indeed exhibit the IIA property and has similar issues as the logit distribution. Both the logit and probit model have identi ability issues, the probit model having more serious problems. A parameter of the model is identi ed if it can be estimated and is unidenti ed otherwise. To understand the problem, note that in a random utility model, the level and scale of the utilities are irrelevant. The level of utilities does not matter because a constant can be added to the utility of all the categories without changing the category with maximum utility. Similarly, multiplying utilities with a positive constant does not change the category with maximum utility. It is possible that some parameters of the distribution might relate to the scale and level of utility and do not a ect the behavior of the distribution. For example, a parameter b in utilities uk = k + b + k is unidenti ed since the probabilities do not depend on it. The di culty arises because it is not always obvious which parameters relate to scale and level. The logit model has an advantage since the unidenti ability can be dealt with by simply xing one of the predictor to zero. The solution is simple since the independence and constant variance assumption on the error terms already removes all the unidenti ability problem associated with the scale and level. For the probit model, however, the solution is not that simple since the errors are correlated and might a ect scale and level in a complicated way. Bunch [1991] discusses several published articles that considered probit models with unidenti ability problem, perhaps unknowingly. Such is the complication associated with this issue. Train [2003] suggests a normalization procedure that involves reparameterizing and setting the rst element of the matrix to 1. Several other normalization procedures are discussed in Bunch [1991]. It is worth noting that the probit model of Eq. 1.56 restricts the error terms to be independent and the identi ability issue can be dealt in a similar way as the logit distribution. There exist other distributions such as generalized extreme value distri- 231.3. Distributions for Discrete Observations butions and mixed logit which contain many more avors of distributions eliminating the disadvantages of logit and probit distributions; see Train [2003] for details. For the purpose of this thesis, the multinomial logit and probit distributions already pose many challenging estimation problem. Therefore, we focus only on these distributions. 1.3.4 Ordinal Observations An ordinal observation takes value in an ordered discrete set f0; 1; : : : ;Kg. We can de ne distributions for an ordinal observation y by linking the cu- mulative probability P(y kj ) to the predictor using a GLM, as shown in Eq. 1.58. Here, k’s are real threshold parameters such that 1 = 0 < 1 < : : : < K =1. We can use logit or probit links as shown in Eq. 1.59. P(y kj ) = g 1( k ); k = 0; 1; 2; : : : ;K (1.58) = ( k ); for probit link ( k ); for logit link (1.59) This family of models is referred to as the cumulative model since we use the cumulative probabilities to derive the model. These models are also known as graded response models [Samejima, 1997]. The model with the probit link is called the ordered probit model, while the logit link model is known as the cumulative logit model. These models are also called the proportional odds model since the odds of two ordinal observations is same for all categories [McCullagh, 1980]. To show this we rst note that the ratio of the probability of y k to the probability that y > k is proportional to . log P(y kj ) P(y > kj ) = log ( k ) 1 ( k ) = log e k =(1 + e k ) 1=(1 + e k ) = k (1.60) Given two ordinal observations yi and yj with predictors i and j , the odds of this ratio will be proportional to j i, which is same for all the categories, hence the name proportional odds model. This proportionality property may not always hold (see Ananth and Kleinbaum [1997] for an example). However, an important feature of these models is that they are invariant under the collapsability of the categories, i.e. if two adjacent categories are collapsed, predictor values do not change (although thresholds are a ected). Also, if the categories are reversed, the model remains una ected. 241.3. Distributions for Discrete Observations An alternative model, called the continuation ratio model, uses the logit link and assumes the following, log P(y = kj ) P(y > kj ) = k (1.61) When the logit link is replaced by the complimentary log-log link, the re- sulting model is the Cox proportional-hazard model for survival data in discrete time. See McCullagh and Nelder [1989] for a detailed discussion. The continuation ratio model is suited for the cases where the categories are not merely an arbitrary grouping of an underlying continuous variable. However, unlike the proportional hazard model, this model is not invariant under the collapsability and reversal of the categories. The cumulative model assumes the existence of a one-dimensional pre- dictor function which is thresholded to get ordinal observations. In many datasets, this may not hold. Anderson [1984] gives two speci c scenarios where this may not be the case. First concept is related to the existence of a multi-dimensional predictor function rather than a one-dimensional one. For example, to assess the severity of a disease, a physician might use di erent kinds of tests depending on the severity, making the use of a one-dimensional predictor inappropriate. Another related concept is of \indistinguishabil- ity". It might happen that a predictor can be used to distinguish between two categories, but may not be predictive of others. In this case, again, use of a one-dimensional predictor function is not valid. Anderson [1984] proposed the stereotype regression model which is a re- striction of the multinomial logit model of Section 1.3.3. The multinomial logit model has K + 1 predictors, one per category. Stereotype model re- stricts the form of these predictors to a linear function of a single predictor by de ning them as k = k k , resulting in the model shown below. p(y = kj ) = exp( k k ) PK j=0 exp( j j ) (1.62) We assume 1 = 0 1 : : : K = 0 to make use of the ordering constraints and to make the model identi able. A simpli cation of the stereotype model is obtained by assuming that j = j, giving rise to the adjacent category model [Agresti, 2010]. The parameters of the stereotype model have a simple intuitive interpre- tation. The log of ratio of the probabilities of two categories can be expressed as shown in Eq. 1.63, which shows that the odds of having response k in- stead of j is in uenced heavily by predictors, besides the di erence k j , 251.4. Learning Objectives only if the di erence j k is large. The e ect of predictors grows stronger with the separation between the categories, which is a desirable property to have. log p(y = kj ) p(y = jj ) = k j + ( j k) (1.63) The stereotype model solves the problem of multi-dimensional predic- tor and indistinguishability of the categories. The model can handle the multi-dimensional predictor function. Anderson gives an example of this in two dimensions where the predictor for k’th category can take a form k1 1 k2 2 where 1 and 2 are two di erent predictors. This can be generalized to higher dimensions. We can also easily check the assumption of indistinguishability, for example, hypothesis of the form k = j can be used to check if two categories are indistinguishable or not. 1.4 Learning Objectives In Section 1.2, we discussed many popular models and the learning objec- tives associated with them. In this section, we summarize those problems in the context of the generic LGM. There are four main tasks that we are interested in this thesis, listed below. Our goal is to perform these task accurately and e ciently. Posterior inference The rst task of interest is the inference of poste- rior distribution over zn given yn and , shown below. p(znjyn; ) / N (znj ; ) DY d=1 p(ydnjzn; ) (1.64) This task arises in almost all LGMs discussed in Section 1.2. The posterior distribution does not have a closed form expression, since p(ydnjzn; ) are not conjugate to the Gaussian prior over zn. Marginal likelihood The second task of interest is the estimation of the log-marginal likelihood of yn given . Ln( ) := log p(ynj ) = Z N (znj ; ) DY d=1 p(ydnjzn; )dzn (1.65) 261.5. Summary of Contributions This is useful for model selection. It is also useful to compute an estimate of parameters as discussed in our next objective. This integral is intractable because of non-conjugacy and our goal is to compute an approximation to the log-marginal likelihood. Parameter estimation The third task of interest is the estimation of given data vectors fy1;y2; : : : ;yNg. In this thesis, we focus on nding a maximum likelihood estimate, de ned below. ^ = arg max L( ) := NX n=1 Ln( ) (1.66) This task is useful in Gaussian process classi cation and almost all latent factor models discussed in Section 1.2. Instead of a point estimate, we might want to infer the posterior distribution of which is a much more di cult task. We focus on a point estimate since this problem is challenging enough in itself. Prediction The nal task of interest is the prediction of unobserved (or missing) part of a data vector given . For a vector y = [yo ym], where yo is observed, we compute a prediction of the i’th missing entry ymi as shown below, p(ymi jy o; ) = Z z p(ymi ; zjy o; )dz = Z z p(ymi j )p(zjy o; )dz (1.67) This task is useful for lling in the missing values in the factor models such as PCA. The task of prediction in the regression models can also be derived as a special case of this task. 1.5 Summary of Contributions Below, we brie y summarize the contributions made in each chapter. In Chapter 2, we review existing methods for learning in discrete-data LGMs. We show that the source of di culty in learning is the non-conjugacy of discrete data likelihoods to the Gaussian prior. We review solutions which can be categorized in three major categories: non-Bayesian methods, sam- pling methods, and deterministic methods. Every solution comes with their own advantages and disadvantages, which we discuss thoroughly, showing 271.5. Summary of Contributions inadequacy of these methods. In Chapter 3, we discuss the main approach used in this thesis: varia- tional learning using the evidence lower bound optimization. We show that the lower bound is not tractable for discrete-data likelihoods and illustrate the use of local variational bounds (LVBs) to achieve tractability. We de- vote the rest of the chapter to improve computational aspects of the lower bound. We make three contributions in this regard. Firstly, we establish the concavity of the variational lower bound. Secondly, we derive the gen- eralized gradient expressions for its optimization. Finally, we propose a fast convergent variational algorithm for special LGMs, such as Gaussian pro- cesses. Last contribution is based on Khan et al. [2012b]. In Chapter 4, we focus on tractable variational learning for binary data. We consider the Bernoulli logit LGM for which learning is intractable. We show that the existing solution, the bound proposed by Jaakkola and Jordan [1996], can lead to slow and inaccurate learning. We make two contributions. First, we propose use of the Bohning bound which leads to faster, but less ac- curate, learning algorithm than the Jaakkola bound. Second, we derive new xed, piecewise linear and quadratic bounds. These bounds have bounded maximum error which can be driven to zero by increasing the number of pieces, giving rise to variational algorithms with a wide-range of speed accu- racy trade-o s. These bounds are more accurate than the Jaakkola bound, but have the same computational cost. This chapter is based on Marlin et al. [2011]. In Chapter 5, we focus on tractable variational learning for categorical data. We rst consider the multinomial logit LGM and review existing LVBs for it. In our rst contribution, we extend the use of the Bohning bound and show that it leads to a fast variational algorithm. Unfortunately, our error analysis reveals that all the LVBs for multinomial logit LGM, includ- ing the Bohning bound, can be inaccurate at times, and unlike the binary case, designing bounds with error guarantees is di cult. We take another approach to solve the problem. In our second contribution, we propose a new likelihood called the stick breaking likelihood. The advantage of the new likelihood is the availability of accurate LVBs. These contributions are based on Khan et al. [2010] and Khan et al. [2012a]. In Chapter 6, we present some extensions and discuss future work. We extend our variational approach to ordinal and mixed-data LGMs. Mixed- 281.5. Summary of Contributions data results are based on Khan et al. [2010]. We discuss future work on improving the computational e ciency of our approach, as well as extend- ing our approach to other likelihoods than discrete-data likelihoods. In Chapter 7, we summarize our conclusions. 29Chapter 2 Learning Discrete-Data LGMs The di culty in learning discrete-data LGMs lies in the non-conjugacy of discrete-data likelihoods to the Gaussian prior. In this chapter, we review existing methods to solve the problem. These methods can be catego- rized in three major categories: non-Bayesian methods, sampling methods, and deterministic methods. For each category, we brie y review the basic methodology and discuss its advantages and disadvantages, demonstrating the method’s insu ciency to provide satisfactory solutions. To summarize, non-Bayesian approaches are fast but can be inaccurate, while sampling methods are slower but more accurate. Deterministic methods provide a good alternative to these methods, providing better accuracy than non- Bayesian methods in less time than sampling methods, but are less general. 2.1 Non-Bayesian Approaches Instead of computing a full posterior distribution over latent variables, non- Bayesian approaches compute a point estimate. For example, a popular choice is the maximum-a-posteriori (MAP) estimate, which can be obtained by maximizing the posterior distribution, as shown below. z^n = arg maxzn log p(znjyn; ) = arg maxzn log p(ynjzn; )p(znj ) (2.1) The advantage of this approach is that the maximization can be performed e ciently, since the objective function is concave for most of the likelihoods. Non-Bayesian approaches are computationally e cient, not only in com- puting the point estimate but also in all other learning tasks. For example, the marginal likelihood can be estimated simply by plugging in the MAP estimate in the joint likelihood. Furthermore, given the MAP estimate, parameters can be obtained by maximizing the marginal likelihood approx- 302.1. Non-Bayesian Approaches imation, as shown below. ^ = arg max NX n=1 log p(ynjz n; )p(z nj ) (2.2) For most of the likelihoods, the approximation is concave with respect to , making the above optimization e cient. This leads to a simple coordinate ascent approach for parameter estimation, which involves iterating between solving Eq. 2.1 and 2.2 respectively. An example of this approach is the exponential family PCA (EPCA) [Collins et al., 2002; Kab an and Girolami, 2001; Orlitsky, 2004; Salakhutdinov and Mnih, 2008b], where sometimes it is even possible to achieve the global maximum [Guo and Schuurmans, 2008]. Non-Bayesian approaches are simple, e cient, and widely applicable, but these bene ts come at the expense of ignoring the posterior variance of z. Welling et al. [2008] argue that, for models with continuous latent variable, the non-Bayesian approaches \optimize a questionable objective". They show that the marginal likelihood is lower bounded by the cost func- tion of Eq. 2.2 plus the entropy of a Dirac-delta distribution which is 1 at the MAP estimate and zero otherwise. The entropy term is 1 for con- tinuous latent variables and ignoring it can potentially make the resulting objective function numerically unrelated to the marginal likelihood. Al- though this may not always lead to bad parameter estimates in practice, Welling et al. [2008] suggest to be careful about the performance evaluation of non-Bayesian methods. A more practical problem with non-Bayesian methods is related to over- tting and their sensitivity to the regularization parameter [Khan et al., 2010; Mohamed et al., 2008; Salakhutdinov and Mnih, 2008a,b]. We illus- trate this e ect using a simulation experiment. We generate a continuous dataset using D = 10, L = 5, and N = 200 data cases by sampling from the factor analysis (FA) model described in Section 1.2.4. We x 2 = 0:1 and w0d = 0, while estimating wd. We consider the case of 10% and 50% missing data. We compare the non-Bayesian approach with two Bayesian approaches. The rst approach is the fully Bayesian approach, based on the hybrid Monte Carlo (HMC) algorithm [Mohamed et al., 2008]. This method samples both and z, hence we call it the sample-sample (SS) approach. The second approach is the variational approach, based on the expectation maximization (EM) algorithm [Tipping and Bishop, 1999]. This approach obtains a full posterior distribution over z using the variational lower bound, but only computes a point estimate for . Hence, we refer to this approach as the variational-maximize (VM) approach. Finally, we refer to the non- 312.2. Sampling Methods Bayesian approach as the maximize-maximize or MM approach. Our goal is to illustrate the sensitivity of the non-Bayesian approach to regularization parameter. For this purpose, we use a l2 regularizer for W and denote its coe cient by w. We evaluate the sensitivity of the methods to w by varying it over the range 10 2 to 102. We rst randomly split the data in 50=50 train/test split, and train the methods on the observed entries in the training set. Then, we compute mean-square-error (MSE) on the missing entries in the training and test sets. Finally, we average the results over 20 di erent data splits and plot the average against w. Top row in Fig. 2.1 shows that the test MSE of the non-Bayesian method is extremely sensitive to the prior precision w. We can see that this sensi- tivity increases with an increase in the missing data rate. We hypothesize that this is a result of the non-Bayesian method ignoring the posterior un- certainty in z. This is supported by looking at the MSE on the training set in the bottom right plot. We see that the non-Bayesian method over ts when w is small. Consequently, it requires a careful discrete search over the values of w, which is slow, since the quality of each such value must be estimated by cross-validation. By contrast, both the Bayesian methods take the posterior uncertainty in z into account, resulting in almost no sensitivity to w over this range. Another advantage of Bayesian approaches over non-Bayesian methods is that they easily handle the hierarchical models, such as choice models and correlated topic models. 2.2 Sampling Methods An alternative approach is to obtain samples using methods based on Markov Chain Monte Carlo (MCMC) sampling. MCMC o ers a variety of algo- rithms which are general, exible, widely applicable, and many times easy to implement and parallelize. For this reason, MCMC methods have been applied quite extensively to latent Gaussian models and are shown to per- form well. In fact, MCMC can be considered a gold standard for problems of moderate dimensionality. The main problem with MCMC is that they usually exhibit slow mixing leading to a slow exploration of the parameter space, especially for high di- mensional data. This becomes even a bigger problem in practice since it is di cult not only to predict the convergence of MCMC algorithms but also to diagnose or detect it. For this matter, most of the theoretical conver- gence results for MCMC are of little practical use. Presence of algorithmic 322.2. Sampling Methods 10−2 100 102 10−1 100 101 Test Sensitivity: 10% Mis. MS E Prior Strength (λW) FA−VM FA−MM FA−SS 10−2 100 102 10−1 100 101 Test Sensitivity: 50% Mis. MS E Prior Strength (λW) 10−2 100 102 10−3 10−2 10−1 100 Train Sensitivity: 10% Mis. Train MS E Prior Strength (λW) 10−2 100 102 10−3 10−2 10−1 100 Train Sensitivity: 50% Mis. Train MS E Prior Strength (λW) Figure 2.1: MSE vs w for MM, VM, and SS approaches for the FA model. We show results on the test and training sets with 10% and 50% missing data. Top row shows that the test MSE of the non-Bayesian method is extremely sensitive to the prior precision w, while the bottom right plot shows its over tting. parameters makes their use cumbersome, and sometimes lead to sub-optimal performances. These problems are even more severe in high dimensions, pro- hibiting use of MCMC to large-scale problems. In addition, MCMC methods have special di culty in estimation of marginal likelihood which remains an open research problem. In summary, MCMC methods do o er a solution to all of our objectives but they come with their own problems and issues. In what follows, we discuss these issues in detail for each task of interest. 2.2.1 Posterior Inference It is di cult to sample directly from p(zjy; ) for at least three reasons. Firstly, we do not know the normalizing constant of this distribution. Sec- ondly, the distribution does not take a convenient parametric form that is easy to sample from. Finally, the latent vector z might be high-dimensional, making sampling di cult. The good news is that it is easy to evaluate the 332.2. Sampling Methods unnormalized distribution ~p(z) = p(yjz; )p(zj ) which motivates the use of MCMC methods. MCMC methods generate samples from a \hard-to-sample" distribution by constructing a Markov process whose invariant distribution is the desired distribution. The most popular algorithm is the well-known Metropolis- Hastings (MH) algorithm, where we rst propose a new sample z given an old sample z using a proposal distribution q(z jz), and then accept the new sample with the following probability. p(z; z ) = min 1; ~p(z )q(zjz ) ~p(z)q(z jz) (2.3) The Markov chain formed from this procedure has the desired posterior dis- tribution as its equilibrium, and eventually the samples are drawn from the posterior and the sampler is converged. Another popular MCMC algorithm is Gibbs sampling which is a special case of MH algorithm with proposal distribution de ned in terms of the conditionals of p(zjy; ). This is useful when it is easier to sample from the conditionals instead of the joint. Standard MCMC algorithms have been extensively applied for inference in discrete-data LGMs, for example, Gibbs sampling [Zeger and Karim, 1991], single move adaptive rejection Gibbs sampling [Dellaportas and Smith, 1993], Metropolis Hasting algorithm [Gamerman, 1997; Lenk and DeSarbo, 2000; Rossi and Allenby, 2003]. These algorithms usually su er from slow mixing and lead to very lengthy simulations. For example, if the variables are highly correlated, Gibbs sampling mixes slowly since samples from con- ditional are correlated as well. Similarly, MH algorithms that are based on random walk proposal distributions need to make smaller steps to achieve higher acceptance rates since larger steps will be rejected more often. This leads to poor exploration of the state-space and slow mixing. See MacKay [2003] for details on problems with MCMC. There are several approaches to improve the mixing of MCMC algorithms of which the following two classes of algorithms are popular for discrete-data LGM: the Hamiltonian Monte Carlo (HMC) algorithm [Duane et al., 1987] and the data-augmentation approach [Albert and Chib, 1993]. We brie y discuss each of these approaches below. Hamiltonian Monte Carlo algorithm Since its rst introduction in the machine learning community by Neal [1992], HMC has been a popular choice, e.g. for Gaussian process classi- cation [Kuss and Rasmussen, 2005; Nickisch and Rasmussen, 2008] and for 342.2. Sampling Methods Bayesian exponential family PCA [Mohamed et al., 2008]. HMC de nes a Hamiltonian function in terms of the posterior distribution by introduc- ing auxiliary variables called the momentum variables which typically have Gaussian distributions. To generate a new sample from the posterior dis- tribution, we proceed as follows: rst, sample momentum variables, then propose a new state by computing a trajectory according to the Hamilto- nian dynamics, and nally use a MH step to either accept or reject this new sample. First and third steps are easy since momentum variables follow a Gaussian distribution and the posterior distribution is easy to evaluate. Second step is the di cult one since it requires a discretization scheme for implementation of the Hamiltonian dynamics. Usually the leapfrog scheme is employed which has two important parameters that must be set by hand, namely the step size and the number of leapfrog steps [Neal, 1992]. Mixing of HMC sampler is very sensitive to the setting of these param- eters making implementation of HMC di cult in practice; see Neal [1992] for a detailed discussion. For example, too large a step size results in a very low acceptance rate due to the error introduced in Hamiltonian dynamics computation, while too small a step-size will waste computation or lead to a slow exploration of the state-space. In a recent work, Girolami and Calder- head [2011] suggest an extension of HMC that reduces the sensitivity to the parameters. They use a ‘position-speci c’ covariance parameter G(z) for the momentum prior based on the Riemann manifold, naming their method Riemann manifold HMC. Although, this does indeed improve the mixing of HMC, it also increases the computation cost heavily since the Hamil- tonian computation now involves inversion of G(z) for every new z inside the leapfrog scheme. A recent modi cation, called the No-U-Turn Sampler (NUTS), eliminates the need to set the number of leapfrog steps [Ho man and Gelman, 2011]. This modi cation seems promising and can be improved further; see Radford Neal’s comments at his blog2. The data augmentation approach The second class of algorithms are based on data augmentation, also known as the auxiliary variable approach. Examples of these are the data aug- mented Gibbs sampling [Albert and Chib, 1993; Fr uhwirth-Schnatter and Fr uhwirth, 2010; Holmes and Held, 2006] and data augmented Metropolis- Hastings sampler [Scott, 2011]. These methods make use of the random utility model (RUM) of the probit and logit links to introduce auxiliary 2http://radfordneal.wordpress.com/2012/01/21/ 352.2. Sampling Methods variables (see Section 1.3 for details on RUM). Interested readers should see Van Dyk and Meng [2001] for examples where data augmentation shows faster mixing than the standard MCMC algorithm. Although these methods do mix faster than the standard MCMC algorithms, they still su er from convergence diagnostics issues. Most of the theoretical convergence results for MCMC are of little practical use, and diagnosing the convergence of MCMC algorithms takes expert knowledge [MacKay, 2003]. 2.2.2 Marginal Likelihood Estimation In this section, we discuss estimation of marginal likelihood using MCMC. The harmonic mean estimator The harmonic mean estimator, proposed by Newton and Raftery [1994], is perhaps the simplest of all estimators and is based on the following identity, 1 p(yj ) = R z p(zj )dz p(yj ) = Z z p(zjy; ) p(yjz; ) dz 1 S SX s=1 1 p(yjz(s); ) (2.4) where z(s) are samples from the posterior, obtained using a MCMC sampler. Although this estimate is consistent, it might be quite imprecise since the inverse likelihood does not always have nite variance [Chib, 1995]. Importance sampling (IS) An alternative approach is based on importance sampling, where we sample from a proposal distribution q(z) chosen such that it is \close" to the desired distribution but is easy to sample from. The marginal likelihood estimate can be obtained as shown below. p(yj ) = Z z p(y; zj )dz = Z z p(y; zj ) q(z) q(z)dz 1 S SX s=1 p(y; z(s)j ) q(z(s)) (2.5) where z(s) are samples from q(z). Given that q(z) 6= 0 whenever p(y; zj ) 6= 0, the above estimate converges to the true marginal likelihood for S !1. The accuracy of the marginal likelihood estimate depends directly on the variability of the ratio p(y; z(s)j )=q(z(s)), also known as importance weights. Better estimates are obtained when these weights have lower variances since, for large variances, the estimate will be based only on few points with large weights, giving rise to inaccurate estimates. The weights have low variance 362.2. Sampling Methods if q(z) is a close approximation of the joint distribution. However, when z is high-dimensional, nding good proposal distributions is di cult, limiting the applicability of this method. Annealed importance sampling (AIS) Annealed importance sampling (AIS) [Neal, 2001], a special case of larger family of Sequential Monte Carlo samplers [Moral et al., 2006], constructs a proposal distribution from a sequence of distributions pt(z) for t = 0; 1; : : : ; T . We pick distributions pt such that we can sample from them, either by using Monte-Carlo or MCMC, and the distribution pT is the target distribution. We should be able to evaluate a function ft(z) which is proportional to pt(z) and simulate some Markov chain transition, Tt, that leaves pt invariant. One useful construction in case of LGMs is the following, ft(z) = p(yjz; ) tN (zj ; ) (2.6) where 1 = T > T 1 > : : : > 1 = 0. Sampling from f0 is equivalent to sampling from the prior, while samples from fT are from the desired posterior distribution. Methods described in the previous section can be used to draw samples from pt and also to specify the Markov chain transition Tt. Given this sequence of distributions, we start sampling z0 from p0(z), then generate a sample z1 from T1, followed subsequently by sampling zt from Tt for t = 2; 3; : : : ; T 1. This process gives us one sampled sequence z(s)0 ; z (s) 1 ; : : : ; z (s) T 1, which we denote by Z (s). We repeat this process S times and compute an estimate of the marginal likelihood as shown below. p(yj ) 1 S SX s=1 fT 1(z (s) T 1) fT (z (s) T 1) fT 2(z (s) T 2) fT 1(z (s) T 2) : : : f1(z (s) 1 ) f2(z (s) 1 ) f0(z (s) 0 ) f1(z (s) 0 ) (2.7) Just like IS, this estimate converges to the true marginal likelihood as S ! 1. However, here we have a better control over the variability of importance weights than IS. For example, high variability can result from using transitions of each distribution that do not bring the distribution close to the equilibrium. This variability can be reduced by increasing the number of iterations of the MCMC sampler. Another sources of variability is the use of nite number of distributions between p0 and pT . This variability can be reduced by using a large number of distributions. Dimensionality of z also a ects the variance, but the e ect is less severe than in IS. Neal [2001] discusses a simple example where the performance of AIS degrades linearly 372.2. Sampling Methods with the dimensionality of z as opposed to an exponential degradation for IS. See Neal [2001] for a discussion of how these factors a ect performance of AIS. In summary, AIS can potentially lead to a low variance estimate of the marginal likelihood, but at a huge computational cost. The Chib estimator A simple method for estimating marginal likelihood using Gibbs sampling or MH algorithm is proposed by Chib [Chib, 1995; Chib and Jeliazkov, 2001]. The Chib estimator makes use of the following basic marginal likelihood identity to estimate the marginal likelihood. p(yj ) = p(yjz; )p(zj ) p(zjy; ) p(yjz ; )p(z j ) p^(z jy; ) (2.8) where z is a chosen value of z and p^(z jy; ) is an estimate of p(zjy; ) at z . The above identity holds for all z , but it is recommended to choose a high density point to obtain a good estimate of the denominator. In case of Gibbs sampling with auxiliary variables, Chib [1995] suggests an approach to estimate the denominator. Denoting the auxiliary variables by u, the auxiliary-variable Gibbs sampler alternates between sampling from p(zjy;u; ) and p(ujy; z; ). The denominator then can be estimated from the samples of u, using the following identity: p^(z jy; ) = Z u p(z jy;u; )p(ujy; )du 1 S SX s=1 p(z jy;u(s); ) (2.9) since u(s) is a sample from the marginal p(ujy; ), and the distribution p(z jy;u; ) is available up to the normalization constant, e.g. it is multi- variate normal in case of binary probit link. The standard problems such as mixing of MCMC still a ects this estimator since it is not easy to obtain good samples for estimation in Eq. 2.9. The Chib estimator also su ers from other problems when the model is unidenti able; see Neal [1999] for details. 2.2.3 Parameter Estimation MCMC methods can also be directly used to sample from the joint distribu- tion p(z1; z2; : : : ; zN ; jY), for example, using HMC [Mohamed et al., 2008], Gibbs sampling [Salakhutdinov and Mnih, 2008a], slice sampling [Murray and Adams, 2010], etc. Again, these methods su er from similar problems 382.2. Sampling Methods discussed for sampling from p(zjy; ). In particular, they exhibit slow mix- ing due to a strong coupling between zn and [Murray and Adams, 2010]. An easier problem is to compute just a point estimate of , for which stochastic versions of expectation maximization (EM) algorithm can be used. The most popular version is the Monte Carlo expectation maximiza- tion (MCEM) [Wei and Tanner, 1990]. This approach uses samples from the posterior p(znjyn; ), obtained either using Monte Carlo or MCMC, to compute an approximation to the marginal likelihood. The approximation is constructed using a procedure similar to the EM algorithm. The EM algorithm is an iterative procedure where we obtain a lower bound to the marginal likelihood at the current parameter estimate, say t, and maximize this lower bound to obtain the next estimate t+1. To nd a lower bound to the marginal likelihood, we consider the log of the marginal likelihood L( ) given in Eq. 2.10 and multiply and divide by the posterior distribution p(znjyn; t). L( ) = NX n=1 log Z p(yn; znj )dzn = NX n=1 log Z p(znjyn; t) p(yn; znj ) p(znjyn; t) dzn (2.10) As log is a concave function, we obtain a lower bound using Jensen’s in- equality, shown in Eq. 2.11 below, where we ignore the entropy term since it does not depend on . A Monte-Carlo approximation to this lower bound can be obtained using posterior samples as shown in Eq. 2.12. L( ) LJ( j t) := NX n=1 Z zn p(znjyn; t) log p(yn; znj )dzn + cnst (2.11) LJS( j t) := NX n=1 1 St StX s=1 log p(yn; z (s) n j ) + cnst (2.12) This step gives us an approximation of the su cient statistics, using which we can obtain either closed-form updates for or nd approximate gradients to be used in the M-step [McCulloch, 1997]. One major implementation issue with MCEM is the speci cation of sam- ple size St [Wei and Tanner, 1990]. As the algorithm approaches the max- imum, the Monte Carlo approximation error becomes signi cant. So, for a constant St, the algorithm may reach somewhere close to the solution and then wander around it. Hence the algorithm may not converge. The solu- tion is to increase St with time, however the rate at which St needs to be 392.3. Deterministic Methods increased usually depends on the problem, making an e cient implementa- tion di cult [Booth and Hobert, 1999; Levine and Casella, 2001]. An important extension, called the stochastic approximation EM (SAEM), solves the convergence problem to some extent [Delyon et al., 1999]. In SAEM, the lower bound is obtained using a weighted combination of the current lower bound and the previous lower bound, i.e. the new lower bound is tLJS( j t 1) + (1 t)LJS( j t) for some t > 0. The advantage of this method is that it e ciently reuses the samples collected in previous itera- tions. This also makes implementation easier since we do not need to vary the sample size with t. The convergence is assured even for a constant St, provided that t’s are such that P t t =1 and P t 2 t <1. Another advan- tage is that the sequence of step size can be decided beforehand, e.g. Polyak and Juditsky [1992] show that for step size t / (1=t) ; 1=2 < < 1, the algorithm converges at an optimum rate. However, in practice, convergence rate of the algorithm is very sensitive to the choice of step size. Large step sizes, e.g. close to 1/2, bring the algorithm quickly to the neighborhood of the solution, but in ate the Monte Carlo error, while small step sizes result in a fast reduction of Monte Carlo error, but slow down the convergence. There are many other implementation issues with these algorithms, mak- ing their use cumbersome. For example, choice of sampling method is critical to their performance. Use of Monte Carlo methods is preferred since they generate independent samples, but they are highly ine cient in high dimen- sions [Booth and Hobert, 1999]. Samples from MCMC methods can be used but they are computationally intensive, since every EM iteration requires some burn-in followed by long runs of MCMC to make sure that MCMC has converged [Levine and Casella, 2001]. In addition, MCMC makes it di cult to assess the convergence of the EM algorithm. 2.3 Deterministic Methods Deterministic methods require less computation time than MCMC, and per- form better than the non-Bayesian approaches. The problem, however, is that they are not general enough and their applicability is limited. 2.3.1 Laplace’s Method Laplace’s method approximates the integral of the form R exp[f(z)]dz, where f(z) is a function satisfying some regularity conditions. In this method, we rst compute the mode m of f(z) and its curvature V at the mode; both 402.3. Deterministic Methods quantities de ned below. m := arg max z f(z) (2.13) V := @2f(z) @z@zT 1 z=m (2.14) Then, we take a rst-order Taylor series expansion of f(z) around m, as shown in Eq. 2.15. The second term in the expansion corresponds to a Gaussian, for which the normalizing constant is known, giving us the ap- proximation in Eq. 2.16. Z z exp[f(z)]dz Z z exp f(m) 12(z m)V 1(z m) dz (2.15) = ef(m)(j2 Vj)1=2 (2.16) We now discuss the use of Laplace’s method to accomplish our learning objectives. Tierney and Kadane [1986] were the rst one to use Laplace’s method for Bayesian inference. They de ne the function as follows, f(zn) := log p(yn; znj ) (2.17) We denote the mode and curvature by mn and Vn respectively. For LGMs, computing mn is easy since f(zn) is a concave function, and Vn is usually available in closed form. These quantities can be used to approximate the posterior as follows, p(znjyn; ) / p(yn; znj ) = e f(zn) (2.18) ef(mn) exp 12(zn mn) TV 1n (zn mn) (2.19) / N (znjmn;Vn) (2.20) Marginal likelihood estimate is also straightforward, log p(ynj ) = log Z ef(zn)dzn f(mn) + 1 2 log(j2 Vnj) (2.21) = 1 2 log(j2 Vnj) + log p(mnj ) + DX d=1 log p(ydnjmn; ) (2.22) For parameter estimation, the above marginal likelihood approximation can be optimized with respect to . Note the similarity between the non-Bayesian method and Laplace’s ap- proximation. If we ignore the rst term, i.e. the determinant of Vn, the 412.3. Deterministic Methods maximization with respect to will be exactly equal to the non-Bayesian approach discussed in Section 2.1. Inclusion of Vn, however, takes the un- certainty into account and solves the problems associated with non-Bayesian approaches to some extent. A major drawback of Laplace’s approximation is that it is based only on the mode of the posterior distribution, and hence fails to capture important global properties [Bishop, 2006]. For distributions, where mode is not a representative of the spread of the distribution, the covariance estimates are not accurate, giving rise to inaccurate marginal likelihood estimates. Kuss and Rasmussen [2005] discuss this issue for binary Gaussian process classi cation. In that case, the posterior distribution is highly skewed since the binary likelihoods essentially \chop" the Gaussian prior o . As a result of this, the mode remains close to the origin, even though the distribution contains a lot of mass away from the mode. The situation worsens as the dimensionality grows, since, for many Gaussian distributions, most of the mass is contained in a thin ellipsoid shell away from the mean [MacKay, 2003, Chapter 29.2]. 2.3.2 Integrated Nested Laplace Approximation A recent approach, called the integrated nested Laplace approximation (INLA), is proposed by Rue et al. [2009]. This approach aims to integrate out nu- merically. They assume that dimension of is small, around 6-7, making numerical integration possible. They consider the special case of LGMs where the covariance is parameterized using with one latent variable zd for each yd, similar to the Gaussian processes; see Fig. 1.2(c). Motivated by spatial statistics, they also assume sparse dependency among the latent variables zd, although the method works for dense models as well. Their objective is to compute approximations to the marginals p(zdjy) using the following identity, p(zdjy) = Z p(zdjy; )p( jy)d (2.23) Rue et al. [2009] use Laplace’s approximation to build approximations to p( jy) and p(zdjy; ), and then numerically integrate out which is possible for small number of . The nested use of Laplace method along with the numerical integration gives the approach its name: the integrated \nested" Laplace approximation. We now brie y describe the approach. First, we build an approximation to p( jy). We do so in a \non-parametric" way using the identity given in 422.3. Deterministic Methods Eq. 2.24. The identity can be derived easily using the Bayes rule. Next, we substitute the Laplace approximation N (zjm( );V( )) to p(zj ;y) and evaluate the ratio at z = m( ) in Eq. 2.25 to get the nal approximation in Eq. 2.26. Note that we denote m( ) and V( ) since these quantities need to be recomputed for every . p( jy) = p(z; jy) p(zj ;y) / p(y; z; ) p(zj ;y) (2.24) ~p( jy) p(y; z; ) N (zjm( );V( ) z=m( ) (2.25) = p(yjm( ); )p(m( )j )p( ) j2 V( )j 1=2 (2.26) We would like to point out that this estimate is same as the marginal likelihood estimate using Laplace approximation shown in Eq. 2.22, with an addition of p( ) term. This can be veri ed by talking log of Eq. 2.26 (also see comments by Papaspoliopoulos in the discussion of Rue et al. [2009]). This estimate has been shown to be of poor quality compared to other approximation methods [Kuss and Rasmussen, 2005], and will a ect the quality of numerical integration in the next step. The second step is to do a grid-search over several values of to obtain \good" points where p( jy) is expected to have \signi cant" probabilities. These values of are used to do a numerical integration over . The nal step is to use Laplace’s method again to obtain posterior approximations to the marginal p(zdjy; ) at the sampled values of . We proceed, as before, using the Bayes rule to obtain the rst equality in Eq. 2.27. Then, we substitute the Laplace approximation of p(z djzd; ;y), and nally evaluate the ratio at the mode md(zd; ) to get the nal approximation below. Here again, we denote m(zd; ) and V(zd; ) since these need to be recomputed for every zd and (Rue et al. [2009] make some more approximations to reduce this computation). ~p(zdj ;y) = p(y; z; ) p(z djzd; ;y) p(ydjzd)p(zdjmd(zd; ); ) j2 Vd( )j 1=2 (2.27) Finally, we obtain the marginal approximation for zd using ~p(zdj ;y) and ~p( jy) as follows, ~p(zdjy) = KX k=1 ~p(zdj (k);y)~p( (k)jy) k (2.28) 432.3. Deterministic Methods where (s) are values obtained with the grid-search and k are the area weights in the space of . In Rue et al. [2009], the authors demonstrate experimentally that the approximation is as accurate as MCMC methods but takes much less time. This has been supported by many other researcher (for details see discussions that follow the paper). The use of Laplace’s method is not necessary for this method, and several new extensions have been proposed [Cseke and Heskes, 2010, 2011]. The main disadvantage of the approach is that it applies only to cases where the number of parameters is very small. Hence, the method does not generalize to many other LGMs, such as the factor model. Another issue is that they consider computation of posterior marginals, rather than the full posterior which may be useful in many applications. 2.3.3 Expectation Propagation Another approximation method, called expectation-propagation (EP) [Minka, 2001], has been applied extensively to LGMs [Kuss and Rasmussen, 2005; Nickisch and Rasmussen, 2008; Seeger and Nickisch, 2011; Zoeter et al., 2005]. EP approximates the posterior distribution by maintaining expecta- tions and iterating until these expectations are consistent for all variables. We now brie y describe this procedure for the case when each dimension yd depends only on zd. We assume that the prior mean is set to 0. EP com- putes a Gaussian approximation to the posterior by replacing discrete-data likelihoods by unnormalized Gaussian likelihoods, called the site functions, de ned as t(zd;md; vd; Zd) = ZdN (zdjmd; vd). This replacement gives us a posterior approximation as shown below. p(zjy; ) = p(zj ) p(yj ) DY d=1 p(ydjzd) p(zj ) p(yj ) DY d=1 t(zd;md; vd; Zd) (2.29) Completing the squares, we can express the approximation as a Gaussian distribution, q(z) = N (zjm;V), with mean m = Vdiag(v) 1m and covari- ance V = [ 1 + diag(v)] 1 where v and m are the vectors containing the site function parameters vd and md. We need to set the site parameters appropriately to get a good approx- imation to the posterior. In EP, we do this iteratively visiting each site function and adjusting the site parameters to match moments under the approximate posterior distribution. To be precise, we rst nd the approxi- mate marginal posterior qd(zd) for d’th site by marginalizing out other latent variables, denoted by z d. This is easy since the approximate distribution 442.3. Deterministic Methods is Gaussian, giving us the marginal shown below. qd(zd) = Z q(z)dz d = N (zdjemi; evi) (2.30) with evd = 1=(1=Vdd 1=vd) and emd = evd(md=Vdd md=vd). Given this marginal, we set the site parameters such that the moments of a site function under qd(zd) are equal to the moments of the true likelihood, as shown below. Z zkdp(ydjzd; )qd(zd)dzd = Z zkd t(zd;md; vd; Zd)qd(zd)dzd (2.31) For Gaussian distribution, we need to solve this equation for k = 0; 1 and 2. Right hand side of above equation are simply the moments of a Gaussian and are available in closed form. The di culty of obtaining left hand side depends on the form of the likelihood. Computing the integral in the left hand side can be easy sometimes; e.g. for the probit likelihood, it is available in closed form. There are cases, however, for which it could be di cult. Seeger and Jordan [2004] discuss the di culty with the multinomial-logit likelihood in the context of multi-class GP classi cation, stating that the EP approach is \fundamentally limited by the requirement of an e cient numerical integration in K dimensions", K being the number of categories [Seeger and Jordan, 2004, x4.3.1]. Another issue with EP is that the iterative moment matching proce- dure is not always guaranteed to converge and is known to have numer- ical problems for some likelihoods [Jyl anki et al., 2011], for example, the site variances might be negative at times. It is possible to build provably convergent EP algorithm for some cases, e.g. see [Hern andez-Lobato and Hern andez-Lobato, 2011; Seeger and Nickisch, 2011]. However, designing such convergent generic EP algorithm remains an open research problem. The site functions can be used to compute an approximation to the marginal likelihood since they are unnormalized Gaussian distributions, as shown below. log p(yj ) log Z p(zj ) DY d=1 t(zd;md; vd; Zd)dz (2.32) Similar to Laplace’s method, the above approximation can be maximized to get an estimate for . In practice, it may not always be easy to compute this approximation, for example, in multi-class GPC [Seeger and Jordan, 2004, x5]. In such situations, the use of a lower bound based on Kullback-Leibler (KL) divergence is suggested. However, this leads to a non-standard and 452.4. Summary usually non-monotonic optimization since the inference and learning steps do not optimize the same lower bound. These lower bounds are usually not convex, which further adds to the di culty. Such a hybrid EM-EP procedure is used by Rattray et al. [2009], who also discuss the di culty in computing EP approximations for parameter learning. Also, see Stern et al. [2009]. 2.4 Summary Non-conjugacy makes learning in discrete-data LGMs di cult. In this chap- ter, we reviewed many methods for learning and discussed their advantages and disadvantages. In summary, 1. Non-Bayesian approaches are fast, but do not always perform well due to over tting and sensitivity to the regularization parameter. 2. MCMC methods have potential to perform well, but they su er from slow mixing and require expert level knowledge for tuning and conver- gence diagnostics. 3. Deterministic methods provide a good alternative to MCMC and non- Bayesian approaches, since they could be as fast as non-Bayesian ap- proaches, and at times, are as accurate as MCMC. However, deter- ministic methods discussed in this chapter are not general enough to achieve our learning objectives. For example, INLA works only for small number of parameters, while EP is troublesome for parameter estimation and su ers from convergence issues. 46Chapter 3 Variational Learning of Discrete-Data LGMs We reviewed many methods for learning LGMs in the previous chapter and showed that none of those methods provide satisfactory solutions to our problems. In this chapter, we introduce a variational approach based on Evidence Lower BOund (ELBO). The main advantage of this approach is that the lower bound can be used as a common objective function for all of our learning objectives. Unlike other deterministic methods, this approach does not su er from convergence issues and is applicable to general settings, such as the parameter learning in factor models. We start this chapter by introducing the variational approach based on ELBO optimization. We discuss two main challenges associated with the approach. First challenge is that the lower bound is not always tractable. We solve this problem by using local variational bounds (LVBs) to the in- tractable terms in ELBO. Second challenge is related to the computational ine ciencies associated with the optimization of the lower bound. We make three contributions in this regard. First, we show that the lower bound has useful concavity properties, making the optimization e cient. Second, we derive generalized gradient expressions for optimization. Third, we propose a fast convergent coordinate-ascent inference algorithm. In rest of the the- sis, we will refer to the lower bound approach as the variational method, although there exist many other varieties of variational methods. 3.1 A Variational Approach Based on the Evidence Lower Bound The marginal likelihood for discrete-data LGMs is intractable since the discrete-data likelihood is not conjugate to the Gaussian prior. We can, however, obtain a lower bound to the marginal likelihood using the Jensen inequality. This lower bound is called by many names, such as the evidence lower bound [Braun and McAuli e, 2010], the Gaussian variational bound 473.1. A Variational Approach Based on the Evidence Lower Bound [Challis and Barber, 2011], the Kullback-Leibler (KL) bound [Kuss and Ras- mussen, 2005], or simply the Jensen lower bound [Jaakkola, 2001; Jordan et al., 1998; Wainwright and Jordan, 2008]. We will refer to this lower bound as the evidence lower bound, because other names might be confusing later in our context. The variational method based on ELBO is similar in spirit to the ex- pectation maximization (EM) algorithm, but is more general since it ap- plies even to the models with intractable posterior distributions. The basic idea behind ELBO is to restrict the form of the posterior distribution to a tractable class of distributions. For LGMs, the Gaussian distribution is a suitable choice since the posterior distribution is very close to the Gaus- sian distribution due to the Gaussian prior. We denote the approximation to p(znjyn; ) by q(znj n) = N (znjmn;Vn), where the set of variational parameters is denoted by n = fmn;Vng. We denote the set of n by . To obtain the evidence lower bound to the marginal likelihood, we begin with log of the marginal likelihood L( ) shown in Eq. 3.1, and multiply and divide by q(znj n) as shown in Eq. 3.2. L( ) = NX n=1 log Z p(znj )p(ynjzn; )dzn (3.1) = NX n=1 log Z q(znj n) p(znj )p(ynjzn; ) q(znj n) dzn (3.2) Since log is a concave function, we can use the Jensen inequality to obtain a lower bound to each of the terms under the summation, as shown below. LJn( ; n) := Z q(znj n) log p(znj ) q(znj n) dzn + Z q(znj n) log p(ynjzn; )dzn (3.3) The rst integral here is simply negative of the Kullback Leibler (KL) divergence from the Gaussian posterior q(znj n) = N (znjmn;Vn) to the Gaussian prior distribution p(znj ) = N (znj ; ), and has a closed-form expression shown below (recall that L is the length of zn), log jVn 1j Tr(Vn 1) (mn )T 1(mn ) + L (3.4) The second integral in Eq. 3.3 does not always have a tractable expres- sion, but can be simpli ed. Recall from the de nition of LGM that the likelihood is expressed in terms of the predictor dn = W T d zn + w0d. To be 483.1. A Variational Approach Based on the Evidence Lower Bound precise, p(ynjzn; ) = Q d p(ydnj dn; ). To simplify the integral, we apply a change of variable to express the integral in terms of dn instead of zn. Since dn is a linear function of zn, we can easily derive its distribution. The distribution is given as follows: q( dnje dn) := N ( dnj emdn; eVdn) with emdn := W T dmn + w0d eVdn := W T dVnWd (3.5) Substituting this, we get a simpli ed expression for the second integral, Z q(znj n) log p(ynjzn; )dzn = DX d=1 Eq( dnje dn)[log p(ydnj dn; )] (3.6) We substitute Eq. 3.4 and 3.6 in the lower bound of Eq. 3.3 to get the evidence lower bound de ned below. De nition 3.1.1. For the LGM de ned in Section 1.1, the marginal likeli- hood L( ) is lower bounded by the evidence lower bound de ned below, LJ( ; ) := NX n=1 LJn( ; n) (3.7) where n = fmn;Vng is the set of mean and covariance of approximate Gaussian posterior q(znj n), is the set of n, and L J n is the lower bound to the marginal likelihood log p(ynj ) of n’th data vector and is de ned below. LJn( ; n) := 1 2 log jVn 1j Tr(Vn 1) (mn )T 1(mn ) + L + DX d=1 Eq( dnje dn)[log p(ydnj dn; )] (3.8) Recall that and are the mean and covariance of the Gaussian prior, L is the length of zn, p(ydnj dn; ) is the likelihood of the discrete-data ydn with dn as the linear predictor, and the approximate distribution q( dnje dn) is de ned in Eq. 3.5. The rst line in Eq. 3.8 is the negative of the KL divergence from the Gaussian posterior q(zj n) to the Gaussian prior distribution p(zj ). The second line is the expectation of the log-likelihood under the approximate posterior of the predictor dn. Intuitively, the two terms \push" the poste- rior in opposite directions. The KL divergence term keeps the posterior close to the prior, while the second term brings it close to the data by increasing the expected likelihood of the data. 493.2. Intractability of ELBO The variational approach based on ELBO is related to many other ex- isting variational methods. For example, posterior inference using ELBO is exactly same as the popular variational inference based on the minimization of the KL divergence between the approximate posterior q(znj n) and the true posterior p(znjyn; ) [Jaakkola, 2001; Jordan et al., 1998; Wainwright and Jordan, 2008]. Also, see variational EM algorithm of Buntine [2002] which shows both the ELBO and the KL divergence (Eq. 5 and 6 in the pa- per). Similarly, the mean eld method is same as the ELBO approach, but puts an additional factorization assumption on q(zj ) [Knowles and Minka, 2011; Paisley et al., 2012]. 3.2 Intractability of ELBO The tractability of the evidence lower bound of Eq. 3.8 depends on the tractability of the expectation term Eq( dnje dn)[log p(ydnj dn; )]. For some likelihoods this term is tractable, while for others it is not. We rst give a few examples of likelihoods which give rise to tractable ELBO, and then discuss the di culty in discrete-data likelihoods. The Gaussian likelihood is given as follows: p(ydnj dn; d) = N (ydnj dn; d) for real ydn. This likelihood gives rise to the simplest and most widely used LGMs such as probabilistic PCA and factor analysis; see Section 1.2.4 for details. The lower bound for these Gaussian LGMs is tractable, since the expectation term is available in closed form as shown below, Eq( dnje dn)[log p(ydnj dn; d)] (3.9) = Eq( dnje dn)[logN (ydnj dn; d)] (3.10) = Eq( dnje dn)[ 1 2 log(2 d) 1 2(ydn dn) 2= d] (3.11) = 12 log(2 d) 1 2 [(ydn emdn) 2 + evdn]= d (3.12) The Poisson likelihood is de ned as p(ydnj dn) = exp(ydn dn e dn)=ydn! for a non-negative integer ydn. The expectation term can be written in closed form as shown below, Eq( je dn)[log p(ydnj dn)] = Eq( je dn)[ydn dn e dn log ydn!] (3.13) = ydn emdn e emdn+evdn=2 log ydn! (3.14) 503.3. Tractable ELBOs Using Local Variational Bounds (LVBs) where we use the identity given in Appendix A.1 to get the second term. The stochastic volatility model uses the following likelihood: p(ydnj dn) = N (0; e dn) for real ydn [Rue et al., 2009]. Again, the expectation term is available in closed form as we show below, Eq( dnje dn)[logN (ydnj0; e dn)] (3.15) = Eq( dnje dn)[ 1 2 log(2 e dn) 12y 2 dn=e dn ] (3.16) = 12 log(2 ) 1 2 emdn 1 2y 2 dne emdn+evdn=2 (3.17) where we use the identity given in Appendix A.1 to get the third term. Intractable discrete-data likelihoods: Unfortunately, for most of the discrete-data likelihoods discussed in Section 1.3, the expectation term is not available in closed form. For example, for the Bernoulli logit likelihood p(ydn = 1j dn) = e dn=(1 + e dn), the expectation shown below, Eq( dnje dn)[log p(ydn = 1j dn)] = Eq( dnje dn)[ dn log(1 + e dn)] (3.18) is intractable due to the log(1 + e dn) term. Similarly, for the multinomial logit likelihood p(ydn = kj dn) = e kdn= P j e jdn , the expectation shown below is intractable due to the log-sum-exp term. Eq( dnje dn)[log p(ydn = kj dn)] = Eq( dnje dn)[ kdn log X j e jdn ] (3.19) 3.3 Tractable ELBOs Using Local Variational Bounds (LVBs) As discussed in the previous section, the expectation term is intractable for many discrete-data likelihoods. In this thesis, we use local variational bounds to make this term tractable, i.e. we design functions f such that they lower bound the expectation of the log-likelihood, as shown below. Eq( je )[log p(yj )] f(y; e ; ) (3.20) where are the local variational parameters, which are optimized to get the tightest lower bound. The function f might not always have local variational parameters, for example, in case of Poisson distribution in Eq. 3.13, there are no local parameters. 513.4. Concavity of the Evidence Lower Bound Substituting the LVB in Eq. 3.8, we get a tractable lower bound below. Ln( ; n; n) := 1 2 log jVn 1j Tr(Vn 1) (mn )T 1(mn ) +L] + DX d=1 f(ydn; e dn; dn) (3.21) Here, the local variational parameter dn depends on d and n since we need to optimize LVB for each ydn. We also get the following new lower bound on the marginal likelihood, L( ) L( ; ; ) := NX n=1 Ln( ; n; n) (3.22) where we denote the set of all dn by n and set of all n by . It is not necessary for f to have an analytical form, but we should be able evaluate the bound to be able to optimize ELBO. The function f could be an approximation as well, e.g. see Ahmed and Xing [2007]; Braun and McAuli e [2010], and more recent results shown in Paisley et al. [2012]. Since a lower bound maintains the lower bounding property of ELBO, we focus mainly on the lower bounds rather than the approximations. We devote Chapter 4 and 5 entirely to discuss LVBs for binary and categorical data, respectively. We also brie y discuss the use of these LVBs to get bounds for ordinal data in Chapter 6. 3.4 Concavity of the Evidence Lower Bound From this section onward, we focus on the computational aspects of ELBO. We start by discussing the concavity of ELBO. The following theorem, proved in Appendix A.2, establishes the concavity of ELBO. Theorem 3.4.1. Assuming that the LVB f(ydn; e dn; dn) is jointly concave with respect to e dn = f emdn; eVdng and dn, we have the following: The lower bound Ln( ; n; n) of Eq. 3.21 is strictly jointly concave with respect to n = fmn;Vng and n, given . The lower bound L( ; ; ) of Eq. 3.22 is concave with respect to each of the following, ; 1;W and w0, for xed and . The lower bound is strictly concave with respect to and 1. 523.5. Variational Learning using Gradient Methods Note that a function is (strictly) concave i its Hessian is negative (semi)- de nite [Boyd and Vandenberghe, 2004]. We conjecture that, for the second result in the theorem, the lower bound is jointly concave with respect to all the variables. This can be checked easily for the 1-D case, although proving a general case requires more e ort. Also, the second result can be used to nd out whether the lower bound is concave with respect to . For example, for Gaussian process, and are expressed in terms of using the mean and covariance functions. The concavity with respect to there depends on the mean and covariance functions, and can easily be determined using the chain rule. Concavity results similar to ours have been discussed by Braun and McAuli e [2010] for learning the discrete-choice models, and more recently by Challis and Barber [2011] for inference in Bayesian linear models. We would like to point out the well known form of the lower bound of Eq. 3.21. Given Vn, the function with respect to mn is the nonlinear least square function. Similarly, given mn, the function with respect to Vn is similar to the graphical lasso [Friedman et al., 2008] or covariance selection problem [Dempster, 1972], with the di erence that the argument is a covariance matrix instead of a precision matrix. These two objective functions are coupled through the non-linear term f . Usually this term arises due to the prior distribution and may be non-smooth, for example, in graphical lasso. In our case, this term arises from the bound on the log-likelihood, and is smooth and usually jointly concave over mn and Vn. The concavity of the lower bound and its similarity to many concave op- timization problems has huge implications for the computational e ciency of variational learning. There is a vast literature on the e cient optimiza- tion of concave functions such as the least square and covariance selection problems. We can exploit this literature to design e cient algorithms for variational learning. We will present one such example in Section 3.6, where we design a fast convergent algorithm for inference in LGMs, such as Gaus- sian processes. 3.5 Variational Learning using Gradient Methods We now describe how to perform di erent tasks of interest using ELBO. To obtain an approximation to the posterior p(ynjzn; ), we maximize the ELBO of Eq. 3.21 with respect to n and n as shown below. max n; n Ln( ; n; n) (3.23) 533.5. Variational Learning using Gradient Methods This optimization can be done easily by alternate maximization with respect to n and n, both optimization involving concave function for most LVBs. For many LVBs, it is also possible to do an elimination of n completely, followed by a maximization with respect to n. The approximate posterior is given by a Gaussian distribution N (znjmn;Vn). Plugging in the value of n and n at the maximum gives us a lower bound of the marginal likelihood, which can be used as the marginal likelihood estimate. For parameter estimation, we iterate between optimizing with respect to , , and iteratively. Given a current estimate t at iteration t, we maximize Ln to obtain t n and t n for all n, as shown in Eq. 3.24. Next, we optimize ELBO with respect to by plugging in tn and t n as shown in Eq. 3.25. f tn; t ng = arg max n; n Ln( t; n; n);8n (3.24) tn = arg max NX n=1 Ln( ; t n; t n) (3.25) As shown before, both of these steps involve concave optimization, for which we can use any gradient based method such as LBFGS. Finally, for prediction of a missing entry ymi given observed data vector yo and , we rst nd the posterior approximation to p(zjyo; ), denote by N (zjm;V), and compute the predictive probability as shown below. p(ymi jy o; ) = Z z p(ymi j )p(zjy o; )dz Z z p(ymi j )N (zjm;V)dz (3.26) The above integral can be estimated using Monte-Carlo sampling, which is e cient since the posterior on z is a Gaussian distribution. 3.5.1 Generalized Gradient Expressions All of the above optimization involve concave functions, for which gradient based methods can be used. We now give general expressions for gradients with respect to n and . These gradients can be written in a general form in terms of the gradients of LVB f(ydn; e dn; dn), making it easy to implement the optimization routines. These gradients are de ned below, gmdn := @f dn @ emdn ; Gvdn := @f dn @ eVdn (3.27) To derive gradients with respect to and , we use the chain rule and make use of the following identity: given em = wTm + w0 and ev = wTVw with a 543.5. Variational Learning using Gradient Methods Algorithm 1 Gradients for ELBO Gradients with respect n (3.29) @Ln @Vn = 12 V 1n 1 + DX d=1 WTdG v dnWd (3.30) @Ln @mn = 1(mn ) + DX d=1 WTd g m dn (3.31) Gradients with respect (3.32) @L @Wd = NX n=1 gmdnm T n + 2G v dnWdVn (3.33) @L @w0d = NX n=1 gmdn (3.34) @L @ = NX n=1 1(mn ) (3.35) @L @ 1 = 1 2 NX n=1 Vn + (mn )(mn )T (3.36) scalar w0, vectors m and w, and a positive de nite matrix V, we have the following derivatives, @ em @m = w; @ev @V = wwT ; @ em @w = m; @ev @w = 2Vw (3.28) We give the nal expressions for gradients in Algorithm 1, and skip the derivation since it is straightforward. The updates of and can be obtained in closed form, by setting above gradients to 0. These updates are given below, = 1 N NX n=1 mn; = 1 N NX n=1 Vn + (mn )(mn )T (3.37) Updates of other quantities can be done using a gradient based approach, but can also be available in closed form depending on the LVB. We now show an example where the all the updates are available in closed form. 553.5. Variational Learning using Gradient Methods 3.5.2 An Example of Variational Learning using ELBO We now give an example of the variational learning using ELBO. We choose the Gaussian LGM for which we derived ELBO in Section 3.2. In this case, the expectation term Eq( dnje dn)[log p(ydnj dn; )] has an analytical expres- sion given below. 12 log(2 d) 1 2 [(ydn emdn) 2 + evdn]= d (3.38) Taking the gradients with respect to emdn and evdn, we get the following expressions for gradients gmdn and g v dn, gmdn = (ydn emdn)= d ; g v dn = 1=(2 d) (3.39) We substitute these in the generalized gradient expression of Algorithm 1, and simplify. Updates of n can be obtained similar to the procedure described in Appendix A.4, and are given below. These updates constitute the expectation or the E-step of the algorithm. V = ( 1 + WT 1W) 1 (3.40) mn = V WT 1(yn w0) + 1 (3.41) Similarly, for parameters other than d, the updates can be derived following the procedure described in Appendix A.4. The updates for d can be ob- tained as shown in Khan [2011]. These updates constitute the maximization or the M-step of the algorithm, and are shown below. W = " NX n=1 (yn w0)m T n #" NX n=1 V + mnmTn # 1 (3.42) w0 = 1 N NX n=1 yn Wmn (3.43) = 1 N NX n=1 mn; = 1 N NX n=1 Vn + (mn )(mn )T (3.44) d = 1 N NX n=1 y2dn (ydn w0d)w T dmn w 2 0d (3.45) The above updates coincide with the exact EM algorithm derived by Ghahra- mani and Hinton [1996]. The EM algorithm is exact since ELBO is tight after every E-step since true posterior is a Gaussian. See Beal [2003] for more details on the approximate and exact EM algorithm. 563.6. Fast Convergent Variational Inference Algorithm 2 EM for parameter learning in LGMs with Gaussian likelihood 1. Initialize . 2. Iterate until convergence, between E and M step. (a) E-step: i. Compute posterior covariance using Eq. 3.40 (do only once). ii. For all n = 1 to N , compute posterior mean using Eq. 3.41. (b) Compute the lower bound of Eq. 3.21 and check for convergence. (c) M-step: Update as shown in Eq. 3.42-3.45 An attractive feature of Gaussian LGMs is a property of their posterior covariance that most of the other LGMs lack. The posterior covariance in Eq. 3.40 does not depend on the data and can be computed beforehand. This leads to a huge computational saving since this computation involves a matrix inversion and need not be repeated for every data point. The complete EM algorithm is summarized in Algorithm 2. Computa- tion cost of the EM algorithm is linear in N and D. The E-step involves one matrix inversion, few multiplications of two matrices of sizes L D and D L respectively, and N multiplications of a L D matrix with a D 1 vector, making the cost of E-step to be O(L3 + DL2 + NDL). Note that matrix inversion has to be done only once per E-step, contributing L3 cost, as opposed to NL3. Similarly, M-step involves few summations over n of complexity O(NL2) and O(NDL) plus a matrix inversion, making the total cost of M-step to be O(NL2 +NDL). Memory cost of the whole algorithm is O(L2 + Lmin(D;N)), where the rst term arises from storing the suf- cient statistics P n V + mnm T n and the second term arises from storingP n ynm T n . For the second term, we can either store the sum which takes O(LD) memory or we can store all mn which takes O(LN) memory. 3.6 Fast Convergent Variational Inference In this section, we derive a fast convergence variational inference algorithm for LGMs where there is one latent variable zdn per ydn, e.g. Gaussian processes and latent Gaussian graphical models (see Fig. 1.2(c) and 1.3). Without loss of generality, we can assume that W = ID and w0d = 0 respectively, since these quantities can always be \absorbed" in and . 573.6. Fast Convergent Variational Inference The simplest approach for inference is to use gradient based methods to optimize mn and Vn directly. A problem with this approach is that the number of variational parameters is quadratic, i.e. O(D2) (note that if there is one latent variable per dimension, then L = D and the size of Vn isD D). Opper and Archambeau [2009] speculate that this perhaps may be the reason behind limited use of variational approximations. Our proposed algorithm reduces the number of variational parameters from O(D2) to O(D). Our derivation also serves as a demonstration of how concavity allows us to borrow ideas from concave optimization literature to design computationally e cient algorithms. This section is based on Khan et al. [2012b]. First, we rewrite the lower bound. For notational simplicity, we drop the subscript n from quantities such as yn;mn;Vn etc. For derivational sim- plicity, we assume that the arguments of f(y; e ; ) are all scalars; extension to vector case is straightforward. The ELBO of Eq. 3.21 can be re-written as follows, 1 2 log jV 1j Tr(V 1) (m )T 1(m ) + L + DX d=1 f(yd; d; d) (3.46) Note that e d = d = fmd; Vddg, since Wd is identity and w0d is zero. This simpli es LVB terms which now only depend on the diagonal of V. This simpli cation has a direct e ect on the form that m and V take at the maximum. This will become clear from the xed point equations for m and V, shown below. 1(m ) + gm = 0 (3.47) 1 2 V 1 1 + diag(gv) = 0 (3.48) Here, gm and gv are gradients of f with respect to m and diag(V) re- spectively. We see that, at the solution, V is completely speci ed if gv is known. This property can be exploited to reduce the number of variational parameters. Opper and Archambeau [2009] (and Nickisch and Rasmussen [2008]) propose a reparameterization to reduce the number of parameters to O(D). From the xed point equation, we note that at the solution m and V will have the following form, V = ( 1 + diag( )) 1 (3.49) m = + a (3.50) 583.6. Fast Convergent Variational Inference where a and with d > 0;8d. At the maximum (but not everywhere), a and will be equal to gm and gv respectively. Instead of solving the xed-point equations to obtain m and V, we can reparameterize the lower bound with respect to a and . Substituting 3.49 and 3.50 in the ELBO of Eq. 3.46 and after simpli cation using matrix inversion and determinant lemmas, we get the following new ELBO, 1 2 log(jB jjdiag( )j) + Tr(B 1 ) a T a + DX d=1 f(yd; d; d) (3.51) with B = diag( ) 1 + . For a detailed derivation, see Nickisch and Ras- mussen [2008]. Since the mapping between fa; g and fm;Vg is one-to-one, we can recover the latter given the former. The one-to-one relationship also implies that the new objective function has a unique maximum. The new lower bound involves vectors of size D, reducing the number of variational parameters to O(D). The problem with this reparameterization is that the new lower bound is no longer concave, even though it has a unique maximum. To see this, take the 1-D case. We collect all the terms involving V from Eq. 3.46, except the LVB term, to de ne the function shown in Eq. 3.52. We substitute the reparameterization V = ( 1 + ) 1 to get a new function in Eq. 3.53. The second derivative of this function is shown in Eq. 3.54. Clearly, this derivative is negative for < 1= and non-negative otherwise, making the function neither concave nor convex. f(V ) = 12 [log(V 1) V 1] (3.52) f( ) = 12 [ log(1 + ) (1 + ) 1] (3.53) f 00( ) = 12 1 + 2 ( 1) (3.54) Note that the function is still unimodal and the maximum of (3.51) is equal to the maximum of (3.46). With the reparameterization, we loose the con- cavity and therefore the algorithm may have slow convergence. Our experi- mental results, shown later, con rm the slow convergence. 3.6.1 A Coordinate Ascent Approach We now derive an algorithm that reduces the number of variational parame- ters to O(D) while maintaining concavity. Our algorithm uses simple scalar xed point updates to obtain the diagonal elements of V, instead of directly 593.6. Fast Convergent Variational Inference optimization with respect to the full matrix. The complete algorithm is shown in Algorithm 3. We de ne = 1, and denote the diagonal of V by v. To derive the algorithm, we rst note that the xed point equation of Eq. 3.48 has an attractive property. At the solution, the o -diagonal elements of V 1 are going to be same as the o -diagonal elements of , i.e. if we denote K := V 1, then Kij = ij . We have to only nd the diagonal elements of K to get full V. This is di cult, however, since gradient gv depends on v. We take the approach of optimizing each diagonal element Kii xing all others (and xing m as well). We partition V as shown in left side of Eq. 3.55, indexing the last row by 2 and rest of the rows by 1. We consider a similar partitioning of K and . Our goal is to compute v22 and k22 given all other elements of K, but rst we establish a relationship between them. Matrices K and V are related through the blockwise inversion, as shown below. V11 v12 vT12 v22 = 2 6 4 K 111 + K 111 k12k T 12K 1 11 k22 k T 12K 1 11 k12 K 1 11 k12 k22 k T 12K 1 11 k12 k T 12K 1 11 k22 k T 12K 1 11 k12 1 k22 k T 12K 1 11 k12 3 7 5 (3.55) From the right bottom corner, we have Eq. 3.56 which we simplify to get Eq. 3.57. v22 = 1=(k22 kT12K 1 11 k12) (3.56) k22 = kT12K 1 11 k12 + 1=v22 (3.57) Now, we know from the xed point Eq. 3.48 that optimal v22 and k22 satisfy Eq. 3.58 at the solution, where gv22 is the gradient of f with respect to v22. De ne, t22 := kT12K 1 11 k12 and substitute value of k22 from Eq. 3.57 in Eq. 3.58 to get Eq. 3.59. The solution that satis es this xed point can be found by maximizing the function de ned in Eq. 3.59. 0 = k22 22 + 2g v 22 (3.58) 0 = t22 + 1=v22 22 + 2g v 22 (3.59) f(v) = log(v) + (t22 22)v + 2f(m22; v) (3.60) The function f(v) is a strictly concave function and we can optimize it by iterating the following, k22 = 22 2g v 22 v22 = 1=(k22 t22) (3.61) 603.6. Fast Convergent Variational Inference We will refer to this as a xed-point iteration. Since all elements of K, but k22, are xed, t22 can be computed before hand and need not be evaluated at every xed-point iteration. In fact, we do not need to compute t22 explicitly, since we can obtain its value using Eq. 3.57: t22 = k22 1=v22. We do this before starting the xed-point iteration. Complexity of the xed point iterations depends on the gradient evaluations gv22, so its complexity is O(1). After convergence of iterations Eq. 3.61, we update V using Eq. 3.55. It turns out that this update can be written as one rank updates, complexity of which is O(D2). We now show how to update V e ciently. Let us denote the new values after the xed point iterations by knew22 and v new 22 respectively. Denote the old values by kold22 and v old 22 . We use the right top corner of Eq. 3.55 to get rst equality in Eq. 3.62. Using Eq. 3.57, we substitute k22 t22 = 1=v22 to get the second equality. Similarly, we use the top left corner of Eq. 3.55 to get the rst equality in Eq. 3.63, and use Eq. 3.57 and 3.62 to get the second equality. K 111 k12 = (k old 22 t22)v old 12 = v old 12 =v old 22 (3.62) K 111 = V old 11 K 111 k12k T 12K 1 11 kold22 t22 = Vold11 v old 12 (v old 12 ) T =vold22 (3.63) Note that both K 111 and k12 do not change after the xed point iteration. We use this fact to update Vnew. We use Eq. 3.55 to write updates for Vnew and use 3.62 and 3.63 to simplify. vnew12 = K 111 k12 knew22 t22 = vnew22 vold22 vold12 (3.64) Vnew11 = K 1 11 + K 111 k12k T 12K 1 11 knew22 t22 (3.65) = Vold11 1 vold22 vold12 (v old 12 ) T + vnew22 (vold22 ) 2 vold12 (v old 12 ) T (3.66) = Vold11 + vnew22 v old 22 (vold22 ) 2 vold12 (v old 12 ) T (3.67) After updating V, we update m by optimizing the following non-linear least squares problem, cost of which is O(D2), max m 12(m ) T (m ) + DX n=1 f(yd;md; vd; d) (3.68) We use LBFGS algorithm for this. 613.6. Fast Convergent Variational Inference Algorithm 3 Fast-convergent coordinate-ascent algorithm 1. Initialize K ;V 1;m , where := 1. 2. Iterate until convergence, between updating columns of V and then m as shown below. (a) Update columns of V using the following. i. Rearrange V;K; so that the corresponding column is the last one. ii. t22 k22 1=v22. iii. Store old value vold22 v22. iv. Iterate between k22 22 2gv22 and v22 1=(k22 t22). v. Update V. A. V11 V11 + (v22 vold22 )v12v T 12=(v old 22 ) 2. B. v12 v22v12=vold22 . (b) Update m by maximizing the least squares problem of Eq. 3.68. Computational complexity The nal algorithm is shown in Algorithm 3. The main advantage of our algorithm is its fast convergence as we show in the results section. Our algorithm is of similar avor to graphical lasso [Friedman et al., 2008], and is in fact very close to a modi ed version presented in Mazumder and Hastie [2011]. Hence, our algorithm enjoys similar computational e ciency. Overall computational complexity is O(D3 + D2Im + P d I f d ). First term is due to O(D2) update for each d. Second term is the cost of updating m where Im is number of iterations required. Final term is for Ifn iterations of xed point updates, total cost linear in D due to summation. In all our experiments, Ifd is usually 3 to 5, adding very little cost. Proof of convergence Proposition 2.7.1 in Bertsekas [1999] states that coordinate ascent algorithm will converge if the maximization with respect to each coordinate is uniquely attained. This is indeed the case for us since each xed point iteration solves a concave problem of the form given in Eq. 3.60. Similarly, optimization with respect to m is also strictly concave. Hence, our algorithm converges to the maximum of the lower bound of Eq. 3.46. 623.6. Fast Convergent Variational Inference Proof that V will always be positive de nite Let us assume that we start with a positive de nite K, which is true since we can initialize it with . Now consider the update of v22 and k22. Note that v22 is always going to be positive since it is the maximum of Eq. 3.60 which involves the log term. As v22 > 0, we get k22 > kT12K 1 11 k12 from Eq. 3.57. Hence, the Schur complement k22 kT12K 1 11 k12 > 0. Using this and the fact that K11 is positive de nite, it follows that the new K, after update of k22, will be positive de nite too. Hence, V will be positive de nite too. 3.6.2 Results We now show that the proposed algorithm lead to signi cant gain in speed on real problems. We consider the Gaussian process classi cation model for binary data using the Bernoulli logit link; see Section 1.2.3 for details on Gaussian process model. For Bernoulli logit link, we use the piecewise bound with 20 pieces, described in Section 4.5. We apply the model on the UCI ionosphere data (available from UCI repository) which has 351 data examples with 34 features. We split the dataset keeping 80% of the dataset for training and rest for testing. We compare our algorithm with the parameterization of Opper and Ar- chambeau [Opper and Archambeau, 2009] (Eq. 3.51). We also compared to the naive method of optimizing with respect to full m and V, e.g. method of Braun and McAuli e [2010], but do not present these results since these algorithms have very slow convergence. We examine the computational cost of each method in terms of the number of oating point operations ( ops) for four hyperparameter settings = flog( ); log(s)g. This comparison is shown in Fig. 3.1. The y-axis shows (negative of) the value of the lower bound, and the x-axis shows the number of ops. We draw markers at iteration 1,2,4,50 and in steps of 50 from then on. In all cases, due to non-convexity, the optimization of Opper and Archambeau reparameterization (black curve with squares) converges slowly, spending lot of time in at regions of the objective functions and requiring a large number of computations to converge. The proposed al- gorithm (blue curve with circles) has consistently faster convergence than the other method. For this dataset, our algorithm always converged in 5 iterations. We applied our method to two more datasets of Nickisch and Rasmussen [2008], namely ‘sonar’ (208 data example with 60 features) and ‘usps’ dataset (1540 data examples with 256 features), to observe similar behavior. Both of 633.6. Fast Convergent Variational Inference 0 300 600 900 134 138 142 (−1.0,−1.0) Mega−Flops neg−LogLi k 0 1000 2000 3000 300 600 900 (−1.0,2.5) Mega−Flops neg−LogLi k 0 5K 10K 15K 20K 80 110 140 170 200 (3.5,3.5) Mega−Flops neg−LogLi k 0 2000 4000 6000 8000 100 200 300 Mega−Flops neg−LogLi k (1.0,1.0) Opper−Arch proposed Figure 3.1: Convergence results on the binary ionosphere data set for Gaus- sian process classi cation. We plot the negative of the ELBO with respect to the number of ops. Each plot shows the progress of each algorithm for a hyperparameter setting shown at the top of the plot. The proposed algo- rithm always converges faster than the other method, in fact, in less than 5 iterations for this dataset. these datasets are available at the UCI repository and details can be found in Nickisch and Rasmussen [2008]. We also compare the total cost to convergence in Table 3.1, where we count the total number of ops until successive increase in the objective function is below 10 3. Each entry is a di erent setting of flog(s); log( )g. Rows correspond to values of log(s) while columns correspond for log( ). Also, M,G,T stands for Mega, Giga, and Terra ops. We can see that the proposed algorithms takes much smaller number of operations compared to the existing algorithm. 643.6. Fast Convergent Variational Inference Proposed Algorithm -1 1 3 -1 6M 7M 7M 1 26M 20M 22M 3 47M 81M 75M Opper and Archambeau -1 1 3 -1 20G 212G 6T 1 101G 24T 24T 3 38G 1T 24T Table 3.1: This table shows the total number of oating point operations for both algorithms to converge to a tolerance of 1e-3. Rows correspond to values of log(s) while columns correspond for log( ). Here, M,G,T stands for Mega, Giga, and Tera ops. We can see that the proposed algorithms takes much smaller number of operations compared to the existing algorithm. 65Chapter 4 Variational Learning of Binary LGMs In this chapter, we discuss tractable variational learning for binary data. We propose two new LVBs and compare them to an existing LVB called the Jaakkola bound. First bound is a simple quadratic bound, called the Bohning bound. This bound leads to a faster learning, but less accurate, algorithm than the Jaakkola bound. The second bound is a class of highly accurate piecewise linear/quadratic bounds. Errors in these bounds can be made arbitrarily small by increasing the number of pieces. Our results show that the error in LVBs has direct e ect on the accuracy of variational learning. We prove theoretical results showing that the piecewise bounds are more accurate than the Jaakkola bound, while the Bohning bound is less accurate than the Jaakkola bound. In terms of computational complexity, however, the Bohning bound is the fastest while the Jaakkola bound and the piecewise bounds have similar computational complexity. We demonstrate these results on many datasets and models. 4.1 Bernoulli Logit LGMs We consider modeling of the binary data using Bernoulli logit likelihood, de ned below for y 2 f0; 1g with a scalar predictor , p(yj ) = ey =(1 + e ) = exp[y llp( )] (4.1) where llp( ) = log(1 + exp( )) is the logistic-log-partition (LLP) function. Using this likelihood, we de ne a Bernoulli logit LGM (bLGM) to model binary data vectors yn, p(znj ) = N (znj ; ) (4.2) dn = w T d zn + w0d (4.3) p(ynjzn; ) = DY d=1 exp(ydn dn llp( dn)) (4.4) 664.2. LVBs for bLGMs The parameter set is the set of parameters required to de ne the following quantities, f ; ;W;w0g, where W is a matrix containing wTd as rows and w0 is a vector of w0d. All other quantities are de ned similar to the generic LGM of Section 1.1. 4.2 LVBs for bLGMs As discussed before in Section 3.3, the ELBO is intractable since the expec- tation of the log-likelihood for discrete data is intractable. To be precise, we would like to bound the expectation of the log-likelihood of the observation y with respect to the approximate distribution q( je ) = N ( jem; ev), i.e. the following: Eq( je )[log p(yj )]. This term is simpli ed below for the Bernoulli logit likelihood to show that the source of intractability is the expectation of the LLP function. Eq( je )[log p(yj )] = y em Eq( je )[llp( )] (4.5) To obtain a tractable LVB, we need a tractable bound to the expectation of the LLP function. In this chapter, we discuss di erent ways to bound the LLP function. We describe the following LVBs in next few sections: the Jaakkola, Bohning, and piecewise bounds. All these bounds are jointly concave with respect to em and ev. 4.3 The Jaakkola Bound The Jaakkola bound, proposed by Jaakkola and Jordan [1996], is a quadratic bound and is de ned below, fJ(y; e ; ) := y em 12a (em 2 + ev) 12 em c (4.6) a = 2 (4.7) c = 2 =2 + llp( ) (4.8) = [g ( ) 1=2] = (2 ) (4.9) where is the variational parameter and a ; c and are its functions. The Jaakkola bound is derived using an upper quadratic bound to the LLP function obtained by applying the Fenchel duality. Detailed derivation is given in the Appendix A.3. Fig. 4.3 illustrates the quadratic bound to the LLP function for two values of . The main di erence between the Jaakkola bound and the Bohn- ing bound (which we describe in the next section) is that the former allows 674.3. The Jaakkola Bound −20 0 20 40 0 10 20 30 40 η (a) The Jaakkola bound −20 0 20 40 0 10 20 30 40 η (b) The Bohning bound Figure 4.1: This gure shows the upper quadratic bounds to the LLP func- tion. Left plot shows the Jaakkola bound (in solid blue lines) for two values of , along with the LLP function (in dashed black lines). The right plot shows the same for the Bohning bound (but in solid red lines) for two val- ues of . Note that the Bohning bound has xed curvature, while the Jaakkola bound allows variable curvature thereby giving a more accurate bound. However, xed curvature leads to a computationally cheaper algo- rithm. variable curvature a . We will soon see that, for this reason, the Jaakkola bound is always more accurate than the Bohning bound, but this gain in accuracy comes with an increase in the computational cost. 4.3.1 Variational Learning For a tractable lower bound, we need to bound Eq( je dn)[log p(ydnj )] for the (d; n)’th observation. The Jaakkola bound to this term is shown below, where a ;dn and c ;dn are functions of the local variational parameter dn and are de ned as in Eq. 4.7 and 4.8. fJ(ydn; e dn; dn) := ydn emdn 12a ;dn(em 2 dn + evdn) 1 2 emdn c ;dn (4.10) The gradients with respect to emdn and evdn are given below, gmdn = (ydn 1 2) a ;dn emdn ; g v dn = a ;dn=2 (4.11) We now derive updates for n, , and dn. 684.3. The Jaakkola Bound Updates for the posterior distribution and parameters We substitute the expressions for gmdn and g v dn in the generalized gradient expressions given in Algorithm 1. We set the gradients to zero and simplify to get the updates which we describe below. Detailed derivation is given in Appendix A.4. The E-step updates are shown below, Vn = 1 + WTAnW 1 (4.12) mn = Vn WT (yn 1 2 Anw0) + 1 (4.13) where An = diag(a ;1n; a ;2n; : : : ; a ;Dn). The M-step updates are the fol- lowing, wTd = " NX n=1 (ydn 12 a ;dnw0)m T n #" NX n=1 a ;dn Vn + mnmTn # 1 (4.14) w0d = PN n=1 ydn 1 2 a ;dnw T dmn PN n=1 a ;dn (4.15) along with updates of and which remains same as Eq. 3.37. For = 0 and = I, these updates reduce to binary PCA discussed by Tipping [1998]. There are two complications to note in these updates. Firstly, the pos- terior covariance Vn depends on the data vector through An and needs to be computed for every n. Secondly, the updates for wd and w0d need to be done separately for each d, each of which involves reweighting the matrix P n Vn + mnm T n with a ;dn. These complications are direct consequences of the variable curvature of the Jaakkola bound. To see this, recall that the algorithm for the Gaus- sian likelihood, discussed in Section 3.5.2, had nice computational properties due to the fact that the noise variance d did not depend on n. The lower bound obtained using the Jaakkola bound corresponds to a Gaussian like- lihood as shown in the following: p(ydnj ) Z ;dnN (~ydnj ; 1=a ;dn) where ~ydn := (ydn + 1=2)=a ;dn and Z ;dn is a function of dn. This expression can be obtained using the quadratic upper bound given in Eq. A.25. The noise variance of the Gaussian lower bound depends on n, implying that the posterior distribution Vn also depends on n. Hence, we lose the nice computational properties we could have obtained by using a Gaussian lower bound with xed noise variances. We will soon propose a new lower bound that simpli es the updates by using such lower bounds. 694.4. The Bohning Bound Update for the local variational parameter We now discuss update of dn. For simplicity, we drop the subscript dn. We di erentiate fJ with respect to in Eq. 4.16, and simplify further in Eq. 4.17 by substituting the derivatives of a and c expressed in terms of the derivative of . We substitute the value of to get Eq. 4.18 and simplify to get the expression in Eq. 4.19. @fJ @ = 12( ~m 2 + ~v) @a @ @c @ (4.16) = ( ~m2 + ~v 2) @ @ + 2 + 12 g( ) (4.17) = ( ~m2 + ~v 2) @ @ + g( ) 12 + 1 2 g( ) (4.18) = ( ~m2 + ~v 2) @ @ (4.19) Setting the gradient to zero gives us the update = p ~m2 + ~v. A variational EM algorithm A variational EM algorithm for parameter estimation is shown in Algorithm 4. The computational complexity is summarized in Table 4.1. Computing Vn requires inverting a L L matrix and multiplication WTAnW, making complexity of this step O(L3 + DL2). Computing mn requires a multipli- cation of two matrices of sizes L D and D L, plus multiplications of a L D matrix with a D 1 vector for few iterations. This makes the total cost of the E-step to be O(N(L3 + DL2)I), where I is the number of iterations taken for convergence in the E-step. The cost of M-step and the memory cost are equal to O(L3 +NL2 +NDL) and O(L2 + Lmin(N;D)). 4.4 The Bohning Bound The Bohning bound, proposed by Bohning [1992], is a lesser known quadratic bound and is de ned below. fB(y; e ; ) := y em 1 8 (em2 + ev) + b em c (4.20) b = =4 g (4.21) c = 2=8 g + llp( ) (4.22) g = 1=(1 + exp( )) (4.23) 704.4. The Bohning Bound Algorithm 4 Variational EM using the Jaakkola Bound 1. Initialize . 2. Iterate until convergence, between E and M step. (a) E-step (or Inference step): i. For each n, initialize mn and Vn and iterate, A. Update dn q ~m2dn + ~vdn. B. Compute a ;dn and c ;dn, 8d using Eq. 4.7 and 4.8. C. Compute Vn and mn using Eq. 4.12 and 4.13. (b) Compute the lower bound of Eq. 3.21 and check for convergence. (c) M-step: Update using Eq. 4.14,4.15, and 3.37. Here, 2 R is the local variational parameter and g ; b and c are functions of . The Bohning bound is derived by forming a quadratic bound to the LLP function using a Taylor series expansion around . Derivation is given in the next section. Fig. 4.3 illustrates the quadratic bound to the LLP function for two values of . An important feature of the Bohning bound is its xed cur- vature which allows us to obtain a fast algorithm. This is in contrast to the Jaakkola bound which allows variable curvature. Choice of the local variational parameter depends on the distribution of the expectation. As we will show later, the optimal is equal to em as expected since we would like the bound to be tight around the high density area. 4.4.1 Derivation The Bohning bound is derived using a Taylor series expansion of the LLP function around 2 R shown in Eq. 4.24. Functions g = 1=(1 + exp( )) and h = g (1 g ) are the rst and second derivatives of the LLP function, and the equality holds for some 2 R due to Taylor’s theorem [Rudin, 2006]. An upper bound to the LLP function is found by replacing the second derivative term by an upper bound. The second derivative of the LLP function evaluated at is upper bounded by 1=4, since g lies between 0 and 1 and therefore the product g (1 g ) lies between 0 and 1/4. Using 714.4. The Bohning Bound this fact, we get the upper bound shown in Eq. 4.25. llp( ) = llp( ) + g ( ) + 1 2 h ( ) 2 (4.24) llp( ) + g ( ) + 1 8 ( )2 (4.25) We substitute this bound in Eq. 4.5 and rearrange to obtain the Bohning bound shown in Eq. 4.20-4.23. 4.4.2 Variational Learning Similar to the Jaakkola bound, we need to bound Eq( je dn)[log p(ydnj )] for the (d; n)’th observation. The Bohning bound to this term is shown below, where b ;dn and c ;dn are functions of the local variational parameter dn and are de ned as in Eq. 4.21 and 4.22. fB(ydn; e dn; dn) := ydn emdn 1 8 (em2dn + evdn) + b ;dn emdn c ;dn (4.26) To compute gradients with respect to n and , we need gradients of the bound with respect to emdn and evdn, which are given below, gmdn = (ydn + b ;dn) emdn=4 ; g v dn = 1=8 (4.27) We now derive updates for n, , and dn. Updates for the posterior distribution and parameters We follow the same procedure as the Jaakkola bound, to get the updates given below. We substitute the expressions for gmdn and g v dn in the generalized gradient expressions given in Algorithm 1. We set the gradients to zero and simplify to get the updates below. Details are given in Appendix A.4. The E-step updates are shown below, V = 1 + WTW=4 1 (4.28) mn = V WT (yn + bn w0=4) + 1 (4.29) where bn is the vector of b ;dn; 8d. The M-step updates are the following, W = " NX n=1 f4(yn + bn) w0gm T n #" NX n=1 V + mnmTn # 1 (4.30) w0 = 1 N NX n=1 4(yn + bn) Wmn (4.31) 724.4. The Bohning Bound along with updates of and which remains same as Eq. 3.37. The Bohning bound leads to simple closed form updates. Most impor- tantly, the update for posterior covariance V does not depend on the data and can be computed before hand. This is similar to the case of Gaussian LGM, discussed in Section 3.5.2, where this property leads to huge computa- tional saving. This is not the only property that the Bohning bound shares with Gaussian LGMs. In fact, when we compare these updates to Eq. 3.40- 3.45, we nd that all of the updates for the Bohning bound are exactly same as those of Gaussian LGMs with data vectors 4(y + bn) and noise variance d = 4. This is due to the fact that the Bohning bound lower bounds the log- likelihood with a quadratic function and thereby lower bounds the likelihood with a Gaussian likelihood. The lower bound for the (d; n)’th measurement is an unnormalized Gaussian such that p(ydnj ) Z ;dnN (~ydnj ; 4) for some Z ;dn and ~ydn = 4(ydn + b ;dn). Hence, by optimizing dn, we nd the best Gaussian likelihood (with a xed noise variance) that gives the tightest lower bound to the marginal likelihood. As discussed before, the Jaakkola bound also bounds the likelihood with an unnormalized Gaussian likelihood, but allows variable noise variances. Update for the local variational parameter We now discuss update of dn. For simplicity, we drop the subscript dn from all quantities. Only fB depends on and we di erentiate this term to obtain updates of . The derivative is simpli ed below. @fB @ = ~m @b @ @c @ (4.32) = ~m (1=4 h ) ( =4 g h + g ) (4.33) = ~m (1=4 h ) ( =4 h ) (4.34) = h ( ~m) ( ~m)=4 (4.35) = (h 1=4)( ~m) (4.36) The maximum occurs at = ~m, which can be veri ed by computing the second derivative. This is as expected since the bound should be tight around the high density region of the distribution. The second solution h = 1=4) = 0, showing that this is not the maximum. A variational EM algorithm The variational EM algorithm for parameter estimation is shown in Algo- rithm 5. The computational complexity is summarized in Table 4.1, where 734.5. Piecewise Linear/Quadratic Bounds Algorithm 5 Variational EM using the Bohning Bound 1. Initialize . 2. Iterate until convergence, between E and M step. (a) E-step (or Inference step): i. Compute posterior covariance using Eq. 4.28 (do only once). ii. For each n, initialize mn and iterate the following, A. Update n Wmn + w0. B. Compute b ;dn and c ;dn, 8d using Eq. 4.21 and 4.22. C. Compute posterior mean mn using Eq. 4.29. (b) Compute the lower bound of Eq. 3.21 and check for convergence. (c) M-step: Update using Eq. 4.30,4.31, and 3.37. it is also compared to the complexity of the Jaakkola bound and the exact EM algorithm for Gaussian LGM. The Bohning bound has lower complexity than the Jaakkola bound. Since V is same for all n, we only need to be com- pute it once during the E-step, instead of computing it for all n separately. This simpli cation leads to a huge computational saving since computation of V involves inversion of a square matrix of size L, making complexity of this step O(L3 +DL2), which is independent of n. Computing mn requires a multiplication of two matrices of sizes L D and D L, plus N multi- plications of a L D matrix with a D 1 vector for few iterations. This makes the total cost of the E-step to be O(L3 +DL2 +NDLI), where I is the number of iterations taken for convergence in the E-step. The cost of M-step and the memory cost remains same as the Jaakkola bound. 4.5 Piecewise Linear/Quadratic Bounds The quadratic bounds can be quite inaccurate at times. This is due to the fact that the integration is over the whole range of the approximation and any single-piece quadratic function will have unbounded error relative to the log-likelihood. For this reason, we propose the use of piecewise lin- ear/quadratic bounds, which have a nite maximum error that can be driven to zero by increasing the number of pieces. An R-piece quadratic bound consists of R intervals de ned by R + 1 threshold points t0; :::; tR such that tr < tr+1, and R quadratic functions 744.5. Piecewise Linear/Quadratic Bounds arx2 + brx+ cr. An R-piece linear bound is a special case where ar = 0 for all r. We x the rst and last threshold points to 1 and 1, respectively. We use to denote the complete set of bound parameters including the threshold points and quadratic coe cients, denoting each quadratic piece by f( ; x). The piecewise quadratic bound is expressed as sum of piecewise upper bounds f r to the LLP function, as shown below in Eq. 4.37. Upper bound f r is the integration of r’th quadratic piece over the r’th interval, as shown in Eq. 4.38. fPW (y; e ; ) := y em RX r=1 f r(em; ev; ) (4.37) f r(em; ev; ) := Z tr tr 1 (arx 2 + brx+ cr)N (xjem; ev)dx (4.38) The parameters are set such that each quadratic piece (arx2 + brx + cr) is an upper bound to the LLP function, making f r upper bounds and ultimately fPW a lower bound. We make sure that each quadratic piece is as close as possible to the LLP function. This is done by solving a minimax optimization problem to minimize the maximum error between the LLP function and the quadratic piece. We describe this in detail in Section 4.5.1, but an important consequence of this optimization is that the maximum error made by piecewise bounds is always bounded. Not only this, but the error can be made arbitrary small by increasing the number of pieces. Another advantage is that can be precomputed and stored, and need not be optimized within the variational algorithm. This simpli es the algorithm and reduces the computation. The only disadvantage is that the function f r does not have an analytical form, but since its value and its gradients can be evaluated at a given em and ev, we can use gradient based method to optimize the resulting evidence lower bound. 4.5.1 Derivation In this section, we describe the computation of parameters of quadratic pieces, as well as the intervals they are de ned in, while making sure that each piece is an upper bound to the LLP function. The minimax optimal R-piece quadratic upper bound problem for the LLP function is de ned in Eq. 4.39. The objective function is simply the maximum gap between the piecewise quadratic bound and the LLP function. The rst constraint is required to ensure that each quadratic function is an upper bound over the interval it is de ned on. The second constraint ensures that the thresholds 754.5. Piecewise Linear/Quadratic Bounds are monotonically increasing. The nal constraint ensures that the curvature of each quadratic function is non-negative. min max r2f1;::;Rg max x2Ir arx 2 + brx+ cr llp(x) (4.39) arx2 + brx+ cr llp(x) 0 8 r; x 2 Ir := [tr 1; tr] tr tr 1 > 0 8r 2 f1; ::; Rg ar 0 8r 2 f1; ::; Rg We now reformulate the problem to remove all of the constraints. The second and third constraints can be dealt with using trivial reparameteriza- tions. The rst constraint can be replaced with an equality, which can then be solved for cr yielding cr = minx2Ir arx 2 + brx llp(x) . This substi- tution is essentially nding the minimum gap between the quadratic and the LLP function on each interval and setting it to zero. This converts any quadratic with positive curvature into an upper bound on the LLP function over the corresponding interval. The nal unconstrained problem is given below. min max r2f1;::;Rg [max x2Ir arx 2 + brx llp(x)] [min x2Ir arx 2 + brx llp(x)] (4.40) We also note that the number of parameters that must be optimized can be reduced by a factor of two by exploiting the symmetry of the LLP function. The joint optimization of the breakpoints and quadratic coe - cients can somewhat simpli ed by noting that the LLP function satis es the relationship llp( x) = llp(x) x. If the function ax2 + bx + c llp(x) yields an error of at t, then it is easy to show that the function ax2 + (1 b)x + c llp(x) will also yields an error of at t. For an even num- ber of pieces R, we can exploit this observation by setting the breakpoints to [ tR=2; tR=2 1; :::; t1; 0; t1; :::; tR=2 1; tR=2], optimizing coe cients for the intervals [0; t1]; :::; [tR=2 1; tR=2], and then applying the above relation to convert the quadratic on each positive interval into a quadratic on the cor- responding negative interval with the same maximum error. The procedure is almost identical in the case of an odd number of pieces, except that 0 is removed from the set of break points. So we need only optimize coe cients on the half of the intervals and then use the relationship given above to derive coe cients for the quadratics on the other (strictly negative) half of intervals. This reduces the number of variables that need to be optimized by half and makes the application of derivative-free methods practical with up to 20 pieces. 764.5. Piecewise Linear/Quadratic Bounds The main di culty with the optimization problem of Eq. 4.40 comes from the fact that the inner maximization and minimization problems ap- parently have no closed-form solutions. However, global solutions for both the maximization and minimization problems can be easily found by numer- ical optimization as the function ax2 + bx llp(x) has at most three critical points for any choice of a and b. However, this means that the outer mini- mization must be conducted using a derivative-free optimization algorithm since the objective function itself involves solving a non-linear optimization problem. We use the classical Nelder-Mead method [Nelder and Mead, 1965] for this purpose. In the linear case where ar = 0, [Hsiung et al., 2008] have proposed a constructive search method for determining minimax optimal coe cients and break points. Their work was motivated by the need to obtain linear ap- proximations to LLP constraints in the context of geometric programming. We use their method for computing piecewise linear bounds. Whether a similar algorithm can be found for the piecewise quadratic case is an inter- esting open question that we leave for future work. The solutions found for the quadratic case using Nelder and Mead’s method works well up to 20 pieces, which is more than su cient for the applications we address in this thesis. Fig. 4.2 illustrates the gain in accuracy obtained by using piecewise quadratic bounds instead of piecewise linear bounds. Fig. 4.2(a) and 4.2(b) contrast the accuracies obtained using three-piece linear and quadratic bounds while Fig. 4.3 shows the maximum error of both linear and quadratic bounds as a function of the number of pieces. We see that the piecewise quadratic bounds can be more than an order of magnitude more accurate than the piecewise linear bounds using the same number of pieces. Conversely, it can take more than double the number of pieces for a piecewise linear bound to approach the same accuracy as a piecewise quadratic bound. 4.5.2 Variational Learning For variational learning, we need to evaluate fPW and its gradients. These can be obtained using the moments of truncated Gaussians, since each f r can be expressed in terms of those moments. See Appendix A.5 for details. Given the gradients of the piecewise bound, we can compute the gradients for variational learning using the generalized expressions given in Section 3.5.1. We can use any gradient based method, such as gradient-descent method, for optimization. Computational cost of the algorithm is summarized in Table 4.1. These 774.6. Error Analysis −3 0 3 0 1 2 3 L3 LLP Bound −3 0 3 0 1 2 3 Q3 LLP Bound −5 0 5 0 0.5 1 L3 Logistic Bound −5 0 5 0 0.5 1 Q3 Logistic Bound (a) Bounds −10 −5 0 5 10 0 0.05 0.1 0.15 0.2 L3 LLP Bound Error −10 −5 0 5 10 0 0.05 0.1 0.15 0.2 Q3 LLP Bound Error −10 −5 0 5 10 0 0.05 0.1 0.15 0.2 L3 Logistic Bound Error −10 −5 0 5 10 0 0.05 0.1 0.15 0.2 Q3 Logistic Bound Error (b) Bounding errors Figure 4.2: Figure (a) shows three-piece linear (L3) and quadratic (Q3) upper bounds. Top row shows these bounds on the LLP function and the bottom row shows the induced lower bounds on the Bernoulli logit likelihood. Figure (b) shows the corresponding error made in each plot in Figure (a). computational costs are calculated according to the gradients shown in Al- gorithm 1. The gradients in E-step involves inversion of an L L matrix, and multiplication of a D L with L D matrix, making the cost of each gradient step to be O(L3 + DL2). For M-step, the most computational in- tensive step is the gradient of Wd which involves N multiplication of D L matrix with L D matrix, making the cost each gradient step in M-step to be O(NDL2). To compute the gradients in the M-step, we have to store all mn and Vn making the memory cost to be O(NL2). This can be reduced to L2 + Lmin(D;N) if we restrict M-step to take only one gradient step. The cost of gradients (gmdn; G v dn) for the piecewise bound scales linearly with the number of pieces R, adding DNR cost to both E and M steps. 4.6 Error Analysis In this section, we compare the error obtained by local variational bounds. In terms of accuracy, the piecewise bound is the most accurate, followed by the Jaakkola bound and then the Bohning bound which is the least accurate of all. Our rst theorem shows that the Jaakkola bound is always a better 784.6. Error Analysis 4 8 12 16 20 10−3 10−2 10−1 Bound Pieces Maximum Erro r Maximum Error vs Number of Pieces L Q Figure 4.3: The maximum error in the LLP bounds as a function of the number of pieces in the bound. Here, ‘L’ stands for the linear bounds, while ‘Q’ stands for the quadratic bounds. bound than the Bohning bound. Theorem 4.6.1. The Jaakkola bound is always more accurate than the Bohning bound for all em and ev. Proof. We derive an expression for the di erence between the Jaakkola and Bohning bound, at their respective optimal variational parameter settings, and show that this di erence is greater than 0, proving the superiority of the Jaakkola bound. The Bohning bound is optimized when = em. Sub- stituting this in Eq. 4.20, we get the following optimal value of the Bohning bound, fB(y; e ; ) = y em 1 8 (em2 + ev) + b em c = y em ev=8 llp(em) (4.41) Similarly, the Jaakkola bound is optimized when = p em2 + ev, substituting which in Eq. 4.6 we get the optimal value of the Jaakkola bound, fJ(y; e ; ) = y em 12a (em 2 + ev) 12 em c (4.42) = y em em=2 + p em2 + ev=2 llp p em2 + ev (4.43) 794.6. Error Analysis Algorithm E-step M-step Memory Gaussian L3 +DL2 +NDL L3 +NL2 +NDL L2+ Lmin(D;N) Bohning L3 +DL2 +NDLI " " Jaakkola N(L3 +DL2)I " " Piecewise N(L3 +DL2 +DR)I ND(L2 +R)I NL2 Table 4.1: Comparison of computational complexity. Each row is a vari- ational EM algorithm. First row is the exact EM algorithm for Gaussian LGM described in Section 3.5.2. Next three rows are variational EM al- gorithm for bLGMs using various LVBs. The rst two columns contain computational cost of E and M steps, while the third column contains the memory cost. All cost are in big O notation. I is the number of iterations required to converge. Note that the memory cost for piecewise bound can be reduced to L2 +Lmin(D;N) by restricting M-step to one gradient step. Taking the di erence between the two bounds, we get the following, (em; ev) := fJ(y; e ; ) fB(y; e ; ) (4.44) = ev=8 + llp(em) em=2 h llp p em2 + ev p em2 + ev i (4.45) Proving that this quantity is always greater than 0, will establish the superi- ority of the Jaakkola bound. To prove this, we rst prove that the function f(x) := llp(x) x=2 is monotonically decreasing. This can be established by noting that x=2 is a lower bound to llp(x), and is asymptotically approaching llp(x), making the di erence smaller as x!1. Using the monotonicity of f(x) and noting that p em2 + ev > em, we conclude that f(em) > f( p em2 + ev). Since ev > 0, it follows that (em; ev) > 0; 8em; ev, making the Jaakkola bound a better lower bound than the Bohning bound. As discussed before, the piecewise linear and quadratic bound have a known bounded maximum error max by construction. This error can be made arbitrarily small by increasing the number of pieces. Hence, piecewise bounds can be made more accurate than any other bound, given enough number of pieces in the bound. The fact that the piecewise bounds on the LLP function have a known nite maximum error max means that we can easily bound the maximum error in the evidence lower bound. The following theorem formalizes this. 804.7. Experiments and Results Theorem 4.6.2. The loss in the evidence lower bound incurred by using the piecewise quadratic bound is at most D max. In other words, LJn( ; n) Ln( ; n; ) D max for any ; n. The proof is trivial. Since the error made in the d’th term is at most max, the maximum error for all D dimension could not be more than D max. We also note that the rate at which the error in the LLP bound decreases with number of pieces R is proportional to the rate at which Ln approaches LJn. Hsiung et al. [2008] showed that the error in the optimal piecewise linear bound decreases with the approximate rate p 2=R2. The error in piecewise quadratic bounds decreases at least this fast. This means that LJn Ln approaches zero at a rate that is at least quadratic in the number of pieces. 4.7 Experiments and Results In this section we compare di erent methods on several binary data sets. Throughout this section, we use p(yj ) to refer to the exact probability of a data vector y under the distribution with parameters . For small D, we can compute p(yj ) exactly using Monte Carlo, and compare the accuracy of various methods against it. In higher dimensions, we use imputation error as a measure of model t. We hold out exactly one dimension per data case, selected at random. Given the observed data, we compute the prediction for the missing entries, and use the average cross-entropy of the held-out values as the imputation error measure. Comparing errors in local variational bounds In this experiment, we compare e ects of the error in the local variational bounds. We do so by comparing the marginal likelihood estimates in a one-dimensional LGM with 1-D observation and 1-D latent variable. We consider a binary latent Gaussian graphical model (LGGM) param- eterized by a scalar mean and variance 2; see Fig. 1.3. The parameter vector is thus = [ ; 2]. We set the true parameters to = 2 and = 2, yielding p(y = 1j ) = 0:7752, which we denote by p . Given , this probability can be estimated using various LVBs. Through- out the chapter, we discussed LVBs on the expectation of the log likelihood, but all of them imply an LVB on the log-likelihood itself. Consider the lower bound f(z) such that log p(y = 1jz) > f(z). Using this, we can compute a 814.7. Experiments and Results lower bound to p(y = 1j ) as follows, p(y = 1j ) = Z p(y = 1jz)N (zj ; 2)dz Z ef(z)N (zj ; 2)dz (4.46) We denote this estimate as p^( ). For all LVBs that we discuss, the above 1-D integral can be obtained in closed form. This is because all of the LVBs are (piecewise) linear/quadratic and application of the identity of Appendix A.1 gives a closed form expression. Given , the log-marginal likelihood, in the limit of in nite data, can be computed as shown in Eq. 4.47. The log-marginal likelihood for can be computed as shown in Eq. 4.48. Finally, an estimate of the log-marginal likelihood can be obtained using the probability estimate p^( ) as shown in Eq. 4.49. L( ) = p log p + (1 p ) log(1 p ) (4.47) L = p log p + (1 p ) log(1 p ) (4.48) bL( ) = p log bp + (1 p ) log(1 bp ) (4.49) We compare these three quantities for various LVBs. Note the two advantages of using these quantities for comparison. First, these quantities are computed in the limit of in nite data and hence there is no estimation error due to the data. Second, the marginal likelihood estimates do not require use of Jensen’s inequality and therefore do not have any additional error due to it. Hence, the estimates are free from any other type of error and contain error introduced by LVBs only. We x to its optimal value and vary . The results of this experiment are given in Fig. 4.4. In each subplot, the solid lines show L( ) and the circle shows L for the true parameter value, i.e. = 2. We clearly see that the maximum occurs at the true parameter value, as desired. The dashed lines show the estimate bL( ). We see that the Bohning (B) and Jaakkola (J) bounds fail dramatically, estimating = 0 instead of the correct value = 2. The piecewise bounds do signi cantly better, converging to the true marginal likelihood and correct value as the number of pieces in the bound increases. The piecewise quadratic bounds (Q3 and Q5) converge signi cantly faster than the linear bounds (L6 and L10), as predicted by the maximum error analysis in Section 4.6. Note that the results for Q3 and Q5 match those of L6 and L10, suggesting that the quadratic bound converges twice as fast as a function of the number of pieces. 824.7. Experiments and Results 0 1 2 3 4 −0.6 −0.58 −0.56 −0.54 σ Bohning vs True 0 1 2 3 4 −0.6 −0.58 −0.56 −0.54 σ Jaakkola vs True 0 1 2 3 4 −0.6 −0.58 −0.56 −0.54 σ L6 & L10 vs True 0 1 2 3 4 −0.6 −0.58 −0.56 −0.54 σ Q3 & Q5 vs True Figure 4.4: This gure shows results for the 1D synthetic LGGM experiment. We show the Bohning, Jaakkola, piecewise linear bounds with 6 and 10 pieces (denoted by L6 and L10 respectively), and piecewise quadratic bounds with 3 and 5 pieces (denoted by Q3 and Q5). The bounds are shown in red dashed lines with darker colors indicating more pieces. The true marginal likelihood is shown in blue solid lines. Markers show the true and estimated parameter values. Comparing parameter estimates In this experiment, we compare the accuracy of parameter estimates. We consider a 5D binary latent Gaussian graphical model (bLGGM) with known parameters. We set the true mean vector to 0 and the true covariance matrix as seen in the top left panel of Fig. 4.5(a). With these parame- ter setting, we get data vectors where rst 3 dimensions have high positive correlation and last 2 dimensions have high negative correlations, the two blocks being independent of each other. Similar to the previous experiment, we compute the true distribution p(yj ) for all 32 binary data vectors. We can compute these values to a reasonable accuracy using the samples from the true model since the latent-dimensionality is small (we use 106 samples). However, unlike the previous experiment, we estimate by optimizing the evidence lower bound described in Chapter 3. Consequently, in this exper- iment, there is no error due to the data, but due to the application of the 834.7. Experiments and Results (a) 5D bLGGM covariance B J L3 L4 L5 L10 Q3 Q4 Q5 Q10 10−3 10−2 10−1 Bound Bit s KL Divergence vs Bounds (b) 5D bLGGM KL divergence Figure 4.5: Figure (a) shows the true covariance matrix for the synthetic bLGGM experiment along with the covariance estimates using the Bohning, Jaakkola, and 10 piece quadratic bounds, indicated with ‘B’,‘J’, and ‘Q10’ respectively. Figure (b) shows the KL divergence between the true and estimated distributions for the 5D synthetic bLGGM experiment. We show results for the Bohning and Jaakkola bounds, as well as 3; 4; 5 and 10 piece linear and quadratic bounds. Jensen inequality and the LVBs. Fig. 4.5(a) shows the covariance matrices estimated using the Jaakkola (J), Bohning (B) and 10 piece quadratic bounds (Q10). We see that both Bohning and Jaakkola shrink the estimated covariance parameters consid- erably, while the 10 piece quadratic bound results in less biased parameter estimates. Fig. 4.5(b) shows the KL divergence between p(yj ) and p(yj ^) for the parameters ^ estimated using each bound; both quantities estimated using the samples from the model, as discussed earlier. We show results for Bohning (B), Jaakkola (J) and 3 to 10 piece linear and quadratic bounds (L3-L10,Q3-Q10). We see that the piecewise bounds have signi cantly lower KL divergence than the Bohning and Jaakkola bounds when using a su - cient number of pieces. This indicates that they estimate signi cantly more accurate models, as suggested by the covariance plots in Fig. 4.5(a). We again see that the piecewise quadratic bound converges approximately twice as fast as the piecewise linear bound as a function of the number of pieces. 844.7. Experiments and Results 10−1 100 101 102 0.5 0.6 0.7 Erro r Time in Seconds Imputation Error vs Time on Voting Data B J L3 Q3 Q10 0.4 0.6 0.4 0.6 Error with Q2 0 Error with B and J bFA on Voting data B vs Q20 J vs Q20 Figure 4.6: Results for bFA on the Voting data: Left plot shows the impu- tation error versus time on the UCI Voting data. Markers are plotted at iterations 2; 10; 20; 35. We see that the piecewise bound gives much lower er- ror and takes a times comparable to the Jaakkola bound. Right plot shows the imputation error of the 20-piece quadratic bound relative to Bohning and Jaakkola for the FA model. Each point is a di erent train-test split and a point below the dashed line indicates that piecewise bound performs better than other bounds. Results for binary factor analysis (bFA) We t a three-factor binary factor analysis (bFA) model to the congressional voting records data set (available in the UCI repository) which contains votes of 435 U.S. Congressmen on 16 issues and the party of congressmen. We remove the data points which contain missing values and 3 issues which only show mild correlation with other issues. This gives us a total of 258 data vec- tors with 14 dimensions each (13 issues plus the party of the congressman). We use 80% of the data for training and 20% for testing. Fig. 4.6 (left) shows traces of the imputation error versus time for Jaakkola (J), Bohning (B), three-piece linear (L3) and three and ten piece quadratic bounds (Q3, Q10) for one training-test split. We see that the piecewise bounds give lower error than the Jaakkola and Bohning bounds, but require more time to converge. We again observe that the quadratic bounds have lower error than the linear bounds and the error decreases as the number of pieces increases. Fig. 4.6 (right) shows the nal imputation error results for 10 training-test splits. We plot the error of Q20 against that of B and J. We clearly see that Q20 outperforms both B and J for all splits. Fig. 4.7-4.9 illustrate the results obtained using a 2-factor model on the 854.7. Experiments and Results −2 −1 0 1 2 3 −2 −1 0 1 2 3 R D p(Y|θ) 0.2 - 0.4 0.01 - 0.2 < 0.01 Fa ct or 2 Factor 1 Latent Factor Embedding Figure 4.7: Results for 2-factor bFA on the voting data using the piecewise bound. This gure shows a plot of posterior means of factors. Each point represents a congressman, with size of the marker proportional to the value of the marginal likelihood; see legend for details. Republicans (R) are marked with circles while Democrats (D) are marked with squares. voting data with the Q20 piecewise bound. Fig. 4.7 shows posterior means of factors. Each point represents a congressman, with size of the marker proportional to the value of the marginal likelihood approximation; see the legend for details on size. Republicans (R) are marked with circles while Democrats (D) are marked with squares. We see that the factors are nicely clustered, clearly bringing out the fact that the Republicans and Democrats have di erent voting patterns. Also note that, in each cluster, there are only few congressmen with large marginal likelihoods (the big markers). These congressmen, perhaps the most \consistent" Republicans/Democrats, represent the voting pattern of the whole party, and are most discriminative in deciding the party type. Left gure in Fig. 4.8 shows the names of the issues, while the right gure shows the probability of two issues getting the same vote. To be 864.7. Experiments and Results De sc rip tio n V1 bu dg et -re so lu tio n V2 ai d- ni ca ra gu an -c on tra s V3 m x- m iss ile V4 du ty -fr ee -e xp or ts V5 an ti- sa te lli te -te st -b an V6 ha nd ica pp ed -in fa nt s V7 ex po rt -a dm in -s ou th -a fri ca V8 im m ig ra tio n V9 sy nf ue ls- co rp -c ut ba ck V1 0 w at er -p ro je ct -c os t-s ha rin g V1 1 ph ys ici an -fe e- fre ez e V1 2 El -s al va do r-a id V1 3 re lig io us -g ro up s- in -s ch oo ls V1 4 ed uc at io n- sp en di ng V1 5 su pe rfu nd -ri gh t-t o- su e V1 6 cr im e (a) Votes Vote s P(Vi=Vj) R V1 V2 V3 V4 V5 V6 V7 V8 V9 V10 V11 V12 V13 V14 V15 V16 R V1 V2 V3 V4 V5 V6 V7 V8 V9 V10 V11 V12 V13 V14 V15 V16 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 (b) Figure 4.8: Left Figure shows the names of the issues. Right gure shows the probability of two issues getting the same vote, computed according to Eq. 4.50. precise, each point (i; j) in the plot represents the following probability, p(Vi = Vj j ^) Z p(Vi = 1jz; ^)p(Vj = 1jz; ^)N (zj0; I)dz + Z p(Vi = 0jz; ^)p(Vj = 0jz; ^)N (zj0; I)dz (4.50) where Vi is the i’th vote/issue (equal to the i’th element of the data vector y), and ^ is the parameter estimate. We approximate the integral with Monte Carlo which is e cient since z is 2D. This probability represents the correlation in the issues. A high value indicates that if a voter votes ‘yes’ (or ‘no’) to one issue, she is more likely to vote ‘yes’ (or ‘no’) to the other issue as well. We see that the voting patterns are clustered { the two groups V1-V7 and V11-V16 are positively correlated among themselves, while being negatively correlated across the two groups. Finally, Fig. 4.9 shows the probability of voting ‘yes’ to an issue given the party of the congressman. We see a clear partisan behavior for the two groups V1-V7 and V11 to V16, where whenever Republicans vote ‘yes’ the Democrats vote ‘no’ and vice versa. 874.7. Experiments and Results V1 V2 V3 V4 V5 V6 V7 V8 V9 V10 V11 V12 V13 V14 V15 V16 0 0.2 0.4 0.6 0.8 1 V1 V2 V3 V4 V5 V6 V7 V8 V9 V10 V11 V12 V13 V14 V15 V16 0 0.2 0.4 0.6 0.8 1 Republicans Democrats Pr obabili ty of V oting ` Ye s’ Votes Votes Figure 4.9: The probability of voting ‘yes’ to an issue given the party. Results for binary latent Gaussian graphical model (bLGGM) Next, we t the binary LGGM (bLGGM) and sparse binary LGGM (sbLGGM) models to the UCI LED data set (available in the UCI repository). The sparse LGGM model is same as LGGM but now has a sparse 1. This is achieved by assuming a sparse prior on this matrix (similar to the graphical lasso, see Friedman et al. [2008]). The EM algorithm remains almost the same, with a graphical lasso optimization in the M-step instead of a closed form update of . The derivations are straightforward and we do not give any details; interested readers should refer to the graphical lasso paper. The LED data set has 2000 data cases and 24 dimensions. The data is synthetically generated but is out of the LGM model class. It contains 7 highly correlated variables that decide the LED display, and 17 other variables that take random values independent of the display. In the bLGGM experiment, we use 80% of the data for training and 20% for testing. The rst plot in Fig. 4.10 shows the results for 10 training-test splits. As in the Voting data, Q20 outperforms both B and J on all splits. In the sbLGGM experiment, we purposely under-sample the training set using 10% of the data for training and 50% for testing. The second plot in Fig. 4.10 shows the results for 10 train-test splits. We plot the error of Q20 versus B and J for the optimal choice of the regularization parameter 884.7. Experiments and Results 0.86 0.9 0.86 0.9 Error with Q2 0 Error with B and J bLGGM on LED data 0.84 0.9 0.84 0.9 Error with Q2 0 Error with B and J sbLGGM on LED data 10−1 101 103 0.86 0.9 0.94 Erro r Regularization parameter λ sbLGGM on LED data B J Q20 Figure 4.10: Results for bLGGM on the LED dataset. The rst two plots, on the left, show the imputation error of the 20-piece quadratic bound relative to Bohning and Jaakkola for bLGGM and sbLGGM. Each point is a di erent train-test split and a point below the dashed line indicates that piecewise bound performs better than other bounds. The third plot on the right shows the imputation error versus the regularization parameter setting for sbLGGM. (for sparse prior) found using cross-validation. We again see that Q20 outperforms both B and J on all splits. The nal plot in Fig. 4.10 shows traces of the imputation error as a function of the regularization parameter setting for a single split. The optimal value of for each bound corresponds to precision matrices that are 82:6%, 83:7% and 80:4% sparse for B, J and Q20, respectively. Fig. 4.11 shows the posterior mean at the optimal value of , while Fig. 4.12 shows the posterior covariance and precision matrices. As expected, all the methods show signi cant mean and correlations for the rst 7 relevant variables, clearly showing that these variables are important for prediction. Note that B and J have signi cantly lower values for posterior mean and covariance than Q20. This behavior is similar to the results of the 5D synthetic data discussed earlier, and shows that B and J shrink the mean and covariance value signi cantly leading to poor performances. Comparison with expectation propagation In this section, we compare performance of expectation progression (EP) [Minka, 2001] with the variational approach using the piecewise bound. See Section 2.3 for details on EP. We consider tting binary GP classi cation on the Ionosphere dataset. The dataset has been investigated previously in Kuss and Rasmussen [2005]; Nickisch and Rasmussen [2008] and we repeat 894.7. Experiments and Results 0 10 20 0 1 2 Dimensions B 0 10 20 0 1 2 3 Dimensions J 0 10 20 0 10 20 Dimensions Q20 Figure 4.11: Posterior mean for the LED dataset at the optimal value of . their experiments. This datasets consists of 351 instances of radar measure- ments from the ionosphere and the task is to classify these measurements as good or bad. We use 200 instances for training and rest for testing. We con- sider a squared-exponential kernel for the covariance parameter, under which (i; j)’th entry of is de ned as follows ij = 2 exp[ 12 jjxi xj jj 2=s]. We set = 0. The set of parameters is = (log( ); log(s)). We compare the approximate posterior distribution in Fig. 4.13. We consider two parameter settings. Fig. 4.13(a) shows posterior mean and covariance for log(s) = 1; log( ) = 1. This parameter setting correspond to an easy inference problem, since the true posterior distribution for this setting is very close to a Gaussian distribution (for reasons explained in Kuss and Rasmussen [2005]). We plot elements of mean and covariance obtained using our approach vs the ones obtained by EP. We see that both approxi- mations give almost identical posterior distributions for this easy case. Next, we consider a parameter setting for which posterior distribution is skewed, making it a di cult case. We set log(s) = 1; log( ) = 4, results for which are shown in Fig. 4.13(b). We note that the two methods give di erent approximations for this parameter setting. EP matches the moments so it nds the mean and covariance which are very close to those of the true dis- tributions. The estimates obtained with the variational method shows the expected behavior which results from minimizing the Jensen’s lower bound [Bishop, 2006, Chapter 10]. The \zero-enforcing" property ensures that the mean is shifted away from zero and the variance is shrunk. The question is which approximation is better? We now show that for all purposes both approximations are equally good. We compare several quantities of interest. First, we compute the Jensen’s lower bound to the marginal likelihood obtained using both methods. Sec- 904.7. Experiments and Results Dimensions Dimension s B 10 20 10 20 −1 0 1 2 3 Dimensions Dimension s J 10 20 10 20 −2 0 2 4 6 Dimensions Dimension s Q20 10 20 10 20 −200 0 200 400 600 Dimensions Dimension s B 10 20 10 20 −1 0 1 2 Dimensions Dimension s J 10 20 10 20 −0.5 0 0.5 1 1.5 Dimensions Dimension s Q20 10 20 10 20 0 0.02 0.04 Figure 4.12: Top row shows the posterior covariance matrices for the LED dataset and bottom row shows the corresponding precision matrices, again at the optimal value of . ond, we compute the EP approximation to the marginal likelihood for both the methods; see Eq. 2.32 in Section 2.3. Computation of the above quan- tity for our approach requires computation of site functions, for which we run one step of EP given the posterior mean and covariance obtained using our approach. Finally, we compute predictions and compare cross entropy prediction error for both methods. We plot these quantities for various val- ues of log( ) and log(s). Fig. 4.14 shows that both approaches give almost identical results for all quantities. Hence, the posterior distribution obtained by both methods are equally good for all the tasks. We repeat this experiment on a larger USPS digit dataset. Similar to Kuss and Rasmussen [2005], we consider the binary version by considering 3’s vs 5’s. We use 767 data points for training and rest 763 for testing. The results shown in Fig. 4.15 show the same trend as the ionosphere dataset. The advantage of our approach is that, unlike EP, it does not su er from any numerical issues (for example, no negative variances) and is guaranteed to converge. The computational complexity of our approach is almost iden- tical to that of EP. For example, compare Algorithm 3 to the algorithm for EP given in Rasmussen and Williams [2006] (see Algorithm 3.5 in the book). Both our algorithm and EP run scalar updates, followed by a rank one update of posterior covariance V. An additional advantage of our ap- 914.7. Experiments and Results 0 0.4 0 0.4 EP PieceWis e Mean 0 0.05 0.1 0 0.05 0.1 EP PieceWis e Covariance Off−diagonal diagonal (a) = f 1; 1g −50 0 50 100 −50 0 50 100 EP PieceWis e Mean 0 500 1000 1500 0 500 1000 1500 EP PieceWis e Covariance Off−diagonal diagonal (b) = f 1; 4g Figure 4.13: Comparison of approximate posterior for two parameter set- tings, shown at the bottom of the plot with = flog(s); log( )g. We plot elements of the mean and covariance obtained with the variational approach vs those obtained with EP. proach is that it extends easily to models such as factor analysis, there too with guaranteed convergence. For this model class, EP usually leads to non-standard and usually non-monotonic optimization since the inference and learning steps do not optimize the same lower bound (as we discussed in Section 2.3.3). Finally, our approach easily extends to other data types such as categorical and mixed-data, as we show in next two chapters. 924.7. Experiments and Results log(s) log (σ ) Variational 0 2 0 2 70 100 130 160 log(s) log (σ ) EP 0 2 0 2 70 100 130 160 (a) Negative ELBO log(s) log (σ ) Variational 0 2 0 2 65 85 105 125 log(s) log (σ ) EP 0 2 0 2 65 85 105 125 (b) Negative EPapprox log(s) log (σ ) Variational 0 2 0 2 0.3 0.5 0.7 0.9 log(s) log (σ ) EP 0 2 0 2 0.3 0.5 0.7 0.9 (c) Prediction error Figure 4.14: EP vs variational on the ionosphere dataset. log(s) log (σ ) Variational 0 2 4 0 2 100 300 500 700 log(s) log (σ ) EP 0 2 4 0 2 100 300 500 700 (a) Negative ELBO log(s) log (σ ) Variational 0 2 4 0 2 100 200 300 400 log(s) log (σ ) EP 0 2 4 0 2 100 200 300 400 (b) Negative EPapprox log(s) log (σ ) Variational 0 2 4 0 2 0.1 0.3 0.5 0.7 0.9 log(s) log (σ ) EP 0 2 4 0 2 0.1 0.3 0.5 0.7 0.9 (c) Prediction error Figure 4.15: EP vs variational on the ‘USPS-3vs5’ dataset. 93Chapter 5 Variational Learning of Categorical LGMs In this chapter, we discuss variational learning for categorical LGMs. Sim- ilarly to the binary case, the variational learning is intractable due to non- conjugacy of the Gaussian prior to categorical data likelihoods, such as multinomial logit/probit. Existing methods for tractable variational learn- ing are inaccurate and slow. We make two contributions in this regard. Our rst contribution is the application of the Bohning bound for the multinomial logit likelihood. The Bohning bound leads to a fast variational learning algorithm, but can be inaccurate at times. We present a theoretical comparison of existing LVBs, discussing conditions under which they are reasonably accurate. Unfortu- nately, all of the existing LVBs for the multinomial logit likelihood can be inaccurate at times, and designing LVBs with error guarantees remains a di cult task. We take a di erent approach to solve this problem. We pro- pose a new likelihood, called stick breaking likelihood, for categorical LGMs. The main advantage of this likelihood is the availability of accurate LVBs with error guarantees, leading to an accurate variational learning. With application to real datasets, we show that the variational learning with the proposed likelihood is more accurate than variational learning with existing likelihoods. 5.1 Categorical LGM We start by de ning categorical LGM to model categorical data vectors yn. Each element ydn of yn takes values from a nite discrete set Sd = fC0; C1; C2; : : : ; CKdg, where Ck is the k’th category. For simplicity, we assume that Kd = K for all d. We use a dummy encoding for ydn, that is, we encode it as a binary vector ydn of length K + 1 where we set ykdn to 1 if ydn = Ck+1. Similarly to other LGMs, the latent variables follow the Gaussian distri- 945.2. Multinomial Logit Likelihood bution as shown in Eq. 5.1. The probability of each categorical observation ydn is parameterized in terms of the linear predictor dn = Wdzn + w0d of the latent variables zn as seen in Eqs. 5.2. The k’th element of dn is predictor for the k’th category. The matrix Wd is the factor loading matrix and the vector w0d is the o set vector, both taking real values. Given dn, the data vector is modeled using a likelihood p(ydnj dn), as shown in Eq. 5.3 We will discuss the exact form of the likelihood in the next section. p(znj ) = N (znj ; ) (5.1) dn = Wdzn + w0d (5.2) p(ynj n) = DY d=1 p(ydnj dn) (5.3) The parameter set is the set of parameters required to de ne f ; ;W;w0g where W and w0 are the matrix containing Wd and w0d as rows. 5.2 Multinomial Logit Likelihood We discussed the multinomial logit likelihood in Section 1.3.3. This likeli- hood can be expressed in terms of the log-sum-exp (LSE) function, lse( ) = log P j exp( j), as shown below, p(y = Ckj ) = e k PK j=0 e j = exp yT lse( ) (5.4) where y is the dummy encoding of observation y = Ck. To make the model identi able, sometimes we set an element of to 0, say 0 = 0; see Section 1.3.3 for a detailed discussion of this. The evidence lower bound to the marginal likelihood is intractable for the multinomial logit likelihood due to the LSE term. This can be seen below from the expression for the expectation of log-likelihood. Eq( je )[log p(yj )] = y T em Eq( je )[lse( )] (5.5) The expectation is with respect to the approximate Gaussian distribution, q( je ) = N ( j em; eV). To obtain tractable lower bounds, we nd an upper bound to the LSE term such that the expectation of the upper bound is tractable. We describe few LVBs obtained with this approach, before dis- cussing our contributions to the variational learning. Note that, all LVBs discussed are jointly concave with respect to e . 955.3. Existing LVBs for Multinomial Logit Likelihood 5.3 Existing LVBs for Multinomial Logit Likelihood In this section, we review existing LVBs for the multinomial logit likelihood. Unfortunately, none of the bounds are accurate all the time and, unlike the Bernoulli logit likelihood, it is di cult to design bounds with bounded er- ror. The main source of error in most of the bounds is the local nature of the approximation. Most of the bounds are derived using the delta approx- imation of the LSE function, which involves approximating the expectation using Taylor’s expansion at the mean. The LSE function is highly skewed function and being accurate at the mean does not ensure global tightness. Another problem with these bounds is that they do not depend on the o - diagonal elements of eV, and can be inaccurate when o -diagonal elements are signi cantly large, for example, when the latent variables are highly correlated. We will prove a theoretical result in Section 5.5 regarding this. The log bound The most popular bound is the log bound, proposed by Blei and La erty [2006], and is shown below, fL( ; e ) := yT em lse( em + ev=2) (5.6) with ev being the diagonal of eV. This bound can be derived using the zero- order delta method; see Appendix A.6 for derivation. The advantage of the log bound is that it is a very simple bound. The gradients of the log bound are shown below, gm = y t; gv = 12diag(t); t := e (fm+ev=2) lse(fm+ev=2) (5.7) Since it does not have local variational parameters and since the gradients take a very simple form, its implementation is easy. The tilted bound The tilted bound was recently proposed by Knowles and Minka [2011] and is shown below, fT ( ; e ;a) := yT em 12 KX k=0 a2kevj log KX k=0 eemk+(1 2ak)evk=2 (5.8) 965.3. Existing LVBs for Multinomial Logit Likelihood where ak 2 [0; 1]. Detailed derivation is given in Appendix A.7. This bound reduces to the log bound for ak = 0 and hence is a generalization of the log bound. Updates of a can be done using an iterated procedure, and hence computation overhead is not much higher than the log bound; see [Knowles and Minka, 2011] for details. Similar to the log bound, the tilted bound is also based on the delta approximation at the mean and may be only tight locally (see derivation in Appendix A.7). In addition, this bound also does not involve the o -diagonal elements of eV and may not perform well when those elements are signi cant. The bound, however, is shown to perform well by the authors when eV is diagonal. A variant of this bound which includes the o -diagonal elements of V can also be designed, although we are not aware of any work on this variant. See Appendix A.7 for the details of the variant. We leave comparison with this variant as future work. The product of sigmoid bound The product of sigmoid (POS) bound, proposed by Bouchard [2007], is given as follows, fS( ; e ; ) := yT em KX k=0 Eq( je k)[llp( )] (5.9) where 2 R. The POS bound can be derived using the following inequality, KY k=1 (1 + e k ) KX k=1 e k = e KX k=1 e k (5.10) Taking log on both sides and rearranging, we get the following upper bound on the LSE function: lse( ) + PK k=1 log(1 + e k ). We substitute this Eq. 5.5 to get the POS bound of Eq. 5.9. The advantage of this bound is that it is expressed in terms of the LLP function for which many bounds exist. Bouchard [2007] uses the Jaakkola bound [Jaakkola and Jordan, 1996] which can be inaccurate at times as we showed in Chapter 4. However, use of the Jaakkola bound leads to closed form updates in EM algorithm, which is useful. A more accurate version can be designed by using the piecewise bound for the LLP function, but will be slower since it requires gradient methods to be used. The LLP function asymptotically approaches the LSE function in the direction of a predictor, and hence the POS function is expected to be accurate in that direction. However, it is not accurate in general as reported by Knowles and Minka [2011]. 975.4. A New LVB: The Bohning Bound First-order delta method The Delta method is used to approximate moments of a function using the Taylor expansion [Casella and Berger, 2001]. The zeroth-order delta method can be used to derive the log bound as shown in Appendix A.6. In this section, we describe an approximation based on the rst-order delta method. A rst-order approximation to the expectation of a function f is obtained by taking expectation of a rst-order Taylor expansion around em, as shown below. Here, Hf is the Hessian of f . Eq( je )[f( )] Eq( je )[f( em) + ( em) Tgf ( em) + 1 2( em) THf (m)( em)] (5.11) = f( em) + 12Tr h Hf (m)eV i (5.12) We choose f to be the LSE function, apply the rst-order approximation to Eq( je )[lse( )], and substitute in Eq. 5.5 to the following approximation, fD( ; e ; ~ ) := yT em lse( em) 12Tr h Hlse( em)eV i (5.13) This approximation has been applied to some LGMs, such as discrete choice models Braun and McAuli e [2010] and correlated topic model by Ahmed and Xing [2007]. However, since this is not a lower bound, we loose mono- tonicity of the EM algorithm and diagnosing the convergence becomes di - cult. A more serious problem however is that the approximation is accurate only locally, just like the log bound. However, it is expected to be more ac- curate than the log bound, since it is based on the rst-order approximation. We will show this in section 5.5. 5.4 A New LVB: The Bohning Bound The Bohning bound, a quadratic bound discussed in Chapter 4 for Bernoulli logit likelihood, can be generalized to the multinomial logit likelihood. It is simple to de ne the Bohning bound for the case when one of the entry of is set to 0. This assumption can be easily relaxed, as described later in Section 5.4.1. For now, let us assume 0 = 0 and rede ne to be a vector of rest of the elements, i.e. = ( 1; 2; : : : ; K). We rede ne y and the Gaussian distribution q( je ) accordingly. Given this, the Bohning bound is 985.4. A New LVB: The Bohning Bound de ned as following, fB(y; e ; ) := yT em 12 em TA em + bT em c 1 2Tr AeV (5.14) A := 12 [IK 1K1 T K=(K + 1)] (5.15) b := A g (5.16) c := 1 2 TA gT + lse1( ) (5.17) g := exp[ lse1( )] (5.18) where IK is the identity matrix of size K, 1K is a K-length vector of ones, 2 RK is the local variational parameter vector, and lse1(x) := log[1 + PK k=1 exp(xk)]. For the binary case, this bound reduces to the bound discussed earlier in Chapter 4 for the Bernoulli logit likelihood. The Bohning bound for the multinomial logit likelihood shares all the properties of the Bohning bound for the Bernoulli logit likelihood. For example, just like its binary counterpart, this bound has a xed curvature parameter A which allows us to design a fast algorithm. Similar to the binary case, the Bohning bound is maximized when = em. Proof is exactly same as the binary case; see Section 4.4.2. Substituting this in the Bohning bound of Eq. 5.14, we can simplify the Bohning bound. We simply substitute the value of in b and c , and simplify to obtain the expression below. fB(y; e ; ) = y T em lse( em) 12Tr(A eV) (5.19) We now give a detailed derivation of the Bohning bound and then describe the learning algorithm. 5.4.1 Derivation We derive the Bohning bound using a Taylor series expansion of lse1( ) around a point 2 RK as shown in Eq. 5.20. Here, g and H are the gradient and Hessian respectively as de ned in Eq. 5.22 and 5.23, and the equality holds for some 2 RK due to Taylor’s theorem Rudin [2006]. An upper bound to lse1( ) is found by replacing the second derivative term by an upper bound. It can be shown that xTH x xTAx for all x and , where A := [IK 1K1TK=(K+ 1)]=2 (see Bohning [1992] for a proof). Using 995.4. A New LVB: The Bohning Bound this we get the upper bound shown in Eq. 5.21. lse1( ) = lse1( ) + ( )Tg + 1 2 ( )TH ( ) (5.20) lse1( ) + ( )Tg + 1 2 ( )TA( ) (5.21) g := exp[ lse1( )] (5.22) H := diag(g ) g g T (5.23) We substitute this in Eq. 5.5 and rearrange terms to get the Bohning bound shown in Eq. 5.14. The assumption that 0 = 0 can be relaxed easily by rede ning A to be [IK+1 1K+11TK+1=(K + 1)] and by doing Taylor expansion of lse( ) instead of lse1( ). However, the new A is a positive semi-de nite matrix and might give rise to numerical problems. Another way to relax the condition is to rewrite log of the multinomial logit likelihood as log p(y = Ckj ) = k log P k exp( k 0), such that the rst element in the summation is 0, and then apply Taylor’s expansion on lse1(x) to get a bound. 5.4.2 Variational Learning For a tractable lower bound, we need to bound Eq( je dn)[log p(ydnj )] for the (d; n)’th observation. The Bohning bound to this term is shown below, where b ;dn and c ;dn are functions of the local variational parameter dn and are de ned as in Eq. 5.16 and 5.17. fB(ydn; e dn; dn) := y T dn emdn 1 2 em T dnA emdn + b T ;dn emdn c ;dn 12Tr AeVdn (5.24) To compute gradients with respect to n and , we need gradients with respect to emdn and evdn (see Section 3.5.1), which are given below, gmdn = (ydn + b ;dn) A emdn ; G v dn = 1 2A (5.25) We now derive updates for n, , and dn. Update of variables parameter dn remains same as before, dn = emdn. For updates of n, , we substitute the expressions for g m dn and G v dn in the generalized gradient expressions given in Algorithm 1. We set the gradients to zero and simplify to get the updates below. Details are given in Appendix A.4. 1005.5. Error Analysis The E-step updates are shown below, V = 1 + WT AW 1 (5.26) mn = V WT (yn + bn Aw0) + 1 (5.27) with bn being the vector of b ;dn; 8d and A is a block diagonal matrix of size DK DK with each block equal to A. The M-step updates are as follows, W = " NX n=1 n A 1(yn + bn) w0 o mTn #" NX n=1 V + mnmTn # 1 (5.28) w0 = 1 N NX n=1 A 1(yn + bn) Wmn (5.29) along with updates of and which remains same as Eq. 3.37. Similar to the binary case, the Bohning bound leads to simple closed form updates with posterior covariance V being independent of the data. The updates above are exactly same as those of Gaussian LGMs, but now, with data vectors A 1(y + bn) and noise covariance matrix A 1. The lower bound for the (d; n)’th measurement is an unnormalized multivariate Gaussian such that p(ydnj dn) Z N (~ydnj dn;A 1) for some Z with ~ydn = A 1(ydn + b ;dn). The variational algorithm takes the same form as Algorithm 5. Here again, since V is same for all n, we only need to compute it once during the E-step, instead of computing it for all n separately. This simpli cation leads to a huge computational saving since computation of V involves inversion of a square matrix of size L, making complexity of this step O(L3 +DK2L2), which is independent of n. Computing mn requires a multiplication of two matrices of sizes L DK and DK L, plus N multiplications of a L DK matrix with a DK 1 vector for few iterations. This makes the total cost of the E-step to be O(L3 + DK2L2 + NDKLI), where I is the number of iterations taken for convergence in the E-step. The cost of M-step is same as the Gaussian LGM which is O(L3 +NL2 +NDKL). Also, the memory cost is same as well, which is O(L2 + Lmin(N;DK)). 5.5 Error Analysis In this section, we theoretically analyze the relative errors between di erent LVBs. Our goal here is to show that no single bound is accurate all the 1015.5. Error Analysis time. However, the analysis reveals that, in terms of accuracy, the bounds can be roughly ranked as the following sequence of increasing accuracy, Bohning, Log, Tilted, First-order Delta (5.30) By \roughly", we mean that most of the time the bound on the left is less accurate than the bound on the right. The trends in speed are almost reversed, i.e. the bound in the left leads to the fastest algorithm. We did not include the POS bound here because it is di cult to theoretically compare with other bound since the POS bound takes a very di erent form than other bounds. We start our analysis with the log and Bohning bound. The log bound is more accurate than the Bohning bound in general, but not always. The following theorem bounds the di erence between the two bounds (see the proof in Appendix A.8). Theorem 5.5.1. For all y; e and , the di erence between the log and Bohning bound, denoted by (y; e ; ) := fL(y; e ) fB(y; e ; ), is bounded as follows, 1 2 h Tr(AeV) evmax i (y; e ; ) 12 h Tr(AeV) evmin i (5.31) where evmax; evmin are the maximum and minimum diagonal elements of eV and A is the curvature matrix for the Bohning bound de ned in Eq. 5.15. The condition 5.31 can be used to theoretically compare the two bounds. When the lower bound in Eq. 5.31 is greater than 0, the log bound will be better than the Bohning bound. Similarly, when the upper bound is less than 0, then the Bohning bound is better. Note that the trace term Tr(AeV) is always greater than or equal to 0, since both A and eV are positive semi- de nite. So is bounded between evmax and evmin around a non-negative Tr(AeV). The interplay between the o -diagonal and the diagonal elements decides whether one bound is better than the other. We can construct examples where one bound will be better than the other. The trace term can be expanded as follows, Tr(AeV) = 12Tr I 11T K + 1 eV = 12 KX k=0 eVkk 12 KX i=0 KX j=0 eVij (K + 1) (5.32) This involves di erence between the sum of the diagonal and the sum of the full matrix weighted by 1=(K + 1). Consider a case where V is a diagonal 1025.5. Error Analysis matrix with each diagonal element equal to v. Then Tr(AeV)=2 = Kv=2, which is always greater than vmax = v, making the left hand size of inequality 5.31 greater than 0. Hence, for this case, the log bound will be more accurate than the Bohning bound. Now, consider a 3 3 matrix eV with all diagonal entries set to v, and all o -diagonal entries equal to zero, except eV12 and eV21 which we set to with 0 < < v. The new matrix eV is positive de nite. Now, Tr(AeV) = v =3 which is always less than vmin = v, making the right hand side negative. Hence, the Bohning bound will be better than the log bound for this case. Note that, in Eq. 5.32, the contribution of the o -diagonal elements decreases as K increases. So the size of the set of eV, for which the Bohning bound is better than the log bound, decreases as K increases. This theorem however brings out an important point that the log bound can be inaccurate for cases where the o -diagonal elements of V are signi cant. The same applies to all the other bounds. Hence, we can conclude that, most of the times, the Bohning is less accurate than the log bound. The tilted bound will always be more accurate than the log bound, since the log bound is a special case of the tilted bound with ak = 0; 8k. Comparison with the rst-order delta approximation is complicated since it is not a bound but an approximation. However, we can bound the extent to which the delta approximation will vary around each bound. For example, the delta approximation always has a higher value than the Bohning bound. This can be proved by looking at the di erence between the delta method and the Bohning bound, 12Tr[A Hlse( em) eV] 0, since A Hlse is a positive de nite matrix. This however does not prove that the delta method will be a better approximation since it is not a bound. Similarly, the di erence between the log bound and the rst-order delta approximation is bounded as follows, 1 2 h evmin Tr[Hlse( em)eV] i 12 h evmax Tr[Hlse( em)eV] i (5.33) Since the trace term Tr[Hlse( em)eV] is always positive, the di erence between the two bounds varies around a negative value. Hence, we can conclude that most of the times the rst-order delta approximation will take higher values than the log bound. This also proves that the delta approximation, despite being an approximation, is never going to be higher than the true log marginal likelihood by vmax=2. 1035.6. Stick Breaking Likelihood 5.6 Stick Breaking Likelihood Variational learning with the multinomial logit likelihood can be inaccurate due to error incurred in the LVBs. We propose an alternative generalization of the logit function, for which accurate LVBs can be designed. We refer to this as the stick breaking likelihood. We show that variational learning for our proposed likelihood can be more accurate than that of the multinomial logit likelihood. In the stick breaking parameterization, we use a logit function to model the probability of the rst category as ( 0) where (x) = 1=(1 + exp(x)). This is the rst piece of the stick. The length of the remainder of the stick is (1 ( 0)). We can model the probability of the second category as a fraction ( 1) of the remainder of the stick left after removing ( 0). We can continue in this way until we have de ned all the stick lengths up to K. The last category then receives the remaining stick length, as seen below. p(y = C0j ) = ( 0) p(y = Ckj ) = Y j k 1 (1 ( j)) ( k); 0 < k < K p(y = CK j ) = K 1Y j=1 (1 ( j)) (5.34) An example of this construction for 4 categories is shown in Figure 5.1. The probabilities (stick lengths) are all positive and sum to one; they thus de ne a valid probability distribution. We can also use a di erent function for (x) such as the probit function, but we use the logit function since it allows us to use e cient variational bounds. The stick-breaking parameterization can be written more compactly as shown in Eq. 5.35. p(y = Ckj ) = exp[ k X j k log(1 + e j )] (5.35) Models for multinomial probit/logit regression have wide coverage in the statistics and psychology literature. Both the multinomial-probit and multinomial-logit links are used extensively [Albert and Chib, 1993; Holmes and Held, 2006]. These link functions do not assume any ordering of cate- gories and it is understood that these parameterizations give similar perfor- mance and qualitative conclusions. On the other hand, learning with these link functions is di cult. Our stick-breaking construction simpli es the learning by constructing a categorical likelihood using simpler binary likelihood functions as shown 1045.6. Stick Breaking Likelihood σ(η1) σ(η2)(1-σ(η1)) σ(η3) (1-σ(η2))(1-σ(η1)) (1-σ(η3)) (1-σ(η2))(1-σ(η1)) p(y = 1|η) p(y = 2|η) p(y = 3|η) p(y = 4|η) (x) = 11+exGenerating stick-breaking probabilities Figure 5.1: Stick-breaking likelihood for 4 categories. We start with a stick of length 1, and break it at ( 1) to get the probability of rst category. We then split rest of the stick at ( 2) to get the probability of second category. We continue this until the last category, probability of which is equal to whatever is left of the stick. in Eq. 5.34. Each k can be interpreted as the log-ratio: k = log[p(y = Ckj )=p(y > Ckj )]. This implies that, given a particular ordering of cat- egories, each k de nes a decision boundary in the latent space z, that separates the k’th category from all categories j > k. If such a separation is di cult to attain given an ordering of categories, the stick-breaking likeli- hood may not give good predictions. In practice, such separability is easier to achieve in latent variable models such as Gaussian process and factor analysis. Our results on real-world datasets con rm this. An illustration is shown in Figure 5.2. This interpretation also relates the stick-breaking likelihood to the con- tinuation ratio model discussed in Section 1.3.4 for ordinal data. For ordinal data, the predictor is a scalar. The stick-breaking likelihood is simply a gen- eralization of the continuation ratio model to the categorical case. See Kim [2002] for a stick-breaking interpretation of the continuation ratio model. The stick-breaking parameterization also has important advantages over the multinomial-logit model in terms of variational approximations. As we saw in previous sections, the multinomial-logit parameterization requires bounding the lse( ) function. It is not known how to obtain tight bounds on 1055.6. Stick Breaking Likelihood ⌘k = wkz (a) ⌘k = wkz (b) ⌘k = wkf(z) (c) St ick -B re ak in g Fa ct or 1 Factor 2 1 4 2 3 (d) St ick -B re ak in g Fa ct or 1 Factor 2 1 4 2 3 (e) Figure 5.2: Illustrations showing decision boundaries. There are two fea- tures and 4 categories. In each gure, each point is a data example and its color (and marker) shows its category. The decision boundaries are shown with orange lines. The ordering of categories for stick breaking likelihood is indicated in blue boxes with numbers. Fig. (a) shows boundaries obtained with the multinomial logit/probit likelihood. Note that there is no ordering constraints imposed on the categories. Fig. (b) and (c) show boundaries for the stick breaking likelihood given a particular ordering of categories. Fig. (b) shows linear decision boundaries, while Fig. (c) shows non-linear boundaries. Fig. (d) and (e) shows the same for a di erent ordering of categories. This illustration shows that the stick breaking likelihood with linear features is unable to separate the data as well as the multinomial like- lihood, however a good separation can be obtained with non-linear features (quadratic in this illustration). this function with more than two categories, and all the bounds discussed before can be inaccurate. As we can see in Eq. 5.35, the stick-breaking 1065.7. Results parameterization only depends on functions of the LLP functions log(1+e j ). In stark contrast to the multinomial-logit case, accurate piecewise-linear and quadratic bounds are available for the LLP function; see Section 4.5. In addition, the quadratic bounds discussed in Chapter 4 can also be applied to the stick-breaking likelihood to obtain less accurate but faster algorithms. For example, the Bohning bound when applied will lead to a fast variational learning algorithm. We consider only piecewise bounds since our goal is to demonstrate that more accurate variational lower bounds lead to better learning algorithms. 5.6.1 Variational Learning Using Piecewise Bounds The expectation of the log-likelihood for stick breaking parameterization is shown in Eq. 5.36. Here, q( je k) = N ( jemk; evk) is the marginal Gaussian distribution of k’th predictor. The intractability arises due to the LLP function, and we substitute piecewise linear/quadratic bounds, described in Section 4.5, to get a tractable lower bound shown in Eq. 5.37. Eq( je )[log p(yj )] = y T em X j k Eq( je k)[log(1 + e )] (5.36) yT em X j k RX r=1 f r(emk; evk; ) (5.37) As discussed before, an important property of the piecewise bound is that its maximum error is bounded and can be driven to zero by increasing the number of pieces. This means that the evidence lower bound can be made arbitrarily tight by increasing the number of pieces, leading to an accurate estimation. Similar to the binary case, we can optimize the lower bound with a gradient based approach. Computation of the gradients gmdn and G v dn is O(DKNR). Compute the sum over d in the E and M-steps costsO(NDKL2). Inversion in E-step costs O(NL3). The total computational complexity of one EM step therefore is O(DKNR+ (DKL2 + L3)N). 5.7 Results In this section, we compare performance on many datasets and models. We rst compare the performance of the variational learning on synthetic data, 1075.7. Results demonstrating that a more accurate LVB leads to a better variational algo- rithm. We then compare performance of variational learning to other exist- ing methods, such as MCMC and variational Bayes, on real world datasets. Synthetic data experiments In this section, we compare performances of variational methods in mod- eling discrete distributions. Throughout this section, we use plogit(yj ) to refer to the exact probability of a data vector y under the multinomial logit LGM with parameters . Similarly, we use pstick(yj ) to refer to the ex- act probability under the stick breaking LGM. These exact probabilities remain intractable, but for small dimensions we can compute them to a reasonable accuracy using a Monte Carlo approximation to the integral, p(yj ) = R p(yjz; )N (zj ; )dz. Our goal is to obtain estimates ^ and compare plogit(yj ^) and pstick(yj ^) to the true discrete distribution. We generate data from a 2D categorical latent Gaussian graphical model (cLGGM). We assume that both dimensions have K + 1 categories. We set the predictor for the rst category to 0, and use K latent variables to predict rest of the K categories. De ne, zn = (z11n; z21n; : : : ; zK1n; z12n; z22n; : : : ; zK2n) as the vector containing latent variables for both dimensions. Since this is an LGGM model, we set W to identity and w0 to 0. We set the true mean parameter = 0. We de ne the true covariance parameter for zn as follows, ij = 20 var(X:;i) + 1 if i = j 20 covar(X:;i; X:;j) if i 6= j (5.38) where X = [IKIK ], var(x) is the variance of vector x, covar(x;y) is the covariance between x and y. This choice of forces both dimensions to take the same category, resulting in high correlation between dimensions. An example of for K = 3 is shown in Fig. 5.3(a). Fig. 5.3(b) shows the graphical model for this cLGGM, where we show positive correlations between the latent variables with solid lines and negative correlations with dashed lines. We sample 106 data cases from the multinomial logit model, and esti- mate parameters ^ for both the multinomial logit and stick breaking LGMs. For the multinomial logit model, we use two versions of variational EM al- gorithms based on the Bohning bound and the log bound, respectively. For the stick model, we use our proposed variational EM algorithm. We refer to these three methods as ‘logit-Bohning’, ‘logit-Log’, and ‘stick-PW’ re- spectively. Note that since the data is generated from a multinomial logit 1085.7. Results 1 2 3 4 5 6 1 2 3 4 5 6 −3 0 3 6 (a) z 1 2n z 2 2n z 3 2n n = 1: N y 1 n z 2 1n z 1 1n y 2 n z 3 1n (b) Figure 5.3: A 2D categorical LGGM with K = 3. Fig. (a) shows the covariance matrix of the latent variables. Note that rst 3 latent variables are for the rst dimension, and the last 3 are for the second dimension. Fig. (b) shows the graphical model for the model. We show positive correlations between the latent variables with solid lines and negative correlations with dashed lines. model, there is a modeling error for the stick breaking model in addition to the approximation error in learning. We will see below that, despite this error, the stick breaking likelihood models the data much better than other methods. We rst compare results for K = 3 in Fig. 5.4 which shows the true plogit(yj ) as well as plogit(yj ^) for logit-Log and logit-Bohning, and pstick(yj ^) for stick-PW. Note that the number of possible discrete data-vector is 2K+1 = 16 and the gure shows the probabilities of these 16 data vectors. We see that stick-PW obtains a very close probability distribution to the true distri- bution, while other methods do not. Figure 5.5 shows results for 4; 5; 6; 7; 8 categories. Here we plot KL-divergence between the true distribution and the estimated distributions for each method. We see that our proposed method consistently gives very low KL divergence values (the values for other methods are decreasing because the entropy of the true distribution decreases since we have set the multiplying constant in to 20 for all categories). Multi-class Gaussian process classi cation In this section, our goal is to compare the marginal likelihood approxima- tion and its suitability for parameter estimation. We consider a multi-class Gaussian process classi cation (mGPC) model. Since there are only 2 hyper- 1095.7. Results 0 4 8 12 16 0 0.1 0.2 Bit Patterns Probabilit y True Distribution 0 4 8 12 16 0 0.1 0.2 Bit Patterns Probabilit y Stick−PW 0 4 8 12 16 0 0.1 0.2 Bit Patterns Probabilit y Logit−Log 0 4 8 12 16 0 0.1 0.2 Bit Patterns Probabilit y Logit−Bohning Figure 5.4: Comparison of the true probability distribution to the estimated distributions on synthetic data with 4 categories parameters, we can compare marginal likelihood approximations for many hyper-parameter settings. To get the ‘true’ value of the marginal likelihood, we use hybrid Monte Carlo (HMC) sampling along with annealed importance sampling (AIS). We apply this to the multinomial logit likelihood and refer to the truth as ‘logit- HMC’. We compare to the multinomial probit model of Girolami and Rogers [2006], which uses variational-Bayesian inference. For this method, we use the MATLAB code provided by the authors. We refer to this as the ‘probit- VB’ approach. We also compare to multinomial-logit models learned using a variational EM algorithm based on the log bound and the Bohning bound. We refer to these methods as the ‘logit-Log’ and ‘logit-Bohning’ respectively. Finally, we call our proposed method with stick breaking likelihood as ‘stick- PW’. We apply the mGPC model to the forensic glass data set (available from the UCI repository) which has D = 214 data examples, K = 6 cate- gories, and features of length 8. We use 80% of the dataset for training and the rest for testing. We set = 0 and use a squared-exponential kernel, for which the (i; j)’th entry of is de ned as: ij = 2 exp[ 12 jjxi xj jj2=s]. To compare the marginal likelihood, we x which consists of 1105.7. Results 1 2 3 4 5 0 0.05 0.1 0.15 0.2 0.25 0.3 Number of Categories KL divergenc e KL div between true and estimated distribution Stick−PW Logit−Log Logit−Bohning Figure 5.5: KL divergence between the true and estimated distributions for di erent categories. and s and compute an approximation to the marginal likelihood us- ing methods mentioned earlier. We compute the prediction error de ned as log2 ~p(ytestj ;ytrain;xtrain;xtest), where (ytrain;xtrain) and (ytest;xtest) are training and testing data, respectively. Here, ~p(ytestj ) is the marginal predictive distribution approximated using the Monte Carlo method. Figure 5.6 shows the contour plots for all the methods over a range of settings of hyperparameters. In each gure, top plot shows the negative log marginal likelihood approximation and the bottom plot shows the predic- tion error. The star indicates the hyperparameter value at the minimum of the negative log marginal likelihood. The Figure 5.6(a) shows the ‘true’ marginal likelihood obtained by logit-HMC. This plot shows the expected behavior of the true marginal likelihood. As we increase , we move from Gaussian-like posteriors to a posterior that is highly non-Gaussian. The posterior in the high region is e ectively independent of and thus we see contours of marginal likelihood that remain constant (this has also been noted by Nickisch and Rasmussen [2008]). Importantly for model selec- tion, there is a correspondence between the minimum value of the marginal 1115.7. Results likelihood (or evidence) and the region of minimum prediction error. Thus optimizing the hyperparameters and performing model selection by mini- mizing the marginal likelihood gives optimal prediction. In our experience, tuning HMC parameters is a tedious task for this model as these parameters depend on . In addition, convergence is di cult to assess. Both HMC and AIS samplers need to be run for many iterations to get reasonable estimates. Figure 5.6(b) and 5.6(c) show the negative of the log-marginal likelihood, along with the predictions for logit-Bohning and logit-Log, respectively. As we increase , the posterior becomes highly non-Gaussian and the variational bounds strongly underestimate the marginal likelihood in these regions (up- per left corner of plots). The variational approximation also reduces the cor- respondence between the marginal likelihood and the test prediction, thus the minimum of the negative of the log-marginal likelihood is not useful in nding regions of low prediction error, resulting in suboptimal perfor- mance. The log bound, being a tighter bound than the Bohning bound, provides improved marginal likelihood estimates as expected, and a better correspondence between the prediction error and the marginal likelihood. Figure 5.6(d) is the behavior of the multinomial probit model and con rms the behavioral similarity of the logit and probit likelihoods. The behavior of the stick likelihood is shown in Figure 5.6(e). The piece- wise bound is highly e ective for this model and the model provides good estimates even in the highly non-Gaussian posterior regions. An impor- tant appeal of this model is that the correspondence between the marginal likelihood and the prediction is better maintained than the logit or probit models, and thus parameters obtained by optimizing the marginal likelihood will result in good predictive performance. We also experimented with di erent category orderings for this data to analyze the bias introduced by the ordering constraint. Although there are some orderings that lead to lower error than what we report here, the mag- nitude of the variance of this error is quite low. Hence, the stick likelihood still performs better than other methods. In general, we recommend a little experimentation with di erent ordering to nd out if the data is sensitive to the ordering constraint. Performance of all methods at the best parameter setting is summa- rized in Table 5.1 showing the best parameter values, approximation to the negative marginal log-likelihood, and prediction error. 1125.7. Results log(s) log (σ ) NegLogLik 0 2 4 0 2 4 200 230 260 290 log(s) log (σ ) PredError 0 2 4 0 2 4 0.9 1.1 1.3 1.5 1.7 1.9 (a) Logit-HMC log(s) log (σ ) NegLogLik 0 2 4 0 2 4 200 230 260 290 log(s) log (σ ) PredError 0 2 4 0 2 4 0.9 1.1 1.3 1.5 1.7 1.9 (b) Logit-Bohning log(s) log (σ ) NegLogLik 0 2 4 0 2 4 200 230 260 290 log(s) log (σ ) PredError 0 2 4 0 2 4 0.9 1.1 1.3 1.5 1.7 1.9 (c) Logit-Log log(s) log (σ ) NegLogLik 0 2 4 0 2 4 200 230 260 290 log(s) log (σ ) PredError 0 2 4 0 2 4 0.9 1.1 1.3 1.5 1.7 1.9 (d) Probit-VB log(s) log (σ ) NegLogLik 0 2 4 0 2 4 200 230 260 290 log(s) log (σ ) PredError 0 2 4 0 2 4 0.9 1.1 1.3 1.5 1.7 1.9 (e) Stick-PW Figure 5.6: Comparison of methods for multi-class GP classi cation on the Glass dataset using (a) Multi-HMC (b) Multi-Log (c) Multi-Bohning (d) Probit-VB (e) Stick-PW. For each method, the top plot shows negative of the log marginal likelihood approximations and the bottom plot shows prediction errors. Multi-HMC can be considered as the ground truth, so each method is compared against Figure (a). 1135.7. Results Method s negLogLik predError Logit HMC 1 2.5 198.63 0.92 Logit-Boh 1 0.5 239.28 1.31 Logit-log 1 1 208.26 1.13 Probit-VB 0.5 0 203.59 1.23 Stick-PW 0.5 2 194.16 1.07 Table 5.1: Performance at best parameter setting (a star in Figure 5.6) . 102 103 104 1.35 1.4 1.45 1.5 Erro r Time (sec) Error vs Time on Tic−Tac−Toe data Logit−Log Stick−PW Figure 5.7: Imputation error vs time for cLGGM model on tic-tac-toe data. Categorical latent Gaussian graphical model We compare the logit-Log method to our proposed stick-PW method on the latent Gaussian graphical model. We use two datasets. The rst dataset is the tic-tac-toe data set, which consists of 958 data examples with 10 dimensions each. All dimensions have 3 categories except the last one which is binary (thus the sum of categories used in the cLGGM is 29). The second data set is the ASES data set consists of survey data from respondents in di erent countries. We select the categorical responses for one country (UK), resulting in 17 response elds from 913 people; 9 response elds have 4 categories and the remainder have 3 categories. For both datasets, we use 80% of the data for training and rest for testing. We randomly introduce missing values in the test data, and compare cross entropy errors for these missing values. 1145.7. Results Figure 5.7 shows the error versus time for one data split of the tic-tac- toe data. The plot shows that the stick-PW is a better method to use, since it gives much lower error when the two methods are run for the same amount of time. Figure 5.8(a) compares the error of the log bound and the piecewise bound for all 20 data splits used. For all splits, the points lie below the diagonal line, indicating that the piecewise bound has better performance. We show a similar plot for the ASES data set in gure 5.8(b), which more markedly shows the improvement in prediction when using the piecewise bound over the log bound. 1.2 1.4 1.2 1.4 Tic−Tac−Toe Error with Stick−P W Error with Logit−Log (a) 1 1.2 1.4 1 1.2 1.4 ASES−UK Error with Stick−P W Error with Logit−Log (b) Figure 5.8: Imputation errors for Tic-tac-toe and ASES-UK datasets. Each point is a di erent train-test split and a point below the dashed line indicates that Stick-PW performs better than Multi-Log. 115Chapter 6 Extensions and Future Work In this chapter, we present extensions of our approach and discuss future work. We extend our approach to model ordinal data and to model data vectors containing mixed-type of variables. We brie y discuss modi cation of the variational algorithm when data vectors have missing entries. We discuss possible future directions to make the variational approach more generally applicable and computationally e cient. 6.1 Variational Learning for Ordinal Data In Section 1.3.4, we discussed a variety of likelihoods for ordinal data. We now discuss application of our variational approach to some of those likeli- hoods. We start with the cumulative logit model, which de nes the cumulative probabilities of an observation y taking a value less than k as P(y kj ) = ( k ), where is the predictor, k are real thresholds such 1 = 0 < 1 < : : : < K = 1, is the sigmoid function (x) := 1=(1 + exp(x)), and k is a category in the set f0; 1; : : : ;Kg. Using this, the probability of y = k can be expressed as shown below, P(y = kj ) = ( k ) ( k 1 ) (6.1) = 1 1 + e ( k ) 1 1 + e ( k 1 ) (6.2) = e e k 1 e k 1 + e ( k ) 1 + e ( k 1 ) (6.3) Taking log, the log-likelihood can be written in terms of the LLP function, log p(y = kj ) = llp( k) llp( k 1) log(e k 1 e k) (6.4) Recall that llp(x) = log(1 + exp(x)). For variational learning, we need to be able to compute a lower bound to expectation of the log-likelihood with respect to the Gaussian distribution 1166.2. Variational Learning for Mixed Data q( je ) = N ( jem; ev). For cumulative logit likelihood, this term takes the following form, Eq( je )[log p(y = kj )] = em Eq( je )[llp( k)] Eq( je )[llp( k 1)] log(e k 1 e k) (6.5) We can see that this term is intractable due to the expectation of the LLP function in second and third terms, respectively. For a tractable lower bound, we can use the piecewise linear/quadratic upper bounds to the LLP function. The parameters = f 1; 2; : : : ; K 1g can be estimated easily by taking derivatives of this lower bound. The ordering constraint over can be handled by reparameterizing them as k 1 = Pk l=2 exp(tl); 1 < k < K with tk 2 R, and estimating tk instead. Next, we consider the continuation ratio model. One way to de ne a continuation ratio model is to de ne probabilities as p(y = kj ) := 1=(1 + exp( k )). We can check that, under this de nition, the ratio P(y = kj )=P(y > kj ) is equal to k , making it a continuation ratio model. The log-likelihood is simply the negative of the LLP function, log p(y = kj ) = log(1 + exp( k )). Here again, the tractable variational lower bound can be done using the piecewise bounds. Finally, consider the stereotype regression model. The likelihood and its log are shown below, p(y = kj ) = exp( k k ) PK j=0 exp( j j ) (6.6) log p(y = kj ) = k k lse( ) (6.7) where and are the vectors of k and k respectively. For tractable variational learning, we can use upper bounds on the LSE function discussed in Chapter 5. 6.2 Variational Learning for Mixed Data Many real worlds datasets contain observations of mixed types. For exam- ple, survey datasets in social science contain continuous (e.g. respondent’s weight, age and salary), binary (e.g. respondent’s gender), categorical (e.g. respondent’s country or city), and ordinal (e.g. how strongly does a respon- dent agrees with a government policy). An analysis of such dataset involves learning correlations between these variables. For example, we might be interested in assessing the e ect of age and salary of a respondent to his/her 1176.2. Variational Learning for Mixed Data views on government policy. A factor analysis (FA) model is usually used to jointly learn such correlations Khan et al. [2010]. Our proposed variational framework can easily handle the datasets con- taining mixed type of variables. The ELBO of Eq. 3.8 in Section 3.1 es- sentially remains the same for the mixed data vectors, except that the sum- mation over d now consists of mixed type of log-likelihoods. Hence, for a tractable lower bound, we employ many types of LVBs, instead of using only one type as before. See Khan et al. [2010] for a detailed derivation. We now present an example of mixed data FA. Our goal in this example is to illustrate the use of mixed-data FA. We compare with two other mod- els which avoid a proper modeling of mixed data. First approach is to t Gaussian FA using only continuous variables and ignoring all the discrete variables. We call this approach ‘GaussFA-1’. Second approach is to t Gaussian FA, but now also using the discrete variables recoded as contin- uous variables. For recoding, we rst encode a discrete variable in dummy encoding, e.g. a 3 category variable is recoded as (1; 0; 0) for category 1, (0; 1; 0) for category 2, and (0; 0; 1) for category 3. Then, we transform each binary element of the dummy encoding to f 1; 1g, e.g. (1; 0; 0) becomes (1; 1; 1). We call this approach ‘GaussFA-2’. Note that there is no learn- ing error in these models, since we can use the exact EM algorithm. For our mixed-data FA model, we use Gaussian likelihoods for continuous variables, and multinomial logit likelihoods for discrete variables. We t the model using the variational EM algorithm based on the Bohning bound. We t FA models to the Auto dataset which contains data about 392 cars. Each data vector consists of 5 continuous and 3 discrete variables with 3,5, and 13 categories, respectively. The 5 continuous variables are the following: ‘miles-per-gallon’, ‘displacement’, ‘horsepower’, ‘weight’, and ‘acceleration’ The 3 discrete variables are the following: ‘number-of-cylinders’, ‘model- year’, and ‘country-of-origin’. For all the three FA models, we use only two latent factors. Figure 6.2 shows the results. We plot the posterior means of latent factors for all the data examples; each data example here is a car. The posterior variance is quite small (in the range of 0.05-0.8), so we do not include it in the plot. To make the interpretation easy, we color code each car depending on the country it belongs to (‘country-of-origin’ is one of the discrete variable). We note that each method shows some clustering between the Ameri- can cars and the non-American ones. Even GaussFA-1 shows some separa- tion, which means that the continuous variables are informative about the clustering. However, inclusion of additional recoded discrete variables in GaussFA-2 does not improve the clustering. MixedDataFA, being a prin- 1186.3. Variational Learning with Missing Data −2 0 2 −3 −2 −1 0 1 2 3 GaussianFA−1 Factor 1 Factor 2 −6 −4 −2 −6 −5 −4 −3 −2 GaussianFA−2 Factor 1 Factor 2 US Europe Japan 5.5 6 6.5 −4 −3 −2 −1 0 1 MixedDataFA Factor 1 Factor 2 Figure 6.1: Visualization of a 2 factor FA model learned using the Auto data. We plot the posterior means of latent factors for all cars. For easy interpretation, we color code each car depending on its country of origin. cipled approach for combining the discrete and continuous variables, shows very \clean" clustering between the American and non-American cars. 6.3 Variational Learning with Missing Data Our variational approach can be easily modi ed to handle missing entries. Denote the set of observed dimensions in n’th data vector by On, and the set of data vectors with d’th dim observed by Od. The lower bound of Eq. 3.21 is modi ed to contain only the observed dimensions in summation over d, as shown below, Ln( ; n; n) := 1 2 log jVn 1j tr(Vn 1) (mn )T 1(mn ) +L] + X d2On f(ydn; e dn; dn) (6.8) The gradients in Algorithm 1 are also modi ed accordingly. All summations over d are changed to d 2 On and all summations over n are changed to n 2 Od. Using this, the modi cation of variational algorithms for particular bounds is straightforward. 1196.4. Future Work 6.4 Future Work As we discussed earlier, there are two major challenges with the variational learning in LGMs. First, the intractability of ELBO, and second, its compu- tational ine ciency. In this thesis, we discussed solutions for both aspects. We now discuss possible future directions for making variational learning more generally applicable and computationally e cient. 6.4.1 Designing Generic LVBs The accuracy of variational learning depends heavily on the accuracy of the local variational bounds to Eq( je )[log p(yj )]. In this thesis, we derived ac- curate LVBs for several likelihoods. It is not clear how to generalize such design procedures for general likelihoods. Design of clever quadrature tech- niques, where we compute expectations by exploring high density regions of the Gaussian distribution, seems plausible. However, this might be limited by the dimensionality of the Gaussian distribution. A recent approach by Chai [2012] for multinomial logit likelihood is promising, and a generaliza- tion of this approach will be extremely useful. Another recent e ort is made by Paisley et al. [2012], where stochastic approximation to the expectation term is made. The usual problem in such approaches is the di culty in as- sessment of the approximation error. If an estimate of the error is available, it will help us design strategies to increase the accuracy as the algorithm progresses, for example, by increasing the number of samples. This problem is similar to the one discussed in Section 2.2 for stochastic EM algorithms. Therefore, it is important to realize that not only we require a good ap- proximation, we must also be able to asses or bound the error made in the approximation. We showed in this thesis that it is possible to have such error guarantees sometimes. A generalization of our approach, although di cult, will de nitely be useful. 6.4.2 Generalization to Other Likelihoods There are many other interesting likelihoods for which the Eq( je )[log p(yj )] term is not available in closed form, e.g. the mixture of multinomials in correlated topic model. Extensions to these likelihoods will be extremely useful. Another issue is the concavity of Eq( je )[log p(yj )] with respect (em; ev). Exact conditions under which such concavity holds are not known. Recently, Challis and Barber [2011] proved that the expectation term is concave with 1206.4. Future Work respect to (em; p ev), if log p(yj ) is concave with respect to . Extending our methods to work with concavity with respect to p ev will generalize our results to log-concave likleihoods. Note that concavity of the expectation term, although useful, is not always necessary to design e cient algorithms. In fact, if this term is uni- modal with respect to (em; ev) and if we can nd a concave lower bound which is tight at one point, we can still design e cient concave algorithms using a methodology similar to the majorization-minorization algorithms [Hunter and Lange, 2004]. Future work in this direction will help generalize the variational approach. 6.4.3 Approximate Gradient Methods We showed in Section 3.4 that the variational inference involves optimiza- tion of a concave function. This allows us to use the theory of approximate gradient algorithms to reduce the computation. It is well-known that ap- proximate gradient methods can lead to linear convergence rates in case of concave functions; see Friedlander and Schmidt [2011] for example. These methods employ an approximation of the gradient, which is cheaper to com- pute. To be speci c, given a concave function f(x), we compute an approx- imation gk := 5f(xk) + ek in the k’th iteration. A line search algorithm is guaranteed to convergence at a \good" rate using a sequence Bk which bounds the norm of the error jjekjj2 Bk for every iteration k. See Fried- lander and Schmidt [2011] on details on designing Bk. Below, we discuss a computationally cheap method of building gradient approximations and determining the magnitude of the error. We consider the inference algorithm discussed in Section 3.6 for the special LGMs such as GP and LGGM. Recall, from Eq. 3.48, that the gradient of ELBO, denoted here by Gv, is given as follows, Gv = 12 V 1 1 + diag(gv) (6.9) The main computation bottleneck is the computation of V 1, which is O(D3). We propose to compute an approximation of the gradient by replacing V 1 with an estimate of it. We do so by subsampling the data, i.e. we only consider a subset S f1; 2; : : : ; Dg of data examples and de ne a new ELBO, which is a variant of the ELBO of Eq. 3.46 (we only keep the terms involving V for presentation clarity). 1 2 log jV 1j tr(V 1) + X d2S f(yd; d; d) (6.10) 1216.4. Future Work We see that the only di erence between the original ELBO and the new one is in the summation over d. The new ELBO includes only the observations in S. Our plan is to optimize the above ELBO to get an estimate of the inverse. First, we show that optimizing the new ELBO is much cheaper than optimizing the original ELBO. Let us consider a simple case where we sub- sample only rst two observations, i.e. S = f1; 2g. The gradient of the new objective function can be written as following. GvS = 1 2 V 1 1 + 0 B B B B B @ gv1 0 0 : : : 0 0 gv2 0 : : : 0 0 0 0 : : : 0 ... ... ... . . . ... 0 0 0 : : : 0 1 C C C C C A (6.11) A great insight is that, at the solution, only the rst two diagonal elements of V 1 need to be computed since other elements are equal to 1. There- fore, the solution can be obtained using our fast inference algorithm, the complexity of which will be O(jSj3) where jSj is cardinality of S. Next, we would like to estimate the error in our gradient approximation. This is easy. We take the di erence between Gv and GvS and take the trace norm to nd the following expression for the error. Tr(Gv GvS) = X d62S gvi (6.12) The error depends on all the data examples that we left out. We can easily build an estimate of the error, for example, using bootstrap. This is e cient since gvi can be computed cheaply. Given a sequence of Bk’s, we can easily design an approximate gradient method such that the error is bounded by Bk’s at all k. 6.4.4 Large-scale Matrix Factorization In the previous section, we introduced sparsity in the data by subsampling. We showed that sparse data allows us to design fast inference algorithms. There are practical applications where the data is inherently sparse. Matrix factorization for movie recommendation is one such application [Guo and Schuurmans, 2008; Salakhutdinov and Mnih, 2008a]. In movie recommen- dation, given movie ratings from di erent users, our goal is to predict ratings for new movies. Here, data is sparse since not all users rate all the movies. 1226.4. Future Work LGMs, such as factor analysis and PCA, have been applied to this prob- lem and have been shown to perform well. A proper Bayesian analysis usually is di cult since it is computationally intensive for large-scale data available for movie prediction. For example, Net ix dataset has more than 400,000 user ratings of more than 17,000 movies, leading to a slow Bayesian learning [Salakhutdinov and Mnih, 2008a]. An additional issue is that the discrete ratings are usually recoded as continuous variables and a Gaus- sian likelihood is used. This is necessary since the factor models with dis- crete likelihood do not scale well to large data. For data with N observa- tions, D-dimensional features and L latent factors, the computational cost is O(NL3 +NDL2) and the memory cost is O(NL2). In this section, we present an algorithm for discrete-data matrix factor- ization with computation cost of 2D2+O( P nD 3 n) per iteration, where Dn is the number of observed rating for n’th user. We saw in the previous section that, for sparse data, inference can be carried out e ciently for LGGMs. We now present an e cient EM algorithm for parameter learning. Our pre- liminary analysis reveals that LGGM can potentially scale much better than its low dimensional counterparts such as PCA. Let us rst de ne some notation. We denote the number of observed variables in n’th data vector by Dn, and assume that Dn << D. Let aO refer to the part of a that is indexed by set O, OO refer to the subblock of formed by taking rows and columns indexed by O, :O refer to the subblock of formed by taking all rows but only columns indexed by O, Let [aO] be a vector of length D such that entries in O are equal to aO with rest of the elements are zero. Similarly, [AOO] is a matrix of size D D formed by zero padding the smaller matrix AOO. For simplicity, we assume that = 0 and we need to estimate only . In the E-step, we compute the posterior mean mn and covariance Vn. Similar to previous section (see Eq. 6.11), xed point updates of mn and Vn can be rewritten as follows, 1(mn ) + [gmnO] = 0 (6.13) 1 2 V 1 1 + diag([gvnO]) = 0 (6.14) Here, gmnO and g v nO are gradients of LVBs with respect to mn and diag(Vn) respectively, but only for observed dimensions. These are then zero padded to match the dimensions to the fully observed case. For these xed points, the cost can be reduced to O(D3n) as explained in the previous section. 1236.4. Future Work For M-step, the update for is given as shown below. = NX n=1 Vn + mnmTn (6.15) There are two issues with this update. First, we have to explicitly form the matrix Vn which is a D D matrix. Second, computation of the product and sum is of the order O(ND2) which can be huge for large N and D. We now show that we can avoid these expensive steps and reduce the computation cost to O( P nD 2 n). From the xed-point equation of Vn in Eq. 6.14, we can see that the solution Vn will take the form shown below and then simpli ed further in terms of a smaller matrix Bn := OO + diag(hnO) of size Dn Dn. Vn = 1 2diag([hnO]) 1 (6.16) = :O ( OO 2diag(hnO)) 1 O: (6.17) = [Bn] 1 (6.18) A similar expression for mn can also be obtained: mn = + :OgnO. We substitute these in update of in Eq. 6.15, to get the following simpli ca- tion, = NX n=1 (Vn + mnmTn ) = NX n=1 [B 1n ] (6.19) The advantage of this form is that we only have to compute gnO and B 1 n for each n and never have to form the matrix Vn completely. We also have to do only two multiplications of D D once per EM step, instead of for every n. The complexity of M-step therefore reduces to O( P nD 2 n) additions, plus 2 D2 multiplications. This is a huge reduction from O(ND2) multiplications. The total computation cost of the algorithm is 2D2 +O( P nD 3 n). One problem with this approach might be the number of parameters in the models. In the factor analysis model, the number of parameters is D L where L is the latent dimension and much smaller than D. The LGGM the number of parameters is D2, much larger than the factor model. Similar ideas have been explored by Yu et al. [2009] who consider the case of Gaussian LGGMs, and our approach generalizes their ideas to discrete- data LGMs, but in the context of variational learning. Yu et al. [2009] show a signi cant improvements in speed and accuracy over existing methods, but completely ignore the issue of large number of parameters. Perhaps it 1246.4. Future Work is not an issue when N is much larger than D and there is enough data to be able to estimate D2 number of parameters. Nevertheless, some over t- ting is expected when N is not much bigger than D. This over tting can be eliminated by forcing to be sparse, for example, by assuming an l1 prior. One has to search for a good regularization parameter, increasing the computational overhead. This is similar in spirit, though, to the search for number of factors in a factor model, which also increases computations. Which method performs better remains an open question. 6.4.5 Other Speed Ups More speed-ups may be possible using following idea, Parallel updates It is straightforward to obtain a parallel version of Algo- rithm 3 where we run xed point updates for all dimensions parallely, fol- lowed by one update of V. Parallel updates are very popular for EP and have shown to improve the computational e ciency [Van Gerven et al., 2010], al- though neither the sequential or parallel version are provably convergent. Although the sequential version of our algorithm is provably convergent, it is not clear whether parallel updates will be convergent. A theoretical analysis might be possible since our objective function is concave. It is also required to know the conditions under which such an update will result in a positive de nite matrix. Finally, we need to assess the computational gains is obtained in practice with such an update. Sparse models Our EM algorithm can exploit sparsity in and can lead to further speed ups. There are many practical examples where is sparse; see Rue et al. [2009] for a few examples. In some applications, we would like to force to be sparse, perhaps because the underlying dependencies in the latent variables is sparse or because may be just to reduce number of parameters in the model. For such cases, we need better ways of being able to quantify the extent of sparsity required. For example, in case of l1 prior for sparsity, how should we choose the strength of the prior? The marginal likelihood estimates might provide some clues in some scenarios, although its suitability need to be studied for a variety of applications. Sparse posterior approximations Throughout this thesis, we assumed that the posterior covariances V are dense matrices. This assumption might be relaxed. In practice, instead of seeking a dense posterior, we might just want to keep only relatively high values of correlation. One possible way 1256.4. Future Work to do achieve this, is to force a sparse prior on V. This is a much less re- strictive assumptions than the factorization assumption made in the mean eld approximation, since here the factorization is learned from the data. The evidence lower bound discussed in this thesis can be easily modi ed to contain a sparse penalty term for V. Given that the penalty is concave, the lower bound remains concave leading to an e cient algorithm. The compu- tation complexity will depend on the strength of the prior, which needs to be estimated similar to the sparse model case. Such sparse approximations have recently been used in Yan and Qi [2010]. Online EM It is simple to extend the batch variational EM algorithms discussed in this thesis to the online setting, to handle the case of large N . See Cappe and Mouline [2009] and Ho man et al. [2010]. 126Chapter 7 Conclusions Modeling of high-dimensional, correlated, multivariate discrete data is an important problem in machine learning and computational statistics. In this thesis, we focused on the Bayesian modeling of such discrete data using LGMs. Our solutions were based on a variational approach which uses the evidence lower bound optimization. We made several contributions to the variational approach, focusing on the following two major aspects: tractabil- ity and computational e ciency. For tractability, we derived, applied, and compared many LVBs for tractable variational learning. Our work in this thesis clearly showed that accurate local bounds lead to a dramatic improve- ment in the accuracy of the variational approach. To improve computational e ciency, we used concavity of the variational lower bound, resulting in al- gorithms with a wide range of speed-accuracy trade-o s. Application to real-world datasets con rmed the signi cance of our contributions. We started, in Chapter 1 with a generic de nition of LGM which in- cludes many popular models. We identi ed our learning objectives, dedi- cating the rest of the thesis to achieve them. The di culty arises due to an intractable integral arising from the marginalization of latent variables. We reviewed several approaches in Chapter 2, which can be classi ed in three major categories: non-Bayesian methods, sampling methods, and de- terministic methods. All of these approaches have their own advantages and disadvantages. Non-Bayesian approaches are fast, but they over t. MCMC methods perform well, but are slow. Deterministic methods are faster than MCMC, but are less general than them. The variational approach falls in this last category and, as we showed in Chapter 3, is intractable for many discrete-data likelihoods. An additional issue is that, although it is faster than MCMC, it still has a lot of room for computational improvements. Our rst conclusion is that concavity is extremely useful for computa- tional e ciency of the variational approach. In this regard, we made three contributions in Chapter 3. First, we established conditions under which the variational lower bound is concave. Second, we derived generalized gra- dient expressions for lower bound optimization. Third, using the concavity, we derived a fast convergent algorithm for variational inference. Our algo- 127Chapter 7. Conclusions rithm borrows ideas from well-known concave problems, such as covariance selection and non-linear least squares, and e ciently exploits sparsity in the data and model parameters. Not only that, but it is amenable to many other speed-ups using approximate gradient methods and parallelization. Our second conclusion is regarding the tractable LVBs and their a ect on the accuracy of the variational approach. In Chapter 4 and 5, we derived and discussed many LVBs for binary and categorical data. We discussed extensions to ordinal and mixed-data in Chapter 6. We found that the ac- curacy of variational approach depends heavily on the accuracy of LVBs. Existing LVBs can lead to poor performance because of their large approx- imation error. We showed in this thesis, through the use of piecewise linear and quadratic bounds, that accurate bounds lead to huge improvements in accuracy. Finally, our error analysis revealed that an error assessment helps to choose appropriate LVBs for a given application. Our nal conclusion is that the variational approach can give rise to algorithms with a wide range of speed-accuracy trade-o s. The proposed Bohning bound leads to extremely fast, but sometimes inaccurate, varia- tional algorithms. Our piecewise bounds, although slower than the Bohning bound, can trade-o speed for accuracy by increasing the number of pieces. In practice, this leads to e cient analysis. For example, for large datasets, quick results can be obtained with the Bohning bound and later can be re ned by increasing the number of pieces in the piecewise bounds. Although, we showed many positive results of the variational approach, one needs to be careful about its limitations. Just like other deterministic methods, our variational approach uses a Gaussian posterior approxima- tion. This might lead to poor performance in cases where the posterior distribution is highly non-Gaussian. This is re ected in our experiments, most clearly seen in the results for Gaussian process classi cation; see Fig. 4.14 and 4.15 in Chapter 4. In that experiment, even though the variational lower bound underestimated the marginal likelihood sometimes, the predic- tion accuracy was still good. This experiment, and others like it, suggest that the situation may not be as bad as we might think. The key perhaps lies in the error in the Jensen bound and a careful study is required to understand this phenomenon. In this thesis, we showed that our variational approach can be accurate and computationally e cient. We believe that this is just the tip of the iceberg. Deterministic methods, such us the one discussed in this thesis, are key to accurate and scalable learning. Today, there exist a variety of deter- ministic methods. They perform well at times and fail at others. However, in our experience, it is necessary to gain good understanding of strengths and 128Chapter 7. Conclusions weaknesses of these deterministic methods, and combine them to design bet- ter methods. In the future, application of clever optimization techniques will help us design algorithms that are as fast as the non-Bayesian approaches. Design of accurate approximations and lower bounds will push deterministic methods to perform as well as MCMC algorithms. We hope that our work will motivate other researchers to work on making deterministic methods more e cient and widely applicable. 129Bibliography A. Agresti. Analysis of ordinal categorical data, volume 656. John Wiley & Sons Inc., 2010. A. Ahmed and E. Xing. On tight approximate inference of the logistic- normal topic admixture model. In International conference on Arti cial Intelligence and Statistics, 2007. J. Ahn and J. Oh. A constrained EM algorithm for principal component analysis. Neural Computation, 15:57{65, 2003. J. Albert and S. Chib. Bayesian analysis of binary and polychotomous response data. Journal of the American Statistical Association, 88(422): 669{679, 1993. C. Ananth and D. Kleinbaum. Regression models for ordinal responses: a review of methods and applications. International journal of epidemiology, 26(6):1323{1333, 1997. J. Anderson. Regression and ordered categorical variables. Journal of the Royal Statistical Society. Series B (Methodological), 46(1):1{30, 1984. D. Bartholomew, M. Knott, and I. Moustaki. Latent variable models and factor analysis: a uni ed approach. Wiley, 2011. D. J. Bartholomew. Factor analysis for categorical data. Journal of the Royal Statistical Society. Series B (Methodological), 42(3):pp. 293{321, 1980. M. Beal. Variational algorithms for approximate Bayesian inference. PhD thesis, Gatsby Unit, 2003. D. P. Bertsekas. Nonlinear programming. Athena Scienti c, second edition, 1999. C. Bishop. Pattern recognition and machine learning. Springer, 2006. 130Bibliography D. Blei and J. La erty. Correlated topic models. In Advances in Neural Information Processing Systems, 2006. D. Blei, A. Ng, and M. Jordan. Latent Dirichlet allocation. Journal of Machine Learning Research, 3:993{1022, 2003. D. Bohning. Multinomial logistic regression algorithm. Annals of the Insti- tute of Statistical Mathematics, 44:197{200, 1992. J. Booth and J. Hobert. Maximizing generalized linear mixed model like- lihoods with an automated Monte Carlo EM algorithm. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 61(1):265{ 285, 1999. G. Bouchard. E cient bounds for the softmax and applications to approxi- mate inference in hybrid models. In NIPS 2007 Workshop on Approximate Inference in Hybrid Models, 2007. S. Boyd and L. Vandenberghe. Convex optimization. Cambridge, 2004. M. Braun and J. McAuli e. Variational inference for large-scale models of discrete choice. Journal of the American Statistical Association, 105(489): 324{335, 2010. D. Bunch. Estimability in the multinomial probit model. Transportation Research Part B: Methodological, 25(1):1{12, 1991. W. Buntine. Variational extensions to EM and multinomial PCA. In Euro- pean Conference on Machine Learning, pages 23{34. Springer, 2002. O. Cappe and E. Mouline. Online EM algorithm for latent data models. Journal of Royal Statistical Sociecty, Series B, 71(3):593{613, June 2009. G. Casella and R. Berger. Statistical inference. Duxbury Press, 2001. K. Chai. Variational multinomial logit Gaussian process. The Journal of Machine Learning Research, 98888:1745{1808, 2012. E. Challis and D. Barber. Concave Gaussian variational approximations for inference in large-scale Bayesian linear models. In International conference on Arti cial Intelligence and Statistics, volume 6, page 7, 2011. S. Chib. Marginal likelihood from the Gibbs output. Journal of the American Statistical Association, 90:1313{1321, 1995. 131Bibliography S. Chib and E. Greenberg. Analysis of multivariate probit models. Biometrika, 85(2):347{361, 1998. S. Chib and I. Jeliazkov. Marginal likelihood from the Metropolis-Hastings output. Journal of the American Statistical Association, 96(453):270{281, 2001. W. Chu and Z. Ghahramani. Gaussian processes for ordinal regression. Journal of Machine Learning Research, 6:1{48, 2005. M. Collins, S. Dasgupta, and R. E. Schapire. A generalization of principal components analysis to the exponential family. In Advances in Neural Information Processing Systems, 2002. B. Cseke and T. Heskes. Improving posterior marginal approximations in latent Gaussian models. In International conference on Arti cial Intelli- gence and Statistics, volume 9, pages 121{128, 2010. B. Cseke and T. Heskes. Approximate marginals in latent Gaussian models. The Journal of Machine Learning Research, 12:417{454, 2011. P. Dellaportas and A. F. M. Smith. Bayesian inference for generalized linear and proportional hazards models via Gibbs sampling. Journal of the Royal Statistical Society. Series C (Applied Statistics), 42(3):pp. 443{459, 1993. B. Delyon, M. Lavielle, and E. Moulines. Convergence of a stochastic ap- proximation version of the EM algorithm. Annals of Statistics, 27(1): 94{128, 1999. A. Dempster. Covariance selection. Biometrics, 28(1), 1972. S. Duane, A. Kennedy, B. Pendleton, and D. Roweth. Hybrid Monte Carlo. Physics letters B, 195(2):216{222, 1987. M. Friedlander and M. Schmidt. Hybrid deterministic-stochastic methods for data tting. Arxiv preprint arXiv:1104.2373, 2011. J. Friedman, T. Hastie, and R. Tibshirani. Sparse inverse covariance esti- mation with the graphical lasso. Biostatistics, 9(3):432, 2008. S. Fr uhwirth-Schnatter and R. Fr uhwirth. Data augmentation and MCMC for binary and multinomial logit models. Statistical Modelling and Re- gression Structures, pages 111{132, 2010. 132Bibliography S. Fr uhwirth-Schnatter and H. Wagner. Marginal likelihoods for non- Gaussian models using auxiliary mixture sampling. Computational Statis- tics and Data Analysis, 52(10):4608 { 4624, 2008. D. Gamerman. Sampling from the posterior distribution in generalized linear mixed models. Statistics and Computing, 7:57{68, 1997. S. Gerrish and D. Blei. Predicting legislative roll calls from text. In Proc. of ICML, 2011. Z. Ghahramani and G. Hinton. The EM algorithm for mixtures of factor analyzers. Technical report, Dept. of Comp. Sci., Uni. Toronto, 1996. M. Girolami and B. Calderhead. Riemann manifold Langevin and Hamil- tonian Monte Carlo methods. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 73(2):123{214, 2011. M. Girolami and S. Rogers. Variational Bayesian multinomial probit re- gression with Gaussian process priors. Neural Comptuation, 18(8):1790 { 1817, 2006. Y. Guo and D. Schuurmans. E cient global optimization for exponential family PCA and low-rank matrix factorization. In 46’th Annual Aller- ton Conference on Communication, Control, and Computing, pages 1100{ 1107. IEEE, 2008. J. M. Hern andez-Lobato and D. Hern andez-Lobato. Convergent ex- pectation propogation in linear model with spike-and-slab priors. arXiv:1112.2289v1, 2011. M. Ho man and A. Gelman. The No-U-Turn Sampler: adaptively setting path lengths in Hamiltonian Monte Carlo. arXiv preprint arXiv:1111.4246, 2011. M. Ho man, D. Blei, and F. Bach. Online learning for latent Dirichlet allocation. In Advances in Neural Information Processing Systems, 2010. S. Ho man and G. Duncan. Multinomial and conditional logit discrete- choice models in demography. Demography, 25(3):415{427, 1988. C. Holmes and L. Held. Bayesian auxiliary variable models for binary and multinomial regression. Bayesian Analysis, 1(1):145{168, 2006. 133Bibliography H. Hotelling. Analysis of a complex of statistical variables into principal components. Journal of Educational Psychology, 24:417{441, 498{520, 1933. K. Hsiung, S. Kim, and S. Boyd. Tractable approximate robust geometric programming. Optimization and Engineering, 9(2):95{118, 2008. D. R. Hunter and K. Lange. A Tutorial on MM Algorithms. The American Statistician, 58:30{37, 2004. T. Jaakkola. Tutorial on variational approximation methods. In M. Opper and D. Saad, editors, Advanced mean eld methods. MIT Press, 2001. T. Jaakkola and M. Jordan. A variational approach to Bayesian logistic regression problems and their extensions. In International conference on Arti cial Intelligence and Statistics, 1996. M. I. Jordan, Z. Ghahramani, T. S. Jaakkola, and L. K. Saul. An introduc- tion to variational methods for graphical models. In M. Jordan, editor, Learning in Graphical Models. MIT Press, 1998. P. Jyl anki, J. Vanhatalo, and A. Vehtari. Robust Gaussian process regression with a Student-t likelihood. The Journal of Machine Learning Research, 999888:3227{3257, 2011. A. Kab an and M. Girolami. A combined latent class and trait model for the analysis and visualization of discrete data. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23(8):859{872, 2001. M. E. Khan. An Expectation-Maximization algorithm for learning the latent Gaussian model with Gaussian likelihood. Technical report, Department of Computer Science, University of British Columbia, Vancouver, 2011. URL http://www.cs.ubc.ca/~emtiyaz/publications.html#Talks. M. E. Khan, B. Marlin, G. Bouchard, and K. Murphy. Variational Bounds for Mixed-Data Factor Analysis. In Advances in Neural Information Pro- cessing Systems, 2010. M. E. Khan, S. Mohamed, B. Marlin, and K. Murphy. A stick breaking likelihood for categorical data analysis with latent Gaussian models. In International conference on Arti cial Intelligence and Statistics, 2012a. M. E. Khan, S. Mohamed, and K. Murphy. Fast Bayesian inference for non- conjugate Gaussian process regression. In Advances in Neural Information Processing Systems, 2012b. 134Bibliography S. Kim. A continuation ratio model for ordered category item. In Annual Meeting of the Psychometric Society, 2002. D. Knowles and T. Minka. Non-conjugate variational message passing for multinomial and binary regression. In Advances in Neural Information Processing Systems, 2011. M. Kuss and C. Rasmussen. Assessing approximate inference for binary Gaussian process classi cation. Journal of Machine Learning Research, 6: 1679{1704, 2005. P. Lenk and W. DeSarbo. Bayesian inference for nite mixtures of gener- alized linear models with random e ects. Psychometrika, 65(1):93{119, March 2000. R. Levine and G. Casella. Implementations of the Monte Carlo EM algo- rithm. Journal of Computational and Graphical Statistics, 10(3):422{439, 2001. D. MacKay. Information theory, inference, and learning algorithms. Cam- bridge Univesity Press, 2003. B. Marlin, M. Khan, and K. Murphy. Piecewise bounds for estimating Bernoulli-logistic latent Gaussian models. In International Conference on Machine Learning, 2011. J. Marschak. Binary-choice constraints and random utility indicators. In Proceedings of a Symposium on Mathematical Methods in the Social Sci- ences, 1960. R. Mazumder and T. Hastie. The graphical lasso: New insights and alter- natives. Arxiv preprint arXiv:1111.5479, 2011. P. McCullagh. Regression models for ordinal data. Journal of the Royal Statistical Society. Series B (Methodological), 42(2):109{142, 1980. P. McCullagh and J. Nelder. Generalized linear models. Chapman and Hall, 1989. 2nd edition. C. McCulloch. Maximum likelihood algorithms for generalized linear mixed models. Journal of the American statistical Association, pages 162{170, 1997. 135Bibliography D. McFadden. Conditional logit analysis of qualitative choice behavior. In P. Zarembka, editor, Frontiers in Econometrics, pages 105{142. Academic Press, 1973. T. Minka. Expectation propagation for approximate Bayesian inference. In Proceedings of the Conference on Uncertainty in Arti cial Intelligence, 2001. S. Mohamed, K. Heller, and Z. Ghahramani. Bayesian Exponential Family PCA. In Advances in Neural Information Processing Systems, 2008. P. D. Moral, A. Doucet, and A. Jasra. Sequential Monte Carlo samplers. Journal of Royal Statistical Society, Series B, 68(3):411{436, 2006. I. Murray and R. P. Adams. Slice sampling covariance hyperparameters of latent Gaussian models. In Advances in Neural Information Processing Systems 23, pages 1723{1731, 2010. R. Neal. Bayesian learning via stochastic dynamics. In Advances in Neural Information Processing Systems, pages 475{482, 1992. R. Neal. Erroneous results in \Marginal likelihood from the Gibbs out- put". Technical report, University of Toronto, 1999. URL http://www. cs.toronto.edu/\textasciitilderadford/chib-letter.html. R. M. Neal. Annealed importance sampling. Statistics and Computing, 11: 125{139, 2001. J. Nelder and R. Mead. A simplex method for function minimization. The computer journal, 7(4):308, 1965. M. Newton and A. Raftery. Approximate Bayesian inference with the weighted likelihood bootstrap. Journal of the Royal Statistical Society. Series B (Methodological), pages 3{48, 1994. H. Nickisch and C. Rasmussen. Approximations for binary Gaussian process classi cation. Journal of Machine Learning Research, 9(10), 2008. M. Opper and C. Archambeau. The variational Gaussian approximation revisited. Neural computation, 21(3):786{792, 2009. S. Orlitsky. Semi-parametric exponential family PCA. Advances in Neural Information Processing Systems, 2004. 136Bibliography J. Paisley, D. Blei, and M. Jordan. Variational Bayesian inference with stochastic search. In International Conference on Machine Learning, 2012. K. Pearson. On lines and planes of closest t to systems of points in space. Philosophical Magazine, 2(11):559{572, 1901. B. Polyak and A. Juditsky. Acceleration of stochastic approximation by averaging. Siam J. Control Optim, 30(4):838{855, 1992. C. E. Rasmussen and C. K. I. Williams. Gaussian Processes for Machine Learning. MIT Press, 2006. M. Rattray, O. Stegle, K. Sharp, and J. Winn. Inference algorithms and learning theory for bayesian sparse factor analysis. In Journal of Physics: Conference Series, volume 197, 2009. P. Rossi and G. Allenby. Bayesian statistics and marketing. Marketing Science, 22(3):304{328, 2003. S. Roweis and Z. Ghahramani. A unifying review of linear Gaussian models. Neural Computation, 11(2), 1999. W. Rudin. Real and complex analysis. Tata McGraw-Hill Education, 2006. H. Rue, S. Martino, and N. Chopin. Approximate Bayesian inference for latent Gaussian models using integrated nested Laplace approximations. Journal of Royal Statistical Sociecty, Series B, 71:319{392, 2009. R. Salakhutdinov and A. Mnih. Bayesian probabilistic matrix factorization using Markov chain Monte Carlo. In International Conference on Machine Learning, pages 880{887. ACM, 2008a. R. Salakhutdinov and A. Mnih. Probabilistic matrix factorization. Advances in Neural Information Processing Systems, 20:1257{1264, 2008b. F. Samejima. Graded response model. Handbook of modern item response theory, pages 85{100, 1997. S. L. Scott. Data augmentation, frequentist estimation, and the Bayesian analysis of multinomial logit models. Statistical Papers, 52(1):87{109, 2011. M. Seeger and M. I. Jordan. Sparse Gaussian process classi cation with multiple classes. Technical Report Department of Statistics TR 661, Uni- versity of California, Berkeley, 2004. 137Bibliography M. Seeger and H. Nickisch. Fast convergent algorithms for expectation prop- agation approximate Bayesian inference. In International conference on Arti cial Intelligence and Statistics, 2011. M. Seeger, N. Lawrence, and R. Herbrich. E cient nonparametric Bayesian modelling with sparse Gaussian process approximations. Technical report, Max Planck Institute, 2006. A. Skrondal and S. Rabe-Hesketh. Generalized latent variable modeling: Multilevel, longitudinal, and structural equation models. CRC Press, 2004. C. Spearman. "General Intelligence," objectively determined and measured. The American Journal of Psychology, 15(2):201{292, 1904. D. Stern, R. Herbrich, and T. Graepel. Matchbox: large scale online Bayesian recommendations. In Proceedings of the 18th international con- ference on World wide web, pages 111{120. ACM, 2009. L. Tierney and J. Kadane. Accurate approximations for posterior moments and marginal densities. Journal of the American Statistical Association, pages 82{86, 1986. M. Tipping. Probabilistic visualization of high-dimensional binary data. In Advances in Neural Information Processing Systems, 1998. M. Tipping and C. Bishop. Probabilistic principal component analysis. Jour- nal of Royal Statistical Sociecty, Series B, 21(3):611{622, 1999. K. Train. Discrete choice methods with simulation. Cambridge University Press, 2003. D. Van Dyk and X. Meng. The art of data augmentation. Journal of Computational and Graphical Statistics, 10(1):1{50, 2001. M. Van Gerven, B. Cseke, F. De Lange, and T. Heskes. E cient Bayesian multivariate fMRI analysis using a sparsifying spatio-temporal prior. Neu- roImage, 50(1):150{161, 2010. M. J. Wainwright and M. I. Jordan. Graphical models, exponential families, and variational inference. Foundations and Trends in Machine Learning, 1{2:1{305, 2008. M. Wedel and W. Kamakura. Factor analysis with (mixed) observed and latent variables in the exponential family. Psychometrika, 66(4):515{530, December 2001. 138G. C. G. Wei and M. A. Tanner. A Monte Carlo implementation of the EM algorithm and the poor man’s data augmentation algorithms. Journal of the American Statistical Association, 85(411):699{704, 1990. M. Welling, C. Chemudugunta, and N. Sutter. Deterministic latent variable models and their pitfalls. In International Conference on Data Mining, 2008. F. Yan and Y. Qi. Sparse Gaussian process regression via l1 penalization. In International Conference on Machine Learning, pages 1183{1190, 2010. K. Yu, S. Zhu, J. La erty, and Y. Gong. Fast nonparametric matrix factor- ization for large-scale collaborative ltering. In Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, pages 211{218. ACM, 2009. S. Zeger and M. Karim. Generalized linear models with random e ects: a Gibbs sampling approach. Journal of the American statistical association, pages 79{86, 1991. O. Zoeter, T. Heskes, and B. Kappen. Gaussian quadrature based expec- tation propagation. In Workshop on Arti cial Intelligence and Statistics, volume 10, 2005. 139A.1. Expectation Identity A.1 Expectation Identity Given q(z) = N (zjm;V), we prove the following identity: Eq f(z) exp( T z) = e Tm+12 TV E~qf(z) (A.1) ~q(z) = N (zjm + V ;V) (A.2) Expanding the left hand side, we get the following, Eq f(z) exp( T z) = Z f(z)e Tz 1 j2 Vj1=2 e 1 2 (z m) TV 1(z m)dz (A.3) = Z f(z) 1 j2 Vj1=2 e 1 2 (z m) TV 1(z m)+ Tzdz (A.4) We complete the square on the exponential term, 12(z m) TV 1(z m) + T z (A.5) = 12z TV 1z + mTV 1z 12m TV 1m + T z (A.6) = 12z TV 1z + (m + V )TV 1z 12m TV 1m (A.7) = 12z TV 1z + (m + V )TV 1z 12(V + m) TV 1(V + m) +12(V + m) TV 1(V + m) 12m TV 1m (A.8) = 12(z m V ) TV 1(z m V ) + Tm + 12 TV (A.9) Substituting this back in Eq. A.4, we get the following simpli ed expression, Eq f(z) exp( T z) = Z f(z) 1 j2 Vj1=2 e 1 2 (z m V ) TV 1(z m V ) e Tm+12 TV dz (A.10) = e Tm+12 TV Z f(z)N (zjm + V ;V)dz (A.11) = e Tm+12 TV E~qf(z) (A.12) where ~q = N (zjm + V ;V). A.2 Proof of Theorem 3.4.1 To prove concavity with respect to n, we rst prove strict concavity of all the terms except f . This function is separable in mn and Vn, so proving 140A.3. Derivation of the Jaakkola Bound concavity separately for each variable will establish joint concavity. The function with respect to mn is strictly concave since it is a least-square function. Similarly, the function with respect to Vn is strictly concave since log-det term is strictly concave and addition of a linear trace term maintains the strict concavity (this is because the linear term does not a ect the Hessian). Now, back to LVBs. If f(ydn; e dn; dn) is jointly concave with respect to each e dn, then it is also jointly concave with respect to n since e dn are linear functions of n (Theorem 3.2.2 of Boyd and Vandenberghe [2004]). Finally, sum of a strictly concave function and a concave function is strictly concave, completing the proof for concavity with respect to n. We now prove concavity with respect to each element of . Strict concav- ity with respect to is obvious since the function is a least-squares function. Function with respect to 1 takes the form of a strictly concave function: 1 2(N log j 1j Tr( 1S)) where S is a symmetric matrix. Concavity with respect to Wd and w0 can be established by proving the concavity of a function f(em; ev) with respect to w and w0, given that f is jointly concave and that em = wTm +w0 and ev = wTVw. Concavity with respect to w0 is obvious since em is a linear function of w0. Proving concavity with respect to w requires a little bit of work since ev is a quadratic function of w. Let 52f be the 2 2 matrix containing derivatives with respect to em and ev, and 52wf be the Hessian with respect to w. Using the chain rule, we can write the Hessian of f with respect to w as follows (see Eq. 3.15 in Boyd and Vandenberghe [2004]), 52wf = m 2Vw 52 f mT 2wTVT + 2V @2f @ev2 (A.13) For concavity, we need this matrix to be negative semi-de nite. The last term is negative de nite since f is concave with respect to ev. First term is a function of the form THTT with H being negative de nite. An inner product is always negative or zero, since xTTHTTx = yTHy 0, proving that the combination is negative semi-de nite. This proves that the function is concave with respect to W and w0. A.3 Derivation of the Jaakkola Bound The Jaakkola bound can be derived using the Fenchel inequality [Boyd and Vandenberghe, 2004]. We rst rewrite the LLP function as follows, llp( ) = log(1 + e ) = =2 + log e =2 + e =2 (A.14) 141A.3. Derivation of the Jaakkola Bound De ne x := 2 and h(x) := log e =2 + e =2 = log e p x=2 + e p x=2 . This function is concave in x (which can be veri ed by taking second derivative), and we get an upper bound using Fenchel’s inequality Boyd and Vanden- berghe [2004, Chapter 3, Sec. 3.3.2] as shown in Eq. A.15. Here, h ( ) is the concave conjugate which is de ned in Eq. A.16. h(x) x h ( ); > 0 (A.15) h ( ) = min x x h(x) (A.16) The value of the conjugate function h ( ) is not available in closed form, but fortunately it can be parameterized in terms of a minimizer x of x h(x). By taking the derivative, setting it to zero, and simplifying, we nd a condition in Eq. A.19 that x should satisfy. = @h(x) @x x = e p x =2 e p x =2 e p x =2 + e p x =2 1 4 p x = 1 e p x 1 + e p x 1 4 p x (A.17) = 2 (1 + e p x ) 1 + e p x 1 4 p x = 1 1 + e p x 1 2 1 2 p x (A.18) = g p x 1=2 2 p x (A.19) Using x , we can rewrite the upper bound as follows, h(x) x [ x h(x )] = x x + log e p x =2 + e p x =2 (A.20) We use the above to obtain an upper bound to the LLP function. First, we express the LLP function in terms of h(x) using Eq. A.14, as shown in Eq. A.21. We substitute Eq. A.20 to get an upper bound on the LLP function as shown in Eq. A.22. Next, we substitue x = 2 and reparameterize x = 2 to get Eq. A.23, and simplify to get Eq. A.24. The new parameter should be such that = (g ( ) 1=2) = (2 ), a condition obtained by directly plugging x = 2 in Eq. A.19. llp( ) = =2 + h(x) (A.21) =2 + x x + log e p x =2 + e p x =2 (A.22) = =2 + 2 2 + log e =2 + e =2 (A.23) = =2 + 2 2 =2 + llp( ) (A.24) 142A.4. Derivation of EM algorithm using Quadratic Bounds Rearraging the terms, we get a quadratic upper bound in Eq. A.25. llp( ) 12a 2 + 12 + c (A.25) Here, we write to show its dependence on , and other variables are de ned as in Eq. 4.7-4.9. We substitute this in Eq. 4.5 and rearrange to obtain the Jaakkola bound shown in Eq. 4.6. A.4 Derivation of EM algorithm using Quadratic Bounds We consider the following general quadratic lower bound to the expectation of the log-likelihood, fQ(ydn; e dn; dn) = y T dn emdn 1 2 em T dnA ;dn emdn + b ;dn emdn c ;dn 12Tr A ;dn eVdn (A.26) The Bohning bound for the Bernoulli logit likelihood is a special case with = and a ;dn = 1=4. The Jaakkola bound is a special with = and b ;dn = 1=2. The Bohning bound for the multinomial logit likelihood is a special case with = with other functions as de ned in Eq. 5.15- 5.17. The Gaussian LGM discussed in Section 3.5.2 has similar forms too (although not exactly identical). We rst derive gradients of fQ with respect to emdn and evdn, gmdn = ydn + b ;dn A ;dn emdn ; G v dn = 1 2A ;dn (A.27) We substitute these in the generalized gradient expressions to get the ud- pates. Denote the vector of b ;dn and c ;dn by bn and cn. We also denote the block diagonal matrix formed with A ;dn as its diagonal blocks by An. First, we consider the gradient of Vn by setting its gradient to 0. 1 2(V 1 n 1) + DX d=1 Wd 12Adn WTd = 0 (A.28) which gives us the update Vn = 1 + WT AnW 1 . Simlarly, we sim- plify the gradient for mn as follows, 1(mn ) + DX d=1 WTd (ydn + b ;dn A ;dn emdn) (A.29) = 1(mn ) + W[yn + bn An(Wmn + w0)] (A.30) = (WT AnW + 1)mn + WT (yn + bn Anw0) + 1 (A.31) 143A.5. Truncated Gaussian Moments Setting this to zero, gives us the update mn = Vn[WT (yn + bn Anw0) + 1 ]. Now, we derive the updates for = f ; ;W;w0g. Updates with respect to and are available in closed form and are the same as derived earlier in Section 3.5.1. The gradient with respect to Wd is simpli ed below, NX n=1 (ydn + b ;dn A ;dn emdn)m T n A ;dnWdVn (A.32) = NX n=1 [ydn + b ;dn A ;dn(Wdmn + w0d)]m T n A ;dnWdVn (A.33) = NX n=1 A ;dnWd(mnm T n + Vn) + NX n=1 (ydn + b ;dn A ;dnw0d)m T n (A.34) This does not always give rise to simple updates. In case, A ;dn = A, we get the following update, Wd = " NX n=1 A 1(ydn + b ;dn) w0d mTn #" NX n=1 Vn + mnmTn # 1 (A.35) Finally, setting derivative with respect to w0d to 0, we obtain its update. NX n=1 ydn + bdn A ;dn(Wdmn + w0d) = 0 (A.36) w0d = NX n=1 A ;dn ! 1 NX n=1 (ydn + bdn A ;dnWdmn) (A.37) For the Bohning bound, updates for Wd and w0d can be written for all d in one matrix form, simplifying the expression further. A.5 Truncated Gaussian Moments Given a Gaussian random variable x with mean and variance 2, we show how to compute f( ; 2; ) = Z h l (ax2 + bx+ c)N (xj ; 2)dx (A.38) 144A.5. Truncated Gaussian Moments and its derivatives with respect to and 2, where = [a; b; c; l; h] with all elements of the set being real-valued scalars. We introduce the nota- tion Ehl [x mj ; 2] to indicate the truncated expectation R h l x mN (xj ; 2)dx, where m is a non-negative integer. We can then express f( ; 2; ) as (aEhl [x 2j ; 2]+bEhl [x 1j ; 2]+cEhl [x 0j ; 2]). The computation of f( ; 2; ) and its derivatives then follows from the computation of Ehl [x mj ; 2] and its derivatives. We use (x) as shorthand for the standard normal probability density function and (x) as shorthand for the standard normal cumulative distribution function. We de ne the standardized variables ~l = (l )= and ~h = (h )= . It is easy to see that the computational cost of using a piecewise quadratic bound is only marginally higher than using a piecewise linear bound. This is due to the fact that the Gaussian CDF and PDF functions need only be computed twice each per piece for either class of bounds. The truncated moments of orders zero, one and two are given below. These moments are closely related to the moments of a truncated and re- normalized Gaussian distribution. Ehl [x 0j ; 2] = (~h) (~l) (A.39) Ehl [x 1j ; 2] = ( (~l) (~h)) + ( (~h) (~l)) (A.40) Ehl [x 2j ; 2] = 2(~l (~l) ~h (~h)) + ( 2 + 2)( (~h) (~l)) (A.41) The derivatives of the standard Gaussian PDF and CDF evaluated at ~x are given below, which are both implicit function of and due to the de nition ~x = (x )= . @ (~x) @ = ~x (~x) ; @ (~x) @ 2 = ~x2 2 2 (~x) (A.42) @ (~x) @ = 1 (~x) ; @ (~x) @ 2 = ~x 2 2 (~x) (A.43) Using these, the derivatives of each truncated moment Ehl [x mj ; 2] with respect to and 2 can be computed and are given below. These are all the derivatives needed to compute the gradients of the piecewise bound. @Ehl [x 0j ; 2] @ = 1 2 (~l) (~h) (A.44) @Ehl [x 0j ; 2] @ 2 = 1 2 2 ~l (~l) ~h (~h) (A.45) 145A.6. Derivation of the Log Bound @Ehl [x 1j ; 2] @ = 1 l (~l) h (~h) + (~h) (~l) (A.46) @Ehl [x 1j ; 2] @ 2 = l2 + 2 l 2 3 (~l) h2 + 2 h 2 3 (~h) (A.47) @Ehl [x 2j ; ] @ = 1 (l2 + 2 2) (~l) (h2 + 2 2) (~h) + 2 (~h) (~l) (A.48) @Ehl [x 2j ; 2] @ 2 = (l3 + 2 2l l2 ) (~l) 2 3 (h3 + 2 2h h2 ) (~h) 2 3 + (~h) (~l) (A.49) A.6 Derivation of the Log Bound We use the following inequality, log x x log 1 where > 0. The above inequality can be obtained using the Fenchel’s inequality (see Boyd and Vandenberghe [2004, Ch. 3, Sec. 3.3.2]). Using this inequality, an upper bound on the LSE function is obtained as de ned in Eq. A.50. lse( ) KX k=0 e k log 1 (A.50) Here > 0 is the local variational parameter and needs to be optimized to get a tight bound. Taking expectation with respect to q( je ) and using the identity of Appendix A.1, we obtain the following upper bound on the expectation of the LSE function, Eq( je )[lse( )] KX k=0 eemk+evk=2 log 1 (A.51) We can remove the local variational parameter by maximizing with respect to it. Taking derivative of the left hand side with respect to and setting it to zero, gives us the optimal choice of = 1= P k exp(emk+evk=2). Substituting this in the bound, we get the nal log bound in Eq. 5.6. The log bound can also be derived using the zeroth-order delta method. A zeroth-order approximation of a function f( ) is obtained by taking ex- pectation of a zeroth-order Taylor expansion around the mean em, as shown below. Here, gf is the gradient of function f . Eq( je )[f( )] Eq( je )[f( em) + ( em) Tgf ( em)] = f( em) (A.52) 146A.7. Derivation of the Tilted Bound This can also be interpreted as \pushing" the expectation inside the func- tion. We know from Jensen’s inequality that this results in an upper (lower) bound if the function is concave (convex), i.e. E[f( )] f(E( )). We choose log to be the function h and apply the zeroth-order delta method to obtain the bound. Eq( je )[lse( )] log KX k=1 Eq( kje k)e k = log KX k=1 eemk+evk=2 (A.53) A.7 Derivation of the Tilted Bound We start with the expectation of the LSE function in Eq. A.54. Here, the expectation is with respect to q( je ) = N ( j em; eV). We multiply and divide by an exponential term shown in Eq. A.56 and simplify in Eq. A.57. E[lse( )] = E " log KX k=0 e k # (A.54) = E " log KX k=0 e PK j=0 aj je PK j=0 aj je k # (A.55) = KX j=0 aj emj + E " log KX k=0 e k PK j=0 aj j # (A.56) De ne k as a vector with k’th element as 1 ak and j’th element as aj for j 6= k. Then, Eq. A.56 can be rewritten as Eq. A.57. We use Jensen’t inequality to take the expectation inside log, to get the upper bound of Eq. A.58. Next, we use the expectation identity of Appendix A.1 to get Eq. A.59. E[lse( )] = KX j=0 aj emj + E " log KX k=0 exp Tk # (A.57) KX j=0 aj emj + log KX k=0 E exp Tk (A.58) = KX j=0 aj emj + log KX k=0 exp Tk em + T k eV k=2 (A.59) This lower bound depends on the o -diagonal elements of eV, however this can be expressed in terms of the diagonal elements only, as shown in A.60. 147A.8. Proof of Theorem 5.5.1 We obtain this bound since eV is positive de nite. Next, we substitute the de nition of k and simplify to bring the common terms out of the LSE term to get the upper bound shown in Eq. A.62. E[lse( )] KX j=0 aj emj + log KX k=0 exp Tk em + T k diag(eV) k=2 (A.60) = KX j=0 aj emj + log KX k=0 eemk+(1 2aj)evk=2+( PK j=0 aj emj+a 2 jevj=2) (A.61) = 12 KX j=0 a2jevj + log KX k=0 eemk+(1 2aj)evk=2 (A.62) We see that there are two sources of error in the bound. The rst one is very similar to the zeroth-order delta method, and second one is by using only the diagonal elements of eV. The former is more serious and making the bound accurate locally, not ensuring the global tightness. A.8 Proof of Theorem 5.5.1 The log bound and the \optimal" Bohning bound are shown below, fB(y; e ; ) = yT em lse( em) 12Tr(A eV) (A.63) fL( ; e ) = yT em lse( em + ev=2) (A.64) Using these, we get the following expression for , = lse( em) + 12Tr(A eV) lse( em + ev=2) (A.65) We now nd an upper bound on the last term in terms of the rst term, lse( em + ev=2) log eevmax=2 KX k=0 eemk+evk=2 = 12evmax + lse( em) (A.66) Similarly, lse( em + ev=2) 12evmin + lse( em). Substituting these in Eq. A.65, we get the results. 148
- Library Home /
- Search Collections /
- Open Collections /
- Browse Collections /
- UBC Theses and Dissertations /
- Variational learning for latent Gaussian model of discrete...
Open Collections
UBC Theses and Dissertations
Featured Collection
UBC Theses and Dissertations
Variational learning for latent Gaussian model of discrete data Khan, Mohammad 2012-12-31
pdf
Page Metadata
Item Metadata
Title | Variational learning for latent Gaussian model of discrete data |
Creator |
Khan, Mohammad |
Publisher | University of British Columbia |
Date | 2012 |
Date Issued | 2012-11-30 |
Description | This thesis focuses on the variational learning of latent Gaussian models for discrete data. The learning is difficult since the discrete-data likelihood is not conjugate to the Gaussian prior. Existing methods to solve this problem are either inaccurate or slow. We consider a variational approach based on evidence lower bound optimization. We solve the following two main problems of the variational approach: the computational inefficiency associated with the maximization of the lower bound and the intractability of the lower bound. For the first problem, we establish concavity of the lower bound and design fast learning algorithms using concave optimization. For the second problem, we design tractable and accurate lower bounds, some of which have provable error guarantees. We show that these lower bounds not only make accurate variational learning possible, but can also give rise to algorithms with a wide variety of speed-accuracy trade-offs. We compare various lower bounds, both theoretically and experimentally, giving clear design guidelines for variational algorithms. Through application to real-world data, we show that the variational approach can be more accurate and faster than existing methods. |
Genre |
Thesis/Dissertation |
Type |
Text |
Language | eng |
Collection |
Electronic Theses and Dissertations (ETDs) 2008+ |
Date Available | 2012-11-30 |
Provider | Vancouver : University of British Columbia Library |
DOI | 10.14288/1.0052219 |
URI | http://hdl.handle.net/2429/43640 |
Degree |
Doctor of Philosophy - PhD |
Program |
Computer Science |
Affiliation |
Science, Faculty of Computer Science, Department of |
Degree Grantor | University of British Columbia |
Graduation Date | 2013-05 |
Campus |
UBCV |
Scholarly Level | Graduate |
Aggregated Source Repository | DSpace |
Download
- Media
- ubc_2013_spring_khan_mohammad.pdf [ 1.81MB ]
- Metadata
- JSON: 1.0052219.json
- JSON-LD: 1.0052219+ld.json
- RDF/XML (Pretty): 1.0052219.xml
- RDF/JSON: 1.0052219+rdf.json
- Turtle: 1.0052219+rdf-turtle.txt
- N-Triples: 1.0052219+rdf-ntriples.txt
- Original Record: 1.0052219 +original-record.json
- Full Text
- 1.0052219.txt
- Citation
- 1.0052219.ris
Full Text
Cite
Citation Scheme:
Usage Statistics
Country | Views | Downloads |
---|---|---|
China | 76 | 20 |
United States | 76 | 89 |
Canada | 14 | 47 |
Ukraine | 8 | 209 |
Spain | 6 | 2 |
France | 6 | 10 |
Russia | 5 | 2 |
United Kingdom | 5 | 8 |
Unknown | 4 | 0 |
Switzerland | 2 | 15 |
Japan | 2 | 11 |
Germany | 2 | 21 |
Iran | 2 | 0 |
City | Views | Downloads |
---|---|---|
Unknown | 45 | 277 |
Shenzhen | 35 | 8 |
Ashburn | 18 | 0 |
Tianjin | 18 | 9 |
Beijing | 14 | 0 |
Washington | 8 | 0 |
Cheyenne | 8 | 0 |
Salt Lake City | 7 | 58 |
Saint Petersburg | 5 | 0 |
Los Angeles | 5 | 0 |
Montreal | 5 | 37 |
Hefei | 4 | 0 |
Seattle | 3 | 4 |
{[{ mDataHeader[type] }]} | {[{ month[type] }]} | {[{ tData[type] }]} |
Share
Embed
Customize your widget with the following options, then copy and paste the code below into the HTML
of your page to embed this item in your website.
<div id="ubcOpenCollectionsWidgetDisplay">
<script id="ubcOpenCollectionsWidget"
src="{[{embed.src}]}"
data-item="{[{embed.item}]}"
data-collection="{[{embed.collection}]}"
data-metadata="{[{embed.showMetadata}]}"
data-width="{[{embed.width}]}"
async >
</script>
</div>
Our image viewer uses the IIIF 2.0 standard.
To load this item in other compatible viewers, use this url:
http://iiif.library.ubc.ca/presentation/dsp.24.1-0052219/manifest