"Science, Faculty of"@en .
"Statistics, Department of"@en .
"DSpace"@en .
"UBCV"@en .
"Nagy, Be\u00CC\u0081la"@en .
"2008-08-28T18:42:17Z"@en .
"2008"@en .
"Doctor of Philosophy - PhD"@en .
"University of British Columbia"@en .
"Computer models or simulators are becoming increasingly common in many fields in science and engineering, powered by the phenomenal growth in computer hardware over the\npast decades. Many of these simulators implement a particular mathematical model as a deterministic computer code, meaning that running the simulator again with the same input gives the same output.\n\nOften running the code involves some computationally expensive tasks, such as solving complex systems of partial differential equations numerically. When simulator runs become too long, it may limit their usefulness. In order to overcome time or budget constraints by making the most out of limited computational resources, a statistical methodology has been proposed, known as the \"Design and Analysis of Computer Experiments\".\n\nThe main idea is to run the expensive simulator only at a relatively few, carefully chosen design points in the input space, and based on the outputs construct an emulator (statistical model) that can emulate (predict) the output at new, untried\nlocations at a fraction of the cost. This approach is useful provided that we can measure how much the predictions of the cheap emulator deviate from the real response\nsurface of the original computer model.\n\nOne way to quantify emulator error is to construct pointwise prediction bands designed to envelope the response surface and make\nassertions that the true response (simulator output) is enclosed by these envelopes with a certain probability. Of course, to be able\nto make such probabilistic statements, one needs to introduce some kind of randomness. A common strategy that we use here is to model the computer code as a random function, also known as a Gaussian stochastic process. We concern ourselves with smooth response surfaces and use the Gaussian covariance function that is ideal in cases when the response function is infinitely differentiable.\n\nIn this thesis, we propose Fast Bayesian Inference (FBI) that is both computationally efficient and can be implemented as a black box. Simulation results show that it can achieve remarkably accurate prediction uncertainty assessments in terms of matching\ncoverage probabilities of the prediction bands and the associated reparameterizations can also help parameter uncertainty assessments."@en .
"https://circle.library.ubc.ca/rest/handle/2429/1561?expand=metadata"@en .
"780407 bytes"@en .
"application/pdf"@en .
"Valid Estimation and Prediction Inference in Analysis of a Computer Model by Be\u00CC\u0081la Nagy B.Math, Eo\u00CC\u0088tvo\u00CC\u0088s Lora\u00CC\u0081nd University, 1995 Honours B.Math, Computer Science, University of Waterloo, 2000 A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF Doctor of Philosophy in The Faculty of Graduate Studies (Statistics) The University of British Columbia (Vancouver) August 2008 c\u00C2\u00A9 Be\u00CC\u0081la Nagy , 2008 Abstract Computer models or simulators are becoming increasingly common in many fields in science and engineering, powered by the phenomenal growth in com- puter hardware over the past decades. Many of these simulators implement a particular mathematical model as a deterministic computer code, meaning that running the simulator again with the same input gives the same output. Often running the code involves some computationally expensive tasks, such as solving complex systems of partial differential equations numeri- cally. When simulator runs become too long, it may limit their usefulness. In order to overcome time or budget constraints by making the most out of limited computational resources, a statistical methodology has been pro- posed, known as the \u00E2\u0080\u009CDesign and Analysis of Computer Experiments\u00E2\u0080\u009D. The main idea is to run the expensive simulator only at a relatively few, carefully chosen design points in the input space, and based on the outputs construct an emulator (statistical model) that can emulate (predict) the output at new, untried locations at a fraction of the cost. This approach is useful provided that we can measure how much the predictions of the cheap emulator deviate from the real response surface of the original computer model. One way to quantify emulator error is to construct pointwise prediction bands designed to envelope the response surface and make assertions that the true response (simulator output) is enclosed by these envelopes with a certain probability. Of course, to be able to make such probabilistic state- ments, one needs to introduce some kind of randomness. A common strategy that we use here is to model the computer code as a random function, also ii Abstract known as a Gaussian stochastic process. We concern ourselves with smooth response surfaces and use the Gaussian covariance function that is ideal in cases when the response function is infinitely differentiable. In this thesis, we propose Fast Bayesian Inference (FBI) that is both com- putationally efficient and can be implemented as a black box. Simulation results show that it can achieve remarkably accurate prediction uncertainty assessments in terms of matching coverage probabilities of the prediction bands and the associated reparameterizations can also help parameter un- certainty assessments. iii Table of Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . x Statement of Co-Authorship . . . . . . . . . . . . . . . . . . . . . xiii 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Computer Model . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Statistical Model . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Reparameterization . . . . . . . . . . . . . . . . . . . . . . . 6 1.4 Preview of chapters . . . . . . . . . . . . . . . . . . . . . . . 7 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2 The Gaussian Process Model . . . . . . . . . . . . . . . . . . 13 2.3 Outline of Fast Bayesian Inference . . . . . . . . . . . . . . . 16 2.4 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2.5 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 iv Table of Contents 2.6 Dealing with the process variance . . . . . . . . . . . . . . . 29 2.6.1 Profile likelihood . . . . . . . . . . . . . . . . . . . . . 29 2.6.2 Integrated likelihood . . . . . . . . . . . . . . . . . . 30 2.7 Fast Bayesian Inference in detail . . . . . . . . . . . . . . . . 31 2.8 Concluding remarks . . . . . . . . . . . . . . . . . . . . . . . 32 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.2 Statistical Model . . . . . . . . . . . . . . . . . . . . . . . . . 40 3.2.1 Likelihood . . . . . . . . . . . . . . . . . . . . . . . . 40 3.2.2 Profile likelihood . . . . . . . . . . . . . . . . . . . . . 41 3.2.3 Log transformation . . . . . . . . . . . . . . . . . . . 41 3.2.4 Example . . . . . . . . . . . . . . . . . . . . . . . . . 42 3.2.5 One-dimensional special case . . . . . . . . . . . . . . 45 3.3 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 3.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 3.4.1 Point estimation . . . . . . . . . . . . . . . . . . . . . 50 3.4.2 Parameter uncertainty . . . . . . . . . . . . . . . . . 55 3.5 Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 3.5.1 Likelihood-based estimators . . . . . . . . . . . . . . 62 3.5.2 Normal approximations . . . . . . . . . . . . . . . . . 64 3.5.3 Bayes estimator . . . . . . . . . . . . . . . . . . . . . 66 3.6 Concluding remarks . . . . . . . . . . . . . . . . . . . . . . . 66 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 4.1 Alternative correlation functions . . . . . . . . . . . . . . . . 74 4.2 Additional terms in the model . . . . . . . . . . . . . . . . . 75 4.3 Different reparameterizations . . . . . . . . . . . . . . . . . . 76 v Table of Contents 4.4 Numerical optimizations . . . . . . . . . . . . . . . . . . . . 77 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 A Appendix to Chapter 3 . . . . . . . . . . . . . . . . . . . . . . 81 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 B Appendix to Chapter 4 . . . . . . . . . . . . . . . . . . . . . . 85 B.1 Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 B.2 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 B.3 MCMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 B.4 Coverage Probability . . . . . . . . . . . . . . . . . . . . . . 90 B.5 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 vi List of Tables 3.1 MLE of log \u00CE\u00B81 in the first simulation study (n = 10 d). . . . . 51 3.2 MLE of log \u00CE\u00B81 in the second simulation study (n = 5 d). . . . 51 3.3 MLE of log \u00CF\u00832 in the first simulation study (n = 10 d). . . . . 52 3.4 MLE of log \u00CF\u00832 in the second simulation study (n = 5 d). . . . 52 3.5 Bayes estimate of log \u00CF\u00832 in the first simulation study (n = 10d). 53 3.6 Bayes estimate of log \u00CF\u00832 in the second simulation study (n = 5 d). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 vii List of Figures 2.1 Optimal \u00CE\u00BB values in the first simulation study (n = 10 d) for d = 1, . . . , 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2.2 Optimal \u00CE\u00BB values in the second simulation study (n = 5d) for d = 1, . . . , 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 2.3 Coverage probabilities in the first simulation study (n = 10d) for d = 1, 4, 7, and 10. . . . . . . . . . . . . . . . . . . . . . 24 2.4 Coverage probabilities in the second simulation study (n = 5 d) for d = 1, 4, 7, and 10. . . . . . . . . . . . . . . . . . . . 25 2.5 Coverage probabilities for the Arctic sea ice example (n = 50). 27 2.6 Coverage probabilities for the Wonderland example (n = 100). 28 3.1 The log transformation improved approximate normality of the profile likelihood for this one-dimensional (d = 1) exam- ple. The top two plots are for the two-parameter likelihood and the bottom two for the one-parameter profile likelihood. The ridges of the contours are marked by the dashed lines, reaching their apex at the MLE. Below the contour plots, these dashed lines are plotted as functions of the range pa- rameter, representing the profile likelihood function. In ad- dition to the profile likelihoods (dashed curves), their normal approximation is also shown for comparison (dotted curves). . 43 viii List of Figures 3.2 Optimal \u00CE\u00BB\u00CC\u0082 values for d = 1 and n = 3, . . . , 10 as a function of \u00CE\u00B8\u00CC\u0082. The digits 3, . . . , 9 in the plot represent the design sample size n and the digit 0 represents n = 10. The lines for n = 8, n = 9, and n = 10 do not start on the left side of the plot because of numerical difficulties for small \u00CE\u00B8\u00CC\u0082. . . . . . . . 46 3.3 Coverage probabilities of Wald confidence intervals and Bayes credible intervals in the first simulation study (n = 10 d) for d = 1, 4, 7, and 10. . . . . . . . . . . . . . . . . . . . . . . . 56 3.4 Coverage probabilities of Wald confidence intervals and Bayes credible intervals in the second simulation study (n = 5d) for d = 1, 4, 7, and 10. . . . . . . . . . . . . . . . . . . . . . . . 57 3.5 Coverage probabilities of confidence regions based on the two likelihood functions and their normal approximations in the first simulation study (n = 10 d) for d = 1, 4, 7, and 10. . . . 59 3.6 Coverage probabilities of confidence regions based on the two likelihood functions and their normal approximations in the second simulation study (n = 5 d) for d = 1, 4, 7, and 10. . . 60 ix Acknowledgments There was a time when I thought that statistics was boring. Driven by common misconceptions (reinforced by dry Statistics Canada press releases) I imagined it was nothing more than endless tabulating and mindless number crunching... That view came to an end when I had the good fortune of taking my first real statistics course from Professor William J. Welch at the University of Waterloo. How different that was from my previous studies in mathematical statistics! Finally, I could see how we could learn about the real world by carefully designed statistical experiments. Unfortunately, I did not have the courage to go for stats at that point in my life. That came several years later when he was about to teach a course on the Design and Analysis of Experiments at UBC. Then I decided to take the plunge and that was one of the best decisions in my life. He is an exceptionally inspirational teacher and I am grateful for his guidance as my academic advisor. I feel incredibly lucky for the opportunity to get my training in the Design and Analysis of Computer Experiments from one of the founders of this field. I have benefited immensely not only from his expertise in technical matters but also in countless other practical things that are important in academic life. Considering his many responsibilities, how he found the time to do so much for me is still a mystery and I have to admit that I often felt guilty for diverting his time from other important things. My thanks and gratitude also go to Dr. Jason L. Loeppky, who first started advising me as a postdoctoral fellow and later became my co-supervisor. x Acknowledgments He was instrumental in getting me started in my research the summer before I started my Ph.D. program. I will always remember our numerous stimu- lating conversations and debates that helped me identify my shortcomings and broaden my horizons. I am especially grateful to both of my advisors for granting me many \u00E2\u0080\u009Cdegrees of freedom\u00E2\u0080\u009D of independence and for enduring my stubbornness (which led me down blind alleys several times resulting in countless hours of ultimately unproductive programming, e.g. concatenating Gaussian pro- cesses, constructing sequential designs, exploring bootstrapping schemes, etc.) Their patience and understanding is a trait I value highly. Derek Bingham at SFU also supported me in a variety of ways (including financially) and I am still astounded by all his efforts to get me involved in conferences, workshops, summer schools, and internships. Although it is impossible to mention everyone else by name who con- tributed to my memorable grad student experience here at UBC, I still want to point out several remarkable individuals. Among the faculty in the Department of Statistics, professors Paul Gustafson, Jiahua Chen, and James V. Zidek stand out for their steadfast support and useful suggestions. Hardworking grad students in our department were too many to mention, but Jesse Raffa, Yiping Dou, and Kenneth Chi Ho Lo have inspired me on many occasions with their seemingly superhuman efforts. I also want to thank Wei Wang and Hui Shen for providing me with LATEX templates to create this document. Of course, appreciation goes both ways and I will always remember fondly that my fellow grad students have awarded me twice for my own efforts with the \u00E2\u0080\u009CEnergizer Award (keeps working and working and...)\u00E2\u0080\u009D in 2006-2007 and the \u00E2\u0080\u009CIf I were allowed, I would live in the Department Award\u00E2\u0080\u009D in 2005-2006. (Unfortunately, I did not attend the award ceremonies because I was, well, working...) This research was funded by the Natural Sciences and Engineering Re- search Council of Canada and the National Program on Complex Data xi Acknowledgments Structures of Canada. Computations were made using WestGrid, which is funded in part by the Canada Foundation for Innovation, Alberta Innova- tion and Science, BC Advanced Education, and the participating research institutions. WestGrid equipment is provided by IBM, Hewlett Packard, and SGI. My research would not have been possible without all the technical sup- port staff that was helping me perform enormous amounts of computation, store inordinate data sets, and use obscure software libraries. Martin Siegert at SFU has been incredibly helpful and responsive in installing, compiling, and debugging C++ code on WestGrid (robson). I will also be forever grateful to The Ha in our department and Roman Baranowski at the UBC WestGrid facility for not kicking me out for good after my careless code caused an accidental burnout of the department\u00E2\u0080\u0099s workhorse (gosset), and on another occasion, a catastrophic slowdown of the largest WestGrid cluster (glacier), respectively. The Van de Plas family (Paul, Susan, and Monique) also deserve special credit, because they had a large share in my success by welcoming me to their city and being incredibly generous with their unconditional support and time to help me get started in Vancouver. When I think of Canadian hospitality and willingness to help, their example will always glow bright. Finally, I also want to say thank you to Dr. Matthias Schonlau for his very useful advice about how to keep focused in grad school and credit his web site for helping me finish in the minimum time allowed for my program (three years), doing my part for improving graduation statistics! However, I should also mention that I started doing research four months before starting my Ph.D. and started taking courses in probability and statistics a year before, pushing the total time invested to four years. (At the time of this writing, typing \u00E2\u0080\u009Chow to finish a phd\u00E2\u0080\u009D or \u00E2\u0080\u009Cfinishing my phd\u00E2\u0080\u009D into Google and hitting the I\u00E2\u0080\u0099m Feeling Lucky button leads to his web page at http://www.schonlau.net/finishphd.html). xii Statement of Co-Authorship The thesis is finished under the supervision of my advisors, Professor William J. Welch and Assistant Professor Jason L. Loeppky. Chapter 2 is co-authored with Dr. William J. Welch and Dr. Jason L. Loeppky. My main contributions are designing, running, analyzing the sim- ulations and cross-validations, applying the results of Kass and Slate (1994) to minimize nonnormality, and most of the writing. Chapter 3 is co-authored with Dr. William J. Welch and Dr. Jason L. Loeppky. My main contributions are designing, running, analyzing the simulations, deriving formulas for optimal transformations based on a non- normality measure of Sprott (1973), and most of the writing. xiii Chapter 1 Introduction This thesis is about how to achieve valid inference by reparameterizing a particular statistical model used in the field of computer experiments. After discussing what we mean by valid inference and its related philosophical implications, we describe the model and the rationale behind its reparam- eterization. Then we preview how the following chapters address specific aspects of this problem. When we are talking about estimation or prediction, valid inference in- cludes the ability to quantify uncertainty. Frequentists do that by construct- ing confidence sets, while Bayesians may prefer credible sets. In this thesis we use the classical frequentist interpretation. For instance, we view a 99% confidence region as a random entity that should cover the true value ap- proximately 99% of the time over the course of many repeated, identical trials. We evaluate the validity of our methods by extensive simulations, av- eraging over many data sets to estimate the actual coverage probabilities of the confidence regions. Unless the true coverage is roughly the same as the advertised nominal coverage, an inference method cannot be considered valid. The methods we study can be classified as likelihood-based or Bayesian. But regardless of the philosophical underpinnings, they all have to go through the same frequentist simulation test, e.g. even when we are dealing with a Bayesian credible interval, we still evaluate it by its frequentist properties in terms of matching coverage probabilities. Hence, one could argue that our approach is a mix of frequentist, likeli- 1 Chapter 1. hoodist, and Bayesian ideas. However, that characterization would not do justice to the spirit of this work, since we are above all pragmatists, driven by practical, real-world applications, not just academic curiosities. The image of the practicing engineer, or research scientist, or some other professional experimenting with a computer model is paramount in our minds. As users, most of them could not care less about philosophical debates in statistics. What matters to them most is whether a given method works or does not work in the real situation they are facing. That is also a kind of philoso- phy we can relate to and hope that practitioners will find our contributions useful and will implement our proposals. 1.1 Computer Model First, we need to make a distinction between the computer model or sim- ulator and the statistical model or emulator. The computer model is not a statistical model. Instead, it is usually a complex mathematical model of ordinary and partial differential equations, implemented as a computer code, used to simulate a complex real-world phenomenon. Examples include weather modeling, chemical and biochemical reactions, particle physics, cos- mology, semiconductor design, aircraft design, automotive crash simulations, etc. Rapidly growing computing power has enabled scientists and engineers to build sophisticated computer models that can simulate a complex pro- cess to sufficient granularity, so that in some cases, it is sufficient to study the virtual world created by the simulator instead of the original physical process in the real world. This may have several advantages, since physi- cal experimentation can be time-consuming, expensive, or not possible at all because of a variety of reasons (physical, legal, ethical, etc.) In contrast, computer experimentation is usually only limited by the available computing resources. As cutting edge science and engineering is always pushing the boundary 2 Chapter 1. of what is possible, many of these simulators tend to be computationally expensive. Furthermore, the number of input variables may be so large that a systematic exploration of all possible input combinations of interest may not be possible because of a combinatorial explosion. This necessitates a faster approximation: an emulator that emulates the simulator. 1.2 Statistical Model The emulator is a statistical model that can predict the output of the simu- lator based on a relatively small number of simulation runs. Since prediction may be many orders of magnitudes faster than running the simulator code itself, the emulator may eventually replace the simulator. (This is why an emulator is sometimes called a meta-model that models the computer model). Of course, all this hinges on the ability of the emulator to accurately predict the unknown response of the simulator at an untried input combina- tion. This is the subject of a specialized field in statistics that started with the seminal paper (Sacks, Welch, Mitchell, and Wynn, 1989) with the title \u00E2\u0080\u009CDesign and Analysis of Computer Experiments\u00E2\u0080\u009D. The design part deals with the question of how to choose the initial input combinations for the simulator runs. Classical design of experiments techniques, such as replication, randomization, or blocking do not apply, since what we are trying to predict is deterministic computer output with no observational error (if we run the code again with the same input, we get the same output). It quickly became apparent that space-filling designs were the most useful, such as the Latin hypercubes of McKay, Beckman, and Conover (1979) that are used in this thesis. Since our work is about the analysis of computer experiments, we are not going to discuss design issues any further. The interested reader is referred to the substantial literature developed over the years about the many possible ways to construct such designs (e.g. Tang (1993); Morris and Mitchell (1995), or Mease and Bingham (2006) for a 3 Chapter 1. recent generalization to Latin hyperrectangles). Although the output of a simulator may be multivariate, we can assume without loss of generality that it is univariate, since different outputs can be emulated separately. (This approach may be feasible even when the output is functional data, since sometimes we are interested in emulating only a finite number of summaries of the output function, instead of the entire function). Hence, we are emulating a deterministic computer code with a single output y as a function of d \u00E2\u0089\u00A5 1 inputs: x1, x2, . . . , xd. Likewise, for the emulator, we use a statistical model with a single dependent variable Y and d independent variables. Here we are assuming that all variables are real numbers and that the response is a smooth function of the d-dimensional vector x = (x1, x2, . . . , xd) T , having derivatives of all orders. This is a reasonable assumption for a large class of simulators because of the nature of the underlying system of differential equations. The main idea is to model the deterministic function specified by the computer code with a random function Z(x). This is a counter-intuitive idea, since we are infusing randomness where none exists. Nevertheless, this approach has been proven more successful over the past 20 years or so than any other method for modeling deterministic response surfaces in computer experiments. Other common names for Z(x) are Gaussian process, Gaussian stochas- tic process, stochastic process, spatial process, or random field, and this construct has been used extensively in spatial statistics starting with geo- statistics where it is known as kriging (Cressie, 1993). However, spatial applications are usually in just two or three dimensions, while computer models can have many more input variables. (For example, in Chapter 2, we will work with a model with d = 41 inputs). The other major difference is that kriging models usually include a white noise term, but in the deter- ministic case there is no noise. This is why for example linear models are inappropriate, since the usual independence assumption for a random error 4 Chapter 1. \u00C7\u00AB is not satisfied in a model like Y (x) = \u00E2\u0088\u0091 j \u00CE\u00B2jfj(x) + \u00C7\u00AB, where each fj(x) is a function of x with unknown \u00CE\u00B2j coefficients. But if we replace the random error term \u00C7\u00AB with a systematic error term Z(x), then we obtain the model in Sacks et al. (1989) that is a sum of a regression com- ponent or drift and a stochastic process Z(x) that captures the systematic departure from the drift: Y (x) = \u00E2\u0088\u0091 j \u00CE\u00B2jfj(x) + Z(x), where the assumption for the process Z(x) is that it has mean zero, con- stant variance \u00CF\u00832 and a parametric correlation function depending on some measure of distance in the input space. To simplify calculations, we assume that there is no significant drift, making the regression part unnecessary and leaving the stochastic part as the only component in our model: Y (x) = Z(x). We use the Gaussian correlation function that is a common choice for mod- eling smooth response surfaces: Corr(Z(w), Z(x)) = d\u00E2\u0088\u008F i=1 exp { \u00E2\u0088\u0092\u00CE\u00B8i(wi \u00E2\u0088\u0092 xi) 2 } , (1.1) specifying that the correlation between the responses at input sites w and x is a function of the distance between the two points, scaled by positive \u00CE\u00B8i range parameters, measuring how active the process is in each of the d dimensions. We should also mention that such models are often presented in a Bayesian way, saying that what we are doing is essentially using a Gaussian process 5 Chapter 1. prior for the data (Currin, Mitchell, Morris, and Ylvisaker, 1991). From that perspective, this correlation function puts all prior density on smooth, infinitely differentiable functions. However, in this thesis we avoid that kind of terminology because we use the word \u00E2\u0080\u009CBayesian\u00E2\u0080\u009D in a different way, re- ferring to the joint distribution of the range parameters, as part of the Fast Bayesian Inference method that is the subject of Chapter 2. 1.3 Reparameterization Statistical models can be reparameterized for many different purposes. Our objective is to make the shape of the likelihood more Gaussian, enabling good normal approximations (i.e. approximating a likelihood function with the density function of a multivariate normal distribution). An excellent ref- erence on this subject is Slate (1991), comparing several different measures for nonnormality. Note that this is about transforming the parameters of the model, as opposed to transforming the response, as popularized by Box and Cox (1964). We use measures by Sprott (1973) for d = 1, and a multivariate extension by Kass and Slate (1994) for d > 1 to quantify nonnormality for relatively small sample sizes, when we cannot rely on asymptotics to guarantee a likelihood that is approximately normal. It appears that, in general, small sample normality has not been investigated as thoroughly as asymptotic normality in statistics. But in practice, small sample results are often more relevant than large sample results. This is especially true in the field of computer experiments, where sample sizes are routinely small relative to the dimensionality of the input space because of the excessive computational cost of obtaining data. Hence, the lack of small sample focus is even more puzzling in this re- search area (although it is understandable from a historical perspective, since powerful computers required for simulations with finite samples have emerged only gradually over the past decades, while hardware requirements 6 Chapter 1. for asymptotic investigations were rarely more than pen and paper). Theory is lagging behind current practice, since from the practitioners\u00E2\u0080\u0099 point of view the crucial question is how to make the most of a limited number of data points. But theoretical arguments are usually based on asymptotics, providing little guidance for small samples. (See Zhang and Zimmerman (2005) for a recent review of results based on increasing-domain or infill asymptotics, titled \u00E2\u0080\u009CTowards Reconciling Two Asymptotic Frame- works in Spatial Statistics\u00E2\u0080\u009D). The original inspiration for this work was Karuri (2005), who observed that in a Bayesian setting the log transformation of the range parameters im- proved approximate normality of the posterior for one- and two-dimensional examples and demonstrated its usefulness for integration and prediction. Following up on her original idea, we show that the log transformation can be even more useful in higher dimensions, sometimes enabling surprisingly accurate uncertainty assessments for parameter estimation and prediction. 1.4 Preview of chapters This is a manuscript-based thesis. Chapters 2 and 3 are separate articles intended for publication. An earlier version of Chapter 2 has already been submitted to a journal and Chapter 3 will follow soon. Chapters 2 introduces Fast Bayesian Inference (FBI) and compares it to the traditional plug-in method on both simulated and real data sets, demon- strating that the prediction bands of the FBI are more valid than those of the plug-in in terms of their frequentist coverage probabilities. The equivalence of \u00E2\u0080\u009Cprofiling out\u00E2\u0080\u009D and \u00E2\u0080\u009Cintegrating out\u00E2\u0080\u009D the process variance \u00CF\u00832 is estab- lished and the resulting profile likelihood function of the range parameters \u00CE\u00B81, . . . , \u00CE\u00B8d in (1.1) is approximated with a multivariate normal distribution. The quality of the approximation is evaluated by a nonnormality measure of Kass and Slate (1994). This measure is minimized numerically in an at- tempt to improve normal approximations. It is found that for large d, within 7 Chapter 1. the family of power transformations, the log transformation is close to be- ing optimal both with respect to minimizing nonnormality and assessing prediction uncertainty. Using the same model with the same reparameterization, Chapter 3 ex- amines how well the parameters can be estimated by maximum likelihood and how well one can quantify parameter uncertainty by normality-based confidence sets and more exact likelihood-based confidence regions. It is found that although the point estimates slightly underestimate the real parameters, uncertainty can be measured adequately by normality-based (Wald-type) confidence intervals obtained from the standard errors derived from the observed information matrix. However, Wald-type confidence el- lipsoids for the joint estimation of the model parameters are not as accurate as the ones obtained from inverting the likelihood-ratio tests (which them- selves can become inadequate for small sample sizes). Implications for the FBI are discussed and a Bayes estimator for \u00CF\u00832 is presented that is less biased than the MLE of \u00CF\u00832. Likelihood nonnormality (i.e. closeness to nor- mal approximations) is explored graphically, revealing a mismatch in the tails. Another measure by Sprott (1973) for d = 1 demonstrates why the log transformation can be far from being optimal in the one-dimensional special case, explaining why results seen for d = 1 are in general inferior to results for d > 1 in Chapters 2 and 3 and Appendix B. Chapter 4 concludes the thesis by relating the two manuscripts to each other and to the field of study, reviewing the strengths and weaknesses of the research, and discussing potential directions for future work. Appendix A to Chapter 3 contains the derivations of the formulas necessary to compute a nonnormality measure of Sprott (1973) for random function models in the d = 1 case. Appendix B to Chapter 4 illustrates the robustness of the FBI by additional simulation studies from Nagy, Loeppky, and Welch (2007), including a wider range of parameter choices and smaller sample sizes for d = 1, . . . , 10. 8 Bibliography Box, G. E. P. and Cox, D. R. (1964), \u00E2\u0080\u009CAn Analysis of Transformations,\u00E2\u0080\u009D Journal of the Royal Statistical Society. Series B (Methodological), 26, 211\u00E2\u0080\u0093 252. Cressie, N. A. C. (1993), Statistics for Spatial Data, John Wiley & Sons. Currin, C., Mitchell, T., Morris, M., and Ylvisaker, D. (1991), \u00E2\u0080\u009CBayesian Prediction of Deterministic Functions, with Applications to the Design and Analysis of Computer Experiments,\u00E2\u0080\u009D Journal of the American Statistical Association, 86, 953\u00E2\u0080\u0093963. Karuri, S. W. (2005), \u00E2\u0080\u009CIntegration in Computer Experiments and Bayesian Analysis,\u00E2\u0080\u009D Ph.D. thesis, University of Waterloo. Kass, R. E. and Slate, E. H. (1994), \u00E2\u0080\u009CSome Diagnostics of Maximum Like- lihood and Posterior Nonnormality,\u00E2\u0080\u009D The Annals of Statistics, 22, 668\u00E2\u0080\u0093695. McKay, M. D., Beckman, R. J., and Conover, W. J. (1979), \u00E2\u0080\u009CA Comparison of Three Methods for Selecting Values of Input Variables in the Analysis of Output from a Computer Code,\u00E2\u0080\u009D Technometrics, 21, 239\u00E2\u0080\u0093245. Mease, D. and Bingham, D. (2006), \u00E2\u0080\u009CLatin Hyperrectangle Sampling for Computer Experiments,\u00E2\u0080\u009D Technometrics, 48, 467\u00E2\u0080\u0093477. Morris, M. D. and Mitchell, T. J. (1995), \u00E2\u0080\u009CExploratory Designs for Compu- tational Experiments,\u00E2\u0080\u009D Journal of Statistical Planning and Inference, 43, 381\u00E2\u0080\u0093402. 9 Bibliography Nagy, B., Loeppky, J. L., and Welch, W. J. (2007), \u00E2\u0080\u009CFast Bayesian Infer- ence for Gaussian Process Models,\u00E2\u0080\u009D Tech. Rep. 230, Department of Statis- tics, The University of British Columbia. Sacks, J., Welch, W. J., Mitchell, T. J., and Wynn, H. P. (1989), \u00E2\u0080\u009CDe- sign and Analysis of Computer Experiments (C/R: P423-435),\u00E2\u0080\u009D Statistical Science, 4, 409\u00E2\u0080\u0093423. Slate, E. H. (1991), \u00E2\u0080\u009CReparameterizations of Statistical Models,\u00E2\u0080\u009D Ph.D. thesis, Carnegie Mellon University. Sprott, D. A. (1973), \u00E2\u0080\u009CNormal Likelihoods and Their Relation to Large Sample Theory of Estimation,\u00E2\u0080\u009D Biometrika, 60, 457\u00E2\u0080\u0093465. Tang, B. (1993), \u00E2\u0080\u009COrthogonal Array-based Latin Hypercubes,\u00E2\u0080\u009D Journal of the American Statistical Association, 88, 1392\u00E2\u0080\u00931397. Zhang, H. and Zimmerman, D. L. (2005), \u00E2\u0080\u009CTowards Reconciling Two Asymptotic Frameworks in Spatial Statistics,\u00E2\u0080\u009D Biometrika, 92, 921\u00E2\u0080\u0093936. 10 Chapter 2 Quantifying Prediction Uncertainty in Computer Experiments with Fast Bayesian Inference 2.1 Introduction Computer models have been used with great success throughout the sciences and engineering disciplines, for example in climate modeling, aviation, semi- conductor design, nuclear safety, etc. Implemented as computer programs, deterministic models calculate an output y for a given input vector x. De- pending on the complexity of the underlying mathematical model, this can be expensive computationally, creating a need for faster approximations. A common approach is to build a statistical model to approximate the output of the computer code. This has become known as the field of computer experiments in statistics, using Gaussian process (GP) models as computa- tionally cheap surrogates (Sacks, Welch, Mitchell, and Wynn, 1989; Currin, Mitchell, Morris, and Ylvisaker, 1991; Welch, Buck, Sacks, Wynn, Mitchell, and Morris, 1992). Trading off accuracy for speed is acceptable as long as A version of this chapter has been submitted for publication. Authors: Nagy B., Loeppky J.L., Welch W.J. 11 Chapter 2. we can measure how much the surrogate\u00E2\u0080\u0099s prediction of the response might deviate from the real one. However, quantifying that uncertainty has been an ongoing challenge. This paper is about the prediction uncertainty that originates in the GP model itself and from estimating the parameters of the model. Of course, there are other sources of uncertainty that can be just as important. For instance, such a simple statistical model may be an oversimplification of the complex original model. But that is outside of the scope of this investigation. Our focus is on prediction within the class of functions defined by the GP model. The rationale is that if we cannot assess prediction uncertainty decently within this class of functions (that satisfy all of our assumptions), then we cannot realistically hope to do so when working with a different class of functions (that may not satisfy the modeling assumptions). Prediction uncertainty can be quantified by a prediction band providing confidence limits for the response surface. The typical approach in com- puter experiments is to pretend that the response is a random realization of a GP that can be modeled with a modest number of parameters. Based on that assumption, it is straightforward to compute normality-based predic- tion limits using the standard error from the prediction variance formula. As long as the model parameters are known, this is a valid practice, resulting in confidence sets that by definition have a perfect match between nominal and actual coverage probabilities at all confidence levels. However, in practice, most of the time the parameters of the GP model are not known but need to be estimated, usually by maximum likelihood. The resulting estimates are then often used as if they were the true values. But this ignores the uncertainty in estimating the parameters. Plugging in the estimates in place of the true values in the prediction variance formula leads to prediction bands that are narrower than they should be. This has been a long standing problem of the plug-in method (see Abt (1999) for a review). 12 Chapter 2. In this article, we present a Bayesian way to deal with this problem and compare the frequentist properties of the traditional plug-in method with the new method, called Fast Bayesian Inference (FBI). This research was inspired by Karuri (2005), indicating the potential usefulness of the log transformation for the parameters. We concern ourselves with a noise-free GP model using the Gaussian covariance function. Model uncertainty is purposefully ignored by assuming that the response is a realization of such a Gaussian process. The only uncertainty left about the model is the exact values of its parameters. The main finding is that FBI can successfully propagate that parameter uncertainty into assessing prediction uncertainty, leading to improved frequentist properties of the resulting prediction bands. After defining the GP model in the next section, Section 2.3 outlines the foundations for a computationally fast Bayesian analysis. Then two simulation studies are presented in Section 2.4, followed by two real examples in Section 2.5. The proposed method is described in detail in Sections 2.6 and 2.7. We finish the article with some concluding remarks in Section 2.8. 2.2 The Gaussian Process Model Sacks et al. (1989) gave the following general model for a deterministic computer code y(x): Y (x) = \u00E2\u0088\u0091 j \u00CE\u00B2jfj(x) + Z(x), that is the sum of a regression model and a GP model Z(x) with mean zero. Note that no white noise term is necessary because of the deterministic nature of the code, i.e. if we rerun the simulator with the same input, we always get the same output. Often the regression component can be omitted, too (e.g. see Chen (1996) and Steinberg and Bursztyn (2004)), because of the flexibility of the stochastic process that can easily take on the features of the underlying function. Following Linkletter, Bingham, Hengartner, 13 Chapter 2. Higdon, and Ye (2006) we assume a standardized response with mean zero (by subtracting the mean of all observations). Thus we model the computer code y(x) as if it was a realization of a mean zero Gaussian stochastic process Z(x) on the d-dimensional vector x = (x1, x2, . . . , xd) T : Y (x) = Z(x). Hence all model parameters are in the covariance function: Cov(Z(w), Z(x)) = \u00CF\u00832 R(w, x), where \u00CF\u00832 is the process variance and R(w, x) is the correlation between two configurations of the input vector, w and x: R(w, x) = d\u00E2\u0088\u008F i=1 exp { \u00E2\u0088\u0092\u00CE\u00B8i(wi \u00E2\u0088\u0092 xi) 2 } , (2.1) where the positive \u00CE\u00B8i range parameters control how variable the process is in a particular dimension. This is the Squared Exponential or Gaussian cor- relation function that is frequently used in computer experiments to model smooth response surfaces. The likelihood is a function of \u00CF\u00832 and the d-dimensional vector of range parameters \u00CE\u00B8 = (\u00CE\u00B81, \u00CE\u00B82, . . . , \u00CE\u00B8d) T : L(\u00CF\u00832, \u00CE\u00B8) \u00E2\u0088\u009D 1 (\u00CF\u00832) n 2 |R| 1 2 exp { \u00E2\u0088\u0092 yTR\u00E2\u0088\u00921y 2\u00CF\u00832 } , (2.2) where y is the data vector of length n and R is the n\u00C3\u0097n design correlation matrix given by (2.1) for all pairs of input vector configurations in the data set. R is a function of the range parameter vector \u00CE\u00B8. If \u00CE\u00B8 is known, then the Best Linear Unbiased Predictor (BLUP) of the response at a new x0 is y\u00CC\u00820(\u00CE\u00B8) = r(x0) TR\u00E2\u0088\u00921y, (2.3) 14 Chapter 2. where r(x0) is an n \u00C3\u0097 1 vector of correlations between the new x0 and the n design points (a function of \u00CE\u00B8), again given by (2.1). Furthermore, if \u00CF\u00832 is also known, then the Mean Squared Error of the BLUP is MSEy\u00CC\u00820(\u00CF\u0083 2, \u00CE\u00B8) = \u00CF\u00832 ( 1 \u00E2\u0088\u0092 r(x0) TR\u00E2\u0088\u00921r(x0) ) , (2.4) and these two formulas enable one to construct valid normality-based point- wise prediction bands, having a perfect match between nominal and true coverage at all levels under this model. However, that validity is dependent on the assumption that all parameters are known. But in practice, often none of the parameters are known. Instead, they have to be estimated, usually by maximizing (2.2) to get the estimates \u00CF\u0083\u00CC\u00822 and \u00CE\u00B8\u00CC\u0082. When we plug in \u00CF\u0083\u00CC\u00822 in place of \u00CF\u00832 and \u00CE\u00B8\u00CC\u0082 in place of \u00CE\u00B8 in (2.3) and (2.4), we lose validity in the sense that the estimator of (2.4) based on \u00CF\u0083\u00CC\u00822 and \u00CE\u00B8\u00CC\u0082 is biased to be too small relative to the true mean squared error given by (2.4) based on \u00CF\u00832 and \u00CE\u00B8. In the computer experiments and the geostatistics literature, this problem is seen as a serious shortcoming of the traditional plug-in method (see the review in Abt (1999) for more details). The root of this problem is ignoring the uncertainty due to estimating the model parameters. That suggests that a Bayesian approach could potentially help. However, before considering how to deal with parameter uncertainty, it is important to realize that all parameters are not created equal. We can see that \u00CE\u00B8 exerts its influence on the BLUP (2.3) and its Mean Squared Error (2.4) in a highly nonlinear fashion through the correlation vector r(x0) and the correlation matrixR. In contrast, the dependence on \u00CF\u00832 is much simpler. It is a factor in the MSE formula (2.4), but the BLUP itself is independent of \u00CF\u00832. This has important implications when the parameters are unknown. It is easier to deal with uncertainty in \u00CF\u00832 than in \u00CE\u00B8 because the predictor is not affected by \u00CF\u00832 and its MSE is simply proportional to \u00CF\u00832. In fact, we found that it is best to treat \u00CF\u00832 as a nuisance parameter and eliminate it from the likelihood because it has a relatively minor role in quantifying prediction 15 Chapter 2. uncertainty. This can be done by either profiling or integrating, as shown later in Section 2.6. Either way, the result is the likelihood function L(\u00CE\u00B8) that is only a function of the range parameters and this is the likelihood that we use for all subsequent calculations. Having eliminated \u00CF\u00832, we can call L(\u00CE\u00B8) the profile likelihood or just simply the likelihood for short, and the log of this function the log-likelihood: l(\u00CE\u00B8) = logL(\u00CE\u00B8). In practice, one would optimize l(\u00CE\u00B8) numerically to get the Maximum Likelihood Estimate or MLE (e.g. see Welch et al. (1992)). 2.3 Outline of Fast Bayesian Inference Bayesian statistics provides a natural way to incorporate parameter uncer- tainty into a predictive statistical model. However, a Bayesian approach immediately raises two nontrivial questions: 1. How to choose a prior? 2. How to sample from the posterior? Usually, these are perceived as separate issues. But we choose a prior, together with a reparameterized likelihood, that together lead to a posterior with a multivariate normal shape. This makes sampling from the posterior trivial. The basic idea is to use a parameterization that makes the likelihood approximately normal (Gaussian shape) and then to use a prior that makes the posterior normal. This way the problem is reduced to two questions: 1. How to get a nearly normal likelihood? 2. How to get a normal posterior? The answer to the first question lies in reparameterization. We look at a family of transformations and pick one that is optimal (or nearly optimal) with respect to a criterion measuring the quality of a second-order approxi- mation to the log-likelihood, and hence a Gaussian shape for the likelihood 16 Chapter 2. as a function of the transformed parameters. We use the family of power transformations from Tukey (1957) (extended by Box and Cox (1964)), in- dexed by a real \u00CE\u00BB that includes no transformation (for \u00CE\u00BB = 1) and the log transformation (for \u00CE\u00BB = 0) for the positive \u00CE\u00B8i range parameters: \u00CE\u00B3i = \u00EF\u00A3\u00B1\u00EF\u00A3\u00B2 \u00EF\u00A3\u00B3\u00CE\u00B8 \u00CE\u00BB i , \u00CE\u00BB 6= 0, log \u00CE\u00B8i, \u00CE\u00BB = 0. The same \u00CE\u00BB value is used for all \u00CE\u00B8i ( i = 1, . . . , d ). To find the optimal \u00CE\u00BB with the least observed nonnormality, we use a third derivative-based nonnormality measure from Kass and Slate (1994): 1 d2 d\u00E2\u0088\u0091 i1,i2,i3,i4,i5,i6=1 \u00E2\u0088\u0092 \u00E2\u0088\u0082i1i2 l(MLE) \u00E2\u0088\u00921 \u00C3\u0097 \u00E2\u0088\u0082i4i5l(MLE) \u00E2\u0088\u00921\u00C3\u0097 \u00C3\u0097\u00E2\u0088\u0082i3i6 l(MLE) \u00E2\u0088\u00921 \u00C3\u0097 \u00E2\u0088\u0082i1i2i3 l(MLE)\u00C3\u0097 \u00E2\u0088\u0082i4i5i6 l(MLE), where \u00E2\u0088\u0082ij l(MLE) denotes second and \u00E2\u0088\u0082ijkl(MLE) third partial derivatives of the log-likelihood function l, evaluated at the MLE. By minimizing this mea- sure, one can find a log-likelihood that has relatively small third derivatives compared to second derivatives at the mode. This means that third-order nonnormality is minimized, making the shape of the likelihood approxi- mately Gaussian in the neighborhood of the MLE. Simulations show that the optimal \u00CE\u00BB values tend to cluster around zero (except in low dimensions). Thus, the log transformation for the range parameters empirically leads to a likelihood with approximately normal shape. Having a nearly normal likelihood, we choose the multivariate normal posterior N(MLE, \u00E2\u0088\u0092H\u00E2\u0088\u00921 MLE ), where HMLE is the Hessian matrix of second derivatives of the log-likelihood at the MLE. Note that this is equivalent to choosing a prior. (But we never need to compute the prior, all we need is the posterior). We can see that this prior is fairly non-informative because it leads to a posterior centered at the MLE, matching the curvature of the 17 Chapter 2. likelihood at the MLE up to the second order. This seems sensible as this choice will not interfere much with the information coming from the data, which is contained in the likelihood function L(\u00CE\u00B8). Although we are not interested in the prior per se and never compute it, we should point out connections with earlier work. A nearly normal likelihood implies a nearly uniform prior on the log scale. By a change of variables, we can verify that uniform priors on the log scale are equivalent to inverse priors on the original scale, which are known to approximate the Jeffreys prior in this case (Berger, De Oliveira, and Sanso\u00CC\u0081, 2001). Using the results of Chen (1996), Karuri (2005) verified this approximation for d = 1 and d = 2 and suggested that similar results may hold in higher dimensions, too. Another way to justify using inverse priors is that they give prior weights inversely proportional to the parameter values, preventing overly large parameter estimates. For example, in our model, excessively large range parameter estimates could potentially underestimate the spatial correlations in the input space, undermining our spatial model. We should also mention that Nagy, Loeppky, and Welch (2007) presents the FBI from a slightly different viewpoint, namely as an approximation to the Bayesian method that uses uniform priors on the log scale for the range parameters. In this interpretation the FBI is only approximately Bayesian, since it is taking samples from the normal approximation of the posterior, where the posterior is proportional to the likelihood because of the uniform priors. But no matter which semantics we choose, the computations are always the same. More details are provided in Sections 2.6 and 2.7, but first we demonstrate through simulated and real examples that this method works remarkably well. 2.4 Simulations The simulations were designed to mirror situations that one would expect to encounter in practice. That means balancing two main concerns. The 18 Chapter 2. first one is that the design sample size n is often less than ideal because of the computational cost of obtaining data (slow simulators). The sec- ond is that n should still be large enough to enable meaningful prediction. One option is to tie it to the number of dimensions d. According to Sacks (Chapman, Welch, Bowman, Sacks, and Walsh, 1994; Loeppky, Sacks, and Welch, 2008), n = 10 d could often serve as a rough initial estimate for an adequate sample size. Hence, the first set of simulations used this rule for d = 1, . . . , 10 . To ensure adequate prediction accuracy (with median prediction errors within 5% of the range of the data), the range parameters were set to \u00CE\u00B8 = 25/(d+ 1)2 in all dimensions. (Of course, the model fitting procedure did not make the assumption that all range parameters were the same and the resulting estimates were dispersed over a wide range). The second set of simulations halved the sample size (n = 5 d) while increasing correlations between the design sites (using \u00CE\u00B8 = 5/(d + 1)2) to maintain comparable prediction accuracy to the first study. To obtain 1,000 replicates for a given combination of the sample size n and the common range parameter \u00CE\u00B8, the following steps were repeated 1,000 times: 1. Select a random n point design by Latin hypercube sampling in [0, 1]d (McKay, Beckman, and Conover, 1979). 2. Sample 15 more points uniformly in [0, 1]d for prediction. 3. Generate a realization of the mean zero GP over the n+ 15 points by setting the process variance to one and \u00CE\u00B8i to \u00CE\u00B8 for i = 1, . . . , d. 4. Use the data for the n design points to fit the GP model. 5. Compute predictors with mean squared errors for the 15 additional points by the plug-in and FBI methods and then for each \u00CE\u00B1 = 0.01, 0.02, . . . , 0.99, construct 100(1\u00E2\u0088\u0092\u00CE\u00B1)% pointwise prediction bands: pre- dictor \u00C2\u00B1 t \u00CE\u00B1/2 n \u00E2\u0088\u009A MSE(predictor), where t \u00CE\u00B1/2 n is the upper \u00CE\u00B1/2 critical point of the tn distribution. 19 Chapter 2. 6. Calculate coverage probabilities by counting how many of the 15 points were covered by the prediction bands of the plug-in and FBI for \u00CE\u00B1 = 0.01, 0.02, . . . , 0.99. Finally, the resulting actual coverage probabilities for both methods were averaged over the 1,000 replicates and plotted against the nominal levels for \u00CE\u00B1 = 0.01, 0.02, . . . , 0.99. Note that although it is common to use normality-based prediction bands (especially for the plug-in), here we used the t-distribution with n degrees of freedom instead of the normal because it can slightly improve the match between nominal and true coverages, es- pecially for small n. To make the comparison fair, here the tn distribution was used for the plug-in, too, to match Bayesian prediction bands based on the predictive distribution (O\u00E2\u0080\u0099Hagan, 1994; Santner, Williams, and Notz, 2003). This simulation sequence was devised to represent a typical real world scenario. Latin hypercubes are the design of choice for GP models for pre- diction at new, untried inputs anywhere in [0, 1]d. Although there are many improved variants of Latin hypercubes (Tang, 1993; Morris and Mitchell, 1995; Mease and Bingham, 2006), the original random version of McKay et al. (1979) was used here because of the enormous number of realizations generated. 1,000 replicates were used to make sure that both design and ran- dom generation effects were averaged out in the final calculation of coverage probabilities. In addition, using 15 random points for prediction (for each realization) gave a total sample size of 15,000 to average out all sampling effects. For each realization, we tried several different values for \u00CE\u00BB, including choosing it dynamically by numerically minimizing the nonnormality mea- sure of Kass and Slate (1994) with respect to \u00CE\u00BB. For the two simulation studies, Figures 2.1 and 2.2, respectively show the distribution of the opti- mized \u00CE\u00BB values (having the least nonnormality) over 1,000 simulated data sets each for d = 1, . . . , 10. We can see that unless d is one or two, the 20 Chapter 2. optimal \u00CE\u00BB is usually close to zero. Since in computer experiments we are pri- marily interested in high-dimensional applications, we chose \u00CE\u00BB = 0 because there is no evidence that any other value is better for high d. That means using the log transformation for \u00CE\u00B8i ( i = 1, . . . , d ). Figures 2.3 and 2.4 contrast the frequentist performance of the plug-in and FBI methods by plotting nominal coverage levels (from 1% to 99%) vs. actual coverage for d = 1, 4, 7, and 10. The coverage probabilities were calculated by averaging over the 15 new points used for prediction and the 1,000 data sets (using \u00CE\u00BB = 0 for the log transformation). In addition to the solid line for the plug-in and the dashed line for FBI, a gray diag- onal is also shown in the middle of each plot to help guide the eye: the closer the curves are to the diagonal, the better the match between nominal coverage (horizontally) and true coverage (vertically). Without exception, FBI achieved closer matching coverage than the plug-in at all levels for all d = 1, . . . , 10 in both simulation studies. Results for d = 2, 3, 5, 6, 8, 9 were similar (not shown here). Except for d = 1, the dashed curves came remarkably close to the diagonal representing perfect matching (from 1% to 99% in Figures 2.3 and 2.4). Hence we can conclude that according to this frequentist criterion, FBI with \u00CE\u00BB = 0 provides approximately valid inference about prediction accuracy and is clearly superior to the plug-in method in this respect. Other \u00CE\u00BB values around zero yield similar results in terms of coverage probabilities. Also, using the optimal \u00CE\u00BB for each data set (instead of a fixed value) has no additional benefit. That suggests that the log transformation is nearly optimal in higher dimensions not only with respect to the nonnor- mality of the likelihood function, but also in terms of matching coverage probabilities of the FBI predictions bands. 21 Chapter 2. 1 2 3 4 5 6 7 8 9 10 \u00E2\u0088\u0092 3 \u00E2\u0088\u0092 2 \u00E2\u0088\u0092 1 0 1 2 3 d \u00CE\u00BB Figure 2.1: Optimal \u00CE\u00BB values in the first simulation study (n = 10 d) for d = 1, . . . , 10. 22 Chapter 2. 1 2 3 4 5 6 7 8 9 10 \u00E2\u0088\u0092 3 \u00E2\u0088\u0092 2 \u00E2\u0088\u0092 1 0 1 2 3 d \u00CE\u00BB Figure 2.2: Optimal \u00CE\u00BB values in the second simulation study (n = 5 d) for d = 1, . . . , 10. 23 Chapter 2. Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 1 plug\u00E2\u0088\u0092in FBI Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 4 plug\u00E2\u0088\u0092in FBI Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 7 plug\u00E2\u0088\u0092in FBI Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 10 plug\u00E2\u0088\u0092in FBI Figure 2.3: Coverage probabilities in the first simulation study (n = 10 d) for d = 1, 4, 7, and 10. 24 Chapter 2. Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 1 plug\u00E2\u0088\u0092in FBI Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 4 plug\u00E2\u0088\u0092in FBI Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 7 plug\u00E2\u0088\u0092in FBI Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 10 plug\u00E2\u0088\u0092in FBI Figure 2.4: Coverage probabilities in the second simulation study (n = 5 d) for d = 1, 4, 7, and 10. 25 Chapter 2. 2.5 Examples The prediction uncertainty assessments of the two methods were also com- pared on two real data sets by a computationally intensive version of cross validation. This was done by randomly splitting the data in two (for train- ing and validation) 100 times, and then averaging the resulting coverage probabilities the same way as for the 1,000 replicates for the simulations in Section 2.4. Here 100 replicates were sufficient because they were all subsets of the same data set. Also, for the design size n < 5d was sufficient because of strong correlations between the design sites. For a fixed design size n and a data set size m, the following steps were repeated 100 times: 1. Select n points randomly (without replacement) from the available m points. 2. Use the data for those n points to fit the GP model, using the log transformation for the range parameters (\u00CE\u00BB = 0). 3. For each \u00CE\u00B1 = 0.01, 0.02, . . . , 0.99, construct 100(1 \u00E2\u0088\u0092 \u00CE\u00B1) pointwise prediction bands for the remaining m\u00E2\u0088\u0092 n points by both methods. 4. Calculate coverage probabilities by counting how many of those m\u00E2\u0088\u0092n points are covered by the prediction bands of the plug-in and FBI for \u00CE\u00B1 = 0.01, 0.02, . . . , 0.99. Finally, the resulting actual coverage probabilities were averaged over the 100 replicates and plotted against the nominal levels to facilitate visual comparison to the simulation results. When doing so, we have to keep in mind that there is an important difference between simulated and real data sets. When one generates data from the GP model repeatedly, then one can expect that over the long-run, any useful inference method should show rea- sonably valid performance, since the data is from the true model, satisfying all modeling assumptions. But if the data comes from the real world, where 26 Chapter 2. Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 13 plug\u00E2\u0088\u0092in FBI Figure 2.5: Coverage probabilities for the Arctic sea ice example (n = 50). the GP model may or may not be appropriate, that can potentially lead to other inference difficulties. The first example from Chapman et al. (1994) had m = 157 data points in a 13-dimensional input space representing 157 successful runs of a dynamic-thermodynamic Arctic sea ice model with 13 inputs and four outputs. One of the outputs, sea ice velocity, proved especially resistant to prediction uncertainty assessments by the plug-in method, because the stan- dard errors of the predictions were too small and as a result, the prediction bands were always too narrow. To see whether FBI can quantify prediction uncertainty better, random subsets of n = 50 were chosen repeatedly (100 times) to fit the model, leaving the remaining 107 points for validation. Fig- ure 2.5 shows the coverage probabilities averaged over all repetitions. By looking at the solid line, it is apparent that the plug-in method indeed un- derestimated the uncertainty by a large margin. The dashed line for FBI is closer to the diagonal, indicating a better match. 27 Chapter 2. Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 41 plug\u00E2\u0088\u0092in FBI Figure 2.6: Coverage probabilities for the Wonderland example (n = 100). Figure 2.6 is for a more challenging 41-dimensional example with m = 500 data points, out of which n = 100 were used for fitting, leaving 400 for validation. This is the Wonderland simulator of Milik, Prskawetz, Fe- ichtinger, and Sanderson (1996) for global sustainability with 41 inputs. Here the response is a human development index. Again, the prediction bands of the plug-in are too narrow and the FBI is also far from perfect, often making the opposite mistake by stretching the bands too wide, as in- dicated by the portion of the dashed line over the diagonal. (Although one could argue that overcoverage is often preferable to undercoverage). But the true coverage of the FBI is still closer to the nominal than that of the plug-in at all confidence levels. We can see that in both cases, the coverage of the FBI has larger devia- tions than in the simulations (undercovering at lower levels and overcovering at higher ones). Nevertheless, at the highest confidence levels it is close to the diagonal, indicating a good match. For example, at the 95% nominal 28 Chapter 2. level, the actual coverage of the FBI is 95.7% in both cases. In contrast, the plug-in\u00E2\u0080\u0099s true coverage at the 95% level is only 67.8% in Figure 2.5 and 75.7% in Figure 2.6. 2.6 Dealing with the process variance This section formally defines the likelihood L(\u00CE\u00B8) that is a function of only the range parameters. Two possible ways are presented for eliminating the process variance \u00CF\u00832: \u00E2\u0080\u009Cmaximizing out\u00E2\u0080\u009D to get the profile likelihood and \u00E2\u0080\u009Cinte- grating out\u00E2\u0080\u009D to get the integrated likelihood (see Berger, Liseo, and Wolpert (1999) for a general discussion of these methods). While profiling is common in likelihood-based settings, Bayesians are usually more comfortable with in- tegrating. Although in this case the same L(\u00CE\u00B8) function is obtained both ways, interpretations can still differ depending on the underlying framework. 2.6.1 Profile likelihood Given \u00CE\u00B8, L(\u00CF\u00832, \u00CE\u00B8) in equation (2.2) has a unique maximum at \u00CF\u0083\u00CC\u00822(\u00CE\u00B8) = yTR\u00E2\u0088\u00921y n . (2.5) This is easily obtained by differentiating L(\u00CF\u00832, \u00CE\u00B8) with respect to \u00CF\u00832 or by observing that given \u00CE\u00B8 and y, the likelihood (2.2) is proportional to an Inverse Gamma density function with respect to the variable \u00CF\u00832: \u00CF\u00832 | \u00CE\u00B8, y \u00E2\u0088\u00BC IG ( n 2 \u00E2\u0088\u0092 1, yTR\u00E2\u0088\u00921y 2 ) and using the b/(a + 1) formula for the mode of an Inverse Gamma distri- bution IG(a, b) with density function f( x | a, b ) = ba exp { \u00E2\u0088\u0092 bx } \u00CE\u0093(a) xa+1 . 29 Chapter 2. Plugging in \u00CF\u0083\u00CC\u00822(\u00CE\u00B8) from (2.5) into (2.2) yields the profile likelihood: L(\u00CE\u00B8) \u00E2\u0088\u009D 1 (\u00CF\u0083\u00CC\u00822(\u00CE\u00B8)) n 2 |R| 1 2 exp { \u00E2\u0088\u0092 yTR\u00E2\u0088\u00921y 2\u00CF\u0083\u00CC\u00822(\u00CE\u00B8) } \u00E2\u0088\u009D (yTR\u00E2\u0088\u00921y)\u00E2\u0088\u0092 n 2 |R|\u00E2\u0088\u0092 1 2 . Now the maximum likelihood estimation can be done using L(\u00CE\u00B8) instead of the original L(\u00CF\u00832, \u00CE\u00B8), reducing the dimensionality of the required numerical optimization by one. 2.6.2 Integrated likelihood Bayesians prefer to put a prior distribution on \u00CF\u00832 before eliminating it. Ac- cording to Berger et al. (2001), the most common choice is that of Handcock and Stein (1993), who used the improper prior 1/\u00CF\u00832 for \u00CF\u00832 > 0. This can be interpreted as a relative weight function giving prior weights inversely proportional to the magnitude, encouraging \u00CF\u00832 to be close to zero. Let \u00CF\u0080(\u00CE\u00B8) denote the prior for the range parameters, independent of \u00CF\u00832. Then the joint prior is of the form \u00CF\u0080(\u00CE\u00B8)/\u00CF\u00832 and the posterior is obtained by multiplying with the likelihood (2.2): \u00CF\u0080(\u00CE\u00B8) \u00CF\u00832 L(\u00CF\u00832, \u00CE\u00B8) \u00E2\u0088\u009D \u00CF\u0080(\u00CE\u00B8) (\u00CF\u00832) n 2 +1 |R| 1 2 exp { \u00E2\u0088\u0092 yTR\u00E2\u0088\u00921y 2\u00CF\u00832 } and notice that \u00CF\u00832 | \u00CE\u00B8, y \u00E2\u0088\u00BC IG ( n 2 , yTR\u00E2\u0088\u00921y 2 ) which means that \u00CF\u00832 can be integrated out from the posterior to get the marginal posterior of \u00CE\u00B8: \u00E2\u0088\u00AB \u00E2\u0088\u009E 0 \u00CF\u0080(\u00CE\u00B8) (\u00CF\u00832) n 2 +1 |R| 1 2 exp { \u00E2\u0088\u0092 yTR\u00E2\u0088\u00921y 2\u00CF\u00832 } d\u00CF\u00832 = \u00CF\u0080(\u00CE\u00B8) \u00CE\u0093 ( n 2 ) ( yTR \u00E2\u0088\u00921 y 2 )n 2 |R| 1 2 \u00E2\u0088\u009D \u00CF\u0080(\u00CE\u00B8)L(\u00CE\u00B8). Note that after integrating, the posterior for \u00CE\u00B8 is proportional to the prior for \u00CE\u00B8 times the same likelihood function L(\u00CE\u00B8) as above, which means that 30 Chapter 2. in this case profiling and integrating leads to the same likelihood function for the remaining parameters. 2.7 Fast Bayesian Inference in detail Using the notation \u00CE\u00B3 = (log \u00CE\u00B81, . . . , log \u00CE\u00B8d) T = log \u00CE\u00B8 for the transformed parameter vector and \u00CE\u00B8 = (exp \u00CE\u00B31, . . . , exp \u00CE\u00B3d) T = exp\u00CE\u00B3 for the inverse transformation, the transformed likelihood function L(exp\u00CE\u00B3) tends to have a shape that is closer to a normal distribution with respect to \u00CE\u00B3 than the shape of the original L(\u00CE\u00B8) with respect to \u00CE\u00B8. Working with log-likelihoods, the equivalent statement is that l(exp \u00CE\u00B3) is usually more quadratic than l(\u00CE\u00B8), which incidentally can also help the Maximum Likelihood Estimation that needs to be done numerically. Another advantage of the log transformation is that it makes the numerical optimization of the log-likelihood unconstrained: \u00CE\u00B3 \u00E2\u0088\u0088 Rd. This is the first step of Fast Bayesian Inference, that can be summarized as follows: 1. Maximize the log-likelihood l(exp\u00CE\u00B3) to get the MLE of \u00CE\u00B3, denoted \u00CE\u00B3\u00CC\u0082. 2. Compute the Hessian matrix of second derivatives of the log-likelihood at \u00CE\u00B3\u00CC\u0082, denoted H\u00CE\u00B3\u00CC\u0082 . 3. Sample from the multivariate normal distribution N(\u00CE\u00B3\u00CC\u0082, \u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 ) to ob- tain M = 400 Monte Carlo samples: \u00CE\u00B3(1), . . . , \u00CE\u00B3(M). 4. The FBI predictor is obtained by averaging: 1 M M\u00E2\u0088\u0091 i=1 y\u00CC\u00820(exp\u00CE\u00B3 (i)), and its Mean Squared Error can be computed by the the variance 31 Chapter 2. decomposition formula: 1 M M\u00E2\u0088\u0091 i=1 MSEy\u00CC\u00820 ( \u00CF\u0083\u00CC\u00822(exp \u00CE\u00B3(i)), exp\u00CE\u00B3(i) ) + + 1 M \u00E2\u0088\u0092 1 M\u00E2\u0088\u0091 j=1 ( y\u00CC\u00820(exp \u00CE\u00B3 (j))\u00E2\u0088\u0092 1 M M\u00E2\u0088\u0091 i=1 y\u00CC\u00820(exp\u00CE\u00B3 (i)) )2 , that is the average MSE of the plug-in predictors plus the sample variance of those predictors. It is instructive to compare this sequence to the plug- in method (as described in Section 2.2). Both start by locating the MLE. After that the plug-in method jumps into the prediction phase right away, assuming that the value found at the mode is the one best estimate of the truth. The FBI is more careful. In the second step it looks at the curvature of the log-likelihood at the MLE to quantify the uncertainty in the estimation of the point estimate. For example, if the surface is flat, that means high uncertainty and the corresponding normal posterior in step 3 will have a high variance reflecting that uncertainty. In the final step, the FBI averages predictions based on the sample from that normal posterior. Again, there is a part that is identical to the plug-in method, since for each sample point, equations (2.3) and (2.4) are used to calculate the predictor and its Mean Squared Error, respectively (also using (2.5) to estimate \u00CF\u00832 for a given \u00CE\u00B3(i) in the sample). This way the FBI will have many predictions to average (one for each sample point), while the plug-in method will have just one. Hence, the plug-in can be viewed as a special case of the FBI with Monte Carlo sample size M = 1. 2.8 Concluding remarks We have introduced a new method for quantifying prediction uncertainty in computer experiments that is conceptually simple and easy to implement 32 Chapter 2. in practice. We have also shown how much the traditional plug-in method can underestimate prediction uncertainty by ignoring parameter uncertainty. Fast Bayesian Inference can potentially correct this deficiency by incorpo- rating the uncertainty around the MLE. This is accomplished by utilizing a non-interfering prior that leaves the mode of the likelihood where it is and also leaves the curvature at the mode unchanged by a normal posterior that matches that curvature (up to the second order). We have also found that the log transformation for the range parameters was effective in limiting (third order) nonnormality. The main advantage of a normal posterior is that it allows one to draw independent samples from it directly, facilitating fast and easy Bayesian analysis. Although we are not dealing explicitly with the uncertainty in estimating the parameter \u00CF\u00832, we have seen that incorpo- rating only the uncertainty in estimating \u00CE\u00B8 (and plugging in the MLE of \u00CF\u00832 conditional on \u00CE\u00B8) can propagate sufficient parameter uncertainty through the model for potentially valid prediction uncertainty assessments. The implementation of the FBI method is straightforward, since it is a simple add-on to the plug-in. It can also be included in a commercial or open source software package as black box computer code, since the user does not need to know anything about its inner workings. Runtimes are comparable to that of the plug-in, since computations are dominated by the numerical optimization required to find the MLE. Hence, the word fast in the name of the method is applicable to both implementation or coding time and execution or run time. Finally, it is important to point out that when one expects the FBI to give valid prediction uncertainty assessments, one needs to keep in mind the two fundamental limitations of our study. The first one was mentioned already: the potential validity of the method rests on the assumption of a Gaussian process as the data generating mechanism. However, for real data, this assumption may be inadequate or totally wrong and results will be entirely dependent on the real underlying function. 33 Chapter 2. The second serious limitation is that we studied the frequentist properties of the prediction bands in terms of coverage probabilities. Hence, validity is implied only over a long sequence of identical trials, according to the classical frequentist interpretation. But in practice, most of the time there is just one unique data set. However, the use of this criterion is not limited to frequentists. It is not uncommon for Bayesians to use it as a sanity check for their Bayesian credible regions. For example, Bayarri and Berger (2004) argue that \u00E2\u0080\u009Cthere is a sense in which essentially everyone should ascribe to frequentism\u00E2\u0080\u009D and provide the following version of the frequentist principle: \u00E2\u0080\u009CIn repeated practical use of a statistical procedure, the long-run average actual accuracy should not be less than (and ideally should equal) the long- run average reported accuracy\u00E2\u0080\u009D. 34 Bibliography Abt, M. (1999), \u00E2\u0080\u009CEstimating the Prediction Mean Squared Error in Gaus- sian Stochastic Processes with Exponential Correlation Structure,\u00E2\u0080\u009D Scan- dinavian Journal of Statistics, 26, 563\u00E2\u0080\u0093578. Bayarri, M. J. and Berger, J. O. (2004), \u00E2\u0080\u009CThe Interplay of Bayesian and Frequentist Analysis,\u00E2\u0080\u009D Statistical Science, 19, 58\u00E2\u0080\u009380. Berger, J. O., De Oliveira, V., and Sanso\u00CC\u0081, B. (2001), \u00E2\u0080\u009CObjective Bayesian Analysis of Spatially Correlated Data,\u00E2\u0080\u009D Journal of the American Statistical Association, 96, 1361\u00E2\u0080\u00931374. Berger, J. O., Liseo, B., and Wolpert, R. L. (1999), \u00E2\u0080\u009CIntegrated Likelihood Methods for Eliminating Nuisance Parameters,\u00E2\u0080\u009D Statistical Science, 14, 1\u00E2\u0080\u0093 28. Box, G. E. P. and Cox, D. R. (1964), \u00E2\u0080\u009CAn Analysis of Transformations,\u00E2\u0080\u009D Journal of the Royal Statistical Society. Series B (Methodological), 26, 211\u00E2\u0080\u0093 252. Chapman, W. L., Welch, W. J., Bowman, K. P., Sacks, J., and Walsh, J. E. (1994), \u00E2\u0080\u009CArtic sea ice variability: Model sensitivities and a multidecadal simulation,\u00E2\u0080\u009D Journal of Geophysical Research, 99, 919\u00E2\u0080\u0093936. Chen, X. (1996), \u00E2\u0080\u009CProperties of Models for Computer Experiments,\u00E2\u0080\u009D Ph.D. thesis, University of Waterloo. Currin, C., Mitchell, T., Morris, M., and Ylvisaker, D. (1991), \u00E2\u0080\u009CBayesian Prediction of Deterministic Functions, with Applications to the Design and 35 Bibliography Analysis of Computer Experiments,\u00E2\u0080\u009D Journal of the American Statistical Association, 86, 953\u00E2\u0080\u0093963. Handcock, M. S. and Stein, M. L. (1993), \u00E2\u0080\u009CA Bayesian Analysis of Kriging,\u00E2\u0080\u009D Technometrics, 35, 403\u00E2\u0080\u0093410. Karuri, S. W. (2005), \u00E2\u0080\u009CIntegration in Computer Experiments and Bayesian Analysis,\u00E2\u0080\u009D Ph.D. thesis, University of Waterloo. Kass, R. E. and Slate, E. H. (1994), \u00E2\u0080\u009CSome Diagnostics of Maximum Like- lihood and Posterior Nonnormality,\u00E2\u0080\u009D The Annals of Statistics, 22, 668\u00E2\u0080\u0093695. Linkletter, C., Bingham, D., Hengartner, N., Higdon, D., and Ye, K. Q. (2006), \u00E2\u0080\u009CVariable Selection for Gaussian Process Models in Computer Ex- periments,\u00E2\u0080\u009D Technometrics, 48, 478\u00E2\u0080\u0093490. Loeppky, J. L., Sacks, J., and Welch, W. J. (2008), \u00E2\u0080\u009CChoosing the Sam- ple Size of a Computer Experiment: A Practical Guide,\u00E2\u0080\u009D Tech. Rep. 238, Department of Statistics, The University of British Columbia. McKay, M. D., Beckman, R. J., and Conover, W. J. (1979), \u00E2\u0080\u009CA Comparison of Three Methods for Selecting Values of Input Variables in the Analysis of Output from a Computer Code,\u00E2\u0080\u009D Technometrics, 21, 239\u00E2\u0080\u0093245. Mease, D. and Bingham, D. (2006), \u00E2\u0080\u009CLatin Hyperrectangle Sampling for Computer Experiments,\u00E2\u0080\u009D Technometrics, 48, 467\u00E2\u0080\u0093477. Milik, A., Prskawetz, A., Feichtinger, G., and Sanderson, W. C. (1996), \u00E2\u0080\u009CSlow-fast dynamics in Wonderland,\u00E2\u0080\u009D Environmental Modeling and As- sessment, 1, 3\u00E2\u0080\u009317. Morris, M. D. and Mitchell, T. J. (1995), \u00E2\u0080\u009CExploratory Designs for Compu- tational Experiments,\u00E2\u0080\u009D Journal of Statistical Planning and Inference, 43, 381\u00E2\u0080\u0093402. 36 Bibliography Nagy, B., Loeppky, J. L., and Welch, W. J. (2007), \u00E2\u0080\u009CFast Bayesian Infer- ence for Gaussian Process Models,\u00E2\u0080\u009D Tech. Rep. 230, Department of Statis- tics, The University of British Columbia. O\u00E2\u0080\u0099Hagan, A. (1994), Kendall\u00E2\u0080\u0099s Advanced Theory of Statistics. Volume 2B: Bayesian Inference, Cambridge University Press. Sacks, J., Welch, W. J., Mitchell, T. J., and Wynn, H. P. (1989), \u00E2\u0080\u009CDe- sign and Analysis of Computer Experiments (C/R: P423-435),\u00E2\u0080\u009D Statistical Science, 4, 409\u00E2\u0080\u0093423. Santner, T. J., Williams, B. J., and Notz, W. (2003), The Design and Analysis of Computer Experiments, Springer Verlag, New York. Steinberg, D. M. and Bursztyn, D. (2004), \u00E2\u0080\u009CData Analytic Tools for Under- standing Random Field Regression Models,\u00E2\u0080\u009D Technometrics, 46, 411\u00E2\u0080\u0093420. Tang, B. (1993), \u00E2\u0080\u009COrthogonal Array-based Latin Hypercubes,\u00E2\u0080\u009D Journal of the American Statistical Association, 88, 1392\u00E2\u0080\u00931397. Tukey, J. W. (1957), \u00E2\u0080\u009COn the Comparative Anatomy of Transformations,\u00E2\u0080\u009D The Annals of Mathematical Statistics, 28, 602\u00E2\u0080\u0093632. Welch, W. J., Buck, R. J., Sacks, J., Wynn, H. P., Mitchell, T. J., and Morris, M. D. (1992), \u00E2\u0080\u009CScreening, Predicting, and Computer Experiments,\u00E2\u0080\u009D Technometrics, 34, 15\u00E2\u0080\u009325. 37 Chapter 3 Inference for covariance parameters of a random function by likelihood-based approximations 3.1 Introduction Random function models, also known as Gaussian process models or krig- ing models, have a long history in spatial statistics (Cressie, 1993). Other important application areas include the design and analysis of computer experiments dating back to Sacks, Welch, Mitchell, and Wynn (1989) and more recently machine learning (Rasmussen and Williams, 2006). Although sometimes the model parameters themselves can be of interest (Mardia and Marshall, 1984; Abt and Welch, 1998; Wang and Zhang, 2003), usually one is more interested in prediction than parameter estimation. Like- wise, the main interest is quantifying prediction uncertainty instead of pa- rameter uncertainty. However, ignoring the uncertainty in estimating the parameters leads to underestimating the uncertainty in predictions (Abt, 1999). A version of this chapter will be submitted for publication. Authors: Nagy B., Loeppky J.L., Welch W.J. 38 Chapter 3. Our interest in this problem arose because of Fast Bayesian Inference (FBI) for deterministic computer codes, as described in Chapter 2, suggest- ing that quantifying parameter uncertainty was the key to good prediction uncertainty assessments. Our primary goal in this chapter is to investi- gate how well the covariance parameters can be estimated using the FBI framework. A secondary goal is to evaluate how well the likelihood can be approximated by a normal density function, which is another important as- pect of the FBI method and its ability to accurately and efficiently assess the uncertainty in predictions. In computer experiments, a random function model is used as a com- putationally cheap statistical surrogate for a complex mathematical model, implemented as a computer code. Often it takes a considerable amount of time to run the code because of the large amounts of computation involved. In general, it is not possible to run them at each input combination of in- terest because that would lead to a combinatorial explosion for models with several input variables. In these cases the surrogate can be used to approx- imate the output of the code, based on the outputs from a relatively small sample from the input space. Hence, from the practitioners\u00E2\u0080\u0099 point of view, small sample results are more relevant in computer experiments than large sample results. We eval- uate small sample properties by extensive simulations. Existing theory is not very helpful in this context, since it is built mostly on asymptotic argu- ments (see Stein (1999); Zhang and Zimmerman (2005); Furrer (2005) for the current state-of-the-art of theoretical development). After reviewing the statistical model used by FBI in the next section together with the related issue of reparameterizations, Section 3.3 describes two sets of simulations using the same model as in Chapter 2, with the same reparameterization (log transformation). Section 3.4 presents the simulation results for the estimation of the parameters, including an assessment of the uncertainty in the estimation by individual and joint confidence sets. 39 Chapter 3. Likelihood-based and Bayesian methods used to obtain those results are discussed in Section 3.5. We finish the chapter with some concluding remarks in Section 3.6. 3.2 Statistical Model We consider a deterministic computer code with a single output that is a smooth function of d \u00E2\u0089\u00A5 1 input variables. Here we reuse the model in Sec- tion 2.2, Chapter 2, that is a version of the statistical formulation in Sacks et al. (1989), Currin, Mitchell, Morris, and Ylvisaker (1991), or Welch, Buck, Sacks, Wynn, Mitchell, and Morris (1992), treating the response (code out- put) as if it was a realization of a real-valued, zero-mean Gaussian stochastic process Z(x) on the d-dimensional real vector x = (x1, x2, . . . , xd) T : Y (x) = Z(x). Z(x) is parameterized by the process variance \u00CF\u00832 and the \u00CE\u00B8i range parame- ters in the Gaussian correlation function: Corr(Z(w), Z(x)) = R(w, x) = d\u00E2\u0088\u008F i=1 exp { \u00E2\u0088\u0092\u00CE\u00B8i(wi \u00E2\u0088\u0092 xi) 2 } , (3.1) specifying that the correlation is a function of the squared distance between the coordinates of the input vectors w and x, scaled by the \u00CE\u00B8i parameters along the d dimensions ( i = 1, . . . , d ). 3.2.1 Likelihood The likelihood is a function of d+ 1 variables: the range parameters in the d-dimensional vector \u00CE\u00B8 = (\u00CE\u00B81, \u00CE\u00B82, . . . , \u00CE\u00B8d) T and the process variance \u00CF\u00832: L(\u00CF\u00832, \u00CE\u00B8) \u00E2\u0088\u009D 1 (\u00CF\u00832) n 2 |R| 1 2 exp { \u00E2\u0088\u0092 yTR\u00E2\u0088\u00921y 2\u00CF\u00832 } , (3.2) 40 Chapter 3. where the n \u00C3\u0097 1 vector y contains the n outputs of the computer code for the n design points in the input space, and R is the n\u00C3\u0097n design correlation matrix (a function of \u00CE\u00B8), as specified by (3.1). 3.2.2 Profile likelihood By differentiating (3.2) with respect to \u00CF\u00832, we get that given \u00CE\u00B8, the likelihood L(\u00CF\u00832, \u00CE\u00B8) reaches its maximum at \u00CF\u0083\u00CC\u00822(\u00CE\u00B8) = yTR\u00E2\u0088\u00921y n . (3.3) Now if we plug in \u00CF\u0083\u00CC\u00822(\u00CE\u00B8) in (3.3) in place of \u00CF\u00832 into (3.2), we get the profile likelihood L(\u00CE\u00B8) that is only a function of the d range parameters: L(\u00CE\u00B8) \u00E2\u0088\u009D 1 (\u00CF\u0083\u00CC\u00822(\u00CE\u00B8)) n 2 |R| 1 2 exp { \u00E2\u0088\u0092 yTR\u00E2\u0088\u00921y 2\u00CF\u0083\u00CC\u00822(\u00CE\u00B8) } \u00E2\u0088\u009D (yTR\u00E2\u0088\u00921y)\u00E2\u0088\u0092 n 2 |R|\u00E2\u0088\u0092 1 2 . (3.4) Note that one can get the Maximum Likelihood Estimate (MLE) of \u00CE\u00B8, de- noted \u00CE\u00B8\u00CC\u0082, by maximizing L(\u00CE\u00B8), and then get the MLE of \u00CF\u00832 by plugging in \u00CE\u00B8\u00CC\u0082 into (3.3). 3.2.3 Log transformation For parameters that can take only positive values, the log transformation is commonly employed in statistics for various reasons. One such objective is to improve normality of the likelihood for small sample sizes, as argued by Sprott (1973). A thorough investigation of this subject was provided by Slate (1991), showing how reparameterizations of statistical models can make the shape of the likelihood or posterior more Gaussian, enabling good normal approximations. Karuri (2005) observed that in a Bayesian setting, the log transforma- tion of the range parameters in a random function model improved approxi- mate normality of the posterior for one- and two-dimensional examples and 41 Chapter 3. demonstrated its usefulness for integration and prediction. Nagy, Loeppky, and Welch (2007a) found that in the one-dimensional (d = 1) case this was a general trend for this model, too: the log transfor- mation tends to reduce nonnormality of the profile likelihood, as quantified by two nonnormality measures in Sprott (1973). (In subsection 3.2.5, we revisit one of those measures to illustrate which transformations one could expect to be optimal for reducing nonnormality in the d = 1 case). In Chapter 2 and earlier in Nagy, Loeppky, andWelch (2007b) we demon- strated the usefulness of working on the log scale for d = 1, . . . , 10 for the prediction uncertainty problem across a wide range of parameter settings. Using a multivariate nonnormality measure of Kass and Slate (1994), in Sec- tion 2.4, Chapter 2, we also showed that the log transformation was nearly optimal for large d in the class of power transformations. 3.2.4 Example To give some intuition about the relationship between the likelihood, the profile likelihood, and the log transformation, we present a one-dimensional (d = 1) toy example. Although the log transformation is rarely ideal for d = 1 (as we will show in the next subsection), it can still illustrate the general principles using the simplest possible case (and leave it up to the readers\u00E2\u0080\u0099 imagination to extrapolate from that to higher-dimensional cases). This example was created the following way: after simulating n = 3 data points from a one-dimensional random function repeatedly, using \u00CE\u00B8 = 0.2, \u00CF\u00832 = 1, and an equispaced design {0, 0.5, 1}, we chose a realization where the log transformation was particularly successful in improving the approximate normality of the profile likelihood (for other realizations the approximation was also substantially helped by the log transformation, but in general not as much as for the one chosen here for illustration; see Nagy et al. (2007a) for simulations and quantitative arguments based on two nonnormality mea- sures of Sprott (1973) about the effect of the log transformation for d = 1 42 Chapter 3. Likelihood contour (original scale) \u00CE\u00B8 \u00CF\u0083 2 0.00 0.05 0.10 0.15 0.20 0.25 0. 0 0. 5 1. 0 1. 5 2. 0 Likelihood contour (log scale) log \u00CE\u00B8 lo g \u00CF\u0083 2 \u00E2\u0088\u00925 \u00E2\u0088\u00924 \u00E2\u0088\u00923 \u00E2\u0088\u00922 \u00E2\u0088\u0092 3 \u00E2\u0088\u0092 2 \u00E2\u0088\u0092 1 0 0.00 0.05 0.10 0.15 0.20 0.25 0 5 10 15 20 25 30 35 Profile likelihood (original scale) \u00CE\u00B8 Li ke lih oo d \u00E2\u0088\u00925 \u00E2\u0088\u00924 \u00E2\u0088\u00923 \u00E2\u0088\u00922 0 5 10 15 20 25 30 35 Profile likelihood (log scale) log \u00CE\u00B8 Li ke lih oo d Figure 3.1: The log transformation improved approximate normality of the profile likelihood for this one-dimensional (d = 1) example. The top two plots are for the two-parameter likelihood and the bottom two for the one- parameter profile likelihood. The ridges of the contours are marked by the dashed lines, reaching their apex at the MLE. Below the contour plots, these dashed lines are plotted as functions of the range parameter, representing the profile likelihood function. In addition to the profile likelihoods (dashed curves), their normal approximation is also shown for comparison (dotted curves). 43 Chapter 3. and n = 3, 6, 9, 12). Likelihood functions for this example are plotted in Figure 3.1. On the original scale (left), the contour plot of the two-parameter likelihood (3.2) is highly nonnormal, having a banana-shaped peak around the Maximum Likelihood Estimate and a sharp ridge along the axes, marked by the dashed line. Below the contour plot, the one-parameter version of this dashed line is also highly nonnormal. This is the profile likelihood (3.4) that can be obtained by maximizing (3.2) over all \u00CF\u00832 given \u00CE\u00B8. The dotted line is an unnormalized normal density function centered on the MLE of the range parameter with variance set to the negative inverse of the second deriva- tive of the log profile likelihood at the MLE. We can see that this normal approximation of L(\u00CE\u00B8) is a poor approximation of the profile likelihood. In contrast, on the log scale (right), the contours are more ellipsoidal, suggesting less nonnormality. Below that, the difference is even more strik- ing for the profile likelihood (dashed) that is virtually indistinguishable from its normal approximation (dotted) over the domain of log \u00CE\u00B8 shown (corre- sponding to the domain of \u00CE\u00B8 on the left). At first look it may not be apparent that there are two separate lines in this plot (one dashed and one dotted) that overlap almost perfectly. In Chapter 2, we used the log transformation to quantify prediction uncertainty for d = 1, . . . , 10. We follow this reparameterization in this chapter for both the process variance and the range parameters. All of these parameters are positive-valued and here we work with all of them on the log scale for estimation purposes. The nonnormality measure of Kass and Slate (1994) used in Chapter 2 indicated that although the log transformation was nearly optimal in higher dimensions, this was not necessarily the case in low dimensions. This was especially apparent for d = 1 and we decided to double-check that finding using a different measure that is the subject of the next subsection. 44 Chapter 3. 3.2.5 One-dimensional special case For a scalar \u00CE\u00B8, let l(\u00CE\u00B8) = logL(\u00CE\u00B8) denote the logarithm of the profile likeli- hood, \u00CE\u00B8\u00CC\u0082 the Maximum Likelihood Estimate (MLE) of \u00CE\u00B8, and l\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) and l\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) the second- and third-derivatives of l(\u00CE\u00B8) at the MLE, respectively. Following Sprott (1973), define the Expected nonnormality (ENN) measure for \u00CE\u00B8: ENN for \u00CE\u00B8 = | El\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) (\u00E2\u0088\u0092El\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082))\u00E2\u0088\u0092 3 2 |. The intuition is that the expectation of the third derivative standardized by the expectation of the second derivative measures the deviation from normal- ity (see Appendix A for taking expectations). This measure is appropriate when one wishes to consider a family of possible likelihoods without condi- tioning on any particular data set. Sprott (1973) also provided a formula that quantifies the effect of a transformation \u00CF\u0086 on nonnormality, where \u00CF\u0086 is a twice differentiable function of \u00CE\u00B8. After the \u00CF\u0086 transformation, ENN for \u00CF\u0086(\u00CE\u00B8) = \u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u00A3El\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) (\u00E2\u0088\u0092El\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082))\u00E2\u0088\u0092 32 + 3 \u00CF\u0086 \u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) \u00CF\u0086\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) (\u00E2\u0088\u0092El\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082)) 1 2 \u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u00A3 , where the first term inside the absolute value is the same as before in the definition of the ENN for \u00CE\u00B8 and the second term is the effect of the trans- formation \u00CF\u0086. As in Chapter 2, we use the family of power transformations originally explored by Tukey (1957) and later extended by Box and Cox (1964), indexed by a real \u00CE\u00BB that includes no transformation (for \u00CE\u00BB = 1) and the log transformation (for \u00CE\u00BB = 0) for the positive \u00CE\u00B8 range parameter: \u00CF\u0086(\u00CE\u00B8) = \u00EF\u00A3\u00B1\u00EF\u00A3\u00B2 \u00EF\u00A3\u00B3\u00CE\u00B8 \u00CE\u00BB, \u00CE\u00BB 6= 0, log \u00CE\u00B8, \u00CE\u00BB = 0. 45 Chapter 3. 3 3 3 3 3 3 3 3 3 0 5 10 15 20 \u00E2\u0088\u0092 1. 4 \u00E2\u0088\u0092 1. 2 \u00E2\u0088\u0092 1. 0 \u00E2\u0088\u0092 0. 8 \u00E2\u0088\u0092 0. 6 \u00E2\u0088\u0092 0. 4 \u00E2\u0088\u0092 0. 2 0. 0 \u00CE\u00B8^ \u00CE\u00BB^ 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 9 9 9 9 9 9 9 9 9 9 9 9 9 9 90 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Figure 3.2: Optimal \u00CE\u00BB\u00CC\u0082 values for d = 1 and n = 3, . . . , 10 as a function of \u00CE\u00B8\u00CC\u0082. The digits 3, . . . , 9 in the plot represent the design sample size n and the digit 0 represents n = 10. The lines for n = 8, n = 9, and n = 10 do not start on the left side of the plot because of numerical difficulties for small \u00CE\u00B8\u00CC\u0082. 46 Chapter 3. The equation ENN for \u00CF\u0086(\u00CE\u00B8) = 0 has the following solution for \u00CE\u00BB: \u00CE\u00BB\u00CC\u0082 = 1 + \u00CE\u00B8\u00CC\u0082 El\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) 3 El\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) . The optimal \u00CE\u00BB\u00CC\u0082 values for d = 1, n = 3, . . . , 10, and \u00CE\u00B8\u00CC\u0082 between 0.2 and 20 are plotted in Figure 3.2. Unlike the simulations where we use random Latin hypercubes (McKay, Beckman, and Conover, 1979), the design here is fixed and equally spaced: { i/(n\u00E2\u0088\u0092 1) : i = 0, . . . , n\u00E2\u0088\u0092 1 }. Note that some values are missing for n = 8, 9, and 10 because of ill-conditioned correlation matrices that could not be inverted for small \u00CE\u00B8\u00CC\u0082 (see Appendix A for more details). Now we can see that it is no coincidence that the normal approximation of the profile likelihood for the one-dimensional example in Figure 3.1 is so good on the log scale, since \u00CE\u00BB\u00CC\u0082 is close to zero for small \u00CE\u00B8\u00CC\u0082 when n = 3. The values in this plot are also consistent with the box-plots for d = 1 in Figures 2.1 and 2.2 in Chapter 2, indicating that the optimal \u00CE\u00BB\u00CC\u0082 can be substantially less than zero for larger \u00CE\u00B8\u00CC\u0082 or larger n. This also suggests an explanation to the anomaly why the results of the FBI in the d = 1 case are often less satisfactory than the results for d > 1 when trying to quantify prediction uncertainty in Chapter 2 and Nagy et al. (2007b). We will see that the d = 1 case is also quite special with respect to parameter estimation when we present our results in Section 3.4. 3.3 Simulations To be able to compare prediction uncertainty assessments in Chapter 2 with parameter uncertainty assessments in this chapter, we replicated the simulations in Chapter 2, setting the common range parameter \u00CE\u00B8 = 25/(d+ 1)2 and the sample size n = 10d for the first set, and \u00CE\u00B8 = 5/(d+1)2, n = 5d for the second set (d = 1, . . . , 10). The process variance \u00CF\u00832 was fixed at constant 1 for all 20 simulations. To obtain 1,000 replicates for a given 47 Chapter 3. combination of the sample size n and the range parameter \u00CE\u00B8, the following steps were repeated 1,000 times: 1. Select a random n point design by Latin hypercube sampling in [0, 1]d (McKay et al., 1979). 2. Generate a realization of the Gaussian process over the n points by setting \u00CF\u00832 to 1 and \u00CE\u00B8i to \u00CE\u00B8 for i = 1, . . . , d. 3. Find the MLE of the range parameters by numerically optimizing the log profile likelihood, and then apply formula (3.3) to get the MLE of \u00CF\u00832. 4. Estimate the parameters together with standard errors based on the MLE and the observed information, i.e. standard errors were obtained by taking square roots of the diagonal elements of the negative inverse of the Hessian matrix of second derivatives evaluated at the MLE. Using the notation \u00CE\u00BE = log \u00CF\u00832 for the log transformed process variance and \u00CE\u00B3 = (log \u00CE\u00B81, . . . , log \u00CE\u00B8d) T = log \u00CE\u00B8 for the transformed \u00CE\u00B8 vector and \u00CF\u00832 = exp \u00CE\u00BE, \u00CE\u00B8 = (exp \u00CE\u00B31, . . . , exp \u00CE\u00B3d) T = exp\u00CE\u00B3 for the inverse transforma- tions, the Hessian at the MLE is \u00E2\u0088\u00872 logL(exp \u00CE\u00BE\u00CC\u0082, exp \u00CE\u00B3\u00CC\u0082), where \u00CE\u00BE\u00CC\u0082 and \u00CE\u00B3\u00CC\u0082 are the maximum likelihood estimates of \u00CE\u00BE and the vector \u00CE\u00B3, respectively, and \u00E2\u0088\u00872 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) is defined as \u00EF\u00A3\u00AB \u00EF\u00A3\u00AC\u00EF\u00A3\u00AC\u00EF\u00A3\u00AC\u00EF\u00A3\u00AC\u00EF\u00A3\u00AC\u00EF\u00A3\u00AC\u00EF\u00A3\u00AD \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00BE2 \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00BE \u00E2\u0088\u0082\u00CE\u00B31 . . . \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00BE \u00E2\u0088\u0082\u00CE\u00B3d \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B31 \u00E2\u0088\u0082\u00CE\u00BE \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B32 1 . . . \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B31 \u00E2\u0088\u0082\u00CE\u00B3d ... ... . . . ... \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B3d \u00E2\u0088\u0082\u00CE\u00BE \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B3d \u00E2\u0088\u0082\u00CE\u00B31 . . . \u00E2\u0088\u00822 logL(exp \u00CE\u00BE, exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B32 d \u00EF\u00A3\u00B6 \u00EF\u00A3\u00B7\u00EF\u00A3\u00B7\u00EF\u00A3\u00B7\u00EF\u00A3\u00B7\u00EF\u00A3\u00B7\u00EF\u00A3\u00B7\u00EF\u00A3\u00B8 . The observed information matrix is the negative Hessian matrix of second derivatives evaluated at the MLE: \u00E2\u0088\u0092\u00E2\u0088\u00872 logL(exp \u00CE\u00BE\u00CC\u0082, exp \u00CE\u00B3\u00CC\u0082). In Section 3.5 we describe well-known asymptotic methods using the inverse of this matrix to quantify the uncertainty in the estimation of the parameters \u00CE\u00BE and \u00CE\u00B3i 48 Chapter 3. ( i = 1, . . . , d ). But before that, in the next section, first we present a summary of the results, showing that on the log scale these methods work quite well for finite sample sizes. Summary statistics for the 1,000 replicates were obtained for the log transformed model parameters. Here we outline the quantities calculated for the estimator of the log transformed process variance \u00CE\u00BE = log \u00CF\u00832. (Similar summaries are presented for the other estimators in Section 3.4). 1. The average estimate for \u00CE\u00BE over the 1,000 replicates is given by \u00CE\u00BE\u00CC\u0084 = 1 1000 1000\u00E2\u0088\u0091 i=1 \u00CE\u00BE\u00CC\u0082(i), where \u00CE\u00BE\u00CC\u0082(i) is estimated from the ith data set ( i = 1, . . . , 1000 ). 2. The bias of the estimator \u00CE\u00BE\u00CC\u0082 is estimated by subtracting the real value from the mean estimate: Bias\u00CE\u00BE\u00CC\u0082 = \u00CE\u00BE\u00CC\u0084 \u00E2\u0088\u0092 \u00CE\u00BE. 3. A p-value is attached to this bias by doing a two-sided, one-sample t-test on { \u00CE\u00BE\u00CC\u0082(1)\u00E2\u0088\u0092\u00CE\u00BE, . . . , \u00CE\u00BE\u00CC\u0082(1000)\u00E2\u0088\u0092\u00CE\u00BE }, to test if it is significantly different from zero. 4. The sample variance of the estimator \u00CE\u00BE\u00CC\u0082 is: Variance\u00CE\u00BE\u00CC\u0082 = 1 999 1000\u00E2\u0088\u0091 i=1 ( \u00CE\u00BE\u00CC\u0082(i) \u00E2\u0088\u0092 \u00CE\u00BE\u00CC\u0084 )2 . 5. The Mean Squared Error (MSE) of \u00CE\u00BE\u00CC\u0082 is: MSE\u00CE\u00BE\u00CC\u0082 = 1 1000 1000\u00E2\u0088\u0091 i=1 ( \u00CE\u00BE\u00CC\u0082(i) \u00E2\u0088\u0092 \u00CE\u00BE )2 . 49 Chapter 3. 6. The estimated Mean Squared Error (M\u00CC\u0082SE) of \u00CE\u00BE\u00CC\u0082 is the average of the first diagonal elements of the inverse observed information matrix: M\u00CC\u0082SE\u00CE\u00BE\u00CC\u0082 = 1 1000 1000\u00E2\u0088\u0091 i=1 [ \u00E2\u0088\u0092\u00E2\u0088\u00872 logL ( exp \u00CE\u00BE\u00CC\u0082(i), exp \u00CE\u00B3\u00CC\u0082(i) )] \u00E2\u0088\u00921 (1, 1), where \u00CE\u00BE\u00CC\u0082(i) and \u00CE\u00B3\u00CC\u0082(i) denote the MLE of \u00CE\u00BE and \u00CE\u00B3, respectively, estimated from the ith data set ( i = 1, . . . , 1000 ). Coverage probabilities for confidence intervals, credible intervals, and multi- dimensional confidence regions were also calculated by counting how many of the 1,000 replicates were covered by the 100(1\u00E2\u0088\u0092 \u00CE\u00B1)% confidence or cred- ible sets for \u00CE\u00B1 = 0.01, 0.02, . . . , 0.99. Section 3.5 provides more details about these procedures after presenting the results in the next section. 3.4 Results 3.4.1 Point estimation The range parameters are estimated by maximum likelihood. Tables 3.1 and 3.2 summarize the results of estimating the first parameter of the log transformed \u00CE\u00B8 vector: log \u00CE\u00B81. All numbers are on the log scale. The first feature that jumps out from both tables is the negative bias that, judging by the p-values, seems significant in all 20 cases, except for d = 2 in Table 3.1. This means that correlations between the responses have a tendency to appear stronger than they really are. However, considering the magnitude of the variance, this bias is relatively unimportant (i.e. statistical significance does not necessarily imply practical significance). In Table 3.1, the M\u00CC\u0082SE column slightly underestimates the MSE column, but overall it is fairly close, meaning that it can measure well the uncer- tainty in the point estimation when n = 10 d. But when n = 5 d (Table 3.2), the M\u00CC\u0082SE measure can become unstable numerically, as evidenced by the inflated numbers for d = 5, 6, 8, 9, 10 in Table 3.2. This is caused by 50 Chapter 3. d Real Bias p-value Variance MSE M\u00CC\u0082SE 1 1.833 -0.019 7.51e-05 0.023 0.023 0.018 2 1.022 -0.012 0.126 0.059 0.059 0.054 3 0.446 -0.051 6.73e-07 0.104 0.106 0.088 4 0.000 -0.052 5.57e-06 0.132 0.135 0.114 5 -0.365 -0.057 9.19e-06 0.161 0.164 0.136 6 -0.673 -0.048 0.000204 0.165 0.168 0.151 7 -0.940 -0.066 2.21e-06 0.193 0.198 0.170 8 -1.176 -0.051 0.000566 0.222 0.224 0.178 9 -1.386 -0.086 2.45e-08 0.235 0.242 0.199 10 -1.577 -0.092 4.59e-10 0.214 0.222 0.203 Table 3.1: MLE of log \u00CE\u00B81 in the first simulation study (n = 10 d). d Real Bias p-value Variance MSE M\u00CC\u0082SE 1 0.223 -0.070 6.71e-05 0.304 0.309 0.161 2 -0.588 -0.081 1.77e-05 0.349 0.356 0.243 3 -1.163 -0.103 9.49e-07 0.440 0.450 0.312 4 -1.609 -0.142 1.88e-10 0.489 0.509 0.375 5 -1.974 -0.169 2.35e-08 0.906 0.934 57.134 6 -2.282 -0.172 8.96e-07 1.217 1.246 98.377 7 -2.549 -0.183 4.22e-12 0.680 0.713 0.481 8 -2.785 -0.244 8.49e-09 1.758 1.815 40.899 9 -2.996 -0.206 3.75e-07 1.621 1.662 28.889 10 -3.186 -0.259 5.78e-09 1.950 2.016 20.442 Table 3.2: MLE of log \u00CE\u00B81 in the second simulation study (n = 5 d). 51 Chapter 3. d Real Bias p-value Variance MSE M\u00CC\u0082SE 1 0.000 -0.127 4.2e-08 0.525 0.540 0.435 2 0.000 -0.108 2.87e-10 0.286 0.297 0.290 3 0.000 -0.052 0.00055 0.227 0.230 0.243 4 0.000 -0.047 0.00257 0.238 0.240 0.220 5 0.000 -0.036 0.013 0.209 0.211 0.207 6 0.000 -0.030 0.0316 0.201 0.201 0.200 7 0.000 -0.024 0.0956 0.205 0.205 0.190 8 0.000 -0.025 0.0585 0.176 0.176 0.182 9 0.000 -0.027 0.0469 0.184 0.184 0.177 10 0.000 -0.017 0.184 0.166 0.166 0.172 Table 3.3: MLE of log \u00CF\u00832 in the first simulation study (n = 10 d). d Real Bias p-value Variance MSE M\u00CC\u0082SE 1 0.000 -0.286 1.3e-13 1.450 1.530 0.895 2 0.000 -0.201 6.47e-12 0.835 0.875 0.692 3 0.000 -0.164 2.28e-09 0.740 0.766 0.612 4 0.000 -0.119 1.05e-06 0.588 0.601 0.572 5 0.000 -0.097 5.07e-05 0.562 0.571 0.551 6 0.000 -0.106 8.1e-06 0.558 0.568 0.543 7 0.000 -0.096 8.15e-05 0.595 0.604 0.540 8 0.000 -0.133 2.32e-07 0.649 0.666 0.532 9 0.000 -0.120 5.12e-07 0.563 0.577 0.526 10 0.000 -0.114 1.42e-06 0.552 0.564 0.511 Table 3.4: MLE of log \u00CF\u00832 in the second simulation study (n = 5 d). 52 Chapter 3. d Real Bias p-value Variance MSE M\u00CC\u0082SE 1 0.000 -0.082 0.000537 0.561 0.567 0.322 2 0.000 -0.017 0.314 0.292 0.292 0.222 3 0.000 0.051 0.000888 0.233 0.235 0.189 4 0.000 0.056 0.000332 0.244 0.247 0.174 5 0.000 0.062 2.4e-05 0.215 0.218 0.164 6 0.000 0.065 6.33e-06 0.206 0.210 0.159 7 0.000 0.061 2.45e-05 0.209 0.213 0.153 8 0.000 0.055 3.31e-05 0.175 0.178 0.145 9 0.000 0.051 0.000195 0.187 0.190 0.143 10 0.000 0.058 9.9e-06 0.170 0.174 0.140 Table 3.5: Bayes estimate of log \u00CF\u00832 in the first simulation study (n = 10 d). d Real Bias p-value Variance MSE M\u00CC\u0082SE 1 0.000 -0.224 2.75e-08 1.600 1.648 0.798 2 0.000 -0.035 0.234 0.852 0.852 0.588 3 0.000 0.026 0.352 0.756 0.756 0.527 4 0.000 0.073 0.00309 0.601 0.605 0.479 5 0.000 0.099 4.25e-05 0.584 0.593 0.466 6 0.000 0.062 0.011 0.599 0.602 0.459 7 0.000 0.063 0.0126 0.641 0.644 0.461 8 0.000 0.008 0.767 0.736 0.735 0.488 9 0.000 -0.016 0.524 0.657 0.657 0.503 10 0.000 -0.034 0.182 0.658 0.658 0.517 Table 3.6: Bayes estimate of log \u00CF\u00832 in the second simulation study (n = 5d). 53 Chapter 3. extreme uncertainty in some cases, when the likelihood surface at the mode is essentially flat in certain directions (i.e. the MLE is on a high-dimensional ridge), and near-zero second derivatives can lead to inflated inverses, render- ing the M\u00CC\u0082SE measure effectively useless. One way to remedy this situation is to detect outliers and eliminate them from the M\u00CC\u0082SE statistic. However, judging what is an outlier caused by numerical issues and what is not is inherently subjective. In the next subsection we present a better way to assess parameter uncertainty graphically, instead of just relying on a single number. The process variance can also be estimated by maximum likelihood. Ta- bles 3.3 and 3.4 contain the results for the MLE of log \u00CF\u00832 for the first set of simulations with adequate sample size (n = 10 d), and the second set with limited sample size (n = 5 d), respectively. Again, the numbers in the bias columns are all negative without exception; however, the evidence is not as strong for the first set: there are quite a few relatively large p-values in Table 3.3 for large d (which also implies large n, since n = 10d in this case). Hence, we can conclude that the negative bias is significant for all but the largest sample sizes. This finding is consistent with the simulation study in Mardia and Marshall (1984), but appears to contradict the simulations in Abt and Welch (1998), where no negative bias was reported for the MLE of \u00CF\u00832 in one or two dimensions (this may be because of the much larger sample sizes: n = 14 for d = 1 and n = 64 for d = 2). We also developed a Bayes estimator for the process variance based on FBI, taking into account the uncertainty in the estimation of the parameters, as described in Section 3.5. Its performance is given in Tables 3.5 and 3.6 that enable direct comparison with the MLE. The most important difference is that with the exception of the d = 1 case, there is either no evidence that the Bayes estimator is biased, or when there is, the bias is positive. Even in the one-dimensional case, the estimated negative bias is less severe than that of the MLE. 54 Chapter 3. This may also provide an insight into how the FBI corrects the deficiency of the traditional plug-in method: by refusing to accept the too small MLE of \u00CF\u00832, it constructs its own estimates that, on average, do not severely underestimate the real \u00CF\u00832 for large d. As usual, the d = 1 case is again an exception, retaining a significant negative bias in Tables 3.5 and 3.6. 3.4.2 Parameter uncertainty As we already mentioned in the previous section, one way of quantifying the uncertainty in the estimation of the parameters is by comparing the MSE and M\u00CC\u0082SE columns. (This seems feasible for all six tables presented so far, except Table 3.2 that has inflated M\u00CC\u0082SE numbers in higher dimen- sions). If the two numbers are close, we would expect that normality-based (Wald-type) confidence intervals using the standard errors would have good frequentist properties. In other words, validity would be demonstrated by confidence intervals whose actual coverage is approximately equal to the nominal coverage. But why not make that match (or the lack of it) more explicit? To visualize how good that match is, in Figures 3.3 and 3.4 we plotted nominal coverage levels (from 1% to 99%) vs. the true coverage for the three kinds of estimators for d = 1, 4, 7, and 10. These (frequentist) coverage probabilities were calculated by counting how many times the real values were covered out of 1,000 realizations (replicates). In addition, a gray diagonal is also shown in the middle of each plot to help guide the eye: the closer the curves are to the diagonal, the better the match between nominal coverage (horizontally) and true coverage (vertically). This way of plotting is robust with respect to outliers, since a few inflated standard errors (out of 1,000) will have only a negligible effect on the estimated true coverage probabilities. On a technical note, we should also mention that although we used the abbreviation CI in these plots for both frequentist confidence intervals (based on the likelihood) and for Bayesian credible intervals (based on the poste- 55 Chapter 3. Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 1 Wald CI for log \u00CE\u00B81 Wald CI for log \u00CF\u00832 Bayes CI for log \u00CF\u00832 Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 4 Wald CI for log \u00CE\u00B81 Wald CI for log \u00CF\u00832 Bayes CI for log \u00CF\u00832 Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 7 Wald CI for log \u00CE\u00B81 Wald CI for log \u00CF\u00832 Bayes CI for log \u00CF\u00832 Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 10 Wald CI for log \u00CE\u00B81 Wald CI for log \u00CF\u00832 Bayes CI for log \u00CF\u00832 Figure 3.3: Coverage probabilities of Wald confidence intervals and Bayes credible intervals in the first simulation study (n = 10 d) for d = 1, 4, 7, and 10. 56 Chapter 3. Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 1 Wald CI for log \u00CE\u00B81 Wald CI for log \u00CF\u00832 Bayes CI for log \u00CF\u00832 Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 4 Wald CI for log \u00CE\u00B81 Wald CI for log \u00CF\u00832 Bayes CI for log \u00CF\u00832 Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 7 Wald CI for log \u00CE\u00B81 Wald CI for log \u00CF\u00832 Bayes CI for log \u00CF\u00832 Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 10 Wald CI for log \u00CE\u00B81 Wald CI for log \u00CF\u00832 Bayes CI for log \u00CF\u00832 Figure 3.4: Coverage probabilities of Wald confidence intervals and Bayes credible intervals in the second simulation study (n = 5 d) for d = 1, 4, 7, and 10. 57 Chapter 3. rior), they have very different interpretations. But we can still evaluate the frequentist properties of these intervals, regardless of what assumptions we made when we derived them. It is not uncommon that a credible interval provides similar matching probabilities to its frequentist counterpart. In- deed, that is what we can see in this case, too, although the coverage of the credible intervals centered on the Bayes estimate are clearly less than that of the Wald confidence intervals centered on the MLE of log \u00CF\u00832 that are very close to the diagonal. Overall what we can see in Figures 3.3 and 3.4 is that Wald confidence intervals had a good match in the second simulation study and almost perfect match (following the diagonal) in the first study. Also, note that this is indeed a robust way of visualizing uncertainty assessments, not as vulnerable to a few excessive outliers as the M\u00CC\u0082SE measure in the tables. Results for d = 2, 3, 5, 6, 8, 9 were similar (not shown here). That sug- gests that the log transformation is nearly optimal not only with respect to assessing prediction uncertainty by FBI, but also with respect to quantifying parameter uncertainty by normality-based confidence intervals. But when we attempt to derive joint confidence regions for all the parameters, a less rosy picture emerges. Figures 3.5 and 3.6 depict the results for the same four cases (d = 1, 4, 7, and 10) that we have seen before in Figures 3.3 and 3.4. But this time the coverage probabilities are for likelihood-based confidence regions for the joint likelihood L(\u00CF\u00832, \u00CE\u00B8) with d + 1 parameters, the profile likelihood L(\u00CE\u00B8) with d parameters, and their normal approximations, respectively (the exact procedures for these calculations are given in the next section where we will also show that the confidence regions based on the normal approximations are equivalent to Wald-type confidence sets that are easier to compute than the original likelihood-based ones). Although in Figure 3.5 we can only see moderate mismatch between the nominal and true coverages, that gap grows larger in Figure 3.6, especially 58 Chapter 3. Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 1 Joint likelihood Profile likelihood Joint approximation Profile approximation Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 4 Joint likelihood Profile likelihood Joint approximation Profile approximation Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 7 Joint likelihood Profile likelihood Joint approximation Profile approximation Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 10 Joint likelihood Profile likelihood Joint approximation Profile approximation Figure 3.5: Coverage probabilities of confidence regions based on the two likelihood functions and their normal approximations in the first simulation study (n = 10 d) for d = 1, 4, 7, and 10. 59 Chapter 3. Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 1 Joint likelihood Profile likelihood Joint approximation Profile approximation Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 4 Joint likelihood Profile likelihood Joint approximation Profile approximation Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 7 Joint likelihood Profile likelihood Joint approximation Profile approximation Nominal coverage Tr ue c ov er ag e 1% 50% 99% 1% 50 % 99 % d = 10 Joint likelihood Profile likelihood Joint approximation Profile approximation Figure 3.6: Coverage probabilities of confidence regions based on the two likelihood functions and their normal approximations in the second simula- tion study (n = 5 d) for d = 1, 4, 7, and 10. 60 Chapter 3. in higher dimensions (e.g. d = 10). Not only do the curves for the normal approximations fall short of the diagonal (indicating serious undercoverage), but the ones for the likelihoods do as well, which means that there is insuf- ficient information in the data to satisfactorily quantify the uncertainty in the maximum likelihood estimation. These two figures can also serve to visualize the nonnormality of the two likelihood functions in a way that is superior to measures that compress all information about the shape of the function into a single real number. For instance, the nonnormality measures of Sprott (1973) and their multivariate extensions by Kass and Slate (1994) can only provide limited information about tail behavior (Slate, 1991) because they are based solely on the cur- vature at the mode. In contrast, the figures show not only what happens in the neighborhood of the mode, say, at the 1% nominal confidence level, but also what happens in the tails, say, at the 99% level. We can see that the true coverage for the normal approximations start out very close to the original, indicating a nearly normal shape in the neighborhood of the MLE. However, as the nominal level increases on the x-axis, the gap between the approximation and its original progressively gets larger on the y-axis, meaning that the approximation is less accurate in the tails. Figure 3.6 also indicates that the FBI does not propagate through all parameter uncertainty (as specified by the likelihood) into prediction uncer- tainty. The gap between the profile likelihood (dashed line) and its normal approximation (dotted line) is substantial between the 50% and 99% con- fidence levels, meaning that the normal approximation (that is used as the posterior distribution by the FBI) not only diminishes the tails, but over- all it is much more concentrated around the mode than the original profile likelihood. Comparison of Figures 3.5 and 3.6 show, however, that the infer- ence from the normal approximation improves substantially as the sample size increases from n = 5d to n = 10d. 61 Chapter 3. We can also observe that the approximation for the profile likelihood (dotted line) lies closer to the diagonal than the approximation for the joint likelihood (dashed-and-dotted line), illustrating an additional benefit of pro- filing. The difference may not appear to be large; however, from the predic- tion perspective, this seems justified considering that profiling also allows one to disentangle the uncertainty in the estimation of the relatively unim- portant process variance parameter from the uncertainty in the estimation of the more important range parameters. In summary, it appears that using normal approximations for the two likelihood functions on the log scale to quantify parameter uncertainty may be acceptable with adequate sample size (like n = 10 d in our first simula- tion study), but may result in confidence regions with serious undercoverage for smaller samples (like n = 5 d in the second simulation study). On the other hand, confidence intervals for the maximum likelihood estimates of individual parameters are much more robust in terms of coverage probabili- ties, retaining surprisingly good matching coverage even for smaller samples (except for d = 1). Although the coverage of the Bayes credible intervals for log \u00CF\u00832 is less accurate, it seems robust to smaller sample sizes. 3.5 Methods 3.5.1 Likelihood-based estimators We estimate the process variance \u00CF\u00832 and the d range parameters in the \u00CE\u00B8 vec- tor by maximum likelihood (see Mardia and Marshall (1984) for regularity conditions for the consistency and asymptotic normality of these estima- tors). Since these are not available in a closed form, the optimization must be done numerically, e.g. by maximizing the logarithm of the joint likelihood function L(\u00CF\u00832, \u00CE\u00B8). Alternatively, one can optimize the log profile likelihood logL(\u00CE\u00B8) to find the MLE of \u00CE\u00B8 and then use equation (3.3) to get the MLE of \u00CF\u00832, as we did (see Welch et al. (1992) for optimization-related issues). Differ- 62 Chapter 3. ent parameterizations might affect the optimization process differently, but if done correctly, the end result should be the same because of the invariance of the MLE. (We consistently used the log transformation for everything in this chapter, including maximizing the log profile likelihood). Based on asymptotic theory, the joint likelihood L(\u00CF\u00832, \u00CE\u00B8) can also be used to derive confidence sets for all the d+1 parameters jointly by inverting the likelihood ratio test. For example, following Meeker and Escobar (1995), an approximate 100(1 \u00E2\u0088\u0092 \u00CE\u00B1)% likelihood-based confidence region for (\u00CF\u00832, \u00CE\u00B8) is the set of all values of (\u00CF\u00832, \u00CE\u00B8) such that \u00E2\u0088\u00922 log ( L(\u00CF\u00832, \u00CE\u00B8) L(\u00CF\u0083\u00CC\u00822, \u00CE\u00B8\u00CC\u0082) ) < \u00CF\u00872(1\u00E2\u0088\u0092\u00CE\u00B1; d+1), (3.5) where \u00CF\u0083\u00CC\u00822 and \u00CE\u00B8\u00CC\u0082 denote the MLE of the parameter \u00CF\u00832 and the parameter vector \u00CE\u00B8, respectively, and \u00CF\u00872(1\u00E2\u0088\u0092\u00CE\u00B1; d+1) is the 1\u00E2\u0088\u0092\u00CE\u00B1 quantile of the chi-square distribution with d+ 1 degrees of freedom. Similarly, the profile likelihood function L(\u00CE\u00B8) can yield confidence sets for the d range parameters jointly. An approximate 100(1\u00E2\u0088\u0092\u00CE\u00B1)% likelihood- based confidence region for \u00CE\u00B8 is the set of all values of \u00CE\u00B8 such that \u00E2\u0088\u00922 log ( L(\u00CE\u00B8) L(\u00CE\u00B8\u00CC\u0082) ) < \u00CF\u00872(1\u00E2\u0088\u0092\u00CE\u00B1; d). (3.6) These confidence regions are also invariant to parameter transformations. However, in general, they are not guaranteed to have a nice shape and can be cumbersome to calculate numerically, especially in higher dimensions. Fortunately, in our case we did not have to calculate the boundaries of these regions explicitly, since we were only interested whether the true values were covered by them, and for that one needs to evaluate the likelihood at only two points: at the real value and at the MLE. 63 Chapter 3. 3.5.2 Normal approximations For our normal approximations, we continue to use the MLEs as point es- timates. But what happens to the confidence sets when we replace the likelihoods with their (multivariate) normal approximations? We get nicely shaped, symmetric confidence ellipsoids centered on the MLE (in d + 1 di- mensions for all parameters jointly or in d dimensions for the \u00CE\u00B8 vector). In this case the boundaries can be calculated analytically, but there is a trade-off for computational simplicity. We lose invariance to transforma- tions and we also lose accuracy in terms of coverage probabilities. This is especially evident in Figures 3.5 and 3.6 if we compare the actual coverage for the two original likelihood functions vs. their approximations. Here we describe the approximation procedure only for the d-dimensional log transformed \u00CE\u00B8 vector, since the (d + 1)-dimensional case is completely analogous with an extra log transformed \u00CF\u00832 parameter. Using the same notation as in Section 3.3, namely \u00CE\u00B3 = (log \u00CE\u00B81, . . . , log \u00CE\u00B8d) T = log \u00CE\u00B8 for the transformed \u00CE\u00B8 vector and \u00CE\u00B8 = (exp \u00CE\u00B31, . . . , exp \u00CE\u00B3d) T = exp\u00CE\u00B3 for the inverse transformation, we expect the transformed profile likelihood function L(exp \u00CE\u00B3) to have a shape that is more Gaussian with respect to \u00CE\u00B3 than the shape of the original L(\u00CE\u00B8) with respect to \u00CE\u00B8. First we maximize logL(exp\u00CE\u00B3) to get the MLE of \u00CE\u00B3, denoted \u00CE\u00B3\u00CC\u0082. Then we compute the Hessian matrix of second derivatives of logL(exp\u00CE\u00B3) at \u00CE\u00B3\u00CC\u0082, denoted H\u00CE\u00B3\u00CC\u0082 = \u00E2\u0088\u0087 2 logL(exp \u00CE\u00B3\u00CC\u0082), where \u00E2\u0088\u00872 logL(exp \u00CE\u00B3) = \u00EF\u00A3\u00AB \u00EF\u00A3\u00AC\u00EF\u00A3\u00AC\u00EF\u00A3\u00AC\u00EF\u00A3\u00AD \u00E2\u0088\u00822 logL(exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B32 1 . . . \u00E2\u0088\u00822 logL(exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B31 \u00E2\u0088\u0082\u00CE\u00B3d ... . . . ... \u00E2\u0088\u00822 logL(exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B3d \u00E2\u0088\u0082\u00CE\u00B31 . . . \u00E2\u0088\u00822 logL(exp\u00CE\u00B3) \u00E2\u0088\u0082\u00CE\u00B32 d \u00EF\u00A3\u00B6 \u00EF\u00A3\u00B7\u00EF\u00A3\u00B7\u00EF\u00A3\u00B7\u00EF\u00A3\u00B8 . Then we can approximate L(exp \u00CE\u00B3) with the density function of the multi- 64 Chapter 3. variate normal N(\u00CE\u00B3\u00CC\u0082, \u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 ) distribution, which is proportional to \u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 \u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u00A3\u00E2\u0088\u0092 12 exp{\u00E2\u0088\u00921 2 (\u00CE\u00B3 \u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u0082)T [ \u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 ] \u00E2\u0088\u00921 (\u00CE\u00B3 \u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u0082) } . Using this approximation instead of the profile likelihood function in in- equality (3.6) leads to the confidence ellipsoid defined by the quadratic form (\u00CE\u00B3 \u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u0082)T [ \u00E2\u0088\u0092H\u00CE\u00B3\u00CC\u0082 ] (\u00CE\u00B3 \u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u0082) < \u00CF\u00872(1\u00E2\u0088\u0092\u00CE\u00B1; d). This is the same as the quadratic form for the normal-theory Wald subset statistic (\u00CE\u00B3 \u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u0082)T [ \u00CE\u00A3\u00CC\u0082\u00CE\u00B3\u00CC\u0082 ] \u00E2\u0088\u00921 (\u00CE\u00B3 \u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u0082), where \u00CE\u00A3\u00CC\u0082\u00CE\u00B3\u00CC\u0082 is obtained by leaving out the row and column for the log trans- formed \u00CF\u00832 parameter from the inverse of the observed information matrix (see Meeker and Escobar (1995) for a proof and also for a general discussion on the connection between profiling and constructing likelihood-based and Wald-type confidence regions). With only one parameter, confidence ellipsoids become normality-based Wald confidence intervals, using the quantiles of the standard normal distri- bution with a standard error to provide confidence bounds symmetric about the MLE. For example, in terms of coverage probabilities, the assumption that (\u00CE\u00B31\u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u00821)/StdErr\u00CE\u00B3\u00CC\u00821 follows a N(0, 1) distribution is equivalent to assum- ing that (\u00CE\u00B31 \u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u00821) T [StdErr2\u00CE\u00B3\u00CC\u00821]\u00E2\u0088\u00921(\u00CE\u00B31 \u00E2\u0088\u0092 \u00CE\u00B3\u00CC\u00821) has a \u00CF\u0087-squared distribution with one degree of freedom, where the standard error of \u00CE\u00B3\u00CC\u00821, denoted as StdErr\u00CE\u00B3\u00CC\u00821 , is obtained by either taking the square root of \u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 (1, 1), or, equivalently, by taking the root on the diagonal for \u00CE\u00B3\u00CC\u00821 of the inverse of the observed infor- mation matrix. (The root of the appropriate diagonal element of the inverse of the observed information matrix was also used to obtain a standard error for log \u00CF\u0083\u00CC\u00822). 65 Chapter 3. 3.5.3 Bayes estimator Fast Bayesian Inference uses the N(\u00CE\u00B3\u00CC\u0082, \u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 ) distribution as the posterior distribution of \u00CE\u00B3. The main advantage is that it is straightforward to obtain independent, identically distributed (iid) Monte Carlo samples from this posterior: \u00CE\u00B3(1), . . . , \u00CE\u00B3(M), and since they are iid, a relatively small sample size is sufficient (we used M = 400). For each \u00CE\u00B3(i) in this sample, for prediction purposes, internally the FBI estimates \u00CF\u00832 with \u00CF\u0083\u00CC\u00822(exp\u00CE\u00B3(i)), using equation (3.3). Note that the estimator function \u00CF\u0083\u00CC\u00822(\u00CE\u00B8) in (3.3) is a function of the untransformed range parameter vector \u00CE\u00B8, so we need to use the inverse transformation for the log transformed \u00CE\u00B3(i) vectors in the FBI sample ( i = 1, . . . , M ). (Also: the notation \u00CE\u00B3(i) used here should not be confused with the hatted \u00CE\u00B3\u00CC\u0082(i) used earlier in Section 3.3). Thus the Bayes estimate of log \u00CF\u00832 is 1 M M\u00E2\u0088\u0091 i=1 log \u00CF\u0083\u00CC\u00822(exp\u00CE\u00B3(i)). To derive a standard error for normality-based credible intervals, we can take the square root of the sample variance: 1 M \u00E2\u0088\u0092 1 M\u00E2\u0088\u0091 j=1 ( log \u00CF\u0083\u00CC\u00822(exp\u00CE\u00B3(j))\u00E2\u0088\u0092 1 M M\u00E2\u0088\u0091 i=1 log \u00CF\u0083\u00CC\u00822(exp\u00CE\u00B3(i)) )2 . 3.6 Concluding remarks Our main finding for point estimation by maximum likelihood is that all parameters tend to be underestimated. We have introduced a Bayes esti- mator for the process variance that can reduce this negative bias for d = 1 and make it insignificant or even turn it positive for d > 1. Further work is needed to clarify how this less biased estimator can be exploited (besides quantifying prediction uncertainty in FBI). One possible avenue of investi- gation could be to fix \u00CF\u00832 at the Bayes estimate and then see whether the 66 Chapter 3. maximum likelihood estimation leads to improved estimates for the remain- ing parameters (which in turn could also be used to try to improve the Bayes estimate of \u00CF\u00832, and so on). In Chapter 2, the FBI method demonstrated that the log transformation was nearly optimal for assessing prediction uncertainty, since it left almost no room for further improvements in terms of matching coverage probabilities of the prediction bands. Likewise, we have shown that the log transformation is nearly optimal for quantifying parameter uncertainty, since the match between nominal and true coverages of the MLE-centered, normality-based Wald confidence intervals for the individual parameters are almost as good as those seen for the FBI prediction bands. This also provides some insight into why the FBI is able to compute the uncertainty in the predictions so well. However, this is still not a fully satisfactory explanation in cases when we can get good matching coverage only for the Wald confidence intervals for each parameter separately, but not for the Wald confidence regions jointly. Wald and likelihood ratio confidence regions are asymptotically equiv- alent (e.g. see Cox and Hinkley (1974) for a proof). However, for small samples, the Wald approximation is often inferior in terms of matching cov- erage probabilities. We have shown that for our random function model the difference can be quite substantial. It is an open question how much differ- ent reparameterizations could help to close this gap. We have seen that in the one-dimensional case, working on the log scale is not optimal in terms of profile likelihood nonnormality. Transformations that make the shape of the likelihood or the profile likelihood more Gaussian, perhaps adaptively (based on the data), might be worth exploring, since the only special case when Wald confidence regions are equivalent to likelihood-based ones for finite sample sizes is when the likelihood is proportional to a normal density function. Finally, we should point out that although the log transformation is 67 Chapter 3. rarely optimal in the one-dimensional special case according to the nonnor- mality measure used in subsection 3.2.5, that does not mean that it is not nearly optimal. On the contrary, results in Nagy et al. (2007a) suggest that overall, the log transformation is quite useful in most cases for reducing the nonnormality of the profile likelihood, and our results seem to support that, since the approximations for d = 1 in Figures 3.5 and 3.6 look no worse than the ones for d > 1. 68 Bibliography Abt, M. (1999), \u00E2\u0080\u009CEstimating the Prediction Mean Squared Error in Gaus- sian Stochastic Processes with Exponential Correlation Structure,\u00E2\u0080\u009D Scan- dinavian Journal of Statistics, 26, 563\u00E2\u0080\u0093578. Abt, M. and Welch, W. J. (1998), \u00E2\u0080\u009CFisher Information and Maximum Likelihood Estimation of Covariance Parameters in Gaussian Stochastic Processes,\u00E2\u0080\u009D The Canadian Journal of Statistics / La Revue Canadienne de Statistique, 26, 127\u00E2\u0080\u0093137. Box, G. E. P. and Cox, D. R. (1964), \u00E2\u0080\u009CAn Analysis of Transformations,\u00E2\u0080\u009D Journal of the Royal Statistical Society. Series B (Methodological), 26, 211\u00E2\u0080\u0093 252. Cox, D. R. and Hinkley, D. V. (1974), Theoretical Statistics, London: Chap- man and Hall. Cressie, N. A. C. (1993), Statistics for Spatial Data, John Wiley & Sons. Currin, C., Mitchell, T., Morris, M., and Ylvisaker, D. (1991), \u00E2\u0080\u009CBayesian Prediction of Deterministic Functions, with Applications to the Design and Analysis of Computer Experiments,\u00E2\u0080\u009D Journal of the American Statistical Association, 86, 953\u00E2\u0080\u0093963. Furrer, R. (2005), \u00E2\u0080\u009CCovariance estimation under spatial dependence,\u00E2\u0080\u009D Jour- nal of Multivariate Analysis, 94, 366\u00E2\u0080\u0093381. Karuri, S. W. (2005), \u00E2\u0080\u009CIntegration in Computer Experiments and Bayesian Analysis,\u00E2\u0080\u009D Ph.D. thesis, University of Waterloo. 69 Bibliography Kass, R. E. and Slate, E. H. (1994), \u00E2\u0080\u009CSome Diagnostics of Maximum Like- lihood and Posterior Nonnormality,\u00E2\u0080\u009D The Annals of Statistics, 22, 668\u00E2\u0080\u0093695. Mardia, K. V. and Marshall, R. J. (1984), \u00E2\u0080\u009CMaximum Likelihood Estima- tion of Models for Residual Covariance in Spatial Regression,\u00E2\u0080\u009D Biometrika, 71, 135\u00E2\u0080\u0093146. McKay, M. D., Beckman, R. J., and Conover, W. J. (1979), \u00E2\u0080\u009CA Comparison of Three Methods for Selecting Values of Input Variables in the Analysis of Output from a Computer Code,\u00E2\u0080\u009D Technometrics, 21, 239\u00E2\u0080\u0093245. Meeker, W. Q. and Escobar, L. A. (1995), \u00E2\u0080\u009CTeaching about Approxi- mate Confidence Regions Based on Maximum Likelihood Estimation,\u00E2\u0080\u009D The American Statistician, 49, 48\u00E2\u0080\u009353. Nagy, B., Loeppky, J. L., and Welch, W. J. (2007a), \u00E2\u0080\u009CCorrelation parame- terization in random function models to improve normal approximation of the likelihood or posterior,\u00E2\u0080\u009D Tech. Rep. 229, Department of Statistics, The University of British Columbia. \u00E2\u0080\u0094 (2007b), \u00E2\u0080\u009CFast Bayesian Inference for Gaussian Process Models,\u00E2\u0080\u009D Tech. Rep. 230, Department of Statistics, The University of British Columbia. Rasmussen, C. E. and Williams, C. K. I. (2006), Gaussian Processes for Machine Learning, MIT Press. Sacks, J., Welch, W. J., Mitchell, T. J., and Wynn, H. P. (1989), \u00E2\u0080\u009CDe- sign and Analysis of Computer Experiments (C/R: P423-435),\u00E2\u0080\u009D Statistical Science, 4, 409\u00E2\u0080\u0093423. Slate, E. H. (1991), \u00E2\u0080\u009CReparameterizations of Statistical Models,\u00E2\u0080\u009D Ph.D. thesis, Carnegie Mellon University. Sprott, D. A. (1973), \u00E2\u0080\u009CNormal Likelihoods and Their Relation to Large Sample Theory of Estimation,\u00E2\u0080\u009D Biometrika, 60, 457\u00E2\u0080\u0093465. 70 Bibliography Stein, M. L. (1999), Interpolation of Spatial Data: Some Theory for Krig- ing, Springer-Verlag Inc. Tukey, J. W. (1957), \u00E2\u0080\u009COn the Comparative Anatomy of Transformations,\u00E2\u0080\u009D The Annals of Mathematical Statistics, 28, 602\u00E2\u0080\u0093632. Wang, H. and Zhang, H. (2003), \u00E2\u0080\u009COn the Possibility of a Private Crop Insurance Market: A Spatial Statistics Approach,\u00E2\u0080\u009D Journal of Risk and Insurance, 70, 111\u00E2\u0080\u0093124. Welch, W. J., Buck, R. J., Sacks, J., Wynn, H. P., Mitchell, T. J., and Morris, M. D. (1992), \u00E2\u0080\u009CScreening, Predicting, and Computer Experiments,\u00E2\u0080\u009D Technometrics, 34, 15\u00E2\u0080\u009325. Zhang, H. and Zimmerman, D. L. (2005), \u00E2\u0080\u009CTowards Reconciling Two Asymptotic Frameworks in Spatial Statistics,\u00E2\u0080\u009D Biometrika, 92, 921\u00E2\u0080\u0093936. 71 Chapter 4 Discussion In this thesis, we demonstrated a novel way to achieve approximately valid estimation and prediction inference for a particular statistical model fre- quently used in computer experiments to model smooth response surfaces. In general, there are two kinds of goals for statistical modeling: prediction and model identification. We followed that separation of concerns when dividing up our work into two separate publications. Although the two manuscripts share the same model and simulation design, Chapter 2 only deals with issues related to prediction and Chapter 3 with identifying (the covariance of) the random function model. However, we do not just accept the model as it is, but seek nearly opti- mal reparameterizations to minimize nonnormality of the profile likelihood. Hence, another way to relate the two chapters is by looking at what kind of nonnormality measures they use. Chapter 2 employs a multivariate measure from Kass and Slate (1994) based on the curvature at the mode. Chapter 3 takes a more visual approach to compare likelihoods with their normal ap- proximations and reveal discrepancies not only in the neighborhood of the mode but also in the tails. (The one-dimensional special case is also inves- tigated by a univariate measure of Sprott (1973) in Chapter 3, subsection 3.2.5, that is the same as the \u00E2\u0080\u009CExpected Non-Normality\u00E2\u0080\u009D measure in Nagy, Loeppky, and Welch (2007a). Also, the multivariate measure in Kass and Slate (1994) for d = 1 reduces to the univariate \u00E2\u0080\u009CObserved Non-Normality\u00E2\u0080\u009D in Nagy et al. (2007a), also from Sprott (1973)). Since the main goal in computer experiments is prediction, the contribu- tions in Chapter 2 are arguably more important to this field than the results 72 Chapter 4. in Chapter 3. The main advantage of Fast Bayesian Inference is that it is computationally efficient and can be implemented as a black box. Moreover, it can also relieve the user from the burden and responsibility of selecting a suitable prior or an appropriate MCMC algorithm. In other words, FBI has all the required ingredients that make it suitable for incorporation into a standard statistical package. That holds out the promise that one day it may become a widely used method across many fields in science and engineering. In contrast, the results in Chapter 3 seem less interesting from the prac- tical standpoint. One could even say that the significance of Chapter 3 lies mostly in providing some insights about why the FBI prediction bands are so accurate in Chapter 2, since precise assessments of parameter uncertainty can certainly help quantify prediction uncertainty, too. However, that is at most a partial explanation of the success of the FBI, since the prediction bands retain much of their accuracy even in extreme situations (such as very small sample sizes or extremely large range parameters) as shown in Nagy, Loeppky, and Welch (2007b) (see results included in Appendix B). Although these extremes are irrelevant in practice (since meaningful prediction is not possible), it is still an interesting theoretical question what makes the FBI so robust across such a wide range of settings. One practical shortcoming of the thesis is that the estimated true cover- age probabilities of the prediction bands are averaged over both the hyper- cube [0, 1]d and over all the simulated data sets. But it is never explored what happens at just one specific point in the input space or for just one particular realization, both of which could be more relevant in practice than the present blanket measure. And what if the data is not a realization of a Gaussian process? In practical applications, this is almost always the case, yet no attempt is made to assess the robustness of FBI with respect to model misspecifications. (One cannot make generalizations based on just two real examples in Chapter 2). The simulation design can also be criticized on the grounds that it uses 73 Chapter 4. only one fixed \u00CE\u00B8 value for each dimension (although we should mention that we obtained similar results with Bayesian simulation designs where log \u00CE\u00B8 was drawn from either a uniform or normal distribution, but those results are not presented here). On the other hand, the simulations can also be considered the primary strength of this thesis, pushing the limits of both currently available hardware (WestGrid high performance computing facilities) and software (e.g. Intel\u00E2\u0080\u0099s Math Kernel Library for matrix operations or ADOL- C for automatic differentiation in C++). There are also many obvious extensions to our work, some of which seem easier to tackle than others. We briefly discuss some possible research directions and speculate on their perceived feasibility at the time of this writing. 4.1 Alternative correlation functions Whether the FBI can be adopted for other covariance structures is one of the first questions that comes to mind. For instance, one possible generalization of the Gaussian correlation function is the Power Exponential family: Corr(Z(w), Z(x)) = d\u00E2\u0088\u008F i=1 exp {\u00E2\u0088\u0092\u00CE\u00B8i|wi \u00E2\u0088\u0092 xi| pi}, where 0 < pi \u00E2\u0089\u00A4 2 (Sacks, Welch, Mitchell, and Wynn, 1989). In this thesis we only presented results for the pi = 2 (i = 1, . . . , d) special case that is known as the Squared Exponential or Gaussian correlation function. But we also experimented with running the FBI with constant exponents fixed at values other than 2. What we found was that the prediction uncertainty assessments were not as uniformly valid as for p = 2. More work is required to understand what causes the difference. Results for d = 1 in Nagy et al. (2007a) suggest that transformations may play a large role. (For example, the log transformation tends to reduce nonnormality for p = 2, but that is 74 Chapter 4. less often the case for p < 2). Perhaps the most exciting question is if the FBI can be extended to the situation when the parameters pi are unknown. Unfortunately, it is not clear at this time how one might go about accomplishing that, since these parameters can only take values between 0 and 2 and the boundary case is very special. We have seen that the process can behave very differently (including losing differentiability), even for values of p that are only slightly less than 2, such as p = 2\u00E2\u0088\u0092 10\u00E2\u0088\u00926. Brian Williams suggested another way to generalize the Gaussian cor- relation that can be viewed as a limiting case of the Mate\u00CC\u0081rn class (Mate\u00CC\u0081rn, 1947) in terms of differentiability. This was also recommended earlier in Stein (1999). The rationale is that this family has a parameter \u00CE\u00BD for fine- tuning differentiability, i.e. the process is differentiable k times if and only if k < \u00CE\u00BD, allowing much finer control than the Power Exponential family, for which the process is infinitely differentiable for p = 2 and not differentiable at all for p < 2. 4.2 Additional terms in the model A general model could have a regression component and a white noise term in addition to the stochastic process Z(x): Y (x) = \u00E2\u0088\u0091 j \u00CE\u00B2jfj(x) + Z(x) + \u00C7\u00AB, where each fj(x) is a function of x with known or unknown \u00CE\u00B2j coefficients and \u00C7\u00AB is iid random error parameterized by a known or unknown variance. In fact, when we began developing FBI, we started out with a model that included both an unknown mean \u00C2\u00B5 and white noise with known or unknown variance Y (x) = \u00C2\u00B5 + Z(x) + \u00C7\u00AB. 75 Chapter 4. Encouraging preliminary results for d = 2 were reported at the Annual Meeting of the Statistical Society of Canada in London, Ontario in May 2006, entitled \u00E2\u0080\u009CUncertainty in kriging predictions with and without random error\u00E2\u0080\u009D. Since it did not become more clear later how to deal with noise, we ended up dropping it from the model and turned our focus to the determin- istic case: Y (x) = \u00C2\u00B5 + Z(x), having an unknown mean \u00C2\u00B5. FBI results for d = 1, . . . , 5 comparable to the ones in Appendix B were presented at the Joint Statistical Meetings in Seattle, Washington in August 2006 with the title \u00E2\u0080\u009CValidity of Likelihood and Bayesian Inference for Gaussian Process Regression\u00E2\u0080\u009D. Eventually, we dispensed with \u00C2\u00B5, too, to simplify the algebra and speed up computations to be able to explore higher-dimensional cases and run long Markov chains. Since we found that the FBI prediction bands were remarkably accurate with or without \u00C2\u00B5 in the model, it is not unreasonable to guess that one could get similarly good prediction uncertainty assessments for a model including more regression terms. The only required change in FBI would be that in addition to \u00CF\u00832, one would also have to eliminate the extra regression coefficients when deriving the profile likelihood function for the remaining range parameters. All this is standard practice, described in detail in Sacks et al. (1989) or Welch, Buck, Sacks, Wynn, Mitchell, and Morris (1992). 4.3 Different reparameterizations There is no reason to restrict oneself to the family of power transformations in Tukey (1957) as we did in this thesis. Although this class of functions is quite flexible and powerful, as shown by Box and Cox (1964), this choice is still arbitrary and can not be expected to provide a satisfying solution in every situation. 76 Chapter 4. In the one-dimensional case we experimented briefly with the \u00CF\u0081 = e\u00E2\u0088\u0092\u00CE\u00B8 reparameterization for the range parameter (Linkletter, Bingham, Hengart- ner, Higdon, and Ye, 2006), which was also the inspiration for the logexp transformation for \u00CE\u00B8, defined as log(e\u00CE\u00B8\u00E2\u0088\u0092 1) in Nagy et al. (2007a), where we compared it to the log transformation. However, those results were incon- clusive, raising more questions than answers, and we decided not to include them here. As we already mentioned in Chapter 3, adaptive transformations based on the data at hand might be worth exploring, too. Although the negative results in Chapter 2 seem to contradict this (i.e. adaptively optimizing \u00CE\u00BB could not beat the log transformation), one should keep in mind that we were using just one specific model with one particular correlation structure that resulted in FBI prediction bands with almost perfect frequentist properties in terms of matching coverage probabilities, leaving almost no room for improvement. But a different model with another correlation function may need a more sophisticated reparameterization scheme and it seems unwise to rule out adaptive approaches a priori based on a single negative result. 4.4 Numerical optimizations In theory, reducing the nonnormality of likelihoods or profile likelihoods can help the required numerical optimizations to find the MLE. This is because when the shape of the likelihood functions is more Gaussian, then the shape of the log-likelihoods is more quadratic, and those are exactly the kinds of functions that can be optimized very efficiently with Newton-type algorithms. However, in practice, this can be tricky, since it is well-known that meth- ods relying heavily on derivatives can easily become unstable (Press, Flan- nery, Teukolsky, and Vetterling, 2002). This can be caused by either the features of the objective function or by numerical inaccuracies. For exam- ple, although in our case the likelihood is log-concave (Paninski, 2004), it 77 Chapter 4. may still appear as possessing several local maxima along the ridge where the MLE is located (Warnes and Ripley, 1987). Another challenge for derivative-based optimizers is that in high dimen- sions some partial derivatives can get dangerously close to zero, even in places that are still far away from the MLE. This problem may be possi- ble to alleviate to some extent by dimensionality-reduction techniques, or maybe even by just screening out the input variables with little or no effect before the optimization or in parallel (Welch et al., 1992). But when it does work, Newton\u00E2\u0080\u0099s method can achieve quadratic conver- gence, which means doubling the number of correct digits at each iteration. That suggests that it may be worth investing some time into carefully de- signing a statistical experiment to identify the factors that determine effi- cient convergence for the log-likelihoods in question. If those factors can be controlled in a black box implementation, that can make Fast Bayesian Inference even faster, since its running time is determined by the numerical optimization required for maximum likelihood estimation. 78 Bibliography Box, G. E. P. and Cox, D. R. (1964), \u00E2\u0080\u009CAn Analysis of Transformations,\u00E2\u0080\u009D Journal of the Royal Statistical Society. Series B (Methodological), 26, 211\u00E2\u0080\u0093 252. Kass, R. E. and Slate, E. H. (1994), \u00E2\u0080\u009CSome Diagnostics of Maximum Like- lihood and Posterior Nonnormality,\u00E2\u0080\u009D The Annals of Statistics, 22, 668\u00E2\u0080\u0093695. Linkletter, C., Bingham, D., Hengartner, N., Higdon, D., and Ye, K. Q. (2006), \u00E2\u0080\u009CVariable Selection for Gaussian Process Models in Computer Ex- periments,\u00E2\u0080\u009D Technometrics, 48, 478\u00E2\u0080\u0093490. Mate\u00CC\u0081rn, B. (1947), \u00E2\u0080\u009CMethods of Estimating the Accuracy of Line and Sam- ple Plot Surveys,\u00E2\u0080\u009D Medd. fr. Statens Skagsforsknings Inst., 36. Nagy, B., Loeppky, J. L., and Welch, W. J. (2007a), \u00E2\u0080\u009CCorrelation parame- terization in random function models to improve normal approximation of the likelihood or posterior,\u00E2\u0080\u009D Tech. Rep. 229, Department of Statistics, The University of British Columbia. \u00E2\u0080\u0094 (2007b), \u00E2\u0080\u009CFast Bayesian Inference for Gaussian Process Models,\u00E2\u0080\u009D Tech. Rep. 230, Department of Statistics, The University of British Columbia. Paninski, L. (2004), \u00E2\u0080\u009CLog-concavity results on Gaussian process methods for supervised and unsupervised learning,\u00E2\u0080\u009D Advances in Neural Information Processing, 17. 79 Bibliography Press, W. H., Flannery, B. P., Teukolsky, S. A., and Vetterling, W. T. (2002), Numerical recipes in C++, Cambridge: Cambridge University Press, includes bibliographical references, 3 appendixes and 2 indexes. Sacks, J., Welch, W. J., Mitchell, T. J., and Wynn, H. P. (1989), \u00E2\u0080\u009CDe- sign and Analysis of Computer Experiments (C/R: P423-435),\u00E2\u0080\u009D Statistical Science, 4, 409\u00E2\u0080\u0093423. Sprott, D. A. (1973), \u00E2\u0080\u009CNormal Likelihoods and Their Relation to Large Sample Theory of Estimation,\u00E2\u0080\u009D Biometrika, 60, 457\u00E2\u0080\u0093465. Stein, M. L. (1999), Interpolation of Spatial Data: Some Theory for Krig- ing, Springer-Verlag Inc. Tukey, J. W. (1957), \u00E2\u0080\u009COn the Comparative Anatomy of Transformations,\u00E2\u0080\u009D The Annals of Mathematical Statistics, 28, 602\u00E2\u0080\u0093632. Warnes, J. J. and Ripley, B. D. (1987), \u00E2\u0080\u009CProblems with Likelihood Estima- tion of Covariance Functions of Spatial Gaussian Processes,\u00E2\u0080\u009D Biometrika, 74, 640\u00E2\u0080\u0093642. Welch, W. J., Buck, R. J., Sacks, J., Wynn, H. P., Mitchell, T. J., and Morris, M. D. (1992), \u00E2\u0080\u009CScreening, Predicting, and Computer Experiments,\u00E2\u0080\u009D Technometrics, 34, 15\u00E2\u0080\u009325. 80 Appendix A Appendix to Chapter 3 In this appendix, we derive formulas for the Expected nonnormality (ENN) measure in Chapter 3, Section 3.2.5. Let y denote the response vector having length n, mean zero, and covari- ance matrix \u00CF\u00832R, where \u00CF\u00832 is the process variance and R is the symmetric, positive definite n \u00C3\u0097 n design correlation matrix (that is a function of the parameter \u00CE\u00B8). The MLE of \u00CE\u00B8 is treated as given, denoted by \u00CE\u00B8\u00CC\u0082. Let G denote the inverse matrix of R and define the matrices F = GR\u00E2\u0080\u00B2, S = GR\u00E2\u0080\u00B2\u00E2\u0080\u00B2, andT = GR\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2, where R\u00E2\u0080\u00B2, R\u00E2\u0080\u00B2\u00E2\u0080\u00B2, and R\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 are the first, second, and third derivatives of R, respectively (with respect to \u00CE\u00B8). The trace of a matrix is denoted by tr(\u00C2\u00B7). For concise notation, we also define t(\u00C2\u00B7) = tr(\u00C2\u00B7)/n. Taking the log of L(\u00CE\u00B8), the log-likelihood is (up to an additive constant): l(\u00CE\u00B8) = \u00E2\u0088\u0092 n 2 log yTR\u00E2\u0088\u00921y n \u00E2\u0088\u0092 1 2 log |R|. The functions g and h are also used to simplify calculations: g(\u00CE\u00B8) = yTR\u00E2\u0088\u00921y n and h(\u00CE\u00B8) = \u00E2\u0088\u0092 log |R| n . Suppressing \u00CE\u00B8 from l(\u00CE\u00B8), g(\u00CE\u00B8), and h(\u00CE\u00B8) gives the following equations for the log-likelihood l and its first three derivatives: l = n 2 (h \u00E2\u0088\u0092 log g), 81 Appendix A. Appendix to Chapter 3 l\u00E2\u0080\u00B2 = n 2 ( h\u00E2\u0080\u00B2 \u00E2\u0088\u0092 g\u00E2\u0080\u00B2 g ) , l\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = n 2 ( h\u00E2\u0080\u00B2\u00E2\u0080\u00B2 + ( g\u00E2\u0080\u00B2 g )2 \u00E2\u0088\u0092 g\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g ) , l\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = n 2 ( h\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 \u00E2\u0088\u0092 2 ( g\u00E2\u0080\u00B2 g )3 + 3 g\u00E2\u0080\u00B2g\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g2 \u00E2\u0088\u0092 g\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g ) , where h\u00E2\u0080\u00B2 = \u00E2\u0088\u0092t(F ), h\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = t(F 2 \u00E2\u0088\u0092 S), h\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = \u00E2\u0088\u0092t(2F 3 \u00E2\u0088\u0092 3FS + T ), and g\u00E2\u0080\u00B2 = yTG\u00E2\u0080\u00B2y/n, g\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = yTG\u00E2\u0080\u00B2\u00E2\u0080\u00B2y/n, g\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = yTG\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2y/n , where G\u00E2\u0080\u00B2 = \u00E2\u0088\u0092FG, G\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = (2F 2\u00E2\u0088\u0092S)G, G\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = \u00E2\u0088\u0092(6F 3\u00E2\u0088\u00923FS\u00E2\u0088\u00923SF +T )G. Lemma 1. For a symmetric n\u00C3\u0097 n matrix Q and y \u00E2\u0088\u00BC N(0, \u00CF\u00832R) E yTQy = \u00CF\u00832 tr(QR). Proof: Using any standard text on matrix algebra, e.g. Harville (1997), E yTQy = E tr(yTQy) = E tr(QyyT ) = tr(Q E yyT ) = tr(Q \u00CF\u00832R) = \u00CF\u00832 tr(QR), where we used the fact that y has covariance matrix \u00CF\u00832R. Lemma 2. For a symmetric n \u00C3\u0097 n matrix Q, y \u00E2\u0088\u00BC N(0, \u00CF\u00832R), and G = R\u00E2\u0088\u00921 E yTQy yTGy = t(QR). Proof: Let z = C\u00E2\u0088\u00921y, where C is the lower-triangular Cholesky-factor of the covariance matrix \u00CF\u00832R. Then z \u00E2\u0088\u00BC N(0, In) and CCT = \u00CF\u00832R \u00E2\u0087\u0092 R = CCT/\u00CF\u00832 \u00E2\u0087\u0092 R\u00E2\u0088\u00921 = \u00CF\u00832 ( CT )\u00E2\u0088\u00921 C\u00E2\u0088\u00921. Substituting y = Cz and G = \u00CF\u00832 ( CT ) \u00E2\u0088\u00921 C\u00E2\u0088\u00921 we get: E yTQy yTGy = E zTCTQCz zTCT\u00CF\u00832(CT ) \u00E2\u0088\u00921 C\u00E2\u0088\u00921Cz = 1 \u00CF\u00832 E zT (CTQC)z zT z . Conniffe and Spencer (2001) state that the expectation of a ratio of this form 82 Appendix A. Appendix to Chapter 3 is the ratio of the expectations for any quadratic form in the numerator. This is a consequence of the fact that the ratio is independent of its denominator, a result attributed to Geary (1933). Hence we can apply Lemma 1 separately to the numerator and the denominator: E yTQy yTGy = E yTQy E yTGy = \u00CF\u00832 tr(QR) \u00CF\u00832 tr(GR) = tr(QR) tr(In) = tr(QR) n = t(QR). Lemma 3. El\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) and El\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2(\u00CE\u00B8\u00CC\u0082) for the ENN are: El\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = n 2 ( t2(F ) \u00E2\u0088\u0092 t(F 2) ) , El\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = n 2 ( 2t3(F ) \u00E2\u0088\u0092 6t(F )t(F 2) + 3t(F )t(S) \u00E2\u0088\u0092 3t(FS) + 4t(F 3) ) . Proof: When \u00CE\u00B8 = \u00CE\u00B8\u00CC\u0082 (the MLE of \u00CE\u00B8), then l\u00E2\u0080\u00B2 = 0 and that implies that g\u00E2\u0080\u00B2/g = h\u00E2\u0080\u00B2. Replacing g\u00E2\u0080\u00B2/g with h\u00E2\u0080\u00B2 in the second and third derivative formulas for l leads to the following expressions: l\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = n 2 ( h\u00E2\u0080\u00B2\u00E2\u0080\u00B2 + ( h\u00E2\u0080\u00B2 )2 \u00E2\u0088\u0092 g\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g ) l\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = n 2 ( h\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 \u00E2\u0088\u0092 2 ( h\u00E2\u0080\u00B2 )3 + 3 h\u00E2\u0080\u00B2 g\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g \u00E2\u0088\u0092 g\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g ) . Taking expectations: El\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = n 2 ( h\u00E2\u0080\u00B2\u00E2\u0080\u00B2 + ( h\u00E2\u0080\u00B2 )2 \u00E2\u0088\u0092 E g\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g ) El\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 = n 2 ( h\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 \u00E2\u0088\u0092 2 ( h\u00E2\u0080\u00B2 )3 + 3 h\u00E2\u0080\u00B2 E g\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g \u00E2\u0088\u0092 E g\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g ) . Now Lemma 2 can be applied to the expectations of the ratios: E g\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g = E yTG\u00E2\u0080\u00B2\u00E2\u0080\u00B2y yTGy = t(G\u00E2\u0080\u00B2\u00E2\u0080\u00B2R) and E g\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 g = E yTG\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2y yTGy = t(G\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2R). Substituting the formulas for G\u00E2\u0080\u00B2\u00E2\u0080\u00B2, G\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2, and h\u00E2\u0080\u00B2, h\u00E2\u0080\u00B2\u00E2\u0080\u00B2, h\u00E2\u0080\u00B2\u00E2\u0080\u00B2\u00E2\u0080\u00B2 completes the proof. 83 Bibliography Conniffe, D. and Spencer, J. E. (2001), \u00E2\u0080\u009CWhen Moments of Ratios Are Ratios of Moments,\u00E2\u0080\u009D Journal of the Royal Statistical Society, Series D: The Statistician, 50, 161\u00E2\u0080\u0093168. Geary, R. C. (1933), \u00E2\u0080\u009CA General Expression for the Moments of Certain Symmetrical Functions of Normal Samples,\u00E2\u0080\u009D Biometrika, 25, 184\u00E2\u0080\u0093186. Harville, D. A. (1997), Matrix Algebra from a Statistician\u00E2\u0080\u0099s Perspective, Springer-Verlag Inc. 84 Appendix B Appendix to Chapter 4 This appendix contains the simulation results in Nagy, Loeppky, and Welch (2007) for three different inference methods. In addition to the plug-in and FBI that are the same as in Chapter 2, it also includes an extra Bayesian method using Markov chain Monte Carlo (MCMC) to sample from another posterior distribution that is different from the one used by the FBI. That means that the two Bayesian methods are not expected to give the same results. (However, as we will see in Section B.3, there is a strong connection: the FBI\u00E2\u0080\u0099s posterior is the normal approximation of the posterior sampled by the MCMC). After warning the reader in the next section why the results of this appendix should be taken with a grain of salt, in Section B.2 we outline the simulation procedure in Nagy et al. (2007) that is similar to the one presented in Chapter 2, but it explores a much wider range of experimental setups, and also has another method using MCMC, which is described in de- tail in Section B.3. Other differences include an alternative way to calculate the Coverage Probability (CP) of a prediction interval (derived in Section B.4) using the prior information that the data is a realization of a Gaussian process. Finally, the results presented in Section B.5 are based on the nor- mality assumption for the prediction intervals (which can be improved for the smallest sample sizes by using the t-distribution instead, as argued in Chapter 2). The true coverage probabilities obtained for the three different methods for the nominal 90%, 95%, and 99% levels are summarized in a table, followed by 10 figures for the the simulation results in d = 1, . . . , 10, plotting the actual coverages of the 100(1\u00E2\u0088\u0092\u00CE\u00B1)% pointwise prediction bands 85 Appendix B. Appendix to Chapter 4 against the nominal levels for \u00CE\u00B1 = 0.01, 0.02, . . . , 0.99 in the same fashion as Figures 2.3 and 2.4 before in Chapter 2. B.1 Warning Unlike the carefully designed 20 simulation studies in Chapters 2 and 3, the 90 simulations in this appendix have several limitations. This is because in addition to sensible choices (that one may expect to encounter in practice), we also wanted to explore more extreme experimental setups, such as overly challenging response surfaces or samples that are much too small relative to the number of input variables. Of course, the drawback of casting such a wide net is that we catch more interesting behaviors than we ask for. For example, unlike in Chapters 2 and 3, many times we could not complete computations for all 1, 000 replicates because of numerical difficulties. Note that here we are no longer talking about ill-conditioning of correlation ma- trices whose inverses had unrealistically large elements (as in Chapter 3), but outright failures when attempting to take the inverse ended with an er- ror message. Although these failures were excluded from the final analysis, other degenerate cases were not, e.g. when we did get an inverse, we did not check whether it was \u00E2\u0080\u009Crealistic\u00E2\u0080\u009D or not. Hence, there is no guarantee that numerical issues did not have a significant influence in some cases, and these limitations should be kept in mind when drawing conclusions from the results in this appendix. But in spite of all the difficulties, it is still interesting to observe the performance of the three methods on the frontiers of their applicability. B.2 Simulations The simulation plan can be viewed as a set of 10 statistically designed ex- periments for d = 1, . . . , 10. For each experiment, the design was a 3 \u00C3\u0097 3 full-factorial with 1, 000 replicates. The two factors were the range parame- 86 Appendix B. Appendix to Chapter 4 ter \u00CE\u00B8 and the sample size n, both at three levels (equally spaced on the log scale): \u00CE\u00B8 = 0.2, 2, 20 and n = 10 d/4, 10 d/2, 10 d (where 10 d/4 was rounded up to the nearest integer). To obtain 1, 000 replicates for a given combination of \u00CE\u00B8 and n, the fol- lowing four steps were repeated (attempted) 1, 000 times: 1. Select an n point design by Latin hypercube sampling in the d-dimensional unit hypercube [0, 1]d (McKay, Beckman, and Conover, 1979). 2. Generate a realization y of the Gaussian process over the n design points by setting the range parameter to \u00CE\u00B8 in all dimensions and the process variance to one. 3. Sample 10 new points uniformly in the unit hypercube [0, 1]d for pre- diction. 4. Compute the predictors for the three methods with their mean squared errors for the 10 new points from the data y. Note that step 2 or 4 could fail because of numerical issues, leading to an unsuccessful realization (missing value) for that particular replicate (not included in subsequent analysis). The only case when this had a catastrophic impact on results was the \u00CE\u00B8 = 0.2, n = 10 case for d = 1, since setting \u00CE\u00B8 to 0.2 pushes the limits of the standard double precision representation in the one input case: numerical difficulties arise because the high correlations in the n\u00C3\u0097n correlation matrix (all close to one) make it ill-conditioned (nearly singular). Hence, in Section B.5, the numbers and plots are missing in the \u00CE\u00B8 = 0.2, n = 10 case from the first (d = 1) row of the table and the first (d = 1) figure, respectively. B.3 MCMC To compare the FBI with another Bayesian method, we used uniform priors on the log scale for the range parameters and sampled the resulting poste- 87 Appendix B. Appendix to Chapter 4 rior by MCMC, using the Metropolis random walk algorithm (Metropolis, Rosenbluth, Rosenbluth, Teller, and Teller, 1953) that has been used suc- cessfully in many high-dimensional problems. Of course, this comparison is not entirely fair because the FBI is not taking samples directly from this posterior but its normal approximation. But to make it as comparable to the FBI as possible, everything was done on the log scale using the same \u00CE\u00B3-parameterization as in Chapter 2. Also, the first two moments of the N(\u00CE\u00B3\u00CC\u0082, \u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 ) normal approximation were utilized to help the implementa- tion in step 1 and step 3 of the algorithm, respectively: 1. Initialize \u00CE\u00B3(1) at \u00CE\u00B3\u00CC\u0082. 2. To select a direction for a random walk step, sample an integer j uniformly from 1, . . . , d. 3. Given the current \u00CE\u00B3(i), set \u00CE\u00B3\u00E2\u0088\u0097 to \u00CE\u00B3(i) and then add to the jth coordinate of \u00CE\u00B3\u00E2\u0088\u0097 a normal random deviate with mean zero and standard deviation equal to three times the standard error in the jth dimension, estimated from the Hessian: \u00E2\u0088\u009A \u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 (j, j). 4. Compute the acceptance ratio for \u00CE\u00B3\u00E2\u0088\u0097, given \u00CE\u00B3(i): p = min { 1, L(exp\u00CE\u00B3\u00E2\u0088\u0097) L(exp\u00CE\u00B3(i)) } . 5. Set \u00CE\u00B3(i+1) to \u00CE\u00B3\u00E2\u0088\u0097 with probability p and to \u00CE\u00B3(i) with probability 1\u00E2\u0088\u0092 p. 6. Repeat steps 2\u00E2\u0080\u00935 until i reaches the desired sample size. When this algorithm works well, it constructs a Markov chain whose sta- tionary distribution is the posterior distribution. The resulting sample then can be used for prediction exactly the same way as the sample for the FBI (step 4 in Chapter 2, Section 2.7). In other words, once the sampling is done, the treatment of the samples are identical. 88 Appendix B. Appendix to Chapter 4 But that does not mean that the samples are equivalent or similar. The MCMC algorithm constructs a large, dependent sample from a posterior that is only known up to a scale (proportional to the likelihood because of the uniform priors used for the \u00CE\u00B3 parameters). On the other hand, the FBI can get away with a much smaller independent, identically distributed (iid) sample that is not from the same posterior, but from its normal approxi- mation N(\u00CE\u00B3\u00CC\u0082, \u00E2\u0088\u0092H\u00E2\u0088\u00921 \u00CE\u00B3\u00CC\u0082 ), as in Chapter 2. The Monte Carlo sample size for the FBI was only 400, minus those sample points that ran into numerical difficulties caused by the ill-conditioning of the correlation matrix. This hap- pened mostly in lower-dimensional cases, especially in d = 1. The MCMC sample size was N = 100, 000 (after 10, 000 burn-in). Unlike the FBI sam- ple, the MCMC sample did not suffer from numerical problems because problematic points would never be accepted by the algorithm, since the likelihood/posterior was set to zero whenever the Cholesky-decomposition of the correlation matrix failed. An MCMC run was considered successful if the acceptance rate was at least 15% and the Mean Effective Sample Size (MESS) was at least 50. Both measures were calculated after the burn-in phase. The following formula was used for the MESS: MESS = 1 d d\u00E2\u0088\u0091 i=1 N [ 1 + 2 1000\u00E2\u0088\u0091 k=1 ( 1\u00E2\u0088\u0092 k N ) \u00CF\u0081\u00CC\u0082k(i) ]\u00E2\u0088\u00921 , where \u00CF\u0081\u00CC\u0082k(i) is the kth sample autocorrelation in the ith dimension (Carter and Kohn, 1994). These measures were intended to provide some minimal automatic qual- ity control, since visual examination of various diagnostic plots for all runs were clearly not possible. Of course, there is no guarantee that an MCMC chain that met both of these criteria (and as a result was classified as suc- cessful) has actually converged to the stationary distribution or was not deficient in some other way. The original technical report Nagy et al. (2007) 89 Appendix B. Appendix to Chapter 4 has more details about potential problems and the challenges of this partic- ular MCMC implementation. B.4 Coverage Probability Coverage probabilities for prediction bands were calculated by averaging the individual CPs over all new points and all successful realizations. A realization was considered successful if all operations for all three methods completed without error. It is straightforward to compute an individual CP. Suppose that we want to predict the output Y0 at a new, untried input x0. Since the true model is known during the simulation, we know that conditionally on the realized data, Y0 is normally distributed with mean \u00C2\u00B50 and variance \u00CF\u008320 , where \u00C2\u00B50 and \u00CF\u0083 2 0 are given by equations (2.3) and (2.4) in Chapter 2, respectively. Now suppose that after estimation, the predictor for Y0 was \u00C2\u00B51 with mean squared error \u00CF\u008321 . This amounts to mis-specifying the distribution of the random variable Y0 as N(\u00C2\u00B51, \u00CF\u0083 2 1) instead of the true N(\u00C2\u00B50, \u00CF\u0083 2 0). Then the CP of a normality-based 100(1\u00E2\u0088\u0092\u00CE\u00B1)% prediction interval about \u00C2\u00B51 is P0 ( \u00C2\u00B51 \u00E2\u0088\u0092 \u00CF\u00831 z\u00CE\u00B1/2 < Y0 < \u00C2\u00B51 + \u00CF\u00831 z\u00CE\u00B1/2 ) = = P0 ( \u00C2\u00B51 \u00E2\u0088\u0092 \u00CF\u00831 z\u00CE\u00B1/2 \u00E2\u0088\u0092 \u00C2\u00B50 \u00CF\u00830 < Y0 \u00E2\u0088\u0092 \u00C2\u00B50 \u00CF\u00830 < \u00C2\u00B51 + \u00CF\u00831 z\u00CE\u00B1/2 \u00E2\u0088\u0092 \u00C2\u00B50 \u00CF\u00830 ) = = \u00CE\u00A6 ( \u00C2\u00B51 + \u00CF\u00831 z\u00CE\u00B1/2 \u00E2\u0088\u0092 \u00C2\u00B50 \u00CF\u00830 ) \u00E2\u0088\u0092 \u00CE\u00A6 ( \u00C2\u00B51 \u00E2\u0088\u0092 \u00CF\u00831 z\u00CE\u00B1/2 \u00E2\u0088\u0092 \u00C2\u00B50 \u00CF\u00830 ) , where P0 denotes the true probability distribution, \u00CE\u00A6 is the cumulative distribution function of the standard normal N(0, 1), and z\u00CE\u00B1/2 satisfies \u00CE\u00A6(\u00E2\u0088\u0092z\u00CE\u00B1/2) = \u00CE\u00B1/2. 90 Appendix B. Appendix to Chapter 4 B.5 Results The following table is a summary of the CPs of the pointwise prediction bands of the three competing methods for the nominal 90%, 95%, and 99% confidence levels. The two-digit numbers in the table are truncated per- centages without the percent sign and without the fractional parts (rounded down). The 3\u00C3\u00973 arrangement inside each cell follows the layout of the plots in the following figures by the three levels of \u00CE\u00B8 horizontally and the three levels of n vertically. After the table, the following 10 figures compare the validity of the three methods for d = 1, . . . , 10, for all combinations of the three levels of \u00CE\u00B8 and the three levels of n. In addition to the gray diagonal in the middle, three curves were plotted for the three methods relating the true coverage probabilities on the vertical axis (from 1% to 99%) to the nominal coverage on the horizontal axis (from 1% to 99%). This is the same as before in Figures 2.3 and 2.4 in Chapter 2, just this time the axis labels are not shown, to be able to present 9 plots in the same figure in a 3\u00C3\u0097 3 arrangement. Plots are based on the realizations that were classified as successful, out of 1, 000 attempts in total. Counts for the number of realizations included in the final calculations are shown in the top-left corner of each plot. Cal- culations of the CPs were always restricted to the successful subset of the 1, 000 realizations and all failures were excluded. 91 Appendix B. Appendix to Chapter 4 90% 95% 99% d plugin FBI MCMC plugin FBI MCMC plugin FBI MCMC 72 76 85 85 89 94 78 82 90 89 93 96 85 89 95 94 96 98 1 67 66 64 82 81 75 94 95 88 73 72 69 86 84 79 95 97 94 81 80 76 90 89 84 97 98 97 61 59 52 85 81 65 94 87 79 66 64 57 87 84 71 96 92 85 73 70 63 90 88 78 98 96 90 80 80 75 87 87 83 88 89 88 87 86 82 92 92 88 93 93 93 94 94 90 96 96 94 97 97 97 2 71 70 59 84 82 76 89 87 85 78 76 65 89 87 82 93 92 91 86 84 74 94 92 89 96 96 96 50 45 39 76 76 68 82 85 78 56 50 44 80 81 74 87 90 84 64 58 51 86 87 82 91 95 91 81 81 74 87 87 83 88 88 88 88 87 81 92 92 89 93 93 93 95 94 89 97 97 95 97 97 98 3 73 68 57 85 82 78 87 84 85 80 75 64 90 87 85 92 89 91 88 84 73 95 94 92 96 94 96 53 45 44 81 82 78 77 84 81 60 51 50 85 87 84 82 90 88 69 60 58 91 93 91 87 95 94 83 81 74 88 87 84 89 88 88 89 88 81 93 92 90 94 93 93 96 95 89 98 97 96 98 97 98 4 75 67 60 86 83 84 87 83 86 82 74 66 91 89 89 92 89 92 90 84 76 96 95 96 96 94 97 49 43 44 84 85 81 75 85 83 55 49 50 89 90 87 81 90 89 65 58 59 93 95 94 87 96 95 83 81 74 88 87 87 88 87 88 89 88 81 93 92 92 93 92 93 96 95 90 98 97 97 98 97 98 5 74 65 62 86 85 86 85 84 87 81 73 69 91 91 92 90 90 92 90 83 78 96 96 97 95 95 98 50 45 48 88 86 84 72 84 84 56 51 54 92 91 90 78 90 90 67 62 64 96 96 96 84 96 96 83 80 74 88 87 88 88 86 88 89 87 81 93 92 93 93 91 94 96 95 90 98 97 98 98 96 98 6 74 65 63 87 87 87 82 85 87 81 72 70 92 92 92 88 91 93 90 83 80 97 97 97 94 96 98 49 46 49 90 88 85 72 85 85 56 53 55 94 93 91 78 91 91 67 63 65 97 97 97 85 96 97 84 79 76 89 88 88 88 85 88 90 86 83 94 93 94 93 91 94 96 94 91 98 98 98 98 96 98 7 72 64 65 86 88 87 81 86 88 80 72 73 92 93 93 87 91 93 89 83 82 97 98 98 93 96 98 50 47 51 92 88 86 73 86 86 57 54 57 95 93 92 79 91 91 68 64 67 98 98 97 86 97 97 84 79 76 89 88 89 89 86 89 90 86 83 94 93 94 94 91 94 97 94 91 98 98 98 98 97 98 8 71 64 66 87 89 88 80 86 88 79 72 74 92 94 93 86 92 93 89 83 83 97 98 98 93 97 98 49 48 51 93 88 86 73 86 86 56 55 58 96 93 92 79 92 92 67 66 68 98 98 97 87 97 97 84 78 77 89 89 89 88 86 89 90 85 84 94 94 94 94 92 94 97 93 92 98 98 98 98 97 98 9 71 65 67 88 89 88 79 87 88 79 73 74 93 94 93 85 93 93 88 84 84 97 98 98 93 97 98 50 50 52 94 88 87 74 86 86 57 57 59 97 93 92 80 92 92 69 68 69 99 98 97 88 97 97 84 77 78 89 89 89 88 87 89 90 85 84 94 94 94 94 92 94 97 93 93 98 98 98 98 97 98 10 70 66 68 90 89 88 79 88 88 78 74 75 94 94 93 85 93 93 88 84 85 98 98 98 93 98 98 49 50 54 94 88 87 75 87 87 57 57 61 97 93 93 81 92 92 68 69 72 99 98 98 89 97 97 92 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 0 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 1 n = 3 n = 5 n = 1 0 93 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 987 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 992 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 925 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 2 n = 5 n = 10 n = 2 0 94 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 993 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 3 n = 8 n = 15 n = 3 0 95 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 4 n = 1 0 n = 2 0 n = 4 0 96 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 5 n = 1 3 n = 2 5 n = 5 0 97 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 6 n = 1 5 n = 3 0 n = 6 0 98 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 998 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 998 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 7 n = 1 8 n = 3 5 n = 7 0 99 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 995 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 998 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 8 n = 2 0 n = 4 0 n = 8 0 100 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 996 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 983 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 998 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 999 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 9 n = 2 3 n = 4 5 n = 9 0 101 Appendix B. Appendix to Chapter 4 Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 993 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 988 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 1000 realizationsplugin FBI MCMC Nominal coverage Tr ue c ov er ag e 995 realizationsplugin FBI MCMC \u00CE\u00B8 = 0.2 \u00CE\u00B8 = 2 \u00CE\u00B8 = 20 d = 10 n = 2 5 n = 5 0 n = 1 00 102 Bibliography Carter, C. K. and Kohn, R. (1994), \u00E2\u0080\u009COn Gibbs Sampling for State Space Models,\u00E2\u0080\u009D Biometrika, 81, 541\u00E2\u0080\u0093553. McKay, M. D., Beckman, R. J., and Conover, W. J. (1979), \u00E2\u0080\u009CA Comparison of Three Methods for Selecting Values of Input Variables in the Analysis of Output from a Computer Code,\u00E2\u0080\u009D Technometrics, 21, 239\u00E2\u0080\u0093245. Metropolis, N., Rosenbluth, A. W., Rosenbluth, M. N., Teller, A. H., and Teller, E. (1953), \u00E2\u0080\u009CEquation of State Calculations by Fast Computing Ma- chines,\u00E2\u0080\u009D Journal of Chemical Physics, 21, 1087\u00E2\u0080\u00931091. Nagy, B., Loeppky, J. L., and Welch, W. J. (2007), \u00E2\u0080\u009CFast Bayesian Infer- ence for Gaussian Process Models,\u00E2\u0080\u009D Tech. Rep. 230, Department of Statis- tics, The University of British Columbia. 103"@en .
"Thesis/Dissertation"@en .
"2008-11"@en .
"10.14288/1.0066559"@en .
"eng"@en .
"Statistics"@en .
"Vancouver : University of British Columbia Library"@en .
"University of British Columbia"@en .
"Attribution-NonCommercial-NoDerivatives 4.0 International"@en .
"http://creativecommons.org/licenses/by-nc-nd/4.0/"@en .
"Graduate"@en .
"Computer experiment"@en .
"Bayesian inference"@en .
"Gaussian process"@en .
"Prediction uncertainty"@en .
"Valid estimation and prediction inference in analysis of a computer model"@en .
"Text"@en .
"http://hdl.handle.net/2429/1561"@en .