27
DFG-Schwerpunktprogramm 1324 Extraktion quantifizierbarer Information aus komplexen Systemen” Black Box Approximation of Tensors in Hierarchical Tucker Format J. Ballani, L. Grasedyck, M. Kluge Preprint 62

DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

DFG-Schwerpunktprogramm 1324

”Extraktion quantifizierbarer Information aus komplexen Systemen”

Black Box Approximation of Tensors in HierarchicalTucker Format

J. Ballani, L. Grasedyck, M. Kluge

Preprint 62

Page 2: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

Edited by

AG Numerik/OptimierungFachbereich 12 - Mathematik und InformatikPhilipps-Universitat MarburgHans-Meerwein-Str.35032 Marburg

Page 3: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

DFG-Schwerpunktprogramm 1324

”Extraktion quantifizierbarer Information aus komplexen Systemen”

Black Box Approximation of Tensors in HierarchicalTucker Format

J. Ballani, L. Grasedyck, M. Kluge

Preprint 62

Page 4: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

The consecutive numbering of the publications is determined by theirchronological order.

The aim of this preprint series is to make new research rapidly availablefor scientific discussion. Therefore, the responsibility for the contents issolely due to the authors. The publications will be distributed by theauthors.

Page 5: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

Black Box Approximation of Tensors in

Hierarchical Tucker Format

Jonas Ballani ∗, Lars Grasedyck, Melanie Kluge †

October 1, 2010

We derive and analyse a scheme for the approximation of order d tensors A ∈R

n×···×n in the hierarchical (H-) Tucker format, a dimension-multilevel variantof the Tucker format and strongly related to the TT format. For a fixed rankparameter k, the storage complexity of a tensor in H-Tucker format is O(dk3 +dnk) and we present a (heuristic) algorithm that finds an approximation to atensor in the H-Tucker format in O(dk4 + d log(d)nk2) by inspection of onlydk3 + d log(d)nk2 entries. Under mild assumptions, tensors in the H-Tuckerformat are reconstructed. For general tensors we derive error bounds that arebased on the approximability of matrices (matricizations of the tensor) by fewouter products of its rows and columns. The construction parallelizes with respectto the order d and we also propose an adaptive approach that aims at finding therank parameter for a given target accuracy ε automatically.

Keywords: Hierarchical Tucker, Tensor Rank, Tensor Approximation, TensorTrain, Cross Approximation.MSC: 15A69, 65F99

1 Introduction

In this article we provide a heuristic that aims at finding — by inspecting only a few entriesof A — an accurate representation of a tensor

A ∈ Rn1×···×nd, n1, . . . , nd ∈ N,

in a data-sparse low rank tensor format, namely the hierarchical (H-) Tucker format [6, 5].The tensor A could, e.g., be given by a multivariate function f : [0, 1]d → R on a tensor grid:

Ai1,...,id = f(ξi1, . . . , ξid), ξi ∈ [0, 1].

∗Max Planck Institute for Mathematics in the Sciences, Inselstraße 22–26, D-04109 Leipzig, Germany.†Institut fur Geometrie und Praktische Mathematik, RWTH Aachen, Templergraben 55, 52056 Aachen,

Germany. Email: {lgr,kluge}@igpm.rwth-aachen.de. Financial support from the DFG SPP-1324under grant GRA2179/2-1 gratefully acknowledged.

1

Page 6: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

For the tensor A, respectively the function f , we require that there exists a low (hierarchical)rank approximation — which is unknown to us. Our goal is to find, i.e. construct, the data-sparse low rank representation without forming the whole tensor. In almost all practicalapplications where tensors arise it is not known a priori how a low rank representationshould be obtained, and thus our approximation scheme can be regarded as a general toolfor the conversion into the H-Tucker format. Once the tensor is in the H-Tucker format, onecan perform standard arithmetic operations with it in a complexity O(dk4 + k2

∑dµ=1 nµ),

where k is an internal rank parameter.A crucial part for the approximation is to determine the necessary entries of the tensor

A that have to be inspected, the so-called pivot elements. We provide an adaptive andincremental construction alongside with an error estimate and stopping criterion.

In [10] a cross approximation algorithm is proposed for the TT format [9, 8] which is aspecial subclass of the H-Tucker format. Our results can be regarded as an extension tothe H-Tucker format, but we also provide an adaptive pivoting strategy, an incrementalconstruction as well as error bounds for the approximation (under reasonable assumptions).

In Section 2 we introduce the hierarchical Tucker format [6, 5] and the correspondinghierarchical rank. In Section 3 we present the hierarchical black box approximation schemeas well as the adaptive pivoting strategy. In Section 4 we derive a priori error bounds anda plausible but heuristic bound. In the last Section 5 we provide a number of numericalexamples and counterexamples that underline the efficiency of the method as well as itslimitations.

2 The Hierarchical Tucker Format

In the hierarchical Tucker format, the sparsity of the representation of a tensor is determinedby the hierarchical rank which is the rank of certain matricizations of the tensor. For therest of the article we use the notation for index sets

I := I1 × · · · × Id, Iµ := {1, . . . , nµ}, µ = 1, . . . , d.

2.1 Definition of the H-Tucker Format

Definition 1 (Matricization) For a tensor A ∈ RI, a collection of dimension indices

t ⊂ {1, . . . , d} and the complement s := {1, . . . , d} \ t the matricization (cf. Figure 1)

A(t) ∈ RIt×Is, It := ×

µ∈tIµ, Is := ×

µ∈sIµ,

is defined by its entries (A(t)

)(iµ)µ∈t,(iµ)µ∈s

:= Ai1,...,id.

Example 2 The matricizations of the tensor

Ai1,i2,i3,i4 := i1 + 2(i2 − 1) + 4(i3 − 1) + 8(i4 − 1), i1, i2, i3, i4 ∈ {1, 2}

2

Page 7: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

A({1}) =

◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ • ◦ ◦ ◦ ◦ ◦◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ • ◦ ◦ ◦ ◦ ◦◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ • ◦ ◦ ◦ ◦ ◦◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ • ◦ ◦ ◦ ◦ ◦

Figure 1: Left: Position of entries of a 4×4×4 tensor A. Right: Matricization A({1}) for thenode t = {1}. The blue dots form a column in the matricization.

are

A({1}) =

[1 3 5 7 9 11 13 152 4 6 8 10 12 14 16

], A({2}) =

[1 2 5 6 9 10 13 143 4 7 8 11 12 15 16

],

A({3}) =

[1 2 3 4 9 10 11 125 6 7 8 13 14 15 16

], A({4}) =

[1 2 3 4 5 6 7 89 10 11 12 13 14 15 16

],

A({2,3,4}) = (A({1}))T , A({1,2}) =

1 5 9 132 6 10 143 7 11 154 8 12 16

, A({3,4}) = (A({1,2}))T .

Based on the matricization of a tensor A with respect to several sets t ⊂ {1, . . . , d} onecan define the hierarchical rank and the hierarchical Tucker format. In order to be able toperform efficient arithmetics, we require the sets t to be organized in a tree.

T 0

I {1, 2, 3, 4, 5, 6, 7}��=ZZ~

T 1

I {1, 2, 3, 4}��=ZZ~

{5, 6, 7}��=ZZ~

T 2

I {1, 2}���AAU

{3, 4}���AAU

{5, 6}���AAU

{7}

T 3

I {1}{2} {3}{4} {5}{6}

T 0

I{1, 2, 3, 4, 5, 6, 7}��=ZZ~

T 1

I{1} {2, 3, 4, 5, 6, 7}��=ZZ~

T 2

I{2} {3, 4, 5, 6, 7}��=ZZ~

T 3

I{3} {4, 5, 6, 7}��=ZZ~

T 4

I{4} {5, 6, 7}��=ZZ~

T 5

I{5} {6, 7}��=ZZ~

T 6

I{6} {7}

Figure 2: Left: The canonical dimension tree. Right: The degenerate TT-tree.

Definition 3 (Dimension tree) A dimension tree or mode cluster tree TI for dimensiond ∈ N is a tree with root D := {1, . . . , d} and depth p such that each node t ∈ TI is either

1. a leaf and singleton t = {µ} or

2. the union of two disjoint successors S(t) = {t1, t2}:

t = t1 ∪ t2. (1)

3

Page 8: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

The level ℓ of the tree is defined as the set of all nodes having a distance of exactly ℓ to theroot, cf. Figure 2. We denote the level ℓ of the tree by

T ℓI := {t ∈ TI | level(t) = ℓ}.

The set of leaves of the tree is denoted by L(TI) and the set of interior (non-leaf) nodes isdenoted by I(TI). A node of the tree is a so-called mode cluster (a union of modes).

Definition 4 (Hierarchical rank, H-Tucker) Let TI be a dimension tree. The hierarchi-cal rank (kt)t∈TI

of a tensor A ∈ RI is defined by

∀t ∈ TI : kt := rank(A(t)).

The set of all tensors of hierarchical rank (node-wise) at most (kt)t∈TI, the so-called H-Tucker

tensors, is denoted by

H-Tucker((kt)t∈TI) := {A ∈ R

I | ∀t ∈ TI : rank(A(t)) ≤ kt}.

Remark 5 (Canonical dimension tree and TT-tree) In the hierarchical format onlysome of the possible subsets t of all modes appear. A special case is the so-called TT-format[8] with corresponding TT-rank and TT-tree, where all nodes are of the form (cf. Figure 2)

t = {q} or t = {q, . . . , d}, q = 1, . . . , d.

This tree is of maximal depth (cf. [5, Section 5] for a discussion).In the canonical case the tree is of minimal depth p := ⌈log2(d)⌉ := min{i ∈ N0 | i ≥

log2(d)} with mode clusters of the form (cf. Figure 2)

{1, . . . , d}{1, . . . , ⌈d/2⌉}, {⌈d/2⌉ + 1, . . . , d},{1, . . . , ⌈d/4⌉}, {⌈d/4⌉ + 1, . . . , ⌈2d/4⌉}, {⌈2d/4⌉+ 1, . . . , ⌈3d/4⌉}, {⌈3d/4⌉+ 1, . . . , d},etc.

2.2 Arithmetics in the H-Tucker Format

The storage complexity for a tensor in the (CP) format (cf. [7] and the references therein)with rank k, mode size n and order d is O(dkn). In the H-Tucker format the storagecomplexity will turn out to be roughly one factor k higher.

Lemma 6 (Hierarchical Tucker format, [5]) Let TI be a dimension tree and let A ∈H-Tucker((kt)t∈TI

). Then A can be represented by transfer tensors (Bt)t∈I(TI) (for interiornodes) and mode frames (Ut)t∈L(TI) (for leaves), where Bt ∈ R

kt×kt1×kt2 for S(t) = {t1, t2}

and Ut ∈ RIt×kt.

The storage complexity in terms of number of entries for Bt, Ut from the previous lemma is

Storage((Bt)t∈I(TI), (Ut)t∈L(TI)) ≤ (d − 1)k3 + kd∑

µ=1

nµ, k := maxt∈TI

kt, (2)

i.e. linear in the order d (provided that k is uniformly bounded) [5].

4

Page 9: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

Notation 7 For a matrix U ∈ RI×J we denote by a single subscript Uj ∈ R

I the j-th columnof the matrix. If this is ambiguous then the notation U·,j or U |I×{j} is used.

For each of the interior nodes the corresponding mode frame is implicitly given by thefollowing nestedness property:

(Ut)i =

kt1∑

j=1

kt2∑

ℓ=1

(Bt)i,j,ℓ(Ut1)j ⊗ (Ut2)ℓ (3)

In particular the tensor A is given by A = UD for the root D. In the following section weexplain how the mode frames Ut for the leaves t and the transfer tensors Bt for the interiornodes can be constructed efficiently.

Basic arithmetic operations like linear combinations of H-Tucker tensors can be performedexact, but the representation rank (kt)t∈TI

will be proportional to the sum of the represen-tation ranks. It is therefore necessary to reduce (truncate) the rank of a tensor A by finding(almost) best approximations with prescribed rank, Tk(A), or (almost) minimal rank approx-imations with prescribed truncation accuracy, Tε(A). Such a truncation is possible in theH-Tucker format. The details are not relevant here, we just summarize the main result from[5].

Let TI be a dimension tree and A ∈ H-Tucker((kt)t∈I). Let Abest denote the best approxi-mation of A in H-Tucker((kt)t∈TI

) and Tk(A) the truncation of A to rank (kt)t∈TI. Then the

truncation is quasi-optimal,

‖A − Tk(A)‖ ≤√

2d − 3‖A − Abest‖,

and it can be computed in

O(

d maxt∈TI

k4t +

d∑

µ=1

nµk2µ

).

For the proof we refer to [5, Theorem 3.11, Remark 3.12, Lemma 4.9].We conclude that the H-Tucker format is almost as data-sparse as the (CP)-model, and

additionally it allows for a formatted (truncated) arithmetic in quasi-optimal complexity(one additional factor k) and with quasi-optimal accuracy (proportionality factor

√2d − 3).

3 Black Box Approximation and Pivoting

The approximation of tensors in the H-Tucker format is based on two concepts: One hasto approximate the matricizations A(t) (Definition 1) by low rank kt, and one has to ensurethat the approximations are nested (3).

3.1 Approximation of Matricizations

In [4] the approximability of matrices by outer products of some of its columns and rows isanalysed. The main theorem states that for every matrix A(t) ∈ R

It×It′ and every rank kapproximation

‖A(t) − R‖2 ≤ ε, rank(R) ≤ k,

5

Page 10: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

there exist k row indices Pt = {p(t)1 , · · · , p

(t)k } ⊂ It and column indices Pt′ = {q(t′)

1 , · · · , q(t′)k } ⊂

It′ and a matrix S such that

A(t) := A(t)|It×Pt′· S−1 · A(t)|Pt×It′

, S ∈ RPt×Pt′ ,

approximates the whole matrix with an error of the size

‖A(t) − A(t)‖2 ≤ ε(1 + 2

√k(√

#It +√

#It′

)).

A practical construction based on successive rank one approximations is given in [1]. The

∼∼

6312

4

7

13 6247

Figure 3: Rows and columns of A(t) are used for a low rank approximation.

idea is to construct rank one approximations of the remainder:

X1 := A(t)·,q1

1

A(t)p1,q1

A(t)p1,· ,

Xj := Xj−1 + (A(t) − Xj−1)·,qj

1

(A(t) − Xj−1)pj ,qj

(A(t) − Xj−1)pj ,· , j = 2, . . . , k. (4)

The final approximation is given by A(t) := Xk. In the form above, the matrix S is

S = A(t)|Pt×Pt′, Pt := {p1, . . . , pk}, Pt′ := {q1, . . . , qk}.

In principle, we use exactly this approximation scheme with three necessary modifications:

1. The column and row vectors can only be formed when the index sets It, It′ are small,i.e., when t, t′ are leaves of the tree. Whereas in [10] this is done by fixing an initialguess of all pivot elements and then optimizing them with respect to one mode at atime, we will choose an entirely different approach.

2. The pivot elements are best chosen such that S has maximal volume. Since this is ingeneral practically impossible, one instead chooses the pivot indices pj , qj such that theremainder

∣∣(A(t) − Xj−1)pj ,qj

∣∣ is maximized over the whole matrix (full pivoting), or acolumn/row (partial pivoting), respectively. We will use a maximization over crossesof the tensor as it was introduced in [3, Algorithm 2: Greedy Initial Pivot Search].

3. The choice of possible row and column pivots is restricted in order to ensure the nest-edness property.

6

Page 11: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

3.2 Choice of Pivot Elements

In the incremental construction (4), we will choose pivot elements (pj , qj) from a restrictedset (required in Subsection 3.3)

pj ∈ Pt ⊂ It, qj ∈ Pt′ = It × Pf ′ ⊂ It′ ,

where Pf ′ = {q(f ′)1 , . . . , q

(f ′)k } is the set of column pivot indices for the father f of t and t

(S(f) = {t, t }).In each step of construction (4) we thus aim at finding

(pj , qj) := argmaxpj∈It,qj∈It×Pf ′

∣∣∣(A(t) − Xj−1)pj ,qj

∣∣∣.

This is done by a simple greedy search in the entries of the remainder (similar to Algorithm 2in [3]) starting at random entries and then looking for entries by varying only one componentat a time. The procedure is given in Algorithm 1.

Algorithm 1 Greedy Pivot Search

1: Given: an initial index (iµ)µ∈D, D := {1, . . . , d}, a subset It×Pf ′ ⊂ It′ , t′ = {1, . . . , d}\t,a tensor A ∈ R

I and an approximation Xj−1 of A.2: for ℓ = 1, 2, . . . , ℓmax (typically ℓmax := 3) do3: for µ ∈ f = t ∪ t do4: Modify the µ-th index by

iµ := argmaxiµ∈{1,...,nµ}

∣∣(A − Xj−1)(i1,...,id)

∣∣

5: end for6: Modify the remaining indices in f ′ = D \ f by

(iµ)µ∈f ′ := argmax(iµ)µ∈f ′∈Pf ′

∣∣(A − Xj−1)(i1,...,id)

∣∣

7: end for8: Return value: the pivot index (i1, . . . , id).

3.3 Ensuring Nestedness

Let t be a node with sons S(t) = {t1, t2}. We denote the three corresponding approximationsof the matricizations by

Nt := AtS−1t A′

t, At := A(t)|It×Pt′, St := A(t)|Pt×Pt′

, A′t := A(t)|Pt×It′

, (5)

Nt1 := At1S−1t1 A′

t1 , At1 := A(t1)|It1×Pt′

1

, St1 := A(t1)|Pt1×Pt′

1

, A′t1 := A(t1)|Pt1

×It′1

, (6)

Nt2 := At2S−1t2

A′t2, At2 := A(t2)|It2

×Pt′2

, St2 := A(t2)|Pt2×Pt′

2

, A′t2

:= A(t2)|Pt2×It′

2

. (7)

7

Page 12: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

In the leaves t we set(Ut)i := A(t)|·,qi

, qi ∈ Pt′ .

For all interior nodes we define

(Bt)i,j,ℓ :=∑

p∈Pt1

q∈Pt2

(S−1t1

)qj ,pA(t)(p,q),qi

(S−1t2

)qℓ,q, qi ∈ Pt′ . (8)

The construction breaks down if a non-zero pivot element could not be determined (thematrix S becomes singular). This can either be the case when the tensor is of rank j−1 andthe remainder zero, or it could be that there are non-zero elements that we could not find.For a discussion and counterexamples see, e.g. [2].

The construction (4) with the greedy pivot search and setup of the transfer tensors (8) isadaptive in the sense that the size of the pivot element gives an estimate for the ‖ · ‖∞ normof the remainder. Also, one can update an approximation that is not accurate enough bycontinuation of the pivot search — independently for each node t. This is a difference to theprocedure in [9], where the rank distribution has to be determined or guessed in advance.In the numerical tests we will see that the (heuristic) error estimation gives good results. Inthe following section we will estimate the approximation error under stronger assumptions.

Lemma 8 (Complexity) The complexity Nsetup for the setup of the mode frames Ut forthe leaves t ∈ L(TI) and the transfer tensors Bt for the interior nodes t ∈ I(TI) is

Nsetup = O(

dk4 + log(d)k2

d∑

µ=1

), k := max

t∈TI

kt.

The number of entries Nentries required from A is of the size

Nentries = O(

dk3 + log(d)k2d∑

µ=1

).

Proof: (Nsetup): Once the pivot elements are determined, it is clear that the setup of all

Ut for leaves t is of complexity∑d

µ=1 nµkµ (copy of entries from A to Ut). For the transfer

tensors the ktkt1kt2 entries of A(t)(p,q),qi

are transformed by the inverses S−1t1 , S−1

t2 which in sum

provides the first part of the claimed estimate. The setup of S−1t is of complexity at most

O(k3t ), and this is required kt times (j = 1, . . . , kt). In total, this is of complexity O(k4

t ),which gives again the first term in the estimate.

The evaluation of Xj−1 in a single point (i, ℓ) is of complexity k2t

∑µ∈t nµ because the low

rank form allows the evaluation of the form

A(t)i,ℓ = (At)i,·S

−1t (A′

t)·,ℓ.

When one of the two indices is fixed and we compute entries, e.g., for several indices i,then S−1

t (A′t)·,ℓ can be precomputed in O(k2

t ). Afterwards, each evaluation is of complexity

8

Page 13: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

kt

∑µ∈t nµ. For all j = 1, . . . , k and all nodes of the tree this sums up to the second term in

the claimed estimate:

t∈TI

(k2

t

µ∈t

nµ + k3t

)≤ dk3 + k2

t∈TI

µ∈t

nµ ≤ dk3 + k2

depth(TI)∑

ℓ=0

t∈T ℓI

µ∈t

≤ dk3 + k2

depth(TI)∑

ℓ=0

d∑

µ=1

nµ ≤ dk3 + k2(log(d) + 1)d∑

µ=1

(Nentries): The entries required for the setup of Ut, Bt are O(∑d

µ=1 nµkµ +dk3). For the pivot

search we have in each node t a number of evaluations O(∑

µ∈t nµk2t ) (kt iterations), and

summing this up over all nodes gives O(log(d)k2∑d

µ=1 nµ).

4 A Priori Error Estimation

If we would approximate each matricization A(t) independently by a skeleton decompositionwith error ε, then form the orthogonal factor Qt,

QtRt = A(t)|It×Pt′,

and use QtQTt as orthogonal projector

(πtA)(t) := QtQTt A(t),

then [5, Theorem 3.11, Remark 3.12] shows that the projection

AQ :=

(∏

t∈TI

πt

)A

fulfills‖A − AQ‖ ≤

√2d − 3 ε, AQ ∈ H-Tucker((kt)t∈TI

).

The exact projection with the orthogonal factors, however, is practically impossible. Instead,we try to approximate

A(t)|·,i ≈kt1∑

j=1

kt2∑

ℓ=1

A(t1)|·,qj⊗ A(t2)|·,qℓ

· (Bt)i,j,ℓ,

where Bt was defined in (8). We will now estimate the error of this approximation step.From [2] it is well known that the pivot search can fail for matrices. Here, we will assume

that the pivot search is successful for all matricizations.

Assumption 9 We assume that for every matricization A(t) the pivot search (Algorithm 1)is almost optimal, i.e., for some δ ≥ 0

|(A(t) − Xj−1)pj ,qj| ≥ 1

1 + δ‖A(t) − Xj−1‖∞, j = 1, . . . , k

9

Page 14: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

Further, we assume that for each matricization the error of the non-nested approximation isbounded by ε:

‖A(t) − Xkt‖∞ ≤ ε

We use the same notation as in the previous section. We define the defect matrices

Ft := (A(t) − Nt)|It×Pt′, Ft1 := (A(t1) − Nt1)|It1

×(It2×Pt′)

, Ft2 := (A(t2) − Nt2)|It2×(It1

×Pt′).

Lemma 10 Let Nt1 , Nt2 from (6),(7) be approximations of A(t1), A(t2) with defect Ft1 , Ft2.Then for i1 ∈ It1 , i2 ∈ It2 and q ∈ Pt′ holds

A(t)(i1,i2),q

=

kt1∑

j=1

kt2∑

ℓ=1

A(t1)

i1,q1

j

· A(t2)

i2,q2

· (Bt)q,j,ℓ + (Ft)(i1,i2),q

(q1j ∈ Pt′

1, q2

ℓ ∈ Pt′2

)

for the defect tensor

(Ft)(i1,i2),q :=

kt1∑

α=1

(At1S−1t1

)i1,α(Ft2)i2,(α,q) + (Ft1)i1,(i2,q)

Proof: First, we approximate A(t)(i1,i2),q

by (Nt1)i1,(i2,q) with error (Ft1)i1,(i2,q), then we approx-

imate (A′t1)α,(i2,q) by (Nt2)i2,(α,q) with error (Ft2)i2,(α,q). Both together yield the stated error.

In the defect tensor Ft each entry is possibly amplified by At1S−1t1 . This factor is estimated

next.

Lemma 11 Let At1 , St1 denote the factors from (6). Then for i1 ∈ It1 and α ∈ Pt1 holds

|(At1S−1t1 )i1,α| ≤ δk := k(1 + δ)2(2 + δ)k−2.

Proof: The pivot elements are denoted by pj , qj. We introduce the notation

Gj· := −(A(t1) − Xj−1)−1

pj ,qj(A(t1) − Xj−1)pj ,·

and observe that due to Assumption 9: ‖Gj‖∞ ≤ 1 + δ.The first approximation step is

X1 = A(t1)·,q1

(A(t1)p1,q1

)−1A(t1)p1,· =

[A(t1)

·,q1

][1][−G1

]T.

One can in a straight-forward way derive that the approximation after k steps is of the form

Xk =[A(t1)

·,q1

∣∣A(t1)·,q2

∣∣ . . .∣∣A(t1)

·,qk

] [M0

∣∣M1

∣∣M2

∣∣ · · ·∣∣Mk−1

] [− G1

∣∣ · · ·∣∣− Gk

]T

with vectors

M ′1(l) :=

[G1

ql

]∈ R

1, . . . , M ′k−1(l) :=

[M ′

k−2(l) + M ′k−2(k − 1)Gk−1

ql

Gk−1ql

]∈ R

k−1, l ≤ k

10

Page 15: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

and their extensions to vectors of length k by appending a one and zeros:

M0 :=

10...0

∈ R

k, Mj :=

M ′j(j + 1)

10...0

∈ R

k, Mk−1 :=

[M ′

k−1(k)1

]∈ R

k.

We use the notation Y k := Mk−1(−Gk)T and show per induction∥∥Y k

∥∥∞

≤ (1 + δ)2(2 + δ)k−2. (9)

From Assumption 9 we derive the maximum norm bound∥∥Y k

∥∥∞

= ‖Mk−1‖∞∥∥Gk

∥∥∞

≤ (1 + δ) ‖Mk−1‖∞ .

For k = 3 we can directly estimate

∥∥Y 3∥∥∞

≤ (1 + δ) ‖M2‖∞ = (1 + δ)

∥∥∥∥∥∥

G1

q3+ G1

q2G2

q3

G2q3

1

∥∥∥∥∥∥∞

≤ (1 + δ)(∣∣G1

q3

∣∣+∣∣G1

q2G2

q3

∣∣) ≤ (1 + δ)((1 + δ) + (1 + δ)2

)= (1 + δ)2(2 + δ).

By induction the assertion (9) follows from

∥∥Y k∥∥∞

≤ (1 + δ) ‖Mk−1‖∞ = (1 + δ)

∥∥∥∥∥∥

M ′

k−2(k) + M ′k−2(k − 1)Gk−1

qk

Gk−1qk

1

∥∥∥∥∥∥∞

≤ (1 + δ)

∥∥∥∥∥∥

M ′k−2(k)00

∥∥∥∥∥∥∞

+

∥∥∥∥∥∥

M ′

k−2(k − 1)Gk−1qk

Gk−1qk

1

∥∥∥∥∥∥∞

≤ (1 + δ)((1 + δ)(2 + δ)k−3 + (1 + δ)2(2 + δ)k−3

)= (1 + δ)2(2 + δ)k−2

The final assertion follows from (9):

∥∥At1S−1t1

∥∥∞

=

∥∥∥∥[M0

∣∣M1

∣∣M2

∣∣ · · ·∣∣Mk−1

] [− G1

∣∣ · · ·∣∣− Gk

]T∥∥∥∥∞

≤ k∥∥Y k

∥∥∞

≤ k(1 + δ)2(2 + δ)k−2

In the following we will assume for simplicity kt = k for all nodes t. We use the results ofthe above lemmata to get a bound of the defect tensor Ft in the mode cluster t.

Lemma 12 Let the matricizations A(t), A(t1) and A(t2) with S(t) = {t1, t2} fulfill Assumption9. We use the notation from Lemma 11. Then the error bound of the approximation of A(t)

is given by‖Ft‖∞ ≤ ε (k δk + 1) =: ε c(k)

11

Page 16: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

Proof: According to Assumption 9 and Lemma 11 we obtain

‖Ft‖∞ = maxi1,i2,q

∣∣(Ft)(i1,i2),q

∣∣ ≤ maxi1,i2,q

k∑

α=1

∣∣(At1S−1t1

)i1,α

∣∣ ∣∣(Ft2)i2,(α,q)

∣∣+ ε

≤ kε maxi1,α

∣∣(At1S−1t1

)i1,α

∣∣+ ε ≤ ε(kδk + 1).

Let t1, t2 be mode clusters on level p − 1 with sons

S(t1) = {s1, s2}, S(t2) = {s3, s4}.

Then the above error bound of the approximation is described by the constant c(k). In orderto define the error bound for all other levels l < p, we denote this constant by

cp−1(k) := c(k).

Lemma 13 Let t ∈ TI \ L(TI) be a mode cluster on level l − 1 with the sons t1 and t2 ∈TI \ L(TI) on level l. By using the notation

A(t)

(i1,i2),q:=

k∑

j=1

k∑

ℓ=1

(Nt1)i1,q1

j· (Nt2)i2,q2

ℓ· (Bt)q,j,ℓ

with Nt1 , Nt2 approximations of Nt1 , Nt2 with ‖·‖∞ error εcl(k), the error of the approximationin level l − 1 is bounded by

∥∥∥(A(t) − A(t)

)|It×Pt′

∥∥∥∞

≤ εcl−1(k), cl−1(k) := c(k) + k3 δk cl(k)2.

Proof: For the short notation

A(t)(i1,i2),q

:=

k∑

j=1

k∑

ℓ=1

A(t1)

i1,q1

j

· A(t2)

i2,q2

· (Bt)q,j,ℓ

we obtain

∣∣(A(t) − A(t)

)(i1,i2)

∣∣ ≤∣∣∣

k∑

j=1

k∑

ℓ=1

(Bt)q,j,ℓ (A(t1) − Nt1)i1,q1

j· (A(t2) − Nt2)i2,q2

∣∣∣.

From the definition (8) of the transfer tensor, and due to the pivoting (with stopping toleranceε) we obtain the bound

|(Bt)q,j,ℓ| ≤ k δk/ε.

Both together yield

∥∥∥(A(t) − A(t)

)|It×Pt′

∥∥∥∞

≤∥∥∥(A(t) − A(t))|It×Pt′

∥∥∥∞

+∥∥∥(A(t) − A

(t))|It×Pt′

∥∥∥∞

≤ ε (c(k) + k3 δk cl(k)2).

12

Page 17: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

The error bound of the tensor is the bound of the approximation in the root D with sonsS(D) := {t, t′}. The entry (m, n) of the cross approximation in the root D is of the form

k∑

j=1

k∑

ℓ=1

A(t)m,j A

(t′)n,ℓ (BD)1,j,ℓ =

k∑

j=1

k∑

ℓ=1

A(t)m,j (BD)1,j,ℓ A

(t)ℓ,n

=(A(t)

∣∣It×Pt′

(BD)1,·,· A(t)∣∣Pt×It′

)m,n

Lemma 14 We use the notation of Lemma 13 and additionally

BD :=(A(t)

∣∣Pt×Pt′

)−1.

The error of the tensor approximation is given by

∥∥A − A∥∥∞

≤ ε (1 + 2 c1(k) δk + c1(k)2). (10)

Proof: By the triangle inequality we get

∥∥A − A∥∥∞

=∥∥∥A(t) − A

(t) ∣∣It×Pt′

(A(t)

∣∣Pt×Pt′

)−1A

(t) ∣∣Pt×It′

∥∥∥∞

≤∥∥A(t) − Nt

∥∥∞

+∥∥∥Nt − A

(t) ∣∣It×Pt′

(A(t)

∣∣Pt×Pt′

)−1A(t)

∣∣Pt×It′

∥∥∥∞

+∥∥∥A(t) ∣∣

It×Pt′

(A(t)

∣∣Pt×Pt′

)−1[A(t)

∣∣Pt×It′

− A(t) ∣∣

Pt×It′

]∥∥∥∞

≤ ε + ε c1(k) δk + ε c1(k)∥∥∥A(t) ∣∣

It×Pt′

(A(t)

∣∣Pt×Pt′

)−1∥∥∥∞

≤ ε + ε c1(k) δk + ε c1(k) δk + ε c1(k)2 = ε (1 + 2 c1(k) δk + c1(k)2).

Remark 15 The bound from equation (10) can be bounded by

ε (1 + 2 c1(k) δk + c1(k)2) ≤ ε k2d−3(c(k))2d−2.

This bound is only a worst case estimate. In practice the true error seems to be at most asmall constant times ε, which is underlined by the numerical experiments of the followingsection.

5 Numerical Experiments

As a first example, we consider a tensor A ∈ RI given by the entries

A(i1,...,id) :=

(d∑

µ=1

i2µ

)−1/2

. (11)

13

Page 18: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

It is well known that A can be approximated by a tensor AE ∈ RI given as a sum of

exponentials,

AE :=

k∑

j=1

ωj

d⊗

µ=1

aj,µ, (aj,µ)iµ = exp(−i2µαj/d),

such that‖A − AE‖∞ ≤ 7.315 × 10−10.

The weights ωj and exponents αj were obtained from W. Hackbusch and are available onthe webpage (k = 35, R = 1000000)

http://www.mis.mpg.de/scicomp/EXP_SUM.

We now consider A as a tensor given in a black box fashion and seek a tensor AB ∈ H-Tuckersuch that AB ≈ A. In particular, we are interested in how the error norms ‖A − AB‖2 and‖A − AB‖∞ will behave if we prescribe an accuracy of ε > 0 in the black box algorithm.Since we cannot measure both norms directly, we will look at the error norm ‖AE − AB‖2

instead of ‖A − AB‖2 which can easily be computed within the H-Tucker framework. Forthe ‖ · ‖∞ norm, we will randomly choose a set of indices J ⊂ I with #J = 105 and look atthe error

‖A − AB‖J ,∞ , ‖X‖J ,∞ := max(i1,...,id)∈J

∣∣X(i1,...,id)

∣∣ .

In a first experiment, we fix n := n1 = . . . = nd := 32 and look at the errors for dimen-sions d = 8, 16, 32, 64 (cf. Figure 4). The effective rank keff which corresponds to a storagecomplexity of O((d− 1)k3

eff + keff

∑dµ=1 nµ) and the timings needed for the black box approx-

imation are reported in Table 1. In a second experiment, we fix d := 16 and look at theerrors, effective ranks, and timings for different mode sizes n = 32, 64, 128, 256. The resultsare summarised in Figure 5 and Table 2. Note that the accuracy for the Euclidean normcannot be smaller than the accuracy of the exponential sum.

1e-12

1e-10

1e-08

1e-06

0.0001

0.01

1

1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1

L 2 e

rror

epsilon

A = |x|-1, n = 32

d = 8d = 16d = 32d = 64

1e-12

1e-10

1e-08

1e-06

0.0001

0.01

1

1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1

L 0 e

rror

epsilon

A = |x|-1, n = 32

d = 8d = 16d = 32d = 64

Figure 4: A as in (11). Left: ‖AE − AB‖2 / ‖AE‖2. Right: ‖A − AB‖J ,∞ / ‖A‖∞ for fixedn = 32

As a second example, we consider a tensor A ∈ RI given by the entries

A(i1,...,id) := exp

(d∑

µ=1

(iµ/nµ)2

)1/2 . (12)

14

Page 19: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

dε 8 16 32 64

1e-01 3.0 3.0 3.0 3.01e-02 4.6 4.8 4.5 4.91e-03 6.1 7.0 6.7 8.51e-04 8.1 8.6 9.8 10.71e-05 10.0 11.1 11.5 12.81e-06 11.0 13.1 13.4 15.51e-07 13.3 14.9 15.9 17.61e-08 15.2 16.2 18.4 20.71e-09 17.0 18.8 20.7 23.51e-10 18.2 20.4 23.2 25.01e-11 19.6 22.9 26.3 27.81e-12 21.1 23.8 27.3 30.3

dε 8 16 32 64

1e-01 0.03s 0.04s 0.08s 0.15s1e-02 0.05s 0.11s 0.17s 0.38s1e-03 0.10s 0.19s 0.33s 1.03s1e-04 0.17s 0.25s 0.58s 1.38s1e-05 0.24s 0.43s 0.80s 1.89s1e-06 0.29s 0.63s 1.08s 3.11s1e-07 0.42s 0.76s 1.70s 4.11s1e-08 0.56s 0.90s 2.31s 5.77s1e-09 0.69s 1.23s 3.00s 7.19s1e-10 0.63s 1.46s 3.61s 8.31s1e-11 0.77s 1.81s 4.87s 10.46s1e-12 0.84s 1.96s 5.17s 12.59s

Table 1: A as in (11). Left: effective rank keff. Right: time for the black box algorithm forfixed n = 32

1e-12

1e-10

1e-08

1e-06

0.0001

0.01

1

1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1

L 2 e

rror

epsilon

A = |x|-1, d = 16

n = 32n = 64

n = 128n = 256

1e-12

1e-10

1e-08

1e-06

0.0001

0.01

1

1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1

L 0 e

rror

epsilon

A = |x|-1, d = 16

n = 32n = 64

n = 128n = 256

Figure 5: A as in (11). Left: ‖AE − AB‖2 / ‖AE‖2. Right: ‖A − AB‖J ,∞ / ‖A‖∞ for fixedd = 16

Again, one can find a tensor AE ∈ RI given as a sum of exponentials (k = 40, R = 300) such

that‖A − AE‖∞ ≤ 8.507 × 10−9.

The results for the approximation of A by the black box algorithm are summarised in Figures6 and 7.

In a third example, we tested the black box algorithm for an H-Tucker tensor A forwhich the entries of the transfer tensors and of the leaf frames were chosen randomly. Wethen artificially forced the node-wise singular values to roughly decay like αj, α ∈ (0, 1),j = 1, . . . , k. In a first experiment, we fix d := 8 and n := 32 and set all ranks to k = 20. Wenow look at the Euclidean error for α = 0.25 corresponding to a fast decay of the singularvalues (cf. Table 3). The accuracy of the smallest singular value which is in the range of≈ 10−12 can be met by the black box algorithm. In a second experiment, we set all ranks tok = 20 and look at the Euclidean error for α = 0.75 corresponding to a slow decay of thesingular values. Again, the accuracy of the smallest singular value which is in the range of

15

Page 20: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

nε 32 64 128 256

1e-01 3.0 3.0 3.0 3.01e-02 4.6 4.6 4.7 4.61e-03 6.8 6.1 5.6 5.71e-04 8.2 8.5 7.4 7.21e-05 9.4 10.1 9.4 8.71e-06 11.3 11.0 10.5 10.01e-07 13.2 12.9 12.1 11.41e-08 14.3 15.1 14.0 13.01e-09 16.2 16.3 15.5 14.51e-10 17.8 17.8 16.8 16.31e-11 19.4 19.6 19.3 17.51e-12 20.7 20.4 20.5 19.2

nε 32 64 128 256

1e-01 0.01s 0.02s 0.07s 0.22s1e-02 0.01s 0.04s 0.14s 0.43s1e-03 0.03s 0.08s 0.20s 0.69s1e-04 0.04s 0.13s 0.34s 0.97s1e-05 0.05s 0.18s 0.55s 1.44s1e-06 0.07s 0.21s 0.63s 2.06s1e-07 0.10s 0.29s 0.85s 2.42s1e-08 0.12s 0.41s 1.11s 3.17s1e-09 0.15s 0.47s 1.38s 3.87s1e-10 0.19s 0.59s 1.59s 5.27s1e-11 0.24s 0.77s 2.24s 5.83s1e-12 0.28s 0.80s 2.63s 7.56s

Table 2: A as in (11). Left: effective rank keff. Right: time for the black box algorithm forfixed d = 16

1e-12

1e-10

1e-08

1e-06

0.0001

0.01

1

1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1

L 2 e

rror

epsilon

A = exp(-|x|), n = 32

d = 8d = 16d = 32d = 64

1e-12

1e-10

1e-08

1e-06

0.0001

0.01

1

1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1

L 0 e

rror

epsilon

A = exp(-|x|), n = 32

d = 8d = 16d = 32d = 64

Figure 6: A as in (12). Left: ‖AE − AB‖2 / ‖AE‖2. Right: ‖A − AB‖J ,∞ / ‖A‖∞ for fixedn = 32

1e-12

1e-10

1e-08

1e-06

0.0001

0.01

1

1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1

L 2 e

rror

epsilon

A = exp(-|x|), d = 16

n = 32n = 64

n = 128n = 256

1e-12

1e-10

1e-08

1e-06

0.0001

0.01

1

1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1

L 0 e

rror

epsilon

A = exp(-|x|), d = 16

n = 32n = 64

n = 128n = 256

Figure 7: A as in (12). Left:‖AE − AB‖2 / ‖AE‖2. Right: ‖A − AB‖J ,∞ / ‖A‖∞ for fixedd = 16

16

Page 21: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

≈ 10−3 can be met by the black box algorithm (cf. Table 3).

ε ‖A − AB‖2 / ‖A‖2 keff

1e-01 4.71e-04 2.01e-02 3.98e-04 2.31e-03 3.83e-04 2.91e-04 2.02e-05 4.11e-05 3.75e-06 5.21e-06 2.64e-07 6.51e-07 5.23e-08 8.01e-08 2.17e-09 9.31e-09 1.51e-10 10.81e-10 2.22e-11 12.11e-11 1.74e-12 13.71e-12 2.64e-13 14.5

ε ‖A − AB‖2 / ‖A‖2 keff

5.00e-01 6.29e-02 2.02.50e-01 1.10e-01 2.41.25e-01 6.07e-02 3.66.25e-02 3.98e-02 4.93.12e-02 1.91e-02 8.61.56e-02 1.58e-02 9.17.81e-03 4.97e-03 12.83.91e-03 3.75e-03 13.71.95e-03 1.28e-03 16.99.77e-04 4.33e-04 18.34.88e-04 3.37e-05 19.42.44e-04 5.32e-06 19.7

Table 3: A chosen randomly. Error and effective ranks for fixed d := 8, n := 32, k = 20.Left: α = 0.25. Right: α = 0.75

Conclusions

For tensors that can be represented exactly in the H-Tucker format with representationranks (kt)t∈TI

, we can reconstruct these by inspection of only O(dk3 + d log(d)nk2) entries(k := maxt∈TI

kt, n := maxµ∈D nµ) in complexity O(dk4 + d log(d)nk2). A similar result isobtained by Oseledets and Tyrtyshnikov [10] for the TT format. The difference is not onlythat our construction applies for the H-Tucker format, but also that the pivot elements aswell as their number are chosen adaptively and incremental to achieve a prescribed accuracyε in the ‖ · ‖∞-norm. One can therefore estimate the error of the remainder during theconstruction, one can determine the necessary ranks and one can update an already computedapproximation if a higher accuracy is required.

Under rather strong assumptions we have derived an error bound for the approximationin the case that the tensor has a higher (possibly full) representation rank. In the numericalexamples we observe that the error in the ‖ · ‖∞-norm is typically close to the prescribedstopping tolerance ε, i.e., in practice there is almost no error amplification. However, theconstruction is heuristic and thus there can always be exceptions. It is therefore notable thateven for random tensors the numerical results show a stable and almost optimal approxima-tion.

References

[1] M. Bebendorf. Approximation of boundary element matrices. Numer. Math., 86(4):565–589, 2000.

[2] S. Borm and L. Grasedyck. Hybrid cross approximation of integral operators. Nu-merische Mathematik, 101:221–249, 2005.

17

Page 22: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

[3] M. Espig, L. Grasedyck, and W. Hackbusch. Black box low tensor rank approximationusing fibre-crosses. Constr. Approx., 30:557–597, 2009.

[4] S. A. Goreinov, E. E. Tyrtyshnikov, and N. L. Zamarashkin. A theory of pseudoskeletonapproximations. Lin. Alg. Appl., 261:1–22, 1997.

[5] Lars Grasedyck. Hierarchical singular value decomposition of tensors. SIAM J. MatrixAnal. Appl., 31:2029–2054, 2010.

[6] W. Hackbusch and S. Kuhn. A new scheme for the tensor representation. J. FourierAnal. Appl., 15:706–722, 2009.

[7] T. G. Kolda and B. W. Bader. Tensor decompositions and applications. SIAM Review,51(3):455–500, 2009.

[8] I.V. Oseledets. Compact matrix form of the d-dimensional tensor decomposition.Preprint 09-01, Institute of Numerical Mathematics RAS, Moscow, Russia, 2009.

[9] I.V. Oseledets and E.E. Tyrtyshnikov. Breaking the curse of dimensionality, or how touse svd in many dimensions. SIAM J. Sci. Comp., 31(5):3744–3759, 2009.

[10] I.V. Oseledets and E.E. Tyrtyshnikov. TT-cross approximation for multidimensionalarrays. Linear Algebra and its Applications, 432:70–88, 2010.

18

Page 23: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

Preprint Series DFG-SPP 1324

http://www.dfg-spp1324.de

Reports

[1] R. Ramlau, G. Teschke, and M. Zhariy. A Compressive Landweber Iteration forSolving Ill-Posed Inverse Problems. Preprint 1, DFG-SPP 1324, September 2008.

[2] G. Plonka. The Easy Path Wavelet Transform: A New Adaptive Wavelet Transformfor Sparse Representation of Two-dimensional Data. Preprint 2, DFG-SPP 1324,September 2008.

[3] E. Novak and H. Wozniakowski. Optimal Order of Convergence and (In-) Tractabil-ity of Multivariate Approximation of Smooth Functions. Preprint 3, DFG-SPP1324, October 2008.

[4] M. Espig, L. Grasedyck, and W. Hackbusch. Black Box Low Tensor Rank Approx-imation Using Fibre-Crosses. Preprint 4, DFG-SPP 1324, October 2008.

[5] T. Bonesky, S. Dahlke, P. Maass, and T. Raasch. Adaptive Wavelet Methods andSparsity Reconstruction for Inverse Heat Conduction Problems. Preprint 5, DFG-SPP 1324, January 2009.

[6] E. Novak and H. Wozniakowski. Approximation of Infinitely Differentiable Multi-variate Functions Is Intractable. Preprint 6, DFG-SPP 1324, January 2009.

[7] J. Ma and G. Plonka. A Review of Curvelets and Recent Applications. Preprint 7,DFG-SPP 1324, February 2009.

[8] L. Denis, D. A. Lorenz, and D. Trede. Greedy Solution of Ill-Posed Problems: ErrorBounds and Exact Inversion. Preprint 8, DFG-SPP 1324, April 2009.

[9] U. Friedrich. A Two Parameter Generalization of Lions’ Nonoverlapping DomainDecomposition Method for Linear Elliptic PDEs. Preprint 9, DFG-SPP 1324, April2009.

[10] K. Bredies and D. A. Lorenz. Minimization of Non-smooth, Non-convex Functionalsby Iterative Thresholding. Preprint 10, DFG-SPP 1324, April 2009.

[11] K. Bredies and D. A. Lorenz. Regularization with Non-convex Separable Con-straints. Preprint 11, DFG-SPP 1324, April 2009.

Page 24: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

[12] M. Dohler, S. Kunis, and D. Potts. Nonequispaced Hyperbolic Cross Fast FourierTransform. Preprint 12, DFG-SPP 1324, April 2009.

[13] C. Bender. Dual Pricing of Multi-Exercise Options under Volume Constraints.Preprint 13, DFG-SPP 1324, April 2009.

[14] T. Muller-Gronbach and K. Ritter. Variable Subspace Sampling and Multi-levelAlgorithms. Preprint 14, DFG-SPP 1324, May 2009.

[15] G. Plonka, S. Tenorth, and A. Iske. Optimally Sparse Image Representation by theEasy Path Wavelet Transform. Preprint 15, DFG-SPP 1324, May 2009.

[16] S. Dahlke, E. Novak, and W. Sickel. Optimal Approximation of Elliptic Problemsby Linear and Nonlinear Mappings IV: Errors in L2 and Other Norms. Preprint 16,DFG-SPP 1324, June 2009.

[17] B. Jin, T. Khan, P. Maass, and M. Pidcock. Function Spaces and Optimal Currentsin Impedance Tomography. Preprint 17, DFG-SPP 1324, June 2009.

[18] G. Plonka and J. Ma. Curvelet-Wavelet Regularized Split Bregman Iteration forCompressed Sensing. Preprint 18, DFG-SPP 1324, June 2009.

[19] G. Teschke and C. Borries. Accelerated Projected Steepest Descent Method forNonlinear Inverse Problems with Sparsity Constraints. Preprint 19, DFG-SPP1324, July 2009.

[20] L. Grasedyck. Hierarchical Singular Value Decomposition of Tensors. Preprint 20,DFG-SPP 1324, July 2009.

[21] D. Rudolf. Error Bounds for Computing the Expectation by Markov Chain MonteCarlo. Preprint 21, DFG-SPP 1324, July 2009.

[22] M. Hansen and W. Sickel. Best m-term Approximation and Lizorkin-Triebel Spaces.Preprint 22, DFG-SPP 1324, August 2009.

[23] F.J. Hickernell, T. Muller-Gronbach, B. Niu, and K. Ritter. Multi-level MonteCarlo Algorithms for Infinite-dimensional Integration on RN. Preprint 23, DFG-SPP 1324, August 2009.

[24] S. Dereich and F. Heidenreich. A Multilevel Monte Carlo Algorithm for Levy DrivenStochastic Differential Equations. Preprint 24, DFG-SPP 1324, August 2009.

[25] S. Dahlke, M. Fornasier, and T. Raasch. Multilevel Preconditioning for AdaptiveSparse Optimization. Preprint 25, DFG-SPP 1324, August 2009.

Page 25: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

[26] S. Dereich. Multilevel Monte Carlo Algorithms for Levy-driven SDEs with GaussianCorrection. Preprint 26, DFG-SPP 1324, August 2009.

[27] G. Plonka, S. Tenorth, and D. Rosca. A New Hybrid Method for Image Approx-imation using the Easy Path Wavelet Transform. Preprint 27, DFG-SPP 1324,October 2009.

[28] O. Koch and C. Lubich. Dynamical Low-rank Approximation of Tensors.Preprint 28, DFG-SPP 1324, November 2009.

[29] E. Faou, V. Gradinaru, and C. Lubich. Computing Semi-classical Quantum Dy-namics with Hagedorn Wavepackets. Preprint 29, DFG-SPP 1324, November 2009.

[30] D. Conte and C. Lubich. An Error Analysis of the Multi-configuration Time-dependent Hartree Method of Quantum Dynamics. Preprint 30, DFG-SPP 1324,November 2009.

[31] C. E. Powell and E. Ullmann. Preconditioning Stochastic Galerkin Saddle PointProblems. Preprint 31, DFG-SPP 1324, November 2009.

[32] O. G. Ernst and E. Ullmann. Stochastic Galerkin Matrices. Preprint 32, DFG-SPP1324, November 2009.

[33] F. Lindner and R. L. Schilling. Weak Order for the Discretization of the StochasticHeat Equation Driven by Impulsive Noise. Preprint 33, DFG-SPP 1324, November2009.

[34] L. Kammerer and S. Kunis. On the Stability of the Hyperbolic Cross DiscreteFourier Transform. Preprint 34, DFG-SPP 1324, December 2009.

[35] P. Cerejeiras, M. Ferreira, U. Kahler, and G. Teschke. Inversion of the noisy Radontransform on SO(3) by Gabor frames and sparse recovery principles. Preprint 35,DFG-SPP 1324, January 2010.

[36] T. Jahnke and T. Udrescu. Solving Chemical Master Equations by AdaptiveWavelet Compression. Preprint 36, DFG-SPP 1324, January 2010.

[37] P. Kittipoom, G. Kutyniok, and W.-Q Lim. Irregular Shearlet Frames: Geometryand Approximation Properties. Preprint 37, DFG-SPP 1324, February 2010.

[38] G. Kutyniok and W.-Q Lim. Compactly Supported Shearlets are Optimally Sparse.Preprint 38, DFG-SPP 1324, February 2010.

[39] M. Hansen and W. Sickel. Best m-Term Approximation and Tensor Products ofSobolev and Besov Spaces – the Case of Non-compact Embeddings. Preprint 39,DFG-SPP 1324, March 2010.

Page 26: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

[40] B. Niu, F.J. Hickernell, T. Muller-Gronbach, and K. Ritter. Deterministic Multi-level Algorithms for Infinite-dimensional Integration on RN. Preprint 40, DFG-SPP1324, March 2010.

[41] P. Kittipoom, G. Kutyniok, and W.-Q Lim. Construction of Compactly SupportedShearlet Frames. Preprint 41, DFG-SPP 1324, March 2010.

[42] C. Bender and J. Steiner. Error Criteria for Numerical Solutions ofBackward SDEs. Preprint 42, DFG-SPP 1324, April 2010.

[43] L. Grasedyck. Polynomial Approximation in Hierarchical Tucker Format by Vector-Tensorization. Preprint 43, DFG-SPP 1324, April 2010.

[44] M. Hansen und W. Sickel. Best m-Term Approximation and Sobolev-Besov Spacesof Dominating Mixed Smoothness - the Case of Compact Embeddings. Preprint 44,DFG-SPP 1324, April 2010.

[45] P. Binev, W. Dahmen, and P. Lamby. Fast High-Dimensional Approximation withSparse Occupancy Trees. Preprint 45, DFG-SPP 1324, May 2010.

[46] J. Ballani and L. Grasedyck. A Projection Method to Solve Linear Systems inTensor Format. Preprint 46, DFG-SPP 1324, May 2010.

[47] P. Binev, A. Cohen, W. Dahmen, R. DeVore, G. Petrova, and P. Wojtaszczyk.Convergence Rates for Greedy Algorithms in Reduced Basis Methods. Preprint 47,DFG-SPP 1324, May 2010.

[48] S. Kestler and K. Urban. Adaptive Wavelet Methods on Unbounded Domains.Preprint 48, DFG-SPP 1324, June 2010.

[49] H. Yserentant. The Mixed Regularity of Electronic Wave Functions Multiplied byExplicit Correlation Factors. Preprint 49, DFG-SPP 1324, June 2010.

[50] H. Yserentant. On the Complexity of the Electronic Schrodinger Equation.Preprint 50, DFG-SPP 1324, June 2010.

[51] M. Guillemard and A. Iske. Curvature Analysis of Frequency Modulated Manifoldsin Dimensionality Reduction. Preprint 51, DFG-SPP 1324, June 2010.

[52] E. Herrholz and G. Teschke. Compressive Sensing Principles and Iterative SparseRecovery for Inverse and Ill-Posed Problems. Preprint 52, DFG-SPP 1324, July2010.

[53] L. Kammerer, S. Kunis, and D. Potts. Interpolation Lattices for Hyperbolic CrossTrigonometric Polynomials. Preprint 53, DFG-SPP 1324, July 2010.

Page 27: DFG-Schwerpunktprogramm 1324 fileDFG-Schwerpunktprogramm 1324 " Extraktion quanti zierbarer Information aus komplexen Systemen" Black Box Approximation of Tensors in Hierarchical Tucker

[54] G. Kutyniok and W.-Q Lim. Shearlets on Bounded Domains. Preprint 54, DFG-SPP 1324, July 2010.

[55] A. Zeiser. Wavelet Approximation in Weighted Sobolev Spaces of Mixed Orderwith Applications to the Electronic Schrodinger Equation. Preprint 55, DFG-SPP1324, July 2010.

[56] G. Kutyniok, J. Lemvig, and W.-Q Lim. Compactly Supported Shearlets.Preprint 56, DFG-SPP 1324, July 2010.

[57] A. Zeiser. On the Optimality of the Inexact Inverse Iteration Coupled with AdaptiveFinite Element Methods. Preprint 57, DFG-SPP 1324, July 2010.

[58] S. Jokar. Sparse Recovery and Kronecker Products. Preprint 58, DFG-SPP 1324,August 2010.

[59] T. Aboiyar, E. H. Georgoulis, and A. Iske. Adaptive ADER Methods Using Kernel-Based Polyharmonic Spline WENO Reconstruction. Preprint 59, DFG-SPP 1324,August 2010.

[60] O. G. Ernst, A. Mugler, H.-J. Starkloff, and E. Ullmann. On the Convergence ofGeneralized Polynomial Chaos Expansions. Preprint 60, DFG-SPP 1324, August2010.

[61] S. Holtz, T. Rohwedder, and R. Schneider. On Manifolds of Tensors of FixedTT-Rank. Preprint 61, DFG-SPP 1324, September 2010.

[62] J. Ballani, L. Grasedyck, and M. Kluge. Black Box Approximation of Tensors inHierarchical Tucker Format. Preprint 62, DFG-SPP 1324, October 2010.