Systems and Methods for Communication Efficient Distributed Mean Estimation

Abstract
The present disclosure provides systems and methods for communication efficient distributed mean estimation. In particular, aspects of the present disclosure can be implemented by a system in which a number of vectors reside on a number of different clients, and a centralized server device seeks to estimate the mean of such vectors. According to one aspect of the present disclosure, a client computing device can rotate a vector by a random rotation matrix and then subsequently perform probabilistic quantization on the rotated vector. According to another aspect of the present disclosure, subsequent to quantization but prior to transmission, the client computing can encode the quantized vector according to a variable length coding scheme (e.g., by computing variable length codes).
Description
FIELD

The present disclosure relates generally to distributed computing. More particularly, the present disclosure relates to systems and methods for communication efficient distributed mean estimation.


BACKGROUND

Given a number of vectors that reside on a number of different clients, the goal of distributed mean estimation is to estimate the mean of such vectors. This basic estimation problem is used as a subroutine in several learning and optimization tasks where data is distributed across several clients. For example, in Lloyd's algorithm for k-means clustering, if data is distributed across several clients, the server needs to compute the means of all clusters in each update step. Similarly, for principal components analysis (PCA), if data samples are distributed across several clients, then for the power-iteration method, the server needs to average the output of all clients in each step.


Recently, algorithms involving distributed mean estimation have been used extensively in training large-scale neural networks and other statistical models. In an example scenario of synchronized distributed learning, each client obtains a copy of a global model. The clients then update the model independently based on their local data. The updates (usually in the form of gradients) are then sent to a server, where they are averaged and used to update the global model. A critical step in all of the above algorithms is to estimate the mean of a set of vectors.


However, one of the main bottlenecks in distributed algorithms is the communication cost, which can be prohibitive for modern applications. For example, communication cost can be significant in example distributed computing systems where each client can be a low-power and/or low-bandwidth device such as, for example, a mobile phone, an embedded computing device, or other connected smart devices such as intelligent speakers, cameras, home appliances, vehicle computing systems, etc.


SUMMARY

Aspects and advantages of embodiments of the present disclosure will be set forth in part in the following description, or can be learned from the description, or can be learned through practice of the embodiments.


One aspect of the present disclosure is directed to a computing system to facilitate transmission of machine-learned model updates from client devices to a centralized server computing device. The computing system includes one or more client computing devices. Each client computing device includes one or more processors and one or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors cause the client computing device to perform operations. The operations include determining an update to a machine-learned model based at least in part on a local dataset stored at the client computing device. The operations include rotating the update by a random rotation matrix to obtain a rotated update. The operations include performing probabilistic quantization of the rotated update to obtain a quantized rotated update. The operations include transmitting the quantized rotated update to the centralized server computing device.


Another aspect of the present disclosure is directed to a computing system. The computing system includes one or more client computing devices. Each client computing device includes one or more processors and one or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors cause the client computing device to perform operations. The operations include obtaining a vector. The operations include rotating the vector by a random rotation matrix to obtain a rotated vector. The operations include performing probabilistic quantization of the rotated vector to obtain a quantized rotated vector. The operations include transmitting the quantized rotated vector.


Another aspect of the present disclosure is directed to a computing system. The computing system includes one or more client computing devices. Each client computing device includes one or more processors and one or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors cause the client computing device to perform operations. The operations include obtaining a vector. The operations include performing probabilistic quantization of the vector to obtain a quantized vector. Performing probabilistic quantization of the vector includes determining a value for each of a number of quantization levels based at least in part on a magnitude of the vector and a minimum coordinate value included in the vector. Performing probabilistic quantization of the vector includes quantizing each coordinate of the vector into one of the number of quantization levels.


Other aspects of the present disclosure are directed to various systems, apparatuses, non-transitory computer-readable media, user interfaces, and electronic devices.


These and other features, aspects, and advantages of various embodiments of the present disclosure will become better understood with reference to the following description and appended claims. The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate example embodiments of the present disclosure and, together with the description, serve to explain the related principles.





BRIEF DESCRIPTION OF THE DRAWINGS

Detailed discussion of embodiments directed to one of ordinary skill in the art is set forth in the specification, which makes reference to the appended figures, in which:



FIG. 1 depicts a graphical diagram of example results of distributed mean estimation on data generated from a Gaussian distribution according to example embodiments of the present disclosure.



FIGS. 2A-D depict graphical diagrams of example results for performance of Lloyd's algorithm with different types of quantizations according to example embodiments of the present disclosure.



FIGS. 3A-D depict graphical diagrams of example results for performance of power iteration with different types of quantizations according to example embodiments of the present disclosure.



FIG. 4 depicts a block diagram of an example computing system according to example embodiments of the present disclosure.



FIG. 5 depicts a swim lane flow diagram of an example method to perform a stochastic rotated quantization technique according to example embodiments of the present disclosure.



FIG. 6 depicts a swim lane flow diagram of an example method to perform a variable length coding technique according to example embodiments of the present disclosure.





DETAILED DESCRIPTION
1. Introduction

Generally, the present disclosure provides systems and methods for communication efficient distributed mean estimation. In particular, the present disclosure addresses the need for distributed learning and optimization algorithms with low communication cost. However, unlike previous works, the systems and methods of the present disclosure make no probabilistic assumptions on the data.


Aspects of the present disclosure can be implemented by a system in which a number of vectors reside on a number of different client computing devices, and each client device seeks to transmit its respective vector to a centralized server computing device to enable the server device to estimate the mean of the vectors. As one example application, the techniques of the present disclosure can enable communication efficient uploads of local machine-learned model gradients from the client devices to the server device, where the server device aggregates the received gradients to update a global machine-learned model.


One aspect of the present disclosure is directed to a random rotation technique to improve communication efficiency. In particular, a client computing device can rotate a vector by a random rotation matrix and then subsequently perform probabilistic quantization on the rotated vector. For example, the present disclosure provides a stochastic k-level quantization technique. As demonstrated by the present disclosure, performing the random rotation prior to quantization can significantly reduce the quantization error, thereby leading to improved communication efficiency.


After quantization, the client device can transmit the quantized rotated vector to a centralized server computing device. The server computing device can receive multiple vectors from multiple client computing devices. The server computing device can determine a mean of the multiple received vectors and can de-rotate the mean vector using an inverse random rotation matrix.


In such fashion, the vectors can be communicated from the clients to the server in a highly efficient manner. In particular, in some implementations, this random rotation technique can reduce the mean square error of the mean estimation significantly by a factor of







𝒪

(

d

log


d


)

.




Another aspect of the present disclosure is directed to a variable length coding technique to improve communication efficiency. In particular, subsequent to quantization but prior to transmission of the vector, the client computing device can encode the quantized vector according to a variable length coding scheme (e.g., by computing variable length codes). The server computing device can then decode the received vectors using the variable length coding scheme. This variable length coding technique can reduce the mean squared error by custom-character (d) as compared to a naive approach that includes neither random rotation nor variable length coding. In fact, the present disclosure mathematically demonstrates that this variable length coding approach is communication optimal.


The systems and methods of the present disclosure provide a number of technical effects and benefits. As a first example technical effect and benefit, the present disclosure enables transmission of information (e.g., machine-learned model updates) in a more efficient and lower bandwidth manner. For example, the random rotation technique and the variable length coding technique can reduce the number of bits required to represent the information, thereby enabling faster and lower bandwidth transmission of the information. As another example technical effect and benefit, by improving the ability to transmit vectors for aggregation at a central location, the present disclosure enables distributed training techniques in which machine-learned models are trained locally on-device and then a global model is generated or updated based on a mean of the updates resulting from the local training. Thus, the present disclosure enables and enhances such distributed scheme. The distributed training scheme results in better (e.g., more accurate) global models which have improved performance due to their exposure to additional training data. Furthermore, the distributed training scheme that is enhanced by the present disclosure improves user privacy as training data can be retained on the device and is not required to be sent to a central location. As yet another example technical effect and benefit, the present disclosure also provides enhanced security or encryption of information that is transmitted to a central location. For example, through the use of private rotation matrices the transmitted information can be rotated and only entities with the inverse of the private matrix can de-rotate to extract the information.


The present disclosure is structured as follows: first, the present disclosure demonstrates that for d dimensional data with n clients, a naive stochastic rounding approach yields a mean squared error (MSE) of Θ(d/n) and uses a constant number of bits per dimension per client. Next, this naive algorithm is extended in two ways: by demonstrating that application of a structured random rotation before quantization reduces the error to custom-character((logd)/n) and application of a better coding strategy further reduces the error to custom-character(1/n). The present disclosure also demonstrates that the latter coding strategy is optimal up to a constant in the minimax sense. That is, it achieves the best MSE for a given communication cost. In addition, the present disclosure demonstrates the practicality of the algorithms described herein by applying them to distributed Lloyd's algorithm for k-means and power iteration for principal component analysis (PCA).


1.1 Example Discussion of Distributed Mean Aggregation

Given n vectors Xncustom-characterX1, X2 . . . , Xncustom-character that reside on n clients, the goal of distributed mean estimation is to estimate the mean of the vectors:










X
_


=
def



1
n






i
=
1

n



X
i

.







(
1
)







As described above, this basic estimation problem is used in several learning and optimization tasks where data is distributed across several clients, including, for example, Lloyd's algorithm for k-means clustering (see, e.g., Lloyd, Stuart. Least squares quantization in PCM. IEEE Transactions on Information Theory, 28(2):129-137, 1982); principal components analysis (PCA); and the training of large-scale neural networks and other statistical models. For example, in an example scenario of synchronized distributed learning, each client obtains a copy of a global model. The clients then update the model independently based on their local data. The updates (usually in the form of gradients) are then sent to a server, where they are averaged and used to update the global model. A critical step in all of the above algorithms is to estimate the mean of a set of vectors as in Eq. (1).


More generally, however, the communication efficient systems, methods, and techniques of the present disclosure can involve or be performed in any configuration or scenario where data (e.g., in the form of vectors) resides on or is produced by one or more different client devices and is communicated to another device such as, for example, a central server device.


In particular, one of the main bottlenecks in distributed algorithms or other scenarios where data is communicated from a client device to a server device is the communication cost, which can be prohibitive for modern applications. For example, communication cost can be significant in example distributed computing systems where each client can be a low-power and/or low-bandwidth device such as, for example, a mobile phone or other mobile computing device, an embedded computing device, a worker device in a datacenter, or other connected smart devices such as intelligent speakers, cameras, home appliances, vehicle computing systems, etc.


Given such a wide set of applications, the systems and methods of the present disclosure address the basic problem of achieving the optimal minimax rate in distributed mean estimation with limited communication or other communication constraints (e.g., communication costs).


The systems, methods, models, and results of the present disclosure differ from previous works on mean estimation in a number of ways, including the following examples. As a first example, certain previous works assume that the data is generated independent and identically distributed (i.i.d.) according to some distribution. In contrast, the present disclosure does not make any distribution assumptions on data. As a second example difference, the objective in certain prior works is to estimate the mean of the underlying statistical model, while the goal in at least some implementations of the present disclosure is to estimate the empirical mean of the data.


1.2 Example Model

In at least some implementations, the communication algorithms provided herein are simultaneous and independent. That is, the clients independently send data to the server and they can transmit at the same time. In any independent communication protocol, each client transmits a function of Xi (say f (Xi)), and a central server estimates the mean by some function of f (Xi), f(X2), . . . , f(Xn). Let π be any such protocol and let custom-character(π, Xi) be the expected number of transmitted bits by the i-th client during protocol it, where throughout the present disclosure, expectation is over the randomness in protocol π. The total number of bits transmitted by all clients with the protocol π is







𝒞

(

π
,

X
n


)


=
def





i
=
1

n




𝒞
i

(

π
,

X
i


)

.






Let the estimated mean be {circumflex over (X)}. For a protocol π, the MSE of the estimate is





ε(π, Xn)=custom-character[∥{circumflex over (X)}X22].


The systems and methods of the present disclosure can be implemented with the use of private and/or public randomness. Private randomness refers to random values that are generated by each machine separately, and public randomness refers to a sequence of random values that are shared among all parties.


As one example, in the absence of public randomness, the server can communicate a random seed that can be used by clients to emulate public randomness. More particularly, in some implementations, both the client and the server can have knowledge of a synchronized random seed. The client and the server can each use the random seed (e.g., along with a pseudo-random number generator) to separately produce random values (e.g., a random rotation matrix as will be discussed further below). In one example, the seed can be 32 bits long.


The algorithms provided by the present disclosure work for any Xn. However, to measure the minimax performance, without loss of generality, the following is provided with reference to the scenario where each Xi∈Sd, the ball of radius 1 in custom-character, i.e., X∈Sd iff





X∥2≤1,


where ∥X∥2 denotes the custom-character2 norm of the vector X. For a protocol π, the worst case error for all Xn∈Sd is









(

π
,

S
d


)


=
def



max



X
n

:


X
i





S
d




i








(

π
,

X
n


)

.






Let Π(c) denote the set of all protocols with communication cost at most c. The minimax MSE is









(




(
c
)


,

S
d


)


=
def



min

π




(
c
)








(

π
,

S
d


)

.






1.3 Example Results and Discussion
1.3.1 Example Algorithms

The MSE ε(π, Xn) is first analyzed for three algorithms, when custom-character(π, Xn)=Θ(nd), i.e., each client sends a constant number of bits per dimension.


Stochastic uniform quantization. In Section 2.1, it is first shown that a naive stochastic binary quantization algorithm (denoted by πsb) achieves an MSE of










(


π
sb

,

X
n


)

=

Θ

(



d
n

·

1
n







i
=
1

n





X
i



2
2



)


,




and custom-charactersb, Xn)=n·(d+custom-character(1)), where custom-character(1) is used to denote custom-character(log(dn)). That is, each client sends one bit per dimension. It is further shown that this bound is tight. In many practical scenarios, d is much larger than n and the above error is prohibitive.


A natural way to decease the error is to increase the number of levels of quantization.


If k levels of quantization are used, in Theorem 2, the error deceases as












(


π
sk

,

X
n


)

=


𝒪

(



d


n

(

k
-
1

)

2


·

1
n







i
=
1

n





X
i



2
2



)

.





(
2
)







However, the communication cost would increase to custom-charactersk, Xn)=n·(d┌log2k┐+custom-character(1)) bits, which can be expensive, if the MSE is desired to be o(d/n).


In order to reduce the communication cost, the present disclosure proposes two approaches.


Stochastic rotated quantization: The present disclosure demonstrates that preprocessing the data by a random rotation reduces the mean squared error. Specifically, in Theorem 3, it is shown that this new scheme (denoted by πsrk) achieves an MSE of










(


π
srk

,

X
n


)

=

𝒪

(




log

d



n

(

k
-
1

)

2


·

1
n







i
=
1

n





X
i



2
2



)


,




and has a communication cost of custom-charactersrk, Xn)=n·(d┌log2k┐+custom-character(1)) . Note that all logarithms are to base e, unless stated otherwise. Also note that the new scheme achieves much smaller MSE than naive stochastic quantization for the same communication cost.


Variable length coding: A second approach provided by the present disclosure uses the same quantization as πsk but encodes levels via variable length coding. Instead of using ┌log2k┐ bits per dimension, it is shown that using variable length encoding such as arithmetic coding to compress the data reduces the communication cost significantly. In particular, in Theorem 4 it is shown that there is a scheme (denoted by πsvk) such that











𝒞

(


π

s

v

k


,

X
n


)

=

𝒪

(


nd

(

1
+

log

(



k
2

d

+
1

)


)

+



𝒪
~

(
n
)


)


,




(
3
)










and



ε

(


π
svk

,

X
n


)


=


ε

(


π
sk

,

X
n


)

.





Hence, setting k=√{square root over (d)} in Eqs. (2) and (3) yields








ε

(


π
svk

,

X
n


)

=

𝒪

(



1
n

·

1
n







i
=
1

n





X
i



2
2



)


,




and with Θ(nd) bits of communication i.e., constant number of bits per dimension per client. Of the three protocols, πsvk has the best MSE for a given communication cost. Note that πsvk uses k quantization levels but still uses custom-character(1) bits per dimension per client for all k≤√{square root over (d)}.


Theoretically, while variable length coding has better guarantees, stochastic rotated quantization has several practical advantages: it uses fixed length coding and hence can be combined with encryption schemes for privacy preserving secure aggregation. It can also provide lower quantization error in some scenarios due to better constants (see, e.g., Section 7 for details).


1.3.2 Example Minimax MSE

In the above protocols, all of the clients transmit the data. According to an aspect of the present disclosure, these protocols can be augmented with a sampling procedure, where only a random fraction of clients transmit data. The present disclosure demonstrates that a combination of k-level quantization, variable length coding, and sampling can be used to achieve information theoretically optimal MSE for a given communication cost. In particular, combining Corollary 1 and Theorem 5 yields the following minimax result:


Theorem 1 There exists a universal constant t<1 such that for communication cost c≤ndt and n≥1/t,







ε

(


Π

(
c
)

,

S
d


)

=


Θ

(

min

(

1
,

d
c


)

)

.





This result shows that the product of communication cost and MSE scales linearly in the number of dimensions.


The remainder of the present disclosure is organized as follows. First, the stochastic uniform quantization technique is analyzed in Section 2. In Section 3, a novel stochastic rotated quantization technique is proposed, and in Section 4 arithmetic coding is analyzed. In Section 5, the above algorithms are combined with a sampling technique and the upper bound on the minimax risk is stated. In Section 6, the matching minimax lower bounds are stated. In Section 7 some practical considerations are discussed and the algorithms are applied on distributed power iteration and Lloyd's algorithm. Section 8 provides a proof of Lemma 7. Section 9 describes example computing systems that can implement the techniques described herein. Section 10 describes example methods to implement the techniques described herein and Section 11 provides some additional disclosure.


2. Example Stochastic Uniform Quantization
2.1 Example Stochastic Binary Quantization

For a vector Xi, let Ximax=max1≤j≤dXi(j) and similarly let Ximin=min1≤j≤dXi(j). In the stochastic binary quantization protocol πsb, for each client i, the quantized value for each coordinate j is generated independently with private randomness as








Y
i

(
j
)

=

(





X
i
max





with


probability






X
i

(
j
)

-

X
i
min




X
i
max

-

X
i
min




,






X
i
min



otherwise



.






Observe custom-characterY1(j)=Xi(j). The server estimates X by








X

_
^



π
sb


=


1
n






i
=
1

n



Y
i

.







First, the communication cost of this protocol will be bounded as described below.


Lemma 1 There exists an implementation of stochastic binary quantization that uses d+custom-character(1) bits per client and hence custom-charactersb, Xn)≤n·(d+custom-character(1)).


Proof. Instead of sending vectors Yi, clients transmit two real values Ximax and Ximin (to a desired error) and a bit vector Y′i such that Y′i(j)=1 if Yi=Ximax and 0 otherwise. Hence each client transmits d+2r bits, where r is the number of bits to transmit the real value to a desired error.


Let B be the maximum norm of the underlying vectors. To bound r, observe that using r bits, one can represent a number between −B and B to an error of B/2r−1. Thus using 3log2(dn)+1 bits one can represent the minimum and maximum to an additive error of B/(nd)3. This error in transmitting minimum and maximum of the vector does not affect the calculations and it is ignored for simplicity. Note that in practice, each dimension of Xi is often stored as a 32 bit or 64 bit float, and r should be set as either 32 or 64. In this case, using an even larger r does not further reduce the error.


End proof.


Next, the estimation error of this protocol is computed as described below.


Lemma 2 For any set of vectors Xn,







ε

(


π
sb

,

X
n


)

=


1

n
2







i
=
1

n





j
=
1

d



(


X
i
max

-


X
i

(
j
)


)




(



X
i

(
j
)

-

X
i
min


)

.









Proof.








ε

(


π

s

b


,

X
n


)

=


𝔼






X

_
^


-

X
¯




2
2


=



1

n
2



𝔼








i
=
1

n


(


Y
i

-

X
i


)




2
2


=


1

n
2







i
=
1

n


𝔼






Y
i

-

X
i




2
2







,




where the last equality follows by observing that Yi−Xi, ∀i are independent zero mean random variables. The proof follows by observing that for every i,







𝔼






Y
i

-

X
i




2
2


=





j
=
1

d


𝔼
[


(



Y
i

(
j
)

-


X
i

(
j
)


)

2

]


=




j
=
1

d



(


X
i
max

-


X
i

(
j
)


)




(



X
i

(
j
)

-

X
i
min


)

.








End proof.


Lemma 2 implies the following upper bound.


Lemma 3 For any set of vectors Xn,







ε

(


π
sb

,

X
n


)





d

2

n


·

1
n







i
=
1

n






X
i



2
2

.







Proof. The proof follows by Lemma 2 observing that ∀j









(


X
i
max

-


X
i

(
j
)


)



(



X
i

(
j
)

-

X
i
min


)






(


X
i
max

-

X
i
min


)

2

4


,










and




(


X
i
max

-

X
i
min


)

2




2






X
i



2
2

.






(
4
)







End proof.


It can also be shown that the above bound is tight:


Lemma 4 There exists a set of vectors Xn such that







E

(


π
sb

,

X
n


)






d
-
2


2

n


·

1
n







i
=
1

n






X
i



2
2

.







Proof. For every i, let Xi be defined as follows. Xi(1)=1/√{square root over (2)}, Xi(2)=−1/√{square root over (2)}, and for all j>2, Xi(j)=0. For every i,







X
i
max

=



1

2




and



X
i
min


=

-


1

2


.









    • Substituting these bounds in the conclusion of Lemma 2 (which is an equality) yields the theorem.





End proof.


Therefore, the algorithm proposed in this subsection gives MSE Θ(d/n). Such an error is too large for real-world use. For example, in the application of neural networks, d can be on the order of millions, yet n can be much smaller than that. In such cases, the MSE is even larger than the norm of the vector.


2.2 Example Stochastic k-Level Quantization


A natural generalization of binary quantization is k-level quantization. Let k be a positive integer larger than 2. The present disclosure proposes a k-level stochastic quantization scheme πsk to quantize each coordinate. Recall that for a vector Xi, Ximax=max1≤j≤dXi(j) and Ximin=min1≤j≤dXi(j). For every integer r in the range [0, k), let









B
i

(
r
)


=
def



X
i
min

+


r


s
i



k
-
1




,




where si satisfies Ximin+si≥Ximax. A natural choice for si would be Ximax−Ximin. However, as will be demonstrated in Section 4, a higher value of si and variable length coding has better guarantees. The algorithm quantizes each coordinate into one of Bi(r)s stochastically. In πsk, for the i-th client and j-th coordinate, if Xi(j)∈[Bi(r), Bi(r+1)),








Y
i

(
j
)

=

(






B
i

(

r
+
1

)




with


probability










X
i

(
j
)

-


B
i

(
r
)





B
i

(

r
+
1

)

-


B
i

(
r
)










B
i



(
r
)




otherwise



.






The server estimates X by








X

_
^



π
sk


=


1
n






i
=
1

n



Y
i

.







As before, the communication complexity of this protocol is bounded. The proof is similar to that of Lemma 1 and hence omitted.


Lemma 5 There exists an implementation of stochastic k-level quantization that uses d┌log(k)┐+custom-character(1) bits per client and hence custom-charactersk, Xn)≤n·(d┌log2k┐+custom-character(1)).


The mean squared loss can be bounded as follows.


Theorem 2 If Ximax−Ximin≤si≤√{square root over (2)}∥Xi2∀i, then for any Xn, the πsk protocol satisfies,







ε

(


π
sk

,

X
n


)





d

2



n

(

k
-
1

)

2



·

1
n







i
=
1

n






X
i



2
2

.







Proof.













(


π

s

k


,

X
n


)

=


𝔼







X
_

^

-

X
¯




2
2


=



1

n
2



𝔼








i
=
1

n


(


Y
i

-

X
i


)




2
2


=



1

n
2







i
=
1

n


𝔼






Y
i

-

X
i




2
2







1

n
2







i
=
1

n


d



s
i
2


4



(

k
-
1

)

2










,




(
5
)







where the last equality follows by observing Yi(j)−Xi(j) is an independent zero mean random variable with








𝔼

(



Y
i

(
j
)

-


X
i

(
j
)


)

2





s
i
2


4



(

k
-
1

)

2



.


s
i





2






X
i



2








    • completes the proof.





End proof.


This section is concluded by noting that si=Ximax−Ximin satisfies the conditions


for the above theorem by Eq. (4).


3. Example Stochastic Rotated Quantization

Next, it is shown that the algorithm of the previous section can be significantly improved by a new protocol. The motivation comes from the fact that the MSE of stochastic binary quantization and stochastic k-level quantization is






𝒪

(


d
n




(


X
i
max

-

X
i
min


)

2


)






    • (the proof of Lemma 3 and Theorem 2 with si=Ximax−Ximin). Therefore the MSE is smaller when Ximax and Ximax are close. For example, when Xi is generated uniformly on the unit sphere, with high probability, Ximax−Ximin is










𝒪

(



log

d

d


)

.






    • See, e.g., Dasgupta, Sanjoy and Gupta, Anupam. An elementary proof of a theorem of Johnson and Lindenstrauss. Random Structures & Algorithms, 22(1):60-65, 2003. In such case, ε(πsk, Xn) is









𝒪

(


log

d

n

)






    • instead of










𝒪

(

d
n

)

.




In this section, it is shown that even without any assumptions on the distribution of the data, Ximax−Ximin can be “reduced” with a structured random rotation, yielding an






𝒪

(


log

d

n

)




error. This method can be denominated as stochastic rotated quantization and is denoted herein by πsrk.


In some implementations of the stochastic rotated quantization technique, using public randomness, all clients and the central server generate a random rotation matrix (random orthogonal matrix) R∈custom-character according to some known distribution. Let Zi=RXi and Z=RX. In the stochastic rotated quantization protocol πsrk(R), clients quantize the vectors Zi instead of Xi and transmit them similar to πsrk. The server estimates X by










X
_

^


π
srk


=


R

-
1





Z
_

^



,



Z
_

^

=


1
n






i
=
1

n



Y
i

.








The communication cost is same as πsk and is given by Lemma 5. Next the MSE is bounded.


Lemma 6 For any Xn, ε(πsrk(R), Xn) is at most








d

2




n
2

(

k
-
1

)

2








i
=
1

n



𝔼
R

[



(

Z
i
max

)

2

+


(

Z
i
min

)

2


]



,




where Zi=RXi and for every i, let si=Zimax−Zimin


Proof.










(


π
srk

,

X
n


)

=



𝔼
π








X
_

^

-

X
¯




2


=



𝔼
π








R

-
1





Z
_

^


-


R

-
1




Z
¯





2



=

(
a
)





𝔼
π








Z
_

^

-

Z
¯




2



=

(
b
)





𝔼
R




𝔼
π

[







Z
_

^

-

Z
¯




2

|

Z
1
n


]





d

4




n
2

(

k
-
1

)

2








i
=
1

n



𝔼
R

[


(


Z
i
max

-

Z
i
min


)

2

]








,




where the last inequality follows Eq. (5) and the value of si. (a) follows from the fact that rotation does not change the norm of the vector, and (b) follows from the tower law of expectation. The lemma follows from observing that





(ZimaxZimin)2≤2(Zimax)2+2(Zimin)2.


End proof.


To obtain strong bounds, an orthogonal matrix R that achieves low (Zimax)2 and (Zimin)2 is beneficial. In addition, due to the fact that d can be huge in practice, a type of orthogonal matrix that permits fast matrix-vector products is also beneficial. Naive orthogonal matrices that support fast multiplication such as block-diagonal matrices often result in high values of (Zimax)2 and (Zimin)2. As such, the present disclosure provides a special type of orthogonal matrix R=HD, where D is a random diagonal matrix with i.i.d. Rademacher entries (±1 with probability 0.5). H is a Walsh-Hadamard matrix. See Horadam, Kathy J. Hadamard matrices and their applications. Princeton university press, 2012. The Walsh-Hadamard matrix of dimension 2m for m∈custom-character is given by the recursive formula,








H

(

2
1

)

=

[



1


1




1



-
1




]


,


H

(

2
m

)

=


[




H

(

2

m
-
1


)




H

(

2

m
-
1


)






H

(

2

m
-
1


)




-

H

(

2

m
-
1


)





]

.






Both applying the rotation and inverse rotation take custom-character(dlogd) time and custom-character(1) additional space (with an in-place algorithm). The next lemma bounds custom-character(Zimax)2 and custom-character(Zimin)2 for this choice of R. The lemma is similar to that of Ailon, Nir and Chazelle, Bernard. Approximate nearest neighbors and the fast Johnson-Lindenstrauss transform. STOC, 2006. The proof is provided in Section 8 for completeness.


Lemma 7 Let R=HD, where D is a diagonal matrix with independent Radamacher random variables. For every i and every sequence Xn,







𝔼
[


(

Z
i
min

)

2

]

=


𝔼
[


(

Z
i
max

)

2

]









X
i



2
2



(


2

log

d

+
2

)


d

.






Combining the above two lemmas yields a significant result.


Theorem 3 For any Xn, πsrk(HD) protocol satisfies,









(



π
srk

(

H

D

)

,

X
n


)







2

log

d

+
2



n

(

k
-
1

)

2


·

1
n







i
=
1

n






X
i



2
2

.







4. Example Variable Length Coding

Instead of preprocessing the data via a rotation matrix as in πsrk, in this section the present disclosure provides use of a variable length coding strategy to minimize the number of bits.


Consider the stochastic k-level quantization technique. A natural way of transmitting Yi is sending the bin number for each coordinate, thus the total number of bits the algorithm sends per transmitted coordinate would be d┌log2k┐. This naive implementation is sub-optimal. Instead, The present disclosure proposes to, in some implementations, further encode the transmitted values using universal compression schemes. See, e.g., Krichevsky, R and Trofimov, V. The performance of universal encoding. IEEE Transactions on Information Theory, 27(2):199-207, 1981; and Falahatgar, Moein and Jafarpour, Ashkan and Orlitsky, Alon and Pichapati, Venkatadheeraj and Suresh, Ananda Theertha. Universal compression of power-law distributions. ISIT, 2015.


As one example technique that can be performed: encode hr, the number of times each quantized value r has appeared, and then use a variable length coding scheme (e.g., arithmetic or Huffman coding) corresponding to the distribution







p
r

=



h
r

d

.







    • This Tecnnique is denoted herein by πsvk. Since the vectors are quantized the same way in πsk and πsvk, the MSE of πsvk is also given by Theorem 2. The communication cost is now bounded.





Theorem 4 Let si=√{square root over (2)}∥Xi∥. There exists an implementation of πsvk such that custom-charactersvk, Xn) is at most







n

(


d

(

2
+


log
2

(




(

k
-
1

)

2


2

d


+

5
4


)


)

+

k


log
2





(

d
+
k

)


e

k


+



𝒪
~

(
1
)


)

.




Proof. As in Lemma 1, custom-character(1) bits are used to transmit the si's and Ximin. Recall that hr is the number of coordinates that are quantized into bin r, and r takes k possible values. Furthermore, Σrhr=d. Thus the number of bits necessary to represent the hr's is










log
2

(




d
+
k
-
1






k
-
1




)





k


log
2






(

d
+
k

)


e

k

.






Once the hr's have been compressed, variable length coding, such as, for example, arithmetic coding, corresponding to the distribution pr=hr/d can be used to compress and transmit bin values for each coordinate. The total number of bits arithmetic coding uses is







d





r
=
0


k
-
1





h
r

d



log
2



d

h
r





+
2.




See, MacKay, David J C. Information theory, inference and learning algorithms. Cambridge university press, 2003.


Let pr=hr/d, a=(k−1)Ximin, b=si, and β=Σr=0k−11/((a+br)2+δ). Note that










r



p
r



log
2



1

p
r




=





r



p
r



log
2




1
/

(


(



(

a
+
br

)

2

+
δ

)


β

)



p
r




+



r



p
r




log
2

(


(



(

a
+
br

)

2

+
δ

)


β

)








r



p
r




log
2

(


(



(

a
+
br

)

2

+
δ

)


β

)







log
2



(




r




p
r

(

a
+
br

)

2


+
δ

)


+


log
2


β




,




where the first inequality follows from the positivity of KL-divergence. Choosing δ=si2, yields β≤4/si2 and hence,









r



p
r



log
2



1

p
r








log
2

(




r




p
r

(

a
+
br

)

2


+

s
i
2


)

+



log
2

(

4
/

s
i
2


)

.






Note that if Yi(j) belongs to bin r, (a+br)2=(k−1)2Yi2(j). Recall that hr is the number of coordinates quantized into bin r. Hence Σrhr(a+br)2 is the scaled norm-square of Yi, i.e.,













r




h
r

(

a
+
br

)

2


=




(

k
-
1

)

2






j
=
1

d



Y
i
2

(
j
)









=





j
=
1

d



(


(



X
i

(
j
)

+

α

(
j
)


)



(

k
-
1

)


)

2






,




where the α(j)=Yi(j)−Xi(j). Taking expectations on both sides and using the fact that the α(j) are independent zero mean random variables over a range of si/(k−1), provides











𝔼




r




h
r

(

a
+
br

)

2



=





j
=
1

d



𝔼

(




X
i

(
j
)

2

+


α

(
j
)

2


)




(

k
-
1

)

2
















X
i



2
2



(



(

k
-
1

)

2

+

d
2


)






.




Using Jensen's inequality yields the result.


End proof.


Thus if k=√{square root over (d)}+1, the communication complexity is custom-character(nd) and the MSE is custom-character(1/n).


5. Example Communication MSE Trade-off

In the above protocols, all the clients transmit and hence the communication cost scales linearly with n. However, the present disclosure demonstrates that any of the above protocols can be combined by client sampling to obtain trade-offs between the MSE and the communication cost. Note that similar analysis also holds for sampling the coordinates.


Let π be a protocol where the mean estimate is of the form:











X
_

^

=


R

-
1




1
n






i
=
1

n



Y
i

.







(
6
)







All three protocols that have been discussed are of this form. Let πp be the protocol where each client participates independently with probability p. The server estimates X by










X
_

^


π
p


=



R

-
1


·

1
np







i

S



Y
i




,




where Yis are defined in the previous section and S is the set of clients that transmitted.


Lemma 8 For any set of vectors Xn and protocol π of the form Equation (6), its sampled version πp satisfies










(


π
p

,

X
n


)

=



1
p

·



(

π
,

X
n


)


+



1
-
p

np






i
=
1

n






X
i



2
2

.

and









𝒞

(


π
p

,

X
n


)

=

p
·


𝒞

(

π
,

X
n


)

.







Proof. The proof of communication cost follows from Lemma 5 and the fact that in expectation, np clients transmit. The MSE is now bounded. Let S be the set of clients that transmit. The error ε(πp, Xn) is











𝔼
[






X
_

^

-

X
_




2
2

]

=


𝔼
[






1
np






i

S




R

-
1




Y
i




-

X
_




2
2

]







=


𝔼
[







1
np






i

S



X
i



-

X
_




2
2

+


1


n
2



p
2











i

S



(



R

-
1




Y
i


-

X
i


)




2
2



]





,




where the last equality follows by observing that R−1Yi−Xi are independent zero mean random variables and hence for any i, custom-character[(R−1Yi−Xi)Ti∈SXiX)]=0. The first term can be bounded as











𝔼







1
np






i

S



X
i



-

X
_




2
2


=



1

n
2







i
=
1

n


𝔼







1
p



X
i



1

i

S



-

X
i




2
2










=



1

n
2







i
=
1

n


(


p




(

1
-
p

)

2


p
2







X
i



2
2


+


(

1
-
p

)






X
i



2
2



)









=





1
-
p

np

·

1
n







i
=
1

n





X
i



2
2







.




Furthermore, the second term can be bounded as










𝔼
[


1


n
2



p
2











i

S



(



R

-
1




Y
i


-

X
i


)




2
2


]


=

(
a
)





1


n
2



p
2








i

S



𝔼
[




(



R

-
1




Y
i


-

X
i


)



2
2

]









=



1


n
2



p
2








i
=
1

n


𝔼
[





(



R

-
1




Y
i


-

X
i


)



2
2



1

i

S



]









=



1


n
2


p







i
=
1

n


𝔼
[






R

-
1




Y
i


-

X
i




2
2

]









=




1


n
2


p




𝔼
[







i
=
1

n


(



R

-
1




Y
i


-

X
i


)




2
2

]


=


1
p





(

π
,

X
n


)










where the last equality follows from the assumption that π's mean estimate is of the form (6). (α) follows from the fact that R−1Yi−Xi are independent zero mean random variables.


End proof.


Combining the above lemma with Theorem 4, and choosing k=√{square root over (d)}+1 results in the following.


Corollary 1 For every c≤nd(2+log2(7/4)), there exists a protocol π such that custom-character(π, Sd)≤c and









(

π
,

S
d


)

=


𝒪

(

min

(

1
,

d
c


)

)

.





6. Example Lower Bounds

The lower bound relies on the lower bounds on distributed statistical estimation due to Zhang, Yuchen, Duchi, John, Jordan, Michael I, and Wainwright, Martin J. Information-theoretic lower bounds for distributed statistical estimation with communication constraints. NIPS, 2013.


Lemma 9 (Zhang et al., 2013 Proposition 2) There exists a set of distributions custom-characterd supported on







[


-

1

d



,

1

d



]

d






    • such that if any centralized server wishes to estimate the mean of the underlying unknown distribution, then for any independent protocol π












max


p
d



𝒫
d




𝔼
[





θ

(

p
d

)

-


θ
^

π




2
2

]




t


min

(

1
,

d

𝒞

(
π
)



)



,




where custom-character(π) is the communication cost of the protocol, θ(pd) is the mean of pd, and t is a positive constant.


Theorem 5 Let t be the constant in Lemma 9. For every c≤ndt/4 and n≥4/t,







ε

(




(
c
)


,

S
d


)




t
4




min

(

1
,

d
c


)

.






Proof. Given n samples from the underlying distribution where each sample belongs


to Sd, it is easy to see that








𝔼






θ

(

p
d

)

-


θ
ˆ

(

p
d

)




2
2




1
n


,




where {circumflex over (θ)}(pd) is the empirical mean of the observed samples. Let custom-characterd be the set of distributions in Lemma 9. Hence for any protocol π there exists a distribution pd such that








𝔼







θ
ˆ

(

p
d

)

-


θ
ˆ

π




2
2





(
a
)





1
2


𝔼






θ

(

p
d

)

-


θ
ˆ

π




2
2


-

𝔼






θ

(

p
d

)

-


θ
ˆ

(

p
d

)




2
2






(
b
)





t
2



min

(

1
,

d

𝒞

(
π
)



)


-

1
n





(
c
)




t
4



min

(

1
,

d

𝒞

(
π
)



)



,




Inequality (a) follows from the fact that 2(a−b)2+2(b−c)2≥(a−c)2. Inequality(b) follows from Lemma 9 and (c) follows from the fact that custom-character(π, Dd)≤ndt/4 and


End proof.


Corollary 1 and Theorem 5 yield Theorem 1. Note that the above lower bound holds only for communication cost c<custom-character(nd) .


7. Example Practical Considerations and Applications

Based on the theoretical analysis, the variable-length coding method provides the lowest quantization error asymptotically when using a constant number of bits. However in practice, stochastic rotated quantization may be preferred due to (hidden) constant factors and the fact that it uses a fixed amount of bits per dimension. For example, considering quantizing the vector [−1,1,0,0], stochastic rotated quantization can use 1 bit per dimension and gives zero error, whereas the other two protocols do not. To see this, observe that the naive quantization will quantize 0 to either 1 or −1 and variable length coding cannot achieve 0 error with 1 bit per dimension due to its constant factors.


In addition, note that the rotated quantization is preferred when applied on “unbalanced” data, due to the fact that the rotation can correct the unbalancedness. This is demonstrated by generating a dataset where the value of the last feature dimension entry is much larger than others. As an example of such dataset, 1000 datapoints were generated each with 256 dimensions. The first 255 dimensions are generated i.i.d. from N(0,1), and the last dimension is generated from N(100,1). As shown in FIG. 1, the rotated stochastic quantization has the best performance on this example dataset. The improvement is especially significant for low bit rate cases. In particular, FIG. 1 illustrates distributed mean estimation on data generated from a Gaussian distribution.


Two example applications are demonstrated in the rest of this section. The experiments are performed on the MNIST (d=2304) and CIFAR (d=512) datasets.


Distributed Lloyd's algorithm. In the distributed Lloyd's (k-means) algorithm, each client has access to a subset of data points. In each iteration, the server broadcasts the cluster centers to all the clients. Each client updates the centers based on its local data, and sends the centers back to the server. The server then updates the centers by computing the weighted average of the centers sent from all clients. In the quantized setting proposed by the present disclosure, the client compresses the new centers before sending to the server. This saves the uplink communication cost, which is often the bottleneck of distributed learning. Furthermore, in this setting, the downlink is a broadcast, and therefore its cost can be reduced by a factor of 0(n/logn) without quantization, where n is the number of clients.



FIGS. 2A-D show example results in which both the number of centers and the number of clients are set to 10. In particular, FIGS. 2A-D illustrate Lloyd's algorithm with different types of quantizations. Two settings are illustrated as tested: 16 quantization levels and 32 quantizations levels. The x-axis is the average number of bits sent for each data dimensions, and the y-axis is the global objective of Lloyd's algorithm.


Distributed power iteration. Power iteration is a widely used method to compute the top eigenvector of a matrix. In the distributed setting, each client has access to a subset of data. In each iteration, the server broadcasts the current estimate of the eigenvector to all clients. Each client then updates the eigenvector based on one power iteration on its local data, and sends the updated eigenvector back to the server. The server updates the eigenvector by computing the weighted average of the eigenvectors sent by all clients.


As one example of power iteration, given a set of vectors A1, A2, . . . Am, at each round t, compute:







v

t
+
1


=


1
m






i
=
1

m



A
i



A
i
T



v
t








Data points A1, A2, . . . Am are distributed across n clients. At each round of power iteration t, a client sends:









j


Client
i





A
j



A
j
T



v
t






The server can average the received information to compute vt+1.


Similar to the above distributed Lloyd's algorithm, in the quantized setting proposed by the present disclosure, the client compresses the estimated eigenvector before sending to the server. FIGS. 3A-D show the results. The dataset is distributed over 100 clients.


In particular, FIGS. 3A-D illustrate power iteration with different types of quantizations. Two settings were tested: 16 quantization levels and 32 quantization levels. The x-axis is the average number of bits sent for each data dimension and they y-axis is the custom-character2 distance between the computed eigenvector and the ground-truth vector.


For both distributed Lloyd's and distributed power iteration applications, variable-length coding achieves the lowest quantization error in most of the settings. Furthermore, for low-bit rate, stochastic rotated quantization is competitive with variable-length coding.


8. Proof of Lemma 7

The equality follows from the symmetry in HD. To prove the upper bound, observe that:






custom-character[(Zimax)2]=Var(Zimax)+(custom-character[Zimax])2.


Let D(j) be the jth diagonal entry of D. To bound the first term observe that Zimax is a function of d independent random variables D(1), D(2), . . . D(d). Changing D(j) changes the Zimax by at most








2



X
i

(
j
)



d


.






    • Hence, applying Efron-Stein variance bound yields












-
0.1



cm



Var

(

Z
i
max

)







j
=
1

d



4



X
i
2

(
j
)



2

d




=



2





X
i



2
2


d

.





To bound the second term, observe that for every β>0,








-
0.1



cm


β


Z
i
max


=


log


exp

(

β


Z
i
max


)





log

(




j
=
1

d


e

β



Z
i

(
j
)




)

.






Note that








Z
i

(
k
)

=


1

d









j
=
1

d



D

(
j
)



H

(

k
,
j

)





X
i

(
j
)

.








    • Since the D(j)'s are Radamacher random variables and |H(k,j)|=1 for all k,j, the distributions of Zi(k) is same for all k. Hence by Jensen's inequality,











𝔼
[

Z
i
max

]




1
β



𝔼
[

log

(




j
=
1

d


e

β



Z
i

(
j
)




)

]





1
β



log

(




j
=
1

d


𝔼
[

e

β



Z
i

(
j
)



]


)



=


1
β




log

(

d


𝔼
[

e

β



Z
i

(
1
)



]


)

.






Since









Z
i

(
1
)

=


1

d









j
=
1

d



D

(
j
)




X
i

(
j
)



,










𝔼
[

e

β



Z
i

(
1
)



]

=


𝔼
[

e


β




j



D

(
j
)




X
i

(
j
)





d



]


=

(
a
)







j
=
1

d


𝔼
[

e



βD

(
j
)




X
i

(
j
)



d



]


=






j
=
1

d




e


-
β





X
i

(
j
)

/

d




+

e

β




X
i

(
j
)

/

d





2





(
b
)






i
=
1

d


e


β
2





X
2

(
j
)

/
2


d




=

e


β
2







X
i



2
2

/
2


d






,




where (a) follows from the fact that the D(i)'s are independent and (b) follows from the fact that ea+e−a≤2ea2/2 for any a. Hence,







𝔼
[

Z
i
max

]





min

β

0




log

d

β


+


β





X
i



2
2



2

d







2





X
i



2




log

d





2

d



.





9. Example Computing Systems


FIG. 4 depicts an example system 200 for distributed computing. System 200 can include a server computing device 210 and a plurality of client computing devices 230.


In some implementations, and as one example application, the server computing device 210 can be configured to access a global machine-learned model and to provide the global model to the plurality of client devices 230. The model can be, for instance, a linear regression model, logistic regression model, a support vector machine model, a neural network (e.g. convolutional neural network, recurrent neural network, etc.), or other machine-learned model. In some implementations, the sever 210 can be configured to communicate with client devices 230 over one or more networks 280.


Client devices 230 can each be configured to determine one or more local updates associated with the model based at least in part on locally stored data 236. The locally stored data 236 can include audio files, image files, video files, log entries, and/or various other suitable data. In some implementations, the data 236 can be any data derived through a user interaction with a client device 230. Thus, the data 236 across the plurality of devices 230 includes data that is respectively stored at each device 230. Thus, in some implementations, the collective data 236 across all devices 230 is highly unbalanced and not independent and identically distributed.


Client devices 230 can be configured to provide the local updates to the server 210. The data 236 may be privacy sensitive. In this manner, the local updates can be performed and provided to server 210 without compromising the privacy of data 236. For instance, in such implementations, data 236 is not itself provided to server 210 since the local update does not include the actual data 236. In some implementations, one or more of encryption techniques, random noise techniques, and/or other security techniques can be added to the training process to obscure any inferable information from the local updates.


As indicated above, server 210 can receive each local update from client device 230, and can aggregate the local updates to determine a global update to the machine-learned model. In some implementations, server 210 can determine a weighted average or other mean of the local updates and determine the global update based at least in part on the average.


In some implementations, scaling or other techniques can be applied to the local updates to determine the global update. For instance, a local step size can be applied for each client device 230, the aggregation can be performed proportionally to various data partition sizes of client devices 230, and/or one or more scaling factors can be applied to the local and/or aggregated updates. It will be appreciated that various other techniques can be applied without deviating from the scope of the present disclosure.


More generally, FIG. 4 depicts an example computing system 200 that can be used to implement the methods and systems of the present disclosure. The system 200 can be implemented using a client-server architecture that includes a server 210 that communicates with one or more client devices 230 over a network 280.


The system 200 includes a server 210, such as a web server. The server 210 can be implemented using any suitable computing device(s). The server 210 can have one or more processors 212 and one or more memory devices 214. The server 210 can be implemented using one server device or a plurality of server devices. In implementations in which a plurality of devices are used, such plurality of devices can operate according to a parallel computing architecture, a sequential computing architecture, or a combination thereof.


The server 210 can also include a network interface 236 used to communicate with the client devices 230 over the network 280. The network interface can include any suitable components for interfacing with one more networks, including for example, transmitters, receivers, ports, controllers, antennas, or other suitable components.


The one or more processors 212 can include any suitable processing device, such as a microprocessor, microcontroller, integrated circuit, logic device, or other suitable processing device. The one or more memory devices 214 can include one or more computer-readable media, including, but not limited to, non-transitory computer-readable media, RAM, ROM, hard drives, flash drives, or other memory devices. The one or more memory devices 214 can store information accessible by the one or more processors 212, including computer-readable instructions 218 that can be executed by the one or more processors 212.


The instructions 218 can be any set of instructions that when executed by the one or more processors 212, cause the one or more processors 212 to perform operations.


The server 210 can further include a de-rotator 220. The de-rotator 220 can de-rotate a vector that has been rotated by a client device 230. For example, the de-rotater can use an inverse random rotation matrix that is an inverse of a random rotation matrix used by the client device 230 to rotate the vector. Alternatively, a mean of several rotated vectors can be determined prior to de-rotation and the de-rotator can de-rotated the determined mean. In some implementations, the de-rotator 220 can determine one or more inverse random rotation matrices based at least in part on one or more seeds that are shared (e.g., respectively shared or universally shared) with the client devices 230.


The server 210 can further include a decoder 222. The decoder 222 can decode a vector that has been encoded by a client device 230 (e.g., according to one of the encoding techniques discussed above). For example, the decoder can decode a vector that has been encoded according to variable length coding techniques such as, for example, Huffman coding or arithmetic coding.


The server 210 can further include a mean calculator 224. The mean calculator 224 can be configured to receive a plurality of vectors (e.g., decoded vectors, rotated vectors, and/or de-rotated vectors) and to determine a mean of the vectors (e.g., a mean vector). In some implementations in which the mean is determined prior to de-rotation, the mean vector can subsequently be de-rotated by the de-rotator 220.


As shown in FIG. 4, the one or more memory devices 214 can also store data 216 that can be retrieved, manipulated, created, or stored by the one or more processors 212. The data 216 can include, for instance, local updates, global parameters, and other data. The data 216 can be stored in one or more databases. The one or more databases can be connected to the server 210 by a high bandwidth LAN or WAN, or can also be connected to server 210 through network 280. The one or more databases can be split up so that they are located in multiple locales.


The server 210 can exchange data with client devices 230 over the network 280. Any number of client devices 230 can be connected to the server 210 over the network 280. Each of the client devices 230 can be any suitable type of computing device, such as a general purpose computer, special purpose computer, laptop, desktop, mobile device, navigation system, intelligent speaker or home assistant, home appliance, smartphone, tablet, computing device that is able to be worn, gaming console, worker device in a datacenter, a display with one or more processors, or other suitable computing device.


Similar to the server 210, a client device 230 can include one or more processor(s) 232 and a memory 234. The one or more processor(s) 232 can include, for example, one or more central processing units (CPUs), graphics processing units (GPUs) dedicated to efficiently rendering images or performing other specialized calculations, Tensor processing units (TPUs), and/or other processing devices. The memory 234 can include one or more computer-readable media and can store information accessible by the one or more processors 232, including instructions 238 that can be executed by the one or more processors 232 and data 236.


The client computing device 230 can include a vector calculator 240 that is implementable to determine one or more vectors (e.g., local updates) according to example aspects of the present disclosure. For example, in some example applications, the vector calculator 240 can perform one or more training techniques such as, for example, backwards propagation of errors to re-train or otherwise update a machine-learned model based on the locally stored data 236, thereby generating an update vector (e.g., a gradient). The vector calculator 240 can be included in an application or can be included in the operating system of the device 230. In other implementations, the vector calculator 240 can be any component or system that determines a vector to be transmitted to the server computing device 210.


The client computing device 230 can further include a rotater 242. The rotater 242 can rotate a vector by a random rotation matrix (e.g., by multiplying the vector by the matrix). In some implementations, the rotater 242 can determine the random rotation matrix based on a seed.


The client computing device 230 can further include a quantizer 246. The quantizer 246 can quantize a vector. For example, the quantizer 246 can perform stochastic binary quantization or stochastic k-level quantization as described above to quantize the vector.


The client computing device 230 can further include an encoder 248. For example, the encoder 248 can perform one or more of the encoding techniques described above (e.g., variable length coding such as, for example, Huffman coding or arithmetic coding).


The data 236 can include data examples to be used in solving one or more optimization problems. In some applications, the data examples of each client device 230 can be distributed unevenly among the client devices, such that no client device 230 includes a representative sample of the overall distribution of the training data examples. The data 236 can further include a vector to be communicated to the server 210.


The client device 230 of FIG. 4 can include various input/output devices for providing and receiving information from a user, such as a touch screen, touch pad, data entry keys, speakers, and/or a microphone suitable for voice recognition.


The client device 230 can also include a network interface 250 used to communicate with one or more remote computing devices (e.g. server 210) over the network 280. The network interface 250 can include any suitable components for interfacing with one more networks, including for example, transmitters, receivers, ports, controllers, antennas, or other suitable components.


The network 280 can be any type of communications network, such as a local area network (e.g. intranet), wide area network (e.g. Internet), cellular network, or some combination thereof. The network 280 can also include a direct connection between a client device 230 and the server 210. In general, communication between the server 210 and a client device 230 can be carried via network interface using any type of wired and/or wireless connection, using a variety of communication protocols (e.g. TCP/IP, HTTP, SMTP, FTP), encodings or formats (e.g. HTML, XML), and/or protection schemes (e.g. VPN, secure HTTP, SSL).


The vector calculator 240, the rotater 242, the quantizer 246, the encoder 248, the de-rotater 220, the decoder 222, and the mean calculator 224 can include computer logic utilized to provide desired functionality. Thus, each of vector calculator 240, the rotater 242, the quantizer 246, the encoder 248, the de-rotater 220, the decoder 222, and the mean calculator 224 can be implemented in hardware, firmware and/or software controlling a general purpose processor. In some implementations, each of vector calculator 240, the rotater 242, the quantizer 246, the encoder 248, the de-rotater 220, the decoder 222, and the mean calculator 224 includes program code files stored on the storage device, loaded into memory and executed by a processor or can be provided from computer program products, for example, computer executable instructions that are stored in a tangible computer-readable storage medium such as, for example, a RAM disk or card or other computer-readable optical or magnetic media.


Furthermore, while the techniques of the present disclosure are discussed primarily with reference to vectors to be transmitted or uploaded, the techniques described herein can also be applied to other data structures as well. As an example, for any other type of data to be transmitted by the client computing device 230 (e.g., a matrix (2D), a tensor (3D and above), or other data types or structures), the client computing device 230 (e.g., the vector calculator 240) can first flatten the data structure to form a vector. The techniques described herein (e.g., random rotation, probabilistic quantization, and/or variable length coding) can then be applied to the vector. After the entire process (e.g., after de-rotation, decoding, and/or mean estimation), the server computing device 210 can re-shape the resulting vector (e.g., a mean vector) back to the original dimension(s).


Thus, the present disclosure can be generalized to other data structures through conversion (e.g., flattening) of the other data structure to vector format prior to rotation, quantization, encoding, etc. After de-rotation, decoding, etc., the de-rotated or decoded vector can be reshaped back into the original dimension(s).


10. Example Methods


FIG. 5 depicts a swim lane flow diagram of an example method 500 to perform a stochastic rotated quantization technique according to example embodiments of the present disclosure. In particular, the left-hand side of FIG. 5 illustrates operations performed by each of one or more client computing devices while the right-hand side of FIG. 5 illustrates operations performed by a server computing device.


At 502, a client computing device obtains a vector. The vector can be any vector that is to be transmitted to the server computing device. Example vectors include a machine-learned model update vector that describes one or more parameters of a machine-learned model or one or more updates to the one or more parameters of the machine-learned model; a cluster vector that describes a plurality of cluster centers or a plurality of updates to the plurality of cluster centers; and a power iteration vector that describes an eigenvector. In some implementations, obtaining the vector can include computing the vector based on a local dataset that is stored locally at the client computing device.


At 504, the client computing device rotates the vector by a random rotation matrix to obtain a rotated vector. As an example, in some implementations, the random rotation matrix can be a product of a Walsh-Hadamard matrix with a diagonal matrix. In some implementations, the diagonal matrix can include independent and identically distributed Rademacher entries.


In some implementations, the method 500 can further include obtaining a seed that is shared with the server computing device. The method 500 can include generating the random rotation matrix based at least in part on the seed.


At 506, the client computing device performs probabilistic quantization of the rotated vector to obtain a quantized rotated vector. For example, in some implementations, performing probabilistic quantization at 506 can include performing stochastic binary quantization or performing stochastic k-level quantization.


In some implementations, performing probabilistic quantization at 506 can include determining a value for each of a number of quantization levels based at least in part on a magnitude of the rotated vector and a minimum coordinate value included in the rotated vector; and quantizing each coordinate of the rotated vector into one of the number of quantization levels.


At 508, the client computing device transmits the quantized rotated vector to the server computing device. In some implementations, various additional encodings, cryptography, and/or privacy preserving manipulations can be performed prior to transmission.


At 510, the server computing device receives the quantized rotated vectors from the client computing devices. In some implementations, at 510, the server computing device can decode or unquantize each quantized rotated vector to the extent possible. For example, this may include transforming references or codings into particular data entries to which the references refer.


At 512, the server computing device determines a mean of all the quantized rotated vectors received from all of the client computing devices to obtain a mean rotated vector.


At 514, the server computing device de-rotates the mean rotated vector by an inverse random rotation matrix to obtain a mean de-rotated vector. For example, the inverse random rotation matrix can be the inverse of the random rotation matrix used at 504.


In some implementations, method 500 can include obtaining, by the server computing device, a seed, where the seed is shared with at least one of the client computing devices from which a quantized rotated vector is received. For example, each client computing device can have a different seed or seeds can be used by multiple client computing devices. The method 500 can include generating, by the server computing device, the inverse random rotation matrix based at least in part on the seed.


In some implementations, the operations illustrated at 512 and 514 can be performed in reverse order, such that the vectors are individually de-rotated prior to taking the mean.


In some implementations, the method 500 can further include performing, by the server computing device, a global update based on the mean de-rotated vector.



FIG. 6 depicts a swim lane flow diagram of an example method 600 to perform a variable length coding technique according to example embodiments of the present disclosure. In particular, the left-hand side of FIG. 6 illustrates operations performed by each of one or more client computing devices while the right-hand side of FIG. 6 illustrates operations performed by a server computing device.


At 602, a client computing device obtains a vector. The vector can be any vector that is to be transmitted to the server computing device. Example vectors include a machine-learned model update vector that describes one or more parameters of a machine-learned model or one or more updates to the one or more parameters of the machine-learned model; a cluster vector that describes a plurality of cluster centers or a plurality of updates to the plurality of cluster centers; and a power iteration vector that describes an eigenvector. In some implementations, obtaining the vector can include computing the vector based on a local dataset that is stored locally at the client computing device.


At 604, the client computing device performs probabilistic quantization of the vector to obtain a quantized vector. For example, in some implementations, performing probabilistic quantization at 604 can include performing stochastic binary quantization or performing stochastic k-level quantization.


In some implementations, performing probabilistic quantization at 604 can include determining a value for each of a number of quantization levels based at least in part on a magnitude of the vector to be quantized and a minimum coordinate value included in the vector; and quantizing each coordinate of the vector into one of the number of quantization levels.


At 606, the client computing device encodes the quantized vector according to a variable length coding scheme to obtain an encoded quantized vector. For example, the variable length coding scheme can include Huffman coding or arithmetic coding.


At 608, the client computing device transmits the encoded quantized vector to the server computing device.


At 610, the server computing device receives the encoded quantized vectors from the client computing devices.


At 612, the server computing device decodes each encoded quantized vector according to the variable length coding scheme to obtain the quantized vector.


In addition, in some implementations, at 612 and after decoding with the variable length coding scheme, the server computing device can decode or unquantize each quantized rotated vector to the extent possible. For example, this may include transforming references or codings into particular data entries to which the references refer.


At 614, the server computing device determines a mean of all the quantized vectors received from all of the client computing devices to obtain a mean vector.


In some implementations, the method 600 can further include performing, by the server computing device, a global update based on the mean de-rotated vector.


11. Additional Disclosure

The technology discussed herein makes reference to servers, databases, software applications, and other computer-based systems, as well as actions taken and information sent to and from such systems. The inherent flexibility of computer-based systems allows for a great variety of possible configurations, combinations, and divisions of tasks and functionality between and among components. For instance, processes discussed herein can be implemented using a single device or component or multiple devices or components working in combination. Databases and applications can be implemented on a single system or distributed across multiple systems. Distributed components can operate sequentially or in parallel.


While the present subject matter has been described in detail with respect to various specific example embodiments thereof, each example is provided by way of explanation, not limitation of the disclosure. Those skilled in the art, upon attaining an understanding of the foregoing, can readily produce alterations to, variations of, and equivalents to such embodiments. Accordingly, the subject disclosure does not preclude inclusion of such modifications, variations and/or additions to the present subject matter as would be readily apparent to one of ordinary skill in the art. For instance, features illustrated or described as part of one embodiment can be used with another embodiment to yield a still further embodiment. Thus, it is intended that the present disclosure cover such alterations, variations, and equivalents.

Claims
  • 1-20. (canceled)
  • 21. A computing system that performs stochastic quantization to facilitate efficient transmission of machine-learned model updates from client devices to a centralized server computing device, the computing system comprising: one or more client computing devices, wherein each client computing device comprises one or more processors and one or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors cause the client computing device to perform operations, the operations comprising: determining an update to a machine-learned model based at least in part on a local dataset stored at the client computing device, wherein the update comprises a plurality of coordinate values;performing quantization of the update to obtain a quantized update, wherein performing quantization of the update comprises: establishing a plurality of quantization levels;respectively quantizing each coordinate value of the plurality of coordinate value into one of the plurality of quantization levels according to a respective probability determined based on the coordinate value; andencoding the quantized update according to a variable length coding scheme; andtransmitting the quantized update to the centralized server computing device.
  • 22. The computing system of claim 21, wherein performing quantization of the update comprises: performing probabilistic quantization of the update.
  • 23. The computing system of claim 21, wherein performing quantization of the update comprises: performing stochastic binary quantization of the update.
  • 24. The computing system of claim 21, wherein performing quantization of the update comprises: performing stochastic k-level quantization of the update.
  • 25. The computing system of claim 21, wherein: the update includes a vector having the plurality of coordinate values; andperforming quantization of the update comprises: determining a value for each of the plurality of quantization levels based at least in part on a magnitude of the vector to be quantized and a minimum coordinate value included in the vector; andquantizing each coordinate of the vector into one of the plurality of quantization levels.
  • 26. The computing system of claim 21, further comprising: the centralized server computing device, the centralized server computing device comprising one or more processors and one or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors cause the centralized server computing device computing to perform operations, the operations comprising: for each of the one or more client computing devices: receiving the quantized update transmitted by the client computing device; anddecoding the quantized update according to the variable length coding scheme to obtain the quantized update for such client computing device;determining a mean of all quantized updates obtained for all of the one or more client computing devices; andupdating a global machine-learned model based at least in part on the mean of all quantized updates.
  • 27. The computing system of claim 21, wherein the variable length coding scheme comprises Huffman coding or arithmetic coding.
  • 28. The computing system of claim 21, wherein the update comprises one or more of: a machine-learned model update vector that describes one or more parameters of a machine-learned model or one or more updates to the one or more parameters of the machine-learned model;a cluster vector that describes a plurality of cluster centers or a plurality of updates to the plurality of cluster centers; anda power iteration vector that describes an eigenvector.
  • 29. The computing system of claim 21, wherein: the plurality of quantization levels comprises two quantization levels; andtransmitting the quantized update to the centralized server computing device comprises transmitting: two real values that correspond to the two quantization levels; anda bit vector of length equal to a number of coordinate values in the update, wherein each bit in the bit vector corresponds to a respective one of the plurality of coordinate values.
  • 30. The computing system of claim 21, wherein the operations further comprise: identifying a minimum value among the plurality of coordinate values of the update; andsetting a first quantization level of the plurality of quantization levels equal to the minimum value among the plurality of coordinate values.
  • 31. The computing system of claim 30, wherein performing quantization further comprises: identifying a maximum value among the plurality of coordinate values of the update; andsetting a second quantization level of the plurality of quantization levels equal to the maximum value among the plurality of coordinate values.
  • 32. The computing system of claim 21, wherein the plurality of quantization levels comprises three or more quantization levels.
  • 33. The computing system of claim 21, wherein the update to the machine-learned model comprises a gradient associated with training of the machine-learned model.
  • 34. A computer-implemented method, comprising: determining, by a computing system comprising one or more computing devices, an update to a machine-learned model based at least in part on a local dataset stored at a client computing device, wherein the update comprises a plurality of coordinate values;performing, by the computing system, quantization of the update to obtain a quantized update, wherein performing quantization of the update comprises: establishing, by the computing system, a plurality of quantization levels; andrespectively quantizing, by the computing system, each coordinate value of the plurality of coordinate value into one of the plurality of quantization levels according to a respective probability determined based on the coordinate value;encoding the quantized update according to a variable length coding scheme; andtransmitting, by the computing system, the quantized update to a centralized server computing device.
  • 35. The computer-implemented method of claim 34, wherein performing quantization of the update comprises: performing stochastic quantization of the update.
  • 36. The computer-implemented method of claim 34, wherein: the update includes a vector having the plurality of coordinate values; andperforming quantization of the update comprises: determining a value for each of the plurality of quantization levels based at least in part on a magnitude of the vector to be quantized and a minimum coordinate value included in the vector; andquantizing each coordinate of the vector into one of the plurality of quantization levels.
  • 37. The computer-implemented method of claim 34, wherein the update comprises one or more of: a machine-learned model update vector that describes one or more parameters of a machine-learned model or one or more updates to the one or more parameters of the machine-learned model;a cluster vector that describes a plurality of cluster centers or a plurality of updates to the plurality of cluster centers; anda power iteration vector that describes an eigenvector.
  • 38. The computer-implemented method of claim 34, further comprising: identifying a minimum value among the plurality of coordinate values of the update; andsetting a first quantization level of the plurality of quantization levels equal to the minimum value among the plurality of coordinate values.
  • 39. The computer-implemented method of claim 34, wherein performing quantization further comprises: identifying a maximum value among the plurality of coordinate values of the update; andsetting a second quantization level of the plurality of quantization levels equal to the maximum value among the plurality of coordinate values.
  • 40. The computer-implemented method of claim 34, wherein the plurality of quantization levels comprises three or more quantization levels.
Provisional Applications (1)
Number Date Country
62400019 Sep 2016 US
Continuations (2)
Number Date Country
Parent 17502794 Oct 2021 US
Child 18240799 US
Parent 15708793 Sep 2017 US
Child 17502794 US
Continuation in Parts (1)
Number Date Country
Parent 15676076 Aug 2017 US
Child 15708793 US