Papers
Topics
Authors
Recent
Search
2000 character limit reached

Thresholded Weak Convergence in L1 Spaces

Updated 25 February 2026
  • Thresholded weak convergence is defined by dual parameters that control the greedy approximation process, ensuring both convergence and uniform boundedness in L1.
  • The method employs a dyadic chain selection and a two-stage weak thresholding approach that filters Haar coefficients based on predefined ratios.
  • This framework distinguishes itself from classical greedy methods by enabling effective approximation even when the multivariate Haar basis is not quasi-greedy.

Thresholded weak convergence is a concept arising from the study of greedy approximation algorithms for the multivariate Haar basis in L1([0,1]d)L_{1}([0,1]^d), specifically in the context where the underlying basis is not quasi-greedy. The thresholded weak greedy algorithm introduces two real parameters, $0 < t < s < 1$, governing the weakness (threshold) and a secondary chain-length threshold. The central result is that, for this algorithm, the sequence of greedy approximants converges uniformly and is bounded for all fL1([0,1]d)f \in L_{1}([0,1]^d), in contrast to the failure of classical thresholding greedy algorithms in this setting (Dilworth et al., 2012).

1. Multivariate Haar Basis and Haar Coefficients

Let d1d \ge 1. The setting is the Banach space X=L1([0,1]d)X = L_{1}([0,1]^d), with the normalized multivariate Haar system {hI(i):IDd,1i<2d}\{h_{I}^{(i)} : I \in \mathcal D^d,\, 1 \le i < 2^d\}, augmented by the constant h[0,1]d(0)=1h_{[0,1]^d}^{(0)} = 1. The set Dd=n0{I1××Id:Ij[0,1)\mathcal D^d = \bigcup_{n \ge 0} \{I_1 \times \cdots \times I_d: I_j \subset [0,1) dyadic of length 2n2^{-n}}indexesdyadiccubesofallscales.Forindexes dyadic cubes of all scales. Forf \in L_{1}([0,1]d),theHaarcoefficientoncube, the Haar coefficient on cubeIanddirectionand directioni</sup>isdefinedby</p><p></sup> is defined by</p> <p>c_{I}^{(i)}(f) = \int_{[0,1]^d} f(x) h_{I}^{(i)}(x)\,dx.</p><p>Afixedtotalorder</p> <p>A fixed total order <isimposedonthecollectionofmultiindexedHaarfunctions.</p><h2class=paperheadingid=weakthresholdinggreedyalgorithmconstruction>2.WeakThresholdingGreedyAlgorithm:Construction</h2><p>Theweakthresholdinggreedyalgorithm(WTGA)isparameterizedbytworealnumbers is imposed on the collection of multi-indexed Haar functions.</p> <h2 class='paper-heading' id='weak-thresholding-greedy-algorithm-construction'>2. Weak Thresholding Greedy Algorithm: Construction</h2> <p>The weak thresholding greedy algorithm (WTGA) is parameterized by two real numbers 0 < t < s < 1.Theapproximationto. The approximation to fisconstructedinductivelyvia</p><p> is constructed inductively via</p> <p>G_m = G_{s, t}^{(m)}(f), \qquad R_m = f - G_m, \qquad (m \ge 0)</p><p>with</p> <p>with G_0 = 0and and R_0 = f.Theiterationat. The iteration at m \mapsto m+1proceedsviathreesubsteps:</p><ul><li><strong>(A)BranchSelection:</strong>Findtheminimal proceeds via three substeps:</p> <ul> <li><strong>(A) Branch Selection:</strong> Find the minimal (I_m, j_m)forwhich for which |c_{I_m}^{(j_m)}(R_{m-1})| = \max_{(I, i)} |c_{I}^{(i)}(R_{m-1})|.</li><li><strong>(B)WeakThresholdingonDyadicChain:</strong>Define.</li> <li><strong>(B) Weak Thresholding on Dyadic Chain:</strong> Define A_masthemaximaldyadicancestorof as the maximal dyadic ancestor of I_msuchthatallcubes such that all cubes Iinthedyadicchain in the dyadic chain \mathcal C(I_m, J)from from I_mto to JadmitsomeHaardirection admit some Haar direction iwith with |c_{I}^{(i)}(R_{m-1})| \ge s\,|c_{I_m}^{(j_m)}(R_{m-1})|.</li><li><strong>(C)Threshold.</li> <li><strong>(C) Threshold-tSelectionin Selection in A_m:</strong>Amongdirections:</strong> Among directions 1 \le i < 2^din in A_m,selectthesmallestindex, select the smallest index i_msuchthat</li></ul><p> such that</li> </ul> <p>|c_{A_m}^{(i_m)}(R_{m-1})| \ge t \max_{1 \le j < 2^d} |c_{A_m}^{(j)}(R_{m-1})|.</p><p>Set</p> <p>Set G_m = G_{m-1} + c_{A_m}^{(i_m)}(f) h_{A_m}^{(i_m)},, R_m = f - G_m.Thisselectionruleisbranchgreedy,focusedon. This selection rule is branch-greedy, focused on tadmissiblelargecoefficients,andisindependentofminorvariantsoftheselectionorder(<ahref="/papers/1209.1378"title=""rel="nofollow"dataturbo="false"class="assistantlink"xdataxtooltip.raw="">Dilworthetal.,2012</a>).</p><h2class=paperheadingid=mainresultsconvergenceanduniformboundedness>3.MainResults:ConvergenceandUniformBoundedness</h2><p>Theprimarytheoremestablishes:</p><p><em>For-admissible large coefficients, and is independent of minor variants of the selection order (<a href="/papers/1209.1378" title="" rel="nofollow" data-turbo="false" class="assistant-link" x-data x-tooltip.raw="">Dilworth et al., 2012</a>).</p> <h2 class='paper-heading' id='main-results-convergence-and-uniform-boundedness'>3. Main Results: Convergence and Uniform Boundedness</h2> <p>The primary theorem establishes:</p> <p><em>For 0 < t < s < 1,forevery, for every f \in L_{1}([0,1]^d):</em></p><ul><li><strong>Convergence:</strong>:</em></p> <ul> <li><strong>Convergence:</strong> \lim_{m \to \infty} G_{s, t}^{(m)}(f) = fin in L_{1}.</li><li><strong>UniformBoundedness:</strong>Thereexists.</li> <li><strong>Uniform Boundedness:</strong> There exists C(d, s, t) < \inftysuchthatforall such that for all m,</li></ul><p>,</li> </ul> <p>\|G_{s, t}^{(m)}(f)\|_{1} \le C(d, s, t)\|f\|_{1}.</p><p>Anexplicitbound,</p><p></p> <p>An explicit bound,</p> <p>C(d, s, t) \le \left(\frac{5}{t} + 12\right) \left(1 + (2^d - 1)\,\min\{s(1-s), s-t\}/24\right),</p><p>isprovided.Ifeither</p> <p>is provided. If either s \to tor or s \to 1,thealgorithmfailstoremainboundedanddivergesonsuitableexamples.Thus,themultivariateHaarbasisisnotquasigreedyin, the algorithm fails to remain bounded and diverges on suitable examples. Thus, the multivariate Haar basis is not quasi-greedy in L_1(<ahref="/papers/1209.1378"title=""rel="nofollow"dataturbo="false"class="assistantlink"xdataxtooltip.raw="">Dilworthetal.,2012</a>).</p><h2class=paperheadingid=proofstructureandtechnicallemmas>4.ProofStructureandTechnicalLemmas</h2><p>Theproofofboundednessandconvergencefollowsthreestages:</p><p><strong>I.NormvsCoefficientEstimates:</strong></p><ul><li>Lemma3.1:For (<a href="/papers/1209.1378" title="" rel="nofollow" data-turbo="false" class="assistant-link" x-data x-tooltip.raw="">Dilworth et al., 2012</a>).</p> <h2 class='paper-heading' id='proof-structure-and-technical-lemmas'>4. Proof Structure and Technical Lemmas</h2> <p>The proof of boundedness and convergence follows three stages:</p> <p><strong>I. Norm-vs-Coefficient Estimates:</strong></p> <ul> <li>Lemma 3.1: For J \subset I,, |c_I(f)| \le \frac{|I|}{|J|}\|f\|_{1, J}.</li><li>Lemma3.2:If.</li> <li>Lemma 3.2: If |c_I(f)| \le 1forall for all I,then, then \|P_I f\|_1 \le 1,with, with P_IastheHaarprojection.</li><li>Lemma3.3:For as the Haar-projection.</li> <li>Lemma 3.3: For J \subset I,, |J| = \frac{1}{2}|I|,</li></ul><p>,</li> </ul> <p>\|P_I f\|_1 - \|P_J f\|_1 \ge \frac{1}{2}|c_I(f)| - |c_J(f)|.</p><p><strong>II.CombinatorialDecompositionofActiveCubes:</strong></p><ul><li>Theminimalgeneralizedchainrepresentation(MGCR)providesapartitionintodyadicchainswhosetipscorrespondtocubeswhereancestorsdropbelowthreshold.</li><li>Lemma4.6:For</p> <p><strong>II. Combinatorial Decomposition of Active Cubes:</strong></p> <ul> <li>The minimal generalized chain representation (MGCR) provides a partition into dyadic chains whose tips correspond to cubes where ancestors drop below threshold.</li> <li>Lemma 4.6: For p, qwithdisjointactivecoefficientsetsandopposite with disjoint active coefficient sets and opposite sweakness/-weakness/tsmallness,-smallness, \|p+q\|_1 \ge C(s, t)|\text{union of minimal tips}|.</li></ul><p><strong>III.SymmetrizationandFinalPatching:</strong></p><ul><li>Symmetrizationvia.</li> </ul> <p><strong>III. Symmetrization and Final Patching:</strong></p> <ul> <li>Symmetrization via L_{i}ensuresallactivecubesofafunctionlieinfixeddyadicsiblings,facilitatinglowerboundsonnorms.</li><li>Iterationleadsto ensures all active cubes of a function lie in fixed dyadic siblings, facilitating lower bounds on norms.</li> <li>Iteration leads to \|G_m(f)\|_1 \le C(t)\,\|G_m(f) + \text{next increment}\|_1 \le C(t)\,\|f\|_1,with, with C(t) = 5/t + 12.</li><li>Onceuniformboundednessisestablished,convergenceisachievedbythestandardbasisprojection(glidinghump)argument(Wojtaszczyk[11]).</li></ul><h2class=paperheadingid=algorithmicquantitiesandthresholdparametereffects>5.AlgorithmicQuantitiesandThresholdParameterEffects</h2><p>Nonontrivialasymptoticratefor.</li> <li>Once uniform boundedness is established, convergence is achieved by the standard “basis-projection” (gliding hump) argument (Wojtaszczyk [11]).</li> </ul> <h2 class='paper-heading' id='algorithmic-quantities-and-threshold-parameter-effects'>5. Algorithmic Quantities and Threshold Parameter Effects</h2> <p>No nontrivial asymptotic rate for \|f - G_m(f)\|_1 \to 0as as m \to \inftyisprovided,butexplicituniformboundsholdateachstep: is provided, but explicit uniform bounds hold at each step: \|G_{s, t}^{(m)}(f)\|_1 \le C(d, s, t)\|f\|_1,andconsequently, and consequently, \|R_m\|_1 \le (1 + C(d, s, t))\|f\|_1.Thealgorithmthusavoidsblowup.Ifparameter. The algorithm thus avoids blow-up. If parameter sischosentoocloseto is chosen too close to torto or to 1$, divergence results, demonstrating the criticality of a gap between the two thresholds for the algorithm&#39;s stability in $L_1([0,1]^d)(<ahref="/papers/1209.1378"title=""rel="nofollow"dataturbo="false"class="assistantlink"xdataxtooltip.raw="">Dilworthetal.,2012</a>).</p><h2class=paperheadingid=comparisonwithclassicalgreedyapproximations>6.ComparisonwithClassicalGreedyApproximations</h2><p>ThethresholdedweakgreedyalgorithmcontrastswithtwoclassicalparadigmsinBanachspaceapproximation:</p><ul><li><strong>ThresholdingGreedyAlgorithm(<ahref="https://www.emergentmind.com/topics/transitionawaregraphattentionnetworktga"title=""rel="nofollow"dataturbo="false"class="assistantlink"xdataxtooltip.raw="">TGA</a>):</strong>Selectsateachstepthelargestcoefficient.TheTGAfailstoconvergein (<a href="/papers/1209.1378" title="" rel="nofollow" data-turbo="false" class="assistant-link" x-data x-tooltip.raw="">Dilworth et al., 2012</a>).</p> <h2 class='paper-heading' id='comparison-with-classical-greedy-approximations'>6. Comparison with Classical Greedy Approximations</h2> <p>The thresholded weak greedy algorithm contrasts with two classical paradigms in Banach space approximation:</p> <ul> <li><strong>Thresholding Greedy Algorithm (<a href="https://www.emergentmind.com/topics/transition-aware-graph-attention-network-tga" title="" rel="nofollow" data-turbo="false" class="assistant-link" x-data x-tooltip.raw="">TGA</a>):</strong> Selects at each step the largest coefficient. The TGA fails to converge in L_1([0,1]^d)fortheHaarbasisduetolackofquasigreediness.</li><li><strong>WeakGreedyAlgorithm:</strong>Ateachstep,selectscoefficientswithinafactor for the Haar basis due to lack of quasi-greediness.</li> <li><strong>Weak Greedy Algorithm:</strong> At each step, selects coefficients within a factor t < 1ofthecurrentmaximum;thisconvergesin of the current maximum; this converges in L_pfor for p > 1whenthebasisisquasigreedybutfailsin when the basis is quasi-greedy but fails in L_1withoutadditionalcontrol.</li><li><strong>ThresholdedWeakAlgorithm(asinthiscontext):</strong>Introducestwoparameters without additional control.</li> <li><strong>Thresholded Weak Algorithm (as in this context):</strong> Introduces two parameters t < s < 1.Thebranchgreedystep,governedbyasecondarythreshold. The branch-greedy step, governed by a secondary threshold s,limitstheclimbinthedyadictreeandensuresselectionofcoefficientsofsufficientsize.Convergencein, limits the climb in the dyadic tree and ensures selection of coefficients of sufficient size. Convergence in L_1isattainedwithouttheHaarbasisbeingquasigreedy(<ahref="/papers/1209.1378"title=""rel="nofollow"dataturbo="false"class="assistantlink"xdataxtooltip.raw="">Dilworthetal.,2012</a>).</li></ul><p>InBanachspaceterminology,thisdemarcatesanewregime:evenforbaseslackingquasigreediness,convergenceofagreedyalgorithmcanberestoredbysuitablythrottlingtheselectionmechanismviadualthresholds.</p><h2class=paperheadingid=significanceandextensions>7.SignificanceandExtensions</h2><p>Thresholdedweakconvergencedemonstratesthatcontrolledweakeningofthegreedystep,combinedwithdyadicchainlengthmoderationviaauxiliarythreshold is attained without the Haar basis being quasi-greedy (<a href="/papers/1209.1378" title="" rel="nofollow" data-turbo="false" class="assistant-link" x-data x-tooltip.raw="">Dilworth et al., 2012</a>).</li> </ul> <p>In Banach space terminology, this demarcates a new regime: even for bases lacking quasi-greediness, convergence of a greedy algorithm can be restored by suitably “throttling” the selection mechanism via dual thresholds.</p> <h2 class='paper-heading' id='significance-and-extensions'>7. Significance and Extensions</h2> <p>Thresholded weak convergence demonstrates that controlled weakening of the greedy step, combined with dyadic chain-length moderation via auxiliary threshold s,sufficesforuniformapproximationin, suffices for uniform approximation in L_1bymembersoftheHaarbasis.Thisisstructurallydistinctfromclassicalgreedyandweaklygreedyalgorithms,underpinningfurtherstudiesinapproximationtheoryforbasesfailingstandard(quasi)greedyconditions.Theframeworksuggestsavenuesfordevelopinganalogousstrategiesforothernonquasigreedysystemsin by members of the Haar basis. This is structurally distinct from classical greedy and weakly greedy algorithms, underpinning further studies in approximation theory for bases failing standard (quasi-)greedy conditions. The framework suggests avenues for developing analogous strategies for other non-quasi-greedy systems in L_p$ spaces and more general Banach spaces (Dilworth et al., 2012).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Thresholded Weak Convergence.