Basic building blocks for a tripledouble intermediate format


 Maximillian Butler
 1 years ago
 Views:
Transcription
1 Basic building blocks for a tripledouble intermediate format corrected version) Christoph Quirin Lauter February 26, 2009 Abstract The implementation of correctly rounded elementary functions needs high intermediate accuracy before final rounding. This accuracy can be provided by pseudo) expansions of size three, i.e. a tripledouble format. The report presents all basic operators for such a format. Tripledouble numbers can be redundant. A renormalization procedure is presented and proven. Elementary functions implementations need addition and multiplication sequences. These operators must take operands in double, doubledouble and tripledouble format. The results must be accordingly in one of the formats. Several procedures are presented. Proofs are given for their accuracy bounds. Intermediate tripledouble results must finally be correctly rounded to double precision. Two effective rounding sequences are presented, one for roundtonearest mode, one for the directed rounding modes. Their complete proofs constitute half of the report. Introduction The implementation of correctly rounded double precision elementary functions needs high accuracy intermediate formats [7, 4,, 3]. To give an order of magnitude, in most cases 20 bits of intermediate accuracy are needed for assuring the correct rounding property [3]. In contrast, the native IEEE 754 double precision format offers 53 bits of accuracy. Wellknow techniques allow to double this accuracy [5]. Nevertheless the resulting accuracy, 06 bits, is not sufficient. Tripling it would be enough. Using expansions of floating point numbers allows to expand still more the accuracy of a native floating point type. An expansion is a nonevaluated sum of some floating point numbers in a floating point format [6, 9, 0]. However the techniques for manipulating general expansions presented in literature are too costly for the implementation of elementary functions. In this report, we are going to consider expansions of three double precision floating point numbers, i.e. we are going to investigate on a triple double format. In our case, we will hence manipulate floating point numbers x h + x m + x l ) with x h, x m, x l F. After making some definitions and an analysis of a procedure that we call renormalization, we will consider addition and multiplication procedures for tripledouble numbers. These will also comprise operations linking the triple double format with the native double and a doubledouble format. In the end, we will present and prove in particular two final rounding sequences for correctly rounding a tripledouble number to the base double format.
2 2 Definitions It will be necessary to define a normal form of a tripledouble number because it is clear that the tripledouble floating point format  or that of pseudo)expansions in general  is redundant: there exist numbers ˆx such that there are different triplets x h, x m, x l ) F 3 such that ˆx = x h + x m + x l. It is easy to see that a representation in such a format is unique if the numbers forming the expansion are ordered by decreasing 0 and if the latter are such that there is no binary) digit represented by two bits of the significands of two different numbers of the expansion. The sign bit has in this case the same role as an additional bit of the significant [6]. As we will see, the need for a normal form for each tripledouble number is not directly motivated by needs of the addition and multiplication operators we will have to define. As long as the latter operate correctly, i.e. between known error bounds, on numbers whose representation in a tripledouble format is not unique, we are not obliged to recompute normal forms. On the other hand, when we want to round down such a higher precision number to a native double in one of the different rounding modes), a normal form will be needed. If we could not provide one, we would assist to a explosion of different cases to be handled by the rounding sequence. Let us first define some notations that are needed for the analysis of numerical algorithms like the ones that we are going to consider. Definition 2. Predecessor and successor of a floating point number) Let be x F a floating point number. Let be < the total ordering on F. If x is positive or zero we will design by x + the direct successor of x in F with regard to < and we will notate x its predecessor. If x is negative we will design by x the successor and by x + the predecessor of x. In any case, we will design by succ x) the successor of x in F with regard to < and pred x) its predecessor. This definition 2. is inspired by [4]. Definition 2.2 Unit on the last place the ulp function) Let be x F a double precision number and let be x + its successor resp. negative). So x + x if x 0 and x + + ulp x) = 2 ulp ) x 2 if x + but x + = + ulp x) if x < 0 This definition is inspired by [4], too. ulp function. Concerning the overlap we define finally: Definition 2.3 Overlap) Let x h, x l F be two nonsubnormal double precision numbers. We will say that x h and x l overlap iff predecessor if x is Compare [8] for further research on the subject of the x l ulp x h ) Let be x h, x m, x l F the components of a tripledouble number. We will suppose that they are not subnormals. So, we will say that there is overlap iff x h and x m or x m and x l or x h and x l overlap. Definition 2.4 Normal form) Let be x h, x m, x l F three nonsubnormal floating point numbers forming the tripledouble number x h + x m + x l. We will say that x h + x m + x l are in normal form iff there is no overlap between its components. Further, we will say that x h + x m + x l is normalised. 2
3 Having made this definition, let us remark that it is deeply inspired by our direct needs and not by abstract analysises on how to represent real numbers. Anyway, the fact that an expansion is not overlapping is not a sufficient condition for its representing an unique floating point number. The implementation of addition and multiplication operators will be finally be based on computations on the components of the operands or partial products in the case of a multiplication) followed by a final summing up for regaining the tripledouble base format. As we do not statically know the magnitudes of the tripledouble operands and its components, we will not be able to guarantee that in any case there will not be any overlap in the result. On the other hand, we strive to develop a renormalization sequence for recomputing normal forms. These will be handy, as we already said, for the final rounding and, if needed, i.e. if sufficiently good static bounds can not be given, before handing over a result as an operand to a following operation. Such a renormalization sequence must guarantee that for each tripledouble in argument if needed verifying some preconditions on an initial overlap), the tripledouble number returned will be normalised and that the sum of the components for the first number is exactly the same as the one of the components of the latter. Definition 2.5 The Add2 algorithm) Let A be an algorithm taking as arguments two double precision numbers x, y F and returning two double precision floating point numbers r h, r l F. We will call A the Add2 algorithm iff it verifies that x, y F.r h + r l = x + y x, y F. r l 2 53 r h r h = x + y) r l = x + y r h i.e. iff it makes an exact addition of two floating point numbers such that the components of the doubledouble expansion in result are nonoverlapping and if the most significant one is the floating point number nearest to the sum of the numbers in argument. Definition 2.6 The Mul2 algorithm) Let A be an algorithm taking as arguments two double precision numbers x, y F and returning two double precision floating point numbers r h, r l F. We will call A the Mul2 algorithm iff it verifies that x, y F.r h + r l = x y x, y F. r l 2 53 r h r h = x y) r l = x y r h i.e. iff it makes an exact multiplication of two floating point numbers such that the components of the doubledouble expansion in result are nonoverlapping and if the most significant one is the floating point number nearest to the sum of the numbers in argument. We will pass over the existence proof of such algorithms. Consult [5] on this subject. Let us now give some main lemmas that can be deduced from the definition 2.2 of the ulp function. 3
4 Lemma 2.7 The ulp functions with regard to upper bounds) Let be x h and x l two nonsubnormal floating point numbers. So x l < ulp x h ) x l 2 52 x h Proof Let us suppose that x l < ulp x h ) and that x l > 2 52 x h. So we get the following inequality 2 52 x h < ulp x h ) Without loss of generality, let us suppose now that x h > 0 and that x + h + where x+ h is the successor of x h in the ordered set of floating point numbers. So we know by the definition of nonsubnormal floating point number in double precision that there exists m N and e Z such that x h = 2 e m with 2 52 m < Anyway, one can check that { x + h = 2e m + ) if m + < e otherwise So 2 cases must be treated separately: st case: x + h = 2e m + ) So we get 2 e m + ) 2 e m > e m > 2 52 m In contrast, m 2 52, so we obtain the strict inequality > which contradicts the hypotheses. 2nd case: x + h = 2e In this case, we know that m = We can deduce that 2 e e 2 53 ) > e 2 53 ) > This last inequality is a direct contradiction with the hypotheses. Lemma 2.8 Commutativity of the x + and x operators with unary ) Let be x F a positive floating point number. So, x) + = x +) and x) = x ) Proof Since the set of the floating point numbers is symmetrical around 0, we get x) + = pred x) = succ x) = x +) and x) = succ x) = pred x) = x ) 4
5 Lemma 2.9 x + and x for an integer power of 2) Let be x F a nonsubnormal floating point number such that it exists e Z such that where p 2 is the format s precision. So, Proof If x > 0, we get and If x is negative it suffices to apply lemma 2.8. x = ±2 e 2 p x x = 2 x + x ) x x = 2 e 2 p 2 e 2 p+ ) = 2 e x + x = 2 e 2 p + ) 2 e 2 p = 2 e Lemma 2.0 x + and x for a float different from an integer power of 2) Let be x F a nonsubnormal floating point number such that it does not exist any e Z such that x = ±2 e 2 p where p 2 is the format s precision. So, x x = x + x Proof If x > 0 we know that there exist e Z and m N such that with x = 2 e m 2 p < m < 2 p because x is not exactly an integer power of 2. Further, one checks that x + = 2 e m + ) even if m = 2 p and that because the lower bound given for m is strict. So one gets If x is negative it suffices to apply lemma 2.8. x = 2 e m ) x x = 2 e m 2 e m ) = 2 e = 2 e m + ) 2 e m = x + x Lemma 2. Factorized integer powers of 2 and the operators x + and x ) Let be x F a nonsubnormal floating point number such that 2 x is still not subnormal. So, ) + 2 x = 2 x+ and ) 2 x = 2 x 5
6 Proof Without loss of generality let us suppose that x is positive. Otherwise we easily apply lemma 2.8. So, if x can be written x = 2 e m with m + 2 p+ where p is the precision then Otherwise, ) + 2 x = 2 e m ) + = 2 e m + ) = 2 x+ ) + 2 x = 2 e 2 p+ )) + = 2 e + 2 p = 2 x+ One can check that one obtains a completely analogous result for x. Lemma 2.2 Factor 3 of an integer power of 2 in argument of the x + operator) Let be x F a positive floating point number such that x is not subnormal, x + and 3 x) + are different from +, and that e Z. x = 2 e 2 p where p 3 is the precision of the format F. So the following equation holds 3 x) + + ulp x) = 3 x + Proof We can easily check the following 3 x) + + ulp x) = 3 x) + x + x ) = 3 2 e 2 p ) e 2 p ) + 2 e 2 p = 2 + ) 2 e 2 p ) e 2 p + ) 2 e 2 p = 2 2 e 2 p + 2 ) + 2 2e 2 p + 2 e = 2 e+ 2 p + 2 p )) e = 2 e+ 2 p + 2 p + ) + 2 e = 2 e+ 2 p + 2 p ) + 2 e+ + 2 e = 2 e+ 2 p + 2 p ) e = 3 2 e 2 p e = 3 2 e 2 p + ) = 3 2 e 2 p ) + = 3 x + Lemma 2.3 Monotony of the ulp function) The ulp function is monotonic for nonsubnormal positive floating point numbers and it is monotonic for nonsubnormal negative floating point numbers, i.e. x, y F. denorm < x y ulp x) ulp y) x, y F. x y < denorm ulp x) ulp y) where denorm is the greatest positive subnormal. Proof As a matter of fact it suffices to show that the ulp function is monotonic for nonsubnormal floating point numbers and to apply its definition 2.2 for the negative case. Let us suppose so that we have two floating point numbers x, y F such that denorm < x < y. 6
7 Without loss of generality we suppose that x + + and that y + +. Otherwise we apply definition 2.2 of the ulp function and lemma 2.. So we get ulp y) ulp x) = y + y x + + x It suffices now to show that y + x + y + x 0 We can suppose that we would have x = 2 ex m x y = 2 ey m y with e x, e y Z, 2 p m x, m y < 2 p+. Since y > x, we clearly see that e y, m y ) lex e x, m x ) So four different cases are possible:. x + = 2 ex m x + ) y + = 2 ey m y + ) Hence y + x + y + x = 2 ey m y + ) 2 ex m x + ) 2 ey m y + 2 ex m x = 2 ey 2 ex 0 2. which yields to x + = 2 ex m x + ) y + = 2 ey+ 2 p y + x + y + x = 2 ey+ 2 p 2 ex m x + ) 2 ey 2 p+ ) + 2 ex m x = 2 ey 2 ex 0 3. x + = 2 ex+ 2 p y + = 2 ey m y + ) One checks that y + x + y + x = 2 ey m y + ) 2 ex+ 2 p 2 ey m y + 2 ex 2 p+ ) = 2 ey 2 ex 0 7
8 4. x + = 2 ex+ 2 p y + = 2 ey+ 2 p Thus y + x + y + x = 2 ey+ 2 p 2 ex+ 2 p 2 ey 2 p+ ) + 2 ex 2 p ) = 2 ey 2 ex 0 This finishes the proof. 3 A normal form and renormalization procedures Let us now analyse a renormalization algorithm. We will prove its correctness be a series of lemmas and a final theorem. Let be the following procedure: Algorithm 3. Renormalization) In: a h, a m, a l F verifying the following preconditions: Preconditions: None of the numbers a h, a m, a l is subnormal a h and a m do not overlap in more than 5 bits a m and a l do not overlap in more than 5 bits which means formally: Out: r h, r m, r l F a m 2 2 a h a l 2 2 a m a l 2 4 a h t h, t l ) Add2 a m, a l ) r h, t 2l ) Add2 a h, t h ) r m, r l ) Add2 t 2l, t l ) Consult also [6] on the subject of this algorithm. Let us give now some lemmas on the properties of the values returned by algorithm 3. and on the intermediate ones. Lemma 3.2 Exact sum) For each tripledouble number a h +a m +a l, algorithm 3. returns a tripledouble number r h +r m +r l such that a h + a m + a l = r h + r m + r l Proof This fact is a trivial consequence of the properties of the Add2 algorithm. 8
9 Lemma 3.3 Rounding of the middle component) For each tripledouble number a h +a m +a l, algorithm 3. returns a tripledouble number r h +r m +r l such that r m = r m + r l ) The same way, the intermediate and final value will verify the following properties: t h = a m + a l ) r h = a h + t h ) t l 2 53 t h t 2l 2 53 r h In particular, r m will not be equal to 0 if r l is not equal to 0. Proof This fact is a trivial consequence of the properties of the Add2 algorithm. Lemma 3.4 Upper bounds) For all arguments of algorithm 3., the intermediate and final values t h, t l, t 2l and r m can be bounded upwards as follows: Proof t h 2 a h t l 2 54 a h t 2l 2 52 a h t m 2 5 a h. Upper bound for t h : We have supposed that So we can check that a m 2 2 a h a l 2 4 a h t h a m + a l a h 2 2 a h a h a h 2 a h 2. Upper bound for t l : Using the properties of the Add2 algorithm we can get to know that t l 2 53 t h which yields finally to t l 2 54 a h 3. Upper bound for t 2l : t 2l 2 53 r h 2 53 a h + t h ) 2 53 a h t h a h t h 2 53 a h a h a h a h 2 52 a h 9
10 4. Upper bound for r m : r m t 2l t l t 2l + t l t 2l + t l 2 52 a h a h a h a h 2 5 a h Lemma 3.5 Special case for r h = 0) For all arguments verifying the preconditions of algorithm 3., r h will not be equal to 0 if r m is not equal to 0. Formally: r h = 0 r m = 0 Proof Let us suppose that r h = 0 and that r m 0. So we get because we have already shown that r h = a h + t h ) ) 2 a h = 2 a h t h 2 a h So for r h being equal to 0, a h must be equal to 0. In contrast, this yields to t h = 0 because r h = 0 + t h ) = t h This implies that t l = 0 because of the properties of the Add2 procedure. The same way, we get t 2l = 0. We can deduce from this that 0 r m = 0 + 0) = 0 which is a contradiction. Lemma 3.6 Lower bound for r h ) For all arguments verifying the preconditions of algorithm 3., the final result r h can be bounded in magnitude as follows: r h 2 a h Proof We have that r h = a h t h Clearly, if a h and t h have the same sign, we get r h a h 2 a h Otherwise  a h and t h are now of the opposed sign  we have already seen that t h 2 a h So, in this case, too, we get r h 2 a h 0
11 Corollary 3.7 Additional property on the Add2 procedure) Let be r h and r l two double precision floating point numbers returned by the Add2 procedure. So r l 2 ulp r h) Proof By the definition 2.5 of the Add2 procedure, we have r h + r l = x + y and r h = x + y) and r l = x + y r l. Thus the number r l = x + y) x + y) = x + y) x y) is the absolute error of correctly rounded IEEE 754 addition. It is bounded by 2 ulp r h) which gives us the desired result. Theorem 3.8 Correctness of the renormalization algorithm 3.) For all arguments verifying the preconditions of procedure 3., the values returned r h, r m and r l will not overlap unless they are all equal to 0 and their sum will be exactly the sum of the values in argument a h, a m and a l. Proof The fact that the sum of the values returned is exactly equal to the sum of the values in argument has already been proven by lemma 3.2. Without loss of generality, we will now suppose that neither r h nor r m will be 0 in which case all values returned would be equal to 0 as we have shown it by lemmas 3.5 and 3.3. Using lemma 3.3, we know already that r m and r l do not overlap. Let us show now that r h and r m do not overlap by proving that the following inequality is true There are two different cases to be treated. st case: t 2l = 0 We know that r m 3 4 ulp r h) < ulp r h ) r m = t 2l + t l ) = 0 + t l ) = t l When showing lemma 3.4, we have already proven that Using lemma 3.6, we therefore know that which is the result we wanted to prove. 2nd case: t 2l 0 Still using lemma 3.4, we have shown that t l 2 54 a h r m 2 53 r h t h 2 a h In consequence, when the IEEE 754 [2] addition r h = a h t h is ported out, the rounding will be done at a bit of weight heigher than one ulp t h ) because t 2l is strictly greater than 0 and because a h and t h do not completely overlap. Therefore we can check that t 2l ulp t h ) With the result of lemma 3.4 we already mentioned, we can deduce that t 2l 2 ulp t h) 2 t 2l
12 So one can verify the following upper bound using among others lemma 3.7: r m = t 2l + t l ) ) 3 2 t 2l ) 3 4 ulp r h) = 3 4 ulp r h) One remarks that the last simplification is correct here because ulp is always equal to an integer power of 2 and because the precision of a double is greater than 4 bits. 4 Operators on doubledouble numbers Since we dispose now of a renormalization procedure which is effective and proven, we can now consider the different addition and multiplication operators we need. They will surely work finally on expansions of size 3, but the doubledouble format [5] must be analysed, too, because it is at the base of the tripledouble format. We already mentioned that on definition and analysis of this operators, we need not care such a lot of the overlap in the components of a tripledouble number any more: as long as the overlap does not make us loose a too much of the final accuracy because several bits of the significand are represented twice, overlap is not of an issue for intermediate values. At the end of tripledouble computations, it will be sufficient to apply once the renormalization procedure. In order to measure the consequences of an overlap in the operands on final accuracy and in order to be able to follow the increase of the overlap during computations in tripledouble, we will indicate for each operator which produces a triple double result or which takes a tripledouble operand not only a bound for relative and absolute rounding errors but also a bound for the maximal overlap of the values returned. All this bounds will be parameterised by a variable representing the maximal overlap of the tripledouble arguments. 4. The addition operator Add22 Let us analyse first the following addition procedure: Algorithm 4. Add22) In: two doubledouble numbers, a h + a l and b h + b l Out: a doubledouble number r h + r l Preconditions on the arguments: a l 2 53 a h b l 2 53 b h Algorithm: 2
13 t a h b h if a h b h then else Compare [] concerning algorithm 4.. t 2 a h t t 3 t 2 b h t 4 t 3 b l t 5 t 4 a l t 2 b h t t 3 t 2 a h t 4 t 3 a l t 5 t 4 b l end if r h, r l ) Add2 t, t 5 ) Theorem 4.2 Relative error of algorithm 4. Add22 without occurring of cancellation) Let be a h + a l and b h + b l the doubledouble arguments of algorithm 4. Add22. If a h and b h have the same sign, so we know that r h + r l = a h + a l ) + b h + b l )) + ε) where ε is bounded as follows: ε 2 03,5 Proof Since the algorithm Add22 ends by a call to the Add2 procedure, it suffices to show that t + t 5 = a h + a l ) + b h + b l )) + ε) Further, since the two branches of the algorithm are symmetrical, we can suppose that a h b h and consider only one branch without loss of generality. Finally, we remark that the following lines of the Add22 procedure constitute a nonconditional Add2 with arguments a h and b h and the result t + t 3 : Thus, we get with t = a h b h t 2 = a h t t 3 = t 2 b h t 5 = t 4 a l = t 4 + a l ) + ε ) = t 3 + bl) + ε 2 ) + a l ) + ε ) = t 3 + a l + b l + δ δ = t 3 ε 2 + b l ε 2 + t 3 ε + b l ε + t 3 ε 2 ε 2 + b l ε 2 ε 2 + a l ε For giving an upper bound for δ, let us first give an upper bound for t 3, a l and b l as function of a h + b h using the following bounds that we know already: a l 2 53 a h b l 2 53 b h t t 3
14 We get therefore and than t t = 2 53 a h b h 2 53 a h + b h a h + b l a l 2 53 a h 2 53 a h + b h The last bound is verified because we suppose that a h and b h have the same sign. Finally, since a h b h, Thus we get for δ : b l 2 53 b h 2 53 a h 2 53 a h + b h δ a h + b h ) a h + b h ) Let us now give a lower bound for a h + a l + b h + b l as a function of a h + b h in order to be able to give a relative error bound for the procedure Add22. We have that So we can check that Concerning δ, this yields to δ a h + a l + b h + b l One easily checks that a l + b l a l + b l 2 53 a h b h 2 52 a h 2 52 a h + b h a h + a l + b h + b l 2 52) a h + b h ) ) 2 03,5 from which one trivially deduces the affirmation. Theorem 4.3 Relative error of algorithm 4. Add22 with a bounded cancellation) Let be a h + a l and b h + b l the doubledouble arguments of 4. Add22. If a h and b h are of different sign and if one can check that for µ so the returned result will verify where ε is bounded as follows: b h 2 µ a h r h + r l = a h + a l ) + b h + b l )) + ε) ε µ 2 µ
15 Proof Let us reuse the results obtained at the proof 4. and let us start by giving an upper bound for b l as a function of a h : b l 2 53 b h 2 53 µ a h Let us now continue with a lower bound for a h + b h still as a function of a h : We get in consequence and Thus we can check that a h + b h a h 2 µ) a l µ a h + b h b l 2 53 µ 2 µ a h + b h δ a h + b h µ 2 µ Once again, we must give a lower bound for a h + a l + b h + b l with regard to a h + b h : We know that So Thus we get for δ a l + b l a l + b l 2 52 a h µ a h + b h a h + a l + b h + b l a h + b h 2 µ µ δ 2 µ a h + a l + b h + b l 2 µ µ 2 µ = a h + a l + b h + b l µ 2 µ 2 52 So finally the following inequality is verified for the relative error ε: ε µ 2 µ 2 52 We can still give a less exact upper bound for this term by one that does not depend on µ because µ : 2 µ 3 2 µ so ε 2 02 Theorem 4.4 Absolute error of algorithm 4. Add22 general case)) Let be a h + a l and b h + b l the doubledouble arguments of algorithm 4. Add22. The result r h + r l returned by the algorithm verifies where δ is bounded as follows: r h + r l = a h + a l ) + b h + b l ) + δ δ max 2 53 a l + b l, 2 02 a h + a l + b h + b l ) 5
16 Proof Without loss of generality, we can now suppose that 2 a h b h a h and that a h and b h have different signs because for all other cases, the properties we have to show are a direct consequence of theorems 4.2 and 4.3. So we have 2 a h b h 2 a h and So the floating point operation 2 b h a h 2 b h t = a h b h is exact by Sterbenz lemma []. In consequence, t 3 will be equal to 0 because, as we have already mentioned, the operations computing t and t 3 out of a h and b h constitute a Add2 whose properties assure that We can deduce that t 3 = a h + b h t t 4 = t 3 b l = b l and can finally check that with So we get with t 5 = t 4 a l = t 4 + a l ) + ε ) ε 2 53 r h + r l = t + t 5 = a h + a l + b h + b l ) + δ δ 2 53 a l + b l which yields to the bound to be proven δ = max 2 53 a l + b l, 2 02 a h + a l + b h + b l ) Theorem 4.5 Output overlap of algorithm 4. Add22) Let be a h + a l and b h + b l the doubledouble arguments of algorithm 4. Add22. So the values r h and r l returned by the algorithm will not overlap at all and will verify r l 2 53 r h Proof The proof of the affirmed property is trivial because the procedure Add22 sequence Add2 which assures it. ends by a call to 6
17 4.2 The multiplication operator Mul22 Let us now consider the multiplication operator Mul22: Algorithm 4.6 Mul22) In: two doubledouble numbers, a h + a l and b h + b l Out: a doubledouble number r h + r l Preconditions on the arguments: Algorithm: a l 2 53 a h b l 2 53 b h t, t 2 ) Mul2 a h, b h ) t 3 a h b l t 4 a l b h t 5 t 3 t 4 t 6 t 2 t 5 r h, r l ) Add2 t, t 6 ) Compare also to [] concerning algorithm 4.6. Theorem 4.7 Relative error of algorithm 4.6 Mul22) Let be a h + a l and b h + b l the doubledouble arguments of algorithm 4.6 Mul22. So the values returned r h and r l verify r h + r l = a h + a l ) b h + b l )) + ε) where ε is bounded as follows: ε 2 02 Further r h and r l will not overlap at all and verify r l 2 53 r h Proof Since algorithm 4.6 ends by a call to the Add2 procedure, the properties of the latter yield to the fact that r h and r l do not overlap at all and that r l 2 53 r h. In order to give upper bounds for the relative and absolute error of the algorithm, let us express t 6 as a function of t 2, a h, a l, b h and b l joined by the error term δ. We get t 6 = t 2 a h b l a l b h ) = t 2 + a h b l + ε ) + a l b h + ε 2 )) + ε 3 )) + ε 4 ) where ε i 2 53, i =, 2, 3, 4. Simplifying this expression, we van verify that with t 6 = t 2 + a h b l + a l b h + δ δ a l b l + a h b l ε + a l b h ε 2 + a h b l ε 3 + a h b l ε ε 3 + a l b h ε 3 + a l b h ε ε 3 +a h b l ε 4 + a l b h ε 4 + a h b l ε ε 4 + a l b h ε 2 ε 4 + a h b l ε 3 ε 4 +a h b l ε ε 3 ε 4 + a l b h ε 3 ε 4 + a l b h ε 2 ε 3 ε 4 a h b h ) a h b h
18 For checking the given bound, we have supposed the following inequalities: and a l 2 53 a h a l 2 53 a h Let us now give a lower bound for a h + a l ) b h + b l ) as a function of a h b h. For doing so, we give an upper bound for a h b l + a l b h + a l b l. We verify since: a h b l + a l b h + a l b l a h b l + a l b h + a l b l 2 53 a h b h a h b h a h b h 2 5 a h b h This yields to a h + a l ) b h + b l ) a h b h 2 5) 2 a h b h from which we deduce that δ 2 02 a h + a l ) b h + b l ) which gives us as an bound for the relative error r h + r l = a h + a l ) b h + b l ) + ε) with ε Addition operators for tripledouble numbers 5. The addition operator Add33 We are going to consider now the addition operator Add33. We will only analyse a simplified case where the arguments values verify some bounds statically known. Algorithm 5. Add33) In: two tripledouble numbers, a h + a m + a l and b h + b m + b l Out: a tripledouble number r h + r m + r l Preconditions on the arguments: b h 3 4 a h a m 2 αo a h a l 2 αu a m b m 2 βo b h b l 2 βu b m α o 4 α u β o 4 β u Algorithm: 8
19 r h, t ) Add2 a h, b h ) t 2, t 3 ) Add2 a m, b m ) t 7, t 4 ) Add2 t, t 2 ) t 6 a l b l t 5 t 3 t 4 t 8 t 5 t 6 r m, r l ) Add2 t 7, t 8 ) Theorem 5.2 Relative error of algorithm 5. Add33) Let be a h +a m +a l and b h +b m +b l the tripledouble arguments of algorithm 5. Add33 verifying the given preconditions. So the following egality will hold for the returned values r h, r m and r l where ε is bounded by: r h + r m + r l = a h + a m + a l ) + b h + b m + b l )) + ε) ε 2 minαo+αu,βo+βu) minαo,βo) 98 The returned values r m and r l will not overlap at all and the overlap of r h and r m will be bounded by the following expression: r m 2 minαo,βo)+5 r h Proof The procedure 5. ends by a call to the Add2 sequence. One can trivially deduce that r m and r l do not overlap at all and verify r l 2 53 r m Further, it suffices that the bounds given at theorem 5.2 hold for t 7 and t 8 because the last addition computing r m and r l will be exact. The same way, one can deduce the following inequalities out of the properties of the Add2 procedure. They will become useful during this proof. t 2 53 r h t t 2 t t 7 Let us start the proof by giving bounds for the magnitude of r h with regard to a h : We have on the one hand and on the other r h = a h + b h ) = a h + b h ) a h + b h ) a h + 3 ) 4 a h 2 a h ) = 2 a h r h = a h + b h ) ) 4 a h = 4 a h 9
20 So we know that 4 a h r h 2 a h. It is now possible to give the following upper bounds for t, t 2, t 3, t 7, t 4, t 6 and t 6 : t 2 53 r h a h = 2 5 a h t 2 a m + b m ) a m + b m ) 2 αo a h + 2 βo b h ) 2 αo a h + 2 βo 3 ) 4 a h ) 2 minαo,βo)+ a h = 2 minαo,βo)+ a h t t minαo,βo)+ a h = 2 minαo,βo) 52 a h t 7 t + t 2 ) t + t 2 ) ) 2 5 a h + 2 minαo,βo)+ a h ) 2 minαo,βo)+2 a h = 2 minαo,βo)+2 a h t t minαo,βo)+2 a h = 2 minαo,βo) 5 a h and finally t 6 a l + b l ) 2 αo 2 αu a h + 2 βo 2 βu 3 ) 4 a h ) 2 minαo+αu,βo+βu)+ a h = 2 minαo+αu,βo+βu)+ a h t 5 t 3 + t 4 ) ) 2 minαo,βo) 52 a h + 2 minαo,βo) 5 a h ) 2 minαo,βo) 50 a h = 2 minαo,βo) 50 a h 20
21 Using the fact that the addition Add2 is exact, it is easy to show that we have exactly r h + t 7 + t 3 + t 4 = a h + a m + b h + b m Further, we can check t 8 = t 3 2 t 4 ) a l 3 b l ) = t 3 + t 4 + a l + b l + δ with δ t 3 ε 3 + t 4 ε 2 + a l ε 3 + b l ε 3 + t 3 ε + t 4 ε + t 3 ε ε 2 + t 4 ε ε 2 + a l ε + b l ε 2 + a l ε ε 3 + b l ε ε 3 where for i {, 2, 3}, ε i is the relative error bound of the floating point addition i and verifies So we get immediately ε i 2 53 r h + r m + r l = r h + t 7 + t 8 = a h + a m + a l ) + b h + b m + b l ) + δ Let us now express a h + a m + a l ) + b h + b m + b l ) as a function of a h : and, the same way round, which allows for noting a h + a m + a l a h + a m + a l a h + 2 αo a h + 2 αo αu a h 2 a h b h + b m + b l 2 b h 3 2 a h a h + a m + a l ) + b h + b m + b l ) 2 2 a h In order to give a lower bound for this term, let us prove an upper bound for b h + a m + b m + a l + b l as follows So we get b h + a m + b m + a l + b l b h + a m + b m + a l + b l 3 4 a h + 2 αo a h + 2 βo 3 4 a h + 2 αo αu a h +2 βo βu 3 4 a h 7 8 a h a h + a m + a l ) + b h + b m + b l ) 8 a h Using this bounds, we can give upper bounds for the absolute error δ first as a function of a h and than as a function of a h + a m + a l ) + b h + b m + b l ) for deducing finally a bound for the relative error. So we get δ t 3 ε 3 + t 4 ε 2 + a l ε 3 + b l ε 3 + t 3 ε + t 4 ε + t 3 ε ε 2 + t 4 ε ε 2 + a l ε + b l ε 2 + a l ε ε 3 + b l ε ε 3 a h ε 2
22 with This yields to with ε minαo,βo) minαo,βo) αo αu βo βu minαo,βo) minαo,βo) minαo,βo) minαo,βo) αo αu βo βu αo αu βo βu 2 minαo,βo) minαo+αu,βo+βu) 50 r h + r m + r l = a h + a m + a l ) + b h + b m + b l )) + ε) ε 2 minαo,βo) minαo+αu,βo+βu) 47 In order to finish the prove, it suffices now to give an upper bound for the maximal overlap between r h and r m because we have already shown that r m and r l do not overlap at all. So we can check r 8 t 5 + t 6 ) ) 2 minαo,βo) 50 a h + 2 minαo+αu,βo+βu)+ a h ) 2 minαo,βo) 48 r h + 2 minαo+αu,βo+βu)+3 r h and continue by giving the following upper bound r m = t 7 + t 8 ) t 7 + t 8 ) 2 minαo,βo)+4 r h + r h )) 2 minαo,βo) 48 r h + 2 minαo+αu,βo+βu)+3 r h 2 minαo,βu) minαo,βo) minα+αu,βo+βu) minαo,βo) minαo+αu,βo+βu) 50)) 2 minαo,βo)+5 r h This is the maximal overlap bound we were looking for; the proof is therefore finished. Theorem 5.3 Special case of algorithm 5. Add33) Let be a h + a m + a l and b h + b m + b l the tripledouble arguments of algorithm 5. Add33 that a h = a m = a l = 0 So the values r h, r m and r l returned will be exactly equal to such r h + r m + r l = b h + b m + b l The values r m and r l will not overlap at all. The overlap of r h and r m must still be evaluated. 22
23 Proof We will suppose that the Add2 procedure is exact for a h = a m = a l = 0 if even we are using its unconditional version. Under this hypothesis, we get thus: r h = 0 + b h ) = b h t = 0 + b h b h = 0 t 2 = b m t 3 = 0 t 7 = 0 + b m ) = b m t 4 = 0 t 6 = 0 b l = b l t 5 = 0 0 = 0 t 8 = 0 b l = b l r m + r l = b m + b l In consequence, the following holds for the values returned: r h + r m + r l = b h + b m + b l Clearly r m and r l do not overlap because the Add2 line assures this property. procedure the algorithm calls at its last 5.2 The addition operator Add233 Let us consider now the addition operator Add233. We will only analyse a simplified case where the arguments of the algorithm verify statically known bounds. Algorithm 5.4 Add233) In: a doubledouble number a h + a l and a tripledouble number b h + b m + b l Out: a tripledouble number r h + r m + r l Preconditions on the arguments: Algorithm: b h 2 2 a h a l 2 53 a h b m 2 βo b h b l 2 βu b m r h, t ) Add2 a h, b h ) t 2, t 3 ) Add2 a l, b m ) t 4, t 5 ) Add2 t, t 2 ) t 6 t 3 b l t 7 t 6 t 5 r m, r l ) Add2 t 4, t 7 ) Theorem 5.5 Relative error of algorithm 5.4 Add233) Let be a h + a l and b h + b m + b l the values taken in argument of algorithm 5.4 Add233. Let the preconditions hold for this values. So the following holds for the values returned by the algorithm r h, r m and r l r h + r m + r l = a h + a m + a l ) + b h + b m + b l )) + ε) 23
24 where ε is bounded by ε 2 βo βu βo The values r m and r l will not overlap at all and the overlap of r h and r m will be bounded by: r m 2 γ r h with γ min 45, β o 4, β o + β u 2) Proof We know using the properties of the Add2 procedure that r h + t = a h + b h t 2 + t 3 = a l + b m t 4 + t 5 = t + t 2 r m + r l = t 4 + t 7 Supposing that we dispose already of a term of the following form t 7 = t 5 + t 3 + b l + δ with a bounded δ, we can note that r h + r m + r l = a h + a l ) + b h + b m + b l ) + δ Let us now express t 7 by t 5, t 3 and b l : with ε 2 53 and ε We get in consequence t 7 = t 5 t 6 = t 5 t 3 b l ) = t 5 + t 3 + b l ) + ε )) + ε 2 ) t 7 = t 5 + t 3 + b l + t 3 ε + b l ε + t 5 ε 2 + t 3 ε 2 + b l ε 2 + t 3 ε ε 2 + b l ε ε 2 and we can verify that the following upper bound holds for the absolute error δ: δ = t 3 ε + b l ε + t 5 ε 2 + t 3 ε 2 + b l ε 2 + t 3 ε ε 2 + b l ε ε t b l t b l t b l 2 52 t b l t 5 Let us get now some bounds for t 3, b l and t 5, all as a function of a h : b l 2 βo βu b h 2 βo βu 2 a h which can be obtained using the preconditions hypotheses. Further t t 2 = 2 53 a l + b m ) 2 52 a l + b m 2 52 a l b m 2 05 a h + 2 βo 52 b h 2 05 a h + 2 βo 54 a h 24
25 and finally t t 4 = 2 53 t + t 2 ) 2 52 t + t t t r h a l + b m ) 2 05 a h + b h ) a l + b m 2 04 a h + b h a l b m 2 04 a h a h a h + 2 βo 53 a h a h βo 53) So we have δ a h βo βo βu βo 06) a h 2 βo βu βo ) Let us now give a lower bound for a h + a l ) + b h + b m + b l ) as a function of a h by getting out an upper bound for a l + b h + b m + b l as such a function: a l + b h + b m + b l a l + b h + b m + b l a h βo βo βu 2) Since β o, β u we can check that a l + b h + b m + b l 2 a h In consequence a h + a l + b h + b m + b l ) 2 a h Using this lower bound, we can finally give an upper bound for the relative error ε of the considered procedure: r h + r m + r l = a h + a l ) + b h + b m + b l )) + ε) with ε 2 βo βu βo Last but not least, let us now analyse the additional overlaps generated by the procedure. It is clear that r m and r l do not overlap at all because they are computed by the Add2 procedure. Let us merely examine now the overlap of r h and r m. We begin by giving a lower bound for r h as a function of a h : r h = a h + b h ) a h + b h ) ) 3 4 a h ) 2 a h = 2 a h Let us then find an upper bound for r m using also here a term which is a function of a h : r m = r m + r l ) 25
26 2 r m + r l = 2 t 4 + t 7 2 t t 5 + t 3 + b l + δ 2 t t t b l + 2 δ 2 t 4 + a h βo 52) + a h βo 53) + a h 2 βo βu + a h 2 βo βu βo ) By bounding finally still t 4 by a term that is function of a h we obtain We finally check that we have t 4 = t + t 2 ) 2 t + 2 t r h + 2 a l + b m ) 2 5 a h + b h + 4 a l + b m a h 2 βo ) 2 48 r h a h +2 βo βo βo βo βu +2 βo βu βo ) from which we can deduce the following bound a h βo βo βu) r m r h βo βo βu+) r m 2 γ r h with This finishes the proof. γ min 45, β o 4, β o + β u 2) 6 Tripledouble multiplication operators 6. The multiplication procedure Mul23 Let us go on with an analysis of the multiplication procedure Mul23. Algorithm 6. Mul23) In: two doubledouble numbers a h + a l and b h + b l 26
27 Out: a tripledouble number r h + r m + r l Preconditions on the arguments: a l 2 53 a h b l 2 53 b h Algorithm: r h, t ) Mul2 a h, b h ) t 2, t 3 ) Mul2 a h, b l ) t 4, t 5 ) Mul2 a l, b h ) t 6 a l b l t 7, t 8 ) Add22 t 2, t 3, t 4, t 5 ) t 9, t 0 ) Add2 t, t 6 ) r m, r l ) Add22 t 7, t 8, t 9, t 0 ) Theorem 6.2 Relative error of algorithm 6. Mul23) Let be a h + a l and b h + b l the values taken by arguments of algorithm 6. Mul23 So the following holds for the values returned r h, r m and r l : where ε is bounded as follows: r h + r m + r l = a h + a l ) b h + b l )) + ε) ε 2 49 The values returned r m and r l will not overlap at all and the overlap of r h and r m will be bounded as follows: r m 2 48 r h Proof Since algorithm 6. is relatively long, we will proceed by analysing subsequences. consider first the following sequence: t 2, t 3 ) Mul2 a h, b l ) t 4, t 5 ) Mul2 a l, b h ) t 7, t 8 ) Add22 t 2, t 3, t 4, t 5 ) So let us Clearly t 7 and t 8 will not overlap. The same way t 2 and t 3 and t 4 and t 5 will not overlap and we know that we have exactly the following egalities Further we can check that t 2 + t 3 = a h b l t 4 + t 5 = b h a l t a h b l ) 2 52 a h b l and similarly So we have on the one side t b h a l 2 53 t 3 + t t t a h b l b h a l 27
28 and on the other 2 02 t 2 + t 3 + t 4 + t b h a l + a h b l Using theorem 4.4 it is possible to note with 2 02 b h a l a h b l t 7 + t 8 = a h b l + a l b h + δ δ 2 02 a h b l a l b h Let us now consider the following subsequence of algorithm 6.: r h, t ) Mul2 a h, b h ) t 6 a l b l t 9, t 0 ) Add2 t, t 6 ) Trivially t 9 and t 0 do not overlap. Additionally, one sees that we have exactly r h + t = a h b h and, exactly too, So using where ε 2 53 we get t 9 + t 0 = t + t 6 t 6 = a l b l = a l b l + ε) with r h + t 9 + t 0 = r h + t + t 6 Let us now bound t 9 with regard to a h b h : We have t 9 t + t 6 ) = a h b h + t 6 = a h b h + a l b l + δ 2 δ a l b l t + a l b l )) t a h b h )) 2 53 a h b h a h b h ) 2 5 a h b h With inequalities given, we can bound now the absolute and relative error of algorithm Mul We know already that t 7 + t 8 = a h b l + a l b h + δ where and where δ 2 02 a h b l b h a l r h + t 9 + t 0 = a h b h + a l b l + δ 2 δ a l b l 28
29 One remarks that t t 7 t t 9 and easily checks that and that 2 53 t 0 + t t t t 9 + t 0 + t 7 + t t t 7 So by means of the theorem 4.4, we obtain that r m + r l = t 9 + t 0 + t 7 + t 8 + δ 3 where So finally we get δ t t 7 r h + r m + r l = a h b h + a h b l + a l b h + a l b l + δ where δ = δ + δ 2 + δ 3 And for t 7 we obtain the following inequalities t 7 t 7 + t 8 ) δ + δ 2 + δ a l b h a h b l a l b l a h b h +2 0 t 7 2 t 7 + t 8 2 a h b l + a l b h a l b h a h b l ) 8 a h b l In consequence we can check δ 2 50 a h b h Let us give now an upper bound for a h b l + a l b h + a l b l as a function of a h b h : We have from which we deduce that a h b l + a l b h + a l b l a h b l + a l b h + a l b l 2 5 a h b h a h b h + a h b l + a l b h + a l b l ) a h b h 2 5) 2 a h b h Thus δ 2 49 a h b h + a h b l + a l b h + a l b l 29
30 So we can finally give an upper bound for the relative error ε of the multiplication procedure Mul23 defined by algorithm 6.: r h + r m + r l = a h + a l ) b h + b l ) + ε) with ε 2 49 Before concluding, we must still analyse the overlap of the different components of the tripledouble number returned by the algorithm. It is clear that r m and r l do not overlap because the Add22 brick ensures this. Let us now consider the magnitude of r m with regard to the one of r h. We give first a lower bound for r h : and then an upper bound for r m : r m r m + r l ) t 7 + t 8 + t 9 + t 0 + δ 3 ) r h = a h b h ) a h b h ) 2 a h b h a h b l + a l b h + δ + t 9 + t 0 + δ 3 ) a h b h )) 2 49 a h b h From this we can deduce the final bound r m 2 48 r h 6.2 The multiplication procedure Mul233 Let us concentrate now on the multiplication sequence Mul233. Algorithm 6.3 Mul233) In: a doubledouble number a h + a l and a tripledouble number b h + b m + b l Out: a tripledouble number r h + r m + r l Preconditions on the arguments: with Algorithm: a l 2 53 a h b m 2 βo b h b l 2 βu b m β o 2 β u 30
31 r h, t ) Mul2 a h, b h ) t 2, t 3 ) Mul2 a h, b m ) t 4, t 5 ) Mul2 a h, b l ) t 6, t 7 ) Mul2 a l, b h ) t 8, t 9 ) Mul2 a l, b m ) t 0 a l b l t, t 2 ) Add22 t 2, t 3, t 4, t 5 ) t 3, t 4 ) Add22 t 6, t 7, t 8, t 9 ) t 5, t 6 ) Add22 t, t 2, t 3, t 4 ) t 7, t 8 ) Add2 t, t 0 ) r m, r l ) Add22 t 7, t 8, t 5, t 6 ) Theorem 6.4 Relative error of algorithm 6.3 Mul233) Let be a h + a l and b h + b m + b l the values in argument of algorithm 6.3 Mul233 given preconditions hold. So the following will hold for the values r h, r m and r l returned such that the where ε is bounded as follows: r h + r m + r l = a h + a l ) b h + b m + b l )) + ε) ε 2 99 βo βo βu βo+ 2 βo βu βo βo βu The values r m and r l will not overlap at all and the following bound will be verified for the overlap of r h and r m : r m 2 γ r h where γ min 48, β o 4, β o + β u 4) Proof During this proof we will once again proceed by basic bricks that we will assemble in the end. Let us therefore start by the following one: Since we have the exact egalities and t 2, t 3 ) Mul2 a h, b m ) t 4, t 5 ) Mul2 a h, b l ) t, t 2 ) Add22 t 2, t 3, t 4, t 5 ) t 2 + t 3 = a h b m t 4 + t 5 = a h b l and since we know that t 2 and t 3 and t 4 and 5 do not overlap, it suffices to apply the bound proven at theorem 4.4. So we can check on the one hand and on the other 2 53 t 3 + t t t t t a h b m a h b l 2 05 βo a h b m βo βu a h b l 2 02 t 2 + t 3 + t 4 + t 5 = 2 02 a h b m + a h b l 2 02 a h b m a h b l 2 02 βo a h b h βo βu a h b l 3
32 In consequence, using the mentioned theorem, we obtain with t + t 2 = a h b m + a h b l + δ δ 2 02 βo a h b h βo βu a h b l Let us continue with the following part of the algorithm: We have and So we get with t 6, t 7 ) Mul2 a l, b h ) t 8, t 9 ) Mul2 a l, b m ) t 3, t 4 ) Add22 t 6, t 7, t 8, t 9 ) 2 53 t 7 + t t t t t a l b h a l b m 2 58 a h b h βo a h b h 2 02 t 6 + t 7 + t 8 + t 9 = 2 02 a l b h + a l b m 2 02 a l b h a l b m 2 55 a h b h βo a h b h t 3 + t 4 = a l b h + a l b m + δ 2 δ a h b h βo a h b h Let us now consider the brick that produces t 5 and t 6 out of the values in argument. By the properties of the Add22 procedure, t and t 2 and t 3 and t 4 do not overlap at all and verify thus the preconditions of the next Add22 brick that will compute t 5 and t 6. So it suffices to apply once again the absolute error bound of this procedure for obtaining with δ 3 which remains to be estimated. So we have on the one hand t 5 + t 6 = t + t 2 + t 3 + t 4 + δ t 2 + t t t 4 which is an upper bound that can still be estimated by t = t + t 2 ) t + t 2 ) ) 2 t + t 2 2 a h b m + a h b l + δ 2 06 t t 3 2 a h b m + a h b l + δ ) 2 2 βo a h b h + 2 βo βu a h b h + 2 βo 02 a h b h + 2 βo βu 02 a h b h ) a h b h 2 βo βo βu+2) 32
33 which means, using also the following inequalities that t 3 = t 3 + t 4 ) 2 t 3 + t 4 2 a l b h + a l b m + δ 2 2 a l b h + a l b m + δ 2 ) a h b h βo a h b h a h b h βo a h b h ) 2 50 a h b h we can finally check that we have on the one side And on the other 2 53 t 2 + t 4 a h b h 2 βo βo βu ) 2 02 t + t 2 + t 3 + t a h b m + a h b l + a l b h + a l b m + δ + δ a h b h 2 β o So we know that with With this result we can note now with +2 βo βu βo βo βo βu βo 55) a h b h 2 βo βo βu ) t 5 + t 6 = t + t 2 + t 3 + t 4 + δ 3 δ 3 a h b h 2 βo βo βu ) t 5 + t 6 = a h b m + a h b l + a l b h + a l b m + δ 4 δ 4 a h b h 2 β o βo βu βo βo 0 +2 βo βu 0) a h b h 2 βo βo βu ) Let us give now an upper bound for δ 5 defined by the following expression: r m + r l = t + a l b l + t 5 + t 6 + δ 5 33
34 It is clear that t 7 and t 8 do not overlap. In contrast the Add2 operation which adds t to t 0 is necessary because t and t 0 can overlap and even overtake each other: and t 2 06 a h b h t = 0 t 0 2 βo βu 52 a h b h The same argument tells us that the Add2 must be conditional. So we have t 7 + t 8 = t + t 0 and with t 0 = a l b l + δ δ 2 06 βo βu a h b h Let us apply once again the bound for the absolute error of the Add22 procedure: So we have on the one hand We can estimate this by and by t 5 = t 5 + t 6 ) 2 t 5 + t t 8 + t t t 8 t 7 t + t 0 ) 2 t + t 0 2 t + 2 t t t r h + 2 a l b l ) 2 52 a h b h ) a l b l 2 5 a h b h βo βu a h b h 2 a h b m + a h b l + a l b h + a l b m + δ 4 a h b h 2 βo+ + 2 βo βu βo βo βo βu ) a h b h 2 βo βo βu ) So finally, we have on the one hand 2 53 t 8 + t 6 a h b h βo βu βo βo βu ) And on the other a h b h 2 βo βo βu ) 2 02 t 7 + t 8 + t 5 + t t + a l b l + δ + a h b m + a h b l + a l b h +a l b m + δ r h βo βu a h b h +2 βo a h b h +2 βo βu a h b h 34
35 +2 53 a h b h which means that we finally obtain the following βo a h b h βo βu a h b h + a h b h 2 00 βo βo βu )) a h b h 2 0 βo βo βu ) with where Thus we can check that r m + r l = t + a l b l + a h b m + a h b l + a l b h + a l b m + δ 6 δ 6 δ 4 + δ 5 δ 5 a h b h 2 0 βo βo βu ) δ 6 a h b h 2 00 βo βo βu βo βo βu ) a h b h 2 99 βo βo βu ) Let us now integrate the different intermediate results: Since we know that the following egality is exact we can check that r h + t = a h b h r h + r m + r l = a h + a l ) b h + b m + b l ) + δ 6 We continue by giving a lower bound for a h + a l ) b h + b m + b l ) using a term which is a function of a h b h. We do so for being able to give a relative error bound. We first bound by such a term. We have a h b m + a h b l + a l b h + a l b m + a l b l a h b m + a h b l + a l b h + a l b m + a l b l a h b m + a h b l + a l b h + a l b m + a l b l a h b h 2 βo + 2 βo βu βo βo 53) and we get 2 βo+ a h b h + 2 βo βu+ a h b h a h b h a h + a l ) b h + b m + b l ) a h b h βo+ 2 βo βu+) from which we deduce since β o 2, β u ) a h b h βo+ 2 βo βu+ a h + a l ) b h + b m + b l ) Using this inequality we can finally give a bound for the relative error ε as follows: r h + r m + r l = a h + a l ) b h + b m + b l ) + ε) 35
36 with ε 2 99 βo βo βu βo+ 2 βo βu+ Let us recall that for this inequality, β o 2, β u must hold which is the case. It is certainly possible to estimate ε by a term which is slightly less exact: because for β o 2, β u. ε 2 97 βo βo βu βo+ 2 βo βu+ 4 In order to finish this proof, we must still give an upper bound for the maximal overlap generated by the algorithm 6.3 Mul233. Clearly r m and r l do not overlap because of the properties of the basic brick Add22. Let us give an upper bound for the overlap between r h and r m giving a term of the following form: r m 2 γ r h where we constate a lower bound for γ using a term in β o and β u. Let us start by giving a lower bound for r h as a function of a h b h. We have r h = a h b h ) 2 a h b h Then, let us give an upper bound for r m using a function of a h b h : This implies that r m r m + r l ) 2 r m + r l 2 t + a l b l + a h b m + a h b l + a l b h + a l b m + δ 6 2 a h b h βo βu βo + 2 βo βu βo βo βo βu ) a h b h βo βo βu+2) r m 2 r h βo βo βu+2) r h βo βo βu+3) From which we can deduce with r m 2 γ r h γ min 48, β o 4, β o β u 4) This result finishes the proof. 36
2.3 Scheduling jobs on identical parallel machines
2.3 Scheduling jobs on identical parallel machines There are jobs to be processed, and there are identical machines (running in parallel) to which each job may be assigned Each job = 1,,, must be processed
More informationCHAPTER 5 Roundoff errors
CHAPTER 5 Roundoff errors In the two previous chapters we have seen how numbers can be represented in the binary numeral system and how this is the basis for representing numbers in computers. Since any
More informationBinary Number System. 16. Binary Numbers. Base 10 digits: 0 1 2 3 4 5 6 7 8 9. Base 2 digits: 0 1
Binary Number System 1 Base 10 digits: 0 1 2 3 4 5 6 7 8 9 Base 2 digits: 0 1 Recall that in base 10, the digits of a number are just coefficients of powers of the base (10): 417 = 4 * 10 2 + 1 * 10 1
More information3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
More information1. Give the 16 bit signed (twos complement) representation of the following decimal numbers, and convert to hexadecimal:
Exercises 1  number representations Questions 1. Give the 16 bit signed (twos complement) representation of the following decimal numbers, and convert to hexadecimal: (a) 3012 (b)  435 2. For each of
More informationCOMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
More informationCS 103X: Discrete Structures Homework Assignment 3 Solutions
CS 103X: Discrete Structures Homework Assignment 3 s Exercise 1 (20 points). On wellordering and induction: (a) Prove the induction principle from the wellordering principle. (b) Prove the wellordering
More informationThe last three chapters introduced three major proof techniques: direct,
CHAPTER 7 Proving NonConditional Statements The last three chapters introduced three major proof techniques: direct, contrapositive and contradiction. These three techniques are used to prove statements
More information> 2. Error and Computer Arithmetic
> 2. Error and Computer Arithmetic Numerical analysis is concerned with how to solve a problem numerically, i.e., how to develop a sequence of numerical calculations to get a satisfactory answer. Part
More informationReal Roots of Univariate Polynomials with Real Coefficients
Real Roots of Univariate Polynomials with Real Coefficients mostly written by Christina Hewitt March 22, 2012 1 Introduction Polynomial equations are used throughout mathematics. When solving polynomials
More information8 Divisibility and prime numbers
8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express
More informationHOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
More information2. Methods of Proof Types of Proofs. Suppose we wish to prove an implication p q. Here are some strategies we have available to try.
2. METHODS OF PROOF 69 2. Methods of Proof 2.1. Types of Proofs. Suppose we wish to prove an implication p q. Here are some strategies we have available to try. Trivial Proof: If we know q is true then
More informationLecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
More informationInduction. Margaret M. Fleck. 10 October These notes cover mathematical induction and recursive definition
Induction Margaret M. Fleck 10 October 011 These notes cover mathematical induction and recursive definition 1 Introduction to induction At the start of the term, we saw the following formula for computing
More informationChapter 3. Cartesian Products and Relations. 3.1 Cartesian Products
Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationSome Notes on Taylor Polynomials and Taylor Series
Some Notes on Taylor Polynomials and Taylor Series Mark MacLean October 3, 27 UBC s courses MATH /8 and MATH introduce students to the ideas of Taylor polynomials and Taylor series in a fairly limited
More informationMATH10212 Linear Algebra. Systems of Linear Equations. Definition. An ndimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0534405967. Systems of Linear Equations Definition. An ndimensional vector is a row or a column
More informationMathematical Induction
Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,
More information8.1 Makespan Scheduling
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Dynamic Programing: MinMakespan and Bin Packing Date: 2/19/15 Scribe: Gabriel Kaptchuk 8.1 Makespan Scheduling Consider an instance
More informationMATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
More informationThe MarketClearing Model
Chapter 5 The MarketClearing Model Most of the models that we use in this book build on two common assumptions. First, we assume that there exist markets for all goods present in the economy, and that
More informationCHAPTER 3 Numbers and Numeral Systems
CHAPTER 3 Numbers and Numeral Systems Numbers play an important role in almost all areas of mathematics, not least in calculus. Virtually all calculus books contain a thorough description of the natural,
More informationSection 4.2: The Division Algorithm and Greatest Common Divisors
Section 4.2: The Division Algorithm and Greatest Common Divisors The Division Algorithm The Division Algorithm is merely long division restated as an equation. For example, the division 29 r. 20 32 948
More informationLecture 3: Linear Programming Relaxations and Rounding
Lecture 3: Linear Programming Relaxations and Rounding 1 Approximation Algorithms and Linear Relaxations For the time being, suppose we have a minimization problem. Many times, the problem at hand can
More informationPage 331, 38.4 Suppose a is a positive integer and p is a prime. Prove that p a if and only if the prime factorization of a contains p.
Page 331, 38.2 Assignment #11 Solutions Factor the following positive integers into primes. a. 25 = 5 2. b. 4200 = 2 3 3 5 2 7. c. 10 10 = 2 10 5 10. d. 19 = 19. e. 1 = 1. Page 331, 38.4 Suppose a is a
More informationTAKEAWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION
TAKEAWAY GAMES ALLEN J. SCHWENK California Institute of Technology, Pasadena, California L INTRODUCTION Several games of Tf takeaway?f have become popular. The purpose of this paper is to determine the
More informationCONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12
CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.
More informationA Problem With The Rational Numbers
Solvability of Equations Solvability of Equations 1. In fields, linear equations ax + b = 0 are solvable. Solvability of Equations 1. In fields, linear equations ax + b = 0 are solvable. 2. Quadratic equations
More informationContinued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
More information3 Does the Simplex Algorithm Work?
Does the Simplex Algorithm Work? In this section we carefully examine the simplex algorithm introduced in the previous chapter. Our goal is to either prove that it works, or to determine those circumstances
More informationDiscrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 11
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note Conditional Probability A pharmaceutical company is marketing a new test for a certain medical condition. According
More informationAnswers to some of the exercises.
Answers to some of the exercises. Chapter 2. Ex.2.1 (a) There are several ways to do this. Here is one possibility. The idea is to apply the kcenter algorithm first to D and then for each center in D
More informationExample 1. Consider the following two portfolios: 2. Buy one c(s(t), 20, τ, r) and sell one c(s(t), 10, τ, r).
Chapter 4 PutCall Parity 1 Bull and Bear Financial analysts use words such as bull and bear to describe the trend in stock markets. Generally speaking, a bull market is characterized by rising prices.
More informationReadings. D Chapter 1. Lecture 2: Constrained Optimization. Cecilia Fieler. Example: Input Demand Functions. Consumer Problem
Economics 245 January 17, 2012 : Example Readings D Chapter 1 : Example The FOCs are max p ( x 1 + x 2 ) w 1 x 1 w 2 x 2. x 1,x 2 0 p 2 x i w i = 0 for i = 1, 2. These are two equations in two unknowns,
More informationPartial Fractions. Combining fractions over a common denominator is a familiar operation from algebra:
Partial Fractions Combining fractions over a common denominator is a familiar operation from algebra: From the standpoint of integration, the left side of Equation 1 would be much easier to work with than
More informationTiers, Preference Similarity, and the Limits on Stable Partners
Tiers, Preference Similarity, and the Limits on Stable Partners KANDORI, Michihiro, KOJIMA, Fuhito, and YASUDA, Yosuke February 7, 2010 Preliminary and incomplete. Do not circulate. Abstract We consider
More information6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparisonbased algorithms. Basic computation in general synchronous networks: Leader election
More information1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
More information8 Square matrices continued: Determinants
8 Square matrices continued: Determinants 8. Introduction Determinants give us important information about square matrices, and, as we ll soon see, are essential for the computation of eigenvalues. You
More informationAPPLICATIONS OF THE ORDER FUNCTION
APPLICATIONS OF THE ORDER FUNCTION LECTURE NOTES: MATH 432, CSUSM, SPRING 2009. PROF. WAYNE AITKEN In this lecture we will explore several applications of order functions including formulas for GCDs and
More informationVirtual Time and Timeout in ClientServer Networks
Virtual Time and Timeout in ClientServer Networks Jayadev Misra July 13, 2011 Contents 1 Introduction 2 1.1 Background.............................. 2 1.1.1 Causal Model of Virtual Time...............
More informationThe Mean Value Theorem
The Mean Value Theorem THEOREM (The Extreme Value Theorem): If f is continuous on a closed interval [a, b], then f attains an absolute maximum value f(c) and an absolute minimum value f(d) at some numbers
More informationMath 319 Problem Set #3 Solution 21 February 2002
Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod
More informationPOWER SETS AND RELATIONS
POWER SETS AND RELATIONS L. MARIZZA A. BAILEY 1. The Power Set Now that we have defined sets as best we can, we can consider a sets of sets. If we were to assume nothing, except the existence of the empty
More informationElementary Number Theory We begin with a bit of elementary number theory, which is concerned
CONSTRUCTION OF THE FINITE FIELDS Z p S. R. DOTY Elementary Number Theory We begin with a bit of elementary number theory, which is concerned solely with questions about the set of integers Z = {0, ±1,
More informationMatrix Norms. Tom Lyche. September 28, Centre of Mathematics for Applications, Department of Informatics, University of Oslo
Matrix Norms Tom Lyche Centre of Mathematics for Applications, Department of Informatics, University of Oslo September 28, 2009 Matrix Norms We consider matrix norms on (C m,n, C). All results holds for
More informationSo let us begin our quest to find the holy grail of real analysis.
1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers
More informationThe Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.
The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,
More informationLimit processes are the basis of calculus. For example, the derivative. f f (x + h) f (x)
SEC. 4.1 TAYLOR SERIES AND CALCULATION OF FUNCTIONS 187 Taylor Series 4.1 Taylor Series and Calculation of Functions Limit processes are the basis of calculus. For example, the derivative f f (x + h) f
More informationInformation Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture  17 ShannonFanoElias Coding and Introduction to Arithmetic Coding
More informationSection 3 Sequences and Limits, Continued.
Section 3 Sequences and Limits, Continued. Lemma 3.6 Let {a n } n N be a convergent sequence for which a n 0 for all n N and it α 0. Then there exists N N such that for all n N. α a n 3 α In particular
More informationVector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a nonempty
More informationHomework 5 Solutions
Homework 5 Solutions 4.2: 2: a. 321 = 256 + 64 + 1 = (01000001) 2 b. 1023 = 512 + 256 + 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = (1111111111) 2. Note that this is 1 less than the next power of 2, 1024, which
More informationMA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES
MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2016 47 4. Diophantine Equations A Diophantine Equation is simply an equation in one or more variables for which integer (or sometimes rational) solutions
More informationThis Unit: Floating Point Arithmetic. CIS 371 Computer Organization and Design. Readings. Floating Point (FP) Numbers
This Unit: Floating Point Arithmetic CIS 371 Computer Organization and Design Unit 7: Floating Point App App App System software Mem CPU I/O Formats Precision and range IEEE 754 standard Operations Addition
More informationChapter 11 Number Theory
Chapter 11 Number Theory Number theory is one of the oldest branches of mathematics. For many years people who studied number theory delighted in its pure nature because there were few practical applications
More informationProbability and Statistics
CHAPTER 2: RANDOM VARIABLES AND ASSOCIATED FUNCTIONS 2b  0 Probability and Statistics Kristel Van Steen, PhD 2 Montefiore Institute  Systems and Modeling GIGA  Bioinformatics ULg kristel.vansteen@ulg.ac.be
More information(x + a) n = x n + a Z n [x]. Proof. If n is prime then the map
22. A quick primality test Prime numbers are one of the most basic objects in mathematics and one of the most basic questions is to decide which numbers are prime (a clearly related problem is to find
More informationx a x 2 (1 + x 2 ) n.
Limits and continuity Suppose that we have a function f : R R. Let a R. We say that f(x) tends to the limit l as x tends to a; lim f(x) = l ; x a if, given any real number ɛ > 0, there exists a real number
More information8 Primes and Modular Arithmetic
8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.
More informationCHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs
CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce
More informationSolving Quadratic Equations by Completing the Square
9. Solving Quadratic Equations by Completing the Square 9. OBJECTIVES 1. Solve a quadratic equation by the square root method. Solve a quadratic equation by completing the square. Solve a geometric application
More informationSubsets of Euclidean domains possessing a unique division algorithm
Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness
More informationSolution for Homework 2
Solution for Homework 2 Problem 1 a. What is the minimum number of bits that are required to uniquely represent the characters of English alphabet? (Consider upper case characters alone) The number of
More information26 Integers: Multiplication, Division, and Order
26 Integers: Multiplication, Division, and Order Integer multiplication and division are extensions of whole number multiplication and division. In multiplying and dividing integers, the one new issue
More information7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
More informationRNcoding of Numbers: New Insights and Some Applications
RNcoding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & JeanMichel Muller LIP/Arénaire (CRNSENS LyonINRIAUCBL) Lyon,
More information13 Infinite Sets. 13.1 Injections, Surjections, and Bijections. mcsftl 2010/9/8 0:40 page 379 #385
mcsftl 2010/9/8 0:40 page 379 #385 13 Infinite Sets So you might be wondering how much is there to say about an infinite set other than, well, it has an infinite number of elements. Of course, an infinite
More informationFractional Numbers. Fractional Number Notations. Fixedpoint Notation. Fixedpoint Notation
2 Fractional Numbers Fractional Number Notations 2010  Claudio Fornaro Ver. 1.4 Fractional numbers have the form: xxxxxxxxx.yyyyyyyyy where the x es constitute the integer part of the value and the y
More information1.7 Graphs of Functions
64 Relations and Functions 1.7 Graphs of Functions In Section 1.4 we defined a function as a special type of relation; one in which each xcoordinate was matched with only one ycoordinate. We spent most
More informationNODAL ANALYSIS. Circuits Nodal Analysis 1 M H Miller
NODAL ANALYSIS A branch of an electric circuit is a connection between two points in the circuit. In general a simple wire connection, i.e., a 'shortcircuit', is not considered a branch since it is known
More informationVector Spaces II: Finite Dimensional Linear Algebra 1
John Nachbar September 2, 2014 Vector Spaces II: Finite Dimensional Linear Algebra 1 1 Definitions and Basic Theorems. For basic properties and notation for R N, see the notes Vector Spaces I. Definition
More informationHandout #1: Mathematical Reasoning
Math 101 Rumbos Spring 2010 1 Handout #1: Mathematical Reasoning 1 Propositional Logic A proposition is a mathematical statement that it is either true or false; that is, a statement whose certainty or
More informationk, then n = p2α 1 1 pα k
Powers of Integers An integer n is a perfect square if n = m for some integer m. Taking into account the prime factorization, if m = p α 1 1 pα k k, then n = pα 1 1 p α k k. That is, n is a perfect square
More informationRow Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for inclass presentation
More informationArkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan
Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan 3 Binary Operations We are used to addition and multiplication of real numbers. These operations combine two real numbers
More informationVectors, Gradient, Divergence and Curl.
Vectors, Gradient, Divergence and Curl. 1 Introduction A vector is determined by its length and direction. They are usually denoted with letters with arrows on the top a or in bold letter a. We will use
More informationPUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5.
PUTNAM TRAINING POLYNOMIALS (Last updated: November 17, 2015) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include
More informationTheory of Computation Lecture Notes
Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked
More informationDiscrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us
More informationMath212a1010 Lebesgue measure.
Math212a1010 Lebesgue measure. October 19, 2010 Today s lecture will be devoted to Lebesgue measure, a creation of Henri Lebesgue, in his thesis, one of the most famous theses in the history of mathematics.
More informationDiagonalisation. Chapter 3. Introduction. Eigenvalues and eigenvectors. Reading. Definitions
Chapter 3 Diagonalisation Eigenvalues and eigenvectors, diagonalisation of a matrix, orthogonal diagonalisation fo symmetric matrices Reading As in the previous chapter, there is no specific essential
More informationCorrectly Rounded Floatingpoint BinarytoDecimal and DecimaltoBinary Conversion Routines in Standard ML. By Prashanth Tilleti
Correctly Rounded Floatingpoint BinarytoDecimal and DecimaltoBinary Conversion Routines in Standard ML By Prashanth Tilleti Advisor Dr. Matthew Fluet Department of Computer Science B. Thomas Golisano
More informationDETERMINANTS. b 2. x 2
DETERMINANTS 1 Systems of two equations in two unknowns A system of two equations in two unknowns has the form a 11 x 1 + a 12 x 2 = b 1 a 21 x 1 + a 22 x 2 = b 2 This can be written more concisely in
More informationDirect Algorithms for Checking Coherence and Making Inferences from Conditional Probability Assessments
Direct Algorithms for Checking Coherence and Making Inferences from Conditional Probability Assessments Peter Walley, Renato Pelessoni a and Paolo Vicig a a Dipartimento di Matematica Applicata B. de Finetti,
More informationI. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
More informationMath 120 Final Exam Practice Problems, Form: A
Math 120 Final Exam Practice Problems, Form: A Name: While every attempt was made to be complete in the types of problems given below, we make no guarantees about the completeness of the problems. Specifically,
More informationBasic Proof Techniques
Basic Proof Techniques David Ferry dsf43@truman.edu September 13, 010 1 Four Fundamental Proof Techniques When one wishes to prove the statement P Q there are four fundamental approaches. This document
More informationPYTHAGOREAN TRIPLES PETE L. CLARK
PYTHAGOREAN TRIPLES PETE L. CLARK 1. Parameterization of Pythagorean Triples 1.1. Introduction to Pythagorean triples. By a Pythagorean triple we mean an ordered triple (x, y, z) Z 3 such that x + y =
More informationarxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
More informationThe Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
More informationLecture 13  Basic Number Theory.
Lecture 13  Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are nonnegative integers. We say that A divides B, denoted
More informationTheta Functions. Lukas Lewark. Seminar on Modular Forms, 31. Januar 2007
Theta Functions Lukas Lewark Seminar on Modular Forms, 31. Januar 007 Abstract Theta functions are introduced, associated to lattices or quadratic forms. Their transformation property is proven and the
More informationMATH 289 PROBLEM SET 4: NUMBER THEORY
MATH 289 PROBLEM SET 4: NUMBER THEORY 1. The greatest common divisor If d and n are integers, then we say that d divides n if and only if there exists an integer q such that n = qd. Notice that if d divides
More informationLies My Calculator and Computer Told Me
Lies My Calculator and Computer Told Me 2 LIES MY CALCULATOR AND COMPUTER TOLD ME Lies My Calculator and Computer Told Me See Section.4 for a discussion of graphing calculators and computers with graphing
More information1. LINEAR EQUATIONS. A linear equation in n unknowns x 1, x 2,, x n is an equation of the form
1. LINEAR EQUATIONS A linear equation in n unknowns x 1, x 2,, x n is an equation of the form a 1 x 1 + a 2 x 2 + + a n x n = b, where a 1, a 2,..., a n, b are given real numbers. For example, with x and
More informationFE670 Algorithmic Trading Strategies. Stevens Institute of Technology
FE670 Algorithmic Trading Strategies Lecture 6. Portfolio Optimization: Basic Theory and Practice Steve Yang Stevens Institute of Technology 10/03/2013 Outline 1 MeanVariance Analysis: Overview 2 Classical
More informationFormal Languages and Automata Theory  Regular Expressions and Finite Automata 
Formal Languages and Automata Theory  Regular Expressions and Finite Automata  Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
More information