New algorithms for the exact computation of the sign of algebraic expressions
The paper considers the problem of exact computation of the sign of algebraic expressions of real numbers represented in floating point arithmetic. We describe a new method for the exact computation and suggest some variations to improve the efficiency. The input data for the algorithm is represente...
Saved in:
| Published in | Conference proceedings - Canadian Conference on Electrical and Computer Engineering Vol. 1; pp. 314 - 317 vol.1 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding Journal Article |
| Language | English |
| Published |
IEEE
1996
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9780780331433 0780331435 |
| ISSN | 0840-7789 |
| DOI | 10.1109/CCECE.1996.548100 |
Cover
| Summary: | The paper considers the problem of exact computation of the sign of algebraic expressions of real numbers represented in floating point arithmetic. We describe a new method for the exact computation and suggest some variations to improve the efficiency. The input data for the algorithm is represented by normalized floating point numbers with fixed mantissa length (machine numbers). The algorithm computes the exact value of the sign of the sum of machine numbers and it can be applied to exactly compute the sign of almost any algebraic expression. We suggest several variations of the original Exact Sign of a Sum Algorithm (ESSA) to improve the performance of the algorithm and we test the algorithms on different data sets. This includes the implementation of floating point filters based on interval analysis, a special algorithm for performing multiple bit-wise transformations on the numbers in lists and the application of different rules to reduce the number of iterations of the algorithm. The theoretical upper bound on the complexity of ESSA is O(l/sup 2/), where l is the number of elements of the input. The expected average, experimental complexity of the suggested algorithms is proportional to the length of the input lists and it is close to l/2 in most cases. We perform a comparison analysis among the algorithms. The comparisons are based on the computational efficiency of the algorithms on both well posed and ill posed data sets. The algorithms are verified by the computer implementations. |
|---|---|
| Bibliography: | SourceType-Scholarly Journals-2 ObjectType-Feature-2 ObjectType-Conference Paper-1 content type line 23 SourceType-Conference Papers & Proceedings-1 ObjectType-Article-3 |
| ISBN: | 9780780331433 0780331435 |
| ISSN: | 0840-7789 |
| DOI: | 10.1109/CCECE.1996.548100 |