On-line Algorithms for Computing Exponentials and Logarithms. Asger Munk Nielsen. Dept. of Mathematics and Computer Science
|
|
- Abel Joseph
- 5 years ago
- Views:
Transcription
1 On-line Algorithms for Computing Exponentials and Logarithms Asger Munk Nielsen Dept. of Mathematics and Computer Science Odense University, Denmark Jean-Michel Muller Laboratoire LIP and CNRS Ecole Normale Superieure de Lyon 46 Allee d'italie, Lyon Cedex 07, France Abstract We propose a new on-line algorithm for fast evaluation of logarithms and exponentials. This algorithm is derived from the widely studied Briggs-De Lugish iteration. We examine various compromises between the on-line delay and the size of the required comparison constants. Index terms Computer Arithmetic, Elementary functions, on-line arithmetic, Redundant number systems. Introduction The point at stake in this paper is the design of algorithms that rapidly evaluate exponentials and logarithms. We focus on algorithms that belong to the shift-and-add class. Those algorithm use very simple elementary steps: additions, and shifts (i.e. multiplications by a power of the radix of the number system being used), and they go back to the 7th century: Briggs, a contemporary of Neper, invented an algorithm that made it possible to build the rst tables of logarithms. For instance, to compute ln x in radix- arithmetic, numerous methods (including that of Briggs, adapted to this radix) [3, 6, 4, P Q n 6, 4] consist of nding a sequence d k =?; 0;, such that x ( + d k?k ). n Then ln(x)? ln( + d k?k ). Another method belonging to the shift-and-add class is the CORDIC algorithm, introduced in 959 by J. Volder [8] and then generalized by J. Walther [9, ]. Such algorithms have been implemented in many pocket calculators or math co-processors (such as the Intel 8087 and the following Intel chips until the 486 family). In his Ph.D. dissertation [7], N. Takagi suggests an algorithm for computing logarithms and exponentials that is adapted to the use of redundant number systems (redundant number systems [, ] allow very fast carry-free additions, but they may complicate the comparisons that are required to perform the iterations: this point will be made clearer in what follows). We propose here a variant of that algorithm that allow on-line computation of logarithms and exponentials. On-line arithmetic was introduced by Ercegovac and Trivedi []. In on-line arithmetic, the digits ow through the operators in a digit-serial fashion, most signicant digit rst. This makes it possible to get a high throughput by pipelining the arithmetic operators at a digit-level. On line algorithms
2 have been proposed for the arithmetic operations [, 8, 5, 3] as well as for computing elementary functions [5, 7, 9, 0] Our algorithm is based on the following iteration : En+ = E n? ln( + d n?n ) L n+ = L n ( + d n?n ) () if we Q P n take E = X and L = then () satises, E n+ = X? ln( + d k?k ) and L n+ = n ( + d k?k ). If we are able to nd a sequence of digits d k f?; 0; g such that E n goes to zero, then we will have L n! e X. Thus we have computed the product of the number and the exponential of the number X. This iteration mode will be referred to as mode zero. If we are able to nd a sequence of digits d k f?; 0; g such that L n goes to one, then we will have E n! X + ln( ). Thus we have computed the logarithm of the number added to the number X. This iteration mode will be referred to as mode one. In the next section we will deduce valid procedures for nding sequences of digits d k such that the iteration variables converge towards the desired values, if X and are chosen such that they belong to some predened convergence domain. Selection of Digits and Domain of Convergence. Computing Exponentials In the zero mode the digits d k must be chosen such that the iteration variable E n goes to zero. By plotting E n+ versus E n for all values of d n f?; 0; g, as according to E n+ = E n?ln(+d n?n ), we get a diagram as depicted in [Figure ]. This diagram is similar to the Robertson Diagrams frequently found in studies of division algorithms. If we assume that E = X belongs to some E n+ u n+ d n = - d n = 0 d n = l n u n E n A n B n C n l n+ D n Figure : Robertson diagram for the zero mode (exponentials).
3 interval [l ; u ] and choose the digits d k such that E k+ belongs to some interval [l k+ ; u k+ ], where the sequence of intervals is such that: [l ; u ] [l ; u ] [l n ; u n ]; () where each of these intervals contain zero and lim n! u n? l n = 0, then E n will exhibit the desired convergence towards zero. From [Figure ] we may deduce a proper convergence domain and digit selection procedure for the zero mode. By noting that u n+ = u n?ln(+?n ) and l n+ = l n?ln(??n ), and P P since u n and l n must go to zero as n goes to innity, we deduce that u n = k=n ln(+?k ) and l n = k=n ln(??k ). From [Figure ] we may further deduce a valid selection procedure for the digits d k as: 8 <? if E n B n d k = 0 if A : n E n D n (3) if C n E n Notice that the selection procedure is nondeterministic in the sense that for some values of E n several choices of d n may be valid. The constants A n ; B n ; C n and D n are equal to (again these values are deduceable from the Robertson Diagram): A n = l n+ B n = u n+ + ln(??n ) C n = l n+ + ln( +?n ) D n = u n+ It can be shown that A n < B n < C n < D n for all n. Refer to [Table ] for the 0 rst values and limit of these constants. The convergence domain of the algorithm is given by the requirement that E = X [l ; u ], from which we deduce that?:406::: = l X u = 0:86887:::. n n l n n u n n A n n B n n C n n D n Table : First 0 values and limits of n l n ; n u n ; n A n ; n B n ; n C n and n D n (for zero mode). The relative error is bounded by:??n < k=n (??k )? = e ln? ex? L n e un? = L n k=n ( +?k )? < :8?n (4) 3
4 . Computing Logarithms In the one mode the digits d k must be chosen such that the iteration variable L n goes to one. By plotting n+ = L n+? versus n = L n? for all values of d n f?; 0; g, according to n+ = L n+? = n ( + d n?n ) + d n?n, we get a diagram as depicted in [Figure ]. If λ n+ r n+ s n d n = d n = 0 d n = - r n λ n s n+ F n G n H n I n Figure : Robertson diagram for the one mode (logarithms, n = ). we assume that = L? =? belongs to some interval [s ; r ], and that the digits d k are chosen such that k+ = L k+? belongs to some interval [s k+ ; r k+ ], where these intervals include zero and are contracting in the sense that the width of the interval goes to zero, then L n will converge towards one, as n approaches innity. From [Figure ] we may deduce a proper convergence domain and selection procedure for the one mode. By noting that r n+ = (??n )r n??n and s n+ = ( +?n )s n +?n, and since r n and s n must go to zero as n goes to innity, we deduce that j=n ( +?j )?. From [Figure ] we may r n = P k=n?k Q k j=n (??j )? and s n =? P k=n?k Q k further deduce a selection procedure for the digits d k as: d k = 8 < : if L n? G n 0 if F n L n? I n? if H n L n? (5) to: Again this selection procedure is nondeterministic. The constants F n ; G n ; H n and I n are equal F n = s n+ G n = r n+??n +?n H n = s n+ +?n??n I n = r n+ It can be shown that F n < G n < H n < I n for all n. Refer to [Table ] for the rst 0 values and limit of these constants. The convergence domain of the algorithm is given by the requirement 4
5 n n s n n r n n F n n G n n H n n I n Table : First 0 values and limits of n s n ; n r n ; n F n ; n G n ; n H n and n I n (for one mode). that = L? =? [s ; r ], from which we deduce that 0:494::: = s + u + = 3:467:::. The absolute error is given by:??n ln(s n + ) (X + ln( ))? E n ln(r n + ) r?n < :5?n (6) 3 On-Line Algorithms By denition, an on-line algorithm should be able to deduce the nth digit of the result, based on + n digits of the operands, where the integer is referred to as the on-line delay []. Thus in order to compute the exponential and logarithm of a number, in an on-line manner, we must develop algorithms that compute the desired value based on limited knowledge of the input operands X and. We will devise such an algorithm, and prove that it emulates a run of the nondeterministic algorithms described in the previous section. The algorithm is based on two scaled iteration variables ^E n = n (X n+? P n? ln( + ^d k?k )) and ^L n = n ( n+ Q n? ( + ^d k?k )? m), where m is set to either zero or one, corresponding to the desired mode of computation. Based on these iteration variables the proper digits ^d k can be selected, as specied by the following algorithm. Algorithm On-line Exponentials and Logarithms. Stimulus: m : Boolean (zero or one mode), X [l ; u ] = [?:406:::; 0:86887:::] (if m = 0), [s + ; r + ] = [0494:::; 3:467:::] (if m = ). Response: If m = 0 then lim n!?n ^Ln = e X. If m = then lim n!?n ^En = X + ln( ). Method:. Initialize ^E 0 = x 0 :x x x, ^L 0 = y?y 0 :y y y? m, P 0 = and ^d 0 = 0: (7) 5
6 . iterate: (for n = ; ; :::) ^E n = ^E n? + x n+?? n ln( + ^d n??n+ ) P n = P n?( + ^d n??n+ ) (8) ^L n = (^L n? + y n+ P n?? )( + ^d n??n+ ) + md n? If m = 0 then compute ~ E n = trunc( ^E n ; p) and ^d k = 8 < : If m = then compute ~ Ln = trunc(^ln ; q) and ^d k = 8 < :? if En ~ A 0 if A E ~ n B (9) if B E ~ n if Ln ~ C 0 if C L ~ n D (0)? if D L ~ n The function trunc(x; p) referred to in the algorithm, truncates the value x to p fractional digits. Rather than actually computing the term n ln( + ^d n??n+ ), this term should be accessible by means of a table lookup. The following lemmas give bounds on the comparison constants A; B; C and D, for which [Algorithm ] selects the digits ^d k correctly. Lemma Correctness of digit selection for zero mode. If A and B are p fractional digit constants satisfying for all n : and n A n +?p +? A n B n??p?? () n C n +?p +? B n D n??p?? () then given the input X and, [Algorithm ] (with m = 0) will emulate a run of the nondeterministic parallel algorithm (in the sense that the nondeterministic algorithm may choose the same digits as the ones chosen by the on-line algorithm, i.e. d k = ^d k ), when supplied with the same input, for the zero mode. Proof: (By induction) Let E n and ^En denote the iteration variables used by the nondeterministic respectively on-line algorithms. Since E ~ n is dened as ^E n truncated to p fractional digits, we have ^E n? ~ E n <?p, thus E? ~ E = ^E? ~ E + E? ^E ^E? ~ E + jx? X+j <?p +? ; (3) from which we deduce ~ E??p???? < E < ~ E +?p? +??. If ~ E A then E < ~ E +?p? +?? A +?p? +?? B thus according to (3) ^d =? is a valid choice. If A ~ E B then E < ~ E +?p? +?? B +?p? +?? D and E > ~ E??p???? A??p???? A thus ^d = 0 is a valid choice. 6
7 If ~ E B then E > ~ E +?p? +?? A +?p? +?? C thus ^d = is a valid choice. Now, assume that for k n? that ^d ; ^d ; : : :; ^d k? have been successfully chosen (i.e. that ^d k = d k where d k are the digits chosen by the nondeterministic algorithm), then by noting that n E n? ~ En = ^En? En ~ + n E n? ^En ^E n? En ~ + n X n? (X? ( + d k?k ))? (X +n? n? X ( + ^d k?k )) <?p +? ; and by using an argument similar to the one used for the base case, we conclude that ^d n is chosen correctly. Lemma Correctness of digit selection for one mode. If C and D are q fractional digit constants satisfying for all n : and n? n? n F n +?q +? ( +?k ) C n G n??q?? ( +?k ) (4) n? n? n H n +?q +? ( +?k ) D n I n??q?? ( +?k ) (5) then given the input X and, [Algorithm ] (with m = ) will emulate a run of the nondeterministic parallel algorithm, when supplied with the same input, for the one mode. Proof: The proof is similar to the one given for [Lemma ]. Corollary Under assumption of the hypothesis of [Lemma ] and [Lemma ], we have: L n??n ^Ln n? < ( for mode zero, and for mode one we have: ( +?k ))?n? ; (6) E n??n ^En <?n? : (7) Proof: and From [Lemma ] and [Lemma ] we have d k = ^d k thus: L n??n ^Ln n? = E n??n ^En n? X = X? n? n? ( + d k?k )? n+ ( + ^d k?k ) < ( ( +?k ))?n? ; (8) ln( + d k?k )? X n+ + 7 n? X ln( + ^d k?k ) <?n? : (9)
8 3. Hardware Requirements The algorithm requires the storage of the constants j ln( + ^d j??j+ ) for ^d j? f?; 0; g, thus to obtain an accuracy of the result of approximately n binary digits, we need to store 3n constants. This result can be improved by using the fact that for j n=, ln( + d j?j ) can be replaced by d j?j with accuracy?n. Thus we only need to store 3 n constants. The updating of the iteration variables, as specied by (9), can be done eciently using only shifts and additions. If the step time of each iteration of the algorithm is to be independent of the desired accuracy, e.g. the number of binary digits, the additions must be performed using redundant arithmetic, and the variables ^En ; P n and ^Ln should be represented in a redundant representation, like borrow-save. One inherent drawback of redundant arithmetic is that when comparing two redundant numbers, we are forced to examine all digits of both numbers. By designing the digit selection of [Algorithm ], such that the comparisons are based on truncated redundant numbers, this drawback has been eliminated, in the sense that we only need to examine a constant number of digits of both operands. 4 Choice of Constants and On-line Delay In this section we will discuss how to choose the comparison constants A; B; C and D, used when selecting the digits ^d k in the on-line algorithm. The lower and upper bounds for these constants, as given by [Lemma ] and [Lemma ], are depicted in [Figure 3] respectively [Figure 4]. n Dn n Dn - -p - δ B n C n n B n A n C n + -p + δ n n B n - -p - δ n A n + -p + δ n A n Figure 3: Lower and upper bound for constants A and B. 8
9 n I n n Hn n Gn D n I n - -q - δ n- -k Π(+ ) n- n -q Hn + + δ -k Π(+ ) n C n -q δ n- -k Gn - - Π (+ ) n F n n- n F n + -q + δ -k Π(+ ) Figure 4: Lower and upper bound for constants C and D. By inspection of [Figure 3] we note that: n A n +?p +? lim n! n A n +?p +? A B??p?? n B n??p?? ; (0) thus the p fractional digit constant A, must be chosen such that it belongs to the interval [ lim n! n A n +?p +? ; B??p?? ]: The best choice of A, will be the midpoint of this interval truncated to p fractional digits, e.g. A = trunc( limn! n A n+?p +? +B??p?? ; p) = trunc(b? ; p). In this way we have: A? (B? ) <?p : () From (0) and () we get the requirement: A <?p + B? B??p??, from which we deduce: log = A : () B + 0:5??p+ 9
10 Similarly we choose the constant B as the midpoint of the interval [lim n! n C n +?p +? ; D??p?? ], e.g. B = trunc( D +lim n! n C n ; p) = trunc(d ; p), and deduce that: log D??p+ = B : (3) Since A B the lower bound on-line delay when computing in mode zero is given by (), e.g. A. For mode one, we get by inspection of [Figure 4], that C and D must be chosen such that they belong to the intervals [ F +?q +? ; lim Q Q n! n G n??q?? ( +?k )] respectively [ H +?q +? ; lim n! n I n??q?? ( +?k )]. As with the zero mode, we choose the constants C and D as the midpoints of their respective Q intervals, truncated to q fractional digits, e.g. C = trunc( F+?q +? +lim n! n G n??q?? (+?k ) ; q) = trunc(f +?? (? Q Q ( +?k )); Q q) and D = trunc( H+?q +? +lim n! n I n??q?? (+?k ) ; q) = trunc(h + +?? (? ( +?k )); q). Using similar reasoning as for the zero mode we may deduce the following lower bounds on the on-line delay for mode one: log + Q ( +?k )?F??q+ log + Q ( +?k )? H??q+ = C : (4) = D : (5) Since D C the lower bound on the on-line delay for mode one is given by (5), e.g. D. Examples of values of A; B; C; D and the on-line delays A and D, are given in [Table 3] for various values of p and q. p; q A A B D C D Table 3: Truncated comparison comparison constants (in binary), and lower bound on on-line delay, for various values of p and q. 5 Digitization The output of [Algorithm ] is a sequence of approximations ^Ln or ^En, to the exact result e X respectively X + ln( ). If our algorithm for computing elementary functions is to be an on-line algorithm, we must produce the output as well as consume the input in an on-line manner. In order to produce the output in an on-line fashion, we will use a technique known as digitization. 0
11 Assume that we have computed a sequence of approximations < ^Zn > to a number Z, such that j?n ^Zn? Zj?n+p, and that the numerical value of the exact result is bounded by jzj q. We will then perform an on-line digitization of the value Z based on the sequence of approximations < ^Z n > producing the result S n in on-line mode. In each iteration of the algorithm, the (output) digit s n is chosen such that the residual error j ^Z n? S n j = j ^Z n? S n? + s n c j is minimized. Algorithm On-line Digitization. Stimulus: A sequence of approximations < ^Zn > satisfying: Response: S n = c++n P n s k?k. Method:?n ^Zn? Z?n+p.. Initialize S 0 = 0 (6). iterate: (for n = ; ; :::) T n = trunc(( ^Zn? S n?)?c ; k) (7) s n = 8 < : The following lemma gives a bound on the residual error. Lemma 3 If the scaling constant c is chosen such that c max ( p + &? if T n? 0 if? < T n (8) if < T n S n = S n? + s n c (9) log + q?p+ 3 +?k ' ; p + then the value S j computed by [Algorithm ] satises: 8j : Proof: (by induction) ^Z? S 0?c = & log 3??k ') ^Z j? S j c ( +?k ). (30) ^Z? Z + Z?c (? ^Z? Z+ jzj)?c ( p + q+ )?c 3 +?k (3) thus by virtue of the selection procedure (8) we have: thus Assume ^Z? S ( ^Z j? S j ( ^Z j+? S j?c +?k ) c. +?k ) c, thus = ( ^Z? S 0 )?c? s +?k ; (3) ( ^Zj? S j?)?c? s j +?k. Now ^Z j+? ^Z j + ^Z j? 4S j?? s j c+?c ^Z j+? j+ Z? ( ^Zj? j Z)?c + ( ^Zj? S j?)?c? s j ^Z j+? j+ Z?c + ^Z j? j Z?c + ( +?k ) p?c + p+?c + +?k+ 3 +?k ;
12 ( ^Z j+? S j )?c? s j+ +?k, and consequently: ^Zj+? Sj+ ( +?k ) c : (33) thus by virtue of the selection procedure (8) we have From [Lemma 3] we may deduce the following bound on the absolute error, made by approximating Z by?n S n. Z??n S n = Z??n ^Zn +?n ^Zn??n S n Z??n ^Zn +?n ^Z n? S n?n+p + c ( +?k )?n < c+?n Since the least signicant digit of?n S n is of weight c+?n, we conclude that?n S n is within one ulp (unit last place) of the exact result Z. Since the selection procedure is based on a k fractional digit estimation of ^Zn? S n?, it is not necessary to perform the full precision subtraction. Furthermore we only need to store S n to k fractional digits. Consequently [Algorithm ] can be implemented eciently, with a hardware cost that is independent on the desired precision (the number of binary digits of the result). 5. Applying Digitization to the Output of On-line Exp/Log Algorithm. In what follows we will briey argue that [Algorithm ] can be used to digitize the output of [Algorithm ]. For mode zero, by assuming j j, we deduce from (6) and [Corollary ] that:?n L n? e X <?n+3 =?n+p : (34) The absolute value of the exact result can be estimated to: e X j j e u < = q : (35) Thus with p = 3 and q =, we get from [Lemma 3] that the scaling constant c must satisfy, c 7 for k = and c 6 for k >. For mode one, we get from (4) and [Corollary ] that and by assuming that jxj we get?n ^En? (X + ln( )) <?n+ =?n+p ; (36) jx + ln( )j jxj + jln(u + )j < = q : (37) Thus with p = and q =, we get from [Lemma 3] that the scaling constant c must satisfy, c 6 for k = and c 5 for k >.
13 6 Conclusion We have proposed a new on-line algorithm for evaluating logarithms and exponentials. This algorithm is suitable for fast VLSI implementation. One should notice that in our presentation we rarely use the fact that the exponentials and logarithms are base e exponentials and logarithms, thus if one replaces the constants ln( + d k?k ) by log a ( + d k?k ) then (by modifying the comparison constants), one will obtain an algorithm for computing X + log a and a X. References [] T. Asada, N. Takagi, and S. ajima. Redundant CORDIC methods with a constant scale factor. IEEE Transactions on Computers, 40(9):989{995, September 99. [] A. Avizienis. Signed-digit number representations for fast parallel arithmetic. IRE Transactions on electronic computers, 0:pp 389{400, 96. Reprinted in E.E. Swartzlander, Computer Arithmetic, Vol., IEEE Computer Society Press Tutorial, 990. [3] J.C. Bajard, J. Duprat, S. Kla, and J.M. Muller. Some operators for on-line radix computations. Journal of Parallel and Distributed Computing, ():336{345, August 994. re. report of LIP ENSLyon n o 9-4. [4] J.C. Bajard, S. Kla, and J.M. Muller. Bkm: A new hardware algorithm for complex elementary functions. IEEE Transactions on Computers, 43(8):955{963, August 994. [5] R.H. Brackert, M.D. Ercegovac, and A.N. Willson. Design of an on-line multiply-add module for recursive digital lters. In M. D. Ercegovac and E. Swartzlander, editors, 9th Symposium on Computer Arithmetic, Santa Monica, USA, pages 34{4. IEEE Computer Society Press, sep 989. [6] T.C. Chen. Automatic computation of logarithms, exponentials, ratios and square roots. IBM J. of Res. and Dev., 6:380{388, 97. [7] M.D. Ercegovac and A.L. Grnarov. On-line multiplicative normalization. In 6th Symposium on Computer Arithmetic, pages 5{55. IEEE Computer Society Press, 983. [8] M.D. Ercegovac and T. lang. On-line arithmetic: a design methodology and applications in digital signal processing. In VLSI Signal Processing III, pages 5{63, 988. Reprinted in E.E. Swartzlander, Computer Arithmetic, Vol., IEEE Computer Society Press Tutorial, 990. [9] M.D. Ercegovac and T. Lang. On-line scheme for computing rotation factors. Journal of Parallel and Distributed Computing, Special Issue on Parallelism in Computer Arithmetic(5), 988. Reprinted in E.E. Swartzlander, Computer Arithmetic, Vol., IEEE Computer Society Press Tutorial, 990. [0] M.D. Ercegovac and T. Lang. Redundant and on-line cordic: Application to matrix triangularization and svd. IEEE Transaction on Computers, 39(6):75{740, June 990. [] M.D. Ercegovac and K.S. Trivedi. On-line algorithms for division and multiplication. IEEE Transactions on Computers, C-6(7):68{687, 977. Reprinted in E.E. Swartzlander, Computer Arithmetic, Vol., IEEE Computer Society Press Tutorial,
14 [] I. Koren. Computer arithmetic algorithms. Prentice-Hall, 993. [3] B. De Lugish. A Class of Algorithms for Automatic Evaluation of Functions and Computations in a Digital Computer. PhD thesis, Dept. of Computer Science, University of Illinois, Urbana, 970. [4] J.M. Muller. Discrete basis and computation of elementary functions. IEEE Transactions on Computers, C-34(9), September 985. [5] V.G. Oklobdzija and M.D. Ercegovac. An on-line square root algorithm. IEEE Transactions on Computers, C-3:70{75, 98. [6] W.H. Specker. A class of algorithms for ln(x), exp(x), sin(x), cos(x), tan? (x) and cot? (x). IEEE Transactions on Electronic Computers, EC-4, 965. Reprinted in E.E. Swartzlander, Computer Arithmetic, Vol., IEEE Computer Society Press Tutorial, 990. [7] N. Takagi. Studies on hardware algorithms for arithmetic operations with a redundant binary representation. PhD thesis, Dept. Info. Sci., Kyoto Univ., 987. [8] J. Volder. The cordic computing technique. IRE Transactions on Electronic Computers, 959. Reprinted in E.E. Swartzlander, Computer Arithmetic, Vol., IEEE Computer Society Press Tutorial, 990. [9] J. Walther. A unied algorithm for elementary functions. In Joint Computer Conference Proceedings, 97. Reprinted in E.E. Swartzlander, Computer Arithmetic, Vol., IEEE Computer Society Press Tutorial,
On-Line Hardware Implementation for Complex Exponential and Logarithm
On-Line Hardware Implementation for Complex Exponential and Logarithm Ali SKAF, Jean-Michel MULLER * and Alain GUYOT Laboratoire TIMA / INPG - 46, Av. Félix Viallet, 3831 Grenoble Cedex * Laboratoire LIP
More informationLaboratoire de l Informatique du Parallélisme. École Normale Supérieure de Lyon Unité Mixte de Recherche CNRS-INRIA-ENS LYON n o 8512
Laboratoire de l Informatique du Parallélisme École Normale Supérieure de Lyon Unité Mixte de Recherche CNRS-INRIA-ENS LYON n o 8512 SPI A few results on table-based methods Jean-Michel Muller October
More informationNumeration and Computer Arithmetic Some Examples
Numeration and Computer Arithmetic 1/31 Numeration and Computer Arithmetic Some Examples JC Bajard LIRMM, CNRS UM2 161 rue Ada, 34392 Montpellier cedex 5, France April 27 Numeration and Computer Arithmetic
More informationRN-coding of numbers: definition and some properties
Laboratoire de l Informatique du Parallélisme École Normale Supérieure de Lyon Unité Mixte de Recherche CNRS-INRIA-ENS LYON-UCBL n o 5668 RN-coding of numbers: definition and some properties Peter Kornerup,
More informationLaboratoire de l Informatique du Parallélisme
Laboratoire de l Informatique du Parallélisme Ecole Normale Supérieure de Lyon Unité de recherche associée au CNRS n 1398 Reciprocation, Square root, Inverse Square Root, and some Elementary Functions
More informationA Hardware-Oriented Method for Evaluating Complex Polynomials
A Hardware-Oriented Method for Evaluating Complex Polynomials Miloš D Ercegovac Computer Science Department University of California at Los Angeles Los Angeles, CA 90095, USA milos@csuclaedu Jean-Michel
More informationComplex Logarithmic Number System Arithmetic Using High-Radix Redundant CORDIC Algorithms
Complex Logarithmic Number System Arithmetic Using High-Radix Redundant CORDIC Algorithms David Lewis Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario, Canada M5S
More informationAccelerated Shift-and-Add algorithms
c,, 1 12 () Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Accelerated Shift-and-Add algorithms N. REVOL AND J.-C. YAKOUBSOHN nathalie.revol@univ-lille1.fr, yak@cict.fr Lab. ANO,
More informationRadix-4 Vectoring CORDIC Algorithm and Architectures. July 1998 Technical Report No: UMA-DAC-98/20
Radix-4 Vectoring CORDIC Algorithm and Architectures J. Villalba E. Antelo J.D. Bruguera E.L. Zapata July 1998 Technical Report No: UMA-DAC-98/20 Published in: J. of VLSI Signal Processing Systems for
More informationassume that the message itself is considered the RNS representation of a number, thus mapping in and out of the RNS system is not necessary. This is p
Montgomery Modular Multiplication in Residue Arithmetic Jean-Claude Bajard LIRMM Montpellier, France bajardlirmm.fr Laurent-Stephane Didier Universite de Bretagne Occidentale Brest, France laurent-stephane.didieruniv-brest.fr
More informationSvoboda-Tung Division With No Compensation
Svoboda-Tung Division With No Compensation Luis MONTALVO (IEEE Student Member), Alain GUYOT Integrated Systems Design Group, TIMA/INPG 46, Av. Félix Viallet, 38031 Grenoble Cedex, France. E-mail: montalvo@archi.imag.fr
More informationDesign and FPGA Implementation of Radix-10 Algorithm for Division with Limited Precision Primitives
Design and FPGA Implementation of Radix-10 Algorithm for Division with Limited Precision Primitives Miloš D. Ercegovac Computer Science Department Univ. of California at Los Angeles California Robert McIlhenny
More informationA HIGH-SPEED PROCESSOR FOR RECTANGULAR-TO-POLAR CONVERSION WITH APPLICATIONS IN DIGITAL COMMUNICATIONS *
Copyright IEEE 999: Published in the Proceedings of Globecom 999, Rio de Janeiro, Dec 5-9, 999 A HIGH-SPEED PROCESSOR FOR RECTAGULAR-TO-POLAR COVERSIO WITH APPLICATIOS I DIGITAL COMMUICATIOS * Dengwei
More informationToward Correctly Rounded Transcendentals
IEEE TRANSACTIONS ON COMPUTERS, VOL. 47, NO. 11, NOVEMBER 1998 135 Toward Correctly Rounded Transcendentals Vincent Lefèvre, Jean-Michel Muller, Member, IEEE, and Arnaud Tisserand Abstract The Table Maker
More information2 Section 2 However, in order to apply the above idea, we will need to allow non standard intervals ('; ) in the proof. More precisely, ' and may gene
Introduction 1 A dierential intermediate value theorem by Joris van der Hoeven D pt. de Math matiques (B t. 425) Universit Paris-Sud 91405 Orsay Cedex France June 2000 Abstract Let T be the eld of grid-based
More informationNewton-Raphson Algorithms for Floating-Point Division Using an FMA
Newton-Raphson Algorithms for Floating-Point Division Using an FMA Nicolas Louvet, Jean-Michel Muller, Adrien Panhaleux Abstract Since the introduction of the Fused Multiply and Add (FMA) in the IEEE-754-2008
More informationHardware Operator for Simultaneous Sine and Cosine Evaluation
Hardware Operator for Simultaneous Sine and Cosine Evaluation Arnaud Tisserand To cite this version: Arnaud Tisserand. Hardware Operator for Simultaneous Sine and Cosine Evaluation. ICASSP 6: International
More informationChapter 5: Solutions to Exercises
1 DIGITAL ARITHMETIC Miloš D. Ercegovac and Tomás Lang Morgan Kaufmann Publishers, an imprint of Elsevier Science, c 2004 Updated: September 9, 2003 Chapter 5: Solutions to Selected Exercises With contributions
More informationA Suggestion for a Fast Residue Multiplier for a Family of Moduli of the Form (2 n (2 p ± 1))
The Computer Journal, 47(1), The British Computer Society; all rights reserved A Suggestion for a Fast Residue Multiplier for a Family of Moduli of the Form ( n ( p ± 1)) Ahmad A. Hiasat Electronics Engineering
More informationNumber Representations
Computer Arithmetic Algorithms Prof. Dae Hyun Kim School of Electrical Engineering and Computer Science Washington State University Number Representations Information Textbook Israel Koren, Computer Arithmetic
More informationcomo trabajan las calculadoras?
Revista de Matemática: Teoría y Aplicaciones 2005 12(1 & 2) : 45 50 cimpa ucr ccss issn: 1409-2433 como trabajan las calculadoras? Bruce H. Edwards Received/Recibido: 24 Feb 2004 Abstract What happens
More informationAutomatica, 33(9): , September 1997.
A Parallel Algorithm for Principal nth Roots of Matrices C. K. Koc and M. _ Inceoglu Abstract An iterative algorithm for computing the principal nth root of a positive denite matrix is presented. The algorithm
More informationLecture 11. Advanced Dividers
Lecture 11 Advanced Dividers Required Reading Behrooz Parhami, Computer Arithmetic: Algorithms and Hardware Design Chapter 15 Variation in Dividers 15.3, Combinational and Array Dividers Chapter 16, Division
More informationCost/Performance Tradeoff of n-select Square Root Implementations
Australian Computer Science Communications, Vol.22, No.4, 2, pp.9 6, IEEE Comp. Society Press Cost/Performance Tradeoff of n-select Square Root Implementations Wanming Chu and Yamin Li Computer Architecture
More informationVLSI Arithmetic. Lecture 9: Carry-Save and Multi-Operand Addition. Prof. Vojin G. Oklobdzija University of California
VLSI Arithmetic Lecture 9: Carry-Save and Multi-Operand Addition Prof. Vojin G. Oklobdzija University of California http://www.ece.ucdavis.edu/acsel Carry-Save Addition* *from Parhami 2 June 18, 2003 Carry-Save
More informationA 32-bit Decimal Floating-Point Logarithmic Converter
A 3-bit Decimal Floating-Point Logarithmic Converter Dongdong Chen 1, Yu Zhang 1, Younhee Choi 1, Moon Ho Lee, Seok-Bum Ko 1, Department of Electrical and Computer Engineering, University of Saskatchewan
More informationHow Do Calculators Calculate? Helmut Knaust Department of Mathematical Sciences University of Texas at El Paso
How Do Calculators Calculate? Helmut Knaust Department of Mathematical Sciences University of Texas at El Paso Helmut Knaust How Do Calculators Calculate? April 25, 1997 1 / 18 History We give an introduction
More informationLaboratoire de l Informatique du Parallélisme
Laboratoire de l Informatique du Parallélisme Ecole Normale Supérieure de Lyon Unité de recherche associée au CNRS n 1398 An Algorithm that Computes a Lower Bound on the Distance Between a Segment and
More informationChapter 6: Solutions to Exercises
1 DIGITAL ARITHMETIC Miloš D. Ercegovac and Tomás Lang Morgan Kaufmann Publishers, an imprint of Elsevier Science, c 00 Updated: September 3, 003 With contributions by Elisardo Antelo and Fabrizio Lamberti
More information1 Solutions to selected problems
Solutions to selected problems Section., #a,c,d. a. p x = n for i = n : 0 p x = xp x + i end b. z = x, y = x for i = : n y = y + x i z = zy end c. y = (t x ), p t = a for i = : n y = y(t x i ) p t = p
More informationVALIANT S MODEL AND THE COST OF COMPUTING INTEGERS
comput. complex. 13 (2004), 131 146 1016-3328/04/030131 16 DOI 10.1007/s00037-004-0186-2 c Birkhäuser Verlag, Basel 2004 computational complexity VALIANT S MODEL AND THE COST OF COMPUTING INTEGERS Pascal
More informationDecision issues on functions realized by finite automata. May 7, 1999
Decision issues on functions realized by finite automata May 7, 1999 Christian Choffrut, 1 Hratchia Pelibossian 2 and Pierre Simonnet 3 1 Introduction Let D be some nite alphabet of symbols, (a set of
More informationLecture 8: Sequential Multipliers
Lecture 8: Sequential Multipliers ECE 645 Computer Arithmetic 3/25/08 ECE 645 Computer Arithmetic Lecture Roadmap Sequential Multipliers Unsigned Signed Radix-2 Booth Recoding High-Radix Multiplication
More informationIntroduction and mathematical preliminaries
Chapter Introduction and mathematical preliminaries Contents. Motivation..................................2 Finite-digit arithmetic.......................... 2.3 Errors in numerical calculations.....................
More informationMicrotrend Systems Inc. Fixed Point Two s Complement CORDIC Arithmetic on MSP430
Fixed Point Two s Complement CORDIC Arithmetic on MSP430 Titi Trandafir, MSEE, PhD (abd),mba Slide 1 Agenda Part 1 General considerations Part 2 Lab Demo using Microtrend Sys development platforms and
More informationA VLSI Algorithm for Modular Multiplication/Division
A VLSI Algorithm for Modular Multiplication/Division Marcelo E. Kaihara and Naofumi Takagi Department of Information Engineering Nagoya University Nagoya, 464-8603, Japan mkaihara@takagi.nuie.nagoya-u.ac.jp
More informationDIGIT-SERIAL ARITHMETIC
DIGIT-SERIAL ARITHMETIC 1 Modes of operation:lsdf and MSDF Algorithm and implementation models LSDF arithmetic MSDF: Online arithmetic TIMING PARAMETERS 2 radix-r number system: conventional and redundant
More informationImproving Goldschmidt Division, Square Root and Square Root Reciprocal
INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Improving Goldschmidt Division, Square Root and Square Root Reciprocal Milos Ercegovac, Laurent Imbert, David Matula, Jean-Michel Muller,
More informationDIVISION BY DIGIT RECURRENCE
DIVISION BY DIGIT RECURRENCE 1 SEVERAL DIVISION METHODS: DIGIT-RECURRENCE METHOD studied in this chapter MULTIPLICATIVE METHOD (Chapter 7) VARIOUS APPROXIMATION METHODS (power series expansion), SPECIAL
More informationSUFFIX PROPERTY OF INVERSE MOD
IEEE TRANSACTIONS ON COMPUTERS, 2018 1 Algorithms for Inversion mod p k Çetin Kaya Koç, Fellow, IEEE, Abstract This paper describes and analyzes all existing algorithms for computing x = a 1 (mod p k )
More informationBound on Run of Zeros and Ones for Images of Floating-Point Numbers by Algebraic Functions
Bound on Run of Zeros and Ones for Images of Floating-Point Numbers by Algebraic Functions Tomas Lang, Jean-Michel Muller To cite this version: Tomas Lang, Jean-Michel Muller Bound on Run of Zeros and
More information1 Solutions to selected problems
Solutions to selected problems Section., #a,c,d. a. p x = n for i = n : 0 p x = xp x + i end b. z = x, y = x for i = : n y = y + x i z = zy end c. y = (t x ), p t = a for i = : n y = y(t x i ) p t = p
More informationCounterexamples to witness conjectures. Notations Let E be the set of admissible constant expressions built up from Z; + ;?;;/; exp and log. Here a co
Counterexamples to witness conjectures Joris van der Hoeven D pt. de Math matiques (b t. 45) Universit Paris-Sud 91405 Orsay CEDEX France August 15, 003 Consider the class of exp-log constants, which is
More informationNew Minimal Weight Representations for Left-to-Right Window Methods
New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo
More informationA note on parallel and alternating time
Journal of Complexity 23 (2007) 594 602 www.elsevier.com/locate/jco A note on parallel and alternating time Felipe Cucker a,,1, Irénée Briquel b a Department of Mathematics, City University of Hong Kong,
More informationPower Consumption Analysis. Arithmetic Level Countermeasures for ECC Coprocessor. Arithmetic Operators for Cryptography.
Power Consumption Analysis General principle: measure the current I in the circuit Arithmetic Level Countermeasures for ECC Coprocessor Arnaud Tisserand, Thomas Chabrier, Danuta Pamula I V DD circuit traces
More informationKEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA.
GLOBAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGIES AND SCIENCES DESIGN OF A QUINARY TO RESIDUE NUMBER SYSTEM CONVERTER USING MULTI-LEVELS OF CONVERSION Hassan Amin Osseily Electrical and Electronics Department,
More informationEfficient Function Approximation Using Truncated Multipliers and Squarers
Efficient Function Approximation Using Truncated Multipliers and Squarers E. George Walters III Lehigh University Bethlehem, PA, USA waltersg@ieee.org Michael J. Schulte University of Wisconsin Madison
More informationDesign and Implementation of a Radix-4 Complex Division Unit with Prescaling
esign and Implementation of a Radix-4 Complex ivision Unit with Prescaling Pouya ormiani Computer Science epartment University of California at Los Angeles Los Angeles, CA 90024, USA Email: pouya@cs.ucla.edu
More informationChapter 1: Solutions to Exercises
1 DIGITAL ARITHMETIC Miloš D. Ercegovac and Tomás Lang Morgan Kaufmann Publishers, an imprint of Elsevier, c 2004 Exercise 1.1 (a) 1. 9 bits since 2 8 297 2 9 2. 3 radix-8 digits since 8 2 297 8 3 3. 3
More informationLIP. Laboratoire de l Informatique du Parallélisme. Ecole Normale Supérieure de Lyon Institut IMAG Unité de recherche associée au CNRS n 1398
LIP Laboratoire de l Informatique du Parallélisme Ecole Normale Supérieure de Lyon Institut IMAG Unité de recherche associée au CNRS n 1398 On the redundancy of real number representation systems Christophe
More informationINRIA Rocquencourt, Le Chesnay Cedex (France) y Dept. of Mathematics, North Carolina State University, Raleigh NC USA
Nonlinear Observer Design using Implicit System Descriptions D. von Wissel, R. Nikoukhah, S. L. Campbell y and F. Delebecque INRIA Rocquencourt, 78 Le Chesnay Cedex (France) y Dept. of Mathematics, North
More informationModular Multiplication in GF (p k ) using Lagrange Representation
Modular Multiplication in GF (p k ) using Lagrange Representation Jean-Claude Bajard, Laurent Imbert, and Christophe Nègre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier
More informationCircuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department
Circuit depth relative to a random oracle Peter Bro Miltersen Aarhus University, Computer Science Department Ny Munkegade, DK 8000 Aarhus C, Denmark. pbmiltersen@daimi.aau.dk Keywords: Computational complexity,
More informationExact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel
Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering
More informationDenition and some Properties of Generalized Elementary Functions of a Real Variable
Denition and some Properties of Generalized Elementary Functions of a Real Variable I. Introduction The term elementary function is very often mentioned in many math classes and in books, e.g. Calculus
More informationMATHEMATICS OF COMPUTATION, VOLUME 26, NUMBER 118, APRIL An Algorithm for Computing Logarithms. and Arctangents. By B. C.
MATHEMATICS OF COMPUTATION, VOLUME 26, NUMBER 118, APRIL 1972 An Algorithm for Computing Logarithms and Arctangents By B. C. Carlson Abstract. An iterative algorithm with fast convergence can be used to
More informationTable-based polynomials for fast hardware function evaluation
Table-based polynomials for fast hardware function evaluation Jérémie Detrey, Florent de Dinechin LIP, École Normale Supérieure de Lyon 46 allée d Italie 69364 Lyon cedex 07, France E-mail: {Jeremie.Detrey,
More informationDouble Step Branching CORDIC : A New Algorithm for Fast Sine and Cosine Generation
Double Step Branching CORDIC : A New Algorithm for Fast Sine and Cosine Generation Dhananjay S. Phatak Electrical Engineering Department State University of New York, Binghamton, NY 13902-6000 (IEEE Transactions
More informationComputing Machine-Efficient Polynomial Approximations
Computing Machine-Efficient Polynomial Approximations N. Brisebarre, S. Chevillard, G. Hanrot, J.-M. Muller, D. Stehlé, A. Tisserand and S. Torres Arénaire, LIP, É.N.S. Lyon Journées du GDR et du réseau
More informationTable-Based Polynomials for Fast Hardware Function Evaluation
ASAP 05 Table-Based Polynomials for Fast Hardware Function Evaluation Jérémie Detrey Florent de Dinechin Projet Arénaire LIP UMR CNRS ENS Lyon UCB Lyon INRIA 5668 http://www.ens-lyon.fr/lip/arenaire/ CENTRE
More informationThe DFT as Convolution or Filtering
Connexions module: m16328 1 The DFT as Convolution or Filtering C. Sidney Burrus This work is produced by The Connexions Project and licensed under the Creative Commons Attribution License A major application
More informationOctober 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable
International Journal of Wavelets, Multiresolution and Information Processing c World Scientic Publishing Company Polynomial functions are renable Henning Thielemann Institut für Informatik Martin-Luther-Universität
More informationFactorization of singular integer matrices
Factorization of singular integer matrices Patrick Lenders School of Mathematics, Statistics and Computer Science, University of New England, Armidale, NSW 2351, Australia Jingling Xue School of Computer
More informationScheduling Adaptively Parallel Jobs. Bin Song. Submitted to the Department of Electrical Engineering and Computer Science. Master of Science.
Scheduling Adaptively Parallel Jobs by Bin Song A. B. (Computer Science and Mathematics), Dartmouth College (996) Submitted to the Department of Electrical Engineering and Computer Science in partial fulllment
More informationProposal to Improve Data Format Conversions for a Hybrid Number System Processor
Proceedings of the 11th WSEAS International Conference on COMPUTERS, Agios Nikolaos, Crete Island, Greece, July 6-8, 007 653 Proposal to Improve Data Format Conversions for a Hybrid Number System Processor
More informationoutput H = 2*H+P H=2*(H-P)
Ecient Algorithms for Multiplication on Elliptic Curves by Volker Muller TI-9/97 22. April 997 Institut fur theoretische Informatik Ecient Algorithms for Multiplication on Elliptic Curves Volker Muller
More informationCS 4407 Algorithms Lecture 2: Iterative and Divide and Conquer Algorithms
CS 4407 Algorithms Lecture 2: Iterative and Divide and Conquer Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Lecture Outline CS 4407, Algorithms Growth Functions
More informationGF(2 m ) arithmetic: summary
GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation
More informationA New Algorithm to Compute Terms in Special Types of Characteristic Sequences
A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga
More informationVolume 3, No. 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at
Volume 3, No 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at wwwjgrcsinfo A NOVEL HIGH DYNAMIC RANGE 5-MODULUS SET WHIT EFFICIENT REVERSE CONVERTER AND
More informationOptimizing Scientific Libraries for the Itanium
0 Optimizing Scientific Libraries for the Itanium John Harrison Intel Corporation Gelato Federation Meeting, HP Cupertino May 25, 2005 1 Quick summary Intel supplies drop-in replacement versions of common
More informationPart VI Function Evaluation
Part VI Function Evaluation Parts Chapters I. Number Representation 1. 2. 3. 4. Numbers and Arithmetic Representing Signed Numbers Redundant Number Systems Residue Number Systems Elementary Operations
More informationOn the number of segments needed in a piecewise linear approximation
On the number of segments needed in a piecewise linear approximation Christopher L. Frenzen a, Tsutomu Sasao b and Jon T. Butler c. a Department of Applied Mathematics, Naval Postgraduate School, Monterey,
More informationMULTIPLICATIVE SEMIGROUPS RELATED TO THE 3x +1 PROBLEM. 1. Introduction The 3x +1iteration is given by the function on the integers for x even 3x+1
MULTIPLICATIVE SEMIGROUPS RELATED TO THE 3x + PROBLEM ANA CARAIANI Abstract. Recently Lagarias introduced the Wild semigroup, which is intimately connected to the 3x + Conjecture. Applegate and Lagarias
More information9. Datapath Design. Jacob Abraham. Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017
9. Datapath Design Jacob Abraham Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 October 2, 2017 ECE Department, University of Texas at Austin
More informationLecture 12 (Tue, Mar 5) Gaussian elimination and LU factorization (II)
Math 59 Lecture 2 (Tue Mar 5) Gaussian elimination and LU factorization (II) 2 Gaussian elimination - LU factorization For a general n n matrix A the Gaussian elimination produces an LU factorization if
More informationFAST FIR ALGORITHM BASED AREA-EFFICIENT PARALLEL FIR DIGITAL FILTER STRUCTURES
FAST FIR ALGORITHM BASED AREA-EFFICIENT PARALLEL FIR DIGITAL FILTER STRUCTURES R.P.MEENAAKSHI SUNDHARI 1, Dr.R.ANITA 2 1 Department of ECE, Sasurie College of Engineering, Vijayamangalam, Tamilnadu, India.
More informationMath 210 Exam 2 - Practice Problems. 1. For each of the following, determine whether the statement is True or False.
Math 20 Exam 2 - Practice Problems. For each of the following, determine whether the statement is True or False. (a) {a,b,c,d} TRE (b) {a,b,c,d} FLSE (c) {a,b, } TRE (d) {a,b, } TRE (e) {a,b} {a,b} FLSE
More informationMANY numerical problems in dynamical systems
IEEE TRANSACTIONS ON COMPUTERS, VOL., 201X 1 Arithmetic algorithms for extended precision using floating-point expansions Mioara Joldeş, Olivier Marty, Jean-Michel Muller and Valentina Popescu Abstract
More informationInformation encoding and decoding using Residue Number System for {2 2n -1, 2 2n, 2 2n +1} moduli sets
Information encoding and decoding using Residue Number System for {2-1, 2, 2 +1} moduli sets Idris Abiodun Aremu Kazeem Alagbe Gbolagade Abstract- This paper presents the design methods of information
More informationOn the Exponent of the All Pairs Shortest Path Problem
On the Exponent of the All Pairs Shortest Path Problem Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Zvi Galil Department of Computer Science Sackler Faculty
More informationA Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH 2007 1 A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir Abstract We present a simple algorithm
More informationRedundant Radix Enumeration Systems
Redundant Radix Enumeration Systems CS 860: Automatic Sequences Daniel Roche University of Waterloo 21 November 2006 Roche (University of Waterloo) Redundant Radix Enumeration Systems 21 November 2006
More informationTheorem 1 can be improved whenever b is not a prime power and a is a prime divisor of the base b. Theorem 2. Let b be a positive integer which is not
A RESULT ON THE DIGITS OF a n R. Blecksmith*, M. Filaseta**, and C. Nicol Dedicated to the memory of David R. Richman. 1. Introduction Let d r d r,1 d 1 d 0 be the base b representation of a positive integer
More informationArithmetic operators for pairing-based cryptography
7. Kryptotag November 9 th, 2007 Arithmetic operators for pairing-based cryptography Jérémie Detrey Cosec, B-IT, Bonn, Germany jdetrey@bit.uni-bonn.de Joint work with: Jean-Luc Beuchat Nicolas Brisebarre
More informationTHE CORDIC adaptive lattice filter (CALF) [11] is an
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 46, NO. 7, JULY 1998 1861 On the Convergence of the CORDIC Adaptive Lattice Filtering (CALF) Algorithm Yu Hen Hu, Senior Member, IEEE Abstract In this paper,
More informationA Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations
A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir School of Computer Science Carleton University, Ottawa, Canada http://www.scs.carleton.ca/ jamuir 23 October
More informationA High-Speed Realization of Chinese Remainder Theorem
Proceedings of the 2007 WSEAS Int. Conference on Circuits, Systems, Signal and Telecommunications, Gold Coast, Australia, January 17-19, 2007 97 A High-Speed Realization of Chinese Remainder Theorem Shuangching
More informationResidue Number Systems Ivor Page 1
Residue Number Systems 1 Residue Number Systems Ivor Page 1 7.1 Arithmetic in a modulus system The great speed of arithmetic in Residue Number Systems (RNS) comes from a simple theorem from number theory:
More information1 Sequences and Summation
1 Sequences and Summation A sequence is a function whose domain is either all the integers between two given integers or all the integers greater than or equal to a given integer. For example, a m, a m+1,...,
More informationLaboratoire Bordelais de Recherche en Informatique. Universite Bordeaux I, 351, cours de la Liberation,
Laboratoire Bordelais de Recherche en Informatique Universite Bordeaux I, 351, cours de la Liberation, 33405 Talence Cedex, France Research Report RR-1145-96 On Dilation of Interval Routing by Cyril Gavoille
More informationDistributed computation of the number. of points on an elliptic curve
Distributed computation of the number of points on an elliptic curve over a nite prime eld Johannes Buchmann, Volker Muller, Victor Shoup SFB 124{TP D5 Report 03/95 27th April 1995 Johannes Buchmann, Volker
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationNew concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space
Lesson 6: Linear independence, matrix column space and null space New concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space Two linear systems:
More informationDesign and Implementation of High Speed CRC Generators
Department of ECE, Adhiyamaan College of Engineering, Hosur, Tamilnadu, India Design and Implementation of High Speed CRC Generators ChidambarakumarS 1, Thaky Ahmed 2, UbaidullahMM 3, VenketeshK 4, JSubhash
More informationIn-Memory Computing of Akers Logic Array
In-Memory Computing of Akers Logic Array Eitan Yaakobi Electrical Engineering California Institute of Technology Pasadena, CA 91125 yaakobi@caltechedu Anxiao (Andrew) Jiang Computer Science and Engineering
More informationSquared Error. > Steady State Error Iteration
The Logarithmic Number System for Strength Reduction in Adaptive Filtering John R. Sacha and Mary Jane Irwin Computer Science and Engineering Department The Pennsylvania State University University Park,
More informationThe Synthesis of Robust Polynomial Arithmetic with Stochastic Logic
The Synthesis of Robust Polynomial Arithmetic with Stochastic Logic Weikang Qian and Marc D. Riedel Department of Electrical and Computer Engineering University of Minnesota, Twin Cities {qianx030, mriedel}@umn.edu
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More information