AbstractThe reciprocal square root calculation α=1/x is very common in scientific computations. Having a correctly rounded implementation of it is of great importance in producing numerically predictable code among today's heterogenous computing environment. Existing results suggest that to get the correctly rounded α in a floating point number system with p significant bits, we may have to compute up to 3p+1 leading bits of α. However, numerical evidence indicates the actual number may be as small as 2p plus a few more bits. This paper attempts to bridge the gap by showing that this is indeed true, assuming the abc conjecture which is widely purported to hold. (But our results do not tell exactly how many more bits beyond the 2p bits, due ...
Multiplicative Newton–Raphson and Goldschmidt algorithms are widely used in current processors to im...
In the paper [11], the second author considered a conjecture on the fundamental units of certain fam...
In this paper, we present new variants of Newton–Raphson-based protocols for the secure computation ...
AbstractThe reciprocal square root calculation α=1/x is very common in scientific computations. Havi...
Quotients, reciprocals, square roots and square root reciprocals all have the property that infinite...
International audienceWe analyze two fast and accurate algorithms recently presented by Borges for c...
International audienceWe study the accuracy of a classical approach to computing complex square-root...
This paper presents upper bounds on the number of zeros and ones after the rounding bit for algebrai...
(eng) This paper presents upper bounds on the number of zeros and ones after the rounding bit for al...
(eng) This paper deals with the computation of reciprocals, square roots, inverse square roots, and ...
International audienceBased on recent work, by the first and third authors, on the distribution of t...
International audienceDuring any composite computation there is a constant need for rounding interme...
The Floating-Point (FP) implementation of a real-valued function is performed with correct rounding ...
International audienceAssume we use a binary floating-point arithmetic and that RN is the round-to-n...
Article dans revue scientifique avec comité de lecture.Let $F_k$ denote the $k$-bit mantissa floatin...
Multiplicative Newton–Raphson and Goldschmidt algorithms are widely used in current processors to im...
In the paper [11], the second author considered a conjecture on the fundamental units of certain fam...
In this paper, we present new variants of Newton–Raphson-based protocols for the secure computation ...
AbstractThe reciprocal square root calculation α=1/x is very common in scientific computations. Havi...
Quotients, reciprocals, square roots and square root reciprocals all have the property that infinite...
International audienceWe analyze two fast and accurate algorithms recently presented by Borges for c...
International audienceWe study the accuracy of a classical approach to computing complex square-root...
This paper presents upper bounds on the number of zeros and ones after the rounding bit for algebrai...
(eng) This paper presents upper bounds on the number of zeros and ones after the rounding bit for al...
(eng) This paper deals with the computation of reciprocals, square roots, inverse square roots, and ...
International audienceBased on recent work, by the first and third authors, on the distribution of t...
International audienceDuring any composite computation there is a constant need for rounding interme...
The Floating-Point (FP) implementation of a real-valued function is performed with correct rounding ...
International audienceAssume we use a binary floating-point arithmetic and that RN is the round-to-n...
Article dans revue scientifique avec comité de lecture.Let $F_k$ denote the $k$-bit mantissa floatin...
Multiplicative Newton–Raphson and Goldschmidt algorithms are widely used in current processors to im...
In the paper [11], the second author considered a conjecture on the fundamental units of certain fam...
In this paper, we present new variants of Newton–Raphson-based protocols for the secure computation ...