Computer Science ›› 2015, Vol. 42 ›› Issue (4): 25-30.doi: 10.11896/j.issn.1002-137X.2015.04.003

Previous Articles     Next Articles

Validated Evaluation and Error Analysis of Elementary Functions

LIU Jian, TANG Min, ZENG Xia and ZENG Zhen-bing   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper discussed evaluation principle and implementation of elementary functions according to the standard of GNU.Based on the IEEE 754-2008 standard,theoretical error on elementary functions program in C language standard library was analyzed by error analysis fundamental theory.Firstly,the floating-point C program was transferred to the corresponding interval computing one using interval class provided by Boost library.Secondly,validated evaluation was used on these elementary functions by interval arithmetic.Finally,the interval,including real numeric,was obtained.Based on the interval,numerical error bounds on these elementary functions were presented.

Key words: Elementary functions,Error analysis,Interval arithmetic,Validated evaluation

[1] Wang Wen-hua,GUO Zhi-hua,CAO Huai-xin.An upper bound for the adiabatic approximation error[J].Science China Physics,Mechanics and Astronomy,2014,57(2):218-224
[2] Jeannerod C P,Rump S M.Improved error bounds for innerproducts in floating-point arithmetic[J].SIAM Journal on Matrix Analysis and Applications,2013,34(2):338-344
[3] 袁梦.复杂计算的误差定量分析方法及其应用[D].杭州:浙江大学,2006
[4] 周腾飞.Bernstein基多项式函数的高精度计算及其动态误差分析研究[D].长沙:国防科学技术大学,2011
[5] Rump S M.Verification methods:Rigorous results using floa-ting-point arithmetic[J].Acta Numerica,2010,19:287-449
[6] Muller J M.Elementary functions:Algorithms and Implementation(2nd ed)[M].Birkhuser,2006
[7] Granlund T.The GNU multiple precision arithmetic library.
[8] Fousse L,Hanrot G,Lefevre V,et al.MPFR:A multiple-precision binary floating-point library with correct rounding[J].ACM Transactions on Mathematical Software (TOMS),2007,33(2):1-14
[9] Backeljauw F,Becuwe S,Cuyt A,et al.Validated evaluation of special mathematical functions[M]∥Intelligent Computer Mathematics.2008:206-216
[10] Brisebarre N,De Dinechin F,Jeannerod C P,et al.Handbook of floating-point arithmetic[M].Springer Science & Business Media,2009
[11] Higham N J.Accuracy and stability of numerical algorithms(2nd ed)[M].Siam,2011
[12] Moore R E,Kearfott R B,Cloud M J.Introduction to interval analysis[M].Siam,2009
[13] Stallman R M.Using GCC:The GNU Compiler Collection Reference Manual for GCC 3.3.1[M].Free Software Foundation,2003
[14] Sauer T.Numerical Analysis(2nd ed)[M].北京:机械工业出版社,2012
[15] Mathews J H,Fink K D.Numerical methods using MATLAB(第四版)[M].周璐,陈渝,钱芳,等.北京:电子工业出版社,2012
[16] Brnnimann H,Melquiond G,Pion S.The design of the Boost interval arithmetic library[J].Theoretical Computer Science,2006,351(1):111-118
[17] 刘保柱,苏彦华,张宏林.MATLAB 7.0 从入门到精通[M].北京:人民邮电出版社,2010

No related articles found!
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .