Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Polynomial evaluation with scaling
Hansen E., Patrick M., Wang R. ACM Transactions on Mathematical Software16 (1):86-93,1990.Type:Article
Date Reviewed: May 1 1991

This short paper describes a simple scaling method that can be employed with the standard Horner algorithm for polynomial evaluation to greatly increase the range of numbers that can be used as arguments without encountering nonrepresentable intermediate results. This change is designed to prevent overflow, but it also reduces the probability of underflow. It has no effect on the accuracy of the computed result except when it prevents underflow, in which case it should improve the final accuracy. The paper contains a complete algorithm description and an example. A FORTRAN implementation is available.

This paper is aimed at specialists in numerical algorithm design. It adds to the storehouse of available robust computational algorithms. The algorithm is much more expensive than the conventional method, so it should only be used when overflow is expected to be a problem. It should be especially useful on machines with small exponent ranges.

Reviewer:  F. N. Fritsch Review #: CR114580
Bookmark and Share
 
Numerical Algorithms (G.1.0 ... )
 
 
Computations On Polynomials (F.2.1 ... )
 
 
Computer Arithmetic (G.1.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Numerical Algorithms": Date
Performance evaluation of programs related to the real gamma function
Cody W. ACM Transactions on Mathematical Software 17(1): 46-54, 1991. Type: Article
Oct 1 1991
Plotting contour surfaces of a function of three variables
Sewell G. ACM Transactions on Mathematical Software 14(1): 33-41, 1988. Type: Article
Oct 1 1988
Numerical algorithms with C
Engeln-Müllges G., Uhlig F., Springer-Verlag New York, Inc., New York, NY, 1996. Type: Book (9783540605300)
May 1 1997
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy