Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-s2hrs Total loading time: 0 Render date: 2024-11-08T13:12:34.651Z Has data issue: false hasContentIssue false

2 - Use of polynomial expressions and linear systems

Published online by Cambridge University Press:  03 May 2010

Ryan Kastner
Affiliation:
University of California, San Diego
Anup Hosangadi
Affiliation:
University of California, Santa Barbara
Farzan Fallah
Affiliation:
Stanford University, California
Get access

Summary

Chapter overview

Polynomial expressions and linear systems are found in a wide range of applications: perhaps most fundamentally, Taylor's theorem states that any differentiable function can be approximated by a polynomial. Polynomial approximations are used extensively in computer graphics to model geometric objects. Many of the fundamental digital signal processing transformations are modeled as linear systems, including FIR filters, DCT and H.264 video compression. Cryptographic systems, in particular, those that perform exponentiation during public key encryption, are amenable to modeling using polynomial expressions. Finally, address calculation during data intensive applications requires a number of add and multiply operations that grows larger as the size and dimension of the array increases. This chapter describes these and other applications that require arithmetic computation. We show that polynomial expressions and linear systems are found in a variety of applications that are driving the embedded systems and high-performance computing markets.

Approximation algorithms

Polynomial functions can be used to approximate any differentiable function. Given a set of points, the unisolvence theorem states that there always exists a unique polynomial, which precisely models these points. This is extremely useful for computing complex functions such as logarithm and trigonometric functions and forms the basis for algorithms in numerical quadrature and numerical ordinary differential equations. More precisely, the unisolvence theorem states that, given a set of n + 1 unique data points, a unique polynomial with degree n or less exists.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bartels, R. H., Beatty, J. C., and Barsky, B. A., An Introduction to Splines for Use in Computer Graphics and Geometric Modeling. San Franciso, CA: Morgan Kaufmann Publishers, Inc., 1987.
Muchnick, S. S., Advanced Compiler Design and Implementation. San Francisco, CA: Morgan Kaufmann Publishers, 1997.Google Scholar
Johnson, M. K., Introduction to the GNU C Library, Linux Journal, 1994, 5, 1994.Google Scholar
Rao, K. R. and Yip, P., Discrete Cosine Transform: Algorithms, Advantages, Applications. New York, NY: Academic Press Professional, Inc., 1990.
Richardson, I. E. G., H.264 and MPEG-4 Video Compression. New York, NY: John Wiley and Sons, 2003.CrossRefGoogle Scholar
Tolimieri, R., An, M., and Lu, C., Algorithms for Discrete Fourier Transforms and Convolution. Springer, 1997.
Potkonjak, M., Srivastava, M. B., and Chandrakasan, A. P., Multiple constant multiplications: efficient and versatile framework and algorithms for exploring common subexpression elimination, IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, 15 (2), 151–56, 1996.CrossRefGoogle Scholar
Malvar, H. S., Hallapuro, A., Karczewicz, M., and Kerofsky, L., Low-complexity transform and quantization in H.264/AVC, IEEE Transactions on Circuits and Systems for Video Technology, 13, 598–603, 2003.CrossRefGoogle Scholar
Ercegovac, M. D. and Lang, T., Digital Arithmetic. San Francisco, CA: Morgan Kaufmann Publishers, 2004.Google Scholar
Rivest, R. L., Shamir, A., and Adleman, L., On digital signatures and public-key cryptosystems, IEEE International Symposium on Information Theory, p. 41. Washington, DC: IEEE Computer Society, 1977.Google Scholar
Schneier, B., Applied Cryptography: Protocols, Algorithms and Source Code in C, second edition. New York, NY: John Wiley and Sons Inc, 1996.Google Scholar
Downey, P., Leong, B., and Sethi, R., Computing sequences with addition chains, SIAM Journal of Computing, 10, 638–46, 1981.CrossRefGoogle Scholar
Miranda, M. A., Catthoor, F. V. M., Janssen, M., and Man, H. J., High-level address optimization and synthesis techniques for data-transfer-intensive applications, IEEE Transactions onVery Large Scale Integration (VLSI) Systems, 6, 677–86, 1998.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×