A Master Theorem for Discrete Divide and Conquer Recurrences

被引:9
作者
Drmota, Michael [1 ]
Szpankowski, Wojciech [2 ]
机构
[1] TU Wien, Inst Discrete Math & Geometry, A-1040 Vienna, Austria
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Algorithms; Divide-and-conquer recurrence; mergesort; Karatsuba algorithm; Strassen algorithm; Boncelet's data compression algorithm; Dirichlet series; Mellin-Perron formula; Tauberian theorem;
D O I
10.1145/2487241.2487242
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Divide-and-conquer recurrences are one of the most studied equations in computer science. Yet, discrete versions of these recurrences, namely T(n) = a(n) + Sigma(m)(j=1)b(j)T(left perpendicular p(j)n + delta(j)right perpendicular) + Sigma(m)(j=1)(b) over bar jT(inverted left perpendicularp(j)n + (delta) over bar (j)inverted right perpendicular) for some known sequence an and given b(j) bj (b) over barj and delta j (delta) over bar, present some challenges. The discrete nature of this recurrence (represented by the floor and ceiling functions) introduces certain oscillations not captured by the traditional Master Theorem, for example due to Akra and Bazzi [1998] who primary studied the continuous version of the recurrence. We apply powerful techniques such as Dirichlet series, Mellin-Perron formula, and (extended) Tauberian theorems of Wiener-Ikehara to provide a complete and precise solution to this basic computer science recurrence. We illustrate applicability of our results on several examples including a popular and fast arithmetic coding algorithm due to Boncelet for which we estimate its average redundancy and prove the Central Limit Theorem for the phrase length. To the best of our knowledge, discrete divide and conquer recurrences were not studied in this generality and such detail; in particular, this allows us to compare the redundancy of Boncelet's algorithm to the (asymptotically) optimal Tunstall scheme.
引用
收藏
页数:49
相关论文
共 33 条
[1]  
Abramowitz M., 1964, Handbook of mathematical functions with formulas, graphs, and mathematical tables, DOI DOI 10.1119/1.15378
[2]   On the solution of linear recurrence equations [J].
Akra, M ;
Bazzi, L .
COMPUTATIONAL OPTIMIZATION AND APPLICATIONS, 1998, 10 (02) :195-210
[3]  
[Anonymous], 1990, Introduction to Algorithms
[4]  
Apostol T.M., 1976, INTRO ANAL NUMBER TH
[5]   BLOCK ARITHMETIC CODING FOR SOURCE COMPRESSION [J].
BONCELET, CG .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (05) :1546-1554
[6]   Lopsided trees, I: Analyses [J].
Choi, V ;
Golin, MJ .
ALGORITHMICA, 2001, 31 (03) :240-290
[7]  
Delange H., 1975, ENSEIGN MATH, V21, P31, DOI 10.5169/seals-47328
[8]  
Delange H., 1954, ANN SCI ECOLE NORM S, V71, P213
[9]   Tunstall Code, Khodak Variations, and Random Walks [J].
Drmota, Michael ;
Reznik, Yuriy A. ;
Szpankowski, Wojciech .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (06) :2928-2937
[10]  
ERDOS P, 1987, PAC J MATH, V126, P227