RÉSUMÉ. Nous
généralisons
en dimension deux la méthode de sin-gularisation developpee
par C.Kraikamp
au cours des années 90 dans ses travaux sur lessystèmes dynamiques
associées aux frac-tions continues, en relation avec certaines
propriétés d’approxi-
mations
diophantiennes.
Nousappliquons
la méthode àl’algo-
rithme de Brun en dimension 2 et montrons comment utiliser cette
technique
et d’autresanalogues
pour transférer des pro-priétés métriques
etdiophantiennes
d’unalgorithme
à l’autre. Uneconséquence
de cette étude est la construction d’unalgorithme
qui améliore lespropriétés d’approximations
par comparaisons aveccelles de
l’algorithme
de Brun.ABSTRACT. The
technique
ofsingularization
wasdevelopped by
C.
Kraaikamp during
the nineties, in connection with his work ondynamical
systems related to continued fractionalgorithms
andtheir
diophantine
approximation properties. Wegeneralize
thistechnique
from one into two dimensions. Weapply
the methodto the the two dimensional Brun’s
algorithm.
Wediscuss,
howthis
technique,
and related ones, can be used to transfer certain metrical anddiophantine
properties from onealgorithm
to theothers. In
particular,
we are interested in thetransferability
of thedensity
of the invariant measure.Finally,
we use this method to construct analgorithm
which improves approximation properties,as
opposed
to Brun’salgorithm.
1. Introduction
The
technique
ofsingularization,
as described in detailsby
M. Iosifescuand C.
Kraaikamp [7] (see
also[9]),
was introduced toimprove
some dio-phantine approximation properties
of theregular
one-dimensional contin- ued fractionalgorithm
in thefollowing
sense: Let be thesequence of
convergents
of anarbitrary
real number x in(o,1), produced by
theregular
continued fractionalgorithm. Singularization
methods allow to transform theoriginal (regular
continuedfraction) algorithm
into newones
(depending
on the actualsetting
of theapplications),
such that theManuscrit reçu le 5 juin 2003.
sequences of
convergents
built from the newalgorithms
aresubsequences
of the
previous
one. Thistechnique
also allows to transfer theunderlying ergodic properties
of onealgorithm
to the other.A
large family
ofsemi-regular
continued fractionalgorithms,
called S-expansions,
can be related to each other viasingularizations (e.g.
the near-est
integer
continued fraction~14~,
Hurwitz’singular
continued fraction[6],
Minkowski’s
diagonal expansion [13],
Nakada’sa-expansions [15, 16]
orBosma’s
optimal
continued fraction~2)).
In this paper, we show that similar
techniques
can beapplied
in di-mension two. We describe
singularization
processes, based on the two- dimensional Brun’salgorithm,
andanalyze
how to usesingularizations
totransfer certain statistical and
approximation properties
towards the re-sulting algorithm.
Inparticular, using
natural extensions of theunderlying ergodic dynamical systems,
we are interested in how to deduce the corre-sponding
invariant measure of the newalgorithms
from thedensity
of theinvariant measure of the
original algorithm.
This is of aspecial
interest withrespect
to recentinvestigations by
the author on similar relations between Brun’salgorithm
and the Jacobi-Perronalgorithm
in two dimensions[19] . Finally,
wepresent
analgorithm TQ
withimproved approximation
prop-erties,
asopposed
to theunderlying
Brun’salgorithm.
2. Definitions
We recall some basic definitions and results on fibered
systems.
For anextensive summary, we refer to a
monograph
of F.Schweiger (23~.
Definition. Let X be a set and T : X - X. If there exists a
partition
{X (i) :
i E7}
ofX,
where I is finite orcountable,
such that the restriction of T toX (i)
isinjective,
then(X, T)
is called afibred system.
I is the set
of digits,
and thepartition {X (i) :
i EI}
is called thetime- 1 -partition.
Definition. A
cylinder of
rank t is the setA block of
digits (i ~ 1 ~ , ... , i ~t~ )
is calledadmissibl e,
ifSince T :
X (i) ~ TX (i)
isbijective,
there exists an inverse mapV (i) : TX (i) ~
which will be called a local inverse branch of T. Definei~2>, ... , i~t~)
:=V(i(l))
0V(i~2>, ... , i(t));
thenV(i(l), i~2~, ... , i(t))
isa local inverse branch of
Tt.
In this paper, the process of
singularization
will beapplied
to the follow-ing algorithm:
Definition
(Brun 1957).
Let M :=bo > b2 > 0~.
Brun’sAlgorithm
isgenerated by
the map Ts : M -M,
whereLet
XB
:=~(xl, x2) :
1 > x2 >01; using
theprojection
map p : M ~XB,
definedby
we obtain the
corresponding
two-dimensional mapTs : XB,
We refer
to j
as thetype
of thealgorithm.
DenoteFurther, 1,
define = :=]Further,
for t >1, define j
(t)il 1 7 -2 1 .- j s 1 2
The
cylinders X$ ( j (1), ... , j (t) )
of the fibredsystem (XB, Ts)
arefull, i. e.,
... , j (t) )
= Thealgorithm
isergodic
and conservative withrespect
toLebesgue
measure(see
Theorem 21 in~23~,
p.50).
Let t > s
1;
the matricesa(t)
:=as(j(t))
of Brun’sAlgorithm
aregiven
asFIGURE 1. The
time-1-partition
of Brun’sAlgorithm Ts
The inverses :=
,~S ( j ~t> )
of the matrices of thealgorithm
withproduce
a sequence of convergence matrices follows:Definition. Let E be the
identity
matrix. ThenHence,
for IThe columns of the convergence matrices
produce Diophantine approxima-
tions to Similar to the
above, j
is referredto as the
type
of a matrix3. The process of
Singularization
The basic idea of
singularization,
as introducedby
C.Kraaikamp [9],
was to
improve approximation properties
of the(one-dimensional) regular
continued fraction
algorithm.
Inparticular,
C.Kraaikamp
was interested incontinued fraction
algorithm (or
class of suchalgorithms),
determinesin an
unambiguous
way theconvergents
to besingularized by using
somespecific
matrix identities.We
give
anexample
for Brun’sAlgorithm
in two dimensions. The fol-lowing
matrix identities areeasily
checked(for
anarbitrary t, Ot and ot
are defined such that either
~t
= 1and Ot
=0,
or~t
= 0and Ot
=1):
type Ml:
Based on these
identities,
we remove any matrix from the sequence of inverse matricesif j(t)
= 0. The matrix~3~t+l~
should then bereplaced according
to the above rule. Thus a new sequence of convergence matri-ces
IQ*(’8)1’0
S S= o is obtainedby removing
s from S 3=Clearly,
thesequence of
Diophantine q*s ) s°_o
ob-tained from the new convergence matrices is a
subsequence
of theoriginal
one.
Now we
apply
the sameprocedure
to anyremaining
matrix oftype 0,
and continue until all such matrices have been removed. That way, a new
algorithm
is defined. This transformation of theoriginal algorithm
into anew one is called a
szngularization.
Weput
this into a moregeneral
form:Definition. A transformation out, defined
by
a matrixidentity
that removesthe matrix
~3~t~
from the sequence of inverse matrices(which changes
analgorithm
into a new form such that the sequence ofDiophantine approxi-
obtained from the new
algorithm
is asubsequence
of theoriginal one)
is called asingularization.
We say we havesingularized
the matrix~3~t~ .
By
thedefinition,
the sequence ofconvergents
of thesingularized algo-
rithm is a
subsequence
of the sequence ofconvergents
of theoriginal
one.Therefore,
if theoriginal algorithm
converges to(Xl, X2)
so does the newone. Now we define the
exponent of
convergence as the supremum of realnumbers d such that for almost all
(Xl, X2)
and all tlarge enough,
theinequalities
hold. Notice that the
exponent
of convergence of thesingularized algorithm
is
always larger
orequal
to the one of theoriginal algorithm.
We
generalize
the definition of matrices~3s ( j ) , j
=0,1, 2,
toWe may thus define a law of
singularization
LM* for Brun’sAlgorithm,
toobtain its
multiplicative
accelerationTM (a different,
butequivalent
ruleLM will be introduced Section
4).
Law of
singularization
LM*:Singularize
every matrixA), using
identities
Mi
andM2.
Consider a block of successive matrices of
type
0. Note that matrix identitiesMi
andM2
allowsingularizations
of these matrices in anarbitrary order, yielding
the samealgorithm,
aslong
as we remove every such matrix.The
resulting algorithm
is the well-knownmultiplicative
acceleration of Brun’sAlgorithm TM : XB - XB,
(compare ~23~,
p.48ff).
All matrices oftype
0 have beenremoved,
andthe new
partition
is definedby
thetypes j = 1, 2
and thepartial quotients
A E N of the
algorithm.
In
particular,
we denoteSimilarly
to theabove,
for t 2:1,
:= andA(t)
:=x2°~)).
Thecylinders
are definedby
thepairs (j~t>, A~t~),
whilethe inverses :=
/~M(j~t~, A~t~),
as well as the convergence matricesncn,
are defined as above.
FIGURE 2. The
time-1-partition
of themultiplicative
accel-eration of Brun’s
Algorithm
4. The natural extension
(X, T)
Following [7],
we may describe the law ofsingularization
indefining
aSingularization
areai. e.,
a set S such thatevery x E S specifies
a matrix,Q
to be
singularized.
To describe S we use the naturel extension of a fibredsystem,
introducedby Nakada,
Ito and Tanaka[16] (see
also[15]
and[3])
but we follow F.
Schweiger ([23],
p.22f).
Definition. Let
(X, T)
be a multidimensional continued fractionalgo-
rithm. A fibred
system (X#, T#)
is called a dualalgorithm
if(1) (i~l~, ... , i~t>)
is an admissible block ofdigits
for T if andonly
if(i~t~,
... ,i~l~)
is an admissible block ofdigits
forT#;
(2)
there is apartition X#(i)
such that the matricesa#(i)
ofT#
re-stricted to
X#(i)
are thetransposed
matrices ofa(i).
Similar to the
above,
letV#(i) : T#X#(i) -> X#(i)
denote the local inverse branches ofT# .
Definition. For any x E
X,
thepolar
setD(x)
is defined as follows:Let y E
X#(i~l~, ... , i~t~). By
thedefinition,
y ED(x)
if andonly
ifV (i (t), - - - , i~l~)(x)
is well defined for all t. Inparticular,
if allcylinders
arefull,
thenD(x)
=X#.
Definition. The
dynamical system (X, T),
where X :={(x, y) :
x EX,
y E and
is called a natural extension of
(X, T).
Definition. Let t >_ 1. A
singularization
area is a set S C X suchthat,
for some fixed
1~, fl(~+~’)
should besingularized
if andonly
if(x(t), yet))
E S.Remark. In
theory,
thesingularization
area could be chosenarbitrarily.
However,
since the process is based on some matrix identities which havean effect on the
remaining matrices,
there are some restrictions similar to the ones described in[7] (section 4.2.3) .
Since we are more ’liberal’ in thesense
that, throughout
this paper, several matrix identities will beused,
there is no such
general description
of these restraints.In case of Brun’s
Algorithm,
we consider the fibredsystem (XB, Ts)
fromabove. A dual
system
can be described as follows. Letand set in
particular
Define
VS : xf -
X
Then
(Xs, Ts)
is a natural extension of(XB,TS).
We now define thesingularization
areaand thus restate the law of
singularization
LM*:Law of
singularization
LM:Singularize,3( ’s")
if andonly
ifusing
matrix identitiesMI
andM2.
By
the definition of,S’M,
the laws ofsingularization
LM and LM* areequivalent.
FIGURE 3. The
singularization
areaSM
Remark. The matrix identities
Ml
andM2,
and thus the law ofsingular-
ization
LM, slightly
differ from the process ofsingularization
described in[7]
and
[9] (compare
matrixidentity 11 given
in Section5). Nevertheless,
thereexists a relation similar to LM between the one-dimensional
regular
contin-ued fraction
algorithm
and the Lehnerexpansions [11].
Lehnerexpansions
are
generated by
a mapisomorphic
to Brun’sAlgorithm TB : (0,1)
---~[0, 1),
This
relation, again
based on ideas similar tosingularization,
is describedin
Dajani
andKraaikamp [5] (see
also Ito[8]).
5.
Eliminating partial quotients
=1, where j ~t~
= 1From now on, we assume that the law of
singularization
LM hasalready
been
applied
to Brun’sAlgorithm Ts i. e.,
in thefollowing,
we consider theresulting multiplicative
acceleration of Brun’sAlgorithm T~.
We are now
going
to define anothersingularization
process: TheSingu-
larization of matrices
/?M(1? 1)?
which will lead to a newalgorithm TI
with betterapproximation properties (as opposed
to bothTs
andTM).
We usethe
following
identities:type 11:
/ ~ . - , / .. - , / ~ . -, , / A -1 n B /.... -t n B / A 1 -I- /_ B
type 12 :
Remark. The matrix
identity 11 corresponds
to theidentity
used in[7]
and
[9]
to define thesingularization
process for the one-dimensional(regu- lar)
continued fractionalgorithm.
Define,
for c E{-1,1~,
the matrices~31(j, A,,E, C)
asConsider a block of
pairs
ofdigits ((j(t), A~t~ ) , ( 1,1 ), (j(t+2) , A(t+2) ~ ~ .
If wesingularize 3M l, then 0(t)
will bereplaced by (h(l, A(t) -I- l, l, 0) (if it)
=1),
orby ,~l(2, A~t>,1,1) (if j (t)
=2).
The matrix/3~+2)
will bereplaced
by ~1~~(t+2)~ A*(t+2)
+1, - 1, 0). Hence,
even ifA(t)
= 1and j (t)
=1,
or
A(t+2) =
1 =1,
we cannotsingularize
one of theresulting
matrices
using
the above identities. In otherwords,
from every block of consecutive matrices/?M(1? 1)
we canonly singularize
every other matrix.We thus have to
specify
which of the matrices of such blocks should besingularized,
and this choice determines theoutcome,
as it can be seeneasily
with the
following example:
Let{,(3M 1’ 0
be a sequence of matrices spec- ifiedby
thepairs
ofdigits ((j~l~, A~1~), ... , (j~t>, A~t~), (1,1), (1,1), (1,1),
~~ (t+4) ~ A(t+4) ~ ~ ~
where bothA(t) 0
1 andA~t+4) ~ 1. Singularizing (t+2)
obviously yields
a differentsubsequence
ofl’o,
and thus a differ-ent
algorithm,
thansingularizing
both,QM 1~
and/3~ B
The class ofS-expansions
for theregular
one-dimensional continued fractionalgorithm
was obtained in
giving
different laws ofsingularizations i. e.,
different choices of matrices to besingularized,
for onesingle
matrixidentity.
Forexample,
the
following
law ofsingularization
can be considered:Law of
singularization
Ll *: From every block of n consecutive matrices,BM(I, 1), singularize
thefirst,
thethird,... matrices, using
identities11
and12.
Remark. Due to the nature of matrix identities
11
and12,
we may notapply
Ll* until the first index swith j(s) 0
1 orStrictly speaking,
Ll* is
only
valid for matrices where t >to,
andto :=
min{s :
= 2 or
A(’)
>11.
Similar restrictions will be true for all laws ofsingularization proposed
from now on.Using
the natural extension(Xyl, TM)
of(XB, TM),
wheresuch that
T M : X M - X M
is definedby
Again,
we may restate Ll * in terms of asingularization
area81
CX M.
We use
VM
to control thepreceding pairs
ofdigits ( j (t-1), A(t-1) ), ( j (t-2) ~ A(t-2»),...
Denotefi
theith
term of Fibonacci’s sequence with initial termsfo
=0, fl
=1,
and letA(Pi , P2, P3)
be thetriangle
definedby
the verticesPl , P2
andP3 .
ThenLaw of
singularization
Ll:Singularize ¡If)
if andonly
ifusing
identities11
or12, accordingly.
FIGURE 4. The
singularization
areaSi (g - v"5--l
Thus Ll is
equivalent
to L l * . Thesingularization yields
a newalgorithm,
which acts on the
following
set(compare Figure 5):
or, more
precisely,
The
resulting algorithm TI : Xi - Xl (the
one definedby
the new matrices0( t))
can be described as follows:Since the
cylinders
of the newalgorithm
are notfull,
weverify
thati.e.,
whenever0,
so is yl(and conversely).
Thus is notempty. Finally,
weput (see Figure 5):
and
to obtain the
system (X I, T1).
6. The
ergodic system
connected with the natural extension Consider the fibredsystem (XB,TM)
and its natural extension(XM,
TM).
LetEm
be thea -algebra generated by
thecylinders
ofXM.
Themultiplicative
acceleration of Brun’sAlgorithm
is known to beergodic
andFIGURE 5. The set
Xl (g- - g - 1)
conservative,
and it admits an invariantprobability
measure whosedensity
isgiven
as of of(see
e.g.Schweiger [20]
or Arnoux andNogueira [1]),
whereCM m 0, 19.
Define
Note
that, by
the definitionsNl
f1X M
=0
andXi
=Sf
UNi.
Next wedefine a transformation sl that
’jumps’
over thesingularization
area,S’1.
Definition. The transformation is defined
by
Using
thetheory
ofjump
transformations(see
e.g.(22~ ),
thisyields
anergodic system (sf, I ASC sl ),
whereEsc 1
is the restriction ofEM
to111
sf andosc
1 is theprobability
inducedby
p M on 1 Notice thatCsc
:=_
1
AM (SC) 0, 78.
Now we mayidentify
the setNi
withby
abijective
map
Ml Xi,
whereMl T M Sl - Nl ,
whileMl
is theidentity
onS+.
1’Definition. The map
MI : X 1
is definedby,
FIGURE 6. Evolution of the sets
El
C andE2
C~S’1
We
get
thefollowing
Theorem 6.1. Consider T1 :
Xi, 71(XI,X2,YI,Y2) =
Then
(X 1, El,
is anergodic dynamical system,
where.1
is the 0’-algebra generated by
thecylinders of Xl,
ILl is theprobability
measure withdensity function
1 1
7. A
cyclic
version of thealgorithm
Consider the
multiplicative
acceleration of Brun’sAlgorithm TM
as de- scribed aboveand,
for tlarge enough,
the convergence matrixFIGURE 7.
Example
for anapproximation
= 1Let
F(Pi, P2)
be defined as the linesegment
between thepoints Pl
andP2.
We observethat, by
construction of theapproximations,
m EFurther,
aslong
as1, ... , j(t+i) -
1 for some i >1,
thenP(t+2), ... , 7 P(mt+’+’) lie on
that same linesegment.
Inparticular,
p(t+i+l)
(t+i)p(t+i 1)
:)(t)P(tl)
m E
C Thus theapproximation
M
EM , M )
CM’ M.
Thus theapproXlma Ion triangles
m M mget
very’long’ i. e.,
the vertexis not
replaced
untilsome 3’(t+’)
=2, 1
> i(Fig. 7).
On the other
hand,
=2,
thenP(t+2)
EP(t")),
and both1 11)
, , M m 7 m
PM
andPM
have beenreplaced
withPM
andP(t+2), respectively.
Wecall this a
cyclic approximation.
We are now
going
to construct analgorithm
that’jumps’
over the ’bad’(in
the abovesense) types .7=1.
Thefollowing
matrixidentity (and
thusthe
corresponding
law ofsingularization)
somewhat is ageneralization
ofthe
identity type 12:
type Q:
lows :
Law of
singularization LQ*:
From any block of matrices((3(t),
...,~3(t+z) ),
=
1, ..., j ~t+z)
=1,
andboth j(t-l)
= 2 =2, singu-
larize the
first,
thesecond,
... the lastmatrix, using identity type Q.
Or
equivalently,
in terms of thesingularization
area :=XM (1 )
x ILaw of
singularization LQ: Singularize (3(t)
if andonly
ifusing
matrixidentity type Q.
Similar to LM and
LM*,
the order ofsingularizing
matrices inLQ* only
is of a certain technical
importance,
and we could define matrix identities which would allowsingularization independent
of the order. Theresulting algorithm,
a’cyclic’
acceleration of Brun’sAlgorithm,
would be the same.Therefore
LQ,
where the order is notdetermined,
isequivalent
toLQ*.
Let
[AI, A2,
... ,As]
denote theregular
one-dimensional continued frac- tionexpansion
withpartial quotients A2, ... , As i. e.,
Consider some t > 0 = 2. Let k >
0,
i > 0 be such =1, ... , j ~t-~)
=1 ~
=2,
,l, ... , j ~t+i)
=1,
2. .The
integers A (t-k-l) ,
... ,~4~)~... ~
are thecorresponding partial quotients
obtainedby
themultiplicative
acceleration of Brun’sAlgorithm (the original algorithm).
Further,
let thecorresponding
t* t be such that is thet*th
con-vergent
obtainedby
the newalgorithm,
where Q = mBy induction,
we
get
the inverse matrices of theresulting algorithm
where
Then
Remark. As
above,
i is thelength
of a block of consecutive matrices oftype j
=1,
andA1, ... , Ai
are thecorresponding partial quotients (result-
ing
from theoriginal algorithm). Ai+1
is thepartial quotient correspond- ing
to the firsttype ji+l = 2.
If i =0,
then0(El, E2, E3)
reduces to0(( A1 , o), ( A1 , A1 ), ( A +1, A +1 )), and
,In
principle,
theresulting algorithm
is definedby
the inverse matrices,~3~t~ . However, the actual construction yields
the difficulty
that the defini-
tions of
Ar)
L andA(t*-’)
Rdepend
on theexplicit knowledge
of thepartial
quotients At-1>, ..., A(t-k).
We may overcome thisproblem
inusing
theWe may define a
cyclic
acceleration of Brun’sAlgorithm
where
Finally,
we defineand
8.
Convergence properties
In
constructing
thecyclic
acceleration of thealgorithm,
we avoid morethan three
partial convergents lying
on a line.Alas,
the methodyields
another
Problem.
While for even,(xi°), x(°))
EA(r(t) r(t-2)
another
problem:
While fork(’)
even,2
C ,this is not true if is odd
(Fig. 8).
To overcome thisproblem,
we haveFIGURE 8.
Example
for anapproximation
aftersingulariza- tion,
= 2and j ~t+2~
= 1to
accept single
matrices oftype j =
1. We propose thefollowing
law ofsingularization:
Law of
singularization Lq*:
Let(~3~t~ , ... , (3(t+i))
be a block of matricessuch
that j(t)
=1, ... , j ~t+z~
=1,
andboth 3(t-’)
= 2 = 2.If i is even, then
singularize
thefirst,
thesecond,...
the lastmatrix, using
identity type Q.
If i isodd,
and i >3,
thensingularize
thefirst,
theSetting
we find
Lq
as anequivalent
law ofsingularization:
Law of
singularization Lq: Singularize ~3~t~
if andonly
ifusing
matrixidentity type Q.
Define
and
consequently,
The
resulting algorithm T q : Xq - X q
can be definedsimilarly
as above:where
The
integers-
andk+
are defined asabove,
and
AL, At, AR, AR,
Cand Ai
are defined as in Section7,
in ,fine, replacing
l~-
by 1~1
andk+ by 1~2, respectively.
kB AtL, AW
L R andCt
as above. Notethat, by
constructionA(t
andCt
areintegers,
andAW
>C(t).
An invariant measure canR R
be
found, although requiring
a certain technicaleffort, using
the methoddescribed in Section 6. The inverse matrices of the
algorithm
aregiven by
where
At-1 =
R 1 = 1. The convergencematrices,
and thus thesequences of
Diophantine approximations,
are defined as above. To esti- mate theexponent
of convergence, we use the modified method ofPaley
and Ursell
~17~,
as described inSchweiger ~22~.
It is based on thefollowing quantities:
Definition. For i =
1, 2,
setand
to
(xl, x2).
We have thefollowing
recursion relations(since
the results hold for bothp(*)
andp2~~,
we writep(.) instead):
From these
relations,
we deduce thefollowing
Lemma 8.1.
Proof.
Weonly
show thecyclic - ~ (t+s) -
2. The othercases are similar. We use the above recursion relations. If
C(t+4) = 0,
thenA~R+4~
= 1. Weget
Similarly,
we haveNow define Tt := max
IPt+4,
Pt+3, Pt+2, Pt+l,Ptl. Using
Lemmata 8.1 -8.3 and the above
definitions,
we estimateSince
almost
everywhere,
we may define a functionto
apply
theergodic
theorem~ 1
almost
everywhere.
Thus TtcK 5 ,
t and pt goes downexponentially.
Westate the
following
Theorem 8.4. For the
algorithm Tq,
there exists a constantdq
suchthat, for
almost all(XI,X2,YI,Y2)
inX q,
there exist aninteger t(XI,X2,YI,Y2),
such that the
inequality
hold
for any t >
x2, Yl,y2).
Remark.
Exponential
convergence ofTq
followsdirectly
fromexponential
convergence of the
multiplicative
acceleration of Brun’sAlgorithm.
How-ever, the
proof
of Theorem 8.4 isinteresting
for a different reason:Hitherto, proofs
forexponential
convergence of Brun’salgorithm
were based on con-sidering
aspecial
subset ofXB i. e.,
the set = ...= j(~)
= 2for some t >
3,
and the induced transformation on this set(compare
R.Meester
[12]
or[18]).
We may now(with respect
to the measure of thesingularization
areaSq)
transfer the aboveresult, especially
the estimateof the
decay using
the function to themultiplicative
ac-celeration of Brun’s
algorithm using
standardtechniques,
whichessentially
were described in the
original
work ofPaley
and Ursell[17].
We immedi-ately
see that notonly
thesespecial sets,
but allcylinders
contribute to theexponential approximation. However,
the estimate of theapproxima-
tion
speed depends
on the size of thequantities q~t+5~ - q~t~ .
The smallerthis
difference,
the better the estimate. Thus the estimategets
worse if alarge
number ofnon-cyclic convergents
with suitablepartial quotients
hasbeen
singularized,
whichessentially
leads to thecounterexample
forcyclic
algorithms
in[17].
of the paper.
References
[1] P. ARNOUX, A. NOGUEIRA, Mesures de Gauss pour des algorithmes de fractions continues
multidimensionnelles. Ann. Sci. Ec. Norm. Super., IV. Sér. 26 (1993), 645-664.
[2] W. BOSMA, Optimal continued fractions, Indag. Math. 49 (1987), 353-379.
[3] W. BOSMA, H. JAGER, F. WIEDIJK, Some metrical observations on the approximation by continued fractions. Indag. Math. 45 (1983), 281-299.
[4] V. BRUN, Algorithmes euclidiens pour trois et quatre nombres. 13 Skand Mat-Kongr,
Helsinki (1957), 45-64.
[5] K. DAJANI, C. KRAAIKAMP, The mother of all continued fractions. Colloq. Math. 84-85 (2000), Pt. 1, 109-123.
[6] A. HURWITZ, Über eine besondere Art des Kettenbruch-Entwicklung reeller Grössen, Acta Math. 12 (1889), 367-405.
[7] M. IOSIFESCU, C. KRAAIKAMP, Metrical Theory of Continued Fractions. Kluwer Academic Publishers, Dordrecht (2002).
[8] S. ITO, Algorithms with mediant convergents and their metrical theory. Osaka J. Math. 26
(1989), No.3, 557-578.
[9] C. KRAAIKAMP, Metric and Arithmetic Results for Continued Fraction Expansions, Aca- demic Thesis, Univ. Amsterdam (1991), pp. 185.
[10] C. KRAAIKAMP, A new class of continued fraction expansions.. Acta Arith. 57 (1991), 1-39.
[11] J. LEHNER, Semiregular continued fractions whose partial denominators are 1 or 2. In:
The Mathematical Legacy of Wilhelm Magnus: Groups, Geometry and Special Functions (Brooklyn, NY, 1992), pp. 407-410. Contemporary Mathematics 169, Amer. Math. Soc., Providence, RI 169 (1992), 407-410.
[12] R. MEESTER, A simple proof of the exponential convergence of the modified Jacobi-Perron
algorithm. Erg. Th. Dyn. Sys. 19 (1999), 1077-1083.
[13] H. MINKOWSKI, Über dis Annäherung an eine reelle Grösse durch rationale Zahlen, Math.
Ann., 54 (1901), 91-124.
[14] B. MINNIGERODE, Über eine neue Methode, die Pell’sche Gleichung aufzulösen, Nachr.
König. Gesellsch. Wiss. Göttingen Math.-Phys. Kl. 23 (1873), 619-652.
[15] H. NAKADA, Metrical theory for a class of continued fraction transformations and their
natural extensions. Tokyo J. Math. 4 (1981), 399-426.
[16] H. NAKADA, S. ITO, S. TANAKA, On the invariant measure for the transformations associ-
ated with some real continued fractions. Keio Eng. Rep. 30 (1977), 159-175.
[17] R.E.A.C. PALEY, H.B. URSELL, Continued Fractions in Several Dimensions. Proc. Camb.
Phil. Soc. 26 (1930), 127-144.
[18] B.R. SCHRATZBERGER, The Exponent of Convergence for Brun’s Algorithm in two Dimen- sions. SBer. Österr. Akad. Wiss. Math.-naturw. Kl. Abt. II, 207 (1998), 229-238.
[19] B.R. SCHRATZBERGER, On the Singularization of the two-dimensional Jacobi-Perron Algo-
rithm. Preprint Universität Salzburg.
[20] F. SCHWEIGER, Invariant measures for maps of continued fraction type. J. Number Theory
39 (1991), No.2, 162-174.
[21] F. SCHWEIGER, Ergodic Theory of Fibred Systems and Metric Number Theory. Clarendon Press, Oxford (1995).
[22] F. SCHWEIGER, The exponent of convergence for the 2-dimensional Jacobi-Perron Algo-
rithm. Nowak, W.G. & Schoissengeier, J. (eds), Proceedings of the Conference of Analytic
and Elementary Number Theory Vienna, 207-213.
[23] F. SCHWEIGER, Multidimensional Continued Fractions. Univ Press, Oxford (2000).
Bernhard SCHRATZBERGER Universitat Salzburg
Institut fur Mathematik Hellbrunnerstra6e 34 5020 Salzburg, Austria
bernhard. schratzbergermsbg. ac . at