<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Assessing the Quality of Samplers: A Statistical Distance Framework</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Indian Statistical Institute</institution>
          ,
          <addr-line>Kolkata</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <fpage>11</fpage>
      <lpage>17</lpage>
      <abstract>
        <p>Randomized algorithms depend on accurate sampling from probability distributions, as their correctness and performance hinge on the quality of the generated samples. However, even for common distributions like Binomial distribution, exact sampling is computationally challenging, leading standard library implementations to rely on heuristics. These heuristics, while eficient, sufer from approximation and system representation errors, causing deviations from the ideal distribution. Although seemingly minor, such deviations can accumulate in downstream applications requiring large-scale sampling, potentially undermining algorithmic guarantees. We propose statistical distance as a robust metric for analyzing the quality of samplers, quantifying deviations from the ideal distribution. We derive rigorous bounds on the statistical distance for standard implementations of samplers and demonstrate the practical utility of our framework and propose an interface extension that allows users to control and monitor statistical distance via explicit input/output parameters.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Distribution Sampler</kwd>
        <kwd>Indistinguishability</kwd>
        <kwd>Binomial Distribution</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Uddalok Sarkar</p>
    </sec>
    <sec id="sec-2">
      <title>1. Motivation</title>
      <p>
        Randomization stands as a cornerstone of computer science, permeating algorithm design from the
ifeld’s earliest days to its cutting-edge developments. From Quicksort [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], one of the most widely-used
algorithms, to modern cryptographic protocols, randomization has proven indispensable in achieving
eficiency and functionality that deterministic approaches struggle to match. While the fundamental
question of whether randomization ofers additional computational power over determinism remains
open, randomized algorithms have established themselves as the preferred choice in numerous domains,
including data structures [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], hash functions [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and probabilistic data structures [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>At the heart of every randomized algorithm lies its ability to sample from probability distributions.
The algorithm’s correctness and performance guarantees intrinsically depend on the quality of these
samples. For instance, a hash table’s performance relies on the uniformity of its hash function’s output
distribution, while a Monte Carlo algorithm’s accuracy depends on the fidelity of its random sampling
process. This fundamental reliance on sampling has led to the development of sophisticated sampling
algorithms implemented as standard library functions.</p>
      <p>
        While specialized techniques exist for generating high-quality samples from certain distributions [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
these approaches typically circumvent direct probability mass computation through transformations of
basic random processes. However, such techniques remain constrained to specific distributions
exhibiting particular mathematical properties. In practice, standard library implementations predominantly
rely on transformed rejection sampling [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6, 7, 8</xref>
        ], which necessitates explicit probability mass
computation. These computations entail multiple arithmetic operations and specialized function evaluations,
including factorial and logarithm computations, thereby introducing approximation errors at each step.
The accumulation of these errors can significantly impact the statistical properties of the generated
samples, potentially compromising the theoretical guarantees of algorithms that depend on them.
      </p>
      <p>
        In this work, we focus on analyzing standard library implementations of Binomial samplers, which
are largely based on transformed rejection sampling techniques [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6, 7, 8</xref>
        ]. These implementations require
computation of Binomial distribution probability mass, denoted by ,(), necessitating approximations
of factorial terms [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], logarithmic computations [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and various arithmetic operations. While such
approximations enable eficient sampling, they introduce systematic deviations from the ideal Binomial
distribution that current implementations neither quantify nor report to users. These deviations can
accumulate and potentially trigger cascading failures in downstream applications [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]. Despite the
widespread adoption of these libraries, there exists no documentation providing precise analysis of
accumulated errors.
      </p>
      <p>The primary research problem we address is: how to develop a rigorous methodology to analyze the
errors in existing samplers to provide meaningful measurement of their impact on downstream applications?
This question is particularly pertinent given the increasing reliance on randomized algorithms in critical
applications, where understanding and quantifying sampling errors becomes crucial for ensuring system
reliability and correctness.</p>
      <p>Our first contribution is a rigorous framework for analyzing the quality of existing samplers through
the lens of statistical distance. We advocate statistical distance as a theoretically sound metric for
quantifying sampler quality, owing to its fundamental property of indistinguishability. Let  and 
be two probability distributions with statistical distance at most  , i.e.,   (, ) ≤  . Then, for
any statistical test  (even computationally unbounded), the diference in its acceptance probabilities
when run on samples from  versus samples from  cannot exceed  . This fundamental property has
profound implications for sampler quality analysis: if a sampler’s output distribution has a statistical
distance  from the ideal distribution, then the downstream application cannot experience an error
greater than  , regardless of its computational sophistication. Building on this theoretical foundation,
we present a detailed analysis of state-of-the-art implementations, deriving concrete bounds on their
deviation from the ideal distributions through careful decomposition of numerical approximation errors.
We propose an extension to sampler interfaces that exposes statistical distance as an input/output
parameter, enabling users to control the sampling accuracy.</p>
      <p>We believe our work highlights a fundamental challenge in randomized computation: the need for
rigorous analysis of sampler implementations to establish precise error bounds and enhance trust in
randomized algorithms. Our approach of integrating error analysis into algorithmic frameworks opens
new avenues for developing robust randomized algorithms that maintain both theoretical guarantees
and practical eficiency. This work will likely motivate the broader community to examine and enhance
the reliability of randomized computation implementations, particularly in the context of standard
library functions that serve as building blocks for numerous algorithms.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Related Work</title>
      <p>
        Considerable efort has been devoted to designing samplers that generate samples with arbitrary
precision and provably no deviation from the original distribution, a concept referred to as exact
sampling. This line of work dates back to Von Neumann and has been further developed in studies
such as Karney [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], which propose arbitrarily precise algorithms for sampling from distributions like
the normal and exponential distributions. Similar significant attention has been given to designing
exact Binomial samplers [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ] as well. But these algorithms are often impractical for large-scale
applications due to their high computational complexity, which is typically linear in the size of the
sample space. Constant time sampling algorithms for binomial distributions are categorized under
the framework of transformed rejection sampling [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. These algorithms achieve a sampling time
complexity of (1), but at the cost of approximations. The framework needs to evaluate the probability
mass function, which is computationally expensive unless approximated.
      </p>
      <p>
        The impact of numerical accuracy on computational programs has been extensively studied.
Significant research has been conducted to analyze errors in arithmetic operations [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Recently, Blanchard
et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], Bonnot et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] have explored how these errors afect the performance of functions such
as log-sum-exp and softmax. These studies underscore the critical need to account for the inherent
numerical errors when designing algorithms and assessing their performance.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Proposal for Extending Sampler Interfaces</title>
      <p>Since exact sampling from distributions such as Binomial distribution is computationally expensive
for most parameters of interest, the standard libraries rely on approximations to achieve practical
eficiency. While these approximations significantly reduce time complexity, they introduce deviations
from the actual distribution, efectively causing the samples to come from a distribution diferent from
the intended one. Therefore, we need to focus on a fundamental question: how do we make systems that
rely on samplers trustworthy?</p>
      <p>Simply ignoring these deviations is not advisable, as they can have cascading efects that compromise
the correctness of the entire system. Often, a user designs a randomized algorithm  to solve a particular
problem, with an upper bound  on its failure probability. If  relies on a standard Binomial sampler
without knowledge of the sampler’s quality, the program may experience a higher failure rate due to
approximations in the underlying samplers.</p>
      <sec id="sec-4-1">
        <title>3.1. Statistical Distance as Quality Metric</title>
        <p>Our proposal immediately raises the question: how should one measure the quality of the sampler?
To this end, we first focus on the fact that the objective of the measurement of quality is to allow the
end user to quantify the impact of the usage of the sampler. There are several metrics, such as
KLdivergence, statistical distance, and Hellinger distance, that have been proposed in the literature focused
on probability distributions that seek to quantify the distance between two probability distributions. In
this regard, a natural question is to ask what distance metric we should choose. To this end, we propose
the usage of statistical distance (Definition 3.1) as the metric to report the quality.</p>
        <p>Definition 3.1 (Statistical Distance). Suppose two distributions ,  are defined over the set Ω . Then,
  (, ) = 1 ∑︁ | () − ()| = sup
2 ⊆Ω
∈Ω
| () − ()|.</p>
        <p>Our proposal for statistical distance stems from its ability to allow end users to derive the worst-case
bounds on the behavior of the system in a black-box manner.</p>
        <p>Lemma 3.1. Let  be a randomized algorithm that uses randomness from a source distribution  , and let
Bad be an event in the output of . If  is replaced by another distribution , then the probability of the
event Bad is bounded by the statistical distance between:
⃒ ⃒
⃒ Pr ((; ) ∈ Bad) − Pr∼ ((; ) ∈ Bad)⃒⃒ ≤    (, ).</p>
        <p>⃒⃒ ∼ ⃒
Proof. Let  ⊆ Ω be the set of random strings (or, numbers) that trigger the event Bad. Then we can
equate the above term with | () − ()| . Therefore using Definition 3.1, we have | () − ()| ≤
sup⊆Ω | () − ()| =    (, ).</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Integrating Analysis in Applications</title>
        <p>The correctness of randomized algorithms typically relies on access to exact samples from a target
distribution  . However, in practice, algorithms must use samplers that draw from an approximate
distribution , potentially compromising their theoretical guarantees. We propose a systematic
framework for incorporating these approximations while maintaining rigorous error bounds through minimal
modifications to existing algorithms and their analyses.</p>
        <p>Algorithm Modification. Let  be a randomized algorithm that requires samples from distribution
 . We modify  to explicitly track and bound the accumulated error from using an approximate
sampler as follows: (1) Introduce an error budget parameter  1 representing the maximum allowable
error due to sampling approximations. (2) Initialize an error accumulator  ′ ← 0 . (3) For each sampler
invocation, update the accumulated error:  ′ ←  ′ +   (, ) where   (, ) is the pre-computed
statistical distance bound. (4) If  ′ &gt;  1, abort execution.</p>
        <p>Analysis Modification. Let  2 denote the original error probability of algorithm  assuming access
to exact samples from  . After incorporating the sampling approximation error  2, the total error
probability  is bounded by:  ≤  1 +  2. This framework maintains theoretical guarantees while
transparently accounting for sampling approximations. The modifications are minimal and the analysis
remains straightforward.</p>
        <p>An alternative approach would be to directly analyze algorithm  with respect to the approximate
distribution . However, this presents several challenges. The target distribution  often possesses
mathematically convenient properties that facilitate analysis, while the implementation-specific 
may lack such properties, making direct analysis intractable. Furthermore, updates to the underlying
sampler implementation would inevitably necessitate re-analysis of every dependent algorithm.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Our Current Results</title>
      <p>
        The results presented in this section are based on the standard Binomial sampling algorithm [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], which
is widely-used in practice. Let , denote the ideal Binomial distribution with parameters  and ,
defined as:
      </p>
      <p>︂( )︂
,() =  (1 − ) − ,  ∈ [0, ].</p>
      <p>We analyze the statistical distance between the distribution generated by the standard Binomial
sampler and the ideal Binomial distribution. The key result is a bound on this statistical distance, which
quantifies the error introduced by the sampling process.</p>
      <p>Theorem 4.1. Let the precision of the context be  ≥ max(2⌈log 2 ⌉, ⌈− log 2 ⌉), and let B,inSamp
BinSamp
denote the distribution from which BinSamp samples are drawn. The statistical distance between ,
and , is given by:</p>
      <p>(,, B,inSamp) ≤ (1110 + 3 +  + ) + 15 + ()
where ,  are constants depending on the sampler,  denotes the error bound due to the factorial
approximation,  = 21 represents the unit round-of error, and () denotes higher order terms.</p>
      <sec id="sec-5-1">
        <title>4.1. A Case Study: DNF Counting</title>
        <p>
          This case study demonstrates how our proposed bounds on the statistical distance between the
sampler and the Binomial distribution can be easily integrated into practical tools. To demonstrate the
applicability of the bounds, we utilize them in conjunction with an of-the-shelf Binomial sampler
to implement the DNF Counting algorithm APSEst [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. This case study illustrates how our results
allow users to maintain the theoretical guarantees of APSEst. Computing bounds on   between
the Binomial distribution and the sampler, users can adjust the confidence parameter  in APSEst to
account for errors from the underlying Binomial sampler, thereby ensuring correctness with theoretical
guarantee.
        </p>
      </sec>
      <sec id="sec-5-2">
        <title>Algorithm Modification</title>
        <p>
          We demonstrate how the APSEst algorithm can be easily modified to incorporate our statistical distance
bounds. We denote this modified version as APSEst2 (Algorithm 1) with the modifications highlighted.
The primary diference between APSEst and APSEst2 lies in handling the confidence parameter  to
account for the errors due to the underlying binomial sampler. Specifically, APSEst2 introduces an
additional parameter  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] to adjust the error budget for the sampler. In particular,  is allocated as
the error budget for the sampler, while (1 − ) is reserved for the algorithm itself. If the accumulated
error due to the sampler exceeds its budget, APSEst2 halts immediately and returns Fail. The user can
restart the algorithm with a larger value of  to accommodate an increased error budget.
        </p>
        <p>Algorithm 1: APSEst2(, , , )
(The modifications from APSEst → APSEst2 are highlighted)
1  1 ← 
2  2 ← (1 − )
3 Initialize  ←
︁( log(4/ 2)+log  )︁</p>
        <p>2
We now illustrate how the analysis of APSEst can be easily adapted to APSEst2. Let |sol()| denote
the number of solutions of the DNF formula  . We are concerned with the event || ∈/ (1 ± )|sol()| ,
which we will refer to as Bad. Note that  1 =  is the error budget for the sampler, and  2 = (1 − ) is
the error budget for the algorithm. By the correctness guarantee of APSEst, Pr, (Bad) ≤  2. During
the execution of APSEst2, if the algorithm invokes the sampler  times with parameters (, ), then
from Lemma 1, we have</p>
        <p>Pr (Bad) ≤ Pr,(Bad) + ∑︁   (, , Bin,Samp).</p>
        <p>Bi,nSamp =1</p>
        <p>Suppose during the execution, the computed   bounds using Theorem 1 are given by
 11,1 ,  22,2 , . . . ,  , , and let  ′ = ∑︀</p>
        <p>=1  , . Therefore, if APSEst2 does not halt and returns Fail,
then</p>
        <p>BiP,nSramp(Bad) ≤ Pr,(Bad) + ∑=︁1   (, , Bin,Samp) ≤  2 +  ′ ≤  2 +  1 ≤ .
Thus, by the correctness of APSEst, the count returned by APSEst2 is within the  error bound. If
APSEst2 halts and returns Fail, this implies that the error budget has been exceeded.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Proposal for Future Work</title>
      <p>In this work, we first identified the sources of deviation in the practical implementations of standard
binomial samplers. We observed that exact sampling from distributions is infeasible in practice due
to high runtime overhead; thus, implementations inevitably introduce deviations. Accordingly, we
proposed the usage of statistical distance as the quality metric owing to its ability to allow end users to
obtain sound bounds on the bad events. We also presented a case study demonstrating the minimal
efort required by system designers to incorporate the reported deviation bounds into their systems.</p>
      <p>While our current work establishes a foundational framework, there are several limitations and
opportunities for future enhancement. The current analysis relies on several simplifying
assumptions—for instance, uniformity in the error distribution—which may not hold in more general settings.
Additionally, the reported bounds are not yet tight and can be refined for greater accuracy, making
this an important avenue for further research. Moreover, the principles of quality measurement can be
extended to samplers for other distributions. Developing a general framework for error reporting across
various types of samplers would be a valuable contribution to the field. Finally, proposing eficient
sampling schemes that can achieve the desired statistical distance with minimal overhead is an open
problem that warrants further investigation.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author used ChatGPT to: Grammar and spelling check,
Paraphrase and reword. After using this service, the author reviewed and edited the content as needed
and takes full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C. A. R.</given-names>
            <surname>Hoare</surname>
          </string-name>
          , Algorithm 64: quicksort,
          <source>Communications of the ACM</source>
          <volume>4</volume>
          (
          <year>1961</year>
          )
          <fpage>321</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>W.</given-names>
            <surname>Pugh</surname>
          </string-name>
          ,
          <article-title>Concurrent maintenance of skip lists</article-title>
          ,
          <source>Citeseer</source>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Carter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Wegman</surname>
          </string-name>
          ,
          <article-title>Universal classes of hash functions</article-title>
          ,
          <source>in: STOC</source>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B. H.</given-names>
            <surname>Bloom</surname>
          </string-name>
          ,
          <article-title>Space/time trade-ofs in hash coding with allowable errors</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>13</volume>
          (
          <year>1970</year>
          )
          <fpage>422</fpage>
          -
          <lpage>426</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C. F.</given-names>
            <surname>Karney</surname>
          </string-name>
          ,
          <article-title>Sampling exactly from the normal distribution</article-title>
          ,
          <source>ACM Transactions on Mathematical Software (TOMS) 42</source>
          (
          <year>2016</year>
          )
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>W.</given-names>
            <surname>Hörmann</surname>
          </string-name>
          ,
          <article-title>The generation of binomial random samples</article-title>
          ,
          <source>Journal of statistical computation and simulation 46</source>
          (
          <year>1993</year>
          )
          <fpage>101</fpage>
          -
          <lpage>110</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Hörmann</surname>
          </string-name>
          ,
          <article-title>The transformed rejection method for generating poisson random variables</article-title>
          ,
          <source>Insurance: Mathematics and Economics</source>
          <volume>12</volume>
          (
          <year>1993</year>
          )
          <fpage>39</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>W.</given-names>
            <surname>Hörmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leydold</surname>
          </string-name>
          , G. Derflinger,
          <string-name>
            <given-names>W.</given-names>
            <surname>Hörmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leydold</surname>
          </string-name>
          , G. Derflinger,
          <article-title>Transformed density rejection (tdr), Automatic Nonuniform Random Variate Generation (</article-title>
          <year>2004</year>
          )
          <fpage>55</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Lanczos</surname>
          </string-name>
          ,
          <article-title>A precision approximation of the gamma function</article-title>
          ,
          <source>Journal of the Society for Industrial and Applied Mathematics, Series B: Numerical Analysis</source>
          <volume>1</volume>
          (
          <year>1964</year>
          )
          <fpage>86</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>J. M. Borwein</surname>
            ,
            <given-names>P. B.</given-names>
          </string-name>
          <string-name>
            <surname>Borwein</surname>
          </string-name>
          ,
          <article-title>The arithmetic-geometric mean and fast computation of elementary functions</article-title>
          ,
          <source>SIAM review 26</source>
          (
          <year>1984</year>
          )
          <fpage>351</fpage>
          -
          <lpage>366</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>K.</given-names>
            <surname>Binder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. W.</given-names>
            <surname>Heermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Binder</surname>
          </string-name>
          ,
          <source>Monte Carlo simulation in statistical physics,</source>
          volume
          <volume>8</volume>
          , Springer,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>N. T.</given-names>
            <surname>Thomopoulos</surname>
          </string-name>
          ,
          <source>Essentials of Monte Carlo simulation: Statistical methods for building simulation models, Springer Science &amp; Business Media</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Devroye</surname>
          </string-name>
          ,
          <article-title>Generating the maximum of independent identically distributed random variables</article-title>
          ,
          <source>Computers &amp; Mathematics with Applications</source>
          <volume>6</volume>
          (
          <year>1980</year>
          )
          <fpage>305</fpage>
          -
          <lpage>315</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Farach-Colton</surname>
          </string-name>
          , M.-T. Tsai,
          <article-title>Exact sublinear binomial sampling</article-title>
          ,
          <source>Algorithmica</source>
          <volume>73</volume>
          (
          <year>2015</year>
          )
          <fpage>637</fpage>
          -
          <lpage>651</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Devroye</surname>
          </string-name>
          ,
          <article-title>Nonuniform random sample generation</article-title>
          ,
          <source>Handbooks in operations research and management science 13</source>
          (
          <year>2006</year>
          )
          <fpage>83</fpage>
          -
          <lpage>121</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Brent</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Percival</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <article-title>Error bounds on complex floating-point multiplication</article-title>
          ,
          <source>Mathematics of Computation</source>
          <volume>76</volume>
          (
          <year>2007</year>
          )
          <fpage>1469</fpage>
          -
          <lpage>1481</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Blanchard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Higham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. J.</given-names>
            <surname>Higham</surname>
          </string-name>
          ,
          <article-title>Accurately computing the log-sum-exp and softmax functions</article-title>
          ,
          <source>IMA Journal of Numerical Analysis</source>
          <volume>41</volume>
          (
          <year>2021</year>
          )
          <fpage>2311</fpage>
          -
          <lpage>2330</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Bonnot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Boyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Faissole</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Marché</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rieu-Helft</surname>
          </string-name>
          ,
          <article-title>Formally verified rounding errors of the logarithm sum exponential function</article-title>
          , in: FMCAD, TU Wien Academic Press,
          <year>2024</year>
          , pp.
          <fpage>251</fpage>
          -
          <lpage>260</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Meel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Vinodchandran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chakraborty</surname>
          </string-name>
          ,
          <article-title>Estimating the size of union of sets in streaming models</article-title>
          ,
          <source>in: Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>126</fpage>
          -
          <lpage>137</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>