Abstract
Pseudo-splines form a family of subdivision schemes that provide a natural blend between interpolating schemes and approximating schemes, including the Dubuc–Deslauriers schemes and B-spline schemes. Using a generating function approach, we derive expressions for the symbols of the symmetric m-ary pseudo-spline subdivision schemes. We show that their masks have positive Fourier transform, making it possible to compute the exact Hölder regularity algebraically as a logarithm of the spectral radius of a matrix. We apply this method to compute the regularity explicitly in some special cases, including the symmetric binary, ternary, and quarternary pseudo-spline schemes.
Similar content being viewed by others
References
Cavaretta, A.S., Dahmen, W., Micchelli, C.A.: Stationary subdivision. Mem. Am. Math. Soc. 93(453), vi+186 (1991)
Charina, M.: Finiteness conjecture and subdivision. Appl. Comput. Harmon. Anal. 36(3), 522–526 (2014)
Conti, C., Gemignani, L., Romani, L.: Exponential pseudo-splines: looking beyond exponential B-splines. J. Math. Anal. Appl. 439(1), 32–56 (2016)
Conti, C., Hormann, K.: Polynomial reproduction for univariate subdivision schemes of any arity. J. Approx. Theory 163(4), 413–437 (2011)
Daubechies, I.: Guskov, Igor, Sweldens, Wim: Regularity of irregular subdivision. Constr. Approx. 15(3), 381–426 (1999)
Daubechies, I., Han, B., Ron, A., Shen, Z.: Framelets: MRA-based constructions of wavelet frames. Appl. Comput. Harmon. Anal. 14(1), 1–46 (2003)
Deng, C., Kai, H.: Pseudo-spline subdivision surfaces. Comput. Gr. Forum 33(5), 227–236 (2014)
Deslauriers, G., Dubuc, S.: Symmetric iterative interpolation processes. Constr. Approx. 5(1), 49–68 (1989)
Dyn, N., Levin, D., Gregory, J.A.: A 4-point interpolatory subdivision scheme for curve design. Comput. Aided Geom. Des. 4(4), 257–268 (1987)
Dong, B., Dyn, N., Hormann, K.: Properties of dual pseudo-splines. Appl. Comput. Harmon. Anal. 29(1), 104–110 (2010)
Dong, B., Zuowei, S.: Linear independence of pseudo-splines. Proc. Am. Math. Soc. 134(9), 2685–2694 (2006)
Dong, B., Zuowei, S.: Pseudo-splines, wavelets and framelets. Appl. Comput. Harmon. Anal. 22(1), 78–104 (2007)
Dubuc, S.: Interpolation through an iterative scheme. J. Math. Anal. Appl. 114(1), 185–204 (1986)
Dyn, N., Floater, M.S., Hormann, K.: A \(C^2\) four-point subdivision scheme with fourth order accuracy and its extensions, Mathematical methods for curves and surfaces: Tromsø 2004, Mod. Methods Math. Nashboro Press, Brentwood, TN (2005), 145–156
Dyn, N., Kai, H., Malcolm, A.S., Shen, Z.: Polynomial reproduction by symmetric subdivision schemes. J. Approx. Theory 155(1), 28–42 (2008)
Dyn, N., Levin, D.: Subdivision schemes in geometric modelling. Acta Numer. 11, 73–144 (2002)
Floater, M.S.: A piecewise polynomial approach to analyzing interpolatory subdivision. J. Approx. Theory 163(11), 1547–1563 (2011)
Floater, M.S., Muntingh, G.: Exact regularity of pseudo-splines, http://arxiv.org/pdf/1209.2692.pdf
Floater, M.S., Siwek, B.P.: Analysis of Hermite subdivision using piecewise polynomials. BIT Numer. Math. 53(2), 397–409 (2013)
Han, B.: Computing the smoothness exponent of a symmetric multivariate refinable function. SIAM J. Matrix Anal. Appl. 24(3), 693–714 (2002)
Han, B., Rong-Qing, J.: Multivariate refinement equations and convergence of subdivision schemes. SIAM J. Math. Anal. 29(5), 1177–1199 (1998). (electronic)
Hassan, M.F.: Multiresolution in Geometric Modelling: Subdivision Mark Points and Ternary Subdivision, Ph.D. Thesis, University of Cambridge (2005)
Hassan, M.F., Dodgson, N.A.: Ternary and three-point univariate subdivision schemes Curve und surface fitting, Saint-Malo 2002. In: Fifth international conference on curves and surfaces. pp. 199–208, Nashboro Press, Brentwood, TN (2003)
Hechler, J., Bernhard, M., Ulrich, R.: C1-continuity of the generalized four-point scheme. Linear Algebra Appl. 430(11), 3019–3029 (2009)
Ivrissimtzis, I., Sabin, M.A., Dodgson, N.A.: On the support of recursive subdivision. ACM Trans. Gr. 23(4), 1043–1060 (2004)
Jia, R.Q., Micchelli, C.A.: Using the Refinement Equations for the Construction of Pre-wavelets. II. Powers of Two, Curves and Surfaces, (Chamonix-Mont-Blanc, 1990), pp. 209–246. Academic Press, Boston (1991)
Ko, K.P., Lee, B.-G., Yoon, G.J.: A ternary 4-point approximating subdivision scheme. Appl. Math. Comput. 190(2), 1563–1573 (2007)
Lian, J.-A.: On \(\alpha \)-ary subdivision for curve design. III. \(2m\)-point and \((2m+1)\)-point interpolatory schemes. Appl. Appl. Math. 4(2), 434–444 (2009)
Möller, C.: A New Strategy for Exact Determination of the Joint Spectral Radius, Ph.D. thesis, Technische Universität Darmstadt, 2015, http://tuprints.ulb.tu-darmstadt.de/4603/
Möller, C., Reif, U.: A tree-based approach to joint spectral radius determination. Linear Algebra Appl. 463, 154–170 (2014)
Muntingh, G.: Personal Website, available at https://sites.google.com/site/georgmuntingh/academics/software
Mustafa, G., Khan, F.: A new 4-point \(C^3\) quaternary approximating subdivision scheme, Abstr. Appl. Anal., (2009), Art. ID 301967
Nicola, G., Protasov, V.: Exact computation of joint spectral characteristics of linear operators. Found.Comput. Math. 13(1), 37–97 (2013)
Rioul, O.: Simple regularity criteria for subdivision schemes. SIAM J. Math. Anal. 23(6), 1544–1576 (1992)
Zheng, H., Hu, M., Peng, G.: Constructing \((2n-1)\)-point ternary interpolatory subdivision schemes by using variation of constants, In: International Conference on Computational Intelligence and Software Engineering (CiSE ’09), (2009)
Acknowledgements
I am grateful to Maria Charina and Michael Floater for the many discussions on the topic of this paper. This projected was supported by a FRINATEK grant, project number 222335, from the Research Council of Norway.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Lars Eldén.
Appendix: Regularity of m-ary subdivision
Appendix: Regularity of m-ary subdivision
It is well known [20, 34] that for symmetric interpolatory schemes with positive Fourier transform, it is possible to determine the Hölder regularity exactly. In the report [18] it was shown that this is possible for non-interpolatory binary schemes as well. In this appendix we show that these results generalize to the general m-ary scheme (2.1) (cf. [22] for the ternary case). This is related to results described in [2, 29, 30], which show that the underlying mathematical reason for the correctness of the method is the validity of the finiteness conjecture for the joint spectral radius of subdivision submatrices derived from schemes with positive Fourier transform.
In this appendix we suppose that a(z) satisfies the conditions (2.5b) for polynomial generation up to some degree \(r\ge 0\), and, after shifting the coefficients \(a_k\) as necessary, that the mask \({\mathbf {b}}= (b_j)_j\) corresponding to b(z) is odd symmetric and centered at zero, i.e.,
for some \(p \ge 0\). Then the Fourier transform of \({\mathbf {b}}\),
is real and periodic with period \(2\pi \).
1.1 Regularity as a decay rate of differences of the data
The regularity of the limit function f is related to the decay rate of divided differences of the scheme. For each integer \(s \ge 0\), let \(f_{\ell ,j}^{[s]}\) denote the divided difference of the values \(f_{\ell ,j-s},\ldots ,f_{\ell ,j}\) at the corresponding m-adic points \(m^{-\ell }(j-s),\ldots ,m^{-\ell }j\). That is,
Under condition (2.5), there is a scheme for the \(f_{\ell ,j}^{[s]}\) for \(s=0,\ldots ,r+1\). Writing
this scheme takes the equivalent forms
Consider the differences \(g_{\ell ,j}^{[r]}\) (of the divided differences) of the data and the corresponding symbol, defined by
The following lemma relates the decay rate of \(g_{\ell ,j}^{[r]}\) to the regularity of the limit function f. It was shown to hold for binary schemes in [16, Theorem 4.9] and for ternary schemes in [22, Theorem 3.4.4], but also holds for schemes with general arity m.
Lemma 6.1
Suppose that, for large enough \(\ell \),
for some constants K and \(\lambda < 1\). Then \(f^{(r)} \in C^0\). Moreover, if \(1/m< \lambda < 1\), then \(f^{(r)} \in C^{-\log _m(\lambda )}\).
Proof
To simplify notation, let us drop the superscripts in \(g^{[r]}_{\ell ,j}, g^{[r]}_\ell (z), f^{[r]}_{\ell ,j}\), \(f^{[r]}_\ell (z)\), \(f^{(r)}, a^{[r]}(z)\). Using the standard parametrization, let \(L_\ell \) denote the piecewise linear function through the points \((m^{-\ell }j, f_{\ell ,j})\) at level \(\ell \). We first bound the maximal difference between these piecewise linear functions at levels \(\ell \) and \(\ell +1\) in terms of the differences at level \(\ell \). Since this maximum is attained at one of the breakpoints,
where, writing \(j = mj' + \varepsilon \),
with corresponding symbol
Therefore
with
But \(d(1) = a(1)/m - 1 = 0\) by (2.4b), so that \(d(z) = (1 - z)e(z)\), with \(e(z) = \sum _j e_j z^j\) a Laurent polynomial. Therefore
or equivalently
Using (6.5), we obtain, for some constant \(K_1\),
from which it follows that \([L_\ell ]_\ell \) is a Cauchy sequence. Equipped with the infinity norm \(\Vert \cdot \Vert _\infty \), the space of bounded continuous functions on the real line is complete, and \([L_\ell ]_\ell \) converges uniformly to a continuous function f. Moreover,
so that \([L_\ell ]_\ell \) converges to f with rate \(\lambda \). In addition, note that
implying
It suffices to verify the Hölder condition locally. Let x, y be such that \(m^{-\ell } \le |x - y| \le m^{-\ell + 1}\), so that
implying that \(f\in C^{-\log _m(\lambda )}\) whenever \(1/m< \lambda < 1\).
1.2 Growth rate of the differences of the data
How can we use (6.4) in the case that it holds with \(\lambda \ge 1\)? Then we do not know whether \(f \in C^r\), but if \(r \ge 1\) we can use the ‘reduction procedure’ of Daubechies, Guskov, and Sweldens [5] to obtain information about lower order derivatives. Although the procedure was shown to work for binary interpolatory schemes in [5], it also applies to the more general scheme (2.1).
Lemma 6.2
Suppose (2.5b) holds for some \(r \ge 1\). If (6.4) holds for some \(\lambda \), then there are constants \(D_1, D_2, D_3\) such that
Proof
Since \(a^{[r]}(z) := a(z)/\sigma _m^r(z)\), one has \(a^{[r]}(1) = a(1) = m\). Moreover, by the divisibility assumption (2.5b), \(a^{[r]}\) is divisible by \((1 - z^m)/(1 - z)\) so that \(a^{[r]}(\zeta _m^k) = 0\) for \(k = 1,\ldots , m-1\). It follows that
which, together with (6.3), implies that there is a constant \(K_1\) such that
So, for any level \(\ell \ge 1\), if we represent any \(j \in \mathbb {Z}\) in m-ary form as \(j = j_\ell \), where
for some \(j_0 \in \mathbb {Z}\) and \(s_1,\ldots ,s_\ell \in \{0,1,\ldots ,m-1\}\), then
Hence,
for some constant \(K_2\), and since
this gives the result in the two cases \(\lambda > 1\) and \(\lambda = 1\).
By applying this procedure recursively, it follows that if (6.4) holds for any \(\lambda \) with \(1/m< \lambda < m^r\), then \(f \in C^{r-\log _m(\lambda )}\) if \(\log _m(\lambda )\) is not an integer, and \(f \in C^{r-\log _m(\lambda ) - \varepsilon }\) for any small \(\varepsilon > 0\) if \(\log _m(\lambda )\) is an integer.
1.3 Growth rate of the iterated scheme for the differences
If \(p=0\) in (6.1), then \(b_0 = 1\) by (2.4b) and (2.5b). In this case the scheme (2.1) is the m-ary B-spline scheme of degree r. Since (6.4) holds with \(\lambda = 1\), we conclude using Lemma 6.2 that the limit function belongs to \(C^\beta \) for any \(\beta < r\), which is well known.
Therefore we assume from now on that \(p \ge 1\). With r in (2.5b) fixed, write \(g_{\ell ,j} = g_{\ell ,j}^{[r]}\) and \(g_\ell (z) = \sum _j g_{\ell ,j} z^j\). Then
with b(z) as in (2.5b), or equivalently,
In the following lemma we rephrase the bound (6.4) for the data \(g_{\ell ,j}\) as a bound for their scheme.
Lemma 6.3
The bound (6.4) holds, for some constant K, if there is some constant \(K'\) such that
Proof
Iterating (6.9) gives
where
But then
and so \(b_\ell (z)\) is the Laurent polynomial of the data \(b_{\ell ,j}\), where \(b_{0,j} = \delta _{j,0}\) and
In particular, \(b_{1,j} = b_j\). Since (6.12) can be written as
it follows that
and so (6.4) holds if (6.11) holds for some constant \(K'\).
The following lemma provides the reason why the bound (6.11) is easier to verify than (6.4), in the case of a nonnegative Fourier transform. For a direct proof see the report [18] or [34]. It is also a direct consequence of Herglotz’ theorem, which states that the condition of the lemma is equivalent to \({\mathbf {b}}\) being a positive definite sequence; see [2].
Lemma 6.4
If \({\mathbf {b}}\) as in (6.1) has Fourier transform \(B(\xi ) \ge 0\) for all \(\xi \), then
1.4 Growth rate as a spectral radius
For an odd symmetric mask \({\mathbf {b}}\) with nonnegative Fourier transform, it follows that (6.4) holds if \(b_{\ell ,0} \le K \lambda ^\ell \) for large enough \(\ell \). One way to determine such \(\lambda \) is using a subvector of \([b_{\ell ,j}]_j\) that includes the central coefficients \(b_{\ell ,0}\) and is ‘self-generating’ in the following sense.
Lemma 6.5
For \(\ell \ge 0\), the finite submatrix and subvectors
satisfy \({\mathbf {b}}_{\ell +1} = {\mathbf {M}}{\mathbf {b}}_\ell \).
Proof
If \(k\ge \lfloor \frac{p-1}{m-1}\rfloor + 1\) in (6.15) and the corresponding coefficient \(b_{j-mk}\ne 0\), then \(j - mk \ge -p\) implying that
So any such \(b_{\ell ,k}\) will not contribute to the linear combination for \(b_{\ell +1,j}\) with \(j\le \lfloor \frac{p-1}{m-1} \rfloor \). Similarly, if \(k\le -\lfloor \frac{p-1}{m-1}\rfloor - 1\) in (6.15) and the corresponding coefficient \(b_{j-mk}\ne 0\), then \(j - mk \le p\) implying that
So any such \(b_{\ell ,k}\) will not contribute to the linear combination for \(b_{\ell +1,j}\) with \(j\ge - \left\lfloor \frac{p-1}{m-1} \right\rfloor \). By (6.15), it follows that \({\mathbf {b}}_{\ell +1} = {\mathbf {M}}{\mathbf {b}}_\ell \) for \(\ell \ge 0\).
Theorem 6.1
Let \(\rho \) be the spectral radius of \({\mathbf {M}}\). If \(B(\xi ) \ge 0\) for all \(\xi \), then
If \(\rho > 1/m\), a lower bound for the regularity of the scheme (2.1) is \(r - \log _m(\rho )\).
Proof
Using Lemma 6.4 and \({\mathbf {b}}_\ell = {\mathbf {M}}^\ell {\mathbf {b}}_0\) by Lemma 6.5,
On the other hand, by (6.16) the matrix \({\mathbf {M}}^\ell \) takes its entries from \([b_{\ell ,j}]_j\), so that its maximum absolute row sum \(\Vert {\mathbf {M}}^\ell \Vert _\infty \) satisfies
Taking \(\ell \)-th roots and the limit \(\ell \rightarrow \infty \) one obtains (6.18). It follows from (6.18) and Lemma 6.3 that (6.4) holds with \(K = 1\) for any \(\lambda > \rho \), and this proves the lower bound on the regularity of the scheme.
1.5 A smaller matrix
Due to the assumption that \({\mathbf {b}}\) is odd symmetric, the limit (6.18) can also be computed as the spectral radius of a matrix roughly half the size of \({\mathbf {M}}\), using a ‘folding procedure’ [18, 34]. Since \(b_{\ell ,-j} = b_{\ell ,j}\) for all j, the vector of coefficients
also includes \(b_{\ell ,0}\) and is self-generating as well. Indeed, from (6.15),
and, using that \(b_{-j} = b_j\), one obtains
It follows that \({\mathbf {b}}_{\ell +1} = {\mathbf {M}}{\mathbf {b}}_\ell \), where \({\mathbf {M}}\) is the matrix of dimension \(\lfloor \frac{p-1}{m-1}\rfloor + 1\),
1.6 Optimality
In this section we show that under a slightly stricter condition, the lower bound on the regularity of Theorem 6.1 is optimal. For related results in the binary and ternary case, see [34] and [22, §3.4].
Theorem 6.2
If \(B(\xi ) > 0\) for all \(\xi \), the lower bound \(r - \log _m(\rho )\) of Theorem 6.1 is optimal.
To prove this we first establish a lemma that shows that the bound is optimal whenever the cardinal function \(\phi \) of the scheme (2.1) has \(\ell ^\infty \)-stable integer translates. The main point in proving this lemma is that the stability allows us to bound divided differences of the scheme by corresponding divided differences of the limit function.
Following Jia and Micchelli [26], we say that \(\phi \) has \(\ell ^\infty \)-stable integer translates if there is some constant \(K_\infty > 0\) such that for any sequence \({\mathbf {c}}= [c_j]_j\) in \(\ell ^\infty (\mathbb {Z})\),
Lemma 6.6
Suppose \(\phi \) has \(\ell ^\infty \)-stable integer translates and \(f\in C^{q + \alpha }\) for some integer \(q\ge 0\) and \(0< \alpha < 1\). Then for any integer \(r \ge q\), there is a constant K such that
Proof
The limit function for general initial data \(f_{0,k}\) can be expressed as the linear combination
As is well known [21], \(\phi \) satisfies the refinement equation
and therefore, for any \(\ell \ge 0\),
We can use this equation to relate any divided difference of f of the form
to the divided differences of the scheme. Putting \(x = m^{-\ell }(y-j)\) in (6.23),
and, using the cases \(j=0,1,\ldots ,q\), and the linearity of divided differences,
Similarly, if
then
Using that f has compact support, if f has regularity \(q + \alpha \), there is a constant \(K'>0\) such that for any \(\xi _0,\xi _1 \in \mathbb {R}\),
and, by the mean value theorem for divided differences, for each \(\ell \) and y,
for \(\xi _0,\xi _1 \in \big (m^{-\ell }(y-q-1),m^{-\ell }y\big )\). Therefore, for any y,
where \(K'' = K' (q+1)^\alpha / q!\). Therefore,
and by (6.20) it follows that for any \(k \in \mathbb {Z}\),
Finally, by applying the divided difference definitions (6.2) recursively, \(r-q\) times, we obtain (6.21).
Lemma 6.7
If \(\phi \) has \(\ell ^\infty \)-stable integer translates, then the lower bound \(r - \log _m(\rho )\) of Theorem 6.1 is optimal.
Proof
Let f be the limit of the scheme with any initial data for which \(g_{0,j}^{[r]} = \delta _{j,0}\), \(-p+1 \le j \le p-1\), and with only a finite number of initial data \(f_{0,j}\) non-zero. Then f has compact support. Suppose that \(f \in C^{r-\log _m(\rho ) + \varepsilon }\) for some small \(\varepsilon > 0\) and write the exponent as
If \(\rho > 1/m\), we have \(r \ge q\), and so Lemma 6.6 can be applied, implying
Hence,
By choice of the \(g_{0,j}^{[r]}\), however, \(g_{\ell ,0}^{[r]} = b_{\ell ,0}\), which contradicts (6.18).
Using this lemma we can now prove Theorem 6.2 by comparing the cardinal function \(\phi \) with B-splines, which are known to be stable. A similar idea was used by Dong and Shen [11, Lemma 2.2] to show that binary pseudo-splines are stable.
Proof of Theorem 6.2
By Lemma 6.7, it is sufficient to show that \(\phi \) has \(\ell ^\infty \)-stable integer translates if \(B(\xi ) > 0\) for all \(\xi \). We apply some results by Jia and Micchelli [26]. Consider the (continuous) Fourier transform of \(\phi \), defined as
Since the scheme (2.1) reproduces constants,
As a 1-periodic function, it has a Fourier series expansion
with Fourier coefficients
In particular \(\widehat{\phi }(0) = 1\). Together with the Fourier transform of (6.22),
if follows that
By [26, Theorem 3.5], \(\phi \) has \(\ell ^\infty \)-stable integer translates precisely when
Consider again the case that the scheme admits a factorization (2.5b). Then
where, since \(A(0) = m\) under the assumption of convergence, \(B(0) = 1\). For the B-spline scheme of degree r we have \(b(z) = 1\), in which case we can write its symbol as \(a_r(z) = (1+z+\cdots + z^{m-1})^{r+1} / m^r\). The cardinal function \(\phi _r\) is the B-spline of degree r centered at 0, and we have, after shifting,
It then follows that
Since the condition (6.24) holds for the B-spline \(\phi _r\), we deduce that \(\phi \) has \(\ell ^\infty \)-stable integer translates if \(B(\xi ) > 0\) for all \(\xi \).
Rights and permissions
About this article
Cite this article
Muntingh, G. Symbols and exact regularity of symmetric pseudo-splines of any arity. Bit Numer Math 57, 867–900 (2017). https://doi.org/10.1007/s10543-017-0656-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10543-017-0656-y