2.2 Behavioural Pricing Strategies

Total Page:16

File Type:pdf, Size:1020Kb

2.2 Behavioural Pricing Strategies BACHELOR THESIS Interrelationships between Behavioural Economics and Consum- ers’ Decision-making with emphasis on Pricing Strategies Souvislosti behaviorální ekonomie a spotřebitelova rozhodování s důrazem na strategii oceňování STUDY PROGRAMME Economy and Management FIELD OF STUDY Management and Economy of an Industrial Enterprise SUPERVISOR Ing. Robin Maialeh, Ph.D. KNOROVÁ KRISTÝNA 2018 KNOROVÁ, Kristýna. Interrelationships between Behavioural Economics and Consumers’ Decision-making with emphasis on Pricing Strategies. Prague: CTU 2018. Bachelor thesis. Czech Technical University in Prague, Masaryk Institute of Advanced Studies. Declaration I hereby declare that I have compiled this final thesis on my own and all the quoted literature as well as other sources used in the thesis are listed in the bibliography. The electronic copy of the thesis is identical with the hard-bound copy. I approve that this diploma thesis is pub- lished pursuant to Section 47b Act No.121/2000 Coll., on Higher Education and on the amendment and modification of other acts (the Higher Education Act), as amended. In Prague: 18. 05. 2018 Signature: Acknowledgement I would like to thank my thesis supervisor Ing. Robin Maialeh, Ph.D. for the support, time, knowledges, patience and valuable advices. He was always willing to help when I ran into a trouble or had a question about my writing and steered me in the right direction. I also must express my deep gratitude to my parents and to my beloved friends for their unfailing support and encouragement throughout my years. The accomplishment would not be possible with- out them. Thank you. Abstract The thesis deals with the issue of consumers’ decision-making based especially on behav- ioural economics and behavioural pricing strategies. The thesis aims to review relevant lit- erature regarding the topic, examine correlations between behavioural pricing and consumer decision-making and analyse pricing strategy of a particular company, in this case, Apple, Inc., with emphasis on behavioural pricing. The method is interpretative study and price analysis, since the topics is almost completely theoretical. In conclusion, the analysis re- vealed the way a company sensitively uses insights from behavioural economics and also the positive influence of behavioural pricing on revenue growth. Key words Behavioural economics, pricing strategies, behavioural pricing, consumers’ decision-mak- ing Abstrakt Bakalářská práce se zabývá problematikou ovlivňování rozhodování spotřebitele založené na behaviorální ekonomii a behaviorální cenové strategii. Cílem práce je přezkoumat pří- slušnou literaturu týkající se tématu, prověřit vztah mezi behaviorálním oceňováním a roz- hodováním spotřebitele a analyzovat cenovou strategii konkrétní společnosti, v tomto pří- padě Apple, Inc. Zvolená metoda je studie a cenová analýza, neboť téma je převážně teore- ticky orientované. V závěru analýza poukázala na spojitost mezi zvýšením obratu a behavi- orálním oceňováním. Klíčová slova Behaviorální ekonomie, cenová strategie, behaviorální oceňování, rozhodování spotřebitele List of Abbreviations ASP: Average Selling Price EUR: European Monetary Unit MAP: Minimum advertised price MSRP: Manufacturer Suggested Retail Price USD: United States Dollar VAT: Value Added Tax Table of Contents Introduction .......................................................................................................................... 6 1 CHAPTER Behavioural Economics ........................................................................... 8 1.1 Behavioural Economic ........................................................................................... 8 1.2 Historical context ................................................................................................... 9 1.3 Prospect theory .................................................................................................... 10 1.4 Decision-making systems .................................................................................... 12 1.5 Decision-making biases ....................................................................................... 13 1.5.1 Cognitive biases ............................................................................................... 14 1.5.2 Heuristics ......................................................................................................... 15 1.5.3 Anchoring ........................................................................................................ 15 1.5.4 Loss Aversion .................................................................................................. 16 1.5.5 Framing ............................................................................................................ 17 1.5.6 Questioning rationality and decision-making .................................................. 17 1.5.7 Bounded rationality .......................................................................................... 18 1.5.8 Irrational behaviour and decoy effect .............................................................. 19 2 CHAPTER Pricing Strategies ................................................................................... 24 2.1.1 Introduction ...................................................................................................... 24 2.1.2 Pricing and price .............................................................................................. 24 2.1.3 Value ................................................................................................................ 25 2.1.4 Pricing strategies .............................................................................................. 25 2.1.5 Cost-based pricing ........................................................................................... 25 2.1.6 Value-based pricing ......................................................................................... 26 2.1.7 Penetration pricing ........................................................................................... 26 2.1.8 Skimming pricing ............................................................................................ 27 2.2 Behavioural pricing strategies ............................................................................. 27 2.2.1 Charm pricing .................................................................................................. 27 2.2.2 Irrational Value (Prestige/Premium pricing strategy) ...................................... 28 2.2.3 Power of free .................................................................................................... 29 2.2.4 Hyperbolic discounting .................................................................................... 31 2.2.5 Pain of paying .................................................................................................. 32 3 CHAPTER Analysis of pricing strategies ................................................................ 35 3.1 Introduction .......................................................................................................... 35 3.2 History ................................................................................................................. 36 3.3 Behavioural segmentation .................................................................................... 37 3.3.1 Segmentation based on loyalty ........................................................................ 37 3.3.2 Purchase behaviour .......................................................................................... 38 3.4 Pricing models ..................................................................................................... 39 3.4.1 Price maintenance ............................................................................................ 40 3.4.2 Skimming price strategy .................................................................................. 40 3.4.3 Price discrimination ......................................................................................... 41 3.5 Behavioural pricing and strategies ....................................................................... 44 3.5.1 Pain of paying .................................................................................................. 44 3.5.2 Charm pricing .................................................................................................. 45 3.5.3 Anchoring and reference prices ....................................................................... 46 3.5.4 Prestige pricing ................................................................................................ 49 3.5.5 Decoy effect ..................................................................................................... 57 Discussion .......................................................................................................................... 61 Conclusion ......................................................................................................................... 64 Bibliography ...................................................................................................................... 70 List of Tables and Figures ................................................................................................ 71 Evidence výpůjček ............................................................................................................ 72 Introduction Behavioural economics is a field of economics concerning topics of consumers' decision-
Recommended publications
  • TRECENTO FRAGMENTS M Ichael Scott Cuthbert to the Department Of
    T R E C E N T O F R A G M E N T S A N D P O L Y P H O N Y B E Y O N D T H E C O D E X a thesis presented by M ichael Scott Cuthbert t the Depart!ent " M#si$ in partia% "#%"i%%!ent " the re&#ire!ents " r the de'ree " D $t r " Phi% s phy in the s#b(e$t " M#si$ H ar)ard * ni)ersity Ca!brid'e+ Massa$h#setts A#'#st ,--. / ,--.+ Mi$hae% S$ tt C#thbert A%% ri'hts reser)ed0 Pr "0 Th !as F rrest 1 e%%y+ advisor Mi$hae% S$ tt C#thbert Tre$ent Fra'!ents and P %yph ny Bey nd the C de2 Abstract This thesis see3s t #nderstand h 4 !#si$ s #nded and "#n$ti ned in the 5ta%ian tre6 $ent based n an e2a!inati n " a%% the s#r)i)in' s #r$es+ rather than n%y the ! st $ !6 p%ete0 A !a( rity " s#r)i)in' s #r$es " 5ta%ian p %yph ni$ !#si$ "r ! the peri d 788-9 7:,- are "ra'!ents; ! st+ the re!nants " % st !an#s$ripts0 Despite their n#!eri$a% d !i6 nan$e+ !#si$ s$h %arship has )ie4 ed these s #r$es as se$ ndary <and "ten ne'%e$ted the! a%t 'ether= " $#sin' instead n the "e4 %ar'e+ retr spe$ti)e+ and pred !inant%y se$#%ar $ di6 $es 4 hi$h !ain%y ri'inated in the F% rentine rbit0 C nne$ti ns a! n' !an#s$ripts ha)e been in$ !p%ete%y e2p% red in the %iterat#re+ and the !issi n is a$#te 4 here re%ati nships a! n' "ra'!ents and a! n' ther s!a%% $ %%e$ti ns " p %yph ny are $ n$erned0 These s!a%% $ %%e$ti ns )ary in their $ nstr#$ti n and $ ntents>s !e are n t rea%%y "ra'!ents at a%%+ b#t sin'%e p %yph ni$ 4 r3s in %it#r'i$a% and ther !an#s$ripts0 5ndi)id#6 a%%y and thr #'h their )ery n#!bers+ they present a 4 ider )ie4 " 5ta%ian !#si$a% %i"e in the " #rteenth $ent#ry than $ #%d be 'ained "r ! e)en the ! st $are"#% s$r#tiny " the inta$t !an#s$ripts0 E2a!inin' the "ra'!ents e!b %dens #s t as3 &#esti ns ab #t musical style, popularity, scribal practice, and manuscript transmission: questions best answered through a study of many different sources rather than the intense scrutiny of a few large sources.
    [Show full text]
  • 20 Tips for the Tech Savvy Lawyer By: Andrew S
    20 Tips for the Tech Savvy Lawyer By: Andrew S. Baker The Baker Law Group A Quick Note About Me • Opened Practice directly out of Law School in 2006 • Focus on Plaintiff's Personal Injury / Criminal Defense • Paperless Office since 2007 • Utilize Time Matters as Practice Management Software • Apple / Windows hybrid setup • OCD - Anti Clutter and Paper Certified Technology Nerd Yes I Wait in Lines at Apple for New Releases Tonight's Agenda • Brief Introduction of Technology Then and Now • Modifications of Expectations • Advantages of Utilizing Technology in a Paperless Environment • Security Concerns • Mobile / Cloud Access • 20 Tips for the Tech Savvy Lawyer • Questions WE HAVE COME A LONG WAY!! Solutions for Technology Laggards Now and Then Modification of Expectations Proceed with Caution Modification of Expectations • Immediate Response Required • Faster, faster, faster... • Smaller, smaller, smaller....wait no bigger, bigger bigger (New iPad) • Find me/you anywhere with location services Michael Scott: Everyone always wants new things. Everybody likes new inventions, new technology. People will never be replaced by machines. In the end, life and business are about human connections. And computers are about trying to murder you in a lake. And to me the choice is easy. https://m.youtube.com/watch? v=BIakZtDmMgo Advantages of Using Technology in a Paper Environment • Efficiency • Less Mess / Organization • "Where is that...?" - Advance Search Capacities • More Secure • Pay less in Rent / Storage • Off Site Access My Favorite Reason MORE FREE
    [Show full text]
  • The Identification and Division of Steve Jobs
    AN ABSTRACT OF THE THESIS OF Scott M. Anderson for the degree of Master of Arts in Interdisciplinary Studies in Speech Communication, Speech Communication, and English presented on May 17, 2012. Title: The Identification and Division of Steve Jobs Abstract approved: Mark P. Moore On April 1, 1976, Steve Jobs and Steve Wozniak entered into a partnership agreement to found Apple Computer. In the decade that followed, Apple experienced remarkable growth and success, as Jobs catapulted Apple to the Fortune 500 list of top‐flight companies faster than any other company in history. Under direction of Jobs, Apple, an idea that started in a garage, transformed into a major force in the computer industry of the 1980s. Though Jobs’ leadership undoubtedly influenced Apple’s success during this time, in 1995, he was forced to resign, when conflicts mounted at the executive level. Using Kenneth Burke’s theory of identification and the dramatistic process, this thesis examines Jobs’ discourse through a series of interviews and textual artifacts. First, I provide a framework for Jobs’ acceptance and rejection of the social order at Apple, and then consider the ways in which Jobs identified with employee and consumer audiences on the basis of division. Analysis shows that Jobs identified with individual empowerment, but valued separation and exclusivity. Jobs’ preference to create identification through division, therefore, established the foundation for new identifications to emerge. The findings of this study suggest that division has significant implications for creating unity. ©Copyright by Scott M. Anderson May 17, 2012 All Rights Reserved The Identification and Division of Steve Jobs by Scott M.
    [Show full text]
  • A Plague of Biblical Dimensions. the Rise of a Movement That Gloried in the Murder of Civilians, Journalists and Aid Workers
    Image by Alex MacLean. Alberta, Canada, 2014 A plague of biblical dimensions. The rise of a movement that gloried in the murder of civilians, journalists and aid workers. A series of tragic police encounters, in the second term of America’s first black president, that undermined our faith in progress toward racial justice. 2014 was a difficult year, for the world and for journalism. Coverage of Ebola and Ferguson often featured more heat than light. A reporting fiasco atRolling Stone undermined the case for action against sexual crimes. The New Republic’s implosion showed that a billionaire owner is no guarantee of success. In the midst of turbulence the Pulitzer Center stuck to the mission set forth by Joseph Pulitzer III decades ago—“to illuminate dark places and, with a deep sense of responsibility, interpret these troubled times.” Our journalists produced 385 stories for 130 outlets—using new media, visual data, powerful images and old-fashioned storytelling to reach increasingly diverse audiences. We commissioned more reporting than ever, on topics ranging from the rise of the Islamic State and lessons learned from the Ebola crisis to climate change and the role of religion in public policy. We rejoiced in the release by Somali pirates of Pulitzer Center journalist grantee Michael Scott Moore, after two years and eight months of captivity. Our education initiatives continued to grow, reaching thousands of students through nearly 500 engagements. Student fellows from partner universities in our Campus Consortium reported from 16 countries, on issues ranging from Syrian refugees to hydropower in India and healthcare in Kenya.
    [Show full text]
  • Technical Threat Report: Arid Viper 2
    April 2021 Technical Paper // Taking Action Against Arid Viper Authors: Michael Flossman and Michael Scott // Threat Investigators Technical threat report: Arid Viper 2 TABLE OF CONTENTS Executive Summary 4 Key Findings 5 Timeline around recent Arid Viper Operations 8 Overview 9 Background 9 Recent Operations & Activity on Platform 9 Victimology 11 A Toolkit of Custom Malware for Multiple Platforms 12 Phenakite - Arid Viper’s iOS Implant 12 Initial Device Compromise 13 Inclusion of Public Exploits 17 Capabilities 17 Scope of iOS Targeting 20 Evolving Android Surveillanceware 21 Continued Development of Micropsia Windows Malware 29 General Micropsia Behavior & Capability 30 Persistence 30 Command and Control Communication 31 Phishing/Credential Theft 33 Central Elections Commission Imposter Site 33 Conclusion 35 Appendix 36 Technical threat report: Arid Viper 3 Executive Summary Facebook is focused on protecting our users from malicious actors who attempt to conduct offensive cyber operations on our family of applications. This report details our investigation and disruption of the advanced persistent threat actor known in the security industry as Arid Viper, who we identified creating and using fake accounts in targeted cyber espionage campaigns. For the first time, we observed Arid Viper incorporating fully functional custom iOS surveillanceware, capable of stealing sensitive user data from iPhones without requiring devices be jailbroken prior to compromise. The focus of Arid Viper’s recent operation we discuss in this paper shows similar geographic and occupational targeting as was previously reported by our industry peers. Much of Arid Viper’s activity detailed in this report focused on individuals in Palestine, including government officials, members of the Fatah political party, student groups, and security forces.
    [Show full text]
  • Strategic Leadership and Innovation at Apple
    . . . 309-038-1 STRATEGIC LEADERSHIP & INNOVATION AT APPLE INC1. Stop and look at Apple for a second, since it's an odd company. ... While most high- tech firms focus on one or two sectors, Apple does all of them at once ... Apple is essentially operating its own closed miniature techno-economy. ... If you follow conventional wisdom, Apple is doing it all wrong. And yet ... this is the company that gave us three of the signature technological innovations of the past 30 years: the Apple II, the Macintosh and the iPod. (Grossman, 2005) Apples Fall and Rise Voted as the most innovative company for three consecutive years during 2006-2008 and as Americas number 1 most Admired Company (McGregor, 2008), Apple seemed to have it all: innovative products that have redefined their markets (such as the iMac and the iPod), a consumer base as loyal as a fun club, and a business model characterized by vertical integration and synergies that no competitor could easily imitate. The Apple brand had transcended the barriers of the computer industry to traverse the consumer electronics, record, movie, and the video and music production industries (see Figure 1 for an outline of Apples product and service portfolio). In 2008 the Apple brand was listed as the 24th most valuable global brand (up from 33rd place the previous year), valued at $13.7bn (Interbrand, 2008). After a lackluster period during 1989-1997 when Apple was nearly written off, its dynamic comeback was impressive. Between 2003 and 2008 Apples sales tripled to $24 billion and profits increased to $3.5 billion, up from a mere $24 million (See Table 1 for an outline of Apples financial performance during 2006-8).
    [Show full text]
  • Blockchain and the Future of the Audit Connor Ortman Claremont Mckenna College
    Claremont Colleges Scholarship @ Claremont CMC Senior Theses CMC Student Scholarship 2018 Blockchain and the Future of the Audit Connor Ortman Claremont McKenna College Recommended Citation Ortman, Connor, "Blockchain and the Future of the Audit" (2018). CMC Senior Theses. 1983. http://scholarship.claremont.edu/cmc_theses/1983 This Open Access Senior Thesis is brought to you by Scholarship@Claremont. It has been accepted for inclusion in this collection by an authorized administrator. For more information, please contact [email protected]. CLAREMONT McKENNA COLLEGE Blockchain and the Future of the Audit SUBMITTED TO PROFESSOR MATTHEW MAGILKE BY JOHN CONNOR ORTMAN FOR SENIOR THESIS 2017-2018 APRIL 23, 2018 2 Table of Contents Acknowledgments ............................................................................................................... 3 Chapter 1 – Introduction ..................................................................................................... 5 Chapter 2 – The History of Regulatory Authorities and the Audit ..................................... 9 Chapter 3 – Blockchain: An Extended Discussion of the Technology ............................. 19 Chapter 4 – Client Implementation of Blockchain Technology – Financial Firms .......... 32 Chapter 5 – Client Implementation of Blockchain Technology – Non-Financials ........... 45 Chapter 6 – Blockchain and its Impact on Accounting Systems and the Auditor ............ 56 Chapter 7 – Regulators’ Response to the Blockchain ......................................................
    [Show full text]
  • Apple Confidential 2.0 the Definitive History of the World's Most Colorful
    vi Reviewers love Apple Confidential “The Apple story itself is here in all its drama.” New York Times Book Review “An excellent textbook for Apple historians.” San Francisco Chronicle “Written with humor, respect, and care, it absolutely is a must-read for every Apple fan.” InfoWorld “Pretty much irresistible is the only way to describe this quirky, highly detailed and illustrated look at the computer maker’s history.” The Business Reader Review “The book is full of basic facts anyone will appreciate. But it’s also full of interesting extras that Apple fanatics should love.” Arizona Republic “I must warn you. This 268-page book is hard to put down for a MacHead like me, and probably you too.” MacNEWS “You’ll love this book. It’s a wealth of information.” AppleInsider “Rife with gems that will appeal to Apple fanatics and followers of the computer industry.” Amazon.com “Mr. Linzmayer has managed to deliver, within the confines of a single book, just about every juicy little tidbit that was ever leaked from the company.” MacTimes “The most entertaining book about Apple yet to be published.” Booklist i …and readers love it too! “Congratulations! You should be very proud. I picked up Apple Confidential and had a hard time putting it down. Obviously, you invested a ton of time in this. I hope it zooms off the shelves.” David Lubar, Nazareth, PA “I just read Apple Confidentialfrom cover to cover…you have written a great book!” Jason Whong, Rochester, NY “There are few books out there that reveal so much about Apple and in such a fun and entertaining manner.
    [Show full text]
  • FY20 Annual Report
    Accelerating the Pace of Conservation Fiscal Year 2020 Annual Report and Progress Made on the 2025 Strategic Action Plan This year, TLC nature preserves have been more important than ever. TLC nature preserves have never been more important to our community, and they are not possible without you, our incredible supporters. You have made this year — which has been hard for so many — better for thousands of people in so many ways. We cannot tell you how many messages we’ve received that share the same sentiment: TLC nature preserves have been absolutely vital during the pandemic. Before COVID-19, in October 2019, TLC conserved its largest land project ever — Brogden Bottomlands, a 1,120-acre tract of land in Johnston County, and helped host the national Land Trust Alliance Rally in Raleigh. Throughout the year, staff hosted dozens of volunteer workdays and environmental education programs. I am proud of TLC staff, board, volunteers, and supporters for the way they have adapted and dealt with these challenging times. Starting at the beginning of this pandemic, we had to postpone (and ultimately cancel) two of our most anticipated events of the year: Wild Ideas for Farms and Forests in March and the Grand Opening of Bailey and Sarah Williamson Preserve in April. Since then, we’ve accomplished so much together. Before March was over, we launched a new webinar series called Conservation Conversations. We’ve been grateful to work with some of our volunteers remotely. We were blown away by everyone’s generosity on our Giving Day on April 22. And we were thrilled to finally open Williamson Preserve to the public in September.
    [Show full text]
  • 2017 Town Council Agenda 06-06.Pdf
    Mayor Andy Moore Mayor Pro-Tem Emery Ashley Council Members Marlon Lee Town Council J. Perry Harris Travis Scott Agenda Roger A. Wood John A. Dunn Stephen Rabil Packet Town Attorney Robert Spence, Jr. Town Manager Michael L. Scott Meeting Date: Tuesday, June 6, 2017 Finance Director Meeting Time: 7:00 p.m. Greg Siler Meeting Place: Town Hall Council Chambers Town Clerk 350 East Market Street Shannan Williams Smithfield, NC 27577 TOWN OF SMITHFIELD TOWN COUNCIL AGENDA REGULAR MEETING JUNE 6, 2017 7:00 PM Call to Order Invocation Pledge of Allegiance Approval of Agenda Page Presentations 1. Administering Oath of Office to Newly Promoted Lieutenant – Nathan Memmelaar (Mayor – M. Andy Moore) See attached information.........................................................1 2. Administering Oath of Office to Newly Promoted Sergeant – Jordan Jeffery (Mayor – M. Andy Moore) See attached information.........................................................3 3. Proclamation – Honoring Planning Director Paul C. Embler, Jr.’s Service to the Town of Smithfield (Mayor – M. Andy Moore) See attached information.........................................................5 Public Hearings 1. Rezoning Request – RZ – 17-01 E&F Properties, Inc: The applicant is requesting to rezone approximately 54.95 acres of land from the R-20A (Residential-Agricultural) to the B-3 (Business) zoning district. The property considered for approval is located on the north side of Booker Dairy Road approximately 200 feet east of its intersection with Bradford Street. The property is further identified as Johnston County Tax ID# 14057004D. (Planning Director – Paul Embler) See attached information.............................................7 Page 2. FY 2017-2018 Budget: In accordance with NCGS 159 -12 (b), Before adopting the budget ordinance, the board shall hold a public hearing at which time any persons who wish to be heard on the budget may appear.
    [Show full text]
  • The Steve Jobs Way (Preliminary).Indd
    For my wife Liliana, and my sons Jay-Alexander and Federico for their loving support And for Arynne, Victoria, and Charlotte, and Sheldon, Vincent, and Elena Contents Author’s Note ix Prologue xi PART I Product Czar 1 Passion for the Product 3 2 Success Is in the Details 19 PART II Talent Rules 3 Teaming: “Pirates! Not the Navy” 39 4 Tapping Talent 59 5 Rewards for the Pirates 79 PART III Team Sports 6 The Product-Driven Organization 93 7 Maintaining Momentum 117 8 Recovery 141 9 Holistic Product Development 155 10 Evangelizing Innovation 175 PART IV Becoming Cool: A Diff erent View of Selling 11 The Door Opener: Branding 195 12 Riding the Retail Juggernaut 203 13 Achieving the Defi nition of Cool: 215 “There’s an App for That” viii THE STEVE JOBS WAY PART V On Becoming Stevian 14 In His Footsteps 235 A Letter to Steve 245 Acknowledgments 251 Notes 255 Author’s Note Sometimes Things Happen . that turn out so well we couldn’t have improved on them if we’d mapped out our own lives in advance. Of course, what are called the “glamour” jobs—the movies, television, the music business, fashion—often only seem glamorous from the outside: Working in one of those fi elds is fraught with constant challenges and frustrations. Hardly anyone thinks of technology as a glamour field, but for me, at least, work has never been as satisfying or as unbelievably exciting as when I was working with Steve Jobs. I’ve known and worked with the leaders of IBM and Intel; I’ve met great leaders and thinkers, including Jack Welch, Buckminster Fuller, and Joseph Campbell, and discussed the next paradigm change in organizational structure with Peter Drucker.
    [Show full text]
  • Missing a Trick: Karatsuba Variations
    Missing a trick: Karatsuba variations Michael Scott MIRACL Labs [email protected] May 23rd, 2016 Abstract. There are a variety of ways of applying the Karatsuba idea to multi-digit multiplication. These apply particularly well in the context where digits do not use the full word-length of the computer, so that partial products can be safely accumulated without fear of overow. Here we re-visit the arbitrary degree version of Karatsuba and show that the cost of this little-known variant has been over-estimated in the past. We also attempt to denitively answer the question as to the cross-over point where Karatsuba performs better than the classic method. 1 Introduction As is well known the Karatsuba idea for calculating the product of two poly- nomials can be used recursively to signicantly reduce the number of partial products required in a long multiplication calculation, at the cost of increas- ing the number of additions. A one-level application can save 1/4 of the partial products, and a two-level application can save 7/16ths etc. However application of Karatsuba in this way is quite awkward, it attracts a large overhead of extra additions, and the ideal recursion is only available if the number of digits is an exact power of two. One way to make Karatsuba more competitive is to use a number base radix that is somewhat less than the full register size, so that additions can be accu- mulated without overow, and without requiring immediate carry propagation. Here we refer to this as a reduced-radix representation.
    [Show full text]