Hacker's Delight

Hacker's Delight

"Hacker's Delight" (ISBN 978-0-201-91465-8) by Henry S. Warren, Jr., is a book published by Addison-Wesley Professional July 17, 2002. It discusses a variety of programming algorithms for common tasks involving integer types, often with the aim of performing the minimum number of operations or replacing slow operations by faster ones (eg, converting a divide by a constant into a multiple by another constant that gives the same result).

The book is currently in its seventh printing.

External links

* [http://www.hackersdelight.org/ "Hacker's Delight" web site]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • The Bishop's Gambit — Infobox UK Television Episode Title = The Bishop’s Gambit Series name = Yes, Prime Minister Caption = Episode title card Series no = 1 Episode = 7 Airdate = 20 February 1986 Writer = Antony Jay Jonathan Lynn Producer = Sydney Lotterby Director =… …   Wikipedia

  • Binary logarithm — NOTOC In mathematics, the binary logarithm (log2 n ) is the logarithm for base 2. It is the inverse function of n mapsto 2^n. The binary logarithm is often used in computer science and information theory (where it is frequently written lg n , or… …   Wikipedia

  • Logaritmo binario — Gráfica de log 2x En matemática el logaritmo binario o logaritmo en base 2: y = log 2(x) es la función matemática que determina a que valor y hay que elevar 2 para obtener x, es un caso particular de logaritmos en el que la base …   Wikipedia Español

  • Целое (тип данных) — Целое, целочисленный тип данных (англ. Integer), в информатике  один из простейших и самых распространённых типов данных в языках программирования. Служит для представления целых чисел. Множество чисел этого типа представляет собой… …   Википедия

  • BioShock — Разработчик 2K Boston/2K Australia (Windows), 2K Marin (PS3), Feral Interactive (версия для Mac OS X) Издатели 2K Games …   Википедия

  • Cyclic redundancy check — A cyclic redundancy check (CRC) is an error detecting code designed to detect accidental changes to raw computer data, and is commonly used in digital networks and storage devices such as hard disk drives. Blocks of data entering these systems… …   Wikipedia

  • Addison-Wesley — is a book publishing imprint of Pearson PLC, best known for computer books. As well as publishing books, Addison Wesley distributes its technical titles through the Safari Books Online e reference service.HistoryMelbourne Wesley Cummings founded… …   Wikipedia

  • Bit manipulation — is the act of algorithmically manipulating bits or other pieces of data shorter than a byte. Programming tasks that require bit manipulation include low level device control, error detection and correction algorithms, encryption algorithms, and… …   Wikipedia

  • Manipulation De Bit — La manipulation de bit est l action de manipuler algorithmiquement des bits ou toute forme de données inférieur à un octet. En informatique, la manipulation de bit est utilisée pour le contrôle bas niveau de périphériques, dans les algorithmes de …   Wikipédia en Français

  • Manipulation de bit — La manipulation de bit est l action de manipuler algorithmiquement des bits ou toute forme de données inférieur à un octet. En informatique, la manipulation de bit est utilisée pour le contrôle bas niveau de périphériques, dans les algorithmes de …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”