1.
INTEGER DIVISION BY CONSTANTS
File Format: PDF/Adobe Acrobat - View as HTML with unsigned division first. One method is to use the techniques given that ..... This section has shown in a somewhat imprecise way how unsigned division ...
2.
Program for computing integer log functions. // Max line length is ...
... 10, 100, 1000, 10000, 100000, 1000000, 10000000, 100000000, 1000000000, 0}; ... 10,1, 11,1, 12,1, 13,1, 14,1, 15,1, 99,1, 100,2, 101,2, 999,2, 1000,3, ...
3.
CYCLIC REDUNDANCY CHECK
File Format: PDF/Adobe Acrobat - View as HTML A technique that is believed to be quite good in terms of error detection, and which is easy to implement in hardware, is the cyclic redundancy check. ...
4.
ERRORS IN HACKER’S DELIGHT
The “Newton method” described here applies only when (1) the modulus is an integral power of some number a, and (2) the multiplicative inverse of d mod- ... —Donald E. Knuth. P. 303: Change the first index heading under P from “parallel ...
5.
CYCLIC REDUNDANCY CHECK
File Format: PDF/Adobe Acrobat - View as HTML A technique that is believed to be quite good in terms of error detection, and which is easy to implement in hardware, is the cyclic redundancy check. ...
6.
Long division, unsigned (64/32 ==> 32). This procedure performs ...
NULL) // to an impossible value, *r = 0xFFFFFFFF; // and return the largest return .... t = un[j+1] + k - p; un[j+1] = t; // Store right half of t. ...
7.
Long division, unsigned (64/32 ==> 32). This procedure performs ...
NULL) // to an impossible value, *r = 0xFFFFFFFF; // and return the largest return .... t = un[j+1] + k - p; un[j+1] = t; // Store right half of t. ...
8.
Long division, unsigned (64/32 ==> 32). This procedure performs ...
(x) : (y)) int nlz(unsigned x) { int n; if (x == 0) return(32); n = 0; if (x <= 0x0000FFFF) {n = n +16; x = x <<16;} if (x <= 0x00FFFFFF) {n = n + 8; ...
9.
CYCLIC REDUNDANCY CHECK
File Format: PDF/Adobe Acrobat - View as HTML The cyclic redundancy check, or CRC, is a technique for detecting errors in ... which is easy to implement in hardware, is the cyclic redundancy check. ...
10.
Hacker's Delight
Jan 24, 2008 ... A collection of programming tricks at the bit level, including a superoptimizer program for RISC computers.