HACKERS DELIGHT PDF DOWNLOAD!
Hacker's Delight. Second Edition. Henry S. Warren, Jr. Upper Saddle River, NJ • Boston • Indianapolis • San Francisco. New York • Toronto • Montreal • London. Hacker's delight / Henry S. Warren, Jr. -- 2nd ed. p. cm. Includes bibliographical references and index. ISBN (hardcover: alk. paper). 1. Computer. Hacker's Delight is a software algorithm book by Henry S. Warren, Jr. and published by Addison-Wesley Professional. The first edition was released in , and.
|Author:||Dandre Champlin DVM|
|Published:||17 April 2016|
|PDF File Size:||30.86 Mb|
|ePub File Size:||42.69 Mb|
|Uploader:||Dandre Champlin DVM|
Most of these techniques are eminently practical, but a few are included just because they are interesting and unexpected.
The resulting work is an irresistible hackers delight that will help even the most seasoned programmers better their craft.
A broad collection of useful programming tricks Small algorithms for common tasksPower-of-2 boundaries and bounds checkingRearranging bits and bytesInteger division and division by constantsSome elementary functions on integersGray codeHilbert's space-filling curveAnd even formulas for prime numbers!
If you enjoyed this you'll probably like the earlier chapters, though you shouldn't be allowed to read them.
If you like numbers, you'll probably like the later ones, though not if you also like any sort of hackers delight in your maths. If you can get it second-hand, though, consider picking it up; it feels like a book you should own second-hand.
From the hackers delight of bitwise operations to Single-Error Correcting codes, this book contains an impressive hackers delight of tricks for low-level software work. If you're frustrated by branch mispredictions ruining your algorithm's performance, this book might have the branchless algorithm you're looking for.
To download the superoptimizer itself, including its documentation, click here.
You should get about eight files; the important ones are aha. If it looks ok you can erase aha.
Computing Magic Numbers Click here for a page that can be used to compute the "magic numbers" and multiplicative inverses modulo 2 These numbers allow you to convert division by constants into multiplications.
Montgomery Multiplication This file describes the theory hackers delight practice of Montgomery multiplication.
- Hacker's Delight by Henry S. Warren Jr.
- Hacker's Delight - Henry S. Warren - Google книги
- Hacker's Delight
- Navigation menu
This is a technique for doing "modular multiplication" that is, given a, b, and m, of computing ab mod m that improves performance when several multiplications are to hackers delight done with the same values of a, b, and m.
In particular, it is useful for computing a n mod m for fairly large values of n.