mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-26 22:34:27 +02:00
8340981: Update citations to "Hacker's Delight"
Reviewed-by: bpb, iris, liach, jwaters
This commit is contained in:
parent
aceae76fb5
commit
8225a5f58a
2 changed files with 10 additions and 8 deletions
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 1994, 2023, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 1994, 2024, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -63,8 +63,9 @@ import static java.lang.String.UTF16;
|
||||||
* <p>Implementation note: The implementations of the "bit twiddling"
|
* <p>Implementation note: The implementations of the "bit twiddling"
|
||||||
* methods (such as {@link #highestOneBit(int) highestOneBit} and
|
* methods (such as {@link #highestOneBit(int) highestOneBit} and
|
||||||
* {@link #numberOfTrailingZeros(int) numberOfTrailingZeros}) are
|
* {@link #numberOfTrailingZeros(int) numberOfTrailingZeros}) are
|
||||||
* based on material from Henry S. Warren, Jr.'s <i>Hacker's
|
* based on material from Henry S. Warren, Jr.'s <cite>Hacker's
|
||||||
* Delight</i>, (Addison Wesley, 2002).
|
* Delight</cite>, (Addison Wesley, 2002) and <cite>Hacker's
|
||||||
|
* Delight, Second Edition</cite>, (Pearson Education, 2013).
|
||||||
*
|
*
|
||||||
* @author Lee Boynton
|
* @author Lee Boynton
|
||||||
* @author Arthur van Hoff
|
* @author Arthur van Hoff
|
||||||
|
@ -1736,7 +1737,7 @@ public final class Integer extends Number
|
||||||
* compress(expand(x, m), m) == x & compress(m, m)
|
* compress(expand(x, m), m) == x & compress(m, m)
|
||||||
* }
|
* }
|
||||||
* <p>
|
* <p>
|
||||||
* The Sheep And Goats (SAG) operation (see Hacker's Delight, section 7.7)
|
* The Sheep And Goats (SAG) operation (see Hacker's Delight, Second Edition, section 7.7)
|
||||||
* can be implemented as follows:
|
* can be implemented as follows:
|
||||||
* {@snippet lang="java" :
|
* {@snippet lang="java" :
|
||||||
* int compressLeft(int i, int mask) {
|
* int compressLeft(int i, int mask) {
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 1994, 2023, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 1994, 2024, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -63,8 +63,9 @@ import static java.lang.String.UTF16;
|
||||||
* <p>Implementation note: The implementations of the "bit twiddling"
|
* <p>Implementation note: The implementations of the "bit twiddling"
|
||||||
* methods (such as {@link #highestOneBit(long) highestOneBit} and
|
* methods (such as {@link #highestOneBit(long) highestOneBit} and
|
||||||
* {@link #numberOfTrailingZeros(long) numberOfTrailingZeros}) are
|
* {@link #numberOfTrailingZeros(long) numberOfTrailingZeros}) are
|
||||||
* based on material from Henry S. Warren, Jr.'s <i>Hacker's
|
* based on material from Henry S. Warren, Jr.'s <cite>Hacker's
|
||||||
* Delight</i>, (Addison Wesley, 2002).
|
* Delight</cite>, (Addison Wesley, 2002) and <cite>Hacker's
|
||||||
|
* Delight, Second Edition</cite>, (Pearson Education, 2013).
|
||||||
*
|
*
|
||||||
* @author Lee Boynton
|
* @author Lee Boynton
|
||||||
* @author Arthur van Hoff
|
* @author Arthur van Hoff
|
||||||
|
@ -1749,7 +1750,7 @@ public final class Long extends Number
|
||||||
* compress(expand(x, m), m) == x & compress(m, m)
|
* compress(expand(x, m), m) == x & compress(m, m)
|
||||||
* }
|
* }
|
||||||
* <p>
|
* <p>
|
||||||
* The Sheep And Goats (SAG) operation (see Hacker's Delight, section 7.7)
|
* The Sheep And Goats (SAG) operation (see Hacker's Delight, Second Edition, section 7.7)
|
||||||
* can be implemented as follows:
|
* can be implemented as follows:
|
||||||
* {@snippet lang="java" :
|
* {@snippet lang="java" :
|
||||||
* long compressLeft(long i, long mask) {
|
* long compressLeft(long i, long mask) {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue