亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? e_pow.s

?? glibc 庫, 不僅可以學(xué)習(xí)使用庫函數(shù),還可以學(xué)習(xí)函數(shù)的具體實(shí)現(xiàn),是提高功力的好資料
?? S
?? 第 1 頁 / 共 5 頁
字號:
.file "pow.s"// Copyright (c) 2000 - 2005, Intel Corporation// All rights reserved.//// Contributed 2000 by the Intel Numerics Group, Intel Corporation//// Redistribution and use in source and binary forms, with or without// modification, are permitted provided that the following conditions are// met://// * Redistributions of source code must retain the above copyright// notice, this list of conditions and the following disclaimer.//// * Redistributions in binary form must reproduce the above copyright// notice, this list of conditions and the following disclaimer in the// documentation and/or other materials provided with the distribution.//// * The name of Intel Corporation may not be used to endorse or promote// products derived from this software without specific prior written// permission.// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL OR ITS// CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,// EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR// PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY// OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY OR TORT (INCLUDING// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS// SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.//// Intel Corporation is the author of this code, and requests that all// problem reports or change requests be submitted to it directly at// http://www.intel.com/software/products/opensource/libraries/num.htm.//// History//==============================================================// 02/02/00 Initial version// 02/03/00 Added p12 to definite over/under path. With odd power we did not//          maintain the sign of x in this path.// 04/04/00 Unwind support added// 04/19/00 pow(+-1,inf) now returns NaN//          pow(+-val, +-inf) returns 0 or inf, but now does not call error//          support//          Added s1 to fcvt.fx because invalid flag was incorrectly set.// 08/15/00 Bundle added after call to __libm_error_support to properly//          set [the previously overwritten] GR_Parameter_RESULT.// 09/07/00 Improved performance by eliminating bank conflicts and other stalls,//          and tweaking the critical path// 09/08/00 Per c99, pow(+-1,inf) now returns 1, and pow(+1,nan) returns 1// 09/28/00 Updated NaN**0 path// 01/20/01 Fixed denormal flag settings.// 02/13/01 Improved speed.// 03/19/01 Reordered exp polynomial to improve speed and eliminate monotonicity//          problem in round up, down, and to zero modes.  Also corrected//          overflow result when x negative, y odd in round up, down, zero.// 06/14/01 Added brace missing from bundle// 12/10/01 Corrected case where x negative, 2^52 <= |y| < 2^53, y odd integer.// 12/20/01 Fixed monotonity problem in round to nearest.// 02/08/02 Fixed overflow/underflow cases that were not calling error support.// 05/20/02 Cleaned up namespace and sf0 syntax// 08/29/02 Improved Itanium 2 performance// 09/21/02 Added branch for |y*log(x)|<2^-11 to fix monotonicity problems.// 02/10/03 Reordered header: .section, .global, .proc, .align// 03/31/05 Reformatted delimiters between data tables//// API//==============================================================// double pow(double x, double y)//// Overview of operation//==============================================================//// Three steps...// 1. Log(x)// 2. y Log(x)// 3. exp(y log(x))//// This means we work with the absolute value of x and merge in the sign later.//      Log(x) = G + delta + r -rsq/2 + p// G,delta depend on the exponent of x and table entries. The table entries are// indexed by the exponent of x, called K.//// The G and delta come out of the reduction; r is the reduced x.//// B = frcpa(x)// xB-1 is small means that B is the approximate inverse of x.////      Log(x) = Log( (1/B)(Bx) )//             = Log(1/B) + Log(Bx)//             = Log(1/B) + Log( 1 + (Bx-1))////      x  = 2^K 1.x_1x_2.....x_52//      B= frcpa(x) = 2^-k Cm//      Log(1/B) = Log(1/(2^-K Cm))//      Log(1/B) = Log((2^K/ Cm))//      Log(1/B) = K Log(2) + Log(1/Cm)////      Log(x)   = K Log(2) + Log(1/Cm) + Log( 1 + (Bx-1))//// If you take the significand of x, set the exponent to true 0, then Cm is// the frcpa. We tabulate the Log(1/Cm) values. There are 256 of them.// The frcpa table is indexed by 8 bits, the x_1 thru x_8.// m = x_1x_2...x_8 is an 8-bit index.////      Log(1/Cm) = log(1/frcpa(1+m/256)) where m goes from 0 to 255.//// We tabluate as two doubles, T and t, where T +t is the value itself.////      Log(x)   = (K Log(2)_hi + T) + (Log(2)_hi + t) + Log( 1 + (Bx-1))//      Log(x)   =  G + delta           + Log( 1 + (Bx-1))//// The Log( 1 + (Bx-1)) can be calculated as a series in r = Bx-1.////      Log( 1 + (Bx-1)) = r - rsq/2 + p//// Then,////      yLog(x) = yG + y delta + y(r-rsq/2) + yp//      yLog(x) = Z1 + e3      + Z2         + Z3 + (e2 + e3)//////     exp(yLog(x)) = exp(Z1 + Z2 + Z3) exp(e1 + e2 + e3)//////       exp(Z3) is another series.//       exp(e1 + e2 + e3) is approximated as f3 = 1 + (e1 + e2 + e3)////       Z1 (128/log2) = number of log2/128 in Z1 is N1//       Z2 (128/log2) = number of log2/128 in Z2 is N2////       s1 = Z1 - N1 log2/128//       s2 = Z2 - N2 log2/128////       s = s1 + s2//       N = N1 + N2////       exp(Z1 + Z2) = exp(Z)//       exp(Z)       = exp(s) exp(N log2/128)////       exp(r)       = exp(Z - N log2/128)////      r = s + d = (Z - N (log2/128)_hi) -N (log2/128)_lo//                =  Z - N (log2/128)////      Z         = s+d +N (log2/128)////      exp(Z)    = exp(s) (1+d) exp(N log2/128)////      N = M 128 + n////      N log2/128 = M log2 + n log2/128////      n is 8 binary digits = n_7n_6...n_1////      n log2/128 = n_7n_6n_5 16 log2/128 + n_4n_3n_2n_1 log2/128//      n log2/128 = n_7n_6n_5 log2/8 + n_4n_3n_2n_1 log2/128//      n log2/128 = I2 log2/8 + I1 log2/128////      N log2/128 = M log2 + I2 log2/8 + I1 log2/128////      exp(Z)    = exp(s) (1+d) exp(log(2^M) + log(2^I2/8) + log(2^I1/128))//      exp(Z)    = exp(s) (1+d1) (1+d2)(2^M) 2^I2/8 2^I1/128//      exp(Z)    = exp(s) f1 f2 (2^M) 2^I2/8 2^I1/128//// I1, I2 are table indices. Use a series for exp(s).// Then get exp(Z)////     exp(yLog(x)) = exp(Z1 + Z2 + Z3) exp(e1 + e2 + e3)//     exp(yLog(x)) = exp(Z) exp(Z3) f3//     exp(yLog(x)) = exp(Z)f3 exp(Z3)//     exp(yLog(x)) = A exp(Z3)//// We actually calculate exp(Z3) -1.// Then,//     exp(yLog(x)) = A + A( exp(Z3)   -1)//// Table Generation//==============================================================// The log values// ==============// The operation (K*log2_hi) must be exact. K is the true exponent of x.// If we allow gradual underflow (denormals), K can be represented in 12 bits// (as a two's complement number). We assume 13 bits as an engineering// precaution.////           +------------+----------------+-+//           |  13 bits   | 50 bits        | |//           +------------+----------------+-+//           0            1                66//                        2                34//// So we want the lsb(log2_hi) to be 2^-50// We get log2 as a quad-extended (15-bit exponent, 128-bit significand)////      0 fffe b17217f7d1cf79ab c9e3b39803f2f6af (4...)//// Consider numbering the bits left to right, starting at 0 thru 127.// Bit 0 is the 2^-1 bit; bit 49 is the 2^-50 bit.////  ...79ab//     0111 1001 1010 1011//     44//     89//// So if we shift off the rightmost 14 bits, then (shift back only// the top half) we get////      0 fffe b17217f7d1cf4000 e6af278ece600fcb dabc000000000000//// Put the right 64-bit signficand in an FR register, convert to double;// it is exact. Put the next 128 bits into a quad register and round to double.// The true exponent of the low part is -51.//// hi is 0 fffe b17217f7d1cf4000// lo is 0 ffcc e6af278ece601000//// Convert to double memory format and get//// hi is 0x3fe62e42fefa39e8// lo is 0x3cccd5e4f1d9cc02//// log2_hi + log2_lo is an accurate value for log2.////// The T and t values// ==================// A similar method is used to generate the T and t values.//// K * log2_hi + T  must be exact.//// Smallest T,t// ----------// The smallest T,t is//       T                   t// 0x3f60040155d58800, 0x3c93bce0ce3ddd81  log(1/frcpa(1+0/256))=  +1.95503e-003//// The exponent is 0x3f6 (biased)  or -9 (true).// For the smallest T value, what we want is to clip the significand such that// when it is shifted right by 9, its lsb is in the bit for 2^-51. The 9 is the// specific for the first entry. In general, it is 0xffff - (biased 15-bit// exponent).// Independently, what we have calculated is the table value as a quad// precision number.// Table entry 1 is// 0 fff6 80200aaeac44ef38 338f77605fdf8000//// We store this quad precision number in a data structure that is//    sign:           1//    exponent:      15//    signficand_hi: 64 (includes explicit bit)//    signficand_lo: 49// Because the explicit bit is included, the significand is 113 bits.//// Consider significand_hi for table entry 1.////// +-+--- ... -------+--------------------+// | |// +-+--- ... -------+--------------------+// 0 1               4444444455555555556666//                   2345678901234567890123//// Labeled as above, bit 0 is 2^0, bit 1 is 2^-1, etc.// Bit 42 is 2^-42. If we shift to the right by 9, the bit in// bit 42 goes in 51.//// So what we want to do is shift bits 43 thru 63 into significand_lo.// This is shifting bit 42 into bit 63, taking care to retain shifted-off bits.// Then shifting (just with signficaand_hi) back into bit 42.//// The shift_value is 63-42 = 21. In general, this is//      63 - (51 -(0xffff - 0xfff6))// For this example, it is//      63 - (51 - 9) = 63 - 42  = 21//// This means we are shifting 21 bits into significand_lo. We must maintain more// that a 128-bit signficand not to lose bits. So before the shift we put the// 128-bit significand into a 256-bit signficand and then shift.// The 256-bit significand has four parts: hh, hl, lh, and ll.//// Start off with//      hh         hl         lh         ll//      <64>       <49><15_0> <64_0>     <64_0>//// After shift by 21 (then return for significand_hi),//      <43><21_0> <21><43>   <6><58_0>  <64_0>//// Take the hh part and convert to a double. There is no rounding here.// The conversion is exact. The true exponent of the high part is the same as// the true exponent of the input quad.//// We have some 64 plus significand bits for the low part. In this example, we// have 70 bits. We want to round this to a double. Put them in a quad and then// do a quad fnorm.// For this example the true exponent of the low part is//      true_exponent_of_high - 43 = true_exponent_of_high - (64-21)// In general, this is//      true_exponent_of_high - (64 - shift_value)////// Largest T,t// ----------// The largest T,t is// 0x3fe62643fecf9742, 0x3c9e3147684bd37d  log(1/frcpa(1+255/256))=+6.92171e-001//// Table entry 256 is// 0 fffe b1321ff67cba178c 51da12f4df5a0000//// The shift value is//      63 - (51 -(0xffff - 0xfffe)) = 13//// The true exponent of the low part is//      true_exponent_of_high - (64 - shift_value)//      -1 - (64-13) = -52// Biased as a double, this is 0x3cb//////// So then lsb(T) must be >= 2^-51// msb(Klog2_hi) <= 2^12////              +--------+---------+//              |       51 bits    | <== largest T//              +--------+---------+//              | 9 bits | 42 bits | <== smallest T// +------------+----------------+-+// |  13 bits   | 50 bits        | |// +------------+----------------+-+// Special Cases//==============================================================//                                   double     float// overflow                          error 24   30// underflow                         error 25   31// X zero  Y zero//  +0     +0                 +1     error 26   32//  -0     +0                 +1     error 26   32//  +0     -0                 +1     error 26   32//  -0     -0                 +1     error 26   32// X zero  Y negative//  +0     -odd integer       +inf   error 27   33  divide-by-zero//  -0     -odd integer       -inf   error 27   33  divide-by-zero//  +0     !-odd integer      +inf   error 27   33  divide-by-zero

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
美腿丝袜在线亚洲一区| 日本黄色一区二区| 日韩电影免费在线看| 中文字幕一区不卡| 国产精品免费免费| 亚洲男人的天堂在线观看| 91精品国产综合久久精品| 欧美日韩在线精品一区二区三区激情| 9色porny自拍视频一区二区| 色哟哟一区二区在线观看| 久久99国产精品久久| 久久av中文字幕片| 国内精品免费**视频| 亚洲国产日产av| 日韩 欧美一区二区三区| 韩国精品主播一区二区在线观看| 国产91精品在线观看| 成人av免费在线播放| 99久免费精品视频在线观看 | 精品免费视频.| eeuss国产一区二区三区| 成人精品免费网站| 欧美艳星brazzers| 中文字幕中文字幕一区二区| 亚洲h在线观看| 免费高清在线一区| 91首页免费视频| 91精品国产福利| **网站欧美大片在线观看| 国产女人aaa级久久久级| 久久先锋资源网| 亚洲一级不卡视频| 国产在线精品一区二区三区不卡 | 欧美一区二区成人| 国产欧美综合在线观看第十页 | 国产精品你懂的| 亚洲成年人影院| 国产精品白丝jk白祙喷水网站| 日本高清不卡视频| 国产视频一区在线播放| 老司机精品视频一区二区三区| 欧美亚洲国产一区二区三区va| 国产精品国产三级国产普通话蜜臀 | 九一久久久久久| 色悠悠久久综合| 亚洲香蕉伊在人在线观| 91免费看`日韩一区二区| 国产精品的网站| 国产成人aaa| 久久精品一区二区三区不卡牛牛| 狠狠久久亚洲欧美| 欧美一级片免费看| 久久精品国产澳门| 久久久高清一区二区三区| 国产在线一区观看| 国产精品第一页第二页第三页| 欧美亚洲综合一区| 日日摸夜夜添夜夜添精品视频| 91精品欧美久久久久久动漫| 日韩和欧美一区二区| 久久久精品黄色| 色94色欧美sute亚洲线路二| 亚洲va韩国va欧美va精品| 色先锋久久av资源部| 亚洲永久精品大片| 538在线一区二区精品国产| 日韩高清不卡一区| 中文字幕一区二区在线播放| 欧美一区二区观看视频| 国产麻豆精品视频| 亚洲成人黄色影院| 国产精品第13页| 欧美一级片在线看| 91亚洲男人天堂| 日韩不卡手机在线v区| 国产拍欧美日韩视频二区| 在线成人高清不卡| 在线观看免费亚洲| 本田岬高潮一区二区三区| 日韩中文欧美在线| 中文字幕在线不卡视频| 亚洲精品一区在线观看| 色婷婷综合久久久久中文一区二区| 亚洲另类在线一区| 中日韩免费视频中文字幕| 久久伊人蜜桃av一区二区| 在线国产电影不卡| 欧美日韩国产天堂| 丰满白嫩尤物一区二区| 麻豆91精品视频| 久久女同精品一区二区| 91精品国产色综合久久不卡蜜臀| 日本道色综合久久| av不卡在线播放| 国产高清久久久| 国产综合久久久久久久久久久久| 亚洲国产成人精品视频| 天天综合天天综合色| 经典一区二区三区| 成人午夜电影久久影院| 91麻豆国产福利精品| 国产精品1区2区3区在线观看| 国产在线精品不卡| www.日韩大片| 欧美网站大全在线观看| 日韩三级免费观看| 国产精品久久久久久久久免费相片 | 成人免费毛片app| 一本久久精品一区二区| 欧美精品在线一区二区三区| 91精品啪在线观看国产60岁| 在线一区二区三区| 欧美一级欧美三级在线观看| 亚洲国产精品二十页| 日韩av一区二区在线影视| 久久精品国产一区二区三| 在线视频一区二区三区| 国产欧美精品区一区二区三区 | 亚洲欧洲99久久| 国产在线麻豆精品观看| 欧洲一区在线电影| 亚洲日本免费电影| 国产成人鲁色资源国产91色综 | 另类小说色综合网站| 91丨九色丨尤物| 国产欧美日韩不卡免费| 国精品**一区二区三区在线蜜桃| 成人av片在线观看| 欧美美女网站色| 亚洲国产一区二区三区青草影视| 99精品久久免费看蜜臀剧情介绍| 久久久久久黄色| 黄色日韩三级电影| 日韩美一区二区三区| 男女男精品视频网| 91精品国产麻豆| 日本aⅴ亚洲精品中文乱码| 欧美色网站导航| 轻轻草成人在线| 国产suv精品一区二区883| 91久久精品国产91性色tv| 69久久99精品久久久久婷婷| 久久久久久久久蜜桃| 狠狠色狠狠色综合系列| 一区二区三区在线看| 精品国产免费人成在线观看| 国内精品在线播放| 午夜欧美一区二区三区在线播放| 国产精品每日更新| 久久精品网站免费观看| caoporn国产精品| 亚洲精品视频在线| 精品国产露脸精彩对白| 99精品久久99久久久久| 美女看a上一区| 亚洲欧洲日韩在线| 日韩午夜三级在线| 高清视频一区二区| 男女性色大片免费观看一区二区| 精品国产1区二区| 欧美在线免费视屏| 国产一区二区在线看| 国产欧美精品一区二区色综合| 国产成人av影院| 蜜桃视频在线观看一区| 亚洲成人激情自拍| 亚洲激情一二三区| 亚洲乱码国产乱码精品精可以看| 欧美一级久久久久久久大片| 欧美视频中文一区二区三区在线观看| 国产福利一区二区三区视频| 奇米精品一区二区三区在线观看| 亚洲一级片在线观看| 国产精品丝袜久久久久久app| 日韩精品一区国产麻豆| 欧美日韩成人高清| 欧美高清精品3d| 6080yy午夜一二三区久久| 精品三级在线看| 中文字幕不卡在线| 亚洲精选在线视频| 亚洲成av人片在线观看无码| 青青草原综合久久大伊人精品优势 | 色哟哟亚洲精品| 制服丝袜亚洲播放| 精品少妇一区二区三区视频免付费| 精品成人一区二区三区| 欧美高清你懂得| 欧美日韩精品三区| 精品国产乱码久久| 亚洲成a人v欧美综合天堂| 五月天久久比比资源色| 色综合久久中文字幕| 欧美不卡激情三级在线观看| 国产精品青草久久| 激情欧美一区二区三区在线观看| 不卡影院免费观看| 欧美α欧美αv大片| 亚洲香肠在线观看| 国产成人免费视频一区|