acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Month
authorDaniel Lemire
bg-corner

Programmer time and the pitfalls of wasteful work
From Daniel Lemire's Blog

Programmer time and the pitfalls of wasteful work

Programmer time is precious. This realization should shape our approach to software development, focusing our efforts on tasks that genuinely contribute to theContinue...

Regular expressions can blow up!
From Daniel Lemire's Blog

Regular expressions can blow up!

Regular expressions, often abbreviated as regex, are a powerful tool for pattern matching within text. For example, the expression \d*\.?\d+ would match a positive...

Checking whether an ARM NEON register is zero
From Daniel Lemire's Blog

Checking whether an ARM NEON register is zero

Your phone probably runs on 64-bit ARM processors. These processors are ubiquitous: they power the Nintendo Switch, they power cloud servers at both Amazon AWSContinue...

JavaScript hashing speed comparison: MD5 versus SHA-256
From Daniel Lemire's Blog

JavaScript hashing speed comparison: MD5 versus SHA-256

Hashing algorithms convert input data into a fixed-size string of characters, known as a hash value or digest. These algorithms are one-way functions, meaning the...

Counting the digits of 64-bit integers
From Daniel Lemire's Blog

Counting the digits of 64-bit integers

Given an integer in software, you may want to know how many decimal digits it needs. For example, the integer 100 requires 3 digits, the integer 9999 requires 4...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account