* by the book 'Hacker's Delight'. The original source and full proof
* can be found here and is available for use without restriction.
*
* by the book 'Hacker's Delight'. The original source and full proof
* can be found here and is available for use without restriction.
*