Beautiful Code [368]
Hamming distance between two bit vectors
hardcoded parameter values
hardware 2nd 3rd 4th 5th 6th
recursive LU 2nd
hardware interfaces
hardware speech synthesizer (DECTalk Express)
hardware, evolution of elegant code with
effects of computer architecture on matrix algorithms
LAPACK DGEFR subroutine 2nd 3rd
Harold
hash tables
binary search vs.
bitmask representing size in PyDictObject structure
keys hashing to same slot
loading a big hash
resizing for Python dictionaries
hashes
constructed by code reading columnDb
filtered genes in Gene Sorter
Ruby
Haskell 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
side effects and I/O
functional nature of Haskell
side effects and input/output 2nd 3rd 4th 5th
summary of basic STM Haskell operations
Hawking
Hayes
hidden CGI variables
key into session table for Gene Sorter
Hoare 2nd 3rd
hook methods
in Logging_Server run( ) template method 2nd
use in reactive logging server implementation
host infrastructure middleware
hot swapping
HotkeyAdaptor interface (example)
HotkeyAdaptorFactory class (example)
hourglass glyph (example)
HTML
rendered by speech-enabled Emacs W3 and ACSS
HTTP exchanges
HTTP POST method
human genome sequence
human memory
hygiene condition for macro expansion
hygienic macro expansion
KFFD algorithm
lexical scoping implemented for source code
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
I/O abstraction independence on FreeBSD
I/O in Haskell 2nd 3rd 4th
IBM Java function library to integrate RPG systems with client/server software
IBM WebSphere application server
id-label procedure
ideal partitioning method (Quicksort)
identifier? predicate
identifiers
comparing
mapping to bindings with substitutions
Python
unintended variable captures
introduced bindings and references
scoping in output instead of input
if form
if statement (JavaScript)
IL Disassembler
ILGenerator class
Emit method
image filters
image maps for Bio::Graphics output
image processing code 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
FilterMethodCS 2nd 3rd
FilterMethodIL 2nd
ImageFilter class
images held in NumPy array
IMAP
modifying Cryptonite mail store to use
performance bottlenecks in Cryptonite mail store after implementing
IMAP server as a mail store (Cryptonite)
in PyArrayIterObject
in situ debugging
inaudible (Emacspeak personality)
include form
indexing
indexing feature
individual rights in the digital age
protection with communications privacy
infix function (JavaScript)
infix operators (JavaScript) 2nd 3rd 4th
inheritance
inheritance structure
inode structure (Linux)
input interface (eLocutor) 2nd 3rd 4th 5th 6th 7th 8th
cache implementation
clipboard
common words and favorites
long click 2nd 3rd 4th
macros
retracing paths
searching
simple typing
Templates and Replace
typing buffer
input validation (Cryptonite mail system)
instance method calls in Java
integration as key to success in large applications
intended variable captures
interactive web applications 2nd
Intermediate Language (IL)
assignment and operational logic based on virtual evaluation stack
dynamic generation of
function optimization for fast digital filter
generated by C# compiler
interrupts
intersections of segments
intonation in speech
inventor's paradox
inversion of control in runtime architecture of OO framework
inverted index
IO actions (Haskell)
list comprehension
situations where use is essential
STM (IO ( )) action type
STM actions vs. as function types
IPC (interprocess communication) mechanisms
ACE wrapper facades
associating concurrency strategy with
IPC::Run module (Perl)
ISO-9660 filesystem
isolation (Haskell transactions)
isXMLDigit( ) method
iterating over entire blocking chain coherently (in Solaris)
iteration
iterations through Python dictionaries
Iterative_Logging_Server
evaluating
Iterator pattern
iterators
designing in NumPy 2nd 3rd 4th 5th 6th 7th 8th
iterator counter tracking
iterator