-
由 anish kumar 提交于
Rather than re-inventing the wheel we can use the hamming function to calculate the number of bits set to check for violation of exclusivity. Signed-off-by: Nanish kumar <anish198519851985@gmail.com> Signed-off-by: NMyungJoo Ham <myungjoo.ham@samsung.com>
28c0ada6