Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
Computer
|
200,839
|
6,478
|
C
|
Top
|
2
|
Artificial intelligence
|
184,348
|
5,946
|
B
|
Top
|
3
|
Python (programming language)
|
180,958
|
5,837
|
GA
|
Mid
|
4
|
C (programming language)
|
136,487
|
4,402
|
B
|
High
|
5
|
Tim Berners-Lee
|
133,036
|
4,291
|
C
|
Top
|
6
|
Video game
|
132,831
|
4,284
|
B
|
Mid
|
7
|
Operating system
|
128,759
|
4,153
|
B
|
High
|
8
|
Machine learning
|
116,651
|
3,762
|
B
|
High
|
9
|
Java (programming language)
|
113,000
|
3,645
|
C
|
Mid
|
10
|
JavaScript
|
112,006
|
3,613
|
B
|
Mid
|
11
|
P versus NP problem
|
101,488
|
3,273
|
B
|
Top
|
12
|
HTML
|
99,246
|
3,201
|
B
|
Top
|
13
|
Regular expression
|
97,698
|
3,151
|
B
|
High
|
14
|
Agile software development
|
95,958
|
3,095
|
B
|
High
|
15
|
Conway's Game of Life
|
94,990
|
3,064
|
B
|
High
|
16
|
Dijkstra's algorithm
|
91,849
|
2,962
|
C
|
Top
|
17
|
C++
|
89,465
|
2,885
|
B
|
High
|
18
|
JSON
|
84,785
|
2,735
|
B
|
Mid
|
19
|
Algorithm
|
80,476
|
2,596
|
B
|
Top
|
20
|
Information
|
80,176
|
2,586
|
C
|
Top
|
21
|
Cryptography
|
78,872
|
2,544
|
B
|
Top
|
22
|
Google Search
|
78,438
|
2,530
|
C
|
High
|
23
|
Katherine Johnson
|
77,578
|
2,502
|
GA
|
High
|
24
|
Computer science
|
77,191
|
2,490
|
C
|
Top
|
25
|
Big O notation
|
74,533
|
2,404
|
B
|
Top
|
26
|
R (programming language)
|
72,332
|
2,333
|
C
|
Mid
|
27
|
Deep learning
|
65,810
|
2,122
|
C
|
High
|
28
|
Monte Carlo method
|
65,223
|
2,103
|
B
|
High
|
29
|
UTF-8
|
64,807
|
2,090
|
B
|
Mid
|
30
|
Go (programming language)
|
64,431
|
2,078
|
C
|
Low
|
31
|
Moore's law
|
64,330
|
2,075
|
B
|
Mid
|
32
|
Artificial neural network
|
63,108
|
2,035
|
C
|
Mid
|
33
|
Programming language
|
62,897
|
2,028
|
B
|
Top
|
34
|
Rust (programming language)
|
62,072
|
2,002
|
B
|
Mid
|
35
|
Turing machine
|
61,813
|
1,993
|
B
|
Top
|
36
|
C Sharp (programming language)
|
61,531
|
1,984
|
B
|
Low
|
37
|
Database
|
61,524
|
1,984
|
C
|
Top
|
38
|
K-means clustering
|
60,003
|
1,935
|
C
|
Mid
|
39
|
Assembly language
|
59,836
|
1,930
|
B
|
High
|
40
|
Millennium Prize Problems
|
59,346
|
1,914
|
C
|
Mid
|
41
|
Support-vector machine
|
58,480
|
1,886
|
C
|
Mid
|
42
|
Unix
|
58,473
|
1,886
|
B
|
Mid
|
43
|
A* search algorithm
|
57,742
|
1,862
|
B
|
Mid
|
44
|
Data science
|
56,674
|
1,828
|
Start
|
High
|
45
|
Order of operations
|
56,156
|
1,811
|
C
|
Mid
|
46
|
Prisoner's dilemma
|
55,825
|
1,800
|
C
|
High
|
47
|
Travelling salesman problem
|
55,722
|
1,797
|
B
|
Top
|
48
|
Quicksort
|
55,417
|
1,787
|
B
|
Top
|
49
|
Programmer
|
53,297
|
1,719
|
C
|
Mid
|
50
|
Turing test
|
53,204
|
1,716
|
B
|
High
|
51
|
Hash function
|
53,130
|
1,713
|
C
|
High
|
52
|
Virtual reality
|
52,399
|
1,690
|
C
|
Mid
|
53
|
Web colors
|
52,371
|
1,689
|
C
|
Mid
|
54
|
Model–view–controller
|
51,865
|
1,673
|
Start
|
Mid
|
55
|
Brainfuck
|
51,649
|
1,666
|
C
|
Low
|
56
|
Natural language processing
|
50,512
|
1,629
|
C
|
Top
|
57
|
Heuristic
|
49,441
|
1,594
|
C
|
Mid
|
58
|
Software design pattern
|
49,145
|
1,585
|
C
|
High
|
59
|
Computer programming
|
46,890
|
1,512
|
C
|
Top
|
60
|
Floating-point arithmetic
|
46,793
|
1,509
|
B
|
Top
|
61
|
Diffie–Hellman key exchange
|
46,686
|
1,506
|
C
|
Mid
|
62
|
Hash table
|
46,112
|
1,487
|
B
|
High
|
63
|
RGB color model
|
45,310
|
1,461
|
B
|
Low
|
64
|
Binary search algorithm
|
45,188
|
1,457
|
FA
|
High
|
65
|
Free and open-source software
|
44,528
|
1,436
|
C
|
Top
|
66
|
OpenAI
|
43,791
|
1,412
|
Start
|
Low
|
67
|
Open-source software
|
43,090
|
1,390
|
C
|
Top
|
68
|
Time complexity
|
42,795
|
1,380
|
B
|
High
|
69
|
Breadth-first search
|
41,806
|
1,348
|
Start
|
High
|
70
|
Turing completeness
|
41,679
|
1,344
|
C
|
Top
|
71
|
Two's complement
|
40,641
|
1,311
|
B
|
High
|
72
|
Sorting algorithm
|
40,629
|
1,310
|
C
|
Top
|
73
|
Bitwise operation
|
40,531
|
1,307
|
C
|
High
|
74
|
Linear programming
|
39,695
|
1,280
|
B
|
High
|
75
|
Fortran
|
39,658
|
1,279
|
C
|
Mid
|
76
|
Merge sort
|
39,133
|
1,262
|
C
|
High
|
77
|
Finite-state machine
|
38,952
|
1,256
|
B
|
Top
|
78
|
Scratch (programming language)
|
37,938
|
1,223
|
C
|
Low
|
79
|
Graph theory
|
37,922
|
1,223
|
C
|
Top
|
80
|
Functional programming
|
37,798
|
1,219
|
B
|
Top
|
81
|
Halting problem
|
37,776
|
1,218
|
B
|
Top
|
82
|
Kernel (operating system)
|
37,590
|
1,212
|
B
|
High
|
83
|
Unified Modeling Language
|
37,245
|
1,201
|
C
|
High
|
84
|
Depth-first search
|
37,156
|
1,198
|
C
|
Top
|
85
|
NP-completeness
|
36,642
|
1,182
|
C
|
Top
|
86
|
Boolean algebra
|
36,405
|
1,174
|
B
|
High
|
87
|
Cognition
|
36,399
|
1,174
|
C
|
Low
|
88
|
ECMAScript
|
35,923
|
1,158
|
C
|
Mid
|
89
|
Data mining
|
35,874
|
1,157
|
B
|
High
|
90
|
Quantum logic gate
|
35,545
|
1,146
|
Start
|
Unknown
|
91
|
Malware
|
35,197
|
1,135
|
C
|
High
|
92
|
Dynamic programming
|
35,114
|
1,132
|
B
|
Top
|
93
|
Levenshtein distance
|
34,922
|
1,126
|
C
|
Mid
|
94
|
Tower of Hanoi
|
34,862
|
1,124
|
C
|
Mid
|
95
|
Cluster analysis
|
34,689
|
1,119
|
C
|
High
|
96
|
Advanced Video Coding
|
34,499
|
1,112
|
C
|
Low
|
97
|
NoSQL
|
34,484
|
1,112
|
C
|
Low
|
98
|
Lisp (programming language)
|
33,829
|
1,091
|
B
|
High
|
99
|
Knapsack problem
|
33,818
|
1,090
|
B
|
Mid
|
100
|
High Efficiency Video Coding
|
33,134
|
1,068
|
B
|
Low
|
101
|
Software engineering
|
32,787
|
1,057
|
C
|
Top
|
102
|
Relational database
|
32,683
|
1,054
|
C
|
Top
|
103
|
Computer program
|
32,656
|
1,053
|
B
|
Top
|
104
|
Programming paradigm
|
32,472
|
1,047
|
C
|
Mid
|
105
|
Lambda calculus
|
32,204
|
1,038
|
B
|
Top
|
106
|
Data structure
|
31,768
|
1,024
|
C
|
Top
|
107
|
Heap (data structure)
|
31,519
|
1,016
|
C
|
High
|
108
|
First-order logic
|
31,503
|
1,016
|
B
|
High
|
109
|
Vector graphics
|
31,229
|
1,007
|
Start
|
High
|
110
|
Software developer
|
31,196
|
1,006
|
NA
|
Low
|
111
|
Stochastic gradient descent
|
31,036
|
1,001
|
Start
|
Mid
|
112
|
Binary search tree
|
30,957
|
998
|
C
|
High
|
113
|
BASIC
|
30,945
|
998
|
C
|
Mid
|
114
|
Compiler
|
30,830
|
994
|
C
|
Top
|
115
|
Bubble sort
|
30,816
|
994
|
B
|
High
|
116
|
Tf–idf
|
30,616
|
987
|
C
|
Low
|
117
|
De Morgan's laws
|
30,614
|
987
|
Start
|
High
|
118
|
Tree (data structure)
|
30,557
|
985
|
C
|
High
|
119
|
Data type
|
30,545
|
985
|
C
|
Mid
|
120
|
Insertion sort
|
29,774
|
960
|
B
|
High
|
121
|
Huffman coding
|
29,566
|
953
|
C
|
High
|
122
|
Sieve of Eratosthenes
|
29,505
|
951
|
C
|
Mid
|
123
|
Genetic algorithm
|
29,328
|
946
|
C
|
High
|
124
|
Version control
|
29,012
|
935
|
C
|
High
|
125
|
Information theory
|
28,862
|
931
|
B
|
Top
|
126
|
NP-hardness
|
28,839
|
930
|
C
|
High
|
127
|
Exclusive or
|
28,693
|
925
|
C
|
Mid
|
128
|
TypeScript
|
28,575
|
921
|
C
|
Low
|
129
|
Ray tracing (graphics)
|
28,518
|
919
|
B
|
Mid
|
130
|
Haskell (programming language)
|
28,366
|
915
|
B
|
Mid
|
131
|
B-tree
|
28,184
|
909
|
C
|
High
|
132
|
Qubit
|
27,837
|
897
|
Start
|
High
|
133
|
IEEE 754
|
27,824
|
897
|
C
|
High
|
134
|
Mathematical optimization
|
27,784
|
896
|
B
|
High
|
135
|
Lua (programming language)
|
27,542
|
888
|
C
|
Mid
|
136
|
Discrete mathematics
|
27,293
|
880
|
B
|
Top
|
137
|
Cosine similarity
|
27,269
|
879
|
C
|
Low
|
138
|
Ajax (programming)
|
27,222
|
878
|
Start
|
High
|
139
|
AV1
|
27,071
|
873
|
B
|
Low
|
140
|
Computer vision
|
26,892
|
867
|
C
|
Mid
|
141
|
Linked list
|
26,771
|
863
|
B
|
Top
|
142
|
Singleton pattern
|
26,752
|
862
|
C
|
Mid
|
143
|
Optical character recognition
|
26,730
|
862
|
C
|
Mid
|
144
|
Claude Shannon
|
26,657
|
859
|
B
|
High
|
145
|
Don't repeat yourself
|
26,636
|
859
|
Start
|
Mid
|
146
|
Swift (programming language)
|
26,393
|
851
|
B
|
Mid
|
147
|
Bioinformatics
|
26,386
|
851
|
C
|
High
|
148
|
Cross-site request forgery
|
26,255
|
846
|
C
|
High
|
149
|
Cybernetics
|
26,236
|
846
|
B
|
Mid
|
150
|
Real-time operating system
|
26,101
|
841
|
Start
|
Mid
|
151
|
Pareto efficiency
|
26,057
|
840
|
C
|
Mid
|
152
|
Dennis Ritchie
|
26,007
|
838
|
Start
|
Top
|
153
|
Red–black tree
|
25,749
|
830
|
C
|
High
|
154
|
Smart city
|
25,600
|
825
|
C
|
Mid
|
155
|
Trie
|
25,590
|
825
|
B
|
High
|
156
|
Activation function
|
25,564
|
824
|
Start
|
Mid
|
157
|
Distributed computing
|
25,088
|
809
|
B
|
Top
|
158
|
Usage share of operating systems
|
24,840
|
801
|
B
|
High
|
159
|
Minimum spanning tree
|
24,820
|
800
|
C
|
High
|
160
|
Floor and ceiling functions
|
24,794
|
799
|
B
|
Mid
|
161
|
POSIX
|
24,774
|
799
|
Start
|
Mid
|
162
|
Class diagram
|
24,709
|
797
|
Start
|
Low
|
163
|
Stack (abstract data type)
|
24,586
|
793
|
C
|
High
|
164
|
Julia (programming language)
|
24,571
|
792
|
C
|
Low
|
165
|
Fast inverse square root
|
24,359
|
785
|
GA
|
Low
|
166
|
Autoencoder
|
24,359
|
785
|
Start
|
Unknown
|
167
|
Topological sorting
|
24,335
|
785
|
C
|
High
|
168
|
Binary tree
|
24,132
|
778
|
B
|
Top
|
169
|
Operations research
|
24,047
|
775
|
C
|
High
|
170
|
Free software
|
23,984
|
773
|
C
|
Top
|
171
|
Deep Blue (chess computer)
|
23,909
|
771
|
C
|
Mid
|
172
|
Graph (discrete mathematics)
|
23,457
|
756
|
B
|
High
|
173
|
Observer pattern
|
23,339
|
752
|
Start
|
Mid
|
174
|
Artificial general intelligence
|
23,323
|
752
|
C
|
Mid
|
175
|
Computer engineering
|
23,313
|
752
|
C
|
Top
|
176
|
Tree traversal
|
23,306
|
751
|
C
|
High
|
177
|
Adjacency matrix
|
23,193
|
748
|
C
|
Mid
|
178
|
Neural network
|
23,176
|
747
|
C
|
Unknown
|
179
|
Boolean satisfiability problem
|
22,921
|
739
|
C
|
Mid
|
180
|
High-level programming language
|
22,728
|
733
|
Start
|
High
|
181
|
BERT (language model)
|
22,568
|
728
|
Start
|
Unknown
|
182
|
Brute-force attack
|
22,340
|
720
|
C
|
High
|
183
|
Dependency inversion principle
|
22,123
|
713
|
Start
|
Low
|
184
|
AVL tree
|
22,095
|
712
|
C
|
High
|
185
|
Greedy algorithm
|
21,945
|
707
|
C
|
High
|
186
|
Computer architecture
|
21,584
|
696
|
C
|
Top
|
187
|
Expectation–maximization algorithm
|
21,531
|
694
|
C
|
High
|
188
|
Factory method pattern
|
21,523
|
694
|
Start
|
Mid
|
189
|
Markov chain Monte Carlo
|
21,478
|
692
|
C
|
High
|
190
|
Recursion
|
21,431
|
691
|
C
|
Mid
|
191
|
Unsupervised learning
|
21,368
|
689
|
C
|
Mid
|
192
|
Shortest path problem
|
21,175
|
683
|
C
|
High
|
193
|
Bellman–Ford algorithm
|
20,862
|
672
|
C
|
Mid
|
194
|
Source code
|
20,717
|
668
|
C
|
High
|
195
|
Kruskal's algorithm
|
20,711
|
668
|
Start
|
High
|
196
|
Semaphore (programming)
|
20,271
|
653
|
Start
|
High
|
197
|
Software development process
|
20,219
|
652
|
C
|
Mid
|
198
|
Continuous integration
|
20,215
|
652
|
B
|
Low
|
199
|
Thread (computing)
|
20,113
|
648
|
C
|
High
|
200
|
Donald Knuth
|
20,091
|
648
|
B
|
Top
|
201
|
Prim's algorithm
|
20,056
|
646
|
C
|
High
|
202
|
Institute of Electrical and Electronics Engineers
|
19,986
|
644
|
B
|
Top
|
203
|
AlphaGo
|
19,843
|
640
|
C
|
High
|
204
|
Computer graphics
|
19,758
|
637
|
B
|
Top
|
205
|
Race condition
|
19,742
|
636
|
C
|
Mid
|
206
|
Magic number (programming)
|
19,659
|
634
|
C
|
Mid
|
207
|
Cellular automaton
|
19,656
|
634
|
B
|
Top
|
208
|
Jaccard index
|
19,645
|
633
|
C
|
Mid
|
209
|
Complex system
|
19,529
|
629
|
C
|
High
|
210
|
Bias–variance tradeoff
|
19,472
|
628
|
Start
|
Unknown
|
211
|
Intrusion detection system
|
19,289
|
622
|
Start
|
Low
|
212
|
Turing Award
|
19,275
|
621
|
Start
|
Top
|
213
|
Hierarchical clustering
|
19,182
|
618
|
C
|
Mid
|
214
|
Ada (programming language)
|
19,029
|
613
|
Unknown
|
Unknown
|
215
|
Polymorphism (computer science)
|
18,961
|
611
|
C
|
High
|
216
|
Scripting language
|
18,915
|
610
|
C
|
Mid
|
217
|
Floyd–Warshall algorithm
|
18,900
|
609
|
B
|
High
|
218
|
Ken Thompson
|
18,805
|
606
|
B
|
Top
|
219
|
Deadlock
|
18,726
|
604
|
C
|
High
|
220
|
Binary heap
|
18,708
|
603
|
B
|
High
|
221
|
Context-free grammar
|
18,616
|
600
|
B
|
Top
|
222
|
Automaton
|
18,593
|
599
|
C
|
High
|
223
|
Garbage collection (computer science)
|
18,565
|
598
|
C
|
High
|
224
|
Cognitive science
|
18,558
|
598
|
C
|
High
|
225
|
Type system
|
18,507
|
597
|
B
|
High
|
226
|
Cyclomatic complexity
|
18,425
|
594
|
C
|
Low
|
227
|
Liskov substitution principle
|
18,408
|
593
|
Start
|
Mid
|
228
|
Hackathon
|
18,361
|
592
|
Start
|
Mid
|
229
|
NP (complexity)
|
18,272
|
589
|
C
|
High
|
230
|
Checksum
|
18,247
|
588
|
Start
|
Mid
|
231
|
Selection sort
|
18,216
|
587
|
C
|
High
|
232
|
Pseudorandom number generator
|
18,210
|
587
|
C
|
High
|
233
|
Array data structure
|
18,205
|
587
|
C
|
Top
|
234
|
Digital Revolution
|
18,162
|
585
|
Start
|
Mid
|
235
|
Heapsort
|
17,982
|
580
|
B
|
High
|
236
|
Graph coloring
|
17,888
|
577
|
B
|
Mid
|
237
|
Cache replacement policies
|
17,846
|
575
|
C
|
Mid
|
238
|
Hamming code
|
17,838
|
575
|
C
|
High
|
239
|
Business Process Model and Notation
|
17,829
|
575
|
Start
|
Mid
|
240
|
Hamming distance
|
17,822
|
574
|
Start
|
High
|
241
|
Priority queue
|
17,795
|
574
|
C
|
High
|
242
|
Parsing
|
17,791
|
573
|
Start
|
Top
|
243
|
K-d tree
|
17,687
|
570
|
C
|
Low
|
244
|
Amdahl's law
|
17,658
|
569
|
C
|
High
|
245
|
AArch64
|
17,627
|
568
|
Start
|
Low
|
246
|
Human–computer interaction
|
17,587
|
567
|
C
|
Top
|
247
|
Edsger W. Dijkstra
|
17,517
|
565
|
B
|
High
|
248
|
Inversion of control
|
17,512
|
564
|
Start
|
Low
|
249
|
ISO/IEC 8859-1
|
17,478
|
563
|
Start
|
Unknown
|
250
|
Markup language
|
17,404
|
561
|
C
|
High
|
251
|
Computing
|
17,344
|
559
|
C
|
High
|
252
|
Automata theory
|
17,278
|
557
|
C
|
Top
|
253
|
Lossless compression
|
17,270
|
557
|
C
|
High
|
254
|
DBSCAN
|
17,113
|
552
|
C
|
Mid
|
255
|
Imperative programming
|
17,102
|
551
|
C
|
Top
|
256
|
Color depth
|
16,949
|
546
|
C
|
Low
|
257
|
Computational fluid dynamics
|
16,932
|
546
|
B
|
High
|
258
|
Tensor Processing Unit
|
16,860
|
543
|
C
|
Mid
|
259
|
Prolog
|
16,795
|
541
|
B
|
Mid
|
260
|
Composition over inheritance
|
16,743
|
540
|
C
|
Low
|
261
|
Category theory
|
16,735
|
539
|
B
|
High
|
262
|
Ontology (information science)
|
16,680
|
538
|
C
|
High
|
263
|
Sparse matrix
|
16,629
|
536
|
C
|
Mid
|
264
|
Data model
|
16,572
|
534
|
C
|
High
|
265
|
Naming convention (programming)
|
16,553
|
533
|
Start
|
Unknown
|
266
|
List of tools for static code analysis
|
16,481
|
531
|
List
|
Low
|
267
|
Disjoint-set data structure
|
16,466
|
531
|
C
|
High
|
268
|
Scaled agile framework
|
16,454
|
530
|
C
|
Low
|
269
|
Strategy pattern
|
16,403
|
529
|
Start
|
Mid
|
270
|
History of Python
|
16,375
|
528
|
C
|
Low
|
271
|
Monad (functional programming)
|
16,362
|
527
|
B
|
Mid
|
272
|
Best, worst and average case
|
16,335
|
526
|
Start
|
High
|
273
|
Radix sort
|
16,288
|
525
|
Start
|
High
|
274
|
Erlang (programming language)
|
16,266
|
524
|
B
|
Mid
|
275
|
Colossus computer
|
16,217
|
523
|
B
|
Mid
|
276
|
Residual neural network
|
16,180
|
521
|
Start
|
Low
|
277
|
Pseudocode
|
16,123
|
520
|
C
|
High
|
278
|
Recursion (computer science)
|
16,120
|
520
|
C
|
Top
|
279
|
Esoteric programming language
|
15,993
|
515
|
Start
|
Unknown
|
280
|
Ensemble learning
|
15,948
|
514
|
C
|
Mid
|
281
|
Raster graphics
|
15,899
|
512
|
Start
|
Mid
|
282
|
Numerical analysis
|
15,853
|
511
|
B
|
Top
|
283
|
Foobar
|
15,767
|
508
|
C
|
Mid
|
284
|
Interface (computing)
|
15,732
|
507
|
C
|
Low
|
285
|
Simplex algorithm
|
15,722
|
507
|
C
|
High
|
286
|
Role-based access control
|
15,721
|
507
|
C
|
Mid
|
287
|
Natalie Enright Jerger
|
15,676
|
505
|
Start
|
Unknown
|
288
|
Rounding
|
15,670
|
505
|
B
|
Low
|
289
|
HTML element
|
15,601
|
503
|
C
|
Mid
|
290
|
HTTP Live Streaming
|
15,584
|
502
|
Start
|
Low
|
291
|
Reed–Solomon error correction
|
15,553
|
501
|
C
|
Mid
|
292
|
Inheritance (object-oriented programming)
|
15,538
|
501
|
Start
|
Mid
|
293
|
In-place algorithm
|
15,371
|
495
|
Start
|
Unknown
|
294
|
Decorator pattern
|
15,313
|
493
|
Start
|
Low
|
295
|
Marvin Minsky
|
15,280
|
492
|
C
|
Unknown
|
296
|
Software engineer
|
15,263
|
492
|
Start
|
Mid
|
297
|
Heuristic (computer science)
|
15,252
|
492
|
Unknown
|
Unknown
|
298
|
Abstraction (computer science)
|
15,247
|
491
|
Start
|
Top
|
299
|
Monte Carlo tree search
|
15,242
|
491
|
C
|
Mid
|
300
|
Procedural programming
|
15,177
|
489
|
Start
|
Mid
|
301
|
List of data structures
|
15,088
|
486
|
List
|
High
|
302
|
Particle swarm optimization
|
15,048
|
485
|
C
|
Mid
|
303
|
Lenna
|
14,984
|
483
|
C
|
Unknown
|
304
|
Vint Cerf
|
14,896
|
480
|
Start
|
Mid
|
305
|
Visitor pattern
|
14,848
|
478
|
Start
|
Unknown
|
306
|
Error detection and correction
|
14,820
|
478
|
C
|
Unknown
|
307
|
Data-flow diagram
|
14,807
|
477
|
Start
|
Mid
|
308
|
Bresenham's line algorithm
|
14,760
|
476
|
C
|
Mid
|
309
|
Formal language
|
14,745
|
475
|
C
|
High
|
310
|
String (computer science)
|
14,660
|
472
|
Start
|
High
|
311
|
Primality test
|
14,640
|
472
|
Start
|
Mid
|
312
|
Builder pattern
|
14,620
|
471
|
Start
|
Unknown
|
313
|
Integer (computer science)
|
14,609
|
471
|
C
|
Mid
|
314
|
Computational complexity theory
|
14,590
|
470
|
C
|
Top
|
315
|
Directed graph
|
14,585
|
470
|
C
|
High
|
316
|
Memetics
|
14,553
|
469
|
Start
|
Unknown
|
317
|
Voxel
|
14,488
|
467
|
C
|
Mid
|
318
|
Code
|
14,488
|
467
|
C
|
High
|
319
|
Signal processing
|
14,286
|
460
|
C
|
Low
|
320
|
POST (HTTP)
|
14,281
|
460
|
Start
|
Low
|
321
|
Canny edge detector
|
14,271
|
460
|
Start
|
Mid
|
322
|
Chomsky hierarchy
|
14,251
|
459
|
Start
|
Top
|
323
|
Pointer (computer programming)
|
14,224
|
458
|
C
|
High
|
324
|
Numerical integration
|
14,157
|
456
|
B
|
Mid
|
325
|
Boolean data type
|
14,134
|
455
|
Start
|
Low
|
326
|
Multiplication sign
|
14,028
|
452
|
C
|
Low
|
327
|
Abstract data type
|
13,999
|
451
|
C
|
High
|
328
|
Deep learning super sampling
|
13,973
|
450
|
C
|
Low
|
329
|
Maximum subarray problem
|
13,928
|
449
|
Unknown
|
Unknown
|
330
|
Watson (computer)
|
13,894
|
448
|
GA
|
Mid
|
331
|
Expert system
|
13,838
|
446
|
Start
|
Mid
|
332
|
Criticism of C++
|
13,813
|
445
|
C
|
Unknown
|
333
|
Rendering (computer graphics)
|
13,696
|
441
|
B
|
High
|
334
|
List of datasets for machine-learning research
|
13,672
|
441
|
List
|
Mid
|
335
|
Aspect-oriented programming
|
13,669
|
440
|
Start
|
Mid
|
336
|
Computer science and engineering
|
13,660
|
440
|
Start
|
Low
|
337
|
Data visualization
|
13,615
|
439
|
C
|
High
|
338
|
Lexical analysis
|
13,602
|
438
|
C
|
High
|
339
|
Master theorem (analysis of algorithms)
|
13,523
|
436
|
C
|
High
|
340
|
Ben Horowitz
|
13,413
|
432
|
Start
|
Low
|
341
|
Bjarne Stroustrup
|
13,392
|
432
|
Start
|
High
|
342
|
Nim
|
13,375
|
431
|
Unknown
|
Unknown
|
343
|
Longest common subsequence problem
|
13,342
|
430
|
Start
|
High
|
344
|
Planar graph
|
13,307
|
429
|
B
|
Mid
|
345
|
Hungarian notation
|
13,286
|
428
|
Start
|
Low
|
346
|
Actor model
|
13,282
|
428
|
C
|
Mid
|
347
|
Mersenne Twister
|
13,223
|
426
|
Unknown
|
Unknown
|
348
|
B+ tree
|
13,152
|
424
|
Start
|
High
|
349
|
Multiple inheritance
|
13,149
|
424
|
C
|
Mid
|
350
|
Smalltalk
|
13,133
|
423
|
Start
|
Mid
|
351
|
Federated learning
|
13,123
|
423
|
Start
|
Low
|
352
|
Linear congruential generator
|
13,111
|
422
|
Start
|
Mid
|
353
|
Strong and weak typing
|
13,056
|
421
|
Start
|
Mid
|
354
|
Consensus (computer science)
|
13,025
|
420
|
Start
|
High
|
355
|
Memory hierarchy
|
12,991
|
419
|
Start
|
Mid
|
356
|
Subroutine
|
12,846
|
414
|
C
|
Top
|
357
|
Data modeling
|
12,832
|
413
|
C
|
High
|
358
|
Class (computer programming)
|
12,811
|
413
|
Start
|
High
|
359
|
Subset sum problem
|
12,807
|
413
|
C
|
Low
|
360
|
List of NP-complete problems
|
12,727
|
410
|
List
|
High
|
361
|
Structured programming
|
12,663
|
408
|
Start
|
Mid
|
362
|
Ackermann function
|
12,556
|
405
|
B
|
Mid
|
363
|
Closure (computer programming)
|
12,534
|
404
|
C
|
Mid
|
364
|
The Art of Computer Programming
|
12,521
|
403
|
C
|
Top
|
365
|
Adapter pattern
|
12,520
|
403
|
Start
|
Unknown
|
366
|
Relational algebra
|
12,498
|
403
|
C
|
Mid
|
367
|
Branch and bound
|
12,472
|
402
|
Start
|
Mid
|
368
|
Macro (computer science)
|
12,463
|
402
|
C
|
Mid
|
369
|
Encapsulation (computer programming)
|
12,418
|
400
|
Start
|
High
|
370
|
Anti-pattern
|
12,415
|
400
|
C
|
Mid
|
371
|
Geoffrey Hinton
|
12,398
|
399
|
C
|
Low
|
372
|
Command pattern
|
12,393
|
399
|
Start
|
Mid
|
373
|
Triple DES
|
12,271
|
395
|
Start
|
Unknown
|
374
|
Deterministic finite automaton
|
12,247
|
395
|
Start
|
High
|
375
|
Routing
|
12,230
|
394
|
C
|
Mid
|
376
|
Elixir (programming language)
|
12,191
|
393
|
Unknown
|
Unknown
|
377
|
The Open Group Architecture Framework
|
12,168
|
392
|
Start
|
High
|
378
|
Password cracking
|
12,157
|
392
|
C
|
Low
|
379
|
Coroutine
|
12,151
|
391
|
C
|
Mid
|
380
|
Word (computer architecture)
|
12,121
|
391
|
C
|
Mid
|
381
|
Avast Antivirus
|
12,102
|
390
|
Start
|
Mid
|
382
|
Internet Engineering Task Force
|
12,082
|
389
|
C
|
Mid
|
383
|
Timsort
|
11,998
|
387
|
C
|
Mid
|
384
|
VP9
|
11,957
|
385
|
C
|
Low
|
385
|
Sankey diagram
|
11,929
|
384
|
C
|
Low
|
386
|
Relational model
|
11,929
|
384
|
C
|
Top
|
387
|
Memory management
|
11,906
|
384
|
C
|
High
|
388
|
Robert C. Martin
|
11,898
|
383
|
Start
|
Low
|
389
|
Shannon–Hartley theorem
|
11,826
|
381
|
C
|
High
|
390
|
Circular buffer
|
11,794
|
380
|
Start
|
Mid
|
391
|
Division algorithm
|
11,793
|
380
|
C
|
High
|
392
|
Applications of artificial intelligence
|
11,784
|
380
|
C
|
Low
|
393
|
Row- and column-major order
|
11,767
|
379
|
C
|
Mid
|
394
|
List of unsolved problems in computer science
|
11,736
|
378
|
List
|
Mid
|
395
|
Queue (abstract data type)
|
11,719
|
378
|
Start
|
Top
|
396
|
Anomaly detection
|
11,702
|
377
|
Start
|
Mid
|
397
|
Coupling (computer programming)
|
11,679
|
376
|
Start
|
High
|
398
|
Variable (computer science)
|
11,664
|
376
|
Start
|
Top
|
399
|
Alice and Bob
|
11,656
|
376
|
Start
|
Low
|
400
|
Paxos (computer science)
|
11,641
|
375
|
C
|
Low
|
401
|
Grover's algorithm
|
11,587
|
373
|
C
|
Mid
|
402
|
Maze generation algorithm
|
11,527
|
371
|
Start
|
Unknown
|
403
|
Reactive programming
|
11,497
|
370
|
Start
|
Unknown
|
404
|
Decision theory
|
11,457
|
369
|
C
|
High
|
405
|
Named-entity recognition
|
11,439
|
369
|
C
|
Unknown
|
406
|
Luis von Ahn
|
11,429
|
368
|
Start
|
Unknown
|
407
|
For loop
|
11,408
|
368
|
B
|
High
|
408
|
APL (programming language)
|
11,326
|
365
|
B
|
Mid
|
409
|
Process (computing)
|
11,322
|
365
|
C
|
Mid
|
410
|
Ant colony optimization algorithms
|
11,278
|
363
|
B
|
Low
|
411
|
Anonymous function
|
11,238
|
362
|
C
|
Mid
|
412
|
Logo (programming language)
|
11,172
|
360
|
C
|
Mid
|
413
|
Church–Turing thesis
|
11,164
|
360
|
C
|
Top
|
414
|
Mean time between failures
|
11,159
|
359
|
Start
|
Low
|
415
|
Call stack
|
11,101
|
358
|
C
|
Mid
|
416
|
Sudoku solving algorithms
|
11,041
|
356
|
B
|
Low
|
417
|
Code smell
|
10,977
|
354
|
C
|
Low
|
418
|
Procedural generation
|
10,956
|
353
|
Start
|
Unknown
|
419
|
Event-driven programming
|
10,927
|
352
|
Start
|
High
|
420
|
Dining philosophers problem
|
10,873
|
350
|
Start
|
Top
|
421
|
Bogosort
|
10,822
|
349
|
Start
|
Low
|
422
|
Vertex cover
|
10,790
|
348
|
C
|
Mid
|
423
|
Edge detection
|
10,695
|
345
|
C
|
Mid
|
424
|
Cut, copy, and paste
|
10,690
|
344
|
C
|
High
|
425
|
Conditional (computer programming)
|
10,673
|
344
|
C
|
Mid
|
426
|
Identity management
|
10,592
|
341
|
C
|
Unknown
|
427
|
Shift register
|
10,575
|
341
|
Start
|
Unknown
|
428
|
Static program analysis
|
10,527
|
339
|
C
|
Mid
|
429
|
Microkernel
|
10,490
|
338
|
C
|
High
|
430
|
Run-length encoding
|
10,462
|
337
|
Start
|
Mid
|
431
|
Shunting-yard algorithm
|
10,356
|
334
|
Unknown
|
Unknown
|
432
|
D (programming language)
|
10,340
|
333
|
C
|
Low
|
433
|
Check digit
|
10,319
|
332
|
Start
|
Mid
|
434
|
Skip list
|
10,306
|
332
|
C
|
Mid
|
435
|
Real-time computing
|
10,286
|
331
|
C
|
High
|
436
|
List of pioneers in computer science
|
10,269
|
331
|
List
|
Unknown
|
437
|
Sørensen–Dice coefficient
|
10,242
|
330
|
Start
|
Unknown
|
438
|
Maximum flow problem
|
10,213
|
329
|
C
|
High
|
439
|
Branch predictor
|
10,197
|
328
|
C
|
Mid
|
440
|
Knuth–Morris–Pratt algorithm
|
10,164
|
327
|
Start
|
High
|
441
|
Hazard (computer architecture)
|
10,046
|
324
|
C
|
Low
|
442
|
Ford–Fulkerson algorithm
|
10,017
|
323
|
Start
|
High
|
443
|
AWK
|
10,012
|
322
|
B
|
Mid
|
444
|
Longest palindromic substring
|
10,008
|
322
|
C
|
Low
|
445
|
Logic programming
|
9,978
|
321
|
B
|
Top
|
446
|
Pushdown automaton
|
9,976
|
321
|
B
|
High
|
447
|
Lossy compression
|
9,941
|
320
|
Start
|
High
|
448
|
Consistent hashing
|
9,869
|
318
|
Stub
|
Unknown
|
449
|
Self-balancing binary search tree
|
9,860
|
318
|
Start
|
Mid
|
450
|
8-bit computing
|
9,846
|
317
|
Start
|
High
|
451
|
W3Schools
|
9,780
|
315
|
Stub
|
Unknown
|
452
|
Email spoofing
|
9,729
|
313
|
Start
|
Low
|
453
|
Control flow
|
9,727
|
313
|
B
|
Top
|
454
|
All-points bulletin
|
9,719
|
313
|
C
|
Low
|
455
|
Agent-based model
|
9,623
|
310
|
C
|
Mid
|
456
|
Maze-solving algorithm
|
9,611
|
310
|
Unknown
|
Unknown
|
457
|
Exception handling
|
9,586
|
309
|
B
|
Mid
|
458
|
Mutual exclusion
|
9,567
|
308
|
C
|
Top
|
459
|
Hyper-threading
|
9,538
|
307
|
C
|
Low
|
460
|
Mixed reality
|
9,526
|
307
|
B
|
Unknown
|
461
|
Clique problem
|
9,469
|
305
|
GA
|
Mid
|
462
|
Cycle detection
|
9,418
|
303
|
B
|
Low
|
463
|
Scope (computer science)
|
9,414
|
303
|
C
|
High
|
464
|
Andrey Kolmogorov
|
9,399
|
303
|
C
|
High
|
465
|
Coding theory
|
9,391
|
302
|
C
|
High
|
466
|
Bucket sort
|
9,382
|
302
|
C
|
High
|
467
|
Theoretical computer science
|
9,377
|
302
|
B
|
Top
|
468
|
Multiclass classification
|
9,323
|
300
|
Start
|
Mid
|
469
|
State diagram
|
9,321
|
300
|
C
|
Mid
|
470
|
Glossary of graph theory
|
9,318
|
300
|
List
|
Mid
|
471
|
Avast
|
9,315
|
300
|
B
|
Mid
|
472
|
Feature selection
|
9,307
|
300
|
C
|
Mid
|
473
|
Associative array
|
9,289
|
299
|
C
|
High
|
474
|
Object (computer science)
|
9,273
|
299
|
Start
|
High
|
475
|
Vehicle routing problem
|
9,267
|
298
|
Unknown
|
Unknown
|
476
|
Root-finding algorithms
|
9,262
|
298
|
Unknown
|
Unknown
|
477
|
Computational biology
|
9,258
|
298
|
C
|
High
|
478
|
Fourth-generation programming language
|
9,245
|
298
|
Start
|
Mid
|
479
|
Universal Turing machine
|
9,172
|
295
|
C
|
Mid
|
480
|
Quantum key distribution
|
9,152
|
295
|
B
|
Mid
|
481
|
Data (computing)
|
9,135
|
294
|
C
|
Top
|
482
|
Apriori algorithm
|
9,131
|
294
|
C
|
Mid
|
483
|
Evolutionary algorithm
|
9,085
|
293
|
C
|
Mid
|
484
|
Spaghetti code
|
9,033
|
291
|
Start
|
Mid
|
485
|
Linear search
|
9,031
|
291
|
Start
|
Mid
|
486
|
Data structure alignment
|
8,927
|
287
|
Start
|
Mid
|
487
|
Silvio Micali
|
8,912
|
287
|
Start
|
Unknown
|
488
|
Combinatorial optimization
|
8,882
|
286
|
C
|
Top
|
489
|
Independent set (graph theory)
|
8,850
|
285
|
C
|
Mid
|
490
|
Hamiltonian path problem
|
8,834
|
284
|
C
|
Mid
|
491
|
Graph (abstract data type)
|
8,821
|
284
|
C
|
Top
|
492
|
L-system
|
8,799
|
283
|
Unknown
|
Unknown
|
493
|
Sandbox (software development)
|
8,794
|
283
|
Start
|
Low
|
494
|
Conflict-free replicated data type
|
8,764
|
282
|
C
|
High
|
495
|
Petri net
|
8,757
|
282
|
B
|
Mid
|
496
|
Nondeterministic finite automaton
|
8,694
|
280
|
B
|
High
|
497
|
Binary file
|
8,694
|
280
|
C
|
High
|
498
|
Counting sort
|
8,663
|
279
|
C
|
High
|
499
|
Memory leak
|
8,658
|
279
|
C
|
Mid
|
500
|
Currying
|
8,635
|
278
|
C
|
High
|
501
|
Component (graph theory)
|
8,635
|
278
|
Start
|
Mid
|
502
|
Code coverage
|
8,628
|
278
|
C
|
Low
|
503
|
Ladder logic
|
8,602
|
277
|
Start
|
Low
|
504
|
Code page 437
|
8,587
|
277
|
C
|
Low
|
505
|
Tony Hoare
|
8,582
|
276
|
C
|
High
|
506
|
Data governance
|
8,579
|
276
|
C
|
Unknown
|
507
|
Edit distance
|
8,560
|
276
|
C
|
Mid
|
508
|
String-searching algorithm
|
8,519
|
274
|
Start
|
High
|
509
|
Multiplication algorithm
|
8,503
|
274
|
C
|
Low
|
510
|
Type theory
|
8,498
|
274
|
C
|
High
|
511
|
Ones' complement
|
8,484
|
273
|
Start
|
Mid
|
512
|
Extended Backus–Naur form
|
8,479
|
273
|
C
|
Mid
|
513
|
Hill climbing
|
8,478
|
273
|
C
|
Mid
|
514
|
Intelligent agent
|
8,471
|
273
|
Unknown
|
Unknown
|
515
|
Information science
|
8,469
|
273
|
Start
|
Top
|
516
|
Enterprise architecture
|
8,426
|
271
|
Start
|
Mid
|
517
|
Women and video games
|
8,413
|
271
|
B
|
Mid
|
518
|
Extended ASCII
|
8,404
|
271
|
C
|
Low
|
519
|
Brute-force search
|
8,402
|
271
|
Start
|
Mid
|
520
|
JSONP
|
8,378
|
270
|
Start
|
Low
|
521
|
Elbow method (clustering)
|
8,317
|
268
|
Unknown
|
Unknown
|
522
|
Tail call
|
8,313
|
268
|
C
|
Mid
|
523
|
Abstract factory pattern
|
8,310
|
268
|
Start
|
Mid
|
524
|
Chernoff bound
|
8,309
|
268
|
Start
|
Low
|
525
|
Cargo cult programming
|
8,282
|
267
|
Start
|
Low
|
526
|
EBCDIC
|
8,271
|
266
|
Start
|
Mid
|
527
|
DeepDream
|
8,269
|
266
|
Start
|
Low
|
528
|
Higher-order function
|
8,257
|
266
|
Start
|
High
|
529
|
R-tree
|
8,180
|
263
|
C
|
Mid
|
530
|
Composite pattern
|
8,139
|
262
|
Start
|
Unknown
|
531
|
Matrix multiplication algorithm
|
8,129
|
262
|
C
|
Mid
|
532
|
Analysis of algorithms
|
8,129
|
262
|
C
|
Top
|
533
|
Imo.im
|
8,126
|
262
|
Stub
|
Low
|
534
|
Inverter (logic gate)
|
8,096
|
261
|
Start
|
Unknown
|
535
|
Linker (computing)
|
8,094
|
261
|
C
|
Mid
|
536
|
Signed number representations
|
8,082
|
260
|
C
|
High
|
537
|
Miller–Rabin primality test
|
8,075
|
260
|
C
|
High
|
538
|
Computational linguistics
|
8,063
|
260
|
Start
|
High
|
539
|
Kolmogorov complexity
|
8,059
|
259
|
B
|
High
|
540
|
Shellsort
|
8,051
|
259
|
B
|
High
|
541
|
Set cover problem
|
8,023
|
258
|
C
|
Mid
|
542
|
Max-flow min-cut theorem
|
7,945
|
256
|
Start
|
High
|
543
|
Adjacency list
|
7,943
|
256
|
C
|
Mid
|
544
|
Thrashing (computer science)
|
7,873
|
253
|
C
|
Low
|
545
|
Generic programming
|
7,859
|
253
|
C
|
High
|
546
|
Nasir Ahmed (engineer)
|
7,846
|
253
|
Start
|
Unknown
|
547
|
JPEG 2000
|
7,846
|
253
|
C
|
Low
|
548
|
ABAP
|
7,843
|
253
|
C
|
Low
|
549
|
JavaScript engine
|
7,795
|
251
|
C
|
Mid
|
550
|
State pattern
|
7,738
|
249
|
Start
|
Unknown
|
551
|
Data quality
|
7,732
|
249
|
Start
|
Low
|
552
|
Dynamic programming language
|
7,718
|
248
|
Start
|
Mid
|
553
|
Data access object
|
7,695
|
248
|
Start
|
Unknown
|
554
|
Informatics
|
7,660
|
247
|
C
|
Mid
|
555
|
Neuromorphic engineering
|
7,624
|
245
|
Unknown
|
Unknown
|
556
|
Smith–Waterman algorithm
|
7,609
|
245
|
B
|
Mid
|
557
|
GPT-2
|
7,599
|
245
|
B
|
Low
|
558
|
16K resolution
|
7,583
|
244
|
Start
|
Unknown
|
559
|
QBittorrent
|
7,562
|
243
|
Stub
|
Low
|
560
|
Knowledge graph
|
7,554
|
243
|
Start
|
High
|
561
|
Longest path problem
|
7,538
|
243
|
C
|
Low
|
562
|
Information hiding
|
7,532
|
242
|
Start
|
Mid
|
563
|
Cell (microprocessor)
|
7,490
|
241
|
B
|
Mid
|
564
|
Generalized additive model
|
7,486
|
241
|
Start
|
Low
|
565
|
Longest common substring problem
|
7,485
|
241
|
Start
|
Mid
|
566
|
Web developer
|
7,445
|
240
|
Start
|
Mid
|
567
|
ALGOL
|
7,404
|
238
|
C
|
High
|
568
|
Short-circuit evaluation
|
7,394
|
238
|
Start
|
Mid
|
569
|
Theory of computation
|
7,377
|
237
|
C
|
Top
|
570
|
Cohesion (computer science)
|
7,358
|
237
|
Unknown
|
Unknown
|
571
|
Fibonacci heap
|
7,357
|
237
|
C
|
High
|
572
|
Digital data
|
7,356
|
237
|
C
|
Low
|
573
|
Wiener filter
|
7,336
|
236
|
Start
|
Unknown
|
574
|
Curiously recurring template pattern
|
7,323
|
236
|
C
|
Low
|
575
|
Ethics of artificial intelligence
|
7,321
|
236
|
B
|
Unknown
|
576
|
Search algorithm
|
7,293
|
235
|
Start
|
Top
|
577
|
Beam search
|
7,257
|
234
|
Stub
|
Unknown
|
578
|
Comparison of integrated development environments
|
7,247
|
233
|
Start
|
Low
|
579
|
Computer performance
|
7,245
|
233
|
Start
|
Mid
|
580
|
Computer scientist
|
7,213
|
232
|
Start
|
Top
|
581
|
Object-oriented analysis and design
|
7,197
|
232
|
Start
|
High
|
582
|
Adversarial machine learning
|
7,197
|
232
|
C
|
Mid
|
583
|
MurmurHash
|
7,173
|
231
|
Start
|
Low
|
584
|
C99
|
7,131
|
230
|
C
|
Mid
|
585
|
Smartglasses
|
7,129
|
229
|
C
|
Low
|
586
|
Recursive descent parser
|
7,114
|
229
|
Start
|
High
|
587
|
User error
|
7,110
|
229
|
Start
|
High
|
588
|
Radix tree
|
7,062
|
227
|
C
|
Mid
|
589
|
Units of information
|
7,061
|
227
|
C
|
Mid
|
590
|
Limited-memory BFGS
|
7,018
|
226
|
Unknown
|
Unknown
|
591
|
Needleman–Wunsch algorithm
|
6,999
|
225
|
Start
|
Mid
|
592
|
Opcode
|
6,993
|
225
|
C
|
High
|
593
|
Fluent interface
|
6,979
|
225
|
Stub
|
Unknown
|
594
|
Attribute-based access control
|
6,976
|
225
|
Unknown
|
Unknown
|
595
|
Legacy system
|
6,952
|
224
|
C
|
Unknown
|
596
|
Pointing stick
|
6,938
|
223
|
C
|
Low
|
597
|
Cryptographically-secure pseudorandom number generator
|
6,917
|
223
|
C
|
High
|
598
|
Common Lisp
|
6,886
|
222
|
Start
|
Mid
|
599
|
Nonlinear programming
|
6,882
|
222
|
C
|
Mid
|
600
|
First-class function
|
6,860
|
221
|
C
|
High
|
601
|
Datalog
|
6,853
|
221
|
Unknown
|
Unknown
|
602
|
Approximate string matching
|
6,849
|
220
|
C
|
Mid
|
603
|
Umple
|
6,840
|
220
|
Start
|
Low
|
604
|
Bill Joy
|
6,823
|
220
|
C
|
Unknown
|
605
|
Computational complexity of mathematical operations
|
6,819
|
219
|
B
|
Mid
|
606
|
Synchronization (computer science)
|
6,803
|
219
|
Unknown
|
Unknown
|
607
|
Approximation algorithm
|
6,791
|
219
|
Start
|
High
|
608
|
Compare-and-swap
|
6,780
|
218
|
C
|
Low
|
609
|
Quantum information
|
6,746
|
217
|
Start
|
High
|
610
|
Concurrency (computer science)
|
6,741
|
217
|
Start
|
Top
|
611
|
Boolean
|
6,740
|
217
|
Disambig
|
NA
|
612
|
Function overloading
|
6,729
|
217
|
Unknown
|
Unknown
|
613
|
Log-structured merge-tree
|
6,724
|
216
|
Start
|
Mid
|
614
|
Concurrent computing
|
6,722
|
216
|
C
|
High
|
615
|
Phong reflection model
|
6,711
|
216
|
Unknown
|
Unknown
|
616
|
Database model
|
6,711
|
216
|
C
|
Top
|
617
|
Test case
|
6,709
|
216
|
Start
|
Unknown
|
618
|
Lempel–Ziv–Welch
|
6,705
|
216
|
C
|
Unknown
|
619
|
Directory (computing)
|
6,699
|
216
|
Start
|
Unknown
|
620
|
No free lunch theorem
|
6,649
|
214
|
Start
|
Mid
|
621
|
Computational science
|
6,644
|
214
|
Start
|
Top
|
622
|
Gradle
|
6,641
|
214
|
C
|
Low
|
623
|
Billy Markus
|
6,629
|
213
|
Stub
|
Low
|
624
|
Fragmentation (computing)
|
6,627
|
213
|
C
|
Mid
|
625
|
Model–view–presenter
|
6,604
|
213
|
C
|
High
|
626
|
Information management
|
6,600
|
212
|
C
|
Unknown
|
627
|
LL parser
|
6,595
|
212
|
Start
|
High
|
628
|
Binary space partitioning
|
6,594
|
212
|
C
|
Low
|
629
|
Google Brain
|
6,594
|
212
|
C
|
Unknown
|
630
|
Chain-of-responsibility pattern
|
6,555
|
211
|
Stub
|
Unknown
|
631
|
Non-English-based programming languages
|
6,553
|
211
|
List
|
Low
|
632
|
Multi-agent system
|
6,533
|
210
|
Start
|
Mid
|
633
|
Database design
|
6,527
|
210
|
C
|
High
|
634
|
Duff's device
|
6,520
|
210
|
C
|
Low
|
635
|
Attention (machine learning)
|
6,507
|
209
|
Stub
|
Unknown
|
636
|
Covariance and contravariance (computer science)
|
6,503
|
209
|
Start
|
High
|
637
|
Ubiquitous computing
|
6,498
|
209
|
C
|
High
|
638
|
Two-phase locking
|
6,495
|
209
|
C
|
High
|
639
|
Loose coupling
|
6,484
|
209
|
Start
|
High
|
640
|
Message queue
|
6,467
|
208
|
Unknown
|
Unknown
|
641
|
Do while loop
|
6,451
|
208
|
Unknown
|
Unknown
|
642
|
Vapnik–Chervonenkis dimension
|
6,428
|
207
|
Start
|
Mid
|
643
|
Doubly linked list
|
6,425
|
207
|
Start
|
High
|
644
|
Amortized analysis
|
6,422
|
207
|
Start
|
High
|
645
|
Comparison of programming paradigms
|
6,415
|
206
|
C
|
Low
|
646
|
Delimiter
|
6,414
|
206
|
C
|
Mid
|
647
|
Graph isomorphism
|
6,384
|
205
|
Start
|
Mid
|
648
|
Search engine indexing
|
6,379
|
205
|
C
|
Unknown
|
649
|
Judea Pearl
|
6,375
|
205
|
C
|
Mid
|
650
|
Text mining
|
6,373
|
205
|
Start
|
Unknown
|
651
|
Learning rate
|
6,372
|
205
|
Unknown
|
Unknown
|
652
|
Quantum algorithm
|
6,361
|
205
|
C
|
High
|
653
|
Aho–Corasick algorithm
|
6,354
|
204
|
Start
|
Mid
|
654
|
Lazy evaluation
|
6,352
|
204
|
C
|
High
|
655
|
Parsing expression grammar
|
6,282
|
202
|
B
|
Mid
|
656
|
Vorbis
|
6,260
|
201
|
C
|
Low
|
657
|
Boyer–Moore string-search algorithm
|
6,252
|
201
|
C
|
High
|
658
|
Basic Linear Algebra Subprograms
|
6,252
|
201
|
C
|
Low
|
659
|
Privilege escalation
|
6,252
|
201
|
Start
|
Low
|
660
|
Message passing
|
6,247
|
201
|
Start
|
High
|
661
|
Template method pattern
|
6,233
|
201
|
Start
|
Low
|
662
|
Boids
|
6,211
|
200
|
Unknown
|
Unknown
|
663
|
Standard ML
|
6,192
|
199
|
C
|
Mid
|
664
|
Leslie Lamport
|
6,183
|
199
|
Start
|
High
|
665
|
Formal verification
|
6,183
|
199
|
Start
|
High
|
666
|
Algebraic data type
|
6,172
|
199
|
Start
|
Low
|
667
|
Min-max heap
|
6,161
|
198
|
Start
|
Mid
|
668
|
Raft (algorithm)
|
6,159
|
198
|
C
|
Low
|
669
|
Isolation forest
|
6,158
|
198
|
C
|
Low
|
670
|
Timeline of quantum computing and communication
|
6,141
|
198
|
List
|
Mid
|
671
|
Formal grammar
|
6,109
|
197
|
C
|
Mid
|
672
|
Artificial consciousness
|
6,084
|
196
|
C
|
Unknown
|
673
|
Boltzmann machine
|
6,084
|
196
|
C
|
Low
|
674
|
Inverted index
|
6,081
|
196
|
Start
|
Mid
|
675
|
Syntactic sugar
|
6,060
|
195
|
C
|
Mid
|
676
|
Computational complexity
|
6,060
|
195
|
C
|
Top
|
677
|
HyperLogLog
|
6,042
|
194
|
C
|
Unknown
|
678
|
Double-ended queue
|
6,035
|
194
|
Start
|
High
|
679
|
Computational thinking
|
6,027
|
194
|
Start
|
Unknown
|
680
|
Q (number format)
|
5,996
|
193
|
Unknown
|
Unknown
|
681
|
Alonzo Church
|
5,981
|
192
|
C
|
Top
|
682
|
Proxy pattern
|
5,938
|
191
|
Start
|
Mid
|
683
|
Requirements engineering
|
5,933
|
191
|
Start
|
Unknown
|
684
|
Operator overloading
|
5,933
|
191
|
C
|
Mid
|
685
|
Fixed-point combinator
|
5,920
|
190
|
C
|
Mid
|
686
|
Three-valued logic
|
5,906
|
190
|
Start
|
Low
|
687
|
AlphaFold
|
5,905
|
190
|
C
|
Low
|
688
|
Goto
|
5,902
|
190
|
C
|
Mid
|
689
|
Rabin–Karp algorithm
|
5,898
|
190
|
C
|
Mid
|
690
|
Infinite loop
|
5,895
|
190
|
Start
|
Mid
|
691
|
Longest increasing subsequence
|
5,882
|
189
|
C
|
Mid
|
692
|
Okapi BM25
|
5,870
|
189
|
Start
|
Low
|
693
|
Fold (higher-order function)
|
5,860
|
189
|
Start
|
Mid
|
694
|
Don Norman
|
5,854
|
188
|
Start
|
Mid
|
695
|
Damerau–Levenshtein distance
|
5,852
|
188
|
Start
|
Low
|
696
|
Computability theory
|
5,848
|
188
|
B
|
Top
|
697
|
Splay tree
|
5,844
|
188
|
C
|
Mid
|
698
|
Restricted Boltzmann machine
|
5,832
|
188
|
Unknown
|
Unknown
|
699
|
Unique identifier
|
5,827
|
187
|
Start
|
Unknown
|
700
|
Identifier
|
5,826
|
187
|
Start
|
Low
|
701
|
Computational chemistry
|
5,805
|
187
|
B
|
Top
|
702
|
Multi-label classification
|
5,802
|
187
|
Unknown
|
Unknown
|
703
|
Information processing
|
5,786
|
186
|
Start
|
Unknown
|
704
|
Profiling (computer programming)
|
5,778
|
186
|
C
|
Mid
|
705
|
Mixin
|
5,768
|
186
|
Start
|
Low
|
706
|
Time formatting and storage bugs
|
5,760
|
185
|
B
|
Low
|
707
|
Redux (JavaScript library)
|
5,736
|
185
|
Start
|
Low
|
708
|
Translation studies
|
5,725
|
184
|
Start
|
Mid
|
709
|
Double dispatch
|
5,717
|
184
|
Stub
|
Unknown
|
710
|
Computer graphics (computer science)
|
5,679
|
183
|
Start
|
Top
|
711
|
Cyclic permutation
|
5,678
|
183
|
Start
|
Unknown
|
712
|
C--
|
5,672
|
182
|
Start
|
Low
|
713
|
Enterprise architecture framework
|
5,671
|
182
|
Start
|
Unknown
|
714
|
Curry–Howard correspondence
|
5,648
|
182
|
C
|
High
|
715
|
LR parser
|
5,646
|
182
|
Start
|
High
|
716
|
4,294,967,295
|
5,637
|
181
|
Stub
|
Low
|
717
|
Adam D'Angelo
|
5,619
|
181
|
Start
|
Low
|
718
|
C++ classes
|
5,618
|
181
|
C
|
Low
|
719
|
Selection algorithm
|
5,615
|
181
|
C
|
Mid
|
720
|
Iterative deepening depth-first search
|
5,605
|
180
|
Start
|
Low
|
721
|
List of fictional computers
|
5,603
|
180
|
Unknown
|
Unknown
|
722
|
Online machine learning
|
5,601
|
180
|
C
|
Mid
|
723
|
Church encoding
|
5,589
|
180
|
B
|
Unknown
|
724
|
Tree structure
|
5,576
|
179
|
Start
|
High
|
725
|
Pranav Mistry
|
5,569
|
179
|
Start
|
Low
|
726
|
Coq
|
5,562
|
179
|
Start
|
Mid
|
727
|
One-instruction set computer
|
5,560
|
179
|
Start
|
Unknown
|
728
|
Challenge–response authentication
|
5,548
|
178
|
Start
|
Low
|
729
|
8-bit color
|
5,544
|
178
|
Start
|
Low
|
730
|
Dynamic array
|
5,516
|
177
|
C
|
Mid
|
731
|
Relational database management system
|
5,506
|
177
|
NA
|
NA
|
732
|
Satisfiability modulo theories
|
5,503
|
177
|
Start
|
Low
|
733
|
Treemapping
|
5,500
|
177
|
C
|
Mid
|
734
|
Formal methods
|
5,499
|
177
|
Start
|
Top
|
735
|
First-class citizen
|
5,494
|
177
|
Stub
|
Low
|
736
|
Decision problem
|
5,493
|
177
|
Start
|
Mid
|
737
|
Computational neuroscience
|
5,479
|
176
|
B
|
Mid
|
738
|
Nondeterministic Turing machine
|
5,471
|
176
|
C
|
High
|
739
|
Rob Pike
|
5,458
|
176
|
Start
|
Unknown
|
740
|
Median of medians
|
5,454
|
175
|
C
|
Low
|
741
|
Async/await
|
5,446
|
175
|
C
|
Mid
|
742
|
Prefix sum
|
5,445
|
175
|
Unknown
|
Unknown
|
743
|
Jaro–Winkler distance
|
5,424
|
174
|
Unknown
|
Unknown
|
744
|
Deno (software)
|
5,416
|
174
|
Start
|
Low
|
745
|
Relational operator
|
5,399
|
174
|
C
|
Mid
|
746
|
Deep reinforcement learning
|
5,386
|
173
|
Stub
|
Unknown
|
747
|
Moravec's paradox
|
5,386
|
173
|
Start
|
Unknown
|
748
|
Demand paging
|
5,378
|
173
|
Start
|
Mid
|
749
|
DNS rebinding
|
5,355
|
172
|
Unknown
|
Unknown
|
750
|
Topological data analysis
|
5,345
|
172
|
C
|
Low
|
751
|
Mock object
|
5,337
|
172
|
Start
|
Unknown
|
752
|
State machine replication
|
5,327
|
171
|
C
|
High
|
753
|
Model of computation
|
5,322
|
171
|
Start
|
Mid
|
754
|
Object database
|
5,322
|
171
|
Start
|
High
|
755
|
Edmonds–Karp algorithm
|
5,315
|
171
|
Start
|
Mid
|
756
|
Randomized algorithm
|
5,298
|
170
|
C
|
High
|
757
|
Pattern matching
|
5,264
|
169
|
C
|
Mid
|
758
|
Semantics (computer science)
|
5,250
|
169
|
C
|
Top
|
759
|
Transitive closure
|
5,248
|
169
|
C
|
Low
|
760
|
Gladys West
|
5,242
|
169
|
B
|
Low
|
761
|
Code injection
|
5,236
|
168
|
C
|
High
|
762
|
Rule 110
|
5,229
|
168
|
Start
|
Unknown
|
763
|
BCH code
|
5,215
|
168
|
C
|
Unknown
|
764
|
API testing
|
5,206
|
167
|
Unknown
|
Unknown
|
765
|
Metaprogramming
|
5,195
|
167
|
C
|
Mid
|
766
|
Job shop scheduling
|
5,178
|
167
|
C
|
Mid
|
767
|
Association for Computing Machinery
|
5,169
|
166
|
C
|
Top
|
768
|
Factory (object-oriented programming)
|
5,166
|
166
|
C
|
Low
|
769
|
Communicating sequential processes
|
5,162
|
166
|
B
|
Top
|
770
|
User-centered design
|
5,150
|
166
|
Start
|
Mid
|
771
|
List of computer algebra systems
|
5,139
|
165
|
List
|
Low
|
772
|
Tagged union
|
5,138
|
165
|
Start
|
Low
|
773
|
Cook–Levin theorem
|
5,122
|
165
|
B
|
High
|
774
|
Operator associativity
|
5,111
|
164
|
Start
|
Unknown
|
775
|
Kai-Fu Lee
|
5,109
|
164
|
Start
|
Unknown
|
776
|
ActionScript
|
5,098
|
164
|
C
|
Low
|
777
|
C string handling
|
5,076
|
163
|
C
|
Low
|
778
|
Blob detection
|
5,058
|
163
|
Start
|
Mid
|
779
|
Asynchronous I/O
|
5,055
|
163
|
C
|
Mid
|
780
|
Deterministic algorithm
|
5,045
|
162
|
Start
|
High
|
781
|
Automated theorem proving
|
5,044
|
162
|
Start
|
Mid
|
782
|
CiteSeerX
|
5,041
|
162
|
Start
|
High
|
783
|
Flyweight pattern
|
5,040
|
162
|
Start
|
Unknown
|
784
|
Quantum machine learning
|
5,032
|
162
|
B
|
Unknown
|
785
|
Bridge pattern
|
5,028
|
162
|
Start
|
Low
|
786
|
Semantic network
|
5,028
|
162
|
Start
|
Low
|
787
|
General-purpose programming language
|
5,023
|
162
|
Stub
|
Mid
|
788
|
Calling convention
|
5,022
|
162
|
Start
|
High
|
789
|
Hadley Wickham
|
5,016
|
161
|
Start
|
Mid
|
790
|
Elisha Wiesel
|
5,014
|
161
|
Unknown
|
Unknown
|
791
|
Algorithmic efficiency
|
5,012
|
161
|
C
|
High
|
792
|
Artificial life
|
4,996
|
161
|
B
|
High
|
793
|
C++23
|
4,978
|
160
|
Stub
|
Low
|
794
|
Chomsky normal form
|
4,976
|
160
|
Start
|
Mid
|
795
|
Static single assignment form
|
4,971
|
160
|
C
|
Mid
|
796
|
Hamming weight
|
4,964
|
160
|
C
|
Unknown
|
797
|
LeNet
|
4,958
|
159
|
Start
|
Unknown
|
798
|
Segment tree
|
4,941
|
159
|
Unknown
|
Unknown
|
799
|
Interval tree
|
4,936
|
159
|
Start
|
Mid
|
800
|
Zettabyte Era
|
4,933
|
159
|
B
|
Low
|
801
|
Kleene star
|
4,930
|
159
|
Start
|
High
|
802
|
Zero-shot learning
|
4,917
|
158
|
C
|
Unknown
|
803
|
De Bruijn sequence
|
4,906
|
158
|
C
|
Mid
|
804
|
Control-flow graph
|
4,904
|
158
|
C
|
Mid
|
805
|
Joy Buolamwini
|
4,899
|
158
|
C
|
Low
|
806
|
Tabu search
|
4,874
|
157
|
Unknown
|
Unknown
|
807
|
State (computer science)
|
4,874
|
157
|
Start
|
Mid
|
808
|
Null-terminated string
|
4,874
|
157
|
Start
|
Low
|
809
|
Side effect (computer science)
|
4,867
|
157
|
C
|
Mid
|
810
|
DALL-E
|
4,864
|
156
|
B
|
Unknown
|
811
|
Peterson's algorithm
|
4,858
|
156
|
C
|
Mid
|
812
|
3D audio effect
|
4,858
|
156
|
Unknown
|
Unknown
|
813
|
Distributed operating system
|
4,851
|
156
|
C
|
Mid
|
814
|
Open-source model
|
4,849
|
156
|
C
|
Low
|
815
|
Andrew S. Tanenbaum
|
4,835
|
155
|
C
|
Mid
|
816
|
Topological insulator
|
4,824
|
155
|
Start
|
Unknown
|
817
|
Terminal and nonterminal symbols
|
4,814
|
155
|
C
|
Mid
|
818
|
Jeffrey Ullman
|
4,797
|
154
|
C
|
Mid
|
819
|
Deutsch–Jozsa algorithm
|
4,794
|
154
|
C
|
Mid
|
820
|
Third-generation programming language
|
4,786
|
154
|
Start
|
Mid
|
821
|
Parametric design
|
4,773
|
153
|
Start
|
Unknown
|
822
|
Sorting
|
4,770
|
153
|
Start
|
High
|
823
|
External sorting
|
4,766
|
153
|
Unknown
|
Unknown
|
824
|
Best-first search
|
4,762
|
153
|
Stub
|
Unknown
|
825
|
Marching cubes
|
4,761
|
153
|
Start
|
Mid
|
826
|
Monte Carlo algorithm
|
4,738
|
152
|
C
|
Mid
|
827
|
Open-source license
|
4,738
|
152
|
Start
|
Unknown
|
828
|
Computer-integrated manufacturing
|
4,735
|
152
|
Start
|
Mid
|
829
|
Metasyntactic variable
|
4,729
|
152
|
Unknown
|
Unknown
|
830
|
Dual linear program
|
4,725
|
152
|
Start
|
Low
|
831
|
Code.org
|
4,723
|
152
|
C
|
Low
|
832
|
Compilers: Principles, Techniques, and Tools
|
4,723
|
152
|
Stub
|
Low
|
833
|
Machine epsilon
|
4,716
|
152
|
Unknown
|
Unknown
|
834
|
Seymour Papert
|
4,697
|
151
|
C
|
Mid
|
835
|
Object file
|
4,695
|
151
|
Start
|
Mid
|
836
|
Quantum programming
|
4,683
|
151
|
Start
|
Mid
|
837
|
Pumping lemma for regular languages
|
4,680
|
150
|
C
|
Low
|
838
|
Admissible heuristic
|
4,670
|
150
|
Start
|
Unknown
|
839
|
Glossary of computer science
|
4,628
|
149
|
List
|
Top
|
840
|
Perfect hash function
|
4,607
|
148
|
C
|
Unknown
|
841
|
Vala (programming language)
|
4,596
|
148
|
Start
|
Low
|
842
|
DNA computing
|
4,595
|
148
|
C
|
Mid
|
843
|
Immersion (virtual reality)
|
4,595
|
148
|
Start
|
Low
|
844
|
Reentrancy (computing)
|
4,592
|
148
|
Start
|
Mid
|
845
|
Haxe
|
4,589
|
148
|
C
|
Low
|
846
|
Linear code
|
4,582
|
147
|
Start
|
High
|
847
|
Optimizing compiler
|
4,580
|
147
|
Start
|
High
|
848
|
Continuation-passing style
|
4,565
|
147
|
Start
|
Mid
|
849
|
Stack machine
|
4,560
|
147
|
C
|
Mid
|
850
|
Query language
|
4,546
|
146
|
Start
|
Mid
|
851
|
Build automation
|
4,543
|
146
|
Start
|
Low
|
852
|
Outline of computer science
|
4,537
|
146
|
Start
|
Mid
|
853
|
X86 memory segmentation
|
4,532
|
146
|
Start
|
Mid
|
854
|
Context-free language
|
4,523
|
145
|
Start
|
Mid
|
855
|
Genetic programming
|
4,513
|
145
|
B
|
Mid
|
856
|
Readers–writers problem
|
4,511
|
145
|
Start
|
Low
|
857
|
Triplet loss
|
4,507
|
145
|
Stub
|
Low
|
858
|
Eugene Kaspersky
|
4,503
|
145
|
GA
|
Low
|
859
|
Program optimization
|
4,495
|
145
|
B
|
High
|
860
|
Complexity class
|
4,495
|
145
|
C
|
High
|
861
|
Vendor lock-in
|
4,473
|
144
|
C
|
Mid
|
862
|
Women in computing
|
4,468
|
144
|
B
|
High
|
863
|
Statement (computer science)
|
4,466
|
144
|
Start
|
Mid
|
864
|
Polynomial kernel
|
4,457
|
143
|
Start
|
Mid
|
865
|
CYK algorithm
|
4,455
|
143
|
C
|
Mid
|
866
|
Data architecture
|
4,454
|
143
|
Start
|
Mid
|
867
|
Computational geometry
|
4,451
|
143
|
Start
|
High
|
868
|
Coding conventions
|
4,445
|
143
|
Unknown
|
Unknown
|
869
|
Systems programming
|
4,421
|
142
|
B
|
Top
|
870
|
Dependent type
|
4,418
|
142
|
Start
|
High
|
871
|
Branch (computer science)
|
4,417
|
142
|
Start
|
Mid
|
872
|
Computer algebra
|
4,411
|
142
|
Start
|
Mid
|
873
|
Type conversion
|
4,396
|
141
|
C
|
High
|
874
|
Matei Zaharia
|
4,393
|
141
|
Start
|
Unknown
|
875
|
Computation
|
4,385
|
141
|
Start
|
Top
|
876
|
IEEE 754-1985
|
4,375
|
141
|
C
|
Low
|
877
|
Delegation pattern
|
4,367
|
140
|
Start
|
Mid
|
878
|
Double-checked locking
|
4,355
|
140
|
Unknown
|
Unknown
|
879
|
Video coding format
|
4,343
|
140
|
C
|
Unknown
|
880
|
Stream processing
|
4,323
|
139
|
C
|
Mid
|
881
|
Starvation (computer science)
|
4,321
|
139
|
Start
|
Mid
|
882
|
Local search (optimization)
|
4,313
|
139
|
Start
|
Mid
|
883
|
Hindley–Milner type system
|
4,303
|
138
|
B
|
High
|
884
|
Stylometry
|
4,294
|
138
|
C
|
Low
|
885
|
Intermediate representation
|
4,273
|
137
|
Start
|
Low
|
886
|
Oracle machine
|
4,270
|
137
|
C
|
Mid
|
887
|
Operator-precedence parser
|
4,268
|
137
|
C
|
Mid
|
888
|
Comparison of parser generators
|
4,241
|
136
|
List
|
Mid
|
889
|
Wearable computer
|
4,234
|
136
|
C
|
Mid
|
890
|
Pseudorandom binary sequence
|
4,233
|
136
|
Start
|
Mid
|
891
|
Denormal number
|
4,229
|
136
|
Unknown
|
Unknown
|
892
|
3GP and 3G2
|
4,227
|
136
|
Unknown
|
Unknown
|
893
|
Nearest neighbour algorithm
|
4,187
|
135
|
Unknown
|
Unknown
|
894
|
Gun (cellular automaton)
|
4,182
|
134
|
Start
|
Low
|
895
|
Chord (peer-to-peer)
|
4,177
|
134
|
Start
|
Unknown
|
896
|
Garlin Gilchrist
|
4,152
|
133
|
Start
|
Low
|
897
|
Rule 30
|
4,144
|
133
|
Start
|
Unknown
|
898
|
Comparison sort
|
4,139
|
133
|
C
|
High
|
899
|
Memory segmentation
|
4,136
|
133
|
Stub
|
Mid
|
900
|
Differentiable programming
|
4,133
|
133
|
Stub
|
Unknown
|
901
|
Rule-based system
|
4,129
|
133
|
Unknown
|
Unknown
|
902
|
Minimum-cost flow problem
|
4,112
|
132
|
Start
|
Mid
|
903
|
Raj Reddy
|
4,112
|
132
|
B
|
Unknown
|
904
|
Lowest common ancestor
|
4,110
|
132
|
Start
|
Unknown
|
905
|
Homotopy type theory
|
4,094
|
132
|
C
|
Low
|
906
|
Webmaster
|
4,072
|
131
|
Start
|
Low
|
907
|
Soundex
|
4,062
|
131
|
C
|
Unknown
|
908
|
Barbara Liskov
|
4,062
|
131
|
C
|
High
|
909
|
Hard link
|
4,062
|
131
|
Start
|
Low
|
910
|
Process management (computing)
|
4,060
|
130
|
C
|
Low
|
911
|
Array programming
|
4,048
|
130
|
C
|
Low
|
912
|
Mean shift
|
4,045
|
130
|
Start
|
Mid
|
913
|
Symbol table
|
4,044
|
130
|
C
|
Low
|
914
|
Pipeline (software)
|
4,043
|
130
|
Start
|
Mid
|
915
|
Word-sense disambiguation
|
4,028
|
129
|
C
|
Mid
|
916
|
Snippet (programming)
|
4,020
|
129
|
Start
|
Low
|
917
|
Logical shift
|
4,000
|
129
|
Unknown
|
Unknown
|
918
|
Niklaus Wirth
|
3,993
|
128
|
Start
|
High
|
919
|
Operational transformation
|
3,991
|
128
|
B
|
Unknown
|
920
|
Set (abstract data type)
|
3,990
|
128
|
Start
|
High
|
921
|
Distributed version control
|
3,966
|
127
|
Start
|
Mid
|
922
|
Hoare logic
|
3,942
|
127
|
Start
|
Top
|
923
|
Alfred Aho
|
3,941
|
127
|
Unknown
|
Unknown
|
924
|
Thundering herd problem
|
3,924
|
126
|
Start
|
Unknown
|
925
|
Polynomial-time reduction
|
3,912
|
126
|
Start
|
Mid
|
926
|
Computing Machinery and Intelligence
|
3,908
|
126
|
C
|
High
|
927
|
Solution architecture
|
3,908
|
126
|
Start
|
Unknown
|
928
|
Evolutionary computation
|
3,895
|
125
|
C
|
Low
|
929
|
MicroVision, Inc.
|
3,883
|
125
|
Stub
|
Unknown
|
930
|
Hard coding
|
3,880
|
125
|
Start
|
Low
|
931
|
State space search
|
3,879
|
125
|
Unknown
|
Unknown
|
932
|
Superconducting quantum computing
|
3,876
|
125
|
Start
|
Unknown
|
933
|
Universal hashing
|
3,871
|
124
|
C
|
Mid
|
934
|
Timeline of machine learning
|
3,866
|
124
|
Unknown
|
Unknown
|
935
|
Gödel Prize
|
3,857
|
124
|
Start
|
Mid
|
936
|
Clipping (computer graphics)
|
3,843
|
123
|
Start
|
Mid
|
937
|
Foreign function interface
|
3,840
|
123
|
Start
|
Low
|
938
|
Yukihiro Matsumoto
|
3,835
|
123
|
Start
|
Unknown
|
939
|
Richard Hamming
|
3,834
|
123
|
GA
|
Mid
|
940
|
Lloyd's algorithm
|
3,819
|
123
|
Start
|
Mid
|
941
|
Automatic summarization
|
3,817
|
123
|
C
|
Unknown
|
942
|
Kent Beck
|
3,790
|
122
|
Start
|
Mid
|
943
|
Blue-green deployment
|
3,768
|
121
|
Stub
|
Low
|
944
|
History of computer science
|
3,763
|
121
|
Start
|
Top
|
945
|
Systems modeling
|
3,757
|
121
|
Start
|
Unknown
|
946
|
Hardware virtualization
|
3,752
|
121
|
Start
|
High
|
947
|
Type safety
|
3,749
|
120
|
C
|
Mid
|
948
|
Augmented Lagrangian method
|
3,748
|
120
|
Start
|
Low
|
949
|
God's algorithm
|
3,734
|
120
|
C
|
Unknown
|
950
|
Reference counting
|
3,731
|
120
|
C
|
Mid
|
951
|
Eiffel (programming language)
|
3,726
|
120
|
Start
|
Mid
|
952
|
Memento pattern
|
3,722
|
120
|
Start
|
Low
|
953
|
Space complexity
|
3,705
|
119
|
Start
|
Unknown
|
954
|
M-ary tree
|
3,688
|
118
|
Start
|
Mid
|
955
|
Knowledge-based systems
|
3,687
|
118
|
Start
|
Unknown
|
956
|
List of computer scientists
|
3,685
|
118
|
Unknown
|
Unknown
|
957
|
JSFuck
|
3,678
|
118
|
Start
|
Low
|
958
|
Goertzel algorithm
|
3,658
|
118
|
Start
|
Unknown
|
959
|
Complexity theory
|
3,656
|
117
|
Disambig
|
NA
|
960
|
Concurrency control
|
3,647
|
117
|
C
|
Top
|
961
|
Montgomery modular multiplication
|
3,641
|
117
|
C
|
Mid
|
962
|
2–3 tree
|
3,630
|
117
|
Stub
|
Mid
|
963
|
Object composition
|
3,625
|
116
|
Start
|
Low
|
964
|
Register allocation
|
3,625
|
116
|
C
|
Low
|
965
|
Reversible computing
|
3,623
|
116
|
C
|
Mid
|
966
|
Speculative execution
|
3,623
|
116
|
Start
|
High
|
967
|
74181
|
3,621
|
116
|
Start
|
Low
|
968
|
Self-modifying code
|
3,604
|
116
|
C
|
Mid
|
969
|
Ronald Graham
|
3,603
|
116
|
Start
|
Mid
|
970
|
X265
|
3,598
|
116
|
C
|
Low
|
971
|
Bounding volume hierarchy
|
3,595
|
115
|
Unknown
|
Unknown
|
972
|
Runtime (program lifecycle phase)
|
3,592
|
115
|
Start
|
High
|
973
|
Artificial Intelligence: A Modern Approach
|
3,592
|
115
|
Start
|
Unknown
|
974
|
Programming language theory
|
3,591
|
115
|
Start
|
Top
|
975
|
Closest pair of points problem
|
3,583
|
115
|
Unknown
|
Unknown
|
976
|
Object code
|
3,577
|
115
|
Start
|
Mid
|
977
|
Dartmouth workshop
|
3,577
|
115
|
Start
|
Low
|
978
|
Peter Norvig
|
3,574
|
115
|
Start
|
Unknown
|
979
|
Java remote method invocation
|
3,566
|
115
|
Start
|
Unknown
|
980
|
Software agent
|
3,550
|
114
|
Start
|
High
|
981
|
Model checking
|
3,548
|
114
|
Start
|
High
|
982
|
Scott Aaronson
|
3,542
|
114
|
Start
|
Mid
|
983
|
Fairness (machine learning)
|
3,541
|
114
|
Unknown
|
Unknown
|
984
|
Purely functional programming
|
3,537
|
114
|
Start
|
Low
|
985
|
Ivan Sutherland
|
3,537
|
114
|
Start
|
Mid
|
986
|
Sanjay Ghemawat
|
3,524
|
113
|
Start
|
Mid
|
987
|
Handwriting recognition
|
3,522
|
113
|
C
|
Mid
|
988
|
Babel (transcompiler)
|
3,518
|
113
|
Stub
|
Low
|
989
|
2-satisfiability
|
3,510
|
113
|
GA
|
Mid
|
990
|
Substring
|
3,498
|
112
|
Unknown
|
Unknown
|
991
|
Quick, Draw!
|
3,498
|
112
|
Stub
|
Low
|
992
|
Deferred shading
|
3,480
|
112
|
Start
|
Low
|
993
|
David Cheriton
|
3,476
|
112
|
Start
|
Mid
|
994
|
Graph isomorphism problem
|
3,476
|
112
|
C
|
Mid
|
995
|
SHI International Corp
|
3,475
|
112
|
Start
|
Low
|
996
|
Software rot
|
3,468
|
111
|
Unknown
|
Unknown
|
997
|
Binary decision diagram
|
3,466
|
111
|
C
|
Mid
|
998
|
Smart pointer
|
3,456
|
111
|
C
|
Low
|
999
|
Busy waiting
|
3,438
|
110
|
Start
|
Low
|
1000
|
Cross-reference
|
3,429
|
110
|
Unknown
|
Unknown
|