Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
Computer
|
199,843
|
6,661
|
C
|
Top
|
2
|
Artificial intelligence
|
175,178
|
5,839
|
B
|
Top
|
3
|
Python (programming language)
|
170,285
|
5,676
|
GA
|
Mid
|
4
|
Operating system
|
159,963
|
5,332
|
B
|
High
|
5
|
C (programming language)
|
143,822
|
4,794
|
B
|
High
|
6
|
Tim Berners-Lee
|
141,985
|
4,732
|
C
|
Top
|
7
|
Machine learning
|
112,100
|
3,736
|
B
|
High
|
8
|
HTML
|
111,938
|
3,731
|
B
|
Top
|
9
|
Video game
|
108,107
|
3,603
|
B
|
Mid
|
10
|
Java (programming language)
|
107,604
|
3,586
|
C
|
Mid
|
11
|
JavaScript
|
106,776
|
3,559
|
B
|
Mid
|
12
|
Conway's Game of Life
|
100,745
|
3,358
|
B
|
High
|
13
|
Regular expression
|
97,550
|
3,251
|
B
|
High
|
14
|
Agile software development
|
95,327
|
3,177
|
B
|
High
|
15
|
Katherine Johnson
|
94,738
|
3,157
|
GA
|
High
|
16
|
C++
|
85,862
|
2,862
|
B
|
High
|
17
|
Google Search
|
82,707
|
2,756
|
C
|
High
|
18
|
JSON
|
81,018
|
2,700
|
B
|
Mid
|
19
|
Dijkstra's algorithm
|
75,101
|
2,503
|
C
|
Top
|
20
|
Algorithm
|
74,063
|
2,468
|
B
|
Top
|
21
|
Computer science
|
73,697
|
2,456
|
C
|
Top
|
22
|
Big O notation
|
68,696
|
2,289
|
B
|
Top
|
23
|
R (programming language)
|
66,065
|
2,202
|
C
|
Mid
|
24
|
Programming language
|
65,286
|
2,176
|
B
|
Top
|
25
|
Database
|
64,543
|
2,151
|
C
|
Top
|
26
|
Information
|
64,010
|
2,133
|
C
|
Top
|
27
|
PHP
|
62,669
|
2,088
|
GA
|
Mid
|
28
|
UTF-8
|
62,055
|
2,068
|
B
|
Mid
|
29
|
Assembly language
|
61,220
|
2,040
|
B
|
High
|
30
|
Data science
|
59,790
|
1,993
|
Start
|
High
|
31
|
Go (programming language)
|
59,199
|
1,973
|
C
|
Low
|
32
|
Deep learning
|
59,067
|
1,968
|
C
|
High
|
33
|
Artificial neural network
|
58,673
|
1,955
|
C
|
Mid
|
34
|
C Sharp (programming language)
|
58,122
|
1,937
|
B
|
Low
|
35
|
Prisoner's dilemma
|
58,062
|
1,935
|
C
|
High
|
36
|
Turing machine
|
57,518
|
1,917
|
B
|
Top
|
37
|
Moore's law
|
57,335
|
1,911
|
B
|
Mid
|
38
|
Monte Carlo method
|
57,158
|
1,905
|
B
|
High
|
39
|
K-means clustering
|
54,912
|
1,830
|
C
|
Mid
|
40
|
Unix
|
54,348
|
1,811
|
B
|
Mid
|
41
|
Support-vector machine
|
53,040
|
1,768
|
C
|
Mid
|
42
|
Cryptography
|
53,000
|
1,766
|
B
|
Top
|
43
|
Millennium Prize Problems
|
52,153
|
1,738
|
C
|
Mid
|
44
|
Rust (programming language)
|
51,887
|
1,729
|
B
|
Mid
|
45
|
Quicksort
|
50,495
|
1,683
|
B
|
Top
|
46
|
Model–view–controller
|
50,388
|
1,679
|
Start
|
Mid
|
47
|
Programmer
|
49,667
|
1,655
|
C
|
Mid
|
48
|
Travelling salesman problem
|
48,268
|
1,608
|
B
|
Top
|
49
|
Turing test
|
47,412
|
1,580
|
B
|
High
|
50
|
Floating-point arithmetic
|
47,336
|
1,577
|
B
|
Top
|
51
|
Brainfuck
|
47,268
|
1,575
|
C
|
Low
|
52
|
Natural language processing
|
46,921
|
1,564
|
C
|
Top
|
53
|
Web colors
|
46,143
|
1,538
|
C
|
Mid
|
54
|
Software design pattern
|
45,850
|
1,528
|
C
|
High
|
55
|
P versus NP problem
|
45,775
|
1,525
|
B
|
Top
|
56
|
Hash function
|
45,586
|
1,519
|
C
|
High
|
57
|
Heuristic
|
44,824
|
1,494
|
C
|
Mid
|
58
|
Virtual reality
|
44,213
|
1,473
|
C
|
Mid
|
59
|
Hash table
|
43,939
|
1,464
|
B
|
High
|
60
|
Computer programming
|
43,696
|
1,456
|
C
|
Top
|
61
|
Open-source software
|
43,575
|
1,452
|
C
|
Top
|
62
|
A* search algorithm
|
42,834
|
1,427
|
B
|
Mid
|
63
|
RGB color model
|
42,460
|
1,415
|
B
|
Low
|
64
|
Diffie–Hellman key exchange
|
42,399
|
1,413
|
C
|
Mid
|
65
|
Order of operations
|
42,386
|
1,412
|
C
|
Mid
|
66
|
Binary search algorithm
|
41,806
|
1,393
|
FA
|
High
|
67
|
Free and open-source software
|
40,261
|
1,342
|
C
|
Top
|
68
|
Sorting algorithm
|
39,005
|
1,300
|
C
|
Top
|
69
|
Two's complement
|
37,813
|
1,260
|
B
|
High
|
70
|
Functional programming
|
37,616
|
1,253
|
B
|
Top
|
71
|
Time complexity
|
37,395
|
1,246
|
B
|
High
|
72
|
Kernel (operating system)
|
37,145
|
1,238
|
B
|
High
|
73
|
Breadth-first search
|
36,942
|
1,231
|
Start
|
High
|
74
|
Unified Modeling Language
|
36,756
|
1,225
|
C
|
High
|
75
|
Finite-state machine
|
36,270
|
1,209
|
B
|
Top
|
76
|
Data mining
|
35,778
|
1,192
|
B
|
High
|
77
|
Depth-first search
|
35,244
|
1,174
|
C
|
Top
|
78
|
Fortran
|
35,082
|
1,169
|
C
|
Mid
|
79
|
Malware
|
35,016
|
1,167
|
C
|
High
|
80
|
ECMAScript
|
35,011
|
1,167
|
C
|
Mid
|
81
|
Graph theory
|
34,809
|
1,160
|
C
|
Top
|
82
|
Turing completeness
|
34,696
|
1,156
|
C
|
Top
|
83
|
Merge sort
|
34,641
|
1,154
|
C
|
High
|
84
|
Computer program
|
33,519
|
1,117
|
B
|
Top
|
85
|
Levenshtein distance
|
33,340
|
1,111
|
C
|
Mid
|
86
|
Dynamic programming
|
33,269
|
1,108
|
B
|
Top
|
87
|
Relational database
|
33,213
|
1,107
|
C
|
Top
|
88
|
Data structure
|
33,162
|
1,105
|
C
|
Top
|
89
|
Linear programming
|
33,015
|
1,100
|
B
|
High
|
90
|
Data type
|
32,939
|
1,097
|
C
|
Mid
|
91
|
Scratch (programming language)
|
32,910
|
1,097
|
C
|
Low
|
92
|
Boolean algebra
|
32,597
|
1,086
|
B
|
High
|
93
|
Cognition
|
32,562
|
1,085
|
C
|
Low
|
94
|
Cluster analysis
|
31,899
|
1,063
|
C
|
High
|
95
|
Software engineering
|
31,833
|
1,061
|
C
|
Top
|
96
|
Programming paradigm
|
31,689
|
1,056
|
C
|
Mid
|
97
|
Lisp (programming language)
|
31,659
|
1,055
|
B
|
High
|
98
|
Compiler
|
31,590
|
1,053
|
C
|
Top
|
99
|
OpenAI
|
31,208
|
1,040
|
Start
|
Low
|
100
|
Knapsack problem
|
31,199
|
1,039
|
B
|
Mid
|
101
|
Vector graphics
|
31,071
|
1,035
|
Start
|
High
|
102
|
Advanced Video Coding
|
31,050
|
1,035
|
C
|
Low
|
103
|
Tree (data structure)
|
30,842
|
1,028
|
C
|
High
|
104
|
High Efficiency Video Coding
|
30,422
|
1,014
|
B
|
Low
|
105
|
Directed acyclic graph
|
29,809
|
993
|
GA
|
High
|
106
|
NP-completeness
|
29,806
|
993
|
C
|
Top
|
107
|
Binary search tree
|
29,090
|
969
|
C
|
High
|
108
|
Software developer
|
28,956
|
965
|
NA
|
Low
|
109
|
Heap (data structure)
|
28,928
|
964
|
C
|
High
|
110
|
Usage share of operating systems
|
28,770
|
959
|
B
|
High
|
111
|
Tower of Hanoi
|
28,732
|
957
|
C
|
Mid
|
112
|
Ray tracing (graphics)
|
28,615
|
953
|
B
|
Mid
|
113
|
Swift (programming language)
|
28,585
|
952
|
B
|
Mid
|
114
|
First-order logic
|
28,337
|
944
|
B
|
High
|
115
|
TypeScript
|
28,178
|
939
|
C
|
Low
|
116
|
Halting problem
|
28,138
|
937
|
B
|
Top
|
117
|
Ajax (programming)
|
27,899
|
929
|
Start
|
High
|
118
|
Lambda calculus
|
27,503
|
916
|
B
|
Top
|
119
|
B-tree
|
27,480
|
916
|
C
|
High
|
120
|
Robert C. Martin
|
27,438
|
914
|
Start
|
Mid
|
121
|
Tf–idf
|
27,415
|
913
|
C
|
Low
|
122
|
IEEE 754
|
27,398
|
913
|
C
|
High
|
123
|
Bubble sort
|
27,320
|
910
|
B
|
High
|
124
|
Information theory
|
27,176
|
905
|
B
|
Top
|
125
|
Huffman coding
|
27,055
|
901
|
C
|
High
|
126
|
Genetic algorithm
|
26,913
|
897
|
C
|
High
|
127
|
Bioinformatics
|
26,882
|
896
|
C
|
High
|
128
|
De Morgan's laws
|
26,837
|
894
|
Start
|
High
|
129
|
Stochastic gradient descent
|
26,708
|
890
|
Start
|
Mid
|
130
|
Insertion sort
|
26,536
|
884
|
B
|
High
|
131
|
Linked list
|
26,465
|
882
|
B
|
Top
|
132
|
Lua (programming language)
|
26,187
|
872
|
C
|
Mid
|
133
|
Dependency inversion principle
|
26,106
|
870
|
Start
|
Low
|
134
|
Exclusive or
|
26,043
|
868
|
C
|
Mid
|
135
|
Mathematical optimization
|
25,992
|
866
|
B
|
High
|
136
|
Cross-site request forgery
|
25,731
|
857
|
C
|
High
|
137
|
Singleton pattern
|
25,725
|
857
|
C
|
Mid
|
138
|
Real-time operating system
|
25,723
|
857
|
Start
|
Mid
|
139
|
Qubit
|
25,657
|
855
|
Start
|
High
|
140
|
Discrete mathematics
|
25,640
|
854
|
B
|
Top
|
141
|
Sieve of Eratosthenes
|
25,637
|
854
|
C
|
Mid
|
142
|
BASIC
|
25,351
|
845
|
C
|
Mid
|
143
|
Dennis Ritchie
|
25,291
|
843
|
Start
|
Top
|
144
|
Computer vision
|
25,176
|
839
|
C
|
Mid
|
145
|
Don't repeat yourself
|
24,807
|
826
|
Start
|
Mid
|
146
|
Quantum logic gate
|
24,675
|
822
|
Start
|
Unknown
|
147
|
Class diagram
|
24,619
|
820
|
Start
|
Low
|
148
|
NP-hardness
|
24,501
|
816
|
C
|
High
|
149
|
Deep learning super sampling
|
24,456
|
815
|
C
|
Low
|
150
|
Haskell (programming language)
|
24,329
|
810
|
B
|
Mid
|
151
|
Minimum spanning tree
|
24,252
|
808
|
C
|
High
|
152
|
Cosine similarity
|
24,068
|
802
|
C
|
Low
|
153
|
Smart city
|
23,956
|
798
|
C
|
Mid
|
154
|
Distributed computing
|
23,896
|
796
|
B
|
Top
|
155
|
Cybernetics
|
23,722
|
790
|
B
|
Mid
|
156
|
POSIX
|
23,675
|
789
|
Start
|
Mid
|
157
|
Operations research
|
23,621
|
787
|
C
|
High
|
158
|
Binary tree
|
23,427
|
780
|
B
|
Top
|
159
|
Behavior-driven development
|
23,349
|
778
|
B
|
Low
|
160
|
Whitespace character
|
23,324
|
777
|
B
|
Mid
|
161
|
Autoencoder
|
23,313
|
777
|
Start
|
Unknown
|
162
|
High-level programming language
|
23,303
|
776
|
Start
|
High
|
163
|
Red–black tree
|
23,212
|
773
|
C
|
High
|
164
|
Pareto efficiency
|
23,012
|
767
|
C
|
Mid
|
165
|
Activation function
|
22,962
|
765
|
Start
|
Mid
|
166
|
Computer engineering
|
22,669
|
755
|
C
|
Top
|
167
|
Trie
|
22,556
|
751
|
B
|
High
|
168
|
Observer pattern
|
22,317
|
743
|
Start
|
Mid
|
169
|
Fast inverse square root
|
22,313
|
743
|
GA
|
Low
|
170
|
Factory method pattern
|
22,295
|
743
|
Start
|
Mid
|
171
|
Stack (abstract data type)
|
22,132
|
737
|
C
|
High
|
172
|
Julia (programming language)
|
22,122
|
737
|
C
|
Low
|
173
|
Software development process
|
22,040
|
734
|
C
|
Mid
|
174
|
Topological sorting
|
21,983
|
732
|
C
|
High
|
175
|
Floor and ceiling functions
|
21,971
|
732
|
B
|
Mid
|
176
|
Computer architecture
|
21,735
|
724
|
C
|
Top
|
177
|
Version control
|
21,713
|
723
|
C
|
High
|
178
|
Artificial general intelligence
|
21,694
|
723
|
C
|
Mid
|
179
|
Tree traversal
|
21,220
|
707
|
C
|
High
|
180
|
Neural network
|
21,188
|
706
|
B
|
High
|
181
|
Semaphore (programming)
|
21,085
|
702
|
Start
|
High
|
182
|
Continuous integration
|
20,893
|
696
|
B
|
Low
|
183
|
Free software
|
20,815
|
693
|
C
|
Top
|
184
|
AVL tree
|
20,755
|
691
|
C
|
High
|
185
|
Source code
|
20,627
|
687
|
C
|
High
|
186
|
BERT (language model)
|
20,572
|
685
|
Start
|
Unknown
|
187
|
Deadlock
|
20,528
|
684
|
C
|
High
|
188
|
Unsupervised learning
|
20,406
|
680
|
C
|
Mid
|
189
|
Computer graphics
|
20,399
|
679
|
B
|
Top
|
190
|
Bellman–Ford algorithm
|
20,038
|
667
|
C
|
Mid
|
191
|
Bias–variance tradeoff
|
20,035
|
667
|
Start
|
Unknown
|
192
|
Computer science and engineering
|
19,991
|
666
|
Start
|
Low
|
193
|
Shortest path problem
|
19,943
|
664
|
C
|
High
|
194
|
Greedy algorithm
|
19,872
|
662
|
C
|
High
|
195
|
Race condition
|
19,836
|
661
|
C
|
Mid
|
196
|
Heapsort
|
19,784
|
659
|
B
|
High
|
197
|
Brute-force attack
|
19,784
|
659
|
C
|
High
|
198
|
Claude Shannon
|
19,745
|
658
|
B
|
High
|
199
|
Scripting language
|
19,703
|
656
|
C
|
Mid
|
200
|
Graph (discrete mathematics)
|
19,691
|
656
|
B
|
High
|
201
|
Array data structure
|
19,610
|
653
|
C
|
Top
|
202
|
Hackathon
|
19,608
|
653
|
Start
|
Mid
|
203
|
AV1
|
19,510
|
650
|
B
|
Low
|
204
|
Inversion of control
|
19,417
|
647
|
Start
|
Low
|
205
|
Thread (computing)
|
19,237
|
641
|
C
|
High
|
206
|
Deep Blue (chess computer)
|
19,133
|
637
|
C
|
Mid
|
207
|
Perl
|
19,107
|
636
|
GA
|
Mid
|
208
|
Abstraction
|
19,101
|
636
|
Start
|
High
|
209
|
Expectation–maximization algorithm
|
18,964
|
632
|
C
|
High
|
210
|
Adjacency matrix
|
18,904
|
630
|
C
|
Mid
|
211
|
Computing
|
18,864
|
628
|
C
|
High
|
212
|
Jaccard index
|
18,829
|
627
|
C
|
Mid
|
213
|
Markov chain Monte Carlo
|
18,824
|
627
|
C
|
High
|
214
|
Liskov substitution principle
|
18,752
|
625
|
Start
|
Mid
|
215
|
Data model
|
18,736
|
624
|
C
|
High
|
216
|
Cyclomatic complexity
|
18,678
|
622
|
C
|
Low
|
217
|
Intrusion detection system
|
18,583
|
619
|
Start
|
Low
|
218
|
Magic number (programming)
|
18,567
|
618
|
C
|
Mid
|
219
|
Institute of Electrical and Electronics Engineers
|
18,487
|
616
|
B
|
Top
|
220
|
Markup language
|
18,296
|
609
|
C
|
High
|
221
|
Donald Knuth
|
17,980
|
599
|
B
|
Top
|
222
|
Garbage collection (computer science)
|
17,894
|
596
|
C
|
High
|
223
|
Cellular automaton
|
17,869
|
595
|
B
|
Top
|
224
|
Boolean satisfiability problem
|
17,781
|
592
|
C
|
Mid
|
225
|
Recursion
|
17,676
|
589
|
C
|
Mid
|
226
|
Hamming code
|
17,569
|
585
|
C
|
High
|
227
|
Ken Thompson
|
17,559
|
585
|
B
|
Top
|
228
|
Inheritance (object-oriented programming)
|
17,552
|
585
|
Start
|
Mid
|
229
|
Naming convention (programming)
|
17,545
|
584
|
Start
|
Unknown
|
230
|
Priority queue
|
17,529
|
584
|
C
|
High
|
231
|
Prim's algorithm
|
17,497
|
583
|
C
|
High
|
232
|
History of Python
|
17,463
|
582
|
C
|
Low
|
233
|
Hierarchical clustering
|
17,427
|
580
|
C
|
Mid
|
234
|
Binary heap
|
17,426
|
580
|
B
|
High
|
235
|
Foobar
|
17,386
|
579
|
C
|
Mid
|
236
|
Cache replacement policies
|
17,286
|
576
|
C
|
Mid
|
237
|
Automata theory
|
17,277
|
575
|
C
|
Top
|
238
|
Type system
|
17,238
|
574
|
B
|
High
|
239
|
Human–computer interaction
|
17,224
|
574
|
C
|
Top
|
240
|
Complex system
|
17,034
|
567
|
C
|
High
|
241
|
Turing Award
|
16,987
|
566
|
Start
|
Top
|
242
|
Prolog
|
16,948
|
564
|
B
|
Mid
|
243
|
Context-free grammar
|
16,947
|
564
|
B
|
Top
|
244
|
Recursion (computer science)
|
16,865
|
562
|
C
|
Top
|
245
|
Disjoint-set data structure
|
16,844
|
561
|
C
|
High
|
246
|
Parsing
|
16,813
|
560
|
Start
|
Top
|
247
|
Data-flow diagram
|
16,770
|
559
|
Start
|
Mid
|
248
|
Monad (functional programming)
|
16,746
|
558
|
B
|
Mid
|
249
|
Kruskal's algorithm
|
16,674
|
555
|
Start
|
High
|
250
|
ISO/IEC 8859-1
|
16,673
|
555
|
Start
|
Unknown
|
251
|
AlphaGo
|
16,666
|
555
|
C
|
High
|
252
|
Imperative programming
|
16,633
|
554
|
C
|
Top
|
253
|
Scaled agile framework
|
16,613
|
553
|
C
|
Low
|
254
|
DBSCAN
|
16,587
|
552
|
C
|
Mid
|
255
|
Strategy pattern
|
16,569
|
552
|
Start
|
Mid
|
256
|
AArch64
|
16,528
|
550
|
Start
|
Low
|
257
|
Business Process Model and Notation
|
16,519
|
550
|
Start
|
Mid
|
258
|
Checksum
|
16,330
|
544
|
Start
|
Mid
|
259
|
Hamming distance
|
16,297
|
543
|
Start
|
High
|
260
|
Selection sort
|
16,282
|
542
|
C
|
High
|
261
|
Decorator pattern
|
16,150
|
538
|
Start
|
Low
|
262
|
K-d tree
|
16,145
|
538
|
C
|
Low
|
263
|
Software engineer
|
16,138
|
537
|
Start
|
Mid
|
264
|
HTML element
|
16,054
|
535
|
C
|
Mid
|
265
|
Cognitive science
|
16,029
|
534
|
C
|
High
|
266
|
Composition over inheritance
|
15,978
|
532
|
C
|
Low
|
267
|
Best, worst and average case
|
15,965
|
532
|
Start
|
High
|
268
|
Pseudorandom number generator
|
15,950
|
531
|
C
|
High
|
269
|
Declarative programming
|
15,919
|
530
|
C
|
Top
|
270
|
In-place algorithm
|
15,862
|
528
|
Start
|
Unknown
|
271
|
Automaton
|
15,859
|
528
|
C
|
High
|
272
|
Amdahl's law
|
15,804
|
526
|
C
|
High
|
273
|
Numerical analysis
|
15,701
|
523
|
B
|
Top
|
274
|
Vint Cerf
|
15,675
|
522
|
Start
|
Mid
|
275
|
HTTP Live Streaming
|
15,600
|
520
|
Start
|
Low
|
276
|
Lossless compression
|
15,582
|
519
|
C
|
High
|
277
|
Ada (programming language)
|
15,573
|
519
|
Unknown
|
Unknown
|
278
|
Role-based access control
|
15,550
|
518
|
C
|
Mid
|
279
|
Color depth
|
15,541
|
518
|
C
|
Low
|
280
|
Builder pattern
|
15,434
|
514
|
Start
|
Unknown
|
281
|
Floyd–Warshall algorithm
|
15,398
|
513
|
B
|
High
|
282
|
Raster graphics
|
15,385
|
512
|
Start
|
Mid
|
283
|
Computational fluid dynamics
|
15,374
|
512
|
B
|
High
|
284
|
Ontology (information science)
|
15,370
|
512
|
C
|
High
|
285
|
String (computer science)
|
15,287
|
509
|
Start
|
High
|
286
|
Residual neural network
|
15,260
|
508
|
Start
|
Low
|
287
|
Tensor Processing Unit
|
15,252
|
508
|
C
|
Mid
|
288
|
NP (complexity)
|
15,233
|
507
|
C
|
High
|
289
|
Procedural programming
|
15,213
|
507
|
Start
|
Mid
|
290
|
Edsger W. Dijkstra
|
15,202
|
506
|
B
|
High
|
291
|
Error detection and correction
|
15,201
|
506
|
C
|
Unknown
|
292
|
Bresenham's line algorithm
|
15,128
|
504
|
C
|
Mid
|
293
|
Rounding
|
15,041
|
501
|
B
|
Low
|
294
|
Reed–Solomon error correction
|
15,028
|
500
|
C
|
Mid
|
295
|
Memory hierarchy
|
14,997
|
499
|
Start
|
Mid
|
296
|
Lenna
|
14,934
|
497
|
C
|
Unknown
|
297
|
Code
|
14,920
|
497
|
C
|
High
|
298
|
Graph coloring
|
14,909
|
496
|
B
|
Mid
|
299
|
Particle swarm optimization
|
14,893
|
496
|
C
|
Mid
|
300
|
Ensemble learning
|
14,710
|
490
|
C
|
Mid
|
301
|
Abstraction (computer science)
|
14,656
|
488
|
Start
|
Top
|
302
|
Pseudocode
|
14,632
|
487
|
C
|
High
|
303
|
Erlang (programming language)
|
14,593
|
486
|
B
|
Mid
|
304
|
Sparse matrix
|
14,587
|
486
|
C
|
Mid
|
305
|
List of tools for static code analysis
|
14,544
|
484
|
List
|
Low
|
306
|
Digital Revolution
|
14,527
|
484
|
Start
|
Mid
|
307
|
Expert system
|
14,428
|
480
|
Start
|
Mid
|
308
|
Simplex algorithm
|
14,399
|
479
|
C
|
High
|
309
|
Pointer (computer programming)
|
14,237
|
474
|
C
|
High
|
310
|
Radix sort
|
14,230
|
474
|
Start
|
High
|
311
|
POST (HTTP)
|
14,184
|
472
|
Start
|
Low
|
312
|
Boolean data type
|
14,149
|
471
|
Start
|
Low
|
313
|
Signal processing
|
14,070
|
469
|
C
|
Low
|
314
|
Category theory
|
14,062
|
468
|
B
|
High
|
315
|
Formal language
|
13,892
|
463
|
C
|
High
|
316
|
Primality test
|
13,888
|
462
|
Start
|
Mid
|
317
|
Applications of artificial intelligence
|
13,879
|
462
|
C
|
Low
|
318
|
Password cracking
|
13,878
|
462
|
C
|
Low
|
319
|
Rendering (computer graphics)
|
13,866
|
462
|
B
|
High
|
320
|
Encapsulation (computer programming)
|
13,780
|
459
|
Start
|
High
|
321
|
Multiple inheritance
|
13,760
|
458
|
C
|
Mid
|
322
|
Actor model
|
13,723
|
457
|
C
|
Mid
|
323
|
Natalie Enright Jerger
|
13,701
|
456
|
Start
|
Unknown
|
324
|
Macro (computer science)
|
13,585
|
452
|
C
|
Mid
|
325
|
Homotopy type theory
|
13,438
|
447
|
C
|
Low
|
326
|
Abstract data type
|
13,348
|
444
|
C
|
High
|
327
|
Structured programming
|
13,323
|
444
|
Start
|
Mid
|
328
|
Mersenne Twister
|
13,257
|
441
|
Unknown
|
Unknown
|
329
|
Directed graph
|
13,227
|
440
|
C
|
High
|
330
|
Lexical analysis
|
13,223
|
440
|
C
|
High
|
331
|
Relational model
|
13,201
|
440
|
C
|
Top
|
332
|
Heuristic (computer science)
|
13,105
|
436
|
Unknown
|
Unknown
|
333
|
Integer (computer science)
|
13,100
|
436
|
C
|
Mid
|
334
|
APL (programming language)
|
13,099
|
436
|
B
|
Mid
|
335
|
Subroutine
|
13,090
|
436
|
C
|
Top
|
336
|
Esoteric programming language
|
13,072
|
435
|
Start
|
Unknown
|
337
|
Numerical integration
|
13,070
|
435
|
B
|
Mid
|
338
|
Data modeling
|
13,054
|
435
|
C
|
High
|
339
|
Canny edge detector
|
13,044
|
434
|
Start
|
Mid
|
340
|
Master theorem (analysis of algorithms)
|
13,029
|
434
|
C
|
High
|
341
|
Memetics
|
12,983
|
432
|
Start
|
Unknown
|
342
|
Interface (computing)
|
12,951
|
431
|
C
|
Low
|
343
|
Adapter pattern
|
12,839
|
427
|
Start
|
Unknown
|
344
|
Visitor pattern
|
12,829
|
427
|
Start
|
Unknown
|
345
|
Bjarne Stroustrup
|
12,806
|
426
|
Start
|
High
|
346
|
Computational complexity theory
|
12,769
|
425
|
C
|
Top
|
347
|
Class (computer programming)
|
12,710
|
423
|
Start
|
High
|
348
|
Memory management
|
12,692
|
423
|
C
|
High
|
349
|
Routing
|
12,652
|
421
|
C
|
Mid
|
350
|
Aspect-oriented programming
|
12,648
|
421
|
Start
|
Mid
|
351
|
Relational algebra
|
12,624
|
420
|
C
|
Mid
|
352
|
Colossus computer
|
12,602
|
420
|
B
|
Mid
|
353
|
Strong and weak typing
|
12,570
|
419
|
Start
|
Mid
|
354
|
List of datasets for machine-learning research
|
12,558
|
418
|
List
|
Mid
|
355
|
Federated learning
|
12,532
|
417
|
Start
|
Low
|
356
|
Variable (computer science)
|
12,477
|
415
|
Start
|
Top
|
357
|
Bogosort
|
12,417
|
413
|
Start
|
Low
|
358
|
Hungarian notation
|
12,401
|
413
|
Start
|
Low
|
359
|
Maximum subarray problem
|
12,329
|
410
|
Unknown
|
Unknown
|
360
|
Smalltalk
|
12,289
|
409
|
Start
|
Mid
|
361
|
Multiplication sign
|
12,278
|
409
|
C
|
Low
|
362
|
Watson (computer)
|
12,267
|
408
|
GA
|
Mid
|
363
|
List of data structures
|
12,265
|
408
|
List
|
High
|
364
|
Voxel
|
12,192
|
406
|
C
|
Mid
|
365
|
Chomsky hierarchy
|
12,138
|
404
|
Start
|
Top
|
366
|
For loop
|
12,064
|
402
|
B
|
High
|
367
|
Marvin Minsky
|
12,017
|
400
|
C
|
Unknown
|
368
|
Longest common subsequence problem
|
11,971
|
399
|
Start
|
High
|
369
|
Exception handling
|
11,896
|
396
|
B
|
Mid
|
370
|
Data visualization
|
11,868
|
395
|
C
|
High
|
371
|
Process (computing)
|
11,846
|
394
|
C
|
Mid
|
372
|
The Open Group Architecture Framework
|
11,749
|
391
|
Start
|
High
|
373
|
Ackermann function
|
11,729
|
390
|
B
|
Mid
|
374
|
Coroutine
|
11,660
|
388
|
C
|
Mid
|
375
|
Coupling (computer programming)
|
11,656
|
388
|
Start
|
High
|
376
|
Linear congruential generator
|
11,635
|
387
|
Start
|
Mid
|
377
|
Cut, copy, and paste
|
11,633
|
387
|
C
|
High
|
378
|
Branch and bound
|
11,525
|
384
|
Start
|
Mid
|
379
|
Word (computer architecture)
|
11,500
|
383
|
C
|
Mid
|
380
|
Deterministic finite automaton
|
11,477
|
382
|
Start
|
High
|
381
|
Closure (computer programming)
|
11,470
|
382
|
C
|
Mid
|
382
|
Internet Engineering Task Force
|
11,466
|
382
|
C
|
Mid
|
383
|
Event-driven programming
|
11,454
|
381
|
Start
|
High
|
384
|
Decision theory
|
11,407
|
380
|
C
|
High
|
385
|
B+ tree
|
11,401
|
380
|
Start
|
High
|
386
|
Shift register
|
11,351
|
378
|
Start
|
Unknown
|
387
|
Command pattern
|
11,330
|
377
|
Start
|
Mid
|
388
|
Anomaly detection
|
11,298
|
376
|
Start
|
Mid
|
389
|
Ben Horowitz
|
11,245
|
374
|
Start
|
Low
|
390
|
Nim
|
11,228
|
374
|
C
|
Unknown
|
391
|
The Art of Computer Programming
|
11,212
|
373
|
C
|
Top
|
392
|
Anti-pattern
|
11,194
|
373
|
C
|
Mid
|
393
|
D (programming language)
|
11,187
|
372
|
C
|
Low
|
394
|
Queue (abstract data type)
|
11,183
|
372
|
Start
|
Top
|
395
|
Circular buffer
|
11,123
|
370
|
Start
|
Mid
|
396
|
Mean time between failures
|
11,119
|
370
|
Start
|
Low
|
397
|
Cargo cult programming
|
11,004
|
366
|
Start
|
Low
|
398
|
Anonymous function
|
10,998
|
366
|
C
|
Mid
|
399
|
Row- and column-major order
|
10,964
|
365
|
C
|
Mid
|
400
|
Elbow method (clustering)
|
10,937
|
364
|
Unknown
|
Unknown
|
401
|
Control flow
|
10,936
|
364
|
B
|
Top
|
402
|
Code smell
|
10,909
|
363
|
C
|
Low
|
403
|
Shannon–Hartley theorem
|
10,907
|
363
|
C
|
High
|
404
|
Planar graph
|
10,858
|
361
|
B
|
Mid
|
405
|
Avast
|
10,850
|
361
|
B
|
Mid
|
406
|
Existential risk from artificial general intelligence
|
10,843
|
361
|
C
|
Mid
|
407
|
Geoffrey Hinton
|
10,839
|
361
|
C
|
Low
|
408
|
Identity management
|
10,838
|
361
|
C
|
Unknown
|
409
|
Named-entity recognition
|
10,832
|
361
|
C
|
Unknown
|
410
|
Longest palindromic substring
|
10,801
|
360
|
C
|
Low
|
411
|
W3Schools
|
10,795
|
359
|
Stub
|
Unknown
|
412
|
Subset sum problem
|
10,743
|
358
|
C
|
Low
|
413
|
Alice and Bob
|
10,692
|
356
|
Start
|
Low
|
414
|
Elixir (programming language)
|
10,612
|
353
|
Unknown
|
Unknown
|
415
|
Monte Carlo tree search
|
10,495
|
349
|
C
|
Mid
|
416
|
Logo (programming language)
|
10,464
|
348
|
C
|
Mid
|
417
|
Sankey diagram
|
10,457
|
348
|
C
|
Low
|
418
|
Microkernel
|
10,408
|
346
|
C
|
High
|
419
|
AWK
|
10,381
|
346
|
B
|
Mid
|
420
|
Static program analysis
|
10,355
|
345
|
C
|
Mid
|
421
|
Division algorithm
|
10,351
|
345
|
C
|
High
|
422
|
Avast Antivirus
|
10,323
|
344
|
Start
|
Mid
|
423
|
Web API
|
10,310
|
343
|
Unknown
|
Unknown
|
424
|
Call stack
|
10,226
|
340
|
C
|
Mid
|
425
|
Fourth-generation programming language
|
10,210
|
340
|
Start
|
Mid
|
426
|
Reactive programming
|
10,188
|
339
|
Start
|
Unknown
|
427
|
VP9
|
10,160
|
338
|
C
|
Low
|
428
|
Procedural generation
|
10,138
|
337
|
Start
|
Unknown
|
429
|
Conflict-free replicated data type
|
9,939
|
331
|
C
|
High
|
430
|
Mutual exclusion
|
9,938
|
331
|
C
|
Top
|
431
|
Real-time computing
|
9,926
|
330
|
C
|
High
|
432
|
Sørensen–Dice coefficient
|
9,879
|
329
|
Start
|
Unknown
|
433
|
Coding theory
|
9,839
|
327
|
C
|
High
|
434
|
Check digit
|
9,829
|
327
|
Start
|
Mid
|
435
|
Run-length encoding
|
9,783
|
326
|
Start
|
Mid
|
436
|
Conditional (computer programming)
|
9,778
|
325
|
C
|
Mid
|
437
|
Branch predictor
|
9,776
|
325
|
C
|
Mid
|
438
|
Grover's algorithm
|
9,774
|
325
|
C
|
Mid
|
439
|
Ant colony optimization algorithms
|
9,740
|
324
|
B
|
Low
|
440
|
Shunting-yard algorithm
|
9,728
|
324
|
Unknown
|
Unknown
|
441
|
Paxos (computer science)
|
9,687
|
322
|
C
|
Low
|
442
|
Object (computer science)
|
9,655
|
321
|
Start
|
High
|
443
|
Edge detection
|
9,645
|
321
|
C
|
Mid
|
444
|
State diagram
|
9,639
|
321
|
C
|
Mid
|
445
|
Skip list
|
9,596
|
319
|
C
|
Mid
|
446
|
Maze generation algorithm
|
9,577
|
319
|
Start
|
Unknown
|
447
|
Sudoku solving algorithms
|
9,571
|
319
|
B
|
Low
|
448
|
Dining philosophers problem
|
9,489
|
316
|
Start
|
Top
|
449
|
Hazard (computer architecture)
|
9,386
|
312
|
C
|
Low
|
450
|
Knuth–Morris–Pratt algorithm
|
9,337
|
311
|
Start
|
High
|
451
|
Linker (computing)
|
9,320
|
310
|
C
|
Mid
|
452
|
Object-oriented analysis and design
|
9,309
|
310
|
Start
|
High
|
453
|
All-points bulletin
|
9,284
|
309
|
Unknown
|
Unknown
|
454
|
List of pioneers in computer science
|
9,276
|
309
|
List
|
Unknown
|
455
|
Email spoofing
|
9,262
|
308
|
Start
|
Low
|
456
|
Pushdown automaton
|
9,259
|
308
|
B
|
High
|
457
|
LiteOS
|
9,237
|
307
|
Start
|
Low
|
458
|
Self-balancing binary search tree
|
9,155
|
305
|
Start
|
Mid
|
459
|
List of unsolved problems in computer science
|
9,152
|
305
|
List
|
Mid
|
460
|
Logic programming
|
9,130
|
304
|
B
|
Top
|
461
|
Root-finding algorithms
|
9,108
|
303
|
Unknown
|
Unknown
|
462
|
ABAP
|
9,101
|
303
|
C
|
Low
|
463
|
Two-phase commit protocol
|
9,083
|
302
|
C
|
High
|
464
|
Lossy compression
|
9,048
|
301
|
Start
|
High
|
465
|
Feature selection
|
9,047
|
301
|
C
|
Mid
|
466
|
Church–Turing thesis
|
9,007
|
300
|
C
|
Top
|
467
|
8-bit computing
|
8,992
|
299
|
Start
|
High
|
468
|
Thrashing (computer science)
|
8,989
|
299
|
C
|
Low
|
469
|
Code coverage
|
8,982
|
299
|
C
|
Low
|
470
|
Computational biology
|
8,901
|
296
|
C
|
High
|
471
|
Consistent hashing
|
8,891
|
296
|
Stub
|
Unknown
|
472
|
Cycle detection
|
8,866
|
295
|
B
|
Low
|
473
|
Hyper-threading
|
8,864
|
295
|
C
|
Low
|
474
|
Swarm intelligence
|
8,770
|
292
|
C
|
Mid
|
475
|
Vertex cover
|
8,769
|
292
|
C
|
Mid
|
476
|
Data governance
|
8,712
|
290
|
C
|
Unknown
|
477
|
Agent-based model
|
8,694
|
289
|
C
|
Mid
|
478
|
Data (computing)
|
8,678
|
289
|
C
|
Top
|
479
|
Consensus (computer science)
|
8,646
|
288
|
Start
|
High
|
480
|
Binary file
|
8,623
|
287
|
C
|
High
|
481
|
Abstract factory pattern
|
8,622
|
287
|
Start
|
Mid
|
482
|
Theoretical computer science
|
8,622
|
287
|
B
|
Top
|
483
|
Apriori algorithm
|
8,589
|
286
|
C
|
Mid
|
484
|
Maximum flow problem
|
8,585
|
286
|
C
|
High
|
485
|
Quantum key distribution
|
8,557
|
285
|
B
|
Mid
|
486
|
Enterprise architecture
|
8,543
|
284
|
Start
|
Mid
|
487
|
Currying
|
8,512
|
283
|
C
|
High
|
488
|
Spaghetti code
|
8,468
|
282
|
Start
|
Mid
|
489
|
Vehicle routing problem
|
8,461
|
282
|
Unknown
|
Unknown
|
490
|
Evolutionary algorithm
|
8,438
|
281
|
C
|
Mid
|
491
|
Scope (computer science)
|
8,413
|
280
|
C
|
High
|
492
|
Component (graph theory)
|
8,377
|
279
|
Start
|
Mid
|
493
|
Linear search
|
8,367
|
278
|
Start
|
Mid
|
494
|
Memory leak
|
8,362
|
278
|
C
|
Mid
|
495
|
Sandbox (software development)
|
8,351
|
278
|
Start
|
Low
|
496
|
Information hiding
|
8,348
|
278
|
Start
|
Mid
|
497
|
Associative array
|
8,346
|
278
|
C
|
High
|
498
|
Combinatorial optimization
|
8,336
|
277
|
C
|
Top
|
499
|
Database design
|
8,321
|
277
|
C
|
High
|
500
|
Ladder logic
|
8,316
|
277
|
Start
|
Low
|
501
|
Graph (abstract data type)
|
8,228
|
274
|
C
|
Top
|
502
|
Data structure alignment
|
8,221
|
274
|
Start
|
Mid
|
503
|
R-tree
|
8,202
|
273
|
C
|
Mid
|
504
|
Metaheuristic
|
8,149
|
271
|
Start
|
Mid
|
505
|
Petri net
|
8,131
|
271
|
B
|
Mid
|
506
|
Multiclass classification
|
8,117
|
270
|
Start
|
Mid
|
507
|
Ones' complement
|
8,107
|
270
|
Start
|
Mid
|
508
|
Signed number representations
|
8,087
|
269
|
C
|
High
|
509
|
Nondeterministic finite automaton
|
8,084
|
269
|
B
|
High
|
510
|
Web developer
|
8,062
|
268
|
Start
|
Mid
|
511
|
Bucket sort
|
8,045
|
268
|
C
|
High
|
512
|
Data access object
|
8,033
|
267
|
Start
|
Unknown
|
513
|
Type theory
|
8,010
|
267
|
C
|
High
|
514
|
Inverter (logic gate)
|
8,001
|
266
|
Start
|
Unknown
|
515
|
Intelligent agent
|
7,995
|
266
|
Unknown
|
Unknown
|
516
|
JSONP
|
7,966
|
265
|
Start
|
Low
|
517
|
Composite pattern
|
7,960
|
265
|
Start
|
Unknown
|
518
|
EBCDIC
|
7,955
|
265
|
Start
|
Mid
|
519
|
Counting sort
|
7,954
|
265
|
C
|
High
|
520
|
Directory (computing)
|
7,936
|
264
|
C
|
Low
|
521
|
Constraint satisfaction problem
|
7,907
|
263
|
C
|
Mid
|
522
|
Pranav Mistry
|
7,887
|
262
|
Start
|
Low
|
523
|
String-searching algorithm
|
7,845
|
261
|
Start
|
High
|
524
|
Brute-force search
|
7,833
|
261
|
Start
|
Mid
|
525
|
Andrey Kolmogorov
|
7,821
|
260
|
C
|
High
|
526
|
Extended ASCII
|
7,774
|
259
|
C
|
Low
|
527
|
Higher-order function
|
7,773
|
259
|
Start
|
High
|
528
|
Information science
|
7,765
|
258
|
Start
|
Top
|
529
|
Knowledge graph
|
7,745
|
258
|
Start
|
High
|
530
|
Function overloading
|
7,727
|
257
|
Unknown
|
Unknown
|
531
|
Multiplication algorithm
|
7,698
|
256
|
C
|
Low
|
532
|
Analysis of algorithms
|
7,696
|
256
|
C
|
Top
|
533
|
Rule 110
|
7,694
|
256
|
Start
|
Unknown
|
534
|
Test case
|
7,678
|
255
|
Start
|
Unknown
|
535
|
Kolmogorov complexity
|
7,667
|
255
|
B
|
High
|
536
|
Shellsort
|
7,627
|
254
|
B
|
High
|
537
|
Demand paging
|
7,618
|
253
|
Start
|
Mid
|
538
|
Code page 437
|
7,613
|
253
|
C
|
Low
|
539
|
C++ classes
|
7,598
|
253
|
C
|
Low
|
540
|
Tony Hoare
|
7,588
|
252
|
C
|
High
|
541
|
Edit distance
|
7,574
|
252
|
C
|
Mid
|
542
|
Extended Backus–Naur form
|
7,504
|
250
|
C
|
Mid
|
543
|
First-class function
|
7,500
|
250
|
C
|
High
|
544
|
Maze-solving algorithm
|
7,492
|
249
|
Unknown
|
Unknown
|
545
|
Cohesion (computer science)
|
7,464
|
248
|
Unknown
|
Unknown
|
546
|
HackerRank
|
7,431
|
247
|
Start
|
Unknown
|
547
|
List of NP-complete problems
|
7,408
|
246
|
List
|
High
|
548
|
JPEG 2000
|
7,378
|
245
|
C
|
Low
|
549
|
DeepDream
|
7,373
|
245
|
Start
|
Low
|
550
|
Ford–Fulkerson algorithm
|
7,360
|
245
|
Start
|
High
|
551
|
Computational linguistics
|
7,348
|
244
|
Start
|
High
|
552
|
Non-English-based programming languages
|
7,347
|
244
|
List
|
Low
|
553
|
Do while loop
|
7,347
|
244
|
Unknown
|
Unknown
|
554
|
QBittorrent
|
7,323
|
244
|
Stub
|
Low
|
555
|
C--
|
7,298
|
243
|
Start
|
Low
|
556
|
Database model
|
7,277
|
242
|
C
|
Top
|
557
|
Theory of computation
|
7,267
|
242
|
C
|
Top
|
558
|
State pattern
|
7,225
|
240
|
Start
|
Unknown
|
559
|
JavaScript engine
|
7,223
|
240
|
C
|
Mid
|
560
|
Gladys West
|
7,208
|
240
|
B
|
Low
|
561
|
Glossary of graph theory
|
7,201
|
240
|
List
|
Mid
|
562
|
Concurrency (computer science)
|
7,177
|
239
|
Start
|
Top
|
563
|
Radix tree
|
7,155
|
238
|
C
|
Mid
|
564
|
Curiously recurring template pattern
|
7,154
|
238
|
C
|
Low
|
565
|
Wiener filter
|
7,121
|
237
|
Start
|
Unknown
|
566
|
Women and video games
|
7,092
|
236
|
B
|
Mid
|
567
|
Generalized additive model
|
7,092
|
236
|
Start
|
Low
|
568
|
Longest common substring problem
|
7,048
|
234
|
Start
|
Mid
|
569
|
Imo.im
|
7,046
|
234
|
Stub
|
Low
|
570
|
Digital data
|
7,013
|
233
|
C
|
Low
|
571
|
Smartglasses
|
6,988
|
232
|
C
|
Low
|
572
|
Attribute-based access control
|
6,973
|
232
|
Unknown
|
Unknown
|
573
|
Miller–Rabin primality test
|
6,934
|
231
|
C
|
High
|
574
|
Universal Turing machine
|
6,925
|
230
|
C
|
Mid
|
575
|
Rule 30
|
6,911
|
230
|
Start
|
Unknown
|
576
|
Computer performance
|
6,909
|
230
|
Start
|
Mid
|
577
|
Units of information
|
6,889
|
229
|
C
|
Mid
|
578
|
Attention (machine learning)
|
6,875
|
229
|
Stub
|
Unknown
|
579
|
Ubiquitous computing
|
6,875
|
229
|
C
|
High
|
580
|
User error
|
6,873
|
229
|
Start
|
High
|
581
|
Search algorithm
|
6,873
|
229
|
Start
|
Top
|
582
|
Informatics
|
6,862
|
228
|
C
|
Mid
|
583
|
No free lunch theorem
|
6,850
|
228
|
Start
|
Mid
|
584
|
Nonlinear programming
|
6,849
|
228
|
C
|
Mid
|
585
|
Luis von Ahn
|
6,843
|
228
|
Start
|
Unknown
|
586
|
Adjacency list
|
6,823
|
227
|
C
|
Mid
|
587
|
Clique problem
|
6,822
|
227
|
GA
|
Mid
|
588
|
Fragmentation (computing)
|
6,820
|
227
|
C
|
Mid
|
589
|
Comparison of integrated development environments
|
6,820
|
227
|
Start
|
Low
|
590
|
Binary space partitioning
|
6,807
|
226
|
C
|
Low
|
591
|
Two-phase locking
|
6,782
|
226
|
C
|
High
|
592
|
Umple
|
6,757
|
225
|
Start
|
Low
|
593
|
Max-flow min-cut theorem
|
6,751
|
225
|
Start
|
High
|
594
|
16K resolution
|
6,739
|
224
|
Start
|
Unknown
|
595
|
Fibonacci heap
|
6,737
|
224
|
C
|
High
|
596
|
Matrix multiplication algorithm
|
6,725
|
224
|
C
|
Mid
|
597
|
GPT-2
|
6,705
|
223
|
B
|
Low
|
598
|
Chernoff bound
|
6,705
|
223
|
Start
|
Low
|
599
|
Hill climbing
|
6,696
|
223
|
C
|
Mid
|
600
|
Cell (microprocessor)
|
6,695
|
223
|
B
|
Mid
|
601
|
MurmurHash
|
6,680
|
222
|
Start
|
Low
|
602
|
Doubly linked list
|
6,679
|
222
|
Start
|
High
|
603
|
Neuromorphic engineering
|
6,670
|
222
|
Unknown
|
Unknown
|
604
|
Generic programming
|
6,666
|
222
|
C
|
High
|
605
|
Cryptographically-secure pseudorandom number generator
|
6,665
|
222
|
C
|
High
|
606
|
Identifier
|
6,661
|
222
|
Start
|
Low
|
607
|
Legacy system
|
6,660
|
222
|
C
|
Unknown
|
608
|
Information management
|
6,653
|
221
|
C
|
Unknown
|
609
|
Fluent interface
|
6,641
|
221
|
Stub
|
Unknown
|
610
|
Ethics of artificial intelligence
|
6,620
|
220
|
B
|
Top
|
611
|
ALGOL
|
6,605
|
220
|
C
|
High
|
612
|
Quickselect
|
6,593
|
219
|
C
|
Low
|
613
|
List of computer scientists
|
6,581
|
219
|
Unknown
|
Unknown
|
614
|
3D audio effect
|
6,567
|
218
|
Start
|
Unknown
|
615
|
Lempel–Ziv–Welch
|
6,558
|
218
|
C
|
Unknown
|
616
|
Model–view–presenter
|
6,557
|
218
|
C
|
High
|
617
|
Set cover problem
|
6,542
|
218
|
C
|
Mid
|
618
|
Compare-and-swap
|
6,530
|
217
|
C
|
Low
|
619
|
Concurrent computing
|
6,518
|
217
|
C
|
High
|
620
|
Rabin–Karp algorithm
|
6,500
|
216
|
C
|
Mid
|
621
|
Adversarial machine learning
|
6,463
|
215
|
C
|
Mid
|
622
|
Short-circuit evaluation
|
6,459
|
215
|
Start
|
Mid
|
623
|
Pointing stick
|
6,457
|
215
|
C
|
Low
|
624
|
Approximate string matching
|
6,441
|
214
|
C
|
Mid
|
625
|
Limited-memory BFGS
|
6,439
|
214
|
Unknown
|
Unknown
|
626
|
Okapi BM25
|
6,439
|
214
|
Start
|
Low
|
627
|
Independent set (graph theory)
|
6,432
|
214
|
C
|
Mid
|
628
|
Quantum information
|
6,430
|
214
|
Start
|
High
|
629
|
Quantum algorithm
|
6,403
|
213
|
C
|
High
|
630
|
Computer scientist
|
6,395
|
213
|
Start
|
Top
|
631
|
Operator overloading
|
6,380
|
212
|
C
|
Mid
|
632
|
Loose coupling
|
6,377
|
212
|
Start
|
High
|
633
|
Relational operator
|
6,377
|
212
|
C
|
Mid
|
634
|
Opcode
|
6,361
|
212
|
C
|
High
|
635
|
C99
|
6,360
|
212
|
C
|
Mid
|
636
|
Hamiltonian path problem
|
6,343
|
211
|
C
|
Mid
|
637
|
Synchronization (computer science)
|
6,293
|
209
|
Unknown
|
Unknown
|
638
|
Requirements engineering
|
6,285
|
209
|
Start
|
Unknown
|
639
|
Text mining
|
6,284
|
209
|
Start
|
Unknown
|
640
|
Async/await
|
6,280
|
209
|
C
|
Mid
|
641
|
Template method pattern
|
6,277
|
209
|
Start
|
Low
|
642
|
Gradle
|
6,270
|
209
|
C
|
Low
|
643
|
Common Lisp
|
6,265
|
208
|
Start
|
Mid
|
644
|
Needleman–Wunsch algorithm
|
6,240
|
208
|
Start
|
Mid
|
645
|
Boyer–Moore string-search algorithm
|
6,227
|
207
|
C
|
High
|
646
|
Strassen algorithm
|
6,211
|
207
|
C
|
Low
|
647
|
Longest path problem
|
6,210
|
207
|
C
|
Low
|
648
|
Computational thinking
|
6,207
|
206
|
Start
|
Unknown
|
649
|
Google Brain
|
6,202
|
206
|
C
|
Unknown
|
650
|
Computational science
|
6,163
|
205
|
Start
|
Top
|
651
|
Delimiter
|
6,162
|
205
|
C
|
Mid
|
652
|
Mixed reality
|
6,153
|
205
|
B
|
Unknown
|
653
|
Alonzo Church
|
6,143
|
204
|
C
|
Top
|
654
|
Comparison of programming paradigms
|
6,125
|
204
|
C
|
Low
|
655
|
Isolation forest
|
6,124
|
204
|
C
|
Low
|
656
|
Dynamic programming language
|
6,108
|
203
|
Start
|
Mid
|
657
|
Parsing expression grammar
|
6,096
|
203
|
B
|
Mid
|
658
|
Message queue
|
6,091
|
203
|
Unknown
|
Unknown
|
659
|
Syntactic sugar
|
6,058
|
201
|
C
|
Mid
|
660
|
Double-ended queue
|
6,049
|
201
|
Start
|
High
|
661
|
API testing
|
6,047
|
201
|
Unknown
|
Unknown
|
662
|
Artificial consciousness
|
6,022
|
200
|
C
|
Unknown
|
663
|
Covariance and contravariance (computer science)
|
6,013
|
200
|
Start
|
High
|
664
|
Aho–Corasick algorithm
|
6,003
|
200
|
Start
|
Mid
|
665
|
Computational complexity
|
5,991
|
199
|
C
|
Top
|
666
|
Mixin
|
5,984
|
199
|
Start
|
Low
|
667
|
Learning rate
|
5,984
|
199
|
Unknown
|
Unknown
|
668
|
Duff's device
|
5,963
|
198
|
C
|
Low
|
669
|
Data quality
|
5,962
|
198
|
Start
|
Low
|
670
|
Flyweight pattern
|
5,932
|
197
|
Start
|
Unknown
|
671
|
Boolean
|
5,926
|
197
|
Disambig
|
NA
|
672
|
Amortized analysis
|
5,904
|
196
|
Start
|
High
|
673
|
Translation studies
|
5,893
|
196
|
Start
|
Mid
|
674
|
Basic Linear Algebra Subprograms
|
5,878
|
195
|
C
|
Low
|
675
|
Profiling (computer programming)
|
5,863
|
195
|
C
|
Mid
|
676
|
Standard ML
|
5,851
|
195
|
C
|
Mid
|
677
|
Search engine indexing
|
5,840
|
194
|
C
|
Unknown
|
678
|
Coq
|
5,832
|
194
|
Start
|
Mid
|
679
|
Multi-label classification
|
5,827
|
194
|
Unknown
|
Unknown
|
680
|
Redux (JavaScript library)
|
5,822
|
194
|
Start
|
Low
|
681
|
Distributed operating system
|
5,806
|
193
|
C
|
Mid
|
682
|
Lazy evaluation
|
5,773
|
192
|
C
|
High
|
683
|
Multi-agent system
|
5,771
|
192
|
Start
|
Mid
|
684
|
Privilege escalation
|
5,748
|
191
|
Start
|
Low
|
685
|
Computer programming in the punched card era
|
5,745
|
191
|
Start
|
Mid
|
686
|
Enterprise architecture framework
|
5,705
|
190
|
Start
|
Unknown
|
687
|
CORDIC
|
5,681
|
189
|
B
|
Mid
|
688
|
Bill Joy
|
5,678
|
189
|
C
|
Unknown
|
689
|
Fixed-point combinator
|
5,676
|
189
|
C
|
Mid
|
690
|
Log-structured merge-tree
|
5,662
|
188
|
Start
|
Mid
|
691
|
Recursive descent parser
|
5,661
|
188
|
Start
|
High
|
692
|
Raft (algorithm)
|
5,639
|
187
|
C
|
Low
|
693
|
Judea Pearl
|
5,634
|
187
|
C
|
Mid
|
694
|
Leslie Lamport
|
5,630
|
187
|
Start
|
High
|
695
|
Proxy pattern
|
5,627
|
187
|
Start
|
Mid
|
696
|
Beam search
|
5,614
|
187
|
Stub
|
Unknown
|
697
|
Eugene Kaspersky
|
5,610
|
187
|
GA
|
Low
|
698
|
Time formatting and storage bugs
|
5,609
|
186
|
B
|
Low
|
699
|
Smith–Waterman algorithm
|
5,608
|
186
|
B
|
Mid
|
700
|
Computational complexity of mathematical operations
|
5,607
|
186
|
B
|
Mid
|
701
|
Computer graphics (computer science)
|
5,603
|
186
|
Start
|
Top
|
702
|
Rob Pike
|
5,595
|
186
|
Start
|
Unknown
|
703
|
Message passing
|
5,579
|
185
|
Start
|
High
|
704
|
Computational chemistry
|
5,578
|
185
|
B
|
Top
|
705
|
Vorbis
|
5,574
|
185
|
C
|
Low
|
706
|
Boltzmann machine
|
5,562
|
185
|
C
|
Low
|
707
|
Formal verification
|
5,554
|
185
|
Start
|
High
|
708
|
HyperLogLog
|
5,547
|
184
|
C
|
Unknown
|
709
|
Jaro–Winkler distance
|
5,510
|
183
|
Unknown
|
Unknown
|
710
|
Damerau–Levenshtein distance
|
5,509
|
183
|
Start
|
Low
|
711
|
Inverted index
|
5,503
|
183
|
Start
|
Mid
|
712
|
Relational database management system
|
5,501
|
183
|
NA
|
NA
|
713
|
First-class citizen
|
5,482
|
182
|
Stub
|
Low
|
714
|
Graph isomorphism
|
5,455
|
181
|
Start
|
Mid
|
715
|
Fold (higher-order function)
|
5,441
|
181
|
Start
|
Mid
|
716
|
Thread pool
|
5,412
|
180
|
Unknown
|
Unknown
|
717
|
LL parser
|
5,397
|
179
|
Start
|
High
|
718
|
8-bit color
|
5,393
|
179
|
Start
|
Low
|
719
|
Deep reinforcement learning
|
5,388
|
179
|
Stub
|
Unknown
|
720
|
State machine replication
|
5,376
|
179
|
C
|
High
|
721
|
Q (number format)
|
5,371
|
179
|
Unknown
|
Unknown
|
722
|
Online machine learning
|
5,354
|
178
|
C
|
Mid
|
723
|
Information processing
|
5,345
|
178
|
Start
|
Unknown
|
724
|
Vapnik–Chervonenkis dimension
|
5,326
|
177
|
Start
|
Mid
|
725
|
Curry–Howard correspondence
|
5,322
|
177
|
C
|
High
|
726
|
Three-valued logic
|
5,310
|
177
|
Start
|
Low
|
727
|
Tree structure
|
5,309
|
176
|
Start
|
High
|
728
|
Mock object
|
5,308
|
176
|
Start
|
Unknown
|
729
|
Algebraic data type
|
5,288
|
176
|
Start
|
Low
|
730
|
Third-generation programming language
|
5,282
|
176
|
Start
|
Mid
|
731
|
Segment tree
|
5,281
|
176
|
Unknown
|
Unknown
|
732
|
Datalog
|
5,280
|
176
|
Unknown
|
Unknown
|
733
|
Formal grammar
|
5,275
|
175
|
C
|
Mid
|
734
|
Adam D'Angelo
|
5,272
|
175
|
Start
|
Low
|
735
|
Approximation algorithm
|
5,261
|
175
|
Start
|
High
|
736
|
C string handling
|
5,258
|
175
|
C
|
Low
|
737
|
Restricted Boltzmann machine
|
5,250
|
175
|
Unknown
|
Unknown
|
738
|
LR parser
|
5,241
|
174
|
Start
|
High
|
739
|
Silvio Micali
|
5,240
|
174
|
Start
|
Unknown
|
740
|
Code injection
|
5,235
|
174
|
C
|
High
|
741
|
Computability theory
|
5,230
|
174
|
B
|
Top
|
742
|
Pattern matching
|
5,227
|
174
|
C
|
Mid
|
743
|
Clipping (computer graphics)
|
5,217
|
173
|
Start
|
Mid
|
744
|
Bridge pattern
|
5,198
|
173
|
Start
|
Low
|
745
|
Infinite loop
|
5,197
|
173
|
Start
|
Mid
|
746
|
Phong reflection model
|
5,196
|
173
|
Unknown
|
Unknown
|
747
|
External sorting
|
5,181
|
172
|
Unknown
|
Unknown
|
748
|
Splay tree
|
5,175
|
172
|
C
|
Mid
|
749
|
Don Norman
|
5,163
|
172
|
Start
|
Mid
|
750
|
BCH code
|
5,156
|
171
|
C
|
Unknown
|
751
|
Boids
|
5,156
|
171
|
Unknown
|
Unknown
|
752
|
Goto
|
5,142
|
171
|
C
|
Mid
|
753
|
Chomsky normal form
|
5,128
|
170
|
Start
|
Mid
|
754
|
Job-shop scheduling
|
5,127
|
170
|
C
|
Mid
|
755
|
Computer-integrated manufacturing
|
5,115
|
170
|
Start
|
Mid
|
756
|
Unique identifier
|
5,105
|
170
|
Start
|
Unknown
|
757
|
Kahan summation algorithm
|
5,086
|
169
|
Start
|
Unknown
|
758
|
AlphaFold
|
5,085
|
169
|
C
|
Low
|
759
|
C++23
|
5,080
|
169
|
Stub
|
Low
|
760
|
Cook–Levin theorem
|
5,079
|
169
|
B
|
High
|
761
|
Object database
|
5,068
|
168
|
Start
|
High
|
762
|
Selection algorithm
|
5,045
|
168
|
C
|
Mid
|
763
|
Optimizing compiler
|
5,037
|
167
|
Start
|
High
|
764
|
Nasir Ahmed (engineer)
|
5,033
|
167
|
Start
|
Unknown
|
765
|
Program optimization
|
5,032
|
167
|
B
|
High
|
766
|
Median of medians
|
5,023
|
167
|
C
|
Low
|
767
|
General-purpose programming language
|
5,017
|
167
|
Stub
|
Mid
|
768
|
Peterson's algorithm
|
5,009
|
166
|
C
|
Mid
|
769
|
User-centered design
|
4,992
|
166
|
Start
|
Mid
|
770
|
Factory (object-oriented programming)
|
4,971
|
165
|
C
|
Low
|
771
|
Static single assignment form
|
4,944
|
164
|
C
|
Mid
|
772
|
Marching cubes
|
4,942
|
164
|
Start
|
Mid
|
773
|
Terminal and nonterminal symbols
|
4,934
|
164
|
C
|
Mid
|
774
|
Denormal number
|
4,932
|
164
|
Unknown
|
Unknown
|
775
|
Prefix sum
|
4,928
|
164
|
Unknown
|
Unknown
|
776
|
Lowest common ancestor
|
4,925
|
164
|
Start
|
Unknown
|
777
|
Challenge–response authentication
|
4,918
|
163
|
Start
|
Low
|
778
|
Treemapping
|
4,902
|
163
|
C
|
Mid
|
779
|
Hamming weight
|
4,898
|
163
|
C
|
Unknown
|
780
|
Zero-shot learning
|
4,897
|
163
|
C
|
Unknown
|
781
|
Model of computation
|
4,897
|
163
|
Start
|
Mid
|
782
|
Sorting
|
4,896
|
163
|
Start
|
High
|
783
|
Raj Reddy
|
4,895
|
163
|
B
|
Unknown
|
784
|
Decision problem
|
4,880
|
162
|
Start
|
Mid
|
785
|
Formal methods
|
4,875
|
162
|
Start
|
Top
|
786
|
Metaprogramming
|
4,874
|
162
|
C
|
Mid
|
787
|
Nondeterministic Turing machine
|
4,842
|
161
|
C
|
High
|
788
|
Deno (software)
|
4,836
|
161
|
Start
|
Low
|
789
|
Dynamic array
|
4,830
|
161
|
C
|
Mid
|
790
|
Side effect (computer science)
|
4,824
|
160
|
C
|
Mid
|
791
|
List of fictional computers
|
4,823
|
160
|
Unknown
|
Unknown
|
792
|
Glossary of computer science
|
4,821
|
160
|
List
|
Top
|
793
|
Semantic network
|
4,820
|
160
|
Start
|
Low
|
794
|
Artificial life
|
4,813
|
160
|
B
|
High
|
795
|
Association for Computing Machinery
|
4,809
|
160
|
C
|
Top
|
796
|
Tagged union
|
4,801
|
160
|
Start
|
Low
|
797
|
Control-flow graph
|
4,800
|
160
|
C
|
Mid
|
798
|
Topological data analysis
|
4,799
|
159
|
C
|
Low
|
799
|
Null-terminated string
|
4,788
|
159
|
Start
|
Low
|
800
|
Haxe
|
4,757
|
158
|
C
|
Low
|
801
|
Timeline of quantum computing and communication
|
4,756
|
158
|
List
|
Mid
|
802
|
List (abstract data type)
|
4,754
|
158
|
Start
|
High
|
803
|
Linear code
|
4,728
|
157
|
Start
|
High
|
804
|
Jelani Nelson
|
4,727
|
157
|
C
|
Unknown
|
805
|
Algorithmic efficiency
|
4,711
|
157
|
C
|
High
|
806
|
Open-source model
|
4,704
|
156
|
C
|
Low
|
807
|
Semantics (computer science)
|
4,698
|
156
|
C
|
Top
|
808
|
Query language
|
4,688
|
156
|
Start
|
Mid
|
809
|
Operator associativity
|
4,687
|
156
|
Start
|
Unknown
|
810
|
Pumping lemma for regular languages
|
4,658
|
155
|
C
|
Low
|
811
|
Quantum machine learning
|
4,656
|
155
|
B
|
Unknown
|
812
|
Automated theorem proving
|
4,653
|
155
|
Start
|
Mid
|
813
|
DNS rebinding
|
4,644
|
154
|
Unknown
|
Unknown
|
814
|
Stylometry
|
4,641
|
154
|
C
|
Low
|
815
|
Dual linear program
|
4,639
|
154
|
Start
|
Low
|
816
|
Asynchronous I/O
|
4,638
|
154
|
C
|
Mid
|
817
|
Functional reactive programming
|
4,636
|
154
|
Start
|
Unknown
|
818
|
Interval tree
|
4,622
|
154
|
Start
|
Mid
|
819
|
Continuation-passing style
|
4,618
|
153
|
Start
|
Mid
|
820
|
Cyclic permutation
|
4,617
|
153
|
Start
|
Unknown
|
821
|
State (computer science)
|
4,616
|
153
|
Start
|
Mid
|
822
|
Operational transformation
|
4,607
|
153
|
B
|
Unknown
|
823
|
Computational neuroscience
|
4,607
|
153
|
B
|
Mid
|
824
|
Reentrancy (computing)
|
4,596
|
153
|
Start
|
Mid
|
825
|
Kai-Fu Lee
|
4,595
|
153
|
Start
|
Unknown
|
826
|
Best-first search
|
4,586
|
152
|
Stub
|
Unknown
|
827
|
Gun (cellular automaton)
|
4,579
|
152
|
Start
|
Low
|
828
|
Suffix tree
|
4,577
|
152
|
C
|
High
|
829
|
ActionScript
|
4,570
|
152
|
C
|
Low
|
830
|
A Mathematical Theory of Communication
|
4,553
|
151
|
Start
|
High
|
831
|
Computation
|
4,553
|
151
|
Start
|
Top
|
832
|
Topological insulator
|
4,552
|
151
|
Start
|
Unknown
|
833
|
Iterative deepening depth-first search
|
4,547
|
151
|
Start
|
Low
|
834
|
Longest increasing subsequence
|
4,542
|
151
|
C
|
Mid
|
835
|
LeNet
|
4,540
|
151
|
Start
|
Unknown
|
836
|
Memory segmentation
|
4,534
|
151
|
Stub
|
Mid
|
837
|
Communicating sequential processes
|
4,531
|
151
|
B
|
Top
|
838
|
Open-source license
|
4,527
|
150
|
Start
|
Unknown
|
839
|
Calling convention
|
4,524
|
150
|
Start
|
High
|
840
|
Intermediate representation
|
4,519
|
150
|
Start
|
Low
|
841
|
Process management (computing)
|
4,509
|
150
|
C
|
Low
|
842
|
Evaluation strategy
|
4,496
|
149
|
C
|
Top
|
843
|
Snippet (programming)
|
4,483
|
149
|
Start
|
Low
|
844
|
Systems programming
|
4,460
|
148
|
B
|
Top
|
845
|
Moravec's paradox
|
4,423
|
147
|
Start
|
Unknown
|
846
|
Metasyntactic variable
|
4,418
|
147
|
Unknown
|
Unknown
|
847
|
X86 memory segmentation
|
4,411
|
147
|
Start
|
Mid
|
848
|
Context-free language
|
4,387
|
146
|
Start
|
Mid
|
849
|
Double-checked locking
|
4,383
|
146
|
Unknown
|
Unknown
|
850
|
Branch (computer science)
|
4,367
|
145
|
Start
|
Mid
|
851
|
Deterministic algorithm
|
4,361
|
145
|
Start
|
High
|
852
|
Transitive closure
|
4,347
|
144
|
C
|
Low
|
853
|
Parametric design
|
4,327
|
144
|
Start
|
Unknown
|
854
|
Computational geometry
|
4,318
|
143
|
Start
|
High
|
855
|
Randomized algorithm
|
4,311
|
143
|
C
|
High
|
856
|
Active record pattern
|
4,309
|
143
|
Unknown
|
Unknown
|
857
|
Systems modeling
|
4,302
|
143
|
Start
|
Unknown
|
858
|
Andrew S. Tanenbaum
|
4,300
|
143
|
C
|
Mid
|
859
|
Pseudorandom binary sequence
|
4,297
|
143
|
Start
|
Mid
|
860
|
Object file
|
4,297
|
143
|
Start
|
Mid
|
861
|
List of computer algebra systems
|
4,289
|
142
|
List
|
Low
|
862
|
Kleene star
|
4,283
|
142
|
Start
|
High
|
863
|
Women in computing
|
4,282
|
142
|
B
|
High
|
864
|
CiteSeerX
|
4,280
|
142
|
Start
|
High
|
865
|
Starvation (computer science)
|
4,266
|
142
|
Start
|
Mid
|
866
|
3GP and 3G2
|
4,239
|
141
|
Unknown
|
Unknown
|
867
|
Delegation pattern
|
4,237
|
141
|
Start
|
Mid
|
868
|
DALL-E
|
4,233
|
141
|
B
|
Unknown
|
869
|
Blob detection
|
4,222
|
140
|
Start
|
Mid
|
870
|
Triplet loss
|
4,222
|
140
|
Stub
|
Low
|
871
|
Zachman Framework
|
4,214
|
140
|
Start
|
Unknown
|
872
|
Vendor lock-in
|
4,200
|
140
|
C
|
Mid
|
873
|
Distributed version control
|
4,194
|
139
|
Start
|
Mid
|
874
|
IEEE 754-1985
|
4,186
|
139
|
C
|
Low
|
875
|
Stream processing
|
4,183
|
139
|
C
|
Mid
|
876
|
Statement (computer science)
|
4,173
|
139
|
Start
|
Mid
|
877
|
Apache Flink
|
4,171
|
139
|
Start
|
Unknown
|
878
|
Satisfiability modulo theories
|
4,170
|
139
|
Start
|
Low
|
879
|
Immersion (virtual reality)
|
4,167
|
138
|
Start
|
Low
|
880
|
Type conversion
|
4,161
|
138
|
C
|
High
|
881
|
Video coding format
|
4,156
|
138
|
C
|
Unknown
|
882
|
Comparison of parser generators
|
4,147
|
138
|
List
|
Mid
|
883
|
Coding conventions
|
4,142
|
138
|
Unknown
|
Unknown
|
884
|
Build automation
|
4,132
|
137
|
Start
|
Low
|
885
|
Stack machine
|
4,129
|
137
|
C
|
Mid
|
886
|
Min-max heap
|
4,106
|
136
|
Start
|
Mid
|
887
|
Rule-based system
|
4,105
|
136
|
Unknown
|
Unknown
|
888
|
4,294,967,295
|
4,098
|
136
|
Stub
|
Low
|
889
|
Compilers: Principles, Techniques, and Tools
|
4,097
|
136
|
Stub
|
Low
|
890
|
Tabu search
|
4,093
|
136
|
Unknown
|
Unknown
|
891
|
Vala (programming language)
|
4,084
|
136
|
Start
|
Low
|
892
|
Quantum programming
|
4,075
|
135
|
Start
|
Mid
|
893
|
Genetic programming
|
4,073
|
135
|
B
|
Mid
|
894
|
Complexity class
|
4,063
|
135
|
C
|
High
|
895
|
Data architecture
|
4,063
|
135
|
Start
|
Mid
|
896
|
Monte Carlo algorithm
|
4,034
|
134
|
C
|
Mid
|
897
|
Zettabyte Era
|
4,030
|
134
|
B
|
Low
|
898
|
Edmonds–Karp algorithm
|
4,021
|
134
|
Start
|
Mid
|
899
|
Code.org
|
4,004
|
133
|
C
|
Low
|
900
|
Pipeline (software)
|
3,984
|
132
|
Start
|
Mid
|
901
|
Webmaster
|
3,971
|
132
|
Start
|
Low
|
902
|
DNA computing
|
3,960
|
132
|
C
|
Mid
|
903
|
Thundering herd problem
|
3,957
|
131
|
Start
|
Unknown
|
904
|
Outline of computer science
|
3,953
|
131
|
Start
|
Mid
|
905
|
Hard link
|
3,946
|
131
|
Start
|
Low
|
906
|
Software agent
|
3,945
|
131
|
Start
|
High
|
907
|
CYK algorithm
|
3,938
|
131
|
C
|
Mid
|
908
|
Hybrid log–gamma
|
3,907
|
130
|
Start
|
Low
|
909
|
Signed zero
|
3,886
|
129
|
C
|
Low
|
910
|
Array programming
|
3,880
|
129
|
C
|
Low
|
911
|
Set (abstract data type)
|
3,865
|
128
|
Start
|
High
|
912
|
Space complexity
|
3,863
|
128
|
Start
|
Unknown
|
913
|
Foreign function interface
|
3,850
|
128
|
Start
|
Low
|
914
|
De Bruijn sequence
|
3,809
|
126
|
C
|
Mid
|
915
|
Machine epsilon
|
3,802
|
126
|
Unknown
|
Unknown
|
916
|
Perfect hash function
|
3,785
|
126
|
C
|
Unknown
|
917
|
Solution architecture
|
3,781
|
126
|
Start
|
Unknown
|
918
|
Church encoding
|
3,770
|
125
|
B
|
Unknown
|
919
|
Deutsch–Jozsa algorithm
|
3,750
|
125
|
C
|
Mid
|
920
|
One-instruction set computer
|
3,740
|
124
|
Start
|
Unknown
|
921
|
Oracle machine
|
3,729
|
124
|
C
|
Mid
|
922
|
Hindley–Milner type system
|
3,729
|
124
|
B
|
High
|
923
|
Jamie Zawinski
|
3,724
|
124
|
Start
|
Low
|
924
|
Hard coding
|
3,710
|
123
|
Start
|
Low
|
925
|
Avalanche effect
|
3,708
|
123
|
Start
|
Unknown
|
926
|
Jeffrey Ullman
|
3,708
|
123
|
C
|
Mid
|
927
|
Blue-green deployment
|
3,699
|
123
|
Stub
|
Low
|
928
|
Code generation (compiler)
|
3,690
|
123
|
Start
|
Unknown
|
929
|
State space search
|
3,687
|
122
|
Unknown
|
Unknown
|
930
|
Proof assistant
|
3,684
|
122
|
Start
|
High
|
931
|
Differentiable programming
|
3,684
|
122
|
Stub
|
Unknown
|
932
|
Closest pair of points problem
|
3,669
|
122
|
Unknown
|
Unknown
|
933
|
Readers–writers problem
|
3,660
|
122
|
Start
|
Low
|
934
|
Dependent type
|
3,659
|
121
|
Start
|
High
|
935
|
Barbara Liskov
|
3,639
|
121
|
C
|
High
|
936
|
Logical shift
|
3,637
|
121
|
Unknown
|
Unknown
|
937
|
Evolutionary computation
|
3,625
|
120
|
C
|
Low
|
938
|
Wearable computer
|
3,624
|
120
|
C
|
Mid
|
939
|
Hardware virtualization
|
3,616
|
120
|
Start
|
High
|
940
|
Numerical method
|
3,613
|
120
|
Stub
|
Unknown
|
941
|
Concurrency control
|
3,611
|
120
|
C
|
Top
|
942
|
Soundex
|
3,608
|
120
|
C
|
Unknown
|
943
|
Object composition
|
3,608
|
120
|
Start
|
Low
|
944
|
Mean shift
|
3,607
|
120
|
Start
|
Mid
|
945
|
Nearest neighbour algorithm
|
3,603
|
120
|
Unknown
|
Unknown
|
946
|
Minimum-cost flow problem
|
3,571
|
119
|
Start
|
Mid
|
947
|
Continuation
|
3,570
|
119
|
C
|
High
|
948
|
Entry point
|
3,561
|
118
|
Stub
|
Mid
|
949
|
Superconducting quantum computing
|
3,557
|
118
|
Start
|
Unknown
|
950
|
Hoare logic
|
3,557
|
118
|
Start
|
Top
|
951
|
Local search (optimization)
|
3,544
|
118
|
Start
|
Mid
|
952
|
Kent Beck
|
3,540
|
118
|
Start
|
Mid
|
953
|
Runtime (program lifecycle phase)
|
3,521
|
117
|
Start
|
High
|
954
|
Garlin Gilchrist
|
3,516
|
117
|
Start
|
Low
|
955
|
Yukihiro Matsumoto
|
3,515
|
117
|
Start
|
Unknown
|
956
|
Function pointer
|
3,507
|
116
|
Start
|
Low
|
957
|
Symbol table
|
3,505
|
116
|
C
|
Low
|
958
|
Word-sense disambiguation
|
3,505
|
116
|
C
|
Mid
|
959
|
Richard Hamming
|
3,497
|
116
|
GA
|
Mid
|
960
|
Elisha Wiesel
|
3,497
|
116
|
Unknown
|
Unknown
|
961
|
Object code
|
3,478
|
115
|
Start
|
Mid
|
962
|
Niklaus Wirth
|
3,474
|
115
|
Start
|
High
|
963
|
Alfred Aho
|
3,470
|
115
|
Unknown
|
Unknown
|
964
|
Admissible heuristic
|
3,460
|
115
|
Start
|
Unknown
|
965
|
Basic feasible solution
|
3,459
|
115
|
Start
|
Mid
|
966
|
Computing Machinery and Intelligence
|
3,450
|
115
|
C
|
High
|
967
|
Comparison sort
|
3,450
|
115
|
C
|
High
|
968
|
Local outlier factor
|
3,450
|
115
|
Start
|
Low
|
969
|
Criticism of C++
|
3,445
|
114
|
C
|
Unknown
|
970
|
Handwriting recognition
|
3,440
|
114
|
C
|
Mid
|
971
|
3D reconstruction from multiple images
|
3,427
|
114
|
Unknown
|
Unknown
|
972
|
Wrapper function
|
3,404
|
113
|
Start
|
Low
|
973
|
Lazy initialization
|
3,402
|
113
|
Start
|
Low
|
974
|
Model checking
|
3,401
|
113
|
Start
|
High
|
975
|
J (programming language)
|
3,391
|
113
|
Start
|
Low
|
976
|
History of computer science
|
3,388
|
112
|
Start
|
Top
|
977
|
Augmented Lagrangian method
|
3,387
|
112
|
Start
|
Low
|
978
|
Matrix chain multiplication
|
3,382
|
112
|
Unknown
|
Unknown
|
979
|
Type safety
|
3,377
|
112
|
C
|
Mid
|
980
|
Knowledge-based systems
|
3,368
|
112
|
Start
|
Unknown
|
981
|
Busy waiting
|
3,362
|
112
|
Start
|
Low
|
982
|
Substring
|
3,358
|
111
|
Unknown
|
Unknown
|
983
|
X265
|
3,357
|
111
|
C
|
Low
|
984
|
Operator-precedence parser
|
3,356
|
111
|
C
|
Mid
|
985
|
Reference counting
|
3,350
|
111
|
C
|
Mid
|
986
|
Polynomial-time reduction
|
3,347
|
111
|
Start
|
Mid
|
987
|
Out-of-bag error
|
3,344
|
111
|
Unknown
|
Unknown
|
988
|
MinHash
|
3,339
|
111
|
C
|
Low
|
989
|
Polynomial kernel
|
3,337
|
111
|
Start
|
Mid
|
990
|
Self-modifying code
|
3,334
|
111
|
C
|
Mid
|
991
|
Timeline of machine learning
|
3,334
|
111
|
Unknown
|
Unknown
|
992
|
Java remote method invocation
|
3,329
|
110
|
Start
|
Unknown
|
993
|
Ronald Graham
|
3,316
|
110
|
Start
|
Mid
|
994
|
Bounding volume hierarchy
|
3,315
|
110
|
Unknown
|
Unknown
|
995
|
Automatic summarization
|
3,303
|
110
|
C
|
Unknown
|
996
|
Reduction (complexity)
|
3,285
|
109
|
Start
|
Low
|
997
|
Lightning Memory-Mapped Database
|
3,283
|
109
|
B
|
Unknown
|
998
|
Software rot
|
3,278
|
109
|
Unknown
|
Unknown
|
999
|
Goertzel algorithm
|
3,271
|
109
|
Start
|
Unknown
|
1000
|
Quick, Draw!
|
3,267
|
108
|
Stub
|
Low
|