Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
JavaScript
|
612,517
|
19,758
|
B
|
Mid
|
2
|
C++
|
568,522
|
18,339
|
B
|
High
|
3
|
Java (programming language)
|
453,440
|
14,627
|
C
|
Mid
|
4
|
Python (programming language)
|
315,026
|
10,162
|
GA
|
Mid
|
5
|
Artificial intelligence
|
306,157
|
9,876
|
B
|
Top
|
6
|
C (programming language)
|
275,114
|
8,874
|
B
|
High
|
7
|
Computer
|
204,759
|
6,605
|
C
|
Top
|
8
|
Operating system
|
163,240
|
5,265
|
B
|
High
|
9
|
HTML
|
152,549
|
4,920
|
B
|
Top
|
10
|
Go (programming language)
|
129,397
|
4,174
|
C
|
Low
|
11
|
Tim Berners-Lee
|
122,847
|
3,962
|
C
|
Top
|
12
|
Video game
|
113,744
|
3,669
|
B
|
Mid
|
13
|
Machine learning
|
113,264
|
3,653
|
B
|
High
|
14
|
Ajax (programming)
|
107,493
|
3,467
|
Start
|
High
|
15
|
Regular expression
|
97,464
|
3,144
|
B
|
High
|
16
|
Agile software development
|
96,495
|
3,112
|
B
|
High
|
17
|
JSON
|
96,250
|
3,104
|
B
|
Mid
|
18
|
Google Search
|
91,997
|
2,967
|
C
|
High
|
19
|
PHP
|
89,886
|
2,899
|
GA
|
Mid
|
20
|
Unix
|
88,945
|
2,869
|
B
|
Mid
|
21
|
Prisoner's dilemma
|
88,359
|
2,850
|
C
|
High
|
22
|
R (programming language)
|
87,402
|
2,819
|
C
|
Mid
|
23
|
Assembly language
|
79,292
|
2,557
|
B
|
High
|
24
|
Algorithm
|
78,509
|
2,532
|
B
|
Top
|
25
|
ECMAScript
|
77,252
|
2,492
|
C
|
Mid
|
26
|
Big O notation
|
76,343
|
2,462
|
B
|
Top
|
27
|
Computer science
|
76,072
|
2,453
|
C
|
Top
|
28
|
C Sharp (programming language)
|
75,469
|
2,434
|
B
|
Low
|
29
|
Database
|
73,448
|
2,369
|
C
|
Top
|
30
|
Conway's Game of Life
|
71,964
|
2,321
|
B
|
High
|
31
|
UTF-8
|
70,620
|
2,278
|
B
|
Mid
|
32
|
Programming paradigm
|
69,086
|
2,228
|
C
|
Mid
|
33
|
Programming language
|
67,826
|
2,187
|
B
|
Top
|
34
|
Data science
|
67,084
|
2,164
|
Start
|
High
|
35
|
Web colors
|
65,908
|
2,126
|
C
|
Mid
|
36
|
Open-source software
|
63,963
|
2,063
|
C
|
Top
|
37
|
Elixir (programming language)
|
59,455
|
1,917
|
Unknown
|
Unknown
|
38
|
Rust (programming language)
|
58,869
|
1,899
|
B
|
Mid
|
39
|
Artificial neural network
|
58,368
|
1,882
|
C
|
Mid
|
40
|
Moore's law
|
57,367
|
1,850
|
B
|
Mid
|
41
|
Deep learning
|
57,315
|
1,848
|
C
|
High
|
42
|
Katherine Johnson
|
55,126
|
1,778
|
GA
|
High
|
43
|
Information
|
53,877
|
1,737
|
C
|
Top
|
44
|
Monte Carlo method
|
53,263
|
1,718
|
B
|
High
|
45
|
Functional programming
|
52,084
|
1,680
|
B
|
Top
|
46
|
Fast inverse square root
|
51,268
|
1,653
|
GA
|
Low
|
47
|
Programmer
|
50,955
|
1,643
|
C
|
Mid
|
48
|
Binary search algorithm
|
50,853
|
1,640
|
FA
|
High
|
49
|
Millennium Prize Problems
|
50,640
|
1,633
|
C
|
Mid
|
50
|
Cryptography
|
50,513
|
1,629
|
B
|
Top
|
51
|
Model–view–controller
|
49,581
|
1,599
|
Start
|
Mid
|
52
|
W3Schools
|
49,279
|
1,589
|
Stub
|
Unknown
|
53
|
Turing machine
|
48,670
|
1,570
|
B
|
Top
|
54
|
Quicksort
|
48,572
|
1,566
|
B
|
Top
|
55
|
Erlang (programming language)
|
48,251
|
1,556
|
B
|
Mid
|
56
|
K-means clustering
|
48,082
|
1,551
|
C
|
Mid
|
57
|
Support-vector machine
|
47,935
|
1,546
|
C
|
Mid
|
58
|
Floating-point arithmetic
|
46,692
|
1,506
|
B
|
Top
|
59
|
Computer programming
|
46,633
|
1,504
|
C
|
Top
|
60
|
Software design pattern
|
46,328
|
1,494
|
C
|
High
|
61
|
Hash table
|
45,984
|
1,483
|
B
|
High
|
62
|
Bitwise operation
|
45,859
|
1,479
|
C
|
High
|
63
|
Hash function
|
45,008
|
1,451
|
C
|
High
|
64
|
Natural language processing
|
45,007
|
1,451
|
C
|
Top
|
65
|
Free and open-source software
|
44,526
|
1,436
|
C
|
Top
|
66
|
RGB color model
|
43,872
|
1,415
|
B
|
Low
|
67
|
Heuristic
|
43,602
|
1,406
|
C
|
Mid
|
68
|
P versus NP problem
|
42,786
|
1,380
|
B
|
Top
|
69
|
TypeScript
|
42,625
|
1,375
|
C
|
Low
|
70
|
Sorting algorithm
|
41,952
|
1,353
|
C
|
Top
|
71
|
Turing test
|
41,739
|
1,346
|
B
|
High
|
72
|
Virtual reality
|
41,711
|
1,345
|
C
|
Mid
|
73
|
Kernel (operating system)
|
41,613
|
1,342
|
B
|
High
|
74
|
Travelling salesman problem
|
41,369
|
1,334
|
B
|
Top
|
75
|
Scratch (programming language)
|
40,884
|
1,318
|
C
|
Low
|
76
|
Malware
|
40,326
|
1,300
|
C
|
High
|
77
|
Data structure
|
40,240
|
1,298
|
C
|
Top
|
78
|
Two's complement
|
40,186
|
1,296
|
B
|
High
|
79
|
Computer program
|
38,947
|
1,256
|
B
|
Top
|
80
|
Dynamic programming
|
38,639
|
1,246
|
B
|
Top
|
81
|
Relational database
|
38,622
|
1,245
|
C
|
Top
|
82
|
A* search algorithm
|
38,188
|
1,231
|
B
|
Mid
|
83
|
Data mining
|
37,898
|
1,222
|
B
|
High
|
84
|
Time complexity
|
37,839
|
1,220
|
B
|
High
|
85
|
Type system
|
37,680
|
1,215
|
B
|
High
|
86
|
OpenAI
|
37,676
|
1,215
|
Start
|
Low
|
87
|
Diffie–Hellman key exchange
|
37,613
|
1,213
|
C
|
Mid
|
88
|
Linked list
|
37,414
|
1,206
|
B
|
Top
|
89
|
Breadth-first search
|
37,078
|
1,196
|
Start
|
High
|
90
|
Unified Modeling Language
|
36,635
|
1,181
|
C
|
High
|
91
|
Compiler
|
36,594
|
1,180
|
C
|
Top
|
92
|
Software engineering
|
36,555
|
1,179
|
C
|
Top
|
93
|
Fortran
|
35,787
|
1,154
|
C
|
Mid
|
94
|
Cognition
|
35,759
|
1,153
|
C
|
Low
|
95
|
High Efficiency Video Coding
|
35,636
|
1,149
|
B
|
Low
|
96
|
AArch64
|
35,316
|
1,139
|
Start
|
Low
|
97
|
Merge sort
|
35,309
|
1,139
|
C
|
High
|
98
|
Binary search tree
|
35,272
|
1,137
|
C
|
High
|
99
|
NoSQL
|
35,223
|
1,136
|
C
|
Low
|
100
|
Depth-first search
|
34,713
|
1,119
|
C
|
Top
|
101
|
Vector graphics
|
34,331
|
1,107
|
Start
|
High
|
102
|
Advanced Video Coding
|
34,214
|
1,103
|
C
|
Low
|
103
|
Finite-state machine
|
33,992
|
1,096
|
B
|
Top
|
104
|
Tree (data structure)
|
33,778
|
1,089
|
C
|
High
|
105
|
Array data structure
|
33,549
|
1,082
|
C
|
Top
|
106
|
Graph theory
|
33,504
|
1,080
|
C
|
Top
|
107
|
Levenshtein distance
|
33,496
|
1,080
|
C
|
Mid
|
108
|
Boolean algebra
|
32,714
|
1,055
|
B
|
High
|
109
|
Knapsack problem
|
32,110
|
1,035
|
B
|
Mid
|
110
|
Lisp (programming language)
|
32,071
|
1,034
|
B
|
High
|
111
|
Dennis Ritchie
|
31,999
|
1,032
|
Start
|
Top
|
112
|
Linear programming
|
31,946
|
1,030
|
B
|
High
|
113
|
Data type
|
31,749
|
1,024
|
C
|
Mid
|
114
|
Bubble sort
|
31,318
|
1,010
|
B
|
High
|
115
|
Cluster analysis
|
31,106
|
1,003
|
C
|
High
|
116
|
Procedural programming
|
30,833
|
994
|
Start
|
Mid
|
117
|
Optical character recognition
|
30,067
|
969
|
C
|
Mid
|
118
|
Brainfuck
|
29,768
|
960
|
C
|
Low
|
119
|
Swift (programming language)
|
29,479
|
950
|
B
|
Mid
|
120
|
Heap (data structure)
|
29,384
|
947
|
C
|
High
|
121
|
Sieve of Eratosthenes
|
29,236
|
943
|
C
|
Mid
|
122
|
Cross-site request forgery
|
28,644
|
924
|
C
|
High
|
123
|
Stack (abstract data type)
|
28,311
|
913
|
C
|
High
|
124
|
Bioinformatics
|
28,226
|
910
|
C
|
High
|
125
|
Discrete mathematics
|
27,914
|
900
|
B
|
Top
|
126
|
Turing completeness
|
27,843
|
898
|
C
|
Top
|
127
|
Huffman coding
|
27,800
|
896
|
C
|
High
|
128
|
Imperative programming
|
27,768
|
895
|
C
|
Top
|
129
|
Directed acyclic graph
|
27,721
|
894
|
GA
|
High
|
130
|
Deep learning super sampling
|
27,661
|
892
|
C
|
Low
|
131
|
Real-time operating system
|
27,558
|
888
|
Start
|
Mid
|
132
|
De Morgan's laws
|
27,537
|
888
|
Start
|
High
|
133
|
Whitespace character
|
27,280
|
880
|
B
|
Mid
|
134
|
Exclusive or
|
27,261
|
879
|
C
|
Mid
|
135
|
Binary tree
|
27,199
|
877
|
B
|
Top
|
136
|
Lambda calculus
|
27,107
|
874
|
B
|
Top
|
137
|
NP-completeness
|
27,105
|
874
|
C
|
Top
|
138
|
Software developer
|
27,022
|
871
|
NA
|
Low
|
139
|
Genetic algorithm
|
26,944
|
869
|
C
|
High
|
140
|
Class diagram
|
26,720
|
861
|
Start
|
Low
|
141
|
Singleton pattern
|
26,712
|
861
|
C
|
Mid
|
142
|
Deadlock
|
26,704
|
861
|
C
|
High
|
143
|
High-level programming language
|
26,629
|
859
|
Start
|
High
|
144
|
Julia (programming language)
|
26,613
|
858
|
C
|
Low
|
145
|
First-order logic
|
26,550
|
856
|
B
|
High
|
146
|
B-tree
|
26,528
|
855
|
C
|
High
|
147
|
Computer engineering
|
26,523
|
855
|
C
|
Top
|
148
|
Version control
|
26,264
|
847
|
C
|
High
|
149
|
Usage share of operating systems
|
26,175
|
844
|
B
|
High
|
150
|
Stochastic gradient descent
|
26,000
|
838
|
Start
|
Mid
|
151
|
Tower of Hanoi
|
25,972
|
837
|
C
|
Mid
|
152
|
Insertion sort
|
25,890
|
835
|
B
|
High
|
153
|
Ken Thompson
|
25,727
|
829
|
B
|
Top
|
154
|
BASIC
|
25,636
|
826
|
C
|
Mid
|
155
|
Tree traversal
|
25,516
|
823
|
C
|
High
|
156
|
Computer architecture
|
25,341
|
817
|
C
|
Top
|
157
|
Halting problem
|
25,319
|
816
|
B
|
Top
|
158
|
POSIX
|
25,291
|
815
|
Start
|
Mid
|
159
|
Free software
|
25,168
|
811
|
C
|
Top
|
160
|
Computer vision
|
25,128
|
810
|
C
|
Mid
|
161
|
Scripting language
|
25,102
|
809
|
C
|
Mid
|
162
|
IEEE 754
|
25,095
|
809
|
C
|
High
|
163
|
Information theory
|
25,053
|
808
|
B
|
Top
|
164
|
Qubit
|
25,046
|
807
|
Start
|
High
|
165
|
Tf–idf
|
24,610
|
793
|
C
|
Low
|
166
|
Strong and weak typing
|
24,500
|
790
|
Start
|
Mid
|
167
|
Institute of Electrical and Electronics Engineers
|
24,331
|
784
|
B
|
Top
|
168
|
Don't repeat yourself
|
24,322
|
784
|
Start
|
Mid
|
169
|
Cybernetics
|
24,111
|
777
|
B
|
Mid
|
170
|
Thread (computing)
|
24,034
|
775
|
C
|
High
|
171
|
Trie
|
24,004
|
774
|
B
|
High
|
172
|
Ray tracing (graphics)
|
23,980
|
773
|
B
|
Mid
|
173
|
Operations research
|
23,901
|
771
|
C
|
High
|
174
|
Distributed computing
|
23,869
|
769
|
B
|
Top
|
175
|
Red–black tree
|
23,761
|
766
|
C
|
High
|
176
|
Mathematical optimization
|
23,758
|
766
|
B
|
High
|
177
|
Computer graphics
|
23,554
|
759
|
B
|
Top
|
178
|
Floor and ceiling functions
|
23,433
|
755
|
B
|
Mid
|
179
|
Dependency inversion principle
|
23,426
|
755
|
Start
|
Low
|
180
|
Software development process
|
23,371
|
753
|
C
|
Mid
|
181
|
Source code
|
23,333
|
752
|
C
|
High
|
182
|
Haskell (programming language)
|
23,206
|
748
|
B
|
Mid
|
183
|
Behavior-driven development
|
23,186
|
747
|
B
|
Low
|
184
|
Smart city
|
23,176
|
747
|
C
|
Mid
|
185
|
Topological sorting
|
23,147
|
746
|
C
|
High
|
186
|
Recursion (computer science)
|
23,110
|
745
|
C
|
Top
|
187
|
Brute-force attack
|
23,057
|
743
|
C
|
High
|
188
|
Cosine similarity
|
23,045
|
743
|
C
|
Low
|
189
|
Perl
|
22,983
|
741
|
GA
|
Mid
|
190
|
Hackathon
|
22,982
|
741
|
Start
|
Mid
|
191
|
Neural network
|
22,925
|
739
|
B
|
High
|
192
|
Quantum logic gate
|
22,582
|
728
|
Start
|
Unknown
|
193
|
HTML element
|
22,582
|
728
|
C
|
Mid
|
194
|
Pareto efficiency
|
22,575
|
728
|
C
|
Mid
|
195
|
Factory method pattern
|
22,326
|
720
|
Start
|
Mid
|
196
|
NP-hardness
|
22,247
|
717
|
C
|
High
|
197
|
Data-flow diagram
|
22,077
|
712
|
Start
|
Mid
|
198
|
Recursion
|
21,765
|
702
|
C
|
Mid
|
199
|
Autoencoder
|
21,701
|
700
|
Start
|
Unknown
|
200
|
Cyclomatic complexity
|
21,660
|
698
|
C
|
Low
|
201
|
Inheritance (object-oriented programming)
|
21,588
|
696
|
Start
|
Mid
|
202
|
Polymorphism (computer science)
|
21,547
|
695
|
C
|
High
|
203
|
Unsupervised learning
|
21,511
|
693
|
C
|
Mid
|
204
|
QBittorrent
|
21,492
|
693
|
Stub
|
Low
|
205
|
Minimum spanning tree
|
21,458
|
692
|
C
|
High
|
206
|
Semaphore (programming)
|
21,316
|
687
|
Start
|
High
|
207
|
Graph (discrete mathematics)
|
21,300
|
687
|
B
|
High
|
208
|
Greedy algorithm
|
21,174
|
683
|
C
|
High
|
209
|
Bias–variance tradeoff
|
21,128
|
681
|
Start
|
Unknown
|
210
|
Boolean satisfiability problem
|
20,655
|
666
|
C
|
Mid
|
211
|
Observer pattern
|
20,629
|
665
|
Start
|
Mid
|
212
|
HackerRank
|
20,288
|
654
|
Start
|
Unknown
|
213
|
AVL tree
|
20,241
|
652
|
C
|
High
|
214
|
Data model
|
20,182
|
651
|
C
|
High
|
215
|
Race condition
|
20,115
|
648
|
C
|
Mid
|
216
|
Liskov substitution principle
|
20,088
|
648
|
Start
|
Mid
|
217
|
Integer (computer science)
|
20,010
|
645
|
C
|
Mid
|
218
|
Jaccard index
|
19,983
|
644
|
C
|
Mid
|
219
|
Priority queue
|
19,833
|
639
|
C
|
High
|
220
|
Activation function
|
19,745
|
636
|
Start
|
Mid
|
221
|
Continuous integration
|
19,690
|
635
|
B
|
Low
|
222
|
Parsing
|
19,687
|
635
|
Start
|
Top
|
223
|
Shortest path problem
|
19,636
|
633
|
C
|
High
|
224
|
String (computer science)
|
19,635
|
633
|
Start
|
High
|
225
|
Boolean data type
|
19,605
|
632
|
Start
|
Low
|
226
|
Claude Shannon
|
19,034
|
614
|
B
|
High
|
227
|
Inversion of control
|
18,914
|
610
|
Start
|
Low
|
228
|
Cache replacement policies
|
18,883
|
609
|
C
|
Mid
|
229
|
Deep Blue (chess computer)
|
18,825
|
607
|
C
|
Mid
|
230
|
History of Python
|
18,800
|
606
|
C
|
Low
|
231
|
BERT (language model)
|
18,795
|
606
|
Start
|
Unknown
|
232
|
Human–computer interaction
|
18,728
|
604
|
C
|
Top
|
233
|
AV1
|
18,711
|
603
|
B
|
Low
|
234
|
Computer science and engineering
|
18,581
|
599
|
Start
|
Low
|
235
|
Garbage collection (computer science)
|
18,493
|
596
|
C
|
High
|
236
|
Naming convention (programming)
|
18,490
|
596
|
Start
|
Unknown
|
237
|
Magic number (programming)
|
18,430
|
594
|
C
|
Mid
|
238
|
Software engineer
|
18,380
|
592
|
Start
|
Mid
|
239
|
Markup language
|
18,250
|
588
|
C
|
High
|
240
|
Abstraction (computer science)
|
18,218
|
587
|
Start
|
Top
|
241
|
Selection sort
|
18,058
|
582
|
C
|
High
|
242
|
Multiple inheritance
|
17,952
|
579
|
C
|
Mid
|
243
|
Foobar
|
17,932
|
578
|
C
|
Mid
|
244
|
Intrusion detection system
|
17,927
|
578
|
Start
|
Low
|
245
|
Abstraction
|
17,817
|
574
|
Start
|
High
|
246
|
Pointer (computer programming)
|
17,747
|
572
|
C
|
High
|
247
|
Automata theory
|
17,704
|
571
|
C
|
Top
|
248
|
Maximum subarray problem
|
17,679
|
570
|
Unknown
|
Unknown
|
249
|
Computing
|
17,634
|
568
|
C
|
High
|
250
|
Expert system
|
17,603
|
567
|
Start
|
Mid
|
251
|
Donald Knuth
|
17,593
|
567
|
B
|
Top
|
252
|
Markov chain Monte Carlo
|
17,578
|
567
|
C
|
High
|
253
|
Declarative programming
|
17,475
|
563
|
C
|
Top
|
254
|
Avast Antivirus
|
17,458
|
563
|
Start
|
Mid
|
255
|
Queue (abstract data type)
|
17,371
|
560
|
Start
|
Top
|
256
|
Context-free grammar
|
17,341
|
559
|
B
|
Top
|
257
|
AlphaGo
|
17,336
|
559
|
C
|
High
|
258
|
Ontology (information science)
|
17,317
|
558
|
C
|
High
|
259
|
Cellular automaton
|
17,203
|
554
|
B
|
Top
|
260
|
Computational fluid dynamics
|
17,194
|
554
|
B
|
High
|
261
|
Prim's algorithm
|
17,171
|
553
|
C
|
High
|
262
|
Heapsort
|
17,160
|
553
|
B
|
High
|
263
|
Adjacency matrix
|
17,107
|
551
|
C
|
Mid
|
264
|
Structured programming
|
17,060
|
550
|
Start
|
Mid
|
265
|
Process (computing)
|
17,052
|
550
|
C
|
Mid
|
266
|
Scaled agile framework
|
17,042
|
549
|
C
|
Low
|
267
|
Expectation–maximization algorithm
|
16,986
|
547
|
C
|
High
|
268
|
Binary heap
|
16,946
|
546
|
B
|
High
|
269
|
Disjoint-set data structure
|
16,801
|
541
|
C
|
High
|
270
|
Hierarchical clustering
|
16,790
|
541
|
C
|
Mid
|
271
|
Floyd–Warshall algorithm
|
16,711
|
539
|
B
|
High
|
272
|
Class (computer programming)
|
16,640
|
536
|
Start
|
High
|
273
|
POST (HTTP)
|
16,615
|
535
|
Start
|
Low
|
274
|
Pseudocode
|
16,604
|
535
|
C
|
High
|
275
|
Code
|
16,557
|
534
|
C
|
High
|
276
|
Internet Engineering Task Force
|
16,445
|
530
|
C
|
Mid
|
277
|
Data visualization
|
16,376
|
528
|
C
|
High
|
278
|
ISO/IEC 8859-1
|
16,179
|
521
|
Start
|
Unknown
|
279
|
Error detection and correction
|
16,129
|
520
|
C
|
Unknown
|
280
|
Checksum
|
16,078
|
518
|
Start
|
Mid
|
281
|
Automaton
|
16,071
|
518
|
C
|
High
|
282
|
DBSCAN
|
16,046
|
517
|
C
|
Mid
|
283
|
Kruskal's algorithm
|
15,996
|
516
|
Start
|
High
|
284
|
Numerical analysis
|
15,965
|
515
|
B
|
Top
|
285
|
Ada (programming language)
|
15,904
|
513
|
Unknown
|
Unknown
|
286
|
For loop
|
15,880
|
512
|
B
|
High
|
287
|
Macro (computer science)
|
15,852
|
511
|
C
|
Mid
|
288
|
Pseudorandom number generator
|
15,821
|
510
|
C
|
High
|
289
|
Cognitive science
|
15,811
|
510
|
C
|
High
|
290
|
Hamming distance
|
15,708
|
506
|
Start
|
High
|
291
|
Color depth
|
15,654
|
504
|
C
|
Low
|
292
|
HTTP Live Streaming
|
15,632
|
504
|
Start
|
Low
|
293
|
Best, worst and average case
|
15,527
|
500
|
Start
|
High
|
294
|
Strategy pattern
|
15,470
|
499
|
Start
|
Mid
|
295
|
Avast
|
15,449
|
498
|
B
|
Mid
|
296
|
Prolog
|
15,434
|
497
|
B
|
Mid
|
297
|
Rounding
|
15,332
|
494
|
B
|
Low
|
298
|
Heuristic (computer science)
|
15,327
|
494
|
Unknown
|
Unknown
|
299
|
Complex system
|
15,284
|
493
|
C
|
High
|
300
|
Role-based access control
|
15,273
|
492
|
C
|
Mid
|
301
|
Ensemble learning
|
15,265
|
492
|
C
|
Mid
|
302
|
Raster graphics
|
15,260
|
492
|
Start
|
Mid
|
303
|
Rendering (computer graphics)
|
15,221
|
491
|
B
|
High
|
304
|
Abstract data type
|
15,141
|
488
|
C
|
High
|
305
|
Edsger W. Dijkstra
|
15,141
|
488
|
B
|
High
|
306
|
K-d tree
|
15,125
|
487
|
C
|
Low
|
307
|
Builder pattern
|
15,113
|
487
|
Start
|
Unknown
|
308
|
Turing Award
|
15,004
|
484
|
Start
|
Top
|
309
|
Sparse matrix
|
14,995
|
483
|
C
|
Mid
|
310
|
Interface (computing)
|
14,991
|
483
|
C
|
Low
|
311
|
Lossless compression
|
14,952
|
482
|
C
|
High
|
312
|
Bjarne Stroustrup
|
14,879
|
479
|
Start
|
High
|
313
|
Tensor Processing Unit
|
14,694
|
474
|
C
|
Mid
|
314
|
Composition over inheritance
|
14,692
|
473
|
C
|
Low
|
315
|
Applications of artificial intelligence
|
14,670
|
473
|
C
|
Low
|
316
|
Subroutine
|
14,556
|
469
|
C
|
Top
|
317
|
Vint Cerf
|
14,497
|
467
|
Start
|
Mid
|
318
|
Hamming code
|
14,461
|
466
|
C
|
High
|
319
|
Category theory
|
14,437
|
465
|
B
|
High
|
320
|
Variable (computer science)
|
14,386
|
464
|
Start
|
Top
|
321
|
Amdahl's law
|
14,380
|
463
|
C
|
High
|
322
|
Routing
|
14,360
|
463
|
C
|
Mid
|
323
|
Multiplication sign
|
14,356
|
463
|
C
|
Low
|
324
|
Mersenne Twister
|
14,305
|
461
|
Unknown
|
Unknown
|
325
|
Business Process Model and Notation
|
14,235
|
459
|
Start
|
Mid
|
326
|
Coupling (computer programming)
|
14,206
|
458
|
Start
|
High
|
327
|
Bresenham's line algorithm
|
14,194
|
457
|
C
|
Mid
|
328
|
Event-driven programming
|
14,067
|
453
|
Start
|
High
|
329
|
NP (complexity)
|
14,063
|
453
|
C
|
High
|
330
|
Decorator pattern
|
14,018
|
452
|
Start
|
Low
|
331
|
Relational model
|
13,997
|
451
|
C
|
Top
|
332
|
Reed–Solomon error correction
|
13,896
|
448
|
C
|
Mid
|
333
|
Watson (computer)
|
13,885
|
447
|
GA
|
Mid
|
334
|
Data modeling
|
13,863
|
447
|
C
|
High
|
335
|
Memetics
|
13,793
|
444
|
Start
|
Unknown
|
336
|
Particle swarm optimization
|
13,742
|
443
|
C
|
Mid
|
337
|
Memory management
|
13,727
|
442
|
C
|
High
|
338
|
Primality test
|
13,656
|
440
|
Start
|
Mid
|
339
|
Exception handling
|
13,654
|
440
|
B
|
Mid
|
340
|
Object (computer science)
|
13,536
|
436
|
Start
|
High
|
341
|
Lexical analysis
|
13,500
|
435
|
C
|
High
|
342
|
Graph coloring
|
13,416
|
432
|
B
|
Mid
|
343
|
The Art of Computer Programming
|
13,394
|
432
|
C
|
Top
|
344
|
List of tools for static code analysis
|
13,385
|
431
|
List
|
Low
|
345
|
Formal language
|
13,269
|
428
|
C
|
High
|
346
|
Cut, copy, and paste
|
13,261
|
427
|
C
|
High
|
347
|
Simplex algorithm
|
13,165
|
424
|
C
|
High
|
348
|
Password cracking
|
13,110
|
422
|
C
|
Low
|
349
|
Memory hierarchy
|
12,986
|
418
|
Start
|
Mid
|
350
|
Robert C. Martin
|
12,948
|
417
|
Start
|
Mid
|
351
|
Signal processing
|
12,932
|
417
|
C
|
Low
|
352
|
Code smell
|
12,845
|
414
|
C
|
Low
|
353
|
Visitor pattern
|
12,833
|
413
|
Start
|
Unknown
|
354
|
Alice and Bob
|
12,790
|
412
|
Start
|
Low
|
355
|
Numerical integration
|
12,742
|
411
|
B
|
Mid
|
356
|
Directed graph
|
12,710
|
410
|
C
|
High
|
357
|
Residual neural network
|
12,701
|
409
|
Start
|
Low
|
358
|
Generic programming
|
12,662
|
408
|
C
|
High
|
359
|
Hungarian notation
|
12,539
|
404
|
Start
|
Low
|
360
|
Luis von Ahn
|
12,530
|
404
|
Start
|
Unknown
|
361
|
Longest common subsequence problem
|
12,477
|
402
|
Start
|
High
|
362
|
Smalltalk
|
12,404
|
400
|
Start
|
Mid
|
363
|
Control flow
|
12,390
|
399
|
B
|
Top
|
364
|
Actor model
|
12,380
|
399
|
C
|
Mid
|
365
|
Radix sort
|
12,341
|
398
|
Start
|
High
|
366
|
Longest palindromic substring
|
12,309
|
397
|
C
|
Low
|
367
|
Computational complexity theory
|
12,290
|
396
|
C
|
Top
|
368
|
Deterministic finite automaton
|
12,173
|
392
|
Start
|
High
|
369
|
Voxel
|
12,152
|
392
|
C
|
Mid
|
370
|
Shift register
|
12,093
|
390
|
Start
|
Unknown
|
371
|
Digital Revolution
|
12,045
|
388
|
Start
|
Mid
|
372
|
Marvin Minsky
|
12,006
|
387
|
C
|
Unknown
|
373
|
Closure (computer programming)
|
11,949
|
385
|
C
|
Mid
|
374
|
Web API
|
11,926
|
384
|
Unknown
|
Unknown
|
375
|
Anonymous function
|
11,907
|
384
|
C
|
Mid
|
376
|
Aspect-oriented programming
|
11,906
|
384
|
Start
|
Mid
|
377
|
Word (computer architecture)
|
11,841
|
381
|
C
|
Mid
|
378
|
Shannon–Hartley theorem
|
11,799
|
380
|
C
|
High
|
379
|
List of datasets for machine-learning research
|
11,762
|
379
|
List
|
Mid
|
380
|
Relational algebra
|
11,707
|
377
|
C
|
Mid
|
381
|
B+ tree
|
11,686
|
376
|
Start
|
High
|
382
|
Esoteric programming language
|
11,634
|
375
|
Start
|
Unknown
|
383
|
Branch and bound
|
11,552
|
372
|
Start
|
Mid
|
384
|
List of data structures
|
11,551
|
372
|
List
|
High
|
385
|
Division algorithm
|
11,471
|
370
|
C
|
High
|
386
|
Ladder logic
|
11,431
|
368
|
Start
|
Low
|
387
|
D (programming language)
|
11,430
|
368
|
C
|
Low
|
388
|
Adapter pattern
|
11,413
|
368
|
Start
|
Unknown
|
389
|
Mean time between failures
|
11,399
|
367
|
Start
|
Low
|
390
|
Conditional (computer programming)
|
11,387
|
367
|
C
|
Mid
|
391
|
Row- and column-major order
|
11,241
|
362
|
C
|
Mid
|
392
|
Canny edge detector
|
11,240
|
362
|
Start
|
Mid
|
393
|
Timsort
|
11,143
|
359
|
C
|
Mid
|
394
|
Nim
|
11,121
|
358
|
C
|
Unknown
|
395
|
Federated learning
|
11,037
|
356
|
Start
|
Low
|
396
|
ABAP
|
10,996
|
354
|
C
|
Low
|
397
|
Linear search
|
10,955
|
353
|
Start
|
Mid
|
398
|
Ackermann function
|
10,911
|
351
|
B
|
Mid
|
399
|
Coroutine
|
10,902
|
351
|
C
|
Mid
|
400
|
Knuth–Morris–Pratt algorithm
|
10,900
|
351
|
Start
|
High
|
401
|
Subset sum problem
|
10,880
|
350
|
C
|
Low
|
402
|
AWK
|
10,877
|
350
|
B
|
Mid
|
403
|
Identity management
|
10,867
|
350
|
C
|
Unknown
|
404
|
Call stack
|
10,849
|
349
|
C
|
Mid
|
405
|
Logo (programming language)
|
10,765
|
347
|
C
|
Mid
|
406
|
Urs Hölzle
|
10,740
|
346
|
Start
|
Unknown
|
407
|
Geoffrey Hinton
|
10,726
|
346
|
C
|
Low
|
408
|
Rob Pike
|
10,714
|
345
|
Start
|
Unknown
|
409
|
Sankey diagram
|
10,696
|
345
|
C
|
Low
|
410
|
Linear congruential generator
|
10,690
|
344
|
Start
|
Mid
|
411
|
C++ classes
|
10,680
|
344
|
C
|
Low
|
412
|
Command pattern
|
10,669
|
344
|
Start
|
Mid
|
413
|
Triple DES
|
10,657
|
343
|
Start
|
Unknown
|
414
|
Anomaly detection
|
10,619
|
342
|
Start
|
Mid
|
415
|
Object-oriented analysis and design
|
10,607
|
342
|
Start
|
High
|
416
|
Chomsky hierarchy
|
10,595
|
341
|
Start
|
Top
|
417
|
Anti-pattern
|
10,567
|
340
|
C
|
Mid
|
418
|
Decision theory
|
10,508
|
338
|
C
|
High
|
419
|
Concurrent computing
|
10,506
|
338
|
C
|
High
|
420
|
Intelligent agent
|
10,499
|
338
|
Unknown
|
Unknown
|
421
|
Named-entity recognition
|
10,399
|
335
|
C
|
Unknown
|
422
|
State diagram
|
10,384
|
334
|
C
|
Mid
|
423
|
Do while loop
|
10,379
|
334
|
Unknown
|
Unknown
|
424
|
Real-time computing
|
10,352
|
333
|
C
|
High
|
425
|
Lossy compression
|
10,240
|
330
|
Start
|
High
|
426
|
Conflict-free replicated data type
|
10,164
|
327
|
C
|
High
|
427
|
Procedural generation
|
10,089
|
325
|
Start
|
Unknown
|
428
|
Planar graph
|
10,048
|
324
|
B
|
Mid
|
429
|
The Open Group Architecture Framework
|
10,035
|
323
|
Start
|
High
|
430
|
Ubiquitous computing
|
9,978
|
321
|
C
|
High
|
431
|
Circular buffer
|
9,975
|
321
|
Start
|
Mid
|
432
|
Web developer
|
9,947
|
320
|
Start
|
Mid
|
433
|
Function overloading
|
9,939
|
320
|
Unknown
|
Unknown
|
434
|
Ben Horowitz
|
9,907
|
319
|
Start
|
Low
|
435
|
Reactive programming
|
9,902
|
319
|
Start
|
Unknown
|
436
|
VP9
|
9,900
|
319
|
C
|
Low
|
437
|
List of pioneers in computer science
|
9,861
|
318
|
List
|
Unknown
|
438
|
Sudoku solving algorithms
|
9,843
|
317
|
B
|
Low
|
439
|
APL (programming language)
|
9,842
|
317
|
B
|
Mid
|
440
|
Fragmentation (computing)
|
9,828
|
317
|
C
|
Mid
|
441
|
Hyper-threading
|
9,793
|
315
|
C
|
Low
|
442
|
Binary file
|
9,788
|
315
|
C
|
High
|
443
|
Ones' complement
|
9,746
|
314
|
Start
|
Mid
|
444
|
Monte Carlo tree search
|
9,718
|
313
|
C
|
Mid
|
445
|
Units of information
|
9,718
|
313
|
C
|
Mid
|
446
|
Fourth-generation programming language
|
9,703
|
313
|
Start
|
Mid
|
447
|
Consistent hashing
|
9,684
|
312
|
Stub
|
Unknown
|
448
|
Code coverage
|
9,634
|
310
|
C
|
Low
|
449
|
Static program analysis
|
9,583
|
309
|
C
|
Mid
|
450
|
Cycle detection
|
9,561
|
308
|
B
|
Low
|
451
|
Signed number representations
|
9,516
|
306
|
C
|
High
|
452
|
Hazard (computer architecture)
|
9,475
|
305
|
C
|
Low
|
453
|
Check digit
|
9,452
|
304
|
Start
|
Mid
|
454
|
Colossus computer
|
9,449
|
304
|
B
|
Mid
|
455
|
Existential risk from artificial general intelligence
|
9,398
|
303
|
C
|
Mid
|
456
|
Memory leak
|
9,379
|
302
|
C
|
Mid
|
457
|
Extended ASCII
|
9,333
|
301
|
C
|
Low
|
458
|
Artbreeder
|
9,310
|
300
|
Start
|
Low
|
459
|
Adam D'Angelo
|
9,279
|
299
|
Start
|
Low
|
460
|
Email spoofing
|
9,269
|
299
|
Start
|
Low
|
461
|
Skip list
|
9,213
|
297
|
C
|
Mid
|
462
|
Open-source license
|
9,193
|
296
|
Start
|
Unknown
|
463
|
Self-balancing binary search tree
|
9,176
|
296
|
Start
|
Mid
|
464
|
Edge detection
|
9,174
|
295
|
C
|
Mid
|
465
|
Scope (computer science)
|
9,132
|
294
|
C
|
High
|
466
|
GPT-2
|
9,120
|
294
|
B
|
Low
|
467
|
Test case
|
9,111
|
293
|
Start
|
Unknown
|
468
|
8-bit computing
|
9,096
|
293
|
Start
|
High
|
469
|
Operator overloading
|
9,095
|
293
|
C
|
Mid
|
470
|
Thrashing (computer science)
|
9,080
|
292
|
C
|
Low
|
471
|
Feature selection
|
9,074
|
292
|
C
|
Mid
|
472
|
Two-phase commit protocol
|
9,072
|
292
|
C
|
High
|
473
|
David Cheriton
|
9,033
|
291
|
Start
|
Mid
|
474
|
Type theory
|
9,028
|
291
|
C
|
High
|
475
|
Data (computing)
|
9,024
|
291
|
C
|
Top
|
476
|
Grover's algorithm
|
9,020
|
290
|
C
|
Mid
|
477
|
List of unsolved problems in computer science
|
9,018
|
290
|
List
|
Mid
|
478
|
Coding theory
|
8,971
|
289
|
C
|
High
|
479
|
Microkernel
|
8,959
|
289
|
C
|
High
|
480
|
Apriori algorithm
|
8,949
|
288
|
C
|
Mid
|
481
|
Logic programming
|
8,929
|
288
|
B
|
Top
|
482
|
Pushdown automaton
|
8,913
|
287
|
B
|
High
|
483
|
Cohesion (computer science)
|
8,906
|
287
|
Unknown
|
Unknown
|
484
|
Paxos (computer science)
|
8,882
|
286
|
C
|
Low
|
485
|
Redux (JavaScript library)
|
8,861
|
285
|
Start
|
Low
|
486
|
Run-length encoding
|
8,840
|
285
|
Start
|
Mid
|
487
|
Analysis of algorithms
|
8,834
|
284
|
C
|
Top
|
488
|
DeepDream
|
8,829
|
284
|
Start
|
Low
|
489
|
Ant colony optimization algorithms
|
8,825
|
284
|
B
|
Low
|
490
|
Code page 437
|
8,811
|
284
|
C
|
Low
|
491
|
User error
|
8,775
|
283
|
Start
|
High
|
492
|
Imo.im
|
8,753
|
282
|
Stub
|
Low
|
493
|
Associative array
|
8,735
|
281
|
C
|
High
|
494
|
Information science
|
8,720
|
281
|
Start
|
Top
|
495
|
Theory of computation
|
8,705
|
280
|
C
|
Top
|
496
|
Database model
|
8,703
|
280
|
C
|
Top
|
497
|
Linker (computing)
|
8,691
|
280
|
C
|
Mid
|
498
|
Sørensen–Dice coefficient
|
8,660
|
279
|
Start
|
Unknown
|
499
|
Longest common substring problem
|
8,632
|
278
|
Start
|
Mid
|
500
|
Search algorithm
|
8,614
|
277
|
Start
|
Top
|
501
|
Kolmogorov complexity
|
8,594
|
277
|
B
|
High
|
502
|
Dining philosophers problem
|
8,575
|
276
|
Start
|
Top
|
503
|
Doubly linked list
|
8,544
|
275
|
Start
|
High
|
504
|
Constraint satisfaction problem
|
8,522
|
274
|
C
|
Mid
|
505
|
Mutual exclusion
|
8,486
|
273
|
C
|
Top
|
506
|
Database design
|
8,485
|
273
|
C
|
High
|
507
|
Currying
|
8,461
|
272
|
C
|
High
|
508
|
Brute-force search
|
8,460
|
272
|
Start
|
Mid
|
509
|
Maze generation algorithm
|
8,437
|
272
|
Start
|
Unknown
|
510
|
Information hiding
|
8,414
|
271
|
Start
|
Mid
|
511
|
Computer scientist
|
8,355
|
269
|
Start
|
Top
|
512
|
Spaghetti code
|
8,349
|
269
|
Start
|
Mid
|
513
|
Enterprise architecture
|
8,284
|
267
|
Start
|
Mid
|
514
|
Theoretical computer science
|
8,281
|
267
|
B
|
Top
|
515
|
Abstract factory pattern
|
8,218
|
265
|
Start
|
Mid
|
516
|
API testing
|
8,172
|
263
|
Unknown
|
Unknown
|
517
|
JSONP
|
8,134
|
262
|
Start
|
Low
|
518
|
Combinatorial optimization
|
8,127
|
262
|
C
|
Top
|
519
|
Data structure alignment
|
8,123
|
262
|
Start
|
Mid
|
520
|
Tony Hoare
|
8,118
|
261
|
C
|
High
|
521
|
Swarm intelligence
|
8,110
|
261
|
C
|
Mid
|
522
|
Inverter (logic gate)
|
8,083
|
260
|
Start
|
Unknown
|
523
|
Multiplication algorithm
|
8,053
|
259
|
C
|
Low
|
524
|
Data governance
|
8,049
|
259
|
C
|
Unknown
|
525
|
Branch predictor
|
8,037
|
259
|
C
|
Mid
|
526
|
Church–Turing thesis
|
7,915
|
255
|
C
|
Top
|
527
|
Relational operator
|
7,902
|
254
|
C
|
Mid
|
528
|
Computer performance
|
7,901
|
254
|
Start
|
Mid
|
529
|
String-searching algorithm
|
7,890
|
254
|
Start
|
High
|
530
|
Demand paging
|
7,881
|
254
|
Start
|
Mid
|
531
|
Cell (microprocessor)
|
7,877
|
254
|
B
|
Mid
|
532
|
Comparison of integrated development environments
|
7,846
|
253
|
Start
|
Low
|
533
|
Bogosort
|
7,836
|
252
|
Start
|
Low
|
534
|
Root-finding algorithms
|
7,833
|
252
|
Unknown
|
Unknown
|
535
|
Sandbox (software development)
|
7,824
|
252
|
Start
|
Low
|
536
|
Data access object
|
7,797
|
251
|
Start
|
Unknown
|
537
|
Agent-based model
|
7,764
|
250
|
C
|
Mid
|
538
|
Double-ended queue
|
7,746
|
249
|
Start
|
High
|
539
|
Evolutionary algorithm
|
7,735
|
249
|
C
|
Mid
|
540
|
Multiclass classification
|
7,708
|
248
|
Start
|
Mid
|
541
|
Computational biology
|
7,703
|
248
|
C
|
High
|
542
|
Universal Turing machine
|
7,700
|
248
|
C
|
Mid
|
543
|
16K resolution
|
7,672
|
247
|
Start
|
Unknown
|
544
|
JPEG 2000
|
7,651
|
246
|
C
|
Low
|
545
|
Counting sort
|
7,625
|
245
|
C
|
High
|
546
|
Higher-order function
|
7,621
|
245
|
Start
|
High
|
547
|
EBCDIC
|
7,586
|
244
|
Start
|
Mid
|
548
|
Squeak
|
7,555
|
243
|
B
|
Mid
|
549
|
Shunting-yard algorithm
|
7,553
|
243
|
Unknown
|
Unknown
|
550
|
JavaScript engine
|
7,538
|
243
|
C
|
Mid
|
551
|
Array programming
|
7,521
|
242
|
C
|
Low
|
552
|
Opcode
|
7,466
|
240
|
C
|
High
|
553
|
Tail call
|
7,449
|
240
|
C
|
Mid
|
554
|
Nondeterministic finite automaton
|
7,362
|
237
|
B
|
High
|
555
|
Web (programming system)
|
7,357
|
237
|
Stub
|
Mid
|
556
|
Pointing stick
|
7,332
|
236
|
C
|
Low
|
557
|
Informatics
|
7,331
|
236
|
C
|
Mid
|
558
|
Nonlinear programming
|
7,248
|
233
|
C
|
Mid
|
559
|
Privilege escalation
|
7,227
|
233
|
Start
|
Low
|
560
|
Vehicle routing problem
|
7,217
|
232
|
Unknown
|
Unknown
|
561
|
Edit distance
|
7,214
|
232
|
C
|
Mid
|
562
|
Concurrency (computer science)
|
7,205
|
232
|
Start
|
Top
|
563
|
First-class function
|
7,201
|
232
|
C
|
High
|
564
|
Computational linguistics
|
7,185
|
231
|
Start
|
High
|
565
|
Component (graph theory)
|
7,176
|
231
|
Start
|
Mid
|
566
|
Program optimization
|
7,156
|
230
|
B
|
High
|
567
|
Synchronization (computer science)
|
7,149
|
230
|
Unknown
|
Unknown
|
568
|
Attribute-based access control
|
7,137
|
230
|
Unknown
|
Unknown
|
569
|
Composite pattern
|
7,121
|
229
|
Start
|
Unknown
|
570
|
R-tree
|
7,103
|
229
|
C
|
Mid
|
571
|
Text mining
|
7,098
|
228
|
Start
|
Unknown
|
572
|
Eugene Kaspersky
|
7,097
|
228
|
GA
|
Low
|
573
|
Extended Backus–Naur form
|
7,084
|
228
|
C
|
Mid
|
574
|
Process management (computing)
|
7,076
|
228
|
C
|
Low
|
575
|
Approximate string matching
|
7,069
|
228
|
C
|
Mid
|
576
|
Judea Pearl
|
7,066
|
227
|
C
|
Mid
|
577
|
Information management
|
7,053
|
227
|
C
|
Unknown
|
578
|
GrabCAD
|
7,038
|
227
|
Unknown
|
Unknown
|
579
|
Andrey Kolmogorov
|
7,035
|
226
|
C
|
High
|
580
|
Artificial consciousness
|
7,011
|
226
|
C
|
Unknown
|
581
|
Shellsort
|
7,008
|
226
|
B
|
High
|
582
|
Thomas Knoll
|
7,000
|
225
|
Unknown
|
Unknown
|
583
|
Metaheuristic
|
6,999
|
225
|
Start
|
Mid
|
584
|
Identifier
|
6,987
|
225
|
Start
|
Low
|
585
|
Radix tree
|
6,987
|
225
|
C
|
Mid
|
586
|
Async/await
|
6,974
|
224
|
C
|
Mid
|
587
|
Cargo cult programming
|
6,969
|
224
|
Start
|
Low
|
588
|
Lempel–Ziv–Welch
|
6,964
|
224
|
C
|
Unknown
|
589
|
Amortized analysis
|
6,957
|
224
|
Start
|
High
|
590
|
Snippet (programming)
|
6,949
|
224
|
Start
|
Low
|
591
|
Code.org
|
6,946
|
224
|
C
|
Low
|
592
|
Maze-solving algorithm
|
6,931
|
223
|
Unknown
|
Unknown
|
593
|
Smartglasses
|
6,931
|
223
|
C
|
Low
|
594
|
Quantum key distribution
|
6,906
|
222
|
B
|
Mid
|
595
|
Quickselect
|
6,894
|
222
|
C
|
Low
|
596
|
Bill Joy
|
6,888
|
222
|
C
|
Unknown
|
597
|
Loose coupling
|
6,886
|
222
|
Start
|
High
|
598
|
Legacy system
|
6,866
|
221
|
C
|
Unknown
|
599
|
Short-circuit evaluation
|
6,810
|
219
|
Start
|
Mid
|
600
|
Knowledge graph
|
6,796
|
219
|
Start
|
High
|
601
|
Curiously recurring template pattern
|
6,775
|
218
|
C
|
Low
|
602
|
Adjacency list
|
6,747
|
217
|
C
|
Mid
|
603
|
Petri net
|
6,746
|
217
|
B
|
Mid
|
604
|
Profiling (computer programming)
|
6,742
|
217
|
C
|
Mid
|
605
|
Gradle
|
6,729
|
217
|
C
|
Low
|
606
|
Attention (machine learning)
|
6,721
|
216
|
Stub
|
Unknown
|
607
|
ALGOL
|
6,674
|
215
|
C
|
High
|
608
|
Distributed operating system
|
6,654
|
214
|
C
|
Mid
|
609
|
MurmurHash
|
6,652
|
214
|
Start
|
Low
|
610
|
C99
|
6,644
|
214
|
C
|
Mid
|
611
|
Time formatting and storage bugs
|
6,637
|
214
|
B
|
Low
|
612
|
ActionScript
|
6,631
|
213
|
C
|
Low
|
613
|
Quick, Draw!
|
6,628
|
213
|
Stub
|
Low
|
614
|
L-system
|
6,612
|
213
|
Unknown
|
Unknown
|
615
|
Model–view–presenter
|
6,612
|
213
|
C
|
High
|
616
|
Digital data
|
6,612
|
213
|
C
|
Low
|
617
|
Bucket sort
|
6,584
|
212
|
C
|
High
|
618
|
Google Brain
|
6,498
|
209
|
C
|
Unknown
|
619
|
Fluent interface
|
6,497
|
209
|
Stub
|
Unknown
|
620
|
Leslie Lamport
|
6,454
|
208
|
Start
|
High
|
621
|
Online machine learning
|
6,454
|
208
|
C
|
Mid
|
622
|
Computer graphics (computer science)
|
6,449
|
208
|
Start
|
Top
|
623
|
Women and video games
|
6,444
|
207
|
B
|
Mid
|
624
|
Message queue
|
6,424
|
207
|
Unknown
|
Unknown
|
625
|
Common Lisp
|
6,412
|
206
|
Start
|
Mid
|
626
|
Cryptographically-secure pseudorandom number generator
|
6,411
|
206
|
C
|
High
|
627
|
Computational science
|
6,398
|
206
|
Start
|
Top
|
628
|
Neuromorphic engineering
|
6,396
|
206
|
Unknown
|
Unknown
|
629
|
Matrix multiplication algorithm
|
6,384
|
205
|
C
|
Mid
|
630
|
State pattern
|
6,351
|
204
|
Start
|
Unknown
|
631
|
Generalized additive model
|
6,338
|
204
|
Start
|
Low
|
632
|
Limited-memory BFGS
|
6,327
|
204
|
Unknown
|
Unknown
|
633
|
Rabin–Karp algorithm
|
6,327
|
204
|
C
|
Mid
|
634
|
List of NP-complete problems
|
6,292
|
202
|
List
|
High
|
635
|
Splay tree
|
6,291
|
202
|
C
|
Mid
|
636
|
Hamiltonian path problem
|
6,278
|
202
|
C
|
Mid
|
637
|
Goto
|
6,251
|
201
|
C
|
Mid
|
638
|
Maximum flow problem
|
6,245
|
201
|
C
|
High
|
639
|
Graph isomorphism
|
6,245
|
201
|
Start
|
Mid
|
640
|
LR parser
|
6,219
|
200
|
Start
|
High
|
641
|
Query language
|
6,188
|
199
|
Start
|
Mid
|
642
|
Message passing
|
6,176
|
199
|
Start
|
High
|
643
|
Elbow method (clustering)
|
6,171
|
199
|
Unknown
|
Unknown
|
644
|
Aho–Corasick algorithm
|
6,148
|
198
|
Start
|
Mid
|
645
|
Strassen algorithm
|
6,146
|
198
|
C
|
Low
|
646
|
Nominal type system
|
6,143
|
198
|
Start
|
Mid
|
647
|
Glossary of graph theory
|
6,143
|
198
|
List
|
Mid
|
648
|
Miller–Rabin primality test
|
6,132
|
197
|
C
|
High
|
649
|
Infinite loop
|
6,102
|
196
|
Start
|
Mid
|
650
|
Mock object
|
6,088
|
196
|
Start
|
Unknown
|
651
|
Hill climbing
|
6,087
|
196
|
C
|
Mid
|
652
|
Wiener filter
|
6,086
|
196
|
Start
|
Unknown
|
653
|
8-bit color
|
6,080
|
196
|
Start
|
Low
|
654
|
Mixed reality
|
6,074
|
195
|
B
|
Unknown
|
655
|
Vorbis
|
6,039
|
194
|
C
|
Low
|
656
|
Non-English-based programming languages
|
6,029
|
194
|
List
|
Low
|
657
|
Template method pattern
|
6,011
|
193
|
Start
|
Low
|
658
|
Chain-of-responsibility pattern
|
5,993
|
193
|
Stub
|
Unknown
|
659
|
Ethics of artificial intelligence
|
5,987
|
193
|
B
|
Top
|
660
|
Fibonacci heap
|
5,979
|
192
|
C
|
High
|
661
|
Quantum algorithm
|
5,971
|
192
|
C
|
High
|
662
|
CORDIC
|
5,960
|
192
|
B
|
Mid
|
663
|
Covariance and contravariance (computer science)
|
5,955
|
192
|
Start
|
High
|
664
|
Tree structure
|
5,946
|
191
|
Start
|
High
|
665
|
Binary space partitioning
|
5,940
|
191
|
C
|
Low
|
666
|
Clique problem
|
5,932
|
191
|
GA
|
Mid
|
667
|
Pattern matching
|
5,932
|
191
|
C
|
Mid
|
668
|
Data quality
|
5,922
|
191
|
Start
|
Low
|
669
|
Basic Linear Algebra Subprograms
|
5,917
|
190
|
C
|
Low
|
670
|
Computational complexity
|
5,914
|
190
|
C
|
Top
|
671
|
Standard ML
|
5,892
|
190
|
C
|
Mid
|
672
|
Optimizing compiler
|
5,869
|
189
|
Start
|
High
|
673
|
Two-phase locking
|
5,862
|
189
|
C
|
High
|
674
|
Association for Computing Machinery
|
5,853
|
188
|
C
|
Top
|
675
|
Mixin
|
5,840
|
188
|
Start
|
Low
|
676
|
Syntactic sugar
|
5,836
|
188
|
C
|
Mid
|
677
|
Parsing expression grammar
|
5,829
|
188
|
B
|
Mid
|
678
|
Adversarial machine learning
|
5,823
|
187
|
C
|
Mid
|
679
|
First-class citizen
|
5,804
|
187
|
Stub
|
Low
|
680
|
Boyer–Moore string-search algorithm
|
5,801
|
187
|
C
|
High
|
681
|
Lowest common ancestor
|
5,797
|
187
|
Start
|
Unknown
|
682
|
Search engine indexing
|
5,788
|
186
|
C
|
Unknown
|
683
|
Kai-Fu Lee
|
5,782
|
186
|
Start
|
Unknown
|
684
|
Suffix tree
|
5,778
|
186
|
C
|
High
|
685
|
No free lunch theorem
|
5,750
|
185
|
Start
|
Mid
|
686
|
C string handling
|
5,750
|
185
|
C
|
Low
|
687
|
Code injection
|
5,746
|
185
|
C
|
High
|
688
|
Damerau–Levenshtein distance
|
5,737
|
185
|
Start
|
Low
|
689
|
Quantum information
|
5,725
|
184
|
Start
|
High
|
690
|
HyperLogLog
|
5,721
|
184
|
C
|
Unknown
|
691
|
Max-flow min-cut theorem
|
5,709
|
184
|
Start
|
High
|
692
|
Sorting
|
5,702
|
183
|
Start
|
High
|
693
|
Lazy evaluation
|
5,660
|
182
|
C
|
High
|
694
|
Chernoff bound
|
5,653
|
182
|
Start
|
Low
|
695
|
Enterprise architecture framework
|
5,643
|
182
|
Start
|
Unknown
|
696
|
Dynamic array
|
5,633
|
181
|
C
|
Mid
|
697
|
Computer-integrated manufacturing
|
5,598
|
180
|
Start
|
Mid
|
698
|
Dynamic programming language
|
5,559
|
179
|
Start
|
Mid
|
699
|
ISO/IEC 646
|
5,548
|
178
|
Start
|
Unknown
|
700
|
Requirements engineering
|
5,546
|
178
|
Start
|
Unknown
|
701
|
Ford–Fulkerson algorithm
|
5,541
|
178
|
Start
|
High
|
702
|
Intermediate representation
|
5,531
|
178
|
Start
|
Low
|
703
|
DALL-E
|
5,527
|
178
|
B
|
Unknown
|
704
|
Datalog
|
5,526
|
178
|
Unknown
|
Unknown
|
705
|
User-centered design
|
5,516
|
177
|
Start
|
Mid
|
706
|
Algebraic data type
|
5,511
|
177
|
Start
|
Low
|
707
|
Duff's device
|
5,497
|
177
|
C
|
Low
|
708
|
Pranav Mistry
|
5,483
|
176
|
Start
|
Low
|
709
|
Sophie Zhang (whistleblower)
|
5,478
|
176
|
Start
|
Low
|
710
|
Inverted index
|
5,472
|
176
|
Start
|
Mid
|
711
|
Isolation forest
|
5,468
|
176
|
C
|
Low
|
712
|
Recursive descent parser
|
5,451
|
175
|
Start
|
High
|
713
|
Proxy pattern
|
5,449
|
175
|
Start
|
Mid
|
714
|
Q (number format)
|
5,423
|
174
|
Unknown
|
Unknown
|
715
|
Set cover problem
|
5,420
|
174
|
C
|
Mid
|
716
|
Independent set (graph theory)
|
5,418
|
174
|
C
|
Mid
|
717
|
Third-generation programming language
|
5,412
|
174
|
Start
|
Mid
|
718
|
Alonzo Church
|
5,394
|
174
|
C
|
Top
|
719
|
Multi-label classification
|
5,394
|
174
|
Unknown
|
Unknown
|
720
|
Log-structured merge-tree
|
5,380
|
173
|
Start
|
Mid
|
721
|
Comparison of programming paradigms
|
5,377
|
173
|
C
|
Low
|
722
|
Null-terminated string
|
5,370
|
173
|
Start
|
Low
|
723
|
Longest increasing subsequence
|
5,361
|
172
|
C
|
Mid
|
724
|
Compare-and-swap
|
5,361
|
172
|
C
|
Low
|
725
|
Object database
|
5,358
|
172
|
Start
|
High
|
726
|
Okapi BM25
|
5,347
|
172
|
Start
|
Low
|
727
|
Factory (object-oriented programming)
|
5,344
|
172
|
C
|
Low
|
728
|
Raft (algorithm)
|
5,334
|
172
|
C
|
Low
|
729
|
Segment tree
|
5,310
|
171
|
Unknown
|
Unknown
|
730
|
3GP and 3G2
|
5,304
|
171
|
Unknown
|
Unknown
|
731
|
Nondeterministic Turing machine
|
5,290
|
170
|
C
|
High
|
732
|
Codewars
|
5,255
|
169
|
Stub
|
Low
|
733
|
Boltzmann machine
|
5,231
|
168
|
C
|
Low
|
734
|
Median of medians
|
5,212
|
168
|
C
|
Low
|
735
|
Computational chemistry
|
5,204
|
167
|
B
|
Top
|
736
|
List (abstract data type)
|
5,204
|
167
|
Start
|
High
|
737
|
X265
|
5,195
|
167
|
C
|
Low
|
738
|
C++23
|
5,192
|
167
|
Stub
|
Low
|
739
|
Prefix sum
|
5,188
|
167
|
Unknown
|
Unknown
|
740
|
Don Norman
|
5,187
|
167
|
Start
|
Mid
|
741
|
Formal grammar
|
5,182
|
167
|
C
|
Mid
|
742
|
Moravec's paradox
|
5,169
|
166
|
Start
|
Unknown
|
743
|
Communicating sequential processes
|
5,167
|
166
|
B
|
Top
|
744
|
Jaro–Winkler distance
|
5,161
|
166
|
Unknown
|
Unknown
|
745
|
CiteSeerX
|
5,160
|
166
|
Start
|
High
|
746
|
Unique identifier
|
5,158
|
166
|
Start
|
Unknown
|
747
|
Relational database management system
|
5,137
|
165
|
NA
|
NA
|
748
|
Semantics (computer science)
|
5,128
|
165
|
C
|
Top
|
749
|
Zero-shot learning
|
5,124
|
165
|
C
|
Unknown
|
750
|
Formal verification
|
5,107
|
164
|
Start
|
High
|
751
|
LL parser
|
5,081
|
163
|
Start
|
High
|
752
|
Deno (software)
|
5,081
|
163
|
Start
|
Low
|
753
|
Restricted Boltzmann machine
|
5,070
|
163
|
Unknown
|
Unknown
|
754
|
Static single assignment form
|
5,030
|
162
|
C
|
Mid
|
755
|
Translation studies
|
5,006
|
161
|
Start
|
Mid
|
756
|
Vapnik–Chervonenkis dimension
|
5,006
|
161
|
Start
|
Mid
|
757
|
Clipping (computer graphics)
|
4,996
|
161
|
Start
|
Mid
|
758
|
Artificial life
|
4,996
|
161
|
B
|
High
|
759
|
Computational neuroscience
|
4,991
|
161
|
B
|
Mid
|
760
|
Fold (higher-order function)
|
4,977
|
160
|
Start
|
Mid
|
761
|
Computational complexity of mathematical operations
|
4,966
|
160
|
B
|
Mid
|
762
|
Formal methods
|
4,961
|
160
|
Start
|
Top
|
763
|
Flyweight pattern
|
4,938
|
159
|
Start
|
Unknown
|
764
|
3D audio effect
|
4,938
|
159
|
Start
|
Unknown
|
765
|
List of fictional computers
|
4,930
|
159
|
Unknown
|
Unknown
|
766
|
Information processing
|
4,926
|
158
|
Start
|
Unknown
|
767
|
Terry Winograd
|
4,904
|
158
|
Start
|
Unknown
|
768
|
Computational thinking
|
4,904
|
158
|
Start
|
Unknown
|
769
|
Metaprogramming
|
4,893
|
157
|
C
|
Mid
|
770
|
Thread pool
|
4,886
|
157
|
Unknown
|
Unknown
|
771
|
Computability theory
|
4,886
|
157
|
B
|
Top
|
772
|
Treemapping
|
4,880
|
157
|
C
|
Mid
|
773
|
Statement (computer science)
|
4,838
|
156
|
Start
|
Mid
|
774
|
General-purpose programming language
|
4,831
|
155
|
Stub
|
Mid
|
775
|
Build automation
|
4,828
|
155
|
Start
|
Low
|
776
|
Rule 110
|
4,822
|
155
|
Start
|
Unknown
|
777
|
Systems programming
|
4,815
|
155
|
B
|
Top
|
778
|
Quantum machine learning
|
4,812
|
155
|
B
|
Unknown
|
779
|
Algorithmic efficiency
|
4,804
|
154
|
C
|
High
|
780
|
Hy
|
4,789
|
154
|
Start
|
Low
|
781
|
Interval tree
|
4,786
|
154
|
Start
|
Mid
|
782
|
Three-valued logic
|
4,770
|
153
|
Start
|
Low
|
783
|
Code generation (compiler)
|
4,764
|
153
|
Start
|
Unknown
|
784
|
Bridge pattern
|
4,753
|
153
|
Start
|
Low
|
785
|
Sycamore processor
|
4,748
|
153
|
Stub
|
Low
|
786
|
Solution architecture
|
4,735
|
152
|
Start
|
Unknown
|
787
|
Semantic network
|
4,727
|
152
|
Start
|
Low
|
788
|
External sorting
|
4,722
|
152
|
Unknown
|
Unknown
|
789
|
Challenge–response authentication
|
4,692
|
151
|
Start
|
Low
|
790
|
Beam search
|
4,691
|
151
|
Stub
|
Unknown
|
791
|
Asynchronous I/O
|
4,691
|
151
|
C
|
Mid
|
792
|
Iterative deepening depth-first search
|
4,671
|
150
|
Start
|
Low
|
793
|
C--
|
4,670
|
150
|
Start
|
Low
|
794
|
Chomsky normal form
|
4,662
|
150
|
Start
|
Mid
|
795
|
Andrew S. Tanenbaum
|
4,659
|
150
|
C
|
Mid
|
796
|
Raj Reddy
|
4,657
|
150
|
B
|
Unknown
|
797
|
State (computer science)
|
4,647
|
149
|
Start
|
Mid
|
798
|
BCH code
|
4,646
|
149
|
C
|
Unknown
|
799
|
LeNet
|
4,628
|
149
|
Start
|
Unknown
|
800
|
Selection algorithm
|
4,626
|
149
|
C
|
Mid
|
801
|
Distributed version control
|
4,626
|
149
|
Start
|
Mid
|
802
|
Hamming weight
|
4,618
|
148
|
C
|
Unknown
|
803
|
Active record pattern
|
4,591
|
148
|
Unknown
|
Unknown
|
804
|
Operator associativity
|
4,585
|
147
|
Start
|
Unknown
|
805
|
Fixed-point combinator
|
4,578
|
147
|
C
|
Mid
|
806
|
Topological data analysis
|
4,576
|
147
|
C
|
Low
|
807
|
Needleman–Wunsch algorithm
|
4,560
|
147
|
Start
|
Mid
|
808
|
Immersion (virtual reality)
|
4,559
|
147
|
Start
|
Low
|
809
|
Curry–Howard correspondence
|
4,556
|
146
|
C
|
High
|
810
|
Peterson's algorithm
|
4,546
|
146
|
C
|
Mid
|
811
|
Space complexity
|
4,545
|
146
|
Start
|
Unknown
|
812
|
Calling convention
|
4,540
|
146
|
Start
|
High
|
813
|
Genetic programming
|
4,538
|
146
|
B
|
Mid
|
814
|
Multi-agent system
|
4,538
|
146
|
Start
|
Mid
|
815
|
Timeline of quantum computing and communication
|
4,524
|
145
|
List
|
Mid
|
816
|
Smith–Waterman algorithm
|
4,517
|
145
|
B
|
Mid
|
817
|
Side effect (computer science)
|
4,504
|
145
|
C
|
Mid
|
818
|
Terminal and nonterminal symbols
|
4,495
|
145
|
C
|
Mid
|
819
|
Randomized algorithm
|
4,492
|
144
|
C
|
High
|
820
|
Object file
|
4,486
|
144
|
Start
|
Mid
|
821
|
DNS rebinding
|
4,466
|
144
|
Unknown
|
Unknown
|
822
|
Job-shop scheduling
|
4,452
|
143
|
C
|
Mid
|
823
|
Function pointer
|
4,452
|
143
|
Start
|
Low
|
824
|
Context-free language
|
4,444
|
143
|
Start
|
Mid
|
825
|
Video coding format
|
4,432
|
142
|
C
|
Unknown
|
826
|
Longest path problem
|
4,416
|
142
|
C
|
Low
|
827
|
Systems modeling
|
4,411
|
142
|
Start
|
Unknown
|
828
|
Vendor lock-in
|
4,403
|
142
|
C
|
Mid
|
829
|
Parametric design
|
4,403
|
142
|
Start
|
Unknown
|
830
|
Hard coding
|
4,385
|
141
|
Start
|
Low
|
831
|
Perfect hash function
|
4,385
|
141
|
C
|
Unknown
|
832
|
Set (abstract data type)
|
4,379
|
141
|
Start
|
High
|
833
|
Control-flow graph
|
4,372
|
141
|
C
|
Mid
|
834
|
Webmaster
|
4,368
|
140
|
Start
|
Low
|
835
|
Delegation pattern
|
4,365
|
140
|
Start
|
Mid
|
836
|
Reentrancy (computing)
|
4,357
|
140
|
Start
|
Mid
|
837
|
Metasyntactic variable
|
4,355
|
140
|
Unknown
|
Unknown
|
838
|
Computation
|
4,351
|
140
|
Start
|
Top
|
839
|
Boids
|
4,324
|
139
|
Unknown
|
Unknown
|
840
|
Model of computation
|
4,318
|
139
|
Start
|
Mid
|
841
|
Tagged union
|
4,307
|
138
|
Start
|
Low
|
842
|
Wrapper function
|
4,304
|
138
|
Start
|
Low
|
843
|
Denormal number
|
4,303
|
138
|
Unknown
|
Unknown
|
844
|
Min-max heap
|
4,297
|
138
|
Start
|
Mid
|
845
|
Branch (computer science)
|
4,281
|
138
|
Start
|
Mid
|
846
|
Cyclic permutation
|
4,280
|
138
|
Start
|
Unknown
|
847
|
Stylometry
|
4,275
|
137
|
C
|
Low
|
848
|
Topological insulator
|
4,268
|
137
|
Start
|
Unknown
|
849
|
List of computer scientists
|
4,261
|
137
|
Unknown
|
Unknown
|
850
|
Vala (programming language)
|
4,260
|
137
|
Start
|
Low
|
851
|
Umple
|
4,253
|
137
|
Start
|
Low
|
852
|
A Mathematical Theory of Communication
|
4,252
|
137
|
Start
|
High
|
853
|
Operator-precedence parser
|
4,248
|
137
|
C
|
Mid
|
854
|
Memory segmentation
|
4,229
|
136
|
Stub
|
Mid
|
855
|
Outline of computer science
|
4,223
|
136
|
Start
|
Mid
|
856
|
Compilers: Principles, Techniques, and Tools
|
4,215
|
135
|
Stub
|
Low
|
857
|
Weak typing
|
4,210
|
135
|
NA
|
NA
|
858
|
IEEE 754-1985
|
4,202
|
135
|
C
|
Low
|
859
|
List of object-oriented programming languages
|
4,181
|
134
|
List
|
Low
|
860
|
Monte Carlo algorithm
|
4,171
|
134
|
C
|
Mid
|
861
|
Kleene star
|
4,168
|
134
|
Start
|
High
|
862
|
Apache Flink
|
4,168
|
134
|
Start
|
Unknown
|
863
|
Double-checked locking
|
4,157
|
134
|
Unknown
|
Unknown
|
864
|
X86 memory segmentation
|
4,153
|
133
|
Start
|
Mid
|
865
|
Cook–Levin theorem
|
4,146
|
133
|
B
|
High
|
866
|
Niklaus Wirth
|
4,136
|
133
|
Start
|
High
|
867
|
Substring
|
4,132
|
133
|
Unknown
|
Unknown
|
868
|
Machine epsilon
|
4,131
|
133
|
Unknown
|
Unknown
|
869
|
Pipeline (software)
|
4,126
|
133
|
Start
|
Mid
|
870
|
Continuation-passing style
|
4,120
|
132
|
Start
|
Mid
|
871
|
Strong typing
|
4,117
|
132
|
NA
|
NA
|
872
|
Marching cubes
|
4,096
|
132
|
Start
|
Mid
|
873
|
Hindley–Milner type system
|
4,086
|
131
|
B
|
High
|
874
|
Stream processing
|
4,086
|
131
|
C
|
Mid
|
875
|
4,294,967,295
|
4,079
|
131
|
Stub
|
Low
|
876
|
Dual linear program
|
4,070
|
131
|
Start
|
Low
|
877
|
Thundering herd problem
|
4,065
|
131
|
Start
|
Unknown
|
878
|
Computational geometry
|
4,050
|
130
|
Start
|
High
|
879
|
Transitive closure
|
4,050
|
130
|
C
|
Low
|
880
|
Automated theorem proving
|
4,040
|
130
|
Start
|
Mid
|
881
|
Deterministic algorithm
|
4,040
|
130
|
Start
|
High
|
882
|
Quantum programming
|
4,040
|
130
|
Start
|
Mid
|
883
|
Computer algebra
|
4,034
|
130
|
Start
|
Mid
|
884
|
Zachman Framework
|
4,030
|
130
|
Start
|
Unknown
|
885
|
Coding conventions
|
4,021
|
129
|
Unknown
|
Unknown
|
886
|
History of computer science
|
4,011
|
129
|
Start
|
Top
|
887
|
Decision problem
|
3,994
|
128
|
Start
|
Mid
|
888
|
Kent Beck
|
3,943
|
127
|
Start
|
Mid
|
889
|
Symbol table
|
3,939
|
127
|
C
|
Low
|
890
|
Hardware virtualization
|
3,918
|
126
|
Start
|
High
|
891
|
Structural type system
|
3,913
|
126
|
Start
|
Mid
|
892
|
Type safety
|
3,899
|
125
|
C
|
Mid
|
893
|
Ambiguous grammar
|
3,895
|
125
|
B
|
High
|
894
|
Hard link
|
3,876
|
125
|
Start
|
Low
|
895
|
Phong reflection model
|
3,874
|
124
|
Unknown
|
Unknown
|
896
|
Evaluation strategy
|
3,867
|
124
|
C
|
Top
|
897
|
Zettabyte Era
|
3,860
|
124
|
B
|
Low
|
898
|
Kahan summation algorithm
|
3,854
|
124
|
Start
|
Unknown
|
899
|
Signed zero
|
3,837
|
123
|
C
|
Low
|
900
|
Random access
|
3,829
|
123
|
Start
|
Unknown
|
901
|
Object code
|
3,816
|
123
|
Start
|
Mid
|
902
|
Agnostic (data)
|
3,809
|
122
|
Unknown
|
Unknown
|
903
|
Stack machine
|
3,784
|
122
|
C
|
Mid
|
904
|
Pseudorandom binary sequence
|
3,775
|
121
|
Start
|
Mid
|
905
|
Hybrid log–gamma
|
3,756
|
121
|
Start
|
Low
|
906
|
Timeline of machine learning
|
3,747
|
120
|
Unknown
|
Unknown
|
907
|
List of computer algebra systems
|
3,747
|
120
|
List
|
Low
|
908
|
Pumping lemma for regular languages
|
3,745
|
120
|
C
|
Low
|
909
|
Data architecture
|
3,744
|
120
|
Start
|
Mid
|
910
|
Rule 30
|
3,737
|
120
|
Start
|
Unknown
|
911
|
Operational transformation
|
3,726
|
120
|
B
|
Unknown
|
912
|
SIGGRAPH
|
3,712
|
119
|
Start
|
Mid
|
913
|
Cropping (image)
|
3,706
|
119
|
C
|
Unknown
|
914
|
Dartmouth workshop
|
3,693
|
119
|
Start
|
Low
|
915
|
Software agent
|
3,684
|
118
|
Start
|
High
|
916
|
Evolutionary computation
|
3,678
|
118
|
C
|
Low
|
917
|
Yukihiro Matsumoto
|
3,675
|
118
|
Start
|
Unknown
|
918
|
Complexity class
|
3,666
|
118
|
C
|
High
|
919
|
Nasir Ahmed (engineer)
|
3,664
|
118
|
Start
|
Unknown
|
920
|
Women in computing
|
3,643
|
117
|
B
|
High
|
921
|
Deutsch–Jozsa algorithm
|
3,641
|
117
|
C
|
Mid
|
922
|
De Bruijn sequence
|
3,630
|
117
|
C
|
Mid
|
923
|
Readers–writers problem
|
3,622
|
116
|
Start
|
Low
|
924
|
Barbara Liskov
|
3,611
|
116
|
C
|
High
|
925
|
Spanner (database)
|
3,605
|
116
|
Unknown
|
Unknown
|
926
|
Hadley Wickham
|
3,604
|
116
|
Start
|
Mid
|
927
|
Comparison of parser generators
|
3,603
|
116
|
List
|
Mid
|
928
|
State space search
|
3,597
|
116
|
Unknown
|
Unknown
|
929
|
Claytronics
|
3,581
|
115
|
C
|
Unknown
|
930
|
Runtime (program lifecycle phase)
|
3,564
|
114
|
Start
|
High
|
931
|
Mean shift
|
3,543
|
114
|
Start
|
Mid
|
932
|
Homotopy type theory
|
3,537
|
114
|
C
|
Low
|
933
|
Smart pointer
|
3,524
|
113
|
C
|
Low
|
934
|
Object composition
|
3,515
|
113
|
Start
|
Low
|
935
|
One-instruction set computer
|
3,497
|
112
|
Start
|
Unknown
|
936
|
Augmented Lagrangian method
|
3,493
|
112
|
Start
|
Low
|
937
|
Gladys West
|
3,487
|
112
|
B
|
Low
|
938
|
Soundex
|
3,486
|
112
|
C
|
Unknown
|
939
|
Blob detection
|
3,482
|
112
|
Start
|
Mid
|
940
|
Matrix chain multiplication
|
3,461
|
111
|
Unknown
|
Unknown
|
941
|
DNA computing
|
3,458
|
111
|
C
|
Mid
|
942
|
Programming language theory
|
3,457
|
111
|
Start
|
Top
|
943
|
Elisha Wiesel
|
3,455
|
111
|
Unknown
|
Unknown
|
944
|
Union type
|
3,446
|
111
|
C
|
Mid
|
945
|
Business rules engine
|
3,442
|
111
|
Start
|
Unknown
|
946
|
Iterator
|
3,440
|
110
|
Start
|
Mid
|
947
|
LALR parser
|
3,426
|
110
|
B
|
High
|
948
|
Rewriting
|
3,425
|
110
|
C
|
Mid
|
949
|
Purely functional programming
|
3,424
|
110
|
Start
|
Low
|
950
|
Electronic data processing
|
3,424
|
110
|
Start
|
Unknown
|
951
|
H.262/MPEG-2 Part 2
|
3,423
|
110
|
Stub
|
Low
|
952
|
Computer Go
|
3,411
|
110
|
B
|
Low
|
953
|
Java remote method invocation
|
3,409
|
109
|
Start
|
Unknown
|
954
|
Wearable computer
|
3,406
|
109
|
C
|
Mid
|
955
|
Parametric polymorphism
|
3,391
|
109
|
C
|
Mid
|
956
|
Entry point
|
3,386
|
109
|
Stub
|
Mid
|
957
|
Handwriting recognition
|
3,383
|
109
|
C
|
Mid
|
958
|
Starvation (computer science)
|
3,368
|
108
|
Start
|
Mid
|
959
|
Referential transparency
|
3,366
|
108
|
Start
|
High
|
960
|
Numerical method
|
3,365
|
108
|
Stub
|
Unknown
|
961
|
Oracle machine
|
3,361
|
108
|
C
|
Mid
|
962
|
Lazy initialization
|
3,350
|
108
|
Start
|
Low
|
963
|
Foreign function interface
|
3,344
|
107
|
Start
|
Low
|
964
|
Functional reactive programming
|
3,339
|
107
|
Start
|
Unknown
|
965
|
Best-first search
|
3,335
|
107
|
Stub
|
Unknown
|
966
|
Knowledge-based systems
|
3,327
|
107
|
Start
|
Unknown
|
967
|
IBM Research
|
3,324
|
107
|
Start
|
Unknown
|
968
|
John Backus
|
3,321
|
107
|
C
|
High
|
969
|
Jamie Zawinski
|
3,319
|
107
|
Start
|
Low
|
970
|
Reference counting
|
3,308
|
106
|
C
|
Mid
|
971
|
Word-sense disambiguation
|
3,307
|
106
|
C
|
Mid
|
972
|
Register allocation
|
3,298
|
106
|
C
|
Low
|
973
|
Rule-based system
|
3,296
|
106
|
Unknown
|
Unknown
|
974
|
Avalanche effect
|
3,293
|
106
|
Start
|
Unknown
|
975
|
Sanjay Ghemawat
|
3,290
|
106
|
Start
|
Mid
|
976
|
Linear code
|
3,286
|
106
|
Start
|
High
|
977
|
Alfred Aho
|
3,279
|
105
|
Unknown
|
Unknown
|
978
|
Logical shift
|
3,278
|
105
|
Unknown
|
Unknown
|
979
|
SHI International Corp
|
3,276
|
105
|
Start
|
Low
|
980
|
Ronald Graham
|
3,269
|
105
|
GA
|
Mid
|
981
|
Seymour Papert
|
3,247
|
104
|
C
|
Mid
|
982
|
Top-down parsing
|
3,242
|
104
|
C
|
Low
|
983
|
Charlie Cheever
|
3,232
|
104
|
C
|
Low
|
984
|
Jeffrey Ullman
|
3,227
|
104
|
C
|
Mid
|
985
|
Tabu search
|
3,223
|
103
|
Unknown
|
Unknown
|
986
|
Hash collision
|
3,222
|
103
|
Start
|
Low
|
987
|
Software rot
|
3,207
|
103
|
Unknown
|
Unknown
|
988
|
Deadlock prevention algorithms
|
3,206
|
103
|
Start
|
Low
|
989
|
Dependent type
|
3,205
|
103
|
Start
|
High
|
990
|
Dutch national flag problem
|
3,204
|
103
|
Start
|
Mid
|
991
|
Computing Machinery and Intelligence
|
3,202
|
103
|
C
|
High
|
992
|
Open-source model
|
3,184
|
102
|
NA
|
NA
|
993
|
Shift JIS
|
3,182
|
102
|
Start
|
Low
|
994
|
Green threads
|
3,181
|
102
|
Start
|
Low
|
995
|
Automatic summarization
|
3,180
|
102
|
C
|
Unknown
|
996
|
Busy waiting
|
3,173
|
102
|
Start
|
Low
|
997
|
3D reconstruction from multiple images
|
3,167
|
102
|
Unknown
|
Unknown
|
998
|
Iterator pattern
|
3,160
|
101
|
Start
|
Unknown
|
999
|
Syntax highlighting
|
3,158
|
101
|
C
|
Low
|
1000
|
2-satisfiability
|
3,157
|
101
|
GA
|
Mid
|