Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
JavaScript
|
606,094
|
19,551
|
B
|
Mid
|
2
|
C++
|
555,086
|
17,906
|
B
|
High
|
3
|
Java (programming language)
|
440,196
|
14,199
|
C
|
Mid
|
4
|
Artificial intelligence
|
362,475
|
11,692
|
B
|
Top
|
5
|
Python (programming language)
|
300,498
|
9,693
|
GA
|
Mid
|
6
|
C (programming language)
|
275,211
|
8,877
|
B
|
High
|
7
|
Computer
|
231,796
|
7,477
|
C
|
Top
|
8
|
Operating system
|
170,200
|
5,490
|
B
|
High
|
9
|
HTML
|
153,122
|
4,939
|
B
|
Top
|
10
|
Tim Berners-Lee
|
116,713
|
3,764
|
C
|
Top
|
11
|
Go (programming language)
|
114,075
|
3,679
|
C
|
Low
|
12
|
Video game
|
110,488
|
3,564
|
B
|
Mid
|
13
|
Ajax (programming)
|
108,532
|
3,501
|
Start
|
High
|
14
|
Machine learning
|
104,181
|
3,360
|
B
|
High
|
15
|
Regular expression
|
99,113
|
3,197
|
B
|
High
|
16
|
JSON
|
97,647
|
3,149
|
B
|
Mid
|
17
|
Agile software development
|
96,889
|
3,125
|
B
|
High
|
18
|
Google Search
|
95,566
|
3,082
|
C
|
High
|
19
|
PHP
|
94,132
|
3,036
|
GA
|
Mid
|
20
|
Unix
|
88,804
|
2,864
|
B
|
Mid
|
21
|
Computer science
|
85,381
|
2,754
|
C
|
Top
|
22
|
R (programming language)
|
85,375
|
2,754
|
C
|
Mid
|
23
|
Assembly language
|
83,048
|
2,678
|
B
|
High
|
24
|
Order of operations
|
78,556
|
2,534
|
C
|
Mid
|
25
|
C Sharp (programming language)
|
76,602
|
2,471
|
B
|
Low
|
26
|
Algorithm
|
75,961
|
2,450
|
B
|
Top
|
27
|
Open-source software
|
74,635
|
2,407
|
C
|
Top
|
28
|
Database
|
74,249
|
2,395
|
C
|
Top
|
29
|
Big O notation
|
73,778
|
2,379
|
B
|
Top
|
30
|
Programming language
|
70,414
|
2,271
|
B
|
Top
|
31
|
Programming paradigm
|
69,287
|
2,235
|
C
|
Mid
|
32
|
ECMAScript
|
68,802
|
2,219
|
C
|
Mid
|
33
|
Conway's Game of Life
|
68,226
|
2,200
|
B
|
High
|
34
|
Web colors
|
67,745
|
2,185
|
C
|
Mid
|
35
|
Data science
|
67,463
|
2,176
|
Start
|
High
|
36
|
UTF-8
|
65,428
|
2,110
|
B
|
Mid
|
37
|
Dijkstra's algorithm
|
64,276
|
2,073
|
C
|
Top
|
38
|
Rust (programming language)
|
60,339
|
1,946
|
B
|
Mid
|
39
|
Software engineering
|
58,370
|
1,882
|
C
|
Top
|
40
|
Elixir (programming language)
|
57,819
|
1,865
|
Unknown
|
Unknown
|
41
|
Moore's law
|
55,185
|
1,780
|
B
|
Mid
|
42
|
Deep learning
|
53,840
|
1,736
|
C
|
High
|
43
|
Functional programming
|
53,751
|
1,733
|
B
|
Top
|
44
|
Prisoner's dilemma
|
53,412
|
1,722
|
C
|
High
|
45
|
Programmer
|
51,108
|
1,648
|
C
|
Mid
|
46
|
Artificial neural network
|
51,022
|
1,645
|
C
|
Mid
|
47
|
Free and open-source software
|
50,957
|
1,643
|
C
|
Top
|
48
|
Turing machine
|
50,859
|
1,640
|
B
|
Top
|
49
|
Cryptography
|
50,598
|
1,632
|
B
|
Top
|
50
|
Katherine Johnson
|
49,843
|
1,607
|
GA
|
High
|
51
|
Monte Carlo method
|
49,718
|
1,603
|
B
|
High
|
52
|
Hash function
|
49,190
|
1,586
|
C
|
High
|
53
|
Computer programming
|
47,876
|
1,544
|
C
|
Top
|
54
|
Model–view–controller
|
47,746
|
1,540
|
Start
|
Mid
|
55
|
Information
|
47,468
|
1,531
|
C
|
Top
|
56
|
Millennium Prize Problems
|
46,533
|
1,501
|
C
|
Mid
|
57
|
Turing test
|
46,399
|
1,496
|
B
|
High
|
58
|
Quicksort
|
46,255
|
1,492
|
B
|
Top
|
59
|
Software design pattern
|
46,053
|
1,485
|
C
|
High
|
60
|
Floating-point arithmetic
|
45,648
|
1,472
|
B
|
Top
|
61
|
Heuristic
|
45,527
|
1,468
|
C
|
Mid
|
62
|
Hash table
|
44,957
|
1,450
|
B
|
High
|
63
|
RGB color model
|
44,353
|
1,430
|
B
|
Low
|
64
|
Binary search algorithm
|
44,255
|
1,427
|
FA
|
High
|
65
|
Bitwise operation
|
43,816
|
1,413
|
C
|
High
|
66
|
Fast inverse square root
|
43,680
|
1,409
|
GA
|
Low
|
67
|
Virtual reality
|
42,665
|
1,376
|
C
|
Mid
|
68
|
K-means clustering
|
42,548
|
1,372
|
C
|
Mid
|
69
|
Support-vector machine
|
42,331
|
1,365
|
C
|
Mid
|
70
|
Natural language processing
|
41,809
|
1,348
|
C
|
Top
|
71
|
Travelling salesman problem
|
41,040
|
1,323
|
B
|
Top
|
72
|
Scratch (programming language)
|
40,415
|
1,303
|
C
|
Low
|
73
|
A* search algorithm
|
40,405
|
1,303
|
B
|
Mid
|
74
|
Computer program
|
39,697
|
1,280
|
B
|
Top
|
75
|
Kernel (operating system)
|
39,548
|
1,275
|
B
|
High
|
76
|
P versus NP problem
|
39,389
|
1,270
|
B
|
Top
|
77
|
Two's complement
|
39,382
|
1,270
|
B
|
High
|
78
|
Dennis Ritchie
|
38,939
|
1,256
|
Start
|
Top
|
79
|
TypeScript
|
38,778
|
1,250
|
C
|
Low
|
80
|
OpenAI
|
38,655
|
1,246
|
Start
|
Low
|
81
|
Erlang (programming language)
|
38,478
|
1,241
|
B
|
Mid
|
82
|
Sorting algorithm
|
38,088
|
1,228
|
C
|
Top
|
83
|
Fortran
|
37,963
|
1,224
|
C
|
Mid
|
84
|
Turing completeness
|
36,914
|
1,190
|
C
|
Top
|
85
|
Time complexity
|
36,769
|
1,186
|
B
|
High
|
86
|
Data structure
|
36,671
|
1,182
|
C
|
Top
|
87
|
Procedural programming
|
36,567
|
1,179
|
Start
|
Mid
|
88
|
Relational database
|
36,457
|
1,176
|
C
|
Top
|
89
|
Breadth-first search
|
35,843
|
1,156
|
Start
|
High
|
90
|
Compiler
|
35,811
|
1,155
|
C
|
Top
|
91
|
Data mining
|
35,537
|
1,146
|
B
|
High
|
92
|
Array data structure
|
35,521
|
1,145
|
C
|
Top
|
93
|
Lisp (programming language)
|
35,129
|
1,133
|
B
|
High
|
94
|
Malware
|
35,076
|
1,131
|
C
|
High
|
95
|
Advanced Video Coding
|
34,824
|
1,123
|
C
|
Low
|
96
|
High Efficiency Video Coding
|
34,720
|
1,120
|
B
|
Low
|
97
|
Graph theory
|
34,606
|
1,116
|
C
|
Top
|
98
|
Vector graphics
|
34,539
|
1,114
|
Start
|
High
|
99
|
Unified Modeling Language
|
34,423
|
1,110
|
C
|
High
|
100
|
Finite-state machine
|
34,124
|
1,100
|
B
|
Top
|
101
|
Dynamic programming
|
34,009
|
1,097
|
B
|
Top
|
102
|
Merge sort
|
33,602
|
1,083
|
C
|
High
|
103
|
Boolean algebra
|
32,880
|
1,060
|
B
|
High
|
104
|
AArch64
|
32,449
|
1,046
|
Start
|
Low
|
105
|
Cognition
|
32,074
|
1,034
|
C
|
Low
|
106
|
Depth-first search
|
32,063
|
1,034
|
C
|
Top
|
107
|
Linked list
|
31,552
|
1,017
|
B
|
Top
|
108
|
Natalie Enright Jerger
|
31,294
|
1,009
|
Start
|
Unknown
|
109
|
Discrete mathematics
|
31,199
|
1,006
|
B
|
Top
|
110
|
Imperative programming
|
31,103
|
1,003
|
C
|
Top
|
111
|
De Morgan's laws
|
30,839
|
994
|
Start
|
High
|
112
|
Lua (programming language)
|
30,703
|
990
|
C
|
Mid
|
113
|
Linear programming
|
30,473
|
983
|
B
|
High
|
114
|
Jackson structured programming
|
30,373
|
979
|
Start
|
Low
|
115
|
Directed acyclic graph
|
29,924
|
965
|
GA
|
High
|
116
|
Data type
|
29,534
|
952
|
C
|
Mid
|
117
|
Binary search tree
|
29,506
|
951
|
C
|
High
|
118
|
Levenshtein distance
|
29,459
|
950
|
C
|
Mid
|
119
|
Optical character recognition
|
29,416
|
948
|
C
|
Mid
|
120
|
Bubble sort
|
29,194
|
941
|
B
|
High
|
121
|
Brainfuck
|
28,995
|
935
|
C
|
Low
|
122
|
Version control
|
28,907
|
932
|
C
|
High
|
123
|
Knapsack problem
|
28,889
|
931
|
B
|
Mid
|
124
|
Computer engineering
|
28,768
|
928
|
C
|
Top
|
125
|
Tree (data structure)
|
28,657
|
924
|
C
|
High
|
126
|
BASIC
|
28,403
|
916
|
C
|
Mid
|
127
|
Exclusive or
|
28,028
|
904
|
C
|
Mid
|
128
|
Lambda calculus
|
27,784
|
896
|
B
|
Top
|
129
|
Bioinformatics
|
27,573
|
889
|
C
|
High
|
130
|
Swift (programming language)
|
27,562
|
889
|
B
|
Mid
|
131
|
IEEE 754
|
27,551
|
888
|
C
|
High
|
132
|
Sieve of Eratosthenes
|
27,480
|
886
|
C
|
Mid
|
133
|
Cluster analysis
|
27,421
|
884
|
C
|
High
|
134
|
B-tree
|
27,136
|
875
|
C
|
High
|
135
|
Scripting language
|
27,119
|
874
|
C
|
Mid
|
136
|
Tensor Processing Unit
|
27,069
|
873
|
C
|
Mid
|
137
|
Type system
|
26,881
|
867
|
B
|
High
|
138
|
Whitespace character
|
26,721
|
861
|
B
|
Mid
|
139
|
Heap (data structure)
|
26,569
|
857
|
C
|
High
|
140
|
Free software
|
26,465
|
853
|
C
|
Top
|
141
|
Haskell (programming language)
|
26,396
|
851
|
B
|
Mid
|
142
|
Singleton pattern
|
26,362
|
850
|
C
|
Mid
|
143
|
Cross-site request forgery
|
26,298
|
848
|
C
|
High
|
144
|
High-level programming language
|
26,271
|
847
|
Start
|
High
|
145
|
Stack (abstract data type)
|
26,168
|
844
|
C
|
High
|
146
|
Halting problem
|
26,091
|
841
|
B
|
Top
|
147
|
POSIX
|
25,967
|
837
|
Start
|
Mid
|
148
|
Artificial general intelligence
|
25,207
|
813
|
C
|
Mid
|
149
|
Insertion sort
|
25,195
|
812
|
B
|
High
|
150
|
Computer architecture
|
25,074
|
808
|
C
|
Top
|
151
|
Information theory
|
25,020
|
807
|
B
|
Top
|
152
|
Tower of Hanoi
|
25,005
|
806
|
C
|
Mid
|
153
|
Binary tree
|
24,973
|
805
|
B
|
Top
|
154
|
Cybernetics
|
24,925
|
804
|
B
|
Mid
|
155
|
First-order logic
|
24,720
|
797
|
B
|
High
|
156
|
Stochastic gradient descent
|
24,500
|
790
|
Start
|
Mid
|
157
|
NP-completeness
|
24,494
|
790
|
C
|
Top
|
158
|
Don't repeat yourself
|
24,212
|
781
|
Start
|
Mid
|
159
|
Huffman coding
|
24,093
|
777
|
C
|
High
|
160
|
Red–black tree
|
23,931
|
771
|
C
|
High
|
161
|
Computer vision
|
23,912
|
771
|
C
|
Mid
|
162
|
Floor and ceiling functions
|
23,906
|
771
|
B
|
Mid
|
163
|
Perl
|
23,710
|
764
|
C
|
Mid
|
164
|
Trie
|
23,669
|
763
|
B
|
High
|
165
|
Donald Knuth
|
23,644
|
762
|
B
|
Top
|
166
|
Mathematical optimization
|
23,593
|
761
|
B
|
High
|
167
|
Julia (programming language)
|
23,500
|
758
|
C
|
Low
|
168
|
Tree traversal
|
23,485
|
757
|
C
|
High
|
169
|
Ken Thompson
|
23,367
|
753
|
B
|
Top
|
170
|
Usage share of operating systems
|
23,276
|
750
|
B
|
High
|
171
|
Class diagram
|
23,237
|
749
|
Start
|
Low
|
172
|
Behavior-driven development
|
23,145
|
746
|
B
|
Low
|
173
|
Operations research
|
23,044
|
743
|
C
|
High
|
174
|
Qubit
|
23,040
|
743
|
Start
|
High
|
175
|
Topological sorting
|
23,020
|
742
|
C
|
High
|
176
|
Computer graphics
|
22,936
|
739
|
B
|
Top
|
177
|
Ray tracing (graphics)
|
22,855
|
737
|
B
|
Mid
|
178
|
Hackathon
|
22,757
|
734
|
Start
|
Mid
|
179
|
Polymorphism (computer science)
|
22,725
|
733
|
C
|
High
|
180
|
Distributed computing
|
22,657
|
730
|
B
|
Top
|
181
|
Genetic algorithm
|
22,610
|
729
|
C
|
High
|
182
|
Real-time operating system
|
22,538
|
727
|
Start
|
Mid
|
183
|
Institute of Electrical and Electronics Engineers
|
22,421
|
723
|
B
|
Top
|
184
|
Recursion (computer science)
|
22,228
|
717
|
C
|
Top
|
185
|
NP-hardness
|
22,201
|
716
|
C
|
High
|
186
|
QBittorrent
|
22,196
|
716
|
Stub
|
Low
|
187
|
Dependency inversion principle
|
22,162
|
714
|
Start
|
Low
|
188
|
Thread (computing)
|
21,777
|
702
|
C
|
High
|
189
|
Tf–idf
|
21,569
|
695
|
C
|
Low
|
190
|
HTML element
|
21,480
|
692
|
C
|
Mid
|
191
|
Source code
|
21,347
|
688
|
C
|
High
|
192
|
Software development process
|
21,199
|
683
|
C
|
Mid
|
193
|
Cosine similarity
|
21,171
|
682
|
C
|
Low
|
194
|
Interface (computing)
|
21,078
|
679
|
C
|
Low
|
195
|
Pareto efficiency
|
21,021
|
678
|
C
|
Mid
|
196
|
Neural network
|
20,957
|
676
|
B
|
High
|
197
|
Minimum spanning tree
|
20,692
|
667
|
C
|
High
|
198
|
Factory method pattern
|
20,630
|
665
|
Start
|
Mid
|
199
|
Brute-force attack
|
20,581
|
663
|
C
|
High
|
200
|
Smart city
|
20,518
|
661
|
C
|
Mid
|
201
|
Semaphore (programming)
|
20,491
|
661
|
Start
|
High
|
202
|
Inheritance (object-oriented programming)
|
20,413
|
658
|
Start
|
Mid
|
203
|
Deadlock
|
20,385
|
657
|
C
|
High
|
204
|
Recursion
|
20,214
|
652
|
C
|
Mid
|
205
|
AV1
|
20,174
|
650
|
B
|
Low
|
206
|
Software engineer
|
20,173
|
650
|
Start
|
Mid
|
207
|
Quantum logic gate
|
19,934
|
643
|
Start
|
Unknown
|
208
|
AlphaGo
|
19,880
|
641
|
C
|
High
|
209
|
Greedy algorithm
|
19,823
|
639
|
C
|
High
|
210
|
Data-flow diagram
|
19,773
|
637
|
Start
|
Mid
|
211
|
Markup language
|
19,752
|
637
|
C
|
High
|
212
|
Boolean data type
|
19,715
|
635
|
Start
|
Low
|
213
|
Observer pattern
|
19,688
|
635
|
Start
|
Mid
|
214
|
Graph (discrete mathematics)
|
19,429
|
626
|
B
|
High
|
215
|
Computing
|
19,367
|
624
|
C
|
High
|
216
|
Claude Shannon
|
19,326
|
623
|
B
|
High
|
217
|
Parsing
|
19,298
|
622
|
Start
|
Top
|
218
|
Strong and weak typing
|
19,246
|
620
|
Start
|
Mid
|
219
|
String (computer science)
|
19,231
|
620
|
Start
|
High
|
220
|
Continuous integration
|
19,225
|
620
|
B
|
Low
|
221
|
Integer (computer science)
|
19,222
|
620
|
C
|
Mid
|
222
|
In-place algorithm
|
19,091
|
615
|
Start
|
Unknown
|
223
|
Structured programming
|
19,024
|
613
|
Start
|
Mid
|
224
|
HackerRank
|
18,982
|
612
|
Start
|
Unknown
|
225
|
Liskov substitution principle
|
18,875
|
608
|
Start
|
Mid
|
226
|
Priority queue
|
18,767
|
605
|
C
|
High
|
227
|
Race condition
|
18,655
|
601
|
C
|
Mid
|
228
|
Unsupervised learning
|
18,619
|
600
|
C
|
Mid
|
229
|
Magic number (programming)
|
18,613
|
600
|
C
|
Mid
|
230
|
Naming convention (programming)
|
18,560
|
598
|
Start
|
Unknown
|
231
|
Inversion of control
|
18,515
|
597
|
Start
|
Low
|
232
|
Autoencoder
|
18,479
|
596
|
Start
|
Unknown
|
233
|
Garbage collection (computer science)
|
18,400
|
593
|
C
|
High
|
234
|
Abstraction
|
18,322
|
591
|
Start
|
High
|
235
|
Data model
|
18,304
|
590
|
C
|
High
|
236
|
Prolog
|
18,157
|
585
|
B
|
Mid
|
237
|
Automata theory
|
18,133
|
584
|
C
|
Top
|
238
|
Disjoint-set data structure
|
18,030
|
581
|
C
|
High
|
239
|
Human–computer interaction
|
17,807
|
574
|
C
|
Top
|
240
|
Avast Antivirus
|
17,645
|
569
|
Start
|
Mid
|
241
|
Maximum subarray problem
|
17,613
|
568
|
Unknown
|
Unknown
|
242
|
Pointer (computer programming)
|
17,567
|
566
|
C
|
High
|
243
|
Activation function
|
17,493
|
564
|
Start
|
Mid
|
244
|
AVL tree
|
17,487
|
564
|
C
|
High
|
245
|
Pseudocode
|
17,445
|
562
|
C
|
High
|
246
|
BERT (language model)
|
17,392
|
561
|
Start
|
Unknown
|
247
|
Shortest path problem
|
17,388
|
560
|
C
|
High
|
248
|
Bias–variance tradeoff
|
17,387
|
560
|
Start
|
Unknown
|
249
|
Automaton
|
17,377
|
560
|
C
|
High
|
250
|
Jaccard index
|
17,257
|
556
|
C
|
Mid
|
251
|
Intrusion detection system
|
16,876
|
544
|
Start
|
Low
|
252
|
Declarative programming
|
16,867
|
544
|
C
|
Top
|
253
|
Cyclomatic complexity
|
16,824
|
542
|
C
|
Low
|
254
|
Strategy pattern
|
16,807
|
542
|
Start
|
Mid
|
255
|
Adjacency matrix
|
16,597
|
535
|
C
|
Mid
|
256
|
Abstraction (computer science)
|
16,580
|
534
|
Start
|
Top
|
257
|
Deep Blue (chess computer)
|
16,566
|
534
|
C
|
Mid
|
258
|
Ada (programming language)
|
16,530
|
533
|
Unknown
|
Unknown
|
259
|
ISO/IEC 8859-1
|
16,510
|
532
|
Start
|
Unknown
|
260
|
Avast
|
16,405
|
529
|
B
|
Mid
|
261
|
Best, worst and average case
|
16,331
|
526
|
Start
|
High
|
262
|
Cognitive science
|
16,287
|
525
|
C
|
High
|
263
|
Selection sort
|
16,281
|
525
|
C
|
High
|
264
|
Ontology (information science)
|
16,257
|
524
|
C
|
High
|
265
|
Encapsulation (computer programming)
|
16,253
|
524
|
Start
|
High
|
266
|
Complex system
|
16,242
|
523
|
C
|
High
|
267
|
Cache replacement policies
|
16,194
|
522
|
C
|
Mid
|
268
|
Raster graphics
|
16,189
|
522
|
Start
|
Mid
|
269
|
Numerical analysis
|
16,132
|
520
|
B
|
Top
|
270
|
History of Python
|
16,120
|
520
|
C
|
Low
|
271
|
Hamming distance
|
16,051
|
517
|
Start
|
High
|
272
|
Pseudorandom number generator
|
16,030
|
517
|
C
|
High
|
273
|
Markov chain Monte Carlo
|
15,983
|
515
|
C
|
High
|
274
|
Monad (functional programming)
|
15,973
|
515
|
B
|
Mid
|
275
|
Scaled agile framework
|
15,967
|
515
|
C
|
Low
|
276
|
Abstract data type
|
15,890
|
512
|
C
|
High
|
277
|
Heuristic (computer science)
|
15,830
|
510
|
Unknown
|
Unknown
|
278
|
Internet Engineering Task Force
|
15,803
|
509
|
C
|
Mid
|
279
|
Multiple inheritance
|
15,731
|
507
|
C
|
Mid
|
280
|
Expectation–maximization algorithm
|
15,619
|
503
|
C
|
High
|
281
|
Queue (abstract data type)
|
15,615
|
503
|
Start
|
Top
|
282
|
Context-free grammar
|
15,600
|
503
|
B
|
Top
|
283
|
Checksum
|
15,564
|
502
|
Start
|
Mid
|
284
|
Color depth
|
15,431
|
497
|
C
|
Low
|
285
|
Computational fluid dynamics
|
15,326
|
494
|
B
|
High
|
286
|
Class (computer programming)
|
15,294
|
493
|
Start
|
High
|
287
|
Turing Award
|
15,281
|
492
|
Start
|
Top
|
288
|
Composition over inheritance
|
15,203
|
490
|
C
|
Low
|
289
|
For loop
|
15,194
|
490
|
B
|
High
|
290
|
Rendering (computer graphics)
|
15,065
|
485
|
B
|
High
|
291
|
Variable (computer science)
|
15,047
|
485
|
Start
|
Top
|
292
|
Foobar
|
15,018
|
484
|
C
|
Mid
|
293
|
Prim's algorithm
|
15,015
|
484
|
C
|
High
|
294
|
Role-based access control
|
14,891
|
480
|
C
|
Mid
|
295
|
Data visualization
|
14,816
|
477
|
C
|
High
|
296
|
Bellman–Ford algorithm
|
14,732
|
475
|
C
|
Mid
|
297
|
Binary heap
|
14,609
|
471
|
B
|
High
|
298
|
Boolean satisfiability problem
|
14,604
|
471
|
C
|
Mid
|
299
|
Bjarne Stroustrup
|
14,584
|
470
|
Start
|
High
|
300
|
POST (HTTP)
|
14,576
|
470
|
Start
|
Low
|
301
|
Event-driven programming
|
14,569
|
469
|
Start
|
High
|
302
|
Multiplication sign
|
14,562
|
469
|
C
|
Low
|
303
|
Kruskal's algorithm
|
14,543
|
469
|
Start
|
High
|
304
|
Simplex algorithm
|
14,493
|
467
|
C
|
High
|
305
|
Code
|
14,474
|
466
|
C
|
High
|
306
|
Sparse matrix
|
14,408
|
464
|
C
|
Mid
|
307
|
Deep learning super sampling
|
14,374
|
463
|
C
|
Low
|
308
|
Edsger W. Dijkstra
|
14,336
|
462
|
B
|
High
|
309
|
Relational model
|
14,331
|
462
|
C
|
Top
|
310
|
Vint Cerf
|
14,325
|
462
|
Start
|
Mid
|
311
|
Process (computing)
|
14,306
|
461
|
C
|
Mid
|
312
|
Heapsort
|
14,300
|
461
|
B
|
High
|
313
|
Macro (computer science)
|
14,247
|
459
|
C
|
Mid
|
314
|
HTTP Live Streaming
|
14,245
|
459
|
Start
|
Low
|
315
|
Hierarchical clustering
|
14,223
|
458
|
C
|
Mid
|
316
|
Error detection and correction
|
14,186
|
457
|
C
|
Unknown
|
317
|
Category theory
|
14,137
|
456
|
B
|
High
|
318
|
Floyd–Warshall algorithm
|
14,052
|
453
|
B
|
High
|
319
|
K-d tree
|
14,049
|
453
|
C
|
Low
|
320
|
Cellular automaton
|
14,028
|
452
|
B
|
Top
|
321
|
Business Process Model and Notation
|
14,028
|
452
|
Start
|
Mid
|
322
|
Marvin Minsky
|
13,915
|
448
|
C
|
Unknown
|
323
|
Bresenham's line algorithm
|
13,907
|
448
|
C
|
Mid
|
324
|
Applications of artificial intelligence
|
13,831
|
446
|
C
|
Low
|
325
|
Memetics
|
13,824
|
445
|
Start
|
Unknown
|
326
|
Builder pattern
|
13,622
|
439
|
Start
|
Unknown
|
327
|
Reed–Solomon error correction
|
13,560
|
437
|
C
|
Mid
|
328
|
Decorator pattern
|
13,501
|
435
|
Start
|
Low
|
329
|
Hamming code
|
13,479
|
434
|
C
|
High
|
330
|
Lossless compression
|
13,467
|
434
|
C
|
High
|
331
|
Cut, copy, and paste
|
13,386
|
431
|
C
|
High
|
332
|
DBSCAN
|
13,386
|
431
|
C
|
Mid
|
333
|
Longest palindromic substring
|
13,356
|
430
|
C
|
Low
|
334
|
Digital Revolution
|
13,198
|
425
|
Start
|
Mid
|
335
|
Amdahl's law
|
13,183
|
425
|
C
|
High
|
336
|
Mersenne Twister
|
13,163
|
424
|
Unknown
|
Unknown
|
337
|
Watson (computer)
|
13,132
|
423
|
GA
|
Mid
|
338
|
Signal processing
|
13,074
|
421
|
C
|
Low
|
339
|
Row- and column-major order
|
13,029
|
420
|
C
|
Mid
|
340
|
Subroutine
|
12,991
|
419
|
C
|
Top
|
341
|
Primality test
|
12,879
|
415
|
Start
|
Mid
|
342
|
Lenna
|
12,871
|
415
|
C
|
Unknown
|
343
|
Routing
|
12,853
|
414
|
C
|
Mid
|
344
|
Formal language
|
12,851
|
414
|
C
|
High
|
345
|
NP (complexity)
|
12,848
|
414
|
C
|
High
|
346
|
Ensemble learning
|
12,826
|
413
|
C
|
Mid
|
347
|
Memory management
|
12,818
|
413
|
C
|
High
|
348
|
AWK
|
12,634
|
407
|
B
|
Mid
|
349
|
Esoteric programming language
|
12,557
|
405
|
Start
|
Unknown
|
350
|
Actor model
|
12,524
|
404
|
C
|
Mid
|
351
|
Data modeling
|
12,511
|
403
|
C
|
High
|
352
|
Smalltalk
|
12,484
|
402
|
Start
|
Mid
|
353
|
Deterministic finite automaton
|
12,430
|
400
|
Start
|
High
|
354
|
Expert system
|
12,421
|
400
|
Start
|
Mid
|
355
|
Closure (computer programming)
|
12,395
|
399
|
C
|
Mid
|
356
|
The Art of Computer Programming
|
12,384
|
399
|
C
|
Top
|
357
|
Computer science and engineering
|
12,309
|
397
|
Start
|
Low
|
358
|
Exception handling
|
12,303
|
396
|
B
|
Mid
|
359
|
Conditional (computer programming)
|
12,274
|
395
|
C
|
Mid
|
360
|
Directed graph
|
12,251
|
395
|
C
|
High
|
361
|
Word (computer architecture)
|
12,218
|
394
|
C
|
Mid
|
362
|
Web API
|
12,205
|
393
|
Unknown
|
Unknown
|
363
|
Voxel
|
12,132
|
391
|
C
|
Mid
|
364
|
Visitor pattern
|
12,105
|
390
|
Start
|
Unknown
|
365
|
Luis von Ahn
|
12,037
|
388
|
Start
|
Unknown
|
366
|
List of tools for static code analysis
|
11,990
|
386
|
List
|
Low
|
367
|
Residual neural network
|
11,990
|
386
|
Start
|
Low
|
368
|
B+ tree
|
11,967
|
386
|
Start
|
High
|
369
|
Procedural generation
|
11,964
|
385
|
Start
|
Unknown
|
370
|
Radix sort
|
11,944
|
385
|
Start
|
High
|
371
|
Longest common subsequence problem
|
11,912
|
384
|
Start
|
High
|
372
|
Conflict-free replicated data type
|
11,886
|
383
|
C
|
High
|
373
|
Lexical analysis
|
11,858
|
382
|
C
|
High
|
374
|
Coupling (computer programming)
|
11,838
|
381
|
Start
|
High
|
375
|
Particle swarm optimization
|
11,688
|
377
|
C
|
Mid
|
376
|
Ackermann function
|
11,674
|
376
|
B
|
Mid
|
377
|
AlphaFold
|
11,674
|
376
|
C
|
Low
|
378
|
Aspect-oriented programming
|
11,622
|
374
|
Start
|
Mid
|
379
|
Computational complexity theory
|
11,612
|
374
|
C
|
Top
|
380
|
Robert C. Martin
|
11,606
|
374
|
Start
|
Mid
|
381
|
Concurrent computing
|
11,585
|
373
|
C
|
High
|
382
|
Operator overloading
|
11,525
|
371
|
C
|
Mid
|
383
|
Adapter pattern
|
11,471
|
370
|
Start
|
Unknown
|
384
|
Sudoku solving algorithms
|
11,461
|
369
|
B
|
Low
|
385
|
Password cracking
|
11,415
|
368
|
C
|
Low
|
386
|
Linear congruential generator
|
11,356
|
366
|
Start
|
Mid
|
387
|
List of pioneers in computer science
|
11,337
|
365
|
List
|
Unknown
|
388
|
Hungarian notation
|
11,294
|
364
|
Start
|
Low
|
389
|
Graph coloring
|
11,184
|
360
|
B
|
Mid
|
390
|
Logo (programming language)
|
11,168
|
360
|
C
|
Mid
|
391
|
Anti-pattern
|
11,121
|
358
|
C
|
Mid
|
392
|
Sankey diagram
|
11,119
|
358
|
C
|
Low
|
393
|
Nim
|
11,066
|
356
|
C
|
Unknown
|
394
|
Shift register
|
11,004
|
354
|
Start
|
Unknown
|
395
|
Cruft
|
10,966
|
353
|
Start
|
Low
|
396
|
Coroutine
|
10,902
|
351
|
C
|
Mid
|
397
|
APL (programming language)
|
10,897
|
351
|
B
|
Mid
|
398
|
Subset sum problem
|
10,863
|
350
|
C
|
Low
|
399
|
Mean time between failures
|
10,815
|
348
|
Start
|
Low
|
400
|
Linear search
|
10,767
|
347
|
Start
|
Mid
|
401
|
Identity management
|
10,707
|
345
|
C
|
Unknown
|
402
|
Circular buffer
|
10,696
|
345
|
Start
|
Mid
|
403
|
Decision theory
|
10,683
|
344
|
C
|
High
|
404
|
Anonymous function
|
10,666
|
344
|
C
|
Mid
|
405
|
Ben Horowitz
|
10,612
|
342
|
Start
|
Low
|
406
|
List of datasets for machine-learning research
|
10,605
|
342
|
List
|
Mid
|
407
|
The Open Group Architecture Framework
|
10,572
|
341
|
Start
|
High
|
408
|
Static program analysis
|
10,463
|
337
|
C
|
Mid
|
409
|
Federated learning
|
10,462
|
337
|
Start
|
Low
|
410
|
Command pattern
|
10,400
|
335
|
Start
|
Mid
|
411
|
Triple DES
|
10,381
|
334
|
Start
|
Unknown
|
412
|
D (programming language)
|
10,346
|
333
|
C
|
Low
|
413
|
VP9
|
10,345
|
333
|
C
|
Low
|
414
|
Control flow
|
10,311
|
332
|
B
|
Top
|
415
|
Division algorithm
|
10,265
|
331
|
C
|
High
|
416
|
Call stack
|
10,178
|
328
|
C
|
Mid
|
417
|
Fourth-generation programming language
|
10,157
|
327
|
Start
|
Mid
|
418
|
Ones' complement
|
10,101
|
325
|
Start
|
Mid
|
419
|
Type theory
|
10,091
|
325
|
C
|
High
|
420
|
Monte Carlo tree search
|
10,075
|
325
|
C
|
Mid
|
421
|
Intelligent agent
|
10,027
|
323
|
Unknown
|
Unknown
|
422
|
Memory hierarchy
|
10,020
|
323
|
Start
|
Mid
|
423
|
Geoffrey Hinton
|
10,009
|
322
|
C
|
Low
|
424
|
Binary file
|
9,972
|
321
|
C
|
High
|
425
|
C++ classes
|
9,969
|
321
|
C
|
Low
|
426
|
Haxe
|
9,949
|
320
|
C
|
Low
|
427
|
Anomaly detection
|
9,923
|
320
|
Start
|
Mid
|
428
|
Do while loop
|
9,818
|
316
|
Unknown
|
Unknown
|
429
|
Skip list
|
9,756
|
314
|
C
|
Mid
|
430
|
Search algorithm
|
9,690
|
312
|
Start
|
Top
|
431
|
Microkernel
|
9,674
|
312
|
C
|
High
|
432
|
Information science
|
9,670
|
311
|
Start
|
Top
|
433
|
Knuth–Morris–Pratt algorithm
|
9,665
|
311
|
Start
|
High
|
434
|
Web developer
|
9,653
|
311
|
Start
|
Mid
|
435
|
DeepDream
|
9,639
|
310
|
Start
|
Low
|
436
|
Database model
|
9,628
|
310
|
C
|
Top
|
437
|
ABAP
|
9,606
|
309
|
C
|
Low
|
438
|
Branch and bound
|
9,577
|
308
|
Start
|
Mid
|
439
|
Shannon–Hartley theorem
|
9,573
|
308
|
C
|
High
|
440
|
Canny edge detector
|
9,558
|
308
|
Start
|
Mid
|
441
|
Master theorem (analysis of algorithms)
|
9,457
|
305
|
C
|
High
|
442
|
Hyper-threading
|
9,428
|
304
|
C
|
Low
|
443
|
Cycle detection
|
9,412
|
303
|
B
|
Low
|
444
|
Reactive programming
|
9,405
|
303
|
Start
|
Unknown
|
445
|
All-points bulletin
|
9,328
|
300
|
Unknown
|
Unknown
|
446
|
Colossus computer
|
9,295
|
299
|
B
|
Mid
|
447
|
Check digit
|
9,291
|
299
|
Start
|
Mid
|
448
|
Named-entity recognition
|
9,280
|
299
|
C
|
Unknown
|
449
|
Squeak
|
9,272
|
299
|
B
|
Mid
|
450
|
Information hiding
|
9,221
|
297
|
Start
|
Mid
|
451
|
Code smell
|
9,190
|
296
|
C
|
Low
|
452
|
List of unsolved problems in computer science
|
9,146
|
295
|
List
|
Mid
|
453
|
Existential risk from artificial general intelligence
|
9,128
|
294
|
C
|
Mid
|
454
|
Paxos (computer science)
|
9,112
|
293
|
C
|
Low
|
455
|
Open-source license
|
9,108
|
293
|
Start
|
Unknown
|
456
|
Decentraland
|
9,107
|
293
|
Stub
|
Low
|
457
|
Chomsky hierarchy
|
9,084
|
293
|
Start
|
Top
|
458
|
Extended ASCII
|
9,063
|
292
|
C
|
Low
|
459
|
Currying
|
9,057
|
292
|
C
|
High
|
460
|
Directory (computing)
|
9,040
|
291
|
C
|
Low
|
461
|
Generic programming
|
9,039
|
291
|
C
|
High
|
462
|
Consistent hashing
|
9,009
|
290
|
Stub
|
Unknown
|
463
|
Signed number representations
|
8,981
|
289
|
C
|
High
|
464
|
8-bit computing
|
8,960
|
289
|
Start
|
High
|
465
|
Theory of computation
|
8,944
|
288
|
C
|
Top
|
466
|
Object-oriented analysis and design
|
8,926
|
287
|
Start
|
High
|
467
|
Alice and Bob
|
8,917
|
287
|
Start
|
Low
|
468
|
Logic programming
|
8,911
|
287
|
B
|
Top
|
469
|
Spaghetti code
|
8,894
|
286
|
Start
|
Mid
|
470
|
Associative array
|
8,892
|
286
|
C
|
High
|
471
|
Rob Pike
|
8,878
|
286
|
Start
|
Unknown
|
472
|
Scope (computer science)
|
8,864
|
285
|
C
|
High
|
473
|
Function overloading
|
8,806
|
284
|
Unknown
|
Unknown
|
474
|
Pushdown automaton
|
8,777
|
283
|
B
|
High
|
475
|
Real-time computing
|
8,735
|
281
|
C
|
High
|
476
|
Ladder logic
|
8,690
|
280
|
Start
|
Low
|
477
|
Computer scientist
|
8,680
|
280
|
Start
|
Top
|
478
|
State diagram
|
8,606
|
277
|
C
|
Mid
|
479
|
Bogosort
|
8,574
|
276
|
Start
|
Low
|
480
|
Church–Turing thesis
|
8,552
|
275
|
C
|
Top
|
481
|
Thrashing (computer science)
|
8,540
|
275
|
C
|
Low
|
482
|
User error
|
8,524
|
274
|
Start
|
High
|
483
|
Edge detection
|
8,501
|
274
|
C
|
Mid
|
484
|
Coding theory
|
8,479
|
273
|
C
|
High
|
485
|
Planar graph
|
8,465
|
273
|
B
|
Mid
|
486
|
Multiplication algorithm
|
8,439
|
272
|
C
|
Low
|
487
|
Imo.im
|
8,410
|
271
|
Stub
|
Low
|
488
|
Kolmogorov complexity
|
8,359
|
269
|
B
|
High
|
489
|
Data (computing)
|
8,350
|
269
|
C
|
Top
|
490
|
Relational operator
|
8,345
|
269
|
C
|
Mid
|
491
|
Memory leak
|
8,330
|
268
|
C
|
Mid
|
492
|
Quick, Draw!
|
8,314
|
268
|
Stub
|
Low
|
493
|
Analysis of algorithms
|
8,300
|
267
|
C
|
Top
|
494
|
Graph (abstract data type)
|
8,299
|
267
|
C
|
Top
|
495
|
Lossy compression
|
8,261
|
266
|
Start
|
High
|
496
|
Linker (computing)
|
8,260
|
266
|
C
|
Mid
|
497
|
JSONP
|
8,248
|
266
|
C
|
Low
|
498
|
Two-phase commit protocol
|
8,223
|
265
|
C
|
High
|
499
|
Shunting-yard algorithm
|
8,211
|
264
|
Unknown
|
Unknown
|
500
|
Test case
|
8,149
|
262
|
Start
|
Unknown
|
501
|
Enterprise architecture
|
8,126
|
262
|
Start
|
Mid
|
502
|
Data structure alignment
|
8,115
|
261
|
Start
|
Mid
|
503
|
Redux (JavaScript library)
|
8,097
|
261
|
Start
|
Low
|
504
|
Email spoofing
|
8,068
|
260
|
Start
|
Low
|
505
|
Ubiquitous computing
|
8,068
|
260
|
C
|
High
|
506
|
API testing
|
8,065
|
260
|
Unknown
|
Unknown
|
507
|
Code coverage
|
8,021
|
258
|
C
|
Low
|
508
|
Run-length encoding
|
8,015
|
258
|
Start
|
Mid
|
509
|
GPT-2
|
7,969
|
257
|
B
|
Low
|
510
|
Code page 437
|
7,965
|
256
|
C
|
Low
|
511
|
Dining philosophers problem
|
7,959
|
256
|
Start
|
Top
|
512
|
Comparison of integrated development environments
|
7,923
|
255
|
Start
|
Low
|
513
|
Self-balancing binary search tree
|
7,891
|
254
|
Start
|
Mid
|
514
|
Theoretical computer science
|
7,885
|
254
|
B
|
Top
|
515
|
Mutual exclusion
|
7,885
|
254
|
C
|
Top
|
516
|
Root-finding algorithms
|
7,846
|
253
|
Unknown
|
Unknown
|
517
|
Nondeterministic finite automaton
|
7,845
|
253
|
B
|
High
|
518
|
Inverter (logic gate)
|
7,816
|
252
|
Start
|
Unknown
|
519
|
Maze generation algorithm
|
7,805
|
251
|
Start
|
Unknown
|
520
|
Feature selection
|
7,798
|
251
|
C
|
Mid
|
521
|
Units of information
|
7,754
|
250
|
C
|
Mid
|
522
|
EBCDIC
|
7,748
|
249
|
Start
|
Mid
|
523
|
Longest common substring problem
|
7,735
|
249
|
Start
|
Mid
|
524
|
Cell (microprocessor)
|
7,735
|
249
|
B
|
Mid
|
525
|
Grover's algorithm
|
7,722
|
249
|
C
|
Mid
|
526
|
Agent-based model
|
7,713
|
248
|
C
|
Mid
|
527
|
Doubly linked list
|
7,645
|
246
|
Start
|
High
|
528
|
Fragmentation (computing)
|
7,589
|
244
|
C
|
Mid
|
529
|
Data governance
|
7,583
|
244
|
C
|
Unknown
|
530
|
Brute-force search
|
7,575
|
244
|
Start
|
Mid
|
531
|
Data access object
|
7,535
|
243
|
Start
|
Unknown
|
532
|
Combinatorial optimization
|
7,526
|
242
|
C
|
Top
|
533
|
Andrey Kolmogorov
|
7,480
|
241
|
C
|
High
|
534
|
ALGOL
|
7,455
|
240
|
C
|
High
|
535
|
String-searching algorithm
|
7,432
|
239
|
Start
|
High
|
536
|
Curiously recurring template pattern
|
7,422
|
239
|
C
|
Low
|
537
|
Boolean
|
7,392
|
238
|
Disambig
|
NA
|
538
|
Abstract factory pattern
|
7,369
|
237
|
Start
|
Mid
|
539
|
Process management (computing)
|
7,344
|
236
|
C
|
Low
|
540
|
Nonlinear programming
|
7,334
|
236
|
C
|
Mid
|
541
|
Swarm intelligence
|
7,318
|
236
|
C
|
Mid
|
542
|
Computational linguistics
|
7,309
|
235
|
Start
|
High
|
543
|
Bucket sort
|
7,299
|
235
|
C
|
High
|
544
|
Universal Turing machine
|
7,286
|
235
|
C
|
Mid
|
545
|
Tail call
|
7,260
|
234
|
C
|
Mid
|
546
|
Ant colony optimization algorithms
|
7,255
|
234
|
B
|
Low
|
547
|
3D audio effect
|
7,249
|
233
|
Start
|
Unknown
|
548
|
Delimiter
|
7,246
|
233
|
C
|
Mid
|
549
|
16K resolution
|
7,234
|
233
|
Start
|
Unknown
|
550
|
Tony Hoare
|
7,228
|
233
|
C
|
High
|
551
|
Counting sort
|
7,217
|
232
|
C
|
High
|
552
|
Consensus (computer science)
|
7,198
|
232
|
Start
|
High
|
553
|
JavaScript engine
|
7,194
|
232
|
Start
|
Mid
|
554
|
Common Lisp
|
7,186
|
231
|
Start
|
Mid
|
555
|
Cohesion (computer science)
|
7,184
|
231
|
Unknown
|
Unknown
|
556
|
Distributed operating system
|
7,171
|
231
|
C
|
Mid
|
557
|
Matrix multiplication algorithm
|
7,158
|
230
|
C
|
Mid
|
558
|
Model–view–presenter
|
7,158
|
230
|
C
|
High
|
559
|
Sycamore processor
|
7,149
|
230
|
Stub
|
Low
|
560
|
Branch predictor
|
7,136
|
230
|
C
|
Mid
|
561
|
Extended Backus–Naur form
|
7,102
|
229
|
C
|
Mid
|
562
|
Composite pattern
|
7,081
|
228
|
Start
|
Unknown
|
563
|
Artificial consciousness
|
7,060
|
227
|
C
|
Unknown
|
564
|
Identifier
|
7,056
|
227
|
Start
|
Low
|
565
|
Judea Pearl
|
7,055
|
227
|
C
|
Mid
|
566
|
Maze-solving algorithm
|
7,018
|
226
|
Unknown
|
Unknown
|
567
|
Async/await
|
6,991
|
225
|
C
|
Mid
|
568
|
Higher-order function
|
6,961
|
224
|
Start
|
High
|
569
|
Concurrency (computer science)
|
6,949
|
224
|
Start
|
Top
|
570
|
Evolutionary algorithm
|
6,929
|
223
|
C
|
Mid
|
571
|
Apriori algorithm
|
6,926
|
223
|
C
|
Mid
|
572
|
Binary space partitioning
|
6,902
|
222
|
C
|
Low
|
573
|
Computer graphics (computer science)
|
6,898
|
222
|
Start
|
Top
|
574
|
Fluent interface
|
6,879
|
221
|
Stub
|
Unknown
|
575
|
Hazard (computer architecture)
|
6,858
|
221
|
C
|
Low
|
576
|
JPEG 2000
|
6,853
|
221
|
C
|
Low
|
577
|
Information management
|
6,838
|
220
|
C
|
Unknown
|
578
|
Synchronization (computer science)
|
6,830
|
220
|
Unknown
|
Unknown
|
579
|
Multiclass classification
|
6,813
|
219
|
Start
|
Mid
|
580
|
Sandbox (software development)
|
6,782
|
218
|
Start
|
Low
|
581
|
Code.org
|
6,777
|
218
|
C
|
Low
|
582
|
Approximate string matching
|
6,756
|
217
|
C
|
Mid
|
583
|
Vehicle routing problem
|
6,753
|
217
|
Unknown
|
Unknown
|
584
|
Component (graph theory)
|
6,736
|
217
|
Start
|
Mid
|
585
|
Strassen algorithm
|
6,728
|
217
|
C
|
Low
|
586
|
Computational biology
|
6,728
|
217
|
C
|
High
|
587
|
Leslie Lamport
|
6,724
|
216
|
Start
|
High
|
588
|
L-system
|
6,717
|
216
|
Unknown
|
Unknown
|
589
|
GrabCAD
|
6,700
|
216
|
Unknown
|
Unknown
|
590
|
R-tree
|
6,672
|
215
|
C
|
Mid
|
591
|
Knowledge graph
|
6,672
|
215
|
Start
|
High
|
592
|
Double-ended queue
|
6,669
|
215
|
Start
|
High
|
593
|
Constraint satisfaction problem
|
6,663
|
214
|
C
|
Mid
|
594
|
Legacy system
|
6,630
|
213
|
C
|
Unknown
|
595
|
Non-English-based programming languages
|
6,613
|
213
|
List
|
Low
|
596
|
Glossary of graph theory
|
6,610
|
213
|
List
|
Mid
|
597
|
Bill Joy
|
6,604
|
213
|
C
|
Unknown
|
598
|
Attribute-based access control
|
6,603
|
213
|
Unknown
|
Unknown
|
599
|
Loose coupling
|
6,558
|
211
|
Start
|
High
|
600
|
Quickselect
|
6,557
|
211
|
C
|
Low
|
601
|
Gradle
|
6,532
|
210
|
C
|
Low
|
602
|
Computational science
|
6,524
|
210
|
Start
|
Top
|
603
|
Attention (machine learning)
|
6,518
|
210
|
Stub
|
Unknown
|
604
|
Cargo cult programming
|
6,514
|
210
|
Start
|
Low
|
605
|
Alonzo Church
|
6,502
|
209
|
C
|
Top
|
606
|
Web (programming system)
|
6,495
|
209
|
Stub
|
Mid
|
607
|
Digital data
|
6,493
|
209
|
C
|
Low
|
608
|
Pointing stick
|
6,483
|
209
|
C
|
Low
|
609
|
Short-circuit evaluation
|
6,477
|
208
|
Start
|
Mid
|
610
|
Snippet (programming)
|
6,475
|
208
|
Start
|
Low
|
611
|
Google Brain
|
6,466
|
208
|
C
|
Unknown
|
612
|
Time formatting and storage bugs
|
6,463
|
208
|
B
|
Low
|
613
|
Smartglasses
|
6,457
|
208
|
C
|
Low
|
614
|
Mixin
|
6,440
|
207
|
Start
|
Low
|
615
|
Opcode
|
6,415
|
206
|
C
|
High
|
616
|
Goto
|
6,412
|
206
|
C
|
Mid
|
617
|
Webmaster
|
6,404
|
206
|
Start
|
Low
|
618
|
Vorbis
|
6,383
|
205
|
C
|
Low
|
619
|
State pattern
|
6,378
|
205
|
Start
|
Unknown
|
620
|
C99
|
6,378
|
205
|
C
|
Mid
|
621
|
Edit distance
|
6,373
|
205
|
C
|
Mid
|
622
|
Message queue
|
6,353
|
204
|
Unknown
|
Unknown
|
623
|
Template method pattern
|
6,340
|
204
|
Start
|
Low
|
624
|
Metaheuristic
|
6,309
|
203
|
Start
|
Mid
|
625
|
CORDIC
|
6,306
|
203
|
B
|
Mid
|
626
|
Adjacency list
|
6,303
|
203
|
C
|
Mid
|
627
|
Ethics of artificial intelligence
|
6,285
|
202
|
B
|
Top
|
628
|
Mixed reality
|
6,282
|
202
|
B
|
Unknown
|
629
|
Neuromorphic engineering
|
6,277
|
202
|
Unknown
|
Unknown
|
630
|
Max-flow min-cut theorem
|
6,275
|
202
|
Start
|
High
|
631
|
Artbreeder
|
6,251
|
201
|
Start
|
Low
|
632
|
Algebraic data type
|
6,218
|
200
|
Start
|
Low
|
633
|
First-class function
|
6,212
|
200
|
C
|
High
|
634
|
MurmurHash
|
6,211
|
200
|
Start
|
Low
|
635
|
Radix tree
|
6,195
|
199
|
C
|
Mid
|
636
|
Quantum key distribution
|
6,189
|
199
|
B
|
Mid
|
637
|
8-bit color
|
6,178
|
199
|
Start
|
Low
|
638
|
Clique problem
|
6,165
|
198
|
GA
|
Mid
|
639
|
Adversarial machine learning
|
6,154
|
198
|
C
|
Mid
|
640
|
Association for Computing Machinery
|
6,141
|
198
|
C
|
Top
|
641
|
Search engine indexing
|
6,137
|
197
|
C
|
Unknown
|
642
|
Petri net
|
6,136
|
197
|
B
|
Mid
|
643
|
Profiling (computer programming)
|
6,136
|
197
|
C
|
Mid
|
644
|
Eugene Kaspersky
|
6,107
|
197
|
GA
|
Low
|
645
|
Parsing expression grammar
|
6,106
|
196
|
B
|
Mid
|
646
|
Kai-Fu Lee
|
6,079
|
196
|
Start
|
Unknown
|
647
|
Amortized analysis
|
6,063
|
195
|
Start
|
High
|
648
|
Computer performance
|
6,061
|
195
|
Start
|
Mid
|
649
|
Syntactic sugar
|
6,026
|
194
|
C
|
Mid
|
650
|
Privilege escalation
|
6,015
|
194
|
Start
|
Low
|
651
|
Generalized additive model
|
5,982
|
192
|
Start
|
Low
|
652
|
Covariance and contravariance (computer science)
|
5,959
|
192
|
Start
|
High
|
653
|
Comparison of programming paradigms
|
5,933
|
191
|
C
|
Low
|
654
|
Program optimization
|
5,932
|
191
|
B
|
High
|
655
|
Maximum flow problem
|
5,930
|
191
|
C
|
High
|
656
|
Miller–Rabin primality test
|
5,874
|
189
|
C
|
High
|
657
|
Unique identifier
|
5,872
|
189
|
Start
|
Unknown
|
658
|
Sorting
|
5,844
|
188
|
Start
|
High
|
659
|
Text mining
|
5,826
|
187
|
Start
|
Unknown
|
660
|
Recursive descent parser
|
5,824
|
187
|
Start
|
High
|
661
|
Pranav Mistry
|
5,809
|
187
|
Start
|
Low
|
662
|
Segment tree
|
5,798
|
187
|
Unknown
|
Unknown
|
663
|
First-class citizen
|
5,793
|
186
|
Stub
|
Low
|
664
|
ActionScript
|
5,790
|
186
|
C
|
Low
|
665
|
C++23
|
5,782
|
186
|
Stub
|
Low
|
666
|
Aho–Corasick algorithm
|
5,757
|
185
|
Start
|
Mid
|
667
|
Message passing
|
5,751
|
185
|
Start
|
High
|
668
|
Infinite loop
|
5,746
|
185
|
Start
|
Mid
|
669
|
Requirements engineering
|
5,718
|
184
|
Start
|
Unknown
|
670
|
Type conversion
|
5,696
|
183
|
C
|
High
|
671
|
Computational complexity
|
5,691
|
183
|
C
|
Top
|
672
|
Lempel–Ziv–Welch
|
5,679
|
183
|
C
|
Unknown
|
673
|
Online machine learning
|
5,678
|
183
|
C
|
Mid
|
674
|
Demand paging
|
5,647
|
182
|
Start
|
Mid
|
675
|
Quantum information
|
5,641
|
181
|
Start
|
High
|
676
|
Dynamic array
|
5,624
|
181
|
C
|
Mid
|
677
|
Don Norman
|
5,616
|
181
|
Start
|
Mid
|
678
|
Tagged union
|
5,609
|
180
|
Start
|
Low
|
679
|
Deno (software)
|
5,598
|
180
|
Start
|
Low
|
680
|
Elbow method (clustering)
|
5,595
|
180
|
Unknown
|
Unknown
|
681
|
HyperLogLog
|
5,586
|
180
|
C
|
Unknown
|
682
|
Boyer–Moore string-search algorithm
|
5,585
|
180
|
C
|
High
|
683
|
Lazy evaluation
|
5,583
|
180
|
C
|
High
|
684
|
Limited-memory BFGS
|
5,567
|
179
|
Unknown
|
Unknown
|
685
|
List of NP-complete problems
|
5,546
|
178
|
List
|
High
|
686
|
Object database
|
5,539
|
178
|
Start
|
High
|
687
|
Vala (programming language)
|
5,527
|
178
|
Start
|
Low
|
688
|
Evaluation strategy
|
5,524
|
178
|
C
|
Top
|
689
|
Fibonacci heap
|
5,506
|
177
|
C
|
High
|
690
|
Iterative deepening depth-first search
|
5,497
|
177
|
Start
|
Low
|
691
|
Tree structure
|
5,491
|
177
|
Start
|
High
|
692
|
Adam D'Angelo
|
5,489
|
177
|
Start
|
Low
|
693
|
Shellsort
|
5,462
|
176
|
B
|
High
|
694
|
Mock object
|
5,457
|
176
|
Start
|
Unknown
|
695
|
Computational thinking
|
5,428
|
175
|
Start
|
Unknown
|
696
|
Splay tree
|
5,383
|
173
|
C
|
Mid
|
697
|
Wojciech Zaremba
|
5,366
|
173
|
Start
|
Unknown
|
698
|
Query language
|
5,353
|
172
|
Start
|
Mid
|
699
|
Enterprise architecture framework
|
5,353
|
172
|
Start
|
Unknown
|
700
|
No free lunch theorem
|
5,352
|
172
|
Start
|
Mid
|
701
|
User-centered design
|
5,348
|
172
|
Start
|
Mid
|
702
|
Andrew S. Tanenbaum
|
5,329
|
171
|
C
|
Mid
|
703
|
Compare-and-swap
|
5,318
|
171
|
C
|
Low
|
704
|
Vertex cover
|
5,311
|
171
|
C
|
Mid
|
705
|
ISO/IEC 646
|
5,301
|
171
|
Start
|
Unknown
|
706
|
Codewars
|
5,289
|
170
|
Stub
|
Low
|
707
|
Inverted index
|
5,285
|
170
|
Start
|
Mid
|
708
|
Artificial life
|
5,280
|
170
|
B
|
High
|
709
|
Third-generation programming language
|
5,253
|
169
|
Start
|
Mid
|
710
|
List (abstract data type)
|
5,249
|
169
|
Start
|
High
|
711
|
Quantum algorithm
|
5,223
|
168
|
C
|
High
|
712
|
Zero-shot learning
|
5,222
|
168
|
C
|
Unknown
|
713
|
Cuckoo hashing
|
5,222
|
168
|
C
|
Mid
|
714
|
C string handling
|
5,218
|
168
|
C
|
Low
|
715
|
Damerau–Levenshtein distance
|
5,213
|
168
|
Start
|
Low
|
716
|
Computational neuroscience
|
5,199
|
167
|
B
|
Mid
|
717
|
Coq
|
5,198
|
167
|
Start
|
Mid
|
718
|
Median of medians
|
5,191
|
167
|
C
|
Low
|
719
|
Dynamic programming language
|
5,191
|
167
|
Start
|
Mid
|
720
|
Proxy pattern
|
5,183
|
167
|
Start
|
Mid
|
721
|
3GP and 3G2
|
5,178
|
167
|
Unknown
|
Unknown
|
722
|
Chernoff bound
|
5,174
|
166
|
Start
|
Low
|
723
|
Semantics (computer science)
|
5,155
|
166
|
C
|
Top
|
724
|
Formal grammar
|
5,131
|
165
|
C
|
Mid
|
725
|
Statement (computer science)
|
5,130
|
165
|
Start
|
Mid
|
726
|
Computational complexity of mathematical operations
|
5,123
|
165
|
B
|
Mid
|
727
|
Curry–Howard correspondence
|
5,103
|
164
|
C
|
High
|
728
|
Deep reinforcement learning
|
5,095
|
164
|
Stub
|
Unknown
|
729
|
Relational database management system
|
5,080
|
163
|
NA
|
NA
|
730
|
X265
|
5,076
|
163
|
C
|
Low
|
731
|
Set cover problem
|
5,070
|
163
|
C
|
Mid
|
732
|
Information processing
|
5,070
|
163
|
Start
|
Unknown
|
733
|
Factory (object-oriented programming)
|
5,069
|
163
|
C
|
Low
|
734
|
Rabin–Karp algorithm
|
5,064
|
163
|
C
|
Mid
|
735
|
Wiener filter
|
5,063
|
163
|
Start
|
Unknown
|
736
|
Data quality
|
5,062
|
163
|
Start
|
Low
|
737
|
Log-structured merge-tree
|
5,037
|
162
|
Start
|
Mid
|
738
|
Computation
|
5,037
|
162
|
Start
|
Top
|
739
|
Pattern matching
|
5,035
|
162
|
C
|
Mid
|
740
|
Graph isomorphism
|
5,012
|
161
|
Start
|
Mid
|
741
|
Gladys West
|
4,997
|
161
|
B
|
Low
|
742
|
Distributed version control
|
4,992
|
161
|
Start
|
Mid
|
743
|
Umple
|
4,978
|
160
|
Start
|
Low
|
744
|
Static single assignment form
|
4,974
|
160
|
C
|
Mid
|
745
|
General-purpose programming language
|
4,964
|
160
|
Stub
|
Mid
|
746
|
Prefix sum
|
4,962
|
160
|
Unknown
|
Unknown
|
747
|
Standard ML
|
4,943
|
159
|
C
|
Mid
|
748
|
Two-phase locking
|
4,938
|
159
|
C
|
High
|
749
|
Algorithmic efficiency
|
4,936
|
159
|
C
|
High
|
750
|
C--
|
4,912
|
158
|
Start
|
Low
|
751
|
Communicating sequential processes
|
4,912
|
158
|
B
|
Top
|
752
|
Glossary of computer science
|
4,909
|
158
|
List
|
Top
|
753
|
Isolation forest
|
4,907
|
158
|
C
|
Low
|
754
|
Null-terminated string
|
4,903
|
158
|
Start
|
Low
|
755
|
Formal verification
|
4,896
|
157
|
Start
|
High
|
756
|
Computational chemistry
|
4,889
|
157
|
B
|
Top
|
757
|
A Mathematical Theory of Communication
|
4,888
|
157
|
Start
|
High
|
758
|
Ford–Fulkerson algorithm
|
4,888
|
157
|
Start
|
High
|
759
|
Boltzmann machine
|
4,883
|
157
|
C
|
Low
|
760
|
LL parser
|
4,882
|
157
|
Start
|
High
|
761
|
Compilers: Principles, Techniques, and Tools
|
4,879
|
157
|
Stub
|
Low
|
762
|
Computability theory
|
4,836
|
156
|
B
|
Top
|
763
|
Longest increasing subsequence
|
4,773
|
153
|
C
|
Mid
|
764
|
Nondeterministic Turing machine
|
4,744
|
153
|
C
|
High
|
765
|
Fold (higher-order function)
|
4,724
|
152
|
Start
|
Mid
|
766
|
Jaro–Winkler distance
|
4,721
|
152
|
Unknown
|
Unknown
|
767
|
Three-valued logic
|
4,711
|
151
|
Start
|
Low
|
768
|
Timeline of quantum computing and communication
|
4,703
|
151
|
List
|
Mid
|
769
|
Machine epsilon
|
4,701
|
151
|
Unknown
|
Unknown
|
770
|
List of fictional computers
|
4,689
|
151
|
Unknown
|
Unknown
|
771
|
Terry Winograd
|
4,686
|
151
|
Start
|
Unknown
|
772
|
Q (number format)
|
4,667
|
150
|
Unknown
|
Unknown
|
773
|
Niklaus Wirth
|
4,633
|
149
|
Start
|
High
|
774
|
Metaprogramming
|
4,630
|
149
|
C
|
Mid
|
775
|
Cook–Levin theorem
|
4,628
|
149
|
B
|
High
|
776
|
Outline of computer science
|
4,627
|
149
|
Start
|
Mid
|
777
|
Raft (algorithm)
|
4,625
|
149
|
C
|
Low
|
778
|
Intermediate representation
|
4,614
|
148
|
Start
|
Low
|
779
|
Flyweight pattern
|
4,611
|
148
|
Start
|
Unknown
|
780
|
Continuation-passing style
|
4,596
|
148
|
Start
|
Mid
|
781
|
DNS rebinding
|
4,596
|
148
|
Unknown
|
Unknown
|
782
|
De Bruijn sequence
|
4,596
|
148
|
C
|
Mid
|
783
|
Learning rate
|
4,592
|
148
|
Unknown
|
Unknown
|
784
|
Asynchronous I/O
|
4,592
|
148
|
C
|
Mid
|
785
|
Hamiltonian path problem
|
4,579
|
147
|
C
|
Mid
|
786
|
Thundering herd problem
|
4,568
|
147
|
Start
|
Unknown
|
787
|
Multi-label classification
|
4,565
|
147
|
Unknown
|
Unknown
|
788
|
Computer algebra
|
4,544
|
146
|
Start
|
Mid
|
789
|
Fixed-point combinator
|
4,543
|
146
|
C
|
Mid
|
790
|
Model of computation
|
4,520
|
145
|
Start
|
Mid
|
791
|
Suffix tree
|
4,509
|
145
|
C
|
High
|
792
|
Thread pool
|
4,501
|
145
|
Unknown
|
Unknown
|
793
|
Multi-agent system
|
4,499
|
145
|
Start
|
Mid
|
794
|
History of computer science
|
4,497
|
145
|
B
|
Top
|
795
|
Wrapper function
|
4,494
|
144
|
Start
|
Low
|
796
|
External sorting
|
4,488
|
144
|
Unknown
|
Unknown
|
797
|
Duff's device
|
4,485
|
144
|
C
|
Low
|
798
|
Datalog
|
4,474
|
144
|
Unknown
|
Unknown
|
799
|
State (computer science)
|
4,458
|
143
|
Start
|
Mid
|
800
|
List of object-oriented programming languages
|
4,449
|
143
|
List
|
Low
|
801
|
Hamming weight
|
4,444
|
143
|
C
|
Unknown
|
802
|
Operator associativity
|
4,436
|
143
|
Start
|
Unknown
|
803
|
List of computer scientists
|
4,430
|
142
|
Unknown
|
Unknown
|
804
|
Parametric design
|
4,426
|
142
|
Start
|
Unknown
|
805
|
Optimizing compiler
|
4,425
|
142
|
Start
|
High
|
806
|
Longest path problem
|
4,414
|
142
|
C
|
Low
|
807
|
Independent set (graph theory)
|
4,412
|
142
|
C
|
Mid
|
808
|
LR parser
|
4,407
|
142
|
Start
|
High
|
809
|
Beam search
|
4,395
|
141
|
Stub
|
Unknown
|
810
|
Side effect (computer science)
|
4,390
|
141
|
C
|
Mid
|
811
|
Space complexity
|
4,388
|
141
|
Start
|
Unknown
|
812
|
Metasyntactic variable
|
4,383
|
141
|
Unknown
|
Unknown
|
813
|
Restricted Boltzmann machine
|
4,383
|
141
|
Unknown
|
Unknown
|
814
|
Perfect hash function
|
4,378
|
141
|
C
|
Unknown
|
815
|
Stylometry
|
4,376
|
141
|
C
|
Low
|
816
|
Computer-integrated manufacturing
|
4,364
|
140
|
Start
|
Mid
|
817
|
State space search
|
4,361
|
140
|
Unknown
|
Unknown
|
818
|
LeNet
|
4,355
|
140
|
Start
|
Unknown
|
819
|
Bridge pattern
|
4,350
|
140
|
Start
|
Low
|
820
|
Topological data analysis
|
4,349
|
140
|
C
|
Low
|
821
|
Solution architecture
|
4,348
|
140
|
Start
|
Unknown
|
822
|
Treemapping
|
4,343
|
140
|
C
|
Mid
|
823
|
Denormal number
|
4,341
|
140
|
Unknown
|
Unknown
|
824
|
Hash collision
|
4,334
|
139
|
Start
|
Low
|
825
|
Monte Carlo algorithm
|
4,333
|
139
|
C
|
Mid
|
826
|
Type safety
|
4,304
|
138
|
C
|
Mid
|
827
|
Symbol table
|
4,302
|
138
|
C
|
Low
|
828
|
Translation studies
|
4,296
|
138
|
Start
|
Mid
|
829
|
Reentrancy (computing)
|
4,292
|
138
|
Start
|
Mid
|
830
|
Object file
|
4,283
|
138
|
Start
|
Mid
|
831
|
Formal methods
|
4,282
|
138
|
Start
|
Top
|
832
|
Needleman–Wunsch algorithm
|
4,269
|
137
|
Start
|
Mid
|
833
|
Video coding format
|
4,268
|
137
|
C
|
Unknown
|
834
|
Memory segmentation
|
4,267
|
137
|
Stub
|
Mid
|
835
|
Moravec's paradox
|
4,266
|
137
|
Start
|
Unknown
|
836
|
Boids
|
4,255
|
137
|
Unknown
|
Unknown
|
837
|
Signed zero
|
4,234
|
136
|
C
|
Low
|
838
|
DALL-E
|
4,222
|
136
|
B
|
Unknown
|
839
|
Delegation pattern
|
4,221
|
136
|
Start
|
Mid
|
840
|
Hard coding
|
4,203
|
135
|
Start
|
Low
|
841
|
Calling convention
|
4,195
|
135
|
Start
|
High
|
842
|
Semantic network
|
4,177
|
134
|
Start
|
Low
|
843
|
Interval tree
|
4,175
|
134
|
Start
|
Mid
|
844
|
Smith–Waterman algorithm
|
4,165
|
134
|
B
|
Mid
|
845
|
Randomized algorithm
|
4,164
|
134
|
C
|
High
|
846
|
Selection algorithm
|
4,157
|
134
|
C
|
Mid
|
847
|
Vapnik–Chervonenkis dimension
|
4,147
|
133
|
Start
|
Mid
|
848
|
Cyclic permutation
|
4,137
|
133
|
Start
|
Unknown
|
849
|
Kleene star
|
4,137
|
133
|
Start
|
High
|
850
|
Zettabyte Era
|
4,137
|
133
|
B
|
Low
|
851
|
Branch (computer science)
|
4,127
|
133
|
Start
|
Mid
|
852
|
X86 memory segmentation
|
4,124
|
133
|
Start
|
Mid
|
853
|
Challenge–response authentication
|
4,118
|
132
|
Start
|
Low
|
854
|
Immersion (virtual reality)
|
4,093
|
132
|
Start
|
Low
|
855
|
Lowest common ancestor
|
4,093
|
132
|
Start
|
Unknown
|
856
|
Build automation
|
4,092
|
132
|
Start
|
Low
|
857
|
Kent Beck
|
4,070
|
131
|
Start
|
Mid
|
858
|
Blob detection
|
4,055
|
130
|
Start
|
Mid
|
859
|
Operational transformation
|
4,053
|
130
|
B
|
Unknown
|
860
|
Substring
|
4,050
|
130
|
Unknown
|
Unknown
|
861
|
Hindley–Milner type system
|
4,042
|
130
|
B
|
High
|
862
|
Rule 110
|
4,033
|
130
|
Start
|
Unknown
|
863
|
List of computer algebra systems
|
4,016
|
129
|
List
|
Low
|
864
|
4,294,967,295
|
4,013
|
129
|
Stub
|
Low
|
865
|
Pipeline (software)
|
4,002
|
129
|
Start
|
Mid
|
866
|
Vendor lock-in
|
3,986
|
128
|
C
|
Mid
|
867
|
Jelani Nelson
|
3,984
|
128
|
C
|
Unknown
|
868
|
Coding conventions
|
3,958
|
127
|
Unknown
|
Unknown
|
869
|
Hard link
|
3,941
|
127
|
Start
|
Low
|
870
|
Timeline of machine learning
|
3,909
|
126
|
Unknown
|
Unknown
|
871
|
Object code
|
3,907
|
126
|
Start
|
Mid
|
872
|
Runtime (program lifecycle phase)
|
3,901
|
125
|
Start
|
High
|
873
|
IEEE 754-1985
|
3,874
|
124
|
C
|
Low
|
874
|
Double-checked locking
|
3,871
|
124
|
Unknown
|
Unknown
|
875
|
Matrix chain multiplication
|
3,863
|
124
|
Unknown
|
Unknown
|
876
|
Automated theorem proving
|
3,850
|
124
|
Start
|
Mid
|
877
|
Terminal and nonterminal symbols
|
3,847
|
124
|
C
|
Mid
|
878
|
Set (abstract data type)
|
3,842
|
123
|
Start
|
High
|
879
|
BCH code
|
3,833
|
123
|
C
|
Unknown
|
880
|
Marching cubes
|
3,826
|
123
|
Start
|
Mid
|
881
|
Best-first search
|
3,820
|
123
|
Stub
|
Unknown
|
882
|
Control-flow graph
|
3,807
|
122
|
C
|
Mid
|
883
|
Dual linear program
|
3,806
|
122
|
Start
|
Low
|
884
|
Babel (transcompiler)
|
3,799
|
122
|
Stub
|
Low
|
885
|
CiteSeerX
|
3,797
|
122
|
Start
|
High
|
886
|
Array programming
|
3,781
|
121
|
C
|
Low
|
887
|
Electronic data processing
|
3,781
|
121
|
Start
|
Unknown
|
888
|
Quantum programming
|
3,779
|
121
|
Start
|
Mid
|
889
|
Job-shop scheduling
|
3,776
|
121
|
C
|
Mid
|
890
|
Peterson's algorithm
|
3,773
|
121
|
C
|
Mid
|
891
|
Cropping (image)
|
3,760
|
121
|
C
|
Unknown
|
892
|
Function pointer
|
3,757
|
121
|
Start
|
Low
|
893
|
Zachman Framework
|
3,746
|
120
|
Start
|
Unknown
|
894
|
Artificial Intelligence: A Modern Approach
|
3,735
|
120
|
Start
|
Unknown
|
895
|
Homotopy type theory
|
3,729
|
120
|
C
|
Low
|
896
|
Genetic programming
|
3,724
|
120
|
B
|
Mid
|
897
|
Apache Flink
|
3,721
|
120
|
Start
|
Unknown
|
898
|
Decision problem
|
3,720
|
120
|
Start
|
Mid
|
899
|
Topological insulator
|
3,719
|
119
|
Start
|
Unknown
|
900
|
Women in computing
|
3,719
|
119
|
B
|
High
|
901
|
Dependent type
|
3,718
|
119
|
Start
|
High
|
902
|
Purely functional programming
|
3,711
|
119
|
Start
|
Low
|
903
|
Hybrid log–gamma
|
3,701
|
119
|
Start
|
Low
|
904
|
Raj Reddy
|
3,696
|
119
|
B
|
Unknown
|
905
|
Clipping (computer graphics)
|
3,679
|
118
|
Start
|
Mid
|
906
|
Yukihiro Matsumoto
|
3,663
|
118
|
Start
|
Unknown
|
907
|
Transitive closure
|
3,656
|
117
|
C
|
Low
|
908
|
Systems modeling
|
3,653
|
117
|
Start
|
Unknown
|
909
|
Programming language theory
|
3,641
|
117
|
Start
|
Top
|
910
|
Concurrency control
|
3,633
|
117
|
C
|
Top
|
911
|
Color code
|
3,630
|
117
|
Unknown
|
Unknown
|
912
|
Lloyd's algorithm
|
3,615
|
116
|
Start
|
Mid
|
913
|
Approximation algorithm
|
3,595
|
115
|
Start
|
High
|
914
|
Nested function
|
3,594
|
115
|
Start
|
Unknown
|
915
|
Min-max heap
|
3,593
|
115
|
Start
|
Mid
|
916
|
Data architecture
|
3,589
|
115
|
Start
|
Mid
|
917
|
Comparison of parser generators
|
3,582
|
115
|
List
|
Mid
|
918
|
Context-free language
|
3,580
|
115
|
Start
|
Mid
|
919
|
Basic feasible solution
|
3,577
|
115
|
Start
|
Mid
|
920
|
Numerical method
|
3,577
|
115
|
Stub
|
Unknown
|
921
|
Satisfiability modulo theories
|
3,566
|
115
|
Start
|
Low
|
922
|
Phong reflection model
|
3,565
|
115
|
Unknown
|
Unknown
|
923
|
Kahan summation algorithm
|
3,559
|
114
|
Start
|
Unknown
|
924
|
Nasir Ahmed (engineer)
|
3,550
|
114
|
Start
|
Unknown
|
925
|
Reference counting
|
3,515
|
113
|
C
|
Mid
|
926
|
Software developer
|
3,500
|
112
|
NA
|
Low
|
927
|
Schönhage–Strassen algorithm
|
3,498
|
112
|
C
|
High
|
928
|
Barbara Liskov
|
3,495
|
112
|
C
|
High
|
929
|
Avalanche effect
|
3,493
|
112
|
Start
|
Unknown
|
930
|
Differentiable programming
|
3,491
|
112
|
Stub
|
Unknown
|
931
|
Stream processing
|
3,487
|
112
|
C
|
Mid
|
932
|
Sophie Zhang (whistleblower)
|
3,485
|
112
|
Start
|
Low
|
933
|
Wearable computer
|
3,482
|
112
|
C
|
Mid
|
934
|
Stack machine
|
3,471
|
111
|
C
|
Mid
|
935
|
Eiffel (programming language)
|
3,443
|
111
|
Start
|
Mid
|
936
|
Soundex
|
3,434
|
110
|
C
|
Unknown
|
937
|
Computer Go
|
3,419
|
110
|
B
|
Low
|
938
|
Sanjay Ghemawat
|
3,416
|
110
|
Start
|
Mid
|
939
|
Pseudorandom binary sequence
|
3,408
|
109
|
Start
|
Mid
|
940
|
Spanner (database)
|
3,385
|
109
|
Unknown
|
Unknown
|
941
|
Software agent
|
3,380
|
109
|
Start
|
High
|
942
|
Object composition
|
3,370
|
108
|
Start
|
Low
|
943
|
Ronald Graham
|
3,365
|
108
|
GA
|
Mid
|
944
|
Cyc
|
3,362
|
108
|
C
|
Low
|
945
|
Oracle machine
|
3,346
|
107
|
C
|
Mid
|
946
|
Evolutionary computation
|
3,345
|
107
|
C
|
Low
|
947
|
Computing Machinery and Intelligence
|
3,335
|
107
|
C
|
High
|
948
|
H.262/MPEG-2 Part 2
|
3,319
|
107
|
Stub
|
Low
|
949
|
Triplet loss
|
3,315
|
106
|
Stub
|
Low
|
950
|
Syntax highlighting
|
3,308
|
106
|
C
|
Low
|
951
|
Dartmouth workshop
|
3,305
|
106
|
Start
|
Low
|
952
|
J (programming language)
|
3,302
|
106
|
Start
|
Low
|
953
|
Functional reactive programming
|
3,298
|
106
|
Start
|
Unknown
|
954
|
Parametric polymorphism
|
3,285
|
105
|
C
|
Mid
|
955
|
DNA computing
|
3,279
|
105
|
C
|
Mid
|
956
|
Lazy initialization
|
3,277
|
105
|
Start
|
Low
|
957
|
Constraint satisfaction
|
3,270
|
105
|
C
|
Low
|
958
|
Church encoding
|
3,269
|
105
|
B
|
Unknown
|
959
|
State machine replication
|
3,259
|
105
|
C
|
High
|
960
|
Admissible heuristic
|
3,255
|
105
|
Start
|
Unknown
|
961
|
SHI International Corp
|
3,249
|
104
|
Start
|
Low
|
962
|
Self-modifying code
|
3,238
|
104
|
C
|
Mid
|
963
|
One-instruction set computer
|
3,230
|
104
|
Start
|
Unknown
|
964
|
Behavior tree (artificial intelligence, robotics and control)
|
3,227
|
104
|
Start
|
Unknown
|
965
|
Foreign function interface
|
3,213
|
103
|
Start
|
Low
|
966
|
Smart pointer
|
3,212
|
103
|
C
|
Low
|
967
|
Silvio Micali
|
3,202
|
103
|
Start
|
Unknown
|
968
|
Deterministic algorithm
|
3,197
|
103
|
Start
|
High
|
969
|
Handwriting recognition
|
3,185
|
102
|
C
|
Mid
|
970
|
Complexity class
|
3,176
|
102
|
C
|
High
|
971
|
SIGGRAPH
|
3,175
|
102
|
Start
|
Mid
|
972
|
Alfred Aho
|
3,158
|
101
|
Unknown
|
Unknown
|
973
|
Entry point
|
3,157
|
101
|
Stub
|
Mid
|
974
|
Bounding volume hierarchy
|
3,153
|
101
|
Unknown
|
Unknown
|
975
|
Software rot
|
3,152
|
101
|
Unknown
|
Unknown
|
976
|
Jamie Zawinski
|
3,141
|
101
|
Start
|
Low
|
977
|
Reversible computing
|
3,138
|
101
|
C
|
Mid
|
978
|
Robert Cailliau
|
3,130
|
100
|
Start
|
Unknown
|
979
|
Rule 30
|
3,120
|
100
|
Start
|
Unknown
|
980
|
Search tree
|
3,117
|
100
|
Stub
|
Unknown
|
981
|
God's algorithm
|
3,116
|
100
|
C
|
Unknown
|
982
|
Richard Hamming
|
3,113
|
100
|
GA
|
Mid
|
983
|
Business rules engine
|
3,110
|
100
|
Start
|
Unknown
|
984
|
Operator-precedence parser
|
3,108
|
100
|
C
|
Mid
|
985
|
3D reconstruction from multiple images
|
3,105
|
100
|
Unknown
|
Unknown
|
986
|
Blue-green deployment
|
3,105
|
100
|
Stub
|
Low
|
987
|
Leonid Khachiyan
|
3,105
|
100
|
Stub
|
Low
|
988
|
Linear code
|
3,098
|
99
|
Start
|
High
|
989
|
Union type
|
3,091
|
99
|
C
|
Mid
|
990
|
Seymour Papert
|
3,084
|
99
|
C
|
Mid
|
991
|
Shift JIS
|
3,083
|
99
|
Start
|
Low
|
992
|
Agnostic (data)
|
3,062
|
98
|
Unknown
|
Unknown
|
993
|
Starvation (computer science)
|
3,054
|
98
|
Start
|
Mid
|
994
|
Automatic summarization
|
3,053
|
98
|
C
|
Unknown
|
995
|
Chomsky normal form
|
3,048
|
98
|
Start
|
Mid
|
996
|
Rule-based system
|
3,044
|
98
|
Unknown
|
Unknown
|
997
|
Green threads
|
3,036
|
97
|
Start
|
Low
|
998
|
Knowledge-based systems
|
3,033
|
97
|
Start
|
Unknown
|
999
|
John Backus
|
3,026
|
97
|
C
|
High
|
1000
|
Dutch national flag problem
|
3,025
|
97
|
Start
|
Mid
|