Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
JavaScript
|
557,967
|
18,598
|
B
|
Mid
|
2
|
C++
|
531,088
|
17,702
|
B
|
High
|
3
|
Java (programming language)
|
426,735
|
14,224
|
C
|
Mid
|
4
|
Artificial intelligence
|
353,996
|
11,799
|
B
|
Top
|
5
|
Python (programming language)
|
301,291
|
10,043
|
GA
|
Mid
|
6
|
C (programming language)
|
284,607
|
9,486
|
B
|
High
|
7
|
Computer
|
281,159
|
9,371
|
C
|
Top
|
8
|
Operating system
|
186,933
|
6,231
|
B
|
High
|
9
|
HTML
|
158,040
|
5,268
|
B
|
Top
|
10
|
Go (programming language)
|
123,751
|
4,125
|
C
|
Low
|
11
|
Video game
|
117,980
|
3,932
|
B
|
Mid
|
12
|
Machine learning
|
110,364
|
3,678
|
B
|
High
|
13
|
Tim Berners-Lee
|
109,818
|
3,660
|
C
|
Top
|
14
|
Agile software development
|
104,316
|
3,477
|
B
|
High
|
15
|
Google Search
|
103,820
|
3,460
|
C
|
High
|
16
|
Prisoner's dilemma
|
101,894
|
3,396
|
C
|
High
|
17
|
Regular expression
|
99,965
|
3,332
|
B
|
High
|
18
|
Big O notation
|
97,990
|
3,266
|
B
|
Top
|
19
|
JSON
|
96,205
|
3,206
|
B
|
Mid
|
20
|
Computer science
|
93,704
|
3,123
|
C
|
Top
|
21
|
R (programming language)
|
91,395
|
3,046
|
C
|
Mid
|
22
|
PHP
|
91,004
|
3,033
|
GA
|
Mid
|
23
|
Order of operations
|
90,502
|
3,016
|
C
|
Mid
|
24
|
Ajax (programming)
|
86,905
|
2,896
|
Start
|
High
|
25
|
Unix
|
86,641
|
2,888
|
B
|
Mid
|
26
|
Algorithm
|
85,901
|
2,863
|
B
|
Top
|
27
|
Assembly language
|
84,087
|
2,802
|
B
|
High
|
28
|
Open-source software
|
77,164
|
2,572
|
C
|
Top
|
29
|
Programming language
|
77,074
|
2,569
|
B
|
Top
|
30
|
Web colors
|
75,823
|
2,527
|
C
|
Mid
|
31
|
Database
|
75,460
|
2,515
|
C
|
Top
|
32
|
C Sharp (programming language)
|
74,636
|
2,487
|
B
|
Low
|
33
|
Conway's Game of Life
|
74,111
|
2,470
|
B
|
High
|
34
|
UTF-8
|
72,838
|
2,427
|
B
|
Mid
|
35
|
ECMAScript
|
69,429
|
2,314
|
C
|
Mid
|
36
|
Programming paradigm
|
69,348
|
2,311
|
C
|
Mid
|
37
|
Data science
|
67,915
|
2,263
|
Start
|
High
|
38
|
Dijkstra's algorithm
|
67,528
|
2,250
|
C
|
Top
|
39
|
Rust (programming language)
|
64,277
|
2,142
|
B
|
Mid
|
40
|
Moore's law
|
63,950
|
2,131
|
B
|
Mid
|
41
|
Two's complement
|
60,088
|
2,002
|
B
|
High
|
42
|
Software engineering
|
57,787
|
1,926
|
C
|
Top
|
43
|
Deep learning
|
57,549
|
1,918
|
C
|
High
|
44
|
Floating-point arithmetic
|
54,843
|
1,828
|
B
|
Top
|
45
|
Quicksort
|
54,374
|
1,812
|
B
|
Top
|
46
|
Millennium Prize Problems
|
54,048
|
1,801
|
C
|
Mid
|
47
|
Bitwise operation
|
53,894
|
1,796
|
C
|
High
|
48
|
Computer programming
|
53,618
|
1,787
|
C
|
Top
|
49
|
A* search algorithm
|
53,396
|
1,779
|
B
|
Mid
|
50
|
Artificial neural network
|
53,002
|
1,766
|
C
|
Mid
|
51
|
Cryptography
|
52,650
|
1,755
|
B
|
Top
|
52
|
Binary search algorithm
|
52,348
|
1,744
|
FA
|
High
|
53
|
Programmer
|
51,990
|
1,733
|
C
|
Mid
|
54
|
Monte Carlo method
|
51,869
|
1,728
|
B
|
High
|
55
|
Model–view–controller
|
50,203
|
1,673
|
Start
|
Mid
|
56
|
Turing machine
|
49,795
|
1,659
|
B
|
Top
|
57
|
De Morgan's laws
|
49,360
|
1,645
|
Start
|
High
|
58
|
RGB color model
|
49,308
|
1,643
|
B
|
Low
|
59
|
Scratch (programming language)
|
48,236
|
1,607
|
C
|
Low
|
60
|
Heuristic
|
47,908
|
1,596
|
C
|
Mid
|
61
|
P versus NP problem
|
46,542
|
1,551
|
B
|
Top
|
62
|
Turing test
|
46,043
|
1,534
|
B
|
High
|
63
|
Support-vector machine
|
45,933
|
1,531
|
C
|
Mid
|
64
|
Katherine Johnson
|
45,738
|
1,524
|
GA
|
High
|
65
|
K-means clustering
|
45,646
|
1,521
|
C
|
Mid
|
66
|
Information
|
45,371
|
1,512
|
C
|
Top
|
67
|
Travelling salesman problem
|
45,047
|
1,501
|
B
|
Top
|
68
|
Hash function
|
44,734
|
1,491
|
C
|
High
|
69
|
Hash table
|
43,669
|
1,455
|
B
|
High
|
70
|
Computer program
|
43,368
|
1,445
|
B
|
Top
|
71
|
Time complexity
|
43,307
|
1,443
|
B
|
High
|
72
|
Software design pattern
|
43,241
|
1,441
|
C
|
High
|
73
|
Kernel (operating system)
|
43,083
|
1,436
|
B
|
High
|
74
|
Unified Modeling Language
|
42,788
|
1,426
|
C
|
High
|
75
|
Natural language processing
|
42,646
|
1,421
|
C
|
Top
|
76
|
Sorting algorithm
|
42,619
|
1,420
|
C
|
Top
|
77
|
Fortran
|
42,195
|
1,406
|
C
|
Mid
|
78
|
Free and open-source software
|
42,071
|
1,402
|
C
|
Top
|
79
|
Merge sort
|
42,030
|
1,401
|
C
|
High
|
80
|
Boolean algebra
|
41,372
|
1,379
|
B
|
High
|
81
|
Elixir (programming language)
|
41,325
|
1,377
|
Unknown
|
Unknown
|
82
|
Data mining
|
40,646
|
1,354
|
B
|
High
|
83
|
Dennis Ritchie
|
40,415
|
1,347
|
Start
|
Top
|
84
|
W3Schools
|
39,343
|
1,311
|
Stub
|
Unknown
|
85
|
Fast inverse square root
|
39,228
|
1,307
|
GA
|
Low
|
86
|
Data structure
|
39,119
|
1,303
|
C
|
Top
|
87
|
TypeScript
|
38,826
|
1,294
|
C
|
Low
|
88
|
Breadth-first search
|
38,308
|
1,276
|
Start
|
High
|
89
|
OpenAI
|
38,222
|
1,274
|
Start
|
Low
|
90
|
Sieve of Eratosthenes
|
38,199
|
1,273
|
C
|
Mid
|
91
|
Malware
|
37,948
|
1,264
|
C
|
High
|
92
|
Finite-state machine
|
37,274
|
1,242
|
B
|
Top
|
93
|
Brainfuck
|
36,943
|
1,231
|
C
|
Low
|
94
|
Bubble sort
|
36,633
|
1,221
|
B
|
High
|
95
|
Compiler
|
36,429
|
1,214
|
C
|
Top
|
96
|
AArch64
|
36,133
|
1,204
|
Start
|
Low
|
97
|
Lisp (programming language)
|
36,086
|
1,202
|
B
|
High
|
98
|
Procedural programming
|
36,063
|
1,202
|
Start
|
Mid
|
99
|
Relational database
|
36,013
|
1,200
|
C
|
Top
|
100
|
Insertion sort
|
35,293
|
1,176
|
B
|
High
|
101
|
Exclusive or
|
35,180
|
1,172
|
C
|
Mid
|
102
|
Discrete mathematics
|
34,743
|
1,158
|
B
|
Top
|
103
|
Graph theory
|
34,672
|
1,155
|
C
|
Top
|
104
|
IEEE 754
|
34,634
|
1,154
|
C
|
High
|
105
|
Tower of Hanoi
|
34,148
|
1,138
|
C
|
Mid
|
106
|
High Efficiency Video Coding
|
33,826
|
1,127
|
B
|
Low
|
107
|
Advanced Video Coding
|
33,473
|
1,115
|
C
|
Low
|
108
|
Type system
|
33,438
|
1,114
|
B
|
High
|
109
|
Dynamic programming
|
33,324
|
1,110
|
B
|
Top
|
110
|
NoSQL
|
33,300
|
1,110
|
C
|
Low
|
111
|
Array data structure
|
33,230
|
1,107
|
C
|
Top
|
112
|
Depth-first search
|
33,114
|
1,103
|
C
|
Top
|
113
|
Linear programming
|
32,926
|
1,097
|
B
|
High
|
114
|
Directed acyclic graph
|
32,561
|
1,085
|
GA
|
High
|
115
|
Cognition
|
31,743
|
1,058
|
C
|
Low
|
116
|
Linked list
|
31,704
|
1,056
|
B
|
Top
|
117
|
Levenshtein distance
|
31,452
|
1,048
|
C
|
Mid
|
118
|
Floor and ceiling functions
|
30,513
|
1,017
|
B
|
Mid
|
119
|
Computer engineering
|
30,337
|
1,011
|
C
|
Top
|
120
|
Imperative programming
|
29,926
|
997
|
C
|
Top
|
121
|
BASIC
|
29,811
|
993
|
C
|
Mid
|
122
|
Turing completeness
|
29,686
|
989
|
C
|
Top
|
123
|
Optical character recognition
|
29,627
|
987
|
C
|
Mid
|
124
|
Heap (data structure)
|
29,455
|
981
|
C
|
High
|
125
|
Donald Knuth
|
29,422
|
980
|
B
|
Top
|
126
|
Binary search tree
|
29,318
|
977
|
C
|
High
|
127
|
Computer architecture
|
29,304
|
976
|
C
|
Top
|
128
|
Lua (programming language)
|
29,123
|
970
|
C
|
Mid
|
129
|
Knapsack problem
|
29,049
|
968
|
B
|
Mid
|
130
|
High-level programming language
|
28,996
|
966
|
Start
|
High
|
131
|
Data type
|
28,646
|
954
|
C
|
Mid
|
132
|
Abstraction
|
28,624
|
954
|
Start
|
High
|
133
|
Version control
|
28,460
|
948
|
C
|
High
|
134
|
Lambda calculus
|
28,426
|
947
|
B
|
Top
|
135
|
Haskell (programming language)
|
28,055
|
935
|
B
|
Mid
|
136
|
Class diagram
|
28,001
|
933
|
Start
|
Low
|
137
|
Stack (abstract data type)
|
27,921
|
930
|
C
|
High
|
138
|
Cluster analysis
|
27,638
|
921
|
C
|
High
|
139
|
Swift (programming language)
|
27,348
|
911
|
B
|
Mid
|
140
|
Bioinformatics
|
27,280
|
909
|
C
|
High
|
141
|
Stochastic gradient descent
|
27,119
|
903
|
Start
|
Mid
|
142
|
Whitespace character
|
27,031
|
901
|
B
|
Mid
|
143
|
Cybernetics
|
26,974
|
899
|
B
|
Mid
|
144
|
Singleton pattern
|
26,725
|
890
|
C
|
Mid
|
145
|
Institute of Electrical and Electronics Engineers
|
26,710
|
890
|
B
|
Top
|
146
|
POSIX
|
26,521
|
884
|
Start
|
Mid
|
147
|
Free software
|
26,390
|
879
|
C
|
Top
|
148
|
Mathematical optimization
|
25,807
|
860
|
B
|
High
|
149
|
Information theory
|
25,580
|
852
|
B
|
Top
|
150
|
Tree (data structure)
|
25,508
|
850
|
C
|
High
|
151
|
Avast Antivirus
|
25,493
|
849
|
Start
|
Mid
|
152
|
Qubit
|
25,225
|
840
|
Start
|
High
|
153
|
Strong and weak typing
|
25,030
|
834
|
Start
|
Mid
|
154
|
Usage share of operating systems
|
24,964
|
832
|
B
|
High
|
155
|
Cross-site request forgery
|
24,759
|
825
|
C
|
High
|
156
|
Hackathon
|
24,674
|
822
|
Start
|
Mid
|
157
|
NP-completeness
|
24,493
|
816
|
C
|
Top
|
158
|
Pseudocode
|
24,411
|
813
|
C
|
High
|
159
|
Tf–idf
|
24,371
|
812
|
C
|
Low
|
160
|
Distributed computing
|
24,267
|
808
|
B
|
Top
|
161
|
Red–black tree
|
24,177
|
805
|
C
|
High
|
162
|
Binary tree
|
24,164
|
805
|
B
|
Top
|
163
|
Don't repeat yourself
|
23,998
|
799
|
Start
|
Mid
|
164
|
Artificial general intelligence
|
23,870
|
795
|
C
|
Mid
|
165
|
Computer vision
|
23,847
|
794
|
C
|
Mid
|
166
|
NP-hardness
|
23,810
|
793
|
C
|
High
|
167
|
Computing
|
23,729
|
790
|
C
|
High
|
168
|
B-tree
|
23,670
|
789
|
C
|
High
|
169
|
Software development process
|
23,668
|
788
|
C
|
Mid
|
170
|
Pareto efficiency
|
23,602
|
786
|
C
|
Mid
|
171
|
Halting problem
|
23,475
|
782
|
B
|
Top
|
172
|
Polymorphism (computer science)
|
23,360
|
778
|
C
|
High
|
173
|
Quantum logic gate
|
23,170
|
772
|
Start
|
Unknown
|
174
|
Computer graphics
|
23,146
|
771
|
B
|
Top
|
175
|
Ken Thompson
|
23,119
|
770
|
B
|
Top
|
176
|
Smart city
|
23,032
|
767
|
C
|
Mid
|
177
|
Cosine similarity
|
22,994
|
766
|
C
|
Low
|
178
|
Operations research
|
22,973
|
765
|
C
|
High
|
179
|
Scripting language
|
22,938
|
764
|
C
|
Mid
|
180
|
Dependency inversion principle
|
22,839
|
761
|
Start
|
Low
|
181
|
Genetic algorithm
|
22,675
|
755
|
C
|
High
|
182
|
Trie
|
22,586
|
752
|
B
|
High
|
183
|
Huffman coding
|
22,403
|
746
|
C
|
High
|
184
|
Ray tracing (graphics)
|
22,388
|
746
|
B
|
Mid
|
185
|
Master theorem (analysis of algorithms)
|
22,378
|
745
|
C
|
High
|
186
|
Recursion (computer science)
|
22,343
|
744
|
C
|
Top
|
187
|
Julia (programming language)
|
22,232
|
741
|
C
|
Low
|
188
|
Human–computer interaction
|
22,123
|
737
|
C
|
Top
|
189
|
Real-time operating system
|
22,016
|
733
|
Start
|
Mid
|
190
|
Neural network
|
21,986
|
732
|
B
|
High
|
191
|
Source code
|
21,940
|
731
|
C
|
High
|
192
|
Behavior-driven development
|
21,791
|
726
|
B
|
Low
|
193
|
Bias–variance tradeoff
|
21,656
|
721
|
Start
|
Unknown
|
194
|
Topological sorting
|
21,433
|
714
|
C
|
High
|
195
|
Perl
|
21,375
|
712
|
C
|
Mid
|
196
|
Greedy algorithm
|
21,170
|
705
|
C
|
High
|
197
|
Tree traversal
|
21,081
|
702
|
C
|
High
|
198
|
Priority queue
|
21,014
|
700
|
C
|
High
|
199
|
Selection sort
|
20,917
|
697
|
C
|
High
|
200
|
Recursion
|
20,822
|
694
|
C
|
Mid
|
201
|
Thread (computing)
|
20,809
|
693
|
C
|
High
|
202
|
Continuous integration
|
20,676
|
689
|
B
|
Low
|
203
|
Claude Shannon
|
20,637
|
687
|
B
|
High
|
204
|
HTML element
|
20,564
|
685
|
C
|
Mid
|
205
|
Integer (computer science)
|
20,189
|
672
|
C
|
Mid
|
206
|
Brute-force attack
|
20,145
|
671
|
C
|
High
|
207
|
Minimum spanning tree
|
20,123
|
670
|
C
|
High
|
208
|
Boolean data type
|
20,122
|
670
|
Start
|
Low
|
209
|
Markup language
|
20,113
|
670
|
C
|
High
|
210
|
Prolog
|
20,012
|
667
|
B
|
Mid
|
211
|
Automata theory
|
19,860
|
662
|
C
|
Top
|
212
|
Abstraction (computer science)
|
19,682
|
656
|
Start
|
Top
|
213
|
QBittorrent
|
19,571
|
652
|
Stub
|
Low
|
214
|
Race condition
|
19,477
|
649
|
C
|
Mid
|
215
|
Graph (discrete mathematics)
|
19,467
|
648
|
B
|
High
|
216
|
Data-flow diagram
|
19,224
|
640
|
Start
|
Mid
|
217
|
Activation function
|
19,135
|
637
|
Start
|
Mid
|
218
|
Erlang (programming language)
|
19,127
|
637
|
B
|
Mid
|
219
|
Unsupervised learning
|
19,120
|
637
|
C
|
Mid
|
220
|
Amdahl's law
|
19,110
|
637
|
C
|
High
|
221
|
Ada (programming language)
|
19,064
|
635
|
Unknown
|
Unknown
|
222
|
String (computer science)
|
18,992
|
633
|
Start
|
High
|
223
|
Deadlock
|
18,759
|
625
|
C
|
High
|
224
|
Declarative programming
|
18,756
|
625
|
C
|
Top
|
225
|
Liskov substitution principle
|
18,635
|
621
|
Start
|
Mid
|
226
|
Inheritance (object-oriented programming)
|
18,613
|
620
|
Start
|
Mid
|
227
|
Structured programming
|
18,382
|
612
|
Start
|
Mid
|
228
|
Naming convention (programming)
|
18,274
|
609
|
Start
|
Unknown
|
229
|
Parsing
|
18,240
|
608
|
Start
|
Top
|
230
|
AlphaGo
|
18,028
|
600
|
C
|
High
|
231
|
ISO/IEC 8859-1
|
18,010
|
600
|
Start
|
Unknown
|
232
|
Maximum subarray problem
|
17,978
|
599
|
Unknown
|
Unknown
|
233
|
Data model
|
17,872
|
595
|
C
|
High
|
234
|
Inversion of control
|
17,846
|
594
|
Start
|
Low
|
235
|
History of Python
|
17,763
|
592
|
C
|
Low
|
236
|
Turing Award
|
17,745
|
591
|
Start
|
Top
|
237
|
Deep Blue (chess computer)
|
17,710
|
590
|
C
|
Mid
|
238
|
Abstract data type
|
17,583
|
586
|
C
|
High
|
239
|
BERT (language model)
|
17,571
|
585
|
Start
|
Unknown
|
240
|
AVL tree
|
17,557
|
585
|
C
|
High
|
241
|
Markov chain Monte Carlo
|
17,523
|
584
|
C
|
High
|
242
|
HackerRank
|
17,465
|
582
|
Start
|
Unknown
|
243
|
Garbage collection (computer science)
|
17,420
|
580
|
C
|
High
|
244
|
Autoencoder
|
17,291
|
576
|
Start
|
Unknown
|
245
|
Pointer (computer programming)
|
17,161
|
572
|
C
|
High
|
246
|
Raster graphics
|
17,104
|
570
|
Start
|
Mid
|
247
|
Cognitive science
|
17,037
|
567
|
C
|
High
|
248
|
Best, worst and average case
|
17,029
|
567
|
Start
|
High
|
249
|
Color depth
|
17,000
|
566
|
C
|
Low
|
250
|
Scaled agile framework
|
16,961
|
565
|
C
|
Low
|
251
|
Context-free grammar
|
16,894
|
563
|
B
|
Top
|
252
|
Sparse matrix
|
16,875
|
562
|
C
|
Mid
|
253
|
Bresenham's line algorithm
|
16,868
|
562
|
C
|
Mid
|
254
|
Hamming distance
|
16,792
|
559
|
Start
|
High
|
255
|
Complex system
|
16,776
|
559
|
C
|
High
|
256
|
Bjarne Stroustrup
|
16,705
|
556
|
Start
|
High
|
257
|
Digital Revolution
|
16,698
|
556
|
Start
|
Mid
|
258
|
Shortest path problem
|
16,558
|
551
|
C
|
High
|
259
|
Adjacency matrix
|
16,541
|
551
|
C
|
Mid
|
260
|
Event-driven programming
|
16,481
|
549
|
Start
|
High
|
261
|
Queue (abstract data type)
|
16,468
|
548
|
Start
|
Top
|
262
|
Business Process Model and Notation
|
16,444
|
548
|
Start
|
Mid
|
263
|
Automaton
|
16,424
|
547
|
C
|
High
|
264
|
Numerical analysis
|
16,380
|
546
|
B
|
Top
|
265
|
Heapsort
|
16,364
|
545
|
B
|
High
|
266
|
Encapsulation (computer programming)
|
16,357
|
545
|
Start
|
High
|
267
|
Multiplication sign
|
16,329
|
544
|
C
|
Low
|
268
|
In-place algorithm
|
16,328
|
544
|
Start
|
Unknown
|
269
|
Primality test
|
16,283
|
542
|
Start
|
Mid
|
270
|
Checksum
|
16,261
|
542
|
Start
|
Mid
|
271
|
Ontology (information science)
|
16,226
|
540
|
C
|
High
|
272
|
Pseudorandom number generator
|
16,121
|
537
|
C
|
High
|
273
|
Computational fluid dynamics
|
16,110
|
537
|
B
|
High
|
274
|
Intrusion detection system
|
16,092
|
536
|
Start
|
Low
|
275
|
Category theory
|
15,992
|
533
|
B
|
High
|
276
|
Disjoint-set data structure
|
15,958
|
531
|
C
|
High
|
277
|
Monad (functional programming)
|
15,903
|
530
|
B
|
Mid
|
278
|
Relational algebra
|
15,786
|
526
|
C
|
Mid
|
279
|
Cyclomatic complexity
|
15,728
|
524
|
C
|
Low
|
280
|
Cut, copy, and paste
|
15,724
|
524
|
C
|
High
|
281
|
Expectation–maximization algorithm
|
15,667
|
522
|
C
|
High
|
282
|
Edsger W. Dijkstra
|
15,639
|
521
|
B
|
High
|
283
|
For loop
|
15,593
|
519
|
B
|
High
|
284
|
Heuristic (computer science)
|
15,558
|
518
|
Unknown
|
Unknown
|
285
|
Binary heap
|
15,533
|
517
|
B
|
High
|
286
|
Composition over inheritance
|
15,519
|
517
|
C
|
Low
|
287
|
Cache replacement policies
|
15,383
|
512
|
C
|
Mid
|
288
|
Boolean satisfiability problem
|
15,343
|
511
|
C
|
Mid
|
289
|
POST (HTTP)
|
15,142
|
504
|
Start
|
Low
|
290
|
Multiple inheritance
|
15,107
|
503
|
C
|
Mid
|
291
|
Hamming code
|
15,052
|
501
|
C
|
High
|
292
|
Marvin Minsky
|
15,001
|
500
|
C
|
Unknown
|
293
|
Internet Engineering Task Force
|
14,979
|
499
|
C
|
Mid
|
294
|
Nim
|
14,940
|
498
|
C
|
Unknown
|
295
|
List of pioneers in computer science
|
14,897
|
496
|
List
|
Unknown
|
296
|
Relational model
|
14,878
|
495
|
C
|
Top
|
297
|
HTTP Live Streaming
|
14,815
|
493
|
Start
|
Low
|
298
|
K-d tree
|
14,786
|
492
|
C
|
Low
|
299
|
Voxel
|
14,770
|
492
|
C
|
Mid
|
300
|
Role-based access control
|
14,718
|
490
|
C
|
Mid
|
301
|
Class (computer programming)
|
14,694
|
489
|
Start
|
High
|
302
|
Bellman–Ford algorithm
|
14,570
|
485
|
C
|
Mid
|
303
|
Code
|
14,536
|
484
|
C
|
High
|
304
|
Process (computing)
|
14,520
|
484
|
C
|
Mid
|
305
|
Rendering (computer graphics)
|
14,512
|
483
|
B
|
High
|
306
|
The Art of Computer Programming
|
14,479
|
482
|
C
|
Top
|
307
|
Avast
|
14,478
|
482
|
B
|
Mid
|
308
|
Cellular automaton
|
14,423
|
480
|
B
|
Top
|
309
|
Deterministic finite automaton
|
14,384
|
479
|
Start
|
High
|
310
|
Tensor Processing Unit
|
14,354
|
478
|
C
|
Mid
|
311
|
Reed–Solomon error correction
|
14,347
|
478
|
C
|
Mid
|
312
|
Interface (computing)
|
14,336
|
477
|
C
|
Low
|
313
|
Applications of artificial intelligence
|
14,304
|
476
|
C
|
Low
|
314
|
Word (computer architecture)
|
14,240
|
474
|
C
|
Mid
|
315
|
Smalltalk
|
14,206
|
473
|
Start
|
Mid
|
316
|
Hierarchical clustering
|
14,122
|
470
|
C
|
Mid
|
317
|
Data visualization
|
14,103
|
470
|
C
|
High
|
318
|
Lossless compression
|
14,071
|
469
|
C
|
High
|
319
|
Error detection and correction
|
13,796
|
459
|
C
|
Unknown
|
320
|
Foobar
|
13,783
|
459
|
C
|
Mid
|
321
|
Binary file
|
13,778
|
459
|
C
|
High
|
322
|
Deep learning super sampling
|
13,714
|
457
|
C
|
Low
|
323
|
Esoteric programming language
|
13,692
|
456
|
Start
|
Unknown
|
324
|
Watson (computer)
|
13,678
|
455
|
GA
|
Mid
|
325
|
Signal processing
|
13,662
|
455
|
C
|
Low
|
326
|
Radix sort
|
13,447
|
448
|
Start
|
High
|
327
|
Row- and column-major order
|
13,431
|
447
|
C
|
Mid
|
328
|
Actor model
|
13,382
|
446
|
C
|
Mid
|
329
|
DBSCAN
|
13,362
|
445
|
C
|
Mid
|
330
|
Ensemble learning
|
13,351
|
445
|
C
|
Mid
|
331
|
Natalie Enright Jerger
|
13,243
|
441
|
Start
|
Unknown
|
332
|
Mersenne Twister
|
13,218
|
440
|
Unknown
|
Unknown
|
333
|
Subroutine
|
13,203
|
440
|
C
|
Top
|
334
|
Variable (computer science)
|
13,135
|
437
|
Start
|
Top
|
335
|
Memetics
|
13,135
|
437
|
Start
|
Unknown
|
336
|
Macro (computer science)
|
13,038
|
434
|
C
|
Mid
|
337
|
Colossus computer
|
12,986
|
432
|
B
|
Mid
|
338
|
NP (complexity)
|
12,844
|
428
|
C
|
High
|
339
|
Signed number representations
|
12,830
|
427
|
C
|
High
|
340
|
Lenna
|
12,810
|
427
|
C
|
Unknown
|
341
|
Web API
|
12,737
|
424
|
Unknown
|
Unknown
|
342
|
Prim's algorithm
|
12,718
|
423
|
C
|
High
|
343
|
Concurrent computing
|
12,689
|
422
|
C
|
High
|
344
|
Call stack
|
12,656
|
421
|
C
|
Mid
|
345
|
Lexical analysis
|
12,643
|
421
|
C
|
High
|
346
|
List of tools for static code analysis
|
12,598
|
419
|
List
|
Low
|
347
|
Computer science and engineering
|
12,548
|
418
|
Start
|
Low
|
348
|
Logo (programming language)
|
12,503
|
416
|
C
|
Mid
|
349
|
Kruskal's algorithm
|
12,444
|
414
|
Start
|
High
|
350
|
Robert C. Martin
|
12,434
|
414
|
Start
|
Mid
|
351
|
Federated learning
|
12,331
|
411
|
Start
|
Low
|
352
|
Routing
|
12,302
|
410
|
C
|
Mid
|
353
|
Ackermann function
|
12,282
|
409
|
B
|
Mid
|
354
|
Expert system
|
12,235
|
407
|
Start
|
Mid
|
355
|
Closure (computer programming)
|
12,226
|
407
|
C
|
Mid
|
356
|
Conditional (computer programming)
|
12,224
|
407
|
C
|
Mid
|
357
|
Hungarian notation
|
12,154
|
405
|
Start
|
Low
|
358
|
Directed graph
|
12,135
|
404
|
C
|
High
|
359
|
Memory management
|
12,132
|
404
|
C
|
High
|
360
|
Floyd–Warshall algorithm
|
12,029
|
400
|
B
|
High
|
361
|
Computational complexity theory
|
12,006
|
400
|
C
|
Top
|
362
|
Numerical integration
|
11,961
|
398
|
B
|
Mid
|
363
|
Aspect-oriented programming
|
11,958
|
398
|
Start
|
Mid
|
364
|
Visitor pattern
|
11,945
|
398
|
Start
|
Unknown
|
365
|
Particle swarm optimization
|
11,885
|
396
|
C
|
Mid
|
366
|
Adapter pattern
|
11,810
|
393
|
Start
|
Unknown
|
367
|
Residual neural network
|
11,750
|
391
|
Start
|
Low
|
368
|
Timsort
|
11,680
|
389
|
C
|
Mid
|
369
|
Memory hierarchy
|
11,673
|
389
|
Start
|
Mid
|
370
|
List of datasets for machine-learning research
|
11,663
|
388
|
List
|
Mid
|
371
|
APL (programming language)
|
11,622
|
387
|
B
|
Mid
|
372
|
Graph coloring
|
11,587
|
386
|
B
|
Mid
|
373
|
AWK
|
11,496
|
383
|
B
|
Mid
|
374
|
Mean time between failures
|
11,495
|
383
|
Start
|
Low
|
375
|
Sankey diagram
|
11,460
|
382
|
C
|
Low
|
376
|
Control flow
|
11,459
|
381
|
B
|
Top
|
377
|
Longest palindromic substring
|
11,374
|
379
|
C
|
Low
|
378
|
Division algorithm
|
11,337
|
377
|
C
|
High
|
379
|
Linear congruential generator
|
11,303
|
376
|
Start
|
Mid
|
380
|
Geoffrey Hinton
|
11,254
|
375
|
C
|
Low
|
381
|
Longest common subsequence problem
|
11,241
|
374
|
Start
|
High
|
382
|
Intelligent agent
|
11,212
|
373
|
Unknown
|
Unknown
|
383
|
Computer scientist
|
11,133
|
371
|
Start
|
Top
|
384
|
Smartglasses
|
11,102
|
370
|
C
|
Low
|
385
|
Canny edge detector
|
11,045
|
368
|
Start
|
Mid
|
386
|
The Open Group Architecture Framework
|
11,012
|
367
|
Start
|
High
|
387
|
List of data structures
|
11,010
|
367
|
List
|
High
|
388
|
Coupling (computer programming)
|
11,006
|
366
|
Start
|
High
|
389
|
Identity management
|
10,978
|
365
|
C
|
Unknown
|
390
|
Anomaly detection
|
10,963
|
365
|
Start
|
Mid
|
391
|
Triple DES
|
10,955
|
365
|
Start
|
Unknown
|
392
|
Fourth-generation programming language
|
10,929
|
364
|
Start
|
Mid
|
393
|
Decision theory
|
10,918
|
363
|
C
|
High
|
394
|
Password cracking
|
10,881
|
362
|
C
|
Low
|
395
|
Shannon–Hartley theorem
|
10,878
|
362
|
C
|
High
|
396
|
Linear search
|
10,865
|
362
|
Start
|
Mid
|
397
|
Mixed reality
|
10,788
|
359
|
B
|
Unknown
|
398
|
Knuth–Morris–Pratt algorithm
|
10,717
|
357
|
Start
|
High
|
399
|
Monte Carlo tree search
|
10,706
|
356
|
C
|
Mid
|
400
|
Coroutine
|
10,693
|
356
|
C
|
Mid
|
401
|
Multiplication algorithm
|
10,593
|
353
|
C
|
Low
|
402
|
Anonymous function
|
10,578
|
352
|
C
|
Mid
|
403
|
Exception handling
|
10,538
|
351
|
B
|
Mid
|
404
|
Nondeterministic finite automaton
|
10,524
|
350
|
B
|
High
|
405
|
D (programming language)
|
10,461
|
348
|
C
|
Low
|
406
|
Extended ASCII
|
10,448
|
348
|
C
|
Low
|
407
|
User error
|
10,415
|
347
|
Start
|
High
|
408
|
Database model
|
10,404
|
346
|
C
|
Top
|
409
|
Static program analysis
|
10,376
|
345
|
C
|
Mid
|
410
|
Web developer
|
10,367
|
345
|
Start
|
Mid
|
411
|
Circular buffer
|
10,363
|
345
|
Start
|
Mid
|
412
|
Bogosort
|
10,318
|
343
|
Start
|
Low
|
413
|
Spaghetti code
|
10,273
|
342
|
Start
|
Mid
|
414
|
Named-entity recognition
|
10,225
|
340
|
C
|
Unknown
|
415
|
Chomsky hierarchy
|
10,220
|
340
|
Start
|
Top
|
416
|
AlphaFold
|
10,214
|
340
|
C
|
Low
|
417
|
Currying
|
10,141
|
338
|
C
|
High
|
418
|
Information science
|
10,110
|
337
|
Start
|
Top
|
419
|
Search algorithm
|
10,058
|
335
|
Start
|
Top
|
420
|
8-bit computing
|
10,057
|
335
|
Start
|
High
|
421
|
Sudoku solving algorithms
|
10,018
|
333
|
B
|
Low
|
422
|
Anti-pattern
|
10,017
|
333
|
C
|
Mid
|
423
|
ABAP
|
9,922
|
330
|
C
|
Low
|
424
|
Shift register
|
9,825
|
327
|
Start
|
Unknown
|
425
|
Logic programming
|
9,808
|
326
|
B
|
Top
|
426
|
Shunting-yard algorithm
|
9,801
|
326
|
Unknown
|
Unknown
|
427
|
Inverter (logic gate)
|
9,797
|
326
|
Start
|
Unknown
|
428
|
Cycle detection
|
9,782
|
326
|
B
|
Low
|
429
|
Check digit
|
9,780
|
326
|
Start
|
Mid
|
430
|
Alice and Bob
|
9,746
|
324
|
Start
|
Low
|
431
|
Squeak
|
9,735
|
324
|
B
|
Mid
|
432
|
B+ tree
|
9,715
|
323
|
Start
|
High
|
433
|
Extended Backus–Naur form
|
9,710
|
323
|
C
|
Mid
|
434
|
Code smell
|
9,704
|
323
|
C
|
Low
|
435
|
Conflict-free replicated data type
|
9,676
|
322
|
C
|
High
|
436
|
VP9
|
9,673
|
322
|
C
|
Low
|
437
|
Do while loop
|
9,659
|
321
|
Unknown
|
Unknown
|
438
|
Real-time computing
|
9,615
|
320
|
C
|
High
|
439
|
Linker (computing)
|
9,474
|
315
|
C
|
Mid
|
440
|
Lossy compression
|
9,432
|
314
|
Start
|
High
|
441
|
Analysis of algorithms
|
9,430
|
314
|
C
|
Top
|
442
|
Ben Horowitz
|
9,428
|
314
|
Start
|
Low
|
443
|
Microkernel
|
9,394
|
313
|
C
|
High
|
444
|
Kai-Fu Lee
|
9,381
|
312
|
Start
|
Unknown
|
445
|
Consistent hashing
|
9,373
|
312
|
Stub
|
Unknown
|
446
|
Scope (computer science)
|
9,367
|
312
|
C
|
High
|
447
|
List of unsolved problems in computer science
|
9,362
|
312
|
List
|
Mid
|
448
|
Enterprise architecture
|
9,353
|
311
|
Start
|
Mid
|
449
|
DeepDream
|
9,319
|
310
|
Start
|
Low
|
450
|
Data (computing)
|
9,305
|
310
|
C
|
Top
|
451
|
Reactive programming
|
9,259
|
308
|
Start
|
Unknown
|
452
|
Root-finding algorithms
|
9,244
|
308
|
Unknown
|
Unknown
|
453
|
Theory of computation
|
9,236
|
307
|
C
|
Top
|
454
|
Open-source license
|
9,203
|
306
|
Start
|
Unknown
|
455
|
Code coverage
|
9,199
|
306
|
C
|
Low
|
456
|
Hyper-threading
|
9,172
|
305
|
C
|
Low
|
457
|
Email spoofing
|
9,152
|
305
|
Start
|
Low
|
458
|
Ubiquitous computing
|
9,108
|
303
|
C
|
High
|
459
|
Doubly linked list
|
9,058
|
301
|
Start
|
High
|
460
|
Skip list
|
9,043
|
301
|
C
|
Mid
|
461
|
Associative array
|
9,038
|
301
|
C
|
High
|
462
|
Coding theory
|
8,994
|
299
|
C
|
High
|
463
|
Run-length encoding
|
8,927
|
297
|
Start
|
Mid
|
464
|
Informatics
|
8,891
|
296
|
C
|
Mid
|
465
|
Data structure alignment
|
8,879
|
295
|
Start
|
Mid
|
466
|
Double-ended queue
|
8,842
|
294
|
Start
|
High
|
467
|
C++ classes
|
8,800
|
293
|
C
|
Low
|
468
|
Decentraland
|
8,789
|
292
|
Stub
|
Low
|
469
|
Sørensen–Dice coefficient
|
8,786
|
292
|
Start
|
Unknown
|
470
|
Units of information
|
8,786
|
292
|
C
|
Mid
|
471
|
Maze generation algorithm
|
8,777
|
292
|
Start
|
Unknown
|
472
|
Branch and bound
|
8,771
|
292
|
Start
|
Mid
|
473
|
Type theory
|
8,733
|
291
|
C
|
High
|
474
|
State diagram
|
8,666
|
288
|
C
|
Mid
|
475
|
Operator overloading
|
8,659
|
288
|
C
|
Mid
|
476
|
Planar graph
|
8,613
|
287
|
B
|
Mid
|
477
|
Dining philosophers problem
|
8,606
|
286
|
Start
|
Top
|
478
|
Agent-based model
|
8,601
|
286
|
C
|
Mid
|
479
|
Maze-solving algorithm
|
8,599
|
286
|
Unknown
|
Unknown
|
480
|
Self-balancing binary search tree
|
8,584
|
286
|
Start
|
Mid
|
481
|
Memory leak
|
8,577
|
285
|
C
|
Mid
|
482
|
Theoretical computer science
|
8,486
|
282
|
B
|
Top
|
483
|
Existential risk from artificial general intelligence
|
8,473
|
282
|
C
|
Mid
|
484
|
Ladder logic
|
8,463
|
282
|
Start
|
Low
|
485
|
Cyc
|
8,443
|
281
|
C
|
Low
|
486
|
Tail call
|
8,440
|
281
|
C
|
Mid
|
487
|
Combinatorial optimization
|
8,438
|
281
|
C
|
Top
|
488
|
Comparison of integrated development environments
|
8,392
|
279
|
Start
|
Low
|
489
|
Binary-to-text encoding
|
8,388
|
279
|
C
|
Low
|
490
|
Quickselect
|
8,381
|
279
|
C
|
Low
|
491
|
Function overloading
|
8,375
|
279
|
Unknown
|
Unknown
|
492
|
Matrix multiplication algorithm
|
8,355
|
278
|
C
|
Mid
|
493
|
Edge detection
|
8,293
|
276
|
C
|
Mid
|
494
|
C++23
|
8,260
|
275
|
Stub
|
Low
|
495
|
Boolean
|
8,252
|
275
|
Disambig
|
NA
|
496
|
Code page 437
|
8,210
|
273
|
C
|
Low
|
497
|
Women and video games
|
8,173
|
272
|
B
|
Mid
|
498
|
Church–Turing thesis
|
8,165
|
272
|
C
|
Top
|
499
|
Object-oriented analysis and design
|
8,155
|
271
|
Start
|
High
|
500
|
Data governance
|
8,105
|
270
|
C
|
Unknown
|
501
|
Grover's algorithm
|
8,102
|
270
|
C
|
Mid
|
502
|
GPT-2
|
8,099
|
269
|
B
|
Low
|
503
|
Vehicle routing problem
|
8,086
|
269
|
Unknown
|
Unknown
|
504
|
Opcode
|
8,061
|
268
|
C
|
High
|
505
|
JSONP
|
8,047
|
268
|
C
|
Low
|
506
|
Concurrency (computer science)
|
8,039
|
267
|
Start
|
Top
|
507
|
Graph (abstract data type)
|
8,039
|
267
|
C
|
Top
|
508
|
Andrey Kolmogorov
|
8,027
|
267
|
C
|
High
|
509
|
Generic programming
|
8,020
|
267
|
C
|
High
|
510
|
Imo.im
|
7,982
|
266
|
Stub
|
Low
|
511
|
Counting sort
|
7,966
|
265
|
C
|
High
|
512
|
EBCDIC
|
7,955
|
265
|
Start
|
Mid
|
513
|
Leslie Lamport
|
7,933
|
264
|
Start
|
High
|
514
|
Digital data
|
7,922
|
264
|
C
|
Low
|
515
|
Delimiter
|
7,916
|
263
|
C
|
Mid
|
516
|
ALGOL
|
7,916
|
263
|
C
|
High
|
517
|
Tony Hoare
|
7,914
|
263
|
C
|
High
|
518
|
Apriori algorithm
|
7,892
|
263
|
C
|
Mid
|
519
|
Legacy system
|
7,850
|
261
|
C
|
Unknown
|
520
|
Point in polygon
|
7,832
|
261
|
Unknown
|
Unknown
|
521
|
Mutual exclusion
|
7,827
|
260
|
C
|
Top
|
522
|
Brute-force search
|
7,811
|
260
|
Start
|
Mid
|
523
|
Test case
|
7,791
|
259
|
Start
|
Unknown
|
524
|
Cohesion (computer science)
|
7,787
|
259
|
Unknown
|
Unknown
|
525
|
Universal Turing machine
|
7,777
|
259
|
C
|
Mid
|
526
|
Chernoff bound
|
7,767
|
258
|
Start
|
Low
|
527
|
Rob Pike
|
7,749
|
258
|
Start
|
Unknown
|
528
|
Redux (JavaScript library)
|
7,698
|
256
|
Start
|
Low
|
529
|
Miller–Rabin primality test
|
7,659
|
255
|
C
|
High
|
530
|
Knowledge graph
|
7,656
|
255
|
Start
|
High
|
531
|
Abstract factory pattern
|
7,600
|
253
|
Start
|
Mid
|
532
|
Branch predictor
|
7,558
|
251
|
C
|
Mid
|
533
|
Data access object
|
7,555
|
251
|
Start
|
Unknown
|
534
|
Ant colony optimization algorithms
|
7,555
|
251
|
B
|
Low
|
535
|
API testing
|
7,554
|
251
|
Unknown
|
Unknown
|
536
|
JavaScript engine
|
7,535
|
251
|
Start
|
Mid
|
537
|
Neuromorphic engineering
|
7,509
|
250
|
Unknown
|
Unknown
|
538
|
Higher-order function
|
7,494
|
249
|
Start
|
High
|
539
|
Evolutionary algorithm
|
7,491
|
249
|
C
|
Mid
|
540
|
Quick, Draw!
|
7,462
|
248
|
Stub
|
Low
|
541
|
Computational linguistics
|
7,449
|
248
|
B
|
High
|
542
|
Kolmogorov complexity
|
7,422
|
247
|
B
|
High
|
543
|
L-system
|
7,403
|
246
|
Unknown
|
Unknown
|
544
|
Bill Joy
|
7,370
|
245
|
C
|
Unknown
|
545
|
Database design
|
7,361
|
245
|
C
|
High
|
546
|
String-searching algorithm
|
7,345
|
244
|
Start
|
High
|
547
|
Short-circuit evaluation
|
7,279
|
242
|
Start
|
Mid
|
548
|
Curiously recurring template pattern
|
7,248
|
241
|
C
|
Low
|
549
|
Fluent interface
|
7,229
|
240
|
Stub
|
Unknown
|
550
|
Pointing stick
|
7,224
|
240
|
C
|
Low
|
551
|
Feature selection
|
7,197
|
239
|
C
|
Mid
|
552
|
Pushdown automaton
|
7,186
|
239
|
B
|
High
|
553
|
Constraint satisfaction problem
|
7,172
|
239
|
C
|
Mid
|
554
|
16K resolution
|
7,164
|
238
|
Start
|
Unknown
|
555
|
Quantum key distribution
|
7,156
|
238
|
B
|
Mid
|
556
|
Jaro–Winkler distance
|
7,153
|
238
|
Unknown
|
Unknown
|
557
|
Gradle
|
7,121
|
237
|
C
|
Low
|
558
|
Identifier
|
7,113
|
237
|
Start
|
Low
|
559
|
Iterative deepening depth-first search
|
7,111
|
237
|
Start
|
Low
|
560
|
Multiclass classification
|
7,109
|
236
|
Start
|
Mid
|
561
|
Bucket sort
|
7,083
|
236
|
C
|
High
|
562
|
Hazard (computer architecture)
|
7,042
|
234
|
C
|
Low
|
563
|
Radix tree
|
7,040
|
234
|
C
|
Mid
|
564
|
Computer performance
|
7,026
|
234
|
Start
|
Mid
|
565
|
Machine epsilon
|
7,017
|
233
|
Unknown
|
Unknown
|
566
|
Computational science
|
7,004
|
233
|
Start
|
Top
|
567
|
Hill climbing
|
7,001
|
233
|
C
|
Mid
|
568
|
Shellsort
|
6,983
|
232
|
B
|
High
|
569
|
Requirements engineering
|
6,927
|
230
|
Start
|
Unknown
|
570
|
Median of medians
|
6,922
|
230
|
C
|
Low
|
571
|
Web (programming system)
|
6,893
|
229
|
Stub
|
Mid
|
572
|
Edit distance
|
6,892
|
229
|
C
|
Mid
|
573
|
Attention (machine learning)
|
6,878
|
229
|
Stub
|
Unknown
|
574
|
Loose coupling
|
6,867
|
228
|
Start
|
High
|
575
|
Computational thinking
|
6,861
|
228
|
Start
|
Unknown
|
576
|
DNS rebinding
|
6,859
|
228
|
Unknown
|
Unknown
|
577
|
C99
|
6,856
|
228
|
C
|
Mid
|
578
|
Process management (computing)
|
6,856
|
228
|
C
|
Low
|
579
|
Information management
|
6,819
|
227
|
C
|
Unknown
|
580
|
Non-English-based programming languages
|
6,807
|
226
|
List
|
Low
|
581
|
Computer graphics (computer science)
|
6,803
|
226
|
Start
|
Top
|
582
|
Infinite loop
|
6,787
|
226
|
Start
|
Mid
|
583
|
Relational operator
|
6,778
|
225
|
C
|
Mid
|
584
|
Async/await
|
6,777
|
225
|
C
|
Mid
|
585
|
Adjacency list
|
6,757
|
225
|
C
|
Mid
|
586
|
Alonzo Church
|
6,739
|
224
|
C
|
Top
|
587
|
GrabCAD
|
6,726
|
224
|
Unknown
|
Unknown
|
588
|
Petri net
|
6,712
|
223
|
B
|
Mid
|
589
|
Amortized analysis
|
6,642
|
221
|
Start
|
High
|
590
|
Thomas Knoll
|
6,629
|
220
|
Unknown
|
Unknown
|
591
|
Nonlinear programming
|
6,628
|
220
|
C
|
Mid
|
592
|
Association for Computing Machinery
|
6,615
|
220
|
C
|
Top
|
593
|
Judea Pearl
|
6,608
|
220
|
C
|
Mid
|
594
|
R-tree
|
6,595
|
219
|
C
|
Mid
|
595
|
Common Lisp
|
6,568
|
218
|
Start
|
Mid
|
596
|
Cargo cult programming
|
6,544
|
218
|
Start
|
Low
|
597
|
Computational complexity
|
6,540
|
218
|
C
|
Top
|
598
|
Attribute-based access control
|
6,531
|
217
|
Unknown
|
Unknown
|
599
|
Computational biology
|
6,484
|
216
|
C
|
High
|
600
|
Code.org
|
6,425
|
214
|
C
|
Low
|
601
|
JPEG 2000
|
6,419
|
213
|
C
|
Low
|
602
|
Maximum flow problem
|
6,409
|
213
|
C
|
High
|
603
|
MurmurHash
|
6,407
|
213
|
Start
|
Low
|
604
|
Profiling (computer programming)
|
6,405
|
213
|
C
|
Mid
|
605
|
Ethics of artificial intelligence
|
6,403
|
213
|
B
|
Top
|
606
|
Fibonacci heap
|
6,403
|
213
|
C
|
High
|
607
|
Don Norman
|
6,402
|
213
|
Start
|
Mid
|
608
|
Kleene star
|
6,400
|
213
|
Start
|
High
|
609
|
Okapi BM25
|
6,393
|
213
|
Start
|
Low
|
610
|
Sandbox (software development)
|
6,375
|
212
|
Start
|
Low
|
611
|
8-bit color
|
6,360
|
212
|
Start
|
Low
|
612
|
Cell (microprocessor)
|
6,350
|
211
|
B
|
Mid
|
613
|
Component (graph theory)
|
6,346
|
211
|
Start
|
Mid
|
614
|
List of NP-complete problems
|
6,337
|
211
|
List
|
High
|
615
|
Computational complexity of mathematical operations
|
6,333
|
211
|
B
|
Mid
|
616
|
First-class function
|
6,321
|
210
|
C
|
High
|
617
|
Model–view–presenter
|
6,288
|
209
|
C
|
High
|
618
|
History of computer science
|
6,283
|
209
|
B
|
Top
|
619
|
No free lunch theorem
|
6,270
|
209
|
Start
|
Mid
|
620
|
Glossary of graph theory
|
6,259
|
208
|
List
|
Mid
|
621
|
Prefix sum
|
6,226
|
207
|
Unknown
|
Unknown
|
622
|
Approximate string matching
|
6,216
|
207
|
C
|
Mid
|
623
|
Cryptographically-secure pseudorandom number generator
|
6,209
|
206
|
C
|
High
|
624
|
Silvio Micali
|
6,188
|
206
|
Start
|
Unknown
|
625
|
Text mining
|
6,182
|
206
|
Start
|
Unknown
|
626
|
Message queue
|
6,170
|
205
|
Unknown
|
Unknown
|
627
|
Synchronization (computer science)
|
6,169
|
205
|
Unknown
|
Unknown
|
628
|
Fragmentation (computing)
|
6,163
|
205
|
C
|
Mid
|
629
|
Lempel–Ziv–Welch
|
6,162
|
205
|
C
|
Unknown
|
630
|
Software engineer
|
6,133
|
204
|
Start
|
Mid
|
631
|
Quantum information
|
6,132
|
204
|
Start
|
High
|
632
|
Snippet (programming)
|
6,117
|
203
|
Start
|
Low
|
633
|
Wojciech Zaremba
|
6,107
|
203
|
Start
|
Unknown
|
634
|
Artificial consciousness
|
6,069
|
202
|
C
|
Unknown
|
635
|
Adam D'Angelo
|
6,066
|
202
|
Start
|
Low
|
636
|
Glossary of computer science
|
6,052
|
201
|
List
|
Top
|
637
|
Umple
|
6,051
|
201
|
Start
|
Low
|
638
|
Adversarial machine learning
|
6,038
|
201
|
C
|
Mid
|
639
|
IEEE 754-1985
|
6,028
|
200
|
C
|
Low
|
640
|
Recursive descent parser
|
6,013
|
200
|
Start
|
High
|
641
|
CORDIC
|
5,979
|
199
|
B
|
Mid
|
642
|
Generalized additive model
|
5,948
|
198
|
Start
|
Low
|
643
|
Google Brain
|
5,944
|
198
|
C
|
Unknown
|
644
|
Deep reinforcement learning
|
5,940
|
198
|
Stub
|
Unknown
|
645
|
Comparison of programming paradigms
|
5,928
|
197
|
C
|
Low
|
646
|
Third-generation programming language
|
5,926
|
197
|
Start
|
Mid
|
647
|
Covariance and contravariance (computer science)
|
5,908
|
196
|
Start
|
High
|
648
|
Dynamic array
|
5,891
|
196
|
C
|
Mid
|
649
|
Time formatting and storage bugs
|
5,873
|
195
|
B
|
Low
|
650
|
LL parser
|
5,860
|
195
|
Start
|
High
|
651
|
Zero-shot learning
|
5,851
|
195
|
C
|
Unknown
|
652
|
Thrashing (computer science)
|
5,851
|
195
|
C
|
Low
|
653
|
Parsing expression grammar
|
5,846
|
194
|
B
|
Mid
|
654
|
Null-terminated string
|
5,829
|
194
|
Start
|
Low
|
655
|
Admissible heuristic
|
5,800
|
193
|
Start
|
Unknown
|
656
|
Pranav Mistry
|
5,773
|
192
|
Start
|
Low
|
657
|
Limited-memory BFGS
|
5,768
|
192
|
Unknown
|
Unknown
|
658
|
Syntactic sugar
|
5,766
|
192
|
C
|
Mid
|
659
|
Goto
|
5,762
|
192
|
C
|
Mid
|
660
|
Translation studies
|
5,759
|
191
|
Start
|
Mid
|
661
|
Information hiding
|
5,741
|
191
|
Start
|
Mid
|
662
|
Inverted index
|
5,740
|
191
|
Start
|
Mid
|
663
|
Object database
|
5,732
|
191
|
Start
|
High
|
664
|
Needleman–Wunsch algorithm
|
5,721
|
190
|
Start
|
Mid
|
665
|
Basic Linear Algebra Subprograms
|
5,713
|
190
|
C
|
Low
|
666
|
Online machine learning
|
5,710
|
190
|
C
|
Mid
|
667
|
Search engine indexing
|
5,705
|
190
|
C
|
Unknown
|
668
|
Elbow method (clustering)
|
5,675
|
189
|
Unknown
|
Unknown
|
669
|
Algebraic data type
|
5,673
|
189
|
Start
|
Low
|
670
|
Set cover problem
|
5,658
|
188
|
C
|
Mid
|
671
|
Binary space partitioning
|
5,651
|
188
|
C
|
Low
|
672
|
Distributed operating system
|
5,638
|
187
|
C
|
Mid
|
673
|
Standard ML
|
5,637
|
187
|
C
|
Mid
|
674
|
Mixin
|
5,634
|
187
|
Start
|
Low
|
675
|
Damerau–Levenshtein distance
|
5,634
|
187
|
Start
|
Low
|
676
|
Wiener filter
|
5,619
|
187
|
Start
|
Unknown
|
677
|
Splay tree
|
5,617
|
187
|
C
|
Mid
|
678
|
Lazy evaluation
|
5,614
|
187
|
C
|
High
|
679
|
Vertex cover
|
5,605
|
186
|
C
|
Mid
|
680
|
Computation
|
5,596
|
186
|
Start
|
Top
|
681
|
Cyclic permutation
|
5,594
|
186
|
Start
|
Unknown
|
682
|
Aho–Corasick algorithm
|
5,585
|
186
|
Start
|
Mid
|
683
|
Semantics (computer science)
|
5,583
|
186
|
C
|
Top
|
684
|
ActionScript
|
5,579
|
185
|
C
|
Low
|
685
|
Chain-of-responsibility pattern
|
5,577
|
185
|
Stub
|
Unknown
|
686
|
Selection algorithm
|
5,556
|
185
|
C
|
Mid
|
687
|
Message passing
|
5,527
|
184
|
Start
|
High
|
688
|
First-class citizen
|
5,525
|
184
|
Stub
|
Low
|
689
|
Formal grammar
|
5,518
|
183
|
C
|
Mid
|
690
|
Fold (higher-order function)
|
5,501
|
183
|
Start
|
Mid
|
691
|
C string handling
|
5,489
|
182
|
C
|
Low
|
692
|
List (abstract data type)
|
5,471
|
182
|
Start
|
High
|
693
|
Subnormal number
|
5,457
|
181
|
Unknown
|
Unknown
|
694
|
List of computer scientists
|
5,456
|
181
|
Unknown
|
Unknown
|
695
|
C--
|
5,448
|
181
|
Start
|
Low
|
696
|
HyperLogLog
|
5,445
|
181
|
C
|
Unknown
|
697
|
Independent set (graph theory)
|
5,428
|
180
|
C
|
Mid
|
698
|
Tagged union
|
5,422
|
180
|
Start
|
Low
|
699
|
Operator associativity
|
5,418
|
180
|
Start
|
Unknown
|
700
|
User-centered design
|
5,400
|
180
|
Start
|
Mid
|
701
|
Compare-and-swap
|
5,396
|
179
|
C
|
Low
|
702
|
Pumping lemma for regular languages
|
5,396
|
179
|
C
|
Low
|
703
|
Parametric design
|
5,393
|
179
|
Start
|
Unknown
|
704
|
Systems programming
|
5,371
|
179
|
B
|
Top
|
705
|
Computational chemistry
|
5,362
|
178
|
B
|
Top
|
706
|
Clique problem
|
5,341
|
178
|
GA
|
Mid
|
707
|
Enterprise architecture framework
|
5,333
|
177
|
Start
|
Unknown
|
708
|
Raft (algorithm)
|
5,323
|
177
|
C
|
Low
|
709
|
Mock object
|
5,319
|
177
|
Start
|
Unknown
|
710
|
Computational neuroscience
|
5,313
|
177
|
B
|
Mid
|
711
|
General-purpose programming language
|
5,313
|
177
|
Stub
|
Mid
|
712
|
Signed zero
|
5,278
|
175
|
C
|
Low
|
713
|
Artificial life
|
5,273
|
175
|
B
|
High
|
714
|
Relational database management system
|
5,270
|
175
|
NA
|
NA
|
715
|
Vapnik–Chervonenkis dimension
|
5,243
|
174
|
Start
|
Mid
|
716
|
Code injection
|
5,242
|
174
|
C
|
High
|
717
|
Quantum algorithm
|
5,234
|
174
|
C
|
High
|
718
|
Computability theory
|
5,230
|
174
|
B
|
Top
|
719
|
Hamming weight
|
5,228
|
174
|
C
|
Unknown
|
720
|
Query language
|
5,224
|
174
|
Start
|
Mid
|
721
|
Information processing
|
5,221
|
174
|
Start
|
Unknown
|
722
|
Webmaster
|
5,217
|
173
|
Start
|
Low
|
723
|
Multi-agent system
|
5,211
|
173
|
Start
|
Mid
|
724
|
Data quality
|
5,206
|
173
|
Start
|
Low
|
725
|
Pattern matching
|
5,198
|
173
|
C
|
Mid
|
726
|
Formal verification
|
5,197
|
173
|
Start
|
High
|
727
|
Deno (software)
|
5,174
|
172
|
Start
|
Low
|
728
|
Sycamore processor
|
5,158
|
171
|
Stub
|
Low
|
729
|
Tree structure
|
5,154
|
171
|
Start
|
High
|
730
|
Program optimization
|
5,154
|
171
|
B
|
High
|
731
|
Hard coding
|
5,152
|
171
|
Start
|
Low
|
732
|
Timeline of quantum computing and communication
|
5,148
|
171
|
List
|
Mid
|
733
|
Coq
|
5,129
|
170
|
Start
|
Mid
|
734
|
Factory (object-oriented programming)
|
5,127
|
170
|
C
|
Low
|
735
|
Rabin–Karp algorithm
|
5,101
|
170
|
C
|
Mid
|
736
|
Compilers: Principles, Techniques, and Tools
|
5,087
|
169
|
Stub
|
Low
|
737
|
Smith–Waterman algorithm
|
5,082
|
169
|
B
|
Mid
|
738
|
Eugene Kaspersky
|
5,067
|
168
|
GA
|
Low
|
739
|
Longest increasing subsequence
|
5,055
|
168
|
C
|
Mid
|
740
|
Segment tree
|
5,052
|
168
|
Unknown
|
Unknown
|
741
|
Ford–Fulkerson algorithm
|
5,051
|
168
|
Start
|
High
|
742
|
Max-flow min-cut theorem
|
5,040
|
168
|
Start
|
High
|
743
|
Rule 110
|
5,028
|
167
|
Start
|
Unknown
|
744
|
Reentrancy (computing)
|
5,018
|
167
|
Start
|
Mid
|
745
|
Three-valued logic
|
5,007
|
166
|
Start
|
Low
|
746
|
Sorting
|
5,001
|
166
|
Start
|
High
|
747
|
David Cheriton
|
5,000
|
166
|
Start
|
Mid
|
748
|
Dynamic programming language
|
4,985
|
166
|
Start
|
Mid
|
749
|
Curry–Howard correspondence
|
4,960
|
165
|
C
|
High
|
750
|
Evaluation strategy
|
4,959
|
165
|
C
|
Top
|
751
|
Algorithmic efficiency
|
4,951
|
165
|
C
|
High
|
752
|
Isolation forest
|
4,942
|
164
|
C
|
Low
|
753
|
A Mathematical Theory of Communication
|
4,937
|
164
|
Start
|
High
|
754
|
Quantum machine learning
|
4,925
|
164
|
B
|
Unknown
|
755
|
Codewars
|
4,922
|
164
|
Stub
|
Low
|
756
|
Topological data analysis
|
4,921
|
164
|
C
|
Low
|
757
|
Boyer–Moore string-search algorithm
|
4,915
|
163
|
C
|
High
|
758
|
Type conversion
|
4,905
|
163
|
C
|
High
|
759
|
Challenge–response authentication
|
4,904
|
163
|
Start
|
Low
|
760
|
Graph isomorphism
|
4,897
|
163
|
Start
|
Mid
|
761
|
Communicating sequential processes
|
4,897
|
163
|
B
|
Top
|
762
|
Learning rate
|
4,896
|
163
|
Unknown
|
Unknown
|
763
|
Statement (computer science)
|
4,872
|
162
|
Start
|
Mid
|
764
|
Restricted Boltzmann machine
|
4,872
|
162
|
Unknown
|
Unknown
|
765
|
Datalog
|
4,869
|
162
|
Unknown
|
Unknown
|
766
|
Jelani Nelson
|
4,849
|
161
|
C
|
Unknown
|
767
|
Log-structured merge-tree
|
4,843
|
161
|
Start
|
Mid
|
768
|
Dual linear program
|
4,838
|
161
|
Start
|
Low
|
769
|
Jürgen Schmidhuber
|
4,836
|
161
|
C
|
Mid
|
770
|
Artbreeder
|
4,813
|
160
|
Start
|
Low
|
771
|
Best-first search
|
4,797
|
159
|
Stub
|
Unknown
|
772
|
Barbara Liskov
|
4,796
|
159
|
C
|
High
|
773
|
Hidden-surface determination
|
4,793
|
159
|
Start
|
Mid
|
774
|
Sanjay Ghemawat
|
4,776
|
159
|
Start
|
Mid
|
775
|
Metaprogramming
|
4,774
|
159
|
C
|
Mid
|
776
|
Substring
|
4,773
|
159
|
Unknown
|
Unknown
|
777
|
3GP and 3G2
|
4,764
|
158
|
Unknown
|
Unknown
|
778
|
List of fictional computers
|
4,759
|
158
|
Unknown
|
Unknown
|
779
|
Model of computation
|
4,757
|
158
|
Start
|
Mid
|
780
|
Terminal and nonterminal symbols
|
4,754
|
158
|
C
|
Mid
|
781
|
Static single assignment form
|
4,744
|
158
|
C
|
Mid
|
782
|
Boids
|
4,743
|
158
|
Unknown
|
Unknown
|
783
|
Formal methods
|
4,738
|
157
|
Start
|
Top
|
784
|
Hy
|
4,738
|
157
|
Start
|
Low
|
785
|
Women in computing
|
4,724
|
157
|
B
|
High
|
786
|
Niklaus Wirth
|
4,714
|
157
|
Start
|
High
|
787
|
Andrew S. Tanenbaum
|
4,711
|
157
|
C
|
Mid
|
788
|
Treemapping
|
4,686
|
156
|
C
|
Mid
|
789
|
Loop invariant
|
4,676
|
155
|
Unknown
|
Unknown
|
790
|
Duff's device
|
4,676
|
155
|
C
|
Low
|
791
|
Terry Winograd
|
4,675
|
155
|
Start
|
Unknown
|
792
|
3D audio effect
|
4,666
|
155
|
Start
|
Unknown
|
793
|
Space complexity
|
4,665
|
155
|
Start
|
Unknown
|
794
|
Boltzmann machine
|
4,661
|
155
|
C
|
Low
|
795
|
Array programming
|
4,650
|
155
|
C
|
Low
|
796
|
Unique identifier
|
4,649
|
154
|
Start
|
Unknown
|
797
|
External sorting
|
4,647
|
154
|
Unknown
|
Unknown
|
798
|
4,294,967,295
|
4,638
|
154
|
Stub
|
Low
|
799
|
Q (number format)
|
4,633
|
154
|
Unknown
|
Unknown
|
800
|
Bridge pattern
|
4,623
|
154
|
Start
|
Low
|
801
|
Side effect (computer science)
|
4,620
|
154
|
C
|
Mid
|
802
|
Beam search
|
4,620
|
154
|
Stub
|
Unknown
|
803
|
Fixed-point combinator
|
4,609
|
153
|
C
|
Mid
|
804
|
Multi-label classification
|
4,594
|
153
|
Unknown
|
Unknown
|
805
|
ISO/IEC 646
|
4,589
|
152
|
Start
|
Unknown
|
806
|
List of computer algebra systems
|
4,588
|
152
|
List
|
Low
|
807
|
Metasyntactic variable
|
4,582
|
152
|
Unknown
|
Unknown
|
808
|
Transitive closure
|
4,554
|
151
|
C
|
Low
|
809
|
X265
|
4,542
|
151
|
C
|
Low
|
810
|
Kahan summation algorithm
|
4,501
|
150
|
Start
|
Unknown
|
811
|
Quantum programming
|
4,484
|
149
|
Start
|
Mid
|
812
|
Semantic network
|
4,477
|
149
|
Start
|
Low
|
813
|
Automated theorem proving
|
4,465
|
148
|
Start
|
Mid
|
814
|
Object file
|
4,461
|
148
|
Start
|
Mid
|
815
|
Coding conventions
|
4,460
|
148
|
Unknown
|
Unknown
|
816
|
Zettabyte Era
|
4,460
|
148
|
B
|
Low
|
817
|
Immersion (virtual reality)
|
4,437
|
147
|
Start
|
Low
|
818
|
Logical shift
|
4,431
|
147
|
Unknown
|
Unknown
|
819
|
State (computer science)
|
4,430
|
147
|
Start
|
Mid
|
820
|
Interval tree
|
4,399
|
146
|
Start
|
Mid
|
821
|
Xinu
|
4,397
|
146
|
Start
|
Low
|
822
|
Two-phase locking
|
4,357
|
145
|
C
|
High
|
823
|
Business rules engine
|
4,353
|
145
|
Start
|
Unknown
|
824
|
Asynchronous I/O
|
4,342
|
144
|
C
|
Mid
|
825
|
Graham scan
|
4,341
|
144
|
Unknown
|
Unknown
|
826
|
Longest path problem
|
4,331
|
144
|
C
|
Low
|
827
|
Randomized algorithm
|
4,314
|
143
|
C
|
High
|
828
|
List of object-oriented programming languages
|
4,305
|
143
|
List
|
Low
|
829
|
Optimizing compiler
|
4,291
|
143
|
Start
|
High
|
830
|
Delegation pattern
|
4,280
|
142
|
Start
|
Mid
|
831
|
Vendor lock-in
|
4,276
|
142
|
C
|
Mid
|
832
|
Calling convention
|
4,268
|
142
|
Start
|
High
|
833
|
Vala (programming language)
|
4,262
|
142
|
Start
|
Low
|
834
|
SHI International Corp
|
4,253
|
141
|
Start
|
Low
|
835
|
Solution architecture
|
4,252
|
141
|
Start
|
Unknown
|
836
|
Wrapper function
|
4,252
|
141
|
Start
|
Low
|
837
|
Flyweight pattern
|
4,243
|
141
|
Start
|
Unknown
|
838
|
Computer algebra
|
4,241
|
141
|
Start
|
Mid
|
839
|
Computational geometry
|
4,228
|
140
|
Start
|
High
|
840
|
Nasir Ahmed (engineer)
|
4,227
|
140
|
Start
|
Unknown
|
841
|
Job-shop scheduling
|
4,222
|
140
|
C
|
Mid
|
842
|
Gladys West
|
4,212
|
140
|
B
|
Low
|
843
|
Pipeline (software)
|
4,212
|
140
|
Start
|
Mid
|
844
|
Video coding format
|
4,196
|
139
|
C
|
Unknown
|
845
|
Raj Reddy
|
4,191
|
139
|
B
|
Unknown
|
846
|
Matrix chain multiplication
|
4,181
|
139
|
Unknown
|
Unknown
|
847
|
Stack machine
|
4,163
|
138
|
C
|
Mid
|
848
|
Function pointer
|
4,161
|
138
|
Start
|
Low
|
849
|
Intermediate representation
|
4,138
|
137
|
Start
|
Low
|
850
|
Data architecture
|
4,133
|
137
|
Start
|
Mid
|
851
|
Nominal type system
|
4,114
|
137
|
Start
|
Mid
|
852
|
Object code
|
4,111
|
137
|
Start
|
Mid
|
853
|
Electronic data processing
|
4,105
|
136
|
Start
|
Unknown
|
854
|
Set (abstract data type)
|
4,102
|
136
|
Start
|
High
|
855
|
Demand paging
|
4,099
|
136
|
Start
|
Mid
|
856
|
Computer-integrated manufacturing
|
4,079
|
135
|
Start
|
Mid
|
857
|
Perfect hash function
|
4,068
|
135
|
C
|
Unknown
|
858
|
Marching cubes
|
4,059
|
135
|
Start
|
Mid
|
859
|
Computational complexity of matrix multiplication
|
4,058
|
135
|
Unknown
|
Unknown
|
860
|
Peterson's algorithm
|
4,056
|
135
|
C
|
Mid
|
861
|
Distributed version control
|
4,049
|
134
|
Start
|
Mid
|
862
|
Active record pattern
|
4,045
|
134
|
Unknown
|
Unknown
|
863
|
X86 memory segmentation
|
4,040
|
134
|
Start
|
Mid
|
864
|
Hard link
|
4,038
|
134
|
Start
|
Low
|
865
|
Lowest common ancestor
|
4,036
|
134
|
Start
|
Unknown
|
866
|
LR parser
|
4,031
|
134
|
Start
|
High
|
867
|
Build automation
|
4,020
|
134
|
Start
|
Low
|
868
|
Systems modeling
|
4,017
|
133
|
Start
|
Unknown
|
869
|
De Bruijn sequence
|
4,007
|
133
|
C
|
Mid
|
870
|
Hamiltonian path problem
|
3,988
|
132
|
C
|
Mid
|
871
|
CiteSeerX
|
3,978
|
132
|
Start
|
High
|
872
|
Basic feasible solution
|
3,970
|
132
|
Start
|
Mid
|
873
|
Apache Flink
|
3,966
|
132
|
Start
|
Unknown
|
874
|
Operational transformation
|
3,946
|
131
|
B
|
Unknown
|
875
|
Comparison sort
|
3,942
|
131
|
C
|
High
|
876
|
Decision problem
|
3,903
|
130
|
Start
|
Mid
|
877
|
Monte Carlo algorithm
|
3,897
|
129
|
C
|
Mid
|
878
|
Topological insulator
|
3,896
|
129
|
Start
|
Unknown
|
879
|
Artificial Intelligence: A Modern Approach
|
3,890
|
129
|
Start
|
Unknown
|
880
|
Hardware virtualization
|
3,875
|
129
|
Start
|
High
|
881
|
Jon Postel
|
3,875
|
129
|
C
|
Mid
|
882
|
DALL-E
|
3,862
|
128
|
B
|
Unknown
|
883
|
Branch (computer science)
|
3,859
|
128
|
Start
|
Mid
|
884
|
Criticism of C++
|
3,851
|
128
|
C
|
Unknown
|
885
|
Map (higher-order function)
|
3,848
|
128
|
Start
|
Mid
|
886
|
Nondeterministic Turing machine
|
3,842
|
128
|
C
|
High
|
887
|
Runtime (program lifecycle phase)
|
3,833
|
127
|
Start
|
High
|
888
|
Memory segmentation
|
3,832
|
127
|
Stub
|
Mid
|
889
|
Church encoding
|
3,827
|
127
|
B
|
Unknown
|
890
|
Kent Beck
|
3,825
|
127
|
Start
|
Mid
|
891
|
Hybrid log–gamma
|
3,822
|
127
|
Start
|
Low
|
892
|
Thundering herd problem
|
3,820
|
127
|
Start
|
Unknown
|
893
|
Computing Machinery and Intelligence
|
3,820
|
127
|
C
|
High
|
894
|
Cropping (image)
|
3,816
|
127
|
C
|
Unknown
|
895
|
State space search
|
3,806
|
126
|
Unknown
|
Unknown
|
896
|
Hindley–Milner type system
|
3,795
|
126
|
B
|
High
|
897
|
Babel (transcompiler)
|
3,767
|
125
|
Stub
|
Low
|
898
|
Programming language theory
|
3,766
|
125
|
Start
|
Top
|
899
|
Blob detection
|
3,755
|
125
|
Start
|
Mid
|
900
|
ARPABET
|
3,754
|
125
|
Start
|
Unknown
|
901
|
Ivan Sutherland
|
3,727
|
124
|
Start
|
Mid
|
902
|
Stream processing
|
3,711
|
123
|
C
|
Mid
|
903
|
John Backus
|
3,708
|
123
|
C
|
High
|
904
|
Comparison of parser generators
|
3,705
|
123
|
List
|
Mid
|
905
|
Schönhage–Strassen algorithm
|
3,702
|
123
|
C
|
High
|
906
|
Hash collision
|
3,672
|
122
|
Start
|
Low
|
907
|
Purely functional programming
|
3,652
|
121
|
Start
|
Low
|
908
|
Dependent type
|
3,651
|
121
|
Start
|
High
|
909
|
DNA computing
|
3,650
|
121
|
C
|
Mid
|
910
|
Self-modifying code
|
3,647
|
121
|
C
|
Mid
|
911
|
Stylometry
|
3,641
|
121
|
C
|
Low
|
912
|
Type safety
|
3,617
|
120
|
C
|
Mid
|
913
|
Evolutionary computation
|
3,617
|
120
|
C
|
Low
|
914
|
Flow diagram
|
3,616
|
120
|
Start
|
Low
|
915
|
Symbol table
|
3,615
|
120
|
C
|
Low
|
916
|
Differentiable programming
|
3,609
|
120
|
Stub
|
Unknown
|
917
|
Matei Zaharia
|
3,608
|
120
|
Start
|
Unknown
|
918
|
Context-free language
|
3,596
|
119
|
Start
|
Mid
|
919
|
Syntax highlighting
|
3,577
|
119
|
C
|
Low
|
920
|
Control-flow graph
|
3,557
|
118
|
C
|
Mid
|
921
|
Eiffel (programming language)
|
3,527
|
117
|
Start
|
Mid
|
922
|
Moravec's paradox
|
3,510
|
117
|
Start
|
Unknown
|
923
|
Input (computer science)
|
3,502
|
116
|
Stub
|
Unknown
|
924
|
Brian Fox (computer programmer)
|
3,497
|
116
|
Stub
|
Low
|
925
|
2–3 tree
|
3,481
|
116
|
Stub
|
Mid
|
926
|
Cook–Levin theorem
|
3,462
|
115
|
B
|
High
|
927
|
Lazy initialization
|
3,455
|
115
|
Start
|
Low
|
928
|
Alfred Aho
|
3,446
|
114
|
Unknown
|
Unknown
|
929
|
Spanner (database)
|
3,441
|
114
|
Unknown
|
Unknown
|
930
|
Software agent
|
3,436
|
114
|
Start
|
High
|
931
|
Dutch national flag problem
|
3,436
|
114
|
Start
|
Mid
|
932
|
Memento pattern
|
3,431
|
114
|
Start
|
Low
|
933
|
Richard Hamming
|
3,427
|
114
|
GA
|
Mid
|
934
|
Pseudorandom binary sequence
|
3,421
|
114
|
Start
|
Mid
|
935
|
Seymour Papert
|
3,414
|
113
|
C
|
Mid
|
936
|
J (programming language)
|
3,413
|
113
|
Start
|
Low
|
937
|
Complexity class
|
3,412
|
113
|
C
|
High
|
938
|
Foreign function interface
|
3,412
|
113
|
Start
|
Low
|
939
|
Object composition
|
3,408
|
113
|
Start
|
Low
|
940
|
Rule-based system
|
3,406
|
113
|
Unknown
|
Unknown
|
941
|
BCH code
|
3,396
|
113
|
C
|
Unknown
|
942
|
Genetic programming
|
3,393
|
113
|
B
|
Mid
|
943
|
LeNet
|
3,382
|
112
|
Start
|
Unknown
|
944
|
Triplet loss
|
3,379
|
112
|
Stub
|
Low
|
945
|
Deterministic algorithm
|
3,364
|
112
|
Start
|
High
|
946
|
Outline of artificial intelligence
|
3,360
|
112
|
Start
|
High
|
947
|
Hoare logic
|
3,340
|
111
|
Start
|
Top
|
948
|
Jeffrey Ullman
|
3,330
|
111
|
C
|
Mid
|
949
|
Color code
|
3,327
|
110
|
Unknown
|
Unknown
|
950
|
Narendra Karmarkar
|
3,317
|
110
|
Start
|
Low
|
951
|
Smart pointer
|
3,316
|
110
|
C
|
Low
|
952
|
Jamie Zawinski
|
3,312
|
110
|
Start
|
Low
|
953
|
Operator-precedence parser
|
3,308
|
110
|
C
|
Mid
|
954
|
Parametric polymorphism
|
3,305
|
110
|
C
|
Mid
|
955
|
Computer programming in the punched card era
|
3,300
|
110
|
Start
|
Mid
|
956
|
BCS, The Chartered Institute for IT
|
3,295
|
109
|
C
|
Mid
|
957
|
Functional reactive programming
|
3,271
|
109
|
Start
|
Unknown
|
958
|
Soundex
|
3,270
|
109
|
C
|
Unknown
|
959
|
Iterated logarithm
|
3,265
|
108
|
Start
|
Low
|
960
|
Second-generation programming language
|
3,261
|
108
|
Start
|
Low
|
961
|
Ronald Graham
|
3,241
|
108
|
GA
|
Mid
|
962
|
Local search (optimization)
|
3,238
|
107
|
Start
|
Mid
|
963
|
One-instruction set computer
|
3,230
|
107
|
Start
|
Unknown
|
964
|
Oracle machine
|
3,230
|
107
|
C
|
Mid
|
965
|
Homotopy type theory
|
3,221
|
107
|
C
|
Low
|
966
|
Approximation algorithm
|
3,221
|
107
|
Start
|
High
|
967
|
Rule 30
|
3,211
|
107
|
Start
|
Unknown
|
968
|
Clipping (computer graphics)
|
3,210
|
107
|
Start
|
Mid
|
969
|
Affective computing
|
3,207
|
106
|
C
|
Low
|
970
|
Software rot
|
3,205
|
106
|
Unknown
|
Unknown
|
971
|
Chomsky normal form
|
3,199
|
106
|
Start
|
Mid
|
972
|
Green threads
|
3,195
|
106
|
Start
|
Low
|
973
|
Starvation (computer science)
|
3,184
|
106
|
Start
|
Mid
|
974
|
Numerical method
|
3,176
|
105
|
Stub
|
Unknown
|
975
|
Universal hashing
|
3,175
|
105
|
C
|
Mid
|
976
|
Union type
|
3,145
|
104
|
C
|
Mid
|
977
|
Behavior tree (artificial intelligence, robotics and control)
|
3,139
|
104
|
Start
|
Unknown
|
978
|
Iterator
|
3,121
|
104
|
Start
|
Mid
|
979
|
Gustafson's law
|
3,119
|
103
|
C
|
Mid
|
980
|
Automatic summarization
|
3,119
|
103
|
C
|
Unknown
|
981
|
Lightning Memory-Mapped Database
|
3,107
|
103
|
B
|
Unknown
|
982
|
Digital electronic computer
|
3,104
|
103
|
Stub
|
Unknown
|
983
|
Amazon Aurora
|
3,087
|
102
|
Start
|
Low
|
984
|
Bounding volume hierarchy
|
3,084
|
102
|
Unknown
|
Unknown
|
985
|
Computational mathematics
|
3,082
|
102
|
Unknown
|
Unknown
|
986
|
3D reconstruction from multiple images
|
3,077
|
102
|
Unknown
|
Unknown
|
987
|
Concurrency control
|
3,077
|
102
|
C
|
Top
|
988
|
Reversible computing
|
3,075
|
102
|
C
|
Mid
|
989
|
State space
|
3,073
|
102
|
Stub
|
Mid
|
990
|
AV1
|
3,072
|
102
|
B
|
Low
|
991
|
Software developer
|
3,071
|
102
|
NA
|
Low
|
992
|
Random access
|
3,062
|
102
|
Start
|
Unknown
|
993
|
Lloyd's algorithm
|
3,061
|
102
|
Start
|
Mid
|
994
|
Variable shadowing
|
3,060
|
102
|
C
|
Low
|
995
|
Word-sense disambiguation
|
3,059
|
101
|
C
|
Mid
|
996
|
Entry point
|
3,059
|
101
|
Stub
|
Mid
|
997
|
Cognitive computing
|
3,053
|
101
|
Unknown
|
Unknown
|
998
|
Cross-reference
|
3,048
|
101
|
Unknown
|
Unknown
|
999
|
Mean shift
|
3,041
|
101
|
Start
|
Mid
|
1000
|
Hadley Wickham
|
3,034
|
101
|
Start
|
Mid
|