Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
JavaScript
|
803,647
|
26,788
|
B
|
High
|
2
|
C++
|
668,882
|
22,296
|
B
|
High
|
3
|
Artificial intelligence
|
425,329
|
14,177
|
B
|
Top
|
4
|
Cloud computing
|
346,356
|
11,545
|
C
|
Top
|
5
|
C (programming language)
|
249,896
|
8,329
|
B
|
High
|
6
|
Python (programming language)
|
234,826
|
7,827
|
GA
|
High
|
7
|
XML
|
223,151
|
7,438
|
B
|
High
|
8
|
Computer
|
220,763
|
7,358
|
C
|
Top
|
9
|
Software
|
207,074
|
6,902
|
C
|
Top
|
10
|
Ajax (programming)
|
201,444
|
6,714
|
Start
|
High
|
11
|
HTML
|
185,943
|
6,198
|
B
|
High
|
12
|
DALL-E
|
173,193
|
5,773
|
B
|
Mid
|
13
|
Go (programming language)
|
132,777
|
4,425
|
B
|
High
|
14
|
Sergey Brin
|
125,688
|
4,189
|
GA
|
Mid
|
15
|
Video game
|
119,732
|
3,991
|
B
|
Mid
|
16
|
Larry Page
|
118,850
|
3,961
|
B
|
High
|
17
|
JSON
|
114,760
|
3,825
|
B
|
High
|
18
|
PHP
|
111,477
|
3,715
|
GA
|
High
|
19
|
Information technology
|
111,403
|
3,713
|
C
|
Top
|
20
|
Blockchain
|
106,611
|
3,553
|
B
|
Top
|
21
|
Internet of things
|
102,009
|
3,400
|
B
|
Top
|
22
|
Regular expression
|
97,501
|
3,250
|
B
|
Top
|
23
|
Machine learning
|
96,005
|
3,200
|
B
|
Top
|
24
|
Turing test
|
93,877
|
3,129
|
B
|
Top
|
25
|
Object-oriented programming
|
92,379
|
3,079
|
B
|
Top
|
26
|
Lex Fridman
|
90,773
|
3,025
|
Start
|
Low
|
27
|
Computer hardware
|
88,569
|
2,952
|
C
|
Mid
|
28
|
Quantum computing
|
87,553
|
2,918
|
B
|
High
|
29
|
Google Search
|
87,315
|
2,910
|
C
|
High
|
30
|
CSS
|
85,214
|
2,840
|
B
|
High
|
31
|
SQL
|
84,722
|
2,824
|
C
|
Top
|
32
|
R (programming language)
|
81,007
|
2,700
|
B
|
High
|
33
|
Agile software development
|
79,677
|
2,655
|
B
|
High
|
34
|
Computer science
|
78,230
|
2,607
|
C
|
Top
|
35
|
Tim Berners-Lee
|
77,885
|
2,596
|
C
|
Top
|
36
|
Dijkstra's algorithm
|
72,986
|
2,432
|
C
|
Top
|
37
|
OpenAI
|
72,285
|
2,409
|
Start
|
Mid
|
38
|
C Sharp (programming language)
|
70,510
|
2,350
|
B
|
High
|
39
|
Enterprise resource planning
|
69,970
|
2,332
|
B
|
High
|
40
|
Unix
|
69,922
|
2,330
|
B
|
High
|
41
|
Ruby (programming language)
|
69,748
|
2,324
|
B
|
High
|
42
|
Assembly language
|
68,942
|
2,298
|
B
|
High
|
43
|
Node.js
|
66,817
|
2,227
|
C
|
High
|
44
|
Data science
|
64,651
|
2,155
|
Start
|
High
|
45
|
Programming language
|
64,255
|
2,141
|
B
|
Top
|
46
|
Database
|
62,915
|
2,097
|
C
|
Top
|
47
|
Open-source software
|
62,915
|
2,097
|
C
|
High
|
48
|
Artificial neural network
|
61,262
|
2,042
|
C
|
Top
|
49
|
Big O notation
|
60,654
|
2,021
|
B
|
Top
|
50
|
Scrum (software development)
|
60,063
|
2,002
|
C
|
High
|
51
|
Algorithm
|
59,898
|
1,996
|
B
|
Top
|
52
|
DevOps
|
58,932
|
1,964
|
C
|
Low
|
53
|
UTF-8
|
57,719
|
1,923
|
B
|
Mid
|
54
|
K-means clustering
|
57,620
|
1,920
|
C
|
Mid
|
55
|
Turing machine
|
55,692
|
1,856
|
B
|
Top
|
56
|
Monte Carlo method
|
53,372
|
1,779
|
B
|
High
|
57
|
Katherine Johnson
|
52,043
|
1,734
|
GA
|
High
|
58
|
Software engineering
|
51,394
|
1,713
|
C
|
Top
|
59
|
Programming paradigm
|
51,342
|
1,711
|
C
|
Mid
|
60
|
Support-vector machine
|
50,878
|
1,695
|
C
|
Mid
|
61
|
Deep learning
|
50,513
|
1,683
|
C
|
Top
|
62
|
Conway's Game of Life
|
49,889
|
1,662
|
B
|
High
|
63
|
TypeScript
|
49,428
|
1,647
|
C
|
Low
|
64
|
Cryptography
|
47,422
|
1,580
|
B
|
Top
|
65
|
Model–view–controller
|
46,884
|
1,562
|
Start
|
Mid
|
66
|
Travelling salesman problem
|
45,808
|
1,526
|
B
|
High
|
67
|
Virtual reality
|
45,466
|
1,515
|
B
|
High
|
68
|
Quicksort
|
45,106
|
1,503
|
B
|
Top
|
69
|
Bitwise operation
|
44,544
|
1,484
|
C
|
High
|
70
|
Hash table
|
43,973
|
1,465
|
B
|
High
|
71
|
Augmented reality
|
43,633
|
1,454
|
B
|
High
|
72
|
AArch64
|
43,571
|
1,452
|
C
|
Low
|
73
|
Hash function
|
43,525
|
1,450
|
C
|
Top
|
74
|
Programmer
|
42,858
|
1,428
|
C
|
Mid
|
75
|
Computer programming
|
42,706
|
1,423
|
C
|
Top
|
76
|
Natural language processing
|
42,510
|
1,417
|
C
|
Top
|
77
|
A* search algorithm
|
42,219
|
1,407
|
B
|
Mid
|
78
|
P versus NP problem
|
42,156
|
1,405
|
B
|
Top
|
79
|
Diffie–Hellman key exchange
|
41,670
|
1,389
|
C
|
Mid
|
80
|
Web colors
|
40,688
|
1,356
|
C
|
Mid
|
81
|
Millennium Prize Problems
|
40,542
|
1,351
|
C
|
Mid
|
82
|
Robot
|
40,190
|
1,339
|
B
|
Top
|
83
|
Sorting algorithm
|
39,858
|
1,328
|
C
|
Top
|
84
|
Floating-point arithmetic
|
39,200
|
1,306
|
B
|
Top
|
85
|
Free and open-source software
|
39,096
|
1,303
|
C
|
Top
|
86
|
Big data
|
39,075
|
1,302
|
B
|
Top
|
87
|
Functional programming
|
38,889
|
1,296
|
B
|
Top
|
88
|
Finite-state machine
|
37,513
|
1,250
|
B
|
Top
|
89
|
Bogosort
|
37,342
|
1,244
|
Start
|
Low
|
90
|
W3Schools
|
36,774
|
1,225
|
Stub
|
Unknown
|
91
|
Data analysis
|
36,757
|
1,225
|
B
|
High
|
92
|
Software design pattern
|
36,701
|
1,223
|
C
|
High
|
93
|
Breadth-first search
|
36,411
|
1,213
|
Start
|
Top
|
94
|
Prisoner's dilemma
|
36,309
|
1,210
|
C
|
High
|
95
|
Unified Modeling Language
|
35,940
|
1,198
|
C
|
High
|
96
|
Two's complement
|
35,731
|
1,191
|
B
|
High
|
97
|
Heuristic
|
35,346
|
1,178
|
C
|
Mid
|
98
|
Binary search algorithm
|
34,841
|
1,161
|
FA
|
High
|
99
|
Robotics
|
34,614
|
1,153
|
B
|
Top
|
100
|
Self-driving car
|
34,435
|
1,147
|
B
|
High
|
101
|
Fortran
|
34,082
|
1,136
|
C
|
Mid
|
102
|
Swift (programming language)
|
33,922
|
1,130
|
B
|
Mid
|
103
|
Kotlin (programming language)
|
33,795
|
1,126
|
C
|
High
|
104
|
List of programming languages
|
33,691
|
1,123
|
List
|
High
|
105
|
MATLAB
|
33,552
|
1,118
|
B
|
High
|
106
|
Levenshtein distance
|
33,511
|
1,117
|
C
|
Mid
|
107
|
Scratch (programming language)
|
33,166
|
1,105
|
C
|
Mid
|
108
|
Information
|
33,020
|
1,100
|
C
|
Top
|
109
|
Kernel (operating system)
|
32,981
|
1,099
|
B
|
High
|
110
|
Graph theory
|
32,811
|
1,093
|
C
|
High
|
111
|
Time complexity
|
32,741
|
1,091
|
B
|
High
|
112
|
Dennis Ritchie
|
32,648
|
1,088
|
Start
|
High
|
113
|
Softmax function
|
32,355
|
1,078
|
C
|
High
|
114
|
RGB color model
|
32,134
|
1,071
|
B
|
Low
|
115
|
Order of operations
|
32,046
|
1,068
|
C
|
Mid
|
116
|
Computer program
|
31,942
|
1,064
|
C
|
Top
|
117
|
Lisp (programming language)
|
31,873
|
1,062
|
B
|
High
|
118
|
HTML5
|
31,869
|
1,062
|
B
|
High
|
119
|
Deep Blue (chess computer)
|
31,729
|
1,057
|
GA
|
Mid
|
120
|
Software development
|
31,650
|
1,055
|
C
|
Top
|
121
|
Dynamic programming
|
31,631
|
1,054
|
B
|
Top
|
122
|
ECMAScript
|
31,481
|
1,049
|
C
|
Mid
|
123
|
Knapsack problem
|
31,448
|
1,048
|
B
|
Mid
|
124
|
High Efficiency Video Coding
|
31,394
|
1,046
|
B
|
Low
|
125
|
Data mining
|
30,531
|
1,017
|
B
|
High
|
126
|
Merge sort
|
30,458
|
1,015
|
C
|
High
|
127
|
Software testing
|
30,269
|
1,008
|
B
|
Top
|
128
|
Virtualization
|
30,158
|
1,005
|
C
|
High
|
129
|
Lua (programming language)
|
29,505
|
983
|
C
|
Mid
|
130
|
Client–server model
|
29,469
|
982
|
C
|
High
|
131
|
Advanced Video Coding
|
29,279
|
975
|
C
|
Low
|
132
|
Relational database
|
29,263
|
975
|
C
|
Top
|
133
|
Bash (Unix shell)
|
29,186
|
972
|
B
|
Mid
|
134
|
NoSQL
|
28,914
|
963
|
B
|
High
|
135
|
Vector graphics
|
28,903
|
963
|
Start
|
High
|
136
|
Heap (data structure)
|
28,835
|
961
|
C
|
High
|
137
|
Artificial general intelligence
|
28,771
|
959
|
C
|
Mid
|
138
|
Directed acyclic graph
|
28,456
|
948
|
GA
|
High
|
139
|
Brainfuck
|
28,271
|
942
|
C
|
Low
|
140
|
Discrete mathematics
|
28,115
|
937
|
B
|
Top
|
141
|
Malware
|
28,014
|
933
|
C
|
High
|
142
|
Optical character recognition
|
27,953
|
931
|
C
|
Mid
|
143
|
IEEE 754
|
27,831
|
927
|
C
|
High
|
144
|
Boolean algebra
|
27,825
|
927
|
B
|
High
|
145
|
Turing completeness
|
27,629
|
920
|
C
|
Top
|
146
|
Cognition
|
27,539
|
917
|
C
|
Low
|
147
|
Cluster analysis
|
27,481
|
916
|
C
|
High
|
148
|
Compiler
|
27,412
|
913
|
C
|
Top
|
149
|
Procedural programming
|
27,376
|
912
|
Start
|
Mid
|
150
|
Halting problem
|
27,239
|
907
|
B
|
Top
|
151
|
First-order logic
|
27,236
|
907
|
B
|
High
|
152
|
Bioinformatics
|
27,098
|
903
|
C
|
High
|
153
|
Data structure
|
27,030
|
901
|
C
|
Top
|
154
|
Version control
|
27,000
|
900
|
C
|
High
|
155
|
Linear programming
|
26,850
|
895
|
B
|
High
|
156
|
Trie
|
26,832
|
894
|
GA
|
High
|
157
|
Grace Hopper
|
26,805
|
893
|
B
|
Top
|
158
|
Imperative programming
|
26,581
|
886
|
C
|
Top
|
159
|
Binary search tree
|
26,545
|
884
|
C
|
High
|
160
|
COBOL
|
26,346
|
878
|
GA
|
High
|
161
|
Lambda calculus
|
26,248
|
874
|
B
|
High
|
162
|
Cosine similarity
|
26,162
|
872
|
C
|
Low
|
163
|
BASIC
|
26,139
|
871
|
C
|
Mid
|
164
|
Information theory
|
25,919
|
863
|
B
|
Top
|
165
|
Binary tree
|
25,751
|
858
|
B
|
Top
|
166
|
Scala (programming language)
|
25,649
|
854
|
B
|
High
|
167
|
Fast inverse square root
|
25,613
|
853
|
GA
|
Low
|
168
|
Stochastic gradient descent
|
25,534
|
851
|
Start
|
Mid
|
169
|
Quantum logic gate
|
25,509
|
850
|
Start
|
High
|
170
|
Type system
|
25,498
|
849
|
B
|
High
|
171
|
Computer architecture
|
25,472
|
849
|
C
|
Top
|
172
|
Huffman coding
|
25,286
|
842
|
C
|
High
|
173
|
Information security
|
25,281
|
842
|
B
|
Top
|
174
|
Qubit
|
25,214
|
840
|
C
|
High
|
175
|
Computer engineering
|
25,005
|
833
|
C
|
Top
|
176
|
Business intelligence
|
24,841
|
828
|
Start
|
High
|
177
|
NP-completeness
|
24,820
|
827
|
C
|
Top
|
178
|
Stack (abstract data type)
|
24,693
|
823
|
C
|
Top
|
179
|
Don't repeat yourself
|
24,678
|
822
|
Start
|
Mid
|
180
|
Tf–idf
|
24,674
|
822
|
C
|
Low
|
181
|
BERT (language model)
|
24,444
|
814
|
Start
|
Unknown
|
182
|
B-tree
|
24,375
|
812
|
C
|
High
|
183
|
POSIX
|
24,371
|
812
|
Start
|
Mid
|
184
|
Singleton pattern
|
24,308
|
810
|
C
|
Mid
|
185
|
Free software
|
24,058
|
801
|
C
|
High
|
186
|
Extract, transform, load
|
24,028
|
800
|
Start
|
High
|
187
|
Bubble sort
|
23,994
|
799
|
B
|
High
|
188
|
NP-hardness
|
23,791
|
793
|
C
|
High
|
189
|
Topological sorting
|
23,770
|
792
|
C
|
High
|
190
|
Data warehouse
|
23,656
|
788
|
Start
|
High
|
191
|
Exclusive or
|
23,583
|
786
|
C
|
Mid
|
192
|
Insertion sort
|
23,552
|
785
|
B
|
High
|
193
|
Genetic algorithm
|
23,480
|
782
|
C
|
High
|
194
|
Mathematical optimization
|
23,325
|
777
|
B
|
High
|
195
|
Neural network
|
23,127
|
770
|
B
|
High
|
196
|
Distributed computing
|
22,912
|
763
|
B
|
Top
|
197
|
Ken Thompson
|
22,901
|
763
|
B
|
High
|
198
|
Red–black tree
|
22,753
|
758
|
C
|
High
|
199
|
Cross-site request forgery
|
22,730
|
757
|
C
|
High
|
200
|
Floor and ceiling functions
|
22,683
|
756
|
B
|
Mid
|
201
|
Whitespace character
|
22,628
|
754
|
B
|
Mid
|
202
|
Haskell
|
22,290
|
743
|
B
|
Mid
|
203
|
Deadlock
|
22,218
|
740
|
C
|
High
|
204
|
Institute of Electrical and Electronics Engineers
|
22,071
|
735
|
B
|
Top
|
205
|
Cybernetics
|
21,849
|
728
|
B
|
Mid
|
206
|
Computer vision
|
21,824
|
727
|
C
|
Mid
|
207
|
Donald Knuth
|
21,778
|
725
|
B
|
Top
|
208
|
De Morgan's laws
|
21,745
|
724
|
Start
|
High
|
209
|
Sieve of Eratosthenes
|
21,702
|
723
|
C
|
Mid
|
210
|
Real-time operating system
|
21,638
|
721
|
Start
|
Mid
|
211
|
Operations research
|
21,525
|
717
|
C
|
High
|
212
|
Behavior-driven development
|
21,392
|
713
|
B
|
Low
|
213
|
Tree (data structure)
|
21,215
|
707
|
C
|
High
|
214
|
Observer pattern
|
21,024
|
700
|
Start
|
Mid
|
215
|
Computer graphics
|
20,948
|
698
|
B
|
Top
|
216
|
Web development
|
20,884
|
696
|
Start
|
Mid
|
217
|
Tower of Hanoi
|
20,842
|
694
|
C
|
Mid
|
218
|
Smart city
|
20,746
|
691
|
C
|
Mid
|
219
|
HTML element
|
20,733
|
691
|
C
|
Mid
|
220
|
Unit testing
|
20,679
|
689
|
C
|
Mid
|
221
|
Scripting language
|
20,620
|
687
|
C
|
Mid
|
222
|
Minimum spanning tree
|
20,389
|
679
|
C
|
High
|
223
|
Linked list
|
20,370
|
679
|
B
|
Top
|
224
|
Array data structure
|
20,349
|
678
|
C
|
Top
|
225
|
AVL tree
|
20,193
|
673
|
C
|
High
|
226
|
Unsupervised learning
|
20,176
|
672
|
C
|
Mid
|
227
|
Jaccard index
|
20,164
|
672
|
C
|
Mid
|
228
|
Perl
|
20,098
|
669
|
B
|
High
|
229
|
Ada (programming language)
|
19,916
|
663
|
C
|
High
|
230
|
Ray tracing (graphics)
|
19,881
|
662
|
B
|
Mid
|
231
|
Pareto efficiency
|
19,816
|
660
|
C
|
Mid
|
232
|
Data type
|
19,782
|
659
|
C
|
Top
|
233
|
Class diagram
|
19,712
|
657
|
Start
|
Low
|
234
|
Polymorphism (computer science)
|
19,633
|
654
|
C
|
High
|
235
|
High-level programming language
|
19,615
|
653
|
Start
|
High
|
236
|
Swarm intelligence
|
19,533
|
651
|
C
|
Mid
|
237
|
Julia (programming language)
|
19,490
|
649
|
B
|
High
|
238
|
Robotic process automation
|
19,340
|
644
|
Start
|
Mid
|
239
|
Software development process
|
19,198
|
639
|
C
|
Mid
|
240
|
Autoencoder
|
19,196
|
639
|
Start
|
High
|
241
|
Objective-C
|
19,186
|
639
|
C
|
High
|
242
|
Analytics
|
19,128
|
637
|
Start
|
High
|
243
|
Liskov substitution principle
|
19,116
|
637
|
Start
|
Mid
|
244
|
Inversion of control
|
19,051
|
635
|
Start
|
Low
|
245
|
Erlang (programming language)
|
18,930
|
631
|
B
|
Mid
|
246
|
Monad (functional programming)
|
18,852
|
628
|
B
|
Mid
|
247
|
Usage share of operating systems
|
18,800
|
626
|
B
|
Mid
|
248
|
Frontend and backend
|
18,613
|
620
|
Start
|
High
|
249
|
In-place algorithm
|
18,599
|
619
|
Start
|
High
|
250
|
Greedy algorithm
|
18,592
|
619
|
C
|
High
|
251
|
Factory method pattern
|
18,406
|
613
|
Start
|
Mid
|
252
|
Bellman–Ford algorithm
|
18,231
|
607
|
C
|
Mid
|
253
|
Markov chain Monte Carlo
|
18,122
|
604
|
C
|
High
|
254
|
Recursion (computer science)
|
18,121
|
604
|
C
|
Top
|
255
|
Brute-force attack
|
18,025
|
600
|
C
|
High
|
256
|
Dependency inversion principle
|
18,020
|
600
|
Start
|
Low
|
257
|
QBittorrent
|
17,896
|
596
|
Stub
|
Low
|
258
|
Prim's algorithm
|
17,755
|
591
|
C
|
High
|
259
|
Claude Shannon
|
17,621
|
587
|
B
|
High
|
260
|
Expectation–maximization algorithm
|
17,554
|
585
|
C
|
High
|
261
|
Graph (discrete mathematics)
|
17,384
|
579
|
B
|
High
|
262
|
Recursion
|
17,382
|
579
|
C
|
Mid
|
263
|
Boolean satisfiability problem
|
17,292
|
576
|
C
|
Top
|
264
|
Computing
|
17,269
|
575
|
C
|
High
|
265
|
Shortest path problem
|
17,005
|
566
|
C
|
High
|
266
|
Turing Award
|
16,966
|
565
|
Start
|
Top
|
267
|
Cognitive science
|
16,906
|
563
|
C
|
High
|
268
|
Pseudorandom number generator
|
16,904
|
563
|
C
|
Top
|
269
|
Data-flow diagram
|
16,896
|
563
|
Start
|
Mid
|
270
|
Thread (computing)
|
16,696
|
556
|
C
|
High
|
271
|
Tensor Processing Unit
|
16,669
|
555
|
C
|
Mid
|
272
|
Activation function
|
16,599
|
553
|
Start
|
Mid
|
273
|
Hackathon
|
16,569
|
552
|
Start
|
Mid
|
274
|
Amdahl's law
|
16,561
|
552
|
C
|
High
|
275
|
Bias–variance tradeoff
|
16,556
|
551
|
Start
|
Mid
|
276
|
Binary heap
|
16,542
|
551
|
B
|
High
|
277
|
Tree traversal
|
16,517
|
550
|
C
|
High
|
278
|
Edsger W. Dijkstra
|
16,516
|
550
|
B
|
Top
|
279
|
Declarative programming
|
16,449
|
548
|
C
|
Top
|
280
|
WebRTC
|
16,437
|
547
|
Unknown
|
Unknown
|
281
|
Markup language
|
16,388
|
546
|
C
|
High
|
282
|
Prolog
|
16,382
|
546
|
B
|
Mid
|
283
|
Leslie Lamport
|
16,373
|
545
|
Start
|
High
|
284
|
Continuous integration
|
16,356
|
545
|
B
|
Low
|
285
|
Hierarchical clustering
|
16,257
|
541
|
C
|
Mid
|
286
|
Heapsort
|
16,208
|
540
|
B
|
High
|
287
|
DBSCAN
|
16,190
|
539
|
C
|
Mid
|
288
|
Visual Basic .NET
|
16,109
|
536
|
C
|
Mid
|
289
|
Strong and weak typing
|
16,057
|
535
|
Start
|
Mid
|
290
|
Computational fluid dynamics
|
16,013
|
533
|
B
|
High
|
291
|
Avast Antivirus
|
16,010
|
533
|
Start
|
Mid
|
292
|
ISO/IEC 8859-1
|
15,998
|
533
|
Start
|
Unknown
|
293
|
Semaphore (programming)
|
15,986
|
532
|
A
|
High
|
294
|
Human–computer interaction
|
15,861
|
528
|
C
|
Top
|
295
|
Natalie Enright Jerger
|
15,853
|
528
|
Start
|
Unknown
|
296
|
K-d tree
|
15,758
|
525
|
C
|
Low
|
297
|
Strategy pattern
|
15,727
|
524
|
Start
|
Mid
|
298
|
Cache replacement policies
|
15,709
|
523
|
C
|
Mid
|
299
|
Longest palindromic substring
|
15,516
|
517
|
C
|
Low
|
300
|
List of programming languages by type
|
15,514
|
517
|
List
|
High
|
301
|
Source code
|
15,503
|
516
|
C
|
High
|
302
|
Cyclomatic complexity
|
15,501
|
516
|
C
|
Low
|
303
|
Internet Engineering Task Force
|
15,499
|
516
|
C
|
Mid
|
304
|
Disjoint-set data structure
|
15,482
|
516
|
C
|
High
|
305
|
15.ai
|
15,482
|
516
|
GA
|
Low
|
306
|
Parsing
|
15,398
|
513
|
Start
|
Top
|
307
|
Radix sort
|
15,368
|
512
|
Start
|
High
|
308
|
Software bug
|
15,302
|
510
|
B
|
High
|
309
|
Online analytical processing
|
15,297
|
509
|
C
|
Mid
|
310
|
Adjacency matrix
|
15,212
|
507
|
C
|
Mid
|
311
|
Digital Revolution
|
15,205
|
506
|
C
|
Mid
|
312
|
Floyd–Warshall algorithm
|
15,187
|
506
|
B
|
High
|
313
|
HackerRank
|
15,102
|
503
|
Start
|
Unknown
|
314
|
Category theory
|
15,087
|
502
|
B
|
High
|
315
|
Automaton
|
15,043
|
501
|
C
|
High
|
316
|
History of Python
|
15,043
|
501
|
C
|
Low
|
317
|
Numerical analysis
|
15,016
|
500
|
B
|
Top
|
318
|
Residual neural network
|
14,896
|
496
|
Start
|
Low
|
319
|
Race condition
|
14,885
|
496
|
C
|
Top
|
320
|
Parallel computing
|
14,839
|
494
|
FA
|
Top
|
321
|
Context-free grammar
|
14,574
|
485
|
B
|
Top
|
322
|
Kruskal's algorithm
|
14,561
|
485
|
Start
|
High
|
323
|
Complex system
|
14,542
|
484
|
C
|
High
|
324
|
Subroutine
|
14,540
|
484
|
C
|
High
|
325
|
Foobar
|
14,528
|
484
|
C
|
Mid
|
326
|
Marvin Minsky
|
14,521
|
484
|
C
|
High
|
327
|
Maximum subarray problem
|
14,513
|
483
|
Unknown
|
Unknown
|
328
|
Structured programming
|
14,477
|
482
|
Start
|
Mid
|
329
|
Encapsulation (computer programming)
|
14,422
|
480
|
Start
|
High
|
330
|
Garbage collection (computer science)
|
14,336
|
477
|
C
|
High
|
331
|
Hamming distance
|
14,320
|
477
|
Start
|
High
|
332
|
Graph coloring
|
14,231
|
474
|
B
|
Mid
|
333
|
Checksum
|
14,207
|
473
|
Start
|
Mid
|
334
|
Business Process Model and Notation
|
14,190
|
473
|
Start
|
Mid
|
335
|
Pseudocode
|
14,176
|
472
|
C
|
High
|
336
|
Luis von Ahn
|
14,104
|
470
|
Start
|
Low
|
337
|
Ensemble learning
|
13,971
|
465
|
C
|
Mid
|
338
|
Boolean data type
|
13,851
|
461
|
Start
|
Low
|
339
|
Hamming code
|
13,836
|
461
|
C
|
High
|
340
|
Sparse matrix
|
13,822
|
460
|
C
|
Mid
|
341
|
Priority queue
|
13,820
|
460
|
C
|
High
|
342
|
Selection sort
|
13,740
|
458
|
C
|
High
|
343
|
Scaled agile framework
|
13,735
|
457
|
C
|
Low
|
344
|
Bjarne Stroustrup
|
13,722
|
457
|
Start
|
High
|
345
|
Heuristic (computer science)
|
13,710
|
457
|
Unknown
|
Unknown
|
346
|
Static program analysis
|
13,649
|
454
|
C
|
Mid
|
347
|
Role-based access control
|
13,613
|
453
|
C
|
Mid
|
348
|
Ontology (information science)
|
13,595
|
453
|
C
|
High
|
349
|
NP (complexity)
|
13,587
|
452
|
C
|
High
|
350
|
Bresenham's line algorithm
|
13,508
|
450
|
C
|
Mid
|
351
|
Cellular automaton
|
13,484
|
449
|
B
|
High
|
352
|
Composition over inheritance
|
13,474
|
449
|
C
|
Low
|
353
|
Color depth
|
13,462
|
448
|
C
|
Low
|
354
|
Signal processing
|
13,415
|
447
|
C
|
Low
|
355
|
Raster graphics
|
13,293
|
443
|
Start
|
Mid
|
356
|
Kernel (image processing)
|
13,280
|
442
|
Unknown
|
High
|
357
|
Logo (programming language)
|
13,252
|
441
|
C
|
Mid
|
358
|
Abstraction (computer science)
|
13,243
|
441
|
C
|
Top
|
359
|
Rounding
|
13,184
|
439
|
B
|
Low
|
360
|
Timsort
|
13,170
|
439
|
C
|
Mid
|
361
|
Naming convention (programming)
|
13,167
|
438
|
Start
|
Unknown
|
362
|
Smalltalk
|
13,161
|
438
|
C
|
High
|
363
|
System administrator
|
13,111
|
437
|
C
|
High
|
364
|
Vint Cerf
|
13,098
|
436
|
Start
|
Mid
|
365
|
Data model
|
13,031
|
434
|
C
|
High
|
366
|
Mersenne Twister
|
12,983
|
432
|
Unknown
|
Unknown
|
367
|
Procedural generation
|
12,868
|
428
|
Start
|
Unknown
|
368
|
Computational complexity theory
|
12,861
|
428
|
C
|
Top
|
369
|
GPT-2
|
12,849
|
428
|
B
|
Low
|
370
|
Esoteric programming language
|
12,848
|
428
|
Start
|
High
|
371
|
Voxel
|
12,819
|
427
|
C
|
Mid
|
372
|
Abstract data type
|
12,770
|
425
|
C
|
High
|
373
|
Elixir (programming language)
|
12,617
|
420
|
Unknown
|
Unknown
|
374
|
Decorator pattern
|
12,608
|
420
|
Start
|
Low
|
375
|
System call
|
12,592
|
419
|
C
|
Low
|
376
|
Reed–Solomon error correction
|
12,575
|
419
|
C
|
Mid
|
377
|
Particle swarm optimization
|
12,562
|
418
|
C
|
Mid
|
378
|
Hungarian notation
|
12,504
|
416
|
Start
|
Low
|
379
|
Attention (machine learning)
|
12,445
|
414
|
Stub
|
Unknown
|
380
|
Directed graph
|
12,300
|
410
|
C
|
High
|
381
|
Generic programming
|
12,271
|
409
|
C
|
High
|
382
|
Visitor pattern
|
12,258
|
408
|
Start
|
Unknown
|
383
|
String (computer science)
|
12,230
|
407
|
Start
|
High
|
384
|
AlphaGo
|
12,191
|
406
|
C
|
High
|
385
|
Intrusion detection system
|
12,187
|
406
|
Start
|
Low
|
386
|
Automata theory
|
12,165
|
405
|
C
|
Top
|
387
|
Ant colony optimization algorithms
|
12,128
|
404
|
B
|
Low
|
388
|
Builder pattern
|
12,128
|
404
|
Start
|
Unknown
|
389
|
Humanoid robot
|
12,033
|
401
|
C
|
High
|
390
|
Pointer (computer programming)
|
11,983
|
399
|
C
|
High
|
391
|
Iris flower data set
|
11,938
|
397
|
Start
|
Mid
|
392
|
Lenna
|
11,914
|
397
|
C
|
Unknown
|
393
|
APL (programming language)
|
11,906
|
396
|
B
|
Mid
|
394
|
Memetics
|
11,835
|
394
|
Start
|
Unknown
|
395
|
POST (HTTP)
|
11,824
|
394
|
Start
|
Low
|
396
|
Formal language
|
11,822
|
394
|
C
|
High
|
397
|
Dining philosophers problem
|
11,815
|
393
|
Start
|
High
|
398
|
Lossless compression
|
11,776
|
392
|
C
|
High
|
399
|
Multiplication sign
|
11,737
|
391
|
C
|
Low
|
400
|
Relational model
|
11,712
|
390
|
C
|
Top
|
401
|
Avast
|
11,673
|
389
|
B
|
Mid
|
402
|
Rendering (computer graphics)
|
11,661
|
388
|
B
|
High
|
403
|
Expert system
|
11,649
|
388
|
Start
|
Mid
|
404
|
The Art of Computer Programming
|
11,644
|
388
|
C
|
High
|
405
|
Numerical integration
|
11,586
|
386
|
B
|
Mid
|
406
|
Aspect-oriented programming
|
11,495
|
383
|
Start
|
Mid
|
407
|
Lexical analysis
|
11,456
|
381
|
C
|
High
|
408
|
HTTP Live Streaming
|
11,439
|
381
|
Start
|
Low
|
409
|
Inheritance (object-oriented programming)
|
11,370
|
379
|
Start
|
Mid
|
410
|
Front-end web development
|
11,337
|
377
|
Start
|
High
|
411
|
Routing
|
11,317
|
377
|
C
|
Mid
|
412
|
Actor model
|
11,311
|
377
|
C
|
Mid
|
413
|
Federated learning
|
11,229
|
374
|
Start
|
Low
|
414
|
Rob Pike
|
11,120
|
370
|
Start
|
Unknown
|
415
|
Abstraction
|
11,102
|
370
|
Start
|
High
|
416
|
Closure (computer programming)
|
11,036
|
367
|
C
|
Mid
|
417
|
Event-driven programming
|
11,008
|
366
|
Start
|
High
|
418
|
For loop
|
10,968
|
365
|
B
|
High
|
419
|
Multiple inheritance
|
10,965
|
365
|
C
|
Mid
|
420
|
Integer (computer science)
|
10,864
|
362
|
C
|
Mid
|
421
|
IBM Watson
|
10,860
|
362
|
GA
|
Mid
|
422
|
Word (computer architecture)
|
10,860
|
362
|
C
|
Mid
|
423
|
Relational algebra
|
10,834
|
361
|
C
|
Mid
|
424
|
Google AI
|
10,828
|
360
|
Unknown
|
Unknown
|
425
|
Canny edge detector
|
10,824
|
360
|
Start
|
Mid
|
426
|
Knuth–Morris–Pratt algorithm
|
10,771
|
359
|
Start
|
High
|
427
|
Circular buffer
|
10,768
|
358
|
Start
|
Mid
|
428
|
Data modeling
|
10,759
|
358
|
C
|
High
|
429
|
Deep learning super sampling
|
10,749
|
358
|
C
|
Low
|
430
|
Geoffrey Hinton
|
10,742
|
358
|
C
|
Low
|
431
|
The Open Group Architecture Framework
|
10,724
|
357
|
Start
|
High
|
432
|
Identity management
|
10,699
|
356
|
C
|
High
|
433
|
Master theorem (analysis of algorithms)
|
10,672
|
355
|
C
|
High
|
434
|
Conflict-free replicated data type
|
10,650
|
355
|
C
|
High
|
435
|
DeepDream
|
10,648
|
354
|
Start
|
Low
|
436
|
Bachelor of Computer Science
|
10,640
|
354
|
Start
|
High
|
437
|
Command pattern
|
10,632
|
354
|
Start
|
Mid
|
438
|
Error detection and correction
|
10,608
|
353
|
C
|
High
|
439
|
List of pioneers in computer science
|
10,586
|
352
|
List
|
High
|
440
|
Paxos (computer science)
|
10,518
|
350
|
C
|
Low
|
441
|
Ben Horowitz
|
10,425
|
347
|
Start
|
Low
|
442
|
C++23
|
10,395
|
346
|
Stub
|
Low
|
443
|
Branch and bound
|
10,366
|
345
|
Start
|
Mid
|
444
|
Linear congruential generator
|
10,346
|
344
|
Start
|
Mid
|
445
|
Alex Kipman
|
10,341
|
344
|
Start
|
Unknown
|
446
|
Agent-based model
|
10,320
|
344
|
C
|
Mid
|
447
|
List of datasets for machine-learning research
|
10,302
|
343
|
List
|
Mid
|
448
|
Coding theory
|
10,299
|
343
|
C
|
High
|
449
|
Web API
|
10,270
|
342
|
Unknown
|
Unknown
|
450
|
Matroska
|
10,248
|
341
|
Unknown
|
Unknown
|
451
|
Ackermann function
|
10,223
|
340
|
B
|
Mid
|
452
|
Steve Wilhite
|
10,206
|
340
|
Start
|
Low
|
453
|
Computer science and engineering
|
10,203
|
340
|
Start
|
Low
|
454
|
Longest common subsequence problem
|
10,172
|
339
|
Start
|
High
|
455
|
Counting sort
|
10,169
|
338
|
C
|
High
|
456
|
Sørensen–Dice coefficient
|
10,145
|
338
|
Start
|
Unknown
|
457
|
Password cracking
|
10,135
|
337
|
C
|
Low
|
458
|
Process (computing)
|
10,128
|
337
|
C
|
Mid
|
459
|
Memory hierarchy
|
10,122
|
337
|
Start
|
Mid
|
460
|
Named-entity recognition
|
10,088
|
336
|
C
|
Unknown
|
461
|
Nim
|
10,073
|
335
|
C
|
Unknown
|
462
|
Coroutine
|
10,073
|
335
|
C
|
Mid
|
463
|
Decision theory
|
10,073
|
335
|
C
|
High
|
464
|
Monte Carlo tree search
|
10,017
|
333
|
C
|
Mid
|
465
|
Subset sum problem
|
9,966
|
332
|
C
|
Low
|
466
|
Coupling (computer programming)
|
9,966
|
332
|
Start
|
High
|
467
|
Triple DES
|
9,948
|
331
|
Start
|
Unknown
|
468
|
Real-time computing
|
9,931
|
331
|
C
|
High
|
469
|
Code smell
|
9,931
|
331
|
C
|
Low
|
470
|
Shell script
|
9,926
|
330
|
C
|
Mid
|
471
|
Macro (computer science)
|
9,925
|
330
|
C
|
Mid
|
472
|
Logic programming
|
9,891
|
329
|
B
|
Top
|
473
|
Exception handling
|
9,887
|
329
|
B
|
Mid
|
474
|
Search algorithm
|
9,887
|
329
|
Start
|
Top
|
475
|
Primality test
|
9,882
|
329
|
Start
|
Mid
|
476
|
Code
|
9,837
|
327
|
C
|
High
|
477
|
8-bit computing
|
9,831
|
327
|
Start
|
High
|
478
|
Artificial consciousness
|
9,827
|
327
|
C
|
Unknown
|
479
|
Adapter pattern
|
9,814
|
327
|
Start
|
Unknown
|
480
|
Robert C. Martin
|
9,813
|
327
|
Start
|
Mid
|
481
|
Anonymous function
|
9,796
|
326
|
C
|
Mid
|
482
|
Deterministic finite automaton
|
9,760
|
325
|
Start
|
High
|
483
|
Memory management
|
9,759
|
325
|
C
|
High
|
484
|
Queue (abstract data type)
|
9,732
|
324
|
Start
|
Top
|
485
|
B+ tree
|
9,704
|
323
|
Start
|
High
|
486
|
Chomsky hierarchy
|
9,683
|
322
|
Start
|
High
|
487
|
Colossus computer
|
9,677
|
322
|
B
|
Mid
|
488
|
Anti-pattern
|
9,584
|
319
|
C
|
Mid
|
489
|
Existential risk from artificial general intelligence
|
9,571
|
319
|
C
|
Mid
|
490
|
Theoretical computer science
|
9,504
|
316
|
B
|
Top
|
491
|
Information science
|
9,488
|
316
|
C
|
Top
|
492
|
Anomaly detection
|
9,469
|
315
|
Start
|
Mid
|
493
|
Alice and Bob
|
9,395
|
313
|
Start
|
Low
|
494
|
Neuromorphic engineering
|
9,377
|
312
|
B
|
Low
|
495
|
Run-length encoding
|
9,362
|
312
|
Start
|
Mid
|
496
|
Grover's algorithm
|
9,293
|
309
|
C
|
Mid
|
497
|
Control flow
|
9,223
|
307
|
B
|
Top
|
498
|
List of tools for static code analysis
|
9,205
|
306
|
List
|
Low
|
499
|
Call stack
|
9,172
|
305
|
C
|
Mid
|
500
|
Maximum flow problem
|
9,132
|
304
|
C
|
High
|
501
|
Class (computer programming)
|
9,082
|
302
|
Start
|
High
|
502
|
Mean time between failures
|
9,065
|
302
|
C
|
Low
|
503
|
Cut, copy, and paste
|
9,064
|
302
|
C
|
High
|
504
|
Shift register
|
9,046
|
301
|
Start
|
Unknown
|
505
|
Kolmogorov complexity
|
9,032
|
301
|
B
|
High
|
506
|
Church–Turing thesis
|
9,028
|
300
|
C
|
Top
|
507
|
Best, worst and average case
|
8,972
|
299
|
Start
|
High
|
508
|
Skip list
|
8,955
|
298
|
C
|
Mid
|
509
|
Type theory
|
8,946
|
298
|
C
|
High
|
510
|
Hazard (computer architecture)
|
8,915
|
297
|
C
|
Low
|
511
|
Ubiquitous computing
|
8,902
|
296
|
C
|
High
|
512
|
C--
|
8,884
|
296
|
Start
|
Low
|
513
|
Intelligent agent
|
8,863
|
295
|
Unknown
|
Unknown
|
514
|
Computer scientist
|
8,850
|
295
|
Start
|
Top
|
515
|
Shunting yard algorithm
|
8,792
|
293
|
Unknown
|
Unknown
|
516
|
Interface (computing)
|
8,779
|
292
|
C
|
Low
|
517
|
Applications of artificial intelligence
|
8,762
|
292
|
C
|
Low
|
518
|
Sankey diagram
|
8,760
|
292
|
C
|
Low
|
519
|
VP9
|
8,729
|
290
|
B
|
Low
|
520
|
Two-phase commit protocol
|
8,721
|
290
|
C
|
High
|
521
|
Zero-shot learning
|
8,716
|
290
|
C
|
Mid
|
522
|
Row- and column-major order
|
8,707
|
290
|
C
|
Mid
|
523
|
Maze generation algorithm
|
8,674
|
289
|
Start
|
Unknown
|
524
|
Evolutionary algorithm
|
8,660
|
288
|
C
|
Mid
|
525
|
Squeak
|
8,654
|
288
|
B
|
Mid
|
526
|
Bad Apple!!
|
8,629
|
287
|
Start
|
Low
|
527
|
List of data structures
|
8,622
|
287
|
List
|
High
|
528
|
Branch predictor
|
8,620
|
287
|
C
|
Mid
|
529
|
Analysis of algorithms
|
8,554
|
285
|
C
|
Top
|
530
|
Spaghetti code
|
8,538
|
284
|
Start
|
Mid
|
531
|
Email spoofing
|
8,532
|
284
|
Start
|
Low
|
532
|
Abstract factory pattern
|
8,509
|
283
|
Start
|
Mid
|
533
|
AVIF
|
8,504
|
283
|
C
|
Low
|
534
|
Currying
|
8,447
|
281
|
C
|
High
|
535
|
Graph (abstract data type)
|
8,396
|
279
|
C
|
Top
|
536
|
Shannon–Hartley theorem
|
8,382
|
279
|
C
|
High
|
537
|
State machine replication
|
8,379
|
279
|
C
|
High
|
538
|
Isolation forest
|
8,378
|
279
|
C
|
Low
|
539
|
Theory of computation
|
8,373
|
279
|
C
|
Top
|
540
|
Lossy compression
|
8,357
|
278
|
Start
|
High
|
541
|
Extended ASCII
|
8,356
|
278
|
C
|
Low
|
542
|
AWK
|
8,348
|
278
|
B
|
Mid
|
543
|
Concurrent computing
|
8,341
|
278
|
C
|
High
|
544
|
AlphaFold
|
8,320
|
277
|
C
|
Low
|
545
|
Samsung Galaxy A03
|
8,245
|
274
|
Stub
|
Low
|
546
|
Computational linguistics
|
8,171
|
272
|
B
|
High
|
547
|
D (programming language)
|
8,170
|
272
|
C
|
Low
|
548
|
List of unsolved problems in computer science
|
8,165
|
272
|
List
|
Mid
|
549
|
Computational biology
|
8,152
|
271
|
C
|
High
|
550
|
Cycle detection
|
8,113
|
270
|
B
|
Low
|
551
|
Curiously recurring template pattern
|
8,113
|
270
|
C
|
Low
|
552
|
JavaScript engine
|
8,071
|
269
|
Start
|
Mid
|
553
|
Vertex cover
|
8,008
|
266
|
C
|
Mid
|
554
|
No free lunch theorem
|
7,996
|
266
|
Start
|
Mid
|
555
|
Quickselect
|
7,994
|
266
|
C
|
Low
|
556
|
Elbow method (clustering)
|
7,985
|
266
|
Unknown
|
Unknown
|
557
|
Futures studies
|
7,969
|
265
|
B
|
Low
|
558
|
Computation
|
7,920
|
264
|
Start
|
Top
|
559
|
TLA+
|
7,920
|
264
|
B
|
High
|
560
|
Concurrency (computer science)
|
7,913
|
263
|
Start
|
Top
|
561
|
Associative array
|
7,905
|
263
|
C
|
High
|
562
|
Extended Backus–Naur form
|
7,896
|
263
|
C
|
Mid
|
563
|
Quantum key distribution
|
7,891
|
263
|
B
|
Mid
|
564
|
Object (computer science)
|
7,876
|
262
|
Start
|
High
|
565
|
Vehicle routing problem
|
7,866
|
262
|
Unknown
|
Unknown
|
566
|
Umple
|
7,806
|
260
|
Start
|
Low
|
567
|
Consistent hashing
|
7,793
|
259
|
Stub
|
Unknown
|
568
|
Code page 437
|
7,791
|
259
|
C
|
Low
|
569
|
Microkernel
|
7,784
|
259
|
C
|
High
|
570
|
Data (computing)
|
7,780
|
259
|
C
|
Top
|
571
|
Sudoku solving algorithms
|
7,772
|
259
|
B
|
Low
|
572
|
Distributed operating system
|
7,726
|
257
|
C
|
Mid
|
573
|
Cell (microprocessor)
|
7,719
|
257
|
B
|
Mid
|
574
|
Fourth-generation programming language
|
7,712
|
257
|
Start
|
Mid
|
575
|
EBCDIC
|
7,679
|
255
|
Start
|
Mid
|
576
|
Knowledge graph
|
7,676
|
255
|
Start
|
High
|
577
|
Binary file
|
7,671
|
255
|
C
|
High
|
578
|
Check digit
|
7,664
|
255
|
Start
|
Mid
|
579
|
Google Brain
|
7,659
|
255
|
C
|
Mid
|
580
|
L-system
|
7,641
|
254
|
Unknown
|
Unknown
|
581
|
State diagram
|
7,639
|
254
|
C
|
Mid
|
582
|
Division algorithm
|
7,627
|
254
|
C
|
High
|
583
|
C++ classes
|
7,624
|
254
|
C
|
Low
|
584
|
Christopher J. Hadnagy
|
7,621
|
254
|
C
|
Low
|
585
|
Conditional (computer programming)
|
7,588
|
252
|
C
|
Mid
|
586
|
Pushdown automaton
|
7,575
|
252
|
B
|
High
|
587
|
Fault tolerance
|
7,569
|
252
|
Start
|
High
|
588
|
Andrey Kolmogorov
|
7,549
|
251
|
C
|
High
|
589
|
Multiclass classification
|
7,517
|
250
|
Start
|
Mid
|
590
|
Hyper-threading
|
7,463
|
248
|
C
|
Low
|
591
|
Imo.im
|
7,457
|
248
|
Stub
|
Low
|
592
|
Combinatorial optimization
|
7,454
|
248
|
C
|
Top
|
593
|
Longest common substring problem
|
7,446
|
248
|
Start
|
Mid
|
594
|
SAT solver
|
7,433
|
247
|
Start
|
Mid
|
595
|
ABAP
|
7,422
|
247
|
C
|
High
|
596
|
Code coverage
|
7,383
|
246
|
C
|
Low
|
597
|
Variable (computer science)
|
7,344
|
244
|
Start
|
Top
|
598
|
Petri net
|
7,339
|
244
|
B
|
Mid
|
599
|
Ford–Fulkerson algorithm
|
7,325
|
244
|
Start
|
High
|
600
|
Fixed-point combinator
|
7,310
|
243
|
C
|
Mid
|
601
|
Linker (computing)
|
7,266
|
242
|
C
|
Mid
|
602
|
Informatics
|
7,261
|
242
|
C
|
Mid
|
603
|
Memory leak
|
7,257
|
241
|
C
|
Mid
|
604
|
Maze-solving algorithm
|
7,256
|
241
|
Unknown
|
Unknown
|
605
|
Generalized additive model
|
7,232
|
241
|
Start
|
Low
|
606
|
Amortized analysis
|
7,225
|
240
|
Start
|
High
|
607
|
Database design
|
7,220
|
240
|
C
|
High
|
608
|
Self-balancing binary search tree
|
7,211
|
240
|
Start
|
Mid
|
609
|
R-tree
|
7,190
|
239
|
C
|
Mid
|
610
|
Computational science
|
7,174
|
239
|
C
|
Top
|
611
|
Ladder logic
|
7,165
|
238
|
Start
|
Low
|
612
|
Higher-order function
|
7,157
|
238
|
Start
|
High
|
613
|
Data governance
|
7,144
|
238
|
C
|
Unknown
|
614
|
Adversarial machine learning
|
7,137
|
237
|
C
|
Mid
|
615
|
Legacy system
|
7,121
|
237
|
C
|
Unknown
|
616
|
Mixed reality
|
7,111
|
237
|
B
|
Unknown
|
617
|
Wiener filter
|
7,103
|
236
|
Start
|
Low
|
618
|
Mutual exclusion
|
7,099
|
236
|
C
|
Top
|
619
|
Universal Turing machine
|
7,097
|
236
|
C
|
Mid
|
620
|
Constraint satisfaction problem
|
7,060
|
235
|
C
|
Mid
|
621
|
Association for Computing Machinery
|
7,046
|
234
|
C
|
Top
|
622
|
Edge detection
|
7,045
|
234
|
C
|
Mid
|
623
|
Shellsort
|
7,036
|
234
|
B
|
High
|
624
|
Adjacency list
|
7,036
|
234
|
C
|
Mid
|
625
|
Rabin–Karp algorithm
|
7,015
|
233
|
C
|
Mid
|
626
|
Ones' complement
|
7,000
|
233
|
Start
|
Mid
|
627
|
JPEG 2000
|
6,996
|
233
|
C
|
Low
|
628
|
Radix tree
|
6,981
|
232
|
C
|
Mid
|
629
|
Root-finding algorithms
|
6,974
|
232
|
Unknown
|
Unknown
|
630
|
Tony Hoare
|
6,971
|
232
|
C
|
High
|
631
|
Jelani Nelson
|
6,959
|
231
|
C
|
Low
|
632
|
Edit distance
|
6,957
|
231
|
C
|
Mid
|
633
|
Data access object
|
6,947
|
231
|
Start
|
Unknown
|
634
|
Limited-memory BFGS
|
6,917
|
230
|
Unknown
|
Unknown
|
635
|
Directory (computing)
|
6,909
|
230
|
C
|
Low
|
636
|
Reactive programming
|
6,894
|
229
|
Start
|
Mid
|
637
|
Quantum information
|
6,890
|
229
|
Start
|
High
|
638
|
Metaheuristic
|
6,888
|
229
|
Start
|
Mid
|
639
|
Chernoff bound
|
6,884
|
229
|
Start
|
Low
|
640
|
Bill Joy
|
6,881
|
229
|
C
|
Unknown
|
641
|
Ogg
|
6,876
|
229
|
Unknown
|
Unknown
|
642
|
Data and information visualization
|
6,863
|
228
|
C
|
High
|
643
|
Quantum algorithm
|
6,844
|
228
|
C
|
High
|
644
|
Requirements engineering
|
6,791
|
226
|
Start
|
Unknown
|
645
|
State pattern
|
6,791
|
226
|
Start
|
Unknown
|
646
|
Attribute-based access control
|
6,787
|
226
|
Unknown
|
Unknown
|
647
|
Binary-to-text encoding
|
6,765
|
225
|
C
|
Low
|
648
|
ALGOL
|
6,765
|
225
|
C
|
High
|
649
|
List of NP-complete problems
|
6,752
|
225
|
List
|
High
|
650
|
GrabCAD
|
6,742
|
224
|
Unknown
|
Unknown
|
651
|
Data structure alignment
|
6,736
|
224
|
Start
|
Mid
|
652
|
Regular language
|
6,730
|
224
|
C
|
High
|
653
|
String-searching algorithm
|
6,702
|
223
|
Start
|
High
|
654
|
Fibonacci heap
|
6,696
|
223
|
C
|
High
|
655
|
Computer graphics (computer science)
|
6,687
|
222
|
Start
|
Top
|
656
|
Thrashing (computer science)
|
6,681
|
222
|
C
|
Low
|
657
|
Cohesion (computer science)
|
6,664
|
222
|
Unknown
|
Unknown
|
658
|
Consensus (computer science)
|
6,636
|
221
|
Start
|
High
|
659
|
Common Lisp
|
6,625
|
220
|
B
|
High
|
660
|
Mixin
|
6,612
|
220
|
Start
|
Low
|
661
|
Miller–Rabin primality test
|
6,605
|
220
|
C
|
High
|
662
|
Web developer
|
6,589
|
219
|
Start
|
Mid
|
663
|
Computational chemistry
|
6,586
|
219
|
B
|
High
|
664
|
Enterprise architecture
|
6,547
|
218
|
Start
|
Mid
|
665
|
Lempel–Ziv–Welch
|
6,519
|
217
|
C
|
Unknown
|
666
|
Cryptographically secure pseudorandom number generator
|
6,515
|
217
|
C
|
High
|
667
|
Computational complexity
|
6,501
|
216
|
C
|
Top
|
668
|
Smartglasses
|
6,494
|
216
|
C
|
Low
|
669
|
Alonzo Church
|
6,488
|
216
|
C
|
Top
|
670
|
Strassen algorithm
|
6,460
|
215
|
C
|
Low
|
671
|
Signed number representations
|
6,456
|
215
|
C
|
High
|
672
|
Learning rate
|
6,446
|
214
|
Unknown
|
Unknown
|
673
|
Doubly linked list
|
6,441
|
214
|
Start
|
High
|
674
|
All-points bulletin
|
6,430
|
214
|
Unknown
|
Unknown
|
675
|
Comparison of integrated development environments
|
6,424
|
214
|
Start
|
Low
|
676
|
Component (graph theory)
|
6,415
|
213
|
GA
|
Mid
|
677
|
Demand paging
|
6,406
|
213
|
Start
|
Mid
|
678
|
Composite pattern
|
6,405
|
213
|
Start
|
Unknown
|
679
|
Test case
|
6,400
|
213
|
Start
|
Low
|
680
|
Digital data
|
6,393
|
213
|
C
|
Low
|
681
|
Scope (computer science)
|
6,392
|
213
|
C
|
High
|
682
|
Identifier
|
6,339
|
211
|
Start
|
Low
|
683
|
Parsing expression grammar
|
6,336
|
211
|
B
|
Mid
|
684
|
Glossary of graph theory
|
6,315
|
210
|
List
|
Mid
|
685
|
Apriori algorithm
|
6,295
|
209
|
C
|
Mid
|
686
|
Fluent interface
|
6,272
|
209
|
Stub
|
Unknown
|
687
|
Model–view–presenter
|
6,247
|
208
|
C
|
High
|
688
|
16K resolution
|
6,228
|
207
|
Start
|
Unknown
|
689
|
Multiplication algorithm
|
6,212
|
207
|
C
|
Low
|
690
|
API testing
|
6,173
|
205
|
Unknown
|
Unknown
|
691
|
Feature selection
|
6,172
|
205
|
C
|
Mid
|
692
|
LL parser
|
6,167
|
205
|
Start
|
High
|
693
|
Opcode
|
6,155
|
205
|
C
|
High
|
694
|
Object-oriented analysis and design
|
6,149
|
204
|
Start
|
High
|
695
|
Clique problem
|
6,145
|
204
|
GA
|
Mid
|
696
|
Nonlinear programming
|
6,143
|
204
|
C
|
Mid
|
697
|
OpenGL Shading Language
|
6,138
|
204
|
Start
|
Low
|
698
|
Instrumental convergence
|
6,131
|
204
|
C
|
Low
|
699
|
Gradle
|
6,128
|
204
|
C
|
Low
|
700
|
Multi-agent system
|
6,126
|
204
|
Start
|
Mid
|
701
|
Okapi BM25
|
6,097
|
203
|
Start
|
Low
|
702
|
Deep reinforcement learning
|
6,094
|
203
|
Stub
|
Unknown
|
703
|
Artbreeder
|
6,093
|
203
|
Start
|
Low
|
704
|
Vapnik–Chervonenkis dimension
|
6,047
|
201
|
Start
|
Mid
|
705
|
Sandbox (software development)
|
6,045
|
201
|
Start
|
Low
|
706
|
Set cover problem
|
6,036
|
201
|
C
|
Mid
|
707
|
Loose coupling
|
6,034
|
201
|
Start
|
High
|
708
|
Computability theory
|
6,027
|
200
|
B
|
Top
|
709
|
Hy
|
6,017
|
200
|
Start
|
Low
|
710
|
Chain-of-responsibility pattern
|
6,015
|
200
|
Stub
|
Unknown
|
711
|
Independent set (graph theory)
|
6,013
|
200
|
C
|
Mid
|
712
|
C99
|
6,006
|
200
|
C
|
Mid
|
713
|
Brute-force search
|
6,005
|
200
|
Start
|
Mid
|
714
|
Algebraic data type
|
5,997
|
199
|
Start
|
Low
|
715
|
Ethics of artificial intelligence
|
5,987
|
199
|
B
|
Top
|
716
|
Covariance and contravariance (computer science)
|
5,986
|
199
|
Start
|
High
|
717
|
Computational geometry
|
5,982
|
199
|
Start
|
High
|
718
|
Short-circuit evaluation
|
5,956
|
198
|
Start
|
Mid
|
719
|
Compare-and-swap
|
5,953
|
198
|
C
|
Low
|
720
|
Tail call
|
5,949
|
198
|
C
|
Mid
|
721
|
JSONP
|
5,946
|
198
|
C
|
Low
|
722
|
Syntactic sugar
|
5,935
|
197
|
C
|
Mid
|
723
|
MurmurHash
|
5,927
|
197
|
Start
|
Low
|
724
|
Lazy evaluation
|
5,913
|
197
|
C
|
High
|
725
|
Eugene Kaspersky
|
5,912
|
197
|
GA
|
Low
|
726
|
Pointing stick
|
5,908
|
196
|
C
|
Low
|
727
|
Max-flow min-cut theorem
|
5,903
|
196
|
Start
|
High
|
728
|
Dual linear program
|
5,890
|
196
|
Start
|
Low
|
729
|
School timetable
|
5,887
|
196
|
C
|
Low
|
730
|
Web (programming system)
|
5,875
|
195
|
Stub
|
Mid
|
731
|
Timeline of quantum computing and communication
|
5,855
|
195
|
List
|
Mid
|
732
|
Evolutionary computation
|
5,854
|
195
|
C
|
Low
|
733
|
Deno (software)
|
5,852
|
195
|
Start
|
Low
|
734
|
Code.org
|
5,849
|
194
|
C
|
Low
|
735
|
Point in polygon
|
5,843
|
194
|
Unknown
|
Unknown
|
736
|
Prefix sum
|
5,832
|
194
|
Unknown
|
Unknown
|
737
|
Needleman–Wunsch algorithm
|
5,827
|
194
|
Start
|
Mid
|
738
|
Nondeterministic finite automaton
|
5,822
|
194
|
B
|
High
|
739
|
Adam D'Angelo
|
5,813
|
193
|
Start
|
Low
|
740
|
Inverter (logic gate)
|
5,800
|
193
|
Start
|
Unknown
|
741
|
Suffix tree
|
5,779
|
192
|
C
|
High
|
742
|
Cargo cult programming
|
5,764
|
192
|
Start
|
Low
|
743
|
Boyer–Moore string-search algorithm
|
5,751
|
191
|
C
|
High
|
744
|
Arity
|
5,746
|
191
|
C
|
Low
|
745
|
First-class function
|
5,743
|
191
|
C
|
High
|
746
|
Linear search
|
5,743
|
191
|
Start
|
Mid
|
747
|
Boolean
|
5,741
|
191
|
Disambig
|
NA
|
748
|
Codewars
|
5,735
|
191
|
Stub
|
Low
|
749
|
Randomized algorithm
|
5,722
|
190
|
C
|
High
|
750
|
Graph isomorphism
|
5,719
|
190
|
Start
|
Mid
|
751
|
Basic Linear Algebra Subprograms
|
5,708
|
190
|
C
|
Low
|
752
|
CORDIC
|
5,707
|
190
|
B
|
Mid
|
753
|
HyperLogLog
|
5,691
|
189
|
C
|
Unknown
|
754
|
Delimiter
|
5,680
|
189
|
C
|
Mid
|
755
|
Function overloading
|
5,673
|
189
|
Unknown
|
Unknown
|
756
|
Datalog
|
5,671
|
189
|
Unknown
|
Unknown
|
757
|
Quantum machine learning
|
5,665
|
188
|
B
|
Unknown
|
758
|
Online machine learning
|
5,654
|
188
|
C
|
Mid
|
759
|
Hamiltonian path problem
|
5,650
|
188
|
C
|
Mid
|
760
|
Double-ended queue
|
5,647
|
188
|
Start
|
High
|
761
|
Vorbis
|
5,647
|
188
|
C
|
Low
|
762
|
Samsung Galaxy Tab A8
|
5,638
|
187
|
Unknown
|
Unknown
|
763
|
Recursive descent parser
|
5,630
|
187
|
Start
|
High
|
764
|
Information processing
|
5,627
|
187
|
Start
|
Unknown
|
765
|
Information hiding
|
5,626
|
187
|
Start
|
Mid
|
766
|
Judea Pearl
|
5,602
|
186
|
C
|
Mid
|
767
|
Thundering herd problem
|
5,567
|
185
|
Start
|
Mid
|
768
|
Direct Rendering Manager
|
5,566
|
185
|
Unknown
|
Unknown
|
769
|
Privilege escalation
|
5,550
|
185
|
Start
|
Low
|
770
|
Coq
|
5,515
|
183
|
Start
|
Mid
|
771
|
Message passing
|
5,502
|
183
|
Start
|
High
|
772
|
Do while loop
|
5,501
|
183
|
C
|
Mid
|
773
|
Elvis operator
|
5,472
|
182
|
Unknown
|
Unknown
|
774
|
Communicating sequential processes
|
5,471
|
182
|
B
|
High
|
775
|
Time formatting and storage bugs
|
5,470
|
182
|
B
|
Low
|
776
|
Video coding format
|
5,460
|
182
|
C
|
Unknown
|
777
|
Damerau–Levenshtein distance
|
5,426
|
180
|
Start
|
Low
|
778
|
Inverted index
|
5,405
|
180
|
Start
|
Mid
|
779
|
Lamport's bakery algorithm
|
5,401
|
180
|
Start
|
Mid
|
780
|
Boltzmann machine
|
5,387
|
179
|
C
|
Low
|
781
|
Non-English-based programming languages
|
5,369
|
178
|
List
|
Low
|
782
|
Evaluation strategy
|
5,366
|
178
|
C
|
Top
|
783
|
Raft (algorithm)
|
5,339
|
177
|
C
|
Low
|
784
|
Women and video games
|
5,329
|
177
|
B
|
Mid
|
785
|
Binary space partitioning
|
5,319
|
177
|
C
|
Low
|
786
|
Metaprogramming
|
5,317
|
177
|
C
|
Mid
|
787
|
Pareto front
|
5,308
|
176
|
Start
|
Unknown
|
788
|
Log-structured merge-tree
|
5,296
|
176
|
Start
|
Mid
|
789
|
CiteSeerX
|
5,290
|
176
|
Start
|
High
|
790
|
Units of information
|
5,279
|
175
|
C
|
Mid
|
791
|
GPS Exchange Format
|
5,271
|
175
|
Unknown
|
Unknown
|
792
|
Model of computation
|
5,247
|
174
|
Start
|
Mid
|
793
|
Proxy pattern
|
5,238
|
174
|
Start
|
Mid
|
794
|
Async/await
|
5,235
|
174
|
C
|
Mid
|
795
|
Automated theorem proving
|
5,213
|
173
|
Start
|
Mid
|
796
|
Query language
|
5,212
|
173
|
Start
|
Mid
|
797
|
Mock object
|
5,208
|
173
|
Start
|
Low
|
798
|
8-bit color
|
5,202
|
173
|
Start
|
Low
|
799
|
Jaro–Winkler distance
|
5,186
|
172
|
Unknown
|
Unknown
|
800
|
Template method pattern
|
5,184
|
172
|
Start
|
Low
|
801
|
Profiling (computer programming)
|
5,179
|
172
|
C
|
Mid
|
802
|
Synchronization (computer science)
|
5,175
|
172
|
B
|
High
|
803
|
Semantics (computer science)
|
5,167
|
172
|
C
|
High
|
804
|
Computational neuroscience
|
5,167
|
172
|
B
|
Mid
|
805
|
Hill climbing
|
5,160
|
172
|
C
|
Mid
|
806
|
Fold (higher-order function)
|
5,156
|
171
|
Start
|
Mid
|
807
|
HTML5 video
|
5,155
|
171
|
Unknown
|
Unknown
|
808
|
Information management
|
5,151
|
171
|
C
|
Low
|
809
|
Formal verification
|
5,148
|
171
|
Start
|
High
|
810
|
Median of medians
|
5,148
|
171
|
C
|
Low
|
811
|
Garlin Gilchrist
|
5,145
|
171
|
Start
|
Low
|
812
|
Phong reflection model
|
5,139
|
171
|
Unknown
|
Unknown
|
813
|
Computer performance
|
5,138
|
171
|
Start
|
Mid
|
814
|
Physics-informed neural networks
|
5,119
|
170
|
Unknown
|
Low
|
815
|
Object database
|
5,119
|
170
|
Start
|
High
|
816
|
DNS rebinding
|
5,101
|
170
|
Unknown
|
Unknown
|
817
|
Distributed version control
|
5,097
|
169
|
Start
|
Mid
|
818
|
Three-valued logic
|
5,094
|
169
|
Start
|
Low
|
819
|
Sycamore processor
|
5,093
|
169
|
Stub
|
Low
|
820
|
Computational complexity of mathematical operations
|
5,088
|
169
|
B
|
Mid
|
821
|
Correlated subquery
|
5,083
|
169
|
Unknown
|
Unknown
|
822
|
Systems programming
|
5,078
|
169
|
B
|
High
|
823
|
Search engine indexing
|
5,072
|
169
|
C
|
Unknown
|
824
|
Matrix multiplication algorithm
|
5,036
|
167
|
C
|
Mid
|
825
|
Semantic network
|
5,034
|
167
|
Start
|
Low
|
826
|
Multi-label classification
|
5,025
|
167
|
Unknown
|
Unknown
|
827
|
Terry Winograd
|
5,020
|
167
|
Start
|
Unknown
|
828
|
Narendra Karmarkar
|
5,009
|
166
|
Start
|
Low
|
829
|
Thread pool
|
5,005
|
166
|
Unknown
|
Unknown
|
830
|
Message queue
|
4,995
|
166
|
Unknown
|
Unknown
|
831
|
Infinite loop
|
4,994
|
166
|
Start
|
Mid
|
832
|
Translation studies
|
4,990
|
166
|
Start
|
Mid
|
833
|
Rule 110
|
4,970
|
165
|
Start
|
Mid
|
834
|
Aho–Corasick algorithm
|
4,962
|
165
|
Start
|
Mid
|
835
|
Splay tree
|
4,945
|
164
|
C
|
Mid
|
836
|
Goto
|
4,941
|
164
|
C
|
Mid
|
837
|
Open-source license
|
4,938
|
164
|
Start
|
Low
|
838
|
Dynamic programming language
|
4,934
|
164
|
Start
|
Mid
|
839
|
ISO/IEC 646
|
4,927
|
164
|
Start
|
Unknown
|
840
|
Segment tree
|
4,921
|
164
|
Unknown
|
Unknown
|
841
|
Fragmentation (computing)
|
4,904
|
163
|
C
|
Mid
|
842
|
Two-phase locking
|
4,899
|
163
|
C
|
High
|
843
|
Relational database management system
|
4,895
|
163
|
Redirect
|
NA
|
844
|
ActionScript
|
4,894
|
163
|
C
|
Low
|
845
|
Static single-assignment form
|
4,885
|
162
|
C
|
Mid
|
846
|
Haxe
|
4,882
|
162
|
C
|
Low
|
847
|
Curry–Howard correspondence
|
4,879
|
162
|
C
|
High
|
848
|
Code injection
|
4,864
|
162
|
C
|
High
|
849
|
Peterson's algorithm
|
4,835
|
161
|
C
|
Mid
|
850
|
Don Norman
|
4,828
|
160
|
Start
|
Mid
|
851
|
Cook–Levin theorem
|
4,825
|
160
|
B
|
High
|
852
|
General-purpose programming language
|
4,824
|
160
|
Stub
|
Mid
|
853
|
Stream processing
|
4,818
|
160
|
C
|
Mid
|
854
|
Restricted Boltzmann machine
|
4,810
|
160
|
Unknown
|
Unknown
|
855
|
Hash collision
|
4,801
|
160
|
Start
|
Low
|
856
|
Nondeterministic Turing machine
|
4,799
|
159
|
C
|
High
|
857
|
Lowest common ancestor
|
4,796
|
159
|
Start
|
Unknown
|
858
|
Tagged union
|
4,786
|
159
|
Start
|
Low
|
859
|
BCH code
|
4,784
|
159
|
C
|
Unknown
|
860
|
Continuation-passing style
|
4,776
|
159
|
Start
|
Mid
|
861
|
Challenge–response authentication
|
4,776
|
159
|
Start
|
Low
|
862
|
Smith–Waterman algorithm
|
4,771
|
159
|
B
|
Mid
|
863
|
Billy Markus
|
4,765
|
158
|
Stub
|
Low
|
864
|
Hindley–Milner type system
|
4,761
|
158
|
B
|
High
|
865
|
Longest path problem
|
4,752
|
158
|
C
|
Low
|
866
|
Text mining
|
4,719
|
157
|
Start
|
Unknown
|
867
|
Perfect hash function
|
4,717
|
157
|
C
|
Unknown
|
868
|
Catastrophic interference
|
4,709
|
156
|
C
|
Low
|
869
|
Build automation
|
4,670
|
155
|
Start
|
Low
|
870
|
Operator overloading
|
4,666
|
155
|
C
|
Mid
|
871
|
Reentrancy (computing)
|
4,666
|
155
|
Start
|
Mid
|
872
|
LeNet
|
4,651
|
155
|
Start
|
Unknown
|
873
|
Selection algorithm
|
4,647
|
154
|
C
|
Mid
|
874
|
Database model
|
4,641
|
154
|
C
|
High
|
875
|
Formal methods
|
4,625
|
154
|
Start
|
Top
|
876
|
Parametric design
|
4,606
|
153
|
Start
|
Unknown
|
877
|
Programming language theory
|
4,606
|
153
|
Start
|
Top
|
878
|
Webmaster
|
4,594
|
153
|
Start
|
Low
|
879
|
Computational thinking
|
4,552
|
151
|
Start
|
Unknown
|
880
|
LR parser
|
4,520
|
150
|
Start
|
High
|
881
|
Beam search
|
4,520
|
150
|
Stub
|
Unknown
|
882
|
Dynamic array
|
4,512
|
150
|
C
|
Mid
|
883
|
Marching cubes
|
4,511
|
150
|
Start
|
Mid
|
884
|
Fréchet inception distance
|
4,509
|
150
|
Stub
|
Unknown
|
885
|
History of computer science
|
4,506
|
150
|
B
|
Top
|
886
|
Factory (object-oriented programming)
|
4,493
|
149
|
C
|
Low
|
887
|
Jack Dongarra
|
4,478
|
149
|
Start
|
Mid
|
888
|
Genetic programming
|
4,466
|
148
|
B
|
Mid
|
889
|
Side effect (computer science)
|
4,435
|
147
|
C
|
Mid
|
890
|
Quantum programming
|
4,431
|
147
|
Start
|
Mid
|
891
|
Barbara Liskov
|
4,422
|
147
|
C
|
High
|
892
|
Boids
|
4,416
|
147
|
Unknown
|
Unknown
|
893
|
Stack machine
|
4,411
|
147
|
C
|
Mid
|
894
|
AI accelerator
|
4,409
|
146
|
B
|
Low
|
895
|
Topological data analysis
|
4,407
|
146
|
C
|
Low
|
896
|
Decision problem
|
4,400
|
146
|
Start
|
High
|
897
|
Artificial life
|
4,398
|
146
|
B
|
High
|
898
|
Edmonds–Karp algorithm
|
4,392
|
146
|
Start
|
Mid
|
899
|
Benjamin Qi
|
4,390
|
146
|
Unknown
|
Unknown
|
900
|
First-class citizen
|
4,386
|
146
|
C
|
Mid
|
901
|
Tree structure
|
4,381
|
146
|
Start
|
High
|
902
|
Duff's device
|
4,376
|
145
|
C
|
Low
|
903
|
Pattern matching
|
4,366
|
145
|
C
|
Mid
|
904
|
LUMI
|
4,361
|
145
|
Start
|
Unknown
|
905
|
Pancake sorting
|
4,356
|
145
|
C
|
Low
|
906
|
Green threads
|
4,355
|
145
|
Start
|
Low
|
907
|
State space search
|
4,327
|
144
|
Unknown
|
Unknown
|
908
|
Raj Reddy
|
4,321
|
144
|
B
|
Unknown
|
909
|
Satisfiability modulo theories
|
4,315
|
143
|
Start
|
Low
|
910
|
Program optimization
|
4,303
|
143
|
B
|
High
|
911
|
Job-shop scheduling
|
4,300
|
143
|
C
|
Mid
|
912
|
Interval tree
|
4,294
|
143
|
Start
|
Mid
|
913
|
Bridge pattern
|
4,290
|
143
|
Start
|
Low
|
914
|
Computational complexity of matrix multiplication
|
4,288
|
142
|
Unknown
|
Unknown
|
915
|
Machine epsilon
|
4,275
|
142
|
Unknown
|
Unknown
|
916
|
3D audio effect
|
4,274
|
142
|
Start
|
Low
|
917
|
User error
|
4,273
|
142
|
Start
|
High
|
918
|
Sorting
|
4,269
|
142
|
Start
|
High
|
919
|
ARPABET
|
4,268
|
142
|
Start
|
Unknown
|
920
|
Simula
|
4,264
|
142
|
Start
|
Mid
|
921
|
Computer algebra
|
4,254
|
141
|
Start
|
Mid
|
922
|
Glossary of computer science
|
4,244
|
141
|
List
|
Top
|
923
|
Compilers: Principles, Techniques, and Tools
|
4,243
|
141
|
Stub
|
Low
|
924
|
Clipping (computer graphics)
|
4,227
|
140
|
Start
|
Mid
|
925
|
Comparison of programming paradigms
|
4,218
|
140
|
C
|
Low
|
926
|
User-centered design
|
4,210
|
140
|
Start
|
Mid
|
927
|
Chomsky normal form
|
4,206
|
140
|
Start
|
Mid
|
928
|
Niklaus Wirth
|
4,195
|
139
|
Start
|
High
|
929
|
Dependent type
|
4,193
|
139
|
Start
|
High
|
930
|
Intermediate representation
|
4,189
|
139
|
Start
|
Low
|
931
|
State (computer science)
|
4,170
|
139
|
Start
|
Mid
|
932
|
Active record pattern
|
4,166
|
138
|
Unknown
|
Unknown
|
933
|
Yukihiro Matsumoto
|
4,163
|
138
|
Start
|
Unknown
|
934
|
Iterative deepening depth-first search
|
4,161
|
138
|
Start
|
Low
|
935
|
Partition problem
|
4,160
|
138
|
Unknown
|
Unknown
|
936
|
Control-flow graph
|
4,151
|
138
|
C
|
Mid
|
937
|
Array programming
|
4,132
|
137
|
C
|
Low
|
938
|
Vala (programming language)
|
4,128
|
137
|
Start
|
Low
|
939
|
Unique identifier
|
4,124
|
137
|
Start
|
Unknown
|
940
|
Hard coding
|
4,116
|
137
|
Start
|
Low
|
941
|
Q (number format)
|
4,114
|
137
|
Unknown
|
Unknown
|
942
|
3GP and 3G2
|
4,111
|
137
|
C
|
Low
|
943
|
Topological insulator
|
4,092
|
136
|
Start
|
Unknown
|
944
|
Susan Fowler
|
4,091
|
136
|
Start
|
Unknown
|
945
|
Context-free language
|
4,090
|
136
|
Start
|
Mid
|
946
|
Double-checked locking
|
4,086
|
136
|
Unknown
|
Unknown
|
947
|
Shannon's source coding theorem
|
4,071
|
135
|
C
|
Low
|
948
|
Asynchronous I/O
|
4,066
|
135
|
C
|
Mid
|
949
|
Dutch national flag problem
|
4,066
|
135
|
Start
|
Mid
|
950
|
Enterprise architecture framework
|
4,060
|
135
|
Start
|
Unknown
|
951
|
Outline of computer science
|
4,054
|
135
|
Start
|
Mid
|
952
|
In-memory database
|
4,046
|
134
|
C
|
High
|
953
|
Description logic
|
4,042
|
134
|
C
|
Unknown
|
954
|
Cyclic permutation
|
4,038
|
134
|
Start
|
Unknown
|
955
|
Andrew S. Tanenbaum
|
4,037
|
134
|
C
|
Mid
|
956
|
Snippet (programming)
|
4,032
|
134
|
Start
|
Low
|
957
|
Kleene star
|
4,008
|
133
|
Start
|
High
|
958
|
Subnormal number
|
4,000
|
133
|
Unknown
|
Unknown
|
959
|
Moravec's paradox
|
3,990
|
133
|
Start
|
Mid
|
960
|
Substring
|
3,987
|
132
|
Start
|
Mid
|
961
|
C string handling
|
3,984
|
132
|
C
|
Low
|
962
|
Pseudorandom binary sequence
|
3,978
|
132
|
Start
|
Mid
|
963
|
Deterministic algorithm
|
3,977
|
132
|
Start
|
High
|
964
|
Nasir Ahmed (engineer)
|
3,960
|
132
|
Start
|
Unknown
|
965
|
Optimizing compiler
|
3,950
|
131
|
Start
|
High
|
966
|
One-instruction set computer
|
3,949
|
131
|
Start
|
Unknown
|
967
|
Thomas Knoll
|
3,949
|
131
|
Unknown
|
Unknown
|
968
|
Longest increasing subsequence
|
3,946
|
131
|
C
|
Mid
|
969
|
Metasyntactic variable
|
3,944
|
131
|
Unknown
|
Unknown
|
970
|
Transitive closure
|
3,929
|
130
|
C
|
Low
|
971
|
Foreign function interface
|
3,925
|
130
|
Start
|
Low
|
972
|
Memory segmentation
|
3,921
|
130
|
Stub
|
Mid
|
973
|
Best-first search
|
3,921
|
130
|
Stub
|
Unknown
|
974
|
Treemapping
|
3,919
|
130
|
C
|
Mid
|
975
|
Data quality
|
3,895
|
129
|
Start
|
Low
|
976
|
Sanjay Ghemawat
|
3,890
|
129
|
Start
|
Mid
|
977
|
Pipeline (software)
|
3,888
|
129
|
Start
|
Mid
|
978
|
Complexity class
|
3,878
|
129
|
C
|
High
|
979
|
Hard link
|
3,873
|
129
|
Start
|
Low
|
980
|
Women in computing
|
3,870
|
129
|
B
|
High
|
981
|
Type conversion
|
3,865
|
128
|
C
|
High
|
982
|
Set (abstract data type)
|
3,864
|
128
|
Start
|
High
|
983
|
X265
|
3,863
|
128
|
C
|
Low
|
984
|
Systems modeling
|
3,860
|
128
|
Start
|
Unknown
|
985
|
Spanner (database)
|
3,851
|
128
|
Unknown
|
Unknown
|
986
|
Calling convention
|
3,848
|
128
|
Start
|
High
|
987
|
Algorithmic bias
|
3,846
|
128
|
GA
|
Top
|
988
|
Terminal and nonterminal symbols
|
3,844
|
128
|
C
|
Mid
|
989
|
Tabu search
|
3,835
|
127
|
Unknown
|
Unknown
|
990
|
Computing Machinery and Intelligence
|
3,823
|
127
|
C
|
High
|
991
|
Sophie Zhang (whistleblower)
|
3,817
|
127
|
Start
|
Low
|
992
|
Structural type system
|
3,803
|
126
|
Start
|
Mid
|
993
|
Vendor lock-in
|
3,796
|
126
|
C
|
Mid
|
994
|
Kai-Fu Lee
|
3,787
|
126
|
Start
|
Unknown
|
995
|
A Mathematical Theory of Communication
|
3,778
|
125
|
Start
|
High
|
996
|
Delegation pattern
|
3,770
|
125
|
Start
|
Mid
|
997
|
Third-generation programming language
|
3,767
|
125
|
Start
|
Mid
|
998
|
Relational operator
|
3,764
|
125
|
C
|
Mid
|
999
|
Type safety
|
3,761
|
125
|
C
|
Mid
|
1000
|
Bead sort
|
3,752
|
125
|
Unknown
|
Unknown
|