Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
Artificial intelligence
|
722,642
|
23,311
|
B
|
Top
|
2
|
OpenAI
|
567,093
|
18,293
|
C
|
Mid
|
3
|
C (programming language)
|
345,814
|
11,155
|
B
|
High
|
4
|
JavaScript
|
228,047
|
7,356
|
B
|
High
|
5
|
Python (programming language)
|
224,366
|
7,237
|
C
|
High
|
6
|
Cloud computing
|
209,953
|
6,772
|
C
|
Top
|
7
|
Computer
|
205,221
|
6,620
|
C
|
Top
|
8
|
Software
|
166,827
|
5,381
|
C
|
Top
|
9
|
C++
|
151,720
|
4,894
|
B
|
High
|
10
|
R (programming language)
|
147,314
|
4,752
|
B
|
High
|
11
|
HTML
|
143,244
|
4,620
|
B
|
High
|
12
|
Go (programming language)
|
136,852
|
4,414
|
B
|
High
|
13
|
Lex Fridman
|
129,893
|
4,190
|
C
|
Low
|
14
|
Larry Page
|
119,005
|
3,838
|
B
|
High
|
15
|
Quantum computing
|
118,702
|
3,829
|
B
|
High
|
16
|
Sergey Brin
|
111,261
|
3,589
|
GA
|
Mid
|
17
|
Machine learning
|
105,847
|
3,414
|
B
|
Top
|
18
|
Video game
|
102,786
|
3,315
|
B
|
Mid
|
19
|
Stable Diffusion
|
94,474
|
3,047
|
Unknown
|
Unknown
|
20
|
Rust (programming language)
|
92,363
|
2,979
|
GA
|
High
|
21
|
Information technology
|
91,678
|
2,957
|
C
|
Top
|
22
|
Information
|
76,695
|
2,474
|
C
|
Top
|
23
|
Turing test
|
74,986
|
2,418
|
B
|
Top
|
24
|
Computer science
|
73,419
|
2,368
|
C
|
Top
|
25
|
Regular expression
|
73,322
|
2,365
|
B
|
Top
|
26
|
JSON
|
70,656
|
2,279
|
B
|
High
|
27
|
CSS
|
69,890
|
2,254
|
B
|
High
|
28
|
Internet of things
|
68,333
|
2,204
|
B
|
Top
|
29
|
Tim Berners-Lee
|
67,934
|
2,191
|
C
|
Top
|
30
|
Katherine Johnson
|
66,105
|
2,132
|
GA
|
High
|
31
|
PHP
|
65,803
|
2,122
|
GA
|
High
|
32
|
Generative artificial intelligence
|
64,942
|
2,094
|
Start
|
Unknown
|
33
|
Computer hardware
|
63,685
|
2,054
|
C
|
Mid
|
34
|
Programming language
|
63,186
|
2,038
|
B
|
Top
|
35
|
Thread (computing)
|
61,619
|
1,987
|
C
|
High
|
36
|
Robot
|
61,169
|
1,973
|
B
|
Top
|
37
|
SQL
|
60,365
|
1,947
|
C
|
Top
|
38
|
Assembly language
|
60,042
|
1,936
|
B
|
High
|
39
|
Blockchain
|
59,855
|
1,930
|
B
|
Top
|
40
|
Algorithm
|
59,102
|
1,906
|
C
|
Top
|
41
|
Object-oriented programming
|
58,038
|
1,872
|
B
|
Top
|
42
|
UTF-8
|
57,436
|
1,852
|
B
|
Mid
|
43
|
Dan Clancy
|
57,131
|
1,842
|
C
|
Unknown
|
44
|
Dijkstra's algorithm
|
56,317
|
1,816
|
C
|
Top
|
45
|
Monte Carlo method
|
56,198
|
1,812
|
B
|
High
|
46
|
Unix
|
55,200
|
1,780
|
B
|
High
|
47
|
Artificial neural network
|
50,643
|
1,633
|
C
|
Top
|
48
|
Artificial general intelligence
|
50,543
|
1,630
|
C
|
Mid
|
49
|
Conway's Game of Life
|
50,096
|
1,616
|
B
|
High
|
50
|
ActivityPub
|
49,499
|
1,596
|
C
|
Low
|
51
|
Ruby (programming language)
|
48,265
|
1,556
|
B
|
High
|
52
|
Turing machine
|
47,948
|
1,546
|
B
|
Top
|
53
|
Agile software development
|
47,842
|
1,543
|
B
|
High
|
54
|
Database
|
47,625
|
1,536
|
C
|
Top
|
55
|
Deep learning
|
47,245
|
1,524
|
C
|
Top
|
56
|
Virtual reality
|
46,981
|
1,515
|
B
|
High
|
57
|
Order of operations
|
45,883
|
1,480
|
C
|
Mid
|
58
|
C Sharp (programming language)
|
45,859
|
1,479
|
B
|
High
|
59
|
Big O notation
|
45,752
|
1,475
|
B
|
Top
|
60
|
Node.js
|
43,536
|
1,404
|
C
|
High
|
61
|
DevOps
|
42,759
|
1,379
|
C
|
Low
|
62
|
W3Schools
|
42,524
|
1,371
|
Stub
|
Low
|
63
|
Millennium Prize Problems
|
42,500
|
1,370
|
C
|
Mid
|
64
|
Hash function
|
42,212
|
1,361
|
C
|
Top
|
65
|
Open-source software
|
41,232
|
1,330
|
C
|
High
|
66
|
Data science
|
40,758
|
1,314
|
Start
|
High
|
67
|
Programmer
|
40,425
|
1,304
|
C
|
Mid
|
68
|
Augmented reality
|
40,389
|
1,302
|
B
|
High
|
69
|
Scrum (software development)
|
39,258
|
1,266
|
C
|
High
|
70
|
Enterprise resource planning
|
39,256
|
1,266
|
B
|
Mid
|
71
|
K-means clustering
|
38,955
|
1,256
|
C
|
Mid
|
72
|
Free and open-source software
|
38,853
|
1,253
|
C
|
Top
|
73
|
Software engineering
|
38,814
|
1,252
|
C
|
Top
|
74
|
Cryptography
|
38,770
|
1,250
|
C
|
Top
|
75
|
Fast Fourier transform
|
38,726
|
1,249
|
B
|
High
|
76
|
Generative pre-trained transformer
|
38,461
|
1,240
|
B
|
Mid
|
77
|
Secure Shell
|
38,367
|
1,237
|
Unknown
|
Unknown
|
78
|
P versus NP problem
|
38,310
|
1,235
|
B
|
Top
|
79
|
Natural language processing
|
37,889
|
1,222
|
C
|
Top
|
80
|
Prisoner's dilemma
|
37,833
|
1,220
|
C
|
High
|
81
|
A* search algorithm
|
37,705
|
1,216
|
B
|
Mid
|
82
|
XML
|
37,538
|
1,210
|
B
|
High
|
83
|
Geoffrey Hinton
|
37,234
|
1,201
|
C
|
Low
|
84
|
Support vector machine
|
36,967
|
1,192
|
C
|
Mid
|
85
|
Diffie–Hellman key exchange
|
36,933
|
1,191
|
C
|
Mid
|
86
|
List of programming languages
|
36,415
|
1,174
|
List
|
High
|
87
|
Travelling salesman problem
|
35,709
|
1,151
|
B
|
High
|
88
|
In-place algorithm
|
34,308
|
1,106
|
Start
|
High
|
89
|
Model–view–controller
|
34,298
|
1,106
|
Start
|
Mid
|
90
|
Computer programming
|
34,245
|
1,104
|
C
|
Top
|
91
|
Two's complement
|
33,312
|
1,074
|
C
|
High
|
92
|
Scratch (programming language)
|
33,306
|
1,074
|
C
|
Mid
|
93
|
Fortran
|
33,236
|
1,072
|
C
|
Mid
|
94
|
TypeScript
|
33,205
|
1,071
|
C
|
Low
|
95
|
High Efficiency Video Coding
|
32,969
|
1,063
|
B
|
Low
|
96
|
Levenshtein distance
|
32,484
|
1,047
|
C
|
Mid
|
97
|
Web colors
|
32,479
|
1,047
|
C
|
Mid
|
98
|
Heuristic
|
32,479
|
1,047
|
C
|
Mid
|
99
|
Floating-point arithmetic
|
32,469
|
1,047
|
B
|
Top
|
100
|
Softmax function
|
32,212
|
1,039
|
C
|
High
|
101
|
Hallucination (artificial intelligence)
|
31,968
|
1,031
|
C
|
Low
|
102
|
Dennis Ritchie
|
31,604
|
1,019
|
Start
|
High
|
103
|
Kernel (operating system)
|
31,193
|
1,006
|
B
|
High
|
104
|
Qubit
|
30,874
|
995
|
C
|
High
|
105
|
Finite-state machine
|
30,727
|
991
|
B
|
Top
|
106
|
Data analysis
|
30,714
|
990
|
B
|
High
|
107
|
Cosine similarity
|
30,329
|
978
|
C
|
Low
|
108
|
Lisp (programming language)
|
30,215
|
974
|
B
|
High
|
109
|
Ilya Sutskever
|
30,081
|
970
|
Start
|
Unknown
|
110
|
Robotics
|
29,836
|
962
|
B
|
Top
|
111
|
Bitwise operation
|
29,806
|
961
|
C
|
High
|
112
|
IEEE 754
|
29,755
|
959
|
C
|
High
|
113
|
Big data
|
29,724
|
958
|
B
|
Top
|
114
|
RGB color model
|
29,612
|
955
|
B
|
Low
|
115
|
Computer program
|
29,576
|
954
|
C
|
Top
|
116
|
Unified Modeling Language
|
29,433
|
949
|
C
|
High
|
117
|
Grace Hopper
|
29,309
|
945
|
B
|
Top
|
118
|
Functional programming
|
28,793
|
928
|
B
|
Top
|
119
|
Self-driving car
|
28,791
|
928
|
B
|
High
|
120
|
Boolean algebra
|
28,733
|
926
|
B
|
High
|
121
|
Bash (Unix shell)
|
28,710
|
926
|
B
|
Mid
|
122
|
Google DeepMind
|
28,247
|
911
|
C
|
Mid
|
123
|
Hash table
|
28,237
|
910
|
B
|
High
|
124
|
COBOL
|
28,153
|
908
|
GA
|
High
|
125
|
Advanced Video Coding
|
28,057
|
905
|
C
|
Low
|
126
|
Lua (programming language)
|
27,810
|
897
|
C
|
Mid
|
127
|
BERT (language model)
|
27,663
|
892
|
Start
|
Unknown
|
128
|
Turing completeness
|
27,138
|
875
|
C
|
Top
|
129
|
Directed acyclic graph
|
27,009
|
871
|
GA
|
High
|
130
|
Quicksort
|
26,966
|
869
|
B
|
Top
|
131
|
Cache replacement policies
|
26,935
|
868
|
C
|
Mid
|
132
|
Information theory
|
26,922
|
868
|
B
|
Top
|
133
|
J (programming language)
|
26,860
|
866
|
Start
|
Low
|
134
|
Institute of Electrical and Electronics Engineers
|
26,810
|
864
|
B
|
Top
|
135
|
Cognition
|
26,810
|
864
|
C
|
Low
|
136
|
BASIC
|
26,810
|
864
|
C
|
Mid
|
137
|
Type system
|
26,795
|
864
|
B
|
High
|
138
|
Sorting algorithm
|
26,449
|
853
|
C
|
Top
|
139
|
Bad Apple!!
|
26,404
|
851
|
Start
|
Low
|
140
|
HTML5
|
26,224
|
845
|
B
|
High
|
141
|
Computer engineering
|
26,165
|
844
|
C
|
Top
|
142
|
Abstraction
|
26,010
|
839
|
Start
|
High
|
143
|
Tower of Hanoi
|
25,800
|
832
|
C
|
Mid
|
144
|
Linear programming
|
25,760
|
830
|
B
|
High
|
145
|
Software design pattern
|
25,739
|
830
|
C
|
High
|
146
|
Compiler
|
25,695
|
828
|
C
|
Top
|
147
|
Cybernetics
|
25,331
|
817
|
C
|
Mid
|
148
|
Google AI
|
25,329
|
817
|
Unknown
|
Unknown
|
149
|
MATLAB
|
25,292
|
815
|
B
|
High
|
150
|
Recursion
|
25,229
|
813
|
C
|
Mid
|
151
|
Time complexity
|
25,072
|
808
|
B
|
High
|
152
|
Discrete mathematics
|
25,064
|
808
|
B
|
Top
|
153
|
Single-precision floating-point format
|
24,970
|
805
|
Unknown
|
Unknown
|
154
|
Neural network
|
24,954
|
804
|
B
|
High
|
155
|
Information security
|
24,625
|
794
|
B
|
Top
|
156
|
Halting problem
|
24,619
|
794
|
B
|
Top
|
157
|
Version control
|
24,518
|
790
|
C
|
High
|
158
|
Lambda calculus
|
24,517
|
790
|
B
|
High
|
159
|
Brainfuck
|
24,363
|
785
|
C
|
Low
|
160
|
Artificial consciousness
|
24,216
|
781
|
C
|
Unknown
|
161
|
Binary search algorithm
|
23,962
|
772
|
FA
|
High
|
162
|
Heap (data structure)
|
23,795
|
767
|
C
|
High
|
163
|
First-order logic
|
23,766
|
766
|
B
|
High
|
164
|
Quantum logic gate
|
23,720
|
765
|
C
|
High
|
165
|
De Morgan's laws
|
23,545
|
759
|
Start
|
High
|
166
|
Programming paradigm
|
23,513
|
758
|
C
|
Mid
|
167
|
Malware
|
23,334
|
752
|
C
|
High
|
168
|
Usage share of operating systems
|
23,315
|
752
|
B
|
Mid
|
169
|
Optical character recognition
|
23,057
|
743
|
C
|
Mid
|
170
|
Bioinformatics
|
23,011
|
742
|
C
|
High
|
171
|
Shor's algorithm
|
22,962
|
740
|
C
|
Mid
|
172
|
Knapsack problem
|
22,930
|
739
|
B
|
Mid
|
173
|
AArch64
|
22,789
|
735
|
C
|
Low
|
174
|
POSIX
|
22,666
|
731
|
B
|
Mid
|
175
|
Attention (machine learning)
|
22,636
|
730
|
Stub
|
Unknown
|
176
|
Fast inverse square root
|
22,249
|
717
|
GA
|
Low
|
177
|
Whitespace character
|
22,195
|
715
|
B
|
Mid
|
178
|
Claude Shannon
|
22,135
|
714
|
B
|
High
|
179
|
Ken Thompson
|
21,946
|
707
|
B
|
High
|
180
|
Software testing
|
21,939
|
707
|
B
|
Top
|
181
|
Software development
|
21,722
|
700
|
C
|
Top
|
182
|
Don't repeat yourself
|
21,718
|
700
|
Start
|
Mid
|
183
|
Mathematical optimization
|
21,297
|
687
|
B
|
High
|
184
|
AV1
|
21,256
|
685
|
B
|
Low
|
185
|
Vector graphics
|
21,250
|
685
|
Start
|
High
|
186
|
Operations research
|
21,119
|
681
|
C
|
High
|
187
|
Ray tracing (graphics)
|
21,011
|
677
|
C
|
Mid
|
188
|
Floor and ceiling functions
|
20,788
|
670
|
B
|
Mid
|
189
|
Stochastic gradient descent
|
20,743
|
669
|
Start
|
Mid
|
190
|
Source code
|
20,740
|
669
|
C
|
High
|
191
|
Merge sort
|
20,718
|
668
|
C
|
High
|
192
|
Sieve of Eratosthenes
|
20,678
|
667
|
C
|
Mid
|
193
|
15.ai
|
20,675
|
666
|
GA
|
Low
|
194
|
Huffman coding
|
20,663
|
666
|
C
|
High
|
195
|
Breadth-first search
|
20,594
|
664
|
Start
|
Top
|
196
|
Exclusive or
|
20,492
|
661
|
C
|
Mid
|
197
|
Scala (programming language)
|
20,459
|
659
|
B
|
High
|
198
|
Relational database
|
20,289
|
654
|
C
|
Top
|
199
|
Swift (programming language)
|
20,130
|
649
|
B
|
Mid
|
200
|
Depth-first search
|
19,784
|
638
|
C
|
Top
|
201
|
Trie
|
19,727
|
636
|
GA
|
High
|
202
|
B-tree
|
19,406
|
626
|
C
|
High
|
203
|
Web development
|
19,103
|
616
|
Start
|
Mid
|
204
|
NoSQL
|
19,072
|
615
|
B
|
High
|
205
|
Snake case
|
19,042
|
614
|
Start
|
Low
|
206
|
Quantum algorithm
|
18,924
|
610
|
C
|
High
|
207
|
Artificial intelligence art
|
18,773
|
605
|
Unknown
|
Unknown
|
208
|
NP-completeness
|
18,768
|
605
|
C
|
Top
|
209
|
ECMAScript
|
18,735
|
604
|
C
|
Mid
|
210
|
Singleton pattern
|
18,644
|
601
|
C
|
Mid
|
211
|
Client–server model
|
18,628
|
600
|
C
|
High
|
212
|
NP-hardness
|
18,613
|
600
|
C
|
High
|
213
|
Computer architecture
|
18,588
|
599
|
C
|
Top
|
214
|
Visual Basic (.NET)
|
18,470
|
595
|
C
|
Mid
|
215
|
Perl
|
18,407
|
593
|
B
|
High
|
216
|
Smart city
|
18,334
|
591
|
C
|
Mid
|
217
|
Data structure
|
18,252
|
588
|
C
|
Top
|
218
|
Cross-site request forgery
|
18,178
|
586
|
C
|
High
|
219
|
Haskell
|
18,121
|
584
|
B
|
Mid
|
220
|
Ada (programming language)
|
17,936
|
578
|
C
|
High
|
221
|
Markov chain Monte Carlo
|
17,880
|
576
|
C
|
High
|
222
|
Cluster analysis
|
17,839
|
575
|
C
|
High
|
223
|
Computer vision
|
17,696
|
570
|
C
|
Top
|
224
|
Brute-force attack
|
17,628
|
568
|
C
|
High
|
225
|
Lenna
|
17,449
|
562
|
C
|
Unknown
|
226
|
Data mining
|
17,333
|
559
|
B
|
High
|
227
|
Red–black tree
|
17,306
|
558
|
C
|
High
|
228
|
Julia (programming language)
|
17,227
|
555
|
B
|
High
|
229
|
Free software
|
17,186
|
554
|
C
|
High
|
230
|
Automaton
|
17,181
|
554
|
C
|
High
|
231
|
Behavior-driven development
|
17,130
|
552
|
B
|
Low
|
232
|
Donald Knuth
|
17,119
|
552
|
B
|
Top
|
233
|
Turing Award
|
17,106
|
551
|
Start
|
Top
|
234
|
Digital Revolution
|
17,043
|
549
|
C
|
Mid
|
235
|
Liskov substitution principle
|
17,030
|
549
|
Start
|
Mid
|
236
|
Category theory
|
17,011
|
548
|
B
|
High
|
237
|
Magic number (programming)
|
16,903
|
545
|
C
|
Mid
|
238
|
High-level programming language
|
16,879
|
544
|
Start
|
High
|
239
|
Tf–idf
|
16,861
|
543
|
C
|
Low
|
240
|
Deep Blue (chess computer)
|
16,827
|
542
|
GA
|
Mid
|
241
|
Computing
|
16,790
|
541
|
C
|
High
|
242
|
Topological sorting
|
16,773
|
541
|
C
|
High
|
243
|
Genetic algorithm
|
16,691
|
538
|
C
|
High
|
244
|
Data warehouse
|
16,672
|
537
|
Start
|
High
|
245
|
Software bug
|
16,630
|
536
|
B
|
High
|
246
|
HackerRank
|
16,616
|
536
|
Start
|
Unknown
|
247
|
Binary search tree
|
16,583
|
534
|
C
|
High
|
248
|
Computer graphics
|
16,577
|
534
|
B
|
Top
|
249
|
Ajax (programming)
|
16,498
|
532
|
Start
|
High
|
250
|
Scripting language
|
16,447
|
530
|
C
|
Mid
|
251
|
Extract, transform, load
|
16,420
|
529
|
Start
|
High
|
252
|
Existential risk from artificial general intelligence
|
16,391
|
528
|
C
|
Mid
|
253
|
Imperative programming
|
16,320
|
526
|
C
|
Top
|
254
|
Pareto efficiency
|
16,140
|
520
|
C
|
Mid
|
255
|
Markup language
|
16,138
|
520
|
C
|
High
|
256
|
Tree (data structure)
|
16,052
|
517
|
C
|
High
|
257
|
Strong and weak typing
|
15,982
|
515
|
Start
|
Mid
|
258
|
Array (data structure)
|
15,917
|
513
|
C
|
Top
|
259
|
Real-time operating system
|
15,915
|
513
|
Start
|
Mid
|
260
|
Tensor Processing Unit
|
15,908
|
513
|
C
|
Mid
|
261
|
Stack (abstract data type)
|
15,886
|
512
|
C
|
Top
|
262
|
Cognitive science
|
15,871
|
511
|
C
|
High
|
263
|
Dependency inversion principle
|
15,847
|
511
|
Start
|
Low
|
264
|
Insertion sort
|
15,820
|
510
|
B
|
High
|
265
|
Monad (functional programming)
|
15,640
|
504
|
B
|
Mid
|
266
|
Computational fluid dynamics
|
15,486
|
499
|
C
|
High
|
267
|
Business intelligence
|
15,384
|
496
|
Start
|
High
|
268
|
Bubble sort
|
15,327
|
494
|
B
|
High
|
269
|
Distributed computing
|
15,135
|
488
|
B
|
Top
|
270
|
Unit testing
|
15,048
|
485
|
C
|
Mid
|
271
|
History of Python
|
14,978
|
483
|
C
|
Low
|
272
|
Graph (discrete mathematics)
|
14,956
|
482
|
B
|
High
|
273
|
HyperLogLog
|
14,932
|
481
|
C
|
Unknown
|
274
|
Vint Cerf
|
14,849
|
479
|
Start
|
Mid
|
275
|
Erlang (programming language)
|
14,834
|
478
|
B
|
Mid
|
276
|
Hackathon
|
14,783
|
476
|
Start
|
Mid
|
277
|
Cellular automaton
|
14,709
|
474
|
B
|
High
|
278
|
IBM Watson
|
14,684
|
473
|
C
|
Mid
|
279
|
ISO/IEC 8859-1
|
14,648
|
472
|
Start
|
Unknown
|
280
|
Foundation models
|
14,644
|
472
|
Unknown
|
Unknown
|
281
|
Pseudorandom number generator
|
14,566
|
469
|
C
|
Top
|
282
|
Factory method pattern
|
14,436
|
465
|
Start
|
Mid
|
283
|
Inversion of control
|
14,352
|
462
|
C
|
Low
|
284
|
Jaccard index
|
14,313
|
461
|
C
|
Mid
|
285
|
List of fictional computers
|
14,247
|
459
|
List
|
Low
|
286
|
Deadlock
|
14,241
|
459
|
C
|
High
|
287
|
Unsupervised learning
|
14,207
|
458
|
C
|
Mid
|
288
|
Data type
|
14,194
|
457
|
C
|
Top
|
289
|
Edsger W. Dijkstra
|
14,158
|
456
|
B
|
Top
|
290
|
Multiplication sign
|
14,143
|
456
|
C
|
Low
|
291
|
Reed–Solomon error correction
|
14,093
|
454
|
C
|
Mid
|
292
|
Class diagram
|
14,090
|
454
|
Start
|
Low
|
293
|
WebRTC
|
14,080
|
454
|
C
|
Low
|
294
|
Semaphore (programming)
|
14,070
|
453
|
Start
|
High
|
295
|
Marvin Minsky
|
14,014
|
452
|
C
|
High
|
296
|
Binary tree
|
13,999
|
451
|
B
|
Top
|
297
|
Humanoid robot
|
13,980
|
450
|
C
|
High
|
298
|
Color depth
|
13,973
|
450
|
C
|
Low
|
299
|
Human–computer interaction
|
13,964
|
450
|
C
|
Top
|
300
|
Objective-C
|
13,917
|
448
|
C
|
High
|
301
|
Composition over inheritance
|
13,865
|
447
|
C
|
Low
|
302
|
Luis von Ahn
|
13,814
|
445
|
Start
|
Low
|
303
|
String (computer science)
|
13,814
|
445
|
Start
|
High
|
304
|
Observer pattern
|
13,750
|
443
|
Start
|
Mid
|
305
|
Autoencoder
|
13,729
|
442
|
Start
|
High
|
306
|
Grayscale
|
13,678
|
441
|
Start
|
Mid
|
307
|
Kernel (image processing)
|
13,664
|
440
|
Unknown
|
High
|
308
|
AlphaGo
|
13,660
|
440
|
C
|
High
|
309
|
Automata theory
|
13,658
|
440
|
C
|
Top
|
310
|
Activation function
|
13,535
|
436
|
Start
|
Mid
|
311
|
Checksum
|
13,489
|
435
|
Start
|
Mid
|
312
|
Polymorphism (computer science)
|
13,487
|
435
|
C
|
High
|
313
|
Variational autoencoder
|
13,438
|
433
|
Unknown
|
Low
|
314
|
Rounding
|
13,429
|
433
|
B
|
Low
|
315
|
AVIF
|
13,429
|
433
|
C
|
Low
|
316
|
Garbage collection (computer science)
|
13,388
|
431
|
C
|
High
|
317
|
Natalie Enright Jerger
|
13,301
|
429
|
Start
|
Unknown
|
318
|
Expectation–maximization algorithm
|
13,247
|
427
|
C
|
High
|
319
|
Prolog
|
13,233
|
426
|
B
|
Mid
|
320
|
Foobar
|
13,077
|
421
|
C
|
Mid
|
321
|
Bjarne Stroustrup
|
13,031
|
420
|
Start
|
High
|
322
|
Applications of artificial intelligence
|
12,958
|
418
|
C
|
Low
|
323
|
Half-precision floating-point format
|
12,856
|
414
|
Unknown
|
Unknown
|
324
|
Boolean satisfiability problem
|
12,803
|
413
|
C
|
Top
|
325
|
Amdahl's law
|
12,798
|
412
|
C
|
High
|
326
|
Complex system
|
12,746
|
411
|
C
|
High
|
327
|
Parsing
|
12,702
|
409
|
Start
|
Top
|
328
|
Cyclomatic complexity
|
12,701
|
409
|
C
|
Low
|
329
|
Analytics
|
12,638
|
407
|
Start
|
High
|
330
|
Internet Engineering Task Force
|
12,627
|
407
|
C
|
Mid
|
331
|
Pseudocode
|
12,610
|
406
|
C
|
High
|
332
|
Residual neural network
|
12,540
|
404
|
Start
|
Low
|
333
|
Linked list
|
12,539
|
404
|
B
|
Top
|
334
|
Race condition
|
12,515
|
403
|
C
|
Top
|
335
|
Smalltalk
|
12,424
|
400
|
C
|
High
|
336
|
Hamming distance
|
12,391
|
399
|
Start
|
High
|
337
|
Minimum spanning tree
|
12,379
|
399
|
C
|
High
|
338
|
Numerical analysis
|
12,347
|
398
|
B
|
Top
|
339
|
Lexical analysis
|
12,304
|
396
|
C
|
High
|
340
|
Raster graphics
|
12,301
|
396
|
Start
|
Mid
|
341
|
Procedural generation
|
12,299
|
396
|
C
|
Unknown
|
342
|
Backus–Naur form
|
12,286
|
396
|
Start
|
Unknown
|
343
|
Tree traversal
|
12,240
|
394
|
C
|
High
|
344
|
NP (complexity)
|
12,176
|
392
|
C
|
High
|
345
|
Greg Brockman
|
12,128
|
391
|
C
|
Low
|
346
|
Bias–variance tradeoff
|
12,093
|
390
|
Start
|
Mid
|
347
|
Church–Turing thesis
|
12,081
|
389
|
C
|
Top
|
348
|
Visitor pattern
|
12,079
|
389
|
Start
|
Unknown
|
349
|
HTML element
|
12,071
|
389
|
C
|
Mid
|
350
|
Declarative programming
|
12,069
|
389
|
C
|
Top
|
351
|
Computer science and engineering
|
12,001
|
387
|
Start
|
Low
|
352
|
QBittorrent
|
11,995
|
386
|
Stub
|
Low
|
353
|
Parallel computing
|
11,934
|
384
|
FA
|
Top
|
354
|
Role-based access control
|
11,904
|
384
|
C
|
Mid
|
355
|
Shortest path problem
|
11,884
|
383
|
C
|
High
|
356
|
Simplex algorithm
|
11,870
|
382
|
C
|
High
|
357
|
Formal language
|
11,866
|
382
|
C
|
High
|
358
|
Voxel
|
11,866
|
382
|
C
|
Mid
|
359
|
Frontend and backend
|
11,820
|
381
|
Start
|
High
|
360
|
AVL tree
|
11,794
|
380
|
C
|
High
|
361
|
Strategy pattern
|
11,761
|
379
|
Start
|
Mid
|
362
|
Kolmogorov complexity
|
11,648
|
375
|
B
|
High
|
363
|
Code
|
11,630
|
375
|
C
|
High
|
364
|
Boolean data type
|
11,626
|
375
|
Start
|
Low
|
365
|
Continuous integration
|
11,562
|
372
|
B
|
Low
|
366
|
Deep learning super sampling
|
11,542
|
372
|
C
|
Low
|
367
|
Adjacency matrix
|
11,533
|
372
|
C
|
Mid
|
368
|
Iris flower data set
|
11,410
|
368
|
Start
|
Mid
|
369
|
Ontology (information science)
|
11,381
|
367
|
C
|
High
|
370
|
Matroska
|
11,358
|
366
|
C
|
Mid
|
371
|
Decorator pattern
|
11,272
|
363
|
Start
|
Low
|
372
|
Rendering (computer graphics)
|
11,250
|
362
|
B
|
High
|
373
|
APL (programming language)
|
11,250
|
362
|
B
|
Mid
|
374
|
Lossless compression
|
11,238
|
362
|
C
|
High
|
375
|
Signal processing
|
11,223
|
362
|
C
|
Low
|
376
|
Software development process
|
11,213
|
361
|
C
|
Mid
|
377
|
Procedural programming
|
11,195
|
361
|
Start
|
Mid
|
378
|
AlphaFold
|
11,191
|
361
|
C
|
Low
|
379
|
Sparse matrix
|
11,184
|
360
|
C
|
Mid
|
380
|
Monte Carlo tree search
|
11,178
|
360
|
C
|
Mid
|
381
|
Computational complexity theory
|
11,143
|
359
|
C
|
Top
|
382
|
State machine replication
|
11,124
|
358
|
C
|
High
|
383
|
DBSCAN
|
11,068
|
357
|
C
|
Mid
|
384
|
Data-flow diagram
|
11,039
|
356
|
Start
|
Mid
|
385
|
Robotic process automation
|
11,016
|
355
|
Start
|
Mid
|
386
|
Context-free grammar
|
10,969
|
353
|
B
|
Top
|
387
|
List of datasets for machine-learning research
|
10,956
|
353
|
List
|
Mid
|
388
|
Business Process Model and Notation
|
10,942
|
352
|
Start
|
Mid
|
389
|
Hierarchical clustering
|
10,930
|
352
|
C
|
Mid
|
390
|
Memetics
|
10,929
|
352
|
Start
|
Unknown
|
391
|
Hungarian notation
|
10,925
|
352
|
Start
|
Low
|
392
|
K-d tree
|
10,916
|
352
|
C
|
Low
|
393
|
Greedy algorithm
|
10,881
|
351
|
C
|
High
|
394
|
IT service management
|
10,843
|
349
|
Start
|
Mid
|
395
|
Sycamore processor
|
10,832
|
349
|
Stub
|
Low
|
396
|
Disjoint-set data structure
|
10,820
|
349
|
C
|
High
|
397
|
Ensemble learning
|
10,813
|
348
|
C
|
Mid
|
398
|
Colossus computer
|
10,805
|
348
|
B
|
Mid
|
399
|
Bresenham's line algorithm
|
10,754
|
346
|
C
|
Mid
|
400
|
Decision theory
|
10,744
|
346
|
C
|
High
|
401
|
Esoteric programming language
|
10,701
|
345
|
Start
|
High
|
402
|
Chomsky hierarchy
|
10,684
|
344
|
C
|
High
|
403
|
Graph coloring
|
10,608
|
342
|
B
|
Mid
|
404
|
Naming convention (programming)
|
10,604
|
342
|
Start
|
Unknown
|
405
|
Actor model
|
10,597
|
341
|
C
|
Mid
|
406
|
Elixir (programming language)
|
10,586
|
341
|
Unknown
|
Unknown
|
407
|
Zero-shot learning
|
10,564
|
340
|
C
|
Mid
|
408
|
Nim
|
10,541
|
340
|
C
|
Unknown
|
409
|
Alice and Bob
|
10,514
|
339
|
Start
|
Low
|
410
|
16K resolution
|
10,353
|
333
|
Start
|
Unknown
|
411
|
Gladys West
|
10,311
|
332
|
B
|
Low
|
412
|
Grover's algorithm
|
10,307
|
332
|
C
|
Mid
|
413
|
The Art of Computer Programming
|
10,288
|
331
|
C
|
High
|
414
|
Recursion (computer science)
|
10,262
|
331
|
C
|
Top
|
415
|
Data and information visualization
|
10,142
|
327
|
C
|
High
|
416
|
Integer (computer science)
|
10,049
|
324
|
C
|
Mid
|
417
|
Bellman–Ford algorithm
|
10,042
|
323
|
C
|
Mid
|
418
|
Computational linguistics
|
10,038
|
323
|
C
|
High
|
419
|
Federated learning
|
10,010
|
322
|
Start
|
Low
|
420
|
C++23
|
9,977
|
321
|
C
|
Low
|
421
|
Hamming code
|
9,920
|
320
|
C
|
High
|
422
|
Imo.im
|
9,876
|
318
|
Stub
|
Low
|
423
|
Lightweight Java Game Library
|
9,805
|
316
|
Start
|
Low
|
424
|
Numerical integration
|
9,760
|
314
|
B
|
Mid
|
425
|
Aspect-oriented programming
|
9,743
|
314
|
Start
|
Mid
|
426
|
Particle swarm optimization
|
9,727
|
313
|
C
|
Mid
|
427
|
List of tools for static code analysis
|
9,687
|
312
|
List
|
Low
|
428
|
Front-end web development
|
9,682
|
312
|
Start
|
High
|
429
|
Closure (computer programming)
|
9,681
|
312
|
C
|
Mid
|
430
|
Pointer (computer programming)
|
9,620
|
310
|
C
|
High
|
431
|
Information science
|
9,612
|
310
|
C
|
Top
|
432
|
System administrator
|
9,611
|
310
|
C
|
High
|
433
|
Data model
|
9,594
|
309
|
C
|
High
|
434
|
Floyd–Warshall algorithm
|
9,564
|
308
|
B
|
High
|
435
|
Abstract data type
|
9,506
|
306
|
C
|
High
|
436
|
The Open Group Architecture Framework
|
9,456
|
305
|
Start
|
High
|
437
|
Swarm intelligence
|
9,451
|
304
|
C
|
Mid
|
438
|
Static program analysis
|
9,373
|
302
|
C
|
Mid
|
439
|
Maximum subarray problem
|
9,347
|
301
|
Unknown
|
Unknown
|
440
|
Anti-pattern
|
9,330
|
300
|
C
|
Mid
|
441
|
Google Brain
|
9,329
|
300
|
C
|
Mid
|
442
|
Heuristic (computer science)
|
9,326
|
300
|
Unknown
|
Unknown
|
443
|
Intrusion detection system
|
9,304
|
300
|
Start
|
Low
|
444
|
Encapsulation (computer programming)
|
9,294
|
299
|
Start
|
High
|
445
|
Linear congruential generator
|
9,281
|
299
|
Start
|
Mid
|
446
|
Abstraction (computer science)
|
9,238
|
298
|
C
|
Top
|
447
|
Ackermann function
|
9,204
|
296
|
B
|
Mid
|
448
|
Canny edge detector
|
9,145
|
295
|
Start
|
Mid
|
449
|
Mean time between failures
|
9,138
|
294
|
C
|
Low
|
450
|
Byte pair encoding
|
9,098
|
293
|
Start
|
Mid
|
451
|
Ant colony optimization algorithms
|
9,061
|
292
|
B
|
Low
|
452
|
Theoretical computer science
|
9,039
|
291
|
B
|
Top
|
453
|
Type theory
|
8,991
|
290
|
C
|
High
|
454
|
Online analytical processing
|
8,927
|
287
|
C
|
Mid
|
455
|
Rob Pike
|
8,905
|
287
|
Start
|
Unknown
|
456
|
Logo (programming language)
|
8,879
|
286
|
C
|
Mid
|
457
|
Andrey Kolmogorov
|
8,819
|
284
|
C
|
High
|
458
|
Prim's algorithm
|
8,815
|
284
|
C
|
High
|
459
|
Radix sort
|
8,797
|
283
|
Start
|
High
|
460
|
Structured programming
|
8,764
|
282
|
C
|
Mid
|
461
|
Avast
|
8,754
|
282
|
B
|
Mid
|
462
|
8-bit computing
|
8,730
|
281
|
Start
|
High
|
463
|
Directed graph
|
8,729
|
281
|
C
|
High
|
464
|
Robert C. Martin
|
8,729
|
281
|
Start
|
Mid
|
465
|
Extended ASCII
|
8,729
|
281
|
C
|
Low
|
466
|
Expert system
|
8,695
|
280
|
Start
|
Mid
|
467
|
Priority queue
|
8,684
|
280
|
C
|
High
|
468
|
Coroutine
|
8,659
|
279
|
C
|
Mid
|
469
|
Function (computer programming)
|
8,649
|
279
|
C
|
High
|
470
|
Binary heap
|
8,642
|
278
|
B
|
High
|
471
|
Bogosort
|
8,593
|
277
|
Start
|
Low
|
472
|
Heapsort
|
8,579
|
276
|
B
|
High
|
473
|
Cell (processor)
|
8,576
|
276
|
B
|
Mid
|
474
|
VP9
|
8,542
|
275
|
B
|
Low
|
475
|
Builder pattern
|
8,509
|
274
|
Start
|
Unknown
|
476
|
L-system
|
8,507
|
274
|
Unknown
|
Unknown
|
477
|
Neuromorphic engineering
|
8,492
|
273
|
B
|
Low
|
478
|
Knuth–Morris–Pratt algorithm
|
8,465
|
273
|
Start
|
High
|
479
|
Inheritance (object-oriented programming)
|
8,462
|
272
|
Start
|
Mid
|
480
|
Conflict-free replicated data type
|
8,451
|
272
|
C
|
High
|
481
|
Data modeling
|
8,445
|
272
|
C
|
High
|
482
|
Code page 437
|
8,393
|
270
|
C
|
Low
|
483
|
System call
|
8,387
|
270
|
C
|
Low
|
484
|
C--
|
8,257
|
266
|
Start
|
Low
|
485
|
Currying
|
8,193
|
264
|
C
|
High
|
486
|
Curiously recurring template pattern
|
8,191
|
264
|
C
|
Low
|
487
|
Microkernel
|
8,184
|
264
|
C
|
High
|
488
|
Primality test
|
8,177
|
263
|
Start
|
Mid
|
489
|
Cut, copy, and paste
|
8,146
|
262
|
C
|
Mid
|
490
|
AWK
|
8,144
|
262
|
B
|
Mid
|
491
|
Scaled agile framework
|
8,139
|
262
|
C
|
Low
|
492
|
Computation
|
8,121
|
261
|
Start
|
Top
|
493
|
Sankey diagram
|
8,111
|
261
|
C
|
Low
|
494
|
Informatics
|
8,108
|
261
|
C
|
Mid
|
495
|
Adversarial machine learning
|
8,080
|
260
|
C
|
Mid
|
496
|
Text-to-image model
|
8,040
|
259
|
Unknown
|
Unknown
|
497
|
List of unsolved problems in computer science
|
8,036
|
259
|
List
|
Mid
|
498
|
D (programming language)
|
8,021
|
258
|
C
|
Low
|
499
|
Search algorithm
|
8,013
|
258
|
Start
|
Top
|
500
|
Relational algebra
|
8,004
|
258
|
C
|
Mid
|
501
|
Avast Antivirus
|
7,993
|
257
|
Start
|
Mid
|
502
|
Macro (computer science)
|
7,982
|
257
|
C
|
Mid
|
503
|
Batch normalization
|
7,952
|
256
|
C
|
Low
|
504
|
List of hash functions
|
7,948
|
256
|
List
|
Low
|
505
|
Extended Backus–Naur form
|
7,943
|
256
|
C
|
Mid
|
506
|
Coupling (computer programming)
|
7,940
|
256
|
Start
|
High
|
507
|
POST (HTTP)
|
7,918
|
255
|
Start
|
Low
|
508
|
Physics-informed neural networks
|
7,916
|
255
|
Unknown
|
Low
|
509
|
Adapter pattern
|
7,897
|
254
|
Start
|
Unknown
|
510
|
Sørensen–Dice coefficient
|
7,896
|
254
|
Start
|
Unknown
|
511
|
Quantum key distribution
|
7,859
|
253
|
B
|
Mid
|
512
|
Event-driven programming
|
7,855
|
253
|
Start
|
High
|
513
|
Planar graph
|
7,852
|
253
|
B
|
Mid
|
514
|
Row- and column-major order
|
7,831
|
252
|
C
|
Mid
|
515
|
Memory management
|
7,805
|
251
|
C
|
High
|
516
|
Carbon (programming language)
|
7,797
|
251
|
Start
|
Low
|
517
|
Leslie Lamport
|
7,785
|
251
|
C
|
High
|
518
|
For loop
|
7,783
|
251
|
B
|
High
|
519
|
Quadtree
|
7,775
|
250
|
C
|
Mid
|
520
|
Branch predictor
|
7,775
|
250
|
C
|
Mid
|
521
|
Theory of computation
|
7,746
|
249
|
C
|
Top
|
522
|
Control flow
|
7,732
|
249
|
B
|
Top
|
523
|
David J. Malan
|
7,715
|
248
|
C
|
Unknown
|
524
|
Maze generation algorithm
|
7,683
|
247
|
Start
|
Unknown
|
525
|
Ladder logic
|
7,679
|
247
|
C
|
Low
|
526
|
Futures studies
|
7,678
|
247
|
B
|
Low
|
527
|
Identity management
|
7,663
|
247
|
C
|
High
|
528
|
Web API
|
7,605
|
245
|
Start
|
Unknown
|
529
|
Interface (computing)
|
7,589
|
244
|
C
|
Low
|
530
|
Hyper-threading
|
7,567
|
244
|
C
|
Low
|
531
|
Named-entity recognition
|
7,566
|
244
|
C
|
Unknown
|
532
|
CS50
|
7,552
|
243
|
Start
|
Low
|
533
|
List of pioneers in computer science
|
7,549
|
243
|
List
|
High
|
534
|
Kruskal's algorithm
|
7,486
|
241
|
Start
|
High
|
535
|
Shannon–Hartley theorem
|
7,478
|
241
|
C
|
High
|
536
|
Real-time computing
|
7,475
|
241
|
C
|
High
|
537
|
Computational biology
|
7,441
|
240
|
C
|
High
|
538
|
Deterministic finite automaton
|
7,440
|
240
|
Start
|
High
|
539
|
DeepDream
|
7,415
|
239
|
Start
|
Low
|
540
|
Anomaly detection
|
7,391
|
238
|
Start
|
Mid
|
541
|
Superconducting quantum computing
|
7,390
|
238
|
Start
|
Unknown
|
542
|
Ogg
|
7,375
|
237
|
Unknown
|
Unknown
|
543
|
JPEG 2000
|
7,336
|
236
|
C
|
Low
|
544
|
Intelligent agent
|
7,322
|
236
|
Unknown
|
Unknown
|
545
|
Division algorithm
|
7,302
|
235
|
C
|
High
|
546
|
Knowledge graph
|
7,287
|
235
|
Start
|
High
|
547
|
Logic programming
|
7,276
|
234
|
C
|
Top
|
548
|
Samsung Galaxy Tab A8
|
7,268
|
234
|
Unknown
|
Unknown
|
549
|
Run-length encoding
|
7,256
|
234
|
Start
|
Mid
|
550
|
Branch and bound
|
7,241
|
233
|
Start
|
Mid
|
551
|
Timsort
|
7,238
|
233
|
C
|
Mid
|
552
|
Error detection and correction
|
7,236
|
233
|
C
|
High
|
553
|
JavaScript engine
|
7,231
|
233
|
Start
|
Mid
|
554
|
Code smell
|
7,202
|
232
|
C
|
Low
|
555
|
Shunting yard algorithm
|
7,195
|
232
|
Unknown
|
Unknown
|
556
|
Samsung Galaxy A04
|
7,193
|
232
|
Unknown
|
Unknown
|
557
|
Multiple inheritance
|
7,186
|
231
|
C
|
Mid
|
558
|
ALGOL
|
7,159
|
230
|
C
|
High
|
559
|
ABAP
|
7,147
|
230
|
C
|
High
|
560
|
Selection sort
|
7,147
|
230
|
C
|
High
|
561
|
Sudoku solving algorithms
|
7,119
|
229
|
B
|
Low
|
562
|
Moravec's paradox
|
7,088
|
228
|
Start
|
Mid
|
563
|
Command pattern
|
7,079
|
228
|
Start
|
Mid
|
564
|
Constructor (object-oriented programming)
|
7,073
|
228
|
Start
|
Mid
|
565
|
MurmurHash
|
7,069
|
228
|
Start
|
Low
|
566
|
Check digit
|
7,068
|
228
|
Start
|
Mid
|
567
|
Triple DES
|
7,062
|
227
|
Start
|
Unknown
|
568
|
Ethics of artificial intelligence
|
7,042
|
227
|
B
|
Top
|
569
|
GrabCAD
|
7,024
|
226
|
Unknown
|
Unknown
|
570
|
List of data structures
|
7,006
|
226
|
List
|
High
|
571
|
Master theorem (analysis of algorithms)
|
6,987
|
225
|
C
|
High
|
572
|
Associative array
|
6,965
|
224
|
C
|
High
|
573
|
Copying
|
6,962
|
224
|
Unknown
|
Unknown
|
574
|
Agent-based model
|
6,958
|
224
|
C
|
Mid
|
575
|
Maze-solving algorithm
|
6,947
|
224
|
Unknown
|
Unknown
|
576
|
Lossy compression
|
6,930
|
223
|
Start
|
High
|
577
|
Memory leak
|
6,928
|
223
|
C
|
Mid
|
578
|
Identifier
|
6,927
|
223
|
Start
|
Low
|
579
|
R-tree
|
6,924
|
223
|
C
|
Mid
|
580
|
Two-phase commit protocol
|
6,917
|
223
|
C
|
High
|
581
|
Stochastic parrot
|
6,885
|
222
|
Start
|
Unknown
|
582
|
Password cracking
|
6,873
|
221
|
C
|
Low
|
583
|
Okapi BM25
|
6,863
|
221
|
Start
|
Low
|
584
|
Shift register
|
6,855
|
221
|
Start
|
Unknown
|
585
|
Alonzo Church
|
6,820
|
220
|
C
|
Top
|
586
|
Radix tree
|
6,794
|
219
|
C
|
Mid
|
587
|
SNOBOL
|
6,792
|
219
|
C
|
Mid
|
588
|
Jürgen Schmidhuber
|
6,775
|
218
|
C
|
Mid
|
589
|
Skip list
|
6,749
|
217
|
C
|
Mid
|
590
|
Open-source license
|
6,736
|
217
|
B
|
High
|
591
|
Proxy auto-config
|
6,716
|
216
|
Unknown
|
Unknown
|
592
|
Process (computing)
|
6,699
|
216
|
C
|
Mid
|
593
|
Chernoff bound
|
6,698
|
216
|
Start
|
Low
|
594
|
Computer scientist
|
6,682
|
215
|
Start
|
Top
|
595
|
Higher-order function
|
6,614
|
213
|
Start
|
High
|
596
|
Relational model
|
6,611
|
213
|
C
|
Top
|
597
|
Email spoofing
|
6,596
|
212
|
Start
|
Low
|
598
|
Combinatorial optimization
|
6,588
|
212
|
C
|
Top
|
599
|
Timeline of quantum computing and communication
|
6,584
|
212
|
List
|
Mid
|
600
|
Amortized analysis
|
6,556
|
211
|
Start
|
High
|
601
|
EBCDIC
|
6,485
|
209
|
Start
|
Mid
|
602
|
Common Lisp
|
6,485
|
209
|
B
|
High
|
603
|
Consistent hashing
|
6,479
|
209
|
Stub
|
Unknown
|
604
|
Data structure alignment
|
6,472
|
208
|
Start
|
Mid
|
605
|
Evolutionary algorithm
|
6,472
|
208
|
C
|
Mid
|
606
|
All-points bulletin
|
6,468
|
208
|
C
|
Low
|
607
|
Direct Rendering Manager
|
6,451
|
208
|
Unknown
|
Unknown
|
608
|
Time formatting and storage bugs
|
6,445
|
207
|
B
|
Low
|
609
|
B+ tree
|
6,444
|
207
|
Start
|
High
|
610
|
3GP and 3G2
|
6,416
|
206
|
C
|
Low
|
611
|
Miller–Rabin primality test
|
6,376
|
205
|
C
|
High
|
612
|
Spaghetti code
|
6,347
|
204
|
Start
|
Mid
|
613
|
Bill Joy
|
6,342
|
204
|
C
|
Unknown
|
614
|
Computational science
|
6,336
|
204
|
C
|
Top
|
615
|
Linker (computing)
|
6,326
|
204
|
C
|
Mid
|
616
|
Paxos (computer science)
|
6,321
|
203
|
C
|
Low
|
617
|
Association for Computing Machinery
|
6,315
|
203
|
C
|
Top
|
618
|
Synthetic media
|
6,305
|
203
|
Start
|
Low
|
619
|
Cycle detection
|
6,295
|
203
|
B
|
Low
|
620
|
Routing
|
6,278
|
202
|
C
|
Mid
|
621
|
Limited-memory BFGS
|
6,271
|
202
|
Unknown
|
Unknown
|
622
|
Edge detection
|
6,261
|
201
|
C
|
Mid
|
623
|
Conditional (computer programming)
|
6,225
|
200
|
C
|
Mid
|
624
|
Generic programming
|
6,224
|
200
|
C
|
High
|
625
|
Loab
|
6,214
|
200
|
Unknown
|
Unknown
|
626
|
Multiplication algorithm
|
6,208
|
200
|
C
|
Low
|
627
|
Basic Linear Algebra Subprograms
|
6,201
|
200
|
C
|
Low
|
628
|
Algebraic data type
|
6,197
|
199
|
Start
|
Low
|
629
|
GPS Exchange Format
|
6,194
|
199
|
C
|
Low
|
630
|
CORDIC
|
6,167
|
198
|
B
|
Mid
|
631
|
Exception handling
|
6,121
|
197
|
B
|
Mid
|
632
|
Class (computer programming)
|
6,114
|
197
|
Start
|
High
|
633
|
Concurrency (computer science)
|
6,112
|
197
|
Start
|
Top
|
634
|
Type inference
|
6,096
|
196
|
C
|
Mid
|
635
|
DNS rebinding
|
6,076
|
196
|
Unknown
|
Unknown
|
636
|
Universal Turing machine
|
6,064
|
195
|
C
|
Mid
|
637
|
Quantum information
|
6,061
|
195
|
Start
|
High
|
638
|
Pointing stick
|
6,061
|
195
|
C
|
Low
|
639
|
Fourth-generation programming language
|
6,032
|
194
|
Start
|
Mid
|
640
|
Artbreeder
|
6,015
|
194
|
Start
|
Low
|
641
|
Queue (abstract data type)
|
6,014
|
194
|
Start
|
Top
|
642
|
Vehicle routing problem
|
5,993
|
193
|
Unknown
|
Unknown
|
643
|
Computational chemistry
|
5,971
|
192
|
B
|
High
|
644
|
Generalized additive model
|
5,970
|
192
|
Start
|
Low
|
645
|
Bachelor of Computer Science
|
5,964
|
192
|
Start
|
High
|
646
|
Longest common subsequence
|
5,956
|
192
|
Start
|
High
|
647
|
Tony Hoare
|
5,944
|
191
|
C
|
High
|
648
|
OpenGL Shading Language
|
5,936
|
191
|
Start
|
Low
|
649
|
Weak supervision
|
5,934
|
191
|
Unknown
|
Unknown
|
650
|
AI accelerator
|
5,932
|
191
|
B
|
Low
|
651
|
Concurrent computing
|
5,925
|
191
|
C
|
High
|
652
|
Attribute-based access control
|
5,891
|
190
|
C
|
Mid
|
653
|
Parsing expression grammar
|
5,876
|
189
|
B
|
Mid
|
654
|
Vertex cover
|
5,855
|
188
|
C
|
Mid
|
655
|
Fault tolerance
|
5,852
|
188
|
Start
|
High
|
656
|
Vorbis
|
5,813
|
187
|
B
|
Low
|
657
|
Computability theory
|
5,796
|
186
|
B
|
Top
|
658
|
Recursive descent parser
|
5,772
|
186
|
Start
|
High
|
659
|
Binary-to-text encoding
|
5,769
|
186
|
C
|
Low
|
660
|
Duff's device
|
5,759
|
185
|
C
|
Low
|
661
|
Fixed-point combinator
|
5,746
|
185
|
C
|
Mid
|
662
|
Lempel–Ziv–Welch
|
5,745
|
185
|
C
|
Unknown
|
663
|
Q (number format)
|
5,731
|
184
|
Unknown
|
Unknown
|
664
|
Smartglasses
|
5,724
|
184
|
C
|
Low
|
665
|
Glossary of graph theory
|
5,718
|
184
|
List
|
Mid
|
666
|
Extended reality
|
5,712
|
184
|
Stub
|
Low
|
667
|
Anonymous function
|
5,691
|
183
|
C
|
Mid
|
668
|
Raft (algorithm)
|
5,681
|
183
|
C
|
Low
|
669
|
State diagram
|
5,626
|
181
|
C
|
Mid
|
670
|
Mojo (programming language)
|
5,622
|
181
|
Start
|
Low
|
671
|
Dartmouth workshop
|
5,607
|
180
|
Start
|
Low
|
672
|
Counting sort
|
5,603
|
180
|
C
|
High
|
673
|
Graph (abstract data type)
|
5,585
|
180
|
C
|
Top
|
674
|
Umple
|
5,581
|
180
|
Start
|
Low
|
675
|
Legacy system
|
5,577
|
179
|
C
|
Unknown
|
676
|
Fluent interface
|
5,573
|
179
|
Stub
|
Unknown
|
677
|
Opcode
|
5,569
|
179
|
C
|
High
|
678
|
Edit distance
|
5,566
|
179
|
C
|
Mid
|
679
|
Tail call
|
5,564
|
179
|
C
|
Mid
|
680
|
Deep reinforcement learning
|
5,558
|
179
|
Stub
|
Unknown
|
681
|
Petri net
|
5,556
|
179
|
B
|
Mid
|
682
|
Raj Reddy
|
5,554
|
179
|
B
|
Unknown
|
683
|
Comparison of integrated development environments
|
5,544
|
178
|
Start
|
Low
|
684
|
Quantum machine learning
|
5,532
|
178
|
B
|
Unknown
|
685
|
Redux (JavaScript library)
|
5,531
|
178
|
Start
|
Low
|
686
|
Pushdown automaton
|
5,520
|
178
|
B
|
High
|
687
|
Human-centered design
|
5,515
|
177
|
Start
|
Unknown
|
688
|
General-purpose programming language
|
5,514
|
177
|
Stub
|
Mid
|
689
|
Ubiquitous computing
|
5,499
|
177
|
C
|
High
|
690
|
Cryptographically secure pseudorandom number generator
|
5,490
|
177
|
C
|
High
|
691
|
Hamming weight
|
5,485
|
176
|
C
|
Unknown
|
692
|
C99
|
5,482
|
176
|
C
|
Mid
|
693
|
Short-circuit evaluation
|
5,482
|
176
|
Start
|
Mid
|
694
|
Mixed reality
|
5,464
|
176
|
B
|
Unknown
|
695
|
Ones' complement
|
5,450
|
175
|
Start
|
Mid
|
696
|
Reactive programming
|
5,438
|
175
|
Start
|
Mid
|
697
|
Garlin Gilchrist
|
5,437
|
175
|
Start
|
Low
|
698
|
Set cover problem
|
5,426
|
175
|
C
|
Mid
|
699
|
Syntactic sugar
|
5,422
|
174
|
C
|
Mid
|
700
|
Coding theory
|
5,419
|
174
|
C
|
High
|
701
|
Mixin
|
5,414
|
174
|
Start
|
Low
|
702
|
No free lunch theorem
|
5,412
|
174
|
Start
|
Mid
|
703
|
Web developer
|
5,405
|
174
|
Start
|
Mid
|
704
|
Jaro–Winkler distance
|
5,379
|
173
|
Unknown
|
Unknown
|
705
|
Judea Pearl
|
5,366
|
173
|
C
|
Mid
|
706
|
Binary file
|
5,357
|
172
|
C
|
High
|
707
|
Inverter (logic gate)
|
5,346
|
172
|
Start
|
Unknown
|
708
|
Enterprise architecture
|
5,338
|
172
|
Start
|
Mid
|
709
|
Metaheuristic
|
5,333
|
172
|
Start
|
Mid
|
710
|
Binary space partitioning
|
5,321
|
171
|
C
|
Low
|
711
|
Composite pattern
|
5,319
|
171
|
Start
|
Unknown
|
712
|
Digital data
|
5,315
|
171
|
C
|
Low
|
713
|
Arity
|
5,288
|
170
|
C
|
Low
|
714
|
Strassen algorithm
|
5,280
|
170
|
C
|
Low
|
715
|
Analysis of algorithms
|
5,250
|
169
|
C
|
Top
|
716
|
Code coverage
|
5,238
|
168
|
C
|
Low
|
717
|
Root-finding algorithms
|
5,229
|
168
|
Unknown
|
Unknown
|
718
|
Delimiter
|
5,217
|
168
|
C
|
Mid
|
719
|
Computational neuroscience
|
5,201
|
167
|
B
|
Mid
|
720
|
Log-structured merge-tree
|
5,192
|
167
|
Start
|
Mid
|
721
|
Pareto front
|
5,173
|
166
|
Start
|
Unknown
|
722
|
Three-valued logic
|
5,165
|
166
|
Start
|
Low
|
723
|
Approximate string matching
|
5,160
|
166
|
C
|
Mid
|
724
|
Adam D'Angelo
|
5,157
|
166
|
Start
|
Low
|
725
|
Thomas Knoll
|
5,150
|
166
|
Unknown
|
Unknown
|
726
|
Unique identifier
|
5,140
|
165
|
Start
|
Unknown
|
727
|
ActionScript
|
5,132
|
165
|
C
|
Low
|
728
|
Nonlinear programming
|
5,131
|
165
|
C
|
Mid
|
729
|
Requirements analysis
|
5,125
|
165
|
Start
|
Unknown
|
730
|
Interval scheduling
|
5,119
|
165
|
Start
|
Mid
|
731
|
Consensus (computer science)
|
5,119
|
165
|
Start
|
High
|
732
|
Boolean
|
5,102
|
164
|
Disambig
|
NA
|
733
|
Covariance and contravariance (computer science)
|
5,092
|
164
|
Start
|
High
|
734
|
Curry–Howard correspondence
|
5,091
|
164
|
C
|
High
|
735
|
School timetable
|
5,061
|
163
|
C
|
Low
|
736
|
Treemapping
|
5,049
|
162
|
C
|
Mid
|
737
|
Sandbox (software development)
|
5,036
|
162
|
Start
|
Low
|
738
|
Scope (computer science)
|
5,035
|
162
|
C
|
High
|
739
|
Fréchet inception distance
|
5,028
|
162
|
C
|
Low
|
740
|
Systems programming
|
5,023
|
162
|
B
|
High
|
741
|
Metaprogramming
|
5,016
|
161
|
C
|
Mid
|
742
|
Computing Machinery and Intelligence
|
5,009
|
161
|
C
|
High
|
743
|
Semantics (computer science)
|
5,004
|
161
|
C
|
High
|
744
|
Object (computer science)
|
4,995
|
161
|
Start
|
High
|
745
|
Signed number representations
|
4,981
|
160
|
C
|
High
|
746
|
Thundering herd problem
|
4,971
|
160
|
Start
|
Mid
|
747
|
Webmaster
|
4,970
|
160
|
Start
|
Low
|
748
|
Topological data analysis
|
4,962
|
160
|
C
|
Low
|
749
|
LL parser
|
4,951
|
159
|
Start
|
High
|
750
|
Static single-assignment form
|
4,932
|
159
|
C
|
Mid
|
751
|
Computational complexity
|
4,930
|
159
|
C
|
Top
|
752
|
Regular language
|
4,916
|
158
|
C
|
High
|
753
|
User error
|
4,914
|
158
|
Start
|
High
|
754
|
Non-English-based programming languages
|
4,907
|
158
|
List
|
Low
|
755
|
Fibonacci heap
|
4,888
|
157
|
C
|
High
|
756
|
Three.js
|
4,887
|
157
|
Unknown
|
Unknown
|
757
|
Hindley–Milner type system
|
4,886
|
157
|
B
|
High
|
758
|
Compilers: Principles, Techniques, and Tools
|
4,873
|
157
|
Stub
|
Low
|
759
|
Pranav Mistry
|
4,868
|
157
|
Start
|
Low
|
760
|
Satisfiability modulo theories
|
4,851
|
156
|
Start
|
Low
|
761
|
Elvis operator
|
4,849
|
156
|
Unknown
|
Unknown
|
762
|
Tagged union
|
4,844
|
156
|
Start
|
Low
|
763
|
8-bit color
|
4,836
|
156
|
Start
|
Low
|
764
|
Gradle
|
4,836
|
156
|
C
|
Low
|
765
|
Matei Zaharia
|
4,807
|
155
|
Start
|
Unknown
|
766
|
Charlie Cheever
|
4,806
|
155
|
C
|
Low
|
767
|
Maximum flow problem
|
4,805
|
155
|
C
|
High
|
768
|
Wiener filter
|
4,803
|
154
|
Start
|
Low
|
769
|
Compare-and-swap
|
4,793
|
154
|
C
|
Low
|
770
|
History of computer science
|
4,787
|
154
|
B
|
Top
|
771
|
Data governance
|
4,783
|
154
|
C
|
Unknown
|
772
|
DeepArt
|
4,770
|
153
|
Stub
|
Unknown
|
773
|
Aho–Corasick algorithm
|
4,744
|
153
|
Start
|
Mid
|
774
|
Units of information
|
4,743
|
153
|
C
|
Mid
|
775
|
Structural type system
|
4,742
|
152
|
Start
|
Mid
|
776
|
Privilege escalation
|
4,730
|
152
|
Start
|
Low
|
777
|
Terry Winograd
|
4,724
|
152
|
Start
|
Unknown
|
778
|
Datalog
|
4,722
|
152
|
B
|
Mid
|
779
|
Clique problem
|
4,717
|
152
|
GA
|
Mid
|
780
|
Coreboot
|
4,714
|
152
|
Unknown
|
Unknown
|
781
|
Automated theorem proving
|
4,710
|
151
|
Start
|
Mid
|
782
|
Isolation forest
|
4,699
|
151
|
C
|
Low
|
783
|
Multi-agent system
|
4,694
|
151
|
Start
|
Mid
|
784
|
Artificial life
|
4,689
|
151
|
B
|
High
|
785
|
Lazy evaluation
|
4,687
|
151
|
C
|
High
|
786
|
Point in polygon
|
4,687
|
151
|
Unknown
|
Unknown
|
787
|
Richard Hamming
|
4,686
|
151
|
GA
|
Mid
|
788
|
Lowest common ancestor
|
4,683
|
151
|
Start
|
Unknown
|
789
|
Boltzmann machine
|
4,676
|
150
|
C
|
Low
|
790
|
Containerization (computing)
|
4,669
|
150
|
Start
|
Low
|
791
|
Requirements engineering
|
4,656
|
150
|
Start
|
Unknown
|
792
|
String-searching algorithm
|
4,644
|
149
|
Start
|
High
|
793
|
Tree structure
|
4,644
|
149
|
Start
|
High
|
794
|
Directory (computing)
|
4,635
|
149
|
C
|
Low
|
795
|
Stuart J. Russell
|
4,631
|
149
|
Stub
|
Unknown
|
796
|
JSONP
|
4,630
|
149
|
C
|
Low
|
797
|
Independent set (graph theory)
|
4,629
|
149
|
C
|
Mid
|
798
|
Boyer–Moore string-search algorithm
|
4,616
|
148
|
C
|
High
|
799
|
Women and video games
|
4,590
|
148
|
B
|
Mid
|
800
|
Prefix sum
|
4,584
|
147
|
Unknown
|
Unknown
|
801
|
David Cheriton
|
4,570
|
147
|
C
|
Mid
|
802
|
Outline of artificial intelligence
|
4,568
|
147
|
Start
|
High
|
803
|
Alex Krizhevsky
|
4,566
|
147
|
Stub
|
Unknown
|
804
|
The Galileo Project
|
4,554
|
146
|
Unknown
|
Unknown
|
805
|
Abstract factory pattern
|
4,550
|
146
|
Start
|
Mid
|
806
|
Parametric design
|
4,544
|
146
|
Start
|
Unknown
|
807
|
Evaluation strategy
|
4,542
|
146
|
C
|
Top
|
808
|
Self-balancing binary search tree
|
4,533
|
146
|
Start
|
Mid
|
809
|
CiteSeerX
|
4,531
|
146
|
Start
|
High
|
810
|
Formal verification
|
4,531
|
146
|
Start
|
High
|
811
|
Cargo cult programming
|
4,530
|
146
|
Start
|
Low
|
812
|
Ford–Fulkerson algorithm
|
4,530
|
146
|
Start
|
High
|
813
|
Catastrophic interference
|
4,527
|
146
|
C
|
Low
|
814
|
Quickselect
|
4,522
|
145
|
C
|
Low
|
815
|
Side effect (computer science)
|
4,515
|
145
|
C
|
Mid
|
816
|
Kai-Fu Lee
|
4,511
|
145
|
Start
|
Unknown
|
817
|
Computational geometry
|
4,509
|
145
|
Start
|
High
|
818
|
Quantum programming
|
4,509
|
145
|
Start
|
Mid
|
819
|
Coq
|
4,490
|
144
|
Start
|
Mid
|
820
|
Data access object
|
4,483
|
144
|
Start
|
Unknown
|
821
|
CalyxOS
|
4,474
|
144
|
C
|
Low
|
822
|
Thrashing (computer science)
|
4,461
|
143
|
C
|
Low
|
823
|
Elbow method (clustering)
|
4,445
|
143
|
Unknown
|
Unknown
|
824
|
Chain-of-responsibility pattern
|
4,442
|
143
|
Stub
|
Unknown
|
825
|
Computational thinking
|
4,439
|
143
|
Start
|
Unknown
|
826
|
Infinite loop
|
4,438
|
143
|
Start
|
Mid
|
827
|
Wojciech Zaremba
|
4,432
|
142
|
Start
|
Unknown
|
828
|
Computational complexity of mathematical operations
|
4,425
|
142
|
B
|
Mid
|
829
|
Damerau–Levenshtein distance
|
4,421
|
142
|
Start
|
Low
|
830
|
Model of computation
|
4,406
|
142
|
Start
|
Mid
|
831
|
Don Norman
|
4,400
|
141
|
Start
|
Mid
|
832
|
Signed zero
|
4,389
|
141
|
C
|
Low
|
833
|
Model–view–presenter
|
4,385
|
141
|
C
|
High
|
834
|
State pattern
|
4,377
|
141
|
Start
|
Unknown
|
835
|
X265
|
4,369
|
140
|
C
|
Low
|
836
|
Variable (computer science)
|
4,356
|
140
|
Start
|
Top
|
837
|
Andrew S. Tanenbaum
|
4,339
|
139
|
C
|
Mid
|
838
|
Graph isomorphism
|
4,333
|
139
|
Start
|
Mid
|
839
|
In-context learning (natural language processing)
|
4,319
|
139
|
Start
|
Low
|
840
|
Phong reflection model
|
4,315
|
139
|
Unknown
|
Unknown
|
841
|
Component (graph theory)
|
4,315
|
139
|
GA
|
Mid
|
842
|
Barbara Liskov
|
4,310
|
139
|
C
|
High
|
843
|
Combinational logic
|
4,305
|
138
|
Start
|
Unknown
|
844
|
Profiling (computer programming)
|
4,294
|
138
|
C
|
Mid
|
845
|
Reentrancy (computing)
|
4,275
|
137
|
Start
|
Mid
|
846
|
Nondeterministic finite automaton
|
4,273
|
137
|
B
|
High
|
847
|
Jan Vondrák
|
4,262
|
137
|
Stub
|
Low
|
848
|
SHI International Corp
|
4,259
|
137
|
Start
|
Low
|
849
|
Outline of computer science
|
4,258
|
137
|
Start
|
Mid
|
850
|
Hash collision
|
4,257
|
137
|
Start
|
Low
|
851
|
Longest palindromic substring
|
4,253
|
137
|
C
|
Low
|
852
|
Boids
|
4,251
|
137
|
Unknown
|
Unknown
|
853
|
Best, worst and average case
|
4,251
|
137
|
Start
|
High
|
854
|
Constraint satisfaction problem
|
4,245
|
136
|
C
|
Mid
|
855
|
Programming language theory
|
4,239
|
136
|
Start
|
Top
|
856
|
Code injection
|
4,224
|
136
|
C
|
High
|
857
|
Google Search
|
4,219
|
136
|
C
|
High
|
858
|
Samsung Galaxy Tab A7
|
4,218
|
136
|
Start
|
Low
|
859
|
Cyclic permutation
|
4,209
|
135
|
Start
|
Unknown
|
860
|
Distributed version control
|
4,190
|
135
|
Start
|
Mid
|
861
|
SIGGRAPH
|
4,183
|
134
|
Start
|
Mid
|
862
|
Double-ended queue
|
4,183
|
134
|
Start
|
High
|
863
|
Jamie Zawinski
|
4,183
|
134
|
Start
|
Low
|
864
|
Libreboot
|
4,177
|
134
|
Unknown
|
Unknown
|
865
|
Bounding volume hierarchy
|
4,163
|
134
|
Unknown
|
Unknown
|
866
|
Bucket sort
|
4,151
|
133
|
C
|
High
|
867
|
Object-oriented analysis and design
|
4,148
|
133
|
Start
|
High
|
868
|
Max-flow min-cut theorem
|
4,134
|
133
|
Start
|
High
|
869
|
Rabin–Karp algorithm
|
4,130
|
133
|
C
|
Mid
|
870
|
Message passing
|
4,114
|
132
|
Start
|
High
|
871
|
Spatial anti-aliasing
|
4,106
|
132
|
C
|
Mid
|
872
|
BCH code
|
4,103
|
132
|
C
|
Unknown
|
873
|
Goto
|
4,085
|
131
|
C
|
Mid
|
874
|
Translation studies
|
4,083
|
131
|
Start
|
Mid
|
875
|
Squeak
|
4,077
|
131
|
B
|
Mid
|
876
|
Niklaus Wirth
|
4,072
|
131
|
Start
|
High
|
877
|
Matrix multiplication algorithm
|
4,070
|
131
|
C
|
Mid
|
878
|
First-class function
|
4,068
|
131
|
C
|
High
|
879
|
Shellsort
|
4,062
|
131
|
B
|
High
|
880
|
Eugene Kaspersky
|
4,061
|
131
|
GA
|
Low
|
881
|
A Mathematical Theory of Communication
|
4,059
|
130
|
Start
|
High
|
882
|
Challenge–response authentication
|
4,051
|
130
|
Start
|
Low
|
883
|
Jack Sweeney
|
4,048
|
130
|
Start
|
Low
|
884
|
Continuation-passing style
|
4,048
|
130
|
Start
|
Mid
|
885
|
Vapnik–Chervonenkis dimension
|
4,045
|
130
|
Start
|
Mid
|
886
|
Topological insulator
|
4,043
|
130
|
Start
|
Unknown
|
887
|
Adjacency list
|
4,043
|
130
|
C
|
Mid
|
888
|
Standard ML
|
4,043
|
130
|
C
|
Mid
|
889
|
LR parser
|
4,041
|
130
|
Start
|
High
|
890
|
Prototype-based programming
|
4,040
|
130
|
Start
|
Mid
|
891
|
Communicating sequential processes
|
4,036
|
130
|
B
|
High
|
892
|
Machine epsilon
|
4,035
|
130
|
Unknown
|
Unknown
|
893
|
Dual linear program
|
4,035
|
130
|
Start
|
Low
|
894
|
Query language
|
4,034
|
130
|
Start
|
Mid
|
895
|
Needleman–Wunsch algorithm
|
4,030
|
130
|
Start
|
Mid
|
896
|
Computer algebra
|
4,022
|
129
|
Start
|
Mid
|
897
|
Database design
|
4,021
|
129
|
C
|
High
|
898
|
C string handling
|
4,008
|
129
|
C
|
Low
|
899
|
Deno (software)
|
4,005
|
129
|
Start
|
Low
|
900
|
Hamiltonian path problem
|
3,995
|
128
|
C
|
Mid
|
901
|
Randomized algorithm
|
3,991
|
128
|
C
|
High
|
902
|
Cohesion (computer science)
|
3,988
|
128
|
Unknown
|
Unknown
|
903
|
Loose coupling
|
3,982
|
128
|
Start
|
High
|
904
|
HTML5 video
|
3,981
|
128
|
Unknown
|
Unknown
|
905
|
Fold (higher-order function)
|
3,978
|
128
|
Start
|
Mid
|
906
|
Foreign function interface
|
3,976
|
128
|
Start
|
Low
|
907
|
Async/await
|
3,963
|
127
|
C
|
Mid
|
908
|
Multiclass classification
|
3,939
|
127
|
Start
|
Mid
|
909
|
Doubly linked list
|
3,939
|
127
|
Start
|
High
|
910
|
Online machine learning
|
3,929
|
126
|
C
|
Mid
|
911
|
BLOOM (language model)
|
3,922
|
126
|
Stub
|
Low
|
912
|
Rule 110
|
3,919
|
126
|
Start
|
Mid
|
913
|
Formal grammar
|
3,915
|
126
|
C
|
Mid
|
914
|
Program optimization
|
3,906
|
126
|
B
|
High
|
915
|
Software rot
|
3,903
|
125
|
Unknown
|
Unknown
|
916
|
Speculative execution
|
3,900
|
125
|
Start
|
High
|
917
|
Intermediate representation
|
3,886
|
125
|
Start
|
Low
|
918
|
Restricted Boltzmann machine
|
3,882
|
125
|
Unknown
|
Unknown
|
919
|
Distributed operating system
|
3,875
|
125
|
C
|
Mid
|
920
|
Formal methods
|
3,873
|
124
|
C
|
Top
|
921
|
Mock object
|
3,872
|
124
|
Start
|
Low
|
922
|
Vendor lock-in
|
3,867
|
124
|
C
|
Mid
|
923
|
Message queue
|
3,866
|
124
|
Unknown
|
Unknown
|
924
|
Search engine indexing
|
3,866
|
124
|
C
|
Unknown
|
925
|
Oracle machine
|
3,860
|
124
|
C
|
Mid
|
926
|
Code.org
|
3,849
|
124
|
C
|
Low
|
927
|
Haxe
|
3,836
|
123
|
C
|
Low
|
928
|
Proxy pattern
|
3,832
|
123
|
Start
|
Mid
|
929
|
Pseudorandom binary sequence
|
3,831
|
123
|
Start
|
Mid
|
930
|
Information management
|
3,828
|
123
|
C
|
Low
|
931
|
IBM Research
|
3,822
|
123
|
C
|
Unknown
|
932
|
API testing
|
3,821
|
123
|
Unknown
|
Unknown
|
933
|
Artificial Intelligence: A Modern Approach
|
3,819
|
123
|
Start
|
Unknown
|
934
|
Control-flow graph
|
3,817
|
123
|
C
|
Mid
|
935
|
Metasyntactic variable
|
3,814
|
123
|
Unknown
|
Unknown
|
936
|
User-centered design
|
3,807
|
122
|
Start
|
Mid
|
937
|
Array programming
|
3,792
|
122
|
C
|
Low
|
938
|
Smith–Waterman algorithm
|
3,787
|
122
|
B
|
Mid
|
939
|
Snippet (programming)
|
3,786
|
122
|
Start
|
Low
|
940
|
Inverted index
|
3,771
|
121
|
Start
|
Mid
|
941
|
Brute-force search
|
3,770
|
121
|
Start
|
Mid
|
942
|
Interval tree
|
3,768
|
121
|
Start
|
Mid
|
943
|
Green thread
|
3,765
|
121
|
Start
|
Low
|
944
|
Semantic network
|
3,754
|
121
|
Start
|
Low
|
945
|
Shannon's source coding theorem
|
3,753
|
121
|
C
|
Low
|
946
|
Linear search
|
3,749
|
120
|
Start
|
Mid
|
947
|
Thread pool
|
3,748
|
120
|
Unknown
|
Unknown
|
948
|
Soundex
|
3,747
|
120
|
C
|
Unknown
|
949
|
Lightning Memory-Mapped Database
|
3,733
|
120
|
B
|
Unknown
|
950
|
Video coding format
|
3,724
|
120
|
C
|
Unknown
|
951
|
Function overloading
|
3,723
|
120
|
Unknown
|
Unknown
|
952
|
Apriori algorithm
|
3,718
|
119
|
C
|
Mid
|
953
|
SAT solver
|
3,712
|
119
|
Start
|
Mid
|
954
|
Comparison of programming paradigms
|
3,697
|
119
|
C
|
Low
|
955
|
Double-checked locking
|
3,695
|
119
|
Unknown
|
Unknown
|
956
|
Stack machine
|
3,674
|
118
|
C
|
Mid
|
957
|
Z notation
|
3,670
|
118
|
Start
|
Mid
|
958
|
Template method pattern
|
3,668
|
118
|
Start
|
Low
|
959
|
Codewars
|
3,668
|
118
|
Stub
|
Low
|
960
|
Dependent type
|
3,664
|
118
|
Start
|
High
|
961
|
Proof assistant
|
3,651
|
117
|
Start
|
High
|
962
|
Schönhage–Strassen algorithm
|
3,649
|
117
|
C
|
High
|
963
|
Pattern matching
|
3,647
|
117
|
C
|
Mid
|
964
|
Object database
|
3,646
|
117
|
Start
|
High
|
965
|
Urs Hölzle
|
3,643
|
117
|
Start
|
Unknown
|
966
|
Women in computing
|
3,627
|
117
|
B
|
High
|
967
|
Multi-label classification
|
3,622
|
116
|
Unknown
|
Unknown
|
968
|
Calling convention
|
3,606
|
116
|
C
|
High
|
969
|
Method (computer programming)
|
3,601
|
116
|
C
|
High
|
970
|
Relational database management system
|
3,599
|
116
|
Redirect
|
NA
|
971
|
Dynamic programming language
|
3,570
|
115
|
Start
|
Mid
|
972
|
Active record pattern
|
3,570
|
115
|
Unknown
|
Unknown
|
973
|
Blue–green deployment
|
3,566
|
115
|
Stub
|
Low
|
974
|
Algorithmic bias
|
3,561
|
114
|
GA
|
Top
|
975
|
Deutsch–Jozsa algorithm
|
3,558
|
114
|
C
|
Mid
|
976
|
Nondeterministic Turing machine
|
3,547
|
114
|
C
|
High
|
977
|
Computer performance
|
3,546
|
114
|
Start
|
Mid
|
978
|
Synchronization (computer science)
|
3,534
|
114
|
B
|
High
|
979
|
Feature selection
|
3,526
|
113
|
C
|
Mid
|
980
|
Suffix tree
|
3,522
|
113
|
C
|
High
|
981
|
Learning rate
|
3,519
|
113
|
Unknown
|
Unknown
|
982
|
Factory (object-oriented programming)
|
3,511
|
113
|
C
|
Low
|
983
|
Zachman Framework
|
3,503
|
113
|
Start
|
Unknown
|
984
|
Hill climbing
|
3,486
|
112
|
C
|
Mid
|
985
|
Hybrid log–gamma
|
3,486
|
112
|
Start
|
Low
|
986
|
Job-shop scheduling
|
3,479
|
112
|
C
|
Mid
|
987
|
LeNet
|
3,474
|
112
|
Start
|
Unknown
|
988
|
Perfect hash function
|
3,471
|
111
|
C
|
Unknown
|
989
|
Kleene star
|
3,460
|
111
|
Start
|
High
|
990
|
Longest path problem
|
3,456
|
111
|
C
|
Low
|
991
|
Web of trust
|
3,454
|
111
|
Unknown
|
Unknown
|
992
|
Hard coding
|
3,452
|
111
|
Start
|
Low
|
993
|
Hazard (computer architecture)
|
3,439
|
110
|
C
|
Low
|
994
|
Purely functional programming
|
3,419
|
110
|
Start
|
Low
|
995
|
Delegation pattern
|
3,416
|
110
|
Start
|
Mid
|
996
|
Strong typing
|
3,405
|
109
|
Redirect
|
NA
|
997
|
Data compression ratio
|
3,399
|
109
|
Unknown
|
Unknown
|
998
|
Vala (programming language)
|
3,398
|
109
|
Start
|
Low
|
999
|
TLA+
|
3,394
|
109
|
B
|
High
|
1000
|
Comparison of parser generators
|
3,393
|
109
|
List
|
Mid
|