Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
Artificial intelligence
|
533,872
|
17,221
|
B
|
Top
|
2
|
OpenAI
|
355,395
|
11,464
|
C
|
Mid
|
3
|
C (programming language)
|
282,699
|
9,119
|
C
|
High
|
4
|
Computer
|
202,213
|
6,523
|
C
|
Top
|
5
|
Python (programming language)
|
175,817
|
5,671
|
C
|
High
|
6
|
Lex Fridman
|
130,807
|
4,219
|
C
|
Low
|
7
|
R (programming language)
|
124,664
|
4,021
|
B
|
High
|
8
|
Machine learning
|
123,425
|
3,981
|
B
|
Top
|
9
|
Quantum computing
|
121,721
|
3,926
|
B
|
High
|
10
|
Larry Page
|
119,378
|
3,850
|
B
|
High
|
11
|
Video game
|
118,434
|
3,820
|
B
|
Mid
|
12
|
HTML
|
117,935
|
3,804
|
B
|
High
|
13
|
Google Search
|
112,045
|
3,614
|
C
|
High
|
14
|
Dijkstra's algorithm
|
111,127
|
3,584
|
C
|
Top
|
15
|
Sergey Brin
|
100,981
|
3,257
|
GA
|
Mid
|
16
|
JavaScript
|
98,364
|
3,173
|
B
|
High
|
17
|
Cloud computing
|
95,261
|
3,072
|
C
|
Top
|
18
|
Artificial general intelligence
|
93,519
|
3,016
|
B
|
Mid
|
19
|
Go (programming language)
|
87,773
|
2,831
|
B
|
High
|
20
|
C++
|
87,516
|
2,823
|
B
|
High
|
21
|
Software
|
84,118
|
2,713
|
C
|
Top
|
22
|
Ilya Sutskever
|
83,945
|
2,707
|
Start
|
Unknown
|
23
|
Stable Diffusion
|
82,423
|
2,658
|
C
|
Low
|
24
|
Turing test
|
81,532
|
2,630
|
B
|
Top
|
25
|
Information
|
78,505
|
2,532
|
C
|
Top
|
26
|
Rust (programming language)
|
73,805
|
2,380
|
GA
|
High
|
27
|
Katherine Johnson
|
73,521
|
2,371
|
GA
|
High
|
28
|
Regular expression
|
72,768
|
2,347
|
B
|
Top
|
29
|
JSON
|
71,943
|
2,320
|
B
|
High
|
30
|
Computer science
|
71,630
|
2,310
|
C
|
Top
|
31
|
Generative artificial intelligence
|
70,159
|
2,263
|
B
|
Mid
|
32
|
A* search algorithm
|
70,120
|
2,261
|
B
|
Mid
|
33
|
Information technology
|
69,748
|
2,249
|
C
|
Top
|
34
|
Scratch (programming language)
|
69,271
|
2,234
|
C
|
Mid
|
35
|
Internet of things
|
65,718
|
2,119
|
B
|
Top
|
36
|
Algorithm
|
65,403
|
2,109
|
C
|
Top
|
37
|
Tim Berners-Lee
|
65,271
|
2,105
|
C
|
Top
|
38
|
Assembly language
|
61,044
|
1,969
|
B
|
High
|
39
|
Blockchain
|
60,781
|
1,960
|
B
|
Top
|
40
|
CSS
|
60,246
|
1,943
|
B
|
High
|
41
|
Artificial neural network
|
57,366
|
1,850
|
C
|
Top
|
42
|
Prisoner's dilemma
|
57,216
|
1,845
|
C
|
High
|
43
|
Object-oriented programming
|
56,705
|
1,829
|
B
|
Top
|
44
|
Conway's Game of Life
|
55,911
|
1,803
|
B
|
High
|
45
|
Robot
|
54,988
|
1,773
|
B
|
Top
|
46
|
Millennium Prize Problems
|
54,526
|
1,758
|
C
|
Mid
|
47
|
Virtual reality
|
54,344
|
1,753
|
B
|
High
|
48
|
Computer hardware
|
54,015
|
1,742
|
C
|
Mid
|
49
|
Programming language
|
53,685
|
1,731
|
B
|
Top
|
50
|
UTF-8
|
52,312
|
1,687
|
B
|
Mid
|
51
|
Big O notation
|
51,854
|
1,672
|
B
|
Top
|
52
|
P versus NP problem
|
51,743
|
1,669
|
B
|
Top
|
53
|
Monte Carlo method
|
51,731
|
1,668
|
B
|
High
|
54
|
SQL
|
51,560
|
1,663
|
C
|
Top
|
55
|
Deep learning
|
50,239
|
1,620
|
C
|
Top
|
56
|
Travelling salesman problem
|
49,850
|
1,608
|
B
|
High
|
57
|
Node.js
|
49,373
|
1,592
|
C
|
High
|
58
|
Hash function
|
47,022
|
1,516
|
C
|
Top
|
59
|
Diffie–Hellman key exchange
|
46,836
|
1,510
|
C
|
Mid
|
60
|
Unix
|
46,166
|
1,489
|
B
|
High
|
61
|
Augmented reality
|
45,311
|
1,461
|
B
|
High
|
62
|
Turing machine
|
45,140
|
1,456
|
B
|
Top
|
63
|
Support vector machine
|
44,587
|
1,438
|
C
|
Mid
|
64
|
Database
|
43,976
|
1,418
|
C
|
Top
|
65
|
K-means clustering
|
43,833
|
1,413
|
C
|
Mid
|
66
|
Dan Clancy
|
43,446
|
1,401
|
C
|
Unknown
|
67
|
PHP
|
42,848
|
1,382
|
GA
|
High
|
68
|
Agile software development
|
42,778
|
1,379
|
B
|
High
|
69
|
Secure Shell
|
41,472
|
1,337
|
C
|
Low
|
70
|
RGB color model
|
40,860
|
1,318
|
B
|
Low
|
71
|
C Sharp (programming language)
|
40,305
|
1,300
|
B
|
High
|
72
|
Fast Fourier transform
|
40,160
|
1,295
|
B
|
High
|
73
|
Cryptography
|
39,988
|
1,289
|
C
|
Top
|
74
|
Google DeepMind
|
39,804
|
1,284
|
C
|
Mid
|
75
|
Fast inverse square root
|
38,544
|
1,243
|
GA
|
Low
|
76
|
Geoffrey Hinton
|
38,439
|
1,239
|
C
|
Low
|
77
|
Enterprise resource planning
|
38,157
|
1,230
|
B
|
Mid
|
78
|
Order of operations
|
37,915
|
1,223
|
C
|
Mid
|
79
|
XML
|
37,326
|
1,204
|
B
|
High
|
80
|
Free and open-source software
|
36,534
|
1,178
|
C
|
Top
|
81
|
Generative pre-trained transformer
|
36,301
|
1,171
|
B
|
Mid
|
82
|
Quicksort
|
36,070
|
1,163
|
B
|
Top
|
83
|
Two's complement
|
35,524
|
1,145
|
C
|
High
|
84
|
List of programming languages
|
35,463
|
1,143
|
List
|
High
|
85
|
Graph theory
|
35,383
|
1,141
|
C
|
High
|
86
|
Binary search algorithm
|
35,201
|
1,135
|
FA
|
High
|
87
|
Programmer
|
35,138
|
1,133
|
C
|
Mid
|
88
|
Natural language processing
|
34,922
|
1,126
|
C
|
Top
|
89
|
Breadth-first search
|
34,632
|
1,117
|
Start
|
Top
|
90
|
DevOps
|
34,533
|
1,113
|
C
|
Low
|
91
|
Self-driving car
|
34,511
|
1,113
|
B
|
High
|
92
|
Web colors
|
34,469
|
1,111
|
C
|
Mid
|
93
|
Tower of Hanoi
|
34,373
|
1,108
|
C
|
Mid
|
94
|
Software engineering
|
34,369
|
1,108
|
C
|
Top
|
95
|
Fortran
|
34,229
|
1,104
|
C
|
Mid
|
96
|
Depth-first search
|
33,545
|
1,082
|
C
|
Top
|
97
|
Finite-state machine
|
33,449
|
1,079
|
B
|
Top
|
98
|
High Efficiency Video Coding
|
33,120
|
1,068
|
B
|
Low
|
99
|
Floating-point arithmetic
|
33,043
|
1,065
|
B
|
Top
|
100
|
COBOL
|
33,001
|
1,064
|
GA
|
High
|
101
|
Heuristic
|
32,932
|
1,062
|
C
|
Mid
|
102
|
Hash table
|
32,810
|
1,058
|
B
|
High
|
103
|
Computer programming
|
32,731
|
1,055
|
C
|
Top
|
104
|
Model–view–controller
|
32,692
|
1,054
|
Start
|
Mid
|
105
|
Discrete mathematics
|
31,650
|
1,020
|
B
|
Top
|
106
|
Lisp (programming language)
|
31,506
|
1,016
|
B
|
High
|
107
|
Boolean algebra
|
31,440
|
1,014
|
C
|
High
|
108
|
Kernel (operating system)
|
31,396
|
1,012
|
B
|
High
|
109
|
Grace Hopper
|
30,949
|
998
|
B
|
Top
|
110
|
Open-source software
|
30,927
|
997
|
C
|
High
|
111
|
Qubit
|
30,923
|
997
|
C
|
High
|
112
|
Scrum (software development)
|
30,679
|
989
|
C
|
High
|
113
|
Chatbot
|
30,317
|
977
|
C
|
Low
|
114
|
Data science
|
30,253
|
975
|
Start
|
High
|
115
|
IEEE 754
|
30,006
|
967
|
C
|
High
|
116
|
Levenshtein distance
|
29,951
|
966
|
C
|
Mid
|
117
|
Softmax function
|
29,926
|
965
|
C
|
High
|
118
|
Brainfuck
|
29,835
|
962
|
C
|
Low
|
119
|
Sorting algorithm
|
29,505
|
951
|
C
|
Top
|
120
|
Cosine similarity
|
29,448
|
949
|
C
|
Low
|
121
|
Lua (programming language)
|
29,435
|
949
|
C
|
Mid
|
122
|
Bitwise operation
|
29,165
|
940
|
C
|
High
|
123
|
Dynamic programming
|
29,108
|
938
|
B
|
Top
|
124
|
Directed acyclic graph
|
29,020
|
936
|
GA
|
High
|
125
|
TypeScript
|
28,888
|
931
|
C
|
Low
|
126
|
Huffman coding
|
28,758
|
927
|
C
|
High
|
127
|
Unified Modeling Language
|
28,655
|
924
|
C
|
High
|
128
|
Bash (Unix shell)
|
28,629
|
923
|
B
|
Mid
|
129
|
Merge sort
|
28,426
|
916
|
C
|
High
|
130
|
Compiler
|
28,149
|
908
|
C
|
Top
|
131
|
Cognition
|
27,866
|
898
|
C
|
Low
|
132
|
Computer program
|
27,722
|
894
|
C
|
Top
|
133
|
Time complexity
|
27,696
|
893
|
B
|
High
|
134
|
NP-completeness
|
27,663
|
892
|
C
|
Top
|
135
|
Advanced Video Coding
|
27,607
|
890
|
C
|
Low
|
136
|
Functional programming
|
27,508
|
887
|
B
|
Top
|
137
|
Data analysis
|
27,474
|
886
|
B
|
High
|
138
|
Knapsack problem
|
27,463
|
885
|
B
|
Mid
|
139
|
Turing completeness
|
27,343
|
882
|
C
|
Top
|
140
|
MATLAB
|
27,313
|
881
|
B
|
High
|
141
|
Perl
|
27,163
|
876
|
B
|
High
|
142
|
Robotics
|
27,132
|
875
|
B
|
Top
|
143
|
Linear programming
|
27,103
|
874
|
B
|
High
|
144
|
Heap (data structure)
|
27,092
|
873
|
C
|
High
|
145
|
De Morgan's laws
|
26,830
|
865
|
Start
|
High
|
146
|
Ray tracing (graphics)
|
26,809
|
864
|
C
|
Mid
|
147
|
Quantum logic gate
|
26,776
|
863
|
C
|
High
|
148
|
In-place algorithm
|
26,724
|
862
|
Start
|
High
|
149
|
BERT (language model)
|
26,658
|
859
|
Start
|
Unknown
|
150
|
Big data
|
26,492
|
854
|
B
|
High
|
151
|
BASIC
|
26,429
|
852
|
C
|
Mid
|
152
|
Neural network
|
26,406
|
851
|
B
|
High
|
153
|
W3Schools
|
26,250
|
846
|
Stub
|
Low
|
154
|
Abstraction
|
26,199
|
845
|
Start
|
High
|
155
|
Institute of Electrical and Electronics Engineers
|
26,067
|
840
|
B
|
Top
|
156
|
NP-hardness
|
25,830
|
833
|
C
|
High
|
157
|
AV1
|
25,769
|
831
|
B
|
Low
|
158
|
Shor's algorithm
|
25,675
|
828
|
C
|
Mid
|
159
|
First-order logic
|
25,612
|
826
|
B
|
High
|
160
|
Optical character recognition
|
25,606
|
826
|
C
|
Mid
|
161
|
Insertion sort
|
25,540
|
823
|
B
|
High
|
162
|
Binary search tree
|
25,476
|
821
|
GA
|
High
|
163
|
B-tree
|
25,191
|
812
|
C
|
High
|
164
|
Software design pattern
|
25,169
|
811
|
C
|
High
|
165
|
Recursion
|
25,076
|
808
|
C
|
Mid
|
166
|
Information theory
|
24,956
|
805
|
B
|
Top
|
167
|
Floor and ceiling functions
|
24,665
|
795
|
B
|
Mid
|
168
|
Lambda calculus
|
24,465
|
789
|
B
|
High
|
169
|
Malware
|
24,182
|
780
|
C
|
High
|
170
|
Single-precision floating-point format
|
23,912
|
771
|
Unknown
|
Unknown
|
171
|
Shortest path problem
|
23,789
|
767
|
C
|
High
|
172
|
HTML5
|
23,787
|
767
|
B
|
High
|
173
|
Mathematical optimization
|
23,719
|
765
|
B
|
High
|
174
|
Halting problem
|
23,471
|
757
|
B
|
Top
|
175
|
Bubble sort
|
23,284
|
751
|
B
|
High
|
176
|
Advent of Code
|
23,048
|
743
|
C
|
Low
|
177
|
Whitespace character
|
22,992
|
741
|
B
|
Mid
|
178
|
Ruby (programming language)
|
22,935
|
739
|
B
|
High
|
179
|
C--
|
22,862
|
737
|
Start
|
Low
|
180
|
Stochastic gradient descent
|
22,860
|
737
|
Start
|
Mid
|
181
|
Software testing
|
22,846
|
736
|
B
|
Top
|
182
|
Greg Brockman
|
22,810
|
735
|
C
|
Low
|
183
|
Exclusive or
|
22,782
|
734
|
C
|
Mid
|
184
|
Cybernetics
|
22,754
|
734
|
C
|
Mid
|
185
|
Red–black tree
|
22,728
|
733
|
C
|
High
|
186
|
Claude Shannon
|
22,654
|
730
|
B
|
High
|
187
|
Donald Knuth
|
22,573
|
728
|
B
|
Top
|
188
|
Smart city
|
22,556
|
727
|
C
|
Mid
|
189
|
Sieve of Eratosthenes
|
22,294
|
719
|
C
|
Mid
|
190
|
Trie
|
22,062
|
711
|
GA
|
High
|
191
|
Topological sorting
|
21,843
|
704
|
C
|
High
|
192
|
Data structure
|
21,835
|
704
|
C
|
Top
|
193
|
Vector graphics
|
21,626
|
697
|
Start
|
High
|
194
|
Relational database
|
21,264
|
685
|
C
|
Top
|
195
|
Dennis Ritchie
|
21,153
|
682
|
Start
|
High
|
196
|
Boolean satisfiability problem
|
21,061
|
679
|
C
|
Top
|
197
|
History sniffing
|
20,975
|
676
|
Start
|
Low
|
198
|
Effective accelerationism
|
20,865
|
673
|
Unknown
|
Unknown
|
199
|
POSIX
|
20,669
|
666
|
B
|
Mid
|
200
|
Information security
|
20,444
|
659
|
B
|
Top
|
201
|
Computer engineering
|
20,430
|
659
|
C
|
Top
|
202
|
Bioinformatics
|
20,207
|
651
|
C
|
High
|
203
|
Genetic algorithm
|
20,169
|
650
|
C
|
High
|
204
|
Programming paradigm
|
20,168
|
650
|
C
|
Mid
|
205
|
Point in polygon
|
20,141
|
649
|
Start
|
Low
|
206
|
Cross-site request forgery
|
19,977
|
644
|
C
|
High
|
207
|
Source code
|
19,893
|
641
|
C
|
High
|
208
|
AArch64
|
19,848
|
640
|
C
|
Low
|
209
|
Data mining
|
19,755
|
637
|
B
|
High
|
210
|
AVL tree
|
19,734
|
636
|
C
|
High
|
211
|
Monad (functional programming)
|
19,718
|
636
|
B
|
Mid
|
212
|
Don't repeat yourself
|
19,660
|
634
|
Start
|
Mid
|
213
|
Pareto efficiency
|
19,650
|
633
|
C
|
Mid
|
214
|
Graph (discrete mathematics)
|
19,585
|
631
|
B
|
High
|
215
|
Artificial intelligence art
|
19,534
|
630
|
C
|
Low
|
216
|
Haskell
|
19,508
|
629
|
B
|
Mid
|
217
|
Binary tree
|
19,442
|
627
|
B
|
Top
|
218
|
Attention (machine learning)
|
19,304
|
622
|
Stub
|
Unknown
|
219
|
Tree (data structure)
|
19,184
|
618
|
C
|
High
|
220
|
Swift (programming language)
|
19,159
|
618
|
B
|
Mid
|
221
|
Computer architecture
|
19,156
|
617
|
C
|
Top
|
222
|
Bellman–Ford algorithm
|
19,047
|
614
|
C
|
Mid
|
223
|
Floyd–Warshall algorithm
|
19,017
|
613
|
B
|
High
|
224
|
Magic number (programming)
|
19,003
|
613
|
C
|
Mid
|
225
|
Class diagram
|
18,867
|
608
|
Start
|
Low
|
226
|
Stack (abstract data type)
|
18,820
|
607
|
C
|
Top
|
227
|
Operations research
|
18,755
|
605
|
C
|
High
|
228
|
Usage share of operating systems
|
18,716
|
603
|
B
|
Mid
|
229
|
Client–server model
|
18,685
|
602
|
C
|
High
|
230
|
Web development
|
18,665
|
602
|
Start
|
Mid
|
231
|
Amdahl's law
|
18,650
|
601
|
C
|
High
|
232
|
Cluster analysis
|
18,640
|
601
|
C
|
High
|
233
|
Visual Basic (.NET)
|
18,617
|
600
|
C
|
Mid
|
234
|
Minimum spanning tree
|
18,561
|
598
|
C
|
High
|
235
|
AlphaGo
|
18,561
|
598
|
C
|
High
|
236
|
Digital Revolution
|
18,225
|
587
|
Unknown
|
Mid
|
237
|
Tf–idf
|
18,169
|
586
|
C
|
Low
|
238
|
Turing Award
|
18,160
|
585
|
Start
|
Top
|
239
|
Computer vision
|
18,153
|
585
|
C
|
Top
|
240
|
Tensor Processing Unit
|
18,113
|
584
|
C
|
Mid
|
241
|
Free software
|
18,092
|
583
|
C
|
High
|
242
|
Lenna
|
17,990
|
580
|
C
|
Unknown
|
243
|
Feedforward neural network
|
17,862
|
576
|
Unknown
|
Unknown
|
244
|
Ajax (programming)
|
17,860
|
576
|
Start
|
High
|
245
|
Automaton
|
17,855
|
575
|
C
|
High
|
246
|
Hallucination (artificial intelligence)
|
17,848
|
575
|
C
|
Low
|
247
|
Hamming code
|
17,713
|
571
|
C
|
High
|
248
|
Ada (programming language)
|
17,506
|
564
|
C
|
High
|
249
|
High-level programming language
|
17,484
|
564
|
Start
|
High
|
250
|
Prim's algorithm
|
17,481
|
563
|
C
|
High
|
251
|
Linked list
|
17,473
|
563
|
B
|
Top
|
252
|
NoSQL
|
17,450
|
562
|
C
|
High
|
253
|
Brute-force attack
|
17,387
|
560
|
C
|
High
|
254
|
Multiplication sign
|
17,363
|
560
|
C
|
Low
|
255
|
Computer graphics
|
17,356
|
559
|
B
|
Top
|
256
|
Singleton pattern
|
17,249
|
556
|
C
|
Mid
|
257
|
NP (complexity)
|
17,216
|
555
|
C
|
High
|
258
|
Deep Blue (chess computer)
|
17,192
|
554
|
GA
|
Mid
|
259
|
Longest path problem
|
17,104
|
551
|
C
|
Low
|
260
|
Array (data structure)
|
16,978
|
547
|
C
|
Top
|
261
|
Cognitive science
|
16,912
|
545
|
C
|
High
|
262
|
Edsger W. Dijkstra
|
16,892
|
544
|
B
|
Top
|
263
|
Markov chain Monte Carlo
|
16,859
|
543
|
C
|
High
|
264
|
String (computer science)
|
16,843
|
543
|
Start
|
High
|
265
|
Ken Thompson
|
16,706
|
538
|
B
|
High
|
266
|
Machine code
|
16,614
|
535
|
Unknown
|
Unknown
|
267
|
Data warehouse
|
16,614
|
535
|
Start
|
High
|
268
|
Type system
|
16,436
|
530
|
B
|
High
|
269
|
Real-time operating system
|
16,329
|
526
|
Start
|
Mid
|
270
|
Cache replacement policies
|
16,295
|
525
|
C
|
Mid
|
271
|
Category theory
|
16,286
|
525
|
B
|
High
|
272
|
Software development
|
16,251
|
524
|
C
|
Top
|
273
|
ECMAScript
|
16,164
|
521
|
C
|
Mid
|
274
|
Activation function
|
16,091
|
519
|
Start
|
Mid
|
275
|
Luis von Ahn
|
16,032
|
517
|
Start
|
Low
|
276
|
Kruskal's algorithm
|
16,015
|
516
|
Start
|
High
|
277
|
Extract, transform, load
|
15,949
|
514
|
Start
|
High
|
278
|
Code
|
15,941
|
514
|
C
|
High
|
279
|
Julia (programming language)
|
15,928
|
513
|
B
|
High
|
280
|
Scala (programming language)
|
15,897
|
512
|
B
|
High
|
281
|
Deadlock
|
15,782
|
509
|
C
|
High
|
282
|
Adjacency matrix
|
15,781
|
509
|
C
|
Mid
|
283
|
Computational fluid dynamics
|
15,713
|
506
|
C
|
High
|
284
|
Existential risk from artificial general intelligence
|
15,594
|
503
|
C
|
Mid
|
285
|
Semaphore (programming)
|
15,538
|
501
|
Start
|
High
|
286
|
Applications of artificial intelligence
|
15,512
|
500
|
C
|
Low
|
287
|
Variational autoencoder
|
15,508
|
500
|
Unknown
|
Low
|
288
|
Automata theory
|
15,354
|
495
|
C
|
Top
|
289
|
Marvin Minsky
|
15,290
|
493
|
C
|
High
|
290
|
Prolog
|
15,204
|
490
|
B
|
Mid
|
291
|
Thread (computing)
|
15,150
|
488
|
C
|
High
|
292
|
Graph coloring
|
15,136
|
488
|
B
|
Mid
|
293
|
Hackathon
|
15,047
|
485
|
Start
|
Mid
|
294
|
Scripting language
|
15,021
|
484
|
C
|
Mid
|
295
|
Vint Cerf
|
15,001
|
483
|
Start
|
Mid
|
296
|
Tree traversal
|
15,000
|
483
|
C
|
High
|
297
|
Humanoid robot
|
14,998
|
483
|
C
|
High
|
298
|
Reed–Solomon error correction
|
14,976
|
483
|
C
|
Mid
|
299
|
Polymorphism (computer science)
|
14,947
|
482
|
C
|
High
|
300
|
Cellular automaton
|
14,917
|
481
|
B
|
High
|
301
|
Run-length encoding
|
14,806
|
477
|
Start
|
Mid
|
302
|
Adam D'Angelo
|
14,714
|
474
|
Start
|
Low
|
303
|
Imperative programming
|
14,689
|
473
|
C
|
Top
|
304
|
Recursion (computer science)
|
14,585
|
470
|
C
|
Top
|
305
|
Snake case
|
14,574
|
470
|
Start
|
Low
|
306
|
Bias–variance tradeoff
|
14,563
|
469
|
Start
|
Mid
|
307
|
Distributed computing
|
14,555
|
469
|
B
|
Top
|
308
|
Heapsort
|
14,525
|
468
|
B
|
High
|
309
|
Erlang (programming language)
|
14,428
|
465
|
B
|
Mid
|
310
|
Race condition
|
14,426
|
465
|
C
|
Top
|
311
|
Greedy algorithm
|
14,414
|
464
|
C
|
High
|
312
|
Autoencoder
|
14,341
|
462
|
C
|
High
|
313
|
Mobile device
|
14,338
|
462
|
Start
|
Low
|
314
|
Bjarne Stroustrup
|
14,233
|
459
|
Start
|
High
|
315
|
Bad Apple!!
|
14,211
|
458
|
Start
|
Low
|
316
|
History of Python
|
14,160
|
456
|
C
|
Low
|
317
|
Jaccard index
|
14,155
|
456
|
C
|
Mid
|
318
|
Pseudorandom number generator
|
14,095
|
454
|
C
|
Top
|
319
|
Data type
|
14,079
|
454
|
C
|
Top
|
320
|
Liskov substitution principle
|
14,055
|
453
|
Start
|
Mid
|
321
|
Garbage collection (computer science)
|
14,045
|
453
|
C
|
High
|
322
|
Monte Carlo tree search
|
14,030
|
452
|
C
|
Mid
|
323
|
ISO/IEC 8859-1
|
14,023
|
452
|
Start
|
Unknown
|
324
|
Expectation–maximization algorithm
|
13,989
|
451
|
C
|
High
|
325
|
Color depth
|
13,933
|
449
|
C
|
Low
|
326
|
Markup language
|
13,871
|
447
|
C
|
High
|
327
|
Residual neural network
|
13,855
|
446
|
Start
|
Low
|
328
|
Bresenham's line algorithm
|
13,848
|
446
|
C
|
Mid
|
329
|
APL (programming language)
|
13,808
|
445
|
B
|
Mid
|
330
|
Version control
|
13,748
|
443
|
C
|
High
|
331
|
Procedural generation
|
13,713
|
442
|
C
|
Unknown
|
332
|
Rounding
|
13,693
|
441
|
C
|
Low
|
333
|
Computing
|
13,679
|
441
|
B
|
High
|
334
|
Factory method pattern
|
13,676
|
441
|
Start
|
Mid
|
335
|
AlphaFold
|
13,669
|
440
|
C
|
Low
|
336
|
Bogosort
|
13,650
|
440
|
Start
|
Low
|
337
|
Dependency inversion principle
|
13,649
|
440
|
Start
|
Low
|
338
|
Unit testing
|
13,585
|
438
|
C
|
Mid
|
339
|
Backus–Naur form
|
13,577
|
437
|
Start
|
Unknown
|
340
|
Business intelligence
|
13,546
|
436
|
Start
|
High
|
341
|
IBM Watson
|
13,532
|
436
|
C
|
Mid
|
342
|
Observer pattern
|
13,529
|
436
|
Start
|
Mid
|
343
|
Esoteric programming language
|
13,524
|
436
|
Start
|
High
|
344
|
Human–computer interaction
|
13,505
|
435
|
C
|
Top
|
345
|
Checksum
|
13,499
|
435
|
Start
|
Mid
|
346
|
Numerical analysis
|
13,462
|
434
|
B
|
Top
|
347
|
Behavior-driven development
|
13,460
|
434
|
B
|
Low
|
348
|
Grayscale
|
13,369
|
431
|
Start
|
Mid
|
349
|
Instrumental convergence
|
13,286
|
428
|
C
|
Low
|
350
|
Nim
|
13,166
|
424
|
C
|
Unknown
|
351
|
Software bug
|
13,157
|
424
|
B
|
High
|
352
|
Pseudocode
|
13,139
|
423
|
C
|
High
|
353
|
Disjoint-set data structure
|
13,090
|
422
|
C
|
High
|
354
|
Unsupervised learning
|
12,979
|
418
|
C
|
Mid
|
355
|
The Art of Computer Programming
|
12,854
|
414
|
C
|
High
|
356
|
List of programming languages by type
|
12,772
|
412
|
List
|
High
|
357
|
Simplex algorithm
|
12,736
|
410
|
C
|
High
|
358
|
Parsing
|
12,729
|
410
|
Start
|
Top
|
359
|
Hamming distance
|
12,700
|
409
|
Start
|
High
|
360
|
Parallel computing
|
12,692
|
409
|
FA
|
Top
|
361
|
Karger's algorithm
|
12,685
|
409
|
C
|
Low
|
362
|
Objective-C
|
12,672
|
408
|
C
|
High
|
363
|
Smalltalk
|
12,571
|
405
|
C
|
High
|
364
|
Formal language
|
12,551
|
404
|
C
|
High
|
365
|
Half-precision floating-point format
|
12,518
|
403
|
Unknown
|
Unknown
|
366
|
Raster graphics
|
12,456
|
401
|
Start
|
Mid
|
367
|
Kernel (image processing)
|
12,443
|
401
|
Unknown
|
High
|
368
|
Priority queue
|
12,438
|
401
|
C
|
High
|
369
|
AVIF
|
12,434
|
401
|
C
|
Low
|
370
|
Continuous integration
|
12,383
|
399
|
B
|
Low
|
371
|
Voxel
|
12,377
|
399
|
C
|
Mid
|
372
|
Binary heap
|
12,370
|
399
|
B
|
High
|
373
|
WebRTC
|
12,362
|
398
|
C
|
Low
|
374
|
Sparse matrix
|
12,341
|
398
|
C
|
Mid
|
375
|
Abstract data type
|
12,310
|
397
|
C
|
High
|
376
|
Inversion of control
|
12,283
|
396
|
C
|
Low
|
377
|
Cyclomatic complexity
|
12,267
|
395
|
C
|
Low
|
378
|
K-d tree
|
12,265
|
395
|
C
|
Low
|
379
|
Foundation model
|
12,230
|
394
|
Unknown
|
Unknown
|
380
|
Sobel operator
|
12,188
|
393
|
C
|
Low
|
381
|
Context-free grammar
|
12,140
|
391
|
B
|
Top
|
382
|
Ackermann function
|
12,138
|
391
|
B
|
Mid
|
383
|
ActivityPub
|
12,122
|
391
|
C
|
Low
|
384
|
Particle swarm optimization
|
12,048
|
388
|
C
|
Mid
|
385
|
Hierarchical clustering
|
11,973
|
386
|
C
|
Mid
|
386
|
Computational complexity theory
|
11,958
|
385
|
C
|
Top
|
387
|
Memetics
|
11,949
|
385
|
Start
|
Unknown
|
388
|
Business Process Model and Notation
|
11,857
|
382
|
Start
|
Mid
|
389
|
Lexical analysis
|
11,857
|
382
|
C
|
High
|
390
|
Shunting yard algorithm
|
11,853
|
382
|
Unknown
|
Unknown
|
391
|
Ontology (information science)
|
11,838
|
381
|
C
|
High
|
392
|
Note G
|
11,790
|
380
|
B
|
Mid
|
393
|
Neuromorphic engineering
|
11,699
|
377
|
B
|
Low
|
394
|
Moravec's paradox
|
11,605
|
374
|
Start
|
Mid
|
395
|
Rendering (computer graphics)
|
11,587
|
373
|
B
|
High
|
396
|
Selection sort
|
11,563
|
373
|
C
|
High
|
397
|
Imo.im
|
11,563
|
373
|
Stub
|
Low
|
398
|
Matroska
|
11,563
|
373
|
C
|
Mid
|
399
|
Radix sort
|
11,562
|
372
|
Start
|
High
|
400
|
Physics-informed neural networks
|
11,559
|
372
|
Unknown
|
Low
|
401
|
Internet Engineering Task Force
|
11,545
|
372
|
C
|
Mid
|
402
|
Directed graph
|
11,519
|
371
|
C
|
High
|
403
|
DBSCAN
|
11,519
|
371
|
C
|
Mid
|
404
|
HTML element
|
11,457
|
369
|
C
|
Mid
|
405
|
Complex system
|
11,448
|
369
|
C
|
High
|
406
|
Cut, copy, and paste
|
11,367
|
366
|
C
|
Mid
|
407
|
Ensemble learning
|
11,358
|
366
|
C
|
Mid
|
408
|
Chomsky hierarchy
|
11,296
|
364
|
C
|
High
|
409
|
Knuth–Morris–Pratt algorithm
|
11,293
|
364
|
Start
|
High
|
410
|
Intrusion detection system
|
11,274
|
363
|
Start
|
Low
|
411
|
Planar graph
|
11,271
|
363
|
B
|
Mid
|
412
|
Jon Postel
|
11,264
|
363
|
C
|
Mid
|
413
|
Data-flow diagram
|
11,255
|
363
|
Start
|
Mid
|
414
|
Expert system
|
11,235
|
362
|
Start
|
Mid
|
415
|
Google Brain
|
11,178
|
360
|
C
|
Mid
|
416
|
Composition over inheritance
|
11,165
|
360
|
C
|
Low
|
417
|
QBittorrent
|
11,146
|
359
|
Start
|
Low
|
418
|
Alice and Bob
|
11,133
|
359
|
Start
|
Low
|
419
|
Iris flower data set
|
11,081
|
357
|
Start
|
Mid
|
420
|
Function (computer programming)
|
11,077
|
357
|
C
|
High
|
421
|
Grover's algorithm
|
11,076
|
357
|
C
|
Mid
|
422
|
Decision theory
|
11,033
|
355
|
C
|
High
|
423
|
Procedural programming
|
11,026
|
355
|
Start
|
Mid
|
424
|
Declarative programming
|
11,010
|
355
|
C
|
Top
|
425
|
Numerical integration
|
10,948
|
353
|
B
|
Mid
|
426
|
Foobar
|
10,909
|
351
|
C
|
Mid
|
427
|
Kolmogorov complexity
|
10,878
|
350
|
B
|
High
|
428
|
Strategy pattern
|
10,867
|
350
|
Start
|
Mid
|
429
|
Lossless compression
|
10,840
|
349
|
C
|
High
|
430
|
Signal processing
|
10,836
|
349
|
C
|
Low
|
431
|
List of NP-complete problems
|
10,825
|
349
|
List
|
High
|
432
|
Visitor pattern
|
10,750
|
346
|
Start
|
Unknown
|
433
|
Canny edge detector
|
10,745
|
346
|
Start
|
Mid
|
434
|
Actor model
|
10,686
|
344
|
C
|
Mid
|
435
|
Circular buffer
|
10,634
|
343
|
Start
|
Mid
|
436
|
Computer science and engineering
|
10,614
|
342
|
Start
|
Low
|
437
|
Pointer (computer programming)
|
10,607
|
342
|
C
|
High
|
438
|
Artificial Intelligence Act
|
10,603
|
342
|
Stub
|
Mid
|
439
|
Heuristic (computer science)
|
10,596
|
341
|
Unknown
|
Unknown
|
440
|
Ant colony optimization algorithms
|
10,576
|
341
|
B
|
Low
|
441
|
Boolean data type
|
10,570
|
340
|
Start
|
Low
|
442
|
C++23
|
10,505
|
338
|
C
|
Low
|
443
|
Ford–Fulkerson algorithm
|
10,457
|
337
|
Start
|
High
|
444
|
Master theorem (analysis of algorithms)
|
10,456
|
337
|
C
|
High
|
445
|
Deterministic finite automaton
|
10,396
|
335
|
Start
|
High
|
446
|
Shift register
|
10,385
|
335
|
Start
|
Unknown
|
447
|
Software development process
|
10,341
|
333
|
C
|
Mid
|
448
|
Encapsulation (computer programming)
|
10,314
|
332
|
Start
|
High
|
449
|
Natalie Enright Jerger
|
10,307
|
332
|
Start
|
Unknown
|
450
|
State machine replication
|
10,288
|
331
|
C
|
High
|
451
|
Alex Krizhevsky
|
10,287
|
331
|
Stub
|
Unknown
|
452
|
8-bit computing
|
10,285
|
331
|
Start
|
High
|
453
|
Vertex cover
|
10,239
|
330
|
C
|
Mid
|
454
|
Zero-shot learning
|
10,238
|
330
|
C
|
Mid
|
455
|
Linear congruential generator
|
10,206
|
329
|
Start
|
Mid
|
456
|
List of datasets for machine-learning research
|
10,201
|
329
|
List
|
Mid
|
457
|
Quadtree
|
10,170
|
328
|
C
|
Mid
|
458
|
Logo (programming language)
|
10,057
|
324
|
C
|
Mid
|
459
|
Robotic process automation
|
9,963
|
321
|
Start
|
Mid
|
460
|
Frontend and backend
|
9,955
|
321
|
Start
|
High
|
461
|
Google AI
|
9,929
|
320
|
Start
|
Low
|
462
|
Strong and weak typing
|
9,830
|
317
|
Start
|
Mid
|
463
|
Subset sum problem
|
9,818
|
316
|
C
|
Low
|
464
|
HackerRank
|
9,792
|
315
|
Start
|
Unknown
|
465
|
Theoretical computer science
|
9,776
|
315
|
B
|
Top
|
466
|
Max-flow min-cut theorem
|
9,766
|
315
|
Start
|
High
|
467
|
Smartglasses
|
9,740
|
314
|
C
|
Low
|
468
|
List of tools for static code analysis
|
9,733
|
313
|
List
|
Low
|
469
|
DeepDream
|
9,661
|
311
|
Start
|
Low
|
470
|
Colossus computer
|
9,656
|
311
|
B
|
Mid
|
471
|
For loop
|
9,622
|
310
|
B
|
High
|
472
|
Closure (computer programming)
|
9,620
|
310
|
C
|
Mid
|
473
|
Online analytical processing
|
9,619
|
310
|
C
|
Mid
|
474
|
Role-based access control
|
9,608
|
309
|
C
|
Mid
|
475
|
Ben Horowitz
|
9,501
|
306
|
Start
|
Low
|
476
|
Federated learning
|
9,500
|
306
|
Start
|
Low
|
477
|
Hungarian notation
|
9,499
|
306
|
Start
|
Low
|
478
|
15.ai
|
9,476
|
305
|
GA
|
Low
|
479
|
Relational algebra
|
9,460
|
305
|
C
|
Mid
|
480
|
Andrey Kolmogorov
|
9,445
|
304
|
C
|
High
|
481
|
Analytics
|
9,442
|
304
|
Start
|
High
|
482
|
Row- and column-major order
|
9,441
|
304
|
C
|
Mid
|
483
|
Branch and bound
|
9,414
|
303
|
Start
|
Mid
|
484
|
Error detection and correction
|
9,400
|
303
|
C
|
High
|
485
|
Cycle detection
|
9,392
|
302
|
B
|
Low
|
486
|
Abstraction (computer science)
|
9,391
|
302
|
C
|
Top
|
487
|
AI accelerator
|
9,361
|
301
|
B
|
Low
|
488
|
Boyer–Moore string-search algorithm
|
9,352
|
301
|
C
|
High
|
489
|
Batch normalization
|
9,345
|
301
|
C
|
Low
|
490
|
Extended ASCII
|
9,329
|
300
|
C
|
Low
|
491
|
Pointing stick
|
9,305
|
300
|
C
|
Low
|
492
|
D (programming language)
|
9,280
|
299
|
C
|
Low
|
493
|
Maze-solving algorithm
|
9,234
|
297
|
Unknown
|
Unknown
|
494
|
Sankey diagram
|
9,211
|
297
|
C
|
Low
|
495
|
DOM clobbering
|
9,171
|
295
|
Start
|
Low
|
496
|
Avast
|
9,143
|
294
|
B
|
Mid
|
497
|
Division algorithm
|
9,125
|
294
|
C
|
High
|
498
|
Mojo (programming language)
|
9,082
|
292
|
Start
|
Low
|
499
|
Text-to-image model
|
9,050
|
291
|
Unknown
|
Unknown
|
500
|
Decorator pattern
|
9,044
|
291
|
Start
|
Low
|
501
|
Dining philosophers problem
|
9,028
|
291
|
C
|
High
|
502
|
Type theory
|
9,018
|
290
|
C
|
High
|
503
|
Cell (processor)
|
8,999
|
290
|
B
|
Mid
|
504
|
Macro (computer science)
|
8,924
|
287
|
C
|
Mid
|
505
|
Currying
|
8,913
|
287
|
C
|
High
|
506
|
Conflict-free replicated data type
|
8,908
|
287
|
C
|
High
|
507
|
Sudoku solving algorithms
|
8,904
|
287
|
B
|
Low
|
508
|
Primality test
|
8,831
|
284
|
Start
|
Mid
|
509
|
Memory management
|
8,807
|
284
|
C
|
High
|
510
|
Chernoff bound
|
8,806
|
284
|
Start
|
Low
|
511
|
Integer (computer science)
|
8,779
|
283
|
C
|
Mid
|
512
|
B+ tree
|
8,742
|
282
|
Start
|
High
|
513
|
Edge detection
|
8,703
|
280
|
C
|
Mid
|
514
|
Naming convention (programming)
|
8,669
|
279
|
Start
|
Unknown
|
515
|
Church–Turing thesis
|
8,629
|
278
|
C
|
Top
|
516
|
Queue (abstract data type)
|
8,619
|
278
|
Start
|
Top
|
517
|
Maze generation algorithm
|
8,612
|
277
|
Start
|
Unknown
|
518
|
Mean time between failures
|
8,608
|
277
|
C
|
Low
|
519
|
Elisha Wiesel
|
8,607
|
277
|
Start
|
Low
|
520
|
System call
|
8,603
|
277
|
C
|
Low
|
521
|
Timsort
|
8,583
|
276
|
C
|
Mid
|
522
|
AWK
|
8,563
|
276
|
B
|
Mid
|
523
|
Data model
|
8,559
|
276
|
C
|
High
|
524
|
16K resolution
|
8,556
|
276
|
Start
|
Unknown
|
525
|
Maximum flow problem
|
8,546
|
275
|
C
|
High
|
526
|
Gladys West
|
8,526
|
275
|
B
|
Low
|
527
|
Aspect-oriented programming
|
8,436
|
272
|
Start
|
Mid
|
528
|
Inheritance (object-oriented programming)
|
8,417
|
271
|
Start
|
Mid
|
529
|
Robert C. Martin
|
8,406
|
271
|
Start
|
Mid
|
530
|
Code page 437
|
8,397
|
270
|
C
|
Low
|
531
|
Identity management
|
8,361
|
269
|
C
|
High
|
532
|
Okapi BM25
|
8,333
|
268
|
Start
|
Low
|
533
|
Ashish Vaswani
|
8,317
|
268
|
Start
|
Low
|
534
|
The Open Group Architecture Framework
|
8,304
|
267
|
Start
|
High
|
535
|
Intelligent agent
|
8,293
|
267
|
Unknown
|
Unknown
|
536
|
IT service management
|
8,280
|
267
|
Start
|
Mid
|
537
|
Shannon–Hartley theorem
|
8,268
|
266
|
C
|
High
|
538
|
List of unsolved problems in computer science
|
8,266
|
266
|
List
|
Mid
|
539
|
Data and information visualization
|
8,191
|
264
|
C
|
High
|
540
|
Hyper-threading
|
8,177
|
263
|
C
|
Low
|
541
|
Builder pattern
|
8,157
|
263
|
Start
|
Unknown
|
542
|
CORDIC
|
8,146
|
262
|
B
|
Mid
|
543
|
Theory of computation
|
8,107
|
261
|
C
|
Top
|
544
|
Extended Backus–Naur form
|
8,105
|
261
|
C
|
Mid
|
545
|
Coupling (computer programming)
|
8,104
|
261
|
Start
|
High
|
546
|
Skip list
|
8,078
|
260
|
C
|
Mid
|
547
|
Anti-pattern
|
8,068
|
260
|
C
|
Mid
|
548
|
Symbolic artificial intelligence
|
8,062
|
260
|
Start
|
Mid
|
549
|
Call stack
|
8,044
|
259
|
C
|
Mid
|
550
|
Informatics
|
8,022
|
258
|
C
|
Mid
|
551
|
System administrator
|
7,961
|
256
|
C
|
High
|
552
|
Judea Pearl
|
7,948
|
256
|
C
|
Mid
|
553
|
Ones' complement
|
7,932
|
255
|
Start
|
Mid
|
554
|
David J. Malan
|
7,921
|
255
|
C
|
Unknown
|
555
|
VP9
|
7,894
|
254
|
B
|
Low
|
556
|
Search algorithm
|
7,890
|
254
|
Start
|
Top
|
557
|
Avast Antivirus
|
7,889
|
254
|
Start
|
Mid
|
558
|
Coroutine
|
7,881
|
254
|
C
|
Mid
|
559
|
Maximum subarray problem
|
7,879
|
254
|
Unknown
|
Unknown
|
560
|
Quantum key distribution
|
7,874
|
254
|
B
|
Mid
|
561
|
SNOBOL
|
7,842
|
252
|
C
|
Mid
|
562
|
Knowledge graph
|
7,841
|
252
|
Start
|
High
|
563
|
Command pattern
|
7,832
|
252
|
Start
|
Mid
|
564
|
Front-end web development
|
7,825
|
252
|
Start
|
High
|
565
|
Quantum algorithm
|
7,760
|
250
|
C
|
High
|
566
|
L-system
|
7,731
|
249
|
Unknown
|
Unknown
|
567
|
Information science
|
7,720
|
249
|
C
|
Top
|
568
|
Ethics of artificial intelligence
|
7,715
|
248
|
B
|
Top
|
569
|
Carbon (programming language)
|
7,713
|
248
|
Start
|
Low
|
570
|
Named-entity recognition
|
7,705
|
248
|
C
|
Unknown
|
571
|
Structured programming
|
7,705
|
248
|
C
|
Mid
|
572
|
Independent set (graph theory)
|
7,681
|
247
|
C
|
Mid
|
573
|
Inverter (logic gate)
|
7,615
|
245
|
Start
|
Unknown
|
574
|
Clique problem
|
7,609
|
245
|
GA
|
Mid
|
575
|
Samsung Galaxy A03
|
7,584
|
244
|
Stub
|
Low
|
576
|
Time formatting and storage bugs
|
7,564
|
244
|
B
|
Low
|
577
|
Artificial consciousness
|
7,541
|
243
|
C
|
Unknown
|
578
|
Curiously recurring template pattern
|
7,525
|
242
|
C
|
Low
|
579
|
Microkernel
|
7,525
|
242
|
C
|
High
|
580
|
POST (HTTP)
|
7,506
|
242
|
Start
|
Low
|
581
|
Montgomery modular multiplication
|
7,499
|
241
|
C
|
Mid
|
582
|
Control flow
|
7,480
|
241
|
B
|
Top
|
583
|
Triple DES
|
7,473
|
241
|
Start
|
Unknown
|
584
|
Futures studies
|
7,428
|
239
|
B
|
Low
|
585
|
Multiplication algorithm
|
7,428
|
239
|
C
|
Low
|
586
|
State diagram
|
7,417
|
239
|
C
|
Mid
|
587
|
Data modeling
|
7,412
|
239
|
C
|
High
|
588
|
Associative array
|
7,404
|
238
|
C
|
High
|
589
|
Branch predictor
|
7,396
|
238
|
C
|
Mid
|
590
|
Ogg
|
7,369
|
237
|
Unknown
|
Unknown
|
591
|
Memory hierarchy
|
7,339
|
236
|
Start
|
Mid
|
592
|
List of hash functions
|
7,336
|
236
|
List
|
Low
|
593
|
Hamiltonian path problem
|
7,332
|
236
|
C
|
Mid
|
594
|
Strassen algorithm
|
7,327
|
236
|
C
|
Low
|
595
|
Multiple inheritance
|
7,317
|
236
|
C
|
Mid
|
596
|
List of pioneers in computer science
|
7,310
|
235
|
List
|
High
|
597
|
Anomaly detection
|
7,271
|
234
|
Start
|
Mid
|
598
|
Computation
|
7,260
|
234
|
Start
|
Top
|
599
|
Binary space partitioning
|
7,245
|
233
|
C
|
Low
|
600
|
Jürgen Schmidhuber
|
7,241
|
233
|
C
|
Mid
|
601
|
Miller–Rabin primality test
|
7,219
|
232
|
C
|
High
|
602
|
Interface (computing)
|
7,205
|
232
|
C
|
Low
|
603
|
Ladder logic
|
7,204
|
232
|
C
|
Low
|
604
|
Copying
|
7,199
|
232
|
Unknown
|
Unknown
|
605
|
Password cracking
|
7,173
|
231
|
C
|
Low
|
606
|
Computational complexity of matrix multiplication
|
7,160
|
230
|
Unknown
|
Unknown
|
607
|
Glossary of graph theory
|
7,152
|
230
|
List
|
Mid
|
608
|
Logic programming
|
7,143
|
230
|
C
|
Top
|
609
|
Paxos (computer science)
|
7,143
|
230
|
C
|
Low
|
610
|
Routing
|
7,096
|
228
|
C
|
Mid
|
611
|
Raj Reddy
|
7,093
|
228
|
B
|
Unknown
|
612
|
Event-driven programming
|
7,083
|
228
|
Start
|
High
|
613
|
Relational model
|
7,080
|
228
|
C
|
Top
|
614
|
Locality-sensitive hashing
|
7,072
|
228
|
C
|
Unknown
|
615
|
Association for Computing Machinery
|
7,071
|
228
|
C
|
Top
|
616
|
Tail call
|
7,069
|
228
|
C
|
Mid
|
617
|
Static program analysis
|
7,050
|
227
|
C
|
Mid
|
618
|
Samsung Galaxy Tab A8
|
7,045
|
227
|
Unknown
|
Unknown
|
619
|
Evolutionary algorithm
|
7,035
|
226
|
C
|
Mid
|
620
|
Petri net
|
7,011
|
226
|
B
|
Mid
|
621
|
Adapter pattern
|
7,007
|
226
|
Start
|
Unknown
|
622
|
R-tree
|
6,978
|
225
|
C
|
Mid
|
623
|
Open-source license
|
6,963
|
224
|
B
|
High
|
624
|
Memory leak
|
6,939
|
223
|
C
|
Mid
|
625
|
Computational biology
|
6,935
|
223
|
C
|
High
|
626
|
ALGOL
|
6,929
|
223
|
C
|
High
|
627
|
Loab
|
6,925
|
223
|
Unknown
|
Unknown
|
628
|
Computing Machinery and Intelligence
|
6,915
|
223
|
C
|
High
|
629
|
Two-phase commit protocol
|
6,885
|
222
|
C
|
High
|
630
|
Code.org
|
6,864
|
221
|
C
|
Low
|
631
|
Counting sort
|
6,860
|
221
|
C
|
High
|
632
|
Lossy compression
|
6,857
|
221
|
Start
|
High
|
633
|
Scaled agile framework
|
6,825
|
220
|
C
|
Low
|
634
|
Pushdown automaton
|
6,822
|
220
|
B
|
High
|
635
|
Agent-based model
|
6,819
|
219
|
C
|
Mid
|
636
|
Graph (abstract data type)
|
6,817
|
219
|
C
|
Top
|
637
|
All-points bulletin
|
6,813
|
219
|
C
|
Low
|
638
|
Amortized analysis
|
6,790
|
219
|
Start
|
High
|
639
|
MurmurHash
|
6,748
|
217
|
Start
|
Low
|
640
|
Radix tree
|
6,723
|
216
|
C
|
Mid
|
641
|
List of data structures
|
6,722
|
216
|
List
|
High
|
642
|
Microcode
|
6,711
|
216
|
Unknown
|
Unknown
|
643
|
3GP and 3G2
|
6,710
|
216
|
C
|
Low
|
644
|
Higher-order function
|
6,704
|
216
|
Start
|
High
|
645
|
Combinatorial optimization
|
6,683
|
215
|
C
|
Top
|
646
|
Conditional (computer programming)
|
6,677
|
215
|
C
|
Mid
|
647
|
Check digit
|
6,671
|
215
|
Start
|
Mid
|
648
|
JavaScript engine
|
6,659
|
214
|
Start
|
Mid
|
649
|
Sørensen–Dice coefficient
|
6,657
|
214
|
Start
|
Unknown
|
650
|
Email spoofing
|
6,655
|
214
|
Start
|
Low
|
651
|
Kai-Fu Lee
|
6,651
|
214
|
Start
|
Unknown
|
652
|
Set cover problem
|
6,649
|
214
|
C
|
Mid
|
653
|
Cook–Levin theorem
|
6,635
|
214
|
B
|
High
|
654
|
Aho–Corasick algorithm
|
6,628
|
213
|
Start
|
Mid
|
655
|
Computational linguistics
|
6,614
|
213
|
C
|
High
|
656
|
Leslie Lamport
|
6,607
|
213
|
C
|
High
|
657
|
Longest common subsequence
|
6,607
|
213
|
Start
|
High
|
658
|
Vehicle routing problem
|
6,603
|
213
|
Unknown
|
Unknown
|
659
|
EBCDIC
|
6,597
|
212
|
Start
|
Mid
|
660
|
Basic Linear Algebra Subprograms
|
6,597
|
212
|
C
|
Low
|
661
|
Signed number representations
|
6,595
|
212
|
C
|
High
|
662
|
Shane Legg
|
6,574
|
212
|
Start
|
Unknown
|
663
|
Fibonacci heap
|
6,571
|
211
|
C
|
High
|
664
|
Component (graph theory)
|
6,565
|
211
|
GA
|
Mid
|
665
|
Real-time computing
|
6,542
|
211
|
C
|
High
|
666
|
ABAP
|
6,529
|
210
|
C
|
High
|
667
|
Recursive descent parser
|
6,524
|
210
|
Start
|
High
|
668
|
Michael Wooldridge (computer scientist)
|
6,506
|
209
|
Start
|
Unknown
|
669
|
Tony Hoare
|
6,487
|
209
|
C
|
High
|
670
|
Anonymous function
|
6,485
|
209
|
C
|
Mid
|
671
|
Identifier
|
6,485
|
209
|
Start
|
Low
|
672
|
Superconducting quantum computing
|
6,481
|
209
|
Start
|
Unknown
|
673
|
Curry–Howard correspondence
|
6,471
|
208
|
C
|
High
|
674
|
Spaghetti code
|
6,467
|
208
|
Start
|
Mid
|
675
|
Samsung Galaxy A04
|
6,465
|
208
|
Unknown
|
Unknown
|
676
|
Nondeterministic finite automaton
|
6,464
|
208
|
B
|
High
|
677
|
Limited-memory BFGS
|
6,461
|
208
|
Unknown
|
Unknown
|
678
|
DNS rebinding
|
6,454
|
208
|
Unknown
|
Unknown
|
679
|
Stochastic parrot
|
6,415
|
206
|
Start
|
Unknown
|
680
|
Common Lisp
|
6,407
|
206
|
B
|
High
|
681
|
Constructor (object-oriented programming)
|
6,400
|
206
|
Start
|
Mid
|
682
|
Susan Rigetti
|
6,379
|
205
|
Start
|
Unknown
|
683
|
Universal Turing machine
|
6,345
|
204
|
C
|
Mid
|
684
|
HyperLogLog
|
6,336
|
204
|
C
|
Unknown
|
685
|
JPEG 2000
|
6,335
|
204
|
C
|
Low
|
686
|
Quick, Draw!
|
6,333
|
204
|
Stub
|
Low
|
687
|
Computational science
|
6,317
|
203
|
C
|
High
|
688
|
Opcode
|
6,302
|
203
|
C
|
High
|
689
|
Prefix sum
|
6,297
|
203
|
Unknown
|
Unknown
|
690
|
Lempel–Ziv–Welch
|
6,294
|
203
|
C
|
Unknown
|
691
|
Women and video games
|
6,223
|
200
|
B
|
Mid
|
692
|
Double-ended queue
|
6,219
|
200
|
Start
|
High
|
693
|
Computer scientist
|
6,185
|
199
|
Start
|
Top
|
694
|
Concurrency (computer science)
|
6,182
|
199
|
Start
|
Top
|
695
|
Quantum information
|
6,173
|
199
|
Start
|
High
|
696
|
User error
|
6,147
|
198
|
Start
|
High
|
697
|
Hazard (computer architecture)
|
6,147
|
198
|
C
|
Low
|
698
|
Computability theory
|
6,128
|
197
|
B
|
Top
|
699
|
Code smell
|
6,117
|
197
|
C
|
Low
|
700
|
Mixed reality
|
6,112
|
197
|
B
|
Unknown
|
701
|
Boids
|
6,104
|
196
|
Unknown
|
Unknown
|
702
|
Quantum machine learning
|
6,102
|
196
|
B
|
Unknown
|
703
|
CS50
|
6,087
|
196
|
Start
|
Low
|
704
|
Web API
|
6,085
|
196
|
Start
|
Unknown
|
705
|
Log-structured merge-tree
|
6,083
|
196
|
Start
|
Mid
|
706
|
Graph isomorphism
|
6,080
|
196
|
Start
|
Mid
|
707
|
Edmonds–Karp algorithm
|
6,071
|
195
|
Start
|
Mid
|
708
|
Extended reality
|
6,066
|
195
|
Stub
|
Low
|
709
|
Exception handling
|
6,043
|
194
|
B
|
Mid
|
710
|
Adjacency list
|
6,041
|
194
|
C
|
Mid
|
711
|
Coding theory
|
6,030
|
194
|
C
|
High
|
712
|
Swarm intelligence
|
5,983
|
193
|
C
|
Mid
|
713
|
Data structure alignment
|
5,948
|
191
|
Start
|
Mid
|
714
|
Algebraic data type
|
5,947
|
191
|
Start
|
Low
|
715
|
Linker (computing)
|
5,926
|
191
|
C
|
Mid
|
716
|
Fourth-generation programming language
|
5,915
|
190
|
Start
|
Mid
|
717
|
Bucket sort
|
5,911
|
190
|
C
|
High
|
718
|
Dual linear program
|
5,906
|
190
|
Start
|
Low
|
719
|
Computational chemistry
|
5,903
|
190
|
B
|
High
|
720
|
Fault tolerance
|
5,882
|
189
|
Start
|
High
|
721
|
Wiener filter
|
5,865
|
189
|
Start
|
Low
|
722
|
Parsing expression grammar
|
5,840
|
188
|
B
|
Mid
|
723
|
Metaheuristic
|
5,833
|
188
|
Start
|
Mid
|
724
|
Rob Pike
|
5,803
|
187
|
Start
|
Unknown
|
725
|
Fixed-point combinator
|
5,781
|
186
|
C
|
Mid
|
726
|
Matrix multiplication algorithm
|
5,776
|
186
|
C
|
Mid
|
727
|
Class (computer programming)
|
5,774
|
186
|
Start
|
High
|
728
|
Shellsort
|
5,761
|
185
|
B
|
High
|
729
|
Compilers: Principles, Techniques, and Tools
|
5,732
|
184
|
Stub
|
Low
|
730
|
Multi-agent system
|
5,731
|
184
|
Start
|
Mid
|
731
|
Proxy auto-config
|
5,726
|
184
|
Unknown
|
Unknown
|
732
|
Comparison of integrated development environments
|
5,690
|
183
|
Start
|
Low
|
733
|
Phong reflection model
|
5,648
|
182
|
Unknown
|
Unknown
|
734
|
Timeline of quantum computing and communication
|
5,648
|
182
|
List
|
Mid
|
735
|
Hindley–Milner type system
|
5,644
|
182
|
B
|
High
|
736
|
Bytecode
|
5,640
|
181
|
Unknown
|
Unknown
|
737
|
Rabin–Karp algorithm
|
5,637
|
181
|
C
|
Mid
|
738
|
Generalized additive model
|
5,631
|
181
|
Start
|
Low
|
739
|
Regular language
|
5,626
|
181
|
C
|
High
|
740
|
Beam search
|
5,621
|
181
|
Start
|
Unknown
|
741
|
Pareto front
|
5,606
|
180
|
Start
|
Unknown
|
742
|
Computational thinking
|
5,598
|
180
|
Start
|
Unknown
|
743
|
Formal grammar
|
5,594
|
180
|
C
|
Mid
|
744
|
Process (computing)
|
5,585
|
180
|
C
|
Mid
|
745
|
LL parser
|
5,585
|
180
|
Start
|
High
|
746
|
Consistent hashing
|
5,580
|
180
|
Stub
|
Unknown
|
747
|
String-searching algorithm
|
5,574
|
179
|
Start
|
High
|
748
|
Binary file
|
5,563
|
179
|
C
|
High
|
749
|
Alonzo Church
|
5,561
|
179
|
C
|
Top
|
750
|
Bill Joy
|
5,553
|
179
|
C
|
Unknown
|
751
|
Raft (algorithm)
|
5,542
|
178
|
C
|
Low
|
752
|
Artbreeder
|
5,533
|
178
|
Start
|
Low
|
753
|
Root-finding algorithms
|
5,525
|
178
|
Unknown
|
Unknown
|
754
|
Vorbis
|
5,524
|
178
|
B
|
Low
|
755
|
Generic programming
|
5,503
|
177
|
C
|
High
|
756
|
Arity
|
5,486
|
176
|
C
|
Low
|
757
|
Static single-assignment form
|
5,484
|
176
|
C
|
Mid
|
758
|
Martha E. Pollack
|
5,480
|
176
|
C
|
Low
|
759
|
No free lunch theorem
|
5,469
|
176
|
Start
|
Mid
|
760
|
Hamming weight
|
5,467
|
176
|
C
|
Unknown
|
761
|
Boltzmann machine
|
5,460
|
176
|
C
|
Low
|
762
|
Don Norman
|
5,448
|
175
|
Start
|
Mid
|
763
|
Constraint satisfaction problem
|
5,443
|
175
|
C
|
Mid
|
764
|
Scope (computer science)
|
5,441
|
175
|
C
|
High
|
765
|
Covariance and contravariance (computer science)
|
5,441
|
175
|
Start
|
High
|
766
|
Pumping lemma for regular languages
|
5,431
|
175
|
C
|
Low
|
767
|
Signed zero
|
5,430
|
175
|
C
|
Low
|
768
|
Adversarial machine learning
|
5,429
|
175
|
C
|
Mid
|
769
|
Nonlinear programming
|
5,427
|
175
|
C
|
Mid
|
770
|
Datalog
|
5,414
|
174
|
B
|
Mid
|
771
|
Self-balancing binary search tree
|
5,394
|
174
|
Start
|
Mid
|
772
|
Unique identifier
|
5,351
|
172
|
Start
|
Unknown
|
773
|
Non-English-based programming languages
|
5,336
|
172
|
List
|
Low
|
774
|
C99
|
5,331
|
171
|
C
|
Mid
|
775
|
Analysis of algorithms
|
5,331
|
171
|
C
|
Top
|
776
|
Dartmouth workshop
|
5,288
|
170
|
Start
|
Low
|
777
|
OpenGL Shading Language
|
5,270
|
170
|
Start
|
Low
|
778
|
Computational complexity
|
5,255
|
169
|
C
|
Top
|
779
|
Cryptographically secure pseudorandom number generator
|
5,242
|
169
|
C
|
High
|
780
|
Systems programming
|
5,236
|
168
|
B
|
High
|
781
|
Weak supervision
|
5,236
|
168
|
Unknown
|
Unknown
|
782
|
Huang's law
|
5,234
|
168
|
Start
|
Mid
|
783
|
Deep reinforcement learning
|
5,225
|
168
|
Stub
|
Unknown
|
784
|
Directory (computing)
|
5,224
|
168
|
C
|
Low
|
785
|
CiteSeerX
|
5,213
|
168
|
Start
|
High
|
786
|
World Computer Literacy Day
|
5,205
|
167
|
Stub
|
Unknown
|
787
|
Legacy system
|
5,193
|
167
|
C
|
Unknown
|
788
|
Short-circuit evaluation
|
5,192
|
167
|
Start
|
Mid
|
789
|
Three-valued logic
|
5,177
|
167
|
Start
|
Low
|
790
|
Compare-and-swap
|
5,175
|
166
|
C
|
Low
|
791
|
Best, worst and average case
|
5,164
|
166
|
Start
|
High
|
792
|
Delimiter
|
5,152
|
166
|
C
|
Mid
|
793
|
Doubly linked list
|
5,151
|
166
|
Start
|
High
|
794
|
Reactive programming
|
5,149
|
166
|
Start
|
Mid
|
795
|
Boolean
|
5,145
|
165
|
List
|
Unknown
|
796
|
8-bit color
|
5,141
|
165
|
Start
|
Low
|
797
|
Marching cubes
|
5,134
|
165
|
Start
|
Mid
|
798
|
Interval tree
|
5,131
|
165
|
Start
|
Mid
|
799
|
Edit distance
|
5,110
|
164
|
C
|
Mid
|
800
|
Units of information
|
5,102
|
164
|
C
|
Mid
|
801
|
Computational neuroscience
|
5,087
|
164
|
B
|
Mid
|
802
|
Andrew S. Tanenbaum
|
5,087
|
164
|
C
|
Mid
|
803
|
Attribute-based access control
|
5,075
|
163
|
C
|
Mid
|
804
|
Concurrent computing
|
5,064
|
163
|
C
|
High
|
805
|
Ubiquitous computing
|
5,063
|
163
|
C
|
High
|
806
|
Hash collision
|
5,025
|
162
|
Start
|
Low
|
807
|
Syntactic sugar
|
5,008
|
161
|
C
|
Mid
|
808
|
GrabCAD
|
5,000
|
161
|
Unknown
|
Unknown
|
809
|
JSONP
|
4,996
|
161
|
C
|
Low
|
810
|
Restricted Boltzmann machine
|
4,955
|
159
|
Unknown
|
Unknown
|
811
|
Booth's multiplication algorithm
|
4,950
|
159
|
C
|
Mid
|
812
|
Scott Aaronson
|
4,946
|
159
|
C
|
Mid
|
813
|
Variable (computer science)
|
4,941
|
159
|
Start
|
Top
|
814
|
Satisfiability modulo theories
|
4,936
|
159
|
Start
|
Low
|
815
|
Apriori algorithm
|
4,934
|
159
|
C
|
Mid
|
816
|
Fluent interface
|
4,923
|
158
|
Stub
|
Unknown
|
817
|
Mixin
|
4,909
|
158
|
Start
|
Low
|
818
|
Containerization (computing)
|
4,900
|
158
|
Start
|
Low
|
819
|
Composite pattern
|
4,893
|
157
|
Start
|
Unknown
|
820
|
C string handling
|
4,869
|
157
|
C
|
Low
|
821
|
Consensus (computer science)
|
4,864
|
156
|
Start
|
High
|
822
|
Linear search
|
4,856
|
156
|
Start
|
Mid
|
823
|
Two-phase locking
|
4,836
|
156
|
C
|
High
|
824
|
Fréchet inception distance
|
4,819
|
155
|
C
|
Low
|
825
|
Quickselect
|
4,808
|
155
|
C
|
Low
|
826
|
Elbow method (clustering)
|
4,806
|
155
|
Unknown
|
Unknown
|
827
|
ActionScript
|
4,801
|
154
|
C
|
Low
|
828
|
Webmaster
|
4,801
|
154
|
Start
|
Low
|
829
|
Needleman–Wunsch algorithm
|
4,777
|
154
|
Start
|
Mid
|
830
|
Combinational logic
|
4,769
|
153
|
Start
|
Unknown
|
831
|
Deutsch–Jozsa algorithm
|
4,757
|
153
|
C
|
Mid
|
832
|
Snippet (programming)
|
4,751
|
153
|
Start
|
Low
|
833
|
Digital data
|
4,745
|
153
|
C
|
Low
|
834
|
Mutual exclusion
|
4,742
|
152
|
C
|
Top
|
835
|
Chomsky normal form
|
4,729
|
152
|
Start
|
Mid
|
836
|
Binary-to-text encoding
|
4,728
|
152
|
C
|
Low
|
837
|
Lazy evaluation
|
4,722
|
152
|
C
|
High
|
838
|
LeNet
|
4,722
|
152
|
Start
|
Unknown
|
839
|
Thrashing (computer science)
|
4,711
|
151
|
C
|
Low
|
840
|
General-purpose programming language
|
4,710
|
151
|
Stub
|
Mid
|
841
|
Topological data analysis
|
4,697
|
151
|
C
|
Low
|
842
|
Automated theorem proving
|
4,696
|
151
|
Start
|
Mid
|
843
|
Nondeterministic Turing machine
|
4,696
|
151
|
C
|
High
|
844
|
Formal methods
|
4,689
|
151
|
C
|
Top
|
845
|
Formal verification
|
4,687
|
151
|
Start
|
High
|
846
|
Sandbox (software development)
|
4,675
|
150
|
Start
|
Low
|
847
|
Object-oriented analysis and design
|
4,674
|
150
|
Start
|
High
|
848
|
Metaprogramming
|
4,673
|
150
|
C
|
Mid
|
849
|
Bounding volume hierarchy
|
4,655
|
150
|
Unknown
|
Unknown
|
850
|
Semantics (computer science)
|
4,643
|
149
|
C
|
High
|
851
|
Artificial life
|
4,641
|
149
|
B
|
High
|
852
|
Cyclic permutation
|
4,625
|
149
|
Start
|
Unknown
|
853
|
Approximate string matching
|
4,624
|
149
|
C
|
Mid
|
854
|
Tagged union
|
4,618
|
148
|
Start
|
Low
|
855
|
Enterprise architecture
|
4,617
|
148
|
Start
|
Mid
|
856
|
Code coverage
|
4,612
|
148
|
C
|
Low
|
857
|
Jaro–Winkler distance
|
4,605
|
148
|
Unknown
|
Unknown
|
858
|
Human-centered design
|
4,604
|
148
|
C
|
High
|
859
|
Synchronization (computer science)
|
4,560
|
147
|
B
|
High
|
860
|
Hill climbing
|
4,559
|
147
|
C
|
Mid
|
861
|
Multiclass classification
|
4,557
|
147
|
Start
|
Mid
|
862
|
Q (number format)
|
4,541
|
146
|
Unknown
|
Unknown
|
863
|
Function overloading
|
4,530
|
146
|
Unknown
|
Unknown
|
864
|
Three.js
|
4,506
|
145
|
Unknown
|
Unknown
|
865
|
BCH code
|
4,491
|
144
|
C
|
Unknown
|
866
|
Infinite loop
|
4,485
|
144
|
Start
|
Mid
|
867
|
Programming language theory
|
4,480
|
144
|
Start
|
Top
|
868
|
Standard ML
|
4,478
|
144
|
C
|
Mid
|
869
|
Vapnik–Chervonenkis dimension
|
4,476
|
144
|
Start
|
Mid
|
870
|
Translation studies
|
4,454
|
143
|
Start
|
Mid
|
871
|
Randomized algorithm
|
4,450
|
143
|
C
|
High
|
872
|
Code injection
|
4,447
|
143
|
C
|
High
|
873
|
Privilege escalation
|
4,436
|
143
|
Start
|
Low
|
874
|
Lowest common ancestor
|
4,435
|
143
|
Start
|
Unknown
|
875
|
GPS Exchange Format
|
4,434
|
143
|
C
|
Low
|
876
|
Evaluation strategy
|
4,432
|
142
|
C
|
Top
|
877
|
Cargo cult programming
|
4,422
|
142
|
Start
|
Low
|
878
|
Fold (higher-order function)
|
4,413
|
142
|
Start
|
Mid
|
879
|
Model–view–presenter
|
4,412
|
142
|
C
|
High
|
880
|
Quantum programming
|
4,409
|
142
|
Start
|
Mid
|
881
|
Spatial anti-aliasing
|
4,407
|
142
|
C
|
Mid
|
882
|
Splay tree
|
4,400
|
141
|
C
|
Mid
|
883
|
State pattern
|
4,397
|
141
|
Start
|
Unknown
|
884
|
Substructural type system
|
4,379
|
141
|
Start
|
Unknown
|
885
|
Object (computer science)
|
4,371
|
141
|
Start
|
High
|
886
|
Tree structure
|
4,366
|
140
|
Start
|
High
|
887
|
Gradle
|
4,366
|
140
|
C
|
Low
|
888
|
Abstract factory pattern
|
4,360
|
140
|
Start
|
Mid
|
889
|
Outline of artificial intelligence
|
4,360
|
140
|
Start
|
High
|
890
|
Multimodal learning
|
4,338
|
139
|
C
|
Low
|
891
|
Cyc
|
4,332
|
139
|
C
|
Low
|
892
|
Foreign function interface
|
4,332
|
139
|
Start
|
Low
|
893
|
Goto
|
4,331
|
139
|
C
|
Mid
|
894
|
Machine epsilon
|
4,330
|
139
|
Unknown
|
Unknown
|
895
|
Maya (operating system)
|
4,328
|
139
|
Start
|
Low
|
896
|
Suffix tree
|
4,306
|
138
|
C
|
High
|
897
|
Control-flow graph
|
4,299
|
138
|
C
|
Mid
|
898
|
Web developer
|
4,294
|
138
|
Start
|
Mid
|
899
|
Computational geometry
|
4,294
|
138
|
Start
|
High
|
900
|
Joy Buolamwini
|
4,281
|
138
|
C
|
Low
|
901
|
List of fictional computers
|
4,270
|
137
|
List
|
Low
|
902
|
IEEE 754-1985
|
4,244
|
136
|
C
|
Low
|
903
|
Decision problem
|
4,243
|
136
|
Start
|
High
|
904
|
Artificial Intelligence: A Modern Approach
|
4,229
|
136
|
Start
|
Unknown
|
905
|
Proof assistant
|
4,229
|
136
|
Start
|
High
|
906
|
Parity game
|
4,222
|
136
|
C
|
Low
|
907
|
Brute-force search
|
4,215
|
135
|
Start
|
Mid
|
908
|
Communicating sequential processes
|
4,206
|
135
|
B
|
High
|
909
|
Isolation forest
|
4,200
|
135
|
C
|
Low
|
910
|
Array programming
|
4,194
|
135
|
C
|
Low
|
911
|
Samsung Galaxy Tab A7
|
4,187
|
135
|
Start
|
Low
|
912
|
Web of trust
|
4,179
|
134
|
C
|
Low
|
913
|
Requirements engineering
|
4,175
|
134
|
Start
|
Unknown
|
914
|
Niklaus Wirth
|
4,171
|
134
|
Start
|
High
|
915
|
Hybrid log–gamma
|
4,165
|
134
|
Start
|
Low
|
916
|
Software rot
|
4,158
|
134
|
Unknown
|
Unknown
|
917
|
Side effect (computer science)
|
4,154
|
134
|
C
|
Mid
|
918
|
Banker's algorithm
|
4,153
|
133
|
C
|
Mid
|
919
|
Sycamore processor
|
4,137
|
133
|
Stub
|
Low
|
920
|
Wojciech Zaremba
|
4,133
|
133
|
Start
|
Unknown
|
921
|
Xiaoming Liu
|
4,129
|
133
|
C
|
Unknown
|
922
|
Data governance
|
4,121
|
132
|
C
|
Unknown
|
923
|
Computer algebra
|
4,119
|
132
|
Start
|
Mid
|
924
|
SAT solver
|
4,119
|
132
|
Start
|
Mid
|
925
|
First-class function
|
4,109
|
132
|
C
|
High
|
926
|
V (programming language)
|
4,106
|
132
|
Unknown
|
Unknown
|
927
|
Chain-of-responsibility pattern
|
4,104
|
132
|
Stub
|
Unknown
|
928
|
Loose coupling
|
4,103
|
132
|
Start
|
High
|
929
|
A Mathematical Theory of Communication
|
4,101
|
132
|
Start
|
High
|
930
|
Partition problem
|
4,081
|
131
|
Unknown
|
Unknown
|
931
|
Knowledge distillation
|
4,080
|
131
|
C
|
Low
|
932
|
Church encoding
|
4,065
|
131
|
B
|
Mid
|
933
|
Semantic network
|
4,054
|
130
|
Start
|
Low
|
934
|
List of computer algebra systems
|
4,053
|
130
|
List
|
Low
|
935
|
Rule 110
|
4,050
|
130
|
Start
|
Mid
|
936
|
Duff's device
|
4,045
|
130
|
C
|
Low
|
937
|
Stuart J. Russell
|
4,044
|
130
|
Stub
|
Unknown
|
938
|
Jaan Tallinn
|
4,041
|
130
|
C
|
Low
|
939
|
Smith–Waterman algorithm
|
4,038
|
130
|
B
|
Mid
|
940
|
Cohesion (computer science)
|
4,028
|
129
|
Unknown
|
Unknown
|
941
|
User-centered design
|
4,026
|
129
|
Start
|
Mid
|
942
|
CalyxOS
|
4,013
|
129
|
C
|
Low
|
943
|
Mistral AI
|
4,009
|
129
|
Stub
|
Low
|
944
|
Distributed operating system
|
3,993
|
128
|
C
|
Mid
|
945
|
Stack machine
|
3,992
|
128
|
C
|
Mid
|
946
|
J (programming language)
|
3,985
|
128
|
Start
|
Low
|
947
|
Dependent type
|
3,963
|
127
|
Start
|
High
|
948
|
Vendor lock-in
|
3,962
|
127
|
C
|
Mid
|
949
|
Matrix factorization (recommender systems)
|
3,957
|
127
|
C
|
Low
|
950
|
Eugene Kaspersky
|
3,952
|
127
|
GA
|
Low
|
951
|
Object database
|
3,952
|
127
|
Start
|
High
|
952
|
Physics engine
|
3,949
|
127
|
Unknown
|
Unknown
|
953
|
Learning rate
|
3,947
|
127
|
Unknown
|
Unknown
|
954
|
Damerau–Levenshtein distance
|
3,919
|
126
|
Start
|
Low
|
955
|
Challenge–response authentication
|
3,915
|
126
|
Start
|
Low
|
956
|
Inverted index
|
3,915
|
126
|
Start
|
Mid
|
957
|
Coq (software)
|
3,906
|
126
|
Start
|
Mid
|
958
|
Garlin Gilchrist
|
3,905
|
125
|
Start
|
Low
|
959
|
Kleene star
|
3,903
|
125
|
Start
|
High
|
960
|
Pattern matching
|
3,891
|
125
|
C
|
Mid
|
961
|
Barbara Liskov
|
3,889
|
125
|
C
|
High
|
962
|
Perfect hash function
|
3,884
|
125
|
C
|
Unknown
|
963
|
Computational complexity of mathematical operations
|
3,882
|
125
|
B
|
Mid
|
964
|
Data access object
|
3,880
|
125
|
Start
|
Unknown
|
965
|
Elvis operator
|
3,880
|
125
|
Unknown
|
Unknown
|
966
|
Model of computation
|
3,875
|
125
|
Start
|
Mid
|
967
|
Database design
|
3,863
|
124
|
C
|
High
|
968
|
Operator overloading
|
3,858
|
124
|
C
|
Mid
|
969
|
Kahan summation algorithm
|
3,850
|
124
|
Start
|
Unknown
|
970
|
Metasyntactic variable
|
3,849
|
124
|
Unknown
|
Unknown
|
971
|
Complexity class
|
3,848
|
124
|
C
|
High
|
972
|
CYK algorithm
|
3,845
|
124
|
C
|
Mid
|
973
|
Longest palindromic substring
|
3,845
|
124
|
C
|
Low
|
974
|
Calling convention
|
3,832
|
123
|
C
|
High
|
975
|
Subnormal number
|
3,817
|
123
|
Unknown
|
Unknown
|
976
|
Continuation-passing style
|
3,813
|
123
|
Start
|
Mid
|
977
|
Program optimization
|
3,806
|
122
|
B
|
High
|
978
|
Oracle machine
|
3,793
|
122
|
C
|
Mid
|
979
|
Minimum-cost flow problem
|
3,792
|
122
|
Start
|
Mid
|
980
|
Coreboot
|
3,791
|
122
|
Unknown
|
Unknown
|
981
|
X.25
|
3,783
|
122
|
Unknown
|
Unknown
|
982
|
Computer performance
|
3,778
|
121
|
Start
|
Mid
|
983
|
Outline of computer science
|
3,777
|
121
|
Start
|
Mid
|
984
|
Algorithmic bias
|
3,768
|
121
|
GA
|
Top
|
985
|
Thread pool
|
3,763
|
121
|
Unknown
|
Unknown
|
986
|
Sanjay Ghemawat
|
3,754
|
121
|
Start
|
Mid
|
987
|
Proxy pattern
|
3,741
|
120
|
Start
|
Mid
|
988
|
Treemapping
|
3,702
|
119
|
C
|
Mid
|
989
|
Monte Carlo algorithm
|
3,702
|
119
|
C
|
Mid
|
990
|
Distributed version control
|
3,701
|
119
|
Start
|
Mid
|
991
|
Iterative deepening depth-first search
|
3,692
|
119
|
C
|
Low
|
992
|
Shannon's source coding theorem
|
3,674
|
118
|
C
|
Low
|
993
|
Dynamic array
|
3,670
|
118
|
C
|
Mid
|
994
|
Graph partition
|
3,666
|
118
|
C
|
Mid
|
995
|
Message passing
|
3,661
|
118
|
Start
|
High
|
996
|
Kent Beck
|
3,653
|
117
|
Start
|
Mid
|
997
|
Parametric design
|
3,650
|
117
|
Start
|
Unknown
|
998
|
Boyer–Moore majority vote algorithm
|
3,637
|
117
|
Unknown
|
Unknown
|
999
|
Space complexity
|
3,636
|
117
|
Start
|
Mid
|
1000
|
Codewars
|
3,631
|
117
|
Stub
|
Low
|