Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
Artificial intelligence
|
527,599
|
17,019
|
B
|
Top
|
2
|
Nvidia
|
378,515
|
12,210
|
B
|
Mid
|
3
|
OpenAI
|
330,445
|
10,659
|
C
|
Mid
|
4
|
C (programming language)
|
312,746
|
10,088
|
C
|
High
|
5
|
Sergey Brin
|
305,767
|
9,863
|
GA
|
Mid
|
6
|
Computer
|
200,017
|
6,452
|
C
|
Top
|
7
|
Python (programming language)
|
192,562
|
6,211
|
C
|
High
|
8
|
Lex Fridman
|
184,280
|
5,944
|
C
|
Low
|
9
|
Lenna
|
162,853
|
5,253
|
C
|
Unknown
|
10
|
HTML
|
162,673
|
5,247
|
B
|
High
|
11
|
R (programming language)
|
156,845
|
5,059
|
B
|
High
|
12
|
IBM
|
156,120
|
5,036
|
B
|
Mid
|
13
|
Larry Page
|
150,287
|
4,847
|
B
|
High
|
14
|
Google Search
|
149,688
|
4,828
|
C
|
High
|
15
|
Scratch (programming language)
|
145,606
|
4,696
|
C
|
Mid
|
16
|
Machine learning
|
138,758
|
4,476
|
B
|
Top
|
17
|
Cloud computing
|
117,650
|
3,795
|
C
|
Top
|
18
|
Artificial general intelligence
|
110,805
|
3,574
|
B
|
Mid
|
19
|
Video game
|
110,603
|
3,567
|
B
|
Mid
|
20
|
Effective accelerationism
|
110,211
|
3,555
|
C
|
Unknown
|
21
|
C++
|
104,791
|
3,380
|
B
|
High
|
22
|
JavaScript
|
104,612
|
3,374
|
B
|
High
|
23
|
Katherine Johnson
|
103,394
|
3,335
|
GA
|
High
|
24
|
Rust (programming language)
|
98,418
|
3,174
|
GA
|
High
|
25
|
Generative artificial intelligence
|
95,485
|
3,080
|
B
|
Mid
|
26
|
Quantum computing
|
93,545
|
3,017
|
B
|
High
|
27
|
Go (programming language)
|
93,181
|
3,005
|
B
|
High
|
28
|
JSON
|
87,483
|
2,822
|
B
|
High
|
29
|
Blockchain
|
87,468
|
2,821
|
B
|
Top
|
30
|
CSS
|
86,818
|
2,800
|
B
|
High
|
31
|
Stable Diffusion
|
86,620
|
2,794
|
C
|
Low
|
32
|
Regular expression
|
86,307
|
2,784
|
B
|
Top
|
33
|
Information
|
84,941
|
2,740
|
C
|
Top
|
34
|
Internet of things
|
83,360
|
2,689
|
B
|
Top
|
35
|
Computer science
|
81,327
|
2,623
|
C
|
Top
|
36
|
Information technology
|
79,364
|
2,560
|
C
|
Top
|
37
|
Software
|
77,051
|
2,485
|
C
|
Top
|
38
|
Dijkstra's algorithm
|
75,717
|
2,442
|
C
|
Top
|
39
|
Conway's Game of Life
|
75,598
|
2,438
|
B
|
High
|
40
|
Neural network (machine learning)
|
72,798
|
2,348
|
C
|
Top
|
41
|
Algorithm
|
72,193
|
2,328
|
C
|
Top
|
42
|
Ilya Sutskever
|
72,127
|
2,326
|
Start
|
Unknown
|
43
|
Tim Berners-Lee
|
71,301
|
2,300
|
C
|
Top
|
44
|
Turing test
|
70,833
|
2,284
|
B
|
Top
|
45
|
Big O notation
|
66,841
|
2,156
|
B
|
Top
|
46
|
SQL
|
66,289
|
2,138
|
C
|
Top
|
47
|
Object-oriented programming
|
65,766
|
2,121
|
B
|
Top
|
48
|
UTF-8
|
64,617
|
2,084
|
B
|
Mid
|
49
|
Monte Carlo method
|
64,615
|
2,084
|
B
|
High
|
50
|
Assembly language
|
64,271
|
2,073
|
B
|
High
|
51
|
Programming language
|
62,917
|
2,029
|
C
|
Top
|
52
|
Google DeepMind
|
59,061
|
1,905
|
C
|
Mid
|
53
|
Node.js
|
57,901
|
1,867
|
C
|
High
|
54
|
A* search algorithm
|
57,383
|
1,851
|
B
|
Mid
|
55
|
Database
|
56,581
|
1,825
|
C
|
Top
|
56
|
Virtual reality
|
55,171
|
1,779
|
B
|
High
|
57
|
Robot
|
55,134
|
1,778
|
B
|
Top
|
58
|
Deep learning
|
54,826
|
1,768
|
C
|
Top
|
59
|
Diffie–Hellman key exchange
|
54,504
|
1,758
|
C
|
Mid
|
60
|
Computer hardware
|
53,431
|
1,723
|
C
|
Mid
|
61
|
Augmented reality
|
53,165
|
1,715
|
B
|
High
|
62
|
Millennium Prize Problems
|
52,496
|
1,693
|
C
|
Mid
|
63
|
K-means clustering
|
51,659
|
1,666
|
C
|
Mid
|
64
|
Grace Hopper
|
51,397
|
1,657
|
B
|
Top
|
65
|
Agile software development
|
50,334
|
1,623
|
B
|
High
|
66
|
Prisoner's dilemma
|
50,045
|
1,614
|
C
|
High
|
67
|
Generative pre-trained transformer
|
49,605
|
1,600
|
B
|
Mid
|
68
|
Hash function
|
49,306
|
1,590
|
C
|
Top
|
69
|
Support vector machine
|
49,148
|
1,585
|
C
|
Mid
|
70
|
Travelling salesman problem
|
48,612
|
1,568
|
B
|
High
|
71
|
Turing machine
|
48,488
|
1,564
|
B
|
Top
|
72
|
Unix
|
48,475
|
1,563
|
B
|
High
|
73
|
Fast Fourier transform
|
48,406
|
1,561
|
B
|
High
|
74
|
Secure Shell
|
48,305
|
1,558
|
C
|
Low
|
75
|
Cryptography
|
48,122
|
1,552
|
C
|
Top
|
76
|
Digital Revolution
|
47,464
|
1,531
|
Redirect
|
NA
|
77
|
PHP
|
47,073
|
1,518
|
C
|
High
|
78
|
Web colors
|
47,066
|
1,518
|
C
|
Mid
|
79
|
P versus NP problem
|
46,543
|
1,501
|
B
|
Top
|
80
|
List of programming languages
|
46,328
|
1,494
|
List
|
High
|
81
|
C Sharp (programming language)
|
45,857
|
1,479
|
B
|
High
|
82
|
Enterprise resource planning
|
45,623
|
1,471
|
B
|
Mid
|
83
|
Heuristic
|
45,461
|
1,466
|
C
|
Mid
|
84
|
Natural language processing
|
44,461
|
1,434
|
C
|
Top
|
85
|
Two's complement
|
44,366
|
1,431
|
C
|
High
|
86
|
XML
|
43,480
|
1,402
|
B
|
High
|
87
|
DevOps
|
43,340
|
1,398
|
C
|
Low
|
88
|
Quicksort
|
43,005
|
1,387
|
B
|
Top
|
89
|
Order of operations
|
42,942
|
1,385
|
B
|
Mid
|
90
|
Computer programming
|
42,178
|
1,360
|
C
|
Top
|
91
|
Software engineering
|
41,733
|
1,346
|
C
|
Top
|
92
|
TypeScript
|
41,660
|
1,343
|
C
|
Low
|
93
|
Programmer
|
41,500
|
1,338
|
C
|
Mid
|
94
|
Scrum (software development)
|
41,289
|
1,331
|
C
|
High
|
95
|
IEEE 754
|
40,467
|
1,305
|
C
|
High
|
96
|
Recursion
|
40,433
|
1,304
|
C
|
Mid
|
97
|
Kernel (operating system)
|
40,215
|
1,297
|
B
|
High
|
98
|
Floating-point arithmetic
|
39,872
|
1,286
|
B
|
Top
|
99
|
Free and open-source software
|
39,531
|
1,275
|
C
|
Top
|
100
|
Model–view–controller
|
39,431
|
1,271
|
Start
|
Mid
|
101
|
Geoffrey Hinton
|
39,154
|
1,263
|
C
|
Low
|
102
|
Cosine similarity
|
39,113
|
1,261
|
C
|
Low
|
103
|
Chatbot
|
39,059
|
1,259
|
C
|
Low
|
104
|
Finite-state machine
|
38,773
|
1,250
|
B
|
Top
|
105
|
Boolean algebra
|
38,723
|
1,249
|
C
|
High
|
106
|
Graph theory
|
38,365
|
1,237
|
B
|
High
|
107
|
Binary search algorithm
|
38,332
|
1,236
|
FA
|
High
|
108
|
Cognition
|
38,295
|
1,235
|
C
|
Low
|
109
|
Open-source software
|
37,714
|
1,216
|
C
|
High
|
110
|
Fortran
|
37,328
|
1,204
|
C
|
Mid
|
111
|
RGB color model
|
37,075
|
1,195
|
B
|
Low
|
112
|
Data science
|
36,417
|
1,174
|
C
|
High
|
113
|
Softmax function
|
36,106
|
1,164
|
C
|
High
|
114
|
Tower of Hanoi
|
36,036
|
1,162
|
C
|
Mid
|
115
|
Data analysis
|
35,984
|
1,160
|
B
|
High
|
116
|
Sorting algorithm
|
35,795
|
1,154
|
C
|
Top
|
117
|
High Efficiency Video Coding
|
35,734
|
1,152
|
B
|
Low
|
118
|
Mistral AI
|
35,407
|
1,142
|
Stub
|
Low
|
119
|
Hash table
|
35,390
|
1,141
|
B
|
High
|
120
|
Time complexity
|
35,129
|
1,133
|
B
|
High
|
121
|
COBOL
|
34,936
|
1,126
|
GA
|
High
|
122
|
Levenshtein distance
|
34,802
|
1,122
|
C
|
Mid
|
123
|
Lua (programming language)
|
34,694
|
1,119
|
C
|
Mid
|
124
|
Merge sort
|
34,469
|
1,111
|
C
|
High
|
125
|
Backpropagation
|
34,056
|
1,098
|
Start
|
Unknown
|
126
|
Unified Modeling Language
|
33,997
|
1,096
|
C
|
High
|
127
|
Institute of Electrical and Electronics Engineers
|
32,869
|
1,060
|
B
|
Top
|
128
|
Lisp (programming language)
|
32,853
|
1,059
|
B
|
High
|
129
|
Bitwise operation
|
32,757
|
1,056
|
C
|
High
|
130
|
Bash (Unix shell)
|
32,741
|
1,056
|
B
|
Mid
|
131
|
Self-driving car
|
32,713
|
1,055
|
B
|
High
|
132
|
MATLAB
|
32,651
|
1,053
|
B
|
High
|
133
|
Brainfuck
|
32,590
|
1,051
|
C
|
Low
|
134
|
BERT (language model)
|
32,270
|
1,040
|
Start
|
Unknown
|
135
|
De Morgan's laws
|
32,046
|
1,033
|
Start
|
High
|
136
|
Abstraction
|
31,802
|
1,025
|
C
|
High
|
137
|
Linear programming
|
31,528
|
1,017
|
B
|
High
|
138
|
Computer program
|
31,472
|
1,015
|
C
|
Top
|
139
|
Single-precision floating-point format
|
31,346
|
1,011
|
C
|
Unknown
|
140
|
In-place algorithm
|
31,180
|
1,005
|
Start
|
High
|
141
|
Compiler
|
31,071
|
1,002
|
C
|
Top
|
142
|
Depth-first search
|
30,911
|
997
|
C
|
Top
|
143
|
Directed acyclic graph
|
30,746
|
991
|
GA
|
High
|
144
|
Software testing
|
30,695
|
990
|
C
|
Top
|
145
|
Fast inverse square root
|
30,636
|
988
|
GA
|
Low
|
146
|
Big data
|
30,349
|
979
|
B
|
High
|
147
|
Optical character recognition
|
30,054
|
969
|
C
|
Mid
|
148
|
Binary search tree
|
30,035
|
968
|
GA
|
High
|
149
|
Perl
|
29,944
|
965
|
B
|
High
|
150
|
Software design pattern
|
29,888
|
964
|
C
|
High
|
151
|
Malware
|
29,800
|
961
|
C
|
High
|
152
|
Floor and ceiling functions
|
29,785
|
960
|
B
|
Mid
|
153
|
Knapsack problem
|
29,618
|
955
|
B
|
Mid
|
154
|
BASIC
|
29,556
|
953
|
C
|
Mid
|
155
|
Robotics
|
29,550
|
953
|
B
|
Top
|
156
|
Breadth-first search
|
29,383
|
947
|
Start
|
Top
|
157
|
Functional programming
|
29,322
|
945
|
B
|
Top
|
158
|
Advanced Video Coding
|
29,284
|
944
|
C
|
Low
|
159
|
Quantum logic gate
|
28,887
|
931
|
C
|
High
|
160
|
Claude Shannon
|
28,834
|
930
|
C
|
High
|
161
|
Bioinformatics
|
28,490
|
919
|
C
|
High
|
162
|
W3Schools
|
28,241
|
911
|
Stub
|
Low
|
163
|
First-order logic
|
28,071
|
905
|
B
|
High
|
164
|
Insertion sort
|
27,945
|
901
|
B
|
High
|
165
|
Heap (data structure)
|
27,938
|
901
|
C
|
High
|
166
|
Dynamic programming
|
27,877
|
899
|
B
|
Top
|
167
|
Discrete mathematics
|
27,813
|
897
|
B
|
Top
|
168
|
Cybernetics
|
27,749
|
895
|
C
|
Mid
|
169
|
Huffman coding
|
27,520
|
887
|
C
|
High
|
170
|
Information theory
|
27,409
|
884
|
B
|
Top
|
171
|
Qubit
|
27,228
|
878
|
C
|
High
|
172
|
Lambda calculus
|
27,148
|
875
|
B
|
High
|
173
|
Natalie Enright Jerger
|
27,048
|
872
|
Start
|
Unknown
|
174
|
Exclusive or
|
26,582
|
857
|
C
|
Mid
|
175
|
Turing completeness
|
26,270
|
847
|
C
|
Top
|
176
|
Dennis Ritchie
|
26,216
|
845
|
Start
|
High
|
177
|
Mathematical optimization
|
26,074
|
841
|
B
|
High
|
178
|
Stochastic gradient descent
|
26,059
|
840
|
Start
|
Mid
|
179
|
Greg Brockman
|
25,817
|
832
|
C
|
Low
|
180
|
Whitespace character
|
25,781
|
831
|
B
|
Mid
|
181
|
Data structure
|
25,658
|
827
|
C
|
Top
|
182
|
Relational database
|
25,649
|
827
|
C
|
Top
|
183
|
Artificial intelligence art
|
25,637
|
827
|
C
|
Low
|
184
|
HTML5
|
25,563
|
824
|
B
|
High
|
185
|
Bubble sort
|
25,536
|
823
|
B
|
High
|
186
|
B-tree
|
25,420
|
820
|
C
|
High
|
187
|
Sridhar Ramaswamy
|
25,355
|
817
|
Start
|
Low
|
188
|
Usage share of operating systems
|
25,346
|
817
|
B
|
Mid
|
189
|
Smart city
|
25,076
|
808
|
C
|
Mid
|
190
|
Ada (programming language)
|
25,011
|
806
|
C
|
High
|
191
|
Attention (machine learning)
|
24,748
|
798
|
Start
|
Unknown
|
192
|
NP-hardness
|
24,663
|
795
|
C
|
High
|
193
|
Tensor Processing Unit
|
24,416
|
787
|
C
|
Mid
|
194
|
Vector graphics
|
24,386
|
786
|
Start
|
High
|
195
|
Ray tracing (graphics)
|
24,377
|
786
|
C
|
Mid
|
196
|
Sieve of Eratosthenes
|
24,357
|
785
|
C
|
Mid
|
197
|
Source code
|
24,199
|
780
|
C
|
High
|
198
|
Stack (abstract data type)
|
24,170
|
779
|
C
|
Top
|
199
|
Red–black tree
|
24,169
|
779
|
C
|
High
|
200
|
Hallucination (artificial intelligence)
|
24,139
|
778
|
C
|
Low
|
201
|
AV1
|
24,085
|
776
|
B
|
Low
|
202
|
Halting problem
|
23,981
|
773
|
B
|
Top
|
203
|
Trie
|
23,925
|
771
|
GA
|
High
|
204
|
Dan Clancy
|
23,891
|
770
|
C
|
Unknown
|
205
|
Shor's algorithm
|
23,818
|
768
|
C
|
Mid
|
206
|
Computer vision
|
23,691
|
764
|
C
|
Top
|
207
|
Client–server model
|
23,583
|
760
|
C
|
High
|
208
|
Don't repeat yourself
|
23,568
|
760
|
Start
|
Mid
|
209
|
POSIX
|
23,563
|
760
|
B
|
Mid
|
210
|
Computer architecture
|
23,535
|
759
|
C
|
Top
|
211
|
NP-completeness
|
23,148
|
746
|
C
|
Top
|
212
|
Genetic algorithm
|
22,977
|
741
|
C
|
High
|
213
|
Cluster analysis
|
22,847
|
737
|
C
|
High
|
214
|
Donald Knuth
|
22,657
|
730
|
B
|
Top
|
215
|
NoSQL
|
22,572
|
728
|
C
|
High
|
216
|
Ruby (programming language)
|
22,571
|
728
|
B
|
High
|
217
|
Activation function
|
22,540
|
727
|
Start
|
Mid
|
218
|
Existential risk from artificial general intelligence
|
22,504
|
725
|
B
|
Mid
|
219
|
Tf–idf
|
22,475
|
725
|
C
|
Low
|
220
|
AVL tree
|
22,064
|
711
|
C
|
High
|
221
|
Computer engineering
|
21,770
|
702
|
C
|
Top
|
222
|
AArch64
|
21,664
|
698
|
C
|
Low
|
223
|
Topological sorting
|
21,634
|
697
|
C
|
High
|
224
|
AlphaGo
|
21,541
|
694
|
C
|
High
|
225
|
Data mining
|
21,480
|
692
|
B
|
High
|
226
|
Graph (discrete mathematics)
|
21,414
|
690
|
B
|
High
|
227
|
Cross-site request forgery
|
21,390
|
690
|
C
|
High
|
228
|
Markov chain Monte Carlo
|
21,368
|
689
|
C
|
High
|
229
|
Pareto efficiency
|
21,216
|
684
|
C
|
Mid
|
230
|
Cache replacement policies
|
21,201
|
683
|
C
|
Mid
|
231
|
Code
|
21,146
|
682
|
C
|
High
|
232
|
Snake case
|
21,081
|
680
|
Start
|
Low
|
233
|
Class diagram
|
20,805
|
671
|
Start
|
Low
|
234
|
Magic number (programming)
|
20,729
|
668
|
C
|
Mid
|
235
|
Programming paradigm
|
20,720
|
668
|
C
|
Mid
|
236
|
Feedforward neural network
|
20,675
|
666
|
Unknown
|
Unknown
|
237
|
Information security
|
20,674
|
666
|
B
|
Top
|
238
|
Haskell
|
20,493
|
661
|
B
|
Mid
|
239
|
Data type
|
20,481
|
660
|
C
|
Top
|
240
|
Turing Award
|
20,422
|
658
|
List
|
Top
|
241
|
Automaton
|
20,381
|
657
|
C
|
High
|
242
|
Humanoid robot
|
20,345
|
656
|
C
|
High
|
243
|
Operations research
|
20,277
|
654
|
C
|
High
|
244
|
Recursion (computer science)
|
19,996
|
645
|
C
|
Top
|
245
|
Variational autoencoder
|
19,995
|
645
|
C
|
Low
|
246
|
Applications of artificial intelligence
|
19,961
|
643
|
C
|
Low
|
247
|
Tree (data structure)
|
19,849
|
640
|
C
|
High
|
248
|
Hackathon
|
19,779
|
638
|
Start
|
Mid
|
249
|
Amdahl's law
|
19,596
|
632
|
C
|
High
|
250
|
Shortest path problem
|
19,572
|
631
|
C
|
High
|
251
|
Semaphore (programming)
|
19,489
|
628
|
Start
|
High
|
252
|
Binary tree
|
19,455
|
627
|
B
|
Top
|
253
|
Multiplication sign
|
19,421
|
626
|
C
|
Low
|
254
|
Erlang (programming language)
|
19,410
|
626
|
B
|
Mid
|
255
|
Machine code
|
19,353
|
624
|
C
|
Unknown
|
256
|
Data warehouse
|
19,314
|
623
|
Start
|
High
|
257
|
Array (data structure)
|
19,269
|
621
|
C
|
Top
|
258
|
Singleton pattern
|
19,223
|
620
|
C
|
Mid
|
259
|
Liskov substitution principle
|
19,178
|
618
|
Start
|
Mid
|
260
|
Master theorem (analysis of algorithms)
|
19,131
|
617
|
C
|
High
|
261
|
Visual Basic (.NET)
|
19,112
|
616
|
C
|
Mid
|
262
|
Extract, transform, load
|
19,110
|
616
|
Start
|
High
|
263
|
Monad (functional programming)
|
19,037
|
614
|
B
|
Mid
|
264
|
Foundation model
|
18,939
|
610
|
Unknown
|
Unknown
|
265
|
Software development
|
18,845
|
607
|
C
|
Top
|
266
|
Neural network
|
18,778
|
605
|
C
|
Low
|
267
|
Ajax (programming)
|
18,685
|
602
|
Start
|
High
|
268
|
Bias–variance tradeoff
|
18,679
|
602
|
Start
|
Mid
|
269
|
Human–computer interaction
|
18,661
|
601
|
C
|
Top
|
270
|
Free software
|
18,639
|
601
|
C
|
High
|
271
|
Information technology in India
|
18,618
|
600
|
C
|
Mid
|
272
|
Cognitive science
|
18,613
|
600
|
C
|
High
|
273
|
Ken Thompson
|
18,596
|
599
|
B
|
High
|
274
|
High-level programming language
|
18,545
|
598
|
Start
|
High
|
275
|
Real-time operating system
|
18,506
|
596
|
Start
|
Mid
|
276
|
Memetics
|
18,434
|
594
|
Start
|
Unknown
|
277
|
Distributed computing
|
18,395
|
593
|
B
|
Top
|
278
|
ECMAScript
|
18,385
|
593
|
C
|
Mid
|
279
|
Cellular automaton
|
18,239
|
588
|
B
|
High
|
280
|
Deep Blue (chess computer)
|
18,231
|
588
|
GA
|
Mid
|
281
|
Julia (programming language)
|
18,178
|
586
|
B
|
High
|
282
|
Jaccard index
|
18,124
|
584
|
C
|
Mid
|
283
|
Computational fluid dynamics
|
18,112
|
584
|
C
|
High
|
284
|
Adjacency matrix
|
18,110
|
584
|
C
|
Mid
|
285
|
Boolean satisfiability problem
|
18,089
|
583
|
C
|
Top
|
286
|
Business intelligence
|
18,002
|
580
|
Start
|
High
|
287
|
Scala (programming language)
|
17,970
|
579
|
B
|
High
|
288
|
Edsger W. Dijkstra
|
17,844
|
575
|
B
|
Top
|
289
|
Greedy algorithm
|
17,806
|
574
|
C
|
High
|
290
|
Scripting language
|
17,757
|
572
|
C
|
Mid
|
291
|
Type system
|
17,743
|
572
|
B
|
High
|
292
|
Minimum spanning tree
|
17,642
|
569
|
C
|
High
|
293
|
Vint Cerf
|
17,608
|
568
|
Start
|
Mid
|
294
|
Unsupervised learning
|
17,489
|
564
|
C
|
Mid
|
295
|
Prolog
|
17,398
|
561
|
B
|
Mid
|
296
|
Expert system
|
17,393
|
561
|
Start
|
Mid
|
297
|
Ontology (information science)
|
17,347
|
559
|
C
|
High
|
298
|
Web development
|
17,306
|
558
|
Start
|
Mid
|
299
|
Race condition
|
17,302
|
558
|
C
|
Top
|
300
|
Autoencoder
|
17,287
|
557
|
C
|
High
|
301
|
Residual neural network
|
17,227
|
555
|
Start
|
Low
|
302
|
IBM Watson
|
17,178
|
554
|
C
|
Mid
|
303
|
Expectation–maximization algorithm
|
17,159
|
553
|
C
|
High
|
304
|
Backus–Naur form
|
17,115
|
552
|
Start
|
Unknown
|
305
|
Automata theory
|
17,094
|
551
|
C
|
Top
|
306
|
C--
|
17,068
|
550
|
Start
|
Low
|
307
|
Unit testing
|
17,027
|
549
|
C
|
Mid
|
308
|
List of programming languages by type
|
16,982
|
547
|
List
|
High
|
309
|
ISO/IEC 8859-1
|
16,973
|
547
|
Start
|
Unknown
|
310
|
Mobile device
|
16,903
|
545
|
Start
|
Low
|
311
|
Category theory
|
16,841
|
543
|
B
|
High
|
312
|
Tree traversal
|
16,826
|
542
|
C
|
High
|
313
|
Simplex algorithm
|
16,810
|
542
|
C
|
High
|
314
|
Half-precision floating-point format
|
16,755
|
540
|
C
|
Unknown
|
315
|
Rounding
|
16,713
|
539
|
C
|
Low
|
316
|
Huang's law
|
16,683
|
538
|
Start
|
Mid
|
317
|
String (computer science)
|
16,680
|
538
|
Start
|
High
|
318
|
Pseudorandom number generator
|
16,673
|
537
|
C
|
Top
|
319
|
Behavior-driven development
|
16,643
|
536
|
B
|
Low
|
320
|
Kernel (image processing)
|
16,630
|
536
|
Unknown
|
High
|
321
|
Linked list
|
16,562
|
534
|
C
|
Top
|
322
|
Computer graphics
|
16,537
|
533
|
B
|
Top
|
323
|
Garbage collection (computer science)
|
16,427
|
529
|
C
|
High
|
324
|
Imperative programming
|
16,342
|
527
|
C
|
Top
|
325
|
Iris flower data set
|
16,298
|
525
|
Start
|
Mid
|
326
|
Composition over inheritance
|
16,212
|
522
|
C
|
Low
|
327
|
AI accelerator
|
16,167
|
521
|
B
|
Low
|
328
|
Parallel computing
|
16,151
|
521
|
FA
|
Top
|
329
|
Factory method pattern
|
15,988
|
515
|
Start
|
Mid
|
330
|
NP (complexity)
|
15,935
|
514
|
C
|
High
|
331
|
Monte Carlo tree search
|
15,801
|
509
|
C
|
Mid
|
332
|
Business Process Model and Notation
|
15,789
|
509
|
Start
|
Mid
|
333
|
AlphaFold
|
15,757
|
508
|
C
|
Low
|
334
|
HTML element
|
15,754
|
508
|
C
|
Mid
|
335
|
Reed–Solomon error correction
|
15,749
|
508
|
C
|
Mid
|
336
|
History of Python
|
15,725
|
507
|
C
|
Low
|
337
|
Numerical analysis
|
15,603
|
503
|
B
|
Top
|
338
|
Checksum
|
15,560
|
501
|
Start
|
Mid
|
339
|
Computing
|
15,549
|
501
|
B
|
High
|
340
|
Markup language
|
15,544
|
501
|
C
|
High
|
341
|
Luis von Ahn
|
15,534
|
501
|
Start
|
Low
|
342
|
Marvin Minsky
|
15,498
|
499
|
C
|
High
|
343
|
Deadlock
|
15,495
|
499
|
C
|
High
|
344
|
Sobel operator
|
15,450
|
498
|
C
|
Low
|
345
|
Data-flow diagram
|
15,394
|
496
|
Start
|
Mid
|
346
|
Esoteric programming language
|
15,375
|
495
|
Start
|
High
|
347
|
Pseudocode
|
15,331
|
494
|
C
|
High
|
348
|
Hamming distance
|
15,303
|
493
|
Start
|
High
|
349
|
Dependency inversion principle
|
15,274
|
492
|
Start
|
Low
|
350
|
Bellman–Ford algorithm
|
15,256
|
492
|
C
|
Mid
|
351
|
Brute-force attack
|
15,242
|
491
|
C
|
High
|
352
|
Software bug
|
15,226
|
491
|
B
|
High
|
353
|
Moravec's paradox
|
15,203
|
490
|
Start
|
Mid
|
354
|
Version control
|
15,173
|
489
|
C
|
High
|
355
|
Bresenham's line algorithm
|
15,102
|
487
|
C
|
Mid
|
356
|
Context-free grammar
|
15,067
|
486
|
B
|
Top
|
357
|
Color depth
|
14,958
|
482
|
C
|
Low
|
358
|
Hamming code
|
14,921
|
481
|
C
|
High
|
359
|
Parsing
|
14,890
|
480
|
Start
|
Top
|
360
|
Grayscale
|
14,889
|
480
|
Start
|
Mid
|
361
|
Observer pattern
|
14,774
|
476
|
Start
|
Mid
|
362
|
Sparse matrix
|
14,632
|
472
|
C
|
Mid
|
363
|
Cyclomatic complexity
|
14,582
|
470
|
C
|
Low
|
364
|
Heapsort
|
14,576
|
470
|
B
|
High
|
365
|
Zero-shot learning
|
14,446
|
466
|
C
|
Mid
|
366
|
List of datasets for machine-learning research
|
14,425
|
465
|
List
|
Mid
|
367
|
AVIF
|
14,401
|
464
|
C
|
Low
|
368
|
Function (computer programming)
|
14,337
|
462
|
C
|
High
|
369
|
DBSCAN
|
14,328
|
462
|
C
|
Mid
|
370
|
Formal language
|
14,279
|
460
|
C
|
High
|
371
|
Raster graphics
|
14,266
|
460
|
C
|
Mid
|
372
|
Gladys West
|
14,256
|
459
|
B
|
Low
|
373
|
Selection sort
|
14,229
|
459
|
C
|
High
|
374
|
Sankey diagram
|
14,221
|
458
|
C
|
Low
|
375
|
Disjoint-set data structure
|
14,185
|
457
|
C
|
High
|
376
|
Radix sort
|
14,137
|
456
|
Start
|
High
|
377
|
Thread (computing)
|
14,131
|
455
|
C
|
High
|
378
|
For loop
|
13,959
|
450
|
B
|
High
|
379
|
Graph coloring
|
13,937
|
449
|
B
|
Mid
|
380
|
Lexical analysis
|
13,912
|
448
|
C
|
High
|
381
|
WebRTC
|
13,869
|
447
|
C
|
Low
|
382
|
Objective-C
|
13,862
|
447
|
C
|
High
|
383
|
Complex system
|
13,847
|
446
|
C
|
High
|
384
|
Ben Horowitz
|
13,840
|
446
|
Start
|
Low
|
385
|
Computer science and engineering
|
13,821
|
445
|
Start
|
Low
|
386
|
Circular buffer
|
13,757
|
443
|
Start
|
Mid
|
387
|
Procedural programming
|
13,748
|
443
|
Start
|
Mid
|
388
|
Boolean data type
|
13,727
|
442
|
Start
|
Low
|
389
|
Rendering (computer graphics)
|
13,721
|
442
|
B
|
High
|
390
|
Foobar
|
13,711
|
442
|
C
|
Mid
|
391
|
Particle swarm optimization
|
13,705
|
442
|
C
|
Mid
|
392
|
Bjarne Stroustrup
|
13,696
|
441
|
Start
|
High
|
393
|
Pointer (computer programming)
|
13,568
|
437
|
C
|
High
|
394
|
Floyd–Warshall algorithm
|
13,557
|
437
|
B
|
High
|
395
|
Heuristic (computer science)
|
13,532
|
436
|
Unknown
|
Unknown
|
396
|
Prim's algorithm
|
13,474
|
434
|
C
|
High
|
397
|
Grover's algorithm
|
13,474
|
434
|
C
|
Mid
|
398
|
Smalltalk
|
13,466
|
434
|
C
|
High
|
399
|
Intelligent agent
|
13,446
|
433
|
Start
|
Unknown
|
400
|
Frontend and backend
|
13,436
|
433
|
Start
|
High
|
401
|
Hierarchical clustering
|
13,343
|
430
|
C
|
Mid
|
402
|
Inversion of control
|
13,341
|
430
|
C
|
Low
|
403
|
Artificial Intelligence Act
|
13,260
|
427
|
Stub
|
Mid
|
404
|
Voxel
|
13,228
|
426
|
C
|
Mid
|
405
|
Relational algebra
|
13,194
|
425
|
C
|
Mid
|
406
|
Analytics
|
13,172
|
424
|
Start
|
High
|
407
|
Nim
|
13,148
|
424
|
C
|
Unknown
|
408
|
Internet Engineering Task Force
|
13,124
|
423
|
C
|
Mid
|
409
|
Declarative programming
|
13,083
|
422
|
C
|
Top
|
410
|
Binary heap
|
13,044
|
420
|
B
|
High
|
411
|
Role-based access control
|
13,043
|
420
|
C
|
Mid
|
412
|
Physics-informed neural networks
|
13,032
|
420
|
Unknown
|
Low
|
413
|
K-d tree
|
12,982
|
418
|
C
|
Low
|
414
|
Kruskal's algorithm
|
12,975
|
418
|
Start
|
High
|
415
|
Deterministic finite automaton
|
12,914
|
416
|
Start
|
High
|
416
|
APL (programming language)
|
12,746
|
411
|
B
|
Mid
|
417
|
Numerical integration
|
12,721
|
410
|
B
|
Mid
|
418
|
Encapsulation (computer programming)
|
12,715
|
410
|
Start
|
High
|
419
|
Robotic process automation
|
12,660
|
408
|
Start
|
Mid
|
420
|
Signal processing
|
12,653
|
408
|
C
|
Low
|
421
|
Priority queue
|
12,646
|
407
|
C
|
High
|
422
|
Knowledge graph
|
12,604
|
406
|
Start
|
High
|
423
|
Colossus computer
|
12,596
|
406
|
B
|
Mid
|
424
|
Lossless compression
|
12,561
|
405
|
C
|
High
|
425
|
Intrusion detection system
|
12,522
|
403
|
Start
|
Low
|
426
|
Computational complexity theory
|
12,517
|
403
|
B
|
Top
|
427
|
Canny edge detector
|
12,482
|
402
|
Start
|
Mid
|
428
|
Inheritance (object-oriented programming)
|
12,474
|
402
|
Start
|
Mid
|
429
|
Imo.im
|
12,437
|
401
|
Stub
|
Low
|
430
|
Software development process
|
12,409
|
400
|
C
|
Mid
|
431
|
Ackermann function
|
12,401
|
400
|
B
|
Mid
|
432
|
Ensemble learning
|
12,390
|
399
|
C
|
Mid
|
433
|
Strategy pattern
|
12,364
|
398
|
Start
|
Mid
|
434
|
Abstract data type
|
12,299
|
396
|
C
|
High
|
435
|
Federated learning
|
12,255
|
395
|
Start
|
Low
|
436
|
QBittorrent
|
12,247
|
395
|
Start
|
Low
|
437
|
Strassen algorithm
|
12,225
|
394
|
C
|
Low
|
438
|
Alice and Bob
|
12,177
|
392
|
Start
|
Low
|
439
|
Visitor pattern
|
12,149
|
391
|
Start
|
Unknown
|
440
|
Decision theory
|
12,122
|
391
|
C
|
High
|
441
|
The Art of Computer Programming
|
12,061
|
389
|
C
|
High
|
442
|
Procedural generation
|
12,036
|
388
|
C
|
Unknown
|
443
|
Actor model
|
11,984
|
386
|
C
|
Mid
|
444
|
Dining philosophers problem
|
11,803
|
380
|
C
|
High
|
445
|
Maximum subarray problem
|
11,762
|
379
|
Unknown
|
Unknown
|
446
|
Extended Backus–Naur form
|
11,756
|
379
|
C
|
Mid
|
447
|
Linear congruential generator
|
11,725
|
378
|
Start
|
Mid
|
448
|
Data model
|
11,699
|
377
|
C
|
High
|
449
|
Error detection and correction
|
11,644
|
375
|
C
|
High
|
450
|
Bad Apple!!
|
11,583
|
373
|
Start
|
Low
|
451
|
C++23
|
11,561
|
372
|
C
|
Low
|
452
|
Naming convention (programming)
|
11,547
|
372
|
Start
|
Unknown
|
453
|
Abstraction (computer science)
|
11,545
|
372
|
C
|
Top
|
454
|
Shunting yard algorithm
|
11,495
|
370
|
Unknown
|
Unknown
|
455
|
Continuous integration
|
11,483
|
370
|
B
|
Low
|
456
|
Directed graph
|
11,468
|
369
|
C
|
High
|
457
|
Duff's device
|
11,466
|
369
|
C
|
Low
|
458
|
Closure (computer programming)
|
11,402
|
367
|
C
|
Mid
|
459
|
Instrumental convergence
|
11,387
|
367
|
C
|
Low
|
460
|
Chomsky hierarchy
|
11,364
|
366
|
C
|
High
|
461
|
Hungarian notation
|
11,310
|
364
|
Start
|
Low
|
462
|
Primality test
|
11,210
|
361
|
Start
|
Mid
|
463
|
Okapi BM25
|
11,156
|
359
|
Start
|
Low
|
464
|
List of tools for static code analysis
|
11,130
|
359
|
List
|
Low
|
465
|
Artificial consciousness
|
11,114
|
358
|
C
|
Unknown
|
466
|
Knuth–Morris–Pratt algorithm
|
11,095
|
357
|
Start
|
High
|
467
|
Cut, copy, and paste
|
11,091
|
357
|
C
|
Mid
|
468
|
The Open Group Architecture Framework
|
11,046
|
356
|
Start
|
High
|
469
|
Computational complexity of matrix multiplication
|
11,009
|
355
|
Unknown
|
Unknown
|
470
|
Logo (programming language)
|
10,963
|
353
|
C
|
Mid
|
471
|
State machine replication
|
10,943
|
353
|
C
|
High
|
472
|
Text-to-image model
|
10,868
|
350
|
Unknown
|
Unknown
|
473
|
Timsort
|
10,781
|
347
|
C
|
Mid
|
474
|
Macro (computer science)
|
10,776
|
347
|
C
|
Mid
|
475
|
Integer (computer science)
|
10,725
|
345
|
C
|
Mid
|
476
|
Row- and column-major order
|
10,647
|
343
|
C
|
Mid
|
477
|
Skip list
|
10,606
|
342
|
C
|
Mid
|
478
|
Google Brain
|
10,593
|
341
|
C
|
Mid
|
479
|
Matrix multiplication algorithm
|
10,569
|
340
|
C
|
Mid
|
480
|
IT service management
|
10,568
|
340
|
Start
|
Mid
|
481
|
Theoretical computer science
|
10,552
|
340
|
B
|
Top
|
482
|
Strong and weak typing
|
10,541
|
340
|
Start
|
Mid
|
483
|
Neuromorphic engineering
|
10,507
|
338
|
B
|
Low
|
484
|
Decorator pattern
|
10,478
|
338
|
Start
|
Low
|
485
|
System call
|
10,476
|
337
|
C
|
Low
|
486
|
Multiplication algorithm
|
10,404
|
335
|
C
|
Low
|
487
|
Queue (abstract data type)
|
10,365
|
334
|
Start
|
Top
|
488
|
Data and information visualization
|
10,345
|
333
|
C
|
High
|
489
|
Carbon (programming language)
|
10,344
|
333
|
Start
|
Low
|
490
|
Snippet (programming)
|
10,339
|
333
|
Start
|
Low
|
491
|
Matroska
|
10,297
|
332
|
C
|
Mid
|
492
|
Planar graph
|
10,287
|
331
|
B
|
Mid
|
493
|
Division algorithm
|
10,282
|
331
|
C
|
High
|
494
|
Kolmogorov complexity
|
10,261
|
331
|
B
|
High
|
495
|
Time formatting and storage bugs
|
10,227
|
329
|
B
|
Low
|
496
|
Chernoff bound
|
10,183
|
328
|
Start
|
Low
|
497
|
8-bit computing
|
10,142
|
327
|
Start
|
High
|
498
|
Quadtree
|
10,087
|
325
|
C
|
Mid
|
499
|
Mojo (programming language)
|
10,062
|
324
|
Start
|
Low
|
500
|
Batch normalization
|
10,061
|
324
|
C
|
Low
|
501
|
Builder pattern
|
10,015
|
323
|
Start
|
Unknown
|
502
|
Anomaly detection
|
10,014
|
323
|
Start
|
Mid
|
503
|
Extended ASCII
|
10,012
|
322
|
C
|
Low
|
504
|
Shannon–Hartley theorem
|
10,001
|
322
|
C
|
High
|
505
|
Alex Krizhevsky
|
9,997
|
322
|
Stub
|
Unknown
|
506
|
Avast
|
9,987
|
322
|
B
|
Mid
|
507
|
AWK
|
9,959
|
321
|
B
|
Mid
|
508
|
Call stack
|
9,901
|
319
|
C
|
Mid
|
509
|
Maze-solving algorithm
|
9,899
|
319
|
Unknown
|
Unknown
|
510
|
Ant colony optimization algorithms
|
9,886
|
318
|
B
|
Low
|
511
|
Aspect-oriented programming
|
9,857
|
317
|
Start
|
Mid
|
512
|
Memory management
|
9,854
|
317
|
C
|
High
|
513
|
HackerRank
|
9,841
|
317
|
Start
|
Unknown
|
514
|
Quantum key distribution
|
9,841
|
317
|
B
|
Mid
|
515
|
Control flow
|
9,840
|
317
|
B
|
Top
|
516
|
Prefix sum
|
9,778
|
315
|
Unknown
|
Unknown
|
517
|
Symbolic artificial intelligence
|
9,709
|
313
|
Start
|
Mid
|
518
|
Anti-pattern
|
9,707
|
313
|
C
|
Mid
|
519
|
System administrator
|
9,691
|
312
|
C
|
High
|
520
|
Informatics
|
9,675
|
312
|
C
|
Mid
|
521
|
Adapter pattern
|
9,671
|
311
|
Start
|
Unknown
|
522
|
Mean time between failures
|
9,662
|
311
|
C
|
Low
|
523
|
Ones' complement
|
9,646
|
311
|
Start
|
Mid
|
524
|
Miller–Rabin primality test
|
9,643
|
311
|
C
|
High
|
525
|
Memory leak
|
9,596
|
309
|
C
|
Mid
|
526
|
Data modeling
|
9,571
|
308
|
C
|
High
|
527
|
Type theory
|
9,558
|
308
|
C
|
High
|
528
|
Adam D'Angelo
|
9,554
|
308
|
Start
|
Low
|
529
|
Andrey Kolmogorov
|
9,535
|
307
|
C
|
High
|
530
|
List of hash functions
|
9,532
|
307
|
List
|
Low
|
531
|
POST (HTTP)
|
9,525
|
307
|
Start
|
Low
|
532
|
Cell (processor)
|
9,461
|
305
|
B
|
Mid
|
533
|
Maze generation algorithm
|
9,445
|
304
|
Start
|
Unknown
|
534
|
Identity management
|
9,430
|
304
|
C
|
High
|
535
|
Paxos (computer science)
|
9,426
|
304
|
C
|
Low
|
536
|
Coroutine
|
9,414
|
303
|
C
|
Mid
|
537
|
L-system
|
9,397
|
303
|
B
|
Unknown
|
538
|
Hyper-threading
|
9,395
|
303
|
C
|
Low
|
539
|
Currying
|
9,388
|
302
|
C
|
High
|
540
|
Sudoku solving algorithms
|
9,364
|
302
|
B
|
Low
|
541
|
Online analytical processing
|
9,352
|
301
|
C
|
Mid
|
542
|
SNOBOL
|
9,298
|
299
|
C
|
Mid
|
543
|
Front-end web development
|
9,197
|
296
|
Start
|
High
|
544
|
Vehicle routing problem
|
9,186
|
296
|
C
|
Unknown
|
545
|
Shift register
|
9,095
|
293
|
Start
|
Unknown
|
546
|
ABAP
|
9,079
|
292
|
C
|
High
|
547
|
Branch predictor
|
9,017
|
290
|
C
|
Mid
|
548
|
Agent-based model
|
9,000
|
290
|
B
|
Mid
|
549
|
Information science
|
8,972
|
289
|
C
|
Top
|
550
|
Relational model
|
8,965
|
289
|
C
|
Top
|
551
|
Structured programming
|
8,944
|
288
|
C
|
Mid
|
552
|
Leslie Lamport
|
8,939
|
288
|
C
|
High
|
553
|
List of NP-complete problems
|
8,931
|
288
|
List
|
High
|
554
|
DeepDream
|
8,928
|
288
|
Start
|
Low
|
555
|
Futures studies
|
8,923
|
287
|
B
|
Low
|
556
|
Microkernel
|
8,908
|
287
|
C
|
High
|
557
|
Copying
|
8,898
|
287
|
Unknown
|
Unknown
|
558
|
Code page 437
|
8,891
|
286
|
C
|
Low
|
559
|
Code.org
|
8,891
|
286
|
C
|
Low
|
560
|
Logic programming
|
8,861
|
285
|
C
|
Top
|
561
|
Erik Meijer (computer scientist)
|
8,802
|
283
|
Stub
|
Unknown
|
562
|
Theory of computation
|
8,800
|
283
|
C
|
Top
|
563
|
Variable (computer science)
|
8,782
|
283
|
Start
|
Top
|
564
|
ActivityPub
|
8,777
|
283
|
C
|
Low
|
565
|
Interface (computing)
|
8,749
|
282
|
C
|
Low
|
566
|
Nondeterministic finite automaton
|
8,742
|
282
|
B
|
High
|
567
|
Coupling (computer programming)
|
8,728
|
281
|
Start
|
High
|
568
|
Run-length encoding
|
8,727
|
281
|
Start
|
Mid
|
569
|
Numerical method
|
8,718
|
281
|
Stub
|
Unknown
|
570
|
Triple DES
|
8,704
|
280
|
Start
|
Unknown
|
571
|
Constructor (object-oriented programming)
|
8,696
|
280
|
Start
|
Mid
|
572
|
Subset sum problem
|
8,683
|
280
|
C
|
Low
|
573
|
Search algorithm
|
8,628
|
278
|
Start
|
Top
|
574
|
Scaled agile framework
|
8,620
|
278
|
C
|
Low
|
575
|
Pushdown automaton
|
8,614
|
277
|
B
|
High
|
576
|
Google AI
|
8,575
|
276
|
Start
|
Low
|
577
|
Ethics of artificial intelligence
|
8,567
|
276
|
B
|
Top
|
578
|
Stochastic parrot
|
8,559
|
276
|
Start
|
Unknown
|
579
|
Robert C. Martin
|
8,543
|
275
|
Start
|
Mid
|
580
|
Edge detection
|
8,535
|
275
|
C
|
Mid
|
581
|
Cycle detection
|
8,519
|
274
|
B
|
Low
|
582
|
Conditional (computer programming)
|
8,494
|
274
|
C
|
Mid
|
583
|
User error
|
8,491
|
273
|
Start
|
High
|
584
|
List of data structures
|
8,483
|
273
|
List
|
High
|
585
|
Anonymous function
|
8,455
|
272
|
C
|
Mid
|
586
|
Inverter (logic gate)
|
8,444
|
272
|
Start
|
Unknown
|
587
|
B+ tree
|
8,409
|
271
|
Start
|
High
|
588
|
CORDIC
|
8,407
|
271
|
B
|
Mid
|
589
|
Regular language
|
8,403
|
271
|
C
|
High
|
590
|
Curiously recurring template pattern
|
8,396
|
270
|
C
|
Low
|
591
|
Named-entity recognition
|
8,334
|
268
|
C
|
Unknown
|
592
|
Quantum algorithm
|
8,273
|
266
|
C
|
High
|
593
|
Classification
|
8,268
|
266
|
C
|
Unknown
|
594
|
Microcode
|
8,257
|
266
|
C
|
Unknown
|
595
|
Multiple inheritance
|
8,236
|
265
|
C
|
Mid
|
596
|
VP9
|
8,219
|
265
|
B
|
Low
|
597
|
Ashish Vaswani
|
8,196
|
264
|
Start
|
Low
|
598
|
Avast Antivirus
|
8,194
|
264
|
Start
|
Mid
|
599
|
Basic Linear Algebra Subprograms
|
8,178
|
263
|
C
|
Low
|
600
|
Real-time computing
|
8,177
|
263
|
C
|
High
|
601
|
Open-source license
|
8,171
|
263
|
GA
|
High
|
602
|
State diagram
|
8,145
|
262
|
C
|
Mid
|
603
|
Longest common subsequence
|
8,139
|
262
|
Start
|
High
|
604
|
Class (computer programming)
|
8,139
|
262
|
Start
|
High
|
605
|
Evolutionary algorithm
|
8,110
|
261
|
C
|
Mid
|
606
|
Spaghetti code
|
8,097
|
261
|
Start
|
Mid
|
607
|
Radix tree
|
8,092
|
261
|
C
|
Mid
|
608
|
Ogg
|
8,076
|
260
|
B
|
Unknown
|
609
|
MurmurHash
|
8,073
|
260
|
Start
|
Low
|
610
|
Amortized analysis
|
8,067
|
260
|
Start
|
High
|
611
|
Higher-order function
|
8,051
|
259
|
Start
|
High
|
612
|
List of unsolved problems in computer science
|
8,030
|
259
|
List
|
Mid
|
613
|
Coding theory
|
8,027
|
258
|
C
|
High
|
614
|
Computation
|
8,015
|
258
|
Start
|
Top
|
615
|
Associative array
|
7,964
|
256
|
C
|
High
|
616
|
Sørensen–Dice coefficient
|
7,950
|
256
|
C
|
Low
|
617
|
Quick, Draw!
|
7,945
|
256
|
Stub
|
Low
|
618
|
PCP theorem
|
7,941
|
256
|
C
|
High
|
619
|
Branch and bound
|
7,930
|
255
|
Start
|
Mid
|
620
|
Church–Turing thesis
|
7,922
|
255
|
C
|
Top
|
621
|
Ladder logic
|
7,914
|
255
|
C
|
Low
|
622
|
Quantum information
|
7,908
|
255
|
Start
|
High
|
623
|
Web API
|
7,896
|
254
|
Start
|
Unknown
|
624
|
Root-finding algorithms
|
7,873
|
253
|
C
|
Unknown
|
625
|
Extended reality
|
7,838
|
252
|
Stub
|
Low
|
626
|
All-points bulletin
|
7,838
|
252
|
C
|
Low
|
627
|
Computational biology
|
7,826
|
252
|
C
|
High
|
628
|
Ford–Fulkerson algorithm
|
7,824
|
252
|
Start
|
High
|
629
|
Boyer–Moore string-search algorithm
|
7,802
|
251
|
C
|
High
|
630
|
Static program analysis
|
7,781
|
251
|
C
|
Mid
|
631
|
Pareto front
|
7,776
|
250
|
Start
|
Unknown
|
632
|
Boids
|
7,762
|
250
|
Unknown
|
Unknown
|
633
|
Maximum flow problem
|
7,758
|
250
|
C
|
High
|
634
|
Lossy compression
|
7,755
|
250
|
Start
|
High
|
635
|
List of pioneers in computer science
|
7,753
|
250
|
List
|
High
|
636
|
Code smell
|
7,749
|
249
|
C
|
Low
|
637
|
Computational linguistics
|
7,721
|
249
|
C
|
High
|
638
|
Multi-agent system
|
7,714
|
248
|
Start
|
Mid
|
639
|
Concurrency (computer science)
|
7,686
|
247
|
Start
|
Top
|
640
|
Limited-memory BFGS
|
7,686
|
247
|
Unknown
|
Unknown
|
641
|
Swarm intelligence
|
7,681
|
247
|
C
|
Mid
|
642
|
Routing
|
7,614
|
245
|
C
|
Mid
|
643
|
JPEG 2000
|
7,562
|
243
|
C
|
Low
|
644
|
Locality-sensitive hashing
|
7,544
|
243
|
C
|
Unknown
|
645
|
16K resolution
|
7,526
|
242
|
Start
|
Unknown
|
646
|
Tony Hoare
|
7,525
|
242
|
C
|
High
|
647
|
Counting sort
|
7,515
|
242
|
C
|
High
|
648
|
Recursive descent parser
|
7,512
|
242
|
Start
|
High
|
649
|
Command pattern
|
7,494
|
241
|
Start
|
Mid
|
650
|
Data structure alignment
|
7,490
|
241
|
Start
|
Mid
|
651
|
Two-phase commit protocol
|
7,483
|
241
|
C
|
High
|
652
|
Quickselect
|
7,471
|
241
|
C
|
Low
|
653
|
Computational chemistry
|
7,440
|
240
|
GA
|
High
|
654
|
Combinatorial optimization
|
7,431
|
239
|
C
|
Top
|
655
|
Deep reinforcement learning
|
7,418
|
239
|
Stub
|
Unknown
|
656
|
JavaScript engine
|
7,413
|
239
|
Start
|
Mid
|
657
|
Raft (algorithm)
|
7,389
|
238
|
C
|
Low
|
658
|
Petri net
|
7,387
|
238
|
B
|
Mid
|
659
|
Mixed reality
|
7,375
|
237
|
B
|
Unknown
|
660
|
Glossary of graph theory
|
7,368
|
237
|
List
|
Mid
|
661
|
Consensus (computer science)
|
7,340
|
236
|
Start
|
High
|
662
|
Max-flow min-cut theorem
|
7,333
|
236
|
Start
|
High
|
663
|
Computational science
|
7,320
|
236
|
C
|
High
|
664
|
Women and video games
|
7,289
|
235
|
B
|
Mid
|
665
|
EBCDIC
|
7,273
|
234
|
Start
|
Mid
|
666
|
Adversarial machine learning
|
7,271
|
234
|
C
|
Mid
|
667
|
Binary file
|
7,259
|
234
|
C
|
High
|
668
|
Check digit
|
7,239
|
233
|
Start
|
Mid
|
669
|
Non-English-based programming languages
|
7,238
|
233
|
List
|
Low
|
670
|
Dual linear program
|
7,223
|
233
|
Start
|
Low
|
671
|
Vertex cover
|
7,218
|
232
|
C
|
Mid
|
672
|
Lempel–Ziv–Welch
|
7,215
|
232
|
C
|
Unknown
|
673
|
Graph (abstract data type)
|
7,205
|
232
|
C
|
Top
|
674
|
Process (computing)
|
7,192
|
232
|
C
|
Mid
|
675
|
Dartmouth workshop
|
7,162
|
231
|
Start
|
Low
|
676
|
Learning rate
|
7,154
|
230
|
Unknown
|
Unknown
|
677
|
Signed number representations
|
7,143
|
230
|
C
|
High
|
678
|
Multimodal learning
|
7,102
|
229
|
C
|
Low
|
679
|
Generalized additive model
|
7,079
|
228
|
Start
|
Low
|
680
|
Event-driven programming
|
7,072
|
228
|
Start
|
High
|
681
|
Formal grammar
|
7,032
|
226
|
C
|
Mid
|
682
|
Association for Computing Machinery
|
7,030
|
226
|
C
|
Top
|
683
|
Kai-Fu Lee
|
7,029
|
226
|
Start
|
Unknown
|
684
|
Algebraic data type
|
7,028
|
226
|
Start
|
Low
|
685
|
Women in computing
|
7,024
|
226
|
B
|
High
|
686
|
Computational complexity
|
7,023
|
226
|
C
|
Top
|
687
|
Consistent hashing
|
7,013
|
226
|
Stub
|
Unknown
|
688
|
R-tree
|
6,987
|
225
|
C
|
Mid
|
689
|
Translation studies
|
6,957
|
224
|
Start
|
Mid
|
690
|
Median of medians
|
6,942
|
223
|
C
|
Low
|
691
|
Fault tolerance
|
6,942
|
223
|
Start
|
High
|
692
|
Cryptographically secure pseudorandom number generator
|
6,938
|
223
|
C
|
High
|
693
|
Legacy system
|
6,937
|
223
|
C
|
Low
|
694
|
Email spoofing
|
6,921
|
223
|
Start
|
Low
|
695
|
Fixed-point combinator
|
6,914
|
223
|
C
|
Mid
|
696
|
Shellsort
|
6,903
|
222
|
B
|
High
|
697
|
Pumping lemma for regular languages
|
6,890
|
222
|
C
|
Low
|
698
|
Common Lisp
|
6,880
|
221
|
B
|
High
|
699
|
Linker (computing)
|
6,853
|
221
|
C
|
Mid
|
700
|
Datalog
|
6,851
|
221
|
B
|
Mid
|
701
|
Attribute-based access control
|
6,823
|
220
|
C
|
Mid
|
702
|
15.ai
|
6,817
|
219
|
GA
|
Low
|
703
|
Tail call
|
6,815
|
219
|
C
|
Mid
|
704
|
No free lunch theorem
|
6,795
|
219
|
Start
|
Mid
|
705
|
Analysis of algorithms
|
6,766
|
218
|
C
|
Top
|
706
|
Shane Legg
|
6,760
|
218
|
Start
|
Unknown
|
707
|
Edit distance
|
6,746
|
217
|
C
|
Mid
|
708
|
Boolean
|
6,731
|
217
|
List
|
Unknown
|
709
|
Memory safety
|
6,729
|
217
|
Stub
|
Unknown
|
710
|
Systems programming
|
6,729
|
217
|
B
|
High
|
711
|
Quantum machine learning
|
6,726
|
216
|
B
|
Unknown
|
712
|
ALGOL
|
6,723
|
216
|
C
|
High
|
713
|
Rob Pike
|
6,714
|
216
|
Start
|
Unknown
|
714
|
Identifier
|
6,700
|
216
|
Start
|
Low
|
715
|
Superconducting quantum computing
|
6,681
|
215
|
Start
|
Unknown
|
716
|
IEEE 754-1985
|
6,666
|
215
|
C
|
Low
|
717
|
Parsing expression grammar
|
6,665
|
215
|
B
|
Mid
|
718
|
Bytecode
|
6,658
|
214
|
Start
|
Unknown
|
719
|
Hamming weight
|
6,657
|
214
|
C
|
Unknown
|
720
|
HyperLogLog
|
6,644
|
214
|
C
|
Unknown
|
721
|
Timeline of quantum computing and communication
|
6,618
|
213
|
List
|
Mid
|
722
|
Fréchet inception distance
|
6,561
|
211
|
C
|
Low
|
723
|
Clique problem
|
6,555
|
211
|
GA
|
Mid
|
724
|
Independent set (graph theory)
|
6,547
|
211
|
C
|
Mid
|
725
|
Constraint satisfaction problem
|
6,520
|
210
|
C
|
Mid
|
726
|
Smartglasses
|
6,495
|
209
|
C
|
Low
|
727
|
Comparison of integrated development environments
|
6,495
|
209
|
Start
|
Low
|
728
|
Fourth-generation programming language
|
6,493
|
209
|
Start
|
Mid
|
729
|
Universal Turing machine
|
6,489
|
209
|
C
|
Mid
|
730
|
Proxy auto-config
|
6,477
|
208
|
Unknown
|
Unknown
|
731
|
Double-ended queue
|
6,465
|
208
|
Start
|
High
|
732
|
Computer scientist
|
6,462
|
208
|
Start
|
Top
|
733
|
Scope (computer science)
|
6,450
|
208
|
C
|
High
|
734
|
Statistical machine translation
|
6,448
|
208
|
Start
|
Low
|
735
|
Bill Joy
|
6,439
|
207
|
C
|
Unknown
|
736
|
David J. Malan
|
6,435
|
207
|
C
|
Unknown
|
737
|
Ubiquitous computing
|
6,428
|
207
|
C
|
High
|
738
|
Tagged union
|
6,426
|
207
|
Start
|
Low
|
739
|
Password cracking
|
6,425
|
207
|
C
|
Low
|
740
|
Prediction
|
6,416
|
206
|
Start
|
Low
|
741
|
Hazard (computer architecture)
|
6,410
|
206
|
C
|
Low
|
742
|
Unique identifier
|
6,380
|
205
|
Start
|
Unknown
|
743
|
Metaheuristic
|
6,377
|
205
|
Start
|
Mid
|
744
|
Pointing stick
|
6,374
|
205
|
C
|
Low
|
745
|
General-purpose programming language
|
6,355
|
205
|
Stub
|
Mid
|
746
|
Reactive programming
|
6,347
|
204
|
Start
|
Mid
|
747
|
Binary space partitioning
|
6,343
|
204
|
C
|
Low
|
748
|
Computing Machinery and Intelligence
|
6,342
|
204
|
C
|
High
|
749
|
Compilers: Principles, Techniques, and Tools
|
6,341
|
204
|
Stub
|
Low
|
750
|
Containerization (computing)
|
6,320
|
203
|
Start
|
Low
|
751
|
Hash collision
|
6,308
|
203
|
Start
|
Low
|
752
|
CS50
|
6,306
|
203
|
Start
|
Low
|
753
|
Boyer–Moore majority vote algorithm
|
6,279
|
202
|
Unknown
|
Unknown
|
754
|
Static single-assignment form
|
6,274
|
202
|
C
|
Mid
|
755
|
Enterprise architecture
|
6,252
|
201
|
Start
|
Mid
|
756
|
Needleman–Wunsch algorithm
|
6,249
|
201
|
Start
|
Mid
|
757
|
Side effect (computer science)
|
6,241
|
201
|
C
|
Mid
|
758
|
Supercomputing in India
|
6,227
|
200
|
C
|
Mid
|
759
|
BEAM (Erlang virtual machine)
|
6,224
|
200
|
Start
|
Low
|
760
|
Bucket sort
|
6,215
|
200
|
C
|
High
|
761
|
Jaro–Winkler distance
|
6,195
|
199
|
Unknown
|
Unknown
|
762
|
Beam search
|
6,195
|
199
|
Start
|
Unknown
|
763
|
Wiener filter
|
6,192
|
199
|
Start
|
Low
|
764
|
Computability theory
|
6,186
|
199
|
B
|
Top
|
765
|
Point in polygon
|
6,181
|
199
|
Start
|
Low
|
766
|
Covariance and contravariance (computer science)
|
6,180
|
199
|
Start
|
High
|
767
|
Opcode
|
6,162
|
198
|
C
|
High
|
768
|
Vorbis
|
6,158
|
198
|
B
|
Low
|
769
|
Exception handling
|
6,150
|
198
|
B
|
Mid
|
770
|
Neuro-symbolic AI
|
6,147
|
198
|
Start
|
Low
|
771
|
Delimiter
|
6,137
|
197
|
C
|
Mid
|
772
|
Fibonacci heap
|
6,120
|
197
|
C
|
High
|
773
|
Self-balancing binary search tree
|
6,109
|
197
|
Start
|
Mid
|
774
|
Computational thinking
|
6,093
|
196
|
Start
|
Unknown
|
775
|
Nonlinear programming
|
6,090
|
196
|
C
|
Mid
|
776
|
Judea Pearl
|
6,079
|
196
|
C
|
Mid
|
777
|
Best, worst and average case
|
6,074
|
195
|
Start
|
High
|
778
|
Niklaus Wirth
|
6,064
|
195
|
Start
|
High
|
779
|
Coq (software)
|
6,056
|
195
|
Start
|
Mid
|
780
|
3GP and 3G2
|
6,043
|
194
|
C
|
Low
|
781
|
Log-structured merge-tree
|
6,029
|
194
|
Start
|
Mid
|
782
|
Alonzo Church
|
6,020
|
194
|
C
|
Top
|
783
|
Weak supervision
|
6,004
|
193
|
Unknown
|
Unknown
|
784
|
Computational neuroscience
|
5,997
|
193
|
B
|
Mid
|
785
|
C99
|
5,991
|
193
|
C
|
Mid
|
786
|
Memory hierarchy
|
5,981
|
192
|
Start
|
Mid
|
787
|
Concurrent computing
|
5,978
|
192
|
C
|
High
|
788
|
Hindley–Milner type system
|
5,977
|
192
|
B
|
High
|
789
|
Binary-to-text encoding
|
5,974
|
192
|
C
|
Low
|
790
|
Web developer
|
5,963
|
192
|
Start
|
Mid
|
791
|
Jaan Tallinn
|
5,936
|
191
|
C
|
Low
|
792
|
Short-circuit evaluation
|
5,917
|
190
|
Start
|
Mid
|
793
|
Set cover problem
|
5,910
|
190
|
C
|
Mid
|
794
|
Human-centered design
|
5,909
|
190
|
C
|
High
|
795
|
Vapnik–Chervonenkis dimension
|
5,908
|
190
|
Start
|
Mid
|
796
|
Code coverage
|
5,866
|
189
|
C
|
Low
|
797
|
LL parser
|
5,866
|
189
|
Start
|
High
|
798
|
Goto
|
5,826
|
187
|
C
|
Mid
|
799
|
Rabin–Karp algorithm
|
5,824
|
187
|
C
|
Mid
|
800
|
Machine epsilon
|
5,812
|
187
|
Unknown
|
Unknown
|
801
|
Don Norman
|
5,805
|
187
|
Start
|
Mid
|
802
|
Semantics (computer science)
|
5,802
|
187
|
C
|
High
|
803
|
Arity
|
5,779
|
186
|
C
|
Low
|
804
|
Component (graph theory)
|
5,779
|
186
|
GA
|
Mid
|
805
|
Data governance
|
5,778
|
186
|
C
|
Unknown
|
806
|
Generic programming
|
5,762
|
185
|
C
|
High
|
807
|
Approximate string matching
|
5,761
|
185
|
C
|
Mid
|
808
|
Elbow method (clustering)
|
5,758
|
185
|
Stub
|
Unknown
|
809
|
Syntactic sugar
|
5,754
|
185
|
C
|
Mid
|
810
|
Topological data analysis
|
5,737
|
185
|
C
|
Low
|
811
|
Compare-and-swap
|
5,734
|
184
|
C
|
Low
|
812
|
Algorithmic bias
|
5,702
|
183
|
GA
|
Top
|
813
|
Units of information
|
5,676
|
183
|
C
|
Mid
|
814
|
Formal verification
|
5,663
|
182
|
Start
|
High
|
815
|
Gradle
|
5,663
|
182
|
C
|
Low
|
816
|
Web of trust
|
5,652
|
182
|
C
|
Low
|
817
|
Curry–Howard correspondence
|
5,651
|
182
|
C
|
High
|
818
|
OpenGL Shading Language
|
5,641
|
181
|
C
|
Low
|
819
|
Cyclic permutation
|
5,627
|
181
|
Start
|
Unknown
|
820
|
Phong reflection model
|
5,626
|
181
|
C
|
Unknown
|
821
|
Sandbox (software development)
|
5,623
|
181
|
Start
|
Low
|
822
|
Isolation forest
|
5,607
|
180
|
C
|
Low
|
823
|
Boltzmann machine
|
5,595
|
180
|
C
|
Low
|
824
|
Evaluation strategy
|
5,589
|
180
|
C
|
Top
|
825
|
Directory (computing)
|
5,588
|
180
|
C
|
Low
|
826
|
Requirements engineering
|
5,587
|
180
|
Start
|
Unknown
|
827
|
User-centered design
|
5,586
|
180
|
Start
|
Mid
|
828
|
Graph isomorphism
|
5,579
|
179
|
Start
|
Mid
|
829
|
Formal methods
|
5,573
|
179
|
C
|
Top
|
830
|
SAT solver
|
5,564
|
179
|
C
|
Mid
|
831
|
8-bit color
|
5,563
|
179
|
Start
|
Low
|
832
|
Three-valued logic
|
5,560
|
179
|
Start
|
Low
|
833
|
Fluent interface
|
5,525
|
178
|
Stub
|
Unknown
|
834
|
Composite pattern
|
5,520
|
178
|
Start
|
Unknown
|
835
|
Mutual exclusion
|
5,510
|
177
|
C
|
Top
|
836
|
Apriori algorithm
|
5,483
|
176
|
C
|
Mid
|
837
|
Cargo cult programming
|
5,482
|
176
|
Start
|
Low
|
838
|
LeNet
|
5,482
|
176
|
Start
|
Unknown
|
839
|
Spatial anti-aliasing
|
5,481
|
176
|
C
|
Mid
|
840
|
Object (computer science)
|
5,471
|
176
|
Start
|
High
|
841
|
Digital data
|
5,466
|
176
|
C
|
Low
|
842
|
Jack Sweeney
|
5,441
|
175
|
Start
|
Low
|
843
|
Satisfiability modulo theories
|
5,435
|
175
|
Start
|
Low
|
844
|
GPS Exchange Format
|
5,430
|
175
|
C
|
Low
|
845
|
Automated theorem proving
|
5,429
|
175
|
Start
|
Mid
|
846
|
Barbara Liskov
|
5,420
|
174
|
C
|
High
|
847
|
Distributed operating system
|
5,409
|
174
|
C
|
Mid
|
848
|
Mixin
|
5,408
|
174
|
Start
|
Low
|
849
|
Hill climbing
|
5,407
|
174
|
C
|
Mid
|
850
|
Hamiltonian path problem
|
5,386
|
173
|
C
|
Mid
|
851
|
Suffix tree
|
5,385
|
173
|
C
|
High
|
852
|
Doubly linked list
|
5,353
|
172
|
Start
|
High
|
853
|
Three.js
|
5,346
|
172
|
C
|
Unknown
|
854
|
Loab
|
5,336
|
172
|
C
|
Low
|
855
|
Kleene star
|
5,330
|
171
|
Start
|
High
|
856
|
Lazy evaluation
|
5,312
|
171
|
C
|
High
|
857
|
Multiclass classification
|
5,306
|
171
|
Start
|
Mid
|
858
|
Progress in artificial intelligence
|
5,292
|
170
|
Start
|
Unknown
|
859
|
A Mathematical Theory of Communication
|
5,281
|
170
|
Start
|
High
|
860
|
Andrew S. Tanenbaum
|
5,276
|
170
|
C
|
Mid
|
861
|
Linear search
|
5,261
|
169
|
Start
|
Mid
|
862
|
Booth's multiplication algorithm
|
5,246
|
169
|
C
|
Mid
|
863
|
GrabCAD
|
5,240
|
169
|
Start
|
Unknown
|
864
|
Lowest common ancestor
|
5,228
|
168
|
Start
|
Unknown
|
865
|
Infinite loop
|
5,227
|
168
|
Start
|
Mid
|
866
|
Double-checked locking
|
5,217
|
168
|
Unknown
|
Unknown
|
867
|
Artificial life
|
5,208
|
168
|
B
|
High
|
868
|
Code injection
|
5,192
|
167
|
C
|
High
|
869
|
Space complexity
|
5,191
|
167
|
Start
|
Mid
|
870
|
Computational complexity of mathematical operations
|
5,187
|
167
|
B
|
Mid
|
871
|
Smith–Waterman algorithm
|
5,174
|
166
|
B
|
Mid
|
872
|
Deno (software)
|
5,171
|
166
|
C
|
Low
|
873
|
Programming language theory
|
5,167
|
166
|
Start
|
Top
|
874
|
Q (number format)
|
5,152
|
166
|
Unknown
|
Unknown
|
875
|
ActionScript
|
5,152
|
166
|
C
|
Low
|
876
|
Abstract factory pattern
|
5,150
|
166
|
Start
|
Mid
|
877
|
Communicating sequential processes
|
5,149
|
166
|
B
|
High
|
878
|
Bounding volume hierarchy
|
5,110
|
164
|
Unknown
|
Unknown
|
879
|
Treemapping
|
5,106
|
164
|
C
|
Mid
|
880
|
Program optimization
|
5,098
|
164
|
B
|
High
|
881
|
String-searching algorithm
|
5,097
|
164
|
Start
|
High
|
882
|
Subnormal number
|
5,076
|
163
|
Unknown
|
Unknown
|
883
|
Restricted Boltzmann machine
|
5,065
|
163
|
Unknown
|
Unknown
|
884
|
Spatial computing
|
5,061
|
163
|
Stub
|
Low
|
885
|
C string handling
|
5,052
|
162
|
C
|
Low
|
886
|
Async/await
|
5,050
|
162
|
C
|
Mid
|
887
|
Loose coupling
|
5,049
|
162
|
Start
|
High
|
888
|
Zachman Framework
|
5,025
|
162
|
Start
|
Unknown
|
889
|
API testing
|
5,016
|
161
|
Unknown
|
Unknown
|
890
|
Combinational logic
|
4,998
|
161
|
Start
|
Unknown
|
891
|
Deutsch–Jozsa algorithm
|
4,998
|
161
|
C
|
Mid
|
892
|
Longest path problem
|
4,997
|
161
|
C
|
Low
|
893
|
Aho–Corasick algorithm
|
4,995
|
161
|
Start
|
Mid
|
894
|
Tree structure
|
4,982
|
160
|
Start
|
High
|
895
|
Matei Zaharia
|
4,978
|
160
|
Start
|
Unknown
|
896
|
Distributed version control
|
4,956
|
159
|
Start
|
Mid
|
897
|
Foreign function interface
|
4,948
|
159
|
Start
|
Low
|
898
|
School timetable
|
4,941
|
159
|
C
|
Low
|
899
|
Data access object
|
4,932
|
159
|
Start
|
Unknown
|
900
|
Damerau–Levenshtein distance
|
4,921
|
158
|
Start
|
Low
|
901
|
Banker's algorithm
|
4,915
|
158
|
C
|
Mid
|
902
|
History of artificial neural networks
|
4,906
|
158
|
C
|
Mid
|
903
|
Topological insulator
|
4,895
|
157
|
Start
|
Unknown
|
904
|
Metaprogramming
|
4,889
|
157
|
C
|
Mid
|
905
|
Thrashing (computer science)
|
4,881
|
157
|
C
|
Low
|
906
|
Chomsky normal form
|
4,880
|
157
|
Start
|
Mid
|
907
|
Function overloading
|
4,868
|
157
|
Unknown
|
Unknown
|
908
|
BCH code
|
4,857
|
156
|
C
|
Unknown
|
909
|
Sycamore processor
|
4,856
|
156
|
Stub
|
Low
|
910
|
Terry Winograd
|
4,845
|
156
|
Start
|
Unknown
|
911
|
Requirements analysis
|
4,827
|
155
|
Start
|
Unknown
|
912
|
Computational geometry
|
4,822
|
155
|
Start
|
High
|
913
|
Brute-force search
|
4,809
|
155
|
Start
|
Mid
|
914
|
Matrix factorization (recommender systems)
|
4,801
|
154
|
C
|
Low
|
915
|
Cohesion (computer science)
|
4,797
|
154
|
Unknown
|
Unknown
|
916
|
Comparison of programming paradigms
|
4,797
|
154
|
C
|
Low
|
917
|
Soundex
|
4,783
|
154
|
C
|
Unknown
|
918
|
Scott Aaronson
|
4,737
|
152
|
C
|
Mid
|
919
|
Randomized algorithm
|
4,734
|
152
|
C
|
High
|
920
|
Artbreeder
|
4,726
|
152
|
Start
|
Low
|
921
|
Jürgen Schmidhuber
|
4,704
|
151
|
C
|
Mid
|
922
|
Nondeterministic Turing machine
|
4,702
|
151
|
C
|
High
|
923
|
Splay tree
|
4,697
|
151
|
C
|
Mid
|
924
|
Elvis operator
|
4,696
|
151
|
Unknown
|
Unknown
|
925
|
Computer algebra
|
4,686
|
151
|
Start
|
Mid
|
926
|
Avalanche effect
|
4,668
|
150
|
Start
|
Unknown
|
927
|
Admissible heuristic
|
4,667
|
150
|
Start
|
Unknown
|
928
|
Object-oriented analysis and design
|
4,666
|
150
|
Start
|
High
|
929
|
Rule 110
|
4,659
|
150
|
Start
|
Mid
|
930
|
Pattern matching
|
4,651
|
150
|
C
|
Mid
|
931
|
Outline of computer science
|
4,643
|
149
|
Start
|
Mid
|
932
|
Types of artificial neural networks
|
4,640
|
149
|
Unknown
|
Low
|
933
|
CalyxOS
|
4,631
|
149
|
C
|
Low
|
934
|
Inverted index
|
4,622
|
149
|
Start
|
Mid
|
935
|
Calling convention
|
4,621
|
149
|
C
|
High
|
936
|
Thundering herd problem
|
4,620
|
149
|
Start
|
Mid
|
937
|
State pattern
|
4,617
|
148
|
Start
|
Unknown
|
938
|
Control-flow graph
|
4,616
|
148
|
C
|
Mid
|
939
|
CiteSeerX
|
4,611
|
148
|
Start
|
High
|
940
|
Jamie Zawinski
|
4,609
|
148
|
Start
|
Low
|
941
|
List of fictional computers
|
4,600
|
148
|
List
|
Low
|
942
|
Criticism of C++
|
4,546
|
146
|
C
|
Unknown
|
943
|
Terminal and nonterminal symbols
|
4,546
|
146
|
C
|
Mid
|
944
|
Samsung Galaxy Tab A8
|
4,538
|
146
|
Unknown
|
Unknown
|
945
|
List (abstract data type)
|
4,538
|
146
|
Start
|
Top
|
946
|
Metasyntactic variable
|
4,525
|
145
|
Unknown
|
Unknown
|
947
|
Model–view–presenter
|
4,521
|
145
|
C
|
High
|
948
|
Hybrid log–gamma
|
4,511
|
145
|
Start
|
Low
|
949
|
Marching cubes
|
4,507
|
145
|
Start
|
Mid
|
950
|
History of computer science
|
4,500
|
145
|
B
|
Top
|
951
|
Immersion (virtual reality)
|
4,491
|
144
|
Start
|
Low
|
952
|
Interval tree
|
4,490
|
144
|
Start
|
Mid
|
953
|
C++ classes
|
4,490
|
144
|
C
|
Low
|
954
|
Proof assistant
|
4,486
|
144
|
Start
|
High
|
955
|
Object database
|
4,481
|
144
|
Start
|
High
|
956
|
David Cheriton
|
4,457
|
143
|
C
|
Mid
|
957
|
Do while loop
|
4,451
|
143
|
C
|
Mid
|
958
|
Wojciech Zaremba
|
4,438
|
143
|
Start
|
Unknown
|
959
|
Knowledge distillation
|
4,433
|
143
|
C
|
Low
|
960
|
Dynamic array
|
4,419
|
142
|
C
|
Mid
|
961
|
Message passing
|
4,403
|
142
|
Start
|
High
|
962
|
Perfect hash function
|
4,400
|
141
|
C
|
Unknown
|
963
|
Context-free language
|
4,384
|
141
|
Start
|
Mid
|
964
|
Database design
|
4,382
|
141
|
C
|
High
|
965
|
Blue–green deployment
|
4,374
|
141
|
Stub
|
Low
|
966
|
Montgomery modular multiplication
|
4,359
|
140
|
C
|
Mid
|
967
|
Joy Buolamwini
|
4,356
|
140
|
C
|
Low
|
968
|
Chain-of-responsibility pattern
|
4,346
|
140
|
Stub
|
Unknown
|
969
|
Samsung Galaxy A03
|
4,343
|
140
|
Stub
|
Low
|
970
|
JSONP
|
4,336
|
139
|
C
|
Low
|
971
|
Database model
|
4,335
|
139
|
C
|
High
|
972
|
Challenge–response authentication
|
4,325
|
139
|
Start
|
Low
|
973
|
Min-max heap
|
4,323
|
139
|
Start
|
Mid
|
974
|
Fold (higher-order function)
|
4,322
|
139
|
Start
|
Mid
|
975
|
Physics engine
|
4,316
|
139
|
C
|
Unknown
|
976
|
Proxy pattern
|
4,316
|
139
|
Start
|
Mid
|
977
|
SHI International Corp
|
4,315
|
139
|
Start
|
Low
|
978
|
Iterative deepening depth-first search
|
4,311
|
139
|
C
|
Low
|
979
|
Information management
|
4,304
|
138
|
C
|
Low
|
980
|
Operator overloading
|
4,301
|
138
|
C
|
Mid
|
981
|
Profiling (computer programming)
|
4,288
|
138
|
C
|
Mid
|
982
|
Method (computer programming)
|
4,287
|
138
|
C
|
High
|
983
|
Semantic network
|
4,287
|
138
|
Start
|
Low
|
984
|
Artificial Intelligence: A Modern Approach
|
4,280
|
138
|
Start
|
Unknown
|
985
|
First-class function
|
4,272
|
137
|
C
|
High
|
986
|
Edmonds–Karp algorithm
|
4,271
|
137
|
Start
|
Mid
|
987
|
Cook–Levin theorem
|
4,266
|
137
|
B
|
High
|
988
|
Stack machine
|
4,260
|
137
|
C
|
Mid
|
989
|
Semantic data model
|
4,256
|
137
|
Start
|
Unknown
|
990
|
Parametric design
|
4,231
|
136
|
Start
|
Unknown
|
991
|
Type safety
|
4,230
|
136
|
C
|
Mid
|
992
|
Mock object
|
4,229
|
136
|
Start
|
Low
|
993
|
Search engine indexing
|
4,218
|
136
|
C
|
Unknown
|
994
|
Online machine learning
|
4,211
|
135
|
C
|
Mid
|
995
|
Pseudorandom binary sequence
|
4,202
|
135
|
Start
|
Mid
|
996
|
Continuation-passing style
|
4,196
|
135
|
Start
|
Mid
|
997
|
DPLL algorithm
|
4,194
|
135
|
Start
|
High
|
998
|
Partition problem
|
4,193
|
135
|
C
|
Unknown
|
999
|
Test case
|
4,182
|
134
|
Start
|
Low
|
1000
|
Complexity class
|
4,181
|
134
|
C
|
High
|