Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
Artificial intelligence
|
301,179
|
9,715
|
B
|
Top
|
2
|
Nvidia
|
254,349
|
8,204
|
B
|
Mid
|
3
|
Sergey Brin
|
214,186
|
6,909
|
GA
|
Mid
|
4
|
OpenAI
|
210,798
|
6,799
|
B
|
Mid
|
5
|
Computer
|
188,018
|
6,065
|
C
|
Top
|
6
|
C (programming language)
|
173,712
|
5,603
|
C
|
High
|
7
|
Python (programming language)
|
150,049
|
4,840
|
C
|
High
|
8
|
Google Search
|
141,097
|
4,551
|
C
|
High
|
9
|
Larry Page
|
131,684
|
4,247
|
B
|
High
|
10
|
IBM
|
111,637
|
3,601
|
B
|
Mid
|
11
|
HTML
|
101,202
|
3,264
|
B
|
High
|
12
|
R (programming language)
|
91,624
|
2,955
|
B
|
High
|
13
|
Video game
|
90,149
|
2,908
|
C
|
Mid
|
14
|
Machine learning
|
87,111
|
2,810
|
B
|
Top
|
15
|
JSON
|
86,780
|
2,799
|
B
|
High
|
16
|
CSS
|
86,308
|
2,784
|
B
|
High
|
17
|
Lex Fridman
|
83,047
|
2,678
|
C
|
Low
|
18
|
JavaScript
|
80,901
|
2,609
|
B
|
High
|
19
|
Cloud computing
|
75,487
|
2,435
|
C
|
Top
|
20
|
Quantum computing
|
73,567
|
2,373
|
B
|
High
|
21
|
Generative artificial intelligence
|
71,277
|
2,299
|
B
|
High
|
22
|
Information technology
|
71,059
|
2,292
|
C
|
Top
|
23
|
Regular expression
|
70,780
|
2,283
|
B
|
Top
|
24
|
C++
|
70,339
|
2,269
|
B
|
High
|
25
|
Chatbot
|
69,737
|
2,249
|
C
|
Low
|
26
|
Computer science
|
68,863
|
2,221
|
C
|
Top
|
27
|
Katherine Johnson
|
68,192
|
2,199
|
GA
|
High
|
28
|
Rust (programming language)
|
67,726
|
2,184
|
GA
|
High
|
29
|
Scratch (programming language)
|
66,394
|
2,141
|
C
|
Mid
|
30
|
Internet of things
|
65,543
|
2,114
|
B
|
Top
|
31
|
Turing test
|
62,126
|
2,004
|
B
|
Top
|
32
|
Blockchain
|
61,977
|
1,999
|
B
|
Top
|
33
|
Go (programming language)
|
59,207
|
1,909
|
B
|
High
|
34
|
Software
|
57,226
|
1,846
|
C
|
Top
|
35
|
Tim Berners-Lee
|
56,508
|
1,822
|
C
|
Top
|
36
|
Neural network (machine learning)
|
56,199
|
1,812
|
C
|
Top
|
37
|
UTF-8
|
55,965
|
1,805
|
B
|
Mid
|
38
|
SQL
|
54,148
|
1,746
|
C
|
Top
|
39
|
Object-oriented programming
|
53,608
|
1,729
|
B
|
Top
|
40
|
Dijkstra's algorithm
|
50,681
|
1,634
|
C
|
Top
|
41
|
Algorithm
|
50,533
|
1,630
|
C
|
Top
|
42
|
Assembly language
|
49,864
|
1,608
|
B
|
High
|
43
|
Artificial general intelligence
|
49,653
|
1,601
|
B
|
Mid
|
44
|
Programming language
|
49,432
|
1,594
|
C
|
Top
|
45
|
Programmer
|
49,314
|
1,590
|
C
|
Mid
|
46
|
Anthropic
|
46,761
|
1,508
|
C
|
Mid
|
47
|
Monte Carlo method
|
46,633
|
1,504
|
B
|
High
|
48
|
Information
|
46,193
|
1,490
|
C
|
Top
|
49
|
Grace Hopper
|
46,082
|
1,486
|
B
|
Top
|
50
|
Unix
|
45,620
|
1,471
|
B
|
High
|
51
|
Conway's Game of Life
|
45,452
|
1,466
|
B
|
High
|
52
|
Big O notation
|
44,862
|
1,447
|
B
|
Top
|
53
|
Data science
|
44,756
|
1,443
|
C
|
High
|
54
|
Abstraction
|
44,601
|
1,438
|
C
|
High
|
55
|
Database
|
44,589
|
1,438
|
C
|
Top
|
56
|
Computer hardware
|
44,570
|
1,437
|
C
|
Mid
|
57
|
Computer programming
|
41,844
|
1,349
|
C
|
Top
|
58
|
Agile software development
|
41,283
|
1,331
|
B
|
High
|
59
|
PHP
|
39,462
|
1,272
|
C
|
High
|
60
|
Node.js
|
39,420
|
1,271
|
C
|
High
|
61
|
C Sharp (programming language)
|
39,005
|
1,258
|
B
|
High
|
62
|
Millennium Prize Problems
|
38,607
|
1,245
|
C
|
Mid
|
63
|
Stable Diffusion
|
38,404
|
1,238
|
C
|
Low
|
64
|
Prisoner's dilemma
|
38,346
|
1,236
|
C
|
High
|
65
|
Diffie–Hellman key exchange
|
38,273
|
1,234
|
C
|
Mid
|
66
|
List of programming languages
|
37,500
|
1,209
|
List
|
High
|
67
|
In-place algorithm
|
37,200
|
1,200
|
Start
|
High
|
68
|
Web colors
|
37,151
|
1,198
|
C
|
Mid
|
69
|
Cryptography
|
37,125
|
1,197
|
C
|
Top
|
70
|
Hash function
|
36,632
|
1,181
|
C
|
Top
|
71
|
Order of operations
|
36,605
|
1,180
|
B
|
Mid
|
72
|
Travelling salesman problem
|
36,564
|
1,179
|
B
|
High
|
73
|
Deep learning
|
36,509
|
1,177
|
C
|
Top
|
74
|
Turing machine
|
36,438
|
1,175
|
B
|
Top
|
75
|
Secure Shell
|
36,140
|
1,165
|
C
|
Low
|
76
|
A* search algorithm
|
36,032
|
1,162
|
B
|
Mid
|
77
|
Free and open-source software
|
35,909
|
1,158
|
C
|
Top
|
78
|
Tower of Hanoi
|
35,567
|
1,147
|
C
|
Mid
|
79
|
XML
|
35,490
|
1,144
|
B
|
High
|
80
|
Robot
|
35,477
|
1,144
|
B
|
Top
|
81
|
Kernel (operating system)
|
34,785
|
1,122
|
B
|
High
|
82
|
P versus NP problem
|
34,559
|
1,114
|
B
|
Top
|
83
|
Scrum (software development)
|
33,718
|
1,087
|
C
|
High
|
84
|
Heuristic
|
33,500
|
1,080
|
C
|
Mid
|
85
|
Two's complement
|
33,214
|
1,071
|
C
|
High
|
86
|
Virtual reality
|
33,199
|
1,070
|
B
|
High
|
87
|
Generative pre-trained transformer
|
32,177
|
1,037
|
B
|
Mid
|
88
|
Cognition
|
32,019
|
1,032
|
C
|
Low
|
89
|
Fast Fourier transform
|
31,997
|
1,032
|
B
|
High
|
90
|
Open-source software
|
31,949
|
1,030
|
C
|
High
|
91
|
Software testing
|
31,717
|
1,023
|
C
|
Top
|
92
|
Floating-point arithmetic
|
31,623
|
1,020
|
B
|
Top
|
93
|
DevOps
|
31,214
|
1,006
|
C
|
Low
|
94
|
COBOL
|
30,949
|
998
|
C
|
High
|
95
|
Software engineering
|
30,941
|
998
|
C
|
Top
|
96
|
Fortran
|
30,794
|
993
|
C
|
Mid
|
97
|
Levenshtein distance
|
30,458
|
982
|
C
|
Mid
|
98
|
K-means clustering
|
30,088
|
970
|
C
|
Mid
|
99
|
IEEE 754
|
29,884
|
964
|
C
|
High
|
100
|
Support vector machine
|
29,641
|
956
|
C
|
Mid
|
101
|
Lua (programming language)
|
29,362
|
947
|
C
|
Mid
|
102
|
Augmented reality
|
29,271
|
944
|
B
|
High
|
103
|
High Efficiency Video Coding
|
28,885
|
931
|
B
|
Low
|
104
|
Graph theory
|
28,761
|
927
|
B
|
High
|
105
|
Lisp (programming language)
|
28,601
|
922
|
B
|
High
|
106
|
Data analysis
|
28,460
|
918
|
B
|
High
|
107
|
Dan Clancy
|
28,372
|
915
|
C
|
Unknown
|
108
|
Natural language processing
|
28,268
|
911
|
C
|
Top
|
109
|
Finite-state machine
|
28,159
|
908
|
B
|
Top
|
110
|
Self-driving car
|
27,926
|
900
|
B
|
High
|
111
|
Brainfuck
|
27,829
|
897
|
C
|
Low
|
112
|
Google DeepMind
|
27,643
|
891
|
C
|
Mid
|
113
|
Model–view–controller
|
27,050
|
872
|
C
|
Mid
|
114
|
Boolean algebra
|
26,997
|
870
|
C
|
High
|
115
|
Computer program
|
26,487
|
854
|
C
|
Top
|
116
|
RGB color model
|
26,361
|
850
|
B
|
Low
|
117
|
Advanced Video Coding
|
26,327
|
849
|
C
|
Low
|
118
|
Bash (Unix shell)
|
25,666
|
827
|
B
|
Mid
|
119
|
Malware
|
25,588
|
825
|
C
|
High
|
120
|
Generative adversarial network
|
25,530
|
823
|
B
|
Low
|
121
|
Quicksort
|
25,142
|
811
|
B
|
Top
|
122
|
Cosine similarity
|
25,009
|
806
|
C
|
Low
|
123
|
Alice and Bob
|
24,911
|
803
|
Start
|
Low
|
124
|
Discrete mathematics
|
24,840
|
801
|
B
|
Top
|
125
|
Functional programming
|
24,511
|
790
|
B
|
Top
|
126
|
Hash table
|
24,433
|
788
|
B
|
High
|
127
|
Vector graphics
|
24,424
|
787
|
Start
|
High
|
128
|
Softmax function
|
24,395
|
786
|
C
|
High
|
129
|
Single-precision floating-point format
|
24,259
|
782
|
C
|
Unknown
|
130
|
Cybernetics
|
23,401
|
754
|
C
|
Mid
|
131
|
Bitwise operation
|
23,278
|
750
|
C
|
High
|
132
|
Robotics
|
23,233
|
749
|
B
|
Top
|
133
|
MATLAB
|
23,169
|
747
|
B
|
High
|
134
|
Big data
|
22,984
|
741
|
B
|
High
|
135
|
Lambda calculus
|
22,897
|
738
|
B
|
High
|
136
|
Turing completeness
|
22,871
|
737
|
C
|
Top
|
137
|
Unified Modeling Language
|
22,869
|
737
|
C
|
High
|
138
|
Directed acyclic graph
|
22,698
|
732
|
GA
|
High
|
139
|
Information theory
|
22,686
|
731
|
B
|
Top
|
140
|
POSIX
|
22,579
|
728
|
B
|
Mid
|
141
|
De Morgan's laws
|
22,484
|
725
|
Start
|
High
|
142
|
First-order logic
|
22,386
|
722
|
B
|
High
|
143
|
Claude Shannon
|
22,224
|
716
|
C
|
High
|
144
|
Time complexity
|
22,217
|
716
|
B
|
High
|
145
|
Computer engineering
|
22,198
|
716
|
C
|
Top
|
146
|
Fast inverse square root
|
22,137
|
714
|
GA
|
Low
|
147
|
Backpropagation
|
22,127
|
713
|
C
|
High
|
148
|
Sorting algorithm
|
21,979
|
709
|
C
|
Top
|
149
|
Dynamic programming
|
21,896
|
706
|
B
|
Top
|
150
|
Ilya Sutskever
|
21,860
|
705
|
C
|
Mid
|
151
|
Compiler
|
21,830
|
704
|
C
|
Top
|
152
|
Institute of Electrical and Electronics Engineers
|
21,746
|
701
|
B
|
Top
|
153
|
Whitespace character
|
21,508
|
693
|
B
|
Mid
|
154
|
Geoffrey Hinton
|
21,317
|
687
|
C
|
Low
|
155
|
BASIC
|
21,237
|
685
|
C
|
Mid
|
156
|
AArch64
|
21,227
|
684
|
C
|
Low
|
157
|
Dennis Ritchie
|
21,207
|
684
|
Start
|
High
|
158
|
Linear programming
|
21,083
|
680
|
B
|
High
|
159
|
Software design pattern
|
21,071
|
679
|
C
|
High
|
160
|
HTML5
|
21,051
|
679
|
B
|
High
|
161
|
TypeScript
|
20,918
|
674
|
C
|
Low
|
162
|
BERT (language model)
|
20,778
|
670
|
B
|
Unknown
|
163
|
Usage share of operating systems
|
20,710
|
668
|
B
|
Mid
|
164
|
Optical character recognition
|
20,708
|
668
|
C
|
Mid
|
165
|
Binary search
|
20,586
|
664
|
FA
|
High
|
166
|
Data structure
|
20,452
|
659
|
C
|
Top
|
167
|
Don't repeat yourself
|
20,372
|
657
|
Start
|
Mid
|
168
|
AV1
|
20,364
|
656
|
B
|
Low
|
169
|
Floor and ceiling functions
|
20,356
|
656
|
B
|
Mid
|
170
|
Cache replacement policies
|
20,284
|
654
|
C
|
Mid
|
171
|
Shor's algorithm
|
20,201
|
651
|
C
|
Mid
|
172
|
Sieve of Eratosthenes
|
20,096
|
648
|
C
|
Mid
|
173
|
Erlang (programming language)
|
19,955
|
643
|
B
|
Mid
|
174
|
Computer architecture
|
19,762
|
637
|
C
|
Top
|
175
|
B-tree
|
19,692
|
635
|
C
|
High
|
176
|
Heap (data structure)
|
19,547
|
630
|
C
|
High
|
177
|
Ruby (programming language)
|
19,447
|
627
|
B
|
High
|
178
|
Cross-site request forgery
|
19,386
|
625
|
C
|
High
|
179
|
Qubit
|
19,360
|
624
|
C
|
High
|
180
|
Hallucination (artificial intelligence)
|
19,200
|
619
|
C
|
Low
|
181
|
Exclusive or
|
19,136
|
617
|
C
|
Mid
|
182
|
Diffusion model
|
19,096
|
616
|
B
|
Low
|
183
|
Halting problem
|
19,001
|
612
|
B
|
Top
|
184
|
NoSQL
|
18,800
|
606
|
C
|
High
|
185
|
Relational database
|
18,581
|
599
|
C
|
Top
|
186
|
Ben Horowitz
|
18,517
|
597
|
Start
|
Low
|
187
|
Ray tracing (graphics)
|
18,409
|
593
|
C
|
Mid
|
188
|
Trie
|
18,359
|
592
|
GA
|
High
|
189
|
Imo.im
|
18,293
|
590
|
Stub
|
Low
|
190
|
Ada (programming language)
|
18,231
|
588
|
C
|
High
|
191
|
Magic number (programming)
|
18,179
|
586
|
C
|
Mid
|
192
|
Knapsack problem
|
18,007
|
580
|
C
|
Mid
|
193
|
NP-hardness
|
17,933
|
578
|
C
|
High
|
194
|
Bioinformatics
|
17,915
|
577
|
C
|
High
|
195
|
Merge sort
|
17,892
|
577
|
C
|
High
|
196
|
Mathematical optimization
|
17,877
|
576
|
B
|
High
|
197
|
Huffman coding
|
17,727
|
571
|
C
|
High
|
198
|
Software development
|
17,674
|
570
|
C
|
Top
|
199
|
Haskell
|
17,652
|
569
|
B
|
Mid
|
200
|
NP-completeness
|
17,650
|
569
|
C
|
Top
|
201
|
Quantum logic gate
|
17,548
|
566
|
C
|
High
|
202
|
Red–black tree
|
17,534
|
565
|
C
|
High
|
203
|
Depth-first search
|
17,466
|
563
|
C
|
Top
|
204
|
Markov chain Monte Carlo
|
17,446
|
562
|
C
|
High
|
205
|
Information security
|
17,440
|
562
|
B
|
Top
|
206
|
Natalie Enright Jerger
|
17,344
|
559
|
Start
|
Unknown
|
207
|
Computer vision
|
17,278
|
557
|
C
|
Top
|
208
|
Machine code
|
17,179
|
554
|
C
|
Unknown
|
209
|
Attention (machine learning)
|
17,174
|
554
|
Start
|
Unknown
|
210
|
Perl
|
17,159
|
553
|
B
|
High
|
211
|
Edsger W. Dijkstra
|
17,121
|
552
|
B
|
Top
|
212
|
Stochastic gradient descent
|
17,042
|
549
|
Start
|
Mid
|
213
|
AI accelerator
|
17,031
|
549
|
B
|
Low
|
214
|
Array (data structure)
|
16,921
|
545
|
C
|
Top
|
215
|
Automaton
|
16,903
|
545
|
C
|
High
|
216
|
Source code
|
16,884
|
544
|
C
|
High
|
217
|
Recursion
|
16,591
|
535
|
C
|
Mid
|
218
|
Client–server model
|
16,547
|
533
|
C
|
High
|
219
|
Programming paradigm
|
16,530
|
533
|
C
|
Mid
|
220
|
AVIF
|
16,486
|
531
|
C
|
Low
|
221
|
Donald Knuth
|
16,459
|
530
|
B
|
Top
|
222
|
Free software
|
16,452
|
530
|
C
|
High
|
223
|
Smart city
|
16,396
|
528
|
C
|
Mid
|
224
|
Monad (functional programming)
|
16,356
|
527
|
B
|
Mid
|
225
|
Tensor Processing Unit
|
16,341
|
527
|
C
|
Mid
|
226
|
Breadth-first search
|
16,260
|
524
|
Start
|
Top
|
227
|
Hackathon
|
16,127
|
520
|
Start
|
Mid
|
228
|
Operations research
|
16,105
|
519
|
C
|
High
|
229
|
Topological sorting
|
15,995
|
515
|
C
|
High
|
230
|
Web development
|
15,971
|
515
|
Start
|
Mid
|
231
|
Ken Thompson
|
15,791
|
509
|
B
|
High
|
232
|
Type system
|
15,789
|
509
|
B
|
High
|
233
|
SNOBOL
|
15,785
|
509
|
C
|
Mid
|
234
|
Tree (data structure)
|
15,593
|
503
|
C
|
High
|
235
|
Category theory
|
15,418
|
497
|
B
|
High
|
236
|
Markup language
|
15,395
|
496
|
C
|
High
|
237
|
Groq
|
15,294
|
493
|
B
|
Unknown
|
238
|
Memetics
|
15,289
|
493
|
Start
|
Unknown
|
239
|
Applications of artificial intelligence
|
15,282
|
492
|
C
|
Low
|
240
|
ECMAScript
|
15,178
|
489
|
C
|
Mid
|
241
|
History of Python
|
15,073
|
486
|
C
|
Low
|
242
|
Extract, transform, load
|
15,041
|
485
|
Start
|
High
|
243
|
Turing Award
|
14,999
|
483
|
FL
|
Top
|
244
|
List of programming languages by type
|
14,964
|
482
|
List
|
High
|
245
|
Tf–idf
|
14,956
|
482
|
C
|
Low
|
246
|
Cluster analysis
|
14,953
|
482
|
C
|
High
|
247
|
Mistral AI
|
14,896
|
480
|
C
|
Low
|
248
|
Singleton pattern
|
14,891
|
480
|
C
|
Mid
|
249
|
Mobile device
|
14,836
|
478
|
Start
|
Low
|
250
|
Pareto efficiency
|
14,811
|
477
|
C
|
Mid
|
251
|
Business intelligence
|
14,797
|
477
|
Start
|
High
|
252
|
Genetic algorithm
|
14,786
|
476
|
C
|
High
|
253
|
Scala (programming language)
|
14,770
|
476
|
B
|
High
|
254
|
Data warehouse
|
14,736
|
475
|
Start
|
High
|
255
|
ISO/IEC 8859-1
|
14,715
|
474
|
Start
|
Unknown
|
256
|
Graph (discrete mathematics)
|
14,697
|
474
|
C
|
High
|
257
|
OCaml
|
14,658
|
472
|
C
|
Unknown
|
258
|
Variational autoencoder
|
14,622
|
471
|
C
|
Low
|
259
|
Data mining
|
14,537
|
468
|
B
|
High
|
260
|
High-level programming language
|
14,402
|
464
|
Start
|
High
|
261
|
Computing
|
14,338
|
462
|
B
|
High
|
262
|
Deep Blue (chess computer)
|
14,308
|
461
|
GA
|
Mid
|
263
|
Cognitive science
|
14,299
|
461
|
C
|
High
|
264
|
Data type
|
14,251
|
459
|
C
|
Top
|
265
|
Stack (abstract data type)
|
14,217
|
458
|
C
|
Top
|
266
|
Real-time operating system
|
14,206
|
458
|
Start
|
Mid
|
267
|
Pseudorandom number generator
|
14,019
|
452
|
C
|
Top
|
268
|
Information technology in India
|
13,917
|
448
|
C
|
Mid
|
269
|
Ajax (programming)
|
13,911
|
448
|
Start
|
High
|
270
|
Jaccard index
|
13,759
|
443
|
C
|
Mid
|
271
|
Julia (programming language)
|
13,678
|
441
|
B
|
High
|
272
|
Foobar
|
13,653
|
440
|
C
|
Mid
|
273
|
Luis von Ahn
|
13,634
|
439
|
Start
|
Low
|
274
|
Bubble sort
|
13,574
|
437
|
B
|
High
|
275
|
Activation function
|
13,547
|
437
|
Start
|
Mid
|
276
|
Binary tree
|
13,542
|
436
|
B
|
Top
|
277
|
Bad Apple!!
|
13,517
|
436
|
Start
|
Low
|
278
|
Imperative programming
|
13,465
|
434
|
C
|
Top
|
279
|
Busy beaver
|
13,448
|
433
|
C
|
Low
|
280
|
Snake case
|
13,424
|
433
|
Start
|
Low
|
281
|
Semaphore (programming)
|
13,383
|
431
|
Start
|
High
|
282
|
Liskov substitution principle
|
13,357
|
430
|
Start
|
Mid
|
283
|
Amdahl's law
|
13,268
|
428
|
C
|
High
|
284
|
Artificial intelligence art
|
13,257
|
427
|
C
|
Low
|
285
|
Insertion sort
|
13,233
|
426
|
B
|
High
|
286
|
Lenna
|
13,190
|
425
|
C
|
Unknown
|
287
|
Reed–Solomon error correction
|
13,171
|
424
|
C
|
Mid
|
288
|
Binary search tree
|
13,104
|
422
|
GA
|
High
|
289
|
Backus–Naur form
|
13,025
|
420
|
Start
|
Unknown
|
290
|
Cellular automaton
|
13,009
|
419
|
B
|
High
|
291
|
Behavior-driven development
|
12,994
|
419
|
B
|
Low
|
292
|
Visual Basic (.NET)
|
12,957
|
417
|
C
|
Mid
|
293
|
Distributed computing
|
12,931
|
417
|
B
|
Top
|
294
|
Race condition
|
12,861
|
414
|
C
|
Top
|
295
|
Humanoid robot
|
12,858
|
414
|
C
|
High
|
296
|
Garbage collection (computer science)
|
12,728
|
410
|
C
|
High
|
297
|
Okapi BM25
|
12,705
|
409
|
Start
|
Low
|
298
|
Human–computer interaction
|
12,647
|
407
|
C
|
Top
|
299
|
Bias–variance tradeoff
|
12,567
|
405
|
Start
|
Mid
|
300
|
IBM Watson
|
12,566
|
405
|
C
|
Mid
|
301
|
Version control
|
12,547
|
404
|
C
|
High
|
302
|
Linked list
|
12,528
|
404
|
C
|
Top
|
303
|
Rounding
|
12,527
|
404
|
C
|
Low
|
304
|
Raster graphics
|
12,494
|
403
|
C
|
Mid
|
305
|
Analytics
|
12,475
|
402
|
Start
|
High
|
306
|
Thread (computing)
|
12,462
|
402
|
C
|
High
|
307
|
Marvin Minsky
|
12,383
|
399
|
C
|
High
|
308
|
Half-precision floating-point format
|
12,383
|
399
|
C
|
Unknown
|
309
|
Run-length encoding
|
12,361
|
398
|
Start
|
Mid
|
310
|
Prolog
|
12,314
|
397
|
B
|
Mid
|
311
|
Dependency inversion principle
|
12,289
|
396
|
Start
|
Low
|
312
|
Objective-C
|
12,289
|
396
|
C
|
High
|
313
|
Automata theory
|
12,275
|
395
|
C
|
Top
|
314
|
Composition over inheritance
|
12,245
|
395
|
C
|
Low
|
315
|
Business Process Model and Notation
|
12,233
|
394
|
Start
|
Mid
|
316
|
Unit testing
|
12,200
|
393
|
C
|
Mid
|
317
|
Boolean satisfiability problem
|
12,049
|
388
|
C
|
Top
|
318
|
Bjarne Stroustrup
|
12,043
|
388
|
Start
|
High
|
319
|
Color depth
|
12,042
|
388
|
C
|
Low
|
320
|
Computational fluid dynamics
|
11,985
|
386
|
C
|
High
|
321
|
Robotic process automation
|
11,973
|
386
|
Start
|
Mid
|
322
|
Frontend and backend
|
11,938
|
385
|
Start
|
High
|
323
|
Formal language
|
11,925
|
384
|
C
|
High
|
324
|
String (computer science)
|
11,908
|
384
|
Start
|
High
|
325
|
Monte Carlo tree search
|
11,887
|
383
|
C
|
Mid
|
326
|
Tree traversal
|
11,874
|
383
|
C
|
High
|
327
|
Voxel
|
11,854
|
382
|
C
|
Mid
|
328
|
HTML element
|
11,821
|
381
|
C
|
Mid
|
329
|
Greg Brockman
|
11,817
|
381
|
C
|
Low
|
330
|
Multiplication sign
|
11,801
|
380
|
C
|
Low
|
331
|
Complex system
|
11,787
|
380
|
C
|
High
|
332
|
WebRTC
|
11,698
|
377
|
C
|
Low
|
333
|
Smalltalk
|
11,689
|
377
|
C
|
High
|
334
|
Computer graphics
|
11,675
|
376
|
B
|
Top
|
335
|
Checksum
|
11,607
|
374
|
Start
|
Mid
|
336
|
Nim
|
11,578
|
373
|
C
|
Unknown
|
337
|
W3Schools
|
11,559
|
372
|
Stub
|
Low
|
338
|
Parsing
|
11,508
|
371
|
Start
|
Top
|
339
|
Feedforward neural network
|
11,504
|
371
|
Unknown
|
Unknown
|
340
|
Microcode
|
11,492
|
370
|
C
|
Unknown
|
341
|
Inversion of control
|
11,379
|
367
|
C
|
Low
|
342
|
Data and information visualization
|
11,356
|
366
|
C
|
High
|
343
|
Internet Engineering Task Force
|
11,348
|
366
|
C
|
Mid
|
344
|
AVL tree
|
11,317
|
365
|
C
|
High
|
345
|
Brute-force attack
|
11,151
|
359
|
C
|
High
|
346
|
Autoencoder
|
11,074
|
357
|
C
|
High
|
347
|
Ontology (information science)
|
11,053
|
356
|
C
|
High
|
348
|
Hamming distance
|
10,975
|
354
|
Start
|
High
|
349
|
Software bug
|
10,966
|
353
|
B
|
High
|
350
|
Expectation–maximization algorithm
|
10,955
|
353
|
C
|
High
|
351
|
Esoteric programming language
|
10,954
|
353
|
Start
|
High
|
352
|
Numerical analysis
|
10,899
|
351
|
B
|
Top
|
353
|
AlphaGo
|
10,863
|
350
|
C
|
High
|
354
|
Bresenham's line algorithm
|
10,847
|
349
|
C
|
Mid
|
355
|
Procedural generation
|
10,846
|
349
|
C
|
Unknown
|
356
|
Effective accelerationism
|
10,816
|
348
|
C
|
Unknown
|
357
|
Existential risk from artificial general intelligence
|
10,812
|
348
|
B
|
Mid
|
358
|
Roblox Studio
|
10,793
|
348
|
Start
|
Low
|
359
|
Neural network
|
10,771
|
347
|
C
|
Low
|
360
|
Circular buffer
|
10,732
|
346
|
Start
|
Mid
|
361
|
Simplex algorithm
|
10,726
|
346
|
C
|
High
|
362
|
Greedy algorithm
|
10,709
|
345
|
C
|
High
|
363
|
Artificial Intelligence Act
|
10,699
|
345
|
C
|
Mid
|
364
|
Procedural programming
|
10,679
|
344
|
Start
|
Mid
|
365
|
Hungarian notation
|
10,658
|
343
|
Start
|
Low
|
366
|
Pseudocode
|
10,614
|
342
|
C
|
High
|
367
|
Continuous integration
|
10,603
|
342
|
B
|
Low
|
368
|
Cyclomatic complexity
|
10,589
|
341
|
C
|
Low
|
369
|
Instrumental convergence
|
10,549
|
340
|
C
|
Low
|
370
|
Decision theory
|
10,499
|
338
|
C
|
High
|
371
|
Factory method pattern
|
10,493
|
338
|
Start
|
Mid
|
372
|
Signal processing
|
10,404
|
335
|
C
|
Low
|
373
|
APL (programming language)
|
10,348
|
333
|
B
|
Mid
|
374
|
Garlin Gilchrist
|
10,347
|
333
|
C
|
Low
|
375
|
The Art of Computer Programming
|
10,334
|
333
|
C
|
High
|
376
|
List of fictional computers
|
10,329
|
333
|
List
|
Low
|
377
|
Proxy auto-config
|
10,318
|
332
|
C
|
Unknown
|
378
|
Actor model
|
10,310
|
332
|
C
|
Mid
|
379
|
K-d tree
|
10,295
|
332
|
C
|
Low
|
380
|
Disjoint-set data structure
|
10,285
|
331
|
C
|
High
|
381
|
Observer pattern
|
10,244
|
330
|
Start
|
Mid
|
382
|
Declarative programming
|
10,241
|
330
|
C
|
Top
|
383
|
AlphaFold
|
10,215
|
329
|
C
|
Low
|
384
|
QBittorrent
|
10,185
|
328
|
Start
|
Low
|
385
|
Mojo (programming language)
|
10,121
|
326
|
C
|
Unknown
|
386
|
Boolean data type
|
10,108
|
326
|
Start
|
Low
|
387
|
Ruchi Sanghvi
|
10,082
|
325
|
C
|
Mid
|
388
|
NP (complexity)
|
10,075
|
325
|
C
|
High
|
389
|
Email spoofing
|
10,031
|
323
|
Start
|
Low
|
390
|
Lossless compression
|
10,006
|
322
|
C
|
High
|
391
|
Residual neural network
|
9,968
|
321
|
C
|
Low
|
392
|
Unsupervised learning
|
9,928
|
320
|
C
|
Mid
|
393
|
The Open Group Architecture Framework
|
9,920
|
320
|
Start
|
High
|
394
|
System administrator
|
9,909
|
319
|
C
|
High
|
395
|
Parallel computing
|
9,904
|
319
|
FA
|
Top
|
396
|
Adjacency matrix
|
9,887
|
318
|
C
|
Mid
|
397
|
Lexical analysis
|
9,832
|
317
|
C
|
High
|
398
|
State machine replication
|
9,801
|
316
|
C
|
High
|
399
|
Retrieval-augmented generation
|
9,791
|
315
|
C
|
Unknown
|
400
|
Software development process
|
9,786
|
315
|
C
|
Mid
|
401
|
Visitor pattern
|
9,781
|
315
|
Start
|
Unknown
|
402
|
Kernel (image processing)
|
9,732
|
313
|
Unknown
|
High
|
403
|
Computer science and engineering
|
9,721
|
313
|
Start
|
Low
|
404
|
Sobel operator
|
9,710
|
313
|
C
|
Low
|
405
|
Colossus computer
|
9,703
|
313
|
B
|
Mid
|
406
|
Sankey diagram
|
9,683
|
312
|
C
|
Low
|
407
|
Computational complexity theory
|
9,631
|
310
|
B
|
Top
|
408
|
Role-based access control
|
9,600
|
309
|
C
|
Mid
|
409
|
Strategy pattern
|
9,587
|
309
|
Start
|
Mid
|
410
|
Hamming code
|
9,560
|
308
|
C
|
High
|
411
|
Data-flow diagram
|
9,508
|
306
|
Start
|
Mid
|
412
|
Physics-informed neural networks
|
9,508
|
306
|
Unknown
|
Low
|
413
|
Matroska
|
9,494
|
306
|
C
|
Mid
|
414
|
Type theory
|
9,475
|
305
|
C
|
High
|
415
|
Bellman–Ford algorithm
|
9,442
|
304
|
C
|
Mid
|
416
|
Ackermann function
|
9,383
|
302
|
B
|
Mid
|
417
|
Expert system
|
9,376
|
302
|
Start
|
Mid
|
418
|
Theoretical computer science
|
9,368
|
302
|
B
|
Top
|
419
|
Cell (processor)
|
9,364
|
302
|
B
|
Mid
|
420
|
Linear congruential generator
|
9,329
|
300
|
Start
|
Mid
|
421
|
Artificial consciousness
|
9,321
|
300
|
C
|
Unknown
|
422
|
Abstract data type
|
9,301
|
300
|
C
|
High
|
423
|
Rendering (computer graphics)
|
9,250
|
298
|
B
|
High
|
424
|
Sparse matrix
|
9,244
|
298
|
C
|
Mid
|
425
|
Naming convention (programming)
|
9,204
|
296
|
Start
|
Unknown
|
426
|
Shortest path problem
|
9,170
|
295
|
C
|
High
|
427
|
Chomsky hierarchy
|
9,119
|
294
|
C
|
High
|
428
|
Extended ASCII
|
9,093
|
293
|
C
|
Low
|
429
|
Identity management
|
8,999
|
290
|
C
|
High
|
430
|
Context-free grammar
|
8,998
|
290
|
B
|
Top
|
431
|
Iris flower data set
|
8,889
|
286
|
Start
|
Mid
|
432
|
Memory management
|
8,857
|
285
|
C
|
High
|
433
|
Integer (computer science)
|
8,844
|
285
|
C
|
Mid
|
434
|
Closure (computer programming)
|
8,844
|
285
|
C
|
Mid
|
435
|
ABAP
|
8,844
|
285
|
C
|
High
|
436
|
Grover's algorithm
|
8,831
|
284
|
C
|
Mid
|
437
|
Priority queue
|
8,829
|
284
|
C
|
High
|
438
|
Function (computer programming)
|
8,826
|
284
|
C
|
High
|
439
|
DBSCAN
|
8,805
|
284
|
C
|
Mid
|
440
|
Grayscale
|
8,804
|
284
|
Start
|
Mid
|
441
|
Heuristic (computer science)
|
8,803
|
283
|
Unknown
|
Unknown
|
442
|
Minimum spanning tree
|
8,787
|
283
|
C
|
High
|
443
|
Recursion (computer science)
|
8,776
|
283
|
C
|
Top
|
444
|
Abstraction (computer science)
|
8,766
|
282
|
C
|
Top
|
445
|
Code
|
8,761
|
282
|
C
|
High
|
446
|
Strong and weak typing
|
8,756
|
282
|
Start
|
Mid
|
447
|
Hierarchical clustering
|
8,732
|
281
|
C
|
Mid
|
448
|
Quadtree
|
8,678
|
279
|
C
|
Mid
|
449
|
Robert C. Martin
|
8,664
|
279
|
Start
|
Mid
|
450
|
Class diagram
|
8,655
|
279
|
Start
|
Low
|
451
|
Federated learning
|
8,630
|
278
|
Start
|
Low
|
452
|
Timsort
|
8,622
|
278
|
C
|
Mid
|
453
|
Maximum subarray problem
|
8,608
|
277
|
Unknown
|
Unknown
|
454
|
Sridhar Ramaswamy
|
8,573
|
276
|
Start
|
Low
|
455
|
Online analytical processing
|
8,454
|
272
|
C
|
Mid
|
456
|
Pointer (computer programming)
|
8,434
|
272
|
C
|
High
|
457
|
Knowledge graph
|
8,432
|
272
|
Start
|
High
|
458
|
Information science
|
8,428
|
271
|
C
|
Top
|
459
|
Kolmogorov complexity
|
8,426
|
271
|
B
|
High
|
460
|
Password cracking
|
8,419
|
271
|
C
|
Low
|
461
|
List of tools for static code analysis
|
8,419
|
271
|
List
|
Low
|
462
|
Microkernel
|
8,393
|
270
|
C
|
High
|
463
|
List of datasets for machine-learning research
|
8,387
|
270
|
List
|
Mid
|
464
|
Floyd–Warshall algorithm
|
8,366
|
269
|
B
|
High
|
465
|
Search algorithm
|
8,327
|
268
|
Start
|
Top
|
466
|
Intelligent agent
|
8,326
|
268
|
Start
|
Unknown
|
467
|
Ensemble learning
|
8,310
|
268
|
C
|
Mid
|
468
|
Andrey Kolmogorov
|
8,305
|
267
|
C
|
High
|
469
|
Code page 437
|
8,301
|
267
|
C
|
Low
|
470
|
Logo (programming language)
|
8,289
|
267
|
Start
|
Mid
|
471
|
Hindley–Milner type system
|
8,275
|
266
|
B
|
High
|
472
|
Macro (computer science)
|
8,273
|
266
|
C
|
Mid
|
473
|
HackerRank
|
8,263
|
266
|
Start
|
Unknown
|
474
|
Graph coloring
|
8,241
|
265
|
B
|
Mid
|
475
|
Master theorem (analysis of algorithms)
|
8,205
|
264
|
C
|
High
|
476
|
C++23
|
8,192
|
264
|
C
|
Low
|
477
|
Units of information
|
8,183
|
263
|
C
|
Mid
|
478
|
Encapsulation (computer programming)
|
8,171
|
263
|
Start
|
High
|
479
|
System call
|
8,122
|
262
|
C
|
Low
|
480
|
Particle swarm optimization
|
8,116
|
261
|
C
|
Mid
|
481
|
Google Brain
|
8,048
|
259
|
C
|
Mid
|
482
|
Computational linguistics
|
8,034
|
259
|
C
|
High
|
483
|
Symbolic artificial intelligence
|
8,019
|
258
|
Start
|
Mid
|
484
|
Quick, Draw!
|
7,990
|
257
|
Stub
|
Low
|
485
|
Cut, copy, and paste
|
7,984
|
257
|
C
|
Mid
|
486
|
Anti-pattern
|
7,967
|
257
|
C
|
Mid
|
487
|
Raft (algorithm)
|
7,949
|
256
|
C
|
Low
|
488
|
Rule 110
|
7,940
|
256
|
Start
|
Mid
|
489
|
Binary heap
|
7,921
|
255
|
B
|
High
|
490
|
User error
|
7,907
|
255
|
Start
|
High
|
491
|
Canny edge detector
|
7,876
|
254
|
Start
|
Mid
|
492
|
ActivityPub
|
7,865
|
253
|
C
|
Low
|
493
|
Knuth–Morris–Pratt algorithm
|
7,840
|
252
|
Start
|
High
|
494
|
8-bit computing
|
7,785
|
251
|
Start
|
High
|
495
|
Directed graph
|
7,738
|
249
|
C
|
High
|
496
|
Data model
|
7,730
|
249
|
C
|
High
|
497
|
Aspect-oriented programming
|
7,715
|
248
|
Start
|
Mid
|
498
|
Curiously recurring template pattern
|
7,682
|
247
|
C
|
Low
|
499
|
Numerical integration
|
7,665
|
247
|
B
|
Mid
|
500
|
Avast
|
7,657
|
247
|
B
|
Mid
|
501
|
Futures studies
|
7,632
|
246
|
B
|
Low
|
502
|
Heapsort
|
7,623
|
245
|
B
|
High
|
503
|
Neuromorphic engineering
|
7,612
|
245
|
B
|
Low
|
504
|
Branch predictor
|
7,534
|
243
|
C
|
Mid
|
505
|
Rob Pike
|
7,510
|
242
|
Start
|
Unknown
|
506
|
Npm left-pad incident
|
7,507
|
242
|
GA
|
Low
|
507
|
Multiplication algorithm
|
7,494
|
241
|
C
|
Low
|
508
|
Coroutine
|
7,471
|
241
|
C
|
Mid
|
509
|
Ant colony optimization algorithms
|
7,437
|
239
|
B
|
Low
|
510
|
Data modeling
|
7,422
|
239
|
C
|
High
|
511
|
Real-time computing
|
7,393
|
238
|
C
|
High
|
512
|
Division algorithm
|
7,387
|
238
|
C
|
High
|
513
|
Intrusion detection system
|
7,362
|
237
|
Start
|
Low
|
514
|
AWK
|
7,349
|
237
|
B
|
Mid
|
515
|
Shift register
|
7,315
|
235
|
Start
|
Unknown
|
516
|
15.ai
|
7,234
|
233
|
GA
|
Low
|
517
|
Extended Backus–Naur form
|
7,224
|
233
|
C
|
Mid
|
518
|
Prim's algorithm
|
7,218
|
232
|
C
|
High
|
519
|
List
|
7,205
|
232
|
C
|
Mid
|
520
|
Computation
|
7,200
|
232
|
Start
|
Top
|
521
|
Radix sort
|
7,192
|
232
|
Start
|
High
|
522
|
Shunting yard algorithm
|
7,191
|
231
|
Unknown
|
Unknown
|
523
|
Algebraic data type
|
7,186
|
231
|
Start
|
Low
|
524
|
Error
|
7,147
|
230
|
Start
|
Mid
|
525
|
Bogosort
|
7,107
|
229
|
Start
|
Low
|
526
|
Ethics of artificial intelligence
|
7,076
|
228
|
B
|
Top
|
527
|
Quantum key distribution
|
7,046
|
227
|
B
|
Mid
|
528
|
Relational algebra
|
7,017
|
226
|
C
|
Mid
|
529
|
Mean time between failures
|
6,978
|
225
|
C
|
Low
|
530
|
Currying
|
6,975
|
225
|
C
|
High
|
531
|
Row- and column-major order
|
6,959
|
224
|
C
|
Mid
|
532
|
Ones' complement
|
6,954
|
224
|
Start
|
Mid
|
533
|
List of unsolved problems in computer science
|
6,951
|
224
|
List
|
Mid
|
534
|
Time formatting and storage bugs
|
6,945
|
224
|
B
|
Low
|
535
|
Structured programming
|
6,940
|
223
|
C
|
Mid
|
536
|
Decorator pattern
|
6,898
|
222
|
Start
|
Low
|
537
|
Prefix sum
|
6,892
|
222
|
Unknown
|
Unknown
|
538
|
Call stack
|
6,889
|
222
|
C
|
Mid
|
539
|
Dining philosophers problem
|
6,871
|
221
|
C
|
High
|
540
|
Memory leak
|
6,869
|
221
|
C
|
Mid
|
541
|
Builder pattern
|
6,855
|
221
|
Start
|
Unknown
|
542
|
Skip list
|
6,837
|
220
|
C
|
Mid
|
543
|
Selection sort
|
6,828
|
220
|
C
|
High
|
544
|
Front-end web development
|
6,826
|
220
|
Start
|
High
|
545
|
General-purpose programming language
|
6,822
|
220
|
Stub
|
Mid
|
546
|
Theory of computation
|
6,807
|
219
|
C
|
Top
|
547
|
Cryptographically secure pseudorandom number generator
|
6,795
|
219
|
C
|
High
|
548
|
Informatics
|
6,794
|
219
|
C
|
Mid
|
549
|
Coupling (computer programming)
|
6,782
|
218
|
Start
|
High
|
550
|
VP9
|
6,773
|
218
|
B
|
Low
|
551
|
16K resolution
|
6,743
|
217
|
Start
|
Unknown
|
552
|
Stochastic parrot
|
6,729
|
217
|
Start
|
Unknown
|
553
|
List of pioneers in computer science
|
6,712
|
216
|
List
|
High
|
554
|
Ogg
|
6,700
|
216
|
B
|
Unknown
|
555
|
Ashish Vaswani
|
6,676
|
215
|
Start
|
Low
|
556
|
Deterministic finite automaton
|
6,674
|
215
|
Start
|
High
|
557
|
List of hash functions
|
6,666
|
215
|
List
|
Low
|
558
|
Open-source license
|
6,665
|
215
|
GA
|
High
|
559
|
Damerau–Levenshtein distance
|
6,645
|
214
|
Start
|
Low
|
560
|
Tail call
|
6,606
|
213
|
C
|
Mid
|
561
|
Substructure search
|
6,592
|
212
|
Start
|
Mid
|
562
|
Hyper-threading
|
6,586
|
212
|
C
|
Low
|
563
|
Sudoku solving algorithms
|
6,578
|
212
|
B
|
Low
|
564
|
Classification
|
6,575
|
212
|
C
|
Mid
|
565
|
Check digit
|
6,523
|
210
|
C
|
Mid
|
566
|
Kruskal's algorithm
|
6,521
|
210
|
Start
|
High
|
567
|
Adapter pattern
|
6,504
|
209
|
Start
|
Unknown
|
568
|
Planar graph
|
6,480
|
209
|
B
|
Mid
|
569
|
List of data structures
|
6,466
|
208
|
List
|
High
|
570
|
R-tree
|
6,445
|
207
|
C
|
Mid
|
571
|
Chernoff bound
|
6,416
|
206
|
Start
|
Low
|
572
|
Static program analysis
|
6,410
|
206
|
C
|
Mid
|
573
|
Named-entity recognition
|
6,396
|
206
|
C
|
Unknown
|
574
|
Maze generation algorithm
|
6,381
|
205
|
Start
|
Unknown
|
575
|
Logic programming
|
6,374
|
205
|
C
|
Top
|
576
|
Ladder logic
|
6,355
|
205
|
C
|
Low
|
577
|
Church–Turing thesis
|
6,316
|
203
|
C
|
Top
|
578
|
Scaled agile framework
|
6,310
|
203
|
C
|
Low
|
579
|
Radix tree
|
6,308
|
203
|
C
|
Mid
|
580
|
POST (HTTP)
|
6,305
|
203
|
Start
|
Low
|
581
|
Spaghetti code
|
6,301
|
203
|
Start
|
Mid
|
582
|
Judea Pearl
|
6,297
|
203
|
C
|
Mid
|
583
|
EBCDIC
|
6,288
|
202
|
Start
|
Mid
|
584
|
Error detection and correction
|
6,280
|
202
|
C
|
High
|
585
|
JavaScript engine
|
6,279
|
202
|
Start
|
Mid
|
586
|
Computational biology
|
6,255
|
201
|
C
|
High
|
587
|
Compilers: Principles, Techniques, and Tools
|
6,254
|
201
|
Stub
|
Low
|
588
|
For loop
|
6,253
|
201
|
B
|
High
|
589
|
Avast Antivirus
|
6,250
|
201
|
Start
|
Mid
|
590
|
Neuro-symbolic AI
|
6,249
|
201
|
Start
|
Low
|
591
|
MurmurHash
|
6,246
|
201
|
Start
|
Low
|
592
|
Control flow
|
6,240
|
201
|
B
|
Top
|
593
|
Paxos (computer science)
|
6,229
|
200
|
C
|
Low
|
594
|
Inheritance (object-oriented programming)
|
6,218
|
200
|
Start
|
Mid
|
595
|
Shannon–Hartley theorem
|
6,217
|
200
|
C
|
High
|
596
|
Triple DES
|
6,215
|
200
|
Start
|
Unknown
|
597
|
Vision transformer
|
6,202
|
200
|
C
|
Low
|
598
|
Pareto front
|
6,188
|
199
|
Start
|
Unknown
|
599
|
C--
|
6,185
|
199
|
Start
|
Low
|
600
|
Log-structured merge-tree
|
6,179
|
199
|
Start
|
Mid
|
601
|
JPEG 2000
|
6,161
|
198
|
C
|
Low
|
602
|
Batch normalization
|
6,136
|
197
|
C
|
Low
|
603
|
Interface (computing)
|
6,129
|
197
|
C
|
Low
|
604
|
Prediction
|
6,123
|
197
|
Start
|
Low
|
605
|
Two-phase commit protocol
|
6,103
|
196
|
C
|
High
|
606
|
All-points bulletin
|
6,095
|
196
|
C
|
Low
|
607
|
L-system
|
6,081
|
196
|
B
|
Unknown
|
608
|
Agent-based model
|
6,072
|
195
|
B
|
Mid
|
609
|
Association for Computing Machinery
|
6,065
|
195
|
C
|
Top
|
610
|
Web API
|
6,063
|
195
|
Start
|
Unknown
|
611
|
Multimodal learning
|
6,052
|
195
|
C
|
Low
|
612
|
Common Lisp
|
6,046
|
195
|
B
|
High
|
613
|
Event-driven programming
|
6,033
|
194
|
Start
|
High
|
614
|
Conditional (computer programming)
|
6,004
|
193
|
C
|
Mid
|
615
|
Queue (abstract data type)
|
6,003
|
193
|
Start
|
Top
|
616
|
Routing
|
5,997
|
193
|
C
|
Mid
|
617
|
Zero-shot learning
|
5,982
|
192
|
C
|
Mid
|
618
|
Subnormal number
|
5,978
|
192
|
C
|
Low
|
619
|
Web developer
|
5,970
|
192
|
Start
|
Mid
|
620
|
Computational science
|
5,963
|
192
|
C
|
High
|
621
|
Subset sum problem
|
5,940
|
191
|
C
|
Low
|
622
|
ALGOL
|
5,931
|
191
|
C
|
High
|
623
|
Anomaly detection
|
5,929
|
191
|
Start
|
Mid
|
624
|
Primality test
|
5,927
|
191
|
Start
|
Mid
|
625
|
B+ tree
|
5,926
|
191
|
Start
|
High
|
626
|
Kai-Fu Lee
|
5,921
|
191
|
Start
|
Unknown
|
627
|
Relational model
|
5,896
|
190
|
C
|
Top
|
628
|
Limited-memory BFGS
|
5,887
|
189
|
Unknown
|
Unknown
|
629
|
C99
|
5,857
|
188
|
C
|
Mid
|
630
|
Lossy compression
|
5,853
|
188
|
Start
|
High
|
631
|
Consistent hashing
|
5,851
|
188
|
Stub
|
Unknown
|
632
|
Code smell
|
5,842
|
188
|
C
|
Low
|
633
|
Maze-solving algorithm
|
5,800
|
187
|
Unknown
|
Unknown
|
634
|
Miller–Rabin primality test
|
5,794
|
186
|
C
|
High
|
635
|
Jaro–Winkler distance
|
5,790
|
186
|
Start
|
Unknown
|
636
|
Search engine indexing
|
5,777
|
186
|
C
|
Unknown
|
637
|
Amortized analysis
|
5,774
|
186
|
Start
|
High
|
638
|
Containerization (computing)
|
5,770
|
186
|
Start
|
Low
|
639
|
Basic Linear Algebra Subprograms
|
5,764
|
185
|
C
|
Low
|
640
|
HyperLogLog
|
5,760
|
185
|
C
|
Unknown
|
641
|
Parsing expression grammar
|
5,739
|
185
|
B
|
Mid
|
642
|
Carbon (programming language)
|
5,698
|
183
|
Start
|
Low
|
643
|
Text-to-image model
|
5,690
|
183
|
Unknown
|
Unknown
|
644
|
Lowest common ancestor
|
5,672
|
182
|
Start
|
Unknown
|
645
|
Curry–Howard correspondence
|
5,655
|
182
|
C
|
High
|
646
|
Multiple inheritance
|
5,647
|
182
|
C
|
Mid
|
647
|
Hamming weight
|
5,647
|
182
|
C
|
Unknown
|
648
|
Higher-order function
|
5,642
|
182
|
Start
|
High
|
649
|
Quantum information
|
5,641
|
181
|
Start
|
High
|
650
|
Supercomputing in India
|
5,640
|
181
|
C
|
Mid
|
651
|
Associative array
|
5,608
|
180
|
C
|
High
|
652
|
Evolutionary algorithm
|
5,605
|
180
|
C
|
Mid
|
653
|
Leslie Lamport
|
5,603
|
180
|
C
|
High
|
654
|
Combinatorial optimization
|
5,602
|
180
|
C
|
Top
|
655
|
David J. Malan
|
5,602
|
180
|
C
|
Unknown
|
656
|
Command pattern
|
5,597
|
180
|
Start
|
Mid
|
657
|
Glossary of graph theory
|
5,594
|
180
|
List
|
Mid
|
658
|
Swarm intelligence
|
5,593
|
180
|
C
|
Mid
|
659
|
Anonymous function
|
5,580
|
180
|
C
|
Mid
|
660
|
Bytecode
|
5,561
|
179
|
Start
|
Unknown
|
661
|
DeepDream
|
5,560
|
179
|
Start
|
Low
|
662
|
Strassen algorithm
|
5,538
|
178
|
C
|
Low
|
663
|
Concurrency (computer science)
|
5,524
|
178
|
Start
|
Top
|
664
|
Data structure alignment
|
5,521
|
178
|
Start
|
Mid
|
665
|
Vorbis
|
5,515
|
177
|
B
|
Low
|
666
|
Recursive descent parser
|
5,511
|
177
|
Start
|
High
|
667
|
Pointing stick
|
5,511
|
177
|
C
|
Low
|
668
|
Andrew S. Tanenbaum
|
5,480
|
176
|
C
|
Mid
|
669
|
Formal verification
|
5,480
|
176
|
Start
|
High
|
670
|
Moravec's paradox
|
5,456
|
176
|
Start
|
Mid
|
671
|
Graph (abstract data type)
|
5,448
|
175
|
C
|
Top
|
672
|
Dice-Sørensen coefficient
|
5,440
|
175
|
C
|
Low
|
673
|
No free lunch theorem
|
5,433
|
175
|
Start
|
Mid
|
674
|
Quantum algorithm
|
5,432
|
175
|
C
|
High
|
675
|
List of NP-complete problems
|
5,427
|
175
|
List
|
High
|
676
|
Locality-sensitive hashing
|
5,387
|
173
|
C
|
Unknown
|
677
|
Quantum engineering
|
5,367
|
173
|
Start
|
Low
|
678
|
Tony Hoare
|
5,353
|
172
|
C
|
High
|
679
|
Formal methods
|
5,346
|
172
|
C
|
Top
|
680
|
Computational thinking
|
5,344
|
172
|
Start
|
Unknown
|
681
|
Static single-assignment form
|
5,334
|
172
|
C
|
Mid
|
682
|
Computer scientist
|
5,331
|
171
|
Start
|
Top
|
683
|
Adam D'Angelo
|
5,307
|
171
|
Start
|
Low
|
684
|
Communicating sequential processes
|
5,293
|
170
|
B
|
High
|
685
|
CORDIC
|
5,288
|
170
|
B
|
Mid
|
686
|
Edge detection
|
5,278
|
170
|
C
|
Mid
|
687
|
Class (computer programming)
|
5,275
|
170
|
Start
|
High
|
688
|
Longest common subsequence
|
5,269
|
169
|
Start
|
High
|
689
|
Signed number representations
|
5,269
|
169
|
C
|
High
|
690
|
GPS Exchange Format
|
5,252
|
169
|
C
|
Low
|
691
|
Soundex
|
5,249
|
169
|
C
|
Unknown
|
692
|
Datalog
|
5,245
|
169
|
B
|
Mid
|
693
|
Binary space partitioning
|
5,238
|
168
|
C
|
Low
|
694
|
Variable (computer science)
|
5,238
|
168
|
Start
|
Top
|
695
|
Boyer–Moore string-search algorithm
|
5,236
|
168
|
C
|
High
|
696
|
Consensus (computer science)
|
5,234
|
168
|
Start
|
High
|
697
|
Bill Joy
|
5,227
|
168
|
C
|
Unknown
|
698
|
Domain fronting
|
5,214
|
168
|
Start
|
Unknown
|
699
|
Linker (computing)
|
5,178
|
167
|
C
|
Mid
|
700
|
Women and video games
|
5,177
|
167
|
B
|
Mid
|
701
|
Raj Reddy
|
5,176
|
166
|
B
|
Unknown
|
702
|
Alonzo Church
|
5,170
|
166
|
C
|
Top
|
703
|
Fourth-generation programming language
|
5,168
|
166
|
Start
|
Mid
|
704
|
Loab
|
5,161
|
166
|
C
|
Low
|
705
|
Lempel–Ziv–Welch
|
5,157
|
166
|
C
|
Unknown
|
706
|
Identifier
|
5,141
|
165
|
Start
|
Low
|
707
|
Multi-agent system
|
5,126
|
165
|
Start
|
Mid
|
708
|
Object-oriented analysis and design
|
5,119
|
165
|
Start
|
High
|
709
|
CS50
|
5,087
|
164
|
Start
|
Low
|
710
|
Binary-to-text encoding
|
5,078
|
163
|
C
|
Low
|
711
|
Mixin
|
5,073
|
163
|
Start
|
Low
|
712
|
Attribute-based access control
|
5,038
|
162
|
C
|
Mid
|
713
|
Formal grammar
|
5,033
|
162
|
C
|
Mid
|
714
|
Covariance and contravariance (computer science)
|
5,011
|
161
|
Start
|
High
|
715
|
Generalized additive model
|
4,980
|
160
|
Start
|
Low
|
716
|
Directory (computing)
|
4,962
|
160
|
C
|
Low
|
717
|
Scope (computer science)
|
4,960
|
160
|
C
|
High
|
718
|
Fixed-point combinator
|
4,958
|
159
|
C
|
Mid
|
719
|
Edit distance
|
4,944
|
159
|
C
|
Mid
|
720
|
Gladys West
|
4,944
|
159
|
B
|
Low
|
721
|
CalyxOS
|
4,933
|
159
|
C
|
Low
|
722
|
Computability theory
|
4,930
|
159
|
B
|
Top
|
723
|
Comparison of integrated development environments
|
4,930
|
159
|
Start
|
Low
|
724
|
Extended reality
|
4,912
|
158
|
Stub
|
Low
|
725
|
Evaluation strategy
|
4,881
|
157
|
C
|
Top
|
726
|
Vehicle routing problem
|
4,881
|
157
|
C
|
Unknown
|
727
|
Tagged union
|
4,880
|
157
|
Start
|
Low
|
728
|
Distributed version control
|
4,878
|
157
|
Start
|
Mid
|
729
|
Computational complexity
|
4,874
|
157
|
C
|
Top
|
730
|
Digital data
|
4,864
|
156
|
C
|
Low
|
731
|
Dartmouth workshop
|
4,857
|
156
|
Start
|
Low
|
732
|
Boids
|
4,853
|
156
|
Unknown
|
Unknown
|
733
|
Beam search
|
4,845
|
156
|
Start
|
Unknown
|
734
|
Don Norman
|
4,842
|
156
|
Start
|
Mid
|
735
|
OpenGL Shading Language
|
4,829
|
155
|
C
|
Low
|
736
|
ActionScript
|
4,828
|
155
|
C
|
Low
|
737
|
Compare-and-swap
|
4,812
|
155
|
C
|
Low
|
738
|
Alex Krizhevsky
|
4,802
|
154
|
Stub
|
Unknown
|
739
|
Binary file
|
4,800
|
154
|
C
|
High
|
740
|
Computational neuroscience
|
4,798
|
154
|
B
|
Mid
|
741
|
Fluent interface
|
4,797
|
154
|
Stub
|
Unknown
|
742
|
Branch and bound
|
4,796
|
154
|
Start
|
Mid
|
743
|
Syntactic sugar
|
4,790
|
154
|
C
|
Mid
|
744
|
Duff's device
|
4,785
|
154
|
C
|
Low
|
745
|
Code coverage
|
4,782
|
154
|
C
|
Low
|
746
|
Fréchet inception distance
|
4,781
|
154
|
C
|
Low
|
747
|
Human-centered design
|
4,780
|
154
|
C
|
High
|
748
|
Arity
|
4,776
|
154
|
C
|
Low
|
749
|
Regular language
|
4,769
|
153
|
C
|
High
|
750
|
Pushdown automaton
|
4,763
|
153
|
B
|
High
|
751
|
Unique identifier
|
4,754
|
153
|
Start
|
Unknown
|
752
|
Three-valued logic
|
4,753
|
153
|
Start
|
Low
|
753
|
Legacy system
|
4,748
|
153
|
C
|
Low
|
754
|
Smartglasses
|
4,738
|
152
|
C
|
Low
|
755
|
Object (computer science)
|
4,731
|
152
|
Start
|
High
|
756
|
Google AI
|
4,710
|
151
|
Start
|
Low
|
757
|
Analysis of algorithms
|
4,703
|
151
|
C
|
Top
|
758
|
Coq (software)
|
4,699
|
151
|
Start
|
Mid
|
759
|
Reactive programming
|
4,699
|
151
|
Start
|
Mid
|
760
|
SIGGRAPH
|
4,672
|
150
|
Start
|
Mid
|
761
|
Cargo cult programming
|
4,672
|
150
|
Start
|
Low
|
762
|
Systems programming
|
4,668
|
150
|
B
|
High
|
763
|
Semantics (computer science)
|
4,666
|
150
|
C
|
High
|
764
|
3GP and 3G2
|
4,665
|
150
|
C
|
Low
|
765
|
Computing Machinery and Intelligence
|
4,639
|
149
|
C
|
High
|
766
|
Isolation forest
|
4,636
|
149
|
C
|
Low
|
767
|
Code.org
|
4,625
|
149
|
C
|
Low
|
768
|
Approximate string matching
|
4,621
|
149
|
C
|
Mid
|
769
|
Computational complexity of matrix multiplication
|
4,616
|
148
|
Unknown
|
Unknown
|
770
|
Adversarial machine learning
|
4,614
|
148
|
C
|
Mid
|
771
|
Petri net
|
4,612
|
148
|
B
|
Mid
|
772
|
Metaheuristic
|
4,601
|
148
|
Start
|
Mid
|
773
|
Matrix multiplication algorithm
|
4,589
|
148
|
C
|
Mid
|
774
|
Enterprise architecture
|
4,585
|
147
|
Start
|
Mid
|
775
|
Boltzmann machine
|
4,569
|
147
|
C
|
Low
|
776
|
String-searching algorithm
|
4,553
|
146
|
Start
|
High
|
777
|
Coding theory
|
4,551
|
146
|
C
|
High
|
778
|
Fibonacci heap
|
4,538
|
146
|
C
|
High
|
779
|
Point in polygon
|
4,536
|
146
|
Start
|
Low
|
780
|
Bounding volume hierarchy
|
4,528
|
146
|
Unknown
|
Unknown
|
781
|
Counting sort
|
4,522
|
145
|
C
|
High
|
782
|
Data governance
|
4,509
|
145
|
C
|
Unknown
|
783
|
Cycle detection
|
4,486
|
144
|
B
|
Low
|
784
|
Spatial anti-aliasing
|
4,482
|
144
|
C
|
Mid
|
785
|
Aho–Corasick algorithm
|
4,467
|
144
|
Start
|
Mid
|
786
|
Double-ended queue
|
4,460
|
143
|
C
|
Mid
|
787
|
Lazy evaluation
|
4,421
|
142
|
C
|
High
|
788
|
Ubiquitous computing
|
4,407
|
142
|
C
|
High
|
789
|
User-centered design
|
4,393
|
141
|
Start
|
Mid
|
790
|
Mixed reality
|
4,382
|
141
|
B
|
Unknown
|
791
|
Generic programming
|
4,378
|
141
|
C
|
High
|
792
|
Artificial life
|
4,363
|
140
|
B
|
High
|
793
|
Web of trust
|
4,362
|
140
|
C
|
Low
|
794
|
Inverter (logic gate)
|
4,353
|
140
|
Start
|
Unknown
|
795
|
Computational chemistry
|
4,333
|
139
|
GA
|
High
|
796
|
Opcode
|
4,319
|
139
|
C
|
High
|
797
|
Huang's law
|
4,318
|
139
|
Start
|
Mid
|
798
|
Maximum flow problem
|
4,305
|
138
|
C
|
High
|
799
|
Nondeterministic finite automaton
|
4,305
|
138
|
B
|
High
|
800
|
Quickselect
|
4,302
|
138
|
C
|
Low
|
801
|
Foreign function interface
|
4,300
|
138
|
Start
|
Low
|
802
|
Gradle
|
4,286
|
138
|
C
|
Low
|
803
|
Constructor (object-oriented programming)
|
4,253
|
137
|
Start
|
Mid
|
804
|
Automated theorem proving
|
4,251
|
137
|
Start
|
Mid
|
805
|
Eugene Kaspersky
|
4,246
|
136
|
GA
|
Low
|
806
|
Jon Postel
|
4,245
|
136
|
C
|
Mid
|
807
|
Universal Turing machine
|
4,225
|
136
|
C
|
Mid
|
808
|
Boyer–Moore majority vote algorithm
|
4,223
|
136
|
Unknown
|
Unknown
|
809
|
Side effect (computer science)
|
4,222
|
136
|
C
|
Mid
|
810
|
Leonid Khachiyan
|
4,221
|
136
|
Stub
|
Low
|
811
|
Satisfiability modulo theories
|
4,220
|
136
|
Start
|
Low
|
812
|
Information management
|
4,210
|
135
|
C
|
Low
|
813
|
Concurrent computing
|
4,210
|
135
|
C
|
High
|
814
|
State diagram
|
4,205
|
135
|
C
|
Mid
|
815
|
Root-finding algorithm
|
4,204
|
135
|
C
|
Unknown
|
816
|
Sandbox (software development)
|
4,198
|
135
|
Start
|
Low
|
817
|
Nondeterministic Turing machine
|
4,197
|
135
|
C
|
High
|
818
|
Proof assistant
|
4,190
|
135
|
Start
|
High
|
819
|
Short-circuit evaluation
|
4,187
|
135
|
Start
|
Mid
|
820
|
Superconducting quantum computing
|
4,180
|
134
|
Start
|
Unknown
|
821
|
David Cheriton
|
4,180
|
134
|
C
|
Mid
|
822
|
History of computer science
|
4,178
|
134
|
B
|
Top
|
823
|
Hash collision
|
4,174
|
134
|
Start
|
Low
|
824
|
PowerPC 7xx
|
4,168
|
134
|
C
|
Low
|
825
|
Wiener filter
|
4,158
|
134
|
Start
|
Low
|
826
|
Blue–green deployment
|
4,146
|
133
|
Stub
|
Low
|
827
|
Programming language theory
|
4,118
|
132
|
Start
|
Top
|
828
|
Elvis operator
|
4,118
|
132
|
Unknown
|
Unknown
|
829
|
8-bit color
|
4,117
|
132
|
Start
|
Low
|
830
|
Set cover problem
|
4,099
|
132
|
C
|
Mid
|
831
|
Software rot
|
4,076
|
131
|
Unknown
|
Unknown
|
832
|
Infinite loop
|
4,054
|
130
|
Start
|
Mid
|
833
|
Thundering herd problem
|
4,050
|
130
|
Start
|
Mid
|
834
|
LL parser
|
4,023
|
129
|
Start
|
High
|
835
|
Continuation-passing style
|
4,016
|
129
|
Start
|
Mid
|
836
|
Non-English-based programming languages
|
4,014
|
129
|
List
|
Low
|
837
|
Kahan summation algorithm
|
4,004
|
129
|
Start
|
Unknown
|
838
|
Samsung Galaxy A03
|
4,000
|
129
|
Stub
|
Low
|
839
|
Vertex cover
|
3,999
|
129
|
C
|
Mid
|
840
|
Clique problem
|
3,983
|
128
|
GA
|
Mid
|
841
|
Delimiter
|
3,968
|
128
|
C
|
Mid
|
842
|
Topological data analysis
|
3,968
|
128
|
C
|
Low
|
843
|
Niklaus Wirth
|
3,946
|
127
|
Start
|
High
|
844
|
Relational database management system
|
3,944
|
127
|
Redirect
|
NA
|
845
|
First-class citizen
|
3,941
|
127
|
C
|
Mid
|
846
|
Comparison of multi-paradigm programming languages
|
3,939
|
127
|
List
|
Low
|
847
|
Query language
|
3,939
|
127
|
Start
|
Mid
|
848
|
Machine epsilon
|
3,920
|
126
|
Unknown
|
Unknown
|
849
|
Coreboot
|
3,919
|
126
|
C
|
Unknown
|
850
|
BEAM (Erlang virtual machine)
|
3,908
|
126
|
Start
|
Low
|
851
|
Self-balancing binary search tree
|
3,899
|
125
|
Start
|
Mid
|
852
|
Quantum machine learning
|
3,895
|
125
|
B
|
Unknown
|
853
|
Metaprogramming
|
3,893
|
125
|
C
|
Mid
|
854
|
Jamie Zawinski
|
3,874
|
124
|
C
|
Low
|
855
|
Median of medians
|
3,860
|
124
|
C
|
Low
|
856
|
CiteSeerX
|
3,859
|
124
|
Start
|
High
|
857
|
Goto
|
3,847
|
124
|
C
|
Mid
|
858
|
Computer algebra
|
3,847
|
124
|
Start
|
Mid
|
859
|
Inverted index
|
3,845
|
124
|
Start
|
Mid
|
860
|
Jürgen Schmidhuber
|
3,837
|
123
|
C
|
Mid
|
861
|
Computational geometry
|
3,836
|
123
|
Start
|
High
|
862
|
Computer performance
|
3,836
|
123
|
Start
|
Mid
|
863
|
A Mathematical Theory of Communication
|
3,833
|
123
|
Start
|
High
|
864
|
Constraint satisfaction problem
|
3,831
|
123
|
C
|
Mid
|
865
|
Challenge–response authentication
|
3,818
|
123
|
Start
|
Low
|
866
|
Exception handling
|
3,815
|
123
|
B
|
Mid
|
867
|
Component (graph theory)
|
3,812
|
122
|
GA
|
Mid
|
868
|
Command-line completion
|
3,810
|
122
|
Unknown
|
Unknown
|
869
|
Three.js
|
3,801
|
122
|
C
|
Unknown
|
870
|
Doubly linked list
|
3,798
|
122
|
Start
|
High
|
871
|
SAT solver
|
3,797
|
122
|
C
|
Mid
|
872
|
Code injection
|
3,793
|
122
|
C
|
High
|
873
|
First-class function
|
3,776
|
121
|
C
|
High
|
874
|
Knowledge distillation
|
3,775
|
121
|
C
|
Low
|
875
|
Algorithmic bias
|
3,773
|
121
|
GA
|
Top
|
876
|
Bucket sort
|
3,764
|
121
|
C
|
High
|
877
|
Q (number format)
|
3,761
|
121
|
C
|
Low
|
878
|
Rabin–Karp algorithm
|
3,744
|
120
|
C
|
Mid
|
879
|
Barbara Liskov
|
3,742
|
120
|
C
|
High
|
880
|
Interval tree
|
3,741
|
120
|
Start
|
Mid
|
881
|
JSONP
|
3,722
|
120
|
C
|
Low
|
882
|
Ford–Fulkerson algorithm
|
3,693
|
119
|
Start
|
High
|
883
|
Async/await
|
3,682
|
118
|
C
|
Mid
|
884
|
Deep reinforcement learning
|
3,677
|
118
|
Stub
|
Unknown
|
885
|
Loose coupling
|
3,654
|
117
|
Start
|
High
|
886
|
BCH code
|
3,648
|
117
|
C
|
Unknown
|
887
|
Criticism of C++
|
3,648
|
117
|
C
|
Unknown
|
888
|
Scott Aaronson
|
3,644
|
117
|
C
|
Mid
|
889
|
Program optimization
|
3,638
|
117
|
B
|
High
|
890
|
Marching cubes
|
3,638
|
117
|
Start
|
Mid
|
891
|
Combinational logic
|
3,630
|
117
|
Start
|
Unknown
|
892
|
Pattern matching
|
3,621
|
116
|
C
|
Mid
|
893
|
Nonlinear programming
|
3,619
|
116
|
C
|
Mid
|
894
|
History of artificial neural networks
|
3,613
|
116
|
C
|
Mid
|
895
|
Needleman–Wunsch algorithm
|
3,581
|
115
|
Start
|
Mid
|
896
|
Kleene star
|
3,579
|
115
|
Start
|
High
|
897
|
Phong reflection model
|
3,577
|
115
|
C
|
Unknown
|
898
|
Vapnik–Chervonenkis dimension
|
3,576
|
115
|
Start
|
Mid
|
899
|
SHI International Corp
|
3,562
|
114
|
Start
|
Low
|
900
|
Operational transformation
|
3,561
|
114
|
B
|
Unknown
|
901
|
Learning rate
|
3,561
|
114
|
Unknown
|
Unknown
|
902
|
Boolean
|
3,557
|
114
|
List
|
Unknown
|
903
|
In-memory database
|
3,554
|
114
|
C
|
High
|
904
|
Elbow method (clustering)
|
3,553
|
114
|
Stub
|
Unknown
|
905
|
Data access object
|
3,549
|
114
|
Start
|
Unknown
|
906
|
Requirements engineering
|
3,545
|
114
|
Start
|
Unknown
|
907
|
Dependent type
|
3,541
|
114
|
Start
|
High
|
908
|
Timeline of quantum computing and communication
|
3,535
|
114
|
List
|
Mid
|
909
|
API testing
|
3,514
|
113
|
Start
|
Unknown
|
910
|
Max-flow min-cut theorem
|
3,512
|
113
|
Start
|
High
|
911
|
Graph isomorphism
|
3,510
|
113
|
Start
|
Mid
|
912
|
Fold (higher-order function)
|
3,508
|
113
|
Start
|
Mid
|
913
|
Message passing
|
3,493
|
112
|
Start
|
High
|
914
|
Video coding format
|
3,484
|
112
|
C
|
Unknown
|
915
|
Method (computer programming)
|
3,481
|
112
|
C
|
High
|
916
|
Memory hierarchy
|
3,478
|
112
|
Start
|
Mid
|
917
|
Homotopy type theory
|
3,477
|
112
|
C
|
Low
|
918
|
Metasyntactic variable
|
3,476
|
112
|
Unknown
|
Unknown
|
919
|
Immediate mode (computer graphics)
|
3,466
|
111
|
Start
|
Unknown
|
920
|
Deno (software)
|
3,455
|
111
|
C
|
Low
|
921
|
Orders of magnitude (data)
|
3,452
|
111
|
List
|
Low
|
922
|
Dual linear program
|
3,450
|
111
|
Start
|
Low
|
923
|
Database management system
|
3,434
|
110
|
Redirect
|
High
|
924
|
Scott Hassan
|
3,430
|
110
|
Start
|
Low
|
925
|
C string handling
|
3,424
|
110
|
C
|
Low
|
926
|
Artificial Intelligence: A Modern Approach
|
3,415
|
110
|
Start
|
Unknown
|
927
|
Dynamic array
|
3,386
|
109
|
C
|
Mid
|
928
|
Calling convention
|
3,386
|
109
|
C
|
High
|
929
|
Multiclass classification
|
3,385
|
109
|
Start
|
Mid
|
930
|
Samsung Galaxy Tab A8
|
3,384
|
109
|
Unknown
|
Unknown
|
931
|
Model of computation
|
3,378
|
108
|
Start
|
Mid
|
932
|
Cyclic permutation
|
3,376
|
108
|
Start
|
Unknown
|
933
|
Zachman Framework
|
3,375
|
108
|
Start
|
Unknown
|
934
|
Mock object
|
3,369
|
108
|
Start
|
Low
|
935
|
Redux (JavaScript library)
|
3,369
|
108
|
Start
|
Low
|
936
|
Tree structure
|
3,358
|
108
|
Start
|
High
|
937
|
C++26
|
3,346
|
107
|
Stub
|
Low
|
938
|
Matei Zaharia
|
3,345
|
107
|
Start
|
Unknown
|
939
|
Hill climbing
|
3,343
|
107
|
C
|
Mid
|
940
|
IEEE 754-1985
|
3,341
|
107
|
C
|
Low
|
941
|
Longest palindromic substring
|
3,329
|
107
|
C
|
Low
|
942
|
Thrashing (computer science)
|
3,328
|
107
|
C
|
Low
|
943
|
Software engine
|
3,324
|
107
|
Start
|
Mid
|
944
|
List of computer algebra systems
|
3,321
|
107
|
List
|
Low
|
945
|
Reentrancy (computing)
|
3,317
|
107
|
Start
|
Mid
|
946
|
Perfect hash function
|
3,315
|
106
|
C
|
Unknown
|
947
|
Independent set (graph theory)
|
3,314
|
106
|
C
|
Mid
|
948
|
Requirements analysis
|
3,312
|
106
|
Start
|
Unknown
|
949
|
Outline of computer science
|
3,311
|
106
|
Start
|
Mid
|
950
|
Randomized algorithm
|
3,307
|
106
|
C
|
High
|
951
|
Message queue
|
3,303
|
106
|
Unknown
|
Unknown
|
952
|
Mutual exclusion
|
3,298
|
106
|
C
|
Top
|
953
|
LOLCODE
|
3,292
|
106
|
Start
|
Mid
|
954
|
X.25
|
3,264
|
105
|
C
|
Unknown
|
955
|
Double-checked locking
|
3,264
|
105
|
Unknown
|
Unknown
|
956
|
Shellsort
|
3,251
|
104
|
B
|
High
|
957
|
Deterministic algorithm
|
3,250
|
104
|
Start
|
High
|
958
|
Suffix tree
|
3,250
|
104
|
C
|
High
|
959
|
Thread pool
|
3,230
|
104
|
Unknown
|
Unknown
|
960
|
Abstract factory pattern
|
3,226
|
104
|
Start
|
Mid
|
961
|
Weak supervision
|
3,219
|
103
|
Unknown
|
Unknown
|
962
|
Chain-of-responsibility pattern
|
3,217
|
103
|
Stub
|
Unknown
|
963
|
Computational complexity of mathematical operations
|
3,216
|
103
|
B
|
Mid
|
964
|
Oracle machine
|
3,208
|
103
|
C
|
Mid
|
965
|
Neural network (biology)
|
3,208
|
103
|
C
|
High
|
966
|
State pattern
|
3,206
|
103
|
Start
|
Unknown
|
967
|
Snippet (programming)
|
3,206
|
103
|
Start
|
Low
|
968
|
Model–view–presenter
|
3,198
|
103
|
C
|
High
|
969
|
State (computer science)
|
3,197
|
103
|
Start
|
Mid
|
970
|
Hard link
|
3,188
|
102
|
Start
|
Low
|
971
|
De Bruijn sequence
|
3,181
|
102
|
C
|
Mid
|
972
|
LeNet
|
3,180
|
102
|
Start
|
Unknown
|
973
|
Computer graphics (computer science)
|
3,178
|
102
|
Start
|
Top
|
974
|
Behavior tree (artificial intelligence, robotics and control)
|
3,177
|
102
|
Start
|
Unknown
|
975
|
Numerical method
|
3,176
|
102
|
Stub
|
Unknown
|
976
|
Composite pattern
|
3,174
|
102
|
Start
|
Unknown
|
977
|
Treemapping
|
3,168
|
102
|
C
|
Mid
|
978
|
Brute-force search
|
3,166
|
102
|
Start
|
Mid
|
979
|
Michael Zyda
|
3,166
|
102
|
Stub
|
Low
|
980
|
Control-flow graph
|
3,155
|
101
|
C
|
Mid
|
981
|
C++ classes
|
3,154
|
101
|
C
|
Low
|
982
|
Hole punching (networking)
|
3,150
|
101
|
Start
|
Low
|
983
|
Richard Hamming
|
3,148
|
101
|
GA
|
Mid
|
984
|
Third-generation programming language
|
3,140
|
101
|
Start
|
Mid
|
985
|
Green thread
|
3,139
|
101
|
Start
|
Low
|
986
|
Samsung Galaxy Tab A7
|
3,139
|
101
|
Start
|
Low
|
987
|
Segment tree
|
3,136
|
101
|
Unknown
|
Unknown
|
988
|
Data quality
|
3,133
|
101
|
Start
|
Low
|
989
|
Distributed operating system
|
3,127
|
100
|
C
|
Mid
|
990
|
Object file
|
3,126
|
100
|
Start
|
Mid
|
991
|
Database design
|
3,126
|
100
|
C
|
High
|
992
|
TLA+
|
3,121
|
100
|
B
|
High
|
993
|
Digital Revolution
|
3,117
|
100
|
Redirect
|
NA
|
994
|
Translation studies
|
3,113
|
100
|
Start
|
Mid
|
995
|
Topological insulator
|
3,108
|
100
|
Start
|
Unknown
|
996
|
Vendor lock-in
|
3,107
|
100
|
C
|
Mid
|
997
|
Hamiltonian path problem
|
3,094
|
99
|
C
|
Mid
|
998
|
Enterprise architecture framework
|
3,090
|
99
|
Start
|
Unknown
|
999
|
Vala (programming language)
|
3,088
|
99
|
Start
|
Low
|
1000
|
Clinical decision support system
|
3,086
|
99
|
C
|
Unknown
|