Sometimes it’s difficult to have a birds eye view over an entire site; here’s Baeldung on Computer Science from 10000 feet:
Expand All
-
June 2022
(29)
- 24: What are Zero-day Attacks? (0)
- 20: Fast Fourier Transform (FFT) (0)
- 20: Data Compression: ZLib vs. GZip vs. Zip (0)
- 18: How to Share a Key in Symmetric Cryptography? (0)
- 18: Machine Learning: What Is Ablation Study? (0)
- 18: Silhouette Plots (0)
- 18: Drawing Shapes with Marching Squares (0)
- 18: Sampling From the Exponential Distribution (0)
- 17: Median of a Matrix With Sorted Rows (0)
- 17: Computer Clusters, Types, Uses and Applications (0)
- 14: Fuzzy Logic Explained (0)
- 12: Differences Between Key, Initialization Vector and Nonce (0)
- 12: What is CAPTCHA and How Does It Work? (0)
- 12: F-Beta Score (0)
- 12: What’s a Hypothesis Space? (0)
- 11: What is YOLO Algorithm? (0)
- 11: Node Impurity in Decision Trees (0)
- 10: Model-free vs. Model-based Reinforcement Learning (0)
- 10: 0-1 Loss Function Explained (0)
- 08: Is a Markov Chain the Same as a Finite State Machine? (0)
- 07: The Dining Philosophers (0)
- 07: Differences Between Epoch, Batch, and Mini-batch (0)
- 06: Differences Between Missing Data and Sparse Data (0)
- 06: Converting Floats into Fractions (0)
- 06: Socket vs. RPC (0)
- 06: Public DMZ Network Architecture (0)
- 02: Non-repeating Random Number Generator (0)
- 02: Understanding Fenwick Tree (Binary Indexed Tree) (0)
- 01: Differences Between Backpropagation and Feedforward Networks (0)
-
May 2022
(33)
- 28: Differences Between Scalability and Elasticity (0)
- 27: Which Is Faster – Hash Lookup or Binary Search? (0)
- 26: Disparity Map in Stereo Vision (0)
- 26: How to Find Common Elements in Two Sorted Arrays (0)
- 25: How to Find the Authoritative Name Server for a Domain? (0)
- 25: Difference Between Tree Order and Degree (0)
- 24: Cloud Computing: SaaS vs. PaaS vs. IaaS (0)
- 22: Interpolation and Regression: Similarities and Differences (0)
- 21: How to Redirect DNS to Different Ports (0)
- 21: MapReduce Algorithm (0)
- 21: Cross-Validation: K-Fold vs. Leave-One-Out (0)
- 20: Comparing TLS and DTLS (0)
- 17: How to Compute the Similarity of Colours (0)
- 17: Basic Services of an Operating System (0)
- 15: Introduction to Bloom Filter (0)
- 15: How Do Antiviruses Really Work? (0)
- 12: Off-policy vs. On-policy Reinforcement Learning (0)
- 12: Bias Update in Neural Network Backpropagation (0)
- 12: How Does Ransomware Infect Computers? (0)
- 11: Algorithm for Handwriting Recognition (0)
- 11: Introduction to Resource Description Framework (RDF) (0)
- 10: Precision vs. Average Precision (0)
- 09: How Does a Zip Bomb Work? (0)
- 09: How to Calculate the Runtime Percentage Improvement (0)
- 08: What Are Callback Functions? (0)
- 08: 32-bit vs. 64-bit Operating Systems (0)
- 07: How to Convert a Color From HSL to RGB (0)
- 06: Simulating Slow Internet and Network Errors (0)
- 04: Overview of Nature-Inspired Metaheuristic Algorithms (0)
- 03: Sort References by Order of Appearance with LaTeX/BibTeX (0)
- 02: Storing a Tree Structure in a Relational Database (0)
- 02: Man In The Middle (MITM) Attacks Explained (0)
- 01: What is Markov Chain Monte Carlo? (0)
-
April 2022
(28)
- 28: Comparing Naïve Bayes and SVM for Text Classification (0)
- 28: What is SQL Injection? (0)
- 28: The Difference Between Pipes and Sockets (0)
- 25: How Do DoS and DDoS Attacks Really Work? (0)
- 25: Recurrent vs. Recursive Neural Networks in Natural Language Processing (0)
- 25: Are We Still Traceable When Using VPN? (0)
- 22: Fast Algorithms for Solving a System of Linear Equations (0)
- 21: Understanding Sparse Tables (0)
- 21: Difference between self-signed CA and self-signed certificate (0)
- 20: Intersection over Union for Object Detection (0)
- 20: Binary Search Trees vs. AVL Trees: the Complexity of Construction (0)
- 20: Authentication: Multi-Step Vs. Multi-Factor (0)
- 20: What Is a URI? (0)
- 19: Efficiently Sorting Linked Lists (0)
- 19: Memory-Mapped vs. Isolated I/O (0)
- 16: What Are “Bottlenecks” in Neural Networks? (0)
- 15: Differences Between APIs and ABIs (0)
- 14: Differences Between Viruses, Worms and Trojans (0)
- 14: Pre-increment vs. Post-increment in a Loop (0)
- 13: How Are DNS Requests Resolved When Using VPN? (0)
- 11: Understanding Hash Tables (0)
- 11: Convolutional Neural Network vs. Regular Neural Network (0)
- 11: Determining the Most Distant Pair of Points (0)
- 09: Ant Lion Optimization (0)
- 08: What Sets the RST Flag? (0)
- 07: RSA SecurID Tokens (0)
- 04: Abstract Methods Vs. Virtual Methods (0)
- 01: Differences Between Strong-AI and Weak-AI (0)
-
March 2022
(39)
- 31: Finding the Minimum Number of Jumps to Reach the End of an Array (0)
- 31: How to Find the Minimum Difference Between Elements in an Array (0)
- 30: Differences Between Cloud Computing and Distributed Computing (0)
- 30: Dragonfly Algorithm (0)
- 29: HTTP: 1.0 vs. 1.1 vs 2.0 vs. 3.0 (0)
- 29: Mean Average Precision in Object Detection (0)
- 28: Differences Between a Deep Copy and a Shallow Copy (0)
- 26: The Call Stack (0)
- 26: Lambda Functions (0)
- 23: Memory Allocation (0)
- 23: Proxy Server vs. Reverse Proxy Server (0)
- 23: Algorithm to Find All Subarrays With a Given Sum K (0)
- 23: How to Bind to Any Available Port? (0)
- 23: Find the Kth Smallest Element in a Binary Search Tree (0)
- 22: Public/Private Keys Vs. Certificates (0)
- 21: Hidden Layers in a Neural Network (0)
- 21: How to Calculate Packet Time from Latency and Bandwidth (0)
- 16: Robust Estimators in Robust Statistics (0)
- 16: How to Find the Two Points With the Minimal Manhattan Distance (0)
- 15: Transfer Learning vs Domain Adoption (0)
- 15: Real-Life Examples of Supervised Learning and Unsupervised Learning (0)
- 15: Antipatterns: Magic Numbers (0)
- 11: Finding the Number of Distinct Subsequences of a String (0)
- 11: What are Rings in Operating Systems? (0)
- 10: Real-World Uses for Genetic Algorithms (0)
- 10: How to Test If a Number is a Fibonacci Number (2)
- 10: What is Depth in a Convolutional Neural Network? (0)
- 10: What is the Difference Between Markov Chains and Hidden Markov Models? (0)
- 09: The Reparameterization Trick in Variational Autoencoders (0)
- 08: Decision Trees vs. Random Forests (0)
- 07: Hash Table Vs. Trie (Prefix Tree) (0)
- 07: Centralized Computing vs. Distributed Computing (0)
- 06: What Is Inductive Bias in Machine Learning? (0)
- 06: What is the Difference Between Artificial Intelligence, Machine Learning, Statistics, and Data Mining? (0)
- 06: An Introduction to Self-Supervised Learning (0)
- 04: Latent Space in Deep Learning (0)
- 04: How To Find a List of Possible Words From a Letter Matrix (1)
- 03: Autoencoders Explained (0)
- 02: Difference between SSL & TLS (2)
-
February 2022
(48)
- 28: Difference Between the Cost, Loss, and the Objective Function (0)
- 28: Activation Functions: Sigmoid vs Tanh (0)
- 28: Hash Collision: Weak and Strong Resistance (0)
- 28: Red-Black Tree vs. AVL Tree (0)
- 27: Hill Climbing Algorithm (0)
- 25: An Introduction to Contrastive Learning (0)
- 25: Gradient Boosting Trees vs. Random Forests (0)
- 24: Basic Concepts of Machine Learning (0)
- 24: Intuition Behind Kernels in Machine Learning (0)
- 23: Generating a Crossword Puzzle (0)
- 21: Salp Swarm Algorithm (0)
- 21: Understanding Security by Obscurity (0)
- 21: Algorithms for Image Comparison (0)
- 19: Training and Validation Loss in Deep Learning (0)
- 19: Image Processing: Occlusions (0)
- 19: What Is the Best Sorting Algorithm To Sort an Array of Small Integers (0)
- 18: How To Determine if a Point Is in a 2D Triangle (0)
- 17: Information Gain in Machine Learning (0)
- 17: How to Convert an RGB Image to a Grayscale (0)
- 17: What is the Difference Between Natural Cubic Spline, Hermite Spline, Bézier Spline and B-spline? (0)
- 15: Cross-Validation and Decision Trees (0)
- 15: How to Use K-Fold Cross-Validation in a Neural Network? (0)
- 14: Applications of Generative Models (0)
- 13: Supported Memory by 32 and 64-Bit Machines (0)
- 13: Pseudo-Polynomial vs. Polynomial Complexity (0)
- 13: Can TCP and UDP Sockets Use the Same Port? (0)
- 13: Virtual Memory Address (0)
- 13: Valid Characters of a Hostname (0)
- 13: DES vs 3DES vs Blowfish vs AES (0)
- 11: Network: Longest Prefix Matching (0)
- 11: Calculate the Output Size of a Convolutional Layer (0)
- 11: TCP Checksum Errors: Issues and Workarounds (0)
- 09: Binary Tree vs. Binary Search Tree (0)
- 09: Is Selection Sort Stable? (0)
- 09: What Is the Maximum Length of a URL in Different Browsers? (0)
- 07: Making Presentations With LaTeX (1)
- 07: Number of Comparisons in Straight Selection Sort (0)
- 07: Introduction to Curve Fitting (0)
- 07: An Introduction to Generative Adversarial Networks (0)
- 05: K-Means for Classification (0)
- 05: Maximum Packet Size for a TCP Connection (0)
- 05: Vertical and Horizontal Tables in LaTeX (0)
- 04: What is a Random Walk? (0)
- 03: ML: Train, Validate, and Test (0)
- 02: Determining Network and Broadcast Address Using IP Address and Subnet Mask (0)
- 01: An Introduction to the Hidden Markov Model (0)
- 01: Multi-Verse Optimizer (0)
- 01: Q-Learning vs. SARSA (0)
-
January 2022
(34)
- 31: Differences Between SGD and Backpropagation (0)
- 31: Graph Theory: Path vs. Cycle vs. Circuit (0)
- 31: Linearly Separable Data in Neural Networks (0)
- 29: Master Theorem for Asymptotic Analysis (0)
- 29: The Effects of The Depth and Number of Trees in a Random Forest (0)
- 26: Radix Sort (0)
- 26: Using GANs for Data Augmentation (0)
- 25: Differences Between Bidirectional and Unidirectional LSTM (0)
- 23: The Monty Hall Problem (0)
- 23: Basics of Polynomial Interpolation (0)
- 21: Features, Parameters and Classes in Machine Learning (0)
- 21: Relation Between Learning Rate and Batch Size (0)
- 19: N-Tier Architecture (0)
- 19: How to Draw Flowcharts With LaTeX (0)
- 19: How to Check String Periodicity (0)
- 19: Binary Insertion Sort (0)
- 18: Concurrency vs Parallelism (0)
- 15: Tabulation vs. Memoization (0)
- 15: MD5 vs. SHA Algorithms (0)
- 14: The Importance of Central Limit Theorem (0)
- 13: Prime Numbers in Cryptography (2)
- 13: Simple Hashing vs. Salted Hashing (0)
- 12: Service Discovery in Microservices (2)
- 11: Graph Adjacency and Incidence (0)
- 11: Tree Edit Distance (0)
- 09: Moth Flame Optimization (0)
- 07: Word2vec Word Embedding Operations: Add, Concatenate or Average Word Vectors? (0)
- 07: Why are floating point numbers inaccurate? (0)
- 06: Drift, Anomaly, and Novelty in Machine Learning (0)
- 04: Markov Decision Process: How Does Value Iteration Work? (0)
- 04: Exporting LaTeX TikZ as Image Files (0)
- 03: Fundamentals of Sandboxing (0)
- 03: Non-opinionated vs. Opinionated Design (0)
- 03: Rainbow Table Attacks (0)
-
December 2021
(34)
- 31: What is Selection Bias and How Can We Prevent It? (0)
- 31: Non-routable IP Address (0)
- 31: Graph Density (0)
- 29: Applications of Red-Black Trees (0)
- 29: Context-Free Languages (0)
- 29: B-tree Data Structure (0)
- 23: Balanced Trees (0)
- 22: Guide to the “CPU-bound” and “I/O bound” Terms (0)
- 22: Ensemble Learning (0)
- 21: What Is the Difference Between Active and Passive FTP? (0)
- 21: Why Can’t Prim’s or Kruskal’s Algorithms be Used on a Directed graph? (0)
- 20: Decision Tree vs. Naive Bayes Classifier (0)
- 20: Tree vs Graph Data Structure (0)
- 19: How to Sort Mostly Sorted Arrays (0)
- 19: Encoding vs. Signing in Asymmetric Encryption (0)
- 17: The Skip List Data Structure (0)
- 16: Accuracy vs AUC in Machine Learning (0)
- 15: Bayesian Networks (0)
- 15: Active vs. Passive Connection in TCP (0)
- 11: Biases in Machine Learning (0)
- 11: Unit Testing vs Test-Driven Development (0)
- 09: Induced Subgraphs (0)
- 08: Cache Miss, TLB Miss, Page Fault (0)
- 07: The Difference Between 127.0.0.1 and Localhost (0)
- 07: When Coherence Score is Good or Bad in Topic Modeling? (0)
- 07: How Do Markov Chain Chatbots Work? (0)
- 07: Weighted vs. Unweighted Graphs (0)
- 06: Prim’s Algorithm (0)
- 05: Stratified Sampling in Machine Learning (0)
- 04: Rank of a Node in a Binary Search Tree (0)
- 04: The Pseudo-Header in TCP (0)
- 03: Outlier Detection and Handling (0)
- 02: Finding the In-Order Successor of a Node (0)
- 01: Data Mining in WEKA (0)
-
November 2021
(35)
- 29: Differences Between Core and CPU (0)
- 29: Types of Operating Systems (0)
- 29: From Lists to Forests (0)
- 26: Backtracking vs. Depth-First Search (0)
- 26: Choosing a Learning Rate (0)
- 26: From Recursive to Iterative Functions (0)
- 23: Messages: Payload, Header, and Overhead (0)
- 22: Streaming Median (0)
- 21: An Introduction to the Voronoi Diagram (0)
- 20: Tail vs. Non-Tail Recursion (0)
- 20: Underfitting and Overfitting in Machine Learning (0)
- 19: The Difference Between a Heuristic and an Algorithm (0)
- 19: Binary Semaphores vs. Counting Semaphores (2)
- 18: Are HTTPS URLs Encrypted? (0)
- 17: Introduction to Transactions (0)
- 17: Circle Line-Segment Collision Detection Algorithm (0)
- 17: Minimax Algorithm (0)
- 15: The Akra-Bazzi Method (0)
- 15: How Do “20 Questions” AI Algorithms Work? (0)
- 14: Generating Permutations with Repetition (0)
- 12: TCP: Differences Between FIN and RST (0)
- 11: Bidirectional Search for Path Finding (0)
- 11: Calculating Total Transmission Time of a Packet (0)
- 10: Calculating the Parity Bit of a Bit Sequence (0)
- 10: How to Calculate the Regularization Parameter in Linear Regression (0)
- 05: How to Get Vector for A Sentence From Word2vec of Tokens (0)
- 05: HTTP: Differences Between PUT and PATCH (0)
- 04: Hashing a Tree Structure (0)
- 04: Q-Learning vs. Dynamic Programming (0)
- 03: How to Solve Constraint Satisfaction Problems (0)
- 03: Languages for Data Structures (1)
- 03: The Difference Between a Framework and a Library (0)
- 02: Feature Selection and Reduction for Text Classification (0)
- 02: File Structures (0)
- 02: Layered Architecture (0)
-
October 2021
(36)
- 31: Imperative and Declarative Programming Paradigms (0)
- 31: Expectimax Search Algorithm (0)
- 31: Internal Fragmentation vs. External Fragmentation in Paging (1)
- 31: How Many Principal Components to Take in PCA? (0)
- 30: Grasshopper Optimization Algorithm (0)
- 29: Statically Typed Vs Dynamically Typed Languages (0)
- 28: Real World Examples of Tree Structures (0)
- 28: OSI Model: Packets vs. Frames (0)
- 26: Finding Arrangements of Blocks With L Left Visible Blocks and R Right Visible Blocks (0)
- 24: Dijkstra vs. A* – Pathfinding (0)
- 24: Flow Control vs. Congestion Control in TCP (0)
- 23: Count the Number of Set Bits in an Integer (0)
- 23: High-Level Languages vs. Low-Level Languages (0)
- 23: The Subnets in IPv4 Networks (0)
- 22: Segment Tree and Its Applications (0)
- 21: Fastest Algorithm to Find Prime Numbers (0)
- 20: Depth-First Search vs. Breadth-First Search (0)
- 19: Introduction to SAML (0)
- 18: Graph Search vs. Tree-Like Search (0)
- 18: Multicast vs. Broadcast vs. Anycast vs. Unicast (0)
- 17: Difference Between a SVM and a Perceptron (0)
- 15: Uniform-Cost Search vs. Best-First Search (0)
- 14: Segmented Paging vs. Paged Segmentation (0)
- 13: Understanding Routing Table Entry (0)
- 11: The Informed Vs. Uninformed Search Algorithms (0)
- 10: Why Mini-Batch Size Is Better Than One Single “Batch” With All Training Data (0)
- 09: Files and File Systems (0)
- 09: Spinlock vs. Semaphore (0)
- 08: Memory Management (0)
- 08: Calculate Upload/Download Speed Using Ping (0)
- 06: How to Design Deep Convolutional Neural Networks? (0)
- 06: Finding All Tic-Tac-Toe Winning Combinations (0)
- 06: Introduction to Serverless Architecture (1)
- 04: Tracing the Path in DFS, BFS, and Dijkstra’s Algorithm (0)
- 04: Clean Code – Formatting (2)
- 01: Beam Search Algorithm (0)
-
September 2021
(32)
- 29: Intuitive Explanation of the Expectation-Maximization (EM) Technique (0)
- 29: Multiprocessing and Multithreading (0)
- 28: Pattern Recognition in Time Series (0)
- 27: Iterative Deepening vs. Depth-First Search (0)
- 27: An Algorithm for Inflating and Deflating Polygons (0)
- 27: API Gateway vs. Reverse Proxy (0)
- 25: What is Abstract Data Type? (0)
- 24: How to Create a Smart Chatbot? (0)
- 23: Advanced CPU Designs (0)
- 23: Finding the Largest Balanced Subarray (0)
- 23: Finding the Number of Occurrences of a Subsequence in a String (0)
- 23: Distributed System vs. Distributed Computing? (0)
- 22: Hill Climbing Search vs. Best First Search (0)
- 21: Introduction to Cache Memory (0)
- 19: Find the Majority Element of an Array (0)
- 18: Instructions and Programs (0)
- 18: Complexity Analysis of QuickSelect (0)
- 16: Finding Dates, Times and Addresses in Emails (0)
- 16: Finding the Volume of Water Collected Between Towers (0)
- 15: Candidate Elimination Algorithm (0)
- 15: Extended Euclidean Algorithm (0)
- 15: Docker and Containers vs. Virtual Machines (0)
- 14: Request Timed Out vs. Destination Host Unreachable (0)
- 11: Knight’s Shortest Path on Chessboard (0)
- 11: The Difference Between an Argument and a Parameter (0)
- 09: IPv4 Datagram (0)
- 08: Two-Way Handshake and Three-Way Handshake (0)
- 07: Guide to the CPU (0)
- 06: Edge Relaxation in Dijkstra’s Algorithm (0)
- 04: The REST Architecture (0)
- 03: Choosing the best q and p from ACF and PACF plots in ARMA-type modeling (0)
- 01: Finding the K Smallest Numbers in an Array (0)
-
August 2021
(33)
- 31: An Overview of Evolutionary Algorithms (0)
- 31: Binary Trees vs. Linked Lists vs. Hash Tables (0)
- 31: Protocols used for PING (0)
- 29: Socket Binding (0)
- 28: Sine Cosine Algorithm (0)
- 27: How Is a Minimum Bottleneck Spanning Tree Different from a Minimum Spanning Tree? (0)
- 27: Open-Source AI Engines (0)
- 26: Whale Optimization Algorithm (0)
- 25: Finding Three Elements in an Array Whose Sum Is Closest to a Given Number (0)
- 25: Algorithms to Generate k-Combinations (0)
- 24: Arithmetic Logic Unit (0)
- 23: Program Counter and Instruction Register (0)
- 23: Greedy Vs. Heuristic Algorithm (0)
- 23: Hash Table vs. Balanced Binary Tree (0)
- 22: What is a Loop Invariant? (0)
- 21: NLP’s word2vec: Negative Sampling Explained (0)
- 20: LL vs. LR Parsing (0)
- 19: Out-of-bag Error in Random Forests (0)
- 15: Introduction to ASCII Code (0)
- 15: External Sorting vs Internal Sorting (0)
- 15: Stack Data Structure (0)
- 15: How to Find an Area of Overlapping Rectangles (0)
- 12: Compiled vs. Interpreted Programming Languages (0)
- 10: Linked List / Double Linked List (0)
- 10: Registers and RAM (0)
- 07: What Does “Busy Waiting” Mean in Operating Systems? (0)
- 05: Introduction to Assembly Language (1)
- 03: Binary Search Tree with Strings (0)
- 02: How to Calculate Receptive Field Size in CNN (0)
- 01: What is Thrashing? (0)
- 01: When Will the Worst Case of Merge Sort Occur? (0)
- 01: Searching in a Sorted and Rotated Array (0)
- 01: Full, Para, and Hardware-Assisted Virtualization Compared (0)
-
July 2021
(26)
- 31: Runtime vs. Compile Time (0)
- 31: Grey Wolf Optimization Algorithm (0)
- 31: Finding the Only Unpaired Element in the Array (0)
- 31: k-Nearest Neighbors and High Dimensional Data (0)
- 30: Finding Maximum Size Square in a Matrix Filled With Ones (0)
- 29: Sockets: Close vs. Shutdown (0)
- 29: State Machines: Components, Representations, Applications (0)
- 29: Dijkstra vs Floyd-Warshall Algorithms (0)
- 26: Calculate the Number of Binary Search Trees with N Distinct Elements (0)
- 26: The Most Efficient Way to Implement an Integer Based Power Function (0)
- 23: Finding the Next Smaller Element for Each Element in an Array (0)
- 21: Algorithms to Check If a Number Is a Power of 2 (0)
- 21: Merging Two Binary Search Trees (0)
- 21: Job vs. Task vs. Process (0)
- 17: Technical Debt (0)
- 17: OSI Model: Transport Layer vs. Networking Layer (0)
- 16: RISC vs. CISC (0)
- 16: Using a Hard Margin vs. Soft Margin in SVM (0)
- 10: What Is the Difference Between Trap and Interrupt? (0)
- 08: Value Iteration vs. Policy Iteration in Reinforcement Learning (0)
- 06: How To Convert a Text Sequence to a Vector (0)
- 06: Process Scheduling (0)
- 06: Understanding Time Complexity Calculation for Dijkstra Algorithm (0)
- 04: Expression vs. Statement (0)
- 03: Why Are TCP and UDP More Popular Than SCTP? (0)
- 01: Microservices and Cross-Cutting Concerns (0)
-
June 2021
(21)
- 29: Instance vs Batch Normalization (0)
- 28: Number of Nodes in a Binary Tree With Level N (0)
- 27: Intuition Behind Gradient Descent Algorithm (0)
- 27: Code Smells (0)
- 23: The Difference Between Virtual Memory and Swap Space (0)
- 23: Difference Between Access Point, Station, Bridge, and Router (0)
- 22: Compile time vs. Load time vs. Execution time (0)
- 22: Propagation Delay vs Transmission Delay (0)
- 22: Minimum Number of Steps to Reduce Number to One (0)
- 22: Routers vs. Switches vs. Access Points (0)
- 22: Trade-offs Between Accuracy and the Number of Support Vectors in SVMs (0)
- 20: Deadlock: What it is, How to Detect, Handle and Prevent? (0)
- 18: Priority Queue (2)
- 12: Time Complexity vs. Space Complexity (0)
- 11: Negative Weights Using Dijkstra’s Algorithm (0)
- 10: Symmetric Cryptography vs Asymmetric Cryptography (0)
- 07: Difference between Big-O and Little-o Notations (0)
- 05: Primality Test: Miller-Rabin Method (0)
- 05: Physical vs. Virtual Memory (0)
- 05: Quicksort vs. Heapsort (0)
- 04: Divide and Conquer vs. Dynamic Programming (0)
-
May 2021
(16)
- 31: Process vs. Thread (0)
- 29: Why Do We Need Virtual Memory? (0)
- 29: What is a Chipset? (0)
- 26: Fermat Primality Test (0)
- 25: Difference Between Cohesion and Coupling (0)
- 22: Which Sorting Algorithm to Use? (0)
- 22: What Is a Heuristic Function? (0)
- 21: Open Source Neural Network Libraries (0)
- 15: BIOS vs. CMOS vs. UEFI (0)
- 15: What’s the Difference Between User and Kernel Modes? (0)
- 14: Database Design in a Microservices Architecture (0)
- 10: Print All Paths With a Given Sum in a Binary Tree (0)
- 10: Refactoring (0)
- 07: Transformer Text Embeddings (0)
- 05: Applications of Binary Trees (0)
- 03: What is an OS Kernel? (0)
-
April 2021
(17)
- 30: Insertion Sort vs. Bubble Sort Algorithms (0)
- 30: Pairing Socks From a Pile Efficiently (0)
- 28: The Difference Between a Method and a Function (0)
- 28: Deadlock, Livelock and Starvation (0)
- 27: Client vs. Server Terminology (0)
- 19: Difference Between Layers and Tiers (0)
- 19: Saga Pattern in Microservices (0)
- 19: Generative vs. Discriminative Algorithms (0)
- 18: Semantic Similarity of Two Phrases (0)
- 11: Virtual Memory (0)
- 10: API Authentication – Tokens vs Sessions (0)
- 10: Authentication vs Authorization (0)
- 09: Polynomial Addition and Multiplication Using Linked List (0)
- 09: Ackermann Function (0)
- 08: Quicksort vs. Mergesort (0)
- 07: Understanding Complexity of Cryptographic Algorithms (0)
- 02: Difference Between IP Address and Port Number (0)
-
March 2021
(18)
- 24: Why Feature Scaling in SVM? (0)
- 22: Automatic Keyword and Keyphrase Extraction (0)
- 19: Semaphore vs. Mutex (1)
- 18: Generalized Suffix Trees (0)
- 17: Normalization vs Standardization in Linear Regression (0)
- 16: Alternatives of Ten – Binary, Octal, Hexadecimal (0)
- 16: Finding the Shortest Path in a Graph Visiting All Nodes (0)
- 12: Serialize and Deserialize a Binary Tree (0)
- 11: Word Embeddings: CBOW vs Skip-Gram (0)
- 10: SSL vs. SSH (0)
- 10: A Guide to Semantic Versioning (0)
- 08: String Similarity Metrics: Sequence Based (0)
- 07: What Does It Mean to Program to Interfaces? (0)
- 07: Appointment Scheduling Algorithm (0)
- 06: How to Improve Naive Bayes Classification Performance? (0)
- 05: Do Sessions Violate RESTfulness? (0)
- 05: Brewer’s CAP Theorem (0)
- 04: Obtaining the Path in the Uniform Cost Search Algorithm (0)
-
February 2021
(14)
- 28: SYN/ACK in the TCP Protocol (0)
- 24: Ugly Duckling Theorem (0)
- 22: Topic Modeling with Word2Vec (0)
- 17: How to Merge Sort A Linked List (0)
- 17: Normalize Features of a Table (0)
- 16: Bit Stuffing (0)
- 16: Definition of Network Units: Packet, Fragment, Frame, Datagram, and Segment (0)
- 15: Networking: IPv4 vs. IPv6 Addresses (0)
- 11: Understanding BDD (0)
- 09: String Similarity Metrics: Token Methods (0)
- 05: Comparison Between Uniform-Cost Search and Dijkstra’s Algorithm (0)
- 04: The Difference Between a Port and a Socket (2)
- 01: Finding the Lowest Common Ancestor in a Directed Acyclic Graph (0)
- 01: Inter-Process Communication (0)
-
January 2021
(18)
- 30: Gradient Descent Equation in Logistic Regression (0)
- 30: Correlated Features and Classification Accuracy (0)
- 30: Offline Concurrency Control (0)
- 27: Dynamic Linking vs. Dynamic Loading (0)
- 27: Weakly Supervised Learning (0)
- 23: Find Local Minimum in N x N Matrix (0)
- 23: What Is the Time Complexity of Tree Traversal? (0)
- 21: Cross-Origin Resource Sharing and Why We Need Preflight Requests (0)
- 19: Interpretation of Loss and Accuracy for a Machine Learning Model (0)
- 18: Using Min/Max Within an Integer Linear Program (0)
- 17: Guide to Single Sign-On (SSO) (0)
- 14: Splitting a Dataset into Train and Test Sets (0)
- 14: Difference Between REST and HTTP (0)
- 11: Encoder-Decoder Models for Natural Language Processing (0)
- 08: Solving the K-Armed Bandit Problem (0)
- 07: Minimum Cut on a Graph Using a Maximum Flow Algorithm (0)
- 07: Process Lifecycle (0)
- 05: How to Determine if a List of Polygon Points Are in Clockwise Order (0)
-
December 2020
(15)
- 29: Epoch in Neural Networks (0)
- 26: Fundamentals of Distributed Systems (0)
- 24: Flood Fill Algorithm (0)
- 23: Complexity of Inserting N Numbers into a Binary Search Tree (0)
- 18: Epsilon-Greedy Q-learning (0)
- 15: GIT vs. SVN (0)
- 13: Popular Network Protocols (0)
- 13: Haversine Formula (0)
- 12: Time Complexity of Sieve of Eratosthenes Algorithm (0)
- 10: Advanced Data Structures (0)
- 09: Number of Shortest Paths in a Graph (2)
- 08: Object-Oriented vs Functional Programming (2)
- 08: Find Cycle Start Node in a Singly Linked List (0)
- 08: Random Initialization of Weights in a Neural Network (0)
- 01: Sum of Digits in Factorial (0)
-
November 2020
(16)
- 26: Backtracking Algorithms (0)
- 25: OSI Model (0)
- 19: Calculating the Height of a Binary Tree (4)
- 17: Why Is an OPTIONS Request Sent? (0)
- 17: How to Calculate the Number of Different Binary and Binary Search Trees (0)
- 16: The Pigeonhole Principle (0)
- 14: Topic Modeling with Latent Dirichlet Allocation (0)
- 14: String Similarity Metrics – Edit Distance (0)
- 13: REST vs SOAP (0)
- 12: The General Concept of Polymorphism (0)
- 09: Time Complexity of Searching in a Balanced Binary Search Tree (0)
- 08: Time Complexity of Inserting into a Heap (0)
- 08: Algorithm to Generate a Maze (0)
- 06: Algorithms to Check If a Linked List is a Circular Linked List (0)
- 05: Max-Heapify A Binary Tree (0)
- 01: Traveling Salesman Problem – Dynamic Programming Approach (2)
-
October 2020
(13)
- 29: Batch Normalization in Convolutional Neural Networks (2)
- 17: Calculating the Range of IP Addresses from Subnet Mask (2)
- 17: UDP vs TCP (0)
- 16: CRC Vs Checksum (0)
- 16: Fundamental Difference Between Hashing and Encryption Algorithms (0)
- 14: Clean Code: Naming (0)
- 12: HTTP Status Codes (0)
- 10: Matrix Multiplication Algorithm Time Complexity (0)
- 08: Heap vs Binary Search Tree (2)
- 07: Multiclass Classification Using Support Vector Machines (1)
- 07: Minimum Spanning Tree: The Cut Property (0)
- 06: Counting Inversions in an Array (0)
- 01: Converting a Word to a Vector (0)
-
September 2020
(46)
- 30: Reinforcement Learning with Neural Network (0)
- 30: Time Complexity of Euclid’s Algorithm (0)
- 29: Greedy Algorithm to Find Minimum Number of Coins (0)
- 27: Finding a Cycle in a Singly Linked-List (0)
- 25: Finding the Most Significant Bit (0)
- 25: What is a Semaphore? (2)
- 24: Complete Binary Tree Vs Almost Complete Binary Tree (0)
- 24: Generate All Permutations of an Array (0)
- 24: What is an Augmenting Path? (0)
- 24: Non-Recursive Merge Sort (0)
- 22: Introduction to Depth First Search Algorithm (DFS) (0)
- 20: Using Leaf Count to Find Total Number of Nodes in a Full K-Ary Tree (0)
- 20: Algorithm for “Nice” Grid Line Intervals on a Graph (0)
- 19: The Difference Between Lower Bound and Tight Bound (0)
- 19: Roulette Selection in Genetic Algorithms (0)
- 17: Merge Two Sorted Arrays Into a Sorted Array (0)
- 17: Efficient Ways to Find the Intersection of Lists (1)
- 16: Height of a Balanced Tree (0)
- 16: Geofencing – Determining Whether a Point is Inside of a Polygon (0)
- 16: Choosing an Attractive Linear Scale for a Graph’s Y Axis (0)
- 16: Converting a Uniform Distribution to a Normal Distribution (0)
- 16: Gradient Descent vs. Newton’s Gradient Descent (0)
- 15: Remove Duplicates From a Linked List (0)
- 13: How Does the Google “Did You Mean?” Algorithm Work? (0)
- 13: Maximizing Profit for Given Stock Quotes (0)
- 13: Getting a Path From a Root to a Node in a Binary Tree (0)
- 12: Understanding Forecast Accuracy: MAPE, WAPE, WMAPE (0)
- 11: Worst Sorting Algorithms – What to Avoid (1)
- 11: Brute Force Algorithm in Cybersecurity and String Search (0)
- 10: What is a DMZ in Networking? (0)
- 10: How Does FIFO Page Replacement Work? (0)
- 10: What is Cross-Entropy? (0)
- 08: What is an Idempotent Operation? (0)
- 08: Algorithms for Determining Text Sentiment (0)
- 08: Palindromic Substrings in O(n) with Manacher’s Algorithm (0)
- 07: Finding All Overlapping Intervals (0)
- 07: Peak Detection in a Measured Signal (0)
- 07: Advantages and Disadvantages of Neural Networks Against SVMs (0)
- 07: Peak detection in a 2D Array (0)
- 06: Maximum Single-Sell Profit (0)
- 05: Time and Space Complexity of Adjacency Matrix and List (2)
- 03: Graph Auto-Layout Algorithm (0)
- 03: Find All Simple Paths Between Two Vertices in a Graph (0)
- 02: How to Reverse a Linked List (0)
- 01: Determine Whether Two Nodes in a Graph Are Connected (0)
- 01: Clean Code: Comments (4)
-
August 2020
(45)
- 31: Draw a Chart Using LaTeX (0)
- 30: Top-N Accuracy Metrics (0)
- 30: Draw a Graph Using LaTeX (2)
- 30: Choosing the Subarray That Adds Up to a Target Number (0)
- 30: Generating Dependency Graphs With Text (2)
- 28: Sort Points in Clockwise Order (0)
- 27: Finding the Kth Smallest Element in the Union of Two Sorted Arrays (0)
- 27: Find the Subset of Numbers That Add Closest to Target Number (0)
- 27: Introduction to Firewalls (0)
- 26: Find the Next Higher Number (0)
- 26: How to Calculate the Area of a 2D Polygon? (0)
- 26: Sentiment Analysis Dictionaries (0)
- 24: Graphs: Sparse vs Dense (0)
- 24: Neural Network Architecture: Criteria for Choosing the Number and Size of Hidden Layers (0)
- 23: What’s the Difference Between a Word and a Byte? (0)
- 23: Branch and Bound Algorithm (0)
- 23: Reconstructing a Tree From Its Depth-First Traversals (0)
- 22: How to Validate a Binary Search Tree? (0)
- 22: Training Data for Sentiment Analysis (0)
- 22: Looping in a Spiral (0)
- 22: What the Correlation Coefficient Actually Represents (0)
- 20: Introduction to SSH (0)
- 19: Differences Between Classification and Clustering (0)
- 19: F-1 Score for Multi-Class Classification (0)
- 18: The Difference Between Epoch and Iteration in Neural Networks (0)
- 15: Create Balanced Binary Search Tree From Sorted List (2)
- 14: What is a Mutex? (0)
- 14: Understanding Randomness (0)
- 13: A* Pathfinding Algorithm (0)
- 13: Overview of Rabin-Karp Algorithm (0)
- 12: How to Prove That a Problem Is NP-Complete? (0)
- 12: Introduction to the Domain Name System (DNS) (0)
- 11: Quicksort Worst Case Time Complexity (6)
- 09: Object-Orientation in the Real World (0)
- 09: Deep Dive into Hashing (0)
- 09: What is a Policy in Reinforcement Learning? (2)
- 08: What is the Difference Between Gradient Descent and Gradient Ascent? (0)
- 07: Overview of Dijkstra’s Algorithm (0)
- 06: SVM Vs Neural Network (0)
- 06: How to Check If a Binary Tree Is Symmetric? (0)
- 05: Support Vector Machines (SVM) (0)
- 04: Finding XOR of All Numbers in a Given Range (0)
- 04: Implementing the Decrease-Key Operation for Min-Heaps (0)
- 03: Levenshtein Distance Computation (0)
- 02: When Not to Use Regular Expressions? (0)
-
July 2020
(50)
- 31: Regular Expressions (0)
- 31: Boolean Algebra: Basic Laws (0)
- 31: Introduction to VLAN (0)
- 30: Normalizing Inputs for an Artificial Neural Network (0)
- 30: What is a Learning Curve in Machine Learning? (1)
- 27: Introduction to Convolutional Neural Networks (0)
- 27: Lowest Common Ancestor of Two Nodes in a Tree (0)
- 27: Introduction to the Classification Model Evaluation (0)
- 27: Dijkstra’s vs Bellman-Ford Algorithm (2)
- 25: Introduction to DHCP (0)
- 25: Introduction to RAID (0)
- 25: Computing Bubble Sort Time Complexity (0)
- 24: Sorting the Elements in a Binary Tree (0)
- 24: Introduction to the Binary Tree Data Structure (1)
- 23: Why Does the Cost Function of Logistic Regression Have a Logarithmic Expression? (3)
- 23: Linear Regression vs. Logistic Regression (0)
- 21: The Complexity of Towers of Hanoi (0)
- 21: Sliding Window Algorithm (0)
- 20: First-Order Logic (0)
- 20: Bias in Neural Networks (2)
- 20: How to Find Total Number of Minimum Spanning Trees in a Graph? (0)
- 16: Self-Balancing Binary Search Trees (0)
- 16: What is a Race Condition? (1)
- 14: Detecting Cycles in a Directed Graph (4)
- 14: How Compilers Work (0)
- 14: Floyd-Warshall Algorithm: Shortest Path Finding (0)
- 14: How to Compute the Similarity Between Two Text Documents? (0)
- 14: Topological Sort of Directed Acyclic Graph (0)
- 13: Propositional Logic (0)
- 13: Introduction to Graph Theory (1)
- 13: How to Build a Knowledge Graph? (0)
- 12: Virtualization vs Containerization (0)
- 10: The Difference Between Asynchronous And Multi-Threading (1)
- 10: Finding Articulation Points of a Graph (0)
- 09: Introduction to Red-Black Trees (2)
- 08: Difference Between a Feature and a Label (0)
- 08: Differences Between Tree Structures (0)
- 08: Kruskal’s vs Prim’s Algorithm (3)
- 07: Function Parameters: Call by Reference vs Call by Value (0)
- 07: SAT and 3-SAT – Cook-Levin Theorem (0)
- 06: Computing the Diameter of a Network (0)
- 06: The Liskov Substitution Principle (2)
- 04: Big Data Vs Data Mining (0)
- 04: Cache Write Policy (0)
- 03: Data Normalization Before or After Splitting a Data Set? (0)
- 02: What is the Difference Between Labeled and Unlabeled Data? (0)
- 02: Introduction to Emotion Detection in Written Text (0)
- 02: A Simple Explanation of Naive Bayes Classification (0)
- 01: Computer Science Definition of Entropy (0)
- 01: Maximum Value of an Integer: Java Vs C vs Python (2)
-
June 2020
(28)
- 30: What Are the Prerequisites for Studying Machine Learning? (0)
- 29: Go-Back-N Protocol (0)
- 28: What Is an Incident Edge? (0)
- 28: Determine Maximum Number of Edges in a Directed Graph (0)
- 28: 0-1 Knapsack: A Problem With NP-Completeness and Solvable in Pseudo-Polynomial Time (2)
- 27: How to Find If a Graph Is Bipartite? (6)
- 27: What Is the Difference Between a Directed and an Undirected Graph (0)
- 26: Advantages and Disadvantages of Neural Networks (0)
- 25: Introduction to Virtualization (0)
- 25: Process Control Block (0)
- 24: Stemming vs Lemmatization (0)
- 23: Euclidean Distance vs Cosine Similarity (1)
- 23: Divide and Conquer Algorithms (1)
- 23: Publicly Available Spam Filter Training Sets (0)
- 22: Types of Queues (2)
- 22: Shortest Path to Certain Nodes in a Graph (0)
- 21: Fibonacci: Top-Down vs Bottom-Up Dynamic Programming (0)
- 17: Constituency Parsing vs Dependency Parsing (0)
- 15: Feature Scaling (0)
- 12: PCA: Principal Component Analysis (0)
- 11: An Introduction to Amortized Analysis (0)
- 10: A Quick Guide to Binary Search Trees (2)
- 10: Determining Whether a Directed or Undirected Graph Is a Tree (0)
- 09: Hamiltonian vs Euler Path (0)
- 08: Bellman Ford Shortest Path Algorithm (2)
- 08: Functional Programming (0)
- 04: Understanding Dimensions in CNNs (1)
- 02: Linear Search vs Binary Search (1)
-
May 2020
(21)
- 31: Finding the Lowest Common Ancestor of Two Nodes in a Binary Tree (0)
- 30: How ReLU and Dropout Layers Work in CNNs (0)
- 29: Nonlinear Activation Functions in a Backpropagation Neural Network (0)
- 29: Finding the Maximum-Minimum Capacity For a Node in a Graph (0)
- 28: Longest Palindromic Subsequence With Dynamic Programming (0)
- 26: Implement Stack Using Two Queues (2)
- 25: Minimum Spanning Tree Vs Shortest Path Tree (0)
- 23: The ABA Problem in Concurrency (0)
- 23: Inadequacy of Linear Models: the Road to Nonlinear Functions (0)
- 21: Tries (Prefix Trees) (0)
- 21: Knuth-Morris-Pratt Algorithm (0)
- 20: What is the Optimal Algorithm for the Game 2048? (0)
- 17: What is a Monitor in Computer Science? (0)
- 15: Connected Components in a Graph (0)
- 15: The Difference Between B-trees and B+trees (1)
- 13: Difference Between BFS and Dijkstra’s Algorithms (2)
- 12: Difference Between Tree Depth and Height (0)
- 08: Understanding Space Complexity (3)
- 05: Cycles in an Undirected Graph (0)
- 05: Greedy Approach vs Dynamic Programming (1)
- 04: Genetic Algorithms vs Neural Networks (0)
-
April 2020
(7)
- 29: Graph Data Structures (0)
- 27: Solving Binary Gap Using Recursion (3)
- 24: Predicates in Computer Science (0)
- 16: Longest Increasing Subsequence Using Dynamic Programming (0)
- 14: Clustering Into an Unknown Number of Clusters (0)
- 12: Computational Complexity of Fibonacci Sequence (0)
- 07: Methods of Depth First Traversal and Their Applications (0)
- March 2020 (5)
-
February 2020
(1)
- 29: Two’s Complement (0)
- January 2020 (5)