Category:High-importance Computer science articles
Appearance
This category should contain ±1000 important and well-known concepts in computer science. Most articles probably should go into Category:Mid-importance Computer science articles instead.
Administrators: Please do not delete this category as empty! This category may be empty occasionally or even most of the time. |
Top | High | Mid | Low | NA | ??? |
136 | 645 | 1,312 | 3,292 | 1,935 | 3,252 |
Pages in category "High-importance Computer science articles"
The following 139 pages are in this category, out of approximately 645 total. This list may not reflect recent changes.
(previous page) (next page)R
- Talk:R (programming language)
- Talk:Rabin cryptosystem
- Talk:Radix sort
- Talk:Rainbow table
- Talk:Randomized algorithm
- Talk:Rate–distortion theory
- Talk:RC4
- Talk:Real-time computing
- Talk:Recursive descent parser
- Talk:Red–black tree
- Talk:Referential transparency
- Talk:Regular language
- Talk:Regulation of self-driving cars
- Talk:Brian Reid (computer scientist)
- Talk:Rendering (computer graphics)
- Talk:Dennis Ritchie
- Talk:John Alan Robinson
- Talk:Robot ethics
- Talk:Roofline model
- Talk:Round (cryptography)
- Talk:RSA problem
- Talk:Ruby (programming language)
- Talk:Rust (programming language)
S
- Talk:Salt (cryptography)
- Talk:Scala (programming language)
- Talk:Bruce Schneier
- Talk:Schnorr signature
- Talk:Schönhage–Strassen algorithm
- Talk:Scientific visualization
- Talk:Scope (computer science)
- Talk:Dana Scott
- Talk:Scrum (software development)
- Talk:Secret sharing
- Talk:Secure Hash Algorithms
- Talk:Secure multi-party computation
- Talk:Secure Shell
- Talk:Selection (user interface)
- Talk:Selection sort
- Talk:Self-driving car
- Talk:Semantic security
- Talk:Semantics (computer science)
- Talk:Semaphore (programming)
- Talk:Serializability
- Talk:Server-Gated Cryptography
- Talk:Set (abstract data type)
- Talk:Shamir's secret sharing
- Talk:Shannon (unit)
- Talk:Shannon–Hartley theorem
- Talk:Claude Shannon
- Talk:Shared secret
- Talk:Shell (computing)
- Talk:Shellsort
- Talk:Shortest path problem
- Talk:Side-channel attack
- Talk:SIGABA
- Talk:Signal Protocol
- Talk:Signed number representations
- Talk:Simplex algorithm
- Talk:Simultaneous Authentication of Equals
- Talk:Skipjack (cipher)
- Talk:Smalltalk
- Talk:Softmax function
- Talk:Software agent
- Talk:Software bug
- Talk:Software design pattern
- Talk:Software feature
- Talk:Solver
- Talk:Sorting
- Talk:Source code
- Talk:Speculative execution
- Talk:Standard library
- Talk:State machine replication
- Talk:Steganography
- Talk:Story-driven modeling
- Talk:String (computer science)
- Talk:String-searching algorithm
- Talk:Strong NP-completeness
- Talk:Strong RSA assumption
- Talk:Bjarne Stroustrup
- Talk:Suffix tree
- Talk:Superdense coding
- Talk:Symmetric-key algorithm
- Talk:Synchronization (computer science)
- Talk:Syntax and semantics of logic programming
- Talk:System administrator
- Talk:Systems programming
T
- Talk:Tate pairing
- Talk:TensorFlow
- Talk:Charles P. Thacker
- Talk:The Doughnut
- Talk:The Open Group Architecture Framework
- Talk:Ken Thompson
- Talk:Thread (computing)
- Talk:Three-pass protocol
- Talk:Threshold cryptosystem
- Talk:Time complexity
- Talk:Timing attack
- Talk:TLA+
- Talk:TLS-PSK
- Talk:Topological sorting
- Talk:Transcriptor
- Talk:Transmission Control Protocol
- Talk:Transport Layer Security
- Talk:Trapdoor function
- Talk:Travelling salesman problem
- Talk:Tree (abstract data type)
- Talk:Tree structure
- Talk:Tree traversal
- Talk:Trie
- Talk:Two-phase commit protocol
- Talk:Two-phase locking
- Talk:Two's complement
- Talk:Twofish
- Talk:Type conversion
- Talk:Type system
- Talk:Type theory