Tagged articles
619 articles
Page 2 of 7
Java Tech Enthusiast
Java Tech Enthusiast
Dec 7, 2024 · Interview Experience

Solve LeetCode 739 ‘Daily Temperatures’ Using a Monotonic Stack

This article explains the LeetCode 739 'Daily Temperatures' problem, describing how to compute the next warmer day for each temperature using a monotonic stack, and provides complete implementations in Java, C++, and Python, along with step‑by‑step analysis and example walkthroughs.

Daily TemperaturesLeetCodeMonotonic Stack
0 likes · 6 min read
Solve LeetCode 739 ‘Daily Temperatures’ Using a Monotonic Stack
Lobster Programming
Lobster Programming
Nov 28, 2024 · Fundamentals

How Paxos Guarantees Strong Consistency in Distributed Systems

This article explains the Paxos consensus algorithm, detailing its roles (proposer, acceptor, learner), the two-phase prepare and accept process, handling of proposal numbers, and how it ensures strong consistency across distributed nodes through examples and diagrams.

Distributed SystemsPaxosalgorithm
0 likes · 9 min read
How Paxos Guarantees Strong Consistency in Distributed Systems
Java Tech Enthusiast
Java Tech Enthusiast
Nov 19, 2024 · Fundamentals

Computational Equivalence and Turing Completeness

Given unlimited time and memory, any computing device—from supercomputers to smartphones—can execute the same set of tasks, differing only in speed and resources, because a system that can simulate a Turing machine is Turing‑equivalent, making all Turing‑complete languages capable of solving any computable problem, with only efficiency or code length varying.

Turing completenessalgorithmcomputational theory
0 likes · 4 min read
Computational Equivalence and Turing Completeness
php Courses
php Courses
Nov 8, 2024 · Backend Development

Simulating Recursion in PHP Using Stacks, Loops, and Goto

This article explains how to replace recursive functions in PHP with stack‑based iteration, loop‑driven depth‑first tree traversal, and even a goto‑based approach, providing complete code examples and discussing the trade‑offs of each method.

GotoRecursionStack
0 likes · 7 min read
Simulating Recursion in PHP Using Stacks, Loops, and Goto
JD Tech Talk
JD Tech Talk
Nov 7, 2024 · Databases

Understanding Bloom Filters and Cuckoo Filters

This article explains Bloom filters and Cuckoo filters, covering their principles, implementations, and practical applications in database optimization.

Cuckoo FilterData Structuresalgorithm
0 likes · 12 min read
Understanding Bloom Filters and Cuckoo Filters
DevOps
DevOps
Oct 31, 2024 · Backend Development

Improving Backend Engineer Skills: Abstract Problem Solving and Code Abstractions

This article explores the core competencies of backend engineers, emphasizing accurate problem abstraction, discusses Go's ServerCodec and I/O interfaces, demonstrates algorithmic solutions to the Word Search II problem, and offers practical advice on improving coding skills through studying language features, system design, and effective learning habits.

BackendGolangabstraction
0 likes · 19 min read
Improving Backend Engineer Skills: Abstract Problem Solving and Code Abstractions
Programmer DD
Programmer DD
Oct 30, 2024 · Fundamentals

How Raft Elects a Leader and Replicates Logs: Step-by-Step Walkthrough

This article explains the Raft consensus algorithm's leader election, log replication, and log alignment processes using a three‑node cluster example, detailing heartbeat timeouts, RequestVote handling, AppendEntries messaging, and the iterative steps required to keep followers consistent with the leader.

Log ReplicationRaftalgorithm
0 likes · 9 min read
How Raft Elects a Leader and Replicates Logs: Step-by-Step Walkthrough
DaTaobao Tech
DaTaobao Tech
Oct 28, 2024 · Fundamentals

Garbage Collection Algorithms and Reference Counting in QuickJS

QuickJS manages memory using reference counting for each object combined with a cycle‑collector that periodically scans roots, decrements child references, and frees objects whose counts drop to zero, while also supporting traditional reachability‑based garbage‑collection techniques such as mark‑sweep, copying, and generational collection.

Garbage CollectionJavaScriptMemory Management
0 likes · 9 min read
Garbage Collection Algorithms and Reference Counting in QuickJS
Zhuanzhuan Tech
Zhuanzhuan Tech
Sep 26, 2024 · Artificial Intelligence

Pricing Strategy and Model Evolution for Second‑Hand Phone Auctions in ZhaiZhai TOB Marketplace

This article examines the characteristics of ZhaiZhai's B2B auction scenario, defines core pricing metrics, presents a step‑by‑step methodology for determining optimal starting prices, reviews early practices and their shortcomings, and details the current modular machine‑learning model architecture that improves transaction rates and reduces price premiums for second‑hand smartphones.

OperationsPrice Optimizationalgorithm
0 likes · 29 min read
Pricing Strategy and Model Evolution for Second‑Hand Phone Auctions in ZhaiZhai TOB Marketplace
Java Tech Enthusiast
Java Tech Enthusiast
Sep 12, 2024 · Backend Development

Rate Limiting Algorithms and Implementations in Java Microservices

The article explains service rate limiting and demonstrates six Java implementations—Fixed Window, Sliding Window, Leaky Bucket, Token Bucket, Sentinel middleware, and Spring Cloud Gateway—detailing their algorithms, code examples, and configuration to protect microservices from overload.

MicroservicesSpring Cloudalgorithm
0 likes · 20 min read
Rate Limiting Algorithms and Implementations in Java Microservices
Tencent Cloud Developer
Tencent Cloud Developer
Sep 3, 2024 · Backend Development

Rate Limiting: Purpose, Algorithms, Implementation Methods, Strategies, and Considerations

Rate limiting safeguards system stability by capping request rates, employing algorithms such as fixed‑window, sliding‑window, leaky‑bucket, and token‑bucket, and can be applied at application, proxy, or hardware layers while using strategies like threshold setting, request classification, feedback, and ensuring fairness, flexibility, and transparency.

BackendDistributed SystemsGolang
0 likes · 28 min read
Rate Limiting: Purpose, Algorithms, Implementation Methods, Strategies, and Considerations
Huolala Tech
Huolala Tech
Aug 15, 2024 · Operations

How to Build an Automated Log‑Clustering Engine for Exception Monitoring

This article explains why monitoring abnormal code branches is crucial, outlines the challenges of log analysis, proposes a log‑clustering engine with spell and DBSCAN algorithms, describes its architecture, workflow, and implementation details, and highlights the benefits for system stability and operational efficiency.

Log ClusteringLog Monitoringalgorithm
0 likes · 15 min read
How to Build an Automated Log‑Clustering Engine for Exception Monitoring
php Courses
php Courses
Aug 8, 2024 · Backend Development

Fast Multiplication of Large Integers Using PHP GMP Library

This article explains how to perform efficient large‑integer multiplication in PHP by leveraging the GMP (GNU Multiple Precision) library, describes the underlying fast multiplication algorithm, and provides a complete PHP code example implementing the method.

GMPalgorithmbig integers
0 likes · 4 min read
Fast Multiplication of Large Integers Using PHP GMP Library
IT Architects Alliance
IT Architects Alliance
Aug 4, 2024 · Information Security

How to Perform Fuzzy Search on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and compares three implementation approaches—naïve, conventional, and advanced—detailing their principles, performance implications, storage costs, and security trade‑offs, ultimately recommending the conventional token‑based method for most practical applications.

Information Securityalgorithmdatabase
0 likes · 13 min read
How to Perform Fuzzy Search on Encrypted Data
Selected Java Interview Questions
Selected Java Interview Questions
Jul 29, 2024 · Fundamentals

Comprehensive Guide to TreeUtil: Building, Traversing, Flattening, and Sorting Tree Structures in Java

This article introduces a versatile Java TreeUtil class that demonstrates how to construct hierarchical tree structures from flat lists, perform pre-order, level-order, and post-order traversals, flatten trees back to lists, and sort nodes using generic functional interfaces, with detailed code examples.

DataStructurealgorithmjava
0 likes · 16 min read
Comprehensive Guide to TreeUtil: Building, Traversing, Flattening, and Sorting Tree Structures in Java
Java Captain
Java Captain
Jul 29, 2024 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and compares three categories of solutions—naïve, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, storage costs, and security implications for real‑world applications.

Information Securityalgorithmencryption
0 likes · 10 min read
How to Perform Fuzzy Queries on Encrypted Data
Liangxu Linux
Liangxu Linux
Jul 27, 2024 · Fundamentals

Master Linked Lists in C: From Arrays to Circular Lists

This article explains the differences between array‑based sequential storage and pointer‑based linked storage, introduces singly, doubly and circular linked lists, and provides complete C implementations for creation, insertion, deletion, and traversal with clear diagrams and step‑by‑step code examples.

ArrayData Structurealgorithm
0 likes · 25 min read
Master Linked Lists in C: From Arrays to Circular Lists
DataFunSummit
DataFunSummit
Jul 13, 2024 · Artificial Intelligence

Causal Inference Knowledge Map: Framework, Application Evaluation, Typical Algorithms, Implementation Challenges, and JD Tech Credit Decision Model

This article presents a comprehensive knowledge map of causal inference covering its overall framework, how to evaluate decision‑making scenarios, typical causal algorithms, practical challenges in deployment, a JD Tech credit‑limit case study, and future research directions.

Data ScienceDecision Modelingalgorithm
0 likes · 15 min read
Causal Inference Knowledge Map: Framework, Application Evaluation, Typical Algorithms, Implementation Challenges, and JD Tech Credit Decision Model
MaGe Linux Operations
MaGe Linux Operations
Jul 12, 2024 · Fundamentals

Mastering Recursion: Classic Examples and How They Simplify Complex Problems

Recursion, a programming technique where a function calls itself, can elegantly solve problems like factorials, Fibonacci sequences, and binary search, and this article explains its definition, key concepts, characteristics, and provides clear Python examples to deepen understanding of this fundamental algorithmic approach.

Recursionalgorithmexamples
0 likes · 8 min read
Mastering Recursion: Classic Examples and How They Simplify Complex Problems
php Courses
php Courses
Jul 12, 2024 · Fundamentals

Detecting Duplicate Elements in an Array Using PHP

This article explains how to determine whether an integer array contains any duplicate values by iterating through the elements, using a hash map for constant‑time lookups, and provides a PHP implementation of the containsDuplicate function along with its time and space complexity analysis.

Arrayalgorithmduplicate detection
0 likes · 4 min read
Detecting Duplicate Elements in an Array Using PHP
Alimama Tech
Alimama Tech
Jul 11, 2024 · Artificial Intelligence

Efficient Local Search for Guaranteed Display Advertising Inventory Allocation with Multilinear Constraints

The paper introduces LS‑IMP, a two‑stage local‑search algorithm with four novel operators that efficiently solves guaranteed‑delivery advertising inventory allocation under non‑convex multilinear media‑preference constraints, consistently outperforming commercial solvers and heuristics in solution quality and speed on real‑world datasets.

algorithminventory allocationlocal search
0 likes · 17 min read
Efficient Local Search for Guaranteed Display Advertising Inventory Allocation with Multilinear Constraints
AI Architecture Hub
AI Architecture Hub
Jun 20, 2024 · Big Data

How GeoHash Powers Efficient Large-Scale Location Queries Without Pagination

This article explains the GeoHash algorithm, shows how it converts latitude‑longitude pairs into compact binary strings, demonstrates the encoding process with a concrete example, and discusses how the resulting prefixes can be used to quickly locate nearby users in massive datasets while highlighting remaining edge‑case challenges.

Big DataGeoHashLocation Query
0 likes · 7 min read
How GeoHash Powers Efficient Large-Scale Location Queries Without Pagination
Architect
Architect
Jun 18, 2024 · Big Data

How GeoHash Powers Real‑Time Ride‑Hailing: From Theory to Practice

This article explains the GeoHash algorithm, demonstrates how binary subdivision of latitude and longitude yields compact base‑32 strings, and shows how these hashes can efficiently locate nearby ride‑hailing drivers while highlighting precision limitations and edge cases.

Big DataGeoHashLocation Services
0 likes · 8 min read
How GeoHash Powers Real‑Time Ride‑Hailing: From Theory to Practice
Ops Development & AI Practice
Ops Development & AI Practice
Jun 17, 2024 · Fundamentals

End‑to‑End vs Divide‑and‑Conquer: Which Algorithm Wins in Real‑World Scenarios?

This article compares end‑to‑end and divide‑and‑conquer algorithmic approaches, outlining their definitions, strengths, weaknesses, and ideal use‑cases, and illustrates the differences with concrete examples in image classification and sorting, helping developers choose the most suitable method for performance and reliability.

End-to-EndSortingalgorithm
0 likes · 7 min read
End‑to‑End vs Divide‑and‑Conquer: Which Algorithm Wins in Real‑World Scenarios?
DevOps
DevOps
Jun 12, 2024 · Backend Development

Analysis and Implementation of Various WeChat Red Packet Distribution Algorithms in PHP

This article examines four common WeChat red packet distribution algorithms—simple random, double‑mean, line‑segment division, and array_rand optimization—explaining their principles, PHP implementations, performance characteristics, and how to verify randomness, providing code samples and comparative analysis for developers.

BackendPHPalgorithm
0 likes · 13 min read
Analysis and Implementation of Various WeChat Red Packet Distribution Algorithms in PHP
Python Programming Learning Circle
Python Programming Learning Circle
May 29, 2024 · Game Development

Python Implementation of the Zha Jin Hua Card Game

This article demonstrates how to create a Python program that simulates the Chinese card game Zha Jin Hua, covering deck preparation, player handling, card dealing, hand evaluation, scoring rules, and statistical analysis of game outcomes, with complete source code and example results.

PythonZha Jin Huaalgorithm
0 likes · 12 min read
Python Implementation of the Zha Jin Hua Card Game
php Courses
php Courses
May 28, 2024 · Backend Development

Fast Multiplication of Large Integers Using PHP GMP Library

This article explains how to use PHP's GMP extension to perform fast multiplication of large integers by applying a divide‑and‑conquer algorithm, reducing the complexity from quadratic to near‑linear, and provides a complete PHP implementation with example code.

BackendGMPPHP
0 likes · 4 min read
Fast Multiplication of Large Integers Using PHP GMP Library
php Courses
php Courses
May 23, 2024 · Fundamentals

Fast Multiplication of Large Integers Using PHP GMP Library

This article explains how to use PHP's GMP extension to perform fast multiplication of very large integers by applying a divide‑and‑conquer algorithm that reduces the computational complexity and provides a complete PHP implementation.

GMPPHPRecursion
0 likes · 5 min read
Fast Multiplication of Large Integers Using PHP GMP Library
DaTaobao Tech
DaTaobao Tech
May 13, 2024 · Big Data

Interview Algorithms and System Design: Bloom Filter, TopK, Median, and Concurrency Implementations

The article presents a suite of interview‑style algorithm and system‑design solutions—including Bloom‑filter URL blacklists, hash‑partitioned word frequencies, missing‑number bit arrays, top‑K min‑heap, low‑memory median, short‑URL encoding, Redis user counting, and extensive Java implementations of sorting, singleton, LRU cache, custom thread pools, producer‑consumer models and various FooBar synchronization techniques.

Big DataData Structuresalgorithm
0 likes · 35 min read
Interview Algorithms and System Design: Bloom Filter, TopK, Median, and Concurrency Implementations
Architect
Architect
May 10, 2024 · Backend Development

Rate Limiting Algorithms: Fixed Window, Sliding Window, Leaky Bucket, Token Bucket, and Distributed Rate Limiting

This article explains the importance of rate limiting in microservice architectures, introduces four basic algorithms—fixed window, sliding window, leaky bucket, and token bucket—compares their advantages and disadvantages, and presents both single-machine and distributed implementations with Go code examples.

Distributed SystemsGolangMicroservices
0 likes · 29 min read
Rate Limiting Algorithms: Fixed Window, Sliding Window, Leaky Bucket, Token Bucket, and Distributed Rate Limiting
Zhuanzhuan Tech
Zhuanzhuan Tech
May 8, 2024 · Backend Development

Optimizing Coupon Combination Algorithms: From Cartesian Product to Array Indexing

This article explains the rules of platform coupons, demonstrates a concrete example, and details three generations of algorithms—from a Cartesian‑product approach to Map‑based and array‑index methods—highlighting their implementations, performance trade‑offs, and a comparative benchmark.

algorithmcoupon optimizatione‑commerce
0 likes · 10 min read
Optimizing Coupon Combination Algorithms: From Cartesian Product to Array Indexing
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
May 7, 2024 · Artificial Intelligence

Winning Huawei’s Global Smart Port Challenge: Key Strategies and AI Techniques

The Harbin Institute of Technology team detailed their championship journey in Huawei's 2024 Software Elite Challenge, explaining the competition's smart‑port scenario, their multi‑stage algorithmic approach for robot and ship decision‑making, path‑finding optimizations, large‑model integration, and performance tuning that secured first place.

AIHuaweiSmart Port
0 likes · 18 min read
Winning Huawei’s Global Smart Port Challenge: Key Strategies and AI Techniques
DataFunTalk
DataFunTalk
May 5, 2024 · Artificial Intelligence

Causal Inference Knowledge Map: Framework, Application Evaluation, Typical Algorithms, Practical Challenges, and JD Technology Case Study

This article presents a comprehensive knowledge map of causal inference, covering its overall framework, how to evaluate decision‑making scenarios, typical causal algorithms, real‑world implementation difficulties, a JD Technology credit‑limit case, and future research directions.

algorithmdecision making
0 likes · 15 min read
Causal Inference Knowledge Map: Framework, Application Evaluation, Typical Algorithms, Practical Challenges, and JD Technology Case Study
Java Tech Enthusiast
Java Tech Enthusiast
May 1, 2024 · Fundamentals

Zigzag Conversion Algorithm (LeetCode 6)

The Zigzag Conversion algorithm rearranges an input string into a Z‑shaped pattern across a specified number of rows, tracks the current row while toggling direction at the top and bottom, stores characters per row, and finally concatenates the rows to produce the transformed string, with reference implementations in C++, Java, and Python.

LeetCodePythonString
0 likes · 9 min read
Zigzag Conversion Algorithm (LeetCode 6)
Selected Java Interview Questions
Selected Java Interview Questions
Apr 25, 2024 · Information Security

Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations

The article examines why encrypted sensitive fields such as passwords, phone numbers, and bank details need special handling, categorises three families of fuzzy‑search solutions for encrypted data, evaluates their security, performance and storage costs, and recommends a balanced conventional method for production use.

Data ProtectionInformation Securityalgorithm
0 likes · 10 min read
Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations
DaTaobao Tech
DaTaobao Tech
Apr 24, 2024 · Fundamentals

Comprehensive Collection of Algorithm Templates and Code Snippets for LeetCode

This guide compiles essential Python built‑in functions, data‑structure utilities, and ready‑to‑use algorithmic templates—including dynamic programming, backtracking with caching, binary search, bit manipulation, union‑find, topological sort, monotonic stack, sliding window, prefix sums, two‑pointer and graph traversals—to accelerate LeetCode problem solving.

Data StructuresLeetCodealgorithm
0 likes · 25 min read
Comprehensive Collection of Algorithm Templates and Code Snippets for LeetCode
Architecture Digest
Architecture Digest
Apr 14, 2024 · Backend Development

Optimizing Nested Loops in Java: From O(N²) to O(N) Using HashMap

This article demonstrates how to replace a costly double‑for‑loop that matches two large lists of users with a HashMap lookup, showing performance measurements, the effect of adding a break statement, and detailed Java code examples for backend developers.

HashMapalgorithmbackend-development
0 likes · 7 min read
Optimizing Nested Loops in Java: From O(N²) to O(N) Using HashMap
php Courses
php Courses
Apr 10, 2024 · Backend Development

Using PHP sort() Function to Sort Arrays in Ascending Order

This article explains how to use PHP's built-in sort() function to sort arrays in ascending order, covering syntax, parameters, return values, and practical examples for both string and numeric arrays, including code snippets and output demonstrations.

ArrayPHPalgorithm
0 likes · 3 min read
Using PHP sort() Function to Sort Arrays in Ascending Order
Python Programming Learning Circle
Python Programming Learning Circle
Mar 25, 2024 · Game Development

Implementing Automatic Missile Tracking in Python with Pygame

This article explains the mathematics and step‑by‑step Python pygame implementation of an automatic missile‑tracking algorithm for shooting games, covering time‑slice calculations, trigonometric direction computation, and image rotation handling to keep the missile tip aligned with the target.

Game DevelopmentMissile TrackingPygame
0 likes · 8 min read
Implementing Automatic Missile Tracking in Python with Pygame
php Courses
php Courses
Mar 12, 2024 · Fundamentals

Fast Multiplication of Large Integers Using PHP GMP Library

This article explains how to perform fast multiplication of large integers in PHP by leveraging the GNU Multiple Precision (GMP) library, introduces the underlying fast multiplication algorithm that reduces complexity from O(n²) to O(n log n), and provides a complete PHP code example implementing the method.

PHPalgorithmbig integer
0 likes · 5 min read
Fast Multiplication of Large Integers Using PHP GMP Library
Sanyou's Java Diary
Sanyou's Java Diary
Mar 7, 2024 · Backend Development

Mastering Rate Limiting: Algorithms, Pros, Cons, and Distributed Solutions

This article explores why rate limiting is essential for high‑concurrency services, introduces four core algorithms with Go implementations, compares their strengths and weaknesses, and presents practical distributed limiting strategies using Redis, load balancers, and coordination services.

GolangMicroservicesalgorithm
0 likes · 30 min read
Mastering Rate Limiting: Algorithms, Pros, Cons, and Distributed Solutions
Alimama Tech
Alimama Tech
Mar 6, 2024 · Artificial Intelligence

Risk-Constrained Budget Pacing for Guaranteed Display Advertising

The paper introduces a percentile‑based risk‑constrained budget‑pacing algorithm for guaranteed‑delivery display ads that ties the pacing rate to the dual‑bidding factor’s percentile, preserving volume guarantees while preventing rapid spend bursts, using adaptive transforms, gradient clipping and stop‑loss controls, and demonstrates smoother spend and performance gains in large‑scale A/B tests.

Online Optimizationalgorithmbudget pacing
0 likes · 16 min read
Risk-Constrained Budget Pacing for Guaranteed Display Advertising
Architect Chen
Architect Chen
Mar 1, 2024 · Backend Development

Mastering the Snowflake Algorithm: Generate Distributed Unique IDs in Java

This article explains the Snowflake algorithm's principles, features, and Java implementation for generating high‑performance, ordered, and globally unique IDs in distributed systems, while highlighting key considerations such as node ID allocation and clock synchronization.

algorithmdistributed-idsnowflake
0 likes · 7 min read
Mastering the Snowflake Algorithm: Generate Distributed Unique IDs in Java
Sohu Tech Products
Sohu Tech Products
Feb 28, 2024 · Big Data

How SimHash and Cosine Similarity Accelerate Large‑Scale Text Deduplication

This article explains why massive news feeds need efficient deduplication, compares cosine similarity and SimHash for measuring text similarity, walks through a step‑by‑step implementation with Java code, and shows how a space‑for‑time indexing strategy can reduce duplicate‑detection complexity from O(n²) to near O(1).

Big DataCosine SimilarityNear-Duplicate Detection
0 likes · 14 min read
How SimHash and Cosine Similarity Accelerate Large‑Scale Text Deduplication
Tencent Cloud Developer
Tencent Cloud Developer
Feb 28, 2024 · Backend Development

Comprehensive Guide to Rate Limiting Algorithms and Distributed Rate Limiting Solutions

This guide explains why rate limiting is essential for micro‑service stability, outlines six design principles, details four classic algorithms—fixed window, sliding window, leaky bucket, and token bucket—and compares centralized Redis, load‑balancer cache, and coordination‑service distributed solutions.

Distributed SystemsGolangMicroservices
0 likes · 30 min read
Comprehensive Guide to Rate Limiting Algorithms and Distributed Rate Limiting Solutions
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Feb 21, 2024 · Backend Development

Recreating the Spring Festival Gala Magic Trick Using Go

This article walks through a step‑by‑step Go implementation of the popular Spring Festival Gala magic trick, explaining the underlying Josephus‑style algorithm, showing each transformation of a slice of cards with complete code snippets, and demonstrating how the final single card matches the hidden one.

GoJosephus problemMagic Trick
0 likes · 9 min read
Recreating the Spring Festival Gala Magic Trick Using Go
IT Services Circle
IT Services Circle
Feb 20, 2024 · Fundamentals

LeetCode 392: Determine if a String is a Subsequence Using the Two‑Pointer Technique

This article humorously references recent layoff memes before presenting a detailed tutorial on solving LeetCode problem 392—checking whether string s is a subsequence of t—using a two‑pointer algorithm, complete with step‑by‑step explanation, complexity analysis, visual illustrations, and reference implementations in C++, Java, and Python.

C++LeetCodePython
0 likes · 8 min read
LeetCode 392: Determine if a String is a Subsequence Using the Two‑Pointer Technique
IT Services Circle
IT Services Circle
Feb 14, 2024 · Fundamentals

Linked List Fundamentals: Memory Representation and Comparison with Arrays

This article explains the fundamental concepts of linked lists, contrasting them with arrays through memory allocation analogies, illustrating how linked lists provide dynamic, non‑contiguous storage, their node structure, advantages, disadvantages, and practical implementation considerations across programming languages.

Arraysalgorithmlinked list
0 likes · 7 min read
Linked List Fundamentals: Memory Representation and Comparison with Arrays
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Feb 13, 2024 · Fundamentals

Exploring Diff Algorithms: Edit Distance, Longest Common Subsequence, and Myers Algorithm with TypeScript Implementations

This article examines the principles behind diff tools by implementing three approaches—Levenshtein edit distance, longest common subsequence, and the Myers algorithm—in TypeScript, detailing dynamic-programming solutions, back-tracing techniques, and visualizations to illustrate how strings can be transformed efficiently.

TypeScriptalgorithmdiff
0 likes · 19 min read
Exploring Diff Algorithms: Edit Distance, Longest Common Subsequence, and Myers Algorithm with TypeScript Implementations
High Availability Architecture
High Availability Architecture
Jan 17, 2024 · Backend Development

Rate Limiting Algorithms: Fixed Window, Sliding Window, Leaky Bucket, and Token Bucket – Principles, Java Implementations, Pros & Cons

This article explains why rate limiting is essential for high‑concurrency systems, defines rate limiting, introduces four common algorithms (fixed‑window, sliding‑window, leaky‑bucket, token‑bucket), provides Java code examples for each, compares their advantages and disadvantages, and shows practical usage with Guava's RateLimiter and AOP annotations.

Backendalgorithmaop
0 likes · 17 min read
Rate Limiting Algorithms: Fixed Window, Sliding Window, Leaky Bucket, and Token Bucket – Principles, Java Implementations, Pros & Cons
JD Cloud Developers
JD Cloud Developers
Jan 11, 2024 · Fundamentals

Why Red-Black Trees Beat AVL: Insertion, Deletion, and Java TreeMap

This article explores the classic implementation of red‑black trees, comparing them with AVL trees, detailing their 2‑3‑4 tree correspondence, and walking through Java TreeMap insertion and deletion algorithms, including node definitions, rotation cases, and rebalancing procedures, while analyzing their time complexities.

AVL treeData StructuresJava TreeMap
0 likes · 20 min read
Why Red-Black Trees Beat AVL: Insertion, Deletion, and Java TreeMap
Amap Tech
Amap Tech
Dec 28, 2023 · Backend Development

Rate Limiting Algorithms and Their Java Implementations

Rate limiting protects system stability by capping request rates, and this article explains five Java algorithms—Fixed Window, Sliding Window, Leaky Bucket, Token Bucket, and Guava's RateLimiter—showing their principles, pros and cons, and providing sample implementations and a Spring @Limit annotation for practical enforcement.

Distributed SystemsGuavaalgorithm
0 likes · 17 min read
Rate Limiting Algorithms and Their Java Implementations
政采云技术
政采云技术
Dec 28, 2023 · Fundamentals

Queue and Stack Concepts, Implementations, and Applications in Java

This article explains the definitions, characteristics, and overflow cases of sequential and circular queues and stacks, provides Java implementations for these data structures, demonstrates their usage with sample code and results, and discusses practical applications of queue thinking in database-driven workflows.

QueueStackalgorithm
0 likes · 13 min read
Queue and Stack Concepts, Implementations, and Applications in Java
Alibaba Cloud Developer
Alibaba Cloud Developer
Dec 21, 2023 · Backend Development

Mastering Rate Limiting: Algorithms, Java Implementations, and Guava Tips

This article explains why rate limiting is essential for high‑traffic systems, defines common rate‑limiting algorithms (fixed window, sliding window, leaky bucket, token bucket), provides complete Java code examples for each, and demonstrates practical usage with Guava's RateLimiter in real‑world applications.

BackendDistributed SystemsGuava
0 likes · 19 min read
Mastering Rate Limiting: Algorithms, Java Implementations, and Guava Tips
Python Programming Learning Circle
Python Programming Learning Circle
Nov 24, 2023 · Game Development

Implementing the Chinese Card Game “Zha Jin Hua” (Three‑Card Poker) with Python

This article explains the rules of the popular Chinese card game Zha Jin Hua, demonstrates how to generate a standard deck, deal cards to multiple players, evaluate hand types, calculate scores with multipliers, run large‑scale simulations for frequency analysis, and provides the complete Python source code for the entire workflow.

Game DevelopmentScore CalculationZha Jin Hua
0 likes · 12 min read
Implementing the Chinese Card Game “Zha Jin Hua” (Three‑Card Poker) with Python
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 19, 2023 · Game Development

Match‑3 Game Development Tutorial with JavaScript and Cocos

This article provides a step‑by‑step tutorial on building a match‑3 (candy‑crush style) game, covering basic rules, core matching and removal algorithms in JavaScript, and a complete implementation in Cocos Creator with grid layout, touch handling, swap animation, piece falling, and refill logic.

Cocosalgorithmgame-development
0 likes · 27 min read
Match‑3 Game Development Tutorial with JavaScript and Cocos
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Nov 12, 2023 · Fundamentals

How to Compute the Shortest Distance on a Circular Road Efficiently

Given a circular road with n stations and the distances between each consecutive pair, this article explains how to determine the minimal travel distance between any two stations by evaluating both clockwise and counter‑clockwise routes, providing problem details, examples, solution logic, reference implementations in Python, Java, and C++, and complexity analysis.

Arrayalgorithmc++
0 likes · 8 min read
How to Compute the Shortest Distance on a Circular Road Efficiently
IT Services Circle
IT Services Circle
Oct 29, 2023 · Fundamentals

Maximum Sum Submatrix – Solution Using 2D Prefix Sum

This article explains the maximum‑sum submatrix problem, presents a brute‑force enumeration, introduces a 2‑dimensional prefix‑sum technique to compute submatrix sums in O(1), and provides a complete Python implementation with complexity analysis.

2D prefix sumPythonalgorithm
0 likes · 9 min read
Maximum Sum Submatrix – Solution Using 2D Prefix Sum
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Oct 22, 2023 · Fundamentals

Merge Multiple Sorted Linked Lists Efficiently with a Min‑Heap

This article explains how to merge multiple sorted linked lists (or arrays) into a single ascending list using a min‑heap priority queue, presents two Python solutions—one converting arrays to linked lists and another operating directly on arrays—along with detailed code, example, and complexity analysis.

algorithmk-way mergelinked list
0 likes · 9 min read
Merge Multiple Sorted Linked Lists Efficiently with a Min‑Heap
Su San Talks Tech
Su San Talks Tech
Oct 22, 2023 · Backend Development

Mastering Rate Limiting: Algorithms, Scenarios, and Practical Implementations

Rate limiting controls request flow to protect system stability, covering its definition, motivations, common algorithms such as token bucket, leaky bucket, fixed and sliding windows, their pros and cons, single‑machine vs distributed implementations, and practical component choices for backend services.

BackendDistributed Systemsalgorithm
0 likes · 17 min read
Mastering Rate Limiting: Algorithms, Scenarios, and Practical Implementations
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 11, 2023 · Fundamentals

Exploring Diff Algorithms: Shortest Edit Distance, Longest Common Subsequence, and Myers Algorithm with TypeScript Implementations

This article investigates how diff tools work by presenting three algorithmic approaches—shortest edit distance, longest common subsequence, and the Myers algorithm—each explained with dynamic‑programming concepts, back‑tracing techniques, and complete TypeScript code examples.

algorithmdiffedit distance
0 likes · 14 min read
Exploring Diff Algorithms: Shortest Edit Distance, Longest Common Subsequence, and Myers Algorithm with TypeScript Implementations
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Oct 6, 2023 · Interview Experience

Maximum Coloring of a 01 String – DP and Greedy Solutions Explained

Given a binary string, you may color some '1's red and some '0's blue but adjacent opposite bits cannot both be colored; this article presents O(N) dynamic‑programming and greedy algorithms that compute the maximum number of characters that can be colored, with full code examples in Python, Java, and C++.

algorithmbinary stringcoding interview
0 likes · 9 min read
Maximum Coloring of a 01 String – DP and Greedy Solutions Explained
Qunar Tech Salon
Qunar Tech Salon
Sep 28, 2023 · Operations

Automated Root Cause Analysis for Flight Ticket Transaction Interception at Qunar: Design, Algorithm, and Performance Optimizations

This article describes how Qunar implemented an automated root‑cause analysis system for flight‑ticket transaction interception, detailing the problem background, system research, a custom algorithm focusing on explanatory power, performance optimizations that reduced analysis time from five minutes to under ten seconds, and the resulting operational improvements.

Operationsalgorithmroot-cause analysis
0 likes · 13 min read
Automated Root Cause Analysis for Flight Ticket Transaction Interception at Qunar: Design, Algorithm, and Performance Optimizations
php Courses
php Courses
Sep 4, 2023 · Fundamentals

Binary Search: Explanation and PHP Implementations

Binary search is an efficient O(log n) algorithm for locating a target value in a sorted array, and this article explains its step-by-step process, provides iterative and recursive PHP code examples, and discusses their usage and performance considerations.

Binary SearchIterativeO(log n)
0 likes · 6 min read
Binary Search: Explanation and PHP Implementations
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Aug 30, 2023 · Fundamentals

Greedy Merchant: Maximize Multi‑Product Profit in Limited Days

This article explains a coding problem where a merchant trades multiple goods over several days, describes the input and output formats, demonstrates how each product can be handled independently using a greedy approach identical to LeetCode 122, provides a full Python implementation, and analyzes its time and space complexity.

algorithmcoding interviewdynamic programming
0 likes · 8 min read
Greedy Merchant: Maximize Multi‑Product Profit in Limited Days
政采云技术
政采云技术
Aug 30, 2023 · Frontend Development

Front‑End Graph Visualization with AntV G6 and Graphin: Concepts, Data Structures, Algorithms, and Custom Development

This article introduces front‑end graph visualization using AntV G6 and Graphin, explains graph models and JSON data structures, covers traversal, shortest‑path and clustering algorithms, compares G6 and Graphin, and provides detailed TypeScript and React code for custom extensions, event handling, and full‑screen support.

AntVG6Graph Visualization
0 likes · 15 min read
Front‑End Graph Visualization with AntV G6 and Graphin: Concepts, Data Structures, Algorithms, and Custom Development
Python Programming Learning Circle
Python Programming Learning Circle
Aug 29, 2023 · Game Development

Python Game Assistant Script for 4399 Pet Matching Classic 2

This tutorial explains how to build a Python script that captures the 4399 mini‑game window, splits the screenshot into icons, uses image hashing to identify matches, applies a path‑finding algorithm to locate connectable pairs, and simulates mouse clicks to automatically clear the game board.

Game AutomationMouse SimulationWin32 API
0 likes · 19 min read
Python Game Assistant Script for 4399 Pet Matching Classic 2