Tagged articles
619 articles
Page 3 of 7
Bilibili Tech
Bilibili Tech
Aug 25, 2023 · Mobile Development

A Multi‑Layer Approach to Mobile Device Compatibility Test Design and Device Selection

The article proposes a six‑layer methodology for mobile compatibility testing that starts with hardware specs, adds market and roadmap insights, prioritizes high‑share and bug‑prone models, classifies performance tiers, accounts for special devices, aligns scenarios with key parameters, and uses an algorithm to group, rank, and flag representative devices for efficient testing.

algorithmdevice compatibilitydevice selection
0 likes · 11 min read
A Multi‑Layer Approach to Mobile Device Compatibility Test Design and Device Selection
JD Retail Technology
JD Retail Technology
Aug 15, 2023 · Artificial Intelligence

Design and Implementation of a Recommendation Algorithm PaaS for Scalable Business Scenarios

This document describes the background, design, capability classification, implementation details, case studies, practical experience, and future outlook of a recommendation‑algorithm Platform‑as‑a‑Service (PaaS) that enables reusable, extensible, and configurable recommendation capabilities across dozens of business lines.

PaaSalgorithmpersonalization
0 likes · 18 min read
Design and Implementation of a Recommendation Algorithm PaaS for Scalable Business Scenarios
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Aug 13, 2023 · Fundamentals

Multi-Source BFS Solution for the 2023Q2B Mars Terraforming Challenge

The article presents a grid‑based Mars terraforming problem where cells are marked YES, NO, or NA, and asks to determine the minimum number of solar days needed to convert all convertible (NO) cells to habitable (YES) using a multi‑source BFS approach, returning –1 if impossible, with full Python implementation and complexity analysis.

BFSPythonalgorithm
0 likes · 8 min read
Multi-Source BFS Solution for the 2023Q2B Mars Terraforming Challenge
DataFunSummit
DataFunSummit
Aug 12, 2023 · Information Security

Design and Exploration of Mobile Game Anti‑Fraud Systems

This article examines the mobile game black‑market ecosystem, outlines common fraud patterns such as script cheats, account trading, and illegal recharge, and presents a comprehensive anti‑fraud architecture that combines real‑time risk assessment, offline analysis, and adaptive mitigation strategies for game developers and operators.

Game SecurityMobile Gamingalgorithm
0 likes · 21 min read
Design and Exploration of Mobile Game Anti‑Fraud Systems
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Aug 9, 2023 · Interview Experience

Compute the Longest Broadcast Response Time with BFS

This article explains a graph‑based interview problem where, given an undirected network of N nodes and their connections, you must determine the minimum time for a broadcast node to receive all responses, and provides a full Python BFS solution with complexity analysis.

BFSPythonalgorithm
0 likes · 6 min read
Compute the Longest Broadcast Response Time with BFS
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Aug 8, 2023 · Interview Experience

Unlock the Golden Treasure Box: Algorithmic Solutions for Interview Questions

This article presents three interview‑style algorithm problems—a golden treasure‑box search, an inequality‑set validator with maximum‑difference calculation, and a smallest‑number‑after‑removing‑digits task—each with clear problem statements, constraints, step‑by‑step simulation logic, and full Python code implementations.

Data StructuresPythonalgorithm
0 likes · 10 min read
Unlock the Golden Treasure Box: Algorithmic Solutions for Interview Questions
Architect's Tech Stack
Architect's Tech Stack
Aug 3, 2023 · Fundamentals

Performance Comparison of Different Java List Deduplication Methods

This article examines several Java deduplication techniques—including List.contains, HashSet, double-loop removal, and Stream.distinct—by providing sample code, measuring execution time on a 20,000‑element list, and analyzing their time complexities to guide developers toward efficient duplicate‑removal strategies.

CollectionsStreamalgorithm
0 likes · 7 min read
Performance Comparison of Different Java List Deduplication Methods
vivo Internet Technology
vivo Internet Technology
Jul 5, 2023 · Databases

Implementation of Redis LRU and LFU Cache Eviction Algorithms

Redis implements approximate LRU and LFU eviction policies by sampling keys and using a compact 24‑bit field to store timestamps and counters, where LRU evicts the least recently accessed items and LFU evicts those with low, decay‑adjusted access frequency, each with trade‑offs for different workloads.

Cache EvictionLFULRU
0 likes · 13 min read
Implementation of Redis LRU and LFU Cache Eviction Algorithms
DeWu Technology
DeWu Technology
Jun 9, 2023 · Artificial Intelligence

Qianchuan Unified Recommendation Framework: Architecture, Challenges, and Algorithmic Solutions

Qianchuan is a unified recommendation platform that consolidates numerous low‑traffic, diverse scenarios into a five‑layer architecture—service, access, DPP, algorithm, and infrastructure—addressing challenges of varying products, goals, strategies, recommendation types, and limited resources through flexible product selection, multi‑goal support, advanced recall and ranking models, and extensible, low‑cost algorithms, while planning broader scene coverage, bias reduction, and componentized, reproducible solutions.

System Architecturealgorithmmulti-scene
0 likes · 12 min read
Qianchuan Unified Recommendation Framework: Architecture, Challenges, and Algorithmic Solutions
Didi Tech
Didi Tech
May 23, 2023 · Artificial Intelligence

Driver‑Passenger Matching in Didi’s Ride‑Hailing Market: Algorithms and Techniques

The article surveys Didi’s driver‑passenger matching challenges and presents a suite of solutions—from greedy nearest‑driver and Kuhn‑Munkres bipartite matching to stable marriage, dynamic and one‑to‑many assignments, reinforcement‑learning, routing and queueing models—while validating assumptions statistically, integrating preference‑aware machine learning, and outlining multi‑objective and digital‑twin future research.

Reinforcement LearningRide Hailingalgorithm
0 likes · 23 min read
Driver‑Passenger Matching in Didi’s Ride‑Hailing Market: Algorithms and Techniques
DaTaobao Tech
DaTaobao Tech
May 10, 2023 · Mobile Development

Multi-Code Scanning Framework and Optimization for Mobile Apps

The article details how a mobile app’s scanner was re‑engineered from single‑code to multi‑code detection by overhauling the logic pipeline, adding UI overlays, implementing a rotation‑and‑scale transformation algorithm, integrating iOS Vision alongside the existing SDK, applying confidence filtering, deduplication, edge‑intelligence prediction, and memory‑optimized caching, ultimately boosting recognition rates by over 30 percentage points and reducing miss‑detections.

Barcode ScanningMobile DevelopmentVision
0 likes · 11 min read
Multi-Code Scanning Framework and Optimization for Mobile Apps
Ctrip Technology
Ctrip Technology
Apr 20, 2023 · Backend Development

Performance Optimization of Multi‑Modal Transfer Route Stitching in Ctrip Backend

This article analyzes the challenges of stitching multi‑modal transport routes in Ctrip's backend, identifies performance bottlenecks through monitoring, profiling and benchmarking, and presents a series of optimizations—including code refactoring, indexing, multi‑way merge, multi‑level caching, preprocessing, multithreading, lazy computation, and JVM tuning—that collectively reduce latency and resource consumption.

BackendProfilingalgorithm
0 likes · 17 min read
Performance Optimization of Multi‑Modal Transfer Route Stitching in Ctrip Backend
MaGe Linux Operations
MaGe Linux Operations
Mar 31, 2023 · Backend Development

Mastering Rate Limiting: Leaky Bucket, Token Bucket, and Sliding Window in Go

This article explains three core rate‑limiting algorithms—Leaky Bucket, Token Bucket, and Sliding Window—detailing their principles, suitable scenarios, and provides complete Go implementations to help developers choose and integrate the right strategy for handling traffic spikes and protecting backend resources.

BackendSliding WindowToken Bucket
0 likes · 15 min read
Mastering Rate Limiting: Leaky Bucket, Token Bucket, and Sliding Window in Go
Efficient Ops
Efficient Ops
Mar 15, 2023 · Operations

How Human‑Machine Collaboration Is Redefining Operations with AIOps

The article explores how AIOps, a human‑machine collaborative approach powered by data, algorithms, and contextual knowledge, transforms modern operations by enabling real‑time insight, predictive decision‑making, automated execution, and continuous feedback, especially in complex, security‑sensitive environments like finance.

@DataOperationsaiops
0 likes · 11 min read
How Human‑Machine Collaboration Is Redefining Operations with AIOps
21CTO
21CTO
Mar 12, 2023 · Backend Development

Why Elon Musk’s Promise to Open‑Source Twitter’s Algorithm Fell Flat

Elon Musk repeatedly pledged to open‑source Twitter’s recommendation algorithm, yet after massive layoffs and the loss of key engineers, the promised code remains hidden, illustrating how managerial decisions can cripple open‑source initiatives and impact platform trust and performance.

Elon MuskTwitteralgorithm
0 likes · 6 min read
Why Elon Musk’s Promise to Open‑Source Twitter’s Algorithm Fell Flat
Model Perspective
Model Perspective
Mar 10, 2023 · Fundamentals

Unlocking the Shoelace Theorem: Fast Polygon Area Calculation Explained

This article explores the “push‑step aggregation” technique featured in the drama “Microscope under the Ming,” revealing that it is essentially the Shoelace Theorem for quickly computing polygon areas, complete with mathematical derivation, visual illustrations, and a Python implementation.

Computational GeometryPythonShoelace theorem
0 likes · 8 min read
Unlocking the Shoelace Theorem: Fast Polygon Area Calculation Explained
Model Perspective
Model Perspective
Mar 8, 2023 · Fundamentals

Dynamic Programming Demystified: Python Knapsack & Shortest Path

This article introduces the core concepts of dynamic programming, explains its principles of breaking problems into subproblems with optimal substructure, and provides step‑by‑step Python implementations for the classic knapsack optimization and a shortest‑path graph algorithm, complete with illustrative code and visualizations.

algorithmdynamic programmingknapsack
0 likes · 10 min read
Dynamic Programming Demystified: Python Knapsack & Shortest Path
21CTO
21CTO
Feb 23, 2023 · Artificial Intelligence

Will Elon Musk Really Open‑Source Twitter’s Algorithm Next Week?

Elon Musk announced that Twitter’s recommendation algorithm will be open‑sourced as early as next week, citing transparency and bias reduction, while experts debate the feasibility and potential impact on AI standards, and the tech community shares humorous code snippets mocking the move.

Artificial IntelligenceElon MuskTwitter
0 likes · 4 min read
Will Elon Musk Really Open‑Source Twitter’s Algorithm Next Week?
Architect's Guide
Architect's Guide
Feb 23, 2023 · Information Security

How to Perform Fuzzy Queries on Encrypted Data: Methods, Pros and Cons

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—silly, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, storage costs, and practical recommendations for secure yet searchable data.

algorithmdata security
0 likes · 12 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods, Pros and Cons
DataFunTalk
DataFunTalk
Feb 16, 2023 · Artificial Intelligence

Differences Between Advertising Algorithms and Recommendation Algorithms

This article compares advertising and recommendation algorithms, highlighting distinct optimization goals, model design focuses, training methods, implementation principles, auxiliary strategies, and model characteristics, emphasizing how ads aim to increase revenue while recommendations prioritize user engagement and diversity.

AdvertisingCTRalgorithm
0 likes · 5 min read
Differences Between Advertising Algorithms and Recommendation Algorithms
JD Cloud Developers
JD Cloud Developers
Feb 3, 2023 · Fundamentals

Unlocking the Secrets of Skip Lists: Theory, Implementation, and Performance Analysis

This article provides a comprehensive, formal introduction to skip lists, covering their probabilistic foundations, structural design, detailed C implementations for creation, search, insertion, deletion, random level generation, space and time complexity analyses, and extensions such as fast random access and span maintenance.

Skip Listalgorithmc-implementation
0 likes · 22 min read
Unlocking the Secrets of Skip Lists: Theory, Implementation, and Performance Analysis
JavaEdge
JavaEdge
Jan 22, 2023 · Fundamentals

Designing a High‑Performance Sorting Function: Algorithms and Optimizations

This article examines how high‑performance sorting functions such as C's qsort() and Java's Collections.sort() are implemented, compares suitable algorithms, analyzes merge sort versus quicksort, and presents practical optimizations like median‑of‑three pivots, random pivots, recursion depth limits, and hybrid insertion sort.

QuickSortSortingalgorithm
0 likes · 7 min read
Designing a High‑Performance Sorting Function: Algorithms and Optimizations
dbaplus Community
dbaplus Community
Jan 14, 2023 · Backend Development

How to Minimize Data Movement When Scaling Kafka Replicas

This article explores strategies for batch scaling Kafka replicas with minimal data migration, presenting two design ideas, detailed calculations of broker lists, partition counts, start indexes, and replica shifts, and provides step‑by‑step algorithms and code snippets to compute optimal replica assignments for both expansion and contraction scenarios.

BackendKafkaPartition Assignment
0 likes · 15 min read
How to Minimize Data Movement When Scaling Kafka Replicas
DaTaobao Tech
DaTaobao Tech
Jan 9, 2023 · Artificial Intelligence

Adaptive and Self-Supervised Multi-Scenario Modeling for Taobao Personalized Recommendation

On January 9 from 19:00 to 20:00, algorithm engineer Zhang Yuanliang will present Taobao’s scenario-adaptive, self-supervised multi-scenario recommendation model, detailing its architecture, experimental results, and practical deployment for improving personalized item recall across diverse user contexts.

algorithmmulti-scenariopersonalization
0 likes · 1 min read
Adaptive and Self-Supervised Multi-Scenario Modeling for Taobao Personalized Recommendation
Tencent Cloud Developer
Tencent Cloud Developer
Dec 30, 2022 · Backend Development

Implementation and Optimization of Generic Skip List in Go (stl4go)

stl4go provides a generic Go 1.18 container library that implements an optimized skip‑list‑based ordered map, using adaptive levels, efficient random‑level generation, type‑specific paths, and cache‑friendly node structures to achieve near‑C++ performance, surpassing existing Go generic collections.

Data StructureGenericsGo
0 likes · 18 min read
Implementation and Optimization of Generic Skip List in Go (stl4go)
Java High-Performance Architecture
Java High-Performance Architecture
Dec 12, 2022 · Backend Development

Java Rate Limiting: Fixed, Sliding, Leaky & Token Bucket Algorithms Explained

This article introduces the concept of rate limiting, explains three core algorithms—fixed window, sliding window, and leaky bucket—along with the token bucket approach, provides Java code examples for each, discusses their principles, advantages, and pitfalls, and outlines practical implementation considerations.

BackendDistributed Systemsalgorithm
0 likes · 15 min read
Java Rate Limiting: Fixed, Sliding, Leaky & Token Bucket Algorithms Explained
Architect's Guide
Architect's Guide
Nov 30, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article reviews why reversible encryption is needed for certain sensitive fields, classifies three categories of fuzzy‑search‑on‑encrypted‑data techniques—naïve, conventional, and advanced—and evaluates their implementation steps, performance trade‑offs, and practical recommendations.

AESalgorithmdata security
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Selected Java Interview Questions
Selected Java Interview Questions
Nov 15, 2022 · Backend Development

Comprehensive Guide to Rate Limiting: Concepts, Algorithms, and Implementation Strategies

This article explains the fundamental concepts of rate limiting, compares common algorithms such as token bucket, leaky bucket and sliding window, and details practical implementations using Nginx, Tomcat, Redis, Guava, and Sentinel for both single‑node and distributed backend systems.

Distributed Systemsalgorithmrate limiting
0 likes · 17 min read
Comprehensive Guide to Rate Limiting: Concepts, Algorithms, and Implementation Strategies
Coolpad Technology Team
Coolpad Technology Team
Nov 11, 2022 · Frontend Development

Quantitative Color Extraction and Optimization for UI Design

This article presents a scientific color adaptation solution that uses a quantization algorithm to extract dominant image colors, refines them via HSB adjustments, validates against WCAG contrast standards, and demonstrates practical deployment in app store and game center interfaces.

Android PaletteHSBUI design
0 likes · 8 min read
Quantitative Color Extraction and Optimization for UI Design
Model Perspective
Model Perspective
Nov 8, 2022 · Artificial Intelligence

Mastering K-Means: How Distance-Based Clustering Works and How to Implement It

This article explains the fundamentals of the K-means clustering algorithm, describing its distance‑based similarity principle, the objective of minimizing squared error, and a step‑by‑step iterative procedure—including random centroid initialization, assignment, centroid recomputation, and convergence criteria.

Unsupervised Learningalgorithmclustering
0 likes · 3 min read
Mastering K-Means: How Distance-Based Clustering Works and How to Implement It
Model Perspective
Model Perspective
Nov 1, 2022 · Fundamentals

How Markov Chains Can Rank Sports Teams: A Simple Voting Model

This article explains a Markov‑based scoring method for ranking sports teams, treating each match as a vote where weaker teams award points to stronger ones, and shows how to construct a stochastic matrix, handle dangling nodes, compute the steady‑state vector, and derive final rankings, analogous to Google’s PageRank.

Markov ChainsPageRankSports Ranking
0 likes · 8 min read
How Markov Chains Can Rank Sports Teams: A Simple Voting Model
Top Architect
Top Architect
Oct 16, 2022 · Backend Development

Common Load Balancing Algorithms and Their Java Implementations

This article provides a comprehensive overview of various load balancing strategies—including round‑robin, random, weighted, smooth weighted round‑robin, consistent hashing, least‑active, and optimal‑response algorithms—explaining their principles, advantages, disadvantages, use‑cases, and offering complete Java code examples for each.

BackendDistributed Systemsalgorithm
0 likes · 33 min read
Common Load Balancing Algorithms and Their Java Implementations
php Courses
php Courses
Oct 11, 2022 · Backend Development

Sensitive Word Detection Algorithm in PHP Using Multibyte String Traversal

This article explains how to build a tree‑based sensitive‑word detection algorithm in PHP, discusses the challenges of correctly iterating over multibyte strings, and provides a complete implementation with code examples that handle Unicode characters efficiently.

PHPString Traversalalgorithm
0 likes · 6 min read
Sensitive Word Detection Algorithm in PHP Using Multibyte String Traversal
Top Architect
Top Architect
Sep 24, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data: Methods and Trade‑offs

This article examines the challenges of fuzzy searching encrypted data and compares three categories of solutions—naïve (sand‑wich), conventional, and advanced (super)—detailing their implementation ideas, performance implications, and suitability for real‑world applications.

algorithmdata securitydatabase
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods and Trade‑offs
Tencent Advertising Technology
Tencent Advertising Technology
Sep 23, 2022 · Industry Insights

How Tencent Ads’ CONFLUX and MVKE Algorithms Boost Conversion – Insights from KDD2022

Tencent Ads hosted two KDD2022‑focused live sessions showcasing the CONFLUX and MVKE algorithms, explaining their technical foundations, real‑world impact on billions of ad impressions, and answering audience questions about brand versus performance ads, validation methods, and future research directions.

KDD2022advertising technologyalgorithm
0 likes · 6 min read
How Tencent Ads’ CONFLUX and MVKE Algorithms Boost Conversion – Insights from KDD2022
Su San Talks Tech
Su San Talks Tech
Sep 20, 2022 · Game Development

How I Built a Solvable ‘Sheep’ Puzzle Game and Open‑sourced It

The author explains how the viral “Sheep Sheep” puzzle’s random mechanics make it nearly impossible to clear, then details the creation of a clone called “Fish Fish” with customizable difficulty, open‑source code, and the core implementation techniques used.

Game DevelopmentPuzzle Gamealgorithm
0 likes · 5 min read
How I Built a Solvable ‘Sheep’ Puzzle Game and Open‑sourced It
Java High-Performance Architecture
Java High-Performance Architecture
Sep 13, 2022 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Strategies and Trade‑offs

This article examines why encrypted data hinders fuzzy queries, categorizes three implementation approaches—from naive in‑memory decryption to conventional database tricks and advanced algorithmic solutions—evaluates their security, performance, and storage impacts, and provides practical references for real‑world systems.

algorithmdata securitydatabase
0 likes · 11 min read
How to Perform Fuzzy Searches on Encrypted Data: Strategies and Trade‑offs
Tencent Cloud Developer
Tencent Cloud Developer
Sep 6, 2022 · Backend Development

Understanding Rate Limiting in Distributed Systems: Algorithms and Best Practices

Rate limiting safeguards distributed systems by controlling request rates through algorithms such as leaky bucket, token bucket, fixed and sliding windows, and back pressure, while client‑side tactics like exponential backoff, jitter, and careful retries, and requires atomic distributed storage solutions (e.g., Redis+Lua) to avoid race conditions.

Back-pressureDistributed SystemsSystem Design
0 likes · 16 min read
Understanding Rate Limiting in Distributed Systems: Algorithms and Best Practices
DaTaobao Tech
DaTaobao Tech
Sep 5, 2022 · Artificial Intelligence

How Alibaba’s New Guide Boosts Live‑Stream Video Quality for Every Creator

Alibaba’s DaTaobao team unveiled a high‑definition live‑streaming guide that combines video processing algorithms, equipment recommendations, and standardized low‑cost solutions to dramatically improve picture quality for both top‑tier and novice streamers, while also offering free access and ongoing support.

AIAlibabaalgorithm
0 likes · 8 min read
How Alibaba’s New Guide Boosts Live‑Stream Video Quality for Every Creator
Hulu Beijing
Hulu Beijing
Aug 31, 2022 · Fundamentals

Algorithm Trio: Pattern Search, Tree Leaf Count, and Bounded Stock Trading

This article presents three algorithmic challenges: counting pattern occurrences on an M×N canvas, determining the number of leaf nodes in a binary tree represented by an array, and maximizing stock trade profit under constraints on negative returns and total gain, each with input specifications, sample cases, and solution outlines.

Constraintsalgorithmbinary tree
0 likes · 8 min read
Algorithm Trio: Pattern Search, Tree Leaf Count, and Bounded Stock Trading
Xiao Lou's Tech Notes
Xiao Lou's Tech Notes
Aug 31, 2022 · Fundamentals

Why My Simple Go Map Solution Timed Out and How I Fixed It

After struggling with a seemingly easy scoring problem in a regional programming contest, the author details multiple Go implementations—including a map, a 27‑base array, and a trie—examines their time and memory issues, discovers input handling pitfalls, and ultimately achieves an accepted solution.

Triealgorithmcompetitive programming
0 likes · 14 min read
Why My Simple Go Map Solution Timed Out and How I Fixed It
Model Perspective
Model Perspective
Aug 30, 2022 · Artificial Intelligence

Particle Swarm Optimization in Python: Full Implementation and Results

This article explains the core PSO velocity and position formulas, provides a complete Python implementation with detailed comments, runs the algorithm on a 2‑dimensional test function, and presents the optimal solution and convergence plot.

Artificial IntelligenceParticle Swarm OptimizationPython
0 likes · 5 min read
Particle Swarm Optimization in Python: Full Implementation and Results
Java Backend Technology
Java Backend Technology
Aug 25, 2022 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons

This article examines why encrypted data hinders fuzzy queries, categorizes three implementation strategies—from naïve to conventional to advanced—explains their mechanisms, evaluates performance and security trade‑offs, and provides practical references for building searchable encrypted fields.

algorithmdata privacyfuzzy-search
0 likes · 12 min read
How to Perform Fuzzy Searches on Encrypted Data: Methods, Pros & Cons
IT Architects Alliance
IT Architects Alliance
Aug 21, 2022 · Backend Development

Consistent Hashing Algorithm: Principles, Java Implementation, and Optimizations for Distributed Cache Load Balancing

This article explains the fundamentals of consistent hashing, its application in load‑balancing distributed caches, analyzes common issues such as data skew and cache avalanche, introduces virtual nodes for uniform distribution, provides Java code examples, and compares it with Redis's HashSlot approach.

algorithmconsistent hashingdistributed cache
0 likes · 20 min read
Consistent Hashing Algorithm: Principles, Java Implementation, and Optimizations for Distributed Cache Load Balancing
Java Architect Essentials
Java Architect Essentials
Aug 20, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy queries, categorizes three implementation approaches—naïve, conventional, and advanced—and evaluates their security, performance, and storage trade‑offs while providing practical code examples and reference resources.

Information Securityalgorithmdata privacy
0 likes · 10 min read
Techniques for Performing Fuzzy Search on Encrypted Data
Tencent Cloud Developer
Tencent Cloud Developer
Aug 18, 2022 · Fundamentals

Perfect Hash Functions and Their Use in High‑Performance HashMaps

The article explains perfect hash functions, their collision‑free construction methods such as FCH, CHD, and PTHash, compares them to conventional hash tables, reviews common and cryptographic hash functions, and shows how read‑only perfect‑hash maps deliver faster lookups and lower memory use for static key sets.

Data Structurealgorithmbenchmark
0 likes · 21 min read
Perfect Hash Functions and Their Use in High‑Performance HashMaps
Top Architect
Top Architect
Aug 16, 2022 · Databases

How to Perform Fuzzy Queries on Encrypted Data: Methods, Trade‑offs, and Recommendations

This article examines the difficulty of fuzzy searching encrypted fields and compares three solution families—naïve memory‑loading or tag‑table tricks, conventional token‑based encryption with indexable columns, and advanced algorithmic designs—highlighting their security, performance, and storage implications while recommending the most practical approach.

algorithmdatabaseencryption
0 likes · 10 min read
How to Perform Fuzzy Queries on Encrypted Data: Methods, Trade‑offs, and Recommendations
HelloTech
HelloTech
Aug 5, 2022 · Artificial Intelligence

Intelligent Transaction System Construction for Halu Carpool

In a July 2022 keynote, Halu’s senior algorithm expert Wang Fan outlined the construction of an intelligent transaction system for its car‑pool service, detailing business challenges, a decomposition into matching, pricing, marketing and arbitration, a recommendation‑pipeline architecture, and three‑stage algorithm evolution that boosted order volume by over 20 %.

algorithmcarpoolintelligent matching
0 likes · 12 min read
Intelligent Transaction System Construction for Halu Carpool
Architect's Guide
Architect's Guide
Aug 1, 2022 · Backend Development

Understanding Rate Limiting: Concepts, Algorithms, and Practical Implementations

This article explains why rate limiting is essential for both physical venues and online services, describes common strategies such as circuit breaking, service degradation, delay handling, and privilege handling, compares caching, degradation, and limiting, and details counter, leaky‑bucket, and token‑bucket algorithms with concrete Guava and Nginx‑Lua implementations.

BackendGuavaalgorithm
0 likes · 15 min read
Understanding Rate Limiting: Concepts, Algorithms, and Practical Implementations
Selected Java Interview Questions
Selected Java Interview Questions
Jul 29, 2022 · Backend Development

Seven Directions of Code Performance Optimization for Java Backend

This article outlines seven major areas of Java backend performance optimization—including reuse, computation, result‑set, resource‑conflict, algorithm, efficient implementation, and JVM tuning—explaining concepts, techniques, and practical examples to help developers improve application speed and resource utilization.

Backendalgorithmconcurrency
0 likes · 11 min read
Seven Directions of Code Performance Optimization for Java Backend
Sohu Tech Products
Sohu Tech Products
Jul 6, 2022 · Game Development

Implementing Hint Functionality for a 24‑Point Game in Swift

This article explains how to design and code a hint feature for a 24‑point puzzle app on iOS, covering random number generation, validation of solvable sets, recursive expression search, expression‑to‑string conversion, optimization of parentheses, and provides complete Swift source code with detailed algorithmic explanations.

24-point gameGame DevelopmentSwift
0 likes · 15 min read
Implementing Hint Functionality for a 24‑Point Game in Swift
政采云技术
政采云技术
Jun 28, 2022 · Backend Development

Understanding the Snowflake Algorithm: Principles, Issues, and Solutions

This article explains Twitter's open‑source Snowflake distributed ID generation algorithm, detailing its bit‑field structure, common pitfalls such as clock rollback and JavaScript precision limits, and practical mitigation strategies for high‑concurrency, sharding, and sequence handling.

Scalabilityalgorithmbackend-development
0 likes · 7 min read
Understanding the Snowflake Algorithm: Principles, Issues, and Solutions
Python Crawling & Data Mining
Python Crawling & Data Mining
Jun 25, 2022 · Fundamentals

Unlock Multiplication Without Tables: Russian Peasant Multiplication Explained and Implemented in Python

This article introduces the Russian peasant multiplication algorithm, explains its historical background and step‑by‑step process using halving and doubling tables, connects it to binary expansion, and provides a complete Python implementation that demonstrates its low‑memory, creative approach to multiplication.

BinaryRussian peasant multiplicationalgorithm
0 likes · 11 min read
Unlock Multiplication Without Tables: Russian Peasant Multiplication Explained and Implemented in Python
Hulu Beijing
Hulu Beijing
Jun 23, 2022 · Operations

How to Optimize Ad Traffic Allocation with Front‑Load Curves and PID Control

This article explains how to prioritize ad orders, use front‑loading to smooth traffic fluctuations, model delivery constraints with differential equations, and apply PID‑based selection coefficients to achieve efficient, real‑time traffic allocation in streaming advertising systems.

OperationsPID controlad allocation
0 likes · 13 min read
How to Optimize Ad Traffic Allocation with Front‑Load Curves and PID Control
IT Services Circle
IT Services Circle
Jun 10, 2022 · Fundamentals

Page Replacement Algorithms: OPT, FIFO, LRU, CLOCK, and LFU

This article reviews virtual memory concepts and explains five page replacement algorithms—Optimal (OPT), First‑In‑First‑Out (FIFO), Least Recently Used (LRU), CLOCK (including a simple and improved version), and Least Frequently Used (LFU)—detailing their principles, operation, advantages, drawbacks, and illustrative examples.

FIFOLRUOPT
0 likes · 14 min read
Page Replacement Algorithms: OPT, FIFO, LRU, CLOCK, and LFU
Laravel Tech Community
Laravel Tech Community
Jun 8, 2022 · Fundamentals

Comprehensive Programming and IT Knowledge Quiz with Multiple‑Choice and Coding Questions

This timed programmer quiz combines single‑choice, short‑answer, and coding problems that test a broad spectrum of IT topics—from programming history and algorithms to Linux commands, networking layers, Helm chart concepts, and practical Python and C coding tasks—providing a holistic assessment of technical fundamentals.

PythonQuizalgorithm
0 likes · 9 min read
Comprehensive Programming and IT Knowledge Quiz with Multiple‑Choice and Coding Questions
Laravel Tech Community
Laravel Tech Community
Jun 6, 2022 · Artificial Intelligence

What an Open‑Source Twitter Algorithm Would Look Like: Architecture, Data Model, and Engineering Challenges

This article examines the practical aspects of open‑sourcing Twitter’s recommendation algorithm, covering the platform’s data model, timeline views, ranking features, a TypeScript pseudocode illustration, and the major engineering challenges of scale, real‑time processing, reliability, and security.

Twitteralgorithmlarge scale
0 likes · 14 min read
What an Open‑Source Twitter Algorithm Would Look Like: Architecture, Data Model, and Engineering Challenges
Model Perspective
Model Perspective
Jun 4, 2022 · Artificial Intelligence

Master K-means Clustering: How the Algorithm Finds Compact Groups

K-means is a classic distance‑based clustering algorithm that iteratively partitions data into k compact, well‑separated groups by minimizing the sum of squared errors, using random centroid initialization and heuristic updates until convergence, making it a fundamental tool in AI and data analysis.

K-MeansUnsupervised Learningalgorithm
0 likes · 3 min read
Master K-means Clustering: How the Algorithm Finds Compact Groups
Model Perspective
Model Perspective
May 24, 2022 · Operations

Mastering the Minimum Cost Flow Problem: Concepts and Solution Algorithms

This article explains the minimum cost flow problem—delivering a specified amount of flow from supply nodes to demand nodes at the lowest possible cost—covers its linear programming formulation, highlights key solution methods such as successive shortest path, cycle canceling, primal‑dual, network simplex, and outlines its primary applications in distribution network optimization.

Linear ProgrammingOperations Researchalgorithm
0 likes · 3 min read
Mastering the Minimum Cost Flow Problem: Concepts and Solution Algorithms
Model Perspective
Model Perspective
May 24, 2022 · Fundamentals

How to Maximize Flow in Networks: An Oil Pipeline Case Study

Exploring the fundamentals of the maximum flow problem, this article explains network flow concepts, outlines the three core properties of flow models, and demonstrates their application with an oil‑pipeline case study solved using NetworkX, concluding with key insights and a reference.

algorithmcapacitymaximum flow
0 likes · 4 min read
How to Maximize Flow in Networks: An Oil Pipeline Case Study
Architect
Architect
May 24, 2022 · Big Data

Processing 10 GB Age Data on a 4 GB Memory Machine Using Java: Single‑Threaded and Multi‑Threaded Approaches

The article presents a complete Java solution for generating, reading, and analyzing a 10 GB file of age values (18‑70) on a 4 GB RAM, 2‑core PC, comparing single‑threaded counting with a producer‑consumer multithreaded design that dramatically improves CPU utilization and reduces total processing time.

Producer Consumeralgorithmjava
0 likes · 20 min read
Processing 10 GB Age Data on a 4 GB Memory Machine Using Java: Single‑Threaded and Multi‑Threaded Approaches

Dynamic Page Floor Sorting for Intelligent Marketing in NetEase Yanxuan

NetEase Yanxuan’s Olympus platform introduces dynamic page‑floor sorting that automatically reorders product modules in real time using a multi‑armed‑bandit algorithm, delivering faster, more accurate and stable personalized marketing, improving exposure efficiency, ROI and handling peak traffic with sub‑40 ms rendering.

Marketing Automationalgorithmdynamic sorting
0 likes · 10 min read
Dynamic Page Floor Sorting for Intelligent Marketing in NetEase Yanxuan
Sohu Tech Products
Sohu Tech Products
May 18, 2022 · Fundamentals

Overview of a Web Page Content Extraction Algorithm and Its Practical Demo

This article introduces a web page content extraction algorithm that automatically structures titles, timestamps, body text, authors, and sources from arbitrary news pages, explains how to use an online demo, compares it with existing solutions, and discusses its broader applications and limitations.

Content ExtractionGNEWeb Scraping
0 likes · 8 min read
Overview of a Web Page Content Extraction Algorithm and Its Practical Demo
NetEase Yanxuan Technology Product Team
NetEase Yanxuan Technology Product Team
Apr 18, 2022 · Artificial Intelligence

Supply‑Demand Coordination in E‑commerce: Challenges and Algorithmic Solutions

Effective e‑commerce supply‑demand coordination requires accurate SKU‑level forecasting, optimized replenishment under MOQ and lead‑time constraints, and dynamic post‑sale traffic control, using a blend of time‑series, tree‑based and deep learning models together with expert knowledge to minimize inventory costs and avoid stock‑outs.

AIDemand ForecastingSupply Chain
0 likes · 10 min read
Supply‑Demand Coordination in E‑commerce: Challenges and Algorithmic Solutions
IT Services Circle
IT Services Circle
Apr 12, 2022 · Big Data

Finding Missing Unsigned Integers in a 4‑Billion‑Element File Using Interval Counting and Bitmap Technique

The article explains how to locate all missing 32‑bit unsigned integers in a 4 billion‑entry file by first partitioning the range into intervals, counting entries per interval with a tiny int[64] array, and then applying a bitmap method only to under‑filled intervals, achieving a memory footprint of just a few hundred bytes.

Big DataBitmapMemory Optimization
0 likes · 5 min read
Finding Missing Unsigned Integers in a 4‑Billion‑Element File Using Interval Counting and Bitmap Technique