Tagged articles
619 articles
Page 4 of 7
IT Services Circle
IT Services Circle
Apr 11, 2022 · Fundamentals

Maximum Satisfaction (LeetCode 1402) – Greedy Algorithm Solution

This article explains the LeetCode 1402 problem of maximizing the total satisfaction score by arranging dishes, describes the greedy approach of sorting and using suffix sums, and provides a Java implementation that iteratively adds positive suffix sums to compute the optimal result.

LeetCodeSortingalgorithm
0 likes · 4 min read
Maximum Satisfaction (LeetCode 1402) – Greedy Algorithm Solution
DataFunSummit
DataFunSummit
Apr 10, 2022 · Artificial Intelligence

Algorithmic Optimization of Information‑Flow Advertising for Hallo Mobility

This presentation details how Hallo Mobility tackles the challenges of information‑flow ad modeling by describing the ad ecosystem, the company’s business evolution, and the advertiser‑side algorithmic solutions—including plan‑level quality detection, creative‑level uplift modeling, feature‑cross engineering, and pre‑bid user screening—while outlining future directions for automated, data‑driven ad delivery.

AIInformation FlowUplift Modeling
0 likes · 18 min read
Algorithmic Optimization of Information‑Flow Advertising for Hallo Mobility
Python Programming Learning Circle
Python Programming Learning Circle
Apr 9, 2022 · Fundamentals

Algorithmic Solutions for Seven Programming Problems (Number Cards, Grid Lines, Cube Packing, Shortest Path, Hamiltonian Cycle, Time Display, Pascal's Triangle)

This article presents detailed problem statements, mathematical analysis, and Python implementations for seven algorithmic challenges covering combinatorial counting, geometry, number theory, graph shortest paths, Hamiltonian cycles, time conversion, and Pascal's triangle indexing.

algorithmcombinatoricscompetitive programming
0 likes · 14 min read
Algorithmic Solutions for Seven Programming Problems (Number Cards, Grid Lines, Cube Packing, Shortest Path, Hamiltonian Cycle, Time Display, Pascal's Triangle)
IT Services Circle
IT Services Circle
Apr 9, 2022 · Fundamentals

Finding the Majority QQ Number: Moore Voting Algorithm Explained

This article explains a Tencent interview question requiring identification of a QQ number appearing more than half the time among 2N entries, discusses naive sorting and hashmap approaches, and presents the optimal O(N) time, O(1) space Moore voting algorithm with a complete C++ implementation and sample output.

C++Moore votingalgorithm
0 likes · 6 min read
Finding the Majority QQ Number: Moore Voting Algorithm Explained
Alibaba Terminal Technology
Alibaba Terminal Technology
Apr 7, 2022 · Frontend Development

Building a Powerful Tile Layout System with React‑Grid‑Layout and Low‑Code Engine

This article explains how a low‑code platform redesigned its report page using a tile layout powered by React‑Grid‑Layout, detailing vertical and horizontal squeeze modes, nesting, height‑auto adaptation, mixed tile‑flow layouts, and algorithm optimizations for smoother drag‑and‑drop interactions.

Drag-and-Dropalgorithmlayout
0 likes · 12 min read
Building a Powerful Tile Layout System with React‑Grid‑Layout and Low‑Code Engine
High Availability Architecture
High Availability Architecture
Mar 29, 2022 · Fundamentals

Abstract Paxos: Unifying Paxos and Raft through Formal Derivation of Distributed Consensus

This article presents abstract‑paxos, a unified framework that derives Paxos and Raft from first principles, defines information certainty, quorum, and a total order on states using commit_index, and details a two‑phase protocol, member‑change handling, and how the model maps to classic Paxos and Raft implementations.

ConsensusDistributed SystemsPaxos
0 likes · 25 min read
Abstract Paxos: Unifying Paxos and Raft through Formal Derivation of Distributed Consensus
IT Services Circle
IT Services Circle
Mar 21, 2022 · Fundamentals

Finding the Smallest Missing Positive Integer: Interview Problem Explanation and Go Solutions

This article explains a classic interview question of locating the smallest missing positive integer from an array, analyzes its theoretical bounds, and presents three O(n) time, O(1) space solutions—including a clever marking technique and a swap‑based method—accompanied by complete Go implementations.

algorithminterviewmissing-number
0 likes · 7 min read
Finding the Smallest Missing Positive Integer: Interview Problem Explanation and Go Solutions
NiuNiu MaTe
NiuNiu MaTe
Mar 15, 2022 · Fundamentals

Master the Container With Most Water: Two‑Pointer Solution Explained

This article presents a detailed walkthrough of the LeetCode "Container With Most Water" problem, covering the problem statement, a two‑pointer analysis, and a complete Java implementation, while highlighting key insights for efficiently maximizing water storage.

LeetCodealgorithmcontainer-water
0 likes · 4 min read
Master the Container With Most Water: Two‑Pointer Solution Explained
Tencent Cloud Developer
Tencent Cloud Developer
Mar 14, 2022 · Backend Development

Consistent Hashing Algorithm: Theory, Go Implementation, and Load-Balanced Extension

The article explains consistent hashing—using a circular 2^32 hash ring with virtual nodes to evenly distribute keys across dynamic cache servers—provides a complete Go implementation including host registration, key lookup, and a bounded‑load extension that tracks server load, demonstrates a proxy‑cache setup, and discusses practical testing and production‑grade enhancements.

Distributed SystemsGolangalgorithm
0 likes · 27 min read
Consistent Hashing Algorithm: Theory, Go Implementation, and Load-Balanced Extension
21CTO
21CTO
Mar 6, 2022 · Game Development

How to Build a Missile Auto‑Tracking System in Python with Pygame

This article explains how to implement an automatic missile‑tracking system for a shooting game using Python’s Pygame library, covering the underlying differential‑equation‑based algorithm, step‑by‑step trigonometric calculations, handling of coordinate systems, image rotation challenges, and provides complete source code.

Game DevelopmentMissile TrackingPygame
0 likes · 11 min read
How to Build a Missile Auto‑Tracking System in Python with Pygame
Top Architect
Top Architect
Mar 5, 2022 · Fundamentals

Understanding Skip Lists and Their Implementation in Redis

This article explains the concept of skip lists as an ordered random data structure, illustrates how Redis uses skip lists for sorted sets, and provides a complete Java implementation with detailed code examples and analysis of their performance characteristics.

Data StructureSkip Listalgorithm
0 likes · 13 min read
Understanding Skip Lists and Their Implementation in Redis
Python Crawling & Data Mining
Python Crawling & Data Mining
Mar 3, 2022 · Fundamentals

5 Clever Python Ways to Compute 1‑2+3‑4+…+99

This article presents a Python fan's arithmetic challenge—calculating the alternating sum 1‑2+3‑4+…+99—and walks through five distinct code solutions, from basic loops to concise itertools one‑liners, highlighting their logic and trade‑offs.

Code ExampleLoopsPython
0 likes · 5 min read
5 Clever Python Ways to Compute 1‑2+3‑4+…+99
ByteDance Data Platform
ByteDance Data Platform
Feb 18, 2022 · Frontend Development

How ByteDance’s Front‑End Team Built High‑Performance Shape Word Clouds

ByteDance’s data platform front‑end team surveyed academic, commercial, and open‑source word‑cloud solutions, identified gaps in geo‑ and shape‑based clouds, and engineered a performant front‑end layout algorithm that generates customizable shape word clouds for diverse business scenarios.

Data visualizationalgorithmshape cloud
0 likes · 11 min read
How ByteDance’s Front‑End Team Built High‑Performance Shape Word Clouds
Baobao Algorithm Notes
Baobao Algorithm Notes
Feb 15, 2022 · Industry Insights

Why Your Algorithm Gains May Still Drag Down Overall Business: 6 Hidden Pitfalls

Even when individual algorithm modules show higher accuracy or revenue, the overall platform can decline due to factors like competitor encroachment, macro‑economic shifts, concept drift, overlapping marginal returns, attribution errors, and coupled A/B experiments, all of which require careful analysis and mitigation.

AB testingMetricsalgorithm
0 likes · 7 min read
Why Your Algorithm Gains May Still Drag Down Overall Business: 6 Hidden Pitfalls
NiuNiu MaTe
NiuNiu MaTe
Feb 15, 2022 · Fundamentals

Why Do Only Perfect Squares Stay Lit? Solving the Bulb Switch Puzzle

The article explains the classic bulb‑switch problem, showing how toggling bulbs in successive rounds leads to only those positioned at perfect‑square indices remaining on, derives the mathematical reasoning behind the pattern, and presents a concise O(1) solution using the integer square‑root of n.

LeetCodealgorithmbulb-switch
0 likes · 7 min read
Why Do Only Perfect Squares Stay Lit? Solving the Bulb Switch Puzzle
Top Architect
Top Architect
Jan 26, 2022 · Backend Development

Understanding Service Rate Limiting: Algorithms and Distributed Implementation

This article explains why service rate limiting is essential for high‑concurrency systems, compares it with service degradation, introduces common limiting algorithms such as counter, leaky‑bucket and token‑bucket, and shows how to implement distributed rate limiting using Redis for real‑world backend services.

Distributed Systemsalgorithmrate limiting
0 likes · 9 min read
Understanding Service Rate Limiting: Algorithms and Distributed Implementation
MaGe Linux Operations
MaGe Linux Operations
Jan 24, 2022 · Fundamentals

Discover Lucky Numbers in a List with a One‑Line Python Trick

This article explains the concept of “lucky numbers” in an integer list—where a number’s value equals its occurrence count—and walks through a Python solution that progressively uses set, count, map, zip, filter, lambda and sorted, culminating in a concise one‑liner implementation.

LambdaListMAP
0 likes · 8 min read
Discover Lucky Numbers in a List with a One‑Line Python Trick
IT Architects Alliance
IT Architects Alliance
Jan 10, 2022 · Fundamentals

Kafka Timing Wheel Algorithm: Design, Multi‑Level Wheels, and DelayQueue Integration

The article explains how Kafka implements delayed operations using a timing wheel with O(1) insertion and deletion, describes its parameters, multi‑level wheel design for large time spans, and the mechanism of advancing the wheel via DelayQueue and the ExpiredOperationReaper, contrasting it with Netty's approach.

BackendDistributed Systemsalgorithm
0 likes · 8 min read
Kafka Timing Wheel Algorithm: Design, Multi‑Level Wheels, and DelayQueue Integration
Shopee Tech Team
Shopee Tech Team
Dec 30, 2021 · Game Development

Inside Shopee Candy: Building a Scalable Match‑3 H5 Game Architecture

This article walks through the origin, architecture, and tooling of Shopee Candy, a multi‑region match‑3 H5 game, detailing the Algorithm SDK, animation system, map editor, score runner, replayer, and future plans for configurability, performance, anti‑cheat, and AI‑driven level design.

Game DevelopmentH5Tooling
0 likes · 16 min read
Inside Shopee Candy: Building a Scalable Match‑3 H5 Game Architecture
DeWu Technology
DeWu Technology
Dec 23, 2021 · Frontend Development

Pure JavaScript Smooth Curve Generation Using Bézier Curves

This guide shows how to generate smooth, high‑quality curves from a polyline in pure JavaScript by computing quadratic and cubic Bézier points, deriving control points via angle‑bisector geometry, assembling the segments, and rendering and animating the result on an HTML5 canvas without external libraries.

Bézier CurveCanvasFront-end
0 likes · 10 min read
Pure JavaScript Smooth Curve Generation Using Bézier Curves
Python Programming Learning Circle
Python Programming Learning Circle
Dec 21, 2021 · Fundamentals

Finding Lucky Numbers in a List Using Python: Step‑by‑Step with map, zip, filter and a One‑Liner

This tutorial explains how to solve the LeetCode "Lucky Numbers in a List" problem in Python by extracting unique elements, counting their occurrences with map and count, pairing them with zip, filtering with lambda, sorting the result, and finally compressing the whole logic into a single expressive line of code.

LambdaListMAP
0 likes · 8 min read
Finding Lucky Numbers in a List Using Python: Step‑by‑Step with map, zip, filter and a One‑Liner
Liangxu Linux
Liangxu Linux
Dec 15, 2021 · Fundamentals

Cracking the 4‑Billion QQ Deduplication Challenge with 1 GB Memory

This article walks through four approaches—sorting, hashmap, file splitting, and a bitmap technique—to deduplicate 4 billion QQ numbers within a 1 GB memory limit, explains why the first three fail, and shows how a bitmap solves the problem efficiently.

Big DataBitmapMemory Optimization
0 likes · 8 min read
Cracking the 4‑Billion QQ Deduplication Challenge with 1 GB Memory
ELab Team
ELab Team
Dec 15, 2021 · Fundamentals

Unveiling the Magic of Fast Inverse Square Root: How 0x5f3759df Powers Game Physics

This article demystifies the fast inverse square root algorithm used in games, explaining the origin of the infamous 0x5f3759df magic number, the underlying IEEE‑754 floating‑point representation, the evil bit‑hack, Newton iteration steps, and how these tricks accelerate vector normalization.

Fast Inverse Square Rootalgorithmbit hack
0 likes · 17 min read
Unveiling the Magic of Fast Inverse Square Root: How 0x5f3759df Powers Game Physics
HelloTech
HelloTech
Dec 13, 2021 · Big Data

Smart Matching Engine for Ride-Sharing: Technical Implementation and Algorithms

The Smart Matching Engine for Haolo’s ride‑sharing service ingests driver and passenger orders via Kafka‑Flink pipelines into Elasticsearch, then applies multi‑stage matching—nearby search, itinerary‑based filtering using ETA, angle, distance, route‑similarity and shared‑mileage calculations—and finally ranks results with evolving pre‑sorting and algorithmic models, including PMML and deep‑learning, to optimize driver‑passenger pairing.

ElasticsearchFlinkKafka
0 likes · 9 min read
Smart Matching Engine for Ride-Sharing: Technical Implementation and Algorithms
DataFunTalk
DataFunTalk
Dec 13, 2021 · Artificial Intelligence

Dual Vector Foil (DVF): Decoupled Index and Model for Large‑Scale Retrieval

The article introduces the Dual Vector Foil (DVF) algorithm system, which decouples index construction from model training to enable lightweight, high‑precision large‑scale recall using arbitrary complex models, and details its two‑stage and one‑stage solutions, graph‑based retrieval implementation, performance optimizations, and experimental results.

Deep Learningalgorithmgraph indexing
0 likes · 28 min read
Dual Vector Foil (DVF): Decoupled Index and Model for Large‑Scale Retrieval
Python Crawling & Data Mining
Python Crawling & Data Mining
Dec 13, 2021 · Big Data

How to De‑duplicate 4 Billion QQ Numbers with Only 1 GB RAM

This article explains several algorithmic strategies—including sorting, hash maps, file splitting, and bitmap techniques—to remove duplicates from a file containing 4 billion QQ numbers while staying within a 1 GB memory limit, and it provides extension exercises for sorting, median, top‑K, and duplicate detection.

Big DataBitmapMemory Optimization
0 likes · 8 min read
How to De‑duplicate 4 Billion QQ Numbers with Only 1 GB RAM
Java Backend Technology
Java Backend Technology
Dec 9, 2021 · Big Data

How to Efficiently Find Common URLs in Billions of Records

This article explains how to handle the massive‑data problem of intersecting two files containing billions of URLs by using hash‑based divide‑and‑conquer techniques, file partitioning, and in‑memory hash lookups to achieve scalable performance beyond naive O(m·n) approaches.

HashURL intersectionalgorithm
0 likes · 8 min read
How to Efficiently Find Common URLs in Billions of Records
Open Source Linux
Open Source Linux
Dec 2, 2021 · Backend Development

Mastering Rate Limiting: Strategies, Algorithms, and Real-World Implementations

This article explains why rate limiting is essential for system stability, outlines common throttling patterns such as circuit breaking, degradation, delayed processing, and privilege handling, and dives into popular algorithms like counter, leaky bucket, and token bucket with concrete Java and Nginx examples.

Distributed Systemsalgorithmconcurrency
0 likes · 13 min read
Mastering Rate Limiting: Strategies, Algorithms, and Real-World Implementations
NiuNiu MaTe
NiuNiu MaTe
Dec 2, 2021 · Fundamentals

Master the Classic 2‑Egg 100‑Floor Problem: Optimal Strategies Explained

This article explains the classic two‑egg, 100‑floor interview puzzle, analyzes why it became a staple, and walks through four solution approaches—from a naïve linear method to binary search and a balanced partition strategy—culminating in a mathematically derived optimal method that never exceeds fourteen drops.

Binary Searchalgorithmegg-drop
0 likes · 8 min read
Master the Classic 2‑Egg 100‑Floor Problem: Optimal Strategies Explained
Alibaba Terminal Technology
Alibaba Terminal Technology
Nov 29, 2021 · Mobile Development

How Youku Optimized Free‑Viewpoint Video Playback for a Seamless Mobile Experience

This article details Youku’s first “Free Viewpoint” technology optimization, explaining its underlying principles, client architecture, performance‑boosting strategies such as smart bitrate, multi‑channel downloading, pre‑caching, and the resulting improvements in playback smoothness and device coverage.

Mobile Streamingalgorithmfree-viewpoint
0 likes · 9 min read
How Youku Optimized Free‑Viewpoint Video Playback for a Seamless Mobile Experience
NiuNiu MaTe
NiuNiu MaTe
Nov 26, 2021 · Big Data

How to Deduplicate 4 Billion QQ Numbers Using Only 1 GB of Memory

This article walks through four practical techniques—sorting, hashmap, file splitting, and bitmap—to remove duplicate QQ numbers from a 4‑billion‑record file within a 1 GB memory limit, and provides extended exercises for sorting, median, top‑K, and duplicate detection.

Big DataBitmapalgorithm
0 likes · 8 min read
How to Deduplicate 4 Billion QQ Numbers Using Only 1 GB of Memory
JavaEdge
JavaEdge
Nov 19, 2021 · Fundamentals

Master Sliding Window Maximum with Heap and Deque – Step-by-Step Solution

This article explains how to compute the maximum of each k‑sized sliding window over an integer array using both a priority‑queue (heap) approach and an optimized monotonic deque technique, complete with detailed walkthroughs, visual illustrations, and full Python code.

HeapSliding Windowalgorithm
0 likes · 9 min read
Master Sliding Window Maximum with Heap and Deque – Step-by-Step Solution
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Nov 13, 2021 · Fundamentals

Sliding Window Technique: Concepts, Framework, and LeetCode Examples

This article introduces the sliding window algorithmic technique, explains its relation to TCP flow control, demonstrates its implementation with Java code for maximum subarray sum, longest substring without repeats, and minimum window substring problems, and provides a reusable framework for solving similar LeetCode challenges.

LeetCodeSliding Windowalgorithm
0 likes · 10 min read
Sliding Window Technique: Concepts, Framework, and LeetCode Examples
DeWu Technology
DeWu Technology
Nov 12, 2021 · Mobile Development

Detecting and Fixing iOS Memory Leaks with Object‑Graph Scanning

This article explains why iOS memory leaks become critical as apps grow, introduces five representative leak models, details a production‑ready object‑graph scanning solution with custom data structures and a non‑recursive DFS algorithm, and evaluates its performance impact and mitigation strategies.

DetectionalgorithmiOS
0 likes · 13 min read
Detecting and Fixing iOS Memory Leaks with Object‑Graph Scanning
DataFunSummit
DataFunSummit
Nov 7, 2021 · Artificial Intelligence

How Information‑Flow Recommendation Systems Upgrade Drives User Growth

The article examines how low‑level recommendation‑algorithm improvements in information‑flow feeds can boost user retention, LTV and overall growth by addressing cold‑start challenges, survivor bias, and causal inference through personalized ranking, ecosystem construction, and multi‑task learning.

Information Flowalgorithmcausal inference
0 likes · 14 min read
How Information‑Flow Recommendation Systems Upgrade Drives User Growth
HomeTech
HomeTech
Nov 3, 2021 · Big Data

Real‑time Materialized View Practices with Apache Flink: System Analysis, Algorithm Design, and Implementation

This article presents Car Home's experience building a real‑time materialized view system on Apache Flink, detailing system analysis, problem decomposition, a global‑version‑based CDC algorithm, its implementation as a Flink connector, practical deployment results, and remaining challenges such as clock dependency and state size.

CDCFlinkalgorithm
0 likes · 17 min read
Real‑time Materialized View Practices with Apache Flink: System Analysis, Algorithm Design, and Implementation
Top Architect
Top Architect
Nov 1, 2021 · Backend Development

Design and Implementation of a Points-Based Lottery System Using Spring Boot

This article explains how to design and implement a points‑based lottery (luck draw) system in Java with Spring Boot, covering database schema for prizes, probability limits, prize pools, the random draw algorithm, prize restrictions, and asynchronous prize distribution using a factory pattern.

AsyncLotterySpring Boot
0 likes · 10 min read
Design and Implementation of a Points-Based Lottery System Using Spring Boot
NiuNiu MaTe
NiuNiu MaTe
Oct 27, 2021 · Fundamentals

Master the House Robber Problem with Dynamic Programming

This article explains the classic House Robber interview question, detailing the problem constraints, illustrating why a naive alternating‑house approach fails, and presenting a clear dynamic‑programming solution with recurrence, base cases, and a concise code example.

DPalgorithmdynamic programming
0 likes · 5 min read
Master the House Robber Problem with Dynamic Programming
TikTok Frontend Technology Team
TikTok Frontend Technology Team
Oct 22, 2021 · Fundamentals

Understanding DAG Basics and the Dagre Layout Algorithm with Perfect-Process

This article introduces the fundamentals of directed acyclic graphs (DAGs), explains adjacency representations, details the Dagre layout algorithm’s concepts, computation steps, and constraints, and presents the Perfect‑Process front‑end library that implements these techniques for interactive pipeline diagram rendering and editing.

DAGalgorithmfrontend
0 likes · 13 min read
Understanding DAG Basics and the Dagre Layout Algorithm with Perfect-Process
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Oct 20, 2021 · Backend Development

Why Rate Limiting Matters: Strategies, Algorithms, and Real-World Implementations

Rate limiting protects services from overload by controlling traffic, using techniques such as circuit breaking, degradation, buffering, privilege handling, and algorithms like counters, leaky bucket, and token bucket, with implementations ranging from Guava in Java to Nginx+Lua for distributed systems.

algorithmrate limitingtraffic control
0 likes · 14 min read
Why Rate Limiting Matters: Strategies, Algorithms, and Real-World Implementations
21CTO
21CTO
Oct 17, 2021 · Fundamentals

Mastering Interview Math: Implement a Custom Square Root Function Without Libraries

This article explores how to solve a common interview coding challenge—implementing a square‑root function without using library calls—by discussing problem analysis, linear and binary‑search approaches, optimization techniques, testing strategies, and the broader skills interviewers aim to assess.

Binary Searchalgorithmcoding-challenge
0 likes · 15 min read
Mastering Interview Math: Implement a Custom Square Root Function Without Libraries
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 12, 2021 · Backend Development

Backend Interview Questions and Answers: HTTP, HTTPS, TCP, Virtual Memory, Eureka, Hystrix, Zookeeper, and Longest Substring Algorithm

This article compiles a series of backend interview questions covering HTTP header fields, HTTPS handshake, TCP connection states, virtual and physical memory concepts, TCP connection limits, Eureka architecture and consistency, Hystrix fault‑tolerance mechanisms, Zookeeper's Zab protocol and leader election, and provides a Java solution for finding the longest substring without repeating characters.

HTTPSTCPalgorithm
0 likes · 19 min read
Backend Interview Questions and Answers: HTTP, HTTPS, TCP, Virtual Memory, Eureka, Hystrix, Zookeeper, and Longest Substring Algorithm
NiuNiu MaTe
NiuNiu MaTe
Oct 12, 2021 · Fundamentals

How Many Peaches Did the Monkeys Start With? A Math & Code Puzzle

This article presents a classic monkey‑and‑peach puzzle, derives the minimal initial peach count using mathematical reasoning, and then demonstrates a brute‑force Python program that searches for the solution, illustrating how loops and modular checks solve the problem.

Math PuzzlePythonalgorithm
0 likes · 7 min read
How Many Peaches Did the Monkeys Start With? A Math & Code Puzzle
MaGe Linux Operations
MaGe Linux Operations
Oct 4, 2021 · Artificial Intelligence

Build a Simple AI‑Powered Tetris Game with Python

This tutorial shows how to create a Tetris mini‑game with AI using a straightforward algorithm, Python 3.6, PyQt5, and detailed code that evaluates board states based on cleared lines, holes, heights, and other metrics to select optimal moves.

AIPyQt5Python
0 likes · 5 min read
Build a Simple AI‑Powered Tetris Game with Python
Architecture Digest
Architecture Digest
Sep 27, 2021 · Backend Development

Understanding Rate Limiting: Concepts, Algorithms, and Implementations

This article explains why rate limiting is needed in both physical venues and online systems, describes common limiting strategies such as circuit breaking, service degradation, delayed processing, and privileged handling, and details three major algorithms—counter, leaky bucket, and token bucket—along with practical Java and Nginx‑Lua code examples.

Distributed Systemsalgorithmconcurrency
0 likes · 13 min read
Understanding Rate Limiting: Concepts, Algorithms, and Implementations
NiuNiu MaTe
NiuNiu MaTe
Sep 15, 2021 · Fundamentals

How to Maximize Mooncake Profit: Brute Force, Greedy, and DP Solutions

This article presents a classic stock‑like profit maximization problem using mooncake prices, explains the input and expected output, and walks through three solution strategies—brute‑force enumeration, a greedy linear scan, and a dynamic‑programming approach—complete with Go code examples and visual illustrations.

algorithmbrute forcedynamic programming
0 likes · 6 min read
How to Maximize Mooncake Profit: Brute Force, Greedy, and DP Solutions
Selected Java Interview Questions
Selected Java Interview Questions
Sep 13, 2021 · Fundamentals

Understanding Merge Sort and Merging Two Sorted Arrays in C#

This article explains the merge sort algorithm’s divide‑and‑conquer principle, analyzes its O(n log n) time complexity, and provides two complete C# code examples—one for a generic merge sort and another for merging two already sorted arrays—along with visual illustrations of the merging process.

algorithmc++divide and conquer
0 likes · 6 min read
Understanding Merge Sort and Merging Two Sorted Arrays in C#
Hulu Beijing
Hulu Beijing
Sep 7, 2021 · Fundamentals

Hulu 2022 Campus Recruitment: 5 Algorithmic Challenges with Solutions

This article presents five programming problems from Hulu's 2022 campus recruitment—including particle simulation, Sophie‑N number counting, optimal activity point on a tree, devil‑maze navigation, and non‑intersecting triangles—complete with problem statements, input/output specifications, sample cases, and detailed solution approaches.

Geometryalgorithmdynamic programming
0 likes · 18 min read
Hulu 2022 Campus Recruitment: 5 Algorithmic Challenges with Solutions
Top Architect
Top Architect
Sep 1, 2021 · Backend Development

Rate Limiting Strategies, Algorithms, and Implementations in Backend Systems

This article explains the concepts, strategies, and algorithms of rate limiting—including circuit breaking, service degradation, leaky‑bucket and token‑bucket methods—and provides practical Java, Guava, and Nginx + Lua implementations for controlling concurrency and protecting backend services.

BackendDistributed SystemsGuava
0 likes · 13 min read
Rate Limiting Strategies, Algorithms, and Implementations in Backend Systems
php Courses
php Courses
Aug 27, 2021 · Backend Development

Implementing Redis-Based Rate Limiting in PHP

This article presents a PHP implementation of Redis-based rate limiting, explaining how to limit the number of requests per time interval by using timestamp-modulo keys, atomic increment operations, and key expiration, along with detailed code and step-by-step commentary.

algorithmrate limitingredis
0 likes · 3 min read
Implementing Redis-Based Rate Limiting in PHP
Alimama Tech
Alimama Tech
Aug 25, 2021 · Artificial Intelligence

Calibration Techniques for User Response Prediction in Online Advertising

Alibaba Mama’s talk explains how calibrated probability models—evolving from simple Platt scaling to Bayesian isotonic regression and real‑time wave‑adjusted variants—improve click‑through and conversion predictions, enabling more accurate bidding, stable auctions, and fairer ad allocation despite data drift and sparsity.

Calibrationalgorithmonline advertising
0 likes · 20 min read
Calibration Techniques for User Response Prediction in Online Advertising
JavaEdge
JavaEdge
Aug 17, 2021 · Fundamentals

Detecting Cycles in a Linked List with Fast and Slow Pointers (Java)

This article explains how to determine whether a singly linked list contains a cycle using the fast‑slow pointer technique, derives the mathematical reasoning for locating the cycle entry point, and provides a complete Java implementation that returns the node where the cycle begins or null if none.

algorithmcycle detectionfast slow pointer
0 likes · 4 min read
Detecting Cycles in a Linked List with Fast and Slow Pointers (Java)
IT Architects Alliance
IT Architects Alliance
Aug 9, 2021 · Backend Development

Mastering Rate Limiting: Algorithms, Strategies, and Practical Guava & Nginx Implementations

This article explains why rate limiting is essential for system stability, compares it with caching and degradation, details three core algorithms—counter, leaky bucket, and token bucket—and provides concrete Guava, Java, and Nginx + Lua code examples for implementing both local and distributed throttling.

BackendDistributed SystemsGuava
0 likes · 14 min read
Mastering Rate Limiting: Algorithms, Strategies, and Practical Guava & Nginx Implementations
Liangxu Linux
Liangxu Linux
Jul 27, 2021 · Fundamentals

Finding the Poison Bottle with Minimum Rabbits: Binary Encoding Explained

This article explores how to identify a single poisonous bottle among 1,000 using the fewest rabbits and the shortest time by analyzing pure‑time, pure‑space, balanced strategies, and finally applying binary encoding to solve the classic interview puzzle in just one day.

Binaryalgorithminterview
0 likes · 5 min read
Finding the Poison Bottle with Minimum Rabbits: Binary Encoding Explained
NiuNiu MaTe
NiuNiu MaTe
Jul 27, 2021 · Fundamentals

Three Clever Ways to Solve the Circular Gas Station Problem

This article explains the classic circular gas‑station challenge, presents its key constraints, walks through a concrete example, and compares three solution strategies—brute‑force, reverse (backtrack) greedy, and a cumulative‑sum graphical method—highlighting their trade‑offs and insights.

algorithmbrute forcecoding interview
0 likes · 7 min read
Three Clever Ways to Solve the Circular Gas Station Problem
Java Interview Crash Guide
Java Interview Crash Guide
Jul 24, 2021 · Backend Development

Mastering Rate Limiting in Go: Algorithms, Implementations, and Best Practices

This article explains why rate limiting is essential for high‑availability services, describes HTTP 429 standards and response headers, classifies rate‑limiting strategies by granularity, target, and algorithm, and provides detailed Go code examples using the time/rate library for fixed‑window, sliding‑window, leaky‑bucket, and token‑bucket implementations.

BackendGoToken Bucket
0 likes · 28 min read
Mastering Rate Limiting in Go: Algorithms, Implementations, and Best Practices
Beike Product & Technology
Beike Product & Technology
Jul 8, 2021 · Fundamentals

Understanding HyperLogLog: Algorithm Principles, Redis Implementation, and Experimental Analysis

This article explores the HyperLogLog algorithm for cardinality estimation, tracing its development from Linear and LogLog counting, detailing its Redis implementation with sparse and dense encodings and command workflows, and presenting experiments that demonstrate its memory efficiency and analyze observed error rates versus the theoretical 0.81% standard deviation.

HyperLogLogalgorithmcardinality estimation
0 likes · 13 min read
Understanding HyperLogLog: Algorithm Principles, Redis Implementation, and Experimental Analysis
Selected Java Interview Questions
Selected Java Interview Questions
Jul 5, 2021 · Fundamentals

Heap Sort: Theory, Steps, and Java Implementation

This article explains heap sort's time and space complexities, introduces max‑heap and min‑heap concepts, details the algorithmic steps for building and maintaining the heap, and provides a complete Java implementation with accompanying code examples.

Data StructuresSortingalgorithm
0 likes · 8 min read
Heap Sort: Theory, Steps, and Java Implementation
NiuNiu MaTe
NiuNiu MaTe
Jun 25, 2021 · Fundamentals

How to Identify a Poisoned Bottle with Minimal Rabbits Using Binary Logic

This article explores a classic puzzle where one must locate a single poisonous bottle among 1000 using rabbits as testers, comparing time‑focused, space‑focused, and balanced strategies before revealing an optimal binary‑encoding solution that finds the poison in one day with just ten rabbits.

Binaryalgorithmlogic
0 likes · 5 min read
How to Identify a Poisoned Bottle with Minimal Rabbits Using Binary Logic
ByteFE
ByteFE
Jun 15, 2021 · Frontend Development

Generating Chinese Character Stroke Order Animations from Font Files

This article details a technical approach to automatically generating stroke order animation data for Chinese characters from standard font files, covering SVG rendering, coordinate transformations, deep learning-based stroke decomposition, and CSS animation techniques.

Font ParsingSVG animationStroke Order
0 likes · 20 min read
Generating Chinese Character Stroke Order Animations from Font Files
macrozheng
macrozheng
Jun 11, 2021 · Backend Development

How a Faster CRC-64 Boosted Redis Performance: The CRCSpeed Story

An in‑depth look at how mattsta’s CRCSpeed implementation replaced Redis’s original CRC algorithm, delivering up to four‑fold speed gains, the history of its development from 2014 to its 2020 integration, and the performance impact on RDB generation and cluster slot hashing.

CRCalgorithmbackend-development
0 likes · 14 min read
How a Faster CRC-64 Boosted Redis Performance: The CRCSpeed Story
iQIYI Technical Product Team
iQIYI Technical Product Team
Jun 4, 2021 · Artificial Intelligence

Intelligent Video Budget Pacing System for Online Video Platforms

An ecosystem‑wide intelligent promotion system applies a budget‑pacing algorithm with probabilistic throttling and fine‑ranking score adjustments in 5‑minute slots, guaranteeing uniform video exposure while minimizing impact on overall consumption, boosting daily exposure completion from under 5 % to up to 70 % and reducing watch‑time loss.

Content Distributionalgorithmbudget pacing
0 likes · 10 min read
Intelligent Video Budget Pacing System for Online Video Platforms
Python Programming Learning Circle
Python Programming Learning Circle
May 31, 2021 · Game Development

Python Pygame Missile Auto‑Tracking Algorithm Tutorial

This article explains how to implement a missile auto‑tracking system in a 2D shooting game using Python and Pygame, covering the underlying differential‑equation‑based algorithm, step‑by‑step calculations, handling of coordinate systems, and code for rotation and rendering.

Game DevelopmentMissile TrackingPygame
0 likes · 9 min read
Python Pygame Missile Auto‑Tracking Algorithm Tutorial
NiuNiu MaTe
NiuNiu MaTe
May 28, 2021 · Fundamentals

How to Win the Apple‑Picking Game: Recursive and DP Strategies Explained

This article walks through the classic “pick‑from‑both‑ends” apple game, analyzing why greedy choices fail, and presents recursive, memoized, and dynamic‑programming solutions in Go, complete with code examples and step‑by‑step explanations to help you determine the winning strategy.

Game TheoryRecursionalgorithm
0 likes · 8 min read
How to Win the Apple‑Picking Game: Recursive and DP Strategies Explained
vivo Internet Technology
vivo Internet Technology
May 26, 2021 · Backend Development

Dynamic Load Balancing Algorithms in the TARS Microservice Framework

The Vivo Internet Server Team extended TARS with a dynamic load‑balancing algorithm that recalculates each node’s weight every minute using metrics such as 5‑minute average response time, timeout and exception rates, CPU, memory and network load, automatically adapting traffic distribution beyond the built‑in round‑robin, weighted round‑robin and consistent‑hash methods.

C++Dynamic WeightMicroservices
0 likes · 13 min read
Dynamic Load Balancing Algorithms in the TARS Microservice Framework
DataFunTalk
DataFunTalk
May 26, 2021 · Artificial Intelligence

Evolution, Algorithms, and Architecture of Qingteng FM's Recommendation System

This article details how Qingteng FM’s recommendation system progressed from manual curation to strategy‑based and personalized recommendations, explains the multi‑stage algorithm pipeline, describes the three‑layer deployment architecture, and outlines future challenges and opportunities in audio content recommendation.

Audio Streamingalgorithmarchitecture
0 likes · 12 min read
Evolution, Algorithms, and Architecture of Qingteng FM's Recommendation System
Ops Development Stories
Ops Development Stories
May 25, 2021 · Backend Development

Master Rate Limiting: Counter, Sliding Window, Leaky & Token Bucket Algorithms

This article introduces common rate‑limiting algorithms—counter, sliding‑window, leaky bucket, and token bucket—explains their principles, compares their advantages and drawbacks, and provides Java code examples, including how Sentinel 1.8.0 implements each technique using structures such as LeapArray and WarmUpController.

algorithmjavarate limiting
0 likes · 17 min read
Master Rate Limiting: Counter, Sliding Window, Leaky & Token Bucket Algorithms
Programmer DD
Programmer DD
May 24, 2021 · Fundamentals

Master Red‑Black Trees: From 2‑3‑4 Trees to Practical Implementation

This article walks through the fundamentals of red‑black trees, explains their equivalence to 2‑3‑4 trees, details insertion and deletion rules, compares their performance to plain binary search trees, and shares practical debugging tips for implementing a balanced tree in code.

2-3-4 TreeData StructuresRed-Black Tree
0 likes · 12 min read
Master Red‑Black Trees: From 2‑3‑4 Trees to Practical Implementation
Intelligent Backend & Architecture
Intelligent Backend & Architecture
May 15, 2021 · Fundamentals

Mastering Algorithms: Definitions, Design Principles, and Complexity

This article introduces the core concepts of algorithms, covering their definition, five essential properties, design principles such as correctness and readability, methods for analyzing time and space complexity, common complexity classes, and a variety of algorithmic strategies including recursion, dynamic programming, greedy and divide‑and‑conquer techniques.

algorithmalgorithmic strategiescomplexity
0 likes · 23 min read
Mastering Algorithms: Definitions, Design Principles, and Complexity
Java Backend Technology
Java Backend Technology
May 12, 2021 · Fundamentals

Master Bitwise Operations: From Basics to Classic Interview Problems

This article introduces the fundamentals of bitwise operations, explains each operator with clear rules and examples, demonstrates practical tricks such as parity checks and value swapping, and walks through classic interview problems—including addition without arithmetic, counting set bits, and finding unique numbers—complete with Java code snippets and visual illustrations.

Binaryalgorithmbitwise operations
0 likes · 15 min read
Master Bitwise Operations: From Basics to Classic Interview Problems
NiuNiu MaTe
NiuNiu MaTe
May 11, 2021 · Fundamentals

Can a Frog Jump Across All Platforms? Jump Game Solutions with DFS, DP, Greedy

Given an array where each element indicates the maximum jump length from that position, this article explores multiple strategies—depth‑first search, dynamic programming, greedy, and reverse‑tracking—to determine whether the frog can reach the last board, comparing their efficiency and implementation details.

DFSalgorithmdynamic programming
0 likes · 7 min read
Can a Frog Jump Across All Platforms? Jump Game Solutions with DFS, DP, Greedy