Tagged articles
619 articles
Page 5 of 7
21CTO
21CTO
May 10, 2021 · Fundamentals

What to Expect in Google’s 7‑Round Interview: A Candidate’s Journey and Tips

The author recounts a full Google China interview experience—including resume submission, recruiter prescreen, phone and onsite coding rounds, HR and English interviews, lunch with engineers, and final feedback—while sharing practical advice and insights to help future candidates prepare effectively.

Google interviewalgorithmcareer advice
0 likes · 10 min read
What to Expect in Google’s 7‑Round Interview: A Candidate’s Journey and Tips
360 Smart Cloud
360 Smart Cloud
Apr 30, 2021 · Backend Development

Understanding Rate Limiting: Concepts, Architectures, Algorithms, and a Redis‑Lua Token Bucket Implementation

This article explains what rate limiting is, why it is needed, the typical actions taken when limits are reached, compares single‑node and distributed architectures, reviews four classic limiting algorithms, and provides a practical Redis‑Lua token‑bucket implementation with code examples.

BackendToken Bucketalgorithm
0 likes · 14 min read
Understanding Rate Limiting: Concepts, Architectures, Algorithms, and a Redis‑Lua Token Bucket Implementation
Programmer DD
Programmer DD
Apr 25, 2021 · Fundamentals

How Bitmaps and Bloom Filters Supercharge Massive Data Lookups

This article explains the bitmap concept, demonstrates how to store and query billions of integers using bit-level operations, introduces BitSet for dynamic bit vectors, and describes Bloom filters as probabilistic structures for fast, memory‑efficient membership testing in large‑scale data scenarios.

BitmapMemory Optimizationalgorithm
0 likes · 12 min read
How Bitmaps and Bloom Filters Supercharge Massive Data Lookups
Xianyu Technology
Xianyu Technology
Apr 21, 2021 · Backend Development

Seller Posting Promotion Platform Architecture and Implementation

To boost Xianyu’s user retention, the team built a long‑term promotion platform that combines configurable operational activities with algorithmic SPU recommendations, using Kunpeng extension points, supply‑demand analysis, and conditional search to personalize seller prompts, improve click‑through, and lay groundwork for broader scenario expansion.

algorithmdata-analysise‑commerce
0 likes · 9 min read
Seller Posting Promotion Platform Architecture and Implementation
Big Data Technology & Architecture
Big Data Technology & Architecture
Apr 20, 2021 · Fundamentals

Consistent Hashing and Jump Consistent Hash: Concepts, Implementation, and Use Cases

This article explains the fundamentals of consistent hashing, compares the classic ring‑based method with the more efficient jump consistent hash algorithm, provides reference implementations in C++, discusses their time‑complexity and practical trade‑offs, and shows how they are applied in systems such as Greenplum.

Distributed SystemsGreenplumalgorithm
0 likes · 11 min read
Consistent Hashing and Jump Consistent Hash: Concepts, Implementation, and Use Cases
DataFunTalk
DataFunTalk
Apr 4, 2021 · Fundamentals

Open the Lock Problem – BFS Solution in Java

Given a four‑wheel combination lock with digits 0‑9, the task is to find the minimum number of rotations needed to reach a target combination while avoiding a list of dead‑end states, using a breadth‑first search algorithm illustrated with Java code examples.

BFSGraph SearchLock Problem
0 likes · 7 min read
Open the Lock Problem – BFS Solution in Java
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Mar 26, 2021 · Fundamentals

Optical Fingerprint Sensors: Principles, Common Issues, and Gabor Filter Preprocessing

Optical fingerprint sensors capture ridge patterns via illuminated light through an under‑display lens, offering full‑screen designs but facing challenges like incomplete presses, lighting failures, and dirty or wet fingers, while Gabor filter preprocessing enhances image texture to improve recognition robustness and guide future hardware‑algorithm improvements.

BiometricsGabor filterImage Processing
0 likes · 8 min read
Optical Fingerprint Sensors: Principles, Common Issues, and Gabor Filter Preprocessing
Sohu Tech Products
Sohu Tech Products
Mar 17, 2021 · Big Data

Understanding Simhash: From Traditional Hash to Random Projection LSH

This article explains the principles and implementation of Simhash, covering the shortcomings of traditional hash functions, the use of cosine similarity, random projection for dimensionality reduction, locality‑sensitive hashing, and practical optimizations for large‑scale duplicate detection.

Big DataCosine SimilarityLocality Sensitive Hashing
0 likes · 24 min read
Understanding Simhash: From Traditional Hash to Random Projection LSH
DevOps
DevOps
Mar 16, 2021 · Big Data

Digital Transformation Six‑Map Methodology: Strategic, Business, Demand, Application, Algorithm, and Data Maps

The article presents a comprehensive six‑map framework for digital transformation—strategic, business, demand, application, algorithm, and data maps—explaining how enterprises can systematically align goals, processes, requirements, technologies, models, and data assets to achieve effective, data‑driven change.

Data MappingDigital Transformationalgorithm
0 likes · 18 min read
Digital Transformation Six‑Map Methodology: Strategic, Business, Demand, Application, Algorithm, and Data Maps
Wukong Talks Architecture
Wukong Talks Architecture
Mar 11, 2021 · Fundamentals

A Plain-Language Introduction to Binary Trees

This article uses the occasion of Tree‑Planting Day to explain binary trees in simple terms, covering their definition, node types, degree, levels, five tree shapes, traversal methods (pre‑order, in‑order, post‑order, level‑order), advantages, drawbacks, and a brief comparison with binary search.

algorithmbinary treefundamentals
0 likes · 9 min read
A Plain-Language Introduction to Binary Trees
New Oriental Technology
New Oriental Technology
Mar 1, 2021 · Frontend Development

Manhattan Routing Algorithm Implementation for Diagram Connections

This article explains the Manhattan routing algorithm used for automatic orthogonal connection routing in diagram tools, discusses its origins, references useful libraries like draw2d, and provides a full TypeScript implementation with code examples and practical application scenarios.

DiagrammingJavaScriptManhattan routing
0 likes · 8 min read
Manhattan Routing Algorithm Implementation for Diagram Connections
58 Tech
58 Tech
Feb 26, 2021 · Fundamentals

Efficient Similar‑String Search in Search Engines Using Levenshtein and Damerau‑Levenshtein Automata

This article presents a comprehensive technical guide on applying Levenshtein and Damerau‑Levenshtein automata to efficiently solve the problem of fast similar‑string lookup in search‑engine systems, introducing novel DFA construction algorithms, theoretical correctness proofs, and practical implementation details with Java code examples.

AutomataDamerau-LevenshteinLevenshtein
0 likes · 53 min read
Efficient Similar‑String Search in Search Engines Using Levenshtein and Damerau‑Levenshtein Automata
DeWu Technology
DeWu Technology
Feb 26, 2021 · Backend Development

Design and Implementation of an AB Testing Platform with Traffic Allocation Algorithms

The paper presents an AB‑testing platform that structures experiments into scenes, buckets, layers and traffic, uses a salted‑hash based allocation and a two‑step “multi‑withdraw‑fill” algorithm to adjust percentages while preserving user‑experiment stability, and describes a lightweight, cache‑centric system architecture with staggered config reloads and safeguards against database spikes and zombie nodes.

AB testingExperiment PlatformSystem Design
0 likes · 11 min read
Design and Implementation of an AB Testing Platform with Traffic Allocation Algorithms
DataFunSummit
DataFunSummit
Feb 25, 2021 · Information Security

Intelligent Risk Control at 58.com: Architecture, Challenges, and Unknown‑Risk Detection

This article introduces the business background and security challenges of 58.com, explains the three‑layer intelligent risk‑control architecture built on big‑data and AI, and details practical methods for perceiving and detecting unknown risks using techniques such as PU learning, Prophet, and HotSpot.

AIInformation Securityalgorithm
0 likes · 14 min read
Intelligent Risk Control at 58.com: Architecture, Challenges, and Unknown‑Risk Detection
Alibaba Cloud Developer
Alibaba Cloud Developer
Feb 24, 2021 · Artificial Intelligence

How Alibaba’s ICBU Algorithm Team Transformed E‑Commerce in 2020

This article reviews the 2020 achievements of Alibaba.com’s ICBU algorithm team, explaining the evolving role of algorithm engineers, the fundamentals of e‑commerce algorithms, the team’s three‑pillar workflow of Understanding, Growth, and Matching, and the technical breakthroughs that drove business impact and future directions.

Alibabaalgorithme‑commerce
0 likes · 28 min read
How Alibaba’s ICBU Algorithm Team Transformed E‑Commerce in 2020
360 Tech Engineering
360 Tech Engineering
Feb 23, 2021 · Artificial Intelligence

Video Stutter Detection via Frame Difference Analysis Using FFmpeg

This article explains a method for detecting video stutter by converting uploaded videos into frame sequences with ffmpeg, calculating pixel differences between consecutive frames, aggregating motion metrics, removing scene‑change effects, computing a dynamic factor, and outputting a binary result indicating the presence or absence of stutter.

Computer VisionVideo processingalgorithm
0 likes · 5 min read
Video Stutter Detection via Frame Difference Analysis Using FFmpeg
php Courses
php Courses
Feb 23, 2021 · Backend Development

Implementing IP Rate Limiting with Redis List in PHP

This article explains how to limit the number of requests an IP can make to a specific API endpoint within a sliding time window using Redis list structures in PHP, including example scenario, implementation logic, and complete code snippets.

algorithmip limit
0 likes · 4 min read
Implementing IP Rate Limiting with Redis List in PHP
Top Architect
Top Architect
Feb 14, 2021 · Backend Development

An Introduction to Rate Limiting: Concepts, Classifications, and Go Implementation

This article explains the fundamentals of rate limiting, its importance for high‑availability services, various classification dimensions, common algorithms such as fixed‑window, sliding‑window, leaky‑bucket and token‑bucket, and demonstrates practical usage with Go's golang.org/x/time/rate library including code examples and configuration tips.

Distributed SystemsGolangToken Bucket
0 likes · 26 min read
An Introduction to Rate Limiting: Concepts, Classifications, and Go Implementation
FunTester
FunTester
Feb 10, 2021 · Fundamentals

How to Find the Longest Consecutive 1s in a Binary String Using Java

This article explains several Java techniques—including a simple loop, String.split, and regular‑expression approaches—to compute the maximum number of consecutive '1' characters in a binary string, and even extends the method to handle mixed‑character inputs.

Code ExampleString processingalgorithm
0 likes · 6 min read
How to Find the Longest Consecutive 1s in a Binary String Using Java
Liangxu Linux
Liangxu Linux
Feb 9, 2021 · Fundamentals

Master Recursion: Array Sum and Linked List Deletion Explained with Java Code

This article explains the core concepts of recursion by walking through an array‑sum example and a LeetCode linked‑list removal problem, detailing the necessary base case, recursive formula, and providing complete Java implementations with step‑by‑step visual illustrations.

Data StructuresLeetCodeRecursion
0 likes · 10 min read
Master Recursion: Array Sum and Linked List Deletion Explained with Java Code
21CTO
21CTO
Jan 31, 2021 · Backend Development

Mastering Load Balancing: From Random to Smooth Weighted Round‑Robin in Java

This article explains load‑balancing fundamentals, covering hardware vs. software devices, server‑side and client‑side balancing, and walks through common algorithms—random, weighted random, round‑robin, weighted and smooth weighted round‑robin, hash, consistent hash with virtual nodes, and least‑connection—each illustrated with Java code examples and diagrams.

Distributed Systemsalgorithm
0 likes · 18 min read
Mastering Load Balancing: From Random to Smooth Weighted Round‑Robin in Java
MaGe Linux Operations
MaGe Linux Operations
Jan 26, 2021 · Fundamentals

30 Quick Python Mini‑Projects to Master Core Programming Skills

This tutorial presents thirty concise Python tasks—ranging from duplicate detection and anagram checking to list chunking, dictionary merging, and execution timing—each accompanied by clear explanations and ready‑to‑run code snippets, enabling beginners to solidify fundamental concepts through hands‑on practice.

BeginnerPythonString processing
0 likes · 14 min read
30 Quick Python Mini‑Projects to Master Core Programming Skills
21CTO
21CTO
Jan 11, 2021 · Artificial Intelligence

How to Build a Recommendation System from Scratch: Key Concepts and Strategies

This article explains the fundamentals of recommendation systems, covering data collection, user and content profiling, system architecture, algorithmic pipelines such as recall, filtering, ranking, and evaluation metrics, while also discussing practical challenges like echo chambers and long‑term user value.

Evaluationalgorithmmachine learning
0 likes · 16 min read
How to Build a Recommendation System from Scratch: Key Concepts and Strategies
Aotu Lab
Aotu Lab
Jan 8, 2021 · Frontend Development

Front‑End Tech Highlights: Video Players, Performance Tips, AI Recommendations

From the rise and fall of Flash to modern front‑end video playback techniques, performance optimization strategies, AI recommendation fundamentals, CLI design best practices, and a glimpse into game development and algorithm analysis, this article surveys diverse cutting‑edge technologies shaping today’s software landscape.

AICLIalgorithm
0 likes · 10 min read
Front‑End Tech Highlights: Video Players, Performance Tips, AI Recommendations
vivo Internet Technology
vivo Internet Technology
Jan 6, 2021 · Big Data

How HyperLogLog Estimates Cardinality in Massive Data Sets

This article explains the cardinality‑counting problem behind DAU/MAU and unique visitor metrics, compares naïve solutions like Set, Bitmap and Bloom filter, introduces big‑data algorithms such as Linear Counting, LogLog and HyperLogLog, and shows how Redis implements HyperLogLog with dense and sparse storage optimizations.

Big DataCardinalityHyperLogLog
0 likes · 17 min read
How HyperLogLog Estimates Cardinality in Massive Data Sets
DataFunTalk
DataFunTalk
Dec 26, 2020 · Product Management

Analysis of Soul’s Social Product Strategy, Community, and Growth Metrics

This article provides a comprehensive analysis of the Soul social app, examining its non‑hormonal positioning, community atmosphere, relationship‑chain metrics, content‑driven engagement, algorithmic matching, and future growth strategies, highlighting how these factors drive user retention and scale.

User Retentionalgorithmcommunity management
0 likes · 13 min read
Analysis of Soul’s Social Product Strategy, Community, and Growth Metrics
Programmer DD
Programmer DD
Dec 13, 2020 · Backend Development

Master Sliding Window Rate Limiting in Java with Simple Code

This article introduces a straightforward Java implementation of a sliding‑window rate‑limiting algorithm for single‑machine use, explains its core logic, demonstrates its behavior with sample output, and visualizes the step‑by‑step process of how timestamps are managed within the window.

Sliding Windowalgorithmjava
0 likes · 8 min read
Master Sliding Window Rate Limiting in Java with Simple Code
Wukong Talks Architecture
Wukong Talks Architecture
Dec 11, 2020 · Fundamentals

Byzantine Generals Problem Illustrated with Three Kingdoms Card Game

This article uses the popular Chinese card game Three Kingdoms to illustrate the Byzantine Generals Problem, explaining its relevance to distributed consensus, outlining four foundational theories and eight protocols, and demonstrating how voting, message tampering, and signature mechanisms affect agreement among nodes.

Byzantine Fault ToleranceDistributed SystemsThree Kingdoms
0 likes · 14 min read
Byzantine Generals Problem Illustrated with Three Kingdoms Card Game
New Oriental Technology
New Oriental Technology
Dec 7, 2020 · Fundamentals

Efficient Circuit Connection Modeling with a Circular Doubly Linked List

The article compares an adjacency‑list approach and a circular doubly linked list for representing circuit connections, showing that the linked‑list method achieves O(1) connect/disconnect operations with linear space, making it the most efficient and simple solution for graph‑based circuit modeling.

Data Structuresalgorithmcircuit modeling
0 likes · 4 min read
Efficient Circuit Connection Modeling with a Circular Doubly Linked List
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Nov 23, 2020 · Fundamentals

Understanding Recursion: Concepts, Complexity Analysis, and Practical Examples

This article introduces recursion, explains its core principles, presents a general problem‑solving approach, and walks through multiple practical examples—from factorial and climbing stairs to binary tree inversion and the Tower of Hanoi—while analyzing time and space complexities and offering optimization techniques.

Recursionalgorithmdivide and conquer
0 likes · 23 min read
Understanding Recursion: Concepts, Complexity Analysis, and Practical Examples
DataFunTalk
DataFunTalk
Nov 11, 2020 · Artificial Intelligence

Cold-Start Optimization for Feed Ads: Algorithm Design and Experimental Evaluation

In this live talk, Dr. Zhang Renyu, an assistant professor at NYU Shanghai and economist at Kuaishou, presents his research on optimizing cold-start problems in feed advertising using a novel Shadow Bidding with Learning (SBL) algorithm, detailing its design, implementation, and experimental results.

Advertisingalgorithmcold-start
0 likes · 4 min read
Cold-Start Optimization for Feed Ads: Algorithm Design and Experimental Evaluation
Hulu Beijing
Hulu Beijing
Nov 10, 2020 · Artificial Intelligence

Hulu’s AI Secrets: Binge Ad Prediction and Real‑Time Allocation

On November 7, 2020, Hulu’s Shulei presented how the company’s video advertising platform employs AI-driven algorithms—including binge‑watch prediction, inventory forecasting with Prophet, and a PID‑controller based real‑time allocation system—to enhance targeting, optimize revenue, and improve user experience.

AIAdvertisingPrediction
0 likes · 7 min read
Hulu’s AI Secrets: Binge Ad Prediction and Real‑Time Allocation
Architecture Digest
Architecture Digest
Oct 23, 2020 · Fundamentals

Understanding Consistency Algorithms: Paxos, Raft, ZAB, and Gossip

This article explains why data consistency is essential in distributed systems, defines consistency, compares strong and eventual consistency, and details the design and operation of major algorithms such as Paxos, Multi‑Paxos, Raft, ZAB, and Gossip with illustrative examples and diagrams.

Consistencyalgorithmdistributed-systems
0 likes · 11 min read
Understanding Consistency Algorithms: Paxos, Raft, ZAB, and Gossip
JD Retail Technology
JD Retail Technology
Oct 16, 2020 · Industry Insights

How JD’s PLUS Membership Used Data and Algorithms to Drive Growth

This article examines JD.com’s transition from traffic‑driven acquisition to a data‑centric, algorithm‑powered membership model, detailing the construction of a robust data foundation, multi‑level analysis methods, productized dashboards, and growth‑hacking experiments that boosted PLUS member retention and revenue.

Growth Hackingalgorithmaugmented analytics
0 likes · 24 min read
How JD’s PLUS Membership Used Data and Algorithms to Drive Growth
MaGe Linux Operations
MaGe Linux Operations
Oct 14, 2020 · Fundamentals

How to Remove Duplicates In-Place From a Sorted Array in Python

This article explains how to remove duplicates from a sorted array in‑place using Python, detailing the problem constraints, providing two illustrative examples, outlining a simple iteration‑based solution approach, and presenting a complete code implementation that operates with O(1) extra space.

Arrayalgorithmduplicate removal
0 likes · 3 min read
How to Remove Duplicates In-Place From a Sorted Array in Python
Hulu Beijing
Hulu Beijing
Sep 11, 2020 · Fundamentals

Crack Hulu’s 2020 Campus Coding Test: 4 Algorithm Challenges Explained

This article walks you through Hulu's 2021 campus recruitment update, explains the online programming test schedule and format, shares interview tips, and provides detailed statements, sample I/O, and solution analyses for four algorithmic problems covering probability, array maxima, maze navigation, and segment‑tree optimization.

Data Structuresalgorithmcoding interview
0 likes · 15 min read
Crack Hulu’s 2020 Campus Coding Test: 4 Algorithm Challenges Explained
Xianyu Technology
Xianyu Technology
Sep 9, 2020 · Backend Development

Xianyu Product Attribute Completion Strategy

Xianyu’s new attribute completion system combines MetaQ messaging, AI image recognition, and offline option configuration to auto‑populate key product details, incentivize sellers, and iteratively refine attributes via sales metrics, boosting structured coverage by 30%, cutting verification time 70%, and raising UV‑CTR around three percent.

BackendXianyualgorithm
0 likes · 7 min read
Xianyu Product Attribute Completion Strategy
IT Architects Alliance
IT Architects Alliance
Aug 30, 2020 · Industry Insights

Will TikTok’s Core Algorithm Face Export Bans? China’s New Tech Export Controls Explained

China’s latest revision of its technology export control catalogue adds data‑driven personalized push technology, potentially barring TikTok’s core algorithm from export, and experts advise firms like ByteDance to pause negotiations and complete licensing procedures amid heightened regulatory scrutiny.

ChinaExport controlsTechnology Trade
0 likes · 4 min read
Will TikTok’s Core Algorithm Face Export Bans? China’s New Tech Export Controls Explained
Youku Technology
Youku Technology
Jul 30, 2020 · Artificial Intelligence

Key Technologies for Entertainment Content Flow Management: Multi-Task Guarantee Optimization Algorithm Practice

The presentation explains how a multi‑task guarantee optimization algorithm—illustrated with Youku’s new hot series—builds an exposure‑sensitivity model to allocate limited video‑placement resources across homepage and channel slots, overcoming manual rule limitations and simultaneously maximizing play counts while satisfying diverse scenario and content objectives.

Content OptimizationKDD2020algorithm
0 likes · 2 min read
Key Technologies for Entertainment Content Flow Management: Multi-Task Guarantee Optimization Algorithm Practice
21CTO
21CTO
Jul 11, 2020 · Fundamentals

What Really Happens in a Google Engineer Interview? A Firsthand Six‑Round Journey

The author shares a detailed, six‑round Google China engineering interview experience—including personal background, each interview stage from recruiter prescreen to onsite sessions, typical coding and algorithm questions, system‑design challenges, and practical tips for preparation and follow‑up.

Google interviewalgorithmcoding interview
0 likes · 11 min read
What Really Happens in a Google Engineer Interview? A Firsthand Six‑Round Journey
DataFunTalk
DataFunTalk
Jul 2, 2020 · Product Management

Strategies for Expanding User Circles and Content Matching in Short‑Video Platforms

This article examines how short‑video platforms can expand into new user circles by leveraging external trend data, competitive analysis, KOL resources, precise content matching, and data‑driven product strategies to acquire, retain, and reactivate users while balancing growth and platform health.

KOLalgorithmcontent strategy
0 likes · 14 min read
Strategies for Expanding User Circles and Content Matching in Short‑Video Platforms
Alibaba Cloud Developer
Alibaba Cloud Developer
Jun 24, 2020 · Backend Development

Choosing the Right Rate‑Limiting Algorithm: Simple Window, Sliding Window, Leaky Bucket, Token Bucket & Sliding Log

This article explains the purpose of flow control, compares various rate‑limiting algorithms—including simple window, sliding window, leaky bucket, token bucket, and sliding log—provides Java interface definitions and code examples, discusses their complexity, precision, smoothness, and suitability for single‑machine and distributed scenarios, and offers practical deployment tips using Sentinel, Nginx, Guava, Tair, and Redis.

Distributed Systemsalgorithmjava
0 likes · 31 min read
Choosing the Right Rate‑Limiting Algorithm: Simple Window, Sliding Window, Leaky Bucket, Token Bucket & Sliding Log
Programmer DD
Programmer DD
Jun 22, 2020 · Operations

Mastering Load Balancing: Types, Tools, and Algorithms Explained

This article explains what load balancing is, why it is essential for scaling web services, outlines the four OSI‑layer classifications, compares popular software balancers such as LVS, Nginx and HAProxy, and reviews common static and dynamic load‑balancing algorithms with their advantages and use cases.

HAProxyLVSalgorithm
0 likes · 17 min read
Mastering Load Balancing: Types, Tools, and Algorithms Explained
360 Tech Engineering
360 Tech Engineering
Jun 16, 2020 · Fundamentals

Delaunay Triangulation: Definition, Properties, and Divide‑and‑Conquer Algorithm Implementation in TypeScript

This article explains the Delaunay triangulation concept, its geometric properties such as empty circumcircles and maximal minimum angles, and presents a detailed divide‑and‑conquer algorithm with step‑by‑step merging logic and a complete TypeScript code implementation.

Computational GeometryDelaunay triangulationTypeScript
0 likes · 10 min read
Delaunay Triangulation: Definition, Properties, and Divide‑and‑Conquer Algorithm Implementation in TypeScript
Alibaba Cloud Developer
Alibaba Cloud Developer
Jun 11, 2020 · Artificial Intelligence

How to Maximize Video Views with a Multi‑Objective Exposure Optimization Model

This article presents a data‑driven approach for allocating limited video exposure resources by building a PV‑click‑CTR (P2C) sensitivity model and a multi‑objective optimization framework that balances overall view volume and fairness across scenes, validated through offline metrics and online bucket tests.

Big Dataalgorithmexposure optimization
0 likes · 9 min read
How to Maximize Video Views with a Multi‑Objective Exposure Optimization Model
Python Programming Learning Circle
Python Programming Learning Circle
Jun 10, 2020 · Fundamentals

Interview Coding Questions: List Index Extraction, Tree Path Construction, and Minimum Path Sum Solutions

The article recounts three technical interview problems—a list‑index extraction using a hash map, a tree‑path reconstruction from parent identifiers, and a minimum‑path‑sum dynamic‑programming challenge—providing Python code solutions and brief explanations for each.

Pythonalgorithmdynamic programming
0 likes · 5 min read
Interview Coding Questions: List Index Extraction, Tree Path Construction, and Minimum Path Sum Solutions
DataFunTalk
DataFunTalk
May 31, 2020 · Big Data

Adaptive Grouping Method for Improving AB Test Allocation Uniformity in Didi's Experiment Platform

This article introduces Didi's adaptive grouping algorithm, which enhances the uniformity of user allocation in AB experiments by replacing traditional complete randomization with a single-pass method that balances observed metrics across groups, and demonstrates its effectiveness through large‑scale experimental results.

AB testingData-drivenDidi
0 likes · 11 min read
Adaptive Grouping Method for Improving AB Test Allocation Uniformity in Didi's Experiment Platform
Didi Tech
Didi Tech
May 28, 2020 · Artificial Intelligence

Adaptive Grouping Method for AB Testing in Didi’s Experiment Platform

Didi’s AI Lab introduces an Adaptive grouping algorithm for its Apollo AB‑testing platform that allocates users in a single pass using direct and indirect scores, achieving over 95 % balance probability and reducing group imbalance from 14 % (CR) and 2.7 % (RR) to under 0.8 %.

AB testingData-drivenadaptive grouping
0 likes · 11 min read
Adaptive Grouping Method for AB Testing in Didi’s Experiment Platform
Python Programming Learning Circle
Python Programming Learning Circle
May 27, 2020 · Fundamentals

Solving the 24‑Point Game with Python: Two Algorithmic Approaches

This article explains how to determine whether any four playing cards can be combined using addition, subtraction, multiplication, and division (with parentheses) to reach 24, presenting two Python implementations—an exhaustive enumeration method and a more efficient recursive combination technique—along with performance comparisons.

24-point gameEnumerationRecursive
0 likes · 8 min read
Solving the 24‑Point Game with Python: Two Algorithmic Approaches
Python Programming Learning Circle
Python Programming Learning Circle
May 9, 2020 · Fundamentals

Fish Division Puzzle and Classic Sorting Algorithms (Merge, Selection, Bubble) with Python Implementations

This article presents a combinatorial fish‑division puzzle solved by exhaustive search with Python code, followed by clear explanations and Python implementations of three fundamental sorting algorithms—merge sort, selection sort, and bubble sort—illustrating their core ideas and step‑by‑step processes.

PythonSortingalgorithm
0 likes · 5 min read
Fish Division Puzzle and Classic Sorting Algorithms (Merge, Selection, Bubble) with Python Implementations
Python Programming Learning Circle
Python Programming Learning Circle
May 6, 2020 · Fundamentals

Python Performance Testing: Comparing Logical Operations, Built‑in Functions, and Class Implementations

This article examines Python execution speed by benchmarking simple arithmetic, logical checks, built‑in functions like max, and three class‑based point‑in‑rectangle implementations, revealing that straightforward if‑statements are often fastest while highlighting practical tips for writing performant Python code.

BenchmarkingCode OptimizationPython
0 likes · 12 min read
Python Performance Testing: Comparing Logical Operations, Built‑in Functions, and Class Implementations
Laravel Tech Community
Laravel Tech Community
May 3, 2020 · Backend Development

PHP Implementation of WeChat Red Packet Splitting Algorithm

This article demonstrates a PHP class that implements the WeChat red packet splitting algorithm, explaining the constraints, providing a complete source code example, and showing how to instantiate the class to distribute a total amount into a specified number of packets with a minimum value.

BackendMoney SplittingPHP
0 likes · 6 min read
PHP Implementation of WeChat Red Packet Splitting Algorithm
Java Architecture Diary
Java Architecture Diary
May 2, 2020 · Backend Development

Mastering Snowflake: How Distributed Systems Generate Unique IDs

This article explores various distributed ID generation methods, focusing on Twitter's Snowflake algorithm, detailing its structure, advantages, drawbacks, and comparisons with UUID, database auto-increment, and Redis, while providing implementation insights and references to related open-source solutions.

algorithmdistributed-idsnowflake
0 likes · 7 min read
Mastering Snowflake: How Distributed Systems Generate Unique IDs
vivo Internet Technology
vivo Internet Technology
Apr 22, 2020 · Fundamentals

Hash Table Collisions and Resolution Strategies

The article explains how limited hash spaces cause collisions, then compares open hashing (separate chaining) and closed hashing techniques—linear probing, double hashing, and random hashing—detailing their insertion, search, and deletion algorithms along with the performance trade‑offs and load‑factor analysis for each method.

algorithmcollision-resolutiondouble hashing
0 likes · 16 min read
Hash Table Collisions and Resolution Strategies
Python Programming Learning Circle
Python Programming Learning Circle
Apr 22, 2020 · Fundamentals

Implementing a Priority Queue in Python Using heapq

This article explains how to implement a priority queue in Python using the built‑in heapq module, demonstrates extracting smallest and largest elements from price lists, and provides a full PriorityQueue class with push, pop, and is_empty methods, illustrated with stock portfolio examples.

Pythonalgorithmheapq
0 likes · 6 min read
Implementing a Priority Queue in Python Using heapq
Sohu Tech Products
Sohu Tech Products
Apr 15, 2020 · Fundamentals

Optimized String Matching: Boyer‑Moore Algorithm with Bad‑Character and Good‑Suffix Rules

This article explains the Boyer‑Moore string‑matching algorithm, detailing how the bad‑character and good‑suffix heuristics dramatically reduce comparisons, and provides a complete Java implementation with step‑by‑step illustrations of each matching round and the underlying shift calculations.

Boyer-Moorealgorithmbad character rule
0 likes · 6 min read
Optimized String Matching: Boyer‑Moore Algorithm with Bad‑Character and Good‑Suffix Rules
Liangxu Linux
Liangxu Linux
Apr 14, 2020 · Fundamentals

Unlock Algorithm Mastery with the ‘Fucking Algorithm’ GitHub Repository

This article introduces the open‑source “Fucking Algorithm” project, a popular GitHub collection of over 60 LeetCode‑based articles that explain algorithm problems with detailed reasoning, aiming to improve developers' problem‑solving mindset and algorithmic thinking.

LeetCodealgorithmalgorithmic thinking
0 likes · 3 min read
Unlock Algorithm Mastery with the ‘Fucking Algorithm’ GitHub Repository
Sohu Tech Products
Sohu Tech Products
Apr 8, 2020 · Fundamentals

Brute‑Force and Simple Hash‑Based Substring Search (Rabin‑Karp) Explained with Examples

This article explains the brute‑force (BF) substring search algorithm, demonstrates its step‑by‑step operation with examples, then introduces a simple hash‑based sliding‑window method (a basic Rabin‑Karp approach), provides Java code, and shows how to compute and update hashes efficiently to locate a pattern in a main string.

HashRabin-Karpalgorithm
0 likes · 7 min read
Brute‑Force and Simple Hash‑Based Substring Search (Rabin‑Karp) Explained with Examples
JD Tech Talk
JD Tech Talk
Apr 8, 2020 · Artificial Intelligence

Designing and Evaluating Recommendation Algorithms for Wealth Management Platforms

This article explores how large wealth‑management platforms can model product recommendation as a mapping between customers and financial products, defines various evaluation goals such as transaction volume, revenue and user satisfaction, and outlines a systematic A/B‑testing workflow for comparing and optimizing recommendation algorithms.

A/B testingMetricsalgorithm
0 likes · 10 min read
Designing and Evaluating Recommendation Algorithms for Wealth Management Platforms
Youku Technology
Youku Technology
Apr 3, 2020 · Industry Insights

How Youku Scaled Millions of DAU with DSP‑Driven RTB Advertising Algorithms

This article explains how Youku combined user‑growth objectives with real‑time bidding (RTB) advertising, designing and optimizing DSP algorithms to maximize high‑value daily active users under cost constraints, covering business background, RTB mechanics, ranking models, pricing strategies, engineering pipelines, and future directions.

AdvertisingDSPRTB
0 likes · 13 min read
How Youku Scaled Millions of DAU with DSP‑Driven RTB Advertising Algorithms
Sohu Tech Products
Sohu Tech Products
Apr 1, 2020 · Fundamentals

Bitwise Operations: Techniques and Applications in Algorithmic Problems

This article introduces the basics of bitwise operations, common operators, practical tricks such as checking parity, setting or clearing bits, and demonstrates their use in solving classic algorithmic challenges like the poison bottle puzzle, power‑of‑two detection, counting set bits, and the 8‑Queens problem.

algorithmbit manipulationbitwise
0 likes · 17 min read
Bitwise Operations: Techniques and Applications in Algorithmic Problems
DataFunTalk
DataFunTalk
Mar 31, 2020 · Product Management

Building User Profiles: From Zero to One and Scaling to Hundreds

This article explains the concept of user profiling, outlines an eight‑dimensional tag architecture, describes step‑by‑step methods for constructing a robust profile system from scratch and expanding it, and shows how these profiles support statistical analysis, targeted marketing, and recommendation algorithms.

Data ProductMarketingTagging
0 likes · 18 min read
Building User Profiles: From Zero to One and Scaling to Hundreds
Sohu Tech Products
Sohu Tech Products
Mar 25, 2020 · Fundamentals

Understanding Brute‑Force, Boyer‑Moore, and KMP String‑Matching Algorithms with Java Code

This article explains the Brute‑Force (BF), Boyer‑Moore (BM), and Knuth‑Morris‑Pratt (KMP) string‑matching algorithms, illustrates their operation with step‑by‑step visual examples, discusses the inefficiencies of BF, the shift rules of BM, and the prefix‑suffix logic of KMP, and provides a complete Java implementation including the construction of the next array.

Boyer-MooreKMPNext array
0 likes · 10 min read
Understanding Brute‑Force, Boyer‑Moore, and KMP String‑Matching Algorithms with Java Code
MaGe Linux Operations
MaGe Linux Operations
Mar 23, 2020 · Fundamentals

How to Reverse a Number into a List Using Recursion in Python

This article explains how to transform a number like 1234 into a reversed list of its digits using both a straightforward string method and two recursive implementations—standard and tail recursion—while noting Python's general preference for iterative solutions.

ListRecursionalgorithm
0 likes · 2 min read
How to Reverse a Number into a List Using Recursion in Python
Xianyu Technology
Xianyu Technology
Mar 12, 2020 · R&D Management

Kunpeng Advertising System Architecture and Operational Design for Xianyu

Kunpeng, a three‑level advertising framework for Xianyu, unifies activity‑scene‑material abstraction, extensible DataFetcher and modular filter libraries, and a global traffic‑mixing algorithm, enabling business groups to self‑service material delivery, achieve 60‑100% conversion gains, cut UV cost by ~40% and halve time‑to‑market.

AdvertisingR&D managementSystem Architecture
0 likes · 11 min read
Kunpeng Advertising System Architecture and Operational Design for Xianyu
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Feb 21, 2020 · Fundamentals

Longest Substring Without Repeating Characters – Sliding Window Analysis and Optimizations

This article explains the sliding‑window technique for solving the classic “Longest Substring Without Repeating Characters” problem, presents step‑by‑step analysis, demonstrates three Java implementations—from a basic set‑based method to hashmap and array optimizations—and discusses their time‑complexity improvements.

Sliding WindowStringalgorithm
0 likes · 8 min read
Longest Substring Without Repeating Characters – Sliding Window Analysis and Optimizations
Python Programming Learning Circle
Python Programming Learning Circle
Feb 20, 2020 · Fundamentals

Binary Search Algorithm Explanation

This article explains the binary search algorithm for locating a target element in a sorted array, describing its midpoint‑starting process, halving of the search range, termination conditions, and includes a simple example with its output.

Binary Searchalgorithmfundamentals
0 likes · 3 min read
Binary Search Algorithm Explanation
Youku Technology
Youku Technology
Feb 13, 2020 · Artificial Intelligence

AI-Based Follow-Subtitle (Bullet) System for Video Streaming

The article presents an AI‑driven follow‑subtitle system for video streaming that uses server‑side face detection and tracking to attach speech‑bubble bullets to characters, synchronizing trajectories with playback via a client SDK, while addressing cut‑scene handling, latency, and power constraints.

AIReal-time Processingalgorithm
0 likes · 8 min read
AI-Based Follow-Subtitle (Bullet) System for Video Streaming
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2020 · Fundamentals

Binary Search Tree (BST) Overview, Implementation, and Traversal in C

This article introduces the concept of trees and binary search trees, defines a C struct for tree nodes, and provides complete implementations for creating nodes, inserting, deleting, searching, finding min/max, computing size and height, as well as recursive and non‑recursive traversals including pre‑order, in‑order, post‑order and level‑order.

Binary Search TreeData Structuresalgorithm
0 likes · 13 min read
Binary Search Tree (BST) Overview, Implementation, and Traversal in C
JavaEdge
JavaEdge
Jan 7, 2020 · Fundamentals

How to Generate All Permutations with Backtracking: A Step‑by‑Step Guide

This article explains how to enumerate every permutation of an array using a depth‑first search backtracking algorithm, illustrates the process with a tree diagram, compares DFS with BFS, and provides a complete C implementation along with a generic Python template.

BacktrackingDFSRecursion
0 likes · 7 min read
How to Generate All Permutations with Backtracking: A Step‑by‑Step Guide