Tagged articles
619 articles
Page 6 of 7
JavaEdge
JavaEdge
Jan 2, 2020 · Fundamentals

How to Compute the Maximum Path Sum in a Binary Tree (C Solution)

This article explains the binary‑tree maximum path sum problem, provides example inputs and outputs, analyzes three possible path configurations, and presents both a brute‑force and an optimized depth‑first search implementation in C.

DFSalgorithmbinary tree
0 likes · 5 min read
How to Compute the Maximum Path Sum in a Binary Tree (C Solution)
360 Tech Engineering
360 Tech Engineering
Dec 16, 2019 · Information Security

Understanding Random Number Generation for Lottery Programs and Cryptographic Security in JavaScript

This article explains the differences between true and pseudo‑random numbers, why JavaScript's Math.random is unsuitable for secure lottery draws, and how to use the Web Crypto API's Crypto.getRandomValues with a provided code example to achieve cryptographically strong randomness.

Crypto.getRandomValuesMath.randomalgorithm
0 likes · 8 min read
Understanding Random Number Generation for Lottery Programs and Cryptographic Security in JavaScript
58 Tech
58 Tech
Nov 29, 2019 · Big Data

Application of Big Data and Algorithms in the Real‑Estate Internet

The talk presented at the Shanghai Computer Society Annual Meeting details how big data and algorithms are leveraged in the real‑estate internet sector to enhance user personalization, improve agent matching, and assess video quality, illustrating practical implementations and performance gains across data collection, modeling, and recommendation pipelines.

AIBig DataReal Estate
0 likes · 10 min read
Application of Big Data and Algorithms in the Real‑Estate Internet
Youzan Coder
Youzan Coder
Nov 15, 2019 · Fundamentals

Functions as Data Transformations: Recursion, Tail Calls, and Efficient Exponentiation & Fibonacci Implementations

The article treats functions as pure data‑to‑data mappings and demonstrates how common mathematical operations such as factorial, exponentiation, and Fibonacci can be expressed in TypeScript/JavaScript using recursive, tail‑recursive, iterative, and logarithmic‑time algorithms that illustrate functional transformation techniques and efficient algorithm design.

FibonacciRecursionalgorithm
0 likes · 8 min read
Functions as Data Transformations: Recursion, Tail Calls, and Efficient Exponentiation & Fibonacci Implementations
Efficient Ops
Efficient Ops
Nov 6, 2019 · Operations

Mastering Load Balancing: Types, Architectures, and Algorithms Explained

This article explains why a single server eventually hits a performance ceiling, introduces high‑performance clustering and the role of load balancers, compares DNS, hardware, and software load‑balancing solutions, outlines typical multi‑layer architectures, and reviews common load‑balancing algorithms with their pros and cons.

algorithmhigh availabilityload balancing
0 likes · 18 min read
Mastering Load Balancing: Types, Architectures, and Algorithms Explained
21CTO
21CTO
Sep 28, 2019 · Backend Development

What I Learned From a Tough ByteDance Backend Interview: Nginx, Redis, and More

A candid recount of a ByteDance backend interview reveals how superficial preparation, gaps in Nginx, uWSGI, Redis, and data‑structure knowledge, and nervousness can derail even experienced developers, while offering concrete advice on early preparation, resume framing, and tackling tough technical questions.

BackendNginxalgorithm
0 likes · 12 min read
What I Learned From a Tough ByteDance Backend Interview: Nginx, Redis, and More
ITPUB
ITPUB
Sep 17, 2019 · Fundamentals

How a General Deadlock Prediction Algorithm Enhances Linux Lockdep for Read‑Write Locks

This article explains the challenges of deadlock detection in Linux kernel lockdep, especially with read‑write locks, and presents a formally proven general deadlock prediction algorithm that models lock dependencies using a two‑thread abstraction, lemmas, and lock‑type promotion to reliably predict potential deadlocks.

Lockdepalgorithmconcurrency
0 likes · 17 min read
How a General Deadlock Prediction Algorithm Enhances Linux Lockdep for Read‑Write Locks
FunTester
FunTester
Sep 16, 2019 · Fundamentals

Finding Twin Primes Using Recursive Filtering in Java

The article explains how to generate prime numbers with a recursive filtering method, identify twin primes below 10,000, and includes Java implementations of bubble sort and insertion sort, along with a brief commentary on Groovy's advantages and a curated list of related technical articles.

Prime NumbersRecursionSorting
0 likes · 5 min read
Finding Twin Primes Using Recursive Filtering in Java
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Sep 11, 2019 · Fundamentals

Common Algorithm Tricks: Bit Manipulation, Two‑Pointer Techniques, and XOR Applications

This article reviews several practical algorithm tricks—including using n&(n‑1) to clear the lowest set bit, counting bits, converting numbers, applying double‑pointer methods to linked lists and sorted arrays, and leveraging XOR properties—to simplify typical interview coding problems.

algorithmbit manipulationtwo pointers
0 likes · 9 min read
Common Algorithm Tricks: Bit Manipulation, Two‑Pointer Techniques, and XOR Applications
MaGe Linux Operations
MaGe Linux Operations
Sep 1, 2019 · Fundamentals

10 Must‑Know Hand‑Coding Interview Algorithms Every Developer Should Master

This article presents the ten most frequently asked hand‑coding interview problems—quick sort, binary search, climbing stairs, two‑sum, max drawdown, merging sorted arrays, maximum subarray, longest non‑repeating substring, permutations, and three‑sum—each with clear Python implementations, difficulty ratings, occurrence probabilities, and sample outputs to boost your interview success.

Pythonalgorithmcoding interview
0 likes · 13 min read
10 Must‑Know Hand‑Coding Interview Algorithms Every Developer Should Master
FunTester
FunTester
Aug 26, 2019 · Fundamentals

How to Check If a Binary Tree Is Symmetric in O(n) Time

This article explains the symmetric‑tree problem, outlines a depth‑first recursive strategy with base‑case checks, demonstrates short‑circuit evaluation, analyzes time complexity, and provides a complete Java implementation that determines tree symmetry in linear time.

DFSRecursionalgorithm
0 likes · 3 min read
How to Check If a Binary Tree Is Symmetric in O(n) Time
Java Captain
Java Captain
Aug 13, 2019 · Fundamentals

Reversing a Singly Linked List in K‑Node Groups Starting from the Tail

The article explains how to solve a variant of the linked‑list reversal problem where every K nodes are reversed as a group starting from the tail, using recursion and double reversal techniques, and provides complete Java implementations for the algorithm.

Recursionalgorithmk-group reversal
0 likes · 7 min read
Reversing a Singly Linked List in K‑Node Groups Starting from the Tail
Programmer DD
Programmer DD
Jul 27, 2019 · Fundamentals

Master Red-Black Trees: Visual Guide to Balancing Binary Search Trees

This article offers a clear, visual introduction to red‑black trees, covering binary search tree fundamentals, the four balancing rules, insertion cases with recolor and rotation steps, and step‑by‑step animated examples, helping readers grasp and remember the concepts through images and analogies.

BalancingBinary Search TreeData Structures
0 likes · 10 min read
Master Red-Black Trees: Visual Guide to Balancing Binary Search Trees
GF Securities FinTech
GF Securities FinTech
Jul 25, 2019 · Backend Development

How Nginx’s Smooth Weighted Round‑Robin Load Balancing Works

This article explains Nginx's five load‑balancing methods, focusing on the weighted round‑robin algorithm, its basic and smooth variants, provides code examples, step‑by‑step execution, and a mathematical proof of why the smooth version distributes traffic fairly according to server weights.

NginxWeighted Round Robinalgorithm
0 likes · 8 min read
How Nginx’s Smooth Weighted Round‑Robin Load Balancing Works
Programmer DD
Programmer DD
Jul 24, 2019 · Fundamentals

Master Dynamic Programming: From Fibonacci to Knapsack, Levenshtein & LCS in Java

This comprehensive guide explains dynamic programming fundamentals, contrasts it with greedy recursion, and walks through Java implementations for Fibonacci, rod‑cutting, simplified and traditional knapsack, Levenshtein edit distance, and longest common subsequence, highlighting performance gains and reconstruction techniques.

LCSalgorithmdynamic programming
0 likes · 26 min read
Master Dynamic Programming: From Fibonacci to Knapsack, Levenshtein & LCS in Java
Big Data Technology & Architecture
Big Data Technology & Architecture
Jul 12, 2019 · Backend Development

Improving Nginx Load Balancing with the Virtual Node Smooth Weighted Round‑Robin (VNSWRR) Algorithm in Tengine

This article analyzes the shortcomings of Nginx's native Smooth Weighted Round‑Robin (SWRR) algorithm in large‑scale application gateway scenarios, presents a real‑world case where weight adjustments cause traffic spikes, and introduces the VNSWRR algorithm that achieves O(1) selection time, smoother weight handling, and up to 60% higher QPS performance.

BackendVNSWRRalgorithm
0 likes · 17 min read
Improving Nginx Load Balancing with the Virtual Node Smooth Weighted Round‑Robin (VNSWRR) Algorithm in Tengine
DataFunTalk
DataFunTalk
Jun 13, 2019 · Artificial Intelligence

What Makes a Good Recommendation System?

This article explores the multifaceted criteria for evaluating a good recommendation system, covering macro and micro perspectives, product domain considerations, information retrieval, algorithmic accuracy, user experience, and business impact, and outlines a systematic iteration process for continuous improvement.

AIEvaluation MetricsUser experience
0 likes · 13 min read
What Makes a Good Recommendation System?
Architect's Tech Stack
Architect's Tech Stack
Jun 9, 2019 · Backend Development

Rate Limiting Strategies and Considerations for Microservices

This article reviews why rate limiting is crucial in microservice architectures, outlines common limiting techniques such as semaphore counting, thread‑pool isolation, fixed and sliding windows, token‑bucket and leaky‑bucket algorithms, and discusses practical considerations like clock sync, SDK vs. server enforcement, and accuracy‑latency trade‑offs.

Backendalgorithmtraffic control
0 likes · 13 min read
Rate Limiting Strategies and Considerations for Microservices
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 5, 2019 · Fundamentals

Understanding Paxos: A Beginner’s 30‑Minute Guide with Real‑World Analogy

This article explains the Paxos consensus algorithm in plain terms, using a relatable travel‑planning analogy to illustrate how proposers, acceptors, and majority voting achieve fault‑tolerant agreement in distributed systems, and connects the concept to real‑world implementations like Google’s Chubby and ZooKeeper.

Distributed SystemsPaxosalgorithm
0 likes · 13 min read
Understanding Paxos: A Beginner’s 30‑Minute Guide with Real‑World Analogy
Java Captain
Java Captain
May 28, 2019 · Fundamentals

Five Classic Bitwise Operation Techniques in Java

This article introduces five classic bitwise operation examples in Java—including checking odd/even, swapping variables without a temporary, finding a unique number, fast exponentiation, and determining the greatest power of two not exceeding N—explaining the underlying binary logic, code implementations, and their efficiency advantages.

Binaryalgorithmbitwise
0 likes · 10 min read
Five Classic Bitwise Operation Techniques in Java
Tencent Cloud Developer
Tencent Cloud Developer
May 23, 2019 · Backend Development

Rate Limiting in Microservices: Why It’s Needed and Common Techniques

Rate limiting is essential for microservice resilience, preventing overloads and protecting business continuity, and can be implemented through various methods such as semaphores, thread‑pool isolation, fixed or sliding windows (using Redis ZSets or local memory), token‑bucket/leaky‑bucket algorithms, each with trade‑offs in accuracy, performance, clock synchronization, and deployment location.

Microservicesalgorithmrate limiting
0 likes · 16 min read
Rate Limiting in Microservices: Why It’s Needed and Common Techniques
Java Captain
Java Captain
Apr 25, 2019 · Fundamentals

Effective Strategies for Algorithm Practice and Problem Solving

This article shares practical, step‑by‑step techniques for improving algorithm problem‑solving skills, emphasizing gradual difficulty progression, categorizing problems by data structure, a three‑stage solving process, and the importance of abstraction and sustained motivation for effective LeetCode practice.

LeetCodealgorithmcoding interview
0 likes · 9 min read
Effective Strategies for Algorithm Practice and Problem Solving
Java Captain
Java Captain
Apr 21, 2019 · Fundamentals

Binary Search and Its Variants in Java

This article explains the classic binary search algorithm, presents a Java implementation, and details multiple binary‑search variants—including finding first/last equal elements, elements less than or greater than a key—while providing clear code examples and guidance on boundary handling.

Binary Searchalgorithmcoding interview
0 likes · 9 min read
Binary Search and Its Variants in Java
Java Captain
Java Captain
Mar 22, 2019 · Fundamentals

Understanding Recursion: Three Essential Elements and Practical Code Examples

This article introduces recursion by outlining its three essential elements—function purpose, base case, and recurrence relation—and demonstrates each step with clear Java/C examples such as factorial, Fibonacci, frog‑jump, and linked‑list reversal, while also covering common pitfalls and optimization techniques.

Data StructuresRecursionalgorithm
0 likes · 15 min read
Understanding Recursion: Three Essential Elements and Practical Code Examples
Architects' Tech Alliance
Architects' Tech Alliance
Mar 12, 2019 · Operations

Load Balancing: Concepts, Types, Strategies, and Algorithms

This article explains the fundamentals of load balancing, covering its definition, benefits, various types such as server, firewall, and link load balancing, hardware vs software solutions, local and global strategies, and common algorithms like round robin, weighted, least connections, and DNS‑based methods.

algorithmcloud
0 likes · 13 min read
Load Balancing: Concepts, Types, Strategies, and Algorithms
58 Tech
58 Tech
Mar 7, 2019 · Big Data

In-Memory Inverted Index Compression Algorithms: Overview and MILC Optimization for High‑Performance Search

This article reviews major in‑memory inverted index compression techniques such as PForDelta, PEF, and MILC, explains their principles and trade‑offs, and details practical optimizations applied at 58.com to achieve query performance comparable to uncompressed indexes while reducing memory usage by about 35 percent.

Big DataMILCalgorithm
0 likes · 17 min read
In-Memory Inverted Index Compression Algorithms: Overview and MILC Optimization for High‑Performance Search
Architect's Tech Stack
Architect's Tech Stack
Mar 1, 2019 · Fundamentals

Understanding Arrays: Random Access, Insertion, Deletion, and Efficiency

This article explains what arrays are, how they enable O(1) random access through address calculation, the time‑complexities of insertion and deletion operations, techniques for improving array efficiency, and why zero‑based indexing is used, comparing arrays with dynamic containers like ArrayList.

ArrayData StructureDeletion
0 likes · 6 min read
Understanding Arrays: Random Access, Insertion, Deletion, and Efficiency
DataFunTalk
DataFunTalk
Jan 18, 2019 · Artificial Intelligence

Efficiency Optimization Practices for 58.com Search Ranking

This article presents a comprehensive overview of 58.com’s search efficiency optimization, detailing the business background, ranking framework, data, algorithm, and engineering components, describing the three-stage ranking process, strategy and platform optimizations, feature engineering, model upgrades, and the resulting performance improvements.

algorithmefficiency optimizationmachine learning
0 likes · 12 min read
Efficiency Optimization Practices for 58.com Search Ranking
Programmer DD
Programmer DD
Jan 9, 2019 · Fundamentals

How to Find the Peak in a Bitonic Array Using Binary Search

This article presents a JavaScript solution for locating the maximum element in a bitonic (first increasing then decreasing) array, explaining that the problem is a variant of binary search and providing a complete implementation using a binary‑search‑based algorithm.

Binary SearchJavaScriptalgorithm
0 likes · 3 min read
How to Find the Peak in a Bitonic Array Using Binary Search
Programmer DD
Programmer DD
Jan 4, 2019 · Fundamentals

How to Build an O(log n) Priority Queue with a Binary Heap in JavaScript

This article explains the concept of a priority queue, presents a interview‑style problem requiring O(log n) enqueue and dequeue operations, and shows how to implement the solution efficiently using a binary heap with detailed step‑by‑step illustrations and a complete JavaScript code example.

Data StructuresO(log n)algorithm
0 likes · 8 min read
How to Build an O(log n) Priority Queue with a Binary Heap in JavaScript
Java Captain
Java Captain
Dec 25, 2018 · Fundamentals

Common Algorithmic Techniques: Array Indexing, Modulo, Two‑Pointer, Bit‑Shift, Sentinel Nodes, and Recursion Optimizations

This article introduces several practical algorithmic tricks—using array indices as counters, applying modulo for circular traversal, employing two‑pointer methods for linked‑list problems, leveraging bit‑shift and bitwise operations, adding sentinel nodes, and optimizing recursive solutions with memoization and bottom‑up DP—each illustrated with Java code examples.

Data StructuresRecursionalgorithm
0 likes · 10 min read
Common Algorithmic Techniques: Array Indexing, Modulo, Two‑Pointer, Bit‑Shift, Sentinel Nodes, and Recursion Optimizations
Programmer DD
Programmer DD
Dec 17, 2018 · Fundamentals

How to Compute √2 Efficiently: Binary Search, Newton’s Method, and C Tricks

Learn multiple techniques to calculate the square root of 2—including binary search, Newton’s iteration, and a clever C library implementation—through clear explanations, step‑by‑step illustrations, and full JavaScript and C code examples that reveal the underlying mathematics and performance considerations.

Binary SearchNewton's methodNumerical Methods
0 likes · 4 min read
How to Compute √2 Efficiently: Binary Search, Newton’s Method, and C Tricks
21CTO
21CTO
Nov 27, 2018 · Big Data

How Netflix’s Data‑Driven Playbook Is Challenging Hollywood’s Creative Rules

Netflix’s data‑driven strategy, which uses massive subscriber analytics to shape original content and marketing, has sparked a clash with Hollywood’s traditional, relationship‑focused approach, leading to internal power struggles, leadership changes, and a broader debate over algorithmic versus human intuition in entertainment.

Data AnalyticsNetflixStreaming
0 likes · 8 min read
How Netflix’s Data‑Driven Playbook Is Challenging Hollywood’s Creative Rules
Programmer DD
Programmer DD
Nov 21, 2018 · Fundamentals

Who Was Ada Lovelace? The Woman Who Invented Computer Programming

Ada Lovelace, the daughter of poet Byron, pioneered computer programming by introducing algorithms and the concept of loops, influencing modern software engineering and inspiring the Ada programming language named in her honor, recognized by the U.S. Department of Defense and industry leaders.

Ada LovelaceProgramming Languagealgorithm
0 likes · 7 min read
Who Was Ada Lovelace? The Woman Who Invented Computer Programming
Programmer DD
Programmer DD
Oct 30, 2018 · Fundamentals

What Is Paxos? A Storytelling Guide to Distributed Consensus

This article uses a vivid allegorical story to introduce the Paxos algorithm, then explains its roles, two-phase protocol, fault assumptions, and why majority and multiple acceptors are essential for achieving reliable consensus in distributed systems.

Distributed SystemsPaxosalgorithm
0 likes · 10 min read
What Is Paxos? A Storytelling Guide to Distributed Consensus
JD Tech
JD Tech
Oct 16, 2018 · Fundamentals

Wave Fluctuation Equal Distribution (波动均分) Algorithm: Exhaustive and Quick Allocation Methods

This article introduces the "wave fluctuation equal distribution" algorithm that splits a value into N parts within a bounded range with random variation, explains its characteristics, and provides two JavaScript implementations—an exhaustive enumeration method and a fast random allocation method—along with performance analysis and validation techniques.

JavaScriptalgorithmexhaustive search
0 likes · 7 min read
Wave Fluctuation Equal Distribution (波动均分) Algorithm: Exhaustive and Quick Allocation Methods
Java Backend Technology
Java Backend Technology
Oct 13, 2018 · Big Data

Check a New Integer Among 4 Billion Records in Seconds Using Bitmap & Distributed Methods

An interviewee faces the challenge of determining whether a newly given integer exists within a set of 4 billion numbers, and the article explores efficient solutions—from naive disk‑I/O approaches to distributed processing and the memory‑saving bitmap technique—highlighting their performance trade‑offs and implementation details.

Big DataBitmapalgorithm
0 likes · 6 min read
Check a New Integer Among 4 Billion Records in Seconds Using Bitmap & Distributed Methods
UC Tech Team
UC Tech Team
Oct 11, 2018 · Backend Development

Avoiding Single Empty Seats in Cinema Seat Selection Using Regex

This article explains how to prevent isolated empty seats when users select cinema seats by modeling seat layouts, defining forbidden patterns, converting them into regular expressions, and implementing concise JavaScript validation code that reduces complex nested if‑statements to a few clear lines.

Cinemaalgorithmregex
0 likes · 6 min read
Avoiding Single Empty Seats in Cinema Seat Selection Using Regex
21CTO
21CTO
Sep 21, 2018 · Big Data

Master Massive Data Processing: Key Techniques from Hash Maps to MapReduce

This comprehensive guide explores essential strategies for handling massive datasets, covering hash-based structures, bucket partitioning, heap and quicksort techniques, trie trees, Bloom filters, external sorting, and MapReduce, and demonstrates how to efficiently solve common interview problems such as top‑K queries and duplicate removal.

Data StructuresHashHeap
0 likes · 35 min read
Master Massive Data Processing: Key Techniques from Hash Maps to MapReduce
AutoHome Frontend
AutoHome Frontend
Sep 18, 2018 · Frontend Development

How Google Photos Delivers Smooth 60fps Scrolling with Advanced Layout Tricks

This article explains the technical challenges Google Photos faced—such as handling millions of images, preserving aspect ratios, enabling instant navigation, and maintaining 60fps scrolling—and details the algorithms, data chunking, justified layout, and performance optimizations that make the web UI fast and fluid.

algorithmfrontendlayout
0 likes · 27 min read
How Google Photos Delivers Smooth 60fps Scrolling with Advanced Layout Tricks
Meituan Technology Team
Meituan Technology Team
Sep 6, 2018 · Artificial Intelligence

Meituan Machine Learning Practice Book Released

Meituan’s new book, 'Machine Learning Practice,' authored by over twenty frontline engineers, offers a comprehensive guide to internet‑company ML techniques, is now sold in major bookstores, invites reader feedback, and provides QR‑code access to the team’s official account and an electronic bibliography, plus a companion summary of 27 essential AI articles.

AIMeituanalgorithm
0 likes · 6 min read
Meituan Machine Learning Practice Book Released
Senior Brother's Insights
Senior Brother's Insights
Aug 15, 2018 · Fundamentals

How Does Base64 Really Work? A Deep Dive into Encoding Basics

This article explains the origin, alphabet, step‑by‑step conversion process, padding rules, and provides a Java example to illustrate how Base64 encodes binary data into printable characters, highlighting why the output is about one‑third larger than the input.

Base64Binary-to-TextData Transmission
0 likes · 8 min read
How Does Base64 Really Work? A Deep Dive into Encoding Basics
MaGe Linux Operations
MaGe Linux Operations
Jul 16, 2018 · Fundamentals

12 Essential Python Coding Challenges with Solutions and Explanations

This article presents twelve Python programming exercises covering string manipulation, list handling, regular expressions, binary conversion, and algorithmic sorting, each accompanied by clear explanations and complete code snippets that illustrate how to solve the problems step by step.

PythonString Manipulationalgorithm
0 likes · 13 min read
12 Essential Python Coding Challenges with Solutions and Explanations
Xianyu Technology
Xianyu Technology
Jul 9, 2018 · Big Data

Efficient GeoHash-Based Point‑in‑Polygon Matching for Massive Datasets

By encoding billions of GPS points and ten thousand district polygons into GeoHash cells, using exact matches, approximate filtering, neighbor‑cell lookup tables, and a final precise geometry test, the authors cut the required operations from 2×10^20 to about 1.8×10^12, enabling full processing in under a day.

GeoHashSpatial Indexingalgorithm
0 likes · 13 min read
Efficient GeoHash-Based Point‑in‑Polygon Matching for Massive Datasets
360 Quality & Efficiency
360 Quality & Efficiency
May 11, 2018 · Artificial Intelligence

Common Engineering Algorithms and Their Testing Methods

This article introduces the most commonly used algorithms in engineering—recommendation, optimization, estimation, and classification—explains their typical application scenarios, and discusses various testing methods and evaluation metrics such as offline experiments, user surveys, A/B testing, and performance indicators like accuracy, coverage, diversity, and robustness.

algorithmevaluationmachine learning
0 likes · 12 min read
Common Engineering Algorithms and Their Testing Methods
ITPUB
ITPUB
May 1, 2018 · R&D Management

Why Personality Beats Algorithms: A Senior Engineer’s Interview Playbook

The article reflects on a senior engineer’s interview experience, arguing that hiring should focus on the probability of "working well" rather than superficial metrics like education, algorithms, or basic knowledge, and it outlines how factors such as experience, fundamentals, algorithms, and especially personality influence hiring decisions.

ExperiencePersonalityalgorithm
0 likes · 18 min read
Why Personality Beats Algorithms: A Senior Engineer’s Interview Playbook
Java Backend Technology
Java Backend Technology
Apr 22, 2018 · Backend Development

How to Build a Scalable Short URL Service: Algorithms, Use Cases, and Code

This article explores the concept of short URLs, their practical applications such as social media and QR codes, discusses various generation methods, presents algorithmic designs like incremental ID encoding and caching strategies, and provides a reference implementation for building a reliable URL shortening service.

BackendScalabilityalgorithm
0 likes · 12 min read
How to Build a Scalable Short URL Service: Algorithms, Use Cases, and Code
Tencent Cloud Developer
Tencent Cloud Developer
Mar 19, 2018 · Artificial Intelligence

Basic Concepts of Decision Trees

Decision trees are tree-structured classifiers that split data using attributes chosen for maximal purity measured by Gini impurity or entropy, with algorithms like ID3 selecting splits by information gain, while overfitting is mitigated through constraints and pruning techniques such as REP, PEP, and CCP.

Gini ImpurityID3Information Gain
0 likes · 13 min read
Basic Concepts of Decision Trees
Qunar Tech Salon
Qunar Tech Salon
Mar 7, 2018 · Fundamentals

Dynamic Programming Solutions for 0/1, Complete, Unbounded, and Multi‑Knapsack Problems in JavaScript

This article explains the theory and JavaScript implementations of various knapsack problem variants—including 0/1, complete, unbounded, and multi‑knapsack—detailing state transition equations, space‑optimisation techniques such as rolling arrays and binary decomposition, and provides full code examples for each solution.

JavaScriptalgorithmdynamic programming
0 likes · 16 min read
Dynamic Programming Solutions for 0/1, Complete, Unbounded, and Multi‑Knapsack Problems in JavaScript
Aotu Lab
Aotu Lab
Jan 23, 2018 · Frontend Development

How to Build a Popstar Match‑3 Game with MVC Architecture in JavaScript

This article explains the rules, scoring system, and level design of the classic "Popstar" match‑3 game, then details a full MVC implementation in JavaScript—including tile representation, wave‑average distribution, shuffle, wall solidification, view updates, control bindings, and a discussion of the knapsack‑style max‑score problem—while providing complete code snippets and a GitHub repository link.

Game DevelopmentJavaScriptMVC
0 likes · 14 min read
How to Build a Popstar Match‑3 Game with MVC Architecture in JavaScript
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jan 7, 2018 · Operations

Mastering Load Balancing: Algorithms, Code Samples, and Real‑World Insights

This article explains the concept of load balancing in distributed systems, outlines its benefits for throughput and reliability, compares common architectural layers, evaluates key algorithmic considerations, and provides Python implementations of round‑robin, weighted, random, hash‑based, and least‑connection strategies along with deployment options.

Distributed SystemsNetworkingPython
0 likes · 14 min read
Mastering Load Balancing: Algorithms, Code Samples, and Real‑World Insights
Meituan Technology Team
Meituan Technology Team
Dec 1, 2017 · Big Data

Metric Logic Tree: Automated Anomaly Analysis for Business Metrics

The Metric Logic Tree automates business metric anomaly analysis by integrating heterogeneous data sources (Kylin, MySQL, Elasticsearch, Druid) with a three‑layer architecture—metric calculation, algorithmic analysis (waterfall and Gini‑coefficient methods), and a master‑worker computation service—that parallelizes queries, delivers immediate conclusions, and shortens decision cycles, as demonstrated in Meituan‑Dianping’s hotel‑travel operations.

Big Dataalgorithmanomaly detection
0 likes · 7 min read
Metric Logic Tree: Automated Anomaly Analysis for Business Metrics
Baixing.com Technical Team
Baixing.com Technical Team
Nov 30, 2017 · Artificial Intelligence

How User Profiling Powers Modern Recommendation Systems

This article explains what user profiling is, why it’s crucial for recommendation systems, outlines key dimensions such as personal attributes, status, and interests, describes algorithms like classification and autoregressive models, and details offline and real‑time computation methods, evaluation techniques, and practical examples.

algorithmdata miningmachine learning
0 likes · 11 min read
How User Profiling Powers Modern Recommendation Systems
Tencent Database Technology
Tencent Database Technology
Nov 23, 2017 · Fundamentals

Augmenting Red‑Black Trees with a Count Field for Order‑Statistic (Rank) Queries

This article explains how to extend a red‑black tree with a subtree‑size counter to support O(log n) rank and selection operations, detailing the required count updates during insertion, deletion, and tree rotations, and provides complete pseudocode for left/right rotations, rank queries, and element‑by‑rank retrieval.

Red-Black Treealgorithmaugmented data structure
0 likes · 6 min read
Augmenting Red‑Black Trees with a Count Field for Order‑Statistic (Rank) Queries
21CTO
21CTO
Nov 19, 2017 · Fundamentals

Demystifying PageRank: How Google Ranks Web Pages and Fights Spam

This article explains the core challenges of search engines, the origins and mechanics of the PageRank algorithm, its handling of dead ends and spider traps, extensions like Topic‑Sensitive PageRank, and the various link‑spam attacks and countermeasures such as Spam Farms and TrustRank.

PageRankalgorithmlink spam
0 likes · 23 min read
Demystifying PageRank: How Google Ranks Web Pages and Fights Spam
Aotu Lab
Aotu Lab
Oct 13, 2017 · Game Development

How to Build a Classic Snake Game with MVC and Efficient Data Structures

This article explains how to implement the classic Snake game using the MVC pattern, detailing the model's grid representation, chain‑list versus array for the snake body, random food placement algorithms, view rendering optimizations with PIXI, and control APIs for game interaction.

Game DevelopmentJavaScriptMVC
0 likes · 12 min read
How to Build a Classic Snake Game with MVC and Efficient Data Structures
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 6, 2017 · Frontend Development

Mastering DOM Traversal and Sorting: Recursive & Non‑Recursive JavaScript Algorithms

This article explores how to implement recursive and non‑recursive DOM tree searches, hash‑based lookups, and several classic sorting algorithms—including quick sort and merge sort—in JavaScript, discussing their time and space complexities, stability considerations, and practical performance tips for front‑end development.

DOMRecursionSorting
0 likes · 20 min read
Mastering DOM Traversal and Sorting: Recursive & Non‑Recursive JavaScript Algorithms
Architects' Tech Alliance
Architects' Tech Alliance
Jul 14, 2017 · Industry Insights

How a New ‘Non‑Balance’ Wear‑Leveling Algorithm Can Triple SSD Lifespan

The article explains the background of flash‑memory wear‑leveling, reviews common garbage‑collection strategies, compares classic algorithms such as Greedy, Cost‑Benefit, CAT and CICL, and introduces the Non‑Balance method that evaluates real block endurance to extend SSD life up to three times.

Garbage CollectionSSDStorage Optimization
0 likes · 11 min read
How a New ‘Non‑Balance’ Wear‑Leveling Algorithm Can Triple SSD Lifespan
21CTO
21CTO
Jun 20, 2017 · Backend Development

Mastering API Rate Limiting with Token Bucket and Redis

This article explains how to protect API servers from abuse by implementing rate limiting using the Token Bucket algorithm, discusses its drawbacks, and provides practical Java and Redis-based solutions with code examples and performance considerations.

BackendToken Bucketalgorithm
0 likes · 14 min read
Mastering API Rate Limiting with Token Bucket and Redis
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Jun 15, 2017 · Frontend Development

Top 10 Front-End Interview Algorithm Questions and Solutions

This article compiles ten common algorithmic challenges frequently asked in front‑end interviews, explains why mastering data structures matters for developers, and provides concise solutions and key insights for each problem, from palindrome checks to binary search tree implementation in JavaScript.

JavaScriptalgorithmcoding-challenge
0 likes · 8 min read
Top 10 Front-End Interview Algorithm Questions and Solutions
MaGe Linux Operations
MaGe Linux Operations
May 31, 2017 · Artificial Intelligence

Can Python’s Minimax Reveal the Winning Strategy in Doudizhu?

This article explains how to use a Python implementation of the minimax algorithm to analyze a Doudizhu end‑game scenario, detailing the core logic, recursive hand simulation, caching optimizations, and the final result that the farmer side has no guaranteed winning strategy.

DoudizhuMiniMaxPython
0 likes · 6 min read
Can Python’s Minimax Reveal the Winning Strategy in Doudizhu?
MaGe Linux Operations
MaGe Linux Operations
May 4, 2017 · Big Data

How to Process 100GB Logs and Massive Datasets with Hash Partitioning and Bloom Filters

This article explains the definition and 4V characteristics of big data and presents practical algorithms—including hash partitioning, min‑heap top‑K selection, bitmap extensions, and Bloom filter techniques—to efficiently handle ultra‑large log files, integer sets, and keyword searches within strict memory limits.

Big DataBitmapHash Partitioning
0 likes · 12 min read
How to Process 100GB Logs and Massive Datasets with Hash Partitioning and Bloom Filters
Baidu Waimai Technology Team
Baidu Waimai Technology Team
Apr 26, 2017 · Fundamentals

Baidu Waimai Technical Monthly Issue 7 – Operations Monitoring, Big Data Platform, BFT Algorithm, Zombie Process, Nginx+Lua Overload Protection, OLTP/OLAP, User Repurchase Prediction, Frontend Tracking, and Favicon

The seventh issue of Baidu Waimai's technical monthly presents a collection of practical engineering articles covering operations monitoring, big‑data platform incubation, BFT crawling algorithm, zombie‑process avoidance, Nginx+Lua overload protection, OLTP/OLAP integration, new‑user repurchase prediction, a generic frontend tracking solution, and the use of favicons to personalize websites.

AIBackendalgorithm
0 likes · 6 min read
Baidu Waimai Technical Monthly Issue 7 – Operations Monitoring, Big Data Platform, BFT Algorithm, Zombie Process, Nginx+Lua Overload Protection, OLTP/OLAP, User Repurchase Prediction, Frontend Tracking, and Favicon
21CTO
21CTO
Feb 24, 2017 · Backend Development

Unveiling Nginx Load Balancing: Deep Dive into Strategies and Real‑World Tests

This article explores Nginx’s built‑in and extended load‑balancing algorithms—including weighted round‑robin, IP‑hash, fair, generic‑hash and consistent‑hash—by dissecting source code, explaining implementation details, and presenting comprehensive performance tests that compare their balance, consistency, and fault‑tolerance across varied scenarios.

Performance Testingalgorithmbackend-development
0 likes · 14 min read
Unveiling Nginx Load Balancing: Deep Dive into Strategies and Real‑World Tests
JavaScript
JavaScript
Feb 7, 2017 · Fundamentals

Master JavaScript Stacks: Build, Use, and Apply Stack Operations

This article explains the concept of a stack as a LIFO data structure, shows how to implement a Stack class in JavaScript with essential methods like push, pop, size, empty, peek, and clear, and demonstrates practical usage through recursive and iterative factorial calculations.

Data StructureJavaScriptStack
0 likes · 4 min read
Master JavaScript Stacks: Build, Use, and Apply Stack Operations
Hulu Beijing
Hulu Beijing
Dec 22, 2016 · Big Data

How Hulu Uses Big Data and Algorithms to Supercharge Its Ad System

This article explains how Hulu’s advertising platform leverages big‑data pipelines, time‑series forecasting, bipartite‑graph optimization, linear‑model targeting, and real‑time allocation to improve sales, delivery, reporting, and planning of guaranteed‑delivery brand ads.

Advertisingalgorithminventory optimization
0 likes · 11 min read
How Hulu Uses Big Data and Algorithms to Supercharge Its Ad System
WeChat Backend Team
WeChat Backend Team
Oct 27, 2016 · Fundamentals

Understanding Basic Paxos Through the Three-Generals Problem Analogy

By adapting the classic Two Generals problem into a Three-Armies scenario, this article demystifies the Basic Paxos algorithm, illustrating its prepare/commit phases, proposal handling, and consensus challenges with detailed step-by-step examples and insights into its practical implications for distributed systems.

Paxosalgorithmdistributed consensus
0 likes · 14 min read
Understanding Basic Paxos Through the Three-Generals Problem Analogy
WeChat Backend Team
WeChat Backend Team
Oct 26, 2016 · Fundamentals

Why Fixed Membership Is Crucial for Paxos and How to Handle Dynamic Changes

The article explains that Paxos relies on a fixed set of voters (the majority) for consistency, shows why configuration‑driven member changes break the protocol, and introduces a simple dynamic membership algorithm that uses delayed activation windows to achieve atomic member updates without violating Paxos guarantees.

ConsistencyPaxosalgorithm
0 likes · 8 min read
Why Fixed Membership Is Crucial for Paxos and How to Handle Dynamic Changes
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Oct 14, 2016 · Fundamentals

Understanding Paxos: How Distributed Systems Reach Consensus

This article provides a vivid explanation of the Paxos algorithm, illustrating how it achieves reliable consensus among unreliable processors through a two‑phase prepare/promise and propose/accept process, using distributed auction analogies, message sequencing, and read/write operations to ensure consistency in distributed systems.

Read/Writealgorithmdistributed consensus
0 likes · 15 min read
Understanding Paxos: How Distributed Systems Reach Consensus
Aotu Lab
Aotu Lab
Aug 10, 2016 · Artificial Intelligence

Can AI Teach Computers to Design Fonts? A Journey into Automated Typography

The article explores the author's experiments combining artificial intelligence with typography, detailing the development of algorithms that measure font attributes, compute similarity scores, and generate rule‑based design systems, while reflecting on the challenges, inspirations, and future possibilities of AI‑driven font selection and design.

AIalgorithmdesign systems
0 likes · 21 min read
Can AI Teach Computers to Design Fonts? A Journey into Automated Typography
Architecture Digest
Architecture Digest
Jun 16, 2016 · Operations

Understanding Load Balancing: L4 and L7 Concepts, Types, and Strategies

This article explains load balancing fundamentals, differentiates layer‑4 and layer‑7 balancing, describes hardware and software solutions, local and global deployment, various algorithms and health‑check methods, and discusses performance, scalability, security, and management considerations for modern network operations.

L4L7algorithm
0 likes · 23 min read
Understanding Load Balancing: L4 and L7 Concepts, Types, and Strategies

Performance Optimization: Algorithm Improvements, Resource Tuning, and Caching Strategies

The article outlines how to boost system performance through algorithmic refinements, hardware and software resource upgrades, interaction optimizations between algorithms and resources, and effective caching techniques, while acknowledging trade‑offs and the need for balanced decisions.

Resource Managementalgorithmcaching
0 likes · 7 min read
Performance Optimization: Algorithm Improvements, Resource Tuning, and Caching Strategies
21CTO
21CTO
May 11, 2016 · Fundamentals

Can Game Theory Explain Dating? Exploring the Stable Matching Algorithm

This article uses the classic stable matching (Gale‑Shapley) algorithm to model romantic courtship, illustrating how men‑proposing and women‑proposing versions lead to different stable pairings and highlighting the advantage of the proactive side in achieving preferred matches.

Gale-ShapleyGame Theoryalgorithm
0 likes · 7 min read
Can Game Theory Explain Dating? Exploring the Stable Matching Algorithm