DEV Community

Computer Science 🤓

This tag is for sharing and asking questions about anything related to computer science, including data structures, algorithms, research, and white papers! 🤓

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Debouncing vs Throttling

Debouncing vs Throttling

2
Comments
1 min read
Mastering Recursion: A Byte-Sized Explanation

Mastering Recursion: A Byte-Sized Explanation

1
Comments
1 min read
Intersection of Two Sorted Arrays

Intersection of Two Sorted Arrays

Comments
4 min read
Buffer Overflow: Balancing Memory and Security in Software

Buffer Overflow: Balancing Memory and Security in Software

8
Comments
1 min read
What Parsing is, in 256 chars or less

What Parsing is, in 256 chars or less

2
Comments
1 min read
One Byte Explainer : NP-Complete Problems

One Byte Explainer : NP-Complete Problems

11
Comments
1 min read
Debugging explained in 77 characters

Debugging explained in 77 characters

4
Comments
1 min read
Demystifying Recursion: A Brief Explanation

Demystifying Recursion: A Brief Explanation

4
Comments
1 min read
XOR in 256 characters or less

XOR in 256 characters or less

1
Comments
1 min read
Big O Short Explanation

Big O Short Explanation

1
Comments
1 min read
Unravelling P vs NP: How This Unsolved Problem Influences the Future of AI with Quantum Computing

Unravelling P vs NP: How This Unsolved Problem Influences the Future of AI with Quantum Computing

10
Comments
4 min read
5 Benefits of Implementing a Source Code Plagiarism Checker Tool

5 Benefits of Implementing a Source Code Plagiarism Checker Tool

3
Comments
1 min read
Big-O Notation: One Byte Explainer

Big-O Notation: One Byte Explainer

15
Comments
2 min read
Explain a computer science concept in 256 characters or less

Explain a computer science concept in 256 characters or less

8
Comments
1 min read
Deep learning with cats

Deep learning with cats

54
Comments 13
1 min read
Lock / Mutex to a post graduate CS student (Difficulty 4)

Lock / Mutex to a post graduate CS student (Difficulty 4)

Comments
1 min read
Design Patterns

Design Patterns

3
Comments 2
1 min read
Recursion Lunch Meeting!

Recursion Lunch Meeting!

1
Comments
1 min read
One Byte Explainer: Algorithm

One Byte Explainer: Algorithm

18
Comments 2
1 min read
What is Parallel Computing?

What is Parallel Computing?

1
Comments
1 min read
Neural Network (explained in 1 Byte)

Neural Network (explained in 1 Byte)

3
Comments
2 min read
Python is Harder than Java....

Python is Harder than Java....

2
Comments 2
1 min read
Application Programming Interface (API's) : One Byte Explainer

Application Programming Interface (API's) : One Byte Explainer

4
Comments 2
1 min read
P vs NP Problem: The Ultimate Computer / Math Puzzle

P vs NP Problem: The Ultimate Computer / Math Puzzle

2
Comments 1
1 min read
Dijkstra's algorithm

Dijkstra's algorithm

4
Comments
1 min read
Union of Two Sorted Arrays

Union of Two Sorted Arrays

1
Comments
4 min read
One Byte Explainer: Recursion

One Byte Explainer: Recursion

Comments
1 min read
LeetCode Meditations — Chapter 11: Graphs

LeetCode Meditations — Chapter 11: Graphs

5
Comments 1
10 min read
Electricity

Electricity

1
Comments 1
1 min read
Lock / Mutex to a software engineer (Difficulty 3)

Lock / Mutex to a software engineer (Difficulty 3)

4
Comments
1 min read
What is a Byte?

What is a Byte?

2
Comments
1 min read
EXCEPTİON HANDLİNG FOR SHADY PEOPLE WİTH SHADY CODE

EXCEPTİON HANDLİNG FOR SHADY PEOPLE WİTH SHADY CODE

1
Comments
1 min read
Encryption - The One Byte Explainer Secret

Encryption - The One Byte Explainer Secret

10
Comments 2
1 min read
Understanding Concurrency and Parallelism: What's the Difference?

Understanding Concurrency and Parallelism: What's the Difference?

3
Comments
2 min read
Understanding Loops - A Tangible Example

Understanding Loops - A Tangible Example

1
Comments
1 min read
Lock / Mutex to a CS undergraduate (Difficulty 2)

Lock / Mutex to a CS undergraduate (Difficulty 2)

3
Comments
1 min read
Casting and its types in networking

Casting and its types in networking

1
Comments
1 min read
One Byte Explainer Challenge solution(Recursion)

One Byte Explainer Challenge solution(Recursion)

Comments
1 min read
Recursion: magic of programming

Recursion: magic of programming

1
Comments
1 min read
One Byte Explainer: Regular Expressions

One Byte Explainer: Regular Expressions

Comments
2 min read
Object Oriented Programming

Object Oriented Programming

61
Comments 18
1 min read
Streamlining Security in the Digital Age—Building ID Verification System with SDKs

Streamlining Security in the Digital Age—Building ID Verification System with SDKs

21
Comments
2 min read
Endless Reflections: Understanding Recursion Through a Cat's Eyes

Endless Reflections: Understanding Recursion Through a Cat's Eyes

18
Comments
1 min read
Quamtum Computing and its importance

Quamtum Computing and its importance

1
Comments
1 min read
Assymetric Encryption in 256 characters or less

Assymetric Encryption in 256 characters or less

Comments 2
1 min read
File locking vs Row Level Locking

File locking vs Row Level Locking

1
Comments
1 min read
Encryption And Decryption - Securing Modern Technology

Encryption And Decryption - Securing Modern Technology

Comments
1 min read
ABSTRACTION

ABSTRACTION

Comments 1
1 min read
Schönhage–Strassen algorithm in 256 chars or less (hopefully)

Schönhage–Strassen algorithm in 256 chars or less (hopefully)

2
Comments
1 min read
Recursion

Recursion

Comments 1
1 min read
Shamir Secret Sharing in 256 characters or less

Shamir Secret Sharing in 256 characters or less

Comments
1 min read
Hooks - One Byte Explainer

Hooks - One Byte Explainer

1
Comments
1 min read
Hashing

Hashing

10
Comments
1 min read
The Golden Key of Cloud Computing

The Golden Key of Cloud Computing

11
Comments
1 min read
Data Dynamics: Exploring Information Theory Essentials

Data Dynamics: Exploring Information Theory Essentials

8
Comments
1 min read
LeetCode Meditations: Find Median from Data Stream

LeetCode Meditations: Find Median from Data Stream

Comments
6 min read
LeetCode Meditations: Pacific Atlantic Water Flow

LeetCode Meditations: Pacific Atlantic Water Flow

1
Comments
6 min read
Backstage for AI's Decision-Making Process

Backstage for AI's Decision-Making Process

Comments
1 min read
Identifiers 101: Understanding and Implementing UUIDs and ULIDs

Identifiers 101: Understanding and Implementing UUIDs and ULIDs

21
Comments 1
5 min read
Cryptographic Security: Safeguarding Data

Cryptographic Security: Safeguarding Data

Comments
1 min read
loading...