Skip to content

Only Code

Eat Code Sleep – repeat

  • Github
  • Home
  • Arrays
  • Linked Lists
  • Trees
  • Stacks
  • Queues
  • Heaps
  • Graphs
  • Algorithms
    • Sorting
    • Dynamic Programming
    • Divide and Conquer
    • Backtracking & Recursion
    • Greedy approach
    • Breadth First Search (BFS)
    • Depth First Search (DFS)

Only Code

Eat Code Sleep – repeat

Close menu
  • Github
  • Home
  • Arrays
  • Linked Lists
  • Trees
  • Stacks
  • Queues
  • Heaps
  • Graphs
  • Algorithms
    • Sorting
    • Dynamic Programming
    • Divide and Conquer
    • Backtracking & Recursion
    • Greedy approach
    • Breadth First Search (BFS)
    • Depth First Search (DFS)

Only Code

Eat Code Sleep – repeat

Search Toggle menu

Tag: computer science

Conway’s Game of Life

Cellular automata are discrete, abstract computational systems that have proved highly effective in modeling complex systems.

Computer Science, Mathematics

What is Two’s Complement Method?

Two’s complement method simplifies arithmetic operations and hardware design in digital systems by allowing subtraction to be handled as addition.

Computer Science

Z-Buffer Algorithm

The algorithm efficiently determines visible surfaces by maintaining depth values and updating only when a closer object appears.

Computer Science

Efficient Matrix Multiplication: A Hybrid Approach Combining Strassen’s and Traditional Methods

Hybrid approach uses the traditional method for smaller matrices and switches to Strassen’s algorithm when the matrix size exceeds a threshold.

Computer Science, Mathematics

Comparing Naive and Strassen’s Matrix Multiplication Algorithms

Strassen’s algorithm reduces computational complexity but adds complexity to implementation and memory usage.

Computer Science, Mathematics

Regular Expressions in Computer Programming (Quick Notes)

Regex is efficient because most programming languages implement optimized regex engines that handle pattern matching using sophisticated algorithms like finite automata, ensuring fast performance.

Computer Science

Caesar Cipher with Implementation

Caesar Cipher is one of the simplest and oldest encryption techniques, named after Julius Caesar, who used it to protect his military communications.

Computer Science

Tail Recursion Example: Functional Programming Languages

Tail recursion optimization works by maintaining a single call frame for the recursive calls instead of creating a new one each time.

Computer Science
  • Algorithms
  • Arrays
  • Backtracking & Recursion
  • Breadth First Search (BFS)
  • C/C++
  • Competitive Programming
  • Computer Science
  • Data Science
  • Databases
  • Depth First Search (DFS)
  • Divide and Conquer
  • Dynamic Programming
  • Graphs
  • Greedy approach
  • Hashmaps
  • Heaps
  • Interview Questions
  • Java
  • Linked Lists
  • Machine Coding Questions
  • Machine Learning
  • Mathematics
  • Networking
  • Programming Projects
  • Python
  • Queues
  • Sorting
  • Special Data Structures
  • Stacks
  • Trees
  • Web Development
© 2025 Only Code | Aureolls