# Category:High-importance Computer science articles

This category should contain ±1000 important and well-known concepts in computer science. Most articles probably should go into Category:Mid-importance Computer science articles instead.

Administrators: Please do not delete this category as empty!This category may be empty occasionally or even most of the time. |

Top | High | Mid | Low | NA | ??? |

132 | 687 | 1,353 | 3,191 | 2,036 | 3,029 |

## Pages in category "High-importance Computer science articles"

The following 200 pages are in this category, out of approximately 687 total. This list may not reflect recent changes.

(previous page) (next page)### A

- Talk:A Mathematical Theory of Communication
- Talk:A5/1
- Talk:ABAP
- Talk:Abstract data type
- Talk:Abstract machine
- Talk:Abstract model checking
- Talk:Abstraction
- Talk:Abstraction layer
- Talk:Accounting method (computer science)
- Talk:Ada (programming language)
- Talk:Advanced Encryption Standard
- Talk:Adversary (cryptography)
- Talk:Agile software development
- Talk:Ajax (programming)
- Talk:Susanne Albers
- Talk:ALGOL
- Talk:ALGOL 68
- Talk:Algorithmic efficiency
- Talk:Algorithmic information theory
- Talk:AlphaGo
- Talk:Ambiguous grammar
- Talk:Amdahl's law
- Talk:Amortized analysis
- Talk:Analytics
- Talk:Apache Cassandra
- Talk:Approximation algorithm
- Talk:Arlington Hall
- Talk:The Art of Computer Programming
- Talk:Artificial life
- Talk:Assembly language
- Talk:Associative array
- Talk:Atomicity (database systems)
- Talk:Attack model
- Talk:Augmented reality
- Talk:Authentication
- Talk:Autoencoder
- Talk:Automatic parallelization
- Talk:Automaton
- Talk:Avalanche effect
- Talk:AVL tree

### B

- Talk:B-tree
- Talk:B+ tree
- Talk:Bachelor of Computer Science
- Talk:Charles Bachman
- Talk:Back-end database
- Talk:John Backus
- Talk:BATON
- Talk:BCS Lovelace Medal
- Talk:Beaumanor Hall
- Talk:Best, worst and average case
- Talk:Binary file
- Talk:Binary heap
- Talk:Binary search algorithm
- Talk:Binary search tree
- Talk:Binomial heap
- Talk:Bioinformatics
- Talk:Birthday attack
- Talk:Bitcoin
- Talk:Bitwise operation
- Talk:Bletchley Park
- Talk:Blinding (cryptography)
- Talk:Block cipher
- Talk:Blockchain
- Talk:Blom's scheme
- Talk:Blowfish (cipher)
- Talk:Blum Blum Shub
- Talk:Blum–Goldwasser cryptosystem
- Talk:Blum–Micali algorithm
- Talk:Boneh–Franklin scheme
- Talk:Boolean algebra
- Talk:Boyer–Moore string-search algorithm
- Talk:Per Brinch Hansen
- Talk:Broadcast encryption
- Talk:Fred Brooks
- Talk:Brute-force attack
- Talk:Bubble sort
- Talk:Bucket sort
- Talk:Burrows–Abadi–Needham logic
- Talk:Business intelligence
- Talk:Byte

### C

- Talk:C (programming language)
- Talk:C Sharp (programming language)
- Talk:C++
- Talk:Cache (computing)
- Talk:Caesar cipher
- Talk:Calculus of communicating systems
- Talk:Call-with-current-continuation
- Talk:Calling convention
- Talk:Camellia (cipher)
- Talk:Canonical Huffman code
- Talk:Canonical LR parser
- Talk:Category theory
- Talk:CBC-MAC
- Talk:CCM mode
- Talk:Cellular automaton
- Talk:Certificate authority
- Talk:Certificate Transparency
- Talk:Certification Practice Statement
- Talk:Chomsky hierarchy
- Talk:Chosen-ciphertext attack
- Talk:Ciphertext
- Talk:Ciphertext indistinguishability
- Talk:Ciphertext stealing
- Talk:Ciphertext-only attack
- Talk:CIPHERUNICORN-A
- Talk:CIPHERUNICORN-E
- Talk:CiteSeerX
- Talk:Class (computer programming)
- Talk:Classical cipher
- Talk:Client-side encryption
- Talk:Client–server model
- Talk:Clipper chip
- Talk:Cluster analysis
- Talk:COBOL
- Talk:Clifford Cocks
- Talk:Edgar F. Codd
- Talk:Codd's 12 rules
- Talk:Code
- Talk:Code injection
- Talk:Coding theory
- Talk:Cognitive science
- Talk:Collision attack
- Talk:Collision resistance
- Talk:Commit (data management)
- Talk:Commit (version control)
- Talk:Commitment scheme
- Talk:Common Lisp
- Talk:Communicating sequential processes
- Talk:Communication Theory of Secrecy Systems
- Talk:Comparison of business integration software
- Talk:Comparison of disk encryption software
- Talk:Comparison of object–relational database management systems
- Talk:Comparison of relational database management systems
- Talk:Comparison of structured storage software
- Talk:Comparison of TLS implementations
- Talk:Comparison sort
- Talk:Compile time
- Talk:Compiler construction
- Talk:Compiler-compiler
- Talk:Complex system
- Talk:Complexity class
- Talk:Complexity of constraint satisfaction
- Talk:Composite key
- Talk:Computability
- Talk:Computational biology
- Talk:Computational chemistry
- Talk:Computational creativity
- Talk:Computational Diffie–Hellman assumption
- Talk:Computational fluid dynamics
- Talk:Computational geometry
- Talk:Computational linguistics
- Talk:Computational trust
- Talk:Computer chess
- Talk:Computer science education
- Talk:List of computer scientists
- Talk:Computers and Intractability
- Talk:Computing
- Talk:Computing Machinery and Intelligence
- Talk:Concatenative programming language
- Talk:Concrete security
- Talk:Concurrency control
- Talk:Concurrent computing
- Talk:Conflict-free replicated data type
- Talk:Consensus (computer science)
- Talk:Continuation
- Talk:Convergent encryption
- Talk:Conway's Game of Life
- Talk:Cook–Levin theorem
- Talk:Stephen Cook
- Talk:Coppersmith's attack
- Talk:Corecursion
- Talk:Correlation attack
- Talk:Counting sort
- Talk:Coupling (computer programming)
- Talk:Covariance and contravariance (computer science)
- Talk:CPLEX
- Talk:Cramer–Shoup cryptosystem
- Talk:Cross-site request forgery
- Talk:Crypt (C)
- Talk:Cryptanalysis
- Talk:Cryptanalysis of the Lorenz cipher
- Talk:Crypto AG
- Talk:Crypto Wars
- Talk:Crypto-anarchism
- Talk:Cryptocurrency
- Talk:Cryptographic nonce
- Talk:Cryptographic primitive
- Talk:Cryptographic protocol
- Talk:Cryptographically secure pseudorandom number generator
- Talk:Cryptography standards
- Talk:CSS
- Talk:Curry–Howard correspondence
- Talk:Currying
- Talk:Curve25519
- Talk:Custom hardware attack
- Talk:Cut, copy, and paste
- Talk:Cyberinfrastructure