Constructs a minimum spanning tree by repeatedly adding the shortest edge that does not form a cycle.
Grows a minimum spanning tree by starting from a vertex and greedily adding the smallest edge that expands the tree.
Finds the shortest path in a graph with non-negative edge weights by repeatedly choosing the closest unvisited node.
Selects the maximum number of non-overlapping intervals by always choosing the interval that finishes earliest.
Finds the minimum number of coins for making change, assuming a denomination system where the greedy choice leads to an optimal solution.
Selects fractions of items to maximize total value given a weight constraint by taking items with the highest value-to-weight ratio first.
Builds an optimal prefix-free code for given frequencies by greedily merging the least frequent symbols first.
Schedules jobs to minimize the maximum lateness by ordering them based on their deadlines.
Selects the next path expansion based on an evaluation function (often a heuristic), always expanding the path that appears best at the moment.
Chooses the maximum number of activities that do not overlap by always picking the next activity that finishes earliest.
Builds a minimum spanning tree by sorting edges by weight and adding them if they don’t form a cycle.
Explores a graph deeply along each branch before backtracking, often implemented using recursion.
Orders the vertices of a directed acyclic graph so that all directed edges go from earlier in the order to later.
Constructs a minimum spanning tree by growing a tree from a starting vertex and adding edges of minimum weight.
Finds strongly connected components in a directed graph using a depth-first search and a stack-based approach.
Finds the shortest path between nodes in a graph with non-negative edge weights.
Computes shortest paths between all pairs of vertices using a combination of reweighting and Dijkstra’s algorithm.
Finds shortest paths between all pairs of vertices in a weighted graph, including those with negative edges (but no negative cycles).
Determines strongly connected components by performing multiple DFS passes and leveraging graph transposes.
Computes shortest paths from a single source to all other vertices, handles negative edge weights but not negative cycles.
Traverses a graph level by level, starting from a root node, exploring all neighbors at one depth before moving to the next.
Finds the maximum flow in a network by repeatedly sending flow along augmenting paths until no more can be sent.
Builds a max-heap from the list and repeatedly extracts the maximum element and rebuilds the heap.
A hybrid stable sorting algorithm derived from merge sort and insertion sort, used in Python’s sort function.
Selects the minimum element from the unsorted part and swaps it with the element at the beginning of the unsorted part.
Inserts each element into its correct position in a growing sorted portion of the array.
Divides the input into buckets and sorts each bucket individually, often with another sorting algorithm.
Repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order.
Chooses a pivot, partitions the array into two sides around the pivot, and recursively sorts them.
Counts the occurrences of each distinct element and places them in the output array in order.
Starts sorting far-apart elements and progressively reduces the gap between elements to be compared.
Divides the list into halves, sorts them recursively, and merges the sorted halves.
Sorts integers digit by digit, starting from the least significant digit to the most significant.
Designed to handle data that does not fit into memory and often uses chunking and merging strategies.
Maximizes the value of items put into a knapsack without exceeding its capacity by reusing solutions of smaller subproblems.
Finds the optimal parenthesization of matrix multiplication to minimize the number of scalar multiplications.
Determines the minimum number of egg drops needed to find the critical floor using previously computed attempts for fewer eggs or floors.
Determines if a given set can be partitioned into two subsets of equal sum by building up results from smaller subsets.
Computes Fibonacci numbers using overlapping subproblems and caching results to avoid repeated work.
Counts the ways to make change or finds the minimum coins needed by building upon solutions for smaller amounts.
Decides if a string can be segmented into dictionary words, using results of subproblems for shorter prefixes.
Finds the longest subsequence present in both sequences by building solutions to smaller subproblems.
Maximizes the amount of money robbed from a line of houses without triggering alarms by not robbing adjacent houses.
Determines the longest strictly increasing subsequence in a sequence using previous computed states.
Maximizes revenue by cutting a rod into optimal lengths using known optimal solutions to smaller rod sizes.
Calculates the minimum number of edits (insertions, deletions, substitutions) to transform one string into another.
Visits left subtree, then node, then right subtree for a systematic linear ordering of a binary tree’s nodes.
Constructs a structure for efficient cumulative frequency or sum queries and updates on an array.
Visits node, then left subtree, then right subtree to record the structure of the tree.
Visits left subtree, then right subtree, then node, often used to delete trees or evaluate expressions.
Builds a tree-based data structure for range queries (sum, min, max) in O(n) time and space.
Finds the lowest common ancestor of two nodes in a tree using preprocessing and queries in O(log n) or better.
Adds a node to a red-black tree and adjusts colors and rotations to maintain balanced height and ordering.
Inserts a new key into a BST, maintaining the BST property: left < node < right.
Balances an AVL tree by performing rotations (single or double) when subtree heights differ by more than one.
Removes a key from a BST and rearranges nodes to preserve the BST property.
Builds a finite-state machine from a set of patterns to simultaneously search all patterns in O(n + m) time.
Polynomial Rolling Hash)
Builds a minimal deterministic automaton of all suffixes, facilitating fast substring search and analysis.
Finds the longest palindromic substring in linear time by expanding around potential centers.
Constructs a compressed trie of all suffixes of a string in O(n) time, enabling fast substring queries.
Generates a sorted array of all suffixes of a string to enable fast substring searching and comparisons.
Builds an array of longest common prefixes between adjacent suffixes in a suffix array, aiding in string analysis.
A simplified version of Boyer-Moore that uses a single shift table to skip through the text efficiently.
Constructs a Z-array representing the longest substring starting from each position that matches the prefix, enabling efficient pattern search.
Finds occurrences of a pattern within a string by preprocessing the pattern to skip characters efficiently.
Uses hashing to quickly compare substrings and detect a pattern in a text, allowing average O(n) search.
Searches substrings from right to left, using character skipping rules to often skip large portions of the text.
Resolves collisions by placing the new element in the next available slot in a linear sequence.
Handles collisions by maintaining a linked list (chain) of elements sharing the same hash index.
Uses a quadratic function to find the next available slot for a collided key, reducing clustering.
A space-efficient probabilistic data structure for testing set membership with false positives but no false negatives.
Uses two hash functions and relocates elements until each key is placed in one of its two possible positions.
Builds a data structure mapping keys to values using a hash function to achieve O(1) average lookup time.
Chooses a hash function at random from a family of functions to minimize worst-case collision probability.
Employs two distinct hash functions to find the next free slot on collisions, improving distribution.
Constructs a collision-free hash function that guarantees O(1) lookups for a fixed set of keys.
Computes hash values for substrings efficiently, enabling fast string search algorithms like Rabin-Karp.
Skips ahead by fixed intervals in a sorted list, then performs a linear search within the identified block.
Repeatedly divides a sorted array in half to quickly narrow down the position of the target value.
Sequentially checks each element of the list until the desired element is found or the list is exhausted.
Uses a hash function to directly compute the index of the target, allowing for average O(1) search time.
Uses an evaluation function to choose which node to explore next, often guided by heuristics.
First finds a range where the element could be by repeatedly doubling the index, and then applies binary search within that range.
Uses Fibonacci numbers to determine search ranges in a sorted array, similar to binary search but with different mid calculation.
Expands the least-cost node first, ensuring the optimal path is found based on cumulative cost.
Starts at a root node (or source) and explores all neighbors at the present depth before moving on to the nodes at the next depth level.
A graph/tree search algorithm that uses heuristics to find the shortest path to a goal efficiently.
Estimates the position of a target in a sorted array using the target’s value and array boundaries, often faster than binary search for uniformly distributed data.
Explores as far along each branch or path in a graph or tree before backtracking.
Represents subsets as bit patterns, allowing for quick generation of all subsets of a set.
Reverses the order of bits in a binary representation of an integer.
Utilizes XOR’s properties to find the unique element in an array where every other element appears twice.
Determines if a number is a power of two by checking if it has exactly one set bit.
Uses shifts and masks to isolate, set, or clear specific bits in an integer.
Counts the number of set bits in an integer by repeatedly stripping away the rightmost set bit.
Uses cumulative XOR operations to quickly answer queries about XOR of subarray segments.
Interchanges two integer variables without using a temporary variable, relying solely on XOR operations.
A backtracking approach to determine a path through a graph that visits each vertex exactly once.
A maze-solving algorithm that tries different paths to reach the destination and backtracks when a dead end is encountered.
Assign digits to letters in a puzzle and backtrack when inconsistencies arise.
Systematically assign values to variables under constraints, backtracking whenever a conflict occurs.
Find all combinations of a given set of items by adding and removing items and backtracking to explore all possibilities.
Assign colors to vertices of a graph so that no two adjacent vertices share the same color.
A classic problem where the algorithm tries to place N queens on an N×N chessboard so that no two queens threaten each other.
Generate all permutations of a given sequence by swapping and backtracking.
Backtracking method to find a sequence of moves for a knight so it visits every square on a chessboard exactly once.
A backtracking approach to fill a 9x9 grid so that each row, column, and 3x3 subgrid contains all digits from 1 to 9.
Find a given word in a character grid by exploring possible directions and backtracking when the path does not form the desired word.
Backtracking to find a subset of numbers that sum up to a given target value.
Selects a pivot, partitions the array around it, then recursively sorts the subarrays.
Splits the set of points into subsets, finds their hulls, and merges the hulls to form a global convex hull.
Multiplies two large integers faster than the classical algorithm by recursively splitting and combining results.
Uses recursive division of the matrix chain to find the optimal multiplication order.
Halves the search interval each time to quickly find an element in a sorted array.
Computes the Discrete Fourier Transform efficiently by recursively dividing the problem into subproblems.
Recursively splits the set of points and uses clever combining techniques to find the closest pair in less than O(n²) time.
Multiplies two matrices faster than the standard algorithm by recursively breaking them down into sub-matrices.
Divides the array into halves, recursively sorts the halves, and merges the sorted halves.
Selects a pivot guaranteed to split the array into good portions, ensuring linear time selection.
Algorithm for eliminating repeated elements from list
Technique for rearranging list elements around a pivot value
Method for identifying circular references in linked list
Method for adding new node at specific index in linked list
Technique for locating center node in linked list
Basic algorithm for sequentially accessing all elements in a linked list
Algorithm for inverting order of linked list elements
Method for determining if linked list reads same forward and backward
Combining two sorted linked lists into single sorted list
Technique for removing specific node from linked list
Synchronization mechanism controlling access to shared resources through counting mechanism
Algorithmic techniques for avoiding circular resource waiting in multi-threaded systems
Concurrent access control algorithm allowing multiple simultaneous reads but exclusive write access
Efficient parallel computation technique for aggregating data across multiple processing units
Determining whether a point lies inside or outside a given polygon
Finding smallest convex polygon enclosing a set of points in a plane
Detecting and calculating intersection points between multiple line segments
Queue allowing insertion and deletion from both ends
Standard method for adding elements to the rear of a queue
Queue mechanism for controlling rate of processed elements
Asynchronous communication technique for inter-process messaging
Queue where elements are served based on priority rather than insertion order
Graph traversal algorithm using queue for level-wise exploration
Queue-based algorithm for fair CPU or task scheduling
Queue implementation using circular array for efficient space utilization
Algorithm for reversing order of elements in a queue
Technique for removing and returning the front element from a queue
A method for solving systems of linear equations and matrix inversion
A mathematical optimization technique for maximizing or minimizing a linear objective function under linear constraints
A probabilistic technique for solving problems through repeated random sampling
An algorithm for computing the convex hull of a set of points in the plane
Determining the smallest convex set that contains all given points in a plane
An iterative technique for finding roots of a real-valued function through successive approximations
An efficient divide-and-conquer sorting algorithm that uses partitioning to order elements
A simple and efficient method for finding all prime numbers up to a given limit
Finding pairs in sorted array that match target sum
Detecting cycles in linked list or array
In-place string reversal using start and end pointers
Combining two sorted arrays efficiently
Locating unique triplets summing to zero in array
Finding maximum water container between vertical lines
Dynamic window technique for array/string subsequence analysis
Efficiently eliminating repeated elements from sorted array
Checking string palindrome using converging pointers
Graph traversal algorithm utilizing stack for node exploration
Standard method for adding elements to the top of a stack
Stack-based algorithm for converting mathematical expressions
Stack-based method for computing mathematical expressions
Stack variant tracking minimum or maximum element efficiently
Stack implementation for tracking and reversing sequential operations
Using stack to validate matching parentheses in expressions
Using stack to implement recursive algorithm logic
Technique for removing and returning the top element from a stack
Recursively compare characters from the start and end of a string to determine if it reads the same backwards and forwards.
Recursively calculate the power of a number by repeatedly multiplying the base with an decreasing exponent.
Solve the puzzle of moving a stack of disks from one peg to another with specific rules using recursive strategy.
Calculate the factorial of a number by recursively multiplying the number with factorial of (number - 1).
Recursively explore and list all files and subdirectories within a given directory structure.
Compute Fibonacci numbers by recursively calculating the sum of two preceding numbers.
Variable-length encoding algorithm that assigns shorter codes to more frequent symbols
Dictionary-based algorithm that dynamically builds compression dictionary during encoding
Simple compression technique that replaces sequences of identical data elements with a single data value and count
Media access control method for managing network communication and collision detection
Dynamic routing protocol for calculating shortest path in computer networks
TCP congestion control method for reducing network packet transmission overhead
Network error detection and correction algorithm for reliable data transmission
Network algorithm preventing loops in Ethernet networks by creating a loop-free logical topology