ELEMENTS OF COMPUTER SCIENCE
open-menucloseme
Home
Books
About us
  • TDD and refactoring to patterns in C#: how to write a cron parser - Part 4

    calendarNov 27, 2023 · 8 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will begin the process of refactoring the code to enhance its readability.
    Read More
  • TDD and refactoring to patterns in C#: how to write a cron parser - Part 5

    calendarNov 27, 2023 · 10 min read  ·
    Share on: twitterfacebooklinkedincopy
    In the final article of this series, we will implement the Visitor design pattern to introduce a new feature to the application.
    Read More
  • Understanding time complexity on simple examples - Part 1

    calendarNov 20, 2023 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    Starting today, we are launching a series of articles on time complexity. Our objective is to determine the superiority of one algorithm over another when faced with two or more options. While we strive for simplicity, there may be instances where we delve into the intricate details as necessary.
    Read More
  • Understanding time complexity on simple examples - Part 2

    calendarNov 20, 2023 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    So, how can one determine that one method is superior to another?
    Read More
  • Understanding time complexity on simple examples - Part 3

    calendarNov 20, 2023 · 5 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will provide a concrete illustration of the concepts discussed by comparing various algorithms for calculating the power of a real number. We will demonstrate that certain methods are significantly more efficient than others.
    Read More
  • Understanding time complexity on simple examples - Part 4

    calendarNov 20, 2023 · 8 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will provide another concrete illustration of the concepts discussed by comparing various algorithms for calculating linear recurrence sequences. We will once again demonstrate that certain methods are significantly more efficient than others.
    Read More
  • Implementing a simple garbage collector in C# - Part 1

    calendarNov 14, 2023 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    Starting today, we are initiating a series of articles on garbage collection with a progressive approach. Our goal is to systematically reimplement the garbage collector implemented in the .NET framework. This approach aims to translate the theoretical concepts into practical implementation, providing clear …
    Read More
  • Implementing a simple garbage collector in C# - Part 2

    calendarNov 14, 2023 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this article, it is time to precisely outline the scope of our study and introduce key definitions that will be extensively utilized throughout this series.
    Read More
  • Implementing a simple garbage collector in C# - Part 3

    calendarNov 14, 2023 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this article, we will establish and implement in C# the concepts we previously mentioned, with a specific emphasis on how the garbage collector will be coded.
    Read More
  • Implementing a simple garbage collector in C# - Part 4

    calendarNov 14, 2023 · 3 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this article, we illustrate why allocating memory without deallocating it can be a source of serious issues and headaches for a programmer.
    Read More
    • ««
    • «
    • 11
    • 12
    • 13
    • 14
    • 15
    • »
    • »»

Nicolas DESCARTES

This blog gathers the contributions of a passionate software engineer convinced that getting to the bottom of things is the best way to truly understand the big picture. Follow @EOCS_Descartes
Read More

Don't miss new articles

/* Real people should not fill this in and expect good things - do not remove this or risk form bot signups. */

Recent Posts

  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Implementing Azure Key Vault
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Implementing managed identities
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - The traditional approach and its drawbacks
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Introduction
  • Engineering a compiler through examples: building a mathematical expression engine - Part 6
  • Engineering a compiler through examples: building a mathematical expression engine - Part 5
  • Engineering a compiler through examples: building a mathematical expression engine - Part 4
  • Engineering a compiler through examples: building a mathematical expression engine - Part 3
Nicolas DESCARTES

Copyright  NICOLAS DESCARTES

to-top