Computers

From HandWiki - Reading time: 11 min

This portal is dedicated to computer science, computational science and software engineering topics, covering computers, programming languages, software algorithms (numerical and non-numerical), mathematical models, computational models, and computer simulations.


Handwiki computer.svg Computer science portal

Find here a list of categories organized by topics and a list of new articles submitted to this portal.

+ Add a new article


List of categories

0

Main topics

  1. 68k architecture
  2. Abstract machines
  3. Acid tests
  4. Ad hoc routing protocols
  5. Agent-based model
  6. Aggregation-based digital libraries
  7. Ajax (programming)
  8. Ambient intelligence
  9. Analog computers
  10. Anti-patterns
  11. Application layer protocols
  12. Application programming interfaces
  13. Application-specific graphs
  14. Applications of computer vision
  15. Applied machine learning
  16. Approximation theory
  17. Architectural pattern (computer science)
  18. Areas of computer science
  19. Argument technology
  20. Articles with example ALGOL 60 code
  21. Artificial intelligence
  22. Artificial life
  23. Artificial life models
  24. As a service
  25. Aspect-oriented programming
  26. Assemblers
  27. Associative arrays
  28. Augmented reality
  29. Authenticated-encryption schemes
  30. Authentication methods
  31. Authentication protocols
  32. Automata (computation)
  33. Automated planning and scheduling
  34. Automatic memory management
  35. Backward compatibility
  36. Base-dependent integer sequences
  37. Binary arithmetic
  38. Binary sequences
  39. Blockchains
  40. Braille patterns
  41. Brain–computer interfacing
  42. Broken hash functions
  43. Capacity-achieving codes
  44. Capacity-approaching codes
  45. Cascading Style Sheets
  46. Cellular automata
  47. Cellular automaton patterns
  48. Cellular automaton rules
  49. Central processing unit
  50. Certificate authorities
  51. Character encoding
  52. Character sets
  53. Cisco protocols
  54. Class (computer programming)
  55. Classes of computers
  56. Clear text protocols
  57. Cloud infrastructure
  58. Cloud platforms
  59. Cloud robotics
  60. Cognitive architecture
  61. Cognitive science
  62. Collaborative writing
  63. Color space
  64. Combinatory logic
  65. Communications protocols
  66. Comparison sorts
  67. Complex systems theory
  68. Complexity classes
  69. Computation oracles
  70. Computational anatomy
  71. Computational archaeology
  72. Computational complexity theory
  73. Computational fields of study
  74. Computational learning theory
  75. Computational linguistics
  76. Computational mathematics
  77. Computational neuroscience
  78. Computational phylogenetics
  79. Computational problems
  80. Computational resources
  81. Computational science
  82. Computer access control
  83. Computer access control protocols
  84. Computer accessibility
  85. Computer algebra
  86. Computer architecture
  87. Computer archives
  88. Computer arithmetic
  89. Computer configuration
  90. Computer engineering
  91. Computer error messages
  92. Computer errors
  93. Computer forensics
  94. Computer hardware
  95. Computer jargon
  96. Computer law
  97. Computer libraries
  98. Computer logging
  99. Computer memory
  100. Computer occupations
  101. Computer optimization
  102. Computer performance
  103. Computer programming
  104. Computer programming books
  105. Computer science
  106. Computer science books
  107. Computer science journals
  108. Computer systems
  109. Computer viruses
  110. Computer vision
  111. Computer-aided engineering
  112. Computer-assisted translation
  113. Computer-mediated communication
  114. Computers and the environment
  115. Concurrency (computer science)
  116. Concurrency control
  117. Concurrent programming libraries
  118. Conditional constructs
  119. Constraint programming
  120. Control engineering
  121. Control flow
  122. Control theory
  123. Convex hulls
  124. Convex optimization
  125. Cyberinfrastructure
  126. Cybernetics
  127. Cyclic redundancy checks
  128. DNS record types
  129. DOS memory management
  130. DOS technology
  131. Declarative programming
  132. Deep learning
  133. Deep packet inspection
  134. Denotational semantics
  135. Dependently typed programming
  136. Descriptive complexity
  137. Digital humanities
  138. Digital libraries
  139. Digital press
  140. Digital registers
  141. Digital signal processing
  142. Digital signature schemes
  143. Digital typography
  144. Digital watermarking
  145. Disk cloning
  146. Disk encryption
  147. Disk partitions
  148. Distributed artificial intelligence
  149. Distributed stream processing
  150. Distributed version control systems
  151. Domain Name System
  152. Domain name system
  153. Domain names
  154. Domain registries
  155. Dynamic programming
  156. Dynamic systems development method
  157. Electronic documents
  158. Electronic publishing
  159. Email authentication
  160. Embedded operating systems
  161. Embedded systems
  162. Enactive cognition
  163. Enterprise application integration
  164. Error detection and correction
  165. Evaluation of machine translation
  166. Evaluation strategy
  167. Evolutionary computation
  168. Extendable-output functions
  169. Extreme programming
  170. Face recognition
  171. Fagan inspection
  172. Fault tolerance
  173. Fault-tolerant computer systems
  174. Feature detection (computer vision)
  175. Federated identity
  176. Finite model theory
  177. Floating point
  178. Floating point types
  179. Formal methods
  180. Free content licenses
  181. Functional programming
  182. Gate arrays
  183. Gene expression programming
  184. Generic programming
  185. Genetic programming
  186. Glossaries of computers
  187. Graph families
  188. Hard disk drives
  189. Hardware acceleration
  190. Hardware partitioning
  191. Hardware virtualization
  192. Hash functions
  193. History of artificial intelligence
  194. History of human–computer interaction
  195. Homomorphic encryption
  196. Human–computer interaction
  197. Hypercomputation
  198. Hypertext Transfer Protocol
  199. IEEE 802.11
  200. IP addresses
  201. IPA typefaces
  202. IPv6 transition technologies
  203. Identifiers
  204. Identity management
  205. Inductive logic programming
  206. Injection exploits
  207. Input methods
  208. Input/output
  209. Instant messaging protocols
  210. Instruction processing
  211. Instruction set architectures
  212. Integrated hydrologic modelling
  213. Inter-process communication
  214. Interactive evolutionary computation
  215. Internal DOS commands
  216. Internationalization and localization
  217. Interoperability
  218. Interrupts
  219. Intrusion detection systems
  220. Iteration in programming
  221. Iterative methods
  222. Kernel methods for machine learning
  223. Key derivation functions
  224. Lambda calculus
  225. Lightweight Unix-like systems
  226. Limits of computation
  227. Linear programming
  228. Link access protocols
  229. Link analysis
  230. Link protocols
  231. Literate programming
  232. Logic families
  233. Logic in computer science
  234. Logic programming
  235. Logical link control
  236. MIPS architecture
  237. MIPS implementations
  238. Mac OS character encodings
  239. Machine code
  240. Machine learning
  241. Machine translation
  242. Machine vision
  243. Mainframe computers
  244. Manycore processors
  245. Mass digitization
  246. Massively parallel computers
  247. Mathematical science occupations
  248. Mathematical theorems in theoretical computer science
  249. Mathematics-related lists
  250. Measures of complexity
  251. Mechanical calculators
  252. Mechanical computers
  253. Media access control
  254. Memory management
  255. Message authentication codes
  256. Metaprogramming
  257. Microkernels
  258. Microsoft BASIC
  259. Middleware
  260. Mixed reality
  261. Models of computation
  262. Monolithic kernels
  263. Monospaced typefaces
  264. Multi-agent systems
  265. Multimodal interaction
  266. Multiplexing
  267. NEC supercomputers
  268. NIST hash function competition
  269. NP-complete problems
  270. Nature-inspired metaheuristics
  271. Net neutrality
  272. Non-uniform random numbers
  273. Non-volatile memory
  274. Nonlinear control
  275. OSI protocols
  276. Object (computer science)
  277. Object recognition and categorization
  278. Object-oriented operating systems
  279. Object-oriented programming
  280. Object-relational mapping
  281. Online analytical processing
  282. Online content distribution
  283. Online encyclopedias
  284. Open science
  285. Open-access archives
  286. Open-source artificial intelligence
  287. Open-source hardware
  288. Open-source typefaces
  289. OpenCL compute devices
  290. Operating system APIs
  291. Operating system technology
  292. Operating systems
  293. Operations research
  294. Operators (programming)
  295. Optical character recognition
  296. Oriented matroids
  297. P-complete problems
  298. POSIX error codes
  299. Parameterized complexity
  300. Password authentication
  301. Patch utilities
  302. Pattern matching
  303. Peer-to-peer
  304. Persistence
  305. Perspective projection
  306. Petri nets
  307. Physical layer protocols
  308. Polymorphism (computer science)
  309. Polynomial-time problems
  310. PostScript
  311. Presentation layer protocols
  312. Primitive types
  313. Printing terminology
  314. Probabilistic complexity classes
  315. Probabilistic models
  316. Process calculi
  317. Program analysis
  318. Programmable logic controllers
  319. Programming constructs
  320. Programming idioms
  321. Programming paradigms
  322. Programming principles
  323. Protocols by OSI layer
  324. Prototype-based programming
  325. Pseudorandomness
  326. Public key infrastructure
  327. Push technology
  328. Quantitative research
  329. Quantum Monte Carlo
  330. Quantum gates
  331. Quantum programming
  332. Quasirandomness
  333. Random number generation
  334. Random text generation
  335. Ranking functions
  336. Real-time operating systems
  337. Real-time simulation
  338. Records management
  339. Records management technology
  340. Register machines
  341. Regular expressions
  342. Remote desktop protocols
  343. Remote procedure call
  344. Robot kinematics
  345. Routing protocols
  346. Run-time systems
  347. Scientific modeling
  348. Search engine optimization
  349. Second-level domains
  350. Secure communication
  351. Semantic HTML
  352. Sequential experiments
  353. Sequential methods
  354. Serial buses
  355. Server hardware
  356. Signal processing metrics
  357. Simulation
  358. Solid-state caching
  359. Source code
  360. Source code generation
  361. Spam filtering
  362. Speech codecs
  363. Speech recognition
  364. Speech synthesis
  365. Stack machines
  366. Stack-based virtual machines
  367. Static program analysis
  368. Statistical process control
  369. Statistics-related lists
  370. Stereoscopy
  371. Stochastic optimization
  372. Stochastic simulation
  373. Streaming media systems
  374. String (computer science)
  375. String similarity measures
  376. Subfields of computer science
  377. Subroutines
  378. Substring indices
  379. Supercomputer benchmarks
  380. Supercomputers
  381. Supertasks
  382. Support vector machines
  383. Synchronization
  384. System administration
  385. System calls
  386. Systems management
  387. Systems science
  388. Systems theory
  389. Technical communication
  390. Technology forecasting
  391. Telecommunication theory
  392. Teleconferencing
  393. Telemarketing
  394. Template engines
  395. Terms of service
  396. Ternary computers
  397. Text editor features
  398. Text mining
  399. Text user interface
  400. Texture compression
  401. Texture filtering
  402. Texture mapping
  403. Theoretical computer science
  404. Theory of computation
  405. Time zones
  406. Time-sharing operating systems
  407. Transaction processing
  408. Transactional memory
  409. Transition systems
  410. Transmission Control Protocol
  411. Transport layer protocols
  412. Triplestores
  413. Trojan horses
  414. Tunneling protocols
  415. Turing machine
  416. Type systems
  417. Type theory
  418. Types of RAM
  419. Types of malware
  420. URI schemes
  421. UTC offsets
  422. Unicode blocks
  423. Unified serif and sans-serif typeface families
  424. Unique identifiers
  425. Units of temporal rate
  426. Unix variants
  427. Unsolved problems in computer science
  428. Usability inspection
  429. User interface techniques
  430. User interfaces
  431. Variable (computer science)
  432. Variance reduction
  433. Vector supercomputers
  434. Version control
  435. Version control systems
  436. Virtual machines
  437. Virtual memory
  438. Virtual reality
  439. VoIP protocols
  440. Wikipedia-derived encyclopedias
  441. Windows communication and services
  442. Wireless access points
  443. X86 architecture
  444. X86 instructions
  445. X86 memory management
  446. X86 operating modes
  447. XNS based protocols

Computing

  1. Advanced RISC Computing
  2. Applications of distributed computing
  3. Applicative computing systems
  4. Benchmarks (computing)
  5. Cache (computing)
  6. Clients (computing)
  7. Clipboard (computing)
  8. Cloud computing
  9. Cluster computing
  10. Computing and society
  11. Computing commands
  12. Computing input devices
  13. Computing output devices
  14. Computing platforms
  15. Computing terminology
  16. Computing timelines
  17. Computing websites
  18. Computing-related lists
  19. Concurrent computing
  20. Distributed computing
  21. Distributed computing architecture
  22. Distributed computing problems
  23. Distributed computing projects
  24. Events (computing)
  25. Grid computing
  26. Grid computing projects
  27. High-availability cluster computing
  28. History of computing
  29. Industrial computing
  30. Interpreters (computing)
  31. Load balancing (computing)
  32. Parallel computing
  33. Peer-to-peer computing
  34. Personal computing
  35. Physical computing
  36. Process (computing)
  37. Quantum computing
  38. Real-time computing
  39. Reconfigurable computing
  40. Reversible computing
  41. Routers (computing)
  42. Scheduling (computing)
  43. Servers (computing)
  44. Service-oriented (business computing)
  45. Supercomputing
  46. Surface computing
  47. Threads (computing)
  48. Trusted computing
  49. Ubiquitous computing
  50. Virtual Network Computing

File Storage and File Formats

  1. 3D graphics file formats
  2. Abstract data types
  3. Algorithmic information theory
  4. Amortized data structures
  5. Archive formats
  6. Audio file formats
  7. Automatic identification and data capture
  8. Bibliography file formats
  9. Binary-to-text encoding formats
  10. Bioinformatics algorithms
  11. CAD file formats
  12. Chemical file formats
  13. Cloud databases
  14. Cloud storage
  15. Cloud storage gateways
  16. Composite data types
  17. Compression file systems
  18. Computer data storage
  19. Computer file formats
  20. Computer file systems
  21. Computer files
  22. Computer graphics data structures
  23. Computer storage devices
  24. Computer storage media
  25. Data access technologies
  26. Data breaches
  27. Data compression
  28. Data differencing
  29. Data erasure
  30. Data interchange standards
  31. Data management
  32. Data mapping
  33. Data partitioning
  34. Data protection
  35. Data quality
  36. Data recovery
  37. Data security
  38. Data serialization formats
  39. Data storage
  40. Data structures
  41. Data synchronization
  42. Data transmission
  43. Data types
  44. Data warehousing
  45. Data-centric programming languages
  46. Database access protocols
  47. Database algorithms
  48. Database constraints
  49. Database index techniques
  50. Database models
  51. Database normalization
  52. Database theory
  53. Digital container formats
  54. Discontinued media formats
  55. Disk file systems
  56. Distributed data storage
  57. Distributed data stores
  58. Distributed file systems
  59. Document-oriented databases
  60. Earth sciences data formats
  61. Executable file formats
  62. File Transfer Protocol
  63. File archivers
  64. File hosting
  65. File sharing
  66. File sharing networks
  67. File system management
  68. File systems supported by the Linux kernel
  69. File transfer protocols
  70. Filename extensions
  71. Flash file systems
  72. Font formats
  73. Free digital container formats
  74. Free special-purpose file systems
  75. Functional data structures
  76. GIS file formats
  77. Graphics file formats
  78. Hash based data structures
  79. Heaps (data structures)
  80. IBM file systems
  81. Information
  82. Information assurance standards
  83. Information governance
  84. Information retrieval
  85. Information science
  86. Information systems
  87. Information technology
  88. Information technology management
  89. Information theory
  90. Kinetic data structures
  91. Lexical databases
  92. Lists of file formats
  93. Metadata registry
  94. Metadata standards
  95. Microformats
  96. Network file systems
  97. Network file transfer protocols
  98. Network-attached storage
  99. Open formats
  100. Packets (information technology)
  101. Peer-to-peer file sharing
  102. Playlist file formats
  103. Program transformation
  104. Quantum information science
  105. Quantum information theory
  106. SQL data access
  107. Shared disk file systems
  108. Solid-state computer storage media
  109. Special-purpose file systems
  110. Statistical data coding
  111. Storage area networks
  112. Storage systems
  113. Storage virtualization
  114. String data structures
  115. Structured storage
  116. Subtitle file formats
  117. Text file formats
  118. Transformation languages
  119. Translation databases
  120. Unicode Transformation Formats
  121. Units of information
  122. Unix file system technology
  123. Userspace file systems
  124. Vector graphics file formats
  125. Video formats
  126. Web syndication formats
  127. XML data access
  128. tz database

Computer Video, Audio and Imaging

  1. 3D computer graphics
  2. 3D graphics file formats
  3. 3D imaging
  4. 3D rendering
  5. Animation techniques
  6. Audio codecs
  7. Audio file formats
  8. Audio mixing
  9. Audio network protocols
  10. Audio programming languages
  11. Computer animation
  12. Computer graphic artifacts
  13. Computer graphic techniques
  14. Computer graphics
  15. Computer graphics algorithms
  16. Computer graphics data structures
  17. Cryptographic algorithms
  18. Cryptographic attacks
  19. Cryptographic hash functions
  20. Cryptographic primitives
  21. Cryptographic protocols
  22. Digital audio
  23. Digital audio recording
  24. Digital geometry
  25. Digital imaging
  26. Disk images
  27. Geometry in computer vision
  28. Graphical control elements
  29. Graphical terminals
  30. Graphical user interface elements
  31. Graphical user interfaces
  32. Graphics chips
  33. Graphics file formats
  34. Graphics hardware
  35. Graphics processing units
  36. Graphics standards
  37. Hash function (non-cryptographic)
  38. Image compression
  39. Image impedance filters
  40. Image scanning
  41. Image segmentation
  42. Infographics
  43. Mesh generation
  44. Mesh networking
  45. Noise (graphics)
  46. Ray tracing (graphics)
  47. Scalable Vector Graphics
  48. Special effects
  49. Vector graphics
  50. Vector graphics file formats
  51. Vector graphics markup languages
  52. Video codecs
  53. Video compression
  54. Video formats
  55. Video hosting
  56. Video on demand services
  57. Video signal
  58. Visualization (graphic)

Internet and Network

  1. Anonymity networks
  2. Archive networks
  3. Audio network protocols
  4. Computer network analysis
  5. Computer network security
  6. Computer networking
  7. Computer networks
  8. Computing websites
  9. File sharing networks
  10. Interbank networks
  11. Internet Protocol
  12. Internet Standards
  13. Internet access
  14. Internet architecture
  15. Internet censorship
  16. Internet governance
  17. Internet layer protocols
  18. Internet mail protocols
  19. Internet privacy
  20. Internet protocols
  21. Internet safety
  22. Internet search algorithms
  23. Internet security
  24. Internet television
  25. Internet terminology
  26. Local area networks
  27. Markov networks
  28. Mesh networking
  29. Network acceleration
  30. Network access
  31. Network addressing
  32. Network analysis
  33. Network architecture
  34. Network file systems
  35. Network file transfer protocols
  36. Network layer protocols
  37. Network management
  38. Network performance
  39. Network protocols
  40. Network scheduling algorithms
  41. Network socket
  42. Network topology
  43. Network-attached storage
  44. Networking algorithms
  45. Networking hardware
  46. Networking standards
  47. Personal area networks
  48. Responsive web design
  49. Semantic Web
  50. Storage area networks
  51. Virtual Network Computing
  52. Virtual private networks
  53. Web analytics
  54. Web caching protocol
  55. Web conferencing
  56. Web design
  57. Web development
  58. Web fiction
  59. Web programming
  60. Web security exploits
  61. Web service specifications
  62. Web shells
  63. Web standards
  64. Web syndication formats
  65. Web technology
  66. Website management
  67. Wide area networks
  68. Wireless sensor network
  69. World Wide Web
  70. World Wide Web Consortium standards

Security and Privacy

  1. Applications of cryptography
  2. Broken cryptography algorithms
  3. Computer network security
  4. Computer security
  5. Computer security books
  6. Computer security exploits
  7. Computer security models
  8. Computer security procedures
  9. Computer security qualifications
  10. Computer security standards
  11. Crypto-anarchism
  12. Cryptographic algorithms
  13. Cryptographic attacks
  14. Cryptographic hash functions
  15. Cryptographic primitives
  16. Cryptographic protocols
  17. Cryptography
  18. Cryptography standards
  19. Cyberattacks
  20. Cyberspace
  21. Cyberwarfare
  22. Data security
  23. Denial-of-service attacks
  24. Elliptic curve cryptography
  25. Hacking (computer security)
  26. Hash function (non-cryptographic)
  27. Hash-based cryptography
  28. Identity-based cryptography
  29. Internet privacy
  30. Internet security
  31. Mobile security
  32. Operating system security
  33. Pairing-based cryptography
  34. Post-quantum cryptography
  35. Public-key cryptography
  36. Quantum cryptography
  37. Quantum cryptography protocols
  38. Security breaches
  39. Security compliance
  40. Security identifier types
  41. Social engineering (computer security)
  42. Theory of cryptography
  43. Transport Layer Security
  44. Transport Layer Security implementation
  45. Types of cyberattacks
  46. Web security exploits

Software technologies

  1. Copyright infringement of software
  2. Free Software Foundation
  3. Free and open-source software licenses
  4. Free software culture and documents
  5. Free software movement
  6. Permissive software licenses
  7. Software analysis patterns
  8. Software architecture
  9. Software bugs
  10. Software by type
  11. Software cracking
  12. Software delivery methods
  13. Software design
  14. Software design patterns
  15. Software development
  16. Software development philosophies
  17. Software development process
  18. Software distribution
  19. Software engineering
  20. Software engineering terminology
  21. Software features
  22. Software industry
  23. Software licenses
  24. Software maintenance
  25. Software metrics
  26. Software modeling language
  27. Software optimization
  28. Software project management
  29. Software quality
  30. Software release
  31. Software requirements
  32. Software review
  33. Software testing
  34. Software using the BSD license
  35. Software-defined radio
  36. Utility software types

Algorithms

  1. Algorithmic information theory
  2. Algorithms on strings
  3. Analysis of parallel algorithms
  4. Anti-aliasing algorithms
  5. Asymmetric-key algorithms
  6. Bioinformatics algorithms
  7. Broken cryptography algorithms
  8. Checksum algorithms
  9. Compiler optimizations
  10. Computer arithmetic algorithms
  11. Computer graphics algorithms
  12. Computer optimization
  13. Concurrency control algorithms
  14. Concurrent algorithms
  15. Convex optimization
  16. Cryptographic algorithms
  17. Database algorithms
  18. Distributed algorithms
  19. Evolutionary algorithms
  20. External memory algorithms
  21. Fingerprinting algorithms
  22. Genetic algorithms
  23. Geometric algorithms
  24. Global illumination algorithms
  25. Image impedance filters
  26. Internet search algorithms
  27. Lossless compression algorithms
  28. Lossy compression algorithms
  29. Machine learning algorithms
  30. Memory management algorithms
  31. Network scheduling algorithms
  32. Networking algorithms
  33. Padding algorithms
  34. Parsing algorithms
  35. Pseudo-polynomial time algorithms
  36. Quantum algorithms
  37. Routing algorithms
  38. Scheduling algorithms
  39. Search algorithms
  40. Search engine optimization
  41. Sequence alignment algorithms
  42. Software optimization
  43. Sorting algorithms
  44. Spam filtering
  45. Stochastic optimization
  46. Texture filtering
  47. Unicode algorithms

Standards

  1. 3GPP standards
  2. Advanced Encryption Standard
  3. Atom (standard)
  4. C standard library headers
  5. Cloud standards
  6. Computer display standards
  7. Computer security standards
  8. Computer standards
  9. Cryptography standards
  10. Data interchange standards
  11. Digital Signature Standard
  12. Ecma standards
  13. Ethernet standards
  14. Graphics standards
  15. IEC standards
  16. IEEE standards
  17. ISO standards
  18. Information assurance standards
  19. International Standard Book Number
  20. Internet Standards
  21. Metadata standards
  22. Networking standards
  23. Open Group standards
  24. Programming language standards
  25. Programming languages with an ISO standard
  26. Unix standards
  27. Web standards
  28. World Wide Web Consortium standards
  29. XML-based standards

Computer Languages and Compilers

  1. APL programming language family
  2. Academic programming languages
  3. Ada (programming language)
  4. Ada programming language family
  5. Agent-based programming languages
  6. Agent-oriented programming languages
  7. Algebraic modeling languages
  8. Algol programming language family
  9. Array programming languages
  10. Assembly languages
  11. Audio programming languages
  12. BASIC compilers
  13. BASIC programming language
  14. BASIC programming language family
  15. C (programming language)
  16. C Sharp programming language family
  17. C compilers
  18. C programming language family
  19. C++ compilers
  20. C++ programming language family
  21. CFML programming language
  22. Class-based programming languages
  23. Compiler construction
  24. Compiler optimizations
  25. Compiler theory
  26. Computer languages
  27. Concatenative programming languages
  28. Concurrent programming languages
  29. Constraint programming languages
  30. Constructed languages
  31. Criticisms of programming languages
  32. Cross-compilers
  33. Data-centric programming languages
  34. Declarative markup languages
  35. Declarative programming languages
  36. Delphi (programming language)
  37. Dependently typed languages
  38. Discontinued programming languages
  39. Domain-specific knowledge representation languages
  40. Domain-specific programming languages
  41. Dylan (programming language)
  42. Dynamic programming languages
  43. Dynamically typed programming languages
  44. Educational programming languages
  45. Erlang (programming language)
  46. Experimental programming languages
  47. Extensible syntax programming languages
  48. Formal languages
  49. Formal specification languages
  50. Forth programming language family
  51. Fortran compilers
  52. Fortran programming language family
  53. Fourth-generation programming languages
  54. Free compilers and interpreters
  55. Function-level languages
  56. Functional languages
  57. Functional logic programming languages
  58. Go (programming language)
  59. Graph description languages
  60. Hardware description languages
  61. Haskell programming language family
  62. High-level programming languages
  63. Homoiconic programming languages
  64. ICL programming languages
  65. Icon programming language family
  66. Implementation of functional programming languages
  67. JOSS programming language family
  68. JVM programming languages
  69. Java (programming language)
  70. Java compilers
  71. Java device platform
  72. Java platform
  73. Java programming language family
  74. Java specification requests
  75. Java virtual machine
  76. JavaScript
  77. JavaScript dialect engines
  78. JavaScript programming language family
  79. Knowledge representation languages
  80. Language modeling
  81. Lightweight markup languages
  82. Lisp (programming language)
  83. Lisp programming language family
  84. Lists of programming languages
  85. Logic programming languages
  86. Logo programming language family
  87. ML programming language family
  88. MUMPS programming language family
  89. Macro programming languages
  90. Markup language comparisons
  91. Markup languages
  92. Modeling languages
  93. Modula programming language family
  94. Multi-paradigm programming languages
  95. Natural language generation
  96. Natural language parsing
  97. Natural language processing
  98. Nondeterministic programming languages
  99. Numerical programming languages
  100. Oberon programming language family
  101. Object-based programming languages
  102. Object-oriented programming languages
  103. Objective-C
  104. Page description markup languages
  105. Pascal (programming language)
  106. Pascal compilers
  107. Pascal programming language family
  108. Pattern matching programming languages
  109. Playlist markup languages
  110. Procedural programming languages
  111. Programming language classification
  112. Programming language comparisons
  113. Programming language concepts
  114. Programming language design
  115. Programming language implementation
  116. Programming language semantics
  117. Programming language standards
  118. Programming language syntax
  119. Programming language theory
  120. Programming language topics
  121. Programming languages
  122. Programming languages with an ISO standard
  123. Prolog programming language family
  124. Prototype-based programming languages
  125. Python (programming language)
  126. Query languages
  127. R (programming language)
  128. Rexx (programming language)
  129. Robot programming languages
  130. Ruby (programming language)
  131. Rust (programming language)
  132. SNOBOL programming language family
  133. Scala (programming language)
  134. Scheme (programming language)
  135. Scheme (programming language) implementations
  136. Scheme (programming language) interpreters
  137. Scripting languages
  138. Shading languages
  139. Simulation programming languages
  140. Smalltalk programming language family
  141. Software modeling language
  142. Specification languages
  143. Stack-oriented programming languages
  144. Statically typed programming languages
  145. Statistical natural language processing
  146. Statistical programming languages
  147. Structured programming languages
  148. Stylesheet languages
  149. Synchronous programming languages
  150. Systems Modeling Language
  151. Systems programming languages
  152. Tcl programming language family
  153. Term-rewriting programming languages
  154. Text-oriented programming languages
  155. Transformation languages
  156. Unified Modeling Language
  157. Unified Modeling Language diagrams
  158. User interface markup languages
  159. Vector graphics markup languages
  160. Visual programming languages
  161. Workflow languages
  162. XBase programming language family
  163. XML markup languages
  164. XML-based programming languages

Licensed under CC BY-SA 3.0 | Source: https://handwiki.org/wiki/HandWiki:Computers
15 views | Status: cached on August 29 2024 21:01:58
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF